cachepc-qemu

Fork of AMDESE/qemu with changes for cachepc side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-qemu
Log | Files | Refs | Submodules | LICENSE | sfeed.txt

common.tls (5791B)


      1#!/usr/bin/env bash
      2#
      3# Helpers for TLS related config
      4#
      5# Copyright (C) 2018 Red Hat, Inc.
      6#
      7# This program is free software; you can redistribute it and/or modify
      8# it under the terms of the GNU General Public License as published by
      9# the Free Software Foundation; either version 2 of the License, or
     10# (at your option) any later version.
     11#
     12# This program is distributed in the hope that it will be useful,
     13# but WITHOUT ANY WARRANTY; without even the implied warranty of
     14# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
     15# GNU General Public License for more details.
     16#
     17# You should have received a copy of the GNU General Public License
     18# along with this program.  If not, see <http://www.gnu.org/licenses/>.
     19#
     20
     21tls_dir="${TEST_DIR}/tls"
     22
     23tls_x509_cleanup()
     24{
     25    rm -f "${tls_dir}"/*.pem
     26    rm -f "${tls_dir}"/*/*.pem
     27    rmdir "${tls_dir}"/*
     28    rmdir "${tls_dir}"
     29}
     30
     31
     32tls_certtool()
     33{
     34    certtool "$@" 1>"${tls_dir}"/certtool.log 2>&1
     35    if test "$?" = 0; then
     36      head -1 "${tls_dir}"/certtool.log
     37    else
     38      cat "${tls_dir}"/certtool.log
     39    fi
     40    rm -f "${tls_dir}"/certtool.log
     41}
     42
     43tls_x509_init()
     44{
     45    (certtool --help) >/dev/null 2>&1 || \
     46	_notrun "certtool utility not found, skipping test"
     47
     48    mkdir -p "${tls_dir}"
     49
     50    # use a fixed key so we don't waste system entropy on
     51    # each test run
     52    cat > "${tls_dir}/key.pem" <<EOF
     53-----BEGIN RSA PRIVATE KEY-----
     54MIIG5AIBAAKCAYEAyjWyLSNm5PZvYUKUcDWGqbLX10b2ood+YaFjWSnJrqx/q3qh
     55rVGBJglD25AJENJsmZF3zPP1oMhfIxsXu63Hdkb6Rdlc2RUoUP34x9VC1izH25mR
     566c8DPDp1d6IraZ/llDMI1HsBFz0qGWtvOHgm815XG4PAr/N8rDsuqfv/cJ01KlnO
     570OdO5QRXCJf9g/dYd41MPu7wOXk9FqjQlmRoP59HgtJ+zUpE4z+Keruw9cMT9VJj
     580oT+pQ9ysenqeZ3gbT224T1khrEhT5kifhtFLNyDssRchUUWH0hiqoOO1vgb+850
     59W6/1VdxvuPam48py4diSPi1Vip8NITCOBaX9FIpVp4Ruw4rTPVMNMjq9Cpx/DwMP
     609MbfXfnaVaZaMrmq67/zPhl0eVbUrecH2hQ3ZB9oIF4GkNskzlWF5+yPy6zqk304
     61AKaiFR6jRyh3YfHo2XFqV8x/hxdsIEXOtEUGhSIcpynsW+ckUCartzu7xbhXjd4b
     62kxJT89+riPFYij09AgMBAAECggGBAKyFkaZXXROeejrmHlV6JZGlp+fhgM38gkRz
     63+Jp7P7rLLAY3E7gXIPQ91WqAAmwazFNdvHPd9USfkCQYmnAi/VoZhrCPmlsQZRxt
     64A5QjjOnEvSPMa6SrXZxGWDCg6R8uMCb4P+FhrPWR1thnRDZOtRTQ+crc50p3mHgt
     656ktXWIJRbqnag8zSfQqCYGtRmhe8sfsWT+Yl4El4+jjaAVU/B364u7+PLmaiphGp
     66BdJfTsTwEpgtGkPj+osDmhzXcZkfq3V+fz5JLkemsCiQKmn4VJRpg8c3ZmE8NPNt
     67gRtGWZ4W3WKDvhotT65WpQx4+6R8Duux/blNPBmH1Upmwd7kj7GYFBArbCjgd9PT
     68xgfCSUZpgOZHHkcgSB+022a8XncXna7WYYij28SLtwImFyu0nNtqECFQHH5u+k6C
     69LRYBSN+3t3At8dQuk01NVrJBndmjmXRfxpqUtTdeaNgVpdUYRY98s30G68NYGSra
     70aEvhhRSghkcLNetkobpY9pUgeqW/tQKBwQDZHHK9nDMt/zk1TxtILeUSitPXcv1/
     718ufXqO0miHdH23XuXhIEA6Ef26RRVGDGgpjkveDJK/1w5feJ4H/ni4Vclil/cm38
     72OwRqjjd7ElHJX6JQbsxEx/gNTk5/QW1iAL9TXUalgepsSXYT6AJ0/CJv0jmJSJ36
     73YoKMOM8uqzb2KhN6i+RlJRi5iY53kUhWTJq5ArWvNhUzQNSYODI4bNxlsKSBL2Ik
     74LZ5QKHuaEjQet0IlPlfIb4PzMm8CHa/urOcCgcEA7m3zW/lL5bIFoKPjWig5Lbn1
     75aHfrG2ngqzWtgWtfZqMH8OkZc1Mdhhmvd46titjiLjeI+UP/uHXR0068PnrNngzl
     76tTgwlakzu+bWzqhBm1F+3/341st/FEk07r0P/3/PhezVjwfO8c8Exj7pLxH4wrH0
     77ROHgDbClmlJRu6OO78wk1+Vapf5DWa8YfA+q+fdvr7KvgGyytheKMT/b/dsqOq7y
     78qZPjmaJKWAvV3RWG8lWHFSdHx2IAHMHfGr17Y/w7AoHBALzwZeYebeekiVucGSjq
     79T8SgLhT7zCIx+JMUPjVfYzaUhP/Iu7Lkma6IzWm9nW6Drpy5pUpMzwUWDCLfzU9q
     80eseFIl337kEn9wLn+t5OpgAyCqYmlftxbqvdrrBN9uvnrJjWvqk/8wsDrw9JxAGc
     81fjeD4nBXUqvYWLXApoR9mZoGKedmoH9pFig4zlO9ig8YITnKYuQ0k6SD0b8agJHc
     82Ir0YSUDnRGgpjvFBGbeOCe+FGbohk/EpItJc3IAh5740lwKBwAdXd2DjokSmYKn7
     83oeqKxofz6+yVlLW5YuOiuX78sWlVp87xPolgi84vSEnkKM/Xsc8+goc6YstpRVa+
     84W+mImoA9YW1dF5HkLeWhTAf9AlgoAEIhbeIfTgBv6KNZSv7RDrDPBBxtXx/vAfSg
     85x0ldwk0scZsVYXLKd67yzfV7KdGUdaX4N/xYgfZm/9gCG3+q8NN2KxVHQ5F71BOE
     86JeABOaGo9WvnU+DNMIDZjHJMUWVw4MHz/a/UArDf/2CxaPVBNQKBwASg6j4ohSTk
     87J7aE6RQ3OBmmDDpixcoCJt9u9SjHVYMlbs5CEJGVSczk0SG3y8P1lOWNDSRnMksZ
     88xWnHdP/ogcuYMuvK7UACNAF0zNddtzOhzcpNmejFj+WCHYY/UmPr2/Kf6t7Cxk2K
     893cZ4tqWsiTmBT8Bknmah7L5DrhS+ZBJliDeFAA8fZHdMH0Xjr4UBp9kF90EMTdW1
     90Xr5uz7ZrMsYpYQI7mmyqV9SSjUg4iBXwVSoag1iDJ1K8Qg/L7Semgg==
     91-----END RSA PRIVATE KEY-----
     92EOF
     93}
     94
     95
     96tls_x509_create_root_ca()
     97{
     98    name=${1:-ca-cert}
     99
    100    cat > "${tls_dir}/ca.info" <<EOF
    101cn = Cthulhu Dark Lord Enterprises $name
    102ca
    103cert_signing_key
    104EOF
    105
    106    tls_certtool \
    107        --generate-self-signed \
    108        --load-privkey "${tls_dir}/key.pem" \
    109        --template "${tls_dir}/ca.info" \
    110        --outfile "${tls_dir}/$name-cert.pem"
    111
    112    rm -f "${tls_dir}/ca.info"
    113}
    114
    115
    116tls_x509_create_server()
    117{
    118    caname=$1
    119    name=$2
    120
    121    mkdir -p "${tls_dir}/$name"
    122    cat > "${tls_dir}/cert.info" <<EOF
    123organization = Cthulhu Dark Lord Enterprises $name
    124cn = localhost
    125dns_name = localhost
    126dns_name = localhost.localdomain
    127ip_address = 127.0.0.1
    128ip_address = ::1
    129tls_www_server
    130encryption_key
    131signing_key
    132EOF
    133
    134    tls_certtool \
    135        --generate-certificate \
    136        --load-ca-privkey "${tls_dir}/key.pem" \
    137        --load-ca-certificate "${tls_dir}/$caname-cert.pem" \
    138        --load-privkey "${tls_dir}/key.pem" \
    139        --template "${tls_dir}/cert.info" \
    140        --outfile "${tls_dir}/$name/server-cert.pem"
    141
    142    ln -s "${tls_dir}/$caname-cert.pem" "${tls_dir}/$name/ca-cert.pem"
    143    ln -s "${tls_dir}/key.pem" "${tls_dir}/$name/server-key.pem"
    144
    145    rm -f "${tls_dir}/cert.info"
    146}
    147
    148
    149tls_x509_create_client()
    150{
    151    caname=$1
    152    name=$2
    153
    154    mkdir -p "${tls_dir}/$name"
    155    cat > "${tls_dir}/cert.info" <<EOF
    156country = South Pacific
    157locality =  R'lyeh
    158organization = Cthulhu Dark Lord Enterprises $name
    159cn = localhost
    160tls_www_client
    161encryption_key
    162signing_key
    163EOF
    164
    165    tls_certtool \
    166        --generate-certificate \
    167        --load-ca-privkey "${tls_dir}/key.pem" \
    168        --load-ca-certificate "${tls_dir}/$caname-cert.pem" \
    169        --load-privkey "${tls_dir}/key.pem" \
    170        --template "${tls_dir}/cert.info" \
    171        --outfile "${tls_dir}/$name/client-cert.pem"
    172
    173    ln -s "${tls_dir}/$caname-cert.pem" "${tls_dir}/$name/ca-cert.pem"
    174    ln -s "${tls_dir}/key.pem" "${tls_dir}/$name/client-key.pem"
    175
    176    rm -f "${tls_dir}/cert.info"
    177}