Mirror of BoringSSL (grpc依赖)
https://boringssl.googlesource.com/boringssl
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
125 lines
3.4 KiB
125 lines
3.4 KiB
/* Copyright (c) 2017, Google Inc. |
|
* |
|
* Permission to use, copy, modify, and/or distribute this software for any |
|
* purpose with or without fee is hereby granted, provided that the above |
|
* copyright notice and this permission notice appear in all copies. |
|
* |
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
|
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
|
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
|
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
|
|
|
// cavp_rsa2_sigver_test processes NIST CAVP RSA2 SigVer test vector request |
|
// files and emits the corresponding response. |
|
|
|
#include <vector> |
|
|
|
#include <openssl/bn.h> |
|
#include <openssl/crypto.h> |
|
#include <openssl/digest.h> |
|
#include <openssl/err.h> |
|
#include <openssl/rsa.h> |
|
|
|
#include "../crypto/internal.h" |
|
#include "../crypto/test/file_test.h" |
|
#include "cavp_test_util.h" |
|
|
|
|
|
namespace { |
|
|
|
struct TestCtx { |
|
std::vector<uint8_t> N; |
|
bool is_pss; |
|
}; |
|
|
|
} |
|
|
|
static bool TestRSA2SigVer(FileTest *t, void *arg) { |
|
TestCtx *ctx = reinterpret_cast<TestCtx *>(arg); |
|
|
|
std::string mod_str; |
|
if (!t->GetInstruction(&mod_str, "mod")) { |
|
return false; |
|
} |
|
|
|
printf("%s", t->CurrentTestToString().c_str()); |
|
|
|
if (t->HasAttribute("n")) { |
|
printf("\r\n"); |
|
return t->GetBytes(&ctx->N, "n"); |
|
} |
|
|
|
std::string hash; |
|
std::vector<uint8_t> e_bytes, msg, sig; |
|
if (!t->GetAttribute(&hash, "SHAAlg") || |
|
!t->GetBytes(&e_bytes, "e") || |
|
!t->GetBytes(&msg, "Msg") || |
|
!t->GetBytes(&sig, "S")) { |
|
return false; |
|
} |
|
|
|
bssl::UniquePtr<RSA> key(RSA_new()); |
|
key->n = BN_new(); |
|
key->e = BN_new(); |
|
if (key == nullptr || |
|
!BN_bin2bn(ctx->N.data(), ctx->N.size(), key->n) || |
|
!BN_bin2bn(e_bytes.data(), e_bytes.size(), key->e)) { |
|
return false; |
|
} |
|
|
|
const EVP_MD *md = EVP_get_digestbyname(hash.c_str()); |
|
uint8_t digest_buf[EVP_MAX_MD_SIZE]; |
|
unsigned digest_len; |
|
if (md == NULL || |
|
!EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { |
|
return false; |
|
} |
|
|
|
int ok; |
|
if (ctx->is_pss) { |
|
ok = RSA_verify_pss_mgf1(key.get(), digest_buf, digest_len, md, md, -1, |
|
sig.data(), sig.size()); |
|
} else { |
|
ok = RSA_verify(EVP_MD_type(md), digest_buf, digest_len, sig.data(), |
|
sig.size(), key.get()); |
|
} |
|
|
|
if (ok) { |
|
printf("Result = P\r\n\r\n"); |
|
} else { |
|
char buf[256]; |
|
ERR_error_string_n(ERR_get_error(), buf, sizeof(buf)); |
|
printf("Result = F (%s)\r\n\r\n", buf); |
|
} |
|
ERR_clear_error(); |
|
return true; |
|
} |
|
|
|
int cavp_rsa2_sigver_test_main(int argc, char **argv) { |
|
if (argc != 3) { |
|
fprintf(stderr, "usage: %s (pkcs15|pss) <test file>\n", |
|
argv[0]); |
|
return 1; |
|
} |
|
|
|
TestCtx ctx; |
|
if (strcmp(argv[1], "pkcs15") == 0) { |
|
ctx = {std::vector<uint8_t>(), false}; |
|
} else if (strcmp(argv[1], "pss") == 0) { |
|
ctx = {std::vector<uint8_t>(), true}; |
|
} else { |
|
fprintf(stderr, "Unknown test type: %s\n", argv[1]); |
|
return 1; |
|
} |
|
|
|
FileTest::Options opts; |
|
opts.path = argv[2]; |
|
opts.callback = TestRSA2SigVer; |
|
opts.arg = &ctx; |
|
opts.silent = true; |
|
opts.comment_callback = EchoComment; |
|
return FileTestMain(opts); |
|
}
|
|
|