pkcs1v15_test.go 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299
  1. // Copyright 2009 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package rsa
  5. import (
  6. "bytes"
  7. "crypto"
  8. "crypto/rand"
  9. "crypto/sha1"
  10. "encoding/base64"
  11. "encoding/hex"
  12. "io"
  13. "math/big"
  14. "testing"
  15. "testing/quick"
  16. )
  17. func decodeBase64(in string) []byte {
  18. out := make([]byte, base64.StdEncoding.DecodedLen(len(in)))
  19. n, err := base64.StdEncoding.Decode(out, []byte(in))
  20. if err != nil {
  21. return nil
  22. }
  23. return out[0:n]
  24. }
  25. type DecryptPKCS1v15Test struct {
  26. in, out string
  27. }
  28. // These test vectors were generated with `openssl rsautl -pkcs -encrypt`
  29. var decryptPKCS1v15Tests = []DecryptPKCS1v15Test{
  30. {
  31. "gIcUIoVkD6ATMBk/u/nlCZCCWRKdkfjCgFdo35VpRXLduiKXhNz1XupLLzTXAybEq15juc+EgY5o0DHv/nt3yg==",
  32. "x",
  33. },
  34. {
  35. "Y7TOCSqofGhkRb+jaVRLzK8xw2cSo1IVES19utzv6hwvx+M8kFsoWQm5DzBeJCZTCVDPkTpavUuEbgp8hnUGDw==",
  36. "testing.",
  37. },
  38. {
  39. "arReP9DJtEVyV2Dg3dDp4c/PSk1O6lxkoJ8HcFupoRorBZG+7+1fDAwT1olNddFnQMjmkb8vxwmNMoTAT/BFjQ==",
  40. "testing.\n",
  41. },
  42. {
  43. "WtaBXIoGC54+vH0NH0CHHE+dRDOsMc/6BrfFu2lEqcKL9+uDuWaf+Xj9mrbQCjjZcpQuX733zyok/jsnqe/Ftw==",
  44. "01234567890123456789012345678901234567890123456789012",
  45. },
  46. }
  47. func TestDecryptPKCS1v15(t *testing.T) {
  48. decryptionFuncs := []func([]byte) ([]byte, error){
  49. func(ciphertext []byte) (plaintext []byte, err error) {
  50. return DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
  51. },
  52. func(ciphertext []byte) (plaintext []byte, err error) {
  53. return rsaPrivateKey.Decrypt(nil, ciphertext, nil)
  54. },
  55. }
  56. for _, decryptFunc := range decryptionFuncs {
  57. for i, test := range decryptPKCS1v15Tests {
  58. out, err := decryptFunc(decodeBase64(test.in))
  59. if err != nil {
  60. t.Errorf("#%d error decrypting", i)
  61. }
  62. want := []byte(test.out)
  63. if !bytes.Equal(out, want) {
  64. t.Errorf("#%d got:%#v want:%#v", i, out, want)
  65. }
  66. }
  67. }
  68. }
  69. func TestEncryptPKCS1v15(t *testing.T) {
  70. random := rand.Reader
  71. k := (rsaPrivateKey.N.BitLen() + 7) / 8
  72. tryEncryptDecrypt := func(in []byte, blind bool) bool {
  73. if len(in) > k-11 {
  74. in = in[0 : k-11]
  75. }
  76. ciphertext, err := EncryptPKCS1v15(random, &rsaPrivateKey.PublicKey, in)
  77. if err != nil {
  78. t.Errorf("error encrypting: %s", err)
  79. return false
  80. }
  81. var rand io.Reader
  82. if !blind {
  83. rand = nil
  84. } else {
  85. rand = random
  86. }
  87. plaintext, err := DecryptPKCS1v15(rand, rsaPrivateKey, ciphertext)
  88. if err != nil {
  89. t.Errorf("error decrypting: %s", err)
  90. return false
  91. }
  92. if !bytes.Equal(plaintext, in) {
  93. t.Errorf("output mismatch: %#v %#v", plaintext, in)
  94. return false
  95. }
  96. return true
  97. }
  98. config := new(quick.Config)
  99. if testing.Short() {
  100. config.MaxCount = 10
  101. }
  102. quick.Check(tryEncryptDecrypt, config)
  103. }
  104. // These test vectors were generated with `openssl rsautl -pkcs -encrypt`
  105. var decryptPKCS1v15SessionKeyTests = []DecryptPKCS1v15Test{
  106. {
  107. "e6ukkae6Gykq0fKzYwULpZehX+UPXYzMoB5mHQUDEiclRbOTqas4Y0E6nwns1BBpdvEJcilhl5zsox/6DtGsYg==",
  108. "1234",
  109. },
  110. {
  111. "Dtis4uk/q/LQGGqGk97P59K03hkCIVFMEFZRgVWOAAhxgYpCRG0MX2adptt92l67IqMki6iVQyyt0TtX3IdtEw==",
  112. "FAIL",
  113. },
  114. {
  115. "LIyFyCYCptPxrvTxpol8F3M7ZivlMsf53zs0vHRAv+rDIh2YsHS69ePMoPMe3TkOMZ3NupiL3takPxIs1sK+dw==",
  116. "abcd",
  117. },
  118. {
  119. "bafnobel46bKy76JzqU/RIVOH0uAYvzUtauKmIidKgM0sMlvobYVAVQPeUQ/oTGjbIZ1v/6Gyi5AO4DtHruGdw==",
  120. "FAIL",
  121. },
  122. }
  123. func TestEncryptPKCS1v15SessionKey(t *testing.T) {
  124. for i, test := range decryptPKCS1v15SessionKeyTests {
  125. key := []byte("FAIL")
  126. err := DecryptPKCS1v15SessionKey(nil, rsaPrivateKey, decodeBase64(test.in), key)
  127. if err != nil {
  128. t.Errorf("#%d error decrypting", i)
  129. }
  130. want := []byte(test.out)
  131. if !bytes.Equal(key, want) {
  132. t.Errorf("#%d got:%#v want:%#v", i, key, want)
  133. }
  134. }
  135. }
  136. func TestEncryptPKCS1v15DecrypterSessionKey(t *testing.T) {
  137. for i, test := range decryptPKCS1v15SessionKeyTests {
  138. plaintext, err := rsaPrivateKey.Decrypt(rand.Reader, decodeBase64(test.in), &PKCS1v15DecryptOptions{SessionKeyLen: 4})
  139. if err != nil {
  140. t.Fatalf("#%d: error decrypting: %s", i, err)
  141. }
  142. if len(plaintext) != 4 {
  143. t.Fatalf("#%d: incorrect length plaintext: got %d, want 4", i, len(plaintext))
  144. }
  145. if test.out != "FAIL" && !bytes.Equal(plaintext, []byte(test.out)) {
  146. t.Errorf("#%d: incorrect plaintext: got %x, want %x", i, plaintext, test.out)
  147. }
  148. }
  149. }
  150. func TestNonZeroRandomBytes(t *testing.T) {
  151. random := rand.Reader
  152. b := make([]byte, 512)
  153. err := nonZeroRandomBytes(b, random)
  154. if err != nil {
  155. t.Errorf("returned error: %s", err)
  156. }
  157. for _, b := range b {
  158. if b == 0 {
  159. t.Errorf("Zero octet found")
  160. return
  161. }
  162. }
  163. }
  164. type signPKCS1v15Test struct {
  165. in, out string
  166. }
  167. // These vectors have been tested with
  168. // `openssl rsautl -verify -inkey pk -in signature | hexdump -C`
  169. var signPKCS1v15Tests = []signPKCS1v15Test{
  170. {"Test.\n", "a4f3fa6ea93bcdd0c57be020c1193ecbfd6f200a3d95c409769b029578fa0e336ad9a347600e40d3ae823b8c7e6bad88cc07c1d54c3a1523cbbb6d58efc362ae"},
  171. }
  172. func TestSignPKCS1v15(t *testing.T) {
  173. for i, test := range signPKCS1v15Tests {
  174. h := sha1.New()
  175. h.Write([]byte(test.in))
  176. digest := h.Sum(nil)
  177. s, err := SignPKCS1v15(nil, rsaPrivateKey, crypto.SHA1, digest)
  178. if err != nil {
  179. t.Errorf("#%d %s", i, err)
  180. }
  181. expected, _ := hex.DecodeString(test.out)
  182. if !bytes.Equal(s, expected) {
  183. t.Errorf("#%d got: %x want: %x", i, s, expected)
  184. }
  185. }
  186. }
  187. func TestVerifyPKCS1v15(t *testing.T) {
  188. for i, test := range signPKCS1v15Tests {
  189. h := sha1.New()
  190. h.Write([]byte(test.in))
  191. digest := h.Sum(nil)
  192. sig, _ := hex.DecodeString(test.out)
  193. err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA1, digest, sig)
  194. if err != nil {
  195. t.Errorf("#%d %s", i, err)
  196. }
  197. }
  198. }
  199. func TestOverlongMessagePKCS1v15(t *testing.T) {
  200. ciphertext := decodeBase64("fjOVdirUzFoLlukv80dBllMLjXythIf22feqPrNo0YoIjzyzyoMFiLjAc/Y4krkeZ11XFThIrEvw\nkRiZcCq5ng==")
  201. _, err := DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
  202. if err == nil {
  203. t.Error("RSA decrypted a message that was too long.")
  204. }
  205. }
  206. func TestUnpaddedSignature(t *testing.T) {
  207. msg := []byte("Thu Dec 19 18:06:16 EST 2013\n")
  208. // This base64 value was generated with:
  209. // % echo Thu Dec 19 18:06:16 EST 2013 > /tmp/msg
  210. // % openssl rsautl -sign -inkey key -out /tmp/sig -in /tmp/msg
  211. //
  212. // Where "key" contains the RSA private key given at the bottom of this
  213. // file.
  214. expectedSig := decodeBase64("pX4DR8azytjdQ1rtUiC040FjkepuQut5q2ZFX1pTjBrOVKNjgsCDyiJDGZTCNoh9qpXYbhl7iEym30BWWwuiZg==")
  215. sig, err := SignPKCS1v15(nil, rsaPrivateKey, crypto.Hash(0), msg)
  216. if err != nil {
  217. t.Fatalf("SignPKCS1v15 failed: %s", err)
  218. }
  219. if !bytes.Equal(sig, expectedSig) {
  220. t.Fatalf("signature is not expected value: got %x, want %x", sig, expectedSig)
  221. }
  222. if err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.Hash(0), msg, sig); err != nil {
  223. t.Fatalf("signature failed to verify: %s", err)
  224. }
  225. }
  226. func TestShortSessionKey(t *testing.T) {
  227. // This tests that attempting to decrypt a session key where the
  228. // ciphertext is too small doesn't run outside the array bounds.
  229. ciphertext, err := EncryptPKCS1v15(rand.Reader, &rsaPrivateKey.PublicKey, []byte{1})
  230. if err != nil {
  231. t.Fatalf("Failed to encrypt short message: %s", err)
  232. }
  233. var key [32]byte
  234. if err := DecryptPKCS1v15SessionKey(nil, rsaPrivateKey, ciphertext, key[:]); err != nil {
  235. t.Fatalf("Failed to decrypt short message: %s", err)
  236. }
  237. for _, v := range key {
  238. if v != 0 {
  239. t.Fatal("key was modified when ciphertext was invalid")
  240. }
  241. }
  242. }
  243. // In order to generate new test vectors you'll need the PEM form of this key:
  244. // -----BEGIN RSA PRIVATE KEY-----
  245. // MIIBOgIBAAJBALKZD0nEffqM1ACuak0bijtqE2QrI/KLADv7l3kK3ppMyCuLKoF0
  246. // fd7Ai2KW5ToIwzFofvJcS/STa6HA5gQenRUCAwEAAQJBAIq9amn00aS0h/CrjXqu
  247. // /ThglAXJmZhOMPVn4eiu7/ROixi9sex436MaVeMqSNf7Ex9a8fRNfWss7Sqd9eWu
  248. // RTUCIQDasvGASLqmjeffBNLTXV2A5g4t+kLVCpsEIZAycV5GswIhANEPLmax0ME/
  249. // EO+ZJ79TJKN5yiGBRsv5yvx5UiHxajEXAiAhAol5N4EUyq6I9w1rYdhPMGpLfk7A
  250. // IU2snfRJ6Nq2CQIgFrPsWRCkV+gOYcajD17rEqmuLrdIRexpg8N1DOSXoJ8CIGlS
  251. // tAboUGBxTDq3ZroNism3DaMIbKPyYrAqhKov1h5V
  252. // -----END RSA PRIVATE KEY-----
  253. var rsaPrivateKey = &PrivateKey{
  254. PublicKey: PublicKey{
  255. N: fromBase10("9353930466774385905609975137998169297361893554149986716853295022578535724979677252958524466350471210367835187480748268864277464700638583474144061408845077"),
  256. E: 65537,
  257. },
  258. D: fromBase10("7266398431328116344057699379749222532279343923819063639497049039389899328538543087657733766554155839834519529439851673014800261285757759040931985506583861"),
  259. Primes: []*big.Int{
  260. fromBase10("98920366548084643601728869055592650835572950932266967461790948584315647051443"),
  261. fromBase10("94560208308847015747498523884063394671606671904944666360068158221458669711639"),
  262. },
  263. }