rsa_test.c 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258
  1. #include <tomcrypt_test.h>
  2. #ifdef MRSA
  3. #define RSA_MSGSIZE 78
  4. int rsa_test(void)
  5. {
  6. unsigned char in[1024], out[1024], tmp[1024];
  7. rsa_key key, privKey, pubKey;
  8. int hash_idx, prng_idx, stat, stat2, cnt;
  9. unsigned long rsa_msgsize, len, len2;
  10. static unsigned char lparam[] = { 0x01, 0x02, 0x03, 0x04 };
  11. hash_idx = find_hash("sha1");
  12. prng_idx = find_prng("yarrow");
  13. if (hash_idx == -1 || prng_idx == -1) {
  14. printf("rsa_test requires SHA1 and yarrow");
  15. return 1;
  16. }
  17. /* make 10 random key */
  18. for (cnt = 0; cnt < 10; cnt++) {
  19. DO(rsa_make_key(&yarrow_prng, prng_idx, 1024/8, 65537, &key));
  20. if (mp_count_bits(&key.N) != 1024) {
  21. printf("rsa_1024 key modulus has %d bits\n", mp_count_bits(&key.N));
  22. len = mp_unsigned_bin_size(&key.N);
  23. mp_to_unsigned_bin(&key.N, tmp);
  24. printf("N == \n");
  25. for (cnt = 0; cnt < len; ) {
  26. printf("%02x ", tmp[cnt]);
  27. if (!(++cnt & 15)) printf("\n");
  28. }
  29. len = mp_unsigned_bin_size(&key.p);
  30. mp_to_unsigned_bin(&key.p, tmp);
  31. printf("p == \n");
  32. for (cnt = 0; cnt < len; ) {
  33. printf("%02x ", tmp[cnt]);
  34. if (!(++cnt & 15)) printf("\n");
  35. }
  36. len = mp_unsigned_bin_size(&key.q);
  37. mp_to_unsigned_bin(&key.q, tmp);
  38. printf("\nq == \n");
  39. for (cnt = 0; cnt < len; ) {
  40. printf("%02x ", tmp[cnt]);
  41. if (!(++cnt & 15)) printf("\n");
  42. }
  43. printf("\n");
  44. return 1;
  45. }
  46. if (cnt != 9) {
  47. rsa_free(&key);
  48. }
  49. }
  50. /* test PKCS #1 v1.5 */
  51. for (cnt = 0; cnt < 4; cnt++) {
  52. for (rsa_msgsize = 1; rsa_msgsize <= 117; rsa_msgsize++) {
  53. /* make a random key/msg */
  54. yarrow_read(in, rsa_msgsize, &yarrow_prng);
  55. len = sizeof(out);
  56. len2 = rsa_msgsize;
  57. /* encrypt */
  58. DO(rsa_v15_encrypt_key(in, rsa_msgsize, out, &len, &yarrow_prng, prng_idx, &key));
  59. DO(rsa_v15_decrypt_key(out, len, tmp, rsa_msgsize, &stat, &key));
  60. if (stat != 1 || memcmp(tmp, in, rsa_msgsize)) {
  61. printf("PKCS #1 v1.5 encrypt/decrypt failure (rsa_msgsize: %lu, stat: %d)\n", rsa_msgsize, stat);
  62. return 1;
  63. }
  64. }
  65. }
  66. /* signature */
  67. len = sizeof(out);
  68. DO(rsa_v15_sign_hash(in, 20, out, &len, hash_idx, &key));
  69. in[1] ^= 1;
  70. DO(rsa_v15_verify_hash(out, len, in, 20, hash_idx, &stat, &key));
  71. in[1] ^= 1;
  72. DO(rsa_v15_verify_hash(out, len, in, 20, hash_idx, &stat2, &key));
  73. if (!(stat == 0 && stat2 == 1)) {
  74. printf("PKCS #1 v1.5 sign/verify failure (stat %d, stat2 %d)\n", stat, stat2);
  75. return 1;
  76. }
  77. /* encrypt the key (without lparam) */
  78. for (cnt = 0; cnt < 4; cnt++) {
  79. for (rsa_msgsize = 1; rsa_msgsize <= 86; rsa_msgsize++) {
  80. /* make a random key/msg */
  81. yarrow_read(in, rsa_msgsize, &yarrow_prng);
  82. len = sizeof(out);
  83. len2 = rsa_msgsize;
  84. DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, NULL, 0, &yarrow_prng, prng_idx, hash_idx, &key));
  85. /* change a byte */
  86. out[8] ^= 1;
  87. DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key));
  88. /* change a byte back */
  89. out[8] ^= 1;
  90. if (len2 != rsa_msgsize) {
  91. printf("\nrsa_decrypt_key mismatch len %lu (first decrypt)", len2);
  92. return 1;
  93. }
  94. len2 = rsa_msgsize;
  95. DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key));
  96. if (!(stat == 1 && stat2 == 0)) {
  97. printf("rsa_decrypt_key failed");
  98. return 1;
  99. }
  100. if (len2 != rsa_msgsize || memcmp(tmp, in, rsa_msgsize)) {
  101. unsigned long x;
  102. printf("\nrsa_decrypt_key mismatch, len %lu (second decrypt)\n", len2);
  103. printf("Original contents: \n");
  104. for (x = 0; x < rsa_msgsize; ) {
  105. printf("%02x ", in[x]);
  106. if (!(++x % 16)) {
  107. printf("\n");
  108. }
  109. }
  110. printf("\n");
  111. printf("Output contents: \n");
  112. for (x = 0; x < rsa_msgsize; ) {
  113. printf("%02x ", out[x]);
  114. if (!(++x % 16)) {
  115. printf("\n");
  116. }
  117. }
  118. printf("\n");
  119. return 1;
  120. }
  121. }
  122. }
  123. /* encrypt the key (with lparam) */
  124. for (rsa_msgsize = 1; rsa_msgsize <= 86; rsa_msgsize++) {
  125. len = sizeof(out);
  126. len2 = rsa_msgsize;
  127. DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, lparam, sizeof(lparam), &yarrow_prng, prng_idx, hash_idx, &key));
  128. /* change a byte */
  129. out[8] ^= 1;
  130. DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key));
  131. if (len2 != rsa_msgsize) {
  132. printf("\nrsa_decrypt_key mismatch len %lu (first decrypt)", len2);
  133. return 1;
  134. }
  135. /* change a byte back */
  136. out[8] ^= 1;
  137. len2 = rsa_msgsize;
  138. DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat, &key));
  139. if (!(stat == 1 && stat2 == 0)) {
  140. printf("rsa_decrypt_key failed");
  141. return 1;
  142. }
  143. if (len2 != rsa_msgsize || memcmp(tmp, in, rsa_msgsize)) {
  144. printf("rsa_decrypt_key mismatch len %lu", len2);
  145. return 1;
  146. }
  147. }
  148. /* sign a message (unsalted, lower cholestorol and Atkins approved) now */
  149. len = sizeof(out);
  150. DO(rsa_sign_hash(in, 20, out, &len, &yarrow_prng, prng_idx, hash_idx, 0, &key));
  151. /* export key and import as both private and public */
  152. len2 = sizeof(tmp);
  153. DO(rsa_export(tmp, &len2, PK_PRIVATE, &key));
  154. DO(rsa_import(tmp, len2, &privKey));
  155. len2 = sizeof(tmp);
  156. DO(rsa_export(tmp, &len2, PK_PUBLIC, &key));
  157. DO(rsa_import(tmp, len2, &pubKey));
  158. /* verify with original */
  159. DO(rsa_verify_hash(out, len, in, 20, hash_idx, 0, &stat, &key));
  160. /* change a byte */
  161. in[0] ^= 1;
  162. DO(rsa_verify_hash(out, len, in, 20, hash_idx, 0, &stat2, &key));
  163. if (!(stat == 1 && stat2 == 0)) {
  164. printf("rsa_verify_hash (unsalted, origKey) failed, %d, %d", stat, stat2);
  165. rsa_free(&key);
  166. rsa_free(&pubKey);
  167. rsa_free(&privKey);
  168. return 1;
  169. }
  170. /* verify with privKey */
  171. /* change a byte */
  172. in[0] ^= 1;
  173. DO(rsa_verify_hash(out, len, in, 20, hash_idx, 0, &stat, &privKey));
  174. /* change a byte */
  175. in[0] ^= 1;
  176. DO(rsa_verify_hash(out, len, in, 20, hash_idx, 0, &stat2, &privKey));
  177. if (!(stat == 1 && stat2 == 0)) {
  178. printf("rsa_verify_hash (unsalted, privKey) failed, %d, %d", stat, stat2);
  179. rsa_free(&key);
  180. rsa_free(&pubKey);
  181. rsa_free(&privKey);
  182. return 1;
  183. }
  184. /* verify with pubKey */
  185. /* change a byte */
  186. in[0] ^= 1;
  187. DO(rsa_verify_hash(out, len, in, 20, hash_idx, 0, &stat, &pubKey));
  188. /* change a byte */
  189. in[0] ^= 1;
  190. DO(rsa_verify_hash(out, len, in, 20, hash_idx, 0, &stat2, &pubKey));
  191. if (!(stat == 1 && stat2 == 0)) {
  192. printf("rsa_verify_hash (unsalted, pubkey) failed, %d, %d", stat, stat2);
  193. rsa_free(&key);
  194. rsa_free(&pubKey);
  195. rsa_free(&privKey);
  196. return 1;
  197. }
  198. /* sign a message (salted) now (use privKey to make, pubKey to verify) */
  199. len = sizeof(out);
  200. DO(rsa_sign_hash(in, 20, out, &len, &yarrow_prng, prng_idx, hash_idx, 8, &privKey));
  201. DO(rsa_verify_hash(out, len, in, 20, hash_idx, 8, &stat, &pubKey));
  202. /* change a byte */
  203. in[0] ^= 1;
  204. DO(rsa_verify_hash(out, len, in, 20, hash_idx, 8, &stat2, &pubKey));
  205. if (!(stat == 1 && stat2 == 0)) {
  206. printf("rsa_verify_hash (salted) failed, %d, %d", stat, stat2);
  207. rsa_free(&key);
  208. rsa_free(&pubKey);
  209. rsa_free(&privKey);
  210. return 1;
  211. }
  212. /* free the key and return */
  213. rsa_free(&key);
  214. rsa_free(&pubKey);
  215. rsa_free(&privKey);
  216. return 0;
  217. }
  218. #else
  219. int rsa_test(void)
  220. {
  221. printf("NOP");
  222. return 0;
  223. }
  224. #endif