blob: fdf30ef40f6ed5d30e3fe4ba6589d5c78a4304c8 [file] [log] [blame]
Paul Bakker4593aea2009-02-09 22:32:35 +00001/*
2 * SSL certificate functionality tests
3 *
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02004 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Paul Bakkerb96f1542010-07-18 20:36:00 +000018 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000019 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker4593aea2009-02-09 22:32:35 +000020 */
21
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020022#if !defined(MBEDTLS_CONFIG_FILE)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000023#include "mbedtls/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020024#else
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020025#include MBEDTLS_CONFIG_FILE
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020026#endif
Paul Bakker4593aea2009-02-09 22:32:35 +000027
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020028#if defined(MBEDTLS_PLATFORM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000029#include "mbedtls/platform.h"
Rich Evansf90016a2015-01-19 14:26:37 +000030#else
Rich Evans18b78c72015-02-11 14:06:19 +000031#include <stdio.h>
Andres Amaya Garcia357b0b22018-04-29 22:04:03 +010032#include <stdlib.h>
33#define mbedtls_snprintf snprintf
34#define mbedtls_printf printf
Manuel Pégourié-Gonnard3ef6a6d2018-12-10 14:31:45 +010035#define mbedtls_exit exit
Andres Amaya Garcia7d429652018-04-30 22:42:33 +010036#define MBEDTLS_EXIT_SUCCESS EXIT_SUCCESS
Andres Amaya Garcia357b0b22018-04-29 22:04:03 +010037#define MBEDTLS_EXIT_FAILURE EXIT_FAILURE
38#endif /* MBEDTLS_PLATFORM_C */
Rich Evansf90016a2015-01-19 14:26:37 +000039
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020040#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_X509_CRT_PARSE_C) && \
41 defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRL_PARSE_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000042#include "mbedtls/certs.h"
43#include "mbedtls/x509_crt.h"
Rich Evans18b78c72015-02-11 14:06:19 +000044
Paul Bakker4593aea2009-02-09 22:32:35 +000045#include <stdio.h>
Rich Evans18b78c72015-02-11 14:06:19 +000046#include <string.h>
47#endif
48
Rich Evans18b78c72015-02-11 14:06:19 +000049#define MAX_CLIENT_CERTS 8
Paul Bakker4593aea2009-02-09 22:32:35 +000050
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020051#if !defined(MBEDTLS_RSA_C) || !defined(MBEDTLS_X509_CRT_PARSE_C) || \
52 !defined(MBEDTLS_FS_IO) || !defined(MBEDTLS_X509_CRL_PARSE_C)
Rich Evans85b05ec2015-02-12 11:37:29 +000053int main( void )
Manuel Pégourié-Gonnard7831b0c2013-09-20 12:29:56 +020054{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055 mbedtls_printf("MBEDTLS_RSA_C and/or MBEDTLS_X509_CRT_PARSE_C "
56 "MBEDTLS_FS_IO and/or MBEDTLS_X509_CRL_PARSE_C "
Manuel Pégourié-Gonnard7831b0c2013-09-20 12:29:56 +020057 "not defined.\n");
58 return( 0 );
59}
60#else
Paul Bakkeref3f8c72013-06-24 13:01:08 +020061const char *client_certificates[MAX_CLIENT_CERTS] =
Paul Bakker4593aea2009-02-09 22:32:35 +000062{
Paul Bakkerd98030e2009-05-02 15:13:40 +000063 "client1.crt",
64 "client2.crt",
Paul Bakker40ea7de2009-05-03 10:18:48 +000065 "server1.crt",
66 "server2.crt",
Paul Bakkerd98030e2009-05-02 15:13:40 +000067 "cert_sha224.crt",
68 "cert_sha256.crt",
69 "cert_sha384.crt",
70 "cert_sha512.crt"
Paul Bakker4593aea2009-02-09 22:32:35 +000071};
72
Paul Bakkeref3f8c72013-06-24 13:01:08 +020073const char *client_private_keys[MAX_CLIENT_CERTS] =
Paul Bakkera1d3e5f2009-03-28 17:30:26 +000074{
Paul Bakkerd98030e2009-05-02 15:13:40 +000075 "client1.key",
76 "client2.key",
Paul Bakker40ea7de2009-05-03 10:18:48 +000077 "server1.key",
78 "server2.key",
Paul Bakkerf17ed282011-02-09 17:10:48 +000079 "cert_digest.key",
80 "cert_digest.key",
81 "cert_digest.key",
82 "cert_digest.key"
Paul Bakkera1d3e5f2009-03-28 17:30:26 +000083};
84
Manuel Pégourié-Gonnard3ef6a6d2018-12-10 14:31:45 +010085#if defined(MBEDTLS_CHECK_PARAMS)
86#include "mbedtls/platform_util.h"
87void mbedtls_param_failed( const char *failure_condition,
88 const char *file,
89 int line )
Simon Butcher63cb97e2018-12-06 17:43:31 +000090{
Manuel Pégourié-Gonnard3ef6a6d2018-12-10 14:31:45 +010091 mbedtls_printf( "%s:%i: Input param failed - %s\n",
92 file, line, failure_condition );
Simon Butcher63cb97e2018-12-06 17:43:31 +000093 mbedtls_exit( MBEDTLS_EXIT_FAILURE );
94}
95#endif
96
Rich Evans85b05ec2015-02-12 11:37:29 +000097int main( void )
Paul Bakker4593aea2009-02-09 22:32:35 +000098{
Andres Amaya Garcia357b0b22018-04-29 22:04:03 +010099 int ret = 1, i;
100 int exit_code = MBEDTLS_EXIT_FAILURE;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200101 mbedtls_x509_crt cacert;
102 mbedtls_x509_crl crl;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000103 char buf[10240];
104
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200105 mbedtls_x509_crt_init( &cacert );
106 mbedtls_x509_crl_init( &crl );
Paul Bakker4593aea2009-02-09 22:32:35 +0000107
108 /*
109 * 1.1. Load the trusted CA
110 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200111 mbedtls_printf( "\n . Loading the CA root certificate ..." );
Paul Bakker4593aea2009-02-09 22:32:35 +0000112 fflush( stdout );
113
Paul Bakker4593aea2009-02-09 22:32:35 +0000114 /*
115 * Alternatively, you may load the CA certificates from a .pem or
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200116 * .crt file by calling mbedtls_x509_crt_parse_file( &cacert, "myca.crt" ).
Paul Bakker4593aea2009-02-09 22:32:35 +0000117 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200118 ret = mbedtls_x509_crt_parse_file( &cacert, "ssl/test-ca/test-ca.crt" );
Paul Bakker4593aea2009-02-09 22:32:35 +0000119 if( ret != 0 )
120 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200121 mbedtls_printf( " failed\n ! mbedtls_x509_crt_parse_file returned %d\n\n", ret );
Paul Bakker4593aea2009-02-09 22:32:35 +0000122 goto exit;
123 }
124
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200125 mbedtls_printf( " ok\n" );
Paul Bakker4593aea2009-02-09 22:32:35 +0000126
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200127 mbedtls_x509_crt_info( buf, 1024, "CRT: ", &cacert );
128 mbedtls_printf("%s\n", buf );
Paul Bakker40ea7de2009-05-03 10:18:48 +0000129
Paul Bakkerd98030e2009-05-02 15:13:40 +0000130 /*
131 * 1.2. Load the CRL
132 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200133 mbedtls_printf( " . Loading the CRL ..." );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000134 fflush( stdout );
135
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200136 ret = mbedtls_x509_crl_parse_file( &crl, "ssl/test-ca/crl.pem" );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000137 if( ret != 0 )
138 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200139 mbedtls_printf( " failed\n ! mbedtls_x509_crl_parse_file returned %d\n\n", ret );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000140 goto exit;
141 }
142
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200143 mbedtls_printf( " ok\n" );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000144
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200145 mbedtls_x509_crl_info( buf, 1024, "CRL: ", &crl );
146 mbedtls_printf("%s\n", buf );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000147
Paul Bakker4593aea2009-02-09 22:32:35 +0000148 for( i = 0; i < MAX_CLIENT_CERTS; i++ )
149 {
150 /*
Paul Bakkerd98030e2009-05-02 15:13:40 +0000151 * 1.3. Load own certificate
Paul Bakker4593aea2009-02-09 22:32:35 +0000152 */
Paul Bakkerd98030e2009-05-02 15:13:40 +0000153 char name[512];
Manuel Pégourié-Gonnarde6ef16f2015-05-11 19:54:43 +0200154 uint32_t flags;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200155 mbedtls_x509_crt clicert;
156 mbedtls_pk_context pk;
Paul Bakker4593aea2009-02-09 22:32:35 +0000157
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200158 mbedtls_x509_crt_init( &clicert );
159 mbedtls_pk_init( &pk );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000160
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200161 mbedtls_snprintf(name, 512, "ssl/test-ca/%s", client_certificates[i]);
Paul Bakkerd98030e2009-05-02 15:13:40 +0000162
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200163 mbedtls_printf( " . Loading the client certificate %s...", name );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000164 fflush( stdout );
Paul Bakker4593aea2009-02-09 22:32:35 +0000165
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200166 ret = mbedtls_x509_crt_parse_file( &clicert, name );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000167 if( ret != 0 )
168 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200169 mbedtls_printf( " failed\n ! mbedtls_x509_crt_parse_file returned %d\n\n", ret );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000170 goto exit;
171 }
Paul Bakker4593aea2009-02-09 22:32:35 +0000172
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200173 mbedtls_printf( " ok\n" );
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000174
175 /*
Paul Bakkerd98030e2009-05-02 15:13:40 +0000176 * 1.4. Verify certificate validity with CA certificate
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000177 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200178 mbedtls_printf( " . Verify the client certificate with CA certificate..." );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000179 fflush( stdout );
180
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200181 ret = mbedtls_x509_crt_verify( &clicert, &cacert, &crl, NULL, &flags, NULL,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200182 NULL );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000183 if( ret != 0 )
184 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200185 if( ret == MBEDTLS_ERR_X509_CERT_VERIFY_FAILED )
Paul Bakker40ea7de2009-05-03 10:18:48 +0000186 {
Manuel Pégourié-Gonnard89addc42015-04-20 10:56:18 +0100187 char vrfy_buf[512];
188
189 mbedtls_printf( " failed\n" );
Manuel Pégourié-Gonnardda61ed32015-04-30 10:28:51 +0200190 mbedtls_x509_crt_verify_info( vrfy_buf, sizeof( vrfy_buf ), " ! ", flags );
Manuel Pégourié-Gonnard89addc42015-04-20 10:56:18 +0100191 mbedtls_printf( "%s\n", vrfy_buf );
192 }
193 else
194 {
Manuel Pégourié-Gonnardda61ed32015-04-30 10:28:51 +0200195 mbedtls_printf( " failed\n ! mbedtls_x509_crt_verify returned %d\n\n", ret );
Paul Bakker40ea7de2009-05-03 10:18:48 +0000196 goto exit;
197 }
Paul Bakkerd98030e2009-05-02 15:13:40 +0000198 }
199
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200200 mbedtls_printf( " ok\n" );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000201
202 /*
203 * 1.5. Load own private key
204 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200205 mbedtls_snprintf(name, 512, "ssl/test-ca/%s", client_private_keys[i]);
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000206
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200207 mbedtls_printf( " . Loading the client private key %s...", name );
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000208 fflush( stdout );
209
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200210 ret = mbedtls_pk_parse_keyfile( &pk, name, NULL );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000211 if( ret != 0 )
212 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200213 mbedtls_printf( " failed\n ! mbedtls_pk_parse_keyfile returned %d\n\n", ret );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000214 goto exit;
215 }
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000216
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200217 mbedtls_printf( " ok\n" );
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000218
Paul Bakkerd98030e2009-05-02 15:13:40 +0000219 /*
Manuel Pégourié-Gonnardbe506802013-07-11 13:17:21 +0200220 * 1.6. Verify certificate validity with private key
Paul Bakkerd98030e2009-05-02 15:13:40 +0000221 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200222 mbedtls_printf( " . Verify the client certificate with private key..." );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000223 fflush( stdout );
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000224
Manuel Pégourié-Gonnardbe506802013-07-11 13:17:21 +0200225
226 /* EC NOT IMPLEMENTED YET */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200227 if( ! mbedtls_pk_can_do( &clicert.pk, MBEDTLS_PK_RSA ) )
Manuel Pégourié-Gonnardbe506802013-07-11 13:17:21 +0200228 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200229 mbedtls_printf( " failed\n ! certificate's key is not RSA\n\n" );
Manuel Pégourié-Gonnardbe506802013-07-11 13:17:21 +0200230 goto exit;
231 }
232
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200233 ret = mbedtls_mpi_cmp_mpi(&mbedtls_pk_rsa( pk )->N, &mbedtls_pk_rsa( clicert.pk )->N);
Paul Bakkerd98030e2009-05-02 15:13:40 +0000234 if( ret != 0 )
235 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200236 mbedtls_printf( " failed\n ! mbedtls_mpi_cmp_mpi for N returned %d\n\n", ret );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000237 goto exit;
238 }
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000239
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200240 ret = mbedtls_mpi_cmp_mpi(&mbedtls_pk_rsa( pk )->E, &mbedtls_pk_rsa( clicert.pk )->E);
Paul Bakkerd98030e2009-05-02 15:13:40 +0000241 if( ret != 0 )
242 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200243 mbedtls_printf( " failed\n ! mbedtls_mpi_cmp_mpi for E returned %d\n\n", ret );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000244 goto exit;
245 }
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000246
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200247 ret = mbedtls_rsa_check_privkey( mbedtls_pk_rsa( pk ) );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000248 if( ret != 0 )
249 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200250 mbedtls_printf( " failed\n ! mbedtls_rsa_check_privkey returned %d\n\n", ret );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000251 goto exit;
252 }
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000253
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200254 mbedtls_printf( " ok\n" );
Paul Bakkera1d3e5f2009-03-28 17:30:26 +0000255
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200256 mbedtls_x509_crt_free( &clicert );
257 mbedtls_pk_free( &pk );
Paul Bakker4593aea2009-02-09 22:32:35 +0000258 }
259
Andres Amaya Garcia357b0b22018-04-29 22:04:03 +0100260 exit_code = MBEDTLS_EXIT_SUCCESS;
261
Paul Bakker4593aea2009-02-09 22:32:35 +0000262exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200263 mbedtls_x509_crt_free( &cacert );
264 mbedtls_x509_crl_free( &crl );
Paul Bakker4593aea2009-02-09 22:32:35 +0000265
Paul Bakkercce9d772011-11-18 14:26:47 +0000266#if defined(_WIN32)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200267 mbedtls_printf( " + Press Enter to exit this program.\n" );
Paul Bakker4593aea2009-02-09 22:32:35 +0000268 fflush( stdout ); getchar();
269#endif
270
Andres Amaya Garcia357b0b22018-04-29 22:04:03 +0100271 return( exit_code );
Paul Bakker4593aea2009-02-09 22:32:35 +0000272}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200273#endif /* MBEDTLS_RSA_C && MBEDTLS_X509_CRT_PARSE_C && MBEDTLS_FS_IO &&
274 MBEDTLS_X509_CRL_PARSE_C */