test_suite_x509write.function 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670
  1. /* BEGIN_HEADER */
  2. #include "mbedtls/bignum.h"
  3. #include "mbedtls/x509_crt.h"
  4. #include "mbedtls/x509_csr.h"
  5. #include "mbedtls/pem.h"
  6. #include "mbedtls/oid.h"
  7. #include "mbedtls/rsa.h"
  8. #include "mbedtls/asn1write.h"
  9. #include "mbedtls/pk.h"
  10. #include "hash_info.h"
  11. #include "mbedtls/legacy_or_psa.h"
  12. #if defined(MBEDTLS_RSA_C)
  13. int mbedtls_rsa_decrypt_func(void *ctx, size_t *olen,
  14. const unsigned char *input, unsigned char *output,
  15. size_t output_max_len)
  16. {
  17. return mbedtls_rsa_pkcs1_decrypt((mbedtls_rsa_context *) ctx, NULL, NULL,
  18. olen, input, output, output_max_len);
  19. }
  20. int mbedtls_rsa_sign_func(void *ctx,
  21. int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
  22. mbedtls_md_type_t md_alg, unsigned int hashlen,
  23. const unsigned char *hash, unsigned char *sig)
  24. {
  25. return mbedtls_rsa_pkcs1_sign((mbedtls_rsa_context *) ctx, f_rng, p_rng,
  26. md_alg, hashlen, hash, sig);
  27. }
  28. size_t mbedtls_rsa_key_len_func(void *ctx)
  29. {
  30. return ((const mbedtls_rsa_context *) ctx)->len;
  31. }
  32. #endif /* MBEDTLS_RSA_C */
  33. #if defined(MBEDTLS_USE_PSA_CRYPTO) && \
  34. defined(MBEDTLS_PEM_WRITE_C) && defined(MBEDTLS_X509_CSR_WRITE_C)
  35. static int x509_crt_verifycsr(const unsigned char *buf, size_t buflen)
  36. {
  37. unsigned char hash[PSA_HASH_MAX_SIZE];
  38. mbedtls_x509_csr csr;
  39. int ret = 0;
  40. mbedtls_x509_csr_init(&csr);
  41. if (mbedtls_x509_csr_parse(&csr, buf, buflen) != 0) {
  42. ret = MBEDTLS_ERR_X509_BAD_INPUT_DATA;
  43. goto cleanup;
  44. }
  45. psa_algorithm_t psa_alg = mbedtls_hash_info_psa_from_md(csr.sig_md);
  46. size_t hash_size = 0;
  47. psa_status_t status = psa_hash_compute(psa_alg, csr.cri.p, csr.cri.len,
  48. hash, PSA_HASH_MAX_SIZE, &hash_size);
  49. if (status != PSA_SUCCESS) {
  50. /* Note: this can't happen except after an internal error */
  51. ret = MBEDTLS_ERR_X509_BAD_INPUT_DATA;
  52. goto cleanup;
  53. }
  54. if (mbedtls_pk_verify_ext(csr.sig_pk, csr.sig_opts, &csr.pk,
  55. csr.sig_md, hash, mbedtls_hash_info_get_size(csr.sig_md),
  56. csr.sig.p, csr.sig.len) != 0) {
  57. ret = MBEDTLS_ERR_X509_CERT_VERIFY_FAILED;
  58. goto cleanup;
  59. }
  60. cleanup:
  61. mbedtls_x509_csr_free(&csr);
  62. return ret;
  63. }
  64. #endif /* MBEDTLS_USE_PSA_CRYPTO && MBEDTLS_PEM_WRITE_C && MBEDTLS_X509_CSR_WRITE_C */
  65. #if defined(MBEDTLS_X509_CSR_WRITE_C)
  66. /*
  67. * The size of this temporary buffer is given by the sequence of functions
  68. * called hereinafter:
  69. * - mbedtls_asn1_write_oid()
  70. * - 8 bytes for MBEDTLS_OID_EXTENDED_KEY_USAGE raw value
  71. * - 1 byte for MBEDTLS_OID_EXTENDED_KEY_USAGE length
  72. * - 1 byte for MBEDTLS_ASN1_OID tag
  73. * - mbedtls_asn1_write_len()
  74. * - 1 byte since we're dealing with sizes which are less than 0x80
  75. * - mbedtls_asn1_write_tag()
  76. * - 1 byte
  77. *
  78. * This length is fine as long as this function is called using the
  79. * MBEDTLS_OID_SERVER_AUTH OID. If this is changed in the future, then this
  80. * buffer's length should be adjusted accordingly.
  81. * Unfortunately there's no predefined max size for OIDs which can be used
  82. * to set an overall upper boundary which is always guaranteed.
  83. */
  84. #define EXT_KEY_USAGE_TMP_BUF_MAX_LENGTH 12
  85. static int csr_set_extended_key_usage(mbedtls_x509write_csr *ctx,
  86. const char *oid, size_t oid_len)
  87. {
  88. unsigned char buf[EXT_KEY_USAGE_TMP_BUF_MAX_LENGTH] = { 0 };
  89. unsigned char *p = buf + sizeof(buf);
  90. int ret;
  91. size_t len = 0;
  92. /*
  93. * Following functions fail anyway if the temporary buffer is not large,
  94. * but we set an extra check here to emphasize a possible source of errors
  95. */
  96. if (oid_len > EXT_KEY_USAGE_TMP_BUF_MAX_LENGTH) {
  97. return MBEDTLS_ERR_X509_BAD_INPUT_DATA;
  98. }
  99. MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_oid(&p, buf, oid, oid_len));
  100. MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(&p, buf, ret));
  101. MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(&p, buf,
  102. MBEDTLS_ASN1_CONSTRUCTED |
  103. MBEDTLS_ASN1_SEQUENCE));
  104. ret = mbedtls_x509write_csr_set_extension(ctx,
  105. MBEDTLS_OID_EXTENDED_KEY_USAGE,
  106. MBEDTLS_OID_SIZE(MBEDTLS_OID_EXTENDED_KEY_USAGE),
  107. 0,
  108. p,
  109. len);
  110. return ret;
  111. }
  112. #endif /* MBEDTLS_X509_CSR_WRITE_C */
  113. /* END_HEADER */
  114. /* BEGIN_DEPENDENCIES
  115. * depends_on:MBEDTLS_BIGNUM_C:MBEDTLS_FS_IO:MBEDTLS_PK_PARSE_C
  116. * END_DEPENDENCIES
  117. */
  118. /* BEGIN_CASE depends_on:MBEDTLS_PEM_WRITE_C:MBEDTLS_X509_CSR_WRITE_C */
  119. void x509_csr_check(char *key_file, char *cert_req_check_file, int md_type,
  120. int key_usage, int set_key_usage, int cert_type,
  121. int set_cert_type, int set_extension)
  122. {
  123. mbedtls_pk_context key;
  124. mbedtls_x509write_csr req;
  125. unsigned char buf[4096];
  126. int ret;
  127. #if !defined(MBEDTLS_USE_PSA_CRYPTO)
  128. unsigned char check_buf[4000];
  129. FILE *f;
  130. size_t olen = 0;
  131. #endif /* !MBEDTLS_USE_PSA_CRYPTO */
  132. size_t pem_len = 0, buf_index;
  133. int der_len = -1;
  134. const char *subject_name = "C=NL,O=PolarSSL,CN=PolarSSL Server 1";
  135. mbedtls_test_rnd_pseudo_info rnd_info;
  136. mbedtls_x509_san_list san_ip;
  137. mbedtls_x509_san_list san_dns;
  138. mbedtls_x509_san_list san_uri;
  139. mbedtls_x509_san_list *san_list = NULL;
  140. const char san_ip_name[] = { 0x7f, 0x01, 0x01, 0x00 }; // 127.1.1.0
  141. const char *san_dns_name = "example.com";
  142. const char *san_uri_name = "http://pki.example.com/";
  143. san_uri.node.type = MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER;
  144. san_uri.node.san.unstructured_name.p = (unsigned char *) san_uri_name;
  145. san_uri.node.san.unstructured_name.len = strlen(san_uri_name);
  146. san_uri.next = NULL;
  147. san_ip.node.type = MBEDTLS_X509_SAN_IP_ADDRESS;
  148. san_ip.node.san.unstructured_name.p = (unsigned char *) san_ip_name;
  149. san_ip.node.san.unstructured_name.len = sizeof(san_ip_name);
  150. san_ip.next = &san_uri;
  151. san_dns.node.type = MBEDTLS_X509_SAN_DNS_NAME;
  152. san_dns.node.san.unstructured_name.p = (unsigned char *) san_dns_name;
  153. san_dns.node.san.unstructured_name.len = strlen(san_dns_name);
  154. san_dns.next = &san_ip;
  155. san_list = &san_dns;
  156. memset(&rnd_info, 0x2a, sizeof(mbedtls_test_rnd_pseudo_info));
  157. mbedtls_x509write_csr_init(&req);
  158. USE_PSA_INIT();
  159. mbedtls_pk_init(&key);
  160. TEST_ASSERT(mbedtls_pk_parse_keyfile(&key, key_file, NULL,
  161. mbedtls_test_rnd_std_rand, NULL) == 0);
  162. mbedtls_x509write_csr_set_md_alg(&req, md_type);
  163. mbedtls_x509write_csr_set_key(&req, &key);
  164. TEST_ASSERT(mbedtls_x509write_csr_set_subject_name(&req, subject_name) == 0);
  165. if (set_key_usage != 0) {
  166. TEST_ASSERT(mbedtls_x509write_csr_set_key_usage(&req, key_usage) == 0);
  167. }
  168. if (set_cert_type != 0) {
  169. TEST_ASSERT(mbedtls_x509write_csr_set_ns_cert_type(&req, cert_type) == 0);
  170. }
  171. if (set_extension != 0) {
  172. TEST_ASSERT(csr_set_extended_key_usage(&req, MBEDTLS_OID_SERVER_AUTH,
  173. MBEDTLS_OID_SIZE(MBEDTLS_OID_SERVER_AUTH)) == 0);
  174. TEST_ASSERT(mbedtls_x509write_csr_set_subject_alternative_name(&req, san_list) == 0);
  175. }
  176. ret = mbedtls_x509write_csr_pem(&req, buf, sizeof(buf),
  177. mbedtls_test_rnd_pseudo_rand, &rnd_info);
  178. TEST_ASSERT(ret == 0);
  179. pem_len = strlen((char *) buf);
  180. for (buf_index = pem_len; buf_index < sizeof(buf); ++buf_index) {
  181. TEST_ASSERT(buf[buf_index] == 0);
  182. }
  183. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  184. // When using PSA crypto, RNG isn't controllable, so cert_req_check_file can't be used
  185. (void) cert_req_check_file;
  186. buf[pem_len] = '\0';
  187. TEST_ASSERT(x509_crt_verifycsr(buf, pem_len + 1) == 0);
  188. #else
  189. f = fopen(cert_req_check_file, "r");
  190. TEST_ASSERT(f != NULL);
  191. olen = fread(check_buf, 1, sizeof(check_buf), f);
  192. fclose(f);
  193. TEST_ASSERT(olen >= pem_len - 1);
  194. TEST_ASSERT(memcmp(buf, check_buf, pem_len - 1) == 0);
  195. #endif /* MBEDTLS_USE_PSA_CRYPTO */
  196. der_len = mbedtls_x509write_csr_der(&req, buf, sizeof(buf),
  197. mbedtls_test_rnd_pseudo_rand,
  198. &rnd_info);
  199. TEST_ASSERT(der_len >= 0);
  200. if (der_len == 0) {
  201. goto exit;
  202. }
  203. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  204. // When using PSA crypto, RNG isn't controllable, result length isn't
  205. // deterministic over multiple runs, removing a single byte isn't enough to
  206. // go into the MBEDTLS_ERR_ASN1_BUF_TOO_SMALL error case
  207. der_len /= 2;
  208. #else
  209. der_len -= 1;
  210. #endif
  211. ret = mbedtls_x509write_csr_der(&req, buf, (size_t) (der_len),
  212. mbedtls_test_rnd_pseudo_rand, &rnd_info);
  213. TEST_ASSERT(ret == MBEDTLS_ERR_ASN1_BUF_TOO_SMALL);
  214. exit:
  215. mbedtls_x509write_csr_free(&req);
  216. mbedtls_pk_free(&key);
  217. USE_PSA_DONE();
  218. }
  219. /* END_CASE */
  220. /* BEGIN_CASE depends_on:MBEDTLS_PEM_WRITE_C:MBEDTLS_X509_CSR_WRITE_C:MBEDTLS_USE_PSA_CRYPTO */
  221. void x509_csr_check_opaque(char *key_file, int md_type, int key_usage,
  222. int cert_type)
  223. {
  224. mbedtls_pk_context key;
  225. mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT;
  226. psa_algorithm_t md_alg_psa, alg_psa;
  227. mbedtls_x509write_csr req;
  228. unsigned char buf[4096];
  229. int ret;
  230. size_t pem_len = 0;
  231. const char *subject_name = "C=NL,O=PolarSSL,CN=PolarSSL Server 1";
  232. mbedtls_test_rnd_pseudo_info rnd_info;
  233. memset(&rnd_info, 0x2a, sizeof(mbedtls_test_rnd_pseudo_info));
  234. mbedtls_x509write_csr_init(&req);
  235. USE_PSA_INIT();
  236. md_alg_psa = mbedtls_hash_info_psa_from_md((mbedtls_md_type_t) md_type);
  237. TEST_ASSERT(md_alg_psa != MBEDTLS_MD_NONE);
  238. mbedtls_pk_init(&key);
  239. TEST_ASSERT(mbedtls_pk_parse_keyfile(&key, key_file, NULL,
  240. mbedtls_test_rnd_std_rand, NULL) == 0);
  241. if (mbedtls_pk_get_type(&key) == MBEDTLS_PK_ECKEY) {
  242. alg_psa = PSA_ALG_ECDSA(md_alg_psa);
  243. } else if (mbedtls_pk_get_type(&key) == MBEDTLS_PK_RSA) {
  244. alg_psa = PSA_ALG_RSA_PKCS1V15_SIGN(md_alg_psa);
  245. } else {
  246. TEST_ASSUME(!"PK key type not supported in this configuration");
  247. }
  248. TEST_ASSERT(mbedtls_pk_wrap_as_opaque(&key, &key_id, alg_psa,
  249. PSA_KEY_USAGE_SIGN_HASH,
  250. PSA_ALG_NONE) == 0);
  251. mbedtls_x509write_csr_set_md_alg(&req, md_type);
  252. mbedtls_x509write_csr_set_key(&req, &key);
  253. TEST_ASSERT(mbedtls_x509write_csr_set_subject_name(&req, subject_name) == 0);
  254. if (key_usage != 0) {
  255. TEST_ASSERT(mbedtls_x509write_csr_set_key_usage(&req, key_usage) == 0);
  256. }
  257. if (cert_type != 0) {
  258. TEST_ASSERT(mbedtls_x509write_csr_set_ns_cert_type(&req, cert_type) == 0);
  259. }
  260. ret = mbedtls_x509write_csr_pem(&req, buf, sizeof(buf) - 1,
  261. mbedtls_test_rnd_pseudo_rand, &rnd_info);
  262. TEST_ASSERT(ret == 0);
  263. pem_len = strlen((char *) buf);
  264. buf[pem_len] = '\0';
  265. TEST_ASSERT(x509_crt_verifycsr(buf, pem_len + 1) == 0);
  266. exit:
  267. mbedtls_x509write_csr_free(&req);
  268. mbedtls_pk_free(&key);
  269. psa_destroy_key(key_id);
  270. PSA_DONE();
  271. }
  272. /* END_CASE */
  273. /* BEGIN_CASE depends_on:MBEDTLS_PEM_WRITE_C:MBEDTLS_X509_CRT_WRITE_C:MBEDTLS_X509_CRT_PARSE_C:MBEDTLS_HAS_ALG_SHA_1_VIA_MD_OR_PSA_BASED_ON_USE_PSA */
  274. void x509_crt_check(char *subject_key_file, char *subject_pwd,
  275. char *subject_name, char *issuer_key_file,
  276. char *issuer_pwd, char *issuer_name,
  277. data_t *serial_arg, char *not_before, char *not_after,
  278. int md_type, int key_usage, int set_key_usage,
  279. char *ext_key_usage,
  280. int cert_type, int set_cert_type, int auth_ident,
  281. int ver, char *cert_check_file, int pk_wrap, int is_ca,
  282. char *cert_verify_file)
  283. {
  284. mbedtls_pk_context subject_key, issuer_key, issuer_key_alt;
  285. mbedtls_pk_context *key = &issuer_key;
  286. mbedtls_x509write_cert crt;
  287. unsigned char buf[4096];
  288. unsigned char check_buf[5000];
  289. unsigned char *p, *end;
  290. unsigned char tag, sz;
  291. #if defined(MBEDTLS_TEST_DEPRECATED) && defined(MBEDTLS_BIGNUM_C)
  292. mbedtls_mpi serial_mpi;
  293. #endif
  294. int ret, before_tag, after_tag;
  295. size_t olen = 0, pem_len = 0, buf_index = 0;
  296. int der_len = -1;
  297. FILE *f;
  298. mbedtls_test_rnd_pseudo_info rnd_info;
  299. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  300. mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT;
  301. #endif
  302. mbedtls_pk_type_t issuer_key_type;
  303. memset(&rnd_info, 0x2a, sizeof(mbedtls_test_rnd_pseudo_info));
  304. #if defined(MBEDTLS_TEST_DEPRECATED) && defined(MBEDTLS_BIGNUM_C)
  305. mbedtls_mpi_init(&serial_mpi);
  306. #endif
  307. USE_PSA_INIT();
  308. mbedtls_pk_init(&subject_key);
  309. mbedtls_pk_init(&issuer_key);
  310. mbedtls_pk_init(&issuer_key_alt);
  311. mbedtls_x509write_crt_init(&crt);
  312. TEST_ASSERT(mbedtls_pk_parse_keyfile(&subject_key, subject_key_file,
  313. subject_pwd, mbedtls_test_rnd_std_rand, NULL) == 0);
  314. TEST_ASSERT(mbedtls_pk_parse_keyfile(&issuer_key, issuer_key_file,
  315. issuer_pwd, mbedtls_test_rnd_std_rand, NULL) == 0);
  316. issuer_key_type = mbedtls_pk_get_type(&issuer_key);
  317. #if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_PK_RSA_ALT_SUPPORT)
  318. /* For RSA PK contexts, create a copy as an alternative RSA context. */
  319. if (pk_wrap == 1 && issuer_key_type == MBEDTLS_PK_RSA) {
  320. TEST_ASSERT(mbedtls_pk_setup_rsa_alt(&issuer_key_alt,
  321. mbedtls_pk_rsa(issuer_key),
  322. mbedtls_rsa_decrypt_func,
  323. mbedtls_rsa_sign_func,
  324. mbedtls_rsa_key_len_func) == 0);
  325. key = &issuer_key_alt;
  326. }
  327. #endif
  328. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  329. /* For Opaque PK contexts, wrap key as an Opaque RSA context. */
  330. if (pk_wrap == 2) {
  331. psa_algorithm_t alg_psa, md_alg_psa;
  332. md_alg_psa = mbedtls_hash_info_psa_from_md((mbedtls_md_type_t) md_type);
  333. TEST_ASSERT(md_alg_psa != MBEDTLS_MD_NONE);
  334. if (mbedtls_pk_get_type(&issuer_key) == MBEDTLS_PK_ECKEY) {
  335. alg_psa = PSA_ALG_ECDSA(md_alg_psa);
  336. } else if (mbedtls_pk_get_type(&issuer_key) == MBEDTLS_PK_RSA) {
  337. alg_psa = PSA_ALG_RSA_PKCS1V15_SIGN(md_alg_psa);
  338. } else {
  339. TEST_ASSUME(!"PK key type not supported in this configuration");
  340. }
  341. TEST_ASSERT(mbedtls_pk_wrap_as_opaque(&issuer_key, &key_id, alg_psa,
  342. PSA_KEY_USAGE_SIGN_HASH,
  343. PSA_ALG_NONE) == 0);
  344. }
  345. #endif /* MBEDTLS_USE_PSA_CRYPTO */
  346. if (pk_wrap == 2) {
  347. TEST_ASSERT(mbedtls_pk_get_type(&issuer_key) == MBEDTLS_PK_OPAQUE);
  348. }
  349. if (ver != -1) {
  350. mbedtls_x509write_crt_set_version(&crt, ver);
  351. }
  352. #if defined(MBEDTLS_TEST_DEPRECATED) && defined(MBEDTLS_BIGNUM_C)
  353. TEST_ASSERT(mbedtls_mpi_read_binary(&serial_mpi, serial_arg->x,
  354. serial_arg->len) == 0);
  355. TEST_ASSERT(mbedtls_x509write_crt_set_serial(&crt, &serial_mpi) == 0);
  356. #else
  357. TEST_ASSERT(mbedtls_x509write_crt_set_serial_raw(&crt, serial_arg->x,
  358. serial_arg->len) == 0);
  359. #endif
  360. TEST_ASSERT(mbedtls_x509write_crt_set_validity(&crt, not_before,
  361. not_after) == 0);
  362. mbedtls_x509write_crt_set_md_alg(&crt, md_type);
  363. TEST_ASSERT(mbedtls_x509write_crt_set_issuer_name(&crt, issuer_name) == 0);
  364. TEST_ASSERT(mbedtls_x509write_crt_set_subject_name(&crt, subject_name) == 0);
  365. mbedtls_x509write_crt_set_subject_key(&crt, &subject_key);
  366. mbedtls_x509write_crt_set_issuer_key(&crt, key);
  367. if (crt.version >= MBEDTLS_X509_CRT_VERSION_3) {
  368. /* For the CA case, a path length of -1 means unlimited. */
  369. TEST_ASSERT(mbedtls_x509write_crt_set_basic_constraints(&crt, is_ca,
  370. (is_ca ? -1 : 0)) == 0);
  371. TEST_ASSERT(mbedtls_x509write_crt_set_subject_key_identifier(&crt) == 0);
  372. if (auth_ident) {
  373. TEST_ASSERT(mbedtls_x509write_crt_set_authority_key_identifier(&crt) == 0);
  374. }
  375. if (set_key_usage != 0) {
  376. TEST_ASSERT(mbedtls_x509write_crt_set_key_usage(&crt, key_usage) == 0);
  377. }
  378. if (set_cert_type != 0) {
  379. TEST_ASSERT(mbedtls_x509write_crt_set_ns_cert_type(&crt, cert_type) == 0);
  380. }
  381. if (strcmp(ext_key_usage, "NULL") != 0) {
  382. mbedtls_asn1_sequence exts[2];
  383. memset(exts, 0, sizeof(exts));
  384. #define SET_OID(x, oid) \
  385. do { \
  386. x.len = MBEDTLS_OID_SIZE(oid); \
  387. x.p = (unsigned char *) oid; \
  388. x.tag = MBEDTLS_ASN1_OID; \
  389. } \
  390. while (0)
  391. if (strcmp(ext_key_usage, "serverAuth") == 0) {
  392. SET_OID(exts[0].buf, MBEDTLS_OID_SERVER_AUTH);
  393. } else if (strcmp(ext_key_usage, "codeSigning,timeStamping") == 0) {
  394. SET_OID(exts[0].buf, MBEDTLS_OID_CODE_SIGNING);
  395. exts[0].next = &exts[1];
  396. SET_OID(exts[1].buf, MBEDTLS_OID_TIME_STAMPING);
  397. }
  398. TEST_ASSERT(mbedtls_x509write_crt_set_ext_key_usage(&crt, exts) == 0);
  399. }
  400. }
  401. ret = mbedtls_x509write_crt_pem(&crt, buf, sizeof(buf),
  402. mbedtls_test_rnd_pseudo_rand, &rnd_info);
  403. TEST_ASSERT(ret == 0);
  404. pem_len = strlen((char *) buf);
  405. // check that the rest of the buffer remains clear
  406. for (buf_index = pem_len; buf_index < sizeof(buf); ++buf_index) {
  407. TEST_ASSERT(buf[buf_index] == 0);
  408. }
  409. if (issuer_key_type != MBEDTLS_PK_RSA) {
  410. mbedtls_x509_crt crt_parse, trusted;
  411. uint32_t flags;
  412. mbedtls_x509_crt_init(&crt_parse);
  413. mbedtls_x509_crt_init(&trusted);
  414. TEST_ASSERT(mbedtls_x509_crt_parse_file(&trusted,
  415. cert_verify_file) == 0);
  416. TEST_ASSERT(mbedtls_x509_crt_parse(&crt_parse,
  417. buf, sizeof(buf)) == 0);
  418. ret = mbedtls_x509_crt_verify(&crt_parse, &trusted, NULL, NULL, &flags,
  419. NULL, NULL);
  420. mbedtls_x509_crt_free(&crt_parse);
  421. mbedtls_x509_crt_free(&trusted);
  422. TEST_EQUAL(flags, 0);
  423. TEST_EQUAL(ret, 0);
  424. } else if (*cert_check_file != '\0') {
  425. f = fopen(cert_check_file, "r");
  426. TEST_ASSERT(f != NULL);
  427. olen = fread(check_buf, 1, sizeof(check_buf), f);
  428. fclose(f);
  429. TEST_ASSERT(olen < sizeof(check_buf));
  430. TEST_EQUAL(olen, pem_len);
  431. TEST_ASSERT(olen >= pem_len - 1);
  432. TEST_ASSERT(memcmp(buf, check_buf, pem_len - 1) == 0);
  433. }
  434. der_len = mbedtls_x509write_crt_der(&crt, buf, sizeof(buf),
  435. mbedtls_test_rnd_pseudo_rand,
  436. &rnd_info);
  437. TEST_ASSERT(der_len >= 0);
  438. if (der_len == 0) {
  439. goto exit;
  440. }
  441. // Not testing against file, check date format
  442. if (*cert_check_file == '\0') {
  443. // UTC tag if before 2050, 2 digits less for year
  444. if (not_before[0] == '2' && (not_before[1] > '0' || not_before[2] > '4')) {
  445. before_tag = MBEDTLS_ASN1_GENERALIZED_TIME;
  446. } else {
  447. before_tag = MBEDTLS_ASN1_UTC_TIME;
  448. not_before += 2;
  449. }
  450. if (not_after[0] == '2' && (not_after[1] > '0' || not_after[2] > '4')) {
  451. after_tag = MBEDTLS_ASN1_GENERALIZED_TIME;
  452. } else {
  453. after_tag = MBEDTLS_ASN1_UTC_TIME;
  454. not_after += 2;
  455. }
  456. end = buf + sizeof(buf);
  457. for (p = end - der_len; p < end;) {
  458. tag = *p++;
  459. sz = *p++;
  460. if (tag == MBEDTLS_ASN1_UTC_TIME || tag == MBEDTLS_ASN1_GENERALIZED_TIME) {
  461. // Check correct tag and time written
  462. TEST_ASSERT(before_tag == tag);
  463. TEST_ASSERT(memcmp(p, not_before, sz - 1) == 0);
  464. p += sz;
  465. tag = *p++;
  466. sz = *p++;
  467. TEST_ASSERT(after_tag == tag);
  468. TEST_ASSERT(memcmp(p, not_after, sz - 1) == 0);
  469. break;
  470. }
  471. // Increment if long form ASN1 length
  472. if (sz & 0x80) {
  473. p += sz & 0x0F;
  474. }
  475. if (tag != (MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) {
  476. p += sz;
  477. }
  478. }
  479. TEST_ASSERT(p < end);
  480. }
  481. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  482. // When using PSA crypto, RNG isn't controllable, result length isn't
  483. // deterministic over multiple runs, removing a single byte isn't enough to
  484. // go into the MBEDTLS_ERR_ASN1_BUF_TOO_SMALL error case
  485. if (issuer_key_type != MBEDTLS_PK_RSA) {
  486. der_len /= 2;
  487. } else
  488. #endif
  489. der_len -= 1;
  490. ret = mbedtls_x509write_crt_der(&crt, buf, (size_t) (der_len),
  491. mbedtls_test_rnd_pseudo_rand, &rnd_info);
  492. TEST_ASSERT(ret == MBEDTLS_ERR_ASN1_BUF_TOO_SMALL);
  493. exit:
  494. mbedtls_x509write_crt_free(&crt);
  495. mbedtls_pk_free(&issuer_key_alt);
  496. mbedtls_pk_free(&subject_key);
  497. mbedtls_pk_free(&issuer_key);
  498. #if defined(MBEDTLS_TEST_DEPRECATED) && defined(MBEDTLS_BIGNUM_C)
  499. mbedtls_mpi_free(&serial_mpi);
  500. #endif
  501. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  502. psa_destroy_key(key_id);
  503. #endif
  504. USE_PSA_DONE();
  505. }
  506. /* END_CASE */
  507. /* BEGIN_CASE depends_on:MBEDTLS_X509_CRT_WRITE_C */
  508. void x509_set_serial_check()
  509. {
  510. mbedtls_x509write_cert ctx;
  511. uint8_t invalid_serial[MBEDTLS_X509_RFC5280_MAX_SERIAL_LEN + 1];
  512. memset(invalid_serial, 0x01, sizeof(invalid_serial));
  513. #if defined(MBEDTLS_TEST_DEPRECATED) && defined(MBEDTLS_BIGNUM_C)
  514. mbedtls_mpi serial_mpi;
  515. mbedtls_mpi_init(&serial_mpi);
  516. TEST_EQUAL(mbedtls_mpi_read_binary(&serial_mpi, invalid_serial,
  517. sizeof(invalid_serial)), 0);
  518. TEST_EQUAL(mbedtls_x509write_crt_set_serial(&ctx, &serial_mpi),
  519. MBEDTLS_ERR_X509_BAD_INPUT_DATA);
  520. #endif
  521. TEST_EQUAL(mbedtls_x509write_crt_set_serial_raw(&ctx, invalid_serial,
  522. sizeof(invalid_serial)),
  523. MBEDTLS_ERR_X509_BAD_INPUT_DATA);
  524. exit:
  525. #if defined(MBEDTLS_TEST_DEPRECATED) && defined(MBEDTLS_BIGNUM_C)
  526. mbedtls_mpi_free(&serial_mpi);
  527. #else
  528. ;
  529. #endif
  530. }
  531. /* END_CASE */
  532. /* BEGIN_CASE depends_on:MBEDTLS_X509_CREATE_C:MBEDTLS_X509_USE_C */
  533. void mbedtls_x509_string_to_names(char *name, char *parsed_name, int result
  534. )
  535. {
  536. int ret;
  537. size_t len = 0;
  538. mbedtls_asn1_named_data *names = NULL;
  539. mbedtls_x509_name parsed, *parsed_cur, *parsed_prv;
  540. unsigned char buf[1024], out[1024], *c;
  541. memset(&parsed, 0, sizeof(parsed));
  542. memset(out, 0, sizeof(out));
  543. memset(buf, 0, sizeof(buf));
  544. c = buf + sizeof(buf);
  545. ret = mbedtls_x509_string_to_names(&names, name);
  546. TEST_ASSERT(ret == result);
  547. if (ret != 0) {
  548. goto exit;
  549. }
  550. ret = mbedtls_x509_write_names(&c, buf, names);
  551. TEST_ASSERT(ret > 0);
  552. TEST_ASSERT(mbedtls_asn1_get_tag(&c, buf + sizeof(buf), &len,
  553. MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE) == 0);
  554. TEST_ASSERT(mbedtls_x509_get_name(&c, buf + sizeof(buf), &parsed) == 0);
  555. ret = mbedtls_x509_dn_gets((char *) out, sizeof(out), &parsed);
  556. TEST_ASSERT(ret > 0);
  557. TEST_ASSERT(strcmp((char *) out, parsed_name) == 0);
  558. exit:
  559. mbedtls_asn1_free_named_data_list(&names);
  560. parsed_cur = parsed.next;
  561. while (parsed_cur != 0) {
  562. parsed_prv = parsed_cur;
  563. parsed_cur = parsed_cur->next;
  564. mbedtls_free(parsed_prv);
  565. }
  566. }
  567. /* END_CASE */