mirror of
https://github.com/QuasarApp/openssl.git
synced 2025-05-02 20:49:39 +00:00
chunk 6 of CMP contribution to OpenSSL
Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10297)
This commit is contained in:
parent
0402c90ff9
commit
3dbc5156b0
@ -1,3 +1,3 @@
|
|||||||
LIBS=../../libcrypto
|
LIBS=../../libcrypto
|
||||||
SOURCE[../../libcrypto]= cmp_asn.c cmp_ctx.c cmp_err.c cmp_util.c \
|
SOURCE[../../libcrypto]= cmp_asn.c cmp_ctx.c cmp_err.c cmp_util.c \
|
||||||
cmp_status.c cmp_hdr.c
|
cmp_status.c cmp_hdr.c cmp_protect.c cmp_msg.c
|
||||||
|
@ -946,7 +946,8 @@ int OSSL_CMP_CTX_get_failInfoCode(const OSSL_CMP_CTX *ctx)
|
|||||||
* Sets a Boolean or integer option of the context to the "val" arg.
|
* Sets a Boolean or integer option of the context to the "val" arg.
|
||||||
* Returns 1 on success, 0 on error
|
* Returns 1 on success, 0 on error
|
||||||
*/
|
*/
|
||||||
int OSSL_CMP_CTX_set_option(OSSL_CMP_CTX *ctx, int opt, int val) {
|
int OSSL_CMP_CTX_set_option(OSSL_CMP_CTX *ctx, int opt, int val)
|
||||||
|
{
|
||||||
int min_val;
|
int min_val;
|
||||||
|
|
||||||
if (ctx == NULL) {
|
if (ctx == NULL) {
|
||||||
@ -1049,7 +1050,8 @@ int OSSL_CMP_CTX_set_option(OSSL_CMP_CTX *ctx, int opt, int val) {
|
|||||||
* Reads a Boolean or integer option value from the context.
|
* Reads a Boolean or integer option value from the context.
|
||||||
* Returns -1 on error (which is the default OSSL_CMP_OPT_REVOCATION_REASON)
|
* Returns -1 on error (which is the default OSSL_CMP_OPT_REVOCATION_REASON)
|
||||||
*/
|
*/
|
||||||
int OSSL_CMP_CTX_get_option(const OSSL_CMP_CTX *ctx, int opt) {
|
int OSSL_CMP_CTX_get_option(const OSSL_CMP_CTX *ctx, int opt)
|
||||||
|
{
|
||||||
if (ctx == NULL) {
|
if (ctx == NULL) {
|
||||||
CMPerr(0, CMP_R_NULL_ARGUMENT);
|
CMPerr(0, CMP_R_NULL_ARGUMENT);
|
||||||
return -1;
|
return -1;
|
||||||
|
@ -1,7 +1,6 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
|
* Generated by util/mkerr.pl DO NOT EDIT
|
||||||
* Copyright Nokia 2007-2019
|
* Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
* Copyright Siemens AG 2015-2019
|
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
* this file except in compliance with the License. You can obtain a copy
|
* this file except in compliance with the License. You can obtain a copy
|
||||||
@ -15,17 +14,69 @@
|
|||||||
#ifndef OPENSSL_NO_ERR
|
#ifndef OPENSSL_NO_ERR
|
||||||
|
|
||||||
static const ERR_STRING_DATA CMP_str_reasons[] = {
|
static const ERR_STRING_DATA CMP_str_reasons[] = {
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_BAD_REQUEST_ID), "bad request id"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_CERTID_NOT_FOUND), "certid not found"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_CERTIFICATE_NOT_FOUND),
|
||||||
|
"certificate not found"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_CERTRESPONSE_NOT_FOUND),
|
||||||
|
"certresponse not found"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_CERT_AND_KEY_DO_NOT_MATCH),
|
||||||
|
"cert and key do not match"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CALCULATING_PROTECTION),
|
||||||
|
"error calculating protection"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_CERTCONF),
|
||||||
|
"error creating certconf"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_CERTREP),
|
||||||
|
"error creating certrep"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_ERROR),
|
||||||
|
"error creating error"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_GENM),
|
||||||
|
"error creating genm"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_GENP),
|
||||||
|
"error creating genp"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_P10CR),
|
||||||
|
"error creating p10cr"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_PKICONF),
|
||||||
|
"error creating pkiconf"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_POLLREP),
|
||||||
|
"error creating pollrep"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_POLLREQ),
|
||||||
|
"error creating pollreq"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_RP), "error creating rp"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_RR), "error creating rr"},
|
||||||
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_PARSING_PKISTATUS),
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_PARSING_PKISTATUS),
|
||||||
"error parsing pkistatus"},
|
"error parsing pkistatus"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_PROTECTING_MESSAGE),
|
||||||
|
"error protecting message"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_SETTING_CERTHASH),
|
||||||
|
"error setting certhash"},
|
||||||
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_FAILURE_OBTAINING_RANDOM),
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_FAILURE_OBTAINING_RANDOM),
|
||||||
"failure obtaining random"},
|
"failure obtaining random"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_FAIL_INFO_OUT_OF_RANGE),
|
||||||
|
"fail info out of range"},
|
||||||
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_INVALID_ARGS), "invalid args"},
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_INVALID_ARGS), "invalid args"},
|
||||||
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MULTIPLE_SAN_SOURCES),
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MISSING_KEY_INPUT_FOR_CREATING_PROTECTION),
|
||||||
"multiple san sources"},
|
"missing key input for creating protection"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MISSING_PRIVATE_KEY),
|
||||||
|
"missing private key"},
|
||||||
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MISSING_SENDER_IDENTIFICATION),
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MISSING_SENDER_IDENTIFICATION),
|
||||||
"missing sender identification"},
|
"missing sender identification"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MULTIPLE_SAN_SOURCES),
|
||||||
|
"multiple san sources"},
|
||||||
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_NO_STDIO), "no stdio"},
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_NO_STDIO), "no stdio"},
|
||||||
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_NULL_ARGUMENT), "null argument"},
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_NULL_ARGUMENT), "null argument"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_PKISTATUSINFO_NOT_FOUND),
|
||||||
|
"pkistatusinfo not found"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNEXPECTED_PKIBODY), "unexpected pkibody"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNKNOWN_ALGORITHM_ID),
|
||||||
|
"unknown algorithm id"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNKNOWN_CERT_TYPE), "unknown cert type"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNSUPPORTED_ALGORITHM),
|
||||||
|
"unsupported algorithm"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNSUPPORTED_KEY_TYPE),
|
||||||
|
"unsupported key type"},
|
||||||
|
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_WRONG_ALGORITHM_OID),
|
||||||
|
"wrong algorithm oid"},
|
||||||
{0, NULL}
|
{0, NULL}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -279,6 +279,7 @@ struct ossl_cmp_pkisi_st {
|
|||||||
} /* OSSL_CMP_PKISI */;
|
} /* OSSL_CMP_PKISI */;
|
||||||
DECLARE_ASN1_FUNCTIONS(OSSL_CMP_PKISI)
|
DECLARE_ASN1_FUNCTIONS(OSSL_CMP_PKISI)
|
||||||
DECLARE_ASN1_DUP_FUNCTION(OSSL_CMP_PKISI)
|
DECLARE_ASN1_DUP_FUNCTION(OSSL_CMP_PKISI)
|
||||||
|
DECLARE_ASN1_DUP_FUNCTION(OSSL_CRMF_CERTID)
|
||||||
|
|
||||||
/*-
|
/*-
|
||||||
* RevReqContent ::= SEQUENCE OF RevDetails
|
* RevReqContent ::= SEQUENCE OF RevDetails
|
||||||
@ -526,6 +527,7 @@ DECLARE_ASN1_FUNCTIONS(OSSL_CMP_GENREPCONTENT)
|
|||||||
* certConf [24] CertConfirmContent, --Certificate confirm
|
* certConf [24] CertConfirmContent, --Certificate confirm
|
||||||
* pollReq [25] PollReqContent, --Polling request
|
* pollReq [25] PollReqContent, --Polling request
|
||||||
* pollRep [26] PollRepContent --Polling response
|
* pollRep [26] PollRepContent --Polling response
|
||||||
|
* }
|
||||||
*/
|
*/
|
||||||
typedef struct ossl_cmp_pkibody_st {
|
typedef struct ossl_cmp_pkibody_st {
|
||||||
int type;
|
int type;
|
||||||
@ -679,6 +681,13 @@ DECLARE_ASN1_FUNCTIONS(CMP_PROTECTEDPART)
|
|||||||
* }
|
* }
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* constants
|
||||||
|
*/
|
||||||
|
/* certReqId for the first - and so far only - certificate request */
|
||||||
|
# define OSSL_CMP_CERTREQID 0
|
||||||
|
/* sequence id for the first - and so far only - revocation request */
|
||||||
|
# define OSSL_CMP_REVREQSID 0
|
||||||
/*
|
/*
|
||||||
* functions
|
* functions
|
||||||
*/
|
*/
|
||||||
@ -752,4 +761,91 @@ int ossl_cmp_hdr_check_implicitConfirm(const OSSL_CMP_PKIHEADER *hdr);
|
|||||||
# define OSSL_CMP_SENDERNONCE_LENGTH 16
|
# define OSSL_CMP_SENDERNONCE_LENGTH 16
|
||||||
int ossl_cmp_hdr_init(OSSL_CMP_CTX *ctx, OSSL_CMP_PKIHEADER *hdr);
|
int ossl_cmp_hdr_init(OSSL_CMP_CTX *ctx, OSSL_CMP_PKIHEADER *hdr);
|
||||||
|
|
||||||
|
/* from cmp_msg.c */
|
||||||
|
/* OSSL_CMP_MSG bodytype ASN.1 choice IDs */
|
||||||
|
# define OSSL_CMP_PKIBODY_IR 0
|
||||||
|
# define OSSL_CMP_PKIBODY_IP 1
|
||||||
|
# define OSSL_CMP_PKIBODY_CR 2
|
||||||
|
# define OSSL_CMP_PKIBODY_CP 3
|
||||||
|
# define OSSL_CMP_PKIBODY_P10CR 4
|
||||||
|
# define OSSL_CMP_PKIBODY_POPDECC 5
|
||||||
|
# define OSSL_CMP_PKIBODY_POPDECR 6
|
||||||
|
# define OSSL_CMP_PKIBODY_KUR 7
|
||||||
|
# define OSSL_CMP_PKIBODY_KUP 8
|
||||||
|
# define OSSL_CMP_PKIBODY_KRR 9
|
||||||
|
# define OSSL_CMP_PKIBODY_KRP 10
|
||||||
|
# define OSSL_CMP_PKIBODY_RR 11
|
||||||
|
# define OSSL_CMP_PKIBODY_RP 12
|
||||||
|
# define OSSL_CMP_PKIBODY_CCR 13
|
||||||
|
# define OSSL_CMP_PKIBODY_CCP 14
|
||||||
|
# define OSSL_CMP_PKIBODY_CKUANN 15
|
||||||
|
# define OSSL_CMP_PKIBODY_CANN 16
|
||||||
|
# define OSSL_CMP_PKIBODY_RANN 17
|
||||||
|
# define OSSL_CMP_PKIBODY_CRLANN 18
|
||||||
|
# define OSSL_CMP_PKIBODY_PKICONF 19
|
||||||
|
# define OSSL_CMP_PKIBODY_NESTED 20
|
||||||
|
# define OSSL_CMP_PKIBODY_GENM 21
|
||||||
|
# define OSSL_CMP_PKIBODY_GENP 22
|
||||||
|
# define OSSL_CMP_PKIBODY_ERROR 23
|
||||||
|
# define OSSL_CMP_PKIBODY_CERTCONF 24
|
||||||
|
# define OSSL_CMP_PKIBODY_POLLREQ 25
|
||||||
|
# define OSSL_CMP_PKIBODY_POLLREP 26
|
||||||
|
# define OSSL_CMP_PKIBODY_TYPE_MAX OSSL_CMP_PKIBODY_POLLREP
|
||||||
|
const char *ossl_cmp_bodytype_to_string(int type);
|
||||||
|
int ossl_cmp_msg_set_bodytype(OSSL_CMP_MSG *msg, int type);
|
||||||
|
int ossl_cmp_msg_get_bodytype(const OSSL_CMP_MSG *msg);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_msg_create(OSSL_CMP_CTX *ctx, int bodytype);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_certReq_new(OSSL_CMP_CTX *ctx, int bodytype,
|
||||||
|
int err_code);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_certRep_new(OSSL_CMP_CTX *ctx, int bodytype,
|
||||||
|
int certReqId, OSSL_CMP_PKISI *si,
|
||||||
|
X509 *cert, STACK_OF(X509) *chain,
|
||||||
|
STACK_OF(X509) *caPubs, int encrypted,
|
||||||
|
int unprotectedErrors);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_rr_new(OSSL_CMP_CTX *ctx);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_rp_new(OSSL_CMP_CTX *ctx, OSSL_CMP_PKISI *si,
|
||||||
|
OSSL_CRMF_CERTID *certId, int unprot_err);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_pkiconf_new(OSSL_CMP_CTX *ctx);
|
||||||
|
int ossl_cmp_msg_gen_push0_ITAV(OSSL_CMP_MSG *msg, OSSL_CMP_ITAV *itav);
|
||||||
|
int ossl_cmp_msg_gen_push1_ITAVs(OSSL_CMP_MSG *msg,
|
||||||
|
STACK_OF(OSSL_CMP_ITAV) *itavs);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_genm_new(OSSL_CMP_CTX *ctx);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_genp_new(OSSL_CMP_CTX *ctx);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_error_new(OSSL_CMP_CTX *ctx, OSSL_CMP_PKISI *si,
|
||||||
|
int errorCode,
|
||||||
|
OSSL_CMP_PKIFREETEXT *errorDetails,
|
||||||
|
int unprotected);
|
||||||
|
int ossl_cmp_certstatus_set_certHash(OSSL_CMP_CERTSTATUS *certStatus,
|
||||||
|
const X509 *cert);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_certConf_new(OSSL_CMP_CTX *ctx, int fail_info,
|
||||||
|
const char *text);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_pollReq_new(OSSL_CMP_CTX *ctx, int crid);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_pollRep_new(OSSL_CMP_CTX *ctx, int crid,
|
||||||
|
int64_t poll_after);
|
||||||
|
OSSL_CMP_PKISI *
|
||||||
|
ossl_cmp_revrepcontent_get_pkistatusinfo(OSSL_CMP_REVREPCONTENT *rrep, int rsid);
|
||||||
|
OSSL_CRMF_CERTID *ossl_cmp_revrepcontent_get_CertId(OSSL_CMP_REVREPCONTENT *rrep,
|
||||||
|
int rsid);
|
||||||
|
OSSL_CMP_POLLREP *
|
||||||
|
ossl_cmp_pollrepcontent_get0_pollrep(const OSSL_CMP_POLLREPCONTENT *prc,
|
||||||
|
int rid);
|
||||||
|
OSSL_CMP_CERTRESPONSE *
|
||||||
|
ossl_cmp_certrepmessage_get0_certresponse(const OSSL_CMP_CERTREPMESSAGE *crepmsg,
|
||||||
|
int rid);
|
||||||
|
X509 *ossl_cmp_certresponse_get1_certificate(EVP_PKEY *privkey,
|
||||||
|
const OSSL_CMP_CERTRESPONSE *crep);
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_msg_load(const char *file);
|
||||||
|
/* BIO definitions */
|
||||||
|
# define OSSL_d2i_CMP_MSG_bio(bp, p) \
|
||||||
|
ASN1_d2i_bio_of(OSSL_CMP_MSG, OSSL_CMP_MSG_new, d2i_OSSL_CMP_MSG, bp, p)
|
||||||
|
# define OSSL_i2d_CMP_MSG_bio(bp, o) \
|
||||||
|
ASN1_i2d_bio_of(OSSL_CMP_MSG, i2d_OSSL_CMP_MSG, bp, o)
|
||||||
|
|
||||||
|
/* from cmp_protect.c */
|
||||||
|
ASN1_BIT_STRING *ossl_cmp_calc_protection(const OSSL_CMP_MSG *msg,
|
||||||
|
const ASN1_OCTET_STRING *secret,
|
||||||
|
EVP_PKEY *pkey);
|
||||||
|
int ossl_cmp_msg_add_extraCerts(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
|
||||||
|
int ossl_cmp_msg_protect(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
|
||||||
|
|
||||||
#endif /* !defined OSSL_CRYPTO_CMP_LOCAL_H */
|
#endif /* !defined OSSL_CRYPTO_CMP_LOCAL_H */
|
||||||
|
996
crypto/cmp/cmp_msg.c
Normal file
996
crypto/cmp/cmp_msg.c
Normal file
@ -0,0 +1,996 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
* Copyright Nokia 2007-2019
|
||||||
|
* Copyright Siemens AG 2015-2019
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
* this file except in compliance with the License. You can obtain a copy
|
||||||
|
* in the file LICENSE in the source distribution or at
|
||||||
|
* https://www.openssl.org/source/license.html
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* CMP functions for PKIMessage construction */
|
||||||
|
|
||||||
|
#include "cmp_local.h"
|
||||||
|
|
||||||
|
/* explicit #includes not strictly needed since implied by the above: */
|
||||||
|
#include <openssl/asn1t.h>
|
||||||
|
#include <openssl/cmp.h>
|
||||||
|
#include <openssl/crmf.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/x509.h>
|
||||||
|
|
||||||
|
OSSL_CMP_PKIHEADER *OSSL_CMP_MSG_get0_header(const OSSL_CMP_MSG *msg)
|
||||||
|
{
|
||||||
|
if (msg == NULL) {
|
||||||
|
CMPerr(0, CMP_R_NULL_ARGUMENT);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
return msg->header;
|
||||||
|
}
|
||||||
|
|
||||||
|
const char *ossl_cmp_bodytype_to_string(int type)
|
||||||
|
{
|
||||||
|
static const char *type_names[] = {
|
||||||
|
"IR", "IP", "CR", "CP", "P10CR",
|
||||||
|
"POPDECC", "POPDECR", "KUR", "KUP",
|
||||||
|
"KRR", "KRP", "RR", "RP", "CCR", "CCP",
|
||||||
|
"CKUANN", "CANN", "RANN", "CRLANN", "PKICONF", "NESTED",
|
||||||
|
"GENM", "GENP", "ERROR", "CERTCONF", "POLLREQ", "POLLREP",
|
||||||
|
};
|
||||||
|
|
||||||
|
if (type < 0 || type > OSSL_CMP_PKIBODY_TYPE_MAX)
|
||||||
|
return "illegal body type";
|
||||||
|
return type_names[type];
|
||||||
|
}
|
||||||
|
|
||||||
|
int ossl_cmp_msg_set_bodytype(OSSL_CMP_MSG *msg, int type)
|
||||||
|
{
|
||||||
|
if (!ossl_assert(msg != NULL && msg->body != NULL))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
msg->body->type = type;
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int ossl_cmp_msg_get_bodytype(const OSSL_CMP_MSG *msg)
|
||||||
|
{
|
||||||
|
if (!ossl_assert(msg != NULL && msg->body != NULL))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
return msg->body->type;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Add an extension to the referenced extension stack, which may be NULL */
|
||||||
|
static int add1_extension(X509_EXTENSIONS **pexts, int nid, int crit, void *ex)
|
||||||
|
{
|
||||||
|
X509_EXTENSION *ext;
|
||||||
|
int res;
|
||||||
|
|
||||||
|
if (!ossl_assert(pexts != NULL)) /* pointer to var must not be NULL */
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if ((ext = X509V3_EXT_i2d(nid, crit, ex)) == NULL)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
res = X509v3_add_ext(pexts, ext, 0) != NULL;
|
||||||
|
X509_EXTENSION_free(ext);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Add a CRL revocation reason code to extension stack, which may be NULL */
|
||||||
|
static int add_crl_reason_extension(X509_EXTENSIONS **pexts, int reason_code)
|
||||||
|
{
|
||||||
|
ASN1_ENUMERATED *val = ASN1_ENUMERATED_new();
|
||||||
|
int res = 0;
|
||||||
|
|
||||||
|
if (val != NULL && ASN1_ENUMERATED_set(val, reason_code))
|
||||||
|
res = add1_extension(pexts, NID_crl_reason, 0 /* non-critical */, val);
|
||||||
|
ASN1_ENUMERATED_free(val);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_msg_create(OSSL_CMP_CTX *ctx, int bodytype)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((msg = OSSL_CMP_MSG_new()) == NULL)
|
||||||
|
return NULL;
|
||||||
|
if (!ossl_cmp_hdr_init(ctx, msg->header)
|
||||||
|
|| !ossl_cmp_msg_set_bodytype(msg, bodytype))
|
||||||
|
goto err;
|
||||||
|
if (ctx->geninfo_ITAVs != NULL
|
||||||
|
&& !ossl_cmp_hdr_generalInfo_push1_items(msg->header,
|
||||||
|
ctx->geninfo_ITAVs))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
switch (bodytype) {
|
||||||
|
case OSSL_CMP_PKIBODY_IR:
|
||||||
|
case OSSL_CMP_PKIBODY_CR:
|
||||||
|
case OSSL_CMP_PKIBODY_KUR:
|
||||||
|
if ((msg->body->value.ir = OSSL_CRMF_MSGS_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
case OSSL_CMP_PKIBODY_P10CR:
|
||||||
|
if (ctx->p10CSR == NULL) {
|
||||||
|
CMPerr(0, CMP_R_ERROR_CREATING_P10CR);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
if ((msg->body->value.p10cr = X509_REQ_dup(ctx->p10CSR)) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
case OSSL_CMP_PKIBODY_IP:
|
||||||
|
case OSSL_CMP_PKIBODY_CP:
|
||||||
|
case OSSL_CMP_PKIBODY_KUP:
|
||||||
|
if ((msg->body->value.ip = OSSL_CMP_CERTREPMESSAGE_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
case OSSL_CMP_PKIBODY_RR:
|
||||||
|
if ((msg->body->value.rr = sk_OSSL_CMP_REVDETAILS_new_null()) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
case OSSL_CMP_PKIBODY_RP:
|
||||||
|
if ((msg->body->value.rp = OSSL_CMP_REVREPCONTENT_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
case OSSL_CMP_PKIBODY_CERTCONF:
|
||||||
|
if ((msg->body->value.certConf =
|
||||||
|
sk_OSSL_CMP_CERTSTATUS_new_null()) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
case OSSL_CMP_PKIBODY_PKICONF:
|
||||||
|
if ((msg->body->value.pkiconf = ASN1_TYPE_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
ASN1_TYPE_set(msg->body->value.pkiconf, V_ASN1_NULL, NULL);
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
case OSSL_CMP_PKIBODY_POLLREQ:
|
||||||
|
if ((msg->body->value.pollReq = sk_OSSL_CMP_POLLREQ_new_null()) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
case OSSL_CMP_PKIBODY_POLLREP:
|
||||||
|
if ((msg->body->value.pollRep = sk_OSSL_CMP_POLLREP_new_null()) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
case OSSL_CMP_PKIBODY_GENM:
|
||||||
|
case OSSL_CMP_PKIBODY_GENP:
|
||||||
|
if ((msg->body->value.genm = sk_OSSL_CMP_ITAV_new_null()) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
case OSSL_CMP_PKIBODY_ERROR:
|
||||||
|
if ((msg->body->value.error = OSSL_CMP_ERRORMSGCONTENT_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
default:
|
||||||
|
CMPerr(0, CMP_R_UNEXPECTED_PKIBODY);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
err:
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
#define HAS_SAN(ctx) \
|
||||||
|
(sk_GENERAL_NAME_num((ctx)->subjectAltNames) > 0 \
|
||||||
|
|| OSSL_CMP_CTX_reqExtensions_have_SAN(ctx) == 1)
|
||||||
|
|
||||||
|
static X509_NAME *determine_subj(OSSL_CMP_CTX *ctx, X509 *refcert,
|
||||||
|
int bodytype)
|
||||||
|
{
|
||||||
|
if (ctx->subjectName != NULL)
|
||||||
|
return ctx->subjectName;
|
||||||
|
|
||||||
|
if (refcert != NULL
|
||||||
|
&& (bodytype == OSSL_CMP_PKIBODY_KUR || !HAS_SAN(ctx)))
|
||||||
|
/*
|
||||||
|
* For KUR, copy subjectName from reference certificate.
|
||||||
|
* For IR or CR, do the same only if there is no subjectAltName.
|
||||||
|
*/
|
||||||
|
return X509_get_subject_name(refcert);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Create CRMF certificate request message for IR/CR/KUR
|
||||||
|
* returns a pointer to the OSSL_CRMF_MSG on success, NULL on error
|
||||||
|
*/
|
||||||
|
static OSSL_CRMF_MSG *crm_new(OSSL_CMP_CTX *ctx, int bodytype,
|
||||||
|
int rid, EVP_PKEY *rkey)
|
||||||
|
{
|
||||||
|
OSSL_CRMF_MSG *crm = NULL;
|
||||||
|
X509 *refcert = ctx->oldCert != NULL ? ctx->oldCert : ctx->clCert;
|
||||||
|
/* refcert defaults to current client cert */
|
||||||
|
STACK_OF(GENERAL_NAME) *default_sans = NULL;
|
||||||
|
X509_NAME *subject = determine_subj(ctx, refcert, bodytype);
|
||||||
|
int crit = ctx->setSubjectAltNameCritical || subject == NULL;
|
||||||
|
/* RFC5280: subjectAltName MUST be critical if subject is null */
|
||||||
|
X509_EXTENSIONS *exts = NULL;
|
||||||
|
|
||||||
|
if (rkey == NULL
|
||||||
|
|| (bodytype == OSSL_CMP_PKIBODY_KUR && refcert == NULL)) {
|
||||||
|
CMPerr(0, CMP_R_INVALID_ARGS);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
if ((crm = OSSL_CRMF_MSG_new()) == NULL)
|
||||||
|
return NULL;
|
||||||
|
if (!OSSL_CRMF_MSG_set_certReqId(crm, rid)
|
||||||
|
/*
|
||||||
|
* fill certTemplate, corresponding to CertificationRequestInfo
|
||||||
|
* of PKCS#10. The rkey param cannot be NULL so far -
|
||||||
|
* it could be NULL if centralized key creation was supported
|
||||||
|
*/
|
||||||
|
|| !OSSL_CRMF_CERTTEMPLATE_fill(OSSL_CRMF_MSG_get0_tmpl(crm), rkey,
|
||||||
|
subject, ctx->issuer,
|
||||||
|
NULL/* serial */))
|
||||||
|
goto err;
|
||||||
|
if (ctx->days != 0) {
|
||||||
|
time_t notBefore, notAfter;
|
||||||
|
|
||||||
|
notBefore = time(NULL);
|
||||||
|
notAfter = notBefore + 60 * 60 * 24 * ctx->days;
|
||||||
|
if (!OSSL_CRMF_MSG_set_validity(crm, notBefore, notAfter))
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* extensions */
|
||||||
|
if (refcert != NULL && !ctx->SubjectAltName_nodefault)
|
||||||
|
default_sans = X509V3_get_d2i(X509_get0_extensions(refcert),
|
||||||
|
NID_subject_alt_name, NULL, NULL);
|
||||||
|
/* exts are copied from ctx to allow reuse */
|
||||||
|
if (ctx->reqExtensions != NULL) {
|
||||||
|
exts = sk_X509_EXTENSION_deep_copy(ctx->reqExtensions,
|
||||||
|
X509_EXTENSION_dup,
|
||||||
|
X509_EXTENSION_free);
|
||||||
|
if (exts == NULL)
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
if (sk_GENERAL_NAME_num(ctx->subjectAltNames) > 0
|
||||||
|
&& !add1_extension(&exts, NID_subject_alt_name,
|
||||||
|
crit, ctx->subjectAltNames))
|
||||||
|
goto err;
|
||||||
|
if (!HAS_SAN(ctx) && default_sans != NULL
|
||||||
|
&& !add1_extension(&exts, NID_subject_alt_name, crit, default_sans))
|
||||||
|
goto err;
|
||||||
|
if (ctx->policies != NULL
|
||||||
|
&& !add1_extension(&exts, NID_certificate_policies,
|
||||||
|
ctx->setPoliciesCritical, ctx->policies))
|
||||||
|
goto err;
|
||||||
|
if (!OSSL_CRMF_MSG_set0_extensions(crm, exts))
|
||||||
|
goto err;
|
||||||
|
exts = NULL;
|
||||||
|
/* end fill certTemplate, now set any controls */
|
||||||
|
|
||||||
|
/* for KUR, set OldCertId according to D.6 */
|
||||||
|
if (bodytype == OSSL_CMP_PKIBODY_KUR) {
|
||||||
|
OSSL_CRMF_CERTID *cid =
|
||||||
|
OSSL_CRMF_CERTID_gen(X509_get_issuer_name(refcert),
|
||||||
|
X509_get_serialNumber(refcert));
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
if (cid == NULL)
|
||||||
|
goto err;
|
||||||
|
ret = OSSL_CRMF_MSG_set1_regCtrl_oldCertID(crm, cid);
|
||||||
|
OSSL_CRMF_CERTID_free(cid);
|
||||||
|
if (ret == 0)
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
err:
|
||||||
|
OSSL_CRMF_MSG_free(crm);
|
||||||
|
crm = NULL;
|
||||||
|
|
||||||
|
end:
|
||||||
|
sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free);
|
||||||
|
sk_GENERAL_NAME_pop_free(default_sans, GENERAL_NAME_free);
|
||||||
|
return crm;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_certReq_new(OSSL_CMP_CTX *ctx, int type, int err_code)
|
||||||
|
{
|
||||||
|
EVP_PKEY *rkey;
|
||||||
|
EVP_PKEY *privkey;
|
||||||
|
OSSL_CMP_MSG *msg;
|
||||||
|
OSSL_CRMF_MSG *crm = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
rkey = OSSL_CMP_CTX_get0_newPkey(ctx, 0);
|
||||||
|
if (rkey == NULL)
|
||||||
|
return NULL;
|
||||||
|
privkey = OSSL_CMP_CTX_get0_newPkey(ctx, 1);
|
||||||
|
|
||||||
|
if (type != OSSL_CMP_PKIBODY_IR && type != OSSL_CMP_PKIBODY_CR
|
||||||
|
&& type != OSSL_CMP_PKIBODY_KUR && type != OSSL_CMP_PKIBODY_P10CR) {
|
||||||
|
CMPerr(0, CMP_R_INVALID_ARGS);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, type)) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
/* header */
|
||||||
|
if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
/* body */
|
||||||
|
/* For P10CR the content has already been set in OSSL_CMP_MSG_create */
|
||||||
|
if (type != OSSL_CMP_PKIBODY_P10CR) {
|
||||||
|
if (ctx->popoMethod == OSSL_CRMF_POPO_SIGNATURE && privkey == NULL) {
|
||||||
|
CMPerr(0, CMP_R_MISSING_PRIVATE_KEY);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
if ((crm = crm_new(ctx, type, OSSL_CMP_CERTREQID, rkey)) == NULL
|
||||||
|
|| !OSSL_CRMF_MSG_create_popo(crm, privkey, ctx->digest,
|
||||||
|
ctx->popoMethod)
|
||||||
|
/* value.ir is same for cr and kur */
|
||||||
|
|| !sk_OSSL_CRMF_MSG_push(msg->body->value.ir, crm))
|
||||||
|
goto err;
|
||||||
|
crm = NULL;
|
||||||
|
/* TODO: here optional 2nd certreqmsg could be pushed to the stack */
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, err_code);
|
||||||
|
OSSL_CRMF_MSG_free(crm);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_certRep_new(OSSL_CMP_CTX *ctx, int bodytype,
|
||||||
|
int certReqId, OSSL_CMP_PKISI *si,
|
||||||
|
X509 *cert, STACK_OF(X509) *chain,
|
||||||
|
STACK_OF(X509) *caPubs, int encrypted,
|
||||||
|
int unprotectedErrors)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg = NULL;
|
||||||
|
OSSL_CMP_CERTREPMESSAGE *repMsg = NULL;
|
||||||
|
OSSL_CMP_CERTRESPONSE *resp = NULL;
|
||||||
|
int status = -1;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL && si != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, bodytype)) == NULL)
|
||||||
|
goto err;
|
||||||
|
repMsg = msg->body->value.ip; /* value.ip is same for cp and kup */
|
||||||
|
|
||||||
|
/* header */
|
||||||
|
if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
/* body */
|
||||||
|
if ((resp = OSSL_CMP_CERTRESPONSE_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
OSSL_CMP_PKISI_free(resp->status);
|
||||||
|
if ((resp->status = OSSL_CMP_PKISI_dup(si)) == NULL
|
||||||
|
|| !ASN1_INTEGER_set(resp->certReqId, certReqId))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
status = ossl_cmp_pkisi_get_pkistatus(resp->status);
|
||||||
|
if (status != OSSL_CMP_PKISTATUS_rejection
|
||||||
|
&& status != OSSL_CMP_PKISTATUS_waiting && cert != NULL) {
|
||||||
|
if (encrypted) {
|
||||||
|
CMPerr(0, CMP_R_INVALID_ARGS);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((resp->certifiedKeyPair = OSSL_CMP_CERTIFIEDKEYPAIR_new())
|
||||||
|
== NULL)
|
||||||
|
goto err;
|
||||||
|
resp->certifiedKeyPair->certOrEncCert->type =
|
||||||
|
OSSL_CMP_CERTORENCCERT_CERTIFICATE;
|
||||||
|
if (!X509_up_ref(cert))
|
||||||
|
goto err;
|
||||||
|
resp->certifiedKeyPair->certOrEncCert->value.certificate = cert;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!sk_OSSL_CMP_CERTRESPONSE_push(repMsg->response, resp))
|
||||||
|
goto err;
|
||||||
|
resp = NULL;
|
||||||
|
/* TODO: here optional 2nd certrep could be pushed to the stack */
|
||||||
|
|
||||||
|
if (bodytype == OSSL_CMP_PKIBODY_IP && caPubs != NULL
|
||||||
|
&& (repMsg->caPubs = X509_chain_up_ref(caPubs)) == NULL)
|
||||||
|
goto err;
|
||||||
|
if (chain != NULL
|
||||||
|
&& !ossl_cmp_sk_X509_add1_certs(msg->extraCerts, chain, 0, 1, 0))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!unprotectedErrors
|
||||||
|
|| ossl_cmp_pkisi_get_pkistatus(si) != OSSL_CMP_PKISTATUS_rejection)
|
||||||
|
if (!ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_CREATING_CERTREP);
|
||||||
|
OSSL_CMP_CERTRESPONSE_free(resp);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_rr_new(OSSL_CMP_CTX *ctx)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg = NULL;
|
||||||
|
OSSL_CMP_REVDETAILS *rd;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL && ctx->oldCert != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((rd = OSSL_CMP_REVDETAILS_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
/* Fill the template from the contents of the certificate to be revoked */
|
||||||
|
if (!OSSL_CRMF_CERTTEMPLATE_fill(rd->certDetails,
|
||||||
|
NULL/* pubkey would be redundant */,
|
||||||
|
NULL/* subject would be redundant */,
|
||||||
|
X509_get_issuer_name(ctx->oldCert),
|
||||||
|
X509_get_serialNumber(ctx->oldCert)))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
/* revocation reason code is optional */
|
||||||
|
if (ctx->revocationReason != CRL_REASON_NONE
|
||||||
|
&& !add_crl_reason_extension(&rd->crlEntryDetails,
|
||||||
|
ctx->revocationReason))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_RR)) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!sk_OSSL_CMP_REVDETAILS_push(msg->body->value.rr, rd))
|
||||||
|
goto err;
|
||||||
|
rd = NULL;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* TODO: the Revocation Passphrase according to section 5.3.19.9 could be
|
||||||
|
* set here if set in ctx
|
||||||
|
*/
|
||||||
|
|
||||||
|
if (!ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_CREATING_RR);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
OSSL_CMP_REVDETAILS_free(rd);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_rp_new(OSSL_CMP_CTX *ctx, OSSL_CMP_PKISI *si,
|
||||||
|
OSSL_CRMF_CERTID *cid, int unprot_err)
|
||||||
|
{
|
||||||
|
OSSL_CMP_REVREPCONTENT *rep = NULL;
|
||||||
|
OSSL_CMP_PKISI *si1 = NULL;
|
||||||
|
OSSL_CRMF_CERTID *cid_copy = NULL;
|
||||||
|
OSSL_CMP_MSG *msg = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL && si != NULL && cid != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_RP)) == NULL)
|
||||||
|
goto err;
|
||||||
|
rep = msg->body->value.rp;
|
||||||
|
|
||||||
|
if ((si1 = OSSL_CMP_PKISI_dup(si)) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!sk_OSSL_CMP_PKISI_push(rep->status, si1)) {
|
||||||
|
OSSL_CMP_PKISI_free(si1);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((rep->revCerts = sk_OSSL_CRMF_CERTID_new_null()) == NULL)
|
||||||
|
goto err;
|
||||||
|
if ((cid_copy = OSSL_CRMF_CERTID_dup(cid)) == NULL)
|
||||||
|
goto err;
|
||||||
|
if (!sk_OSSL_CRMF_CERTID_push(rep->revCerts, cid_copy)) {
|
||||||
|
OSSL_CRMF_CERTID_free(cid_copy);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!unprot_err
|
||||||
|
|| ossl_cmp_pkisi_get_pkistatus(si) != OSSL_CMP_PKISTATUS_rejection)
|
||||||
|
if (!ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_CREATING_RP);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_pkiconf_new(OSSL_CMP_CTX *ctx)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_PKICONF)) == NULL)
|
||||||
|
goto err;
|
||||||
|
if (ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_CREATING_PKICONF);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
int ossl_cmp_msg_gen_push0_ITAV(OSSL_CMP_MSG *msg, OSSL_CMP_ITAV *itav)
|
||||||
|
{
|
||||||
|
int bodytype;
|
||||||
|
|
||||||
|
if (!ossl_assert(msg != NULL && itav != NULL))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
bodytype = ossl_cmp_msg_get_bodytype(msg);
|
||||||
|
if (bodytype != OSSL_CMP_PKIBODY_GENM
|
||||||
|
&& bodytype != OSSL_CMP_PKIBODY_GENP) {
|
||||||
|
CMPerr(0, CMP_R_INVALID_ARGS);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* value.genp has the same structure, so this works for genp as well */
|
||||||
|
return OSSL_CMP_ITAV_push0_stack_item(&msg->body->value.genm, itav);
|
||||||
|
}
|
||||||
|
|
||||||
|
int ossl_cmp_msg_gen_push1_ITAVs(OSSL_CMP_MSG *msg,
|
||||||
|
STACK_OF(OSSL_CMP_ITAV) *itavs)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
OSSL_CMP_ITAV *itav = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(msg != NULL))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
for (i = 0; i < sk_OSSL_CMP_ITAV_num(itavs); i++) {
|
||||||
|
if ((itav = OSSL_CMP_ITAV_dup(sk_OSSL_CMP_ITAV_value(itavs,i))) == NULL)
|
||||||
|
return 0;
|
||||||
|
if (!ossl_cmp_msg_gen_push0_ITAV(msg, itav)) {
|
||||||
|
OSSL_CMP_ITAV_free(itav);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Creates a new General Message/Response with an empty itav stack
|
||||||
|
* returns a pointer to the PKIMessage on success, NULL on error
|
||||||
|
*/
|
||||||
|
static OSSL_CMP_MSG *gen_new(OSSL_CMP_CTX *ctx, int body_type, int err_code)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, body_type)) == NULL)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if (ctx->genm_ITAVs != NULL
|
||||||
|
&& !ossl_cmp_msg_gen_push1_ITAVs(msg, ctx->genm_ITAVs))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, err_code);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_genm_new(OSSL_CMP_CTX *ctx)
|
||||||
|
{
|
||||||
|
return gen_new(ctx, OSSL_CMP_PKIBODY_GENM, CMP_R_ERROR_CREATING_GENM);
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_genp_new(OSSL_CMP_CTX *ctx)
|
||||||
|
{
|
||||||
|
return gen_new(ctx, OSSL_CMP_PKIBODY_GENP, CMP_R_ERROR_CREATING_GENP);
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_error_new(OSSL_CMP_CTX *ctx, OSSL_CMP_PKISI *si,
|
||||||
|
int errorCode,
|
||||||
|
OSSL_CMP_PKIFREETEXT *errorDetails,
|
||||||
|
int unprotected)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL && si != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_ERROR)) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
OSSL_CMP_PKISI_free(msg->body->value.error->pKIStatusInfo);
|
||||||
|
if ((msg->body->value.error->pKIStatusInfo = OSSL_CMP_PKISI_dup(si))
|
||||||
|
== NULL)
|
||||||
|
goto err;
|
||||||
|
if (errorCode >= 0) {
|
||||||
|
if ((msg->body->value.error->errorCode = ASN1_INTEGER_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
if (!ASN1_INTEGER_set(msg->body->value.error->errorCode, errorCode))
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
if (errorDetails != NULL)
|
||||||
|
if ((msg->body->value.error->errorDetails =
|
||||||
|
sk_ASN1_UTF8STRING_deep_copy(errorDetails, ASN1_STRING_dup,
|
||||||
|
ASN1_STRING_free)) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!unprotected && !ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_CREATING_ERROR);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* OSSL_CMP_CERTSTATUS_set_certHash() calculates a hash of the certificate,
|
||||||
|
* using the same hash algorithm as is used to create and verify the
|
||||||
|
* certificate signature, and places the hash into the certHash field of a
|
||||||
|
* OSSL_CMP_CERTSTATUS structure. This is used in the certConf message,
|
||||||
|
* for example, to confirm that the certificate was received successfully.
|
||||||
|
*/
|
||||||
|
int ossl_cmp_certstatus_set_certHash(OSSL_CMP_CERTSTATUS *certStatus,
|
||||||
|
const X509 *cert)
|
||||||
|
{
|
||||||
|
unsigned int len;
|
||||||
|
unsigned char hash[EVP_MAX_MD_SIZE];
|
||||||
|
int md_NID;
|
||||||
|
const EVP_MD *md = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(certStatus != NULL && cert != NULL))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
/*-
|
||||||
|
* select hash algorithm, as stated in Appendix F. Compilable ASN.1 defs:
|
||||||
|
* the hash of the certificate, using the same hash algorithm
|
||||||
|
* as is used to create and verify the certificate signature
|
||||||
|
*/
|
||||||
|
if (OBJ_find_sigid_algs(X509_get_signature_nid(cert), &md_NID, NULL)
|
||||||
|
&& (md = EVP_get_digestbynid(md_NID)) != NULL) {
|
||||||
|
if (!X509_digest(cert, md, hash, &len))
|
||||||
|
goto err;
|
||||||
|
if (!ossl_cmp_asn1_octet_string_set1_bytes(&certStatus->certHash, hash,
|
||||||
|
len))
|
||||||
|
goto err;
|
||||||
|
} else {
|
||||||
|
CMPerr(0, CMP_R_UNSUPPORTED_ALGORITHM);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_SETTING_CERTHASH);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* TODO: handle potential 2nd certificate when signing and encrypting
|
||||||
|
* certificates have been requested/received
|
||||||
|
*/
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_certConf_new(OSSL_CMP_CTX *ctx, int fail_info,
|
||||||
|
const char *text)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg = NULL;
|
||||||
|
OSSL_CMP_CERTSTATUS *certStatus = NULL;
|
||||||
|
OSSL_CMP_PKISI *sinfo;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL && ctx->newCert != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((unsigned)fail_info > OSSL_CMP_PKIFAILUREINFO_MAX_BIT_PATTERN) {
|
||||||
|
CMPerr(0, CMP_R_FAIL_INFO_OUT_OF_RANGE);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_CERTCONF)) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if ((certStatus = OSSL_CMP_CERTSTATUS_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
/* consume certStatus into msg right away so it gets deallocated with msg */
|
||||||
|
if (!sk_OSSL_CMP_CERTSTATUS_push(msg->body->value.certConf, certStatus))
|
||||||
|
goto err;
|
||||||
|
/* set the ID of the certReq */
|
||||||
|
if (!ASN1_INTEGER_set(certStatus->certReqId, OSSL_CMP_CERTREQID))
|
||||||
|
goto err;
|
||||||
|
/*
|
||||||
|
* the hash of the certificate, using the same hash algorithm
|
||||||
|
* as is used to create and verify the certificate signature
|
||||||
|
*/
|
||||||
|
if (!ossl_cmp_certstatus_set_certHash(certStatus, ctx->newCert))
|
||||||
|
goto err;
|
||||||
|
/*
|
||||||
|
* For any particular CertStatus, omission of the statusInfo field
|
||||||
|
* indicates ACCEPTANCE of the specified certificate. Alternatively,
|
||||||
|
* explicit status details (with respect to acceptance or rejection) MAY
|
||||||
|
* be provided in the statusInfo field, perhaps for auditing purposes at
|
||||||
|
* the CA/RA.
|
||||||
|
*/
|
||||||
|
sinfo = fail_info != 0 ?
|
||||||
|
ossl_cmp_statusinfo_new(OSSL_CMP_PKISTATUS_rejection, fail_info, text) :
|
||||||
|
ossl_cmp_statusinfo_new(OSSL_CMP_PKISTATUS_accepted, 0, text);
|
||||||
|
if (sinfo == NULL)
|
||||||
|
goto err;
|
||||||
|
certStatus->statusInfo = sinfo;
|
||||||
|
|
||||||
|
if (!ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_CREATING_CERTCONF);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_pollReq_new(OSSL_CMP_CTX *ctx, int crid)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg = NULL;
|
||||||
|
OSSL_CMP_POLLREQ *preq = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_POLLREQ)) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
/* TODO: support multiple cert request IDs to poll */
|
||||||
|
if ((preq = OSSL_CMP_POLLREQ_new()) == NULL
|
||||||
|
|| !ASN1_INTEGER_set(preq->certReqId, crid)
|
||||||
|
|| !sk_OSSL_CMP_POLLREQ_push(msg->body->value.pollReq, preq))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
preq = NULL;
|
||||||
|
if (!ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_CREATING_POLLREQ);
|
||||||
|
OSSL_CMP_POLLREQ_free(preq);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_pollRep_new(OSSL_CMP_CTX *ctx, int crid,
|
||||||
|
int64_t poll_after)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg;
|
||||||
|
OSSL_CMP_POLLREP *prep;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_POLLREP)) == NULL)
|
||||||
|
goto err;
|
||||||
|
if ((prep = OSSL_CMP_POLLREP_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
if (!sk_OSSL_CMP_POLLREP_push(msg->body->value.pollRep, prep))
|
||||||
|
goto err;
|
||||||
|
if (!ASN1_INTEGER_set(prep->certReqId, crid))
|
||||||
|
goto err;
|
||||||
|
if (!ASN1_INTEGER_set_int64(prep->checkAfter, poll_after))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!ossl_cmp_msg_protect(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
return msg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_CREATING_POLLREP);
|
||||||
|
OSSL_CMP_MSG_free(msg);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*-
|
||||||
|
* returns the status field of the RevRepContent with the given
|
||||||
|
* request/sequence id inside a revocation response.
|
||||||
|
* RevRepContent has the revocation statuses in same order as they were sent in
|
||||||
|
* RevReqContent.
|
||||||
|
* returns NULL on error
|
||||||
|
*/
|
||||||
|
OSSL_CMP_PKISI *
|
||||||
|
ossl_cmp_revrepcontent_get_pkistatusinfo(OSSL_CMP_REVREPCONTENT *rrep, int rsid)
|
||||||
|
{
|
||||||
|
OSSL_CMP_PKISI *status;
|
||||||
|
|
||||||
|
if (!ossl_assert(rrep != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((status = sk_OSSL_CMP_PKISI_value(rrep->status, rsid)) != NULL)
|
||||||
|
return status;
|
||||||
|
|
||||||
|
CMPerr(0, CMP_R_PKISTATUSINFO_NOT_FOUND);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* returns the CertId field in the revCerts part of the RevRepContent
|
||||||
|
* with the given request/sequence id inside a revocation response.
|
||||||
|
* RevRepContent has the CertIds in same order as they were sent in
|
||||||
|
* RevReqContent.
|
||||||
|
* returns NULL on error
|
||||||
|
*/
|
||||||
|
OSSL_CRMF_CERTID *
|
||||||
|
ossl_cmp_revrepcontent_get_CertId(OSSL_CMP_REVREPCONTENT *rrep, int rsid)
|
||||||
|
{
|
||||||
|
OSSL_CRMF_CERTID *cid = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(rrep != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((cid = sk_OSSL_CRMF_CERTID_value(rrep->revCerts, rsid)) != NULL)
|
||||||
|
return cid;
|
||||||
|
|
||||||
|
CMPerr(0, CMP_R_CERTID_NOT_FOUND);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int suitable_rid(const ASN1_INTEGER *certReqId, int rid)
|
||||||
|
{
|
||||||
|
int trid;
|
||||||
|
|
||||||
|
if (rid == -1)
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
trid = ossl_cmp_asn1_get_int(certReqId);
|
||||||
|
|
||||||
|
if (trid == -1) {
|
||||||
|
CMPerr(0, CMP_R_BAD_REQUEST_ID);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return rid == trid;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void add_expected_rid(int rid)
|
||||||
|
{
|
||||||
|
char str[DECIMAL_SIZE(rid) + 1];
|
||||||
|
|
||||||
|
BIO_snprintf(str, sizeof(str), "%d", rid);
|
||||||
|
ERR_add_error_data(2, "expected certReqId = ", str);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* returns a pointer to the PollResponse with the given CertReqId
|
||||||
|
* (or the first one in case -1) inside a PollRepContent
|
||||||
|
* returns NULL on error or if no suitable PollResponse available
|
||||||
|
*/
|
||||||
|
OSSL_CMP_POLLREP *
|
||||||
|
ossl_cmp_pollrepcontent_get0_pollrep(const OSSL_CMP_POLLREPCONTENT *prc,
|
||||||
|
int rid)
|
||||||
|
{
|
||||||
|
OSSL_CMP_POLLREP *pollRep = NULL;
|
||||||
|
int i;
|
||||||
|
|
||||||
|
if (!ossl_assert(prc != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
for (i = 0; i < sk_OSSL_CMP_POLLREP_num(prc); i++) {
|
||||||
|
pollRep = sk_OSSL_CMP_POLLREP_value(prc, i);
|
||||||
|
if (suitable_rid(pollRep->certReqId, rid))
|
||||||
|
return pollRep;
|
||||||
|
}
|
||||||
|
|
||||||
|
CMPerr(0, CMP_R_CERTRESPONSE_NOT_FOUND);
|
||||||
|
add_expected_rid(rid);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* returns a pointer to the CertResponse with the given CertReqId
|
||||||
|
* (or the first one in case -1) inside a CertRepMessage
|
||||||
|
* returns NULL on error or if no suitable CertResponse available
|
||||||
|
*/
|
||||||
|
OSSL_CMP_CERTRESPONSE *
|
||||||
|
ossl_cmp_certrepmessage_get0_certresponse(const OSSL_CMP_CERTREPMESSAGE *crm,
|
||||||
|
int rid)
|
||||||
|
{
|
||||||
|
OSSL_CMP_CERTRESPONSE *crep = NULL;
|
||||||
|
int i;
|
||||||
|
|
||||||
|
if (!ossl_assert(crm != NULL && crm->response != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
for (i = 0; i < sk_OSSL_CMP_CERTRESPONSE_num(crm->response); i++) {
|
||||||
|
crep = sk_OSSL_CMP_CERTRESPONSE_value(crm->response, i);
|
||||||
|
if (suitable_rid(crep->certReqId, rid))
|
||||||
|
return crep;
|
||||||
|
}
|
||||||
|
|
||||||
|
CMPerr(0, CMP_R_CERTRESPONSE_NOT_FOUND);
|
||||||
|
add_expected_rid(rid);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* CMP_CERTRESPONSE_get1_certificate() attempts to retrieve the returned
|
||||||
|
* certificate from the given certResponse B<crep>.
|
||||||
|
* Uses the privkey in case of indirect POP from B<ctx>.
|
||||||
|
* Returns a pointer to a copy of the found certificate, or NULL if not found.
|
||||||
|
*/
|
||||||
|
X509 *ossl_cmp_certresponse_get1_certificate(EVP_PKEY *privkey,
|
||||||
|
const OSSL_CMP_CERTRESPONSE *crep)
|
||||||
|
{
|
||||||
|
OSSL_CMP_CERTORENCCERT *coec;
|
||||||
|
X509 *crt = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(crep != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if (crep->certifiedKeyPair
|
||||||
|
&& (coec = crep->certifiedKeyPair->certOrEncCert) != NULL) {
|
||||||
|
switch (coec->type) {
|
||||||
|
case OSSL_CMP_CERTORENCCERT_CERTIFICATE:
|
||||||
|
crt = X509_dup(coec->value.certificate);
|
||||||
|
break;
|
||||||
|
case OSSL_CMP_CERTORENCCERT_ENCRYPTEDCERT:
|
||||||
|
/* cert encrypted for indirect PoP; RFC 4210, 5.2.8.2 */
|
||||||
|
if (privkey == NULL) {
|
||||||
|
CMPerr(0, CMP_R_MISSING_PRIVATE_KEY);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
crt =
|
||||||
|
OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert(coec->value.encryptedCert,
|
||||||
|
privkey);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
CMPerr(0, CMP_R_UNKNOWN_CERT_TYPE);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (crt == NULL)
|
||||||
|
CMPerr(0, CMP_R_CERTIFICATE_NOT_FOUND);
|
||||||
|
return crt;
|
||||||
|
}
|
||||||
|
|
||||||
|
OSSL_CMP_MSG *ossl_cmp_msg_load(const char *file)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *msg = NULL;
|
||||||
|
BIO *bio = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(file != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if ((bio = BIO_new_file(file, "rb")) == NULL)
|
||||||
|
return NULL;
|
||||||
|
msg = OSSL_d2i_CMP_MSG_bio(bio, NULL);
|
||||||
|
BIO_free(bio);
|
||||||
|
return msg;
|
||||||
|
}
|
313
crypto/cmp/cmp_protect.c
Normal file
313
crypto/cmp/cmp_protect.c
Normal file
@ -0,0 +1,313 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
* Copyright Nokia 2007-2019
|
||||||
|
* Copyright Siemens AG 2015-2019
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
* this file except in compliance with the License. You can obtain a copy
|
||||||
|
* in the file LICENSE in the source distribution or at
|
||||||
|
* https://www.openssl.org/source/license.html
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "cmp_local.h"
|
||||||
|
|
||||||
|
/* explicit #includes not strictly needed since implied by the above: */
|
||||||
|
#include <openssl/asn1t.h>
|
||||||
|
#include <openssl/cmp.h>
|
||||||
|
#include <openssl/crmf.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/x509.h>
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This function is also used for verification from cmp_vfy.
|
||||||
|
*
|
||||||
|
* Calculate protection for given PKImessage utilizing the given credentials
|
||||||
|
* and the algorithm parameters set inside the message header's protectionAlg.
|
||||||
|
*
|
||||||
|
* Either secret or pkey must be set, the other must be NULL. Attempts doing
|
||||||
|
* PBMAC in case 'secret' is set and signature if 'pkey' is set - but will only
|
||||||
|
* do the protection already marked in msg->header->protectionAlg.
|
||||||
|
*
|
||||||
|
* returns ptr to ASN1_BIT_STRING containing protection on success, else NULL
|
||||||
|
*/
|
||||||
|
ASN1_BIT_STRING *ossl_cmp_calc_protection(const OSSL_CMP_MSG *msg,
|
||||||
|
const ASN1_OCTET_STRING *secret,
|
||||||
|
EVP_PKEY *pkey)
|
||||||
|
{
|
||||||
|
ASN1_BIT_STRING *prot = NULL;
|
||||||
|
CMP_PROTECTEDPART prot_part;
|
||||||
|
const ASN1_OBJECT *algorOID = NULL;
|
||||||
|
int len;
|
||||||
|
size_t prot_part_der_len;
|
||||||
|
unsigned char *prot_part_der = NULL;
|
||||||
|
size_t sig_len;
|
||||||
|
unsigned char *protection = NULL;
|
||||||
|
const void *ppval = NULL;
|
||||||
|
int pptype = 0;
|
||||||
|
OSSL_CRMF_PBMPARAMETER *pbm = NULL;
|
||||||
|
ASN1_STRING *pbm_str = NULL;
|
||||||
|
const unsigned char *pbm_str_uc = NULL;
|
||||||
|
EVP_MD_CTX *evp_ctx = NULL;
|
||||||
|
int md_NID;
|
||||||
|
const EVP_MD *md = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(msg != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
/* construct data to be signed */
|
||||||
|
prot_part.header = msg->header;
|
||||||
|
prot_part.body = msg->body;
|
||||||
|
|
||||||
|
len = i2d_CMP_PROTECTEDPART(&prot_part, &prot_part_der);
|
||||||
|
if (len < 0 || prot_part_der == NULL) {
|
||||||
|
CMPerr(0, CMP_R_ERROR_CALCULATING_PROTECTION);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
prot_part_der_len = (size_t) len;
|
||||||
|
|
||||||
|
if (msg->header->protectionAlg == NULL) {
|
||||||
|
CMPerr(0, CMP_R_UNKNOWN_ALGORITHM_ID);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
X509_ALGOR_get0(&algorOID, &pptype, &ppval, msg->header->protectionAlg);
|
||||||
|
|
||||||
|
if (secret != NULL && pkey == NULL) {
|
||||||
|
if (ppval == NULL) {
|
||||||
|
CMPerr(0, CMP_R_ERROR_CALCULATING_PROTECTION);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (NID_id_PasswordBasedMAC != OBJ_obj2nid(algorOID)) {
|
||||||
|
CMPerr(0, CMP_R_WRONG_ALGORITHM_OID);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
pbm_str = (ASN1_STRING *)ppval;
|
||||||
|
pbm_str_uc = pbm_str->data;
|
||||||
|
pbm = d2i_OSSL_CRMF_PBMPARAMETER(NULL, &pbm_str_uc, pbm_str->length);
|
||||||
|
if (pbm == NULL) {
|
||||||
|
CMPerr(0, CMP_R_WRONG_ALGORITHM_OID);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!OSSL_CRMF_pbm_new(pbm, prot_part_der, prot_part_der_len,
|
||||||
|
secret->data, secret->length,
|
||||||
|
&protection, &sig_len))
|
||||||
|
goto end;
|
||||||
|
} else if (secret == NULL && pkey != NULL) {
|
||||||
|
/* TODO combine this with large parts of CRMF_poposigningkey_init() */
|
||||||
|
/* EVP_DigestSignInit() checks that pkey type is correct for the alg */
|
||||||
|
|
||||||
|
if (!OBJ_find_sigid_algs(OBJ_obj2nid(algorOID), &md_NID, NULL)
|
||||||
|
|| (md = EVP_get_digestbynid(md_NID)) == NULL
|
||||||
|
|| (evp_ctx = EVP_MD_CTX_new()) == NULL) {
|
||||||
|
CMPerr(0, CMP_R_UNKNOWN_ALGORITHM_ID);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (EVP_DigestSignInit(evp_ctx, NULL, md, NULL, pkey) <= 0
|
||||||
|
|| EVP_DigestSignUpdate(evp_ctx, prot_part_der,
|
||||||
|
prot_part_der_len) <= 0
|
||||||
|
|| EVP_DigestSignFinal(evp_ctx, NULL, &sig_len) <= 0
|
||||||
|
|| (protection = OPENSSL_malloc(sig_len)) == NULL
|
||||||
|
|| EVP_DigestSignFinal(evp_ctx, protection, &sig_len) <= 0) {
|
||||||
|
CMPerr(0, CMP_R_ERROR_CALCULATING_PROTECTION);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
CMPerr(0, CMP_R_INVALID_ARGS);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((prot = ASN1_BIT_STRING_new()) == NULL)
|
||||||
|
goto end;
|
||||||
|
/* OpenSSL defaults all bit strings to be encoded as ASN.1 NamedBitList */
|
||||||
|
prot->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
|
||||||
|
prot->flags |= ASN1_STRING_FLAG_BITS_LEFT;
|
||||||
|
if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) {
|
||||||
|
ASN1_BIT_STRING_free(prot);
|
||||||
|
prot = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
end:
|
||||||
|
OSSL_CRMF_PBMPARAMETER_free(pbm);
|
||||||
|
EVP_MD_CTX_free(evp_ctx);
|
||||||
|
OPENSSL_free(protection);
|
||||||
|
OPENSSL_free(prot_part_der);
|
||||||
|
return prot;
|
||||||
|
}
|
||||||
|
|
||||||
|
int ossl_cmp_msg_add_extraCerts(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg)
|
||||||
|
{
|
||||||
|
if (!ossl_assert(ctx != NULL && msg != NULL))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (msg->extraCerts == NULL
|
||||||
|
&& (msg->extraCerts = sk_X509_new_null()) == NULL)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (ctx->clCert != NULL) {
|
||||||
|
/* Make sure that our own cert gets sent, in the first position */
|
||||||
|
if (!X509_up_ref(ctx->clCert))
|
||||||
|
return 0;
|
||||||
|
if (!sk_X509_push(msg->extraCerts, ctx->clCert)) {
|
||||||
|
X509_free(ctx->clCert);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
/* if we have untrusted store, try to add intermediate certs */
|
||||||
|
if (ctx->untrusted_certs != NULL) {
|
||||||
|
STACK_OF(X509) *chain =
|
||||||
|
ossl_cmp_build_cert_chain(ctx->untrusted_certs, ctx->clCert);
|
||||||
|
int res = ossl_cmp_sk_X509_add1_certs(msg->extraCerts, chain,
|
||||||
|
1 /* no self-signed */,
|
||||||
|
1 /* no duplicates */, 0);
|
||||||
|
sk_X509_pop_free(chain, X509_free);
|
||||||
|
if (res == 0)
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/* add any additional certificates from ctx->extraCertsOut */
|
||||||
|
if (!ossl_cmp_sk_X509_add1_certs(msg->extraCerts, ctx->extraCertsOut, 0,
|
||||||
|
1 /* no duplicates */, 0))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
/* if none was found avoid empty ASN.1 sequence */
|
||||||
|
if (sk_X509_num(msg->extraCerts) == 0) {
|
||||||
|
sk_X509_free(msg->extraCerts);
|
||||||
|
msg->extraCerts = NULL;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Create an X509_ALGOR structure for PasswordBasedMAC protection based on
|
||||||
|
* the pbm settings in the context
|
||||||
|
* returns pointer to X509_ALGOR on success, NULL on error
|
||||||
|
*/
|
||||||
|
static X509_ALGOR *create_pbmac_algor(OSSL_CMP_CTX *ctx)
|
||||||
|
{
|
||||||
|
X509_ALGOR *alg = NULL;
|
||||||
|
OSSL_CRMF_PBMPARAMETER *pbm = NULL;
|
||||||
|
unsigned char *pbm_der = NULL;
|
||||||
|
int pbm_der_len;
|
||||||
|
ASN1_STRING *pbm_str = NULL;
|
||||||
|
|
||||||
|
if (!ossl_assert(ctx != NULL))
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
alg = X509_ALGOR_new();
|
||||||
|
pbm = OSSL_CRMF_pbmp_new(ctx->pbm_slen, ctx->pbm_owf, ctx->pbm_itercnt,
|
||||||
|
ctx->pbm_mac);
|
||||||
|
pbm_str = ASN1_STRING_new();
|
||||||
|
if (alg == NULL || pbm == NULL || pbm_str == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if ((pbm_der_len = i2d_OSSL_CRMF_PBMPARAMETER(pbm, &pbm_der)) < 0)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!ASN1_STRING_set(pbm_str, pbm_der, pbm_der_len))
|
||||||
|
goto err;
|
||||||
|
OPENSSL_free(pbm_der);
|
||||||
|
|
||||||
|
X509_ALGOR_set0(alg, OBJ_nid2obj(NID_id_PasswordBasedMAC),
|
||||||
|
V_ASN1_SEQUENCE, pbm_str);
|
||||||
|
OSSL_CRMF_PBMPARAMETER_free(pbm);
|
||||||
|
return alg;
|
||||||
|
|
||||||
|
err:
|
||||||
|
ASN1_STRING_free(pbm_str);
|
||||||
|
X509_ALGOR_free(alg);
|
||||||
|
OPENSSL_free(pbm_der);
|
||||||
|
OSSL_CRMF_PBMPARAMETER_free(pbm);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
int ossl_cmp_msg_protect(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg)
|
||||||
|
{
|
||||||
|
if (!ossl_assert(ctx != NULL && msg != NULL))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (ctx->unprotectedSend)
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
/* use PasswordBasedMac according to 5.1.3.1 if secretValue is given */
|
||||||
|
if (ctx->secretValue != NULL) {
|
||||||
|
if ((msg->header->protectionAlg = create_pbmac_algor(ctx)) == NULL)
|
||||||
|
goto err;
|
||||||
|
if (ctx->referenceValue != NULL
|
||||||
|
&& !ossl_cmp_hdr_set1_senderKID(msg->header,
|
||||||
|
ctx->referenceValue))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* add any additional certificates from ctx->extraCertsOut
|
||||||
|
* while not needed to validate the signing cert, the option to do
|
||||||
|
* this might be handy for certain use cases
|
||||||
|
*/
|
||||||
|
if (!ossl_cmp_msg_add_extraCerts(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if ((msg->protection =
|
||||||
|
ossl_cmp_calc_protection(msg, ctx->secretValue, NULL)) == NULL)
|
||||||
|
goto err;
|
||||||
|
} else {
|
||||||
|
/*
|
||||||
|
* use MSG_SIG_ALG according to 5.1.3.3 if client Certificate and
|
||||||
|
* private key is given
|
||||||
|
*/
|
||||||
|
if (ctx->clCert != NULL && ctx->pkey != NULL) {
|
||||||
|
const ASN1_OCTET_STRING *subjKeyIDStr = NULL;
|
||||||
|
int algNID = 0;
|
||||||
|
ASN1_OBJECT *alg = NULL;
|
||||||
|
|
||||||
|
/* make sure that key and certificate match */
|
||||||
|
if (!X509_check_private_key(ctx->clCert, ctx->pkey)) {
|
||||||
|
CMPerr(0, CMP_R_CERT_AND_KEY_DO_NOT_MATCH);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (msg->header->protectionAlg == NULL)
|
||||||
|
if ((msg->header->protectionAlg = X509_ALGOR_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!OBJ_find_sigid_by_algs(&algNID, ctx->digest,
|
||||||
|
EVP_PKEY_id(ctx->pkey))) {
|
||||||
|
CMPerr(0, CMP_R_UNSUPPORTED_KEY_TYPE);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
if ((alg = OBJ_nid2obj(algNID)) == NULL)
|
||||||
|
goto err;
|
||||||
|
if (!X509_ALGOR_set0(msg->header->protectionAlg,
|
||||||
|
alg, V_ASN1_UNDEF, NULL)) {
|
||||||
|
ASN1_OBJECT_free(alg);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* set senderKID to keyIdentifier of the used certificate according
|
||||||
|
* to section 5.1.1
|
||||||
|
*/
|
||||||
|
subjKeyIDStr = X509_get0_subject_key_id(ctx->clCert);
|
||||||
|
if (subjKeyIDStr != NULL
|
||||||
|
&& !ossl_cmp_hdr_set1_senderKID(msg->header, subjKeyIDStr))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Add ctx->clCert followed, if possible, by its chain built
|
||||||
|
* from ctx->untrusted_certs, and then ctx->extraCertsOut
|
||||||
|
*/
|
||||||
|
if (!ossl_cmp_msg_add_extraCerts(ctx, msg))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if ((msg->protection =
|
||||||
|
ossl_cmp_calc_protection(msg, NULL, ctx->pkey)) == NULL)
|
||||||
|
goto err;
|
||||||
|
} else {
|
||||||
|
CMPerr(0, CMP_R_MISSING_KEY_INPUT_FOR_CREATING_PROTECTION);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
err:
|
||||||
|
CMPerr(0, CMP_R_ERROR_PROTECTING_MESSAGE);
|
||||||
|
return 0;
|
||||||
|
}
|
@ -299,4 +299,3 @@ OSSL_CMP_PKISI *ossl_cmp_statusinfo_new(int status, int fail_info,
|
|||||||
ASN1_UTF8STRING_free(utf8_text);
|
ASN1_UTF8STRING_free(utf8_text);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -237,4 +237,3 @@ ASN1_ITEM_TEMPLATE(OSSL_CRMF_MSGS) =
|
|||||||
OSSL_CRMF_MSGS, OSSL_CRMF_MSG)
|
OSSL_CRMF_MSGS, OSSL_CRMF_MSG)
|
||||||
ASN1_ITEM_TEMPLATE_END(OSSL_CRMF_MSGS)
|
ASN1_ITEM_TEMPLATE_END(OSSL_CRMF_MSGS)
|
||||||
IMPLEMENT_ASN1_FUNCTIONS(OSSL_CRMF_MSGS)
|
IMPLEMENT_ASN1_FUNCTIONS(OSSL_CRMF_MSGS)
|
||||||
|
|
||||||
|
@ -190,7 +190,6 @@ OSSL_CRMF_CERTID *OSSL_CRMF_CERTID_gen(const X509_NAME *issuer,
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* id-regCtrl-protocolEncrKey Control (section 6.6)
|
* id-regCtrl-protocolEncrKey Control (section 6.6)
|
||||||
*
|
|
||||||
*/
|
*/
|
||||||
IMPLEMENT_CRMF_CTRL_FUNC(protocolEncrKey, X509_PUBKEY, regCtrl)
|
IMPLEMENT_CRMF_CTRL_FUNC(protocolEncrKey, X509_PUBKEY, regCtrl)
|
||||||
|
|
||||||
|
@ -133,8 +133,7 @@ int OSSL_CRMF_pbm_new(const OSSL_CRMF_PBMPARAMETER *pbmp,
|
|||||||
int ok = 0;
|
int ok = 0;
|
||||||
EVP_MAC *mac = NULL;
|
EVP_MAC *mac = NULL;
|
||||||
EVP_MAC_CTX *mctx = NULL;
|
EVP_MAC_CTX *mctx = NULL;
|
||||||
OSSL_PARAM macparams[3] =
|
OSSL_PARAM macparams[3] = {OSSL_PARAM_END, OSSL_PARAM_END, OSSL_PARAM_END};
|
||||||
{ OSSL_PARAM_END, OSSL_PARAM_END, OSSL_PARAM_END };
|
|
||||||
|
|
||||||
if (out == NULL || pbmp == NULL || pbmp->mac == NULL
|
if (out == NULL || pbmp == NULL || pbmp->mac == NULL
|
||||||
|| pbmp->mac->algorithm == NULL || msg == NULL || sec == NULL) {
|
|| pbmp->mac->algorithm == NULL || msg == NULL || sec == NULL) {
|
||||||
@ -193,16 +192,15 @@ int OSSL_CRMF_pbm_new(const OSSL_CRMF_PBMPARAMETER *pbmp,
|
|||||||
mac_nid = OBJ_obj2nid(pbmp->mac->algorithm);
|
mac_nid = OBJ_obj2nid(pbmp->mac->algorithm);
|
||||||
|
|
||||||
if (!EVP_PBE_find(EVP_PBE_TYPE_PRF, mac_nid, NULL, &hmac_md_nid, NULL)
|
if (!EVP_PBE_find(EVP_PBE_TYPE_PRF, mac_nid, NULL, &hmac_md_nid, NULL)
|
||||||
|| ((mdname = OBJ_nid2sn(hmac_md_nid)) == NULL)) {
|
|| (mdname = OBJ_nid2sn(hmac_md_nid)) == NULL) {
|
||||||
CRMFerr(CRMF_F_OSSL_CRMF_PBM_NEW, CRMF_R_UNSUPPORTED_ALGORITHM);
|
CRMFerr(CRMF_F_OSSL_CRMF_PBM_NEW, CRMF_R_UNSUPPORTED_ALGORITHM);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
macparams[0] =
|
macparams[0] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST,
|
||||||
OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST,
|
|
||||||
(char *)mdname, 0);
|
(char *)mdname, 0);
|
||||||
macparams[1] =
|
macparams[1] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY,
|
||||||
OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY, basekey, bklen);
|
basekey, bklen);
|
||||||
if ((mac = EVP_MAC_fetch(NULL, "HMAC", NULL)) == NULL
|
if ((mac = EVP_MAC_fetch(NULL, "HMAC", NULL)) == NULL
|
||||||
|| (mctx = EVP_MAC_CTX_new(mac)) == NULL
|
|| (mctx = EVP_MAC_CTX_new(mac)) == NULL
|
||||||
|| !EVP_MAC_CTX_set_params(mctx, macparams)
|
|| !EVP_MAC_CTX_set_params(mctx, macparams)
|
||||||
|
@ -2066,13 +2066,43 @@ BN_R_PRIVATE_KEY_TOO_LARGE:117:private key too large
|
|||||||
BN_R_P_IS_NOT_PRIME:112:p is not prime
|
BN_R_P_IS_NOT_PRIME:112:p is not prime
|
||||||
BN_R_TOO_MANY_ITERATIONS:113:too many iterations
|
BN_R_TOO_MANY_ITERATIONS:113:too many iterations
|
||||||
BN_R_TOO_MANY_TEMPORARY_VARIABLES:109:too many temporary variables
|
BN_R_TOO_MANY_TEMPORARY_VARIABLES:109:too many temporary variables
|
||||||
|
CMP_R_BAD_REQUEST_ID:108:bad request id
|
||||||
|
CMP_R_CERTID_NOT_FOUND:109:certid not found
|
||||||
|
CMP_R_CERTIFICATE_NOT_FOUND:112:certificate not found
|
||||||
|
CMP_R_CERTRESPONSE_NOT_FOUND:113:certresponse not found
|
||||||
|
CMP_R_CERT_AND_KEY_DO_NOT_MATCH:114:cert and key do not match
|
||||||
|
CMP_R_ERROR_CALCULATING_PROTECTION:115:error calculating protection
|
||||||
|
CMP_R_ERROR_CREATING_CERTCONF:116:error creating certconf
|
||||||
|
CMP_R_ERROR_CREATING_CERTREP:117:error creating certrep
|
||||||
|
CMP_R_ERROR_CREATING_ERROR:118:error creating error
|
||||||
|
CMP_R_ERROR_CREATING_GENM:119:error creating genm
|
||||||
|
CMP_R_ERROR_CREATING_GENP:120:error creating genp
|
||||||
|
CMP_R_ERROR_CREATING_P10CR:121:error creating p10cr
|
||||||
|
CMP_R_ERROR_CREATING_PKICONF:122:error creating pkiconf
|
||||||
|
CMP_R_ERROR_CREATING_POLLREP:123:error creating pollrep
|
||||||
|
CMP_R_ERROR_CREATING_POLLREQ:124:error creating pollreq
|
||||||
|
CMP_R_ERROR_CREATING_RP:125:error creating rp
|
||||||
|
CMP_R_ERROR_CREATING_RR:126:error creating rr
|
||||||
CMP_R_ERROR_PARSING_PKISTATUS:107:error parsing pkistatus
|
CMP_R_ERROR_PARSING_PKISTATUS:107:error parsing pkistatus
|
||||||
|
CMP_R_ERROR_PROTECTING_MESSAGE:127:error protecting message
|
||||||
|
CMP_R_ERROR_SETTING_CERTHASH:128:error setting certhash
|
||||||
CMP_R_FAILURE_OBTAINING_RANDOM:110:failure obtaining random
|
CMP_R_FAILURE_OBTAINING_RANDOM:110:failure obtaining random
|
||||||
|
CMP_R_FAIL_INFO_OUT_OF_RANGE:129:fail info out of range
|
||||||
CMP_R_INVALID_ARGS:100:invalid args
|
CMP_R_INVALID_ARGS:100:invalid args
|
||||||
CMP_R_MULTIPLE_SAN_SOURCES:102:multiple san sources
|
CMP_R_MISSING_KEY_INPUT_FOR_CREATING_PROTECTION:130:\
|
||||||
|
missing key input for creating protection
|
||||||
|
CMP_R_MISSING_PRIVATE_KEY:131:missing private key
|
||||||
CMP_R_MISSING_SENDER_IDENTIFICATION:111:missing sender identification
|
CMP_R_MISSING_SENDER_IDENTIFICATION:111:missing sender identification
|
||||||
|
CMP_R_MULTIPLE_SAN_SOURCES:102:multiple san sources
|
||||||
CMP_R_NO_STDIO:194:no stdio
|
CMP_R_NO_STDIO:194:no stdio
|
||||||
CMP_R_NULL_ARGUMENT:103:null argument
|
CMP_R_NULL_ARGUMENT:103:null argument
|
||||||
|
CMP_R_PKISTATUSINFO_NOT_FOUND:132:pkistatusinfo not found
|
||||||
|
CMP_R_UNEXPECTED_PKIBODY:133:unexpected pkibody
|
||||||
|
CMP_R_UNKNOWN_ALGORITHM_ID:134:unknown algorithm id
|
||||||
|
CMP_R_UNKNOWN_CERT_TYPE:135:unknown cert type
|
||||||
|
CMP_R_UNSUPPORTED_ALGORITHM:136:unsupported algorithm
|
||||||
|
CMP_R_UNSUPPORTED_KEY_TYPE:137:unsupported key type
|
||||||
|
CMP_R_WRONG_ALGORITHM_OID:138:wrong algorithm oid
|
||||||
CMS_R_ADD_SIGNER_ERROR:99:add signer error
|
CMS_R_ADD_SIGNER_ERROR:99:add signer error
|
||||||
CMS_R_ATTRIBUTE_ERROR:161:attribute error
|
CMS_R_ATTRIBUTE_ERROR:161:attribute error
|
||||||
CMS_R_CERTIFICATE_ALREADY_PRESENT:175:certificate already present
|
CMS_R_CERTIFICATE_ALREADY_PRESENT:175:certificate already present
|
||||||
|
40
doc/man3/OSSL_CMP_MSG_get0_header.pod
Normal file
40
doc/man3/OSSL_CMP_MSG_get0_header.pod
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
=pod
|
||||||
|
|
||||||
|
=head1 NAME
|
||||||
|
|
||||||
|
OSSL_CMP_MSG_get0_header
|
||||||
|
- function(s) manipulating CMP messages
|
||||||
|
|
||||||
|
=head1 SYNOPSIS
|
||||||
|
|
||||||
|
#include <openssl/cmp.h>
|
||||||
|
|
||||||
|
OSSL_CMP_PKIHEADER *OSSL_CMP_MSG_get0_header(const OSSL_CMP_MSG *msg);
|
||||||
|
|
||||||
|
=head1 DESCRIPTION
|
||||||
|
|
||||||
|
OSSL_CMP_MSG_get0_header returns the header of the given CMP message.
|
||||||
|
|
||||||
|
=head1 NOTES
|
||||||
|
|
||||||
|
CMP is defined in RFC 4210.
|
||||||
|
|
||||||
|
=head1 RETURN VALUES
|
||||||
|
|
||||||
|
CMP_MSG_get0_header() returns the intended pointer value as described above
|
||||||
|
or NULL if the respective entry does not exist and on error.
|
||||||
|
|
||||||
|
=head1 HISTORY
|
||||||
|
|
||||||
|
The OpenSSL CMP support was added in OpenSSL 3.0.
|
||||||
|
|
||||||
|
=head1 COPYRIGHT
|
||||||
|
|
||||||
|
Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
|
||||||
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
this file except in compliance with the License. You can obtain a copy
|
||||||
|
in the file LICENSE in the source distribution or at
|
||||||
|
L<https://www.openssl.org/source/license.html>.
|
||||||
|
|
||||||
|
=cut
|
@ -346,6 +346,10 @@ char *OSSL_CMP_CTX_snprint_PKIStatus(OSSL_CMP_CTX *ctx, char *buf,
|
|||||||
ASN1_OCTET_STRING *OSSL_CMP_HDR_get0_transactionID(const OSSL_CMP_PKIHEADER *hdr);
|
ASN1_OCTET_STRING *OSSL_CMP_HDR_get0_transactionID(const OSSL_CMP_PKIHEADER *hdr);
|
||||||
ASN1_OCTET_STRING *OSSL_CMP_HDR_get0_recipNonce(const OSSL_CMP_PKIHEADER *hdr);
|
ASN1_OCTET_STRING *OSSL_CMP_HDR_get0_recipNonce(const OSSL_CMP_PKIHEADER *hdr);
|
||||||
|
|
||||||
|
/* from cmp_msg.c */
|
||||||
|
/* support application-level CMP debugging in cmp.c: */
|
||||||
|
OSSL_CMP_PKIHEADER *OSSL_CMP_MSG_get0_header(const OSSL_CMP_MSG *msg);
|
||||||
|
|
||||||
# ifdef __cplusplus
|
# ifdef __cplusplus
|
||||||
}
|
}
|
||||||
# endif
|
# endif
|
||||||
|
@ -26,7 +26,6 @@ extern "C" {
|
|||||||
/*
|
/*
|
||||||
* convenience functions for CMP-specific logging via the trace API
|
* convenience functions for CMP-specific logging via the trace API
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int OSSL_CMP_log_open(void);
|
int OSSL_CMP_log_open(void);
|
||||||
void OSSL_CMP_log_close(void);
|
void OSSL_CMP_log_close(void);
|
||||||
# define OSSL_CMP_LOG_PREFIX "CMP "
|
# define OSSL_CMP_LOG_PREFIX "CMP "
|
||||||
|
@ -33,13 +33,42 @@ int ERR_load_CMP_strings(void);
|
|||||||
/*
|
/*
|
||||||
* CMP reason codes.
|
* CMP reason codes.
|
||||||
*/
|
*/
|
||||||
|
# define CMP_R_BAD_REQUEST_ID 108
|
||||||
|
# define CMP_R_CERTID_NOT_FOUND 109
|
||||||
|
# define CMP_R_CERTIFICATE_NOT_FOUND 112
|
||||||
|
# define CMP_R_CERTRESPONSE_NOT_FOUND 113
|
||||||
|
# define CMP_R_CERT_AND_KEY_DO_NOT_MATCH 114
|
||||||
|
# define CMP_R_ERROR_CALCULATING_PROTECTION 115
|
||||||
|
# define CMP_R_ERROR_CREATING_CERTCONF 116
|
||||||
|
# define CMP_R_ERROR_CREATING_CERTREP 117
|
||||||
|
# define CMP_R_ERROR_CREATING_ERROR 118
|
||||||
|
# define CMP_R_ERROR_CREATING_GENM 119
|
||||||
|
# define CMP_R_ERROR_CREATING_GENP 120
|
||||||
|
# define CMP_R_ERROR_CREATING_P10CR 121
|
||||||
|
# define CMP_R_ERROR_CREATING_PKICONF 122
|
||||||
|
# define CMP_R_ERROR_CREATING_POLLREP 123
|
||||||
|
# define CMP_R_ERROR_CREATING_POLLREQ 124
|
||||||
|
# define CMP_R_ERROR_CREATING_RP 125
|
||||||
|
# define CMP_R_ERROR_CREATING_RR 126
|
||||||
# define CMP_R_ERROR_PARSING_PKISTATUS 107
|
# define CMP_R_ERROR_PARSING_PKISTATUS 107
|
||||||
|
# define CMP_R_ERROR_PROTECTING_MESSAGE 127
|
||||||
|
# define CMP_R_ERROR_SETTING_CERTHASH 128
|
||||||
# define CMP_R_FAILURE_OBTAINING_RANDOM 110
|
# define CMP_R_FAILURE_OBTAINING_RANDOM 110
|
||||||
|
# define CMP_R_FAIL_INFO_OUT_OF_RANGE 129
|
||||||
# define CMP_R_INVALID_ARGS 100
|
# define CMP_R_INVALID_ARGS 100
|
||||||
# define CMP_R_MULTIPLE_SAN_SOURCES 102
|
# define CMP_R_MISSING_KEY_INPUT_FOR_CREATING_PROTECTION 130
|
||||||
|
# define CMP_R_MISSING_PRIVATE_KEY 131
|
||||||
# define CMP_R_MISSING_SENDER_IDENTIFICATION 111
|
# define CMP_R_MISSING_SENDER_IDENTIFICATION 111
|
||||||
|
# define CMP_R_MULTIPLE_SAN_SOURCES 102
|
||||||
# define CMP_R_NO_STDIO 194
|
# define CMP_R_NO_STDIO 194
|
||||||
# define CMP_R_NULL_ARGUMENT 103
|
# define CMP_R_NULL_ARGUMENT 103
|
||||||
|
# define CMP_R_PKISTATUSINFO_NOT_FOUND 132
|
||||||
|
# define CMP_R_UNEXPECTED_PKIBODY 133
|
||||||
|
# define CMP_R_UNKNOWN_ALGORITHM_ID 134
|
||||||
|
# define CMP_R_UNKNOWN_CERT_TYPE 135
|
||||||
|
# define CMP_R_UNSUPPORTED_ALGORITHM 136
|
||||||
|
# define CMP_R_UNSUPPORTED_KEY_TYPE 137
|
||||||
|
# define CMP_R_WRONG_ALGORITHM_OID 138
|
||||||
|
|
||||||
# endif
|
# endif
|
||||||
#endif
|
#endif
|
||||||
|
@ -481,7 +481,8 @@ IF[{- !$disabled{tests} -}]
|
|||||||
DEPEND[conf_include_test]=../libcrypto libtestutil.a
|
DEPEND[conf_include_test]=../libcrypto libtestutil.a
|
||||||
|
|
||||||
IF[{- !$disabled{cmp} -}]
|
IF[{- !$disabled{cmp} -}]
|
||||||
PROGRAMS{noinst}=cmp_asn_test cmp_ctx_test cmp_status_test cmp_hdr_test
|
PROGRAMS{noinst}=cmp_asn_test cmp_ctx_test cmp_status_test cmp_hdr_test \
|
||||||
|
cmp_protect_test cmp_msg_test
|
||||||
ENDIF
|
ENDIF
|
||||||
|
|
||||||
SOURCE[cmp_asn_test]=cmp_asn_test.c cmp_testlib.c
|
SOURCE[cmp_asn_test]=cmp_asn_test.c cmp_testlib.c
|
||||||
@ -500,6 +501,14 @@ IF[{- !$disabled{tests} -}]
|
|||||||
INCLUDE[cmp_status_test]=.. ../include ../apps/include
|
INCLUDE[cmp_status_test]=.. ../include ../apps/include
|
||||||
DEPEND[cmp_status_test]=../libcrypto.a libtestutil.a
|
DEPEND[cmp_status_test]=../libcrypto.a libtestutil.a
|
||||||
|
|
||||||
|
SOURCE[cmp_protect_test]=cmp_status_test.c cmp_testlib.c
|
||||||
|
INCLUDE[cmp_protect_test]=.. ../include ../apps/include
|
||||||
|
DEPEND[cmp_protect_test]=../libcrypto.a libtestutil.a
|
||||||
|
|
||||||
|
SOURCE[cmp_msg_test]=cmp_status_test.c cmp_testlib.c
|
||||||
|
INCLUDE[cmp_msg_test]=.. ../include ../apps/include
|
||||||
|
DEPEND[cmp_msg_test]=../libcrypto.a libtestutil.a
|
||||||
|
|
||||||
# Internal test programs. These are essentially a collection of internal
|
# Internal test programs. These are essentially a collection of internal
|
||||||
# test routines. Some of them need to reach internal symbols that aren't
|
# test routines. Some of them need to reach internal symbols that aren't
|
||||||
# available through the shared library (at least on Linux, Solaris, Windows
|
# available through the shared library (at least on Linux, Solaris, Windows
|
||||||
|
@ -40,8 +40,7 @@ static void tear_down(CMP_ASN_TEST_FIXTURE *fixture)
|
|||||||
OPENSSL_free(fixture);
|
OPENSSL_free(fixture);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int execute_cmp_asn1_get_int_test(CMP_ASN_TEST_FIXTURE *
|
static int execute_cmp_asn1_get_int_test(CMP_ASN_TEST_FIXTURE *fixture)
|
||||||
fixture)
|
|
||||||
{
|
{
|
||||||
ASN1_INTEGER *asn1integer = ASN1_INTEGER_new();
|
ASN1_INTEGER *asn1integer = ASN1_INTEGER_new();
|
||||||
ASN1_INTEGER_set(asn1integer, 77);
|
ASN1_INTEGER_set(asn1integer, 77);
|
||||||
@ -115,8 +114,10 @@ int setup_tests(void)
|
|||||||
ADD_TEST(test_cmp_asn1_get_int);
|
ADD_TEST(test_cmp_asn1_get_int);
|
||||||
ADD_TEST(test_ASN1_OCTET_STRING_set);
|
ADD_TEST(test_ASN1_OCTET_STRING_set);
|
||||||
ADD_TEST(test_ASN1_OCTET_STRING_set_tgt_is_src);
|
ADD_TEST(test_ASN1_OCTET_STRING_set_tgt_is_src);
|
||||||
/* TODO make sure that total number of tests (here currently 24) is shown,
|
/*
|
||||||
also for other cmp_*text.c. Currently the test drivers always show 1. */
|
* TODO make sure that total number of tests (here currently 24) is shown,
|
||||||
|
* also for other cmp_*text.c. Currently the test drivers always show 1.
|
||||||
|
*/
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
@ -39,7 +39,8 @@ static OSSL_CMP_CTX_TEST_FIXTURE *set_up(const char *const test_case_name)
|
|||||||
return fixture;
|
return fixture;
|
||||||
}
|
}
|
||||||
|
|
||||||
static STACK_OF(X509) *sk_X509_new_1(void) {
|
static STACK_OF(X509) *sk_X509_new_1(void)
|
||||||
|
{
|
||||||
STACK_OF(X509) *sk = sk_X509_new_null();
|
STACK_OF(X509) *sk = sk_X509_new_null();
|
||||||
X509 *x = X509_new();
|
X509 *x = X509_new();
|
||||||
|
|
||||||
@ -51,7 +52,8 @@ static STACK_OF(X509) *sk_X509_new_1(void) {
|
|||||||
return sk;
|
return sk;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void sk_X509_pop_X509_free(STACK_OF(X509) *sk) {
|
static void sk_X509_pop_X509_free(STACK_OF(X509) *sk)
|
||||||
|
{
|
||||||
sk_X509_pop_free(sk, X509_free);
|
sk_X509_pop_free(sk, X509_free);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -75,7 +77,6 @@ static int execute_CTX_reinit_test(OSSL_CMP_CTX_TEST_FIXTURE *fixture)
|
|||||||
|| !OSSL_CMP_CTX_set1_transactionID(ctx, bytes)
|
|| !OSSL_CMP_CTX_set1_transactionID(ctx, bytes)
|
||||||
|| !OSSL_CMP_CTX_set1_senderNonce(ctx, bytes)
|
|| !OSSL_CMP_CTX_set1_senderNonce(ctx, bytes)
|
||||||
|| !ossl_cmp_ctx_set1_recipNonce(ctx, bytes))
|
|| !ossl_cmp_ctx_set1_recipNonce(ctx, bytes))
|
||||||
|
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
if (!TEST_true(OSSL_CMP_CTX_reinit(ctx)))
|
if (!TEST_true(OSSL_CMP_CTX_reinit(ctx)))
|
||||||
@ -467,17 +468,20 @@ static int test_CTX_##SETN##_##GETN##_##FIELD(void) \
|
|||||||
return result; \
|
return result; \
|
||||||
}
|
}
|
||||||
|
|
||||||
static char *char_new(void) {
|
static char *char_new(void)
|
||||||
|
{
|
||||||
return OPENSSL_strdup("test");
|
return OPENSSL_strdup("test");
|
||||||
}
|
}
|
||||||
|
|
||||||
static void char_free(char *val) {
|
static void char_free(char *val)
|
||||||
|
{
|
||||||
OPENSSL_free(val);
|
OPENSSL_free(val);
|
||||||
}
|
}
|
||||||
|
|
||||||
#define EMPTY_SK_X509(x) ((x) == NULL || sk_X509_num(x) == 0)
|
#define EMPTY_SK_X509(x) ((x) == NULL || sk_X509_num(x) == 0)
|
||||||
|
|
||||||
static X509_STORE *X509_STORE_new_1(void) {
|
static X509_STORE *X509_STORE_new_1(void)
|
||||||
|
{
|
||||||
X509_STORE *store = X509_STORE_new();
|
X509_STORE *store = X509_STORE_new();
|
||||||
|
|
||||||
if (store != NULL)
|
if (store != NULL)
|
||||||
@ -534,8 +538,7 @@ static X509_STORE *X509_STORE_new_1(void) {
|
|||||||
sk_##TYPE##_new_null(), sk_##TYPE##_free)
|
sk_##TYPE##_new_null(), sk_##TYPE##_free)
|
||||||
|
|
||||||
#define DEFINE_SET_CB_TEST(FIELD) \
|
#define DEFINE_SET_CB_TEST(FIELD) \
|
||||||
static OSSL_cmp_##FIELD##_t \
|
static OSSL_cmp_##FIELD##_t OSSL_CMP_CTX_get_##FIELD(const CMP_CTX *ctx) \
|
||||||
OSSL_CMP_CTX_get_##FIELD(const CMP_CTX *ctx) \
|
|
||||||
{ \
|
{ \
|
||||||
if (ctx == NULL) \
|
if (ctx == NULL) \
|
||||||
CMPerr(0, CMP_R_NULL_ARGUMENT); \
|
CMPerr(0, CMP_R_NULL_ARGUMENT); \
|
||||||
@ -591,7 +594,8 @@ static X509_STORE *X509_STORE_new_1(void) {
|
|||||||
#define push1 1
|
#define push1 1
|
||||||
#define DEFINE_PUSH_BASE_TEST(PUSHN, DUP, FIELD, ELEM, TYPE, T, \
|
#define DEFINE_PUSH_BASE_TEST(PUSHN, DUP, FIELD, ELEM, TYPE, T, \
|
||||||
DEFAULT, NEW, FREE) \
|
DEFAULT, NEW, FREE) \
|
||||||
static TYPE sk_top_##FIELD(const CMP_CTX *ctx) { \
|
static TYPE sk_top_##FIELD(const CMP_CTX *ctx) \
|
||||||
|
{ \
|
||||||
return sk_##T##_value(ctx->FIELD, sk_##T##_num(ctx->FIELD) - 1); \
|
return sk_##T##_value(ctx->FIELD, sk_##T##_num(ctx->FIELD) - 1); \
|
||||||
} \
|
} \
|
||||||
\
|
\
|
||||||
@ -600,7 +604,9 @@ static int execute_CTX_##PUSHN##_##ELEM(OSSL_CMP_CTX_TEST_FIXTURE *fixture) \
|
|||||||
CMP_CTX *ctx = fixture->ctx; \
|
CMP_CTX *ctx = fixture->ctx; \
|
||||||
int (*push_fn)(CMP_CTX *ctx, TYPE) = \
|
int (*push_fn)(CMP_CTX *ctx, TYPE) = \
|
||||||
(int (*)(CMP_CTX *ctx, TYPE))OSSL_CMP_CTX_##PUSHN##_##ELEM; \
|
(int (*)(CMP_CTX *ctx, TYPE))OSSL_CMP_CTX_##PUSHN##_##ELEM; \
|
||||||
/* need type cast in above assignment because TYPE arg sometimes is const */ \
|
/* \
|
||||||
|
* need type cast in above assignment because TYPE arg sometimes is const \
|
||||||
|
*/ \
|
||||||
int n_elem = sk_##T##_num(ctx->FIELD); \
|
int n_elem = sk_##T##_num(ctx->FIELD); \
|
||||||
STACK_OF(TYPE) field_read; \
|
STACK_OF(TYPE) field_read; \
|
||||||
TYPE val1_to_free = NEW; \
|
TYPE val1_to_free = NEW; \
|
||||||
@ -741,11 +747,10 @@ DEFINE_SET_GET_TEST(OSSL_CMP, CTX, 0, 0, 0, newPkey_1, EVP_PKEY)
|
|||||||
DEFINE_SET_GET_ARG_FN(set0, get0, newPkey, 0, EVP_PKEY*) /* priv == 0 */
|
DEFINE_SET_GET_ARG_FN(set0, get0, newPkey, 0, EVP_PKEY*) /* priv == 0 */
|
||||||
DEFINE_SET_GET_TEST(OSSL_CMP, CTX, 0, 0, 0, newPkey_0, EVP_PKEY)
|
DEFINE_SET_GET_TEST(OSSL_CMP, CTX, 0, 0, 0, newPkey_0, EVP_PKEY)
|
||||||
DEFINE_SET_GET1_STR_FN(set1, referenceValue)
|
DEFINE_SET_GET1_STR_FN(set1, referenceValue)
|
||||||
DEFINE_SET_GET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, 1, referenceValue_str,
|
DEFINE_SET_GET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, 1, referenceValue_str, char,
|
||||||
char, IS_0)
|
IS_0)
|
||||||
DEFINE_SET_GET1_STR_FN(set1, secretValue)
|
DEFINE_SET_GET1_STR_FN(set1, secretValue)
|
||||||
DEFINE_SET_GET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, 1, secretValue_str,
|
DEFINE_SET_GET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, 1, secretValue_str, char, IS_0)
|
||||||
char, IS_0)
|
|
||||||
DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, issuer, X509_NAME)
|
DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, issuer, X509_NAME)
|
||||||
DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, subjectName, X509_NAME)
|
DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, subjectName, X509_NAME)
|
||||||
#ifdef ISSUE_9504_RESOLVED
|
#ifdef ISSUE_9504_RESOLVED
|
||||||
@ -768,8 +773,8 @@ DEFINE_SET_GET_TEST(ossl_cmp, ctx, 0, 0, 0, newCert, X509)
|
|||||||
DEFINE_SET_GET_SK_X509_TEST(ossl_cmp, ctx, 1, 1, caPubs)
|
DEFINE_SET_GET_SK_X509_TEST(ossl_cmp, ctx, 1, 1, caPubs)
|
||||||
DEFINE_SET_GET_SK_X509_TEST(ossl_cmp, ctx, 1, 1, extraCertsIn)
|
DEFINE_SET_GET_SK_X509_TEST(ossl_cmp, ctx, 1, 1, extraCertsIn)
|
||||||
|
|
||||||
DEFINE_SET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, transactionID,
|
DEFINE_SET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, transactionID, ASN1_OCTET_STRING,
|
||||||
ASN1_OCTET_STRING, IS_0)
|
IS_0)
|
||||||
DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, senderNonce, ASN1_OCTET_STRING)
|
DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, senderNonce, ASN1_OCTET_STRING)
|
||||||
DEFINE_SET_TEST(ossl_cmp, ctx, 1, 1, recipNonce, ASN1_OCTET_STRING)
|
DEFINE_SET_TEST(ossl_cmp, ctx, 1, 1, recipNonce, ASN1_OCTET_STRING)
|
||||||
|
|
||||||
@ -793,9 +798,10 @@ int setup_tests(void)
|
|||||||
*/
|
*/
|
||||||
ADD_TEST(test_cmp_ctx_log_cb);
|
ADD_TEST(test_cmp_ctx_log_cb);
|
||||||
#if !defined(OPENSSL_NO_ERR) && !defined(OPENSSL_NO_AUTOERRINIT)
|
#if !defined(OPENSSL_NO_ERR) && !defined(OPENSSL_NO_AUTOERRINIT)
|
||||||
/* also tests OSSL_CMP_CTX_set_log_cb(), OSSL_CMP_print_errors_cb(),
|
/*
|
||||||
ossl_cmp_add_error_txt(), and the macros
|
* also tests OSSL_CMP_CTX_set_log_cb(), OSSL_CMP_print_errors_cb(),
|
||||||
ossl_cmp_add_error_data and ossl_cmp_add_error_line:
|
* ossl_cmp_add_error_txt(), and the macros
|
||||||
|
* ossl_cmp_add_error_data and ossl_cmp_add_error_line:
|
||||||
*/
|
*/
|
||||||
ADD_TEST(test_CTX_print_errors);
|
ADD_TEST(test_CTX_print_errors);
|
||||||
#endif
|
#endif
|
||||||
@ -831,7 +837,9 @@ int setup_tests(void)
|
|||||||
ADD_TEST(test_CTX_set1_get0_issuer);
|
ADD_TEST(test_CTX_set1_get0_issuer);
|
||||||
ADD_TEST(test_CTX_set1_get0_subjectName);
|
ADD_TEST(test_CTX_set1_get0_subjectName);
|
||||||
#ifdef ISSUE_9504_RESOLVED
|
#ifdef ISSUE_9504_RESOLVED
|
||||||
/* test currently fails, see https://github.com/openssl/openssl/issues/9504 */
|
/*
|
||||||
|
* test currently fails, see https://github.com/openssl/openssl/issues/9504
|
||||||
|
*/
|
||||||
ADD_TEST(test_CTX_push1_subjectAltName);
|
ADD_TEST(test_CTX_push1_subjectAltName);
|
||||||
#endif
|
#endif
|
||||||
ADD_TEST(test_CTX_set0_get0_reqExtensions);
|
ADD_TEST(test_CTX_set0_get0_reqExtensions);
|
||||||
@ -839,7 +847,9 @@ int setup_tests(void)
|
|||||||
ADD_TEST(test_CTX_push0_policy);
|
ADD_TEST(test_CTX_push0_policy);
|
||||||
ADD_TEST(test_CTX_set1_get0_oldCert);
|
ADD_TEST(test_CTX_set1_get0_oldCert);
|
||||||
#ifdef ISSUE_9504_RESOLVED
|
#ifdef ISSUE_9504_RESOLVED
|
||||||
/* test currently fails, see https://github.com/openssl/openssl/issues/9504 */
|
/*
|
||||||
|
* test currently fails, see https://github.com/openssl/openssl/issues/9504
|
||||||
|
*/
|
||||||
ADD_TEST(test_CTX_set1_get0_p10CSR);
|
ADD_TEST(test_CTX_set1_get0_p10CSR);
|
||||||
#endif
|
#endif
|
||||||
/* misc body contents: */
|
/* misc body contents: */
|
||||||
@ -859,8 +869,6 @@ int setup_tests(void)
|
|||||||
ADD_TEST(test_CTX_set1_get0_transactionID);
|
ADD_TEST(test_CTX_set1_get0_transactionID);
|
||||||
ADD_TEST(test_CTX_set1_get0_senderNonce);
|
ADD_TEST(test_CTX_set1_get0_senderNonce);
|
||||||
ADD_TEST(test_CTX_set1_get0_recipNonce);
|
ADD_TEST(test_CTX_set1_get0_recipNonce);
|
||||||
|
/* ossl_cmp_build_cert_chain() is tested in cmp_protect.c */
|
||||||
/* TODO ossl_cmp_build_cert_chain() will be tested with cmp_protect.c*/
|
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
@ -193,7 +193,9 @@ static int execute_HDR_set1_senderKID_test(CMP_HDR_TEST_FIXTURE *fixture)
|
|||||||
if (!TEST_ptr(senderKID))
|
if (!TEST_ptr(senderKID))
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
ASN1_OCTET_STRING_set(senderKID, rand_data, sizeof(rand_data));
|
if (!TEST_int_eq(ASN1_OCTET_STRING_set(senderKID, rand_data,
|
||||||
|
sizeof(rand_data)), 1))
|
||||||
|
return 0;
|
||||||
if (!TEST_int_eq(ossl_cmp_hdr_set1_senderKID(fixture->hdr, senderKID), 1))
|
if (!TEST_int_eq(ossl_cmp_hdr_set1_senderKID(fixture->hdr, senderKID), 1))
|
||||||
return 0;
|
return 0;
|
||||||
if (!TEST_int_eq(
|
if (!TEST_int_eq(
|
||||||
@ -461,8 +463,10 @@ int setup_tests(void)
|
|||||||
ADD_TEST(test_HDR_init);
|
ADD_TEST(test_HDR_init);
|
||||||
ADD_TEST(test_HDR_init_with_subject);
|
ADD_TEST(test_HDR_init_with_subject);
|
||||||
ADD_TEST(test_HDR_init_no_ref_no_subject);
|
ADD_TEST(test_HDR_init_no_ref_no_subject);
|
||||||
/* TODO make sure that total number of tests (here currently 24) is shown,
|
/*
|
||||||
also for other cmp_*text.c. Currently the test drivers always show 1. */
|
* TODO make sure that total number of tests (here currently 24) is shown,
|
||||||
|
* also for other cmp_*text.c. Currently the test drivers always show 1.
|
||||||
|
*/
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
577
test/cmp_msg_test.c
Normal file
577
test/cmp_msg_test.c
Normal file
@ -0,0 +1,577 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
* Copyright Nokia 2007-2019
|
||||||
|
* Copyright Siemens AG 2015-2019
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
* this file except in compliance with the License. You can obtain a copy
|
||||||
|
* in the file LICENSE in the source distribution or at
|
||||||
|
* https://www.openssl.org/source/license.html
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "cmp_testlib.h"
|
||||||
|
|
||||||
|
static const char *server_cert_f;
|
||||||
|
static const char *pkcs10_f;
|
||||||
|
|
||||||
|
typedef struct test_fixture {
|
||||||
|
const char *test_case_name;
|
||||||
|
OSSL_CMP_CTX *cmp_ctx;
|
||||||
|
/* for msg create tests */
|
||||||
|
int bodytype;
|
||||||
|
int err_code;
|
||||||
|
/* for certConf */
|
||||||
|
int fail_info;
|
||||||
|
/* for protection tests */
|
||||||
|
OSSL_CMP_MSG *msg;
|
||||||
|
int expected;
|
||||||
|
/* for error and response messages */
|
||||||
|
OSSL_CMP_PKISI *si;
|
||||||
|
} CMP_MSG_TEST_FIXTURE;
|
||||||
|
|
||||||
|
static unsigned char ref[CMP_TEST_REFVALUE_LENGTH];
|
||||||
|
|
||||||
|
static void tear_down(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
OSSL_CMP_CTX_free(fixture->cmp_ctx);
|
||||||
|
OSSL_CMP_MSG_free(fixture->msg);
|
||||||
|
OSSL_CMP_PKISI_free(fixture->si);
|
||||||
|
OPENSSL_free(fixture);
|
||||||
|
}
|
||||||
|
|
||||||
|
#define SET_OPT_UNPROTECTED_SEND(ctx, val) \
|
||||||
|
OSSL_CMP_CTX_set_option((ctx), OSSL_CMP_OPT_UNPROTECTED_SEND, (val))
|
||||||
|
static CMP_MSG_TEST_FIXTURE *set_up(const char *const test_case_name)
|
||||||
|
{
|
||||||
|
CMP_MSG_TEST_FIXTURE *fixture;
|
||||||
|
|
||||||
|
if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture))))
|
||||||
|
return NULL;
|
||||||
|
fixture->test_case_name = test_case_name;
|
||||||
|
|
||||||
|
if (!TEST_ptr(fixture->cmp_ctx = OSSL_CMP_CTX_new())
|
||||||
|
|| !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 1))
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set1_referenceValue(fixture->cmp_ctx,
|
||||||
|
ref, sizeof(ref)))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
return fixture;
|
||||||
|
}
|
||||||
|
|
||||||
|
static EVP_PKEY *newkey = NULL;
|
||||||
|
static X509 *cert = NULL;
|
||||||
|
|
||||||
|
#define EXECUTE_MSG_CREATION_TEST(expr) \
|
||||||
|
do { \
|
||||||
|
OSSL_CMP_MSG *msg = NULL; \
|
||||||
|
int good = fixture->expected != 0 ? \
|
||||||
|
TEST_ptr(msg = (expr)) && TEST_true(valid_asn1_encoding(msg)) : \
|
||||||
|
TEST_ptr_null(msg = (expr)); \
|
||||||
|
\
|
||||||
|
OSSL_CMP_MSG_free(msg); \
|
||||||
|
return good; \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
|
/*-
|
||||||
|
* The following tests call a cmp message creation function.
|
||||||
|
* if fixture->expected != 0:
|
||||||
|
* returns 1 if the message is created and syntactically correct.
|
||||||
|
* if fixture->expected == 0
|
||||||
|
* returns 1 if message creation returns NULL
|
||||||
|
*/
|
||||||
|
static int execute_certreq_create_test(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
EXECUTE_MSG_CREATION_TEST(ossl_cmp_certReq_new(fixture->cmp_ctx,
|
||||||
|
fixture->bodytype,
|
||||||
|
fixture->err_code));
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_errormsg_create_test(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
EXECUTE_MSG_CREATION_TEST(ossl_cmp_error_new(fixture->cmp_ctx, fixture->si,
|
||||||
|
fixture->err_code,
|
||||||
|
NULL /* fixture->free_text */,
|
||||||
|
0));
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_rr_create_test(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
EXECUTE_MSG_CREATION_TEST(ossl_cmp_rr_new(fixture->cmp_ctx));
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_certconf_create_test(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
EXECUTE_MSG_CREATION_TEST(ossl_cmp_certConf_new
|
||||||
|
(fixture->cmp_ctx, fixture->fail_info, NULL));
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_genm_create_test(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
EXECUTE_MSG_CREATION_TEST(ossl_cmp_genm_new(fixture->cmp_ctx));
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_pollreq_create_test(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
EXECUTE_MSG_CREATION_TEST(ossl_cmp_pollReq_new(fixture->cmp_ctx, 4711));
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_pkimessage_create_test(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
EXECUTE_MSG_CREATION_TEST(ossl_cmp_msg_create
|
||||||
|
(fixture->cmp_ctx, fixture->bodytype));
|
||||||
|
}
|
||||||
|
|
||||||
|
static int set1_newPkey(OSSL_CMP_CTX *ctx, EVP_PKEY* pkey)
|
||||||
|
{
|
||||||
|
if (!EVP_PKEY_up_ref(pkey))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (!OSSL_CMP_CTX_set0_newPkey(ctx, 1, pkey)) {
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_ir_protection_set(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
OSSL_CMP_CTX *ctx = fixture->cmp_ctx;
|
||||||
|
unsigned char secret[16];
|
||||||
|
|
||||||
|
fixture->bodytype = OSSL_CMP_PKIBODY_IR;
|
||||||
|
fixture->err_code = CMP_R_ERROR_CREATING_IR;
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_int_eq(1, RAND_bytes(secret, sizeof(secret)))
|
||||||
|
|| !TEST_true(SET_OPT_UNPROTECTED_SEND(ctx, 0))
|
||||||
|
|| !TEST_true(set1_newPkey(ctx, newkey))
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set1_secretValue(ctx, secret,
|
||||||
|
sizeof(secret)))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_ir_protection_fails(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->bodytype = OSSL_CMP_PKIBODY_IR;
|
||||||
|
fixture->err_code = CMP_R_ERROR_CREATING_IR;
|
||||||
|
fixture->expected = 0;
|
||||||
|
if (!TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, newkey))
|
||||||
|
|| !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 0))
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set1_clCert(fixture->cmp_ctx, cert))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_cr_without_key(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->bodytype = OSSL_CMP_PKIBODY_CR;
|
||||||
|
fixture->err_code = CMP_R_ERROR_CREATING_CR;
|
||||||
|
fixture->expected = 0;
|
||||||
|
EXECUTE_TEST(execute_certreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_cr(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->bodytype = OSSL_CMP_PKIBODY_CR;
|
||||||
|
fixture->err_code = CMP_R_ERROR_CREATING_CR;
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_certreq_with_invalid_bodytype(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->bodytype = OSSL_CMP_PKIBODY_RR;
|
||||||
|
fixture->err_code = CMP_R_ERROR_CREATING_IR;
|
||||||
|
fixture->expected = 0;
|
||||||
|
if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_p10cr(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
OSSL_CMP_CTX *ctx = fixture->cmp_ctx;
|
||||||
|
X509_REQ *p10cr = NULL;
|
||||||
|
|
||||||
|
fixture->bodytype = OSSL_CMP_PKIBODY_P10CR;
|
||||||
|
fixture->err_code = CMP_R_ERROR_CREATING_P10CR;
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_ptr(p10cr = load_csr(pkcs10_f))
|
||||||
|
|| !TEST_true(set1_newPkey(ctx, newkey))
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set1_p10CSR(ctx, p10cr))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
X509_REQ_free(p10cr);
|
||||||
|
EXECUTE_TEST(execute_certreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_p10cr_null(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->bodytype = OSSL_CMP_PKIBODY_P10CR;
|
||||||
|
fixture->err_code = CMP_R_ERROR_CREATING_P10CR;
|
||||||
|
fixture->expected = 0;
|
||||||
|
if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_kur(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->bodytype = OSSL_CMP_PKIBODY_KUR;
|
||||||
|
fixture->err_code = CMP_R_ERROR_CREATING_KUR;
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_kur_without_oldcert(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->bodytype = OSSL_CMP_PKIBODY_KUR;
|
||||||
|
fixture->err_code = CMP_R_ERROR_CREATING_KUR;
|
||||||
|
fixture->expected = 0;
|
||||||
|
if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_certconf(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->fail_info = 0;
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_true(ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx,
|
||||||
|
X509_dup(cert)))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certconf_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_certconf_badAlg(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_badAlg;
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_true(ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx,
|
||||||
|
X509_dup(cert)))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certconf_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_certconf_fail_info_max(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_MAX;
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_true(ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx,
|
||||||
|
X509_dup(cert)))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_certconf_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_error_msg(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->si = ossl_cmp_statusinfo_new(OSSL_CMP_PKISTATUS_rejection,
|
||||||
|
OSSL_CMP_PKIFAILUREINFO_systemFailure,
|
||||||
|
NULL);
|
||||||
|
fixture->err_code = -1;
|
||||||
|
fixture->expected = 1; /* Expected: Message creation is successful */
|
||||||
|
if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_errormsg_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
static int test_cmp_create_pollreq(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->expected = 1;
|
||||||
|
EXECUTE_TEST(execute_pollreq_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_rr(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_rr_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_genm(void)
|
||||||
|
{
|
||||||
|
OSSL_CMP_ITAV *iv = NULL;
|
||||||
|
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
fixture->expected = 1;
|
||||||
|
iv = OSSL_CMP_ITAV_create(OBJ_nid2obj(NID_id_it_implicitConfirm), NULL);
|
||||||
|
if (!TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 1))
|
||||||
|
|| !TEST_ptr(iv)
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_push0_genm_ITAV(fixture->cmp_ctx, iv))) {
|
||||||
|
OSSL_CMP_ITAV_free(iv);
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
EXECUTE_TEST(execute_genm_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_certrep_create(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
OSSL_CMP_CERTREPMESSAGE *crepmsg = OSSL_CMP_CERTREPMESSAGE_new();
|
||||||
|
OSSL_CMP_CERTRESPONSE *read_cresp, *cresp = OSSL_CMP_CERTRESPONSE_new();
|
||||||
|
EVP_PKEY *privkey;
|
||||||
|
X509 *certfromresp = NULL;
|
||||||
|
int res = 0;
|
||||||
|
|
||||||
|
if (crepmsg == NULL || cresp == NULL)
|
||||||
|
goto err;
|
||||||
|
if (!ASN1_INTEGER_set(cresp->certReqId, 99))
|
||||||
|
goto err;
|
||||||
|
if ((cresp->certifiedKeyPair = OSSL_CMP_CERTIFIEDKEYPAIR_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
cresp->certifiedKeyPair->certOrEncCert->type =
|
||||||
|
OSSL_CMP_CERTORENCCERT_CERTIFICATE;
|
||||||
|
if ((cresp->certifiedKeyPair->certOrEncCert->value.certificate =
|
||||||
|
X509_dup(cert)) == NULL
|
||||||
|
|| !sk_OSSL_CMP_CERTRESPONSE_push(crepmsg->response, cresp))
|
||||||
|
goto err;
|
||||||
|
cresp = NULL;
|
||||||
|
read_cresp = ossl_cmp_certrepmessage_get0_certresponse(crepmsg, 99);
|
||||||
|
if (!TEST_ptr(read_cresp))
|
||||||
|
goto err;
|
||||||
|
if (!TEST_ptr_null(ossl_cmp_certrepmessage_get0_certresponse(crepmsg, 88)))
|
||||||
|
goto err;
|
||||||
|
privkey = OSSL_CMP_CTX_get0_newPkey(fixture->cmp_ctx, 1); /* may be NULL */
|
||||||
|
certfromresp = ossl_cmp_certresponse_get1_certificate(privkey, read_cresp);
|
||||||
|
if (certfromresp == NULL || !TEST_int_eq(X509_cmp(cert, certfromresp), 0))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
res = 1;
|
||||||
|
err:
|
||||||
|
X509_free(certfromresp);
|
||||||
|
OSSL_CMP_CERTRESPONSE_free(cresp);
|
||||||
|
OSSL_CMP_CERTREPMESSAGE_free(crepmsg);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_certrep(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
EXECUTE_TEST(execute_certrep_create, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
static int execute_rp_create(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
OSSL_CMP_PKISI *si = ossl_cmp_statusinfo_new(33, 44, "a text");
|
||||||
|
X509_NAME *issuer = X509_NAME_new();
|
||||||
|
ASN1_INTEGER *serial = ASN1_INTEGER_new();
|
||||||
|
OSSL_CRMF_CERTID *cid = NULL;
|
||||||
|
OSSL_CMP_MSG *rpmsg = NULL;
|
||||||
|
int res = 0;
|
||||||
|
|
||||||
|
if (si == NULL || issuer == NULL || serial == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!X509_NAME_add_entry_by_txt(issuer, "CN", MBSTRING_ASC,
|
||||||
|
(unsigned char*)"The Issuer", -1, -1, 0)
|
||||||
|
|| !ASN1_INTEGER_set(serial, 99)
|
||||||
|
|| (cid = OSSL_CRMF_CERTID_gen(issuer, serial)) == NULL
|
||||||
|
|| (rpmsg = ossl_cmp_rp_new(fixture->cmp_ctx, si, cid, 1)) == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!TEST_ptr(ossl_cmp_revrepcontent_get_CertId(rpmsg->body->value.rp, 0)))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!TEST_ptr(ossl_cmp_revrepcontent_get_pkistatusinfo(rpmsg->body->value.rp,
|
||||||
|
0)))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
res = 1;
|
||||||
|
err:
|
||||||
|
ASN1_INTEGER_free(serial);
|
||||||
|
X509_NAME_free(issuer);
|
||||||
|
OSSL_CRMF_CERTID_free(cid);
|
||||||
|
OSSL_CMP_PKISI_free(si);
|
||||||
|
OSSL_CMP_MSG_free(rpmsg);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_rp(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
EXECUTE_TEST(execute_rp_create, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_pollrep_create(CMP_MSG_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
OSSL_CMP_MSG *pollrep;
|
||||||
|
int res = 0;
|
||||||
|
|
||||||
|
pollrep = ossl_cmp_pollRep_new(fixture->cmp_ctx, 77, 2000);
|
||||||
|
if (!TEST_ptr(pollrep))
|
||||||
|
return 0;
|
||||||
|
if (!TEST_ptr(ossl_cmp_pollrepcontent_get0_pollrep(
|
||||||
|
pollrep->body->value.pollRep, 77)))
|
||||||
|
goto err;
|
||||||
|
if (!TEST_ptr_null(ossl_cmp_pollrepcontent_get0_pollrep(
|
||||||
|
pollrep->body->value.pollRep, 88)))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
res = 1;
|
||||||
|
err:
|
||||||
|
OSSL_CMP_MSG_free(pollrep);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_create_pollrep(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
EXECUTE_TEST(execute_pollrep_create, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_pkimessage_create(int bodytype)
|
||||||
|
{
|
||||||
|
X509_REQ *p10cr = NULL;
|
||||||
|
|
||||||
|
SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
|
||||||
|
|
||||||
|
switch (fixture->bodytype = bodytype) {
|
||||||
|
case OSSL_CMP_PKIBODY_P10CR:
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_true(OSSL_CMP_CTX_set1_p10CSR(fixture->cmp_ctx,
|
||||||
|
p10cr = load_csr(pkcs10_f)))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
X509_REQ_free(p10cr);
|
||||||
|
break;
|
||||||
|
case OSSL_CMP_PKIBODY_IR:
|
||||||
|
case OSSL_CMP_PKIBODY_IP:
|
||||||
|
case OSSL_CMP_PKIBODY_CR:
|
||||||
|
case OSSL_CMP_PKIBODY_CP:
|
||||||
|
case OSSL_CMP_PKIBODY_KUR:
|
||||||
|
case OSSL_CMP_PKIBODY_KUP:
|
||||||
|
case OSSL_CMP_PKIBODY_RR:
|
||||||
|
case OSSL_CMP_PKIBODY_RP:
|
||||||
|
case OSSL_CMP_PKIBODY_PKICONF:
|
||||||
|
case OSSL_CMP_PKIBODY_GENM:
|
||||||
|
case OSSL_CMP_PKIBODY_GENP:
|
||||||
|
case OSSL_CMP_PKIBODY_ERROR:
|
||||||
|
case OSSL_CMP_PKIBODY_CERTCONF:
|
||||||
|
case OSSL_CMP_PKIBODY_POLLREQ:
|
||||||
|
case OSSL_CMP_PKIBODY_POLLREP:
|
||||||
|
fixture->expected = 1;
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
fixture->expected = 0;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
EXECUTE_TEST(execute_pkimessage_create_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
void cleanup_tests(void)
|
||||||
|
{
|
||||||
|
EVP_PKEY_free(newkey);
|
||||||
|
X509_free(cert);
|
||||||
|
}
|
||||||
|
|
||||||
|
int setup_tests(void)
|
||||||
|
{
|
||||||
|
if (!TEST_ptr(server_cert_f = test_get_argument(0))
|
||||||
|
|| !TEST_ptr(pkcs10_f = test_get_argument(1))) {
|
||||||
|
TEST_error("usage: cmp_msg_test server.crt pkcs10.der\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!TEST_ptr(newkey = gen_rsa())
|
||||||
|
|| !TEST_ptr(cert = load_pem_cert(server_cert_f))
|
||||||
|
|| !TEST_int_eq(1, RAND_bytes(ref, sizeof(ref)))) {
|
||||||
|
cleanup_tests();
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Message creation tests */
|
||||||
|
ADD_TEST(test_cmp_create_certreq_with_invalid_bodytype);
|
||||||
|
ADD_TEST(test_cmp_create_ir_protection_fails);
|
||||||
|
ADD_TEST(test_cmp_create_ir_protection_set);
|
||||||
|
ADD_TEST(test_cmp_create_error_msg);
|
||||||
|
ADD_TEST(test_cmp_create_certconf);
|
||||||
|
ADD_TEST(test_cmp_create_certconf_badAlg);
|
||||||
|
ADD_TEST(test_cmp_create_certconf_fail_info_max);
|
||||||
|
ADD_TEST(test_cmp_create_kur);
|
||||||
|
ADD_TEST(test_cmp_create_kur_without_oldcert);
|
||||||
|
ADD_TEST(test_cmp_create_cr);
|
||||||
|
ADD_TEST(test_cmp_create_cr_without_key);
|
||||||
|
ADD_TEST(test_cmp_create_p10cr);
|
||||||
|
ADD_TEST(test_cmp_create_p10cr_null);
|
||||||
|
ADD_TEST(test_cmp_create_pollreq);
|
||||||
|
ADD_TEST(test_cmp_create_rr);
|
||||||
|
ADD_TEST(test_cmp_create_rp);
|
||||||
|
ADD_TEST(test_cmp_create_genm);
|
||||||
|
ADD_TEST(test_cmp_create_certrep);
|
||||||
|
ADD_TEST(test_cmp_create_pollrep);
|
||||||
|
ADD_ALL_TESTS_NOSUBTEST(test_cmp_pkimessage_create,
|
||||||
|
OSSL_CMP_PKIBODY_POLLREP + 1);
|
||||||
|
return 1;
|
||||||
|
}
|
517
test/cmp_protect_test.c
Normal file
517
test/cmp_protect_test.c
Normal file
@ -0,0 +1,517 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
* Copyright Nokia 2007-2019
|
||||||
|
* Copyright Siemens AG 2015-2019
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
* this file except in compliance with the License. You can obtain a copy
|
||||||
|
* in the file LICENSE in the source distribution or at
|
||||||
|
* https://www.openssl.org/source/license.html
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "cmp_testlib.h"
|
||||||
|
|
||||||
|
static const char *ir_protected_f;
|
||||||
|
static const char *ir_unprotected_f;
|
||||||
|
static const char *ip_PBM_f;
|
||||||
|
|
||||||
|
typedef struct test_fixture {
|
||||||
|
const char *test_case_name;
|
||||||
|
OSSL_CMP_CTX *cmp_ctx;
|
||||||
|
/* for protection tests */
|
||||||
|
OSSL_CMP_MSG *msg;
|
||||||
|
OSSL_CMP_PKISI *si; /* for error and response messages */
|
||||||
|
ASN1_OCTET_STRING *secret;
|
||||||
|
EVP_PKEY *privkey;
|
||||||
|
EVP_PKEY *pubkey;
|
||||||
|
unsigned char *mem;
|
||||||
|
int memlen;
|
||||||
|
X509 *cert;
|
||||||
|
STACK_OF(X509) *certs;
|
||||||
|
STACK_OF(X509) *chain;
|
||||||
|
int callback_arg;
|
||||||
|
int expected;
|
||||||
|
} CMP_PROTECT_TEST_FIXTURE;
|
||||||
|
|
||||||
|
static void tear_down(CMP_PROTECT_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
OSSL_CMP_CTX_free(fixture->cmp_ctx);
|
||||||
|
OSSL_CMP_MSG_free(fixture->msg);
|
||||||
|
ASN1_OCTET_STRING_free(fixture->secret);
|
||||||
|
OSSL_CMP_PKISI_free(fixture->si);
|
||||||
|
|
||||||
|
OPENSSL_free(fixture->mem);
|
||||||
|
sk_X509_free(fixture->certs);
|
||||||
|
sk_X509_free(fixture->chain);
|
||||||
|
|
||||||
|
OPENSSL_free(fixture);
|
||||||
|
}
|
||||||
|
|
||||||
|
static CMP_PROTECT_TEST_FIXTURE *set_up(const char *const test_case_name)
|
||||||
|
{
|
||||||
|
CMP_PROTECT_TEST_FIXTURE *fixture;
|
||||||
|
|
||||||
|
if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture))))
|
||||||
|
return NULL;
|
||||||
|
fixture->test_case_name = test_case_name;
|
||||||
|
if (!TEST_ptr(fixture->cmp_ctx = OSSL_CMP_CTX_new())) {
|
||||||
|
tear_down(fixture);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
return fixture;
|
||||||
|
}
|
||||||
|
|
||||||
|
static EVP_PKEY *loadedprivkey = NULL;
|
||||||
|
static EVP_PKEY *loadedpubkey = NULL;
|
||||||
|
static EVP_PKEY *loadedkey = NULL;
|
||||||
|
static X509 *cert = NULL;
|
||||||
|
static unsigned char rand_data[OSSL_CMP_TRANSACTIONID_LENGTH];
|
||||||
|
static OSSL_CMP_MSG *ir_unprotected, *ir_protected;
|
||||||
|
static X509 *endentity1 = NULL, *endentity2 = NULL,
|
||||||
|
*root = NULL, *intermediate = NULL;
|
||||||
|
|
||||||
|
static int execute_calc_protection_fails_test(CMP_PROTECT_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
ASN1_BIT_STRING *protection =
|
||||||
|
ossl_cmp_calc_protection(fixture->msg, fixture->secret,
|
||||||
|
fixture->privkey);
|
||||||
|
int res = TEST_ptr_null(protection);
|
||||||
|
|
||||||
|
ASN1_BIT_STRING_free(protection);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_calc_protection_pbmac_test(CMP_PROTECT_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
ASN1_BIT_STRING *protection =
|
||||||
|
ossl_cmp_calc_protection(fixture->msg, fixture->secret, NULL);
|
||||||
|
int res = TEST_ptr(protection)
|
||||||
|
&& TEST_true(ASN1_STRING_cmp(protection, fixture->msg->protection) == 0);
|
||||||
|
|
||||||
|
ASN1_BIT_STRING_free(protection);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This function works similarly to parts of CMP_verify_signature in cmp_vfy.c,
|
||||||
|
* but without the need for a OSSL_CMP_CTX or a X509 certificate
|
||||||
|
*/
|
||||||
|
static int verify_signature(OSSL_CMP_MSG *msg,
|
||||||
|
ASN1_BIT_STRING *protection,
|
||||||
|
EVP_PKEY *pkey, int digest_nid)
|
||||||
|
{
|
||||||
|
CMP_PROTECTEDPART prot_part;
|
||||||
|
unsigned char *prot_part_der = NULL;
|
||||||
|
int len;
|
||||||
|
EVP_MD_CTX *ctx = NULL;
|
||||||
|
const EVP_MD *digest = EVP_get_digestbynid(digest_nid);
|
||||||
|
int res;
|
||||||
|
|
||||||
|
prot_part.header = OSSL_CMP_MSG_get0_header(msg);
|
||||||
|
prot_part.body = msg->body;
|
||||||
|
res =
|
||||||
|
TEST_int_ge(len = i2d_CMP_PROTECTEDPART(&prot_part, &prot_part_der), 0)
|
||||||
|
&& TEST_ptr(ctx = EVP_MD_CTX_new())
|
||||||
|
&& TEST_true(EVP_DigestVerifyInit(ctx, NULL, digest, NULL, pkey))
|
||||||
|
&& TEST_int_eq(EVP_DigestVerify(ctx, protection->data,
|
||||||
|
protection->length,
|
||||||
|
prot_part_der, len), 1);
|
||||||
|
/* cleanup */
|
||||||
|
EVP_MD_CTX_free(ctx);
|
||||||
|
OPENSSL_free(prot_part_der);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Calls OSSL_CMP_calc_protection and compares and verifies signature */
|
||||||
|
static int execute_calc_protection_signature_test(CMP_PROTECT_TEST_FIXTURE *
|
||||||
|
fixture)
|
||||||
|
{
|
||||||
|
ASN1_BIT_STRING *protection =
|
||||||
|
ossl_cmp_calc_protection(fixture->msg, NULL, fixture->privkey);
|
||||||
|
int ret = (TEST_ptr(protection)
|
||||||
|
&& TEST_true(ASN1_STRING_cmp(protection,
|
||||||
|
fixture->msg->protection) == 0)
|
||||||
|
&& TEST_true(verify_signature(fixture->msg, protection,
|
||||||
|
fixture->pubkey,
|
||||||
|
fixture->cmp_ctx->digest)));
|
||||||
|
|
||||||
|
ASN1_BIT_STRING_free(protection);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_calc_protection_no_key_no_secret(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
if (!TEST_ptr(fixture->msg = load_pkimsg(ir_unprotected_f))
|
||||||
|
|| !TEST_ptr(fixture->msg->header->protectionAlg =
|
||||||
|
X509_ALGOR_new() /* no specific alg needed here */)) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
EXECUTE_TEST(execute_calc_protection_fails_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_calc_protection_pkey(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->pubkey = loadedpubkey;
|
||||||
|
fixture->privkey = loadedprivkey;
|
||||||
|
if (!TEST_ptr(fixture->msg = load_pkimsg(ir_protected_f))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_calc_protection_signature_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_calc_protection_pbmac(void)
|
||||||
|
{
|
||||||
|
unsigned char sec_insta[] = { 'i', 'n', 's', 't', 'a' };
|
||||||
|
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
if (!TEST_ptr(fixture->secret = ASN1_OCTET_STRING_new())
|
||||||
|
|| !TEST_true(ASN1_OCTET_STRING_set
|
||||||
|
(fixture->secret, sec_insta, sizeof(sec_insta)))
|
||||||
|
|| !TEST_ptr(fixture->msg = load_pkimsg(ip_PBM_f))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_calc_protection_pbmac_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
static int execute_MSG_protect_test(CMP_PROTECT_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
return TEST_int_eq(fixture->expected,
|
||||||
|
ossl_cmp_msg_protect(fixture->cmp_ctx, fixture->msg));
|
||||||
|
}
|
||||||
|
|
||||||
|
#define SET_OPT_UNPROTECTED_SEND(ctx, val) \
|
||||||
|
OSSL_CMP_CTX_set_option((ctx), OSSL_CMP_OPT_UNPROTECTED_SEND, (val))
|
||||||
|
static int test_MSG_protect_unprotected_request(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
|
||||||
|
fixture->expected = 1;
|
||||||
|
if (!TEST_ptr(fixture->msg = OSSL_CMP_MSG_dup(ir_unprotected))
|
||||||
|
|| !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 1))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_MSG_protect_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key(void)
|
||||||
|
{
|
||||||
|
const size_t size = sizeof(rand_data) / 2;
|
||||||
|
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->expected = 1;
|
||||||
|
|
||||||
|
if (!TEST_ptr(fixture->msg =
|
||||||
|
OSSL_CMP_MSG_dup(ir_unprotected))
|
||||||
|
|| !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 0))
|
||||||
|
/*
|
||||||
|
* Use half of the 16 bytes of random input
|
||||||
|
* for each reference and secret value
|
||||||
|
*/
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set1_referenceValue(fixture->cmp_ctx,
|
||||||
|
rand_data, size))
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set1_secretValue(fixture->cmp_ctx,
|
||||||
|
rand_data + size,
|
||||||
|
size))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_MSG_protect_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_MSG_protect_with_certificate_and_key(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->expected = 1;
|
||||||
|
|
||||||
|
if (!TEST_ptr(fixture->msg =
|
||||||
|
OSSL_CMP_MSG_dup(ir_unprotected))
|
||||||
|
|| !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 0))
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, loadedkey))
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set1_clCert(fixture->cmp_ctx, cert))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_MSG_protect_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_MSG_protect_certificate_based_without_cert(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
OSSL_CMP_CTX *ctx = fixture->cmp_ctx;
|
||||||
|
|
||||||
|
fixture->expected = 0;
|
||||||
|
if (!TEST_ptr(fixture->msg =
|
||||||
|
OSSL_CMP_MSG_dup(ir_unprotected))
|
||||||
|
|| !TEST_true(SET_OPT_UNPROTECTED_SEND(ctx, 0))
|
||||||
|
|| !TEST_true(OSSL_CMP_CTX_set0_newPkey(ctx, 1, loadedkey))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EVP_PKEY_up_ref(loadedkey);
|
||||||
|
EXECUTE_TEST(execute_MSG_protect_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_MSG_protect_no_key_no_secret(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->expected = 0;
|
||||||
|
if (!TEST_ptr(fixture->msg = OSSL_CMP_MSG_dup(ir_unprotected))
|
||||||
|
|| !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 0))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_MSG_protect_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_MSG_add_extraCerts_test(CMP_PROTECT_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
return TEST_true(ossl_cmp_msg_add_extraCerts(fixture->cmp_ctx,
|
||||||
|
fixture->msg));
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_MSG_add_extraCerts(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
if (!TEST_ptr(fixture->msg = OSSL_CMP_MSG_dup(ir_protected))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_MSG_add_extraCerts_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_cmp_build_cert_chain_test(CMP_PROTECT_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
STACK_OF(X509) *result = NULL;
|
||||||
|
int ret = 0;
|
||||||
|
|
||||||
|
if (TEST_ptr(result = ossl_cmp_build_cert_chain(fixture->certs,
|
||||||
|
fixture->cert))) {
|
||||||
|
/* Check whether chain built is equal to the expected one */
|
||||||
|
ret = TEST_int_eq(0, STACK_OF_X509_cmp(result, fixture->chain));
|
||||||
|
sk_X509_pop_free(result, X509_free);
|
||||||
|
}
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_build_cert_chain(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->cert = endentity2;
|
||||||
|
if (!TEST_ptr(fixture->certs = sk_X509_new_null())
|
||||||
|
|| !TEST_ptr(fixture->chain = sk_X509_new_null())
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, endentity1))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, root))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, intermediate))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->chain, endentity2))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->chain, intermediate))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_cmp_build_cert_chain_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_build_cert_chain_missing_intermediate(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->cert = endentity2;
|
||||||
|
if (!TEST_ptr(fixture->certs = sk_X509_new_null())
|
||||||
|
|| !TEST_ptr(fixture->chain = sk_X509_new_null())
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, endentity1))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, root))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->chain, endentity2))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_cmp_build_cert_chain_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_build_cert_chain_missing_root(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->cert = endentity2;
|
||||||
|
if (!TEST_ptr(fixture->certs = sk_X509_new_null())
|
||||||
|
|| !TEST_ptr(fixture->chain = sk_X509_new_null())
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, endentity1))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, intermediate))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->chain, endentity2))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->chain, intermediate))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_cmp_build_cert_chain_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_cmp_build_cert_chain_no_certs(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->cert = endentity2;
|
||||||
|
if (!TEST_ptr(fixture->certs = sk_X509_new_null())
|
||||||
|
|| !TEST_ptr(fixture->chain = sk_X509_new_null())
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->chain, endentity2))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_cmp_build_cert_chain_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int execute_X509_STORE_test(CMP_PROTECT_TEST_FIXTURE *fixture)
|
||||||
|
{
|
||||||
|
X509_STORE *store = X509_STORE_new();
|
||||||
|
STACK_OF(X509) *sk = NULL;
|
||||||
|
int res = 0;
|
||||||
|
|
||||||
|
if (!TEST_true(ossl_cmp_X509_STORE_add1_certs(store,
|
||||||
|
fixture->certs,
|
||||||
|
fixture->callback_arg)))
|
||||||
|
goto err;
|
||||||
|
sk = ossl_cmp_X509_STORE_get1_certs(store);
|
||||||
|
if (!TEST_int_eq(0, STACK_OF_X509_cmp(sk, fixture->chain)))
|
||||||
|
goto err;
|
||||||
|
res = 1;
|
||||||
|
err:
|
||||||
|
X509_STORE_free(store);
|
||||||
|
sk_X509_pop_free(sk, X509_free);
|
||||||
|
return res;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_X509_STORE(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->callback_arg = 0; /* self-signed allowed */
|
||||||
|
if (!TEST_ptr(fixture->certs = sk_X509_new_null())
|
||||||
|
|| !sk_X509_push(fixture->certs, endentity1)
|
||||||
|
|| !sk_X509_push(fixture->certs, endentity2)
|
||||||
|
|| !sk_X509_push(fixture->certs, root)
|
||||||
|
|| !sk_X509_push(fixture->certs, intermediate)
|
||||||
|
|| !TEST_ptr(fixture->chain = sk_X509_dup(fixture->certs))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_X509_STORE_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int test_X509_STORE_only_self_signed(void)
|
||||||
|
{
|
||||||
|
SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up);
|
||||||
|
fixture->certs = sk_X509_new_null();
|
||||||
|
fixture->chain = sk_X509_new_null();
|
||||||
|
fixture->callback_arg = 1; /* only self-signed */
|
||||||
|
if (!TEST_true(sk_X509_push(fixture->certs, endentity1))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, endentity2))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, root))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->certs, intermediate))
|
||||||
|
|| !TEST_true(sk_X509_push(fixture->chain, root))) {
|
||||||
|
tear_down(fixture);
|
||||||
|
fixture = NULL;
|
||||||
|
}
|
||||||
|
EXECUTE_TEST(execute_X509_STORE_test, tear_down);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void cleanup_tests(void)
|
||||||
|
{
|
||||||
|
EVP_PKEY_free(loadedprivkey);
|
||||||
|
EVP_PKEY_free(loadedpubkey);
|
||||||
|
EVP_PKEY_free(loadedkey);
|
||||||
|
X509_free(cert);
|
||||||
|
X509_free(endentity1);
|
||||||
|
X509_free(endentity2);
|
||||||
|
X509_free(root);
|
||||||
|
X509_free(intermediate);
|
||||||
|
OSSL_CMP_MSG_free(ir_protected);
|
||||||
|
OSSL_CMP_MSG_free(ir_unprotected);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
int setup_tests(void)
|
||||||
|
{
|
||||||
|
char *server_f;
|
||||||
|
char *server_key_f;
|
||||||
|
char *server_cert_f;
|
||||||
|
char *endentity1_f;
|
||||||
|
char *endentity2_f;
|
||||||
|
char *root_f;
|
||||||
|
char *intermediate_f;
|
||||||
|
|
||||||
|
RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH);
|
||||||
|
if (!TEST_ptr(server_f = test_get_argument(0))
|
||||||
|
|| !TEST_ptr(ir_protected_f = test_get_argument(1))
|
||||||
|
|| !TEST_ptr(ir_unprotected_f = test_get_argument(2))
|
||||||
|
|| !TEST_ptr(ip_PBM_f = test_get_argument(3))
|
||||||
|
|| !TEST_ptr(server_cert_f = test_get_argument(4))
|
||||||
|
|| !TEST_ptr(server_key_f = test_get_argument(5))
|
||||||
|
|| !TEST_ptr(endentity1_f = test_get_argument(6))
|
||||||
|
|| !TEST_ptr(endentity2_f = test_get_argument(7))
|
||||||
|
|| !TEST_ptr(root_f = test_get_argument(8))
|
||||||
|
|| !TEST_ptr(intermediate_f = test_get_argument(9))) {
|
||||||
|
TEST_error("usage: cmp_protect_test server.pem "
|
||||||
|
"IR_protected.der IR_unprotected.der IP_PBM.der "
|
||||||
|
"server.crt server.pem"
|
||||||
|
"EndEntity1.crt EndEntity2.crt "
|
||||||
|
"Root_CA.crt Intermediate_CA.crt\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
if (!TEST_ptr(loadedkey = load_pem_key(server_key_f))
|
||||||
|
|| !TEST_ptr(cert = load_pem_cert(server_cert_f)))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (!TEST_ptr(loadedprivkey = load_pem_key(server_f)))
|
||||||
|
return 0;
|
||||||
|
if (TEST_true(EVP_PKEY_up_ref(loadedprivkey)))
|
||||||
|
loadedpubkey = loadedprivkey;
|
||||||
|
if (!TEST_ptr(ir_protected = load_pkimsg(ir_protected_f))
|
||||||
|
|| !TEST_ptr(ir_unprotected = load_pkimsg(ir_unprotected_f)))
|
||||||
|
return 0;
|
||||||
|
if (!TEST_ptr(endentity1 = load_pem_cert(endentity1_f))
|
||||||
|
|| !TEST_ptr(endentity2 = load_pem_cert(endentity2_f))
|
||||||
|
|| !TEST_ptr(root = load_pem_cert(root_f))
|
||||||
|
|| !TEST_ptr(intermediate = load_pem_cert(intermediate_f)))
|
||||||
|
return 0;
|
||||||
|
if (!TEST_int_eq(1, RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH)))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
/* Message protection tests */
|
||||||
|
ADD_TEST(test_cmp_calc_protection_no_key_no_secret);
|
||||||
|
ADD_TEST(test_cmp_calc_protection_pkey);
|
||||||
|
ADD_TEST(test_cmp_calc_protection_pbmac);
|
||||||
|
|
||||||
|
ADD_TEST(test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key);
|
||||||
|
ADD_TEST(test_MSG_protect_with_certificate_and_key);
|
||||||
|
ADD_TEST(test_MSG_protect_certificate_based_without_cert);
|
||||||
|
ADD_TEST(test_MSG_protect_unprotected_request);
|
||||||
|
ADD_TEST(test_MSG_protect_no_key_no_secret);
|
||||||
|
|
||||||
|
ADD_TEST(test_MSG_add_extraCerts);
|
||||||
|
|
||||||
|
ADD_TEST(test_cmp_build_cert_chain);
|
||||||
|
ADD_TEST(test_cmp_build_cert_chain_missing_root);
|
||||||
|
ADD_TEST(test_cmp_build_cert_chain_missing_intermediate);
|
||||||
|
ADD_TEST(test_cmp_build_cert_chain_no_certs);
|
||||||
|
|
||||||
|
ADD_TEST(test_X509_STORE);
|
||||||
|
ADD_TEST(test_X509_STORE_only_self_signed);
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
24
test/recipes/65-test_cmp_msg.t
Normal file
24
test/recipes/65-test_cmp_msg.t
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
#! /usr/bin/env perl
|
||||||
|
# Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
# Copyright Nokia 2007-2019
|
||||||
|
# Copyright Siemens AG 2015-2019
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
# this file except in compliance with the License. You can obtain a copy
|
||||||
|
# in the file LICENSE in the source distribution or at
|
||||||
|
# https://www.openssl.org/source/license.html
|
||||||
|
|
||||||
|
use strict;
|
||||||
|
use OpenSSL::Test qw/:DEFAULT data_file/;
|
||||||
|
use OpenSSL::Test::Utils;
|
||||||
|
|
||||||
|
setup("test_cmp_msg");
|
||||||
|
|
||||||
|
plan skip_all => "This test is not supported in a no-cmp build"
|
||||||
|
if disabled("cmp");
|
||||||
|
|
||||||
|
plan tests => 1;
|
||||||
|
|
||||||
|
ok(run(test(["cmp_msg_test",
|
||||||
|
data_file("server.crt"),
|
||||||
|
data_file("pkcs10.der")])));
|
BIN
test/recipes/65-test_cmp_msg_data/pkcs10.der
Normal file
BIN
test/recipes/65-test_cmp_msg_data/pkcs10.der
Normal file
Binary file not shown.
17
test/recipes/65-test_cmp_msg_data/server.crt
Normal file
17
test/recipes/65-test_cmp_msg_data/server.crt
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICpTCCAY2gAwIBAgIBATANBgkqhkiG9w0BAQUFADAWMRQwEgYDVQQKDAtvcGVu
|
||||||
|
c3NsX2NtcDAeFw0xNzEyMjAxMzA0MDBaFw0xODEyMjAxMzA0MDBaMBYxFDASBgNV
|
||||||
|
BAoMC29wZW5zc2xfY21wMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
|
||||||
|
4ckRrH0UWmIJFj99kBqvCipGjJRAaPkdvWjdDQLglTpI3eZAJHnq0ypW/PZccrWj
|
||||||
|
o7mxuvAStEYWF+5Jx6ZFmAsC1K0NNebSAZQoLWYZqiOzkfVVpLicMnItNFElfCoh
|
||||||
|
BzPCYmF5UlC5yp9PSUEfNwPJqDIRMtw+IlVUV3AJw9TJ3uuWq/vWW9r96/gBKKdd
|
||||||
|
mj/q2gGT8RC6LxEaolTbhfPbHaA1DFpv1WQFb3oAV3Wq14SOZf9bH1olBVsmBMsU
|
||||||
|
shFEw5MXVrNCv2moM4HtITMyjvZe7eIwHzSzf6dvQjERG6GvZ/i5KOhaqgJCnRKd
|
||||||
|
HHzijz9cLec5p9NSOuC1OwIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQDGUXpFCBkV
|
||||||
|
WgPrBfZyBwt6VCjWB/e67q4IdcKMfDa4hwSquah1AyXHI0PlC/qitnoSx2+7f7pY
|
||||||
|
TEOay/3eEPUl1J5tdPF2Vg56Dw8jdhSkMwO7bXKDEE3R6o6jaa4ECgxwQtdGHmNU
|
||||||
|
A41PgKX76yEXku803ptO39/UR7i7Ye3MbyAmWE+PvixJYUbxd3fqz5fsaJqTCzAy
|
||||||
|
AT9hrr4uu8J7m3LYaYXo4LVL4jw5UsP5bIYtpmmEBfy9GhpUqH5/LzBNij7y3ziE
|
||||||
|
T59wHkzawAQDHsBPuCe07DFtlzqWWvaih0TQAw9MZ2tbyK9jt7P80Rqt9CwpM/i9
|
||||||
|
jQYqSl/ix5hn
|
||||||
|
-----END CERTIFICATE-----
|
35
test/recipes/65-test_cmp_protect.t
Normal file
35
test/recipes/65-test_cmp_protect.t
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
#! /usr/bin/env perl
|
||||||
|
# Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
# Copyright Nokia 2007-2019
|
||||||
|
# Copyright Siemens AG 2015-2019
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
# this file except in compliance with the License. You can obtain a copy
|
||||||
|
# in the file LICENSE in the source distribution or at
|
||||||
|
# https://www.openssl.org/source/license.html
|
||||||
|
|
||||||
|
use strict;
|
||||||
|
use OpenSSL::Test qw/:DEFAULT data_file/;
|
||||||
|
use OpenSSL::Test::Utils;
|
||||||
|
|
||||||
|
setup("test_cmp_protect");
|
||||||
|
|
||||||
|
plan skip_all => "This test is not supported in a no-cmp build"
|
||||||
|
if disabled("cmp");
|
||||||
|
|
||||||
|
plan skip_all => "This test is not supported in a shared library build on Windows"
|
||||||
|
if $^O eq 'MSWin32' && !disabled("shared");
|
||||||
|
|
||||||
|
plan tests => 1;
|
||||||
|
|
||||||
|
ok(run(test(["cmp_protect_test",
|
||||||
|
data_file("server.pem"),
|
||||||
|
data_file("IR_protected.der"),
|
||||||
|
data_file("IR_unprotected.der"),
|
||||||
|
data_file("IP_PBM.der"),
|
||||||
|
data_file("server.crt"),
|
||||||
|
data_file("server.pem"),
|
||||||
|
data_file("EndEntity1.crt"),
|
||||||
|
data_file("EndEntity2.crt"),
|
||||||
|
data_file("Root_CA.crt"),
|
||||||
|
data_file("Intermediate_CA.crt")])));
|
16
test/recipes/65-test_cmp_protect_data/EndEntity1.crt
Normal file
16
test/recipes/65-test_cmp_protect_data/EndEntity1.crt
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICnDCCAYSgAwIBAgIBAzANBgkqhkiG9w0BAQUFADASMRAwDgYDVQQDEwdSb290
|
||||||
|
IENBMB4XDTE3MTEwODE1NDgwMFoXDTE4MTEwODExMTkwMFowETEPMA0GA1UEAxMG
|
||||||
|
Q2xpZW50MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtNiWJufEotHe
|
||||||
|
p6E/4b0laX7K1NRamNoUokLIsq78RoBieBXaGxIdbT6zmhLnLmZdb0UN3v7FUP75
|
||||||
|
rqPN2yyj3TbS4o5ilh5El8bDDAPhW5lthCddvH/uBziRAM5oIB4xxOumNbgHpLUT
|
||||||
|
Clh49sdXd4ydYpCTWld5emRouBmMUeP/0EkyWMBIrHGSBxrqtFVRXhxvVHImQv6Z
|
||||||
|
hIKql7dCVCZbhUtxw6sLxIGL4xlhKoM2o31k4I/9tjZrWSZZ7KAIOlOLrjxZc/bQ
|
||||||
|
MwvxVUgS+C+iXzhCY8v+N/K37jwtAAk4C1aOGv/VygNcN0C/ynfKSzFmtnfei4+3
|
||||||
|
6GC7HtFzewIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQB3GYpPSCCYsJM5owKcODr/
|
||||||
|
I1aJ8jQ+u5jCKjvYLp6Cnbr4AbRXzvKuMyV6UfIAQbrGOxAClvX++5/ZQbhY+TxN
|
||||||
|
iiUM3yr5yYCLqj4MeYHhJ3gOzcppAO9LQ9V7eA8C830giZMm3cpApFSLP8CpwNUD
|
||||||
|
W/fgoQfaOae5IYPZdea88Gmt5RVNbtHgVqtm4ifTQo577kfxTeh20s+M6pgYW3/R
|
||||||
|
vftXy2ITEtk/j3NcRvOyZ7Bu1mAg7wNeUjL+gDWAaxs16LsWsCsUGwfr/Z2Rq1CF
|
||||||
|
zB0XwIyigkVLDLqDzUShcw0Eb/zYy2KXsxNWA2tb27mw+T+tmmOszpn7JjLrlVks
|
||||||
|
-----END CERTIFICATE-----
|
13
test/recipes/65-test_cmp_protect_data/EndEntity2.crt
Normal file
13
test/recipes/65-test_cmp_protect_data/EndEntity2.crt
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIB3zCCAZSgAwIBAgIBBjAKBggqhkjOPQQDAzAVMRMwEQYDVQQDEwpad2lzY2hl
|
||||||
|
bkNBMB4XDTE3MTEwODE2MDUwMFoXDTE4MTEwODExMTkwMFowEjEQMA4GA1UEAxMH
|
||||||
|
Q2xpZW50MjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALTYlibnxKLR
|
||||||
|
3qehP+G9JWl+ytTUWpjaFKJCyLKu/EaAYngV2hsSHW0+s5oS5y5mXW9FDd7+xVD+
|
||||||
|
+a6jzdsso9020uKOYpYeRJfGwwwD4VuZbYQnXbx/7gc4kQDOaCAeMcTrpjW4B6S1
|
||||||
|
EwpYePbHV3eMnWKQk1pXeXpkaLgZjFHj/9BJMljASKxxkgca6rRVUV4cb1RyJkL+
|
||||||
|
mYSCqpe3QlQmW4VLccOrC8SBi+MZYSqDNqN9ZOCP/bY2a1kmWeygCDpTi648WXP2
|
||||||
|
0DML8VVIEvgvol84QmPL/jfyt+48LQAJOAtWjhr/1coDXDdAv8p3yksxZrZ33ouP
|
||||||
|
t+hgux7Rc3sCAwEAAaMNMAswCQYDVR0TBAIwADAKBggqhkjOPQQDAwM5ADA2AhkA
|
||||||
|
qASBLwTauET6FGp/EBe7b/99jTyGB861AhkA5ILGkLX4KmjRkTcNxJ3JKB1Sumya
|
||||||
|
cbqF
|
||||||
|
-----END CERTIFICATE-----
|
BIN
test/recipes/65-test_cmp_protect_data/IP_PBM.der
Normal file
BIN
test/recipes/65-test_cmp_protect_data/IP_PBM.der
Normal file
Binary file not shown.
1
test/recipes/65-test_cmp_protect_data/IP_PBM.txt
Normal file
1
test/recipes/65-test_cmp_protect_data/IP_PBM.txt
Normal file
@ -0,0 +1 @@
|
|||||||
|
Reference#: 3078Secret Value: insta
|
BIN
test/recipes/65-test_cmp_protect_data/IR_protected.der
Normal file
BIN
test/recipes/65-test_cmp_protect_data/IR_protected.der
Normal file
Binary file not shown.
BIN
test/recipes/65-test_cmp_protect_data/IR_unprotected.der
Normal file
BIN
test/recipes/65-test_cmp_protect_data/IR_unprotected.der
Normal file
Binary file not shown.
12
test/recipes/65-test_cmp_protect_data/Intermediate_CA.crt
Normal file
12
test/recipes/65-test_cmp_protect_data/Intermediate_CA.crt
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIB1jCBv6ADAgECAgEFMA0GCSqGSIb3DQEBDQUAMBIxEDAOBgNVBAMTB1Jvb3Qg
|
||||||
|
Q0EwHhcNMTcxMTA4MTYwNDAwWhcNMTgxMTA4MTExOTAwWjAVMRMwEQYDVQQDEwpa
|
||||||
|
d2lzY2hlbkNBMEkwEwYHKoZIzj0CAQYIKoZIzj0DAQEDMgAE9bJcmZWj2CmO6aW8
|
||||||
|
9Qylkj1WgPREf9/s4Z1VYqFODeJnebPXFBLVH/aoGxnds9E9oxAwDjAMBgNVHRME
|
||||||
|
BTADAQH/MA0GCSqGSIb3DQEBDQUAA4IBAQBwQD4NTIWMMevEsSrBpKjjQEWc81Ct
|
||||||
|
eXoyAXr/d8wgVyuIZe9C7ekxPQCwowcmONUyeYQv9N2eYpdhkAQuk6DS4+aDR4s7
|
||||||
|
I6rg5R5CUGGla5NUxM0BKIS3ZIezvEGlP1NFN+HBgJI7ZIIYQ3zDr0EYgo4J7Xvm
|
||||||
|
5p58pcCZSsbVyKwKs6T+rTzOVVmJ2L1bWzywZEDmzxMkPmA6fP9XtB4Kx/b4oviw
|
||||||
|
TEQl3Jf9EkBvBkKX2rRJs7aMJo4MwOnE4HHOV5GAQqhGrXltsuXmVfIQPtRN4xlK
|
||||||
|
oNf/FukI1NcBh4A/iY4PmbyxHYmKy6qjFjng2u2VFtH15HDT4XlLP5gq
|
||||||
|
-----END CERTIFICATE-----
|
17
test/recipes/65-test_cmp_protect_data/Root_CA.crt
Normal file
17
test/recipes/65-test_cmp_protect_data/Root_CA.crt
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICrzCCAZegAwIBAgIBATANBgkqhkiG9w0BAQUFADASMRAwDgYDVQQDEwdSb290
|
||||||
|
IENBMB4XDTE3MTEwODE1NDUwMFoXDTE4MTEwODExMTkwMFowEjEQMA4GA1UEAxMH
|
||||||
|
Um9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALiHdLAD2Wu+
|
||||||
|
C5UDMK6WCL53Wz0CeU61RRRlGEVSqHrQOWnffgVutgftzsddxxgJJyGsqKo1B+nQ
|
||||||
|
vapyJyugYJWYNQLN5+iffe4y1UBPnHMQFHiZ4cNR6PB0eHja2wpcN3QmJzOcpRYE
|
||||||
|
xf+QQwJNFqhRi0cZGfd/JfFi/ybJalqClbnYMPcJo7g6S7M3lWbOnEOUWnbM2EBp
|
||||||
|
h849mC+kd80vXcRcb7U/3MJKK3Ee72TDye5/kWFf9zcxj2ac0oCiS66JKYobiVJr
|
||||||
|
NmbGM0I9U6T6ejXVUu2J3pGUFlcf3RCUYf1aWhkmzEzbm/FGMRJ7vVyCXm/OWIh9
|
||||||
|
bqtwH5YfljsCAwEAAaMQMA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOC
|
||||||
|
AQEAF7tSa9oVan7kPR5/TXB330Ca1xQt5C38afaJbacR9mM8ZkL0HceQTuJGrnAR
|
||||||
|
4kK7CaB5iraU6Lxyql7drq8aixz/7TXna6c172J6HxDeFhQMeSt1LAh7XN5Ir6Y6
|
||||||
|
iO7XD5I5lw3Xv6qvhoD0ktkNk/WtF7aBw2ZAi+RcDMgWzWjoS4WqMbvWEHw10j9b
|
||||||
|
s8R0YG4yi6wb89UNIMfQtC2XviHKcRS9MzIJQHw73r2EY2t6o9TO+5ukHYDB6/Zo
|
||||||
|
/CLXu21MzsFvhupHgX6zdptU324tq2za1+4LvmOHSW+D36jEPT22SndXmHo5VmAn
|
||||||
|
6bQ52MhBI0rrWwju9aBpVzsUUg==
|
||||||
|
-----END CERTIFICATE-----
|
17
test/recipes/65-test_cmp_protect_data/server.crt
Normal file
17
test/recipes/65-test_cmp_protect_data/server.crt
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICpTCCAY2gAwIBAgIBATANBgkqhkiG9w0BAQUFADAWMRQwEgYDVQQKDAtvcGVu
|
||||||
|
c3NsX2NtcDAeFw0xNzEyMjAxMzA0MDBaFw0xODEyMjAxMzA0MDBaMBYxFDASBgNV
|
||||||
|
BAoMC29wZW5zc2xfY21wMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
|
||||||
|
4ckRrH0UWmIJFj99kBqvCipGjJRAaPkdvWjdDQLglTpI3eZAJHnq0ypW/PZccrWj
|
||||||
|
o7mxuvAStEYWF+5Jx6ZFmAsC1K0NNebSAZQoLWYZqiOzkfVVpLicMnItNFElfCoh
|
||||||
|
BzPCYmF5UlC5yp9PSUEfNwPJqDIRMtw+IlVUV3AJw9TJ3uuWq/vWW9r96/gBKKdd
|
||||||
|
mj/q2gGT8RC6LxEaolTbhfPbHaA1DFpv1WQFb3oAV3Wq14SOZf9bH1olBVsmBMsU
|
||||||
|
shFEw5MXVrNCv2moM4HtITMyjvZe7eIwHzSzf6dvQjERG6GvZ/i5KOhaqgJCnRKd
|
||||||
|
HHzijz9cLec5p9NSOuC1OwIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQDGUXpFCBkV
|
||||||
|
WgPrBfZyBwt6VCjWB/e67q4IdcKMfDa4hwSquah1AyXHI0PlC/qitnoSx2+7f7pY
|
||||||
|
TEOay/3eEPUl1J5tdPF2Vg56Dw8jdhSkMwO7bXKDEE3R6o6jaa4ECgxwQtdGHmNU
|
||||||
|
A41PgKX76yEXku803ptO39/UR7i7Ye3MbyAmWE+PvixJYUbxd3fqz5fsaJqTCzAy
|
||||||
|
AT9hrr4uu8J7m3LYaYXo4LVL4jw5UsP5bIYtpmmEBfy9GhpUqH5/LzBNij7y3ziE
|
||||||
|
T59wHkzawAQDHsBPuCe07DFtlzqWWvaih0TQAw9MZ2tbyK9jt7P80Rqt9CwpM/i9
|
||||||
|
jQYqSl/ix5hn
|
||||||
|
-----END CERTIFICATE-----
|
27
test/recipes/65-test_cmp_protect_data/server.pem
Normal file
27
test/recipes/65-test_cmp_protect_data/server.pem
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIIEowIBAAKCAQEA4ckRrH0UWmIJFj99kBqvCipGjJRAaPkdvWjdDQLglTpI3eZA
|
||||||
|
JHnq0ypW/PZccrWjo7mxuvAStEYWF+5Jx6ZFmAsC1K0NNebSAZQoLWYZqiOzkfVV
|
||||||
|
pLicMnItNFElfCohBzPCYmF5UlC5yp9PSUEfNwPJqDIRMtw+IlVUV3AJw9TJ3uuW
|
||||||
|
q/vWW9r96/gBKKddmj/q2gGT8RC6LxEaolTbhfPbHaA1DFpv1WQFb3oAV3Wq14SO
|
||||||
|
Zf9bH1olBVsmBMsUshFEw5MXVrNCv2moM4HtITMyjvZe7eIwHzSzf6dvQjERG6Gv
|
||||||
|
Z/i5KOhaqgJCnRKdHHzijz9cLec5p9NSOuC1OwIDAQABAoIBAGiYVO+rIfqc38jG
|
||||||
|
sMxJED2NSBFnvE7k2LoeEgktBA0daxQgziYXtIkOXC3jkwAw1RXLuGH5RTDuJt3/
|
||||||
|
LX6nsCW3NCCB6lTGERNaJyKg4dLHpzA+juY3/2P/MKHD1bGncpV7jNk2fpV7gBY1
|
||||||
|
pu0wld1Oi+S3DPCaxs3w6Zl39Y4Z7oSNf6DRO5lGN3Asc8TSVjIOWpAl8LIg+P2B
|
||||||
|
ZvFeHRANVXaV9YmF2uEi7iMgH4vGrK2svsmM9VThVO4ArGcTRTvGYn7aw3/H4Pt+
|
||||||
|
lYuhERdpkKBT0tCgIpO5IJXMl4/5RSDTtcBwiJcReN5IHUAItBIPSHcMflNSKG/I
|
||||||
|
aQf4u0ECgYEA8+PAyzn096Y2UrKzE75yuadCveLjsUWx2NN5ZMohQru99F4k7Pab
|
||||||
|
/Te4qOe5zlxHAPK3LRwvbwUWo5mLfs45wFrSgZoRlYcCuL+JaX0y2oXMMF9E+UkY
|
||||||
|
tljMt/HpLo1SfSjN2Sae4LVhC7rWJ43LtyRepptzBPGqd26eLPGAMr8CgYEA7P8u
|
||||||
|
RGkMOrMzEKAb0A9smrzq2xW88T1VejqEt6R8mUcNt8PFHMgjuzVU4zDysrlb7G/0
|
||||||
|
VSkQWnJxBh1yNGc1Av7YgwicIgApr4ty0hZhLcnKX2VrNw+L/sSe/cnwVAc6RtPK
|
||||||
|
RR6xQubuLlrCGcbYXmyn5Jv+nlY0S3uCyDFHqIUCgYAwtpLxhJf7RwWeqva9wNJl
|
||||||
|
ZpUcHE9iPwtwxXx/tyfBjoI4Zv11HyS1BQYrJm2kXCYKeHBB4FlREXEeKDMGluZO
|
||||||
|
F1XocP+GIDtY71jg6xLXNtY76yt5pzH6ae4p53WtyKhrO1UyRFaDh3bkwuK3b8j6
|
||||||
|
wZbuLCpjGGn2BPAvBeWXPQKBgEewKN6op/pZmmi9Bay5/bAQ1TnQKYcPdnuyl9K0
|
||||||
|
/ruespeTsFw0bhqC11qhw8gsKZIri0z3TusNEwM2hQU08uQlEnkQcaoXQoTHOcQy
|
||||||
|
4NJo575Tf0r4ePBnqXA7VWcViJtEFTszPYtvLzz2VyBU9b4aP+73AN4EVW0/vx+v
|
||||||
|
SG3BAoGBAMzESFA2TXwUFmozK5zowIszc995Xqpi7mXKk77WESOpoS1dQ1wF1dSg
|
||||||
|
XOwxzFoYovLxcc1K9lqOrod8BV+qGuEfc/PIJ2aiXjvEDeZYX2eWaANNmj4OSLoJ
|
||||||
|
MNYj9tZxbq56slD7snf7AgUBnwKz0Pj6H6UsbE3gdJqZWCDyw/bB
|
||||||
|
-----END RSA PRIVATE KEY-----
|
@ -4910,3 +4910,4 @@ d2i_X509_PUBKEY_bio ? 3_0_0 EXIST::FUNCTION:
|
|||||||
i2d_X509_PUBKEY_bio ? 3_0_0 EXIST::FUNCTION:
|
i2d_X509_PUBKEY_bio ? 3_0_0 EXIST::FUNCTION:
|
||||||
RSA_get0_pss_params ? 3_0_0 EXIST::FUNCTION:RSA
|
RSA_get0_pss_params ? 3_0_0 EXIST::FUNCTION:RSA
|
||||||
X509_cmp_timeframe ? 3_0_0 EXIST::FUNCTION:
|
X509_cmp_timeframe ? 3_0_0 EXIST::FUNCTION:
|
||||||
|
OSSL_CMP_MSG_get0_header ? 3_0_0 EXIST::FUNCTION:CMP
|
||||||
|
@ -348,6 +348,8 @@ OSSL_CMP_LOG_ERR define
|
|||||||
OSSL_CMP_LOG_INFO define
|
OSSL_CMP_LOG_INFO define
|
||||||
OSSL_CMP_LOG_NOTICE define
|
OSSL_CMP_LOG_NOTICE define
|
||||||
OSSL_CMP_LOG_WARNING define
|
OSSL_CMP_LOG_WARNING define
|
||||||
|
OSSL_CMP_MSTR_HELPER define
|
||||||
|
OSSL_CMP_MSTR define
|
||||||
OSSL_CMP_alert define
|
OSSL_CMP_alert define
|
||||||
OSSL_CMP_debug define
|
OSSL_CMP_debug define
|
||||||
OSSL_CMP_err define
|
OSSL_CMP_err define
|
||||||
|
Loading…
x
Reference in New Issue
Block a user