| // Copyright 2025 The BoringSSL Authors |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // https://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| #include <openssl/cms.h> |
| |
| #include <vector> |
| |
| #include <gtest/gtest.h> |
| |
| #include <openssl/bio.h> |
| #include <openssl/digest.h> |
| #include <openssl/err.h> |
| #include <openssl/nid.h> |
| #include <openssl/pem.h> |
| #include <openssl/x509.h> |
| |
| #include "../test/test_data.h" |
| #include "../test/test_util.h" |
| |
| |
| static std::vector<uint8_t> BIOMemContents(const BIO *bio) { |
| const uint8_t *data; |
| size_t len; |
| BSSL_CHECK(BIO_mem_contents(bio, &data, &len)); |
| return std::vector(data, data + len); |
| } |
| |
| // CMS is (mostly) an extension of PKCS#7, so we reuse the PKCS#7 test data. |
| TEST(CMSTest, KernelModuleSigning) { |
| // Sign a message with the same call that the Linux kernel's sign-file.c |
| // makes. |
| std::string cert_pem = GetTestData("crypto/pkcs7/test/sign_cert.pem"); |
| std::string key_pem = GetTestData("crypto/pkcs7/test/sign_key.pem"); |
| bssl::UniquePtr<BIO> cert_bio( |
| BIO_new_mem_buf(cert_pem.data(), cert_pem.size())); |
| bssl::UniquePtr<X509> cert( |
| PEM_read_bio_X509(cert_bio.get(), nullptr, nullptr, nullptr)); |
| |
| bssl::UniquePtr<BIO> key_bio(BIO_new_mem_buf(key_pem.data(), key_pem.size())); |
| bssl::UniquePtr<EVP_PKEY> key( |
| PEM_read_bio_PrivateKey(key_bio.get(), nullptr, nullptr, nullptr)); |
| |
| static const char kSignedData[] = "signed data"; |
| bssl::UniquePtr<BIO> data_bio( |
| BIO_new_mem_buf(kSignedData, sizeof(kSignedData) - 1)); |
| |
| // Sign with SHA-256, as the kernel does. |
| bssl::UniquePtr<CMS_ContentInfo> cms(CMS_sign( |
| nullptr, nullptr, nullptr, nullptr, |
| CMS_NOCERTS | CMS_PARTIAL | CMS_BINARY | CMS_DETACHED | CMS_STREAM)); |
| ASSERT_TRUE(cms); |
| ASSERT_TRUE( |
| CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha256(), |
| CMS_NOCERTS | CMS_BINARY | CMS_NOSMIMECAP | CMS_NOATTR)); |
| ASSERT_TRUE(CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr, |
| CMS_NOCERTS | CMS_BINARY)); |
| |
| // The kernel uses the streaming API for output, intended to stream the input |
| // to the output, even though it doesn't call it in a streaming mode. |
| bssl::UniquePtr<BIO> out(BIO_new(BIO_s_mem())); |
| ASSERT_TRUE( |
| i2d_CMS_bio_stream(out.get(), cms.get(), /*in=*/nullptr, /*flags=*/0)); |
| |
| // RSA signatures are deterministic so the output should not change. By |
| // default, |CMS_sign| should sign SHA-256. |
| std::string expected = GetTestData("crypto/pkcs7/test/sign_sha256.p7s"); |
| EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected)); |
| |
| // The more straightforward output API works too. |
| ASSERT_TRUE(BIO_reset(out.get())); |
| ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get())); |
| EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected)); |
| |
| // The kernel passes unnecessary flags. The minimal set of flags works too. |
| ASSERT_TRUE(BIO_reset(data_bio.get())); |
| cms.reset( |
| CMS_sign(nullptr, nullptr, nullptr, nullptr, CMS_PARTIAL | CMS_DETACHED)); |
| ASSERT_TRUE(cms); |
| ASSERT_TRUE(CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha256(), |
| CMS_NOCERTS | CMS_NOATTR)); |
| ASSERT_TRUE( |
| CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr, CMS_BINARY)); |
| ASSERT_TRUE(BIO_reset(out.get())); |
| ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get())); |
| EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected)); |
| |
| // SHA-256 is the default hash, so the single-shot API works too, but is less |
| // explicit about the hash chosen. |
| ASSERT_TRUE(BIO_reset(data_bio.get())); |
| cms.reset(CMS_sign(cert.get(), key.get(), nullptr, data_bio.get(), |
| CMS_DETACHED | CMS_NOCERTS | CMS_NOATTR | CMS_BINARY)); |
| ASSERT_TRUE(cms); |
| ASSERT_TRUE(BIO_reset(out.get())); |
| ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get())); |
| EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected)); |
| |
| // The signer can be identified by SKID instead. |
| ASSERT_TRUE(BIO_reset(data_bio.get())); |
| cms.reset( |
| CMS_sign(nullptr, nullptr, nullptr, nullptr, CMS_PARTIAL | CMS_DETACHED)); |
| ASSERT_TRUE(cms); |
| ASSERT_TRUE(CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha256(), |
| CMS_NOCERTS | CMS_NOATTR | CMS_USE_KEYID)); |
| ASSERT_TRUE( |
| CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr, CMS_BINARY)); |
| ASSERT_TRUE(BIO_reset(out.get())); |
| ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get())); |
| expected = GetTestData("crypto/pkcs7/test/sign_sha256_key_id.p7s"); |
| EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected)); |
| |
| // Specify a different hash function. |
| ASSERT_TRUE(BIO_reset(data_bio.get())); |
| cms.reset( |
| CMS_sign(nullptr, nullptr, nullptr, nullptr, CMS_PARTIAL | CMS_DETACHED)); |
| ASSERT_TRUE(cms); |
| ASSERT_TRUE(CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha1(), |
| CMS_NOCERTS | CMS_NOATTR)); |
| ASSERT_TRUE( |
| CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr, CMS_BINARY)); |
| ASSERT_TRUE(BIO_reset(out.get())); |
| ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get())); |
| expected = GetTestData("crypto/pkcs7/test/sign_sha1.p7s"); |
| EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected)); |
| |
| // Ditto, with SKID. |
| ASSERT_TRUE(BIO_reset(data_bio.get())); |
| cms.reset( |
| CMS_sign(nullptr, nullptr, nullptr, nullptr, CMS_PARTIAL | CMS_DETACHED)); |
| ASSERT_TRUE(cms); |
| ASSERT_TRUE(CMS_add1_signer(cms.get(), cert.get(), key.get(), EVP_sha1(), |
| CMS_NOCERTS | CMS_NOATTR | CMS_USE_KEYID)); |
| ASSERT_TRUE( |
| CMS_final(cms.get(), data_bio.get(), /*dcont=*/nullptr, CMS_BINARY)); |
| ASSERT_TRUE(BIO_reset(out.get())); |
| ASSERT_TRUE(i2d_CMS_bio(out.get(), cms.get())); |
| expected = GetTestData("crypto/pkcs7/test/sign_sha1_key_id.p7s"); |
| EXPECT_EQ(Bytes(BIOMemContents(out.get())), Bytes(expected)); |
| |
| // If SKID is requested, but there is none, signing should fail. |
| bssl::UniquePtr<X509> cert_no_skid(X509_dup(cert.get())); |
| ASSERT_TRUE(cert_no_skid.get()); |
| int loc = |
| X509_get_ext_by_NID(cert_no_skid.get(), NID_subject_key_identifier, -1); |
| ASSERT_GE(loc, 0); |
| X509_EXTENSION_free(X509_delete_ext(cert_no_skid.get(), loc)); |
| ASSERT_TRUE(BIO_reset(data_bio.get())); |
| cms.reset(CMS_sign( |
| cert_no_skid.get(), key.get(), nullptr, data_bio.get(), |
| CMS_DETACHED | CMS_NOCERTS | CMS_NOATTR | CMS_BINARY | CMS_USE_KEYID)); |
| EXPECT_FALSE(cms); |
| EXPECT_TRUE(ErrorEquals(ERR_get_error(), ERR_LIB_CMS, |
| CMS_R_CERTIFICATE_HAS_NO_KEYID)); |
| } |