/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this file, * You can obtain one at http://mozilla.org/MPL/2.0/. */ #include #include "nss.h" #include "pk11pub.h" #include "sechash.h" #include "gtest/gtest.h" #include "scoped_ptrs.h" #include "pk11_rsapss_vectors.h" #include "pk11_signature_test.h" namespace nss_test { class Pkcs11RsaPssVectorTest : public Pk11SignatureTest { public: Pkcs11RsaPssVectorTest() { rsaPssParams_.hashAlg = CKM_SHA_1; rsaPssParams_.mgf = CKG_MGF1_SHA1; rsaPssParams_.sLen = HASH_ResultLenByOidTag(SEC_OID_SHA1); params_.type = siBuffer; params_.data = reinterpret_cast(&rsaPssParams_); params_.len = sizeof(rsaPssParams_); } protected: CK_MECHANISM_TYPE mechanism() { return CKM_RSA_PKCS_PSS; } SECItem* parameters() { return ¶ms_; } SECOidTag hashOID() { return SEC_OID_SHA1; } private: CK_RSA_PKCS_PSS_PARAMS rsaPssParams_; SECItem params_; }; TEST_F(Pkcs11RsaPssVectorTest, GenerateAndSignAndVerify) { // Sign data with a 1024-bit RSA key, using PSS/SHA-256. SECOidTag hashOid = SEC_OID_SHA256; CK_MECHANISM_TYPE hashMech = CKM_SHA256; CK_RSA_PKCS_MGF_TYPE mgf = CKG_MGF1_SHA256; PK11RSAGenParams rsaGenParams = {1024, 0x10001}; // Generate RSA key pair. ScopedPK11SlotInfo slot(PK11_GetInternalSlot()); SECKEYPublicKey* pubKeyRaw = nullptr; ScopedSECKEYPrivateKey privKey( PK11_GenerateKeyPair(slot.get(), CKM_RSA_PKCS_KEY_PAIR_GEN, &rsaGenParams, &pubKeyRaw, false, false, nullptr)); ASSERT_TRUE(!!privKey && pubKeyRaw); ScopedSECKEYPublicKey pubKey(pubKeyRaw); // Generate random data to sign. uint8_t dataBuf[50]; SECItem data = {siBuffer, dataBuf, sizeof(dataBuf)}; unsigned int hLen = HASH_ResultLenByOidTag(hashOid); SECStatus rv = PK11_GenerateRandomOnSlot(slot.get(), data.data, data.len); EXPECT_EQ(rv, SECSuccess); // Allocate memory for the signature. std::vector sigBuf(PK11_SignatureLen(privKey.get())); SECItem sig = {siBuffer, &sigBuf[0], static_cast(sigBuf.size())}; // Set up PSS parameters. CK_RSA_PKCS_PSS_PARAMS rsaPssParams = {hashMech, mgf, hLen}; SECItem params = {siBuffer, reinterpret_cast(&rsaPssParams), sizeof(rsaPssParams)}; // Sign. rv = PK11_SignWithMechanism(privKey.get(), mechanism(), ¶ms, &sig, &data); EXPECT_EQ(rv, SECSuccess); // Verify. rv = PK11_VerifyWithMechanism(pubKey.get(), mechanism(), ¶ms, &sig, &data, nullptr); EXPECT_EQ(rv, SECSuccess); // Verification with modified data must fail. data.data[0] ^= 0xff; rv = PK11_VerifyWithMechanism(pubKey.get(), mechanism(), ¶ms, &sig, &data, nullptr); EXPECT_EQ(rv, SECFailure); // Verification with original data but the wrong signature must fail. data.data[0] ^= 0xff; // Revert previous changes. sig.data[0] ^= 0xff; rv = PK11_VerifyWithMechanism(pubKey.get(), mechanism(), ¶ms, &sig, &data, nullptr); EXPECT_EQ(rv, SECFailure); } // RSA-PSS test vectors, pss-vect.txt, Example 1.1: A 1024-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature1) { SIG_TEST_VECTOR_VERIFY(kTestVector1Spki, kTestVector1Data, kTestVector1Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify1) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector1Pkcs8, kTestVector1Spki, kTestVector1Data); } // RSA-PSS test vectors, pss-vect.txt, Example 2.1: A 1025-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature2) { SIG_TEST_VECTOR_VERIFY(kTestVector2Spki, kTestVector2Data, kTestVector2Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify2) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector2Pkcs8, kTestVector2Spki, kTestVector2Data); } // RSA-PSS test vectors, pss-vect.txt, Example 3.1: A 1026-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature3) { SIG_TEST_VECTOR_VERIFY(kTestVector3Spki, kTestVector3Data, kTestVector3Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify3) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector3Pkcs8, kTestVector3Spki, kTestVector3Data); } // RSA-PSS test vectors, pss-vect.txt, Example 4.1: A 1027-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature4) { SIG_TEST_VECTOR_VERIFY(kTestVector4Spki, kTestVector4Data, kTestVector4Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify4) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector4Pkcs8, kTestVector4Spki, kTestVector4Data); } // RSA-PSS test vectors, pss-vect.txt, Example 5.1: A 1028-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature5) { SIG_TEST_VECTOR_VERIFY(kTestVector5Spki, kTestVector5Data, kTestVector5Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify5) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector5Pkcs8, kTestVector5Spki, kTestVector5Data); } // RSA-PSS test vectors, pss-vect.txt, Example 6.1: A 1029-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature6) { SIG_TEST_VECTOR_VERIFY(kTestVector6Spki, kTestVector6Data, kTestVector6Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify6) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector6Pkcs8, kTestVector6Spki, kTestVector6Data); } // RSA-PSS test vectors, pss-vect.txt, Example 7.1: A 1030-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature7) { SIG_TEST_VECTOR_VERIFY(kTestVector7Spki, kTestVector7Data, kTestVector7Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify7) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector7Pkcs8, kTestVector7Spki, kTestVector7Data); } // RSA-PSS test vectors, pss-vect.txt, Example 8.1: A 1031-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature8) { SIG_TEST_VECTOR_VERIFY(kTestVector8Spki, kTestVector8Data, kTestVector8Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify8) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector8Pkcs8, kTestVector8Spki, kTestVector8Data); } // RSA-PSS test vectors, pss-vect.txt, Example 9.1: A 1536-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature9) { SIG_TEST_VECTOR_VERIFY(kTestVector9Spki, kTestVector9Data, kTestVector9Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify9) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector9Pkcs8, kTestVector9Spki, kTestVector9Data); } // RSA-PSS test vectors, pss-vect.txt, Example 10.1: A 2048-bit RSA Key Pair // TEST_F(Pkcs11RsaPssVectorTest, VerifyKnownSignature10) { SIG_TEST_VECTOR_VERIFY(kTestVector10Spki, kTestVector10Data, kTestVector10Sig); } TEST_F(Pkcs11RsaPssVectorTest, SignAndVerify10) { SIG_TEST_VECTOR_SIGN_VERIFY(kTestVector10Pkcs8, kTestVector10Spki, kTestVector10Data); } } // namespace nss_test