| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  | /*
 | 
					
						
							| 
									
										
										
										
											2023-09-07 16:59:15 +08:00
										 |  |  |  * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  |  * | 
					
						
							|  |  |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
					
						
							|  |  |  |  * this file except in compliance with the License.  You can obtain a copy | 
					
						
							|  |  |  |  * in the file LICENSE in the source distribution or at | 
					
						
							|  |  |  |  * https://www.openssl.org/source/license.html
 | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #include <stdio.h>
 | 
					
						
							|  |  |  | #include <string.h>
 | 
					
						
							|  |  |  | #include <stdlib.h>
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #include "internal/nelem.h"
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #include <openssl/pkcs12.h>
 | 
					
						
							|  |  |  | #include <openssl/x509.h>
 | 
					
						
							|  |  |  | #include <openssl/x509v3.h>
 | 
					
						
							|  |  |  | #include <openssl/pem.h>
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #include "testutil.h"
 | 
					
						
							|  |  |  | #include "helpers/pkcs12.h"
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static OSSL_LIB_CTX *testctx = NULL; | 
					
						
							|  |  |  | static OSSL_PROVIDER *nullprov = NULL; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static int test_null_args(void) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     return TEST_false(PKCS12_parse(NULL, NULL, NULL, NULL, NULL)); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static PKCS12 *PKCS12_load(const char *fpath) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     BIO *bio = NULL; | 
					
						
							|  |  |  |     PKCS12 *p12 = NULL; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-09-02 15:44:17 +08:00
										 |  |  |     bio = BIO_new_file(fpath, "rb"); | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  |     if (!TEST_ptr(bio)) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-21 12:39:07 +08:00
										 |  |  |     p12 = PKCS12_init_ex(NID_pkcs7_data, testctx, "provider=default"); | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  |     if (!TEST_ptr(p12)) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (!TEST_true(p12 == d2i_PKCS12_bio(bio, &p12))) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     BIO_free(bio); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return p12; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | err: | 
					
						
							|  |  |  |     BIO_free(bio); | 
					
						
							|  |  |  |     PKCS12_free(p12); | 
					
						
							|  |  |  |     return NULL; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static const char *in_file = NULL; | 
					
						
							|  |  |  | static const char *in_pass = ""; | 
					
						
							|  |  |  | static int has_key = 0; | 
					
						
							|  |  |  | static int has_cert = 0; | 
					
						
							|  |  |  | static int has_ca = 0; | 
					
						
							| 
									
										
										
										
											2023-01-25 09:25:33 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | static int changepass(PKCS12 *p12, EVP_PKEY *key, X509 *cert, STACK_OF(X509) *ca) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     int ret = 0; | 
					
						
							|  |  |  |     PKCS12 *p12new = NULL; | 
					
						
							|  |  |  |     EVP_PKEY *key2 = NULL; | 
					
						
							|  |  |  |     X509 *cert2 = NULL; | 
					
						
							|  |  |  |     STACK_OF(X509) *ca2 = NULL; | 
					
						
							|  |  |  |     BIO *bio = NULL; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (!TEST_true(PKCS12_newpass(p12, in_pass, "NEWPASS"))) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  |     if (!TEST_ptr(bio = BIO_new(BIO_s_mem()))) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  |     if (!TEST_true(i2d_PKCS12_bio(bio, p12))) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  |     if (!TEST_ptr(p12new = PKCS12_init_ex(NID_pkcs7_data, testctx, "provider=default"))) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  |     if (!TEST_ptr(d2i_PKCS12_bio(bio, &p12new))) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  |     if (!TEST_true(PKCS12_parse(p12new, "NEWPASS", &key2, &cert2, &ca2))) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  |     if (has_key) { | 
					
						
							|  |  |  |         if (!TEST_ptr(key2) || !TEST_int_eq(EVP_PKEY_eq(key, key2), 1)) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (has_cert) { | 
					
						
							|  |  |  |         if (!TEST_ptr(cert2) || !TEST_int_eq(X509_cmp(cert, cert2), 0)) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     ret = 1; | 
					
						
							|  |  |  | err: | 
					
						
							|  |  |  |     BIO_free(bio); | 
					
						
							|  |  |  |     PKCS12_free(p12new); | 
					
						
							|  |  |  |     EVP_PKEY_free(key2); | 
					
						
							|  |  |  |     X509_free(cert2); | 
					
						
							|  |  |  |     OSSL_STACK_OF_X509_free(ca2); | 
					
						
							|  |  |  |     return ret; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  | static int pkcs12_parse_test(void) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     int ret = 0; | 
					
						
							|  |  |  |     PKCS12 *p12 = NULL; | 
					
						
							|  |  |  |     EVP_PKEY *key = NULL; | 
					
						
							|  |  |  |     X509 *cert = NULL; | 
					
						
							|  |  |  |     STACK_OF(X509) *ca = NULL; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (in_file != NULL) { | 
					
						
							|  |  |  |         p12 = PKCS12_load(in_file); | 
					
						
							|  |  |  |         if (!TEST_ptr(p12)) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         if (!TEST_true(PKCS12_parse(p12, in_pass, &key, &cert, &ca))) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         if ((has_key && !TEST_ptr(key)) || (!has_key && !TEST_ptr_null(key))) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  |         if ((has_cert && !TEST_ptr(cert)) || (!has_cert && !TEST_ptr_null(cert))) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  |         if ((has_ca && !TEST_ptr(ca)) || (!has_ca && !TEST_ptr_null(ca))) | 
					
						
							|  |  |  |             goto err; | 
					
						
							| 
									
										
										
										
											2023-01-25 09:25:33 +08:00
										 |  |  |         if (has_key && !changepass(p12, key, cert, ca)) | 
					
						
							|  |  |  |             goto err; | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  |     } | 
					
						
							|  |  |  |     ret = 1; | 
					
						
							|  |  |  | err: | 
					
						
							|  |  |  |     PKCS12_free(p12); | 
					
						
							|  |  |  |     EVP_PKEY_free(key); | 
					
						
							|  |  |  |     X509_free(cert); | 
					
						
							|  |  |  |     OSSL_STACK_OF_X509_free(ca); | 
					
						
							|  |  |  |     return TEST_true(ret); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-08-19 15:46:47 +08:00
										 |  |  | static int pkcs12_create_cb(PKCS12_SAFEBAG *bag, void *cbarg) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     int cb_ret = *((int*)cbarg); | 
					
						
							|  |  |  |     return cb_ret; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static PKCS12 *pkcs12_create_ex2_setup(EVP_PKEY **key, X509 **cert, STACK_OF(X509) **ca) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     PKCS12 *p12 = NULL; | 
					
						
							|  |  |  |     p12 = PKCS12_load("out6.p12"); | 
					
						
							|  |  |  |     if (!TEST_ptr(p12)) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (!TEST_true(PKCS12_parse(p12, "", key, cert, ca))) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return p12; | 
					
						
							|  |  |  | err: | 
					
						
							|  |  |  |     PKCS12_free(p12); | 
					
						
							|  |  |  |     return NULL; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | static int pkcs12_create_ex2_test(int test) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     int ret = 0, cb_ret = 0; | 
					
						
							|  |  |  |     PKCS12 *ptr = NULL, *p12 = NULL; | 
					
						
							|  |  |  |     EVP_PKEY *key = NULL; | 
					
						
							|  |  |  |     X509 *cert = NULL; | 
					
						
							|  |  |  |     STACK_OF(X509) *ca = NULL; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     p12 = pkcs12_create_ex2_setup(&key, &cert, &ca); | 
					
						
							|  |  |  |     if (!TEST_ptr(p12)) | 
					
						
							|  |  |  |         goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (test == 0) { | 
					
						
							|  |  |  |         /* Confirm PKCS12_create_ex2 returns NULL */ | 
					
						
							|  |  |  |         ptr = PKCS12_create_ex2(NULL, NULL, NULL, | 
					
						
							|  |  |  |                                 NULL, NULL, NID_undef, NID_undef, | 
					
						
							|  |  |  |                                 0, 0, 0, | 
					
						
							| 
									
										
										
										
											2022-12-21 12:39:07 +08:00
										 |  |  |                                 testctx, NULL, | 
					
						
							| 
									
										
										
										
											2022-08-19 15:46:47 +08:00
										 |  |  |                                 NULL, NULL); | 
					
						
							|  |  |  |         if (TEST_ptr(ptr)) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         /* Can't proceed without a valid cert at least */ | 
					
						
							|  |  |  |         if (!TEST_ptr(cert)) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         /* Specified call back called - return success */ | 
					
						
							|  |  |  |         cb_ret = 1; | 
					
						
							|  |  |  |         ptr = PKCS12_create_ex2(NULL, NULL, NULL, | 
					
						
							|  |  |  |                                 cert, NULL, NID_undef, NID_undef, | 
					
						
							|  |  |  |                                 0, 0, 0, | 
					
						
							| 
									
										
										
										
											2022-12-21 12:39:07 +08:00
										 |  |  |                                 testctx, NULL, | 
					
						
							| 
									
										
										
										
											2022-08-19 15:46:47 +08:00
										 |  |  |                                 pkcs12_create_cb, (void*)&cb_ret); | 
					
						
							|  |  |  |         /* PKCS12 successfully created */ | 
					
						
							|  |  |  |         if (!TEST_ptr(ptr)) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  |     } else if (test == 1) { | 
					
						
							|  |  |  |         /* Specified call back called - return error*/ | 
					
						
							|  |  |  |         cb_ret = -1; | 
					
						
							|  |  |  |         ptr = PKCS12_create_ex2(NULL, NULL, NULL, | 
					
						
							|  |  |  |                                 cert, NULL, NID_undef, NID_undef, | 
					
						
							|  |  |  |                                 0, 0, 0, | 
					
						
							| 
									
										
										
										
											2022-12-21 12:39:07 +08:00
										 |  |  |                                 testctx, NULL, | 
					
						
							| 
									
										
										
										
											2022-08-19 15:46:47 +08:00
										 |  |  |                                 pkcs12_create_cb, (void*)&cb_ret); | 
					
						
							|  |  |  |         /* PKCS12 not created */ | 
					
						
							|  |  |  |        if (TEST_ptr(ptr)) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  |     } else if (test == 2) { | 
					
						
							|  |  |  |         /* Specified call back called - return failure */ | 
					
						
							|  |  |  |         cb_ret = 0; | 
					
						
							|  |  |  |         ptr = PKCS12_create_ex2(NULL, NULL, NULL, | 
					
						
							|  |  |  |                                 cert, NULL, NID_undef, NID_undef, | 
					
						
							|  |  |  |                                 0, 0, 0, | 
					
						
							| 
									
										
										
										
											2022-12-21 12:39:07 +08:00
										 |  |  |                                 testctx, NULL, | 
					
						
							| 
									
										
										
										
											2022-08-19 15:46:47 +08:00
										 |  |  |                                 pkcs12_create_cb, (void*)&cb_ret); | 
					
						
							|  |  |  |         /* PKCS12 successfully created */ | 
					
						
							|  |  |  |         if (!TEST_ptr(ptr)) | 
					
						
							|  |  |  |             goto err; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     ret = 1; | 
					
						
							|  |  |  | err: | 
					
						
							|  |  |  |     PKCS12_free(p12); | 
					
						
							|  |  |  |     PKCS12_free(ptr); | 
					
						
							|  |  |  |     EVP_PKEY_free(key); | 
					
						
							|  |  |  |     X509_free(cert); | 
					
						
							|  |  |  |     OSSL_STACK_OF_X509_free(ca); | 
					
						
							|  |  |  |     return TEST_true(ret); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  | typedef enum OPTION_choice { | 
					
						
							|  |  |  |     OPT_ERR = -1, | 
					
						
							|  |  |  |     OPT_EOF = 0, | 
					
						
							|  |  |  |     OPT_IN_FILE, | 
					
						
							|  |  |  |     OPT_IN_PASS, | 
					
						
							|  |  |  |     OPT_IN_HAS_KEY, | 
					
						
							|  |  |  |     OPT_IN_HAS_CERT, | 
					
						
							|  |  |  |     OPT_IN_HAS_CA, | 
					
						
							|  |  |  |     OPT_LEGACY, | 
					
						
							|  |  |  |     OPT_TEST_ENUM | 
					
						
							|  |  |  | } OPTION_CHOICE; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | const OPTIONS *test_get_options(void) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     static const OPTIONS options[] = { | 
					
						
							|  |  |  |         OPT_TEST_OPTIONS_DEFAULT_USAGE, | 
					
						
							|  |  |  |         { "in",   OPT_IN_FILE,   '<', "PKCS12 input file" }, | 
					
						
							|  |  |  |         { "pass",   OPT_IN_PASS,   's', "PKCS12 input file password" }, | 
					
						
							|  |  |  |         { "has-key",   OPT_IN_HAS_KEY,  'n', "Whether the input file does contain an user key" }, | 
					
						
							|  |  |  |         { "has-cert",   OPT_IN_HAS_CERT, 'n', "Whether the input file does contain an user certificate" }, | 
					
						
							|  |  |  |         { "has-ca",   OPT_IN_HAS_CA,   'n', "Whether the input file does contain other certificate" }, | 
					
						
							|  |  |  |         { "legacy",  OPT_LEGACY,  '-', "Test the legacy APIs" }, | 
					
						
							|  |  |  |         { NULL } | 
					
						
							|  |  |  |     }; | 
					
						
							|  |  |  |     return options; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int setup_tests(void) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     OPTION_CHOICE o; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     while ((o = opt_next()) != OPT_EOF) { | 
					
						
							|  |  |  |         switch (o) { | 
					
						
							|  |  |  |         case OPT_IN_FILE: | 
					
						
							|  |  |  |             in_file = opt_arg(); | 
					
						
							|  |  |  |             break; | 
					
						
							|  |  |  |         case OPT_IN_PASS: | 
					
						
							|  |  |  |             in_pass = opt_arg(); | 
					
						
							|  |  |  |             break; | 
					
						
							|  |  |  |         case OPT_LEGACY: | 
					
						
							|  |  |  |             break; | 
					
						
							|  |  |  |         case OPT_IN_HAS_KEY: | 
					
						
							|  |  |  |             has_key = opt_int_arg(); | 
					
						
							|  |  |  |             break; | 
					
						
							|  |  |  |         case OPT_IN_HAS_CERT: | 
					
						
							|  |  |  |             has_cert = opt_int_arg(); | 
					
						
							|  |  |  |             break; | 
					
						
							|  |  |  |         case OPT_IN_HAS_CA: | 
					
						
							|  |  |  |             has_ca = opt_int_arg(); | 
					
						
							|  |  |  |             break; | 
					
						
							|  |  |  |         case OPT_TEST_CASES: | 
					
						
							|  |  |  |             break; | 
					
						
							|  |  |  |         default: | 
					
						
							|  |  |  |             return 0; | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-21 12:39:07 +08:00
										 |  |  |     if (!test_get_libctx(&testctx, &nullprov, NULL, NULL, NULL)) { | 
					
						
							|  |  |  |         OSSL_LIB_CTX_free(testctx); | 
					
						
							|  |  |  |         testctx = NULL; | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  |         return 0; | 
					
						
							| 
									
										
										
										
											2022-12-21 12:39:07 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     ADD_TEST(test_null_args); | 
					
						
							|  |  |  |     ADD_TEST(pkcs12_parse_test); | 
					
						
							| 
									
										
										
										
											2022-08-19 15:46:47 +08:00
										 |  |  |     ADD_ALL_TESTS(pkcs12_create_ex2_test, 3); | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void cleanup_tests(void) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     OSSL_LIB_CTX_free(testctx); | 
					
						
							| 
									
										
										
										
											2022-12-21 12:39:07 +08:00
										 |  |  |     OSSL_PROVIDER_unload(nullprov); | 
					
						
							| 
									
										
										
										
											2022-03-13 13:56:13 +08:00
										 |  |  | } |