target/ppc: Introduce powerpc_excp_6xx
[qemu.git] / tests / qemu-iotests / common.tls
blob6ba28a78d3c801a6978ac39d318e08a552b67997
1 #!/usr/bin/env bash
3 # Helpers for TLS related config
5 # Copyright (C) 2018 Red Hat, Inc.
7 # This program is free software; you can redistribute it and/or modify
8 # it under the terms of the GNU General Public License as published by
9 # the Free Software Foundation; either version 2 of the License, or
10 # (at your option) any later version.
12 # This program is distributed in the hope that it will be useful,
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 # GNU General Public License for more details.
17 # You should have received a copy of the GNU General Public License
18 # along with this program. If not, see <http://www.gnu.org/licenses/>.
21 tls_dir="${TEST_DIR}/tls"
23 tls_x509_cleanup()
25 rm -f "${tls_dir}"/*.pem
26 rm -f "${tls_dir}"/*/*.pem
27 rmdir "${tls_dir}"/*
28 rmdir "${tls_dir}"
32 tls_certtool()
34 certtool "$@" 1>"${tls_dir}"/certtool.log 2>&1
35 if test "$?" = 0; then
36 head -1 "${tls_dir}"/certtool.log
37 else
38 cat "${tls_dir}"/certtool.log
40 rm -f "${tls_dir}"/certtool.log
43 tls_x509_init()
45 (certtool --help) >/dev/null 2>&1 || \
46 _notrun "certtool utility not found, skipping test"
48 mkdir -p "${tls_dir}"
50 # use a fixed key so we don't waste system entropy on
51 # each test run
52 cat > "${tls_dir}/key.pem" <<EOF
53 -----BEGIN RSA PRIVATE KEY-----
54 MIIG5AIBAAKCAYEAyjWyLSNm5PZvYUKUcDWGqbLX10b2ood+YaFjWSnJrqx/q3qh
55 rVGBJglD25AJENJsmZF3zPP1oMhfIxsXu63Hdkb6Rdlc2RUoUP34x9VC1izH25mR
56 6c8DPDp1d6IraZ/llDMI1HsBFz0qGWtvOHgm815XG4PAr/N8rDsuqfv/cJ01KlnO
57 0OdO5QRXCJf9g/dYd41MPu7wOXk9FqjQlmRoP59HgtJ+zUpE4z+Keruw9cMT9VJj
58 0oT+pQ9ysenqeZ3gbT224T1khrEhT5kifhtFLNyDssRchUUWH0hiqoOO1vgb+850
59 W6/1VdxvuPam48py4diSPi1Vip8NITCOBaX9FIpVp4Ruw4rTPVMNMjq9Cpx/DwMP
60 9MbfXfnaVaZaMrmq67/zPhl0eVbUrecH2hQ3ZB9oIF4GkNskzlWF5+yPy6zqk304
61 AKaiFR6jRyh3YfHo2XFqV8x/hxdsIEXOtEUGhSIcpynsW+ckUCartzu7xbhXjd4b
62 kxJT89+riPFYij09AgMBAAECggGBAKyFkaZXXROeejrmHlV6JZGlp+fhgM38gkRz
63 +Jp7P7rLLAY3E7gXIPQ91WqAAmwazFNdvHPd9USfkCQYmnAi/VoZhrCPmlsQZRxt
64 A5QjjOnEvSPMa6SrXZxGWDCg6R8uMCb4P+FhrPWR1thnRDZOtRTQ+crc50p3mHgt
65 6ktXWIJRbqnag8zSfQqCYGtRmhe8sfsWT+Yl4El4+jjaAVU/B364u7+PLmaiphGp
66 BdJfTsTwEpgtGkPj+osDmhzXcZkfq3V+fz5JLkemsCiQKmn4VJRpg8c3ZmE8NPNt
67 gRtGWZ4W3WKDvhotT65WpQx4+6R8Duux/blNPBmH1Upmwd7kj7GYFBArbCjgd9PT
68 xgfCSUZpgOZHHkcgSB+022a8XncXna7WYYij28SLtwImFyu0nNtqECFQHH5u+k6C
69 LRYBSN+3t3At8dQuk01NVrJBndmjmXRfxpqUtTdeaNgVpdUYRY98s30G68NYGSra
70 aEvhhRSghkcLNetkobpY9pUgeqW/tQKBwQDZHHK9nDMt/zk1TxtILeUSitPXcv1/
71 8ufXqO0miHdH23XuXhIEA6Ef26RRVGDGgpjkveDJK/1w5feJ4H/ni4Vclil/cm38
72 OwRqjjd7ElHJX6JQbsxEx/gNTk5/QW1iAL9TXUalgepsSXYT6AJ0/CJv0jmJSJ36
73 YoKMOM8uqzb2KhN6i+RlJRi5iY53kUhWTJq5ArWvNhUzQNSYODI4bNxlsKSBL2Ik
74 LZ5QKHuaEjQet0IlPlfIb4PzMm8CHa/urOcCgcEA7m3zW/lL5bIFoKPjWig5Lbn1
75 aHfrG2ngqzWtgWtfZqMH8OkZc1Mdhhmvd46titjiLjeI+UP/uHXR0068PnrNngzl
76 tTgwlakzu+bWzqhBm1F+3/341st/FEk07r0P/3/PhezVjwfO8c8Exj7pLxH4wrH0
77 ROHgDbClmlJRu6OO78wk1+Vapf5DWa8YfA+q+fdvr7KvgGyytheKMT/b/dsqOq7y
78 qZPjmaJKWAvV3RWG8lWHFSdHx2IAHMHfGr17Y/w7AoHBALzwZeYebeekiVucGSjq
79 T8SgLhT7zCIx+JMUPjVfYzaUhP/Iu7Lkma6IzWm9nW6Drpy5pUpMzwUWDCLfzU9q
80 eseFIl337kEn9wLn+t5OpgAyCqYmlftxbqvdrrBN9uvnrJjWvqk/8wsDrw9JxAGc
81 fjeD4nBXUqvYWLXApoR9mZoGKedmoH9pFig4zlO9ig8YITnKYuQ0k6SD0b8agJHc
82 Ir0YSUDnRGgpjvFBGbeOCe+FGbohk/EpItJc3IAh5740lwKBwAdXd2DjokSmYKn7
83 oeqKxofz6+yVlLW5YuOiuX78sWlVp87xPolgi84vSEnkKM/Xsc8+goc6YstpRVa+
84 W+mImoA9YW1dF5HkLeWhTAf9AlgoAEIhbeIfTgBv6KNZSv7RDrDPBBxtXx/vAfSg
85 x0ldwk0scZsVYXLKd67yzfV7KdGUdaX4N/xYgfZm/9gCG3+q8NN2KxVHQ5F71BOE
86 JeABOaGo9WvnU+DNMIDZjHJMUWVw4MHz/a/UArDf/2CxaPVBNQKBwASg6j4ohSTk
87 J7aE6RQ3OBmmDDpixcoCJt9u9SjHVYMlbs5CEJGVSczk0SG3y8P1lOWNDSRnMksZ
88 xWnHdP/ogcuYMuvK7UACNAF0zNddtzOhzcpNmejFj+WCHYY/UmPr2/Kf6t7Cxk2K
89 3cZ4tqWsiTmBT8Bknmah7L5DrhS+ZBJliDeFAA8fZHdMH0Xjr4UBp9kF90EMTdW1
90 Xr5uz7ZrMsYpYQI7mmyqV9SSjUg4iBXwVSoag1iDJ1K8Qg/L7Semgg==
91 -----END RSA PRIVATE KEY-----
92 EOF
96 tls_x509_create_root_ca()
98 name=${1:-ca-cert}
100 cat > "${tls_dir}/ca.info" <<EOF
101 cn = Cthulhu Dark Lord Enterprises $name
103 cert_signing_key
106 tls_certtool \
107 --generate-self-signed \
108 --load-privkey "${tls_dir}/key.pem" \
109 --template "${tls_dir}/ca.info" \
110 --outfile "${tls_dir}/$name-cert.pem"
112 rm -f "${tls_dir}/ca.info"
116 tls_x509_create_server()
118 caname=$1
119 name=$2
121 mkdir -p "${tls_dir}/$name"
122 cat > "${tls_dir}/cert.info" <<EOF
123 organization = Cthulhu Dark Lord Enterprises $name
124 cn = localhost
125 dns_name = localhost
126 dns_name = localhost.localdomain
127 ip_address = 127.0.0.1
128 ip_address = ::1
129 tls_www_server
130 encryption_key
131 signing_key
134 tls_certtool \
135 --generate-certificate \
136 --load-ca-privkey "${tls_dir}/key.pem" \
137 --load-ca-certificate "${tls_dir}/$caname-cert.pem" \
138 --load-privkey "${tls_dir}/key.pem" \
139 --template "${tls_dir}/cert.info" \
140 --outfile "${tls_dir}/$name/server-cert.pem"
142 ln -s "${tls_dir}/$caname-cert.pem" "${tls_dir}/$name/ca-cert.pem"
143 ln -s "${tls_dir}/key.pem" "${tls_dir}/$name/server-key.pem"
145 rm -f "${tls_dir}/cert.info"
149 tls_x509_create_client()
151 caname=$1
152 name=$2
154 mkdir -p "${tls_dir}/$name"
155 cat > "${tls_dir}/cert.info" <<EOF
156 country = South Pacific
157 locality = R'lyeh
158 organization = Cthulhu Dark Lord Enterprises $name
159 cn = localhost
160 tls_www_client
161 encryption_key
162 signing_key
165 tls_certtool \
166 --generate-certificate \
167 --load-ca-privkey "${tls_dir}/key.pem" \
168 --load-ca-certificate "${tls_dir}/$caname-cert.pem" \
169 --load-privkey "${tls_dir}/key.pem" \
170 --template "${tls_dir}/cert.info" \
171 --outfile "${tls_dir}/$name/client-cert.pem"
173 ln -s "${tls_dir}/$caname-cert.pem" "${tls_dir}/$name/ca-cert.pem"
174 ln -s "${tls_dir}/key.pem" "${tls_dir}/$name/client-key.pem"
176 rm -f "${tls_dir}/cert.info"