|
Packit Service |
4684c1 |
/*
|
|
Packit Service |
4684c1 |
* Copyright (C) 2011-2012 Free Software Foundation, Inc.
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* Author: Nikos Mavrogiannopoulos
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* This file is part of GnuTLS.
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* GnuTLS is free software; you can redistribute it and/or modify it
|
|
Packit Service |
4684c1 |
* under the terms of the GNU General Public License as published by
|
|
Packit Service |
4684c1 |
* the Free Software Foundation; either version 3 of the License, or
|
|
Packit Service |
4684c1 |
* (at your option) any later version.
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* GnuTLS is distributed in the hope that it will be useful, but
|
|
Packit Service |
4684c1 |
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit Service |
4684c1 |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Packit Service |
4684c1 |
* General Public License for more details.
|
|
Packit Service |
4684c1 |
*
|
|
Packit Service |
4684c1 |
* You should have received a copy of the GNU General Public License
|
|
Packit Service |
4684c1 |
* along with GnuTLS; if not, write to the Free Software Foundation,
|
|
Packit Service |
4684c1 |
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* Parts copied from GnuTLS example programs. */
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
#ifdef HAVE_CONFIG_H
|
|
Packit Service |
4684c1 |
#include <config.h>
|
|
Packit Service |
4684c1 |
#endif
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
#include <stdio.h>
|
|
Packit Service |
4684c1 |
#include <stdlib.h>
|
|
Packit Service |
4684c1 |
#include <string.h>
|
|
Packit Service |
4684c1 |
#include <sys/types.h>
|
|
Packit Service |
4684c1 |
#if !defined(_WIN32)
|
|
Packit Service |
4684c1 |
#include <netinet/in.h>
|
|
Packit Service |
4684c1 |
#include <sys/socket.h>
|
|
Packit Service |
4684c1 |
#include <sys/wait.h>
|
|
Packit Service |
4684c1 |
#include <arpa/inet.h>
|
|
Packit Service |
4684c1 |
#endif
|
|
Packit Service |
4684c1 |
#include <unistd.h>
|
|
Packit Service |
4684c1 |
#include <gnutls/gnutls.h>
|
|
Packit Service |
4684c1 |
#include <gnutls/x509.h>
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
#include "utils.h"
|
|
Packit Service |
4684c1 |
#include "cert-common.h"
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* Test for gnutls_certificate_get_issuer() and implicitly for
|
|
Packit Service |
4684c1 |
* gnutls_trust_list_get_issuer().
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static void tls_log_func(int level, const char *str)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
fprintf(stderr, "<%d>| %s", level, str);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
static char buf[16*1024];
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
#define LIST_SIZE 3
|
|
Packit Service |
4684c1 |
void doit(void)
|
|
Packit Service |
4684c1 |
{
|
|
Packit Service |
4684c1 |
gnutls_certificate_credentials_t x509_cred;
|
|
Packit Service |
4684c1 |
int ret;
|
|
Packit Service |
4684c1 |
unsigned int i;
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_t issuer;
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_t list[LIST_SIZE];
|
|
Packit Service |
4684c1 |
char dn[128];
|
|
Packit Service |
4684c1 |
size_t dn_size;
|
|
Packit Service |
4684c1 |
unsigned int list_size;
|
|
Packit Service |
4684c1 |
size_t buf_size;
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_x509_privkey_t get_key;
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_t *get_crts;
|
|
Packit Service |
4684c1 |
unsigned n_get_crts;
|
|
Packit Service |
4684c1 |
gnutls_datum_t get_datum, chain_datum[2] = {server_ca3_cert, subca3_cert};
|
|
Packit Service |
4684c1 |
gnutls_x509_trust_list_t trust_list;
|
|
Packit Service |
4684c1 |
gnutls_x509_trust_list_iter_t trust_iter;
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_t get_ca_crt;
|
|
Packit Service |
4684c1 |
unsigned n_get_ca_crts;
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* this must be called once in the program
|
|
Packit Service |
4684c1 |
*/
|
|
Packit Service |
4684c1 |
global_init();
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_global_set_log_function(tls_log_func);
|
|
Packit Service |
4684c1 |
if (debug)
|
|
Packit Service |
4684c1 |
gnutls_global_set_log_level(6);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_certificate_allocate_credentials(&x509_cred);
|
|
Packit Service |
4684c1 |
gnutls_certificate_set_x509_trust_mem(x509_cred, &ca3_cert,
|
|
Packit Service |
4684c1 |
GNUTLS_X509_FMT_PEM);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_certificate_set_x509_key_mem(x509_cred, &server_ca3_cert_chain,
|
|
Packit Service |
4684c1 |
&server_ca3_key,
|
|
Packit Service |
4684c1 |
GNUTLS_X509_FMT_PEM);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* test for gnutls_certificate_get_issuer() */
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* check whether gnutls_x509_crt_list_import will fail if given a single
|
|
Packit Service |
4684c1 |
* certificate */
|
|
Packit Service |
4684c1 |
list_size = LIST_SIZE;
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_list_import(list, &list_size, &ca3_cert,
|
|
Packit Service |
4684c1 |
GNUTLS_X509_FMT_PEM,
|
|
Packit Service |
4684c1 |
GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_x509_crt_list_import (failed with a single cert)");
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_deinit(list[0]);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
list_size = LIST_SIZE;
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_list_import(list, &list_size, &cli_ca3_cert_chain,
|
|
Packit Service |
4684c1 |
GNUTLS_X509_FMT_PEM,
|
|
Packit Service |
4684c1 |
GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_x509_crt_list_import");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_certificate_get_issuer(x509_cred, list[list_size-1], &issuer, 0);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_certificate_get_isser");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_certificate_get_issuer(x509_cred, list[list_size-1], &issuer, GNUTLS_TL_GET_COPY);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_certificate_get_isser");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
dn_size = sizeof(dn);
|
|
Packit Service |
4684c1 |
ret = gnutls_x509_crt_get_dn(issuer, dn, &dn_size);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_certificate_get_dn");
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_deinit(issuer);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (dn_size != strlen(dn)) {
|
|
Packit Service |
4684c1 |
fail("gnutls_x509_crt_get_dn: lengths don't match\n");
|
|
Packit Service |
4684c1 |
exit(1);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (debug)
|
|
Packit Service |
4684c1 |
fprintf(stderr, "Issuer's DN: %s\n", dn);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
/* test the getter functions of gnutls_certificate_credentials_t */
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_certificate_get_x509_key(x509_cred, 0, &get_key);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_certificate_get_x509_key");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_x509_privkey_export2(get_key,
|
|
Packit Service |
4684c1 |
GNUTLS_X509_FMT_PEM,
|
|
Packit Service |
4684c1 |
&get_datum);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_x509_privkey_export2");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (get_datum.size != server_ca3_key.size ||
|
|
Packit Service |
4684c1 |
memcmp(get_datum.data, server_ca3_key.data, get_datum.size) != 0) {
|
|
Packit Service |
4684c1 |
fail(
|
|
Packit Service |
4684c1 |
"exported key %u vs. %u\n\n%s\n\nvs.\n\n%s",
|
|
Packit Service |
4684c1 |
get_datum.size, server_ca3_key.size,
|
|
Packit Service |
4684c1 |
get_datum.data, server_ca3_key.data);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (strlen((char*)get_datum.data) != get_datum.size) {
|
|
Packit Service |
4684c1 |
fail("exported key %u vs. %u\n\n%s\n",
|
|
Packit Service |
4684c1 |
get_datum.size, (unsigned)strlen((char*)get_datum.data),
|
|
Packit Service |
4684c1 |
get_datum.data);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_free(get_datum.data);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
buf_size = sizeof(buf);
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_x509_privkey_export(get_key,
|
|
Packit Service |
4684c1 |
GNUTLS_X509_FMT_PEM,
|
|
Packit Service |
4684c1 |
buf, &buf_size);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_x509_privkey_export");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (buf_size != get_datum.size ||
|
|
Packit Service |
4684c1 |
buf_size != strlen(buf) ||
|
|
Packit Service |
4684c1 |
memcmp(buf, server_ca3_key.data, buf_size) != 0) {
|
|
Packit Service |
4684c1 |
fail(
|
|
Packit Service |
4684c1 |
"exported key %u vs. %u\n\n%s\n\nvs.\n\n%s",
|
|
Packit Service |
4684c1 |
(int)buf_size, server_ca3_key.size,
|
|
Packit Service |
4684c1 |
buf, server_ca3_key.data);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_certificate_get_x509_crt(x509_cred, 0, &get_crts, &n_get_crts);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_certificate_get_x509_crt");
|
|
Packit Service |
4684c1 |
if (n_get_crts != 2)
|
|
Packit Service |
4684c1 |
fail("gnutls_certificate_get_x509_crt: n_crts != 2");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
for (i = 0; i < n_get_crts; i++) {
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_export2(get_crts[i],
|
|
Packit Service |
4684c1 |
GNUTLS_X509_FMT_PEM,
|
|
Packit Service |
4684c1 |
&get_datum);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_x509_crt_export2");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (get_datum.size != chain_datum[i].size ||
|
|
Packit Service |
4684c1 |
memcmp(get_datum.data, chain_datum[i].data, get_datum.size) != 0) {
|
|
Packit Service |
4684c1 |
fail(
|
|
Packit Service |
4684c1 |
"exported certificate %u vs. %u\n\n%s\n\nvs.\n\n%s",
|
|
Packit Service |
4684c1 |
get_datum.size, chain_datum[i].size,
|
|
Packit Service |
4684c1 |
get_datum.data, chain_datum[i].data);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_free(get_datum.data);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_certificate_get_trust_list(x509_cred, &trust_list);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
n_get_ca_crts = 0;
|
|
Packit Service |
4684c1 |
trust_iter = NULL;
|
|
Packit Service |
4684c1 |
while (gnutls_x509_trust_list_iter_get_ca(trust_list,
|
|
Packit Service |
4684c1 |
&trust_iter,
|
|
Packit Service |
4684c1 |
&get_ca_crt) !=
|
|
Packit Service |
4684c1 |
GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) {
|
|
Packit Service |
4684c1 |
ret =
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_export2(get_ca_crt,
|
|
Packit Service |
4684c1 |
GNUTLS_X509_FMT_PEM,
|
|
Packit Service |
4684c1 |
&get_datum);
|
|
Packit Service |
4684c1 |
if (ret < 0)
|
|
Packit Service |
4684c1 |
fail("gnutls_x509_crt_export2");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (get_datum.size != ca3_cert.size ||
|
|
Packit Service |
4684c1 |
memcmp(get_datum.data, ca3_cert.data, get_datum.size) != 0) {
|
|
Packit Service |
4684c1 |
fail(
|
|
Packit Service |
4684c1 |
"exported CA certificate %u vs. %u\n\n%s\n\nvs.\n\n%s",
|
|
Packit Service |
4684c1 |
get_datum.size, ca3_cert.size,
|
|
Packit Service |
4684c1 |
get_datum.data, ca3_cert.data);
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_deinit(get_ca_crt);
|
|
Packit Service |
4684c1 |
gnutls_free(get_datum.data);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
++n_get_ca_crts;
|
|
Packit Service |
4684c1 |
}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (n_get_ca_crts != 1)
|
|
Packit Service |
4684c1 |
fail("gnutls_x509_trust_list_iter_get_ca: n_cas != 1");
|
|
Packit Service |
4684c1 |
if (trust_iter != NULL)
|
|
Packit Service |
4684c1 |
fail("gnutls_x509_trust_list_iter_get_ca: iterator not NULL after iteration");
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_x509_privkey_deinit(get_key);
|
|
Packit Service |
4684c1 |
for (i = 0; i < n_get_crts; i++)
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_deinit(get_crts[i]);
|
|
Packit Service |
4684c1 |
gnutls_free(get_crts);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
for (i = 0; i < list_size; i++)
|
|
Packit Service |
4684c1 |
gnutls_x509_crt_deinit(list[i]);
|
|
Packit Service |
4684c1 |
gnutls_certificate_free_credentials(x509_cred);
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
gnutls_global_deinit();
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
if (debug)
|
|
Packit Service |
4684c1 |
success("success");
|
|
Packit Service |
4684c1 |
}
|