|  | #! /usr/bin/env perl | 
|  | # Copyright 2017-2020 The OpenSSL Project Authors. All Rights Reserved. | 
|  | # | 
|  | # Licensed under the Apache License 2.0 (the "License").  You may not use | 
|  | # this file except in compliance with the License.  You can obtain a copy | 
|  | # in the file LICENSE in the source distribution or at | 
|  | # https://www.openssl.org/source/license.html | 
|  | # | 
|  | # ====================================================================== | 
|  |  | 
|  |  | 
|  | use strict; | 
|  | use warnings; | 
|  |  | 
|  | use File::Compare qw/compare_text/; | 
|  | use File::Basename; | 
|  | use OpenSSL::Test qw/:DEFAULT srctop_file data_file/; | 
|  | use OpenSSL::Test::Utils; | 
|  |  | 
|  | setup("test_pem_reading"); | 
|  |  | 
|  | my $testsrc = srctop_file("test", "recipes", basename($0)); | 
|  |  | 
|  | my $cmd = "openssl"; | 
|  |  | 
|  | # map input PEM file to 1 if it should be accepted; 0 when should be rejected | 
|  | my %cert_expected = ( | 
|  | "cert-1023line.pem" => 1, | 
|  | "cert-1024line.pem" => 1, | 
|  | "cert-1025line.pem" => 1, | 
|  | "cert-254-chars-at-the-end.pem" => 1, | 
|  | "cert-254-chars-in-the-middle.pem" => 1, | 
|  | "cert-255line.pem" => 1, | 
|  | "cert-256line.pem" => 1, | 
|  | "cert-257line.pem" => 1, | 
|  | "cert-blankline.pem" => 0, | 
|  | "cert-bom.pem" => 1, | 
|  | "cert-comment.pem" => 0, | 
|  | "cert-earlypad.pem" => 0, | 
|  | "cert-extrapad.pem" => 0, | 
|  | "cert-infixwhitespace.pem" => 1, | 
|  | "cert-junk.pem" => 0, | 
|  | "cert-leadingwhitespace.pem" => 1, | 
|  | "cert-longline.pem" => 1, | 
|  | "cert-misalignedpad.pem" => 0, | 
|  | "cert-onecolumn.pem" => 1, | 
|  | "cert-oneline.pem" => 1, | 
|  | "cert-oneline-multiple-of-254.pem" => 1, | 
|  | "cert-shortandlongline.pem" => 1, | 
|  | "cert-shortline.pem" => 1, | 
|  | "cert-threecolumn.pem" => 1, | 
|  | "cert-trailingwhitespace.pem" => 1, | 
|  | "cert.pem" => 1 | 
|  | ); | 
|  | my %dsa_expected = ( | 
|  | "dsa-1023line.pem" => 0, | 
|  | "dsa-1024line.pem" => 0, | 
|  | "dsa-1025line.pem" => 0, | 
|  | "dsa-255line.pem" => 0, | 
|  | "dsa-256line.pem" => 0, | 
|  | "dsa-257line.pem" => 0, | 
|  | "dsa-blankline.pem" => 0, | 
|  | "dsa-comment.pem" => 0, | 
|  | "dsa-corruptedheader.pem" => 0, | 
|  | "dsa-corruptiv.pem" => 0, | 
|  | "dsa-earlypad.pem" => 0, | 
|  | "dsa-extrapad.pem" => 0, | 
|  | "dsa-infixwhitespace.pem" => 0, | 
|  | "dsa-junk.pem" => 0, | 
|  | "dsa-leadingwhitespace.pem" => 0, | 
|  | "dsa-longline.pem" => 0, | 
|  | "dsa-misalignedpad.pem" => 0, | 
|  | "dsa-onecolumn.pem" => 0, | 
|  | "dsa-oneline.pem" => 0, | 
|  | "dsa-onelineheader.pem" => 0, | 
|  | "dsa-shortandlongline.pem" => 0, | 
|  | "dsa-shortline.pem" => 0, | 
|  | "dsa-threecolumn.pem" => 0, | 
|  | "dsa-trailingwhitespace.pem" => 1, | 
|  | "dsa.pem" => 1 | 
|  | ); | 
|  |  | 
|  | plan tests =>  scalar keys(%cert_expected) + scalar keys(%dsa_expected) + 2; | 
|  |  | 
|  | foreach my $input (keys %cert_expected) { | 
|  | my @common = ($cmd, "x509", "-text", "-noout", "-inform", "PEM", "-in"); | 
|  | my @data = run(app([@common, data_file($input)], stderr => undef), capture => 1); | 
|  | my @match = grep /The Great State of Long-Winded Certificate Field Names Whereby to Increase the Output Size/, @data; | 
|  | is((scalar @match > 0 ? 1 : 0), $cert_expected{$input}); | 
|  | } | 
|  | SKIP: { | 
|  | skip "DSA support disabled, skipping...", (scalar keys %dsa_expected) unless !disabled("dsa"); | 
|  | foreach my $input (keys %dsa_expected) { | 
|  | my @common = ($cmd, "pkey", "-inform", "PEM", "-passin", "file:" . data_file("wellknown"), "-noout", "-text", "-in"); | 
|  | my @data; | 
|  | { | 
|  | local $ENV{MSYS2_ARG_CONV_EXCL} = "file:"; | 
|  | @data = run(app([@common, data_file($input)], stderr => undef), capture => 1); | 
|  | } | 
|  | my @match = grep /68:42:02:16:63:54:16:eb:06:5c:ab:06:72:3b:78:/, @data; | 
|  | is((scalar @match > 0 ? 1 : 0), $dsa_expected{$input}); | 
|  | } | 
|  | } | 
|  | SKIP: { | 
|  | skip "RSA support disabled, skipping...", 1 unless !disabled("rsa"); | 
|  | my @common = ($cmd, "pkey", "-inform", "PEM", "-noout", "-text", "-in"); | 
|  | my @data = run(app([@common, data_file("beermug.pem")], stderr => undef), capture => 1); | 
|  | my @match = grep /00:a0:3a:21:14:5d:cd:b6:d5:a0:3e:49:23:c1:3a:/, @data; | 
|  | ok(scalar @match > 0 ? 1 : 0); | 
|  | } | 
|  |  | 
|  | ok(run(test(["pemtest"])), "running pemtest"); |