X-Git-Url: https://git.openssl.org/?a=blobdiff_plain;f=test%2Fdhtest.c;h=96d7027cc60066afc510ed6c964cff5837717887;hb=0d8da77908df1aa3186b00113aab1b338cba9b07;hp=618b84e7733b52929b5f245dd522344d5401e734;hpb=a9c6d221055c3a85edb23b1364cd60baafed4b9f;p=openssl.git diff --git a/test/dhtest.c b/test/dhtest.c index 618b84e773..96d7027cc6 100644 --- a/test/dhtest.c +++ b/test/dhtest.c @@ -1,5 +1,5 @@ /* - * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. + * Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the OpenSSL license (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy @@ -11,7 +11,7 @@ #include #include -#include "e_os.h" +#include "internal/nelem.h" #include #include #include @@ -19,35 +19,26 @@ #include #include "testutil.h" -#ifdef OPENSSL_NO_DH -int main(int argc, char *argv[]) -{ - printf("No DH support\n"); - return (0); -} -#else +#ifndef OPENSSL_NO_DH # include static int cb(int p, int n, BN_GENCB *arg); -static const char rnd_seed[] = - "string to make the random number generator think it has entropy"; - static int dh_test(void) { BN_GENCB *_cb = NULL; DH *a = NULL; DH *b = NULL; + DH *c = NULL; const BIGNUM *ap = NULL, *ag = NULL, *apub_key = NULL; - const BIGNUM *bpub_key = NULL; - BIGNUM *bp = NULL, *bg = NULL; + const BIGNUM *bpub_key = NULL, *bpriv_key = NULL; + BIGNUM *bp = NULL, *bg = NULL, *cpriv_key = NULL; unsigned char *abuf = NULL; unsigned char *bbuf = NULL; - int i, alen, blen, aout, bout; + unsigned char *cbuf = NULL; + int i, alen, blen, clen, aout, bout, cout; int ret = 0; - RAND_seed(rnd_seed, sizeof rnd_seed); - if (!TEST_ptr(_cb = BN_GENCB_new())) goto err; BN_GENCB_set(_cb, &cb, NULL); @@ -81,7 +72,14 @@ static int dh_test(void) if (!DH_generate_key(b)) goto err; - DH_get0_key(b, &bpub_key, NULL); + DH_get0_key(b, &bpub_key, &bpriv_key); + + /* Also test with a private-key-only copy of |b|. */ + if (!TEST_ptr(c = DHparams_dup(b)) + || !TEST_ptr(cpriv_key = BN_dup(bpriv_key)) + || !TEST_true(DH_set0_key(c, NULL, cpriv_key))) + goto err; + cpriv_key = NULL; alen = DH_size(a); if (!TEST_ptr(abuf = OPENSSL_malloc(alen)) @@ -93,8 +91,14 @@ static int dh_test(void) || !TEST_true((bout = DH_compute_key(bbuf, apub_key, b)) != -1)) goto err; + clen = DH_size(c); + if (!TEST_ptr(cbuf = OPENSSL_malloc(clen)) + || !TEST_true((cout = DH_compute_key(cbuf, apub_key, c)) != -1)) + goto err; + if (!TEST_true(aout >= 4) - || !TEST_mem_eq(abuf, aout, bbuf, bout)) + || !TEST_mem_eq(abuf, aout, bbuf, bout) + || !TEST_mem_eq(abuf, aout, cbuf, cout)) goto err; ret = 1; @@ -102,10 +106,13 @@ static int dh_test(void) err: OPENSSL_free(abuf); OPENSSL_free(bbuf); + OPENSSL_free(cbuf); DH_free(b); DH_free(a); + DH_free(c); BN_free(bp); BN_free(bg); + BN_free(cpriv_key); BN_GENCB_free(_cb); return ret; } @@ -507,11 +514,16 @@ static int rfc5114_test(void) TEST_error("Test failed RFC5114 set %d\n", i + 1); return 0; } +#endif -void register_tests(void) +int setup_tests(void) { +#ifdef OPENSSL_NO_DH + TEST_note("No DH support"); +#else ADD_TEST(dh_test); ADD_TEST(rfc5114_test); -} #endif + return 1; +}