[Openvpn-devel,01/10] Add crypto_pem_{encode,decode}()

Message ID 1512734870-17133-2-git-send-email-steffan.karger@fox-it.com
State Superseded
Headers show
Series Client-specific tls-crypt keys (--tls-crypt-v2) | expand

Commit Message

Steffan Karger Dec. 8, 2017, 1:07 a.m. UTC
Needed for tls-crypt-v2, but isolated enough to be reviewed as a separate
patch.

The encode API allocates memory, because it fits our typical gc-oriented
code pattern and the caller does not have to do multiple calls or
calculations to determine the required destination buffer size.

The decode API does not allocate memory, because the required destination
buffer is always smaller than the input buffer (so is easy to manage by
the caller) and does not force the caller to use the heap.

Signed-off-by: Steffan Karger <steffan.karger@fox-it.com>
---
 src/openvpn/crypto_backend.h           | 30 +++++++++++
 src/openvpn/crypto_mbedtls.c           | 74 +++++++++++++++++++++++++++
 src/openvpn/crypto_openssl.c           | 82 ++++++++++++++++++++++++++++++
 tests/unit_tests/openvpn/Makefile.am   | 16 +++++-
 tests/unit_tests/openvpn/test_crypto.c | 92 ++++++++++++++++++++++++++++++++++
 5 files changed, 293 insertions(+), 1 deletion(-)
 create mode 100644 tests/unit_tests/openvpn/test_crypto.c

Comments

Antonio Quartulli June 14, 2018, 9:03 p.m. UTC | #1
Hi Steffan,

On 08/12/17 20:07, Steffan Karger wrote:
> Needed for tls-crypt-v2, but isolated enough to be reviewed as a separate
> patch.
> 
> The encode API allocates memory, because it fits our typical gc-oriented
> code pattern and the caller does not have to do multiple calls or
> calculations to determine the required destination buffer size.
> 
> The decode API does not allocate memory, because the required destination
> buffer is always smaller than the input buffer (so is easy to manage by
> the caller) and does not force the caller to use the heap.
> 
> Signed-off-by: Steffan Karger <steffan.karger@fox-it.com>
> ---
>  src/openvpn/crypto_backend.h           | 30 +++++++++++
>  src/openvpn/crypto_mbedtls.c           | 74 +++++++++++++++++++++++++++
>  src/openvpn/crypto_openssl.c           | 82 ++++++++++++++++++++++++++++++
>  tests/unit_tests/openvpn/Makefile.am   | 16 +++++-
>  tests/unit_tests/openvpn/test_crypto.c | 92 ++++++++++++++++++++++++++++++++++
>  5 files changed, 293 insertions(+), 1 deletion(-)
>  create mode 100644 tests/unit_tests/openvpn/test_crypto.c
> 
> diff --git a/src/openvpn/crypto_backend.h b/src/openvpn/crypto_backend.h
> index 567fd9b..83e14c8 100644
> --- a/src/openvpn/crypto_backend.h
> +++ b/src/openvpn/crypto_backend.h
> @@ -36,6 +36,7 @@
>  #include "crypto_mbedtls.h"
>  #endif
>  #include "basic.h"
> +#include "buffer.h"
>  
>  /* TLS uses a tag of 128 bytes, let's do the same for OpenVPN */
>  #define OPENVPN_AEAD_TAG_LENGTH 16
> @@ -105,6 +106,35 @@ void show_available_digests(void);
>  
>  void show_available_engines(void);
>  
> +/**
> + * Encode binary data as PEM
> + *
> + * @param name      The name to use in the PEM header/footer
> + * @param dst       Destination buffer for PEM-encoded data.  Must be a valid
> + *                  pointer to an uninitialized buffer structure.  Iff this
> + *                  function returns true, the buffer will contain memory
> + *                  allocated through the supplied gc.

minor: I see the current style is inconsistent wrt having a '.' at the
end of each doxygen line. Maybe we should decide what to do and stick to
that ;P But does not need to be changed in this patch of course.

> + * @param src       Source buffer
> + * @param gc        The garbage collector to use when allocating memory for
> + *                  dst.
> + *
> + * @return true iff PEM encode succeeded.
> + */
> +bool crypto_pem_encode(const char *name, struct buffer *dst,
> +                       const struct buffer *src, struct gc_arena *gc);
> +
> +/**
> + * Decode a PEM buffer to binary data
> + *
> + * @param name      The name expected in the PEM header/footer
> + * @param dst       Destination buffer for decoded data
> + * @param src       Source buffer (PEM data)
> + *
> + * @return true iff PEM decode succeeded.
> + */
> +bool crypto_pem_decode(const char *name, struct buffer *dst,
> +                       const struct buffer *src);
> +
>  /*
>   *
>   * Random number functions, used in cases where we want
> diff --git a/src/openvpn/crypto_mbedtls.c b/src/openvpn/crypto_mbedtls.c
> index 8fa03da..1e86854 100644
> --- a/src/openvpn/crypto_mbedtls.c
> +++ b/src/openvpn/crypto_mbedtls.c
> @@ -44,11 +44,13 @@
>  #include "otime.h"
>  #include "misc.h"
>  
> +#include <mbedtls/base64.h>
>  #include <mbedtls/des.h>
>  #include <mbedtls/error.h>
>  #include <mbedtls/md5.h>
>  #include <mbedtls/cipher.h>
>  #include <mbedtls/havege.h>
> +#include <mbedtls/pem.h>
>  
>  #include <mbedtls/entropy.h>
>  
> @@ -229,6 +231,78 @@ show_available_engines(void)
>             "available\n");
>  }
>  
> +bool
> +crypto_pem_encode(const char *name, struct buffer *dst,
> +                  const struct buffer *src, struct gc_arena *gc)
> +{
> +    /* 1000 chars is the PEM line length limit (+1 for tailing NUL) */
> +    char header[1000+1] = { 0 };
> +    char footer[1000+1] = { 0 };
> +
> +    if (!openvpn_snprintf(header, sizeof(header), "-----BEGIN %s-----\n", name))
> +    {
> +        return false;
> +    }
> +    if (!openvpn_snprintf(footer, sizeof(footer), "-----END %s-----\n", name))
> +    {
> +        return false;
> +    }
> +
> +    size_t out_len = 0;
> +    if (MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL !=
> +            mbedtls_pem_write_buffer(header, footer, BPTR(src), BLEN(src),
> +                                     NULL, 0, &out_len))
> +    {
> +        return false;
> +    }
> +
> +    *dst = alloc_buf_gc(out_len, gc);
> +    if (!mbed_ok(mbedtls_pem_write_buffer(header, footer, BPTR(src), BLEN(src),
> +                                          BPTR(dst), BCAP(dst), &out_len))
> +        || !buf_inc_len(dst, out_len))

Isn't in the spec of this function to keep the buffer uninitialized when
returning false?
Not a big deal because the buffer area was allocated via gc so it can't
be leaked.

Don't you think that if buf_inc_len() fails (can this really happen?)
the buffer should better be reset?

> +    {
> +        return false;
> +    }
> +
> +    return true;
> +}
> +
> +bool
> +crypto_pem_decode(const char *name, struct buffer *dst,
> +                  const struct buffer *src)
> +{
> +    /* 1000 chars is the PEM line length limit (+1 for tailing NUL) */
> +    char header[1000+1] = { 0 };
> +    char footer[1000+1] = { 0 };
> +
> +    if (*(BLAST(src)) != '\0')
> +    {
> +        msg(M_WARN, "PEM decode error: source buffer not null-terminated");
> +        return false;
> +    }
> +    if (!openvpn_snprintf(header, sizeof(header), "-----BEGIN %s-----", name))
> +    {
> +        return false;
> +    }
> +    if (!openvpn_snprintf(footer, sizeof(footer), "-----END %s-----", name))
> +    {
> +        return false;
> +    }
> +
> +    size_t use_len = 0;
> +    mbedtls_pem_context ctx = { 0 };
> +    bool ret = mbed_ok(mbedtls_pem_read_buffer(&ctx, header, footer, BPTR(src),
> +                                               NULL, 0, &use_len));
> +    if (ret && !buf_write(dst, ctx.buf, ctx.buflen))
> +    {
> +        ret = false;
> +        msg(M_WARN, "PEM decode error: destination buffer too small");
> +    }
> +
> +    mbedtls_pem_free(&ctx);
> +    return ret;
> +}
> +
>  /*
>   *
>   * Random number functions, used in cases where we want
> diff --git a/src/openvpn/crypto_openssl.c b/src/openvpn/crypto_openssl.c
> index 20a519e..49d3aeb 100644
> --- a/src/openvpn/crypto_openssl.c
> +++ b/src/openvpn/crypto_openssl.c
> @@ -387,6 +387,88 @@ show_available_engines(void)
>  #endif
>  }
>  
> +
> +bool
> +crypto_pem_encode(const char *name, struct buffer *dst,
> +                  const struct buffer *src, struct gc_arena *gc)
> +{
> +    bool ret = false;
> +    BIO *bio = BIO_new(BIO_s_mem());

can we assume bio is always initialized with non-NULL here?

> +    if (!PEM_write_bio(bio, name, "", BPTR(src), BLEN(src)))
> +    {
> +        ret = false;
> +        goto cleanup;
> +    }
> +
> +    BUF_MEM *bptr;
> +    BIO_get_mem_ptr(bio, &bptr);
> +
> +    *dst = alloc_buf_gc(bptr->length, gc);
> +    ASSERT(buf_write(dst, bptr->data, bptr->length));

why using an ASSERT() here and none in the mbedtls counterpart?

If there is no special reason I (personally) think that these helper
functions should not use ASSERT() (unless something really bad is
happening).
Or do you think that a failure here indicates a general memory problem?

> +
> +    ret = true;
> +cleanup:
> +    if (!BIO_free(bio))
> +    {
> +        ret = false;;
> +    }
> +
> +    return ret;
> +}
> +
> +bool
> +crypto_pem_decode(const char *name, struct buffer *dst,
> +                  const struct buffer *src)
> +{
> +    bool ret = false;
> +    BIO *bio;
> +
> +    if (!(bio = BIO_new_mem_buf((char *)BPTR(src), BLEN(src))))
> +    {
> +        crypto_msg(M_FATAL, "Cannot open memory BIO for PEM decode");

> +    }
> +
> +    char *name_read = NULL;
> +    char *header_read = NULL;
> +    uint8_t *data_read = NULL;
> +    long data_read_len = 0;
> +    if (!PEM_read_bio(bio, &name_read, &header_read, &data_read,
> +                      &data_read_len))
> +    {
> +        dmsg(D_CRYPT_ERRORS, "%s: PEM decode failed", __func__);
> +        goto cleanup;
> +    }
> +
> +    if (strcmp(name, name_read))
> +    {
> +        dmsg(D_CRYPT_ERRORS,
> +             "%s: unexpected PEM name (got '%s', expected '%s')",
> +             __func__, name_read, name);
> +        goto cleanup;
> +    }
> +
> +    uint8_t *dst_data = buf_write_alloc(dst, data_read_len);
> +    if (!dst_data)
> +    {
> +        dmsg(D_CRYPT_ERRORS, "%s: dst too small (%i, needs %li)", __func__,
> +             BCAP(dst), data_read_len);
> +        goto cleanup;
> +    }
> +    memcpy(dst_data, data_read, data_read_len);
> +
> +    ret = true;
> +cleanup:
> +    OPENSSL_free(name_read);
> +    OPENSSL_free(header_read);
> +    OPENSSL_free(data_read);
> +    if (!BIO_free(bio))
> +    {
> +        ret = false;;
> +    }
> +
> +    return ret;
> +}
> +
>  /*
>   *
>   * Random number functions, used in cases where we want
> diff --git a/tests/unit_tests/openvpn/Makefile.am b/tests/unit_tests/openvpn/Makefile.am
> index 23d758b..d100c21 100644
> --- a/tests/unit_tests/openvpn/Makefile.am
> +++ b/tests/unit_tests/openvpn/Makefile.am
> @@ -6,7 +6,7 @@ if HAVE_LD_WRAP_SUPPORT
>  check_PROGRAMS += argv_testdriver buffer_testdriver
>  endif
>  
> -check_PROGRAMS += packet_id_testdriver tls_crypt_testdriver
> +check_PROGRAMS += crypto_testdriver packet_id_testdriver tls_crypt_testdriver
>  
>  TESTS = $(check_PROGRAMS)
>  
> @@ -29,6 +29,20 @@ buffer_testdriver_SOURCES = test_buffer.c mock_msg.c \
>  	$(openvpn_srcdir)/buffer.c \
>  	$(openvpn_srcdir)/platform.c
>  
> +crypto_testdriver_CFLAGS  = @TEST_CFLAGS@ \
> +	-I$(openvpn_includedir) -I$(compat_srcdir) -I$(openvpn_srcdir) \
> +	$(OPTIONAL_CRYPTO_CFLAGS)
> +crypto_testdriver_LDFLAGS = @TEST_LDFLAGS@ \
> +	$(OPTIONAL_CRYPTO_LIBS)
> +crypto_testdriver_SOURCES = test_crypto.c mock_msg.c \
> +	$(openvpn_srcdir)/buffer.c \
> +	$(openvpn_srcdir)/crypto.c \
> +	$(openvpn_srcdir)/crypto_mbedtls.c \
> +	$(openvpn_srcdir)/crypto_openssl.c \
> +	$(openvpn_srcdir)/otime.c \
> +	$(openvpn_srcdir)/packet_id.c \
> +	$(openvpn_srcdir)/platform.c
> +
>  packet_id_testdriver_CFLAGS  = @TEST_CFLAGS@ \
>  	-I$(openvpn_includedir) -I$(compat_srcdir) -I$(openvpn_srcdir) \
>  	$(OPTIONAL_CRYPTO_CFLAGS)
> diff --git a/tests/unit_tests/openvpn/test_crypto.c b/tests/unit_tests/openvpn/test_crypto.c
> new file mode 100644
> index 0000000..62d5b3f
> --- /dev/null
> +++ b/tests/unit_tests/openvpn/test_crypto.c
> @@ -0,0 +1,92 @@
> +/*
> + *  OpenVPN -- An application to securely tunnel IP networks
> + *             over a single UDP port, with support for SSL/TLS-based
> + *             session authentication and key exchange,
> + *             packet encryption, packet authentication, and
> + *             packet compression.
> + *
> + *  Copyright (C) 2016-2017 Fox Crypto B.V. <openvpn@fox-it.com>
> + *

this should be updated, time flies :)

> + *  This program is free software; you can redistribute it and/or modify
> + *  it under the terms of the GNU General Public License version 2
> + *  as published by the Free Software Foundation.
> + *
> + *  This program is distributed in the hope that it will be useful,
> + *  but WITHOUT ANY WARRANTY; without even the implied warranty of
> + *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + *  GNU General Public License for more details.
> + *
> + *  You should have received a copy of the GNU General Public License along
> + *  with this program; if not, write to the Free Software Foundation, Inc.,
> + *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
> + */
> +
> +#ifdef HAVE_CONFIG_H
> +#include "config.h"
> +#elif defined(_MSC_VER)
> +#include "config-msvc.h"
> +#endif
> +
> +#include "syshead.h"
> +
> +#include <stdio.h>
> +#include <unistd.h>
> +#include <stdlib.h>
> +#include <stdarg.h>
> +#include <string.h>
> +#include <setjmp.h>
> +#include <cmocka.h>
> +
> +#include "crypto.h"
> +
> +#include "mock_msg.h"
> +
> +int script_security = 0; /* Avoid including misc.c */

I tried commenting it and I don't see any warning. Which include chain
should lead to its declaration?

> +
> +static const char testtext[] = "Dummy text to test PEM encoding";
> +
> +/**
> + * Check that packet replays are accepted when CO_IGNORE_PACKET_ID is set. This
> + * is used for the first control channel packet that arrives, because we don't
> + * know the packet ID yet.
> + */

Is the comment above a copy/paste incident? or there is something hidden
in this unit test?

> +static void
> +crypto_pem_encode_decode_loopback(void **state) {
> +    struct gc_arena gc = gc_new();
> +    struct buffer src_buf;
> +    buf_set_read(&src_buf, (void *)testtext, sizeof(testtext));
> +
> +    uint8_t dec[sizeof(testtext)];
> +    struct buffer dec_buf;
> +    buf_set_write(&dec_buf, dec, sizeof(dec));
> +
> +    struct buffer pem_buf;
> +
> +    assert_true(crypto_pem_encode("TESTKEYNAME", &pem_buf, &src_buf, &gc));
> +
> +    /* Wrong key name */
> +    assert_false(crypto_pem_decode("WRONGNAME", &dec_buf, &pem_buf));
> +
> +    assert_true(crypto_pem_decode("TESTKEYNAME", &dec_buf, &pem_buf));
> +

As a final check, wouldn't it be meaningful to compare the content of
dec_buf with src_buf to ensure that we properly obtained the original
char array?

Another question: do we have any way to verify that pem_buf contains
well-formatted PEM data after pem_encode()?
I am asking because if both encode and decode become no-op (because of
some bug) we won't be able to realize that.

However, I am not sure we have an easy way to check that..maybe you
could use some SSL function that would normally load PEM data?


> +    gc_free(&gc);
> +}
> +
> +int
> +main(void) {
> +    const struct CMUnitTest tests[] = {
> +        cmocka_unit_test(crypto_pem_encode_decode_loopback),
> +    };
> +
> +#if defined(ENABLE_CRYPTO_OPENSSL)
> +    OpenSSL_add_all_algorithms();
> +#endif
> +
> +    int ret = cmocka_run_group_tests_name("crypto tests", tests, NULL, NULL);
> +
> +#if defined(ENABLE_CRYPTO_OPENSSL)
> +    EVP_cleanup();
> +#endif
> +
> +    return ret;
> +}
> 


Cheers,
Steffan Karger June 21, 2018, 8:14 p.m. UTC | #2
Hi Antonio,

Thanks for the review!

On 15-06-18 09:03, Antonio Quartulli wrote:
> On 08/12/17 20:07, Steffan Karger wrote:
>> Needed for tls-crypt-v2, but isolated enough to be reviewed as a separate
>> patch.
>>
>> The encode API allocates memory, because it fits our typical gc-oriented
>> code pattern and the caller does not have to do multiple calls or
>> calculations to determine the required destination buffer size.
>>
>> The decode API does not allocate memory, because the required destination
>> buffer is always smaller than the input buffer (so is easy to manage by
>> the caller) and does not force the caller to use the heap.
>>
>> Signed-off-by: Steffan Karger <steffan.karger@fox-it.com>
>> ---
>>  src/openvpn/crypto_backend.h           | 30 +++++++++++
>>  src/openvpn/crypto_mbedtls.c           | 74 +++++++++++++++++++++++++++
>>  src/openvpn/crypto_openssl.c           | 82 ++++++++++++++++++++++++++++++
>>  tests/unit_tests/openvpn/Makefile.am   | 16 +++++-
>>  tests/unit_tests/openvpn/test_crypto.c | 92 ++++++++++++++++++++++++++++++++++
>>  5 files changed, 293 insertions(+), 1 deletion(-)
>>  create mode 100644 tests/unit_tests/openvpn/test_crypto.c
>>
>> diff --git a/src/openvpn/crypto_backend.h b/src/openvpn/crypto_backend.h
>> index 567fd9b..83e14c8 100644
>> --- a/src/openvpn/crypto_backend.h
>> +++ b/src/openvpn/crypto_backend.h
>> @@ -36,6 +36,7 @@
>>  #include "crypto_mbedtls.h"
>>  #endif
>>  #include "basic.h"
>> +#include "buffer.h"
>>  
>>  /* TLS uses a tag of 128 bytes, let's do the same for OpenVPN */
>>  #define OPENVPN_AEAD_TAG_LENGTH 16
>> @@ -105,6 +106,35 @@ void show_available_digests(void);
>>  
>>  void show_available_engines(void);
>>  
>> +/**
>> + * Encode binary data as PEM
>> + *
>> + * @param name      The name to use in the PEM header/footer
>> + * @param dst       Destination buffer for PEM-encoded data.  Must be a valid
>> + *                  pointer to an uninitialized buffer structure.  Iff this
>> + *                  function returns true, the buffer will contain memory
>> + *                  allocated through the supplied gc.
> 
> minor: I see the current style is inconsistent wrt having a '.' at the
> end of each doxygen line. Maybe we should decide what to do and stick to
> that ;P But does not need to be changed in this patch of course.

You sound just like my colleague who's pointing out the missing dots in
my doxygen :')  Any preference from your side?  I think ending each line
with a dot is best, because that looks best in the generated docs.

>> + * @param src       Source buffer
>> + * @param gc        The garbage collector to use when allocating memory for
>> + *                  dst.
>> + *
>> + * @return true iff PEM encode succeeded.
>> + */
>> +bool crypto_pem_encode(const char *name, struct buffer *dst,
>> +                       const struct buffer *src, struct gc_arena *gc);
>> +
>> +/**
>> + * Decode a PEM buffer to binary data
>> + *
>> + * @param name      The name expected in the PEM header/footer
>> + * @param dst       Destination buffer for decoded data
>> + * @param src       Source buffer (PEM data)
>> + *
>> + * @return true iff PEM decode succeeded.
>> + */
>> +bool crypto_pem_decode(const char *name, struct buffer *dst,
>> +                       const struct buffer *src);
>> +
>>  /*
>>   *
>>   * Random number functions, used in cases where we want
>> diff --git a/src/openvpn/crypto_mbedtls.c b/src/openvpn/crypto_mbedtls.c
>> index 8fa03da..1e86854 100644
>> --- a/src/openvpn/crypto_mbedtls.c
>> +++ b/src/openvpn/crypto_mbedtls.c
>> @@ -44,11 +44,13 @@
>>  #include "otime.h"
>>  #include "misc.h"
>>  
>> +#include <mbedtls/base64.h>
>>  #include <mbedtls/des.h>
>>  #include <mbedtls/error.h>
>>  #include <mbedtls/md5.h>
>>  #include <mbedtls/cipher.h>
>>  #include <mbedtls/havege.h>
>> +#include <mbedtls/pem.h>
>>  
>>  #include <mbedtls/entropy.h>
>>  
>> @@ -229,6 +231,78 @@ show_available_engines(void)
>>             "available\n");
>>  }
>>  
>> +bool
>> +crypto_pem_encode(const char *name, struct buffer *dst,
>> +                  const struct buffer *src, struct gc_arena *gc)
>> +{
>> +    /* 1000 chars is the PEM line length limit (+1 for tailing NUL) */
>> +    char header[1000+1] = { 0 };
>> +    char footer[1000+1] = { 0 };
>> +
>> +    if (!openvpn_snprintf(header, sizeof(header), "-----BEGIN %s-----\n", name))
>> +    {
>> +        return false;
>> +    }
>> +    if (!openvpn_snprintf(footer, sizeof(footer), "-----END %s-----\n", name))
>> +    {
>> +        return false;
>> +    }
>> +
>> +    size_t out_len = 0;
>> +    if (MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL !=
>> +            mbedtls_pem_write_buffer(header, footer, BPTR(src), BLEN(src),
>> +                                     NULL, 0, &out_len))
>> +    {
>> +        return false;
>> +    }
>> +
>> +    *dst = alloc_buf_gc(out_len, gc);
>> +    if (!mbed_ok(mbedtls_pem_write_buffer(header, footer, BPTR(src), BLEN(src),
>> +                                          BPTR(dst), BCAP(dst), &out_len))
>> +        || !buf_inc_len(dst, out_len))
> 
> Isn't in the spec of this function to keep the buffer uninitialized when
> returning false?
> Not a big deal because the buffer area was allocated via gc so it can't
> be leaked.
> 
> Don't you think that if buf_inc_len() fails (can this really happen?)
> the buffer should better be reset?

This should really never happen according to the function specification
by mbed TLS, but I'd rather check anyway.  We might catch a bug from
their side, or better detect an API change.

But yeah, I'll add a CLEAR(*dst) here.

>> +    {
>> +        return false;
>> +    }
>> +
>> +    return true;
>> +}
>> +
>> +bool
>> +crypto_pem_decode(const char *name, struct buffer *dst,
>> +                  const struct buffer *src)
>> +{
>> +    /* 1000 chars is the PEM line length limit (+1 for tailing NUL) */
>> +    char header[1000+1] = { 0 };
>> +    char footer[1000+1] = { 0 };
>> +
>> +    if (*(BLAST(src)) != '\0')
>> +    {
>> +        msg(M_WARN, "PEM decode error: source buffer not null-terminated");
>> +        return false;
>> +    }
>> +    if (!openvpn_snprintf(header, sizeof(header), "-----BEGIN %s-----", name))
>> +    {
>> +        return false;
>> +    }
>> +    if (!openvpn_snprintf(footer, sizeof(footer), "-----END %s-----", name))
>> +    {
>> +        return false;
>> +    }
>> +
>> +    size_t use_len = 0;
>> +    mbedtls_pem_context ctx = { 0 };
>> +    bool ret = mbed_ok(mbedtls_pem_read_buffer(&ctx, header, footer, BPTR(src),
>> +                                               NULL, 0, &use_len));
>> +    if (ret && !buf_write(dst, ctx.buf, ctx.buflen))
>> +    {
>> +        ret = false;
>> +        msg(M_WARN, "PEM decode error: destination buffer too small");
>> +    }
>> +
>> +    mbedtls_pem_free(&ctx);
>> +    return ret;
>> +}
>> +
>>  /*
>>   *
>>   * Random number functions, used in cases where we want
>> diff --git a/src/openvpn/crypto_openssl.c b/src/openvpn/crypto_openssl.c
>> index 20a519e..49d3aeb 100644
>> --- a/src/openvpn/crypto_openssl.c
>> +++ b/src/openvpn/crypto_openssl.c
>> @@ -387,6 +387,88 @@ show_available_engines(void)
>>  #endif
>>  }
>>  
>> +
>> +bool
>> +crypto_pem_encode(const char *name, struct buffer *dst,
>> +                  const struct buffer *src, struct gc_arena *gc)
>> +{
>> +    bool ret = false;
>> +    BIO *bio = BIO_new(BIO_s_mem());
> 
> can we assume bio is always initialized with non-NULL here?

Don't think so.  Will fix.

>> +    if (!PEM_write_bio(bio, name, "", BPTR(src), BLEN(src)))
>> +    {
>> +        ret = false;
>> +        goto cleanup;
>> +    }
>> +
>> +    BUF_MEM *bptr;
>> +    BIO_get_mem_ptr(bio, &bptr);
>> +
>> +    *dst = alloc_buf_gc(bptr->length, gc);
>> +    ASSERT(buf_write(dst, bptr->data, bptr->length));
> 
> why using an ASSERT() here and none in the mbedtls counterpart?
> 
> If there is no special reason I (personally) think that these helper
> functions should not use ASSERT() (unless something really bad is
> happening).
> Or do you think that a failure here indicates a general memory problem?

Because in the mbedtls part, mbed my change the "outlen" value.  While
here, we create a buffer of bptr->length bytes and then write
bptr->length bytes to it.  If that fails, our entire logic (or
executable integrity) is broken.  It's our code only, and it can not fail.

>> +
>> +    ret = true;
>> +cleanup:
>> +    if (!BIO_free(bio))
>> +    {
>> +        ret = false;;
>> +    }
>> +
>> +    return ret;
>> +}
>> +
>> +bool
>> +crypto_pem_decode(const char *name, struct buffer *dst,
>> +                  const struct buffer *src)
>> +{
>> +    bool ret = false;
>> +    BIO *bio;
>> +
>> +    if (!(bio = BIO_new_mem_buf((char *)BPTR(src), BLEN(src))))
>> +    {
>> +        crypto_msg(M_FATAL, "Cannot open memory BIO for PEM decode");
> 
>> +    }
>> +
>> +    char *name_read = NULL;
>> +    char *header_read = NULL;
>> +    uint8_t *data_read = NULL;
>> +    long data_read_len = 0;
>> +    if (!PEM_read_bio(bio, &name_read, &header_read, &data_read,
>> +                      &data_read_len))
>> +    {
>> +        dmsg(D_CRYPT_ERRORS, "%s: PEM decode failed", __func__);
>> +        goto cleanup;
>> +    }
>> +
>> +    if (strcmp(name, name_read))
>> +    {
>> +        dmsg(D_CRYPT_ERRORS,
>> +             "%s: unexpected PEM name (got '%s', expected '%s')",
>> +             __func__, name_read, name);
>> +        goto cleanup;
>> +    }
>> +
>> +    uint8_t *dst_data = buf_write_alloc(dst, data_read_len);
>> +    if (!dst_data)
>> +    {
>> +        dmsg(D_CRYPT_ERRORS, "%s: dst too small (%i, needs %li)", __func__,
>> +             BCAP(dst), data_read_len);
>> +        goto cleanup;
>> +    }
>> +    memcpy(dst_data, data_read, data_read_len);
>> +
>> +    ret = true;
>> +cleanup:
>> +    OPENSSL_free(name_read);
>> +    OPENSSL_free(header_read);
>> +    OPENSSL_free(data_read);
>> +    if (!BIO_free(bio))
>> +    {
>> +        ret = false;;
>> +    }
>> +
>> +    return ret;
>> +}
>> +
>>  /*
>>   *
>>   * Random number functions, used in cases where we want
>> diff --git a/tests/unit_tests/openvpn/Makefile.am b/tests/unit_tests/openvpn/Makefile.am
>> index 23d758b..d100c21 100644
>> --- a/tests/unit_tests/openvpn/Makefile.am
>> +++ b/tests/unit_tests/openvpn/Makefile.am
>> @@ -6,7 +6,7 @@ if HAVE_LD_WRAP_SUPPORT
>>  check_PROGRAMS += argv_testdriver buffer_testdriver
>>  endif
>>  
>> -check_PROGRAMS += packet_id_testdriver tls_crypt_testdriver
>> +check_PROGRAMS += crypto_testdriver packet_id_testdriver tls_crypt_testdriver
>>  
>>  TESTS = $(check_PROGRAMS)
>>  
>> @@ -29,6 +29,20 @@ buffer_testdriver_SOURCES = test_buffer.c mock_msg.c \
>>  	$(openvpn_srcdir)/buffer.c \
>>  	$(openvpn_srcdir)/platform.c
>>  
>> +crypto_testdriver_CFLAGS  = @TEST_CFLAGS@ \
>> +	-I$(openvpn_includedir) -I$(compat_srcdir) -I$(openvpn_srcdir) \
>> +	$(OPTIONAL_CRYPTO_CFLAGS)
>> +crypto_testdriver_LDFLAGS = @TEST_LDFLAGS@ \
>> +	$(OPTIONAL_CRYPTO_LIBS)
>> +crypto_testdriver_SOURCES = test_crypto.c mock_msg.c \
>> +	$(openvpn_srcdir)/buffer.c \
>> +	$(openvpn_srcdir)/crypto.c \
>> +	$(openvpn_srcdir)/crypto_mbedtls.c \
>> +	$(openvpn_srcdir)/crypto_openssl.c \
>> +	$(openvpn_srcdir)/otime.c \
>> +	$(openvpn_srcdir)/packet_id.c \
>> +	$(openvpn_srcdir)/platform.c
>> +
>>  packet_id_testdriver_CFLAGS  = @TEST_CFLAGS@ \
>>  	-I$(openvpn_includedir) -I$(compat_srcdir) -I$(openvpn_srcdir) \
>>  	$(OPTIONAL_CRYPTO_CFLAGS)
>> diff --git a/tests/unit_tests/openvpn/test_crypto.c b/tests/unit_tests/openvpn/test_crypto.c
>> new file mode 100644
>> index 0000000..62d5b3f
>> --- /dev/null
>> +++ b/tests/unit_tests/openvpn/test_crypto.c
>> @@ -0,0 +1,92 @@
>> +/*
>> + *  OpenVPN -- An application to securely tunnel IP networks
>> + *             over a single UDP port, with support for SSL/TLS-based
>> + *             session authentication and key exchange,
>> + *             packet encryption, packet authentication, and
>> + *             packet compression.
>> + *
>> + *  Copyright (C) 2016-2017 Fox Crypto B.V. <openvpn@fox-it.com>
>> + *
> 
> this should be updated, time flies :)

Will do.

>> + *  This program is free software; you can redistribute it and/or modify
>> + *  it under the terms of the GNU General Public License version 2
>> + *  as published by the Free Software Foundation.
>> + *
>> + *  This program is distributed in the hope that it will be useful,
>> + *  but WITHOUT ANY WARRANTY; without even the implied warranty of
>> + *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
>> + *  GNU General Public License for more details.
>> + *
>> + *  You should have received a copy of the GNU General Public License along
>> + *  with this program; if not, write to the Free Software Foundation, Inc.,
>> + *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
>> + */
>> +
>> +#ifdef HAVE_CONFIG_H
>> +#include "config.h"
>> +#elif defined(_MSC_VER)
>> +#include "config-msvc.h"
>> +#endif
>> +
>> +#include "syshead.h"
>> +
>> +#include <stdio.h>
>> +#include <unistd.h>
>> +#include <stdlib.h>
>> +#include <stdarg.h>
>> +#include <string.h>
>> +#include <setjmp.h>
>> +#include <cmocka.h>
>> +
>> +#include "crypto.h"
>> +
>> +#include "mock_msg.h"
>> +
>> +int script_security = 0; /* Avoid including misc.c */
> 
> I tried commenting it and I don't see any warning. Which include chain
> should lead to its declaration?

Ah, this is no longer the case, probably because either I messed up or
7/10 is already applied.  Either way, I'll remove it.

>> +
>> +static const char testtext[] = "Dummy text to test PEM encoding";
>> +
>> +/**
>> + * Check that packet replays are accepted when CO_IGNORE_PACKET_ID is set. This
>> + * is used for the first control channel packet that arrives, because we don't
>> + * know the packet ID yet.
>> + */
> 
> Is the comment above a copy/paste incident? or there is something hidden
> in this unit test?

Woops, definitely a pasto.

>> +static void
>> +crypto_pem_encode_decode_loopback(void **state) {
>> +    struct gc_arena gc = gc_new();
>> +    struct buffer src_buf;
>> +    buf_set_read(&src_buf, (void *)testtext, sizeof(testtext));
>> +
>> +    uint8_t dec[sizeof(testtext)];
>> +    struct buffer dec_buf;
>> +    buf_set_write(&dec_buf, dec, sizeof(dec));
>> +
>> +    struct buffer pem_buf;
>> +
>> +    assert_true(crypto_pem_encode("TESTKEYNAME", &pem_buf, &src_buf, &gc));
>> +
>> +    /* Wrong key name */
>> +    assert_false(crypto_pem_decode("WRONGNAME", &dec_buf, &pem_buf));
>> +
>> +    assert_true(crypto_pem_decode("TESTKEYNAME", &dec_buf, &pem_buf));
>> +
> 
> As a final check, wouldn't it be meaningful to compare the content of
> dec_buf with src_buf to ensure that we properly obtained the original
> char array?

Yes, will do.

> Another question: do we have any way to verify that pem_buf contains
> well-formatted PEM data after pem_encode()?
> I am asking because if both encode and decode become no-op (because of
> some bug) we won't be able to realize that.
> 
> However, I am not sure we have an easy way to check that..maybe you
> could use some SSL function that would normally load PEM data?

That is a bit annoying to test indeed.  How about I just verify that
this is encoding is not a no-op by adding a check that pem_buf is larger
that src_buf?

As for correct PEM en/decoding, I expect that the crypto lib has tested
that.

>> +    gc_free(&gc);
>> +}
>> +
>> +int
>> +main(void) {
>> +    const struct CMUnitTest tests[] = {
>> +        cmocka_unit_test(crypto_pem_encode_decode_loopback),
>> +    };
>> +
>> +#if defined(ENABLE_CRYPTO_OPENSSL)
>> +    OpenSSL_add_all_algorithms();
>> +#endif
>> +
>> +    int ret = cmocka_run_group_tests_name("crypto tests", tests, NULL, NULL);
>> +
>> +#if defined(ENABLE_CRYPTO_OPENSSL)
>> +    EVP_cleanup();
>> +#endif
>> +
>> +    return ret;
>> +}
>>
> 
> Cheers,

Thanks!

-Steffan

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
Antonio Quartulli June 21, 2018, 9:49 p.m. UTC | #3
Hi,

On 22/06/18 14:14, Steffan Karger wrote:
[cut]
>>> +/**
>>> + * Encode binary data as PEM
>>> + *
>>> + * @param name      The name to use in the PEM header/footer
>>> + * @param dst       Destination buffer for PEM-encoded data.  Must be a valid
>>> + *                  pointer to an uninitialized buffer structure.  Iff this
>>> + *                  function returns true, the buffer will contain memory
>>> + *                  allocated through the supplied gc.
>>
>> minor: I see the current style is inconsistent wrt having a '.' at the
>> end of each doxygen line. Maybe we should decide what to do and stick to
>> that ;P But does not need to be changed in this patch of course.
> 
> You sound just like my colleague who's pointing out the missing dots in
> my doxygen :')  Any preference from your side?  I think ending each line
> with a dot is best, because that looks best in the generated docs.
> 

hehe I don't have a strong preference. Let's go for 'always ending with
a dot' then.

[cut]
>>> +    if (!PEM_write_bio(bio, name, "", BPTR(src), BLEN(src)))
>>> +    {
>>> +        ret = false;
>>> +        goto cleanup;
>>> +    }
>>> +
>>> +    BUF_MEM *bptr;
>>> +    BIO_get_mem_ptr(bio, &bptr);
>>> +
>>> +    *dst = alloc_buf_gc(bptr->length, gc);
>>> +    ASSERT(buf_write(dst, bptr->data, bptr->length));
>>
>> why using an ASSERT() here and none in the mbedtls counterpart?
>>
>> If there is no special reason I (personally) think that these helper
>> functions should not use ASSERT() (unless something really bad is
>> happening).
>> Or do you think that a failure here indicates a general memory problem?
> 
> Because in the mbedtls part, mbed my change the "outlen" value.  While
> here, we create a buffer of bptr->length bytes and then write
> bptr->length bytes to it.  If that fails, our entire logic (or
> executable integrity) is broken.  It's our code only, and it can not fail.

Yeah, makes sense. Thanks for the explanation. My only worries about
ASSERTs if when the code can be tricked to trigger them without a real
general failure. But this can't be the case.

[cut]
>> Another question: do we have any way to verify that pem_buf contains
>> well-formatted PEM data after pem_encode()?
>> I am asking because if both encode and decode become no-op (because of
>> some bug) we won't be able to realize that.
>>
>> However, I am not sure we have an easy way to check that..maybe you
>> could use some SSL function that would normally load PEM data?
> 
> That is a bit annoying to test indeed.  How about I just verify that
> this is encoding is not a no-op by adding a check that pem_buf is larger
> that src_buf?
> 

Yeah probably enough.

> As for correct PEM en/decoding, I expect that the crypto lib has tested
> that.

I agree.

> 
[cut]
>>
>> Cheers,
> 
> Thanks!

Thank you!

Patch

diff --git a/src/openvpn/crypto_backend.h b/src/openvpn/crypto_backend.h
index 567fd9b..83e14c8 100644
--- a/src/openvpn/crypto_backend.h
+++ b/src/openvpn/crypto_backend.h
@@ -36,6 +36,7 @@ 
 #include "crypto_mbedtls.h"
 #endif
 #include "basic.h"
+#include "buffer.h"
 
 /* TLS uses a tag of 128 bytes, let's do the same for OpenVPN */
 #define OPENVPN_AEAD_TAG_LENGTH 16
@@ -105,6 +106,35 @@  void show_available_digests(void);
 
 void show_available_engines(void);
 
+/**
+ * Encode binary data as PEM
+ *
+ * @param name      The name to use in the PEM header/footer
+ * @param dst       Destination buffer for PEM-encoded data.  Must be a valid
+ *                  pointer to an uninitialized buffer structure.  Iff this
+ *                  function returns true, the buffer will contain memory
+ *                  allocated through the supplied gc.
+ * @param src       Source buffer
+ * @param gc        The garbage collector to use when allocating memory for
+ *                  dst.
+ *
+ * @return true iff PEM encode succeeded.
+ */
+bool crypto_pem_encode(const char *name, struct buffer *dst,
+                       const struct buffer *src, struct gc_arena *gc);
+
+/**
+ * Decode a PEM buffer to binary data
+ *
+ * @param name      The name expected in the PEM header/footer
+ * @param dst       Destination buffer for decoded data
+ * @param src       Source buffer (PEM data)
+ *
+ * @return true iff PEM decode succeeded.
+ */
+bool crypto_pem_decode(const char *name, struct buffer *dst,
+                       const struct buffer *src);
+
 /*
  *
  * Random number functions, used in cases where we want
diff --git a/src/openvpn/crypto_mbedtls.c b/src/openvpn/crypto_mbedtls.c
index 8fa03da..1e86854 100644
--- a/src/openvpn/crypto_mbedtls.c
+++ b/src/openvpn/crypto_mbedtls.c
@@ -44,11 +44,13 @@ 
 #include "otime.h"
 #include "misc.h"
 
+#include <mbedtls/base64.h>
 #include <mbedtls/des.h>
 #include <mbedtls/error.h>
 #include <mbedtls/md5.h>
 #include <mbedtls/cipher.h>
 #include <mbedtls/havege.h>
+#include <mbedtls/pem.h>
 
 #include <mbedtls/entropy.h>
 
@@ -229,6 +231,78 @@  show_available_engines(void)
            "available\n");
 }
 
+bool
+crypto_pem_encode(const char *name, struct buffer *dst,
+                  const struct buffer *src, struct gc_arena *gc)
+{
+    /* 1000 chars is the PEM line length limit (+1 for tailing NUL) */
+    char header[1000+1] = { 0 };
+    char footer[1000+1] = { 0 };
+
+    if (!openvpn_snprintf(header, sizeof(header), "-----BEGIN %s-----\n", name))
+    {
+        return false;
+    }
+    if (!openvpn_snprintf(footer, sizeof(footer), "-----END %s-----\n", name))
+    {
+        return false;
+    }
+
+    size_t out_len = 0;
+    if (MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL !=
+            mbedtls_pem_write_buffer(header, footer, BPTR(src), BLEN(src),
+                                     NULL, 0, &out_len))
+    {
+        return false;
+    }
+
+    *dst = alloc_buf_gc(out_len, gc);
+    if (!mbed_ok(mbedtls_pem_write_buffer(header, footer, BPTR(src), BLEN(src),
+                                          BPTR(dst), BCAP(dst), &out_len))
+        || !buf_inc_len(dst, out_len))
+    {
+        return false;
+    }
+
+    return true;
+}
+
+bool
+crypto_pem_decode(const char *name, struct buffer *dst,
+                  const struct buffer *src)
+{
+    /* 1000 chars is the PEM line length limit (+1 for tailing NUL) */
+    char header[1000+1] = { 0 };
+    char footer[1000+1] = { 0 };
+
+    if (*(BLAST(src)) != '\0')
+    {
+        msg(M_WARN, "PEM decode error: source buffer not null-terminated");
+        return false;
+    }
+    if (!openvpn_snprintf(header, sizeof(header), "-----BEGIN %s-----", name))
+    {
+        return false;
+    }
+    if (!openvpn_snprintf(footer, sizeof(footer), "-----END %s-----", name))
+    {
+        return false;
+    }
+
+    size_t use_len = 0;
+    mbedtls_pem_context ctx = { 0 };
+    bool ret = mbed_ok(mbedtls_pem_read_buffer(&ctx, header, footer, BPTR(src),
+                                               NULL, 0, &use_len));
+    if (ret && !buf_write(dst, ctx.buf, ctx.buflen))
+    {
+        ret = false;
+        msg(M_WARN, "PEM decode error: destination buffer too small");
+    }
+
+    mbedtls_pem_free(&ctx);
+    return ret;
+}
+
 /*
  *
  * Random number functions, used in cases where we want
diff --git a/src/openvpn/crypto_openssl.c b/src/openvpn/crypto_openssl.c
index 20a519e..49d3aeb 100644
--- a/src/openvpn/crypto_openssl.c
+++ b/src/openvpn/crypto_openssl.c
@@ -387,6 +387,88 @@  show_available_engines(void)
 #endif
 }
 
+
+bool
+crypto_pem_encode(const char *name, struct buffer *dst,
+                  const struct buffer *src, struct gc_arena *gc)
+{
+    bool ret = false;
+    BIO *bio = BIO_new(BIO_s_mem());
+    if (!PEM_write_bio(bio, name, "", BPTR(src), BLEN(src)))
+    {
+        ret = false;
+        goto cleanup;
+    }
+
+    BUF_MEM *bptr;
+    BIO_get_mem_ptr(bio, &bptr);
+
+    *dst = alloc_buf_gc(bptr->length, gc);
+    ASSERT(buf_write(dst, bptr->data, bptr->length));
+
+    ret = true;
+cleanup:
+    if (!BIO_free(bio))
+    {
+        ret = false;;
+    }
+
+    return ret;
+}
+
+bool
+crypto_pem_decode(const char *name, struct buffer *dst,
+                  const struct buffer *src)
+{
+    bool ret = false;
+    BIO *bio;
+
+    if (!(bio = BIO_new_mem_buf((char *)BPTR(src), BLEN(src))))
+    {
+        crypto_msg(M_FATAL, "Cannot open memory BIO for PEM decode");
+    }
+
+    char *name_read = NULL;
+    char *header_read = NULL;
+    uint8_t *data_read = NULL;
+    long data_read_len = 0;
+    if (!PEM_read_bio(bio, &name_read, &header_read, &data_read,
+                      &data_read_len))
+    {
+        dmsg(D_CRYPT_ERRORS, "%s: PEM decode failed", __func__);
+        goto cleanup;
+    }
+
+    if (strcmp(name, name_read))
+    {
+        dmsg(D_CRYPT_ERRORS,
+             "%s: unexpected PEM name (got '%s', expected '%s')",
+             __func__, name_read, name);
+        goto cleanup;
+    }
+
+    uint8_t *dst_data = buf_write_alloc(dst, data_read_len);
+    if (!dst_data)
+    {
+        dmsg(D_CRYPT_ERRORS, "%s: dst too small (%i, needs %li)", __func__,
+             BCAP(dst), data_read_len);
+        goto cleanup;
+    }
+    memcpy(dst_data, data_read, data_read_len);
+
+    ret = true;
+cleanup:
+    OPENSSL_free(name_read);
+    OPENSSL_free(header_read);
+    OPENSSL_free(data_read);
+    if (!BIO_free(bio))
+    {
+        ret = false;;
+    }
+
+    return ret;
+}
+
 /*
  *
  * Random number functions, used in cases where we want
diff --git a/tests/unit_tests/openvpn/Makefile.am b/tests/unit_tests/openvpn/Makefile.am
index 23d758b..d100c21 100644
--- a/tests/unit_tests/openvpn/Makefile.am
+++ b/tests/unit_tests/openvpn/Makefile.am
@@ -6,7 +6,7 @@  if HAVE_LD_WRAP_SUPPORT
 check_PROGRAMS += argv_testdriver buffer_testdriver
 endif
 
-check_PROGRAMS += packet_id_testdriver tls_crypt_testdriver
+check_PROGRAMS += crypto_testdriver packet_id_testdriver tls_crypt_testdriver
 
 TESTS = $(check_PROGRAMS)
 
@@ -29,6 +29,20 @@  buffer_testdriver_SOURCES = test_buffer.c mock_msg.c \
 	$(openvpn_srcdir)/buffer.c \
 	$(openvpn_srcdir)/platform.c
 
+crypto_testdriver_CFLAGS  = @TEST_CFLAGS@ \
+	-I$(openvpn_includedir) -I$(compat_srcdir) -I$(openvpn_srcdir) \
+	$(OPTIONAL_CRYPTO_CFLAGS)
+crypto_testdriver_LDFLAGS = @TEST_LDFLAGS@ \
+	$(OPTIONAL_CRYPTO_LIBS)
+crypto_testdriver_SOURCES = test_crypto.c mock_msg.c \
+	$(openvpn_srcdir)/buffer.c \
+	$(openvpn_srcdir)/crypto.c \
+	$(openvpn_srcdir)/crypto_mbedtls.c \
+	$(openvpn_srcdir)/crypto_openssl.c \
+	$(openvpn_srcdir)/otime.c \
+	$(openvpn_srcdir)/packet_id.c \
+	$(openvpn_srcdir)/platform.c
+
 packet_id_testdriver_CFLAGS  = @TEST_CFLAGS@ \
 	-I$(openvpn_includedir) -I$(compat_srcdir) -I$(openvpn_srcdir) \
 	$(OPTIONAL_CRYPTO_CFLAGS)
diff --git a/tests/unit_tests/openvpn/test_crypto.c b/tests/unit_tests/openvpn/test_crypto.c
new file mode 100644
index 0000000..62d5b3f
--- /dev/null
+++ b/tests/unit_tests/openvpn/test_crypto.c
@@ -0,0 +1,92 @@ 
+/*
+ *  OpenVPN -- An application to securely tunnel IP networks
+ *             over a single UDP port, with support for SSL/TLS-based
+ *             session authentication and key exchange,
+ *             packet encryption, packet authentication, and
+ *             packet compression.
+ *
+ *  Copyright (C) 2016-2017 Fox Crypto B.V. <openvpn@fox-it.com>
+ *
+ *  This program is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU General Public License version 2
+ *  as published by the Free Software Foundation.
+ *
+ *  This program is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU General Public License along
+ *  with this program; if not, write to the Free Software Foundation, Inc.,
+ *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+ */
+
+#ifdef HAVE_CONFIG_H
+#include "config.h"
+#elif defined(_MSC_VER)
+#include "config-msvc.h"
+#endif
+
+#include "syshead.h"
+
+#include <stdio.h>
+#include <unistd.h>
+#include <stdlib.h>
+#include <stdarg.h>
+#include <string.h>
+#include <setjmp.h>
+#include <cmocka.h>
+
+#include "crypto.h"
+
+#include "mock_msg.h"
+
+int script_security = 0; /* Avoid including misc.c */
+
+static const char testtext[] = "Dummy text to test PEM encoding";
+
+/**
+ * Check that packet replays are accepted when CO_IGNORE_PACKET_ID is set. This
+ * is used for the first control channel packet that arrives, because we don't
+ * know the packet ID yet.
+ */
+static void
+crypto_pem_encode_decode_loopback(void **state) {
+    struct gc_arena gc = gc_new();
+    struct buffer src_buf;
+    buf_set_read(&src_buf, (void *)testtext, sizeof(testtext));
+
+    uint8_t dec[sizeof(testtext)];
+    struct buffer dec_buf;
+    buf_set_write(&dec_buf, dec, sizeof(dec));
+
+    struct buffer pem_buf;
+
+    assert_true(crypto_pem_encode("TESTKEYNAME", &pem_buf, &src_buf, &gc));
+
+    /* Wrong key name */
+    assert_false(crypto_pem_decode("WRONGNAME", &dec_buf, &pem_buf));
+
+    assert_true(crypto_pem_decode("TESTKEYNAME", &dec_buf, &pem_buf));
+
+    gc_free(&gc);
+}
+
+int
+main(void) {
+    const struct CMUnitTest tests[] = {
+        cmocka_unit_test(crypto_pem_encode_decode_loopback),
+    };
+
+#if defined(ENABLE_CRYPTO_OPENSSL)
+    OpenSSL_add_all_algorithms();
+#endif
+
+    int ret = cmocka_run_group_tests_name("crypto tests", tests, NULL, NULL);
+
+#if defined(ENABLE_CRYPTO_OPENSSL)
+    EVP_cleanup();
+#endif
+
+    return ret;
+}