open62541/tests/encryption/check_certificategroup.c

357 lines
13 KiB
C

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
*
* Copyright 2024 (c) Fraunhofer IOSB (Author: Noel Graf)
*
*/
#include <open62541/client.h>
#include <open62541/client_config_default.h>
#include <open62541/plugin/certificategroup_default.h>
#include <open62541/server.h>
#include <open62541/server_config_default.h>
#include "client/ua_client_internal.h"
#include "ua_server_internal.h"
#include <stdio.h>
#include <stdlib.h>
#include "test_helpers.h"
#include "certificates.h"
#include "check.h"
#include "thread_wrapper.h"
UA_Server *server;
UA_Boolean running;
THREAD_HANDLE server_thread;
THREAD_CALLBACK(serverloop) {
while(running)
UA_Server_run_iterate(server, true);
return 0;
}
static void setup(void) {
running = true;
/* Load certificate and private key */
UA_ByteString certificate;
certificate.length = CERT_DER_LENGTH;
certificate.data = CERT_DER_DATA;
UA_ByteString privateKey;
privateKey.length = KEY_DER_LENGTH;
privateKey.data = KEY_DER_DATA;
server = UA_Server_newForUnitTestWithSecurityPolicies(4840, &certificate, &privateKey,
NULL, 0,
NULL, 0,
NULL, 0);
ck_assert(server != NULL);
UA_ServerConfig *config = UA_Server_getConfig(server);
/* Set the ApplicationUri used in the certificate */
UA_String_clear(&config->applicationDescription.applicationUri);
config->applicationDescription.applicationUri =
UA_STRING_ALLOC("urn:unconfigured:application");
UA_Server_run_startup(server);
THREAD_CREATE(server_thread, serverloop);
}
#ifdef __linux__ /* Linux only so far */
static void setup2(void) {
running = true;
/* Load certificate and private key */
UA_ByteString certificate;
certificate.length = CERT_DER_LENGTH;
certificate.data = CERT_DER_DATA;
UA_ByteString privateKey;
privateKey.length = KEY_DER_LENGTH;
privateKey.data = KEY_DER_DATA;
server = UA_Server_newForUnitTestWithSecurityPolicies(4840, &certificate, &privateKey,
NULL, 0,
NULL, 0,
NULL, 0);
ck_assert(server != NULL);
UA_ServerConfig *config = UA_Server_getConfig(server);
char storePathDir[32];
strcpy(storePathDir, "open62541-pki-XXXXXX");
mkdtemp(storePathDir);
const UA_String storePath = UA_STRING(storePathDir);
UA_ServerConfig_setDefaultWithFilestore(config, 4840, &certificate, &privateKey, storePath);
config->eventLoop->dateTime_now= UA_DateTime_now_fake;
config->eventLoop->dateTime_nowMonotonic = UA_DateTime_now_fake;
config->tcpReuseAddr = true;
/* Set the ApplicationUri used in the certificate */
UA_String_clear(&config->applicationDescription.applicationUri);
config->applicationDescription.applicationUri =
UA_STRING_ALLOC("urn:unconfigured:application");
UA_Server_run_startup(server);
THREAD_CREATE(server_thread, serverloop);
}
#endif
static void teardown(void) {
running = false;
THREAD_JOIN(server_thread);
UA_Server_run_shutdown(server);
UA_Server_delete(server);
}
START_TEST(set_trustlist) {
UA_ServerConfig *config = UA_Server_getConfig(server);
/* Load certificate and private key */
UA_ByteString trustedCertificate;
trustedCertificate.length = CERT_DER_LENGTH;
trustedCertificate.data = CERT_DER_DATA;
UA_ByteString issuerCertificate;
issuerCertificate.length = CERT_PEM_LENGTH;
issuerCertificate.data = CERT_PEM_DATA;
/* Add the specified list to the default application group */
UA_TrustListDataType trustListTmp;
memset(&trustListTmp, 0, sizeof(UA_TrustListDataType));
trustListTmp.specifiedLists = (UA_TRUSTLISTMASKS_TRUSTEDCERTIFICATES | UA_TRUSTLISTMASKS_ISSUERCERTIFICATES);
trustListTmp.trustedCertificates = &trustedCertificate;
trustListTmp.trustedCertificatesSize = 1;
trustListTmp.issuerCertificates = &issuerCertificate;
trustListTmp.issuerCertificatesSize = 1;
UA_StatusCode retval = config->secureChannelPKI.setTrustList(&config->secureChannelPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
retval = config->sessionPKI.setTrustList(&config->sessionPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
}
END_TEST
START_TEST(add_to_trustlist) {
UA_ServerConfig *config = UA_Server_getConfig(server);
/* Load certificate and private key */
UA_ByteString trustedCertificate;
trustedCertificate.length = CERT_DER_LENGTH;
trustedCertificate.data = CERT_DER_DATA;
UA_ByteString issuerCertificate;
issuerCertificate.length = CERT_PEM_LENGTH;
issuerCertificate.data = CERT_PEM_DATA;
/* Add the specified list to the default application group */
UA_TrustListDataType trustListTmp;
memset(&trustListTmp, 0, sizeof(UA_TrustListDataType));
trustListTmp.specifiedLists = (UA_TRUSTLISTMASKS_TRUSTEDCERTIFICATES | UA_TRUSTLISTMASKS_ISSUERCERTIFICATES);
trustListTmp.trustedCertificates = &trustedCertificate;
trustListTmp.trustedCertificatesSize = 1;
trustListTmp.issuerCertificates = &issuerCertificate;
trustListTmp.issuerCertificatesSize = 1;
UA_StatusCode retval = config->secureChannelPKI.addToTrustList(&config->secureChannelPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
retval = config->sessionPKI.addToTrustList(&config->sessionPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
}
END_TEST
START_TEST(get_trustlist) {
UA_ServerConfig *config = UA_Server_getConfig(server);
/* Load certificate and private key */
UA_ByteString trustedCertificate;
trustedCertificate.length = CERT_DER_LENGTH;
trustedCertificate.data = CERT_DER_DATA;
UA_ByteString issuerCertificate;
issuerCertificate.length = CERT_PEM_LENGTH;
issuerCertificate.data = CERT_PEM_DATA;
/* Add the specified list to the default application group */
UA_TrustListDataType trustListTmp;
memset(&trustListTmp, 0, sizeof(UA_TrustListDataType));
trustListTmp.specifiedLists = (UA_TRUSTLISTMASKS_TRUSTEDCERTIFICATES | UA_TRUSTLISTMASKS_ISSUERCERTIFICATES);
trustListTmp.trustedCertificates = &trustedCertificate;
trustListTmp.trustedCertificatesSize = 1;
trustListTmp.issuerCertificates = &issuerCertificate;
trustListTmp.issuerCertificatesSize = 1;
UA_StatusCode retval = config->secureChannelPKI.addToTrustList(&config->secureChannelPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
retval = config->sessionPKI.addToTrustList(&config->sessionPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
UA_TrustListDataType trustList;
UA_TrustListDataType_init(&trustList);
trustList.specifiedLists = UA_TRUSTLISTMASKS_ALL;
retval = config->secureChannelPKI.getTrustList(&config->secureChannelPKI, &trustList);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
ck_assert_uint_eq(trustList.trustedCertificatesSize, 1);
ck_assert_uint_eq(trustList.issuerCertificatesSize, 1);
ck_assert_uint_eq(trustList.trustedCrlsSize, 0);
ck_assert_uint_eq(trustList.issuerCrlsSize, 0);
ck_assert(UA_ByteString_equal(&trustedCertificate, &trustList.trustedCertificates[0]));
ck_assert(UA_ByteString_equal(&issuerCertificate, &trustList.issuerCertificates[0]));
UA_TrustListDataType_clear(&trustList);
}
END_TEST
START_TEST(remove_from_trustlist) {
UA_ServerConfig *config = UA_Server_getConfig(server);
/* Load certificate and private key */
UA_ByteString trustedCertificate;
trustedCertificate.length = CERT_DER_LENGTH;
trustedCertificate.data = CERT_DER_DATA;
UA_ByteString issuerCertificate;
issuerCertificate.length = CERT_PEM_LENGTH;
issuerCertificate.data = CERT_PEM_DATA;
/* Add the specified list to the default application group */
UA_TrustListDataType trustListTmp;
memset(&trustListTmp, 0, sizeof(UA_TrustListDataType));
trustListTmp.specifiedLists = (UA_TRUSTLISTMASKS_TRUSTEDCERTIFICATES | UA_TRUSTLISTMASKS_ISSUERCERTIFICATES);
trustListTmp.trustedCertificates = &trustedCertificate;
trustListTmp.trustedCertificatesSize = 1;
trustListTmp.issuerCertificates = &issuerCertificate;
trustListTmp.issuerCertificatesSize = 1;
UA_StatusCode retval = config->secureChannelPKI.setTrustList(&config->secureChannelPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
retval = config->sessionPKI.setTrustList(&config->sessionPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
retval = config->secureChannelPKI.removeFromTrustList(&config->secureChannelPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
retval = config->sessionPKI.removeFromTrustList(&config->sessionPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
}
END_TEST
START_TEST(get_rejectedlist) {
/* Init client and connect to server */
UA_Client *client = NULL;
UA_ByteString *trustList = NULL;
size_t trustListSize = 0;
UA_ByteString *revocationList = NULL;
size_t revocationListSize = 0;
/* Load certificate and private key */
UA_ByteString certificate;
certificate.length = CERT_DER_LENGTH;
certificate.data = CERT_DER_DATA;
ck_assert_uint_ne(certificate.length, 0);
UA_ByteString privateKey;
privateKey.length = KEY_DER_LENGTH;
privateKey.data = KEY_DER_DATA;
ck_assert_uint_ne(privateKey.length, 0);
/* Secure client initialization */
client = UA_Client_newForUnitTest();
UA_ClientConfig *cc = UA_Client_getConfig(client);
UA_ClientConfig_setDefaultEncryption(cc, certificate, privateKey,
trustList, trustListSize,
revocationList, revocationListSize);
cc->certificateVerification.clear(&cc->certificateVerification);
UA_CertificateGroup_AcceptAll(&cc->certificateVerification);
cc->securityPolicyUri =
UA_STRING_ALLOC("http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256");
ck_assert(client != NULL);
/* Set server config */
UA_ServerConfig *config = UA_Server_getConfig(server);
/* Load certificate and private key */
UA_ByteString issuerCertificate;
issuerCertificate.length = CERT_DER_LENGTH;
issuerCertificate.data = CERT_DER_DATA;
/* Add the specified list to the default application group */
UA_TrustListDataType trustListTmp;
memset(&trustListTmp, 0, sizeof(UA_TrustListDataType));
trustListTmp.specifiedLists = UA_TRUSTLISTMASKS_ISSUERCERTIFICATES;
trustListTmp.issuerCertificates = &issuerCertificate;
trustListTmp.issuerCertificatesSize = 1;
UA_StatusCode retval = config->secureChannelPKI.setTrustList(&config->secureChannelPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
retval = config->sessionPKI.setTrustList(&config->sessionPKI, &trustListTmp);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
/* Secure client connect */
retval = UA_Client_connect(client, "opc.tcp://localhost:4840");
ck_assert_uint_eq(retval, UA_STATUSCODE_BADSECURITYCHECKSFAILED);
UA_ByteString *rejectedList = NULL;
size_t rejectedListSize = 0;
retval = config->secureChannelPKI.getRejectedList(&config->secureChannelPKI, &rejectedList, &rejectedListSize);
ck_assert_uint_eq(retval, UA_STATUSCODE_GOOD);
ck_assert_uint_eq(rejectedListSize, 1);
UA_Array_delete(rejectedList, rejectedListSize, &UA_TYPES[UA_TYPES_BYTESTRING]);
UA_Client_delete(client);
}
END_TEST
static Suite* testSuite_encryption(void) {
Suite *s = suite_create("CertificateGroup");
TCase *tc_encryption_memorystore = tcase_create("CertificateGroup Memorystore");
tcase_add_checked_fixture(tc_encryption_memorystore, setup, teardown);
#ifdef UA_ENABLE_ENCRYPTION
tcase_add_test(tc_encryption_memorystore, get_trustlist);
tcase_add_test(tc_encryption_memorystore, set_trustlist);
tcase_add_test(tc_encryption_memorystore, add_to_trustlist);
tcase_add_test(tc_encryption_memorystore, remove_from_trustlist);
tcase_add_test(tc_encryption_memorystore, get_rejectedlist);
#endif /* UA_ENABLE_ENCRYPTION */
suite_add_tcase(s,tc_encryption_memorystore);
#ifdef __linux__ /* Linux only so far */
TCase *tc_encryption_filestore = tcase_create("CertificateGroup Filestore");
tcase_add_checked_fixture(tc_encryption_filestore, setup2, teardown);
#ifdef UA_ENABLE_ENCRYPTION
tcase_add_test(tc_encryption_filestore, get_trustlist);
tcase_add_test(tc_encryption_filestore, set_trustlist);
tcase_add_test(tc_encryption_filestore, add_to_trustlist);
tcase_add_test(tc_encryption_filestore, remove_from_trustlist);
tcase_add_test(tc_encryption_filestore, get_rejectedlist);
suite_add_tcase(s,tc_encryption_filestore);
#endif /* UA_ENABLE_ENCRYPTION */
#endif
return s;
}
int main(void) {
Suite *s = testSuite_encryption();
SRunner *sr = srunner_create(s);
srunner_set_fork_status(sr, CK_NOFORK);
srunner_run_all(sr,CK_NORMAL);
int number_failed = srunner_ntests_failed(sr);
srunner_free(sr);
return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
}