| // Copyright 2013 The Go Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style |
| // license that can be found in the LICENSE file. |
| |
| package rsa_test |
| |
| import ( |
| "bufio" |
| "compress/bzip2" |
| "crypto" |
| "crypto/internal/fips140" |
| "crypto/rand" |
| . "crypto/rsa" |
| "crypto/sha256" |
| "crypto/sha512" |
| "encoding/hex" |
| "math/big" |
| "os" |
| "strconv" |
| "strings" |
| "testing" |
| ) |
| |
| // TestPSSGolden tests all the test vectors in pss-vect.txt from |
| // ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1-vec.zip |
| func TestPSSGolden(t *testing.T) { |
| inFile, err := os.Open("testdata/pss-vect.txt.bz2") |
| if err != nil { |
| t.Fatalf("Failed to open input file: %s", err) |
| } |
| defer inFile.Close() |
| |
| // The pss-vect.txt file contains RSA keys and then a series of |
| // signatures. A goroutine is used to preprocess the input by merging |
| // lines, removing spaces in hex values and identifying the start of |
| // new keys and signature blocks. |
| const newKeyMarker = "START NEW KEY" |
| const newSignatureMarker = "START NEW SIGNATURE" |
| |
| values := make(chan string) |
| |
| go func() { |
| defer close(values) |
| scanner := bufio.NewScanner(bzip2.NewReader(inFile)) |
| var partialValue string |
| lastWasValue := true |
| |
| for scanner.Scan() { |
| line := scanner.Text() |
| switch { |
| case len(line) == 0: |
| if len(partialValue) > 0 { |
| values <- strings.ReplaceAll(partialValue, " ", "") |
| partialValue = "" |
| lastWasValue = true |
| } |
| continue |
| case strings.HasPrefix(line, "# ======") && lastWasValue: |
| values <- newKeyMarker |
| lastWasValue = false |
| case strings.HasPrefix(line, "# ------") && lastWasValue: |
| values <- newSignatureMarker |
| lastWasValue = false |
| case strings.HasPrefix(line, "#"): |
| continue |
| default: |
| partialValue += line |
| } |
| } |
| if err := scanner.Err(); err != nil { |
| panic(err) |
| } |
| }() |
| |
| var key *PublicKey |
| var hashed []byte |
| hash := crypto.SHA1 |
| h := hash.New() |
| opts := &PSSOptions{ |
| SaltLength: PSSSaltLengthEqualsHash, |
| } |
| |
| for marker := range values { |
| switch marker { |
| case newKeyMarker: |
| key = new(PublicKey) |
| nHex, ok := <-values |
| if !ok { |
| continue |
| } |
| key.N = bigFromHex(nHex) |
| key.E = intFromHex(<-values) |
| // We don't care for d, p, q, dP, dQ or qInv. |
| for i := 0; i < 6; i++ { |
| <-values |
| } |
| case newSignatureMarker: |
| msg := fromHex(<-values) |
| <-values // skip salt |
| sig := fromHex(<-values) |
| |
| h.Reset() |
| h.Write(msg) |
| hashed = h.Sum(hashed[:0]) |
| |
| if err := VerifyPSS(key, hash, hashed, sig, opts); err != nil { |
| t.Error(err) |
| } |
| default: |
| t.Fatalf("unknown marker: %s", marker) |
| } |
| } |
| } |
| |
| // TestPSSOpenSSL ensures that we can verify a PSS signature from OpenSSL with |
| // the default options. OpenSSL sets the salt length to be maximal. |
| func TestPSSOpenSSL(t *testing.T) { |
| t.Setenv("GODEBUG", "rsa1024min=0") |
| |
| hash := crypto.SHA256 |
| h := hash.New() |
| h.Write([]byte("testing")) |
| hashed := h.Sum(nil) |
| |
| // Generated with `echo -n testing | openssl dgst -sign key.pem -sigopt rsa_padding_mode:pss -sha256 > sig` |
| sig := []byte{ |
| 0x95, 0x59, 0x6f, 0xd3, 0x10, 0xa2, 0xe7, 0xa2, 0x92, 0x9d, |
| 0x4a, 0x07, 0x2e, 0x2b, 0x27, 0xcc, 0x06, 0xc2, 0x87, 0x2c, |
| 0x52, 0xf0, 0x4a, 0xcc, 0x05, 0x94, 0xf2, 0xc3, 0x2e, 0x20, |
| 0xd7, 0x3e, 0x66, 0x62, 0xb5, 0x95, 0x2b, 0xa3, 0x93, 0x9a, |
| 0x66, 0x64, 0x25, 0xe0, 0x74, 0x66, 0x8c, 0x3e, 0x92, 0xeb, |
| 0xc6, 0xe6, 0xc0, 0x44, 0xf3, 0xb4, 0xb4, 0x2e, 0x8c, 0x66, |
| 0x0a, 0x37, 0x9c, 0x69, |
| } |
| |
| if err := VerifyPSS(&test512Key.PublicKey, hash, hashed, sig, nil); err != nil { |
| t.Error(err) |
| } |
| } |
| |
| func TestPSSNilOpts(t *testing.T) { |
| hash := crypto.SHA256 |
| h := hash.New() |
| h.Write([]byte("testing")) |
| hashed := h.Sum(nil) |
| |
| SignPSS(rand.Reader, rsaPrivateKey, hash, hashed, nil) |
| } |
| |
| func TestPSSSigning(t *testing.T) { |
| var saltLengthCombinations = []struct { |
| signSaltLength, verifySaltLength int |
| good, fipsGood bool |
| }{ |
| {PSSSaltLengthAuto, PSSSaltLengthAuto, true, true}, |
| {PSSSaltLengthEqualsHash, PSSSaltLengthAuto, true, true}, |
| {PSSSaltLengthEqualsHash, PSSSaltLengthEqualsHash, true, true}, |
| {PSSSaltLengthEqualsHash, 8, false, false}, |
| {8, 8, true, true}, |
| {8, PSSSaltLengthAuto, true, true}, |
| {42, PSSSaltLengthAuto, true, true}, |
| // In FIPS mode, PSSSaltLengthAuto is capped at PSSSaltLengthEqualsHash. |
| {PSSSaltLengthAuto, PSSSaltLengthEqualsHash, false, true}, |
| {PSSSaltLengthAuto, 106, true, false}, |
| {PSSSaltLengthAuto, 20, false, true}, |
| {PSSSaltLengthAuto, -2, false, false}, |
| } |
| |
| hash := crypto.SHA1 |
| h := hash.New() |
| h.Write([]byte("testing")) |
| hashed := h.Sum(nil) |
| var opts PSSOptions |
| |
| for i, test := range saltLengthCombinations { |
| opts.SaltLength = test.signSaltLength |
| sig, err := SignPSS(rand.Reader, rsaPrivateKey, hash, hashed, &opts) |
| if err != nil { |
| t.Errorf("#%d: error while signing: %s", i, err) |
| continue |
| } |
| |
| opts.SaltLength = test.verifySaltLength |
| err = VerifyPSS(&rsaPrivateKey.PublicKey, hash, hashed, sig, &opts) |
| good := test.good |
| if fips140.Enabled { |
| good = test.fipsGood |
| } |
| if (err == nil) != good { |
| t.Errorf("#%d: bad result, wanted: %t, got: %s", i, test.good, err) |
| } |
| } |
| } |
| |
| func TestPSS513(t *testing.T) { |
| // See Issue 42741, and separately, RFC 8017: "Note that the octet length of |
| // EM will be one less than k if modBits - 1 is divisible by 8 and equal to |
| // k otherwise, where k is the length in octets of the RSA modulus n." |
| t.Setenv("GODEBUG", "rsa1024min=0") |
| key, err := GenerateKey(rand.Reader, 513) |
| if err != nil { |
| t.Fatal(err) |
| } |
| digest := sha256.Sum256([]byte("message")) |
| signature, err := key.Sign(rand.Reader, digest[:], &PSSOptions{ |
| SaltLength: PSSSaltLengthAuto, |
| Hash: crypto.SHA256, |
| }) |
| if err != nil { |
| t.Fatal(err) |
| } |
| err = VerifyPSS(&key.PublicKey, crypto.SHA256, digest[:], signature, nil) |
| if err != nil { |
| t.Error(err) |
| } |
| } |
| |
| func bigFromHex(hex string) *big.Int { |
| n, ok := new(big.Int).SetString(hex, 16) |
| if !ok { |
| panic("bad hex: " + hex) |
| } |
| return n |
| } |
| |
| func intFromHex(hex string) int { |
| i, err := strconv.ParseInt(hex, 16, 32) |
| if err != nil { |
| panic(err) |
| } |
| return int(i) |
| } |
| |
| func fromHex(hexStr string) []byte { |
| s, err := hex.DecodeString(hexStr) |
| if err != nil { |
| panic(err) |
| } |
| return s |
| } |
| |
| func TestInvalidPSSSaltLength(t *testing.T) { |
| t.Setenv("GODEBUG", "rsa1024min=0") |
| key, err := GenerateKey(rand.Reader, 245) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| digest := sha256.Sum256([]byte("message")) |
| if _, err := SignPSS(rand.Reader, key, crypto.SHA256, digest[:], &PSSOptions{ |
| SaltLength: -2, |
| Hash: crypto.SHA256, |
| }); err.Error() != "crypto/rsa: invalid PSS salt length" { |
| t.Fatalf("SignPSS unexpected error: got %v, want %v", err, "crypto/rsa: invalid PSS salt length") |
| } |
| |
| // We don't check the specific error here, because crypto/rsa and crypto/internal/boring |
| // return different errors, so we just check that _an error_ was returned. |
| if err := VerifyPSS(&key.PublicKey, crypto.SHA256, []byte{1, 2, 3}, make([]byte, 31), &PSSOptions{ |
| SaltLength: -2, |
| }); err == nil { |
| t.Fatal("VerifyPSS unexpected success") |
| } |
| } |
| |
| func TestHashOverride(t *testing.T) { |
| digest := sha512.Sum512([]byte("message")) |
| // opts.Hash overrides the passed hash argument. |
| sig, err := SignPSS(rand.Reader, test2048Key, crypto.SHA256, digest[:], &PSSOptions{Hash: crypto.SHA512}) |
| if err != nil { |
| t.Fatalf("SignPSS unexpected error: got %v, want nil", err) |
| } |
| |
| // VerifyPSS has the inverse behavior, opts.Hash is always ignored, check this is true. |
| if err := VerifyPSS(&test2048Key.PublicKey, crypto.SHA512, digest[:], sig, &PSSOptions{Hash: crypto.SHA256}); err != nil { |
| t.Fatalf("VerifyPSS unexpected error: got %v, want nil", err) |
| } |
| } |