static void tls_log_func(int level, const char *str) { fprintf(stderr, "<%d> %s", level, str); } /* sha1 hash of "hello" string */ const gnutls_datum_t sha1_data = { (void *) "\xaa\xf4\xc6\x1d\xdc\xc5\xe8\xa2\xda\xbe" "\xde\x0f\x3b\x48\x2c\xd9\xae\xa9\x43\x4d", 20 }; /* sha1 hash of "hello" string */ const gnutls_datum_t sha256_data = { (void *) "\x2c\xf2\x4d\xba\x5f\xb0\xa3\x0e\x26\xe8" "\x3b\x2a\xc5\xb9\xe2\x9e\x1b\x16\x1e\x5c" "\x1f\xa7\x42\x5e\x73\x04\x33\x62\x93\x8b" "\x98\x24", 32 }; const gnutls_datum_t invalid_hash_data = { (void *) "\xaa\xf4\xc6\x1d\xdc\xca\xe8\xa2\xda\xbe" "\xde\x0f\x3b\x48\x2c\xb9\xae\xa9\x43\x4d", 20 }; const gnutls_datum_t raw_data = { (void *)"hello", 5 }; static void print_keys(gnutls_privkey_t privkey, gnutls_pubkey_t pubkey) { gnutls_x509_privkey_t xkey; gnutls_datum_t out; int ret = gnutls_privkey_export_x509(privkey, &xkey); if (ret < 0) fail("error in privkey export\n"); ret = gnutls_x509_privkey_export2(xkey, GNUTLS_X509_FMT_PEM, &out); if (ret < 0) fail("error in privkey export\n"); fprintf(stderr, "%s\n", out.data); gnutls_free(out.data); ret = gnutls_pubkey_export2(pubkey, GNUTLS_X509_FMT_PEM, &out); if (ret < 0) fail("error in pubkey export\n"); fprintf(stderr, "%s\n", out.data); gnutls_free(out.data); gnutls_x509_privkey_deinit(xkey); } #define ERR fail("Failure at: %s (%s-%s) (iter: %d)\n", gnutls_sign_get_name(sign_algo), gnutls_pk_get_name(pk), gnutls_digest_get_name(hash), j); static void test_sig(gnutls_pk_algorithm_t pk, unsigned hash, unsigned bits) { gnutls_pubkey_t pubkey; gnutls_privkey_t privkey; gnutls_sign_algorithm_t sign_algo; gnutls_datum_t signature; const gnutls_datum_t *hash_data; int ret; unsigned j; unsigned vflags = 0; if (hash == GNUTLS_DIG_SHA1) { hash_data = &sha1_data; vflags |= GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1; } else if (hash == GNUTLS_DIG_SHA256) hash_data = &sha256_data; else abort(); sign_algo = gnutls_pk_to_sign(pk, hash); for (j = 0; j < 100; j++) { ret = gnutls_pubkey_init(&pubkey); if (ret < 0) ERR; ret = gnutls_privkey_init(&privkey); if (ret < 0) ERR; ret = gnutls_privkey_generate(privkey, pk, bits, 0); if (ret < 0) ERR; ret = gnutls_privkey_sign_hash(privkey, hash, 0, hash_data, &signature); if (ret < 0) ERR; ret = gnutls_pubkey_import_privkey(pubkey, privkey, GNUTLS_KEY_DIGITAL_SIGNATURE, 0); if (ret < 0) ERR; ret = gnutls_pubkey_verify_hash2(pubkey, sign_algo, vflags, hash_data, &signature); if (ret < 0) { print_keys(privkey, pubkey); ERR; } /* should fail */ ret = gnutls_pubkey_verify_hash2(pubkey, sign_algo, vflags, &invalid_hash_data, &signature); if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED) { print_keys(privkey, pubkey); ERR; } sign_algo = gnutls_pk_to_sign(gnutls_pubkey_get_pk_algorithm (pubkey, NULL), hash); ret = gnutls_pubkey_verify_hash2(pubkey, sign_algo, vflags, hash_data, &signature); if (ret < 0) ERR; /* should fail */ ret = gnutls_pubkey_verify_hash2(pubkey, sign_algo, vflags, &invalid_hash_data, &signature); if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED) { print_keys(privkey, pubkey); ERR; } /* test the raw interface */ gnutls_free(signature.data); signature.data = NULL; if (pk == GNUTLS_PK_RSA) { ret = gnutls_privkey_sign_hash(privkey, hash, GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA, hash_data, &signature); if (ret < 0) ERR; sign_algo = gnutls_pk_to_sign (gnutls_pubkey_get_pk_algorithm (pubkey, NULL), hash); ret = gnutls_pubkey_verify_hash2(pubkey, sign_algo, vflags|GNUTLS_PUBKEY_VERIFY_FLAG_TLS1_RSA, hash_data, &signature); if (ret < 0) { print_keys(privkey, pubkey); ERR; } } gnutls_free(signature.data); gnutls_privkey_deinit(privkey); gnutls_pubkey_deinit(pubkey); } }