| /* |
| * Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved. |
| * Copyright Nokia 2007-2019 |
| * Copyright Siemens AG 2015-2019 |
| * |
| * Licensed under the Apache License 2.0 (the "License"). You may not use |
| * this file except in compliance with the License. You can obtain a copy |
| * in the file LICENSE in the source distribution or at |
| * https://www.openssl.org/source/license.html |
| */ |
| |
| #include "helpers/cmp_testlib.h" |
| |
| static const char *newkey_f; |
| static const char *server_cert_f; |
| static const char *pkcs10_f; |
| |
| typedef struct test_fixture { |
| const char *test_case_name; |
| OSSL_CMP_CTX *cmp_ctx; |
| /* for msg create tests */ |
| int bodytype; |
| int err_code; |
| /* for certConf */ |
| int fail_info; |
| /* for protection tests */ |
| OSSL_CMP_MSG *msg; |
| int expected; |
| /* for error and response messages */ |
| OSSL_CMP_PKISI *si; |
| } CMP_MSG_TEST_FIXTURE; |
| |
| static OSSL_LIB_CTX *libctx = NULL; |
| static OSSL_PROVIDER *default_null_provider = NULL, *provider = NULL; |
| |
| static unsigned char ref[CMP_TEST_REFVALUE_LENGTH]; |
| |
| static void tear_down(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| OSSL_CMP_CTX_free(fixture->cmp_ctx); |
| OSSL_CMP_MSG_free(fixture->msg); |
| OSSL_CMP_PKISI_free(fixture->si); |
| OPENSSL_free(fixture); |
| } |
| |
| #define SET_OPT_UNPROTECTED_SEND(ctx, val) \ |
| OSSL_CMP_CTX_set_option((ctx), OSSL_CMP_OPT_UNPROTECTED_SEND, (val)) |
| static CMP_MSG_TEST_FIXTURE *set_up(const char *const test_case_name) |
| { |
| CMP_MSG_TEST_FIXTURE *fixture; |
| |
| if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture)))) |
| return NULL; |
| fixture->test_case_name = test_case_name; |
| |
| if (!TEST_ptr(fixture->cmp_ctx = OSSL_CMP_CTX_new(libctx, NULL)) |
| || !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 1)) |
| || !TEST_true(OSSL_CMP_CTX_set1_referenceValue(fixture->cmp_ctx, |
| ref, sizeof(ref)))) { |
| tear_down(fixture); |
| return NULL; |
| } |
| return fixture; |
| } |
| |
| static EVP_PKEY *newkey = NULL; |
| static X509 *cert = NULL; |
| |
| #define EXECUTE_MSG_CREATION_TEST(expr) \ |
| do { \ |
| OSSL_CMP_MSG *msg = NULL; \ |
| int good = fixture->expected != 0 ? \ |
| TEST_ptr(msg = (expr)) && TEST_true(valid_asn1_encoding(msg)) : \ |
| TEST_ptr_null(msg = (expr)); \ |
| \ |
| OSSL_CMP_MSG_free(msg); \ |
| ERR_print_errors_fp(stderr); \ |
| return good; \ |
| } while (0) |
| |
| /*- |
| * The following tests call a cmp message creation function. |
| * if fixture->expected != 0: |
| * returns 1 if the message is created and syntactically correct. |
| * if fixture->expected == 0 |
| * returns 1 if message creation returns NULL |
| */ |
| static int execute_certreq_create_test(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| EXECUTE_MSG_CREATION_TEST(ossl_cmp_certreq_new(fixture->cmp_ctx, |
| fixture->bodytype, |
| NULL)); |
| } |
| |
| static int execute_errormsg_create_test(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| EXECUTE_MSG_CREATION_TEST(ossl_cmp_error_new(fixture->cmp_ctx, fixture->si, |
| fixture->err_code, |
| "details", 0)); |
| } |
| |
| static int execute_rr_create_test(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| EXECUTE_MSG_CREATION_TEST(ossl_cmp_rr_new(fixture->cmp_ctx)); |
| } |
| |
| static int execute_certconf_create_test(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| EXECUTE_MSG_CREATION_TEST(ossl_cmp_certConf_new |
| (fixture->cmp_ctx, fixture->fail_info, NULL)); |
| } |
| |
| static int execute_genm_create_test(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| EXECUTE_MSG_CREATION_TEST(ossl_cmp_genm_new(fixture->cmp_ctx)); |
| } |
| |
| static int execute_pollreq_create_test(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| EXECUTE_MSG_CREATION_TEST(ossl_cmp_pollReq_new(fixture->cmp_ctx, 4711)); |
| } |
| |
| static int execute_pkimessage_create_test(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| EXECUTE_MSG_CREATION_TEST(ossl_cmp_msg_create |
| (fixture->cmp_ctx, fixture->bodytype)); |
| } |
| |
| static int set1_newPkey(OSSL_CMP_CTX *ctx, EVP_PKEY *pkey) |
| { |
| if (!EVP_PKEY_up_ref(pkey)) |
| return 0; |
| |
| if (!OSSL_CMP_CTX_set0_newPkey(ctx, 1, pkey)) { |
| EVP_PKEY_free(pkey); |
| return 0; |
| } |
| return 1; |
| } |
| |
| static int test_cmp_create_ir_protection_set(void) |
| { |
| OSSL_CMP_CTX *ctx; |
| unsigned char secret[16]; |
| |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| |
| ctx = fixture->cmp_ctx; |
| fixture->bodytype = OSSL_CMP_PKIBODY_IR; |
| fixture->err_code = -1; |
| fixture->expected = 1; |
| if (!TEST_int_eq(1, RAND_bytes_ex(libctx, secret, sizeof(secret), 0)) |
| || !TEST_true(SET_OPT_UNPROTECTED_SEND(ctx, 0)) |
| || !TEST_true(set1_newPkey(ctx, newkey)) |
| || !TEST_true(OSSL_CMP_CTX_set1_secretValue(ctx, secret, |
| sizeof(secret)))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_ir_protection_fails(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->bodytype = OSSL_CMP_PKIBODY_IR; |
| fixture->err_code = -1; |
| fixture->expected = 0; |
| if (!TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, newkey)) |
| || !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 0)) |
| /* newkey used by default for signing does not match cert: */ |
| || !TEST_true(OSSL_CMP_CTX_set1_cert(fixture->cmp_ctx, cert))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_cr_without_key(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->bodytype = OSSL_CMP_PKIBODY_CR; |
| fixture->err_code = -1; |
| fixture->expected = 0; |
| EXECUTE_TEST(execute_certreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_cr(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->bodytype = OSSL_CMP_PKIBODY_CR; |
| fixture->err_code = -1; |
| fixture->expected = 1; |
| if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_certreq_with_invalid_bodytype(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->bodytype = OSSL_CMP_PKIBODY_RR; |
| fixture->err_code = -1; |
| fixture->expected = 0; |
| if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_p10cr(void) |
| { |
| OSSL_CMP_CTX *ctx; |
| X509_REQ *p10cr = NULL; |
| |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| ctx = fixture->cmp_ctx; |
| fixture->bodytype = OSSL_CMP_PKIBODY_P10CR; |
| fixture->err_code = CMP_R_ERROR_CREATING_CERTREQ; |
| fixture->expected = 1; |
| if (!TEST_ptr(p10cr = load_csr_der(pkcs10_f, libctx)) |
| || !TEST_true(set1_newPkey(ctx, newkey)) |
| || !TEST_true(OSSL_CMP_CTX_set1_p10CSR(ctx, p10cr))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| X509_REQ_free(p10cr); |
| EXECUTE_TEST(execute_certreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_p10cr_null(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->bodytype = OSSL_CMP_PKIBODY_P10CR; |
| fixture->err_code = CMP_R_ERROR_CREATING_CERTREQ; |
| fixture->expected = 0; |
| if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_kur(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->bodytype = OSSL_CMP_PKIBODY_KUR; |
| fixture->err_code = -1; |
| fixture->expected = 1; |
| if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey)) |
| || !TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_kur_without_oldcert(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->bodytype = OSSL_CMP_PKIBODY_KUR; |
| fixture->err_code = -1; |
| fixture->expected = 0; |
| if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_certconf(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->fail_info = 0; |
| fixture->expected = 1; |
| if (!TEST_true(ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, |
| X509_dup(cert)))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certconf_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_certconf_badAlg(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_badAlg; |
| fixture->expected = 1; |
| if (!TEST_true(ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, |
| X509_dup(cert)))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certconf_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_certconf_fail_info_max(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_MAX; |
| fixture->expected = 1; |
| if (!TEST_true(ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, |
| X509_dup(cert)))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_certconf_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_error_msg(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->si = OSSL_CMP_STATUSINFO_new(OSSL_CMP_PKISTATUS_rejection, |
| OSSL_CMP_PKIFAILUREINFO_systemFailure, |
| NULL); |
| fixture->err_code = -1; |
| fixture->expected = 1; /* expected: message creation is successful */ |
| if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_errormsg_create_test, tear_down); |
| return result; |
| } |
| |
| |
| static int test_cmp_create_pollreq(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->expected = 1; |
| EXECUTE_TEST(execute_pollreq_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_rr(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->expected = 1; |
| if (!TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| EXECUTE_TEST(execute_rr_create_test, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_create_genm(void) |
| { |
| OSSL_CMP_ITAV *iv = NULL; |
| |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| fixture->expected = 1; |
| iv = OSSL_CMP_ITAV_create(OBJ_nid2obj(NID_id_it_implicitConfirm), NULL); |
| if (!TEST_ptr(iv) |
| || !TEST_true(OSSL_CMP_CTX_push0_genm_ITAV(fixture->cmp_ctx, iv))) { |
| OSSL_CMP_ITAV_free(iv); |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| |
| EXECUTE_TEST(execute_genm_create_test, tear_down); |
| return result; |
| } |
| |
| static int execute_certrep_create(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| OSSL_CMP_CTX *ctx = fixture->cmp_ctx; |
| OSSL_CMP_CERTREPMESSAGE *crepmsg = OSSL_CMP_CERTREPMESSAGE_new(); |
| OSSL_CMP_CERTRESPONSE *read_cresp, *cresp = OSSL_CMP_CERTRESPONSE_new(); |
| EVP_PKEY *privkey; |
| X509 *certfromresp = NULL; |
| int res = 0; |
| |
| if (crepmsg == NULL || cresp == NULL) |
| goto err; |
| if (!ASN1_INTEGER_set(cresp->certReqId, 99)) |
| goto err; |
| if ((cresp->certifiedKeyPair = OSSL_CMP_CERTIFIEDKEYPAIR_new()) == NULL) |
| goto err; |
| cresp->certifiedKeyPair->certOrEncCert->type = |
| OSSL_CMP_CERTORENCCERT_CERTIFICATE; |
| if ((cresp->certifiedKeyPair->certOrEncCert->value.certificate = |
| X509_dup(cert)) == NULL |
| || !sk_OSSL_CMP_CERTRESPONSE_push(crepmsg->response, cresp)) |
| goto err; |
| cresp = NULL; |
| read_cresp = ossl_cmp_certrepmessage_get0_certresponse(crepmsg, 99); |
| if (!TEST_ptr(read_cresp)) |
| goto err; |
| if (!TEST_ptr_null(ossl_cmp_certrepmessage_get0_certresponse(crepmsg, 88))) |
| goto err; |
| privkey = OSSL_CMP_CTX_get0_newPkey(ctx, 1); /* may be NULL */ |
| certfromresp = ossl_cmp_certresponse_get1_cert(read_cresp, ctx, privkey); |
| if (certfromresp == NULL || !TEST_int_eq(X509_cmp(cert, certfromresp), 0)) |
| goto err; |
| |
| res = 1; |
| err: |
| X509_free(certfromresp); |
| OSSL_CMP_CERTRESPONSE_free(cresp); |
| OSSL_CMP_CERTREPMESSAGE_free(crepmsg); |
| return res; |
| } |
| |
| static int test_cmp_create_certrep(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| EXECUTE_TEST(execute_certrep_create, tear_down); |
| return result; |
| } |
| |
| |
| static int execute_rp_create(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| OSSL_CMP_PKISI *si = OSSL_CMP_STATUSINFO_new(33, 44, "a text"); |
| X509_NAME *issuer = X509_NAME_new(); |
| ASN1_INTEGER *serial = ASN1_INTEGER_new(); |
| OSSL_CRMF_CERTID *cid = NULL; |
| OSSL_CMP_MSG *rpmsg = NULL; |
| int res = 0; |
| |
| if (si == NULL || issuer == NULL || serial == NULL) |
| goto err; |
| |
| if (!X509_NAME_add_entry_by_txt(issuer, "CN", MBSTRING_ASC, |
| (unsigned char *)"The Issuer", -1, -1, 0) |
| || !ASN1_INTEGER_set(serial, 99) |
| || (cid = OSSL_CRMF_CERTID_gen(issuer, serial)) == NULL |
| || (rpmsg = ossl_cmp_rp_new(fixture->cmp_ctx, si, cid, 1)) == NULL) |
| goto err; |
| |
| if (!TEST_ptr(ossl_cmp_revrepcontent_get_CertId(rpmsg->body->value.rp, 0))) |
| goto err; |
| |
| if (!TEST_ptr(ossl_cmp_revrepcontent_get_pkisi(rpmsg->body->value.rp, 0))) |
| goto err; |
| |
| res = 1; |
| err: |
| ASN1_INTEGER_free(serial); |
| X509_NAME_free(issuer); |
| OSSL_CRMF_CERTID_free(cid); |
| OSSL_CMP_PKISI_free(si); |
| OSSL_CMP_MSG_free(rpmsg); |
| return res; |
| } |
| |
| static int test_cmp_create_rp(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| EXECUTE_TEST(execute_rp_create, tear_down); |
| return result; |
| } |
| |
| static int execute_pollrep_create(CMP_MSG_TEST_FIXTURE *fixture) |
| { |
| OSSL_CMP_MSG *pollrep; |
| int res = 0; |
| |
| pollrep = ossl_cmp_pollRep_new(fixture->cmp_ctx, 77, 2000); |
| if (!TEST_ptr(pollrep)) |
| return 0; |
| if (!TEST_ptr(ossl_cmp_pollrepcontent_get0_pollrep(pollrep->body-> |
| value.pollRep, 77))) |
| goto err; |
| if (!TEST_ptr_null(ossl_cmp_pollrepcontent_get0_pollrep(pollrep->body-> |
| value.pollRep, 88))) |
| goto err; |
| |
| res = 1; |
| err: |
| OSSL_CMP_MSG_free(pollrep); |
| return res; |
| } |
| |
| static int test_cmp_create_pollrep(void) |
| { |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| EXECUTE_TEST(execute_pollrep_create, tear_down); |
| return result; |
| } |
| |
| static int test_cmp_pkimessage_create(int bodytype) |
| { |
| X509_REQ *p10cr = NULL; |
| |
| SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up); |
| |
| switch (fixture->bodytype = bodytype) { |
| case OSSL_CMP_PKIBODY_P10CR: |
| fixture->expected = 1; |
| p10cr = load_csr_der(pkcs10_f, libctx); |
| if (!TEST_true(OSSL_CMP_CTX_set1_p10CSR(fixture->cmp_ctx, p10cr))) { |
| tear_down(fixture); |
| fixture = NULL; |
| } |
| X509_REQ_free(p10cr); |
| break; |
| case OSSL_CMP_PKIBODY_IR: |
| case OSSL_CMP_PKIBODY_IP: |
| case OSSL_CMP_PKIBODY_CR: |
| case OSSL_CMP_PKIBODY_CP: |
| case OSSL_CMP_PKIBODY_KUR: |
| case OSSL_CMP_PKIBODY_KUP: |
| case OSSL_CMP_PKIBODY_RR: |
| case OSSL_CMP_PKIBODY_RP: |
| case OSSL_CMP_PKIBODY_PKICONF: |
| case OSSL_CMP_PKIBODY_GENM: |
| case OSSL_CMP_PKIBODY_GENP: |
| case OSSL_CMP_PKIBODY_ERROR: |
| case OSSL_CMP_PKIBODY_CERTCONF: |
| case OSSL_CMP_PKIBODY_POLLREQ: |
| case OSSL_CMP_PKIBODY_POLLREP: |
| fixture->expected = 1; |
| break; |
| default: |
| fixture->expected = 0; |
| break; |
| } |
| |
| EXECUTE_TEST(execute_pkimessage_create_test, tear_down); |
| return result; |
| } |
| |
| void cleanup_tests(void) |
| { |
| EVP_PKEY_free(newkey); |
| X509_free(cert); |
| OSSL_LIB_CTX_free(libctx); |
| } |
| |
| #define USAGE "new.key server.crt pkcs10.der module_name [module_conf_file]\n" |
| OPT_TEST_DECLARE_USAGE(USAGE) |
| |
| int setup_tests(void) |
| { |
| if (!test_skip_common_options()) { |
| TEST_error("Error parsing test options\n"); |
| return 0; |
| } |
| |
| if (!TEST_ptr(newkey_f = test_get_argument(0)) |
| || !TEST_ptr(server_cert_f = test_get_argument(1)) |
| || !TEST_ptr(pkcs10_f = test_get_argument(2))) { |
| TEST_error("usage: cmp_msg_test %s", USAGE); |
| return 0; |
| } |
| |
| if (!test_arg_libctx(&libctx, &default_null_provider, &provider, 3, USAGE)) |
| return 0; |
| |
| if (!TEST_ptr(newkey = load_pkey_pem(newkey_f, libctx)) |
| || !TEST_ptr(cert = load_cert_pem(server_cert_f, libctx)) |
| || !TEST_int_eq(1, RAND_bytes_ex(libctx, ref, sizeof(ref), 0))) { |
| cleanup_tests(); |
| return 0; |
| } |
| |
| /* Message creation tests */ |
| ADD_TEST(test_cmp_create_certreq_with_invalid_bodytype); |
| ADD_TEST(test_cmp_create_ir_protection_fails); |
| ADD_TEST(test_cmp_create_ir_protection_set); |
| ADD_TEST(test_cmp_create_error_msg); |
| ADD_TEST(test_cmp_create_certconf); |
| ADD_TEST(test_cmp_create_certconf_badAlg); |
| ADD_TEST(test_cmp_create_certconf_fail_info_max); |
| ADD_TEST(test_cmp_create_kur); |
| ADD_TEST(test_cmp_create_kur_without_oldcert); |
| ADD_TEST(test_cmp_create_cr); |
| ADD_TEST(test_cmp_create_cr_without_key); |
| ADD_TEST(test_cmp_create_p10cr); |
| ADD_TEST(test_cmp_create_p10cr_null); |
| ADD_TEST(test_cmp_create_pollreq); |
| ADD_TEST(test_cmp_create_rr); |
| ADD_TEST(test_cmp_create_rp); |
| ADD_TEST(test_cmp_create_genm); |
| ADD_TEST(test_cmp_create_certrep); |
| ADD_TEST(test_cmp_create_pollrep); |
| ADD_ALL_TESTS_NOSUBTEST(test_cmp_pkimessage_create, |
| OSSL_CMP_PKIBODY_POLLREP + 1); |
| return 1; |
| } |