1889 lines
70 KiB
C++
1889 lines
70 KiB
C++
// Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project.
|
|
// Copyright (c) 2015 The OpenSSL Project. All rights reserved.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
#include <openssl/curve25519.h>
|
|
#include <openssl/ec_key.h>
|
|
#include <openssl/evp.h>
|
|
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "../fipsmodule/evp/internal.h"
|
|
#include "internal.h"
|
|
|
|
OPENSSL_MSVC_PRAGMA(warning(push))
|
|
OPENSSL_MSVC_PRAGMA(warning(disable: 4702))
|
|
|
|
#include <map>
|
|
#include <string>
|
|
#include <utility>
|
|
#include <vector>
|
|
|
|
OPENSSL_MSVC_PRAGMA(warning(pop))
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
#include <openssl/bn.h>
|
|
#include <openssl/bytestring.h>
|
|
#include <openssl/crypto.h>
|
|
#include <openssl/digest.h>
|
|
#include <openssl/dh.h>
|
|
#include <openssl/dsa.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/rsa.h>
|
|
|
|
#include "../test/file_test.h"
|
|
#include "../test/test_util.h"
|
|
#include "../test/wycheproof_util.h"
|
|
|
|
|
|
// evp_test dispatches between multiple test types. PrivateKey tests take a key
|
|
// name parameter and single block, decode it as a PEM private key, and save it
|
|
// under that key name. Decrypt, Sign, and Verify tests take a previously
|
|
// imported key name as parameter and test their respective operations.
|
|
|
|
static const EVP_MD *GetDigest(FileTest *t, const std::string &name) {
|
|
if (name == "MD5") {
|
|
return EVP_md5();
|
|
} else if (name == "SHA1") {
|
|
return EVP_sha1();
|
|
} else if (name == "SHA224") {
|
|
return EVP_sha224();
|
|
} else if (name == "SHA256") {
|
|
return EVP_sha256();
|
|
} else if (name == "SHA384") {
|
|
return EVP_sha384();
|
|
} else if (name == "SHA512") {
|
|
return EVP_sha512();
|
|
} else if (name == "SHA512/224") {
|
|
return EVP_sha512_224();
|
|
} else if (name == "SHA512/256") {
|
|
return EVP_sha512_256();
|
|
} else if (name == "SHA3-224") {
|
|
return EVP_sha3_224();
|
|
} else if (name == "SHA3-256") {
|
|
return EVP_sha3_256();
|
|
} else if (name == "SHA3-384") {
|
|
return EVP_sha3_384();
|
|
} else if (name == "SHA3-512") {
|
|
return EVP_sha3_512();
|
|
} else if (name == "SHAKE128") {
|
|
return EVP_shake128();
|
|
} else if (name == "SHAKE256") {
|
|
return EVP_shake256();
|
|
}
|
|
ADD_FAILURE() << "Unknown digest: " << name;
|
|
return nullptr;
|
|
}
|
|
|
|
static int GetKeyType(FileTest *t, const std::string &name) {
|
|
if (name == "RSA") {
|
|
return EVP_PKEY_RSA;
|
|
}
|
|
if (name == "EC") {
|
|
return EVP_PKEY_EC;
|
|
}
|
|
if (name == "DSA") {
|
|
return EVP_PKEY_DSA;
|
|
}
|
|
if (name == "Ed25519") {
|
|
return EVP_PKEY_ED25519;
|
|
}
|
|
if (name == "X25519") {
|
|
return EVP_PKEY_X25519;
|
|
}
|
|
ADD_FAILURE() << "Unknown key type: " << name;
|
|
return EVP_PKEY_NONE;
|
|
}
|
|
|
|
static bool GetRSAPadding(FileTest *t, int *out, const std::string &name) {
|
|
if (name == "PKCS1") {
|
|
*out = RSA_PKCS1_PADDING;
|
|
return true;
|
|
}
|
|
if (name == "PSS") {
|
|
*out = RSA_PKCS1_PSS_PADDING;
|
|
return true;
|
|
}
|
|
if (name == "OAEP") {
|
|
*out = RSA_PKCS1_OAEP_PADDING;
|
|
return true;
|
|
}
|
|
if (name == "None") {
|
|
*out = RSA_NO_PADDING;
|
|
return true;
|
|
}
|
|
ADD_FAILURE() << "Unknown RSA padding mode: " << name;
|
|
return false;
|
|
}
|
|
|
|
using KeyMap = std::map<std::string, bssl::UniquePtr<EVP_PKEY>>;
|
|
|
|
static bool ImportKey(FileTest *t, KeyMap *key_map,
|
|
EVP_PKEY *(*parse_func)(CBS *cbs),
|
|
int (*marshal_func)(CBB *cbb, const EVP_PKEY *key)) {
|
|
std::vector<uint8_t> input;
|
|
if (!t->GetBytes(&input, "Input")) {
|
|
return false;
|
|
}
|
|
|
|
CBS cbs;
|
|
CBS_init(&cbs, input.data(), input.size());
|
|
bssl::UniquePtr<EVP_PKEY> pkey(parse_func(&cbs));
|
|
if (!pkey) {
|
|
return false;
|
|
}
|
|
|
|
std::string key_type;
|
|
if (!t->GetAttribute(&key_type, "Type")) {
|
|
return false;
|
|
}
|
|
EXPECT_EQ(GetKeyType(t, key_type), EVP_PKEY_id(pkey.get()));
|
|
|
|
if (EVP_PKEY_id(pkey.get()) == EVP_PKEY_EC) {
|
|
EC_KEY *ec_key = EVP_PKEY_get0_EC_KEY(pkey.get());
|
|
OPENSSL_BEGIN_ALLOW_DEPRECATED
|
|
if (t->HasAttribute("ExpectFromExplicitParams")) {
|
|
EXPECT_EQ(1, EC_KEY_decoded_from_explicit_params(ec_key));
|
|
} else {
|
|
EXPECT_EQ(0, EC_KEY_decoded_from_explicit_params(ec_key));
|
|
}
|
|
OPENSSL_END_ALLOW_DEPRECATED
|
|
}
|
|
|
|
// The key must re-encode correctly.
|
|
bssl::ScopedCBB cbb;
|
|
uint8_t *der;
|
|
size_t der_len;
|
|
if (!CBB_init(cbb.get(), 0) ||
|
|
!marshal_func(cbb.get(), pkey.get()) ||
|
|
!CBB_finish(cbb.get(), &der, &der_len)) {
|
|
return false;
|
|
}
|
|
bssl::UniquePtr<uint8_t> free_der(der);
|
|
|
|
std::vector<uint8_t> output = input;
|
|
if (t->HasAttribute("Output") &&
|
|
!t->GetBytes(&output, "Output")) {
|
|
return false;
|
|
}
|
|
EXPECT_EQ(Bytes(output), Bytes(der, der_len))
|
|
<< "Re-encoding the key did not match.";
|
|
|
|
if (t->HasAttribute("ExpectNoRawPrivate")) {
|
|
size_t len;
|
|
EXPECT_FALSE(EVP_PKEY_get_raw_private_key(pkey.get(), nullptr, &len));
|
|
} else if (t->HasAttribute("ExpectRawPrivate")) {
|
|
std::vector<uint8_t> expected;
|
|
if (!t->GetBytes(&expected, "ExpectRawPrivate")) {
|
|
return false;
|
|
}
|
|
|
|
std::vector<uint8_t> raw;
|
|
size_t len;
|
|
if (!EVP_PKEY_get_raw_private_key(pkey.get(), nullptr, &len)) {
|
|
return false;
|
|
}
|
|
raw.resize(len);
|
|
if (!EVP_PKEY_get_raw_private_key(pkey.get(), raw.data(), &len)) {
|
|
return false;
|
|
}
|
|
raw.resize(len);
|
|
EXPECT_EQ(Bytes(raw), Bytes(expected));
|
|
|
|
// Short buffers should be rejected.
|
|
raw.resize(len - 1);
|
|
len = raw.size();
|
|
EXPECT_FALSE(EVP_PKEY_get_raw_private_key(pkey.get(), raw.data(), &len));
|
|
}
|
|
|
|
if (t->HasAttribute("ExpectNoRawPublic")) {
|
|
size_t len;
|
|
EXPECT_FALSE(EVP_PKEY_get_raw_public_key(pkey.get(), nullptr, &len));
|
|
} else if (t->HasAttribute("ExpectRawPublic")) {
|
|
std::vector<uint8_t> expected;
|
|
if (!t->GetBytes(&expected, "ExpectRawPublic")) {
|
|
return false;
|
|
}
|
|
|
|
std::vector<uint8_t> raw;
|
|
size_t len;
|
|
if (!EVP_PKEY_get_raw_public_key(pkey.get(), nullptr, &len)) {
|
|
return false;
|
|
}
|
|
raw.resize(len);
|
|
if (!EVP_PKEY_get_raw_public_key(pkey.get(), raw.data(), &len)) {
|
|
return false;
|
|
}
|
|
raw.resize(len);
|
|
EXPECT_EQ(Bytes(raw), Bytes(expected));
|
|
|
|
// Short buffers should be rejected.
|
|
raw.resize(len - 1);
|
|
len = raw.size();
|
|
EXPECT_FALSE(EVP_PKEY_get_raw_public_key(pkey.get(), raw.data(), &len));
|
|
}
|
|
|
|
// Save the key for future tests.
|
|
const std::string &key_name = t->GetParameter();
|
|
EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name;
|
|
(*key_map)[key_name] = std::move(pkey);
|
|
return true;
|
|
}
|
|
|
|
static bool GetOptionalBignum(FileTest *t, bssl::UniquePtr<BIGNUM> *out,
|
|
const std::string &key) {
|
|
if (!t->HasAttribute(key)) {
|
|
*out = nullptr;
|
|
return true;
|
|
}
|
|
|
|
std::vector<uint8_t> bytes;
|
|
if (!t->GetBytes(&bytes, key)) {
|
|
return false;
|
|
}
|
|
|
|
out->reset(BN_bin2bn(bytes.data(), bytes.size(), nullptr));
|
|
return *out != nullptr;
|
|
}
|
|
|
|
static bool ImportDHKey(FileTest *t, KeyMap *key_map) {
|
|
bssl::UniquePtr<BIGNUM> p, q, g, pub_key, priv_key;
|
|
if (!GetOptionalBignum(t, &p, "P") || //
|
|
!GetOptionalBignum(t, &q, "Q") || //
|
|
!GetOptionalBignum(t, &g, "G") ||
|
|
!GetOptionalBignum(t, &pub_key, "Public") ||
|
|
!GetOptionalBignum(t, &priv_key, "Private")) {
|
|
return false;
|
|
}
|
|
|
|
bssl::UniquePtr<DH> dh(DH_new());
|
|
if (dh == nullptr || !DH_set0_pqg(dh.get(), p.get(), q.get(), g.get())) {
|
|
return false;
|
|
}
|
|
// |DH_set0_pqg| takes ownership on success.
|
|
p.release();
|
|
q.release();
|
|
g.release();
|
|
|
|
if (!DH_set0_key(dh.get(), pub_key.get(), priv_key.get())) {
|
|
return false;
|
|
}
|
|
// |DH_set0_key| takes ownership on success.
|
|
pub_key.release();
|
|
priv_key.release();
|
|
|
|
bssl::UniquePtr<EVP_PKEY> pkey(EVP_PKEY_new());
|
|
if (pkey == nullptr || !EVP_PKEY_set1_DH(pkey.get(), dh.get())) {
|
|
return false;
|
|
}
|
|
|
|
// Save the key for future tests.
|
|
const std::string &key_name = t->GetParameter();
|
|
EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name;
|
|
(*key_map)[key_name] = std::move(pkey);
|
|
return true;
|
|
}
|
|
|
|
// SetupContext configures |ctx| based on attributes in |t|, with the exception
|
|
// of the signing digest which must be configured externally.
|
|
static bool SetupContext(FileTest *t, KeyMap *key_map, EVP_PKEY_CTX *ctx) {
|
|
if (t->HasAttribute("RSAPadding")) {
|
|
int padding;
|
|
if (!GetRSAPadding(t, &padding, t->GetAttributeOrDie("RSAPadding")) ||
|
|
!EVP_PKEY_CTX_set_rsa_padding(ctx, padding)) {
|
|
return false;
|
|
}
|
|
}
|
|
if (t->HasAttribute("PSSSaltLength") &&
|
|
!EVP_PKEY_CTX_set_rsa_pss_saltlen(
|
|
ctx, atoi(t->GetAttributeOrDie("PSSSaltLength").c_str()))) {
|
|
return false;
|
|
}
|
|
if (t->HasAttribute("MGF1Digest")) {
|
|
const EVP_MD *digest = GetDigest(t, t->GetAttributeOrDie("MGF1Digest"));
|
|
if (digest == nullptr || !EVP_PKEY_CTX_set_rsa_mgf1_md(ctx, digest)) {
|
|
return false;
|
|
}
|
|
}
|
|
if (t->HasAttribute("OAEPDigest")) {
|
|
const EVP_MD *digest = GetDigest(t, t->GetAttributeOrDie("OAEPDigest"));
|
|
if (digest == nullptr || !EVP_PKEY_CTX_set_rsa_oaep_md(ctx, digest)) {
|
|
return false;
|
|
}
|
|
}
|
|
if (t->HasAttribute("OAEPLabel")) {
|
|
std::vector<uint8_t> label;
|
|
if (!t->GetBytes(&label, "OAEPLabel")) {
|
|
return false;
|
|
}
|
|
// For historical reasons, |EVP_PKEY_CTX_set0_rsa_oaep_label| expects to be
|
|
// take ownership of the input.
|
|
bssl::UniquePtr<uint8_t> buf(reinterpret_cast<uint8_t *>(
|
|
OPENSSL_memdup(label.data(), label.size())));
|
|
if (!buf ||
|
|
!EVP_PKEY_CTX_set0_rsa_oaep_label(ctx, buf.get(), label.size())) {
|
|
return false;
|
|
}
|
|
buf.release();
|
|
}
|
|
if (t->HasAttribute("DerivePeer")) {
|
|
std::string derive_peer = t->GetAttributeOrDie("DerivePeer");
|
|
if (key_map->count(derive_peer) == 0) {
|
|
ADD_FAILURE() << "Could not find key " << derive_peer;
|
|
return false;
|
|
}
|
|
EVP_PKEY *derive_peer_key = (*key_map)[derive_peer].get();
|
|
if (!EVP_PKEY_derive_set_peer(ctx, derive_peer_key)) {
|
|
return false;
|
|
}
|
|
}
|
|
if (t->HasAttribute("DiffieHellmanPad") && !EVP_PKEY_CTX_set_dh_pad(ctx, 1)) {
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
static bool TestDerive(FileTest *t, KeyMap *key_map, EVP_PKEY *key) {
|
|
bssl::UniquePtr<EVP_PKEY_CTX> ctx(EVP_PKEY_CTX_new(key, nullptr));
|
|
if (!ctx ||
|
|
!EVP_PKEY_derive_init(ctx.get()) ||
|
|
!SetupContext(t, key_map, ctx.get())) {
|
|
return false;
|
|
}
|
|
|
|
bssl::UniquePtr<EVP_PKEY_CTX> copy(EVP_PKEY_CTX_dup(ctx.get()));
|
|
if (!copy) {
|
|
return false;
|
|
}
|
|
|
|
for (EVP_PKEY_CTX *pctx : {ctx.get(), copy.get()}) {
|
|
size_t len;
|
|
std::vector<uint8_t> actual, output;
|
|
if (!EVP_PKEY_derive(pctx, nullptr, &len)) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
if (!EVP_PKEY_derive(pctx, actual.data(), &len)) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
|
|
// Defer looking up the attribute so Error works properly.
|
|
if (!t->GetBytes(&output, "Output")) {
|
|
return false;
|
|
}
|
|
EXPECT_EQ(Bytes(output), Bytes(actual));
|
|
|
|
// Test when the buffer is too large.
|
|
actual.resize(len + 1);
|
|
len = actual.size();
|
|
if (!EVP_PKEY_derive(pctx, actual.data(), &len)) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
EXPECT_EQ(Bytes(output), Bytes(actual));
|
|
|
|
// Test when the buffer is too small.
|
|
actual.resize(len - 1);
|
|
len = actual.size();
|
|
if (t->HasAttribute("SmallBufferTruncates")) {
|
|
if (!EVP_PKEY_derive(pctx, actual.data(), &len)) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
EXPECT_EQ(Bytes(output.data(), len), Bytes(actual));
|
|
} else {
|
|
EXPECT_FALSE(EVP_PKEY_derive(pctx, actual.data(), &len));
|
|
ERR_clear_error();
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
static int EVP_marshal_private_key_version_one(CBB *cbb, const EVP_PKEY *key) {
|
|
return EVP_marshal_private_key(cbb, key);
|
|
}
|
|
|
|
static int EVP_marshal_private_key_version_two(CBB *cbb, const EVP_PKEY *key) {
|
|
return EVP_marshal_private_key_v2(cbb, key);
|
|
}
|
|
|
|
static void VerifyEVPSignOut(std::string key_name, std::vector<uint8_t> input,
|
|
std::vector<uint8_t> actual, std::vector<uint8_t> output,
|
|
EVP_MD_CTX *ctx, size_t len) {
|
|
|
|
// Unless not compatible, verify EVP_DigestSign() with EVP_DigestVerify instead of comparing outputs
|
|
// This allows us to test the correctness of non-deterministic outputs (e.g. for ECDSA).
|
|
if (key_name.find("Ed25519") != std::string::npos) {
|
|
EXPECT_EQ(Bytes(output), Bytes(actual));
|
|
} else {
|
|
EXPECT_TRUE(!EVP_DigestVerify(ctx, actual.data(), len, input.data(), input.size()));
|
|
}
|
|
}
|
|
|
|
static bool TestEVP(FileTest *t, KeyMap *key_map) {
|
|
if (t->GetType() == "PrivateKey") {
|
|
int (*marshal_func)(CBB * cbb, const EVP_PKEY *key) =
|
|
EVP_marshal_private_key;
|
|
std::string version;
|
|
if (t->HasAttribute("PKCS8VersionOut") && t->GetAttribute(&version, "PKCS8VersionOut")) {
|
|
if (version == "1") {
|
|
marshal_func = EVP_marshal_private_key_version_one;
|
|
} else if (version == "2") {
|
|
marshal_func = EVP_marshal_private_key_version_two;
|
|
} else {
|
|
return false;
|
|
}
|
|
}
|
|
return ImportKey(t, key_map, EVP_parse_private_key, marshal_func);
|
|
}
|
|
|
|
if (t->GetType() == "PublicKey") {
|
|
return ImportKey(t, key_map, EVP_parse_public_key, EVP_marshal_public_key);
|
|
}
|
|
|
|
if (t->GetType() == "DHKey") {
|
|
return ImportDHKey(t, key_map);
|
|
}
|
|
|
|
// Load the key.
|
|
const std::string &key_name = t->GetParameter();
|
|
if (key_map->count(key_name) == 0) {
|
|
ADD_FAILURE() << "Could not find key " << key_name;
|
|
return false;
|
|
}
|
|
EVP_PKEY *key = (*key_map)[key_name].get();
|
|
|
|
int (*key_op_init)(EVP_PKEY_CTX *ctx) = nullptr;
|
|
int (*key_op)(EVP_PKEY_CTX *ctx, uint8_t *out, size_t *out_len,
|
|
const uint8_t *in, size_t in_len) = nullptr;
|
|
int (*md_op_init)(EVP_MD_CTX * ctx, EVP_PKEY_CTX * *pctx, const EVP_MD *type,
|
|
ENGINE *e, EVP_PKEY *pkey) = nullptr;
|
|
bool is_verify = false;
|
|
if (t->GetType() == "Decrypt") {
|
|
key_op_init = EVP_PKEY_decrypt_init;
|
|
key_op = EVP_PKEY_decrypt;
|
|
} else if (t->GetType() == "Sign") {
|
|
key_op_init = EVP_PKEY_sign_init;
|
|
key_op = EVP_PKEY_sign;
|
|
} else if (t->GetType() == "Verify") {
|
|
key_op_init = EVP_PKEY_verify_init;
|
|
is_verify = true;
|
|
} else if (t->GetType() == "SignMessage") {
|
|
md_op_init = EVP_DigestSignInit;
|
|
} else if (t->GetType() == "VerifyMessage") {
|
|
md_op_init = EVP_DigestVerifyInit;
|
|
is_verify = true;
|
|
} else if (t->GetType() == "Encrypt") {
|
|
key_op_init = EVP_PKEY_encrypt_init;
|
|
key_op = EVP_PKEY_encrypt;
|
|
} else if (t->GetType() == "Derive") {
|
|
return TestDerive(t, key_map, key);
|
|
} else {
|
|
ADD_FAILURE() << "Unknown test " << t->GetType();
|
|
return false;
|
|
}
|
|
|
|
const EVP_MD *digest = nullptr;
|
|
if (t->HasAttribute("Digest")) {
|
|
digest = GetDigest(t, t->GetAttributeOrDie("Digest"));
|
|
if (digest == nullptr) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// For verify tests, the "output" is the signature. Read it now so that, for
|
|
// tests which expect a failure in SetupContext, the attribute is still
|
|
// consumed.
|
|
std::vector<uint8_t> input, actual, output;
|
|
if (!t->GetBytes(&input, "Input") ||
|
|
(is_verify && !t->GetBytes(&output, "Output"))) {
|
|
return false;
|
|
}
|
|
|
|
if (md_op_init) {
|
|
bssl::ScopedEVP_MD_CTX ctx, copy;
|
|
EVP_PKEY_CTX *pctx;
|
|
if (!md_op_init(ctx.get(), &pctx, digest, nullptr, key) ||
|
|
!SetupContext(t, key_map, pctx) ||
|
|
!EVP_MD_CTX_copy_ex(copy.get(), ctx.get())) {
|
|
return false;
|
|
}
|
|
|
|
if (is_verify) {
|
|
return EVP_DigestVerify(ctx.get(), output.data(), output.size(),
|
|
input.data(), input.size()) &&
|
|
EVP_DigestVerify(copy.get(), output.data(), output.size(),
|
|
input.data(), input.size());
|
|
}
|
|
|
|
size_t len;
|
|
if (!EVP_DigestSign(ctx.get(), nullptr, &len, input.data(), input.size())) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
if (!EVP_DigestSign(ctx.get(), actual.data(), &len, input.data(),
|
|
input.size()) ||
|
|
!t->GetBytes(&output, "Output")) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
VerifyEVPSignOut(key_name, input, actual, output, ctx.get(), len);
|
|
|
|
// Repeat the test with |copy|, to check |EVP_MD_CTX_copy_ex| duplicated
|
|
// everything.
|
|
if (!EVP_DigestSign(copy.get(), nullptr, &len, input.data(),
|
|
input.size())) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
if (!EVP_DigestSign(copy.get(), actual.data(), &len, input.data(),
|
|
input.size()) ||
|
|
!t->GetBytes(&output, "Output")) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
VerifyEVPSignOut(key_name, std::move(input), std::move(actual),
|
|
std::move(output), ctx.get(), len);
|
|
return true;
|
|
}
|
|
|
|
bssl::UniquePtr<EVP_PKEY_CTX> ctx(EVP_PKEY_CTX_new(key, nullptr));
|
|
if (!ctx ||
|
|
!key_op_init(ctx.get()) ||
|
|
(digest != nullptr &&
|
|
!EVP_PKEY_CTX_set_signature_md(ctx.get(), digest)) ||
|
|
!SetupContext(t, key_map, ctx.get())) {
|
|
return false;
|
|
}
|
|
|
|
bssl::UniquePtr<EVP_PKEY_CTX> copy(EVP_PKEY_CTX_dup(ctx.get()));
|
|
if (!copy) {
|
|
return false;
|
|
}
|
|
|
|
if (is_verify) {
|
|
return EVP_PKEY_verify(ctx.get(), output.data(), output.size(),
|
|
input.data(), input.size()) &&
|
|
EVP_PKEY_verify(copy.get(), output.data(), output.size(),
|
|
input.data(), input.size());
|
|
}
|
|
|
|
for (EVP_PKEY_CTX *pctx : {ctx.get(), copy.get()}) {
|
|
size_t len;
|
|
if (!key_op(pctx, nullptr, &len, input.data(), input.size())) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
if (!key_op(pctx, actual.data(), &len, input.data(), input.size())) {
|
|
return false;
|
|
}
|
|
|
|
if (t->HasAttribute("CheckDecrypt")) {
|
|
// Encryption is non-deterministic, so we check by decrypting.
|
|
size_t plaintext_len;
|
|
bssl::UniquePtr<EVP_PKEY_CTX> decrypt_ctx(EVP_PKEY_CTX_new(key, nullptr));
|
|
if (!decrypt_ctx ||
|
|
!EVP_PKEY_decrypt_init(decrypt_ctx.get()) ||
|
|
(digest != nullptr &&
|
|
!EVP_PKEY_CTX_set_signature_md(decrypt_ctx.get(), digest)) ||
|
|
!SetupContext(t, key_map, decrypt_ctx.get()) ||
|
|
!EVP_PKEY_decrypt(decrypt_ctx.get(), nullptr, &plaintext_len,
|
|
actual.data(), actual.size())) {
|
|
return false;
|
|
}
|
|
output.resize(plaintext_len);
|
|
if (!EVP_PKEY_decrypt(decrypt_ctx.get(), output.data(), &plaintext_len,
|
|
actual.data(), actual.size())) {
|
|
ADD_FAILURE() << "Could not decrypt result.";
|
|
return false;
|
|
}
|
|
output.resize(plaintext_len);
|
|
EXPECT_EQ(Bytes(input), Bytes(output)) << "Decrypted result mismatch.";
|
|
} else if (t->HasAttribute("CheckVerify")) {
|
|
// Some signature schemes are non-deterministic, so we check by verifying.
|
|
bssl::UniquePtr<EVP_PKEY_CTX> verify_ctx(EVP_PKEY_CTX_new(key, nullptr));
|
|
if (!verify_ctx ||
|
|
!EVP_PKEY_verify_init(verify_ctx.get()) ||
|
|
(digest != nullptr &&
|
|
!EVP_PKEY_CTX_set_signature_md(verify_ctx.get(), digest)) ||
|
|
!SetupContext(t, key_map, verify_ctx.get())) {
|
|
return false;
|
|
}
|
|
if (t->HasAttribute("VerifyPSSSaltLength")) {
|
|
if (!EVP_PKEY_CTX_set_rsa_pss_saltlen(
|
|
verify_ctx.get(),
|
|
atoi(t->GetAttributeOrDie("VerifyPSSSaltLength").c_str()))) {
|
|
return false;
|
|
}
|
|
}
|
|
EXPECT_TRUE(EVP_PKEY_verify(verify_ctx.get(), actual.data(),
|
|
actual.size(), input.data(), input.size()))
|
|
<< "Could not verify result.";
|
|
} else {
|
|
// By default, check by comparing the result against Output.
|
|
if (!t->GetBytes(&output, "Output")) {
|
|
return false;
|
|
}
|
|
actual.resize(len);
|
|
EXPECT_EQ(Bytes(output), Bytes(actual));
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
TEST(EVPTest, TestVectors) {
|
|
KeyMap key_map;
|
|
FileTestGTest("crypto/evp_extra/evp_tests.txt", [&](FileTest *t) {
|
|
bool result = TestEVP(t, &key_map);
|
|
if (t->HasAttribute("Error")) {
|
|
ASSERT_FALSE(result) << "Operation unexpectedly succeeded.";
|
|
uint32_t err = ERR_peek_error();
|
|
EXPECT_EQ(t->GetAttributeOrDie("Error"), ERR_reason_error_string(err));
|
|
} else if (!result) {
|
|
ADD_FAILURE() << "Operation unexpectedly failed.";
|
|
}
|
|
});
|
|
}
|
|
|
|
static void RunWycheproofVerifyTest(const char *path) {
|
|
SCOPED_TRACE(path);
|
|
FileTestGTest(path, [](FileTest *t) {
|
|
t->IgnoreAllUnusedInstructions();
|
|
|
|
std::vector<uint8_t> der;
|
|
// Try publicKeyDer first (Wycheproof v1), fall back to keyDer (Wycheproof v0)
|
|
if (t->HasInstruction("publicKeyDer")) {
|
|
ASSERT_TRUE(t->GetInstructionBytes(&der, "publicKeyDer"));
|
|
} else {
|
|
ASSERT_TRUE(t->GetInstructionBytes(&der, "keyDer"));
|
|
}
|
|
CBS cbs;
|
|
CBS_init(&cbs, der.data(), der.size());
|
|
bssl::UniquePtr<EVP_PKEY> key(EVP_parse_public_key(&cbs));
|
|
ASSERT_TRUE(key);
|
|
|
|
const EVP_MD *md = nullptr;
|
|
if (t->HasInstruction("sha")) {
|
|
md = GetWycheproofDigest(t, "sha", true);
|
|
ASSERT_TRUE(md);
|
|
}
|
|
|
|
bool is_pss = t->HasInstruction("mgf");
|
|
const EVP_MD *mgf1_md = nullptr;
|
|
int pss_salt_len = -1;
|
|
if (is_pss) {
|
|
ASSERT_EQ("MGF1", t->GetInstructionOrDie("mgf"));
|
|
mgf1_md = GetWycheproofDigest(t, "mgfSha", true);
|
|
|
|
std::string s_len;
|
|
ASSERT_TRUE(t->GetInstruction(&s_len, "sLen"));
|
|
pss_salt_len = atoi(s_len.c_str());
|
|
}
|
|
|
|
std::vector<uint8_t> msg;
|
|
ASSERT_TRUE(t->GetBytes(&msg, "msg"));
|
|
std::vector<uint8_t> sig;
|
|
ASSERT_TRUE(t->GetBytes(&sig, "sig"));
|
|
WycheproofResult result;
|
|
ASSERT_TRUE(GetWycheproofResult(t, &result));
|
|
|
|
if (EVP_PKEY_id(key.get()) == EVP_PKEY_DSA) {
|
|
// DSA is deprecated and is not usable via EVP.
|
|
DSA *dsa = EVP_PKEY_get0_DSA(key.get());
|
|
OPENSSL_BEGIN_ALLOW_DEPRECATED
|
|
ASSERT_EQ(dsa, EVP_PKEY_get0(key.get()));
|
|
OPENSSL_END_ALLOW_DEPRECATED
|
|
uint8_t digest[EVP_MAX_MD_SIZE];
|
|
unsigned digest_len;
|
|
ASSERT_TRUE(
|
|
EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, nullptr));
|
|
int valid;
|
|
bool sig_ok = DSA_check_signature(&valid, digest, digest_len, sig.data(),
|
|
sig.size(), dsa) &&
|
|
valid;
|
|
EXPECT_EQ(sig_ok, result.IsValid());
|
|
} else {
|
|
bssl::ScopedEVP_MD_CTX ctx;
|
|
EVP_PKEY_CTX *pctx;
|
|
ASSERT_TRUE(
|
|
EVP_DigestVerifyInit(ctx.get(), &pctx, md, nullptr, key.get()));
|
|
if (is_pss) {
|
|
ASSERT_TRUE(EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING));
|
|
ASSERT_TRUE(EVP_PKEY_CTX_set_rsa_mgf1_md(pctx, mgf1_md));
|
|
ASSERT_TRUE(EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx, pss_salt_len));
|
|
}
|
|
int ret = EVP_DigestVerify(ctx.get(), sig.data(), sig.size(), msg.data(),
|
|
msg.size());
|
|
// BoringSSL does not enforce policies on weak keys and leaves it to the
|
|
// caller.
|
|
EXPECT_EQ(ret,
|
|
result.IsValid({"SmallModulus", "SmallPublicKey", "WeakHash"})
|
|
? 1
|
|
: 0);
|
|
}
|
|
});
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/dsa_2048_224_sha224_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/dsa_2048_224_sha256_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/dsa_2048_256_sha256_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/dsa_3072_256_sha256_test.txt`.
|
|
TEST(EVPTest, WycheproofDSA) {
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/dsa_2048_224_sha224_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/dsa_2048_224_sha256_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/dsa_2048_256_sha256_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/dsa_3072_256_sha256_test.txt");
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp224r1_sha224_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp224r1_sha256_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp224r1_sha512_test.txt`.
|
|
TEST(EVPTest, WycheproofECDSAP224) {
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp224r1_sha224_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp224r1_sha256_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp224r1_sha512_test.txt");
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp256r1_sha256_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp256r1_sha512_test.txt`.
|
|
TEST(EVPTest, WycheproofECDSAP256) {
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp256r1_sha256_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp256r1_sha512_test.txt");
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp384r1_sha384_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp384r1_sha512_test.txt`.
|
|
TEST(EVPTest, WycheproofECDSAP384) {
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp384r1_sha384_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp384r1_sha512_test.txt");
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp521r1_sha512_test.txt`.
|
|
TEST(EVPTest, WycheproofECDSAP521) {
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp521r1_sha512_test.txt");
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp256k1_sha256_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/ecdsa_secp256k1_sha512_test.txt`.
|
|
TEST(EVPTest, WycheproofECDSAsecp256k1) {
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp256k1_sha256_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ecdsa_secp256k1_sha512_test.txt");
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/ed25519_test.txt`.
|
|
TEST(EVPTest, WycheproofEdDSA) {
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/ed25519_test.txt");
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_2048_sha224_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_2048_sha256_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_2048_sha384_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_2048_sha512_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_3072_sha256_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_3072_sha384_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_3072_sha512_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_4096_sha384_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_4096_sha512_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_8192_sha256_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_8192_sha384_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_signature_8192_sha512_test.txt`.
|
|
TEST(EVPTest, WycheproofRSAPKCS1) {
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_2048_sha224_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_2048_sha256_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_2048_sha384_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_2048_sha512_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_3072_sha256_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_3072_sha384_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_3072_sha512_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_4096_sha384_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_4096_sha512_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_8192_sha256_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_8192_sha384_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_signature_8192_sha512_test.txt");
|
|
// Note: rsa_signature_test.txt (377 tests) is not available in the new
|
|
// upstream. The specific test files above provide comprehensive coverage
|
|
// (2169 tests total across all key sizes and hash functions).
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_pkcs1_1024_sig_gen_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_pkcs1_1536_sig_gen_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_pkcs1_2048_sig_gen_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_pkcs1_3072_sig_gen_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_pkcs1_4096_sig_gen_test.txt`.
|
|
static void RunWycheproofRSAPKCS1SignTest(const char *path) {
|
|
FileTestGTest(path,
|
|
[](FileTest *t) {
|
|
t->IgnoreAllUnusedInstructions();
|
|
|
|
std::vector<uint8_t> pkcs8;
|
|
ASSERT_TRUE(t->GetInstructionBytes(&pkcs8, "privateKeyPkcs8"));
|
|
CBS cbs;
|
|
CBS_init(&cbs, pkcs8.data(), pkcs8.size());
|
|
bssl::UniquePtr<EVP_PKEY> key(EVP_parse_private_key(&cbs));
|
|
ASSERT_TRUE(key);
|
|
|
|
const EVP_MD *md = GetWycheproofDigest(t, "sha", true);
|
|
ASSERT_TRUE(md);
|
|
|
|
std::vector<uint8_t> msg, sig;
|
|
ASSERT_TRUE(t->GetBytes(&msg, "msg"));
|
|
ASSERT_TRUE(t->GetBytes(&sig, "sig"));
|
|
WycheproofResult result;
|
|
ASSERT_TRUE(GetWycheproofResult(t, &result));
|
|
|
|
bssl::ScopedEVP_MD_CTX ctx;
|
|
EVP_PKEY_CTX *pctx;
|
|
ASSERT_TRUE(
|
|
EVP_DigestSignInit(ctx.get(), &pctx, md, nullptr, key.get()));
|
|
std::vector<uint8_t> out(EVP_PKEY_size(key.get()));
|
|
size_t len = out.size();
|
|
int ret =
|
|
EVP_DigestSign(ctx.get(), out.data(), &len, msg.data(), msg.size());
|
|
// BoringSSL does not enforce policies on weak keys and leaves it to the
|
|
// caller.
|
|
bool is_valid =
|
|
result.IsValid({"SmallModulus", "SmallPublicKey", "WeakHash"});
|
|
EXPECT_EQ(ret, is_valid ? 1 : 0);
|
|
if (is_valid) {
|
|
out.resize(len);
|
|
EXPECT_EQ(Bytes(sig), Bytes(out));
|
|
}
|
|
});
|
|
}
|
|
|
|
TEST(EVPTest, WycheproofRSAPKCS1Sign) {
|
|
RunWycheproofRSAPKCS1SignTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_pkcs1_1024_sig_gen_test.txt");
|
|
RunWycheproofRSAPKCS1SignTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_pkcs1_1536_sig_gen_test.txt");
|
|
RunWycheproofRSAPKCS1SignTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_pkcs1_2048_sig_gen_test.txt");
|
|
RunWycheproofRSAPKCS1SignTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_pkcs1_3072_sig_gen_test.txt");
|
|
RunWycheproofRSAPKCS1SignTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_pkcs1_4096_sig_gen_test.txt");
|
|
// Note: rsa_sig_gen_misc_test.txt (158 tests with 1024-4096 bit keys) is
|
|
// not available in the new upstream. The new test files above provide
|
|
// equivalent coverage split by key size.
|
|
}
|
|
|
|
TEST(EVPTest, WycheproofRSAPSS) {
|
|
RunWycheproofVerifyTest(
|
|
"third_party/wycheproof_testvectors/rsa_pss_2048_sha1_mgf1_20_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/wycheproof_testvectors/rsa_pss_2048_sha256_mgf1_0_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_pss_2048_sha256_mgf1_32_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_pss_3072_sha256_mgf1_32_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_pss_4096_sha256_mgf1_32_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_pss_4096_sha512_mgf1_32_test.txt");
|
|
RunWycheproofVerifyTest(
|
|
"third_party/wycheproof_testvectors/rsa_pss_misc_test.txt");
|
|
}
|
|
|
|
static void RunWycheproofDecryptTest(
|
|
const char *path,
|
|
std::function<void(FileTest *, EVP_PKEY_CTX *)> setup_cb) {
|
|
FileTestGTest(path, [&](FileTest *t) {
|
|
t->IgnoreAllUnusedInstructions();
|
|
|
|
std::vector<uint8_t> pkcs8;
|
|
ASSERT_TRUE(t->GetInstructionBytes(&pkcs8, "privateKeyPkcs8"));
|
|
CBS cbs;
|
|
CBS_init(&cbs, pkcs8.data(), pkcs8.size());
|
|
bssl::UniquePtr<EVP_PKEY> key(EVP_parse_private_key(&cbs));
|
|
ASSERT_TRUE(key);
|
|
|
|
std::vector<uint8_t> ct, msg;
|
|
ASSERT_TRUE(t->GetBytes(&ct, "ct"));
|
|
ASSERT_TRUE(t->GetBytes(&msg, "msg"));
|
|
WycheproofResult result;
|
|
ASSERT_TRUE(GetWycheproofResult(t, &result));
|
|
|
|
bssl::UniquePtr<EVP_PKEY_CTX> ctx(EVP_PKEY_CTX_new(key.get(), nullptr));
|
|
ASSERT_TRUE(ctx);
|
|
ASSERT_TRUE(EVP_PKEY_decrypt_init(ctx.get()));
|
|
ASSERT_NO_FATAL_FAILURE(setup_cb(t, ctx.get()));
|
|
std::vector<uint8_t> out(EVP_PKEY_size(key.get()));
|
|
size_t len = out.size();
|
|
int ret =
|
|
EVP_PKEY_decrypt(ctx.get(), out.data(), &len, ct.data(), ct.size());
|
|
// BoringSSL does not enforce policies on weak keys and leaves it to the
|
|
// caller.
|
|
bool is_valid = result.IsValid({"SmallModulus"});
|
|
|
|
// AWS-LC enforces FIPS 800-56B Rev. 2 §7.1.2.1 which requires 1 < c < (n-1).
|
|
// But Wycheproof mistakenly marks some vectors with c values outside this range as valid.
|
|
if (is_valid) {
|
|
const RSA *rsa = EVP_PKEY_get0_RSA(key.get());
|
|
const BIGNUM *n = RSA_get0_n(rsa);
|
|
bssl::UniquePtr<BIGNUM> c(BN_bin2bn(ct.data(), ct.size(), nullptr));
|
|
bssl::UniquePtr<BIGNUM> n_minus_one(BN_dup(n));
|
|
ASSERT_TRUE(c && n_minus_one);
|
|
ASSERT_TRUE(BN_sub_word(n_minus_one.get(), 1));
|
|
if (BN_is_zero(c.get()) || BN_is_one(c.get()) ||
|
|
BN_cmp(c.get(), n_minus_one.get()) >= 0) {
|
|
is_valid = false;
|
|
}
|
|
}
|
|
|
|
EXPECT_EQ(ret, is_valid ? 1 : 0);
|
|
if (is_valid) {
|
|
out.resize(len);
|
|
EXPECT_EQ(Bytes(msg), Bytes(out));
|
|
}
|
|
});
|
|
}
|
|
|
|
static void RunWycheproofOAEPTest(const char *path) {
|
|
RunWycheproofDecryptTest(path, [](FileTest *t, EVP_PKEY_CTX *ctx) {
|
|
const EVP_MD *md = GetWycheproofDigest(t, "sha", true);
|
|
ASSERT_TRUE(md);
|
|
const EVP_MD *mgf1_md = GetWycheproofDigest(t, "mgfSha", true);
|
|
ASSERT_TRUE(mgf1_md);
|
|
std::vector<uint8_t> label;
|
|
ASSERT_TRUE(t->GetBytes(&label, "label"));
|
|
|
|
ASSERT_TRUE(EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_OAEP_PADDING));
|
|
ASSERT_TRUE(EVP_PKEY_CTX_set_rsa_oaep_md(ctx, md));
|
|
ASSERT_TRUE(EVP_PKEY_CTX_set_rsa_mgf1_md(ctx, mgf1_md));
|
|
bssl::UniquePtr<uint8_t> label_copy(
|
|
static_cast<uint8_t *>(OPENSSL_memdup(label.data(), label.size())));
|
|
ASSERT_TRUE(label_copy || label.empty());
|
|
ASSERT_TRUE(
|
|
EVP_PKEY_CTX_set0_rsa_oaep_label(ctx, label_copy.get(), label.size()));
|
|
// |EVP_PKEY_CTX_set0_rsa_oaep_label| takes ownership on success.
|
|
label_copy.release();
|
|
});
|
|
}
|
|
|
|
TEST(EVPTest, WycheproofRSAOAEP2048) {
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_2048_sha1_mgf1sha1_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_2048_sha224_mgf1sha1_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_2048_sha224_mgf1sha224_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_2048_sha256_mgf1sha1_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_2048_sha256_mgf1sha256_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_2048_sha384_mgf1sha1_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_2048_sha384_mgf1sha384_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_2048_sha512_mgf1sha1_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_2048_sha512_mgf1sha512_test.txt");
|
|
}
|
|
|
|
TEST(EVPTest, WycheproofRSAOAEP3072) {
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_3072_sha256_mgf1sha1_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_3072_sha256_mgf1sha256_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_3072_sha512_mgf1sha1_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_3072_sha512_mgf1sha512_test.txt");
|
|
}
|
|
|
|
TEST(EVPTest, WycheproofRSAOAEP4096) {
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_4096_sha256_mgf1sha1_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_4096_sha256_mgf1sha256_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_4096_sha512_mgf1sha1_test.txt");
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/"
|
|
"rsa_oaep_4096_sha512_mgf1sha512_test.txt");
|
|
}
|
|
|
|
TEST(EVPTest, WycheproofRSAOAEPMisc) {
|
|
RunWycheproofOAEPTest(
|
|
"third_party/wycheproof_testvectors/rsa_oaep_misc_test.txt");
|
|
}
|
|
|
|
static void RunWycheproofPKCS1DecryptTest(const char *path) {
|
|
RunWycheproofDecryptTest(path, [](FileTest *t, EVP_PKEY_CTX *ctx) {
|
|
// No setup needed. PKCS#1 is, sadly, the default.
|
|
});
|
|
}
|
|
|
|
//= third_party/vectors/vectors_spec.md#wycheproof
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_pkcs1_2048_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_pkcs1_3072_test.txt`.
|
|
//# AWS-LC MUST test against `testvectors_v1/rsa_pkcs1_4096_test.txt`.
|
|
TEST(EVPTest, WycheproofRSAPKCS1Decrypt) {
|
|
RunWycheproofPKCS1DecryptTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_pkcs1_2048_test.txt");
|
|
RunWycheproofPKCS1DecryptTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_pkcs1_3072_test.txt");
|
|
RunWycheproofPKCS1DecryptTest(
|
|
"third_party/vectors/converted/wycheproof/testvectors_v1/rsa_pkcs1_4096_test.txt");
|
|
}
|
|
|
|
struct ectlsencodedpoint_test_data {
|
|
const uint8_t *public_key;
|
|
size_t public_key_size;
|
|
const uint8_t *private_key;
|
|
size_t private_key_size;
|
|
const uint8_t *expected_shared_secret;
|
|
size_t expected_shared_secret_size;
|
|
int key_type;
|
|
int curve_nid;
|
|
};
|
|
|
|
static EVP_PKEY * instantiate_public_key(int key_type, int curve_nid) {
|
|
|
|
EVP_PKEY *pkey = NULL;
|
|
|
|
if (NID_X25519 == curve_nid) {
|
|
pkey = EVP_PKEY_new();
|
|
EXPECT_TRUE(pkey);
|
|
EXPECT_TRUE(EVP_PKEY_set_type(pkey, key_type));
|
|
}
|
|
else {
|
|
EC_KEY *ec_key = EC_KEY_new_by_curve_name(curve_nid);
|
|
EXPECT_TRUE(ec_key);
|
|
pkey = EVP_PKEY_new();
|
|
EXPECT_TRUE(pkey);
|
|
EXPECT_TRUE(EVP_PKEY_assign(pkey, EVP_PKEY_EC, (EC_KEY *) ec_key));
|
|
}
|
|
|
|
return pkey;
|
|
}
|
|
|
|
static EVP_PKEY * instantiate_and_set_public_key(const uint8_t *public_key,
|
|
size_t public_key_size, int curve_nid) {
|
|
|
|
EVP_PKEY *pkey = NULL;
|
|
|
|
if (NID_X25519 != curve_nid) {
|
|
EC_KEY *ec_key = EC_KEY_new_by_curve_name(curve_nid);
|
|
EXPECT_TRUE(ec_key);
|
|
const EC_GROUP *ec_key_group = EC_KEY_get0_group(ec_key);
|
|
EXPECT_TRUE(ec_key_group);
|
|
EC_POINT *ec_point = EC_POINT_new(ec_key_group);
|
|
EXPECT_TRUE(ec_point);
|
|
EXPECT_TRUE(EC_POINT_oct2point(ec_key_group, ec_point, public_key,
|
|
public_key_size, NULL));
|
|
EXPECT_TRUE(EC_KEY_set_public_key(ec_key, ec_point));
|
|
pkey = EVP_PKEY_new();
|
|
EXPECT_TRUE(pkey);
|
|
EXPECT_TRUE(EVP_PKEY_assign(pkey, EVP_PKEY_EC, (EC_KEY *) ec_key));
|
|
EC_POINT_free(ec_point);
|
|
}
|
|
|
|
return pkey;
|
|
}
|
|
|
|
static EVP_PKEY * instantiate_and_set_private_key(const uint8_t *private_key,
|
|
size_t private_key_size, int key_type, int curve_nid) {
|
|
|
|
EVP_PKEY *pkey = NULL;
|
|
OPENSSL_BEGIN_ALLOW_DEPRECATED
|
|
EXPECT_FALSE(EVP_PKEY_get0(pkey));
|
|
OPENSSL_END_ALLOW_DEPRECATED
|
|
|
|
if (NID_X25519 == curve_nid) {
|
|
pkey = EVP_PKEY_new_raw_private_key(curve_nid, nullptr, private_key,
|
|
private_key_size);
|
|
EXPECT_TRUE(pkey);
|
|
}
|
|
else {
|
|
EC_KEY *ec_key = EC_KEY_new_by_curve_name(curve_nid);
|
|
EXPECT_TRUE(ec_key);
|
|
BIGNUM *private_key_bn = BN_bin2bn(private_key, private_key_size, NULL);
|
|
EXPECT_TRUE(private_key_bn);
|
|
EXPECT_TRUE(EC_KEY_set_private_key(ec_key, private_key_bn));
|
|
BN_free(private_key_bn);
|
|
pkey = EVP_PKEY_new();
|
|
EXPECT_TRUE(pkey);
|
|
OPENSSL_BEGIN_ALLOW_DEPRECATED
|
|
EXPECT_FALSE(EVP_PKEY_get0(pkey));
|
|
EXPECT_TRUE(EVP_PKEY_assign(pkey, key_type, (EC_KEY *) ec_key));
|
|
EXPECT_EQ(ec_key, EVP_PKEY_get0(pkey));
|
|
OPENSSL_END_ALLOW_DEPRECATED
|
|
}
|
|
|
|
return pkey;
|
|
}
|
|
|
|
TEST(EVPTest, ECTLSEncodedPoint) {
|
|
|
|
// TLS wire-encoding format
|
|
// (https://tools.ietf.org/html/rfc8422#section-5.4)
|
|
// x25519: u-coordinate
|
|
// NIST curves: 0x04 || x-coordinate || y-coordinate
|
|
|
|
// Taken from https://tools.ietf.org/html/rfc7748#section-5.2
|
|
static const uint8_t kX25519PublicKey[] = {
|
|
0xe6, 0xdb, 0x68, 0x67, 0x58, 0x30, 0x30, 0xdb, 0x35, 0x94, 0xc1, 0xa4,
|
|
0x24, 0xb1, 0x5f, 0x7c, 0x72, 0x66, 0x24, 0xec, 0x26, 0xb3, 0x35, 0x3b,
|
|
0x10, 0xa9, 0x03, 0xa6, 0xd0, 0xab, 0x1c, 0x4c
|
|
};
|
|
static const uint8_t kX25519PrivateKey[] = {
|
|
0xa5, 0x46, 0xe3, 0x6b, 0xf0, 0x52, 0x7c, 0x9d, 0x3b, 0x16, 0x15, 0x4b,
|
|
0x82, 0x46, 0x5e, 0xdd, 0x62, 0x14, 0x4c, 0x0a, 0xc1, 0xfc, 0x5a, 0x18,
|
|
0x50, 0x6a, 0x22, 0x44, 0xba, 0x44, 0x9a, 0xc4
|
|
};
|
|
static const uint8_t kX25519ExpectedSharedSecret[] = {
|
|
0xc3, 0xda, 0x55, 0x37, 0x9d, 0xe9, 0xc6, 0x90, 0x8e, 0x94, 0xea, 0x4d,
|
|
0xf2, 0x8d, 0x08, 0x4f, 0x32, 0xec, 0xcf, 0x03, 0x49, 0x1c, 0x71, 0xf7,
|
|
0x54, 0xb4, 0x07, 0x55, 0x77, 0xa2, 0x85, 0x52
|
|
};
|
|
|
|
struct ectlsencodedpoint_test_data x25519_test_data = {
|
|
kX25519PublicKey, // public_key
|
|
X25519_PUBLIC_VALUE_LEN, // public_key_size
|
|
kX25519PrivateKey, // private_key
|
|
X25519_PRIVATE_KEY_LEN, // private_key_size
|
|
kX25519ExpectedSharedSecret, // expected_shared_secret
|
|
X25519_SHARED_KEY_LEN, // expected_shared_secret_size
|
|
EVP_PKEY_X25519, // key_type
|
|
NID_X25519 // curve_nid
|
|
};
|
|
|
|
// P-{224,256,384,521} test vectors, taken from CAVP
|
|
// (CAVP 20.1 - KASValidityTest_ECCStaticUnified_KDFConcat_NOKC)
|
|
// https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/key-management
|
|
|
|
static const uint8_t kP224PublicKey[] = {
|
|
/* uncompressed */
|
|
0x04,
|
|
/* x-coordinate */
|
|
0xd6, 0xf5, 0xf0, 0x6e, 0xf4, 0xc5, 0x56, 0x0a, 0xff, 0x8f, 0x49, 0x90,
|
|
0xef, 0xdb, 0xa5, 0x9a, 0xf8, 0xa8, 0xd3, 0x77, 0x0d, 0x80, 0x14, 0x6a,
|
|
0xc5, 0x82, 0x78, 0x85,
|
|
/* y-coordinate */
|
|
0xe0, 0x43, 0xae, 0x7b, 0xae, 0xa3, 0x77, 0x28, 0x60, 0x39, 0xc0, 0x7c,
|
|
0x04, 0x1b, 0x7a, 0x3b, 0x5d, 0x76, 0x96, 0xda, 0xdd, 0xa7, 0x05, 0x1a,
|
|
0xd6, 0x45, 0xa3, 0xea
|
|
};
|
|
static const uint8_t kP224PrivateKey[] = {
|
|
0xc7, 0x39, 0x45, 0x68, 0x8b, 0x3d, 0xbb, 0xc6, 0xc2, 0xe7, 0x54, 0x75,
|
|
0xdf, 0x61, 0xd1, 0x44, 0x9d, 0x05, 0xf9, 0x64, 0x49, 0x62, 0x92, 0x67,
|
|
0xf2, 0x19, 0x5d, 0xaf
|
|
};
|
|
static const uint8_t kP224ExpectedSharedSecret[] = {
|
|
0x50, 0x28, 0xd8, 0xa1, 0x62, 0xfe, 0xac, 0xbd, 0xfa, 0x5e, 0xca, 0x8c,
|
|
0xdf, 0x50, 0xcc, 0xb9, 0xe0, 0x7c, 0x6b, 0x7f, 0x96, 0xa8, 0xa8, 0x93,
|
|
0x24, 0xdd, 0xed, 0x7a
|
|
};
|
|
|
|
struct ectlsencodedpoint_test_data p224_test_data = {
|
|
kP224PublicKey, // public_key
|
|
(1 + 28 + 28), // public_key_size
|
|
kP224PrivateKey, // private_key
|
|
28, // private_key_size
|
|
kP224ExpectedSharedSecret, // expected_shared_secret
|
|
28, // expected_shared_secret_size
|
|
EVP_PKEY_EC, // key_type
|
|
NID_secp224r1 // curve_nid
|
|
};
|
|
|
|
static const uint8_t kP256PublicKey[] = {
|
|
/* uncompressed */
|
|
0x04,
|
|
/* x-coordinate */
|
|
0xe1, 0x5a, 0x44, 0x72, 0x91, 0xf0, 0x84, 0xfe, 0x88, 0x7a, 0x6c, 0x2c,
|
|
0x03, 0x22, 0x9a, 0xf3, 0x04, 0x8a, 0x5d, 0xfe, 0x84, 0x73, 0x70, 0xc9,
|
|
0x3f, 0x92, 0x72, 0x9b, 0x31, 0xc5, 0x5f, 0x7b,
|
|
/* y-coordinate */
|
|
0x36, 0xac, 0x98, 0x3e, 0x2d, 0x6f, 0xb9, 0x7a, 0x9e, 0x74, 0x09, 0x0d,
|
|
0x26, 0xf4, 0x83, 0x34, 0xce, 0x4f, 0x4b, 0x74, 0x9f, 0x3f, 0xd7, 0xaa,
|
|
0x92, 0xe2, 0xc5, 0x40, 0x23, 0x2c, 0xe1, 0xbd
|
|
};
|
|
static const uint8_t kP256PrivateKey[] = {
|
|
0x4c, 0xab, 0xbc, 0x3f, 0xad, 0x44, 0x43, 0xcd, 0xa1, 0x36, 0x46, 0x39,
|
|
0x1e, 0x08, 0xbd, 0xa9, 0xd5, 0x29, 0xe1, 0x03, 0x96, 0xc0, 0xcb, 0xd2,
|
|
0xde, 0x9c, 0x1c, 0x73, 0xaf, 0xaa, 0x32, 0x99
|
|
};
|
|
static const uint8_t kP256ExpectedSharedSecret[] = {
|
|
0x89, 0x00, 0x1b, 0x34, 0x36, 0xf7, 0xe6, 0x6b, 0x00, 0x8d, 0x68, 0xa6,
|
|
0xc4, 0x7e, 0x01, 0x82, 0x49, 0x49, 0x4b, 0x92, 0x33, 0x92, 0x1b, 0x80,
|
|
0x7a, 0x75, 0x49, 0xd3, 0xad, 0xe2, 0x01, 0xa2
|
|
};
|
|
|
|
struct ectlsencodedpoint_test_data p256_test_data = {
|
|
kP256PublicKey, // public_key
|
|
(1 + 32 + 32), // public_key_size
|
|
kP256PrivateKey, // private_key
|
|
32, // private_key_size
|
|
kP256ExpectedSharedSecret, // expected_shared_secret
|
|
32, // expected_shared_secret_size
|
|
EVP_PKEY_EC, // key_type
|
|
NID_X9_62_prime256v1 // curve_nid
|
|
};
|
|
|
|
static const uint8_t kP384PublicKey[] = {
|
|
/* uncompressed */
|
|
0x04,
|
|
/* x-coordinate */
|
|
0xe4, 0xe7, 0x0e, 0x43, 0xc6, 0xd0, 0x43, 0x46, 0xdd, 0xd7, 0x62, 0xa6,
|
|
0x14, 0x17, 0x6d, 0x22, 0x78, 0xb0, 0x47, 0xc5, 0xec, 0x28, 0x64, 0x84,
|
|
0x65, 0xf2, 0xa3, 0x90, 0xf6, 0xdd, 0x6b, 0xba, 0x54, 0xb9, 0x0b, 0x1e,
|
|
0x62, 0xb3, 0x91, 0x85, 0xf8, 0xf3, 0x95, 0xf6, 0x65, 0x73, 0x6d, 0x1d,
|
|
/* y-coordinate */
|
|
0xf9, 0x62, 0xa2, 0x73, 0x6a, 0xce, 0x52, 0x56, 0x18, 0x15, 0xd5, 0x99,
|
|
0x53, 0xa0, 0x19, 0x1b, 0x1f, 0xb1, 0xf2, 0x88, 0xa4, 0x5f, 0x8e, 0x28,
|
|
0x3d, 0x40, 0xa5, 0xff, 0x0e, 0x83, 0x3f, 0xf3, 0x0b, 0xd6, 0x05, 0xb1,
|
|
0x0c, 0xf8, 0xc2, 0x6c, 0x57, 0x4d, 0x4c, 0x2f, 0x0d, 0xcd, 0xce, 0x21
|
|
};
|
|
static const uint8_t kP384PrivateKey[] = {
|
|
0x08, 0x95, 0x0a, 0xc9, 0x2e, 0x16, 0xce, 0x9e, 0x50, 0xed, 0xe3, 0x65,
|
|
0x00, 0x3c, 0xb6, 0x2c, 0xea, 0x61, 0x03, 0xcf, 0xe5, 0x35, 0xfa, 0xb3,
|
|
0xdc, 0x6f, 0x01, 0x45, 0xf3, 0x8e, 0xf1, 0x1c, 0x10, 0x3e, 0xf1, 0x40,
|
|
0x79, 0x7e, 0x4f, 0x1e, 0x5f, 0x05, 0x3f, 0x8e, 0x83, 0x0c, 0xa7, 0xd9
|
|
};
|
|
static const uint8_t kP384ExpectedSharedSecret[] = {
|
|
0x4b, 0x3c, 0xda, 0x1c, 0xef, 0xb6, 0x8d, 0x0a, 0x2e, 0xf3, 0x53, 0x04,
|
|
0xa9, 0xb0, 0xca, 0x1d, 0x8c, 0xda, 0x8b, 0xdf, 0xc8, 0x01, 0x09, 0x8c,
|
|
0xf7, 0x3c, 0x21, 0x8e, 0x65, 0x67, 0x22, 0xc3, 0x64, 0x96, 0x9a, 0x2a,
|
|
0x1f, 0x57, 0xd1, 0x93, 0x03, 0x95, 0x98, 0x22, 0x7e, 0xf2, 0xb5, 0x18
|
|
};
|
|
|
|
struct ectlsencodedpoint_test_data p384_test_data = {
|
|
kP384PublicKey, // public_key
|
|
(1 + 48 + 48), // public_key_size
|
|
kP384PrivateKey, // private_key
|
|
48, // private_key_size
|
|
kP384ExpectedSharedSecret, // expected_shared_secret
|
|
48, // expected_shared_secret_size
|
|
EVP_PKEY_EC, // key_type
|
|
NID_secp384r1 // curve_nid
|
|
};
|
|
|
|
static const uint8_t kP521PublicKey[] = {
|
|
/* uncompressed */
|
|
0x04,
|
|
/* x-coordinate */
|
|
0x01, 0x03, 0x7e, 0x95, 0xff, 0x8e, 0x40, 0x31, 0xe0, 0xb0, 0x36, 0x1c,
|
|
0x58, 0xc0, 0x62, 0x61, 0x39, 0x56, 0xaa, 0x30, 0x77, 0x0c, 0xed, 0x17,
|
|
0x15, 0xed, 0x1b, 0x4d, 0x34, 0x29, 0x33, 0x0f, 0xac, 0x2f, 0xc5, 0xc9,
|
|
0x3a, 0x69, 0xf7, 0x98, 0x63, 0x3a, 0x15, 0x75, 0x5e, 0x2d, 0xb8, 0x65,
|
|
0x09, 0x87, 0xf5, 0x75, 0x85, 0xcd, 0xe3, 0x51, 0x6b, 0x6d, 0xd0, 0xfc,
|
|
0x9f, 0x5f, 0xb4, 0xf8, 0xe7, 0x7b,
|
|
/* y-coordinate */
|
|
0x01, 0x1b, 0xba, 0xcc, 0x17, 0x80, 0x56, 0x8b, 0x9b, 0x32, 0xd4, 0x82,
|
|
0x3f, 0x32, 0x9a, 0x46, 0xd8, 0x39, 0x39, 0xd1, 0x18, 0xcc, 0x97, 0x79,
|
|
0x8d, 0x5d, 0xfa, 0x08, 0xb4, 0x27, 0xd3, 0xae, 0xe4, 0x76, 0x4f, 0x46,
|
|
0x47, 0xf9, 0xf2, 0x4e, 0xcf, 0x0f, 0xee, 0x6d, 0x61, 0x9c, 0x79, 0x73,
|
|
0xa8, 0x55, 0x4a, 0xd5, 0x51, 0x13, 0x0d, 0x1e, 0x3f, 0x6c, 0x9d, 0x2e,
|
|
0xe3, 0xa2, 0xa8, 0x6f, 0xf5, 0xc3
|
|
};
|
|
static const uint8_t kP521PrivateKey[] = {
|
|
0x01, 0xab, 0x4b, 0x1a, 0x8b, 0x60, 0xbb, 0x40, 0x23, 0xd6, 0x55, 0x05,
|
|
0x0f, 0x0a, 0xd5, 0xd6, 0xe1, 0xbf, 0x5b, 0xc5, 0x23, 0x90, 0x2a, 0x2f,
|
|
0x59, 0x69, 0x3e, 0xd0, 0xb9, 0x4f, 0x3c, 0x61, 0x06, 0xde, 0xb5, 0x92,
|
|
0xe0, 0xf1, 0x74, 0xa7, 0x8b, 0xbd, 0xef, 0x23, 0xec, 0xeb, 0x23, 0xfc,
|
|
0x97, 0x4b, 0x1c, 0xf5, 0x6a, 0x37, 0x73, 0x66, 0x6a, 0xfc, 0x76, 0x6f,
|
|
0x3d, 0xdc, 0xb4, 0xc2, 0x92, 0xd0
|
|
};
|
|
static const uint8_t kP521ExpectedSharedSecret[] = {
|
|
0x01, 0x1e, 0x28, 0x45, 0xc3, 0x2d, 0x1e, 0x49, 0xfc, 0x6a, 0x0e, 0x3c,
|
|
0xc8, 0x05, 0xc0, 0x98, 0x45, 0x11, 0xb0, 0x7f, 0xf6, 0xea, 0x41, 0xe1,
|
|
0xe1, 0x12, 0xee, 0x9c, 0x40, 0x8c, 0x74, 0xc3, 0x53, 0x5c, 0x97, 0xf2,
|
|
0xf1, 0x8d, 0x62, 0xf4, 0x3d, 0x27, 0x21, 0x40, 0x7b, 0x82, 0x13, 0xd0,
|
|
0x0b, 0xd3, 0x58, 0x86, 0x6a, 0x33, 0xc6, 0x0c, 0x67, 0x51, 0xd2, 0xdc,
|
|
0x23, 0x50, 0x06, 0x15, 0xb2, 0xba
|
|
};
|
|
|
|
struct ectlsencodedpoint_test_data p521_test_data = {
|
|
kP521PublicKey, // public_key
|
|
(1 + 66 + 66), // public_key_size
|
|
kP521PrivateKey, // private_key
|
|
66, // private_key_size
|
|
kP521ExpectedSharedSecret, // expected_shared_secret
|
|
66, // expected_shared_secret_size
|
|
EVP_PKEY_EC, // key_type
|
|
NID_secp521r1 // curve_nid
|
|
};
|
|
|
|
ectlsencodedpoint_test_data test_data_all[] = {x25519_test_data,
|
|
p224_test_data, p256_test_data, p384_test_data, p521_test_data};
|
|
|
|
uint8_t *output = nullptr;
|
|
uint8_t *shared_secret = nullptr;
|
|
EVP_PKEY_CTX *pkey_ctx = nullptr;
|
|
EVP_PKEY *pkey_public = nullptr;
|
|
EVP_PKEY *pkey_private = nullptr;
|
|
|
|
for (ectlsencodedpoint_test_data test_data : test_data_all) {
|
|
size_t output_size = 0;
|
|
size_t shared_secret_size = 0;
|
|
|
|
pkey_private = instantiate_and_set_private_key(test_data.private_key,
|
|
test_data.private_key_size, test_data.key_type, test_data.curve_nid);
|
|
ASSERT_TRUE(pkey_private);
|
|
pkey_public = instantiate_public_key(test_data.key_type,
|
|
test_data.curve_nid);
|
|
ASSERT_TRUE(pkey_public);
|
|
|
|
// Test we can parse EC point into an EVP_PKEY object
|
|
ASSERT_TRUE(EVP_PKEY_set1_tls_encodedpoint(pkey_public,
|
|
test_data.public_key, test_data.public_key_size));
|
|
|
|
// Test we can successfully perform a ECDH key derivation using the
|
|
// parsed public key and a corresponding private key
|
|
pkey_ctx = EVP_PKEY_CTX_new(pkey_private, nullptr);
|
|
ASSERT_TRUE(pkey_ctx);
|
|
ASSERT_TRUE(EVP_PKEY_derive_init(pkey_ctx));
|
|
ASSERT_TRUE(EVP_PKEY_derive_set_peer(pkey_ctx, pkey_public));
|
|
ASSERT_TRUE(EVP_PKEY_derive(pkey_ctx, nullptr, &shared_secret_size));
|
|
EXPECT_EQ(shared_secret_size, test_data.expected_shared_secret_size);
|
|
shared_secret = (uint8_t *) OPENSSL_malloc(shared_secret_size);
|
|
ASSERT_TRUE(shared_secret);
|
|
ASSERT_TRUE(EVP_PKEY_derive(pkey_ctx, shared_secret,
|
|
&shared_secret_size));
|
|
EXPECT_EQ(shared_secret_size, test_data.expected_shared_secret_size);
|
|
EXPECT_EQ(Bytes(shared_secret, shared_secret_size),
|
|
Bytes(test_data.expected_shared_secret, shared_secret_size));
|
|
|
|
// Test we can write EC point from the EVP_PKEY object to wire format
|
|
output_size = EVP_PKEY_get1_tls_encodedpoint(pkey_public, &output);
|
|
EXPECT_EQ(output_size, test_data.public_key_size);
|
|
EXPECT_EQ(Bytes(output, output_size),
|
|
Bytes(test_data.public_key, output_size));
|
|
|
|
OPENSSL_free(output);
|
|
OPENSSL_free(shared_secret);
|
|
EVP_PKEY_CTX_free(pkey_ctx);
|
|
EVP_PKEY_free(pkey_public);
|
|
EVP_PKEY_free(pkey_private);
|
|
}
|
|
|
|
// Above tests explore the happy path. Now test that some invalid
|
|
// input parameters are handled gracefully and with no crashes.
|
|
for (ectlsencodedpoint_test_data test_data : test_data_all) {
|
|
|
|
pkey_public = instantiate_public_key(test_data.key_type,
|
|
test_data.curve_nid);
|
|
ASSERT_TRUE(pkey_public);
|
|
|
|
// pkey = NULL should result in |ERR_R_PASSED_NULL_PARAMETER| being passed
|
|
// back for both functions.
|
|
ASSERT_FALSE(EVP_PKEY_set1_tls_encodedpoint(nullptr,
|
|
test_data.public_key, test_data.public_key_size));
|
|
EXPECT_EQ(ERR_R_PASSED_NULL_PARAMETER,
|
|
ERR_GET_REASON(ERR_peek_last_error()));
|
|
ERR_clear_error();
|
|
ASSERT_FALSE(EVP_PKEY_get1_tls_encodedpoint(nullptr, &output));
|
|
EXPECT_EQ(ERR_R_PASSED_NULL_PARAMETER,
|
|
ERR_GET_REASON(ERR_peek_last_error()));
|
|
ERR_clear_error();
|
|
|
|
// For |EVP_PKEY_get1_tls_encodedpoint| if out_ptr = NULL, we should also
|
|
// expect |ERR_R_PASSED_NULL_PARAMETER| being passed back.
|
|
ASSERT_FALSE(EVP_PKEY_get1_tls_encodedpoint(pkey_public, nullptr));
|
|
EXPECT_EQ(ERR_R_PASSED_NULL_PARAMETER,
|
|
ERR_GET_REASON(ERR_peek_last_error()));
|
|
ERR_clear_error();
|
|
|
|
// For |EVP_PKEY_set1_tls_encodedpoint| if in = NULL or len < 1, we should
|
|
// expect |ERR_R_PASSED_NULL_PARAMETER| or |EVP_R_INVALID_PARAMETERS|,
|
|
// respectively.
|
|
ASSERT_FALSE(EVP_PKEY_set1_tls_encodedpoint(pkey_public,
|
|
nullptr, test_data.public_key_size));
|
|
EXPECT_EQ(ERR_R_PASSED_NULL_PARAMETER,
|
|
ERR_GET_REASON(ERR_peek_last_error()));
|
|
ERR_clear_error();
|
|
ASSERT_FALSE(EVP_PKEY_set1_tls_encodedpoint(pkey_public,
|
|
test_data.public_key, 0));
|
|
EXPECT_EQ(EVP_R_INVALID_PARAMETERS,
|
|
ERR_GET_REASON(ERR_peek_last_error()));
|
|
ERR_clear_error();
|
|
|
|
EVP_PKEY_free(pkey_public);
|
|
}
|
|
|
|
// Test various unsupported key types are rejected
|
|
int key_types_not_supported[] = {EVP_PKEY_RSA, EVP_PKEY_DSA,
|
|
EVP_PKEY_ED25519};
|
|
const uint8_t not_supported[] = {'n','o','t',' ','s','u','p','p','o','r',
|
|
't','e','d'};
|
|
size_t not_supported_size = 13; // specific size irrelevant
|
|
uint8_t *not_supported_out = nullptr;
|
|
bssl::UniquePtr<EVP_PKEY> pkey_key_type_not_supported(EVP_PKEY_new());
|
|
|
|
for (int key_type : key_types_not_supported) {
|
|
ASSERT_TRUE(pkey_key_type_not_supported.get());
|
|
ASSERT_TRUE(EVP_PKEY_set_type(pkey_key_type_not_supported.get(),
|
|
key_type));
|
|
|
|
ASSERT_FALSE(EVP_PKEY_set1_tls_encodedpoint(
|
|
pkey_key_type_not_supported.get(), not_supported, not_supported_size));
|
|
EXPECT_EQ(EVP_R_UNSUPPORTED_PUBLIC_KEY_TYPE,
|
|
ERR_GET_REASON(ERR_peek_last_error()));
|
|
ERR_clear_error();
|
|
|
|
ASSERT_FALSE(EVP_PKEY_get1_tls_encodedpoint(
|
|
pkey_key_type_not_supported.get(), ¬_supported_out));
|
|
EXPECT_EQ(EVP_R_UNSUPPORTED_PUBLIC_KEY_TYPE,
|
|
ERR_GET_REASON(ERR_peek_last_error()));
|
|
ERR_clear_error();
|
|
}
|
|
|
|
// Test compressed encoded EC point is rejected
|
|
static const uint8_t kP256PublicKeyCompressed[] = {
|
|
/* uncompressed + parity bit */
|
|
0x03,
|
|
/* x-coordinate */
|
|
0xe1, 0x5a, 0x44, 0x72, 0x91, 0xf0, 0x84, 0xfe, 0x88, 0x7a, 0x6c, 0x2c,
|
|
0x03, 0x22, 0x9a, 0xf3, 0x04, 0x8a, 0x5d, 0xfe, 0x84, 0x73, 0x70, 0xc9,
|
|
0x3f, 0x92, 0x72, 0x9b, 0x31, 0xc5, 0x5f, 0x7b,
|
|
};
|
|
|
|
bssl::UniquePtr<EVP_PKEY> pkey_public_compressed(instantiate_public_key(
|
|
EVP_PKEY_EC, NID_X9_62_prime256v1));
|
|
ASSERT_TRUE(pkey_public_compressed);
|
|
|
|
ASSERT_FALSE(EVP_PKEY_set1_tls_encodedpoint(pkey_public_compressed.get(),
|
|
kP256PublicKeyCompressed, 1 + 32));
|
|
EXPECT_EQ(ERR_R_EVP_LIB,
|
|
ERR_GET_REASON(ERR_peek_last_error()));
|
|
ERR_clear_error();
|
|
|
|
uint8_t *output_compressed = NULL;
|
|
bssl::UniquePtr<EVP_PKEY> pkey_public_compressed_set(
|
|
instantiate_and_set_public_key(kP256PublicKeyCompressed, 1 + 32,
|
|
NID_X9_62_prime256v1));
|
|
EC_KEY_set_conv_form(EVP_PKEY_get0_EC_KEY(pkey_public_compressed_set.get()),
|
|
POINT_CONVERSION_COMPRESSED);
|
|
ASSERT_TRUE(pkey_public_compressed_set.get());
|
|
|
|
ASSERT_FALSE(EVP_PKEY_get1_tls_encodedpoint(
|
|
pkey_public_compressed_set.get(), &output_compressed));
|
|
EXPECT_EQ(ERR_R_EVP_LIB,
|
|
ERR_GET_REASON(ERR_peek_last_error()));
|
|
ERR_clear_error();
|
|
}
|
|
|
|
TEST(EVPTest, PKEY_set_type_str) {
|
|
bssl::UniquePtr<EVP_PKEY> pkey(EVP_PKEY_new());
|
|
/* Test case 1: Assign RSA algorithm */
|
|
ASSERT_TRUE(EVP_PKEY_set_type_str(pkey.get(), "RSA", 3));
|
|
ASSERT_EQ(pkey->type, EVP_PKEY_RSA);
|
|
|
|
/* Test case 2: Assign EC algorithm */
|
|
ASSERT_TRUE(EVP_PKEY_set_type_str(pkey.get(), "EC", 2));
|
|
ASSERT_EQ(pkey->type, EVP_PKEY_EC);
|
|
|
|
/* Test case 3: Assign non-existent algorithm */
|
|
ASSERT_FALSE(EVP_PKEY_set_type_str(pkey.get(), "Nonsense", 8));
|
|
}
|
|
|
|
TEST(EVPTest, PKEY_asn1_find) {
|
|
int pkey_id, pkey_base_id, pkey_flags;
|
|
const char *pinfo, *pem_str;
|
|
|
|
/* Test case 1: Find RSA algorithm */
|
|
const EVP_PKEY_ASN1_METHOD* ameth = EVP_PKEY_asn1_find(NULL, EVP_PKEY_RSA);
|
|
ASSERT_TRUE(ameth);
|
|
ASSERT_TRUE(EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags, &pinfo, &pem_str, ameth));
|
|
ASSERT_EQ(pkey_id, EVP_PKEY_RSA);
|
|
ASSERT_EQ(pkey_base_id, EVP_PKEY_RSA);
|
|
ASSERT_EQ(0, pkey_flags);
|
|
ASSERT_STREQ("RSA", pem_str);
|
|
ASSERT_STREQ("OpenSSL RSA method", pinfo);
|
|
|
|
/* Test case 2: Find EC algorithm */
|
|
ameth = EVP_PKEY_asn1_find(NULL, EVP_PKEY_EC);
|
|
ASSERT_TRUE(ameth);
|
|
ASSERT_TRUE(EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags, &pinfo, &pem_str, ameth));
|
|
ASSERT_EQ(pkey_id, EVP_PKEY_EC);
|
|
ASSERT_EQ(pkey_base_id, EVP_PKEY_EC);
|
|
ASSERT_EQ(0, pkey_flags);
|
|
ASSERT_STREQ("EC", pem_str);
|
|
ASSERT_STREQ("OpenSSL EC algorithm", pinfo);
|
|
|
|
/* Test case 3: Find non-existent algorithm */
|
|
ameth = EVP_PKEY_asn1_find(NULL, EVP_PKEY_NONE);
|
|
ASSERT_FALSE(ameth);
|
|
ASSERT_FALSE(EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags, &pinfo, &pem_str, ameth));
|
|
}
|
|
|
|
TEST(EVPTest, PKEY_asn1_find_str) {
|
|
int pkey_id, pkey_base_id, pkey_flags;
|
|
const char *pinfo, *pem_str;
|
|
|
|
/* Test case 1: Find RSA algorithm */
|
|
const EVP_PKEY_ASN1_METHOD* ameth = EVP_PKEY_asn1_find_str(NULL, "RSA", 3);
|
|
ASSERT_TRUE(ameth);
|
|
ASSERT_TRUE(EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags, &pinfo, &pem_str, ameth));
|
|
ASSERT_EQ(pkey_id, EVP_PKEY_RSA);
|
|
ASSERT_EQ(pkey_base_id, EVP_PKEY_RSA);
|
|
ASSERT_EQ(0, pkey_flags);
|
|
ASSERT_STREQ("RSA", pem_str);
|
|
ASSERT_STREQ("OpenSSL RSA method", pinfo);
|
|
|
|
/* Test case 2: Find EC algorithm */
|
|
ameth = EVP_PKEY_asn1_find_str(NULL, "EC", 2);
|
|
ASSERT_TRUE(ameth);
|
|
ASSERT_TRUE(EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags, &pinfo, &pem_str, ameth));
|
|
ASSERT_EQ(pkey_id, EVP_PKEY_EC);
|
|
ASSERT_EQ(pkey_base_id, EVP_PKEY_EC);
|
|
ASSERT_EQ(0, pkey_flags);
|
|
ASSERT_STREQ("EC", pem_str);
|
|
ASSERT_STREQ("OpenSSL EC algorithm", pinfo);
|
|
|
|
/* Test case 3: Find non-existent algorithm */
|
|
ameth = EVP_PKEY_asn1_find_str(NULL, "Nonsense", 8);
|
|
ASSERT_FALSE(ameth);
|
|
ASSERT_FALSE(EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags, &pinfo, &pem_str, ameth));
|
|
}
|
|
|
|
TEST(EVPTest, ED25519PH) {
|
|
const uint8_t message[] = {0x72, 0x61, 0x63, 0x63, 0x6f, 0x6f, 0x6e};
|
|
const uint8_t context[] = {0x73, 0x6e, 0x65, 0x61, 0x6b, 0x79};
|
|
const uint8_t message_sha512[] = {
|
|
0x50, 0xcf, 0x03, 0x79, 0x8c, 0xb2, 0xfb, 0x0f, 0xf1, 0x3d, 0xc6,
|
|
0x4c, 0x7c, 0xf0, 0x89, 0x8f, 0xfe, 0x90, 0x9d, 0xfd, 0xa5, 0x22,
|
|
0xdd, 0x22, 0xf4, 0x10, 0x8f, 0xa0, 0x1b, 0x8f, 0x29, 0x15, 0x98,
|
|
0x60, 0xf2, 0x80, 0x0e, 0x7c, 0x93, 0x3c, 0x7c, 0x6e, 0x4c, 0xb1,
|
|
0xf9, 0x3f, 0x33, 0xbe, 0x43, 0xa3, 0xd4, 0x1c, 0x86, 0x92, 0x2b,
|
|
0x32, 0xaf, 0x89, 0xa2, 0xa4, 0xa3, 0xe2, 0xf1, 0x92};
|
|
|
|
bssl::UniquePtr<EVP_PKEY> pkey(nullptr);
|
|
bssl::UniquePtr<EVP_PKEY> pubkey(nullptr);
|
|
bssl::ScopedCBB marshalled_private_key;
|
|
bssl::ScopedCBB marshalled_public_key;
|
|
uint8_t signature[ED25519_SIGNATURE_LEN] = {0};
|
|
size_t signature_len = ED25519_SIGNATURE_LEN;
|
|
uint8_t working_signature[ED25519_SIGNATURE_LEN] = {0};
|
|
size_t working_signature_len = ED25519_SIGNATURE_LEN;
|
|
|
|
{
|
|
bssl::UniquePtr<EVP_PKEY_CTX> ctx(
|
|
EVP_PKEY_CTX_new_id(EVP_PKEY_ED25519PH, nullptr));
|
|
ASSERT_FALSE(EVP_PKEY_keygen_init(ctx.get()));
|
|
}
|
|
|
|
{
|
|
bssl::UniquePtr<EVP_PKEY_CTX> ctx(
|
|
EVP_PKEY_CTX_new_id(EVP_PKEY_ED25519, nullptr));
|
|
ASSERT_TRUE(EVP_PKEY_keygen_init(ctx.get()));
|
|
EVP_PKEY *pkey_ptr = nullptr;
|
|
ASSERT_TRUE(EVP_PKEY_keygen(ctx.get(), &pkey_ptr));
|
|
ASSERT_NE(pkey_ptr, nullptr);
|
|
pkey.reset(pkey_ptr); // now owns pkey_ptr
|
|
// marshal the keys
|
|
ASSERT_TRUE(CBB_init(marshalled_private_key.get(), 0));
|
|
ASSERT_TRUE(CBB_init(marshalled_public_key.get(), 0));
|
|
ASSERT_TRUE(
|
|
EVP_marshal_private_key(marshalled_private_key.get(), pkey.get()));
|
|
ASSERT_TRUE(
|
|
EVP_marshal_public_key(marshalled_public_key.get(), pkey.get()));
|
|
}
|
|
|
|
{
|
|
uint8_t raw_key[ED25519_PRIVATE_KEY_SEED_LEN];
|
|
size_t raw_key_len = sizeof(raw_key);
|
|
ASSERT_TRUE(EVP_PKEY_get_raw_private_key(pkey.get(), raw_key, &raw_key_len));
|
|
|
|
EVP_PKEY *rk = EVP_PKEY_new_raw_private_key(EVP_PKEY_ED25519PH, nullptr, raw_key, raw_key_len);
|
|
ASSERT_TRUE(rk);
|
|
pkey.reset(rk);
|
|
ASSERT_EQ(EVP_PKEY_ED25519PH, EVP_PKEY_id(pkey.get()));
|
|
|
|
bssl::ScopedCBB temp;
|
|
ASSERT_TRUE(CBB_init(temp.get(), 0));
|
|
ASSERT_FALSE(EVP_marshal_private_key(temp.get(), pkey.get()));
|
|
}
|
|
|
|
{
|
|
uint8_t raw_key[ED25519_PUBLIC_KEY_LEN];
|
|
size_t raw_key_len = sizeof(raw_key);
|
|
ASSERT_TRUE(EVP_PKEY_get_raw_public_key(pkey.get(), raw_key, &raw_key_len));
|
|
|
|
EVP_PKEY *rk = EVP_PKEY_new_raw_public_key(EVP_PKEY_ED25519PH, nullptr, raw_key, raw_key_len);
|
|
ASSERT_TRUE(rk);
|
|
pubkey.reset(rk);
|
|
ASSERT_EQ(EVP_PKEY_ED25519PH, EVP_PKEY_id(pubkey.get()));
|
|
|
|
bssl::ScopedCBB temp;
|
|
ASSERT_TRUE(CBB_init(temp.get(), 0));
|
|
ASSERT_FALSE(EVP_marshal_public_key(temp.get(), pubkey.get()));
|
|
}
|
|
|
|
// prehash signature w/ context gen and verify
|
|
{
|
|
bssl::UniquePtr<EVP_MD_CTX> md_ctx(EVP_MD_CTX_new());
|
|
EVP_PKEY_CTX *pctx = nullptr;
|
|
|
|
ASSERT_TRUE(EVP_DigestSignInit(md_ctx.get(), &pctx, EVP_sha512(), nullptr,
|
|
pkey.get()));
|
|
|
|
ASSERT_TRUE(
|
|
EVP_PKEY_CTX_set_signature_context(pctx, context, sizeof(context)));
|
|
const uint8_t *sctx = NULL;
|
|
size_t sctx_len = 0;
|
|
ASSERT_TRUE(EVP_PKEY_CTX_get0_signature_context(pctx, &sctx, &sctx_len));
|
|
ASSERT_TRUE(sctx);
|
|
ASSERT_NE(sctx, context);
|
|
ASSERT_EQ(Bytes(context, sizeof(context)), Bytes(sctx, sctx_len));
|
|
|
|
ASSERT_TRUE(EVP_DigestSignUpdate(md_ctx.get(), &message[0], 3));
|
|
ASSERT_TRUE(
|
|
EVP_DigestSignUpdate(md_ctx.get(), &message[3], sizeof(message) - 3));
|
|
ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), signature,
|
|
&signature_len));
|
|
ASSERT_EQ(signature_len, (size_t)ED25519_SIGNATURE_LEN);
|
|
|
|
ASSERT_TRUE(EVP_DigestVerifyInit(md_ctx.get(), &pctx, EVP_sha512(), nullptr,
|
|
pubkey.get()));
|
|
ASSERT_TRUE(
|
|
EVP_PKEY_CTX_set_signature_context(pctx, context, sizeof(context)));
|
|
ASSERT_TRUE(EVP_DigestVerifyUpdate(md_ctx.get(), &message[0], 3));
|
|
ASSERT_TRUE(
|
|
EVP_DigestVerifyUpdate(md_ctx.get(), &message[3], sizeof(message) - 3));
|
|
ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(),
|
|
signature, signature_len));
|
|
}
|
|
|
|
// prehash signature gen and verify w/ context using EVP_PKEY_sign and
|
|
// EVP_PKEY_verify directly
|
|
{
|
|
bssl::UniquePtr<EVP_PKEY_CTX> ctx(EVP_PKEY_CTX_new(pkey.get(), nullptr));
|
|
ASSERT_TRUE(ctx.get());
|
|
ASSERT_TRUE(EVP_PKEY_sign_init(ctx.get()));
|
|
ASSERT_TRUE(EVP_PKEY_CTX_set_signature_context(ctx.get(), context,
|
|
sizeof(context)));
|
|
ASSERT_TRUE(EVP_PKEY_sign(ctx.get(), working_signature, &working_signature_len, message_sha512, sizeof(message_sha512)));
|
|
ASSERT_EQ(working_signature_len, (size_t)ED25519_SIGNATURE_LEN);
|
|
|
|
ctx.reset(EVP_PKEY_CTX_new(pubkey.get(), nullptr));
|
|
ASSERT_TRUE(ctx.get());
|
|
ASSERT_TRUE(EVP_PKEY_verify_init(ctx.get()));
|
|
ASSERT_TRUE(EVP_PKEY_CTX_set_signature_context(ctx.get(), context,
|
|
sizeof(context)));
|
|
ASSERT_TRUE(EVP_PKEY_verify(ctx.get(), working_signature,
|
|
working_signature_len, message_sha512,
|
|
sizeof(message_sha512)));
|
|
|
|
ASSERT_EQ(Bytes(signature, signature_len),
|
|
Bytes(working_signature, working_signature_len));
|
|
}
|
|
|
|
// prehash signature gen and verify
|
|
{
|
|
bssl::UniquePtr<EVP_MD_CTX> md_ctx(EVP_MD_CTX_new());
|
|
EVP_PKEY_CTX *pctx;
|
|
|
|
ASSERT_TRUE(EVP_DigestSignInit(md_ctx.get(), &pctx, EVP_sha512(), nullptr,
|
|
pkey.get()));
|
|
|
|
const uint8_t *sctx = NULL;
|
|
size_t sctx_len = 0;
|
|
ASSERT_TRUE(EVP_PKEY_CTX_get0_signature_context(pctx, &sctx, &sctx_len));
|
|
ASSERT_EQ(sctx, nullptr);
|
|
ASSERT_EQ(sctx_len, (size_t)0);
|
|
|
|
ASSERT_TRUE(EVP_DigestSignUpdate(md_ctx.get(), &message[0], 3));
|
|
ASSERT_TRUE(
|
|
EVP_DigestSignUpdate(md_ctx.get(), &message[3], sizeof(message) - 3));
|
|
ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), working_signature,
|
|
&working_signature_len));
|
|
ASSERT_EQ(working_signature_len, (size_t)ED25519_SIGNATURE_LEN);
|
|
|
|
ASSERT_TRUE(EVP_DigestVerifyInit(md_ctx.get(), nullptr, EVP_sha512(),
|
|
nullptr, pubkey.get()));
|
|
ASSERT_TRUE(EVP_DigestVerifyUpdate(md_ctx.get(), message, 3));
|
|
ASSERT_TRUE(
|
|
EVP_DigestVerifyUpdate(md_ctx.get(), &message[3], sizeof(message) - 3));
|
|
ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(), working_signature,
|
|
working_signature_len));
|
|
}
|
|
|
|
// Pre-hash signature w/ context should not match Pre-hash signature w/o context
|
|
ASSERT_NE(Bytes(signature, signature_len),
|
|
Bytes(working_signature, working_signature_len));
|
|
|
|
|
|
// prehash signature gen and verify with EVP_PKEY_sign and EVP_PKEY_verify directly
|
|
{
|
|
OPENSSL_memcpy(signature, working_signature, working_signature_len);
|
|
signature_len = working_signature_len;
|
|
|
|
bssl::UniquePtr<EVP_PKEY_CTX> ctx(EVP_PKEY_CTX_new(pkey.get(), nullptr));
|
|
ASSERT_TRUE(ctx.get());
|
|
ASSERT_TRUE(EVP_PKEY_sign_init(ctx.get()));
|
|
ASSERT_TRUE(EVP_PKEY_sign(ctx.get(), working_signature, &working_signature_len, message_sha512, sizeof(message_sha512)));
|
|
ASSERT_EQ(working_signature_len, (size_t)ED25519_SIGNATURE_LEN);
|
|
|
|
ctx.reset(EVP_PKEY_CTX_new(pubkey.get(), nullptr));
|
|
ASSERT_TRUE(ctx.get());
|
|
ASSERT_TRUE(EVP_PKEY_verify_init(ctx.get()));
|
|
ASSERT_TRUE(EVP_PKEY_verify(ctx.get(), working_signature, working_signature_len, message_sha512, sizeof(message_sha512)));
|
|
|
|
ASSERT_EQ(Bytes(signature, signature_len),
|
|
Bytes(working_signature, working_signature_len));
|
|
}
|
|
|
|
|
|
{
|
|
CBS cbs;
|
|
CBS_init(&cbs, CBB_data(marshalled_private_key.get()),
|
|
CBB_len(marshalled_private_key.get()));
|
|
EVP_PKEY *parsed = EVP_parse_private_key(&cbs);
|
|
ASSERT_TRUE(parsed);
|
|
pkey.reset(parsed);
|
|
ASSERT_EQ(EVP_PKEY_ED25519, EVP_PKEY_id(pkey.get()));
|
|
}
|
|
|
|
{
|
|
CBS cbs;
|
|
CBS_init(&cbs, CBB_data(marshalled_public_key.get()),
|
|
CBB_len(marshalled_public_key.get()));
|
|
EVP_PKEY *parsed = EVP_parse_public_key(&cbs);
|
|
ASSERT_TRUE(parsed);
|
|
pubkey.reset(parsed);
|
|
ASSERT_EQ(EVP_PKEY_ED25519, EVP_PKEY_id(pubkey.get()));
|
|
}
|
|
|
|
// pure signature gen and verify
|
|
{
|
|
bssl::UniquePtr<EVP_MD_CTX> md_ctx(EVP_MD_CTX_new());
|
|
ASSERT_TRUE(EVP_DigestSignInit(md_ctx.get(), nullptr, nullptr, nullptr,
|
|
pkey.get()));
|
|
ASSERT_TRUE(EVP_DigestSign(md_ctx.get(), working_signature,
|
|
&working_signature_len, message, sizeof(message)));
|
|
ASSERT_EQ(working_signature_len, (size_t)ED25519_SIGNATURE_LEN);
|
|
|
|
ASSERT_TRUE(EVP_DigestVerifyInit(md_ctx.get(), nullptr, nullptr, nullptr,
|
|
pubkey.get()));
|
|
ASSERT_TRUE(EVP_DigestVerify(md_ctx.get(), working_signature,
|
|
working_signature_len, message, sizeof(message)));
|
|
}
|
|
|
|
// pure signature shouldn't match a pre-hash signature w/o context
|
|
ASSERT_NE(Bytes(signature, signature_len),
|
|
Bytes(working_signature, working_signature_len));
|
|
}
|
|
|
|
TEST(EVPTest, ASN1MethodCheckPemStrLengthInvariant) {
|
|
for (int i = 0; i < EVP_PKEY_asn1_get_count(); i++) {
|
|
SCOPED_TRACE(i);
|
|
const EVP_PKEY_ASN1_METHOD *method = EVP_PKEY_asn1_get0(i);
|
|
ASSERT_NE(method, nullptr);
|
|
ASSERT_NE(method->pem_str, nullptr);
|
|
EXPECT_LE(OPENSSL_strnlen(method->pem_str, strlen(method->pem_str)+1), MAX_PEM_STR_LEN);
|
|
}
|
|
}
|
|
|
|
TEST(EVPTest, Ed25519phTestVectors) {
|
|
FileTestGTest("crypto/fipsmodule/curve25519/ed25519ph_tests.txt", [](FileTest *t) {
|
|
std::vector<uint8_t> seed, q, message, context, expected_signature;
|
|
ASSERT_TRUE(t->GetBytes(&seed, "SEED"));
|
|
ASSERT_EQ(32u, seed.size());
|
|
ASSERT_TRUE(t->GetBytes(&q, "Q"));
|
|
ASSERT_EQ(32u, q.size());
|
|
ASSERT_TRUE(t->GetBytes(&message, "MESSAGE"));
|
|
ASSERT_TRUE(t->GetBytes(&expected_signature, "SIGNATURE"));
|
|
ASSERT_EQ(64u, expected_signature.size());
|
|
|
|
if (t->HasAttribute("CONTEXT")) {
|
|
t->GetBytes(&context, "CONTEXT");
|
|
} else {
|
|
context = std::vector<uint8_t>();
|
|
}
|
|
|
|
bssl::UniquePtr<EVP_PKEY> pkey(EVP_PKEY_new_raw_private_key(EVP_PKEY_ED25519PH, nullptr, seed.data(), seed.size()));
|
|
bssl::UniquePtr<EVP_PKEY> pubkey(EVP_PKEY_new_raw_public_key(EVP_PKEY_ED25519PH, nullptr, q.data(), q.size()));
|
|
ASSERT_TRUE(pkey.get());
|
|
ASSERT_TRUE(pubkey.get());
|
|
ASSERT_EQ(EVP_PKEY_ED25519PH, EVP_PKEY_id(pkey.get()));
|
|
ASSERT_EQ(EVP_PKEY_ED25519PH, EVP_PKEY_id(pubkey.get()));
|
|
|
|
bssl::UniquePtr<EVP_MD_CTX> md_ctx(EVP_MD_CTX_new());
|
|
EVP_PKEY_CTX *pctx = nullptr;
|
|
uint8_t signature[ED25519_SIGNATURE_LEN] = {};
|
|
size_t signature_len = ED25519_SIGNATURE_LEN;
|
|
|
|
ASSERT_TRUE(EVP_DigestSignInit(md_ctx.get(), &pctx, EVP_sha512(), nullptr,
|
|
pkey.get()));
|
|
ASSERT_TRUE(
|
|
EVP_PKEY_CTX_set_signature_context(pctx, context.data(), context.size()));
|
|
ASSERT_TRUE(EVP_DigestSignUpdate(md_ctx.get(), message.data(), message.size()));
|
|
ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), signature,
|
|
&signature_len));
|
|
ASSERT_EQ(signature_len, (size_t)ED25519_SIGNATURE_LEN);
|
|
ASSERT_EQ(Bytes(expected_signature), Bytes(signature, signature_len));
|
|
|
|
ASSERT_TRUE(EVP_DigestVerifyInit(md_ctx.get(), &pctx, EVP_sha512(), nullptr,
|
|
pubkey.get()));
|
|
ASSERT_TRUE(
|
|
EVP_PKEY_CTX_set_signature_context(pctx, context.data(), context.size()));
|
|
ASSERT_TRUE(EVP_DigestVerifyUpdate(md_ctx.get(), message.data(), message.size()));
|
|
ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(), signature,
|
|
signature_len));
|
|
});
|
|
}
|