1 /* $OpenBSD: cmstest.c,v 1.7 2023/03/02 21:08:14 tb Exp $ */ 2 /* 3 * Copyright (c) 2019 Joel Sing <jsing@openbsd.org> 4 * 5 * Permission to use, copy, modify, and distribute this software for any 6 * purpose with or without fee is hereby granted, provided that the above 7 * copyright notice and this permission notice appear in all copies. 8 * 9 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 10 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 11 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 12 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 13 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 14 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 15 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 16 */ 17 18 #include <err.h> 19 #include <string.h> 20 21 #include <openssl/bio.h> 22 #include <openssl/err.h> 23 #include <openssl/pem.h> 24 #include <openssl/x509.h> 25 26 #include <openssl/cms.h> 27 28 static int verbose = 0; 29 30 static const char cms_msg[] = "Hello CMS!\r\n"; 31 32 static const char cms_ca_1[] = 33 "-----BEGIN CERTIFICATE-----\n" 34 "MIICqDCCAZACCQD8ebR8e4kdvjANBgkqhkiG9w0BAQsFADAWMRQwEgYDVQQDDAtU\n" 35 "ZXN0IENNUyBDQTAeFw0xOTA1MTExNTUzNTNaFw0yOTA1MDgxNTUzNTNaMBYxFDAS\n" 36 "BgNVBAMMC1Rlc3QgQ01TIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC\n" 37 "AQEAoIiW3POGYfhY0BEgG8mIwouOI917M72jsuUE57ccjEXLWseItLb7r9vkiwW/\n" 38 "FYbz0UYkJW1JgpZmWaTGOgZGxj+WTzxh1aq7OHyJb6Pxwp9wGrGJu+BEqOZN/bi/\n" 39 "aQ1l8x7DxVJkFeI1+4QKDfmGYfWoVzQLgamO3u0vxz3Vi/XzX01ZomcZUYYx0lIq\n" 40 "hxAO665HoPUmecqYdLPquJNxdfiy37ieLJOmIsKZJtMcCZAxqhcCwE7I0196Ng3P\n" 41 "fK9Sl7BCyTBszb2YC2qOleuI2Wjg/7o1+hugopUkjxz0RGFu5s3K9PhCLwpqylXg\n" 42 "IXe9Vwi38gKawD3yjtDBRDNmIwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQAvsvtc\n" 43 "cO0Eo0F6MvB0bjBIMHBkKyWcmD2c5gVFhbHyRD+XBVXNdn5CcBba2amm0VgShBpM\n" 44 "4e1rOtIH/Hf6nB3c/EjZvd16ryoTCTvzayac7sD2Y8IxF1JIAKvjFbu+LmzM/F5f\n" 45 "x3/WdY1qs5W7lO46i8xmSUAP88gohWP4cyVUAITNrh/RSOFaWUd5i1/vZ+iEexLI\n" 46 "rQWsweJleOxvA8SrXm2gAkqRWEncsxOrsX/MsPl7iJoebLhWbS3cOHhutWrfhdlC\n" 47 "2uT6K7SA9rn6qqmvI6mLkHJQpqq++Py2UTDo1u8VKa3ieYNUN070kgxpYiVBGs3L\n" 48 "aaACIcEs48gnTRWc\n" 49 "-----END CERTIFICATE-----\n"; 50 51 static const char cms_cert_1[] = 52 "-----BEGIN CERTIFICATE-----\n" 53 "MIICpDCCAYwCAQMwDQYJKoZIhvcNAQEFBQAwFjEUMBIGA1UEAwwLVGVzdCBDTVMg\n" 54 "Q0EwHhcNMTkwNTExMTU1MzU0WhcNMjkwNTA4MTU1MzU0WjAaMRgwFgYDVQQDDA9U\n" 55 "ZXN0IENNUyBDZXJ0IDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDD\n" 56 "MLSuy+tc0AwfrlszgHJ3z7UEpJSn5mcKxquFnEC5DtchgQJ+cj5VFvB9A9G98ykQ\n" 57 "0IrHXNUTbS2yvf8ac1PlocuA8ggeDK4gPHCe097j0nUphhT0VzhwwFfP6Uo6VaR8\n" 58 "B7Qb3zFTz64bN66V89etZ5NQJKMdrh4oOh5nfxLKvCcTK+9U4ZrgeGVdVXmL6HJp\n" 59 "3m9CPobCBsC8DgI+zF/tg4GjDoVCJd6Tv5MRAmKiBrzTGglVeknkgiyIZ9C7gXU/\n" 60 "7NMUihmLlt+80zr+nL0P+MA924WV4fZJi1wtf6Eioalq6n/9i93nBRCeu8bEOBrT\n" 61 "pAre2oBEoULIJu7Ubx79AgMBAAEwDQYJKoZIhvcNAQEFBQADggEBADnLc6ZzApHq\n" 62 "Z8l4zrFKAG/O/oULPMRTA8/zXNQ60BMV10hVtTCxVNq59d48wEljuUOGLfM91rhj\n" 63 "gId8AOlsQbfRZE94DxlcaaAXaEjbkVSke56yfdLd4NqkIWrXGrFlbepj4b4ORAHh\n" 64 "85kPwDEDnpMgQ63LqNX3gru3xf2AGIa1Fck2ISkVafqW5TH0Y6dCeGGFTtnH/QUT\n" 65 "ofTm8uQ2vG9ERn+C1ooqJ2dyAckXFdmCcpor26vO/ZssMEKSee38ZNWR/01LEkOG\n" 66 "G0+AL7E1mJdlVOtp3DDFN0hoNY7PbVuuzT+mrAwGLhCp2jnf68iNdrIuDdIE6yvi\n" 67 "6WWvmmz+rC0=\n" 68 "-----END CERTIFICATE-----\n"; 69 70 static const char cms_key_1[] = 71 "-----BEGIN PRIVATE KEY-----\n" 72 "MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDDMLSuy+tc0Awf\n" 73 "rlszgHJ3z7UEpJSn5mcKxquFnEC5DtchgQJ+cj5VFvB9A9G98ykQ0IrHXNUTbS2y\n" 74 "vf8ac1PlocuA8ggeDK4gPHCe097j0nUphhT0VzhwwFfP6Uo6VaR8B7Qb3zFTz64b\n" 75 "N66V89etZ5NQJKMdrh4oOh5nfxLKvCcTK+9U4ZrgeGVdVXmL6HJp3m9CPobCBsC8\n" 76 "DgI+zF/tg4GjDoVCJd6Tv5MRAmKiBrzTGglVeknkgiyIZ9C7gXU/7NMUihmLlt+8\n" 77 "0zr+nL0P+MA924WV4fZJi1wtf6Eioalq6n/9i93nBRCeu8bEOBrTpAre2oBEoULI\n" 78 "Ju7Ubx79AgMBAAECggEAD4XkGLKm+S6iiDJ5llL0x4qBPulH2UJ9l2HNakbO7ui7\n" 79 "OzLjW+MCCgpU/dw75ftcnLW5E7nSSEU6iSiLDTN2zKBdatfUxW8EuhOUcU0wQLYQ\n" 80 "E0lSiUwWdQEW+rX27US6XBLQxBav+ZZeplN7UvmdgXDnSkxfnJCoXVKh8GEuwWip\n" 81 "sM/Lwg8MSZK0o5qFVXtPp7kreB8CWlVyPYW5rDYy3k02R1t9k6WSdO2foPXe9rdZ\n" 82 "iiThkALcHdBcFF0NHrIkAgMdtcAxkDIwO2kOnGJQKDXu+txbzPYodMU0Z6eVnlIu\n" 83 "jh9ZjnZKBJgX6YVLVPRBwQXHXeGAnvMNm2WXH7SCAQKBgQDmMxvspc3K6HOqMoik\n" 84 "59Rq1gXIuaGH0uSMSiUMTkr4laJbh9WgZ6JTAfIPuhj1xKGfDK7LF9VjPQ104SgL\n" 85 "dCA1pV6nsuGS3j3vBnaMfmO7yr3yON+p/WDpKOgqC51Z3/pT8reJtMnyowQuDeYe\n" 86 "UVRVyeXA11nve0SSc97US4AtXQKBgQDZERtgs6ejiUJQXuflu9HDczEZ/pHfPI1y\n" 87 "+RU0tvI4860OTjerVJA2YBeOBLa9Y3hblvNpOU0SoVeMAGQLblEznJAl1nbaWqVY\n" 88 "kPgvtQcTOL/awEB90JklvSRqR82WJchMOHMG5SeqrpUx3Dg+cPH6nId0e8UCt3/U\n" 89 "W/u/5hP+IQKBgQDfReEmxaZ10MIm6P6p24Wm3dEcYBfxEjbEb0HBzspek1u3JWep\n" 90 "PfsuQavTXy/IaKBOENIUgBhjOZssqxnZChgXkD7frtulRNOTW5RuLkRzp3BWWJ1v\n" 91 "VifB3gBYj41d16UH+VnVQbnCEiUCuk5hR4bh8oJaaUV8xvW6ipItHNHErQKBgGoe\n" 92 "2uuj6UkiSbFRNL4z3JFZN6AlvNsOl3imHZ/v8Ou29dwQkVbJuNdckydzVoOwpZ7h\n" 93 "ZY8D3JJHHq3rYv3TqQ86c56MAv8tYbiy5yMrtZHIJMOlSeI4oSa6GZt8Dx5gylO5\n" 94 "JUMxtPrU70u5BiZAwYxsCi0AdYimfXAsqB9hNFUBAoGBAJPT7Xsr7NIkrbv+aYXj\n" 95 "rVVJ1qokUEKT6H1GmFXO3Fkw3kjPKS8VZloKOB7OiBC+AwMEQIflArCZ+PJdnVNO\n" 96 "48ntHnaeaZk8rKXsYdJsqMKgIxZYZuCIazZz9WHeYxn5vkH76Q3DrfqrneJ3HSU/\n" 97 "pFtLoXoGoVXRjAtpNvX7fh/G\n" 98 "-----END PRIVATE KEY-----\n"; 99 100 static void 101 hexdump(const unsigned char *buf, size_t len) 102 { 103 size_t i; 104 105 for (i = 1; i <= len; i++) 106 fprintf(stderr, " 0x%02x,%s", buf[i - 1], i % 8 ? "" : "\n"); 107 if (len % 8 != 0) 108 fprintf(stderr, "\n"); 109 } 110 111 static int 112 test_cms_encrypt_decrypt(void) 113 { 114 STACK_OF(X509) *certs = NULL; 115 CMS_ContentInfo *ci = NULL; 116 EVP_PKEY *pkey = NULL; 117 BIO *bio_mem = NULL; 118 BIO *bio_out = NULL; 119 X509 *cert = NULL; 120 size_t len; 121 long mem_len; 122 char *p; 123 int failed = 1; 124 125 if ((bio_out = BIO_new_fp(stdout, BIO_NOCLOSE)) == NULL) 126 errx(1, "failed to create BIO"); 127 128 if ((certs = sk_X509_new_null()) == NULL) 129 errx(1, "failed to create certs"); 130 if ((bio_mem = BIO_new_mem_buf(cms_cert_1, -1)) == NULL) 131 errx(1, "failed to create BIO for cert"); 132 if ((cert = PEM_read_bio_X509(bio_mem, NULL, NULL, NULL)) == NULL) 133 errx(1, "failed to read cert"); 134 if (!sk_X509_push(certs, cert)) 135 errx(1, "failed to push cert"); 136 137 BIO_free(bio_mem); 138 if ((bio_mem = BIO_new_mem_buf(cms_key_1, -1)) == NULL) 139 errx(1, "failed to create BIO for key"); 140 if ((pkey = PEM_read_bio_PrivateKey(bio_mem, NULL, NULL, NULL)) == NULL) 141 errx(1, "failed to read key"); 142 143 BIO_free(bio_mem); 144 if ((bio_mem = BIO_new_mem_buf(cms_msg, -1)) == NULL) 145 errx(1, "failed to create BIO for message"); 146 147 if ((ci = CMS_encrypt(certs, bio_mem, EVP_aes_256_cbc(), 0)) == NULL) { 148 fprintf(stderr, "FAIL: CMS_encrypt returned NULL\n"); 149 ERR_print_errors_fp(stderr); 150 goto failure; 151 } 152 153 if (verbose) { 154 if (!CMS_ContentInfo_print_ctx(bio_out, ci, 0, NULL)) 155 errx(1, "failed to print CMS ContentInfo"); 156 if (!PEM_write_bio_CMS(bio_out, ci)) 157 errx(1, "failed to print CMS PEM"); 158 } 159 160 BIO_free(bio_mem); 161 if ((bio_mem = BIO_new(BIO_s_mem())) == NULL) 162 errx(1, "failed to create BIO for message"); 163 164 if (!CMS_decrypt(ci, pkey, cert, NULL, bio_mem, 0)) { 165 fprintf(stderr, "FAIL: CMS_decrypt failed\n"); 166 ERR_print_errors_fp(stderr); 167 goto failure; 168 } 169 170 if ((mem_len = BIO_get_mem_data(bio_mem, &p)) <= 0) { 171 fprintf(stderr, "FAIL: BIO_get_mem_data returned %ld\n", 172 mem_len); 173 goto failure; 174 } 175 if ((len = strlen(cms_msg)) != (size_t)mem_len) { 176 fprintf(stderr, "FAIL: CMS decrypt returned %ld bytes, " 177 "want %zu bytes\n", mem_len, len); 178 fprintf(stderr, "Got CMS data:\n"); 179 hexdump(p, mem_len); 180 fprintf(stderr, "Want CMS data:\n"); 181 hexdump(cms_msg, len); 182 goto failure; 183 } 184 if (memcmp(p, cms_msg, len) != 0) { 185 fprintf(stderr, "FAIL: CMS decrypt message differs"); 186 fprintf(stderr, "Got CMS data:\n"); 187 hexdump(p, mem_len); 188 fprintf(stderr, "Want CMS data:\n"); 189 hexdump(cms_msg, len); 190 goto failure; 191 } 192 193 failed = 0; 194 195 failure: 196 BIO_free(bio_mem); 197 BIO_free(bio_out); 198 CMS_ContentInfo_free(ci); 199 EVP_PKEY_free(pkey); 200 sk_X509_free(certs); 201 X509_free(cert); 202 203 return failed; 204 } 205 206 static int 207 test_cms_sign_verify(void) 208 { 209 STACK_OF(X509) *certs = NULL; 210 CMS_ContentInfo *ci = NULL; 211 X509_STORE *store = NULL; 212 EVP_PKEY *pkey = NULL; 213 BIO *bio_mem = NULL; 214 BIO *bio_out = NULL; 215 X509 *cert = NULL; 216 X509 *ca = NULL; 217 size_t len; 218 long mem_len; 219 char *p; 220 int failed = 1; 221 222 if ((bio_out = BIO_new_fp(stdout, BIO_NOCLOSE)) == NULL) 223 errx(1, "failed to create BIO"); 224 225 if ((certs = sk_X509_new_null()) == NULL) 226 errx(1, "failed to create certs"); 227 if ((bio_mem = BIO_new_mem_buf(cms_cert_1, -1)) == NULL) 228 errx(1, "failed to create BIO for cert"); 229 if ((cert = PEM_read_bio_X509(bio_mem, NULL, NULL, NULL)) == NULL) 230 errx(1, "failed to read cert"); 231 if (!sk_X509_push(certs, cert)) 232 errx(1, "failed to push cert"); 233 234 BIO_free(bio_mem); 235 if ((bio_mem = BIO_new_mem_buf(cms_ca_1, -1)) == NULL) 236 errx(1, "failed to create BIO for cert"); 237 if ((ca = PEM_read_bio_X509(bio_mem, NULL, NULL, NULL)) == NULL) 238 errx(1, "failed to read cert"); 239 if ((store = X509_STORE_new()) == NULL) 240 errx(1, "failed to create X509 store"); 241 if (!X509_STORE_add_cert(store, ca)) 242 errx(1, "failed to add cert to store"); 243 244 BIO_free(bio_mem); 245 if ((bio_mem = BIO_new_mem_buf(cms_key_1, -1)) == NULL) 246 errx(1, "failed to create BIO for key"); 247 if ((pkey = PEM_read_bio_PrivateKey(bio_mem, NULL, NULL, NULL)) == NULL) 248 errx(1, "failed to read key"); 249 250 BIO_free(bio_mem); 251 if ((bio_mem = BIO_new_mem_buf(cms_msg, -1)) == NULL) 252 errx(1, "failed to create BIO for message"); 253 254 if ((ci = CMS_sign(cert, pkey, NULL, bio_mem, 0)) == NULL) { 255 fprintf(stderr, "FAIL: CMS sign failed\n"); 256 ERR_print_errors_fp(stderr); 257 goto failure; 258 } 259 260 if (verbose) { 261 if (!CMS_ContentInfo_print_ctx(bio_out, ci, 0, NULL)) 262 errx(1, "failed to print CMS ContentInfo"); 263 if (!PEM_write_bio_CMS(bio_out, ci)) 264 errx(1, "failed to print CMS PEM"); 265 } 266 267 BIO_free(bio_mem); 268 if ((bio_mem = BIO_new(BIO_s_mem())) == NULL) 269 errx(1, "failed to create BIO for message"); 270 271 if (!CMS_verify(ci, certs, store, NULL, bio_mem, 0)) { 272 fprintf(stderr, "FAIL: CMS_verify failed\n"); 273 ERR_print_errors_fp(stderr); 274 goto failure; 275 } 276 277 if ((mem_len = BIO_get_mem_data(bio_mem, &p)) <= 0) { 278 fprintf(stderr, "FAIL: BIO_get_mem_data returned %ld\n", 279 mem_len); 280 goto failure; 281 } 282 if ((len = strlen(cms_msg)) != (size_t)mem_len) { 283 fprintf(stderr, "FAIL: CMS verify returned %ld bytes, " 284 "want %zu bytes\n", mem_len, len); 285 fprintf(stderr, "Got CMS data:\n"); 286 hexdump(p, mem_len); 287 fprintf(stderr, "Want CMS data:\n"); 288 hexdump(cms_msg, len); 289 goto failure; 290 } 291 if (memcmp(p, cms_msg, len) != 0) { 292 fprintf(stderr, "FAIL: CMS verify message differs"); 293 fprintf(stderr, "Got CMS data:\n"); 294 hexdump(p, mem_len); 295 fprintf(stderr, "Want CMS data:\n"); 296 hexdump(cms_msg, len); 297 goto failure; 298 } 299 300 failed = 0; 301 302 failure: 303 BIO_free(bio_mem); 304 BIO_free(bio_out); 305 CMS_ContentInfo_free(ci); 306 EVP_PKEY_free(pkey); 307 sk_X509_free(certs); 308 X509_free(cert); 309 X509_STORE_free(store); 310 X509_free(ca); 311 312 return failed; 313 } 314 315 int 316 main(int argc, char **argv) 317 { 318 int failed = 0; 319 320 ERR_load_crypto_strings(); 321 322 failed |= test_cms_encrypt_decrypt(); 323 failed |= test_cms_sign_verify(); 324 325 return failed; 326 } 327