summaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
authorMikael Magnusson <mikma@users.sourceforge.net>2024-11-18 18:27:39 +0100
committerMikael Magnusson <mikma@users.sourceforge.net>2024-11-22 12:59:13 +0100
commitc626e488ba7c1b3c5932dc887402b9ba4c320f29 (patch)
tree6763abcd3966eae5cb1bee1e7c9ab58da5270c7e
parentbe34c719162bd03c235e7cf051bdc8f0ae234637 (diff)
tests: add crypto tests
Test RSA, ECDSA, and EdDSA signature verification, and key generation with message signing and verification. Signed-off-by: Mikael Magnusson <mikma@users.sourceforge.net>
-rw-r--r--tests/custom/05_crypto/01_rsa85
-rw-r--r--tests/custom/05_crypto/02_ecdsa125
-rw-r--r--tests/custom/05_crypto/03_eddsa70
-rw-r--r--tests/custom/05_crypto/04_keygen80
4 files changed, 360 insertions, 0 deletions
diff --git a/tests/custom/05_crypto/01_rsa b/tests/custom/05_crypto/01_rsa
new file mode 100644
index 0000000..c07c690
--- /dev/null
+++ b/tests/custom/05_crypto/01_rsa
@@ -0,0 +1,85 @@
+A few test vectors from SigGen15_186-2.txt in 186-2rsatestvectors.zip
+
+-- Testcase --
+{%
+ import { pk as pk_mbedtls } from 'crypto_mbedtls';
+ import { pk as pk_openssl } from 'crypto_openssl';
+ import { test_rsa } from './files/rsa.uc';
+
+ const pubkeyPem = `-----BEGIN PUBLIC KEY-----
+MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4LFLmc1hzT25wgdmaIQT
+JPoxdPM85m/9UUOU00F40ppJSTJ2tndyM+fUaj5ovHyn6JnpAdVPbe4HScPkjd9o
+aFhn7irmbfiOtWP22xN6n2sXWhEuDtqDaOiORe/hzhS8YBbVJjlicGavGHLHL2C5
+FhwdI37rNLD4QbPwiW+f4OFrD3Q1LRASksxGSn54YbvrhvbfYVHLJlQXxmxWXtiX
+S9j8mE1d39TrkaPVI0zhtUZ/Ot43X4AuwHKT8SNu+jBovJGxWFUch1xdwKnW+jIb
++UIfCN6skQ41wcKFSe6O7YMwz3BZX/cLlLSZB+J2mKnZEfesBwavyxpKOf6ziwqA
+SQIDAQAB
+-----END PUBLIC KEY-----`;
+
+ const pubkeyLines = split(pubkeyPem, '\n');
+ const pubkeyB64 = join('', splice(splice(pubkeyLines, length(pubkeyLines)-1), 0, 1));
+ const pubkey = b64dec(pubkeyB64);
+
+ const msg1 = '544be0a4044edcdc1240f2182109f826d784ea613486dfd5221d3ba44d1525a934c13c5a81f885f3955da8d168e35d1b909121a89f832d1db232a85647f51c084fc727a4854a737efd0ce72e00091f3617721ae666ad337d3b9d5391e72364b1cde50948b84e8cc472d618f8928328bf95af3fe3300dda3de5e7a21dd5a9e7ec';
+ const s1 = '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';
+
+ const msg256 = '6504921a97cd57aa8f3863dc32e1f2d0b57aff63106e59f6afc3f9726b459388bae16b3e224f6aa7f4f471f13606eda6e1f1ac2b4df9ef8de921c07c2f4c8598d7a3d6ec4b368cb85ce61a74338221118a303e821c0f277b591af6795f50c40226127a2efacce4662fd7076c109eb59b18005e7165f6294a6976436ee397774e';
+ const s256 = '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';
+
+ const msg384 = 'db2e9fbefd9832d29e6015b976734ff15a5c1177a9153b38e61d22c8a6ca9056ade10de054645da32eab4ad6eab6a4977bc28526771ad951bd301e2f5bec6911af44aab6cc0d30be1e1170615261026170edec3d4a5123a81af24f39674acf642880fda92c3cb30bb9b90ec4741c71378004cd26ea622025458b3c4f918bca37';
+ const s384 = '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';
+
+ const msg512 = 'e4dba4692a6628b501f776fec7fe973d655154268f669bfd47c624aba3be5311d158619c588ab71aa0ac9accb52f0dbc488df350f77c7520ce67a3050d1e5e722bcd75081c2b0e64d0f3483cfc981eaa1c358fc7b9c2fb7ce78ed19513e96717fb2129d4feb1f63c96b4c77623a092b0ea306eb35da2f7ba9d23f4843d8837a8';
+ const s512 = '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';
+
+ // Test signature (from 04_keygen) against wrong key.
+ const s256_fail = '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';
+
+ test_rsa(pk_mbedtls(), pubkey, 'SHA1', msg1, s1);
+ test_rsa(pk_mbedtls(), pubkey, 'SHA256', msg256, s256);
+ test_rsa(pk_mbedtls(), pubkey, 'SHA384', msg384, s384);
+ test_rsa(pk_mbedtls(), pubkey, 'SHA512', msg512, s512);
+ test_rsa(pk_mbedtls(), pubkey, 'SHA256', hexenc('Message'), s256_fail);
+
+ test_rsa(pk_openssl(), pubkey, 'SHA1', msg1, s1);
+ test_rsa(pk_openssl(), pubkey, 'SHA256', msg256, s256);
+ test_rsa(pk_openssl(), pubkey, 'SHA384', msg384, s384);
+ test_rsa(pk_openssl(), pubkey, 'SHA512', msg512, s512);
+ test_rsa(pk_openssl(), pubkey, 'SHA256', hexenc('Message'), s256_fail);
+%}
+-- End --
+
+-- Expect stdout --
+true
+true
+true
+true
+exception
+true
+true
+true
+true
+exception
+-- End --
+
+-- Expect stderr --
+-- End --
+
+-- File rsa.uc --
+export
+function test_rsa(pk, pubkey, mdAlg, msg, s)
+{
+ const data = hexdec(msg);
+ const signature = hexdec(s);
+ pk.set_public_key(pubkey);
+ const pkey = pk.get_public_key();
+ assert(pkey == pubkey);
+ let verify = 'undefined';
+ try {
+ verify = pk.verify(mdAlg, data, signature);
+ } catch {
+ verify = 'exception'
+ }
+ print(verify, '\n');
+};
+-- End --
diff --git a/tests/custom/05_crypto/02_ecdsa b/tests/custom/05_crypto/02_ecdsa
new file mode 100644
index 0000000..194a5ce
--- /dev/null
+++ b/tests/custom/05_crypto/02_ecdsa
@@ -0,0 +1,125 @@
+Some test vectors from RFC 6979
+
+-- Testcase --
+{%
+ import { pk as pk_mbedtls } from 'crypto_mbedtls';
+ import { pk as pk_openssl } from 'crypto_openssl';
+ import { test_ecdsa } from './files/ecdsa.uc';
+
+ const tests = {
+ p192: {
+ alg: 'SHA1',
+ data: 'sample',
+ // Ux = 'AC2C77F529F91689FEA0EA5EFEC7F210D8EEA0B9E047ED56'
+ // Uy = '3BC723E57670BD4887EBC732C523063D0A7C957BC97C1C43'
+ // DER encoded public key
+ key: '3049301306072a8648ce3d020106082a8648ce3d03010103320004ac2c77f529f91689fea0ea5efec7f210d8eea0b9e047ed563bc723e57670bd4887ebc732c523063d0a7c957bc97c1c43',
+ // r = '98C6BD12B23EAF5E2A2045132086BE3EB8EBD62ABF6698FF'
+ // s = '57A22B07DEA9530F8DE9471B1DC6624472E8E2844BC25B64'
+ // DER encoded signature
+ sig: '303502190098c6bd12b23eaf5e2a2045132086be3eb8ebd62abf6698ff021857a22b07dea9530f8de9471b1dc6624472e8e2844bc25b64',
+ },
+ p224: {
+ alg: 'SHA224',
+ data: 'sample',
+ // Ux = '00CF08DA5AD719E42707FA431292DEA11244D64FC51610D94B130D6C'
+ // Uy = 'EEAB6F3DEBE455E3DBF85416F7030CBD94F34F2D6F232C69F3C1385A'
+ // DER encoded public key
+ key: '304e301006072a8648ce3d020106052b81040021033a000400cf08da5ad719e42707fa431292dea11244d64fc51610d94b130d6ceeab6f3debe455e3dbf85416f7030cbd94f34f2d6f232c69f3c1385a',
+ // r = '1CDFE6662DDE1E4A1EC4CDEDF6A1F5A2FB7FBD9145C12113E6ABFD3E'
+ // s = 'A6694FD7718A21053F225D3F46197CA699D45006C06F871808F43EBC'
+ // DER encoded signature
+ sig: '303d021c1cdfe6662dde1e4a1ec4cdedf6a1f5a2fb7fbd9145c12113e6abfd3e021d00a6694fd7718a21053f225d3f46197ca699d45006c06f871808f43ebc',
+ },
+ p256: {
+ alg: 'SHA256',
+ data: 'sample',
+ // Ux = '60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6'
+ // Uy = '7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299'
+ // DER encoded public key
+ key: '3059301306072a8648ce3d020106082a8648ce3d0301070342000460fed4ba255a9d31c961eb74c6356d68c049b8923b61fa6ce669622e60f29fb67903fe1008b8bc99a41ae9e95628bc64f2f1b20c2d7e9f5177a3c294d4462299',
+ // r = 'EFD48B2AACB6A8FD1140DD9CD45E81D69D2C877B56AAF991C34D0EA84EAF3716'
+ // s = 'F7CB1C942D657C41D436C7A1B6E29F65F3E900DBB9AFF4064DC4AB2F843ACDA8'
+ // DER encoded signature
+ sig: '3046022100efd48b2aacb6a8fd1140dd9cd45e81d69d2c877b56aaf991c34d0ea84eaf3716022100f7cb1c942d657c41d436c7a1b6e29f65f3e900dbb9aff4064dc4ab2f843acda8',
+ },
+ p384: {
+ alg: 'SHA384',
+ data: 'sample',
+ // Ux = 'EC3A4E415B4E19A4568618029F427FA5DA9A8BC4AE92E02E06AAE5286B300C64DEF8F0EA9055866064A254515480BC13'
+ // Uy = '8015D9B72D7D57244EA8EF9AC0C621896708A59367F9DFB9F54CA84B3F1C9DB1288B231C3AE0D4FE7344FD2533264720'
+ // DER encoded public key
+ key: '3076301006072a8648ce3d020106052b8104002203620004ec3a4e415b4e19a4568618029f427fa5da9a8bc4ae92e02e06aae5286b300c64def8f0ea9055866064a254515480bc138015d9b72d7d57244ea8ef9ac0c621896708a59367f9dfb9f54ca84b3f1c9db1288b231c3ae0d4fe7344fd2533264720',
+ // r = '94EDBB92A5ECB8AAD4736E56C691916B3F88140666CE9FA73D64C4EA95AD133C81A648152E44ACF96E36DD1E80FABE46'
+ // s = '99EF4AEB15F178CEA1FE40DB2603138F130E740A19624526203B6351D0A3A94FA329C145786E679E7B82C71A38628AC8'
+ // DER encoded signature
+ sig: '306602310094edbb92a5ecb8aad4736e56c691916b3f88140666ce9fa73d64c4ea95ad133c81a648152e44acf96e36dd1e80fabe4602310099ef4aeb15f178cea1fe40db2603138f130e740a19624526203b6351d0a3a94fa329c145786e679e7b82c71a38628ac8',
+ },
+ p521: {
+ alg: 'SHA512',
+ data: 'sample',
+ // Ux = '01894550D0785932E00EAA23B694F213F8C3121F86DC97A04E5A7167DB4E5BCD371123D46E45DB6B5D5370A7F20FB633155D38FFA16D2BD761DCAC474B9A2F5023A4'
+ // Uy = '00493101C962CD4D2FDDF782285E64584139C2F91B47F87FF82354D6630F746A28A0DB25741B5B34A828008B22ACC23F924FAAFBD4D33F81EA66956DFEAA2BFDFCF5'
+ // DER encoded public key
+ key: '30819b301006072a8648ce3d020106052b81040023038186000401894550d0785932e00eaa23b694f213f8c3121f86dc97a04e5a7167db4e5bcd371123d46e45db6b5d5370a7f20fb633155d38ffa16d2bd761dcac474b9a2f5023a400493101c962cd4d2fddf782285e64584139c2f91b47f87ff82354d6630f746a28a0db25741b5b34a828008b22acc23f924faafbd4d33f81ea66956dfeaa2bfdfcf5',
+ // r = 'C328FAFCBD79DD77850370C46325D987CB525569FB63C5D3BC53950E6D4C5F174E25A1EE9017B5D450606ADD152B534931D7D4E8455CC91F9B15BF05EC36E377FA'
+ // s = '617CCE7CF5064806C467F678D3B4080D6F1CC50AF26CA209417308281B68AF282623EAA63E5B5C0723D8B8C37FF0777B1A20F8CCB1DCCC43997F1EE0E44DA4A67A'
+ // DER encoded signature
+ sig: '308187024200c328fafcbd79dd77850370c46325d987cb525569fb63c5d3bc53950e6d4c5f174e25a1ee9017b5d450606add152b534931d7d4e8455cc91f9b15bf05ec36e377fa0241617cce7cf5064806c467f678d3b4080d6f1cc50af26ca209417308281b68af282623eaa63e5b5c0723d8b8c37ff0777b1a20f8ccb1dccc43997f1ee0e44da4a67a',
+ },
+ p192_fail: {
+ // Test signature (from 04_keygen) against wrong key.
+ alg: 'SHA1',
+ data: 'Message',
+ key: '3049301306072a8648ce3d020106082a8648ce3d03010103320004ac2c77f529f91689fea0ea5efec7f210d8eea0b9e047ed563bc723e57670bd4887ebc732c523063d0a7c957bc97c1c43',
+ sig: '303402181e2dbd03ca5a4dbbdda18a967969c0ac246ef6b0562f572e021838e05d8ba04345299188147b2636015b777223016f32cde2',
+ },
+ };
+
+ for (test in tests) {
+ test_ecdsa(pk_mbedtls(), tests[test]);
+ test_ecdsa(pk_openssl(), tests[test]);
+ }
+%}
+-- End --
+
+-- Expect stdout --
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+exception
+exception
+-- End --
+
+-- Expect stderr --
+-- End --
+
+-- File ecdsa.uc --
+export
+function test_ecdsa(pk, test)
+{
+ const mdAlg = test.alg;
+ const data = test.data;
+ const key = test.key;
+ const sig = test.sig;
+
+ const pubkeyDer = hexdec(key);
+ pk.set_public_key(pubkeyDer);
+ const pkey = pk.get_public_key();
+ assert(pkey == pubkeyDer);
+ let verify = 'undefined';
+ try {
+ verify = pk.verify(mdAlg, data, hexdec(sig));
+ } catch {
+ verify = 'exception';
+ }
+ print(verify, '\n');
+};
+-- End --
diff --git a/tests/custom/05_crypto/03_eddsa b/tests/custom/05_crypto/03_eddsa
new file mode 100644
index 0000000..468e3b7
--- /dev/null
+++ b/tests/custom/05_crypto/03_eddsa
@@ -0,0 +1,70 @@
+-- Testcase --
+{%
+ import { pk as pk_openssl } from 'crypto_openssl';
+ import { test_eddsa } from './files/eddsa.uc';
+
+ const tests = {
+ test_1: {
+ // raw key = 'd75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a',
+ key: '302a300506032b6570032100d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a',
+ msg: '',
+ sig: 'e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901555fb8821590a33bacc61e39701cf9b46bd25bf5f0595bbe24655141438e7a100b',
+ },
+ test_2: {
+ // raw key = '3d4017c3e843895a92b70aa74d1b7ebc9c982ccf2ec4968cc0cd55f12af4660c'
+ key: '302a300506032b65700321003d4017c3e843895a92b70aa74d1b7ebc9c982ccf2ec4968cc0cd55f12af4660c',
+ msg: '72',
+ sig: '92a009a9f0d4cab8720e820b5f642540a2b27b5416503f8fb3762223ebdb69da085ac1e43e15996e458f3613d0f11d8c387b2eaeb4302aeeb00d291612bb0c00',
+ },
+ test_3: {
+ // raw key = 'fc51cd8e6218a1a38da47ed00230f0580816ed13ba3303ac5deb911548908025'
+ key: '302a300506032b6570032100fc51cd8e6218a1a38da47ed00230f0580816ed13ba3303ac5deb911548908025',
+ msg: 'af82',
+ sig: '6291d657deec24024827e69c3abe01a30ce548a284743a445e3680d7db5ac3ac18ff9b538d16f290ae67f760984dc6594a7c15e9716ed28dc027beceea1ec40a',
+ },
+ test_4_fail: {
+ key: '302a300506032b6570032100d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a',
+ msg: hexenc('Message'),
+ sig: '8e06163289f37c4e8a15cb3ddcf7379247f7820cea8488531579b32bf8aed7dc5dd4839e800ecc1911a8984344ef281db684b6f538d1c38a0a4570849e32fd02',
+ },
+ };
+
+ for (test in tests) {
+ test_eddsa(pk_openssl(), tests[test]);
+ }
+%}
+-- End --
+
+-- Expect stdout --
+true
+true
+true
+exception
+-- End --
+
+-- Expect stderr --
+-- End --
+
+-- File eddsa.uc --
+export
+function test_eddsa(pk, test)
+{
+ const pkey = test.key;
+ const msg = test.msg;
+ const s = test.sig;
+
+ const data = hexdec(msg);
+ const signature = hexdec(s);
+
+ //pk.set_raw_public_key('ED25519', hexdec(pkey));
+ pk.set_public_key(hexdec(pkey));
+
+ let verify = 'undefined';
+ try {
+ verify = pk.verify(null, data, signature);
+ } catch {
+ verify = 'exception';
+ }
+ print(verify, '\n');
+};
+-- End --
diff --git a/tests/custom/05_crypto/04_keygen b/tests/custom/05_crypto/04_keygen
new file mode 100644
index 0000000..97a94b8
--- /dev/null
+++ b/tests/custom/05_crypto/04_keygen
@@ -0,0 +1,80 @@
+-- Testcase --
+{%
+ import { pk as pk_mbedtls } from 'crypto_mbedtls';
+ import { pk as pk_openssl } from 'crypto_openssl';
+ import { test_keygen } from './files/keygen.uc';
+
+ curves = [
+ 'P-192',
+ 'P-224',
+ 'P-256',
+ 'P-384',
+ 'P-521',
+ 'brainpoolP256r1',
+ 'brainpoolP384r1',
+ 'brainpoolP512r1',
+ 'secp192k1',
+ 'secp224k1',
+ 'secp256k1',
+ ];
+
+
+ for (c in curves) {
+ test_keygen(pk_openssl, pk_mbedtls, "EC", "SHA256", c);
+ test_keygen(pk_mbedtls, pk_openssl, "EC", "SHA256", c);
+ }
+ test_keygen(pk_openssl, pk_mbedtls, "RSA", "SHA256", 2048);
+ test_keygen(pk_mbedtls, pk_openssl, "RSA", "SHA256", 2048);
+
+ test_keygen(pk_openssl, pk_openssl, "ED25519", null);
+%}
+-- End --
+
+-- Expect stdout --
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+true
+-- End --
+
+-- Expect stderr --
+-- End --
+
+-- File keygen.uc --
+export
+function test_keygen(pk_init, other_pk_init, type, md_alg, ...args)
+{
+ let pk = pk_init();
+ let res = pk.keygen(type, ...args);
+ let pkey = pk.get_public_key();
+ const data = "Message";
+ const signature = pk.sign(md_alg, data);
+
+ let other_pk = other_pk_init();
+ other_pk.set_public_key(pkey);
+
+ const verify = other_pk.verify(md_alg, data, signature);
+ print(verify, '\n');
+};
+-- End --