mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			366 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			Perl
		
	
	
	
			
		
		
	
	
			366 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			Perl
		
	
	
	
| #! /usr/bin/env perl
 | |
| # Copyright 2008-2016 The OpenSSL Project Authors. All Rights Reserved.
 | |
| #
 | |
| # Licensed under the OpenSSL license (the "License").  You may not use
 | |
| # this file except in compliance with the License.  You can obtain a copy
 | |
| # in the file LICENSE in the source distribution or at
 | |
| # https://www.openssl.org/source/license.html
 | |
| 
 | |
| # Perl script to run tests against S/MIME examples in RFC4134
 | |
| # Assumes RFC is in current directory and called "rfc4134.txt"
 | |
| 
 | |
| use MIME::Base64;
 | |
| 
 | |
| my $badttest = 0;
 | |
| my $verbose  = 1;
 | |
| 
 | |
| my $cmscmd;
 | |
| my $exdir  = "./";
 | |
| my $exfile = "./rfc4134.txt";
 | |
| 
 | |
| if (-f "../apps/openssl")
 | |
| 	{
 | |
| 	$cmscmd = "../util/shlib_wrap.sh ../apps/openssl cms";
 | |
| 	}
 | |
| elsif (-f "..\\out32dll\\openssl.exe")
 | |
| 	{
 | |
| 	$cmscmd = "..\\out32dll\\openssl.exe cms";
 | |
| 	}
 | |
| elsif (-f "..\\out32\\openssl.exe")
 | |
| 	{
 | |
| 	$cmscmd = "..\\out32\\openssl.exe cms";
 | |
| 	}
 | |
| 
 | |
| my @test_list = (
 | |
|     [ "3.1.bin"  => "dataout" ],
 | |
|     [ "3.2.bin"  => "encode, dataout" ],
 | |
|     [ "4.1.bin"  => "encode, verifyder, cont, dss" ],
 | |
|     [ "4.2.bin"  => "encode, verifyder, cont, rsa" ],
 | |
|     [ "4.3.bin"  => "encode, verifyder, cont_extern, dss" ],
 | |
|     [ "4.4.bin"  => "encode, verifyder, cont, dss" ],
 | |
|     [ "4.5.bin"  => "verifyder, cont, rsa" ],
 | |
|     [ "4.6.bin"  => "encode, verifyder, cont, dss" ],
 | |
|     [ "4.7.bin"  => "encode, verifyder, cont, dss" ],
 | |
|     [ "4.8.eml"  => "verifymime, dss" ],
 | |
|     [ "4.9.eml"  => "verifymime, dss" ],
 | |
|     [ "4.10.bin" => "encode, verifyder, cont, dss" ],
 | |
|     [ "4.11.bin" => "encode, certsout" ],
 | |
|     [ "5.1.bin"  => "encode, envelopeder, cont" ],
 | |
|     [ "5.2.bin"  => "encode, envelopeder, cont" ],
 | |
|     [ "5.3.eml"  => "envelopemime, cont" ],
 | |
|     [ "6.0.bin"  => "encode, digest, cont" ],
 | |
|     [ "7.1.bin"  => "encode, encrypted, cont" ],
 | |
|     [ "7.2.bin"  => "encode, encrypted, cont" ]
 | |
| );
 | |
| 
 | |
| # Extract examples from RFC4134 text.
 | |
| # Base64 decode all examples, certificates and
 | |
| # private keys are converted to PEM format.
 | |
| 
 | |
| my ( $filename, $data );
 | |
| 
 | |
| my @cleanup = ( "cms.out", "cms.err", "tmp.der", "tmp.txt" );
 | |
| 
 | |
| $data = "";
 | |
| 
 | |
| open( IN, $exfile ) || die "Can't Open RFC examples file $exfile";
 | |
| 
 | |
| while (<IN>) {
 | |
|     next unless (/^\|/);
 | |
|     s/^\|//;
 | |
|     next if (/^\*/);
 | |
|     if (/^>(.*)$/) {
 | |
|         $filename = $1;
 | |
|         next;
 | |
|     }
 | |
|     if (/^</) {
 | |
|         $filename = "$exdir/$filename";
 | |
|         if ( $filename =~ /\.bin$/ || $filename =~ /\.eml$/ ) {
 | |
|             $data = decode_base64($data);
 | |
|             open OUT, ">$filename";
 | |
|             binmode OUT;
 | |
|             print OUT $data;
 | |
|             close OUT;
 | |
|             push @cleanup, $filename;
 | |
|         }
 | |
|         elsif ( $filename =~ /\.cer$/ ) {
 | |
|             write_pem( $filename, "CERTIFICATE", $data );
 | |
|         }
 | |
|         elsif ( $filename =~ /\.pri$/ ) {
 | |
|             write_pem( $filename, "PRIVATE KEY", $data );
 | |
|         }
 | |
|         $data     = "";
 | |
|         $filename = "";
 | |
|     }
 | |
|     else {
 | |
|         $data .= $_;
 | |
|     }
 | |
| 
 | |
| }
 | |
| 
 | |
| my $secretkey =
 | |
|   "73:7c:79:1f:25:ea:d0:e0:46:29:25:43:52:f7:dc:62:91:e5:cb:26:91:7a:da:32";
 | |
| 
 | |
| foreach (@test_list) {
 | |
|     my ( $file, $tlist ) = @$_;
 | |
|     print "Example file $file:\n";
 | |
|     if ( $tlist =~ /encode/ ) {
 | |
|         run_reencode_test( $exdir, $file );
 | |
|     }
 | |
|     if ( $tlist =~ /certsout/ ) {
 | |
|         run_certsout_test( $exdir, $file );
 | |
|     }
 | |
|     if ( $tlist =~ /dataout/ ) {
 | |
|         run_dataout_test( $exdir, $file );
 | |
|     }
 | |
|     if ( $tlist =~ /verify/ ) {
 | |
|         run_verify_test( $exdir, $tlist, $file );
 | |
|     }
 | |
|     if ( $tlist =~ /digest/ ) {
 | |
|         run_digest_test( $exdir, $tlist, $file );
 | |
|     }
 | |
|     if ( $tlist =~ /encrypted/ ) {
 | |
|         run_encrypted_test( $exdir, $tlist, $file, $secretkey );
 | |
|     }
 | |
|     if ( $tlist =~ /envelope/ ) {
 | |
|         run_envelope_test( $exdir, $tlist, $file );
 | |
|     }
 | |
| 
 | |
| }
 | |
| 
 | |
| foreach (@cleanup) {
 | |
|     unlink $_;
 | |
| }
 | |
| 
 | |
| if ($badtest) {
 | |
|     print "\n$badtest TESTS FAILED!!\n";
 | |
| }
 | |
| else {
 | |
|     print "\n***All tests successful***\n";
 | |
| }
 | |
| 
 | |
| sub write_pem {
 | |
|     my ( $filename, $str, $data ) = @_;
 | |
| 
 | |
|     $filename =~ s/\.[^.]*$/.pem/;
 | |
| 
 | |
|     push @cleanup, $filename;
 | |
| 
 | |
|     open OUT, ">$filename";
 | |
| 
 | |
|     print OUT "-----BEGIN $str-----\n";
 | |
|     print OUT $data;
 | |
|     print OUT "-----END $str-----\n";
 | |
| 
 | |
|     close OUT;
 | |
| }
 | |
| 
 | |
| sub run_reencode_test {
 | |
|     my ( $cmsdir, $tfile ) = @_;
 | |
|     unlink "tmp.der";
 | |
| 
 | |
|     system( "$cmscmd -cmsout -inform DER -outform DER"
 | |
|           . " -in $cmsdir/$tfile -out tmp.der" );
 | |
| 
 | |
|     if ($?) {
 | |
|         print "\tReencode command FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     elsif ( !cmp_files( "$cmsdir/$tfile", "tmp.der" ) ) {
 | |
|         print "\tReencode FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     else {
 | |
|         print "\tReencode passed\n" if $verbose;
 | |
|     }
 | |
| }
 | |
| 
 | |
| sub run_certsout_test {
 | |
|     my ( $cmsdir, $tfile ) = @_;
 | |
|     unlink "tmp.der";
 | |
|     unlink "tmp.pem";
 | |
| 
 | |
|     system( "$cmscmd -cmsout -inform DER -certsout tmp.pem"
 | |
|           . " -in $cmsdir/$tfile -out tmp.der" );
 | |
| 
 | |
|     if ($?) {
 | |
|         print "\tCertificate output command FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     else {
 | |
|         print "\tCertificate output passed\n" if $verbose;
 | |
|     }
 | |
| }
 | |
| 
 | |
| sub run_dataout_test {
 | |
|     my ( $cmsdir, $tfile ) = @_;
 | |
|     unlink "tmp.txt";
 | |
| 
 | |
|     system(
 | |
|         "$cmscmd -data_out -inform DER" . " -in $cmsdir/$tfile -out tmp.txt" );
 | |
| 
 | |
|     if ($?) {
 | |
|         print "\tDataout command FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     elsif ( !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) ) {
 | |
|         print "\tDataout compare FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     else {
 | |
|         print "\tDataout passed\n" if $verbose;
 | |
|     }
 | |
| }
 | |
| 
 | |
| sub run_verify_test {
 | |
|     my ( $cmsdir, $tlist, $tfile ) = @_;
 | |
|     unlink "tmp.txt";
 | |
| 
 | |
|     $form   = "DER"                     if $tlist =~ /verifyder/;
 | |
|     $form   = "SMIME"                   if $tlist =~ /verifymime/;
 | |
|     $cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/;
 | |
|     $cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/;
 | |
| 
 | |
|     $cmd =
 | |
|         "$cmscmd -verify -inform $form"
 | |
|       . " -CAfile $cafile"
 | |
|       . " -in $cmsdir/$tfile -out tmp.txt";
 | |
| 
 | |
|     $cmd .= " -content $cmsdir/ExContent.bin" if $tlist =~ /cont_extern/;
 | |
| 
 | |
|     system("$cmd 2>cms.err 1>cms.out");
 | |
| 
 | |
|     if ($?) {
 | |
|         print "\tVerify command FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     elsif ( $tlist =~ /cont/
 | |
|         && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
 | |
|     {
 | |
|         print "\tVerify content compare FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     else {
 | |
|         print "\tVerify passed\n" if $verbose;
 | |
|     }
 | |
| }
 | |
| 
 | |
| sub run_envelope_test {
 | |
|     my ( $cmsdir, $tlist, $tfile ) = @_;
 | |
|     unlink "tmp.txt";
 | |
| 
 | |
|     $form = "DER"   if $tlist =~ /envelopeder/;
 | |
|     $form = "SMIME" if $tlist =~ /envelopemime/;
 | |
| 
 | |
|     $cmd =
 | |
|         "$cmscmd -decrypt -inform $form"
 | |
|       . " -recip $cmsdir/BobRSASignByCarl.pem"
 | |
|       . " -inkey $cmsdir/BobPrivRSAEncrypt.pem"
 | |
|       . " -in $cmsdir/$tfile -out tmp.txt";
 | |
| 
 | |
|     system("$cmd 2>cms.err 1>cms.out");
 | |
| 
 | |
|     if ($?) {
 | |
|         print "\tDecrypt command FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     elsif ( $tlist =~ /cont/
 | |
|         && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
 | |
|     {
 | |
|         print "\tDecrypt content compare FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     else {
 | |
|         print "\tDecrypt passed\n" if $verbose;
 | |
|     }
 | |
| }
 | |
| 
 | |
| sub run_digest_test {
 | |
|     my ( $cmsdir, $tlist, $tfile ) = @_;
 | |
|     unlink "tmp.txt";
 | |
| 
 | |
|     my $cmd =
 | |
|       "$cmscmd -digest_verify -inform DER" . " -in $cmsdir/$tfile -out tmp.txt";
 | |
| 
 | |
|     system("$cmd 2>cms.err 1>cms.out");
 | |
| 
 | |
|     if ($?) {
 | |
|         print "\tDigest verify command FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     elsif ( $tlist =~ /cont/
 | |
|         && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
 | |
|     {
 | |
|         print "\tDigest verify content compare FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     else {
 | |
|         print "\tDigest verify passed\n" if $verbose;
 | |
|     }
 | |
| }
 | |
| 
 | |
| sub run_encrypted_test {
 | |
|     my ( $cmsdir, $tlist, $tfile, $key ) = @_;
 | |
|     unlink "tmp.txt";
 | |
| 
 | |
|     system( "$cmscmd -EncryptedData_decrypt -inform DER"
 | |
|           . " -secretkey $key"
 | |
|           . " -in $cmsdir/$tfile -out tmp.txt" );
 | |
| 
 | |
|     if ($?) {
 | |
|         print "\tEncrypted Data command FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     elsif ( $tlist =~ /cont/
 | |
|         && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) )
 | |
|     {
 | |
|         print "\tEncrypted Data content compare FAILED!!\n";
 | |
|         $badtest++;
 | |
|     }
 | |
|     else {
 | |
|         print "\tEncryptedData verify passed\n" if $verbose;
 | |
|     }
 | |
| }
 | |
| 
 | |
| sub cmp_files {
 | |
|     my ( $f1, $f2 ) = @_;
 | |
|     my ( $fp1, $fp2 );
 | |
| 
 | |
|     my ( $rd1, $rd2 );
 | |
| 
 | |
|     if ( !open( $fp1, "<$f1" ) ) {
 | |
|         print STDERR "Can't Open file $f1\n";
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     if ( !open( $fp2, "<$f2" ) ) {
 | |
|         print STDERR "Can't Open file $f2\n";
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     binmode $fp1;
 | |
|     binmode $fp2;
 | |
| 
 | |
|     my $ret = 0;
 | |
| 
 | |
|     for ( ; ; ) {
 | |
|         $n1 = sysread $fp1, $rd1, 4096;
 | |
|         $n2 = sysread $fp2, $rd2, 4096;
 | |
|         last if ( $n1 != $n2 );
 | |
|         last if ( $rd1 ne $rd2 );
 | |
| 
 | |
|         if ( $n1 == 0 ) {
 | |
|             $ret = 1;
 | |
|             last;
 | |
|         }
 | |
| 
 | |
|     }
 | |
| 
 | |
|     close $fp1;
 | |
|     close $fp2;
 | |
| 
 | |
|     return $ret;
 | |
| 
 | |
| }
 | |
| 
 |