mirror of
https://git.libssh.org/projects/libssh.git
synced 2025-12-08 03:42:12 +03:00
The engine API in OpenSSL 3.0 is deprecated so we are in the progress of working on a PKCS#11 provider for OpenSSL. This commit introduces a conditional build with the pkcs11-provider support (instead of engines) with all the changes required for the provider to work with existing code and tests. The CI modification is only temporary before we will have the real package in Fedora or somewhere to use. Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> Reviewed-by: Norbert Pocs <npocs@redhat.com>
299 lines
8.7 KiB
C
299 lines
8.7 KiB
C
|
|
#include "config.h"
|
|
|
|
#define LIBSSH_STATIC
|
|
|
|
#include <sys/stat.h>
|
|
#include <fcntl.h>
|
|
|
|
#include "pki.c"
|
|
#include "torture.h"
|
|
#include "torture_pki.h"
|
|
#include "torture_key.h"
|
|
|
|
#define LIBSSH_RSA_TESTKEY "libssh_testkey.id_rsa"
|
|
#define LIBSSH_RSA_TESTKEY_PASSPHRASE "libssh_testkey_passphrase.id_rsa"
|
|
#define PUB_URI_FMT "pkcs11:token=%s;object=%s;type=public"
|
|
#define PRIV_URI_FMT "pkcs11:token=%s;object=%s;type=private?pin-value=%s"
|
|
|
|
const char template[] = "temp_dir_XXXXXX";
|
|
const unsigned char INPUT[] = "1234567890123456789012345678901234567890"
|
|
"123456789012345678901234";
|
|
struct pki_st {
|
|
char *orig_dir;
|
|
char *temp_dir;
|
|
char *pub_uri;
|
|
char *priv_uri;
|
|
char *priv_uri_invalid_object;
|
|
char *priv_uri_invalid_token;
|
|
char *pub_uri_invalid_object;
|
|
char *pub_uri_invalid_token;
|
|
};
|
|
|
|
static int setup_tokens(void **state)
|
|
{
|
|
char keys_path[1024] = {0};
|
|
char keys_path_pub[1024] = {0};
|
|
char *cwd = NULL;
|
|
struct pki_st *test_state = *state;
|
|
char obj_tempname[] = "label_XXXXXX";
|
|
char pub_uri[1024] = {0};
|
|
char priv_uri[1024] = {0};
|
|
char pub_uri_invalid_object[1024] = {0};
|
|
char priv_uri_invalid_object[1024] = {0};
|
|
char pub_uri_invalid_token[1024] = {0};
|
|
char priv_uri_invalid_token[1024] = {0};
|
|
|
|
cwd = test_state->temp_dir;
|
|
assert_non_null(cwd);
|
|
|
|
ssh_tmpname(obj_tempname);
|
|
|
|
snprintf(pub_uri, sizeof(pub_uri), PUB_URI_FMT, obj_tempname, obj_tempname);
|
|
|
|
snprintf(priv_uri, sizeof(priv_uri), PRIV_URI_FMT, obj_tempname, obj_tempname, "1234");
|
|
|
|
snprintf(pub_uri_invalid_token, sizeof(pub_uri_invalid_token), PUB_URI_FMT, "invalid",
|
|
obj_tempname);
|
|
|
|
snprintf(priv_uri_invalid_token, sizeof(priv_uri_invalid_token), PRIV_URI_FMT, "invalid",
|
|
obj_tempname, "1234");
|
|
|
|
snprintf(pub_uri_invalid_object, sizeof(pub_uri_invalid_object), PUB_URI_FMT, obj_tempname,
|
|
"invalid");
|
|
|
|
snprintf(priv_uri_invalid_object, sizeof(priv_uri_invalid_object), PRIV_URI_FMT, obj_tempname,
|
|
"invalid", "1234");
|
|
|
|
snprintf(keys_path, sizeof(keys_path), "%s%s%s", cwd, "/", LIBSSH_RSA_TESTKEY);
|
|
|
|
snprintf(keys_path_pub, sizeof(keys_path_pub), "%s%s%s%s", cwd, "/", LIBSSH_RSA_TESTKEY, ".pub");
|
|
|
|
test_state->pub_uri = strdup(pub_uri);
|
|
test_state->priv_uri = strdup(priv_uri);
|
|
test_state->pub_uri_invalid_token = strdup(pub_uri_invalid_token);
|
|
test_state->pub_uri_invalid_object = strdup(pub_uri_invalid_object);
|
|
test_state->priv_uri_invalid_token = strdup(priv_uri_invalid_token);
|
|
test_state->priv_uri_invalid_object = strdup(priv_uri_invalid_object);
|
|
|
|
torture_write_file(keys_path,
|
|
torture_get_testkey(SSH_KEYTYPE_RSA, 0));
|
|
torture_write_file(keys_path_pub,
|
|
torture_get_testkey_pub_pem(SSH_KEYTYPE_RSA));
|
|
|
|
torture_setup_tokens(cwd, keys_path, obj_tempname, "1");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int setup_directory_structure(void **state)
|
|
{
|
|
struct pki_st *test_state = NULL;
|
|
char *temp_dir;
|
|
int rc;
|
|
|
|
test_state = (struct pki_st *)malloc(sizeof(struct pki_st));
|
|
assert_non_null(test_state);
|
|
|
|
test_state->orig_dir = torture_get_current_working_dir();
|
|
assert_non_null(test_state->orig_dir);
|
|
|
|
temp_dir = torture_make_temp_dir(template);
|
|
assert_non_null(temp_dir);
|
|
|
|
rc = torture_change_dir(temp_dir);
|
|
assert_int_equal(rc, 0);
|
|
|
|
test_state->temp_dir = torture_get_current_working_dir();
|
|
assert_non_null(test_state->temp_dir);
|
|
|
|
*state = test_state;
|
|
|
|
rc = setup_tokens(state);
|
|
assert_int_equal(rc, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int teardown_directory_structure(void **state)
|
|
{
|
|
struct pki_st *test_state = *state;
|
|
int rc;
|
|
|
|
torture_cleanup_tokens(test_state->temp_dir);
|
|
|
|
rc = torture_change_dir(test_state->orig_dir);
|
|
assert_int_equal(rc, 0);
|
|
|
|
rc = torture_rmdirs(test_state->temp_dir);
|
|
assert_int_equal(rc, 0);
|
|
|
|
SAFE_FREE(test_state->temp_dir);
|
|
SAFE_FREE(test_state->orig_dir);
|
|
SAFE_FREE(test_state->priv_uri);
|
|
SAFE_FREE(test_state->pub_uri);
|
|
SAFE_FREE(test_state->priv_uri_invalid_object);
|
|
SAFE_FREE(test_state->pub_uri_invalid_object);
|
|
SAFE_FREE(test_state->priv_uri_invalid_token);
|
|
SAFE_FREE(test_state->pub_uri_invalid_token);
|
|
SAFE_FREE(test_state);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void torture_pki_rsa_import_pubkey_uri(void **state)
|
|
{
|
|
ssh_key pubkey = NULL;
|
|
int rc;
|
|
struct pki_st *test_state = *state;
|
|
rc = ssh_pki_import_pubkey_file(test_state->pub_uri, &pubkey);
|
|
assert_return_code(rc, errno);
|
|
assert_non_null(pubkey);
|
|
|
|
rc = ssh_key_is_public(pubkey);
|
|
assert_int_equal(rc, 1);
|
|
|
|
SSH_KEY_FREE(pubkey);
|
|
}
|
|
|
|
static void torture_pki_rsa_import_privkey_uri(void **state)
|
|
{
|
|
int rc;
|
|
ssh_key privkey = NULL;
|
|
struct pki_st *test_state = *state;
|
|
|
|
rc = ssh_pki_import_privkey_file(test_state->priv_uri,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
&privkey);
|
|
assert_return_code(rc, errno);
|
|
assert_non_null(privkey);
|
|
|
|
rc = ssh_key_is_private(privkey);
|
|
assert_int_equal(rc, 1);
|
|
|
|
SSH_KEY_FREE(privkey);
|
|
}
|
|
|
|
|
|
static void torture_pki_sign_verify_uri(void **state)
|
|
{
|
|
int rc;
|
|
ssh_key privkey = NULL, pubkey = NULL;
|
|
ssh_signature sign = NULL;
|
|
ssh_session session=ssh_new();
|
|
struct pki_st *test_state = *state;
|
|
|
|
rc = ssh_pki_import_privkey_file(test_state->priv_uri,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
&privkey);
|
|
assert_return_code(rc, errno);
|
|
assert_non_null(privkey);
|
|
|
|
rc = ssh_pki_import_pubkey_file(test_state->pub_uri, &pubkey);
|
|
assert_return_code(rc, errno);
|
|
assert_non_null(pubkey);
|
|
|
|
sign = pki_do_sign(privkey, INPUT, sizeof(INPUT), SSH_DIGEST_SHA256);
|
|
assert_non_null(sign);
|
|
|
|
rc = ssh_pki_signature_verify(session, sign, pubkey, INPUT, sizeof(INPUT));
|
|
assert_return_code(rc, errno);
|
|
|
|
ssh_signature_free(sign);
|
|
SSH_KEY_FREE(privkey);
|
|
SSH_KEY_FREE(pubkey);
|
|
|
|
ssh_free(session);
|
|
}
|
|
|
|
static void torture_pki_rsa_publickey_from_privatekey_uri(void **state)
|
|
{
|
|
int rc;
|
|
ssh_key privkey = NULL;
|
|
ssh_key pubkey = NULL;
|
|
struct pki_st *test_state = *state;
|
|
|
|
rc = ssh_pki_import_privkey_file(test_state->priv_uri,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
&privkey);
|
|
assert_return_code(rc, errno);
|
|
assert_non_null(privkey);
|
|
|
|
rc = ssh_key_is_private(privkey);
|
|
assert_int_equal(rc, 1);
|
|
|
|
rc = ssh_pki_export_privkey_to_pubkey(privkey, &pubkey);
|
|
assert_return_code(rc, errno);
|
|
assert_non_null(pubkey);
|
|
|
|
SSH_KEY_FREE(privkey);
|
|
SSH_KEY_FREE(pubkey);
|
|
}
|
|
|
|
static void torture_pki_rsa_uri_invalid_configurations(void **state)
|
|
{
|
|
int rc;
|
|
ssh_key pubkey = NULL;
|
|
ssh_key privkey = NULL;
|
|
|
|
struct pki_st *test_state = *state;
|
|
|
|
rc = ssh_pki_import_pubkey_file(test_state->pub_uri_invalid_object, &pubkey);
|
|
assert_int_not_equal(rc, 0);
|
|
assert_null(pubkey);
|
|
|
|
rc = ssh_pki_import_pubkey_file(test_state->pub_uri_invalid_token, &pubkey);
|
|
assert_int_not_equal(rc, 0);
|
|
assert_null(pubkey);
|
|
|
|
rc = ssh_pki_import_privkey_file(test_state->priv_uri_invalid_object,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
&privkey);
|
|
assert_int_not_equal(rc, 0);
|
|
assert_null(privkey);
|
|
|
|
rc = ssh_pki_import_privkey_file(test_state->priv_uri_invalid_token,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
&privkey);
|
|
assert_int_not_equal(rc, 0);
|
|
assert_null(privkey);
|
|
}
|
|
|
|
int
|
|
torture_run_tests(void)
|
|
{
|
|
int rc;
|
|
struct CMUnitTest tests[] = {
|
|
cmocka_unit_test(torture_pki_rsa_import_pubkey_uri),
|
|
cmocka_unit_test(torture_pki_rsa_import_privkey_uri),
|
|
cmocka_unit_test(torture_pki_sign_verify_uri),
|
|
cmocka_unit_test(torture_pki_rsa_publickey_from_privatekey_uri),
|
|
cmocka_unit_test(torture_pki_rsa_uri_invalid_configurations),
|
|
};
|
|
|
|
ssh_session session = ssh_new();
|
|
int verbosity = SSH_LOG_FUNCTIONS;
|
|
|
|
ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity);
|
|
ssh_init();
|
|
|
|
torture_filter_tests(tests);
|
|
rc = cmocka_run_group_tests(tests,
|
|
setup_directory_structure,
|
|
teardown_directory_structure);
|
|
|
|
ssh_finalize();
|
|
|
|
return rc;
|
|
}
|