Built motion from commit 6a09e18b.|2.6.11
[motion2.git] / legacy-libs / grpc / deps / grpc / third_party / boringssl / crypto / obj / obj_test.cc
diff --git a/legacy-libs/grpc/deps/grpc/third_party/boringssl/crypto/obj/obj_test.cc b/legacy-libs/grpc/deps/grpc/third_party/boringssl/crypto/obj/obj_test.cc
new file mode 100644 (file)
index 0000000..e623843
--- /dev/null
@@ -0,0 +1,199 @@
+/* Copyright (c) 2016, Google Inc.
+ *
+ * Permission to use, copy, modify, and/or distribute this software for any
+ * purpose with or without fee is hereby granted, provided that the above
+ * copyright notice and this permission notice appear in all copies.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
+ * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
+ * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
+ * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
+
+#include <gtest/gtest.h>
+
+#include <openssl/asn1.h>
+#include <openssl/bytestring.h>
+#include <openssl/crypto.h>
+#include <openssl/obj.h>
+
+#include "../internal.h"
+
+
+TEST(ObjTest, TestBasic) {
+  static const int kNID = NID_sha256WithRSAEncryption;
+  static const char kShortName[] = "RSA-SHA256";
+  static const char kLongName[] = "sha256WithRSAEncryption";
+  static const char kText[] = "1.2.840.113549.1.1.11";
+  static const uint8_t kDER[] = {
+      0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b,
+  };
+
+  CBS cbs;
+  CBS_init(&cbs, kDER, sizeof(kDER));
+  ASSERT_EQ(kNID, OBJ_cbs2nid(&cbs));
+  ASSERT_EQ(kNID, OBJ_sn2nid(kShortName));
+  ASSERT_EQ(kNID, OBJ_ln2nid(kLongName));
+  ASSERT_EQ(kNID, OBJ_txt2nid(kShortName));
+  ASSERT_EQ(kNID, OBJ_txt2nid(kLongName));
+  ASSERT_EQ(kNID, OBJ_txt2nid(kText));
+
+  ASSERT_STREQ(kShortName, OBJ_nid2sn(kNID));
+  ASSERT_STREQ(kLongName, OBJ_nid2ln(kNID));
+
+  ASSERT_EQ(NID_undef, OBJ_sn2nid("this is not an OID"));
+  ASSERT_EQ(NID_undef, OBJ_ln2nid("this is not an OID"));
+  ASSERT_EQ(NID_undef, OBJ_txt2nid("this is not an OID"));
+
+  CBS_init(&cbs, NULL, 0);
+  ASSERT_EQ(NID_undef, OBJ_cbs2nid(&cbs));
+
+  // 1.2.840.113554.4.1.72585.2 (https://davidben.net/oid).
+  static const uint8_t kUnknownDER[] = {
+      0x2a, 0x86, 0x48, 0x86, 0xf7, 0x12, 0x04, 0x01, 0x84, 0xb7, 0x09, 0x02,
+  };
+  CBS_init(&cbs, kUnknownDER, sizeof(kUnknownDER));
+  ASSERT_EQ(NID_undef, OBJ_cbs2nid(&cbs));
+}
+
+TEST(ObjTest, TestSignatureAlgorithms) {
+  int digest_nid, pkey_nid;
+  ASSERT_TRUE(OBJ_find_sigid_algs(NID_sha256WithRSAEncryption, &digest_nid,
+                                  &pkey_nid));
+  ASSERT_EQ(digest_nid, NID_sha256);
+  ASSERT_EQ(pkey_nid, NID_rsaEncryption);
+
+  ASSERT_FALSE(OBJ_find_sigid_algs(NID_sha256, &digest_nid, &pkey_nid));
+
+  int sign_nid;
+  ASSERT_TRUE(OBJ_find_sigid_by_algs(&sign_nid, NID_sha256, NID_rsaEncryption));
+  ASSERT_EQ(sign_nid, NID_sha256WithRSAEncryption);
+  ASSERT_FALSE(OBJ_find_sigid_by_algs(&sign_nid, NID_dsa, NID_rsaEncryption));
+}
+
+static bool ExpectObj2Txt(const uint8_t *der, size_t der_len,
+                          bool always_return_oid, const char *expected) {
+  ASN1_OBJECT obj;
+  OPENSSL_memset(&obj, 0, sizeof(obj));
+  obj.data = der;
+  obj.length = static_cast<int>(der_len);
+
+  int expected_len = static_cast<int>(strlen(expected));
+
+  int len = OBJ_obj2txt(nullptr, 0, &obj, always_return_oid);
+  if (len != expected_len) {
+    fprintf(stderr,
+            "OBJ_obj2txt of %s with out_len = 0 returned %d, wanted %d.\n",
+            expected, len, expected_len);
+    return false;
+  }
+
+  char short_buf[1];
+  OPENSSL_memset(short_buf, 0xff, sizeof(short_buf));
+  len = OBJ_obj2txt(short_buf, sizeof(short_buf), &obj, always_return_oid);
+  if (len != expected_len) {
+    fprintf(stderr,
+            "OBJ_obj2txt of %s with out_len = 1 returned %d, wanted %d.\n",
+            expected, len, expected_len);
+    return false;
+  }
+
+  if (OPENSSL_memchr(short_buf, '\0', sizeof(short_buf)) == nullptr) {
+    fprintf(stderr,
+            "OBJ_obj2txt of %s with out_len = 1 did not NUL-terminate the "
+            "output.\n",
+            expected);
+    return false;
+  }
+
+  char buf[256];
+  len = OBJ_obj2txt(buf, sizeof(buf), &obj, always_return_oid);
+  if (len != expected_len) {
+    fprintf(stderr,
+            "OBJ_obj2txt of %s with out_len = 256 returned %d, wanted %d.\n",
+            expected, len, expected_len);
+    return false;
+  }
+
+  if (strcmp(buf, expected) != 0) {
+    fprintf(stderr, "OBJ_obj2txt returned \"%s\"; wanted \"%s\".\n", buf,
+            expected);
+    return false;
+  }
+
+  return true;
+}
+
+TEST(ObjTest, TestObj2Txt) {
+  // kSHA256WithRSAEncryption is the DER representation of
+  // 1.2.840.113549.1.1.11, id-sha256WithRSAEncryption.
+  static const uint8_t kSHA256WithRSAEncryption[] = {
+      0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b,
+  };
+
+  // kBasicConstraints is the DER representation of 2.5.29.19,
+  // id-basicConstraints.
+  static const uint8_t kBasicConstraints[] = {
+      0x55, 0x1d, 0x13,
+  };
+
+  // kTestOID is the DER representation of 1.2.840.113554.4.1.72585.0,
+  // from https://davidben.net/oid.
+  static const uint8_t kTestOID[] = {
+      0x2a, 0x86, 0x48, 0x86, 0xf7, 0x12, 0x04, 0x01, 0x84, 0xb7, 0x09, 0x00,
+  };
+
+  ASSERT_TRUE(
+      ExpectObj2Txt(kSHA256WithRSAEncryption, sizeof(kSHA256WithRSAEncryption),
+                    true /* don't return name */, "1.2.840.113549.1.1.11"));
+  ASSERT_TRUE(
+      ExpectObj2Txt(kSHA256WithRSAEncryption, sizeof(kSHA256WithRSAEncryption),
+                    false /* return name */, "sha256WithRSAEncryption"));
+  ASSERT_TRUE(ExpectObj2Txt(kBasicConstraints, sizeof(kBasicConstraints),
+                            true /* don't return name */, "2.5.29.19"));
+  ASSERT_TRUE(ExpectObj2Txt(kBasicConstraints, sizeof(kBasicConstraints),
+                            false /* return name */,
+                            "X509v3 Basic Constraints"));
+  ASSERT_TRUE(ExpectObj2Txt(kTestOID, sizeof(kTestOID),
+                            true /* don't return name */,
+                            "1.2.840.113554.4.1.72585.0"));
+  ASSERT_TRUE(ExpectObj2Txt(kTestOID, sizeof(kTestOID), false /* return name */,
+                            "1.2.840.113554.4.1.72585.0"));
+  // Python depends on the empty OID successfully encoding as the empty
+  // string.
+  ASSERT_TRUE(ExpectObj2Txt(nullptr, 0, false /* return name */, ""));
+  ASSERT_TRUE(ExpectObj2Txt(nullptr, 0, true /* don't return name */, ""));
+
+  ASN1_OBJECT obj;
+  OPENSSL_memset(&obj, 0, sizeof(obj));
+
+  // kNonMinimalOID is kBasicConstraints with the final component non-minimally
+  // encoded.
+  static const uint8_t kNonMinimalOID[] = {
+      0x55, 0x1d, 0x80, 0x13,
+  };
+  obj.data = kNonMinimalOID;
+  obj.length = sizeof(kNonMinimalOID);
+  ASSERT_EQ(-1, OBJ_obj2txt(NULL, 0, &obj, 0));
+
+  // kOverflowOID is the DER representation of
+  // 1.2.840.113554.4.1.72585.18446744073709551616. (The final value is 2^64.)
+  static const uint8_t kOverflowOID[] = {
+      0x2a, 0x86, 0x48, 0x86, 0xf7, 0x12, 0x04, 0x01, 0x84, 0xb7, 0x09,
+      0x82, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x00,
+  };
+  obj.data = kOverflowOID;
+  obj.length = sizeof(kOverflowOID);
+  ASSERT_EQ(-1, OBJ_obj2txt(NULL, 0, &obj, 0));
+
+  // kInvalidOID is a mis-encoded version of kBasicConstraints with the final
+  // octet having the high bit set.
+  static const uint8_t kInvalidOID[] = {
+      0x55, 0x1d, 0x93,
+  };
+  obj.data = kInvalidOID;
+  obj.length = sizeof(kInvalidOID);
+  ASSERT_EQ(-1, OBJ_obj2txt(NULL, 0, &obj, 0));
+}