summaryrefslogtreecommitdiff
path: root/src/dsa.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/dsa.c')
-rw-r--r--src/dsa.c196
1 files changed, 196 insertions, 0 deletions
diff --git a/src/dsa.c b/src/dsa.c
new file mode 100644
index 0000000..40e56bb
--- /dev/null
+++ b/src/dsa.c
@@ -0,0 +1,196 @@
+
+#include "p11-tests.h"
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+
+#include <openssl/sha.h>
+
+static int
+test_dsa_sign_verify(CK_SESSION_HANDLE session, CK_OBJECT_HANDLE key,
+ CK_OBJECT_HANDLE privkey, DSA* dsa)
+{
+ CK_BYTE hash[20];
+ CK_BYTE sig[P11T_BLOCK];
+ CK_BYTE encsig[P11T_BLOCK];
+ unsigned char *ptr;
+ CK_MECHANISM mech;
+ CK_ULONG n_hash, n_sig;
+ DSA_SIG *dsa_sig;
+ CK_RV rv;
+ int res, n_encsig;
+
+ /* Hash the data for DSA */
+ SHA1(p11t_test_data, p11t_test_data_size, hash);
+ n_hash = 20;
+
+ mech.mechanism = CKM_DSA;
+ mech.pParameter = NULL;
+ mech.ulParameterLen = 0;
+
+ P11T_SECTION("C_SignInit");
+
+ rv = (p11t_module_funcs->C_SignInit)(session, &mech, privkey);
+ P11T_CHECK_RV("CKM_DSA", rv, CKR_OK);
+
+ P11T_SECTION("C_Sign");
+
+ n_sig = sizeof(sig);
+ rv = (p11t_module_funcs->C_Sign)(session, hash, n_hash, sig, &n_sig);
+
+ /* Requires authentication */
+ if (rv == CKR_USER_NOT_LOGGED_IN) {
+ rv = p11t_key_login_context_specific (session, privkey);
+ P11T_CHECK_RV("Always authenticate", rv, CKR_OK);
+ rv = (p11t_module_funcs->C_Sign)(session, hash, n_hash, sig, &n_sig);
+ }
+ P11T_CHECK_RV("CKM_DSA", rv, CKR_OK);
+ if(n_sig != 40)
+ P11T_CHECK_FAIL("Length of DSA signature");
+
+
+ /* Verify the DSA signature via openssl */
+ dsa_sig = DSA_SIG_new();
+ assert (dsa_sig);
+ dsa_sig->r = BN_bin2bn(sig, 20, NULL);
+ dsa_sig->s = BN_bin2bn(sig + 20, 20, NULL);
+ ptr = encsig;
+ n_encsig = i2d_DSA_SIG(dsa_sig, &ptr);
+ DSA_SIG_free(dsa_sig);
+ res = DSA_verify(0, hash, n_hash, encsig, n_encsig, dsa);
+ if(res != 1)
+ P11T_CHECK_FAIL_MSG("Check valid DSA signature", p11t_msg_openssl());
+
+
+ P11T_SECTION("C_VerifyInit");
+
+ rv = (p11t_module_funcs->C_VerifyInit)(session, &mech, key);
+ P11T_CHECK_RV("CKM_DSA", rv, CKR_OK);
+
+ P11T_SECTION("C_Verify");
+
+ rv = (p11t_module_funcs->C_Verify)(session, hash, n_hash, sig, n_sig);
+ P11T_CHECK_RV("CKM_DSA", rv, CKR_OK);
+
+ return CONTINUE;
+}
+
+static int
+test_dsa_public_key(CK_SESSION_HANDLE session, CK_OBJECT_HANDLE key,
+ CK_MECHANISM_TYPE mech_type)
+{
+ CK_OBJECT_HANDLE privkey;
+ CK_ATTRIBUTE attrs[1];
+ CK_BBOOL can_verify = 0;
+ DSA *dsa;
+
+ attrs[0].type = CKA_VERIFY;
+ attrs[0].ulValueLen = sizeof(CK_BBOOL);
+ attrs[0].pValue = &can_verify;
+
+ if(!p11t_object_get (session, key, attrs, 1))
+ return CONTINUE;
+
+ dsa = p11t_key_export_public_dsa (session, key);
+ if(!dsa)
+ return CONTINUE;
+
+ privkey = p11t_key_get_private (session, key);
+ if (privkey == CK_INVALID)
+ return CONTINUE;
+
+ if(can_verify)
+ test_dsa_sign_verify(session, key, privkey, dsa);
+
+ DSA_free(dsa);
+
+ return CONTINUE;
+}
+
+static int
+test_dsa_private_key(CK_SESSION_HANDLE session, CK_OBJECT_HANDLE key,
+ CK_MECHANISM_TYPE mech_type)
+{
+ CK_OBJECT_HANDLE pubkey;
+ CK_ATTRIBUTE attrs[2];
+ CK_BBOOL can_sign = 0;
+ DSA *dsa;
+
+ attrs[0].type = CKA_SIGN;
+ attrs[0].ulValueLen = sizeof(CK_BBOOL);
+ attrs[0].pValue = &can_sign;
+
+ if(!p11t_object_get(session, key, attrs, 1))
+ return CONTINUE;
+
+ pubkey = p11t_key_get_public(session, key);
+ if (pubkey == CK_INVALID)
+ return CONTINUE;
+
+ dsa = p11t_key_export_public_dsa(session, pubkey);
+ if(!dsa)
+ return CONTINUE;
+
+ if(can_sign)
+ test_dsa_sign_verify(session, pubkey, key, dsa);
+
+ DSA_free(dsa);
+
+ return CONTINUE;
+}
+
+static void
+test_dsa (CK_SLOT_ID slot, CK_MECHANISM_TYPE mech, CK_MECHANISM_INFO_PTR info)
+{
+ CK_SESSION_HANDLE session;
+ CK_ATTRIBUTE attrs[2];
+ CK_ATTRIBUTE attr;
+ CK_OBJECT_CLASS klass;
+ CK_KEY_TYPE key_type = CKK_DSA;
+ CK_BBOOL token = CK_TRUE;
+ CK_OBJECT_HANDLE_PTR keys;
+ CK_ULONG i, n_keys;
+
+ /* Find all keys that match this mechanism */
+ attrs[0].type = CKA_TOKEN;
+ attrs[0].ulValueLen = sizeof(token);
+ attrs[0].pValue = &token;
+ attrs[1].type = CKA_KEY_TYPE;
+ attrs[1].ulValueLen = sizeof(key_type);
+ attrs[1].pValue = &key_type;
+
+ session = p11t_session_open(slot, 0);
+ if(session == CK_INVALID)
+ return;
+
+ if(!p11t_session_login(session))
+ return;
+
+ keys = p11t_object_find(session, attrs, 2, &n_keys);
+ if(!keys)
+ return;
+
+ for(i = 0; i < n_keys; ++i)
+ {
+ attr.type = CKA_CLASS;
+ attr.ulValueLen = sizeof(klass);
+ attr.pValue = &klass;
+
+ if(p11t_object_get(session, keys[i], &attr, 1))
+ {
+ if(klass == CKO_PRIVATE_KEY)
+ test_dsa_private_key(session, keys[i], mech);
+ else if(klass == CKO_PUBLIC_KEY)
+ test_dsa_public_key(session, keys[i], mech);
+ }
+ }
+
+ free(keys);
+}
+
+void
+p11t_dsa_tests(void)
+{
+ p11t_slot_for_each_mech(CKM_DSA, test_dsa);
+}