| 1 | // |
| 2 | // PKCS12ContainerTest.cpp |
| 3 | // |
| 4 | // Copyright (c) 2012, Applied Informatics Software Engineering GmbH. |
| 5 | // and Contributors. |
| 6 | // |
| 7 | // SPDX-License-Identifier: BSL-1.0 |
| 8 | // |
| 9 | |
| 10 | |
| 11 | #include "PKCS12ContainerTest.h" |
| 12 | #include "Poco/CppUnit/TestCaller.h" |
| 13 | #include "Poco/CppUnit/TestSuite.h" |
| 14 | #include "Poco/Crypto/EVPPKey.h" |
| 15 | #include "Poco/Crypto/RSAKey.h" |
| 16 | #include "Poco/Crypto/KeyPairImpl.h" |
| 17 | #include "Poco/Environment.h" |
| 18 | #include "Poco/Path.h" |
| 19 | #include "Poco/File.h" |
| 20 | #include "Poco/TemporaryFile.h" |
| 21 | #include <iostream> |
| 22 | #include <sstream> |
| 23 | #include <fstream> |
| 24 | |
| 25 | |
| 26 | using Poco::Crypto::PKCS12Container; |
| 27 | using Poco::Crypto::X509Certificate; |
| 28 | using Poco::Crypto::EVPPKey; |
| 29 | using Poco::Crypto::RSAKey; |
| 30 | using Poco::Crypto::KeyPairImpl; |
| 31 | using Poco::Environment; |
| 32 | using Poco::Path; |
| 33 | using Poco::File; |
| 34 | using Poco::TemporaryFile; |
| 35 | |
| 36 | |
| 37 | PKCS12ContainerTest::PKCS12ContainerTest(const std::string& name): CppUnit::TestCase(name) |
| 38 | { |
| 39 | } |
| 40 | |
| 41 | |
| 42 | PKCS12ContainerTest::~PKCS12ContainerTest() |
| 43 | { |
| 44 | } |
| 45 | |
| 46 | |
| 47 | void PKCS12ContainerTest::testFullPKCS12() |
| 48 | { |
| 49 | try |
| 50 | { |
| 51 | std::string file = getTestFilesPath("full" ); |
| 52 | full(PKCS12Container(file, "crypto" )); |
| 53 | |
| 54 | std::ifstream ifs(file, std::ios::binary); |
| 55 | PKCS12Container pkcs(ifs, "crypto" ); |
| 56 | full(pkcs); |
| 57 | |
| 58 | PKCS12Container pkcs2(pkcs); |
| 59 | full(pkcs2); |
| 60 | |
| 61 | PKCS12Container pkcs3(pkcs); |
| 62 | pkcs3 = pkcs2; |
| 63 | full(pkcs3); |
| 64 | |
| 65 | pkcs3 = std::move(pkcs); |
| 66 | full(pkcs3); |
| 67 | |
| 68 | PKCS12Container pkcs4(std::move(pkcs2)); |
| 69 | full(pkcs4); |
| 70 | } |
| 71 | catch (Poco::Exception& ex) |
| 72 | { |
| 73 | std::cerr << ex.displayText() << std::endl; |
| 74 | throw; |
| 75 | } |
| 76 | } |
| 77 | |
| 78 | |
| 79 | void PKCS12ContainerTest::full(const PKCS12Container& pkcs12) |
| 80 | { |
| 81 | assertTrue ("vally" == pkcs12.getFriendlyName()); |
| 82 | |
| 83 | assertTrue (pkcs12.hasKey()); |
| 84 | EVPPKey pKey = pkcs12.getKey(); |
| 85 | assertTrue (EVP_PKEY_RSA == pKey.type()); |
| 86 | |
| 87 | RSAKey rsa(pkcs12); |
| 88 | assertTrue (rsa.impl()->type() == KeyPairImpl::KT_RSA_IMPL); |
| 89 | |
| 90 | assertTrue (pkcs12.hasX509Certificate()); |
| 91 | fullCert(pkcs12.getX509Certificate()); |
| 92 | |
| 93 | std::vector<int> certOrder; |
| 94 | for (int i = 0; i < 2; ++i) certOrder.push_back(i); |
| 95 | fullList(pkcs12.getCACerts(), pkcs12.getFriendlyNamesCA(), certOrder); |
| 96 | } |
| 97 | |
| 98 | |
| 99 | void PKCS12ContainerTest::fullCert(const X509Certificate& x509) |
| 100 | { |
| 101 | std::string subjectName(x509.subjectName()); |
| 102 | std::string issuerName(x509.issuerName()); |
| 103 | std::string commonName(x509.commonName()); |
| 104 | std::string country(x509.subjectName(X509Certificate::NID_COUNTRY)); |
| 105 | std::string localityName(x509.subjectName(X509Certificate::NID_LOCALITY_NAME)); |
| 106 | std::string stateOrProvince(x509.subjectName(X509Certificate::NID_STATE_OR_PROVINCE)); |
| 107 | std::string organizationName(x509.subjectName(X509Certificate::NID_ORGANIZATION_NAME)); |
| 108 | std::string organizationUnitName(x509.subjectName(X509Certificate::NID_ORGANIZATION_UNIT_NAME)); |
| 109 | std::string emailAddress(x509.subjectName(X509Certificate::NID_PKCS9_EMAIL_ADDRESS)); |
| 110 | std::string serialNumber(x509.serialNumber()); |
| 111 | |
| 112 | assertTrue (subjectName == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Server" ); |
| 113 | assertTrue (issuerName == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Intermediate CA v3" ); |
| 114 | assertTrue (commonName == "CV Server" ); |
| 115 | assertTrue (country == "CH" ); |
| 116 | assertTrue (localityName.empty()); |
| 117 | assertTrue (stateOrProvince == "Zug" ); |
| 118 | assertTrue (organizationName == "Crypto Vally" ); |
| 119 | assertTrue (organizationUnitName.empty()); |
| 120 | assertTrue (emailAddress.empty()); |
| 121 | assertTrue (serialNumber == "1000" ); |
| 122 | assertTrue (x509.version() == 3); |
| 123 | assertTrue (x509.signatureAlgorithm() == "sha256WithRSAEncryption" ); |
| 124 | } |
| 125 | |
| 126 | |
| 127 | void PKCS12ContainerTest::fullList(const PKCS12Container::CAList& caList, |
| 128 | const PKCS12Container::CANameList& caNamesList, const std::vector<int>& certOrder) |
| 129 | { |
| 130 | assertTrue (certOrder.size() == caList.size()); |
| 131 | assertTrue ((0 == caNamesList.size()) || (certOrder.size() == caNamesList.size())); |
| 132 | |
| 133 | if (caNamesList.size()) |
| 134 | { |
| 135 | assertTrue (caNamesList[certOrder[0]].empty()); |
| 136 | assertTrue (caNamesList[certOrder[1]].empty()); |
| 137 | } |
| 138 | |
| 139 | assertTrue (caList[certOrder[0]].subjectName() == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Root CA v3" ); |
| 140 | assertTrue (caList[certOrder[0]].issuerName() == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Root CA v3" ); |
| 141 | assertTrue (caList[certOrder[0]].commonName() == "CV Root CA v3" ); |
| 142 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_COUNTRY) == "CH" ); |
| 143 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_LOCALITY_NAME).empty()); |
| 144 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_STATE_OR_PROVINCE) == "Zug" ); |
| 145 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_ORGANIZATION_NAME) == "Crypto Vally" ); |
| 146 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_ORGANIZATION_UNIT_NAME).empty()); |
| 147 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_PKCS9_EMAIL_ADDRESS).empty()); |
| 148 | assertTrue (caList[certOrder[0]].serialNumber() == "C3ECA1FCEAA16055" ); |
| 149 | assertTrue (caList[certOrder[0]].version() == 3); |
| 150 | assertTrue (caList[certOrder[0]].signatureAlgorithm() == "sha256WithRSAEncryption" ); |
| 151 | |
| 152 | assertTrue (caList[certOrder[1]].subjectName() == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Intermediate CA v3" ); |
| 153 | assertTrue (caList[certOrder[1]].issuerName() == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Root CA v3" ); |
| 154 | assertTrue (caList[certOrder[1]].commonName() == "CV Intermediate CA v3" ); |
| 155 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_COUNTRY) == "CH" ); |
| 156 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_LOCALITY_NAME).empty()); |
| 157 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_STATE_OR_PROVINCE) == "Zug" ); |
| 158 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_ORGANIZATION_NAME) == "Crypto Vally" ); |
| 159 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_ORGANIZATION_UNIT_NAME).empty()); |
| 160 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_PKCS9_EMAIL_ADDRESS).empty()); |
| 161 | assertTrue (caList[certOrder[1]].serialNumber() == "1000" ); |
| 162 | assertTrue (caList[certOrder[1]].version() == 3); |
| 163 | assertTrue (caList[certOrder[1]].signatureAlgorithm() == "sha256WithRSAEncryption" ); |
| 164 | } |
| 165 | |
| 166 | |
| 167 | void PKCS12ContainerTest::testCertsOnlyPKCS12() |
| 168 | { |
| 169 | try |
| 170 | { |
| 171 | std::string file = getTestFilesPath("certs-only" ); |
| 172 | certsOnly(PKCS12Container(file.c_str(), "crypto" )); |
| 173 | |
| 174 | std::ifstream ifs(file.c_str(), std::ios::binary); |
| 175 | certsOnly(PKCS12Container(ifs, "crypto" )); |
| 176 | } |
| 177 | catch (Poco::Exception& ex) |
| 178 | { |
| 179 | std::cerr << ex.displayText() << std::endl; |
| 180 | throw; |
| 181 | } |
| 182 | } |
| 183 | |
| 184 | |
| 185 | void PKCS12ContainerTest::certsOnly(const PKCS12Container& pkcs12) |
| 186 | { |
| 187 | assertTrue (!pkcs12.hasKey()); |
| 188 | assertTrue (!pkcs12.hasX509Certificate()); |
| 189 | assertTrue (pkcs12.getFriendlyName().empty()); |
| 190 | |
| 191 | std::vector<int> certOrder; |
| 192 | for (int i = 0; i < 5; ++i) certOrder.push_back(i); |
| 193 | certsOnlyList(pkcs12.getCACerts(), pkcs12.getFriendlyNamesCA(), certOrder); |
| 194 | } |
| 195 | |
| 196 | |
| 197 | void PKCS12ContainerTest::certsOnlyList(const PKCS12Container::CAList& caList, |
| 198 | const PKCS12Container::CANameList& caNamesList, const std::vector<int>& certOrder) |
| 199 | { |
| 200 | assertTrue (certOrder.size() == caList.size()); |
| 201 | assertTrue ((0 == caNamesList.size()) || (certOrder.size() == caNamesList.size())); |
| 202 | |
| 203 | if (caNamesList.size()) |
| 204 | { |
| 205 | assertTrue (caNamesList[certOrder[0]].empty()); |
| 206 | assertTrue (caNamesList[certOrder[1]].empty()); |
| 207 | assertTrue (caNamesList[certOrder[2]].empty()); |
| 208 | assertTrue (caNamesList[certOrder[3]] == "vally-ca" ); |
| 209 | assertTrue (caNamesList[certOrder[4]] == "vally-ca" ); |
| 210 | } |
| 211 | |
| 212 | assertTrue (caList[certOrder[0]].subjectName() == "/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3" ); |
| 213 | assertTrue (caList[certOrder[0]].issuerName() == "/C=US/O=Internet Security Research Group/CN=ISRG Root X1" ); |
| 214 | assertTrue (caList[certOrder[0]].commonName() == "Let's Encrypt Authority X3" ); |
| 215 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_COUNTRY) == "US" ); |
| 216 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_LOCALITY_NAME).empty()); |
| 217 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_STATE_OR_PROVINCE).empty()); |
| 218 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_ORGANIZATION_NAME) == "Let's Encrypt" ); |
| 219 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_ORGANIZATION_UNIT_NAME).empty()); |
| 220 | assertTrue (caList[certOrder[0]].subjectName(X509Certificate::NID_PKCS9_EMAIL_ADDRESS).empty()); |
| 221 | assertTrue (caList[certOrder[0]].serialNumber() == "D3B17226342332DCF40528512AEC9C6A" ); |
| 222 | assertTrue (caList[certOrder[0]].version() == 3); |
| 223 | assertTrue (caList[certOrder[0]].signatureAlgorithm() == "sha256WithRSAEncryption" ); |
| 224 | |
| 225 | assertTrue (caList[certOrder[1]].subjectName() == "/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3" ); |
| 226 | assertTrue (caList[certOrder[1]].issuerName() == "/O=Digital Signature Trust Co./CN=DST Root CA X3" ); |
| 227 | assertTrue (caList[certOrder[1]].commonName() == "Let's Encrypt Authority X3" ); |
| 228 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_COUNTRY) == "US" ); |
| 229 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_LOCALITY_NAME).empty()); |
| 230 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_STATE_OR_PROVINCE).empty()); |
| 231 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_ORGANIZATION_NAME) == "Let's Encrypt" ); |
| 232 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_ORGANIZATION_UNIT_NAME).empty()); |
| 233 | assertTrue (caList[certOrder[1]].subjectName(X509Certificate::NID_PKCS9_EMAIL_ADDRESS).empty()); |
| 234 | assertTrue (caList[certOrder[1]].serialNumber() == "0A0141420000015385736A0B85ECA708" ); |
| 235 | assertTrue (caList[certOrder[1]].version() == 3); |
| 236 | assertTrue (caList[certOrder[1]].signatureAlgorithm() == "sha256WithRSAEncryption" ); |
| 237 | |
| 238 | assertTrue (caList[certOrder[2]].subjectName() == "/C=US/O=Internet Security Research Group/CN=ISRG Root X1" ); |
| 239 | assertTrue (caList[certOrder[2]].issuerName() == "/C=US/O=Internet Security Research Group/CN=ISRG Root X1" ); |
| 240 | assertTrue (caList[certOrder[2]].commonName() == "ISRG Root X1" ); |
| 241 | assertTrue (caList[certOrder[2]].subjectName(X509Certificate::NID_COUNTRY) == "US" ); |
| 242 | assertTrue (caList[certOrder[2]].subjectName(X509Certificate::NID_LOCALITY_NAME).empty()); |
| 243 | assertTrue (caList[certOrder[2]].subjectName(X509Certificate::NID_STATE_OR_PROVINCE).empty()); |
| 244 | assertTrue (caList[certOrder[2]].subjectName(X509Certificate::NID_ORGANIZATION_NAME) == "Internet Security Research Group" ); |
| 245 | assertTrue (caList[certOrder[2]].subjectName(X509Certificate::NID_ORGANIZATION_UNIT_NAME).empty()); |
| 246 | assertTrue (caList[certOrder[2]].subjectName(X509Certificate::NID_PKCS9_EMAIL_ADDRESS).empty()); |
| 247 | assertTrue (caList[certOrder[2]].serialNumber() == "8210CFB0D240E3594463E0BB63828B00" ); |
| 248 | assertTrue (caList[certOrder[2]].version() == 3); |
| 249 | assertTrue (caList[certOrder[2]].signatureAlgorithm() == "sha256WithRSAEncryption" ); |
| 250 | |
| 251 | assertTrue (caList[certOrder[3]].subjectName() == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Root CA v3" ); |
| 252 | assertTrue (caList[certOrder[3]].issuerName() == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Root CA v3" ); |
| 253 | assertTrue (caList[certOrder[3]].commonName() == "CV Root CA v3" ); |
| 254 | assertTrue (caList[certOrder[3]].subjectName(X509Certificate::NID_COUNTRY) == "CH" ); |
| 255 | assertTrue (caList[certOrder[3]].subjectName(X509Certificate::NID_LOCALITY_NAME).empty()); |
| 256 | assertTrue (caList[certOrder[3]].subjectName(X509Certificate::NID_STATE_OR_PROVINCE) == "Zug" ); |
| 257 | assertTrue (caList[certOrder[3]].subjectName(X509Certificate::NID_ORGANIZATION_NAME) == "Crypto Vally" ); |
| 258 | assertTrue (caList[certOrder[3]].subjectName(X509Certificate::NID_ORGANIZATION_UNIT_NAME).empty()); |
| 259 | assertTrue (caList[certOrder[3]].subjectName(X509Certificate::NID_PKCS9_EMAIL_ADDRESS).empty()); |
| 260 | assertTrue (caList[certOrder[3]].serialNumber() == "C3ECA1FCEAA16055" ); |
| 261 | assertTrue (caList[certOrder[3]].version() == 3); |
| 262 | assertTrue (caList[certOrder[3]].signatureAlgorithm() == "sha256WithRSAEncryption" ); |
| 263 | |
| 264 | assertTrue (caList[certOrder[4]].subjectName() == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Intermediate CA v3" ); |
| 265 | assertTrue (caList[certOrder[4]].issuerName() == "/C=CH/ST=Zug/O=Crypto Vally/CN=CV Root CA v3" ); |
| 266 | assertTrue (caList[certOrder[4]].commonName() == "CV Intermediate CA v3" ); |
| 267 | assertTrue (caList[certOrder[4]].subjectName(X509Certificate::NID_COUNTRY) == "CH" ); |
| 268 | assertTrue (caList[certOrder[4]].subjectName(X509Certificate::NID_LOCALITY_NAME).empty()); |
| 269 | assertTrue (caList[certOrder[4]].subjectName(X509Certificate::NID_STATE_OR_PROVINCE) == "Zug" ); |
| 270 | assertTrue (caList[certOrder[4]].subjectName(X509Certificate::NID_ORGANIZATION_NAME) == "Crypto Vally" ); |
| 271 | assertTrue (caList[certOrder[4]].subjectName(X509Certificate::NID_ORGANIZATION_UNIT_NAME).empty()); |
| 272 | assertTrue (caList[certOrder[4]].subjectName(X509Certificate::NID_PKCS9_EMAIL_ADDRESS).empty()); |
| 273 | assertTrue (caList[certOrder[4]].serialNumber()== "1000" ); |
| 274 | assertTrue (caList[certOrder[4]].version() == 3); |
| 275 | assertTrue (caList[certOrder[4]].signatureAlgorithm() == "sha256WithRSAEncryption" ); |
| 276 | } |
| 277 | |
| 278 | |
| 279 | void PKCS12ContainerTest::testPEMReadWrite() |
| 280 | { |
| 281 | try |
| 282 | { |
| 283 | std::string file = getTestFilesPath("certs-only" , "pem" ); |
| 284 | X509Certificate::List certsOnly = X509Certificate::readPEM(file); |
| 285 | assertTrue (certsOnly.size() == 5); |
| 286 | // PEM is written by openssl in reverse order from p12 |
| 287 | std::vector<int> certOrder; |
| 288 | for(int i = (int)certsOnly.size() - 1; i >= 0; --i) certOrder.push_back(i); |
| 289 | certsOnlyList(certsOnly, PKCS12Container::CANameList(), certOrder); |
| 290 | |
| 291 | TemporaryFile tmpFile; |
| 292 | X509Certificate::writePEM(tmpFile.path(), certsOnly); |
| 293 | |
| 294 | certsOnly.clear(); |
| 295 | certsOnly = X509Certificate::readPEM(tmpFile.path()); |
| 296 | certsOnlyList(certsOnly, PKCS12Container::CANameList(), certOrder); |
| 297 | |
| 298 | file = getTestFilesPath("full" , "pem" ); |
| 299 | X509Certificate::List full = X509Certificate::readPEM(file); |
| 300 | assertTrue (full.size() == 3); |
| 301 | fullCert(full[0]); |
| 302 | full.erase(full.begin()); |
| 303 | assertTrue (full.size() == 2); |
| 304 | |
| 305 | certOrder.clear(); |
| 306 | for(int i = (int)full.size() - 1; i >= 0; --i) certOrder.push_back(i); |
| 307 | fullList(full, PKCS12Container::CANameList(), certOrder); |
| 308 | |
| 309 | TemporaryFile tmpFile2; |
| 310 | X509Certificate::writePEM(tmpFile2.path(), full); |
| 311 | |
| 312 | full.clear(); |
| 313 | full = X509Certificate::readPEM(tmpFile2.path()); |
| 314 | fullList(full, PKCS12Container::CANameList(), certOrder); |
| 315 | } |
| 316 | catch (Poco::Exception& ex) |
| 317 | { |
| 318 | std::cerr << ex.displayText() << std::endl; |
| 319 | throw; |
| 320 | } |
| 321 | } |
| 322 | |
| 323 | |
| 324 | void PKCS12ContainerTest::setUp() |
| 325 | { |
| 326 | } |
| 327 | |
| 328 | |
| 329 | void PKCS12ContainerTest::tearDown() |
| 330 | { |
| 331 | } |
| 332 | |
| 333 | |
| 334 | std::string PKCS12ContainerTest::getTestFilesPath(const std::string& name, const std::string& ext) |
| 335 | { |
| 336 | std::ostringstream ostr; |
| 337 | ostr << "data/" << name << '.' << ext; |
| 338 | std::string fileName(ostr.str()); |
| 339 | Poco::Path path(fileName); |
| 340 | if (Poco::File(path).exists()) |
| 341 | { |
| 342 | return fileName; |
| 343 | } |
| 344 | |
| 345 | ostr.str("" ); |
| 346 | ostr << "/Crypto/testsuite/data/" << name << '.' << ext; |
| 347 | fileName = Poco::Environment::get("POCO_BASE" ) + ostr.str(); |
| 348 | path = fileName; |
| 349 | |
| 350 | if (!Poco::File(path).exists()) |
| 351 | { |
| 352 | std::cerr << "Can't find " << fileName << std::endl; |
| 353 | throw Poco::NotFoundException("cannot locate directory containing valid Crypto test files" ); |
| 354 | } |
| 355 | return fileName; |
| 356 | } |
| 357 | |
| 358 | |
| 359 | CppUnit::Test* PKCS12ContainerTest::suite() |
| 360 | { |
| 361 | CppUnit::TestSuite* pSuite = new CppUnit::TestSuite("PKCS12ContainerTest" ); |
| 362 | |
| 363 | CppUnit_addTest(pSuite, PKCS12ContainerTest, testFullPKCS12); |
| 364 | CppUnit_addTest(pSuite, PKCS12ContainerTest, testCertsOnlyPKCS12); |
| 365 | CppUnit_addTest(pSuite, PKCS12ContainerTest, testPEMReadWrite); |
| 366 | |
| 367 | return pSuite; |
| 368 | } |
| 369 | |