verify_extra_test.c 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. /*
  2. * Written by Matt Caswell for the OpenSSL project.
  3. */
  4. /* ====================================================================
  5. * Copyright (c) 1998-2015 The OpenSSL Project. All rights reserved.
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions
  9. * are met:
  10. *
  11. * 1. Redistributions of source code must retain the above copyright
  12. * notice, this list of conditions and the following disclaimer.
  13. *
  14. * 2. Redistributions in binary form must reproduce the above copyright
  15. * notice, this list of conditions and the following disclaimer in
  16. * the documentation and/or other materials provided with the
  17. * distribution.
  18. *
  19. * 3. All advertising materials mentioning features or use of this
  20. * software must display the following acknowledgment:
  21. * "This product includes software developed by the OpenSSL Project
  22. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  23. *
  24. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  25. * endorse or promote products derived from this software without
  26. * prior written permission. For written permission, please contact
  27. * openssl-core@openssl.org.
  28. *
  29. * 5. Products derived from this software may not be called "OpenSSL"
  30. * nor may "OpenSSL" appear in their names without prior written
  31. * permission of the OpenSSL Project.
  32. *
  33. * 6. Redistributions of any form whatsoever must retain the following
  34. * acknowledgment:
  35. * "This product includes software developed by the OpenSSL Project
  36. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  37. *
  38. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  39. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  40. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  41. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  42. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  43. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  44. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  45. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  46. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  47. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  48. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  49. * OF THE POSSIBILITY OF SUCH DAMAGE.
  50. * ====================================================================
  51. *
  52. * This product includes cryptographic software written by Eric Young
  53. * (eay@cryptsoft.com). This product includes software written by Tim
  54. * Hudson (tjh@cryptsoft.com).
  55. *
  56. */
  57. #include <stdio.h>
  58. #include <openssl/crypto.h>
  59. #include <openssl/bio.h>
  60. #include <openssl/x509.h>
  61. #include <openssl/pem.h>
  62. #include <openssl/err.h>
  63. static STACK_OF(X509) *load_certs_from_file(const char *filename)
  64. {
  65. STACK_OF(X509) *certs;
  66. BIO *bio;
  67. X509 *x;
  68. bio = BIO_new_file(filename, "r");
  69. if (bio == NULL) {
  70. return NULL;
  71. }
  72. certs = sk_X509_new_null();
  73. if (certs == NULL) {
  74. BIO_free(bio);
  75. return NULL;
  76. }
  77. ERR_set_mark();
  78. do {
  79. x = PEM_read_bio_X509(bio, NULL, 0, NULL);
  80. if (x != NULL && !sk_X509_push(certs, x)) {
  81. sk_X509_pop_free(certs, X509_free);
  82. BIO_free(bio);
  83. return NULL;
  84. } else if (x == NULL) {
  85. /*
  86. * We probably just ran out of certs, so ignore any errors
  87. * generated
  88. */
  89. ERR_pop_to_mark();
  90. }
  91. } while (x != NULL);
  92. BIO_free(bio);
  93. return certs;
  94. }
  95. /*
  96. * Test for CVE-2015-1793 (Alternate Chains Certificate Forgery)
  97. *
  98. * Chain is as follows:
  99. *
  100. * rootCA (self-signed)
  101. * |
  102. * interCA
  103. * |
  104. * subinterCA subinterCA (self-signed)
  105. * | |
  106. * leaf ------------------
  107. * |
  108. * bad
  109. *
  110. * rootCA, interCA, subinterCA, subinterCA (ss) all have CA=TRUE
  111. * leaf and bad have CA=FALSE
  112. *
  113. * subinterCA and subinterCA (ss) have the same subject name and keys
  114. *
  115. * interCA (but not rootCA) and subinterCA (ss) are in the trusted store
  116. * (roots.pem)
  117. * leaf and subinterCA are in the untrusted list (untrusted.pem)
  118. * bad is the certificate being verified (bad.pem)
  119. *
  120. * Versions vulnerable to CVE-2015-1793 will fail to detect that leaf has
  121. * CA=FALSE, and will therefore incorrectly verify bad
  122. *
  123. */
  124. static int test_alt_chains_cert_forgery(void)
  125. {
  126. int ret = 0;
  127. int i;
  128. X509 *x = NULL;
  129. STACK_OF(X509) *untrusted = NULL;
  130. BIO *bio = NULL;
  131. X509_STORE_CTX *sctx = NULL;
  132. X509_STORE *store = NULL;
  133. X509_LOOKUP *lookup = NULL;
  134. store = X509_STORE_new();
  135. if (store == NULL)
  136. goto err;
  137. lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
  138. if (lookup == NULL)
  139. goto err;
  140. if(!X509_LOOKUP_load_file(lookup, "certs/roots.pem", X509_FILETYPE_PEM))
  141. goto err;
  142. untrusted = load_certs_from_file("certs/untrusted.pem");
  143. if ((bio = BIO_new_file("certs/bad.pem", "r")) == NULL)
  144. goto err;
  145. if((x = PEM_read_bio_X509(bio, NULL, 0, NULL)) == NULL)
  146. goto err;
  147. sctx = X509_STORE_CTX_new();
  148. if (sctx == NULL)
  149. goto err;
  150. if (!X509_STORE_CTX_init(sctx, store, x, untrusted))
  151. goto err;
  152. i = X509_verify_cert(sctx);
  153. if(i == 0 && X509_STORE_CTX_get_error(sctx) == X509_V_ERR_INVALID_CA) {
  154. /* This is the result we were expecting: Test passed */
  155. ret = 1;
  156. }
  157. err:
  158. X509_STORE_CTX_free(sctx);
  159. X509_free(x);
  160. BIO_free(bio);
  161. sk_X509_pop_free(untrusted, X509_free);
  162. X509_STORE_free(store);
  163. if (ret != 1)
  164. ERR_print_errors_fp(stderr);
  165. return ret;
  166. }
  167. int main(void)
  168. {
  169. CRYPTO_malloc_debug_init();
  170. CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL);
  171. CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
  172. ERR_load_crypto_strings();
  173. OpenSSL_add_all_digests();
  174. if (!test_alt_chains_cert_forgery()) {
  175. fprintf(stderr, "Test alt chains cert forgery failed\n");
  176. return 1;
  177. }
  178. EVP_cleanup();
  179. CRYPTO_cleanup_all_ex_data();
  180. ERR_remove_thread_state(NULL);
  181. ERR_free_strings();
  182. CRYPTO_mem_leaks_fp(stderr);
  183. printf("PASS\n");
  184. return 0;
  185. }