xref: /freebsd/crypto/openssl/test/ocspapitest.c (revision 96190b4fef3b4a0cc3ca0606b0c4e3e69a5e6717)
1 /*
2  * Copyright 2017-2022 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9 
10 #include <string.h>
11 
12 #include <openssl/opensslconf.h>
13 #include <openssl/crypto.h>
14 #include <openssl/ocsp.h>
15 #include <openssl/x509.h>
16 #include <openssl/asn1.h>
17 #include <openssl/pem.h>
18 
19 #include "testutil.h"
20 
21 static const char *certstr;
22 static const char *privkeystr;
23 
24 #ifndef OPENSSL_NO_OCSP
25 static int get_cert_and_key(X509 **cert_out, EVP_PKEY **key_out)
26 {
27     BIO *certbio, *keybio;
28     X509 *cert = NULL;
29     EVP_PKEY *key = NULL;
30 
31     if (!TEST_ptr(certbio = BIO_new_file(certstr, "r")))
32         return 0;
33     cert = PEM_read_bio_X509(certbio, NULL, NULL, NULL);
34     BIO_free(certbio);
35     if (!TEST_ptr(keybio = BIO_new_file(privkeystr, "r")))
36         goto end;
37     key = PEM_read_bio_PrivateKey(keybio, NULL, NULL, NULL);
38     BIO_free(keybio);
39     if (!TEST_ptr(cert) || !TEST_ptr(key))
40         goto end;
41     *cert_out = cert;
42     *key_out = key;
43     return 1;
44  end:
45     X509_free(cert);
46     EVP_PKEY_free(key);
47     return 0;
48 }
49 
50 static int get_cert(X509 **cert_out)
51 {
52     BIO *certbio;
53     X509 *cert = NULL;
54 
55     if (!TEST_ptr(certbio = BIO_new_file(certstr, "r")))
56         return 0;
57     cert = PEM_read_bio_X509(certbio, NULL, NULL, NULL);
58     BIO_free(certbio);
59     if (!TEST_ptr(cert))
60         goto end;
61     *cert_out = cert;
62     return 1;
63  end:
64     X509_free(cert);
65     return 0;
66 }
67 
68 static OCSP_BASICRESP *make_dummy_resp(void)
69 {
70     const unsigned char namestr[] = "openssl.example.com";
71     unsigned char keybytes[128] = {7};
72     OCSP_BASICRESP *bs = OCSP_BASICRESP_new();
73     OCSP_BASICRESP *bs_out = NULL;
74     OCSP_CERTID *cid = NULL;
75     ASN1_TIME *thisupd = ASN1_TIME_set(NULL, time(NULL));
76     ASN1_TIME *nextupd = ASN1_TIME_set(NULL, time(NULL) + 200);
77     X509_NAME *name = X509_NAME_new();
78     ASN1_BIT_STRING *key = ASN1_BIT_STRING_new();
79     ASN1_INTEGER *serial = ASN1_INTEGER_new();
80 
81     if (!TEST_ptr(name)
82         || !TEST_ptr(key)
83         || !TEST_ptr(serial)
84         || !TEST_true(X509_NAME_add_entry_by_NID(name, NID_commonName,
85                                                  MBSTRING_ASC,
86                                                  namestr, -1, -1, 1))
87         || !TEST_true(ASN1_BIT_STRING_set(key, keybytes, sizeof(keybytes)))
88         || !TEST_true(ASN1_INTEGER_set_uint64(serial, (uint64_t)1)))
89         goto err;
90     cid = OCSP_cert_id_new(EVP_sha256(), name, key, serial);
91     if (!TEST_ptr(bs)
92         || !TEST_ptr(thisupd)
93         || !TEST_ptr(nextupd)
94         || !TEST_ptr(cid)
95         || !TEST_true(OCSP_basic_add1_status(bs, cid,
96                                              V_OCSP_CERTSTATUS_UNKNOWN,
97                                              0, NULL, thisupd, nextupd)))
98         goto err;
99     bs_out = bs;
100     bs = NULL;
101  err:
102     ASN1_TIME_free(thisupd);
103     ASN1_TIME_free(nextupd);
104     ASN1_BIT_STRING_free(key);
105     ASN1_INTEGER_free(serial);
106     OCSP_CERTID_free(cid);
107     OCSP_BASICRESP_free(bs);
108     X509_NAME_free(name);
109     return bs_out;
110 }
111 
112 static int test_resp_signer(void)
113 {
114     OCSP_BASICRESP *bs = NULL;
115     X509 *signer = NULL, *tmp;
116     EVP_PKEY *key = NULL;
117     STACK_OF(X509) *extra_certs = NULL;
118     int ret = 0;
119 
120     /*
121      * Test a response with no certs at all; get the signer from the
122      * extra certs given to OCSP_resp_get0_signer().
123      */
124     bs = make_dummy_resp();
125     extra_certs = sk_X509_new_null();
126     if (!TEST_ptr(bs)
127         || !TEST_ptr(extra_certs)
128         || !TEST_true(get_cert_and_key(&signer, &key))
129         || !TEST_true(sk_X509_push(extra_certs, signer))
130         || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
131                                       NULL, OCSP_NOCERTS)))
132         goto err;
133     if (!TEST_true(OCSP_resp_get0_signer(bs, &tmp, extra_certs))
134         || !TEST_int_eq(X509_cmp(tmp, signer), 0))
135         goto err;
136     OCSP_BASICRESP_free(bs);
137 
138     /* Do it again but include the signer cert */
139     bs = make_dummy_resp();
140     tmp = NULL;
141     if (!TEST_ptr(bs)
142         || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
143                                       NULL, 0)))
144         goto err;
145     if (!TEST_true(OCSP_resp_get0_signer(bs, &tmp, NULL))
146         || !TEST_int_eq(X509_cmp(tmp, signer), 0))
147         goto err;
148     ret = 1;
149  err:
150     OCSP_BASICRESP_free(bs);
151     sk_X509_free(extra_certs);
152     X509_free(signer);
153     EVP_PKEY_free(key);
154     return ret;
155 }
156 
157 static int test_access_description(int testcase)
158 {
159     ACCESS_DESCRIPTION *ad = ACCESS_DESCRIPTION_new();
160     int ret = 0;
161 
162     if (!TEST_ptr(ad))
163         goto err;
164 
165     switch (testcase) {
166     case 0:     /* no change */
167         break;
168     case 1:     /* check and release current location */
169         if (!TEST_ptr(ad->location))
170             goto err;
171         GENERAL_NAME_free(ad->location);
172         ad->location = NULL;
173         break;
174     case 2:     /* replace current location */
175         GENERAL_NAME_free(ad->location);
176         ad->location = GENERAL_NAME_new();
177         if (!TEST_ptr(ad->location))
178             goto err;
179         break;
180     }
181     ACCESS_DESCRIPTION_free(ad);
182     ret = 1;
183 err:
184     return ret;
185 }
186 
187 static int test_ocsp_url_svcloc_new(void)
188 {
189     static const char *urls[] = {
190         "www.openssl.org",
191         "www.openssl.net",
192         NULL
193     };
194 
195     X509 *issuer = NULL;
196     X509_EXTENSION * ext = NULL;
197     int ret = 0;
198 
199     if (!TEST_true(get_cert(&issuer)))
200         goto err;
201 
202     /*
203      * Test calling this ocsp method to catch any memory leak
204      */
205     ext = OCSP_url_svcloc_new(X509_get_issuer_name(issuer), urls);
206     if (!TEST_ptr(ext))
207         goto err;
208 
209     X509_EXTENSION_free(ext);
210     ret = 1;
211 err:
212     X509_free(issuer);
213     return ret;
214 }
215 
216 #endif /* OPENSSL_NO_OCSP */
217 
218 OPT_TEST_DECLARE_USAGE("certfile privkeyfile\n")
219 
220 int setup_tests(void)
221 {
222     if (!test_skip_common_options()) {
223         TEST_error("Error parsing test options\n");
224         return 0;
225     }
226 
227     if (!TEST_ptr(certstr = test_get_argument(0))
228         || !TEST_ptr(privkeystr = test_get_argument(1)))
229         return 0;
230 #ifndef OPENSSL_NO_OCSP
231     ADD_TEST(test_resp_signer);
232     ADD_ALL_TESTS(test_access_description, 3);
233     ADD_TEST(test_ocsp_url_svcloc_new);
234 #endif
235     return 1;
236 }
237