|
Packit |
aea12f |
/*
|
|
Packit |
aea12f |
* Copyright (C) 2004-2012 Free Software Foundation, Inc.
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* Author: Nikos Mavrogiannopoulos, Simon Josefsson
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* This file is part of GnuTLS.
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* GnuTLS is free software; you can redistribute it and/or modify it
|
|
Packit |
aea12f |
* under the terms of the GNU General Public License as published by
|
|
Packit |
aea12f |
* the Free Software Foundation; either version 3 of the License, or
|
|
Packit |
aea12f |
* (at your option) any later version.
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* GnuTLS is distributed in the hope that it will be useful, but
|
|
Packit |
aea12f |
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit |
aea12f |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Packit |
aea12f |
* General Public License for more details.
|
|
Packit |
aea12f |
*
|
|
Packit |
aea12f |
* You should have received a copy of the GNU General Public License
|
|
Packit |
aea12f |
* along with GnuTLS; if not, write to the Free Software Foundation,
|
|
Packit |
aea12f |
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
|
Packit |
aea12f |
*/
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
/* Parts copied from GnuTLS example programs. */
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
#ifdef HAVE_CONFIG_H
|
|
Packit |
aea12f |
#include <config.h>
|
|
Packit |
aea12f |
#endif
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
#include <stdio.h>
|
|
Packit |
aea12f |
#include <stdlib.h>
|
|
Packit |
aea12f |
#include <string.h>
|
|
Packit |
aea12f |
#include <sys/types.h>
|
|
Packit |
aea12f |
#ifndef _WIN32
|
|
Packit |
aea12f |
# include <netinet/in.h>
|
|
Packit |
aea12f |
# include <sys/socket.h>
|
|
Packit |
aea12f |
# include <arpa/inet.h>
|
|
Packit |
aea12f |
#endif
|
|
Packit |
aea12f |
#include <unistd.h>
|
|
Packit |
aea12f |
#include <gnutls/gnutls.h>
|
|
Packit |
aea12f |
#include <gnutls/x509.h>
|
|
Packit |
aea12f |
#include <gnutls/abstract.h>
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
#include "utils.h"
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
/* sha1 hash of "hello" string */
|
|
Packit |
aea12f |
const gnutls_datum_t hash_data = {
|
|
Packit |
aea12f |
(void *)
|
|
Packit |
aea12f |
"\xaa\xf4\xc6\x1d\xdc\xc5\xe8\xa2\xda\xbe"
|
|
Packit |
aea12f |
"\xde\x0f\x3b\x48\x2c\xd9\xae\xa9\x43\x4d",
|
|
Packit |
aea12f |
20
|
|
Packit |
aea12f |
};
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
const gnutls_datum_t raw_data = {
|
|
Packit |
aea12f |
(void *) "hello there",
|
|
Packit |
aea12f |
11
|
|
Packit |
aea12f |
};
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
static char pem1_cert[] =
|
|
Packit |
aea12f |
"-----BEGIN CERTIFICATE-----\n"
|
|
Packit |
aea12f |
"MIICHjCCAYmgAwIBAgIERiYdNzALBgkqhkiG9w0BAQUwGTEXMBUGA1UEAxMOR251\n"
|
|
Packit |
aea12f |
"VExTIHRlc3QgQ0EwHhcNMDcwNDE4MTMyOTI3WhcNMDgwNDE3MTMyOTI3WjAdMRsw\n"
|
|
Packit |
aea12f |
"GQYDVQQDExJHbnVUTFMgdGVzdCBjbGllbnQwgZwwCwYJKoZIhvcNAQEBA4GMADCB\n"
|
|
Packit |
aea12f |
"iAKBgLtmQ/Xyxde2jMzF3/WIO7HJS2oOoa0gUEAIgKFPXKPQ+GzP5jz37AR2ExeL\n"
|
|
Packit |
aea12f |
"ZIkiW8DdU3w77XwEu4C5KL6Om8aOoKUSy/VXHqLnu7czSZ/ju0quak1o/8kR4jKN\n"
|
|
Packit |
aea12f |
"zj2AC41179gAgY8oBAOgIo1hBAf6tjd9IQdJ0glhaZiQo1ipAgMBAAGjdjB0MAwG\n"
|
|
Packit |
aea12f |
"A1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYBBQUHAwIwDwYDVR0PAQH/BAUDAweg\n"
|
|
Packit |
aea12f |
"ADAdBgNVHQ4EFgQUTLkKm/odNON+3svSBxX+odrLaJEwHwYDVR0jBBgwFoAU6Twc\n"
|
|
Packit |
aea12f |
"+62SbuYGpFYsouHAUyfI8pUwCwYJKoZIhvcNAQEFA4GBALujmBJVZnvaTXr9cFRJ\n"
|
|
Packit |
aea12f |
"jpfc/3X7sLUsMvumcDE01ls/cG5mIatmiyEU9qI3jbgUf82z23ON/acwJf875D3/\n"
|
|
Packit |
aea12f |
"U7jyOsBJ44SEQITbin2yUeJMIm1tievvdNXBDfW95AM507ShzP12sfiJkJfjjdhy\n"
|
|
Packit |
aea12f |
"dc8Siq5JojruiMizAf0pA7in\n" "-----END CERTIFICATE-----\n";
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
static char pem1_key[] =
|
|
Packit |
aea12f |
"-----BEGIN RSA PRIVATE KEY-----\n"
|
|
Packit |
aea12f |
"MIICXAIBAAKBgQC7ZkP18sXXtozMxd/1iDuxyUtqDqGtIFBACIChT1yj0Phsz+Y8\n"
|
|
Packit |
aea12f |
"9+wEdhMXi2SJIlvA3VN8O+18BLuAuSi+jpvGjqClEsv1Vx6i57u3M0mf47tKrmpN\n"
|
|
Packit |
aea12f |
"aP/JEeIyjc49gAuNde/YAIGPKAQDoCKNYQQH+rY3fSEHSdIJYWmYkKNYqQIDAQAB\n"
|
|
Packit |
aea12f |
"AoGADpmARG5CQxS+AesNkGmpauepiCz1JBF/JwnyiX6vEzUh0Ypd39SZztwrDxvF\n"
|
|
Packit |
aea12f |
"PJjQaKVljml1zkJpIDVsqvHdyVdse8M+Qn6hw4x2p5rogdvhhIL1mdWo7jWeVJTF\n"
|
|
Packit |
aea12f |
"RKB7zLdMPs3ySdtcIQaF9nUAQ2KJEvldkO3m/bRJFEp54k0CQQDYy+RlTmwRD6hy\n"
|
|
Packit |
aea12f |
"7UtMjR0H3CSZJeQ8svMCxHLmOluG9H1UKk55ZBYfRTsXniqUkJBZ5wuV1L+pR9EK\n"
|
|
Packit |
aea12f |
"ca89a+1VAkEA3UmBelwEv2u9cAU1QjKjmwju1JgXbrjEohK+3B5y0ESEXPAwNQT9\n"
|
|
Packit |
aea12f |
"TrDM1m9AyxYTWLxX93dI5QwNFJtmbtjeBQJARSCWXhsoaDRG8QZrCSjBxfzTCqZD\n"
|
|
Packit |
aea12f |
"ZXtl807ymCipgJm60LiAt0JLr4LiucAsMZz6+j+quQbSakbFCACB8SLV1QJBAKZQ\n"
|
|
Packit |
aea12f |
"YKf+EPNtnmta/rRKKvySsi3GQZZN+Dt3q0r094XgeTsAqrqujVNfPhTMeP4qEVBX\n"
|
|
Packit |
aea12f |
"/iVX2cmMTSh3w3z8MaECQEp0XJWDVKOwcTW6Ajp9SowtmiZ3YDYo1LF9igb4iaLv\n"
|
|
Packit |
aea12f |
"sWZGfbnU3ryjvkb6YuFjgtzbZDZHWQCo8/cOtOBmPdk=\n"
|
|
Packit |
aea12f |
"-----END RSA PRIVATE KEY-----\n";
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
const gnutls_datum_t cert_dat[] = {
|
|
Packit |
aea12f |
{(void *) pem1_cert, sizeof(pem1_cert)}
|
|
Packit |
aea12f |
};
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
const gnutls_datum_t key_dat[] = {
|
|
Packit |
aea12f |
{(void *) pem1_key, sizeof(pem1_key)}
|
|
Packit |
aea12f |
};
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
void doit(void)
|
|
Packit |
aea12f |
{
|
|
Packit |
aea12f |
gnutls_x509_privkey_t key;
|
|
Packit |
aea12f |
gnutls_x509_crt_t crt;
|
|
Packit |
aea12f |
gnutls_pubkey_t pubkey;
|
|
Packit |
aea12f |
gnutls_privkey_t privkey;
|
|
Packit |
aea12f |
gnutls_datum_t out, out2;
|
|
Packit |
aea12f |
int ret;
|
|
Packit |
aea12f |
size_t i;
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
global_init();
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
for (i = 0; i < sizeof(key_dat) / sizeof(key_dat[0]); i++) {
|
|
Packit |
aea12f |
if (debug)
|
|
Packit |
aea12f |
success("loop %d\n", (int) i);
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_x509_privkey_init(&key);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_x509_privkey_init\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_x509_privkey_import(key, &key_dat[i],
|
|
Packit |
aea12f |
GNUTLS_X509_FMT_PEM);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_x509_privkey_import\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_pubkey_init(&pubkey);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_privkey_init\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_privkey_init(&privkey);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_pubkey_init\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_privkey_import_x509(privkey, key, 0);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_privkey_import_x509\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_x509_crt_init(&crt;;
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_x509_crt_init\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_x509_crt_import(crt, &cert_dat[i],
|
|
Packit |
aea12f |
GNUTLS_X509_FMT_PEM);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_x509_crt_import\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_pubkey_import_x509(pubkey, crt, 0);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_x509_pubkey_import\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_pubkey_encrypt_data(pubkey, 0, &hash_data,
|
|
Packit |
aea12f |
&out;;
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_pubkey_encrypt_data\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_privkey_decrypt_data(privkey, 0, &out, &out2);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_privkey_decrypt_data\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (out2.size != hash_data.size)
|
|
Packit |
aea12f |
fail("Decrypted data don't match original (1)\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (memcmp(out2.data, hash_data.data, hash_data.size) != 0)
|
|
Packit |
aea12f |
fail("Decrypted data don't match original (2)\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
/* try again with fixed length API */
|
|
Packit |
aea12f |
memset(out2.data, 'A', out2.size);
|
|
Packit |
aea12f |
ret = gnutls_privkey_decrypt_data2(privkey, 0, &out, out2.data, out2.size);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_privkey_decrypt_data\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (memcmp(out2.data, hash_data.data, hash_data.size) != 0)
|
|
Packit |
aea12f |
fail("Decrypted data don't match original (2b)\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
gnutls_free(out.data);
|
|
Packit |
aea12f |
gnutls_free(out2.data);
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret =
|
|
Packit |
aea12f |
gnutls_pubkey_encrypt_data(pubkey, 0, &raw_data, &out;;
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_pubkey_encrypt_data\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
ret = gnutls_privkey_decrypt_data(privkey, 0, &out, &out2);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_privkey_decrypt_data\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (out2.size != raw_data.size)
|
|
Packit |
aea12f |
fail("Decrypted data don't match original (3)\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (memcmp(out2.data, raw_data.data, raw_data.size) != 0)
|
|
Packit |
aea12f |
fail("Decrypted data don't match original (4)\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
/* try again with fixed length API */
|
|
Packit |
aea12f |
memset(out2.data, 'A', out2.size);
|
|
Packit |
aea12f |
ret = gnutls_privkey_decrypt_data2(privkey, 0, &out, out2.data, out2.size);
|
|
Packit |
aea12f |
if (ret < 0)
|
|
Packit |
aea12f |
fail("gnutls_privkey_decrypt_data\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (memcmp(out2.data, raw_data.data, raw_data.size) != 0)
|
|
Packit |
aea12f |
fail("Decrypted data don't match original (4b)\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
if (debug)
|
|
Packit |
aea12f |
success("ok\n");
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
gnutls_free(out.data);
|
|
Packit |
aea12f |
gnutls_free(out2.data);
|
|
Packit |
aea12f |
gnutls_x509_privkey_deinit(key);
|
|
Packit |
aea12f |
gnutls_x509_crt_deinit(crt);
|
|
Packit |
aea12f |
gnutls_privkey_deinit(privkey);
|
|
Packit |
aea12f |
gnutls_pubkey_deinit(pubkey);
|
|
Packit |
aea12f |
}
|
|
Packit |
aea12f |
|
|
Packit |
aea12f |
gnutls_global_deinit();
|
|
Packit |
aea12f |
}
|