1 | /*
|
---|
2 | * Copyright 2007-2023 The OpenSSL Project Authors. All Rights Reserved.
|
---|
3 | * Copyright Nokia 2007-2019
|
---|
4 | * Copyright Siemens AG 2015-2019
|
---|
5 | *
|
---|
6 | * Licensed under the Apache License 2.0 (the "License"). You may not use
|
---|
7 | * this file except in compliance with the License. You can obtain a copy
|
---|
8 | * in the file LICENSE in the source distribution or at
|
---|
9 | * https://www.openssl.org/source/license.html
|
---|
10 | */
|
---|
11 |
|
---|
12 | #include "helpers/cmp_testlib.h"
|
---|
13 | #include "../crypto/crmf/crmf_local.h" /* for manipulating POPO signature */
|
---|
14 |
|
---|
15 | static const char *server_f;
|
---|
16 | static const char *client_f;
|
---|
17 | static const char *endentity1_f;
|
---|
18 | static const char *endentity2_f;
|
---|
19 | static const char *root_f;
|
---|
20 | static const char *intermediate_f;
|
---|
21 | static const char *ir_protected_f;
|
---|
22 | static const char *ir_unprotected_f;
|
---|
23 | static const char *ir_rmprotection_f;
|
---|
24 | static const char *ip_waiting_f;
|
---|
25 | static const char *instacert_f;
|
---|
26 | static const char *instaca_f;
|
---|
27 | static const char *ir_protected_0_extracerts;
|
---|
28 | static const char *ir_protected_2_extracerts;
|
---|
29 |
|
---|
30 | typedef struct test_fixture {
|
---|
31 | const char *test_case_name;
|
---|
32 | int expected;
|
---|
33 | OSSL_CMP_CTX *cmp_ctx;
|
---|
34 | OSSL_CMP_MSG *msg;
|
---|
35 | X509 *cert;
|
---|
36 | ossl_cmp_allow_unprotected_cb_t allow_unprotected_cb;
|
---|
37 | int additional_arg;
|
---|
38 | } CMP_VFY_TEST_FIXTURE;
|
---|
39 |
|
---|
40 | static OSSL_LIB_CTX *libctx = NULL;
|
---|
41 | static OSSL_PROVIDER *default_null_provider = NULL, *provider = NULL;
|
---|
42 |
|
---|
43 | static void tear_down(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
44 | {
|
---|
45 | OSSL_CMP_MSG_free(fixture->msg);
|
---|
46 | OSSL_CMP_CTX_free(fixture->cmp_ctx);
|
---|
47 | OPENSSL_free(fixture);
|
---|
48 | }
|
---|
49 |
|
---|
50 | static time_t test_time_valid = 0, test_time_after_expiration = 0;
|
---|
51 |
|
---|
52 | static CMP_VFY_TEST_FIXTURE *set_up(const char *const test_case_name)
|
---|
53 | {
|
---|
54 | X509_STORE *ts;
|
---|
55 | CMP_VFY_TEST_FIXTURE *fixture;
|
---|
56 |
|
---|
57 | if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture))))
|
---|
58 | return NULL;
|
---|
59 |
|
---|
60 | ts = X509_STORE_new();
|
---|
61 | fixture->test_case_name = test_case_name;
|
---|
62 | if (ts == NULL
|
---|
63 | || !TEST_ptr(fixture->cmp_ctx = OSSL_CMP_CTX_new(libctx, NULL))
|
---|
64 | || !OSSL_CMP_CTX_set0_trustedStore(fixture->cmp_ctx, ts)
|
---|
65 | || !OSSL_CMP_CTX_set_log_cb(fixture->cmp_ctx, print_to_bio_out)) {
|
---|
66 | tear_down(fixture);
|
---|
67 | X509_STORE_free(ts);
|
---|
68 | return NULL;
|
---|
69 | }
|
---|
70 | X509_VERIFY_PARAM_set_time(X509_STORE_get0_param(ts), test_time_valid);
|
---|
71 | X509_STORE_set_verify_cb(ts, X509_STORE_CTX_print_verify_cb);
|
---|
72 | return fixture;
|
---|
73 | }
|
---|
74 |
|
---|
75 | static X509 *srvcert = NULL;
|
---|
76 | static X509 *clcert = NULL;
|
---|
77 | /* chain */
|
---|
78 | static X509 *endentity1 = NULL, *endentity2 = NULL,
|
---|
79 | *intermediate = NULL, *root = NULL;
|
---|
80 | /* INSTA chain */
|
---|
81 | static X509 *insta_cert = NULL, *instaca_cert = NULL;
|
---|
82 |
|
---|
83 | static unsigned char rand_data[OSSL_CMP_TRANSACTIONID_LENGTH];
|
---|
84 | static OSSL_CMP_MSG *ir_unprotected, *ir_rmprotection;
|
---|
85 |
|
---|
86 | /* secret value used for IP_waitingStatus_PBM.der */
|
---|
87 | static const unsigned char sec_1[] = {
|
---|
88 | '9', 'p', 'p', '8', '-', 'b', '3', '5', 'i', '-', 'X', 'd', '3',
|
---|
89 | 'Q', '-', 'u', 'd', 'N', 'R'
|
---|
90 | };
|
---|
91 |
|
---|
92 | static int flip_bit(ASN1_BIT_STRING *bitstr)
|
---|
93 | {
|
---|
94 | int bit_num = 7;
|
---|
95 | int bit = ASN1_BIT_STRING_get_bit(bitstr, bit_num);
|
---|
96 |
|
---|
97 | return ASN1_BIT_STRING_set_bit(bitstr, bit_num, !bit);
|
---|
98 | }
|
---|
99 |
|
---|
100 | static int execute_verify_popo_test(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
101 | {
|
---|
102 | if ((fixture->msg = load_pkimsg(ir_protected_f, libctx)) == NULL)
|
---|
103 | return 0;
|
---|
104 | if (fixture->expected == 0) {
|
---|
105 | const OSSL_CRMF_MSGS *reqs = fixture->msg->body->value.ir;
|
---|
106 | const OSSL_CRMF_MSG *req = sk_OSSL_CRMF_MSG_value(reqs, 0);
|
---|
107 | if (req == NULL || !flip_bit(req->popo->value.signature->signature))
|
---|
108 | return 0;
|
---|
109 | }
|
---|
110 | return TEST_int_eq(fixture->expected,
|
---|
111 | ossl_cmp_verify_popo(fixture->cmp_ctx, fixture->msg,
|
---|
112 | fixture->additional_arg));
|
---|
113 | }
|
---|
114 |
|
---|
115 | static int test_verify_popo(void)
|
---|
116 | {
|
---|
117 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
118 | fixture->expected = 1;
|
---|
119 | EXECUTE_TEST(execute_verify_popo_test, tear_down);
|
---|
120 | return result;
|
---|
121 | }
|
---|
122 |
|
---|
123 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
124 | static int test_verify_popo_bad(void)
|
---|
125 | {
|
---|
126 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
127 | fixture->expected = 0;
|
---|
128 | EXECUTE_TEST(execute_verify_popo_test, tear_down);
|
---|
129 | return result;
|
---|
130 | }
|
---|
131 | #endif
|
---|
132 |
|
---|
133 | static int execute_validate_msg_test(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
134 | {
|
---|
135 | return TEST_int_eq(fixture->expected,
|
---|
136 | ossl_cmp_msg_check_update(fixture->cmp_ctx, fixture->msg,
|
---|
137 | NULL, 0));
|
---|
138 | }
|
---|
139 |
|
---|
140 | static int execute_validate_cert_path_test(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
141 | {
|
---|
142 | X509_STORE *ts = OSSL_CMP_CTX_get0_trustedStore(fixture->cmp_ctx);
|
---|
143 | int res = TEST_int_eq(fixture->expected,
|
---|
144 | OSSL_CMP_validate_cert_path(fixture->cmp_ctx,
|
---|
145 | ts, fixture->cert));
|
---|
146 |
|
---|
147 | OSSL_CMP_CTX_print_errors(fixture->cmp_ctx);
|
---|
148 | return res;
|
---|
149 | }
|
---|
150 |
|
---|
151 | static int test_validate_msg_mac_alg_protection(int miss, int wrong)
|
---|
152 | {
|
---|
153 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
154 |
|
---|
155 | fixture->expected = !miss && !wrong;
|
---|
156 | if (!TEST_true(miss ? OSSL_CMP_CTX_set0_trustedStore(fixture->cmp_ctx, NULL)
|
---|
157 | : OSSL_CMP_CTX_set1_secretValue(fixture->cmp_ctx, sec_1,
|
---|
158 | wrong ? 4 : sizeof(sec_1)))
|
---|
159 | || !TEST_ptr(fixture->msg = load_pkimsg(ip_waiting_f, libctx))) {
|
---|
160 | tear_down(fixture);
|
---|
161 | fixture = NULL;
|
---|
162 | }
|
---|
163 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
164 | return result;
|
---|
165 | }
|
---|
166 |
|
---|
167 | static int test_validate_msg_mac_alg_protection_ok(void)
|
---|
168 | {
|
---|
169 | return test_validate_msg_mac_alg_protection(0, 0);
|
---|
170 | }
|
---|
171 |
|
---|
172 | static int test_validate_msg_mac_alg_protection_missing(void)
|
---|
173 | {
|
---|
174 | return test_validate_msg_mac_alg_protection(1, 0);
|
---|
175 | }
|
---|
176 |
|
---|
177 | static int test_validate_msg_mac_alg_protection_wrong(void)
|
---|
178 | {
|
---|
179 | return test_validate_msg_mac_alg_protection(0, 1);
|
---|
180 | }
|
---|
181 |
|
---|
182 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
183 | static int test_validate_msg_mac_alg_protection_bad(void)
|
---|
184 | {
|
---|
185 | const unsigned char sec_bad[] = {
|
---|
186 | '9', 'p', 'p', '8', '-', 'b', '3', '5', 'i', '-', 'X', 'd', '3',
|
---|
187 | 'Q', '-', 'u', 'd', 'N', 'r'
|
---|
188 | };
|
---|
189 |
|
---|
190 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
191 | fixture->expected = 0;
|
---|
192 |
|
---|
193 | if (!TEST_true(OSSL_CMP_CTX_set1_secretValue(fixture->cmp_ctx, sec_bad,
|
---|
194 | sizeof(sec_bad)))
|
---|
195 | || !TEST_ptr(fixture->msg = load_pkimsg(ip_waiting_f, libctx))) {
|
---|
196 | tear_down(fixture);
|
---|
197 | fixture = NULL;
|
---|
198 | }
|
---|
199 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
200 | return result;
|
---|
201 | }
|
---|
202 | #endif
|
---|
203 |
|
---|
204 | static int add_trusted(OSSL_CMP_CTX *ctx, X509 *cert)
|
---|
205 | {
|
---|
206 | return X509_STORE_add_cert(OSSL_CMP_CTX_get0_trustedStore(ctx), cert);
|
---|
207 | }
|
---|
208 |
|
---|
209 | static int add_untrusted(OSSL_CMP_CTX *ctx, X509 *cert)
|
---|
210 | {
|
---|
211 | return X509_add_cert(OSSL_CMP_CTX_get0_untrusted(ctx), cert,
|
---|
212 | X509_ADD_FLAG_UP_REF);
|
---|
213 | }
|
---|
214 |
|
---|
215 | static int test_validate_msg_signature_partial_chain(int expired)
|
---|
216 | {
|
---|
217 | X509_STORE *ts;
|
---|
218 |
|
---|
219 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
220 |
|
---|
221 | ts = OSSL_CMP_CTX_get0_trustedStore(fixture->cmp_ctx);
|
---|
222 | fixture->expected = !expired;
|
---|
223 | if (ts == NULL
|
---|
224 | || !TEST_ptr(fixture->msg = load_pkimsg(ir_protected_f, libctx))
|
---|
225 | || !add_trusted(fixture->cmp_ctx, srvcert)) {
|
---|
226 | tear_down(fixture);
|
---|
227 | fixture = NULL;
|
---|
228 | } else {
|
---|
229 | X509_VERIFY_PARAM *vpm = X509_STORE_get0_param(ts);
|
---|
230 | X509_VERIFY_PARAM_set_flags(vpm, X509_V_FLAG_PARTIAL_CHAIN);
|
---|
231 | if (expired)
|
---|
232 | X509_VERIFY_PARAM_set_time(vpm, test_time_after_expiration);
|
---|
233 | }
|
---|
234 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
235 | return result;
|
---|
236 | }
|
---|
237 |
|
---|
238 | static int test_validate_msg_signature_trusted_ok(void)
|
---|
239 | {
|
---|
240 | return test_validate_msg_signature_partial_chain(0);
|
---|
241 | }
|
---|
242 |
|
---|
243 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
244 | static int test_validate_msg_signature_trusted_expired(void)
|
---|
245 | {
|
---|
246 | return test_validate_msg_signature_partial_chain(1);
|
---|
247 | }
|
---|
248 | #endif
|
---|
249 |
|
---|
250 | static int test_validate_msg_signature_srvcert(int bad_sig, int miss, int wrong)
|
---|
251 | {
|
---|
252 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
253 | fixture->cert = srvcert;
|
---|
254 | fixture->expected = !bad_sig && !wrong && !miss;
|
---|
255 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_f, libctx))
|
---|
256 | || !TEST_true(miss ? OSSL_CMP_CTX_set1_secretValue(fixture->cmp_ctx,
|
---|
257 | sec_1, sizeof(sec_1))
|
---|
258 | : OSSL_CMP_CTX_set1_srvCert(fixture->cmp_ctx,
|
---|
259 | wrong? clcert : srvcert))
|
---|
260 | || (bad_sig && !flip_bit(fixture->msg->protection))) {
|
---|
261 | tear_down(fixture);
|
---|
262 | fixture = NULL;
|
---|
263 | }
|
---|
264 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
265 | return result;
|
---|
266 | }
|
---|
267 |
|
---|
268 | static int test_validate_msg_signature_srvcert_missing(void)
|
---|
269 | {
|
---|
270 | return test_validate_msg_signature_srvcert(0, 1, 0);
|
---|
271 | }
|
---|
272 |
|
---|
273 | static int test_validate_msg_signature_srvcert_wrong(void)
|
---|
274 | {
|
---|
275 | return test_validate_msg_signature_srvcert(0, 0, 1);
|
---|
276 | }
|
---|
277 |
|
---|
278 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
279 | static int test_validate_msg_signature_bad(void)
|
---|
280 | {
|
---|
281 | return test_validate_msg_signature_srvcert(1, 0, 0);
|
---|
282 | }
|
---|
283 | #endif
|
---|
284 |
|
---|
285 | static int test_validate_msg_signature_sender_cert_srvcert(void)
|
---|
286 | {
|
---|
287 | return test_validate_msg_signature_srvcert(0, 0, 0);
|
---|
288 | }
|
---|
289 |
|
---|
290 | static int test_validate_msg_signature_sender_cert_untrusted(void)
|
---|
291 | {
|
---|
292 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
293 | fixture->expected = 1;
|
---|
294 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_0_extracerts, libctx))
|
---|
295 | || !add_trusted(fixture->cmp_ctx, instaca_cert)
|
---|
296 | || !add_untrusted(fixture->cmp_ctx, insta_cert)) {
|
---|
297 | tear_down(fixture);
|
---|
298 | fixture = NULL;
|
---|
299 | }
|
---|
300 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
301 | return result;
|
---|
302 | }
|
---|
303 |
|
---|
304 | static int test_validate_msg_signature_sender_cert_trusted(void)
|
---|
305 | {
|
---|
306 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
307 | fixture->expected = 1;
|
---|
308 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_0_extracerts, libctx))
|
---|
309 | || !add_trusted(fixture->cmp_ctx, instaca_cert)
|
---|
310 | || !add_trusted(fixture->cmp_ctx, insta_cert)) {
|
---|
311 | tear_down(fixture);
|
---|
312 | fixture = NULL;
|
---|
313 | }
|
---|
314 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
315 | return result;
|
---|
316 | }
|
---|
317 |
|
---|
318 | static int test_validate_msg_signature_sender_cert_extracert(void)
|
---|
319 | {
|
---|
320 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
321 | fixture->expected = 1;
|
---|
322 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_2_extracerts, libctx))
|
---|
323 | || !add_trusted(fixture->cmp_ctx, instaca_cert)) {
|
---|
324 | tear_down(fixture);
|
---|
325 | fixture = NULL;
|
---|
326 | }
|
---|
327 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
328 | return result;
|
---|
329 | }
|
---|
330 |
|
---|
331 |
|
---|
332 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
333 | static int test_validate_msg_signature_sender_cert_absent(void)
|
---|
334 | {
|
---|
335 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
336 | fixture->expected = 0;
|
---|
337 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_0_extracerts, libctx))) {
|
---|
338 | tear_down(fixture);
|
---|
339 | fixture = NULL;
|
---|
340 | }
|
---|
341 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
342 | return result;
|
---|
343 | }
|
---|
344 | #endif
|
---|
345 |
|
---|
346 | static int test_validate_with_sender(const X509_NAME *name, int expected)
|
---|
347 | {
|
---|
348 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
349 | fixture->expected = expected;
|
---|
350 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_f, libctx))
|
---|
351 | || !TEST_true(OSSL_CMP_CTX_set1_expected_sender(fixture->cmp_ctx, name))
|
---|
352 | || !TEST_true(OSSL_CMP_CTX_set1_srvCert(fixture->cmp_ctx, srvcert))) {
|
---|
353 | tear_down(fixture);
|
---|
354 | fixture = NULL;
|
---|
355 | }
|
---|
356 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
357 | return result;
|
---|
358 | }
|
---|
359 |
|
---|
360 | static int test_validate_msg_signature_expected_sender(void)
|
---|
361 | {
|
---|
362 | return test_validate_with_sender(X509_get_subject_name(srvcert), 1);
|
---|
363 | }
|
---|
364 |
|
---|
365 | static int test_validate_msg_signature_unexpected_sender(void)
|
---|
366 | {
|
---|
367 | return test_validate_with_sender(X509_get_subject_name(root), 0);
|
---|
368 | }
|
---|
369 |
|
---|
370 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
371 | static int test_validate_msg_unprotected_request(void)
|
---|
372 | {
|
---|
373 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
374 | fixture->expected = 0;
|
---|
375 | if (!TEST_ptr(fixture->msg = load_pkimsg(ir_unprotected_f, libctx))) {
|
---|
376 | tear_down(fixture);
|
---|
377 | fixture = NULL;
|
---|
378 | }
|
---|
379 | EXECUTE_TEST(execute_validate_msg_test, tear_down);
|
---|
380 | return result;
|
---|
381 | }
|
---|
382 | #endif
|
---|
383 |
|
---|
384 | static void setup_path(CMP_VFY_TEST_FIXTURE **fixture, X509 *wrong, int expired)
|
---|
385 | {
|
---|
386 | (*fixture)->cert = endentity2;
|
---|
387 | (*fixture)->expected = wrong == NULL && !expired;
|
---|
388 | if (expired) {
|
---|
389 | X509_STORE *ts = OSSL_CMP_CTX_get0_trustedStore((*fixture)->cmp_ctx);
|
---|
390 | X509_VERIFY_PARAM *vpm = X509_STORE_get0_param(ts);
|
---|
391 | X509_VERIFY_PARAM_set_time(vpm, test_time_after_expiration);
|
---|
392 | }
|
---|
393 | if (!add_trusted((*fixture)->cmp_ctx, wrong == NULL ? root : wrong)
|
---|
394 | || !add_untrusted((*fixture)->cmp_ctx, endentity1)
|
---|
395 | || !add_untrusted((*fixture)->cmp_ctx, intermediate)) {
|
---|
396 | tear_down((*fixture));
|
---|
397 | (*fixture) = NULL;
|
---|
398 | }
|
---|
399 | }
|
---|
400 |
|
---|
401 | static int test_validate_cert_path_ok(void)
|
---|
402 | {
|
---|
403 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
404 | setup_path(&fixture, NULL, 0);
|
---|
405 | EXECUTE_TEST(execute_validate_cert_path_test, tear_down);
|
---|
406 | return result;
|
---|
407 | }
|
---|
408 |
|
---|
409 | static int test_validate_cert_path_wrong_anchor(void)
|
---|
410 | {
|
---|
411 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
412 | setup_path(&fixture, srvcert /* wrong/non-root cert */, 0);
|
---|
413 | EXECUTE_TEST(execute_validate_cert_path_test, tear_down);
|
---|
414 | return result;
|
---|
415 | }
|
---|
416 |
|
---|
417 | static int test_validate_cert_path_expired(void)
|
---|
418 | {
|
---|
419 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
420 | setup_path(&fixture, NULL, 1);
|
---|
421 | EXECUTE_TEST(execute_validate_cert_path_test, tear_down);
|
---|
422 | return result;
|
---|
423 | }
|
---|
424 |
|
---|
425 | static int execute_msg_check_test(CMP_VFY_TEST_FIXTURE *fixture)
|
---|
426 | {
|
---|
427 | const OSSL_CMP_PKIHEADER *hdr = OSSL_CMP_MSG_get0_header(fixture->msg);
|
---|
428 | const ASN1_OCTET_STRING *tid = OSSL_CMP_HDR_get0_transactionID(hdr);
|
---|
429 |
|
---|
430 | if (!TEST_int_eq(fixture->expected,
|
---|
431 | ossl_cmp_msg_check_update(fixture->cmp_ctx,
|
---|
432 | fixture->msg,
|
---|
433 | fixture->allow_unprotected_cb,
|
---|
434 | fixture->additional_arg)))
|
---|
435 | return 0;
|
---|
436 |
|
---|
437 | if (fixture->expected == 0) /* error expected already during above check */
|
---|
438 | return 1;
|
---|
439 | return
|
---|
440 | TEST_int_eq(0,
|
---|
441 | ASN1_OCTET_STRING_cmp(ossl_cmp_hdr_get0_senderNonce(hdr),
|
---|
442 | fixture->cmp_ctx->recipNonce))
|
---|
443 | && TEST_int_eq(0,
|
---|
444 | ASN1_OCTET_STRING_cmp(tid,
|
---|
445 | fixture->cmp_ctx->transactionID));
|
---|
446 | }
|
---|
447 |
|
---|
448 | static int allow_unprotected(const OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *msg,
|
---|
449 | int invalid_protection, int allow)
|
---|
450 | {
|
---|
451 | return allow;
|
---|
452 | }
|
---|
453 |
|
---|
454 | static void setup_check_update(CMP_VFY_TEST_FIXTURE **fixture, int expected,
|
---|
455 | ossl_cmp_allow_unprotected_cb_t cb, int arg,
|
---|
456 | const unsigned char *trid_data,
|
---|
457 | const unsigned char *nonce_data)
|
---|
458 | {
|
---|
459 | OSSL_CMP_CTX *ctx = (*fixture)->cmp_ctx;
|
---|
460 | int nonce_len = OSSL_CMP_SENDERNONCE_LENGTH;
|
---|
461 |
|
---|
462 | (*fixture)->expected = expected;
|
---|
463 | (*fixture)->allow_unprotected_cb = cb;
|
---|
464 | (*fixture)->additional_arg = arg;
|
---|
465 | (*fixture)->msg = OSSL_CMP_MSG_dup(ir_rmprotection);
|
---|
466 | if ((*fixture)->msg == NULL
|
---|
467 | || (nonce_data != NULL
|
---|
468 | && !ossl_cmp_asn1_octet_string_set1_bytes(&ctx->senderNonce,
|
---|
469 | nonce_data, nonce_len))) {
|
---|
470 | tear_down((*fixture));
|
---|
471 | (*fixture) = NULL;
|
---|
472 | } else if (trid_data != NULL) {
|
---|
473 | ASN1_OCTET_STRING *trid = ASN1_OCTET_STRING_new();
|
---|
474 | if (trid == NULL
|
---|
475 | || !ASN1_OCTET_STRING_set(trid, trid_data,
|
---|
476 | OSSL_CMP_TRANSACTIONID_LENGTH)
|
---|
477 | || !OSSL_CMP_CTX_set1_transactionID(ctx, trid)) {
|
---|
478 | tear_down((*fixture));
|
---|
479 | (*fixture) = NULL;
|
---|
480 | }
|
---|
481 | ASN1_OCTET_STRING_free(trid);
|
---|
482 | }
|
---|
483 | }
|
---|
484 |
|
---|
485 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
486 | static int test_msg_check_no_protection_no_cb(void)
|
---|
487 | {
|
---|
488 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
489 | setup_check_update(&fixture, 0, NULL, 0, NULL, NULL);
|
---|
490 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
491 | return result;
|
---|
492 | }
|
---|
493 |
|
---|
494 | static int test_msg_check_no_protection_restrictive_cb(void)
|
---|
495 | {
|
---|
496 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
497 | setup_check_update(&fixture, 0, allow_unprotected, 0, NULL, NULL);
|
---|
498 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
499 | return result;
|
---|
500 | }
|
---|
501 | #endif
|
---|
502 |
|
---|
503 | static int test_msg_check_no_protection_permissive_cb(void)
|
---|
504 | {
|
---|
505 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
506 | setup_check_update(&fixture, 1, allow_unprotected, 1, NULL, NULL);
|
---|
507 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
508 | return result;
|
---|
509 | }
|
---|
510 |
|
---|
511 | static int test_msg_check_transaction_id(void)
|
---|
512 | {
|
---|
513 | /* Transaction id belonging to CMP_IR_rmprotection.der */
|
---|
514 | const unsigned char trans_id[OSSL_CMP_TRANSACTIONID_LENGTH] = {
|
---|
515 | 0x39, 0xB6, 0x90, 0x28, 0xC4, 0xBC, 0x7A, 0xF6,
|
---|
516 | 0xBE, 0xC6, 0x4A, 0x88, 0x97, 0xA6, 0x95, 0x0B
|
---|
517 | };
|
---|
518 |
|
---|
519 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
520 | setup_check_update(&fixture, 1, allow_unprotected, 1, trans_id, NULL);
|
---|
521 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
522 | return result;
|
---|
523 | }
|
---|
524 |
|
---|
525 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
526 | static int test_msg_check_transaction_id_bad(void)
|
---|
527 | {
|
---|
528 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
529 | setup_check_update(&fixture, 0, allow_unprotected, 1, rand_data, NULL);
|
---|
530 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
531 | return result;
|
---|
532 | }
|
---|
533 | #endif
|
---|
534 |
|
---|
535 | static int test_msg_check_recipient_nonce(void)
|
---|
536 | {
|
---|
537 | /* Recipient nonce belonging to CMP_IP_ir_rmprotection.der */
|
---|
538 | const unsigned char rec_nonce[OSSL_CMP_SENDERNONCE_LENGTH] = {
|
---|
539 | 0x48, 0xF1, 0x71, 0x1F, 0xE5, 0xAF, 0x1C, 0x8B,
|
---|
540 | 0x21, 0x97, 0x5C, 0x84, 0x74, 0x49, 0xBA, 0x32
|
---|
541 | };
|
---|
542 |
|
---|
543 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
544 | setup_check_update(&fixture, 1, allow_unprotected, 1, NULL, rec_nonce);
|
---|
545 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
546 | return result;
|
---|
547 | }
|
---|
548 |
|
---|
549 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
550 | static int test_msg_check_recipient_nonce_bad(void)
|
---|
551 | {
|
---|
552 | SETUP_TEST_FIXTURE(CMP_VFY_TEST_FIXTURE, set_up);
|
---|
553 | setup_check_update(&fixture, 0, allow_unprotected, 1, NULL, rand_data);
|
---|
554 | EXECUTE_TEST(execute_msg_check_test, tear_down);
|
---|
555 | return result;
|
---|
556 | }
|
---|
557 | #endif
|
---|
558 |
|
---|
559 | void cleanup_tests(void)
|
---|
560 | {
|
---|
561 | X509_free(srvcert);
|
---|
562 | X509_free(clcert);
|
---|
563 | X509_free(endentity1);
|
---|
564 | X509_free(endentity2);
|
---|
565 | X509_free(intermediate);
|
---|
566 | X509_free(root);
|
---|
567 | X509_free(insta_cert);
|
---|
568 | X509_free(instaca_cert);
|
---|
569 | OSSL_CMP_MSG_free(ir_unprotected);
|
---|
570 | OSSL_CMP_MSG_free(ir_rmprotection);
|
---|
571 | OSSL_PROVIDER_unload(default_null_provider);
|
---|
572 | OSSL_PROVIDER_unload(provider);
|
---|
573 | OSSL_LIB_CTX_free(libctx);
|
---|
574 | return;
|
---|
575 | }
|
---|
576 |
|
---|
577 |
|
---|
578 | #define USAGE "server.crt client.crt " \
|
---|
579 | "EndEntity1.crt EndEntity2.crt " \
|
---|
580 | "Root_CA.crt Intermediate_CA.crt " \
|
---|
581 | "CMP_IR_protected.der CMP_IR_unprotected.der " \
|
---|
582 | "IP_waitingStatus_PBM.der IR_rmprotection.der " \
|
---|
583 | "insta.cert.pem insta_ca.cert.pem " \
|
---|
584 | "IR_protected_0_extraCerts.der " \
|
---|
585 | "IR_protected_2_extraCerts.der module_name [module_conf_file]\n"
|
---|
586 | OPT_TEST_DECLARE_USAGE(USAGE)
|
---|
587 |
|
---|
588 | int setup_tests(void)
|
---|
589 | {
|
---|
590 | /* Set test time stamps */
|
---|
591 | struct tm ts = { 0 };
|
---|
592 |
|
---|
593 | ts.tm_year = 2018 - 1900; /* 2018 */
|
---|
594 | ts.tm_mon = 1; /* February */
|
---|
595 | ts.tm_mday = 18; /* 18th */
|
---|
596 | test_time_valid = mktime(&ts); /* February 18th 2018 */
|
---|
597 | ts.tm_year += 10; /* February 18th 2028 */
|
---|
598 | test_time_after_expiration = mktime(&ts);
|
---|
599 |
|
---|
600 | if (!test_skip_common_options()) {
|
---|
601 | TEST_error("Error parsing test options\n");
|
---|
602 | return 0;
|
---|
603 | }
|
---|
604 |
|
---|
605 | RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH);
|
---|
606 | if (!TEST_ptr(server_f = test_get_argument(0))
|
---|
607 | || !TEST_ptr(client_f = test_get_argument(1))
|
---|
608 | || !TEST_ptr(endentity1_f = test_get_argument(2))
|
---|
609 | || !TEST_ptr(endentity2_f = test_get_argument(3))
|
---|
610 | || !TEST_ptr(root_f = test_get_argument(4))
|
---|
611 | || !TEST_ptr(intermediate_f = test_get_argument(5))
|
---|
612 | || !TEST_ptr(ir_protected_f = test_get_argument(6))
|
---|
613 | || !TEST_ptr(ir_unprotected_f = test_get_argument(7))
|
---|
614 | || !TEST_ptr(ip_waiting_f = test_get_argument(8))
|
---|
615 | || !TEST_ptr(ir_rmprotection_f = test_get_argument(9))
|
---|
616 | || !TEST_ptr(instacert_f = test_get_argument(10))
|
---|
617 | || !TEST_ptr(instaca_f = test_get_argument(11))
|
---|
618 | || !TEST_ptr(ir_protected_0_extracerts = test_get_argument(12))
|
---|
619 | || !TEST_ptr(ir_protected_2_extracerts = test_get_argument(13))) {
|
---|
620 | TEST_error("usage: cmp_vfy_test %s", USAGE);
|
---|
621 | return 0;
|
---|
622 | }
|
---|
623 |
|
---|
624 | if (!test_arg_libctx(&libctx, &default_null_provider, &provider, 14, USAGE))
|
---|
625 | return 0;
|
---|
626 |
|
---|
627 | /* Load certificates for cert chain */
|
---|
628 | if (!TEST_ptr(endentity1 = load_cert_pem(endentity1_f, libctx))
|
---|
629 | || !TEST_ptr(endentity2 = load_cert_pem(endentity2_f, libctx))
|
---|
630 | || !TEST_ptr(root = load_cert_pem(root_f, NULL))
|
---|
631 | || !TEST_ptr(intermediate = load_cert_pem(intermediate_f, libctx)))
|
---|
632 | goto err;
|
---|
633 |
|
---|
634 | if (!TEST_ptr(insta_cert = load_cert_pem(instacert_f, libctx))
|
---|
635 | || !TEST_ptr(instaca_cert = load_cert_pem(instaca_f, libctx)))
|
---|
636 | goto err;
|
---|
637 |
|
---|
638 | /* Load certificates for message validation */
|
---|
639 | if (!TEST_ptr(srvcert = load_cert_pem(server_f, libctx))
|
---|
640 | || !TEST_ptr(clcert = load_cert_pem(client_f, libctx)))
|
---|
641 | goto err;
|
---|
642 | if (!TEST_int_eq(1, RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH)))
|
---|
643 | goto err;
|
---|
644 | if (!TEST_ptr(ir_unprotected = load_pkimsg(ir_unprotected_f, libctx))
|
---|
645 | || !TEST_ptr(ir_rmprotection = load_pkimsg(ir_rmprotection_f, libctx)))
|
---|
646 | goto err;
|
---|
647 |
|
---|
648 | /* Message validation tests */
|
---|
649 | ADD_TEST(test_verify_popo);
|
---|
650 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
651 | ADD_TEST(test_verify_popo_bad);
|
---|
652 | #endif
|
---|
653 | ADD_TEST(test_validate_msg_signature_trusted_ok);
|
---|
654 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
655 | ADD_TEST(test_validate_msg_signature_trusted_expired);
|
---|
656 | ADD_TEST(test_validate_msg_signature_srvcert_missing);
|
---|
657 | #endif
|
---|
658 | ADD_TEST(test_validate_msg_signature_srvcert_wrong);
|
---|
659 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
660 | ADD_TEST(test_validate_msg_signature_bad);
|
---|
661 | #endif
|
---|
662 | ADD_TEST(test_validate_msg_signature_sender_cert_srvcert);
|
---|
663 | ADD_TEST(test_validate_msg_signature_sender_cert_untrusted);
|
---|
664 | ADD_TEST(test_validate_msg_signature_sender_cert_trusted);
|
---|
665 | ADD_TEST(test_validate_msg_signature_sender_cert_extracert);
|
---|
666 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
667 | ADD_TEST(test_validate_msg_signature_sender_cert_absent);
|
---|
668 | #endif
|
---|
669 | ADD_TEST(test_validate_msg_signature_expected_sender);
|
---|
670 | ADD_TEST(test_validate_msg_signature_unexpected_sender);
|
---|
671 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
672 | ADD_TEST(test_validate_msg_unprotected_request);
|
---|
673 | #endif
|
---|
674 | ADD_TEST(test_validate_msg_mac_alg_protection_ok);
|
---|
675 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
676 | ADD_TEST(test_validate_msg_mac_alg_protection_missing);
|
---|
677 | ADD_TEST(test_validate_msg_mac_alg_protection_wrong);
|
---|
678 | ADD_TEST(test_validate_msg_mac_alg_protection_bad);
|
---|
679 | #endif
|
---|
680 |
|
---|
681 | /* Cert path validation tests */
|
---|
682 | ADD_TEST(test_validate_cert_path_ok);
|
---|
683 | ADD_TEST(test_validate_cert_path_expired);
|
---|
684 | ADD_TEST(test_validate_cert_path_wrong_anchor);
|
---|
685 |
|
---|
686 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
687 | ADD_TEST(test_msg_check_no_protection_no_cb);
|
---|
688 | ADD_TEST(test_msg_check_no_protection_restrictive_cb);
|
---|
689 | #endif
|
---|
690 | ADD_TEST(test_msg_check_no_protection_permissive_cb);
|
---|
691 | ADD_TEST(test_msg_check_transaction_id);
|
---|
692 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
693 | ADD_TEST(test_msg_check_transaction_id_bad);
|
---|
694 | #endif
|
---|
695 | ADD_TEST(test_msg_check_recipient_nonce);
|
---|
696 | #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
|
---|
697 | ADD_TEST(test_msg_check_recipient_nonce_bad);
|
---|
698 | #endif
|
---|
699 |
|
---|
700 | return 1;
|
---|
701 |
|
---|
702 | err:
|
---|
703 | cleanup_tests();
|
---|
704 | return 0;
|
---|
705 |
|
---|
706 | }
|
---|