|
Packit |
aea12f |
/*
|
|
Packit |
aea12f |
* Copyright (C) 2008-2012 Free Software Foundation, Inc.
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* Author: David Marín Carreño
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* This file is part of GnuTLS.
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* GnuTLS is free software; you can redistribute it and/or modify it
|
|
Packit |
aea12f |
* under the terms of the GNU General Public License as published by
|
|
Packit |
aea12f |
* the Free Software Foundation; either version 3 of the License, or
|
|
Packit |
aea12f |
* (at your option) any later version.
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* GnuTLS is distributed in the hope that it will be useful, but
|
|
Packit |
aea12f |
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit |
aea12f |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Packit |
aea12f |
* General Public License for more details.
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* You should have received a copy of the GNU General Public License
|
|
Packit |
aea12f |
* along with GnuTLS; if not, write to the Free Software Foundation,
|
|
Packit |
aea12f |
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
|
Packit |
aea12f |
*/
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
#ifdef HAVE_CONFIG_H
|
|
Packit |
aea12f |
#include <config.h>
|
|
Packit |
aea12f |
#endif
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
#include <stdlib.h>
|
|
Packit |
aea12f |
#include <stdio.h>
|
|
Packit |
aea12f |
#include <string.h>
|
|
Packit |
aea12f |
#include <gnutls/gnutls.h>
|
|
Packit |
aea12f |
#include <gnutls/x509.h>
|
|
Packit |
aea12f |
#include <gnutls/abstract.h>
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
#include "utils.h"
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
static void tls_log_func(int level, const char *str)
|
|
Packit |
aea12f |
{
|
|
Packit |
aea12f |
fprintf(stderr, "%s |<%d>| %s", "crq_key_id", level, str);
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
void doit(void)
|
|
Packit |
aea12f |
{
|
|
Packit |
aea12f |
gnutls_x509_privkey_t pkey;
|
|
Packit |
aea12f |
gnutls_privkey_t abs_pkey;
|
|
Packit |
aea12f |
gnutls_x509_crq_t crq;
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
size_t pkey_key_id_len;
|
|
Packit |
aea12f |
unsigned char *pkey_key_id = NULL;
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
size_t crq_key_id_len;
|
|
Packit |
aea12f |
unsigned char *crq_key_id = NULL;
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
gnutls_pk_algorithm_t algorithm;
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
int ret;
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = global_init();
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("global_init: %d\n", ret);
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
gnutls_global_set_log_function(tls_log_func);
|
|
Packit |
aea12f |
if (debug)
|
|
Packit |
aea12f |
gnutls_global_set_log_level(4711);
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
for (algorithm = GNUTLS_PK_RSA; algorithm <= GNUTLS_PK_DSA;
|
|
Packit |
aea12f |
algorithm++) {
|
|
Packit |
aea12f |
ret = gnutls_x509_crq_init(&crq;;
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_x509_crq_init: %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_x509_privkey_init(&pkey);
|
|
Packit |
aea12f |
if (ret < 0) {
|
|
Packit |
aea12f |
fail("gnutls_x509_privkey_init: %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_privkey_init(&abs_pkey);
|
|
Packit |
aea12f |
if (ret < 0) {
|
|
Packit |
aea12f |
fail("gnutls_privkey_init: %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_x509_privkey_generate(pkey, algorithm, 2048, 0);
|
|
Packit |
aea12f |
if (ret < 0) {
|
|
Packit |
aea12f |
fail("gnutls_x509_privkey_generate (%s): %d: %s\n",
|
|
Packit |
aea12f |
gnutls_pk_algorithm_get_name(algorithm),
|
|
Packit |
aea12f |
ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
} else if (debug) {
|
|
Packit |
aea12f |
success("Key[%s] generation ok: %d\n",
|
|
Packit |
aea12f |
gnutls_pk_algorithm_get_name(algorithm),
|
|
Packit |
aea12f |
ret);
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
pkey_key_id_len = 0;
|
|
Packit |
aea12f |
ret = gnutls_x509_privkey_get_key_id(pkey, 0, pkey_key_id,
|
|
Packit |
aea12f |
&pkey_key_id_len);
|
|
Packit |
aea12f |
if (ret != GNUTLS_E_SHORT_MEMORY_BUFFER) {
|
|
Packit |
aea12f |
fail("gnutls_x509_privkey_get_key_id incorrectly returns %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
pkey_key_id =
|
|
Packit |
aea12f |
malloc(sizeof(unsigned char) * pkey_key_id_len);
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_x509_privkey_get_key_id(pkey, 0, pkey_key_id,
|
|
Packit |
aea12f |
&pkey_key_id_len);
|
|
Packit |
aea12f |
if (ret != GNUTLS_E_SUCCESS) {
|
|
Packit |
aea12f |
fail("gnutls_x509_privkey_get_key_id incorrectly returns %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_x509_crq_set_version(crq, 1);
|
|
Packit |
aea12f |
if (ret < 0) {
|
|
Packit |
aea12f |
fail("gnutls_x509_crq_set_version: %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_x509_crq_set_key(crq, pkey);
|
|
Packit |
aea12f |
if (ret < 0) {
|
|
Packit |
aea12f |
fail("gnutls_x509_crq_set_key: %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_x509_crq_set_dn_by_oid(crq,
|
|
Packit |
aea12f |
GNUTLS_OID_X520_COMMON_NAME,
|
|
Packit |
aea12f |
0, "CN-Test", 7);
|
|
Packit |
aea12f |
if (ret < 0) {
|
|
Packit |
aea12f |
fail("gnutls_x509_crq_set_dn_by_oid: %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_privkey_import_x509(abs_pkey, pkey, 0);
|
|
Packit |
aea12f |
if (ret < 0) {
|
|
Packit |
aea12f |
fail("gnutls_privkey_import_x509: %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_x509_crq_privkey_sign(crq, abs_pkey,
|
|
Packit |
aea12f |
GNUTLS_DIG_SHA256, 0);
|
|
Packit |
aea12f |
if (ret < 0) {
|
|
Packit |
aea12f |
fail("gnutls_x509_crq_sign: %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_x509_crq_verify(crq, 0);
|
|
Packit |
aea12f |
if (ret < 0) {
|
|
Packit |
aea12f |
fail("gnutls_x509_crq_verify: %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
crq_key_id_len = 0;
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_x509_crq_get_key_id(crq, 0, crq_key_id,
|
|
Packit |
aea12f |
&crq_key_id_len);
|
|
Packit |
aea12f |
if (ret != GNUTLS_E_SHORT_MEMORY_BUFFER) {
|
|
Packit |
aea12f |
fail("gnutls_x509_crq_get_key_id incorrectly returns %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
crq_key_id =
|
|
Packit |
aea12f |
malloc(sizeof(unsigned char) * crq_key_id_len);
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_x509_crq_get_key_id(crq, 0, crq_key_id,
|
|
Packit |
aea12f |
&crq_key_id_len);
|
|
Packit |
aea12f |
if (ret != GNUTLS_E_SUCCESS) {
|
|
Packit |
aea12f |
fail("gnutls_x509_crq_get_key_id incorrectly returns %d: %s\n", ret, gnutls_strerror(ret));
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (crq_key_id_len == pkey_key_id_len) {
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
memcmp(crq_key_id, pkey_key_id,
|
|
Packit |
aea12f |
crq_key_id_len);
|
|
Packit |
aea12f |
if (ret == 0) {
|
|
Packit |
aea12f |
if (debug)
|
|
Packit |
aea12f |
success
|
|
Packit |
aea12f |
("Key ids are identical. OK.\n");
|
|
Packit |
aea12f |
} else {
|
|
Packit |
aea12f |
fail("Key ids differ incorrectly: %d\n",
|
|
Packit |
aea12f |
ret);
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
} else {
|
|
Packit |
aea12f |
fail("Key_id lengths differ incorrectly: %d - %d\n", (int) crq_key_id_len, (int) pkey_key_id_len);
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (pkey_key_id) {
|
|
Packit |
aea12f |
free(pkey_key_id);
|
|
Packit |
aea12f |
pkey_key_id = NULL;
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (crq_key_id) {
|
|
Packit |
aea12f |
free(crq_key_id);
|
|
Packit |
aea12f |
crq_key_id = NULL;
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
gnutls_x509_crq_deinit(crq);
|
|
Packit |
aea12f |
gnutls_x509_privkey_deinit(pkey);
|
|
Packit |
aea12f |
gnutls_privkey_deinit(abs_pkey);
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
gnutls_global_deinit();
|
|
Packit |
aea12f |
}
|