#!/bin/sh # Copyright (C) 2015 Nikos Mavrogiannopoulos # # This file is part of GnuTLS. # # GnuTLS is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 3 of the License, or (at # your option) any later version. # # GnuTLS is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with GnuTLS; if not, write to the Free Software Foundation, # Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. #set -e srcdir="${srcdir:-.}" CERTTOOL="${CERTTOOL:-../../src/certtool${EXEEXT}}" DIFF="${DIFF:-diff}" if ! test -z "${VALGRIND}";then VALGRIND="${LIBTOOL:-libtool} --mode=execute ${VALGRIND} --error-exitcode=15" fi OUTFILE=out-pkcs7.tmp OUTFILE2=out2-pkcs7.tmp for FILE in single-ca.p7b full.p7b;do ${VALGRIND} "${CERTTOOL}" --inder --p7-info --infile "${srcdir}/${FILE}"|grep -v "Signing time" >"${OUTFILE}" rc=$? # We're done. if test "${rc}" != "0"; then echo "${FILE}: PKCS7 decoding failed" exit ${rc} fi ${DIFF} "${OUTFILE}" "${srcdir}/${FILE}.out" >/dev/null if test "$?" != "0"; then echo "${FILE}: PKCS7 decoding didn't produce the correct file" exit 1 fi done # check signatures for FILE in full.p7b;do ${VALGRIND} "${CERTTOOL}" --inder --p7-verify --load-ca-certificate "${srcdir}/../../doc/credentials/x509/ca.pem" --infile "${srcdir}/${FILE}" >"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 verification failed" exit ${rc} fi ${VALGRIND} "${CERTTOOL}" --verify-purpose=1.3.6.1.5.5.7.3.1 --inder --p7-verify --load-ca-certificate "${srcdir}/../../doc/credentials/x509/ca.pem" --infile "${srcdir}/${FILE}" >"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 verification failed with key purpose" exit ${rc} fi ${VALGRIND} "${CERTTOOL}" --verify-purpose=1.3.6.1.5.5.7.3.3 --inder --p7-verify --load-ca-certificate "${srcdir}/../../doc/credentials/x509/ca.pem" --infile "${srcdir}/${FILE}" >"${OUTFILE}" rc=$? if test "${rc}" = "0"; then echo "${FILE}: PKCS7 verification succeeded with wrong key purpose" exit 2 fi done # check signature with detached data FILE="detached.p7b" ${VALGRIND} "${CERTTOOL}" --inder --p7-verify --load-ca-certificate "${srcdir}/../../doc/credentials/x509/ca.pem" --infile "${srcdir}/${FILE}" rc=$? if test "${rc}" = "0"; then echo "${FILE}: PKCS7 verification succeeded without providing detached data" exit 2 fi ${VALGRIND} "${CERTTOOL}" --inder --p7-verify --load-data "${srcdir}/pkcs7-detached.txt" --load-ca-certificate "${srcdir}/../../doc/credentials/x509/ca.pem" --infile "${srcdir}/${FILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 verification failed" exit ${rc} fi # Test cert combination FILE="p7-combined" cat "${srcdir}/../certs"/cert*.pem >"${OUTFILE2}" ${VALGRIND} "${CERTTOOL}" --p7-generate --load-certificate "${OUTFILE2}" >"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 struct generation failed" exit ${rc} fi ${DIFF} "${OUTFILE}" "${srcdir}/p7-combined.out" >/dev/null if test "$?" != "0"; then echo "${FILE}: PKCS7 generation didn't produce the correct file" exit 1 fi # Test signing FILE="signing" ${VALGRIND} "${CERTTOOL}" --p7-sign --load-privkey "${srcdir}/../../doc/credentials/x509/key-rsa.pem" --load-certificate "${srcdir}/../../doc/credentials/x509/cert-rsa.pem" --infile "${srcdir}/pkcs7-detached.txt" >"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 struct signing failed" exit ${rc} fi FILE="signing-verify" ${VALGRIND} "${CERTTOOL}" --p7-verify --load-certificate "${srcdir}/../../doc/credentials/x509/cert-rsa.pem" <"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 struct signing failed verification" exit ${rc} fi FILE="signing-detached" ${VALGRIND} "${CERTTOOL}" --p7-detached-sign --load-privkey "${srcdir}/../../doc/credentials/x509/key-rsa.pem" --load-certificate "${srcdir}/../../doc/credentials/x509/cert-rsa.pem" --infile "${srcdir}/pkcs7-detached.txt" >"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 struct signing-detached failed" exit ${rc} fi FILE="signing-detached-verify" ${VALGRIND} "${CERTTOOL}" --p7-verify --load-certificate "${srcdir}/../../doc/credentials/x509/cert-rsa.pem" --load-data "${srcdir}/pkcs7-detached.txt" <"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 struct signing-detached failed verification" exit ${rc} fi # Test signing with broken algorithms FILE="signing-broken" ${VALGRIND} "${CERTTOOL}" --hash md5 --p7-sign --load-privkey "${srcdir}/../../doc/credentials/x509/key-rsa.pem" --load-certificate "${srcdir}/../../doc/credentials/x509/cert-rsa.pem" --infile "${srcdir}/pkcs7-detached.txt" >"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 struct signing-broken failed" exit ${rc} fi FILE="signing-verify-broken" ${VALGRIND} "${CERTTOOL}" --p7-verify --load-certificate "${srcdir}/../../doc/credentials/x509/cert-rsa.pem" <"${OUTFILE}" rc=$? if test "${rc}" = "0"; then echo "${FILE}: PKCS7 struct verification succeeded with broken algo" exit 1 fi FILE="signing-time" ${VALGRIND} "${CERTTOOL}" --p7-detached-sign --p7-time --load-privkey "${srcdir}/../../doc/credentials/x509/key-rsa.pem" --load-certificate "${srcdir}/../../doc/credentials/x509/cert-rsa.pem" --infile "${srcdir}/pkcs7-detached.txt" >"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 struct signing with time failed" exit ${rc} fi ${VALGRIND} "${CERTTOOL}" --p7-info <"${OUTFILE}"|grep "Signing time:" "${OUTFILE}" >/dev/null 2>&1 if test "${rc}" != "0"; then echo "${FILE}: PKCS7 struct signing with time failed. No time was found." exit ${rc} fi FILE="signing-time-verify" ${VALGRIND} "${CERTTOOL}" --p7-verify --load-certificate "${srcdir}/../../doc/credentials/x509/cert-rsa.pem" --load-data "${srcdir}/pkcs7-detached.txt" <"${OUTFILE}" rc=$? if test "${rc}" != "0"; then echo "${FILE}: PKCS7 struct signing with time failed verification" exit ${rc} fi rm -f "${OUTFILE}" rm -f "${OUTFILE2}" exit 0