diff options
Diffstat (limited to '')
-rwxr-xr-x | tests/cert-tests/invalid-sig.sh | 103 |
1 files changed, 103 insertions, 0 deletions
diff --git a/tests/cert-tests/invalid-sig.sh b/tests/cert-tests/invalid-sig.sh new file mode 100755 index 0000000..53ef760 --- /dev/null +++ b/tests/cert-tests/invalid-sig.sh @@ -0,0 +1,103 @@ +#!/bin/sh + +# Copyright (C) 2015 Nikos Mavrogiannopoulos +# +# Author: Nikos Mavrogiannopoulos +# +# This file is part of GnuTLS. +# +# GnuTLS is free software; you can redistribute it and/or modify it +# under the terms of the GNU General Public License as published by the +# Free Software Foundation; either version 3 of the License, or (at +# your option) any later version. +# +# GnuTLS is distributed in the hope that it will be useful, but +# WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU +# General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with GnuTLS; if not, write to the Free Software Foundation, +# Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. + +#set -e + +: ${srcdir=.} +: ${CERTTOOL=../../src/certtool${EXEEXT}} +: ${DIFF=diff} +if ! test -z "${VALGRIND}"; then + VALGRIND="${LIBTOOL:-libtool} --mode=execute ${VALGRIND}" +fi + +if ! test -x "${CERTTOOL}"; then + exit 77 +fi + +. ${srcdir}/../scripts/common.sh + +#check whether a different PKCS #1 signature than the advertized in certificate is tolerated +${VALGRIND} "${CERTTOOL}" -e --infile "${srcdir}/data/invalid-sig.pem" +rc=$? + +# We're done. +if test $rc = 0; then + echo "Verification of invalid signature (1) failed" + exit 1 +fi + +#check whether a different tbsCertificate than the outer signature algorithm is tolerated +${VALGRIND} "${CERTTOOL}" -e --infile "${srcdir}/data/invalid-sig2.pem" +rc=$? + +# We're done. +if test $rc = 0; then + echo "Verification of invalid signature (2) failed" + exit 1 +fi + +#check whether a different tbsCertificate than the outer signature algorithm is tolerated +${VALGRIND} "${CERTTOOL}" -e --infile "${srcdir}/data/invalid-sig3.pem" +rc=$? + +# We're done. +if test $rc = 0; then + echo "Verification of invalid signature (3) failed" + exit 1 +fi + +#check whether different parameters in tbsCertificate than the outer signature is tolerated +${VALGRIND} "${CERTTOOL}" -e --infile "${srcdir}/data/invalid-sig4.pem" +rc=$? + +# We're done. +if test $rc = 0; then + echo "Verification of invalid signature (4) failed" + exit 1 +fi + +#check whether different RSA-PSS parameters in tbsCertificate than the outer signature is tolerated +${VALGRIND} "${CERTTOOL}" --verify-chain --infile "${srcdir}/data/invalid-sig5.pem" +rc=$? + +# We're done. +if test $rc = 0; then + echo "Verification of invalid signature (5) failed" + exit 1 +fi + +if check_for_datefudge; then + #this was causing a double free; verify that we receive the expected error code + datefudge -s 2020-01-01 \ + ${VALGRIND} "${CERTTOOL}" --verify-chain --infile "${srcdir}/data/cve-2019-3829.pem" + rc=$? + + # We're done. + if test $rc != 1; then + echo "Verification of invalid signature (6) failed" + exit 1 + fi +else + echo "Verification of invalid signature (6) skipped" +fi + +exit 0 |