2
0

common.tls 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. #!/usr/bin/env bash
  2. #
  3. # Helpers for TLS related config
  4. #
  5. # Copyright (C) 2018 Red Hat, Inc.
  6. #
  7. # This program is free software; you can redistribute it and/or modify
  8. # it under the terms of the GNU General Public License as published by
  9. # the Free Software Foundation; either version 2 of the License, or
  10. # (at your option) any later version.
  11. #
  12. # This program is distributed in the hope that it will be useful,
  13. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. # GNU General Public License for more details.
  16. #
  17. # You should have received a copy of the GNU General Public License
  18. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  19. #
  20. tls_dir="${TEST_DIR}/tls"
  21. tls_x509_cleanup()
  22. {
  23. rm -f "${tls_dir}"/*.pem
  24. rm -f "${tls_dir}"/*/*.pem
  25. rm -f "${tls_dir}"/*/*.psk
  26. rmdir "${tls_dir}"/*
  27. rmdir "${tls_dir}"
  28. }
  29. tls_certtool()
  30. {
  31. certtool "$@" 1>"${tls_dir}"/certtool.log 2>&1
  32. if test "$?" = 0; then
  33. head -1 "${tls_dir}"/certtool.log
  34. else
  35. cat "${tls_dir}"/certtool.log
  36. fi
  37. rm -f "${tls_dir}"/certtool.log
  38. }
  39. tls_psktool()
  40. {
  41. psktool "$@" 1>"${tls_dir}"/psktool.log 2>&1
  42. if test "$?" = 0; then
  43. head -1 "${tls_dir}"/psktool.log
  44. else
  45. cat "${tls_dir}"/psktool.log
  46. fi
  47. rm -f "${tls_dir}"/psktool.log
  48. }
  49. tls_x509_init()
  50. {
  51. (certtool --help) >/dev/null 2>&1 || \
  52. _notrun "certtool utility not found, skipping test"
  53. mkdir -p "${tls_dir}"
  54. # use a fixed key so we don't waste system entropy on
  55. # each test run
  56. cat > "${tls_dir}/key.pem" <<EOF
  57. -----BEGIN RSA PRIVATE KEY-----
  58. MIIG5AIBAAKCAYEAyjWyLSNm5PZvYUKUcDWGqbLX10b2ood+YaFjWSnJrqx/q3qh
  59. rVGBJglD25AJENJsmZF3zPP1oMhfIxsXu63Hdkb6Rdlc2RUoUP34x9VC1izH25mR
  60. 6c8DPDp1d6IraZ/llDMI1HsBFz0qGWtvOHgm815XG4PAr/N8rDsuqfv/cJ01KlnO
  61. 0OdO5QRXCJf9g/dYd41MPu7wOXk9FqjQlmRoP59HgtJ+zUpE4z+Keruw9cMT9VJj
  62. 0oT+pQ9ysenqeZ3gbT224T1khrEhT5kifhtFLNyDssRchUUWH0hiqoOO1vgb+850
  63. W6/1VdxvuPam48py4diSPi1Vip8NITCOBaX9FIpVp4Ruw4rTPVMNMjq9Cpx/DwMP
  64. 9MbfXfnaVaZaMrmq67/zPhl0eVbUrecH2hQ3ZB9oIF4GkNskzlWF5+yPy6zqk304
  65. AKaiFR6jRyh3YfHo2XFqV8x/hxdsIEXOtEUGhSIcpynsW+ckUCartzu7xbhXjd4b
  66. kxJT89+riPFYij09AgMBAAECggGBAKyFkaZXXROeejrmHlV6JZGlp+fhgM38gkRz
  67. +Jp7P7rLLAY3E7gXIPQ91WqAAmwazFNdvHPd9USfkCQYmnAi/VoZhrCPmlsQZRxt
  68. A5QjjOnEvSPMa6SrXZxGWDCg6R8uMCb4P+FhrPWR1thnRDZOtRTQ+crc50p3mHgt
  69. 6ktXWIJRbqnag8zSfQqCYGtRmhe8sfsWT+Yl4El4+jjaAVU/B364u7+PLmaiphGp
  70. BdJfTsTwEpgtGkPj+osDmhzXcZkfq3V+fz5JLkemsCiQKmn4VJRpg8c3ZmE8NPNt
  71. gRtGWZ4W3WKDvhotT65WpQx4+6R8Duux/blNPBmH1Upmwd7kj7GYFBArbCjgd9PT
  72. xgfCSUZpgOZHHkcgSB+022a8XncXna7WYYij28SLtwImFyu0nNtqECFQHH5u+k6C
  73. LRYBSN+3t3At8dQuk01NVrJBndmjmXRfxpqUtTdeaNgVpdUYRY98s30G68NYGSra
  74. aEvhhRSghkcLNetkobpY9pUgeqW/tQKBwQDZHHK9nDMt/zk1TxtILeUSitPXcv1/
  75. 8ufXqO0miHdH23XuXhIEA6Ef26RRVGDGgpjkveDJK/1w5feJ4H/ni4Vclil/cm38
  76. OwRqjjd7ElHJX6JQbsxEx/gNTk5/QW1iAL9TXUalgepsSXYT6AJ0/CJv0jmJSJ36
  77. YoKMOM8uqzb2KhN6i+RlJRi5iY53kUhWTJq5ArWvNhUzQNSYODI4bNxlsKSBL2Ik
  78. LZ5QKHuaEjQet0IlPlfIb4PzMm8CHa/urOcCgcEA7m3zW/lL5bIFoKPjWig5Lbn1
  79. aHfrG2ngqzWtgWtfZqMH8OkZc1Mdhhmvd46titjiLjeI+UP/uHXR0068PnrNngzl
  80. tTgwlakzu+bWzqhBm1F+3/341st/FEk07r0P/3/PhezVjwfO8c8Exj7pLxH4wrH0
  81. ROHgDbClmlJRu6OO78wk1+Vapf5DWa8YfA+q+fdvr7KvgGyytheKMT/b/dsqOq7y
  82. qZPjmaJKWAvV3RWG8lWHFSdHx2IAHMHfGr17Y/w7AoHBALzwZeYebeekiVucGSjq
  83. T8SgLhT7zCIx+JMUPjVfYzaUhP/Iu7Lkma6IzWm9nW6Drpy5pUpMzwUWDCLfzU9q
  84. eseFIl337kEn9wLn+t5OpgAyCqYmlftxbqvdrrBN9uvnrJjWvqk/8wsDrw9JxAGc
  85. fjeD4nBXUqvYWLXApoR9mZoGKedmoH9pFig4zlO9ig8YITnKYuQ0k6SD0b8agJHc
  86. Ir0YSUDnRGgpjvFBGbeOCe+FGbohk/EpItJc3IAh5740lwKBwAdXd2DjokSmYKn7
  87. oeqKxofz6+yVlLW5YuOiuX78sWlVp87xPolgi84vSEnkKM/Xsc8+goc6YstpRVa+
  88. W+mImoA9YW1dF5HkLeWhTAf9AlgoAEIhbeIfTgBv6KNZSv7RDrDPBBxtXx/vAfSg
  89. x0ldwk0scZsVYXLKd67yzfV7KdGUdaX4N/xYgfZm/9gCG3+q8NN2KxVHQ5F71BOE
  90. JeABOaGo9WvnU+DNMIDZjHJMUWVw4MHz/a/UArDf/2CxaPVBNQKBwASg6j4ohSTk
  91. J7aE6RQ3OBmmDDpixcoCJt9u9SjHVYMlbs5CEJGVSczk0SG3y8P1lOWNDSRnMksZ
  92. xWnHdP/ogcuYMuvK7UACNAF0zNddtzOhzcpNmejFj+WCHYY/UmPr2/Kf6t7Cxk2K
  93. 3cZ4tqWsiTmBT8Bknmah7L5DrhS+ZBJliDeFAA8fZHdMH0Xjr4UBp9kF90EMTdW1
  94. Xr5uz7ZrMsYpYQI7mmyqV9SSjUg4iBXwVSoag1iDJ1K8Qg/L7Semgg==
  95. -----END RSA PRIVATE KEY-----
  96. EOF
  97. }
  98. tls_x509_create_root_ca()
  99. {
  100. name=${1:-ca-cert}
  101. cat > "${tls_dir}/ca.info" <<EOF
  102. cn = Cthulhu Dark Lord Enterprises $name
  103. ca
  104. cert_signing_key
  105. EOF
  106. tls_certtool \
  107. --generate-self-signed \
  108. --load-privkey "${tls_dir}/key.pem" \
  109. --template "${tls_dir}/ca.info" \
  110. --outfile "${tls_dir}/$name-cert.pem"
  111. rm -f "${tls_dir}/ca.info"
  112. }
  113. tls_x509_create_server()
  114. {
  115. caname=$1
  116. name=$2
  117. # We don't include 'localhost' in the cert, as
  118. # we want to keep it unlisted to let tests
  119. # validate hostname override
  120. mkdir -p "${tls_dir}/$name"
  121. cat > "${tls_dir}/cert.info" <<EOF
  122. organization = Cthulhu Dark Lord Enterprises $name
  123. cn = iotests.qemu.org
  124. ip_address = 127.0.0.1
  125. ip_address = ::1
  126. tls_www_server
  127. encryption_key
  128. signing_key
  129. EOF
  130. tls_certtool \
  131. --generate-certificate \
  132. --load-ca-privkey "${tls_dir}/key.pem" \
  133. --load-ca-certificate "${tls_dir}/$caname-cert.pem" \
  134. --load-privkey "${tls_dir}/key.pem" \
  135. --template "${tls_dir}/cert.info" \
  136. --outfile "${tls_dir}/$name/server-cert.pem"
  137. ln -s "${tls_dir}/$caname-cert.pem" "${tls_dir}/$name/ca-cert.pem"
  138. ln -s "${tls_dir}/key.pem" "${tls_dir}/$name/server-key.pem"
  139. rm -f "${tls_dir}/cert.info"
  140. }
  141. tls_x509_create_client()
  142. {
  143. caname=$1
  144. name=$2
  145. mkdir -p "${tls_dir}/$name"
  146. cat > "${tls_dir}/cert.info" <<EOF
  147. country = South Pacific
  148. locality = R'lyeh
  149. organization = Cthulhu Dark Lord Enterprises $name
  150. cn = localhost
  151. tls_www_client
  152. encryption_key
  153. signing_key
  154. EOF
  155. tls_certtool \
  156. --generate-certificate \
  157. --load-ca-privkey "${tls_dir}/key.pem" \
  158. --load-ca-certificate "${tls_dir}/$caname-cert.pem" \
  159. --load-privkey "${tls_dir}/key.pem" \
  160. --template "${tls_dir}/cert.info" \
  161. --outfile "${tls_dir}/$name/client-cert.pem"
  162. ln -s "${tls_dir}/$caname-cert.pem" "${tls_dir}/$name/ca-cert.pem"
  163. ln -s "${tls_dir}/key.pem" "${tls_dir}/$name/client-key.pem"
  164. rm -f "${tls_dir}/cert.info"
  165. }
  166. tls_psk_create_creds()
  167. {
  168. name=$1
  169. mkdir -p "${tls_dir}/$name"
  170. tls_psktool \
  171. --pskfile "${tls_dir}/$name/keys.psk" \
  172. --username "$name"
  173. }