#!/bin/sh # Copyright (C) 2010-2011 Free Software Foundation, Inc. # # Author: Nikos Mavrogiannopoulos # # This file is part of GnuTLS. # # GnuTLS is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 3 of the License, or (at # your option) any later version. # # GnuTLS is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with GnuTLS; if not, write to the Free Software Foundation, # Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. srcdir="${srcdir:-.}" SERV="${SERV:-../../src/gnutls-serv} -q" CLI="${CLI:-../../src/gnutls-cli}" PORT="${PORT:-5559}" DEBUG="" unset RETCODE if test "${WINDIR}" != "";then exit 77 fi . $srcdir/../scripts/common.sh echo "Checking various DSA key sizes" # DSA 1024 + TLS 1.0 echo "Checking DSA-1024 with TLS 1.0" launch_server $$ --priority "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.0" --x509certfile $srcdir/cert.dsa.1024.pem --x509keyfile $srcdir/dsa.1024.pem >/dev/null 2>&1 & PID=$! wait_server $PID $CLI $DEBUG -p $PORT 127.0.0.1 --insecure /dev/null || \ fail $PID "Failed connection to a server with DSA 1024 key and TLS 1.0!" echo "Checking server DSA-1024 with client DSA-1024 and TLS 1.0" #try with client key of 1024 bits (should succeed) $CLI $DEBUG -p $PORT 127.0.0.1 --insecure --x509certfile $srcdir/cert.dsa.1024.pem --x509keyfile $srcdir/dsa.1024.pem /dev/null || \ fail $PID "Failed connection to a server with DSA 1024 key and TLS 1.0!" echo "Checking server DSA-1024 with client DSA-2048 and TLS 1.0" #try with client key of 2048 bits (should fail) $CLI $DEBUG -p $PORT 127.0.0.1 --insecure --x509certfile $srcdir/cert.dsa.2048.pem --x509keyfile $srcdir/dsa.2048.pem /dev/null 2>&1 && \ fail $PID "Succeeded connection to a server with a client DSA 2048 key and TLS 1.0!" echo "Checking server DSA-1024 with client DSA-3072 and TLS 1.0" #try with client key of 3072 bits (should fail) $CLI $DEBUG -p $PORT 127.0.0.1 --insecure --x509certfile $srcdir/cert.dsa.3072.pem --x509keyfile $srcdir/dsa.3072.pem /dev/null 2>&1 && \ fail $PID "Succeeded connection to a server with a client DSA 3072 key and TLS 1.0!" kill $PID wait # DSA 1024 + TLS 1.2 echo "Checking DSA-1024 with TLS 1.2" launch_server $$ --priority "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.2" --x509certfile $srcdir/cert.dsa.1024.pem --x509keyfile $srcdir/dsa.1024.pem >/dev/null 2>&1 & PID=$! wait_server $PID $CLI $DEBUG -p $PORT 127.0.0.1 --insecure /dev/null || \ fail $PID "Failed connection to a server with DSA 1024 key and TLS 1.2!" echo "Checking server DSA-1024 with client DSA-1024 and TLS 1.2" #try with client key of 1024 bits (should succeed) $CLI $DEBUG -p $PORT 127.0.0.1 --insecure --x509certfile $srcdir/cert.dsa.1024.pem --x509keyfile $srcdir/dsa.1024.pem /dev/null || \ fail $PID "Failed connection to a server with DSA 1024 key and TLS 1.2!" echo "Checking server DSA-1024 with client DSA-2048 and TLS 1.2" #try with client key of 2048 bits (should succeed) $CLI $DEBUG -p $PORT 127.0.0.1 --insecure --x509certfile $srcdir/cert.dsa.2048.pem --x509keyfile $srcdir/dsa.2048.pem /dev/null || \ fail $PID "Failed connection to a server with a client DSA 2048 key and TLS 1.2!" echo "Checking server DSA-1024 with client DSA-3072 and TLS 1.2" #try with client key of 3072 bits (should succeed) $CLI $DEBUG -p $PORT 127.0.0.1 --insecure --x509certfile $srcdir/cert.dsa.3072.pem --x509keyfile $srcdir/dsa.3072.pem /dev/null || \ fail $PID "Failed connection to a server with a client DSA 3072 key and TLS 1.2!" kill $PID wait # DSA 2048 + TLS 1.0 echo "Checking DSA-2048 with TLS 1.0" launch_server $$ --priority "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.0" --x509certfile $srcdir/cert.dsa.2048.pem --x509keyfile $srcdir/dsa.2048.pem >/dev/null 2>&1 & PID=$! wait_server $PID $CLI $DEBUG -p $PORT 127.0.0.1 --insecure /dev/null 2>&1 && \ fail $PID "Succeeded connection to a server with DSA 2048 key and TLS 1.0. Should have failed!" kill $PID wait # DSA 2048 + TLS 1.2 echo "Checking DSA-2048 with TLS 1.2" launch_server $$ --priority "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.2" --x509certfile $srcdir/cert.dsa.2048.pem --x509keyfile $srcdir/dsa.2048.pem >/dev/null 2>&1 & PID=$! wait_server $PID $CLI $DEBUG -p $PORT 127.0.0.1 --insecure /dev/null || \ fail $PID "Failed connection to a server with DSA 2048 key and TLS 1.2!" kill $PID wait # DSA 3072 + TLS 1.0 echo "Checking DSA-3072 with TLS 1.0" launch_server $$ --priority "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.0" --x509certfile $srcdir/cert.dsa.3072.pem --x509keyfile $srcdir/dsa.3072.pem >/dev/null 2>&1 & PID=$! wait_server $PID $CLI $DEBUG -p $PORT 127.0.0.1 --insecure /dev/null 2>&1 && \ fail $PID "Succeeded connection to a server with DSA 3072 key and TLS 1.0. Should have failed!" kill $PID wait # DSA 3072 + TLS 1.2 echo "Checking DSA-3072 with TLS 1.2" launch_server $$ --priority "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.2" --x509certfile $srcdir/cert.dsa.3072.pem --x509keyfile $srcdir/dsa.3072.pem >/dev/null 2>&1 & PID=$! wait_server $PID $CLI $DEBUG -p $PORT 127.0.0.1 --insecure /dev/null || \ fail $PID "Failed connection to a server with DSA 3072 key and TLS 1.2!" kill $PID wait exit 0