123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199 |
- /*
- * Testing tool for RSA PKCS #1 v1.5 signature verification
- * Copyright (c) 2014, Jouni Malinen <j@w1.fi>
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
- #include "utils/includes.h"
- #include "utils/common.h"
- #include "crypto/crypto.h"
- #include "tls/rsa.h"
- #include "tls/asn1.h"
- #include "tls/pkcs1.h"
- static int cavp_rsa_sig_ver(const char *fname)
- {
- FILE *f;
- int ret = 0;
- char buf[15000], *pos, *pos2;
- u8 msg[200], n[512], s[512], em[512], e[512];
- size_t msg_len = 0, n_len = 0, s_len = 0, em_len, e_len = 0;
- size_t tmp_len;
- char sha_alg[20];
- int ok = 0;
- printf("CAVP RSA SigVer test vectors from %s\n", fname);
- f = fopen(fname, "r");
- if (f == NULL) {
- printf("%s does not exist - cannot validate CAVP RSA SigVer test vectors\n",
- fname);
- return 0;
- }
- while (fgets(buf, sizeof(buf), f)) {
- pos = os_strchr(buf, '=');
- if (pos == NULL)
- continue;
- pos2 = pos - 1;
- while (pos2 >= buf && *pos2 == ' ')
- *pos2-- = '\0';
- *pos++ = '\0';
- while (*pos == ' ')
- *pos++ = '\0';
- pos2 = os_strchr(pos, '\r');
- if (!pos2)
- pos2 = os_strchr(pos, '\n');
- if (pos2)
- *pos2 = '\0';
- else
- pos2 = pos + os_strlen(pos);
- if (os_strcmp(buf, "SHAAlg") == 0) {
- os_strlcpy(sha_alg, pos, sizeof(sha_alg));
- } else if (os_strcmp(buf, "Msg") == 0) {
- tmp_len = os_strlen(pos);
- if (tmp_len > sizeof(msg) * 2) {
- printf("Too long Msg\n");
- fclose(f);
- return -1;
- }
- msg_len = tmp_len / 2;
- if (hexstr2bin(pos, msg, msg_len) < 0) {
- printf("Invalid hex string '%s'\n", pos);
- ret++;
- break;
- }
- } else if (os_strcmp(buf, "n") == 0) {
- tmp_len = os_strlen(pos);
- if (tmp_len > sizeof(n) * 2) {
- printf("Too long n\n");
- fclose(f);
- return -1;
- }
- n_len = tmp_len / 2;
- if (hexstr2bin(pos, n, n_len) < 0) {
- printf("Invalid hex string '%s'\n", pos);
- ret++;
- break;
- }
- } else if (os_strcmp(buf, "e") == 0) {
- tmp_len = os_strlen(pos);
- if (tmp_len > sizeof(e) * 2) {
- printf("Too long e\n");
- fclose(f);
- return -1;
- }
- e_len = tmp_len / 2;
- if (hexstr2bin(pos, e, e_len) < 0) {
- printf("Invalid hex string '%s'\n", pos);
- ret++;
- break;
- }
- } else if (os_strcmp(buf, "S") == 0) {
- tmp_len = os_strlen(pos);
- if (tmp_len > sizeof(s) * 2) {
- printf("Too long S\n");
- fclose(f);
- return -1;
- }
- s_len = tmp_len / 2;
- if (hexstr2bin(pos, s, s_len) < 0) {
- printf("Invalid hex string '%s'\n", pos);
- ret++;
- break;
- }
- } else if (os_strncmp(buf, "EM", 2) == 0) {
- tmp_len = os_strlen(pos);
- if (tmp_len > sizeof(em) * 2) {
- fclose(f);
- return -1;
- }
- em_len = tmp_len / 2;
- if (hexstr2bin(pos, em, em_len) < 0) {
- printf("Invalid hex string '%s'\n", pos);
- ret++;
- break;
- }
- } else if (os_strcmp(buf, "Result") == 0) {
- const u8 *addr[1];
- size_t len[1];
- struct crypto_public_key *pk;
- int res;
- u8 hash[32];
- size_t hash_len;
- const struct asn1_oid *alg;
- addr[0] = msg;
- len[0] = msg_len;
- if (os_strcmp(sha_alg, "SHA1") == 0) {
- if (sha1_vector(1, addr, len, hash) < 0) {
- fclose(f);
- return -1;
- }
- hash_len = 20;
- alg = &asn1_sha1_oid;
- } else if (os_strcmp(sha_alg, "SHA256") == 0) {
- if (sha256_vector(1, addr, len, hash) < 0) {
- fclose(f);
- return -1;
- }
- hash_len = 32;
- alg = &asn1_sha256_oid;
- } else {
- continue;
- }
- printf("\nExpected result: %s\n", pos);
- wpa_hexdump(MSG_INFO, "Hash(Msg)", hash, hash_len);
- pk = crypto_public_key_import_parts(n, n_len,
- e, e_len);
- if (pk == NULL) {
- printf("Failed to import public key\n");
- ret++;
- continue;
- }
- res = pkcs1_v15_sig_ver(pk, s, s_len, alg,
- hash, hash_len);
- crypto_public_key_free(pk);
- if ((*pos == 'F' && !res) || (*pos != 'F' && res)) {
- printf("FAIL\n");
- ret++;
- continue;
- }
- printf("PASS\n");
- ok++;
- }
- }
- fclose(f);
- if (ret)
- printf("Test case failed\n");
- else
- printf("%d test vectors OK\n", ok);
- return ret;
- }
- int main(int argc, char *argv[])
- {
- int ret = 0;
- wpa_debug_level = 0;
- if (cavp_rsa_sig_ver("CAVP/SigVer15_186-3.rsp"))
- ret++;
- if (cavp_rsa_sig_ver("CAVP/SigVer15EMTest.txt"))
- ret++;
- return ret;
- }
|