blob: f349ca608eafd3e0dfb65e6740ca5cd2db50c454 [file] [log] [blame]
Jens Wiklander29326472018-04-20 11:22:15 +02001// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2018, Linaro Limited */
3
4#include "xtest_test.h"
5#include "xtest_helpers.h"
6
Jens Wiklander97d6e292018-04-23 13:00:31 +02007#include <stdarg.h>
8#include <stdio.h>
9#include <stdlib.h>
10#include <string.h>
Jens Wiklander29326472018-04-20 11:22:15 +020011#include <ta_crypt.h>
12#include <tee_api_types.h>
Jens Wiklander950ea1c2018-04-30 15:39:22 +020013#include <adbg.h>
14
15#ifdef OPENSSL_FOUND
16#include <openssl/x509_vfy.h>
17#include <openssl/pem.h>
18#include <openssl/err.h>
19#include <openssl/crypto.h>
20#endif
Jens Wiklander97d6e292018-04-23 13:00:31 +020021
22#include "regression_8100_ca_crt.h"
23#include "regression_8100_mid_crt.h"
24#include "regression_8100_my_crt.h"
Jens Wiklander950ea1c2018-04-30 15:39:22 +020025#include "regression_8100_my_csr.h"
Jens Wiklander97d6e292018-04-23 13:00:31 +020026
27#ifdef CFG_TA_MBEDTLS
Jens Wiklander29326472018-04-20 11:22:15 +020028
29static void test_8101(ADBG_Case_t *c __maybe_unused)
30{
31#ifdef CFG_TA_MBEDTLS_SELF_TEST
Etienne Carrieree4ec9e42019-03-28 13:30:21 +010032 TEEC_Session session = { };
33 uint32_t ret_orig = 0;
Jens Wiklander29326472018-04-20 11:22:15 +020034
35 if (!ADBG_EXPECT_TEEC_SUCCESS(c, xtest_teec_open_session(
36 &session, &crypt_user_ta_uuid,
37 NULL, &ret_orig)))
38 return;
39 ADBG_EXPECT_TEEC_SUCCESS(c,
40 TEEC_InvokeCommand(&session, TA_CRYPT_CMD_MBEDTLS_SELF_TESTS,
41 NULL, &ret_orig));
42 TEEC_CloseSession(&session);
43#else
44 Do_ADBG_Log("CFG_TA_MBEDTLS_SELF_TEST not set, test skipped");
45#endif
46}
47ADBG_CASE_DEFINE(regression, 8101, test_8101, "TA mbedTLS self tests");
Jens Wiklander97d6e292018-04-23 13:00:31 +020048
49static int __printf(2, 3) myasprintf(char **strp, const char *fmt, ...)
50{
51 char *str = NULL;
52 int rc = 0;
53 va_list ap;
54
55 va_start(ap, fmt);
56 rc = vsnprintf(str, rc, fmt, ap);
57 if (rc <= 0)
58 goto out;
59
60 str = malloc(rc);
61 if (!str) {
62 rc = -1;
63 goto out;
64 }
65
66 rc = vsnprintf(str, rc, fmt, ap);
67 if (rc <= 0)
68 free(str);
69 else
70 *strp = str;
71
72out:
73 va_end(ap);
74 return rc;
75}
76
77static void test_8102(ADBG_Case_t *c)
78{
Etienne Carrieree4ec9e42019-03-28 13:30:21 +010079 TEEC_Session session = { };
Jens Wiklander97d6e292018-04-23 13:00:31 +020080 TEEC_Operation op = TEEC_OPERATION_INITIALIZER;
Etienne Carrieree4ec9e42019-03-28 13:30:21 +010081 uint32_t ret_orig = 0;
Jens Wiklander97d6e292018-04-23 13:00:31 +020082 char *chain = NULL;
83 int clen = 0;
84 char *trust = NULL;
Etienne Carrieree4ec9e42019-03-28 13:30:21 +010085 int tlen = 0;
Jens Wiklander97d6e292018-04-23 13:00:31 +020086
87 if (!ADBG_EXPECT_TEEC_SUCCESS(c, xtest_teec_open_session(
88 &session, &crypt_user_ta_uuid,
89 NULL, &ret_orig)))
90 return;
91
92 clen = myasprintf(&chain, "%*s\n%*s",
Ricardo Salveti78ec4e92019-06-26 17:32:11 -030093 (int)regression_8100_my_crt_size,
Jens Wiklander97d6e292018-04-23 13:00:31 +020094 regression_8100_my_crt,
Ricardo Salveti78ec4e92019-06-26 17:32:11 -030095 (int)regression_8100_mid_crt_size,
Jens Wiklander97d6e292018-04-23 13:00:31 +020096 regression_8100_mid_crt);
97 if (!ADBG_EXPECT_COMPARE_SIGNED(c, clen, !=, -1))
98 goto out;
Ricardo Salveti78ec4e92019-06-26 17:32:11 -030099 tlen = myasprintf(&trust, "%*s", (int)regression_8100_ca_crt_size,
Jens Wiklander97d6e292018-04-23 13:00:31 +0200100 regression_8100_ca_crt);
101 if (!ADBG_EXPECT_COMPARE_SIGNED(c, tlen, !=, -1))
102 goto out;
103
104 op.params[0].tmpref.buffer = chain;
105 op.params[0].tmpref.size = clen;
106 op.params[1].tmpref.buffer = trust;
107 op.params[1].tmpref.size = tlen;
108 op.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_TEMP_INPUT,
109 TEEC_MEMREF_TEMP_INPUT,
110 TEEC_NONE, TEEC_NONE);
111
112 ADBG_EXPECT_TEEC_SUCCESS(c,
113 TEEC_InvokeCommand(&session, TA_CRYPT_CMD_MBEDTLS_CHECK_CERT,
114 &op, &ret_orig));
115out:
116 free(chain);
117 free(trust);
118 TEEC_CloseSession(&session);
119}
120ADBG_CASE_DEFINE(regression, 8102, test_8102, "TA mbedTLS test cert chain");
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200121
122#ifdef OPENSSL_FOUND
123static void osslerr(void)
124{
125 while (true) {
Etienne Carrieree4ec9e42019-03-28 13:30:21 +0100126 unsigned long e = 0;
127 char b[256] = { };
128 const char *f = NULL;
129 int l = 0;
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200130
131 e = ERR_get_error_line(&f, &l);
132 if (!e)
133 return;
134 ERR_error_string_n(e, b, sizeof(b));
135 Do_ADBG_Log("%s:%d \"%s\"", f, l, b);
136 }
137}
138
139static bool get_cert(ADBG_Case_t *c, const char *crt_str, X509 **crt)
140{
141 bool ret = false;
142 size_t slen = strlen(crt_str) + 1;
143 BIO *buf = BIO_new(BIO_s_mem());
Etienne Carrieree4ec9e42019-03-28 13:30:21 +0100144 size_t b = 0;
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200145
146 if (!ADBG_EXPECT_NOT_NULL(c, buf))
147 goto out;
148
149 b = BIO_write(buf, crt_str, slen);
150 if (!ADBG_EXPECT_COMPARE_UNSIGNED(c, b, ==, slen))
151 goto out;
152
153 if (!PEM_read_bio_X509(buf, crt, 0, NULL))
154 goto out;
155
156 ret = true;
157out:
158 if (!ret)
159 osslerr();
160 BIO_free(buf);
161 return ret;
162}
163
164static bool push_cert(ADBG_Case_t *c, const char *crt_str, STACK_OF(X509) *cs)
165{
166 X509 *crt = NULL;
Etienne Carrieree4ec9e42019-03-28 13:30:21 +0100167 int rc = 0;
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200168
169 if (!get_cert(c, crt_str, &crt))
170 return false;
171 rc = sk_X509_push(cs, crt);
172 if (!ADBG_EXPECT_COMPARE_SIGNED(c, rc, >, 0)) {
173 osslerr();
174 X509_free(crt);
175 return false;
176 }
177
178 return true;
179}
180
181static bool check(ADBG_Case_t *c, STACK_OF(X509) *trusted,
182 STACK_OF(X509) *untrusted, X509 *crt)
183{
184 bool ret = false;
185 X509_STORE *store = NULL;
186 X509_STORE_CTX *csc = NULL;
187 X509_VERIFY_PARAM *pm = NULL;
Etienne Carrieree4ec9e42019-03-28 13:30:21 +0100188 int i = 0;
189 time_t vfy_time = 0;
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200190
191 pm = X509_VERIFY_PARAM_new();
192 vfy_time = 1526898005; /* Mon, 21 May 2018 10:20:05 +0000 */
193 X509_VERIFY_PARAM_set_time(pm, vfy_time);
194
195 store = X509_STORE_new();
196 if (!ADBG_EXPECT_NOT_NULL(c, store))
197 goto out;
198 X509_STORE_set_flags(store, 0);
199 if (!ADBG_EXPECT_TRUE(c, X509_STORE_set1_param(store, pm)))
200 goto out;
201
202 csc = X509_STORE_CTX_new();
203 if (!ADBG_EXPECT_NOT_NULL(c, csc))
204 goto out;
205
206 if (!ADBG_EXPECT_TRUE(c, X509_STORE_CTX_init(csc, store, crt,
207 untrusted)))
208 goto out;
209 X509_STORE_CTX_trusted_stack(csc, trusted);
210
211 i = X509_verify_cert(csc);
212 if (!ADBG_EXPECT_COMPARE_SIGNED(c, i, >, 0))
213 goto out;
214 i = X509_STORE_CTX_get_error(csc);
215 if (!ADBG_EXPECT_COMPARE_SIGNED(c, i, ==, X509_V_OK))
216 goto out;
217 ret = true;
218out:
219 if (!ret)
220 osslerr();
221 X509_VERIFY_PARAM_free(pm);
222 X509_STORE_free(store);
223 X509_STORE_CTX_free(csc);
224 return ret;
225}
226
227static bool verify_cert(ADBG_Case_t *c, const char *ca, const char *mid,
228 const char *cert)
229{
230 bool ret = false;
231 STACK_OF(X509) *trusted = NULL;
232 STACK_OF(X509) *untrusted = NULL;
233 X509 *crt = NULL;
234
235 trusted = sk_X509_new_null();
236 if (!ADBG_EXPECT_NOT_NULL(c, trusted))
237 goto out;
238 untrusted = sk_X509_new_null();
239 if (!ADBG_EXPECT_NOT_NULL(c, untrusted))
240 goto out;
241
242 if (!ADBG_EXPECT_TRUE(c, get_cert(c, cert, &crt)))
243 goto out;
244 if (!ADBG_EXPECT_TRUE(c, push_cert(c, mid, untrusted)))
245 goto out;
246 if (!ADBG_EXPECT_TRUE(c, push_cert(c, ca, trusted)))
247 goto out;
248
249 ret = ADBG_EXPECT_TRUE(c, check(c, trusted, untrusted, crt));
250out:
251 if (!ret)
252 osslerr();
253 X509_free(crt);
254 sk_X509_pop_free(untrusted, X509_free);
255 sk_X509_pop_free(trusted, X509_free);
256 return ret;
257}
258#else /*!OPENSSL_FOUND*/
Jerome Forissier659e2212020-10-27 18:39:05 +0100259static bool verify_cert(ADBG_Case_t *c, const char *ca,
260 const char *mid, const char *cert)
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200261{
262 Do_ADBG_Log("OpenSSL not available, skipping certificate verification");
263 return true;
264}
265#endif
266
267static void test_8103(ADBG_Case_t *c)
268{
Etienne Carrieree4ec9e42019-03-28 13:30:21 +0100269 TEEC_Result res = TEEC_ERROR_GENERIC;
270 TEEC_Session session = { };
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200271 TEEC_Operation op = TEEC_OPERATION_INITIALIZER;
Etienne Carrieree4ec9e42019-03-28 13:30:21 +0100272 uint32_t ret_orig = 0;
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200273 char *csr = NULL;
274 int clen = 0;
275 char cert[2048];
276 char chain[4096];
277 char *ca = NULL;
278
279 if (!ADBG_EXPECT_TEEC_SUCCESS(c, xtest_teec_open_session(
280 &session, &crypt_user_ta_uuid,
281 NULL, &ret_orig)))
282 return;
283
Ricardo Salveti78ec4e92019-06-26 17:32:11 -0300284 clen = myasprintf(&csr, "%*s", (int)regression_8100_my_csr_size,
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200285 regression_8100_my_csr);
286 if (!ADBG_EXPECT_COMPARE_SIGNED(c, clen, >=, 0))
287 goto out;
288 op.params[0].tmpref.buffer = csr;
289 op.params[0].tmpref.size = clen;
290 op.params[1].tmpref.buffer = cert;
291 op.params[1].tmpref.size = sizeof(cert);
292 op.params[2].tmpref.buffer = chain;
293 op.params[2].tmpref.size = sizeof(chain);
294 op.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_TEMP_INPUT,
295 TEEC_MEMREF_TEMP_OUTPUT,
296 TEEC_MEMREF_TEMP_OUTPUT, TEEC_NONE);
297 res = TEEC_InvokeCommand(&session, TA_CRYPT_CMD_MBEDTLS_SIGN_CERT, &op,
298 &ret_orig);
299 if (!ADBG_EXPECT_TEEC_SUCCESS(c, res))
300 goto out;
301
Ricardo Salveti78ec4e92019-06-26 17:32:11 -0300302 myasprintf(&ca, "%*s", (int)regression_8100_ca_crt_size,
Jens Wiklander950ea1c2018-04-30 15:39:22 +0200303 regression_8100_ca_crt);
304 if (!ADBG_EXPECT_NOT_NULL(c, ca))
305 goto out;
306 verify_cert(c, ca, op.params[2].tmpref.buffer,
307 op.params[1].tmpref.buffer);
308out:
309 free(ca);
310 free(csr);
311 TEEC_CloseSession(&session);
312}
313ADBG_CASE_DEFINE(regression, 8103, test_8103,
314 "TA mbedTLS process certificate request");
Jens Wiklander97d6e292018-04-23 13:00:31 +0200315#endif /*CFG_TA_MBEDTLS*/