1/* 2 * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the Apache License 2.0 (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10#include <stdio.h> 11#include <stdlib.h> 12#include <string.h> 13 14#include "internal/nelem.h" 15#include <openssl/crypto.h> 16#include <openssl/bio.h> 17#include <openssl/bn.h> 18#include <openssl/rand.h> 19#include <openssl/err.h> 20#include <openssl/evp.h> 21#include <openssl/ec.h> 22#include "testutil.h" 23 24#if defined(OPENSSL_NO_DH) && defined(OPENSSL_NO_DSA) && defined(OPENSSL_NO_EC) 25# define OPENSSL_NO_KEYPARAMS 26#endif 27 28#ifndef OPENSSL_NO_KEYPARAMS 29 30struct pubkey { 31 int bad; 32 const unsigned char *key_bin; 33 size_t key_bin_len; 34}; 35 36# ifndef OPENSSL_NO_DH 37static const unsigned char dhparam_bin[] = { 380x30,0x82,0x01,0x08,0x02,0x82,0x01,0x01,0x00,0xc0,0xd1,0x2e,0x14,0x18,0xbd,0x03, 390xfd,0x39,0xe1,0x99,0xf4,0x93,0x06,0x2d,0x49,0xc6,0xb5,0xb9,0xf0,0x91,0xcb,0x2f, 400x48,0x54,0x79,0x7d,0xc4,0x65,0x11,0x55,0xf7,0x99,0xde,0x42,0x83,0x84,0xc0,0xf8, 410x88,0x89,0xa0,0xff,0xff,0x7d,0xe8,0xef,0x9e,0xbc,0xf7,0x1d,0x70,0x6d,0x3a,0x33, 420x49,0x28,0xa1,0xa3,0xe1,0x41,0xc4,0x8b,0x91,0xf9,0xf2,0xb6,0xe2,0x77,0x79,0x38, 430x7d,0x21,0xb3,0xdf,0x79,0x9c,0x5e,0x65,0x16,0x00,0x16,0x82,0xb2,0x36,0x46,0x21, 440xac,0xaf,0x86,0xc7,0xe3,0x10,0x44,0x48,0xfb,0xbd,0xad,0x4e,0x11,0x73,0x4c,0x25, 450xb0,0x8c,0x1c,0x1e,0x8e,0x58,0x50,0x5e,0x43,0x89,0xe4,0xd9,0x34,0xf8,0x3b,0xcc, 460x36,0x2c,0x1b,0xb3,0xb2,0x77,0x0c,0xa5,0x96,0xc1,0x8a,0x38,0xd4,0xe3,0x9c,0x2a, 470xde,0x49,0x46,0xc7,0xd4,0xa2,0x47,0xc9,0x0a,0xbd,0x84,0xd4,0x1c,0xbc,0xb6,0x19, 480x04,0x94,0x64,0xfa,0x8a,0x11,0x9c,0x5f,0x4a,0x4c,0x0f,0x58,0x81,0x02,0xbf,0xcf, 490x87,0x27,0x2b,0xae,0x8e,0xe2,0x61,0x7a,0xdb,0xba,0x23,0x39,0x25,0x44,0xdc,0x22, 500x75,0xc3,0x28,0xd9,0x12,0x33,0x84,0x32,0xd4,0x5d,0xd9,0x77,0xf8,0x04,0x90,0x38, 510x0a,0xec,0x84,0x93,0x43,0xce,0xe7,0x07,0x42,0x7d,0x2d,0xe0,0x21,0x3b,0x19,0x22, 520xa7,0x8f,0x50,0x31,0xda,0xd0,0x0d,0xd3,0x0b,0xdb,0xad,0xed,0x94,0x92,0xff,0x83, 530x06,0x7f,0x7f,0xd7,0x7b,0x42,0x5b,0xba,0x93,0x7a,0xeb,0x43,0x5f,0xce,0x59,0x26, 540xe8,0x76,0xdc,0xee,0xe2,0xbe,0x36,0x7a,0x83,0x02,0x01,0x02 55}; 56static const unsigned char dhkey_1[] = { 57 0x7a, 0x49, 0xcb, 0xc3, 0x25, 0x67, 0x7a, 0x61, 58 0xd0, 0x60, 0x81, 0x0f, 0xf6, 0xbd, 0x38, 0x82, 59 0xe7, 0x38, 0x8c, 0xe9, 0xd1, 0x04, 0x33, 0xbf, 60 0x8a, 0x03, 0x63, 0xb3, 0x05, 0x04, 0xb5, 0x1f, 61 0xba, 0x9f, 0x1a, 0x5f, 0x31, 0x3e, 0x96, 0x79, 62 0x88, 0x7d, 0x3f, 0x59, 0x6d, 0x3b, 0xf3, 0x2f, 63 0xf2, 0xa6, 0x43, 0x48, 0x64, 0x5a, 0x6a, 0x32, 64 0x1f, 0x24, 0x37, 0x62, 0x54, 0x3a, 0x7d, 0xab, 65 0x26, 0x77, 0x7c, 0xec, 0x57, 0x3c, 0xa4, 0xbd, 66 0x96, 0x9d, 0xaa, 0x3b, 0x0e, 0x9a, 0x55, 0x7e, 67 0x1d, 0xb4, 0x47, 0x5b, 0xea, 0x20, 0x3c, 0x6d, 68 0xbe, 0xd6, 0x70, 0x7d, 0xa8, 0x9e, 0x84, 0xb4, 69 0x03, 0x52, 0xf2, 0x08, 0x4c, 0x98, 0xd3, 0x4f, 70 0x58, 0xb3, 0xdf, 0xb4, 0xe6, 0xdc, 0x2c, 0x43, 71 0x55, 0xd1, 0xce, 0x2a, 0xb3, 0xfc, 0xe0, 0x29, 72 0x97, 0xd8, 0xd8, 0x62, 0xc6, 0x87, 0x0a, 0x1b, 73 0xfd, 0x72, 0x74, 0xe0, 0xa9, 0xfb, 0xfa, 0x91, 74 0xf2, 0xc1, 0x09, 0x93, 0xea, 0x63, 0xf6, 0x9a, 75 0x4b, 0xdf, 0x4e, 0xdf, 0x6b, 0xf9, 0xeb, 0xf6, 76 0x66, 0x3c, 0xfd, 0x6f, 0x68, 0xcb, 0xdb, 0x6e, 77 0x40, 0x65, 0xf7, 0xf2, 0x46, 0xe5, 0x0d, 0x9a, 78 0xd9, 0x6f, 0xcf, 0x28, 0x22, 0x8f, 0xca, 0x0b, 79 0x30, 0xa0, 0x9e, 0xa5, 0x13, 0xba, 0x72, 0x7f, 80 0x85, 0x3d, 0x02, 0x9c, 0x97, 0x8e, 0x6f, 0xea, 81 0x6d, 0x35, 0x4e, 0xd1, 0x78, 0x7d, 0x73, 0x60, 82 0x92, 0xa9, 0x12, 0xf4, 0x2a, 0xac, 0x17, 0x97, 83 0xf3, 0x7b, 0x79, 0x08, 0x69, 0xd1, 0x9e, 0xb5, 84 0xf8, 0x2a, 0x0a, 0x2b, 0x00, 0x7b, 0x16, 0x8d, 85 0x41, 0x82, 0x3a, 0x72, 0x58, 0x57, 0x80, 0x65, 86 0xae, 0x17, 0xbc, 0x3a, 0x5b, 0x7e, 0x5c, 0x2d, 87 0xae, 0xb2, 0xc2, 0x26, 0x20, 0x9a, 0xaa, 0x57, 88 0x4b, 0x7d, 0x43, 0x41, 0x96, 0x3f, 0xf0, 0x0d 89}; 90/* smaller but still valid key */ 91static const unsigned char dhkey_2[] = { 92 0x73, 0xb2, 0x22, 0x91, 0x27, 0xb9, 0x45, 0xb0, 93 0xfd, 0x17, 0x66, 0x79, 0x9b, 0x32, 0x71, 0x92, 94 0x97, 0x1d, 0x70, 0x02, 0x37, 0x70, 0x79, 0x63, 95 0xed, 0x11, 0x22, 0xe9, 0xe6, 0xf8, 0xeb, 0xd7, 96 0x90, 0x00, 0xe6, 0x5c, 0x47, 0x02, 0xfb, 0x13, 97 0xca, 0x29, 0x14, 0x1e, 0xf4, 0x61, 0x58, 0xf6, 98 0xaa, 0xbb, 0xcf, 0xa7, 0x82, 0x9a, 0x9e, 0x7c, 99 0x4a, 0x05, 0x42, 0xed, 0x55, 0xd8, 0x08, 0x37, 100 0x06, 0x49, 0x9b, 0xda, 0xb3, 0xb9, 0xc9, 0xc0, 101 0x56, 0x26, 0xda, 0x60, 0x1d, 0xbc, 0x06, 0x0b, 102 0xb0, 0x94, 0x4b, 0x4e, 0x95, 0xf9, 0xb4, 0x2f, 103 0x4e, 0xad, 0xf8, 0xab, 0x2d, 0x19, 0xa2, 0xe6, 104 0x6d, 0x11, 0xfd, 0x9b, 0x5a, 0x2a, 0xb0, 0x81, 105 0x42, 0x4d, 0x86, 0x76, 0xd5, 0x9e, 0xaf, 0xf9, 106 0x6f, 0x79, 0xab, 0x1d, 0xfe, 0xd8, 0xc8, 0xba, 107 0xb6, 0xce, 0x03, 0x61, 0x48, 0x53, 0xd8, 0x0b, 108 0x83, 0xf0, 0xb0, 0x46, 0xa0, 0xea, 0x46, 0x60, 109 0x7a, 0x39, 0x4e, 0x46, 0x6a, 0xbb, 0x07, 0x6c, 110 0x8c, 0x7d, 0xb7, 0x7d, 0x5b, 0xe5, 0x24, 0xa5, 111 0xab, 0x41, 0x8a, 0xc4, 0x63, 0xf9, 0xce, 0x20, 112 0x6f, 0x58, 0x4f, 0x0e, 0x42, 0x82, 0x9e, 0x17, 113 0x53, 0xa6, 0xd6, 0x42, 0x3e, 0x80, 0x66, 0x6f, 114 0x2a, 0x1c, 0x30, 0x08, 0x01, 0x99, 0x5a, 0x4f, 115 0x72, 0x16, 0xed, 0xb0, 0xd6, 0x8c, 0xf0, 0x7a, 116 0x33, 0x15, 0xc4, 0x95, 0x65, 0xba, 0x11, 0x37, 117 0xa0, 0xcc, 0xe7, 0x45, 0x65, 0x4f, 0x17, 0x0a, 118 0x2c, 0x62, 0xc0, 0x65, 0x3b, 0x65, 0x2a, 0x56, 119 0xf7, 0x29, 0x8a, 0x9b, 0x1b, 0xbb, 0x0c, 0x40, 120 0xcd, 0x66, 0x4b, 0x4f, 0x2f, 0xba, 0xdb, 0x59, 121 0x93, 0x6d, 0x34, 0xf3, 0x8d, 0xde, 0x68, 0x99, 122 0x78, 0xfc, 0xac, 0x95, 0xd9, 0xa3, 0x74, 0xe6, 123 0x24, 0x96, 0x98, 0x6f, 0x64, 0x71, 0x76 124}; 125/* 1 is not a valid key */ 126static const unsigned char dhkey_3[] = { 127 0x01 128}; 129# endif 130 131# ifndef OPENSSL_NO_DSA 132static const unsigned char dsaparam_bin[] = { 1330x30,0x82,0x02,0x28,0x02,0x82,0x01,0x01,0x00,0xf2,0x85,0x01,0xa5,0xb9,0x56,0x65, 1340x19,0xff,0x9a,0x7d,0xf9,0x90,0xd6,0xaa,0x73,0xac,0xf7,0x94,0xfa,0x8a,0x64,0x6d, 1350xa0,0x01,0x42,0xe5,0x45,0xfc,0x53,0x72,0xb0,0x7c,0xe6,0x3b,0xfb,0x09,0x33,0x41, 1360x27,0xbd,0x00,0xb5,0x18,0x87,0x62,0xa8,0x2b,0xfc,0xd0,0x52,0x4a,0x14,0x2d,0xaa, 1370x36,0xc6,0xf3,0xa9,0xe3,0x90,0x1b,0x74,0xdf,0x0a,0x6d,0x33,0xba,0xf4,0x32,0x6d, 1380xba,0x36,0x68,0x1d,0x83,0x36,0x50,0xc6,0x62,0xc0,0x40,0x67,0x0e,0xf6,0x22,0x00, 1390x62,0x1b,0x76,0x72,0x62,0x5f,0xa0,0xdf,0x38,0xb1,0x1d,0x26,0x70,0x9b,0x84,0x64, 1400xbb,0x16,0x15,0xc2,0x66,0xb9,0x97,0xd0,0x07,0xf1,0x4b,0x70,0x02,0x03,0xf1,0xd2, 1410x03,0xdb,0x78,0x8b,0xb4,0xda,0x6f,0x3c,0xe2,0x31,0xa8,0x1c,0x99,0xea,0x9c,0x75, 1420x28,0x96,0x82,0x16,0x77,0xac,0x79,0x32,0x61,0x87,0xec,0xb7,0xb4,0xc3,0xea,0x12, 1430x62,0x1f,0x08,0xb8,0x16,0xab,0xcc,0xef,0x28,0xdf,0x06,0x07,0xbe,0xb0,0xdc,0x78, 1440x83,0x8a,0x70,0x80,0x34,0xe6,0x91,0xe3,0xd3,0x92,0xd9,0xf4,0x56,0x53,0x52,0xb7, 1450x35,0xf6,0x2a,0xec,0x4b,0xcb,0xa2,0x3c,0xc3,0x0c,0x94,0xa7,0x4e,0x1c,0x42,0x9c, 1460x72,0x99,0x60,0x8c,0xfe,0xfb,0x60,0x57,0x75,0xf5,0x23,0x11,0x12,0xba,0x97,0xcd, 1470xad,0x5a,0x0b,0xa6,0x1f,0x6a,0x48,0x2e,0x8d,0xda,0x95,0xc6,0x0e,0x14,0xde,0xf7, 1480x22,0x55,0xa8,0x6b,0x25,0xdf,0xa2,0xab,0x33,0x65,0x56,0xfc,0x78,0x4f,0x62,0xdf, 1490x48,0xdd,0xce,0x8b,0xe1,0x76,0xf4,0xf6,0x7f,0x02,0x1d,0x00,0xac,0xb0,0xb8,0x92, 1500x3b,0x6b,0x61,0xcf,0x36,0x6d,0xf2,0x1e,0x5d,0xe0,0x7b,0xf5,0x73,0x48,0xa3,0x8b, 1510x86,0x9e,0x88,0xce,0x40,0xf8,0x27,0x6d,0x02,0x82,0x01,0x00,0x77,0x6b,0x89,0xd6, 1520x8f,0x3d,0xce,0x52,0x30,0x74,0xb2,0xa1,0x13,0x96,0xd5,0x92,0xf2,0xf1,0x6b,0x10, 1530x31,0x0b,0xf3,0x69,0xaa,0xbf,0x4b,0x6c,0xcb,0x3f,0x6d,0x58,0x76,0x44,0x09,0xf9, 1540x28,0xef,0xa0,0xe4,0x55,0x77,0x57,0xe0,0xfb,0xcc,0x9a,0x6a,0x2c,0x90,0xec,0x72, 1550x24,0x0b,0x43,0xc5,0xbc,0x31,0xed,0x1a,0x46,0x2c,0x76,0x42,0x9e,0xc0,0x82,0xfc, 1560xff,0xf9,0x7e,0xe2,0x1f,0x39,0xf3,0x3b,0xdb,0x27,0x36,0xe7,0xf5,0x3b,0xc2,0x23, 1570xb6,0xd0,0xcf,0x5b,0x85,0x2e,0x1b,0x00,0x5b,0x31,0xaa,0x72,0x8f,0x37,0xee,0x56, 1580x71,0xc4,0xfd,0x3c,0x8d,0xfa,0x5b,0xab,0xb1,0xa9,0x52,0x76,0xa0,0xe4,0xe3,0x78, 1590x83,0x64,0x5d,0xd7,0x6c,0xec,0x9b,0x40,0x65,0xe2,0x0a,0x11,0x19,0x60,0xdd,0xce, 1600x29,0x9f,0xc6,0x1d,0x0a,0xab,0x8e,0x59,0x25,0xc5,0x0b,0x9c,0x02,0x45,0xba,0x99, 1610x74,0x22,0x1d,0xc1,0x57,0xca,0x50,0x8c,0x5e,0xdf,0xd8,0x5d,0x43,0xae,0x06,0x28, 1620x29,0x82,0xf6,0x5a,0xa9,0x51,0xa2,0x04,0x1d,0xbf,0x88,0x15,0x98,0xce,0x8a,0xb4, 1630x3b,0xe5,0x30,0x29,0xce,0x0c,0x9b,0xf8,0xdb,0xbf,0x06,0x9f,0xd0,0x59,0x18,0xd4, 1640x0b,0x94,0xbf,0xe9,0x67,0x6b,0x9e,0xf0,0x72,0xc6,0xbf,0x79,0x8f,0x1e,0xa3,0x95, 1650x24,0xe3,0xcb,0x58,0xb5,0x67,0xd3,0xae,0x79,0xb0,0x28,0x9c,0x9a,0xd0,0xa4,0xe7, 1660x22,0x15,0xc1,0x8b,0x04,0xb9,0x8a,0xa8,0xb7,0x1b,0x62,0x44,0xc6,0xef,0x4b,0x74, 1670xd0,0xfd,0xa9,0xb4,0x4e,0xdd,0x7d,0x38,0x60,0xd1,0x40,0xcd 168}; 169# endif 170 171# ifndef OPENSSL_NO_EC 172static const unsigned char ecparam_bin[] = { 1730x06,0x08,0x2a,0x86,0x48,0xce,0x3d,0x03,0x01,0x07 174}; 175static const unsigned char eckey_1[] = { 176 0x04, 0xc8, 0x65, 0x45, 0x63, 0x73, 0xe5, 0x0a, 177 0x61, 0x1d, 0xcf, 0x60, 0x76, 0x2c, 0xe7, 0x36, 178 0x0b, 0x76, 0xc2, 0x92, 0xfc, 0xa4, 0x56, 0xee, 179 0xc2, 0x62, 0x05, 0x00, 0x80, 0xe4, 0x4f, 0x07, 180 0x3b, 0xf4, 0x59, 0xb8, 0xc3, 0xb3, 0x1f, 0x77, 181 0x36, 0x16, 0x4c, 0x72, 0x2a, 0xc0, 0x89, 0x89, 182 0xd6, 0x16, 0x14, 0xee, 0x2f, 0x5a, 0xde, 0x9e, 183 0x83, 0xc5, 0x78, 0xd0, 0x0b, 0x69, 0xb4, 0xb9, 184 0xf1 185}; 186/* a modified key */ 187static const unsigned char eckey_2[] = { 188 0x04, 0xc8, 0x65, 0x45, 0x63, 0x73, 0xe5, 0x0a, 189 0x61, 0x1d, 0xcf, 0x60, 0x76, 0x2c, 0xe7, 0x36, 190 0x0b, 0x77, 0xc2, 0x92, 0xfc, 0xa4, 0x56, 0xee, 191 0xc2, 0x62, 0x05, 0x00, 0x80, 0xe4, 0x4f, 0x07, 192 0x3b, 0xf4, 0x59, 0xb8, 0xc3, 0xb3, 0x1f, 0x77, 193 0x36, 0x16, 0x4c, 0x72, 0x2a, 0xc0, 0x89, 0x89, 194 0xd6, 0x16, 0x14, 0xee, 0x2f, 0x5a, 0xde, 0x9e, 195 0x83, 0xc5, 0x78, 0xd0, 0x0b, 0x69, 0xb4, 0xb9, 196 0xf1 197}; 198/* an added byte */ 199static const unsigned char eckey_3[] = { 200 0x04, 0xc8, 0x65, 0x45, 0x63, 0x73, 0xe5, 0x0a, 201 0x61, 0x1d, 0xcf, 0x60, 0x76, 0x2c, 0xe7, 0x36, 202 0x0b, 0x76, 0xc2, 0x92, 0xfc, 0xa4, 0x56, 0xee, 203 0xc2, 0x62, 0x05, 0x00, 0x80, 0xe4, 0x4f, 0x07, 204 0x3b, 0xf4, 0x59, 0xb8, 0xc3, 0xb3, 0x1f, 0x77, 205 0x36, 0x16, 0x4c, 0x72, 0x2a, 0xc0, 0x89, 0x89, 206 0xd6, 0x16, 0x14, 0xee, 0x2f, 0x5a, 0xde, 0x9e, 207 0x83, 0xc5, 0x78, 0xd0, 0x0b, 0x69, 0xb4, 0xb9, 208 0xf1, 0xaa 209}; 210# endif 211 212#define NUM_KEYS 10 213 214static const struct { 215 int type; 216 const unsigned char *param_bin; 217 size_t param_bin_len; 218 struct pubkey keys[NUM_KEYS]; 219} pkey_params [] = { 220# ifndef OPENSSL_NO_DH 221 { EVP_PKEY_DH, dhparam_bin, sizeof(dhparam_bin), 222 { { 0, dhkey_1, sizeof(dhkey_1) }, 223 { 0, dhkey_2, sizeof(dhkey_2) }, 224 { 1, dhkey_3, sizeof(dhkey_3) }, 225 { 1, dhkey_1, 0 }, 226 { 1, dhparam_bin, sizeof(dhparam_bin) } 227 } 228 }, 229# endif 230# ifndef OPENSSL_NO_DSA 231 { EVP_PKEY_DSA, dsaparam_bin, sizeof(dsaparam_bin) }, 232# endif 233# ifndef OPENSSL_NO_EC 234 { EVP_PKEY_EC, ecparam_bin, sizeof(ecparam_bin), 235 { { 0, eckey_1, sizeof(eckey_1) }, 236 { 1, eckey_2, sizeof(eckey_2) }, 237 { 1, eckey_3, sizeof(eckey_3) }, 238 { 1, eckey_1, 0 }, 239 { 1, eckey_1, sizeof(eckey_1) - 1 } 240 } 241 } 242# endif 243}; 244 245static int params_bio_test(int id) 246{ 247 int ret, out_len; 248 BIO *in = NULL, *out = NULL; 249 EVP_PKEY *in_key = NULL, *out_key = NULL; 250 unsigned char *out_bin; 251 int type = pkey_params[id].type; 252 253 ret = TEST_ptr(in = BIO_new_mem_buf(pkey_params[id].param_bin, 254 (int)pkey_params[id].param_bin_len)) 255 /* Load in pkey params from binary */ 256 && TEST_ptr(d2i_KeyParams_bio(type, &in_key, in)) 257 && TEST_ptr(out = BIO_new(BIO_s_mem())) 258 /* Save pkey params to binary */ 259 && TEST_int_gt(i2d_KeyParams_bio(out, in_key), 0) 260 /* test the output binary is the expected value */ 261 && TEST_int_gt(out_len = BIO_get_mem_data(out, &out_bin), 0) 262 && TEST_mem_eq(pkey_params[id].param_bin, 263 (int)pkey_params[id].param_bin_len, 264 out_bin, out_len); 265 266 BIO_free(in); 267 BIO_free(out); 268 EVP_PKEY_free(in_key); 269 EVP_PKEY_free(out_key); 270 return ret; 271} 272 273static int set_enc_pubkey_test(int id) 274{ 275 int ret, i; 276 BIO *in = NULL; 277 EVP_PKEY *in_key = NULL; 278 int type = pkey_params[id].type; 279 const struct pubkey *keys = pkey_params[id].keys; 280 281 if (keys[0].key_bin == NULL) 282 return TEST_skip("Not applicable test"); 283 284 ret = TEST_ptr(in = BIO_new_mem_buf(pkey_params[id].param_bin, 285 (int)pkey_params[id].param_bin_len)) 286 /* Load in pkey params from binary */ 287 && TEST_ptr(d2i_KeyParams_bio(type, &in_key, in)); 288 289 for (i = 0; ret && i < NUM_KEYS && keys[i].key_bin != NULL; i++) { 290 if (keys[i].bad) { 291 ERR_set_mark(); 292 ret = ret 293 && TEST_int_le(EVP_PKEY_set1_encoded_public_key(in_key, 294 keys[i].key_bin, 295 keys[i].key_bin_len), 296 0); 297 ERR_pop_to_mark(); 298 } else { 299 ret = ret 300 && TEST_int_gt(EVP_PKEY_set1_encoded_public_key(in_key, 301 keys[i].key_bin, 302 keys[i].key_bin_len), 303 0); 304 } 305 if (!ret) 306 TEST_info("Test key index #%d", i); 307 } 308 309 BIO_free(in); 310 EVP_PKEY_free(in_key); 311 return ret; 312} 313#endif 314 315int setup_tests(void) 316{ 317#ifdef OPENSSL_NO_KEYPARAMS 318 TEST_note("No DH/DSA/EC support"); 319#else 320 ADD_ALL_TESTS(params_bio_test, OSSL_NELEM(pkey_params)); 321 ADD_ALL_TESTS(set_enc_pubkey_test, OSSL_NELEM(pkey_params)); 322#endif 323 return 1; 324} 325