mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			303 lines
		
	
	
		
			7.9 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			303 lines
		
	
	
		
			7.9 KiB
		
	
	
	
		
			C
		
	
	
	
| /*
 | |
|  * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the Apache License 2.0 (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <string.h>
 | |
| #include <stdlib.h>
 | |
| 
 | |
| #include "internal/nelem.h"
 | |
| 
 | |
| #include <openssl/pkcs12.h>
 | |
| #include <openssl/x509.h>
 | |
| #include <openssl/x509v3.h>
 | |
| #include <openssl/pem.h>
 | |
| 
 | |
| #include "testutil.h"
 | |
| #include "helpers/pkcs12.h"
 | |
| 
 | |
| static OSSL_LIB_CTX *testctx = NULL;
 | |
| static OSSL_PROVIDER *nullprov = NULL;
 | |
| 
 | |
| static int test_null_args(void)
 | |
| {
 | |
|     return TEST_false(PKCS12_parse(NULL, NULL, NULL, NULL, NULL));
 | |
| }
 | |
| 
 | |
| static PKCS12 *PKCS12_load(const char *fpath)
 | |
| {
 | |
|     BIO *bio = NULL;
 | |
|     PKCS12 *p12 = NULL;
 | |
| 
 | |
|     bio = BIO_new_file(fpath, "rb");
 | |
|     if (!TEST_ptr(bio))
 | |
|         goto err;
 | |
| 
 | |
|     p12 = PKCS12_init_ex(NID_pkcs7_data, testctx, "provider=default");
 | |
|     if (!TEST_ptr(p12))
 | |
|         goto err;
 | |
| 
 | |
|     if (!TEST_true(p12 == d2i_PKCS12_bio(bio, &p12)))
 | |
|         goto err;
 | |
| 
 | |
|     BIO_free(bio);
 | |
| 
 | |
|     return p12;
 | |
| 
 | |
| err:
 | |
|     BIO_free(bio);
 | |
|     PKCS12_free(p12);
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| static const char *in_file = NULL;
 | |
| static const char *in_pass = "";
 | |
| static int has_key = 0;
 | |
| static int has_cert = 0;
 | |
| static int has_ca = 0;
 | |
| 
 | |
| static int changepass(PKCS12 *p12, EVP_PKEY *key, X509 *cert, STACK_OF(X509) *ca)
 | |
| {
 | |
|     int ret = 0;
 | |
|     PKCS12 *p12new = NULL;
 | |
|     EVP_PKEY *key2 = NULL;
 | |
|     X509 *cert2 = NULL;
 | |
|     STACK_OF(X509) *ca2 = NULL;
 | |
|     BIO *bio = NULL;
 | |
| 
 | |
|     if (!TEST_true(PKCS12_newpass(p12, in_pass, "NEWPASS")))
 | |
|         goto err;
 | |
|     if (!TEST_ptr(bio = BIO_new(BIO_s_mem())))
 | |
|         goto err;
 | |
|     if (!TEST_true(i2d_PKCS12_bio(bio, p12)))
 | |
|         goto err;
 | |
|     if (!TEST_ptr(p12new = PKCS12_init_ex(NID_pkcs7_data, testctx, "provider=default")))
 | |
|         goto err;
 | |
|     if (!TEST_ptr(d2i_PKCS12_bio(bio, &p12new)))
 | |
|         goto err;
 | |
|     if (!TEST_true(PKCS12_parse(p12new, "NEWPASS", &key2, &cert2, &ca2)))
 | |
|         goto err;
 | |
|     if (has_key) {
 | |
|         if (!TEST_ptr(key2) || !TEST_int_eq(EVP_PKEY_eq(key, key2), 1))
 | |
|             goto err;
 | |
|     }
 | |
|     if (has_cert) {
 | |
|         if (!TEST_ptr(cert2) || !TEST_int_eq(X509_cmp(cert, cert2), 0))
 | |
|             goto err;
 | |
|     }
 | |
|     ret = 1;
 | |
| err:
 | |
|     BIO_free(bio);
 | |
|     PKCS12_free(p12new);
 | |
|     EVP_PKEY_free(key2);
 | |
|     X509_free(cert2);
 | |
|     OSSL_STACK_OF_X509_free(ca2);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static int pkcs12_parse_test(void)
 | |
| {
 | |
|     int ret = 0;
 | |
|     PKCS12 *p12 = NULL;
 | |
|     EVP_PKEY *key = NULL;
 | |
|     X509 *cert = NULL;
 | |
|     STACK_OF(X509) *ca = NULL;
 | |
| 
 | |
|     if (in_file != NULL) {
 | |
|         p12 = PKCS12_load(in_file);
 | |
|         if (!TEST_ptr(p12))
 | |
|             goto err;
 | |
| 
 | |
|         if (!TEST_true(PKCS12_parse(p12, in_pass, &key, &cert, &ca)))
 | |
|             goto err;
 | |
| 
 | |
|         if ((has_key && !TEST_ptr(key)) || (!has_key && !TEST_ptr_null(key)))
 | |
|             goto err;
 | |
|         if ((has_cert && !TEST_ptr(cert)) || (!has_cert && !TEST_ptr_null(cert)))
 | |
|             goto err;
 | |
|         if ((has_ca && !TEST_ptr(ca)) || (!has_ca && !TEST_ptr_null(ca)))
 | |
|             goto err;
 | |
|         if (has_key && !changepass(p12, key, cert, ca))
 | |
|             goto err;
 | |
|     }
 | |
|     ret = 1;
 | |
| err:
 | |
|     PKCS12_free(p12);
 | |
|     EVP_PKEY_free(key);
 | |
|     X509_free(cert);
 | |
|     OSSL_STACK_OF_X509_free(ca);
 | |
|     return TEST_true(ret);
 | |
| }
 | |
| 
 | |
| static int pkcs12_create_cb(PKCS12_SAFEBAG *bag, void *cbarg)
 | |
| {
 | |
|     int cb_ret = *((int*)cbarg);
 | |
|     return cb_ret;
 | |
| }
 | |
| 
 | |
| static PKCS12 *pkcs12_create_ex2_setup(EVP_PKEY **key, X509 **cert, STACK_OF(X509) **ca)
 | |
| {
 | |
|     PKCS12 *p12 = NULL;
 | |
|     p12 = PKCS12_load("out6.p12");
 | |
|     if (!TEST_ptr(p12))
 | |
|         goto err;
 | |
| 
 | |
|     if (!TEST_true(PKCS12_parse(p12, "", key, cert, ca)))
 | |
|         goto err;
 | |
| 
 | |
|     return p12;
 | |
| err:
 | |
|     PKCS12_free(p12);
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| static int pkcs12_create_ex2_test(int test)
 | |
| {
 | |
|     int ret = 0, cb_ret = 0;
 | |
|     PKCS12 *ptr = NULL, *p12 = NULL;
 | |
|     EVP_PKEY *key = NULL;
 | |
|     X509 *cert = NULL;
 | |
|     STACK_OF(X509) *ca = NULL;
 | |
| 
 | |
|     p12 = pkcs12_create_ex2_setup(&key, &cert, &ca);
 | |
|     if (!TEST_ptr(p12))
 | |
|         goto err;
 | |
| 
 | |
|     if (test == 0) {
 | |
|         /* Confirm PKCS12_create_ex2 returns NULL */
 | |
|         ptr = PKCS12_create_ex2(NULL, NULL, NULL,
 | |
|                                 NULL, NULL, NID_undef, NID_undef,
 | |
|                                 0, 0, 0,
 | |
|                                 testctx, NULL,
 | |
|                                 NULL, NULL);
 | |
|         if (TEST_ptr(ptr))
 | |
|             goto err;
 | |
| 
 | |
|         /* Can't proceed without a valid cert at least */
 | |
|         if (!TEST_ptr(cert))
 | |
|             goto err;
 | |
| 
 | |
|         /* Specified call back called - return success */
 | |
|         cb_ret = 1;
 | |
|         ptr = PKCS12_create_ex2(NULL, NULL, NULL,
 | |
|                                 cert, NULL, NID_undef, NID_undef,
 | |
|                                 0, 0, 0,
 | |
|                                 testctx, NULL,
 | |
|                                 pkcs12_create_cb, (void*)&cb_ret);
 | |
|         /* PKCS12 successfully created */
 | |
|         if (!TEST_ptr(ptr))
 | |
|             goto err;
 | |
|     } else if (test == 1) {
 | |
|         /* Specified call back called - return error*/
 | |
|         cb_ret = -1;
 | |
|         ptr = PKCS12_create_ex2(NULL, NULL, NULL,
 | |
|                                 cert, NULL, NID_undef, NID_undef,
 | |
|                                 0, 0, 0,
 | |
|                                 testctx, NULL,
 | |
|                                 pkcs12_create_cb, (void*)&cb_ret);
 | |
|         /* PKCS12 not created */
 | |
|        if (TEST_ptr(ptr))
 | |
|             goto err;
 | |
|     } else if (test == 2) {
 | |
|         /* Specified call back called - return failure */
 | |
|         cb_ret = 0;
 | |
|         ptr = PKCS12_create_ex2(NULL, NULL, NULL,
 | |
|                                 cert, NULL, NID_undef, NID_undef,
 | |
|                                 0, 0, 0,
 | |
|                                 testctx, NULL,
 | |
|                                 pkcs12_create_cb, (void*)&cb_ret);
 | |
|         /* PKCS12 successfully created */
 | |
|         if (!TEST_ptr(ptr))
 | |
|             goto err;
 | |
|     }
 | |
| 
 | |
|     ret = 1;
 | |
| err:
 | |
|     PKCS12_free(p12);
 | |
|     PKCS12_free(ptr);
 | |
|     EVP_PKEY_free(key);
 | |
|     X509_free(cert);
 | |
|     OSSL_STACK_OF_X509_free(ca);
 | |
|     return TEST_true(ret);
 | |
| }
 | |
| 
 | |
| typedef enum OPTION_choice {
 | |
|     OPT_ERR = -1,
 | |
|     OPT_EOF = 0,
 | |
|     OPT_IN_FILE,
 | |
|     OPT_IN_PASS,
 | |
|     OPT_IN_HAS_KEY,
 | |
|     OPT_IN_HAS_CERT,
 | |
|     OPT_IN_HAS_CA,
 | |
|     OPT_LEGACY,
 | |
|     OPT_TEST_ENUM
 | |
| } OPTION_CHOICE;
 | |
| 
 | |
| const OPTIONS *test_get_options(void)
 | |
| {
 | |
|     static const OPTIONS options[] = {
 | |
|         OPT_TEST_OPTIONS_DEFAULT_USAGE,
 | |
|         { "in",   OPT_IN_FILE,   '<', "PKCS12 input file" },
 | |
|         { "pass",   OPT_IN_PASS,   's', "PKCS12 input file password" },
 | |
|         { "has-key",   OPT_IN_HAS_KEY,  'n', "Whether the input file does contain an user key" },
 | |
|         { "has-cert",   OPT_IN_HAS_CERT, 'n', "Whether the input file does contain an user certificate" },
 | |
|         { "has-ca",   OPT_IN_HAS_CA,   'n', "Whether the input file does contain other certificate" },
 | |
|         { "legacy",  OPT_LEGACY,  '-', "Test the legacy APIs" },
 | |
|         { NULL }
 | |
|     };
 | |
|     return options;
 | |
| }
 | |
| 
 | |
| int setup_tests(void)
 | |
| {
 | |
|     OPTION_CHOICE o;
 | |
| 
 | |
|     while ((o = opt_next()) != OPT_EOF) {
 | |
|         switch (o) {
 | |
|         case OPT_IN_FILE:
 | |
|             in_file = opt_arg();
 | |
|             break;
 | |
|         case OPT_IN_PASS:
 | |
|             in_pass = opt_arg();
 | |
|             break;
 | |
|         case OPT_LEGACY:
 | |
|             break;
 | |
|         case OPT_IN_HAS_KEY:
 | |
|             has_key = opt_int_arg();
 | |
|             break;
 | |
|         case OPT_IN_HAS_CERT:
 | |
|             has_cert = opt_int_arg();
 | |
|             break;
 | |
|         case OPT_IN_HAS_CA:
 | |
|             has_ca = opt_int_arg();
 | |
|             break;
 | |
|         case OPT_TEST_CASES:
 | |
|             break;
 | |
|         default:
 | |
|             return 0;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if (!test_get_libctx(&testctx, &nullprov, NULL, NULL, NULL)) {
 | |
|         OSSL_LIB_CTX_free(testctx);
 | |
|         testctx = NULL;
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     ADD_TEST(test_null_args);
 | |
|     ADD_TEST(pkcs12_parse_test);
 | |
|     ADD_ALL_TESTS(pkcs12_create_ex2_test, 3);
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| void cleanup_tests(void)
 | |
| {
 | |
|     OSSL_LIB_CTX_free(testctx);
 | |
|     OSSL_PROVIDER_unload(nullprov);
 | |
| }
 |