diff options
Diffstat (limited to 'test/recipes/80-test_ca.t')
| -rw-r--r-- | test/recipes/80-test_ca.t | 286 |
1 files changed, 286 insertions, 0 deletions
diff --git a/test/recipes/80-test_ca.t b/test/recipes/80-test_ca.t new file mode 100644 index 000000000000..c477df3929e7 --- /dev/null +++ b/test/recipes/80-test_ca.t @@ -0,0 +1,286 @@ +#! /usr/bin/env perl +# Copyright 2015-2025 The OpenSSL Project Authors. All Rights Reserved. +# +# Licensed under the Apache License 2.0 (the "License"). You may not use +# this file except in compliance with the License. You can obtain a copy +# in the file LICENSE in the source distribution or at +# https://www.openssl.org/source/license.html + + +use strict; +use warnings; + +use POSIX; +use File::Path 2.00 qw/rmtree/; +use OpenSSL::Test qw/:DEFAULT cmdstr data_file srctop_file/; +use OpenSSL::Test::Utils; +use Time::Local qw/timegm/; + +setup("test_ca"); + +$ENV{OPENSSL} = cmdstr(app(["openssl"]), display => 1); + +my $cnf = srctop_file("test","ca-and-certs.cnf"); +my $std_openssl_cnf = srctop_file("apps", $^O eq "VMS" ? "openssl-vms.cnf" : "openssl.cnf"); + +rmtree("demoCA", { safe => 0 }); + +plan tests => 15; + SKIP: { + my $cakey = srctop_file("test", "certs", "ca-key.pem"); + $ENV{OPENSSL_CONFIG} = qq(-config "$cnf"); + skip "failed creating CA structure", 4 + if !ok(run(perlapp(["CA.pl","-newca", + "-extra-req", qq{-key "$cakey"}], stdin => undef)), + 'creating CA structure'); + + my $eekey = srctop_file("test", "certs", "ee-key.pem"); + $ENV{OPENSSL_CONFIG} = qq(-config "$cnf"); + skip "failed creating new certificate request", 3 + if !ok(run(perlapp(["CA.pl","-newreq", + '-extra-req', qq{-outform DER -section userreq -key "$eekey"}])), + 'creating certificate request'); + $ENV{OPENSSL_CONFIG} = qq(-rand_serial -inform DER -config "$std_openssl_cnf"); + skip "failed to sign certificate request", 2 + if !is(yes(cmdstr(perlapp(["CA.pl", "-sign"]))), 0, + 'signing certificate request'); + + ok(run(perlapp(["CA.pl", "-verify", "newcert.pem"])), + 'verifying new certificate'); + + skip "CT not configured, can't use -precert", 1 + if disabled("ct"); + + my $eekey2 = srctop_file("test", "certs", "ee-key-3072.pem"); + $ENV{OPENSSL_CONFIG} = qq(-config "$cnf"); + ok(run(perlapp(["CA.pl", "-precert", + '-extra-req', qq{-section userreq -key "$eekey2"}], stderr => undef)), + 'creating new pre-certificate'); +} + +SKIP: { + skip "SM2 is not supported by this OpenSSL build", 1 + if disabled("sm2"); + + is(yes(cmdstr(app(["openssl", "ca", "-config", + $cnf, + "-in", srctop_file("test", "certs", "sm2-csr.pem"), + "-out", "sm2-test.crt", + "-sigopt", "distid:1234567812345678", + "-vfyopt", "distid:1234567812345678", + "-md", "sm3", + "-cert", srctop_file("test", "certs", "sm2-root.crt"), + "-keyfile", srctop_file("test", "certs", "sm2-root.key")]))), + 0, + "Signing SM2 certificate request"); +} + +test_revoke('notimes', { + should_succeed => 1, +}); +test_revoke('lastupdate_invalid', { + lastupdate => '1234567890', + should_succeed => 0, +}); +test_revoke('lastupdate_utctime', { + lastupdate => '200901123456Z', + should_succeed => 1, +}); +test_revoke('lastupdate_generalizedtime', { + lastupdate => '20990901123456Z', + should_succeed => 1, +}); +test_revoke('nextupdate_invalid', { + nextupdate => '1234567890', + should_succeed => 0, +}); +test_revoke('nextupdate_utctime', { + nextupdate => '200901123456Z', + should_succeed => 1, +}); +test_revoke('nextupdate_generalizedtime', { + nextupdate => '20990901123456Z', + should_succeed => 1, +}); +test_revoke('both_utctime', { + lastupdate => '200901123456Z', + nextupdate => '200908123456Z', + should_succeed => 1, +}); +test_revoke('both_generalizedtime', { + lastupdate => '20990901123456Z', + nextupdate => '20990908123456Z', + should_succeed => 1, +}); + +sub test_revoke { + my ($filename, $opts) = @_; + + subtest "Revoke certificate and generate CRL: $filename" => sub { + # Before Perl 5.12.0, the range of times Perl could represent was + # limited by the size of time_t, so Time::Local was hamstrung by the + # Y2038 problem + # Perl 5.12.0 onwards use an internal time implementation with a + # guaranteed >32-bit time range on all architectures, so the tests + # involving post-2038 times won't fail provided we're running under + # that version or newer + plan skip_all => + 'Perl >= 5.12.0 required to run certificate revocation tests' + if $] < 5.012000; + + $ENV{CN2} = $filename; + ok( + run(app(['openssl', + 'req', + '-config', $cnf, + '-new', + '-key', data_file('revoked.key'), + '-out', "$filename-req.pem", + '-section', 'userreq', + ])), + 'Generate CSR' + ); + delete $ENV{CN2}; + + ok( + run(app(['openssl', + 'ca', + '-batch', + '-config', $cnf, + '-in', "$filename-req.pem", + '-out', "$filename-cert.pem", + ])), + 'Sign CSR' + ); + + ok( + run(app(['openssl', + 'ca', + '-config', $cnf, + '-revoke', "$filename-cert.pem", + ])), + 'Revoke certificate' + ); + + my @gencrl_opts; + + if (exists $opts->{lastupdate}) { + push @gencrl_opts, '-crl_lastupdate', $opts->{lastupdate}; + } + + if (exists $opts->{nextupdate}) { + push @gencrl_opts, '-crl_nextupdate', $opts->{nextupdate}; + } + + is( + run(app(['openssl', + 'ca', + '-config', $cnf, + '-gencrl', + '-out', "$filename-crl.pem", + '-crlsec', '60', + @gencrl_opts, + ])), + $opts->{should_succeed}, + 'Generate CRL' + ); + my $crl_gentime = time; + + # The following tests only need to run if the CRL was supposed to be + # generated: + return unless $opts->{should_succeed}; + + my $crl_lastupdate = crl_field("$filename-crl.pem", 'lastUpdate'); + if (exists $opts->{lastupdate}) { + is( + $crl_lastupdate, + rfc5280_time($opts->{lastupdate}), + 'CRL lastUpdate field has expected value' + ); + } else { + diag("CRL lastUpdate: $crl_lastupdate"); + diag("openssl run time: $crl_gentime"); + ok( + # Is the CRL's lastUpdate time within a second of the time that + # `openssl ca -gencrl` was executed? + $crl_gentime - 1 <= $crl_lastupdate && $crl_lastupdate <= $crl_gentime + 1, + 'CRL lastUpdate field has (roughly) expected value' + ); + } + + my $crl_nextupdate = crl_field("$filename-crl.pem", 'nextUpdate'); + if (exists $opts->{nextupdate}) { + is( + $crl_nextupdate, + rfc5280_time($opts->{nextupdate}), + 'CRL nextUpdate field has expected value' + ); + } else { + diag("CRL nextUpdate: $crl_nextupdate"); + diag("openssl run time: $crl_gentime"); + ok( + # Is the CRL's lastUpdate time within a second of the time that + # `openssl ca -gencrl` was executed, taking into account the use + # of '-crlsec 60'? + $crl_gentime + 59 <= $crl_nextupdate && $crl_nextupdate <= $crl_gentime + 61, + 'CRL nextUpdate field has (roughly) expected value' + ); + } + }; +} + +sub yes { + my $cntr = 10; + open(PIPE, "|-", join(" ",@_)); + local $SIG{PIPE} = "IGNORE"; + 1 while $cntr-- > 0 && print PIPE "y\n"; + close PIPE; + return 0; +} + +# Get the value of the lastUpdate or nextUpdate field from a CRL +sub crl_field { + my ($crl_path, $field_name) = @_; + + my @out = run( + app(['openssl', + 'crl', + '-in', $crl_path, + '-noout', + '-' . lc($field_name), + ]), + capture => 1, + statusvar => \my $exit, + ); + ok($exit, "CRL $field_name field retrieved"); + diag("CRL $field_name: $out[0]"); + + $out[0] =~ s/^\Q$field_name\E=//; + $out[0] =~ s/\n?//; + my $time = human_time($out[0]); + + return $time; +} + +# Converts human-readable ASN1_TIME_print() output to Unix time +sub human_time { + my ($human) = @_; + + my ($mo, $d, $h, $m, $s, $y) = $human =~ /^([A-Za-z]{3})\s+(\d+) (\d{2}):(\d{2}):(\d{2}) (\d{4})/; + + my %months = ( + Jan => 0, Feb => 1, Mar => 2, Apr => 3, May => 4, Jun => 5, + Jul => 6, Aug => 7, Sep => 8, Oct => 9, Nov => 10, Dec => 11, + ); + + return timegm($s, $m, $h, $d, $months{$mo}, $y); +} + +# Converts an RFC 5280 timestamp to Unix time +sub rfc5280_time { + my ($asn1) = @_; + + my ($y, $mo, $d, $h, $m, $s) = $asn1 =~ /^(\d{2,4})(\d{2})(\d{2})(\d{2})(\d{2})(\d{2})Z$/; + + return timegm($s, $m, $h, $d, $mo - 1, $y); +} |
