test_suite_pkcs1_v21.function 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258
  1. /* BEGIN_HEADER */
  2. #include "mbedtls/rsa.h"
  3. #include "mbedtls/legacy_or_psa.h"
  4. /* END_HEADER */
  5. /* BEGIN_DEPENDENCIES
  6. * depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_RSA_C
  7. * END_DEPENDENCIES
  8. */
  9. /* BEGIN_CASE */
  10. void pkcs1_rsaes_oaep_encrypt(int mod, data_t *input_N, data_t *input_E,
  11. int hash, data_t *message_str, data_t *rnd_buf,
  12. data_t *result_str, int result)
  13. {
  14. unsigned char output[256];
  15. mbedtls_rsa_context ctx;
  16. mbedtls_test_rnd_buf_info info;
  17. mbedtls_mpi N, E;
  18. info.fallback_f_rng = mbedtls_test_rnd_std_rand;
  19. info.fallback_p_rng = NULL;
  20. info.buf = rnd_buf->x;
  21. info.length = rnd_buf->len;
  22. mbedtls_mpi_init(&N); mbedtls_mpi_init(&E);
  23. mbedtls_rsa_init(&ctx);
  24. TEST_ASSERT(mbedtls_rsa_set_padding(&ctx,
  25. MBEDTLS_RSA_PKCS_V21, hash) == 0);
  26. memset(output, 0x00, sizeof(output));
  27. TEST_EQUAL(mbedtls_rsa_get_padding_mode(&ctx), MBEDTLS_RSA_PKCS_V21);
  28. TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash);
  29. TEST_ASSERT(mbedtls_mpi_read_binary(&N, input_N->x, input_N->len) == 0);
  30. TEST_ASSERT(mbedtls_mpi_read_binary(&E, input_E->x, input_E->len) == 0);
  31. TEST_ASSERT(mbedtls_rsa_import(&ctx, &N, NULL, NULL, NULL, &E) == 0);
  32. TEST_ASSERT(mbedtls_rsa_get_len(&ctx) == (size_t) ((mod + 7) / 8));
  33. TEST_ASSERT(mbedtls_rsa_check_pubkey(&ctx) == 0);
  34. if (message_str->len == 0) {
  35. message_str->x = NULL;
  36. }
  37. TEST_ASSERT(mbedtls_rsa_pkcs1_encrypt(&ctx,
  38. &mbedtls_test_rnd_buffer_rand,
  39. &info, message_str->len,
  40. message_str->x,
  41. output) == result);
  42. if (result == 0) {
  43. ASSERT_COMPARE(output, ctx.len, result_str->x, result_str->len);
  44. }
  45. exit:
  46. mbedtls_mpi_free(&N); mbedtls_mpi_free(&E);
  47. mbedtls_rsa_free(&ctx);
  48. }
  49. /* END_CASE */
  50. /* BEGIN_CASE */
  51. void pkcs1_rsaes_oaep_decrypt(int mod, data_t *input_P, data_t *input_Q,
  52. data_t *input_N, data_t *input_E, int hash,
  53. data_t *result_str, char *seed, data_t *message_str,
  54. int result)
  55. {
  56. unsigned char output[64];
  57. mbedtls_rsa_context ctx;
  58. size_t output_len;
  59. mbedtls_test_rnd_pseudo_info rnd_info;
  60. mbedtls_mpi N, P, Q, E;
  61. ((void) seed);
  62. mbedtls_mpi_init(&N); mbedtls_mpi_init(&P);
  63. mbedtls_mpi_init(&Q); mbedtls_mpi_init(&E);
  64. mbedtls_rsa_init(&ctx);
  65. TEST_ASSERT(mbedtls_rsa_set_padding(&ctx,
  66. MBEDTLS_RSA_PKCS_V21, hash) == 0);
  67. TEST_EQUAL(mbedtls_rsa_get_padding_mode(&ctx), MBEDTLS_RSA_PKCS_V21);
  68. TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash);
  69. memset(output, 0x00, sizeof(output));
  70. memset(&rnd_info, 0, sizeof(mbedtls_test_rnd_pseudo_info));
  71. TEST_ASSERT(mbedtls_mpi_read_binary(&P, input_P->x, input_P->len) == 0);
  72. TEST_ASSERT(mbedtls_mpi_read_binary(&Q, input_Q->x, input_Q->len) == 0);
  73. TEST_ASSERT(mbedtls_mpi_read_binary(&N, input_N->x, input_N->len) == 0);
  74. TEST_ASSERT(mbedtls_mpi_read_binary(&E, input_E->x, input_E->len) == 0);
  75. TEST_ASSERT(mbedtls_rsa_import(&ctx, &N, &P, &Q, NULL, &E) == 0);
  76. TEST_ASSERT(mbedtls_rsa_get_len(&ctx) == (size_t) ((mod + 7) / 8));
  77. TEST_ASSERT(mbedtls_rsa_complete(&ctx) == 0);
  78. TEST_ASSERT(mbedtls_rsa_check_privkey(&ctx) == 0);
  79. if (result_str->len == 0) {
  80. TEST_ASSERT(mbedtls_rsa_pkcs1_decrypt(&ctx,
  81. &mbedtls_test_rnd_pseudo_rand,
  82. &rnd_info,
  83. &output_len, message_str->x,
  84. NULL, 0) == result);
  85. } else {
  86. TEST_ASSERT(mbedtls_rsa_pkcs1_decrypt(&ctx,
  87. &mbedtls_test_rnd_pseudo_rand,
  88. &rnd_info,
  89. &output_len, message_str->x,
  90. output,
  91. sizeof(output)) == result);
  92. if (result == 0) {
  93. ASSERT_COMPARE(output, output_len, result_str->x, result_str->len);
  94. }
  95. }
  96. exit:
  97. mbedtls_mpi_free(&N); mbedtls_mpi_free(&P);
  98. mbedtls_mpi_free(&Q); mbedtls_mpi_free(&E);
  99. mbedtls_rsa_free(&ctx);
  100. }
  101. /* END_CASE */
  102. /* BEGIN_CASE */
  103. void pkcs1_rsassa_pss_sign(int mod, data_t *input_P, data_t *input_Q,
  104. data_t *input_N, data_t *input_E, int digest,
  105. int hash, data_t *hash_digest, data_t *rnd_buf,
  106. data_t *result_str, int fixed_salt_length,
  107. int result)
  108. {
  109. unsigned char output[512];
  110. mbedtls_rsa_context ctx;
  111. mbedtls_test_rnd_buf_info info;
  112. mbedtls_mpi N, P, Q, E;
  113. info.fallback_f_rng = mbedtls_test_rnd_std_rand;
  114. info.fallback_p_rng = NULL;
  115. info.buf = rnd_buf->x;
  116. info.length = rnd_buf->len;
  117. mbedtls_mpi_init(&N); mbedtls_mpi_init(&P);
  118. mbedtls_mpi_init(&Q); mbedtls_mpi_init(&E);
  119. mbedtls_rsa_init(&ctx);
  120. TEST_ASSERT(mbedtls_rsa_set_padding(&ctx,
  121. MBEDTLS_RSA_PKCS_V21, hash) == 0);
  122. TEST_EQUAL(mbedtls_rsa_get_padding_mode(&ctx), MBEDTLS_RSA_PKCS_V21);
  123. TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash);
  124. memset(output, 0x00, sizeof(output));
  125. TEST_ASSERT(mbedtls_mpi_read_binary(&P, input_P->x, input_P->len) == 0);
  126. TEST_ASSERT(mbedtls_mpi_read_binary(&Q, input_Q->x, input_Q->len) == 0);
  127. TEST_ASSERT(mbedtls_mpi_read_binary(&N, input_N->x, input_N->len) == 0);
  128. TEST_ASSERT(mbedtls_mpi_read_binary(&E, input_E->x, input_E->len) == 0);
  129. TEST_ASSERT(mbedtls_rsa_import(&ctx, &N, &P, &Q, NULL, &E) == 0);
  130. TEST_ASSERT(mbedtls_rsa_get_len(&ctx) == (size_t) ((mod + 7) / 8));
  131. TEST_ASSERT(mbedtls_rsa_complete(&ctx) == 0);
  132. TEST_ASSERT(mbedtls_rsa_check_privkey(&ctx) == 0);
  133. if (fixed_salt_length == MBEDTLS_RSA_SALT_LEN_ANY) {
  134. TEST_ASSERT(mbedtls_rsa_pkcs1_sign(
  135. &ctx, &mbedtls_test_rnd_buffer_rand, &info,
  136. digest, hash_digest->len, hash_digest->x, output) == result);
  137. if (result == 0) {
  138. ASSERT_COMPARE(output, ctx.len, result_str->x, result_str->len);
  139. }
  140. info.buf = rnd_buf->x;
  141. info.length = rnd_buf->len;
  142. }
  143. TEST_ASSERT(mbedtls_rsa_rsassa_pss_sign_ext(
  144. &ctx, &mbedtls_test_rnd_buffer_rand, &info,
  145. digest, hash_digest->len, hash_digest->x,
  146. fixed_salt_length, output) == result);
  147. if (result == 0) {
  148. ASSERT_COMPARE(output, ctx.len, result_str->x, result_str->len);
  149. }
  150. exit:
  151. mbedtls_mpi_free(&N); mbedtls_mpi_free(&P);
  152. mbedtls_mpi_free(&Q); mbedtls_mpi_free(&E);
  153. mbedtls_rsa_free(&ctx);
  154. }
  155. /* END_CASE */
  156. /* BEGIN_CASE */
  157. void pkcs1_rsassa_pss_verify(int mod, data_t *input_N, data_t *input_E,
  158. int digest, int hash, data_t *hash_digest,
  159. char *salt, data_t *result_str, int result)
  160. {
  161. mbedtls_rsa_context ctx;
  162. mbedtls_mpi N, E;
  163. ((void) salt);
  164. mbedtls_mpi_init(&N); mbedtls_mpi_init(&E);
  165. mbedtls_rsa_init(&ctx);
  166. TEST_ASSERT(mbedtls_rsa_set_padding(&ctx,
  167. MBEDTLS_RSA_PKCS_V21, hash) == 0);
  168. TEST_EQUAL(mbedtls_rsa_get_padding_mode(&ctx), MBEDTLS_RSA_PKCS_V21);
  169. TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash);
  170. TEST_ASSERT(mbedtls_mpi_read_binary(&N, input_N->x, input_N->len) == 0);
  171. TEST_ASSERT(mbedtls_mpi_read_binary(&E, input_E->x, input_E->len) == 0);
  172. TEST_ASSERT(mbedtls_rsa_import(&ctx, &N, NULL, NULL, NULL, &E) == 0);
  173. TEST_ASSERT(mbedtls_rsa_get_len(&ctx) == (size_t) ((mod + 7) / 8));
  174. TEST_ASSERT(mbedtls_rsa_check_pubkey(&ctx) == 0);
  175. TEST_ASSERT(mbedtls_rsa_pkcs1_verify(&ctx, digest, hash_digest->len, hash_digest->x,
  176. result_str->x) == result);
  177. exit:
  178. mbedtls_mpi_free(&N); mbedtls_mpi_free(&E);
  179. mbedtls_rsa_free(&ctx);
  180. }
  181. /* END_CASE */
  182. /* BEGIN_CASE */
  183. void pkcs1_rsassa_pss_verify_ext(int mod, data_t *input_N, data_t *input_E,
  184. int msg_digest_id, int ctx_hash,
  185. int mgf_hash, int salt_len,
  186. data_t *hash_digest,
  187. data_t *result_str, int result_simple,
  188. int result_full)
  189. {
  190. mbedtls_rsa_context ctx;
  191. mbedtls_mpi N, E;
  192. mbedtls_mpi_init(&N); mbedtls_mpi_init(&E);
  193. mbedtls_rsa_init(&ctx);
  194. TEST_ASSERT(mbedtls_rsa_set_padding(&ctx,
  195. MBEDTLS_RSA_PKCS_V21, ctx_hash) == 0);
  196. TEST_EQUAL(mbedtls_rsa_get_padding_mode(&ctx), MBEDTLS_RSA_PKCS_V21);
  197. TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), ctx_hash);
  198. TEST_ASSERT(mbedtls_mpi_read_binary(&N, input_N->x, input_N->len) == 0);
  199. TEST_ASSERT(mbedtls_mpi_read_binary(&E, input_E->x, input_E->len) == 0);
  200. TEST_ASSERT(mbedtls_rsa_import(&ctx, &N, NULL, NULL, NULL, &E) == 0);
  201. TEST_ASSERT(mbedtls_rsa_get_len(&ctx) == (size_t) ((mod + 7) / 8));
  202. TEST_ASSERT(mbedtls_rsa_check_pubkey(&ctx) == 0);
  203. TEST_ASSERT(mbedtls_rsa_pkcs1_verify(&ctx, msg_digest_id,
  204. hash_digest->len, hash_digest->x,
  205. result_str->x) == result_simple);
  206. TEST_ASSERT(mbedtls_rsa_rsassa_pss_verify_ext(&ctx, msg_digest_id, hash_digest->len,
  207. hash_digest->x, mgf_hash, salt_len,
  208. result_str->x) == result_full);
  209. exit:
  210. mbedtls_mpi_free(&N); mbedtls_mpi_free(&E);
  211. mbedtls_rsa_free(&ctx);
  212. }
  213. /* END_CASE */