Source file
src/crypto/rsa/pkcs1v15_test.go
1
2
3
4
5 package rsa_test
6
7 import (
8 "bytes"
9 "crypto"
10 "crypto/rand"
11 . "crypto/rsa"
12 "crypto/sha1"
13 "crypto/sha256"
14 "crypto/x509"
15 "encoding/base64"
16 "encoding/hex"
17 "encoding/pem"
18 "io"
19 "testing"
20 "testing/quick"
21 )
22
23 func decodeBase64(in string) []byte {
24 out := make([]byte, base64.StdEncoding.DecodedLen(len(in)))
25 n, err := base64.StdEncoding.Decode(out, []byte(in))
26 if err != nil {
27 return nil
28 }
29 return out[0:n]
30 }
31
32 type DecryptPKCS1v15Test struct {
33 in, out string
34 }
35
36
37 var decryptPKCS1v15Tests = []DecryptPKCS1v15Test{
38 {
39 "gIcUIoVkD6ATMBk/u/nlCZCCWRKdkfjCgFdo35VpRXLduiKXhNz1XupLLzTXAybEq15juc+EgY5o0DHv/nt3yg==",
40 "x",
41 },
42 {
43 "Y7TOCSqofGhkRb+jaVRLzK8xw2cSo1IVES19utzv6hwvx+M8kFsoWQm5DzBeJCZTCVDPkTpavUuEbgp8hnUGDw==",
44 "testing.",
45 },
46 {
47 "arReP9DJtEVyV2Dg3dDp4c/PSk1O6lxkoJ8HcFupoRorBZG+7+1fDAwT1olNddFnQMjmkb8vxwmNMoTAT/BFjQ==",
48 "testing.\n",
49 },
50 {
51 "WtaBXIoGC54+vH0NH0CHHE+dRDOsMc/6BrfFu2lEqcKL9+uDuWaf+Xj9mrbQCjjZcpQuX733zyok/jsnqe/Ftw==",
52 "01234567890123456789012345678901234567890123456789012",
53 },
54 }
55
56 func TestDecryptPKCS1v15(t *testing.T) {
57 decryptionFuncs := []func([]byte) ([]byte, error){
58 func(ciphertext []byte) (plaintext []byte, err error) {
59 return DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
60 },
61 func(ciphertext []byte) (plaintext []byte, err error) {
62 return rsaPrivateKey.Decrypt(nil, ciphertext, nil)
63 },
64 }
65
66 for _, decryptFunc := range decryptionFuncs {
67 for i, test := range decryptPKCS1v15Tests {
68 out, err := decryptFunc(decodeBase64(test.in))
69 if err != nil {
70 t.Errorf("#%d error decrypting: %v", i, err)
71 }
72 want := []byte(test.out)
73 if !bytes.Equal(out, want) {
74 t.Errorf("#%d got:%#v want:%#v", i, out, want)
75 }
76 }
77 }
78 }
79
80 func TestEncryptPKCS1v15(t *testing.T) {
81 random := rand.Reader
82 k := (rsaPrivateKey.N.BitLen() + 7) / 8
83
84 tryEncryptDecrypt := func(in []byte, blind bool) bool {
85 if len(in) > k-11 {
86 in = in[0 : k-11]
87 }
88
89 ciphertext, err := EncryptPKCS1v15(random, &rsaPrivateKey.PublicKey, in)
90 if err != nil {
91 t.Errorf("error encrypting: %s", err)
92 return false
93 }
94
95 var rand io.Reader
96 if !blind {
97 rand = nil
98 } else {
99 rand = random
100 }
101 plaintext, err := DecryptPKCS1v15(rand, rsaPrivateKey, ciphertext)
102 if err != nil {
103 t.Errorf("error decrypting: %s", err)
104 return false
105 }
106
107 if !bytes.Equal(plaintext, in) {
108 t.Errorf("output mismatch: %#v %#v", plaintext, in)
109 return false
110 }
111 return true
112 }
113
114 config := new(quick.Config)
115 if testing.Short() {
116 config.MaxCount = 10
117 }
118 quick.Check(tryEncryptDecrypt, config)
119 }
120
121
122 var decryptPKCS1v15SessionKeyTests = []DecryptPKCS1v15Test{
123 {
124 "e6ukkae6Gykq0fKzYwULpZehX+UPXYzMoB5mHQUDEiclRbOTqas4Y0E6nwns1BBpdvEJcilhl5zsox/6DtGsYg==",
125 "1234",
126 },
127 {
128 "Dtis4uk/q/LQGGqGk97P59K03hkCIVFMEFZRgVWOAAhxgYpCRG0MX2adptt92l67IqMki6iVQyyt0TtX3IdtEw==",
129 "FAIL",
130 },
131 {
132 "LIyFyCYCptPxrvTxpol8F3M7ZivlMsf53zs0vHRAv+rDIh2YsHS69ePMoPMe3TkOMZ3NupiL3takPxIs1sK+dw==",
133 "abcd",
134 },
135 {
136 "bafnobel46bKy76JzqU/RIVOH0uAYvzUtauKmIidKgM0sMlvobYVAVQPeUQ/oTGjbIZ1v/6Gyi5AO4DtHruGdw==",
137 "FAIL",
138 },
139 }
140
141 func TestEncryptPKCS1v15SessionKey(t *testing.T) {
142 for i, test := range decryptPKCS1v15SessionKeyTests {
143 key := []byte("FAIL")
144 err := DecryptPKCS1v15SessionKey(nil, rsaPrivateKey, decodeBase64(test.in), key)
145 if err != nil {
146 t.Errorf("#%d error decrypting", i)
147 }
148 want := []byte(test.out)
149 if !bytes.Equal(key, want) {
150 t.Errorf("#%d got:%#v want:%#v", i, key, want)
151 }
152 }
153 }
154
155 func TestEncryptPKCS1v15DecrypterSessionKey(t *testing.T) {
156 for i, test := range decryptPKCS1v15SessionKeyTests {
157 plaintext, err := rsaPrivateKey.Decrypt(rand.Reader, decodeBase64(test.in), &PKCS1v15DecryptOptions{SessionKeyLen: 4})
158 if err != nil {
159 t.Fatalf("#%d: error decrypting: %s", i, err)
160 }
161 if len(plaintext) != 4 {
162 t.Fatalf("#%d: incorrect length plaintext: got %d, want 4", i, len(plaintext))
163 }
164
165 if test.out != "FAIL" && !bytes.Equal(plaintext, []byte(test.out)) {
166 t.Errorf("#%d: incorrect plaintext: got %x, want %x", i, plaintext, test.out)
167 }
168 }
169 }
170
171 func TestNonZeroRandomBytes(t *testing.T) {
172 random := rand.Reader
173
174 b := make([]byte, 512)
175 err := NonZeroRandomBytes(b, random)
176 if err != nil {
177 t.Errorf("returned error: %s", err)
178 }
179 for _, b := range b {
180 if b == 0 {
181 t.Errorf("Zero octet found")
182 return
183 }
184 }
185 }
186
187 type signPKCS1v15Test struct {
188 in, out string
189 }
190
191
192
193
194 var signPKCS1v15Tests = []signPKCS1v15Test{
195 {"Test.\n", "a4f3fa6ea93bcdd0c57be020c1193ecbfd6f200a3d95c409769b029578fa0e336ad9a347600e40d3ae823b8c7e6bad88cc07c1d54c3a1523cbbb6d58efc362ae"},
196 }
197
198 func TestSignPKCS1v15(t *testing.T) {
199 for i, test := range signPKCS1v15Tests {
200 h := sha1.New()
201 h.Write([]byte(test.in))
202 digest := h.Sum(nil)
203
204 s, err := SignPKCS1v15(nil, rsaPrivateKey, crypto.SHA1, digest)
205 if err != nil {
206 t.Errorf("#%d %s", i, err)
207 }
208
209 expected, _ := hex.DecodeString(test.out)
210 if !bytes.Equal(s, expected) {
211 t.Errorf("#%d got: %x want: %x", i, s, expected)
212 }
213 }
214 }
215
216 func TestVerifyPKCS1v15(t *testing.T) {
217 for i, test := range signPKCS1v15Tests {
218 h := sha1.New()
219 h.Write([]byte(test.in))
220 digest := h.Sum(nil)
221
222 sig, _ := hex.DecodeString(test.out)
223
224 err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA1, digest, sig)
225 if err != nil {
226 t.Errorf("#%d %s", i, err)
227 }
228 }
229 }
230
231 func TestOverlongMessagePKCS1v15(t *testing.T) {
232 ciphertext := decodeBase64("fjOVdirUzFoLlukv80dBllMLjXythIf22feqPrNo0YoIjzyzyoMFiLjAc/Y4krkeZ11XFThIrEvw\nkRiZcCq5ng==")
233 _, err := DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
234 if err == nil {
235 t.Error("RSA decrypted a message that was too long.")
236 }
237 }
238
239 func TestUnpaddedSignature(t *testing.T) {
240 msg := []byte("Thu Dec 19 18:06:16 EST 2013\n")
241
242
243
244
245
246
247 expectedSig := decodeBase64("pX4DR8azytjdQ1rtUiC040FjkepuQut5q2ZFX1pTjBrOVKNjgsCDyiJDGZTCNoh9qpXYbhl7iEym30BWWwuiZg==")
248
249 sig, err := SignPKCS1v15(nil, rsaPrivateKey, crypto.Hash(0), msg)
250 if err != nil {
251 t.Fatalf("SignPKCS1v15 failed: %s", err)
252 }
253 if !bytes.Equal(sig, expectedSig) {
254 t.Fatalf("signature is not expected value: got %x, want %x", sig, expectedSig)
255 }
256 if err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.Hash(0), msg, sig); err != nil {
257 t.Fatalf("signature failed to verify: %s", err)
258 }
259 }
260
261 func TestShortSessionKey(t *testing.T) {
262
263
264 ciphertext, err := EncryptPKCS1v15(rand.Reader, &rsaPrivateKey.PublicKey, []byte{1})
265 if err != nil {
266 t.Fatalf("Failed to encrypt short message: %s", err)
267 }
268
269 var key [32]byte
270 if err := DecryptPKCS1v15SessionKey(nil, rsaPrivateKey, ciphertext, key[:]); err != nil {
271 t.Fatalf("Failed to decrypt short message: %s", err)
272 }
273
274 for _, v := range key {
275 if v != 0 {
276 t.Fatal("key was modified when ciphertext was invalid")
277 }
278 }
279 }
280
281 var rsaPrivateKey = parseKey(testingKey(`-----BEGIN RSA TESTING KEY-----
282 MIIBOgIBAAJBALKZD0nEffqM1ACuak0bijtqE2QrI/KLADv7l3kK3ppMyCuLKoF0
283 fd7Ai2KW5ToIwzFofvJcS/STa6HA5gQenRUCAwEAAQJBAIq9amn00aS0h/CrjXqu
284 /ThglAXJmZhOMPVn4eiu7/ROixi9sex436MaVeMqSNf7Ex9a8fRNfWss7Sqd9eWu
285 RTUCIQDasvGASLqmjeffBNLTXV2A5g4t+kLVCpsEIZAycV5GswIhANEPLmax0ME/
286 EO+ZJ79TJKN5yiGBRsv5yvx5UiHxajEXAiAhAol5N4EUyq6I9w1rYdhPMGpLfk7A
287 IU2snfRJ6Nq2CQIgFrPsWRCkV+gOYcajD17rEqmuLrdIRexpg8N1DOSXoJ8CIGlS
288 tAboUGBxTDq3ZroNism3DaMIbKPyYrAqhKov1h5V
289 -----END RSA TESTING KEY-----`))
290
291 func parsePublicKey(s string) *PublicKey {
292 p, _ := pem.Decode([]byte(s))
293 k, err := x509.ParsePKCS1PublicKey(p.Bytes)
294 if err != nil {
295 panic(err)
296 }
297 return k
298 }
299
300 func TestShortPKCS1v15Signature(t *testing.T) {
301 pub := parsePublicKey(`-----BEGIN RSA PUBLIC KEY-----
302 MEgCQQCd9BVzo775lkohasxjnefF1nCMcNoibqIWEVDe/K7M2GSoO4zlSQB+gkix
303 O3AnTcdHB51iaZpWfxPSnew8yfulAgMBAAE=
304 -----END RSA PUBLIC KEY-----`)
305 sig, err := hex.DecodeString("193a310d0dcf64094c6e3a00c8219b80ded70535473acff72c08e1222974bb24a93a535b1dc4c59fc0e65775df7ba2007dd20e9193f4c4025a18a7070aee93")
306 if err != nil {
307 t.Fatalf("failed to decode signature: %s", err)
308 }
309
310 h := sha256.Sum256([]byte("hello"))
311 err = VerifyPKCS1v15(pub, crypto.SHA256, h[:], sig)
312 if err == nil {
313 t.Fatal("VerifyPKCS1v15 accepted a truncated signature")
314 }
315 }
316
View as plain text