1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153
|
/*
* Copyright (C) 2017 Red Hat, Inc.
*
* Author: Nikos Mavrogiannopoulos
*
* This file is part of GnuTLS.
*
* GnuTLS is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* GnuTLS is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with GnuTLS. If not, see <https://www.gnu.org/licenses/>.
*/
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <gnutls/gnutls.h>
#include <gnutls/x509.h>
#include <gnutls/abstract.h>
#include <assert.h>
#include "utils.h"
#include "cert-common.h"
static void tls_log_func(int level, const char *str)
{
fprintf(stderr, "|<%d>| %s", level, str);
}
const gnutls_datum_t raw_data = { (void *)"hello there", 11 };
static int sign_verify_data(gnutls_x509_privkey_t pkey,
gnutls_sign_algorithm_t algo, unsigned vflags)
{
int ret;
gnutls_privkey_t privkey;
gnutls_pubkey_t pubkey = NULL;
gnutls_datum_t signature;
gnutls_pk_algorithm_t pk;
gnutls_digest_algorithm_t dig;
unsigned sflags = 0;
/* sign arbitrary data */
assert(gnutls_privkey_init(&privkey) >= 0);
pk = gnutls_sign_get_pk_algorithm(algo);
dig = gnutls_sign_get_hash_algorithm(algo);
if (pk == GNUTLS_PK_RSA_PSS)
sflags |= GNUTLS_PRIVKEY_SIGN_FLAG_RSA_PSS;
ret = gnutls_privkey_import_x509(privkey, pkey, 0);
if (ret < 0)
fail("gnutls_pubkey_import_x509\n");
ret = gnutls_privkey_sign_data(privkey, dig, sflags, &raw_data,
&signature);
if (ret < 0) {
ret = -1;
goto cleanup;
}
/* verify data */
assert(gnutls_pubkey_init(&pubkey) >= 0);
ret = gnutls_pubkey_import_privkey(pubkey, privkey, 0, 0);
if (ret < 0)
fail("gnutls_pubkey_import_privkey\n");
ret = gnutls_pubkey_verify_data2(pubkey, algo, vflags, &raw_data,
&signature);
if (ret < 0) {
ret = -1;
goto cleanup;
}
ret = 0;
cleanup:
if (pubkey)
gnutls_pubkey_deinit(pubkey);
gnutls_privkey_deinit(privkey);
gnutls_free(signature.data);
return ret;
}
void doit(void)
{
gnutls_x509_privkey_t pkey;
int ret;
ret = global_init();
if (ret < 0)
fail("global_init: %d\n", ret);
gnutls_global_set_log_function(tls_log_func);
if (debug)
gnutls_global_set_log_level(4711);
ret = gnutls_x509_privkey_init(&pkey);
if (ret < 0) {
fail("gnutls_x509_privkey_init: %d\n", ret);
}
ret = gnutls_x509_privkey_import(pkey, &key_dat, GNUTLS_X509_FMT_PEM);
if (ret < 0) {
fail("gnutls_privkey_generate: %s\n", gnutls_strerror(ret));
}
if (sign_verify_data(pkey, GNUTLS_SIGN_RSA_SHA1, 0) < 0)
fail("failed verification with SHA1!\n");
if (sign_verify_data(pkey, GNUTLS_SIGN_RSA_MD5, 0) >= 0)
fail("succeeded verification with MD5!\n");
if (!gnutls_fips140_mode_enabled()) {
if (sign_verify_data(pkey, GNUTLS_SIGN_RSA_MD5,
GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD5) < 0)
fail("failed verification with MD5 and override flags!\n");
if (sign_verify_data(pkey, GNUTLS_SIGN_RSA_MD5,
GNUTLS_VERIFY_ALLOW_BROKEN) < 0)
fail("failed verification with MD5 and override flags2!\n");
}
if (sign_verify_data(pkey, GNUTLS_SIGN_RSA_SHA256, 0) < 0)
fail("failed verification with SHA256!\n");
if (sign_verify_data(pkey, GNUTLS_SIGN_RSA_SHA512, 0) < 0)
fail("failed verification with SHA512!\n");
if (sign_verify_data(pkey, GNUTLS_SIGN_RSA_SHA3_256, 0) < 0)
fail("failed verification with SHA3-256!\n");
if (sign_verify_data(pkey, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256, 0) < 0)
fail("failed verification with SHA256 with PSS!\n");
gnutls_x509_privkey_deinit(pkey);
gnutls_global_deinit();
}
|