summaryrefslogtreecommitdiffstats
path: root/src/tests/large-mpi.cpp
blob: 78f87348d870a9fec635e8fea10873c47f76396f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
/*
 * Copyright (c) 2017-2020 [Ribose Inc](https://www.ribose.com).
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without modification,
 * are permitted provided that the following conditions are met:
 *
 * 1.  Redistributions of source code must retain the above copyright notice,
 *     this list of conditions and the following disclaimer.
 *
 * 2.  Redistributions in binary form must reproduce the above copyright notice,
 *     this list of conditions and the following disclaimer in the documentation
 *     and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
 * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

#include <rnp/rnp.h>
#include "rnp_tests.h"
#include <librepgp/stream-key.h>

TEST_F(rnp_tests, test_large_mpi_rsa_pub)
{
    pgp_source_t       keysrc = {0};
    pgp_key_sequence_t keyseq;
    rnp_ffi_t          ffi = NULL;
    rnp_input_t        input = NULL;
    rnp_input_t        signature = NULL;
    rnp_op_verify_t    verify;

    /* Load RSA pubkey packet with 65535 bit modulus MPI. Must fail. */
    assert_rnp_success(init_file_src(&keysrc, "data/test_large_MPIs/rsa-pub-65535bits.pgp"));
    assert_rnp_failure(process_pgp_keys(keysrc, keyseq, false));
    assert_true(keyseq.keys.empty());
    src_close(&keysrc);

    assert_rnp_success(rnp_ffi_create(&ffi, "GPG", "GPG"));
    assert_rnp_success(
      rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-65535bits.pgp"));
    assert_rnp_failure(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_PUBLIC_KEYS, NULL));
    rnp_input_destroy(input);

    /* Load RSA pubkey of PGP_MPINT_BITS + 1 size (16385). Must fail. */
    assert_rnp_success(
      rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-16385bits.pgp"));
    assert_rnp_failure(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_PUBLIC_KEYS, NULL));
    rnp_input_destroy(input);

    /* Load RSA pubkey of PGP_MPINT_BITS size (16384). Must succeed. */
    assert_rnp_success(
      rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-16384bits.pgp"));
    assert_rnp_success(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_PUBLIC_KEYS, NULL));
    rnp_input_destroy(input);

    /* Load RSA signature. rsa-pub-65535bits.pgp file signed by previously loaded 16384 bit RSA
     * key. Must succeed. */
    assert_rnp_success(
      rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-65535bits.pgp"));
    assert_rnp_success(
      rnp_input_from_path(&signature, "data/test_large_MPIs/rsa-pub-65535bits.pgp.sig"));
    assert_rnp_success(rnp_op_verify_detached_create(&verify, ffi, input, signature));
    assert_rnp_success(rnp_op_verify_execute(verify));
    rnp_input_destroy(input);
    rnp_input_destroy(signature);
    assert_rnp_success(rnp_op_verify_destroy(verify));

    /* Load RSA signature with PGP_MPINT_BITS + 1 size (16385) MPI. Must fail. */
    assert_rnp_success(
      rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-65535bits.pgp"));
    assert_rnp_success(rnp_input_from_path(
      &signature, "data/test_large_MPIs/rsa-pub-65535bits.pgp.16385sig.sig"));
    assert_rnp_success(rnp_op_verify_detached_create(&verify, ffi, input, signature));
    assert_rnp_failure(rnp_op_verify_execute(verify));
    rnp_input_destroy(input);
    rnp_input_destroy(signature);
    assert_rnp_success(rnp_op_verify_destroy(verify));

    rnp_ffi_destroy(ffi);
}

TEST_F(rnp_tests, test_large_mpi_rsa_priv)
{
    rnp_ffi_t    ffi = NULL;
    rnp_input_t  input = NULL;
    rnp_output_t output = NULL;

    assert_rnp_success(rnp_ffi_create(&ffi, "GPG", "GPG"));

    /* Load RSA private key of PGP_MPINT_BITS + 1 size (16385). Must fail. */
    assert_rnp_success(
      rnp_input_from_path(&input, "data/test_large_MPIs/rsa-priv-16385bits.pgp"));
    assert_rnp_failure(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_SECRET_KEYS, NULL));
    rnp_input_destroy(input);

    /* Load RSA private key of PGP_MPINT_BITS size (16384). Must succeed. */
    assert_rnp_success(
      rnp_input_from_path(&input, "data/test_large_MPIs/rsa-priv-16384bits.pgp"));
    assert_rnp_success(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_SECRET_KEYS, NULL));
    rnp_input_destroy(input);

    /* Load PKESK encrypted by PGP_MPINT_BITS sized key. Must succeed. */
    assert_rnp_success(
      rnp_input_from_path(&input, "data/test_large_MPIs/message.enc.rsa16384.pgp"));
    assert_rnp_success(rnp_output_to_null(&output));
    assert_rnp_success(rnp_decrypt(ffi, input, output));
    rnp_input_destroy(input);
    rnp_output_destroy(output);

    /* Load PKESK having 16385 bit MPI. Must fail. */
    assert_rnp_success(
      rnp_input_from_path(&input, "data/test_large_MPIs/message.enc.rsa16385.pgp"));
    assert_rnp_success(rnp_output_to_null(&output));
    assert_rnp_failure(rnp_decrypt(ffi, input, output));
    rnp_input_destroy(input);
    rnp_output_destroy(output);

    rnp_ffi_destroy(ffi);
}