mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			184 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			184 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			C
		
	
	
	
| /*
 | |
|  * Copyright 2020 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  * Copyright Siemens AG 2020
 | |
|  *
 | |
|  * Licensed under the Apache License 2.0 (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| #include <openssl/http.h>
 | |
| #include <openssl/pem.h>
 | |
| #include <openssl/x509v3.h>
 | |
| #include <string.h>
 | |
| 
 | |
| #include "testutil.h"
 | |
| 
 | |
| DEFINE_STACK_OF(CONF_VALUE)
 | |
| 
 | |
| static const ASN1_ITEM *x509_it = NULL;
 | |
| static X509 *x509 = NULL;
 | |
| #define SERVER "mock.server"
 | |
| #define PORT   "81"
 | |
| #define RPATH  "path/any.crt"
 | |
| static const char *rpath;
 | |
| 
 | |
| static X509 *load_pem_cert(const char *file)
 | |
| {
 | |
|     X509 *cert = NULL;
 | |
|     BIO *bio = NULL;
 | |
| 
 | |
|     if (!TEST_ptr(bio = BIO_new(BIO_s_file())))
 | |
|         return NULL;
 | |
|     if (TEST_int_gt(BIO_read_filename(bio, file), 0))
 | |
|         (void)TEST_ptr(cert = PEM_read_bio_X509(bio, NULL, NULL, NULL));
 | |
| 
 | |
|     BIO_free(bio);
 | |
|     return cert;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * pretty trivial HTTP mock server:
 | |
|  * for POST, copy request headers+body from mem BIO 'in' as response to 'out'
 | |
|  * for GET, first redirect the request then respond with 'rsp' of ASN1 type 'it'
 | |
|  */
 | |
| static int mock_http_server(BIO *in, BIO *out,
 | |
|                             ASN1_VALUE *rsp, const ASN1_ITEM *it)
 | |
| {
 | |
|     const char *req;
 | |
|     long count = BIO_get_mem_data(in, (unsigned char **)&req);
 | |
|     const char *hdr = (char *)req;
 | |
|     int is_get = count >= 4 && strncmp(hdr, "GET ", 4) == 0;
 | |
|     int len;
 | |
| 
 | |
|     /* first line should contain "<GET or POST> <rpath> HTTP/1.x" */
 | |
|     if (is_get)
 | |
|         hdr += 4;
 | |
|     else if (TEST_true(count >= 5 && strncmp(hdr, "POST ", 5) == 0))
 | |
|         hdr += 5;
 | |
|     else
 | |
|         return 0;
 | |
| 
 | |
|     while (*rpath == '/')
 | |
|         rpath++;
 | |
|     while (*hdr == '/')
 | |
|         hdr++;
 | |
|     len = strlen(rpath);
 | |
|     if (!TEST_strn_eq(hdr, rpath, len) || !TEST_char_eq(hdr++[len], ' '))
 | |
|         return 0;
 | |
|     hdr += len;
 | |
|     len = strlen("HTTP/1.");
 | |
|     if (!TEST_strn_eq(hdr, "HTTP/1.", len))
 | |
|         return 0;
 | |
|     hdr += len;
 | |
|     /* check for HTTP version 1.0 .. 1.1 */
 | |
|     if (!TEST_char_le('0', *hdr) || !TEST_char_le(*hdr++, '1'))
 | |
|         return 0;
 | |
|     if (!TEST_char_eq(*hdr++, '\r') || !TEST_char_eq(*hdr++, '\n'))
 | |
|         return 0;
 | |
|     count -= (hdr - req);
 | |
|     if (count <= 0 || out == NULL)
 | |
|         return 0;
 | |
| 
 | |
|     if (is_get && strcmp(rpath, RPATH) == 0) {
 | |
|         rpath = "path/new.crt";
 | |
|         return BIO_printf(out, "HTTP/1.1 301 Moved Permanently\r\n"
 | |
|                           "Location: /%s\r\n\r\n", rpath) > 0; /* same server */
 | |
|     }
 | |
|     if (BIO_printf(out, "HTTP/1.1 200 OK\r\n") <= 0)
 | |
|         return 0;
 | |
|     if (is_get) { /* construct new header and body */
 | |
|         if ((len = ASN1_item_i2d(rsp, NULL, it)) <= 0)
 | |
|             return 0;
 | |
|         if (BIO_printf(out, "Content-Type: application/x-x509-ca-cert\r\n"
 | |
|                        "Content-Length: %d\r\n\r\n", len) <= 0)
 | |
|             return 0;
 | |
|         return ASN1_item_i2d_bio(it, out, rsp);
 | |
|     } else {
 | |
|         return BIO_write(out, hdr, count) == count; /* echo header and body */
 | |
|     }
 | |
| }
 | |
| 
 | |
| static long http_bio_cb_ex(BIO *bio, int oper, const char *argp, size_t len,
 | |
|                            int cmd, long argl, int ret, size_t *processed)
 | |
| {
 | |
| 
 | |
|     if (oper == (BIO_CB_CTRL | BIO_CB_RETURN) && cmd == BIO_CTRL_FLUSH)
 | |
|         ret = mock_http_server(bio, (BIO *)BIO_get_callback_arg(bio),
 | |
|                                (ASN1_VALUE *)x509, x509_it);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static int test_http_x509(int do_get)
 | |
| {
 | |
|     X509 *rcert = NULL;
 | |
|     BIO *wbio = BIO_new(BIO_s_mem());
 | |
|     BIO *rbio = BIO_new(BIO_s_mem());
 | |
|     STACK_OF(CONF_VALUE) *headers = NULL;
 | |
|     int res = 0;
 | |
| 
 | |
|     if (wbio == NULL || rbio == NULL)
 | |
|         goto err;
 | |
|     BIO_set_callback_ex(wbio, http_bio_cb_ex);
 | |
|     BIO_set_callback_arg(wbio, (char *)rbio);
 | |
| 
 | |
|     rpath = RPATH;
 | |
|     rcert = (X509 *)
 | |
|         (do_get ?
 | |
|          OSSL_HTTP_get_asn1("http://"SERVER":"PORT"/"RPATH,
 | |
|                             NULL /* proxy */, NULL /* no_proxy */,
 | |
|                             wbio, rbio, NULL /* bio_update_fn */, NULL,
 | |
|                             headers, 0 /* maxline */,
 | |
|                             0 /* max_resp_len */, 0 /* timeout */,
 | |
|                             "application/x-x509-ca-cert", x509_it)
 | |
|          :
 | |
|          OSSL_HTTP_post_asn1(SERVER, PORT, RPATH, 0 /* use_ssl */,
 | |
|                              NULL /* proxy */, NULL /* no_proxy */,
 | |
|                              wbio, rbio, NULL /* bio_update_fn */, NULL,
 | |
|                              headers, "application/x-x509-ca-cert",
 | |
|                              (ASN1_VALUE *)x509, x509_it, 0 /* maxline */,
 | |
|                              0 /* max_resp_len */, 0 /* timeout */,
 | |
|                              "application/x-x509-ca-cert", x509_it)
 | |
|          );
 | |
|     res = TEST_ptr(rcert) && TEST_int_eq(X509_cmp(x509, rcert), 0);
 | |
| 
 | |
|  err:
 | |
|     X509_free(rcert);
 | |
|     BIO_free(wbio);
 | |
|     BIO_free(rbio);
 | |
|     sk_CONF_VALUE_pop_free(headers, X509V3_conf_free);
 | |
|     return res;
 | |
| }
 | |
| 
 | |
| static int test_http_get_x509(void)
 | |
| {
 | |
|     return test_http_x509(1);
 | |
| }
 | |
| 
 | |
| static int test_http_post_x509(void)
 | |
| {
 | |
|     return test_http_x509(0);
 | |
| }
 | |
| 
 | |
| void cleanup_tests(void)
 | |
| {
 | |
|     X509_free(x509);
 | |
| }
 | |
| 
 | |
| int setup_tests(void)
 | |
| {
 | |
|     if (!test_skip_common_options()) {
 | |
|         TEST_error("Error parsing test options\n");
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     x509_it = ASN1_ITEM_rptr(X509);
 | |
|     if (!TEST_ptr((x509 = load_pem_cert(test_get_argument(0)))))
 | |
|         return 1;
 | |
| 
 | |
|     ADD_TEST(test_http_get_x509);
 | |
|     ADD_TEST(test_http_post_x509);
 | |
|     return 1;
 | |
| }
 |