mirror of
				https://github.com/PowerShell/Win32-OpenSSH.git
				synced 2025-10-31 11:44:38 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			186 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			186 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| #	$OpenBSD: krl.sh,v 1.6 2015/01/30 01:11:39 djm Exp $
 | |
| #	Placed in the Public Domain.
 | |
| 
 | |
| tid="key revocation lists"
 | |
| 
 | |
| # If we don't support ecdsa keys then this tell will be much slower.
 | |
| ECDSA=ecdsa
 | |
| if test "x$TEST_SSH_ECC" != "xyes"; then
 | |
| 	ECDSA=rsa
 | |
| fi
 | |
| 
 | |
| # Do most testing with ssh-keygen; it uses the same verification code as sshd.
 | |
| 
 | |
| # Old keys will interfere with ssh-keygen.
 | |
| rm -f $OBJ/revoked-* $OBJ/krl-*
 | |
| 
 | |
| # Generate a CA key
 | |
| $SSHKEYGEN -t $ECDSA -f $OBJ/revoked-ca  -C "" -N "" > /dev/null ||
 | |
| 	fatal "$SSHKEYGEN CA failed"
 | |
| $SSHKEYGEN -t ed25519 -f $OBJ/revoked-ca2  -C "" -N "" > /dev/null ||
 | |
| 	fatal "$SSHKEYGEN CA2 failed"
 | |
| 
 | |
| # A specification that revokes some certificates by serial numbers
 | |
| # The serial pattern is chosen to ensure the KRL includes list, range and
 | |
| # bitmap sections.
 | |
| cat << EOF >> $OBJ/revoked-serials
 | |
| serial: 1-4
 | |
| serial: 10
 | |
| serial: 15
 | |
| serial: 30
 | |
| serial: 50
 | |
| serial: 999
 | |
| # The following sum to 500-799
 | |
| serial: 500
 | |
| serial: 501
 | |
| serial: 502
 | |
| serial: 503-600
 | |
| serial: 700-797
 | |
| serial: 798
 | |
| serial: 799
 | |
| serial: 599-701
 | |
| # Some multiple consecutive serial number ranges
 | |
| serial: 10000-20000
 | |
| serial: 30000-40000
 | |
| EOF
 | |
| 
 | |
| # A specification that revokes some certificated by key ID.
 | |
| touch $OBJ/revoked-keyid
 | |
| for n in 1 2 3 4 10 15 30 50 `jot 500 300` 999 1000 1001 1002; do
 | |
| 	test "x$n" = "x499" && continue
 | |
| 	# Fill in by-ID revocation spec.
 | |
| 	echo "id: revoked $n" >> $OBJ/revoked-keyid
 | |
| done
 | |
| 
 | |
| keygen() {
 | |
| 	N=$1
 | |
| 	f=$OBJ/revoked-`printf "%04d" $N`
 | |
| 	# Vary the keytype. We use mostly ECDSA since this is fastest by far.
 | |
| 	keytype=$ECDSA
 | |
| 	case $N in
 | |
| 	2 | 10 | 510 | 1001)	keytype=rsa;;
 | |
| 	4 | 30 | 520 | 1002)	keytype=ed25519;;
 | |
| 	esac
 | |
| 	$SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
 | |
| 		|| fatal "$SSHKEYGEN failed"
 | |
| 	# Sign cert
 | |
| 	$SSHKEYGEN -s $OBJ/revoked-ca -z $n -I "revoked $N" $f >/dev/null 2>&1 \
 | |
| 		|| fatal "$SSHKEYGEN sign failed"
 | |
| 	echo $f
 | |
| }
 | |
| 
 | |
| # Generate some keys.
 | |
| verbose "$tid: generating test keys"
 | |
| REVOKED_SERIALS="1 4 10 50 500 510 520 799 999"
 | |
| for n in $REVOKED_SERIALS ; do
 | |
| 	f=`keygen $n`
 | |
| 	RKEYS="$RKEYS ${f}.pub"
 | |
| 	RCERTS="$RCERTS ${f}-cert.pub"
 | |
| done
 | |
| UNREVOKED_SERIALS="5 9 14 16 29 49 51 499 800 1010 1011"
 | |
| UNREVOKED=""
 | |
| for n in $UNREVOKED_SERIALS ; do
 | |
| 	f=`keygen $n`
 | |
| 	UKEYS="$UKEYS ${f}.pub"
 | |
| 	UCERTS="$UCERTS ${f}-cert.pub"
 | |
| done
 | |
| 
 | |
| genkrls() {
 | |
| 	OPTS=$1
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-empty - </dev/null \
 | |
| 	>/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-keys $RKEYS \
 | |
| 	>/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-cert $RCERTS \
 | |
| 	>/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-all $RKEYS $RCERTS \
 | |
| 	>/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-ca $OBJ/revoked-ca.pub \
 | |
| 	>/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| # This should fail as KRLs from serial/key-id spec need the CA specified.
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-serial $OBJ/revoked-serials \
 | |
| 	>/dev/null 2>&1 && fatal "$SSHKEYGEN KRL succeeded unexpectedly"
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
 | |
| 	>/dev/null 2>&1 && fatal "$SSHKEYGEN KRL succeeded unexpectedly"
 | |
| # These should succeed; they specify an explicit CA key.
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-serial -s $OBJ/revoked-ca \
 | |
| 	$OBJ/revoked-serials >/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \
 | |
| 	$OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| # These should succeed; they specify an wildcard CA key.
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-serial-wild -s NONE $OBJ/revoked-serials \
 | |
| 	>/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \
 | |
| 	>/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| # Revoke the same serials with the second CA key to ensure a multi-CA
 | |
| # KRL is generated.
 | |
| $SSHKEYGEN $OPTS -kf $OBJ/krl-serial -u -s $OBJ/revoked-ca2 \
 | |
| 	$OBJ/revoked-serials >/dev/null || fatal "$SSHKEYGEN KRL failed"
 | |
| }
 | |
| 
 | |
| ## XXX dump with trace and grep for set cert serials
 | |
| ## XXX test ranges near (u64)-1, etc.
 | |
| 
 | |
| verbose "$tid: generating KRLs"
 | |
| genkrls
 | |
| 
 | |
| check_krl() {
 | |
| 	KEY=$1
 | |
| 	KRL=$2
 | |
| 	EXPECT_REVOKED=$3
 | |
| 	TAG=$4
 | |
| 	$SSHKEYGEN -Qf $KRL $KEY >/dev/null
 | |
| 	result=$?
 | |
| 	if test "x$EXPECT_REVOKED" = "xyes" -a $result -eq 0 ; then
 | |
| 		fatal "key $KEY not revoked by KRL $KRL: $TAG"
 | |
| 	elif test "x$EXPECT_REVOKED" = "xno" -a $result -ne 0 ; then
 | |
| 		fatal "key $KEY unexpectedly revoked by KRL $KRL: $TAG"
 | |
| 	fi
 | |
| }
 | |
| test_rev() {
 | |
| 	FILES=$1
 | |
| 	TAG=$2
 | |
| 	KEYS_RESULT=$3
 | |
| 	ALL_RESULT=$4
 | |
| 	SERIAL_RESULT=$5
 | |
| 	KEYID_RESULT=$6
 | |
| 	CERTS_RESULT=$7
 | |
| 	CA_RESULT=$8
 | |
| 	SERIAL_WRESULT=$9
 | |
| 	KEYID_WRESULT=$10
 | |
| 	verbose "$tid: checking revocations for $TAG"
 | |
| 	for f in $FILES ; do
 | |
| 		check_krl $f $OBJ/krl-empty		no		"$TAG"
 | |
| 		check_krl $f $OBJ/krl-keys		$KEYS_RESULT	"$TAG"
 | |
| 		check_krl $f $OBJ/krl-all		$ALL_RESULT	"$TAG"
 | |
| 		check_krl $f $OBJ/krl-serial		$SERIAL_RESULT	"$TAG"
 | |
| 		check_krl $f $OBJ/krl-keyid		$KEYID_RESULT	"$TAG"
 | |
| 		check_krl $f $OBJ/krl-cert		$CERTS_RESULT	"$TAG"
 | |
| 		check_krl $f $OBJ/krl-ca		$CA_RESULT	"$TAG"
 | |
| 		check_krl $f $OBJ/krl-serial-wild	$SERIAL_WRESULT	"$TAG"
 | |
| 		check_krl $f $OBJ/krl-keyid-wild	$KEYID_WRESULT	"$TAG"
 | |
| 	done
 | |
| }
 | |
| 
 | |
| test_all() {
 | |
| 	#                                                               wildcard
 | |
| 	#                                   keys all sr# k.ID cert  CA sr.# k.ID
 | |
| 	test_rev "$RKEYS"     "revoked keys" yes yes  no   no   no  no   no   no
 | |
| 	test_rev "$UKEYS"   "unrevoked keys"  no  no  no   no   no  no   no   no
 | |
| 	test_rev "$RCERTS"   "revoked certs" yes yes yes  yes  yes yes  yes  yes
 | |
| 	test_rev "$UCERTS" "unrevoked certs"  no  no  no   no   no yes   no   no
 | |
| }
 | |
| 
 | |
| test_all
 | |
| 
 | |
| # Check update. Results should be identical.
 | |
| verbose "$tid: testing KRL update"
 | |
| for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
 | |
|     $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid \
 | |
|     $OBJ/krl-serial-wild $OBJ/krl-keyid-wild; do
 | |
| 	cp -f $OBJ/krl-empty $f
 | |
| 	genkrls -u
 | |
| done
 | |
| 
 | |
| test_all
 |