1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96
|
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/
#include "s2n_test.h"
#include "tls/s2n_security_policies.h"
#include "tls/s2n_signature_scheme.h"
int main(int argc, char **argv)
{
BEGIN_TEST();
const struct s2n_signature_scheme *const test_sig_scheme_list[] = {
&s2n_ecdsa_sha256,
&s2n_rsa_pkcs1_sha1,
};
const struct s2n_signature_preferences test_certificate_signature_preferences = {
.count = s2n_array_len(test_sig_scheme_list),
.signature_schemes = test_sig_scheme_list,
};
const struct s2n_security_policy test_sp = {
.certificate_signature_preferences = &test_certificate_signature_preferences,
};
const struct s2n_signature_scheme *const pss_sig_scheme_list[] = {
&s2n_rsa_pss_pss_sha256,
&s2n_rsa_pss_pss_sha384,
&s2n_rsa_pss_pss_sha512,
&s2n_rsa_pss_rsae_sha256,
&s2n_rsa_pss_rsae_sha384,
&s2n_rsa_pss_rsae_sha512,
};
const struct s2n_signature_preferences pss_certificate_signature_preferences = {
.count = s2n_array_len(pss_sig_scheme_list),
.signature_schemes = pss_sig_scheme_list,
};
const struct s2n_security_policy test_pss_sp = {
.certificate_signature_preferences = &pss_certificate_signature_preferences,
};
/* s2n_security_policy_validate_cert_signature() */
{
/* Certificate signature algorithm is in test certificate signature preferences list */
{
struct s2n_cert_info info = {
.self_signed = false,
.signature_digest_nid = NID_sha256,
.signature_nid = NID_ecdsa_with_SHA256,
};
EXPECT_OK(s2n_security_policy_validate_cert_signature(&test_sp, &info));
};
/* Certificate signature algorithm is not in test certificate signature preferences list */
{
struct s2n_cert_info info = {
.self_signed = false,
.signature_digest_nid = NID_undef,
.signature_nid = NID_rsassaPss,
};
EXPECT_ERROR_WITH_ERRNO(
s2n_security_policy_validate_cert_signature(&test_sp, &info),
S2N_ERR_CERT_UNTRUSTED);
};
/* Certificates signed with an RSA PSS signature can be validated */
{
struct s2n_cert_info info = {
.self_signed = false,
.signature_digest_nid = NID_undef,
.signature_nid = NID_rsassaPss,
};
EXPECT_OK(s2n_security_policy_validate_cert_signature(&test_pss_sp, &info));
};
};
END_TEST();
return S2N_SUCCESS;
}
|