blob: dd707902691d7f7acda73b9f27b1474743c48749 [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Andres AG0da3e442016-09-23 13:16:02 +01002#include "polarssl/x509.h"
Rich Evansce2f2372015-02-06 13:57:42 +00003#include "polarssl/x509_crt.h"
4#include "polarssl/x509_crl.h"
5#include "polarssl/x509_csr.h"
6#include "polarssl/pem.h"
7#include "polarssl/oid.h"
8#include "polarssl/base64.h"
Paul Bakkerb63b0af2011-01-13 17:54:59 +00009
Hanno Becker63ee8c12017-07-27 15:21:25 +010010#if POLARSSL_X509_MAX_INTERMEDIATE_CA >= 19
11#error "The value of POLARSSL_X509_MAX_INTERMEDIATE_C is larger \
12than the current threshold 19. To test larger values, please \
13adapt the script tests/data_files/dir-max/long.sh."
14#endif
15
Paul Bakkerc559c7a2013-09-18 14:13:26 +020016int verify_none( void *data, x509_crt *crt, int certificate_depth, int *flags )
Paul Bakkerb63b0af2011-01-13 17:54:59 +000017{
Paul Bakker5a624082011-01-18 16:31:52 +000018 ((void) data);
19 ((void) crt);
20 ((void) certificate_depth);
Paul Bakker915275b2012-09-28 07:10:55 +000021 *flags |= BADCERT_OTHER;
Paul Bakkerddf26b42013-09-18 13:46:23 +020022
Paul Bakker915275b2012-09-28 07:10:55 +000023 return 0;
Paul Bakkerb63b0af2011-01-13 17:54:59 +000024}
25
Paul Bakkerc559c7a2013-09-18 14:13:26 +020026int verify_all( void *data, x509_crt *crt, int certificate_depth, int *flags )
Paul Bakkerb63b0af2011-01-13 17:54:59 +000027{
Paul Bakker5a624082011-01-18 16:31:52 +000028 ((void) data);
29 ((void) crt);
30 ((void) certificate_depth);
Paul Bakker915275b2012-09-28 07:10:55 +000031 *flags = 0;
Paul Bakker5a624082011-01-18 16:31:52 +000032
Paul Bakkerb63b0af2011-01-13 17:54:59 +000033 return 0;
34}
35
Manuel Pégourié-Gonnard15f10882015-09-01 11:59:24 +020036#if defined(POLARSSL_X509_CRT_PARSE_C)
37typedef struct {
38 char buf[512];
39 char *p;
40} verify_print_context;
41
42void verify_print_init( verify_print_context *ctx )
43{
44 memset( ctx, 0, sizeof( verify_print_context ) );
45 ctx->p = ctx->buf;
46}
47
48#if defined(_MSC_VER) && !defined snprintf
49#define snprintf _snprintf
50#endif
51
52#define SAFE_SNPRINTF \
53do \
54{ \
55 if( ret < 0 || (size_t) ret > n ) \
56 { \
57 p[n - 1] = '\0'; \
58 return( -1 ); \
59 } \
60 \
61 n -= (unsigned int) ret; \
62 p += (unsigned int) ret; \
63} while( 0 )
64
65int verify_print( void *data, x509_crt *crt, int certificate_depth, int *flags )
66{
67 int ret;
68 verify_print_context *ctx = (verify_print_context *) data;
69 char *p = ctx->p;
70 size_t n = ctx->buf + sizeof( ctx->buf ) - ctx->p;
71 ((void) flags);
72
73 ret = polarssl_snprintf( p, n, "depth %d - serial ", certificate_depth );
74 SAFE_SNPRINTF;
75
76 ret = x509_serial_gets( p, n, &crt->serial );
77 SAFE_SNPRINTF;
78
79 ret = polarssl_snprintf( p, n, " - subject " );
80 SAFE_SNPRINTF;
81
82 ret = x509_dn_gets( p, n, &crt->subject );
83 SAFE_SNPRINTF;
84
85 ret = polarssl_snprintf( p, n, "\n" );
86 SAFE_SNPRINTF;
87
88 ctx->p = p;
89
90 return( 0 );
91}
92#endif /* POLARSSL_X509_CRT_PARSE_C */
Manuel Pégourié-Gonnard28e1ac52015-11-02 06:34:46 +090093
94/* strsep() not available on Windows */
95char *mystrsep(char **stringp, const char *delim)
96{
97 const char *p;
98 char *ret = *stringp;
99
100 if( *stringp == NULL )
101 return( NULL );
102
103 for( ; ; (*stringp)++ )
104 {
105 if( **stringp == '\0' )
106 {
107 *stringp = NULL;
108 goto done;
109 }
110
111 for( p = delim; *p != '\0'; p++ )
112 if( **stringp == *p )
113 {
114 **stringp = '\0';
115 (*stringp)++;
116 goto done;
117 }
118 }
119
120done:
121 return( ret );
122}
Paul Bakker33b43f12013-08-20 11:48:36 +0200123/* END_HEADER */
Paul Bakker37940d9f2009-07-10 22:38:58 +0000124
Paul Bakker33b43f12013-08-20 11:48:36 +0200125/* BEGIN_DEPENDENCIES
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200126 * depends_on:POLARSSL_BIGNUM_C
Paul Bakker33b43f12013-08-20 11:48:36 +0200127 * END_DEPENDENCIES
128 */
Paul Bakker5690efc2011-05-26 13:16:06 +0000129
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200130/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200131void x509_cert_info( char *crt_file, char *result_str )
Paul Bakker37940d9f2009-07-10 22:38:58 +0000132{
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200133 x509_crt crt;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000134 char buf[2000];
Paul Bakker69998dd2009-07-11 19:15:20 +0000135 int res;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000136
Paul Bakker369d2eb2013-09-18 11:58:25 +0200137 x509_crt_init( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000138 memset( buf, 0, 2000 );
139
Paul Bakkerddf26b42013-09-18 13:46:23 +0200140 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
141 res = x509_crt_info( buf, 2000, "", &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000142
143 TEST_ASSERT( res != -1 );
144 TEST_ASSERT( res != -2 );
145
Paul Bakker33b43f12013-08-20 11:48:36 +0200146 TEST_ASSERT( strcmp( buf, result_str ) == 0 );
Paul Bakkerbd51b262014-07-10 15:26:12 +0200147
148exit:
149 x509_crt_free( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000150}
Paul Bakker33b43f12013-08-20 11:48:36 +0200151/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +0000152
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200153/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRL_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200154void x509_crl_info( char *crl_file, char *result_str )
Paul Bakker37940d9f2009-07-10 22:38:58 +0000155{
156 x509_crl crl;
157 char buf[2000];
Paul Bakker69998dd2009-07-11 19:15:20 +0000158 int res;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000159
Paul Bakker369d2eb2013-09-18 11:58:25 +0200160 x509_crl_init( &crl );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000161 memset( buf, 0, 2000 );
162
Paul Bakkerddf26b42013-09-18 13:46:23 +0200163 TEST_ASSERT( x509_crl_parse_file( &crl, crl_file ) == 0 );
164 res = x509_crl_info( buf, 2000, "", &crl );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000165
166 TEST_ASSERT( res != -1 );
167 TEST_ASSERT( res != -2 );
168
Paul Bakker33b43f12013-08-20 11:48:36 +0200169 TEST_ASSERT( strcmp( buf, result_str ) == 0 );
Paul Bakkerbd51b262014-07-10 15:26:12 +0200170
171exit:
172 x509_crl_free( &crl );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000173}
Paul Bakker33b43f12013-08-20 11:48:36 +0200174/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +0000175
Andres AG67c6df42016-12-08 17:10:38 +0000176/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRL_PARSE_C */
177void x509_crl_parse( char *crl_file, int result )
178{
179 x509_crl crl;
180 char buf[2000];
181
182 x509_crl_init( &crl );
183 memset( buf, 0, 2000 );
184
185 TEST_ASSERT( x509_crl_parse_file( &crl, crl_file ) == result );
186
187exit:
188 x509_crl_free( &crl );
189}
190/* END_CASE */
191
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100192/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CSR_PARSE_C */
193void x509_csr_info( char *csr_file, char *result_str )
194{
195 x509_csr csr;
196 char buf[2000];
197 int res;
198
199 x509_csr_init( &csr );
200 memset( buf, 0, 2000 );
201
202 TEST_ASSERT( x509_csr_parse_file( &csr, csr_file ) == 0 );
203 res = x509_csr_info( buf, 2000, "", &csr );
204
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100205 TEST_ASSERT( res != -1 );
206 TEST_ASSERT( res != -2 );
207
208 TEST_ASSERT( strcmp( buf, result_str ) == 0 );
Paul Bakkerbd51b262014-07-10 15:26:12 +0200209
210exit:
211 x509_csr_free( &csr );
Manuel Pégourié-Gonnard2a8d7fd2014-01-24 17:34:26 +0100212}
213/* END_CASE */
214
Manuel Pégourié-Gonnard39a183a2015-04-17 16:14:32 +0200215/* BEGIN_CASE depends_on:POLARSSL_X509_CRT_PARSE_C */
216void x509_verify_info( int flags, char *prefix, char *result_str )
217{
218 char buf[2000];
219 int res;
220
221 memset( buf, 0, sizeof( buf ) );
222
223 res = x509_crt_verify_info( buf, sizeof( buf ), prefix, flags );
224
225 TEST_ASSERT( res >= 0 );
226
227 TEST_ASSERT( strcmp( buf, result_str ) == 0 );
228}
229/* END_CASE */
230
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +0200231/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C:POLARSSL_X509_CRL_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200232void x509_verify( char *crt_file, char *ca_file, char *crl_file,
233 char *cn_name_str, int result, int flags_result,
234 char *verify_callback )
Paul Bakker37940d9f2009-07-10 22:38:58 +0000235{
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200236 x509_crt crt;
237 x509_crt ca;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000238 x509_crl crl;
239 int flags = 0;
Paul Bakker69998dd2009-07-11 19:15:20 +0000240 int res;
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200241 int (*f_vrfy)(void *, x509_crt *, int, int *) = NULL;
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200242 char * cn_name = NULL;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000243
Paul Bakker369d2eb2013-09-18 11:58:25 +0200244 x509_crt_init( &crt );
245 x509_crt_init( &ca );
246 x509_crl_init( &crl );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000247
Paul Bakker33b43f12013-08-20 11:48:36 +0200248 if( strcmp( cn_name_str, "NULL" ) != 0 )
249 cn_name = cn_name_str;
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200250
Paul Bakker33b43f12013-08-20 11:48:36 +0200251 if( strcmp( verify_callback, "NULL" ) == 0 )
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200252 f_vrfy = NULL;
Paul Bakker33b43f12013-08-20 11:48:36 +0200253 else if( strcmp( verify_callback, "verify_none" ) == 0 )
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200254 f_vrfy = verify_none;
Paul Bakker33b43f12013-08-20 11:48:36 +0200255 else if( strcmp( verify_callback, "verify_all" ) == 0 )
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200256 f_vrfy = verify_all;
257 else
258 TEST_ASSERT( "No known verify callback selected" == 0 );
259
Paul Bakkerddf26b42013-09-18 13:46:23 +0200260 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
261 TEST_ASSERT( x509_crt_parse_file( &ca, ca_file ) == 0 );
262 TEST_ASSERT( x509_crl_parse_file( &crl, crl_file ) == 0 );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000263
Paul Bakkerddf26b42013-09-18 13:46:23 +0200264 res = x509_crt_verify( &crt, &ca, &crl, cn_name, &flags, f_vrfy, NULL );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000265
Paul Bakkerbd51b262014-07-10 15:26:12 +0200266 TEST_ASSERT( res == ( result ) );
267 TEST_ASSERT( flags == ( flags_result ) );
268
269exit:
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200270 x509_crt_free( &crt );
271 x509_crt_free( &ca );
Paul Bakkerb08e6842012-02-11 18:43:20 +0000272 x509_crl_free( &crl );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000273}
Paul Bakker33b43f12013-08-20 11:48:36 +0200274/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +0000275
Manuel Pégourié-Gonnard15f10882015-09-01 11:59:24 +0200276/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
277void x509_verify_callback( char *crt_file, char *ca_file,
278 int exp_ret, char *exp_vrfy_out )
279{
280 int ret;
281 x509_crt crt;
282 x509_crt ca;
283 int flags = 0;
284 verify_print_context vrfy_ctx;
285
286 x509_crt_init( &crt );
287 x509_crt_init( &ca );
288 verify_print_init( &vrfy_ctx );
289
290 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
291 TEST_ASSERT( x509_crt_parse_file( &ca, ca_file ) == 0 );
292
293 ret = x509_crt_verify( &crt, &ca, NULL, NULL, &flags,
294 verify_print, &vrfy_ctx );
295
296 TEST_ASSERT( ret == exp_ret );
297 TEST_ASSERT( strcmp( vrfy_ctx.buf, exp_vrfy_out ) == 0 );
298
299exit:
300 x509_crt_free( &crt );
301 x509_crt_free( &ca );
302}
303/* END_CASE */
304
Manuel Pégourié-Gonnard8f63e952015-09-01 18:44:47 +0200305/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200306void x509_dn_gets( char *crt_file, char *entity, char *result_str )
Paul Bakker37940d9f2009-07-10 22:38:58 +0000307{
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200308 x509_crt crt;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000309 char buf[2000];
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200310 int res = 0;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000311
Paul Bakker369d2eb2013-09-18 11:58:25 +0200312 x509_crt_init( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000313 memset( buf, 0, 2000 );
314
Paul Bakkerddf26b42013-09-18 13:46:23 +0200315 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
Paul Bakker33b43f12013-08-20 11:48:36 +0200316 if( strcmp( entity, "subject" ) == 0 )
Paul Bakker86d0c192013-09-18 11:11:02 +0200317 res = x509_dn_gets( buf, 2000, &crt.subject );
Paul Bakker33b43f12013-08-20 11:48:36 +0200318 else if( strcmp( entity, "issuer" ) == 0 )
Paul Bakker86d0c192013-09-18 11:11:02 +0200319 res = x509_dn_gets( buf, 2000, &crt.issuer );
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200320 else
321 TEST_ASSERT( "Unknown entity" == 0 );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000322
323 TEST_ASSERT( res != -1 );
324 TEST_ASSERT( res != -2 );
325
Paul Bakker33b43f12013-08-20 11:48:36 +0200326 TEST_ASSERT( strcmp( buf, result_str ) == 0 );
Paul Bakkerbd51b262014-07-10 15:26:12 +0200327
328exit:
329 x509_crt_free( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000330}
Paul Bakker33b43f12013-08-20 11:48:36 +0200331/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +0000332
Manuel Pégourié-Gonnard8f63e952015-09-01 18:44:47 +0200333/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200334void x509_time_expired( char *crt_file, char *entity, int result )
Paul Bakker37940d9f2009-07-10 22:38:58 +0000335{
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200336 x509_crt crt;
Paul Bakker37940d9f2009-07-10 22:38:58 +0000337
Paul Bakker369d2eb2013-09-18 11:58:25 +0200338 x509_crt_init( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000339
Paul Bakkerddf26b42013-09-18 13:46:23 +0200340 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200341
Paul Bakker33b43f12013-08-20 11:48:36 +0200342 if( strcmp( entity, "valid_from" ) == 0 )
Paul Bakker86d0c192013-09-18 11:11:02 +0200343 TEST_ASSERT( x509_time_expired( &crt.valid_from ) == result );
Paul Bakker33b43f12013-08-20 11:48:36 +0200344 else if( strcmp( entity, "valid_to" ) == 0 )
Paul Bakker86d0c192013-09-18 11:11:02 +0200345 TEST_ASSERT( x509_time_expired( &crt.valid_to ) == result );
Paul Bakkerdbd443d2013-08-16 13:38:47 +0200346 else
347 TEST_ASSERT( "Unknown entity" == 0 );
Paul Bakkerb08e6842012-02-11 18:43:20 +0000348
Paul Bakkerbd51b262014-07-10 15:26:12 +0200349exit:
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200350 x509_crt_free( &crt );
Paul Bakker37940d9f2009-07-10 22:38:58 +0000351}
Paul Bakker33b43f12013-08-20 11:48:36 +0200352/* END_CASE */
Paul Bakker37940d9f2009-07-10 22:38:58 +0000353
Manuel Pégourié-Gonnard8f63e952015-09-01 18:44:47 +0200354/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100355void x509_time_future( char *crt_file, char *entity, int result )
356{
357 x509_crt crt;
358
359 x509_crt_init( &crt );
360
361 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
362
363 if( strcmp( entity, "valid_from" ) == 0 )
364 TEST_ASSERT( x509_time_future( &crt.valid_from ) == result );
365 else if( strcmp( entity, "valid_to" ) == 0 )
366 TEST_ASSERT( x509_time_future( &crt.valid_to ) == result );
367 else
368 TEST_ASSERT( "Unknown entity" == 0 );
369
Paul Bakkerbd51b262014-07-10 15:26:12 +0200370exit:
Manuel Pégourié-Gonnard6304f782014-03-10 12:26:11 +0100371 x509_crt_free( &crt );
372}
373/* END_CASE */
374
Paul Bakker5a5fa922014-09-26 14:53:04 +0200375/* BEGIN_CASE depends_on:POLARSSL_X509_CRT_PARSE_C:POLARSSL_FS_IO */
376void x509parse_crt_file( char *crt_file, int result )
377{
378 x509_crt crt;
379
380 x509_crt_init( &crt );
381
382 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == result );
383
384exit:
385 x509_crt_free( &crt );
386}
387/* END_CASE */
388
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200389/* BEGIN_CASE depends_on:POLARSSL_X509_CRT_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200390void x509parse_crt( char *crt_data, char *result_str, int result )
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000391{
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200392 x509_crt crt;
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000393 unsigned char buf[2000];
394 unsigned char output[2000];
395 int data_len, res;
396
Paul Bakker369d2eb2013-09-18 11:58:25 +0200397 x509_crt_init( &crt );
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000398 memset( buf, 0, 2000 );
399 memset( output, 0, 2000 );
400
Paul Bakker33b43f12013-08-20 11:48:36 +0200401 data_len = unhexify( buf, crt_data );
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000402
Paul Bakkerddf26b42013-09-18 13:46:23 +0200403 TEST_ASSERT( x509_crt_parse( &crt, buf, data_len ) == ( result ) );
Paul Bakker33b43f12013-08-20 11:48:36 +0200404 if( ( result ) == 0 )
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000405 {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200406 res = x509_crt_info( (char *) output, 2000, "", &crt );
Paul Bakker33b43f12013-08-20 11:48:36 +0200407
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000408 TEST_ASSERT( res != -1 );
409 TEST_ASSERT( res != -2 );
410
Paul Bakker33b43f12013-08-20 11:48:36 +0200411 TEST_ASSERT( strcmp( (char *) output, result_str ) == 0 );
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000412 }
Paul Bakkerb08e6842012-02-11 18:43:20 +0000413
Paul Bakkerbd51b262014-07-10 15:26:12 +0200414exit:
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200415 x509_crt_free( &crt );
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000416}
Paul Bakker33b43f12013-08-20 11:48:36 +0200417/* END_CASE */
Paul Bakkerb2c38f52009-07-19 19:36:15 +0000418
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200419/* BEGIN_CASE depends_on:POLARSSL_X509_CRL_PARSE_C */
Paul Bakker33b43f12013-08-20 11:48:36 +0200420void x509parse_crl( char *crl_data, char *result_str, int result )
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000421{
422 x509_crl crl;
423 unsigned char buf[2000];
424 unsigned char output[2000];
425 int data_len, res;
426
Paul Bakker369d2eb2013-09-18 11:58:25 +0200427 x509_crl_init( &crl );
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000428 memset( buf, 0, 2000 );
429 memset( output, 0, 2000 );
430
Paul Bakker33b43f12013-08-20 11:48:36 +0200431 data_len = unhexify( buf, crl_data );
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000432
Paul Bakkerddf26b42013-09-18 13:46:23 +0200433 TEST_ASSERT( x509_crl_parse( &crl, buf, data_len ) == ( result ) );
Paul Bakker33b43f12013-08-20 11:48:36 +0200434 if( ( result ) == 0 )
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000435 {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200436 res = x509_crl_info( (char *) output, 2000, "", &crl );
Paul Bakker33b43f12013-08-20 11:48:36 +0200437
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000438 TEST_ASSERT( res != -1 );
439 TEST_ASSERT( res != -2 );
440
Paul Bakker33b43f12013-08-20 11:48:36 +0200441 TEST_ASSERT( strcmp( (char *) output, result_str ) == 0 );
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000442 }
Paul Bakkerb08e6842012-02-11 18:43:20 +0000443
Paul Bakkerbd51b262014-07-10 15:26:12 +0200444exit:
Paul Bakkerb08e6842012-02-11 18:43:20 +0000445 x509_crl_free( &crl );
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000446}
Paul Bakker33b43f12013-08-20 11:48:36 +0200447/* END_CASE */
Paul Bakker6b0fa4f2009-07-20 20:35:41 +0000448
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +0200449/* BEGIN_CASE depends_on:POLARSSL_X509_CSR_PARSE_C */
450void x509_csr_parse( char *csr_der_hex, char *ref_out, int ref_ret )
451{
452 x509_csr csr;
Paul Bakkerbd51b262014-07-10 15:26:12 +0200453 unsigned char *csr_der = NULL;
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +0200454 char my_out[1000];
455 size_t csr_der_len;
456 int my_ret;
457
458 x509_csr_init( &csr );
459 memset( my_out, 0, sizeof( my_out ) );
460 csr_der = unhexify_alloc( csr_der_hex, &csr_der_len );
461
Manuel Pégourié-Gonnardf3b47242014-06-16 18:06:48 +0200462 my_ret = x509_csr_parse_der( &csr, csr_der, csr_der_len );
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +0200463 TEST_ASSERT( my_ret == ref_ret );
464
465 if( ref_ret == 0 )
466 {
467 size_t my_out_len = x509_csr_info( my_out, sizeof( my_out ), "", &csr );
468 TEST_ASSERT( my_out_len == strlen( ref_out ) );
469 TEST_ASSERT( strcmp( my_out, ref_out ) == 0 );
470 }
471
Paul Bakkerbd51b262014-07-10 15:26:12 +0200472exit:
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +0200473 x509_csr_free( &csr );
474 polarssl_free( csr_der );
475}
476/* END_CASE */
477
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +0100478/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
479void x509_crt_parse_path( char *crt_path, int ret, int nb_crt )
480{
481 x509_crt chain, *cur;
482 int i;
483
484 x509_crt_init( &chain );
485
486 TEST_ASSERT( x509_crt_parse_path( &chain, crt_path ) == ret );
487
488 /* Check how many certs we got */
489 for( i = 0, cur = &chain; cur != NULL; cur = cur->next )
490 if( cur->raw.p != NULL )
491 i++;
492
493 TEST_ASSERT( i == nb_crt );
494
Paul Bakkerbd51b262014-07-10 15:26:12 +0200495exit:
Paul Bakkera2ffccd2013-12-02 21:56:37 +0100496 x509_crt_free( &chain );
Manuel Pégourié-Gonnardfbae2a12013-11-26 16:43:39 +0100497}
498/* END_CASE */
499
Janos Follath189c7432015-10-11 10:25:22 +0200500/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
Manuel Pégourié-Gonnard7ac50192017-07-10 11:09:22 +0200501void x509_crt_verify_max( char *ca_file, char *chain_dir, int nb_int,
502 int ret_chk, int flags_chk )
503{
504 char file_buf[128];
505 int ret;
Manuel Pégourié-Gonnard8af7bfa2017-07-10 11:20:08 +0200506 int flags;
Manuel Pégourié-Gonnard7ac50192017-07-10 11:09:22 +0200507 x509_crt trusted, chain;
508
509 /*
510 * We expect chain_dir to contain certificates 00.crt, 01.crt, etc.
511 * with NN.crt signed by NN-1.crt
512 */
513
514 x509_crt_init( &trusted );
515 x509_crt_init( &chain );
516
517 /* Load trusted root */
518 TEST_ASSERT( x509_crt_parse_file( &trusted, ca_file ) == 0 );
519
520 /* Load a chain with nb_int intermediates (from 01 to nb_int),
521 * plus one "end-entity" cert (nb_int + 1) */
522 ret = snprintf( file_buf, sizeof file_buf, "%s/c%02d.pem", chain_dir,
523 nb_int + 1 );
524 TEST_ASSERT( ret > 0 && (size_t) ret < sizeof file_buf );
525 TEST_ASSERT( x509_crt_parse_file( &chain, file_buf ) == 0 );
526
527 /* Try to verify that chain */
528 ret = x509_crt_verify( &chain, &trusted, NULL, NULL, &flags,
529 NULL, NULL );
530 TEST_ASSERT( ret == ret_chk );
Manuel Pégourié-Gonnard8af7bfa2017-07-10 11:20:08 +0200531 TEST_ASSERT( flags == flags_chk );
Manuel Pégourié-Gonnard7ac50192017-07-10 11:09:22 +0200532
533exit:
534 x509_crt_free( &chain );
535 x509_crt_free( &trusted );
536}
537/* END_CASE */
538
539/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C */
Janos Follath3d98a7e2015-10-11 16:17:27 +0200540void x509_crt_verify_chain( char *chain_paths, char *trusted_ca, int flags_result )
Janos Follath189c7432015-10-11 10:25:22 +0200541{
542 char* act;
543 int flags;
Janos Follath3d98a7e2015-10-11 16:17:27 +0200544 int result, res;
Janos Follath189c7432015-10-11 10:25:22 +0200545 x509_crt trusted, chain;
546
Janos Follath3d98a7e2015-10-11 16:17:27 +0200547 result = flags_result ? POLARSSL_ERR_X509_CERT_VERIFY_FAILED : 0;
548
Janos Follath189c7432015-10-11 10:25:22 +0200549 x509_crt_init( &chain );
550 x509_crt_init( &trusted );
551
Manuel Pégourié-Gonnard28e1ac52015-11-02 06:34:46 +0900552 while( ( act = mystrsep( &chain_paths, " " ) ) != NULL )
Janos Follath189c7432015-10-11 10:25:22 +0200553 TEST_ASSERT( x509_crt_parse_file( &chain, act ) == 0 );
554 TEST_ASSERT( x509_crt_parse_file( &trusted, trusted_ca ) == 0 );
555
556 res = x509_crt_verify( &chain, &trusted, NULL, NULL, &flags, NULL, NULL );
557
Janos Follath3d98a7e2015-10-11 16:17:27 +0200558 TEST_ASSERT( res == result );
559 TEST_ASSERT( flags == flags_result );
Janos Follath189c7432015-10-11 10:25:22 +0200560
561exit:
562 x509_crt_free( &trusted );
563 x509_crt_free( &chain );
564}
565/* END_CASE */
566
Manuel Pégourié-Gonnard0f7b6192014-06-24 11:37:54 +0200567/* BEGIN_CASE depends_on:POLARSSL_X509_USE_C */
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100568void x509_oid_desc( char *oid_str, char *ref_desc )
569{
570 x509_buf oid;
Manuel Pégourié-Gonnard079333b2015-03-20 18:14:26 +0000571 const char *desc = NULL;
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100572 unsigned char buf[20];
Manuel Pégourié-Gonnard079333b2015-03-20 18:14:26 +0000573 int ret;
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100574
575 memset( buf, 0, sizeof buf );
576
577 oid.tag = ASN1_OID;
578 oid.len = unhexify( buf, oid_str );
579 oid.p = buf;
580
Manuel Pégourié-Gonnard079333b2015-03-20 18:14:26 +0000581 ret = oid_get_extended_key_usage( &oid, &desc );
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100582
583 if( strcmp( ref_desc, "notfound" ) == 0 )
Manuel Pégourié-Gonnard079333b2015-03-20 18:14:26 +0000584 {
585 TEST_ASSERT( ret != 0 );
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100586 TEST_ASSERT( desc == NULL );
Manuel Pégourié-Gonnard079333b2015-03-20 18:14:26 +0000587 }
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100588 else
589 {
Manuel Pégourié-Gonnard079333b2015-03-20 18:14:26 +0000590 TEST_ASSERT( ret == 0 );
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100591 TEST_ASSERT( desc != NULL );
592 TEST_ASSERT( strcmp( desc, ref_desc ) == 0 );
593 }
594}
595/* END_CASE */
596
Manuel Pégourié-Gonnard0f7b6192014-06-24 11:37:54 +0200597/* BEGIN_CASE depends_on:POLARSSL_X509_USE_C */
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100598void x509_oid_numstr( char *oid_str, char *numstr, int blen, int ret )
599{
600 x509_buf oid;
601 unsigned char oid_buf[20];
602 char num_buf[100];
603
604 memset( oid_buf, 0x00, sizeof oid_buf );
605 memset( num_buf, 0x2a, sizeof num_buf );
606
607 oid.tag = ASN1_OID;
608 oid.len = unhexify( oid_buf, oid_str );
609 oid.p = oid_buf;
610
611 TEST_ASSERT( (size_t) blen <= sizeof num_buf );
612
Manuel Pégourié-Gonnard079333b2015-03-20 18:14:26 +0000613 TEST_ASSERT( oid_get_numeric_string( num_buf, blen, &oid ) == ret );
Manuel Pégourié-Gonnard7afdb882014-03-28 16:06:35 +0100614
615 if( ret >= 0 )
616 {
617 TEST_ASSERT( num_buf[ret] == 0 );
618 TEST_ASSERT( strcmp( num_buf, numstr ) == 0 );
619 }
620}
621/* END_CASE */
622
Paul Bakker5b11d022014-07-10 13:54:38 +0200623/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C:POLARSSL_X509_CHECK_KEY_USAGE */
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +0200624void x509_check_key_usage( char *crt_file, int usage, int ret )
625{
626 x509_crt crt;
627
628 x509_crt_init( &crt );
629
630 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
631
632 TEST_ASSERT( x509_crt_check_key_usage( &crt, usage ) == ret );
633
Paul Bakkerbd51b262014-07-10 15:26:12 +0200634exit:
Manuel Pégourié-Gonnard603116c2014-04-09 09:50:03 +0200635 x509_crt_free( &crt );
636}
637/* END_CASE */
638
Paul Bakker5b11d022014-07-10 13:54:38 +0200639/* BEGIN_CASE depends_on:POLARSSL_FS_IO:POLARSSL_X509_CRT_PARSE_C:POLARSSL_X509_CHECK_EXTENDED_KEY_USAGE */
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +0200640void x509_check_extended_key_usage( char *crt_file, char *usage_hex, int ret )
641{
642 x509_crt crt;
643 char oid[50];
644 size_t len;
645
646 x509_crt_init( &crt );
647
648 len = unhexify( (unsigned char *) oid, usage_hex );
649
650 TEST_ASSERT( x509_crt_parse_file( &crt, crt_file ) == 0 );
651
652 TEST_ASSERT( x509_crt_check_extended_key_usage( &crt, oid, len ) == ret );
653
Paul Bakkerbd51b262014-07-10 15:26:12 +0200654exit:
Manuel Pégourié-Gonnard7afb8a02014-04-10 17:53:56 +0200655 x509_crt_free( &crt );
656}
657/* END_CASE */
658
Andres AG0da3e442016-09-23 13:16:02 +0100659/* BEGIN_CASE depends_on:POLARSSL_X509_USE_C */
660void x509_get_time( int tag, char *time_str, int ret,
661 int year, int mon, int day,
662 int hour, int min, int sec )
663{
664 x509_time time;
665 unsigned char buf[17];
666 unsigned char* start = buf;
667 unsigned char* end = buf;
668
669 memset( &time, 0x00, sizeof( time ) );
670 *end = (unsigned char)tag; end++;
671 if( tag == ASN1_UTC_TIME )
672 *end = 13;
673 else
674 *end = 15;
675 end++;
676 memcpy( end, time_str, (size_t)*(end - 1) );
677 end += *(end - 1);
678
679 TEST_ASSERT( x509_get_time( &start, end, &time ) == ret );
680 if( ret == 0 )
681 {
682 TEST_ASSERT( year == time.year );
683 TEST_ASSERT( mon == time.mon );
684 TEST_ASSERT( day == time.day );
685 TEST_ASSERT( hour == time.hour );
686 TEST_ASSERT( min == time.min );
687 TEST_ASSERT( sec == time.sec );
688 }
689}
690/* END_CASE */
691
Manuel Pégourié-Gonnardd1539b12014-06-06 16:42:37 +0200692/* BEGIN_CASE depends_on:POLARSSL_X509_CRT_PARSE_C:POLARSSL_X509_RSASSA_PSS_SUPPORT */
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +0200693void x509_parse_rsassa_pss_params( char *hex_params, int params_tag,
694 int ref_msg_md, int ref_mgf_md,
695 int ref_salt_len, int ref_ret )
696{
697 int my_ret;
698 x509_buf params;
699 md_type_t my_msg_md, my_mgf_md;
700 int my_salt_len;
701
702 params.p = unhexify_alloc( hex_params, &params.len );
703 params.tag = params_tag;
704
705 my_ret = x509_get_rsassa_pss_params( &params, &my_msg_md, &my_mgf_md,
706 &my_salt_len );
707
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +0200708 TEST_ASSERT( my_ret == ref_ret );
709
710 if( ref_ret == 0 )
711 {
712 TEST_ASSERT( my_msg_md == (md_type_t) ref_msg_md );
713 TEST_ASSERT( my_mgf_md == (md_type_t) ref_mgf_md );
714 TEST_ASSERT( my_salt_len == ref_salt_len );
715 }
716
Paul Bakkerbd51b262014-07-10 15:26:12 +0200717exit:
Manuel Pégourié-Gonnard85403692014-06-06 14:48:38 +0200718 polarssl_free( params.p );
719}
720/* END_CASE */
721
Manuel Pégourié-Gonnard20140162013-10-10 12:48:03 +0200722/* BEGIN_CASE depends_on:POLARSSL_X509_CRT_PARSE_C:POLARSSL_SELF_TEST */
Paul Bakker33b43f12013-08-20 11:48:36 +0200723void x509_selftest()
Paul Bakker37940d9f2009-07-10 22:38:58 +0000724{
725 TEST_ASSERT( x509_self_test( 0 ) == 0 );
726}
Paul Bakker33b43f12013-08-20 11:48:36 +0200727/* END_CASE */