
- All internal source files (except "examples", which are not internal) should include "config.h" first. As also all internal source files should include "nm-default.h", let "config.h" be included by "nm-default.h" and include "nm-default.h" as first in every source file. We already wanted to include "nm-default.h" before other headers because it might contains some fixes (like "nm-glib.h" compatibility) that is required first. - After including "nm-default.h", we optinally allow for including the corresponding header file for the source file at hand. The idea is to ensure that each header file is self contained. - Don't include "config.h" or "nm-default.h" in any header file (except "nm-sd-adapt.h"). Public headers anyway must not include these headers, and internal headers are never included after "nm-default.h", as of the first previous point. - Include all internal headers with quotes instead of angle brackets. In practice it doesn't matter, because in our public headers we must include other headers with angle brackets. As we use our public headers also to compile our interal source files, effectively the result must be the same. Still do it for consistency. - Except for <config.h> itself. Include it with angle brackets as suggested by https://www.gnu.org/software/autoconf/manual/autoconf.html#Configuration-Headers
503 lines
15 KiB
C
503 lines
15 KiB
C
/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */
|
|
|
|
/*
|
|
* Dan Williams <dcbw@redhat.com>
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the
|
|
* Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
|
* Boston, MA 02110-1301 USA.
|
|
*
|
|
* Copyright 2007 - 2011 Red Hat, Inc.
|
|
*/
|
|
|
|
#include "nm-default.h"
|
|
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
|
|
#include "crypto.h"
|
|
#include "nm-utils.h"
|
|
#include "nm-errors.h"
|
|
#include "nm-core-internal.h"
|
|
|
|
#include "nm-test-utils.h"
|
|
|
|
#if 0
|
|
static const char *pem_rsa_key_begin = "-----BEGIN RSA PRIVATE KEY-----";
|
|
static const char *pem_rsa_key_end = "-----END RSA PRIVATE KEY-----";
|
|
|
|
static const char *pem_dsa_key_begin = "-----BEGIN DSA PRIVATE KEY-----";
|
|
static const char *pem_dsa_key_end = "-----END DSA PRIVATE KEY-----";
|
|
|
|
static void
|
|
dump_key_to_pem (const char *key, gsize key_len, int key_type)
|
|
{
|
|
char *b64 = NULL;
|
|
GString *str = NULL;
|
|
const char *start_tag;
|
|
const char *end_tag;
|
|
char *p;
|
|
|
|
switch (key_type) {
|
|
case NM_CRYPTO_KEY_TYPE_RSA:
|
|
start_tag = pem_rsa_key_begin;
|
|
end_tag = pem_rsa_key_end;
|
|
break;
|
|
case NM_CRYPTO_KEY_TYPE_DSA:
|
|
start_tag = pem_dsa_key_begin;
|
|
end_tag = pem_dsa_key_end;
|
|
break;
|
|
default:
|
|
g_warning ("Unknown key type %d", key_type);
|
|
return;
|
|
}
|
|
|
|
b64 = g_base64_encode ((const unsigned char *) key, key_len);
|
|
if (!b64) {
|
|
g_warning ("Couldn't base64 encode the key.");
|
|
goto out;
|
|
}
|
|
|
|
str = g_string_new (NULL);
|
|
|
|
g_string_append (str, start_tag);
|
|
g_string_append_c (str, '\n');
|
|
|
|
for (p = b64; p < (b64 + strlen (b64)); p += 64) {
|
|
g_string_append_len (str, p, strnlen (p, 64));
|
|
g_string_append_c (str, '\n');
|
|
}
|
|
|
|
g_string_append (str, end_tag);
|
|
g_string_append_c (str, '\n');
|
|
|
|
g_message ("Decrypted private key:\n\n%s", str->str);
|
|
|
|
out:
|
|
g_free (b64);
|
|
if (str)
|
|
g_string_free (str, TRUE);
|
|
}
|
|
#endif
|
|
|
|
static void
|
|
test_cert (gconstpointer test_data)
|
|
{
|
|
gs_free char *path = NULL;
|
|
GByteArray *array;
|
|
NMCryptoFileFormat format = NM_CRYPTO_FILE_FORMAT_UNKNOWN;
|
|
GError *error = NULL;
|
|
|
|
path = g_build_filename (TEST_CERT_DIR, (const char *) test_data, NULL);
|
|
|
|
array = crypto_load_and_verify_certificate (path, &format, &error);
|
|
g_assert_no_error (error);
|
|
g_assert_cmpint (format, ==, NM_CRYPTO_FILE_FORMAT_X509);
|
|
|
|
g_byte_array_free (array, TRUE);
|
|
|
|
g_assert (nm_utils_file_is_certificate (path));
|
|
}
|
|
|
|
static GByteArray *
|
|
file_to_byte_array (const char *filename)
|
|
{
|
|
char *contents;
|
|
GByteArray *array = NULL;
|
|
gsize length = 0;
|
|
|
|
if (g_file_get_contents (filename, &contents, &length, NULL)) {
|
|
array = g_byte_array_sized_new (length);
|
|
g_byte_array_append (array, (guint8 *) contents, length);
|
|
g_assert (array->len == length);
|
|
g_free (contents);
|
|
}
|
|
return array;
|
|
}
|
|
|
|
static void
|
|
test_load_private_key (const char *path,
|
|
const char *password,
|
|
const char *decrypted_path,
|
|
int expected_error)
|
|
{
|
|
NMCryptoKeyType key_type = NM_CRYPTO_KEY_TYPE_UNKNOWN;
|
|
gboolean is_encrypted = FALSE;
|
|
GByteArray *array, *decrypted;
|
|
GError *error = NULL;
|
|
|
|
g_assert (nm_utils_file_is_private_key (path, &is_encrypted));
|
|
g_assert (is_encrypted);
|
|
|
|
array = crypto_decrypt_openssl_private_key (path, password, &key_type, &error);
|
|
/* Even if the password is wrong, we should determine the key type */
|
|
g_assert_cmpint (key_type, ==, NM_CRYPTO_KEY_TYPE_RSA);
|
|
|
|
if (expected_error != -1) {
|
|
g_assert (array == NULL);
|
|
g_assert_error (error, NM_CRYPTO_ERROR, expected_error);
|
|
g_clear_error (&error);
|
|
return;
|
|
}
|
|
|
|
if (password == NULL) {
|
|
g_assert (array == NULL);
|
|
g_assert_no_error (error);
|
|
return;
|
|
}
|
|
|
|
g_assert (array != NULL);
|
|
|
|
if (decrypted_path) {
|
|
/* Compare the crypto decrypted key against a known-good decryption */
|
|
decrypted = file_to_byte_array (decrypted_path);
|
|
g_assert (decrypted != NULL);
|
|
g_assert (decrypted->len == array->len);
|
|
g_assert (memcmp (decrypted->data, array->data, array->len) == 0);
|
|
|
|
g_byte_array_free (decrypted, TRUE);
|
|
}
|
|
|
|
g_byte_array_free (array, TRUE);
|
|
}
|
|
|
|
static void
|
|
test_load_pkcs12 (const char *path,
|
|
const char *password,
|
|
int expected_error)
|
|
{
|
|
NMCryptoFileFormat format = NM_CRYPTO_FILE_FORMAT_UNKNOWN;
|
|
gboolean is_encrypted = FALSE;
|
|
GError *error = NULL;
|
|
|
|
g_assert (nm_utils_file_is_private_key (path, NULL));
|
|
|
|
format = crypto_verify_private_key (path, password, &is_encrypted, &error);
|
|
if (expected_error != -1) {
|
|
g_assert_error (error, NM_CRYPTO_ERROR, expected_error);
|
|
g_assert_cmpint (format, ==, NM_CRYPTO_FILE_FORMAT_UNKNOWN);
|
|
g_clear_error (&error);
|
|
} else {
|
|
g_assert_no_error (error);
|
|
g_assert_cmpint (format, ==, NM_CRYPTO_FILE_FORMAT_PKCS12);
|
|
g_assert (is_encrypted);
|
|
}
|
|
}
|
|
|
|
static void
|
|
test_load_pkcs12_no_password (const char *path)
|
|
{
|
|
NMCryptoFileFormat format = NM_CRYPTO_FILE_FORMAT_UNKNOWN;
|
|
gboolean is_encrypted = FALSE;
|
|
GError *error = NULL;
|
|
|
|
g_assert (nm_utils_file_is_private_key (path, NULL));
|
|
|
|
/* We should still get a valid returned crypto file format */
|
|
format = crypto_verify_private_key (path, NULL, &is_encrypted, &error);
|
|
g_assert_no_error (error);
|
|
g_assert_cmpint (format, ==, NM_CRYPTO_FILE_FORMAT_PKCS12);
|
|
g_assert (is_encrypted);
|
|
}
|
|
|
|
static void
|
|
test_is_pkcs12 (const char *path, gboolean expect_fail)
|
|
{
|
|
gboolean is_pkcs12;
|
|
GError *error = NULL;
|
|
|
|
is_pkcs12 = crypto_is_pkcs12_file (path, &error);
|
|
|
|
if (expect_fail) {
|
|
g_assert_error (error, NM_CRYPTO_ERROR, NM_CRYPTO_ERROR_INVALID_DATA);
|
|
g_assert (!is_pkcs12);
|
|
g_clear_error (&error);
|
|
} else {
|
|
g_assert_no_error (error);
|
|
g_assert (is_pkcs12);
|
|
}
|
|
}
|
|
|
|
static void
|
|
test_load_pkcs8 (const char *path,
|
|
const char *password,
|
|
int expected_error)
|
|
{
|
|
NMCryptoFileFormat format = NM_CRYPTO_FILE_FORMAT_UNKNOWN;
|
|
gboolean is_encrypted = FALSE;
|
|
GError *error = NULL;
|
|
|
|
g_assert (nm_utils_file_is_private_key (path, NULL));
|
|
|
|
format = crypto_verify_private_key (path, password, &is_encrypted, &error);
|
|
if (expected_error != -1) {
|
|
g_assert_error (error, NM_CRYPTO_ERROR, expected_error);
|
|
g_assert_cmpint (format, ==, NM_CRYPTO_FILE_FORMAT_UNKNOWN);
|
|
g_clear_error (&error);
|
|
} else {
|
|
g_assert_no_error (error);
|
|
g_assert_cmpint (format, ==, NM_CRYPTO_FILE_FORMAT_RAW_KEY);
|
|
g_assert (is_encrypted);
|
|
}
|
|
}
|
|
|
|
static void
|
|
test_encrypt_private_key (const char *path,
|
|
const char *password)
|
|
{
|
|
NMCryptoKeyType key_type = NM_CRYPTO_KEY_TYPE_UNKNOWN;
|
|
GByteArray *array, *encrypted, *re_decrypted;
|
|
GError *error = NULL;
|
|
|
|
array = crypto_decrypt_openssl_private_key (path, password, &key_type, &error);
|
|
g_assert_no_error (error);
|
|
g_assert (array != NULL);
|
|
g_assert_cmpint (key_type, ==, NM_CRYPTO_KEY_TYPE_RSA);
|
|
|
|
/* Now re-encrypt the private key */
|
|
encrypted = nm_utils_rsa_key_encrypt (array->data, array->len, password, NULL, &error);
|
|
g_assert_no_error (error);
|
|
g_assert (encrypted != NULL);
|
|
|
|
/* Then re-decrypt the private key */
|
|
key_type = NM_CRYPTO_KEY_TYPE_UNKNOWN;
|
|
re_decrypted = crypto_decrypt_openssl_private_key_data (encrypted->data, encrypted->len,
|
|
password, &key_type, &error);
|
|
g_assert_no_error (error);
|
|
g_assert (re_decrypted != NULL);
|
|
g_assert_cmpint (key_type, ==, NM_CRYPTO_KEY_TYPE_RSA);
|
|
|
|
/* Compare the original decrypted key with the re-decrypted key */
|
|
g_assert_cmpint (array->len, ==, re_decrypted->len);
|
|
g_assert (!memcmp (array->data, re_decrypted->data, array->len));
|
|
|
|
g_byte_array_free (re_decrypted, TRUE);
|
|
g_byte_array_free (encrypted, TRUE);
|
|
g_byte_array_free (array, TRUE);
|
|
}
|
|
|
|
static void
|
|
test_key (gconstpointer test_data)
|
|
{
|
|
char **parts, *path, *password, *decrypted_path;
|
|
int len;
|
|
|
|
parts = g_strsplit ((const char *) test_data, ", ", -1);
|
|
len = g_strv_length (parts);
|
|
if (len != 2 && len != 3)
|
|
g_error ("wrong number of arguments (<key file>, <password>, [<decrypted key file>])");
|
|
|
|
path = g_build_filename (TEST_CERT_DIR, parts[0], NULL);
|
|
password = parts[1];
|
|
decrypted_path = parts[2] ? g_build_filename (TEST_CERT_DIR, parts[2], NULL) : NULL;
|
|
|
|
test_is_pkcs12 (path, TRUE);
|
|
test_load_private_key (path, password, decrypted_path, -1);
|
|
test_load_private_key (path, "blahblahblah", NULL, NM_CRYPTO_ERROR_DECRYPTION_FAILED);
|
|
test_load_private_key (path, NULL, NULL, -1);
|
|
test_encrypt_private_key (path, password);
|
|
|
|
g_free (path);
|
|
g_free (decrypted_path);
|
|
g_strfreev (parts);
|
|
}
|
|
|
|
static void
|
|
test_key_decrypted (gconstpointer test_data)
|
|
{
|
|
const char *file = (const char *) test_data;
|
|
gboolean is_encrypted = FALSE;
|
|
char *path;
|
|
|
|
path = g_build_filename (TEST_CERT_DIR, file, NULL);
|
|
|
|
g_assert (nm_utils_file_is_private_key (path, &is_encrypted));
|
|
g_assert (!is_encrypted);
|
|
|
|
g_free (path);
|
|
}
|
|
|
|
static void
|
|
test_pkcs12 (gconstpointer test_data)
|
|
{
|
|
char **parts, *path, *password;
|
|
|
|
parts = g_strsplit ((const char *) test_data, ", ", -1);
|
|
if (g_strv_length (parts) != 2)
|
|
g_error ("wrong number of arguments (<file>, <password>)");
|
|
|
|
path = g_build_filename (TEST_CERT_DIR, parts[0], NULL);
|
|
password = parts[1];
|
|
|
|
test_is_pkcs12 (path, FALSE);
|
|
test_load_pkcs12 (path, password, -1);
|
|
test_load_pkcs12 (path, "blahblahblah", NM_CRYPTO_ERROR_DECRYPTION_FAILED);
|
|
test_load_pkcs12_no_password (path);
|
|
|
|
g_free (path);
|
|
g_strfreev (parts);
|
|
}
|
|
|
|
static void
|
|
test_pkcs8 (gconstpointer test_data)
|
|
{
|
|
char **parts, *path, *password;
|
|
|
|
parts = g_strsplit ((const char *) test_data, ", ", -1);
|
|
if (g_strv_length (parts) != 2)
|
|
g_error ("wrong number of arguments (<file>, <password>)");
|
|
|
|
path = g_build_filename (TEST_CERT_DIR, parts[0], NULL);
|
|
password = parts[1];
|
|
|
|
test_is_pkcs12 (path, TRUE);
|
|
test_load_pkcs8 (path, password, -1);
|
|
/* Until gnutls and NSS grow support for all the ciphers that openssl
|
|
* can use with PKCS#8, we can't actually verify the password. So we
|
|
* expect a bad password to work for the time being.
|
|
*/
|
|
test_load_pkcs8 (path, "blahblahblah", -1);
|
|
|
|
g_free (path);
|
|
g_strfreev (parts);
|
|
}
|
|
|
|
#define SALT "sodium chloride"
|
|
#define SHORT_PASSWORD "short"
|
|
#define LONG_PASSWORD "this is a longer password than the short one"
|
|
#define SHORT_DIGEST 16
|
|
#define LONG_DIGEST 57
|
|
|
|
struct {
|
|
const char *salt, *password;
|
|
gsize digest_size;
|
|
const char *result;
|
|
} md5_tests[] = {
|
|
{ NULL, SHORT_PASSWORD, SHORT_DIGEST,
|
|
"4f09daa9d95bcb166a302407a0e0babe" },
|
|
{ NULL, SHORT_PASSWORD, LONG_DIGEST,
|
|
"4f09daa9d95bcb166a302407a0e0babeb7d62e5baf706830d007c253f0fe7584ad7e92dc00a599ec277293c298ae70ee3904c348e23be61c91" },
|
|
{ SALT, SHORT_PASSWORD, SHORT_DIGEST,
|
|
"774771f7292210233b5724991d1f9894" },
|
|
{ SALT, SHORT_PASSWORD, LONG_DIGEST,
|
|
"774771f7292210233b5724991d1f98941a6ffdb45e4dc7fa04b1fa6aceed379c1ade0577bc8f261d109942ed5736921c052664d72e0d5bade9" },
|
|
{ NULL, LONG_PASSWORD, SHORT_DIGEST,
|
|
"e9c03517f81ff29bb777dac21fb1699c" },
|
|
{ NULL, LONG_PASSWORD, LONG_DIGEST,
|
|
"e9c03517f81ff29bb777dac21fb1699c50968c7ccd8db4f0a59d00ffd87b05876d45f25a927d51a8400c35af60fbd64584349a8b7435d62fd9" },
|
|
{ SALT, LONG_PASSWORD, SHORT_DIGEST,
|
|
"4e5c076e2f85f5e03994acbf3a9e10d6" },
|
|
{ SALT, LONG_PASSWORD, LONG_DIGEST,
|
|
"4e5c076e2f85f5e03994acbf3a9e10d61a6969c9fdf47ae8b1f7e2725b3767b05cc974bfcb5344b630c91761e015e09d7794b5065662533bc9" },
|
|
{ NULL, "", SHORT_DIGEST,
|
|
"d41d8cd98f00b204e9800998ecf8427e" },
|
|
{ SALT, "", SHORT_DIGEST,
|
|
"7df1e0494c977195005d82a1809685e4" },
|
|
};
|
|
|
|
static void
|
|
test_md5 (void)
|
|
{
|
|
char digest[LONG_DIGEST], *hex;
|
|
int i;
|
|
|
|
for (i = 0; i < G_N_ELEMENTS (md5_tests); i++) {
|
|
memset (digest, 0, sizeof (digest));
|
|
crypto_md5_hash (md5_tests[i].salt,
|
|
/* crypto_md5_hash() used to clamp salt_len to 8. It
|
|
* doesn't any more, so we need to do it here now to
|
|
* get output that matches md5_tests[i].result.
|
|
*/
|
|
md5_tests[i].salt ? 8 : 0,
|
|
md5_tests[i].password,
|
|
strlen (md5_tests[i].password),
|
|
digest, md5_tests[i].digest_size);
|
|
|
|
hex = nm_utils_bin2hexstr (digest, md5_tests[i].digest_size, -1);
|
|
g_assert_cmpstr (hex, ==, md5_tests[i].result);
|
|
g_free (hex);
|
|
}
|
|
}
|
|
|
|
NMTST_DEFINE ();
|
|
|
|
int
|
|
main (int argc, char **argv)
|
|
{
|
|
GError *error = NULL;
|
|
gboolean success;
|
|
int ret;
|
|
|
|
nmtst_init (&argc, &argv, TRUE);
|
|
|
|
success = crypto_init (&error);
|
|
g_assert_no_error (error);
|
|
g_assert (success);
|
|
|
|
g_test_add_data_func ("/libnm/crypto/cert/pem",
|
|
"test_ca_cert.pem",
|
|
test_cert);
|
|
g_test_add_data_func ("/libnm/crypto/cert/pem-2",
|
|
"test2_ca_cert.pem",
|
|
test_cert);
|
|
g_test_add_data_func ("/libnm/crypto/cert/der",
|
|
"test_ca_cert.der",
|
|
test_cert);
|
|
g_test_add_data_func ("/libnm/crypto/cert/pem-no-ending-newline",
|
|
"ca-no-ending-newline.pem",
|
|
test_cert);
|
|
g_test_add_data_func ("/libnm/crypto/cert/pem-combined",
|
|
"test_key_and_cert.pem",
|
|
test_cert);
|
|
g_test_add_data_func ("/libnm/crypto/cert/pem-combined-2",
|
|
"test2_key_and_cert.pem",
|
|
test_cert);
|
|
|
|
g_test_add_data_func ("/libnm/crypto/key/padding-6",
|
|
"test_key_and_cert.pem, test, test-key-only-decrypted.der",
|
|
test_key);
|
|
g_test_add_data_func ("/libnm/crypto/key/key-only",
|
|
"test-key-only.pem, test, test-key-only-decrypted.der",
|
|
test_key);
|
|
g_test_add_data_func ("/libnm/crypto/key/padding-8",
|
|
"test2_key_and_cert.pem, 12345testing",
|
|
test_key);
|
|
g_test_add_data_func ("/libnm/crypto/key/aes",
|
|
"test-aes-key.pem, test-aes-password",
|
|
test_key);
|
|
g_test_add_data_func ("/libnm/crypto/key/decrypted",
|
|
"test-key-only-decrypted.pem",
|
|
test_key_decrypted);
|
|
|
|
g_test_add_data_func ("/libnm/crypto/PKCS#12/1",
|
|
"test-cert.p12, test",
|
|
test_pkcs12);
|
|
g_test_add_data_func ("/libnm/crypto/PKCS#12/2",
|
|
"test2-cert.p12, 12345testing",
|
|
test_pkcs12);
|
|
|
|
g_test_add_data_func ("/libnm/crypto/PKCS#8",
|
|
"pkcs8-enc-key.pem, 1234567890",
|
|
test_pkcs8);
|
|
|
|
g_test_add_func ("/libnm/crypto/md5", test_md5);
|
|
|
|
ret = g_test_run ();
|
|
|
|
return ret;
|
|
}
|
|
|