xref: /freebsd/crypto/openssh/regress/krl.sh (revision d5b0e70f7e04d971691517ce1304d86a1e367e2e)
1#	$OpenBSD: krl.sh,v 1.11 2019/12/16 02:39:05 djm Exp $
2#	Placed in the Public Domain.
3
4tid="key revocation lists"
5
6# Use ed25519 by default since it's fast and it's supported when building
7# w/out OpenSSL.  Populate ktype[2-4] with the other types if supported.
8ktype1=ed25519; ktype2=ed25519; ktype3=ed25519;
9ktype4=ed25519; ktype5=ed25519; ktype6=ed25519;
10for t in $SSH_KEYTYPES; do
11	case "$t" in
12		ecdsa*)		ktype2=ecdsa ;;
13		ssh-rsa)	ktype3=rsa ;;
14		ssh-dss)	ktype4=dsa ;;
15		sk-ssh-ed25519@openssh.com)		ktype5=ed25519-sk ;;
16		sk-ecdsa-sha2-nistp256@openssh.com)	ktype6=ecdsa-sk ;;
17	esac
18done
19
20# Do most testing with ssh-keygen; it uses the same verification code as sshd.
21
22# Old keys will interfere with ssh-keygen.
23rm -f $OBJ/revoked-* $OBJ/krl-*
24
25# Generate a CA key
26$SSHKEYGEN -t $ktype1 -f $OBJ/revoked-ca  -C "" -N "" > /dev/null ||
27	fatal "$SSHKEYGEN CA failed"
28$SSHKEYGEN -t $ktype2 -f $OBJ/revoked-ca2  -C "" -N "" > /dev/null ||
29	fatal "$SSHKEYGEN CA2 failed"
30
31# A specification that revokes some certificates by serial numbers
32# The serial pattern is chosen to ensure the KRL includes list, range and
33# bitmap sections.
34cat << EOF >> $OBJ/revoked-serials
35serial: 1-4
36serial: 10
37serial: 15
38serial: 30
39serial: 50
40serial: 90
41serial: 999
42# The following sum to 500-799
43serial: 500
44serial: 501
45serial: 502
46serial: 503-600
47serial: 700-797
48serial: 798
49serial: 799
50serial: 599-701
51# Some multiple consecutive serial number ranges
52serial: 10000-20000
53serial: 30000-40000
54EOF
55
56# A specification that revokes some certificated by key ID.
57touch $OBJ/revoked-keyid
58for n in 1 2 3 4 10 15 30 50 90 `jot 500 300` 999 1000 1001 1002; do
59	test "x$n" = "x499" && continue
60	# Fill in by-ID revocation spec.
61	echo "id: revoked $n" >> $OBJ/revoked-keyid
62done
63
64keygen() {
65	N=$1
66	f=$OBJ/revoked-`printf "%04d" $N`
67	# Vary the keytype. We use mostly ed25519 since this is fast and well
68	# supported.
69	keytype=$ktype1
70	case $N in
71	2  | 10 | 510 | 1001)	keytype=$ktype2 ;;
72	4  | 30 | 520 | 1002)	keytype=$ktype3 ;;
73	8  | 50 | 530 | 1003)	keytype=$ktype4 ;;
74	16 | 70 | 540 | 1004)	keytype=$ktype5 ;;
75	32 | 90 | 550 | 1005)	keytype=$ktype6 ;;
76	esac
77	$SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
78		|| fatal "$SSHKEYGEN failed"
79	# Sign cert
80	$SSHKEYGEN -s $OBJ/revoked-ca -z $n -I "revoked $N" $f >/dev/null 2>&1 \
81		|| fatal "$SSHKEYGEN sign failed"
82	echo $f
83}
84
85# Generate some keys.
86verbose "$tid: generating test keys"
87REVOKED_SERIALS="1 4 10 50 90 500 510 520 550 799 999"
88for n in $REVOKED_SERIALS ; do
89	f=`keygen $n`
90	RKEYS="$RKEYS ${f}.pub"
91	RCERTS="$RCERTS ${f}-cert.pub"
92done
93UNREVOKED_SERIALS="5 9 14 16 29 49 51 499 800 1010 1011"
94UNREVOKED=""
95for n in $UNREVOKED_SERIALS ; do
96	f=`keygen $n`
97	UKEYS="$UKEYS ${f}.pub"
98	UCERTS="$UCERTS ${f}-cert.pub"
99done
100
101# Specifications that revoke keys by hash.
102touch $OBJ/revoked-sha1 $OBJ/revoked-sha256 $OBJ/revoked-hash
103for rkey in $RKEYS; do
104	(printf "sha1: "; cat $rkey) >> $OBJ/revoked-sha1
105	(printf "sha256: "; cat $rkey) >> $OBJ/revoked-sha256
106	(printf "hash: "; $SSHKEYGEN -lf $rkey | \
107		awk '{ print $2 }') >> $OBJ/revoked-hash
108done
109
110genkrls() {
111	OPTS=$1
112$SSHKEYGEN $OPTS -kf $OBJ/krl-empty - </dev/null \
113	>/dev/null || fatal "$SSHKEYGEN KRL failed"
114$SSHKEYGEN $OPTS -kf $OBJ/krl-keys $RKEYS \
115	>/dev/null || fatal "$SSHKEYGEN KRL failed"
116$SSHKEYGEN $OPTS -kf $OBJ/krl-cert $RCERTS \
117	>/dev/null || fatal "$SSHKEYGEN KRL failed"
118$SSHKEYGEN $OPTS -kf $OBJ/krl-all $RKEYS $RCERTS \
119	>/dev/null || fatal "$SSHKEYGEN KRL failed"
120$SSHKEYGEN $OPTS -kf $OBJ/krl-ca $OBJ/revoked-ca.pub \
121	>/dev/null || fatal "$SSHKEYGEN KRL failed"
122$SSHKEYGEN $OPTS -kf $OBJ/krl-sha1 $OBJ/revoked-sha1 \
123	>/dev/null 2>&1 || fatal "$SSHKEYGEN KRL failed"
124$SSHKEYGEN $OPTS -kf $OBJ/krl-sha256 $OBJ/revoked-sha256 \
125	>/dev/null 2>&1 || fatal "$SSHKEYGEN KRL failed"
126$SSHKEYGEN $OPTS -kf $OBJ/krl-hash $OBJ/revoked-hash \
127	>/dev/null 2>&1 || fatal "$SSHKEYGEN KRL failed"
128# This should fail as KRLs from serial/key-id spec need the CA specified.
129$SSHKEYGEN $OPTS -kf $OBJ/krl-serial $OBJ/revoked-serials \
130	>/dev/null 2>&1 && fatal "$SSHKEYGEN KRL succeeded unexpectedly"
131$SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
132	>/dev/null 2>&1 && fatal "$SSHKEYGEN KRL succeeded unexpectedly"
133# These should succeed; they specify an explicit CA key.
134$SSHKEYGEN $OPTS -kf $OBJ/krl-serial -s $OBJ/revoked-ca \
135	$OBJ/revoked-serials >/dev/null || fatal "$SSHKEYGEN KRL failed"
136$SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \
137	$OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed"
138# These should succeed; they specify an wildcard CA key.
139$SSHKEYGEN $OPTS -kf $OBJ/krl-serial-wild -s NONE $OBJ/revoked-serials \
140	>/dev/null || fatal "$SSHKEYGEN KRL failed"
141$SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \
142	>/dev/null || fatal "$SSHKEYGEN KRL failed"
143# Revoke the same serials with the second CA key to ensure a multi-CA
144# KRL is generated.
145$SSHKEYGEN $OPTS -kf $OBJ/krl-serial -u -s $OBJ/revoked-ca2 \
146	$OBJ/revoked-serials >/dev/null || fatal "$SSHKEYGEN KRL failed"
147}
148
149## XXX dump with trace and grep for set cert serials
150## XXX test ranges near (u64)-1, etc.
151
152verbose "$tid: generating KRLs"
153genkrls
154
155check_krl() {
156	KEY=$1
157	KRL=$2
158	EXPECT_REVOKED=$3
159	TAG=$4
160	$SSHKEYGEN -Qf $KRL $KEY >/dev/null
161	result=$?
162	if test "x$EXPECT_REVOKED" = "xy" -a $result -eq 0 ; then
163		fatal "key $KEY not revoked by KRL $KRL: $TAG"
164	elif test "x$EXPECT_REVOKED" = "xn" -a $result -ne 0 ; then
165		fatal "key $KEY unexpectedly revoked by KRL $KRL: $TAG"
166	fi
167}
168test_rev() {
169	FILES=$1
170	TAG=$2
171	KEYS_RESULT=$3
172	ALL_RESULT=$4
173	HASH_RESULT=$5
174	SERIAL_RESULT=$6
175	KEYID_RESULT=$7
176	CERTS_RESULT=$8
177	CA_RESULT=$9
178	SERIAL_WRESULT=$10
179	KEYID_WRESULT=$11
180	verbose "$tid: checking revocations for $TAG"
181	for f in $FILES ; do
182		check_krl $f $OBJ/krl-empty		no		"$TAG"
183		check_krl $f $OBJ/krl-keys		$KEYS_RESULT	"$TAG"
184		check_krl $f $OBJ/krl-all		$ALL_RESULT	"$TAG"
185		check_krl $f $OBJ/krl-sha1		$HASH_RESULT	"$TAG"
186		check_krl $f $OBJ/krl-sha256		$HASH_RESULT	"$TAG"
187		check_krl $f $OBJ/krl-hash		$HASH_RESULT	"$TAG"
188		check_krl $f $OBJ/krl-serial		$SERIAL_RESULT	"$TAG"
189		check_krl $f $OBJ/krl-keyid		$KEYID_RESULT	"$TAG"
190		check_krl $f $OBJ/krl-cert		$CERTS_RESULT	"$TAG"
191		check_krl $f $OBJ/krl-ca		$CA_RESULT	"$TAG"
192		check_krl $f $OBJ/krl-serial-wild	$SERIAL_WRESULT	"$TAG"
193		check_krl $f $OBJ/krl-keyid-wild	$KEYID_WRESULT	"$TAG"
194	done
195}
196
197test_all() {
198	#                                                           wildcard
199	#                                 keys all hash sr# ID cert  CA srl ID
200	test_rev "$RKEYS"     "revoked keys" y   y    y   n  n    n   n   n  n
201	test_rev "$UKEYS"   "unrevoked keys" n   n    n   n  n    n   n   n  n
202	test_rev "$RCERTS"   "revoked certs" y   y    y   y  y    y   y   y  y
203	test_rev "$UCERTS" "unrevoked certs" n   n    n   n  n    n   y   n  n
204}
205
206test_all
207
208# Check update. Results should be identical.
209verbose "$tid: testing KRL update"
210for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
211    $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid \
212    $OBJ/krl-serial-wild $OBJ/krl-keyid-wild; do
213	cp -f $OBJ/krl-empty $f
214	genkrls -u
215done
216
217test_all
218