summaryrefslogtreecommitdiff
path: root/tests/keygen.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2015-04-28 16:12:13 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2015-04-28 16:12:16 +0200
commit6a92ddefed04bccf16b0a64fc7ab137187d5d572 (patch)
treec8be5114b64c283f1a084931c5b110169c2db3d2 /tests/keygen.c
parenteb4c8881638d0c9967f422b9c573f162bca42c69 (diff)
downloadgnutls-6a92ddefed04bccf16b0a64fc7ab137187d5d572.tar.gz
tests: key generation test was moved to main checks
This will allow to catch memory leaks with valgrind.
Diffstat (limited to 'tests/keygen.c')
-rw-r--r--tests/keygen.c100
1 files changed, 100 insertions, 0 deletions
diff --git a/tests/keygen.c b/tests/keygen.c
new file mode 100644
index 0000000000..46c2f1921f
--- /dev/null
+++ b/tests/keygen.c
@@ -0,0 +1,100 @@
+/*
+ * Copyright (C) 2008-2012 Free Software Foundation, Inc.
+ *
+ * Author: David Marín Carreño
+ *
+ * This file is part of GnuTLS.
+ *
+ * GnuTLS is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GnuTLS is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GnuTLS; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
+ */
+
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <stdlib.h>
+#include <stdio.h>
+#include <string.h>
+#include <gnutls/gnutls.h>
+#include <gnutls/x509.h>
+#include <gnutls/abstract.h>
+
+#include "utils.h"
+
+#define MAX_TRIES 2
+
+static int sec_param[MAX_TRIES] =
+#ifdef ENABLE_FIPS140
+ { GNUTLS_SEC_PARAM_MEDIUM, GNUTLS_SEC_PARAM_HIGH };
+#else
+ { GNUTLS_SEC_PARAM_LOW, GNUTLS_SEC_PARAM_MEDIUM };
+#endif
+
+static void tls_log_func(int level, const char *str)
+{
+ fprintf(stderr, "%s |<%d>| %s", "crq_key_id", level, str);
+}
+
+void doit(void)
+{
+ gnutls_x509_privkey_t pkey;
+ int ret, algorithm, i;
+
+ ret = global_init();
+ if (ret < 0)
+ fail("global_init: %d\n", ret);
+
+ gnutls_global_set_log_function(tls_log_func);
+ if (debug)
+ gnutls_global_set_log_level(4711);
+
+ for (i = 0; i < MAX_TRIES; i++) {
+ for (algorithm = GNUTLS_PK_RSA; algorithm <= GNUTLS_PK_EC;
+ algorithm++) {
+ if (algorithm == GNUTLS_PK_DH)
+ continue;
+
+ ret = gnutls_x509_privkey_init(&pkey);
+ if (ret < 0) {
+ fail("gnutls_x509_privkey_init: %d\n",
+ ret);
+ }
+
+ ret =
+ gnutls_x509_privkey_generate(pkey, algorithm,
+ gnutls_sec_param_to_pk_bits
+ (algorithm,
+ sec_param[i]),
+ 0);
+ if (ret < 0) {
+ fail("gnutls_x509_privkey_generate (%s-%d): %s (%d)\n", gnutls_pk_algorithm_get_name(algorithm),
+ gnutls_sec_param_to_pk_bits(algorithm,sec_param[i]), gnutls_strerror(ret), ret);
+ } else if (debug) {
+ success("Key[%s] generation ok: %d\n",
+ gnutls_pk_algorithm_get_name
+ (algorithm), ret);
+ }
+
+ ret = gnutls_x509_privkey_verify_params(pkey);
+ if (ret < 0) {
+ fail("gnutls_x509_privkey_generate (%s): %s (%d)\n", gnutls_pk_algorithm_get_name(algorithm), gnutls_strerror(ret), ret);
+ }
+
+ gnutls_x509_privkey_deinit(pkey);
+ }
+ }
+
+ gnutls_global_deinit();
+}