366 lines
8.7 KiB
Perl
366 lines
8.7 KiB
Perl
#! /usr/bin/env perl
|
|
# Copyright 2008-2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
#
|
|
# Licensed under the OpenSSL license (the "License"). You may not use
|
|
# this file except in compliance with the License. You can obtain a copy
|
|
# in the file LICENSE in the source distribution or at
|
|
# https://www.openssl.org/source/license.html
|
|
|
|
# Perl script to run tests against S/MIME examples in RFC4134
|
|
# Assumes RFC is in current directory and called "rfc4134.txt"
|
|
|
|
use MIME::Base64;
|
|
|
|
my $badttest = 0;
|
|
my $verbose = 1;
|
|
|
|
my $cmscmd;
|
|
my $exdir = "./";
|
|
my $exfile = "./rfc4134.txt";
|
|
|
|
if (-f "../apps/openssl")
|
|
{
|
|
$cmscmd = "../util/shlib_wrap.sh ../apps/openssl cms";
|
|
}
|
|
elsif (-f "..\\out32dll\\openssl.exe")
|
|
{
|
|
$cmscmd = "..\\out32dll\\openssl.exe cms";
|
|
}
|
|
elsif (-f "..\\out32\\openssl.exe")
|
|
{
|
|
$cmscmd = "..\\out32\\openssl.exe cms";
|
|
}
|
|
|
|
my @test_list = (
|
|
[ "3.1.bin" => "dataout" ],
|
|
[ "3.2.bin" => "encode, dataout" ],
|
|
[ "4.1.bin" => "encode, verifyder, cont, dss" ],
|
|
[ "4.2.bin" => "encode, verifyder, cont, rsa" ],
|
|
[ "4.3.bin" => "encode, verifyder, cont_extern, dss" ],
|
|
[ "4.4.bin" => "encode, verifyder, cont, dss" ],
|
|
[ "4.5.bin" => "verifyder, cont, rsa" ],
|
|
[ "4.6.bin" => "encode, verifyder, cont, dss" ],
|
|
[ "4.7.bin" => "encode, verifyder, cont, dss" ],
|
|
[ "4.8.eml" => "verifymime, dss" ],
|
|
[ "4.9.eml" => "verifymime, dss" ],
|
|
[ "4.10.bin" => "encode, verifyder, cont, dss" ],
|
|
[ "4.11.bin" => "encode, certsout" ],
|
|
[ "5.1.bin" => "encode, envelopeder, cont" ],
|
|
[ "5.2.bin" => "encode, envelopeder, cont" ],
|
|
[ "5.3.eml" => "envelopemime, cont" ],
|
|
[ "6.0.bin" => "encode, digest, cont" ],
|
|
[ "7.1.bin" => "encode, encrypted, cont" ],
|
|
[ "7.2.bin" => "encode, encrypted, cont" ]
|
|
);
|
|
|
|
# Extract examples from RFC4134 text.
|
|
# Base64 decode all examples, certificates and
|
|
# private keys are converted to PEM format.
|
|
|
|
my ( $filename, $data );
|
|
|
|
my @cleanup = ( "cms.out", "cms.err", "tmp.der", "tmp.txt" );
|
|
|
|
$data = "";
|
|
|
|
open( IN, $exfile ) || die "Can't Open RFC examples file $exfile";
|
|
|
|
while (<IN>) {
|
|
next unless (/^\|/);
|
|
s/^\|//;
|
|
next if (/^\*/);
|
|
if (/^>(.*)$/) {
|
|
$filename = $1;
|
|
next;
|
|
}
|
|
if (/^</) {
|
|
$filename = "$exdir/$filename";
|
|
if ( $filename =~ /\.bin$/ || $filename =~ /\.eml$/ ) {
|
|
$data = decode_base64($data);
|
|
open OUT, ">$filename";
|
|
binmode OUT;
|
|
print OUT $data;
|
|
close OUT;
|
|
push @cleanup, $filename;
|
|
}
|
|
elsif ( $filename =~ /\.cer$/ ) {
|
|
write_pem( $filename, "CERTIFICATE", $data );
|
|
}
|
|
elsif ( $filename =~ /\.pri$/ ) {
|
|
write_pem( $filename, "PRIVATE KEY", $data );
|
|
}
|
|
$data = "";
|
|
$filename = "";
|
|
}
|
|
else {
|
|
$data .= $_;
|
|
}
|
|
|
|
}
|
|
|
|
my $secretkey =
|
|
"73:7c:79:1f:25:ea:d0:e0:46:29:25:43:52:f7:dc:62:91:e5:cb:26:91:7a:da:32";
|
|
|
|
foreach (@test_list) {
|
|
my ( $file, $tlist ) = @$_;
|
|
print "Example file $file:\n";
|
|
if ( $tlist =~ /encode/ ) {
|
|
run_reencode_test( $exdir, $file );
|
|
}
|
|
if ( $tlist =~ /certsout/ ) {
|
|
run_certsout_test( $exdir, $file );
|
|
}
|
|
if ( $tlist =~ /dataout/ ) {
|
|
run_dataout_test( $exdir, $file );
|
|
}
|
|
if ( $tlist =~ /verify/ ) {
|
|
run_verify_test( $exdir, $tlist, $file );
|
|
}
|
|
if ( $tlist =~ /digest/ ) {
|
|
run_digest_test( $exdir, $tlist, $file );
|
|
}
|
|
if ( $tlist =~ /encrypted/ ) {
|
|
run_encrypted_test( $exdir, $tlist, $file, $secretkey );
|
|
}
|
|
if ( $tlist =~ /envelope/ ) {
|
|
run_envelope_test( $exdir, $tlist, $file );
|
|
}
|
|
|
|
}
|
|
|
|
foreach (@cleanup) {
|
|
unlink $_;
|
|
}
|
|
|
|
if ($badtest) {
|
|
print "\n$badtest TESTS FAILED!!\n";
|
|
}
|
|
else {
|
|
print "\n***All tests successful***\n";
|
|
}
|
|
|
|
sub write_pem {
|
|
my ( $filename, $str, $data ) = @_;
|
|
|
|
$filename =~ s/\.[^.]*$/.pem/;
|
|
|
|
push @cleanup, $filename;
|
|
|
|
open OUT, ">$filename";
|
|
|
|
print OUT "-----BEGIN $str-----\n";
|
|
print OUT $data;
|
|
print OUT "-----END $str-----\n";
|
|
|
|
close OUT;
|
|
}
|
|
|
|
sub run_reencode_test {
|
|
my ( $cmsdir, $tfile ) = @_;
|
|
unlink "tmp.der";
|
|
|
|
system( "$cmscmd -cmsout -inform DER -outform DER"
|
|
. " -in $cmsdir/$tfile -out tmp.der" );
|
|
|
|
if ($?) {
|
|
print "\tReencode command FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
elsif ( !cmp_files( "$cmsdir/$tfile", "tmp.der" ) ) {
|
|
print "\tReencode FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
else {
|
|
print "\tReencode passed\n" if $verbose;
|
|
}
|
|
}
|
|
|
|
sub run_certsout_test {
|
|
my ( $cmsdir, $tfile ) = @_;
|
|
unlink "tmp.der";
|
|
unlink "tmp.pem";
|
|
|
|
system( "$cmscmd -cmsout -inform DER -certsout tmp.pem"
|
|
. " -in $cmsdir/$tfile -out tmp.der" );
|
|
|
|
if ($?) {
|
|
print "\tCertificate output command FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
else {
|
|
print "\tCertificate output passed\n" if $verbose;
|
|
}
|
|
}
|
|
|
|
sub run_dataout_test {
|
|
my ( $cmsdir, $tfile ) = @_;
|
|
unlink "tmp.txt";
|
|
|
|
system(
|
|
"$cmscmd -data_out -inform DER" . " -in $cmsdir/$tfile -out tmp.txt" );
|
|
|
|
if ($?) {
|
|
print "\tDataout command FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
elsif ( !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) ) {
|
|
print "\tDataout compare FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
else {
|
|
print "\tDataout passed\n" if $verbose;
|
|
}
|
|
}
|
|
|
|
sub run_verify_test {
|
|
my ( $cmsdir, $tlist, $tfile ) = @_;
|
|
unlink "tmp.txt";
|
|
|
|
$form = "DER" if $tlist =~ /verifyder/;
|
|
$form = "SMIME" if $tlist =~ /verifymime/;
|
|
$cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/;
|
|
$cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/;
|
|
|
|
$cmd =
|
|
"$cmscmd -verify -inform $form"
|
|
. " -CAfile $cafile"
|
|
. " -in $cmsdir/$tfile -out tmp.txt";
|
|
|
|
$cmd .= " -content $cmsdir/ExContent.bin" if $tlist =~ /cont_extern/;
|
|
|
|
system("$cmd 2>cms.err 1>cms.out");
|
|
|
|
if ($?) {
|
|
print "\tVerify command FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
elsif ( $tlist =~ /cont/
|
|
&& !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
|
|
{
|
|
print "\tVerify content compare FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
else {
|
|
print "\tVerify passed\n" if $verbose;
|
|
}
|
|
}
|
|
|
|
sub run_envelope_test {
|
|
my ( $cmsdir, $tlist, $tfile ) = @_;
|
|
unlink "tmp.txt";
|
|
|
|
$form = "DER" if $tlist =~ /envelopeder/;
|
|
$form = "SMIME" if $tlist =~ /envelopemime/;
|
|
|
|
$cmd =
|
|
"$cmscmd -decrypt -inform $form"
|
|
. " -recip $cmsdir/BobRSASignByCarl.pem"
|
|
. " -inkey $cmsdir/BobPrivRSAEncrypt.pem"
|
|
. " -in $cmsdir/$tfile -out tmp.txt";
|
|
|
|
system("$cmd 2>cms.err 1>cms.out");
|
|
|
|
if ($?) {
|
|
print "\tDecrypt command FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
elsif ( $tlist =~ /cont/
|
|
&& !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
|
|
{
|
|
print "\tDecrypt content compare FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
else {
|
|
print "\tDecrypt passed\n" if $verbose;
|
|
}
|
|
}
|
|
|
|
sub run_digest_test {
|
|
my ( $cmsdir, $tlist, $tfile ) = @_;
|
|
unlink "tmp.txt";
|
|
|
|
my $cmd =
|
|
"$cmscmd -digest_verify -inform DER" . " -in $cmsdir/$tfile -out tmp.txt";
|
|
|
|
system("$cmd 2>cms.err 1>cms.out");
|
|
|
|
if ($?) {
|
|
print "\tDigest verify command FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
elsif ( $tlist =~ /cont/
|
|
&& !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
|
|
{
|
|
print "\tDigest verify content compare FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
else {
|
|
print "\tDigest verify passed\n" if $verbose;
|
|
}
|
|
}
|
|
|
|
sub run_encrypted_test {
|
|
my ( $cmsdir, $tlist, $tfile, $key ) = @_;
|
|
unlink "tmp.txt";
|
|
|
|
system( "$cmscmd -EncryptedData_decrypt -inform DER"
|
|
. " -secretkey $key"
|
|
. " -in $cmsdir/$tfile -out tmp.txt" );
|
|
|
|
if ($?) {
|
|
print "\tEncrypted Data command FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
elsif ( $tlist =~ /cont/
|
|
&& !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
|
|
{
|
|
print "\tEncrypted Data content compare FAILED!!\n";
|
|
$badtest++;
|
|
}
|
|
else {
|
|
print "\tEncryptedData verify passed\n" if $verbose;
|
|
}
|
|
}
|
|
|
|
sub cmp_files {
|
|
my ( $f1, $f2 ) = @_;
|
|
my ( $fp1, $fp2 );
|
|
|
|
my ( $rd1, $rd2 );
|
|
|
|
if ( !open( $fp1, "<$f1" ) ) {
|
|
print STDERR "Can't Open file $f1\n";
|
|
return 0;
|
|
}
|
|
|
|
if ( !open( $fp2, "<$f2" ) ) {
|
|
print STDERR "Can't Open file $f2\n";
|
|
return 0;
|
|
}
|
|
|
|
binmode $fp1;
|
|
binmode $fp2;
|
|
|
|
my $ret = 0;
|
|
|
|
for ( ; ; ) {
|
|
$n1 = sysread $fp1, $rd1, 4096;
|
|
$n2 = sysread $fp2, $rd2, 4096;
|
|
last if ( $n1 != $n2 );
|
|
last if ( $rd1 ne $rd2 );
|
|
|
|
if ( $n1 == 0 ) {
|
|
$ret = 1;
|
|
last;
|
|
}
|
|
|
|
}
|
|
|
|
close $fp1;
|
|
close $fp2;
|
|
|
|
return $ret;
|
|
|
|
}
|
|
|