mirror of
https://github.com/openssl/openssl.git
synced 2024-12-03 05:41:46 +08:00
af6e2d51bf
Reviewed-by: Emilia Käsper <emilia@openssl.org>
602 lines
19 KiB
Perl
602 lines
19 KiB
Perl
# test/cms-test.pl
|
|
# Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
|
# project.
|
|
#
|
|
# ====================================================================
|
|
# Copyright (c) 2008 The OpenSSL Project. All rights reserved.
|
|
#
|
|
# Redistribution and use in source and binary forms, with or without
|
|
# modification, are permitted provided that the following conditions
|
|
# are met:
|
|
#
|
|
# 1. Redistributions of source code must retain the above copyright
|
|
# notice, this list of conditions and the following disclaimer.
|
|
#
|
|
# 2. Redistributions in binary form must reproduce the above copyright
|
|
# notice, this list of conditions and the following disclaimer in
|
|
# the documentation and/or other materials provided with the
|
|
# distribution.
|
|
#
|
|
# 3. All advertising materials mentioning features or use of this
|
|
# software must display the following acknowledgment:
|
|
# "This product includes software developed by the OpenSSL Project
|
|
# for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
|
#
|
|
# 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
# endorse or promote products derived from this software without
|
|
# prior written permission. For written permission, please contact
|
|
# licensing@OpenSSL.org.
|
|
#
|
|
# 5. Products derived from this software may not be called "OpenSSL"
|
|
# nor may "OpenSSL" appear in their names without prior written
|
|
# permission of the OpenSSL Project.
|
|
#
|
|
# 6. Redistributions of any form whatsoever must retain the following
|
|
# acknowledgment:
|
|
# "This product includes software developed by the OpenSSL Project
|
|
# for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
|
#
|
|
# THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
# EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
# ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
# OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
# ====================================================================
|
|
|
|
# CMS, PKCS7 consistency test script. Run extensive tests on
|
|
# OpenSSL PKCS#7 and CMS implementations.
|
|
|
|
my $ossl_path;
|
|
my $redir = " 2> cms.err > cms.out";
|
|
# Make VMS work
|
|
if ( $^O eq "VMS" && -f "OSSLX:openssl.exe" ) {
|
|
$ossl_path = "pipe mcr OSSLX:openssl";
|
|
}
|
|
# Make MSYS work
|
|
elsif ( $^O eq "MSWin32" && -f "../apps/openssl.exe" ) {
|
|
$ossl_path = "cmd /c ..\\apps\\openssl";
|
|
}
|
|
elsif ( -f "../apps/openssl$ENV{EXE_EXT}" ) {
|
|
$ossl_path = "../util/shlib_wrap.sh ../apps/openssl";
|
|
}
|
|
elsif ( -f "..\\out32dll\\openssl.exe" ) {
|
|
$ossl_path = "..\\out32dll\\openssl.exe";
|
|
}
|
|
elsif ( -f "..\\out32\\openssl.exe" ) {
|
|
$ossl_path = "..\\out32\\openssl.exe";
|
|
}
|
|
else {
|
|
die "Can't find OpenSSL executable";
|
|
}
|
|
|
|
my $pk7cmd = "$ossl_path smime ";
|
|
my $cmscmd = "$ossl_path cms ";
|
|
my $smdir = "smime-certs";
|
|
my $halt_err = 1;
|
|
|
|
my $badcmd = 0;
|
|
my $no_ec;
|
|
my $no_ec2m;
|
|
my $no_ecdh;
|
|
my $ossl8 = `$ossl_path version -v` =~ /0\.9\.8/;
|
|
|
|
system ("$ossl_path no-ec >/dev/null");
|
|
if ($? == 0)
|
|
{
|
|
$no_ec = 1;
|
|
}
|
|
elsif ($? == 256)
|
|
{
|
|
$no_ec = 0;
|
|
}
|
|
else
|
|
{
|
|
die "Error checking for EC support\n";
|
|
}
|
|
|
|
system ("$ossl_path no-ec2m >/dev/null");
|
|
if ($? == 0)
|
|
{
|
|
$no_ec2m = 1;
|
|
}
|
|
elsif ($? == 256)
|
|
{
|
|
$no_ec2m = 0;
|
|
}
|
|
else
|
|
{
|
|
die "Error checking for EC2M support\n";
|
|
}
|
|
|
|
system ("$ossl_path no-ecdh >/dev/null");
|
|
if ($? == 0)
|
|
{
|
|
$no_ecdh = 1;
|
|
}
|
|
elsif ($? == 256)
|
|
{
|
|
$no_ecdh = 0;
|
|
}
|
|
else
|
|
{
|
|
die "Error checking for ECDH support\n";
|
|
}
|
|
|
|
my @smime_pkcs7_tests = (
|
|
|
|
[
|
|
"signed content DER format, RSA key",
|
|
"-sign -in smcont.txt -outform \"DER\" -nodetach"
|
|
. " -certfile $smdir/smroot.pem"
|
|
. " -signer $smdir/smrsa1.pem -out test.cms",
|
|
"-verify -in test.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed detached content DER format, RSA key",
|
|
"-sign -in smcont.txt -outform \"DER\""
|
|
. " -signer $smdir/smrsa1.pem -out test.cms",
|
|
"-verify -in test.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt -content smcont.txt"
|
|
],
|
|
|
|
[
|
|
"signed content test streaming BER format, RSA",
|
|
"-sign -in smcont.txt -outform \"DER\" -nodetach"
|
|
. " -stream -signer $smdir/smrsa1.pem -out test.cms",
|
|
"-verify -in test.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed content DER format, DSA key",
|
|
"-sign -in smcont.txt -outform \"DER\" -nodetach"
|
|
. " -signer $smdir/smdsa1.pem -out test.cms",
|
|
"-verify -in test.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed detached content DER format, DSA key",
|
|
"-sign -in smcont.txt -outform \"DER\""
|
|
. " -signer $smdir/smdsa1.pem -out test.cms",
|
|
"-verify -in test.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt -content smcont.txt"
|
|
],
|
|
|
|
[
|
|
"signed detached content DER format, add RSA signer",
|
|
"-resign -inform \"DER\" -in test.cms -outform \"DER\""
|
|
. " -signer $smdir/smrsa1.pem -out test2.cms",
|
|
"-verify -in test2.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt -content smcont.txt"
|
|
],
|
|
|
|
[
|
|
"signed content test streaming BER format, DSA key",
|
|
"-sign -in smcont.txt -outform \"DER\" -nodetach"
|
|
. " -stream -signer $smdir/smdsa1.pem -out test.cms",
|
|
"-verify -in test.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed content test streaming BER format, 2 DSA and 2 RSA keys",
|
|
"-sign -in smcont.txt -outform \"DER\" -nodetach"
|
|
. " -signer $smdir/smrsa1.pem -signer $smdir/smrsa2.pem"
|
|
. " -signer $smdir/smdsa1.pem -signer $smdir/smdsa2.pem"
|
|
. " -stream -out test.cms",
|
|
"-verify -in test.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed content test streaming BER format, 2 DSA and 2 RSA keys, no attributes",
|
|
"-sign -in smcont.txt -outform \"DER\" -noattr -nodetach"
|
|
. " -signer $smdir/smrsa1.pem -signer $smdir/smrsa2.pem"
|
|
. " -signer $smdir/smdsa1.pem -signer $smdir/smdsa2.pem"
|
|
. " -stream -out test.cms",
|
|
"-verify -in test.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed content test streaming S/MIME format, 2 DSA and 2 RSA keys",
|
|
"-sign -in smcont.txt -nodetach"
|
|
. " -signer $smdir/smrsa1.pem -signer $smdir/smrsa2.pem"
|
|
. " -signer $smdir/smdsa1.pem -signer $smdir/smdsa2.pem"
|
|
. " -stream -out test.cms",
|
|
"-verify -in test.cms " . " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed content test streaming multipart S/MIME format, 2 DSA and 2 RSA keys",
|
|
"-sign -in smcont.txt"
|
|
. " -signer $smdir/smrsa1.pem -signer $smdir/smrsa2.pem"
|
|
. " -signer $smdir/smdsa1.pem -signer $smdir/smdsa2.pem"
|
|
. " -stream -out test.cms",
|
|
"-verify -in test.cms " . " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, 3 recipients",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms"
|
|
. " $smdir/smrsa1.pem $smdir/smrsa2.pem $smdir/smrsa3.pem ",
|
|
"-decrypt -recip $smdir/smrsa1.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, 3 recipients, 3rd used",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms"
|
|
. " $smdir/smrsa1.pem $smdir/smrsa2.pem $smdir/smrsa3.pem ",
|
|
"-decrypt -recip $smdir/smrsa3.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, 3 recipients, key only used",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms"
|
|
. " $smdir/smrsa1.pem $smdir/smrsa2.pem $smdir/smrsa3.pem ",
|
|
"-decrypt -inkey $smdir/smrsa3.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, AES-256 cipher, 3 recipients",
|
|
"-encrypt -in smcont.txt"
|
|
. " -aes256 -stream -out test.cms"
|
|
. " $smdir/smrsa1.pem $smdir/smrsa2.pem $smdir/smrsa3.pem ",
|
|
"-decrypt -recip $smdir/smrsa1.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
);
|
|
|
|
my @smime_cms_tests = (
|
|
|
|
[
|
|
"signed content test streaming BER format, 2 DSA and 2 RSA keys, keyid",
|
|
"-sign -in smcont.txt -outform \"DER\" -nodetach -keyid"
|
|
. " -signer $smdir/smrsa1.pem -signer $smdir/smrsa2.pem"
|
|
. " -signer $smdir/smdsa1.pem -signer $smdir/smdsa2.pem"
|
|
. " -stream -out test.cms",
|
|
"-verify -in test.cms -inform \"DER\" "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed content test streaming PEM format, 2 DSA and 2 RSA keys",
|
|
"-sign -in smcont.txt -outform PEM -nodetach"
|
|
. " -signer $smdir/smrsa1.pem -signer $smdir/smrsa2.pem"
|
|
. " -signer $smdir/smdsa1.pem -signer $smdir/smdsa2.pem"
|
|
. " -stream -out test.cms",
|
|
"-verify -in test.cms -inform PEM "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed content MIME format, RSA key, signed receipt request",
|
|
"-sign -in smcont.txt -signer $smdir/smrsa1.pem -nodetach"
|
|
. " -receipt_request_to test\@openssl.org -receipt_request_all"
|
|
. " -out test.cms",
|
|
"-verify -in test.cms "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed receipt MIME format, RSA key",
|
|
"-sign_receipt -in test.cms"
|
|
. " -signer $smdir/smrsa2.pem"
|
|
. " -out test2.cms",
|
|
"-verify_receipt test2.cms -in test.cms"
|
|
. " \"-CAfile\" $smdir/smroot.pem"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, 3 recipients, keyid",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms -keyid"
|
|
. " $smdir/smrsa1.pem $smdir/smrsa2.pem $smdir/smrsa3.pem ",
|
|
"-decrypt -recip $smdir/smrsa1.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming PEM format, KEK",
|
|
"-encrypt -in smcont.txt -outform PEM -aes128"
|
|
. " -stream -out test.cms "
|
|
. " -secretkey 000102030405060708090A0B0C0D0E0F "
|
|
. " -secretkeyid C0FEE0",
|
|
"-decrypt -in test.cms -out smtst.txt -inform PEM"
|
|
. " -secretkey 000102030405060708090A0B0C0D0E0F "
|
|
. " -secretkeyid C0FEE0"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming PEM format, KEK, key only",
|
|
"-encrypt -in smcont.txt -outform PEM -aes128"
|
|
. " -stream -out test.cms "
|
|
. " -secretkey 000102030405060708090A0B0C0D0E0F "
|
|
. " -secretkeyid C0FEE0",
|
|
"-decrypt -in test.cms -out smtst.txt -inform PEM"
|
|
. " -secretkey 000102030405060708090A0B0C0D0E0F "
|
|
],
|
|
|
|
[
|
|
"data content test streaming PEM format",
|
|
"-data_create -in smcont.txt -outform PEM -nodetach"
|
|
. " -stream -out test.cms",
|
|
"-data_out -in test.cms -inform PEM -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"encrypted content test streaming PEM format, 128 bit RC2 key",
|
|
"\"-EncryptedData_encrypt\" -in smcont.txt -outform PEM"
|
|
. " -rc2 -secretkey 000102030405060708090A0B0C0D0E0F"
|
|
. " -stream -out test.cms",
|
|
"\"-EncryptedData_decrypt\" -in test.cms -inform PEM "
|
|
. " -secretkey 000102030405060708090A0B0C0D0E0F -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"encrypted content test streaming PEM format, 40 bit RC2 key",
|
|
"\"-EncryptedData_encrypt\" -in smcont.txt -outform PEM"
|
|
. " -rc2 -secretkey 0001020304"
|
|
. " -stream -out test.cms",
|
|
"\"-EncryptedData_decrypt\" -in test.cms -inform PEM "
|
|
. " -secretkey 0001020304 -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"encrypted content test streaming PEM format, triple DES key",
|
|
"\"-EncryptedData_encrypt\" -in smcont.txt -outform PEM"
|
|
. " -des3 -secretkey 000102030405060708090A0B0C0D0E0F1011121314151617"
|
|
. " -stream -out test.cms",
|
|
"\"-EncryptedData_decrypt\" -in test.cms -inform PEM "
|
|
. " -secretkey 000102030405060708090A0B0C0D0E0F1011121314151617"
|
|
. " -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"encrypted content test streaming PEM format, 128 bit AES key",
|
|
"\"-EncryptedData_encrypt\" -in smcont.txt -outform PEM"
|
|
. " -aes128 -secretkey 000102030405060708090A0B0C0D0E0F"
|
|
. " -stream -out test.cms",
|
|
"\"-EncryptedData_decrypt\" -in test.cms -inform PEM "
|
|
. " -secretkey 000102030405060708090A0B0C0D0E0F -out smtst.txt"
|
|
],
|
|
|
|
);
|
|
|
|
my @smime_cms_comp_tests = (
|
|
|
|
[
|
|
"compressed content test streaming PEM format",
|
|
"-compress -in smcont.txt -outform PEM -nodetach"
|
|
. " -stream -out test.cms",
|
|
"-uncompress -in test.cms -inform PEM -out smtst.txt"
|
|
]
|
|
|
|
);
|
|
|
|
my @smime_cms_param_tests = (
|
|
[
|
|
"signed content test streaming PEM format, RSA keys, PSS signature",
|
|
"-sign -in smcont.txt -outform PEM -nodetach"
|
|
. " -signer $smdir/smrsa1.pem -keyopt rsa_padding_mode:pss"
|
|
. " -out test.cms",
|
|
"-verify -in test.cms -inform PEM "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed content test streaming PEM format, RSA keys, PSS signature, no attributes",
|
|
"-sign -in smcont.txt -outform PEM -nodetach -noattr"
|
|
. " -signer $smdir/smrsa1.pem -keyopt rsa_padding_mode:pss"
|
|
. " -out test.cms",
|
|
"-verify -in test.cms -inform PEM "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"signed content test streaming PEM format, RSA keys, PSS signature, SHA384 MGF1",
|
|
"-sign -in smcont.txt -outform PEM -nodetach"
|
|
. " -signer $smdir/smrsa1.pem -keyopt rsa_padding_mode:pss"
|
|
. " -keyopt rsa_mgf1_md:sha384 -out test.cms",
|
|
"-verify -in test.cms -inform PEM "
|
|
. " \"-CAfile\" $smdir/smroot.pem -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, OAEP default parameters",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms"
|
|
. " -recip $smdir/smrsa1.pem -keyopt rsa_padding_mode:oaep",
|
|
"-decrypt -recip $smdir/smrsa1.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, OAEP SHA256",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms"
|
|
. " -recip $smdir/smrsa1.pem -keyopt rsa_padding_mode:oaep"
|
|
. " -keyopt rsa_oaep_md:sha256",
|
|
"-decrypt -recip $smdir/smrsa1.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, ECDH",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms"
|
|
. " -recip $smdir/smec1.pem",
|
|
"-decrypt -recip $smdir/smec1.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, ECDH, AES128, SHA256 KDF",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms"
|
|
. " -recip $smdir/smec1.pem -aes128 -keyopt ecdh_kdf_md:sha256",
|
|
"-decrypt -recip $smdir/smec1.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, ECDH, K-283, cofactor DH",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms"
|
|
. " -recip $smdir/smec2.pem -aes128"
|
|
. " -keyopt ecdh_kdf_md:sha256 -keyopt ecdh_cofactor_mode:1",
|
|
"-decrypt -recip $smdir/smec2.pem -in test.cms -out smtst.txt"
|
|
],
|
|
|
|
[
|
|
"enveloped content test streaming S/MIME format, X9.42 DH",
|
|
"-encrypt -in smcont.txt"
|
|
. " -stream -out test.cms"
|
|
. " -recip $smdir/smdh.pem -aes128",
|
|
"-decrypt -recip $smdir/smdh.pem -in test.cms -out smtst.txt"
|
|
]
|
|
);
|
|
|
|
print "CMS => PKCS#7 compatibility tests\n";
|
|
|
|
run_smime_tests( \$badcmd, \@smime_pkcs7_tests, $cmscmd, $pk7cmd );
|
|
|
|
print "CMS <= PKCS#7 compatibility tests\n";
|
|
|
|
run_smime_tests( \$badcmd, \@smime_pkcs7_tests, $pk7cmd, $cmscmd );
|
|
|
|
print "CMS <=> CMS consistency tests\n";
|
|
|
|
run_smime_tests( \$badcmd, \@smime_pkcs7_tests, $cmscmd, $cmscmd );
|
|
run_smime_tests( \$badcmd, \@smime_cms_tests, $cmscmd, $cmscmd );
|
|
|
|
print "CMS <=> CMS consistency tests, modified key parameters\n";
|
|
run_smime_tests( \$badcmd, \@smime_cms_param_tests, $cmscmd, $cmscmd );
|
|
|
|
if ( `$ossl_path version -f` =~ /ZLIB/ ) {
|
|
run_smime_tests( \$badcmd, \@smime_cms_comp_tests, $cmscmd, $cmscmd );
|
|
}
|
|
else {
|
|
print "Zlib not supported: compression tests skipped\n";
|
|
}
|
|
|
|
print "Running modified tests for OpenSSL 0.9.8 cms backport\n" if($ossl8);
|
|
|
|
if ($badcmd) {
|
|
print "$badcmd TESTS FAILED!!\n";
|
|
}
|
|
else {
|
|
print "ALL TESTS SUCCESSFUL.\n";
|
|
}
|
|
|
|
unlink "test.cms";
|
|
unlink "test2.cms";
|
|
unlink "smtst.txt";
|
|
unlink "cms.out";
|
|
unlink "cms.err";
|
|
|
|
sub run_smime_tests {
|
|
my ( $rv, $aref, $scmd, $vcmd ) = @_;
|
|
|
|
foreach $smtst (@$aref) {
|
|
my ( $tnam, $rscmd, $rvcmd ) = @$smtst;
|
|
if ($ossl8)
|
|
{
|
|
# Skip smime resign: 0.9.8 smime doesn't support -resign
|
|
next if ($scmd =~ /smime/ && $rscmd =~ /-resign/);
|
|
# Disable streaming: option not supported in 0.9.8
|
|
$tnam =~ s/streaming//;
|
|
$rscmd =~ s/-stream//;
|
|
$rvcmd =~ s/-stream//;
|
|
}
|
|
if ($no_ec && $tnam =~ /ECDH/)
|
|
{
|
|
print "$tnam: skipped, EC disabled\n";
|
|
next;
|
|
}
|
|
if ($no_ecdh && $tnam =~ /ECDH/)
|
|
{
|
|
print "$tnam: skipped, ECDH disabled\n";
|
|
next;
|
|
}
|
|
if ($no_ec2m && $tnam =~ /K-283/)
|
|
{
|
|
print "$tnam: skipped, EC2M disabled\n";
|
|
next;
|
|
}
|
|
system("$scmd$rscmd$redir");
|
|
if ($?) {
|
|
print "$tnam: generation error\n";
|
|
$$rv++;
|
|
exit 1 if $halt_err;
|
|
next;
|
|
}
|
|
system("$vcmd$rvcmd$redir");
|
|
if ($?) {
|
|
print "$tnam: verify error\n";
|
|
$$rv++;
|
|
exit 1 if $halt_err;
|
|
next;
|
|
}
|
|
if (!cmp_files("smtst.txt", "smcont.txt")) {
|
|
print "$tnam: content verify error\n";
|
|
$$rv++;
|
|
exit 1 if $halt_err;
|
|
next;
|
|
}
|
|
print "$tnam: OK\n";
|
|
}
|
|
}
|
|
|
|
sub cmp_files {
|
|
use FileHandle;
|
|
my ( $f1, $f2 ) = @_;
|
|
my $fp1 = FileHandle->new();
|
|
my $fp2 = FileHandle->new();
|
|
|
|
my ( $rd1, $rd2 );
|
|
|
|
if ( !open( $fp1, "<$f1" ) ) {
|
|
print STDERR "Can't Open file $f1\n";
|
|
return 0;
|
|
}
|
|
|
|
if ( !open( $fp2, "<$f2" ) ) {
|
|
print STDERR "Can't Open file $f2\n";
|
|
return 0;
|
|
}
|
|
|
|
binmode $fp1;
|
|
binmode $fp2;
|
|
|
|
my $ret = 0;
|
|
|
|
for ( ; ; ) {
|
|
$n1 = sysread $fp1, $rd1, 4096;
|
|
$n2 = sysread $fp2, $rd2, 4096;
|
|
last if ( $n1 != $n2 );
|
|
last if ( $rd1 ne $rd2 );
|
|
|
|
if ( $n1 == 0 ) {
|
|
$ret = 1;
|
|
last;
|
|
}
|
|
|
|
}
|
|
|
|
close $fp1;
|
|
close $fp2;
|
|
|
|
return $ret;
|
|
|
|
}
|
|
|