2023-09-03 18:24:16 -07:00

472 lines
13 KiB
C

/* $OpenBSD: signertest.c,v 1.6 2023/04/14 12:41:26 tb Exp $ */
/*
* Copyright (c) 2017, 2018, 2022 Joel Sing <jsing@openbsd.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <sys/socket.h>
#include <sys/stat.h>
#include <err.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <openssl/bio.h>
#include <openssl/err.h>
#include <openssl/pem.h>
#include <openssl/x509.h>
#include <tls.h>
#include "tls_internal.h"
#ifndef CERTSDIR
#define CERTSDIR "."
#endif
const char *cert_path = CERTSDIR;
int sign_cb_count;
static void
hexdump(const unsigned char *buf, size_t len)
{
size_t i;
for (i = 1; i <= len; i++)
fprintf(stderr, " 0x%02hhx,%s", buf[i - 1], i % 8 ? "" : "\n");
fprintf(stderr, "\n");
}
static void
load_file(const char *filename, const uint8_t **data, size_t *data_len)
{
char *filepath;
struct stat sb;
uint8_t *buf;
size_t len;
ssize_t n;
int fd;
if (asprintf(&filepath, "%s/%s", cert_path, filename) == -1)
err(1, "asprintf");
if ((fd = open(filepath, O_RDONLY)) == -1)
err(1, "failed to open '%s'", filepath);
if ((fstat(fd, &sb)) == -1)
err(1, "failed to stat '%s'", filepath);
if (sb.st_size < 0)
err(1, "file size invalid for '%s'", filepath);
len = (size_t)sb.st_size;
if ((buf = malloc(len)) == NULL)
err(1, "out of memory");
n = read(fd, buf, len);
if (n < 0 || (size_t)n != len)
err(1, "failed to read '%s'", filepath);
close(fd);
*data = buf;
*data_len = len;
free(filepath);
}
static int
compare_mem(char *label, const uint8_t *data1, size_t data1_len,
const uint8_t *data2, size_t data2_len)
{
if (data1_len != data2_len) {
fprintf(stderr, "FAIL: %s length mismatch (%zu != %zu)\n",
label, data1_len, data2_len);
fprintf(stderr, "Got:\n");
hexdump(data1, data1_len);
fprintf(stderr, "Want:\n");
hexdump(data2, data2_len);
return -1;
}
if (data1 == data2) {
fprintf(stderr, "FAIL: %s comparing same memory (%p == %p)\n",
label, data1, data2);
return -1;
}
if (memcmp(data1, data2, data1_len) != 0) {
fprintf(stderr, "FAIL: %s data mismatch\n", label);
fprintf(stderr, "Got:\n");
hexdump(data1, data1_len);
fprintf(stderr, "Want:\n");
hexdump(data2, data2_len);
return -1;
}
return 0;
}
const char *server_ecdsa_pubkey_hash = \
"SHA256:cef2616ece9a57a76d072013b0faad2232511487c67c45bf00fbcecc070e2f5b";
const char *server_rsa_pubkey_hash = \
"SHA256:f03c535d374614e7356c0a4e6fd37fe94297b60ed86212adcba40e8e0b07bc9f";
const char *server_unknown_pubkey_hash = \
"SHA256:f03c535d374614e7356c0a4e6fd37fe94297b60ed86212adcba40e8e0b07bc9e";
const uint8_t test_digest[] = {
0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10,
0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20,
};
const uint8_t test_rsa_signature[] = {
0x77, 0xfb, 0xdd, 0x41, 0x45, 0x40, 0x25, 0xd6,
0x01, 0xe0, 0x59, 0x04, 0x65, 0xae, 0xa1, 0x59,
0xae, 0xa2, 0x44, 0x08, 0xf7, 0x02, 0x3d, 0xe4,
0xc6, 0x0d, 0x4d, 0x9a, 0x3a, 0xce, 0x34, 0xbe,
0x2e, 0xc0, 0xfc, 0xbd, 0x5b, 0x21, 0xe4, 0xbb,
0xce, 0x02, 0xfd, 0xc3, 0xfc, 0x3d, 0x25, 0xe7,
0xd1, 0x9a, 0x13, 0x60, 0xcb, 0x07, 0xda, 0x23,
0xf7, 0xa3, 0xf0, 0xaf, 0x16, 0x1b, 0x28, 0x54,
0x0a, 0x3c, 0xc1, 0x31, 0x08, 0x0f, 0x2f, 0xce,
0x6d, 0x09, 0x45, 0x48, 0xee, 0x37, 0xa8, 0xc3,
0x91, 0xcb, 0xde, 0xad, 0xc6, 0xcf, 0x18, 0x19,
0xeb, 0xad, 0x08, 0x66, 0x2f, 0xce, 0x1d, 0x07,
0xe3, 0x03, 0x84, 0x00, 0xca, 0x0f, 0x1d, 0x0f,
0x0e, 0x6e, 0x54, 0xc1, 0x39, 0x3f, 0x2a, 0x78,
0xc8, 0xa3, 0x6d, 0x52, 0xb9, 0x26, 0x8e, 0x7e,
0x7a, 0x18, 0x3c, 0x8a, 0x50, 0xa3, 0xad, 0xab,
0xd0, 0x03, 0xc5, 0x3e, 0xa5, 0x46, 0x87, 0xb0,
0x03, 0xde, 0xd9, 0xe5, 0x4d, 0x73, 0x95, 0xcf,
0xe1, 0x59, 0x8e, 0x2e, 0x50, 0x69, 0xe6, 0x20,
0xaf, 0x21, 0x4f, 0xe6, 0xc4, 0x86, 0x11, 0x36,
0x79, 0x68, 0x83, 0xde, 0x0e, 0x81, 0xde, 0x2e,
0xd0, 0x19, 0x3f, 0x4b, 0xad, 0x3e, 0xbf, 0xdd,
0x14, 0x4d, 0x66, 0xf3, 0x7f, 0x7d, 0xca, 0xed,
0x99, 0x62, 0xdc, 0x7c, 0xb2, 0x8b, 0x57, 0xcb,
0xdf, 0xed, 0x16, 0x13, 0x86, 0xd8, 0xd8, 0xb4,
0x44, 0x6e, 0xd5, 0x54, 0xbc, 0xdf, 0xe7, 0x34,
0x10, 0xa4, 0x17, 0x5f, 0xb7, 0xe1, 0x33, 0x2c,
0xc1, 0x70, 0x5b, 0x87, 0x0d, 0x39, 0xee, 0xe8,
0xec, 0x18, 0x92, 0xe8, 0x95, 0xa8, 0x93, 0x26,
0xdf, 0x26, 0x93, 0x96, 0xfd, 0xad, 0x81, 0xb6,
0xeb, 0x72, 0x9c, 0xd4, 0xcc, 0xf6, 0x9f, 0xb0,
0xbb, 0xbd, 0xbd, 0x44, 0x1c, 0x99, 0x07, 0x6d,
};
static int
do_signer_tests(void)
{
char *server_rsa_filepath = NULL;
const uint8_t *server_ecdsa = NULL;
size_t server_ecdsa_len;
struct tls_signer *signer = NULL;
uint8_t *signature = NULL;
size_t signature_len;
EC_KEY *ec_key = NULL;
X509 *x509 = NULL;
BIO *bio = NULL;
int failed = 1;
load_file("server1-ecdsa.pem", &server_ecdsa, &server_ecdsa_len);
if (asprintf(&server_rsa_filepath, "%s/%s", cert_path,
"server1-rsa.pem") == -1) {
fprintf(stderr, "FAIL: failed to build rsa file path\n");
goto failure;
}
/* Load the ECDSA public key - we'll need it later. */
if ((bio = BIO_new_mem_buf(server_ecdsa, server_ecdsa_len)) == NULL) {
fprintf(stderr, "FAIL: failed to create bio\n");
goto failure;
}
if ((x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL)) == NULL) {
fprintf(stderr, "FAIL: failed to load certificate\n");
goto failure;
}
if ((ec_key = EVP_PKEY_get1_EC_KEY(X509_get0_pubkey(x509))) == NULL) {
fprintf(stderr, "FAIL: failed to get EC public key\n");
goto failure;
}
/* Create signer and add key pairs (one ECDSA, one RSA). */
if ((signer = tls_signer_new()) == NULL) {
fprintf(stderr, "FAIL: failed to create tls signer\n");
goto failure;
}
if (tls_signer_add_keypair_mem(signer, server_ecdsa, server_ecdsa_len,
server_ecdsa, server_ecdsa_len) == -1) {
fprintf(stderr, "FAIL: failed to add ECDSA keypair to tls "
"signer: %s\n", tls_signer_error(signer));
goto failure;
}
if (tls_signer_add_keypair_file(signer, server_rsa_filepath,
server_rsa_filepath) == -1) {
fprintf(stderr, "FAIL: failed to add RSA keypair to tls "
"signer: %s\n", tls_signer_error(signer));
goto failure;
}
/* Sign with RSA. */
if (tls_signer_sign(signer, server_rsa_pubkey_hash, test_digest,
sizeof(test_digest), TLS_PADDING_RSA_PKCS1, &signature,
&signature_len) == -1) {
fprintf(stderr, "FAIL: failed to sign with RSA key: %s\n",
tls_signer_error(signer));
goto failure;
}
if (compare_mem("rsa signature", signature, signature_len,
test_rsa_signature, sizeof(test_rsa_signature)) == -1)
goto failure;
free(signature);
signature = NULL;
/*
* Sign with ECDSA - ECDSA signatures are non-deterministic so we cannot
* check against a known value, rather we can only verify the signature.
*/
if (tls_signer_sign(signer, server_ecdsa_pubkey_hash, test_digest,
sizeof(test_digest), TLS_PADDING_NONE, &signature,
&signature_len) == -1) {
fprintf(stderr, "FAIL: failed to sign with ECDSA key: %s\n",
tls_signer_error(signer));
goto failure;
}
if (ECDSA_verify(0, test_digest, sizeof(test_digest), signature,
signature_len, ec_key) != 1) {
fprintf(stderr, "FAIL: failed to verify ECDSA signature\n");
goto failure;
}
free(signature);
signature = NULL;
/* Attempt to sign with an unknown cert pubkey hash. */
if (tls_signer_sign(signer, server_unknown_pubkey_hash, test_digest,
sizeof(test_digest), TLS_PADDING_NONE, &signature,
&signature_len) != -1) {
fprintf(stderr, "FAIL: signing succeeded with unknown key\n");
goto failure;
}
if (strcmp(tls_signer_error(signer), "key not found") != 0) {
fprintf(stderr, "FAIL: got tls signer error '%s', want "
"'key not found'\n", tls_signer_error(signer));
goto failure;
}
failed = 0;
failure:
BIO_free(bio);
EC_KEY_free(ec_key);
X509_free(x509);
tls_signer_free(signer);
free((uint8_t *)server_ecdsa);
free(server_rsa_filepath);
free(signature);
return failed;
}
static int
do_tls_handshake(char *name, struct tls *ctx)
{
int rv;
rv = tls_handshake(ctx);
if (rv == 0)
return (1);
if (rv == TLS_WANT_POLLIN || rv == TLS_WANT_POLLOUT)
return (0);
errx(1, "%s handshake failed: %s", name, tls_error(ctx));
}
static int
do_client_server_handshake(char *desc, struct tls *client,
struct tls *server_cctx)
{
int i, client_done, server_done;
i = client_done = server_done = 0;
do {
if (client_done == 0)
client_done = do_tls_handshake("client", client);
if (server_done == 0)
server_done = do_tls_handshake("server", server_cctx);
} while (i++ < 100 && (client_done == 0 || server_done == 0));
if (client_done == 0 || server_done == 0) {
printf("FAIL: %s TLS handshake did not complete\n", desc);
return (1);
}
return (0);
}
static int
test_tls_handshake_socket(struct tls *client, struct tls *server)
{
struct tls *server_cctx;
int failure;
int sv[2];
if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK, PF_UNSPEC,
sv) == -1)
err(1, "failed to create socketpair");
if (tls_accept_socket(server, &server_cctx, sv[0]) == -1)
errx(1, "failed to accept: %s", tls_error(server));
if (tls_connect_socket(client, sv[1], "test") == -1)
errx(1, "failed to connect: %s", tls_error(client));
failure = do_client_server_handshake("socket", client, server_cctx);
tls_free(server_cctx);
close(sv[0]);
close(sv[1]);
return (failure);
}
static int
test_signer_tls_sign(void *cb_arg, const char *pubkey_hash,
const uint8_t *input, size_t input_len, int padding_type,
uint8_t **out_signature, size_t *out_signature_len)
{
struct tls_signer *signer = cb_arg;
sign_cb_count++;
return tls_signer_sign(signer, pubkey_hash, input, input_len,
padding_type, out_signature, out_signature_len);
}
static int
test_signer_tls(char *certfile, char *keyfile, char *cafile)
{
struct tls_config *client_cfg, *server_cfg;
struct tls_signer *signer;
struct tls *client, *server;
int failure = 0;
if ((signer = tls_signer_new()) == NULL)
errx(1, "failed to create tls signer");
if (tls_signer_add_keypair_file(signer, certfile, keyfile))
errx(1, "failed to add keypair to signer");
if ((client = tls_client()) == NULL)
errx(1, "failed to create tls client");
if ((client_cfg = tls_config_new()) == NULL)
errx(1, "failed to create tls client config");
tls_config_insecure_noverifyname(client_cfg);
if (tls_config_set_ca_file(client_cfg, cafile) == -1)
errx(1, "failed to set ca: %s", tls_config_error(client_cfg));
if ((server = tls_server()) == NULL)
errx(1, "failed to create tls server");
if ((server_cfg = tls_config_new()) == NULL)
errx(1, "failed to create tls server config");
if (tls_config_set_sign_cb(server_cfg, test_signer_tls_sign,
signer) == -1)
errx(1, "failed to set server signer callback: %s",
tls_config_error(server_cfg));
if (tls_config_set_cert_file(server_cfg, certfile) == -1)
errx(1, "failed to set server certificate: %s",
tls_config_error(server_cfg));
if (tls_configure(client, client_cfg) == -1)
errx(1, "failed to configure client: %s", tls_error(client));
if (tls_configure(server, server_cfg) == -1)
errx(1, "failed to configure server: %s", tls_error(server));
tls_config_free(client_cfg);
tls_config_free(server_cfg);
failure |= test_tls_handshake_socket(client, server);
tls_signer_free(signer);
tls_free(client);
tls_free(server);
return (failure);
}
static int
do_signer_tls_tests(void)
{
char *server_ecdsa_cert = NULL, *server_ecdsa_key = NULL;
char *server_rsa_cert = NULL, *server_rsa_key = NULL;
char *ca_root_ecdsa = NULL, *ca_root_rsa = NULL;
int failure = 0;
if (asprintf(&ca_root_ecdsa, "%s/%s", cert_path,
"ca-root-ecdsa.pem") == -1)
err(1, "ca ecdsa root");
if (asprintf(&ca_root_rsa, "%s/%s", cert_path,
"ca-root-rsa.pem") == -1)
err(1, "ca rsa root");
if (asprintf(&server_ecdsa_cert, "%s/%s", cert_path,
"server1-ecdsa-chain.pem") == -1)
err(1, "server ecdsa chain");
if (asprintf(&server_ecdsa_key, "%s/%s", cert_path,
"server1-ecdsa.pem") == -1)
err(1, "server ecdsa key");
if (asprintf(&server_rsa_cert, "%s/%s", cert_path,
"server1-rsa-chain.pem") == -1)
err(1, "server rsa chain");
if (asprintf(&server_rsa_key, "%s/%s", cert_path,
"server1-rsa.pem") == -1)
err(1, "server rsa key");
failure |= test_signer_tls(server_ecdsa_cert, server_ecdsa_key,
ca_root_ecdsa);
failure |= test_signer_tls(server_rsa_cert, server_rsa_key,
ca_root_rsa);
if (sign_cb_count != 2) {
fprintf(stderr, "FAIL: sign callback was called %d times, "
"want 2\n", sign_cb_count);
failure |= 1;
}
free(ca_root_ecdsa);
free(ca_root_rsa);
free(server_ecdsa_cert);
free(server_ecdsa_key);
free(server_rsa_cert);
free(server_rsa_key);
return (failure);
}
int
main(int argc, char **argv)
{
int failure = 0;
if (argc > 2) {
fprintf(stderr, "usage: %s [certpath]\n", argv[0]);
return (1);
}
if (argc == 2)
cert_path = argv[1];
failure |= do_signer_tests();
failure |= do_signer_tls_tests();
return (failure);
}