2
0

verify_extra_test.c 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210
  1. /*
  2. * Written by Matt Caswell for the OpenSSL project.
  3. */
  4. /* ====================================================================
  5. * Copyright (c) 1998-2015 The OpenSSL Project. All rights reserved.
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions
  9. * are met:
  10. *
  11. * 1. Redistributions of source code must retain the above copyright
  12. * notice, this list of conditions and the following disclaimer.
  13. *
  14. * 2. Redistributions in binary form must reproduce the above copyright
  15. * notice, this list of conditions and the following disclaimer in
  16. * the documentation and/or other materials provided with the
  17. * distribution.
  18. *
  19. * 3. All advertising materials mentioning features or use of this
  20. * software must display the following acknowledgment:
  21. * "This product includes software developed by the OpenSSL Project
  22. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  23. *
  24. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  25. * endorse or promote products derived from this software without
  26. * prior written permission. For written permission, please contact
  27. * openssl-core@openssl.org.
  28. *
  29. * 5. Products derived from this software may not be called "OpenSSL"
  30. * nor may "OpenSSL" appear in their names without prior written
  31. * permission of the OpenSSL Project.
  32. *
  33. * 6. Redistributions of any form whatsoever must retain the following
  34. * acknowledgment:
  35. * "This product includes software developed by the OpenSSL Project
  36. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  37. *
  38. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  39. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  40. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  41. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  42. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  43. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  44. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  45. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  46. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  47. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  48. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  49. * OF THE POSSIBILITY OF SUCH DAMAGE.
  50. * ====================================================================
  51. *
  52. * This product includes cryptographic software written by Eric Young
  53. * (eay@cryptsoft.com). This product includes software written by Tim
  54. * Hudson (tjh@cryptsoft.com).
  55. *
  56. */
  57. #include <stdio.h>
  58. #include <openssl/crypto.h>
  59. #include <openssl/bio.h>
  60. #include <openssl/x509.h>
  61. #include <openssl/pem.h>
  62. #include <openssl/err.h>
  63. static STACK_OF(X509) *load_certs_from_file(const char *filename)
  64. {
  65. STACK_OF(X509) *certs;
  66. BIO *bio;
  67. X509 *x;
  68. bio = BIO_new_file(filename, "r");
  69. if (bio == NULL) {
  70. return NULL;
  71. }
  72. certs = sk_X509_new_null();
  73. if (certs == NULL) {
  74. BIO_free(bio);
  75. return NULL;
  76. }
  77. ERR_set_mark();
  78. do {
  79. x = PEM_read_bio_X509(bio, NULL, 0, NULL);
  80. if (x != NULL && !sk_X509_push(certs, x)) {
  81. sk_X509_pop_free(certs, X509_free);
  82. BIO_free(bio);
  83. return NULL;
  84. } else if (x == NULL) {
  85. /*
  86. * We probably just ran out of certs, so ignore any errors
  87. * generated
  88. */
  89. ERR_pop_to_mark();
  90. }
  91. } while (x != NULL);
  92. BIO_free(bio);
  93. return certs;
  94. }
  95. /*
  96. * Test for CVE-2015-1793 (Alternate Chains Certificate Forgery)
  97. *
  98. * Chain is as follows:
  99. *
  100. * rootCA (self-signed)
  101. * |
  102. * interCA
  103. * |
  104. * subinterCA subinterCA (self-signed)
  105. * | |
  106. * leaf ------------------
  107. * |
  108. * bad
  109. *
  110. * rootCA, interCA, subinterCA, subinterCA (ss) all have CA=TRUE
  111. * leaf and bad have CA=FALSE
  112. *
  113. * subinterCA and subinterCA (ss) have the same subject name and keys
  114. *
  115. * interCA (but not rootCA) and subinterCA (ss) are in the trusted store
  116. * (roots.pem)
  117. * leaf and subinterCA are in the untrusted list (untrusted.pem)
  118. * bad is the certificate being verified (bad.pem)
  119. *
  120. * Versions vulnerable to CVE-2015-1793 will fail to detect that leaf has
  121. * CA=FALSE, and will therefore incorrectly verify bad
  122. *
  123. */
  124. static int test_alt_chains_cert_forgery(const char *roots_f,
  125. const char *untrusted_f,
  126. const char *bad_f)
  127. {
  128. int ret = 0;
  129. int i;
  130. X509 *x = NULL;
  131. STACK_OF(X509) *untrusted = NULL;
  132. BIO *bio = NULL;
  133. X509_STORE_CTX *sctx = NULL;
  134. X509_STORE *store = NULL;
  135. X509_LOOKUP *lookup = NULL;
  136. store = X509_STORE_new();
  137. if (store == NULL)
  138. goto err;
  139. lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
  140. if (lookup == NULL)
  141. goto err;
  142. if(!X509_LOOKUP_load_file(lookup, roots_f, X509_FILETYPE_PEM))
  143. goto err;
  144. untrusted = load_certs_from_file(untrusted_f);
  145. if ((bio = BIO_new_file(bad_f, "r")) == NULL)
  146. goto err;
  147. if((x = PEM_read_bio_X509(bio, NULL, 0, NULL)) == NULL)
  148. goto err;
  149. sctx = X509_STORE_CTX_new();
  150. if (sctx == NULL)
  151. goto err;
  152. if (!X509_STORE_CTX_init(sctx, store, x, untrusted))
  153. goto err;
  154. i = X509_verify_cert(sctx);
  155. if(i == 0 && X509_STORE_CTX_get_error(sctx) == X509_V_ERR_INVALID_CA) {
  156. /* This is the result we were expecting: Test passed */
  157. ret = 1;
  158. }
  159. err:
  160. X509_STORE_CTX_free(sctx);
  161. X509_free(x);
  162. BIO_free(bio);
  163. sk_X509_pop_free(untrusted, X509_free);
  164. X509_STORE_free(store);
  165. if (ret != 1)
  166. ERR_print_errors_fp(stderr);
  167. return ret;
  168. }
  169. int main(int argc, char **argv)
  170. {
  171. CRYPTO_set_mem_debug(1);
  172. CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
  173. if (argc != 4) {
  174. fprintf(stderr, "usage: verify_extra_test roots.pem untrusted.pem bad.pem\n");
  175. return 1;
  176. }
  177. if (!test_alt_chains_cert_forgery(argv[1], argv[2], argv[3])) {
  178. fprintf(stderr, "Test alt chains cert forgery failed\n");
  179. return 1;
  180. }
  181. #ifndef OPENSSL_NO_CRYPTO_MDEBUG
  182. if (CRYPTO_mem_leaks_fp(stderr) <= 0)
  183. return 1;
  184. #endif
  185. printf("PASS\n");
  186. return 0;
  187. }