| /* | 
 |  * Copyright 2016-2017 The OpenSSL Project Authors. All Rights Reserved. | 
 |  * | 
 |  * Licensed under the OpenSSL license (the "License").  You may not use | 
 |  * this file except in compliance with the License.  You can obtain a copy | 
 |  * in the file LICENSE in the source distribution or at | 
 |  * https://www.openssl.org/source/license.html | 
 |  */ | 
 |  | 
 | /* Regression tests for ASN.1 parsing bugs. */ | 
 |  | 
 | #include <stdio.h> | 
 | #include <string.h> | 
 |  | 
 | #include "testutil.h" | 
 |  | 
 | #include <openssl/asn1.h> | 
 | #include <openssl/asn1t.h> | 
 | #include <openssl/bio.h> | 
 | #include <openssl/err.h> | 
 | #include <openssl/x509.h> | 
 | #include <openssl/x509v3.h> | 
 | #include "internal/nelem.h" | 
 |  | 
 | static const ASN1_ITEM *item_type; | 
 | static const char *test_file; | 
 |  | 
 | typedef enum { | 
 |     ASN1_UNKNOWN, | 
 |     ASN1_OK, | 
 |     ASN1_BIO, | 
 |     ASN1_DECODE, | 
 |     ASN1_ENCODE, | 
 |     ASN1_COMPARE | 
 | } expected_error_t; | 
 |  | 
 | typedef struct { | 
 |     const char *str; | 
 |     expected_error_t code; | 
 | } error_enum; | 
 |  | 
 | static expected_error_t expected_error = ASN1_UNKNOWN; | 
 |  | 
 | static int test_bad_asn1(void) | 
 | { | 
 |     BIO *bio = NULL; | 
 |     ASN1_VALUE *value = NULL; | 
 |     int ret = 0; | 
 |     unsigned char buf[2048]; | 
 |     const unsigned char *buf_ptr = buf; | 
 |     unsigned char *der = NULL; | 
 |     int derlen; | 
 |     int len; | 
 |  | 
 |     bio = BIO_new_file(test_file, "r"); | 
 |     if (!TEST_ptr(bio)) | 
 |         return 0; | 
 |  | 
 |     if (expected_error == ASN1_BIO) { | 
 |         if (TEST_ptr_null(ASN1_item_d2i_bio(item_type, bio, NULL))) | 
 |             ret = 1; | 
 |         goto err; | 
 |     } | 
 |  | 
 |     /* | 
 |      * Unless we are testing it we don't use ASN1_item_d2i_bio because it | 
 |      * performs sanity checks on the input and can reject it before the | 
 |      * decoder is called. | 
 |      */ | 
 |     len = BIO_read(bio, buf, sizeof(buf)); | 
 |     if (!TEST_int_ge(len, 0)) | 
 |         goto err; | 
 |  | 
 |     value = ASN1_item_d2i(NULL, &buf_ptr, len, item_type); | 
 |     if (value == NULL) { | 
 |         if (TEST_int_eq(expected_error, ASN1_DECODE)) | 
 |             ret = 1; | 
 |         goto err; | 
 |     } | 
 |  | 
 |     derlen = ASN1_item_i2d(value, &der, item_type); | 
 |  | 
 |     if (der == NULL || derlen < 0) { | 
 |         if (TEST_int_eq(expected_error, ASN1_ENCODE)) | 
 |             ret = 1; | 
 |         goto err; | 
 |     } | 
 |  | 
 |     if (derlen != len || memcmp(der, buf, derlen) != 0) { | 
 |         if (TEST_int_eq(expected_error, ASN1_COMPARE)) | 
 |             ret = 1; | 
 |         goto err; | 
 |     } | 
 |  | 
 |     if (TEST_int_eq(expected_error, ASN1_OK)) | 
 |         ret = 1; | 
 |  | 
 |  err: | 
 |     /* Don't indicate success for memory allocation errors */ | 
 |     if (ret == 1 | 
 |         && !TEST_false(ERR_GET_REASON(ERR_peek_error()) == ERR_R_MALLOC_FAILURE)) | 
 |         ret = 0; | 
 |     BIO_free(bio); | 
 |     OPENSSL_free(der); | 
 |     ASN1_item_free(value, item_type); | 
 |     return ret; | 
 | } | 
 |  | 
 | /* | 
 |  * Usage: d2i_test <name> <type> <file>, e.g. | 
 |  * d2i_test generalname bad_generalname.der | 
 |  */ | 
 | int setup_tests(void) | 
 | { | 
 |     const char *test_type_name; | 
 |     const char *expected_error_string; | 
 |  | 
 |     size_t i; | 
 |  | 
 |     static error_enum expected_errors[] = { | 
 |         {"OK", ASN1_OK}, | 
 |         {"BIO", ASN1_BIO}, | 
 |         {"decode", ASN1_DECODE}, | 
 |         {"encode", ASN1_ENCODE}, | 
 |         {"compare", ASN1_COMPARE} | 
 |     }; | 
 |  | 
 |     if (!TEST_ptr(test_type_name = test_get_argument(0)) | 
 |             || !TEST_ptr(expected_error_string = test_get_argument(1)) | 
 |             || !TEST_ptr(test_file = test_get_argument(2))) { | 
 |         TEST_note("Usage: d2i_test item_name expected_error file.der"); | 
 |         return 0; | 
 |     } | 
 |  | 
 |     item_type = ASN1_ITEM_lookup(test_type_name); | 
 |  | 
 |     if (item_type == NULL) { | 
 |         TEST_error("Unknown type %s", test_type_name); | 
 |         TEST_note("Supported types:"); | 
 |         for (i = 0;; i++) { | 
 |             const ASN1_ITEM *it = ASN1_ITEM_get(i); | 
 |  | 
 |             if (it == NULL) | 
 |                 break; | 
 |             TEST_note("\t%s", it->sname); | 
 |         } | 
 |         return 0; | 
 |     } | 
 |  | 
 |     for (i = 0; i < OSSL_NELEM(expected_errors); i++) { | 
 |         if (strcmp(expected_errors[i].str, expected_error_string) == 0) { | 
 |             expected_error = expected_errors[i].code; | 
 |             break; | 
 |         } | 
 |     } | 
 |  | 
 |     if (expected_error == ASN1_UNKNOWN) { | 
 |         TEST_error("Unknown expected error %s\n", expected_error_string); | 
 |         return 0; | 
 |     } | 
 |  | 
 |     ADD_TEST(test_bad_asn1); | 
 |     return 1; | 
 | } |