#!/bin/sh # Copyright (C) 2014-2018 Nikos Mavrogiannopoulos # Copyright (C) 2018 Red Hat, Inc. # # This file is part of GnuTLS. # # GnuTLS is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 3 of the License, or (at # your option) any later version. # # GnuTLS is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU Lesser General Public License # along with this program. If not, see #set -e srcdir="${srcdir:-.}" CERTTOOL="${CERTTOOL:-../../src/certtool${EXEEXT}}" DIFF="${DIFF:-diff -b -B}" TMPFILE1=certtool-file1.$$.tmp TMPFILE2=certtool-file2.$$.tmp PASS="1234" if test -n "$DISABLE_BASH_TESTS"; then exit 77 fi if ! test -x "${CERTTOOL}"; then exit 77 fi if ! test -z "${VALGRIND}"; then VALGRIND="${LIBTOOL:-libtool} --mode=execute ${VALGRIND}" fi SETSID=$(which setsid) if test -n "${SETSID}";then ${VALGRIND} "${CERTTOOL}" --generate-privkey --rsa --outfile ${TMPFILE1} --pkcs8 --password ${PASS} if test $? != 0;then echo "private key generation failed" exit 1 fi grep 'modulus:' ${TMPFILE1} if test $? = 0;then cat ${TMPFILE1} echo "PKCS#8 file contains text modulus" exit 1 fi #check whether password is being honoured #some CI runners need GNUTLS_PIN (GNUTLS_PIN=${PASS}) ${SETSID} "${CERTTOOL}" --generate-self-signed --load-privkey ${TMPFILE1} --template ${srcdir}/templates/template-test.tmpl --ask-pass >${TMPFILE2} 2>&1 </dev/null 2>&1 if test $? != 0;then cat ${TMPFILE2} echo "No password was asked" exit 1 fi fi #check whether "funny" spaces can be interpreted id=`${VALGRIND} "${CERTTOOL}" --key-id --infile "${srcdir}/data/funny-spacing.pem" --hash sha1| tr -d '\r'` rc=$? if test "${id}" != "1e09d707d4e3651b84dcb6c68a828d2affef7ec3"; then echo "Key-ID1 doesn't match the expected: ${id}" exit 1 fi id=`${VALGRIND} "${CERTTOOL}" --key-id --infile "${srcdir}/data/funny-spacing.pem"| tr -d '\r'` rc=$? if test "${id}" != "1e09d707d4e3651b84dcb6c68a828d2affef7ec3"; then echo "Default key-ID1 doesn't match the expected; did the defaults change? ID: ${id}" exit 1 fi id=`"${CERTTOOL}" --pubkey-info <"${srcdir}/data/funny-spacing.pem"|"${CERTTOOL}" --key-id --hash sha1| tr -d '\r'` rc=$? if test "${id}" != "1e09d707d4e3651b84dcb6c68a828d2affef7ec3"; then echo "Key-ID2 doesn't match the expected: ${id}" exit 1 fi id=`"${CERTTOOL}" --pubkey-info <"${srcdir}/data/funny-spacing.pem"|"${CERTTOOL}" --key-id --hash sha256| tr -d '\r'` rc=$? if test "${id}" != "118e72e3655150c895ecbd19b3634179fb4a87c7a25abefcb11f5d66661d5a4d"; then echo "Key-ID3 doesn't match the expected: ${id}" exit 1 fi id=`"${CERTTOOL}" --pubkey-info <"${srcdir}/data/funny-spacing.pem"|"${CERTTOOL}" --key-id --hash sha512| tr -d '\r'` rc=$? if test "${id}" != "5e81ba533b1e7b88b3b0834a392c1cd63f8ccbe45f39edf4cb4b6a3e7700b333cfa386c54b1c5704a2b82a20dc417b347bb8f961c339134a91158a134ca6c478"; then echo "Key-ID4 doesn't match the expected: ${id}" exit 1 fi #fingerprint id=`${VALGRIND} "${CERTTOOL}" --fingerprint --infile "${srcdir}/data/funny-spacing.pem"| tr -d '\r'` rc=$? if test "${id}" != "8f735c5ddefd723f59b6a3bb2ac0522470c0182f"; then echo "Fingerprint doesn't match the expected: 3" exit 1 fi id=`${VALGRIND} "${CERTTOOL}" --fingerprint --hash sha256 --infile "${srcdir}/data/funny-spacing.pem"| tr -d '\r'` rc=$? if test "${id}" != "fc5b45b20c489393a457f177572920ac40bacba9d25cea51200822271eaf7d1f"; then echo "Fingerprint doesn't match the expected: 4" exit 1 fi id=`${VALGRIND} "${CERTTOOL}" --fingerprint --hash sha512 --infile "${srcdir}/data/funny-spacing.pem"| tr -d '\r'` rc=$? if test "${id}" != "c4880390506a849cd2d8289fb8aea8c189e635aff1054faba58658a0f107472b725672c10d2f7f4ca360528b9433db278f544846e5613f9cd4cb4aa2f56a7894"; then echo "Fingerprint doesn't match the expected: 5" exit 1 fi # Test whether certtool --outder doesn't output the informational text data ${VALGRIND} "${CERTTOOL}" -i --infile "${srcdir}/data/funny-spacing.pem" --outder --outfile ${TMPFILE1} if test $? != 0;then echo "cert output to DER failed" exit 1 fi grep 'Version:' ${TMPFILE1} if test $? = 0;then echo "found text info in DER certificate" exit 1 fi ${VALGRIND} "${CERTTOOL}" -i --infile "${srcdir}/data/commonName.cer" | grep -v "Not After:" > ${TMPFILE1} if test $? != 0;then echo "commonName cert output failed" exit 1 fi ${DIFF} "${srcdir}/data/commonName.cer" ${TMPFILE1} if test $? != 0;then exit 1 fi rm -f ${TMPFILE1} ${TMPFILE2} export TZ="UTC" . ${srcdir}/../scripts/common.sh check_for_datefudge cat "${srcdir}/../certs/cert-ecc256.pem" "${srcdir}/../certs/ca-cert-ecc.pem"|datefudge "2012-11-22" \ ${VALGRIND} "${CERTTOOL}" --verify-chain rc=$? if test "${rc}" != "0"; then echo "There was an issue verifying the chain" exit 1 fi exit 0