• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

randombit / botan / 23151525988

16 Mar 2026 03:26PM UTC coverage: 89.774% (+0.02%) from 89.759%
23151525988

Pull #5451

github

web-flow
Merge c5a4f30ee into 4f6f5bbaf
Pull Request #5451: MLDSA-composite

105271 of 117262 relevant lines covered (89.77%)

12140285.62 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

98.54
/src/tests/test_ffi.cpp
1
/*
2
* (C) 2015 Jack Lloyd
3
* (C) 2016 René Korthaus
4
* (C) 2018 Ribose Inc, Krzysztof Kwiatkowski
5
* (C) 2018 Ribose Inc
6
*
7
* Botan is released under the Simplified BSD License (see license.txt)
8
*/
9

10
#include "tests.h"
11
#include <botan/version.h>
12
#include <string_view>
13

14
#if defined(BOTAN_HAS_FFI)
15
   #include <botan/ber_dec.h>
16
   #include <botan/ec_group.h>
17
   #include <botan/ffi.h>
18
   #include <botan/hex.h>
19
   #include <botan/mem_ops.h>
20
   #include <botan/internal/calendar.h>
21
   #include <botan/internal/concat_util.h>
22
   #include <botan/internal/fmt.h>
23
   #include <botan/internal/loadstor.h>
24
   #include <botan/internal/stl_util.h>
25
   #include <botan/internal/target_info.h>
26
   #include <set>
27
#endif
28

29
#if defined(BOTAN_HAS_X509)
30
   #include <botan/pkix_enums.h>
31
   #include <botan/pkix_types.h>
32
#endif
33

34
#if defined(BOTAN_HAS_TPM2)
35
   #include <tss2/tss2_esys.h>
36
   #include <tss2/tss2_tctildr.h>
37
#endif
38

39
namespace Botan_Tests {
40

41
namespace {
42

43
#if defined(BOTAN_HAS_FFI)
44

45
// NOLINTBEGIN(*-macro-usage)
46

47
   #define _TEST_FFI_STR_HELPER(x) #x
48

49
   #define _TEST_FFI_STR(x) _TEST_FFI_STR_HELPER(x)
50

51
   #define _TEST_FFI_SOURCE_LOCATION(func, file, line) (func " invoked at " file ":" _TEST_FFI_STR(line))
52

53
   #define TEST_FFI_OK(func, args) result.test_rc_ok(_TEST_FFI_SOURCE_LOCATION(#func, __FILE__, __LINE__), func args)
54

55
   #define TEST_FFI_INIT(func, args) \
56
      result.test_rc_init(_TEST_FFI_SOURCE_LOCATION(#func, __FILE__, __LINE__), func args)
57

58
   #define TEST_FFI_FAIL(msg, func, args) \
59
      result.test_rc_fail(_TEST_FFI_SOURCE_LOCATION(#func, __FILE__, __LINE__), msg, func args)
60

61
   #define TEST_FFI_RC(rc, func, args) \
62
      result.test_rc(_TEST_FFI_SOURCE_LOCATION(#func, __FILE__, __LINE__), func args, rc)
63

64
   #define REQUIRE_FFI_OK(func, args)                           \
65
      if(!TEST_FFI_OK(func, args)) {                            \
66
         result.test_note("Exiting test early due to failure"); \
67
         return;                                                \
68
      }
69

70
// NOLINTEND(*-macro-usage)
71

72
/**
73
 * Helper class for testing "view"-style API functions that take a callback
74
 * that gets passed a variable-length buffer of bytes.
75
 *
76
 * Example:
77
 *   botan_privkey_t priv;
78
 *   ViewBytesSink sink;
79
 *   botan_privkey_view_raw(priv, sink.delegate(), sink.callback());
80
 *   std::cout << hex_encode(sink.get()) << std::endl;
81
 */
82
class ViewBytesSink final {
×
83
   public:
84
      void* delegate() { return this; }
85

86
      botan_view_bin_fn callback() { return &write_fn; }
263✔
87

88
      std::span<const uint8_t> get() const { return m_buf; }
17✔
89

90
      const uint8_t* data() const { return m_buf.data(); }
7✔
91

92
      size_t size() const { return m_buf.size(); }
7✔
93

94
   private:
95
      static int write_fn(void* ctx, const uint8_t buf[], size_t len) {
255✔
96
         if(ctx == nullptr || buf == nullptr) {
255✔
97
            return BOTAN_FFI_ERROR_NULL_POINTER;
98
         }
99

100
         auto* sink = static_cast<ViewBytesSink*>(ctx);
255✔
101
         sink->m_buf.assign(buf, buf + len);
255✔
102

103
         return BOTAN_FFI_SUCCESS;
255✔
104
      }
105

106
   private:
107
      std::vector<uint8_t> m_buf;
108
};
109

110
/**
111
 * See ViewBytesSink for how to use this. Works for `botan_view_str_fn` instead.
112
*/
113
class ViewStringSink final {
28✔
114
   public:
115
      void* delegate() { return this; }
116

117
      botan_view_str_fn callback() { return &write_fn; }
73✔
118

119
      const std::string& get() { return m_str; }
62✔
120

121
   private:
122
      static int write_fn(void* ctx, const char* str, size_t len) {
72✔
123
         if(ctx == nullptr || str == nullptr) {
72✔
124
            return BOTAN_FFI_ERROR_NULL_POINTER;
125
         }
126

127
         auto* sink = static_cast<ViewStringSink*>(ctx);
72✔
128
         // discard the null terminator
129
         sink->m_str = std::string(str, len - 1);
72✔
130

131
         return BOTAN_FFI_SUCCESS;
72✔
132
      }
133

134
   private:
135
      std::string m_str;
136
};
137

138
// NOLINTBEGIN(*-init-variables)
139

140
class FFI_Test : public Test {
58✔
141
   public:
142
      std::vector<Test::Result> run() override {
58✔
143
         Test::Result result(this->name());
58✔
144

145
         if(!skip_this_test()) {
58✔
146
            botan_rng_t rng;
58✔
147
            if(botan_rng_init(&rng, "system") != 0) {
58✔
148
               result.test_failure("Failed to init RNG");
×
149
               return {result};
×
150
            }
151

152
            result.start_timer();
58✔
153
            ffi_test(result, rng);
58✔
154
            result.end_timer();
58✔
155

156
            botan_rng_destroy(rng);
58✔
157
         } else {
158
            result.test_note("FFI test asked to be skipped");
×
159
         }
160

161
         return {result};
116✔
162
      }
116✔
163

164
   private:
165
      virtual std::string name() const = 0;
166
      virtual void ffi_test(Test::Result& result, botan_rng_t rng) = 0;
167

168
      virtual bool skip_this_test() const { return false; }
56✔
169
};
170

171
void ffi_test_pubkey_export(Test::Result& result, botan_pubkey_t pub, botan_privkey_t priv, botan_rng_t rng) {
12✔
172
   // export public key
173
   size_t pubkey_len = 0;
12✔
174
   TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
12✔
175
               botan_pubkey_export,
176
               (pub, nullptr, &pubkey_len, BOTAN_PRIVKEY_EXPORT_FLAG_DER));
177

178
   std::vector<uint8_t> pubkey(pubkey_len);
12✔
179
   TEST_FFI_OK(botan_pubkey_export, (pub, pubkey.data(), &pubkey_len, BOTAN_PRIVKEY_EXPORT_FLAG_DER));
12✔
180

181
   pubkey_len = 0;
12✔
182
   TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
12✔
183
               botan_pubkey_export,
184
               (pub, nullptr, &pubkey_len, BOTAN_PRIVKEY_EXPORT_FLAG_PEM));
185

186
   pubkey.resize(pubkey_len);
12✔
187
   TEST_FFI_OK(botan_pubkey_export, (pub, pubkey.data(), &pubkey_len, BOTAN_PRIVKEY_EXPORT_FLAG_PEM));
12✔
188

189
   // reimport exported public key
190
   botan_pubkey_t pub_copy;
12✔
191
   TEST_FFI_OK(botan_pubkey_load, (&pub_copy, pubkey.data(), pubkey_len));
12✔
192
   TEST_FFI_OK(botan_pubkey_check_key, (pub_copy, rng, 0));
12✔
193
   TEST_FFI_OK(botan_pubkey_destroy, (pub_copy));
12✔
194

195
   // export private key
196
   std::vector<uint8_t> privkey;
12✔
197
   size_t privkey_len = 0;
12✔
198

199
   // call with nullptr to query the length
200
   TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
12✔
201
               botan_privkey_export,
202
               (priv, nullptr, &privkey_len, BOTAN_PRIVKEY_EXPORT_FLAG_DER));
203

204
   privkey.resize(privkey_len);
12✔
205
   privkey_len = privkey.size();  // set buffer size
12✔
206

207
   TEST_FFI_OK(botan_privkey_export, (priv, privkey.data(), &privkey_len, BOTAN_PRIVKEY_EXPORT_FLAG_DER));
12✔
208

209
   privkey.resize(privkey_len);
12✔
210

211
   result.test_sz_gte("Reasonable size", privkey.size(), 32);
12✔
212

213
   // reimport exported private key
214
   botan_privkey_t copy;
12✔
215
   TEST_FFI_OK(botan_privkey_load, (&copy, rng, privkey.data(), privkey.size(), nullptr));
12✔
216
   botan_privkey_destroy(copy);
12✔
217

218
   // Now again for PEM
219
   privkey_len = 0;
12✔
220

221
   TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
12✔
222
               botan_privkey_export,
223
               (priv, nullptr, &privkey_len, BOTAN_PRIVKEY_EXPORT_FLAG_PEM));
224

225
   privkey.resize(privkey_len);
12✔
226
   TEST_FFI_OK(botan_privkey_export, (priv, privkey.data(), &privkey_len, BOTAN_PRIVKEY_EXPORT_FLAG_PEM));
12✔
227

228
   TEST_FFI_OK(botan_privkey_load, (&copy, rng, privkey.data(), privkey.size(), nullptr));
12✔
229
   botan_privkey_destroy(copy);
12✔
230

231
   #if defined(BOTAN_HAS_AES) && defined(BOTAN_HAS_PKCS5_PBES2)
232
   const size_t pbkdf_iter = 1000;
12✔
233

234
   // export private key encrypted
235
   privkey_len = 0;
12✔
236
   TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
12✔
237
               botan_privkey_export_encrypted_pbkdf_iter,
238
               (priv, nullptr, &privkey_len, rng, "password", pbkdf_iter, "", "", BOTAN_PRIVKEY_EXPORT_FLAG_DER));
239

240
   privkey.resize(privkey_len);
12✔
241
   privkey_len = privkey.size();
12✔
242

243
   TEST_FFI_OK(
12✔
244
      botan_privkey_export_encrypted_pbkdf_iter,
245
      (priv, privkey.data(), &privkey_len, rng, "password", pbkdf_iter, "", "", BOTAN_PRIVKEY_EXPORT_FLAG_DER));
246

247
   // reimport encrypted private key
248
   botan_privkey_load(&copy, rng, privkey.data(), privkey.size(), "password");
12✔
249
   botan_privkey_destroy(copy);
12✔
250

251
   privkey_len = 0;
12✔
252
   TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
12✔
253
               botan_privkey_export_encrypted_pbkdf_iter,
254
               (priv, nullptr, &privkey_len, rng, "password", pbkdf_iter, "", "", BOTAN_PRIVKEY_EXPORT_FLAG_PEM));
255

256
   privkey.resize(privkey_len);
12✔
257
   TEST_FFI_OK(
12✔
258
      botan_privkey_export_encrypted_pbkdf_iter,
259
      (priv, privkey.data(), &privkey_len, rng, "password", pbkdf_iter, "", "", BOTAN_PRIVKEY_EXPORT_FLAG_PEM));
260

261
   privkey.resize(privkey_len * 2);
12✔
262
   privkey_len = privkey.size();
12✔
263
   const uint32_t pbkdf_msec = 100;
12✔
264
   size_t pbkdf_iters_out = 0;
12✔
265

266
      #if defined(BOTAN_HAS_SCRYPT)
267
   const std::string pbe_hash = "Scrypt";
12✔
268
      #else
269
   const std::string pbe_hash = "SHA-512";
270
      #endif
271

272
      #if defined(BOTAN_HAS_AEAD_GCM)
273
   const std::string pbe_cipher = "AES-256/GCM";
12✔
274
      #else
275
   const std::string pbe_cipher = "AES-256/CBC";
276
      #endif
277

278
   TEST_FFI_OK(botan_privkey_export_encrypted_pbkdf_msec,
12✔
279
               (priv,
280
                privkey.data(),
281
                &privkey_len,
282
                rng,
283
                "password",
284
                pbkdf_msec,
285
                &pbkdf_iters_out,
286
                pbe_cipher.c_str(),
287
                pbe_hash.c_str(),
288
                0));
289

290
   if(pbe_hash == "Scrypt") {
12✔
291
      result.test_sz_eq("Scrypt iters set to zero in this API", pbkdf_iters_out, 0);
12✔
292
   } else {
293
      // PBKDF2 currently always rounds to multiple of 2000
294
      result.test_sz_eq("Expected PBKDF2 iters", pbkdf_iters_out % 2000, 0);
×
295
   }
296

297
   privkey.resize(privkey_len);
12✔
298

299
   TEST_FFI_OK(botan_privkey_load, (&copy, rng, privkey.data(), privkey.size(), "password"));
12✔
300
   botan_privkey_destroy(copy);
12✔
301
   #endif
302

303
   // calculate fingerprint
304
   size_t strength = 0;
12✔
305
   TEST_FFI_OK(botan_pubkey_estimated_strength, (pub, &strength));
12✔
306
   result.test_sz_gte("estimated strength", strength, 1);
12✔
307

308
   size_t fingerprint_len = 0;
12✔
309
   TEST_FFI_RC(
12✔
310
      BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE, botan_pubkey_fingerprint, (pub, "SHA-256", nullptr, &fingerprint_len));
311

312
   std::vector<uint8_t> fingerprint(fingerprint_len);
12✔
313
   TEST_FFI_OK(botan_pubkey_fingerprint, (pub, "SHA-256", fingerprint.data(), &fingerprint_len));
12✔
314
}
12✔
315

316
class FFI_Utils_Test final : public FFI_Test {
1✔
317
   public:
318
      std::string name() const override { return "FFI Utils"; }
1✔
319

320
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
321
         result.test_u32_eq("FFI API version macro", uint32_t(BOTAN_FFI_API_VERSION), uint32_t(BOTAN_HAS_FFI));
1✔
322
         result.test_u32_eq("FFI API version function", botan_ffi_api_version(), uint32_t(BOTAN_HAS_FFI));
1✔
323
         result.test_u32_eq("Major version", botan_version_major(), Botan::version_major());
1✔
324
         result.test_u32_eq("Minor version", botan_version_minor(), Botan::version_minor());
1✔
325
         result.test_u32_eq("Patch version", botan_version_patch(), Botan::version_patch());
1✔
326
         result.test_str_eq("Botan version", botan_version_string(), Botan::version_cstr());
1✔
327
         result.test_u32_eq("Botan version datestamp", botan_version_datestamp(), Botan::version_datestamp());
1✔
328
         result.test_rc_ok("FFI supports its own version", botan_ffi_supports_api(botan_ffi_api_version()));
1✔
329

330
         result.test_u32_eq("FFI compile time time var matches botan_ffi_api_version",
1✔
331
                            botan_ffi_api_version(),
332
                            uint32_t(BOTAN_FFI_API_VERSION));
333

334
         result.test_rc_ok("FFI supports 2.0 version", botan_ffi_supports_api(20150515));
1✔
335
         result.test_rc_ok("FFI supports 2.1 version", botan_ffi_supports_api(20170327));
1✔
336
         result.test_rc_ok("FFI supports 2.3 version", botan_ffi_supports_api(20170815));
1✔
337
         result.test_rc_ok("FFI supports 2.8 version", botan_ffi_supports_api(20180713));
1✔
338

339
         result.test_rc("FFI doesn't support bogus version", botan_ffi_supports_api(20160229), -1);
1✔
340

341
         const std::vector<uint8_t> mem1 = {0xFF, 0xAA, 0xFF};
1✔
342
         const std::vector<uint8_t> mem2 = {0xFF, 0xA9, 0xFF};
1✔
343

344
         TEST_FFI_RC(0, botan_constant_time_compare, (mem1.data(), mem1.data(), mem1.size()));
1✔
345
         TEST_FFI_RC(-1, botan_constant_time_compare, (mem1.data(), mem2.data(), mem1.size()));
1✔
346

347
         std::vector<uint8_t> to_zero = {0xFF, 0xA0};
1✔
348
         TEST_FFI_OK(botan_scrub_mem, (to_zero.data(), to_zero.size()));
1✔
349
         result.test_is_true("scrub_memory zeros", to_zero[0] == 0 && to_zero[1] == 0);
1✔
350

351
         const std::vector<uint8_t> bin = {0xAA, 0xDE, 0x01};
1✔
352

353
         std::string outstr;
1✔
354
         outstr.resize(2 * bin.size());
1✔
355
         TEST_FFI_OK(botan_hex_encode, (bin.data(), bin.size(), outstr.data(), 0));
1✔
356
         result.test_str_eq("uppercase hex", outstr, "AADE01");
1✔
357

358
         TEST_FFI_OK(botan_hex_encode, (bin.data(), bin.size(), outstr.data(), BOTAN_FFI_HEX_LOWER_CASE));
1✔
359
         result.test_str_eq("lowercase hex", outstr, "aade01");
1✔
360
      }
1✔
361
};
362

363
class FFI_RNG_Test final : public FFI_Test {
1✔
364
   public:
365
      std::string name() const override { return "FFI RNG"; }
1✔
366

367
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
368
         // RNG test and initialization
369
         botan_rng_t rng;
1✔
370
         botan_rng_t system_rng;
1✔
371
         botan_rng_t hwrng_rng = nullptr;
1✔
372
         botan_rng_t null_rng;
1✔
373
         botan_rng_t custom_rng;
1✔
374
         botan_rng_t tpm2_rng = nullptr;
1✔
375

376
         botan_tpm2_ctx_t tpm2_ctx = nullptr;
1✔
377
         botan_tpm2_session_t tpm2_session = nullptr;
1✔
378

379
         TEST_FFI_FAIL("invalid rng type", botan_rng_init, (&rng, "invalid_type"));
1✔
380

381
         REQUIRE_FFI_OK(botan_rng_init, (&system_rng, "system"));
1✔
382
         REQUIRE_FFI_OK(botan_rng_init, (&null_rng, "null"));
1✔
383

384
         int rc = botan_rng_init(&hwrng_rng, "hwrng");
1✔
385
         result.test_is_true("Either success or not implemented", rc == 0 || rc == BOTAN_FFI_ERROR_NOT_IMPLEMENTED);
1✔
386

387
         std::vector<uint8_t> outbuf(512);
1✔
388

389
         rc = botan_rng_init(&rng, "user-threadsafe");
1✔
390
         result.test_is_true("Either success or not implemented", rc == 0 || rc == BOTAN_FFI_ERROR_NOT_IMPLEMENTED);
1✔
391

392
         if(rc != 0) {
1✔
393
            REQUIRE_FFI_OK(botan_rng_init, (&rng, "user"));
×
394
            REQUIRE_FFI_OK(botan_rng_destroy, (rng));
×
395
         }
396

397
         if(rc == 0) {
1✔
398
            TEST_FFI_OK(botan_rng_get, (rng, outbuf.data(), outbuf.size()));
1✔
399
            TEST_FFI_OK(botan_rng_reseed, (rng, 256));
1✔
400

401
            TEST_FFI_RC(BOTAN_FFI_ERROR_INVALID_OBJECT_STATE, botan_rng_reseed_from_rng, (rng, null_rng, 256));
1✔
402
            if(hwrng_rng != nullptr) {
1✔
403
               TEST_FFI_OK(botan_rng_reseed_from_rng, (rng, hwrng_rng, 256));
1✔
404
            }
405
            TEST_FFI_RC(BOTAN_FFI_ERROR_INVALID_OBJECT_STATE, botan_rng_get, (null_rng, outbuf.data(), outbuf.size()));
1✔
406

407
            TEST_FFI_OK(botan_rng_destroy, (rng));
1✔
408
         }
409

410
         if(TEST_FFI_OK(botan_rng_init, (&rng, "user"))) {
1✔
411
            TEST_FFI_OK(botan_rng_get, (rng, outbuf.data(), outbuf.size()));
1✔
412
            TEST_FFI_OK(botan_rng_reseed, (rng, 256));
1✔
413

414
            TEST_FFI_OK(botan_rng_reseed_from_rng, (rng, system_rng, 256));
1✔
415

416
            uint8_t not_really_entropy[32] = {0};
1✔
417
            TEST_FFI_OK(botan_rng_add_entropy, (rng, not_really_entropy, 32));
1✔
418
         }
419

420
         uint8_t system_rng_buf[4096];
1✔
421
         TEST_FFI_OK(botan_system_rng_get, (system_rng_buf, sizeof(system_rng_buf)));
1✔
422

423
         size_t cb_counter = 0;
1✔
424

425
         auto custom_get_cb = +[](void* context, uint8_t* out, size_t out_len) -> int {
1✔
426
            for(size_t i = 0; i != out_len; ++i) {
427
               out[i] = 0x12;
428
            }
429
            (*(static_cast<size_t*>(context)))++;
430
            return 0;
431
         };
432

433
         auto custom_add_entropy_cb = +[](void* context, const uint8_t input[], size_t length) -> int {
1✔
434
            BOTAN_UNUSED(input, length);
435
            (*(static_cast<size_t*>(context)))++;
436
            return 0;
437
         };
438

439
         auto custom_destroy_cb = +[](void* context) -> void { (*(static_cast<size_t*>(context)))++; };
1✔
440

441
         if(TEST_FFI_OK(
1✔
442
               botan_rng_init_custom,
443
               (&custom_rng, "custom rng", &cb_counter, custom_get_cb, custom_add_entropy_cb, custom_destroy_cb))) {
444
            Botan::clear_mem(outbuf.data(), outbuf.size());
1✔
445
            TEST_FFI_OK(botan_rng_get, (custom_rng, outbuf.data(), outbuf.size()));
1✔
446
            result.test_sz_eq("custom_get_cb called", cb_counter, 1);
1✔
447
            std::vector<uint8_t> pattern(outbuf.size(), 0x12);
1✔
448
            result.test_bin_eq("custom_get_cb returned bytes", pattern, outbuf);
1✔
449

450
            TEST_FFI_OK(botan_rng_reseed, (custom_rng, 256));
1✔
451
            result.test_sz_eq("custom_add_entropy_cb called", cb_counter, 2);
1✔
452

453
            TEST_FFI_OK(botan_rng_reseed_from_rng, (custom_rng, system_rng, 256));
1✔
454
            result.test_sz_eq("custom_add_entropy_cb called", cb_counter, 3);
1✔
455

456
            uint8_t not_really_entropy[32] = {0};
1✔
457
            TEST_FFI_OK(botan_rng_add_entropy, (custom_rng, not_really_entropy, 32));
1✔
458
            result.test_sz_eq("custom_add_entropy_cb called", cb_counter, 4);
1✔
459

460
            TEST_FFI_OK(botan_rng_destroy, (custom_rng));
1✔
461
            result.test_sz_eq("custom_destroy_cb called", cb_counter, 5);
1✔
462
         }
1✔
463

464
   #ifdef BOTAN_HAS_JITTER_RNG
465
         botan_rng_t jitter_rng;
1✔
466
         if(TEST_FFI_OK(botan_rng_init, (&jitter_rng, "jitter"))) {
1✔
467
            std::vector<uint8_t> buf(256);
1✔
468
            TEST_FFI_OK(botan_rng_get, (jitter_rng, outbuf.data(), buf.size()));
1✔
469
            TEST_FFI_OK(botan_rng_destroy, (jitter_rng));
1✔
470
         }
1✔
471
   #endif
472

473
         const auto tcti_name = Test::options().tpm2_tcti_name().value_or("");
1✔
474
         const auto tcti_conf = Test::options().tpm2_tcti_conf().value_or("");
1✔
475
         if(tcti_name.empty() || tcti_name == "disabled") {
1✔
476
            result.test_note("TPM2 tests are disabled.");
×
477
         } else {
478
            auto tpm2_test_rng = [&](botan_tpm2_ctx_t tpm2_context) {
3✔
479
               // Create and use an RNG without a TPM2 session
480
               // (communication between application and TPM won't be encrypted)
481
               if(TEST_FFI_INIT(botan_tpm2_rng_init, (&tpm2_rng, tpm2_context, nullptr, nullptr, nullptr))) {
2✔
482
                  Botan::clear_mem(outbuf.data(), outbuf.size());
2✔
483

484
                  TEST_FFI_OK(botan_rng_get, (tpm2_rng, outbuf.data(), outbuf.size()));
2✔
485
                  TEST_FFI_OK(botan_rng_reseed, (tpm2_rng, 256));
2✔
486

487
                  TEST_FFI_OK(botan_rng_reseed_from_rng, (tpm2_rng, system_rng, 256));
2✔
488

489
                  uint8_t not_really_entropy[32] = {0};
2✔
490
                  TEST_FFI_OK(botan_rng_add_entropy, (tpm2_rng, not_really_entropy, 32));
2✔
491
                  TEST_FFI_OK(botan_rng_destroy, (tpm2_rng));
2✔
492
               }
493

494
               // Create an anonymous TPM2 session
495
               if(TEST_FFI_INIT(botan_tpm2_unauthenticated_session_init, (&tpm2_session, tpm2_context))) {
2✔
496
                  // Create and use an RNG with an anonymous TPM2 session
497
                  // (communication between application and TPM will be encrypted)
498
                  if(TEST_FFI_INIT(botan_tpm2_rng_init, (&tpm2_rng, tpm2_context, tpm2_session, nullptr, nullptr))) {
2✔
499
                     Botan::clear_mem(outbuf.data(), outbuf.size());
2✔
500

501
                     TEST_FFI_OK(botan_rng_get, (tpm2_rng, outbuf.data(), outbuf.size()));
2✔
502
                     TEST_FFI_OK(botan_rng_reseed, (tpm2_rng, 256));
2✔
503

504
                     TEST_FFI_OK(botan_rng_reseed_from_rng, (tpm2_rng, system_rng, 256));
2✔
505

506
                     uint8_t not_really_entropy[32] = {0};
2✔
507
                     TEST_FFI_OK(botan_rng_add_entropy, (tpm2_rng, not_really_entropy, 32));
2✔
508
                     TEST_FFI_OK(botan_rng_destroy, (tpm2_rng));
2✔
509
                  }
510

511
                  TEST_FFI_OK(botan_tpm2_session_destroy, (tpm2_session));
2✔
512
               }
513
            };
3✔
514

515
            if(TEST_FFI_INIT(botan_tpm2_ctx_init_ex, (&tpm2_ctx, tcti_name.c_str(), tcti_conf.c_str()))) {
1✔
516
               if(botan_tpm2_supports_crypto_backend() == 1) {
1✔
517
                  TEST_FFI_OK(botan_tpm2_ctx_enable_crypto_backend, (tpm2_ctx, system_rng));
1✔
518
                  result.test_note("TPM2 crypto backend enabled");
1✔
519
               } else {
520
                  result.test_note("TPM2 crypto backend not supported");
×
521
               }
522

523
               tpm2_test_rng(tpm2_ctx);
1✔
524
               TEST_FFI_OK(botan_tpm2_ctx_destroy, (tpm2_ctx));
1✔
525
            }
526

527
   #if defined(BOTAN_HAS_TPM2)
528
            TSS2_TCTI_CONTEXT* tcti_ctx;
1✔
529
            ESYS_CONTEXT* esys_ctx;
1✔
530

531
            if(TEST_FFI_INIT(Tss2_TctiLdr_Initialize_Ex, (tcti_name.c_str(), tcti_conf.c_str(), &tcti_ctx))) {
1✔
532
               if(TEST_FFI_INIT(Esys_Initialize, (&esys_ctx, tcti_ctx, nullptr /* ABI version */))) {
1✔
533
                  botan_tpm2_crypto_backend_state_t cbs = nullptr;
1✔
534

535
                  // enable the botan-based TSS2 crypto backend on a bare ESYS_CONTEXT
536
                  if(botan_tpm2_supports_crypto_backend() == 1) {
1✔
537
                     TEST_FFI_OK(botan_tpm2_enable_crypto_backend, (&cbs, esys_ctx, system_rng));
1✔
538
                     result.test_note("TPM2 crypto backend enabled");
1✔
539
                  } else {
540
                     result.test_note("TPM2 crypto backend not supported");
×
541
                  }
542

543
                  // initialize the Botan TPM2 FFI wrapper from the bare ESYS_CONTEXT
544
                  if(TEST_FFI_INIT(botan_tpm2_ctx_from_esys, (&tpm2_ctx, esys_ctx))) {
1✔
545
                     tpm2_test_rng(tpm2_ctx);
1✔
546
                     TEST_FFI_OK(botan_tpm2_ctx_destroy, (tpm2_ctx));
1✔
547
                  }
548

549
                  if(cbs != nullptr) {
1✔
550
                     TEST_FFI_OK(botan_tpm2_crypto_backend_state_destroy, (cbs));
1✔
551
                  }
552

553
                  Esys_Finalize(&esys_ctx);
1✔
554
               }
555
               Tss2_TctiLdr_Finalize(&tcti_ctx);
1✔
556
            }
557
   #endif
558
         }
559

560
         TEST_FFI_OK(botan_rng_destroy, (rng));
1✔
561
         TEST_FFI_OK(botan_rng_destroy, (null_rng));
1✔
562
         TEST_FFI_OK(botan_rng_destroy, (system_rng));
1✔
563
         TEST_FFI_OK(botan_rng_destroy, (hwrng_rng));
1✔
564
      }
1✔
565
};
566

567
class FFI_RSA_Cert_Test final : public FFI_Test {
1✔
568
   public:
569
      std::string name() const override { return "FFI RSA cert"; }
1✔
570

571
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
572
         botan_x509_cert_t cert;
1✔
573
         if(TEST_FFI_INIT(botan_x509_cert_load_file, (&cert, Test::data_file("x509/ocsp/randombit.pem").c_str()))) {
1✔
574
            TEST_FFI_RC(0, botan_x509_cert_hostname_match, (cert, "randombit.net"));
1✔
575
            TEST_FFI_RC(0, botan_x509_cert_hostname_match, (cert, "www.randombit.net"));
1✔
576
            TEST_FFI_RC(-1, botan_x509_cert_hostname_match, (cert, "*.randombit.net"));
1✔
577
            TEST_FFI_RC(-1, botan_x509_cert_hostname_match, (cert, "flub.randombit.net"));
1✔
578
            TEST_FFI_RC(-1, botan_x509_cert_hostname_match, (cert, "randombit.net.com"));
1✔
579

580
            botan_x509_cert_t copy;
1✔
581
            TEST_FFI_OK(botan_x509_cert_dup, (&copy, cert));
1✔
582
            TEST_FFI_RC(0, botan_x509_cert_hostname_match, (copy, "randombit.net"));
1✔
583

584
            TEST_FFI_OK(botan_x509_cert_destroy, (copy));
1✔
585
            TEST_FFI_OK(botan_x509_cert_destroy, (cert));
1✔
586
         }
587
      }
1✔
588
};
589

590
class FFI_ZFEC_Test final : public FFI_Test {
1✔
591
   public:
592
      std::string name() const override { return "FFI ZFEC"; }
1✔
593

594
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
595
         /* exercise a simple success case
596
          */
597

598
         // Select some arbitrary, valid encoding parameters.  There is
599
         // nothing special about them but some relationships between these
600
         // values and other inputs must hold.
601
         const size_t K = 3;
1✔
602
         const size_t N = 11;
1✔
603

604
         // The decoder needs to know the indexes of the blocks being passed
605
         // in to it.  This array must equal [0..N) for the logic in the
606
         // decoding loop below to hold.
607
         const std::vector<size_t> indexes = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10};
1✔
608

609
         // This will be the size of each encoded (or decoded) block.  This is
610
         // an arbitrary value but it must match up with the length of the
611
         // test data given in `input`.
612
         const size_t blockSize = 15;
1✔
613

614
         // K of the blocks are required so the total information represented
615
         // can be this multiple.  totalSize must be a multiple of K and it
616
         // always will be using this construction.
617
         const size_t totalSize = blockSize * K;
1✔
618

619
         // Here's the complete original input (plus a trailing NUL that we
620
         // won't pass through ZFEC).  These are arbitrary bytes.
621
         const uint8_t input[totalSize + 1] = "Does this work?AAAAAAAAAAAAAAAzzzzzzzzzzzzzzz";
1✔
622

623
         // Allocate memory for the encoding and decoding output parameters.
624
         std::vector<uint8_t> encoded_buf(N * blockSize);
1✔
625
         std::vector<uint8_t> decoded_buf(K * blockSize);
1✔
626

627
         std::vector<uint8_t*> encoded(N);
1✔
628
         for(size_t i = 0; i < N; ++i) {
12✔
629
            encoded[i] = &encoded_buf[i * blockSize];
11✔
630
         }
631
         std::vector<uint8_t*> decoded(K);
1✔
632
         for(size_t i = 0; i < K; ++i) {
4✔
633
            decoded[i] = &decoded_buf[i * blockSize];
3✔
634
         }
635

636
         // First encode the complete input string into N blocks where K are
637
         // required for reconstruction.  The N encoded blocks will end up in
638
         // `encoded`.
639
         if(!TEST_FFI_INIT(botan_zfec_encode, (K, N, input, totalSize, encoded.data()))) {
1✔
640
            return;
641
         }
642

643
         // Any K blocks can be decoded to reproduce the original input (split
644
         // across an array of K strings of blockSize bytes each).  This loop
645
         // only exercises decoding with consecutive blocks because it's
646
         // harder to pick non-consecutive blocks out for a test.
647
         for(size_t offset = 0; offset < N - K; ++offset) {
9✔
648
            result.test_note("About to decode with offset " + std::to_string(offset));
24✔
649
            // Pass in the K shares starting from `offset` (and their indexes)
650
            // so that we can try decoding a certain group of blocks here.  Any
651
            // K shares *should* work.
652
            REQUIRE_FFI_OK(botan_zfec_decode,
8✔
653
                           (K, N, indexes.data() + offset, encoded.data() + offset, blockSize, decoded.data()));
654

655
            // Check that the original input bytes have been written to the
656
            // output parameter.
657
            for(size_t k = 0, pos = 0; k < K; ++k, pos += blockSize) {
32✔
658
               TEST_FFI_RC(0, botan_constant_time_compare, (input + pos, decoded[k], blockSize));
24✔
659
            }
660
         }
661

662
         /* Exercise a couple basic failure cases, such as you encounter if
663
          * the caller supplies invalid parameters.  We don't try to
664
          * exhaustively prove invalid parameters are handled through this
665
          * interface since the implementation only passes them through to
666
          * ZFEC::{encode,decode} where the real checking is.  We just want to
667
          * see that errors can propagate.
668
          */
669
         TEST_FFI_FAIL("encode with out-of-bounds encoding parameters should have failed",
1✔
670
                       botan_zfec_encode,
671
                       (0, 0, nullptr, 0, nullptr));
672
         TEST_FFI_FAIL("decode with out-of-bounds encoding parameters should have failed",
1✔
673
                       botan_zfec_decode,
674
                       (0, 0, nullptr, nullptr, 0, nullptr));
675
      }
1✔
676
};
677

678
class FFI_CRL_Test final : public FFI_Test {
1✔
679
   public:
680
      std::string name() const override { return "FFI CRL"; }
1✔
681

682
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
683
         const char* crl_string =
1✔
684
            "-----BEGIN X509 CRL-----\n"
685
            "MIICoTCCAQkCAQEwDQYJKoZIhvcNAQELBQAwgZQxLTArBgNVBAMTJFVzYWJsZSBj\n"
686
            "ZXJ0IHZhbGlkYXRpb246IFRlbXBvcmFyeSBDQTE5MDcGA1UECxMwQ2VudHJlIGZv\n"
687
            "ciBSZXNlYXJjaCBvbiBDcnlwdG9ncmFwaHkgYW5kIFNlY3VyaXR5MRswGQYDVQQK\n"
688
            "ExJNYXNhcnlrIFVuaXZlcnNpdHkxCzAJBgNVBAYTAkNaGA8yMDUwMDIyNTE1MjE0\n"
689
            "MloYDzIwNTAwMjI1MTUyNDQxWjAAoDowODAfBgNVHSMEGDAWgBRKzxAvI4+rVVo/\n"
690
            "JzLigRznREyB+TAVBgNVHRQEDgIMXcr16yNys/gjeuCFMA0GCSqGSIb3DQEBCwUA\n"
691
            "A4IBgQCfxv/5REM/KUnzeVycph3dJr1Yrtxhc6pZmQ9pMzSW/nawLN3rUHm5oG44\n"
692
            "ZuQgjvzE4PnbU0/DNRu/4w3H58kgrctJHHXbbvkU3lf2ZZLh2wBl+EUh92+/COow\n"
693
            "ZyGB+jqj/XwB99hYUhrY6NLEWRz08kpgG6dnNMEU0uFqdQKWk0CQPnmgPRgDb8BW\n"
694
            "IuMBcjY7aF9XoCZFOqPYdEvUKzAo4QGCf7uJ7fNGS3LqvjaLjAHJseSr5/yR7Q9r\n"
695
            "nEdI38yKPbRj0tNHe7j+BbYg31C+X+AZZKJtlTg8GxYR3qfQio1kDgpZ3rQLzHY3\n"
696
            "ea2MLX/Kdx9cPSwh4KwlcDxQmQKoELb4EnZW1CScSBHi9HQyCBNyCkgkOBMGcJqz\n"
697
            "Ihq1dGeSf8eca9+Avk5kAQ3yjXK1TI2CDEi0msrXLr9XbgowXiOLLzR+rYkhQz+V\n"
698
            "RnIoBwjnrGoJoz636KS170SZCB9ARNs17WE4IvbJdZrTXNOGaVZCQUUpiLRj4ZSO\n"
699
            "Na/nobI=\n"
700
            "-----END X509 CRL-----";
701

702
         botan_x509_crl_t bytecrl;
1✔
703
         if(!TEST_FFI_INIT(botan_x509_crl_load, (&bytecrl, reinterpret_cast<const uint8_t*>(crl_string), 966))) {
1✔
704
            return;
×
705
         }
706

707
         botan_x509_crl_t crl_without_next_update;
1✔
708
         if(!TEST_FFI_INIT(botan_x509_crl_load_file,
1✔
709
                           (&crl_without_next_update,
710
                            Test::data_file("x509/misc/crl_without_nextupdate/valid_forever.crl").c_str()))) {
711
            return;
712
         }
713

714
         uint64_t this_update;
1✔
715
         uint64_t next_update;
1✔
716
         TEST_FFI_RC(BOTAN_FFI_ERROR_NO_VALUE, botan_x509_crl_next_update, (crl_without_next_update, &next_update));
1✔
717
         TEST_FFI_RC(BOTAN_FFI_ERROR_NO_VALUE, botan_x509_crl_next_update, (crl_without_next_update, nullptr));
1✔
718
         TEST_FFI_OK(botan_x509_crl_this_update, (bytecrl, &this_update));
1✔
719
         TEST_FFI_OK(botan_x509_crl_next_update, (bytecrl, &next_update));
1✔
720
         result.test_u64_eq(
1✔
721
            "this update", this_update, Botan::calendar_point(2050, 2, 25, 15, 21, 42).seconds_since_epoch());
1✔
722
         result.test_u64_eq(
1✔
723
            "next update", next_update, Botan::calendar_point(2050, 2, 25, 15, 24, 41).seconds_since_epoch());
1✔
724

725
         TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER, botan_x509_crl_this_update, (bytecrl, nullptr));
1✔
726
         TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER, botan_x509_crl_next_update, (bytecrl, nullptr));
1✔
727

728
         ViewBytesSink akid;
1✔
729
         TEST_FFI_OK(botan_x509_crl_view_binary_values,
1✔
730
                     (bytecrl, BOTAN_X509_AUTHORITY_KEY_IDENTIFIER, 0, akid.delegate(), akid.callback()));
731
         result.test_bin_eq("authority key ID", akid.get(), "4ACF102F238FAB555A3F2732E2811CE7444C81F9");
1✔
732

733
         TEST_FFI_RC(BOTAN_FFI_ERROR_NO_VALUE,
1✔
734
                     botan_x509_crl_view_binary_values,
735
                     (bytecrl, BOTAN_X509_SUBJECT_KEY_IDENTIFIER, 0, akid.delegate(), akid.callback()));
736
         size_t akid_count;
1✔
737
         TEST_FFI_OK(botan_x509_crl_view_binary_values_count,
1✔
738
                     (bytecrl, BOTAN_X509_SUBJECT_KEY_IDENTIFIER, &akid_count));
739
         result.test_sz_eq("no subject key ID entries", akid_count, 0);
1✔
740

741
         botan_x509_crl_t crl;
1✔
742
         REQUIRE_FFI_OK(botan_x509_crl_load_file, (&crl, Test::data_file("x509/nist/root.crl").c_str()));
1✔
743

744
         botan_x509_cert_t cert1;
1✔
745
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&cert1, Test::data_file("x509/nist/test01/end.crt").c_str()));
1✔
746
         TEST_FFI_RC(-1, botan_x509_is_revoked, (crl, cert1));
1✔
747
         TEST_FFI_OK(botan_x509_cert_destroy, (cert1));
1✔
748

749
         botan_x509_cert_t cert2;
1✔
750
         std::vector<uint8_t> cert2_serial;
1✔
751
         botan_mp_t cert2_serial_bn;
1✔
752
         size_t cert2_serial_len = 0;
1✔
753
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&cert2, Test::data_file("x509/nist/test20/int.crt").c_str()));
1✔
754
         TEST_FFI_RC(0, botan_x509_is_revoked, (crl, cert2));
1✔
755
         TEST_FFI_RC(-1, botan_x509_is_revoked, (bytecrl, cert2));
1✔
756
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
757
                     botan_x509_cert_get_serial_number,
758
                     (cert2, nullptr, &cert2_serial_len));
759
         cert2_serial.resize(cert2_serial_len);
1✔
760
         TEST_FFI_OK(botan_x509_cert_get_serial_number, (cert2, cert2_serial.data(), &cert2_serial_len));
1✔
761
         TEST_FFI_OK(botan_x509_cert_serial_number, (cert2, &cert2_serial_bn));
1✔
762
         TEST_FFI_OK(botan_x509_cert_destroy, (cert2));
1✔
763

764
         size_t entries;
1✔
765
         TEST_FFI_OK(botan_x509_crl_entries_count, (crl, &entries));
1✔
766
         result.test_sz_eq("one revoked cert", entries, 1);
1✔
767
         TEST_FFI_OK(botan_x509_crl_entries_count, (bytecrl, &entries));
1✔
768
         result.test_sz_eq("no revoked cert", entries, 0);
1✔
769

770
         ViewBytesSink serial;
1✔
771
         TEST_FFI_OK(botan_mp_view_bin, (cert2_serial_bn, serial.delegate(), serial.callback()));
1✔
772
         result.test_bin_eq("serial == serial_bn", serial.get(), cert2_serial);
1✔
773
         TEST_FFI_OK(botan_mp_destroy, (cert2_serial_bn));
1✔
774

775
         botan_x509_crl_entry_t entry;
1✔
776
         TEST_FFI_OK(botan_x509_crl_entries, (crl, 0, &entry));
1✔
777

778
         uint64_t ts;
1✔
779
         int reason;
1✔
780
         botan_mp_t entry_serial_bn;
1✔
781

782
         TEST_FFI_OK(botan_x509_crl_entry_view_serial_number, (entry, serial.delegate(), serial.callback()));
1✔
783
         TEST_FFI_OK(botan_x509_crl_entry_serial_number, (entry, &entry_serial_bn));
1✔
784
         TEST_FFI_OK(botan_x509_crl_entry_revocation_date, (entry, &ts));
1✔
785
         TEST_FFI_OK(botan_x509_crl_entry_reason, (entry, &reason));
1✔
786
         TEST_FFI_OK(botan_x509_crl_entry_destroy, (entry));
1✔
787

788
   #if defined(BOTAN_HAS_X509)
789
         result.test_u8_eq(
1✔
790
            "Reason", static_cast<uint8_t>(reason), Botan::to_underlying(Botan::CRL_Code::KeyCompromise));
791
   #endif
792
         result.test_u64_eq("Revocation time", ts, Botan::calendar_point(1999, 1, 1, 12, 0, 0).seconds_since_epoch());
1✔
793
         result.test_bin_eq("Revoked cert serial", serial.get(), cert2_serial);
1✔
794

795
         TEST_FFI_OK(botan_mp_view_bin, (entry_serial_bn, serial.delegate(), serial.callback()));
1✔
796
         result.test_bin_eq("Revoked cert serial_bn", serial.get(), cert2_serial);
1✔
797
         TEST_FFI_OK(botan_mp_destroy, (entry_serial_bn));
1✔
798

799
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE, botan_x509_crl_entries, (crl, 1, &entry));
1✔
800
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE, botan_x509_crl_entries, (bytecrl, 0, &entry));
1✔
801

802
         ViewStringSink crl_pem;
1✔
803
         TEST_FFI_OK(botan_x509_crl_view_string_values,
1✔
804
                     (bytecrl, BOTAN_X509_PEM_ENCODING, 0, crl_pem.delegate(), crl_pem.callback()));
805
         size_t pem_count;
1✔
806
         TEST_FFI_OK(botan_x509_crl_view_string_values_count, (bytecrl, BOTAN_X509_PEM_ENCODING, &pem_count));
1✔
807
         result.test_sz_eq("one PEM encoding", pem_count, 1);
1✔
808

809
         auto remove_newlines = [](std::string_view str) {
3✔
810
            auto out = std::string(str);
2✔
811
            std::erase(out, '\n');
2✔
812
            std::erase(out, '\r');
2✔
813
            return out;
2✔
814
         };
815

816
         result.test_str_eq("CRL PEM", remove_newlines(crl_pem.get()), remove_newlines(crl_string));
1✔
817

818
         TEST_FFI_OK(botan_x509_crl_destroy, (crl));
1✔
819
         TEST_FFI_OK(botan_x509_crl_destroy, (bytecrl));
1✔
820
         TEST_FFI_OK(botan_x509_crl_destroy, (crl_without_next_update));
1✔
821

822
         const uint64_t now =
1✔
823
            std::chrono::duration_cast<std::chrono::seconds>(std::chrono::system_clock::now().time_since_epoch())
1✔
824
               .count();
1✔
825

826
         const char* priv_string =
1✔
827
            "-----BEGIN PRIVATE KEY-----\n"
828
            "MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgoVEKnWZw2Bfrf3MM\n"
829
            "WLrfvRcAqq/sOf58jny37NLGQHShRANCAARageRLkKQEh1M86zvqeeesx2u9duLP\n"
830
            "iWtHjIcunpiq6+IiB8IVu7Ncu6uPKoFS/mWzTvjgdNusmgNle9p3OAbE\n"
831
            "-----END PRIVATE KEY-----";
832

833
         botan_privkey_t ca_key;
1✔
834
         botan_x509_cert_t ca_cert;
1✔
835
         botan_x509_cert_t sub1_cert;
1✔
836
         botan_x509_cert_t sub2_cert;
1✔
837

838
         REQUIRE_FFI_OK(botan_privkey_load,
1✔
839
                        (&ca_key, nullptr, reinterpret_cast<const uint8_t*>(priv_string), 240, nullptr));
1✔
840
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&ca_cert, Test::data_file("x509/crl/ca.crt").c_str()));
1✔
841
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&sub1_cert, Test::data_file("x509/crl/sub1.crt").c_str()));
1✔
842
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&sub2_cert, Test::data_file("x509/crl/sub2.crt").c_str()));
1✔
843

844
         botan_pubkey_t ca_pubkey;
1✔
845
         REQUIRE_FFI_OK(botan_privkey_export_pubkey, (&ca_pubkey, ca_key));
1✔
846

847
         botan_x509_crl_t empty_crl;
1✔
848
         TEST_FFI_OK(botan_x509_crl_create, (&empty_crl, rng, ca_cert, ca_key, now, 86400, nullptr, nullptr));
1✔
849

850
         int rc;
1✔
851
         // both validate, because the crl is empty
852
         TEST_FFI_RC(0,
1✔
853
                     botan_x509_cert_verify_with_crl,
854
                     (&rc, sub1_cert, nullptr, 0, &ca_cert, 1, &empty_crl, 1, nullptr, 0, nullptr, 0));
855
         TEST_FFI_RC(0,
1✔
856
                     botan_x509_cert_verify_with_crl,
857
                     (&rc, sub2_cert, nullptr, 0, &ca_cert, 1, &empty_crl, 1, nullptr, 0, nullptr, 0));
858

859
         botan_x509_crl_entry_t crl_entry;
1✔
860
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE, botan_x509_crl_entries, (empty_crl, 0, &crl_entry));
1✔
861
         TEST_FFI_OK(botan_x509_crl_entry_create, (&crl_entry, sub2_cert, BOTAN_CRL_ENTRY_KEY_COMPROMISE));
1✔
862

863
         botan_x509_crl_t new_crl;
1✔
864
         const botan_x509_crl_entry_t crl_entries[1] = {crl_entry};
1✔
865

866
         TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER,
1✔
867
                     botan_x509_crl_update,
868
                     (&new_crl, empty_crl, rng, ca_cert, ca_key, now, 86400, nullptr, 1, nullptr, nullptr));
869
         TEST_FFI_OK(botan_x509_crl_update,
1✔
870
                     (&new_crl, empty_crl, rng, ca_cert, ca_key, now, 86400, crl_entries, 1, nullptr, nullptr));
871
         // sub 1 still validates
872
         TEST_FFI_RC(0,
1✔
873
                     botan_x509_cert_verify_with_crl,
874
                     (&rc, sub1_cert, nullptr, 0, &ca_cert, 1, &new_crl, 1, nullptr, 0, nullptr, 0));
875
         // but sub 2 is revoked
876
         TEST_FFI_RC(1,
1✔
877
                     botan_x509_cert_verify_with_crl,
878
                     (&rc, sub2_cert, nullptr, 0, &ca_cert, 1, &new_crl, 1, nullptr, 0, nullptr, 0));
879

880
         botan_x509_crl_entry_t crl_entry_2;
1✔
881
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE, botan_x509_crl_entries, (new_crl, 1, &crl_entry_2));
1✔
882
         TEST_FFI_OK(botan_x509_crl_entries, (new_crl, 0, &crl_entry_2));
1✔
883

884
         botan_mp_t serial_from_str;
1✔
885
         TEST_FFI_OK(botan_mp_init, (&serial_from_str));
1✔
886
         TEST_FFI_OK(botan_mp_set_from_str, (serial_from_str, "270431672985589325219914342203841486494"));
1✔
887

888
         uint64_t expire_time;
1✔
889
         TEST_FFI_OK(botan_x509_crl_entry_revocation_date, (crl_entry_2, &expire_time));
1✔
890
         TEST_FFI_OK(botan_x509_crl_entry_reason, (crl_entry_2, &reason));
1✔
891

892
         botan_mp_t serial_from_crl;
1✔
893
         TEST_FFI_OK(botan_x509_crl_entry_serial_number, (crl_entry_2, &serial_from_crl));
1✔
894
         TEST_FFI_RC(1, botan_mp_equal, (serial_from_str, serial_from_crl));
1✔
895
         result.test_is_true("expire time is correct", now - 20 <= expire_time && expire_time <= now + 20);
1✔
896
         result.test_is_true("reason is correct", reason == BOTAN_CRL_ENTRY_KEY_COMPROMISE);
1✔
897

898
         TEST_FFI_RC(1, botan_x509_crl_verify_signature, (new_crl, ca_pubkey));
1✔
899

900
         botan_x509_crl_t even_newer_crl;
1✔
901
         TEST_FFI_OK(botan_x509_crl_update,
1✔
902
                     (&even_newer_crl, new_crl, rng, ca_cert, ca_key, now, 456, nullptr, 0, nullptr, nullptr));
903

904
         TEST_FFI_OK(botan_x509_crl_next_update, (even_newer_crl, &expire_time));
1✔
905
         result.test_is_true("expire time is correct", expire_time == now + 456);
1✔
906

907
         TEST_FFI_OK(botan_x509_crl_entry_destroy, (crl_entry));
1✔
908
         TEST_FFI_OK(botan_x509_crl_entry_destroy, (crl_entry_2));
1✔
909
         TEST_FFI_OK(botan_mp_destroy, (serial_from_str));
1✔
910
         TEST_FFI_OK(botan_mp_destroy, (serial_from_crl));
1✔
911
         TEST_FFI_OK(botan_x509_crl_destroy, (empty_crl));
1✔
912
         TEST_FFI_OK(botan_x509_crl_destroy, (new_crl));
1✔
913
         TEST_FFI_OK(botan_x509_crl_destroy, (even_newer_crl));
1✔
914
         TEST_FFI_OK(botan_x509_cert_destroy, (ca_cert));
1✔
915
         TEST_FFI_OK(botan_x509_cert_destroy, (sub1_cert));
1✔
916
         TEST_FFI_OK(botan_x509_cert_destroy, (sub2_cert));
1✔
917
         TEST_FFI_OK(botan_pubkey_destroy, (ca_pubkey));
1✔
918
         TEST_FFI_OK(botan_privkey_destroy, (ca_key));
1✔
919
      }
1✔
920
};
921

922
class FFI_Cert_Validation_Test final : public FFI_Test {
1✔
923
   public:
924
      std::string name() const override { return "FFI Cert Validation"; }
1✔
925

926
      bool skip_this_test() const override {
1✔
927
   #if !defined(BOTAN_HAS_PKCSV15_SIGNATURE_PADDING)
928
         return true;
929
   #else
930
         return false;
1✔
931
   #endif
932
      }
933

934
      void verify_bare_pkcs1_rsa_signature(Test::Result& result, botan_x509_cert_t ee, botan_x509_cert_t ca) {
1✔
935
         ViewBytesSink tbs_data;
1✔
936
         ViewBytesSink sig_scheme;
1✔
937
         ViewBytesSink signature;
1✔
938
         ViewBytesSink public_key;
1✔
939

940
         TEST_FFI_OK(botan_x509_cert_view_binary_values,
1✔
941
                     (ee, BOTAN_X509_TBS_DATA_BITS, 0, tbs_data.delegate(), tbs_data.callback()));
942
         TEST_FFI_OK(botan_x509_cert_view_binary_values,
1✔
943
                     (ee, BOTAN_X509_SIGNATURE_SCHEME_BITS, 0, sig_scheme.delegate(), sig_scheme.callback()));
944
         TEST_FFI_OK(botan_x509_cert_view_binary_values,
1✔
945
                     (ee, BOTAN_X509_SIGNATURE_BITS, 0, signature.delegate(), signature.callback()));
946
         TEST_FFI_OK(botan_x509_cert_view_binary_values,
1✔
947
                     (ca, BOTAN_X509_PUBLIC_KEY_PKCS8_BITS, 0, public_key.delegate(), public_key.callback()));
948

949
         // These values exist exactly once in a certificate
950
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE,
1✔
951
                     botan_x509_cert_view_binary_values,
952
                     (ee, BOTAN_X509_TBS_DATA_BITS, 1, tbs_data.delegate(), tbs_data.callback()));
953
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE,
1✔
954
                     botan_x509_cert_view_binary_values,
955
                     (ee, BOTAN_X509_SIGNATURE_SCHEME_BITS, 1, sig_scheme.delegate(), sig_scheme.callback()));
956
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE,
1✔
957
                     botan_x509_cert_view_binary_values,
958
                     (ee, BOTAN_X509_SIGNATURE_BITS, 1, signature.delegate(), signature.callback()));
959
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE,
1✔
960
                     botan_x509_cert_view_binary_values,
961
                     (ca, BOTAN_X509_PUBLIC_KEY_PKCS8_BITS, 1, public_key.delegate(), public_key.callback()));
962

963
         size_t count;
1✔
964
         TEST_FFI_OK(botan_x509_cert_view_binary_values_count, (ee, BOTAN_X509_TBS_DATA_BITS, &count));
1✔
965
         result.test_sz_eq("TBS data count", count, 1);
1✔
966
         TEST_FFI_OK(botan_x509_cert_view_binary_values_count, (ee, BOTAN_X509_SIGNATURE_SCHEME_BITS, &count));
1✔
967
         result.test_sz_eq("Signature scheme count", count, 1);
1✔
968
         TEST_FFI_OK(botan_x509_cert_view_binary_values_count, (ee, BOTAN_X509_SIGNATURE_BITS, &count));
1✔
969
         result.test_sz_eq("Signature count", count, 1);
1✔
970
         TEST_FFI_OK(botan_x509_cert_view_binary_values_count, (ca, BOTAN_X509_PUBLIC_KEY_PKCS8_BITS, &count));
1✔
971
         result.test_sz_eq("Public key count", count, 1);
1✔
972

973
         // At the moment there's no way to directly instantiate a signature
974
         // verifier object with an encoded signature algorithm scheme. Hence,
975
         // we just check that the hard-coded expectation is fulfilled.
976
         //
977
         // TODO: improve this if we ever have a pk_op_verify_t constructor that
978
         //       takes an encoded AlgorithmIdentifier.
979
         const auto expected_sig_scheme =
1✔
980
            Botan::AlgorithmIdentifier("RSA/PKCS1v15(SHA-1)", Botan::AlgorithmIdentifier::USE_NULL_PARAM).BER_encode();
1✔
981
         result.test_bin_eq("AlgorithmIdentifier", sig_scheme.get(), expected_sig_scheme);
1✔
982

983
         botan_pubkey_t pubkey;
1✔
984
         TEST_FFI_INIT(botan_pubkey_load, (&pubkey, public_key.data(), public_key.size()));
1✔
985

986
         botan_pk_op_verify_t verifier;
1✔
987
         TEST_FFI_INIT(botan_pk_op_verify_create, (&verifier, pubkey, "PKCS1v15(SHA-1)", 0));
1✔
988
         TEST_FFI_OK(botan_pk_op_verify_update, (verifier, tbs_data.data(), tbs_data.size()));
1✔
989
         TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
1✔
990

991
         TEST_FFI_OK(botan_pk_op_verify_destroy, (verifier));
1✔
992
         TEST_FFI_OK(botan_pubkey_destroy, (pubkey));
1✔
993
      }
1✔
994

995
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
996
         botan_x509_cert_t root;
1✔
997
         int rc;
1✔
998

999
         if(!TEST_FFI_INIT(botan_x509_cert_load_file, (&root, Test::data_file("x509/nist/root.crt").c_str()))) {
1✔
1000
            return;
×
1001
         }
1002
         TEST_FFI_RC(1, botan_x509_cert_is_ca, (root));
1✔
1003

1004
         botan_x509_cert_t end2;
1✔
1005
         botan_x509_cert_t sub2;
1✔
1006
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&end2, Test::data_file("x509/nist/test02/end.crt").c_str()));
1✔
1007
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&sub2, Test::data_file("x509/nist/test02/int.crt").c_str()));
1✔
1008
         TEST_FFI_RC(0, botan_x509_cert_is_ca, (end2));
1✔
1009

1010
         size_t path_limit;
1✔
1011
         TEST_FFI_RC(BOTAN_FFI_ERROR_NO_VALUE, botan_x509_cert_get_path_length_constraint, (root, &path_limit));
1✔
1012

1013
         botan_x509_cert_t root_with_pathlen;
1✔
1014
         REQUIRE_FFI_OK(botan_x509_cert_load_file,
1✔
1015
                        (&root_with_pathlen, Test::data_file("x509/extended/02/root.crt").c_str()));
1✔
1016
         TEST_FFI_OK(botan_x509_cert_get_path_length_constraint, (root_with_pathlen, &path_limit));
1✔
1017
         result.test_sz_eq("Path length constraint", path_limit, 1);
1✔
1018

1019
         TEST_FFI_RC(1, botan_x509_cert_verify, (&rc, end2, &sub2, 1, &root, 1, nullptr, 0, nullptr, 0));
1✔
1020
         result.test_is_true("Validation test02 failed", rc == 5002);
1✔
1021
         result.test_str_eq(
1✔
1022
            "Validation test02 status string", botan_x509_cert_validation_status(rc), "Signature error");
1023

1024
         TEST_FFI_RC(1, botan_x509_cert_verify, (&rc, end2, nullptr, 0, &root, 1, nullptr, 0, nullptr, 0));
1✔
1025
         result.test_is_true("Validation test02 failed (missing int)", rc == 3000);
1✔
1026
         result.test_str_eq(
1✔
1027
            "Validation test02 status string", botan_x509_cert_validation_status(rc), "Certificate issuer not found");
1028

1029
         botan_x509_cert_t end7;
1✔
1030
         botan_x509_cert_t sub7;
1✔
1031
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&end7, Test::data_file("x509/nist/test07/end.crt").c_str()));
1✔
1032
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&sub7, Test::data_file("x509/nist/test07/int.crt").c_str()));
1✔
1033

1034
         const botan_x509_cert_t subs[2] = {sub2, sub7};
1✔
1035
         TEST_FFI_RC(1, botan_x509_cert_verify, (&rc, end7, subs, 2, &root, 1, nullptr, 0, nullptr, 0));
1✔
1036
         result.test_is_true("Validation test07 failed with expected error", rc == 1001);
1✔
1037
         result.test_str_eq("Validation test07 status string",
1✔
1038
                            botan_x509_cert_validation_status(rc),
1039
                            "Hash function used is considered too weak for security");
1040

1041
         TEST_FFI_RC(0, botan_x509_cert_verify, (&rc, end7, subs, 2, &root, 1, nullptr, 80, nullptr, 0));
1✔
1042
         result.test_is_true("Validation test07 passed", rc == 0);
1✔
1043
         result.test_str_eq("Validation test07 status string", botan_x509_cert_validation_status(rc), "Verified");
1✔
1044

1045
         verify_bare_pkcs1_rsa_signature(result, end7, sub7);
1✔
1046

1047
         TEST_FFI_RC(1,
1✔
1048
                     botan_x509_cert_verify_with_crl,
1049
                     (&rc, end7, subs, 2, nullptr, 0, nullptr, 0, "x509/farce", 0, nullptr, 0));
1050
         result.test_is_true("Validation test07 failed with expected error", rc == 3000);
1✔
1051
         result.test_str_eq(
1✔
1052
            "Validation test07 status string", botan_x509_cert_validation_status(rc), "Certificate issuer not found");
1053

1054
         botan_x509_crl_t rootcrl;
1✔
1055

1056
         REQUIRE_FFI_OK(botan_x509_crl_load_file, (&rootcrl, Test::data_file("x509/nist/root.crl").c_str()));
1✔
1057
         TEST_FFI_RC(
1✔
1058
            0, botan_x509_cert_verify_with_crl, (&rc, end7, subs, 2, &root, 1, &rootcrl, 1, nullptr, 80, nullptr, 0));
1059
         result.test_is_true("Validation test07 with CRL passed", rc == 0);
1✔
1060
         result.test_str_eq(
1✔
1061
            "Validation test07 with CRL status string", botan_x509_cert_validation_status(rc), "Verified");
1062

1063
         botan_x509_cert_t end20;
1✔
1064
         botan_x509_cert_t sub20;
1✔
1065
         botan_x509_crl_t sub20crl;
1✔
1066
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&end20, Test::data_file("x509/nist/test20/end.crt").c_str()));
1✔
1067
         REQUIRE_FFI_OK(botan_x509_cert_load_file, (&sub20, Test::data_file("x509/nist/test20/int.crt").c_str()));
1✔
1068
         REQUIRE_FFI_OK(botan_x509_crl_load_file, (&sub20crl, Test::data_file("x509/nist/test20/int.crl").c_str()));
1✔
1069
         const botan_x509_crl_t crls[2] = {sub20crl, rootcrl};
1✔
1070
         TEST_FFI_RC(
1✔
1071
            1, botan_x509_cert_verify_with_crl, (&rc, end20, &sub20, 1, &root, 1, crls, 2, nullptr, 80, nullptr, 0));
1072
         result.test_is_true("Validation test20 failed with expected error", rc == 5000);
1✔
1073
         result.test_str_eq(
1✔
1074
            "Validation test20 status string", botan_x509_cert_validation_status(rc), "Certificate is revoked");
1075

1076
         TEST_FFI_OK(botan_x509_cert_destroy, (root_with_pathlen));
1✔
1077
         TEST_FFI_OK(botan_x509_cert_destroy, (end2));
1✔
1078
         TEST_FFI_OK(botan_x509_cert_destroy, (sub2));
1✔
1079
         TEST_FFI_OK(botan_x509_cert_destroy, (end7));
1✔
1080
         TEST_FFI_OK(botan_x509_cert_destroy, (sub7));
1✔
1081
         TEST_FFI_OK(botan_x509_cert_destroy, (end20));
1✔
1082
         TEST_FFI_OK(botan_x509_cert_destroy, (sub20));
1✔
1083
         TEST_FFI_OK(botan_x509_crl_destroy, (sub20crl));
1✔
1084
         TEST_FFI_OK(botan_x509_cert_destroy, (root));
1✔
1085
         TEST_FFI_OK(botan_x509_crl_destroy, (rootcrl));
1✔
1086
      }
1087
};
1088

1089
class FFI_ECDSA_Certificate_Test final : public FFI_Test {
1✔
1090
   public:
1091
      std::string name() const override { return "FFI ECDSA cert"; }
1✔
1092

1093
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
1094
         botan_x509_cert_t cert;
1✔
1095
         if(TEST_FFI_INIT(botan_x509_cert_load_file, (&cert, Test::data_file("x509/ecc/isrg-root-x2.pem").c_str()))) {
1✔
1096
            size_t date_len = 0;
1✔
1097
            TEST_FFI_RC(
1✔
1098
               BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE, botan_x509_cert_get_time_starts, (cert, nullptr, &date_len));
1099

1100
            date_len = 8;
1✔
1101
            TEST_FFI_RC(
1✔
1102
               BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE, botan_x509_cert_get_time_starts, (cert, nullptr, &date_len));
1103

1104
            std::string date(date_len - 1, '0');
1✔
1105
            TEST_FFI_OK(botan_x509_cert_get_time_starts, (cert, date.data(), &date_len));
1✔
1106
            result.test_str_eq("cert valid from", date, "200904000000Z");
1✔
1107

1108
            date_len = 0;
1✔
1109
            TEST_FFI_RC(
1✔
1110
               BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE, botan_x509_cert_get_time_expires, (cert, nullptr, &date_len));
1111

1112
            date.resize(date_len - 1);
1✔
1113
            TEST_FFI_OK(botan_x509_cert_get_time_expires, (cert, date.data(), &date_len));
1✔
1114
            result.test_str_eq("cert valid until", date, "400917160000Z");
1✔
1115

1116
            uint64_t not_before = 0;
1✔
1117
            TEST_FFI_OK(botan_x509_cert_not_before, (cert, &not_before));
1✔
1118
            result.test_is_true("cert not before", not_before == 1599177600);
1✔
1119

1120
            uint64_t not_after = 0;
1✔
1121
            TEST_FFI_OK(botan_x509_cert_not_after, (cert, &not_after));
1✔
1122
            result.test_is_true("cert not after", not_after == 2231510400);
1✔
1123

1124
            size_t serial_len = 0;
1✔
1125
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
1126
                        botan_x509_cert_get_serial_number,
1127
                        (cert, nullptr, &serial_len));
1128

1129
            std::vector<uint8_t> serial(serial_len);
1✔
1130
            TEST_FFI_OK(botan_x509_cert_get_serial_number, (cert, serial.data(), &serial_len));
1✔
1131
            result.test_sz_eq("cert serial length", serial.size(), 16);
1✔
1132
            result.test_bin_eq("cert serial", serial, "41D29DD172EAEEA780C12C6CE92F8752");
1✔
1133

1134
            ViewBytesSink serial_sink;
1✔
1135
            TEST_FFI_OK(botan_x509_cert_view_binary_values,
1✔
1136
                        (cert, BOTAN_X509_SERIAL_NUMBER, 0, serial_sink.delegate(), serial_sink.callback()));
1137
            result.test_bin_eq("cert serial (2)", serial_sink.get(), "41D29DD172EAEEA780C12C6CE92F8752");
1✔
1138

1139
            size_t fingerprint_len = 0;
1✔
1140
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
1141
                        botan_x509_cert_get_fingerprint,
1142
                        (cert, "SHA-256", nullptr, &fingerprint_len));
1143

1144
            std::vector<uint8_t> fingerprint(fingerprint_len);
1✔
1145
            TEST_FFI_OK(botan_x509_cert_get_fingerprint, (cert, "SHA-256", fingerprint.data(), &fingerprint_len));
1✔
1146
            result.test_str_eq(
1✔
1147
               "cert fingerprint",
1148
               reinterpret_cast<const char*>(fingerprint.data()),
1✔
1149
               "69:72:9B:8E:15:A8:6E:FC:17:7A:57:AF:B7:17:1D:FC:64:AD:D2:8C:2F:CA:8C:F1:50:7E:34:45:3C:CB:14:70");
1150

1151
            size_t key_id_len = 0;
1✔
1152
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
1153
                        botan_x509_cert_get_authority_key_id,
1154
                        (cert, nullptr, &key_id_len));
1155

1156
            result.test_sz_eq("No AKID", key_id_len, 0);
1✔
1157

1158
            // "No AKID" is explicitly communicated with an error code
1159
            ViewBytesSink key_id_sink;
1✔
1160
            TEST_FFI_RC(BOTAN_FFI_ERROR_NO_VALUE,
1✔
1161
                        botan_x509_cert_view_binary_values,
1162
                        (cert, BOTAN_X509_AUTHORITY_KEY_IDENTIFIER, 0, key_id_sink.delegate(), key_id_sink.callback()));
1163

1164
            key_id_len = 0;
1✔
1165
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
1166
                        botan_x509_cert_get_subject_key_id,
1167
                        (cert, nullptr, &key_id_len));
1168

1169
            std::vector<uint8_t> key_id(key_id_len);
1✔
1170
            TEST_FFI_OK(botan_x509_cert_get_subject_key_id, (cert, key_id.data(), &key_id_len));
1✔
1171
            result.test_str_eq("cert subject key id",
1✔
1172
                               Botan::hex_encode(key_id.data(), key_id.size(), true),
1✔
1173
                               "7C4296AEDE4B483BFA92F89E8CCF6D8BA9723795");
1174

1175
            TEST_FFI_OK(botan_x509_cert_view_binary_values,
1✔
1176
                        (cert, BOTAN_X509_SUBJECT_KEY_IDENTIFIER, 0, key_id_sink.delegate(), key_id_sink.callback()));
1177
            result.test_bin_eq("cert subject key id", key_id_sink.get(), "7C4296AEDE4B483BFA92F89E8CCF6D8BA9723795");
1✔
1178

1179
            size_t pubkey_len = 0;
1✔
1180
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
1181
                        botan_x509_cert_get_public_key_bits,
1182
                        (cert, nullptr, &pubkey_len));
1183

1184
            std::vector<uint8_t> pubkey(pubkey_len);
1✔
1185
            TEST_FFI_OK(botan_x509_cert_get_public_key_bits, (cert, pubkey.data(), &pubkey_len));
1✔
1186

1187
   #if defined(BOTAN_HAS_ECDSA)
1188
            botan_pubkey_t pub;
1✔
1189
            if(TEST_FFI_OK(botan_x509_cert_get_public_key, (cert, &pub))) {
1✔
1190
               TEST_FFI_RC(0, botan_pubkey_ecc_key_used_explicit_encoding, (pub));
1✔
1191
               TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
1192
            }
1193
   #endif
1194

1195
            size_t rdn_count;
1✔
1196
            TEST_FFI_OK(botan_x509_cert_get_issuer_dn_count, (cert, "Name", &rdn_count));
1✔
1197
            result.test_sz_eq("issuer DN 'name' count", rdn_count, 1);
1✔
1198
            TEST_FFI_OK(botan_x509_cert_get_issuer_dn_count, (cert, "Organizational Unit", &rdn_count));
1✔
1199
            result.test_sz_eq("issuer DN 'organizational unit' count", rdn_count, 0);
1✔
1200

1201
            size_t dn_len = 0;
1✔
1202
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
1203
                        botan_x509_cert_get_issuer_dn,
1204
                        (cert, "Name", 0, nullptr, &dn_len));
1205

1206
            std::vector<uint8_t> dn(dn_len);
1✔
1207
            TEST_FFI_OK(botan_x509_cert_get_issuer_dn, (cert, "Name", 0, dn.data(), &dn_len));
1✔
1208
            result.test_str_eq("issuer dn", reinterpret_cast<const char*>(dn.data()), "ISRG Root X2");
1✔
1209

1210
            TEST_FFI_OK(botan_x509_cert_get_subject_dn_count, (cert, "Name", &rdn_count));
1✔
1211
            result.test_sz_eq("subject DN 'name' count", rdn_count, 1);
1✔
1212
            TEST_FFI_OK(botan_x509_cert_get_subject_dn_count, (cert, "Organizational Unit", &rdn_count));
1✔
1213
            result.test_sz_eq("subject DN 'organizational unit' count", rdn_count, 0);
1✔
1214

1215
            dn_len = 0;
1✔
1216
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
1217
                        botan_x509_cert_get_subject_dn,
1218
                        (cert, "Name", 0, nullptr, &dn_len));
1219

1220
            dn.resize(dn_len);
1✔
1221
            TEST_FFI_OK(botan_x509_cert_get_subject_dn, (cert, "Name", 0, dn.data(), &dn_len));
1✔
1222
            result.test_str_eq("subject dn", reinterpret_cast<const char*>(dn.data()), "ISRG Root X2");
1✔
1223

1224
            size_t printable_len = 0;
1✔
1225
            TEST_FFI_RC(
1✔
1226
               BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE, botan_x509_cert_to_string, (cert, nullptr, &printable_len));
1227

1228
            std::string printable(printable_len - 1, '0');
1✔
1229
            TEST_FFI_OK(botan_x509_cert_to_string, (cert, printable.data(), &printable_len));
1✔
1230

1231
            size_t count;
1✔
1232
            TEST_FFI_OK(botan_x509_cert_view_string_values_count, (cert, BOTAN_X509_PEM_ENCODING, &count));
1✔
1233
            result.test_sz_eq("one PEM encoding", count, 1);
1✔
1234
            TEST_FFI_OK(botan_x509_cert_view_binary_values_count, (cert, BOTAN_X509_DER_ENCODING, &count));
1✔
1235
            result.test_sz_eq("one DER encoding", count, 1);
1✔
1236

1237
            ViewBytesSink der;
1✔
1238
            ViewStringSink pem;
1✔
1239
            TEST_FFI_OK(botan_x509_cert_view_binary_values,
1✔
1240
                        (cert, BOTAN_X509_DER_ENCODING, 0, der.delegate(), der.callback()));
1241
            result.test_is_true("DER encoding produced something", !der.get().empty());
1✔
1242
            TEST_FFI_OK(botan_x509_cert_view_string_values,
1✔
1243
                        (cert, BOTAN_X509_PEM_ENCODING, 0, pem.delegate(), pem.callback()));
1244
            result.test_is_true("PEM encoding produced something", !pem.get().empty());
1✔
1245

1246
            TEST_FFI_RC(0, botan_x509_cert_allowed_usage, (cert, KEY_CERT_SIGN));
1✔
1247
            TEST_FFI_RC(0, botan_x509_cert_allowed_usage, (cert, CRL_SIGN));
1✔
1248
            TEST_FFI_RC(1, botan_x509_cert_allowed_usage, (cert, DIGITAL_SIGNATURE));
1✔
1249

1250
            TEST_FFI_OK(botan_x509_cert_destroy, (cert));
1✔
1251
         }
1✔
1252
      }
1✔
1253
};
1254

1255
class FFI_Cert_ExtKeyUsages_Test final : public FFI_Test {
1✔
1256
   public:
1257
      std::string name() const override { return "FFI X509 Extended Key Usage"; }
1✔
1258

1259
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
1260
         botan_x509_cert_t cert_with_eku;
1✔
1261
         if(!TEST_FFI_INIT(botan_x509_cert_load_file,
1✔
1262
                           (&cert_with_eku, Test::data_file("x509/pss_certs/03/end.crt").c_str()))) {
1263
            return;
×
1264
         }
1265

1266
         // Prepare some OID objects for OID-based EKU queries
1267
         botan_asn1_oid_t oid_srv_auth1;
1✔
1268
         botan_asn1_oid_t oid_srv_auth2;
1✔
1269
         botan_asn1_oid_t oid_ocsp_signing;
1✔
1270
         TEST_FFI_OK(botan_oid_from_string, (&oid_srv_auth1, "1.3.6.1.5.5.7.3.1"));
1✔
1271
         TEST_FFI_OK(botan_oid_from_string, (&oid_srv_auth2, "PKIX.ServerAuth"));
1✔
1272
         TEST_FFI_OK(botan_oid_from_string, (&oid_ocsp_signing, "PKIX.OCSPSigning"));
1✔
1273

1274
         // Make sure the OID object is checked for nullptr
1275
         TEST_FFI_RC(
1✔
1276
            BOTAN_FFI_ERROR_NULL_POINTER, botan_x509_cert_allowed_extended_usage_oid, (cert_with_eku, nullptr));
1277

1278
         // Should have serverAuth (TLS Web Server Authentication)
1279
         TEST_FFI_RC(1, botan_x509_cert_allowed_extended_usage_str, (cert_with_eku, "1.3.6.1.5.5.7.3.1"));
1✔
1280
         TEST_FFI_RC(1, botan_x509_cert_allowed_extended_usage_str, (cert_with_eku, "PKIX.ServerAuth"));
1✔
1281
         TEST_FFI_RC(1, botan_x509_cert_allowed_extended_usage_oid, (cert_with_eku, oid_srv_auth1));
1✔
1282
         TEST_FFI_RC(1, botan_x509_cert_allowed_extended_usage_oid, (cert_with_eku, oid_srv_auth2));
1✔
1283

1284
         // Should have clientAuth (TLS Web Client Authentication)
1285
         TEST_FFI_RC(1, botan_x509_cert_allowed_extended_usage_str, (cert_with_eku, "1.3.6.1.5.5.7.3.2"));
1✔
1286
         TEST_FFI_RC(1, botan_x509_cert_allowed_extended_usage_str, (cert_with_eku, "PKIX.ClientAuth"));
1✔
1287

1288
         // Should NOT have OCSPSigning
1289
         TEST_FFI_RC(0, botan_x509_cert_allowed_extended_usage_str, (cert_with_eku, "1.3.6.1.5.5.7.3.9"));
1✔
1290
         TEST_FFI_RC(0, botan_x509_cert_allowed_extended_usage_str, (cert_with_eku, "PKIX.OCSPSigning"));
1✔
1291

1292
         // Should NOT have codeSigning
1293
         TEST_FFI_RC(0, botan_x509_cert_allowed_extended_usage_str, (cert_with_eku, "1.3.6.1.5.5.7.3.3"));
1✔
1294
         TEST_FFI_RC(0, botan_x509_cert_allowed_extended_usage_str, (cert_with_eku, "PKIX.CodeSigning"));
1✔
1295
         TEST_FFI_RC(0, botan_x509_cert_allowed_extended_usage_oid, (cert_with_eku, oid_ocsp_signing));
1✔
1296

1297
         TEST_FFI_OK(botan_x509_cert_destroy, (cert_with_eku));
1✔
1298

1299
         botan_x509_cert_t cert_without_eku;
1✔
1300
         if(!TEST_FFI_INIT(botan_x509_cert_load_file,
1✔
1301
                           (&cert_without_eku, Test::data_file("x509/nist/root.crt").c_str()))) {
1302
            return;
1303
         }
1304

1305
         // Should return zero for any EKU query (no EKU extension present)
1306
         TEST_FFI_RC(0, botan_x509_cert_allowed_extended_usage_str, (cert_without_eku, "1.3.6.1.5.5.7.3.1"));
1✔
1307
         TEST_FFI_RC(0, botan_x509_cert_allowed_extended_usage_str, (cert_without_eku, "1.3.6.1.5.5.7.3.2"));
1✔
1308
         TEST_FFI_RC(0, botan_x509_cert_allowed_extended_usage_str, (cert_without_eku, "PKIX.OCSPSigning"));
1✔
1309
         TEST_FFI_RC(0, botan_x509_cert_allowed_extended_usage_str, (cert_without_eku, "PKIX.CodeSigning"));
1✔
1310

1311
         TEST_FFI_OK(botan_oid_destroy, (oid_srv_auth1));
1✔
1312
         TEST_FFI_OK(botan_oid_destroy, (oid_srv_auth2));
1✔
1313
         TEST_FFI_OK(botan_oid_destroy, (oid_ocsp_signing));
1✔
1314
         TEST_FFI_OK(botan_x509_cert_destroy, (cert_without_eku));
1✔
1315
      }
1316
};
1317

1318
   #if defined(BOTAN_HAS_X509)
1319

1320
auto read_distinguished_name(std::span<const uint8_t> bytes) {
32✔
1321
   auto dec = Botan::BER_Decoder(bytes);
32✔
1322
   Botan::X509_DN dn;
32✔
1323
   dn.decode_from(dec);
32✔
1324
   return dn;
32✔
1325
}
32✔
1326

1327
class FFI_Cert_AlternativeNames_Test final : public FFI_Test {
1✔
1328
   private:
1329
      template <std::invocable<botan_x509_cert_t, size_t, botan_x509_general_name_t*> EnumeratorT,
1330
                std::invocable<botan_x509_cert_t, size_t*> CountFnT,
1331
                std::invocable<botan_x509_general_name_t> VisitorT>
1332
      static void visit_general_names(Test::Result& result,
12✔
1333
                                      botan_x509_cert_t cert,
1334
                                      EnumeratorT enumerator_fn,
1335
                                      CountFnT count_fn,
1336
                                      VisitorT visitor_fn) {
1337
         int rc = BOTAN_FFI_SUCCESS;
12✔
1338
         for(size_t i = 0; rc == BOTAN_FFI_SUCCESS; ++i) {
144✔
1339
            botan_x509_general_name_t gn;
1340
            rc = enumerator_fn(cert, i, &gn);
132✔
1341
            if(rc == BOTAN_FFI_SUCCESS) {
132✔
1342
               visitor_fn(gn);
120✔
1343
               TEST_FFI_OK(botan_x509_general_name_destroy, (gn));
120✔
1344
            } else if(rc == BOTAN_FFI_ERROR_OUT_OF_RANGE) {
12✔
1345
               // Now check we are at the expected index
1346
               size_t count;
1347
               TEST_FFI_OK(count_fn, (cert, &count));
12✔
1348
               result.test_sz_eq("enumerator reached end at expected index", i, count);
12✔
1349
            } else {
1350
               result.test_note(
×
1351
                  Botan::fmt("enumerator produced unexpected return code: {}", botan_error_description(rc)));
×
1352
            }
1353
         }
1354
      }
12✔
1355

1356
      template <typename EnumeratorT, typename CountFnT>
1357
      static auto read_string_alternative_names(Test::Result& result,
8✔
1358
                                                botan_x509_cert_t cert,
1359
                                                EnumeratorT enumerator_fn,
1360
                                                CountFnT count_fn,
1361
                                                botan_x509_general_name_types type) {
1362
         std::vector<std::string> out;
8✔
1363

1364
         visit_general_names(result, cert, enumerator_fn, count_fn, [&](botan_x509_general_name_t gn) {
88✔
1365
            unsigned int gn_type;
1366
            TEST_FFI_OK(botan_x509_general_name_get_type, (gn, &gn_type));
80✔
1367
            if(static_cast<botan_x509_general_name_types>(gn_type) == type) {
80✔
1368
               ViewStringSink str;
14✔
1369
               TEST_FFI_OK(botan_x509_general_name_view_string_value, (gn, str.delegate(), str.callback()));
14✔
1370
               out.push_back(str.get());
14✔
1371
            }
14✔
1372
         });
1373

1374
         return out;
8✔
1375
      }
×
1376

1377
      template <typename EnumeratorT, typename CountFnT>
1378
      static auto read_binary_alternative_names(Test::Result& result,
4✔
1379
                                                botan_x509_cert_t cert,
1380
                                                EnumeratorT enumerator_fn,
1381
                                                CountFnT count_fn,
1382
                                                botan_x509_general_name_types type) {
1383
         std::vector<std::vector<uint8_t>> out;
4✔
1384

1385
         visit_general_names(result, cert, enumerator_fn, count_fn, [&](botan_x509_general_name_t gn) {
44✔
1386
            unsigned int gn_type;
1387
            TEST_FFI_OK(botan_x509_general_name_get_type, (gn, &gn_type));
40✔
1388
            if(static_cast<botan_x509_general_name_types>(gn_type) == type) {
40✔
1389
               ViewBytesSink data;
8✔
1390
               TEST_FFI_OK(botan_x509_general_name_view_binary_value, (gn, data.delegate(), data.callback()));
8✔
1391
               out.emplace_back(data.get().begin(), data.get().end());
8✔
1392
            }
8✔
1393
         });
1394

1395
         return out;
4✔
1396
      }
×
1397

1398
      static auto read_common_names(std::span<const std::vector<uint8_t>> bytes) {
2✔
1399
         std::vector<std::string> result;
2✔
1400
         for(const auto& dn_bytes : bytes) {
8✔
1401
            const auto dn = read_distinguished_name(dn_bytes);
6✔
1402
            result.push_back(dn.get_first_attribute("X520.CommonName"));
12✔
1403
         }
6✔
1404
         return result;
2✔
1405
      }
×
1406

1407
   public:
1408
      std::string name() const override { return "FFI X509 Alternative Names"; }
1✔
1409

1410
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
1411
         botan_x509_cert_t cert_none;
1✔
1412
         if(!TEST_FFI_INIT(botan_x509_cert_load_file,
1✔
1413
                           (&cert_none, Test::data_file("x509/misc/no_alternative_names.pem").c_str()))) {
1414
            return;
×
1415
         }
1416

1417
         botan_x509_general_name_t nil = nullptr;
1✔
1418
         TEST_FFI_RC(BOTAN_FFI_ERROR_NO_VALUE, botan_x509_cert_subject_alternative_names, (cert_none, 0, &nil));
1✔
1419
         TEST_FFI_RC(BOTAN_FFI_ERROR_NO_VALUE, botan_x509_cert_issuer_alternative_names, (cert_none, 0, &nil));
1✔
1420
         result.test_is_true("no general name created", nil == nullptr);
1✔
1421

1422
         botan_x509_cert_t cert;
1✔
1423
         if(!TEST_FFI_INIT(botan_x509_cert_load_file,
1✔
1424
                           (&cert, Test::data_file("x509/misc/multiple_alternative_names.pem").c_str()))) {
1425
            return;
1426
         }
1427

1428
         const auto get_san = botan_x509_cert_subject_alternative_names;
1✔
1429
         const auto count_san = botan_x509_cert_subject_alternative_names_count;
1✔
1430

1431
         const auto san_email =
1✔
1432
            read_string_alternative_names(result, cert, get_san, count_san, BOTAN_X509_EMAIL_ADDRESS);
1✔
1433
         result.test_sz_eq("expected number of emails in SAN", san_email.size(), 2);
1✔
1434
         result.test_is_true("testing@x509-labs.com", Botan::value_exists(san_email, "testing@x509-labs.com"));
2✔
1435
         result.test_is_true("info@x509-labs.com", Botan::value_exists(san_email, "info@x509-labs.com"));
2✔
1436

1437
         const auto san_dns = read_string_alternative_names(result, cert, get_san, count_san, BOTAN_X509_DNS_NAME);
1✔
1438
         result.test_sz_eq("expected number of hostnames in SAN", san_dns.size(), 3);
1✔
1439
         result.test_is_true("test.x509-labs.com", Botan::value_exists(san_dns, "test.x509-labs.com"));
2✔
1440
         result.test_is_true("versuch.x509-labs.com", Botan::value_exists(san_dns, "versuch.x509-labs.com"));
2✔
1441
         result.test_is_true("trail.x509-labs.com", Botan::value_exists(san_dns, "trail.x509-labs.com"));
2✔
1442

1443
         const auto san_uri = read_string_alternative_names(result, cert, get_san, count_san, BOTAN_X509_URI);
1✔
1444
         result.test_sz_eq("expected number of URIs in SAN", san_uri.size(), 2);
1✔
1445
         result.test_is_true("https://x509-labs.com", Botan::value_exists(san_uri, "https://x509-labs.com"));
2✔
1446
         result.test_is_true("http://x509-labs.com", Botan::value_exists(san_uri, "http://x509-labs.com"));
2✔
1447

1448
         const auto san_ip4 = read_string_alternative_names(result, cert, get_san, count_san, BOTAN_X509_IP_ADDRESS);
1✔
1449
         result.test_sz_eq("expected number of IPv4 addresses", san_ip4.size(), 1);
1✔
1450
         result.test_is_true("127.0.0.1", Botan::value_exists(san_ip4, "127.0.0.1"));
2✔
1451
         const auto san_ip4_bin =
1✔
1452
            read_binary_alternative_names(result, cert, get_san, count_san, BOTAN_X509_IP_ADDRESS);
1✔
1453
         result.test_sz_eq("expected number of IPv4 addresses (bin)", san_ip4_bin.size(), 1);
1✔
1454
         result.test_bin_eq("127.0.0.1 (bin)", san_ip4_bin.front(), Botan::store_be(uint32_t(0x7F000001)));
1✔
1455

1456
         const auto san_dn_bytes =
1✔
1457
            read_binary_alternative_names(result, cert, get_san, count_san, BOTAN_X509_DIRECTORY_NAME);
1✔
1458
         result.test_sz_eq("expected number of DNs in SAN", san_dn_bytes.size(), 3);
1✔
1459
         const auto san_dn_cns = read_common_names(san_dn_bytes);
1✔
1460
         result.test_is_true("First Name", Botan::value_exists(san_dn_cns, "First Name"));
2✔
1461
         result.test_is_true("Middle Name", Botan::value_exists(san_dn_cns, "Middle Name"));
2✔
1462
         result.test_is_true("Last Name", Botan::value_exists(san_dn_cns, "Last Name"));
2✔
1463

1464
         auto get_ian = botan_x509_cert_issuer_alternative_names;
1✔
1465
         auto count_ian = botan_x509_cert_issuer_alternative_names_count;
1✔
1466

1467
         const auto ian_email =
1✔
1468
            read_string_alternative_names(result, cert, get_ian, count_ian, BOTAN_X509_EMAIL_ADDRESS);
1✔
1469
         result.test_sz_eq("expected number of emails in IAN", ian_email.size(), 0);
1✔
1470

1471
         const auto ian_dns = read_string_alternative_names(result, cert, get_ian, count_ian, BOTAN_X509_DNS_NAME);
1✔
1472
         result.test_sz_eq("expected number of hostnames in IAN", ian_dns.size(), 3);
1✔
1473
         result.test_is_true("test.x509-labs-ca.com", Botan::value_exists(ian_dns, "test.x509-labs-ca.com"));
2✔
1474
         result.test_is_true("versuch.x509-labs-ca.com", Botan::value_exists(ian_dns, "versuch.x509-labs-ca.com"));
2✔
1475
         result.test_is_true("trail.x509-labs-ca.com", Botan::value_exists(ian_dns, "trail.x509-labs-ca.com"));
2✔
1476

1477
         const auto ian_uri = read_string_alternative_names(result, cert, get_ian, count_ian, BOTAN_X509_URI);
1✔
1478
         result.test_sz_eq("expected number of URIs in IAN", ian_uri.size(), 2);
1✔
1479
         result.test_is_true("https://x509-labs-ca.com", Botan::value_exists(ian_uri, "https://x509-labs-ca.com"));
2✔
1480
         result.test_is_true("http://x509-labs-ca.com", Botan::value_exists(ian_uri, "http://x509-labs-ca.com"));
2✔
1481

1482
         const auto ian_ip4 = read_string_alternative_names(result, cert, get_ian, count_ian, BOTAN_X509_IP_ADDRESS);
1✔
1483
         result.test_sz_eq("expected number of IPv4 addresses", ian_ip4.size(), 1);
1✔
1484
         result.test_is_true("192.168.1.1", Botan::value_exists(ian_ip4, "192.168.1.1"));
2✔
1485
         const auto ian_ip4_bin =
1✔
1486
            read_binary_alternative_names(result, cert, get_ian, count_ian, BOTAN_X509_IP_ADDRESS);
1✔
1487
         result.test_sz_eq("expected number of IPv4 addresses (bin)", ian_ip4_bin.size(), 1);
1✔
1488
         result.test_bin_eq("192.168.1.1 (bin)", ian_ip4_bin.front(), Botan::store_be(uint32_t(0xC0A80101)));
1✔
1489

1490
         const auto ian_dn_bytes =
1✔
1491
            read_binary_alternative_names(result, cert, get_ian, count_ian, BOTAN_X509_DIRECTORY_NAME);
1✔
1492
         result.test_sz_eq("expected number of DNs in IAN", ian_dn_bytes.size(), 3);
1✔
1493
         const auto ian_dn_cns = read_common_names(ian_dn_bytes);
1✔
1494
         result.test_is_true("First CA", Botan::value_exists(ian_dn_cns, "First CA"));
2✔
1495
         result.test_is_true("Middle CA", Botan::value_exists(ian_dn_cns, "Middle CA"));
2✔
1496
         result.test_is_true("Last CA", Botan::value_exists(ian_dn_cns, "Last CA"));
2✔
1497

1498
         TEST_FFI_OK(botan_x509_cert_destroy, (cert));
1✔
1499
         TEST_FFI_OK(botan_x509_cert_destroy, (cert_none));
1✔
1500
      }
1✔
1501
};
1502

1503
class FFI_Cert_NameConstraints_Test final : public FFI_Test {
1✔
1504
   private:
1505
      static auto read_constraints(Test::Result& result, botan_x509_cert_t cert, bool permitted) {
2✔
1506
         std::vector<std::pair<botan_x509_general_name_types, std::string>> out;
2✔
1507

1508
         int rc = BOTAN_FFI_SUCCESS;
2✔
1509
         for(size_t i = 0; rc == BOTAN_FFI_SUCCESS; ++i) {
78✔
1510
            botan_x509_general_name_t constraint;
76✔
1511
            if(permitted) {
76✔
1512
               rc = botan_x509_cert_permitted_name_constraints(cert, i, &constraint);
73✔
1513
            } else {
1514
               rc = botan_x509_cert_excluded_name_constraints(cert, i, &constraint);
3✔
1515
            }
1516

1517
            if(rc == BOTAN_FFI_SUCCESS) {
76✔
1518
               ViewBytesSink bytes;
74✔
1519
               ViewStringSink string;
74✔
1520

1521
               unsigned int type;
74✔
1522
               const auto rc2 = botan_x509_general_name_get_type(constraint, &type);
74✔
1523
               if(rc2 == BOTAN_FFI_SUCCESS) {
74✔
1524
                  const auto gn_type = static_cast<botan_x509_general_name_types>(type);
73✔
1525
                  switch(gn_type) {
73✔
1526
                     case BOTAN_X509_EMAIL_ADDRESS:
48✔
1527
                     case BOTAN_X509_DNS_NAME:
48✔
1528
                     case BOTAN_X509_URI:
48✔
1529
                     case BOTAN_X509_IP_ADDRESS:
48✔
1530
                        TEST_FFI_OK(botan_x509_general_name_view_string_value,
48✔
1531
                                    (constraint, string.delegate(), string.callback()));
1532
                        out.emplace_back(gn_type, string.get());
48✔
1533
                        break;
1534
                     case BOTAN_X509_DIRECTORY_NAME:
25✔
1535
                        TEST_FFI_OK(botan_x509_general_name_view_binary_value,
25✔
1536
                                    (constraint, bytes.delegate(), bytes.callback()));
1537
                        out.emplace_back(gn_type, read_distinguished_name(bytes.get()).to_string());
50✔
1538
                        break;
25✔
1539
                     case BOTAN_X509_OTHER_NAME:
×
1540
                        out.emplace_back(gn_type, "<not supported>");
×
1541
                        break;
1542
                  }
1543
               } else {
1544
                  result.test_note(
1✔
1545
                     Botan::fmt("botan_x509_general_name_get_type returned {}", botan_error_description(rc2)));
2✔
1546
               }
1547

1548
               TEST_FFI_OK(botan_x509_general_name_destroy, (constraint));
74✔
1549
            } else if(rc == BOTAN_FFI_ERROR_OUT_OF_RANGE) {
76✔
1550
               // Now check that we are at the expected index
1551
               size_t count;
2✔
1552
               if(permitted) {
2✔
1553
                  TEST_FFI_OK(botan_x509_cert_permitted_name_constraints_count, (cert, &count));
1✔
1554
               } else {
1555
                  TEST_FFI_OK(botan_x509_cert_excluded_name_constraints_count, (cert, &count));
1✔
1556
               }
1557
               result.test_sz_eq("expected length of name constraint list", i, count);
2✔
1558
            } else {
1559
               result.test_failure(Botan::fmt("unexpected error code: {}", botan_error_description(rc)));
×
1560
            }
1561
         }
1562

1563
         return out;
2✔
1564
      }
×
1565

1566
   public:
1567
      std::string name() const override { return "FFI X509 Name Constraints"; }
1✔
1568

1569
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
1570
         botan_x509_cert_t cert;
1✔
1571
         if(!TEST_FFI_INIT(botan_x509_cert_load_file,
1✔
1572
                           (&cert, Test::data_file("x509/misc/name_constraint_ci/int.pem").c_str()))) {
1573
            return;
×
1574
         }
1575

1576
         const auto permitted = read_constraints(result, cert, true);
1✔
1577
         const auto excluded = read_constraints(result, cert, false);
1✔
1578

1579
         result.test_sz_eq("permissions", permitted.size(), 72);
1✔
1580
         result.test_sz_eq("exclusions", excluded.size(), 1);
1✔
1581

1582
         using V = decltype(permitted)::value_type;
1✔
1583
         result.test_is_true("email", Botan::value_exists(permitted, V{BOTAN_X509_EMAIL_ADDRESS, "pec.aruba.it"}));
1✔
1584
         result.test_is_true("DNS", Botan::value_exists(permitted, V{BOTAN_X509_DNS_NAME, "gov.it"}));
1✔
1585
         result.test_is_true(
1✔
1586
            "DN",
1587
            Botan::value_exists(
1✔
1588
               permitted,
1589
               V{BOTAN_X509_DIRECTORY_NAME, R"(C="IT",X520.State="Roma",X520.Locality="Roma",O="Sogei S.p.A.")"}));
1✔
1590
         result.test_is_true("IP", Botan::value_exists(excluded, V{BOTAN_X509_IP_ADDRESS, "0.0.0.0/0.0.0.0"}));
1✔
1591

1592
         // below are more generic general_name_t tests
1593

1594
         botan_x509_general_name_t email;
1✔
1595
         botan_x509_general_name_t dns;
1✔
1596
         botan_x509_general_name_t dn;
1✔
1597
         botan_x509_general_name_t ip;
1✔
1598
         TEST_FFI_OK(botan_x509_cert_permitted_name_constraints, (cert, 0, &email));
1✔
1599
         TEST_FFI_OK(botan_x509_cert_permitted_name_constraints, (cert, 33, &dns));
1✔
1600
         TEST_FFI_OK(botan_x509_cert_permitted_name_constraints, (cert, 47, &dn));
1✔
1601
         TEST_FFI_OK(botan_x509_cert_excluded_name_constraints, (cert, 0, &ip));
1✔
1602

1603
         unsigned int type;
1✔
1604
         TEST_FFI_OK(botan_x509_general_name_get_type, (email, &type));
1✔
1605
         result.test_enum_eq("email", static_cast<botan_x509_general_name_types>(type), BOTAN_X509_EMAIL_ADDRESS);
1✔
1606
         TEST_FFI_OK(botan_x509_general_name_get_type, (dns, &type));
1✔
1607
         result.test_enum_eq("dns", static_cast<botan_x509_general_name_types>(type), BOTAN_X509_DNS_NAME);
1✔
1608
         TEST_FFI_OK(botan_x509_general_name_get_type, (dn, &type));
1✔
1609
         result.test_enum_eq("dn", static_cast<botan_x509_general_name_types>(type), BOTAN_X509_DIRECTORY_NAME);
1✔
1610
         TEST_FFI_OK(botan_x509_general_name_get_type, (ip, &type));
1✔
1611
         result.test_enum_eq("ip", static_cast<botan_x509_general_name_types>(type), BOTAN_X509_IP_ADDRESS);
1✔
1612

1613
         ViewBytesSink bin;
1✔
1614
         ViewStringSink str;
1✔
1615

1616
         TEST_FFI_OK(botan_x509_general_name_view_string_value, (email, str.delegate(), str.callback()));
1✔
1617
         result.test_str_eq("email as expected", str.get(), "agid.gov.it");
1✔
1618
         TEST_FFI_RC(BOTAN_FFI_ERROR_INVALID_OBJECT_STATE,
1✔
1619
                     botan_x509_general_name_view_binary_value,
1620
                     (email, bin.delegate(), bin.callback()));
1621

1622
         TEST_FFI_OK(botan_x509_general_name_view_string_value, (dns, str.delegate(), str.callback()));
1✔
1623
         result.test_str_eq("dns as expected", str.get(), "agendadigitale.it");
1✔
1624
         TEST_FFI_RC(BOTAN_FFI_ERROR_INVALID_OBJECT_STATE,
1✔
1625
                     botan_x509_general_name_view_binary_value,
1626
                     (dns, bin.delegate(), bin.callback()));
1627

1628
         TEST_FFI_OK(botan_x509_general_name_view_binary_value, (dn, bin.delegate(), bin.callback()));
1✔
1629
         const auto organization = read_distinguished_name(bin.get()).get_first_attribute("O");
1✔
1630
         result.test_str_eq("dn as expected", organization, "ACI Informatica S.p.A.");
1✔
1631
         TEST_FFI_RC(BOTAN_FFI_ERROR_INVALID_OBJECT_STATE,
1✔
1632
                     botan_x509_general_name_view_string_value,
1633
                     (dn, str.delegate(), str.callback()));
1634

1635
         TEST_FFI_OK(botan_x509_general_name_view_binary_value, (ip, bin.delegate(), bin.callback()));
1✔
1636
         result.test_sz_eq("ip has correct length", bin.get().size(), 8);
1✔
1637
         TEST_FFI_OK(botan_x509_general_name_view_string_value, (ip, str.delegate(), str.callback()));
1✔
1638
         result.test_str_eq("ip has correct length", str.get(), "0.0.0.0/0.0.0.0");
1✔
1639

1640
         TEST_FFI_OK(botan_x509_general_name_destroy, (email));
1✔
1641
         TEST_FFI_OK(botan_x509_general_name_destroy, (dns));
1✔
1642
         TEST_FFI_OK(botan_x509_general_name_destroy, (dn));
1✔
1643
         TEST_FFI_OK(botan_x509_general_name_destroy, (ip));
1✔
1644

1645
         TEST_FFI_OK(botan_x509_cert_destroy, (cert));
1✔
1646
      }
1✔
1647
};
1648

1649
class FFI_Cert_AuthorityInformationAccess_Test final : public FFI_Test {
1✔
1650
   private:
1651
      static auto read_aia_string_list(Test::Result& result, botan_x509_cert_t cert, botan_x509_value_type value_type) {
3✔
1652
         std::vector<std::string> out;
3✔
1653

1654
         size_t count = 0;
3✔
1655
         TEST_FFI_OK(botan_x509_cert_view_string_values_count, (cert, value_type, &count));
3✔
1656
         for(size_t i = 0; i < count; ++i) {
8✔
1657
            TEST_FFI_OK(botan_x509_cert_view_string_values,
5✔
1658
                        (cert, value_type, i, &out, [](botan_view_ctx ctx, const char* str, size_t) -> int {
1659
                           static_cast<std::vector<std::string>*>(ctx)->emplace_back(str);
1660
                           return BOTAN_FFI_SUCCESS;
1661
                        }));
1662
         }
1663

1664
         return out;
3✔
1665
      }
×
1666

1667
   public:
1668
      std::string name() const override { return "FFI X509 Authority Information Access"; }
1✔
1669

1670
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
1671
         botan_x509_cert_t cert_with_aia;
1✔
1672
         botan_x509_cert_t cert_without_crl_dps;
1✔
1673
         if(!TEST_FFI_INIT(
1✔
1674
               botan_x509_cert_load_file,
1675
               (&cert_with_aia,
1676
                Test::data_file("x509/misc/contains_authority_info_access_with_two_ca_issuers.pem").c_str()))) {
1677
            return;
×
1678
         }
1679

1680
         if(!TEST_FFI_INIT(botan_x509_cert_load_file,
1✔
1681
                           (&cert_without_crl_dps, Test::data_file("x509/misc/no_alternative_names.pem").c_str()))) {
1682
            return;
1683
         }
1684

1685
         TEST_FFI_RC(
1✔
1686
            BOTAN_FFI_ERROR_OUT_OF_RANGE,
1687
            botan_x509_cert_view_string_values,
1688
            (cert_without_crl_dps, BOTAN_X509_CRL_DISTRIBUTION_URLS, 0, nullptr, [](auto, auto, auto) { return 0; }));
1689

1690
         const auto crl_dps = read_aia_string_list(result, cert_with_aia, BOTAN_X509_CRL_DISTRIBUTION_URLS);
1✔
1691
         result.test_sz_eq("has two CRL URI distribution points", crl_dps.size(), 2);
1✔
1692
         result.test_is_true("has expected CRL URI distribution point",
1✔
1693
                             Botan::value_exists(crl_dps, "http://crl.d-trust.net/crl/bdrive_test_ca_1-2_2017.crl"));
1✔
1694

1695
         const auto dummy_callback = [](auto, auto, auto) -> int { return BOTAN_FFI_SUCCESS; };
1✔
1696

1697
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE,
1✔
1698
                     botan_x509_cert_view_string_values,
1699
                     (cert_without_crl_dps, BOTAN_X509_OCSP_RESPONDER_URLS, 0, nullptr, dummy_callback));
1700
         TEST_FFI_RC(BOTAN_FFI_ERROR_OUT_OF_RANGE,
1✔
1701
                     botan_x509_cert_view_string_values,
1702
                     (cert_without_crl_dps, BOTAN_X509_CA_ISSUERS_URLS, 0, nullptr, dummy_callback));
1703

1704
         const auto ocsps = read_aia_string_list(result, cert_with_aia, BOTAN_X509_OCSP_RESPONDER_URLS);
1✔
1705
         result.test_is_true("OCSP responder found", Botan::value_exists(ocsps, "http://staging.ocsp.d-trust.net"));
2✔
1706

1707
         const auto cas = read_aia_string_list(result, cert_with_aia, BOTAN_X509_CA_ISSUERS_URLS);
1✔
1708
         result.test_is_true("CA issuer found",
1✔
1709
                             Botan::value_exists(cas, "http://www.d-trust.net/cgi-bin/Bdrive_Test_CA_1-2_2017.crt"));
1✔
1710

1711
         TEST_FFI_OK(botan_x509_cert_destroy, (cert_with_aia));
1✔
1712
         TEST_FFI_OK(botan_x509_cert_destroy, (cert_without_crl_dps));
1✔
1713
      }
1✔
1714
};
1715

1716
   #endif
1717

1718
class FFI_PKCS_Hashid_Test final : public FFI_Test {
1✔
1719
   public:
1720
      std::string name() const override { return "FFI PKCS hash id"; }
1✔
1721

1722
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
1723
         std::vector<uint8_t> hash_id(64);
1✔
1724
         size_t hash_id_len = hash_id.size();
1✔
1725

1726
         if(TEST_FFI_INIT(botan_pkcs_hash_id, ("SHA-256", hash_id.data(), &hash_id_len))) {
1✔
1727
            result.test_sz_eq("Expected SHA-256 PKCS hash id len", hash_id_len, 19);
1✔
1728

1729
            hash_id.resize(hash_id_len);
1✔
1730
            result.test_bin_eq("Expected SHA_256 PKCS hash id", hash_id, "3031300D060960864801650304020105000420");
1✔
1731

1732
            hash_id_len = 3;  // too short
1✔
1733
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
1734
                        botan_pkcs_hash_id,
1735
                        ("SHA-256", hash_id.data(), &hash_id_len));
1736
         }
1737
      }
1✔
1738
};
1739

1740
class FFI_CBC_Cipher_Test final : public FFI_Test {
1✔
1741
   public:
1742
      std::string name() const override { return "FFI CBC cipher"; }
1✔
1743

1744
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
1745
         botan_cipher_t cipher_encrypt;
1✔
1746
         botan_cipher_t cipher_decrypt;
1✔
1747

1748
         if(TEST_FFI_INIT(botan_cipher_init, (&cipher_encrypt, "AES-128/CBC/PKCS7", BOTAN_CIPHER_INIT_FLAG_ENCRYPT))) {
1✔
1749
            size_t min_keylen = 0;
1✔
1750
            size_t max_keylen = 0;
1✔
1751
            TEST_FFI_OK(botan_cipher_query_keylen, (cipher_encrypt, &min_keylen, &max_keylen));
1✔
1752
            result.test_sz_eq("Min key length", min_keylen, 16);
1✔
1753
            result.test_sz_eq("Max key length", max_keylen, 16);
1✔
1754

1755
            // from https://github.com/geertj/bluepass/blob/master/tests/vectors/aes-cbc-pkcs7.txt
1756
            const std::vector<uint8_t> plaintext =
1✔
1757
               Botan::hex_decode("0397f4f6820b1f9386f14403be5ac16e50213bd473b4874b9bcbf5f318ee686b1d");
1✔
1758
            const std::vector<uint8_t> symkey = Botan::hex_decode("898be9cc5004ed0fa6e117c9a3099d31");
1✔
1759
            const std::vector<uint8_t> nonce = Botan::hex_decode("9dea7621945988f96491083849b068df");
1✔
1760
            const std::vector<uint8_t> exp_ciphertext = Botan::hex_decode(
1✔
1761
               "e232cd6ef50047801ee681ec30f61d53cfd6b0bca02fd03c1b234baa10ea82ac9dab8b960926433a19ce6dea08677e34");
1✔
1762

1763
            size_t output_written = 0;
1✔
1764
            size_t input_consumed = 0;
1✔
1765

1766
            // Test that after clear or final the object can be reused
1767
            for(size_t r = 0; r != 2; ++r) {
3✔
1768
               size_t ctext_len;
2✔
1769
               TEST_FFI_OK(botan_cipher_output_length, (cipher_encrypt, plaintext.size(), &ctext_len));
2✔
1770
               result.test_sz_eq("Expected size of padded message", ctext_len, plaintext.size() + 15);
2✔
1771
               std::vector<uint8_t> ciphertext(ctext_len);
2✔
1772

1773
               size_t update_granularity = 0;
2✔
1774
               size_t ideal_granularity = 0;
2✔
1775
               size_t taglen = 0;
2✔
1776

1777
               TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_encrypt, &update_granularity));
2✔
1778
               TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_encrypt, &ideal_granularity));
2✔
1779
               TEST_FFI_OK(botan_cipher_get_tag_length, (cipher_encrypt, &taglen));
2✔
1780

1781
               result.test_sz_eq(
2✔
1782
                  "ideal granularity is a multiple of update granularity", ideal_granularity % update_granularity, 0);
1783
               result.test_sz_eq("not an AEAD, hence no tag", taglen, 0);
2✔
1784

1785
               TEST_FFI_OK(botan_cipher_set_key, (cipher_encrypt, symkey.data(), symkey.size()));
2✔
1786
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, nonce.data(), nonce.size()));
2✔
1787
               TEST_FFI_OK(botan_cipher_update,
2✔
1788
                           (cipher_encrypt,
1789
                            0,
1790
                            ciphertext.data(),
1791
                            ciphertext.size(),
1792
                            &output_written,
1793
                            plaintext.data(),
1794
                            plaintext.size(),
1795
                            &input_consumed));
1796
               TEST_FFI_OK(botan_cipher_clear, (cipher_encrypt));
2✔
1797

1798
               TEST_FFI_OK(botan_cipher_set_key, (cipher_encrypt, symkey.data(), symkey.size()));
2✔
1799
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, nonce.data(), nonce.size()));
2✔
1800
               TEST_FFI_OK(botan_cipher_update,
2✔
1801
                           (cipher_encrypt,
1802
                            BOTAN_CIPHER_UPDATE_FLAG_FINAL,
1803
                            ciphertext.data(),
1804
                            ciphertext.size(),
1805
                            &output_written,
1806
                            plaintext.data(),
1807
                            plaintext.size(),
1808
                            &input_consumed));
1809

1810
               ciphertext.resize(output_written);
2✔
1811
               result.test_bin_eq("AES/CBC ciphertext", ciphertext, exp_ciphertext);
2✔
1812

1813
               if(TEST_FFI_OK(botan_cipher_init, (&cipher_decrypt, "AES-128/CBC", BOTAN_CIPHER_INIT_FLAG_DECRYPT))) {
2✔
1814
                  size_t ptext_len;
2✔
1815
                  TEST_FFI_OK(botan_cipher_output_length, (cipher_decrypt, ciphertext.size(), &ptext_len));
2✔
1816
                  std::vector<uint8_t> decrypted(ptext_len);
2✔
1817

1818
                  TEST_FFI_RC(0, botan_cipher_is_authenticated, (cipher_encrypt));
2✔
1819

1820
                  TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_decrypt, &update_granularity));
2✔
1821
                  TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_decrypt, &ideal_granularity));
2✔
1822
                  TEST_FFI_OK(botan_cipher_get_tag_length, (cipher_decrypt, &taglen));
2✔
1823

1824
                  result.test_sz_eq("ideal granularity is a multiple of update granularity (decrypt)",
2✔
1825
                                    ideal_granularity % update_granularity,
1826
                                    0);
1827
                  result.test_sz_eq("not an AEAD, hence no tag (decrypt)", taglen, 0);
2✔
1828

1829
                  TEST_FFI_OK(botan_cipher_set_key, (cipher_decrypt, symkey.data(), symkey.size()));
2✔
1830
                  TEST_FFI_OK(botan_cipher_start, (cipher_decrypt, nonce.data(), nonce.size()));
2✔
1831
                  TEST_FFI_OK(botan_cipher_update,
2✔
1832
                              (cipher_decrypt,
1833
                               BOTAN_CIPHER_UPDATE_FLAG_FINAL,
1834
                               decrypted.data(),
1835
                               decrypted.size(),
1836
                               &output_written,
1837
                               ciphertext.data(),
1838
                               ciphertext.size(),
1839
                               &input_consumed));
1840

1841
                  decrypted.resize(output_written);
2✔
1842

1843
                  result.test_bin_eq("AES/CBC plaintext", decrypted, plaintext);
2✔
1844

1845
                  TEST_FFI_OK(botan_cipher_destroy, (cipher_decrypt));
2✔
1846
               }
2✔
1847
            }
2✔
1848

1849
            TEST_FFI_OK(botan_cipher_destroy, (cipher_encrypt));
1✔
1850
         }
1✔
1851
      }
1✔
1852
};
1853

1854
class FFI_GCM_Test final : public FFI_Test {
1✔
1855
   public:
1856
      std::string name() const override { return "FFI GCM"; }
1✔
1857

1858
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
1859
         botan_cipher_t cipher_encrypt;
1✔
1860
         botan_cipher_t cipher_decrypt;
1✔
1861

1862
         if(TEST_FFI_INIT(botan_cipher_init, (&cipher_encrypt, "AES-128/GCM", BOTAN_CIPHER_INIT_FLAG_ENCRYPT))) {
1✔
1863
            std::array<char, 18> namebuf{};
1✔
1864
            size_t name_len = 15;
1✔
1865
            TEST_FFI_FAIL("output buffer too short", botan_cipher_name, (cipher_encrypt, namebuf.data(), &name_len));
1✔
1866
            result.test_sz_eq("name len", name_len, 16);
1✔
1867

1868
            name_len = namebuf.size();
1✔
1869
            if(TEST_FFI_OK(botan_cipher_name, (cipher_encrypt, namebuf.data(), &name_len))) {
1✔
1870
               result.test_sz_eq("name len", name_len, 16);
1✔
1871
               result.test_str_eq("name", namebuf.data(), "AES-128/GCM(16)");
1✔
1872
            }
1873

1874
            size_t min_keylen = 0;
1✔
1875
            size_t max_keylen = 0;
1✔
1876
            size_t nonce_len = 0;
1✔
1877
            size_t tag_len = 0;
1✔
1878
            size_t update_granularity = 0;
1✔
1879
            size_t ideal_granularity = 0;
1✔
1880

1881
            TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_encrypt, &update_granularity));
1✔
1882
            TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_encrypt, &ideal_granularity));
1✔
1883

1884
            result.test_sz_eq(
1✔
1885
               "ideal granularity is a multiple of update granularity", ideal_granularity % update_granularity, 0);
1886

1887
            TEST_FFI_OK(botan_cipher_query_keylen, (cipher_encrypt, &min_keylen, &max_keylen));
1✔
1888
            result.test_sz_eq("Min key length", min_keylen, 16);
1✔
1889
            result.test_sz_eq("Max key length", max_keylen, 16);
1✔
1890

1891
            TEST_FFI_OK(botan_cipher_get_default_nonce_length, (cipher_encrypt, &nonce_len));
1✔
1892
            result.test_sz_eq("Expected default GCM nonce length", nonce_len, 12);
1✔
1893

1894
            TEST_FFI_OK(botan_cipher_get_tag_length, (cipher_encrypt, &tag_len));
1✔
1895
            result.test_sz_eq("Expected GCM tag length", tag_len, 16);
1✔
1896

1897
            TEST_FFI_RC(1, botan_cipher_is_authenticated, (cipher_encrypt));
1✔
1898

1899
            TEST_FFI_RC(1, botan_cipher_valid_nonce_length, (cipher_encrypt, 12));
1✔
1900
            // GCM accepts any nonce size except zero
1901
            TEST_FFI_RC(0, botan_cipher_valid_nonce_length, (cipher_encrypt, 0));
1✔
1902
            TEST_FFI_RC(1, botan_cipher_valid_nonce_length, (cipher_encrypt, 1));
1✔
1903
            TEST_FFI_RC(1, botan_cipher_valid_nonce_length, (cipher_encrypt, 100009));
1✔
1904

1905
            // NIST test vector
1906
            const std::vector<uint8_t> plaintext = Botan::hex_decode(
1✔
1907
               "D9313225F88406E5A55909C5AFF5269A86A7A9531534F7DA2E4C303D8A318A721C3C0C95956809532FCF0E2449A6B525B16AEDF5AA0DE657BA637B39");
1✔
1908

1909
            const std::vector<uint8_t> symkey = Botan::hex_decode("FEFFE9928665731C6D6A8F9467308308");
1✔
1910
            const std::vector<uint8_t> nonce = Botan::hex_decode("CAFEBABEFACEDBADDECAF888");
1✔
1911
            const std::vector<uint8_t> exp_ciphertext = Botan::hex_decode(
1✔
1912
               "42831EC2217774244B7221B784D0D49CE3AA212F2C02A4E035C17E2329ACA12E21D514B25466931C7D8F6A5AAC84AA051BA30B396A0AAC973D58E0915BC94FBC3221A5DB94FAE95AE7121A47");
1✔
1913
            const std::vector<uint8_t> aad = Botan::hex_decode("FEEDFACEDEADBEEFFEEDFACEDEADBEEFABADDAD2");
1✔
1914

1915
            std::vector<uint8_t> ciphertext(tag_len + plaintext.size());
1✔
1916

1917
            size_t output_written = 0;
1✔
1918
            size_t input_consumed = 0;
1✔
1919

1920
            // Test that after clear or final the object can be reused
1921
            for(size_t r = 0; r != 2; ++r) {
3✔
1922
               TEST_FFI_OK(botan_cipher_set_key, (cipher_encrypt, symkey.data(), symkey.size()));
2✔
1923

1924
               // First use a nonce of the AAD, and ensure reset works
1925
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, aad.data(), aad.size()));
2✔
1926
               TEST_FFI_OK(botan_cipher_reset, (cipher_encrypt));
2✔
1927

1928
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, nonce.data(), nonce.size()));
2✔
1929
               TEST_FFI_OK(botan_cipher_update,
2✔
1930
                           (cipher_encrypt,
1931
                            0,
1932
                            ciphertext.data(),
1933
                            ciphertext.size(),
1934
                            &output_written,
1935
                            plaintext.data(),
1936
                            plaintext.size(),
1937
                            &input_consumed));
1938
               TEST_FFI_OK(botan_cipher_clear, (cipher_encrypt));
2✔
1939

1940
               TEST_FFI_OK(botan_cipher_set_key, (cipher_encrypt, symkey.data(), symkey.size()));
2✔
1941
               TEST_FFI_OK(botan_cipher_set_associated_data, (cipher_encrypt, aad.data(), aad.size()));
2✔
1942
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, nonce.data(), nonce.size()));
2✔
1943
               TEST_FFI_OK(botan_cipher_update,
2✔
1944
                           (cipher_encrypt,
1945
                            BOTAN_CIPHER_UPDATE_FLAG_FINAL,
1946
                            ciphertext.data(),
1947
                            ciphertext.size(),
1948
                            &output_written,
1949
                            plaintext.data(),
1950
                            plaintext.size(),
1951
                            &input_consumed));
1952

1953
               ciphertext.resize(output_written);
2✔
1954
               result.test_bin_eq("AES/GCM ciphertext", ciphertext, exp_ciphertext);
2✔
1955

1956
               if(TEST_FFI_OK(botan_cipher_init, (&cipher_decrypt, "AES-128/GCM", BOTAN_CIPHER_INIT_FLAG_DECRYPT))) {
2✔
1957
                  std::vector<uint8_t> decrypted(plaintext.size());
2✔
1958

1959
                  TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_decrypt, &update_granularity));
2✔
1960
                  TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_decrypt, &ideal_granularity));
2✔
1961

1962
                  result.test_sz_eq("ideal granularity is a multiple of update granularity (decrypt)",
2✔
1963
                                    ideal_granularity % update_granularity,
1964
                                    0);
1965

1966
                  TEST_FFI_OK(botan_cipher_set_key, (cipher_decrypt, symkey.data(), symkey.size()));
2✔
1967
                  TEST_FFI_OK(botan_cipher_set_associated_data, (cipher_decrypt, aad.data(), aad.size()));
2✔
1968
                  TEST_FFI_OK(botan_cipher_start, (cipher_decrypt, nonce.data(), nonce.size()));
2✔
1969
                  TEST_FFI_OK(botan_cipher_update,
2✔
1970
                              (cipher_decrypt,
1971
                               BOTAN_CIPHER_UPDATE_FLAG_FINAL,
1972
                               decrypted.data(),
1973
                               decrypted.size(),
1974
                               &output_written,
1975
                               ciphertext.data(),
1976
                               ciphertext.size(),
1977
                               &input_consumed));
1978

1979
                  result.test_sz_eq("All input consumed", input_consumed, ciphertext.size());
2✔
1980
                  result.test_sz_eq("Expected output size produced", output_written, decrypted.size());
2✔
1981
                  result.test_bin_eq("AES/GCM plaintext", decrypted, plaintext);
2✔
1982

1983
                  TEST_FFI_OK(botan_cipher_destroy, (cipher_decrypt));
2✔
1984
               }
2✔
1985
            }
1986

1987
            TEST_FFI_OK(botan_cipher_destroy, (cipher_encrypt));
1✔
1988
         }
1✔
1989
      }
1✔
1990
};
1991

1992
class FFI_ChaCha20Poly1305_Test final : public FFI_Test {
1✔
1993
   public:
1994
      std::string name() const override { return "FFI ChaCha20Poly1305"; }
1✔
1995

1996
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
1997
         botan_cipher_t cipher_encrypt;
1✔
1998
         botan_cipher_t cipher_decrypt;
1✔
1999

2000
         if(TEST_FFI_INIT(botan_cipher_init, (&cipher_encrypt, "ChaCha20Poly1305", BOTAN_CIPHER_INIT_FLAG_ENCRYPT))) {
1✔
2001
            std::array<char, 17> namebuf{};
1✔
2002
            size_t name_len = 15;
1✔
2003
            TEST_FFI_FAIL("output buffer too short", botan_cipher_name, (cipher_encrypt, namebuf.data(), &name_len));
1✔
2004
            result.test_sz_eq("name len", name_len, 17);
1✔
2005

2006
            name_len = namebuf.size();
1✔
2007
            if(TEST_FFI_OK(botan_cipher_name, (cipher_encrypt, namebuf.data(), &name_len))) {
1✔
2008
               result.test_sz_eq("name len", name_len, 17);
1✔
2009
               result.test_str_eq("name", std::string(namebuf.data()), "ChaCha20Poly1305");
1✔
2010
            }
2011

2012
            size_t min_keylen = 0;
1✔
2013
            size_t max_keylen = 0;
1✔
2014
            size_t nonce_len = 0;
1✔
2015
            size_t tag_len = 0;
1✔
2016
            size_t update_granularity = 0;
1✔
2017
            size_t ideal_granularity = 0;
1✔
2018

2019
            TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_encrypt, &update_granularity));
1✔
2020
            TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_encrypt, &ideal_granularity));
1✔
2021

2022
            result.test_sz_eq(
1✔
2023
               "ideal granularity is a multiple of update granularity", ideal_granularity % update_granularity, 0);
2024

2025
            TEST_FFI_OK(botan_cipher_query_keylen, (cipher_encrypt, &min_keylen, &max_keylen));
1✔
2026
            result.test_sz_eq("Min key length", min_keylen, 32);
1✔
2027
            result.test_sz_eq("Max key length", max_keylen, 32);
1✔
2028

2029
            TEST_FFI_OK(botan_cipher_get_default_nonce_length, (cipher_encrypt, &nonce_len));
1✔
2030
            result.test_sz_eq("Expected default ChaCha20Poly1305 nonce length", nonce_len, 12);
1✔
2031

2032
            TEST_FFI_OK(botan_cipher_get_tag_length, (cipher_encrypt, &tag_len));
1✔
2033
            result.test_sz_eq("Expected Chacha20Poly1305 tag length", tag_len, 16);
1✔
2034

2035
            TEST_FFI_RC(1, botan_cipher_is_authenticated, (cipher_encrypt));
1✔
2036

2037
            // From RFC 7539
2038
            const std::vector<uint8_t> plaintext = Botan::hex_decode(
1✔
2039
               "4C616469657320616E642047656E746C656D656E206F662074686520636C617373206F66202739393A204966204920636F756C64206F6666657220796F75206F6E6C79206F6E652074697020666F7220746865206675747572652C2073756E73637265656E20776F756C642062652069742E");
1✔
2040
            const std::vector<uint8_t> symkey =
1✔
2041
               Botan::hex_decode("808182838485868788898A8B8C8D8E8F909192939495969798999A9B9C9D9E9F");
1✔
2042
            const std::vector<uint8_t> nonce = Botan::hex_decode("070000004041424344454647");
1✔
2043
            const std::vector<uint8_t> exp_ciphertext = Botan::hex_decode(
1✔
2044
               "D31A8D34648E60DB7B86AFBC53EF7EC2A4ADED51296E08FEA9E2B5A736EE62D63DBEA45E8CA9671282FAFB69DA92728B1A71DE0A9E060B2905D6A5B67ECD3B3692DDBD7F2D778B8C9803AEE328091B58FAB324E4FAD675945585808B4831D7BC3FF4DEF08E4B7A9DE576D26586CEC64B61161AE10B594F09E26A7E902ECBD0600691");
1✔
2045
            const std::vector<uint8_t> aad = Botan::hex_decode("50515253C0C1C2C3C4C5C6C7");
1✔
2046

2047
            std::vector<uint8_t> ciphertext(tag_len + plaintext.size());
1✔
2048

2049
            size_t output_written = 0;
1✔
2050
            size_t input_consumed = 0;
1✔
2051

2052
            // Test that after clear or final the object can be reused
2053
            for(size_t r = 0; r != 2; ++r) {
3✔
2054
               TEST_FFI_OK(botan_cipher_set_key, (cipher_encrypt, symkey.data(), symkey.size()));
2✔
2055

2056
               // First use a nonce of the AAD, and ensure reset works
2057
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, aad.data(), aad.size()));
2✔
2058
               TEST_FFI_OK(botan_cipher_reset, (cipher_encrypt));
2✔
2059

2060
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, nonce.data(), nonce.size()));
2✔
2061
               TEST_FFI_OK(botan_cipher_update,
2✔
2062
                           (cipher_encrypt,
2063
                            0,
2064
                            ciphertext.data(),
2065
                            ciphertext.size(),
2066
                            &output_written,
2067
                            plaintext.data(),
2068
                            plaintext.size(),
2069
                            &input_consumed));
2070
               TEST_FFI_OK(botan_cipher_clear, (cipher_encrypt));
2✔
2071

2072
               TEST_FFI_OK(botan_cipher_set_key, (cipher_encrypt, symkey.data(), symkey.size()));
2✔
2073
               TEST_FFI_OK(botan_cipher_set_associated_data, (cipher_encrypt, aad.data(), aad.size()));
2✔
2074
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, nonce.data(), nonce.size()));
2✔
2075
               TEST_FFI_OK(botan_cipher_update,
2✔
2076
                           (cipher_encrypt,
2077
                            BOTAN_CIPHER_UPDATE_FLAG_FINAL,
2078
                            ciphertext.data(),
2079
                            ciphertext.size(),
2080
                            &output_written,
2081
                            plaintext.data(),
2082
                            plaintext.size(),
2083
                            &input_consumed));
2084

2085
               ciphertext.resize(output_written);
2✔
2086
               result.test_bin_eq("AES/GCM ciphertext", ciphertext, exp_ciphertext);
2✔
2087

2088
               if(TEST_FFI_OK(botan_cipher_init,
2✔
2089
                              (&cipher_decrypt, "ChaCha20Poly1305", BOTAN_CIPHER_INIT_FLAG_DECRYPT))) {
2090
                  std::vector<uint8_t> decrypted(plaintext.size());
2✔
2091

2092
                  TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_decrypt, &update_granularity));
2✔
2093
                  TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_decrypt, &ideal_granularity));
2✔
2094

2095
                  result.test_sz_eq("ideal granularity is a multiple of update granularity (decrypt)",
2✔
2096
                                    ideal_granularity % update_granularity,
2097
                                    0);
2098

2099
                  TEST_FFI_OK(botan_cipher_set_key, (cipher_decrypt, symkey.data(), symkey.size()));
2✔
2100
                  TEST_FFI_OK(botan_cipher_set_associated_data, (cipher_decrypt, aad.data(), aad.size()));
2✔
2101
                  TEST_FFI_OK(botan_cipher_start, (cipher_decrypt, nonce.data(), nonce.size()));
2✔
2102
                  TEST_FFI_OK(botan_cipher_update,
2✔
2103
                              (cipher_decrypt,
2104
                               BOTAN_CIPHER_UPDATE_FLAG_FINAL,
2105
                               decrypted.data(),
2106
                               decrypted.size(),
2107
                               &output_written,
2108
                               ciphertext.data(),
2109
                               ciphertext.size(),
2110
                               &input_consumed));
2111

2112
                  result.test_sz_eq("All input consumed", input_consumed, ciphertext.size());
2✔
2113
                  result.test_sz_eq("Expected output size produced", output_written, decrypted.size());
2✔
2114
                  result.test_bin_eq("AES/GCM plaintext", decrypted, plaintext);
2✔
2115

2116
                  TEST_FFI_OK(botan_cipher_destroy, (cipher_decrypt));
2✔
2117
               }
2✔
2118
            }
2119

2120
            TEST_FFI_OK(botan_cipher_destroy, (cipher_encrypt));
1✔
2121
         }
1✔
2122
      }
1✔
2123
};
2124

2125
class FFI_EAX_Test final : public FFI_Test {
1✔
2126
   public:
2127
      std::string name() const override { return "FFI EAX"; }
1✔
2128

2129
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2130
         botan_cipher_t cipher_encrypt;
1✔
2131
         botan_cipher_t cipher_decrypt;
1✔
2132

2133
         if(TEST_FFI_INIT(botan_cipher_init, (&cipher_encrypt, "AES-128/EAX", BOTAN_CIPHER_INIT_FLAG_ENCRYPT))) {
1✔
2134
            size_t min_keylen = 0;
1✔
2135
            size_t max_keylen = 0;
1✔
2136
            size_t mod_keylen = 0;
1✔
2137
            size_t nonce_len = 0;
1✔
2138
            size_t tag_len = 0;
1✔
2139
            size_t update_granularity = 0;
1✔
2140
            size_t ideal_granularity = 0;
1✔
2141

2142
            TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_encrypt, &update_granularity));
1✔
2143
            TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_encrypt, &ideal_granularity));
1✔
2144

2145
            result.test_sz_eq(
1✔
2146
               "ideal granularity is a multiple of update granularity", ideal_granularity % update_granularity, 0);
2147

2148
            TEST_FFI_OK(botan_cipher_query_keylen, (cipher_encrypt, &min_keylen, &max_keylen));
1✔
2149
            result.test_sz_eq("Min key length", min_keylen, 16);
1✔
2150
            result.test_sz_eq("Max key length", max_keylen, 16);
1✔
2151

2152
            TEST_FFI_OK(botan_cipher_get_keyspec, (cipher_encrypt, &min_keylen, &max_keylen, &mod_keylen));
1✔
2153
            result.test_sz_eq("Min key length", min_keylen, 16);
1✔
2154
            result.test_sz_eq("Max key length", max_keylen, 16);
1✔
2155
            result.test_sz_eq("Mod key length", mod_keylen, 1);
1✔
2156

2157
            TEST_FFI_OK(botan_cipher_get_default_nonce_length, (cipher_encrypt, &nonce_len));
1✔
2158
            result.test_sz_eq("Expected default EAX nonce length", nonce_len, 12);
1✔
2159

2160
            TEST_FFI_OK(botan_cipher_get_tag_length, (cipher_encrypt, &tag_len));
1✔
2161
            result.test_sz_eq("Expected EAX tag length", tag_len, 16);
1✔
2162

2163
            TEST_FFI_RC(1, botan_cipher_is_authenticated, (cipher_encrypt));
1✔
2164

2165
            TEST_FFI_RC(1, botan_cipher_valid_nonce_length, (cipher_encrypt, 12));
1✔
2166
            // EAX accepts any nonce size...
2167
            TEST_FFI_RC(1, botan_cipher_valid_nonce_length, (cipher_encrypt, 0));
1✔
2168

2169
            const std::vector<uint8_t> plaintext =
1✔
2170
               Botan::hex_decode("0000000000000000000000000000000011111111111111111111111111111111");
1✔
2171
            const std::vector<uint8_t> symkey = Botan::hex_decode("000102030405060708090a0b0c0d0e0f");
1✔
2172
            const std::vector<uint8_t> nonce = Botan::hex_decode("3c8cc2970a008f75cc5beae2847258c2");
1✔
2173
            const std::vector<uint8_t> exp_ciphertext = Botan::hex_decode(
1✔
2174
               "3c441f32ce07822364d7a2990e50bb13d7b02a26969e4a937e5e9073b0d9c968db90bdb3da3d00afd0fc6a83551da95e");
1✔
2175

2176
            std::vector<uint8_t> ciphertext(tag_len + plaintext.size());
1✔
2177

2178
            size_t output_written = 0;
1✔
2179
            size_t input_consumed = 0;
1✔
2180

2181
            // Test that after clear or final the object can be reused
2182
            for(size_t r = 0; r != 2; ++r) {
3✔
2183
               TEST_FFI_OK(botan_cipher_set_key, (cipher_encrypt, symkey.data(), symkey.size()));
2✔
2184
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, nonce.data(), nonce.size()));
2✔
2185
               TEST_FFI_OK(botan_cipher_update,
2✔
2186
                           (cipher_encrypt,
2187
                            0,
2188
                            ciphertext.data(),
2189
                            ciphertext.size(),
2190
                            &output_written,
2191
                            plaintext.data(),
2192
                            plaintext.size(),
2193
                            &input_consumed));
2194
               TEST_FFI_OK(botan_cipher_clear, (cipher_encrypt));
2✔
2195

2196
               TEST_FFI_OK(botan_cipher_set_key, (cipher_encrypt, symkey.data(), symkey.size()));
2✔
2197
               TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, nonce.data(), nonce.size()));
2✔
2198
               TEST_FFI_OK(botan_cipher_update,
2✔
2199
                           (cipher_encrypt,
2200
                            BOTAN_CIPHER_UPDATE_FLAG_FINAL,
2201
                            ciphertext.data(),
2202
                            ciphertext.size(),
2203
                            &output_written,
2204
                            plaintext.data(),
2205
                            plaintext.size(),
2206
                            &input_consumed));
2207

2208
               ciphertext.resize(output_written);
2✔
2209
               result.test_bin_eq("AES/EAX ciphertext", ciphertext, exp_ciphertext);
2✔
2210

2211
               if(TEST_FFI_OK(botan_cipher_init, (&cipher_decrypt, "AES-128/EAX", BOTAN_CIPHER_INIT_FLAG_DECRYPT))) {
2✔
2212
                  std::vector<uint8_t> decrypted(plaintext.size());
2✔
2213

2214
                  TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_decrypt, &update_granularity));
2✔
2215
                  TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_decrypt, &ideal_granularity));
2✔
2216

2217
                  result.test_sz_eq("ideal granularity is a multiple of update granularity (decrypt)",
2✔
2218
                                    ideal_granularity % update_granularity,
2219
                                    0);
2220

2221
                  TEST_FFI_OK(botan_cipher_set_key, (cipher_decrypt, symkey.data(), symkey.size()));
2✔
2222
                  TEST_FFI_OK(botan_cipher_start, (cipher_decrypt, nonce.data(), nonce.size()));
2✔
2223
                  TEST_FFI_OK(botan_cipher_update,
2✔
2224
                              (cipher_decrypt,
2225
                               BOTAN_CIPHER_UPDATE_FLAG_FINAL,
2226
                               decrypted.data(),
2227
                               decrypted.size(),
2228
                               &output_written,
2229
                               ciphertext.data(),
2230
                               ciphertext.size(),
2231
                               &input_consumed));
2232

2233
                  result.test_sz_eq("All input consumed", input_consumed, ciphertext.size());
2✔
2234
                  result.test_sz_eq("Expected output size produced", output_written, decrypted.size());
2✔
2235
                  result.test_bin_eq("AES/EAX plaintext", decrypted, plaintext);
2✔
2236

2237
                  TEST_FFI_OK(botan_cipher_destroy, (cipher_decrypt));
2✔
2238
               }
2✔
2239
            }
2240

2241
            TEST_FFI_OK(botan_cipher_destroy, (cipher_encrypt));
1✔
2242
         }
1✔
2243
      }
1✔
2244
};
2245

2246
class FFI_AEAD_Test final : public FFI_Test {
1✔
2247
   public:
2248
      std::string name() const override { return "FFI AEAD"; }
1✔
2249

2250
      void ffi_test(Test::Result& merged_result, botan_rng_t rng) override {
1✔
2251
         botan_cipher_t cipher_encrypt;
1✔
2252
         botan_cipher_t cipher_decrypt;
1✔
2253

2254
         const std::array<std::string, 5> aeads = {
1✔
2255
            "AES-128/GCM", "ChaCha20Poly1305", "AES-128/EAX", "AES-256/SIV", "AES-128/CCM"};
1✔
2256

2257
         for(const std::string& aead : aeads) {
6✔
2258
            Test::Result result(Botan::fmt("AEAD {}", aead));
5✔
2259

2260
            if(!TEST_FFI_INIT(botan_cipher_init, (&cipher_encrypt, aead.c_str(), BOTAN_CIPHER_INIT_FLAG_ENCRYPT))) {
5✔
2261
               continue;
×
2262
            }
2263

2264
            if(botan_cipher_is_authenticated(cipher_encrypt) == 0) {
5✔
2265
               result.test_failure("Cipher " + aead + " claims is not authenticated");
×
2266
               botan_cipher_destroy(cipher_encrypt);
×
2267
               continue;
×
2268
            }
2269

2270
            size_t min_keylen = 0;
5✔
2271
            size_t max_keylen = 0;
5✔
2272
            size_t update_granularity = 0;
5✔
2273
            size_t ideal_granularity = 0;
5✔
2274
            size_t noncelen = 0;
5✔
2275
            size_t taglen = 0;
5✔
2276
            constexpr size_t pt_multiplier = 5;
5✔
2277
            TEST_FFI_OK(botan_cipher_query_keylen, (cipher_encrypt, &min_keylen, &max_keylen));
5✔
2278
            TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_encrypt, &update_granularity));
5✔
2279
            TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_encrypt, &ideal_granularity));
5✔
2280
            TEST_FFI_OK(botan_cipher_get_default_nonce_length, (cipher_encrypt, &noncelen));
5✔
2281
            TEST_FFI_OK(botan_cipher_get_tag_length, (cipher_encrypt, &taglen));
5✔
2282

2283
            result.test_sz_eq(
5✔
2284
               "ideal granularity is a multiple of update granularity", ideal_granularity % update_granularity, 0);
2285

2286
            std::vector<uint8_t> key(max_keylen);
5✔
2287
            TEST_FFI_OK(botan_rng_get, (rng, key.data(), key.size()));
5✔
2288
            TEST_FFI_OK(botan_cipher_set_key, (cipher_encrypt, key.data(), key.size()));
5✔
2289

2290
            std::vector<uint8_t> nonce(noncelen);
5✔
2291
            TEST_FFI_OK(botan_rng_get, (rng, nonce.data(), nonce.size()));
5✔
2292
            TEST_FFI_OK(botan_cipher_start, (cipher_encrypt, nonce.data(), nonce.size()));
5✔
2293

2294
            std::vector<uint8_t> plaintext(ideal_granularity * pt_multiplier);
5✔
2295
            std::vector<uint8_t> ciphertext(ideal_granularity * pt_multiplier + taglen);
5✔
2296
            TEST_FFI_OK(botan_rng_get, (rng, plaintext.data(), plaintext.size()));
5✔
2297

2298
            std::vector<uint8_t> dummy_buffer(1024);
5✔
2299
            TEST_FFI_OK(botan_rng_get, (rng, dummy_buffer.data(), dummy_buffer.size()));
5✔
2300
            std::vector<uint8_t> dummy_buffer_reference = dummy_buffer;
5✔
2301

2302
            const bool requires_entire_message = botan_cipher_requires_entire_message(cipher_encrypt) == 1;
5✔
2303
            result.test_bool_eq(
5✔
2304
               "requires entire message", requires_entire_message, (aead == "AES-256/SIV" || aead == "AES-128/CCM"));
5✔
2305

2306
            std::span<const uint8_t> pt_slicer(plaintext);
5✔
2307
            std::span<uint8_t> ct_stuffer(ciphertext);
5✔
2308

2309
            // Process data that is explicitly a multiple of the ideal
2310
            // granularity and therefore should be aligned with the cipher's
2311
            // internal block size.
2312
            for(size_t i = 0; i < pt_multiplier; ++i) {
30✔
2313
               size_t output_written = 0;
25✔
2314
               size_t input_consumed = 0;
25✔
2315

2316
               auto pt_chunk = pt_slicer.first(ideal_granularity);
25✔
2317

2318
               // The existing implementation won't consume any bytes from the
2319
               // input if there is no space in the output buffer. Even when
2320
               // the cipher is a mode that won't produce any output until the
2321
               // entire message is processed. Hence, give it some dummy buffer.
2322
               BOTAN_ASSERT_NOMSG(dummy_buffer.size() > ideal_granularity);
25✔
2323
               auto ct_chunk = (requires_entire_message) ? std::span(dummy_buffer).first(ideal_granularity)
25✔
2324
                                                         : ct_stuffer.first(ideal_granularity);
2325

2326
               TEST_FFI_OK(botan_cipher_update,
25✔
2327
                           (cipher_encrypt,
2328
                            0 /* don't finalize */,
2329
                            ct_chunk.data(),
2330
                            ct_chunk.size(),
2331
                            &output_written,
2332
                            pt_chunk.data(),
2333
                            pt_chunk.size(),
2334
                            &input_consumed));
2335

2336
               result.test_sz_gt("some input consumed", input_consumed, 0);
25✔
2337
               result.test_sz_lte("at most, all input consumed", input_consumed, pt_chunk.size());
25✔
2338
               pt_slicer = pt_slicer.subspan(input_consumed);
25✔
2339

2340
               if(requires_entire_message) {
25✔
2341
                  result.test_sz_eq("no output produced", output_written, 0);
10✔
2342
               } else {
2343
                  result.test_sz_eq("all bytes produced", output_written, input_consumed);
15✔
2344
                  ct_stuffer = ct_stuffer.subspan(output_written);
15✔
2345
               }
2346
            }
2347

2348
            // Trying to pull a part of the authentication tag should fail,
2349
            // as we must consume the entire tag in a single invocation to
2350
            // botan_cipher_update().
2351
            size_t final_output_written = 42;
5✔
2352
            size_t final_input_consumed = 1337;
5✔
2353
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
5✔
2354
                        botan_cipher_update,
2355
                        (cipher_encrypt,
2356
                         BOTAN_CIPHER_UPDATE_FLAG_FINAL,
2357
                         dummy_buffer.data(),
2358
                         3, /* not enough to hold any reasonable auth'n tag */
2359
                         &final_output_written,
2360
                         pt_slicer.data(),  // remaining bytes (typically 0)
2361
                         pt_slicer.size(),
2362
                         &final_input_consumed));
2363

2364
            const size_t expected_final_size = requires_entire_message ? ciphertext.size() : taglen + pt_slicer.size();
5✔
2365

2366
            result.test_sz_eq("remaining bytes consumed in bogus final", final_input_consumed, pt_slicer.size());
5✔
2367
            result.test_sz_eq(
5✔
2368
               "required buffer size is written in bogus final", final_output_written, expected_final_size);
2369

2370
            auto final_ct_chunk = ct_stuffer.first(expected_final_size);
5✔
2371

2372
            TEST_FFI_OK(botan_cipher_update,
5✔
2373
                        (cipher_encrypt,
2374
                         BOTAN_CIPHER_UPDATE_FLAG_FINAL,
2375
                         final_ct_chunk.data(),
2376
                         final_ct_chunk.size(),
2377
                         &final_output_written,
2378
                         nullptr,  // no more input
2379
                         0,
2380
                         &final_input_consumed));
2381

2382
            result.test_sz_eq("no bytes consumed in final", final_input_consumed, 0);
5✔
2383
            result.test_sz_eq("final bytes written", final_output_written, expected_final_size);
5✔
2384
            result.test_bin_eq("dummy buffer unchanged", dummy_buffer, dummy_buffer_reference);
5✔
2385

2386
            TEST_FFI_OK(botan_cipher_destroy, (cipher_encrypt));
5✔
2387

2388
            // ----------------------------------------------------------------
2389

2390
            TEST_FFI_INIT(botan_cipher_init, (&cipher_decrypt, aead.c_str(), BOTAN_CIPHER_INIT_FLAG_DECRYPT));
5✔
2391

2392
            TEST_FFI_OK(botan_cipher_get_update_granularity, (cipher_decrypt, &update_granularity));
5✔
2393
            TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (cipher_decrypt, &ideal_granularity));
5✔
2394

2395
            result.test_sz_eq("ideal granularity is a multiple of update granularity (decrypt)",
5✔
2396
                              ideal_granularity % update_granularity,
2397
                              0);
2398

2399
            TEST_FFI_OK(botan_cipher_set_key, (cipher_decrypt, key.data(), key.size()));
5✔
2400
            TEST_FFI_OK(botan_cipher_start, (cipher_decrypt, nonce.data(), nonce.size()));
5✔
2401

2402
            std::vector<uint8_t> decrypted(plaintext.size());
5✔
2403

2404
            std::span<const uint8_t> ct_slicer(ciphertext);
5✔
2405
            std::span<uint8_t> pt_stuffer(decrypted);
5✔
2406

2407
            // Process data that is explicitly a multiple of the ideal
2408
            // granularity and therefore should be aligned with the cipher's
2409
            // internal block size.
2410
            for(size_t i = 0; i < pt_multiplier; ++i) {
30✔
2411
               size_t output_written = 42;
25✔
2412
               size_t input_consumed = 1337;
25✔
2413

2414
               auto ct_chunk = ct_slicer.first(ideal_granularity);
25✔
2415

2416
               // The existing implementation won't consume any bytes from the
2417
               // input if there is no space in the output buffer. Even when
2418
               // the cipher is a mode that won't produce any output until the
2419
               // entire message is processed. Hence, give it some dummy buffer.
2420
               auto pt_chunk = (requires_entire_message) ? std::span(dummy_buffer).first(ideal_granularity)
25✔
2421
                                                         : pt_stuffer.first(ideal_granularity);
2422

2423
               TEST_FFI_OK(botan_cipher_update,
25✔
2424
                           (cipher_decrypt,
2425
                            0 /* don't finalize */,
2426
                            pt_chunk.data(),
2427
                            pt_chunk.size(),
2428
                            &output_written,
2429
                            ct_chunk.data(),
2430
                            ct_chunk.size(),
2431
                            &input_consumed));
2432

2433
               result.test_sz_gt("some input consumed", input_consumed, 0);
25✔
2434
               result.test_sz_lte("at most, all input consumed", input_consumed, ct_chunk.size());
25✔
2435
               ct_slicer = ct_slicer.subspan(input_consumed);
25✔
2436

2437
               if(requires_entire_message) {
25✔
2438
                  result.test_sz_eq("no output produced", output_written, 0);
10✔
2439
               } else {
2440
                  result.test_sz_eq("all bytes produced", output_written, input_consumed);
15✔
2441
                  pt_stuffer = pt_stuffer.subspan(output_written);
15✔
2442
               }
2443
            }
2444

2445
            const size_t expected_final_size_dec = requires_entire_message ? plaintext.size() : pt_stuffer.size();
5✔
2446
            auto pt_chunk = pt_stuffer.first(expected_final_size_dec);
5✔
2447

2448
            size_t final_output_written_dec = 42;
5✔
2449
            size_t final_input_consumed_dec = 1337;
5✔
2450

2451
            TEST_FFI_OK(botan_cipher_update,
5✔
2452
                        (cipher_decrypt,
2453
                         BOTAN_CIPHER_UPDATE_FLAG_FINAL,
2454
                         pt_chunk.data(),
2455
                         pt_chunk.size(),
2456
                         &final_output_written_dec,
2457
                         ct_slicer.data(),  // remaining bytes (typically 0)
2458
                         ct_slicer.size(),
2459
                         &final_input_consumed_dec));
2460

2461
            result.test_sz_eq(
5✔
2462
               "remaining bytes consumed in final (decrypt)", final_input_consumed_dec, ct_slicer.size());
2463
            result.test_sz_eq("bytes written in final (decrypt)", final_output_written_dec, expected_final_size_dec);
5✔
2464
            result.test_bin_eq("dummy buffer unchanged", dummy_buffer, dummy_buffer_reference);
5✔
2465

2466
            result.test_bin_eq("decrypted plaintext", decrypted, plaintext);
5✔
2467

2468
            TEST_FFI_OK(botan_cipher_destroy, (cipher_decrypt));
5✔
2469

2470
            merged_result.merge(result, true /* ignore names */);
5✔
2471
         }
5✔
2472
      }
1✔
2473
};
2474

2475
class FFI_StreamCipher_Test final : public FFI_Test {
1✔
2476
   public:
2477
      std::string name() const override { return "FFI stream ciphers"; }
1✔
2478

2479
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2480
         botan_cipher_t ctr;
1✔
2481

2482
         if(TEST_FFI_INIT(botan_cipher_init, (&ctr, "AES-128/CTR-BE", BOTAN_CIPHER_INIT_FLAG_ENCRYPT))) {
1✔
2483
            const std::vector<uint8_t> key = Botan::hex_decode("2B7E151628AED2A6ABF7158809CF4F3C");
1✔
2484
            const std::vector<uint8_t> nonce = Botan::hex_decode("F0F1F2F3F4F5F6F7F8F9FAFBFCFDFF");
1✔
2485
            const std::vector<uint8_t> pt = Botan::hex_decode(
1✔
2486
               "AE2D8A571E03AC9C9EB76FAC45AF8E5130C81C46A35CE411E5FBC1191A0A52EFF69F2445DF4F9B17AD2B417BE66C3710");
1✔
2487
            const std::vector<uint8_t> exp_ct = Botan::hex_decode(
1✔
2488
               "9806F66B7970FDFF8617187BB9FFFDFF5AE4DF3EDBD5D35E5B4F09020DB03EAB1E031DDA2FBE03D1792170A0F3009CEE");
1✔
2489

2490
            std::vector<uint8_t> ct(pt.size());
1✔
2491

2492
            size_t update_granularity = 0;
1✔
2493
            size_t ideal_granularity = 0;
1✔
2494

2495
            TEST_FFI_OK(botan_cipher_get_update_granularity, (ctr, &update_granularity));
1✔
2496
            TEST_FFI_OK(botan_cipher_get_ideal_update_granularity, (ctr, &ideal_granularity));
1✔
2497

2498
            result.test_sz_eq(
1✔
2499
               "ideal granularity is a multiple of update granularity", ideal_granularity % update_granularity, 0);
2500

2501
            TEST_FFI_RC(0, botan_cipher_is_authenticated, (ctr));
1✔
2502

2503
            size_t input_consumed = 0;
1✔
2504
            size_t output_written = 0;
1✔
2505

2506
            TEST_FFI_OK(botan_cipher_set_key, (ctr, key.data(), key.size()));
1✔
2507
            TEST_FFI_OK(botan_cipher_start, (ctr, nonce.data(), nonce.size()));
1✔
2508

2509
            // Test partial updates...
2510
            TEST_FFI_OK(botan_cipher_update,
1✔
2511
                        (ctr, 0, ct.data(), ct.size(), &output_written, pt.data(), 5, &input_consumed));
2512

2513
            result.test_sz_eq("Expected output written", output_written, 5);
1✔
2514
            result.test_sz_eq("Expected input consumed", input_consumed, 5);
1✔
2515

2516
            TEST_FFI_OK(botan_cipher_update,
1✔
2517
                        (ctr, 0, &ct[5], ct.size() - 5, &output_written, &pt[5], pt.size() - 5, &input_consumed));
2518

2519
            result.test_sz_eq("Expected output written", output_written, ct.size() - 5);
1✔
2520
            result.test_sz_eq("Expected input consumed", input_consumed, pt.size() - 5);
1✔
2521
            result.test_bin_eq("AES-128/CTR ciphertext", ct, exp_ct);
1✔
2522

2523
            TEST_FFI_OK(botan_cipher_destroy, (ctr));
1✔
2524
         }
1✔
2525
      }
1✔
2526
};
2527

2528
class FFI_XOF_Test final : public FFI_Test {
1✔
2529
      std::string name() const override { return "FFI XOF"; }
1✔
2530

2531
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2532
         const char* input1 = "XOF input";
1✔
2533
         const char* input2 = "more XOF input";
1✔
2534
         const char* input3 = "additional XOF input";
1✔
2535
         const char* xof_name = "SHAKE-128";
1✔
2536

2537
         botan_xof_t xof1;
1✔
2538
         TEST_FFI_FAIL("unknown XOF", botan_xof_init, (&xof1, "SCHUETTEL-128", 0));
1✔
2539
         TEST_FFI_FAIL("invalid flags", botan_xof_init, (&xof1, "SHAKE-128", 42));
1✔
2540

2541
         if(!TEST_FFI_INIT(botan_xof_init, (&xof1, xof_name, 0))) {
1✔
2542
            return;
×
2543
         }
2544

2545
         std::array<char, 10> out_name{};
1✔
2546
         size_t out_name_len = 5;
1✔
2547
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE, botan_xof_name, (xof1, nullptr, &out_name_len));
1✔
2548
         result.test_sz_eq("valid XOF name length", out_name_len, out_name.size());
1✔
2549
         TEST_FFI_OK(botan_xof_name, (xof1, out_name.data(), &out_name_len));
1✔
2550

2551
         size_t out_block_size;
1✔
2552
         TEST_FFI_OK(botan_xof_block_size, (xof1, &out_block_size));
1✔
2553
         result.test_sz_eq("valid XOF block size", out_block_size, 168);
1✔
2554

2555
         result.test_rc("ready for input", botan_xof_accepts_input(xof1), 1);
1✔
2556
         TEST_FFI_OK(botan_xof_update, (xof1, reinterpret_cast<const uint8_t*>(input1), strlen(input1)));
1✔
2557
         result.test_rc("still ready for input", botan_xof_accepts_input(xof1), 1);
1✔
2558
         TEST_FFI_OK(botan_xof_update, (xof1, reinterpret_cast<const uint8_t*>(input2), strlen(input2)));
1✔
2559

2560
         botan_xof_t xof2;
1✔
2561
         TEST_FFI_OK(botan_xof_copy_state, (&xof2, xof1));
1✔
2562
         result.test_rc("copy still ready for input", botan_xof_accepts_input(xof2), 1);
1✔
2563

2564
         std::array<uint8_t, 16> out_bytes{};
1✔
2565
         TEST_FFI_OK(botan_xof_output, (xof1, nullptr, 0));
1✔
2566
         TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER, botan_xof_output, (xof1, nullptr, 1));
1✔
2567
         TEST_FFI_OK(botan_xof_output, (xof1, out_bytes.data(), out_bytes.size()));
1✔
2568

2569
         result.test_bin_eq("expected first output", out_bytes, "2E870A5FE35999A7B15F9F0BB5AC1689");
1✔
2570
         result.test_sz_ne("no more input", botan_xof_accepts_input(xof1), 1);
1✔
2571
         TEST_FFI_RC(BOTAN_FFI_ERROR_INVALID_OBJECT_STATE,
1✔
2572
                     botan_xof_update,
2573
                     (xof1, reinterpret_cast<const uint8_t*>(input1), strlen(input1)));
2574

2575
         TEST_FFI_OK(botan_xof_output, (xof1, out_bytes.data(), out_bytes.size()));
1✔
2576
         result.test_bin_eq("expected second output", out_bytes, "E266E213DA0F2763AE29601AB8F9DEDC");
1✔
2577

2578
         TEST_FFI_OK(botan_xof_update, (xof2, reinterpret_cast<const uint8_t*>(input3), strlen(input3)));
1✔
2579
         TEST_FFI_OK(botan_xof_output, (xof2, out_bytes.data(), out_bytes.size()));
1✔
2580
         result.test_bin_eq(
1✔
2581
            "expected first output after additional input", out_bytes, "D9D5416188659DDC5C26FCF52E49A157");
2582

2583
         TEST_FFI_OK(botan_xof_clear, (xof1));
1✔
2584
         result.test_rc("again ready for input", botan_xof_accepts_input(xof1), 1);
1✔
2585
         TEST_FFI_OK(botan_xof_update, (xof1, reinterpret_cast<const uint8_t*>(input1), strlen(input1)));
1✔
2586
         TEST_FFI_OK(botan_xof_update, (xof1, reinterpret_cast<const uint8_t*>(input2), strlen(input2)));
1✔
2587
         TEST_FFI_OK(botan_xof_update, (xof1, reinterpret_cast<const uint8_t*>(input3), strlen(input3)));
1✔
2588
         TEST_FFI_OK(botan_xof_output, (xof1, out_bytes.data(), out_bytes.size()));
1✔
2589
         result.test_bin_eq("expected first output with full input", out_bytes, "D9D5416188659DDC5C26FCF52E49A157");
1✔
2590

2591
         TEST_FFI_OK(botan_xof_destroy, (xof1));
1✔
2592
         TEST_FFI_OK(botan_xof_destroy, (xof2));
1✔
2593
      }
2594
};
2595

2596
class FFI_HashFunction_Test final : public FFI_Test {
1✔
2597
   public:
2598
      std::string name() const override { return "FFI hash"; }
1✔
2599

2600
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2601
         const char* input_str = "ABC";
1✔
2602

2603
         botan_hash_t hash;
1✔
2604
         TEST_FFI_FAIL("invalid hash name", botan_hash_init, (&hash, "SHA-255", 0));
1✔
2605
         TEST_FFI_FAIL("invalid flags", botan_hash_init, (&hash, "SHA-256", 1));
1✔
2606

2607
         if(TEST_FFI_INIT(botan_hash_init, (&hash, "SHA-256", 0))) {
1✔
2608
            std::array<char, 10> namebuf{};
1✔
2609
            size_t name_len = 7;
1✔
2610
            TEST_FFI_FAIL("output buffer too short", botan_hash_name, (hash, namebuf.data(), &name_len));
1✔
2611
            result.test_sz_eq("name len", name_len, 8);
1✔
2612

2613
            name_len = namebuf.size();
1✔
2614
            if(TEST_FFI_OK(botan_hash_name, (hash, namebuf.data(), &name_len))) {
1✔
2615
               result.test_sz_eq("name len", name_len, 8);
1✔
2616
               result.test_str_eq("name", namebuf.data(), "SHA-256");
1✔
2617
            }
2618

2619
            size_t block_size;
1✔
2620
            if(TEST_FFI_OK(botan_hash_block_size, (hash, &block_size))) {
1✔
2621
               result.test_sz_eq("hash block size", block_size, 64);
1✔
2622
            }
2623

2624
            size_t output_len;
1✔
2625
            if(TEST_FFI_OK(botan_hash_output_length, (hash, &output_len))) {
1✔
2626
               result.test_sz_eq("hash output length", output_len, 32);
1✔
2627

2628
               std::vector<uint8_t> outbuf(output_len);
1✔
2629

2630
               // Test that after clear or final the object can be reused
2631
               for(size_t r = 0; r != 2; ++r) {
3✔
2632
                  TEST_FFI_OK(botan_hash_update, (hash, reinterpret_cast<const uint8_t*>(input_str), 1));
2✔
2633
                  TEST_FFI_OK(botan_hash_clear, (hash));
2✔
2634

2635
                  TEST_FFI_OK(botan_hash_update,
2✔
2636
                              (hash, reinterpret_cast<const uint8_t*>(input_str), std::strlen(input_str)));
2637
                  TEST_FFI_OK(botan_hash_final, (hash, outbuf.data()));
2✔
2638

2639
                  result.test_bin_eq(
2✔
2640
                     "SHA-256 output", outbuf, "B5D4045C3F466FA91FE2CC6ABE79232A1A57CDF104F7A26E716E0A1E2789DF78");
2641
               }
2642

2643
               // Test botan_hash_copy_state
2644
               const char* msg = "message digest";
1✔
2645
               const char* expected = "F7846F55CF23E14EEBEAB5B4E1550CAD5B509E3348FBC4EFA3A1413D393CB650";
1✔
2646
               TEST_FFI_OK(botan_hash_clear, (hash));
1✔
2647
               TEST_FFI_OK(botan_hash_update, (hash, reinterpret_cast<const uint8_t*>(&msg[0]), 1));
1✔
2648
               botan_hash_t fork;
1✔
2649
               if(TEST_FFI_OK(botan_hash_copy_state, (&fork, hash))) {
1✔
2650
                  TEST_FFI_OK(botan_hash_update,
1✔
2651
                              (fork, reinterpret_cast<const uint8_t*>(&msg[1]), std::strlen(msg) - 2));
2652

2653
                  TEST_FFI_OK(botan_hash_update,
1✔
2654
                              (hash, reinterpret_cast<const uint8_t*>(&msg[1]), std::strlen(msg) - 1));
2655
                  TEST_FFI_OK(botan_hash_final, (hash, outbuf.data()));
1✔
2656
                  result.test_bin_eq("hashing split", outbuf, expected);
1✔
2657

2658
                  TEST_FFI_OK(botan_hash_update,
1✔
2659
                              (fork, reinterpret_cast<const uint8_t*>(&msg[std::strlen(msg) - 1]), 1));
2660
                  TEST_FFI_OK(botan_hash_final, (fork, outbuf.data()));
1✔
2661
                  result.test_bin_eq("hashing split", outbuf, expected);
1✔
2662

2663
                  TEST_FFI_OK(botan_hash_destroy, (fork));
1✔
2664
               }
2665
            }
1✔
2666

2667
            TEST_FFI_OK(botan_hash_destroy, (hash));
1✔
2668
         }
2669
      }
1✔
2670
};
2671

2672
class FFI_MAC_Test final : public FFI_Test {
1✔
2673
   public:
2674
      std::string name() const override { return "FFI MAC"; }
1✔
2675

2676
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2677
         const char* input_str = "ABC";
1✔
2678

2679
         // MAC test
2680
         botan_mac_t mac;
1✔
2681
         TEST_FFI_FAIL("bad flag", botan_mac_init, (&mac, "HMAC(SHA-256)", 1));
1✔
2682
         TEST_FFI_FAIL("bad name", botan_mac_init, (&mac, "HMAC(SHA-259)", 0));
1✔
2683

2684
         if(TEST_FFI_INIT(botan_mac_init, (&mac, "HMAC(SHA-256)", 0))) {
1✔
2685
            std::array<char, 16> namebuf{};
1✔
2686
            size_t name_len = 13;
1✔
2687
            TEST_FFI_FAIL("output buffer too short", botan_mac_name, (mac, namebuf.data(), &name_len));
1✔
2688
            result.test_sz_eq("name len", name_len, 14);
1✔
2689

2690
            name_len = namebuf.size();
1✔
2691
            if(TEST_FFI_OK(botan_mac_name, (mac, namebuf.data(), &name_len))) {
1✔
2692
               result.test_sz_eq("name len", name_len, 14);
1✔
2693
               result.test_str_eq("name", namebuf.data(), "HMAC(SHA-256)");
1✔
2694
            }
2695

2696
            size_t min_keylen = 0;
1✔
2697
            size_t max_keylen = 0;
1✔
2698
            size_t mod_keylen = 0;
1✔
2699
            TEST_FFI_RC(0, botan_mac_get_keyspec, (mac, nullptr, nullptr, nullptr));
1✔
2700
            TEST_FFI_RC(0, botan_mac_get_keyspec, (mac, &min_keylen, nullptr, nullptr));
1✔
2701
            TEST_FFI_RC(0, botan_mac_get_keyspec, (mac, nullptr, &max_keylen, nullptr));
1✔
2702
            TEST_FFI_RC(0, botan_mac_get_keyspec, (mac, nullptr, nullptr, &mod_keylen));
1✔
2703

2704
            result.test_sz_eq("Expected min keylen", min_keylen, 0);
1✔
2705
            result.test_sz_eq("Expected max keylen", max_keylen, 8192);
1✔
2706
            result.test_sz_eq("Expected mod keylen", mod_keylen, 1);
1✔
2707

2708
            size_t output_len;
1✔
2709
            if(TEST_FFI_OK(botan_mac_output_length, (mac, &output_len))) {
1✔
2710
               result.test_sz_eq("MAC output length", output_len, 32);
1✔
2711

2712
               const uint8_t mac_key[] = {0xAA, 0xBB, 0xCC, 0xDD};
1✔
2713
               std::vector<uint8_t> outbuf(output_len);
1✔
2714

2715
               // Test that after clear or final the object can be reused
2716
               for(size_t r = 0; r != 2; ++r) {
3✔
2717
                  TEST_FFI_OK(botan_mac_set_key, (mac, mac_key, sizeof(mac_key)));
2✔
2718
                  TEST_FFI_OK(botan_mac_update,
2✔
2719
                              (mac, reinterpret_cast<const uint8_t*>(input_str), std::strlen(input_str)));
2720
                  TEST_FFI_OK(botan_mac_clear, (mac));
2✔
2721

2722
                  TEST_FFI_OK(botan_mac_set_key, (mac, mac_key, sizeof(mac_key)));
2✔
2723
                  TEST_FFI_OK(botan_mac_update,
2✔
2724
                              (mac, reinterpret_cast<const uint8_t*>(input_str), std::strlen(input_str)));
2725
                  TEST_FFI_OK(botan_mac_final, (mac, outbuf.data()));
2✔
2726

2727
                  result.test_bin_eq(
2✔
2728
                     "HMAC output", outbuf, "1A82EEA984BC4A7285617CC0D05F1FE1D6C96675924A81BC965EE8FF7B0697A7");
2729
               }
2730
            }
1✔
2731

2732
            TEST_FFI_OK(botan_mac_destroy, (mac));
1✔
2733
         }
2734
      }
1✔
2735
};
2736

2737
class FFI_Scrypt_Test final : public FFI_Test {
1✔
2738
   public:
2739
      std::string name() const override { return "FFI Scrypt"; }
1✔
2740

2741
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2742
         std::vector<uint8_t> output(24);
1✔
2743
         const uint8_t salt[8] = {0};
1✔
2744
         const char* pass = "password";
1✔
2745

2746
         if(TEST_FFI_INIT(botan_scrypt, (output.data(), output.size(), pass, salt, sizeof(salt), 8, 1, 1))) {
1✔
2747
            result.test_bin_eq("scrypt output", output, "4B9B888D695288E002CC4F9D90808A4D296A45CE4471AFBB");
1✔
2748

2749
            size_t N;
1✔
2750
            size_t r;
1✔
2751
            size_t p;
1✔
2752
            TEST_FFI_OK(botan_pwdhash_timed,
1✔
2753
                        ("Scrypt", 50, &r, &p, &N, output.data(), output.size(), "bunny", 5, salt, sizeof(salt)));
2754

2755
            std::vector<uint8_t> cmp(output.size());
1✔
2756

2757
            TEST_FFI_OK(botan_pwdhash, ("Scrypt", N, r, p, cmp.data(), cmp.size(), "bunny", 5, salt, sizeof(salt)));
1✔
2758
            result.test_bin_eq("recomputed scrypt", cmp, output);
1✔
2759
         }
1✔
2760
      }
1✔
2761
};
2762

2763
class FFI_KDF_Test final : public FFI_Test {
1✔
2764
   public:
2765
      std::string name() const override { return "FFI KDF"; }
1✔
2766

2767
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
2768
         std::vector<uint8_t> outbuf;
1✔
2769

2770
         const std::string passphrase = "ltexmfeyylmlbrsyikaw";
1✔
2771

2772
         const std::vector<uint8_t> pbkdf_salt = Botan::hex_decode("ED1F39A0A7F3889AAF7E60743B3BC1CC2C738E60");
1✔
2773
         const size_t pbkdf_out_len = 10;
1✔
2774
         const size_t pbkdf_iterations = 1000;
1✔
2775

2776
         outbuf.resize(pbkdf_out_len);
1✔
2777

2778
         if(TEST_FFI_INIT(botan_pbkdf,
1✔
2779
                          ("PBKDF2(SHA-1)",
2780
                           outbuf.data(),
2781
                           outbuf.size(),
2782
                           passphrase.c_str(),
2783
                           pbkdf_salt.data(),
2784
                           pbkdf_salt.size(),
2785
                           pbkdf_iterations))) {
2786
            result.test_bin_eq("PBKDF output", outbuf, "027AFADD48F4BE8DCC4F");
1✔
2787

2788
            size_t iters_10ms;
1✔
2789
            size_t iters_100ms;
1✔
2790

2791
            TEST_FFI_OK(botan_pbkdf_timed,
1✔
2792
                        ("PBKDF2(SHA-1)",
2793
                         outbuf.data(),
2794
                         outbuf.size(),
2795
                         passphrase.c_str(),
2796
                         pbkdf_salt.data(),
2797
                         pbkdf_salt.size(),
2798
                         10,
2799
                         &iters_10ms));
2800
            TEST_FFI_OK(botan_pbkdf_timed,
1✔
2801
                        ("PBKDF2(SHA-1)",
2802
                         outbuf.data(),
2803
                         outbuf.size(),
2804
                         passphrase.c_str(),
2805
                         pbkdf_salt.data(),
2806
                         pbkdf_salt.size(),
2807
                         100,
2808
                         &iters_100ms));
2809

2810
            result.test_note("PBKDF timed 10 ms " + std::to_string(iters_10ms) + " iterations " + "100 ms " +
6✔
2811
                             std::to_string(iters_100ms) + " iterations");
4✔
2812
         }
2813

2814
         const std::vector<uint8_t> kdf_secret = Botan::hex_decode("92167440112E");
1✔
2815
         const std::vector<uint8_t> kdf_salt = Botan::hex_decode("45A9BEDED69163123D0348F5185F61ABFB1BF18D6AEA454F");
1✔
2816
         const size_t kdf_out_len = 18;
1✔
2817
         outbuf.resize(kdf_out_len);
1✔
2818

2819
         if(TEST_FFI_INIT(botan_kdf,
1✔
2820
                          ("KDF2(SHA-1)",
2821
                           outbuf.data(),
2822
                           outbuf.size(),
2823
                           kdf_secret.data(),
2824
                           kdf_secret.size(),
2825
                           kdf_salt.data(),
2826
                           kdf_salt.size(),
2827
                           nullptr,
2828
                           0))) {
2829
            result.test_bin_eq("KDF output", outbuf, "3A5DC9AA1C872B4744515AC2702D6396FC2A");
1✔
2830
         }
2831

2832
         size_t out_len = 64;
1✔
2833
         std::string outstr;
1✔
2834
         outstr.resize(out_len);
1✔
2835

2836
         const int rc =
1✔
2837
            botan_bcrypt_generate(reinterpret_cast<uint8_t*>(outstr.data()), &out_len, passphrase.c_str(), rng, 4, 0);
1✔
2838

2839
         if(rc == 0) {
1✔
2840
            result.test_sz_eq("bcrypt output size", out_len, 61);
1✔
2841

2842
            TEST_FFI_OK(botan_bcrypt_is_valid, (passphrase.c_str(), outstr.data()));
1✔
2843
            TEST_FFI_FAIL("bad password", botan_bcrypt_is_valid, ("nope", outstr.data()));
1✔
2844
         }
2845
      }
1✔
2846
};
2847

2848
class FFI_Blockcipher_Test final : public FFI_Test {
1✔
2849
   public:
2850
      std::string name() const override { return "FFI block ciphers"; }
1✔
2851

2852
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2853
         botan_block_cipher_t cipher;
1✔
2854

2855
         if(TEST_FFI_INIT(botan_block_cipher_init, (&cipher, "AES-128"))) {
1✔
2856
            std::array<char, 10> namebuf{};
1✔
2857
            size_t name_len = 7;
1✔
2858
            TEST_FFI_FAIL("output buffer too short", botan_block_cipher_name, (cipher, namebuf.data(), &name_len));
1✔
2859
            result.test_sz_eq("name len", name_len, 8);
1✔
2860

2861
            name_len = namebuf.size();
1✔
2862
            if(TEST_FFI_OK(botan_block_cipher_name, (cipher, namebuf.data(), &name_len))) {
1✔
2863
               result.test_sz_eq("name len", name_len, 8);
1✔
2864
               result.test_str_eq("name", namebuf.data(), "AES-128");
1✔
2865
            }
2866

2867
            const std::vector<uint8_t> zero16(16, 0);
1✔
2868
            std::vector<uint8_t> block(16, 0);
1✔
2869

2870
            TEST_FFI_OK(botan_block_cipher_clear, (cipher));
1✔
2871

2872
            TEST_FFI_RC(
1✔
2873
               BOTAN_FFI_ERROR_KEY_NOT_SET, botan_block_cipher_encrypt_blocks, (cipher, block.data(), block.data(), 1));
2874
            TEST_FFI_RC(
1✔
2875
               BOTAN_FFI_ERROR_KEY_NOT_SET, botan_block_cipher_decrypt_blocks, (cipher, block.data(), block.data(), 1));
2876

2877
            TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER, botan_block_cipher_encrypt_blocks, (cipher, nullptr, nullptr, 0));
1✔
2878
            TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER, botan_block_cipher_decrypt_blocks, (cipher, nullptr, nullptr, 0));
1✔
2879

2880
            TEST_FFI_RC(16, botan_block_cipher_block_size, (cipher));
1✔
2881

2882
            size_t min_keylen = 0;
1✔
2883
            size_t max_keylen = 0;
1✔
2884
            size_t mod_keylen = 0;
1✔
2885
            TEST_FFI_RC(0, botan_block_cipher_get_keyspec, (cipher, nullptr, nullptr, nullptr));
1✔
2886
            TEST_FFI_RC(0, botan_block_cipher_get_keyspec, (cipher, &min_keylen, nullptr, nullptr));
1✔
2887
            TEST_FFI_RC(0, botan_block_cipher_get_keyspec, (cipher, nullptr, &max_keylen, nullptr));
1✔
2888
            TEST_FFI_RC(0, botan_block_cipher_get_keyspec, (cipher, nullptr, nullptr, &mod_keylen));
1✔
2889

2890
            result.test_sz_eq("Expected min keylen", min_keylen, 16);
1✔
2891
            result.test_sz_eq("Expected max keylen", max_keylen, 16);
1✔
2892
            result.test_sz_eq("Expected mod keylen", mod_keylen, 1);
1✔
2893

2894
            TEST_FFI_OK(botan_block_cipher_set_key, (cipher, zero16.data(), zero16.size()));
1✔
2895

2896
            TEST_FFI_OK(botan_block_cipher_encrypt_blocks, (cipher, block.data(), block.data(), 1));
1✔
2897
            result.test_bin_eq("AES-128 encryption works", block, "66E94BD4EF8A2C3B884CFA59CA342B2E");
1✔
2898

2899
            TEST_FFI_OK(botan_block_cipher_encrypt_blocks, (cipher, block.data(), block.data(), 1));
1✔
2900
            result.test_bin_eq("AES-128 encryption works", block, "F795BD4A52E29ED713D313FA20E98DBC");
1✔
2901

2902
            TEST_FFI_OK(botan_block_cipher_decrypt_blocks, (cipher, block.data(), block.data(), 1));
1✔
2903
            result.test_bin_eq("AES-128 decryption works", block, "66E94BD4EF8A2C3B884CFA59CA342B2E");
1✔
2904

2905
            TEST_FFI_OK(botan_block_cipher_decrypt_blocks, (cipher, block.data(), block.data(), 1));
1✔
2906
            result.test_bin_eq("AES-128 decryption works", block, "00000000000000000000000000000000");
1✔
2907

2908
            TEST_FFI_OK(botan_block_cipher_clear, (cipher));
1✔
2909
            botan_block_cipher_destroy(cipher);
1✔
2910
         }
1✔
2911
      }
1✔
2912
};
2913

2914
class FFI_ErrorHandling_Test final : public FFI_Test {
1✔
2915
   public:
2916
      std::string name() const override { return "FFI error handling"; }
1✔
2917

2918
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2919
         // delete of null is ok/ignored
2920
         TEST_FFI_RC(0, botan_hash_destroy, (nullptr));
1✔
2921

2922
   #if !defined(BOTAN_HAS_SANITIZER_UNDEFINED)
2923
         // Confirm that botan_x_destroy checks the argument type
2924
         botan_mp_t mp;
1✔
2925
         botan_mp_init(&mp);
1✔
2926
         TEST_FFI_RC(BOTAN_FFI_ERROR_INVALID_OBJECT, botan_hash_destroy, (reinterpret_cast<botan_hash_t>(mp)));
1✔
2927
         TEST_FFI_RC(0, botan_mp_destroy, (mp));
1✔
2928
   #endif
2929

2930
         std::set<std::string> errors;
1✔
2931
         for(int i = -100; i != 50; ++i) {
151✔
2932
            const char* err = botan_error_description(i);
150✔
2933
            result.test_is_true("Never a null pointer", err != nullptr);
150✔
2934

2935
            if(err != nullptr) {
150✔
2936
               const std::string s(err);
150✔
2937

2938
               if(s != "Unknown error") {
150✔
2939
                  result.test_is_true("No duplicate messages", !errors.contains(s));
22✔
2940
                  errors.insert(s);
22✔
2941
               }
2942
            }
150✔
2943
         }
2944
      }
1✔
2945
};
2946

2947
class FFI_Base64_Test final : public FFI_Test {
1✔
2948
   public:
2949
      std::string name() const override { return "FFI base64"; }
1✔
2950

2951
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2952
         const uint8_t bin[9] = {0x16, 0x8a, 0x1f, 0x06, 0xe9, 0xe7, 0xcb, 0xdd, 0x34};
1✔
2953
         char out_buf[1024] = {0};
1✔
2954

2955
         size_t out_len = sizeof(out_buf);
1✔
2956
         TEST_FFI_OK(botan_base64_encode, (bin, sizeof(bin), out_buf, &out_len));
1✔
2957

2958
         result.test_str_eq("encoded string", out_buf, "FoofBunny900");
1✔
2959

2960
         out_len -= 1;
1✔
2961
         TEST_FFI_RC(
1✔
2962
            BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE, botan_base64_encode, (bin, sizeof(bin), out_buf, &out_len));
2963

2964
         const char* base64 = "U3VjaCBiYXNlNjQgd293IQ==";
1✔
2965
         uint8_t out_bin[1024] = {0};
1✔
2966

2967
         out_len = 3;
1✔
2968
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
2969
                     botan_base64_decode,
2970
                     (base64, strlen(base64), out_bin, &out_len));
2971

2972
         result.test_sz_eq("output length", out_len, 18);
1✔
2973

2974
         out_len = sizeof(out_bin);
1✔
2975
         TEST_FFI_OK(botan_base64_decode, (base64, strlen(base64), out_bin, &out_len));
1✔
2976

2977
         result.test_str_eq(
1✔
2978
            "decoded string", std::string(reinterpret_cast<const char*>(out_bin), out_len), "Such base64 wow!");
1✔
2979
      }
1✔
2980
};
2981

2982
class FFI_Hex_Test final : public FFI_Test {
1✔
2983
   public:
2984
      std::string name() const override { return "FFI hex"; }
1✔
2985

2986
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
2987
         const uint8_t bin[4] = {0xDE, 0xAD, 0xBE, 0xEF};
1✔
2988
         char hex_buf[16] = {0};
1✔
2989

2990
         TEST_FFI_OK(botan_hex_encode, (bin, sizeof(bin), hex_buf, 0));
1✔
2991

2992
         result.test_str_eq("encoded string", hex_buf, "DEADBEEF");
1✔
2993

2994
         const char* hex = "67657420796572206A756D626F20736872696D70";
1✔
2995
         uint8_t out_bin[1024] = {0};
1✔
2996
         size_t out_len = 5;
1✔
2997

2998
         TEST_FFI_RC(
1✔
2999
            BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE, botan_hex_decode, (hex, strlen(hex), out_bin, &out_len));
3000

3001
         out_len = sizeof(out_bin);
1✔
3002
         TEST_FFI_OK(botan_hex_decode, (hex, strlen(hex), out_bin, &out_len));
1✔
3003

3004
         result.test_str_eq(
1✔
3005
            "decoded string", std::string(reinterpret_cast<const char*>(out_bin), out_len), "get yer jumbo shrimp");
1✔
3006
      }
1✔
3007
};
3008

3009
class FFI_MP_Test final : public FFI_Test {
1✔
3010
   public:
3011
      std::string name() const override { return "FFI MP"; }
1✔
3012

3013
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
3014
         char str_buf[1024] = {0};
1✔
3015
         size_t str_len = 0;
1✔
3016

3017
         botan_mp_t x;
1✔
3018
         botan_mp_init(&x);
1✔
3019
         TEST_FFI_RC(0, botan_mp_is_odd, (x));
1✔
3020
         TEST_FFI_RC(1, botan_mp_is_even, (x));
1✔
3021
         TEST_FFI_RC(0, botan_mp_is_negative, (x));
1✔
3022
         TEST_FFI_RC(1, botan_mp_is_positive, (x));
1✔
3023
         TEST_FFI_RC(1, botan_mp_is_zero, (x));
1✔
3024
         botan_mp_destroy(x);
1✔
3025

3026
         botan_mp_init(&x);
1✔
3027
         size_t bn_bytes = 0;
1✔
3028
         TEST_FFI_OK(botan_mp_num_bytes, (x, &bn_bytes));
1✔
3029
         result.test_sz_eq("Expected size for MP 0", bn_bytes, 0);
1✔
3030

3031
         botan_mp_set_from_int(x, 5);
1✔
3032
         TEST_FFI_OK(botan_mp_num_bytes, (x, &bn_bytes));
1✔
3033
         result.test_sz_eq("Expected size for MP 5", bn_bytes, 1);
1✔
3034

3035
         botan_mp_add_u32(x, x, 75);
1✔
3036
         TEST_FFI_OK(botan_mp_num_bytes, (x, &bn_bytes));
1✔
3037
         result.test_sz_eq("Expected size for MP 80", bn_bytes, 1);
1✔
3038

3039
         str_len = sizeof(str_buf);
1✔
3040
         TEST_FFI_OK(botan_mp_to_str, (x, 10, str_buf, &str_len));
1✔
3041
         result.test_str_eq("botan_mp_add", std::string(str_buf), "80");
1✔
3042

3043
         botan_mp_sub_u32(x, x, 80);
1✔
3044
         TEST_FFI_RC(1, botan_mp_is_zero, (x));
1✔
3045
         botan_mp_add_u32(x, x, 259);
1✔
3046
         TEST_FFI_OK(botan_mp_num_bytes, (x, &bn_bytes));
1✔
3047
         result.test_sz_eq("Expected size for MP 259", bn_bytes, 2);
1✔
3048

3049
         str_len = sizeof(str_buf);
1✔
3050
         TEST_FFI_OK(botan_mp_to_str, (x, 10, str_buf, &str_len));
1✔
3051
         result.test_str_eq("botan_mp_add", std::string(str_buf), "259");
1✔
3052

3053
         TEST_FFI_RC(1, botan_mp_is_odd, (x));
1✔
3054
         TEST_FFI_RC(0, botan_mp_is_even, (x));
1✔
3055
         TEST_FFI_RC(0, botan_mp_is_negative, (x));
1✔
3056
         TEST_FFI_RC(1, botan_mp_is_positive, (x));
1✔
3057
         TEST_FFI_RC(0, botan_mp_is_zero, (x));
1✔
3058

3059
         {
1✔
3060
            botan_mp_t zero;
1✔
3061
            botan_mp_init(&zero);
1✔
3062
            int cmp;
1✔
3063
            TEST_FFI_OK(botan_mp_cmp, (&cmp, x, zero));
1✔
3064
            result.test_is_true("bigint_mp_cmp(+, 0)", cmp == 1);
1✔
3065

3066
            TEST_FFI_OK(botan_mp_cmp, (&cmp, zero, x));
1✔
3067
            result.test_is_true("bigint_mp_cmp(0, +)", cmp == -1);
1✔
3068

3069
            TEST_FFI_RC(0, botan_mp_is_negative, (x));
1✔
3070
            TEST_FFI_RC(1, botan_mp_is_positive, (x));
1✔
3071
            TEST_FFI_OK(botan_mp_flip_sign, (x));
1✔
3072
            TEST_FFI_RC(1, botan_mp_is_negative, (x));
1✔
3073
            TEST_FFI_RC(0, botan_mp_is_positive, (x));
1✔
3074

3075
            // test no negative zero
3076
            TEST_FFI_RC(0, botan_mp_is_negative, (zero));
1✔
3077
            TEST_FFI_RC(1, botan_mp_is_positive, (zero));
1✔
3078
            TEST_FFI_OK(botan_mp_flip_sign, (zero));
1✔
3079
            TEST_FFI_RC(0, botan_mp_is_negative, (zero));
1✔
3080
            TEST_FFI_RC(1, botan_mp_is_positive, (zero));
1✔
3081

3082
            TEST_FFI_OK(botan_mp_cmp, (&cmp, x, zero));
1✔
3083
            result.test_is_true("bigint_mp_cmp(-, 0)", cmp == -1);
1✔
3084

3085
            TEST_FFI_OK(botan_mp_cmp, (&cmp, zero, x));
1✔
3086
            result.test_is_true("bigint_mp_cmp(0, -)", cmp == 1);
1✔
3087

3088
            TEST_FFI_OK(botan_mp_cmp, (&cmp, zero, zero));
1✔
3089
            result.test_is_true("bigint_mp_cmp(0, 0)", cmp == 0);
1✔
3090

3091
            TEST_FFI_OK(botan_mp_cmp, (&cmp, x, x));
1✔
3092
            result.test_is_true("bigint_mp_cmp(x, x)", cmp == 0);
1✔
3093

3094
            TEST_FFI_OK(botan_mp_flip_sign, (x));
1✔
3095

3096
            // Regression test for bug reported by @hgarrereyn
3097
            // See: GH #5128
3098
            botan_mp_t out_shift;
1✔
3099
            TEST_FFI_OK(botan_mp_init, (&out_shift));
1✔
3100
            TEST_FFI_OK(botan_mp_lshift, (out_shift, zero, 0));
1✔
3101

3102
            botan_mp_destroy(zero);
1✔
3103
            botan_mp_destroy(out_shift);
1✔
3104
         }
3105

3106
         size_t x_bits = 0;
1✔
3107
         TEST_FFI_OK(botan_mp_num_bits, (x, &x_bits));
1✔
3108
         result.test_sz_eq("botan_mp_num_bits", x_bits, 9);
1✔
3109

3110
         TEST_FFI_OK(botan_mp_to_hex, (x, str_buf));
1✔
3111
         result.test_str_eq("botan_mp_to_hex", std::string(str_buf), "0x0103");
1✔
3112

3113
         ViewStringSink hex_sink;
1✔
3114
         TEST_FFI_OK(botan_mp_view_hex, (x, hex_sink.delegate(), hex_sink.callback()));
1✔
3115
         result.test_str_eq("botan_mp_view_hex", hex_sink.get(), "0x0103");
1✔
3116

3117
         ViewStringSink str_sink;
1✔
3118
         TEST_FFI_OK(botan_mp_view_str, (x, 10, str_sink.delegate(), str_sink.callback()));
1✔
3119
         result.test_str_eq("botan_mp_view_str", str_sink.get(), "259");
1✔
3120

3121
         ViewBytesSink bin_sink;
1✔
3122
         TEST_FFI_OK(botan_mp_view_bin, (x, bin_sink.delegate(), bin_sink.callback()));
1✔
3123
         result.test_bin_eq("botan_mp_view_str", bin_sink.get(), "0103");
1✔
3124

3125
         uint32_t x_32;
1✔
3126
         TEST_FFI_OK(botan_mp_to_uint32, (x, &x_32));
1✔
3127
         result.test_sz_eq("botan_mp_to_uint32", size_t(x_32), size_t(0x103));
1✔
3128

3129
         TEST_FFI_RC(1, botan_mp_get_bit, (x, 1));
1✔
3130
         TEST_FFI_RC(0, botan_mp_get_bit, (x, 87));
1✔
3131
         TEST_FFI_OK(botan_mp_set_bit, (x, 87));
1✔
3132
         TEST_FFI_RC(1, botan_mp_get_bit, (x, 87));
1✔
3133
         TEST_FFI_OK(botan_mp_to_hex, (x, str_buf));
1✔
3134
         result.test_str_eq("botan_mp_set_bit", std::string(str_buf), "0x8000000000000000000103");
1✔
3135

3136
         TEST_FFI_OK(botan_mp_clear_bit, (x, 87));
1✔
3137
         TEST_FFI_OK(botan_mp_to_hex, (x, str_buf));
1✔
3138
         result.test_str_eq("botan_mp_set_bit", std::string(str_buf), "0x0103");
1✔
3139

3140
         botan_mp_t y;
1✔
3141
         TEST_FFI_OK(botan_mp_init, (&y));
1✔
3142
         TEST_FFI_OK(botan_mp_set_from_int, (y, 0x1234567));
1✔
3143

3144
         botan_mp_t r;
1✔
3145
         botan_mp_init(&r);
1✔
3146

3147
         TEST_FFI_OK(botan_mp_add, (r, x, y));
1✔
3148
         str_len = sizeof(str_buf);
1✔
3149
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3150
         result.test_str_eq("botan_mp_add", std::string(str_buf), "19089002");
1✔
3151

3152
         TEST_FFI_OK(botan_mp_mul, (r, x, y));
1✔
3153
         str_len = sizeof(str_buf);
1✔
3154
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3155
         result.test_str_eq("botan_mp_mul", std::string(str_buf), "4943984437");
1✔
3156
         TEST_FFI_RC(0, botan_mp_is_negative, (r));
1✔
3157

3158
         botan_mp_t q;
1✔
3159
         botan_mp_init(&q);
1✔
3160
         TEST_FFI_OK(botan_mp_div, (q, r, y, x));
1✔
3161

3162
         str_len = sizeof(str_buf);
1✔
3163
         TEST_FFI_OK(botan_mp_to_str, (q, 10, str_buf, &str_len));
1✔
3164
         result.test_str_eq("botan_mp_div_q", std::string(str_buf), "73701");
1✔
3165

3166
         str_len = sizeof(str_buf);
1✔
3167
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3168
         result.test_str_eq("botan_mp_div_r", std::string(str_buf), "184");
1✔
3169

3170
         TEST_FFI_OK(botan_mp_set_from_str, (y, "4943984437"));
1✔
3171
         TEST_FFI_OK(botan_mp_sub, (r, x, y));
1✔
3172
         str_len = sizeof(str_buf);
1✔
3173
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3174
         result.test_str_eq("botan_mp_sub", std::string(str_buf), "-4943984178");
1✔
3175
         TEST_FFI_RC(1, botan_mp_is_negative, (r));
1✔
3176

3177
         TEST_FFI_OK(botan_mp_lshift, (r, x, 39));
1✔
3178
         str_len = sizeof(str_buf);
1✔
3179
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3180
         result.test_str_eq("botan_mp_lshift", std::string(str_buf), "142386755796992");
1✔
3181

3182
         TEST_FFI_OK(botan_mp_rshift, (r, r, 3));
1✔
3183
         str_len = sizeof(str_buf);
1✔
3184
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3185
         result.test_str_eq("botan_mp_rshift", std::string(str_buf), "17798344474624");
1✔
3186

3187
         TEST_FFI_OK(botan_mp_gcd, (r, x, y));
1✔
3188
         str_len = sizeof(str_buf);
1✔
3189
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3190
         result.test_str_eq("botan_mp_gcd", std::string(str_buf), "259");
1✔
3191

3192
         botan_mp_t p;
1✔
3193
         botan_mp_init(&p);
1✔
3194
         const uint8_t M127[] = {
1✔
3195
            0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
3196
         TEST_FFI_OK(botan_mp_from_bin, (p, M127, sizeof(M127)));
1✔
3197
         TEST_FFI_RC(1, botan_mp_is_prime, (p, rng, 64));
1✔
3198

3199
         size_t p_bits = 0;
1✔
3200
         TEST_FFI_OK(botan_mp_num_bits, (p, &p_bits));
1✔
3201
         result.test_sz_eq("botan_mp_num_bits", p_bits, 127);
1✔
3202

3203
         TEST_FFI_OK(botan_mp_mod_inverse, (r, x, p));
1✔
3204
         str_len = sizeof(str_buf);
1✔
3205
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3206
         result.test_str_eq("botan_mp_mod_inverse", std::string(str_buf), "40728777507911553541948312086427855425");
1✔
3207

3208
         TEST_FFI_OK(botan_mp_powmod, (r, x, r, p));
1✔
3209
         str_len = sizeof(str_buf);
1✔
3210
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3211
         result.test_str_eq("botan_mp_powmod", std::string(str_buf), "40550417419160441638948180641668117560");
1✔
3212

3213
         TEST_FFI_OK(botan_mp_num_bytes, (r, &bn_bytes));
1✔
3214
         result.test_sz_eq("botan_mp_num_bytes", bn_bytes, 16);
1✔
3215

3216
         std::vector<uint8_t> bn_buf;
1✔
3217
         bn_buf.resize(bn_bytes);
1✔
3218
         botan_mp_to_bin(r, bn_buf.data());
1✔
3219
         result.test_bin_eq("botan_mp_to_bin", bn_buf, "1E81B9EFE0BE1902F6D03F9F5E5FB438");
1✔
3220

3221
         TEST_FFI_OK(botan_mp_set_from_mp, (y, r));
1✔
3222
         TEST_FFI_OK(botan_mp_mod_mul, (r, x, y, p));
1✔
3223
         str_len = sizeof(str_buf);
1✔
3224
         TEST_FFI_OK(botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3225
         result.test_str_eq("botan_mp_mod_mul", std::string(str_buf), "123945920473931248854653259523111998693");
1✔
3226

3227
         str_len = 0;
1✔
3228
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE, botan_mp_to_str, (r, 10, str_buf, &str_len));
1✔
3229

3230
         size_t x_bytes;
1✔
3231
         botan_mp_rand_bits(x, rng, 512);
1✔
3232
         TEST_FFI_OK(botan_mp_num_bytes, (x, &x_bytes));
1✔
3233
         result.test_sz_lte("botan_mp_num_bytes", x_bytes, 512 / 8);
1✔
3234

3235
         TEST_FFI_OK(botan_mp_set_from_radix_str, (x, "909A", 16));
1✔
3236
         TEST_FFI_OK(botan_mp_to_uint32, (x, &x_32));
1✔
3237
         result.test_u32_eq("botan_mp_set_from_radix_str(16)", x_32, 0x909A);
1✔
3238

3239
         TEST_FFI_OK(botan_mp_set_from_radix_str, (x, "9098135", 10));
1✔
3240
         TEST_FFI_OK(botan_mp_to_uint32, (x, &x_32));
1✔
3241
         result.test_u32_eq("botan_mp_set_from_radix_str(10)", x_32, 9098135);
1✔
3242

3243
         botan_mp_destroy(p);
1✔
3244
         botan_mp_destroy(x);
1✔
3245
         botan_mp_destroy(y);
1✔
3246
         botan_mp_destroy(r);
1✔
3247
         botan_mp_destroy(q);
1✔
3248
      }
1✔
3249
};
3250

3251
class FFI_FPE_Test final : public FFI_Test {
1✔
3252
   public:
3253
      std::string name() const override { return "FFI FPE"; }
1✔
3254

3255
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
3256
         const uint8_t key[10] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10};
1✔
3257

3258
         botan_mp_t n;
1✔
3259
         botan_mp_init(&n);
1✔
3260
         botan_mp_set_from_str(n, "1000000000");
1✔
3261

3262
         botan_fpe_t fpe;
1✔
3263
         if(!TEST_FFI_INIT(botan_fpe_fe1_init, (&fpe, n, key, sizeof(key), 5, 0))) {
1✔
3264
            botan_mp_destroy(n);
×
3265
            return;
×
3266
         }
3267

3268
         botan_mp_t x;
1✔
3269
         botan_mp_init(&x);
1✔
3270
         botan_mp_set_from_str(x, "178051120");
1✔
3271

3272
         TEST_FFI_OK(botan_fpe_encrypt, (fpe, x, nullptr, 0));
1✔
3273

3274
         uint32_t xval = 0;
1✔
3275
         TEST_FFI_OK(botan_mp_to_uint32, (x, &xval));
1✔
3276
         result.test_sz_eq("Expected FPE ciphertext", xval, size_t(605648666));
1✔
3277

3278
         TEST_FFI_OK(botan_fpe_encrypt, (fpe, x, nullptr, 0));
1✔
3279
         TEST_FFI_OK(botan_fpe_decrypt, (fpe, x, nullptr, 0));
1✔
3280
         TEST_FFI_OK(botan_fpe_decrypt, (fpe, x, nullptr, 0));
1✔
3281

3282
         TEST_FFI_OK(botan_mp_to_uint32, (x, &xval));
1✔
3283
         result.test_sz_eq("FPE round trip", xval, size_t(178051120));
1✔
3284

3285
         TEST_FFI_OK(botan_fpe_destroy, (fpe));
1✔
3286
         TEST_FFI_OK(botan_mp_destroy, (x));
1✔
3287
         TEST_FFI_OK(botan_mp_destroy, (n));
1✔
3288
      }
3289
};
3290

3291
class FFI_TOTP_Test final : public FFI_Test {
1✔
3292
   public:
3293
      std::string name() const override { return "FFI TOTP"; }
1✔
3294

3295
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
3296
         const std::vector<uint8_t> key = Botan::hex_decode("3132333435363738393031323334353637383930");
1✔
3297
         const size_t digits = 8;
1✔
3298
         const size_t timestep = 30;
1✔
3299
         botan_totp_t totp;
1✔
3300

3301
         if(!TEST_FFI_INIT(botan_totp_init, (&totp, key.data(), key.size(), "SHA-1", digits, timestep))) {
1✔
3302
            return;
×
3303
         }
3304

3305
         uint32_t code;
1✔
3306
         TEST_FFI_OK(botan_totp_generate, (totp, &code, 59));
1✔
3307
         result.test_u32_eq("TOTP code", code, 94287082);
1✔
3308

3309
         TEST_FFI_OK(botan_totp_generate, (totp, &code, 1111111109));
1✔
3310
         result.test_u32_eq("TOTP code 2", code, 7081804);
1✔
3311

3312
         TEST_FFI_OK(botan_totp_check, (totp, 94287082, 59 + 60, 60));
1✔
3313
         TEST_FFI_RC(1, botan_totp_check, (totp, 94287082, 59 + 31, 1));
1✔
3314
         TEST_FFI_RC(1, botan_totp_check, (totp, 94287082, 59 + 61, 1));
1✔
3315

3316
         TEST_FFI_OK(botan_totp_destroy, (totp));
1✔
3317
      }
1✔
3318
};
3319

3320
class FFI_HOTP_Test final : public FFI_Test {
1✔
3321
   public:
3322
      std::string name() const override { return "FFI HOTP"; }
1✔
3323

3324
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
3325
         const std::vector<uint8_t> key = Botan::hex_decode("3132333435363738393031323334353637383930");
1✔
3326
         const size_t digits = 6;
1✔
3327

3328
         botan_hotp_t hotp;
1✔
3329
         uint32_t hotp_val;
1✔
3330

3331
         if(!TEST_FFI_INIT(botan_hotp_init, (&hotp, key.data(), key.size(), "SHA-1", digits))) {
1✔
3332
            return;
×
3333
         }
3334

3335
         TEST_FFI_OK(botan_hotp_generate, (hotp, &hotp_val, 0));
1✔
3336
         result.test_u32_eq("Valid value for counter 0", hotp_val, 755224);
1✔
3337
         TEST_FFI_OK(botan_hotp_generate, (hotp, &hotp_val, 1));
1✔
3338
         result.test_u32_eq("Valid value for counter 0", hotp_val, 287082);
1✔
3339
         TEST_FFI_OK(botan_hotp_generate, (hotp, &hotp_val, 2));
1✔
3340
         result.test_u32_eq("Valid value for counter 0", hotp_val, 359152);
1✔
3341
         TEST_FFI_OK(botan_hotp_generate, (hotp, &hotp_val, 0));
1✔
3342
         result.test_u32_eq("Valid value for counter 0", hotp_val, 755224);
1✔
3343

3344
         uint64_t next_ctr = 0;
1✔
3345

3346
         TEST_FFI_OK(botan_hotp_check, (hotp, &next_ctr, 755224, 0, 0));
1✔
3347
         result.test_u64_eq("HOTP resync", next_ctr, 1);
1✔
3348
         TEST_FFI_OK(botan_hotp_check, (hotp, nullptr, 359152, 2, 0));
1✔
3349
         TEST_FFI_RC(1, botan_hotp_check, (hotp, nullptr, 359152, 1, 0));
1✔
3350
         TEST_FFI_OK(botan_hotp_check, (hotp, &next_ctr, 359152, 0, 2));
1✔
3351
         result.test_u64_eq("HOTP resync", next_ctr, 3);
1✔
3352

3353
         TEST_FFI_OK(botan_hotp_destroy, (hotp));
1✔
3354
      }
1✔
3355
};
3356

3357
class FFI_Keywrap_Test final : public FFI_Test {
1✔
3358
   public:
3359
      std::string name() const override { return "FFI Keywrap"; }
1✔
3360

3361
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
3362
         const uint8_t key[16] = {0};
1✔
3363
         const uint8_t kek[16] = {0xFF, 0};
1✔
3364

3365
         uint8_t wrapped[16 + 8] = {0};
1✔
3366
         size_t wrapped_keylen = sizeof(wrapped);
1✔
3367

3368
         if(TEST_FFI_INIT(botan_key_wrap3394, (key, sizeof(key), kek, sizeof(kek), wrapped, &wrapped_keylen))) {
1✔
3369
            const uint8_t expected_wrapped_key[16 + 8] = {0x04, 0x13, 0x37, 0x39, 0x82, 0xCF, 0xFA, 0x31,
1✔
3370
                                                          0x81, 0xCA, 0x4F, 0x59, 0x74, 0x4D, 0xED, 0x29,
3371
                                                          0x1F, 0x3F, 0xE5, 0x24, 0x00, 0x1B, 0x93, 0x20};
3372

3373
            result.test_sz_eq("Expected wrapped keylen size", wrapped_keylen, 16 + 8);
1✔
3374

3375
            result.test_bin_eq(
1✔
3376
               "Wrapped key", {wrapped, wrapped_keylen}, {expected_wrapped_key, sizeof(expected_wrapped_key)});
3377

3378
            uint8_t dec_key[16] = {0};
1✔
3379
            size_t dec_keylen = sizeof(dec_key);
1✔
3380
            TEST_FFI_OK(botan_key_unwrap3394, (wrapped, sizeof(wrapped), kek, sizeof(kek), dec_key, &dec_keylen));
1✔
3381

3382
            result.test_bin_eq("Unwrapped key", {dec_key, dec_keylen}, {key, sizeof(key)});
1✔
3383
         }
3384
      }
1✔
3385
};
3386

3387
class FFI_XMSS_Test final : public FFI_Test {
1✔
3388
   public:
3389
      std::string name() const override { return "FFI XMSS"; }
1✔
3390

3391
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
3392
         botan_privkey_t priv;
1✔
3393
         if(TEST_FFI_INIT(botan_privkey_create, (&priv, "XMSS", "XMSS-SHA2_10_256", rng))) {
1✔
3394
            TEST_FFI_OK(botan_privkey_check_key, (priv, rng, 0));
1✔
3395

3396
            TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER, botan_privkey_stateful_operation, (priv, nullptr));
1✔
3397
            TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER, botan_privkey_remaining_operations, (priv, nullptr));
1✔
3398

3399
            int stateful;
1✔
3400
            TEST_FFI_OK(botan_privkey_stateful_operation, (priv, &stateful));
1✔
3401
            result.test_is_true("key is stateful", stateful == 1);
1✔
3402

3403
            uint64_t remaining;
1✔
3404
            TEST_FFI_OK(botan_privkey_remaining_operations, (priv, &remaining));
1✔
3405
            result.test_u64_eq("key has remaining operations", remaining, 1024);
1✔
3406

3407
            TEST_FFI_OK(botan_privkey_destroy, (priv));
1✔
3408
         }
3409
      }
1✔
3410
};
3411

3412
class FFI_RSA_Test final : public FFI_Test {
1✔
3413
   public:
3414
      std::string name() const override { return "FFI RSA"; }
1✔
3415

3416
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
3417
         botan_privkey_t priv;
1✔
3418

3419
         if(TEST_FFI_INIT(botan_privkey_create_rsa, (&priv, rng, 1024))) {
1✔
3420
            TEST_FFI_OK(botan_privkey_check_key, (priv, rng, 0));
1✔
3421

3422
            int stateful;
1✔
3423
            TEST_FFI_OK(botan_privkey_stateful_operation, (priv, &stateful));
1✔
3424
            result.test_is_true("key is not stateful", stateful == 0);
1✔
3425

3426
            uint64_t remaining;
1✔
3427
            TEST_FFI_FAIL("key is not stateful", botan_privkey_remaining_operations, (priv, &remaining));
1✔
3428

3429
            botan_pubkey_t pub;
1✔
3430
            TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
1✔
3431
            TEST_FFI_OK(botan_pubkey_check_key, (pub, rng, 0));
1✔
3432

3433
            ffi_test_pubkey_export(result, pub, priv, rng);
1✔
3434

3435
            botan_mp_t p;
1✔
3436
            botan_mp_t q;
1✔
3437
            botan_mp_t d;
1✔
3438
            botan_mp_t n;
1✔
3439
            botan_mp_t e;
1✔
3440
            botan_mp_init(&p);
1✔
3441
            botan_mp_init(&q);
1✔
3442
            botan_mp_init(&d);
1✔
3443
            botan_mp_init(&n);
1✔
3444
            botan_mp_init(&e);
1✔
3445

3446
            TEST_FFI_RC(BOTAN_FFI_ERROR_BAD_PARAMETER, botan_privkey_get_field, (p, priv, "quux"));
1✔
3447
            TEST_FFI_RC(BOTAN_FFI_ERROR_BAD_PARAMETER, botan_pubkey_get_field, (p, pub, "quux"));
1✔
3448

3449
            TEST_FFI_OK(botan_privkey_rsa_get_p, (p, priv));
1✔
3450
            TEST_FFI_OK(botan_privkey_rsa_get_q, (q, priv));
1✔
3451
            TEST_FFI_OK(botan_privkey_rsa_get_d, (d, priv));
1✔
3452
            TEST_FFI_OK(botan_privkey_rsa_get_e, (e, priv));
1✔
3453
            TEST_FFI_OK(botan_privkey_rsa_get_n, (n, priv));
1✔
3454

3455
            // Confirm same (e,n) values in public key
3456
            {
1✔
3457
               botan_mp_t pub_e;
1✔
3458
               botan_mp_t pub_n;
1✔
3459
               botan_mp_init(&pub_e);
1✔
3460
               botan_mp_init(&pub_n);
1✔
3461
               TEST_FFI_OK(botan_pubkey_rsa_get_e, (pub_e, pub));
1✔
3462
               TEST_FFI_OK(botan_pubkey_rsa_get_n, (pub_n, pub));
1✔
3463

3464
               TEST_FFI_RC(1, botan_mp_equal, (pub_e, e));
1✔
3465
               TEST_FFI_RC(1, botan_mp_equal, (pub_n, n));
1✔
3466
               botan_mp_destroy(pub_e);
1✔
3467
               botan_mp_destroy(pub_n);
1✔
3468
            }
3469

3470
            TEST_FFI_RC(1, botan_mp_is_prime, (p, rng, 64));
1✔
3471
            TEST_FFI_RC(1, botan_mp_is_prime, (q, rng, 64));
1✔
3472

3473
            // Test p != q
3474
            TEST_FFI_RC(0, botan_mp_equal, (p, q));
1✔
3475

3476
            // Test p * q == n
3477
            botan_mp_t x;
1✔
3478
            botan_mp_init(&x);
1✔
3479
            TEST_FFI_OK(botan_mp_mul, (x, p, q));
1✔
3480

3481
            TEST_FFI_RC(1, botan_mp_equal, (x, n));
1✔
3482
            botan_mp_destroy(x);
1✔
3483

3484
            botan_privkey_t loaded_privkey;
1✔
3485
            // First try loading a bogus key and verify check_key fails
3486
            TEST_FFI_OK(botan_privkey_load_rsa, (&loaded_privkey, n, d, q));
1✔
3487
            TEST_FFI_RC(-1, botan_privkey_check_key, (loaded_privkey, rng, 0));
1✔
3488
            botan_privkey_destroy(loaded_privkey);
1✔
3489

3490
            TEST_FFI_OK(botan_privkey_load_rsa, (&loaded_privkey, p, q, e));
1✔
3491
            TEST_FFI_OK(botan_privkey_check_key, (loaded_privkey, rng, 0));
1✔
3492

3493
            botan_pubkey_t loaded_pubkey;
1✔
3494
            TEST_FFI_OK(botan_pubkey_load_rsa, (&loaded_pubkey, n, e));
1✔
3495
            TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey, rng, 0));
1✔
3496

3497
            botan_mp_destroy(p);
1✔
3498
            botan_mp_destroy(q);
1✔
3499
            botan_mp_destroy(d);
1✔
3500
            botan_mp_destroy(e);
1✔
3501
            botan_mp_destroy(n);
1✔
3502

3503
            size_t pkcs1_len = 0;
1✔
3504
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
3505
                        botan_privkey_rsa_get_privkey,
3506
                        (loaded_privkey, nullptr, &pkcs1_len, BOTAN_PRIVKEY_EXPORT_FLAG_DER));
3507

3508
            std::vector<uint8_t> pkcs1(pkcs1_len);
1✔
3509
            TEST_FFI_OK(botan_privkey_rsa_get_privkey,
1✔
3510
                        (loaded_privkey, pkcs1.data(), &pkcs1_len, BOTAN_PRIVKEY_EXPORT_FLAG_DER));
3511

3512
            botan_privkey_t privkey_from_pkcs1;
1✔
3513
            TEST_FFI_OK(botan_privkey_load_rsa_pkcs1, (&privkey_from_pkcs1, pkcs1.data(), pkcs1_len));
1✔
3514
            TEST_FFI_OK(botan_privkey_destroy, (privkey_from_pkcs1));
1✔
3515

3516
            pkcs1_len = 0;
1✔
3517
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
3518
                        botan_privkey_rsa_get_privkey,
3519
                        (loaded_privkey, nullptr, &pkcs1_len, BOTAN_PRIVKEY_EXPORT_FLAG_PEM));
3520
            pkcs1.resize(pkcs1_len);
1✔
3521
            TEST_FFI_OK(botan_privkey_rsa_get_privkey,
1✔
3522
                        (loaded_privkey, pkcs1.data(), &pkcs1_len, BOTAN_PRIVKEY_EXPORT_FLAG_PEM));
3523

3524
            std::array<char, 32> namebuf{};
1✔
3525
            size_t name_len = namebuf.size();
1✔
3526
            if(TEST_FFI_OK(botan_pubkey_algo_name, (loaded_pubkey, namebuf.data(), &name_len))) {
1✔
3527
               result.test_str_eq("algo name", namebuf.data(), "RSA");
1✔
3528
            }
3529

3530
            name_len = namebuf.size();
1✔
3531
            if(TEST_FFI_OK(botan_privkey_algo_name, (loaded_privkey, namebuf.data(), &name_len))) {
1✔
3532
               result.test_str_eq("algo name", namebuf.data(), "RSA");
1✔
3533
            }
3534

3535
            botan_pk_op_encrypt_t encrypt;
1✔
3536
            if(TEST_FFI_INIT(botan_pk_op_encrypt_create, (&encrypt, loaded_pubkey, "OAEP(SHA-256)", 0))) {
1✔
3537
               std::vector<uint8_t> plaintext(32);
1✔
3538
               TEST_FFI_OK(botan_rng_get, (rng, plaintext.data(), plaintext.size()));
1✔
3539

3540
               size_t ctext_len;
1✔
3541
               TEST_FFI_OK(botan_pk_op_encrypt_output_length, (encrypt, plaintext.size(), &ctext_len));
1✔
3542
               std::vector<uint8_t> ciphertext(ctext_len);
1✔
3543

3544
               if(TEST_FFI_OK(botan_pk_op_encrypt,
1✔
3545
                              (encrypt, rng, ciphertext.data(), &ctext_len, plaintext.data(), plaintext.size()))) {
3546
                  ciphertext.resize(ctext_len);
1✔
3547

3548
                  botan_pk_op_decrypt_t decrypt;
1✔
3549
                  if(TEST_FFI_OK(botan_pk_op_decrypt_create, (&decrypt, priv, "OAEP(SHA-256)", 0))) {
1✔
3550
                     size_t decrypted_len;
1✔
3551
                     TEST_FFI_OK(botan_pk_op_decrypt_output_length, (decrypt, ciphertext.size(), &decrypted_len));
1✔
3552
                     std::vector<uint8_t> decrypted(decrypted_len);
1✔
3553
                     TEST_FFI_OK(botan_pk_op_decrypt,
1✔
3554
                                 (decrypt, decrypted.data(), &decrypted_len, ciphertext.data(), ciphertext.size()));
3555
                     decrypted.resize(decrypted_len);
1✔
3556

3557
                     result.test_bin_eq("RSA plaintext", decrypted, plaintext);
1✔
3558
                  }
1✔
3559

3560
                  TEST_FFI_OK(botan_pk_op_decrypt_destroy, (decrypt));
1✔
3561
               }
3562

3563
               TEST_FFI_OK(botan_pk_op_encrypt_destroy, (encrypt));
1✔
3564
            }
1✔
3565

3566
            TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey));
1✔
3567
            TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
3568
            TEST_FFI_OK(botan_privkey_destroy, (loaded_privkey));
1✔
3569
            TEST_FFI_OK(botan_privkey_destroy, (priv));
1✔
3570
         }
1✔
3571
      }
1✔
3572
};
3573

3574
class FFI_DSA_Test final : public FFI_Test {
1✔
3575
   public:
3576
      std::string name() const override { return "FFI DSA"; }
1✔
3577

3578
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
3579
         botan_privkey_t priv;
1✔
3580

3581
         if(TEST_FFI_INIT(botan_privkey_create, (&priv, "DSA", "dsa/jce/1024", rng))) {
1✔
3582
            do_dsa_test(priv, rng, result);
1✔
3583
         }
3584

3585
         if(TEST_FFI_INIT(botan_privkey_create_dsa, (&priv, rng, 1024, 160))) {
1✔
3586
            do_dsa_test(priv, rng, result);
1✔
3587
         }
3588
      }
1✔
3589

3590
   private:
3591
      static void do_dsa_test(botan_privkey_t priv, botan_rng_t rng, Test::Result& result) {
2✔
3592
         TEST_FFI_OK(botan_privkey_check_key, (priv, rng, 0));
2✔
3593

3594
         botan_pubkey_t pub;
2✔
3595
         TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
2✔
3596
         TEST_FFI_OK(botan_pubkey_check_key, (pub, rng, 0));
2✔
3597

3598
         ffi_test_pubkey_export(result, pub, priv, rng);
2✔
3599

3600
         botan_mp_t p;
2✔
3601
         botan_mp_t q;
2✔
3602
         botan_mp_t g;
2✔
3603
         botan_mp_t x;
2✔
3604
         botan_mp_t y;
2✔
3605
         botan_mp_init(&p);
2✔
3606
         botan_mp_init(&q);
2✔
3607
         botan_mp_init(&g);
2✔
3608
         botan_mp_init(&x);
2✔
3609
         botan_mp_init(&y);
2✔
3610

3611
         TEST_FFI_OK(botan_privkey_dsa_get_x, (x, priv));
2✔
3612
         TEST_FFI_OK(botan_pubkey_dsa_get_g, (g, pub));
2✔
3613
         TEST_FFI_OK(botan_pubkey_dsa_get_p, (p, pub));
2✔
3614
         TEST_FFI_OK(botan_pubkey_dsa_get_q, (q, pub));
2✔
3615
         TEST_FFI_OK(botan_pubkey_dsa_get_y, (y, pub));
2✔
3616

3617
         botan_mp_t cmp;
2✔
3618
         botan_mp_init(&cmp);
2✔
3619
         TEST_FFI_RC(BOTAN_FFI_ERROR_BAD_PARAMETER, botan_privkey_get_field, (cmp, priv, "quux"));
2✔
3620

3621
         TEST_FFI_OK(botan_privkey_get_field, (cmp, priv, "x"));
2✔
3622
         TEST_FFI_RC(1, botan_mp_equal, (cmp, x));
2✔
3623

3624
         TEST_FFI_OK(botan_privkey_get_field, (cmp, priv, "y"));
2✔
3625
         TEST_FFI_RC(1, botan_mp_equal, (cmp, y));
2✔
3626

3627
         TEST_FFI_OK(botan_privkey_get_field, (cmp, priv, "p"));
2✔
3628
         TEST_FFI_RC(1, botan_mp_equal, (cmp, p));
2✔
3629
         botan_mp_destroy(cmp);
2✔
3630

3631
         botan_privkey_t loaded_privkey;
2✔
3632
         TEST_FFI_OK(botan_privkey_load_dsa, (&loaded_privkey, p, q, g, x));
2✔
3633
         TEST_FFI_OK(botan_privkey_check_key, (loaded_privkey, rng, 0));
2✔
3634

3635
         botan_pubkey_t loaded_pubkey;
2✔
3636
         TEST_FFI_OK(botan_pubkey_load_dsa, (&loaded_pubkey, p, q, g, y));
2✔
3637
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey, rng, 0));
2✔
3638

3639
         botan_mp_destroy(p);
2✔
3640
         botan_mp_destroy(q);
2✔
3641
         botan_mp_destroy(g);
2✔
3642
         botan_mp_destroy(y);
2✔
3643
         botan_mp_destroy(x);
2✔
3644

3645
         botan_pk_op_sign_t signer;
2✔
3646

3647
         std::vector<uint8_t> message(6, 6);
2✔
3648
         std::vector<uint8_t> signature;
2✔
3649

3650
         if(TEST_FFI_OK(botan_pk_op_sign_create, (&signer, loaded_privkey, "SHA-256", 0))) {
2✔
3651
            // TODO: break input into multiple calls to update
3652
            TEST_FFI_OK(botan_pk_op_sign_update, (signer, message.data(), message.size()));
2✔
3653

3654
            size_t sig_len;
2✔
3655
            TEST_FFI_OK(botan_pk_op_sign_output_length, (signer, &sig_len));
2✔
3656
            signature.resize(sig_len);
2✔
3657

3658
            size_t output_sig_len = sig_len;
2✔
3659
            TEST_FFI_OK(botan_pk_op_sign_finish, (signer, rng, signature.data(), &output_sig_len));
2✔
3660
            result.test_sz_lte("Output length is upper bound", output_sig_len, sig_len);
2✔
3661
            signature.resize(output_sig_len);
2✔
3662

3663
            TEST_FFI_OK(botan_pk_op_sign_destroy, (signer));
2✔
3664
         }
3665

3666
         botan_pk_op_verify_t verifier = nullptr;
2✔
3667

3668
         if(!signature.empty() && TEST_FFI_OK(botan_pk_op_verify_create, (&verifier, pub, "SHA-256", 0))) {
2✔
3669
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3670
            TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
2✔
3671

3672
            // TODO: randomize this
3673
            signature[0] ^= 1;
2✔
3674
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3675
            TEST_FFI_RC(
2✔
3676
               BOTAN_FFI_INVALID_VERIFIER, botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
3677

3678
            message[0] ^= 1;
2✔
3679
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3680
            TEST_FFI_RC(
2✔
3681
               BOTAN_FFI_INVALID_VERIFIER, botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
3682

3683
            signature[0] ^= 1;
2✔
3684
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3685
            TEST_FFI_RC(
2✔
3686
               BOTAN_FFI_INVALID_VERIFIER, botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
3687

3688
            message[0] ^= 1;
2✔
3689
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3690
            TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
2✔
3691

3692
            TEST_FFI_OK(botan_pk_op_verify_destroy, (verifier));
2✔
3693
         }
3694

3695
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey));
2✔
3696
         TEST_FFI_OK(botan_pubkey_destroy, (pub));
2✔
3697
         TEST_FFI_OK(botan_privkey_destroy, (loaded_privkey));
2✔
3698
         TEST_FFI_OK(botan_privkey_destroy, (priv));
2✔
3699
      }
2✔
3700
};
3701

3702
class FFI_ECDSA_Test final : public FFI_Test {
1✔
3703
   public:
3704
      std::string name() const override { return "FFI ECDSA"; }
1✔
3705

3706
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
3707
         static const char* kCurve = "secp384r1";
1✔
3708
         botan_privkey_t priv;
1✔
3709
         botan_pubkey_t pub;
1✔
3710

3711
         if(!TEST_FFI_INIT(botan_privkey_create_ecdsa, (&priv, rng, kCurve))) {
1✔
3712
            return;
×
3713
         }
3714

3715
         TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
1✔
3716
         ffi_test_pubkey_export(result, pub, priv, rng);
1✔
3717

3718
         // Check key load functions
3719
         botan_mp_t private_scalar;
1✔
3720
         botan_mp_t public_x;
1✔
3721
         botan_mp_t public_y;
1✔
3722
         ViewBytesSink sec1;
1✔
3723
         botan_mp_init(&private_scalar);
1✔
3724
         botan_mp_init(&public_x);
1✔
3725
         botan_mp_init(&public_y);
1✔
3726

3727
         TEST_FFI_RC(BOTAN_FFI_ERROR_BAD_PARAMETER, botan_privkey_get_field, (private_scalar, priv, "quux"));
1✔
3728
         TEST_FFI_RC(BOTAN_FFI_ERROR_BAD_PARAMETER, botan_pubkey_get_field, (private_scalar, pub, "quux"));
1✔
3729

3730
         TEST_FFI_OK(botan_privkey_get_field, (private_scalar, priv, "x"));
1✔
3731
         TEST_FFI_OK(botan_pubkey_get_field, (public_x, pub, "public_x"));
1✔
3732
         TEST_FFI_OK(botan_pubkey_get_field, (public_y, pub, "public_y"));
1✔
3733
         TEST_FFI_OK(botan_pubkey_view_raw, (pub, sec1.delegate(), sec1.callback()));
1✔
3734

3735
         botan_privkey_t loaded_privkey;
1✔
3736
         botan_pubkey_t loaded_pubkey1;
1✔
3737
         botan_pubkey_t loaded_pubkey2;
1✔
3738
         TEST_FFI_OK(botan_privkey_load_ecdsa, (&loaded_privkey, private_scalar, kCurve));
1✔
3739
         TEST_FFI_OK(botan_pubkey_load_ecdsa, (&loaded_pubkey1, public_x, public_y, kCurve));
1✔
3740
         TEST_FFI_OK(botan_pubkey_load_ecdsa_sec1, (&loaded_pubkey2, sec1.data(), sec1.size(), kCurve));
1✔
3741
         TEST_FFI_OK(botan_privkey_check_key, (loaded_privkey, rng, 0));
1✔
3742
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey1, rng, 0));
1✔
3743
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey2, rng, 0));
1✔
3744

3745
         std::array<char, 32> namebuf{};
1✔
3746
         size_t name_len = namebuf.size();
1✔
3747

3748
         TEST_FFI_OK(botan_pubkey_algo_name, (pub, namebuf.data(), &name_len));
1✔
3749
         result.test_str_eq("Algo name is expected", namebuf.data(), "ECDSA");
1✔
3750

3751
         std::vector<uint8_t> message(1280);
1✔
3752
         std::vector<uint8_t> signature;
1✔
3753
         TEST_FFI_OK(botan_rng_get, (rng, message.data(), message.size()));
1✔
3754

3755
         for(uint32_t flags = 0; flags <= 1; ++flags) {
3✔
3756
            botan_pk_op_sign_t signer;
2✔
3757
            if(TEST_FFI_INIT(botan_pk_op_sign_create, (&signer, loaded_privkey, "SHA-384", flags))) {
2✔
3758
               // TODO: break input into multiple calls to update
3759
               TEST_FFI_OK(botan_pk_op_sign_update, (signer, message.data(), message.size()));
2✔
3760

3761
               size_t sig_len;
2✔
3762
               TEST_FFI_OK(botan_pk_op_sign_output_length, (signer, &sig_len));
2✔
3763

3764
               signature.resize(sig_len);
2✔
3765

3766
               size_t output_sig_len = signature.size();
2✔
3767
               TEST_FFI_OK(botan_pk_op_sign_finish, (signer, rng, signature.data(), &output_sig_len));
2✔
3768
               signature.resize(output_sig_len);
2✔
3769

3770
               TEST_FFI_OK(botan_pk_op_sign_destroy, (signer));
2✔
3771
            }
3772

3773
            botan_pk_op_verify_t verifier = nullptr;
2✔
3774

3775
            if(!signature.empty() && TEST_FFI_OK(botan_pk_op_verify_create, (&verifier, pub, "SHA-384", flags))) {
2✔
3776
               TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3777
               TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
2✔
3778

3779
               // TODO: randomize this
3780
               signature[0] ^= 1;
2✔
3781
               TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3782
               TEST_FFI_RC(BOTAN_FFI_INVALID_VERIFIER,
2✔
3783
                           botan_pk_op_verify_finish,
3784
                           (verifier, signature.data(), signature.size()));
3785

3786
               message[0] ^= 1;
2✔
3787
               TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3788
               TEST_FFI_RC(BOTAN_FFI_INVALID_VERIFIER,
2✔
3789
                           botan_pk_op_verify_finish,
3790
                           (verifier, signature.data(), signature.size()));
3791

3792
               signature[0] ^= 1;
2✔
3793
               TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3794
               TEST_FFI_RC(BOTAN_FFI_INVALID_VERIFIER,
2✔
3795
                           botan_pk_op_verify_finish,
3796
                           (verifier, signature.data(), signature.size()));
3797

3798
               message[0] ^= 1;
2✔
3799
               TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
2✔
3800
               TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
2✔
3801

3802
               TEST_FFI_OK(botan_pk_op_verify_destroy, (verifier));
2✔
3803
            }
3804
         }
3805

3806
         TEST_FFI_OK(botan_mp_destroy, (private_scalar));
1✔
3807
         TEST_FFI_OK(botan_mp_destroy, (public_x));
1✔
3808
         TEST_FFI_OK(botan_mp_destroy, (public_y));
1✔
3809
         TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
3810
         TEST_FFI_OK(botan_privkey_destroy, (priv));
1✔
3811
         TEST_FFI_OK(botan_privkey_destroy, (loaded_privkey));
1✔
3812
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey1));
1✔
3813
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey2));
1✔
3814
      }
1✔
3815
};
3816

3817
class FFI_SM2_Sig_Test final : public FFI_Test {
1✔
3818
   public:
3819
      std::string name() const override { return "FFI SM2 Sig"; }
1✔
3820

3821
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
3822
         static const char* kCurve = "sm2p256v1";
1✔
3823
         const std::string sm2_ident = "SM2 Ident Field";
1✔
3824
         botan_privkey_t priv;
1✔
3825
         botan_pubkey_t pub;
1✔
3826
         botan_privkey_t loaded_privkey;
1✔
3827
         botan_pubkey_t loaded_pubkey1;
1✔
3828
         botan_pubkey_t loaded_pubkey2;
1✔
3829

3830
         if(!TEST_FFI_INIT(botan_privkey_create, (&priv, "SM2_Sig", kCurve, rng))) {
1✔
3831
            return;
3832
         }
3833

3834
         TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
1✔
3835
         ffi_test_pubkey_export(result, pub, priv, rng);
1✔
3836

3837
         uint8_t za[32];
1✔
3838
         size_t sizeof_za = sizeof(za);
1✔
3839
         TEST_FFI_OK(botan_pubkey_sm2_compute_za, (za, &sizeof_za, "Ident", "SM3", pub));
1✔
3840

3841
         // Check key load functions
3842
         botan_mp_t private_scalar;
1✔
3843
         botan_mp_t public_x;
1✔
3844
         botan_mp_t public_y;
1✔
3845
         ViewBytesSink sec1;
1✔
3846
         botan_mp_init(&private_scalar);
1✔
3847
         botan_mp_init(&public_x);
1✔
3848
         botan_mp_init(&public_y);
1✔
3849

3850
         TEST_FFI_OK(botan_privkey_get_field, (private_scalar, priv, "x"));
1✔
3851
         TEST_FFI_OK(botan_pubkey_get_field, (public_x, pub, "public_x"));
1✔
3852
         TEST_FFI_OK(botan_pubkey_get_field, (public_y, pub, "public_y"));
1✔
3853
         TEST_FFI_OK(botan_pubkey_view_raw, (pub, sec1.delegate(), sec1.callback()));
1✔
3854
         REQUIRE_FFI_OK(botan_privkey_load_sm2, (&loaded_privkey, private_scalar, kCurve));
1✔
3855
         REQUIRE_FFI_OK(botan_pubkey_load_sm2, (&loaded_pubkey1, public_x, public_y, kCurve));
1✔
3856
         REQUIRE_FFI_OK(botan_pubkey_load_sm2_sec1, (&loaded_pubkey2, sec1.data(), sec1.size(), kCurve));
1✔
3857
         TEST_FFI_OK(botan_privkey_check_key, (loaded_privkey, rng, 0));
1✔
3858
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey1, rng, 0));
1✔
3859
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey2, rng, 0));
1✔
3860

3861
         std::array<char, 32> namebuf{};
1✔
3862
         size_t name_len = namebuf.size();
1✔
3863

3864
         TEST_FFI_OK(botan_pubkey_algo_name, (pub, namebuf.data(), &name_len));
1✔
3865
         result.test_str_eq("Algo name is expected", namebuf.data(), "SM2");
1✔
3866

3867
         std::vector<uint8_t> message(1280);
1✔
3868
         std::vector<uint8_t> signature;
1✔
3869
         TEST_FFI_OK(botan_rng_get, (rng, message.data(), message.size()));
1✔
3870
         botan_pk_op_sign_t signer;
1✔
3871
         if(TEST_FFI_OK(botan_pk_op_sign_create, (&signer, loaded_privkey, sm2_ident.c_str(), 0))) {
1✔
3872
            // TODO: break input into multiple calls to update
3873
            TEST_FFI_OK(botan_pk_op_sign_update, (signer, message.data(), message.size()));
1✔
3874

3875
            size_t sig_len;
1✔
3876
            TEST_FFI_OK(botan_pk_op_sign_output_length, (signer, &sig_len));
1✔
3877

3878
            signature.resize(sig_len);
1✔
3879

3880
            TEST_FFI_OK(botan_pk_op_sign_finish, (signer, rng, signature.data(), &sig_len));
1✔
3881
            signature.resize(sig_len);
1✔
3882

3883
            TEST_FFI_OK(botan_pk_op_sign_destroy, (signer));
1✔
3884
         }
3885

3886
         botan_pk_op_verify_t verifier = nullptr;
1✔
3887

3888
         if(!signature.empty() && TEST_FFI_OK(botan_pk_op_verify_create, (&verifier, pub, sm2_ident.c_str(), 0))) {
1✔
3889
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
1✔
3890
            TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
1✔
3891

3892
            // TODO: randomize this
3893
            signature[0] ^= 1;
1✔
3894
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
1✔
3895
            TEST_FFI_RC(
1✔
3896
               BOTAN_FFI_INVALID_VERIFIER, botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
3897

3898
            message[0] ^= 1;
1✔
3899
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
1✔
3900
            TEST_FFI_RC(
1✔
3901
               BOTAN_FFI_INVALID_VERIFIER, botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
3902

3903
            signature[0] ^= 1;
1✔
3904
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
1✔
3905
            TEST_FFI_RC(
1✔
3906
               BOTAN_FFI_INVALID_VERIFIER, botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
3907

3908
            message[0] ^= 1;
1✔
3909
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
1✔
3910
            TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
1✔
3911

3912
            TEST_FFI_OK(botan_pk_op_verify_destroy, (verifier));
1✔
3913
         }
3914

3915
         TEST_FFI_OK(botan_mp_destroy, (private_scalar));
1✔
3916
         TEST_FFI_OK(botan_mp_destroy, (public_x));
1✔
3917
         TEST_FFI_OK(botan_mp_destroy, (public_y));
1✔
3918
         TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
3919
         TEST_FFI_OK(botan_privkey_destroy, (priv));
1✔
3920
         TEST_FFI_OK(botan_privkey_destroy, (loaded_privkey));
1✔
3921
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey1));
1✔
3922
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey2));
1✔
3923
      }
1✔
3924
};
3925

3926
class FFI_SM2_Enc_Test final : public FFI_Test {
1✔
3927
   public:
3928
      std::string name() const override { return "FFI SM2 Enc"; }
1✔
3929

3930
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
3931
         static const char* kCurve = "sm2p256v1";
1✔
3932
         botan_privkey_t priv;
1✔
3933
         botan_pubkey_t pub;
1✔
3934
         botan_privkey_t loaded_privkey;
1✔
3935
         botan_pubkey_t loaded_pubkey1;
1✔
3936
         botan_pubkey_t loaded_pubkey2;
1✔
3937

3938
         if(!TEST_FFI_INIT(botan_privkey_create, (&priv, "SM2_Enc", kCurve, rng))) {
1✔
3939
            return;
×
3940
         }
3941

3942
         TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
1✔
3943
         ffi_test_pubkey_export(result, pub, priv, rng);
1✔
3944

3945
         uint8_t za[32];
1✔
3946
         size_t sizeof_za = sizeof(za);
1✔
3947
         TEST_FFI_OK(botan_pubkey_sm2_compute_za, (za, &sizeof_za, "Ident", "SM3", pub));
1✔
3948

3949
         // Check key load functions
3950
         botan_mp_t private_scalar;
1✔
3951
         botan_mp_t public_x;
1✔
3952
         botan_mp_t public_y;
1✔
3953
         ViewBytesSink sec1;
1✔
3954
         botan_mp_init(&private_scalar);
1✔
3955
         botan_mp_init(&public_x);
1✔
3956
         botan_mp_init(&public_y);
1✔
3957

3958
         TEST_FFI_OK(botan_privkey_get_field, (private_scalar, priv, "x"));
1✔
3959
         TEST_FFI_OK(botan_pubkey_get_field, (public_x, pub, "public_x"));
1✔
3960
         TEST_FFI_OK(botan_pubkey_get_field, (public_y, pub, "public_y"));
1✔
3961
         TEST_FFI_OK(botan_pubkey_view_raw, (pub, sec1.delegate(), sec1.callback()));
1✔
3962
         REQUIRE_FFI_OK(botan_privkey_load_sm2_enc, (&loaded_privkey, private_scalar, kCurve));
1✔
3963
         REQUIRE_FFI_OK(botan_pubkey_load_sm2_enc, (&loaded_pubkey1, public_x, public_y, kCurve));
1✔
3964
         REQUIRE_FFI_OK(botan_pubkey_load_sm2_sec1, (&loaded_pubkey2, sec1.data(), sec1.size(), kCurve));
1✔
3965
         TEST_FFI_OK(botan_privkey_check_key, (loaded_privkey, rng, 0));
1✔
3966
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey1, rng, 0));
1✔
3967
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey2, rng, 0));
1✔
3968

3969
         std::array<char, 32> namebuf{};
1✔
3970
         size_t name_len = namebuf.size();
1✔
3971

3972
         TEST_FFI_OK(botan_pubkey_algo_name, (pub, namebuf.data(), &name_len));
1✔
3973
         result.test_str_eq("Algo name is expected", namebuf.data(), "SM2");
1✔
3974

3975
         std::vector<uint8_t> message(32);
1✔
3976

3977
         std::vector<uint8_t> ciphertext;
1✔
3978
         TEST_FFI_OK(botan_rng_get, (rng, message.data(), message.size()));
1✔
3979

3980
         botan_pk_op_encrypt_t enc;
1✔
3981
         if(TEST_FFI_OK(botan_pk_op_encrypt_create, (&enc, loaded_pubkey1, "", 0))) {
1✔
3982
            size_t ctext_len;
1✔
3983
            TEST_FFI_OK(botan_pk_op_encrypt_output_length, (enc, message.size(), &ctext_len));
1✔
3984

3985
            ciphertext.resize(ctext_len);
1✔
3986
            TEST_FFI_OK(botan_pk_op_encrypt, (enc, rng, ciphertext.data(), &ctext_len, message.data(), message.size()));
1✔
3987
            ciphertext.resize(ctext_len);
1✔
3988

3989
            botan_pk_op_decrypt_t dec;
1✔
3990
            TEST_FFI_OK(botan_pk_op_decrypt_create, (&dec, loaded_privkey, "", 0));
1✔
3991

3992
            std::vector<uint8_t> recovered(message.size());
1✔
3993
            size_t recovered_len = recovered.size();
1✔
3994

3995
            TEST_FFI_OK(botan_pk_op_decrypt,
1✔
3996
                        (dec, recovered.data(), &recovered_len, ciphertext.data(), ciphertext.size()));
3997

3998
            botan_pk_op_decrypt_destroy(dec);
1✔
3999
         }
1✔
4000
         botan_pk_op_encrypt_destroy(enc);
1✔
4001

4002
         TEST_FFI_OK(botan_mp_destroy, (private_scalar));
1✔
4003
         TEST_FFI_OK(botan_mp_destroy, (public_x));
1✔
4004
         TEST_FFI_OK(botan_mp_destroy, (public_y));
1✔
4005
         TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
4006
         TEST_FFI_OK(botan_privkey_destroy, (priv));
1✔
4007
         TEST_FFI_OK(botan_privkey_destroy, (loaded_privkey));
1✔
4008
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey1));
1✔
4009
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey2));
1✔
4010
      }
1✔
4011
};
4012

4013
class FFI_ECDH_Test final : public FFI_Test {
1✔
4014
   public:
4015
      std::string name() const override { return "FFI ECDH"; }
1✔
4016

4017
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
4018
         botan_privkey_t priv1;
1✔
4019
         if(!TEST_FFI_INIT(botan_privkey_create_ecdh, (&priv1, rng, "secp256r1"))) {
1✔
4020
            return;
×
4021
         }
4022

4023
         botan_privkey_t priv2;
1✔
4024
         REQUIRE_FFI_OK(botan_privkey_create_ecdh, (&priv2, rng, "secp256r1"));
1✔
4025

4026
         botan_pubkey_t pub1;
1✔
4027
         REQUIRE_FFI_OK(botan_privkey_export_pubkey, (&pub1, priv1));
1✔
4028

4029
         botan_pubkey_t pub2;
1✔
4030
         REQUIRE_FFI_OK(botan_privkey_export_pubkey, (&pub2, priv2));
1✔
4031

4032
         /* Reload key-pair1 in order to test functions for key loading */
4033
         botan_mp_t private_scalar;
1✔
4034
         botan_mp_t public_x;
1✔
4035
         botan_mp_t public_y;
1✔
4036
         ViewBytesSink sec1;
1✔
4037
         botan_mp_init(&private_scalar);
1✔
4038
         botan_mp_init(&public_x);
1✔
4039
         botan_mp_init(&public_y);
1✔
4040

4041
         TEST_FFI_OK(botan_privkey_get_field, (private_scalar, priv1, "x"));
1✔
4042
         TEST_FFI_OK(botan_pubkey_get_field, (public_x, pub1, "public_x"));
1✔
4043
         TEST_FFI_OK(botan_pubkey_get_field, (public_y, pub1, "public_y"));
1✔
4044
         TEST_FFI_OK(botan_pubkey_view_raw, (pub1, sec1.delegate(), sec1.callback()));
1✔
4045

4046
         botan_privkey_t loaded_privkey1;
1✔
4047
         botan_pubkey_t loaded_pubkey1;
1✔
4048
         botan_pubkey_t loaded_pubkey2;
1✔
4049
         REQUIRE_FFI_OK(botan_privkey_load_ecdh, (&loaded_privkey1, private_scalar, "secp256r1"));
1✔
4050
         REQUIRE_FFI_OK(botan_pubkey_load_ecdh, (&loaded_pubkey1, public_x, public_y, "secp256r1"));
1✔
4051
         REQUIRE_FFI_OK(botan_pubkey_load_ecdh_sec1, (&loaded_pubkey2, sec1.data(), sec1.size(), "secp256r1"));
1✔
4052
         TEST_FFI_OK(botan_privkey_check_key, (loaded_privkey1, rng, 0));
1✔
4053
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey1, rng, 0));
1✔
4054
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey2, rng, 0));
1✔
4055

4056
         ffi_test_pubkey_export(result, loaded_pubkey1, priv1, rng);
1✔
4057
         ffi_test_pubkey_export(result, loaded_pubkey2, priv1, rng);
1✔
4058
         ffi_test_pubkey_export(result, pub2, priv2, rng);
1✔
4059

4060
   #if defined(BOTAN_HAS_KDF2) && defined(BOTAN_HAS_SHA_256)
4061
         constexpr bool has_kdf2_sha256 = true;
1✔
4062
   #else
4063
         constexpr bool has_kdf2_sha256 = false;
4064
   #endif
4065

4066
         const char* kdf = has_kdf2_sha256 ? "KDF2(SHA-256)" : "Raw";
1✔
4067
         constexpr size_t salt_len = has_kdf2_sha256 ? 32 : 0;
1✔
4068

4069
         botan_pk_op_ka_t ka1;
1✔
4070
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_create, (&ka1, loaded_privkey1, kdf, 0));
1✔
4071
         botan_pk_op_ka_t ka2;
1✔
4072
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_create, (&ka2, priv2, kdf, 0));
1✔
4073

4074
         size_t pubkey1_len = 0;
1✔
4075
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
4076
                     botan_pk_op_key_agreement_export_public,
4077
                     (priv1, nullptr, &pubkey1_len));
4078
         std::vector<uint8_t> pubkey1(pubkey1_len);
1✔
4079
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_export_public, (priv1, pubkey1.data(), &pubkey1_len));
1✔
4080
         size_t pubkey2_len = 0;
1✔
4081
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
4082
                     botan_pk_op_key_agreement_export_public,
4083
                     (priv2, nullptr, &pubkey2_len));
4084
         std::vector<uint8_t> pubkey2(pubkey2_len);
1✔
4085
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_export_public, (priv2, pubkey2.data(), &pubkey2_len));
1✔
4086

4087
         std::vector<uint8_t> salt(salt_len);
1✔
4088
         TEST_FFI_OK(botan_rng_get, (rng, salt.data(), salt.size()));
1✔
4089

4090
         const size_t shared_key_len = 32;
1✔
4091

4092
         std::vector<uint8_t> key1(shared_key_len);
1✔
4093
         size_t key1_len = key1.size();
1✔
4094
         TEST_FFI_OK(botan_pk_op_key_agreement,
1✔
4095
                     (ka1, key1.data(), &key1_len, pubkey2.data(), pubkey2.size(), salt.data(), salt.size()));
4096

4097
         std::vector<uint8_t> key2(shared_key_len);
1✔
4098
         size_t key2_len = key2.size();
1✔
4099
         TEST_FFI_OK(botan_pk_op_key_agreement,
1✔
4100
                     (ka2, key2.data(), &key2_len, pubkey1.data(), pubkey1.size(), salt.data(), salt.size()));
4101

4102
         result.test_bin_eq("shared ECDH key", key1, key2);
1✔
4103

4104
         TEST_FFI_OK(botan_mp_destroy, (private_scalar));
1✔
4105
         TEST_FFI_OK(botan_mp_destroy, (public_x));
1✔
4106
         TEST_FFI_OK(botan_mp_destroy, (public_y));
1✔
4107
         TEST_FFI_OK(botan_pk_op_key_agreement_destroy, (ka1));
1✔
4108
         TEST_FFI_OK(botan_pk_op_key_agreement_destroy, (ka2));
1✔
4109
         TEST_FFI_OK(botan_privkey_destroy, (priv1));
1✔
4110
         TEST_FFI_OK(botan_privkey_destroy, (priv2));
1✔
4111
         TEST_FFI_OK(botan_pubkey_destroy, (pub1));
1✔
4112
         TEST_FFI_OK(botan_pubkey_destroy, (pub2));
1✔
4113
         TEST_FFI_OK(botan_privkey_destroy, (loaded_privkey1));
1✔
4114
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey1));
1✔
4115
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey2));
1✔
4116
      }
1✔
4117
};
4118

4119
class FFI_McEliece_Test final : public FFI_Test {
1✔
4120
   public:
4121
      std::string name() const override { return "FFI McEliece"; }
1✔
4122

4123
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
4124
         botan_privkey_t priv;
1✔
4125
         if(TEST_FFI_INIT(botan_privkey_create_mceliece, (&priv, rng, 2048, 50))) {
1✔
4126
            botan_pubkey_t pub;
1✔
4127
            TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
1✔
4128

4129
            ffi_test_pubkey_export(result, pub, priv, rng);
1✔
4130

4131
            std::array<char, 32> namebuf{};
1✔
4132
            size_t name_len = namebuf.size();
1✔
4133
            if(TEST_FFI_OK(botan_pubkey_algo_name, (pub, namebuf.data(), &name_len))) {
1✔
4134
               result.test_str_eq("algo name", namebuf.data(), "McEliece");
1✔
4135
            }
4136

4137
            // TODO test KEM
4138

4139
            TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
4140
            TEST_FFI_OK(botan_privkey_destroy, (priv));
1✔
4141
         }
4142
      }
1✔
4143
};
4144

4145
class FFI_Ed25519_Test final : public FFI_Test {
1✔
4146
   public:
4147
      std::string name() const override { return "FFI Ed25519"; }
1✔
4148

4149
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
4150
         botan_pubkey_t pub;
1✔
4151
         botan_privkey_t priv;
1✔
4152

4153
         // From draft-koch-eddsa-for-openpgp-04
4154
         const std::vector<uint8_t> seed =
1✔
4155
            Botan::hex_decode("1a8b1ff05ded48e18bf50166c664ab023ea70003d78d9e41f5758a91d850f8d2");
1✔
4156
         const std::vector<uint8_t> pubkey =
1✔
4157
            Botan::hex_decode("3f098994bdd916ed4053197934e4a87c80733a1280d62f8010992e43ee3b2406");
1✔
4158
         const std::vector<uint8_t> message = Botan::hex_decode("4f70656e504750040016080006050255f95f9504ff0000000c");
1✔
4159
         const std::vector<uint8_t> exp_sig = Botan::hex_decode(
1✔
4160
            "56f90cca98e2102637bd983fdb16c131dfd27ed82bf4dde5606e0d756aed3366"
4161
            "d09c4fa11527f038e0f57f2201d82f2ea2c9033265fa6ceb489e854bae61b404");
1✔
4162

4163
         if(!TEST_FFI_INIT(botan_privkey_load_ed25519, (&priv, seed.data()))) {
1✔
4164
            return;
×
4165
         }
4166

4167
         uint8_t retr_privkey[64];
1✔
4168
         TEST_FFI_OK(botan_privkey_ed25519_get_privkey, (priv, retr_privkey));
1✔
4169

4170
         result.test_bin_eq("Public key matches", {retr_privkey + 32, 32}, pubkey);
1✔
4171

4172
         TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
1✔
4173

4174
         uint8_t retr_pubkey[32];
1✔
4175
         TEST_FFI_OK(botan_pubkey_ed25519_get_pubkey, (pub, retr_pubkey));
1✔
4176
         result.test_bin_eq("Public key matches", {retr_pubkey, 32}, pubkey);
1✔
4177

4178
         TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
4179
         TEST_FFI_OK(botan_pubkey_load_ed25519, (&pub, pubkey.data()));
1✔
4180

4181
         botan_pk_op_sign_t signer;
1✔
4182
         std::vector<uint8_t> signature;
1✔
4183

4184
         if(TEST_FFI_OK(botan_pk_op_sign_create, (&signer, priv, "SHA-256", 0))) {
1✔
4185
            TEST_FFI_OK(botan_pk_op_sign_update, (signer, message.data(), message.size()));
1✔
4186

4187
            size_t sig_len;
1✔
4188
            TEST_FFI_OK(botan_pk_op_sign_output_length, (signer, &sig_len));
1✔
4189

4190
            signature.resize(sig_len);
1✔
4191

4192
            TEST_FFI_OK(botan_pk_op_sign_finish, (signer, rng, signature.data(), &sig_len));
1✔
4193
            signature.resize(sig_len);
1✔
4194

4195
            TEST_FFI_OK(botan_pk_op_sign_destroy, (signer));
1✔
4196
         }
4197

4198
         result.test_bin_eq("Expected signature", signature, exp_sig);
1✔
4199

4200
         botan_pk_op_verify_t verifier;
1✔
4201

4202
         if(TEST_FFI_OK(botan_pk_op_verify_create, (&verifier, pub, "SHA-256", 0))) {
1✔
4203
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message.data(), message.size()));
1✔
4204
            TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
1✔
4205

4206
            TEST_FFI_OK(botan_pk_op_verify_destroy, (verifier));
1✔
4207
         }
4208

4209
         TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
4210
         TEST_FFI_OK(botan_privkey_destroy, (priv));
1✔
4211
      }
1✔
4212
};
4213

4214
class FFI_Ed448_Test final : public FFI_Test {
1✔
4215
   public:
4216
      std::string name() const override { return "FFI Ed448"; }
1✔
4217

4218
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
4219
         botan_pubkey_t pub;
1✔
4220
         botan_privkey_t priv;
1✔
4221

4222
         // RFC 8032: Testvector Ed448, 1 octet
4223
         const auto sk = Botan::hex_decode(
1✔
4224
            "c4eab05d357007c632f3dbb48489924d552b08fe0c353a0d4a1f00acda2c463afbea67c5e8d2877c5e3bc397a659949ef8021e954e0a12274e");
1✔
4225
         const auto pk_ref = Botan::hex_decode(
1✔
4226
            "43ba28f430cdff456ae531545f7ecd0ac834a55d9358c0372bfa0c6c6798c0866aea01eb00742802b8438ea4cb82169c235160627b4c3a9480");
1✔
4227
         const auto msg = Botan::hex_decode("03");
1✔
4228
         const auto sig_ref = Botan::hex_decode(
1✔
4229
            "26b8f91727bd62897af15e41eb43c377efb9c610d48f2335cb0bd0087810f4352541b143c4b981b7e18f62de8ccdf633fc1bf037ab7cd779805e0dbcc0aae1cbcee1afb2e027df36bc04dcecbf154336c19f0af7e0a6472905e799f1953d2a0ff3348ab21aa4adafd1d234441cf807c03a00");
1✔
4230

4231
         if(!TEST_FFI_INIT(botan_privkey_load_ed448, (&priv, sk.data()))) {
1✔
4232
            return;
×
4233
         }
4234

4235
         std::vector<uint8_t> retr_privkey(57);
1✔
4236
         TEST_FFI_OK(botan_privkey_ed448_get_privkey, (priv, retr_privkey.data()));
1✔
4237
         result.test_bin_eq("Private key matches", retr_privkey, sk);
1✔
4238

4239
         TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
1✔
4240

4241
         std::vector<uint8_t> retr_pubkey(57);
1✔
4242
         TEST_FFI_OK(botan_pubkey_ed448_get_pubkey, (pub, retr_pubkey.data()));
1✔
4243
         result.test_bin_eq("Public key matches", retr_pubkey, pk_ref);
1✔
4244

4245
         TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
4246
         TEST_FFI_OK(botan_pubkey_load_ed448, (&pub, pk_ref.data()));
1✔
4247

4248
         botan_pk_op_sign_t signer;
1✔
4249
         std::vector<uint8_t> signature;
1✔
4250

4251
         if(TEST_FFI_OK(botan_pk_op_sign_create, (&signer, priv, "Pure", 0))) {
1✔
4252
            TEST_FFI_OK(botan_pk_op_sign_update, (signer, msg.data(), msg.size()));
1✔
4253

4254
            size_t sig_len;
1✔
4255
            TEST_FFI_OK(botan_pk_op_sign_output_length, (signer, &sig_len));
1✔
4256

4257
            signature.resize(sig_len);
1✔
4258

4259
            TEST_FFI_OK(botan_pk_op_sign_finish, (signer, rng, signature.data(), &sig_len));
1✔
4260
            signature.resize(sig_len);
1✔
4261

4262
            TEST_FFI_OK(botan_pk_op_sign_destroy, (signer));
1✔
4263
         }
4264

4265
         result.test_bin_eq("Expected signature", signature, sig_ref);
1✔
4266

4267
         botan_pk_op_verify_t verifier;
1✔
4268

4269
         if(TEST_FFI_OK(botan_pk_op_verify_create, (&verifier, pub, "Pure", 0))) {
1✔
4270
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, msg.data(), msg.size()));
1✔
4271
            TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
1✔
4272

4273
            TEST_FFI_OK(botan_pk_op_verify_destroy, (verifier));
1✔
4274
         }
4275

4276
         TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
4277
         TEST_FFI_OK(botan_privkey_destroy, (priv));
1✔
4278
      }
1✔
4279
};
4280

4281
class FFI_X25519_Test final : public FFI_Test {
1✔
4282
   public:
4283
      std::string name() const override { return "FFI X25519"; }
1✔
4284

4285
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
4286
         // From RFC 8037
4287

4288
         const std::vector<uint8_t> a_pub_bits =
1✔
4289
            Botan::hex_decode("de9edb7d7b7dc1b4d35b61c2ece435373f8343c85b78674dadfc7e146f882b4f");
1✔
4290
         const std::vector<uint8_t> b_priv_bits =
1✔
4291
            Botan::hex_decode("77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c2a");
1✔
4292
         const std::vector<uint8_t> b_pub_bits =
1✔
4293
            Botan::hex_decode("8520f0098930a754748b7ddcb43ef75a0dbf3a0d26381af4eba4a98eaa9b4e6a");
1✔
4294
         const std::vector<uint8_t> shared_secret_bits =
1✔
4295
            Botan::hex_decode("4a5d9d5ba4ce2de1728e3bf480350f25e07e21c947d19e3376f09b3c1e161742");
1✔
4296

4297
         botan_privkey_t b_priv;
1✔
4298
         if(!TEST_FFI_INIT(botan_privkey_load_x25519, (&b_priv, b_priv_bits.data()))) {
1✔
4299
            return;
4300
         }
4301

4302
         std::vector<uint8_t> privkey_read(32);
1✔
4303
         TEST_FFI_OK(botan_privkey_x25519_get_privkey, (b_priv, privkey_read.data()));
1✔
4304
         result.test_bin_eq("X25519 private key", privkey_read, b_priv_bits);
1✔
4305

4306
         std::vector<uint8_t> pubkey_read(32);
1✔
4307

4308
         botan_pubkey_t b_pub;
1✔
4309
         TEST_FFI_OK(botan_privkey_export_pubkey, (&b_pub, b_priv));
1✔
4310
         TEST_FFI_OK(botan_pubkey_x25519_get_pubkey, (b_pub, pubkey_read.data()));
1✔
4311
         result.test_bin_eq("X25519 public key b", pubkey_read, b_pub_bits);
1✔
4312

4313
         botan_pubkey_t a_pub;
1✔
4314
         TEST_FFI_OK(botan_pubkey_load_x25519, (&a_pub, a_pub_bits.data()));
1✔
4315
         TEST_FFI_OK(botan_pubkey_x25519_get_pubkey, (a_pub, pubkey_read.data()));
1✔
4316
         result.test_bin_eq("X25519 public key a", pubkey_read, a_pub_bits);
1✔
4317

4318
         botan_pk_op_ka_t ka;
1✔
4319
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_create, (&ka, b_priv, "Raw", 0));
1✔
4320

4321
         std::vector<uint8_t> shared_output(32);
1✔
4322
         size_t shared_len = shared_output.size();
1✔
4323
         TEST_FFI_OK(botan_pk_op_key_agreement,
1✔
4324
                     (ka, shared_output.data(), &shared_len, a_pub_bits.data(), a_pub_bits.size(), nullptr, 0));
4325

4326
         result.test_bin_eq("Shared secret matches expected", shared_secret_bits, shared_output);
1✔
4327

4328
         TEST_FFI_OK(botan_pubkey_destroy, (a_pub));
1✔
4329
         TEST_FFI_OK(botan_pubkey_destroy, (b_pub));
1✔
4330
         TEST_FFI_OK(botan_privkey_destroy, (b_priv));
1✔
4331
         TEST_FFI_OK(botan_pk_op_key_agreement_destroy, (ka));
1✔
4332
      }
1✔
4333
};
4334

4335
class FFI_X448_Test final : public FFI_Test {
1✔
4336
   public:
4337
      std::string name() const override { return "FFI X448"; }
1✔
4338

4339
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
4340
         // From RFC 7748 Section 6.2
4341
         const auto a_pub_ref = Botan::hex_decode(
1✔
4342
            "9b08f7cc31b7e3e67d22d5aea121074a273bd2b83de09c63faa73d2c22c5d9bbc836647241d953d40c5b12da88120d53177f80e532c41fa0");
1✔
4343
         const auto b_priv_ref = Botan::hex_decode(
1✔
4344
            "1c306a7ac2a0e2e0990b294470cba339e6453772b075811d8fad0d1d6927c120bb5ee8972b0d3e21374c9c921b09d1b0366f10b65173992d");
1✔
4345
         const auto b_pub_ref = Botan::hex_decode(
1✔
4346
            "3eb7a829b0cd20f5bcfc0b599b6feccf6da4627107bdb0d4f345b43027d8b972fc3e34fb4232a13ca706dcb57aec3dae07bdc1c67bf33609");
1✔
4347
         const auto shared_secret_ref = Botan::hex_decode(
1✔
4348
            "07fff4181ac6cc95ec1c16a94a0f74d12da232ce40a77552281d282bb60c0b56fd2464c335543936521c24403085d59a449a5037514a879d");
1✔
4349

4350
         botan_privkey_t b_priv;
1✔
4351
         if(!TEST_FFI_INIT(botan_privkey_load_x448, (&b_priv, b_priv_ref.data()))) {
1✔
4352
            return;
4353
         }
4354

4355
         std::vector<uint8_t> privkey_read(56);
1✔
4356
         TEST_FFI_OK(botan_privkey_x448_get_privkey, (b_priv, privkey_read.data()));
1✔
4357
         result.test_bin_eq("X448 private key", privkey_read, b_priv_ref);
1✔
4358

4359
         std::vector<uint8_t> pubkey_read(56);
1✔
4360

4361
         botan_pubkey_t b_pub;
1✔
4362
         TEST_FFI_OK(botan_privkey_export_pubkey, (&b_pub, b_priv));
1✔
4363
         TEST_FFI_OK(botan_pubkey_x448_get_pubkey, (b_pub, pubkey_read.data()));
1✔
4364
         result.test_bin_eq("X448 public key b", pubkey_read, b_pub_ref);
1✔
4365

4366
         botan_pubkey_t a_pub;
1✔
4367
         TEST_FFI_OK(botan_pubkey_load_x448, (&a_pub, a_pub_ref.data()));
1✔
4368
         TEST_FFI_OK(botan_pubkey_x448_get_pubkey, (a_pub, pubkey_read.data()));
1✔
4369
         result.test_bin_eq("X448 public key a", pubkey_read, a_pub_ref);
1✔
4370

4371
         botan_pk_op_ka_t ka;
1✔
4372
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_create, (&ka, b_priv, "Raw", 0));
1✔
4373

4374
         std::vector<uint8_t> shared_output(56);
1✔
4375
         size_t shared_len = shared_output.size();
1✔
4376
         TEST_FFI_OK(botan_pk_op_key_agreement,
1✔
4377
                     (ka, shared_output.data(), &shared_len, a_pub_ref.data(), a_pub_ref.size(), nullptr, 0));
4378

4379
         result.test_bin_eq("Shared secret matches expected", shared_secret_ref, shared_output);
1✔
4380

4381
         TEST_FFI_OK(botan_pubkey_destroy, (a_pub));
1✔
4382
         TEST_FFI_OK(botan_pubkey_destroy, (b_pub));
1✔
4383
         TEST_FFI_OK(botan_privkey_destroy, (b_priv));
1✔
4384
         TEST_FFI_OK(botan_pk_op_key_agreement_destroy, (ka));
1✔
4385
      }
1✔
4386
};
4387

4388
/**
4389
 * Base class for roundtrip tests of FFI bindings for Key Encapsulation Mechanisms.
4390
 */
4391
class FFI_KEM_Roundtrip_Test : public FFI_Test {
6✔
4392
   protected:
4393
      using privkey_loader_fn_t = int (*)(botan_privkey_t*, const uint8_t[], size_t, const char*);
4394
      using pubkey_loader_fn_t = int (*)(botan_pubkey_t*, const uint8_t[], size_t, const char*);
4395

4396
   protected:
4397
      virtual const char* algo() const = 0;
4398
      virtual privkey_loader_fn_t private_key_load_function() const = 0;
4399
      virtual pubkey_loader_fn_t public_key_load_function() const = 0;
4400
      virtual std::vector<const char*> modes() const = 0;
4401

4402
   public:
4403
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
3✔
4404
         for(const auto* mode : modes()) {
34✔
4405
            // generate a key pair
4406
            botan_privkey_t priv;
31✔
4407
            botan_pubkey_t pub;
31✔
4408
            if(!TEST_FFI_INIT(botan_privkey_create, (&priv, algo(), mode, rng))) {
31✔
4409
               continue;
×
4410
            }
4411
            TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
31✔
4412

4413
            // raw-encode the key pair
4414
            ViewBytesSink priv_bytes;
31✔
4415
            ViewBytesSink pub_bytes;
31✔
4416
            TEST_FFI_OK(botan_privkey_view_raw, (priv, priv_bytes.delegate(), priv_bytes.callback()));
31✔
4417
            TEST_FFI_OK(botan_pubkey_view_raw, (pub, pub_bytes.delegate(), pub_bytes.callback()));
31✔
4418

4419
            // decode the key pair from raw encoding
4420
            botan_privkey_t priv_loaded;
31✔
4421
            botan_pubkey_t pub_loaded;
31✔
4422
            TEST_FFI_OK(private_key_load_function(),
31✔
4423
                        (&priv_loaded, priv_bytes.get().data(), priv_bytes.get().size(), mode));
4424
            TEST_FFI_OK(public_key_load_function(),
31✔
4425
                        (&pub_loaded, pub_bytes.get().data(), pub_bytes.get().size(), mode));
4426

4427
            // re-encode and compare to the first round
4428
            ViewBytesSink priv_bytes2;
31✔
4429
            ViewBytesSink pub_bytes2;
31✔
4430
            TEST_FFI_OK(botan_privkey_view_raw, (priv_loaded, priv_bytes2.delegate(), priv_bytes2.callback()));
31✔
4431
            TEST_FFI_OK(botan_pubkey_view_raw, (pub_loaded, pub_bytes2.delegate(), pub_bytes2.callback()));
31✔
4432
            result.test_bin_eq("private key encoding", priv_bytes.get(), priv_bytes2.get());
31✔
4433
            result.test_bin_eq("public key encoding", pub_bytes.get(), pub_bytes2.get());
31✔
4434

4435
            // KEM encryption (using the loaded public key)
4436
            botan_pk_op_kem_encrypt_t kem_enc;
31✔
4437
            TEST_FFI_OK(botan_pk_op_kem_encrypt_create, (&kem_enc, pub_loaded, "Raw"));
31✔
4438

4439
            // explicitly query output lengths
4440
            size_t shared_key_length = 0;
31✔
4441
            size_t ciphertext_length = 0;
31✔
4442
            TEST_FFI_OK(botan_pk_op_kem_encrypt_shared_key_length, (kem_enc, 0, &shared_key_length));
31✔
4443
            TEST_FFI_OK(botan_pk_op_kem_encrypt_encapsulated_key_length, (kem_enc, &ciphertext_length));
31✔
4444

4445
            // check that insufficient buffer space is handled correctly
4446
            size_t shared_key_length_out = 0;
31✔
4447
            size_t ciphertext_length_out = 0;
31✔
4448
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
31✔
4449
                        botan_pk_op_kem_encrypt_create_shared_key,
4450
                        (kem_enc,
4451
                         rng,
4452
                         nullptr /* no salt */,
4453
                         0,
4454
                         0 /* default key length */,
4455
                         nullptr,
4456
                         &shared_key_length_out,
4457
                         nullptr,
4458
                         &ciphertext_length_out));
4459

4460
            // TODO: should this report both lengths for usage convenience?
4461
            result.test_is_true(
31✔
4462
               "at least one buffer length is reported",
4463
               shared_key_length_out == shared_key_length || ciphertext_length_out == ciphertext_length);
31✔
4464

4465
            // allocate buffers (with additional space) and perform the actual encryption
4466
            shared_key_length_out = shared_key_length * 2;
31✔
4467
            ciphertext_length_out = ciphertext_length * 2;
31✔
4468
            Botan::secure_vector<uint8_t> shared_key(shared_key_length_out);
31✔
4469
            std::vector<uint8_t> ciphertext(ciphertext_length_out);
31✔
4470
            TEST_FFI_OK(botan_pk_op_kem_encrypt_create_shared_key,
31✔
4471
                        (kem_enc,
4472
                         rng,
4473
                         nullptr /* no salt */,
4474
                         0,
4475
                         0 /* default key length */,
4476
                         shared_key.data(),
4477
                         &shared_key_length_out,
4478
                         ciphertext.data(),
4479
                         &ciphertext_length_out));
4480
            result.test_sz_eq("shared key length", shared_key_length, shared_key_length_out);
31✔
4481
            result.test_sz_eq("ciphertext length", ciphertext_length, ciphertext_length_out);
31✔
4482
            shared_key.resize(shared_key_length_out);
31✔
4483
            ciphertext.resize(ciphertext_length_out);
31✔
4484
            TEST_FFI_OK(botan_pk_op_kem_encrypt_destroy, (kem_enc));
31✔
4485

4486
            // KEM decryption (using the generated private key)
4487
            botan_pk_op_kem_decrypt_t kem_dec;
31✔
4488
            TEST_FFI_OK(botan_pk_op_kem_decrypt_create, (&kem_dec, priv, "Raw"));
31✔
4489
            size_t shared_key_length2 = 0;
31✔
4490
            TEST_FFI_OK(botan_pk_op_kem_decrypt_shared_key_length, (kem_dec, shared_key_length, &shared_key_length2));
31✔
4491
            result.test_sz_eq("shared key lengths are consistent", shared_key_length, shared_key_length2);
31✔
4492

4493
            // check that insufficient buffer space is handled correctly
4494
            shared_key_length_out = 0;
31✔
4495
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
31✔
4496
                        botan_pk_op_kem_decrypt_shared_key,
4497
                        (kem_dec,
4498
                         nullptr /* no salt */,
4499
                         0,
4500
                         ciphertext.data(),
4501
                         ciphertext.size(),
4502
                         0 /* default length */,
4503
                         nullptr,
4504
                         &shared_key_length_out));
4505
            result.test_sz_eq("reported buffer length requirement", shared_key_length, shared_key_length_out);
31✔
4506

4507
            // allocate buffer (double the size) and perform the actual decryption
4508
            shared_key_length_out = shared_key_length * 2;
31✔
4509
            Botan::secure_vector<uint8_t> shared_key2(shared_key_length_out);
31✔
4510
            TEST_FFI_OK(botan_pk_op_kem_decrypt_shared_key,
31✔
4511
                        (kem_dec,
4512
                         nullptr /* no salt */,
4513
                         0,
4514
                         ciphertext.data(),
4515
                         ciphertext.size(),
4516
                         0 /* default length */,
4517
                         shared_key2.data(),
4518
                         &shared_key_length_out));
4519
            result.test_sz_eq("shared key output length", shared_key_length, shared_key_length_out);
31✔
4520
            shared_key2.resize(shared_key_length_out);
31✔
4521
            TEST_FFI_OK(botan_pk_op_kem_decrypt_destroy, (kem_dec));
31✔
4522

4523
            // final check and clean up
4524
            result.test_bin_eq("shared keys match", shared_key, shared_key2);
31✔
4525

4526
            TEST_FFI_OK(botan_pubkey_destroy, (pub));
31✔
4527
            TEST_FFI_OK(botan_pubkey_destroy, (pub_loaded));
31✔
4528
            TEST_FFI_OK(botan_privkey_destroy, (priv));
31✔
4529
            TEST_FFI_OK(botan_privkey_destroy, (priv_loaded));
31✔
4530
         }
62✔
4531
      }
3✔
4532
};
4533

4534
/**
4535
 * Base class for roundtrip tests of FFI bindings for Signature Mechanisms.
4536
 */
4537
class FFI_Signature_Roundtrip_Test : public FFI_Test {
6✔
4538
   protected:
4539
      using privkey_loader_fn_t = int (*)(botan_privkey_t*, const uint8_t[], size_t, const char*);
4540
      using pubkey_loader_fn_t = int (*)(botan_pubkey_t*, const uint8_t[], size_t, const char*);
4541

4542
   protected:
4543
      virtual const char* algo() const = 0;
4544
      virtual privkey_loader_fn_t private_key_load_function() const = 0;
4545
      virtual pubkey_loader_fn_t public_key_load_function() const = 0;
4546
      virtual std::vector<const char*> modes() const = 0;
4547
      virtual const char* hash_algo_or_padding() const = 0;
4548

4549
      virtual std::string make_mode_for_key_loading(std::string_view mode) { return std::string(mode); }
30✔
4550

4551
   public:
4552
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
3✔
4553
         const std::vector<uint8_t> message1 = {'H', 'e', 'l', 'l', 'o', ' '};
3✔
4554
         const std::vector<uint8_t> message2 = {'W', 'o', 'r', 'l', 'd', '!'};
3✔
4555

4556
         for(const auto* mode : modes()) {
19✔
4557
            // generate a key pair
4558
            botan_privkey_t priv;
16✔
4559
            botan_pubkey_t pub;
16✔
4560
            if(!TEST_FFI_INIT(botan_privkey_create, (&priv, algo(), mode, rng))) {
16✔
4561
               continue;
×
4562
            }
4563
            TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
16✔
4564

4565
            // raw-encode the key pair
4566
            ViewBytesSink priv_bytes;
16✔
4567
            ViewBytesSink pub_bytes;
16✔
4568
            TEST_FFI_OK(botan_privkey_view_raw, (priv, priv_bytes.delegate(), priv_bytes.callback()));
16✔
4569
            TEST_FFI_OK(botan_pubkey_view_raw, (pub, pub_bytes.delegate(), pub_bytes.callback()));
16✔
4570

4571
            // decode the key pair from raw encoding
4572
            botan_privkey_t priv_loaded;
16✔
4573
            botan_pubkey_t pub_loaded;
16✔
4574
            TEST_FFI_OK(private_key_load_function(),
16✔
4575
                        (&priv_loaded,
4576
                         priv_bytes.get().data(),
4577
                         priv_bytes.get().size(),
4578
                         make_mode_for_key_loading(mode).c_str()));
4579
            TEST_FFI_OK(
16✔
4580
               public_key_load_function(),
4581
               (&pub_loaded, pub_bytes.get().data(), pub_bytes.get().size(), make_mode_for_key_loading(mode).c_str()));
4582

4583
            // re-encode and compare to the first round
4584
            ViewBytesSink priv_bytes2;
16✔
4585
            ViewBytesSink pub_bytes2;
16✔
4586
            TEST_FFI_OK(botan_privkey_view_raw, (priv_loaded, priv_bytes2.delegate(), priv_bytes2.callback()));
16✔
4587
            TEST_FFI_OK(botan_pubkey_view_raw, (pub_loaded, pub_bytes2.delegate(), pub_bytes2.callback()));
16✔
4588
            result.test_bin_eq("private key encoding", priv_bytes.get(), priv_bytes2.get());
16✔
4589
            result.test_bin_eq("public key encoding", pub_bytes.get(), pub_bytes2.get());
16✔
4590

4591
            // Signature Creation (using the loaded private key)
4592
            botan_pk_op_sign_t signer;
16✔
4593
            TEST_FFI_OK(botan_pk_op_sign_create, (&signer, priv_loaded, hash_algo_or_padding(), 0));
16✔
4594

4595
            // explicitly query the signature output length
4596
            size_t sig_output_length = 0;
16✔
4597
            TEST_FFI_OK(botan_pk_op_sign_output_length, (signer, &sig_output_length));
16✔
4598

4599
            // pass a message to the signer
4600
            TEST_FFI_OK(botan_pk_op_sign_update, (signer, message1.data(), message1.size()));
16✔
4601
            TEST_FFI_OK(botan_pk_op_sign_update, (signer, message2.data(), message2.size()));
16✔
4602

4603
            // check that insufficient buffer space is handled correctly
4604
            size_t sig_output_length_out = 0;
16✔
4605
            TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
16✔
4606
                        botan_pk_op_sign_finish,
4607
                        (signer, rng, nullptr, &sig_output_length_out));
4608
            result.test_sz_eq("reported sig lengths are equal", sig_output_length, sig_output_length_out);
16✔
4609

4610
            // Recreate signer and try again
4611
            TEST_FFI_OK(botan_pk_op_sign_destroy, (signer));
16✔
4612
            TEST_FFI_OK(botan_pk_op_sign_create, (&signer, priv_loaded, hash_algo_or_padding(), 0));
16✔
4613
            TEST_FFI_OK(botan_pk_op_sign_update, (signer, message1.data(), message1.size()));
16✔
4614
            TEST_FFI_OK(botan_pk_op_sign_update, (signer, message2.data(), message2.size()));
16✔
4615

4616
            // allocate buffers (with additional space) and perform the actual signing
4617
            sig_output_length_out = sig_output_length * 2;
16✔
4618
            Botan::secure_vector<uint8_t> signature(sig_output_length_out);
16✔
4619
            TEST_FFI_OK(botan_pk_op_sign_finish, (signer, rng, signature.data(), &sig_output_length_out));
16✔
4620
            result.test_sz_eq("signature length", sig_output_length, sig_output_length_out);
16✔
4621
            signature.resize(sig_output_length_out);
16✔
4622
            TEST_FFI_OK(botan_pk_op_sign_destroy, (signer));
16✔
4623

4624
            // Signature verification (using the generated public key)
4625
            botan_pk_op_verify_t verifier;
16✔
4626
            TEST_FFI_OK(botan_pk_op_verify_create, (&verifier, pub, hash_algo_or_padding(), 0));
16✔
4627
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message1.data(), message1.size()));
16✔
4628
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message2.data(), message2.size()));
16✔
4629

4630
            // Verify signature
4631
            TEST_FFI_OK(botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
16✔
4632
            TEST_FFI_OK(botan_pk_op_verify_destroy, (verifier));
16✔
4633

4634
            // Verify signature with wrong message (only first half)
4635
            TEST_FFI_OK(botan_pk_op_verify_create, (&verifier, pub, hash_algo_or_padding(), 0));
16✔
4636
            TEST_FFI_OK(botan_pk_op_verify_update, (verifier, message1.data(), message1.size()));
16✔
4637
            TEST_FFI_RC(
16✔
4638
               BOTAN_FFI_INVALID_VERIFIER, botan_pk_op_verify_finish, (verifier, signature.data(), signature.size()));
4639
            TEST_FFI_OK(botan_pk_op_verify_destroy, (verifier));
16✔
4640

4641
            // Cleanup
4642
            TEST_FFI_OK(botan_pubkey_destroy, (pub));
16✔
4643
            TEST_FFI_OK(botan_pubkey_destroy, (pub_loaded));
16✔
4644
            TEST_FFI_OK(botan_privkey_destroy, (priv));
16✔
4645
            TEST_FFI_OK(botan_privkey_destroy, (priv_loaded));
16✔
4646
         }
16✔
4647
      }
3✔
4648
};
4649

4650
class FFI_Kyber512_Test final : public FFI_Test {
1✔
4651
   public:
4652
      std::string name() const override { return "FFI Kyber512"; }
1✔
4653

4654
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
4655
         const std::vector<uint8_t> a_pub_bits = Botan::hex_decode(
1✔
4656
            "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");
1✔
4657
         const std::vector<uint8_t> b_priv_bits = Botan::hex_decode(
1✔
4658
            "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");
1✔
4659
         const std::vector<uint8_t> b_pub_bits = Botan::hex_decode(
1✔
4660
            "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");
1✔
4661

4662
         botan_privkey_t b_priv;
1✔
4663
         if(!TEST_FFI_INIT(botan_privkey_load_kyber, (&b_priv, b_priv_bits.data(), 1632))) {
1✔
4664
            return;
×
4665
         }
4666

4667
         ViewBytesSink privkey_read;
1✔
4668
         ViewBytesSink privkey_read_raw;
1✔
4669
         TEST_FFI_OK(botan_privkey_view_kyber_raw_key, (b_priv, privkey_read.delegate(), privkey_read.callback()));
1✔
4670
         TEST_FFI_OK(botan_privkey_view_raw, (b_priv, privkey_read_raw.delegate(), privkey_read_raw.callback()));
1✔
4671
         result.test_bin_eq("kyber512 private key", privkey_read.get(), b_priv_bits);
1✔
4672
         result.test_bin_eq("kyber512 private key raw", privkey_read_raw.get(), b_priv_bits);
1✔
4673

4674
         ViewBytesSink pubkey_read;
1✔
4675
         ViewBytesSink pubkey_read_raw;
1✔
4676

4677
         botan_pubkey_t b_pub;
1✔
4678
         TEST_FFI_OK(botan_privkey_export_pubkey, (&b_pub, b_priv));
1✔
4679
         TEST_FFI_OK(botan_pubkey_view_kyber_raw_key, (b_pub, pubkey_read.delegate(), pubkey_read.callback()));
1✔
4680
         TEST_FFI_OK(botan_pubkey_view_raw, (b_pub, pubkey_read_raw.delegate(), pubkey_read_raw.callback()));
1✔
4681
         result.test_bin_eq("kyber512 public key b", pubkey_read.get(), b_pub_bits);
1✔
4682
         result.test_bin_eq("kyber512 raw public key b", pubkey_read_raw.get(), b_pub_bits);
1✔
4683

4684
         botan_pubkey_t a_pub;
1✔
4685
         TEST_FFI_OK(botan_pubkey_load_kyber, (&a_pub, a_pub_bits.data(), 800));
1✔
4686
         TEST_FFI_OK(botan_pubkey_view_kyber_raw_key, (a_pub, pubkey_read.delegate(), pubkey_read.callback()));
1✔
4687
         result.test_bin_eq("kyber512 public key a", pubkey_read.get(), a_pub_bits);
1✔
4688

4689
         TEST_FFI_OK(botan_pubkey_destroy, (a_pub));
1✔
4690
         TEST_FFI_OK(botan_pubkey_destroy, (b_pub));
1✔
4691
         TEST_FFI_OK(botan_privkey_destroy, (b_priv));
1✔
4692
      }
1✔
4693
};
4694

4695
class FFI_Kyber768_Test final : public FFI_Test {
1✔
4696
   public:
4697
      std::string name() const override { return "FFI Kyber768"; }
1✔
4698

4699
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
4700
         const std::vector<uint8_t> a_pub_bits = Botan::hex_decode(
1✔
4701
            "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");
1✔
4702
         const std::vector<uint8_t> b_priv_bits = Botan::hex_decode(
1✔
4703
            "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");
1✔
4704
         const std::vector<uint8_t> b_pub_bits = Botan::hex_decode(
1✔
4705
            "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");
1✔
4706

4707
         botan_privkey_t b_priv;
1✔
4708
         if(!TEST_FFI_INIT(botan_privkey_load_kyber, (&b_priv, b_priv_bits.data(), 2400))) {
1✔
4709
            return;
×
4710
         }
4711

4712
         ViewBytesSink privkey_read;
1✔
4713
         ViewBytesSink privkey_read_raw;
1✔
4714
         TEST_FFI_OK(botan_privkey_view_kyber_raw_key, (b_priv, privkey_read.delegate(), privkey_read.callback()));
1✔
4715
         TEST_FFI_OK(botan_privkey_view_raw, (b_priv, privkey_read_raw.delegate(), privkey_read_raw.callback()));
1✔
4716
         result.test_bin_eq("kyber768 private key", privkey_read.get(), b_priv_bits);
1✔
4717
         result.test_bin_eq("kyber768 private key raw", privkey_read_raw.get(), b_priv_bits);
1✔
4718

4719
         ViewBytesSink pubkey_read;
1✔
4720
         ViewBytesSink pubkey_read_raw;
1✔
4721

4722
         botan_pubkey_t b_pub;
1✔
4723
         TEST_FFI_OK(botan_privkey_export_pubkey, (&b_pub, b_priv));
1✔
4724
         TEST_FFI_OK(botan_pubkey_view_kyber_raw_key, (b_pub, pubkey_read.delegate(), pubkey_read.callback()));
1✔
4725
         TEST_FFI_OK(botan_pubkey_view_raw, (b_pub, pubkey_read_raw.delegate(), pubkey_read_raw.callback()));
1✔
4726
         result.test_bin_eq("kyber768 public key b", pubkey_read.get(), b_pub_bits);
1✔
4727
         result.test_bin_eq("kyber768 public key raw b", pubkey_read_raw.get(), b_pub_bits);
1✔
4728

4729
         botan_pubkey_t a_pub;
1✔
4730
         TEST_FFI_OK(botan_pubkey_load_kyber, (&a_pub, a_pub_bits.data(), 1184));
1✔
4731
         TEST_FFI_OK(botan_pubkey_view_kyber_raw_key, (a_pub, pubkey_read.delegate(), pubkey_read.callback()));
1✔
4732
         result.test_bin_eq("kyber768 public key a", pubkey_read.get(), a_pub_bits);
1✔
4733

4734
         TEST_FFI_OK(botan_pubkey_destroy, (a_pub));
1✔
4735
         TEST_FFI_OK(botan_pubkey_destroy, (b_pub));
1✔
4736
         TEST_FFI_OK(botan_privkey_destroy, (b_priv));
1✔
4737
      }
1✔
4738
};
4739

4740
class FFI_Kyber1024_Test final : public FFI_Test {
1✔
4741
   public:
4742
      std::string name() const override { return "FFI Kyber1024"; }
1✔
4743

4744
      void ffi_test(Test::Result& result, botan_rng_t /*unused*/) override {
1✔
4745
         const std::vector<uint8_t> a_pub_bits = Botan::hex_decode(
1✔
4746
            "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");
1✔
4747
         const std::vector<uint8_t> b_priv_bits = Botan::hex_decode(
1✔
4748
            "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");
1✔
4749
         const std::vector<uint8_t> b_pub_bits = Botan::hex_decode(
1✔
4750
            "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");
1✔
4751

4752
         botan_privkey_t b_priv;
1✔
4753
         if(!TEST_FFI_INIT(botan_privkey_load_kyber, (&b_priv, b_priv_bits.data(), 3168))) {
1✔
4754
            return;
×
4755
         }
4756

4757
         ViewBytesSink privkey_read;
1✔
4758
         ViewBytesSink privkey_read_raw;
1✔
4759
         TEST_FFI_OK(botan_privkey_view_kyber_raw_key, (b_priv, privkey_read.delegate(), privkey_read.callback()));
1✔
4760
         TEST_FFI_OK(botan_privkey_view_raw, (b_priv, privkey_read_raw.delegate(), privkey_read_raw.callback()));
1✔
4761
         result.test_bin_eq("kyber1024 private key", privkey_read.get(), b_priv_bits);
1✔
4762
         result.test_bin_eq("kyber1024 private key raw", privkey_read_raw.get(), b_priv_bits);
1✔
4763

4764
         ViewBytesSink pubkey_read;
1✔
4765
         ViewBytesSink pubkey_read_raw;
1✔
4766

4767
         botan_pubkey_t b_pub;
1✔
4768
         TEST_FFI_OK(botan_privkey_export_pubkey, (&b_pub, b_priv));
1✔
4769
         TEST_FFI_OK(botan_pubkey_view_kyber_raw_key, (b_pub, pubkey_read.delegate(), pubkey_read.callback()));
1✔
4770
         TEST_FFI_OK(botan_pubkey_view_raw, (b_pub, pubkey_read_raw.delegate(), pubkey_read_raw.callback()));
1✔
4771
         result.test_bin_eq("kyber1024 public key b", pubkey_read.get(), b_pub_bits);
1✔
4772
         result.test_bin_eq("kyber1024 public key raw b", pubkey_read_raw.get(), b_pub_bits);
1✔
4773

4774
         botan_pubkey_t a_pub;
1✔
4775
         TEST_FFI_OK(botan_pubkey_load_kyber, (&a_pub, a_pub_bits.data(), 1568));
1✔
4776
         TEST_FFI_OK(botan_pubkey_view_kyber_raw_key, (a_pub, pubkey_read.delegate(), pubkey_read.callback()));
1✔
4777
         result.test_bin_eq("kyber1024 public key a", pubkey_read.get(), a_pub_bits);
1✔
4778

4779
         TEST_FFI_OK(botan_pubkey_destroy, (a_pub));
1✔
4780
         TEST_FFI_OK(botan_pubkey_destroy, (b_pub));
1✔
4781
         TEST_FFI_OK(botan_privkey_destroy, (b_priv));
1✔
4782
      }
1✔
4783
};
4784

4785
class FFI_ML_KEM_Test final : public FFI_KEM_Roundtrip_Test {
1✔
4786
   public:
4787
      std::string name() const override { return "FFI ML-KEM"; }
1✔
4788

4789
   private:
4790
      const char* algo() const override { return "ML-KEM"; }
3✔
4791

4792
      privkey_loader_fn_t private_key_load_function() const override { return botan_privkey_load_ml_kem; }
3✔
4793

4794
      pubkey_loader_fn_t public_key_load_function() const override { return botan_pubkey_load_ml_kem; }
3✔
4795

4796
      std::vector<const char*> modes() const override { return {"ML-KEM-512", "ML-KEM-768", "ML-KEM-1024"}; }
1✔
4797
};
4798

4799
class FFI_FrodoKEM_Test final : public FFI_KEM_Roundtrip_Test {
1✔
4800
   public:
4801
      std::string name() const override { return "FFI FrodoKEM"; }
1✔
4802

4803
   protected:
4804
      const char* algo() const override { return "FrodoKEM"; }
12✔
4805

4806
      privkey_loader_fn_t private_key_load_function() const override { return botan_privkey_load_frodokem; }
12✔
4807

4808
      pubkey_loader_fn_t public_key_load_function() const override { return botan_pubkey_load_frodokem; }
12✔
4809

4810
      std::vector<const char*> modes() const override {
1✔
4811
         return std::vector{
1✔
4812
            "FrodoKEM-640-SHAKE",
4813
            "FrodoKEM-976-SHAKE",
4814
            "FrodoKEM-1344-SHAKE",
4815
            "eFrodoKEM-640-SHAKE",
4816
            "eFrodoKEM-976-SHAKE",
4817
            "eFrodoKEM-1344-SHAKE",
4818
            "FrodoKEM-640-AES",
4819
            "FrodoKEM-976-AES",
4820
            "FrodoKEM-1344-AES",
4821
            "eFrodoKEM-640-AES",
4822
            "eFrodoKEM-976-AES",
4823
            "eFrodoKEM-1344-AES",
4824
         };
1✔
4825
      }
4826
};
4827

4828
class FFI_ML_DSA_Test final : public FFI_Signature_Roundtrip_Test {
1✔
4829
   public:
4830
      std::string name() const override { return "FFI ML-DSA"; }
1✔
4831

4832
   private:
4833
      const char* algo() const override { return "ML-DSA"; }
3✔
4834

4835
      privkey_loader_fn_t private_key_load_function() const override { return botan_privkey_load_ml_dsa; }
3✔
4836

4837
      pubkey_loader_fn_t public_key_load_function() const override { return botan_pubkey_load_ml_dsa; }
3✔
4838

4839
      std::vector<const char*> modes() const override {
1✔
4840
         return {
1✔
4841
            "ML-DSA-4x4",
4842
            "ML-DSA-6x5",
4843
            "ML-DSA-8x7",
4844
         };
1✔
4845
      }
4846

4847
      const char* hash_algo_or_padding() const override { return ""; }
12✔
4848
};
4849

4850
class FFI_MLDSA_Composite_Test final : public FFI_Signature_Roundtrip_Test {
1✔
4851
   public:
4852
      std::string name() const override { return "FFI MLDSA-Composite"; }
1✔
4853

4854
   private:
4855
      const char* algo() const override { return "MLDSA44-RSA2048-PKCS15-SHA256"; }
2✔
4856

4857
      privkey_loader_fn_t private_key_load_function() const override { return botan_privkey_load_mldsa_composite; }
1✔
4858

4859
      pubkey_loader_fn_t public_key_load_function() const override { return botan_pubkey_load_mldsa_composite; }
1✔
4860

4861
      std::vector<const char*> modes() const override {
1✔
4862
         return {
1✔
4863
            "",
4864
         };
1✔
4865
      }
4866

4867
      const char* hash_algo_or_padding() const override { return ""; }
4✔
4868

4869
      std::string make_mode_for_key_loading(std::string_view) override { return std::string(algo()); }
2✔
4870
};
4871

4872
class FFI_SLH_DSA_Test final : public FFI_Signature_Roundtrip_Test {
1✔
4873
   public:
4874
      std::string name() const override { return "FFI SLH-DSA"; }
1✔
4875

4876
   private:
4877
      const char* algo() const override { return "SLH-DSA"; }
12✔
4878

4879
      privkey_loader_fn_t private_key_load_function() const override { return botan_privkey_load_slh_dsa; }
12✔
4880

4881
      pubkey_loader_fn_t public_key_load_function() const override { return botan_pubkey_load_slh_dsa; }
12✔
4882

4883
      std::vector<const char*> modes() const override {
1✔
4884
         auto modes = std::vector{
1✔
4885
            "SLH-DSA-SHA2-128f",
4886
            "SLH-DSA-SHAKE-128f",
4887
            "SLH-DSA-SHA2-192f",
4888
            "SLH-DSA-SHAKE-192f",
4889
            "SLH-DSA-SHA2-256f",
4890
            "SLH-DSA-SHAKE-256f",
4891
         };
1✔
4892

4893
         if(Test::run_long_tests()) {
1✔
4894
            modes = Botan::concat(modes,
3✔
4895
                                  std::vector{
1✔
4896
                                     "SLH-DSA-SHA2-128s",
4897
                                     "SLH-DSA-SHA2-192s",
4898
                                     "SLH-DSA-SHA2-256s",
4899
                                     "SLH-DSA-SHAKE-128s",
4900
                                     "SLH-DSA-SHAKE-192s",
4901
                                     "SLH-DSA-SHAKE-256s",
4902
                                  });
2✔
4903
         }
4904

4905
         return modes;
1✔
4906
      }
×
4907

4908
      const char* hash_algo_or_padding() const override { return ""; }
48✔
4909
};
4910

4911
class FFI_Classic_McEliece_Test final : public FFI_KEM_Roundtrip_Test {
1✔
4912
   public:
4913
      std::string name() const override { return "FFI Classic McEliece"; }
1✔
4914

4915
   protected:
4916
      const char* algo() const override { return "ClassicMcEliece"; }
16✔
4917

4918
      privkey_loader_fn_t private_key_load_function() const override { return botan_privkey_load_classic_mceliece; }
16✔
4919

4920
      pubkey_loader_fn_t public_key_load_function() const override { return botan_pubkey_load_classic_mceliece; }
16✔
4921

4922
      std::vector<const char*> modes() const override {
1✔
4923
         auto modes = std::vector{
1✔
4924
            "348864f",
4925
            "460896f",
4926
         };
1✔
4927
         if(Test::run_long_tests()) {
1✔
4928
            modes = Botan::concat(modes,
3✔
4929
                                  std::vector{
1✔
4930
                                     "348864",
4931
                                     "460896",
4932
                                     "6688128",
4933
                                     "6688128f",
4934
                                     "6688128pc",
4935
                                     "6688128pcf",
4936
                                     "6960119",
4937
                                     "6960119f",
4938
                                     "6960119pc",
4939
                                     "6960119pcf",
4940
                                     "8192128",
4941
                                     "8192128f",
4942
                                     "8192128pc",
4943
                                     "8192128pcf",
4944
                                  });
2✔
4945
         }
4946
         return modes;
1✔
4947
      }
×
4948
};
4949

4950
class FFI_ElGamal_Test final : public FFI_Test {
1✔
4951
   public:
4952
      std::string name() const override { return "FFI ElGamal"; }
1✔
4953

4954
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
4955
         botan_privkey_t priv;
1✔
4956

4957
         if(TEST_FFI_INIT(botan_privkey_create, (&priv, "ElGamal", "modp/ietf/1024", rng))) {
1✔
4958
            do_elgamal_test(priv, rng, result);
1✔
4959
         }
4960

4961
         if(TEST_FFI_INIT(botan_privkey_create_elgamal, (&priv, rng, 1024, 160))) {
1✔
4962
            do_elgamal_test(priv, rng, result);
1✔
4963
         }
4964
      }
1✔
4965

4966
   private:
4967
      static void do_elgamal_test(botan_privkey_t priv, botan_rng_t rng, Test::Result& result) {
2✔
4968
         TEST_FFI_OK(botan_privkey_check_key, (priv, rng, 0));
2✔
4969

4970
         botan_pubkey_t pub = nullptr;
2✔
4971
         TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
2✔
4972
         TEST_FFI_OK(botan_pubkey_check_key, (pub, rng, 0));
2✔
4973

4974
         ffi_test_pubkey_export(result, pub, priv, rng);
2✔
4975
         botan_mp_t p = nullptr;
2✔
4976
         botan_mp_t g = nullptr;
2✔
4977
         botan_mp_t x = nullptr;
2✔
4978
         botan_mp_t y = nullptr;
2✔
4979
         botan_mp_init(&p);
2✔
4980
         botan_mp_init(&g);
2✔
4981
         botan_mp_init(&x);
2✔
4982
         botan_mp_init(&y);
2✔
4983

4984
         TEST_FFI_OK(botan_pubkey_get_field, (p, pub, "p"));
2✔
4985
         TEST_FFI_OK(botan_pubkey_get_field, (g, pub, "g"));
2✔
4986
         TEST_FFI_OK(botan_pubkey_get_field, (y, pub, "y"));
2✔
4987
         TEST_FFI_OK(botan_privkey_get_field, (x, priv, "x"));
2✔
4988

4989
         size_t p_len = 0;
2✔
4990
         TEST_FFI_OK(botan_mp_num_bytes, (p, &p_len));
2✔
4991

4992
         botan_privkey_t loaded_privkey;
2✔
4993
         TEST_FFI_OK(botan_privkey_load_elgamal, (&loaded_privkey, p, g, x));
2✔
4994

4995
         botan_pubkey_t loaded_pubkey;
2✔
4996
         TEST_FFI_OK(botan_pubkey_load_elgamal, (&loaded_pubkey, p, g, y));
2✔
4997

4998
         botan_mp_destroy(p);
2✔
4999
         botan_mp_destroy(g);
2✔
5000
         botan_mp_destroy(y);
2✔
5001
         botan_mp_destroy(x);
2✔
5002

5003
         std::vector<uint8_t> plaintext(16, 0xFF);
2✔
5004
         std::vector<uint8_t> ciphertext;
2✔
5005
         std::vector<uint8_t> decryption;
2✔
5006

5007
   #if defined(BOTAN_HAS_OAEP) && defined(BOTAN_HAS_SHA2_32)
5008
         const std::string padding = "OAEP(SHA-256)";
2✔
5009
   #else
5010
         const std::string padding = "Raw";
5011
   #endif
5012

5013
         // Test encryption
5014
         botan_pk_op_encrypt_t op_enc;
2✔
5015
         if(TEST_FFI_OK(botan_pk_op_encrypt_create, (&op_enc, loaded_pubkey, padding.c_str(), 0))) {
2✔
5016
            size_t ctext_len;
2✔
5017
            TEST_FFI_OK(botan_pk_op_encrypt_output_length, (op_enc, plaintext.size(), &ctext_len));
2✔
5018
            ciphertext.resize(ctext_len);
2✔
5019
            TEST_FFI_OK(botan_pk_op_encrypt,
2✔
5020
                        (op_enc, rng, ciphertext.data(), &ctext_len, plaintext.data(), plaintext.size()));
5021
            ciphertext.resize(ctext_len);
2✔
5022
            TEST_FFI_OK(botan_pk_op_encrypt_destroy, (op_enc));
2✔
5023
         }
5024

5025
         // Test decryption
5026
         botan_pk_op_decrypt_t op_dec;
2✔
5027
         if(TEST_FFI_OK(botan_pk_op_decrypt_create, (&op_dec, loaded_privkey, padding.c_str(), 0))) {
2✔
5028
            size_t ptext_len;
2✔
5029
            TEST_FFI_OK(botan_pk_op_decrypt_output_length, (op_dec, ciphertext.size(), &ptext_len));
2✔
5030
            decryption.resize(ptext_len);
2✔
5031
            TEST_FFI_OK(botan_pk_op_decrypt,
2✔
5032
                        (op_dec, decryption.data(), &ptext_len, ciphertext.data(), ciphertext.size()));
5033
            decryption.resize(ptext_len);
2✔
5034
            TEST_FFI_OK(botan_pk_op_decrypt_destroy, (op_dec));
2✔
5035
         }
5036

5037
         result.test_bin_eq("decryption worked", decryption, plaintext);
2✔
5038

5039
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey));
2✔
5040
         TEST_FFI_OK(botan_pubkey_destroy, (pub));
2✔
5041
         TEST_FFI_OK(botan_privkey_destroy, (loaded_privkey));
2✔
5042
         TEST_FFI_OK(botan_privkey_destroy, (priv));
2✔
5043
      }
2✔
5044
};
5045

5046
class FFI_DH_Test final : public FFI_Test {
1✔
5047
   public:
5048
      std::string name() const override { return "FFI DH"; }
1✔
5049

5050
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
5051
         botan_privkey_t priv1;
1✔
5052
         if(!TEST_FFI_INIT(botan_privkey_create_dh, (&priv1, rng, "modp/ietf/2048"))) {
1✔
5053
            return;
×
5054
         }
5055

5056
         botan_privkey_t priv2;
1✔
5057
         REQUIRE_FFI_OK(botan_privkey_create_dh, (&priv2, rng, "modp/ietf/2048"));
1✔
5058

5059
         botan_pubkey_t pub1;
1✔
5060
         REQUIRE_FFI_OK(botan_privkey_export_pubkey, (&pub1, priv1));
1✔
5061

5062
         botan_pubkey_t pub2;
1✔
5063
         REQUIRE_FFI_OK(botan_privkey_export_pubkey, (&pub2, priv2));
1✔
5064

5065
         // Reload key-pair1 in order to test functions for key loading
5066
         botan_mp_t private_x;
1✔
5067
         botan_mp_t public_g;
1✔
5068
         botan_mp_t public_p;
1✔
5069
         botan_mp_t public_y;
1✔
5070

5071
         botan_mp_init(&private_x);
1✔
5072
         botan_mp_init(&public_g);
1✔
5073
         botan_mp_init(&public_p);
1✔
5074
         botan_mp_init(&public_y);
1✔
5075

5076
         TEST_FFI_OK(botan_privkey_get_field, (private_x, priv1, "x"));
1✔
5077
         TEST_FFI_OK(botan_pubkey_get_field, (public_g, pub1, "g"));
1✔
5078
         TEST_FFI_OK(botan_pubkey_get_field, (public_p, pub1, "p"));
1✔
5079
         TEST_FFI_OK(botan_pubkey_get_field, (public_y, pub1, "y"));
1✔
5080

5081
         botan_privkey_t loaded_privkey1;
1✔
5082
         botan_pubkey_t loaded_pubkey1;
1✔
5083
         TEST_FFI_OK(botan_privkey_load_dh, (&loaded_privkey1, public_p, public_g, private_x));
1✔
5084
         TEST_FFI_OK(botan_pubkey_load_dh, (&loaded_pubkey1, public_p, public_g, public_y));
1✔
5085

5086
         TEST_FFI_OK(botan_privkey_check_key, (loaded_privkey1, rng, 0));
1✔
5087
         TEST_FFI_OK(botan_pubkey_check_key, (loaded_pubkey1, rng, 0));
1✔
5088

5089
         botan_mp_t loaded_public_g;
1✔
5090
         botan_mp_t loaded_public_p;
1✔
5091
         botan_mp_t loaded_public_y;
1✔
5092
         botan_mp_init(&loaded_public_g);
1✔
5093
         botan_mp_init(&loaded_public_p);
1✔
5094
         botan_mp_init(&loaded_public_y);
1✔
5095

5096
         TEST_FFI_OK(botan_pubkey_get_field, (loaded_public_g, loaded_pubkey1, "g"));
1✔
5097
         TEST_FFI_OK(botan_pubkey_get_field, (loaded_public_p, loaded_pubkey1, "p"));
1✔
5098
         TEST_FFI_OK(botan_pubkey_get_field, (loaded_public_y, loaded_pubkey1, "y"));
1✔
5099

5100
         int cmp;
1✔
5101

5102
         TEST_FFI_OK(botan_mp_cmp, (&cmp, loaded_public_g, public_g));
1✔
5103
         result.test_is_true("bigint_mp_cmp(g, g)", cmp == 0);
1✔
5104

5105
         TEST_FFI_OK(botan_mp_cmp, (&cmp, loaded_public_p, public_p));
1✔
5106
         result.test_is_true("bigint_mp_cmp(p, p)", cmp == 0);
1✔
5107

5108
         TEST_FFI_OK(botan_mp_cmp, (&cmp, loaded_public_y, public_y));
1✔
5109
         result.test_is_true("bigint_mp_cmp(y, y)", cmp == 0);
1✔
5110

5111
         botan_pk_op_ka_t ka1;
1✔
5112
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_create, (&ka1, loaded_privkey1, "Raw", 0));
1✔
5113
         botan_pk_op_ka_t ka2;
1✔
5114
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_create, (&ka2, priv2, "Raw", 0));
1✔
5115

5116
         size_t pubkey1_len = 0;
1✔
5117
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
5118
                     botan_pk_op_key_agreement_export_public,
5119
                     (priv1, nullptr, &pubkey1_len));
5120
         std::vector<uint8_t> pubkey1(pubkey1_len);
1✔
5121
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_export_public, (priv1, pubkey1.data(), &pubkey1_len));
1✔
5122
         size_t pubkey2_len = 0;
1✔
5123
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
5124
                     botan_pk_op_key_agreement_export_public,
5125
                     (priv2, nullptr, &pubkey2_len));
5126
         std::vector<uint8_t> pubkey2(pubkey2_len);
1✔
5127
         REQUIRE_FFI_OK(botan_pk_op_key_agreement_export_public, (priv2, pubkey2.data(), &pubkey2_len));
1✔
5128

5129
         const size_t shared_key_len = 256;
1✔
5130

5131
         std::vector<uint8_t> key1(shared_key_len);
1✔
5132
         size_t key1_len = key1.size();
1✔
5133

5134
         TEST_FFI_OK(botan_pk_op_key_agreement,
1✔
5135
                     (ka1, key1.data(), &key1_len, pubkey2.data(), pubkey2.size(), nullptr, 0));
5136

5137
         std::vector<uint8_t> key2(shared_key_len);
1✔
5138
         size_t key2_len = key2.size();
1✔
5139

5140
         TEST_FFI_OK(botan_pk_op_key_agreement,
1✔
5141
                     (ka2, key2.data(), &key2_len, pubkey1.data(), pubkey1.size(), nullptr, 0));
5142

5143
         result.test_bin_eq("shared DH key", key1, key2);
1✔
5144

5145
         TEST_FFI_OK(botan_mp_destroy, (private_x));
1✔
5146
         TEST_FFI_OK(botan_mp_destroy, (public_p));
1✔
5147
         TEST_FFI_OK(botan_mp_destroy, (public_g));
1✔
5148
         TEST_FFI_OK(botan_mp_destroy, (public_y));
1✔
5149

5150
         TEST_FFI_OK(botan_mp_destroy, (loaded_public_p));
1✔
5151
         TEST_FFI_OK(botan_mp_destroy, (loaded_public_g));
1✔
5152
         TEST_FFI_OK(botan_mp_destroy, (loaded_public_y));
1✔
5153

5154
         TEST_FFI_OK(botan_pk_op_key_agreement_destroy, (ka1));
1✔
5155
         TEST_FFI_OK(botan_pk_op_key_agreement_destroy, (ka2));
1✔
5156
         TEST_FFI_OK(botan_privkey_destroy, (priv1));
1✔
5157
         TEST_FFI_OK(botan_privkey_destroy, (priv2));
1✔
5158
         TEST_FFI_OK(botan_pubkey_destroy, (pub1));
1✔
5159
         TEST_FFI_OK(botan_pubkey_destroy, (pub2));
1✔
5160
         TEST_FFI_OK(botan_privkey_destroy, (loaded_privkey1));
1✔
5161
         TEST_FFI_OK(botan_pubkey_destroy, (loaded_pubkey1));
1✔
5162
      }
1✔
5163
};
5164

5165
class FFI_OID_Test final : public FFI_Test {
1✔
5166
   public:
5167
      std::string name() const override { return "FFI OID"; }
1✔
5168

5169
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
5170
         botan_asn1_oid_t oid;
1✔
5171
         botan_asn1_oid_t new_oid;
1✔
5172
         botan_asn1_oid_t new_oid_from_string;
1✔
5173
         botan_asn1_oid_t oid_a;
1✔
5174
         botan_asn1_oid_t oid_b;
1✔
5175
         botan_asn1_oid_t oid_c;
1✔
5176

5177
         TEST_FFI_FAIL("empty oid", botan_oid_from_string, (&oid, ""));
1✔
5178
         TEST_FFI_OK(botan_oid_from_string, (&oid, "1.2.3.4.5"));
1✔
5179

5180
         TEST_FFI_RC(BOTAN_FFI_ERROR_BAD_PARAMETER, botan_oid_from_string, (&new_oid, "a.a.a"));
1✔
5181
         TEST_FFI_RC(BOTAN_FFI_ERROR_BAD_PARAMETER, botan_oid_from_string, (&new_oid, "0.40"));
1✔
5182
         TEST_FFI_RC(
1✔
5183
            BOTAN_FFI_ERROR_BAD_PARAMETER, botan_oid_from_string, (&new_oid, "random-name-that-definitely-has-no-oid"));
5184

5185
         TEST_FFI_OK(botan_oid_from_string, (&new_oid, "1.2.3.4.5.6.7.8"));
1✔
5186
         TEST_FFI_OK(botan_oid_register, (new_oid, "random-name-that-definitely-has-no-oid"));
1✔
5187

5188
         TEST_FFI_OK(botan_oid_from_string, (&new_oid_from_string, "random-name-that-definitely-has-no-oid"));
1✔
5189
         TEST_FFI_RC(1, botan_oid_equal, (new_oid, new_oid_from_string));
1✔
5190

5191
         TEST_FFI_OK(botan_oid_from_string, (&oid_a, "1.2.3.4.5.6"));
1✔
5192
         TEST_FFI_OK(botan_oid_from_string, (&oid_b, "1.2.3.4.5.6"));
1✔
5193
         TEST_FFI_OK(botan_oid_from_string, (&oid_c, "1.2.3.4.4"));
1✔
5194

5195
         TEST_FFI_RC(1, botan_oid_equal, (oid_a, oid_b));
1✔
5196
         TEST_FFI_RC(0, botan_oid_equal, (oid_a, oid_c));
1✔
5197

5198
         int res;
1✔
5199

5200
         TEST_FFI_OK(botan_oid_cmp, (&res, oid_a, oid_b));
1✔
5201
         result.test_is_true("oid_a and oid_b are equal", res == 0);
1✔
5202

5203
         TEST_FFI_OK(botan_oid_cmp, (&res, oid_a, oid_c));
1✔
5204
         result.test_is_true("oid_a is bigger", res == 1);
1✔
5205

5206
         TEST_FFI_OK(botan_oid_cmp, (&res, oid_c, oid_a));
1✔
5207
         result.test_is_true("oid_c is smaller", res == -1);
1✔
5208

5209
         TEST_FFI_OK(botan_oid_destroy, (oid));
1✔
5210
         TEST_FFI_OK(botan_oid_destroy, (new_oid));
1✔
5211
         TEST_FFI_OK(botan_oid_destroy, (new_oid_from_string));
1✔
5212
         TEST_FFI_OK(botan_oid_destroy, (oid_a));
1✔
5213
         TEST_FFI_OK(botan_oid_destroy, (oid_b));
1✔
5214
         TEST_FFI_OK(botan_oid_destroy, (oid_c));
1✔
5215

5216
         botan_privkey_t priv;
1✔
5217
         if(TEST_FFI_INIT(botan_privkey_create_rsa, (&priv, rng, 1024))) {
1✔
5218
            TEST_FFI_OK(botan_privkey_check_key, (priv, rng, 0));
1✔
5219

5220
            const std::string oid_rsa_expected = "1.2.840.113549.1.1.1";
1✔
5221

5222
            botan_asn1_oid_t rsa_oid_priv;
1✔
5223
            botan_asn1_oid_t rsa_oid_pub;
1✔
5224
            botan_asn1_oid_t rsa_oid_expected;
1✔
5225
            botan_asn1_oid_t rsa_oid_from_name;
1✔
5226

5227
            TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER, botan_oid_from_string, (&rsa_oid_expected, nullptr));
1✔
5228
            TEST_FFI_RC(BOTAN_FFI_ERROR_NULL_POINTER, botan_oid_from_string, (nullptr, "1.2.3.4.5"));
1✔
5229
            TEST_FFI_OK(botan_oid_from_string, (&rsa_oid_expected, oid_rsa_expected.c_str()));
1✔
5230
            TEST_FFI_OK(botan_privkey_oid, (&rsa_oid_priv, priv));
1✔
5231

5232
            TEST_FFI_RC(1, botan_oid_equal, (rsa_oid_priv, rsa_oid_expected));
1✔
5233

5234
            botan_pubkey_t pub;
1✔
5235
            TEST_FFI_OK(botan_privkey_export_pubkey, (&pub, priv));
1✔
5236

5237
            TEST_FFI_OK(botan_pubkey_oid, (&rsa_oid_pub, pub));
1✔
5238
            TEST_FFI_RC(1, botan_oid_equal, (rsa_oid_pub, rsa_oid_expected));
1✔
5239

5240
            ViewStringSink oid_string;
1✔
5241
            TEST_FFI_OK(botan_oid_view_string, (rsa_oid_expected, oid_string.delegate(), oid_string.callback()));
1✔
5242
            const std::string oid_actual = {oid_string.get().begin(), oid_string.get().end()};
2✔
5243

5244
            result.test_str_eq("oid to string", oid_actual, oid_rsa_expected);
1✔
5245

5246
            TEST_FFI_OK(botan_oid_from_string, (&rsa_oid_from_name, "RSA"));
1✔
5247
            TEST_FFI_RC(1, botan_oid_equal, (rsa_oid_expected, rsa_oid_from_name));
1✔
5248

5249
            ViewStringSink rsa_name;
1✔
5250
            TEST_FFI_OK(botan_oid_view_name, (rsa_oid_from_name, rsa_name.delegate(), rsa_name.callback()));
1✔
5251
            const std::string rsa_name_string = {rsa_name.get().begin(), rsa_name.get().end()};
2✔
5252
            result.test_str_eq("oid to name", rsa_name_string, "RSA");
1✔
5253

5254
            TEST_FFI_OK(botan_oid_destroy, (rsa_oid_priv));
1✔
5255
            TEST_FFI_OK(botan_oid_destroy, (rsa_oid_pub));
1✔
5256
            TEST_FFI_OK(botan_oid_destroy, (rsa_oid_expected));
1✔
5257
            TEST_FFI_OK(botan_oid_destroy, (rsa_oid_from_name));
1✔
5258

5259
            TEST_FFI_OK(botan_pubkey_destroy, (pub));
1✔
5260
            TEST_FFI_OK(botan_privkey_destroy, (priv));
1✔
5261
         }
1✔
5262
      }
1✔
5263
};
5264

5265
class FFI_EC_Group_Test final : public FFI_Test {
1✔
5266
   public:
5267
      std::string name() const override { return "FFI EC Group"; }
1✔
5268

5269
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
5270
         int appl_spec_groups;
1✔
5271
         int named_group;
1✔
5272
         TEST_FFI_OK(botan_ec_group_supports_application_specific_group, (&appl_spec_groups));
1✔
5273
         TEST_FFI_OK(botan_ec_group_supports_named_group, ("secp256r1", &named_group));
1✔
5274
         result.test_bool_eq("application specific groups support matches build",
1✔
5275
                             appl_spec_groups == 1,
5276
                             Botan::EC_Group::supports_application_specific_group());
1✔
5277
         result.test_bool_eq(
1✔
5278
            "named group support matches build", named_group == 1, Botan::EC_Group::supports_named_group("secp256r1"));
1✔
5279

5280
         if(named_group == 1) {
1✔
5281
            botan_ec_group_t group_from_name;
1✔
5282
            botan_asn1_oid_t oid_from_name;
1✔
5283
            botan_mp_t p_from_name;
1✔
5284
            botan_mp_t a_from_name;
1✔
5285
            botan_mp_t b_from_name;
1✔
5286
            botan_mp_t g_x_from_name;
1✔
5287
            botan_mp_t g_y_from_name;
1✔
5288
            botan_mp_t order_from_name;
1✔
5289

5290
            TEST_FFI_RC(BOTAN_FFI_ERROR_BAD_PARAMETER, botan_ec_group_from_name, (&group_from_name, ""));
1✔
5291

5292
            TEST_FFI_OK(botan_ec_group_from_name, (&group_from_name, "secp256r1"));
1✔
5293

5294
            get_group_parameters(group_from_name,
1✔
5295
                                 &oid_from_name,
5296
                                 &p_from_name,
5297
                                 &a_from_name,
5298
                                 &b_from_name,
5299
                                 &g_x_from_name,
5300
                                 &g_y_from_name,
5301
                                 &order_from_name,
5302
                                 result);
5303

5304
            botan_asn1_oid_t group_oid;
1✔
5305
            botan_ec_group_t group_from_oid;
1✔
5306
            botan_asn1_oid_t oid_from_oid;
1✔
5307
            botan_mp_t p_from_oid;
1✔
5308
            botan_mp_t a_from_oid;
1✔
5309
            botan_mp_t b_from_oid;
1✔
5310
            botan_mp_t g_x_from_oid;
1✔
5311
            botan_mp_t g_y_from_oid;
1✔
5312
            botan_mp_t order_from_oid;
1✔
5313

5314
            TEST_FFI_OK(botan_oid_from_string, (&group_oid, "1.2.840.10045.3.1.7"));
1✔
5315

5316
            TEST_FFI_OK(botan_ec_group_from_oid, (&group_from_oid, group_oid));
1✔
5317

5318
            get_group_parameters(group_from_oid,
1✔
5319
                                 &oid_from_oid,
5320
                                 &p_from_oid,
5321
                                 &a_from_oid,
5322
                                 &b_from_oid,
5323
                                 &g_x_from_oid,
5324
                                 &g_y_from_oid,
5325
                                 &order_from_oid,
5326
                                 result);
5327

5328
            TEST_FFI_RC(1, botan_oid_equal, (group_oid, oid_from_oid));
1✔
5329
            TEST_FFI_RC(1, botan_oid_equal, (oid_from_name, oid_from_oid));
1✔
5330

5331
            if(appl_spec_groups == 1) {
1✔
5332
               botan_asn1_oid_t group_parameter_oid;
1✔
5333
               botan_mp_t p_parameter;
1✔
5334
               botan_mp_t a_parameter;
1✔
5335
               botan_mp_t b_parameter;
1✔
5336
               botan_mp_t g_x_parameter;
1✔
5337
               botan_mp_t g_y_parameter;
1✔
5338
               botan_mp_t order_parameter;
1✔
5339

5340
               botan_ec_group_t group_from_parameters;
1✔
5341
               botan_asn1_oid_t oid_from_parameters;
1✔
5342
               botan_mp_t p_from_parameters;
1✔
5343
               botan_mp_t a_from_parameters;
1✔
5344
               botan_mp_t b_from_parameters;
1✔
5345
               botan_mp_t g_x_from_parameters;
1✔
5346
               botan_mp_t g_y_from_parameters;
1✔
5347
               botan_mp_t order_from_parameters;
1✔
5348

5349
               TEST_FFI_OK(botan_oid_from_string, (&group_parameter_oid, "1.3.6.1.4.1.25258.100.0"));
1✔
5350
               botan_oid_register(group_parameter_oid, "secp256r1-but-manually-registered");
1✔
5351
               botan_mp_init(&p_parameter);
1✔
5352
               botan_mp_init(&a_parameter);
1✔
5353
               botan_mp_init(&b_parameter);
1✔
5354
               botan_mp_init(&g_x_parameter);
1✔
5355
               botan_mp_init(&g_y_parameter);
1✔
5356
               botan_mp_init(&order_parameter);
1✔
5357

5358
               botan_mp_set_from_str(p_parameter, "0xFFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF");
1✔
5359
               botan_mp_set_from_str(a_parameter, "0xFFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC");
1✔
5360
               botan_mp_set_from_str(b_parameter, "0x5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B");
1✔
5361
               botan_mp_set_from_str(g_x_parameter,
1✔
5362
                                     "0x6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296");
5363
               botan_mp_set_from_str(g_y_parameter,
1✔
5364
                                     "0x4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5");
5365
               botan_mp_set_from_str(order_parameter,
1✔
5366
                                     "0xFFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551");
5367

5368
               TEST_FFI_OK(botan_ec_group_from_params,
1✔
5369
                           (&group_from_parameters,
5370
                            group_parameter_oid,
5371
                            p_parameter,
5372
                            a_parameter,
5373
                            b_parameter,
5374
                            g_x_parameter,
5375
                            g_y_parameter,
5376
                            order_parameter));
5377

5378
               get_group_parameters(group_from_parameters,
1✔
5379
                                    &oid_from_parameters,
5380
                                    &p_from_parameters,
5381
                                    &a_from_parameters,
5382
                                    &b_from_parameters,
5383
                                    &g_x_from_parameters,
5384
                                    &g_y_from_parameters,
5385
                                    &order_from_parameters,
5386
                                    result);
5387

5388
               botan_ec_group_t group_from_registered_oid;
1✔
5389

5390
               TEST_FFI_OK(botan_ec_group_from_name, (&group_from_registered_oid, "secp256r1-but-manually-registered"));
1✔
5391

5392
               // we registered this group under a different oid
5393
               TEST_FFI_RC(0, botan_oid_equal, (oid_from_oid, oid_from_parameters));
1✔
5394

5395
               TEST_FFI_RC(1, botan_ec_group_equal, (group_from_name, group_from_parameters));
1✔
5396
               TEST_FFI_RC(1, botan_ec_group_equal, (group_from_parameters, group_from_registered_oid));
1✔
5397

5398
               const std::vector<std::tuple<botan_mp_t, botan_mp_t>> parameters_inner = {
1✔
5399
                  {p_from_name, p_from_parameters},
5400
                  {a_from_name, a_from_parameters},
5401
                  {b_from_name, b_from_parameters},
5402
                  {g_x_from_name, g_x_from_parameters},
5403
                  {g_y_from_name, g_y_from_parameters},
5404
                  {order_from_name, order_from_parameters}};
1✔
5405

5406
               for(auto [x, y] : parameters_inner) {
7✔
5407
                  TEST_FFI_RC(1, botan_mp_equal, (x, y));
6✔
5408
                  botan_mp_destroy(y);
6✔
5409
               }
5410

5411
               botan_mp_destroy(p_parameter);
1✔
5412
               botan_mp_destroy(a_parameter);
1✔
5413
               botan_mp_destroy(b_parameter);
1✔
5414
               botan_mp_destroy(g_x_parameter);
1✔
5415
               botan_mp_destroy(g_y_parameter);
1✔
5416
               botan_mp_destroy(order_parameter);
1✔
5417

5418
               TEST_FFI_RC(1, botan_ec_group_unregister, (group_parameter_oid));
1✔
5419
               TEST_FFI_RC(0, botan_ec_group_unregister, (group_parameter_oid));
1✔
5420
               TEST_FFI_RC(1, botan_ec_group_unregister, (oid_from_name));
1✔
5421
               TEST_FFI_RC(0, botan_ec_group_unregister, (oid_from_name));
1✔
5422

5423
               botan_ec_group_t unregistered_group;
1✔
5424
               TEST_FFI_RC(
1✔
5425
                  BOTAN_FFI_ERROR_BAD_PARAMETER, botan_ec_group_from_oid, (&unregistered_group, group_parameter_oid));
5426

5427
               botan_oid_destroy(group_parameter_oid);
1✔
5428
               botan_oid_destroy(oid_from_parameters);
1✔
5429

5430
               TEST_FFI_OK(botan_ec_group_destroy, (group_from_parameters));
1✔
5431
               TEST_FFI_OK(botan_ec_group_destroy, (group_from_registered_oid));
1✔
5432
            }
1✔
5433

5434
            botan_oid_destroy(oid_from_name);
1✔
5435
            botan_oid_destroy(group_oid);
1✔
5436
            botan_oid_destroy(oid_from_oid);
1✔
5437

5438
            const std::vector<std::tuple<botan_mp_t, botan_mp_t>> parameters = {{p_from_name, p_from_oid},
1✔
5439
                                                                                {a_from_name, a_from_oid},
5440
                                                                                {b_from_name, b_from_oid},
5441
                                                                                {g_x_from_name, g_x_from_oid},
5442
                                                                                {g_y_from_name, g_y_from_oid},
5443
                                                                                {order_from_name, order_from_oid}};
1✔
5444

5445
            for(auto [x, y] : parameters) {
7✔
5446
               TEST_FFI_RC(1, botan_mp_equal, (x, y));
6✔
5447
               botan_mp_destroy(x);
6✔
5448
               botan_mp_destroy(y);
6✔
5449
            }
5450

5451
            botan_ec_group_t secp384r1;
1✔
5452
            botan_ec_group_t secp384r1_with_seed;
1✔
5453

5454
            TEST_FFI_OK(botan_ec_group_from_name, (&secp384r1, "secp384r1"));
1✔
5455
            TEST_FFI_OK(botan_ec_group_from_pem,
1✔
5456
                        (&secp384r1_with_seed, Test::read_data_file("x509/ecc/secp384r1_seed.pem").c_str()));
5457

5458
            botan_mp_t p;
1✔
5459
            botan_mp_t p_with_seed;
1✔
5460
            TEST_FFI_OK(botan_ec_group_get_p, (&p, secp384r1));
1✔
5461
            TEST_FFI_OK(botan_ec_group_get_p, (&p_with_seed, secp384r1_with_seed));
1✔
5462
            TEST_FFI_RC(1, botan_mp_equal, (p, p_with_seed));
1✔
5463
            botan_mp_destroy(p);
1✔
5464
            botan_mp_destroy(p_with_seed);
1✔
5465

5466
            TEST_FFI_RC(0, botan_ec_group_equal, (group_from_name, secp384r1));
1✔
5467
            TEST_FFI_RC(1, botan_ec_group_equal, (group_from_name, group_from_oid));
1✔
5468

5469
            ViewBytesSink der_bytes;
1✔
5470
            TEST_FFI_OK(botan_ec_group_view_der, (group_from_name, der_bytes.delegate(), der_bytes.callback()));
1✔
5471
            botan_ec_group_t group_from_ber;
1✔
5472
            TEST_FFI_OK(
1✔
5473
               botan_ec_group_from_ber,
5474
               (&group_from_ber, reinterpret_cast<const uint8_t*>(der_bytes.get().data()), der_bytes.get().size()));
5475

5476
            ViewStringSink pem_string;
1✔
5477
            TEST_FFI_OK(botan_ec_group_view_pem, (group_from_name, pem_string.delegate(), pem_string.callback()));
1✔
5478
            const std::string pem_actual = {pem_string.get().begin(), pem_string.get().end()};
2✔
5479

5480
            botan_ec_group_t group_from_pem;
1✔
5481
            TEST_FFI_OK(botan_ec_group_from_pem, (&group_from_pem, pem_actual.c_str()));
1✔
5482

5483
            TEST_FFI_RC(1, botan_ec_group_equal, (group_from_name, group_from_ber));
1✔
5484
            TEST_FFI_RC(1, botan_ec_group_equal, (group_from_name, group_from_pem));
1✔
5485

5486
            botan_privkey_t priv;
1✔
5487
            TEST_FFI_OK(botan_ec_privkey_create, (&priv, "ECDSA", secp384r1, rng));
1✔
5488
            std::array<char, 32> namebuf{};
1✔
5489
            size_t name_len = namebuf.size();
1✔
5490

5491
            TEST_FFI_OK(botan_privkey_algo_name, (priv, namebuf.data(), &name_len));
1✔
5492
            result.test_str_eq("Key name is expected value", namebuf.data(), "ECDSA");
1✔
5493

5494
            botan_privkey_destroy(priv);
1✔
5495

5496
            TEST_FFI_OK(botan_ec_group_destroy, (group_from_name));
1✔
5497
            TEST_FFI_OK(botan_ec_group_destroy, (group_from_oid));
1✔
5498
            TEST_FFI_OK(botan_ec_group_destroy, (secp384r1));
1✔
5499
            TEST_FFI_OK(botan_ec_group_destroy, (secp384r1_with_seed));
1✔
5500
            TEST_FFI_OK(botan_ec_group_destroy, (group_from_ber));
1✔
5501
            TEST_FFI_OK(botan_ec_group_destroy, (group_from_pem));
1✔
5502
         }
2✔
5503
      }
1✔
5504

5505
   private:
5506
      static void get_group_parameters(botan_ec_group_t ec_group,
3✔
5507
                                       botan_asn1_oid_t* oid,
5508
                                       botan_mp_t* p,
5509
                                       botan_mp_t* a,
5510
                                       botan_mp_t* b,
5511
                                       botan_mp_t* g_x,
5512
                                       botan_mp_t* g_y,
5513
                                       botan_mp_t* order,
5514
                                       Test::Result& result) {
5515
         TEST_FFI_OK(botan_ec_group_get_curve_oid, (oid, ec_group));
3✔
5516
         TEST_FFI_OK(botan_ec_group_get_p, (p, ec_group));
3✔
5517
         TEST_FFI_OK(botan_ec_group_get_a, (a, ec_group));
3✔
5518
         TEST_FFI_OK(botan_ec_group_get_b, (b, ec_group));
3✔
5519
         TEST_FFI_OK(botan_ec_group_get_g_x, (g_x, ec_group));
3✔
5520
         TEST_FFI_OK(botan_ec_group_get_g_y, (g_y, ec_group));
3✔
5521
         TEST_FFI_OK(botan_ec_group_get_order, (order, ec_group));
3✔
5522
      }
3✔
5523
};
5524

5525
class FFI_SRP6_Test final : public FFI_Test {
1✔
5526
   public:
5527
      std::string name() const override { return "FFI SRP6"; }
1✔
5528

5529
      bool skip_this_test() const override {
1✔
5530
   #if !defined(BOTAN_HAS_SRP6)
5531
         return true;
5532
   #else
5533
         return false;
1✔
5534
   #endif
5535
      }
5536

5537
      void ffi_test(Test::Result& result, botan_rng_t rng) override {
1✔
5538
         constexpr size_t group_bytes = 128;
1✔
5539
         const char* username = "alice";
1✔
5540
         const char* password = "secret";
1✔
5541
         const char* srp_group = "modp/srp/1024";
1✔
5542
         const char* srp_hash = "SHA-256";
1✔
5543
         const auto salt = Botan::hex_decode("beb25379d1a8581eb5a727673a2441ee");
1✔
5544

5545
         std::array<uint8_t, group_bytes> output{};
1✔
5546

5547
         size_t group_size = 0;
1✔
5548
         TEST_FFI_OK(botan_srp6_group_size, (srp_group, &group_size));
1✔
5549
         result.test_sz_eq("reported group size", group_size, group_bytes);
1✔
5550

5551
         size_t short_output_len = output.size() / 2;
1✔
5552
         TEST_FFI_RC(
1✔
5553
            BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
5554
            botan_srp6_generate_verifier,
5555
            (username, password, salt.data(), salt.size(), srp_group, srp_hash, output.data(), &short_output_len));
5556
         result.test_sz_eq("requested verifier length", short_output_len, group_bytes);
1✔
5557

5558
         size_t verifier_output_len = short_output_len;
1✔
5559
         TEST_FFI_OK(
1✔
5560
            botan_srp6_generate_verifier,
5561
            (username, password, salt.data(), salt.size(), srp_group, srp_hash, output.data(), &verifier_output_len));
5562
         const auto verifier = std::vector(output.data(), output.data() + verifier_output_len);
1✔
5563

5564
         botan_srp6_server_session_t srp_server;
1✔
5565
         TEST_FFI_OK(botan_srp6_server_session_init, (&srp_server));
1✔
5566

5567
         short_output_len = output.size() / 2;
1✔
5568
         TEST_FFI_RC(
1✔
5569
            BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
5570
            botan_srp6_server_session_step1,
5571
            (srp_server, verifier.data(), verifier.size(), srp_group, srp_hash, rng, output.data(), &short_output_len));
5572
         result.test_sz_eq("requested B_pub length", short_output_len, group_bytes);
1✔
5573

5574
         size_t pub_B_output_len = short_output_len;
1✔
5575
         TEST_FFI_OK(
1✔
5576
            botan_srp6_server_session_step1,
5577
            (srp_server, verifier.data(), verifier.size(), srp_group, srp_hash, rng, output.data(), &pub_B_output_len));
5578
         const auto pub_B = std::vector(output.data(), output.data() + pub_B_output_len);
1✔
5579

5580
         std::array<uint8_t, group_bytes> output2{};
1✔
5581
         size_t short_output_len2 = output2.size() / 2;
1✔
5582
         short_output_len = output.size() / 2;
1✔
5583
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
5584
                     botan_srp6_client_agree,
5585
                     (username,
5586
                      password,
5587
                      srp_group,
5588
                      srp_hash,
5589
                      salt.data(),
5590
                      salt.size(),
5591
                      pub_B.data(),
5592
                      pub_B.size(),
5593
                      rng,
5594
                      output.data(),
5595
                      &short_output_len,
5596
                      output2.data(),
5597
                      &short_output_len2));
5598
         result.test_sz_eq("requested pub_A length", short_output_len, group_bytes);
1✔
5599
         result.test_sz_eq("requested K1 length", short_output_len2, group_bytes);
1✔
5600

5601
         size_t pub_A_output_len = short_output_len;
1✔
5602
         size_t K1_output_len = short_output_len2;
1✔
5603
         TEST_FFI_OK(botan_srp6_client_agree,
1✔
5604
                     (username,
5605
                      password,
5606
                      srp_group,
5607
                      srp_hash,
5608
                      salt.data(),
5609
                      salt.size(),
5610
                      pub_B.data(),
5611
                      pub_B.size(),
5612
                      rng,
5613
                      output.data(),
5614
                      &pub_A_output_len,
5615
                      output2.data(),
5616
                      &K1_output_len));
5617
         const auto pub_A = std::vector(output.data(), output.data() + pub_A_output_len);
1✔
5618
         const auto K1 = std::vector(output2.data(), output2.data() + K1_output_len);
1✔
5619

5620
         short_output_len = output.size() / 2;
1✔
5621
         TEST_FFI_RC(BOTAN_FFI_ERROR_INSUFFICIENT_BUFFER_SPACE,
1✔
5622
                     botan_srp6_server_session_step2,
5623
                     (srp_server, pub_A.data(), pub_A.size(), output.data(), &short_output_len));
5624
         result.test_sz_eq("requested K2 length", short_output_len, group_bytes);
1✔
5625

5626
         size_t K2_output_len = short_output_len;
1✔
5627
         TEST_FFI_OK(botan_srp6_server_session_step2,
1✔
5628
                     (srp_server, pub_A.data(), pub_A.size(), output.data(), &K2_output_len));
5629
         const auto K2 = std::vector(output.data(), output.data() + K2_output_len);
1✔
5630

5631
         result.test_bin_eq("K1 == K2", K1, K2);
1✔
5632

5633
         TEST_FFI_OK(botan_srp6_server_session_destroy, (srp_server));
1✔
5634
      }
1✔
5635
};
5636

5637
// NOLINTEND(*-init-variables)
5638

5639
BOTAN_REGISTER_TEST("ffi", "ffi_utils", FFI_Utils_Test);
5640
BOTAN_REGISTER_TEST("ffi", "ffi_rng", FFI_RNG_Test);
5641
BOTAN_REGISTER_TEST("ffi", "ffi_rsa_cert", FFI_RSA_Cert_Test);
5642
BOTAN_REGISTER_TEST("ffi", "ffi_zfec", FFI_ZFEC_Test);
5643
BOTAN_REGISTER_TEST("ffi", "ffi_crl", FFI_CRL_Test);
5644
BOTAN_REGISTER_TEST("ffi", "ffi_cert_validation", FFI_Cert_Validation_Test);
5645
BOTAN_REGISTER_TEST("ffi", "ffi_ecdsa_certificate", FFI_ECDSA_Certificate_Test);
5646
BOTAN_REGISTER_TEST("ffi", "ffi_cert_ext_keyusage", FFI_Cert_ExtKeyUsages_Test);
5647
BOTAN_REGISTER_TEST("ffi", "ffi_pkcs_hashid", FFI_PKCS_Hashid_Test);
5648
BOTAN_REGISTER_TEST("ffi", "ffi_cbc_cipher", FFI_CBC_Cipher_Test);
5649
BOTAN_REGISTER_TEST("ffi", "ffi_gcm", FFI_GCM_Test);
5650
BOTAN_REGISTER_TEST("ffi", "ffi_chacha", FFI_ChaCha20Poly1305_Test);
5651
BOTAN_REGISTER_TEST("ffi", "ffi_eax", FFI_EAX_Test);
5652
BOTAN_REGISTER_TEST("ffi", "ffi_aead", FFI_AEAD_Test);
5653
BOTAN_REGISTER_TEST("ffi", "ffi_streamcipher", FFI_StreamCipher_Test);
5654
BOTAN_REGISTER_TEST("ffi", "ffi_xof", FFI_XOF_Test);
5655
BOTAN_REGISTER_TEST("ffi", "ffi_hashfunction", FFI_HashFunction_Test);
5656
BOTAN_REGISTER_TEST("ffi", "ffi_mac", FFI_MAC_Test);
5657
BOTAN_REGISTER_TEST("ffi", "ffi_scrypt", FFI_Scrypt_Test);
5658
BOTAN_REGISTER_TEST("ffi", "ffi_kdf", FFI_KDF_Test);
5659
BOTAN_REGISTER_TEST("ffi", "ffi_blockcipher", FFI_Blockcipher_Test);
5660
BOTAN_REGISTER_TEST("ffi", "ffi_errorhandling", FFI_ErrorHandling_Test);
5661
BOTAN_REGISTER_TEST("ffi", "ffi_base64", FFI_Base64_Test);
5662
BOTAN_REGISTER_TEST("ffi", "ffi_hex", FFI_Hex_Test);
5663
BOTAN_REGISTER_TEST("ffi", "ffi_mp", FFI_MP_Test);
5664
BOTAN_REGISTER_TEST("ffi", "ffi_fpe", FFI_FPE_Test);
5665
BOTAN_REGISTER_TEST("ffi", "ffi_totp", FFI_TOTP_Test);
5666
BOTAN_REGISTER_TEST("ffi", "ffi_hotp", FFI_HOTP_Test);
5667
BOTAN_REGISTER_TEST("ffi", "ffi_keywrap", FFI_Keywrap_Test);
5668
BOTAN_REGISTER_TEST("ffi", "ffi_xmss", FFI_XMSS_Test);
5669
BOTAN_REGISTER_TEST("ffi", "ffi_rsa", FFI_RSA_Test);
5670
BOTAN_REGISTER_TEST("ffi", "ffi_dsa", FFI_DSA_Test);
5671
BOTAN_REGISTER_TEST("ffi", "ffi_ecdsa", FFI_ECDSA_Test);
5672
BOTAN_REGISTER_TEST("ffi", "ffi_sm2_sig", FFI_SM2_Sig_Test);
5673
BOTAN_REGISTER_TEST("ffi", "ffi_sm2_enc", FFI_SM2_Enc_Test);
5674
BOTAN_REGISTER_TEST("ffi", "ffi_ecdh", FFI_ECDH_Test);
5675
BOTAN_REGISTER_TEST("ffi", "ffi_mceliece", FFI_McEliece_Test);
5676
BOTAN_REGISTER_TEST("ffi", "ffi_ed25519", FFI_Ed25519_Test);
5677
BOTAN_REGISTER_TEST("ffi", "ffi_ed448", FFI_Ed448_Test);
5678
BOTAN_REGISTER_TEST("ffi", "ffi_x25519", FFI_X25519_Test);
5679
BOTAN_REGISTER_TEST("ffi", "ffi_x448", FFI_X448_Test);
5680
BOTAN_REGISTER_TEST("ffi", "ffi_kyber512", FFI_Kyber512_Test);
5681
BOTAN_REGISTER_TEST("ffi", "ffi_kyber768", FFI_Kyber768_Test);
5682
BOTAN_REGISTER_TEST("ffi", "ffi_kyber1024", FFI_Kyber1024_Test);
5683
BOTAN_REGISTER_TEST("ffi", "ffi_ml_kem", FFI_ML_KEM_Test);
5684
BOTAN_REGISTER_TEST("ffi", "ffi_ml_dsa", FFI_ML_DSA_Test);
5685
BOTAN_REGISTER_TEST("ffi", "ffi_mldsa_composite", FFI_MLDSA_Composite_Test);
5686
BOTAN_REGISTER_TEST("ffi", "ffi_slh_dsa", FFI_SLH_DSA_Test);
5687
BOTAN_REGISTER_TEST("ffi", "ffi_frodokem", FFI_FrodoKEM_Test);
5688
BOTAN_REGISTER_TEST("ffi", "ffi_cmce", FFI_Classic_McEliece_Test);
5689
BOTAN_REGISTER_TEST("ffi", "ffi_elgamal", FFI_ElGamal_Test);
5690
BOTAN_REGISTER_TEST("ffi", "ffi_dh", FFI_DH_Test);
5691
BOTAN_REGISTER_TEST("ffi", "ffi_oid", FFI_OID_Test);
5692
BOTAN_REGISTER_TEST("ffi", "ffi_ec_group", FFI_EC_Group_Test);
5693
BOTAN_REGISTER_TEST("ffi", "ffi_srp6", FFI_SRP6_Test);
5694

5695
   #if defined(BOTAN_HAS_X509)
5696
BOTAN_REGISTER_TEST("ffi", "ffi_cert_alt_names", FFI_Cert_AlternativeNames_Test);
5697
BOTAN_REGISTER_TEST("ffi", "ffi_cert_name_constraints", FFI_Cert_NameConstraints_Test);
5698
BOTAN_REGISTER_TEST("ffi", "ffi_cert_aia", FFI_Cert_AuthorityInformationAccess_Test);
5699
   #endif
5700

5701
#endif
5702

5703
}  // namespace
5704

5705
}  // namespace Botan_Tests
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc