2 * Testing tool for RSA PKCS #1 v1.5 signature verification
3 * Copyright (c) 2014, Jouni Malinen <j@w1.fi>
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
9 #include "utils/includes.h"
11 #include "utils/common.h"
12 #include "crypto/crypto.h"
15 #include "tls/pkcs1.h"
18 static int cavp_rsa_sig_ver(const char *fname)
22 char buf[15000], *pos, *pos2;
23 u8 msg[200], n[512], s[512], em[512], e[512];
24 size_t msg_len = 0, n_len = 0, s_len = 0, em_len, e_len = 0;
29 printf("CAVP RSA SigVer test vectors from %s\n", fname);
31 f = fopen(fname, "r");
33 printf("%s does not exist - cannot validate CAVP RSA SigVer test vectors\n",
38 while (fgets(buf, sizeof(buf), f)) {
39 pos = os_strchr(buf, '=');
43 while (pos2 >= buf && *pos2 == ' ')
48 pos2 = os_strchr(pos, '\r');
50 pos2 = os_strchr(pos, '\n');
54 pos2 = pos + os_strlen(pos);
56 if (os_strcmp(buf, "SHAAlg") == 0) {
57 os_strlcpy(sha_alg, pos, sizeof(sha_alg));
58 } else if (os_strcmp(buf, "Msg") == 0) {
59 tmp_len = os_strlen(pos);
60 if (tmp_len > sizeof(msg) * 2) {
61 printf("Too long Msg\n");
64 msg_len = tmp_len / 2;
65 if (hexstr2bin(pos, msg, msg_len) < 0) {
66 printf("Invalid hex string '%s'\n", pos);
70 } else if (os_strcmp(buf, "n") == 0) {
71 tmp_len = os_strlen(pos);
72 if (tmp_len > sizeof(n) * 2) {
73 printf("Too long n\n");
77 if (hexstr2bin(pos, n, n_len) < 0) {
78 printf("Invalid hex string '%s'\n", pos);
82 } else if (os_strcmp(buf, "e") == 0) {
83 tmp_len = os_strlen(pos);
84 if (tmp_len > sizeof(e) * 2) {
85 printf("Too long e\n");
89 if (hexstr2bin(pos, e, e_len) < 0) {
90 printf("Invalid hex string '%s'\n", pos);
94 } else if (os_strcmp(buf, "S") == 0) {
95 tmp_len = os_strlen(pos);
96 if (tmp_len > sizeof(s) * 2) {
97 printf("Too long S\n");
101 if (hexstr2bin(pos, s, s_len) < 0) {
102 printf("Invalid hex string '%s'\n", pos);
106 } else if (os_strncmp(buf, "EM", 2) == 0) {
107 tmp_len = os_strlen(pos);
108 if (tmp_len > sizeof(em) * 2)
110 em_len = tmp_len / 2;
111 if (hexstr2bin(pos, em, em_len) < 0) {
112 printf("Invalid hex string '%s'\n", pos);
116 } else if (os_strcmp(buf, "Result") == 0) {
119 struct crypto_public_key *pk;
123 const struct asn1_oid *alg;
127 if (os_strcmp(sha_alg, "SHA1") == 0) {
128 if (sha1_vector(1, addr, len, hash) < 0)
131 alg = &asn1_sha1_oid;
132 } else if (os_strcmp(sha_alg, "SHA256") == 0) {
133 if (sha256_vector(1, addr, len, hash) < 0)
136 alg = &asn1_sha256_oid;
141 printf("\nExpected result: %s\n", pos);
142 wpa_hexdump(MSG_INFO, "Hash(Msg)", hash, hash_len);
144 pk = crypto_public_key_import_parts(n, n_len,
147 printf("Failed to import public key\n");
152 res = pkcs1_v15_sig_ver(pk, s, s_len, alg,
154 crypto_public_key_free(pk);
155 if ((*pos == 'F' && !res) || (*pos != 'F' && res)) {
169 printf("Test case failed\n");
171 printf("%d test vectors OK\n", ok);
177 int main(int argc, char *argv[])
183 if (cavp_rsa_sig_ver("CAVP/SigVer15_186-3.rsp"))
185 if (cavp_rsa_sig_ver("CAVP/SigVer15EMTest.txt"))