summaryrefslogtreecommitdiff
path: root/regress/lib/libcrypto
diff options
context:
space:
mode:
authorJoel Sing <jsing@cvs.openbsd.org>2020-07-14 18:33:01 +0000
committerJoel Sing <jsing@cvs.openbsd.org>2020-07-14 18:33:01 +0000
commit8be30c46593f433306623ec79bcdcaf0071ab4d9 (patch)
treee1a13f907d539fb02fdab2bf76d8322af06582fa /regress/lib/libcrypto
parent2677a945a2c5fd9d2f809c6345d8f72f01cb6c98 (diff)
Add regress for X509_verify() using the new bundles.
A number of these tests are known to fail due to bugs/incorrect verification implementation.
Diffstat (limited to 'regress/lib/libcrypto')
-rw-r--r--regress/lib/libcrypto/x509/Makefile9
-rw-r--r--regress/lib/libcrypto/x509/verify.c363
2 files changed, 369 insertions, 3 deletions
diff --git a/regress/lib/libcrypto/x509/Makefile b/regress/lib/libcrypto/x509/Makefile
index 19edf9398b8..885a3211ec1 100644
--- a/regress/lib/libcrypto/x509/Makefile
+++ b/regress/lib/libcrypto/x509/Makefile
@@ -1,14 +1,17 @@
-# $OpenBSD: Makefile,v 1.2 2020/06/04 21:21:03 schwarze Exp $
+# $OpenBSD: Makefile,v 1.3 2020/07/14 18:33:00 jsing Exp $
-PROGS = x509attribute x509name
+PROGS = verify x509attribute x509name
LDADD= -lcrypto
DPADD= ${LIBCRYPTO}
WARNINGS= Yes
CFLAGS+= -Wall -Werror
-REGRESS_TARGETS=regress-x509attribute regress-x509name
+REGRESS_TARGETS=regress-verify regress-x509attribute regress-x509name
CLEANFILES+= x509name.result
+regress-verify: verify
+ ./verify ${.CURDIR}/../certs
+
regress-x509attribute: x509attribute
./x509attribute
diff --git a/regress/lib/libcrypto/x509/verify.c b/regress/lib/libcrypto/x509/verify.c
new file mode 100644
index 00000000000..08ca0b24ff7
--- /dev/null
+++ b/regress/lib/libcrypto/x509/verify.c
@@ -0,0 +1,363 @@
+/* $OpenBSD: verify.c,v 1.1 2020/07/14 18:33:00 jsing Exp $ */
+/*
+ * Copyright (c) 2020 Joel Sing <jsing@openbsd.org>
+ *
+ * Permission to use, copy, modify, and distribute this software for any
+ * purpose with or without fee is hereby granted, provided that the above
+ * copyright notice and this permission notice appear in all copies.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
+ * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
+ * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
+ * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
+ */
+
+#include <err.h>
+#include <string.h>
+
+#include <openssl/bio.h>
+#include <openssl/err.h>
+#include <openssl/pem.h>
+#include <openssl/x509.h>
+#include <openssl/x509v3.h>
+
+static int verbose = 1;
+
+static int
+passwd_cb(char *buf, int size, int rwflag, void *u)
+{
+ memset(buf, 0, size);
+ return (0);
+}
+
+static int
+certs_from_file(const char *filename, STACK_OF(X509) **certs)
+{
+ STACK_OF(X509_INFO) *xis = NULL;
+ STACK_OF(X509) *xs = NULL;
+ BIO *bio = NULL;
+ X509 *x;
+ int i;
+
+ if ((xs = sk_X509_new_null()) == NULL)
+ errx(1, "failed to create X509 stack");
+ if ((bio = BIO_new_file(filename, "r")) == NULL) {
+ ERR_print_errors_fp(stderr);
+ errx(1, "failed to create bio");
+ }
+ if ((xis = PEM_X509_INFO_read_bio(bio, NULL, passwd_cb, NULL)) == NULL)
+ errx(1, "failed to read PEM");
+
+ for (i = 0; i < sk_X509_INFO_num(xis); i++) {
+ if ((x = sk_X509_INFO_value(xis, i)->x509) == NULL)
+ continue;
+ if (!sk_X509_push(xs, x))
+ errx(1, "failed to push X509");
+ X509_up_ref(x);
+ }
+
+ *certs = xs;
+ xs = NULL;
+
+ sk_X509_INFO_pop_free(xis, X509_INFO_free);
+ sk_X509_pop_free(xs, X509_free);
+ BIO_free(bio);
+
+ return 1;
+}
+
+static int
+verify_cert_cb(int ok, X509_STORE_CTX *xsc)
+{
+ X509 *current_cert;
+ int verify_err;
+
+ current_cert = X509_STORE_CTX_get_current_cert(xsc);
+ if (current_cert != NULL) {
+ X509_NAME_print_ex_fp(stderr,
+ X509_get_subject_name(current_cert), 0,
+ XN_FLAG_ONELINE);
+ fprintf(stderr, "\n");
+ }
+
+ verify_err = X509_STORE_CTX_get_error(xsc);
+ if (verify_err != X509_V_OK) {
+ fprintf(stderr, "verify error at depth %d: %s\n",
+ X509_STORE_CTX_get_error_depth(xsc),
+ X509_verify_cert_error_string(verify_err));
+ }
+
+ return ok;
+}
+
+static void
+verify_cert(const char *roots_file, const char *bundle_file, int *chains)
+{
+ STACK_OF(X509) *roots = NULL, *bundle = NULL;
+ X509_STORE_CTX *xsc = NULL;
+ X509 *leaf = NULL;
+ int verify_err;
+
+ *chains = 0;
+
+ if (!certs_from_file(roots_file, &roots))
+ errx(1, "failed to load roots from '%s'", roots_file);
+ if (!certs_from_file(bundle_file, &bundle))
+ errx(1, "failed to load bundle from '%s'", bundle_file);
+ if (sk_X509_num(bundle) < 1)
+ errx(1, "not enough certs in bundle");
+ leaf = sk_X509_shift(bundle);
+
+ if ((xsc = X509_STORE_CTX_new()) == NULL)
+ errx(1, "X509_STORE_CTX");
+ if (!X509_STORE_CTX_init(xsc, NULL, leaf, bundle)) {
+ ERR_print_errors_fp(stderr);
+ errx(1, "failed to init store context");
+ }
+ if (verbose)
+ X509_STORE_CTX_set_verify_cb(xsc, verify_cert_cb);
+ X509_STORE_CTX_set0_trusted_stack(xsc, roots);
+ if (X509_verify_cert(xsc) == 1) {
+ *chains = 1; /* XXX */
+ goto done;
+ }
+
+ verify_err = X509_STORE_CTX_get_error(xsc);
+ fprintf(stderr, "failed to verify at %d: %s\n",
+ X509_STORE_CTX_get_error_depth(xsc),
+ X509_verify_cert_error_string(verify_err));
+
+ done:
+ sk_X509_pop_free(roots, X509_free);
+ sk_X509_pop_free(bundle, X509_free);
+ X509_STORE_CTX_free(xsc);
+ X509_free(leaf);
+}
+
+struct verify_cert_test {
+ const char *id;
+ int want_chains;
+ int failing;
+};
+
+struct verify_cert_test verify_cert_tests[] = {
+ {
+ .id = "1a",
+ .want_chains = 1,
+ },
+ {
+ .id = "2a",
+ .want_chains = 1,
+ },
+ {
+ .id = "2b",
+ .want_chains = 0,
+ },
+ {
+ .id = "3a",
+ .want_chains = 1,
+ },
+ {
+ .id = "3b",
+ .want_chains = 0,
+ },
+ {
+ .id = "3c",
+ .want_chains = 0,
+ },
+ {
+ .id = "3d",
+ .want_chains = 0,
+ },
+ {
+ .id = "3e",
+ .want_chains = 1,
+ },
+ {
+ .id = "4a",
+ .want_chains = 2,
+ },
+ {
+ .id = "4b",
+ .want_chains = 1,
+ },
+ {
+ .id = "4c",
+ .want_chains = 1,
+ .failing = 1,
+ },
+ {
+ .id = "4d",
+ .want_chains = 1,
+ },
+ {
+ .id = "4e",
+ .want_chains = 1,
+ },
+ {
+ .id = "4f",
+ .want_chains = 2,
+ },
+ {
+ .id = "4g",
+ .want_chains = 1,
+ .failing = 1,
+ },
+ {
+ .id = "4h",
+ .want_chains = 1,
+ },
+ {
+ .id = "5a",
+ .want_chains = 2,
+ },
+ {
+ .id = "5b",
+ .want_chains = 1,
+ .failing = 1,
+ },
+ {
+ .id = "5c",
+ .want_chains = 1,
+ },
+ {
+ .id = "5d",
+ .want_chains = 1,
+ },
+ {
+ .id = "5e",
+ .want_chains = 1,
+ .failing = 1,
+ },
+ {
+ .id = "5f",
+ .want_chains = 1,
+ },
+ {
+ .id = "5g",
+ .want_chains = 2,
+ },
+ {
+ .id = "5h",
+ .want_chains = 1,
+ },
+ {
+ .id = "5i",
+ .want_chains = 1,
+ .failing = 1,
+ },
+ {
+ .id = "6a",
+ .want_chains = 1,
+ },
+ {
+ .id = "6b",
+ .want_chains = 1,
+ .failing = 1,
+ },
+ {
+ .id = "7a",
+ .want_chains = 1,
+ .failing = 1,
+ },
+ {
+ .id = "7b",
+ .want_chains = 1,
+ },
+ {
+ .id = "8a",
+ .want_chains = 0,
+ },
+ {
+ .id = "9a",
+ .want_chains = 0,
+ },
+ {
+ .id = "10a",
+ .want_chains = 1,
+ },
+ {
+ .id = "10b",
+ .want_chains = 1,
+ },
+ {
+ .id = "11a",
+ .want_chains = 1,
+ .failing = 1,
+ },
+ {
+ .id = "11b",
+ .want_chains = 1,
+ },
+ {
+ .id = "12a",
+ .want_chains = 1,
+ },
+ {
+ .id = "13a",
+ .want_chains = 1,
+ },
+};
+
+#define N_VERIFY_CERT_TESTS \
+ (sizeof(verify_cert_tests) / sizeof(*verify_cert_tests))
+
+static int
+verify_cert_test(const char *certs_path)
+{
+ char *roots_file, *bundle_file;
+ struct verify_cert_test *vct;
+ int failed = 0;
+ int chains;
+ size_t i;
+
+ for (i = 0; i < N_VERIFY_CERT_TESTS; i++) {
+ vct = &verify_cert_tests[i];
+
+ if (asprintf(&roots_file, "%s/%s/roots.pem", certs_path,
+ vct->id) == -1)
+ errx(1, "asprintf");
+ if (asprintf(&bundle_file, "%s/%s/bundle.pem", certs_path,
+ vct->id) == -1)
+ errx(1, "asprintf");
+
+ fprintf(stderr, "== Test %zu (%s)\n", i, vct->id);
+ verify_cert(roots_file, bundle_file, &chains);
+ if ((chains == 0 && vct->want_chains == 0) ||
+ (chains == 1 && vct->want_chains > 0)) {
+ fprintf(stderr, "INFO: Succeeded with %d chains%s\n",
+ chains, vct->failing ? " (known failure)" : "");
+ if (vct->failing)
+ failed |= 1;
+ } else {
+ fprintf(stderr, "FAIL: Failed with %d chains%s\n",
+ chains, vct->failing ? " (known failure)" : "");
+ if (!vct->failing)
+ failed |= 1;
+ }
+ fprintf(stderr, "\n");
+
+ free(roots_file);
+ free(bundle_file);
+ }
+
+ return failed;
+}
+
+int
+main(int argc, char **argv)
+{
+ int failed = 0;
+
+ if (argc != 2) {
+ fprintf(stderr, "usage: %s <certs_path>\n", argv[0]);
+ exit(1);
+ }
+
+ failed |= verify_cert_test(argv[1]);
+
+ return (failed);
+}