Revision control
Copy as Markdown
Other Tools
/*
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without modification,
* are permitted provided that the following conditions are met:
*
* 1. Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <rnp/rnp.h>
#include "rnp_tests.h"
#include <librepgp/stream-key.h>
TEST_F(rnp_tests, test_large_mpi_rsa_pub)
{
pgp_source_t keysrc = {0};
pgp_key_sequence_t keyseq;
rnp_ffi_t ffi = NULL;
rnp_input_t input = NULL;
rnp_input_t signature = NULL;
rnp_op_verify_t verify;
/* Load RSA pubkey packet with 65535 bit modulus MPI. Must fail. */
assert_rnp_success(init_file_src(&keysrc, "data/test_large_MPIs/rsa-pub-65535bits.pgp"));
assert_rnp_failure(process_pgp_keys(keysrc, keyseq, false));
assert_true(keyseq.keys.empty());
src_close(&keysrc);
assert_rnp_success(rnp_ffi_create(&ffi, "GPG", "GPG"));
assert_rnp_success(
rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-65535bits.pgp"));
assert_rnp_failure(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_PUBLIC_KEYS, NULL));
rnp_input_destroy(input);
/* Load RSA pubkey of PGP_MPINT_BITS + 1 size (16385). Must fail. */
assert_rnp_success(
rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-16385bits.pgp"));
assert_rnp_failure(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_PUBLIC_KEYS, NULL));
rnp_input_destroy(input);
/* Load RSA pubkey of PGP_MPINT_BITS size (16384). Must succeed. */
assert_rnp_success(
rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-16384bits.pgp"));
assert_rnp_success(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_PUBLIC_KEYS, NULL));
rnp_input_destroy(input);
/* Load RSA signature. rsa-pub-65535bits.pgp file signed by previously loaded 16384 bit RSA
* key. Must succeed. */
assert_rnp_success(
rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-65535bits.pgp"));
assert_rnp_success(
rnp_input_from_path(&signature, "data/test_large_MPIs/rsa-pub-65535bits.pgp.sig"));
assert_rnp_success(rnp_op_verify_detached_create(&verify, ffi, input, signature));
assert_rnp_success(rnp_op_verify_execute(verify));
rnp_input_destroy(input);
rnp_input_destroy(signature);
assert_rnp_success(rnp_op_verify_destroy(verify));
/* Load RSA signature with PGP_MPINT_BITS + 1 size (16385) MPI. Must fail. */
assert_rnp_success(
rnp_input_from_path(&input, "data/test_large_MPIs/rsa-pub-65535bits.pgp"));
assert_rnp_success(rnp_input_from_path(
&signature, "data/test_large_MPIs/rsa-pub-65535bits.pgp.16385sig.sig"));
assert_rnp_success(rnp_op_verify_detached_create(&verify, ffi, input, signature));
assert_rnp_failure(rnp_op_verify_execute(verify));
rnp_input_destroy(input);
rnp_input_destroy(signature);
assert_rnp_success(rnp_op_verify_destroy(verify));
rnp_ffi_destroy(ffi);
}
TEST_F(rnp_tests, test_large_mpi_rsa_priv)
{
rnp_ffi_t ffi = NULL;
rnp_input_t input = NULL;
rnp_output_t output = NULL;
assert_rnp_success(rnp_ffi_create(&ffi, "GPG", "GPG"));
/* Load RSA private key of PGP_MPINT_BITS + 1 size (16385). Must fail. */
assert_rnp_success(
rnp_input_from_path(&input, "data/test_large_MPIs/rsa-priv-16385bits.pgp"));
assert_rnp_failure(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_SECRET_KEYS, NULL));
rnp_input_destroy(input);
/* Load RSA private key of PGP_MPINT_BITS size (16384). Must succeed. */
assert_rnp_success(
rnp_input_from_path(&input, "data/test_large_MPIs/rsa-priv-16384bits.pgp"));
assert_rnp_success(rnp_import_keys(ffi, input, RNP_LOAD_SAVE_SECRET_KEYS, NULL));
rnp_input_destroy(input);
/* Load PKESK encrypted by PGP_MPINT_BITS sized key. Must succeed. */
assert_rnp_success(
rnp_input_from_path(&input, "data/test_large_MPIs/message.enc.rsa16384.pgp"));
assert_rnp_success(rnp_output_to_null(&output));
assert_rnp_success(rnp_decrypt(ffi, input, output));
rnp_input_destroy(input);
rnp_output_destroy(output);
/* Load PKESK having 16385 bit MPI. Must fail. */
assert_rnp_success(
rnp_input_from_path(&input, "data/test_large_MPIs/message.enc.rsa16385.pgp"));
assert_rnp_success(rnp_output_to_null(&output));
assert_rnp_failure(rnp_decrypt(ffi, input, output));
rnp_input_destroy(input);
rnp_output_destroy(output);
rnp_ffi_destroy(ffi);
}