| #! /usr/bin/env perl |
| # Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved. |
| # |
| # Licensed under the Apache License 2.0 (the "License"). You may not use |
| # this file except in compliance with the License. You can obtain a copy |
| # in the file LICENSE in the source distribution or at |
| # https://www.openssl.org/source/license.html |
| |
| |
| use strict; |
| use warnings; |
| |
| use File::Spec; |
| use OpenSSL::Test qw/:DEFAULT srctop_file/; |
| use OpenSSL::Test::Utils; |
| |
| setup("test_d2i"); |
| |
| plan tests => 14; |
| |
| ok(run(test(["d2i_test", "X509", "decode", |
| srctop_file('test','d2i-tests','bad_cert.der')])), |
| "Running d2i_test bad_cert.der"); |
| |
| ok(run(test(["d2i_test", "GENERAL_NAME", "decode", |
| srctop_file('test','d2i-tests','bad_generalname.der')])), |
| "Running d2i_test bad_generalname.der"); |
| |
| ok(run(test(["d2i_test", "ASN1_ANY", "BIO", |
| srctop_file('test','d2i-tests','bad_bio.der')])), |
| "Running d2i_test bad_bio.der"); |
| # This test checks CVE-2016-2108. The data consists of an tag 258 and |
| # two zero content octets. This is parsed as an ASN1_ANY type. If the |
| # type is incorrectly interpreted as an ASN.1 INTEGER the two zero content |
| # octets will be reject as invalid padding and this test will fail. |
| # If the type is correctly interpreted it will by treated as an ASN1_STRING |
| # type and the content octets copied verbatim. |
| ok(run(test(["d2i_test", "ASN1_ANY", "OK", |
| srctop_file('test','d2i-tests','high_tag.der')])), |
| "Running d2i_test high_tag.der"); |
| |
| # Above test data but interpreted as ASN.1 INTEGER: this will be rejected |
| # because the tag is invalid. |
| ok(run(test(["d2i_test", "ASN1_INTEGER", "decode", |
| srctop_file('test','d2i-tests','high_tag.der')])), |
| "Running d2i_test high_tag.der INTEGER"); |
| |
| # Parse valid 0, 1 and -1 ASN.1 INTEGER as INTEGER or ANY. |
| |
| ok(run(test(["d2i_test", "ASN1_INTEGER", "OK", |
| srctop_file('test','d2i-tests','int0.der')])), |
| "Running d2i_test int0.der INTEGER"); |
| |
| ok(run(test(["d2i_test", "ASN1_INTEGER", "OK", |
| srctop_file('test','d2i-tests','int1.der')])), |
| "Running d2i_test int1.der INTEGER"); |
| |
| ok(run(test(["d2i_test", "ASN1_INTEGER", "OK", |
| srctop_file('test','d2i-tests','intminus1.der')])), |
| "Running d2i_test intminus1.der INTEGER"); |
| |
| ok(run(test(["d2i_test", "ASN1_ANY", "OK", |
| srctop_file('test','d2i-tests','int0.der')])), |
| "Running d2i_test int0.der ANY"); |
| |
| ok(run(test(["d2i_test", "ASN1_ANY", "OK", |
| srctop_file('test','d2i-tests','int1.der')])), |
| "Running d2i_test int1.der ANY"); |
| |
| ok(run(test(["d2i_test", "ASN1_ANY", "OK", |
| srctop_file('test','d2i-tests','intminus1.der')])), |
| "Running d2i_test intminus1.der ANY"); |
| |
| # Integers with illegal additional padding. |
| |
| ok(run(test(["d2i_test", "ASN1_INTEGER", "decode", |
| srctop_file('test','d2i-tests','bad-int-pad0.der')])), |
| "Running d2i_test bad-int-pad0.der INTEGER"); |
| |
| ok(run(test(["d2i_test", "ASN1_INTEGER", "decode", |
| srctop_file('test','d2i-tests','bad-int-padminus1.der')])), |
| "Running d2i_test bad-int-padminus1.der INTEGER"); |
| |
| SKIP: { |
| skip "No CMS support in this configuration", 1 if disabled("cms"); |
| |
| # Invalid CMS structure with decode error in CHOICE value. |
| # Test for CVE-2016-7053 |
| |
| ok(run(test(["d2i_test", "CMS_ContentInfo", "decode", |
| srctop_file('test','d2i-tests','bad-cms.der')])), |
| "Running d2i_test bad-cms.der CMS ContentInfo"); |
| } |