123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365 |
- #! /usr/bin/env perl
- # Copyright 2008-2016 The OpenSSL Project Authors. All Rights Reserved.
- #
- # Licensed under the Apache License 2.0 (the "License"). You may not use
- # this file except in compliance with the License. You can obtain a copy
- # in the file LICENSE in the source distribution or at
- # https://www.openssl.org/source/license.html
- # Perl script to run tests against S/MIME examples in RFC4134
- # Assumes RFC is in current directory and called "rfc4134.txt"
- use MIME::Base64;
- my $badttest = 0;
- my $verbose = 1;
- my $cmscmd;
- my $exdir = "./";
- my $exfile = "./rfc4134.txt";
- if (-f "../apps/openssl")
- {
- $cmscmd = "../util/shlib_wrap.sh ../apps/openssl cms";
- }
- elsif (-f "..\\out32dll\\openssl.exe")
- {
- $cmscmd = "..\\out32dll\\openssl.exe cms";
- }
- elsif (-f "..\\out32\\openssl.exe")
- {
- $cmscmd = "..\\out32\\openssl.exe cms";
- }
- my @test_list = (
- [ "3.1.bin" => "dataout" ],
- [ "3.2.bin" => "encode, dataout" ],
- [ "4.1.bin" => "encode, verifyder, cont, dss" ],
- [ "4.2.bin" => "encode, verifyder, cont, rsa" ],
- [ "4.3.bin" => "encode, verifyder, cont_extern, dss" ],
- [ "4.4.bin" => "encode, verifyder, cont, dss" ],
- [ "4.5.bin" => "verifyder, cont, rsa" ],
- [ "4.6.bin" => "encode, verifyder, cont, dss" ],
- [ "4.7.bin" => "encode, verifyder, cont, dss" ],
- [ "4.8.eml" => "verifymime, dss" ],
- [ "4.9.eml" => "verifymime, dss" ],
- [ "4.10.bin" => "encode, verifyder, cont, dss" ],
- [ "4.11.bin" => "encode, certsout" ],
- [ "5.1.bin" => "encode, envelopeder, cont" ],
- [ "5.2.bin" => "encode, envelopeder, cont" ],
- [ "5.3.eml" => "envelopemime, cont" ],
- [ "6.0.bin" => "encode, digest, cont" ],
- [ "7.1.bin" => "encode, encrypted, cont" ],
- [ "7.2.bin" => "encode, encrypted, cont" ]
- );
- # Extract examples from RFC4134 text.
- # Base64 decode all examples, certificates and
- # private keys are converted to PEM format.
- my ( $filename, $data );
- my @cleanup = ( "cms.out", "cms.err", "tmp.der", "tmp.txt" );
- $data = "";
- open( IN, $exfile ) || die "Can't Open RFC examples file $exfile";
- while (<IN>) {
- next unless (/^\|/);
- s/^\|//;
- next if (/^\*/);
- if (/^>(.*)$/) {
- $filename = $1;
- next;
- }
- if (/^</) {
- $filename = "$exdir/$filename";
- if ( $filename =~ /\.bin$/ || $filename =~ /\.eml$/ ) {
- $data = decode_base64($data);
- open OUT, ">$filename";
- binmode OUT;
- print OUT $data;
- close OUT;
- push @cleanup, $filename;
- }
- elsif ( $filename =~ /\.cer$/ ) {
- write_pem( $filename, "CERTIFICATE", $data );
- }
- elsif ( $filename =~ /\.pri$/ ) {
- write_pem( $filename, "PRIVATE KEY", $data );
- }
- $data = "";
- $filename = "";
- }
- else {
- $data .= $_;
- }
- }
- my $secretkey =
- "73:7c:79:1f:25:ea:d0:e0:46:29:25:43:52:f7:dc:62:91:e5:cb:26:91:7a:da:32";
- foreach (@test_list) {
- my ( $file, $tlist ) = @$_;
- print "Example file $file:\n";
- if ( $tlist =~ /encode/ ) {
- run_reencode_test( $exdir, $file );
- }
- if ( $tlist =~ /certsout/ ) {
- run_certsout_test( $exdir, $file );
- }
- if ( $tlist =~ /dataout/ ) {
- run_dataout_test( $exdir, $file );
- }
- if ( $tlist =~ /verify/ ) {
- run_verify_test( $exdir, $tlist, $file );
- }
- if ( $tlist =~ /digest/ ) {
- run_digest_test( $exdir, $tlist, $file );
- }
- if ( $tlist =~ /encrypted/ ) {
- run_encrypted_test( $exdir, $tlist, $file, $secretkey );
- }
- if ( $tlist =~ /envelope/ ) {
- run_envelope_test( $exdir, $tlist, $file );
- }
- }
- foreach (@cleanup) {
- unlink $_;
- }
- if ($badtest) {
- print "\n$badtest TESTS FAILED!!\n";
- }
- else {
- print "\n***All tests successful***\n";
- }
- sub write_pem {
- my ( $filename, $str, $data ) = @_;
- $filename =~ s/\.[^.]*$/.pem/;
- push @cleanup, $filename;
- open OUT, ">$filename";
- print OUT "-----BEGIN $str-----\n";
- print OUT $data;
- print OUT "-----END $str-----\n";
- close OUT;
- }
- sub run_reencode_test {
- my ( $cmsdir, $tfile ) = @_;
- unlink "tmp.der";
- system( "$cmscmd -cmsout -inform DER -outform DER"
- . " -in $cmsdir/$tfile -out tmp.der" );
- if ($?) {
- print "\tReencode command FAILED!!\n";
- $badtest++;
- }
- elsif ( !cmp_files( "$cmsdir/$tfile", "tmp.der" ) ) {
- print "\tReencode FAILED!!\n";
- $badtest++;
- }
- else {
- print "\tReencode passed\n" if $verbose;
- }
- }
- sub run_certsout_test {
- my ( $cmsdir, $tfile ) = @_;
- unlink "tmp.der";
- unlink "tmp.pem";
- system( "$cmscmd -cmsout -inform DER -certsout tmp.pem"
- . " -in $cmsdir/$tfile -out tmp.der" );
- if ($?) {
- print "\tCertificate output command FAILED!!\n";
- $badtest++;
- }
- else {
- print "\tCertificate output passed\n" if $verbose;
- }
- }
- sub run_dataout_test {
- my ( $cmsdir, $tfile ) = @_;
- unlink "tmp.txt";
- system(
- "$cmscmd -data_out -inform DER" . " -in $cmsdir/$tfile -out tmp.txt" );
- if ($?) {
- print "\tDataout command FAILED!!\n";
- $badtest++;
- }
- elsif ( !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) ) {
- print "\tDataout compare FAILED!!\n";
- $badtest++;
- }
- else {
- print "\tDataout passed\n" if $verbose;
- }
- }
- sub run_verify_test {
- my ( $cmsdir, $tlist, $tfile ) = @_;
- unlink "tmp.txt";
- $form = "DER" if $tlist =~ /verifyder/;
- $form = "SMIME" if $tlist =~ /verifymime/;
- $cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/;
- $cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/;
- $cmd =
- "$cmscmd -verify -inform $form"
- . " -CAfile $cafile"
- . " -in $cmsdir/$tfile -out tmp.txt";
- $cmd .= " -content $cmsdir/ExContent.bin" if $tlist =~ /cont_extern/;
- system("$cmd 2>cms.err 1>cms.out");
- if ($?) {
- print "\tVerify command FAILED!!\n";
- $badtest++;
- }
- elsif ( $tlist =~ /cont/
- && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
- {
- print "\tVerify content compare FAILED!!\n";
- $badtest++;
- }
- else {
- print "\tVerify passed\n" if $verbose;
- }
- }
- sub run_envelope_test {
- my ( $cmsdir, $tlist, $tfile ) = @_;
- unlink "tmp.txt";
- $form = "DER" if $tlist =~ /envelopeder/;
- $form = "SMIME" if $tlist =~ /envelopemime/;
- $cmd =
- "$cmscmd -decrypt -inform $form"
- . " -recip $cmsdir/BobRSASignByCarl.pem"
- . " -inkey $cmsdir/BobPrivRSAEncrypt.pem"
- . " -in $cmsdir/$tfile -out tmp.txt";
- system("$cmd 2>cms.err 1>cms.out");
- if ($?) {
- print "\tDecrypt command FAILED!!\n";
- $badtest++;
- }
- elsif ( $tlist =~ /cont/
- && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
- {
- print "\tDecrypt content compare FAILED!!\n";
- $badtest++;
- }
- else {
- print "\tDecrypt passed\n" if $verbose;
- }
- }
- sub run_digest_test {
- my ( $cmsdir, $tlist, $tfile ) = @_;
- unlink "tmp.txt";
- my $cmd =
- "$cmscmd -digest_verify -inform DER" . " -in $cmsdir/$tfile -out tmp.txt";
- system("$cmd 2>cms.err 1>cms.out");
- if ($?) {
- print "\tDigest verify command FAILED!!\n";
- $badtest++;
- }
- elsif ( $tlist =~ /cont/
- && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
- {
- print "\tDigest verify content compare FAILED!!\n";
- $badtest++;
- }
- else {
- print "\tDigest verify passed\n" if $verbose;
- }
- }
- sub run_encrypted_test {
- my ( $cmsdir, $tlist, $tfile, $key ) = @_;
- unlink "tmp.txt";
- system( "$cmscmd -EncryptedData_decrypt -inform DER"
- . " -secretkey $key"
- . " -in $cmsdir/$tfile -out tmp.txt" );
- if ($?) {
- print "\tEncrypted Data command FAILED!!\n";
- $badtest++;
- }
- elsif ( $tlist =~ /cont/
- && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
- {
- print "\tEncrypted Data content compare FAILED!!\n";
- $badtest++;
- }
- else {
- print "\tEncryptedData verify passed\n" if $verbose;
- }
- }
- sub cmp_files {
- my ( $f1, $f2 ) = @_;
- my ( $fp1, $fp2 );
- my ( $rd1, $rd2 );
- if ( !open( $fp1, "<$f1" ) ) {
- print STDERR "Can't Open file $f1\n";
- return 0;
- }
- if ( !open( $fp2, "<$f2" ) ) {
- print STDERR "Can't Open file $f2\n";
- return 0;
- }
- binmode $fp1;
- binmode $fp2;
- my $ret = 0;
- for ( ; ; ) {
- $n1 = sysread $fp1, $rd1, 4096;
- $n2 = sysread $fp2, $rd2, 4096;
- last if ( $n1 != $n2 );
- last if ( $rd1 ne $rd2 );
- if ( $n1 == 0 ) {
- $ret = 1;
- last;
- }
- }
- close $fp1;
- close $fp2;
- return $ret;
- }
|