1e1051a39Sopenharmony_ci/* 2e1051a39Sopenharmony_ci * Copyright 2017-2021 The OpenSSL Project Authors. All Rights Reserved. 3e1051a39Sopenharmony_ci * 4e1051a39Sopenharmony_ci * Licensed under the Apache License 2.0 (the "License"). You may not use 5e1051a39Sopenharmony_ci * this file except in compliance with the License. You can obtain a copy 6e1051a39Sopenharmony_ci * in the file LICENSE in the source distribution or at 7e1051a39Sopenharmony_ci * https://www.openssl.org/source/license.html 8e1051a39Sopenharmony_ci */ 9e1051a39Sopenharmony_ci 10e1051a39Sopenharmony_ci/* 11e1051a39Sopenharmony_ci * Low level APIs are deprecated for public use, but still ok for internal use. 12e1051a39Sopenharmony_ci */ 13e1051a39Sopenharmony_ci#include "internal/deprecated.h" 14e1051a39Sopenharmony_ci 15e1051a39Sopenharmony_ci#include <stdio.h> 16e1051a39Sopenharmony_ci#include <stdlib.h> 17e1051a39Sopenharmony_ci#include <string.h> 18e1051a39Sopenharmony_ci 19e1051a39Sopenharmony_ci#include <openssl/bio.h> 20e1051a39Sopenharmony_ci#include <openssl/evp.h> 21e1051a39Sopenharmony_ci#include <openssl/bn.h> 22e1051a39Sopenharmony_ci#include <openssl/crypto.h> 23e1051a39Sopenharmony_ci#include <openssl/err.h> 24e1051a39Sopenharmony_ci#include <openssl/rand.h> 25e1051a39Sopenharmony_ci#include "testutil.h" 26e1051a39Sopenharmony_ci 27e1051a39Sopenharmony_ci#ifndef OPENSSL_NO_SM2 28e1051a39Sopenharmony_ci 29e1051a39Sopenharmony_ci# include "crypto/sm2.h" 30e1051a39Sopenharmony_ci 31e1051a39Sopenharmony_cistatic fake_random_generate_cb get_faked_bytes; 32e1051a39Sopenharmony_ci 33e1051a39Sopenharmony_cistatic OSSL_PROVIDER *fake_rand = NULL; 34e1051a39Sopenharmony_cistatic uint8_t *fake_rand_bytes = NULL; 35e1051a39Sopenharmony_cistatic size_t fake_rand_bytes_offset = 0; 36e1051a39Sopenharmony_cistatic size_t fake_rand_size = 0; 37e1051a39Sopenharmony_ci 38e1051a39Sopenharmony_cistatic int get_faked_bytes(unsigned char *buf, size_t num, 39e1051a39Sopenharmony_ci ossl_unused const char *name, 40e1051a39Sopenharmony_ci ossl_unused EVP_RAND_CTX *ctx) 41e1051a39Sopenharmony_ci{ 42e1051a39Sopenharmony_ci if (!TEST_ptr(fake_rand_bytes) || !TEST_size_t_gt(fake_rand_size, 0)) 43e1051a39Sopenharmony_ci return 0; 44e1051a39Sopenharmony_ci 45e1051a39Sopenharmony_ci while (num-- > 0) { 46e1051a39Sopenharmony_ci if (fake_rand_bytes_offset >= fake_rand_size) 47e1051a39Sopenharmony_ci fake_rand_bytes_offset = 0; 48e1051a39Sopenharmony_ci *buf++ = fake_rand_bytes[fake_rand_bytes_offset++]; 49e1051a39Sopenharmony_ci } 50e1051a39Sopenharmony_ci 51e1051a39Sopenharmony_ci return 1; 52e1051a39Sopenharmony_ci} 53e1051a39Sopenharmony_ci 54e1051a39Sopenharmony_cistatic int start_fake_rand(const char *hex_bytes) 55e1051a39Sopenharmony_ci{ 56e1051a39Sopenharmony_ci OPENSSL_free(fake_rand_bytes); 57e1051a39Sopenharmony_ci fake_rand_bytes_offset = 0; 58e1051a39Sopenharmony_ci fake_rand_size = strlen(hex_bytes) / 2; 59e1051a39Sopenharmony_ci if (!TEST_ptr(fake_rand_bytes = OPENSSL_hexstr2buf(hex_bytes, NULL))) 60e1051a39Sopenharmony_ci return 0; 61e1051a39Sopenharmony_ci 62e1051a39Sopenharmony_ci /* use own random function */ 63e1051a39Sopenharmony_ci fake_rand_set_public_private_callbacks(NULL, get_faked_bytes); 64e1051a39Sopenharmony_ci return 1; 65e1051a39Sopenharmony_ci 66e1051a39Sopenharmony_ci} 67e1051a39Sopenharmony_ci 68e1051a39Sopenharmony_cistatic void restore_rand(void) 69e1051a39Sopenharmony_ci{ 70e1051a39Sopenharmony_ci fake_rand_set_public_private_callbacks(NULL, NULL); 71e1051a39Sopenharmony_ci OPENSSL_free(fake_rand_bytes); 72e1051a39Sopenharmony_ci fake_rand_bytes = NULL; 73e1051a39Sopenharmony_ci fake_rand_bytes_offset = 0; 74e1051a39Sopenharmony_ci} 75e1051a39Sopenharmony_ci 76e1051a39Sopenharmony_cistatic EC_GROUP *create_EC_group(const char *p_hex, const char *a_hex, 77e1051a39Sopenharmony_ci const char *b_hex, const char *x_hex, 78e1051a39Sopenharmony_ci const char *y_hex, const char *order_hex, 79e1051a39Sopenharmony_ci const char *cof_hex) 80e1051a39Sopenharmony_ci{ 81e1051a39Sopenharmony_ci BIGNUM *p = NULL; 82e1051a39Sopenharmony_ci BIGNUM *a = NULL; 83e1051a39Sopenharmony_ci BIGNUM *b = NULL; 84e1051a39Sopenharmony_ci BIGNUM *g_x = NULL; 85e1051a39Sopenharmony_ci BIGNUM *g_y = NULL; 86e1051a39Sopenharmony_ci BIGNUM *order = NULL; 87e1051a39Sopenharmony_ci BIGNUM *cof = NULL; 88e1051a39Sopenharmony_ci EC_POINT *generator = NULL; 89e1051a39Sopenharmony_ci EC_GROUP *group = NULL; 90e1051a39Sopenharmony_ci int ok = 0; 91e1051a39Sopenharmony_ci 92e1051a39Sopenharmony_ci if (!TEST_true(BN_hex2bn(&p, p_hex)) 93e1051a39Sopenharmony_ci || !TEST_true(BN_hex2bn(&a, a_hex)) 94e1051a39Sopenharmony_ci || !TEST_true(BN_hex2bn(&b, b_hex))) 95e1051a39Sopenharmony_ci goto done; 96e1051a39Sopenharmony_ci 97e1051a39Sopenharmony_ci group = EC_GROUP_new_curve_GFp(p, a, b, NULL); 98e1051a39Sopenharmony_ci if (!TEST_ptr(group)) 99e1051a39Sopenharmony_ci goto done; 100e1051a39Sopenharmony_ci 101e1051a39Sopenharmony_ci generator = EC_POINT_new(group); 102e1051a39Sopenharmony_ci if (!TEST_ptr(generator)) 103e1051a39Sopenharmony_ci goto done; 104e1051a39Sopenharmony_ci 105e1051a39Sopenharmony_ci if (!TEST_true(BN_hex2bn(&g_x, x_hex)) 106e1051a39Sopenharmony_ci || !TEST_true(BN_hex2bn(&g_y, y_hex)) 107e1051a39Sopenharmony_ci || !TEST_true(EC_POINT_set_affine_coordinates(group, generator, g_x, 108e1051a39Sopenharmony_ci g_y, NULL))) 109e1051a39Sopenharmony_ci goto done; 110e1051a39Sopenharmony_ci 111e1051a39Sopenharmony_ci if (!TEST_true(BN_hex2bn(&order, order_hex)) 112e1051a39Sopenharmony_ci || !TEST_true(BN_hex2bn(&cof, cof_hex)) 113e1051a39Sopenharmony_ci || !TEST_true(EC_GROUP_set_generator(group, generator, order, cof))) 114e1051a39Sopenharmony_ci goto done; 115e1051a39Sopenharmony_ci 116e1051a39Sopenharmony_ci ok = 1; 117e1051a39Sopenharmony_cidone: 118e1051a39Sopenharmony_ci BN_free(p); 119e1051a39Sopenharmony_ci BN_free(a); 120e1051a39Sopenharmony_ci BN_free(b); 121e1051a39Sopenharmony_ci BN_free(g_x); 122e1051a39Sopenharmony_ci BN_free(g_y); 123e1051a39Sopenharmony_ci EC_POINT_free(generator); 124e1051a39Sopenharmony_ci BN_free(order); 125e1051a39Sopenharmony_ci BN_free(cof); 126e1051a39Sopenharmony_ci if (!ok) { 127e1051a39Sopenharmony_ci EC_GROUP_free(group); 128e1051a39Sopenharmony_ci group = NULL; 129e1051a39Sopenharmony_ci } 130e1051a39Sopenharmony_ci 131e1051a39Sopenharmony_ci return group; 132e1051a39Sopenharmony_ci} 133e1051a39Sopenharmony_ci 134e1051a39Sopenharmony_cistatic int test_sm2_crypt(const EC_GROUP *group, 135e1051a39Sopenharmony_ci const EVP_MD *digest, 136e1051a39Sopenharmony_ci const char *privkey_hex, 137e1051a39Sopenharmony_ci const char *message, 138e1051a39Sopenharmony_ci const char *k_hex, const char *ctext_hex) 139e1051a39Sopenharmony_ci{ 140e1051a39Sopenharmony_ci const size_t msg_len = strlen(message); 141e1051a39Sopenharmony_ci BIGNUM *priv = NULL; 142e1051a39Sopenharmony_ci EC_KEY *key = NULL; 143e1051a39Sopenharmony_ci EC_POINT *pt = NULL; 144e1051a39Sopenharmony_ci unsigned char *expected = OPENSSL_hexstr2buf(ctext_hex, NULL); 145e1051a39Sopenharmony_ci size_t ctext_len = 0; 146e1051a39Sopenharmony_ci size_t ptext_len = 0; 147e1051a39Sopenharmony_ci uint8_t *ctext = NULL; 148e1051a39Sopenharmony_ci uint8_t *recovered = NULL; 149e1051a39Sopenharmony_ci size_t recovered_len = msg_len; 150e1051a39Sopenharmony_ci int rc = 0; 151e1051a39Sopenharmony_ci 152e1051a39Sopenharmony_ci if (!TEST_ptr(expected) 153e1051a39Sopenharmony_ci || !TEST_true(BN_hex2bn(&priv, privkey_hex))) 154e1051a39Sopenharmony_ci goto done; 155e1051a39Sopenharmony_ci 156e1051a39Sopenharmony_ci key = EC_KEY_new(); 157e1051a39Sopenharmony_ci if (!TEST_ptr(key) 158e1051a39Sopenharmony_ci || !TEST_true(EC_KEY_set_group(key, group)) 159e1051a39Sopenharmony_ci || !TEST_true(EC_KEY_set_private_key(key, priv))) 160e1051a39Sopenharmony_ci goto done; 161e1051a39Sopenharmony_ci 162e1051a39Sopenharmony_ci pt = EC_POINT_new(group); 163e1051a39Sopenharmony_ci if (!TEST_ptr(pt) 164e1051a39Sopenharmony_ci || !TEST_true(EC_POINT_mul(group, pt, priv, NULL, NULL, NULL)) 165e1051a39Sopenharmony_ci || !TEST_true(EC_KEY_set_public_key(key, pt)) 166e1051a39Sopenharmony_ci || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, 167e1051a39Sopenharmony_ci &ctext_len))) 168e1051a39Sopenharmony_ci goto done; 169e1051a39Sopenharmony_ci 170e1051a39Sopenharmony_ci ctext = OPENSSL_zalloc(ctext_len); 171e1051a39Sopenharmony_ci if (!TEST_ptr(ctext)) 172e1051a39Sopenharmony_ci goto done; 173e1051a39Sopenharmony_ci 174e1051a39Sopenharmony_ci start_fake_rand(k_hex); 175e1051a39Sopenharmony_ci if (!TEST_true(ossl_sm2_encrypt(key, digest, 176e1051a39Sopenharmony_ci (const uint8_t *)message, msg_len, 177e1051a39Sopenharmony_ci ctext, &ctext_len))) { 178e1051a39Sopenharmony_ci restore_rand(); 179e1051a39Sopenharmony_ci goto done; 180e1051a39Sopenharmony_ci } 181e1051a39Sopenharmony_ci restore_rand(); 182e1051a39Sopenharmony_ci 183e1051a39Sopenharmony_ci if (!TEST_mem_eq(ctext, ctext_len, expected, ctext_len)) 184e1051a39Sopenharmony_ci goto done; 185e1051a39Sopenharmony_ci 186e1051a39Sopenharmony_ci if (!TEST_true(ossl_sm2_plaintext_size(ctext, ctext_len, &ptext_len)) 187e1051a39Sopenharmony_ci || !TEST_int_eq(ptext_len, msg_len)) 188e1051a39Sopenharmony_ci goto done; 189e1051a39Sopenharmony_ci 190e1051a39Sopenharmony_ci recovered = OPENSSL_zalloc(ptext_len); 191e1051a39Sopenharmony_ci if (!TEST_ptr(recovered) 192e1051a39Sopenharmony_ci || !TEST_true(ossl_sm2_decrypt(key, digest, ctext, ctext_len, 193e1051a39Sopenharmony_ci recovered, &recovered_len)) 194e1051a39Sopenharmony_ci || !TEST_int_eq(recovered_len, msg_len) 195e1051a39Sopenharmony_ci || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) 196e1051a39Sopenharmony_ci goto done; 197e1051a39Sopenharmony_ci 198e1051a39Sopenharmony_ci rc = 1; 199e1051a39Sopenharmony_ci done: 200e1051a39Sopenharmony_ci BN_free(priv); 201e1051a39Sopenharmony_ci EC_POINT_free(pt); 202e1051a39Sopenharmony_ci OPENSSL_free(ctext); 203e1051a39Sopenharmony_ci OPENSSL_free(recovered); 204e1051a39Sopenharmony_ci OPENSSL_free(expected); 205e1051a39Sopenharmony_ci EC_KEY_free(key); 206e1051a39Sopenharmony_ci return rc; 207e1051a39Sopenharmony_ci} 208e1051a39Sopenharmony_ci 209e1051a39Sopenharmony_cistatic int sm2_crypt_test(void) 210e1051a39Sopenharmony_ci{ 211e1051a39Sopenharmony_ci int testresult = 0; 212e1051a39Sopenharmony_ci EC_GROUP *gm_group = NULL; 213e1051a39Sopenharmony_ci EC_GROUP *test_group = 214e1051a39Sopenharmony_ci create_EC_group 215e1051a39Sopenharmony_ci ("8542D69E4C044F18E8B92435BF6FF7DE457283915C45517D722EDB8B08F1DFC3", 216e1051a39Sopenharmony_ci "787968B4FA32C3FD2417842E73BBFEFF2F3C848B6831D7E0EC65228B3937E498", 217e1051a39Sopenharmony_ci "63E4C6D3B23B0C849CF84241484BFE48F61D59A5B16BA06E6E12D1DA27C5249A", 218e1051a39Sopenharmony_ci "421DEBD61B62EAB6746434EBC3CC315E32220B3BADD50BDC4C4E6C147FEDD43D", 219e1051a39Sopenharmony_ci "0680512BCBB42C07D47349D2153B70C4E5D7FDFCBFA36EA1A85841B9E46E09A2", 220e1051a39Sopenharmony_ci "8542D69E4C044F18E8B92435BF6FF7DD297720630485628D5AE74EE7C32E79B7", 221e1051a39Sopenharmony_ci "1"); 222e1051a39Sopenharmony_ci 223e1051a39Sopenharmony_ci if (!TEST_ptr(test_group)) 224e1051a39Sopenharmony_ci goto done; 225e1051a39Sopenharmony_ci 226e1051a39Sopenharmony_ci if (!test_sm2_crypt( 227e1051a39Sopenharmony_ci test_group, 228e1051a39Sopenharmony_ci EVP_sm3(), 229e1051a39Sopenharmony_ci "1649AB77A00637BD5E2EFE283FBF353534AA7F7CB89463F208DDBC2920BB0DA0", 230e1051a39Sopenharmony_ci "encryption standard", 231e1051a39Sopenharmony_ci "004C62EEFD6ECFC2B95B92FD6C3D9575148AFA17425546D49018E5388D49DD7B4F" 232e1051a39Sopenharmony_ci "0092e8ff62146873c258557548500ab2df2a365e0609ab67640a1f6d57d7b17820" 233e1051a39Sopenharmony_ci "008349312695a3e1d2f46905f39a766487f2432e95d6be0cb009fe8c69fd8825a7", 234e1051a39Sopenharmony_ci "307B0220245C26FB68B1DDDDB12C4B6BF9F2B6D5FE60A383B0D18D1C4144ABF1" 235e1051a39Sopenharmony_ci "7F6252E7022076CB9264C2A7E88E52B19903FDC47378F605E36811F5C07423A2" 236e1051a39Sopenharmony_ci "4B84400F01B804209C3D7360C30156FAB7C80A0276712DA9D8094A634B766D3A" 237e1051a39Sopenharmony_ci "285E07480653426D0413650053A89B41C418B0C3AAD00D886C00286467")) 238e1051a39Sopenharmony_ci goto done; 239e1051a39Sopenharmony_ci 240e1051a39Sopenharmony_ci /* Same test as above except using SHA-256 instead of SM3 */ 241e1051a39Sopenharmony_ci if (!test_sm2_crypt( 242e1051a39Sopenharmony_ci test_group, 243e1051a39Sopenharmony_ci EVP_sha256(), 244e1051a39Sopenharmony_ci "1649AB77A00637BD5E2EFE283FBF353534AA7F7CB89463F208DDBC2920BB0DA0", 245e1051a39Sopenharmony_ci "encryption standard", 246e1051a39Sopenharmony_ci "004C62EEFD6ECFC2B95B92FD6C3D9575148AFA17425546D49018E5388D49DD7B4F" 247e1051a39Sopenharmony_ci "003da18008784352192d70f22c26c243174a447ba272fec64163dd4742bae8bc98" 248e1051a39Sopenharmony_ci "00df17605cf304e9dd1dfeb90c015e93b393a6f046792f790a6fa4228af67d9588", 249e1051a39Sopenharmony_ci "307B0220245C26FB68B1DDDDB12C4B6BF9F2B6D5FE60A383B0D18D1C4144ABF17F" 250e1051a39Sopenharmony_ci "6252E7022076CB9264C2A7E88E52B19903FDC47378F605E36811F5C07423A24B84" 251e1051a39Sopenharmony_ci "400F01B80420BE89139D07853100EFA763F60CBE30099EA3DF7F8F364F9D10A5E9" 252e1051a39Sopenharmony_ci "88E3C5AAFC0413229E6C9AEE2BB92CAD649FE2C035689785DA33")) 253e1051a39Sopenharmony_ci goto done; 254e1051a39Sopenharmony_ci 255e1051a39Sopenharmony_ci /* From Annex C in both GM/T0003.5-2012 and GB/T 32918.5-2016.*/ 256e1051a39Sopenharmony_ci gm_group = create_EC_group( 257e1051a39Sopenharmony_ci "fffffffeffffffffffffffffffffffffffffffff00000000ffffffffffffffff", 258e1051a39Sopenharmony_ci "fffffffeffffffffffffffffffffffffffffffff00000000fffffffffffffffc", 259e1051a39Sopenharmony_ci "28e9fa9e9d9f5e344d5a9e4bcf6509a7f39789f515ab8f92ddbcbd414d940e93", 260e1051a39Sopenharmony_ci "32c4ae2c1f1981195f9904466a39c9948fe30bbff2660be1715a4589334c74c7", 261e1051a39Sopenharmony_ci "bc3736a2f4f6779c59bdcee36b692153d0a9877cc62a474002df32e52139f0a0", 262e1051a39Sopenharmony_ci "fffffffeffffffffffffffffffffffff7203df6b21c6052b53bbf40939d54123", 263e1051a39Sopenharmony_ci "1"); 264e1051a39Sopenharmony_ci 265e1051a39Sopenharmony_ci if (!TEST_ptr(gm_group)) 266e1051a39Sopenharmony_ci goto done; 267e1051a39Sopenharmony_ci 268e1051a39Sopenharmony_ci if (!test_sm2_crypt( 269e1051a39Sopenharmony_ci gm_group, 270e1051a39Sopenharmony_ci EVP_sm3(), 271e1051a39Sopenharmony_ci /* privkey (from which the encrypting public key is derived) */ 272e1051a39Sopenharmony_ci "3945208F7B2144B13F36E38AC6D39F95889393692860B51A42FB81EF4DF7C5B8", 273e1051a39Sopenharmony_ci /* plaintext message */ 274e1051a39Sopenharmony_ci "encryption standard", 275e1051a39Sopenharmony_ci /* ephemeral nonce k */ 276e1051a39Sopenharmony_ci "59276E27D506861A16680F3AD9C02DCCEF3CC1FA3CDBE4CE6D54B80DEAC1BC21", 277e1051a39Sopenharmony_ci /* 278e1051a39Sopenharmony_ci * expected ciphertext, the field values are from GM/T 0003.5-2012 279e1051a39Sopenharmony_ci * (Annex C), but serialized following the ASN.1 format specified 280e1051a39Sopenharmony_ci * in GM/T 0009-2012 (Sec. 7.2). 281e1051a39Sopenharmony_ci */ 282e1051a39Sopenharmony_ci "307C" /* SEQUENCE, 0x7c bytes */ 283e1051a39Sopenharmony_ci "0220" /* INTEGER, 0x20 bytes */ 284e1051a39Sopenharmony_ci "04EBFC718E8D1798620432268E77FEB6415E2EDE0E073C0F4F640ECD2E149A73" 285e1051a39Sopenharmony_ci "0221" /* INTEGER, 0x21 bytes */ 286e1051a39Sopenharmony_ci "00" /* leading 00 due to DER for pos. int with topmost bit set */ 287e1051a39Sopenharmony_ci "E858F9D81E5430A57B36DAAB8F950A3C64E6EE6A63094D99283AFF767E124DF0" 288e1051a39Sopenharmony_ci "0420" /* OCTET STRING, 0x20 bytes */ 289e1051a39Sopenharmony_ci "59983C18F809E262923C53AEC295D30383B54E39D609D160AFCB1908D0BD8766" 290e1051a39Sopenharmony_ci "0413" /* OCTET STRING, 0x13 bytes */ 291e1051a39Sopenharmony_ci "21886CA989CA9C7D58087307CA93092D651EFA")) 292e1051a39Sopenharmony_ci goto done; 293e1051a39Sopenharmony_ci 294e1051a39Sopenharmony_ci testresult = 1; 295e1051a39Sopenharmony_ci done: 296e1051a39Sopenharmony_ci EC_GROUP_free(test_group); 297e1051a39Sopenharmony_ci EC_GROUP_free(gm_group); 298e1051a39Sopenharmony_ci 299e1051a39Sopenharmony_ci return testresult; 300e1051a39Sopenharmony_ci} 301e1051a39Sopenharmony_ci 302e1051a39Sopenharmony_cistatic int test_sm2_sign(const EC_GROUP *group, 303e1051a39Sopenharmony_ci const char *userid, 304e1051a39Sopenharmony_ci const char *privkey_hex, 305e1051a39Sopenharmony_ci const char *message, 306e1051a39Sopenharmony_ci const char *k_hex, 307e1051a39Sopenharmony_ci const char *r_hex, 308e1051a39Sopenharmony_ci const char *s_hex) 309e1051a39Sopenharmony_ci{ 310e1051a39Sopenharmony_ci const size_t msg_len = strlen(message); 311e1051a39Sopenharmony_ci int ok = 0; 312e1051a39Sopenharmony_ci BIGNUM *priv = NULL; 313e1051a39Sopenharmony_ci EC_POINT *pt = NULL; 314e1051a39Sopenharmony_ci EC_KEY *key = NULL; 315e1051a39Sopenharmony_ci ECDSA_SIG *sig = NULL; 316e1051a39Sopenharmony_ci const BIGNUM *sig_r = NULL; 317e1051a39Sopenharmony_ci const BIGNUM *sig_s = NULL; 318e1051a39Sopenharmony_ci BIGNUM *r = NULL; 319e1051a39Sopenharmony_ci BIGNUM *s = NULL; 320e1051a39Sopenharmony_ci 321e1051a39Sopenharmony_ci if (!TEST_true(BN_hex2bn(&priv, privkey_hex))) 322e1051a39Sopenharmony_ci goto done; 323e1051a39Sopenharmony_ci 324e1051a39Sopenharmony_ci key = EC_KEY_new(); 325e1051a39Sopenharmony_ci if (!TEST_ptr(key) 326e1051a39Sopenharmony_ci || !TEST_true(EC_KEY_set_group(key, group)) 327e1051a39Sopenharmony_ci || !TEST_true(EC_KEY_set_private_key(key, priv))) 328e1051a39Sopenharmony_ci goto done; 329e1051a39Sopenharmony_ci 330e1051a39Sopenharmony_ci pt = EC_POINT_new(group); 331e1051a39Sopenharmony_ci if (!TEST_ptr(pt) 332e1051a39Sopenharmony_ci || !TEST_true(EC_POINT_mul(group, pt, priv, NULL, NULL, NULL)) 333e1051a39Sopenharmony_ci || !TEST_true(EC_KEY_set_public_key(key, pt))) 334e1051a39Sopenharmony_ci goto done; 335e1051a39Sopenharmony_ci 336e1051a39Sopenharmony_ci start_fake_rand(k_hex); 337e1051a39Sopenharmony_ci sig = ossl_sm2_do_sign(key, EVP_sm3(), (const uint8_t *)userid, 338e1051a39Sopenharmony_ci strlen(userid), (const uint8_t *)message, msg_len); 339e1051a39Sopenharmony_ci if (!TEST_ptr(sig)) { 340e1051a39Sopenharmony_ci restore_rand(); 341e1051a39Sopenharmony_ci goto done; 342e1051a39Sopenharmony_ci } 343e1051a39Sopenharmony_ci restore_rand(); 344e1051a39Sopenharmony_ci 345e1051a39Sopenharmony_ci ECDSA_SIG_get0(sig, &sig_r, &sig_s); 346e1051a39Sopenharmony_ci 347e1051a39Sopenharmony_ci if (!TEST_true(BN_hex2bn(&r, r_hex)) 348e1051a39Sopenharmony_ci || !TEST_true(BN_hex2bn(&s, s_hex)) 349e1051a39Sopenharmony_ci || !TEST_BN_eq(r, sig_r) 350e1051a39Sopenharmony_ci || !TEST_BN_eq(s, sig_s)) 351e1051a39Sopenharmony_ci goto done; 352e1051a39Sopenharmony_ci 353e1051a39Sopenharmony_ci ok = ossl_sm2_do_verify(key, EVP_sm3(), sig, (const uint8_t *)userid, 354e1051a39Sopenharmony_ci strlen(userid), (const uint8_t *)message, msg_len); 355e1051a39Sopenharmony_ci 356e1051a39Sopenharmony_ci /* We goto done whether this passes or fails */ 357e1051a39Sopenharmony_ci TEST_true(ok); 358e1051a39Sopenharmony_ci 359e1051a39Sopenharmony_ci done: 360e1051a39Sopenharmony_ci ECDSA_SIG_free(sig); 361e1051a39Sopenharmony_ci EC_POINT_free(pt); 362e1051a39Sopenharmony_ci EC_KEY_free(key); 363e1051a39Sopenharmony_ci BN_free(priv); 364e1051a39Sopenharmony_ci BN_free(r); 365e1051a39Sopenharmony_ci BN_free(s); 366e1051a39Sopenharmony_ci 367e1051a39Sopenharmony_ci return ok; 368e1051a39Sopenharmony_ci} 369e1051a39Sopenharmony_ci 370e1051a39Sopenharmony_cistatic int sm2_sig_test(void) 371e1051a39Sopenharmony_ci{ 372e1051a39Sopenharmony_ci int testresult = 0; 373e1051a39Sopenharmony_ci /* From draft-shen-sm2-ecdsa-02 */ 374e1051a39Sopenharmony_ci EC_GROUP *test_group = 375e1051a39Sopenharmony_ci create_EC_group 376e1051a39Sopenharmony_ci ("8542D69E4C044F18E8B92435BF6FF7DE457283915C45517D722EDB8B08F1DFC3", 377e1051a39Sopenharmony_ci "787968B4FA32C3FD2417842E73BBFEFF2F3C848B6831D7E0EC65228B3937E498", 378e1051a39Sopenharmony_ci "63E4C6D3B23B0C849CF84241484BFE48F61D59A5B16BA06E6E12D1DA27C5249A", 379e1051a39Sopenharmony_ci "421DEBD61B62EAB6746434EBC3CC315E32220B3BADD50BDC4C4E6C147FEDD43D", 380e1051a39Sopenharmony_ci "0680512BCBB42C07D47349D2153B70C4E5D7FDFCBFA36EA1A85841B9E46E09A2", 381e1051a39Sopenharmony_ci "8542D69E4C044F18E8B92435BF6FF7DD297720630485628D5AE74EE7C32E79B7", 382e1051a39Sopenharmony_ci "1"); 383e1051a39Sopenharmony_ci 384e1051a39Sopenharmony_ci if (!TEST_ptr(test_group)) 385e1051a39Sopenharmony_ci goto done; 386e1051a39Sopenharmony_ci 387e1051a39Sopenharmony_ci if (!TEST_true(test_sm2_sign( 388e1051a39Sopenharmony_ci test_group, 389e1051a39Sopenharmony_ci "ALICE123@YAHOO.COM", 390e1051a39Sopenharmony_ci "128B2FA8BD433C6C068C8D803DFF79792A519A55171B1B650C23661D15897263", 391e1051a39Sopenharmony_ci "message digest", 392e1051a39Sopenharmony_ci "006CB28D99385C175C94F94E934817663FC176D925DD72B727260DBAAE1FB2F96F" 393e1051a39Sopenharmony_ci "007c47811054c6f99613a578eb8453706ccb96384fe7df5c171671e760bfa8be3a", 394e1051a39Sopenharmony_ci "40F1EC59F793D9F49E09DCEF49130D4194F79FB1EED2CAA55BACDB49C4E755D1", 395e1051a39Sopenharmony_ci "6FC6DAC32C5D5CF10C77DFB20F7C2EB667A457872FB09EC56327A67EC7DEEBE7"))) 396e1051a39Sopenharmony_ci goto done; 397e1051a39Sopenharmony_ci 398e1051a39Sopenharmony_ci testresult = 1; 399e1051a39Sopenharmony_ci 400e1051a39Sopenharmony_ci done: 401e1051a39Sopenharmony_ci EC_GROUP_free(test_group); 402e1051a39Sopenharmony_ci 403e1051a39Sopenharmony_ci return testresult; 404e1051a39Sopenharmony_ci} 405e1051a39Sopenharmony_ci 406e1051a39Sopenharmony_ci#endif 407e1051a39Sopenharmony_ci 408e1051a39Sopenharmony_ciint setup_tests(void) 409e1051a39Sopenharmony_ci{ 410e1051a39Sopenharmony_ci#ifdef OPENSSL_NO_SM2 411e1051a39Sopenharmony_ci TEST_note("SM2 is disabled."); 412e1051a39Sopenharmony_ci#else 413e1051a39Sopenharmony_ci fake_rand = fake_rand_start(NULL); 414e1051a39Sopenharmony_ci if (fake_rand == NULL) 415e1051a39Sopenharmony_ci return 0; 416e1051a39Sopenharmony_ci 417e1051a39Sopenharmony_ci ADD_TEST(sm2_crypt_test); 418e1051a39Sopenharmony_ci ADD_TEST(sm2_sig_test); 419e1051a39Sopenharmony_ci#endif 420e1051a39Sopenharmony_ci return 1; 421e1051a39Sopenharmony_ci} 422e1051a39Sopenharmony_ci 423e1051a39Sopenharmony_civoid cleanup_tests(void) 424e1051a39Sopenharmony_ci{ 425e1051a39Sopenharmony_ci#ifndef OPENSSL_NO_SM2 426e1051a39Sopenharmony_ci fake_rand_finish(fake_rand); 427e1051a39Sopenharmony_ci#endif 428e1051a39Sopenharmony_ci} 429