VirtualBox

source: vbox/trunk/src/libs/openssl-3.1.5/test/cms-examples.pl@ 105770

Last change on this file since 105770 was 104078, checked in by vboxsync, 8 months ago

openssl-3.1.5: Applied and adjusted our OpenSSL changes to 3.1.4. bugref:10638

File size: 8.7 KB
Line 
1#! /usr/bin/env perl
2# Copyright 2008-2016 The OpenSSL Project Authors. All Rights Reserved.
3#
4# Licensed under the Apache License 2.0 (the "License"). You may not use
5# this file except in compliance with the License. You can obtain a copy
6# in the file LICENSE in the source distribution or at
7# https://www.openssl.org/source/license.html
8
9# Perl script to run tests against S/MIME examples in RFC4134
10# Assumes RFC is in current directory and called "rfc4134.txt"
11
12use MIME::Base64;
13
14my $badttest = 0;
15my $verbose = 1;
16
17my $cmscmd;
18my $exdir = "./";
19my $exfile = "./rfc4134.txt";
20
21if (-f "../apps/openssl")
22 {
23 $cmscmd = "../util/shlib_wrap.sh ../apps/openssl cms";
24 }
25elsif (-f "..\\out32dll\\openssl.exe")
26 {
27 $cmscmd = "..\\out32dll\\openssl.exe cms";
28 }
29elsif (-f "..\\out32\\openssl.exe")
30 {
31 $cmscmd = "..\\out32\\openssl.exe cms";
32 }
33
34my @test_list = (
35 [ "3.1.bin" => "dataout" ],
36 [ "3.2.bin" => "encode, dataout" ],
37 [ "4.1.bin" => "encode, verifyder, cont, dss" ],
38 [ "4.2.bin" => "encode, verifyder, cont, rsa" ],
39 [ "4.3.bin" => "encode, verifyder, cont_extern, dss" ],
40 [ "4.4.bin" => "encode, verifyder, cont, dss" ],
41 [ "4.5.bin" => "verifyder, cont, rsa" ],
42 [ "4.6.bin" => "encode, verifyder, cont, dss" ],
43 [ "4.7.bin" => "encode, verifyder, cont, dss" ],
44 [ "4.8.eml" => "verifymime, dss" ],
45 [ "4.9.eml" => "verifymime, dss" ],
46 [ "4.10.bin" => "encode, verifyder, cont, dss" ],
47 [ "4.11.bin" => "encode, certsout" ],
48 [ "5.1.bin" => "encode, envelopeder, cont" ],
49 [ "5.2.bin" => "encode, envelopeder, cont" ],
50 [ "5.3.eml" => "envelopemime, cont" ],
51 [ "6.0.bin" => "encode, digest, cont" ],
52 [ "7.1.bin" => "encode, encrypted, cont" ],
53 [ "7.2.bin" => "encode, encrypted, cont" ]
54);
55
56# Extract examples from RFC4134 text.
57# Base64 decode all examples, certificates and
58# private keys are converted to PEM format.
59
60my ( $filename, $data );
61
62my @cleanup = ( "cms.out", "cms.err", "tmp.der", "tmp.txt" );
63
64$data = "";
65
66open( IN, $exfile ) || die "Can't Open RFC examples file $exfile";
67
68while (<IN>) {
69 next unless (/^\|/);
70 s/^\|//;
71 next if (/^\*/);
72 if (/^>(.*)$/) {
73 $filename = $1;
74 next;
75 }
76 if (/^</) {
77 $filename = "$exdir/$filename";
78 if ( $filename =~ /\.bin$/ || $filename =~ /\.eml$/ ) {
79 $data = decode_base64($data);
80 open OUT, ">$filename";
81 binmode OUT;
82 print OUT $data;
83 close OUT;
84 push @cleanup, $filename;
85 }
86 elsif ( $filename =~ /\.cer$/ ) {
87 write_pem( $filename, "CERTIFICATE", $data );
88 }
89 elsif ( $filename =~ /\.pri$/ ) {
90 write_pem( $filename, "PRIVATE KEY", $data );
91 }
92 $data = "";
93 $filename = "";
94 }
95 else {
96 $data .= $_;
97 }
98
99}
100
101my $secretkey =
102 "73:7c:79:1f:25:ea:d0:e0:46:29:25:43:52:f7:dc:62:91:e5:cb:26:91:7a:da:32";
103
104foreach (@test_list) {
105 my ( $file, $tlist ) = @$_;
106 print "Example file $file:\n";
107 if ( $tlist =~ /encode/ ) {
108 run_reencode_test( $exdir, $file );
109 }
110 if ( $tlist =~ /certsout/ ) {
111 run_certsout_test( $exdir, $file );
112 }
113 if ( $tlist =~ /dataout/ ) {
114 run_dataout_test( $exdir, $file );
115 }
116 if ( $tlist =~ /verify/ ) {
117 run_verify_test( $exdir, $tlist, $file );
118 }
119 if ( $tlist =~ /digest/ ) {
120 run_digest_test( $exdir, $tlist, $file );
121 }
122 if ( $tlist =~ /encrypted/ ) {
123 run_encrypted_test( $exdir, $tlist, $file, $secretkey );
124 }
125 if ( $tlist =~ /envelope/ ) {
126 run_envelope_test( $exdir, $tlist, $file );
127 }
128
129}
130
131foreach (@cleanup) {
132 unlink $_;
133}
134
135if ($badtest) {
136 print "\n$badtest TESTS FAILED!!\n";
137}
138else {
139 print "\n***All tests successful***\n";
140}
141
142sub write_pem {
143 my ( $filename, $str, $data ) = @_;
144
145 $filename =~ s/\.[^.]*$/.pem/;
146
147 push @cleanup, $filename;
148
149 open OUT, ">$filename";
150
151 print OUT "-----BEGIN $str-----\n";
152 print OUT $data;
153 print OUT "-----END $str-----\n";
154
155 close OUT;
156}
157
158sub run_reencode_test {
159 my ( $cmsdir, $tfile ) = @_;
160 unlink "tmp.der";
161
162 system( "$cmscmd -cmsout -inform DER -outform DER"
163 . " -in $cmsdir/$tfile -out tmp.der" );
164
165 if ($?) {
166 print "\tReencode command FAILED!!\n";
167 $badtest++;
168 }
169 elsif ( !cmp_files( "$cmsdir/$tfile", "tmp.der" ) ) {
170 print "\tReencode FAILED!!\n";
171 $badtest++;
172 }
173 else {
174 print "\tReencode passed\n" if $verbose;
175 }
176}
177
178sub run_certsout_test {
179 my ( $cmsdir, $tfile ) = @_;
180 unlink "tmp.der";
181 unlink "tmp.pem";
182
183 system( "$cmscmd -cmsout -inform DER -certsout tmp.pem"
184 . " -in $cmsdir/$tfile -out tmp.der" );
185
186 if ($?) {
187 print "\tCertificate output command FAILED!!\n";
188 $badtest++;
189 }
190 else {
191 print "\tCertificate output passed\n" if $verbose;
192 }
193}
194
195sub run_dataout_test {
196 my ( $cmsdir, $tfile ) = @_;
197 unlink "tmp.txt";
198
199 system(
200 "$cmscmd -data_out -inform DER" . " -in $cmsdir/$tfile -out tmp.txt" );
201
202 if ($?) {
203 print "\tDataout command FAILED!!\n";
204 $badtest++;
205 }
206 elsif ( !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) ) {
207 print "\tDataout compare FAILED!!\n";
208 $badtest++;
209 }
210 else {
211 print "\tDataout passed\n" if $verbose;
212 }
213}
214
215sub run_verify_test {
216 my ( $cmsdir, $tlist, $tfile ) = @_;
217 unlink "tmp.txt";
218
219 $form = "DER" if $tlist =~ /verifyder/;
220 $form = "SMIME" if $tlist =~ /verifymime/;
221 $cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/;
222 $cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/;
223
224 $cmd =
225 "$cmscmd -verify -inform $form"
226 . " -CAfile $cafile"
227 . " -in $cmsdir/$tfile -out tmp.txt";
228
229 $cmd .= " -content $cmsdir/ExContent.bin" if $tlist =~ /cont_extern/;
230
231 system("$cmd 2>cms.err 1>cms.out");
232
233 if ($?) {
234 print "\tVerify command FAILED!!\n";
235 $badtest++;
236 }
237 elsif ( $tlist =~ /cont/
238 && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
239 {
240 print "\tVerify content compare FAILED!!\n";
241 $badtest++;
242 }
243 else {
244 print "\tVerify passed\n" if $verbose;
245 }
246}
247
248sub run_envelope_test {
249 my ( $cmsdir, $tlist, $tfile ) = @_;
250 unlink "tmp.txt";
251
252 $form = "DER" if $tlist =~ /envelopeder/;
253 $form = "SMIME" if $tlist =~ /envelopemime/;
254
255 $cmd =
256 "$cmscmd -decrypt -inform $form"
257 . " -recip $cmsdir/BobRSASignByCarl.pem"
258 . " -inkey $cmsdir/BobPrivRSAEncrypt.pem"
259 . " -in $cmsdir/$tfile -out tmp.txt";
260
261 system("$cmd 2>cms.err 1>cms.out");
262
263 if ($?) {
264 print "\tDecrypt command FAILED!!\n";
265 $badtest++;
266 }
267 elsif ( $tlist =~ /cont/
268 && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
269 {
270 print "\tDecrypt content compare FAILED!!\n";
271 $badtest++;
272 }
273 else {
274 print "\tDecrypt passed\n" if $verbose;
275 }
276}
277
278sub run_digest_test {
279 my ( $cmsdir, $tlist, $tfile ) = @_;
280 unlink "tmp.txt";
281
282 my $cmd =
283 "$cmscmd -digest_verify -inform DER" . " -in $cmsdir/$tfile -out tmp.txt";
284
285 system("$cmd 2>cms.err 1>cms.out");
286
287 if ($?) {
288 print "\tDigest verify command FAILED!!\n";
289 $badtest++;
290 }
291 elsif ( $tlist =~ /cont/
292 && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
293 {
294 print "\tDigest verify content compare FAILED!!\n";
295 $badtest++;
296 }
297 else {
298 print "\tDigest verify passed\n" if $verbose;
299 }
300}
301
302sub run_encrypted_test {
303 my ( $cmsdir, $tlist, $tfile, $key ) = @_;
304 unlink "tmp.txt";
305
306 system( "$cmscmd -EncryptedData_decrypt -inform DER"
307 . " -secretkey $key"
308 . " -in $cmsdir/$tfile -out tmp.txt" );
309
310 if ($?) {
311 print "\tEncrypted Data command FAILED!!\n";
312 $badtest++;
313 }
314 elsif ( $tlist =~ /cont/
315 && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
316 {
317 print "\tEncrypted Data content compare FAILED!!\n";
318 $badtest++;
319 }
320 else {
321 print "\tEncryptedData verify passed\n" if $verbose;
322 }
323}
324
325sub cmp_files {
326 my ( $f1, $f2 ) = @_;
327 my ( $fp1, $fp2 );
328
329 my ( $rd1, $rd2 );
330
331 if ( !open( $fp1, "<$f1" ) ) {
332 print STDERR "Can't Open file $f1\n";
333 return 0;
334 }
335
336 if ( !open( $fp2, "<$f2" ) ) {
337 print STDERR "Can't Open file $f2\n";
338 return 0;
339 }
340
341 binmode $fp1;
342 binmode $fp2;
343
344 my $ret = 0;
345
346 for ( ; ; ) {
347 $n1 = sysread $fp1, $rd1, 4096;
348 $n2 = sysread $fp2, $rd2, 4096;
349 last if ( $n1 != $n2 );
350 last if ( $rd1 ne $rd2 );
351
352 if ( $n1 == 0 ) {
353 $ret = 1;
354 last;
355 }
356
357 }
358
359 close $fp1;
360 close $fp2;
361
362 return $ret;
363
364}
365
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette