| 1 |
747 |
jeremybenn |
// Copyright 2009 The Go Authors. All rights reserved.
|
| 2 |
|
|
// Use of this source code is governed by a BSD-style
|
| 3 |
|
|
// license that can be found in the LICENSE file.
|
| 4 |
|
|
|
| 5 |
|
|
package rsa
|
| 6 |
|
|
|
| 7 |
|
|
import (
|
| 8 |
|
|
"bytes"
|
| 9 |
|
|
"crypto"
|
| 10 |
|
|
"crypto/rand"
|
| 11 |
|
|
"crypto/sha1"
|
| 12 |
|
|
"encoding/base64"
|
| 13 |
|
|
"encoding/hex"
|
| 14 |
|
|
"io"
|
| 15 |
|
|
"math/big"
|
| 16 |
|
|
"testing"
|
| 17 |
|
|
"testing/quick"
|
| 18 |
|
|
)
|
| 19 |
|
|
|
| 20 |
|
|
func decodeBase64(in string) []byte {
|
| 21 |
|
|
out := make([]byte, base64.StdEncoding.DecodedLen(len(in)))
|
| 22 |
|
|
n, err := base64.StdEncoding.Decode(out, []byte(in))
|
| 23 |
|
|
if err != nil {
|
| 24 |
|
|
return nil
|
| 25 |
|
|
}
|
| 26 |
|
|
return out[0:n]
|
| 27 |
|
|
}
|
| 28 |
|
|
|
| 29 |
|
|
type DecryptPKCS1v15Test struct {
|
| 30 |
|
|
in, out string
|
| 31 |
|
|
}
|
| 32 |
|
|
|
| 33 |
|
|
// These test vectors were generated with `openssl rsautl -pkcs -encrypt`
|
| 34 |
|
|
var decryptPKCS1v15Tests = []DecryptPKCS1v15Test{
|
| 35 |
|
|
{
|
| 36 |
|
|
"gIcUIoVkD6ATMBk/u/nlCZCCWRKdkfjCgFdo35VpRXLduiKXhNz1XupLLzTXAybEq15juc+EgY5o0DHv/nt3yg==",
|
| 37 |
|
|
"x",
|
| 38 |
|
|
},
|
| 39 |
|
|
{
|
| 40 |
|
|
"Y7TOCSqofGhkRb+jaVRLzK8xw2cSo1IVES19utzv6hwvx+M8kFsoWQm5DzBeJCZTCVDPkTpavUuEbgp8hnUGDw==",
|
| 41 |
|
|
"testing.",
|
| 42 |
|
|
},
|
| 43 |
|
|
{
|
| 44 |
|
|
"arReP9DJtEVyV2Dg3dDp4c/PSk1O6lxkoJ8HcFupoRorBZG+7+1fDAwT1olNddFnQMjmkb8vxwmNMoTAT/BFjQ==",
|
| 45 |
|
|
"testing.\n",
|
| 46 |
|
|
},
|
| 47 |
|
|
{
|
| 48 |
|
|
"WtaBXIoGC54+vH0NH0CHHE+dRDOsMc/6BrfFu2lEqcKL9+uDuWaf+Xj9mrbQCjjZcpQuX733zyok/jsnqe/Ftw==",
|
| 49 |
|
|
"01234567890123456789012345678901234567890123456789012",
|
| 50 |
|
|
},
|
| 51 |
|
|
}
|
| 52 |
|
|
|
| 53 |
|
|
func TestDecryptPKCS1v15(t *testing.T) {
|
| 54 |
|
|
for i, test := range decryptPKCS1v15Tests {
|
| 55 |
|
|
out, err := DecryptPKCS1v15(nil, rsaPrivateKey, decodeBase64(test.in))
|
| 56 |
|
|
if err != nil {
|
| 57 |
|
|
t.Errorf("#%d error decrypting", i)
|
| 58 |
|
|
}
|
| 59 |
|
|
want := []byte(test.out)
|
| 60 |
|
|
if bytes.Compare(out, want) != 0 {
|
| 61 |
|
|
t.Errorf("#%d got:%#v want:%#v", i, out, want)
|
| 62 |
|
|
}
|
| 63 |
|
|
}
|
| 64 |
|
|
}
|
| 65 |
|
|
|
| 66 |
|
|
func TestEncryptPKCS1v15(t *testing.T) {
|
| 67 |
|
|
random := rand.Reader
|
| 68 |
|
|
k := (rsaPrivateKey.N.BitLen() + 7) / 8
|
| 69 |
|
|
|
| 70 |
|
|
tryEncryptDecrypt := func(in []byte, blind bool) bool {
|
| 71 |
|
|
if len(in) > k-11 {
|
| 72 |
|
|
in = in[0 : k-11]
|
| 73 |
|
|
}
|
| 74 |
|
|
|
| 75 |
|
|
ciphertext, err := EncryptPKCS1v15(random, &rsaPrivateKey.PublicKey, in)
|
| 76 |
|
|
if err != nil {
|
| 77 |
|
|
t.Errorf("error encrypting: %s", err)
|
| 78 |
|
|
return false
|
| 79 |
|
|
}
|
| 80 |
|
|
|
| 81 |
|
|
var rand io.Reader
|
| 82 |
|
|
if !blind {
|
| 83 |
|
|
rand = nil
|
| 84 |
|
|
} else {
|
| 85 |
|
|
rand = random
|
| 86 |
|
|
}
|
| 87 |
|
|
plaintext, err := DecryptPKCS1v15(rand, rsaPrivateKey, ciphertext)
|
| 88 |
|
|
if err != nil {
|
| 89 |
|
|
t.Errorf("error decrypting: %s", err)
|
| 90 |
|
|
return false
|
| 91 |
|
|
}
|
| 92 |
|
|
|
| 93 |
|
|
if bytes.Compare(plaintext, in) != 0 {
|
| 94 |
|
|
t.Errorf("output mismatch: %#v %#v", plaintext, in)
|
| 95 |
|
|
return false
|
| 96 |
|
|
}
|
| 97 |
|
|
return true
|
| 98 |
|
|
}
|
| 99 |
|
|
|
| 100 |
|
|
config := new(quick.Config)
|
| 101 |
|
|
if testing.Short() {
|
| 102 |
|
|
config.MaxCount = 10
|
| 103 |
|
|
}
|
| 104 |
|
|
quick.Check(tryEncryptDecrypt, config)
|
| 105 |
|
|
}
|
| 106 |
|
|
|
| 107 |
|
|
// These test vectors were generated with `openssl rsautl -pkcs -encrypt`
|
| 108 |
|
|
var decryptPKCS1v15SessionKeyTests = []DecryptPKCS1v15Test{
|
| 109 |
|
|
{
|
| 110 |
|
|
"e6ukkae6Gykq0fKzYwULpZehX+UPXYzMoB5mHQUDEiclRbOTqas4Y0E6nwns1BBpdvEJcilhl5zsox/6DtGsYg==",
|
| 111 |
|
|
"1234",
|
| 112 |
|
|
},
|
| 113 |
|
|
{
|
| 114 |
|
|
"Dtis4uk/q/LQGGqGk97P59K03hkCIVFMEFZRgVWOAAhxgYpCRG0MX2adptt92l67IqMki6iVQyyt0TtX3IdtEw==",
|
| 115 |
|
|
"FAIL",
|
| 116 |
|
|
},
|
| 117 |
|
|
{
|
| 118 |
|
|
"LIyFyCYCptPxrvTxpol8F3M7ZivlMsf53zs0vHRAv+rDIh2YsHS69ePMoPMe3TkOMZ3NupiL3takPxIs1sK+dw==",
|
| 119 |
|
|
"abcd",
|
| 120 |
|
|
},
|
| 121 |
|
|
{
|
| 122 |
|
|
"bafnobel46bKy76JzqU/RIVOH0uAYvzUtauKmIidKgM0sMlvobYVAVQPeUQ/oTGjbIZ1v/6Gyi5AO4DtHruGdw==",
|
| 123 |
|
|
"FAIL",
|
| 124 |
|
|
},
|
| 125 |
|
|
}
|
| 126 |
|
|
|
| 127 |
|
|
func TestEncryptPKCS1v15SessionKey(t *testing.T) {
|
| 128 |
|
|
for i, test := range decryptPKCS1v15SessionKeyTests {
|
| 129 |
|
|
key := []byte("FAIL")
|
| 130 |
|
|
err := DecryptPKCS1v15SessionKey(nil, rsaPrivateKey, decodeBase64(test.in), key)
|
| 131 |
|
|
if err != nil {
|
| 132 |
|
|
t.Errorf("#%d error decrypting", i)
|
| 133 |
|
|
}
|
| 134 |
|
|
want := []byte(test.out)
|
| 135 |
|
|
if bytes.Compare(key, want) != 0 {
|
| 136 |
|
|
t.Errorf("#%d got:%#v want:%#v", i, key, want)
|
| 137 |
|
|
}
|
| 138 |
|
|
}
|
| 139 |
|
|
}
|
| 140 |
|
|
|
| 141 |
|
|
func TestNonZeroRandomBytes(t *testing.T) {
|
| 142 |
|
|
random := rand.Reader
|
| 143 |
|
|
|
| 144 |
|
|
b := make([]byte, 512)
|
| 145 |
|
|
err := nonZeroRandomBytes(b, random)
|
| 146 |
|
|
if err != nil {
|
| 147 |
|
|
t.Errorf("returned error: %s", err)
|
| 148 |
|
|
}
|
| 149 |
|
|
for _, b := range b {
|
| 150 |
|
|
if b == 0 {
|
| 151 |
|
|
t.Errorf("Zero octet found")
|
| 152 |
|
|
return
|
| 153 |
|
|
}
|
| 154 |
|
|
}
|
| 155 |
|
|
}
|
| 156 |
|
|
|
| 157 |
|
|
type signPKCS1v15Test struct {
|
| 158 |
|
|
in, out string
|
| 159 |
|
|
}
|
| 160 |
|
|
|
| 161 |
|
|
// These vectors have been tested with
|
| 162 |
|
|
// `openssl rsautl -verify -inkey pk -in signature | hexdump -C`
|
| 163 |
|
|
var signPKCS1v15Tests = []signPKCS1v15Test{
|
| 164 |
|
|
{"Test.\n", "a4f3fa6ea93bcdd0c57be020c1193ecbfd6f200a3d95c409769b029578fa0e336ad9a347600e40d3ae823b8c7e6bad88cc07c1d54c3a1523cbbb6d58efc362ae"},
|
| 165 |
|
|
}
|
| 166 |
|
|
|
| 167 |
|
|
func TestSignPKCS1v15(t *testing.T) {
|
| 168 |
|
|
for i, test := range signPKCS1v15Tests {
|
| 169 |
|
|
h := sha1.New()
|
| 170 |
|
|
h.Write([]byte(test.in))
|
| 171 |
|
|
digest := h.Sum(nil)
|
| 172 |
|
|
|
| 173 |
|
|
s, err := SignPKCS1v15(nil, rsaPrivateKey, crypto.SHA1, digest)
|
| 174 |
|
|
if err != nil {
|
| 175 |
|
|
t.Errorf("#%d %s", i, err)
|
| 176 |
|
|
}
|
| 177 |
|
|
|
| 178 |
|
|
expected, _ := hex.DecodeString(test.out)
|
| 179 |
|
|
if bytes.Compare(s, expected) != 0 {
|
| 180 |
|
|
t.Errorf("#%d got: %x want: %x", i, s, expected)
|
| 181 |
|
|
}
|
| 182 |
|
|
}
|
| 183 |
|
|
}
|
| 184 |
|
|
|
| 185 |
|
|
func TestVerifyPKCS1v15(t *testing.T) {
|
| 186 |
|
|
for i, test := range signPKCS1v15Tests {
|
| 187 |
|
|
h := sha1.New()
|
| 188 |
|
|
h.Write([]byte(test.in))
|
| 189 |
|
|
digest := h.Sum(nil)
|
| 190 |
|
|
|
| 191 |
|
|
sig, _ := hex.DecodeString(test.out)
|
| 192 |
|
|
|
| 193 |
|
|
err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA1, digest, sig)
|
| 194 |
|
|
if err != nil {
|
| 195 |
|
|
t.Errorf("#%d %s", i, err)
|
| 196 |
|
|
}
|
| 197 |
|
|
}
|
| 198 |
|
|
}
|
| 199 |
|
|
|
| 200 |
|
|
// In order to generate new test vectors you'll need the PEM form of this key:
|
| 201 |
|
|
// -----BEGIN RSA PRIVATE KEY-----
|
| 202 |
|
|
// MIIBOgIBAAJBALKZD0nEffqM1ACuak0bijtqE2QrI/KLADv7l3kK3ppMyCuLKoF0
|
| 203 |
|
|
// fd7Ai2KW5ToIwzFofvJcS/STa6HA5gQenRUCAwEAAQJBAIq9amn00aS0h/CrjXqu
|
| 204 |
|
|
// /ThglAXJmZhOMPVn4eiu7/ROixi9sex436MaVeMqSNf7Ex9a8fRNfWss7Sqd9eWu
|
| 205 |
|
|
// RTUCIQDasvGASLqmjeffBNLTXV2A5g4t+kLVCpsEIZAycV5GswIhANEPLmax0ME/
|
| 206 |
|
|
// EO+ZJ79TJKN5yiGBRsv5yvx5UiHxajEXAiAhAol5N4EUyq6I9w1rYdhPMGpLfk7A
|
| 207 |
|
|
// IU2snfRJ6Nq2CQIgFrPsWRCkV+gOYcajD17rEqmuLrdIRexpg8N1DOSXoJ8CIGlS
|
| 208 |
|
|
// tAboUGBxTDq3ZroNism3DaMIbKPyYrAqhKov1h5V
|
| 209 |
|
|
// -----END RSA PRIVATE KEY-----
|
| 210 |
|
|
|
| 211 |
|
|
var rsaPrivateKey = &PrivateKey{
|
| 212 |
|
|
PublicKey: PublicKey{
|
| 213 |
|
|
N: fromBase10("9353930466774385905609975137998169297361893554149986716853295022578535724979677252958524466350471210367835187480748268864277464700638583474144061408845077"),
|
| 214 |
|
|
E: 65537,
|
| 215 |
|
|
},
|
| 216 |
|
|
D: fromBase10("7266398431328116344057699379749222532279343923819063639497049039389899328538543087657733766554155839834519529439851673014800261285757759040931985506583861"),
|
| 217 |
|
|
Primes: []*big.Int{
|
| 218 |
|
|
fromBase10("98920366548084643601728869055592650835572950932266967461790948584315647051443"),
|
| 219 |
|
|
fromBase10("94560208308847015747498523884063394671606671904944666360068158221458669711639"),
|
| 220 |
|
|
},
|
| 221 |
|
|
}
|