summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2017-02-17 10:39:21 +0100
committerNikos Mavrogiannopoulos <nmav@redhat.com>2017-02-17 15:45:43 +0100
commit6df0e597cc014d635a97dd136feb102a1bee107d (patch)
tree211e4fa0e5f8b2f477eac22c7a12072abb58fe65
parent93467cf4a2852eea0941ce79df8d667f7349b753 (diff)
downloadgnutls-6df0e597cc014d635a97dd136feb102a1bee107d.tar.gz
tests: enhanced test suite to include creation of invalid certificates
That is, check whether the creation of invalid V2 or V1 certificates will be detected, and that the correct error codes are returned. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r--tests/Makefile.am2
-rw-r--r--tests/crt_inv_write.c216
2 files changed, 217 insertions, 1 deletions
diff --git a/tests/Makefile.am b/tests/Makefile.am
index 84bf94e8e5..c2fe470839 100644
--- a/tests/Makefile.am
+++ b/tests/Makefile.am
@@ -127,7 +127,7 @@ ctests = mini-record-2 simple gc set_pkcs12_cred cert certuniqueid \
session-tickets-missing set_x509_key_file_legacy status-request-ext \
rng-no-onload dtls1-2-mtu-check crl_apis cert_verify_inv_utf8 \
hostname-check-utf8 pkcs8-key-decode-encrypted priority-mix pkcs7 \
- send-data-before-handshake recv-data-before-handshake
+ send-data-before-handshake recv-data-before-handshake crt_inv_write
if HAVE_SECCOMP_TESTS
ctests += dtls-with-seccomp tls-with-seccomp dtls-client-with-seccomp tls-client-with-seccomp
diff --git a/tests/crt_inv_write.c b/tests/crt_inv_write.c
new file mode 100644
index 0000000000..c1a07855da
--- /dev/null
+++ b/tests/crt_inv_write.c
@@ -0,0 +1,216 @@
+/*
+ * Copyright (C) 2008-2016 Free Software Foundation, Inc.
+ * Copyright (C) 2016 Red Hat, Inc.
+ *
+ * Author: Nikos Mavrogiannopoulos
+ *
+ * This file is part of GnuTLS.
+ *
+ * GnuTLS is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GnuTLS is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GnuTLS; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
+ */
+
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <stdlib.h>
+#include <stdio.h>
+#include <time.h>
+#include <string.h>
+#include <gnutls/gnutls.h>
+#include <gnutls/x509.h>
+#include <assert.h>
+
+#include "utils.h"
+
+#include "cert-common.h"
+
+static void tls_log_func(int level, const char *str)
+{
+ fprintf(stderr, "|<%d>| %s", level, str);
+}
+
+static time_t mytime(time_t * t)
+{
+ time_t then = 1207000800;
+
+ if (t)
+ *t = then;
+
+ return then;
+}
+
+/* write V1 cert with extensions */
+static void do_crt_with_exts(unsigned version)
+{
+ gnutls_x509_privkey_t pkey;
+ gnutls_x509_crt_t crt;
+ const char *err = NULL;
+ int ret;
+
+ ret = global_init();
+ if (ret < 0)
+ fail("global_init\n");
+
+ gnutls_global_set_time_function(mytime);
+ gnutls_global_set_log_function(tls_log_func);
+ if (debug)
+ gnutls_global_set_log_level(4711);
+
+ ret = gnutls_x509_crt_init(&crt);
+ if (ret != 0)
+ fail("gnutls_x509_crt_init\n");
+
+ ret = gnutls_x509_privkey_init(&pkey);
+ if (ret != 0)
+ fail("gnutls_x509_privkey_init\n");
+
+ ret = gnutls_x509_privkey_import(pkey, &key_dat, GNUTLS_X509_FMT_PEM);
+ if (ret != 0)
+ fail("gnutls_x509_privkey_import\n");
+
+ /* Setup CRT */
+
+ ret = gnutls_x509_crt_set_version(crt, version);
+ if (ret != 0)
+ fail("gnutls_x509_crt_set_version\n");
+
+ ret = gnutls_x509_crt_set_serial(crt, "\x0a\x11\x00", 3);
+ if (ret != 0)
+ fail("gnutls_x509_crt_set_serial\n");
+
+ ret = gnutls_x509_crt_set_expiration_time(crt, -1);
+ if (ret != 0)
+ fail("error\n");
+
+ ret = gnutls_x509_crt_set_activation_time(crt, mytime(0));
+ if (ret != 0)
+ fail("error\n");
+
+ ret = gnutls_x509_crt_set_key(crt, pkey);
+ if (ret != 0)
+ fail("gnutls_x509_crt_set_key\n");
+
+ ret = gnutls_x509_crt_set_basic_constraints(crt, 0, -1); /* invalid for V1 */
+ if (ret < 0) {
+ fail("error\n");
+ }
+
+ ret = gnutls_x509_crt_set_key_usage(crt, GNUTLS_KEY_DIGITAL_SIGNATURE); /* inv for V1 */
+ if (ret != 0)
+ fail("gnutls_x509_crt_set_key_usage %d\n", ret);
+
+ ret = gnutls_x509_crt_set_dn(crt, "o = none to\\, mention,cn = nikos", &err);
+ if (ret < 0) {
+ fail("gnutls_x509_crt_set_dn: %s, %s\n", gnutls_strerror(ret), err);
+ }
+
+ ret = gnutls_x509_crt_sign2(crt, crt, pkey, GNUTLS_DIG_SHA256, 0);
+ if (ret != GNUTLS_E_X509_CERTIFICATE_ERROR) {
+ gnutls_datum_t out;
+ assert(gnutls_x509_crt_export2(crt, GNUTLS_X509_FMT_PEM, &out) >= 0);
+ printf("%s\n\n", out.data);
+
+ fail("gnutls_x509_crt_sign2: %s\n", gnutls_strerror(ret));
+ }
+
+ gnutls_x509_crt_deinit(crt);
+ gnutls_x509_privkey_deinit(pkey);
+
+ gnutls_global_deinit();
+}
+
+/* write V1 cert with unique id */
+static void do_v1_invalid_crt(void)
+{
+ gnutls_x509_privkey_t pkey;
+ gnutls_x509_crt_t crt;
+ const char *err = NULL;
+ int ret;
+
+ ret = global_init();
+ if (ret < 0)
+ fail("global_init\n");
+
+ gnutls_global_set_time_function(mytime);
+ gnutls_global_set_log_function(tls_log_func);
+ if (debug)
+ gnutls_global_set_log_level(4711);
+
+ ret = gnutls_x509_crt_init(&crt);
+ if (ret != 0)
+ fail("gnutls_x509_crt_init\n");
+
+ ret = gnutls_x509_privkey_init(&pkey);
+ if (ret != 0)
+ fail("gnutls_x509_privkey_init\n");
+
+ ret = gnutls_x509_privkey_import(pkey, &key_dat, GNUTLS_X509_FMT_PEM);
+ if (ret != 0)
+ fail("gnutls_x509_privkey_import\n");
+
+ /* Setup CRT */
+
+ ret = gnutls_x509_crt_set_version(crt, 1);
+ if (ret != 0)
+ fail("gnutls_x509_crt_set_version\n");
+
+ ret = gnutls_x509_crt_set_serial(crt, "\x0a\x11\x00", 3);
+ if (ret != 0)
+ fail("gnutls_x509_crt_set_serial\n");
+
+ ret = gnutls_x509_crt_set_expiration_time(crt, -1);
+ if (ret != 0)
+ fail("error\n");
+
+ ret = gnutls_x509_crt_set_activation_time(crt, mytime(0));
+ if (ret != 0)
+ fail("error\n");
+
+ ret = gnutls_x509_crt_set_key(crt, pkey);
+ if (ret != 0)
+ fail("gnutls_x509_crt_set_key\n");
+
+ ret = gnutls_x509_crt_set_issuer_unique_id(crt, "\x00\x01\x03", 3);
+ if (ret < 0) {
+ fail("error\n");
+ }
+
+ ret = gnutls_x509_crt_set_dn(crt, "o = none to\\, mention,cn = nikos", &err);
+ if (ret < 0) {
+ fail("gnutls_x509_crt_set_dn: %s, %s\n", gnutls_strerror(ret), err);
+ }
+
+ ret = gnutls_x509_crt_sign2(crt, crt, pkey, GNUTLS_DIG_SHA256, 0);
+ if (ret != GNUTLS_E_X509_CERTIFICATE_ERROR) {
+ gnutls_datum_t out;
+ assert(gnutls_x509_crt_export2(crt, GNUTLS_X509_FMT_PEM, &out) >= 0);
+ printf("%s\n\n", out.data);
+
+ fail("gnutls_x509_crt_sign2: %s\n", gnutls_strerror(ret));
+ }
+
+ gnutls_x509_crt_deinit(crt);
+ gnutls_x509_privkey_deinit(pkey);
+
+ gnutls_global_deinit();
+}
+
+void doit(void)
+{
+ do_crt_with_exts(1);
+ do_crt_with_exts(2);
+ do_v1_invalid_crt();
+}