1 | /*
|
---|
2 | * Copyright 2007-2023 The OpenSSL Project Authors. All Rights Reserved.
|
---|
3 | * Copyright Nokia 2007-2019
|
---|
4 | * Copyright Siemens AG 2015-2019
|
---|
5 | *
|
---|
6 | * Licensed under the Apache License 2.0 (the "License"). You may not use
|
---|
7 | * this file except in compliance with the License. You can obtain a copy
|
---|
8 | * in the file LICENSE in the source distribution or at
|
---|
9 | * https://www.openssl.org/source/license.html
|
---|
10 | */
|
---|
11 |
|
---|
12 | #include "helpers/cmp_testlib.h"
|
---|
13 | #include "../crypto/crmf/crmf_local.h" /* for manipulating POPO signature */
|
---|
14 |
|
---|
15 | static const char *server_f;
|
---|
16 | static const char *client_f;
|
---|
17 | static const char *endentity1_f;
|
---|
18 | static const char *endentity2_f;
|
---|
19 | static const char *root_f;
|
---|
20 | static const char *intermediate_f;
|
---|
21 | static const char *ir_protected_f;
|
---|
22 | static const char *ir_unprotected_f;
|
---|
23 | static const char *ir_rmprotection_f;
|
---|
24 | static const char *ip_waiting_f;
|
---|
25 | static const char *instacert_f;
|
---|
26 | static const char *instaca_f;
|
---|
27 | static const char *ir_protected_0_extracerts;
|
---|
28 | static const char *ir_protected_2_extracerts;
|
---|
29 |
|
---|
30 | typedef struct test_fixture {
|
---|
31 | const char *test_case_name;
|
---|
32 | int expected;
|
---|
33 | OSSL_CMP_CTX *cmp_ctx;
|
---|
34 | OSSL_CMP_MSG *msg;
|
---|
35 | X509 *cert;
|
---|
36 | ossl_cmp_allow_unprotected_cb_t allow_unprotected_cb;
|
---|
37 | int additional_arg;
|
---|
38 | } CMP_VFY_TEST_FIXTURE;
|
---|
39 |
|
---|
40 | static OSSL_LIB_CTX *libctx = NULL;
|
---|
41 | static OSSL_PROVIDER *default_null_provider = NULL, *provider = NULL;
|
---|
42 |
|
---|
43 | static void tear_down(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
44 | {
|
---|
45 | OSSL_CMP_MSG_free(fixture->msg);
|
---|
46 | OSSL_CMP_CTX_free(fixture->cmp_ctx);
|
---|
47 | OPENSSL_free(fixture);
|
---|
48 | }
|
---|
49 |
|
---|
50 | static time_t test_time_valid = 0, test_time_after_expiration = 0;
|
---|
51 |
|
---|
52 | static CMP_VFY_TEST_FIXTURE *set_up(const char *const test_case_name)
|
---|
53 | {
|
---|
54 | X509_STORE *ts;
|
---|
55 | CMP_VFY_TEST_FIXTURE *fixture;
|
---|
56 |
|
---|
57 | if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture))))
|
---|
58 | return NULL;
|
---|
59 |
|
---|
60 | ts = X509_STORE_new();
|
---|
61 | fixture->test_case_name = test_case_name;
|
---|
62 | if (ts == NULL
|
---|
63 | || !TEST_ptr(fixture->cmp_ctx = OSSL_CMP_CTX_new(libctx, NULL))
|
---|
64 | || !OSSL_CMP_CTX_set0_trusted(fixture->cmp_ctx, ts)
|
---|
65 | || !OSSL_CMP_CTX_set_log_cb(fixture->cmp_ctx, print_to_bio_out)) {
|
---|
66 | tear_down(fixture);
|
---|
67 | X509_STORE_free(ts);
|
---|
68 | return NULL;
|
---|
69 | }
|
---|
70 | X509_VERIFY_PARAM_set_time(X509_STORE_get0_param(ts), test_time_valid);
|
---|
71 | X509_STORE_set_verify_cb(ts, X509_STORE_CTX_print_verify_cb);
|
---|
72 | return fixture;
|
---|
73 | }
|
---|
74 |
|
---|
75 | static X509 *srvcert = NULL;
|
---|
76 | static X509 *clcert = NULL;
|
---|
77 | /* chain */
|
---|
78 | static X509 *endentity1 = NULL, *endentity2 = NULL,
|
---|
79 | *intermediate = NULL, *root = NULL;
|
---|
80 | /* INSTA chain */
|
---|
81 | static X509 *insta_cert = NULL, *instaca_cert = NULL;
|
---|
82 |
|
---|
83 | static unsigned char rand_data[OSSL_CMP_TRANSACTIONID_LENGTH];
|
---|
84 | static OSSL_CMP_MSG *ir_unprotected, *ir_rmprotection;
|
---|
85 |
|
---|
86 | /* secret value used for IP_waitingStatus_PBM.der */
|
---|
87 | static const unsigned char sec_1[] = {
|
---|
88 | '9', 'p', 'p', '8', '-', 'b', '3', '5', 'i', '-', 'X', 'd', '3',
|
---|
89 | 'Q', '-', 'u', 'd', 'N', 'R'
|
---|
90 | };
|
---|
91 |
|
---|
92 | static int flip_bit(ASN1_BIT_STRING *bitstr)
|
---|
93 | {
|
---|
94 | int bit_num = 7;
|
---|
95 | int bit = ASN1_BIT_STRING_get_bit(bitstr, bit_num);
|
---|
96 |
|
---|
97 | return ASN1_BIT_STRING_set_bit(bitstr, bit_num, !bit);
|
---|
98 | }
|
---|
99 |
|
---|
100 | static int execute_verify_popo_test(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
101 | {
|
---|
102 | if ((fixture->msg = load_pkimsg(ir_protected_f, libctx)) == NULL)
|
---|
103 | return 0;
|
---|
104 | if (fixture->expected == 0) {
|
---|
105 | const OSSL_CRMF_MSGS *reqs = fixture->msg->body->value.ir;
|
---|
106 | const OSSL_CRMF_MSG *req = sk_OSSL_CRMF_MSG_value(reqs, 0);
|
---|
107 |
|
---|
108 | if (req == NULL || !flip_bit(req->popo->value.signature->signature))
|
---|
109 | return 0;
|
---|
110 | }
|
---|
111 | return TEST_int_eq(fixture->expected,
|
---|
112 | ossl_cmp_verify_popo(fixture->cmp_ctx, fixture->msg,
|
---|
113 | fixture->additional_arg));
|
---|
114 | }
|
---|
115 |
|
---|
116 | static int test_verify_popo(void)
|
---|
117 | {
|
---|
118 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
119 | fixture->expected = 1;
|
---|
120 | EXECUTE_TEST(execute_verify_popo_test, tear_down);
|
---|
121 | return result;
|
---|
122 | }
|
---|
123 |
|
---|
124 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
125 | static int test_verify_popo_bad(void)
|
---|
126 | {
|
---|
127 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
128 | fixture->expected = 0;
|
---|
129 | EXECUTE_TEST(execute_verify_popo_test, tear_down);
|
---|
130 | return result;
|
---|
131 | }
|
---|
132 | #endif
|
---|
133 |
|
---|
134 | /* indirectly checks also OSSL_CMP_validate_msg() */
|
---|
135 | static int execute_validate_msg_test(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
136 | {
|
---|
137 | int res = TEST_int_eq(fixture->expected,
|
---|
138 | ossl_cmp_msg_check_update(fixture->cmp_ctx,
|
---|
139 | fixture->msg, NULL, 0));
|
---|
140 | X509 *validated = OSSL_CMP_CTX_get0_validatedSrvCert(fixture->cmp_ctx);
|
---|
141 |
|
---|
142 | return res && (!fixture->expected || TEST_ptr_eq(validated, fixture->cert));
|
---|
143 | }
|
---|
144 |
|
---|
145 | static int execute_validate_cert_path_test(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
146 | {
|
---|
147 | X509_STORE *ts = OSSL_CMP_CTX_get0_trusted(fixture->cmp_ctx);
|
---|
148 | int res = TEST_int_eq(fixture->expected,
|
---|
149 | OSSL_CMP_validate_cert_path(fixture->cmp_ctx,
|
---|
150 | ts, fixture->cert));
|
---|
151 |
|
---|
152 | OSSL_CMP_CTX_print_errors(fixture->cmp_ctx);
|
---|
153 | return res;
|
---|
154 | }
|
---|
155 |
|
---|
156 | static int test_validate_msg_mac_alg_protection(int miss, int wrong)
|
---|
157 | {
|
---|
158 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
159 | fixture->cert = NULL;
|
---|
160 |
|
---|
161 | fixture->expected = !miss && !wrong;
|
---|
162 | if (!TEST_true(miss ? OSSL_CMP_CTX_set0_trusted(fixture->cmp_ctx, NULL)
|
---|
163 | : OSSL_CMP_CTX_set1_secretValue(fixture->cmp_ctx, sec_1,
|
---|
164 | wrong ? 4 : sizeof(sec_1)))
|
---|
165 | || !TEST_ptr(fixture->msg = load_pkimsg(ip_waiting_f, libctx))) {
|
---|
166 | tear_down(fixture);
|
---|
167 | fixture = NULL;
|
---|
168 | }
|
---|
169 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
170 | return result;
|
---|
171 | }
|
---|
172 |
|
---|
173 | static int test_validate_msg_mac_alg_protection_ok(void)
|
---|
174 | {
|
---|
175 | return test_validate_msg_mac_alg_protection(0, 0);
|
---|
176 | }
|
---|
177 |
|
---|
178 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
179 | static int test_validate_msg_mac_alg_protection_missing(void)
|
---|
180 | {
|
---|
181 | return test_validate_msg_mac_alg_protection(1, 0);
|
---|
182 | }
|
---|
183 |
|
---|
184 | static int test_validate_msg_mac_alg_protection_wrong(void)
|
---|
185 | {
|
---|
186 | return test_validate_msg_mac_alg_protection(0, 1);
|
---|
187 | }
|
---|
188 |
|
---|
189 | static int test_validate_msg_mac_alg_protection_bad(void)
|
---|
190 | {
|
---|
191 | const unsigned char sec_bad[] = {
|
---|
192 | '9', 'p', 'p', '8', '-', 'b', '3', '5', 'i', '-', 'X', 'd', '3',
|
---|
193 | 'Q', '-', 'u', 'd', 'N', 'r'
|
---|
194 | };
|
---|
195 |
|
---|
196 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
197 | fixture->cert = NULL;
|
---|
198 | fixture->expected = 0;
|
---|
199 |
|
---|
200 | if (!TEST_true(OSSL_CMP_CTX_set1_secretValue(fixture->cmp_ctx, sec_bad,
|
---|
201 | sizeof(sec_bad)))
|
---|
202 | || !TEST_ptr(fixture->msg = load_pkimsg(ip_waiting_f, libctx))) {
|
---|
203 | tear_down(fixture);
|
---|
204 | fixture = NULL;
|
---|
205 | }
|
---|
206 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
207 | return result;
|
---|
208 | }
|
---|
209 | #endif
|
---|
210 |
|
---|
211 | static int add_trusted(OSSL_CMP_CTX *ctx, X509 *cert)
|
---|
212 | {
|
---|
213 | return X509_STORE_add_cert(OSSL_CMP_CTX_get0_trusted(ctx), cert);
|
---|
214 | }
|
---|
215 |
|
---|
216 | static int add_untrusted(OSSL_CMP_CTX *ctx, X509 *cert)
|
---|
217 | {
|
---|
218 | return X509_add_cert(OSSL_CMP_CTX_get0_untrusted(ctx), cert,
|
---|
219 | X509_ADD_FLAG_UP_REF);
|
---|
220 | }
|
---|
221 |
|
---|
222 | static int test_validate_msg_signature_partial_chain(int expired)
|
---|
223 | {
|
---|
224 | X509_STORE *ts;
|
---|
225 |
|
---|
226 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
227 | fixture->cert = srvcert;
|
---|
228 |
|
---|
229 | ts = OSSL_CMP_CTX_get0_trusted(fixture->cmp_ctx);
|
---|
230 | fixture->expected = !expired;
|
---|
231 | if (ts == NULL
|
---|
232 | || !TEST_ptr(fixture->msg = load_pkimsg(ir_protected_f, libctx))
|
---|
233 | || !add_trusted(fixture->cmp_ctx, srvcert)) {
|
---|
234 | tear_down(fixture);
|
---|
235 | fixture = NULL;
|
---|
236 | } else {
|
---|
237 | X509_VERIFY_PARAM *vpm = X509_STORE_get0_param(ts);
|
---|
238 |
|
---|
239 | X509_VERIFY_PARAM_set_flags(vpm, X509_V_FLAG_PARTIAL_CHAIN);
|
---|
240 | if (expired)
|
---|
241 | X509_VERIFY_PARAM_set_time(vpm, test_time_after_expiration);
|
---|
242 | }
|
---|
243 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
244 | return result;
|
---|
245 | }
|
---|
246 |
|
---|
247 | static int test_validate_msg_signature_trusted_ok(void)
|
---|
248 | {
|
---|
249 | return test_validate_msg_signature_partial_chain(0);
|
---|
250 | }
|
---|
251 |
|
---|
252 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
253 | static int test_validate_msg_signature_trusted_expired(void)
|
---|
254 | {
|
---|
255 | return test_validate_msg_signature_partial_chain(1);
|
---|
256 | }
|
---|
257 | #endif
|
---|
258 |
|
---|
259 | static int test_validate_msg_signature_srvcert(int bad_sig, int miss, int wrong)
|
---|
260 | {
|
---|
261 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
262 | fixture->cert = srvcert;
|
---|
263 | fixture->expected = !bad_sig && !wrong && !miss;
|
---|
264 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_f, libctx))
|
---|
265 | || !TEST_true(miss ? OSSL_CMP_CTX_set1_secretValue(fixture->cmp_ctx,
|
---|
266 | sec_1, sizeof(sec_1))
|
---|
267 | : OSSL_CMP_CTX_set1_srvCert(fixture->cmp_ctx,
|
---|
268 | wrong? clcert : srvcert))
|
---|
269 | || (bad_sig && !flip_bit(fixture->msg->protection))) {
|
---|
270 | tear_down(fixture);
|
---|
271 | fixture = NULL;
|
---|
272 | }
|
---|
273 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
274 | return result;
|
---|
275 | }
|
---|
276 |
|
---|
277 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
278 | static int test_validate_msg_signature_srvcert_missing(void)
|
---|
279 | {
|
---|
280 | return test_validate_msg_signature_srvcert(0, 1, 0);
|
---|
281 | }
|
---|
282 | #endif
|
---|
283 |
|
---|
284 | static int test_validate_msg_signature_srvcert_wrong(void)
|
---|
285 | {
|
---|
286 | return test_validate_msg_signature_srvcert(0, 0, 1);
|
---|
287 | }
|
---|
288 |
|
---|
289 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
290 | static int test_validate_msg_signature_bad(void)
|
---|
291 | {
|
---|
292 | return test_validate_msg_signature_srvcert(1, 0, 0);
|
---|
293 | }
|
---|
294 | #endif
|
---|
295 |
|
---|
296 | static int test_validate_msg_signature_sender_cert_srvcert(void)
|
---|
297 | {
|
---|
298 | return test_validate_msg_signature_srvcert(0, 0, 0);
|
---|
299 | }
|
---|
300 |
|
---|
301 | static int test_validate_msg_signature_sender_cert_untrusted(void)
|
---|
302 | {
|
---|
303 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
304 | fixture->cert = insta_cert;
|
---|
305 | fixture->expected = 1;
|
---|
306 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_0_extracerts, libctx))
|
---|
307 | || !add_trusted(fixture->cmp_ctx, instaca_cert)
|
---|
308 | || !add_untrusted(fixture->cmp_ctx, insta_cert)) {
|
---|
309 | tear_down(fixture);
|
---|
310 | fixture = NULL;
|
---|
311 | }
|
---|
312 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
313 | return result;
|
---|
314 | }
|
---|
315 |
|
---|
316 | static int test_validate_msg_signature_sender_cert_trusted(void)
|
---|
317 | {
|
---|
318 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
319 | fixture->cert = insta_cert;
|
---|
320 | fixture->expected = 1;
|
---|
321 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_0_extracerts, libctx))
|
---|
322 | || !add_trusted(fixture->cmp_ctx, instaca_cert)
|
---|
323 | || !add_trusted(fixture->cmp_ctx, insta_cert)) {
|
---|
324 | tear_down(fixture);
|
---|
325 | fixture = NULL;
|
---|
326 | }
|
---|
327 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
328 | return result;
|
---|
329 | }
|
---|
330 |
|
---|
331 | static int test_validate_msg_signature_sender_cert_extracert(void)
|
---|
332 | {
|
---|
333 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
334 | fixture->expected = 1;
|
---|
335 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_2_extracerts, libctx))
|
---|
336 | || !add_trusted(fixture->cmp_ctx, instaca_cert)) {
|
---|
337 | tear_down(fixture);
|
---|
338 | fixture = NULL;
|
---|
339 | }
|
---|
340 | fixture->cert = sk_X509_value(fixture->msg->extraCerts, 1); /* Insta CA */
|
---|
341 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
342 | return result;
|
---|
343 | }
|
---|
344 |
|
---|
345 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
346 | static int test_validate_msg_signature_sender_cert_absent(void)
|
---|
347 | {
|
---|
348 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
349 | fixture->expected = 0;
|
---|
350 | if (!TEST_ptr(fixture->msg =
|
---|
351 | load_pkimsg(ir_protected_0_extracerts, libctx))) {
|
---|
352 | tear_down(fixture);
|
---|
353 | fixture = NULL;
|
---|
354 | }
|
---|
355 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
356 | return result;
|
---|
357 | }
|
---|
358 | #endif
|
---|
359 |
|
---|
360 | static int test_validate_with_sender(const X509_NAME *name, int expected)
|
---|
361 | {
|
---|
362 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
363 | fixture->cert = srvcert;
|
---|
364 | fixture->expected = expected;
|
---|
365 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_f, libctx))
|
---|
366 | || !TEST_true(OSSL_CMP_CTX_set1_expected_sender(fixture->cmp_ctx, name))
|
---|
367 | || !TEST_true(OSSL_CMP_CTX_set1_srvCert(fixture->cmp_ctx, srvcert))) {
|
---|
368 | tear_down(fixture);
|
---|
369 | fixture = NULL;
|
---|
370 | }
|
---|
371 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
372 | return result;
|
---|
373 | }
|
---|
374 |
|
---|
375 | static int test_validate_msg_signature_expected_sender(void)
|
---|
376 | {
|
---|
377 | return test_validate_with_sender(X509_get_subject_name(srvcert), 1);
|
---|
378 | }
|
---|
379 |
|
---|
380 | static int test_validate_msg_signature_unexpected_sender(void)
|
---|
381 | {
|
---|
382 | return test_validate_with_sender(X509_get_subject_name(root), 0);
|
---|
383 | }
|
---|
384 |
|
---|
385 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
386 | static int test_validate_msg_unprotected_request(void)
|
---|
387 | {
|
---|
388 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
389 | fixture->expected = 0;
|
---|
390 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_unprotected_f, libctx))) {
|
---|
391 | tear_down(fixture);
|
---|
392 | fixture = NULL;
|
---|
393 | }
|
---|
394 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
395 | return result;
|
---|
396 | }
|
---|
397 | #endif
|
---|
398 |
|
---|
399 | static void setup_path(CMP_VFY_TEST_FIXTURE **fixture, X509 *wrong, int expired)
|
---|
400 | {
|
---|
401 | (*fixture)->cert = endentity2;
|
---|
402 | (*fixture)->expected = wrong == NULL && !expired;
|
---|
403 | if (expired) {
|
---|
404 | X509_STORE *ts = OSSL_CMP_CTX_get0_trusted((*fixture)->cmp_ctx);
|
---|
405 | X509_VERIFY_PARAM *vpm = X509_STORE_get0_param(ts);
|
---|
406 |
|
---|
407 | X509_VERIFY_PARAM_set_time(vpm, test_time_after_expiration);
|
---|
408 | }
|
---|
409 | if (!add_trusted((*fixture)->cmp_ctx, wrong == NULL ? root : wrong)
|
---|
410 | || !add_untrusted((*fixture)->cmp_ctx, endentity1)
|
---|
411 | || !add_untrusted((*fixture)->cmp_ctx, intermediate)) {
|
---|
412 | tear_down((*fixture));
|
---|
413 | (*fixture) = NULL;
|
---|
414 | }
|
---|
415 | }
|
---|
416 |
|
---|
417 | static int test_validate_cert_path_ok(void)
|
---|
418 | {
|
---|
419 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
420 | setup_path(&fixture, NULL, 0);
|
---|
421 | EXECUTE_TEST(execute_validate_cert_path_test, tear_down);
|
---|
422 | return result;
|
---|
423 | }
|
---|
424 |
|
---|
425 | static int test_validate_cert_path_wrong_anchor(void)
|
---|
426 | {
|
---|
427 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
428 | setup_path(&fixture, srvcert /* wrong/non-root cert */, 0);
|
---|
429 | EXECUTE_TEST(execute_validate_cert_path_test, tear_down);
|
---|
430 | return result;
|
---|
431 | }
|
---|
432 |
|
---|
433 | static int test_validate_cert_path_expired(void)
|
---|
434 | {
|
---|
435 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
436 | setup_path(&fixture, NULL, 1);
|
---|
437 | EXECUTE_TEST(execute_validate_cert_path_test, tear_down);
|
---|
438 | return result;
|
---|
439 | }
|
---|
440 |
|
---|
441 | static int execute_msg_check_test(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
442 | {
|
---|
443 | const OSSL_CMP_PKIHEADER *hdr = OSSL_CMP_MSG_get0_header(fixture->msg);
|
---|
444 | const ASN1_OCTET_STRING *tid = OSSL_CMP_HDR_get0_transactionID(hdr);
|
---|
445 |
|
---|
446 | if (!TEST_int_eq(fixture->expected,
|
---|
447 | ossl_cmp_msg_check_update(fixture->cmp_ctx,
|
---|
448 | fixture->msg,
|
---|
449 | fixture->allow_unprotected_cb,
|
---|
450 | fixture->additional_arg)))
|
---|
451 | return 0;
|
---|
452 |
|
---|
453 | if (fixture->expected == 0) /* error expected already during above check */
|
---|
454 | return 1;
|
---|
455 | return
|
---|
456 | TEST_int_eq(0,
|
---|
457 | ASN1_OCTET_STRING_cmp(ossl_cmp_hdr_get0_senderNonce(hdr),
|
---|
458 | fixture->cmp_ctx->recipNonce))
|
---|
459 | && TEST_int_eq(0,
|
---|
460 | ASN1_OCTET_STRING_cmp(tid,
|
---|
461 | fixture->cmp_ctx->transactionID));
|
---|
462 | }
|
---|
463 |
|
---|
464 | static int allow_unprotected(const OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *msg,
|
---|
465 | int invalid_protection, int allow)
|
---|
466 | {
|
---|
467 | return allow;
|
---|
468 | }
|
---|
469 |
|
---|
470 | static void setup_check_update(CMP_VFY_TEST_FIXTURE **fixture, int expected,
|
---|
471 | ossl_cmp_allow_unprotected_cb_t cb, int arg,
|
---|
472 | const unsigned char *trid_data,
|
---|
473 | const unsigned char *nonce_data)
|
---|
474 | {
|
---|
475 | OSSL_CMP_CTX *ctx = (*fixture)->cmp_ctx;
|
---|
476 | int nonce_len = OSSL_CMP_SENDERNONCE_LENGTH;
|
---|
477 |
|
---|
478 | (*fixture)->expected = expected;
|
---|
479 | (*fixture)->allow_unprotected_cb = cb;
|
---|
480 | (*fixture)->additional_arg = arg;
|
---|
481 | (*fixture)->msg = OSSL_CMP_MSG_dup(ir_rmprotection);
|
---|
482 | if ((*fixture)->msg == NULL
|
---|
483 | || (nonce_data != NULL
|
---|
484 | && !ossl_cmp_asn1_octet_string_set1_bytes(&ctx->senderNonce,
|
---|
485 | nonce_data, nonce_len))) {
|
---|
486 | tear_down((*fixture));
|
---|
487 | (*fixture) = NULL;
|
---|
488 | } else if (trid_data != NULL) {
|
---|
489 | ASN1_OCTET_STRING *trid = ASN1_OCTET_STRING_new();
|
---|
490 |
|
---|
491 | if (trid == NULL
|
---|
492 | || !ASN1_OCTET_STRING_set(trid, trid_data,
|
---|
493 | OSSL_CMP_TRANSACTIONID_LENGTH)
|
---|
494 | || !OSSL_CMP_CTX_set1_transactionID(ctx, trid)) {
|
---|
495 | tear_down((*fixture));
|
---|
496 | (*fixture) = NULL;
|
---|
497 | }
|
---|
498 | ASN1_OCTET_STRING_free(trid);
|
---|
499 | }
|
---|
500 | }
|
---|
501 |
|
---|
502 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
503 | static int test_msg_check_no_protection_no_cb(void)
|
---|
504 | {
|
---|
505 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
506 | setup_check_update(&fixture, 0, NULL, 0, NULL, NULL);
|
---|
507 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
508 | return result;
|
---|
509 | }
|
---|
510 |
|
---|
511 | static int test_msg_check_no_protection_restrictive_cb(void)
|
---|
512 | {
|
---|
513 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
514 | setup_check_update(&fixture, 0, allow_unprotected, 0, NULL, NULL);
|
---|
515 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
516 | return result;
|
---|
517 | }
|
---|
518 | #endif
|
---|
519 |
|
---|
520 | static int test_msg_check_no_protection_permissive_cb(void)
|
---|
521 | {
|
---|
522 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
523 | setup_check_update(&fixture, 1, allow_unprotected, 1, NULL, NULL);
|
---|
524 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
525 | return result;
|
---|
526 | }
|
---|
527 |
|
---|
528 | static int test_msg_check_transaction_id(void)
|
---|
529 | {
|
---|
530 | /* Transaction id belonging to CMP_IR_rmprotection.der */
|
---|
531 | const unsigned char trans_id[OSSL_CMP_TRANSACTIONID_LENGTH] = {
|
---|
532 | 0x39, 0xB6, 0x90, 0x28, 0xC4, 0xBC, 0x7A, 0xF6,
|
---|
533 | 0xBE, 0xC6, 0x4A, 0x88, 0x97, 0xA6, 0x95, 0x0B
|
---|
534 | };
|
---|
535 |
|
---|
536 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
537 | setup_check_update(&fixture, 1, allow_unprotected, 1, trans_id, NULL);
|
---|
538 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
539 | return result;
|
---|
540 | }
|
---|
541 |
|
---|
542 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
543 | static int test_msg_check_transaction_id_bad(void)
|
---|
544 | {
|
---|
545 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
546 | setup_check_update(&fixture, 0, allow_unprotected, 1, rand_data, NULL);
|
---|
547 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
548 | return result;
|
---|
549 | }
|
---|
550 | #endif
|
---|
551 |
|
---|
552 | static int test_msg_check_recipient_nonce(void)
|
---|
553 | {
|
---|
554 | /* Recipient nonce belonging to CMP_IP_ir_rmprotection.der */
|
---|
555 | const unsigned char rec_nonce[OSSL_CMP_SENDERNONCE_LENGTH] = {
|
---|
556 | 0x48, 0xF1, 0x71, 0x1F, 0xE5, 0xAF, 0x1C, 0x8B,
|
---|
557 | 0x21, 0x97, 0x5C, 0x84, 0x74, 0x49, 0xBA, 0x32
|
---|
558 | };
|
---|
559 |
|
---|
560 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
561 | setup_check_update(&fixture, 1, allow_unprotected, 1, NULL, rec_nonce);
|
---|
562 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
563 | return result;
|
---|
564 | }
|
---|
565 |
|
---|
566 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
567 | static int test_msg_check_recipient_nonce_bad(void)
|
---|
568 | {
|
---|
569 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
570 | setup_check_update(&fixture, 0, allow_unprotected, 1, NULL, rand_data);
|
---|
571 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
572 | return result;
|
---|
573 | }
|
---|
574 | #endif
|
---|
575 |
|
---|
576 | void cleanup_tests(void)
|
---|
577 | {
|
---|
578 | X509_free(srvcert);
|
---|
579 | X509_free(clcert);
|
---|
580 | X509_free(endentity1);
|
---|
581 | X509_free(endentity2);
|
---|
582 | X509_free(intermediate);
|
---|
583 | X509_free(root);
|
---|
584 | X509_free(insta_cert);
|
---|
585 | X509_free(instaca_cert);
|
---|
586 | OSSL_CMP_MSG_free(ir_unprotected);
|
---|
587 | OSSL_CMP_MSG_free(ir_rmprotection);
|
---|
588 | OSSL_PROVIDER_unload(default_null_provider);
|
---|
589 | OSSL_PROVIDER_unload(provider);
|
---|
590 | OSSL_LIB_CTX_free(libctx);
|
---|
591 | return;
|
---|
592 | }
|
---|
593 |
|
---|
594 | #define USAGE "server.crt client.crt " \
|
---|
595 | "EndEntity1.crt EndEntity2.crt " \
|
---|
596 | "Root_CA.crt Intermediate_CA.crt " \
|
---|
597 | "CMP_IR_protected.der CMP_IR_unprotected.der " \
|
---|
598 | "IP_waitingStatus_PBM.der IR_rmprotection.der " \
|
---|
599 | "insta.cert.pem insta_ca.cert.pem " \
|
---|
600 | "IR_protected_0_extraCerts.der " \
|
---|
601 | "IR_protected_2_extraCerts.der module_name [module_conf_file]\n"
|
---|
602 | OPT_TEST_DECLARE_USAGE(USAGE)
|
---|
603 |
|
---|
604 | int setup_tests(void)
|
---|
605 | {
|
---|
606 | /* Set test time stamps */
|
---|
607 | struct tm ts = { 0 };
|
---|
608 |
|
---|
609 | ts.tm_year = 2018 - 1900; /* 2018 */
|
---|
610 | ts.tm_mon = 1; /* February */
|
---|
611 | ts.tm_mday = 18; /* 18th */
|
---|
612 | test_time_valid = mktime(&ts); /* February 18th 2018 */
|
---|
613 | ts.tm_year += 10; /* February 18th 2028 */
|
---|
614 | test_time_after_expiration = mktime(&ts);
|
---|
615 |
|
---|
616 | if (!test_skip_common_options()) {
|
---|
617 | TEST_error("Error parsing test options\n");
|
---|
618 | return 0;
|
---|
619 | }
|
---|
620 |
|
---|
621 | RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH);
|
---|
622 | if (!TEST_ptr(server_f = test_get_argument(0))
|
---|
623 | || !TEST_ptr(client_f = test_get_argument(1))
|
---|
624 | || !TEST_ptr(endentity1_f = test_get_argument(2))
|
---|
625 | || !TEST_ptr(endentity2_f = test_get_argument(3))
|
---|
626 | || !TEST_ptr(root_f = test_get_argument(4))
|
---|
627 | || !TEST_ptr(intermediate_f = test_get_argument(5))
|
---|
628 | || !TEST_ptr(ir_protected_f = test_get_argument(6))
|
---|
629 | || !TEST_ptr(ir_unprotected_f = test_get_argument(7))
|
---|
630 | || !TEST_ptr(ip_waiting_f = test_get_argument(8))
|
---|
631 | || !TEST_ptr(ir_rmprotection_f = test_get_argument(9))
|
---|
632 | || !TEST_ptr(instacert_f = test_get_argument(10))
|
---|
633 | || !TEST_ptr(instaca_f = test_get_argument(11))
|
---|
634 | || !TEST_ptr(ir_protected_0_extracerts = test_get_argument(12))
|
---|
635 | || !TEST_ptr(ir_protected_2_extracerts = test_get_argument(13))) {
|
---|
636 | TEST_error("usage: cmp_vfy_test %s", USAGE);
|
---|
637 | return 0;
|
---|
638 | }
|
---|
639 |
|
---|
640 | if (!test_arg_libctx(&libctx, &default_null_provider, &provider, 14, USAGE))
|
---|
641 | return 0;
|
---|
642 |
|
---|
643 | /* Load certificates for cert chain */
|
---|
644 | if (!TEST_ptr(endentity1 = load_cert_pem(endentity1_f, libctx))
|
---|
645 | || !TEST_ptr(endentity2 = load_cert_pem(endentity2_f, libctx))
|
---|
646 | || !TEST_ptr(root = load_cert_pem(root_f, NULL))
|
---|
647 | || !TEST_ptr(intermediate = load_cert_pem(intermediate_f, libctx)))
|
---|
648 | goto err;
|
---|
649 |
|
---|
650 | if (!TEST_ptr(insta_cert = load_cert_pem(instacert_f, libctx))
|
---|
651 | || !TEST_ptr(instaca_cert = load_cert_pem(instaca_f, libctx)))
|
---|
652 | goto err;
|
---|
653 |
|
---|
654 | /* Load certificates for message validation */
|
---|
655 | if (!TEST_ptr(srvcert = load_cert_pem(server_f, libctx))
|
---|
656 | || !TEST_ptr(clcert = load_cert_pem(client_f, libctx)))
|
---|
657 | goto err;
|
---|
658 | if (!TEST_int_eq(1, RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH)))
|
---|
659 | goto err;
|
---|
660 | if (!TEST_ptr(ir_unprotected = load_pkimsg(ir_unprotected_f, libctx))
|
---|
661 | || !TEST_ptr(ir_rmprotection = load_pkimsg(ir_rmprotection_f,
|
---|
662 | libctx)))
|
---|
663 | goto err;
|
---|
664 |
|
---|
665 | /* Message validation tests */
|
---|
666 | ADD_TEST(test_verify_popo);
|
---|
667 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
668 | ADD_TEST(test_verify_popo_bad);
|
---|
669 | #endif
|
---|
670 | ADD_TEST(test_validate_msg_signature_trusted_ok);
|
---|
671 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
672 | ADD_TEST(test_validate_msg_signature_trusted_expired);
|
---|
673 | ADD_TEST(test_validate_msg_signature_srvcert_missing);
|
---|
674 | #endif
|
---|
675 | ADD_TEST(test_validate_msg_signature_srvcert_wrong);
|
---|
676 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
677 | ADD_TEST(test_validate_msg_signature_bad);
|
---|
678 | #endif
|
---|
679 | ADD_TEST(test_validate_msg_signature_sender_cert_srvcert);
|
---|
680 | ADD_TEST(test_validate_msg_signature_sender_cert_untrusted);
|
---|
681 | ADD_TEST(test_validate_msg_signature_sender_cert_trusted);
|
---|
682 | ADD_TEST(test_validate_msg_signature_sender_cert_extracert);
|
---|
683 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
684 | ADD_TEST(test_validate_msg_signature_sender_cert_absent);
|
---|
685 | #endif
|
---|
686 | ADD_TEST(test_validate_msg_signature_expected_sender);
|
---|
687 | ADD_TEST(test_validate_msg_signature_unexpected_sender);
|
---|
688 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
689 | ADD_TEST(test_validate_msg_unprotected_request);
|
---|
690 | #endif
|
---|
691 | ADD_TEST(test_validate_msg_mac_alg_protection_ok);
|
---|
692 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
693 | ADD_TEST(test_validate_msg_mac_alg_protection_missing);
|
---|
694 | ADD_TEST(test_validate_msg_mac_alg_protection_wrong);
|
---|
695 | ADD_TEST(test_validate_msg_mac_alg_protection_bad);
|
---|
696 | #endif
|
---|
697 |
|
---|
698 | /* Cert path validation tests */
|
---|
699 | ADD_TEST(test_validate_cert_path_ok);
|
---|
700 | ADD_TEST(test_validate_cert_path_expired);
|
---|
701 | ADD_TEST(test_validate_cert_path_wrong_anchor);
|
---|
702 |
|
---|
703 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
704 | ADD_TEST(test_msg_check_no_protection_no_cb);
|
---|
705 | ADD_TEST(test_msg_check_no_protection_restrictive_cb);
|
---|
706 | #endif
|
---|
707 | ADD_TEST(test_msg_check_no_protection_permissive_cb);
|
---|
708 | ADD_TEST(test_msg_check_transaction_id);
|
---|
709 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
710 | ADD_TEST(test_msg_check_transaction_id_bad);
|
---|
711 | #endif
|
---|
712 | ADD_TEST(test_msg_check_recipient_nonce);
|
---|
713 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
714 | ADD_TEST(test_msg_check_recipient_nonce_bad);
|
---|
715 | #endif
|
---|
716 |
|
---|
717 | return 1;
|
---|
718 |
|
---|
719 | err:
|
---|
720 | cleanup_tests();
|
---|
721 | return 0;
|
---|
722 |
|
---|
723 | }
|
---|