Blame tests/set_key.c

Packit Service 4684c1
/*
Packit Service 4684c1
 * Copyright (C) 2016 Red Hat, Inc.
Packit Service 4684c1
 *
Packit Service 4684c1
 * Author: Nikos Mavrogiannopoulos
Packit Service 4684c1
 *
Packit Service 4684c1
 * This file is part of GnuTLS.
Packit Service 4684c1
 *
Packit Service 4684c1
 * GnuTLS is free software; you can redistribute it and/or modify it
Packit Service 4684c1
 * under the terms of the GNU General Public License as published by
Packit Service 4684c1
 * the Free Software Foundation; either version 3 of the License, or
Packit Service 4684c1
 * (at your option) any later version.
Packit Service 4684c1
 *
Packit Service 4684c1
 * GnuTLS is distributed in the hope that it will be useful, but
Packit Service 4684c1
 * WITHOUT ANY WARRANTY; without even the implied warranty of
Packit Service 4684c1
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit Service 4684c1
 * General Public License for more details.
Packit Service 4684c1
 *
Packit Service 4684c1
 * You should have received a copy of the GNU General Public License
Packit Service 4684c1
 * along with GnuTLS; if not, write to the Free Software Foundation,
Packit Service 4684c1
 * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
Packit Service 4684c1
 */
Packit Service 4684c1
Packit Service 4684c1
/* Parts copied from GnuTLS example programs. */
Packit Service 4684c1
Packit Service 4684c1
#ifdef HAVE_CONFIG_H
Packit Service 4684c1
#include <config.h>
Packit Service 4684c1
#endif
Packit Service 4684c1
Packit Service 4684c1
#include <stdio.h>
Packit Service 4684c1
#include <stdlib.h>
Packit Service 4684c1
#include <string.h>
Packit Service 4684c1
#include <sys/types.h>
Packit Service 4684c1
#if !defined(_WIN32)
Packit Service 4684c1
#include <netinet/in.h>
Packit Service 4684c1
#include <sys/socket.h>
Packit Service 4684c1
#include <sys/wait.h>
Packit Service 4684c1
#include <arpa/inet.h>
Packit Service 4684c1
#endif
Packit Service 4684c1
#include <unistd.h>
Packit Service 4684c1
#include <assert.h>
Packit Service 4684c1
#include <time.h>
Packit Service 4684c1
#include <gnutls/gnutls.h>
Packit Service 4684c1
#include <gnutls/abstract.h>
Packit Service 4684c1
#include <gnutls/x509.h>
Packit Service 4684c1
Packit Service 4684c1
#include "cert-common.h"
Packit Service 4684c1
#include "utils.h"
Packit Service 4684c1
Packit Service 4684c1
/* Test for gnutls_certificate_set_key()
Packit Service 4684c1
 *
Packit Service 4684c1
 */
Packit Service 4684c1
Packit Service 4684c1
static void tls_log_func(int level, const char *str)
Packit Service 4684c1
{
Packit Service 4684c1
	fprintf(stderr, "<%d>| %s", level, str);
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
static time_t mytime(time_t * t)
Packit Service 4684c1
{
Packit Service 4684c1
	time_t then = 1473673819;
Packit Service 4684c1
	if (t)
Packit Service 4684c1
		*t = then;
Packit Service 4684c1
Packit Service 4684c1
	return then;
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
static unsigned import_key(gnutls_certificate_credentials_t xcred, const gnutls_datum_t *skey, const gnutls_datum_t *cert)
Packit Service 4684c1
{
Packit Service 4684c1
	gnutls_pcert_st pcert_list[16];
Packit Service 4684c1
	gnutls_privkey_t key;
Packit Service 4684c1
	unsigned pcert_list_size, idx, i;
Packit Service 4684c1
	gnutls_datum_t tcert;
Packit Service 4684c1
	const char *names[] = {"localhost", "localhost2"};
Packit Service 4684c1
	int ret;
Packit Service 4684c1
Packit Service 4684c1
	assert(gnutls_privkey_init(&key)>=0);
Packit Service 4684c1
Packit Service 4684c1
	pcert_list_size = sizeof(pcert_list)/sizeof(pcert_list[0]);
Packit Service 4684c1
	ret = gnutls_pcert_list_import_x509_raw(pcert_list, &pcert_list_size,
Packit Service 4684c1
		cert, GNUTLS_X509_FMT_PEM, 0);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in gnutls_pcert_list_import_x509_raw: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_privkey_import_x509_raw(key, skey, GNUTLS_X509_FMT_PEM, NULL, 0);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in key import: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_certificate_set_key(xcred, names, 2, pcert_list,
Packit Service 4684c1
				pcert_list_size, key);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in gnutls_certificate_set_key: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
		exit(1);
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	/* return index */
Packit Service 4684c1
	idx = ret;
Packit Service 4684c1
Packit Service 4684c1
	/* verify whether the stored certificate match the ones we have */
Packit Service 4684c1
	for (i=0;i
Packit Service 4684c1
		ret = gnutls_certificate_get_crt_raw(xcred, idx, i, &tcert);
Packit Service 4684c1
		if (ret < 0) {
Packit Service 4684c1
			fail("error in %d: cert: %d: %s\n", __LINE__, i, gnutls_strerror(ret));
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
Packit Service 4684c1
		if (tcert.size != pcert_list[i].cert.size || memcmp(tcert.data, pcert_list[i].cert.data, tcert.size) != 0) {
Packit Service 4684c1
			fail("error in %d: cert %d: %s\n", __LINE__, i, "ca cert don't match");
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	return idx;
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
static void basic(void)
Packit Service 4684c1
{
Packit Service 4684c1
	gnutls_certificate_credentials_t x509_cred;
Packit Service 4684c1
	gnutls_certificate_credentials_t clicred;
Packit Service 4684c1
	int ret;
Packit Service 4684c1
	unsigned idx, i;
Packit Service 4684c1
Packit Service 4684c1
	/* this must be called once in the program
Packit Service 4684c1
	 */
Packit Service 4684c1
	global_init();
Packit Service 4684c1
Packit Service 4684c1
	gnutls_global_set_time_function(mytime);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_global_set_log_function(tls_log_func);
Packit Service 4684c1
	if (debug)
Packit Service 4684c1
		gnutls_global_set_log_level(6);
Packit Service 4684c1
Packit Service 4684c1
	assert(gnutls_certificate_allocate_credentials(&clicred) >= 0);
Packit Service 4684c1
	assert(gnutls_certificate_allocate_credentials(&x509_cred)>=0);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_certificate_set_flags(x509_cred, GNUTLS_CERTIFICATE_API_V2);
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_certificate_set_x509_trust_mem(clicred, &ca_cert, GNUTLS_X509_FMT_PEM);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		fail("set_x509_trust_file failed: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
Packit Service 4684c1
	idx = import_key(x509_cred, &server_key, &server_cert);
Packit Service 4684c1
	assert(idx == 0);
Packit Service 4684c1
Packit Service 4684c1
	test_cli_serv(x509_cred, clicred, "NORMAL", "localhost", NULL, NULL, NULL);
Packit Service 4684c1
Packit Service 4684c1
	/* verify that we can add certs, and that their index will change */
Packit Service 4684c1
	for (i=0;i<16;i++) {
Packit Service 4684c1
		idx = import_key(x509_cred, &server_ecc_key, &server_ecc_cert);
Packit Service 4684c1
		assert(idx == 1+i);
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	gnutls_certificate_free_credentials(x509_cred);
Packit Service 4684c1
	gnutls_certificate_free_credentials(clicred);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_global_deinit();
Packit Service 4684c1
Packit Service 4684c1
	if (debug)
Packit Service 4684c1
		success("success");
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
static void failure_mode(void)
Packit Service 4684c1
{
Packit Service 4684c1
	gnutls_certificate_credentials_t x509_cred;
Packit Service 4684c1
	gnutls_pcert_st pcert_list[16];
Packit Service 4684c1
	gnutls_privkey_t key;
Packit Service 4684c1
	unsigned pcert_list_size;
Packit Service 4684c1
	const char *names[] = {"localhost", "localhost2"};
Packit Service 4684c1
	int ret;
Packit Service 4684c1
	unsigned i;
Packit Service 4684c1
Packit Service 4684c1
	/* this must be called once in the program
Packit Service 4684c1
	 */
Packit Service 4684c1
	global_init();
Packit Service 4684c1
Packit Service 4684c1
	gnutls_global_set_log_function(tls_log_func);
Packit Service 4684c1
	if (debug)
Packit Service 4684c1
		gnutls_global_set_log_level(6);
Packit Service 4684c1
Packit Service 4684c1
	assert(gnutls_certificate_allocate_credentials(&x509_cred)>=0);
Packit Service 4684c1
	assert(gnutls_privkey_init(&key)>=0);
Packit Service 4684c1
Packit Service 4684c1
	pcert_list_size = sizeof(pcert_list)/sizeof(pcert_list[0]);
Packit Service 4684c1
	ret = gnutls_pcert_list_import_x509_raw(pcert_list, &pcert_list_size,
Packit Service 4684c1
		&server_cert, GNUTLS_X509_FMT_PEM, 0);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in gnutls_pcert_list_import_x509_raw: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_privkey_import_x509_raw(key, &server_ecc_key, GNUTLS_X509_FMT_PEM, NULL, 0);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in key import: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_certificate_set_key(x509_cred, names, 2, pcert_list,
Packit Service 4684c1
				pcert_list_size, key);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		success("expected error in gnutls_certificate_set_key: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
		goto cleanup;
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	fail("gnutls_certificate_set_key succeeded unexpectedly\n");
Packit Service 4684c1
Packit Service 4684c1
 cleanup:
Packit Service 4684c1
	for (i=0;i
Packit Service 4684c1
		gnutls_pcert_deinit(&pcert_list[i]);
Packit Service 4684c1
	}
Packit Service 4684c1
	gnutls_privkey_deinit(key);
Packit Service 4684c1
	gnutls_certificate_free_credentials(x509_cred);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_global_deinit();
Packit Service 4684c1
Packit Service 4684c1
	if (debug)
Packit Service 4684c1
		success("success");
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
static void auto_parse(void)
Packit Service 4684c1
{
Packit Service 4684c1
	gnutls_certificate_credentials_t x509_cred, clicred;
Packit Service 4684c1
	gnutls_pcert_st pcert_list[16];
Packit Service 4684c1
	gnutls_privkey_t key;
Packit Service 4684c1
	gnutls_pcert_st second_pcert[2];
Packit Service 4684c1
	gnutls_privkey_t second_key;
Packit Service 4684c1
	unsigned pcert_list_size;
Packit Service 4684c1
	int ret;
Packit Service 4684c1
Packit Service 4684c1
	/* this must be called once in the program
Packit Service 4684c1
	 */
Packit Service 4684c1
	global_init();
Packit Service 4684c1
Packit Service 4684c1
	gnutls_global_set_time_function(mytime);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_global_set_log_function(tls_log_func);
Packit Service 4684c1
	if (debug)
Packit Service 4684c1
		gnutls_global_set_log_level(6);
Packit Service 4684c1
Packit Service 4684c1
	assert(gnutls_certificate_allocate_credentials(&x509_cred)>=0);
Packit Service 4684c1
	assert(gnutls_privkey_init(&key)>=0);
Packit Service 4684c1
Packit Service 4684c1
	assert(gnutls_certificate_allocate_credentials(&clicred) >= 0);
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_certificate_set_x509_trust_mem(clicred, &ca3_cert, GNUTLS_X509_FMT_PEM);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		fail("set_x509_trust_file failed: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
Packit Service 4684c1
	pcert_list_size = sizeof(pcert_list)/sizeof(pcert_list[0]);
Packit Service 4684c1
	ret = gnutls_pcert_list_import_x509_raw(pcert_list, &pcert_list_size,
Packit Service 4684c1
		&server_ca3_localhost_cert_chain, GNUTLS_X509_FMT_PEM, 0);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in gnutls_pcert_list_import_x509_raw: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_privkey_import_x509_raw(key, &server_ca3_key, GNUTLS_X509_FMT_PEM, NULL, 0);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in key import: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_certificate_set_key(x509_cred, NULL, 0, pcert_list,
Packit Service 4684c1
				pcert_list_size, key);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in gnutls_certificate_set_key: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
		exit(1);
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	/* set the ECC key */
Packit Service 4684c1
	assert(gnutls_privkey_init(&second_key)>=0);
Packit Service 4684c1
Packit Service 4684c1
	pcert_list_size = 2;
Packit Service 4684c1
	ret = gnutls_pcert_list_import_x509_raw(second_pcert, &pcert_list_size,
Packit Service 4684c1
		&server_ca3_localhost6_cert_chain, GNUTLS_X509_FMT_PEM, 0);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in gnutls_pcert_list_import_x509_raw: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_privkey_import_x509_raw(second_key, &server_ca3_key, GNUTLS_X509_FMT_PEM, NULL, 0);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in key import: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_certificate_set_key(x509_cred, NULL, 0, second_pcert,
Packit Service 4684c1
				2, second_key);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		fail("error in gnutls_certificate_set_key: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
		exit(1);
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	test_cli_serv(x509_cred, clicred, "NORMAL", "localhost", NULL, NULL, NULL); /* the DNS name of the first cert */
Packit Service 4684c1
	test_cli_serv(x509_cred, clicred, "NORMAL", "localhost6", NULL, NULL, NULL); /* the DNS name of ECC cert */
Packit Service 4684c1
	test_cli_serv(x509_cred, clicred, "NORMAL", "www.none.org", NULL, NULL, NULL); /* the DNS name of ECC cert */
Packit Service 4684c1
Packit Service 4684c1
	gnutls_certificate_free_credentials(x509_cred);
Packit Service 4684c1
	gnutls_certificate_free_credentials(clicred);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_global_deinit();
Packit Service 4684c1
Packit Service 4684c1
	if (debug)
Packit Service 4684c1
		success("success");
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
void doit(void)
Packit Service 4684c1
{
Packit Service 4684c1
	basic();
Packit Service 4684c1
	failure_mode();
Packit Service 4684c1
	auto_parse();
Packit Service 4684c1
}