| #! /usr/bin/env perl | 
 | # Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved. | 
 | # | 
 | # Licensed under the Apache License 2.0 (the "License").  You may not use | 
 | # this file except in compliance with the License.  You can obtain a copy | 
 | # in the file LICENSE in the source distribution or at | 
 | # https://www.openssl.org/source/license.html | 
 |  | 
 | use strict; | 
 | use warnings; | 
 |  | 
 | use OpenSSL::Test qw/:DEFAULT srctop_file/; | 
 | use OpenSSL::Test::Utils; | 
 |  | 
 | use Encode; | 
 |  | 
 | setup("test_pkcs12"); | 
 |  | 
 | my $pass = "σύνθημα γνώρισμα"; | 
 |  | 
 | my $savedcp; | 
 | if (eval { require Win32::API; 1; }) { | 
 |     # Trouble is that Win32 perl uses CreateProcessA, which | 
 |     # makes it problematic to pass non-ASCII arguments, from perl[!] | 
 |     # that is. This is because CreateProcessA is just a wrapper for | 
 |     # CreateProcessW and will call MultiByteToWideChar and use | 
 |     # system default locale. Since we attempt Greek pass-phrase | 
 |     # conversion can be done only with Greek locale. | 
 |  | 
 |     Win32::API->Import("kernel32","UINT GetSystemDefaultLCID()"); | 
 |     if (GetSystemDefaultLCID() != 0x408) { | 
 |         plan skip_all => "Non-Greek system locale"; | 
 |     } else { | 
 |         # Ensure correct code page so that VERBOSE output is right. | 
 |         Win32::API->Import("kernel32","UINT GetConsoleOutputCP()"); | 
 |         Win32::API->Import("kernel32","BOOL SetConsoleOutputCP(UINT cp)"); | 
 |         $savedcp = GetConsoleOutputCP(); | 
 |         SetConsoleOutputCP(1253); | 
 |         $pass = Encode::encode("cp1253",Encode::decode("utf-8",$pass)); | 
 |     } | 
 | } elsif ($^O eq "MSWin32") { | 
 |     plan skip_all => "Win32::API unavailable"; | 
 | } elsif ($^O ne "VMS") { | 
 |     # Running MinGW tests transparently under Wine apparently requires | 
 |     # UTF-8 locale... | 
 |  | 
 |     foreach(`locale -a`) { | 
 |         s/\R$//; | 
 |         if ($_ =~ m/^C\.UTF\-?8/i) { | 
 |             $ENV{LC_ALL} = $_; | 
 |             last; | 
 |         } | 
 |     } | 
 | } | 
 | $ENV{OPENSSL_WIN32_UTF8}=1; | 
 |  | 
 | plan tests => 21; | 
 |  | 
 | # Test different PKCS#12 formats | 
 | ok(run(test(["pkcs12_format_test"])), "test pkcs12 formats"); | 
 | # Test with legacy APIs | 
 | ok(run(test(["pkcs12_format_test", "-legacy"])), "test pkcs12 formats using legacy APIs"); | 
 | # Test with a non-default library context (and no loaded providers in the default context) | 
 | ok(run(test(["pkcs12_format_test", "-context"])), "test pkcs12 formats using a non-default library context"); | 
 |  | 
 | SKIP: { | 
 |      skip "VMS doesn't have command line UTF-8 support yet in DCL", 1 | 
 |          if $^O eq "VMS"; | 
 |  | 
 |      # just see that we can read shibboleth.pfx protected with $pass | 
 |      ok(run(app(["openssl", "pkcs12", "-noout", | 
 |                  "-password", "pass:$pass", | 
 |                  "-in", srctop_file("test", "shibboleth.pfx")])), | 
 |         "test_load_cert_pkcs12"); | 
 | } | 
 |  | 
 | my @path = qw(test certs); | 
 | my $outfile1 = "out1.p12"; | 
 | my $outfile2 = "out2.p12"; | 
 | my $outfile3 = "out3.p12"; | 
 | my $outfile4 = "out4.p12"; | 
 | my $outfile5 = "out5.p12"; | 
 | my $outfile6 = "out6.p12"; | 
 |  | 
 | # Test the -chain option with -untrusted | 
 | ok(run(app(["openssl", "pkcs12", "-export", "-chain", | 
 |             "-CAfile",  srctop_file(@path,  "sroot-cert.pem"), | 
 |             "-untrusted", srctop_file(@path, "ca-cert.pem"), | 
 |             "-in", srctop_file(@path, "ee-cert.pem"), | 
 |             "-nokeys", "-passout", "pass:", "-out", $outfile1])), | 
 |    "test_pkcs12_chain_untrusted"); | 
 |  | 
 | # Test the -passcerts option | 
 | SKIP: { | 
 |     skip "Skipping PKCS#12 test because DES is disabled in this build", 1 | 
 |         if disabled("des"); | 
 |     ok(run(app(["openssl", "pkcs12", "-export", | 
 |             "-in", srctop_file(@path, "ee-cert.pem"), | 
 |             "-certfile", srctop_file(@path, "v3-certs-TDES.p12"), | 
 |             "-passcerts", "pass:v3-certs", | 
 |             "-nokeys", "-passout", "pass:v3-certs", "-descert", | 
 |             "-out", $outfile2])), | 
 |    "test_pkcs12_passcerts"); | 
 | } | 
 |  | 
 | SKIP: { | 
 |     skip "Skipping legacy PKCS#12 test because the required algorithms are disabled", 1 | 
 |         if disabled("des") || disabled("rc2") || disabled("legacy"); | 
 |     # Test reading legacy PKCS#12 file | 
 |     ok(run(app(["openssl", "pkcs12", "-export", | 
 |                 "-in", srctop_file(@path, "v3-certs-RC2.p12"), | 
 |                 "-passin", "pass:v3-certs", | 
 |                 "-provider", "default", "-provider", "legacy", | 
 |                 "-nokeys", "-passout", "pass:v3-certs", "-descert", | 
 |                 "-out", $outfile3])), | 
 |     "test_pkcs12_passcerts_legacy"); | 
 | } | 
 |  | 
 | # Test export of PEM file with both cert and key | 
 | # -nomac necessary to avoid legacy provider requirement | 
 | ok(run(app(["openssl", "pkcs12", "-export", | 
 |         "-inkey", srctop_file(@path, "cert-key-cert.pem"), | 
 |         "-in", srctop_file(@path, "cert-key-cert.pem"), | 
 |         "-passout", "pass:v3-certs", | 
 |         "-nomac", "-out", $outfile4], stderr => "outerr.txt")), | 
 |    "test_export_pkcs12_cert_key_cert"); | 
 | open DATA, "outerr.txt"; | 
 | my @match = grep /:error:/, <DATA>; | 
 | close DATA; | 
 | ok(scalar @match > 0 ? 0 : 1, "test_export_pkcs12_outerr_empty"); | 
 |  | 
 | ok(run(app(["openssl", "pkcs12", | 
 |             "-in", $outfile4, | 
 |             "-passin", "pass:v3-certs", | 
 |             "-nomacver", "-nodes"])), | 
 |   "test_import_pkcs12_cert_key_cert"); | 
 |  | 
 | ok(run(app(["openssl", "pkcs12", "-export", "-out", $outfile5, | 
 |             "-in", srctop_file(@path, "ee-cert.pem"), "-caname", "testname", | 
 |             "-nokeys", "-passout", "pass:", "-certpbe", "NONE"])), | 
 |    "test nokeys single cert"); | 
 |  | 
 | my @pkcs12info = run(app(["openssl", "pkcs12", "-info", "-in", $outfile5, | 
 |                           "-passin", "pass:"]), capture => 1); | 
 |  | 
 | # Test that with one input certificate, we get one output certificate | 
 | ok(grep(/subject=CN\s*=\s*server.example/, @pkcs12info) == 1, | 
 |    "test one cert in output"); | 
 | # Test that the expected friendly name is present in the output | 
 | ok(grep(/testname/, @pkcs12info) == 1, "test friendly name in output"); | 
 |  | 
 | # Test export of PEM file with both cert and key, without password. | 
 | # -nomac necessary to avoid legacy provider requirement | 
 | { | 
 |     ok(run(app(["openssl", "pkcs12", "-export", | 
 |             "-inkey", srctop_file(@path, "cert-key-cert.pem"), | 
 |             "-in", srctop_file(@path, "cert-key-cert.pem"), | 
 |             "-passout", "pass:", | 
 |             "-nomac", "-out", $outfile6], stderr => "outerr6.txt")), | 
 |     "test_export_pkcs12_cert_key_cert_no_pass"); | 
 |     open DATA, "outerr6.txt"; | 
 |     my @match = grep /:error:/, <DATA>; | 
 |     close DATA; | 
 |     ok(scalar @match > 0 ? 0 : 1, "test_export_pkcs12_outerr6_empty"); | 
 | } | 
 |  | 
 | # Tests for pkcs12_parse | 
 | ok(run(test(["pkcs12_api_test", | 
 |              "-in", $outfile1, | 
 |              "-has-ca", 1, | 
 |              ])), "Test pkcs12_parse()"); | 
 |  | 
 | SKIP: { | 
 |     skip "Skipping PKCS#12 parse test because DES is disabled in this build", 1 | 
 |         if disabled("des"); | 
 |     ok(run(test(["pkcs12_api_test", | 
 |                  "-in", $outfile2, | 
 |                  "-pass", "v3-certs", | 
 |                  "-has-ca", 1, | 
 |                  ])), "Test pkcs12_parse()"); | 
 | } | 
 |  | 
 | SKIP: { | 
 |     skip "Skipping PKCS#12 parse test because the required algorithms are disabled", 1 | 
 |         if disabled("des") || disabled("rc2") || disabled("legacy"); | 
 |     ok(run(test(["pkcs12_api_test", | 
 |                  "-in", $outfile3, | 
 |                  "-pass", "v3-certs", | 
 |                  "-has-ca", 1, | 
 |                  ])), "Test pkcs12_parse()"); | 
 | } | 
 |  | 
 | ok(run(test(["pkcs12_api_test", | 
 |              "-in", $outfile4, | 
 |              "-pass", "v3-certs", | 
 |              "-has-ca", 1, | 
 |              "-has-key", 1, | 
 |              "-has-cert", 1, | 
 |              ])), "Test pkcs12_parse()"); | 
 |  | 
 | ok(run(test(["pkcs12_api_test", | 
 |              "-in", $outfile5, | 
 |              "-has-ca", 1, | 
 |              ])), "Test pkcs12_parse()"); | 
 |  | 
 | ok(run(test(["pkcs12_api_test", | 
 |              "-in", $outfile6, | 
 |              "-pass", "", | 
 |              "-has-ca", 1, | 
 |              "-has-key", 1, | 
 |              "-has-cert", 1, | 
 |              ])), "Test pkcs12_parse()"); | 
 |  | 
 | SetConsoleOutputCP($savedcp) if (defined($savedcp)); |