blob: f9549f3418656621621557cb36fc7e949008ac93 [file] [log] [blame]
[email protected]3b63f8f42011-03-28 01:54:151// Copyright (c) 2011 The Chromium Authors. All rights reserved.
[email protected]28ae8fe2009-06-05 18:25:062// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]4b559b4d2011-04-14 17:37:145#include "crypto/rsa_private_key.h"
6
avidd373b8b2015-12-21 21:34:437#include <stdint.h>
8
thakisd1a18472016-04-08 22:30:419#include <memory>
10
[email protected]28ae8fe2009-06-05 18:25:0611#include "testing/gtest/include/gtest/gtest.h"
12
[email protected]58782882011-12-03 01:12:0813namespace {
14
avidd373b8b2015-12-21 21:34:4315const uint8_t kTestPrivateKeyInfo[] = {
16 0x30, 0x82, 0x02, 0x78, 0x02, 0x01, 0x00, 0x30, 0x0d, 0x06, 0x09, 0x2a,
17 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x04, 0x82,
18 0x02, 0x62, 0x30, 0x82, 0x02, 0x5e, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81,
19 0x00, 0xb8, 0x7f, 0x2b, 0x20, 0xdc, 0x7c, 0x9b, 0x0c, 0xdc, 0x51, 0x61,
20 0x99, 0x0d, 0x36, 0x0f, 0xd4, 0x66, 0x88, 0x08, 0x55, 0x84, 0xd5, 0x3a,
21 0xbf, 0x2b, 0xa4, 0x64, 0x85, 0x7b, 0x0c, 0x04, 0x13, 0x3f, 0x8d, 0xf4,
22 0xbc, 0x38, 0x0d, 0x49, 0xfe, 0x6b, 0xc4, 0x5a, 0xb0, 0x40, 0x53, 0x3a,
23 0xd7, 0x66, 0x09, 0x0f, 0x9e, 0x36, 0x74, 0x30, 0xda, 0x8a, 0x31, 0x4f,
24 0x1f, 0x14, 0x50, 0xd7, 0xc7, 0x20, 0x94, 0x17, 0xde, 0x4e, 0xb9, 0x57,
25 0x5e, 0x7e, 0x0a, 0xe5, 0xb2, 0x65, 0x7a, 0x89, 0x4e, 0xb6, 0x47, 0xff,
26 0x1c, 0xbd, 0xb7, 0x38, 0x13, 0xaf, 0x47, 0x85, 0x84, 0x32, 0x33, 0xf3,
27 0x17, 0x49, 0xbf, 0xe9, 0x96, 0xd0, 0xd6, 0x14, 0x6f, 0x13, 0x8d, 0xc5,
28 0xfc, 0x2c, 0x72, 0xba, 0xac, 0xea, 0x7e, 0x18, 0x53, 0x56, 0xa6, 0x83,
29 0xa2, 0xce, 0x93, 0x93, 0xe7, 0x1f, 0x0f, 0xe6, 0x0f, 0x02, 0x03, 0x01,
30 0x00, 0x01, 0x02, 0x81, 0x80, 0x03, 0x61, 0x89, 0x37, 0xcb, 0xf2, 0x98,
31 0xa0, 0xce, 0xb4, 0xcb, 0x16, 0x13, 0xf0, 0xe6, 0xaf, 0x5c, 0xc5, 0xa7,
32 0x69, 0x71, 0xca, 0xba, 0x8d, 0xe0, 0x4d, 0xdd, 0xed, 0xb8, 0x48, 0x8b,
33 0x16, 0x93, 0x36, 0x95, 0xc2, 0x91, 0x40, 0x65, 0x17, 0xbd, 0x7f, 0xd6,
34 0xad, 0x9e, 0x30, 0x28, 0x46, 0xe4, 0x3e, 0xcc, 0x43, 0x78, 0xf9, 0xfe,
35 0x1f, 0x33, 0x23, 0x1e, 0x31, 0x12, 0x9d, 0x3c, 0xa7, 0x08, 0x82, 0x7b,
36 0x7d, 0x25, 0x4e, 0x5e, 0x19, 0xa8, 0x9b, 0xed, 0x86, 0xb2, 0xcb, 0x3c,
37 0xfe, 0x4e, 0xa1, 0xfa, 0x62, 0x87, 0x3a, 0x17, 0xf7, 0x60, 0xec, 0x38,
38 0x29, 0xe8, 0x4f, 0x34, 0x9f, 0x76, 0x9d, 0xee, 0xa3, 0xf6, 0x85, 0x6b,
39 0x84, 0x43, 0xc9, 0x1e, 0x01, 0xff, 0xfd, 0xd0, 0x29, 0x4c, 0xfa, 0x8e,
40 0x57, 0x0c, 0xc0, 0x71, 0xa5, 0xbb, 0x88, 0x46, 0x29, 0x5c, 0xc0, 0x4f,
41 0x01, 0x02, 0x41, 0x00, 0xf5, 0x83, 0xa4, 0x64, 0x4a, 0xf2, 0xdd, 0x8c,
42 0x2c, 0xed, 0xa8, 0xd5, 0x60, 0x5a, 0xe4, 0xc7, 0xcc, 0x61, 0xcd, 0x38,
43 0x42, 0x20, 0xd3, 0x82, 0x18, 0xf2, 0x35, 0x00, 0x72, 0x2d, 0xf7, 0x89,
44 0x80, 0x67, 0xb5, 0x93, 0x05, 0x5f, 0xdd, 0x42, 0xba, 0x16, 0x1a, 0xea,
45 0x15, 0xc6, 0xf0, 0xb8, 0x8c, 0xbc, 0xbf, 0x54, 0x9e, 0xf1, 0xc1, 0xb2,
46 0xb3, 0x8b, 0xb6, 0x26, 0x02, 0x30, 0xc4, 0x81, 0x02, 0x41, 0x00, 0xc0,
47 0x60, 0x62, 0x80, 0xe1, 0x22, 0x78, 0xf6, 0x9d, 0x83, 0x18, 0xeb, 0x72,
48 0x45, 0xd7, 0xc8, 0x01, 0x7f, 0xa9, 0xca, 0x8f, 0x7d, 0xd6, 0xb8, 0x31,
49 0x2b, 0x84, 0x7f, 0x62, 0xd9, 0xa9, 0x22, 0x17, 0x7d, 0x06, 0x35, 0x6c,
50 0xf3, 0xc1, 0x94, 0x17, 0x85, 0x5a, 0xaf, 0x9c, 0x5c, 0x09, 0x3c, 0xcf,
51 0x2f, 0x44, 0x9d, 0xb6, 0x52, 0x68, 0x5f, 0xf9, 0x59, 0xc8, 0x84, 0x2b,
52 0x39, 0x22, 0x8f, 0x02, 0x41, 0x00, 0xb2, 0x04, 0xe2, 0x0e, 0x56, 0xca,
53 0x03, 0x1a, 0xc0, 0xf9, 0x12, 0x92, 0xa5, 0x6b, 0x42, 0xb8, 0x1c, 0xda,
54 0x4d, 0x93, 0x9d, 0x5f, 0x6f, 0xfd, 0xc5, 0x58, 0xda, 0x55, 0x98, 0x74,
55 0xfc, 0x28, 0x17, 0x93, 0x1b, 0x75, 0x9f, 0x50, 0x03, 0x7f, 0x7e, 0xae,
56 0xc8, 0x95, 0x33, 0x75, 0x2c, 0xd6, 0xa4, 0x35, 0xb8, 0x06, 0x03, 0xba,
57 0x08, 0x59, 0x2b, 0x17, 0x02, 0xdc, 0x4c, 0x7a, 0x50, 0x01, 0x02, 0x41,
58 0x00, 0x9d, 0xdb, 0x39, 0x59, 0x09, 0xe4, 0x30, 0xa0, 0x24, 0xf5, 0xdb,
59 0x2f, 0xf0, 0x2f, 0xf1, 0x75, 0x74, 0x0d, 0x5e, 0xb5, 0x11, 0x73, 0xb0,
60 0x0a, 0xaa, 0x86, 0x4c, 0x0d, 0xff, 0x7e, 0x1d, 0xb4, 0x14, 0xd4, 0x09,
61 0x91, 0x33, 0x5a, 0xfd, 0xa0, 0x58, 0x80, 0x9b, 0xbe, 0x78, 0x2e, 0x69,
62 0x82, 0x15, 0x7c, 0x72, 0xf0, 0x7b, 0x18, 0x39, 0xff, 0x6e, 0xeb, 0xc6,
63 0x86, 0xf5, 0xb4, 0xc7, 0x6f, 0x02, 0x41, 0x00, 0x8d, 0x1a, 0x37, 0x0f,
64 0x76, 0xc4, 0x82, 0xfa, 0x5c, 0xc3, 0x79, 0x35, 0x3e, 0x70, 0x8a, 0xbf,
65 0x27, 0x49, 0xb0, 0x99, 0x63, 0xcb, 0x77, 0x5f, 0xa8, 0x82, 0x65, 0xf6,
66 0x03, 0x52, 0x51, 0xf1, 0xae, 0x2e, 0x05, 0xb3, 0xc6, 0xa4, 0x92, 0xd1,
67 0xce, 0x6c, 0x72, 0xfb, 0x21, 0xb3, 0x02, 0x87, 0xe4, 0xfd, 0x61, 0xca,
68 0x00, 0x42, 0x19, 0xf0, 0xda, 0x5a, 0x53, 0xe3, 0xb1, 0xc5, 0x15, 0xf3};
[email protected]58782882011-12-03 01:12:0869
70} // namespace
71
[email protected]7eee7902009-06-06 06:06:3072// Generate random private keys with two different sizes. Reimport, then
73// export them again. We should get back the same exact bytes.
[email protected]28ae8fe2009-06-05 18:25:0674TEST(RSAPrivateKeyUnitTest, InitRandomTest) {
thakisd1a18472016-04-08 22:30:4175 std::unique_ptr<crypto::RSAPrivateKey> keypair1(
[email protected]4b559b4d2011-04-14 17:37:1476 crypto::RSAPrivateKey::Create(1024));
thakisd1a18472016-04-08 22:30:4177 std::unique_ptr<crypto::RSAPrivateKey> keypair2(
[email protected]4b559b4d2011-04-14 17:37:1478 crypto::RSAPrivateKey::Create(2048));
[email protected]28ae8fe2009-06-05 18:25:0679 ASSERT_TRUE(keypair1.get());
80 ASSERT_TRUE(keypair2.get());
81
avidd373b8b2015-12-21 21:34:4382 std::vector<uint8_t> privkey1;
83 std::vector<uint8_t> privkey2;
84 std::vector<uint8_t> pubkey1;
85 std::vector<uint8_t> pubkey2;
[email protected]28ae8fe2009-06-05 18:25:0686
87 ASSERT_TRUE(keypair1->ExportPrivateKey(&privkey1));
88 ASSERT_TRUE(keypair2->ExportPrivateKey(&privkey2));
89 ASSERT_TRUE(keypair1->ExportPublicKey(&pubkey1));
90 ASSERT_TRUE(keypair2->ExportPublicKey(&pubkey2));
91
thakisd1a18472016-04-08 22:30:4192 std::unique_ptr<crypto::RSAPrivateKey> keypair3(
[email protected]4b559b4d2011-04-14 17:37:1493 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(privkey1));
thakisd1a18472016-04-08 22:30:4194 std::unique_ptr<crypto::RSAPrivateKey> keypair4(
[email protected]4b559b4d2011-04-14 17:37:1495 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(privkey2));
[email protected]28ae8fe2009-06-05 18:25:0696 ASSERT_TRUE(keypair3.get());
97 ASSERT_TRUE(keypair4.get());
98
avidd373b8b2015-12-21 21:34:4399 std::vector<uint8_t> privkey3;
100 std::vector<uint8_t> privkey4;
[email protected]28ae8fe2009-06-05 18:25:06101 ASSERT_TRUE(keypair3->ExportPrivateKey(&privkey3));
102 ASSERT_TRUE(keypair4->ExportPrivateKey(&privkey4));
103
104 ASSERT_EQ(privkey1.size(), privkey3.size());
105 ASSERT_EQ(privkey2.size(), privkey4.size());
davidben6004dc52017-02-03 04:15:29106 ASSERT_EQ(0, memcmp(&privkey1.front(), &privkey3.front(), privkey1.size()));
107 ASSERT_EQ(0, memcmp(&privkey2.front(), &privkey4.front(), privkey2.size()));
[email protected]28ae8fe2009-06-05 18:25:06108}
109
[email protected]58782882011-12-03 01:12:08110// Test Copy() method.
111TEST(RSAPrivateKeyUnitTest, CopyTest) {
avidd373b8b2015-12-21 21:34:43112 std::vector<uint8_t> input(kTestPrivateKeyInfo,
113 kTestPrivateKeyInfo + sizeof(kTestPrivateKeyInfo));
[email protected]58782882011-12-03 01:12:08114
thakisd1a18472016-04-08 22:30:41115 std::unique_ptr<crypto::RSAPrivateKey> key(
[email protected]58782882011-12-03 01:12:08116 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(input));
117
thakisd1a18472016-04-08 22:30:41118 std::unique_ptr<crypto::RSAPrivateKey> key_copy(key->Copy());
[email protected]58782882011-12-03 01:12:08119 ASSERT_TRUE(key_copy.get());
120
avidd373b8b2015-12-21 21:34:43121 std::vector<uint8_t> privkey_copy;
[email protected]58782882011-12-03 01:12:08122 ASSERT_TRUE(key_copy->ExportPrivateKey(&privkey_copy));
123 ASSERT_EQ(input, privkey_copy);
124}
125
davidbenc6761092014-11-24 21:54:11126// Test that CreateFromPrivateKeyInfo fails if there is extra data after the RSA
127// key.
128TEST(RSAPrivateKeyUnitTest, ExtraData) {
avidd373b8b2015-12-21 21:34:43129 std::vector<uint8_t> input(kTestPrivateKeyInfo,
130 kTestPrivateKeyInfo + sizeof(kTestPrivateKeyInfo));
davidbenc6761092014-11-24 21:54:11131 input.push_back(0);
132
thakisd1a18472016-04-08 22:30:41133 std::unique_ptr<crypto::RSAPrivateKey> key(
davidbenc6761092014-11-24 21:54:11134 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(input));
135
136 // Import should fail.
137 EXPECT_FALSE(key);
138}
139
eromanf80e1932015-01-02 21:24:55140TEST(RSAPrivateKeyUnitTest, NotRsaKey) {
141 // Defines a valid P-256 private key.
avidd373b8b2015-12-21 21:34:43142 const uint8_t kTestEcPrivateKeyInfo[] = {
eromanf80e1932015-01-02 21:24:55143 0x30, 0x81, 0x87, 0x02, 0x01, 0x00, 0x30, 0x13, 0x06, 0x07, 0x2A, 0x86,
144 0x48, 0xCE, 0x3D, 0x02, 0x01, 0x06, 0x08, 0x2A, 0x86, 0x48, 0xCE, 0x3D,
145 0x03, 0x01, 0x07, 0x04, 0x6D, 0x30, 0x6B, 0x02, 0x01, 0x01, 0x04, 0x20,
146 0x1F, 0xE3, 0x39, 0x50, 0xC5, 0xF4, 0x61, 0x12, 0x4A, 0xE9, 0x92, 0xC2,
147 0xBD, 0xFD, 0xF1, 0xC7, 0x3B, 0x16, 0x15, 0xF5, 0x71, 0xBD, 0x56, 0x7E,
148 0x60, 0xD1, 0x9A, 0xA1, 0xF4, 0x8C, 0xDF, 0x42, 0xA1, 0x44, 0x03, 0x42,
149 0x00, 0x04, 0x7C, 0x11, 0x0C, 0x66, 0xDC, 0xFD, 0xA8, 0x07, 0xF6, 0xE6,
150 0x9E, 0x45, 0xDD, 0xB3, 0xC7, 0x4F, 0x69, 0xA1, 0x48, 0x4D, 0x20, 0x3E,
151 0x8D, 0xC5, 0xAD, 0xA8, 0xE9, 0xA9, 0xDD, 0x7C, 0xB3, 0xC7, 0x0D, 0xF4,
152 0x48, 0x98, 0x6E, 0x51, 0xBD, 0xE5, 0xD1, 0x57, 0x6F, 0x99, 0x90, 0x1F,
153 0x9C, 0x2C, 0x6A, 0x80, 0x6A, 0x47, 0xFD, 0x90, 0x76, 0x43, 0xA7, 0x2B,
avidd373b8b2015-12-21 21:34:43154 0x83, 0x55, 0x97, 0xEF, 0xC8, 0xC6};
eromanf80e1932015-01-02 21:24:55155
avidd373b8b2015-12-21 21:34:43156 std::vector<uint8_t> input(
eromanf80e1932015-01-02 21:24:55157 kTestEcPrivateKeyInfo,
158 kTestEcPrivateKeyInfo + sizeof(kTestEcPrivateKeyInfo));
159
thakisd1a18472016-04-08 22:30:41160 std::unique_ptr<crypto::RSAPrivateKey> key(
eromanf80e1932015-01-02 21:24:55161 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(input));
162
163 // Import should fail as the given PKCS8 bytes were for an EC key not RSA key.
164 EXPECT_FALSE(key);
165}
[email protected]7eee7902009-06-06 06:06:30166
167// Verify that generated public keys look good. This test data was generated
168// with the openssl command line tool.
169TEST(RSAPrivateKeyUnitTest, PublicKeyTest) {
avidd373b8b2015-12-21 21:34:43170 const uint8_t expected_public_key_info[] = {
171 0x30, 0x81, 0x9f, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7,
172 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x03, 0x81, 0x8d, 0x00, 0x30, 0x81,
173 0x89, 0x02, 0x81, 0x81, 0x00, 0xb8, 0x7f, 0x2b, 0x20, 0xdc, 0x7c, 0x9b,
174 0x0c, 0xdc, 0x51, 0x61, 0x99, 0x0d, 0x36, 0x0f, 0xd4, 0x66, 0x88, 0x08,
175 0x55, 0x84, 0xd5, 0x3a, 0xbf, 0x2b, 0xa4, 0x64, 0x85, 0x7b, 0x0c, 0x04,
176 0x13, 0x3f, 0x8d, 0xf4, 0xbc, 0x38, 0x0d, 0x49, 0xfe, 0x6b, 0xc4, 0x5a,
177 0xb0, 0x40, 0x53, 0x3a, 0xd7, 0x66, 0x09, 0x0f, 0x9e, 0x36, 0x74, 0x30,
178 0xda, 0x8a, 0x31, 0x4f, 0x1f, 0x14, 0x50, 0xd7, 0xc7, 0x20, 0x94, 0x17,
179 0xde, 0x4e, 0xb9, 0x57, 0x5e, 0x7e, 0x0a, 0xe5, 0xb2, 0x65, 0x7a, 0x89,
180 0x4e, 0xb6, 0x47, 0xff, 0x1c, 0xbd, 0xb7, 0x38, 0x13, 0xaf, 0x47, 0x85,
181 0x84, 0x32, 0x33, 0xf3, 0x17, 0x49, 0xbf, 0xe9, 0x96, 0xd0, 0xd6, 0x14,
182 0x6f, 0x13, 0x8d, 0xc5, 0xfc, 0x2c, 0x72, 0xba, 0xac, 0xea, 0x7e, 0x18,
183 0x53, 0x56, 0xa6, 0x83, 0xa2, 0xce, 0x93, 0x93, 0xe7, 0x1f, 0x0f, 0xe6,
184 0x0f, 0x02, 0x03, 0x01, 0x00, 0x01};
[email protected]7eee7902009-06-06 06:06:30185
avidd373b8b2015-12-21 21:34:43186 std::vector<uint8_t> input(kTestPrivateKeyInfo,
187 kTestPrivateKeyInfo + sizeof(kTestPrivateKeyInfo));
[email protected]7eee7902009-06-06 06:06:30188
thakisd1a18472016-04-08 22:30:41189 std::unique_ptr<crypto::RSAPrivateKey> key(
[email protected]4b559b4d2011-04-14 17:37:14190 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(input));
[email protected]7eee7902009-06-06 06:06:30191 ASSERT_TRUE(key.get());
192
avidd373b8b2015-12-21 21:34:43193 std::vector<uint8_t> output;
[email protected]7eee7902009-06-06 06:06:30194 ASSERT_TRUE(key->ExportPublicKey(&output));
195
davidben6004dc52017-02-03 04:15:29196 ASSERT_EQ(0,
197 memcmp(expected_public_key_info, &output.front(), output.size()));
[email protected]7eee7902009-06-06 06:06:30198}
[email protected]d052efbf2009-06-22 19:33:16199
200// These two test keys each contain an integer that has 0x00 for its most
201// significant byte. When encoded as ASN.1, this byte is dropped and there are
202// two interesting sub-cases. When the sign bit of the integer is set, an extra
203// null byte is added back to force the encoded value to be positive. When the
204// sign bit is not set, the encoded integer is just left shorter than usual.
205// See also: http://code.google.com/p/chromium/issues/detail?id=14877.
206//
207// Before we were handling this correctly, we would see one of two failures:
208// * RSAPrivateKey::CreateFromPrivateKeyInfo would return null because the
209// underlying windows API failed to import the key.
210// * The import would succeed, but incorrectly interpret the data. On export,
211// the key would contain different values.
212//
213// This test case verifies these two failures modes don't occur.
214TEST(RSAPrivateKeyUnitTest, ShortIntegers) {
avidd373b8b2015-12-21 21:34:43215 const uint8_t short_integer_with_high_bit[] = {
216 0x30, 0x82, 0x02, 0x77, 0x02, 0x01, 0x00, 0x30, 0x0d, 0x06, 0x09, 0x2a,
217 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x04, 0x82,
218 0x02, 0x61, 0x30, 0x82, 0x02, 0x5d, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81,
219 0x00, 0x92, 0x59, 0x32, 0x7d, 0x8e, 0xaf, 0x2e, 0xd5, 0xb2, 0x5c, 0x67,
220 0xc8, 0x7d, 0x48, 0xb7, 0x84, 0x12, 0xd0, 0x76, 0xda, 0xe1, 0xa3, 0x1e,
221 0x40, 0x01, 0x14, 0x5c, 0xef, 0x26, 0x6e, 0x28, 0xa2, 0xf7, 0xa5, 0xb4,
222 0x02, 0x37, 0xd0, 0x53, 0x10, 0xcb, 0x7c, 0x6a, 0xf4, 0x53, 0x9f, 0xb8,
223 0xe0, 0x83, 0x93, 0xd1, 0x19, 0xd8, 0x28, 0xd1, 0xd1, 0xd8, 0x87, 0x8f,
224 0x92, 0xfd, 0x73, 0xc0, 0x4d, 0x3e, 0x07, 0x22, 0x1f, 0xc1, 0x20, 0xb0,
225 0x70, 0xb2, 0x3b, 0xea, 0xb1, 0xe5, 0x0a, 0xfd, 0x56, 0x49, 0x5e, 0x39,
226 0x90, 0x91, 0xce, 0x04, 0x83, 0x29, 0xaa, 0xfd, 0x12, 0xa4, 0x42, 0x26,
227 0x6c, 0x6e, 0x79, 0x70, 0x77, 0x03, 0xb2, 0x07, 0x01, 0x3d, 0x85, 0x81,
228 0x95, 0x9e, 0xda, 0x5a, 0xa3, 0xf4, 0x2d, 0x38, 0x04, 0x58, 0xf5, 0x6b,
229 0xc9, 0xf1, 0xb5, 0x65, 0xfe, 0x66, 0x0d, 0xa2, 0xd5, 0x02, 0x03, 0x01,
230 0x00, 0x01, 0x02, 0x81, 0x80, 0x5e, 0x01, 0x5f, 0xb6, 0x59, 0x1d, 0xdc,
231 0x36, 0xb6, 0x60, 0x36, 0xe6, 0x08, 0xdb, 0xd9, 0xcd, 0xc3, 0x8c, 0x16,
232 0x9c, 0x98, 0x8d, 0x7f, 0xd3, 0xdb, 0x1d, 0xaa, 0x68, 0x8f, 0xc5, 0xf8,
233 0xe2, 0x5d, 0xb3, 0x19, 0xc2, 0xc6, 0xf9, 0x51, 0x32, 0x1b, 0x93, 0x6a,
234 0xdc, 0x50, 0x8e, 0xeb, 0x61, 0x84, 0x03, 0x42, 0x30, 0x98, 0xb1, 0xf7,
235 0xbd, 0x14, 0x9a, 0x57, 0x36, 0x33, 0x09, 0xd4, 0x3e, 0x90, 0xda, 0xef,
236 0x09, 0x6e, 0xef, 0x49, 0xb6, 0x60, 0x68, 0x5e, 0x54, 0x17, 0x25, 0x5b,
237 0x37, 0xe3, 0x35, 0x63, 0x5b, 0x60, 0x3c, 0xbd, 0x50, 0xdf, 0x46, 0x43,
238 0x08, 0xa4, 0x71, 0x21, 0xf1, 0x30, 0x71, 0xdc, 0xda, 0xd7, 0x6f, 0xd2,
239 0x18, 0xbd, 0x39, 0xf1, 0xe1, 0xbe, 0xa8, 0x8d, 0x62, 0xdf, 0xa2, 0x3e,
240 0xb6, 0x15, 0x26, 0xb6, 0x57, 0xbd, 0x63, 0xdb, 0xc1, 0x91, 0xec, 0xb8,
241 0x01, 0x02, 0x41, 0x00, 0xc6, 0x1a, 0x06, 0x48, 0xf2, 0x12, 0x1c, 0x9f,
242 0x74, 0x20, 0x5c, 0x85, 0xa2, 0xda, 0xe5, 0x62, 0x96, 0x8d, 0x22, 0x7b,
243 0x78, 0x73, 0xea, 0xbb, 0x9f, 0x59, 0x42, 0x13, 0x15, 0xc8, 0x11, 0x50,
244 0x6c, 0x55, 0xf6, 0xdf, 0x8b, 0xfe, 0xc7, 0xdd, 0xa8, 0xca, 0x54, 0x41,
245 0xe8, 0xce, 0xbe, 0x7d, 0xbd, 0xe2, 0x13, 0x4b, 0x5b, 0x61, 0xeb, 0x69,
246 0x6c, 0xb1, 0x9b, 0x28, 0x68, 0x5b, 0xd6, 0x01, 0x02, 0x41, 0x00, 0xbd,
247 0x1e, 0xfe, 0x51, 0x99, 0xb6, 0xe3, 0x84, 0xfe, 0xf1, 0x9e, 0xfd, 0x9c,
248 0xe7, 0x86, 0x43, 0x68, 0x7f, 0x2f, 0x6a, 0x2a, 0x4c, 0xae, 0xa6, 0x41,
249 0x1c, 0xf0, 0x10, 0x37, 0x54, 0x23, 0xba, 0x05, 0x0d, 0x18, 0x27, 0x8d,
250 0xb8, 0xe4, 0x8f, 0xf2, 0x25, 0x73, 0x8a, 0xd7, 0x05, 0x98, 0x6b, 0x3d,
251 0x55, 0xb7, 0x6f, 0x7c, 0xec, 0x77, 0x61, 0x54, 0x7b, 0xb6, 0x6b, 0x31,
252 0xec, 0x94, 0xd5, 0x02, 0x41, 0x00, 0x90, 0xa2, 0xa5, 0x9e, 0x12, 0xa7,
253 0x68, 0xa0, 0x7e, 0xdf, 0xb5, 0xcd, 0x98, 0x26, 0xab, 0xbd, 0xbc, 0x5f,
254 0xd5, 0x22, 0x42, 0xc2, 0x97, 0x4a, 0x5f, 0x40, 0x82, 0xfe, 0x7e, 0x33,
255 0xb1, 0x78, 0x7f, 0x70, 0x90, 0x2b, 0x8d, 0x01, 0xfb, 0x18, 0xfa, 0x48,
256 0xa7, 0x15, 0xec, 0x0d, 0x2e, 0x85, 0x8d, 0xe2, 0x86, 0xe5, 0xc9, 0x15,
257 0x88, 0x14, 0x53, 0xd8, 0xa4, 0x88, 0xef, 0x10, 0xc6, 0x01, 0x02, 0x41,
258 0x00, 0xba, 0xe4, 0xaf, 0x14, 0xfa, 0xdf, 0xf6, 0xd5, 0xce, 0x8f, 0xfe,
259 0xbb, 0xc8, 0x5c, 0x30, 0x9d, 0xda, 0xdd, 0x9d, 0x80, 0xc0, 0x0e, 0x89,
260 0xa5, 0xb8, 0xc1, 0x1d, 0x28, 0x19, 0x55, 0x67, 0xfd, 0x03, 0xd2, 0xdd,
261 0xe4, 0xf0, 0xb4, 0x20, 0x03, 0x74, 0x9b, 0xb8, 0x24, 0x23, 0xbb, 0xde,
262 0xd5, 0x53, 0x86, 0xaa, 0xc1, 0x5d, 0x65, 0xdd, 0xcf, 0xec, 0x8a, 0x59,
263 0x4a, 0x73, 0xca, 0xc5, 0x85, 0x02, 0x40, 0x00, 0xc4, 0x5e, 0x8d, 0xa4,
264 0xea, 0xbb, 0x6a, 0x9b, 0xe6, 0x3a, 0x4d, 0xc1, 0xdb, 0xe5, 0x52, 0x38,
265 0xf9, 0x59, 0x91, 0x2d, 0x90, 0x82, 0xe3, 0x31, 0x1b, 0x48, 0xb7, 0x42,
266 0xfa, 0x1d, 0x83, 0xd5, 0x3d, 0x02, 0xc2, 0x12, 0x71, 0x10, 0x3a, 0xbd,
267 0x92, 0x8f, 0x9b, 0xa2, 0x6b, 0x2d, 0x21, 0xa4, 0x65, 0xe9, 0xfa, 0x8c,
268 0x30, 0x2a, 0x89, 0xce, 0xd0, 0xa7, 0x67, 0xd8, 0x45, 0x84, 0xb0};
[email protected]d052efbf2009-06-22 19:33:16269
avidd373b8b2015-12-21 21:34:43270 const uint8_t short_integer_without_high_bit[] = {
271 0x30, 0x82, 0x02, 0x76, 0x02, 0x01, 0x00, 0x30, 0x0d, 0x06, 0x09, 0x2a,
272 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x04, 0x82,
273 0x02, 0x60, 0x30, 0x82, 0x02, 0x5c, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81,
274 0x00, 0xc3, 0x9e, 0x8d, 0xc4, 0x6d, 0x38, 0xe8, 0x0e, 0x9f, 0x84, 0x03,
275 0x40, 0x8e, 0x81, 0x2e, 0x56, 0x67, 0x78, 0x11, 0x85, 0x27, 0x81, 0x52,
276 0xf2, 0x1b, 0x3e, 0x5b, 0xf8, 0xab, 0xfc, 0xaf, 0xca, 0x5c, 0x26, 0xd5,
277 0xfa, 0xd4, 0x55, 0x50, 0x38, 0xb9, 0x9d, 0x89, 0x92, 0x7e, 0x34, 0xcf,
278 0x37, 0x82, 0x48, 0x2d, 0xaa, 0xc4, 0x6a, 0x0e, 0x93, 0xea, 0xad, 0x8a,
279 0x33, 0xf0, 0x42, 0x23, 0xe0, 0x4c, 0x98, 0xbf, 0x01, 0x00, 0x1b, 0xfe,
280 0x06, 0x15, 0xc6, 0xe3, 0x80, 0x79, 0x6d, 0xfe, 0x48, 0xcd, 0x40, 0xbb,
281 0xf9, 0x58, 0xe6, 0xbf, 0xd5, 0x4c, 0x29, 0x48, 0x53, 0x78, 0x06, 0x03,
282 0x0d, 0x59, 0xf5, 0x20, 0xe0, 0xe6, 0x8c, 0xb2, 0xf5, 0xd8, 0x61, 0x52,
283 0x7e, 0x40, 0x83, 0xd7, 0x69, 0xae, 0xd7, 0x75, 0x02, 0x2d, 0x49, 0xd5,
284 0x15, 0x5b, 0xf1, 0xd9, 0x4d, 0x60, 0x7d, 0x62, 0xa5, 0x02, 0x03, 0x01,
285 0x00, 0x01, 0x02, 0x7f, 0x6d, 0x45, 0x23, 0xeb, 0x95, 0x17, 0x34, 0x88,
286 0xf6, 0x91, 0xc7, 0x3f, 0x48, 0x5a, 0xe0, 0x87, 0x63, 0x44, 0xae, 0x84,
287 0xb2, 0x8c, 0x8a, 0xc8, 0xb2, 0x6f, 0x22, 0xf0, 0xc5, 0x21, 0x61, 0x10,
288 0xa8, 0x69, 0x09, 0x1e, 0x13, 0x7d, 0x94, 0x52, 0x1b, 0x5c, 0xe4, 0x7b,
289 0xf0, 0x03, 0x8f, 0xbc, 0x72, 0x09, 0xdf, 0x78, 0x84, 0x3e, 0xb9, 0xe5,
290 0xe6, 0x31, 0x0a, 0x01, 0xf9, 0x32, 0xf8, 0xd6, 0x57, 0xa3, 0x87, 0xe6,
291 0xf5, 0x98, 0xbc, 0x8e, 0x41, 0xb9, 0x50, 0x17, 0x7b, 0xd3, 0x97, 0x5a,
292 0x44, 0x3a, 0xee, 0xff, 0x6b, 0xb3, 0x3a, 0x52, 0xe7, 0xa4, 0x96, 0x9a,
293 0xf6, 0x83, 0xc8, 0x97, 0x1c, 0x63, 0xa1, 0xd6, 0xb3, 0xa8, 0xb2, 0xc7,
294 0x73, 0x25, 0x0f, 0x58, 0x36, 0xb9, 0x7a, 0x47, 0xa7, 0x4d, 0x30, 0xfe,
295 0x4d, 0x74, 0x56, 0xe8, 0xfb, 0xd6, 0x50, 0xe5, 0xe0, 0x28, 0x15, 0x02,
296 0x41, 0x00, 0xeb, 0x15, 0x62, 0xb6, 0x37, 0x41, 0x7c, 0xc5, 0x00, 0x22,
297 0x2c, 0x5a, 0x5e, 0xe4, 0xb2, 0x11, 0x87, 0x89, 0xad, 0xf4, 0x57, 0x68,
298 0x90, 0xb7, 0x9f, 0xe2, 0x79, 0x20, 0x6b, 0x98, 0x00, 0x0d, 0x3a, 0x3b,
299 0xc1, 0xcd, 0x36, 0xf9, 0x27, 0xda, 0x40, 0x36, 0x1d, 0xb8, 0x5c, 0x96,
300 0xeb, 0x04, 0x08, 0xe1, 0x3f, 0xfa, 0x94, 0x8b, 0x0f, 0xa0, 0xff, 0xc1,
301 0x51, 0xea, 0x90, 0xad, 0x15, 0xc7, 0x02, 0x41, 0x00, 0xd5, 0x06, 0x45,
302 0xd7, 0x55, 0x63, 0x1a, 0xf0, 0x89, 0x81, 0xae, 0x87, 0x23, 0xa2, 0x39,
303 0xfe, 0x3d, 0x82, 0xc7, 0xcb, 0x15, 0xb9, 0xe3, 0xe2, 0x5b, 0xc6, 0xd2,
304 0x55, 0xdd, 0xab, 0x55, 0x29, 0x7c, 0xda, 0x0e, 0x1c, 0x09, 0xfc, 0x73,
305 0x0d, 0x01, 0xed, 0x6d, 0x2f, 0x05, 0xd0, 0xd5, 0x1d, 0xce, 0x18, 0x7f,
306 0xb0, 0xc8, 0x47, 0x77, 0xd2, 0xa9, 0x9e, 0xfc, 0x39, 0x4b, 0x3d, 0x94,
307 0x33, 0x02, 0x41, 0x00, 0x8f, 0x94, 0x09, 0x2d, 0x17, 0x44, 0x75, 0x0a,
308 0xf1, 0x10, 0xee, 0x1b, 0xe7, 0xd7, 0x2f, 0xf6, 0xca, 0xdc, 0x49, 0x15,
309 0x72, 0x09, 0x58, 0x51, 0xfe, 0x61, 0xd8, 0xee, 0xf7, 0x27, 0xe7, 0xe8,
310 0x2c, 0x47, 0xf1, 0x0f, 0x00, 0x63, 0x5e, 0x76, 0xcb, 0x3f, 0x02, 0x19,
311 0xe6, 0xda, 0xfa, 0x01, 0x05, 0xd7, 0x65, 0x37, 0x0b, 0x60, 0x7f, 0x94,
312 0x2a, 0x80, 0x8d, 0x22, 0x81, 0x68, 0x65, 0x63, 0x02, 0x41, 0x00, 0xc2,
313 0xd4, 0x18, 0xde, 0x47, 0x9e, 0xfb, 0x8d, 0x91, 0x05, 0xc5, 0x3c, 0x9d,
314 0xcf, 0x8a, 0x60, 0xc7, 0x9b, 0x2b, 0xe5, 0xc6, 0xba, 0x1b, 0xfc, 0xf3,
315 0xd9, 0x54, 0x97, 0xe9, 0xc4, 0x00, 0x80, 0x90, 0x4a, 0xd2, 0x6a, 0xbc,
316 0x8b, 0x62, 0x22, 0x3c, 0x68, 0x0c, 0xda, 0xdb, 0xe3, 0xd2, 0x76, 0x8e,
317 0xff, 0x03, 0x12, 0x09, 0x2a, 0xac, 0x21, 0x44, 0xb7, 0x3e, 0x91, 0x9c,
318 0x09, 0xf6, 0xd7, 0x02, 0x41, 0x00, 0xc0, 0xa1, 0xbb, 0x70, 0xdc, 0xf8,
319 0xeb, 0x17, 0x61, 0xd4, 0x8c, 0x7c, 0x3b, 0x82, 0x91, 0x58, 0xff, 0xf9,
320 0x19, 0xac, 0x3a, 0x73, 0xa7, 0x20, 0xe5, 0x22, 0x02, 0xc4, 0xf6, 0xb9,
321 0xb9, 0x43, 0x53, 0x35, 0x88, 0xe1, 0x05, 0xb6, 0x43, 0x9b, 0x39, 0xc8,
322 0x04, 0x4d, 0x2b, 0x01, 0xf7, 0xe6, 0x1b, 0x8d, 0x7e, 0x89, 0xe3, 0x43,
323 0xd4, 0xf3, 0xab, 0x28, 0xd4, 0x5a, 0x1f, 0x20, 0xea, 0xbe};
[email protected]d052efbf2009-06-22 19:33:16324
avidd373b8b2015-12-21 21:34:43325 std::vector<uint8_t> input1;
326 std::vector<uint8_t> input2;
[email protected]d052efbf2009-06-22 19:33:16327
328 input1.resize(sizeof(short_integer_with_high_bit));
329 input2.resize(sizeof(short_integer_without_high_bit));
330
331 memcpy(&input1.front(), short_integer_with_high_bit,
332 sizeof(short_integer_with_high_bit));
333 memcpy(&input2.front(), short_integer_without_high_bit,
334 sizeof(short_integer_without_high_bit));
335
thakisd1a18472016-04-08 22:30:41336 std::unique_ptr<crypto::RSAPrivateKey> keypair1(
[email protected]4b559b4d2011-04-14 17:37:14337 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(input1));
thakisd1a18472016-04-08 22:30:41338 std::unique_ptr<crypto::RSAPrivateKey> keypair2(
[email protected]4b559b4d2011-04-14 17:37:14339 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(input2));
[email protected]d052efbf2009-06-22 19:33:16340 ASSERT_TRUE(keypair1.get());
341 ASSERT_TRUE(keypair2.get());
342
avidd373b8b2015-12-21 21:34:43343 std::vector<uint8_t> output1;
344 std::vector<uint8_t> output2;
[email protected]d052efbf2009-06-22 19:33:16345 ASSERT_TRUE(keypair1->ExportPrivateKey(&output1));
346 ASSERT_TRUE(keypair2->ExportPrivateKey(&output2));
347
348 ASSERT_EQ(input1.size(), output1.size());
349 ASSERT_EQ(input2.size(), output2.size());
davidben6004dc52017-02-03 04:15:29350 ASSERT_EQ(0, memcmp(&output1.front(), &input1.front(), input1.size()));
351 ASSERT_EQ(0, memcmp(&output2.front(), &input2.front(), input2.size()));
[email protected]d052efbf2009-06-22 19:33:16352}
dougsteeddb7726ae2014-09-10 23:21:48353
dougsteeddb7726ae2014-09-10 23:21:48354TEST(RSAPrivateKeyUnitTest, CreateFromKeyTest) {
thakisd1a18472016-04-08 22:30:41355 std::unique_ptr<crypto::RSAPrivateKey> key_pair(
mostynb93937ca2015-06-09 19:36:17356 crypto::RSAPrivateKey::Create(512));
357 ASSERT_TRUE(key_pair.get());
dougsteeddb7726ae2014-09-10 23:21:48358
thakisd1a18472016-04-08 22:30:41359 std::unique_ptr<crypto::RSAPrivateKey> key_copy(
dougsteeddb7726ae2014-09-10 23:21:48360 crypto::RSAPrivateKey::CreateFromKey(key_pair->key()));
361 ASSERT_TRUE(key_copy.get());
362
avidd373b8b2015-12-21 21:34:43363 std::vector<uint8_t> privkey;
364 std::vector<uint8_t> pubkey;
dougsteeddb7726ae2014-09-10 23:21:48365 ASSERT_TRUE(key_pair->ExportPrivateKey(&privkey));
366 ASSERT_TRUE(key_pair->ExportPublicKey(&pubkey));
367
avidd373b8b2015-12-21 21:34:43368 std::vector<uint8_t> privkey_copy;
369 std::vector<uint8_t> pubkey_copy;
dougsteeddb7726ae2014-09-10 23:21:48370 ASSERT_TRUE(key_copy->ExportPrivateKey(&privkey_copy));
371 ASSERT_TRUE(key_copy->ExportPublicKey(&pubkey_copy));
372
373 ASSERT_EQ(privkey, privkey_copy);
374 ASSERT_EQ(pubkey, pubkey_copy);
375}
dougsteeddb7726ae2014-09-10 23:21:48376