mirror of
https://github.com/openssl/openssl.git
synced 2024-12-21 06:09:35 +08:00
ae89578be2
Added RSA oaep test that uses the pkeyutl application. Added an openssl application option to support loading a (fips) provider via the '-config' option. Added openssl application related environment variable 'OPENSSL_TEST_LIBCTX' (for testing purposes only), that creates a non default library context. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11948)
156 lines
4.9 KiB
Perl
156 lines
4.9 KiB
Perl
#! /usr/bin/env perl
|
|
# Copyright 2020 The OpenSSL Project Authors. All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
# this file except in compliance with the License. You can obtain a copy
|
|
# in the file LICENSE in the source distribution or at
|
|
# https://www.openssl.org/source/license.html
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
use OpenSSL::Test qw(:DEFAULT data_file bldtop_dir srctop_file srctop_dir bldtop_file);
|
|
use OpenSSL::Test::Utils;
|
|
use File::Compare qw/compare_text/;
|
|
|
|
BEGIN {
|
|
setup("test_rsaoaep");
|
|
}
|
|
use lib srctop_dir('Configurations');
|
|
use lib bldtop_dir('.');
|
|
use platform;
|
|
|
|
my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
|
|
|
|
plan tests =>
|
|
($no_fips ? 0 : 1) # FIPS install test
|
|
+ 9;
|
|
|
|
my @prov = ( );
|
|
my $provconf = srctop_file("test", "fips.cnf");
|
|
my $provpath = bldtop_dir("providers");
|
|
my $msg_file = data_file("plain_text");
|
|
my $enc1_file = "enc1.bin";
|
|
my $enc2_file = "enc2.bin";
|
|
my $enc3_file = "enc3.bin";
|
|
my $dec1_file = "dec1.txt";
|
|
my $dec2_file = "dec2.txt";
|
|
my $dec3_file = "dec3.txt";
|
|
my $key_file = srctop_file("test", "testrsa.pem");
|
|
|
|
unless ($no_fips) {
|
|
@prov = ( "-provider_path", $provpath, "-config", $provconf );
|
|
my $infile = bldtop_file('providers', platform->dso('fips'));
|
|
|
|
ok(run(app(['openssl', 'fipsinstall',
|
|
'-out', bldtop_file('providers', 'fipsmodule.cnf'),
|
|
'-module', $infile])),
|
|
"fipsinstall");
|
|
$ENV{OPENSSL_TEST_LIBCTX} = "1";
|
|
}
|
|
|
|
ok(run(app(['openssl', 'pkeyutl',
|
|
@prov,
|
|
'-encrypt',
|
|
'-in', $msg_file,
|
|
'-inkey', $key_file,
|
|
'-pkeyopt', 'pad-mode:oaep',
|
|
'-pkeyopt', 'oaep-label:123',
|
|
'-pkeyopt', 'digest:sha1',
|
|
'-pkeyopt', 'mgf1-digest:sha1',
|
|
'-out', $enc1_file])),
|
|
"RSA OAEP Encryption");
|
|
|
|
ok(!run(app(['openssl', 'pkeyutl',
|
|
@prov,
|
|
'-encrypt',
|
|
'-in', $key_file,
|
|
'-inkey', $key_file,
|
|
'-pkeyopt', 'pad-mode:oaep',
|
|
'-pkeyopt', 'oaep-label:123',
|
|
'-pkeyopt', 'digest:sha256',
|
|
'-pkeyopt', 'mgf1-digest:sha1'])),
|
|
"RSA OAEP Encryption should fail if the message is larger than the rsa modulus");
|
|
|
|
ok(run(app(['openssl', 'pkeyutl',
|
|
@prov,
|
|
'-decrypt',
|
|
'-inkey', $key_file,
|
|
'-pkeyopt', 'pad-mode:oaep',
|
|
'-pkeyopt', 'oaep-label:123',
|
|
'-pkeyopt', 'digest:sha1',
|
|
'-pkeyopt', 'mgf1-digest:sha1',
|
|
'-in', $enc1_file,
|
|
'-out', $dec1_file]))
|
|
&& compare_text($dec1_file, $msg_file) == 0,
|
|
"RSA OAEP Decryption");
|
|
|
|
ok(!run(app(['openssl', 'pkeyutl',
|
|
@prov,
|
|
'-decrypt',
|
|
'-inkey', $key_file,
|
|
'-pkeyopt', 'pad-mode:oaep',
|
|
'-pkeyopt', 'oaep-label:123',
|
|
'-pkeyopt', 'digest:sha256',
|
|
'-pkeyopt', 'mgf1-digest:sha224',
|
|
'-in', $enc1_file])),
|
|
"Incorrect digest for RSA OAEP Decryption");
|
|
|
|
ok(!run(app(['openssl', 'pkeyutl',
|
|
@prov,
|
|
'-decrypt',
|
|
'-inkey', $key_file,
|
|
'-pkeyopt', 'pad-mode:oaep',
|
|
'-pkeyopt', 'oaep-label:123',
|
|
'-pkeyopt', 'digest:sha1',
|
|
'-pkeyopt', 'mgf1-digest:sha224',
|
|
'-in', $enc1_file])),
|
|
"Incorrect mgf1-digest for RSA OAEP Decryption");
|
|
|
|
ok(run(app(['openssl', 'pkeyutl',
|
|
@prov,
|
|
'-encrypt',
|
|
'-in', $msg_file,
|
|
'-inkey', $key_file,
|
|
'-pkeyopt', 'pad-mode:oaep',
|
|
'-pkeyopt', 'oaep-label:123',
|
|
'-pkeyopt', 'digest:sha1',
|
|
'-pkeyopt', 'mgf1-digest:sha1',
|
|
'-out', $enc2_file]))
|
|
&& compare_text($enc2_file, $enc1_file) != 0,
|
|
"RSA OAEP Encryption should generate different encrypted data");
|
|
|
|
ok(run(app(['openssl', 'pkeyutl',
|
|
@prov,
|
|
'-decrypt',
|
|
'-inkey', $key_file,
|
|
'-pkeyopt', 'pad-mode:oaep',
|
|
'-pkeyopt', 'oaep-label:123',
|
|
'-in', $enc2_file,
|
|
'-out', $dec2_file]))
|
|
&& compare_text($dec2_file, $msg_file) == 0,
|
|
"RSA OAEP Decryption with default digests");
|
|
|
|
ok(run(app(['openssl', 'pkeyutl',
|
|
@prov,
|
|
'-encrypt',
|
|
'-in', $msg_file,
|
|
'-inkey', $key_file,
|
|
'-pkeyopt', 'pad-mode:oaep',
|
|
'-pkeyopt', 'oaep-label:123',
|
|
'-out', $enc3_file])),
|
|
"RSA OAEP Encryption with default digests");
|
|
|
|
ok(run(app(['openssl', 'pkeyutl',
|
|
@prov,
|
|
'-decrypt',
|
|
'-inkey', $key_file,
|
|
'-pkeyopt', 'pad-mode:oaep',
|
|
'-pkeyopt', 'oaep-label:123',
|
|
'-pkeyopt', 'digest:sha1',
|
|
'-pkeyopt', 'mgf1-digest:sha1',
|
|
'-in', $enc3_file,
|
|
'-out', $dec3_file]))
|
|
&& compare_text($dec3_file, $msg_file) == 0,
|
|
"RSA OAEP Decryption with explicit default digests");
|