1 /*
2  * Copyright (C) 2016 Red Hat, Inc.
3  *
4  * Author: Nikos Mavrogiannopoulos
5  *
6  * This file is part of GnuTLS.
7  *
8  * GnuTLS is free software; you can redistribute it and/or modify it
9  * under the terms of the GNU General Public License as published by
10  * the Free Software Foundation; either version 3 of the License, or
11  * (at your option) any later version.
12  *
13  * GnuTLS is distributed in the hope that it will be useful, but
14  * WITHOUT ANY WARRANTY; without even the implied warranty of
15  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
16  * General Public License for more details.
17  *
18  * You should have received a copy of the GNU General Public License
19  * along with GnuTLS; if not, write to the Free Software Foundation,
20  * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
21  */
22 
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
26 
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 
31 #include <gnutls/gnutls.h>
32 #include <gnutls/x509.h>
33 
34 #include "utils.h"
35 
36 static const char csr1[] =
37 "-----BEGIN CERTIFICATE REQUEST-----\n"
38 "MIICrDCCAZQCAQAwZzELMAkGA1UEBhMCTk4xMTAvBgNVBAoMKEVkZWwgQ3VybCBB\n"
39 "cmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJTAjBgNVBAMMHE5vdGhlcm4g\n"
40 "Tm93aGVyZSBUcnVzdCBBbmNob3IwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK\n"
41 "AoIBAQDBqQrvdgZ9/ng68Q5AbcJbro+Nf/DViZ5CKvAXlNkuZ8ctARyVo7GmhtQS\n"
42 "PEc6cOZ7HxEG03Ou38okGQPkYgrrZ9Tc750t4IJ3/iowWvtX5bhPNlJML1etEmqU\n"
43 "PuRIp62lwDrQTgCZiI+9SnC+O1tr/15vKW0Mp1VK4kPnSQ+ZVFlogTTYqfvIDRRa\n"
44 "QMtwHvU7wEI5BvljrdkpFFOvQhAdGJW2FYrYQdg3MQqXWhsQkKwd/25xM2t+iBgg\n"
45 "7b41/+dpSAXAeC4ERvTCjU1wbkL6k+vOEjvR9c4/KVyMvVmD5KHBPI4+OFXzmRiw\n"
46 "3/Z0yY4o9DgNRSDW28BzouaMbpifAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA\n"
47 "eFMy55kFke/e9mrGloRUh1o8dxmzSiVwVCw5DTZQzTFNAMSOZXIId8k2IeHSUd84\n"
48 "ZyJ1UNyJn2EFcwgaYaMtvZ8xMWR2W0C7lBvOOcjvWmiGze9F2Z5XMQzL8cjkK4jW\n"
49 "RKIq9b0W6TC8lLO5F2eJpW6BoTQ8cBCDiVIDlCm7xZxPRjHowuyM0Tpewq2PltC1\n"
50 "p8DbQipZWl5LPaHBSZSmIuUgOBU9porH/Vn0oWXxYfts59103VJY5YKkdz0PiqqA\n"
51 "5kWYCMFDZyL+nZ2aIol4r8nXkN9MuPOU12aHqPGcDlaGS2i5zfm2Ywsg110k+NCk\n"
52 "AmqhjnrQjvJhif3rGO4+qw==\n"
53 "-----END CERTIFICATE REQUEST-----\n";
54 
55 static const char csr2[] =
56 "-----BEGIN NEW CERTIFICATE REQUEST-----\n"
57 "MIICrjCCAZYCAQAwJDEiMCAGA1UEAxMZZGhjcC0yLTEyNy5icnEucmVkaGF0LmNv\n"
58 "bTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANiEAXIHON8p4YpVRH+X\n"
59 "OM546stpyzL5xKdxbRUlfK0pWoqm3iqenRUf43eb9W8RDTx6UhuY21RFETzlYT4r\n"
60 "+yVXOlvm8K5FLepNcjbqDJb9hngFm2q8u+OM3GKBiyeH43lUMC6/YksqPeEzsmKD\n"
61 "UlD7rkm9CK8GRyXEsCruFaQ0VA8XB6XK9Av/jfOrGT/gTdmNGKu/fZmoJsjBJh+g\n"
62 "Yobsi60YyWeuXw2s5zVga73cK1v0JG2ltjZy0M7qSO+CCJa24huO8uvJ4GPOfi/Q\n"
63 "MPZbsHaZAqrHLQQMfxXJ73gXq7FLIMnCcstWfiagE5QlFZUGj9AnicgiCpMTZMIq\n"
64 "miECAwEAAaBFMBMGCSqGSIb3DQEJBzEGEwQxMjM0MC4GCSqGSIb3DQEJDjEhMB8w\n"
65 "DAYDVR0TAQH/BAIwADAPBgNVHQ8BAf8EBQMDB6AAMA0GCSqGSIb3DQEBCwUAA4IB\n"
66 "AQAqYOqsS3xnfEzLIis3krcjzHGykXxfvnyREDijBIqyXF10lSrmb2byvoIfOuoc\n"
67 "pSmdT8MaIUTmKnZI4+htEPYcsAMwF2cXL1D2kvJhE0EKHbmv1E0QbJWmbnVz99bs\n"
68 "GIcFN1die0SYHLgf64bOxKOyq5V8hAaE/lS2yLT7Tf/6+nweYOuE9ONH7KD7zpQo\n"
69 "LyhsjhH0px75Ftej+yQWEElfokZrNu7iHuwcue3efySlMfpT9G/p4MhQQjFQySkK\n"
70 "ev17H0d3KBdtcqWjxaS3jDAzmuz6SZwdUxSDkWuqchyAozeBpI+SbIPOgfKHsYc+\n"
71 "yRKga0201rRJi4NKvt8iqj5r\n"
72 "-----END NEW CERTIFICATE REQUEST-----\n";
73 
74 static struct
75 {
76   const char *name;
77   const char *crq;
78   unsigned version;
79   unsigned sign_algo;
80   const char *sign_oid;
81   unsigned pk_algo;
82   const char *pk_oid;
83 } crq_list[] =
84 {
85   { .name = "crl-1",
86     .crq = csr1,
87     .sign_algo = GNUTLS_SIGN_RSA_SHA256,
88     .sign_oid = "1.2.840.113549.1.1.11",
89     .pk_algo = GNUTLS_PK_RSA,
90     .pk_oid = "1.2.840.113549.1.1.1",
91     .version = 1,
92   },
93   { .name = "crl-2",
94     .crq = csr2,
95     .sign_algo = GNUTLS_SIGN_RSA_SHA256,
96     .sign_oid = "1.2.840.113549.1.1.11",
97     .pk_algo = GNUTLS_PK_RSA,
98     .pk_oid = "1.2.840.113549.1.1.1",
99     .version = 1,
100   },
101   { NULL, NULL, 0, 0}
102 };
103 
tls_log_func(int level,const char * str)104 static void tls_log_func(int level, const char *str)
105 {
106 	fprintf(stderr, "|<%d>| %s", level, str);
107 }
108 
doit(void)109 void doit(void)
110 {
111 	int exit_val = 0;
112 	size_t i;
113 	int ret;
114 	gnutls_x509_crq_t crq;
115 	gnutls_datum_t tmp;
116 	char oid[256];
117 	size_t oid_size;
118 
119 	ret = global_init();
120 	if (ret != 0) {
121 		fail("%d: %s\n", ret, gnutls_strerror(ret));
122 		exit(1);
123 	}
124 
125 	gnutls_global_set_log_function(tls_log_func);
126 	if (debug)
127 		gnutls_global_set_log_level(4711);
128 
129 	for (i = 0; crq_list[i].name; i++) {
130 
131 		if (debug)
132 			printf("Chain '%s' (%d)...\n", crq_list[i].name,
133 				(int) i);
134 
135 		if (debug > 2)
136 			printf("\tAdding CRL...");
137 
138 		ret = gnutls_x509_crq_init(&crq);
139 		if (ret < 0) {
140 			fprintf(stderr,
141 				"gnutls_x509_crq_init[%d]: %s\n",
142 				(int) i,
143 				gnutls_strerror(ret));
144 			exit(1);
145 		}
146 
147 		tmp.data = (unsigned char*)crq_list[i].crq;
148 		tmp.size = strlen(crq_list[i].crq);
149 
150 		ret =
151 		    gnutls_x509_crq_import(crq, &tmp,
152 					   GNUTLS_X509_FMT_PEM);
153 		if (debug > 2)
154 		printf("done\n");
155 		if (ret < 0) {
156 			fprintf(stderr,
157 				"gnutls_x509_crq_import[%s]: %s\n",
158 				crq_list[i].name,
159 				gnutls_strerror(ret));
160 			exit(1);
161 		}
162 
163 		gnutls_x509_crq_print(crq,
164 				      GNUTLS_CRT_PRINT_ONELINE,
165 				      &tmp);
166 		if (debug)
167 			printf("\tCRL: %.*s\n",
168 				tmp.size, tmp.data);
169 		gnutls_free(tmp.data);
170 
171 		ret = gnutls_x509_crq_get_signature_algorithm(crq);
172 		if (ret != (int)crq_list[i].sign_algo) {
173 			fail("%s: error extracting signature algorithm: %d/%s\n", crq_list[i].name, ret, gnutls_strerror(ret));
174 			exit(1);
175 		}
176 
177 		oid_size = sizeof(oid);
178 		ret = gnutls_x509_crq_get_signature_oid(crq, oid, &oid_size);
179 		if (ret < 0) {
180 			fail("%s: error extracting signature algorithm OID: %s\n", crq_list[i].name, gnutls_strerror(ret));
181 			exit(1);
182 		}
183 
184 		if (strcmp(oid, crq_list[i].sign_oid) != 0) {
185 			fail("%s: error on the extracted signature algorithm: %s\n", crq_list[i].name, oid);
186 			exit(1);
187 		}
188 
189 		/* PK */
190 		ret = gnutls_x509_crq_get_pk_algorithm(crq, NULL);
191 		if (ret != (int)crq_list[i].pk_algo) {
192 			fail("%s: error extracting PK algorithm: %d/%s\n", crq_list[i].name, ret, gnutls_strerror(ret));
193 			exit(1);
194 		}
195 
196 		oid_size = sizeof(oid);
197 		ret = gnutls_x509_crq_get_pk_oid(crq, oid, &oid_size);
198 		if (ret < 0) {
199 			fail("%s: error extracting PK algorithm OID: %s\n", crq_list[i].name, gnutls_strerror(ret));
200 			exit(1);
201 		}
202 
203 		if (strcmp(oid, crq_list[i].pk_oid) != 0) {
204 			fail("%s: error on the extracted PK algorithm: %s\n", crq_list[i].name, oid);
205 			exit(1);
206 		}
207 
208 		ret = gnutls_x509_crq_get_version(crq);
209 		if (ret != (int)crq_list[i].version) {
210 			fail("%s: error on the extracted CRQ version: %d\n", crq_list[i].name, ret);
211 			exit(1);
212 		}
213 
214 		gnutls_x509_crq_deinit(crq);
215 
216 		if (debug)
217 			printf("done\n\n\n");
218 	}
219 
220 	gnutls_global_deinit();
221 
222 	if (debug)
223 		printf("Exit status...%d\n", exit_val);
224 
225 	exit(exit_val);
226 }
227