if ! test -n "$WOLFSSL_OPENSSL_TEST"; then
echo "WOLFSSL_OPENSSL_TEST NOT set, won't run"
exit 77
fi
if [[ -n "$NETWORK_UNSHARE_HELPER" ]]; then
if [[ -z "$NETWORK_UNSHARE_HELPER_CALLED" ]]; then
export NETWORK_UNSHARE_HELPER_CALLED=yes
exec "$NETWORK_UNSHARE_HELPER" "$0" "$@" || exit $?
fi
elif [ "${AM_BWRAPPED-}" != "yes" ]; then
bwrap_path="$(command -v bwrap)"
if [ -n "$bwrap_path" ]; then
export AM_BWRAPPED=yes
exec "$bwrap_path" --unshare-net --dev-bind / / "$0" "$@"
fi
unset AM_BWRAPPED
fi
if [[ -z "${RETRIES_REMAINING-}" ]]; then
export RETRIES_REMAINING=2
fi
SCRIPT_DIR="$(dirname "$0")"
WOLFSSL_DIR="$(cd "$SCRIPT_DIR/.." && pwd)"
cd "$WOLFSSL_DIR" || exit 1
OCSP_RESPONDER="./examples/ocsp_responder/ocsp_responder"
OCSP_DIR="certs/ocsp"
if [ "$OPENSSL" = "" ]; then
OPENSSL=openssl
fi
[ ! -x "$OCSP_RESPONDER" ] && \
echo 'skipping: ocsp_responder not built.' 1>&2 && exit 77
if $OCSP_RESPONDER -? 2>&1 | grep -q "OCSP Responder requires"; then
echo 'skipping: ocsp_responder not compiled with required features.' 1>&2
exit 77
fi
command -v $OPENSSL >/dev/null 2>&1 || \
{ echo "Requires openssl command, skipping." 1>&2; exit 77; }
echo "wolfSSL OCSP Responder / OpenSSL OCSP client interop test"
echo "OpenSSL: $($OPENSSL version)"
echo
if nc -h 2>&1 | fgrep -q -i ipv6; then
IPV6_SUPPORTED=yes
else
IPV6_SUPPORTED=no
fi
if ./examples/client/client '-#' | fgrep -q -e ' -DTEST_IPV6 '; then
if [[ "$IPV6_SUPPORTED" == "no" ]]; then
echo 'Skipping IPV6 test in environment lacking IPV6 support.'
exit 77
fi
LOCALHOST='[::1]'
LOCALHOST_FOR_NC='-6 ::1'
else
LOCALHOST='127.0.0.1'
LOCALHOST_FOR_NC='127.0.0.1'
fi
resp_pids=""
resp_logs=""
ready_files=""
cleanup() {
exit_status=$?
for p in $resp_pids; do
kill $p 2>/dev/null
wait $p 2>/dev/null
done
for log in $resp_logs; do
rm -f "$log" 2>/dev/null
done
for rf in $ready_files; do
rm -f "$rf" 2>/dev/null
done
if [[ ("$exit_status" == 1) && ($RETRIES_REMAINING -gt 0) ]]; then
echo "retrying..."
RETRIES_REMAINING=$((RETRIES_REMAINING - 1))
exec $0 "$@"
fi
}
trap cleanup EXIT INT TERM
tests_run=0
tests_passed=0
tests_failed=0
print_responder_logs() {
echo "--- Responder Logs ---"
for log in $resp_logs; do
if [ -f "$log" ]; then
echo "=== $(basename $log) ==="
cat "$log"
echo
fi
done
echo "----------------------"
}
get_first_free_port() {
local ret="$1"
while :; do
if [[ "$ret" -ge 65536 ]]; then
ret=1024
fi
if ! nc -z ${LOCALHOST_FOR_NC} "$ret"; then
break
fi
ret=$((ret+1))
done
echo "$ret"
return 0
}
wait_for_ready_file() {
local ready_file="$1"
local pid="$2"
local port="$3"
local counter=0
while [ ! -s "$ready_file" ] && [ "$counter" -lt 20 ]; do
if ! kill -0 "$pid" 2>/dev/null; then
echo "ERROR: Responder pid $pid for port $port exited before creating ready file" 1>&2
print_responder_logs
exit 1
fi
sleep 0.1
counter=$((counter + 1))
done
if [ ! -s "$ready_file" ]; then
echo "ERROR: Ready file $ready_file not created after 2 seconds" 1>&2
print_responder_logs
exit 1
fi
}
query_ocsp() {
local issuer="$1"
local cert="$2"
local _port="$3"
local expected="$4"
local desc="$5"
tests_run=$((tests_run+1))
printf " TEST %2d: %-55s " "$tests_run" "$desc"
local output
output=$($OPENSSL ocsp \
-issuer "$issuer" \
-cert "$cert" \
-url "http://127.0.0.1:$_port/" \
-resp_text 2>&1)
local rc=$?
local status
status=$(echo "$output" | grep "Cert Status:" | head -1 | \
sed 's/.*Cert Status: *//')
if [ "$status" = "$expected" ]; then
printf "PASSED (status: %s)\n" "$status"
tests_passed=$((tests_passed+1))
else
printf "FAILED (expected: %s, got: %s, rc: %d)\n" \
"$expected" "$status" "$rc"
tests_failed=$((tests_failed+1))
echo "--- openssl output ---"
echo "$output"
echo "----------------------"
print_responder_logs
fi
}
base_port=$((((($$ + $RETRIES_REMAINING) * 5) % (65536 - 2048)) + 1024))
port1=$(get_first_free_port $base_port) port2=$(get_first_free_port $((port1 + 1))) port3=$(get_first_free_port $((port2 + 1))) port4=$(get_first_free_port $((port3 + 1))) port5=$(get_first_free_port $((port4 + 1)))
log1=$(mktemp /tmp/ocsp_resp1.XXXXXX)
resp_logs="$resp_logs $log1"
ready1=$(mktemp /tmp/ocsp_ready1.XXXXXX)
ready_files="$ready_files $ready1"
$OCSP_RESPONDER -p $port1 -v -R "$ready1" \
-c $OCSP_DIR/intermediate1-ca-cert.pem \
-k $OCSP_DIR/intermediate1-ca-key.pem \
-i $OCSP_DIR/index-intermediate1-ca-issued-certs.txt \
> "$log1" 2>&1 &
pid1=$!
resp_pids="$resp_pids $pid1"
log2=$(mktemp /tmp/ocsp_resp2.XXXXXX)
resp_logs="$resp_logs $log2"
ready2=$(mktemp /tmp/ocsp_ready2.XXXXXX)
ready_files="$ready_files $ready2"
$OCSP_RESPONDER -p $port2 -v -R "$ready2" \
-c $OCSP_DIR/intermediate2-ca-cert.pem \
-k $OCSP_DIR/intermediate2-ca-key.pem \
-i $OCSP_DIR/index-intermediate2-ca-issued-certs.txt \
> "$log2" 2>&1 &
pid2=$!
resp_pids="$resp_pids $pid2"
log3=$(mktemp /tmp/ocsp_resp3.XXXXXX)
resp_logs="$resp_logs $log3"
ready3=$(mktemp /tmp/ocsp_ready3.XXXXXX)
ready_files="$ready_files $ready3"
$OCSP_RESPONDER -p $port3 -v -R "$ready3" \
-c $OCSP_DIR/intermediate3-ca-cert.pem \
-k $OCSP_DIR/intermediate3-ca-key.pem \
-i $OCSP_DIR/index-intermediate3-ca-issued-certs.txt \
> "$log3" 2>&1 &
pid3=$!
resp_pids="$resp_pids $pid3"
log4=$(mktemp /tmp/ocsp_resp4.XXXXXX)
resp_logs="$resp_logs $log4"
ready4=$(mktemp /tmp/ocsp_ready4.XXXXXX)
ready_files="$ready_files $ready4"
$OCSP_RESPONDER -p $port4 -v -R "$ready4" \
-c $OCSP_DIR/root-ca-cert.pem \
-k $OCSP_DIR/root-ca-key.pem \
-i $OCSP_DIR/index-ca-and-intermediate-cas.txt \
> "$log4" 2>&1 &
pid4=$!
resp_pids="$resp_pids $pid4"
log5=$(mktemp /tmp/ocsp_resp5.XXXXXX)
resp_logs="$resp_logs $log5"
ready5=$(mktemp /tmp/ocsp_ready5.XXXXXX)
ready_files="$ready_files $ready5"
$OCSP_RESPONDER -p $port5 -v -R "$ready5" \
-c $OCSP_DIR/root-ca-cert.pem \
-r $OCSP_DIR/ocsp-responder-cert.pem \
-k $OCSP_DIR/ocsp-responder-key.pem \
-i $OCSP_DIR/index-ca-and-intermediate-cas.txt \
> "$log5" 2>&1 &
pid5=$!
resp_pids="$resp_pids $pid5"
echo "Starting wolfSSL OCSP responders..."
echo " Responder 1 (intermediate1-ca): port $port1, pid $pid1"
echo " Responder 2 (intermediate2-ca): port $port2, pid $pid2"
echo " Responder 3 (intermediate3-ca): port $port3, pid $pid3"
echo " Responder 4 (root-ca): port $port4, pid $pid4"
echo " Responder 5 (authorized resp): port $port5, pid $pid5"
wait_for_ready_file "$ready1" "$pid1" "$port1"
wait_for_ready_file "$ready2" "$pid2" "$port2"
wait_for_ready_file "$ready3" "$pid3" "$port3"
wait_for_ready_file "$ready4" "$pid4" "$port4"
wait_for_ready_file "$ready5" "$pid5" "$port5"
echo "All responders ready"
echo "All responders running."
echo
echo "=== index-intermediate1-ca-issued-certs.txt (intermediate1-ca) ==="
query_ocsp "$OCSP_DIR/intermediate1-ca-cert.pem" \
"$OCSP_DIR/server1-cert.pem" \
$port1 "good" \
"server1 (serial 05) -> good"
query_ocsp "$OCSP_DIR/intermediate1-ca-cert.pem" \
"$OCSP_DIR/server2-cert.pem" \
$port1 "revoked" \
"server2 (serial 06) -> revoked"
echo
echo "=== index-intermediate2-ca-issued-certs.txt (intermediate2-ca) ==="
query_ocsp "$OCSP_DIR/intermediate2-ca-cert.pem" \
"$OCSP_DIR/server3-cert.pem" \
$port2 "good" \
"server3 (serial 07) -> good"
query_ocsp "$OCSP_DIR/intermediate2-ca-cert.pem" \
"$OCSP_DIR/server4-cert.pem" \
$port2 "revoked" \
"server4 (serial 08) -> revoked"
echo
echo "=== index-intermediate3-ca-issued-certs.txt (intermediate3-ca) ==="
query_ocsp "$OCSP_DIR/intermediate3-ca-cert.pem" \
"$OCSP_DIR/server5-cert.pem" \
$port3 "good" \
"server5 (serial 09) -> good"
echo
echo "=== index-ca-and-intermediate-cas.txt (root-ca) ==="
query_ocsp "$OCSP_DIR/root-ca-cert.pem" \
"$OCSP_DIR/intermediate1-ca-cert.pem" \
$port4 "good" \
"intermediate1-ca (serial 01) -> good"
query_ocsp "$OCSP_DIR/root-ca-cert.pem" \
"$OCSP_DIR/intermediate2-ca-cert.pem" \
$port4 "good" \
"intermediate2-ca (serial 02) -> good"
query_ocsp "$OCSP_DIR/root-ca-cert.pem" \
"$OCSP_DIR/intermediate3-ca-cert.pem" \
$port4 "revoked" \
"intermediate3-ca (serial 03) -> revoked"
query_ocsp "$OCSP_DIR/root-ca-cert.pem" \
"$OCSP_DIR/root-ca-cert.pem" \
$port4 "good" \
"root-ca (serial 63) -> good"
echo
echo "=== Negative tests: unsupported features ==="
tests_run=$((tests_run+1))
printf " TEST %2d: %-55s " "$tests_run" "SHA-384 hash -> good"
output=$($OPENSSL ocsp \
-sha384 \
-issuer "$OCSP_DIR/intermediate1-ca-cert.pem" \
-cert "$OCSP_DIR/server1-cert.pem" \
-url "http://127.0.0.1:$port1/" \
-resp_text 2>&1)
rc=$?
status=$(echo "$output" | grep "Cert Status:" | head -1 | \
sed 's/.*Cert Status: *//')
if [ "$status" = "good" ]; then
printf "PASSED (status: %s)\n" "$status"
tests_passed=$((tests_passed+1))
else
printf "FAILED (expected: good, got: %s, rc: %d)\n" "$status" "$rc"
tests_failed=$((tests_failed+1))
echo "--- openssl output ---"
echo "$output"
echo "----------------------"
print_responder_logs
fi
tests_run=$((tests_run+1))
printf " TEST %2d: %-55s " "$tests_run" "Authorized responder"
output=$($OPENSSL ocsp \
-issuer "$OCSP_DIR/root-ca-cert.pem" \
-cert "$OCSP_DIR/intermediate1-ca-cert.pem" \
-url "http://127.0.0.1:$port5/" \
-resp_text 2>&1)
rc=$?
status=$(echo "$output" | grep "Cert Status:" | head -1 | \
sed 's/.*Cert Status: *//')
if [ "$status" = "good" ]; then
printf "PASSED (authorized responder works)\n"
tests_passed=$((tests_passed+1))
else
printf "FAILED (expected good status, got: %s)\n" "$status"
tests_failed=$((tests_failed+1))
echo "--- openssl output ---"
echo "$output"
echo "----------------------"
print_responder_logs
fi
echo "=== Unknown certificate tests ==="
tests_run=$((tests_run+1))
printf " TEST %2d: %-55s " "$tests_run" "Wrong issuer: server3 to responder 1 (wrong issuer)"
output=$($OPENSSL ocsp \
-issuer "$OCSP_DIR/intermediate1-ca-cert.pem" \
-cert "$OCSP_DIR/server3-cert.pem" \
-url "http://127.0.0.1:$port1/" \
-noverify \
-resp_text 2>&1)
rc=$?
if echo "$output" | grep -q "Responder Error: unauthorized"; then
printf "PASSED (OCSP unauthorized - wrong issuer)\n"
tests_passed=$((tests_passed+1))
else
printf "FAILED (expected OCSP unauthorized, got rc: %d)\n" "$rc"
tests_failed=$((tests_failed+1))
echo "--- openssl output ---"
echo "$output"
echo "----------------------"
print_responder_logs
fi
tests_run=$((tests_run+1))
printf " TEST %2d: %-55s " "$tests_run" "Wrong issuer: server1 to responder 2 (wrong issuer)"
output=$($OPENSSL ocsp \
-issuer "$OCSP_DIR/intermediate2-ca-cert.pem" \
-cert "$OCSP_DIR/server1-cert.pem" \
-url "http://127.0.0.1:$port2/" \
-noverify \
-resp_text 2>&1)
rc=$?
if echo "$output" | grep -q "Responder Error: unauthorized"; then
printf "PASSED (OCSP unauthorized - wrong issuer)\n"
tests_passed=$((tests_passed+1))
else
printf "FAILED (expected OCSP unauthorized, got rc: %d)\n" "$rc"
tests_failed=$((tests_failed+1))
echo "--- openssl output ---"
echo "$output"
echo "----------------------"
print_responder_logs
fi
echo
tests_run=$((tests_run+1))
printf " TEST %2d: %-55s " "$tests_run" "Multiple requests (should return OCSP error)"
output=$($OPENSSL ocsp \
-issuer "$OCSP_DIR/intermediate1-ca-cert.pem" \
-cert "$OCSP_DIR/server1-cert.pem" \
-cert "$OCSP_DIR/server2-cert.pem" \
-url "http://127.0.0.1:$port1/" \
-resp_text 2>&1)
rc=$?
if echo "$output" | grep -q "Responder Error: malformedrequest"; then
printf "PASSED (OCSP malformedrequest)\n"
tests_passed=$((tests_passed+1))
else
printf "FAILED (expected OCSP malformedrequest, got rc: %d)\n" "$rc"
tests_failed=$((tests_failed+1))
echo "--- openssl output ---"
echo "$output"
echo "----------------------"
print_responder_logs
fi
echo
echo "============================================================"
echo "Results: $tests_passed/$tests_run passed, $tests_failed failed"
echo "============================================================"
if [ $tests_failed -ne 0 ]; then
exit 1
fi
exit 0