qemu

FORK: QEMU emulator
git clone https://git.neptards.moe/neptards/qemu.git
Log | Files | Refs | Submodules | LICENSE

test-crypto-der.c (18005B)


      1 /*
      2  * QEMU Crypto akcipher algorithms
      3  *
      4  * Copyright (c) 2022 Bytedance
      5  * Author: lei he <helei@bytedance.com>
      6  *
      7  * This library is free software; you can redistribute it and/or
      8  * modify it under the terms of the GNU Lesser General Public
      9  * License as published by the Free Software Foundation; either
     10  * version 2.1 of the License, or (at your option) any later version.
     11  *
     12  * This library is distributed in the hope that it will be useful,
     13  * but WITHOUT ANY WARRANTY; without even the implied warranty of
     14  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
     15  * Lesser General Public License for more details.
     16  *
     17  * You should have received a copy of the GNU Lesser General Public
     18  * License along with this library; if not, see <http://www.gnu.org/licenses/>.
     19  *
     20  */
     21 
     22 #include "qemu/osdep.h"
     23 #include "crypto/der.h"
     24 
     25 /* rsa(512) private key, generated by openssl */
     26 static const uint8_t test_rsa512_priv_key[] =
     27     "\x30\x82\x01\x39"      /* SEQUENCE, offset: 0, length: 313 */
     28     "\x02\x01\x00"          /* INTEGER, offset: 4, length: 1 */
     29     "\x02\x41"              /* INTEGER, offset: 7, length: 65 */
     30     "\x00\xb9\xe1\x22\xdb\x56\x2f\xb6\xf7\xf0\x0a\x87\x43\x07\x12\xdb"
     31     "\x6d\xb6\x2b\x41\x8d\x2c\x3c\xa5\xdd\x78\x9a\x8f\xab\x8e\xf2\x4a"
     32     "\xc8\x34\x0c\x12\x4f\x11\x90\xc6\xc2\xa5\xd0\xcd\xfb\xfc\x2c\x95"
     33     "\x56\x82\xdf\x39\xf3\x3b\x1d\x62\x26\x97\xb7\x93\x25\xc7\xec\x7e"
     34     "\xf7"
     35     "\x02\x03\x01\x00\x01"  /* INTEGER, offset: 74, length: 3 */
     36     "\x02\x40"              /* INTEGER, offset: 79, length: 64 */
     37     "\x1e\x80\xfe\xda\x65\xdb\x70\xb8\x61\x91\x28\xbf\x6c\x32\xc1\x05"
     38     "\xd1\x26\x6a\x1c\x83\xcc\xf4\x1f\x53\x42\x72\x1f\x62\x57\x0a\xc4"
     39     "\x66\x76\x30\x87\xb9\xb1\xb9\x6a\x63\xfd\x8f\x3e\xfc\x35\x3f\xd6"
     40     "\x2e\x6c\xc8\x70\x8a\x17\xc1\x28\x6a\xfe\x51\x56\xb3\x92\x6f\x09"
     41     "\x02\x21"              /* INTEGER, offset: 145, length: 33 */
     42     "\x00\xe3\x2e\x2d\x8d\xba\x1c\x34\x4c\x49\x9f\xc1\xa6\xdd\xd7\x13"
     43     "\x8d\x05\x48\xdd\xff\x5c\x30\xbc\x6b\xc4\x18\x9d\xfc\xa2\xd0\x9b"
     44     "\x4d"
     45     "\x02\x21"             /* INTEGER, offset: 180, length: 33 */
     46     "\x00\xd1\x75\xaf\x4b\xc6\x1a\xb0\x98\x14\x42\xae\x33\xf3\x44\xde"
     47     "\x21\xcb\x04\xda\xfb\x1e\x35\x92\xcd\x69\xc0\x83\x06\x83\x8e\x39"
     48     "\x53"
     49     "\x02\x20"             /* INTEGER, offset: 215, length: 32 */
     50     "\x68\x8d\x2a\xf7\xcb\xcc\x09\x21\x86\xcc\x98\x21\xc4\x7c\xa4\x09"
     51     "\xc5\x81\xd8\x71\x1a\x2b\x6f\xbb\xa4\xde\xb3\x6e\xbe\x3b\x85\x0d"
     52     "\x02\x20"             /* INTEGER, offset: 249, length: 32 */
     53     "\x64\x06\x0e\xef\xe0\x6a\x5e\x6a\x41\x42\x96\x6d\xb8\x7d\xea\x95"
     54     "\xb8\x9d\x58\xf5\x12\x38\x03\x22\x94\x9d\x99\xf4\x42\x5e\x68\x81"
     55     "\x02\x20"             /* INTEGER, offset: 283, length: 32 */
     56     "\x7f\x1d\x87\xe8\x55\x30\x75\xc7\x29\xec\xc9\x65\x76\x5a\x6a\xa3"
     57     "\x4a\x6e\xe1\x26\x65\xd1\x76\xd5\xb9\xd1\x8b\xa8\x73\xe2\x6a\x9e";
     58 
     59 static const uint8_t test_rsa2048_priv_key[] =
     60     "\x30\x82\x04\xa6"          /* SEQUENCE, offset: 0, length 1190 */
     61     "\x02\x01\x00"              /* INTEGER, offset: 4, length: 1 */
     62     "\x02\x82\x01\x01"          /* INTEGER, offset: 7, length: 257 */
     63     "\x00\xd1\x48\xc2\xc1\x1d\x4f\x94\xf2\xbb\x9b\xe2\x2d\xe1\xea\x4c"
     64     "\xce\x41\x72\xe3\x41\x7e\x9d\x91\x85\xa3\x4e\xe1\x2c\xf6\x52\x6d"
     65     "\xf9\x84\x64\xdf\x87\x28\x4a\xc9\x9d\x78\x93\x47\xc8\xd9\x66\x2e"
     66     "\xf4\xc6\xf0\x32\x15\x1a\xe8\xaf\x5a\xca\x3a\xd3\x3e\xf6\xde\x86"
     67     "\xdd\x9b\xa6\x4d\x74\x58\xf0\x11\x7f\x66\xd5\x1c\xd8\xde\xa3\xf8"
     68     "\xa3\xfc\x33\x55\x89\xa9\xc3\xea\x5b\x2e\x31\x06\xf8\xcb\x9e\x6e"
     69     "\xb2\x68\x0d\xe6\xc3\x5c\x2d\xf8\xa2\xbd\x00\x1a\xf6\xb6\xdd\x14"
     70     "\x8d\x11\x6d\x2d\xc6\x0c\x09\xe6\xf6\xb9\x8b\x87\x4c\x9f\x4d\x63"
     71     "\xd3\x94\xf4\x32\xca\xcf\x5e\xbf\xe2\x7f\x73\x5a\x65\xec\x82\x0d"
     72     "\x7f\x30\x25\x03\xd4\x3a\xff\xa2\xe8\xd6\xb5\x1f\x4f\x36\x64\x61"
     73     "\xc3\x5f\xb2\x9e\x0c\x53\x04\x19\x34\x99\xe8\xe3\xe6\xd3\x2f\x45"
     74     "\x58\x8e\x5d\x54\x5a\xa0\xc0\x5e\x51\x9b\x22\x15\xec\x26\x6f\x72"
     75     "\x68\xe9\xbf\x5d\x1d\xb5\xd9\xe4\x81\x1a\x92\x66\xa8\xcb\x73\x46"
     76     "\xab\x96\x7b\xf8\x9c\xf5\xb5\x9e\x2b\x13\x71\xe0\x01\x0c\x59\x1b"
     77     "\x63\x9f\xb7\xd1\xcd\x47\x8e\xc7\x3a\xbe\xcb\x47\xa7\x23\x43\xa7"
     78     "\x7d\xbd\x2c\x4e\x22\x37\xcc\xf9\x1b\x1b\xbb\xed\xec\xf0\x47\x92"
     79     "\x43"
     80     "\x02\x03\x01\x00\x01"      /* INTEGER, offset 268, length 3 */
     81     "\x02\x82\x01\x01"          /* INTEGER, offset 273, length 257 */
     82     "\x00\x8d\x21\x97\x0c\x29\x9a\xf8\x23\xf4\x76\x3b\xc1\x9b\x3e\xa8"
     83     "\x8a\xd2\xc2\x0a\x14\xa9\xb0\xd2\x68\x9f\x67\x5b\x1c\x3a\x03\xfe"
     84     "\x5b\xac\x77\x65\xf1\xbc\x2f\x2a\xe5\x01\x61\xb8\x9f\xee\x53\x25"
     85     "\x49\x36\x3a\xd6\x5b\x3b\x29\x3c\xcf\x69\xde\xdf\x83\xef\x70\xc2"
     86     "\xdc\x00\xd1\xd6\x1b\xa6\xba\x45\xe2\x77\x53\x31\xbf\xe1\xec\x0b"
     87     "\x89\x72\x52\x9f\xd5\x54\xe1\x64\x52\x16\xc5\x43\x21\x56\x16\xc2"
     88     "\x29\x97\x58\x00\x8d\x2f\xc5\x64\x8d\x42\x0d\x27\x21\xc6\xd1\x31"
     89     "\xc1\xab\xc5\xc7\x7f\x6d\xb0\xe3\xca\xef\xf6\xf2\xc7\xae\x09\xbf"
     90     "\x4d\xc0\x4e\x90\x2c\x28\xb9\xcc\x22\x74\xf2\xd5\xff\x4d\x86\xf6"
     91     "\xec\x45\x1f\xbf\x25\x4c\x30\x26\x76\x4f\x09\x13\x83\xef\x35\x73"
     92     "\xa3\xa2\xb1\x40\xcf\x07\x7a\x83\xae\xea\x00\xea\x74\xc7\x54\x6a"
     93     "\x88\x19\xed\x35\xd3\x7e\x5e\xac\x51\xc1\x1e\x5e\x2c\x57\x72\x20"
     94     "\x10\x6a\x0c\x47\xe1\xf0\x36\x70\xd2\xa7\x57\x64\x47\x46\x9f\xca"
     95     "\x23\x8a\x48\x50\x1d\x33\x6a\x86\x46\x69\xed\x54\x65\x6b\x9e\xab"
     96     "\x1f\x84\x87\xf4\x92\x8a\x6c\x44\x20\xaa\x8d\xd8\x50\xde\x45\x74"
     97     "\xe0\xa8\xc7\xb9\x38\x74\x24\x51\x33\xf0\x39\x54\x6c\x11\xae\xc2"
     98     "\x29"
     99     "\x02\x81\x81"              /* INTEGER, offset 534, length 129 */
    100     "\x00\xe8\x26\xd1\xf9\xa0\xd3\x0e\x3f\x2f\x89\x9b\x94\x16\x12\xd1"
    101     "\xae\x3c\x53\x9c\xcf\xc6\xf7\x03\xf5\xdf\x39\xdc\x25\x5d\xcb\xb8"
    102     "\xb9\x74\x3e\x3b\x36\xf6\xa0\x8d\xb1\x0e\xd8\xfe\x8c\xcd\x01\x13"
    103     "\x77\x73\x08\x0f\x32\xbd\xe6\x95\xdc\xd0\x14\x7d\x44\xdc\x3e\xd9"
    104     "\xaa\x8a\x32\xe6\x0e\x76\xb6\x05\xc5\x6b\x87\x78\x9a\x32\xe2\xf8"
    105     "\x78\xba\x58\x75\x58\xd5\x26\x9d\x9a\x0f\xb6\xca\xb5\x27\xd8\x58"
    106     "\xae\x3f\x49\x54\xd2\x2b\xac\x28\x39\x88\x31\x42\x12\x08\xea\x0b"
    107     "\x39\x58\xae\xf3\x82\xa0\xe2\x75\x7c\x96\xa9\xb8\x57\x29\x6d\xd7"
    108     "\x37"
    109     "\x02\x81\x81"              /* INTEGER, offset 666, length 129 */
    110     "\x00\xe6\xc8\x91\x50\x49\x97\x56\x70\x6e\x25\xf5\x77\x25\xa5\x41"
    111     "\xfe\xd7\x25\x1b\xc1\x4a\xff\x37\x44\x2b\x46\xa0\xdf\xe8\x02\x09"
    112     "\xdd\xa8\x41\xa1\x12\x84\x3c\xf8\xc2\x13\x3e\xb8\x4b\x22\x01\xac"
    113     "\xa6\x09\xb2\xe9\xcd\xc8\x51\xee\xde\xa3\x1e\x6b\xfe\xb1\xf8\xb6"
    114     "\x9e\x48\x36\x62\x0b\x05\xfa\x38\xc1\x06\x04\x58\x95\x4d\x25\x13"
    115     "\x6d\x0b\x12\x0b\xc9\x6d\x59\xfc\x33\x03\x36\x01\x12\x09\x72\x74"
    116     "\x5e\x98\x65\x66\x2f\x3a\xde\xd8\xd4\xee\x6f\x82\xe6\x36\x49\x12"
    117     "\x6a\x94\x28\xe9\x28\x9e\xef\x29\xdc\xdf\xab\x94\x65\x02\x4e\x4b"
    118     "\x55"
    119     "\x02\x81\x81"              /* INTEGER, offset 798, length 129 */
    120     "\x00\xc9\xda\xb7\x48\x6e\x66\x15\x45\x2b\x78\x63\x26\x67\xeb\x05"
    121     "\x16\x92\xad\xc0\xf3\x88\xf4\xcf\x24\xc2\x6b\xf4\xd7\x28\xaf\x32"
    122     "\x77\x4e\x73\xad\xd9\x24\xa8\x85\x8b\x26\x75\xd7\x1f\x66\x41\x41"
    123     "\x43\xe3\x69\x66\x8d\xa0\x41\x16\x9d\x60\xef\xef\xdc\x28\x05\x1e"
    124     "\x0e\x03\x0c\x2e\xac\xf4\xdb\x60\x39\x40\x3e\x12\xc7\x40\xe7\xc9"
    125     "\x54\x6f\xf2\xea\x55\xcb\x40\x40\x58\xec\xc0\xeb\x90\x88\x8c\xbc"
    126     "\xcf\x05\x88\x25\x90\x79\x18\xc0\x01\x06\x42\x8e\x48\x50\x27\xf0"
    127     "\x8a\x74\x69\xea\xa1\xf2\x71\xf5\xe5\xd6\xba\xcb\xe6\x3d\xc7\x9c"
    128     "\x11"
    129      "\x02\x81\x81"              /* INTEGER, offset 930, length 129 */
    130     "\x00\xc9\xf5\x04\xad\x34\xe9\x39\xdc\x83\x97\xb6\x3a\x40\xf8\x60"
    131     "\x4b\x69\xec\xf0\x5f\xf3\x88\x69\xcd\xbe\xed\x3c\xc5\x14\x5c\x0c"
    132     "\x54\x2b\xf4\xda\xc6\xc0\x70\x36\xe4\x67\x41\x00\xb7\xc7\x17\x9e"
    133     "\x05\x63\x01\x6d\x77\x06\x71\x24\xcf\x32\x01\xe2\x51\xed\x5e\x90"
    134     "\x38\xed\x4a\xa1\xfb\xb1\x8c\x69\xf4\x08\x96\xef\x0a\x20\x8b\x6c"
    135     "\x77\x85\x33\x92\x9a\xff\x95\xba\x8c\xcd\xa7\x89\xc2\x46\x00\x21"
    136     "\xf3\xd1\xfb\x12\x34\x0c\x99\x8d\x38\xb1\x3b\x66\x5a\x9d\x70\xce"
    137     "\xab\xf3\xe1\xe5\x40\x05\xed\x97\x3d\xd1\x82\x6e\x07\x02\xc0\x8f"
    138     "\x4d"
    139     "\x02\x81\x81"              /* INTEGER, offset 1062, length 129 */
    140     "\x00\xe4\x96\x79\xa8\x6a\x70\xdd\x67\x42\xff\x15\x11\x9e\x01\x71"
    141     "\xac\xf1\x70\x7d\x87\xe2\x6e\x0c\x4d\xbb\x21\x15\xbb\xa7\x4e\x0c"
    142     "\x09\x7e\x82\xca\x91\xbe\xd0\xdd\x9c\x8c\xb0\x77\x64\x30\x1b\x7e"
    143     "\xbb\x69\xcb\x4c\xde\xd6\x6a\xb9\x72\x15\x79\xdc\x05\x99\x69\x8b"
    144     "\x24\xa1\xad\x13\x35\x31\xc0\x0b\xf1\xd2\x06\x7c\x94\x1a\x21\x2f"
    145     "\x02\xb9\xf0\xd0\xbb\xf7\xb7\x78\xf9\x3d\x76\x60\xd6\x6b\x5f\x35"
    146     "\x88\x14\x33\xe6\xbc\xca\x6b\x88\x90\x57\x3b\x0c\xa3\x6e\x47\xdf"
    147     "\x4e\x2f\x4c\xf9\xab\x97\x38\xe4\x20\x32\x32\x96\xc8\x9e\x79\xd3"
    148     "\x12";
    149 
    150 static const uint8_t test_ecdsa_p192_priv_key[] =
    151     "\x30\x53"               /* SEQUENCE, offset 0, length 83 */
    152     "\x02\x01\x01"           /* INTEGER, offset 2, length 1 */
    153     "\x04\x18"               /* OCTET STRING, offset 5, length 24 */
    154     "\xcb\xc8\x86\x0e\x66\x3c\xf7\x5a\x44\x13\xb8\xef\xea\x1d\x7b\xa6"
    155     "\x1c\xda\xf4\x1b\xc7\x67\x6b\x35"
    156     "\xa1\x34"               /* CONTEXT SPECIFIC 1, offset 31, length 52 */
    157     "\x03\x32"               /* BIT STRING, offset 33, length 50 */
    158     "\x00\x04\xc4\x16\xb3\xff\xac\xd5\x87\x98\xf7\xd9\x45\xfe\xd3\x5c"
    159     "\x17\x9d\xb2\x36\x22\xcc\x07\xb3\x6d\x3c\x4e\x04\x5f\xeb\xb6\x52"
    160     "\x58\xfb\x36\x10\x52\xb7\x01\x62\x0e\x94\x51\x1d\xe2\xef\x10\x82"
    161     "\x88\x78";
    162 
    163 static const uint8_t test_ecdsa_p256_priv_key[] =
    164     "\x30\x77"              /* SEQUENCE, offset 0, length 119 */
    165     "\x02\x01\x01"          /* INTEGER, offset 2, length 1 */
    166     "\x04\x20"              /* OCTET STRING, offset 5, length 32 */
    167     "\xf6\x92\xdd\x29\x1c\x6e\xef\xb6\xb2\x73\x9f\x40\x1b\xb3\x2a\x28"
    168     "\xd2\x37\xd6\x4a\x5b\xe4\x40\x4c\x6a\x95\x99\xfa\xf7\x92\x49\xbe"
    169     "\xa0\x0a"              /* CONTEXT SPECIFIC 0, offset 39, length 10 */
    170     "\x06\x08"              /* OID, offset 41, length 8 */
    171     "\x2a\x86\x48\xce\x3d\x03\x01\x07"
    172     "\xa1\x44"              /* CONTEXT SPECIFIC 1, offset 51, length 68 */
    173     "\x03\x42"              /* BIT STRING, offset 53, length 66 */
    174     "\x00\x04\xed\x42\x9c\x67\x79\xbe\x46\x83\x88\x3e\x8c\xc1\x33\xf3"
    175     "\xc3\xf6\x2c\xf3\x13\x6a\x00\xc2\xc9\x3e\x87\x7f\x86\x39\xe6\xae"
    176     "\xe3\xb9\xba\x2f\x58\x63\x32\x62\x62\x54\x07\x27\xf9\x5a\x3a\xc7"
    177     "\x3a\x6b\x5b\xbc\x0d\x33\xba\xbb\xd4\xa3\xff\x4f\x9e\xdd\xf5\x59"
    178     "\xc0\xf6";
    179 
    180 #define MAX_CHECKER_COUNT 32
    181 
    182 static int qcrypto_wrapped_decode_ctx_tag0(const uint8_t **data, size_t *dlen,
    183                                            QCryptoDERDecodeCb cb, void *opaque,
    184                                            Error **errp)
    185 {
    186    return qcrypto_der_decode_ctx_tag(data, dlen, 0, cb, opaque, errp);
    187 }
    188 
    189 static int qcrypto_wrapped_decode_ctx_tag1(const uint8_t **data, size_t *dlen,
    190                                            QCryptoDERDecodeCb cb, void *opaque,
    191                                            Error **errp)
    192 {
    193    return qcrypto_der_decode_ctx_tag(data, dlen, 1, cb, opaque, errp);
    194 }
    195 
    196 typedef struct QCryptoAns1DecoderResultChecker QCryptoAns1DecoderResultChecker;
    197 struct QCryptoAns1DecoderResultChecker {
    198     int (*action) (const uint8_t **data, size_t *dlen,
    199                    QCryptoDERDecodeCb cb, void *opaque, Error **errp);
    200     QCryptoDERDecodeCb cb;
    201     bool constructed;
    202     const uint8_t *exp_value;
    203     size_t exp_vlen;
    204 };
    205 
    206 typedef struct QCryptoAns1DecoderTestData QCryptoAns1DecoderTestData;
    207 struct QCryptoAns1DecoderTestData {
    208     const char *path;
    209     const uint8_t *test_data;
    210     size_t test_data_len;
    211     QCryptoAns1DecoderResultChecker checker[MAX_CHECKER_COUNT];
    212 };
    213 
    214 typedef struct QCryptoAns1DecoderTestContext QCryptoAns1DecoderTestContext;
    215 struct QCryptoAns1DecoderTestContext {
    216     const uint8_t *data;
    217     size_t dlen;
    218 };
    219 
    220 static int checker_callback(void *opaque, const uint8_t *value,
    221                             size_t vlen, Error **errp)
    222 {
    223     QCryptoAns1DecoderResultChecker *checker =
    224         (QCryptoAns1DecoderResultChecker *)opaque;
    225 
    226     g_assert(value == checker->exp_value);
    227     g_assert(vlen == checker->exp_vlen);
    228     return 0;
    229 }
    230 
    231 static void test_ans1(const void *opaque)
    232 {
    233     const QCryptoAns1DecoderTestData *test_data =
    234         (QCryptoAns1DecoderTestData *)opaque;
    235     QCryptoAns1DecoderTestContext ctx[MAX_CHECKER_COUNT];
    236     int seq_depth = 0, checker_idx = 0;
    237     ctx[seq_depth].data = test_data->test_data;
    238     ctx[seq_depth].dlen = test_data->test_data_len;
    239     bool all_checker_completed = false;
    240 
    241     do {
    242         const QCryptoAns1DecoderResultChecker *checker =
    243             &test_data->checker[checker_idx++];
    244         QCryptoAns1DecoderTestContext *c = &ctx[seq_depth];
    245         if (!checker->action) {
    246             all_checker_completed = true;
    247             break;
    248         }
    249         g_assert(checker->action(&c->data, &c->dlen, checker_callback,
    250                                  (void *)checker, &error_abort)
    251             == checker->exp_vlen);
    252         if (checker->constructed) {
    253             ++seq_depth;
    254             ctx[seq_depth].data = checker->exp_value;
    255             ctx[seq_depth].dlen = checker->exp_vlen;
    256         }
    257         while (seq_depth != 0 && ctx[seq_depth].dlen == 0) {
    258             --seq_depth;
    259         }
    260 
    261     } while (true);
    262     g_assert(seq_depth == 0);
    263     g_assert(ctx[seq_depth].dlen == 0);
    264     g_assert(all_checker_completed);
    265 }
    266 
    267 static QCryptoAns1DecoderTestData test_data[] = {
    268 {
    269     .path = "/crypto/der/parse-rsa512-priv-key",
    270     .test_data = test_rsa512_priv_key,
    271     .test_data_len = sizeof(test_rsa512_priv_key) - 1,
    272     .checker = {
    273         { qcrypto_der_decode_seq, checker_callback, true,
    274           test_rsa512_priv_key + 4, 313 },
    275         { qcrypto_der_decode_int, checker_callback, false,
    276           test_rsa512_priv_key + 4 + 2, 1 },
    277         { qcrypto_der_decode_int, checker_callback, false,
    278           test_rsa512_priv_key + 7 + 2, 65 },
    279         { qcrypto_der_decode_int, checker_callback, false,
    280           test_rsa512_priv_key + 74 + 2, 3 },
    281         { qcrypto_der_decode_int, checker_callback, false,
    282           test_rsa512_priv_key + 79 + 2, 64 },
    283         { qcrypto_der_decode_int, checker_callback, false,
    284           test_rsa512_priv_key + 145 + 2, 33 },
    285         { qcrypto_der_decode_int, checker_callback, false,
    286           test_rsa512_priv_key + 180 + 2, 33 },
    287         { qcrypto_der_decode_int, checker_callback, false,
    288           test_rsa512_priv_key + 215 + 2, 32 },
    289         { qcrypto_der_decode_int, checker_callback, false,
    290           test_rsa512_priv_key + 249 + 2, 32 },
    291         { qcrypto_der_decode_int, checker_callback, false,
    292           test_rsa512_priv_key + 283 + 2, 32 },
    293     },
    294 },
    295 {
    296     .path = "/crypto/der/parse-rsa2048-priv-key",
    297     .test_data = test_rsa2048_priv_key,
    298     .test_data_len = sizeof(test_rsa2048_priv_key) - 1,
    299     .checker = {
    300         { qcrypto_der_decode_seq, checker_callback, true,
    301           test_rsa2048_priv_key + 4, 1190 },
    302         { qcrypto_der_decode_int, checker_callback, false,
    303           test_rsa2048_priv_key + 4 + 2, 1 },
    304         { qcrypto_der_decode_int, checker_callback, false,
    305           test_rsa2048_priv_key + 7 + 4, 257 },
    306         { qcrypto_der_decode_int, checker_callback, false,
    307           test_rsa2048_priv_key + 268 + 2, 3 },
    308         { qcrypto_der_decode_int, checker_callback, false,
    309           test_rsa2048_priv_key + 273 + 4, 257 },
    310         { qcrypto_der_decode_int, checker_callback, false,
    311           test_rsa2048_priv_key + 534 + 3, 129 },
    312         { qcrypto_der_decode_int, checker_callback, false,
    313           test_rsa2048_priv_key + 666 + 3, 129 },
    314         { qcrypto_der_decode_int, checker_callback, false,
    315           test_rsa2048_priv_key + 798 + 3, 129 },
    316         { qcrypto_der_decode_int, checker_callback, false,
    317           test_rsa2048_priv_key + 930 + 3, 129 },
    318         { qcrypto_der_decode_int, checker_callback, false,
    319           test_rsa2048_priv_key + 1062 + 3, 129 },
    320     },
    321 },
    322 {
    323     .path = "/crypto/der/parse-ecdsa-p192-priv-key",
    324     .test_data = test_ecdsa_p192_priv_key,
    325     .test_data_len = sizeof(test_ecdsa_p192_priv_key) - 1,
    326     .checker = {
    327         { qcrypto_der_decode_seq, checker_callback, true,
    328           test_ecdsa_p192_priv_key + 2, 83 },
    329         { qcrypto_der_decode_int, checker_callback, false,
    330           test_ecdsa_p192_priv_key + 2 + 2, 1 },
    331         { qcrypto_der_decode_octet_str, checker_callback, false,
    332           test_ecdsa_p192_priv_key + 5 + 2, 24 },
    333         { qcrypto_wrapped_decode_ctx_tag1, checker_callback, true,
    334           test_ecdsa_p192_priv_key + 31 + 2, 52 },
    335         { qcrypto_der_decode_bit_str , checker_callback, false,
    336           test_ecdsa_p192_priv_key + 33 + 2, 50 },
    337     },
    338 },
    339 {
    340     .path = "/crypto/der/parse-ecdsa-p256-priv-key",
    341     .test_data = test_ecdsa_p256_priv_key,
    342     .test_data_len = sizeof(test_ecdsa_p256_priv_key) - 1,
    343     .checker = {
    344         { qcrypto_der_decode_seq, checker_callback, true,
    345           test_ecdsa_p256_priv_key + 2, 119 },
    346         { qcrypto_der_decode_int, checker_callback, false,
    347           test_ecdsa_p256_priv_key + 2 + 2, 1 },
    348         { qcrypto_der_decode_octet_str, checker_callback, false,
    349           test_ecdsa_p256_priv_key + 5 + 2, 32 },
    350         { qcrypto_wrapped_decode_ctx_tag0, checker_callback, true,
    351           test_ecdsa_p256_priv_key + 39 + 2, 10 },
    352         { qcrypto_der_decode_oid, checker_callback, false,
    353           test_ecdsa_p256_priv_key + 41 + 2, 8 },
    354         { qcrypto_wrapped_decode_ctx_tag1, checker_callback, true,
    355           test_ecdsa_p256_priv_key + 51 + 2, 68 },
    356         { qcrypto_der_decode_bit_str , checker_callback, false,
    357           test_ecdsa_p256_priv_key + 53 + 2, 66 },
    358     },
    359 },
    360 };
    361 
    362 int main(int argc, char **argv)
    363 {
    364     size_t i;
    365     g_test_init(&argc, &argv, NULL);
    366 
    367     for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
    368         g_test_add_data_func(test_data[i].path, &test_data[i], test_ans1);
    369     }
    370 
    371     return g_test_run();
    372 }