diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index 290f2af..c0f21ab 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -15,6 +15,12 @@ jobs: fail-fast: false matrix: include: + - id: ubuntu-24.04 + triplet: x64-linux + compiler: gcc + os: ubuntu-24.04 + generator: Unix Makefiles + vcpkg_root: - id: ubuntu-22.04 triplet: x64-linux compiler: gcc @@ -105,7 +111,7 @@ jobs: if: runner.os == 'Linux' run: | sudo apt-get update - sudo apt-get install -y libssl-dev libcurl4-openssl-dev faketime + sudo apt-get install -y libssl-dev zlib1g-dev python3-cryptography - name: Install brew dependencies (macOS) if: runner.os == 'macOS' @@ -124,6 +130,20 @@ jobs: with: cmake-version: '3.17.0' + - name: Install python3 cryptography module (macOS) + if: runner.os == 'macOS' + run: | + python3.8 -m ensurepip + python3.8 -m pip install --upgrade pip + python3.8 -m pip install cryptography + + - name: Install python3 cryptography module (Windows) + if: runner.os == 'Windows' + run: | + C:/hostedtoolcache/windows/Python/3.12.3/x64/python3.exe -m ensurepip + C:/hostedtoolcache/windows/Python/3.12.3/x64/python.exe -m pip install --upgrade pip + C:/hostedtoolcache/windows/Python/3.12.3/x64/python.exe -m pip install cryptography + - name: Configure CMake run: cmake -G "${{matrix.generator}}" @@ -138,24 +158,13 @@ jobs: --build ${{github.workspace}}/build --config ${{env.BUILD_TYPE}} - - name: Start HTTP server (macOS) + - name: Show python version (macOS) working-directory: ${{github.workspace}}/build if: runner.os == 'macOS' run: | python3.8 --version - python3.8 ./Testing/server_http.py --port 19254 - while test ! -s ./Testing/logs/port.log; do sleep 1; done - - - name: Start HTTP server (Windows) - working-directory: ${{github.workspace}}\build - if: runner.os == 'Windows' - run: | - python.exe --version - $Args = '.\Testing\server_http.pyw --port 19254' - $File = '.\Testing\logs\port.log' - Start-Process -FilePath pythonw.exe -ArgumentList $Args - while(-not(Test-Path -Path $File -PathType Leaf) -or [String]::IsNullOrWhiteSpace((Get-Content $File))) {Start-Sleep -Seconds 1} - Get-Content '.\Testing\logs\server.log' + python3.8 -c "import sys; print(sys.executable)" + python3.8 -c "import cryptography; print(f'Python3 cryptography version {cryptography.__version__}')" - name: List files (Linux/macOS) if: runner.os != 'Windows' diff --git a/CMakeLists.txt b/CMakeLists.txt index a92d733..e7c0ee9 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -3,9 +3,9 @@ cmake_minimum_required(VERSION 3.17) # autodetect vcpkg CMAKE_TOOLCHAIN_FILE if VCPKG_ROOT is defined # this needs to be configured before the project() directive -if(DEFINED ENV{VCPKG_ROOT} AND NOT $ENV{VCPKG_ROOT} STREQUAL "" AND NOT DEFINED CMAKE_TOOLCHAIN_FILE) +if((CMAKE_GENERATOR MATCHES "Ninja") AND DEFINED ENV{VCPKG_ROOT} AND NOT $ENV{VCPKG_ROOT} STREQUAL "" AND NOT DEFINED CMAKE_TOOLCHAIN_FILE) set(CMAKE_TOOLCHAIN_FILE "$ENV{VCPKG_ROOT}/scripts/buildsystems/vcpkg.cmake" CACHE STRING "") -endif(DEFINED ENV{VCPKG_ROOT} AND NOT $ENV{VCPKG_ROOT} STREQUAL "" AND NOT DEFINED CMAKE_TOOLCHAIN_FILE) +endif((CMAKE_GENERATOR MATCHES "Ninja") AND DEFINED ENV{VCPKG_ROOT} AND NOT $ENV{VCPKG_ROOT} STREQUAL "" AND NOT DEFINED CMAKE_TOOLCHAIN_FILE) set(BUILTIN_SOCKET ON CACHE BOOL "") # for static Python # configure basic project information diff --git a/Dockerfile b/Dockerfile index 2b6592a..f05d5e7 100644 --- a/Dockerfile +++ b/Dockerfile @@ -2,7 +2,7 @@ FROM alpine:latest AS builder # Install build dependencies -RUN apk add --no-cache build-base cmake openssl-dev curl-dev +RUN apk add --no-cache build-base cmake openssl-dev zlib-dev # Copy osslsigncode source code into the image COPY . /source @@ -23,7 +23,7 @@ FROM alpine:latest COPY --from=builder /usr/local/bin/osslsigncode /usr/local/bin/osslsigncode # Install necessary runtime libraries (latest version) -RUN apk add --no-cache libcrypto3 libcurl +RUN apk add --no-cache libcrypto3 # Set working directory WORKDIR /workdir diff --git a/INSTALL.W32.md b/INSTALL.W32.md index 303b4f2..0b2629a 100644 --- a/INSTALL.W32.md +++ b/INSTALL.W32.md @@ -3,32 +3,33 @@ ### Building osslsigncode source with MSYS2 MinGW 64-bit and MSYS2 packages: 1) Download and install MSYS2 from https://msys2.github.io/ and follow installation instructions. - Once up and running install mingw-w64-x86_64-gcc and mingw-w64-x86_64-openssl packages. + Once up and running install the following packages: ``` - pacman -S mingw-w64-x86_64-gcc mingw-w64-x86_64-openssl + pacman -S make mingw-w64-x86_64-gcc mingw-w64-x86_64-cmake mingw-w64-x86_64-openssl mingw-w64-x86_64-python-cryptography ``` mingw-w64-x86_64-zlib package is installed with dependencies. 2) Run "MSYS2 MinGW 64-bit" and build 64-bit Windows executables. ``` cd osslsigncode-folder - x86_64-w64-mingw32-gcc *.c -o osslsigncode.exe \ - -lcrypto -lssl -lws2_32 -lz \ - -D 'PACKAGE_STRING="osslsigncode x.y"' \ - -D 'PACKAGE_BUGREPORT="Your.Email@example.com"' + mkdir build && cd build && cmake -S .. -DCMAKE_BUILD_TYPE=Release -G "MSYS Makefiles" + cmake --build . --verbose ``` -3) Run "Command prompt" and include "c:\msys64\mingw64\bin" folder as part of the path. +3) Make tests. +``` + ctest +``` + +4) Run "Command prompt" and include "c:\msys64\mingw64\bin" folder as part of the path. ``` path=%path%;c:\msys64\mingw64\bin - cd osslsigncode-folder osslsigncode.exe -v osslsigncode 2.8, using: OpenSSL 3.2.0 23 Nov 2023 (Library: OpenSSL 3.2.0 23 Nov 2023) - Default -CAfile location: /etc/ssl/certs/ca-certificates.crt + No default -CAfile location detected ``` - ### Building OpenSSL and osslsigncode sources with MSYS2 MinGW 64-bit: 1) Download and install MSYS2 from https://msys2.github.io/ and follow installation instructions. @@ -43,27 +44,28 @@ cd openssl-(version) ./config --prefix='C:/OpenSSL' --openssldir='C:/OpenSSL' make && make install - -3) Build 64-bit Windows executables. ``` - cd osslsigncode-folder - x86_64-w64-mingw32-gcc *.c -o osslsigncode.exe \ - -L "C:/OpenSSL/lib/" -lcrypto -lssl -lws2_32 -lz \ - -I "C:/OpenSSL/include/" \ - -D 'PACKAGE_STRING="osslsigncode x.y"' \ - -D 'PACKAGE_BUGREPORT="Your.Email@example.com"' + +3) Configure a CMake project. +``` + mkdir build && cd build && cmake -S .. -DCMAKE_BUILD_TYPE=Release -G "MSYS Makefiles" -DCMAKE_PREFIX_PATH="C:\OpenSSL" ``` 4) Run "Command prompt" and copy required libraries. ``` cd osslsigncode-folder - copy C:\OpenSSL\bin\libssl-1_1-x64.dll - copy C:\OpenSSL\bin\libcrypto-1_1-x64.dll + copy C:\OpenSSL\bin\libssl-3-x64.dll + copy C:\OpenSSL\bin\libcrypto-3-x64.dll +``` - osslsigncode.exe -v - osslsigncode 2.8, using: - OpenSSL 3.2.0 23 Nov 2023 (Library: OpenSSL 3.2.0 23 Nov 2023) - Default -CAfile location: /etc/ssl/certs/ca-certificates.crt +5) Build 64-bit Windows executables. +``` + cmake --build . --verbose +``` + +6) Make tests. +``` + ctest ``` ### Building OpenSSL and osslsigncode sources with Microsoft Visual Studio: diff --git a/NEWS.md b/NEWS.md index 1a95951..2580a4f 100644 --- a/NEWS.md +++ b/NEWS.md @@ -4,6 +4,7 @@ - added a 64 bit long pseudo-random NONCE in the TSA request - used native HTTP client with OpenSSL 3.0 or later, removed libcurl dependency +- improved testing ### 2.8 (2024.03.03) diff --git a/cmake/CMakeTest.cmake b/cmake/CMakeTest.cmake index 4cdba1a..d0382dc 100644 --- a/cmake/CMakeTest.cmake +++ b/cmake/CMakeTest.cmake @@ -3,177 +3,143 @@ ########## Configure ########## -option(STOP_SERVER "Stop HTTP server after tests" ON) - -# Remove http proxy configuration that may change behavior -unset(ENV{HTTP_PROXY}) -unset(ENV{http_proxy}) - include(FindPython3) -set(TEST_DIR "${PROJECT_BINARY_DIR}/Testing") -file(COPY - "${CMAKE_CURRENT_SOURCE_DIR}/tests/files" - "${CMAKE_CURRENT_SOURCE_DIR}/tests/conf" - "${CMAKE_CURRENT_SOURCE_DIR}/tests/client_http.py" - DESTINATION "${TEST_DIR}/") +if(Python3_FOUND) + execute_process( + COMMAND ${Python3_EXECUTABLE} "check_cryptography.py" + WORKING_DIRECTORY "${CMAKE_CURRENT_SOURCE_DIR}/tests" + OUTPUT_VARIABLE cryptography_output + RESULT_VARIABLE cryptography_error) -file(MAKE_DIRECTORY "${TEST_DIR}/logs") + if(NOT cryptography_error) + message(STATUS "Using python3-cryptography version ${cryptography_output}") + option(STOP_SERVER "Stop HTTP server after tests" ON) -set(FILES "${TEST_DIR}/files") -set(CERTS "${TEST_DIR}/certs") -set(CONF "${TEST_DIR}/conf") -set(LOGS "${TEST_DIR}/logs") -set(CLIENT_HTTP "${TEST_DIR}/client_http.py") + # Remove http proxy configuration that may change behavior + unset(ENV{HTTP_PROXY}) + unset(ENV{http_proxy}) -if(UNIX) - file(COPY - "${CMAKE_CURRENT_SOURCE_DIR}/tests/server_http.py" - DESTINATION "${TEST_DIR}/") - set(SERVER_HTTP "${TEST_DIR}/server_http.py") -else(UNIX) - file(COPY - "${CMAKE_CURRENT_SOURCE_DIR}/tests/server_http.pyw" - DESTINATION "${TEST_DIR}/") - set(SERVER_HTTP "${TEST_DIR}/server_http.pyw") -endif(UNIX) + set(TEST_DIR "${PROJECT_BINARY_DIR}/Testing") + if(CMAKE_GENERATOR STREQUAL "Ninja Multi-Config") + set(OSSLSIGNCODE "${PROJECT_BINARY_DIR}/${CMAKE_BUILD_TYPE}/osslsigncode") + else(CMAKE_GENERATOR STREQUAL "Ninja Multi-Config") + set(OSSLSIGNCODE "${PROJECT_BINARY_DIR}/osslsigncode") + endif(CMAKE_GENERATOR STREQUAL "Ninja Multi-Config") + set(EXEC "${TEST_DIR}/exec.py") + set(FILES "${TEST_DIR}/files") + set(CERTS "${TEST_DIR}/certs") + set(CONF "${TEST_DIR}/conf") + set(LOGS "${TEST_DIR}/logs") -file(COPY - "${CMAKE_CURRENT_SOURCE_DIR}/tests/certs/ca-bundle.crt" - DESTINATION "${CONF}") + file(MAKE_DIRECTORY "${LOGS}") -if(WIN32 OR APPLE) - if(WIN32) - message(STATUS "Use pythonw to start HTTP server: \"pythonw.exe Testing\\server_http.pyw\"") - else(WIN32) - message(STATUS "Use python3 to start HTTP server: \"python3 Testing/server_http.py --port 19254\"") - endif(WIN32) - set(default_certs 1) -else(WIN32 OR APPLE) - if(Python3_FOUND) - if(EXISTS ${LOGS}/port.log) + file(COPY + "${CMAKE_CURRENT_SOURCE_DIR}/tests/certs/ca-bundle.crt" + DESTINATION "${CONF}") + + file(COPY + "${CMAKE_CURRENT_SOURCE_DIR}/tests/files" + "${CMAKE_CURRENT_SOURCE_DIR}/tests/conf" + "${CMAKE_CURRENT_SOURCE_DIR}/tests/client_http.py" + "${CMAKE_CURRENT_SOURCE_DIR}/tests/make_certificates.py" + "${CMAKE_CURRENT_SOURCE_DIR}/tests/start_server.py" + "${CMAKE_CURRENT_SOURCE_DIR}/tests/exec.py" + DESTINATION "${TEST_DIR}/") + + if(UNIX) + file(COPY + "${CMAKE_CURRENT_SOURCE_DIR}/tests/server_http.py" + DESTINATION "${TEST_DIR}/") + set(SERVER_HTTP "${TEST_DIR}/server_http.py") + set(Python3w_EXECUTABLE ${Python3_EXECUTABLE}) + else(UNIX) + file(COPY + "${CMAKE_CURRENT_SOURCE_DIR}/tests/server_http.pyw" + DESTINATION "${TEST_DIR}/") + set(SERVER_HTTP "${TEST_DIR}/server_http.pyw") + get_filename_component(PYTHON_DIRECTORY ${Python3_EXECUTABLE} DIRECTORY) + set(Python3w_EXECUTABLE "${PYTHON_DIRECTORY}/pythonw.exe") + endif(UNIX) + + if(EXISTS "${LOGS}/url.log") # Stop HTTP server if running message(STATUS "Try to kill HTTP server") execute_process( - COMMAND ${Python3_EXECUTABLE} "${CLIENT_HTTP}" - WORKING_DIRECTORY ${PROJECT_BINARY_DIR} + COMMAND ${Python3_EXECUTABLE} "${TEST_DIR}/client_http.py" OUTPUT_VARIABLE client_output RESULT_VARIABLE client_result) if(NOT client_result) # Successfully closed message(STATUS "${client_output}") endif(NOT client_result) - endif(EXISTS ${LOGS}/port.log) + endif(EXISTS "${LOGS}/url.log") - # Start Time Stamping Authority and CRL distribution point HTTP server - execute_process( - COMMAND ${Python3_EXECUTABLE} "${SERVER_HTTP}" - WORKING_DIRECTORY ${PROJECT_BINARY_DIR} - OUTPUT_FILE ${LOGS}/server.log - ERROR_FILE ${LOGS}/server.log - RESULT_VARIABLE server_error) - if(server_error) - message(STATUS "HTTP server failed: ${server_error}") - message(STATUS "Use python3 to start HTTP server: \"python3 Testing/server_http.py --port 19254\"") - set(default_certs 1) - else(server_error) - # Check if file exists and is no-empty - while(NOT EXISTS ${LOGS}/port.log) - execute_process(COMMAND sleep 1) - endwhile(NOT EXISTS ${LOGS}/port.log) - file(READ ${LOGS}/port.log PORT) - while(NOT PORT) - execute_process(COMMAND sleep 1) - file(READ ${LOGS}/port.log PORT) - endwhile(NOT PORT) - file(STRINGS ${LOGS}/server.log server_log) - message(STATUS "${server_log}") + set(extensions_all "exe" "ex_" "msi" "256appx" "512appx" "cat" "ps1" "psc1" "mof") + set(extensions_nocat "exe" "ex_" "msi" "256appx" "512appx" "ps1" "psc1" "mof") + set(extensions_nocatappx "exe" "ex_" "msi" "ps1" "psc1" "mof") + set(formats "pem" "der") - # Generate new cTest certificates - if(NOT SED_EXECUTABLE) - find_program(SED_EXECUTABLE sed) - mark_as_advanced(SED_EXECUTABLE) - endif(NOT SED_EXECUTABLE) - execute_process( - COMMAND ${SED_EXECUTABLE} - -i.bak s/:19254/:${PORT}/ "${CONF}/openssl_intermediate_crldp.cnf" - COMMAND ${SED_EXECUTABLE} - -i.bak s/:19254/:${PORT}/ "${CONF}/openssl_tsa_root.cnf") - execute_process( - COMMAND "${CONF}/makecerts.sh" - WORKING_DIRECTORY ${CONF} - OUTPUT_VARIABLE makecerts_output - RESULT_VARIABLE default_certs) - message(STATUS "${makecerts_output}") - endif(server_error) - endif(Python3_FOUND) + else(NOT cryptography_error) + message(STATUS "CTest skips tests: ${cryptography_output}") + endif(NOT cryptography_error) -endif(WIN32 OR APPLE) - -# Copy the set of default certificates -if(default_certs) - message(STATUS "Default certificates used by cTest") - set(PORT 19254) - file(COPY "${CMAKE_CURRENT_SOURCE_DIR}/tests/certs" - DESTINATION "${TEST_DIR}") -endif(default_certs) - -# Compute a SHA256 hash of the leaf certificate (in DER form) -execute_process( - COMMAND ${CMAKE_COMMAND} -E sha256sum "${CERTS}/cert.der" - OUTPUT_VARIABLE sha256sum) -string(SUBSTRING ${sha256sum} 0 64 leafhash) +else(Python3_FOUND) + message(STATUS "CTest skips tests: Python3 not found") +endif(Python3_FOUND) ########## Testing ########## enable_testing() -set(extensions_all "exe" "ex_" "msi" "256appx" "512appx" "cat" "ps1" "psc1" "mof") -set(extensions_nocat "exe" "ex_" "msi" "256appx" "512appx" "ps1" "psc1" "mof") -set(extensions_nocatappx "exe" "ex_" "msi" "ps1" "psc1" "mof") -set(formats "pem" "der") +### osslsigncode version ### +if(Python3_FOUND AND NOT cryptography_error) -# Test 1 -# Print osslsigncode version -add_test(NAME version - COMMAND osslsigncode --version) +### Start ### + add_test(NAME "version" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} + "--version") + + add_test(NAME "start_server" + COMMAND ${Python3_EXECUTABLE} "${TEST_DIR}/start_server.py" + "--exe" ${Python3w_EXECUTABLE} + "--script" ${SERVER_HTTP}) + set_tests_properties("start_server" PROPERTIES + TIMEOUT 60) + set(ALL_TESTS "version" "start_server") ### Sign ### -# Tests 2-7 -# Sign with PKCS#12 container with legacy RC2-40-CBC private key and certificate encryption algorithm -foreach(ext ${extensions_all}) - add_test( - NAME legacy_${ext} - COMMAND osslsigncode "sign" - "-pkcs12" "${CERTS}/legacy.p12" - "-readpass" "${CERTS}/password.txt" - "-ac" "${CERTS}/CAcross.pem" - "-time" "1556668800" # Signing time: May 1 00:00:00 2019 GMT - "-add-msi-dse" - "-comm" - "-ph" - "-jp" "low" - "-h" "sha512" "-i" "https://www.osslsigncode.com/" - "-n" "osslsigncode" - "-in" "${FILES}/unsigned.${ext}" - "-out" "${FILES}/legacy.${ext}") -endforeach(ext ${extensions_all}) - -# Tests 8-13 -# Sign with PKCS#12 container with legacy RC2-40-CBC private key and certificate encryption algorithm -# Disable legacy mode and don't automatically load the legacy provider -# Option "-nolegacy" requires OpenSSL 3.0.0 or later -# This tests are expected to fail -if(OPENSSL_VERSION VERSION_GREATER_EQUAL 3.0.0) + # Sign with PKCS#12 container with private key and certificate encryption algorithm + # Signing time: May 1 00:00:00 2019 GMT (1556668800) foreach(ext ${extensions_all}) - add_test( - NAME nolegacy_${ext} - COMMAND osslsigncode "sign" - "-pkcs12" "${CERTS}/legacy.p12" + add_test(NAME "signed_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "sign" + "-pkcs12" "${CERTS}/cert.p12" + "-readpass" "${CERTS}/password.txt" + "-ac" "${CERTS}/CAcross.pem" + "-time" "1556668800" + "-add-msi-dse" + "-comm" + "-ph" + "-jp" "low" + "-h" "sha512" "-i" "https://www.osslsigncode.com/" + "-n" "osslsigncode" + "-in" "${FILES}/unsigned.${ext}" + "-out" "${FILES}/signed.${ext}") + set_tests_properties("signed_${ext}" PROPERTIES + DEPENDS "start_server") + list(APPEND ALL_TESTS "signed_${ext}") + endforeach(ext ${extensions_all}) + + # Sign with revoked certificate + foreach(ext ${extensions_all}) + add_test(NAME "revoked_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "sign" + "-certs" "${CERTS}/revoked.pem" + "-key" "${CERTS}/keyp.pem" "-readpass" "${CERTS}/password.txt" - "-nolegacy" # Disable legacy mode "-ac" "${CERTS}/CAcross.pem" "-time" "1556668800" # Signing time: May 1 00:00:00 2019 GMT "-add-msi-dse" @@ -183,576 +149,470 @@ if(OPENSSL_VERSION VERSION_GREATER_EQUAL 3.0.0) "-h" "sha512" "-i" "https://www.osslsigncode.com/" "-n" "osslsigncode" "-in" "${FILES}/unsigned.${ext}" - "-out" "${FILES}/nolegacy.${ext}") - set_tests_properties( - nolegacy_${ext} - PROPERTIES - WILL_FAIL TRUE) + "-out" "${FILES}/revoked.${ext}") + set_tests_properties("revoked_${ext}" PROPERTIES + DEPENDS "start_server") + list(APPEND ALL_TESTS "revoked_${ext}") endforeach(ext ${extensions_all}) -endif(OPENSSL_VERSION VERSION_GREATER_EQUAL 3.0.0) -# Tests 14-19 -# Sign with PKCS#12 container with AES-256-CBC private key and certificate encryption algorithm -foreach(ext ${extensions_all}) - add_test( - NAME signed_${ext} - COMMAND osslsigncode "sign" - "-pkcs12" "${CERTS}/cert.p12" - "-readpass" "${CERTS}/password.txt" - "-ac" "${CERTS}/CAcross.pem" - "-time" "1556668800" # Signing time: May 1 00:00:00 2019 GMT - "-add-msi-dse" - "-comm" - "-ph" - "-jp" "low" - "-h" "sha512" "-i" "https://www.osslsigncode.com/" - "-n" "osslsigncode" - "-in" "${FILES}/unsigned.${ext}" - "-out" "${FILES}/signed.${ext}") -endforeach(ext ${extensions_all}) - -# Tests 20-25 -# Sign with revoked certificate -foreach(ext ${extensions_all}) - add_test( - NAME revoked_${ext} - COMMAND osslsigncode "sign" - "-certs" "${CERTS}/revoked.pem" - "-key" "${CERTS}/keyp.pem" - "-readpass" "${CERTS}/password.txt" - "-ac" "${CERTS}/CAcross.pem" - "-time" "1556668800" # Signing time: May 1 00:00:00 2019 GMT - "-add-msi-dse" - "-comm" - "-ph" - "-jp" "low" - "-h" "sha512" "-i" "https://www.osslsigncode.com/" - "-n" "osslsigncode" - "-in" "${FILES}/unsigned.${ext}" - "-out" "${FILES}/revoked.${ext}") -endforeach(ext ${extensions_all}) - -# Tests 26-30 -# Remove signature -# Unsupported command for CAT files -foreach(ext ${extensions_nocat}) - add_test( - NAME removed_${ext} - COMMAND osslsigncode "remove-signature" - "-in" "${FILES}/signed.${ext}" - "-out" "${FILES}/removed.${ext}") - set_tests_properties( - removed_${ext} - PROPERTIES - DEPENDS "signed_${ext}" - REQUIRED_FILES "${FILES}/signed.${ext}") -endforeach(ext ${extensions_nocat}) - -# Tests 31-36 -# Extract PKCS#7 signature in PEM format -foreach(ext ${extensions_all}) - add_test( - NAME extract_pem_${ext} - COMMAND osslsigncode "extract-signature" - "-pem" # PEM format - "-in" "${FILES}/signed.${ext}" - "-out" "${FILES}/${ext}.pem") - set_tests_properties( - extract_pem_${ext} - PROPERTIES - DEPENDS "signed_${ext}" - REQUIRED_FILES "${FILES}/signed.${ext}") -endforeach(ext ${extensions_all}) - -# Tests 37-42 -# Extract PKCS#7 signature in default DER format -foreach(ext ${extensions_all}) - add_test( - NAME extract_der_${ext} - COMMAND osslsigncode "extract-signature" - "-in" "${FILES}/signed.${ext}" - "-out" "${FILES}/${ext}.der") - set_tests_properties( - extract_der_${ext} - PROPERTIES - DEPENDS "signed_${ext}" - REQUIRED_FILES "${FILES}/signed.${ext}") -endforeach(ext ${extensions_all}) - -# Tests 43-52 -# Attach a nested signature in PEM or DER format -# Unsupported command for CAT files -foreach(ext ${extensions_nocat}) - foreach(format ${formats}) - add_test( - NAME attached_${format}_${ext} - COMMAND osslsigncode "attach-signature" - # sign options - "-require-leaf-hash" "SHA256:${leafhash}" - "-add-msi-dse" - "-h" "sha512" - "-nest" - "-sigin" "${FILES}/${ext}.${format}" + # Remove signature + # Unsupported command for CAT files + foreach(ext ${extensions_nocat}) + add_test(NAME "removed_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "remove-signature" "-in" "${FILES}/signed.${ext}" - "-out" "${FILES}/attached_${format}.${ext}" - # verify options - "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT - "-CAfile" "${CERTS}/CACert.pem" - "-CRLfile" "${CERTS}/CACertCRL.pem") - set_tests_properties( - attached_${format}_${ext} - PROPERTIES - DEPENDS "signed_${ext}:extract_${format}_${ext}" - REQUIRED_FILES "${FILES}/signed.${ext}" - REQUIRED_FILES "${FILES}/${ext}.${format}") - endforeach(format ${formats}) -endforeach(ext ${extensions_nocat}) + "-out" "${FILES}/removed.${ext}") + set_tests_properties("removed_${ext}" PROPERTIES + DEPENDS "signed_${ext}") + list(APPEND ALL_TESTS "removed_${ext}") + endforeach(ext ${extensions_nocat}) -# Tests 53-58 -# Add an unauthenticated blob to a previously-signed file -foreach(ext ${extensions_all}) - add_test( - NAME added_${ext} - COMMAND osslsigncode "add" - "-addUnauthenticatedBlob" - "-add-msi-dse" "-h" "sha512" - "-in" "${FILES}/signed.${ext}" - "-out" "${FILES}/added.${ext}") - set_tests_properties( - added_${ext} - PROPERTIES - DEPENDS "signed_${ext}" - REQUIRED_FILES "${FILES}/signed.${ext}") -endforeach(ext ${extensions_all}) + # Extract PKCS#7 signature in PEM format + foreach(ext ${extensions_all}) + add_test(NAME "extract_pem_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "extract-signature" + "-pem" # PEM format + "-in" "${FILES}/signed.${ext}" + "-out" "${FILES}/${ext}.pem") + set_tests_properties("extract_pem_${ext}" PROPERTIES + DEPENDS "signed_${ext}") + list(APPEND ALL_TESTS "extract_pem_${ext}") + endforeach(ext ${extensions_all}) -# Tests 59-64 -# Add the new nested signature instead of replacing the first one -# APPX files do not support nesting (multiple signature) -foreach(ext ${extensions_all}) - add_test( - NAME nested_${ext} - COMMAND osslsigncode "sign" - "-nest" - "-certs" "${CERTS}/cert.pem" - "-key" "${CERTS}/key.der" - "-pass" "passme" - "-ac" "${CERTS}/CAcross.pem" - "-time" "1556755200" # Signing time: May 2 00:00:00 2019 GMT - "-add-msi-dse" - "-comm" - "-ph" - "-jp" "low" - "-h" "sha512" - "-i" "https://www.osslsigncode.com/" - "-n" "osslsigncode" - "-in" "${FILES}/signed.${ext}" - "-out" "${FILES}/nested.${ext}") - set_tests_properties( - nested_${ext} - PROPERTIES - DEPENDS "signed_${ext}" - REQUIRED_FILES "${FILES}/signed.${ext}") -endforeach(ext ${extensions_all}) + # Extract PKCS#7 signature in default DER format + foreach(ext ${extensions_all}) + add_test(NAME "extract_der_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "extract-signature" + "-in" "${FILES}/signed.${ext}" + "-out" "${FILES}/${ext}.der") + set_tests_properties("extract_der_${ext}" PROPERTIES + DEPENDS "signed_${ext}") + list(APPEND ALL_TESTS "extract_der_${ext}") + endforeach(ext ${extensions_all}) + + # Attach a nested signature in PEM or DER format + # Unsupported command for CAT files + foreach(ext ${extensions_nocat}) + foreach(format ${formats}) + add_test(NAME "attached_${format}_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "attach-signature" + # sign options + "-add-msi-dse" + "-h" "sha512" + "-nest" + "-sigin" "${FILES}/${ext}.${format}" + "-in" "${FILES}/signed.${ext}" + "-out" "${FILES}/attached_${format}.${ext}" + # verify options + "-require-leaf-hash" "FILE ${CERTS}/leafhash.txt" + "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT + "-CAfile" "${CERTS}/CACert.pem" + "-CRLfile" "${CERTS}/CACertCRL.pem") + set_tests_properties("attached_${format}_${ext}" PROPERTIES + DEPENDS "signed_${ext};extract_pem_${ext};extract_der_${ext}") + list(APPEND ALL_TESTS "attached_${format}_${ext}") + endforeach(format ${formats}) + endforeach(ext ${extensions_nocat}) + + # Add an unauthenticated blob to a previously-signed file + foreach(ext ${extensions_all}) + add_test(NAME "added_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "add" + "-addUnauthenticatedBlob" + "-add-msi-dse" "-h" "sha512" + "-in" "${FILES}/signed.${ext}" + "-out" "${FILES}/added.${ext}") + set_tests_properties("added_${ext}" PROPERTIES + DEPENDS "signed_${ext}") + list(APPEND ALL_TESTS "added_${ext}") + endforeach(ext ${extensions_all}) + + # Add the new nested signature instead of replacing the first one + # APPX files do not support nesting (multiple signature) + foreach(ext ${extensions_all}) + add_test(NAME "nested_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "sign" + "-nest" + "-certs" "${CERTS}/cert.pem" + "-key" "${CERTS}/key.der" + "-pass" "passme" + "-ac" "${CERTS}/CAcross.pem" + "-time" "1556755200" # Signing time: May 2 00:00:00 2019 GMT + "-add-msi-dse" + "-comm" + "-ph" + "-jp" "low" + "-h" "sha512" + "-i" "https://www.osslsigncode.com/" + "-n" "osslsigncode" + "-in" "${FILES}/signed.${ext}" + "-out" "${FILES}/nested.${ext}") + set_tests_properties("nested_${ext}" PROPERTIES + DEPENDS "signed_${ext}") + list(APPEND ALL_TESTS "nested_${ext}") + endforeach(ext ${extensions_all}) ### Verify signature ### -# Tests 65-67 -# Verify PE/MSI/CAB files signed in the catalog file -# CAT and APPX files do not support detached PKCS#7 signature -foreach(ext ${extensions_nocatappx}) - add_test( - NAME verify_catalog_${ext} - COMMAND osslsigncode "verify" - "-catalog" "${FILES}/signed.cat" # catalog file - "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT - "-require-leaf-hash" "SHA256:${leafhash}" - "-CAfile" "${CERTS}/CACert.pem" - "-CRLfile" "${CERTS}/CACertCRL.pem" - "-in" "${FILES}/unsigned.${ext}") - set_tests_properties( - verify_catalog_${ext} - PROPERTIES - DEPENDS "signed_${ext}" - REQUIRED_FILES "${FILES}/signed.cat" - REQUIRED_FILES "${FILES}/unsigned.${ext}") -endforeach(ext ${extensions_nocatappx}) - -# Tests 68-97 -# Verify signature -set(files "legacy" "signed" "nested" "added" "revoked") -foreach(file ${files}) - foreach(ext ${extensions_all}) - add_test( - NAME verify_${file}_${ext} - COMMAND osslsigncode "verify" + # Verify PE/MSI/CAB files signed in the catalog file + # CAT and APPX files do not support detached PKCS#7 signature + foreach(ext ${extensions_nocatappx}) + add_test(NAME "verify_catalog_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" + "-catalog" "${FILES}/signed.cat" # catalog file "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT + "-require-leaf-hash" "FILE ${CERTS}/leafhash.txt" "-CAfile" "${CERTS}/CACert.pem" "-CRLfile" "${CERTS}/CACertCRL.pem" - "-in" "${FILES}/${file}.${ext}") - set_tests_properties( - verify_${file}_${ext} - PROPERTIES - DEPENDS "${file}_${ext}" - REQUIRED_FILES "${FILES}/${file}.${ext}") - endforeach(ext ${extensions_all}) -endforeach(file ${files}) + "-in" "${FILES}/unsigned.${ext}") + set_tests_properties("verify_catalog_${ext}" PROPERTIES + DEPENDS "signed_${ext}") + list(APPEND ALL_TESTS "verify_catalog_${ext}") + endforeach(ext ${extensions_nocatappx}) -# "revoked" tests are expected to fail -set(files "revoked") -foreach(file ${files}) - foreach(ext ${extensions_all}) - set_tests_properties( - verify_${file}_${ext} - PROPERTIES - WILL_FAIL TRUE) - endforeach(ext ${extensions_all}) -endforeach(file ${files}) + # Verify signature + set(files "signed" "nested" "added" "revoked") + foreach(file ${files}) + foreach(ext ${extensions_all}) + add_test(NAME "verify_${file}_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" + "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT + "-CAfile" "${CERTS}/CACert.pem" + "-CRLfile" "${CERTS}/CACertCRL.pem" + "-in" "${FILES}/${file}.${ext}") + set_tests_properties("verify_${file}_${ext}" PROPERTIES + DEPENDS "${file}_${ext}") + list(APPEND ALL_TESTS "verify_${file}_${ext}") + endforeach(ext ${extensions_all}) + endforeach(file ${files}) -# Tests 98-102 -# Verify removed signature -# "removed" tests are expected to fail -# "remove-signature" command is unsupported for CAT files -set(files "removed") -foreach(file ${files}) + # "revoked" tests are expected to fail + set(files "revoked") + foreach(file ${files}) + foreach(ext ${extensions_all}) + set_tests_properties("verify_${file}_${ext}" PROPERTIES + WILL_FAIL TRUE) + endforeach(ext ${extensions_all}) + endforeach(file ${files}) + + # Verify removed signature + # "removed" tests are expected to fail + # "remove-signature" command is unsupported for CAT files + set(files "removed") + foreach(file ${files}) + foreach(ext ${extensions_nocat}) + add_test(NAME "verify_${file}_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" + "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT + "-CAfile" "${CERTS}/CACert.pem" + "-CRLfile" "${CERTS}/CACertCRL.pem" + "-in" "${FILES}/${file}.${ext}") + set_tests_properties("verify_${file}_${ext}" PROPERTIES + DEPENDS "${file}_${ext}" + WILL_FAIL TRUE) + list(APPEND ALL_TESTS "verify_${file}_${ext}") + endforeach(ext ${extensions_nocat}) + endforeach(file ${files}) + + # Verify attached signature + # "attach-signature" command is unsupported for CAT files + set(files "attached_pem" "attached_der") + foreach(file ${files}) + foreach(ext ${extensions_nocat}) + add_test(NAME "verify_${file}_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" + "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT + "-CAfile" "${CERTS}/CACert.pem" + "-CRLfile" "${CERTS}/CACertCRL.pem" + "-in" "${FILES}/${file}.${ext}") + set_tests_properties("verify_${file}_${ext}" PROPERTIES + DEPENDS "${file}_${ext}") + list(APPEND ALL_TESTS "verify_${file}_${ext}") + endforeach(ext ${extensions_nocat}) + endforeach(file ${files}) + + +### Extract a data content to be signed ### + + # Unsupported command "extract-data" for CAT files foreach(ext ${extensions_nocat}) - add_test( - NAME verify_${file}_${ext} - COMMAND osslsigncode "verify" - "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT - "-CAfile" "${CERTS}/CACert.pem" - "-CRLfile" "${CERTS}/CACertCRL.pem" - "-in" "${FILES}/${file}.${ext}") - set_tests_properties( - verify_${file}_${ext} - PROPERTIES - DEPENDS "${file}_${ext}" - REQUIRED_FILES "${FILES}/${file}.${ext}" - WILL_FAIL TRUE) - endforeach(ext ${extensions_nocat}) -endforeach(file ${files}) + # Extract PKCS#7 with data content, output in PEM format + add_test(NAME "data_${ext}_pem" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "extract-data" + "-ph" + "-h" "sha384" + "-add-msi-dse" + "-pem" # PEM format + "-in" "${FILES}/unsigned.${ext}" + "-out" "${FILES}/data_${ext}.pem") -# Tests 103-112 -# Verify attached signature -# "attach-signature" command is unsupported for CAT files -set(files "attached_pem" "attached_der") -foreach(file ${files}) - foreach(ext ${extensions_nocat}) - add_test( - NAME verify_${file}_${ext} - COMMAND osslsigncode "verify" - "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT - "-CAfile" "${CERTS}/CACert.pem" - "-CRLfile" "${CERTS}/CACertCRL.pem" - "-in" "${FILES}/${file}.${ext}") - set_tests_properties( - verify_${file}_${ext} - PROPERTIES - DEPENDS "${file}_${ext}" - REQUIRED_FILES "${FILES}/${file}.${ext}") - endforeach(ext ${extensions_nocat}) -endforeach(file ${files}) + # Extract PKCS#7 with data content, output in default DER format + add_test(NAME "data_${ext}_der" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "extract-data" + "-ph" + "-h" "sha384" + "-add-msi-dse" + "-in" "${FILES}/unsigned.${ext}" + "-out" "${FILES}/data_${ext}.der") + foreach(data_format ${formats}) + set_tests_properties("data_${ext}_${data_format}" PROPERTIES + DEPENDS "start_server") + list(APPEND ALL_TESTS "data_${ext}_${data_format}") + endforeach(data_format ${formats}) -if((Python3_FOUND OR server_error) AND (OPENSSL_VERSION VERSION_GREATER_EQUAL "3.0.0" OR CURL_FOUND)) - -### Sign with Time-Stamp Authority ### - - # Tests 113-142 - # Sign with the RFC3161 Time-Stamp Authority - # Use "cert" "expired" "revoked" without X509v3 CRL Distribution Points extension - # and "cert_crldp" "revoked_crldp" contain X509v3 CRL Distribution Points extension - set(pem_certs "cert" "expired" "revoked" "cert_crldp" "revoked_crldp") - foreach(ext ${extensions_all}) - foreach(cert ${pem_certs}) - add_test( - NAME sign_ts_${cert}_${ext} - COMMAND osslsigncode "sign" - "-certs" "${CERTS}/${cert}.pem" - "-key" "${CERTS}/key.pem" + # Sign a data content, output in DER format + foreach(data_format ${formats}) + add_test(NAME "signed_data_${ext}_${data_format}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "sign" + "-pkcs12" "${CERTS}/cert.p12" + "-readpass" "${CERTS}/password.txt" "-ac" "${CERTS}/CAcross.pem" + "-time" "1556668800" # Signing time: May 1 00:00:00 2019 GMT + "-add-msi-dse" "-comm" "-ph" "-jp" "low" "-h" "sha384" "-i" "https://www.osslsigncode.com/" "-n" "osslsigncode" + "-in" "${FILES}/data_${ext}.${data_format}" + "-out" "${FILES}/signed_data_${ext}_${data_format}.der") + set_tests_properties("signed_data_${ext}_${data_format}" PROPERTIES + DEPENDS "data_${ext}_pem;data_${ext}_der") + list(APPEND ALL_TESTS "signed_data_${ext}_${data_format}") + endforeach(data_format ${formats}) + + # Sign a data content, output in PEM format + foreach(data_format ${formats}) + add_test(NAME "signed_data_pem_${ext}_${data_format}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "sign" + "-pkcs12" "${CERTS}/cert.p12" + "-readpass" "${CERTS}/password.txt" + "-ac" "${CERTS}/CAcross.pem" "-time" "1556668800" # Signing time: May 1 00:00:00 2019 GMT - "-ts" "http://127.0.0.1:${PORT}" - "-in" "${FILES}/unsigned.${ext}" - "-out" "${FILES}/ts_${cert}.${ext}") - set_tests_properties( - sign_ts_${cert}_${ext} - PROPERTIES - ENVIRONMENT "HTTP_PROXY=;http_proxy=;" - REQUIRED_FILES "${LOGS}/port.log") - endforeach(cert ${pem_certs}) - endforeach(ext ${extensions_all}) + "-add-msi-dse" + "-comm" + "-ph" + "-jp" "low" + "-h" "sha384" + "-i" "https://www.osslsigncode.com/" + "-n" "osslsigncode" + "-pem" # PEM format + "-in" "${FILES}/data_${ext}.${data_format}" + "-out" "${FILES}/signed_data_${ext}_${data_format}.pem") + set_tests_properties("signed_data_pem_${ext}_${data_format}" PROPERTIES + DEPENDS "data_${ext}_${data_format}") + list(APPEND ALL_TESTS "signed_data_pem_${ext}_${data_format}") + endforeach(data_format ${formats}) + + # Attach signature in PEM or DER format + foreach(data_format ${formats}) + foreach(format ${formats}) + add_test(NAME "attached_data_${ext}_${data_format}_${format}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "attach-signature" + # sign options + "-add-msi-dse" + "-h" "sha384" + "-sigin" "${FILES}/signed_data_${ext}_${data_format}.${format}" + "-in" "${FILES}/unsigned.${ext}" + "-out" "${FILES}/attached_data_${data_format}_${format}.${ext}" + # verify options + "-require-leaf-hash" "FILE ${CERTS}/leafhash.txt" + "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT + "-CAfile" "${CERTS}/CACert.pem" + "-CRLfile" "${CERTS}/CACertCRL.pem") + set_tests_properties("attached_data_${ext}_${data_format}_${format}" PROPERTIES + DEPENDS "signed_data_${ext}_${data_format};signed_data_pem_${ext}_${data_format}") + list(APPEND ALL_TESTS "attached_data_${ext}_${data_format}_${format}") + endforeach(format ${formats}) + endforeach(data_format ${formats}) + endforeach(ext ${extensions_nocat}) + + + if(OPENSSL_VERSION VERSION_GREATER_EQUAL "3.0.0" OR CURL_FOUND) + +### Sign with Time-Stamp Authority ### + + # Sign with the RFC3161 Time-Stamp Authority + set(pem_certs "cert" "expired" "revoked") + foreach(ext ${extensions_all}) + foreach(cert ${pem_certs}) + add_test(NAME "sign_ts_${cert}_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "sign" + "-certs" "${CERTS}/${cert}.pem" + "-key" "${CERTS}/key.pem" + "-ac" "${CERTS}/CAcross.pem" + "-comm" + "-ph" + "-jp" "low" + "-h" "sha384" + "-i" "https://www.osslsigncode.com/" + "-n" "osslsigncode" + "-time" "1556668800" # Signing time: May 1 00:00:00 2019 GMT + "-ts" "FILE ${LOGS}/url.log" + "-in" "${FILES}/unsigned.${ext}" + "-out" "${FILES}/ts_${cert}.${ext}") + set_tests_properties("sign_ts_${cert}_${ext}" PROPERTIES + ENVIRONMENT "HTTP_PROXY=;http_proxy=" + DEPENDS "start_server") + list(APPEND ALL_TESTS "sign_ts_${cert}_${ext}") + endforeach(cert ${pem_certs}) + endforeach(ext ${extensions_all}) ### Verify Time-Stamp Authority ### - # Tests 143-148 - # Signature verification time: Sep 1 00:00:00 2019 GMT - foreach(ext ${extensions_all}) - add_test( - NAME verify_ts_cert_${ext} - COMMAND osslsigncode "verify" - "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT - "-CAfile" "${CERTS}/CACert.pem" - "-TSA-CAfile" "${CERTS}/TSACA.pem" - "-in" "${FILES}/ts_cert.${ext}") - set_tests_properties( - verify_ts_cert_${ext} - PROPERTIES - ENVIRONMENT "HTTP_PROXY=;http_proxy=;" - DEPENDS "sign_ts_cert_${ext}" - REQUIRED_FILES "${FILES}/ts_cert.${ext}" - REQUIRED_FILES "${LOGS}/port.log") - endforeach(ext ${extensions_all}) + # Signature verification time: Sep 1 00:00:00 2019 GMT + foreach(ext ${extensions_all}) + add_test(NAME "verify_ts_cert_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" + "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT + "-CAfile" "${CERTS}/CACert.pem" + "-TSA-CAfile" "${CERTS}/TSACA.pem" + "-in" "${FILES}/ts_cert.${ext}") + set_tests_properties("verify_ts_cert_${ext}" PROPERTIES + ENVIRONMENT "HTTP_PROXY=;http_proxy=;" + DEPENDS "sign_ts_cert_${ext}") + list(APPEND ALL_TESTS "verify_ts_cert_${ext}") + endforeach(ext ${extensions_all}) - # Tests 149-154 - # Signature verification time: Jan 1 00:00:00 2035 GMT - foreach(ext ${extensions_all}) - add_test( - NAME verify_ts_future_${ext} - COMMAND osslsigncode "verify" - "-time" "2051222400" # Signature verification time: Jan 1 00:00:00 2035 GMT - "-CAfile" "${CERTS}/CACert.pem" - "-TSA-CAfile" "${CERTS}/TSACA.pem" - "-in" "${FILES}/ts_cert.${ext}") - set_tests_properties( - verify_ts_future_${ext} - PROPERTIES - ENVIRONMENT "HTTP_PROXY=;http_proxy=;" - DEPENDS "sign_ts_cert_${ext}" - REQUIRED_FILES "${FILES}/ts_cert.${ext}" - REQUIRED_FILES "${LOGS}/port.log") - endforeach(ext ${extensions_all}) + # Signature verification time: Jan 1 00:00:00 2035 GMT + foreach(ext ${extensions_all}) + add_test(NAME "verify_ts_future_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" + "-time" "2051222400" # Signature verification time: Jan 1 00:00:00 2035 GMT + "-CAfile" "${CERTS}/CACert.pem" + "-TSA-CAfile" "${CERTS}/TSACA.pem" + "-in" "${FILES}/ts_cert.${ext}") + set_tests_properties("verify_ts_future_${ext}" PROPERTIES + ENVIRONMENT "HTTP_PROXY=;http_proxy=;" + DEPENDS "sign_ts_cert_${ext}") + list(APPEND ALL_TESTS "verify_ts_future_${ext}") + endforeach(ext ${extensions_all}) - # Tests 155-160 - # Verify with ignored timestamp - # This tests are expected to fail - foreach(ext ${extensions_all}) - add_test( - NAME verify_ts_ignore_${ext} - COMMAND osslsigncode "verify" - "-time" "2051222400" # Signature verification time: Jan 1 00:00:00 2035 GMT - "-ignore-timestamp" - "-CAfile" "${CERTS}/CACert.pem" - "-TSA-CAfile" "${CERTS}/TSACA.pem" - "-in" "${FILES}/ts_cert.${ext}") - set_tests_properties( - verify_ts_ignore_${ext} - PROPERTIES - ENVIRONMENT "HTTP_PROXY=;http_proxy=;" - DEPENDS "sign_ts_cert_${ext}" - REQUIRED_FILES "${FILES}/ts_cert.${ext}" - REQUIRED_FILES "${LOGS}/port.log" - WILL_FAIL TRUE) - endforeach(ext ${extensions_all}) + # Verify with ignored timestamp + # This tests are expected to fail + foreach(ext ${extensions_all}) + add_test(NAME "verify_ts_ignore_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" + "-time" "2051222400" # Signature verification time: Jan 1 00:00:00 2035 GMT + "-ignore-timestamp" + "-CAfile" "${CERTS}/CACert.pem" + "-TSA-CAfile" "${CERTS}/TSACA.pem" + "-in" "${FILES}/ts_cert.${ext}") + set_tests_properties("verify_ts_ignore_${ext}" PROPERTIES + ENVIRONMENT "HTTP_PROXY=;http_proxy=;" + DEPENDS "sign_ts_cert_${ext}" + WILL_FAIL TRUE) + list(APPEND ALL_TESTS "verify_ts_ignore_${ext}") + endforeach(ext ${extensions_all}) ### Verify CRL Distribution Points ### - # Tests 161-166 - # Verify file signed with X509v3 CRL Distribution Points extension - # Signature verification time: Sep 1 00:00:00 2019 GMT - # Check X509v3 CRL Distribution Points extension, don't use "-CRLfile" and "-TSA-CRLfile" options - foreach(ext ${extensions_all}) - add_test( - NAME verify_ts_cert_crldp_${ext} - COMMAND osslsigncode "verify" - "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT - "-CAfile" "${CERTS}/CACert.pem" - "-TSA-CAfile" "${CERTS}/TSACA.pem" - "-in" "${FILES}/ts_cert_crldp.${ext}") - set_tests_properties( - verify_ts_cert_crldp_${ext} - PROPERTIES - ENVIRONMENT "HTTP_PROXY=;http_proxy=;" - DEPENDS "sign_ts_cert_crldp_${ext}" - REQUIRED_FILES "${FILES}/ts_cert_crldp.${ext}" - REQUIRED_FILES "${LOGS}/port.log") - endforeach(ext ${extensions_all}) - - # Tests 167-183 - # Verify with expired or revoked certificate without X509v3 CRL Distribution Points extension - # This tests are expected to fail - set(failed_certs "expired" "revoked") - foreach(ext ${extensions_all}) - foreach(cert ${failed_certs}) - add_test( - NAME verify_ts_${cert}_${ext} - COMMAND osslsigncode "verify" + # Verify file signed with X509v3 CRL Distribution Points extension + # Signature verification time: Sep 1 00:00:00 2019 GMT + # Check X509v3 CRL Distribution Points extension, don't use "-CRLfile" and "-TSA-CRLfile" options + foreach(ext ${extensions_all}) + add_test(NAME "verify_ts_cert_crldp_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT "-CAfile" "${CERTS}/CACert.pem" - "-CRLfile" "${CERTS}/CACertCRL.pem" "-TSA-CAfile" "${CERTS}/TSACA.pem" - "-in" "${FILES}/ts_${cert}.${ext}") - set_tests_properties( - verify_ts_${cert}_${ext} - PROPERTIES + "-in" "${FILES}/ts_cert.${ext}") + set_tests_properties("verify_ts_cert_crldp_${ext}" PROPERTIES ENVIRONMENT "HTTP_PROXY=;http_proxy=;" - DEPENDS "sign_ts_${cert}_${ext}" - REQUIRED_FILES "${FILES}/ts_${cert}.${ext}" - REQUIRED_FILES "${LOGS}/port.log" + DEPENDS "sign_ts_cert_${ext}") + list(APPEND ALL_TESTS "verify_ts_cert_crldp_${ext}") + endforeach(ext ${extensions_all}) + + # Verify with expired or revoked certificate, ignore X509v3 CRL Distribution Points extension + # This tests are expected to fail + set(failed_certs "expired" "revoked") + foreach(ext ${extensions_all}) + foreach(cert ${failed_certs}) + add_test(NAME "verify_ts_${cert}_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" + "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT + "-CAfile" "${CERTS}/CACert.pem" + "-CRLfile" "${CERTS}/CACertCRL.pem" + "-ignore-cdp" + "-TSA-CAfile" "${CERTS}/TSACA.pem" + "-in" "${FILES}/ts_${cert}.${ext}") + set_tests_properties("verify_ts_${cert}_${ext}" PROPERTIES + ENVIRONMENT "HTTP_PROXY=;http_proxy=;" + DEPENDS "sign_ts_${cert}_${ext}" + WILL_FAIL TRUE) + list(APPEND ALL_TESTS "verify_ts_${cert}_${ext}") + endforeach(cert ${failed_certs}) + endforeach(ext ${extensions_all}) + + # Verify with revoked certificate contains X509v3 CRL Distribution Points extension + # Check X509v3 CRL Distribution Points extension, don't use "-CRLfile" and "-TSA-CRLfile" options + # This test is expected to fail + foreach(ext ${extensions_all}) + add_test(NAME "verify_ts_revoked_crldp_${ext}" + COMMAND ${Python3_EXECUTABLE} ${EXEC} ${OSSLSIGNCODE} "verify" + "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT + "-CAfile" "${CERTS}/CACert.pem" + "-TSA-CAfile" "${CERTS}/TSACA.pem" + "-in" "${FILES}/ts_revoked.${ext}") + set_tests_properties("verify_ts_revoked_crldp_${ext}" PROPERTIES + ENVIRONMENT "HTTP_PROXY=;http_proxy=;" + DEPENDS "sign_ts_revoked_${ext}" WILL_FAIL TRUE) - endforeach(cert ${failed_certs}) - endforeach(ext ${extensions_all}) - - # Tests 178-184 - # Verify with revoked certificate contains X509v3 CRL Distribution Points extension - # Check X509v3 CRL Distribution Points extension, don't use "-CRLfile" and "-TSA-CRLfile" options - # This test is expected to fail - foreach(ext ${extensions_all}) - add_test( - NAME verify_ts_revoked_crldp_${ext} - COMMAND osslsigncode "verify" - "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT - "-CAfile" "${CERTS}/CACert.pem" - "-TSA-CAfile" "${CERTS}/TSACA.pem" - "-in" "${FILES}/ts_revoked_crldp.${ext}") - set_tests_properties( - verify_ts_revoked_crldp_${ext} - PROPERTIES - ENVIRONMENT "HTTP_PROXY=;http_proxy=;" - DEPENDS "sign_ts_revoked_crldp_${ext}" - REQUIRED_FILES "${FILES}/ts_revoked_crldp.${ext}" - REQUIRED_FILES "${LOGS}/port.log" - WILL_FAIL TRUE) - endforeach(ext ${extensions_all}) - -# Tests 185-234 -# Unsupported command "extract-data" for CAT files -foreach(ext ${extensions_nocat}) -# Extract PKCS#7 with data content, output in PEM format - add_test( - NAME data_${ext}_pem - COMMAND osslsigncode "extract-data" - "-ph" - "-h" "sha384" - "-add-msi-dse" - "-pem" # PEM format - "-in" "${FILES}/unsigned.${ext}" - "-out" "${FILES}/data_${ext}.pem") - -# Extract PKCS#7 with data content, output in default DER format - add_test( - NAME data_${ext}_der - COMMAND osslsigncode "extract-data" - "-ph" - "-h" "sha384" - "-add-msi-dse" - "-in" "${FILES}/unsigned.${ext}" - "-out" "${FILES}/data_${ext}.der") - -# Sign a data content, output in DER format - foreach(data_format ${formats}) - add_test( - NAME signed_data_${ext}_${data_format} - COMMAND osslsigncode "sign" - "-pkcs12" "${CERTS}/cert.p12" - "-readpass" "${CERTS}/password.txt" - "-ac" "${CERTS}/CAcross.pem" - "-time" "1556668800" # Signing time: May 1 00:00:00 2019 GMT - "-add-msi-dse" - "-comm" - "-ph" - "-jp" "low" - "-h" "sha384" "-i" "https://www.osslsigncode.com/" - "-n" "osslsigncode" - "-in" "${FILES}/data_${ext}.${data_format}" - "-out" "${FILES}/signed_data_${ext}_${data_format}.der") - endforeach(data_format ${formats}) - -# Sign a data content, output in PEM format - foreach(data_format ${formats}) - add_test( - NAME signed_data_pem_${ext}_${data_format} - COMMAND osslsigncode "sign" - "-pkcs12" "${CERTS}/cert.p12" - "-readpass" "${CERTS}/password.txt" - "-ac" "${CERTS}/CAcross.pem" - "-time" "1556668800" # Signing time: May 1 00:00:00 2019 GMT - "-add-msi-dse" - "-comm" - "-ph" - "-jp" "low" - "-h" "sha384" "-i" "https://www.osslsigncode.com/" - "-n" "osslsigncode" - "-pem" # PEM format - "-in" "${FILES}/data_${ext}.${data_format}" - "-out" "${FILES}/signed_data_${ext}_${data_format}.pem") - endforeach(data_format ${formats}) - -# Attach signature in PEM or DER format - foreach(data_format ${formats}) - foreach(format ${formats}) - add_test( - NAME attached_data_${ext}_${data_format}_${format} - COMMAND osslsigncode "attach-signature" - # sign options - "-require-leaf-hash" "SHA256:${leafhash}" - "-add-msi-dse" - "-h" "sha384" - "-sigin" "${FILES}/signed_data_${ext}_${data_format}.${format}" - "-in" "${FILES}/unsigned.${ext}" - "-out" "${FILES}/attached_data_${data_format}_${format}.${ext}" - # verify options - "-time" "1567296000" # Signature verification time: Sep 1 00:00:00 2019 GMT - "-CAfile" "${CERTS}/CACert.pem" - "-CRLfile" "${CERTS}/CACertCRL.pem") - set_tests_properties( - attached_${format}_${ext} - PROPERTIES - DEPENDS "signed_data_${ext}_${data_format}:data_${ext}_${format}") - endforeach(format ${formats}) - endforeach(data_format ${formats}) -endforeach(ext ${extensions_nocat}) + list(APPEND ALL_TESTS "verify_ts_revoked_crldp_${ext}") + endforeach(ext ${extensions_all}) ### Cleanup ### -# Stop HTTP server - if(STOP_SERVER) - add_test(NAME stop_server - COMMAND ${Python3_EXECUTABLE} "${CLIENT_HTTP}") - set_tests_properties( - stop_server - PROPERTIES - REQUIRED_FILES "${LOGS}/port.log") - else(STOP_SERVER) - message(STATUS "Keep HTTP server after tests") - endif(STOP_SERVER) + # Stop HTTP server + if(STOP_SERVER) + add_test(NAME "stop_server" + COMMAND ${Python3_EXECUTABLE} "${TEST_DIR}/client_http.py") + set_tests_properties("stop_server" PROPERTIES + DEPENDS "${ALL_TESTS}") + list(APPEND ALL_TESTS "stop_server") + else(STOP_SERVER) + message(STATUS "Keep HTTP server after tests") + endif(STOP_SERVER) -else((Python3_FOUND OR server_error) AND (OPENSSL_VERSION VERSION_GREATER_EQUAL "3.0.0" OR CURL_FOUND)) - message(STATUS "CTest skips some tests") -endif((Python3_FOUND OR server_error) AND (OPENSSL_VERSION VERSION_GREATER_EQUAL "3.0.0" OR CURL_FOUND)) + else(OPENSSL_VERSION VERSION_GREATER_EQUAL "3.0.0" OR CURL_FOUND) + message(STATUS "CTest skips some tests") + endif(OPENSSL_VERSION VERSION_GREATER_EQUAL "3.0.0" OR CURL_FOUND) -# Delete test files -set(names "legacy" "signed" "signed_crldp" "nested" "revoked" "removed" "added") -foreach(ext ${extensions_all}) - foreach(name ${names}) - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/${name}.${ext}") - endforeach(name ${names}) - foreach(cert ${pem_certs}) - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/ts_${cert}.${ext}") - endforeach(cert ${pem_certs}) - foreach(format ${formats}) - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/${ext}.${format}") - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/${ext}.${format}") - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/attached_${format}.${ext}") - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/data_${ext}.${format}") - foreach(data_format ${formats}) - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/signed_data_${ext}_${format}.${data_format}") - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/attached_data_${data_format}_${format}.${ext}") - endforeach(data_format ${formats}) - endforeach(format ${formats}) - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/jreq.tsq") - set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/jresp.tsr") -endforeach(ext ${extensions_all}) + # Delete test files + set(names "signed" "nested" "revoked" "removed" "added") + foreach(ext ${extensions_all}) + foreach(name ${names}) + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/${name}.${ext}") + endforeach(name ${names}) + foreach(cert ${pem_certs}) + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/ts_${cert}.${ext}") + endforeach(cert ${pem_certs}) + foreach(format ${formats}) + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/${ext}.${format}") + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/${ext}.${format}") + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/attached_${format}.${ext}") + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/data_${ext}.${format}") + foreach(data_format ${formats}) + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/signed_data_${ext}_${format}.${data_format}") + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/attached_data_${data_format}_${format}.${ext}") + endforeach(data_format ${formats}) + endforeach(format ${formats}) + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/jreq.tsq") + set(OUTPUT_FILES ${OUTPUT_FILES} "${FILES}/jresp.tsr") + endforeach(ext ${extensions_all}) + + add_test(NAME "remove_files" + COMMAND ${CMAKE_COMMAND} -E rm -f ${OUTPUT_FILES}) + + set_tests_properties("remove_files" PROPERTIES + DEPENDS "${ALL_TESTS}") + +endif(Python3_FOUND AND NOT cryptography_error) -add_test(NAME remove_files - COMMAND ${CMAKE_COMMAND} -E rm -f ${OUTPUT_FILES}) #[[ Local Variables: diff --git a/osslsigncode.c b/osslsigncode.c index c5e5a9e..0b4c822 100644 --- a/osslsigncode.c +++ b/osslsigncode.c @@ -2520,7 +2520,7 @@ static time_t time_t_timestamp_get_attributes(CMS_ContentInfo **timestamp, PKCS7 printf("Message digest algorithm: %s\n", (md_nid == NID_undef) ? "UNKNOWN" : OBJ_nid2sn(md_nid)); - /* Unauthenticated attributes */ + /* Authenticated attributes */ auth_attr = PKCS7_get_signed_attributes(si); /* cont[0] */ printf("\nAuthenticated attributes:\n"); for (i=0; i None: + """Check python3-cryptography version""" + try: + version = tuple(int(num) for num in cryptography.__version__.split('.')) + if version < (37, 0, 2): + raise UnsupportedVersion("unsupported python3-cryptography version") + except UnsupportedVersion as err: + print(" {}".format(err), end="") + sys.exit(1) + + +if __name__ == '__main__': + main() + +# pylint: disable=pointless-string-statement +"""Local Variables: + c-basic-offset: 4 + tab-width: 4 + indent-tabs-mode: nil +End: + vim: set ts=4 expandtab: +""" diff --git a/tests/client_http.py b/tests/client_http.py index 0a2126f..b7618f8 100644 --- a/tests/client_http.py +++ b/tests/client_http.py @@ -1,3 +1,4 @@ +#!/usr/bin/python3 """Implementation of a HTTP client""" import os @@ -5,17 +6,17 @@ import sys import http.client RESULT_PATH = os.getcwd() -LOGS_PATH = os.path.join(RESULT_PATH, "./Testing/logs/") -PORT_LOG = os.path.join(LOGS_PATH, "./port.log") def main() -> None: """Creating a POST Request""" ret = 0 try: - with open(PORT_LOG, 'r') as file: - port = file.readline() - conn = http.client.HTTPConnection('127.0.0.1', port) + file_path = os.path.join(RESULT_PATH, "./Testing/logs/url.log") + with open(file_path, mode="r", encoding="utf-8") as file: + url = file.readline() + host, port = url.split(":") + conn = http.client.HTTPConnection(host, port) conn.request('POST', '/kill_server') response = conn.getresponse() print("HTTP status code:", response.getcode(), end=', ') diff --git a/tests/conf/makecerts.sh b/tests/conf/makecerts.sh deleted file mode 100755 index 9bf247f..0000000 --- a/tests/conf/makecerts.sh +++ /dev/null @@ -1,448 +0,0 @@ -#!/bin/bash - -result=0 - -test_result() { - if test "$1" -eq 0 - then - printf "Succeeded\n" >> "makecerts.log" - else - printf "Failed\n" >> "makecerts.log" - fi -} - -make_certs() { - password=passme - result_path=$(pwd) - cd $(dirname "$0") - script_path=$(pwd) - cd "${result_path}" - mkdir "tmp/" - -################################################################################ -# OpenSSL settings -################################################################################ - - if test -n "$1" - then - OPENSSL="$1/bin/openssl" - export LD_LIBRARY_PATH="$1/lib:$1/lib64" - else - OPENSSL=openssl - fi - - mkdir "CA/" 2>> "makecerts.log" 1>&2 - touch "CA/index.txt" - echo -n "unique_subject = no" > "CA/index.txt.attr" - $OPENSSL rand -hex 16 > "CA/serial" - $OPENSSL rand -hex 16 > "tmp/tsa-serial" - echo 1001 > "CA/crlnumber" - date > "makecerts.log" - "$OPENSSL" version 2>> "makecerts.log" 1>&2 - echo -n "$password" > tmp/password.txt - -################################################################################ -# Root CA certificates -################################################################################ - - printf "\nGenerate trusted root CA certificate\n" >> "makecerts.log" - "$OPENSSL" genrsa -out CA/CAroot.key \ - 2>> "makecerts.log" 1>&2 - test_result $? - TZ=GMT faketime -f '@2017-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_root.cnf" - "$OPENSSL" req -config "$CONF" -new -x509 -days 7300 -key CA/CAroot.key -out tmp/CAroot.pem \ - -subj "/C=PL/O=osslsigncode/OU=Certification Authority/CN=Trusted Root CA" \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - - printf "\nPrepare the Certificate Signing Request (CSR)\n" >> "makecerts.log" - "$OPENSSL" genrsa -out CA/CA.key \ - 2>> "makecerts.log" 1>&2 - TZ=GMT faketime -f '@2017-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_root.cnf" - "$OPENSSL" req -config "$CONF" -new -key CA/CA.key -out CA/CACert.csr \ - -subj "/C=PL/O=osslsigncode/OU=Certification Authority/CN=Root CA" \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - - printf "\nGenerate Self-signed root CA certificate\n" >> "makecerts.log" - TZ=GMT faketime -f '@2017-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_root.cnf" - "$OPENSSL" x509 -req -days 7300 -extfile "$CONF" -extensions ca_extensions \ - -signkey CA/CA.key \ - -in CA/CACert.csr -out tmp/CACert.pem \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - - printf "\nGenerate Cross-signed root CA certificate\n" >> "makecerts.log" - TZ=GMT faketime -f '@2018-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_root.cnf" - "$OPENSSL" x509 -req -days 7300 -extfile "$CONF" -extensions ca_extensions \ - -CA tmp/CAroot.pem -CAkey CA/CAroot.key -CAserial CA/CAroot.srl \ - -CAcreateserial -in CA/CACert.csr -out tmp/CAcross.pem \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - -################################################################################ -# Private RSA keys -################################################################################ - - printf "\nGenerate private RSA encrypted key\n" >> "makecerts.log" - "$OPENSSL" genrsa -des3 -out CA/private.key -passout pass:"$password" \ - 2>> "makecerts.log" 1>&2 - test_result $? - cat CA/private.key >> tmp/keyp.pem 2>> "makecerts.log" - test_result $? - - printf "\nGenerate private RSA decrypted key\n" >> "makecerts.log" - "$OPENSSL" rsa -in CA/private.key -passin pass:"$password" -out tmp/key.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nConvert the key to DER format\n" >> "makecerts.log" - "$OPENSSL" rsa -in tmp/key.pem -outform DER -out tmp/key.der -passout pass:"$password" \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nConvert the key to PVK format\n" >> "makecerts.log" - "$OPENSSL" rsa -in tmp/key.pem -outform PVK -out tmp/key.pvk -pvk-none \ - 2>> "makecerts.log" 1>&2 - test_result $? - -################################################################################ -# Intermediate CA certificates -################################################################################ - - CONF="${script_path}/openssl_intermediate.cnf" - - printf "\nGenerate intermediate CA certificate\n" >> "makecerts.log" - "$OPENSSL" genrsa -out CA/intermediateCA.key \ - 2>> "makecerts.log" 1>&2 - TZ=GMT faketime -f '@2017-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_intermediate.cnf" - "$OPENSSL" req -config "$CONF" -new -key CA/intermediateCA.key -out CA/intermediateCA.csr \ - -subj "/C=PL/O=osslsigncode/OU=Certification Authority/CN=Intermediate CA" \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - TZ=GMT faketime -f '@2017-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_root.cnf" - "$OPENSSL" ca -config "$CONF" -batch -in CA/intermediateCA.csr -out CA/intermediateCA.cer \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - "$OPENSSL" x509 -in CA/intermediateCA.cer -out tmp/intermediateCA.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nGenerate a certificate to revoke\n" >> "makecerts.log" - "$OPENSSL" req -config "$CONF" -new -key CA/private.key -passin pass:"$password" -out CA/revoked.csr \ - -subj "/C=PL/O=osslsigncode/OU=CSP/CN=Revoked/emailAddress=osslsigncode@example.com" \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" ca -config "$CONF" -batch -in CA/revoked.csr -out CA/revoked.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" x509 -in CA/revoked.cer -out tmp/revoked.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nRevoke above certificate\n" >> "makecerts.log" - "$OPENSSL" ca -config "$CONF" -revoke CA/revoked.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nAttach intermediate certificate to revoked certificate\n" >> "makecerts.log" - cat tmp/intermediateCA.pem >> tmp/revoked.pem 2>> "makecerts.log" - test_result $? - - printf "\nGenerate CRL file\n" >> "makecerts.log" - TZ=GMT faketime -f '@2019-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_intermediate.cnf" - "$OPENSSL" ca -config "$CONF" -gencrl -crldays 8766 -out tmp/CACertCRL.pem \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - - printf "\nGenerate code signing certificate\n" >> "makecerts.log" - "$OPENSSL" req -config "$CONF" -new -key CA/private.key -passin pass:"$password" -out CA/cert.csr \ - -subj "/C=PL/ST=Mazovia Province/L=Warsaw/O=osslsigncode/OU=CSP/CN=Certificate/emailAddress=osslsigncode@example.com" \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" ca -config "$CONF" -batch -in CA/cert.csr -out CA/cert.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" x509 -in CA/cert.cer -out tmp/cert.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nConvert the certificate to DER format\n" >> "makecerts.log" - "$OPENSSL" x509 -in tmp/cert.pem -outform DER -out tmp/cert.der \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nAttach intermediate certificate to code signing certificate\n" >> "makecerts.log" - cat tmp/intermediateCA.pem >> tmp/cert.pem 2>> "makecerts.log" - test_result $? - - printf "\nConvert the certificate to SPC format\n" >> "makecerts.log" - "$OPENSSL" crl2pkcs7 -nocrl -certfile tmp/cert.pem -outform DER -out tmp/cert.spc \ - 2>> "makecerts.log" 1>&2 - test_result $? - - ssl_version=$("$OPENSSL" version) - if test "${ssl_version:8:1}" -eq 3 - then - printf "\nConvert the certificate and the key into legacy PKCS#12 container with\ - RC2-40-CBC private key and certificate encryption algorithm\n" >> "makecerts.log" - "$OPENSSL" pkcs12 -export -in tmp/cert.pem -inkey tmp/key.pem -out tmp/legacy.p12 -passout pass:"$password" \ - -keypbe rc2-40-cbc -certpbe rc2-40-cbc -legacy \ - 2>> "makecerts.log" 1>&2 - else - printf "\nConvert the certificate and the key into legacy PKCS#12 container with\ - RC2-40-CBC private key and certificate encryption algorithm\n" >> "makecerts.log" - "$OPENSSL" pkcs12 -export -in tmp/cert.pem -inkey tmp/key.pem -out tmp/legacy.p12 -passout pass:"$password" \ - -keypbe rc2-40-cbc -certpbe rc2-40-cbc \ - 2>> "makecerts.log" 1>&2 - fi - test_result $? - - printf "\nConvert the certificate and the key into a PKCS#12 container with\ - AES-256-CBC private key and certificate encryption algorithm\n" >> "makecerts.log" - "$OPENSSL" pkcs12 -export -in tmp/cert.pem -inkey tmp/key.pem -out tmp/cert.p12 -passout pass:"$password" \ - -keypbe aes-256-cbc -certpbe aes-256-cbc \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nGenerate expired certificate\n" >> "makecerts.log" - "$OPENSSL" req -config "$CONF" -new -key CA/private.key -passin pass:"$password" -out CA/expired.csr \ - -subj "/C=PL/ST=Mazovia Province/L=Warsaw/O=osslsigncode/OU=CSP/CN=Expired/emailAddress=osslsigncode@example.com" \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" ca -config "$CONF" -enddate "190101000000Z" -batch -in CA/expired.csr -out CA/expired.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" x509 -in CA/expired.cer -out tmp/expired.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nAttach intermediate certificate to expired certificate\n" >> "makecerts.log" - cat tmp/intermediateCA.pem >> tmp/expired.pem 2>> "makecerts.log" - test_result $? - - -################################################################################ -# Intermediate CA certificates with CRL distribution point -################################################################################ - - CONF="${script_path}/openssl_intermediate_crldp.cnf" - - printf "\nGenerate intermediate CA certificate with CRL distribution point\n" >> "makecerts.log" - "$OPENSSL" genrsa -out CA/intermediateCA_crldp.key \ - 2>> "makecerts.log" 1>&2 - TZ=GMT faketime -f '@2017-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_intermediate_crldp.cnf" - "$OPENSSL" req -config "$CONF" -new -key CA/intermediateCA_crldp.key -out CA/intermediateCA_crldp.csr \ - -subj "/C=PL/O=osslsigncode/OU=Certification Authority/CN=Intermediate CA CRL DP" \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - TZ=GMT faketime -f '@2017-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_root.cnf" - "$OPENSSL" ca -config "$CONF" -batch -in CA/intermediateCA_crldp.csr -out CA/intermediateCA_crldp.cer \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - "$OPENSSL" x509 -in CA/intermediateCA_crldp.cer -out tmp/intermediateCA_crldp.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nGenerate a certificate with X509v3 CRL Distribution Points extension to revoke\n" >> "makecerts.log" - "$OPENSSL" req -config "$CONF" -new -key CA/private.key -passin pass:"$password" -out CA/revoked_crldp.csr \ - -subj "/C=PL/O=osslsigncode/OU=CSP/CN=Revoked X509v3 CRL DP/emailAddress=osslsigncode@example.com" \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" ca -config "$CONF" -batch -in CA/revoked_crldp.csr -out CA/revoked_crldp.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" x509 -in CA/revoked_crldp.cer -out tmp/revoked_crldp.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nRevoke above certificate\n" >> "makecerts.log" - "$OPENSSL" ca -config "$CONF" -revoke CA/revoked_crldp.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nAttach intermediate certificate to revoked certificate\n" >> "makecerts.log" - cat tmp/intermediateCA_crldp.pem >> tmp/revoked_crldp.pem 2>> "makecerts.log" - test_result $? - - printf "\nGenerate CRL file\n" >> "makecerts.log" - TZ=GMT faketime -f '@2019-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_intermediate_crldp.cnf" - "$OPENSSL" ca -config "$CONF" -gencrl -crldays 8766 -out tmp/CACertCRL_crldp.pem \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - - printf "\nConvert CRL file from PEM to DER (for CRL Distribution Points server to use) \n" >> "makecerts.log" - "$OPENSSL" crl -in tmp/CACertCRL_crldp.pem -inform PEM -out tmp/CACertCRL.der -outform DER \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nGenerate code signing certificate with X509v3 CRL Distribution Points extension\n" >> "makecerts.log" - "$OPENSSL" req -config "$CONF" -new -key CA/private.key -passin pass:"$password" -out CA/cert_crldp.csr \ - -subj "/C=PL/ST=Mazovia Province/L=Warsaw/O=osslsigncode/OU=CSP/CN=Certificate X509v3 CRL DP/emailAddress=osslsigncode@example.com" \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" ca -config "$CONF" -batch -in CA/cert_crldp.csr -out CA/cert_crldp.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" x509 -in CA/cert_crldp.cer -out tmp/cert_crldp.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nAttach intermediate certificate to code signing certificate\n" >> "makecerts.log" - cat tmp/intermediateCA_crldp.pem >> tmp/cert_crldp.pem 2>> "makecerts.log" - test_result $? - -################################################################################ -# Time Stamp Authority certificates -################################################################################ - printf "\nGenerate Root CA TSA certificate\n" >> "makecerts.log" - "$OPENSSL" genrsa -out CA/TSACA.key \ - 2>> "makecerts.log" 1>&2 - TZ=GMT faketime -f '@2017-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_tsa_root.cnf" - "$OPENSSL" req -config "$CONF" -new -x509 -days 7300 -key CA/TSACA.key -out tmp/TSACA.pem \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - - printf "\nGenerate TSA certificate to revoke\n" >> "makecerts.log" - CONF="${script_path}/openssl_tsa_root.cnf" - "$OPENSSL" req -config "$CONF" -new -nodes -keyout tmp/TSA_revoked.key -out CA/TSA_revoked.csr \ - -subj "/C=PL/O=osslsigncode/OU=TSA/CN=Revoked/emailAddress=osslsigncode@example.com" \ - 2>> "makecerts.log" 1>&2 - test_result $? - CONF="${script_path}/openssl_tsa_root.cnf" - "$OPENSSL" ca -config "$CONF" -batch -in CA/TSA_revoked.csr -out CA/TSA_revoked.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" x509 -in CA/TSA_revoked.cer -out tmp/TSA_revoked.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nRevoke above certificate\n" >> "makecerts.log" - "$OPENSSL" ca -config "$CONF" -revoke CA/TSA_revoked.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nGenerate TSA CRL file\n" >> "makecerts.log" - TZ=GMT faketime -f '@2019-01-01 00:00:00' /bin/bash -c ' - script_path=$(pwd) - OPENSSL="$0" - export LD_LIBRARY_PATH="$1" - CONF="${script_path}/openssl_tsa_root.cnf" - "$OPENSSL" ca -config "$CONF" -gencrl -crldays 8766 -out tmp/TSACertCRL.pem \ - 2>> "makecerts.log" 1>&2' "$OPENSSL" "$LD_LIBRARY_PATH" - test_result $? - - printf "\nConvert TSA CRL file from PEM to DER (for CRL Distribution Points server to use)\n" >> "makecerts.log" - "$OPENSSL" crl -in tmp/TSACertCRL.pem -inform PEM -out tmp/TSACertCRL.der -outform DER \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nGenerate TSA certificate\n" >> "makecerts.log" - CONF="${script_path}/openssl_tsa.cnf" - "$OPENSSL" req -config "$CONF" -new -nodes -keyout tmp/TSA.key -out CA/TSA.csr \ - 2>> "makecerts.log" 1>&2 - test_result $? - CONF="${script_path}/openssl_tsa_root.cnf" - "$OPENSSL" ca -config "$CONF" -batch -in CA/TSA.csr -out CA/TSA.cer \ - 2>> "makecerts.log" 1>&2 - test_result $? - "$OPENSSL" x509 -in CA/TSA.cer -out tmp/TSA.pem \ - 2>> "makecerts.log" 1>&2 - test_result $? - - printf "\nSave the chain to be included in the TSA response\n" >> "makecerts.log" - cat tmp/TSA.pem tmp/TSACA.pem > tmp/tsa-chain.pem 2>> "makecerts.log" - -################################################################################ -# Copy new files -################################################################################ - - if test -s tmp/CACert.pem -a -s tmp/CAcross.pem -a -s tmp/CAroot.pem \ - -a -s tmp/intermediateCA.pem -a -s tmp/intermediateCA_crldp.pem \ - -a -s tmp/CACertCRL.pem -a -s tmp/CACertCRL.der \ - -a -s tmp/TSACertCRL.pem -a -s tmp/TSACertCRL.der \ - -a -s tmp/key.pem -a -s tmp/keyp.pem -a -s tmp/key.der -a -s tmp/key.pvk \ - -a -s tmp/cert.pem -a -s tmp/cert.der -a -s tmp/cert.spc \ - -a -s tmp/cert.p12 -a -s tmp/legacy.p12 -a -s tmp/cert_crldp.pem\ - -a -s tmp/expired.pem \ - -a -s tmp/revoked.pem -a -s tmp/revoked_crldp.pem \ - -a -s tmp/TSA_revoked.pem \ - -a -s tmp/TSA.pem -a -s tmp/TSA.key -a -s tmp/tsa-chain.pem - then - mkdir -p "../certs" - cp tmp/* ../certs - printf "%s" "Keys & certificates successfully generated" - else - printf "%s" "Error logs ${result_path}/makecerts.log" - result=1 - fi - -################################################################################ -# Remove the working directory -################################################################################ - - rm -rf "CA/" - rm -rf "tmp/" - - exit "$result" -} - - -################################################################################ -# Tests requirement and make certs -################################################################################ - -if test -n "$(command -v faketime)" - then - make_certs "$1" - result=$? - else - printf "%s" "faketime not found in \$PATH, please install faketime package" - result=1 - fi - -exit "$result" diff --git a/tests/conf/openssl_intermediate.cnf b/tests/conf/openssl_intermediate.cnf deleted file mode 100644 index f5e91eb..0000000 --- a/tests/conf/openssl_intermediate.cnf +++ /dev/null @@ -1,73 +0,0 @@ -# OpenSSL intermediate CA configuration file - -[ default ] -name = intermediateCA -default_ca = CA_default - -[ CA_default ] -# Directory and file locations -dir = . -certs = $dir/CA -crl_dir = $dir/CA -new_certs_dir = $dir/CA -database = $dir/CA/index.txt -serial = $dir/CA/serial -rand_serial = yes -private_key = $dir/CA/$name.key -certificate = $dir/tmp/$name.pem -crlnumber = $dir/CA/crlnumber -crl_extensions = crl_ext -default_md = sha256 -preserve = no -policy = policy_loose -default_startdate = 20180101000000Z -default_enddate = 20341231000000Z -x509_extensions = v3_req -email_in_dn = yes -default_days = 2200 - -[ req ] -# Options for the `req` tool -encrypt_key = no -default_bits = 2048 -default_md = sha256 -string_mask = utf8only -distinguished_name = req_distinguished_name -x509_extensions = usr_extensions - -[ crl_ext ] -# Extension for CRLs -authorityKeyIdentifier = keyid:always - -[ usr_extensions ] -# Extension to add when the -x509 option is used -basicConstraints = CA:FALSE -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid, issuer -extendedKeyUsage = codeSigning - -[ v3_req ] -basicConstraints = CA:FALSE -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid, issuer -extendedKeyUsage = codeSigning - -[ policy_loose ] -# Allow the intermediate CA to sign a more diverse range of certificates. -# See the POLICY FORMAT section of the `ca` man page. -countryName = optional -stateOrProvinceName = optional -localityName = optional -organizationName = optional -organizationalUnitName = optional -commonName = supplied -emailAddress = optional - -[ req_distinguished_name ] -countryName = Country Name (2 letter code) -stateOrProvinceName = State or Province Name -localityName = Locality Name -0.organizationName = Organization Name -organizationalUnitName = Organizational Unit Name -commonName = Common Name -emailAddress = Email Address diff --git a/tests/conf/openssl_intermediate_crldp.cnf b/tests/conf/openssl_intermediate_crldp.cnf deleted file mode 100644 index bb743ac..0000000 --- a/tests/conf/openssl_intermediate_crldp.cnf +++ /dev/null @@ -1,79 +0,0 @@ -# OpenSSL intermediate CA configuration file - -[ default ] -name = intermediateCA -default_ca = CA_default -crl_url = http://127.0.0.1:19254/$name - -[ CA_default ] -# Directory and file locations -dir = . -certs = $dir/CA -crl_dir = $dir/CA -new_certs_dir = $dir/CA -database = $dir/CA/index.txt -serial = $dir/CA/serial -rand_serial = yes -private_key = $dir/CA/$name\_crldp.key -certificate = $dir/tmp/$name\_crldp.pem -crlnumber = $dir/CA/crlnumber -crl_extensions = crl_ext -default_md = sha256 -preserve = no -policy = policy_loose -default_startdate = 20180101000000Z -default_enddate = 20341231000000Z -x509_extensions = v3_req -email_in_dn = yes -default_days = 2200 - -[ req ] -# Options for the `req` tool -encrypt_key = no -default_bits = 2048 -default_md = sha256 -string_mask = utf8only -distinguished_name = req_distinguished_name -x509_extensions = usr_extensions - -[ crl_ext ] -# Extension for CRLs -authorityKeyIdentifier = keyid:always - -[ usr_extensions ] -# Extension to add when the -x509 option is used -basicConstraints = CA:FALSE -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid, issuer -extendedKeyUsage = codeSigning - -[ v3_req ] -basicConstraints = CA:FALSE -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid, issuer -extendedKeyUsage = codeSigning -crlDistributionPoints = @crl_info - -[ crl_info ] -# X509v3 CRL Distribution Points extension -URI.0 = $crl_url - -[ policy_loose ] -# Allow the intermediate CA to sign a more diverse range of certificates. -# See the POLICY FORMAT section of the `ca` man page. -countryName = optional -stateOrProvinceName = optional -localityName = optional -organizationName = optional -organizationalUnitName = optional -commonName = supplied -emailAddress = optional - -[ req_distinguished_name ] -countryName = Country Name (2 letter code) -stateOrProvinceName = State or Province Name -localityName = Locality Name -0.organizationName = Organization Name -organizationalUnitName = Organizational Unit Name -commonName = Common Name -emailAddress = Email Address diff --git a/tests/conf/openssl_root.cnf b/tests/conf/openssl_root.cnf deleted file mode 100644 index 109a645..0000000 --- a/tests/conf/openssl_root.cnf +++ /dev/null @@ -1,65 +0,0 @@ -# OpenSSL root CA configuration file - -[ ca ] -default_ca = CA_default - -[ CA_default ] -# Directory and file locations. -dir = . -certs = $dir/CA -crl_dir = $dir/CA -new_certs_dir = $dir/CA -database = $dir/CA/index.txt -serial = $dir/CA/serial -rand_serial = yes -private_key = $dir/CA/CA.key -certificate = $dir/tmp/CACert.pem -crl_extensions = crl_ext -default_md = sha256 -preserve = no -policy = policy_match -default_startdate = 20180101000000Z -default_enddate = 20360101000000Z -x509_extensions = v3_intermediate_ca -email_in_dn = yes -default_days = 3000 -unique_subject = no - -[ req ] -# Options for the `req` tool -encrypt_key = no -default_bits = 2048 -default_md = sha256 -string_mask = utf8only -x509_extensions = ca_extensions -distinguished_name = req_distinguished_name - -[ ca_extensions ] -# Extension to add when the -x509 option is used -basicConstraints = critical, CA:true -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid:always,issuer -keyUsage = critical, digitalSignature, cRLSign, keyCertSign - -[ v3_intermediate_ca ] -# Extensions for a typical intermediate CA (`man x509v3_config`) -basicConstraints = critical, CA:true, pathlen:0 -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid:always,issuer -keyUsage = critical, digitalSignature, cRLSign, keyCertSign - -[ policy_match ] -countryName = match -organizationName = match -organizationalUnitName = optional -commonName = supplied -emailAddress = optional - -[ req_distinguished_name ] -countryName = Country Name (2 letter code) -stateOrProvinceName = State or Province Name -localityName = Locality Name -0.organizationName = Organization Name -organizationalUnitName = Organizational Unit Name -commonName = Common Name -emailAddress = Email Address diff --git a/tests/conf/openssl_tsa.cnf b/tests/conf/openssl_tsa.cnf index a139088..b4cd29f 100644 --- a/tests/conf/openssl_tsa.cnf +++ b/tests/conf/openssl_tsa.cnf @@ -44,3 +44,4 @@ ordering = yes tsa_name = yes ess_cert_id_chain = yes ess_cert_id_alg = sha256 +crypto_device = builtin diff --git a/tests/conf/openssl_tsa_root.cnf b/tests/conf/openssl_tsa_root.cnf deleted file mode 100644 index 30a00a3..0000000 --- a/tests/conf/openssl_tsa_root.cnf +++ /dev/null @@ -1,83 +0,0 @@ -# OpenSSL Root Timestamp Authority configuration file - -[ default ] -name = TSACA -domain_suffix = timestampauthority -crl_url = http://127.0.0.1:19254/$name -name_opt = utf8, esc_ctrl, multiline, lname, align -default_ca = CA_default - -[ CA_default ] -dir = . -certs = $dir/CA -crl_dir = $dir/CA -new_certs_dir = $dir/CA -database = $dir/CA/index.txt -serial = $dir/CA/serial -crlnumber = $dir/CA/crlnumber -crl_extensions = crl_ext -rand_serial = yes -private_key = $dir/CA/$name.key -certificate = $dir/tmp/$name.pem -default_md = sha256 -default_days = 3650 -default_crl_days = 365 -policy = policy_match -default_startdate = 20180101000000Z -default_enddate = 20380101000000Z -unique_subject = no -email_in_dn = no -x509_extensions = tsa_extensions - -[ policy_match ] -countryName = match -stateOrProvinceName = optional -organizationName = match -organizationalUnitName = optional -commonName = supplied -emailAddress = optional - -[ tsa_extensions ] -basicConstraints = critical, CA:false -extendedKeyUsage = critical, timeStamping -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid:always -crlDistributionPoints = @crl_info -nameConstraints = @name_constraints - -[ crl_info ] -# X509v3 CRL Distribution Points extension -URI.0 = $crl_url - -[ crl_ext ] -# Extension for CRLs -authorityKeyIdentifier = keyid:always - -[ name_constraints ] -permitted;DNS.0=test.com -permitted;DNS.1=test.org -excluded;IP.0=0.0.0.0/0.0.0.0 -excluded;IP.1=0:0:0:0:0:0:0:0/0:0:0:0:0:0:0:0 - -[ req ] -# Options for the `req` tool -default_bits = 2048 -encrypt_key = yes -default_md = sha256 -utf8 = yes -string_mask = utf8only -prompt = no -distinguished_name = ca_distinguished_name -x509_extensions = ca_extensions - -[ ca_distinguished_name ] -countryName = "PL" -organizationName = "osslsigncode" -organizationalUnitName = "Timestamp Authority Root CA" -commonName = "TSA Root CA" - -[ ca_extensions ] -# Extension to add when the -x509 option is used -basicConstraints = critical, CA:true -subjectKeyIdentifier = hash -keyUsage = critical, keyCertSign, cRLSign diff --git a/tests/exec.py b/tests/exec.py new file mode 100644 index 0000000..80e7c07 --- /dev/null +++ b/tests/exec.py @@ -0,0 +1,43 @@ +#!/usr/bin/python3 +"""Implementation of a single ctest script.""" + +import sys +import subprocess + + +def parse(value): + """Read parameter from file.""" + prefix = 'FILE ' + if value.startswith(prefix): + with open(value[len(prefix):], mode="r", encoding="utf-8") as file: + return file.read().strip() + return value + + +def main() -> None: + """Run osslsigncode with its options.""" + if len(sys.argv) > 1: + try: + params = map(parse, sys.argv[1:]) + proc = subprocess.run(params, check=True) + sys.exit(proc.returncode) + except Exception as err: # pylint: disable=broad-except + # all exceptions are critical + print(err, file=sys.stderr) + else: + print("Usage:\n\t{} COMMAND [ARG]...'".format(sys.argv[0]), file=sys.stderr) + sys.exit(1) + + +if __name__ == "__main__": + main() + + +# pylint: disable=pointless-string-statement +"""Local Variables: + c-basic-offset: 4 + tab-width: 4 + indent-tabs-mode: nil +End: + vim: set ts=4 expandtab: +""" diff --git a/tests/make_certificates.py b/tests/make_certificates.py new file mode 100644 index 0000000..6fb03ac --- /dev/null +++ b/tests/make_certificates.py @@ -0,0 +1,532 @@ +#!/usr/bin/python3 +"""Make test certificates""" + +import os +import datetime +import cryptography +from cryptography import x509 +from cryptography.x509.oid import NameOID +from cryptography.hazmat.primitives import hashes +from cryptography.hazmat.primitives import serialization +from cryptography.hazmat.primitives.asymmetric import rsa + +RESULT_PATH = os.getcwd() +CERTS_PATH = os.path.join(RESULT_PATH, "./Testing/certs/") + +date_20170101 = datetime.datetime(2017, 1, 1) +date_20180101 = datetime.datetime(2018, 1, 1) +date_20190101 = datetime.datetime(2019, 1, 1) + +PASSWORD='passme' + + +class X509Extensions(): + """Base class for X509 Extensions""" + + def __init__(self, unit_name, cdp_port, cdp_name): + self.unit_name = unit_name + self.port = cdp_port + self.name = cdp_name + + def create_x509_name(self, common_name) -> x509.Name: + """Return x509.Name""" + return x509.Name( + [ + x509.NameAttribute(NameOID.COUNTRY_NAME, "PL"), + x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, "Mazovia Province"), + x509.NameAttribute(NameOID.LOCALITY_NAME, "Warsaw"), + x509.NameAttribute(NameOID.ORGANIZATION_NAME, "osslsigncode"), + x509.NameAttribute(NameOID.ORGANIZATIONAL_UNIT_NAME, self.unit_name), + x509.NameAttribute(NameOID.COMMON_NAME, common_name) + ] + ) + + def create_x509_crldp(self) -> x509.CRLDistributionPoints: + """Return x509.CRLDistributionPoints""" + return x509.CRLDistributionPoints( + [ + x509.DistributionPoint( + full_name=[x509.UniformResourceIdentifier( + "http://127.0.0.1:" + str(self.port) + "/" + str(self.name)) + ], + relative_name=None, + reasons=None, + crl_issuer=None + ) + ] + ) + + def create_x509_name_constraints(self) -> x509.NameConstraints: + """Return x509.NameConstraints""" + return x509.NameConstraints( + permitted_subtrees = [x509.DNSName('test.com'), x509.DNSName('test.org')], + excluded_subtrees = None + ) + +class IntermediateCACertificate(X509Extensions): + """Base class for Intermediate CA certificate""" + + def __init__(self, issuer_cert, issuer_key): + self.issuer_cert = issuer_cert + self.issuer_key = issuer_key + super().__init__("Certification Authority", 0, None) + + def make_cert(self) -> (x509.Certificate, rsa.RSAPrivateKey): + """Generate intermediate CA certificate""" + key = rsa.generate_private_key(public_exponent=65537, key_size=2048) + key_public = key.public_key() + authority_key = x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier( + self.issuer_cert.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value + ) + key_usage = x509.KeyUsage( + digital_signature=True, + content_commitment=False, + key_encipherment=False, + data_encipherment=False, + key_agreement=False, + key_cert_sign=True, + crl_sign=True, + encipher_only=False, + decipher_only=False + ) + cert = ( + x509.CertificateBuilder() + .subject_name(self.create_x509_name("Intermediate CA")) + .issuer_name(self.issuer_cert.subject) + .public_key(key_public) + .serial_number(x509.random_serial_number()) + .not_valid_before(date_20180101) + .not_valid_after(date_20180101 + datetime.timedelta(days=7300)) + .add_extension(x509.BasicConstraints(ca=True, path_length=0), critical=True) + .add_extension(x509.SubjectKeyIdentifier.from_public_key(key_public), critical=False) + .add_extension(authority_key, critical=False) + .add_extension(key_usage, critical=True) + .sign(self.issuer_key, hashes.SHA256()) + ) + file_path=os.path.join(CERTS_PATH, "intermediateCA.pem") + with open(file_path, mode="wb") as file: + file.write(cert.public_bytes(encoding=serialization.Encoding.PEM)) + + return cert, key + + +class RootCACertificate(X509Extensions): + """Base class for Root CA certificate""" + + def __init__(self): + self.key_usage = x509.KeyUsage( + digital_signature=True, + content_commitment=False, + key_encipherment=False, + data_encipherment=False, + key_agreement=False, + key_cert_sign=True, + crl_sign=True, + encipher_only=False, + decipher_only=False + ) + super().__init__("Certification Authority", 0, None) + + def make_cert(self) -> (x509.Certificate, rsa.RSAPrivateKey): + """Generate CA certificates""" + ca_root, root_key = self.make_ca_cert("Trusted Root CA", "CAroot.pem") + ca_cert, ca_key = self.make_ca_cert("Root CA", "CACert.pem") + self.make_cross_cert(ca_root, root_key, ca_cert, ca_key) + return ca_cert, ca_key + + def make_ca_cert(self, common_name, file_name) -> None: + """Generate self-signed root CA certificate""" + ca_key = rsa.generate_private_key(public_exponent=65537, key_size=2048) + ca_public = ca_key.public_key() + authority_key = x509.AuthorityKeyIdentifier.from_issuer_public_key(ca_public) + name = self.create_x509_name(common_name) + ca_cert = ( + x509.CertificateBuilder() + .subject_name(name) + .issuer_name(name) + .public_key(ca_public) + .serial_number(x509.random_serial_number()) + .not_valid_before(date_20170101) + .not_valid_after(date_20170101 + datetime.timedelta(days=7300)) + .add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True) + .add_extension(x509.SubjectKeyIdentifier.from_public_key(ca_public), critical=False) + .add_extension(authority_key, critical=False) + .add_extension(self.key_usage, critical=True) + .sign(ca_key, hashes.SHA256()) + ) + file_path=os.path.join(CERTS_PATH, file_name) + with open(file_path, mode="wb") as file: + file.write(ca_cert.public_bytes(encoding=serialization.Encoding.PEM)) + return ca_cert, ca_key + + def make_cross_cert(self, ca_root, root_key, ca_cert, ca_key) -> None: + """Generate cross-signed root CA certificate""" + ca_public = ca_key.public_key() + authority_key = x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier( + ca_root.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value + ) + ca_cross = ( + x509.CertificateBuilder() + .subject_name(ca_cert.subject) + .issuer_name(ca_root.subject) + .public_key(ca_public) + .serial_number(ca_cert.serial_number) + .not_valid_before(date_20180101) + .not_valid_after(date_20180101 + datetime.timedelta(days=7300)) + .add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True) + .add_extension(x509.SubjectKeyIdentifier.from_public_key(ca_public), critical=False) + .add_extension(authority_key, critical=False) + .add_extension(self.key_usage, critical=True) + .sign(root_key, hashes.SHA256()) + ) + file_path=os.path.join(CERTS_PATH, "CAcross.pem") + with open(file_path, mode="wb") as file: + file.write(ca_cross.public_bytes(encoding=serialization.Encoding.PEM)) + + def write_key(self, key, file_name) -> None: + """Write a private RSA key""" + # Write password + file_path = os.path.join(CERTS_PATH, "password.txt") + with open(file_path, mode="w", encoding="utf-8") as file: + file.write("{}".format(PASSWORD)) + + # Write encrypted key in PEM format + file_path = os.path.join(CERTS_PATH, file_name + "p.pem") + with open(file_path, mode="wb") as file: + file.write(key.private_bytes( + encoding=serialization.Encoding.PEM, + format=serialization.PrivateFormat.PKCS8, + encryption_algorithm=serialization.BestAvailableEncryption(PASSWORD.encode()) + ) + ) + # Write decrypted key in PEM format + file_path = os.path.join(CERTS_PATH, file_name + ".pem") + with open(file_path, mode="wb") as file: + file.write(key.private_bytes( + encoding=serialization.Encoding.PEM, + format=serialization.PrivateFormat.PKCS8, + encryption_algorithm=serialization.NoEncryption() + ) + ) + # Write the key in DER format + file_path = os.path.join(CERTS_PATH, file_name + ".der") + with open(file_path, mode="wb") as file: + file.write(key.private_bytes( + encoding=serialization.Encoding.DER, + format=serialization.PrivateFormat.PKCS8, + encryption_algorithm=serialization.NoEncryption() + ) + ) + + +class TSARootCACertificate(X509Extensions): + """Base class for TSA certificates""" + + def __init__(self): + super().__init__("Timestamp Authority Root CA", 0, None) + + def make_cert(self) -> (x509.Certificate, rsa.RSAPrivateKey): + """Generate a Time Stamp Authority certificate""" + ca_key = rsa.generate_private_key(public_exponent=65537, key_size=2048) + ca_public = ca_key.public_key() + authority_key = x509.AuthorityKeyIdentifier.from_issuer_public_key(ca_public) + name = self.create_x509_name("TSA Root CA") + key_usage = x509.KeyUsage( + digital_signature=False, + content_commitment=False, + key_encipherment=False, + data_encipherment=False, + key_agreement=False, + key_cert_sign=True, + crl_sign=True, + encipher_only=False, + decipher_only=False + ) + ca_cert = ( + x509.CertificateBuilder() + .subject_name(name) + .issuer_name(name) + .public_key(ca_public) + .serial_number(x509.random_serial_number()) + .not_valid_before(date_20170101) + .not_valid_after(date_20170101 + datetime.timedelta(days=7300)) + .add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True) + .add_extension(x509.SubjectKeyIdentifier.from_public_key(ca_public), critical=False) + .add_extension(authority_key, critical=False) + .add_extension(key_usage, critical=True) + .sign(ca_key, hashes.SHA256()) + ) + file_path=os.path.join(CERTS_PATH, "TSACA.pem") + with open(file_path, mode="wb") as file: + file.write(ca_cert.public_bytes(encoding=serialization.Encoding.PEM)) + + return ca_cert, ca_key + + def write_key(self, key, file_name) -> None: + """Write decrypted private RSA key into PEM format""" + file_path = os.path.join(CERTS_PATH, file_name + ".key") + with open(file_path, mode="wb") as file: + file.write(key.private_bytes( + encoding=serialization.Encoding.PEM, + format=serialization.PrivateFormat.PKCS8, + encryption_algorithm=serialization.NoEncryption() + ) + ) + + +class Certificate(X509Extensions): + """Base class for a leaf certificate""" + + def __init__(self, issuer_cert, issuer_key, unit_name, common_name, cdp_port, cdp_name): + #pylint: disable=too-many-arguments + self.issuer_cert = issuer_cert + self.issuer_key = issuer_key + self.common_name = common_name + super().__init__(unit_name, cdp_port, cdp_name) + + def make_cert(self, public_key, not_before, days) -> x509.Certificate: + """Generate a leaf certificate""" + authority_key = x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier( + self.issuer_cert.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value + ) + extended_key_usage = x509.ExtendedKeyUsage( + [x509.oid.ExtendedKeyUsageOID.CODE_SIGNING] + ) + cert = ( + x509.CertificateBuilder() + .subject_name(self.create_x509_name(self.common_name)) + .issuer_name(self.issuer_cert.subject) + .public_key(public_key) + .serial_number(x509.random_serial_number()) + .not_valid_before(not_before) + .not_valid_after(not_before + datetime.timedelta(days=days)) + .add_extension(x509.BasicConstraints(ca=False, path_length=None), critical=False) + .add_extension(x509.SubjectKeyIdentifier.from_public_key(public_key), critical=False) + .add_extension(authority_key, critical=False) + .add_extension(extended_key_usage, critical=False) + .add_extension(self.create_x509_crldp(), critical=False) + .sign(self.issuer_key, hashes.SHA256()) + ) + # Write PEM file and attach intermediate certificate + file_path = os.path.join(CERTS_PATH, self.common_name + ".pem") + with open(file_path, mode="wb") as file: + file.write(cert.public_bytes(encoding=serialization.Encoding.PEM)) + file.write(self.issuer_cert.public_bytes(encoding=serialization.Encoding.PEM)) + + return cert + + def revoke_cert(self, serial_number, file_name) -> None: + """Revoke a certificate""" + revoked = ( + x509.RevokedCertificateBuilder() + .serial_number(serial_number) + .revocation_date(date_20190101) + .add_extension(x509.CRLReason(x509.ReasonFlags.superseded), critical=False) + .build() + ) + # Generate CRL + authority_key = x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier( + self.issuer_cert.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value + ) + crl = ( + x509.CertificateRevocationListBuilder() + .issuer_name(self.issuer_cert.subject) + .last_update(date_20190101) + .next_update(date_20190101 + datetime.timedelta(days=7300)) + .add_extension(authority_key, critical=False) + .add_extension(x509.CRLNumber(4097), critical=False) + .add_revoked_certificate(revoked) + .sign(self.issuer_key, hashes.SHA256()) + ) + # Write CRL file + file_path = os.path.join(CERTS_PATH, file_name + ".pem") + with open(file_path, mode="wb") as file: + file.write(crl.public_bytes(encoding=serialization.Encoding.PEM)) + + file_path = os.path.join(CERTS_PATH, file_name + ".der") + with open(file_path, mode="wb") as file: + file.write(crl.public_bytes(encoding=serialization.Encoding.DER)) + + +class LeafCACertificate(Certificate): + """Base class for a leaf certificate""" + + def __init__(self, issuer_cert, issuer_key, common, cdp_port): + super().__init__(issuer_cert, issuer_key, "CSP", common, cdp_port, "intermediateCA") + + +class LeafTSACertificate(Certificate): + """Base class for a TSA leaf certificate""" + + def __init__(self, issuer_cert, issuer_key, common, cdp_port): + self.issuer_cert = issuer_cert + self.issuer_key = issuer_key + self.common_name = common + super().__init__(issuer_cert, issuer_key, "Timestamp Root CA", common, cdp_port, "TSACA") + + def make_cert(self, public_key, not_before, days) -> x509.Certificate: + """Generate a TSA leaf certificate""" + + authority_key = x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier( + self.issuer_cert.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value + ) + + # The TSA signing certificate must have exactly one extended key usage + # assigned to it: timeStamping. The extended key usage must also be critical, + # otherwise the certificate is going to be refused. + extended_key_usage = x509.ExtendedKeyUsage( + [x509.oid.ExtendedKeyUsageOID.TIME_STAMPING] + ) + cert = ( + x509.CertificateBuilder() + .subject_name(self.create_x509_name(self.common_name)) + .issuer_name(self.issuer_cert.subject) + .public_key(public_key) + .serial_number(x509.random_serial_number()) + .not_valid_before(not_before) + .not_valid_after(not_before + datetime.timedelta(days=days)) + .add_extension(x509.BasicConstraints(ca=False, path_length=None), critical=True) + .add_extension(x509.SubjectKeyIdentifier.from_public_key(public_key), critical=False) + .add_extension(authority_key, critical=False) + .add_extension(extended_key_usage, critical=True) + .add_extension(self.create_x509_crldp(), critical=False) + .add_extension(self.create_x509_name_constraints(), critical=False) + .sign(self.issuer_key, hashes.SHA256()) + ) + # Write PEM file and attach intermediate certificate + file_path = os.path.join(CERTS_PATH, self.common_name + ".pem") + with open(file_path, mode="wb") as file: + file.write(cert.public_bytes(encoding=serialization.Encoding.PEM)) + file.write(self.issuer_cert.public_bytes(encoding=serialization.Encoding.PEM)) + + return cert + + +class CertificateMaker(): + """Base class for test certificates""" + + def __init__(self, cdp_port, logs): + self.cdp_port = cdp_port + self.logs = logs + + def make_certs(self) -> None: + """Make test certificates""" + try: + self.make_ca_certs() + self.make_tsa_certs() + logs = os.path.join(CERTS_PATH, "./cert.log") + with open(logs, mode="w", encoding="utf-8") as file: + file.write("Test certificates generation succeeded") + except Exception as err: # pylint: disable=broad-except + with open(self.logs, mode="a", encoding="utf-8") as file: + file.write("Error: {}".format(err)) + + def make_ca_certs(self): + """Make test certificates""" + + # Generate root CA certificate + root = RootCACertificate() + ca_cert, ca_key = root.make_cert() + + # Generate intermediate root CA certificate + intermediate = IntermediateCACertificate(ca_cert, ca_key) + issuer_cert, issuer_key = intermediate.make_cert() + + # Generate private RSA key + private_key = rsa.generate_private_key(public_exponent=65537, key_size=2048) + public_key = private_key.public_key() + root.write_key(key=private_key, file_name="key") + + # Generate expired certificate + expired = LeafCACertificate(issuer_cert, issuer_key, "expired", self.cdp_port) + expired.make_cert(public_key, date_20180101, 365) + + # Generate revoked certificate + revoked = LeafCACertificate(issuer_cert, issuer_key, "revoked", self.cdp_port) + cert = revoked.make_cert(public_key, date_20180101, 5840) + revoked.revoke_cert(cert.serial_number, "CACertCRL") + + # Generate code signing certificate + signer = LeafCACertificate(issuer_cert, issuer_key, "cert", self.cdp_port) + cert = signer.make_cert(public_key, date_20180101, 5840) + + # Write a certificate and a key into PKCS#12 container + self.write_pkcs12_container( + cert=cert, + key=private_key, + issuer=issuer_cert + ) + + # Write DER file and attach intermediate certificate + file_path = os.path.join(CERTS_PATH, "cert.der") + with open(file_path, mode="wb") as file: + file.write(cert.public_bytes(encoding=serialization.Encoding.DER)) + + def make_tsa_certs(self): + """Make test TSA certificates""" + + # Time Stamp Authority certificate + root = TSARootCACertificate() + issuer_cert, issuer_key = root.make_cert() + + # Generate private RSA key + private_key = rsa.generate_private_key(public_exponent=65537, key_size=2048) + public_key = private_key.public_key() + root.write_key(key=private_key, file_name="TSA") + + # Generate revoked TSA certificate + revoked = LeafTSACertificate(issuer_cert, issuer_key, "TSA_revoked", self.cdp_port) + cert = revoked.make_cert(public_key, date_20180101, 7300) + revoked.revoke_cert(cert.serial_number, "TSACertCRL") + + # Generate TSA certificate + signer = LeafTSACertificate(issuer_cert, issuer_key, "TSA", self.cdp_port) + cert = signer.make_cert(public_key, date_20180101, 7300) + + # Save the chain to be included in the TSA response + file_path = os.path.join(CERTS_PATH, "tsa-chain.pem") + with open(file_path, mode="wb") as file: + file.write(cert.public_bytes(encoding=serialization.Encoding.PEM)) + file.write(issuer_cert.public_bytes(encoding=serialization.Encoding.PEM)) + + + def write_pkcs12_container(self, cert, key, issuer) -> None: + """Write a certificate and a key into a PKCS#12 container""" + + # Set an encryption algorithm + if cryptography.__version__ >= "38.0.0": + # For OpenSSL legacy mode use the default algorithm for certificate + # and private key encryption: DES-EDE3-CBC (vel 3DES_CBC) + # pylint: disable=no-member + encryption = ( + serialization.PrivateFormat.PKCS12.encryption_builder() + .key_cert_algorithm(serialization.pkcs12.PBES.PBESv1SHA1And3KeyTripleDESCBC) + .kdf_rounds(5000) + .build(PASSWORD.encode()) + ) + else: + encryption = serialization.BestAvailableEncryption(PASSWORD.encode()) + + # Generate PKCS#12 struct + pkcs12 = serialization.pkcs12.serialize_key_and_certificates( + name=b'certificate', + key=key, + cert=cert, + cas=(issuer,), + encryption_algorithm=encryption + ) + + # Write into a PKCS#12 container + file_path = os.path.join(CERTS_PATH, "cert.p12") + with open(file_path, mode="wb") as file: + file.write(pkcs12) + + +# pylint: disable=pointless-string-statement +"""Local Variables: + c-basic-offset: 4 + tab-width: 4 + indent-tabs-mode: nil +End: + vim: set ts=4 expandtab: +""" diff --git a/tests/server_http.py b/tests/server_http.py index 084dc45..716859b 100644 --- a/tests/server_http.py +++ b/tests/server_http.py @@ -1,3 +1,4 @@ +#!/usr/bin/python3 """Implementation of a HTTP server""" import argparse @@ -8,6 +9,7 @@ import threading from urllib.parse import urlparse from http.server import SimpleHTTPRequestHandler, HTTPServer from socketserver import ThreadingMixIn +from make_certificates import CertificateMaker RESULT_PATH = os.getcwd() FILES_PATH = os.path.join(RESULT_PATH, "./Testing/files/") @@ -16,11 +18,9 @@ CONF_PATH = os.path.join(RESULT_PATH, "./Testing/conf/") LOGS_PATH = os.path.join(RESULT_PATH, "./Testing/logs/") REQUEST = os.path.join(FILES_PATH, "./jreq.tsq") RESPONS = os.path.join(FILES_PATH, "./jresp.tsr") -CACRL = os.path.join(CERTS_PATH, "./CACertCRL.der") -TSACRL = os.path.join(CERTS_PATH, "./TSACertCRL.der") OPENSSL_CONF = os.path.join(CONF_PATH, "./openssl_tsa.cnf") -PORT_LOG = os.path.join(LOGS_PATH, "./port.log") - +SERVER_LOG = os.path.join(LOGS_PATH, "./server.log") +URL_LOG = os.path.join(LOGS_PATH, "./url.log") OPENSSL_TS = ["openssl", "ts", "-reply", "-config", OPENSSL_CONF, @@ -28,9 +28,12 @@ OPENSSL_TS = ["openssl", "ts", "-queryfile", REQUEST, "-out", RESPONS] + class ThreadingHTTPServer(ThreadingMixIn, HTTPServer): + """This variant of HTTPServer creates a new thread for every connection""" daemon_threads = True + class RequestHandler(SimpleHTTPRequestHandler): """Handle the HTTP POST request that arrive at the server""" @@ -49,10 +52,12 @@ class RequestHandler(SimpleHTTPRequestHandler): resp_data = b'' # Read the file and send the contents if url.path == "/intermediateCA": - with open(CACRL, 'rb') as file: + file_path = os.path.join(CERTS_PATH, "./CACertCRL.der") + with open(file_path, 'rb') as file: resp_data = file.read() if url.path == "/TSACA": - with open(TSACRL, 'rb') as file: + file_path = os.path.join(CERTS_PATH, "./TSACertCRL.der") + with open(file_path, 'rb') as file: resp_data = file.read() self.wfile.write(resp_data) except Exception as err: # pylint: disable=broad-except @@ -65,8 +70,8 @@ class RequestHandler(SimpleHTTPRequestHandler): url = urlparse(self.path) self.send_response(200) if url.path == "/kill_server": - self.log_message(f"Deleting file: {PORT_LOG}") - os.remove(f"{PORT_LOG}") + self.log_message(f"Deleting file: {URL_LOG}") + os.remove(f"{URL_LOG}") self.send_header('Content-type', 'text/plain') self.end_headers() self.wfile.write(bytes('Shutting down HTTP server', 'utf-8')) @@ -76,8 +81,7 @@ class RequestHandler(SimpleHTTPRequestHandler): post_data = self.rfile.read(content_length) with open(REQUEST, mode="wb") as file: file.write(post_data) - openssl = subprocess.run(OPENSSL_TS, - check=True, universal_newlines=True) + openssl = subprocess.run(OPENSSL_TS, check=True, universal_newlines=True) openssl.check_returncode() self.send_header("Content-type", "application/timestamp-reply") self.end_headers() @@ -85,6 +89,7 @@ class RequestHandler(SimpleHTTPRequestHandler): with open(RESPONS, mode="rb") as file: resp_data = file.read() self.wfile.write(resp_data) + except Exception as err: # pylint: disable=broad-except print("HTTP POST request error: {}".format(err)) @@ -108,7 +113,8 @@ class HttpServerThread(): def main() -> None: - """Start HTTP server""" + """Start HTTP server, make test certificates.""" + ret = 0 parser = argparse.ArgumentParser() parser.add_argument( @@ -121,11 +127,16 @@ def main() -> None: try: server = HttpServerThread() port = server.start_server(args.port) - with open(PORT_LOG, mode="w") as file: - file.write("{}".format(port)) + with open(URL_LOG, mode="w", encoding="utf-8") as file: + file.write("127.0.0.1:{}".format(port)) + tests = CertificateMaker(port, SERVER_LOG) + tests.make_certs() except OSError as err: print("OSError: {}".format(err)) ret = err.errno + except Exception as err: # pylint: disable=broad-except + print("Error: {}".format(err)) + ret = 1 finally: sys.exit(ret) @@ -135,6 +146,9 @@ if __name__ == '__main__': fpid = os.fork() if fpid > 0: sys.exit(0) + with open(SERVER_LOG, mode='w', encoding='utf-8') as log: + os.dup2(log.fileno(), sys.stdout.fileno()) + os.dup2(log.fileno(), sys.stderr.fileno()) except OSError as ferr: print("Fork #1 failed: {} {}".format(ferr.errno, ferr.strerror)) sys.exit(1) diff --git a/tests/server_http.pyw b/tests/server_http.pyw index df7c017..31481ee 100644 --- a/tests/server_http.pyw +++ b/tests/server_http.pyw @@ -1,11 +1,14 @@ +#!/usr/bin/python3 """Windows: Implementation of a HTTP server""" +import argparse import os import subprocess import sys import threading from urllib.parse import urlparse from http.server import SimpleHTTPRequestHandler, ThreadingHTTPServer +from make_certificates import CertificateMaker RESULT_PATH = os.getcwd() FILES_PATH = os.path.join(RESULT_PATH, "./Testing/files/") @@ -14,11 +17,9 @@ CONF_PATH = os.path.join(RESULT_PATH, "./Testing/conf/") LOGS_PATH = os.path.join(RESULT_PATH, "./Testing/logs/") REQUEST = os.path.join(FILES_PATH, "./jreq.tsq") RESPONS = os.path.join(FILES_PATH, "./jresp.tsr") -CACRL = os.path.join(CERTS_PATH, "./CACertCRL.der") -TSACRL = os.path.join(CERTS_PATH, "./TSACertCRL.der") OPENSSL_CONF = os.path.join(CONF_PATH, "./openssl_tsa.cnf") SERVER_LOG = os.path.join(LOGS_PATH, "./server.log") -PORT_LOG = os.path.join(LOGS_PATH, "./port.log") +URL_LOG = os.path.join(LOGS_PATH, "./url.log") OPENSSL_TS = ["openssl", "ts", @@ -46,10 +47,12 @@ class RequestHandler(SimpleHTTPRequestHandler): resp_data = b'' # Read the file and send the contents if url.path == "/intermediateCA": - with open(CACRL, 'rb') as file: + file_path = os.path.join(CERTS_PATH, "./CACertCRL.der") + with open(file_path, 'rb') as file: resp_data = file.read() if url.path == "/TSACA": - with open(TSACRL, 'rb') as file: + file_path = os.path.join(CERTS_PATH, "./TSACertCRL.der") + with open(file_path, 'rb') as file: resp_data = file.read() self.wfile.write(resp_data) except Exception as err: # pylint: disable=broad-except @@ -62,8 +65,8 @@ class RequestHandler(SimpleHTTPRequestHandler): url = urlparse(self.path) self.send_response(200) if url.path == "/kill_server": - self.log_message(f"Deleting file: {PORT_LOG}") - os.remove(f"{PORT_LOG}") + self.log_message(f"Deleting file: {URL_LOG}") + os.remove(f"{URL_LOG}") self.send_header('Content-type', 'text/plain') self.end_headers() self.wfile.write(bytes('Shutting down HTTP server', 'utf-8')) @@ -94,9 +97,9 @@ class HttpServerThread(): self.server = None self.server_thread = None - def start_server(self) -> (int): + def start_server(self, port) -> (int): """Starting HTTP server on 127.0.0.1 and a random available port for binding""" - self.server = ThreadingHTTPServer(('127.0.0.1', 19254), RequestHandler) + self.server = ThreadingHTTPServer(('127.0.0.1', port), RequestHandler) self.server_thread = threading.Thread(target=self.server.serve_forever) self.server_thread.start() hostname, port = self.server.server_address[:2] @@ -106,14 +109,25 @@ class HttpServerThread(): def main() -> None: """Start HTTP server""" + ret = 0 + parser = argparse.ArgumentParser() + parser.add_argument( + "--port", + type=int, + default=0, + help="port number" + ) + args = parser.parse_args() try: sys.stdout = open(SERVER_LOG, "w") sys.stderr = open(SERVER_LOG, "a") server = HttpServerThread() - port = server.start_server() - with open(PORT_LOG, mode="w") as file: - file.write("{}".format(port)) + port = server.start_server(args.port) + with open(URL_LOG, mode="w") as file: + file.write("127.0.0.1:{}".format(port)) + tests = CertificateMaker(port, SERVER_LOG) + tests.make_certs() except OSError as err: print("OSError: {}".format(err)) ret = err.errno diff --git a/tests/start_server.py b/tests/start_server.py new file mode 100644 index 0000000..b2554ab --- /dev/null +++ b/tests/start_server.py @@ -0,0 +1,108 @@ +#!/usr/bin/python3 +"""Wait for all tests certificate, compute leafhash""" + +import argparse +import binascii +import hashlib +import os +import pathlib +import platform +import subprocess +import sys +import time + +RESULT_PATH = os.getcwd() +CERTS_PATH = os.path.join(RESULT_PATH, "./Testing/certs/") +LOGS_PATH = os.path.join(RESULT_PATH, "./Testing/logs/") +SERVER_LOG = os.path.join(LOGS_PATH, "./server.log") +if platform.system() == 'Windows': + DEFAULT_PYTHON = "C:/Program Files/Python/Python311/pythonw.exe" + DEFAULT_PROG = os.path.join(RESULT_PATH, "./Testing/server_http.pyw") +else: + DEFAULT_PYTHON = "/usr/bin/python3" + DEFAULT_PROG = os.path.join(RESULT_PATH, "./Testing/server_http.py") + + +def compute_sha256(file_name) -> str: + """Compute a SHA256 hash of the leaf certificate (in DER form)""" + + sha256_hash = hashlib.sha256() + file_path = os.path.join(CERTS_PATH, file_name) + with open(file_path, mode="rb") as file: + for bajt in iter(lambda: file.read(4096),b""): + sha256_hash.update(bajt) + return sha256_hash.hexdigest() + +def clear_catalog(certs_path) -> None: + """"Clear a test certificates catalog.""" + + if os.path.exists(certs_path): + #Remove old test certificates + for root, _, files in os.walk(certs_path): + for file in files: + os.remove(os.path.join(root, file)) + else: + os.mkdir(certs_path) + + # Generate 16 random bytes and convert to hex + random_hex = binascii.b2a_hex(os.urandom(16)).decode() + serial = os.path.join(certs_path, "./tsa-serial") + with open(serial, mode="w", encoding="utf-8") as file: + file.write(random_hex) + +def main() -> None: + """Wait for all tests certificate, compute leafhash""" + + parser = argparse.ArgumentParser() + parser.add_argument( + "--exe", + type=pathlib.Path, + default=DEFAULT_PYTHON, + help=f"the path to the python3 executable to use" + f"(default: {DEFAULT_PYTHON})", + ) + parser.add_argument( + "--script", + type=pathlib.Path, + default=DEFAULT_PROG, + help=f"the path to the python script to run" + f"(default: {DEFAULT_PROG})", + ) + args = parser.parse_args() + try: + clear_catalog(CERTS_PATH) + #pylint: disable=consider-using-with + subprocess.Popen([str(args.exe), str(args.script)]) + + cert_log = os.path.join(CERTS_PATH, "./cert.log") + while not (os.path.exists(cert_log) and os.path.getsize(cert_log) > 0): + time.sleep(1) + + leafhash = compute_sha256("cert.der") + file_path = os.path.join(CERTS_PATH, "./leafhash.txt") + with open(file_path, mode="w", encoding="utf-8") as file: + file.write("SHA256:{}".format(leafhash)) + + except OSError as err: + with open(SERVER_LOG, mode="w", encoding="utf-8") as file: + file.write("OSError: {}".format(err)) + sys.exit(1) + + except Exception as err: # pylint: disable=broad-except + with open(SERVER_LOG, mode="w", encoding="utf-8") as file: + file.write("Error: {}".format(err)) + sys.exit(1) + + +if __name__ == "__main__": + main() + + +# pylint: disable=pointless-string-statement +"""Local Variables: + c-basic-offset: 4 + tab-width: 4 + indent-tabs-mode: nil +End: + vim: set ts=4 expandtab: +""" diff --git a/vcpkg.json b/vcpkg.json index ba4560c..3699e3d 100644 --- a/vcpkg.json +++ b/vcpkg.json @@ -3,11 +3,7 @@ "version-string": "2.4", "dependencies": [ "openssl", - "curl", - { - "name": "python3", - "platform": "!(windows & static) & !osx" - } + "zlib" ], "builtin-baseline": "9edb1b8e590cc086563301d735cae4b6e732d2d2" }