| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002 | 
							- /*
 
-  *  Copyright 2014-2022 The GmSSL Project. All Rights Reserved.
 
-  *
 
-  *  Licensed under the Apache License, Version 2.0 (the License); you may
 
-  *  not use this file except in compliance with the License.
 
-  *
 
-  *  http://www.apache.org/licenses/LICENSE-2.0
 
-  */
 
- #include <stdio.h>
 
- #include <string.h>
 
- #include <stdlib.h>
 
- #include <gmssl/oid.h>
 
- #include <gmssl/x509.h>
 
- #include <gmssl/rand.h>
 
- #include <gmssl/error.h>
 
- #include <gmssl/sm4.h>
 
- #include <gmssl/cms.h>
 
- static int test_cms_content_type(void)
 
- {
 
- 	int tests[] = {
 
- 		OID_cms_data,
 
- 		OID_cms_signed_data,
 
- 		OID_cms_enveloped_data,
 
- 		OID_cms_signed_and_enveloped_data,
 
- 		OID_cms_encrypted_data,
 
- 		OID_cms_key_agreement_info,
 
- 	};
 
- 	uint8_t buf[256];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	int i;
 
- 	for (i = 0; i < sizeof(tests)/sizeof(tests[0]); i++) {
 
- 		if (cms_content_type_to_der(tests[i], &p, &len) != 1) {
 
- 			error_print();
 
- 			return -1;
 
- 		}
 
- 		format_bytes(stderr, 0, 4, "", buf, len);
 
- 	}
 
- 	for (i = 0; i < sizeof(tests)/sizeof(tests[0]); i++) {
 
- 		int oid;
 
- 		if (cms_content_type_from_der(&oid, &cp, &len) != 1
 
- 			|| asn1_check(oid == tests[i]) != 1) {
 
- 			error_print();
 
- 			return -1;
 
- 		}
 
- 		format_print(stderr, 0, 4, "%s\n", cms_content_type_name(oid));
 
- 	}
 
- 	(void)asn1_length_is_zero(len);
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_content_info(void)
 
- {
 
- 	uint8_t buf[256];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	uint8_t data[20] = { 0x01,0x02 };
 
- 	int oid;
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	if (cms_content_info_to_der(OID_cms_data, data, sizeof(data), &p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_content_info_print(stderr, 0, 0, "ContentInfo", d, dlen);
 
- 	p = buf;
 
- 	cp = buf;
 
- 	len = 0;
 
- // 当类型为OID_cms_data, 数据是OCTET STRING,需要再解析一次
 
- 	if (cms_content_info_to_der(OID_cms_data, data, sizeof(data), &p, &len) != 1
 
- 		|| cms_content_info_from_der(&oid, &d, &dlen, &cp, &len) != 1
 
- 		|| asn1_check(oid == OID_cms_data) != 1
 
- //		|| asn1_check(dlen == sizeof(data)) != 1
 
- //		|| asn1_check(memcmp(data, d, dlen) == 0) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_enced_content_info(void)
 
- {
 
- 	uint8_t buf[256];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	uint8_t iv[16] = {0};
 
- 	uint8_t enced[32] = { 0x01,0x02 };
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	int oid;
 
- 	int cipher;
 
- 	const uint8_t *piv;
 
- 	size_t ivlen;
 
- 	const uint8_t *shared_info1;
 
- 	size_t shared_info1_len;
 
- 	const uint8_t *shared_info2;
 
- 	size_t shared_info2_len;
 
- 	if (cms_enced_content_info_to_der(OID_cms_data,
 
- 			OID_sm4_cbc, iv, sizeof(iv), enced, sizeof(enced),
 
- 			NULL, 0, NULL, 0, &p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_enced_content_info_print(stderr, 0, 0, "EncryptedContentInfo", d, dlen);
 
- 	p = buf;
 
- 	cp = buf;
 
- 	len = 0;
 
- 	if (cms_enced_content_info_to_der(OID_cms_data,
 
- 			OID_sm4_cbc, iv, sizeof(iv), enced, sizeof(enced),
 
- 			NULL, 0, NULL, 0, &p, &len) != 1
 
- 		|| cms_enced_content_info_from_der(&oid,
 
- 			&cipher, &piv, &ivlen, &d, &dlen,
 
- 			&shared_info1, &shared_info1_len,
 
- 			&shared_info2, &shared_info2_len, &cp, &len) != 1
 
- 		|| asn1_check(oid == OID_cms_data) != 1
 
- 		|| asn1_check(cipher == OID_sm4_cbc) != 1
 
- 		|| asn1_check(ivlen == sizeof(iv)) != 1
 
- 		|| asn1_check(dlen == sizeof(enced)) != 1
 
- 		|| asn1_check(shared_info1 == NULL) != 1
 
- 		|| asn1_check(shared_info1_len == 0) != 1
 
- 		|| asn1_check(shared_info2 == NULL) != 1
 
- 		|| asn1_check(shared_info2_len == 0) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_enced_content_info_encrypt(void)
 
- {
 
- 	uint8_t buf[256];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	uint8_t key[16] = {0};
 
- 	uint8_t iv[16] = {1};
 
- 	uint8_t data[20] = {2};
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	int oid;
 
- 	int cipher;
 
- 	uint8_t data2[256];
 
- 	const uint8_t *shared_info1;
 
- 	size_t shared_info1_len;
 
- 	const uint8_t *shared_info2;
 
- 	size_t shared_info2_len;
 
- 	if (cms_enced_content_info_encrypt_to_der(
 
- 			OID_sm4_cbc,
 
- 			key, sizeof(key),
 
- 			iv, sizeof(iv),
 
- 			OID_cms_data, data, sizeof(data),
 
- 			NULL, 0,
 
- 			NULL, 0,
 
- 			&p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_enced_content_info_print(stderr, 0, 0, "EncryptedContentInfo", d, dlen);
 
- 	p = buf;
 
- 	cp = buf;
 
- 	len = 0;
 
- 	if (cms_enced_content_info_encrypt_to_der(
 
- 			OID_sm4_cbc,
 
- 			key, sizeof(key),
 
- 			iv, sizeof(iv),
 
- 			OID_cms_data, data, sizeof(data),
 
- 			NULL, 0,
 
- 			NULL, 0,
 
- 			&p, &len) != 1
 
- 		// 显然这个解密函数是有问题的,在from_der的时候不知道密文的长度,因此无法知道需要的输出缓冲长度				
 
- 		|| cms_enced_content_info_decrypt_from_der(
 
- 			&cipher,
 
- 			key, sizeof(key),
 
- 			&oid, data2, &dlen,
 
- 			&shared_info1, &shared_info1_len,
 
- 			&shared_info2, &shared_info2_len,
 
- 			&cp, &len) != 1
 
- 		|| asn1_check(cipher == OID_sm4_cbc) != 1
 
- 		|| asn1_check(oid = OID_cms_data) != 1
 
- 		|| asn1_check(dlen == sizeof(data)) != 1
 
- 		|| asn1_check(memcmp(data, data2, dlen) == 0) != 1
 
- 		|| asn1_check(shared_info1 == NULL) != 1
 
- 		|| asn1_check(shared_info2 == NULL) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_issuer_and_serial_number(void)
 
- {
 
- 	uint8_t buf[256];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	uint8_t issuer[256];
 
- 	size_t issuer_len;
 
- 	uint8_t serial[20] = {1};
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	const uint8_t *pissuer;
 
- 	const uint8_t *pserial;
 
- 	size_t serial_len;
 
- 	if (x509_name_set(issuer, &issuer_len, sizeof(issuer),
 
- 			"CN", "Beijing", "Haidian", "PKU", "CS", "CA") != 1
 
- 		|| cms_issuer_and_serial_number_to_der(
 
- 			issuer, issuer_len, serial, sizeof(serial), &p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_issuer_and_serial_number_print(stderr, 0, 0, "IssuerAndSerialNumber", d, dlen);
 
- 	p = buf;
 
- 	cp = buf;
 
- 	len = 0;
 
- 	if (x509_name_set(issuer, &issuer_len, sizeof(issuer),
 
- 			"CN", "Beijing", "Haidian", "PKU", "CS", "CA") != 1
 
- 		|| cms_issuer_and_serial_number_to_der(
 
- 			issuer, issuer_len, serial, sizeof(serial), &p, &len) != 1
 
- 		|| cms_issuer_and_serial_number_from_der(
 
- 			&pissuer, &issuer_len, &pserial, &serial_len, &cp, &len) != 1
 
- 		|| asn1_check(memcmp(pissuer, issuer, issuer_len) == 0) != 1
 
- 		|| asn1_check(serial_len == sizeof(serial)) != 1
 
- 		|| asn1_check(memcmp(serial, pserial, serial_len) == 0) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_signer_info(void)
 
- {
 
- 	uint8_t buf[512];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	uint8_t issuer_buf[256];
 
- 	size_t issuer_len;
 
- 	uint8_t serial_buf[20];
 
- 	uint8_t sig_buf[256];
 
- 	size_t siglen = sizeof(sig_buf);
 
- 	int version;
 
- 	const uint8_t *issuer;
 
- 	const uint8_t *serial;
 
- 	size_t serial_len;
 
- 	int digest_alg;
 
- 	const uint8_t *auth_attrs;
 
- 	size_t auth_attrs_len;
 
- 	int sig_alg;
 
- 	const uint8_t *sig;
 
- 	const uint8_t *unauth_attrs;
 
- 	size_t unauth_attrs_len;
 
- 	if (x509_name_set(issuer_buf, &issuer_len, sizeof(issuer_buf),
 
- 		"CN", "Beijing", "Haidian", "PKU", "CS", "CA") != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	if (cms_signer_info_to_der(
 
- 			CMS_version_v1,
 
- 			issuer_buf, issuer_len,
 
- 			serial_buf, sizeof(serial_buf),
 
- 			OID_sm3,
 
- 			NULL, 0,
 
- 			OID_sm2sign_with_sm3,
 
- 			sig_buf, siglen,
 
- 			NULL, 0,
 
- 			&p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_signer_info_print(stderr, 0, 0, "SignerInfo", d, dlen);
 
- 	cp = p = buf; len = 0;
 
- 	if (cms_signer_info_to_der(
 
- 			CMS_version_v1,
 
- 			issuer_buf, issuer_len,
 
- 			serial_buf, sizeof(serial_buf),
 
- 			OID_sm3,
 
- 			NULL, 0,
 
- 			OID_sm2sign_with_sm3,
 
- 			sig_buf, siglen,
 
- 			NULL, 0,
 
- 			&p, &len) != 1
 
- 		|| cms_signer_info_from_der(
 
- 			&version,
 
- 			&issuer, &issuer_len,
 
- 			&serial, &serial_len,
 
- 			&digest_alg,
 
- 			&auth_attrs, &auth_attrs_len,
 
- 			&sig_alg,
 
- 			&sig, &siglen,
 
- 			&unauth_attrs, &unauth_attrs_len,
 
- 			&cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_signer_info_sign(void)
 
- {
 
- 	uint8_t buf[1024];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	SM2_KEY sm2_key;
 
- 	uint8_t serial_buf[20];
 
- 	uint8_t name[256];
 
- 	size_t namelen;
 
- 	time_t not_before, not_after;
 
- 	uint8_t certs[1024];
 
- 	size_t certslen = 0;
 
- 	uint8_t *pcerts = certs;
 
- 	SM3_CTX sm3_ctx;
 
- 	const uint8_t *cert;
 
- 	size_t certlen;
 
- 	const uint8_t *serial;
 
- 	const uint8_t *issuer;
 
- 	const uint8_t *auth_attrs;
 
- 	const uint8_t *unauth_attrs;
 
- 	size_t serial_len, issuer_len, auth_attrs_len, unauth_attrs_len;
 
- 	if (sm2_key_generate(&sm2_key) != 1
 
- 		|| rand_bytes(serial_buf, sizeof(serial_buf)) != 1
 
- 		|| x509_name_set(name, &namelen, sizeof(name), "CN", "Beijing", "Haidian", "PKU", "CS", "Alice") != 1
 
- 		|| time(¬_before) == -1
 
- 		|| x509_validity_add_days(¬_after, not_before, 365) != 1
 
- 		|| x509_cert_sign_to_der(
 
- 			X509_version_v3, serial_buf, sizeof(serial_buf),
 
- 			OID_sm2sign_with_sm3,
 
- 			name, namelen,
 
- 			not_before, not_after,
 
- 			name, namelen,
 
- 			&sm2_key, NULL, 0, NULL, 0, NULL, 0,
 
- 			&sm2_key, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
 
- 			&pcerts, &certslen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	sm3_init(&sm3_ctx);
 
- 	sm3_update(&sm3_ctx, (uint8_t *)"hello", 5);
 
- 	cp = p = buf; len = 0;
 
- 	if (cms_signer_info_sign_to_der(
 
- 			&sm3_ctx, &sm2_key,
 
- 			name, namelen, serial_buf, sizeof(serial_buf),
 
- 			NULL, 0, NULL, 0,
 
- 			&p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_signer_info_print(stderr, 0, 0, "SignerInfo", d, dlen);
 
- 	cp = p = buf; len = 0;
 
- 	if (cms_signer_info_sign_to_der(
 
- 			&sm3_ctx, &sm2_key,
 
- 			name, namelen, serial_buf, sizeof(serial_buf),
 
- 			NULL, 0, NULL, 0,
 
- 			&p, &len) != 1
 
- 		|| cms_signer_info_verify_from_der(
 
- 			&sm3_ctx, certs, certslen,
 
- 			&cert, &certlen,
 
- 			&issuer, &issuer_len,
 
- 			&serial, &serial_len,
 
- 			&auth_attrs, &auth_attrs_len,
 
- 			&unauth_attrs, &unauth_attrs_len,
 
- 			&cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_signer_infos(void)
 
- {
 
- 	uint8_t buf[1280];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	uint8_t signer_infos[1024];
 
- 	size_t signer_infos_len = 0;
 
- 	SM3_CTX sm3_ctx;
 
- 	SM2_KEY sm2_key;
 
- 	uint8_t issuer_buf[256];
 
- 	size_t issuer_len;
 
- 	uint8_t serial_buf[20];
 
- 	sm2_key_generate(&sm2_key);
 
- 	sm3_init(&sm3_ctx);
 
- 	sm3_update(&sm3_ctx, (uint8_t *)"hello", 5);
 
- 	x509_name_set(issuer_buf, &issuer_len, sizeof(issuer_buf), "CN", "Beijing", "Haidian", "PKU", "CS", "CA");
 
- 	if (cms_signer_infos_add_signer_info(
 
- 			signer_infos, &signer_infos_len, sizeof(signer_infos),
 
- 			&sm3_ctx, &sm2_key,
 
- 			issuer_buf, issuer_len,
 
- 			serial_buf, sizeof(serial_buf),
 
- 			NULL, 0,
 
- 			NULL, 0) != 1
 
- 		|| cms_signer_infos_add_signer_info(
 
- 			signer_infos, &signer_infos_len, sizeof(signer_infos),
 
- 			&sm3_ctx, &sm2_key,
 
- 			issuer_buf, issuer_len,
 
- 			serial_buf, sizeof(serial_buf),
 
- 			NULL, 0,
 
- 			NULL, 0) != 1
 
- 		|| cms_signer_infos_add_signer_info(
 
- 			signer_infos, &signer_infos_len, sizeof(signer_infos),
 
- 			&sm3_ctx, &sm2_key,
 
- 			issuer_buf, issuer_len,
 
- 			serial_buf, sizeof(serial_buf),
 
- 			NULL, 0,
 
- 			NULL, 0) != 1
 
- 		|| cms_signer_infos_to_der(signer_infos, signer_infos_len, &p, &len) != 1
 
- 		|| cms_signer_infos_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1){
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_signer_infos_print(stderr, 0, 0, "SET OF SignerInfo", d, dlen);
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_digest_algors(void)
 
- {
 
- 	uint8_t buf[512];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	int oids[] = {
 
- 		OID_sm3,
 
- 		OID_md5,
 
- 		OID_sha1,
 
- 		OID_sha256,
 
- 		OID_sha512,
 
- 	};
 
- 	int algs[16];
 
- 	size_t algs_cnt;
 
- 	if (cms_digest_algors_to_der(oids, sizeof(oids)/sizeof(oids[0]), &p, &len) != 1
 
- 		|| asn1_set_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_digest_algors_print(stderr, 0, 0, "digestAlgorithms", d, dlen);
 
- 	if (cms_digest_algors_to_der(oids, sizeof(oids)/sizeof(oids[0]), &p, &len) != 1
 
- 		|| cms_digest_algors_from_der(algs, &algs_cnt, sizeof(algs)/sizeof(algs[0]), &cp, &len) != 1
 
- 		|| asn1_check(algs_cnt == sizeof(oids)/sizeof(oids[0])) != 1
 
- 		|| asn1_check(memcmp(algs, oids, sizeof(oids)) == 0) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_signed_data(void)
 
- {
 
- 	SM2_KEY sm2_key;
 
- 	uint8_t cert[4096];
 
- 	size_t certlen = 0;
 
- 	CMS_CERTS_AND_KEY signers[1];
 
- 	uint8_t data[48] = {0};
 
- 	uint8_t buf[4096];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	sm2_key_generate(&sm2_key);
 
- 	{
 
- 		uint8_t serial[20];
 
- 		size_t serial_len = sizeof(serial);
 
- 		uint8_t name[256];
 
- 		size_t namelen = 0;
 
- 		time_t not_before, not_after;
 
- 		size_t subject_len = 0;
 
- 		uint8_t *p = cert;
 
- 		const uint8_t *cp = cert;
 
- 		rand_bytes(serial, sizeof(serial));
 
- 		x509_name_set(name, &namelen, sizeof(name), "CN", "Beijing", "Haidian", "PKU", "CS", "CA");
 
- 		time(¬_before);
 
- 		x509_validity_add_days(¬_after, not_before, 365);
 
- 		if (x509_cert_sign_to_der(
 
- 			X509_version_v3,
 
- 			serial, sizeof(serial),
 
- 			OID_sm2sign_with_sm3,
 
- 			name, namelen,
 
- 			not_before, not_after,
 
- 			name, namelen,
 
- 			&sm2_key,
 
- 			NULL, 0,
 
- 			NULL, 0,
 
- 			NULL, 0,
 
- 			&sm2_key, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
 
- 			&p, &certlen) != 1) {
 
- 			error_print();
 
- 			return -1;
 
- 		}
 
- 	}
 
- 	signers[0].certs = cert;
 
- 	signers[0].certs_len = certlen;
 
- 	signers[0].sign_key = &sm2_key;
 
- 	if (cms_signed_data_sign_to_der(
 
- 			signers, sizeof(signers)/sizeof(signers[0]),
 
- 			OID_cms_data, data, sizeof(data),
 
- 			NULL, 0,
 
- 			&p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_signed_data_print(stderr, 0, 0, "SignedData", d, dlen);
 
- 	cp = p = buf; len = 0;
 
- 	{
 
- 		int content_type;
 
- 		const uint8_t *content;
 
- 		size_t content_len;
 
- 		const uint8_t *certs;
 
- 		size_t certslen;
 
- 		const uint8_t *crls;
 
- 		size_t crlslen;
 
- 		const uint8_t *signer_infos;
 
- 		size_t signer_infos_len;
 
- 		if (cms_signed_data_sign_to_der(
 
- 				signers, sizeof(signers)/sizeof(signers[0]),
 
- 				OID_cms_data, data, sizeof(data),
 
- 				NULL, 0,
 
- 				&p, &len) != 1
 
- 			|| cms_signed_data_verify_from_der(
 
- 				NULL, 0,
 
- 				NULL, 0,
 
- 				&content_type, &content, &content_len,
 
- 				&certs, &certslen,
 
- 				&crls, &crlslen,
 
- 				&signer_infos, &signer_infos_len,
 
- 				&cp, &len) != 1
 
- 			|| asn1_length_is_zero(len) != 1) {
 
- 			error_print();
 
- 			return -1;
 
- 		}
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_recipient_info(void)
 
- {
 
- 	SM2_KEY sm2_key;
 
- 	uint8_t name[256];
 
- 	size_t namelen;
 
- 	uint8_t serial_buf[20];
 
- 	uint8_t in[16];
 
- 	uint8_t buf[1024];
 
- 	uint8_t *p = buf;
 
- 	const uint8_t *cp = buf;
 
- 	size_t len = 0;
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	int version;
 
- 	const uint8_t *issuer;
 
- 	size_t issuer_len;
 
- 	const uint8_t *serial;
 
- 	size_t serial_len;
 
- 	int pke_algor;
 
- 	const uint8_t *params;
 
- 	size_t params_len;
 
- 	const uint8_t *enced_key;
 
- 	size_t enced_key_len;
 
- 	uint8_t out[sizeof(in)];
 
- 	size_t outlen;
 
- 	sm2_key_generate(&sm2_key);
 
- 	x509_name_set(name, &namelen, sizeof(name), "US", "CA", NULL, "BB", "AA", "CC");
 
- 	rand_bytes(serial_buf, sizeof(serial_buf));
 
- 	rand_bytes(in, sizeof(in));
 
- 	if (cms_recipient_info_encrypt_to_der(&sm2_key,
 
- 			name, namelen,
 
- 			serial_buf, sizeof(serial_buf),
 
- 			in, sizeof(in),
 
- 			&p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_recipient_info_print(stderr, 0, 0, "RecipientInfo", d, dlen);
 
- 	cp = p = buf; len = 0;
 
- 	if (cms_recipient_info_encrypt_to_der(&sm2_key,
 
- 			name, namelen,
 
- 			serial_buf, sizeof(serial_buf),
 
- 			in, sizeof(in),
 
- 			&p, &len) != 1
 
- 		|| cms_recipient_info_from_der(
 
- 			&version,
 
- 			&issuer, &issuer_len,
 
- 			&serial, &serial_len,
 
- 			&pke_algor, ¶ms, ¶ms_len,
 
- 			&enced_key, &enced_key_len,
 
- 			&cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cp = p = buf; len = 0;
 
- 	if (cms_recipient_info_encrypt_to_der(
 
- 			&sm2_key,
 
- 			name, namelen,
 
- 			serial_buf, sizeof(serial_buf),
 
- 			in, sizeof(in),
 
- 			&p, &len) != 1
 
- 		|| cms_recipient_info_decrypt_from_der(
 
- 			&sm2_key,
 
- 			name, namelen,
 
- 			serial_buf, sizeof(serial_buf),
 
- 			out, &outlen, sizeof(out),
 
- 			&cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	if (sizeof(in) != outlen
 
- 		|| memcmp(in, out, outlen) != 0) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- int test_cms_enveloped_data(void)
 
- {
 
- 	SM2_KEY sm2_key1;
 
- 	uint8_t name1[256];
 
- 	size_t name1_len;
 
- 	uint8_t serial1[20];
 
- 	SM2_KEY sm2_key2;
 
- 	uint8_t name2[256];
 
- 	size_t name2_len;
 
- 	uint8_t serial2[20];
 
- 	time_t not_before, not_after;
 
- 	uint8_t certs[2048];
 
- 	size_t certslen;
 
- 	uint8_t key[16];
 
- 	uint8_t iv[16];
 
- 	uint8_t in[80];
 
- 	uint8_t out[256];
 
- 	size_t outlen;
 
- 	uint8_t buf[4096];
 
- 	uint8_t *p;
 
- 	const uint8_t *cp;
 
- 	size_t len;
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	// prepare keys and certs
 
- 	if (time(¬_before) == -1
 
- 		|| x509_validity_add_days(¬_after, not_before, 365) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	p = certs;
 
- 	certslen = 0;
 
- 	if (sm2_key_generate(&sm2_key1) != 1
 
- 		|| rand_bytes(serial1, sizeof(serial1)) != 1
 
- 		|| x509_name_set(name1, &name1_len, sizeof(name1), "CN", "Beijing", "Haidian", "PKU", "CS", "Alice") != 1
 
- 		|| x509_cert_sign_to_der(
 
- 			X509_version_v3,
 
- 			serial1, sizeof(serial1),
 
- 			OID_sm2sign_with_sm3,
 
- 			name1, name1_len,
 
- 			not_before, not_after,
 
- 			name1, name1_len,
 
- 			&sm2_key1, NULL, 0, NULL, 0, NULL, 0,
 
- 			&sm2_key1, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
 
- 			&p, &certslen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	if (sm2_key_generate(&sm2_key2) != 1
 
- 		|| rand_bytes(serial2, sizeof(serial2)) != 1
 
- 		|| x509_name_set(name2, &name2_len, sizeof(name2), "CN", "Beijing", "Haidian", "PKU", "CS", "Bob") != 1
 
- 		|| x509_cert_sign_to_der(
 
- 			X509_version_v3,
 
- 			serial2, sizeof(serial2),
 
- 			OID_sm2sign_with_sm3,
 
- 			name2, name2_len,
 
- 			not_before, not_after,
 
- 			name2, name2_len,
 
- 			&sm2_key2, NULL, 0, NULL, 0, NULL, 0,
 
- 			&sm2_key2, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
 
- 			&p, &certslen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	rand_bytes(key, sizeof(key));
 
- 	rand_bytes(iv, sizeof(iv));
 
- 	rand_bytes(in, sizeof(in));
 
- 	// test
 
- 	cp = p = buf; len = 0;
 
- 	if (cms_enveloped_data_encrypt_to_der(
 
- 			certs, certslen,
 
- 			OID_sm4_cbc, key, sizeof(key), iv, sizeof(iv),
 
- 			OID_cms_data, in, sizeof(in),
 
- 			NULL, 0, NULL, 0,
 
- 			&p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_enveloped_data_print(stderr, 0, 0, "EnvelopedData", d, dlen);
 
- 	int content_type;
 
- 	cp = p = buf; len = 0;
 
- 	if (cms_enveloped_data_encrypt_to_der(
 
- 			certs, certslen,
 
- 			OID_sm4_cbc, key, sizeof(key), iv, sizeof(iv),
 
- 			OID_cms_data, in, sizeof(in),
 
- 			NULL, 0, NULL, 0,
 
- 			&p, &len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	const uint8_t *rcpt_infos;
 
- 	const uint8_t *shared_info1;
 
- 	const uint8_t *shared_info2;
 
- 	size_t rcpt_infos_len, shared_info1_len, shared_info2_len;
 
- 	if (cms_enveloped_data_decrypt_from_der(
 
- 			&sm2_key1,
 
- 			name1, name1_len,
 
- 			serial1, sizeof(serial1),
 
- 			&content_type, out, &outlen,
 
- 			&rcpt_infos, &rcpt_infos_len,
 
- 			&shared_info1, &shared_info1_len,
 
- 			&shared_info2, &shared_info2_len,
 
- 			&cp, &len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_signed_and_enveloped_data(void)
 
- {
 
- /*
 
- 	SM2_KEY sign_key;
 
- 	SM2_KEY decr_key;
 
- 	uint8_t sign_serial[20];
 
- 	uint8_t sign_name[256];
 
- 	size_t sign_name_len;
 
- */
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_cms_key_agreement_info(void)
 
- {
 
- 	SM2_KEY sm2_key;
 
- 	uint8_t name[256];
 
- 	size_t namelen;
 
- 	uint8_t serial[20];
 
- 	time_t not_before, not_after;
 
- 	uint8_t cert[2048];
 
- 	size_t certlen = 0;
 
- 	uint8_t buf[4096];
 
- 	uint8_t *p;
 
- 	const uint8_t *cp;
 
- 	size_t len;
 
- 	const uint8_t *d;
 
- 	size_t dlen;
 
- 	int version;
 
- 	SM2_KEY public_key;
 
- 	const uint8_t *pcert;
 
- 	size_t pcertlen;
 
- 	const uint8_t *id;
 
- 	size_t idlen;
 
- 	p = cert;
 
- 	if (sm2_key_generate(&sm2_key) != 1
 
- 		|| rand_bytes(serial, sizeof(serial)) != 1
 
- 		|| x509_name_set(name, &namelen, sizeof(name), "CN", "Beijing", "Haidian", "PKU", "CS", "Alice") != 1
 
- 		|| time(¬_before) == - 1
 
- 		|| x509_validity_add_days(¬_after, not_before, 365) != 1
 
- 		|| x509_cert_sign_to_der(
 
- 			X509_version_v3,
 
- 			serial, sizeof(serial),
 
- 			OID_sm2sign_with_sm3,
 
- 			name, namelen,
 
- 			not_before, not_after,
 
- 			name, namelen,
 
- 			&sm2_key, NULL, 0, NULL, 0, NULL, 0,
 
- 			&sm2_key, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
 
- 			&p, &certlen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cp = p = buf; len = 0;
 
- 	if (cms_key_agreement_info_to_der(
 
- 			CMS_version_v1,
 
- 			&sm2_key,
 
- 			cert, certlen,
 
- 			(uint8_t *)SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
 
- 			&p, &len) != 1
 
- 		|| asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	cms_key_agreement_info_print(stderr, 0, 0, "KeyAgreementInfo", d, dlen);
 
- 	cp = p = buf; len = 0;
 
- 	if (cms_key_agreement_info_to_der(
 
- 			CMS_version_v1,
 
- 			&sm2_key,
 
- 			cert, certlen,
 
- 			(uint8_t *)SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
 
- 			&p, &len) != 1
 
- 		|| cms_key_agreement_info_from_der(
 
- 			&version,
 
- 			&public_key,
 
- 			&pcert, &pcertlen,
 
- 			&id, &idlen,
 
- 			&cp, &len) != 1
 
- 		|| asn1_check(version == CMS_version_v1) != 1
 
- 		|| asn1_length_is_zero(len) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	if (sm2_public_key_equ(&sm2_key, &public_key) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	if (pcertlen != certlen
 
- 		|| memcmp(pcert, cert, certlen) != 0
 
- 		|| idlen != SM2_DEFAULT_ID_LENGTH
 
- 		|| memcmp(SM2_DEFAULT_ID, id, idlen) != 0) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- int main(int argc, char **argv)
 
- {
 
- 	if (test_cms_content_type() != 1) goto err;
 
- 	if (test_cms_content_info() != 1) goto err;
 
- 	if (test_cms_enced_content_info() != 1) goto err;
 
- 	if (test_cms_enced_content_info_encrypt() != 1) goto err;
 
- 	if (test_cms_issuer_and_serial_number() != 1) goto err;
 
- 	if (test_cms_signer_info() != 1) goto err;
 
- 	if (test_cms_signer_info_sign() != 1) goto err;
 
- 	if (test_cms_signer_infos() != 1) goto err;
 
- 	if (test_cms_digest_algors() != 1) goto err;
 
- 	if (test_cms_signed_data() != 1) goto err;
 
- 	if (test_cms_recipient_info() != 1) goto err;
 
- 	if (test_cms_enveloped_data() != 1) goto err;
 
- 	if (test_cms_key_agreement_info() != 1) goto err;
 
- 	printf("%s all tests passed\n", __FILE__);
 
- 	return 0;
 
- err:
 
- 	error_print();
 
- 	return -1;
 
- }
 
 
  |