summaryrefslogtreecommitdiff
path: root/tests/sign-verify-ext.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/sign-verify-ext.c')
-rw-r--r--tests/sign-verify-ext.c93
1 files changed, 54 insertions, 39 deletions
diff --git a/tests/sign-verify-ext.c b/tests/sign-verify-ext.c
index 4ec946d3fe..73ef50d8a6 100644
--- a/tests/sign-verify-ext.c
+++ b/tests/sign-verify-ext.c
@@ -22,7 +22,7 @@
/* This tests the gnutls_privkey_import_ext2() APIs */
#ifdef HAVE_CONFIG_H
-#include <config.h>
+# include <config.h>
#endif
#include <stdio.h>
@@ -62,32 +62,34 @@ const gnutls_datum_t sha256_hash_data = {
};
const gnutls_datum_t raw_data = {
- (void *) "hello",
+ (void *)"hello",
5
};
-
struct key_cb_data {
- gnutls_privkey_t rkey; /* the real thing */
+ gnutls_privkey_t rkey; /* the real thing */
};
static
-int key_cb_sign_func (gnutls_privkey_t key, void* userdata, const gnutls_datum_t * data,
- gnutls_datum_t * signature)
+int key_cb_sign_func(gnutls_privkey_t key, void *userdata,
+ const gnutls_datum_t * data, gnutls_datum_t * signature)
{
struct key_cb_data *p = userdata;
-
- return gnutls_privkey_sign_hash(p->rkey, 0, GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA, data, signature);
+
+ return gnutls_privkey_sign_hash(p->rkey, 0,
+ GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA, data,
+ signature);
}
-static void key_cb_deinit_func(gnutls_privkey_t key, void* userdata)
+static void key_cb_deinit_func(gnutls_privkey_t key, void *userdata)
{
struct key_cb_data *p = userdata;
gnutls_privkey_deinit(p->rkey);
free(userdata);
}
-static gnutls_privkey_t load_virt_privkey(const gnutls_datum_t *txtkey, gnutls_pk_algorithm_t pk)
+static gnutls_privkey_t load_virt_privkey(const gnutls_datum_t * txtkey,
+ gnutls_pk_algorithm_t pk)
{
gnutls_privkey_t privkey;
struct key_cb_data *userdata;
@@ -107,12 +109,16 @@ static gnutls_privkey_t load_virt_privkey(const gnutls_datum_t *txtkey, gnutls_p
fail("gnutls_privkey_init\n");
ret =
- gnutls_privkey_import_x509_raw(userdata->rkey, txtkey, GNUTLS_X509_FMT_PEM, NULL, 0);
+ gnutls_privkey_import_x509_raw(userdata->rkey, txtkey,
+ GNUTLS_X509_FMT_PEM, NULL, 0);
if (ret < 0)
fail("gnutls_privkey_import\n");
- ret = gnutls_privkey_import_ext2(privkey, pk, userdata, key_cb_sign_func, NULL, key_cb_deinit_func, GNUTLS_PRIVKEY_IMPORT_AUTO_RELEASE);
- if (ret < 0)
+ ret =
+ gnutls_privkey_import_ext2(privkey, pk, userdata, key_cb_sign_func,
+ NULL, key_cb_deinit_func,
+ GNUTLS_PRIVKEY_IMPORT_AUTO_RELEASE);
+ if (ret < 0)
fail("gnutls_privkey_import_ext2\n");
return privkey;
@@ -140,10 +146,12 @@ void doit(void)
gnutls_global_set_log_level(6);
for (i = 0; i < sizeof(tests) / sizeof(tests[0]); i++) {
- if (tests[i].pk == GNUTLS_PK_RSA_PSS || tests[i].pk == GNUTLS_PK_EDDSA_ED25519)
+ if (tests[i].pk == GNUTLS_PK_RSA_PSS
+ || tests[i].pk == GNUTLS_PK_EDDSA_ED25519)
continue;
- success("testing: %s - %s\n", tests[i].name, gnutls_sign_algorithm_get_name(tests[i].sigalgo));
+ success("testing: %s - %s\n", tests[i].name,
+ gnutls_sign_algorithm_get_name(tests[i].sigalgo));
if (tests[i].digest == GNUTLS_DIG_SHA1) {
hash_data = &sha1_hash_data;
@@ -157,31 +165,40 @@ void doit(void)
if (ret < 0)
testfail("gnutls_privkey_init\n");
- ret = gnutls_privkey_sign_hash(privkey, tests[i].digest, tests[i].sign_flags,
- hash_data, &signature2);
+ ret =
+ gnutls_privkey_sign_hash(privkey, tests[i].digest,
+ tests[i].sign_flags, hash_data,
+ &signature2);
if (ret < 0)
testfail("gnutls_privkey_sign_hash\n");
- ret = gnutls_privkey_sign_data(privkey, tests[i].digest, tests[i].sign_flags,
- &raw_data, &signature);
+ ret =
+ gnutls_privkey_sign_data(privkey, tests[i].digest,
+ tests[i].sign_flags, &raw_data,
+ &signature);
if (ret < 0)
testfail("gnutls_x509_privkey_sign_hash\n");
- ret = gnutls_pubkey_import_x509_raw(pubkey, &tests[i].cert, GNUTLS_X509_FMT_PEM, 0);
+ ret =
+ gnutls_pubkey_import_x509_raw(pubkey, &tests[i].cert,
+ GNUTLS_X509_FMT_PEM, 0);
if (ret < 0)
testfail("gnutls_x509_pubkey_import\n");
ret =
- gnutls_pubkey_verify_hash2(pubkey, tests[i].sigalgo, GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1, hash_data,
- &signature);
+ gnutls_pubkey_verify_hash2(pubkey, tests[i].sigalgo,
+ GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1,
+ hash_data, &signature);
if (ret < 0)
testfail("gnutls_pubkey_verify_hash2\n");
ret =
- gnutls_pubkey_verify_hash2(pubkey, tests[i].sigalgo, GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1, hash_data,
- &signature2);
+ gnutls_pubkey_verify_hash2(pubkey, tests[i].sigalgo,
+ GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1,
+ hash_data, &signature2);
if (ret < 0)
- testfail("gnutls_pubkey_verify_hash2-1 (hashed data)\n");
+ testfail
+ ("gnutls_pubkey_verify_hash2-1 (hashed data)\n");
/* test the raw interface */
gnutls_free(signature.data);
@@ -194,11 +211,10 @@ void doit(void)
gnutls_privkey_sign_hash(privkey,
tests[i].digest,
GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA,
- hash_data,
- &signature);
+ hash_data, &signature);
if (ret < 0)
testfail("gnutls_privkey_sign_hash: %s\n",
- gnutls_strerror(ret));
+ gnutls_strerror(ret));
sign_algo =
gnutls_pk_to_sign
@@ -207,29 +223,28 @@ void doit(void)
ret =
gnutls_pubkey_verify_hash2(pubkey, sign_algo,
- GNUTLS_PUBKEY_VERIFY_FLAG_TLS1_RSA,
- hash_data,
- &signature);
+ GNUTLS_PUBKEY_VERIFY_FLAG_TLS1_RSA,
+ hash_data, &signature);
if (ret < 0)
- testfail("gnutls_pubkey_verify_hash-3 (raw hashed data)\n");
+ testfail
+ ("gnutls_pubkey_verify_hash-3 (raw hashed data)\n");
gnutls_free(signature.data);
/* test the legacy API */
ret =
gnutls_privkey_sign_raw_data(privkey, 0,
- hash_data,
- &signature);
+ hash_data, &signature);
if (ret < 0)
testfail("gnutls_privkey_sign_raw_data: %s\n",
- gnutls_strerror(ret));
+ gnutls_strerror(ret));
ret =
gnutls_pubkey_verify_hash2(pubkey, sign_algo,
- GNUTLS_PUBKEY_VERIFY_FLAG_TLS1_RSA,
- hash_data,
- &signature);
+ GNUTLS_PUBKEY_VERIFY_FLAG_TLS1_RSA,
+ hash_data, &signature);
if (ret < 0)
- testfail("gnutls_pubkey_verify_hash-4 (legacy raw hashed data)\n");
+ testfail
+ ("gnutls_pubkey_verify_hash-4 (legacy raw hashed data)\n");
}
gnutls_free(signature.data);
gnutls_free(signature2.data);