der_tests.c 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230
  1. #include <tomcrypt_test.h>
  2. #ifndef LTC_DER
  3. int der_tests(void)
  4. {
  5. fprintf(stderr, "NOP");
  6. return 0;
  7. }
  8. #else
  9. int der_tests(void)
  10. {
  11. unsigned long x, y, z, zz, oid[2][32];
  12. unsigned char buf[3][2048];
  13. mp_int a, b, c, d, e, f, g;
  14. static const unsigned char rsa_oid_der[] = { 0x06, 0x06, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d };
  15. static const unsigned long rsa_oid[] = { 1, 2, 840, 113549 };
  16. static const unsigned char rsa_ia5[] = "[email protected]";
  17. static const unsigned char rsa_ia5_der[] = { 0x16, 0x0d, 0x74, 0x65, 0x73, 0x74, 0x31,
  18. 0x40, 0x72, 0x73, 0x61, 0x2e, 0x63, 0x6f, 0x6d };
  19. static const unsigned char rsa_printable[] = "Test User 1";
  20. static const unsigned char rsa_printable_der[] = { 0x13, 0x0b, 0x54, 0x65, 0x73, 0x74, 0x20, 0x55,
  21. 0x73, 0x65, 0x72, 0x20, 0x31 };
  22. DO(mpi_to_ltc_error(mp_init_multi(&a, &b, &c, &d, &e, &f, &g, NULL)));
  23. for (zz = 0; zz < 16; zz++) {
  24. for (z = 0; z < 1024; z++) {
  25. if (yarrow_read(buf[0], z, &yarrow_prng) != z) {
  26. fprintf(stderr, "Failed to read %lu bytes from yarrow\n", z);
  27. return 1;
  28. }
  29. DO(mpi_to_ltc_error(mp_read_unsigned_bin(&a, buf[0], z)));
  30. if (mp_iszero(&a) == MP_NO) { a.sign = buf[0][0] & 1 ? MP_ZPOS : MP_NEG; }
  31. x = sizeof(buf[0]);
  32. DO(der_encode_integer(&a, buf[0], &x));
  33. DO(der_length_integer(&a, &y));
  34. if (y != x) { fprintf(stderr, "DER INTEGER size mismatch\n"); return 1; }
  35. mp_zero(&b);
  36. DO(der_decode_integer(buf[0], y, &b));
  37. if (y != x || mp_cmp(&a, &b) != MP_EQ) {
  38. fprintf(stderr, "%lu: %lu vs %lu\n", z, x, y);
  39. #ifdef BN_MP_TORADIX_C
  40. mp_todecimal(&a, buf[0]);
  41. mp_todecimal(&b, buf[1]);
  42. fprintf(stderr, "a == %s\nb == %s\n", buf[0], buf[1]);
  43. #endif
  44. mp_clear_multi(&a, &b, &c, &d, &e, &f, &g, NULL);
  45. return 1;
  46. }
  47. }
  48. }
  49. /* test short integer */
  50. for (zz = 0; zz < 256; zz++) {
  51. for (z = 1; z < 4; z++) {
  52. if (yarrow_read(buf[0], z, &yarrow_prng) != z) {
  53. fprintf(stderr, "Failed to read %lu bytes from yarrow\n", z);
  54. return 1;
  55. }
  56. /* encode with normal */
  57. DO(mpi_to_ltc_error(mp_read_unsigned_bin(&a, buf[0], z)));
  58. x = sizeof(buf[0]);
  59. DO(der_encode_integer(&a, buf[0], &x));
  60. /* encode with short */
  61. y = sizeof(buf[1]);
  62. DO(der_encode_short_integer(mp_get_int(&a), buf[1], &y));
  63. if (x != y || memcmp(buf[0], buf[1], x)) {
  64. fprintf(stderr, "DER INTEGER short encoding failed, %lu, %lu\n", x, y);
  65. for (z = 0; z < x; z++) fprintf(stderr, "%02x ", buf[0][z]); fprintf(stderr, "\n");
  66. for (z = 0; z < y; z++) fprintf(stderr, "%02x ", buf[1][z]); fprintf(stderr, "\n");
  67. mp_clear_multi(&a, &b, &c, &d, &e, &f, &g, NULL);
  68. return 1;
  69. }
  70. /* decode it */
  71. x = 0;
  72. DO(der_decode_short_integer(buf[1], y, &x));
  73. if (x != mp_get_int(&a)) {
  74. fprintf(stderr, "DER INTEGER short decoding failed, %lu, %lu\n", x, mp_get_int(&a));
  75. mp_clear_multi(&a, &b, &c, &d, &e, &f, &g, NULL);
  76. return 1;
  77. }
  78. }
  79. }
  80. mp_clear_multi(&a, &b, &c, &d, &e, &f, &g, NULL);
  81. /* Test bit string */
  82. for (zz = 1; zz < 1536; zz++) {
  83. yarrow_read(buf[0], zz, &yarrow_prng);
  84. for (z = 0; z < zz; z++) {
  85. buf[0][z] &= 0x01;
  86. }
  87. x = sizeof(buf[1]);
  88. DO(der_encode_bit_string(buf[0], zz, buf[1], &x));
  89. DO(der_length_bit_string(zz, &y));
  90. if (y != x) {
  91. fprintf(stderr, "\nDER BIT STRING length of encoded not match expected : %lu, %lu, %lu\n", z, x, y);
  92. return 1;
  93. }
  94. y = sizeof(buf[2]);
  95. DO(der_decode_bit_string(buf[1], x, buf[2], &y));
  96. if (y != zz || memcmp(buf[0], buf[2], zz)) {
  97. fprintf(stderr, "%lu, %lu, %d\n", y, zz, memcmp(buf[0], buf[2], zz));
  98. return 1;
  99. }
  100. }
  101. /* Test octet string */
  102. for (zz = 1; zz < 1536; zz++) {
  103. yarrow_read(buf[0], zz, &yarrow_prng);
  104. x = sizeof(buf[1]);
  105. DO(der_encode_octet_string(buf[0], zz, buf[1], &x));
  106. DO(der_length_octet_string(zz, &y));
  107. if (y != x) {
  108. fprintf(stderr, "\nDER OCTET STRING length of encoded not match expected : %lu, %lu, %lu\n", z, x, y);
  109. return 1;
  110. }
  111. y = sizeof(buf[2]);
  112. DO(der_decode_octet_string(buf[1], x, buf[2], &y));
  113. if (y != zz || memcmp(buf[0], buf[2], zz)) {
  114. fprintf(stderr, "%lu, %lu, %d\n", y, zz, memcmp(buf[0], buf[2], zz));
  115. return 1;
  116. }
  117. }
  118. /* test OID */
  119. x = sizeof(buf[0]);
  120. DO(der_encode_object_identifier(rsa_oid, sizeof(rsa_oid)/sizeof(rsa_oid[0]), buf[0], &x));
  121. if (x != sizeof(rsa_oid_der) || memcmp(rsa_oid_der, buf[0], x)) {
  122. fprintf(stderr, "rsa_oid_der encode failed to match, %lu, ", x);
  123. for (y = 0; y < x; y++) fprintf(stderr, "%02x ", buf[0][y]);
  124. fprintf(stderr, "\n");
  125. return 1;
  126. }
  127. y = sizeof(oid[0])/sizeof(oid[0][0]);
  128. DO(der_decode_object_identifier(buf[0], x, oid[0], &y));
  129. if (y != sizeof(rsa_oid)/sizeof(rsa_oid[0]) || memcmp(rsa_oid, oid[0], sizeof(rsa_oid))) {
  130. fprintf(stderr, "rsa_oid_der decode failed to match, %lu, ", y);
  131. for (z = 0; z < y; z++) fprintf(stderr, "%lu ", oid[0][z]);
  132. fprintf(stderr, "\n");
  133. return 1;
  134. }
  135. /* do random strings */
  136. for (zz = 0; zz < 5000; zz++) {
  137. /* pick a random number of words */
  138. yarrow_read(buf[0], 4, &yarrow_prng);
  139. LOAD32L(z, buf[0]);
  140. z = 2 + (z % ((sizeof(oid[0])/sizeof(oid[0][0])) - 2));
  141. /* fill them in */
  142. oid[0][0] = buf[0][0] % 3;
  143. oid[0][1] = buf[0][1] % 40;
  144. for (y = 2; y < z; y++) {
  145. yarrow_read(buf[0], 4, &yarrow_prng);
  146. LOAD32L(oid[0][y], buf[0]);
  147. }
  148. /* encode it */
  149. x = sizeof(buf[0]);
  150. DO(der_encode_object_identifier(oid[0], z, buf[0], &x));
  151. DO(der_length_object_identifier(oid[0], z, &y));
  152. if (x != y) {
  153. fprintf(stderr, "Random OID %lu test failed, length mismatch: %lu, %lu\n", z, x, y);
  154. for (x = 0; x < z; x++) fprintf(stderr, "%lu\n", oid[0][x]);
  155. return 1;
  156. }
  157. /* decode it */
  158. y = sizeof(oid[0])/sizeof(oid[0][0]);
  159. DO(der_decode_object_identifier(buf[0], x, oid[1], &y));
  160. if (y != z) {
  161. fprintf(stderr, "Random OID %lu test failed, decode length mismatch: %lu, %lu\n", z, x, y);
  162. return 1;
  163. }
  164. if (memcmp(oid[0], oid[1], sizeof(oid[0][0]) * z)) {
  165. fprintf(stderr, "Random OID %lu test failed, decoded values wrong\n", z);
  166. for (x = 0; x < z; x++) fprintf(stderr, "%lu\n", oid[0][x]); fprintf(stderr, "\n\n Got \n\n");
  167. for (x = 0; x < z; x++) fprintf(stderr, "%lu\n", oid[1][x]);
  168. return 1;
  169. }
  170. }
  171. /* IA5 string */
  172. x = sizeof(buf[0]);
  173. DO(der_encode_ia5_string(rsa_ia5, strlen(rsa_ia5), buf[0], &x));
  174. if (x != sizeof(rsa_ia5_der) || memcmp(buf[0], rsa_ia5_der, x)) {
  175. fprintf(stderr, "IA5 encode failed: %lu, %lu\n", x, (unsigned long)sizeof(rsa_ia5_der));
  176. return 1;
  177. }
  178. y = sizeof(buf[1]);
  179. DO(der_decode_ia5_string(buf[0], x, buf[1], &y));
  180. if (y != strlen(rsa_ia5) || memcmp(buf[1], rsa_ia5, strlen(rsa_ia5))) {
  181. fprintf(stderr, "DER IA5 failed test vector\n");
  182. return 1;
  183. }
  184. /* Printable string */
  185. x = sizeof(buf[0]);
  186. DO(der_encode_printable_string(rsa_printable, strlen(rsa_printable), buf[0], &x));
  187. if (x != sizeof(rsa_printable_der) || memcmp(buf[0], rsa_printable_der, x)) {
  188. fprintf(stderr, "PRINTABLE encode failed: %lu, %lu\n", x, (unsigned long)sizeof(rsa_printable_der));
  189. return 1;
  190. }
  191. y = sizeof(buf[1]);
  192. DO(der_decode_printable_string(buf[0], x, buf[1], &y));
  193. if (y != strlen(rsa_printable) || memcmp(buf[1], rsa_printable, strlen(rsa_printable))) {
  194. fprintf(stderr, "DER printable failed test vector\n");
  195. return 1;
  196. }
  197. return 0;
  198. }
  199. #endif
  200. /* $Source$ */
  201. /* $Revision$ */
  202. /* $Date$ */