Blame tests/rsa-pss-sign.c

Packit Service 2ea82d
/*
Packit Service 2ea82d
 * Copyright (C) 2018 Anderson Toshiyuki Sasaki
Packit Service 2ea82d
 * Copyright (c) 2018 Red Hat, Inc.
Packit Service 2ea82d
 * All rights reserved.
Packit Service 2ea82d
 *
Packit Service 2ea82d
 * Redistribution and use in source and binary forms, with or without
Packit Service 2ea82d
 * modification, are permitted provided that the following conditions
Packit Service 2ea82d
 * are met:
Packit Service 2ea82d
 * 1. Redistributions of source code must retain the above copyright
Packit Service 2ea82d
 *    notice, this list of conditions and the following disclaimer.
Packit Service 2ea82d
 * 2. Redistributions in binary form must reproduce the above copyright
Packit Service 2ea82d
 *    notice, this list of conditions and the following disclaimer in the
Packit Service 2ea82d
 *    documentation and/or other materials provided with the distribution.
Packit Service 2ea82d
 *
Packit Service 2ea82d
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
Packit Service 2ea82d
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
Packit Service 2ea82d
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
Packit Service 2ea82d
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
Packit Service 2ea82d
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
Packit Service 2ea82d
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
Packit Service 2ea82d
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
Packit Service 2ea82d
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
Packit Service 2ea82d
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
Packit Service 2ea82d
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
Packit Service 2ea82d
 * SUCH DAMAGE.
Packit Service 2ea82d
 *
Packit Service 2ea82d
 */
Packit Service 2ea82d
Packit Service 2ea82d
#include <stdio.h>
Packit Service 2ea82d
#include <stdlib.h>
Packit Service 2ea82d
#include <string.h>
Packit Service 2ea82d
#include <openssl/rsa.h>
Packit Service 2ea82d
#include <openssl/evp.h>
Packit Service 2ea82d
#include <openssl/pem.h>
Packit Service 2ea82d
#include <openssl/err.h>
Packit Service 2ea82d
#include <openssl/engine.h>
Packit Service 2ea82d
#include <openssl/conf.h>
Packit Service 2ea82d
Packit Service 2ea82d
static void display_openssl_errors(int l)
Packit Service 2ea82d
{
Packit Service 2ea82d
	const char *file;
Packit Service 2ea82d
	char buf[120];
Packit Service 2ea82d
	int e, line;
Packit Service 2ea82d
Packit Service 2ea82d
	if (ERR_peek_error() == 0)
Packit Service 2ea82d
		return;
Packit Service 2ea82d
	fprintf(stderr, "At main.c:%d:\n", l);
Packit Service 2ea82d
Packit Service 2ea82d
	while ((e = ERR_get_error_line(&file, &line))) {
Packit Service 2ea82d
		ERR_error_string(e, buf);
Packit Service 2ea82d
		fprintf(stderr, "- SSL %s: %s:%d\n", buf, file, line);
Packit Service 2ea82d
	}
Packit Service 2ea82d
}
Packit Service 2ea82d
Packit Service 2ea82d
int main(int argc, char **argv)
Packit Service 2ea82d
{
Packit Service 2ea82d
	EVP_PKEY *private_key, *public_key;
Packit Service 2ea82d
	EVP_PKEY_CTX *pkey_ctx;
Packit Service 2ea82d
	EVP_MD_CTX *md_ctx;
Packit Service 2ea82d
Packit Service 2ea82d
	const EVP_MD *digest_algo;
Packit Service 2ea82d
Packit Service 2ea82d
	char *private_key_name, *public_key_name;
Packit Service 2ea82d
Packit Service 2ea82d
	unsigned char sig[4096];
Packit Service 2ea82d
	size_t sig_len;
Packit Service 2ea82d
Packit Service 2ea82d
	unsigned char md[128];
Packit Service 2ea82d
	size_t md_len;
Packit Service 2ea82d
	unsigned digest_len;
Packit Service 2ea82d
Packit Service 2ea82d
	char *key_pass = NULL;
Packit Service 2ea82d
	const char *module_path, *efile;
Packit Service 2ea82d
Packit Service 2ea82d
	ENGINE *e;
Packit Service 2ea82d
Packit Service 2ea82d
	int ret;
Packit Service 2ea82d
Packit Service 2ea82d
	if (argc < 5) {
Packit Service 2ea82d
		fprintf(stderr, "usage: %s [PIN] [CONF] [private key URL] [public key URL] [module]\n", argv[0]);
Packit Service 2ea82d
		fprintf(stderr, "\n");
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	key_pass = argv[1];
Packit Service 2ea82d
	efile = argv[2];
Packit Service 2ea82d
	private_key_name = argv[3];
Packit Service 2ea82d
	public_key_name = argv[4];
Packit Service 2ea82d
	module_path = argv[5];
Packit Service 2ea82d
Packit Service 2ea82d
	ret = CONF_modules_load_file(efile, "engines", 0);
Packit Service 2ea82d
	if (ret <= 0) {
Packit Service 2ea82d
		fprintf(stderr, "cannot load %s\n", efile);
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	ENGINE_add_conf_module();
Packit Service 2ea82d
#if OPENSSL_VERSION_NUMBER>=0x10100000
Packit Service 2ea82d
	OPENSSL_init_crypto(OPENSSL_INIT_ADD_ALL_CIPHERS \
Packit Service 2ea82d
		| OPENSSL_INIT_ADD_ALL_DIGESTS \
Packit Service 2ea82d
		| OPENSSL_INIT_LOAD_CONFIG, NULL);
Packit Service 2ea82d
#else
Packit Service 2ea82d
	OpenSSL_add_all_algorithms();
Packit Service 2ea82d
	OpenSSL_add_all_digests();
Packit Service 2ea82d
	ERR_load_crypto_strings();
Packit Service 2ea82d
#endif
Packit Service 2ea82d
	ERR_clear_error();
Packit Service 2ea82d
Packit Service 2ea82d
	ENGINE_load_builtin_engines();
Packit Service 2ea82d
	e = ENGINE_by_id("pkcs11");
Packit Service 2ea82d
	if (e == NULL) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (!ENGINE_ctrl_cmd_string(e, "VERBOSE", NULL, 0)) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (!ENGINE_ctrl_cmd_string(e, "MODULE_PATH", module_path, 0)) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (!ENGINE_init(e)) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (key_pass && !ENGINE_ctrl_cmd_string(e, "PIN", key_pass, 0)) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	private_key = ENGINE_load_private_key(e, private_key_name, NULL, NULL);
Packit Service 2ea82d
	if (private_key == NULL) {
Packit Service 2ea82d
		fprintf(stderr, "cannot load: %s\n", private_key_name);
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	public_key = ENGINE_load_public_key(e, public_key_name, NULL, NULL);
Packit Service 2ea82d
	if (public_key == NULL) {
Packit Service 2ea82d
		fprintf(stderr, "cannot load: %s\n", public_key_name);
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	digest_algo = EVP_get_digestbyname("sha256");
Packit Service 2ea82d
Packit Service 2ea82d
#define TEST_DATA "test data"
Packit Service 2ea82d
Packit Service 2ea82d
	md_ctx = EVP_MD_CTX_create();
Packit Service 2ea82d
	if (EVP_DigestInit(md_ctx, digest_algo) <= 0) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (EVP_DigestUpdate(md_ctx, TEST_DATA, sizeof(TEST_DATA)) <= 0) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	digest_len = sizeof(md);
Packit Service 2ea82d
	if (EVP_DigestFinal(md_ctx, md, &digest_len) <= 0) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
	md_len = digest_len;
Packit Service 2ea82d
Packit Service 2ea82d
	EVP_MD_CTX_destroy(md_ctx);
Packit Service 2ea82d
Packit Service 2ea82d
	/* Sign the hash */
Packit Service 2ea82d
	pkey_ctx = EVP_PKEY_CTX_new(private_key, e);
Packit Service 2ea82d
Packit Service 2ea82d
	if (pkey_ctx == NULL) {
Packit Service 2ea82d
		fprintf(stderr, "Could not create context\n");
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (EVP_PKEY_sign_init(pkey_ctx) <= 0) {
Packit Service 2ea82d
		fprintf(stderr, "Could not init signature\n");
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, RSA_PKCS1_PSS_PADDING) <= 0) {
Packit Service 2ea82d
		fprintf(stderr, "Could not set padding\n");
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (EVP_PKEY_CTX_set_signature_md(pkey_ctx, digest_algo) <= 0) {
Packit Service 2ea82d
		fprintf(stderr, "Could not set message digest algorithm\n");
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	sig_len = sizeof(sig);
Packit Service 2ea82d
	if (EVP_PKEY_sign(pkey_ctx, sig, &sig_len, md,
Packit Service 2ea82d
			EVP_MD_size(digest_algo)) <= 0) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	EVP_PKEY_CTX_free(pkey_ctx);
Packit Service 2ea82d
Packit Service 2ea82d
	printf("Signature created\n");
Packit Service 2ea82d
Packit Service 2ea82d
#if OPENSSL_VERSION_NUMBER >= 0x1000000fL
Packit Service 2ea82d
Packit Service 2ea82d
	pkey_ctx = EVP_PKEY_CTX_new(public_key, e);
Packit Service 2ea82d
Packit Service 2ea82d
	if (pkey_ctx == NULL) {
Packit Service 2ea82d
		fprintf(stderr, "Could not create context\n");
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (EVP_PKEY_verify_init(pkey_ctx) <= 0) {
Packit Service 2ea82d
		fprintf(stderr, "Could not init verify\n");
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, RSA_PKCS1_PSS_PADDING) <= 0) {
Packit Service 2ea82d
		fprintf(stderr, "Could not set padding\n");
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	if (EVP_PKEY_CTX_set_signature_md(pkey_ctx, digest_algo) <= 0) {
Packit Service 2ea82d
		fprintf(stderr, "Could not set message digest algorithm\n");
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	ret = EVP_PKEY_verify(pkey_ctx, sig, sig_len, md, md_len);
Packit Service 2ea82d
	if (ret < 0) {
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
	EVP_PKEY_CTX_free(pkey_ctx);
Packit Service 2ea82d
Packit Service 2ea82d
	if (ret == 1) {
Packit Service 2ea82d
		printf("Signature verified\n");
Packit Service 2ea82d
	}
Packit Service 2ea82d
	else {
Packit Service 2ea82d
		printf("Verification failed\n");
Packit Service 2ea82d
		display_openssl_errors(__LINE__);
Packit Service 2ea82d
		exit(1);
Packit Service 2ea82d
	}
Packit Service 2ea82d
Packit Service 2ea82d
#else /* OPENSSL_VERSION_NUMBER >= 0x1000000fL */
Packit Service 2ea82d
Packit Service 2ea82d
	printf("Unable to verify signature with %s\n", OPENSSL_VERSION_TEXT);
Packit Service 2ea82d
Packit Service 2ea82d
#endif /* OPENSSL_VERSION_NUMBER >= 0x1000000fL */
Packit Service 2ea82d
Packit Service 2ea82d
	ENGINE_finish(e);
Packit Service 2ea82d
	CONF_modules_unload(1);
Packit Service 2ea82d
	return 0;
Packit Service 2ea82d
}
Packit Service 2ea82d
Packit Service 2ea82d
/* vim: set noexpandtab: */