blob: effa4cc302cef1e99eed445640fa312312fd3323 [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Paul Bakker7c6b2c32013-09-16 13:49:26 +02002#include <polarssl/x509_crt.h>
3#include <polarssl/x509_crl.h>
Paul Bakker96743fc2011-02-12 14:30:57 +00004#include <polarssl/pem.h>
Paul Bakkerc70b9822013-04-07 22:00:46 +02005#include <polarssl/oid.h>
Paul Bakkerb63b0af2011-01-13 17:54:59 +00006
Paul Bakkerc559c7a2013-09-18 14:13:26 +02007int verify_none( void *data, x509_crt *crt, int certificate_depth, int *flags )
Paul Bakkerb63b0af2011-01-13 17:54:59 +00008{
Paul Bakker5a624082011-01-18 16:31:52 +00009 ((void) data);
10 ((void) crt);
11 ((void) certificate_depth);
Paul Bakker915275b2012-09-28 07:10:55 +000012 *flags |= BADCERT_OTHER;
Paul Bakkerddf26b42013-09-18 13:46:23 +020013
Paul Bakker915275b2012-09-28 07:10:55 +000014 return 0;
Paul Bakkerb63b0af2011-01-13 17:54:59 +000015}
16
Paul Bakkerc559c7a2013-09-18 14:13:26 +020017int verify_all( void *data, x509_crt *crt, int certificate_depth, int *flags )
Paul Bakkerb63b0af2011-01-13 17:54:59 +000018{
Paul Bakker5a624082011-01-18 16:31:52 +000019 ((void) data);
20 ((void) crt);
21 ((void) certificate_depth);
Paul Bakker915275b2012-09-28 07:10:55 +000022 *flags = 0;
Paul Bakker5a624082011-01-18 16:31:52 +000023
Paul Bakkerb63b0af2011-01-13 17:54:59 +000024 return 0;
25}
26
Paul Bakker33b43f12013-08-20 11:48:36 +020027/* END_HEADER */
Paul Bakker37940d9f2009-07-10 22:38:58 +000028
Paul Bakker33b43f12013-08-20 11:48:36 +020029/* BEGIN_DEPENDENCIES
Paul Bakker7c6b2c32013-09-16 13:49:26 +020030 * depends_on:POLARSSL_BIGNUM_C
Paul Bakker33b43f12013-08-20 11:48:36 +020031 * END_DEPENDENCIES
32 */
Paul Bakker5690efc2011-05-26 13:16:06 +000033
Paul Bakker7c6b2c32013-09-16 13:49:26 +020034/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +020035void x509_cert_info( char *crt_file, char *result_str )
Paul Bakker37940d9f2009-07-10 22:38:58 +000036{
Paul Bakkerc559c7a2013-09-18 14:13:26 +020037 x509_crt crt;
Paul Bakker37940d9f2009-07-10 22:38:58 +000038 char buf[2000];
Paul Bakker69998dd2009-07-11 19:15:20 +000039 int res;
Paul Bakker37940d9f2009-07-10 22:38:58 +000040
Paul Bakker369d2eb2013-09-18 11:58:25 +020041 x509_crt_init( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +000042 memset( buf, 0, 2000 );
43
Paul Bakkerddf26b42013-09-18 13:46:23 +020044 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
45 res = x509_crt_info( buf, 2000, "", &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +000046
Paul Bakker7c6b2c32013-09-16 13:49:26 +020047 x509_crt_free( &crt );
Paul Bakkerb08e6842012-02-11 18:43:20 +000048
Paul Bakker37940d9f2009-07-10 22:38:58 +000049 TEST_ASSERT( res != -1 );
50 TEST_ASSERT( res != -2 );
51
Paul Bakker33b43f12013-08-20 11:48:36 +020052 TEST_ASSERT( strcmp( buf, result_str ) == 0 );
Paul Bakker37940d9f2009-07-10 22:38:58 +000053}
Paul Bakker33b43f12013-08-20 11:48:36 +020054/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +000055
Paul Bakker7c6b2c32013-09-16 13:49:26 +020056/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRL_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +020057void x509_crl_info( char *crl_file, char *result_str )
Paul Bakker37940d9f2009-07-10 22:38:58 +000058{
59 x509_crl crl;
60 char buf[2000];
Paul Bakker69998dd2009-07-11 19:15:20 +000061 int res;
Paul Bakker37940d9f2009-07-10 22:38:58 +000062
Paul Bakker369d2eb2013-09-18 11:58:25 +020063 x509_crl_init( &crl );
Paul Bakker37940d9f2009-07-10 22:38:58 +000064 memset( buf, 0, 2000 );
65
Paul Bakkerddf26b42013-09-18 13:46:23 +020066 TEST_ASSERT( x509_crl_parse_file( &crl, crl_file ) == 0 );
67 res = x509_crl_info( buf, 2000, "", &crl );
Paul Bakker37940d9f2009-07-10 22:38:58 +000068
Paul Bakkerb08e6842012-02-11 18:43:20 +000069 x509_crl_free( &crl );
70
Paul Bakker37940d9f2009-07-10 22:38:58 +000071 TEST_ASSERT( res != -1 );
72 TEST_ASSERT( res != -2 );
73
Paul Bakker33b43f12013-08-20 11:48:36 +020074 TEST_ASSERT( strcmp( buf, result_str ) == 0 );
Paul Bakker37940d9f2009-07-10 22:38:58 +000075}
Paul Bakker33b43f12013-08-20 11:48:36 +020076/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +000077
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +020078/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C:POLARSSL_X509_CRL_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +020079void x509_verify( char *crt_file, char *ca_file, char *crl_file,
80 char *cn_name_str, int result, int flags_result,
81 char *verify_callback )
Paul Bakker37940d9f2009-07-10 22:38:58 +000082{
Paul Bakkerc559c7a2013-09-18 14:13:26 +020083 x509_crt crt;
84 x509_crt ca;
Paul Bakker37940d9f2009-07-10 22:38:58 +000085 x509_crl crl;
86 int flags = 0;
Paul Bakker69998dd2009-07-11 19:15:20 +000087 int res;
Paul Bakkerc559c7a2013-09-18 14:13:26 +020088 int (*f_vrfy)(void *, x509_crt *, int, int *) = NULL;
Paul Bakkerdbd443d2013-08-16 13:38:47 +020089 char * cn_name = NULL;
Paul Bakker37940d9f2009-07-10 22:38:58 +000090
Paul Bakker369d2eb2013-09-18 11:58:25 +020091 x509_crt_init( &crt );
92 x509_crt_init( &ca );
93 x509_crl_init( &crl );
Paul Bakker37940d9f2009-07-10 22:38:58 +000094
Paul Bakker33b43f12013-08-20 11:48:36 +020095 if( strcmp( cn_name_str, "NULL" ) != 0 )
96 cn_name = cn_name_str;
Paul Bakkerdbd443d2013-08-16 13:38:47 +020097
Paul Bakker33b43f12013-08-20 11:48:36 +020098 if( strcmp( verify_callback, "NULL" ) == 0 )
Paul Bakkerdbd443d2013-08-16 13:38:47 +020099 f_vrfy = NULL;
Paul Bakker33b43f12013-08-20 11:48:36 +0200100 else if( strcmp( verify_callback, "verify_none" ) == 0 )
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200101 f_vrfy = verify_none;
Paul Bakker33b43f12013-08-20 11:48:36 +0200102 else if( strcmp( verify_callback, "verify_all" ) == 0 )
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200103 f_vrfy = verify_all;
104 else
105 TEST_ASSERT( "No known verify callback selected" == 0 );
106
Paul Bakkerddf26b42013-09-18 13:46:23 +0200107 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
108 TEST_ASSERT( x509_crt_parse_file( &ca, ca_file ) == 0 );
109 TEST_ASSERT( x509_crl_parse_file( &crl, crl_file ) == 0 );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000110
Paul Bakkerddf26b42013-09-18 13:46:23 +0200111 res = x509_crt_verify( &crt, &ca, &crl, cn_name, &flags, f_vrfy, NULL );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000112
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200113 x509_crt_free( &crt );
114 x509_crt_free( &ca );
Paul Bakkerb08e6842012-02-11 18:43:20 +0000115 x509_crl_free( &crl );
116
Paul Bakker33b43f12013-08-20 11:48:36 +0200117 TEST_ASSERT( res == ( result ) );
118 TEST_ASSERT( flags == ( flags_result ) );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000119}
Paul Bakker33b43f12013-08-20 11:48:36 +0200120/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +0000121
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200122/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_USE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200123void x509_dn_gets( char *crt_file, char *entity, char *result_str )
Paul Bakker37940d9f2009-07-10 22:38:58 +0000124{
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200125 x509_crt crt;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000126 char buf[2000];
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200127 int res = 0;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000128
Paul Bakker369d2eb2013-09-18 11:58:25 +0200129 x509_crt_init( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000130 memset( buf, 0, 2000 );
131
Paul Bakkerddf26b42013-09-18 13:46:23 +0200132 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
Paul Bakker33b43f12013-08-20 11:48:36 +0200133 if( strcmp( entity, "subject" ) == 0 )
Paul Bakker86d0c192013-09-18 11:11:02 +0200134 res = x509_dn_gets( buf, 2000, &crt.subject );
Paul Bakker33b43f12013-08-20 11:48:36 +0200135 else if( strcmp( entity, "issuer" ) == 0 )
Paul Bakker86d0c192013-09-18 11:11:02 +0200136 res = x509_dn_gets( buf, 2000, &crt.issuer );
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200137 else
138 TEST_ASSERT( "Unknown entity" == 0 );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000139
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200140 x509_crt_free( &crt );
Paul Bakkerb08e6842012-02-11 18:43:20 +0000141
Paul Bakker37940d9f2009-07-10 22:38:58 +0000142 TEST_ASSERT( res != -1 );
143 TEST_ASSERT( res != -2 );
144
Paul Bakker33b43f12013-08-20 11:48:36 +0200145 TEST_ASSERT( strcmp( buf, result_str ) == 0 );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000146}
Paul Bakker33b43f12013-08-20 11:48:36 +0200147/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +0000148
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200149/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_USE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200150void x509_time_expired( char *crt_file, char *entity, int result )
Paul Bakker37940d9f2009-07-10 22:38:58 +0000151{
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200152 x509_crt crt;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000153
Paul Bakker369d2eb2013-09-18 11:58:25 +0200154 x509_crt_init( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000155
Paul Bakkerddf26b42013-09-18 13:46:23 +0200156 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200157
Paul Bakker33b43f12013-08-20 11:48:36 +0200158 if( strcmp( entity, "valid_from" ) == 0 )
Paul Bakker86d0c192013-09-18 11:11:02 +0200159 TEST_ASSERT( x509_time_expired( &crt.valid_from ) == result );
Paul Bakker33b43f12013-08-20 11:48:36 +0200160 else if( strcmp( entity, "valid_to" ) == 0 )
Paul Bakker86d0c192013-09-18 11:11:02 +0200161 TEST_ASSERT( x509_time_expired( &crt.valid_to ) == result );
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200162 else
163 TEST_ASSERT( "Unknown entity" == 0 );
Paul Bakkerb08e6842012-02-11 18:43:20 +0000164
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200165 x509_crt_free( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000166}
Paul Bakker33b43f12013-08-20 11:48:36 +0200167/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +0000168
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100169/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_USE_C */
170void x509_time_future( char *crt_file, char *entity, int result )
171{
172 x509_crt crt;
173
174 x509_crt_init( &crt );
175
176 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
177
178 if( strcmp( entity, "valid_from" ) == 0 )
179 TEST_ASSERT( x509_time_future( &crt.valid_from ) == result );
180 else if( strcmp( entity, "valid_to" ) == 0 )
181 TEST_ASSERT( x509_time_future( &crt.valid_to ) == result );
182 else
183 TEST_ASSERT( "Unknown entity" == 0 );
184
185 x509_crt_free( &crt );
186}
187/* END_CASE */
188
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200189/* BEGIN_CASE depends_on:POLARSSL_X509_CRT_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200190void x509parse_crt( char *crt_data, char *result_str, int result )
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000191{
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200192 x509_crt crt;
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000193 unsigned char buf[2000];
194 unsigned char output[2000];
195 int data_len, res;
196
Paul Bakker369d2eb2013-09-18 11:58:25 +0200197 x509_crt_init( &crt );
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000198 memset( buf, 0, 2000 );
199 memset( output, 0, 2000 );
200
Paul Bakker33b43f12013-08-20 11:48:36 +0200201 data_len = unhexify( buf, crt_data );
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000202
Paul Bakkerddf26b42013-09-18 13:46:23 +0200203 TEST_ASSERT( x509_crt_parse( &crt, buf, data_len ) == ( result ) );
Paul Bakker33b43f12013-08-20 11:48:36 +0200204 if( ( result ) == 0 )
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000205 {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200206 res = x509_crt_info( (char *) output, 2000, "", &crt );
Paul Bakker33b43f12013-08-20 11:48:36 +0200207
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000208 TEST_ASSERT( res != -1 );
209 TEST_ASSERT( res != -2 );
210
Paul Bakker33b43f12013-08-20 11:48:36 +0200211 TEST_ASSERT( strcmp( (char *) output, result_str ) == 0 );
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000212 }
Paul Bakkerb08e6842012-02-11 18:43:20 +0000213
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200214 x509_crt_free( &crt );
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000215}
Paul Bakker33b43f12013-08-20 11:48:36 +0200216/* END_CASE */
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000217
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200218/* BEGIN_CASE depends_on:POLARSSL_X509_CRL_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200219void x509parse_crl( char *crl_data, char *result_str, int result )
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000220{
221 x509_crl crl;
222 unsigned char buf[2000];
223 unsigned char output[2000];
224 int data_len, res;
225
Paul Bakker369d2eb2013-09-18 11:58:25 +0200226 x509_crl_init( &crl );
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000227 memset( buf, 0, 2000 );
228 memset( output, 0, 2000 );
229
Paul Bakker33b43f12013-08-20 11:48:36 +0200230 data_len = unhexify( buf, crl_data );
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000231
Paul Bakkerddf26b42013-09-18 13:46:23 +0200232 TEST_ASSERT( x509_crl_parse( &crl, buf, data_len ) == ( result ) );
Paul Bakker33b43f12013-08-20 11:48:36 +0200233 if( ( result ) == 0 )
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000234 {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200235 res = x509_crl_info( (char *) output, 2000, "", &crl );
Paul Bakker33b43f12013-08-20 11:48:36 +0200236
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000237 TEST_ASSERT( res != -1 );
238 TEST_ASSERT( res != -2 );
239
Paul Bakker33b43f12013-08-20 11:48:36 +0200240 TEST_ASSERT( strcmp( (char *) output, result_str ) == 0 );
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000241 }
Paul Bakkerb08e6842012-02-11 18:43:20 +0000242
243 x509_crl_free( &crl );
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000244}
Paul Bakker33b43f12013-08-20 11:48:36 +0200245/* END_CASE */
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000246
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +0100247/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
248void x509_crt_parse_path( char *crt_path, int ret, int nb_crt )
249{
250 x509_crt chain, *cur;
251 int i;
252
253 x509_crt_init( &chain );
254
255 TEST_ASSERT( x509_crt_parse_path( &chain, crt_path ) == ret );
256
257 /* Check how many certs we got */
258 for( i = 0, cur = &chain; cur != NULL; cur = cur->next )
259 if( cur->raw.p != NULL )
260 i++;
261
262 TEST_ASSERT( i == nb_crt );
263
Paul Bakkera2ffccd2013-12-02 21:56:37 +0100264 x509_crt_free( &chain );
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +0100265}
266/* END_CASE */
267
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100268/* BEGIN_CASE */
269void x509_oid_desc( char *oid_str, char *ref_desc )
270{
271 x509_buf oid;
272 const char *desc;
273 unsigned char buf[20];
274
275 memset( buf, 0, sizeof buf );
276
277 oid.tag = ASN1_OID;
278 oid.len = unhexify( buf, oid_str );
279 oid.p = buf;
280
281 desc = x509_oid_get_description( &oid );
282
283 if( strcmp( ref_desc, "notfound" ) == 0 )
284 TEST_ASSERT( desc == NULL );
285 else
286 {
287 TEST_ASSERT( desc != NULL );
288 TEST_ASSERT( strcmp( desc, ref_desc ) == 0 );
289 }
290}
291/* END_CASE */
292
293/* BEGIN_CASE */
294void x509_oid_numstr( char *oid_str, char *numstr, int blen, int ret )
295{
296 x509_buf oid;
297 unsigned char oid_buf[20];
298 char num_buf[100];
299
300 memset( oid_buf, 0x00, sizeof oid_buf );
301 memset( num_buf, 0x2a, sizeof num_buf );
302
303 oid.tag = ASN1_OID;
304 oid.len = unhexify( oid_buf, oid_str );
305 oid.p = oid_buf;
306
307 TEST_ASSERT( (size_t) blen <= sizeof num_buf );
308
309 TEST_ASSERT( x509_oid_get_numeric_string( num_buf, blen, &oid ) == ret );
310
311 if( ret >= 0 )
312 {
313 TEST_ASSERT( num_buf[ret] == 0 );
314 TEST_ASSERT( strcmp( num_buf, numstr ) == 0 );
315 }
316}
317/* END_CASE */
318
Manuel Pégourié-Gonnard20140162013-10-10 12:48:03 +0200319/* BEGIN_CASE depends_on:POLARSSL_X509_CRT_PARSE_C:POLARSSL_SELF_TEST */
Paul Bakker33b43f12013-08-20 11:48:36 +0200320void x509_selftest()
Paul Bakker37940d9f2009-07-10 22:38:58 +0000321{
322 TEST_ASSERT( x509_self_test( 0 ) == 0 );
323}
Paul Bakker33b43f12013-08-20 11:48:36 +0200324/* END_CASE */