Home | History | Annotate | Line # | Download | only in recipes
      1 #! /usr/bin/env perl
      2 # Copyright 2017-2022 The OpenSSL Project Authors. All Rights Reserved.
      3 #
      4 # Licensed under the Apache License 2.0 (the "License").  You may not use
      5 # this file except in compliance with the License.  You can obtain a copy
      6 # in the file LICENSE in the source distribution or at
      7 # https://www.openssl.org/source/license.html
      8 
      9 
     10 use strict;
     11 use warnings;
     12 
     13 use File::Spec;
     14 use OpenSSL::Test qw/:DEFAULT srctop_file srctop_dir bldtop_dir bldtop_file/;
     15 use OpenSSL::Test::Utils;
     16 
     17 BEGIN {
     18     setup("test_genrsa");
     19 }
     20 
     21 use lib srctop_dir('Configurations');
     22 use lib bldtop_dir('.');
     23 
     24 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
     25 
     26 plan tests =>
     27     ($no_fips ? 0 : 5)          # Extra FIPS related tests
     28     + 15;
     29 
     30 # We want to know that an absurdly small number of bits isn't support
     31 is(run(app([ 'openssl', 'genpkey', '-out', 'genrsatest.pem',
     32              '-algorithm', 'RSA', '-pkeyopt', 'rsa_keygen_bits:8',
     33              '-pkeyopt', 'rsa_keygen_pubexp:3'])),
     34            0, "genpkey 8");
     35 is(run(app([ 'openssl', 'genrsa', '-3', '-out', 'genrsatest.pem', '8'])),
     36            0, "genrsa -3 8");
     37 
     38 # Depending on the shared library, we might have different lower limits.
     39 # Let's find it!  This is a simple binary search
     40 # ------------------------------------------------------------
     41 # NOTE: $good may need an update in the future
     42 # ------------------------------------------------------------
     43 note "Looking for lowest amount of bits";
     44 my $bad = 3;                    # Log2 of number of bits (2 << 3  == 8)
     45 my $good = 11;                  # Log2 of number of bits (2 << 11 == 2048)
     46 my $fin;
     47 while ($good > $bad + 1) {
     48     my $checked = int(($good + $bad + 1) / 2);
     49     my $bits = 2 ** $checked;
     50     $fin = run(app([ 'openssl', 'genpkey', '-out', 'genrsatest.pem',
     51                      '-algorithm', 'RSA', '-pkeyopt', 'rsa_keygen_pubexp:65537',
     52                      '-pkeyopt', "rsa_keygen_bits:$bits",
     53                    ], stderr => undef));
     54     if ($fin) {
     55         note 2 ** $checked, " bits is good";
     56         $good = $checked;
     57     } else {
     58         note 2 ** $checked, " bits is bad";
     59         $bad = $checked;
     60     }
     61 }
     62 $good++ if $good == $bad;
     63 $good = 2 ** $good;
     64 note "Found lowest allowed amount of bits to be $good";
     65 
     66 ok(run(app([ 'openssl', 'genpkey', '-algorithm', 'RSA',
     67              '-pkeyopt', 'rsa_keygen_pubexp:65537',
     68              '-pkeyopt', "rsa_keygen_bits:$good",
     69              '-out', 'genrsatest.pem' ])),
     70    "genpkey $good");
     71 ok(run(app([ 'openssl', 'pkey', '-check', '-in', 'genrsatest.pem', '-noout' ])),
     72    "pkey -check");
     73 
     74 ok(run(app([ 'openssl', 'genpkey', '-algorithm', 'RSA',
     75              '-pkeyopt', 'rsa_keygen_bits:2048',
     76              '-out', 'genrsatest2048.pem' ])),
     77    "genpkey 2048 bits");
     78 ok(run(app([ 'openssl', 'pkey', '-check', '-in', 'genrsatest2048.pem', '-noout' ])),
     79    "pkey -check");
     80 
     81 ok(!run(app([ 'openssl', 'genpkey', '-algorithm', 'RSA',
     82              '-pkeyopt', 'hexe:02',
     83              '-out', 'genrsatest.pem' ])),
     84    "genpkey with a bad public exponent should fail");
     85 ok(!run(app([ 'openssl', 'genpkey', '-algorithm', 'RSA',
     86              '-pkeyopt', 'e:65538',
     87              '-out', 'genrsatest.pem' ])),
     88    "genpkey with a even public exponent should fail");
     89 ok(!run(app([ 'openssl', 'genpkey', '-propquery', 'unknown',
     90              '-algorithm', 'RSA' ])),
     91    "genpkey requesting unknown=yes property should fail");
     92 
     93  SKIP: {
     94     skip "Skipping rsa command line test", 2 if disabled("deprecated-3.0");
     95 
     96     ok(run(app([ 'openssl', 'genrsa', '-3', '-out', 'genrsatest.pem', $good ])),
     97        "genrsa -3 $good");
     98     ok(run(app([ 'openssl', 'rsa', '-check', '-in', 'genrsatest.pem', '-noout' ])),
     99        "rsa -check");
    100  }
    101 
    102 ok(run(app([ 'openssl', 'genrsa', '-f4', '-out', 'genrsatest.pem', $good ])),
    103    "genrsa -f4 $good");
    104 ok(run(app([ 'openssl', 'rsa', '-check', '-in', 'genrsatest.pem', '-noout' ])),
    105    "rsa -check");
    106 ok(run(app([ 'openssl', 'rsa', '-in', 'genrsatest.pem', '-out', 'genrsatest-enc.pem',
    107    '-aes256', '-passout', 'pass:x' ])),
    108    "rsa encrypt");
    109 ok(run(app([ 'openssl', 'rsa', '-in', 'genrsatest-enc.pem', '-passin', 'pass:x' ])),
    110    "rsa decrypt");
    111 
    112 unless ($no_fips) {
    113     my $provconf = srctop_file("test", "fips-and-base.cnf");
    114     my $provpath = bldtop_dir("providers");
    115     my @prov = ( "-provider-path", $provpath,
    116                  "-config", $provconf);
    117 
    118     $ENV{OPENSSL_TEST_LIBCTX} = "1";
    119     ok(run(app(['openssl', 'genpkey',
    120                 @prov,
    121                 '-algorithm', 'RSA',
    122                 '-pkeyopt', 'bits:2080',
    123                 '-out', 'genrsatest2080.pem'])),
    124        "Generating RSA key with > 2048 bits and < 3072 bits");
    125     ok(run(app(['openssl', 'genpkey',
    126                 @prov,
    127                 '-algorithm', 'RSA',
    128                 '-pkeyopt', 'bits:3072',
    129                 '-out', 'genrsatest3072.pem'])),
    130        "Generating RSA key with 3072 bits");
    131 
    132    ok(!run(app(['openssl', 'genrsa', @prov, '512'])),
    133        "Generating RSA key with 512 bits should fail in FIPS provider");
    134 
    135    ok(!run(app(['openssl', 'genrsa',
    136                 @prov,
    137                 '-provider', 'default',
    138                 '-propquery', '?fips!=yes',
    139                 '512'])),
    140        "Generating RSA key with 512 bits should succeed with FIPS provider as".
    141        " default with a non-FIPS property query");
    142 
    143     # We want to know that an absurdly large number of bits fails the RNG check
    144     is(run(app([ 'openssl', 'genpkey',
    145                  @prov,
    146                  '-algorithm', 'RSA',
    147                  '-pkeyopt', 'bits:1000000000',
    148                  '-out', 'genrsatest.pem'])),
    149                0, "genpkey 1000000000");
    150 }
    151