123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002 |
- /*
- * Copyright 2014-2022 The GmSSL Project. All Rights Reserved.
- *
- * Licensed under the Apache License, Version 2.0 (the License); you may
- * not use this file except in compliance with the License.
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- */
- #include <stdio.h>
- #include <string.h>
- #include <stdlib.h>
- #include <gmssl/oid.h>
- #include <gmssl/x509.h>
- #include <gmssl/rand.h>
- #include <gmssl/error.h>
- #include <gmssl/sm4.h>
- #include <gmssl/cms.h>
- static int test_cms_content_type(void)
- {
- int tests[] = {
- OID_cms_data,
- OID_cms_signed_data,
- OID_cms_enveloped_data,
- OID_cms_signed_and_enveloped_data,
- OID_cms_encrypted_data,
- OID_cms_key_agreement_info,
- };
- uint8_t buf[256];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- int i;
- for (i = 0; i < sizeof(tests)/sizeof(tests[0]); i++) {
- if (cms_content_type_to_der(tests[i], &p, &len) != 1) {
- error_print();
- return -1;
- }
- format_bytes(stderr, 0, 4, "", buf, len);
- }
- for (i = 0; i < sizeof(tests)/sizeof(tests[0]); i++) {
- int oid;
- if (cms_content_type_from_der(&oid, &cp, &len) != 1
- || asn1_check(oid == tests[i]) != 1) {
- error_print();
- return -1;
- }
- format_print(stderr, 0, 4, "%s\n", cms_content_type_name(oid));
- }
- (void)asn1_length_is_zero(len);
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_content_info(void)
- {
- uint8_t buf[256];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- uint8_t data[20] = { 0x01,0x02 };
- int oid;
- const uint8_t *d;
- size_t dlen;
- if (cms_content_info_to_der(OID_cms_data, data, sizeof(data), &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_content_info_print(stderr, 0, 0, "ContentInfo", d, dlen);
- p = buf;
- cp = buf;
- len = 0;
- // 当类型为OID_cms_data, 数据是OCTET STRING,需要再解析一次
- if (cms_content_info_to_der(OID_cms_data, data, sizeof(data), &p, &len) != 1
- || cms_content_info_from_der(&oid, &d, &dlen, &cp, &len) != 1
- || asn1_check(oid == OID_cms_data) != 1
- // || asn1_check(dlen == sizeof(data)) != 1
- // || asn1_check(memcmp(data, d, dlen) == 0) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_enced_content_info(void)
- {
- uint8_t buf[256];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- uint8_t iv[16] = {0};
- uint8_t enced[32] = { 0x01,0x02 };
- const uint8_t *d;
- size_t dlen;
- int oid;
- int cipher;
- const uint8_t *piv;
- size_t ivlen;
- const uint8_t *shared_info1;
- size_t shared_info1_len;
- const uint8_t *shared_info2;
- size_t shared_info2_len;
- if (cms_enced_content_info_to_der(OID_cms_data,
- OID_sm4_cbc, iv, sizeof(iv), enced, sizeof(enced),
- NULL, 0, NULL, 0, &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_enced_content_info_print(stderr, 0, 0, "EncryptedContentInfo", d, dlen);
- p = buf;
- cp = buf;
- len = 0;
- if (cms_enced_content_info_to_der(OID_cms_data,
- OID_sm4_cbc, iv, sizeof(iv), enced, sizeof(enced),
- NULL, 0, NULL, 0, &p, &len) != 1
- || cms_enced_content_info_from_der(&oid,
- &cipher, &piv, &ivlen, &d, &dlen,
- &shared_info1, &shared_info1_len,
- &shared_info2, &shared_info2_len, &cp, &len) != 1
- || asn1_check(oid == OID_cms_data) != 1
- || asn1_check(cipher == OID_sm4_cbc) != 1
- || asn1_check(ivlen == sizeof(iv)) != 1
- || asn1_check(dlen == sizeof(enced)) != 1
- || asn1_check(shared_info1 == NULL) != 1
- || asn1_check(shared_info1_len == 0) != 1
- || asn1_check(shared_info2 == NULL) != 1
- || asn1_check(shared_info2_len == 0) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_enced_content_info_encrypt(void)
- {
- uint8_t buf[256];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- uint8_t key[16] = {0};
- uint8_t iv[16] = {1};
- uint8_t data[20] = {2};
- const uint8_t *d;
- size_t dlen;
- int oid;
- int cipher;
- uint8_t data2[256];
- const uint8_t *shared_info1;
- size_t shared_info1_len;
- const uint8_t *shared_info2;
- size_t shared_info2_len;
- if (cms_enced_content_info_encrypt_to_der(
- OID_sm4_cbc,
- key, sizeof(key),
- iv, sizeof(iv),
- OID_cms_data, data, sizeof(data),
- NULL, 0,
- NULL, 0,
- &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_enced_content_info_print(stderr, 0, 0, "EncryptedContentInfo", d, dlen);
- p = buf;
- cp = buf;
- len = 0;
- if (cms_enced_content_info_encrypt_to_der(
- OID_sm4_cbc,
- key, sizeof(key),
- iv, sizeof(iv),
- OID_cms_data, data, sizeof(data),
- NULL, 0,
- NULL, 0,
- &p, &len) != 1
- // 显然这个解密函数是有问题的,在from_der的时候不知道密文的长度,因此无法知道需要的输出缓冲长度
- || cms_enced_content_info_decrypt_from_der(
- &cipher,
- key, sizeof(key),
- &oid, data2, &dlen,
- &shared_info1, &shared_info1_len,
- &shared_info2, &shared_info2_len,
- &cp, &len) != 1
- || asn1_check(cipher == OID_sm4_cbc) != 1
- || asn1_check(oid = OID_cms_data) != 1
- || asn1_check(dlen == sizeof(data)) != 1
- || asn1_check(memcmp(data, data2, dlen) == 0) != 1
- || asn1_check(shared_info1 == NULL) != 1
- || asn1_check(shared_info2 == NULL) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_issuer_and_serial_number(void)
- {
- uint8_t buf[256];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- uint8_t issuer[256];
- size_t issuer_len;
- uint8_t serial[20] = {1};
- const uint8_t *d;
- size_t dlen;
- const uint8_t *pissuer;
- const uint8_t *pserial;
- size_t serial_len;
- if (x509_name_set(issuer, &issuer_len, sizeof(issuer),
- "CN", "Beijing", "Haidian", "PKU", "CS", "CA") != 1
- || cms_issuer_and_serial_number_to_der(
- issuer, issuer_len, serial, sizeof(serial), &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_issuer_and_serial_number_print(stderr, 0, 0, "IssuerAndSerialNumber", d, dlen);
- p = buf;
- cp = buf;
- len = 0;
- if (x509_name_set(issuer, &issuer_len, sizeof(issuer),
- "CN", "Beijing", "Haidian", "PKU", "CS", "CA") != 1
- || cms_issuer_and_serial_number_to_der(
- issuer, issuer_len, serial, sizeof(serial), &p, &len) != 1
- || cms_issuer_and_serial_number_from_der(
- &pissuer, &issuer_len, &pserial, &serial_len, &cp, &len) != 1
- || asn1_check(memcmp(pissuer, issuer, issuer_len) == 0) != 1
- || asn1_check(serial_len == sizeof(serial)) != 1
- || asn1_check(memcmp(serial, pserial, serial_len) == 0) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_signer_info(void)
- {
- uint8_t buf[512];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- const uint8_t *d;
- size_t dlen;
- uint8_t issuer_buf[256];
- size_t issuer_len;
- uint8_t serial_buf[20];
- uint8_t sig_buf[256];
- size_t siglen = sizeof(sig_buf);
- int version;
- const uint8_t *issuer;
- const uint8_t *serial;
- size_t serial_len;
- int digest_alg;
- const uint8_t *auth_attrs;
- size_t auth_attrs_len;
- int sig_alg;
- const uint8_t *sig;
- const uint8_t *unauth_attrs;
- size_t unauth_attrs_len;
- if (x509_name_set(issuer_buf, &issuer_len, sizeof(issuer_buf),
- "CN", "Beijing", "Haidian", "PKU", "CS", "CA") != 1) {
- error_print();
- return -1;
- }
- if (cms_signer_info_to_der(
- CMS_version_v1,
- issuer_buf, issuer_len,
- serial_buf, sizeof(serial_buf),
- OID_sm3,
- NULL, 0,
- OID_sm2sign_with_sm3,
- sig_buf, siglen,
- NULL, 0,
- &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_signer_info_print(stderr, 0, 0, "SignerInfo", d, dlen);
- cp = p = buf; len = 0;
- if (cms_signer_info_to_der(
- CMS_version_v1,
- issuer_buf, issuer_len,
- serial_buf, sizeof(serial_buf),
- OID_sm3,
- NULL, 0,
- OID_sm2sign_with_sm3,
- sig_buf, siglen,
- NULL, 0,
- &p, &len) != 1
- || cms_signer_info_from_der(
- &version,
- &issuer, &issuer_len,
- &serial, &serial_len,
- &digest_alg,
- &auth_attrs, &auth_attrs_len,
- &sig_alg,
- &sig, &siglen,
- &unauth_attrs, &unauth_attrs_len,
- &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_signer_info_sign(void)
- {
- uint8_t buf[1024];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- const uint8_t *d;
- size_t dlen;
- SM2_KEY sm2_key;
- uint8_t serial_buf[20];
- uint8_t name[256];
- size_t namelen;
- time_t not_before, not_after;
- uint8_t certs[1024];
- size_t certslen = 0;
- uint8_t *pcerts = certs;
- SM3_CTX sm3_ctx;
- const uint8_t *cert;
- size_t certlen;
- const uint8_t *serial;
- const uint8_t *issuer;
- const uint8_t *auth_attrs;
- const uint8_t *unauth_attrs;
- size_t serial_len, issuer_len, auth_attrs_len, unauth_attrs_len;
- if (sm2_key_generate(&sm2_key) != 1
- || rand_bytes(serial_buf, sizeof(serial_buf)) != 1
- || x509_name_set(name, &namelen, sizeof(name), "CN", "Beijing", "Haidian", "PKU", "CS", "Alice") != 1
- || time(¬_before) == -1
- || x509_validity_add_days(¬_after, not_before, 365) != 1
- || x509_cert_sign_to_der(
- X509_version_v3, serial_buf, sizeof(serial_buf),
- OID_sm2sign_with_sm3,
- name, namelen,
- not_before, not_after,
- name, namelen,
- &sm2_key, NULL, 0, NULL, 0, NULL, 0,
- &sm2_key, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
- &pcerts, &certslen) != 1) {
- error_print();
- return -1;
- }
- sm3_init(&sm3_ctx);
- sm3_update(&sm3_ctx, (uint8_t *)"hello", 5);
- cp = p = buf; len = 0;
- if (cms_signer_info_sign_to_der(
- &sm3_ctx, &sm2_key,
- name, namelen, serial_buf, sizeof(serial_buf),
- NULL, 0, NULL, 0,
- &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_signer_info_print(stderr, 0, 0, "SignerInfo", d, dlen);
- cp = p = buf; len = 0;
- if (cms_signer_info_sign_to_der(
- &sm3_ctx, &sm2_key,
- name, namelen, serial_buf, sizeof(serial_buf),
- NULL, 0, NULL, 0,
- &p, &len) != 1
- || cms_signer_info_verify_from_der(
- &sm3_ctx, certs, certslen,
- &cert, &certlen,
- &issuer, &issuer_len,
- &serial, &serial_len,
- &auth_attrs, &auth_attrs_len,
- &unauth_attrs, &unauth_attrs_len,
- &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_signer_infos(void)
- {
- uint8_t buf[1280];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- const uint8_t *d;
- size_t dlen;
- uint8_t signer_infos[1024];
- size_t signer_infos_len = 0;
- SM3_CTX sm3_ctx;
- SM2_KEY sm2_key;
- uint8_t issuer_buf[256];
- size_t issuer_len;
- uint8_t serial_buf[20];
- sm2_key_generate(&sm2_key);
- sm3_init(&sm3_ctx);
- sm3_update(&sm3_ctx, (uint8_t *)"hello", 5);
- x509_name_set(issuer_buf, &issuer_len, sizeof(issuer_buf), "CN", "Beijing", "Haidian", "PKU", "CS", "CA");
- if (cms_signer_infos_add_signer_info(
- signer_infos, &signer_infos_len, sizeof(signer_infos),
- &sm3_ctx, &sm2_key,
- issuer_buf, issuer_len,
- serial_buf, sizeof(serial_buf),
- NULL, 0,
- NULL, 0) != 1
- || cms_signer_infos_add_signer_info(
- signer_infos, &signer_infos_len, sizeof(signer_infos),
- &sm3_ctx, &sm2_key,
- issuer_buf, issuer_len,
- serial_buf, sizeof(serial_buf),
- NULL, 0,
- NULL, 0) != 1
- || cms_signer_infos_add_signer_info(
- signer_infos, &signer_infos_len, sizeof(signer_infos),
- &sm3_ctx, &sm2_key,
- issuer_buf, issuer_len,
- serial_buf, sizeof(serial_buf),
- NULL, 0,
- NULL, 0) != 1
- || cms_signer_infos_to_der(signer_infos, signer_infos_len, &p, &len) != 1
- || cms_signer_infos_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1){
- error_print();
- return -1;
- }
- cms_signer_infos_print(stderr, 0, 0, "SET OF SignerInfo", d, dlen);
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_digest_algors(void)
- {
- uint8_t buf[512];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- const uint8_t *d;
- size_t dlen;
- int oids[] = {
- OID_sm3,
- OID_md5,
- OID_sha1,
- OID_sha256,
- OID_sha512,
- };
- int algs[16];
- size_t algs_cnt;
- if (cms_digest_algors_to_der(oids, sizeof(oids)/sizeof(oids[0]), &p, &len) != 1
- || asn1_set_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_digest_algors_print(stderr, 0, 0, "digestAlgorithms", d, dlen);
- if (cms_digest_algors_to_der(oids, sizeof(oids)/sizeof(oids[0]), &p, &len) != 1
- || cms_digest_algors_from_der(algs, &algs_cnt, sizeof(algs)/sizeof(algs[0]), &cp, &len) != 1
- || asn1_check(algs_cnt == sizeof(oids)/sizeof(oids[0])) != 1
- || asn1_check(memcmp(algs, oids, sizeof(oids)) == 0) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_signed_data(void)
- {
- SM2_KEY sm2_key;
- uint8_t cert[4096];
- size_t certlen = 0;
- CMS_CERTS_AND_KEY signers[1];
- uint8_t data[48] = {0};
- uint8_t buf[4096];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- const uint8_t *d;
- size_t dlen;
- sm2_key_generate(&sm2_key);
- {
- uint8_t serial[20];
- size_t serial_len = sizeof(serial);
- uint8_t name[256];
- size_t namelen = 0;
- time_t not_before, not_after;
- size_t subject_len = 0;
- uint8_t *p = cert;
- const uint8_t *cp = cert;
- rand_bytes(serial, sizeof(serial));
- x509_name_set(name, &namelen, sizeof(name), "CN", "Beijing", "Haidian", "PKU", "CS", "CA");
- time(¬_before);
- x509_validity_add_days(¬_after, not_before, 365);
- if (x509_cert_sign_to_der(
- X509_version_v3,
- serial, sizeof(serial),
- OID_sm2sign_with_sm3,
- name, namelen,
- not_before, not_after,
- name, namelen,
- &sm2_key,
- NULL, 0,
- NULL, 0,
- NULL, 0,
- &sm2_key, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
- &p, &certlen) != 1) {
- error_print();
- return -1;
- }
- }
- signers[0].certs = cert;
- signers[0].certs_len = certlen;
- signers[0].sign_key = &sm2_key;
- if (cms_signed_data_sign_to_der(
- signers, sizeof(signers)/sizeof(signers[0]),
- OID_cms_data, data, sizeof(data),
- NULL, 0,
- &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_signed_data_print(stderr, 0, 0, "SignedData", d, dlen);
- cp = p = buf; len = 0;
- {
- int content_type;
- const uint8_t *content;
- size_t content_len;
- const uint8_t *certs;
- size_t certslen;
- const uint8_t *crls;
- size_t crlslen;
- const uint8_t *signer_infos;
- size_t signer_infos_len;
- if (cms_signed_data_sign_to_der(
- signers, sizeof(signers)/sizeof(signers[0]),
- OID_cms_data, data, sizeof(data),
- NULL, 0,
- &p, &len) != 1
- || cms_signed_data_verify_from_der(
- NULL, 0,
- NULL, 0,
- &content_type, &content, &content_len,
- &certs, &certslen,
- &crls, &crlslen,
- &signer_infos, &signer_infos_len,
- &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_recipient_info(void)
- {
- SM2_KEY sm2_key;
- uint8_t name[256];
- size_t namelen;
- uint8_t serial_buf[20];
- uint8_t in[16];
- uint8_t buf[1024];
- uint8_t *p = buf;
- const uint8_t *cp = buf;
- size_t len = 0;
- const uint8_t *d;
- size_t dlen;
- int version;
- const uint8_t *issuer;
- size_t issuer_len;
- const uint8_t *serial;
- size_t serial_len;
- int pke_algor;
- const uint8_t *params;
- size_t params_len;
- const uint8_t *enced_key;
- size_t enced_key_len;
- uint8_t out[sizeof(in)];
- size_t outlen;
- sm2_key_generate(&sm2_key);
- x509_name_set(name, &namelen, sizeof(name), "US", "CA", NULL, "BB", "AA", "CC");
- rand_bytes(serial_buf, sizeof(serial_buf));
- rand_bytes(in, sizeof(in));
- if (cms_recipient_info_encrypt_to_der(&sm2_key,
- name, namelen,
- serial_buf, sizeof(serial_buf),
- in, sizeof(in),
- &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_recipient_info_print(stderr, 0, 0, "RecipientInfo", d, dlen);
- cp = p = buf; len = 0;
- if (cms_recipient_info_encrypt_to_der(&sm2_key,
- name, namelen,
- serial_buf, sizeof(serial_buf),
- in, sizeof(in),
- &p, &len) != 1
- || cms_recipient_info_from_der(
- &version,
- &issuer, &issuer_len,
- &serial, &serial_len,
- &pke_algor, ¶ms, ¶ms_len,
- &enced_key, &enced_key_len,
- &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cp = p = buf; len = 0;
- if (cms_recipient_info_encrypt_to_der(
- &sm2_key,
- name, namelen,
- serial_buf, sizeof(serial_buf),
- in, sizeof(in),
- &p, &len) != 1
- || cms_recipient_info_decrypt_from_der(
- &sm2_key,
- name, namelen,
- serial_buf, sizeof(serial_buf),
- out, &outlen, sizeof(out),
- &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- if (sizeof(in) != outlen
- || memcmp(in, out, outlen) != 0) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- int test_cms_enveloped_data(void)
- {
- SM2_KEY sm2_key1;
- uint8_t name1[256];
- size_t name1_len;
- uint8_t serial1[20];
- SM2_KEY sm2_key2;
- uint8_t name2[256];
- size_t name2_len;
- uint8_t serial2[20];
- time_t not_before, not_after;
- uint8_t certs[2048];
- size_t certslen;
- uint8_t key[16];
- uint8_t iv[16];
- uint8_t in[80];
- uint8_t out[256];
- size_t outlen;
- uint8_t buf[4096];
- uint8_t *p;
- const uint8_t *cp;
- size_t len;
- const uint8_t *d;
- size_t dlen;
- // prepare keys and certs
- if (time(¬_before) == -1
- || x509_validity_add_days(¬_after, not_before, 365) != 1) {
- error_print();
- return -1;
- }
- p = certs;
- certslen = 0;
- if (sm2_key_generate(&sm2_key1) != 1
- || rand_bytes(serial1, sizeof(serial1)) != 1
- || x509_name_set(name1, &name1_len, sizeof(name1), "CN", "Beijing", "Haidian", "PKU", "CS", "Alice") != 1
- || x509_cert_sign_to_der(
- X509_version_v3,
- serial1, sizeof(serial1),
- OID_sm2sign_with_sm3,
- name1, name1_len,
- not_before, not_after,
- name1, name1_len,
- &sm2_key1, NULL, 0, NULL, 0, NULL, 0,
- &sm2_key1, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
- &p, &certslen) != 1) {
- error_print();
- return -1;
- }
- if (sm2_key_generate(&sm2_key2) != 1
- || rand_bytes(serial2, sizeof(serial2)) != 1
- || x509_name_set(name2, &name2_len, sizeof(name2), "CN", "Beijing", "Haidian", "PKU", "CS", "Bob") != 1
- || x509_cert_sign_to_der(
- X509_version_v3,
- serial2, sizeof(serial2),
- OID_sm2sign_with_sm3,
- name2, name2_len,
- not_before, not_after,
- name2, name2_len,
- &sm2_key2, NULL, 0, NULL, 0, NULL, 0,
- &sm2_key2, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
- &p, &certslen) != 1) {
- error_print();
- return -1;
- }
- rand_bytes(key, sizeof(key));
- rand_bytes(iv, sizeof(iv));
- rand_bytes(in, sizeof(in));
- // test
- cp = p = buf; len = 0;
- if (cms_enveloped_data_encrypt_to_der(
- certs, certslen,
- OID_sm4_cbc, key, sizeof(key), iv, sizeof(iv),
- OID_cms_data, in, sizeof(in),
- NULL, 0, NULL, 0,
- &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_enveloped_data_print(stderr, 0, 0, "EnvelopedData", d, dlen);
- int content_type;
- cp = p = buf; len = 0;
- if (cms_enveloped_data_encrypt_to_der(
- certs, certslen,
- OID_sm4_cbc, key, sizeof(key), iv, sizeof(iv),
- OID_cms_data, in, sizeof(in),
- NULL, 0, NULL, 0,
- &p, &len) != 1) {
- error_print();
- return -1;
- }
- const uint8_t *rcpt_infos;
- const uint8_t *shared_info1;
- const uint8_t *shared_info2;
- size_t rcpt_infos_len, shared_info1_len, shared_info2_len;
- if (cms_enveloped_data_decrypt_from_der(
- &sm2_key1,
- name1, name1_len,
- serial1, sizeof(serial1),
- &content_type, out, &outlen,
- &rcpt_infos, &rcpt_infos_len,
- &shared_info1, &shared_info1_len,
- &shared_info2, &shared_info2_len,
- &cp, &len) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_signed_and_enveloped_data(void)
- {
- /*
- SM2_KEY sign_key;
- SM2_KEY decr_key;
- uint8_t sign_serial[20];
- uint8_t sign_name[256];
- size_t sign_name_len;
- */
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_cms_key_agreement_info(void)
- {
- SM2_KEY sm2_key;
- uint8_t name[256];
- size_t namelen;
- uint8_t serial[20];
- time_t not_before, not_after;
- uint8_t cert[2048];
- size_t certlen = 0;
- uint8_t buf[4096];
- uint8_t *p;
- const uint8_t *cp;
- size_t len;
- const uint8_t *d;
- size_t dlen;
- int version;
- SM2_KEY public_key;
- const uint8_t *pcert;
- size_t pcertlen;
- const uint8_t *id;
- size_t idlen;
- p = cert;
- if (sm2_key_generate(&sm2_key) != 1
- || rand_bytes(serial, sizeof(serial)) != 1
- || x509_name_set(name, &namelen, sizeof(name), "CN", "Beijing", "Haidian", "PKU", "CS", "Alice") != 1
- || time(¬_before) == - 1
- || x509_validity_add_days(¬_after, not_before, 365) != 1
- || x509_cert_sign_to_der(
- X509_version_v3,
- serial, sizeof(serial),
- OID_sm2sign_with_sm3,
- name, namelen,
- not_before, not_after,
- name, namelen,
- &sm2_key, NULL, 0, NULL, 0, NULL, 0,
- &sm2_key, SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
- &p, &certlen) != 1) {
- error_print();
- return -1;
- }
- cp = p = buf; len = 0;
- if (cms_key_agreement_info_to_der(
- CMS_version_v1,
- &sm2_key,
- cert, certlen,
- (uint8_t *)SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
- &p, &len) != 1
- || asn1_sequence_from_der(&d, &dlen, &cp, &len) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- cms_key_agreement_info_print(stderr, 0, 0, "KeyAgreementInfo", d, dlen);
- cp = p = buf; len = 0;
- if (cms_key_agreement_info_to_der(
- CMS_version_v1,
- &sm2_key,
- cert, certlen,
- (uint8_t *)SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH,
- &p, &len) != 1
- || cms_key_agreement_info_from_der(
- &version,
- &public_key,
- &pcert, &pcertlen,
- &id, &idlen,
- &cp, &len) != 1
- || asn1_check(version == CMS_version_v1) != 1
- || asn1_length_is_zero(len) != 1) {
- error_print();
- return -1;
- }
- if (sm2_public_key_equ(&sm2_key, &public_key) != 1) {
- error_print();
- return -1;
- }
- if (pcertlen != certlen
- || memcmp(pcert, cert, certlen) != 0
- || idlen != SM2_DEFAULT_ID_LENGTH
- || memcmp(SM2_DEFAULT_ID, id, idlen) != 0) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- int main(int argc, char **argv)
- {
- if (test_cms_content_type() != 1) goto err;
- if (test_cms_content_info() != 1) goto err;
- if (test_cms_enced_content_info() != 1) goto err;
- if (test_cms_enced_content_info_encrypt() != 1) goto err;
- if (test_cms_issuer_and_serial_number() != 1) goto err;
- if (test_cms_signer_info() != 1) goto err;
- if (test_cms_signer_info_sign() != 1) goto err;
- if (test_cms_signer_infos() != 1) goto err;
- if (test_cms_digest_algors() != 1) goto err;
- if (test_cms_signed_data() != 1) goto err;
- if (test_cms_recipient_info() != 1) goto err;
- if (test_cms_enveloped_data() != 1) goto err;
- if (test_cms_key_agreement_info() != 1) goto err;
- printf("%s all tests passed\n", __FILE__);
- return 0;
- err:
- error_print();
- return -1;
- }
|