mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 04:13:28 +01:00
Split tls modules and their tests into openssl and generic.
Also, add a stubbed-out nss version of the modules. The tests won't pass with NSS yet since the NSS modules don't do anything. This is a good patch to read with --color-moved.
This commit is contained in:
parent
91c1e88b7a
commit
1992c76130
@ -10,6 +10,16 @@ src_lib_libtor_tls_a_SOURCES = \
|
||||
src/lib/tls/tortls.c \
|
||||
src/lib/tls/x509.c
|
||||
|
||||
if USE_NSS
|
||||
src_lib_libtor_tls_a_SOURCES += \
|
||||
src/lib/tls/tortls_nss.c \
|
||||
src/lib/tls/x509_nss.c
|
||||
else
|
||||
src_lib_libtor_tls_a_SOURCES += \
|
||||
src/lib/tls/tortls_openssl.c \
|
||||
src/lib/tls/x509_openssl.c
|
||||
endif
|
||||
|
||||
src_lib_libtor_tls_a_CFLAGS = $(AM_CFLAGS) $(TOR_CFLAGS_CRYPTLIB)
|
||||
|
||||
src_lib_libtor_tls_testing_a_SOURCES = \
|
||||
@ -22,4 +32,6 @@ noinst_HEADERS += \
|
||||
src/lib/tls/ciphers.inc \
|
||||
src/lib/tls/buffers_tls.h \
|
||||
src/lib/tls/tortls.h \
|
||||
src/lib/tls/tortls_internal.h \
|
||||
src/lib/tls/tortls_st.h \
|
||||
src/lib/tls/x509.h
|
||||
|
2065
src/lib/tls/tortls.c
2065
src/lib/tls/tortls.c
File diff suppressed because it is too large
Load Diff
@ -50,74 +50,13 @@ struct tor_x509_cert_t;
|
||||
|
||||
#define TOR_TLS_IS_ERROR(rv) ((rv) < TOR_TLS_CLOSE)
|
||||
|
||||
#ifdef TORTLS_PRIVATE
|
||||
|
||||
#ifdef ENABLE_OPENSSL
|
||||
struct ssl_st;
|
||||
struct ssl_ctx_st;
|
||||
struct ssl_session_st;
|
||||
#endif
|
||||
|
||||
/** Holds a SSL_CTX object and related state used to configure TLS
|
||||
* connections.
|
||||
*/
|
||||
typedef struct tor_tls_context_t tor_tls_context_t;
|
||||
|
||||
STATIC int tor_errno_to_tls_error(int e);
|
||||
STATIC int tor_tls_get_error(tor_tls_t *tls, int r, int extra,
|
||||
const char *doing, int severity, int domain);
|
||||
STATIC tor_tls_t *tor_tls_get_by_ssl(const struct ssl_st *ssl);
|
||||
STATIC void tor_tls_allocate_tor_tls_object_ex_data_index(void);
|
||||
MOCK_DECL(STATIC void, try_to_extract_certs_from_tls,
|
||||
(int severity, tor_tls_t *tls, struct x509_st **cert_out,
|
||||
struct x509_st **id_cert_out));
|
||||
#ifdef TORTLS_OPENSSL_PRIVATE
|
||||
STATIC int always_accept_verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx);
|
||||
STATIC int tor_tls_classify_client_ciphers(const struct ssl_st *ssl,
|
||||
STACK_OF(SSL_CIPHER) *peer_ciphers);
|
||||
#endif
|
||||
STATIC int tor_tls_client_is_using_v2_ciphers(const struct ssl_st *ssl);
|
||||
#ifndef HAVE_SSL_SESSION_GET_MASTER_KEY
|
||||
STATIC size_t SSL_SESSION_get_master_key(struct ssl_session_st *s,
|
||||
uint8_t *out,
|
||||
size_t len);
|
||||
#endif
|
||||
STATIC void tor_tls_debug_state_callback(const struct ssl_st *ssl,
|
||||
int type, int val);
|
||||
STATIC void tor_tls_server_info_callback(const struct ssl_st *ssl,
|
||||
int type, int val);
|
||||
#ifdef TORTLS_OPENSSL_PRIVATE
|
||||
STATIC int tor_tls_session_secret_cb(struct ssl_st *ssl, void *secret,
|
||||
int *secret_len,
|
||||
STACK_OF(SSL_CIPHER) *peer_ciphers,
|
||||
CONST_IF_OPENSSL_1_1_API SSL_CIPHER **cipher,
|
||||
void *arg);
|
||||
STATIC int find_cipher_by_id(const SSL *ssl, const SSL_METHOD *m,
|
||||
uint16_t cipher);
|
||||
#endif /* defined(TORTLS_OPENSSL_PRIVATE) */
|
||||
STATIC tor_tls_context_t *tor_tls_context_new(crypto_pk_t *identity,
|
||||
unsigned int key_lifetime, unsigned flags, int is_client);
|
||||
STATIC int tor_tls_context_init_one(tor_tls_context_t **ppcontext,
|
||||
crypto_pk_t *identity,
|
||||
unsigned int key_lifetime,
|
||||
unsigned int flags,
|
||||
int is_client);
|
||||
|
||||
#ifdef TOR_UNIT_TESTS
|
||||
extern int tor_tls_object_ex_data_index;
|
||||
extern tor_tls_context_t *server_tls_context;
|
||||
extern tor_tls_context_t *client_tls_context;
|
||||
extern uint16_t v2_cipher_list[];
|
||||
extern uint64_t total_bytes_written_over_tls;
|
||||
extern uint64_t total_bytes_written_by_tls;
|
||||
|
||||
#endif /* defined(TOR_UNIT_TESTS) */
|
||||
|
||||
#endif /* defined(TORTLS_PRIVATE) */
|
||||
|
||||
const char *tor_tls_err_to_string(int err);
|
||||
void tor_tls_get_state_description(tor_tls_t *tls, char *buf, size_t sz);
|
||||
|
||||
void tor_tls_free_all(void);
|
||||
|
||||
#define TOR_TLS_CTX_IS_PUBLIC_SERVER (1u<<0)
|
||||
@ -131,6 +70,9 @@ int tor_tls_context_init(unsigned flags,
|
||||
crypto_pk_t *client_identity,
|
||||
crypto_pk_t *server_identity,
|
||||
unsigned int key_lifetime);
|
||||
void tor_tls_context_incref(tor_tls_context_t *ctx);
|
||||
void tor_tls_context_decref(tor_tls_context_t *ctx);
|
||||
tor_tls_context_t *tor_tls_context_get(int is_server);
|
||||
tor_tls_t *tor_tls_new(int sock, int is_server);
|
||||
void tor_tls_set_logged_address(tor_tls_t *tls, const char *address);
|
||||
void tor_tls_set_renegotiate_callback(tor_tls_t *tls,
|
||||
|
65
src/lib/tls/tortls_internal.h
Normal file
65
src/lib/tls/tortls_internal.h
Normal file
@ -0,0 +1,65 @@
|
||||
/* Copyright (c) 2003, Roger Dingledine
|
||||
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
||||
* Copyright (c) 2007-2018, The Tor Project, Inc. */
|
||||
/* See LICENSE for licensing information */
|
||||
|
||||
#ifndef TORTLS_INTERNAL_H
|
||||
#define TORTLS_INTERNAL_H
|
||||
|
||||
#ifdef ENABLE_OPENSSL
|
||||
struct ssl_st;
|
||||
struct ssl_ctx_st;
|
||||
struct ssl_session_st;
|
||||
#endif
|
||||
|
||||
int tor_errno_to_tls_error(int e);
|
||||
int tor_tls_get_error(tor_tls_t *tls, int r, int extra,
|
||||
const char *doing, int severity, int domain);
|
||||
tor_tls_t *tor_tls_get_by_ssl(const struct ssl_st *ssl);
|
||||
void tor_tls_allocate_tor_tls_object_ex_data_index(void);
|
||||
MOCK_DECL(void, try_to_extract_certs_from_tls,
|
||||
(int severity, tor_tls_t *tls,
|
||||
tor_x509_cert_impl_t **cert_out,
|
||||
tor_x509_cert_impl_t **id_cert_out));
|
||||
#ifdef TORTLS_OPENSSL_PRIVATE
|
||||
int always_accept_verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx);
|
||||
int tor_tls_classify_client_ciphers(const struct ssl_st *ssl,
|
||||
STACK_OF(SSL_CIPHER) *peer_ciphers);
|
||||
#endif
|
||||
int tor_tls_client_is_using_v2_ciphers(const struct ssl_st *ssl);
|
||||
#ifndef HAVE_SSL_SESSION_GET_MASTER_KEY
|
||||
size_t SSL_SESSION_get_master_key(struct ssl_session_st *s,
|
||||
uint8_t *out,
|
||||
size_t len);
|
||||
#endif
|
||||
void tor_tls_debug_state_callback(const struct ssl_st *ssl,
|
||||
int type, int val);
|
||||
void tor_tls_server_info_callback(const struct ssl_st *ssl,
|
||||
int type, int val);
|
||||
#ifdef TORTLS_OPENSSL_PRIVATE
|
||||
STATIC int tor_tls_session_secret_cb(struct ssl_st *ssl, void *secret,
|
||||
int *secret_len,
|
||||
STACK_OF(SSL_CIPHER) *peer_ciphers,
|
||||
CONST_IF_OPENSSL_1_1_API SSL_CIPHER **cipher,
|
||||
void *arg);
|
||||
STATIC int find_cipher_by_id(const SSL *ssl, const SSL_METHOD *m,
|
||||
uint16_t cipher);
|
||||
#endif /* defined(TORTLS_OPENSSL_PRIVATE) */
|
||||
tor_tls_context_t *tor_tls_context_new(crypto_pk_t *identity,
|
||||
unsigned int key_lifetime, unsigned flags, int is_client);
|
||||
int tor_tls_context_init_one(tor_tls_context_t **ppcontext,
|
||||
crypto_pk_t *identity,
|
||||
unsigned int key_lifetime,
|
||||
unsigned int flags,
|
||||
int is_client);
|
||||
|
||||
#ifdef TOR_UNIT_TESTS
|
||||
extern int tor_tls_object_ex_data_index;
|
||||
extern tor_tls_context_t *server_tls_context;
|
||||
extern tor_tls_context_t *client_tls_context;
|
||||
extern uint16_t v2_cipher_list[];
|
||||
extern uint64_t total_bytes_written_over_tls;
|
||||
extern uint64_t total_bytes_written_by_tls;
|
||||
#endif /* defined(TOR_UNIT_TESTS) */
|
||||
|
||||
#endif /* defined(TORTLS_INTERNAL_H) */
|
432
src/lib/tls/tortls_nss.c
Normal file
432
src/lib/tls/tortls_nss.c
Normal file
@ -0,0 +1,432 @@
|
||||
/* Copyright (c) 2003, Roger Dingledine.
|
||||
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
||||
* Copyright (c) 2007-2018, The Tor Project, Inc. */
|
||||
/* See LICENSE for licensing information */
|
||||
|
||||
/**
|
||||
* \file tortls_nss.c
|
||||
* \brief Wrapper functions to present a consistent interface to
|
||||
* TLS and SSL X.509 functions from NSS.
|
||||
**/
|
||||
|
||||
#include "orconfig.h"
|
||||
|
||||
#define TORTLS_PRIVATE
|
||||
|
||||
#ifdef _WIN32 /*wrkard for dtls1.h >= 0.9.8m of "#include <winsock.h>"*/
|
||||
#include <winsock2.h>
|
||||
#include <ws2tcpip.h>
|
||||
#endif
|
||||
|
||||
#include "lib/crypt_ops/crypto_cipher.h"
|
||||
#include "lib/crypt_ops/crypto_rand.h"
|
||||
#include "lib/crypt_ops/crypto_dh.h"
|
||||
#include "lib/crypt_ops/crypto_util.h"
|
||||
#include "lib/tls/x509.h"
|
||||
#include "lib/tls/tortls.h"
|
||||
#include "lib/tls/tortls_internal.h"
|
||||
#include "lib/log/util_bug.h"
|
||||
|
||||
int
|
||||
tor_errno_to_tls_error(int e)
|
||||
{
|
||||
(void)e;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
int
|
||||
tor_tls_get_error(tor_tls_t *tls, int r, int extra,
|
||||
const char *doing, int severity, int domain)
|
||||
{
|
||||
(void)tls;
|
||||
(void)r;
|
||||
(void)extra;
|
||||
(void)doing;
|
||||
(void)severity;
|
||||
(void)domain;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
tor_tls_t *
|
||||
tor_tls_get_by_ssl(const struct ssl_st *ssl)
|
||||
{
|
||||
(void) ssl;
|
||||
// XXXX
|
||||
// XXXX refers to ssl_st.
|
||||
return NULL;
|
||||
}
|
||||
void
|
||||
tor_tls_allocate_tor_tls_object_ex_data_index(void)
|
||||
{
|
||||
// XXXX openssl only.
|
||||
}
|
||||
MOCK_IMPL(void,
|
||||
try_to_extract_certs_from_tls,(int severity, tor_tls_t *tls,
|
||||
tor_x509_cert_impl_t **cert_out,
|
||||
tor_x509_cert_impl_t **id_cert_out))
|
||||
{
|
||||
tor_assert(tls);
|
||||
tor_assert(cert_out);
|
||||
tor_assert(id_cert_out);
|
||||
(void)severity;
|
||||
// XXXX
|
||||
}
|
||||
int
|
||||
tor_tls_client_is_using_v2_ciphers(const struct ssl_st *ssl)
|
||||
{
|
||||
(void) ssl;
|
||||
// XXXX
|
||||
// XXXX refers to ssl_st.
|
||||
return 0;
|
||||
}
|
||||
|
||||
void
|
||||
tor_tls_debug_state_callback(const struct ssl_st *ssl,
|
||||
int type, int val)
|
||||
{
|
||||
(void) ssl;
|
||||
(void)type;
|
||||
(void)val;
|
||||
// XXXX
|
||||
// XXXX refers to ssl_st.
|
||||
}
|
||||
|
||||
void
|
||||
tor_tls_server_info_callback(const struct ssl_st *ssl,
|
||||
int type, int val)
|
||||
{
|
||||
(void)ssl;
|
||||
(void)type;
|
||||
(void)val;
|
||||
// XXXX
|
||||
// XXXX refers to ssl_st.
|
||||
}
|
||||
tor_tls_context_t *
|
||||
tor_tls_context_new(crypto_pk_t *identity,
|
||||
unsigned int key_lifetime, unsigned flags, int is_client)
|
||||
{
|
||||
tor_assert(identity);
|
||||
tor_assert(key_lifetime);
|
||||
(void)flags;
|
||||
(void)is_client;
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
int
|
||||
tor_tls_context_init_one(tor_tls_context_t **ppcontext,
|
||||
crypto_pk_t *identity,
|
||||
unsigned int key_lifetime,
|
||||
unsigned int flags,
|
||||
int is_client)
|
||||
{
|
||||
tor_assert(ppcontext);
|
||||
tor_assert(identity);
|
||||
tor_assert(key_lifetime);
|
||||
(void)flags;
|
||||
(void)is_client;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
|
||||
void
|
||||
tor_tls_get_state_description(tor_tls_t *tls, char *buf, size_t sz)
|
||||
{
|
||||
(void)tls;
|
||||
(void)buf;
|
||||
(void)sz;
|
||||
// XXXX
|
||||
}
|
||||
|
||||
void
|
||||
tor_tls_init(void)
|
||||
{
|
||||
// XXXX
|
||||
}
|
||||
void
|
||||
tls_log_errors(tor_tls_t *tls, int severity, int domain,
|
||||
const char *doing)
|
||||
{
|
||||
(void)tls;
|
||||
(void)severity;
|
||||
(void)domain;
|
||||
(void)doing;
|
||||
// XXXX
|
||||
}
|
||||
|
||||
tor_tls_t *
|
||||
tor_tls_new(int sock, int is_server)
|
||||
{
|
||||
(void)sock;
|
||||
(void)is_server;
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
void
|
||||
tor_tls_set_renegotiate_callback(tor_tls_t *tls,
|
||||
void (*cb)(tor_tls_t *, void *arg),
|
||||
void *arg)
|
||||
{
|
||||
tor_assert(tls);
|
||||
(void)cb;
|
||||
(void)arg;
|
||||
// XXXX;
|
||||
}
|
||||
|
||||
void
|
||||
tor_tls_free_(tor_tls_t *tls)
|
||||
{
|
||||
(void)tls;
|
||||
// XXXX
|
||||
}
|
||||
|
||||
int
|
||||
tor_tls_peer_has_cert(tor_tls_t *tls)
|
||||
{
|
||||
(void)tls;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
MOCK_IMPL(tor_x509_cert_t *,
|
||||
tor_tls_get_peer_cert,(tor_tls_t *tls))
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
MOCK_IMPL(tor_x509_cert_t *,
|
||||
tor_tls_get_own_cert,(tor_tls_t *tls))
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
int
|
||||
tor_tls_verify(int severity, tor_tls_t *tls, crypto_pk_t **identity)
|
||||
{
|
||||
tor_assert(tls);
|
||||
tor_assert(identity);
|
||||
(void)severity;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
int
|
||||
tor_tls_check_lifetime(int severity,
|
||||
tor_tls_t *tls, time_t now,
|
||||
int past_tolerance,
|
||||
int future_tolerance)
|
||||
{
|
||||
tor_assert(tls);
|
||||
(void)severity;
|
||||
(void)now;
|
||||
(void)past_tolerance;
|
||||
(void)future_tolerance;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
MOCK_IMPL(int,
|
||||
tor_tls_read, (tor_tls_t *tls, char *cp, size_t len))
|
||||
{
|
||||
tor_assert(tls);
|
||||
tor_assert(cp);
|
||||
(void)len;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
int
|
||||
tor_tls_write(tor_tls_t *tls, const char *cp, size_t n)
|
||||
{
|
||||
tor_assert(tls);
|
||||
tor_assert(cp);
|
||||
(void)n;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
int
|
||||
tor_tls_handshake(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
int
|
||||
tor_tls_finish_handshake(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
void
|
||||
tor_tls_unblock_renegotiation(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
}
|
||||
void
|
||||
tor_tls_block_renegotiation(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
}
|
||||
void
|
||||
tor_tls_assert_renegotiation_unblocked(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
}
|
||||
int
|
||||
tor_tls_shutdown(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
int
|
||||
tor_tls_get_pending_bytes(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
size_t
|
||||
tor_tls_get_forced_write_size(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return 0;
|
||||
}
|
||||
void
|
||||
tor_tls_get_n_raw_bytes(tor_tls_t *tls,
|
||||
size_t *n_read, size_t *n_written)
|
||||
{
|
||||
tor_assert(tls);
|
||||
tor_assert(n_read);
|
||||
tor_assert(n_written);
|
||||
// XXXX
|
||||
}
|
||||
|
||||
int
|
||||
tor_tls_get_buffer_sizes(tor_tls_t *tls,
|
||||
size_t *rbuf_capacity, size_t *rbuf_bytes,
|
||||
size_t *wbuf_capacity, size_t *wbuf_bytes)
|
||||
{
|
||||
tor_assert(tls);
|
||||
tor_assert(rbuf_capacity);
|
||||
tor_assert(rbuf_bytes);
|
||||
tor_assert(wbuf_capacity);
|
||||
tor_assert(wbuf_bytes);
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
MOCK_IMPL(double,
|
||||
tls_get_write_overhead_ratio, (void))
|
||||
{
|
||||
// XXXX
|
||||
return 0.0;
|
||||
}
|
||||
|
||||
int
|
||||
tor_tls_used_v1_handshake(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
int
|
||||
tor_tls_get_num_server_handshakes(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
int
|
||||
tor_tls_server_got_renegotiate(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
MOCK_IMPL(int,
|
||||
tor_tls_cert_matches_key,(const tor_tls_t *tls,
|
||||
const struct tor_x509_cert_t *cert))
|
||||
{
|
||||
tor_assert(tls);
|
||||
tor_assert(cert);
|
||||
// XXXX
|
||||
return 0;
|
||||
}
|
||||
MOCK_IMPL(int,
|
||||
tor_tls_get_tlssecrets,(tor_tls_t *tls, uint8_t *secrets_out))
|
||||
{
|
||||
tor_assert(tls);
|
||||
tor_assert(secrets_out);
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
MOCK_IMPL(int,
|
||||
tor_tls_export_key_material,(tor_tls_t *tls, uint8_t *secrets_out,
|
||||
const uint8_t *context,
|
||||
size_t context_len,
|
||||
const char *label))
|
||||
{
|
||||
tor_assert(tls);
|
||||
tor_assert(secrets_out);
|
||||
tor_assert(context);
|
||||
tor_assert(label);
|
||||
(void)context_len;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
|
||||
void
|
||||
check_no_tls_errors_(const char *fname, int line)
|
||||
{
|
||||
(void)fname;
|
||||
(void)line;
|
||||
// XXXX
|
||||
}
|
||||
void
|
||||
tor_tls_log_one_error(tor_tls_t *tls, unsigned long err,
|
||||
int severity, int domain, const char *doing)
|
||||
{
|
||||
tor_assert(tls);
|
||||
(void)err;
|
||||
(void)severity;
|
||||
(void)domain;
|
||||
(void)doing;
|
||||
// XXXX
|
||||
}
|
||||
|
||||
int
|
||||
tor_tls_get_my_certs(int server,
|
||||
const struct tor_x509_cert_t **link_cert_out,
|
||||
const struct tor_x509_cert_t **id_cert_out)
|
||||
{
|
||||
tor_assert(link_cert_out);
|
||||
tor_assert(id_cert_out);
|
||||
(void)server;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
|
||||
crypto_pk_t *
|
||||
tor_tls_get_my_client_auth_key(void)
|
||||
{
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
|
||||
const char *
|
||||
tor_tls_get_ciphersuite_name(tor_tls_t *tls)
|
||||
{
|
||||
tor_assert(tls);
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
|
||||
int
|
||||
evaluate_ecgroup_for_tls(const char *ecgroup)
|
||||
{
|
||||
(void)ecgroup;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
2032
src/lib/tls/tortls_openssl.c
Normal file
2032
src/lib/tls/tortls_openssl.c
Normal file
File diff suppressed because it is too large
Load Diff
@ -4,86 +4,15 @@
|
||||
/* See LICENSE for licensing information */
|
||||
|
||||
/**
|
||||
* \file x509.c
|
||||
* \file x509_openssl.c
|
||||
* \brief Wrapper functions to present a consistent interface to
|
||||
* X.509 functions from OpenSSL.
|
||||
* X.509 functions.
|
||||
**/
|
||||
|
||||
#define TOR_X509_PRIVATE
|
||||
#include "lib/tls/x509.h"
|
||||
#include "lib/tls/tortls.h"
|
||||
#include "lib/crypt_ops/crypto_rand.h"
|
||||
#include "lib/crypt_ops/crypto_util.h"
|
||||
#include "lib/crypt_ops/compat_openssl.h"
|
||||
|
||||
/* Some versions of OpenSSL declare SSL_get_selected_srtp_profile twice in
|
||||
* srtp.h. Suppress the GCC warning so we can build with -Wredundant-decl. */
|
||||
DISABLE_GCC_WARNING(redundant-decls)
|
||||
|
||||
#include <openssl/opensslv.h>
|
||||
|
||||
#ifdef OPENSSL_NO_EC
|
||||
#error "We require OpenSSL with ECC support"
|
||||
#endif
|
||||
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/asn1.h>
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/bn.h>
|
||||
#include <openssl/rsa.h>
|
||||
|
||||
ENABLE_GCC_WARNING(redundant-decls)
|
||||
|
||||
#include "lib/log/log.h"
|
||||
#include "lib/log/util_bug.h"
|
||||
#include "lib/ctime/di_ops.h"
|
||||
#include "lib/encoding/time_fmt.h"
|
||||
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
#ifdef OPENSSL_1_1_API
|
||||
#define X509_get_notBefore_const(cert) \
|
||||
X509_get0_notBefore(cert)
|
||||
#define X509_get_notAfter_const(cert) \
|
||||
X509_get0_notAfter(cert)
|
||||
#ifndef X509_get_notBefore
|
||||
#define X509_get_notBefore(cert) \
|
||||
X509_getm_notBefore(cert)
|
||||
#endif
|
||||
#ifndef X509_get_notAfter
|
||||
#define X509_get_notAfter(cert) \
|
||||
X509_getm_notAfter(cert)
|
||||
#endif
|
||||
#else /* ! OPENSSL_VERSION_NUMBER >= OPENSSL_V_SERIES(1,1,0) */
|
||||
#define X509_get_notBefore_const(cert) \
|
||||
((const ASN1_TIME*) X509_get_notBefore((X509 *)cert))
|
||||
#define X509_get_notAfter_const(cert) \
|
||||
((const ASN1_TIME*) X509_get_notAfter((X509 *)cert))
|
||||
#endif
|
||||
|
||||
/** Return a newly allocated X509 name with commonName <b>cname</b>. */
|
||||
static X509_NAME *
|
||||
tor_x509_name_new(const char *cname)
|
||||
{
|
||||
int nid;
|
||||
X509_NAME *name;
|
||||
/* LCOV_EXCL_BR_START : these branches will only fail on OOM errors */
|
||||
if (!(name = X509_NAME_new()))
|
||||
return NULL;
|
||||
if ((nid = OBJ_txt2nid("commonName")) == NID_undef) goto error;
|
||||
if (!(X509_NAME_add_entry_by_NID(name, nid, MBSTRING_ASC,
|
||||
(unsigned char*)cname, -1, -1, 0)))
|
||||
goto error;
|
||||
/* LCOV_EXCL_BR_STOP */
|
||||
return name;
|
||||
|
||||
/* LCOV_EXCL_START : these lines will only execute on out of memory errors*/
|
||||
error:
|
||||
X509_NAME_free(name);
|
||||
return NULL;
|
||||
/* LCOV_EXCL_STOP */
|
||||
}
|
||||
#include "lib/crypt_ops/crypto_rand.h"
|
||||
|
||||
/** Choose the start and end times for a certificate */
|
||||
void
|
||||
@ -121,221 +50,6 @@ tor_tls_pick_certificate_lifetime(time_t now,
|
||||
*end_time_out = end_time;
|
||||
}
|
||||
|
||||
/** Generate and sign an X509 certificate with the public key <b>rsa</b>,
|
||||
* signed by the private key <b>rsa_sign</b>. The commonName of the
|
||||
* certificate will be <b>cname</b>; the commonName of the issuer will be
|
||||
* <b>cname_sign</b>. The cert will be valid for <b>cert_lifetime</b>
|
||||
* seconds, starting from some time in the past.
|
||||
*
|
||||
* Return a certificate on success, NULL on failure.
|
||||
*/
|
||||
MOCK_IMPL(X509 *,
|
||||
tor_tls_create_certificate,(crypto_pk_t *rsa,
|
||||
crypto_pk_t *rsa_sign,
|
||||
const char *cname,
|
||||
const char *cname_sign,
|
||||
unsigned int cert_lifetime))
|
||||
{
|
||||
/* OpenSSL generates self-signed certificates with random 64-bit serial
|
||||
* numbers, so let's do that too. */
|
||||
#define SERIAL_NUMBER_SIZE 8
|
||||
|
||||
time_t start_time, end_time;
|
||||
BIGNUM *serial_number = NULL;
|
||||
unsigned char serial_tmp[SERIAL_NUMBER_SIZE];
|
||||
EVP_PKEY *sign_pkey = NULL, *pkey=NULL;
|
||||
X509 *x509 = NULL;
|
||||
X509_NAME *name = NULL, *name_issuer=NULL;
|
||||
|
||||
tor_tls_init();
|
||||
|
||||
time_t now = time(NULL);
|
||||
|
||||
tor_tls_pick_certificate_lifetime(now, cert_lifetime,
|
||||
&start_time, &end_time);
|
||||
|
||||
tor_assert(rsa);
|
||||
tor_assert(cname);
|
||||
tor_assert(rsa_sign);
|
||||
tor_assert(cname_sign);
|
||||
if (!(sign_pkey = crypto_pk_get_openssl_evp_pkey_(rsa_sign,1)))
|
||||
goto error;
|
||||
if (!(pkey = crypto_pk_get_openssl_evp_pkey_(rsa,0)))
|
||||
goto error;
|
||||
if (!(x509 = X509_new()))
|
||||
goto error;
|
||||
if (!(X509_set_version(x509, 2)))
|
||||
goto error;
|
||||
|
||||
{ /* our serial number is 8 random bytes. */
|
||||
crypto_rand((char *)serial_tmp, sizeof(serial_tmp));
|
||||
if (!(serial_number = BN_bin2bn(serial_tmp, sizeof(serial_tmp), NULL)))
|
||||
goto error;
|
||||
if (!(BN_to_ASN1_INTEGER(serial_number, X509_get_serialNumber(x509))))
|
||||
goto error;
|
||||
}
|
||||
|
||||
if (!(name = tor_x509_name_new(cname)))
|
||||
goto error;
|
||||
if (!(X509_set_subject_name(x509, name)))
|
||||
goto error;
|
||||
if (!(name_issuer = tor_x509_name_new(cname_sign)))
|
||||
goto error;
|
||||
if (!(X509_set_issuer_name(x509, name_issuer)))
|
||||
goto error;
|
||||
|
||||
if (!X509_time_adj(X509_get_notBefore(x509),0,&start_time))
|
||||
goto error;
|
||||
if (!X509_time_adj(X509_get_notAfter(x509),0,&end_time))
|
||||
goto error;
|
||||
if (!X509_set_pubkey(x509, pkey))
|
||||
goto error;
|
||||
|
||||
if (!X509_sign(x509, sign_pkey, EVP_sha256()))
|
||||
goto error;
|
||||
|
||||
goto done;
|
||||
error:
|
||||
if (x509) {
|
||||
X509_free(x509);
|
||||
x509 = NULL;
|
||||
}
|
||||
done:
|
||||
tls_log_errors(NULL, LOG_WARN, LD_NET, "generating certificate");
|
||||
if (sign_pkey)
|
||||
EVP_PKEY_free(sign_pkey);
|
||||
if (pkey)
|
||||
EVP_PKEY_free(pkey);
|
||||
if (serial_number)
|
||||
BN_clear_free(serial_number);
|
||||
if (name)
|
||||
X509_NAME_free(name);
|
||||
if (name_issuer)
|
||||
X509_NAME_free(name_issuer);
|
||||
return x509;
|
||||
|
||||
#undef SERIAL_NUMBER_SIZE
|
||||
}
|
||||
|
||||
/** Free all storage held in <b>cert</b> */
|
||||
void
|
||||
tor_x509_cert_free_(tor_x509_cert_t *cert)
|
||||
{
|
||||
if (! cert)
|
||||
return;
|
||||
if (cert->cert)
|
||||
X509_free(cert->cert);
|
||||
tor_free(cert->encoded);
|
||||
memwipe(cert, 0x03, sizeof(*cert));
|
||||
/* LCOV_EXCL_BR_START since cert will never be NULL here */
|
||||
tor_free(cert);
|
||||
/* LCOV_EXCL_BR_STOP */
|
||||
}
|
||||
|
||||
/**
|
||||
* Allocate a new tor_x509_cert_t to hold the certificate "x509_cert".
|
||||
*
|
||||
* Steals a reference to x509_cert.
|
||||
*/
|
||||
MOCK_IMPL(tor_x509_cert_t *,
|
||||
tor_x509_cert_new,(X509 *x509_cert))
|
||||
{
|
||||
tor_x509_cert_t *cert;
|
||||
EVP_PKEY *pkey;
|
||||
RSA *rsa;
|
||||
int length;
|
||||
unsigned char *buf = NULL;
|
||||
|
||||
if (!x509_cert)
|
||||
return NULL;
|
||||
|
||||
length = i2d_X509(x509_cert, &buf);
|
||||
cert = tor_malloc_zero(sizeof(tor_x509_cert_t));
|
||||
if (length <= 0 || buf == NULL) {
|
||||
goto err;
|
||||
}
|
||||
cert->encoded_len = (size_t) length;
|
||||
cert->encoded = tor_malloc(length);
|
||||
memcpy(cert->encoded, buf, length);
|
||||
OPENSSL_free(buf);
|
||||
|
||||
cert->cert = x509_cert;
|
||||
|
||||
crypto_common_digests(&cert->cert_digests,
|
||||
(char*)cert->encoded, cert->encoded_len);
|
||||
|
||||
if ((pkey = X509_get_pubkey(x509_cert)) &&
|
||||
(rsa = EVP_PKEY_get1_RSA(pkey))) {
|
||||
crypto_pk_t *pk = crypto_new_pk_from_openssl_rsa_(rsa);
|
||||
if (crypto_pk_get_common_digests(pk, &cert->pkey_digests) < 0) {
|
||||
crypto_pk_free(pk);
|
||||
EVP_PKEY_free(pkey);
|
||||
goto err;
|
||||
}
|
||||
|
||||
cert->pkey_digests_set = 1;
|
||||
crypto_pk_free(pk);
|
||||
EVP_PKEY_free(pkey);
|
||||
}
|
||||
|
||||
return cert;
|
||||
err:
|
||||
/* LCOV_EXCL_START for the same reason as the exclusion above */
|
||||
tor_free(cert);
|
||||
log_err(LD_CRYPTO, "Couldn't wrap encoded X509 certificate.");
|
||||
X509_free(x509_cert);
|
||||
return NULL;
|
||||
/* LCOV_EXCL_STOP */
|
||||
}
|
||||
|
||||
/** Return a new copy of <b>cert</b>. */
|
||||
tor_x509_cert_t *
|
||||
tor_x509_cert_dup(const tor_x509_cert_t *cert)
|
||||
{
|
||||
tor_assert(cert);
|
||||
X509 *x509 = cert->cert;
|
||||
return tor_x509_cert_new(X509_dup(x509));
|
||||
}
|
||||
|
||||
/** Read a DER-encoded X509 cert, of length exactly <b>certificate_len</b>,
|
||||
* from a <b>certificate</b>. Return a newly allocated tor_x509_cert_t on
|
||||
* success and NULL on failure. */
|
||||
tor_x509_cert_t *
|
||||
tor_x509_cert_decode(const uint8_t *certificate, size_t certificate_len)
|
||||
{
|
||||
X509 *x509;
|
||||
const unsigned char *cp = (const unsigned char *)certificate;
|
||||
tor_x509_cert_t *newcert;
|
||||
tor_assert(certificate);
|
||||
check_no_tls_errors();
|
||||
|
||||
if (certificate_len > INT_MAX)
|
||||
goto err;
|
||||
|
||||
x509 = d2i_X509(NULL, &cp, (int)certificate_len);
|
||||
|
||||
if (!x509)
|
||||
goto err; /* Couldn't decode */
|
||||
if (cp - certificate != (int)certificate_len) {
|
||||
X509_free(x509);
|
||||
goto err; /* Didn't use all the bytes */
|
||||
}
|
||||
newcert = tor_x509_cert_new(x509);
|
||||
if (!newcert) {
|
||||
goto err;
|
||||
}
|
||||
if (newcert->encoded_len != certificate_len ||
|
||||
fast_memneq(newcert->encoded, certificate, certificate_len)) {
|
||||
/* Cert wasn't in DER */
|
||||
tor_x509_cert_free(newcert);
|
||||
goto err;
|
||||
}
|
||||
return newcert;
|
||||
err:
|
||||
tls_log_errors(NULL, LOG_INFO, LD_CRYPTO, "decoding a certificate");
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/** Set *<b>encoded_out</b> and *<b>size_out</b> to <b>cert</b>'s encoded DER
|
||||
* representation and length, respectively. */
|
||||
void
|
||||
@ -375,190 +89,3 @@ tor_x509_cert_get_cert_digests(const tor_x509_cert_t *cert)
|
||||
return &cert->cert_digests;
|
||||
}
|
||||
|
||||
/**
|
||||
* Return a newly allocated copy of the public key that a certificate
|
||||
* certifies. Watch out! This returns NULL if the cert's key is not RSA.
|
||||
*/
|
||||
crypto_pk_t *
|
||||
tor_tls_cert_get_key(tor_x509_cert_t *cert)
|
||||
{
|
||||
crypto_pk_t *result = NULL;
|
||||
EVP_PKEY *pkey = X509_get_pubkey(cert->cert);
|
||||
RSA *rsa;
|
||||
if (!pkey)
|
||||
return NULL;
|
||||
rsa = EVP_PKEY_get1_RSA(pkey);
|
||||
if (!rsa) {
|
||||
EVP_PKEY_free(pkey);
|
||||
return NULL;
|
||||
}
|
||||
result = crypto_new_pk_from_openssl_rsa_(rsa);
|
||||
EVP_PKEY_free(pkey);
|
||||
return result;
|
||||
}
|
||||
|
||||
/** Check whether <b>cert</b> is well-formed, currently live, and correctly
|
||||
* signed by the public key in <b>signing_cert</b>. If <b>check_rsa_1024</b>,
|
||||
* make sure that it has an RSA key with 1024 bits; otherwise, just check that
|
||||
* the key is long enough. Return 1 if the cert is good, and 0 if it's bad or
|
||||
* we couldn't check it. */
|
||||
int
|
||||
tor_tls_cert_is_valid(int severity,
|
||||
const tor_x509_cert_t *cert,
|
||||
const tor_x509_cert_t *signing_cert,
|
||||
time_t now,
|
||||
int check_rsa_1024)
|
||||
{
|
||||
check_no_tls_errors();
|
||||
EVP_PKEY *cert_key;
|
||||
int r, key_ok = 0;
|
||||
|
||||
if (!signing_cert || !cert)
|
||||
goto bad;
|
||||
|
||||
EVP_PKEY *signing_key = X509_get_pubkey(signing_cert->cert);
|
||||
if (!signing_key)
|
||||
goto bad;
|
||||
r = X509_verify(cert->cert, signing_key);
|
||||
EVP_PKEY_free(signing_key);
|
||||
if (r <= 0)
|
||||
goto bad;
|
||||
|
||||
/* okay, the signature checked out right. Now let's check the check the
|
||||
* lifetime. */
|
||||
if (tor_x509_check_cert_lifetime_internal(severity, cert->cert, now,
|
||||
48*60*60, 30*24*60*60) < 0)
|
||||
goto bad;
|
||||
|
||||
cert_key = X509_get_pubkey(cert->cert);
|
||||
if (check_rsa_1024 && cert_key) {
|
||||
RSA *rsa = EVP_PKEY_get1_RSA(cert_key);
|
||||
#ifdef OPENSSL_1_1_API
|
||||
if (rsa && RSA_bits(rsa) == 1024)
|
||||
#else
|
||||
if (rsa && BN_num_bits(rsa->n) == 1024)
|
||||
#endif
|
||||
key_ok = 1;
|
||||
if (rsa)
|
||||
RSA_free(rsa);
|
||||
} else if (cert_key) {
|
||||
int min_bits = 1024;
|
||||
#ifdef EVP_PKEY_EC
|
||||
if (EVP_PKEY_base_id(cert_key) == EVP_PKEY_EC)
|
||||
min_bits = 128;
|
||||
#endif
|
||||
if (EVP_PKEY_bits(cert_key) >= min_bits)
|
||||
key_ok = 1;
|
||||
}
|
||||
EVP_PKEY_free(cert_key);
|
||||
if (!key_ok)
|
||||
goto bad;
|
||||
|
||||
/* XXXX compare DNs or anything? */
|
||||
|
||||
return 1;
|
||||
bad:
|
||||
tls_log_errors(NULL, LOG_INFO, LD_CRYPTO, "checking a certificate");
|
||||
return 0;
|
||||
}
|
||||
|
||||
/** Warn that a certificate lifetime extends through a certain range. */
|
||||
static void
|
||||
log_cert_lifetime(int severity, const X509 *cert, const char *problem,
|
||||
time_t now)
|
||||
{
|
||||
BIO *bio = NULL;
|
||||
BUF_MEM *buf;
|
||||
char *s1=NULL, *s2=NULL;
|
||||
char mytime[33];
|
||||
struct tm tm;
|
||||
size_t n;
|
||||
|
||||
if (problem)
|
||||
tor_log(severity, LD_GENERAL,
|
||||
"Certificate %s. Either their clock is set wrong, or your clock "
|
||||
"is wrong.",
|
||||
problem);
|
||||
|
||||
if (!(bio = BIO_new(BIO_s_mem()))) {
|
||||
log_warn(LD_GENERAL, "Couldn't allocate BIO!"); goto end;
|
||||
}
|
||||
if (!(ASN1_TIME_print(bio, X509_get_notBefore_const(cert)))) {
|
||||
tls_log_errors(NULL, LOG_WARN, LD_NET, "printing certificate lifetime");
|
||||
goto end;
|
||||
}
|
||||
BIO_get_mem_ptr(bio, &buf);
|
||||
s1 = tor_strndup(buf->data, buf->length);
|
||||
|
||||
(void)BIO_reset(bio);
|
||||
if (!(ASN1_TIME_print(bio, X509_get_notAfter_const(cert)))) {
|
||||
tls_log_errors(NULL, LOG_WARN, LD_NET, "printing certificate lifetime");
|
||||
goto end;
|
||||
}
|
||||
BIO_get_mem_ptr(bio, &buf);
|
||||
s2 = tor_strndup(buf->data, buf->length);
|
||||
|
||||
n = strftime(mytime, 32, "%b %d %H:%M:%S %Y UTC", tor_gmtime_r(&now, &tm));
|
||||
if (n > 0) {
|
||||
tor_log(severity, LD_GENERAL,
|
||||
"(certificate lifetime runs from %s through %s. Your time is %s.)",
|
||||
s1,s2,mytime);
|
||||
} else {
|
||||
tor_log(severity, LD_GENERAL,
|
||||
"(certificate lifetime runs from %s through %s. "
|
||||
"Couldn't get your time.)",
|
||||
s1, s2);
|
||||
}
|
||||
|
||||
end:
|
||||
/* Not expected to get invoked */
|
||||
tls_log_errors(NULL, LOG_WARN, LD_NET, "getting certificate lifetime");
|
||||
if (bio)
|
||||
BIO_free(bio);
|
||||
tor_free(s1);
|
||||
tor_free(s2);
|
||||
}
|
||||
|
||||
/** Helper: check whether <b>cert</b> is expired give or take
|
||||
* <b>past_tolerance</b> seconds, or not-yet-valid give or take
|
||||
* <b>future_tolerance</b> seconds. (Relative to the current time
|
||||
* <b>now</b>.) If it is live, return 0. If it is not live, log a message
|
||||
* and return -1. */
|
||||
int
|
||||
tor_x509_check_cert_lifetime_internal(int severity, const X509 *cert,
|
||||
time_t now,
|
||||
int past_tolerance, int future_tolerance)
|
||||
{
|
||||
time_t t;
|
||||
|
||||
t = now + future_tolerance;
|
||||
if (X509_cmp_time(X509_get_notBefore_const(cert), &t) > 0) {
|
||||
log_cert_lifetime(severity, cert, "not yet valid", now);
|
||||
return -1;
|
||||
}
|
||||
t = now - past_tolerance;
|
||||
if (X509_cmp_time(X509_get_notAfter_const(cert), &t) < 0) {
|
||||
log_cert_lifetime(severity, cert, "already expired", now);
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
#ifdef TOR_UNIT_TESTS
|
||||
/* Testing only: return a new x509 cert with the same contents as <b>inp</b>,
|
||||
but with the expiration time <b>new_expiration_time</b>, signed with
|
||||
<b>signing_key</b>. */
|
||||
STATIC tor_x509_cert_t *
|
||||
tor_x509_cert_replace_expiration(const tor_x509_cert_t *inp,
|
||||
time_t new_expiration_time,
|
||||
crypto_pk_t *signing_key)
|
||||
{
|
||||
X509 *newc = X509_dup(inp->cert);
|
||||
X509_time_adj(X509_get_notAfter(newc), 0, &new_expiration_time);
|
||||
EVP_PKEY *pk = crypto_pk_get_openssl_evp_pkey_(signing_key, 1);
|
||||
tor_assert(X509_sign(newc, pk, EVP_sha256()));
|
||||
EVP_PKEY_free(pk);
|
||||
return tor_x509_cert_new(newc);
|
||||
}
|
||||
#endif /* defined(TOR_UNIT_TESTS) */
|
||||
|
@ -17,7 +17,9 @@
|
||||
/* Opaque structure to hold an X509 certificate. */
|
||||
typedef struct tor_x509_cert_t tor_x509_cert_t;
|
||||
|
||||
#ifdef ENABLE_OPENSSL
|
||||
#ifdef ENABLE_NSS
|
||||
typedef struct CERTCertificateStr tor_x509_cert_impl_t;
|
||||
#elif defined(ENABLE_OPENSSL)
|
||||
typedef struct x509_st tor_x509_cert_impl_t;
|
||||
#endif
|
||||
|
||||
|
122
src/lib/tls/x509_nss.c
Normal file
122
src/lib/tls/x509_nss.c
Normal file
@ -0,0 +1,122 @@
|
||||
/* Copyright (c) 2003, Roger Dingledine.
|
||||
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
||||
* Copyright (c) 2007-2018, The Tor Project, Inc. */
|
||||
/* See LICENSE for licensing information */
|
||||
|
||||
/**
|
||||
* \file x509_nss.c
|
||||
* \brief Wrapper functions to present a consistent interface to
|
||||
* X.509 functions from NSS.
|
||||
**/
|
||||
|
||||
#define TOR_X509_PRIVATE
|
||||
#include "lib/tls/x509.h"
|
||||
#include "lib/tls/tortls.h"
|
||||
#include "lib/crypt_ops/crypto_rand.h"
|
||||
#include "lib/crypt_ops/crypto_util.h"
|
||||
#include "lib/log/util_bug.h"
|
||||
|
||||
MOCK_IMPL(tor_x509_cert_impl_t *,
|
||||
tor_tls_create_certificate,(crypto_pk_t *rsa,
|
||||
crypto_pk_t *rsa_sign,
|
||||
const char *cname,
|
||||
const char *cname_sign,
|
||||
unsigned int cert_lifetime))
|
||||
{
|
||||
tor_assert(rsa);
|
||||
tor_assert(rsa_sign);
|
||||
tor_assert(cname);
|
||||
tor_assert(cname_sign);
|
||||
(void) cert_lifetime;
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
|
||||
MOCK_IMPL(tor_x509_cert_t *,
|
||||
tor_x509_cert_new,(tor_x509_cert_impl_t *x509_cert))
|
||||
{
|
||||
tor_assert(x509_cert);
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
|
||||
tor_x509_cert_t *
|
||||
tor_x509_cert_dup(const tor_x509_cert_t *cert)
|
||||
{
|
||||
tor_assert(cert);
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
|
||||
void
|
||||
tor_x509_cert_free_(tor_x509_cert_t *cert)
|
||||
{
|
||||
(void)cert;
|
||||
// XXXX
|
||||
}
|
||||
|
||||
tor_x509_cert_t *
|
||||
tor_x509_cert_decode(const uint8_t *certificate,
|
||||
size_t certificate_len)
|
||||
{
|
||||
tor_assert(certificate);
|
||||
(void) certificate_len;
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
|
||||
crypto_pk_t *
|
||||
tor_tls_cert_get_key(tor_x509_cert_t *cert)
|
||||
{
|
||||
tor_assert(cert);
|
||||
// XXXXX
|
||||
return NULL;
|
||||
}
|
||||
|
||||
int
|
||||
tor_tls_cert_is_valid(int severity,
|
||||
const tor_x509_cert_t *cert,
|
||||
const tor_x509_cert_t *signing_cert,
|
||||
time_t now,
|
||||
int check_rsa_1024)
|
||||
{
|
||||
tor_assert(cert);
|
||||
tor_assert(signing_cert);
|
||||
(void)severity;
|
||||
(void)now;
|
||||
(void)check_rsa_1024;
|
||||
// XXXXX
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int
|
||||
tor_x509_check_cert_lifetime_internal(int severity,
|
||||
const tor_x509_cert_impl_t *cert,
|
||||
time_t now,
|
||||
int past_tolerance,
|
||||
int future_tolerance)
|
||||
{
|
||||
tor_assert(cert);
|
||||
(void)severity;
|
||||
(void)now;
|
||||
(void)past_tolerance;
|
||||
(void)future_tolerance;
|
||||
// XXXX
|
||||
return -1;
|
||||
}
|
||||
|
||||
#ifdef TOR_UNIT_TESTS
|
||||
tor_x509_cert_t *
|
||||
tor_x509_cert_replace_expiration(const tor_x509_cert_t *inp,
|
||||
time_t new_expiration_time,
|
||||
crypto_pk_t *signing_key)
|
||||
{
|
||||
tor_assert(inp);
|
||||
tor_assert(signing_key);
|
||||
(void)new_expiration_time;
|
||||
|
||||
// XXXX
|
||||
return NULL;
|
||||
}
|
||||
#endif
|
489
src/lib/tls/x509_openssl.c
Normal file
489
src/lib/tls/x509_openssl.c
Normal file
@ -0,0 +1,489 @@
|
||||
/* Copyright (c) 2003, Roger Dingledine.
|
||||
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
||||
* Copyright (c) 2007-2018, The Tor Project, Inc. */
|
||||
/* See LICENSE for licensing information */
|
||||
|
||||
/**
|
||||
* \file x509_openssl.c
|
||||
* \brief Wrapper functions to present a consistent interface to
|
||||
* X.509 functions from OpenSSL.
|
||||
**/
|
||||
|
||||
#define TOR_X509_PRIVATE
|
||||
#include "lib/tls/x509.h"
|
||||
#include "lib/tls/tortls.h"
|
||||
#include "lib/crypt_ops/crypto_rand.h"
|
||||
#include "lib/crypt_ops/crypto_util.h"
|
||||
#include "lib/crypt_ops/compat_openssl.h"
|
||||
|
||||
/* Some versions of OpenSSL declare SSL_get_selected_srtp_profile twice in
|
||||
* srtp.h. Suppress the GCC warning so we can build with -Wredundant-decl. */
|
||||
DISABLE_GCC_WARNING(redundant-decls)
|
||||
|
||||
#include <openssl/opensslv.h>
|
||||
|
||||
#ifdef OPENSSL_NO_EC
|
||||
#error "We require OpenSSL with ECC support"
|
||||
#endif
|
||||
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/asn1.h>
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/bn.h>
|
||||
#include <openssl/rsa.h>
|
||||
|
||||
ENABLE_GCC_WARNING(redundant-decls)
|
||||
|
||||
#include "lib/log/log.h"
|
||||
#include "lib/log/util_bug.h"
|
||||
#include "lib/ctime/di_ops.h"
|
||||
#include "lib/encoding/time_fmt.h"
|
||||
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
#ifdef OPENSSL_1_1_API
|
||||
#define X509_get_notBefore_const(cert) \
|
||||
X509_get0_notBefore(cert)
|
||||
#define X509_get_notAfter_const(cert) \
|
||||
X509_get0_notAfter(cert)
|
||||
#ifndef X509_get_notBefore
|
||||
#define X509_get_notBefore(cert) \
|
||||
X509_getm_notBefore(cert)
|
||||
#endif
|
||||
#ifndef X509_get_notAfter
|
||||
#define X509_get_notAfter(cert) \
|
||||
X509_getm_notAfter(cert)
|
||||
#endif
|
||||
#else /* ! OPENSSL_VERSION_NUMBER >= OPENSSL_V_SERIES(1,1,0) */
|
||||
#define X509_get_notBefore_const(cert) \
|
||||
((const ASN1_TIME*) X509_get_notBefore((X509 *)cert))
|
||||
#define X509_get_notAfter_const(cert) \
|
||||
((const ASN1_TIME*) X509_get_notAfter((X509 *)cert))
|
||||
#endif
|
||||
|
||||
/** Return a newly allocated X509 name with commonName <b>cname</b>. */
|
||||
static X509_NAME *
|
||||
tor_x509_name_new(const char *cname)
|
||||
{
|
||||
int nid;
|
||||
X509_NAME *name;
|
||||
/* LCOV_EXCL_BR_START : these branches will only fail on OOM errors */
|
||||
if (!(name = X509_NAME_new()))
|
||||
return NULL;
|
||||
if ((nid = OBJ_txt2nid("commonName")) == NID_undef) goto error;
|
||||
if (!(X509_NAME_add_entry_by_NID(name, nid, MBSTRING_ASC,
|
||||
(unsigned char*)cname, -1, -1, 0)))
|
||||
goto error;
|
||||
/* LCOV_EXCL_BR_STOP */
|
||||
return name;
|
||||
|
||||
/* LCOV_EXCL_START : these lines will only execute on out of memory errors*/
|
||||
error:
|
||||
X509_NAME_free(name);
|
||||
return NULL;
|
||||
/* LCOV_EXCL_STOP */
|
||||
}
|
||||
|
||||
/** Generate and sign an X509 certificate with the public key <b>rsa</b>,
|
||||
* signed by the private key <b>rsa_sign</b>. The commonName of the
|
||||
* certificate will be <b>cname</b>; the commonName of the issuer will be
|
||||
* <b>cname_sign</b>. The cert will be valid for <b>cert_lifetime</b>
|
||||
* seconds, starting from some time in the past.
|
||||
*
|
||||
* Return a certificate on success, NULL on failure.
|
||||
*/
|
||||
MOCK_IMPL(X509 *,
|
||||
tor_tls_create_certificate,(crypto_pk_t *rsa,
|
||||
crypto_pk_t *rsa_sign,
|
||||
const char *cname,
|
||||
const char *cname_sign,
|
||||
unsigned int cert_lifetime))
|
||||
{
|
||||
/* OpenSSL generates self-signed certificates with random 64-bit serial
|
||||
* numbers, so let's do that too. */
|
||||
#define SERIAL_NUMBER_SIZE 8
|
||||
|
||||
time_t start_time, end_time;
|
||||
BIGNUM *serial_number = NULL;
|
||||
unsigned char serial_tmp[SERIAL_NUMBER_SIZE];
|
||||
EVP_PKEY *sign_pkey = NULL, *pkey=NULL;
|
||||
X509 *x509 = NULL;
|
||||
X509_NAME *name = NULL, *name_issuer=NULL;
|
||||
|
||||
tor_tls_init();
|
||||
|
||||
time_t now = time(NULL);
|
||||
|
||||
tor_tls_pick_certificate_lifetime(now, cert_lifetime,
|
||||
&start_time, &end_time);
|
||||
|
||||
tor_assert(rsa);
|
||||
tor_assert(cname);
|
||||
tor_assert(rsa_sign);
|
||||
tor_assert(cname_sign);
|
||||
if (!(sign_pkey = crypto_pk_get_openssl_evp_pkey_(rsa_sign,1)))
|
||||
goto error;
|
||||
if (!(pkey = crypto_pk_get_openssl_evp_pkey_(rsa,0)))
|
||||
goto error;
|
||||
if (!(x509 = X509_new()))
|
||||
goto error;
|
||||
if (!(X509_set_version(x509, 2)))
|
||||
goto error;
|
||||
|
||||
{ /* our serial number is 8 random bytes. */
|
||||
crypto_rand((char *)serial_tmp, sizeof(serial_tmp));
|
||||
if (!(serial_number = BN_bin2bn(serial_tmp, sizeof(serial_tmp), NULL)))
|
||||
goto error;
|
||||
if (!(BN_to_ASN1_INTEGER(serial_number, X509_get_serialNumber(x509))))
|
||||
goto error;
|
||||
}
|
||||
|
||||
if (!(name = tor_x509_name_new(cname)))
|
||||
goto error;
|
||||
if (!(X509_set_subject_name(x509, name)))
|
||||
goto error;
|
||||
if (!(name_issuer = tor_x509_name_new(cname_sign)))
|
||||
goto error;
|
||||
if (!(X509_set_issuer_name(x509, name_issuer)))
|
||||
goto error;
|
||||
|
||||
if (!X509_time_adj(X509_get_notBefore(x509),0,&start_time))
|
||||
goto error;
|
||||
if (!X509_time_adj(X509_get_notAfter(x509),0,&end_time))
|
||||
goto error;
|
||||
if (!X509_set_pubkey(x509, pkey))
|
||||
goto error;
|
||||
|
||||
if (!X509_sign(x509, sign_pkey, EVP_sha256()))
|
||||
goto error;
|
||||
|
||||
goto done;
|
||||
error:
|
||||
if (x509) {
|
||||
X509_free(x509);
|
||||
x509 = NULL;
|
||||
}
|
||||
done:
|
||||
tls_log_errors(NULL, LOG_WARN, LD_NET, "generating certificate");
|
||||
if (sign_pkey)
|
||||
EVP_PKEY_free(sign_pkey);
|
||||
if (pkey)
|
||||
EVP_PKEY_free(pkey);
|
||||
if (serial_number)
|
||||
BN_clear_free(serial_number);
|
||||
if (name)
|
||||
X509_NAME_free(name);
|
||||
if (name_issuer)
|
||||
X509_NAME_free(name_issuer);
|
||||
return x509;
|
||||
|
||||
#undef SERIAL_NUMBER_SIZE
|
||||
}
|
||||
|
||||
/** Free all storage held in <b>cert</b> */
|
||||
void
|
||||
tor_x509_cert_free_(tor_x509_cert_t *cert)
|
||||
{
|
||||
if (! cert)
|
||||
return;
|
||||
if (cert->cert)
|
||||
X509_free(cert->cert);
|
||||
tor_free(cert->encoded);
|
||||
memwipe(cert, 0x03, sizeof(*cert));
|
||||
/* LCOV_EXCL_BR_START since cert will never be NULL here */
|
||||
tor_free(cert);
|
||||
/* LCOV_EXCL_BR_STOP */
|
||||
}
|
||||
|
||||
/**
|
||||
* Allocate a new tor_x509_cert_t to hold the certificate "x509_cert".
|
||||
*
|
||||
* Steals a reference to x509_cert.
|
||||
*/
|
||||
MOCK_IMPL(tor_x509_cert_t *,
|
||||
tor_x509_cert_new,(X509 *x509_cert))
|
||||
{
|
||||
tor_x509_cert_t *cert;
|
||||
EVP_PKEY *pkey;
|
||||
RSA *rsa;
|
||||
int length;
|
||||
unsigned char *buf = NULL;
|
||||
|
||||
if (!x509_cert)
|
||||
return NULL;
|
||||
|
||||
length = i2d_X509(x509_cert, &buf);
|
||||
cert = tor_malloc_zero(sizeof(tor_x509_cert_t));
|
||||
if (length <= 0 || buf == NULL) {
|
||||
goto err;
|
||||
}
|
||||
cert->encoded_len = (size_t) length;
|
||||
cert->encoded = tor_malloc(length);
|
||||
memcpy(cert->encoded, buf, length);
|
||||
OPENSSL_free(buf);
|
||||
|
||||
cert->cert = x509_cert;
|
||||
|
||||
crypto_common_digests(&cert->cert_digests,
|
||||
(char*)cert->encoded, cert->encoded_len);
|
||||
|
||||
if ((pkey = X509_get_pubkey(x509_cert)) &&
|
||||
(rsa = EVP_PKEY_get1_RSA(pkey))) {
|
||||
crypto_pk_t *pk = crypto_new_pk_from_openssl_rsa_(rsa);
|
||||
if (crypto_pk_get_common_digests(pk, &cert->pkey_digests) < 0) {
|
||||
crypto_pk_free(pk);
|
||||
EVP_PKEY_free(pkey);
|
||||
goto err;
|
||||
}
|
||||
|
||||
cert->pkey_digests_set = 1;
|
||||
crypto_pk_free(pk);
|
||||
EVP_PKEY_free(pkey);
|
||||
}
|
||||
|
||||
return cert;
|
||||
err:
|
||||
/* LCOV_EXCL_START for the same reason as the exclusion above */
|
||||
tor_free(cert);
|
||||
log_err(LD_CRYPTO, "Couldn't wrap encoded X509 certificate.");
|
||||
X509_free(x509_cert);
|
||||
return NULL;
|
||||
/* LCOV_EXCL_STOP */
|
||||
}
|
||||
|
||||
/** Return a new copy of <b>cert</b>. */
|
||||
tor_x509_cert_t *
|
||||
tor_x509_cert_dup(const tor_x509_cert_t *cert)
|
||||
{
|
||||
tor_assert(cert);
|
||||
X509 *x509 = cert->cert;
|
||||
return tor_x509_cert_new(X509_dup(x509));
|
||||
}
|
||||
|
||||
/** Read a DER-encoded X509 cert, of length exactly <b>certificate_len</b>,
|
||||
* from a <b>certificate</b>. Return a newly allocated tor_x509_cert_t on
|
||||
* success and NULL on failure. */
|
||||
tor_x509_cert_t *
|
||||
tor_x509_cert_decode(const uint8_t *certificate, size_t certificate_len)
|
||||
{
|
||||
X509 *x509;
|
||||
const unsigned char *cp = (const unsigned char *)certificate;
|
||||
tor_x509_cert_t *newcert;
|
||||
tor_assert(certificate);
|
||||
check_no_tls_errors();
|
||||
|
||||
if (certificate_len > INT_MAX)
|
||||
goto err;
|
||||
|
||||
x509 = d2i_X509(NULL, &cp, (int)certificate_len);
|
||||
|
||||
if (!x509)
|
||||
goto err; /* Couldn't decode */
|
||||
if (cp - certificate != (int)certificate_len) {
|
||||
X509_free(x509);
|
||||
goto err; /* Didn't use all the bytes */
|
||||
}
|
||||
newcert = tor_x509_cert_new(x509);
|
||||
if (!newcert) {
|
||||
goto err;
|
||||
}
|
||||
if (newcert->encoded_len != certificate_len ||
|
||||
fast_memneq(newcert->encoded, certificate, certificate_len)) {
|
||||
/* Cert wasn't in DER */
|
||||
tor_x509_cert_free(newcert);
|
||||
goto err;
|
||||
}
|
||||
return newcert;
|
||||
err:
|
||||
tls_log_errors(NULL, LOG_INFO, LD_CRYPTO, "decoding a certificate");
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/**
|
||||
* Return a newly allocated copy of the public key that a certificate
|
||||
* certifies. Watch out! This returns NULL if the cert's key is not RSA.
|
||||
*/
|
||||
crypto_pk_t *
|
||||
tor_tls_cert_get_key(tor_x509_cert_t *cert)
|
||||
{
|
||||
crypto_pk_t *result = NULL;
|
||||
EVP_PKEY *pkey = X509_get_pubkey(cert->cert);
|
||||
RSA *rsa;
|
||||
if (!pkey)
|
||||
return NULL;
|
||||
rsa = EVP_PKEY_get1_RSA(pkey);
|
||||
if (!rsa) {
|
||||
EVP_PKEY_free(pkey);
|
||||
return NULL;
|
||||
}
|
||||
result = crypto_new_pk_from_openssl_rsa_(rsa);
|
||||
EVP_PKEY_free(pkey);
|
||||
return result;
|
||||
}
|
||||
|
||||
/** Check whether <b>cert</b> is well-formed, currently live, and correctly
|
||||
* signed by the public key in <b>signing_cert</b>. If <b>check_rsa_1024</b>,
|
||||
* make sure that it has an RSA key with 1024 bits; otherwise, just check that
|
||||
* the key is long enough. Return 1 if the cert is good, and 0 if it's bad or
|
||||
* we couldn't check it. */
|
||||
int
|
||||
tor_tls_cert_is_valid(int severity,
|
||||
const tor_x509_cert_t *cert,
|
||||
const tor_x509_cert_t *signing_cert,
|
||||
time_t now,
|
||||
int check_rsa_1024)
|
||||
{
|
||||
check_no_tls_errors();
|
||||
EVP_PKEY *cert_key;
|
||||
int r, key_ok = 0;
|
||||
|
||||
if (!signing_cert || !cert)
|
||||
goto bad;
|
||||
|
||||
EVP_PKEY *signing_key = X509_get_pubkey(signing_cert->cert);
|
||||
if (!signing_key)
|
||||
goto bad;
|
||||
r = X509_verify(cert->cert, signing_key);
|
||||
EVP_PKEY_free(signing_key);
|
||||
if (r <= 0)
|
||||
goto bad;
|
||||
|
||||
/* okay, the signature checked out right. Now let's check the check the
|
||||
* lifetime. */
|
||||
if (tor_x509_check_cert_lifetime_internal(severity, cert->cert, now,
|
||||
48*60*60, 30*24*60*60) < 0)
|
||||
goto bad;
|
||||
|
||||
cert_key = X509_get_pubkey(cert->cert);
|
||||
if (check_rsa_1024 && cert_key) {
|
||||
RSA *rsa = EVP_PKEY_get1_RSA(cert_key);
|
||||
#ifdef OPENSSL_1_1_API
|
||||
if (rsa && RSA_bits(rsa) == 1024)
|
||||
#else
|
||||
if (rsa && BN_num_bits(rsa->n) == 1024)
|
||||
#endif
|
||||
key_ok = 1;
|
||||
if (rsa)
|
||||
RSA_free(rsa);
|
||||
} else if (cert_key) {
|
||||
int min_bits = 1024;
|
||||
#ifdef EVP_PKEY_EC
|
||||
if (EVP_PKEY_base_id(cert_key) == EVP_PKEY_EC)
|
||||
min_bits = 128;
|
||||
#endif
|
||||
if (EVP_PKEY_bits(cert_key) >= min_bits)
|
||||
key_ok = 1;
|
||||
}
|
||||
EVP_PKEY_free(cert_key);
|
||||
if (!key_ok)
|
||||
goto bad;
|
||||
|
||||
/* XXXX compare DNs or anything? */
|
||||
|
||||
return 1;
|
||||
bad:
|
||||
tls_log_errors(NULL, LOG_INFO, LD_CRYPTO, "checking a certificate");
|
||||
return 0;
|
||||
}
|
||||
|
||||
/** Warn that a certificate lifetime extends through a certain range. */
|
||||
static void
|
||||
log_cert_lifetime(int severity, const X509 *cert, const char *problem,
|
||||
time_t now)
|
||||
{
|
||||
BIO *bio = NULL;
|
||||
BUF_MEM *buf;
|
||||
char *s1=NULL, *s2=NULL;
|
||||
char mytime[33];
|
||||
struct tm tm;
|
||||
size_t n;
|
||||
|
||||
if (problem)
|
||||
tor_log(severity, LD_GENERAL,
|
||||
"Certificate %s. Either their clock is set wrong, or your clock "
|
||||
"is wrong.",
|
||||
problem);
|
||||
|
||||
if (!(bio = BIO_new(BIO_s_mem()))) {
|
||||
log_warn(LD_GENERAL, "Couldn't allocate BIO!"); goto end;
|
||||
}
|
||||
if (!(ASN1_TIME_print(bio, X509_get_notBefore_const(cert)))) {
|
||||
tls_log_errors(NULL, LOG_WARN, LD_NET, "printing certificate lifetime");
|
||||
goto end;
|
||||
}
|
||||
BIO_get_mem_ptr(bio, &buf);
|
||||
s1 = tor_strndup(buf->data, buf->length);
|
||||
|
||||
(void)BIO_reset(bio);
|
||||
if (!(ASN1_TIME_print(bio, X509_get_notAfter_const(cert)))) {
|
||||
tls_log_errors(NULL, LOG_WARN, LD_NET, "printing certificate lifetime");
|
||||
goto end;
|
||||
}
|
||||
BIO_get_mem_ptr(bio, &buf);
|
||||
s2 = tor_strndup(buf->data, buf->length);
|
||||
|
||||
n = strftime(mytime, 32, "%b %d %H:%M:%S %Y UTC", tor_gmtime_r(&now, &tm));
|
||||
if (n > 0) {
|
||||
tor_log(severity, LD_GENERAL,
|
||||
"(certificate lifetime runs from %s through %s. Your time is %s.)",
|
||||
s1,s2,mytime);
|
||||
} else {
|
||||
tor_log(severity, LD_GENERAL,
|
||||
"(certificate lifetime runs from %s through %s. "
|
||||
"Couldn't get your time.)",
|
||||
s1, s2);
|
||||
}
|
||||
|
||||
end:
|
||||
/* Not expected to get invoked */
|
||||
tls_log_errors(NULL, LOG_WARN, LD_NET, "getting certificate lifetime");
|
||||
if (bio)
|
||||
BIO_free(bio);
|
||||
tor_free(s1);
|
||||
tor_free(s2);
|
||||
}
|
||||
|
||||
/** Helper: check whether <b>cert</b> is expired give or take
|
||||
* <b>past_tolerance</b> seconds, or not-yet-valid give or take
|
||||
* <b>future_tolerance</b> seconds. (Relative to the current time
|
||||
* <b>now</b>.) If it is live, return 0. If it is not live, log a message
|
||||
* and return -1. */
|
||||
int
|
||||
tor_x509_check_cert_lifetime_internal(int severity, const X509 *cert,
|
||||
time_t now,
|
||||
int past_tolerance, int future_tolerance)
|
||||
{
|
||||
time_t t;
|
||||
|
||||
t = now + future_tolerance;
|
||||
if (X509_cmp_time(X509_get_notBefore_const(cert), &t) > 0) {
|
||||
log_cert_lifetime(severity, cert, "not yet valid", now);
|
||||
return -1;
|
||||
}
|
||||
t = now - past_tolerance;
|
||||
if (X509_cmp_time(X509_get_notAfter_const(cert), &t) < 0) {
|
||||
log_cert_lifetime(severity, cert, "already expired", now);
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
#ifdef TOR_UNIT_TESTS
|
||||
/* Testing only: return a new x509 cert with the same contents as <b>inp</b>,
|
||||
but with the expiration time <b>new_expiration_time</b>, signed with
|
||||
<b>signing_key</b>. */
|
||||
STATIC tor_x509_cert_t *
|
||||
tor_x509_cert_replace_expiration(const tor_x509_cert_t *inp,
|
||||
time_t new_expiration_time,
|
||||
crypto_pk_t *signing_key)
|
||||
{
|
||||
X509 *newc = X509_dup(inp->cert);
|
||||
X509_time_adj(X509_get_notAfter(newc), 0, &new_expiration_time);
|
||||
EVP_PKEY *pk = crypto_pk_get_openssl_evp_pkey_(signing_key, 1);
|
||||
tor_assert(X509_sign(newc, pk, EVP_sha256()));
|
||||
EVP_PKEY_free(pk);
|
||||
return tor_x509_cert_new(newc);
|
||||
}
|
||||
#endif /* defined(TOR_UNIT_TESTS) */
|
@ -184,6 +184,14 @@ src_test_test_SOURCES += \
|
||||
src/test/testing_common.c \
|
||||
src/test/testing_rsakeys.c \
|
||||
src/ext/tinytest.c
|
||||
|
||||
if USE_NSS
|
||||
# ...
|
||||
else
|
||||
src_test_test_SOURCES += \
|
||||
src/test/test_tortls_openssl.c
|
||||
endif
|
||||
|
||||
endif
|
||||
|
||||
src_test_test_slow_SOURCES =
|
||||
|
@ -919,6 +919,9 @@ struct testgroup_t testgroups[] = {
|
||||
{ "status/" , status_tests },
|
||||
{ "storagedir/", storagedir_tests },
|
||||
{ "tortls/", tortls_tests },
|
||||
#ifndef ENABLE_NSS
|
||||
{ "tortls/openssl/", tortls_openssl_tests },
|
||||
#endif
|
||||
{ "util/", util_tests },
|
||||
{ "util/format/", util_format_tests },
|
||||
{ "util/logging/", logging_tests },
|
||||
|
@ -257,6 +257,7 @@ extern struct testcase_t socks_tests[];
|
||||
extern struct testcase_t status_tests[];
|
||||
extern struct testcase_t thread_tests[];
|
||||
extern struct testcase_t tortls_tests[];
|
||||
extern struct testcase_t tortls_openssl_tests[];
|
||||
extern struct testcase_t util_tests[];
|
||||
extern struct testcase_t util_format_tests[];
|
||||
extern struct testcase_t util_process_tests[];
|
||||
|
File diff suppressed because it is too large
Load Diff
2597
src/test/test_tortls_openssl.c
Normal file
2597
src/test/test_tortls_openssl.c
Normal file
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user