2 * Copyright 2007-2020 The OpenSSL Project Authors. All Rights Reserved.
3 * Copyright Nokia 2007-2019
4 * Copyright Siemens AG 2015-2019
6 * Licensed under the Apache License 2.0 (the "License"). You may not use
7 * this file except in compliance with the License. You can obtain a copy
8 * in the file LICENSE in the source distribution or at
9 * https://www.openssl.org/source/license.html
12 #include "cmp_testlib.h"
13 #include <openssl/rsa.h> /* needed in case config no-deprecated */
17 EVP_PKEY *load_pem_key(const char *file)
22 if (!TEST_ptr(bio = BIO_new(BIO_s_file())))
24 if (TEST_int_gt(BIO_read_filename(bio, file), 0))
25 (void)TEST_ptr(key = PEM_read_bio_PrivateKey(bio, NULL, NULL, NULL));
31 X509 *load_pem_cert(const char *file, OPENSSL_CTX *libctx)
36 if (!TEST_ptr(bio = BIO_new(BIO_s_file())))
38 if (TEST_int_gt(BIO_read_filename(bio, file), 0)
39 && TEST_ptr(cert = X509_new_with_libctx(libctx, NULL)))
40 (void)TEST_ptr(cert = PEM_read_bio_X509(bio, &cert, NULL, NULL));
46 OSSL_CMP_MSG *load_pkimsg(const char *file)
50 (void)TEST_ptr((msg = OSSL_CMP_MSG_read(file)));
54 X509_REQ *load_csr(const char *file)
59 if (!TEST_ptr(file) || !TEST_ptr(bio = BIO_new_file(file, "rb")))
61 (void)TEST_ptr(csr = d2i_X509_REQ_bio(bio, NULL));
66 EVP_PKEY *gen_rsa(void)
68 EVP_PKEY_CTX *ctx = NULL;
69 EVP_PKEY *pkey = NULL;
71 (void)(TEST_ptr(ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL))
72 && TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0)
73 && TEST_int_gt(EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, 2048), 0)
74 && TEST_int_gt(EVP_PKEY_keygen(ctx, &pkey), 0));
75 EVP_PKEY_CTX_free(ctx);
80 * Checks whether the syntax of msg conforms to ASN.1
82 int valid_asn1_encoding(const OSSL_CMP_MSG *msg)
84 return msg != NULL ? i2d_OSSL_CMP_MSG(msg, NULL) > 0 : 0;
88 * Compares two stacks of certificates in the order of their elements.
89 * Returns 0 if sk1 and sk2 are equal and another value otherwise
91 int STACK_OF_X509_cmp(const STACK_OF(X509) *sk1, const STACK_OF(X509) *sk2)
102 if ((res = sk_X509_num(sk1) - sk_X509_num(sk2)))
104 for (i = 0; i < sk_X509_num(sk1); i++) {
105 a = sk_X509_value(sk1, i);
106 b = sk_X509_value(sk2, i);
108 if ((res = X509_cmp(a, b)) != 0)
115 * Up refs and push a cert onto sk.
116 * Returns the number of certificates on the stack on success
117 * Returns -1 or 0 on error
119 int STACK_OF_X509_push1(STACK_OF(X509) *sk, X509 *cert)
123 if (sk == NULL || cert == NULL)
125 if (!X509_up_ref(cert))
127 res = sk_X509_push(sk, cert);
129 X509_free(cert); /* down-ref */
133 int print_to_bio_out(const char *func, const char *file, int line,
134 OSSL_CMP_severity level, const char *msg)
136 return OSSL_CMP_print_to_bio(bio_out, func, file, line, level, msg);