diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2015-04-28 16:12:13 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2015-04-28 16:12:16 +0200 |
commit | 6a92ddefed04bccf16b0a64fc7ab137187d5d572 (patch) | |
tree | c8be5114b64c283f1a084931c5b110169c2db3d2 /tests/keygen.c | |
parent | eb4c8881638d0c9967f422b9c573f162bca42c69 (diff) | |
download | gnutls-6a92ddefed04bccf16b0a64fc7ab137187d5d572.tar.gz |
tests: key generation test was moved to main checks
This will allow to catch memory leaks with valgrind.
Diffstat (limited to 'tests/keygen.c')
-rw-r--r-- | tests/keygen.c | 100 |
1 files changed, 100 insertions, 0 deletions
diff --git a/tests/keygen.c b/tests/keygen.c new file mode 100644 index 0000000000..46c2f1921f --- /dev/null +++ b/tests/keygen.c @@ -0,0 +1,100 @@ +/* + * Copyright (C) 2008-2012 Free Software Foundation, Inc. + * + * Author: David Marín Carreño + * + * This file is part of GnuTLS. + * + * GnuTLS is free software; you can redistribute it and/or modify it + * under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 3 of the License, or + * (at your option) any later version. + * + * GnuTLS is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with GnuTLS; if not, write to the Free Software Foundation, + * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA + */ + +#ifdef HAVE_CONFIG_H +#include <config.h> +#endif + +#include <stdlib.h> +#include <stdio.h> +#include <string.h> +#include <gnutls/gnutls.h> +#include <gnutls/x509.h> +#include <gnutls/abstract.h> + +#include "utils.h" + +#define MAX_TRIES 2 + +static int sec_param[MAX_TRIES] = +#ifdef ENABLE_FIPS140 + { GNUTLS_SEC_PARAM_MEDIUM, GNUTLS_SEC_PARAM_HIGH }; +#else + { GNUTLS_SEC_PARAM_LOW, GNUTLS_SEC_PARAM_MEDIUM }; +#endif + +static void tls_log_func(int level, const char *str) +{ + fprintf(stderr, "%s |<%d>| %s", "crq_key_id", level, str); +} + +void doit(void) +{ + gnutls_x509_privkey_t pkey; + int ret, algorithm, i; + + ret = global_init(); + if (ret < 0) + fail("global_init: %d\n", ret); + + gnutls_global_set_log_function(tls_log_func); + if (debug) + gnutls_global_set_log_level(4711); + + for (i = 0; i < MAX_TRIES; i++) { + for (algorithm = GNUTLS_PK_RSA; algorithm <= GNUTLS_PK_EC; + algorithm++) { + if (algorithm == GNUTLS_PK_DH) + continue; + + ret = gnutls_x509_privkey_init(&pkey); + if (ret < 0) { + fail("gnutls_x509_privkey_init: %d\n", + ret); + } + + ret = + gnutls_x509_privkey_generate(pkey, algorithm, + gnutls_sec_param_to_pk_bits + (algorithm, + sec_param[i]), + 0); + if (ret < 0) { + fail("gnutls_x509_privkey_generate (%s-%d): %s (%d)\n", gnutls_pk_algorithm_get_name(algorithm), + gnutls_sec_param_to_pk_bits(algorithm,sec_param[i]), gnutls_strerror(ret), ret); + } else if (debug) { + success("Key[%s] generation ok: %d\n", + gnutls_pk_algorithm_get_name + (algorithm), ret); + } + + ret = gnutls_x509_privkey_verify_params(pkey); + if (ret < 0) { + fail("gnutls_x509_privkey_generate (%s): %s (%d)\n", gnutls_pk_algorithm_get_name(algorithm), gnutls_strerror(ret), ret); + } + + gnutls_x509_privkey_deinit(pkey); + } + } + + gnutls_global_deinit(); +} |