|
Packit |
549fdc |
static void tls_log_func(int level, const char *str)
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
fprintf(stderr, "<%d> %s", level, str);
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* sha1 hash of "hello" string */
|
|
Packit |
549fdc |
const gnutls_datum_t sha1_data = {
|
|
Packit |
549fdc |
(void *)
|
|
Packit |
549fdc |
"\xaa\xf4\xc6\x1d\xdc\xc5\xe8\xa2\xda\xbe"
|
|
Packit |
549fdc |
"\xde\x0f\x3b\x48\x2c\xd9\xae\xa9\x43\x4d",
|
|
Packit |
549fdc |
20
|
|
Packit |
549fdc |
};
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* sha1 hash of "hello" string */
|
|
Packit |
549fdc |
const gnutls_datum_t sha256_data = {
|
|
Packit |
549fdc |
(void *)
|
|
Packit |
549fdc |
"\x2c\xf2\x4d\xba\x5f\xb0\xa3\x0e\x26\xe8"
|
|
Packit |
549fdc |
"\x3b\x2a\xc5\xb9\xe2\x9e\x1b\x16\x1e\x5c"
|
|
Packit |
549fdc |
"\x1f\xa7\x42\x5e\x73\x04\x33\x62\x93\x8b"
|
|
Packit |
549fdc |
"\x98\x24",
|
|
Packit |
549fdc |
32
|
|
Packit |
549fdc |
};
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
const gnutls_datum_t invalid_hash_data = {
|
|
Packit |
549fdc |
(void *)
|
|
Packit |
549fdc |
"\xaa\xf4\xc6\x1d\xdc\xca\xe8\xa2\xda\xbe"
|
|
Packit |
549fdc |
"\xde\x0f\x3b\x48\x2c\xb9\xae\xa9\x43\x4d",
|
|
Packit |
549fdc |
20
|
|
Packit |
549fdc |
};
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
const gnutls_datum_t raw_data = {
|
|
Packit |
549fdc |
(void *)"hello",
|
|
Packit |
549fdc |
5
|
|
Packit |
549fdc |
};
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
static void print_keys(gnutls_privkey_t privkey, gnutls_pubkey_t pubkey)
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
gnutls_x509_privkey_t xkey;
|
|
Packit |
549fdc |
gnutls_datum_t out;
|
|
Packit |
549fdc |
int ret = gnutls_privkey_export_x509(privkey, &xkey);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
fail("error in privkey export\n");
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_x509_privkey_export2(xkey, GNUTLS_X509_FMT_PEM, &out;;
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
fail("error in privkey export\n");
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
fprintf(stderr, "%s\n", out.data);
|
|
Packit |
549fdc |
gnutls_free(out.data);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_pubkey_export2(pubkey, GNUTLS_X509_FMT_PEM, &out;;
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
fail("error in pubkey export\n");
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
fprintf(stderr, "%s\n", out.data);
|
|
Packit |
549fdc |
gnutls_free(out.data);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
gnutls_x509_privkey_deinit(xkey);
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
#define ERR fail("Failure at: %s (%s-%s) (iter: %d)\n", gnutls_sign_get_name(sign_algo), gnutls_pk_get_name(pk), gnutls_digest_get_name(hash), j);
|
|
Packit |
549fdc |
static
|
|
Packit |
549fdc |
void test_sig(gnutls_pk_algorithm_t pk, unsigned hash, unsigned bits)
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
gnutls_pubkey_t pubkey;
|
|
Packit |
549fdc |
gnutls_privkey_t privkey;
|
|
Packit |
549fdc |
gnutls_sign_algorithm_t sign_algo;
|
|
Packit |
549fdc |
gnutls_datum_t signature;
|
|
Packit |
549fdc |
const gnutls_datum_t *hash_data;
|
|
Packit |
549fdc |
int ret;
|
|
Packit |
549fdc |
unsigned j;
|
|
Packit |
549fdc |
unsigned vflags = 0;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
if (hash == GNUTLS_DIG_SHA1) {
|
|
Packit |
549fdc |
hash_data = &sha1_data;
|
|
Packit |
549fdc |
vflags |= GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1;
|
|
Packit |
549fdc |
} else if (hash == GNUTLS_DIG_SHA256)
|
|
Packit |
549fdc |
hash_data = &sha256_data;
|
|
Packit |
549fdc |
else
|
|
Packit |
549fdc |
abort();
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
sign_algo =
|
|
Packit |
549fdc |
gnutls_pk_to_sign(pk, hash);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
for (j = 0; j < 100; j++) {
|
|
Packit |
549fdc |
ret = gnutls_pubkey_init(&pubkey);
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_privkey_init(&privkey);
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_privkey_generate(privkey, pk, bits, 0);
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret =
|
|
Packit |
549fdc |
gnutls_privkey_sign_hash(privkey, hash,
|
|
Packit |
549fdc |
0, hash_data,
|
|
Packit |
549fdc |
&signature);
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_pubkey_import_privkey(pubkey, privkey, GNUTLS_KEY_DIGITAL_SIGNATURE, 0);
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret =
|
|
Packit |
549fdc |
gnutls_pubkey_verify_hash2(pubkey,
|
|
Packit |
549fdc |
sign_algo, vflags,
|
|
Packit |
549fdc |
hash_data, &signature);
|
|
Packit |
549fdc |
if (ret < 0) {
|
|
Packit |
549fdc |
print_keys(privkey, pubkey);
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* should fail */
|
|
Packit |
549fdc |
ret =
|
|
Packit |
549fdc |
gnutls_pubkey_verify_hash2(pubkey,
|
|
Packit |
549fdc |
sign_algo, vflags,
|
|
Packit |
549fdc |
&invalid_hash_data,
|
|
Packit |
549fdc |
&signature);
|
|
Packit |
549fdc |
if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED) {
|
|
Packit |
549fdc |
print_keys(privkey, pubkey);
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
sign_algo =
|
|
Packit |
549fdc |
gnutls_pk_to_sign(gnutls_pubkey_get_pk_algorithm
|
|
Packit |
549fdc |
(pubkey, NULL), hash);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret =
|
|
Packit |
549fdc |
gnutls_pubkey_verify_hash2(pubkey, sign_algo, vflags,
|
|
Packit |
549fdc |
hash_data, &signature);
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* should fail */
|
|
Packit |
549fdc |
ret =
|
|
Packit |
549fdc |
gnutls_pubkey_verify_hash2(pubkey, sign_algo, vflags,
|
|
Packit |
549fdc |
&invalid_hash_data,
|
|
Packit |
549fdc |
&signature);
|
|
Packit |
549fdc |
if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED) {
|
|
Packit |
549fdc |
print_keys(privkey, pubkey);
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* test the raw interface */
|
|
Packit |
549fdc |
gnutls_free(signature.data);
|
|
Packit |
549fdc |
signature.data = NULL;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
if (pk == GNUTLS_PK_RSA) {
|
|
Packit |
549fdc |
ret =
|
|
Packit |
549fdc |
gnutls_privkey_sign_hash(privkey,
|
|
Packit |
549fdc |
hash,
|
|
Packit |
549fdc |
GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA,
|
|
Packit |
549fdc |
hash_data,
|
|
Packit |
549fdc |
&signature);
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
sign_algo =
|
|
Packit |
549fdc |
gnutls_pk_to_sign
|
|
Packit |
549fdc |
(gnutls_pubkey_get_pk_algorithm
|
|
Packit |
549fdc |
(pubkey, NULL), hash);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret =
|
|
Packit |
549fdc |
gnutls_pubkey_verify_hash2(pubkey,
|
|
Packit |
549fdc |
sign_algo,
|
|
Packit |
549fdc |
vflags|GNUTLS_PUBKEY_VERIFY_FLAG_TLS1_RSA,
|
|
Packit |
549fdc |
hash_data,
|
|
Packit |
549fdc |
&signature);
|
|
Packit |
549fdc |
if (ret < 0) {
|
|
Packit |
549fdc |
print_keys(privkey, pubkey);
|
|
Packit |
549fdc |
ERR;
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
gnutls_free(signature.data);
|
|
Packit |
549fdc |
gnutls_privkey_deinit(privkey);
|
|
Packit |
549fdc |
gnutls_pubkey_deinit(pubkey);
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
}
|