blob: f0d82815f06f9f97695f11db4d43bab60ea7021f [file] [log] [blame]
// Copyright 2025 The BoringSSL Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <openssl/cms.h>
#include <vector>
#include <gtest/gtest.h>
#include <openssl/bio.h>
#include <openssl/digest.h>
#include <openssl/err.h>
#include <openssl/nid.h>
#include <openssl/pem.h>
#include <openssl/x509.h>
#include "../test/test_data.h"
#include "../test/test_util.h"
static std::vector<uint8_t> BIOMemContents(const BIO *bio) {
const uint8_t *data;
size_t len;
BSSL_CHECK(BIO_mem_contents(bio, &data, &len));
return std::vector(data, data + len);
}
// CMS is (mostly) an extension of PKCS#7, so we reuse the PKCS#7 test data.
TEST(CMSTest, KernelModuleSigning) {
// Sign a message with the same call that the Linux kernel's sign-file.c
// makes.
std::string cert_pem = GetTestData("crypto/pkcs7/test/sign_cert.pem");
std::string key_pem = GetTestData("crypto/pkcs7/test/sign_key.pem");
bssl::UniquePtr<BIO> cert_bio(
BIO_new_mem_buf(cert_pem.data(), cert_pem.size()));
bssl::UniquePtr<X509> cert(
PEM_read_bio_X509(cert_bio.get(), nullptr, nullptr, nullptr));
bssl::UniquePtr<BIO> key_bio(BIO_new_mem_buf(key_pem.data(), key_pem.size()));
bssl::UniquePtr<EVP_PKEY> key(
PEM_read_bio_PrivateKey(key_bio.get(), nullptr, nullptr, nullptr));
static const char kSignedData[] = "signed data";
bssl::UniquePtr<BIO> data_bio(
BIO_new_mem_buf(kSignedData, sizeof(kSignedData) - 1));
// Sign with SHA-256, as the kernel does.
bssl::UniquePtr<CMS_ContentInfo> cms(CMS_sign(
nullptr, nullptr, nullptr, nullptr,
CMS_NOCERTS | CMS_PARTIAL | CMS_BINARY | CMS_DETACHED | CMS_STREAM));
ASSERT_TRUE(cms);
ASSERT_TRUE(
CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha256(),
CMS_NOCERTS | CMS_BINARY | CMS_NOSMIMECAP | CMS_NOATTR));
ASSERT_TRUE(CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr,
CMS_NOCERTS | CMS_BINARY));
// The kernel uses the streaming API for output, intended to stream the input
// to the output, even though it doesn't call it in a streaming mode.
bssl::UniquePtr<BIO> out(BIO_new(BIO_s_mem()));
ASSERT_TRUE(
i2d_CMS_bio_stream(out.get(), cms.get(), /*in=*/nullptr, /*flags=*/0));
// RSA signatures are deterministic so the output should not change. By
// default, |CMS_sign| should sign SHA-256.
std::string expected = GetTestData("crypto/pkcs7/test/sign_sha256.p7s");
EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected));
// The more straightforward output API works too.
ASSERT_TRUE(BIO_reset(out.get()));
ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get()));
EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected));
// The kernel passes unnecessary flags. The minimal set of flags works too.
ASSERT_TRUE(BIO_reset(data_bio.get()));
cms.reset(
CMS_sign(nullptr, nullptr, nullptr, nullptr, CMS_PARTIAL | CMS_DETACHED));
ASSERT_TRUE(cms);
ASSERT_TRUE(CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha256(),
CMS_NOCERTS | CMS_NOATTR));
ASSERT_TRUE(
CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr, CMS_BINARY));
ASSERT_TRUE(BIO_reset(out.get()));
ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get()));
EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected));
// SHA-256 is the default hash, so the single-shot API works too, but is less
// explicit about the hash chosen.
ASSERT_TRUE(BIO_reset(data_bio.get()));
cms.reset(CMS_sign(cert.get(), key.get(), nullptr, data_bio.get(),
CMS_DETACHED | CMS_NOCERTS | CMS_NOATTR | CMS_BINARY));
ASSERT_TRUE(cms);
ASSERT_TRUE(BIO_reset(out.get()));
ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get()));
EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected));
// The signer can be identified by SKID instead.
ASSERT_TRUE(BIO_reset(data_bio.get()));
cms.reset(
CMS_sign(nullptr, nullptr, nullptr, nullptr, CMS_PARTIAL | CMS_DETACHED));
ASSERT_TRUE(cms);
ASSERT_TRUE(CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha256(),
CMS_NOCERTS | CMS_NOATTR | CMS_USE_KEYID));
ASSERT_TRUE(
CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr, CMS_BINARY));
ASSERT_TRUE(BIO_reset(out.get()));
ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get()));
expected = GetTestData("crypto/pkcs7/test/sign_sha256_key_id.p7s");
EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected));
// Specify a different hash function.
ASSERT_TRUE(BIO_reset(data_bio.get()));
cms.reset(
CMS_sign(nullptr, nullptr, nullptr, nullptr, CMS_PARTIAL | CMS_DETACHED));
ASSERT_TRUE(cms);
ASSERT_TRUE(CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha1(),
CMS_NOCERTS | CMS_NOATTR));
ASSERT_TRUE(
CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr, CMS_BINARY));
ASSERT_TRUE(BIO_reset(out.get()));
ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get()));
expected = GetTestData("crypto/pkcs7/test/sign_sha1.p7s");
EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected));
// Ditto, with SKID.
ASSERT_TRUE(BIO_reset(data_bio.get()));
cms.reset(
CMS_sign(nullptr, nullptr, nullptr, nullptr, CMS_PARTIAL | CMS_DETACHED));
ASSERT_TRUE(cms);
ASSERT_TRUE(CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha1(),
CMS_NOCERTS | CMS_NOATTR | CMS_USE_KEYID));
ASSERT_TRUE(
CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr, CMS_BINARY));
ASSERT_TRUE(BIO_reset(out.get()));
ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get()));
expected = GetTestData("crypto/pkcs7/test/sign_sha1_key_id.p7s");
EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected));
// If SKID is requested, but there is none, signing should fail.
bssl::UniquePtr<X509> cert_no_skid(X509_dup(cert.get()));
ASSERT_TRUE(cert_no_skid.get());
int loc =
X509_get_ext_by_NID(cert_no_skid.get(), NID_subject_key_identifier, -1);
ASSERT_GE(loc, 0);
X509_EXTENSION_free(X509_delete_ext(cert_no_skid.get(), loc));
ASSERT_TRUE(BIO_reset(data_bio.get()));
cms.reset(CMS_sign(
cert_no_skid.get(), key.get(), nullptr, data_bio.get(),
CMS_DETACHED | CMS_NOCERTS | CMS_NOATTR | CMS_BINARY | CMS_USE_KEYID));
EXPECT_FALSE(cms);
EXPECT_TRUE(ErrorEquals(ERR_get_error(), ERR_LIB_CMS,
CMS_R_CERTIFICATE_HAS_NO_KEYID));
}