diff options
Diffstat (limited to 'bin/tests/dst/t_dst.c')
-rw-r--r-- | bin/tests/dst/t_dst.c | 933 |
1 files changed, 933 insertions, 0 deletions
diff --git a/bin/tests/dst/t_dst.c b/bin/tests/dst/t_dst.c new file mode 100644 index 0000000..d5e5db7 --- /dev/null +++ b/bin/tests/dst/t_dst.c @@ -0,0 +1,933 @@ +/* + * Copyright (C) 2004, 2005, 2007, 2008 Internet Systems Consortium, Inc. ("ISC") + * Copyright (C) 1999-2001 Internet Software Consortium. + * + * Permission to use, copy, modify, and/or distribute this software for any + * purpose with or without fee is hereby granted, provided that the above + * copyright notice and this permission notice appear in all copies. + * + * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH + * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY + * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, + * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM + * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE + * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR + * PERFORMANCE OF THIS SOFTWARE. + */ + +/* $Id: t_dst.c,v 1.55 2008/01/12 23:47:13 tbox Exp $ */ + +#include <config.h> + +#include <sys/types.h> /* Required for dirent.h */ +#include <sys/stat.h> + +#include <dirent.h> /* XXX */ +#include <errno.h> +#include <fcntl.h> +#include <limits.h> +#include <stdlib.h> + +#include <unistd.h> /* XXX */ + +#include <isc/buffer.h> +#include <isc/dir.h> +#include <isc/entropy.h> +#include <isc/file.h> +#include <isc/mem.h> +#include <isc/region.h> +#include <isc/string.h> +#include <isc/util.h> + +#include <dns/fixedname.h> +#include <dns/name.h> + +#include <dst/dst.h> +#include <dst/result.h> + +#include <tests/t_api.h> + +#ifndef PATH_MAX +#define PATH_MAX 256 +#endif + +/* + * Adapted from the original dst_test.c program. + * XXXDCL should use isc_dir_*. + */ + +static void +cleandir(char *path) { + DIR *dirp; + struct dirent *pe; + char fullname[PATH_MAX + 1]; + + dirp = opendir(path); + if (dirp == NULL) { + t_info("opendir(%s) failed %d\n", path, errno); + return; + } + + while ((pe = readdir(dirp)) != NULL) { + if (! strcmp(pe->d_name, ".")) + continue; + if (! strcmp(pe->d_name, "..")) + continue; + strcpy(fullname, path); + strcat(fullname, "/"); + strcat(fullname, pe->d_name); + if (remove(fullname)) + t_info("remove(%s) failed %d\n", fullname, errno); + + } + (void)closedir(dirp); + if (rmdir(path)) + t_info("rmdir(%s) failed %d\n", path, errno); + + return; +} + +static void +use(dst_key_t *key, isc_mem_t *mctx, isc_result_t exp_result, int *nfails) { + + isc_result_t ret; + const char *data = "This is some data"; + unsigned char sig[512]; + isc_buffer_t databuf, sigbuf; + isc_region_t datareg, sigreg; + dst_context_t *ctx = NULL; + + isc_buffer_init(&sigbuf, sig, sizeof(sig)); + isc_buffer_init(&databuf, data, strlen(data)); + isc_buffer_add(&databuf, strlen(data)); + isc_buffer_usedregion(&databuf, &datareg); + + ret = dst_context_create(key, mctx, &ctx); + if (ret != exp_result) { + t_info("dst_context_create(%d) returned (%s) expected (%s)\n", + dst_key_alg(key), dst_result_totext(ret), + dst_result_totext(exp_result)); + ++*nfails; + return; + } + if (exp_result != ISC_R_SUCCESS) + return; + ret = dst_context_adddata(ctx, &datareg); + if (ret != ISC_R_SUCCESS) { + t_info("dst_context_adddata(%d) returned (%s)\n", + dst_key_alg(key), dst_result_totext(ret)); + ++*nfails; + dst_context_destroy(&ctx); + return; + } + ret = dst_context_sign(ctx, &sigbuf); + if (ret != ISC_R_SUCCESS) { + t_info("dst_context_sign(%d) returned (%s)\n", + dst_key_alg(key), dst_result_totext(ret)); + ++*nfails; + dst_context_destroy(&ctx); + return; + } + dst_context_destroy(&ctx); + + isc_buffer_remainingregion(&sigbuf, &sigreg); + ret = dst_context_create(key, mctx, &ctx); + if (ret != ISC_R_SUCCESS) { + t_info("dst_context_create(%d) returned (%s)\n", + dst_key_alg(key), dst_result_totext(ret)); + ++*nfails; + return; + } + ret = dst_context_adddata(ctx, &datareg); + if (ret != ISC_R_SUCCESS) { + t_info("dst_context_adddata(%d) returned (%s)\n", + dst_key_alg(key), dst_result_totext(ret)); + ++*nfails; + dst_context_destroy(&ctx); + return; + } + ret = dst_context_verify(ctx, &sigreg); + if (ret != exp_result) { + t_info("dst_context_verify(%d) returned (%s) expected (%s)\n", + dst_key_alg(key), dst_result_totext(ret), + dst_result_totext(exp_result)); + ++*nfails; + dst_context_destroy(&ctx); + return; + } + dst_context_destroy(&ctx); +} + +static void +dh(dns_name_t *name1, int id1, dns_name_t *name2, int id2, isc_mem_t *mctx, + isc_result_t exp_result, int *nfails, int *nprobs) +{ + dst_key_t *key1 = NULL, *key2 = NULL; + isc_result_t ret; + char current[PATH_MAX + 1]; + char tmp[PATH_MAX + 1]; + char *p; + int alg = DST_ALG_DH; + int type = DST_TYPE_PUBLIC|DST_TYPE_PRIVATE|DST_TYPE_KEY; + unsigned char array1[1024], array2[1024]; + isc_buffer_t b1, b2; + isc_region_t r1, r2; + + UNUSED(exp_result); + + p = getcwd(current, PATH_MAX);; + if (p == NULL) { + t_info("getcwd failed %d\n", errno); + ++*nprobs; + return; + } + + ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1); + if (ret != ISC_R_SUCCESS) { + t_info("dst_key_fromfile(%d) returned: %s\n", + alg, dst_result_totext(ret)); + ++*nfails; + return; + } + + ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2); + if (ret != ISC_R_SUCCESS) { + t_info("dst_key_fromfile(%d) returned: %s\n", + alg, dst_result_totext(ret)); + ++*nfails; + return; + } + + ret = isc_file_mktemplate("/tmp/", tmp, sizeof(tmp)); + if (ret != ISC_R_SUCCESS) { + t_info("isc_file_mktemplate failed %s\n", + isc_result_totext(ret)); + ++*nprobs; + return; + } + + ret = isc_dir_createunique(tmp); + if (ret != ISC_R_SUCCESS) { + t_info("isc_dir_createunique failed %s\n", + isc_result_totext(ret)); + ++*nprobs; + return; + } + + ret = dst_key_tofile(key1, type, tmp); + if (ret != 0) { + t_info("dst_key_tofile(%d) returned: %s\n", + alg, dst_result_totext(ret)); + ++*nfails; + return; + } + + ret = dst_key_tofile(key2, type, tmp); + if (ret != 0) { + t_info("dst_key_tofile(%d) returned: %s\n", + alg, dst_result_totext(ret)); + ++*nfails; + return; + } + + cleandir(tmp); + + isc_buffer_init(&b1, array1, sizeof(array1)); + ret = dst_key_computesecret(key1, key2, &b1); + if (ret != 0) { + t_info("dst_computesecret() returned: %s\n", + dst_result_totext(ret)); + ++*nfails; + return; + } + + isc_buffer_init(&b2, array2, sizeof(array2)); + ret = dst_key_computesecret(key2, key1, &b2); + if (ret != 0) { + t_info("dst_computesecret() returned: %s\n", + dst_result_totext(ret)); + ++*nfails; + return; + } + + isc_buffer_usedregion(&b1, &r1); + isc_buffer_usedregion(&b2, &r2); + if (r1.length != r2.length || memcmp(r1.base, r2.base, r1.length) != 0) + { + t_info("computed secrets don't match\n"); + ++*nfails; + return; + } + + dst_key_free(&key1); + dst_key_free(&key2); +} + +static void +io(dns_name_t *name, int id, int alg, int type, isc_mem_t *mctx, + isc_result_t exp_result, int *nfails, int *nprobs) +{ + dst_key_t *key = NULL; + isc_result_t ret; + char current[PATH_MAX + 1]; + char tmp[PATH_MAX + 1]; + char *p; + + p = getcwd(current, PATH_MAX);; + if (p == NULL) { + t_info("getcwd failed %d\n", errno); + ++*nprobs; + return; + } + + ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key); + if (ret != ISC_R_SUCCESS) { + t_info("dst_key_fromfile(%d) returned: %s\n", + alg, dst_result_totext(ret)); + ++*nfails; + return; + } + + ret = isc_file_mktemplate("/tmp/", tmp, sizeof(tmp)); + if (ret != ISC_R_SUCCESS) { + t_info("isc_file_mktemplate failed %s\n", + isc_result_totext(ret)); + ++*nprobs; + return; + } + + ret = isc_dir_createunique(tmp); + if (ret != ISC_R_SUCCESS) { + t_info("mkdir failed %d\n", errno); + ++*nprobs; + return; + } + + ret = dst_key_tofile(key, type, tmp); + if (ret != 0) { + t_info("dst_key_tofile(%d) returned: %s\n", + alg, dst_result_totext(ret)); + ++*nfails; + return; + } + + if (dst_key_alg(key) != DST_ALG_DH) + use(key, mctx, exp_result, nfails); + + cleandir(tmp); + + dst_key_free(&key); +} + +static void +generate(int alg, isc_mem_t *mctx, int size, int *nfails) { + isc_result_t ret; + dst_key_t *key = NULL; + + ret = dst_key_generate(dns_rootname, alg, size, 0, 0, 0, + dns_rdataclass_in, mctx, &key); + if (ret != ISC_R_SUCCESS) { + t_info("dst_key_generate(%d) returned: %s\n", alg, + dst_result_totext(ret)); + ++*nfails; + return; + } + + if (alg != DST_ALG_DH) + use(key, mctx, ISC_R_SUCCESS, nfails); + dst_key_free(&key); +} + +#define DBUFSIZ 25 + +static const char *a1 = + "the dst module provides the capability to " + "generate, store and retrieve public and private keys, " + "sign and verify data using the RSA, DSA and MD5 algorithms, " + "and compute Diffie-Hellman shared secrets."; +static void +t1(void) { + isc_mem_t *mctx; + isc_entropy_t *ectx; + int nfails; + int nprobs; + int result; + isc_result_t isc_result; + dns_fixedname_t fname; + dns_name_t *name; + isc_buffer_t b; + + t_assert("dst", 1, T_REQUIRED, a1); + + nfails = 0; + nprobs = 0; + mctx = NULL; + isc_result = isc_mem_create(0, 0, &mctx); + if (isc_result != ISC_R_SUCCESS) { + t_info("isc_mem_create failed %s\n", + isc_result_totext(isc_result)); + t_result(T_UNRESOLVED); + return; + } + ectx = NULL; + isc_result = isc_entropy_create(mctx, &ectx); + if (isc_result != ISC_R_SUCCESS) { + t_info("isc_entropy_create failed %s\n", + isc_result_totext(isc_result)); + t_result(T_UNRESOLVED); + return; + } + isc_result = isc_entropy_createfilesource(ectx, "randomfile"); + if (isc_result != ISC_R_SUCCESS) { + t_info("isc_entropy_create failed %s\n", + isc_result_totext(isc_result)); + t_result(T_UNRESOLVED); + return; + } + isc_result = dst_lib_init(mctx, ectx, ISC_ENTROPY_BLOCKING); + if (isc_result != ISC_R_SUCCESS) { + t_info("dst_lib_init failed %s\n", + isc_result_totext(isc_result)); + t_result(T_UNRESOLVED); + return; + } + + if (!dst_algorithm_supported(DST_ALG_RSAMD5)) { + dst_lib_destroy(); + t_info("library built without crypto support\n"); + t_result(T_UNTESTED); + return; + } + + t_info("testing use of stored keys [1]\n"); + + dns_fixedname_init(&fname); + name = dns_fixedname_name(&fname); + isc_buffer_init(&b, "test.", 5); + isc_buffer_add(&b, 5); + isc_result = dns_name_fromtext(name, &b, NULL, ISC_FALSE, NULL); + if (isc_result != ISC_R_SUCCESS) { + t_info("dns_name_fromtext failed %s\n", + isc_result_totext(isc_result)); + t_result(T_UNRESOLVED); + return; + } + io(name, 23616, DST_ALG_DSA, DST_TYPE_PRIVATE|DST_TYPE_PUBLIC, + mctx, ISC_R_SUCCESS, &nfails, &nprobs); + t_info("testing use of stored keys [2]\n"); + io(name, 54622, DST_ALG_RSAMD5, DST_TYPE_PRIVATE|DST_TYPE_PUBLIC, + mctx, ISC_R_SUCCESS, &nfails, &nprobs); + + t_info("testing use of stored keys [3]\n"); + io(name, 49667, DST_ALG_DSA, DST_TYPE_PRIVATE|DST_TYPE_PUBLIC, + mctx, DST_R_NULLKEY, &nfails, &nprobs); + t_info("testing use of stored keys [4]\n"); + io(name, 2, DST_ALG_RSAMD5, DST_TYPE_PRIVATE|DST_TYPE_PUBLIC, + mctx, DST_R_NULLKEY, &nfails, &nprobs); + + isc_buffer_init(&b, "dh.", 3); + isc_buffer_add(&b, 3); + isc_result = dns_name_fromtext(name, &b, NULL, ISC_FALSE, NULL); + if (isc_result != ISC_R_SUCCESS) { + t_info("dns_name_fromtext failed %s\n", + isc_result_totext(isc_result)); + t_result(T_UNRESOLVED); + return; + } + + dh(name, 18602, name, 48957, mctx, ISC_R_SUCCESS, &nfails, &nprobs); + + t_info("testing use of generated keys\n"); + generate(DST_ALG_RSAMD5, mctx, 512, &nfails); + generate(DST_ALG_DSA, mctx, 512, &nfails); + generate(DST_ALG_DH, mctx, 512, &nfails); + /* + * This one uses a constant. + */ + generate(DST_ALG_DH, mctx, 768, &nfails); + generate(DST_ALG_HMACMD5, mctx, 512, &nfails); + + dst_lib_destroy(); + + isc_entropy_detach(&ectx); + + isc_mem_destroy(&mctx); + + result = T_UNRESOLVED; + if ((nfails == 0) && (nprobs == 0)) + result = T_PASS; + else if (nfails) + result = T_FAIL; + t_result(result); + +} + +#define T_SIGMAX 512 + +#undef NEWSIG /* Define NEWSIG to generate the original signature file. */ + +#ifdef NEWSIG + +/* + * Write a sig in buf to file at path. + */ +static int +sig_tofile(char *path, isc_buffer_t *buf) { + int rval; + int fd; + int len; + int nprobs; + int cnt; + unsigned char c; + unsigned char val; + + cnt = 0; + nprobs = 0; + len = buf->used - buf->current; + + t_info("buf: current %d used %d len %d\n", + buf->current, buf->used, len); + + fd = open(path, O_CREAT|O_TRUNC|O_WRONLY, S_IRWXU|S_IRWXO|S_IRWXG); + if (fd < 0) { + t_info("open %s failed %d\n", path, errno); + return(1); + } + + while (len) { + c = (unsigned char) isc_buffer_getuint8(buf); + val = ((c >> 4 ) & 0x0f); + if ((0 <= val) && (val <= 9)) + val = '0' + val; + else + val = 'A' + val - 10; + rval = write(fd, &val, 1); + if (rval != 1) { + ++nprobs; + t_info("write failed %d %d\n", rval, errno); + break; + } + val = (c & 0x0f); + if ((0 <= val) && (val <= 9)) + val = '0' + val; + else + val = 'A' + val - 10; + rval = write(fd, &val, 1); + if (rval != 1) { + ++nprobs; + t_info("write failed %d %d\n", rval, errno); + break; + } + --len; + ++cnt; + if ((cnt % 16) == 0) { + val = '\n'; + rval = write(fd, &val, 1); + if (rval != 1) { + ++nprobs; + t_info("write failed %d %d\n", rval, errno); + break; + } + } + } + val = '\n'; + rval = write(fd, &val, 1); + if (rval != 1) { + ++nprobs; + t_info("write failed %d %d\n", rval, errno); + } + (void) close(fd); + return(nprobs); +} + +#endif /* NEWSIG */ + +/* + * Read sig in file at path to buf. + */ +static int +sig_fromfile(char *path, isc_buffer_t *iscbuf) { + int rval; + int len; + int fd; + unsigned char val; + struct stat sb; + char *p; + char *buf; + + rval = stat(path, &sb); + if (rval != 0) { + t_info("stat %s failed, errno == %d\n", path, errno); + return(1); + } + + buf = (char *) malloc((sb.st_size + 1) * sizeof(unsigned char)); + if (buf == NULL) { + t_info("malloc failed, errno == %d\n", errno); + return(1); + } + + fd = open(path, O_RDONLY); + if (fd < 0) { + t_info("open failed, errno == %d\n", errno); + (void) free(buf); + return(1); + } + + len = sb.st_size; + p = buf; + while (len) { + rval = read(fd, p, len); + if (rval > 0) { + len -= rval; + p += rval; + } + else { + t_info("read failed %d, errno == %d\n", rval, errno); + (void) free(buf); + (void) close(fd); + return(1); + } + } + close(fd); + + p = buf; + len = sb.st_size; + while(len) { + if (*p == '\n') { + ++p; + --len; + continue; + } + if (('0' <= *p) && (*p <= '9')) + val = *p - '0'; + else + val = *p - 'A' + 10; + ++p; + val <<= 4; + --len; + if (('0' <= *p) && (*p <= '9')) + val |= (*p - '0'); + else + val |= (*p - 'A' + 10); + ++p; + --len; + isc_buffer_putuint8(iscbuf, val); + } + (void) free(buf); + return(0); +} + +static void +t2_sigchk(char *datapath, char *sigpath, char *keyname, + int id, int alg, int type, + isc_mem_t *mctx, char *expected_result, + int *nfails, int *nprobs) +{ + int rval; + int len; + int fd; + int exp_res; + dst_key_t *key = NULL; + unsigned char sig[T_SIGMAX]; + unsigned char *p; + unsigned char *data; + struct stat sb; + isc_result_t isc_result; + isc_buffer_t databuf; + isc_buffer_t sigbuf; + isc_region_t datareg; + isc_region_t sigreg; + dns_fixedname_t fname; + dns_name_t *name; + isc_buffer_t b; + dst_context_t *ctx = NULL; + + /* + * Read data from file in a form usable by dst_verify. + */ + rval = stat(datapath, &sb); + if (rval != 0) { + t_info("t2_sigchk: stat (%s) failed %d\n", datapath, errno); + ++*nprobs; + return; + } + + data = (unsigned char *) malloc(sb.st_size * sizeof(char)); + if (data == NULL) { + t_info("t2_sigchk: malloc failed %d\n", errno); + ++*nprobs; + return; + } + + fd = open(datapath, O_RDONLY); + if (fd < 0) { + t_info("t2_sigchk: open failed %d\n", errno); + (void) free(data); + ++*nprobs; + return; + } + + p = data; + len = sb.st_size; + do { + rval = read(fd, p, len); + if (rval > 0) { + len -= rval; + p += rval; + } + } while (len); + (void) close(fd); + + /* + * Read key from file in a form usable by dst_verify. + */ + dns_fixedname_init(&fname); + name = dns_fixedname_name(&fname); + isc_buffer_init(&b, keyname, strlen(keyname)); + isc_buffer_add(&b, strlen(keyname)); + isc_result = dns_name_fromtext(name, &b, dns_rootname, ISC_FALSE, NULL); + if (isc_result != ISC_R_SUCCESS) { + t_info("dns_name_fromtext failed %s\n", + isc_result_totext(isc_result)); + (void) free(data); + ++*nprobs; + return; + } + isc_result = dst_key_fromfile(name, id, alg, type, NULL, mctx, &key); + if (isc_result != ISC_R_SUCCESS) { + t_info("dst_key_fromfile failed %s\n", + isc_result_totext(isc_result)); + (void) free(data); + ++*nprobs; + return; + } + + isc_buffer_init(&databuf, data, sb.st_size); + isc_buffer_add(&databuf, sb.st_size); + isc_buffer_usedregion(&databuf, &datareg); + +#ifdef NEWSIG + + /* + * If we're generating a signature for the first time, + * sign the data and save the signature to a file + */ + + memset(sig, 0, sizeof(sig)); + isc_buffer_init(&sigbuf, sig, sizeof(sig)); + + isc_result = dst_context_create(key, mctx, &ctx); + if (isc_result != ISC_R_SUCCESS) { + t_info("dst_context_create(%d) failed %s\n", + dst_result_totext(isc_result)); + (void) free(data); + dst_key_free(&key); + ++*nprobs; + return; + } + isc_result = dst_context_adddata(ctx, &datareg); + if (isc_result != ISC_R_SUCCESS) { + t_info("dst_context_adddata(%d) failed %s\n", + dst_result_totext(isc_result)); + (void) free(data); + dst_key_free(&key); + dst_context_destroy(&ctx); + ++*nprobs; + return; + } + isc_result = dst_context_sign(ctx, &sigbuf); + if (isc_result != ISC_R_SUCCESS) { + t_info("dst_sign(%d) failed %s\n", + dst_result_totext(isc_result)); + (void) free(data); + dst_key_free(&key); + dst_context_destroy(&ctx); + ++*nprobs; + return; + } + dst_context_destroy(&ctx); + + rval = sig_tofile(sigpath, &sigbuf); + if (rval != 0) { + t_info("sig_tofile failed\n"); + ++*nprobs; + (void) free(data); + dst_key_free(&key); + return; + } + +#endif /* NEWSIG */ + + memset(sig, 0, sizeof(sig)); + isc_buffer_init(&sigbuf, sig, sizeof(sig)); + + /* + * Read precomputed signature from file in a form usable by dst_verify. + */ + rval = sig_fromfile(sigpath, &sigbuf); + if (rval != 0) { + t_info("sig_fromfile failed\n"); + (void) free(data); + dst_key_free(&key); + ++*nprobs; + return; + } + + /* + * Verify that the key signed the data. + */ + isc_buffer_remainingregion(&sigbuf, &sigreg); + + exp_res = 0; + if (strstr(expected_result, "!")) + exp_res = 1; + + isc_result = dst_context_create(key, mctx, &ctx); + if (isc_result != ISC_R_SUCCESS) { + t_info("dst_context_create returned %s\n", + isc_result_totext(isc_result)); + ++*nfails; + } + isc_result = dst_context_adddata(ctx, &datareg); + if (isc_result != ISC_R_SUCCESS) { + t_info("dst_context_adddata returned %s\n", + isc_result_totext(isc_result)); + dst_context_destroy(&ctx); + ++*nfails; + } + isc_result = dst_context_verify(ctx, &sigreg); + if ( ((exp_res == 0) && (isc_result != ISC_R_SUCCESS)) || + ((exp_res != 0) && (isc_result == ISC_R_SUCCESS))) { + + t_info("dst_context_verify returned %s, expected %s\n", + isc_result_totext(isc_result), + expected_result); + dst_context_destroy(&ctx); + ++*nfails; + } + + (void) free(data); + dst_context_destroy(&ctx); + dst_key_free(&key); + return; +} + +/* + * The astute observer will note that t1() signs then verifies data + * during the test but that t2() verifies data that has been + * signed at some earlier time, possibly with an entire different + * version or implementation of the DSA and RSA algorithms + */ +static const char *a2 = + "the dst module provides the capability to " + "verify data signed with the RSA and DSA algorithms"; + +/* + * av == datafile, sigpath, keyname, keyid, alg, exp_result. + */ +static int +t2_vfy(char **av) { + char *datapath; + char *sigpath; + char *keyname; + char *key; + int keyid; + char *alg; + int algid; + char *exp_result; + int nfails; + int nprobs; + isc_mem_t *mctx; + isc_entropy_t *ectx; + isc_result_t isc_result; + int result; + + datapath = *av++; + sigpath = *av++; + keyname = *av++; + key = *av++; + keyid = atoi(key); + alg = *av++; + exp_result = *av++; + nfails = 0; + nprobs = 0; + + if (! strcasecmp(alg, "DST_ALG_DSA")) + algid = DST_ALG_DSA; + else if (! strcasecmp(alg, "DST_ALG_RSAMD5")) + algid = DST_ALG_RSAMD5; + else { + t_info("Unknown algorithm %s\n", alg); + return(T_UNRESOLVED); + } + + mctx = NULL; + isc_result = isc_mem_create(0, 0, &mctx); + if (isc_result != ISC_R_SUCCESS) { + t_info("isc_mem_create failed %s\n", + isc_result_totext(isc_result)); + return(T_UNRESOLVED); + } + ectx = NULL; + isc_result = isc_entropy_create(mctx, &ectx); + if (isc_result != ISC_R_SUCCESS) { + t_info("isc_entropy_create failed %s\n", + isc_result_totext(isc_result)); + return(T_UNRESOLVED); + } + isc_result = isc_entropy_createfilesource(ectx, "randomfile"); + if (isc_result != ISC_R_SUCCESS) { + t_info("isc_entropy_create failed %s\n", + isc_result_totext(isc_result)); + return(T_UNRESOLVED); + } + isc_result = dst_lib_init(mctx, ectx, ISC_ENTROPY_BLOCKING); + if (isc_result != ISC_R_SUCCESS) { + t_info("dst_lib_init failed %s\n", + isc_result_totext(isc_result)); + return(T_UNRESOLVED); + } + + if (!dst_algorithm_supported(DST_ALG_RSAMD5)) { + dst_lib_destroy(); + t_info("library built without crypto support\n"); + return (T_UNTESTED); + } + + t_info("testing %s, %s, %s, %s, %s, %s\n", + datapath, sigpath, keyname, key, alg, exp_result); + t2_sigchk(datapath, sigpath, keyname, keyid, + algid, DST_TYPE_PRIVATE|DST_TYPE_PUBLIC, + mctx, exp_result, + &nfails, &nprobs); + + dst_lib_destroy(); + + isc_entropy_detach(&ectx); + + isc_mem_destroy(&mctx); + + result = T_UNRESOLVED; + if (nfails) + result = T_FAIL; + else if ((nfails == 0) && (nprobs == 0)) + result = T_PASS; + + return(result); +} + +static void +t2(void) { + int result; + t_assert("dst", 2, T_REQUIRED, a2); + result = t_eval("dst_2_data", t2_vfy, 6); + t_result(result); +} + +testspec_t T_testlist[] = { + { t1, "basic dst module verification" }, + { t2, "signature ineffability" }, + { NULL, NULL } +}; + |