summaryrefslogtreecommitdiffstats
path: root/tests/crq_key_id.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 07:33:12 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 07:33:12 +0000
commit36082a2fe36ecd800d784ae44c14f1f18c66a7e9 (patch)
tree6c68e0c0097987aff85a01dabddd34b862309a7c /tests/crq_key_id.c
parentInitial commit. (diff)
downloadgnutls28-36082a2fe36ecd800d784ae44c14f1f18c66a7e9.tar.xz
gnutls28-36082a2fe36ecd800d784ae44c14f1f18c66a7e9.zip
Adding upstream version 3.7.9.upstream/3.7.9upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'tests/crq_key_id.c')
-rw-r--r--tests/crq_key_id.c194
1 files changed, 194 insertions, 0 deletions
diff --git a/tests/crq_key_id.c b/tests/crq_key_id.c
new file mode 100644
index 0000000..1b73075
--- /dev/null
+++ b/tests/crq_key_id.c
@@ -0,0 +1,194 @@
+/*
+ * Copyright (C) 2008-2012 Free Software Foundation, Inc.
+ *
+ * Author: David Marín Carreño
+ *
+ * This file is part of GnuTLS.
+ *
+ * GnuTLS is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GnuTLS is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GnuTLS; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
+ */
+
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <stdlib.h>
+#include <stdio.h>
+#include <string.h>
+#include <gnutls/gnutls.h>
+#include <gnutls/x509.h>
+#include <gnutls/abstract.h>
+
+#include "utils.h"
+
+static void tls_log_func(int level, const char *str)
+{
+ fprintf(stderr, "%s |<%d>| %s", "crq_key_id", level, str);
+}
+
+void doit(void)
+{
+ gnutls_x509_privkey_t pkey;
+ gnutls_privkey_t abs_pkey;
+ gnutls_x509_crq_t crq;
+
+ size_t pkey_key_id_len;
+ unsigned char *pkey_key_id = NULL;
+
+ size_t crq_key_id_len;
+ unsigned char *crq_key_id = NULL;
+
+ gnutls_pk_algorithm_t algorithm;
+
+ int ret;
+
+ ret = global_init();
+ if (ret < 0)
+ fail("global_init: %d\n", ret);
+
+ gnutls_global_set_log_function(tls_log_func);
+ if (debug)
+ gnutls_global_set_log_level(4711);
+
+ for (algorithm = GNUTLS_PK_RSA; algorithm <= GNUTLS_PK_DSA;
+ algorithm++) {
+ ret = gnutls_x509_crq_init(&crq);
+ if (ret < 0)
+ fail("gnutls_x509_crq_init: %d: %s\n", ret, gnutls_strerror(ret));
+
+ ret = gnutls_x509_privkey_init(&pkey);
+ if (ret < 0) {
+ fail("gnutls_x509_privkey_init: %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ ret = gnutls_privkey_init(&abs_pkey);
+ if (ret < 0) {
+ fail("gnutls_privkey_init: %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ ret =
+ gnutls_x509_privkey_generate(pkey, algorithm, 2048, 0);
+ if (ret < 0) {
+ fail("gnutls_x509_privkey_generate (%s): %d: %s\n",
+ gnutls_pk_algorithm_get_name(algorithm),
+ ret, gnutls_strerror(ret));
+ } else if (debug) {
+ success("Key[%s] generation ok: %d\n",
+ gnutls_pk_algorithm_get_name(algorithm),
+ ret);
+ }
+
+ pkey_key_id_len = 0;
+ ret = gnutls_x509_privkey_get_key_id(pkey, 0, pkey_key_id,
+ &pkey_key_id_len);
+ if (ret != GNUTLS_E_SHORT_MEMORY_BUFFER) {
+ fail("gnutls_x509_privkey_get_key_id incorrectly returns %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ pkey_key_id =
+ malloc(sizeof(unsigned char) * pkey_key_id_len);
+ ret =
+ gnutls_x509_privkey_get_key_id(pkey, 0, pkey_key_id,
+ &pkey_key_id_len);
+ if (ret != GNUTLS_E_SUCCESS) {
+ fail("gnutls_x509_privkey_get_key_id incorrectly returns %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ ret = gnutls_x509_crq_set_version(crq, 1);
+ if (ret < 0) {
+ fail("gnutls_x509_crq_set_version: %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ ret = gnutls_x509_crq_set_key(crq, pkey);
+ if (ret < 0) {
+ fail("gnutls_x509_crq_set_key: %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ ret =
+ gnutls_x509_crq_set_dn_by_oid(crq,
+ GNUTLS_OID_X520_COMMON_NAME,
+ 0, "CN-Test", 7);
+ if (ret < 0) {
+ fail("gnutls_x509_crq_set_dn_by_oid: %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ ret = gnutls_privkey_import_x509(abs_pkey, pkey, 0);
+ if (ret < 0) {
+ fail("gnutls_privkey_import_x509: %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ ret =
+ gnutls_x509_crq_privkey_sign(crq, abs_pkey,
+ GNUTLS_DIG_SHA256, 0);
+ if (ret < 0) {
+ fail("gnutls_x509_crq_sign: %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ ret = gnutls_x509_crq_verify(crq, 0);
+ if (ret < 0) {
+ fail("gnutls_x509_crq_verify: %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ crq_key_id_len = 0;
+ ret =
+ gnutls_x509_crq_get_key_id(crq, 0, crq_key_id,
+ &crq_key_id_len);
+ if (ret != GNUTLS_E_SHORT_MEMORY_BUFFER) {
+ fail("gnutls_x509_crq_get_key_id incorrectly returns %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ crq_key_id =
+ malloc(sizeof(unsigned char) * crq_key_id_len);
+ ret =
+ gnutls_x509_crq_get_key_id(crq, 0, crq_key_id,
+ &crq_key_id_len);
+ if (ret != GNUTLS_E_SUCCESS) {
+ fail("gnutls_x509_crq_get_key_id incorrectly returns %d: %s\n", ret, gnutls_strerror(ret));
+ }
+
+ if (crq_key_id_len == pkey_key_id_len) {
+ ret =
+ memcmp(crq_key_id, pkey_key_id,
+ crq_key_id_len);
+ if (ret == 0) {
+ if (debug)
+ success
+ ("Key ids are identical. OK.\n");
+ } else {
+ fail("Key ids differ incorrectly: %d\n",
+ ret);
+ }
+ } else {
+ fail("Key_id lengths differ incorrectly: %d - %d\n", (int) crq_key_id_len, (int) pkey_key_id_len);
+ }
+
+
+ if (pkey_key_id) {
+ free(pkey_key_id);
+ pkey_key_id = NULL;
+ }
+
+ if (crq_key_id) {
+ free(crq_key_id);
+ crq_key_id = NULL;
+ }
+
+ gnutls_x509_crq_deinit(crq);
+ gnutls_x509_privkey_deinit(pkey);
+ gnutls_privkey_deinit(abs_pkey);
+ }
+
+ gnutls_global_deinit();
+}