2017-10-19 19:44:10 +00:00
|
|
|
/*
|
|
|
|
* Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.
|
|
|
|
*
|
|
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include <openssl/opensslconf.h>
|
|
|
|
#include <openssl/crypto.h>
|
|
|
|
#include <openssl/ocsp.h>
|
|
|
|
#include <openssl/x509.h>
|
|
|
|
#include <openssl/asn1.h>
|
|
|
|
#include <openssl/pem.h>
|
|
|
|
|
|
|
|
#include "testutil.h"
|
|
|
|
|
|
|
|
static const char *certstr;
|
|
|
|
static const char *privkeystr;
|
|
|
|
|
2017-12-07 22:37:54 +00:00
|
|
|
#ifndef OPENSSL_NO_OCSP
|
2017-10-19 19:44:10 +00:00
|
|
|
static int get_cert_and_key(X509 **cert_out, EVP_PKEY **key_out)
|
|
|
|
{
|
|
|
|
BIO *certbio, *keybio;
|
|
|
|
X509 *cert = NULL;
|
|
|
|
EVP_PKEY *key = NULL;
|
|
|
|
|
|
|
|
if (!TEST_ptr(certbio = BIO_new_file(certstr, "r")))
|
|
|
|
return 0;
|
|
|
|
cert = PEM_read_bio_X509(certbio, NULL, NULL, NULL);
|
|
|
|
BIO_free(certbio);
|
|
|
|
if (!TEST_ptr(keybio = BIO_new_file(privkeystr, "r")))
|
|
|
|
goto end;
|
|
|
|
key = PEM_read_bio_PrivateKey(keybio, NULL, NULL, NULL);
|
|
|
|
BIO_free(keybio);
|
|
|
|
if (!TEST_ptr(cert) || !TEST_ptr(key))
|
|
|
|
goto end;
|
|
|
|
*cert_out = cert;
|
|
|
|
*key_out = key;
|
|
|
|
return 1;
|
|
|
|
end:
|
|
|
|
X509_free(cert);
|
|
|
|
EVP_PKEY_free(key);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static OCSP_BASICRESP *make_dummy_resp(void)
|
|
|
|
{
|
|
|
|
const unsigned char namestr[] = "openssl.example.com";
|
|
|
|
unsigned char keybytes[128] = {7};
|
|
|
|
OCSP_BASICRESP *bs = OCSP_BASICRESP_new();
|
2017-12-07 20:14:47 +00:00
|
|
|
OCSP_BASICRESP *bs_out = NULL;
|
|
|
|
OCSP_CERTID *cid = NULL;
|
2017-10-19 19:44:10 +00:00
|
|
|
ASN1_TIME *thisupd = ASN1_TIME_set(NULL, time(NULL));
|
|
|
|
ASN1_TIME *nextupd = ASN1_TIME_set(NULL, time(NULL) + 200);
|
|
|
|
X509_NAME *name = X509_NAME_new();
|
|
|
|
ASN1_BIT_STRING *key = ASN1_BIT_STRING_new();
|
|
|
|
ASN1_INTEGER *serial = ASN1_INTEGER_new();
|
|
|
|
|
|
|
|
if (!X509_NAME_add_entry_by_NID(name, NID_commonName, MBSTRING_ASC,
|
|
|
|
namestr, -1, -1, 1)
|
2017-12-07 20:14:47 +00:00
|
|
|
|| !ASN1_BIT_STRING_set(key, keybytes, sizeof(keybytes))
|
|
|
|
|| !ASN1_INTEGER_set_uint64(serial, (uint64_t)1))
|
|
|
|
goto err;
|
2017-10-19 19:44:10 +00:00
|
|
|
cid = OCSP_cert_id_new(EVP_sha256(), name, key, serial);
|
|
|
|
if (!TEST_ptr(bs)
|
|
|
|
|| !TEST_ptr(thisupd)
|
|
|
|
|| !TEST_ptr(nextupd)
|
|
|
|
|| !TEST_ptr(cid)
|
|
|
|
|| !TEST_true(OCSP_basic_add1_status(bs, cid,
|
|
|
|
V_OCSP_CERTSTATUS_UNKNOWN,
|
|
|
|
0, NULL, thisupd, nextupd)))
|
2017-12-07 20:14:47 +00:00
|
|
|
goto err;
|
|
|
|
bs_out = bs;
|
|
|
|
bs = NULL;
|
|
|
|
err:
|
2017-10-19 19:44:10 +00:00
|
|
|
ASN1_TIME_free(thisupd);
|
|
|
|
ASN1_TIME_free(nextupd);
|
|
|
|
ASN1_BIT_STRING_free(key);
|
|
|
|
ASN1_INTEGER_free(serial);
|
|
|
|
OCSP_CERTID_free(cid);
|
2017-12-07 20:14:47 +00:00
|
|
|
OCSP_BASICRESP_free(bs);
|
2017-10-19 19:44:10 +00:00
|
|
|
X509_NAME_free(name);
|
2017-12-07 20:14:47 +00:00
|
|
|
return bs_out;
|
2017-10-19 19:44:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int test_resp_signer(void)
|
|
|
|
{
|
2017-12-07 20:14:47 +00:00
|
|
|
OCSP_BASICRESP *bs = NULL;
|
2017-10-19 19:44:10 +00:00
|
|
|
X509 *signer = NULL, *tmp;
|
|
|
|
EVP_PKEY *key = NULL;
|
2017-12-07 20:14:47 +00:00
|
|
|
STACK_OF(X509) *extra_certs = NULL;
|
|
|
|
int ret = 0;
|
2017-10-19 19:44:10 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Test a response with no certs at all; get the signer from the
|
|
|
|
* extra certs given to OCSP_resp_get0_signer().
|
|
|
|
*/
|
|
|
|
bs = make_dummy_resp();
|
|
|
|
extra_certs = sk_X509_new_null();
|
|
|
|
if (!TEST_ptr(bs)
|
|
|
|
|| !TEST_ptr(extra_certs)
|
|
|
|
|| !TEST_true(get_cert_and_key(&signer, &key))
|
|
|
|
|| !TEST_true(sk_X509_push(extra_certs, signer))
|
|
|
|
|| !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
|
|
|
|
NULL, OCSP_NOCERTS)))
|
2017-12-07 20:14:47 +00:00
|
|
|
goto err;
|
2017-10-19 19:44:10 +00:00
|
|
|
if (!TEST_true(OCSP_resp_get0_signer(bs, &tmp, extra_certs))
|
|
|
|
|| !TEST_int_eq(X509_cmp(tmp, signer), 0))
|
2017-12-07 20:14:47 +00:00
|
|
|
goto err;
|
2017-10-19 19:44:10 +00:00
|
|
|
OCSP_BASICRESP_free(bs);
|
|
|
|
|
|
|
|
/* Do it again but include the signer cert */
|
|
|
|
bs = make_dummy_resp();
|
|
|
|
tmp = NULL;
|
|
|
|
if (!TEST_ptr(bs)
|
|
|
|
|| !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
|
|
|
|
NULL, 0)))
|
2017-12-07 20:14:47 +00:00
|
|
|
goto err;
|
2017-10-19 19:44:10 +00:00
|
|
|
if (!TEST_true(OCSP_resp_get0_signer(bs, &tmp, NULL))
|
|
|
|
|| !TEST_int_eq(X509_cmp(tmp, signer), 0))
|
2017-12-07 20:14:47 +00:00
|
|
|
goto err;
|
|
|
|
ret = 1;
|
|
|
|
err:
|
2017-10-19 19:44:10 +00:00
|
|
|
OCSP_BASICRESP_free(bs);
|
|
|
|
sk_X509_free(extra_certs);
|
|
|
|
X509_free(signer);
|
|
|
|
EVP_PKEY_free(key);
|
2017-12-07 20:14:47 +00:00
|
|
|
return ret;
|
2017-10-19 19:44:10 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int setup_tests(void)
|
|
|
|
{
|
|
|
|
if (!TEST_ptr(certstr = test_get_argument(0))
|
|
|
|
|| !TEST_ptr(privkeystr = test_get_argument(1)))
|
|
|
|
return 0;
|
|
|
|
#ifndef OPENSSL_NO_OCSP
|
|
|
|
ADD_TEST(test_resp_signer);
|
|
|
|
#endif
|
|
|
|
return 1;
|
|
|
|
}
|