2 * Copyright 2017-2020 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
12 #include <openssl/opensslconf.h>
13 #include <openssl/crypto.h>
14 #include <openssl/ocsp.h>
15 #include <openssl/x509.h>
16 #include <openssl/asn1.h>
17 #include <openssl/pem.h>
23 static const char *certstr;
24 static const char *privkeystr;
26 #ifndef OPENSSL_NO_OCSP
27 static int get_cert_and_key(X509 **cert_out, EVP_PKEY **key_out)
29 BIO *certbio, *keybio;
33 if (!TEST_ptr(certbio = BIO_new_file(certstr, "r")))
35 cert = PEM_read_bio_X509(certbio, NULL, NULL, NULL);
37 if (!TEST_ptr(keybio = BIO_new_file(privkeystr, "r")))
39 key = PEM_read_bio_PrivateKey(keybio, NULL, NULL, NULL);
41 if (!TEST_ptr(cert) || !TEST_ptr(key))
52 static int get_cert(X509 **cert_out)
57 if (!TEST_ptr(certbio = BIO_new_file(certstr, "r")))
59 cert = PEM_read_bio_X509(certbio, NULL, NULL, NULL);
70 static OCSP_BASICRESP *make_dummy_resp(void)
72 const unsigned char namestr[] = "openssl.example.com";
73 unsigned char keybytes[128] = {7};
74 OCSP_BASICRESP *bs = OCSP_BASICRESP_new();
75 OCSP_BASICRESP *bs_out = NULL;
76 OCSP_CERTID *cid = NULL;
77 ASN1_TIME *thisupd = ASN1_TIME_set(NULL, time(NULL));
78 ASN1_TIME *nextupd = ASN1_TIME_set(NULL, time(NULL) + 200);
79 X509_NAME *name = X509_NAME_new();
80 ASN1_BIT_STRING *key = ASN1_BIT_STRING_new();
81 ASN1_INTEGER *serial = ASN1_INTEGER_new();
83 if (!X509_NAME_add_entry_by_NID(name, NID_commonName, MBSTRING_ASC,
85 || !ASN1_BIT_STRING_set(key, keybytes, sizeof(keybytes))
86 || !ASN1_INTEGER_set_uint64(serial, (uint64_t)1))
88 cid = OCSP_cert_id_new(EVP_sha256(), name, key, serial);
93 || !TEST_true(OCSP_basic_add1_status(bs, cid,
94 V_OCSP_CERTSTATUS_UNKNOWN,
95 0, NULL, thisupd, nextupd)))
100 ASN1_TIME_free(thisupd);
101 ASN1_TIME_free(nextupd);
102 ASN1_BIT_STRING_free(key);
103 ASN1_INTEGER_free(serial);
104 OCSP_CERTID_free(cid);
105 OCSP_BASICRESP_free(bs);
106 X509_NAME_free(name);
110 static int test_resp_signer(void)
112 OCSP_BASICRESP *bs = NULL;
113 X509 *signer = NULL, *tmp;
114 EVP_PKEY *key = NULL;
115 STACK_OF(X509) *extra_certs = NULL;
119 * Test a response with no certs at all; get the signer from the
120 * extra certs given to OCSP_resp_get0_signer().
122 bs = make_dummy_resp();
123 extra_certs = sk_X509_new_null();
125 || !TEST_ptr(extra_certs)
126 || !TEST_true(get_cert_and_key(&signer, &key))
127 || !TEST_true(sk_X509_push(extra_certs, signer))
128 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
129 NULL, OCSP_NOCERTS)))
131 if (!TEST_true(OCSP_resp_get0_signer(bs, &tmp, extra_certs))
132 || !TEST_int_eq(X509_cmp(tmp, signer), 0))
134 OCSP_BASICRESP_free(bs);
136 /* Do it again but include the signer cert */
137 bs = make_dummy_resp();
140 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
143 if (!TEST_true(OCSP_resp_get0_signer(bs, &tmp, NULL))
144 || !TEST_int_eq(X509_cmp(tmp, signer), 0))
148 OCSP_BASICRESP_free(bs);
149 sk_X509_free(extra_certs);
155 static int test_access_description(int testcase)
157 ACCESS_DESCRIPTION *ad = ACCESS_DESCRIPTION_new();
164 case 0: /* no change */
166 case 1: /* check and release current location */
167 if (!TEST_ptr(ad->location))
169 GENERAL_NAME_free(ad->location);
172 case 2: /* replace current location */
173 GENERAL_NAME_free(ad->location);
174 ad->location = GENERAL_NAME_new();
175 if (!TEST_ptr(ad->location))
179 ACCESS_DESCRIPTION_free(ad);
185 static int test_ocsp_url_svcloc_new(void)
187 static const char *urls[] = {
194 X509_EXTENSION * ext = NULL;
197 if (!TEST_true(get_cert(&issuer)))
201 * Test calling this ocsp method to catch any memory leak
203 ext = OCSP_url_svcloc_new(X509_get_issuer_name(issuer), urls);
207 X509_EXTENSION_free(ext);
214 #endif /* OPENSSL_NO_OCSP */
216 OPT_TEST_DECLARE_USAGE("certfile privkeyfile\n")
218 int setup_tests(void)
220 if (!test_skip_common_options()) {
221 TEST_error("Error parsing test options\n");
225 if (!TEST_ptr(certstr = test_get_argument(0))
226 || !TEST_ptr(privkeystr = test_get_argument(1)))
228 #ifndef OPENSSL_NO_OCSP
229 ADD_TEST(test_resp_signer);
230 ADD_ALL_TESTS(test_access_description, 3);
231 ADD_TEST(test_ocsp_url_svcloc_new);