unit-tests: Move test suites to its own subfolder
[strongswan.git] / src / libstrongswan / tests / suites / test_ecdsa.c
1 /*
2 * Copyright (C) 2013 Martin Willi
3 * Copyright (C) 2013 revosec AG
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License as published by the
7 * Free Software Foundation; either version 2 of the License, or (at your
8 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
13 * for more details.
14 */
15
16 #include "test_suite.h"
17
18 #include <plugins/plugin_feature.h>
19
20 /**
21 * Signature schemes to test
22 */
23 static struct {
24 /* key size for scheme, 0 for any */
25 int key_size;
26 signature_scheme_t scheme;
27 } schemes[] = {
28 { 0, SIGN_ECDSA_WITH_SHA1_DER },
29 { 0, SIGN_ECDSA_WITH_SHA256_DER },
30 { 0, SIGN_ECDSA_WITH_SHA384_DER },
31 { 0, SIGN_ECDSA_WITH_SHA512_DER },
32 { 0, SIGN_ECDSA_WITH_NULL },
33 { 256, SIGN_ECDSA_256 },
34 { 384, SIGN_ECDSA_384 },
35 { 521, SIGN_ECDSA_521 },
36 };
37
38 /**
39 * Perform a signature verification "good" test having a keypair
40 */
41 static void test_good_sig(private_key_t *privkey, public_key_t *pubkey)
42 {
43 chunk_t sig, data = chunk_from_chars(0x01,0x02,0x03,0xFD,0xFE,0xFF);
44 int i;
45
46 for (i = 0; i < countof(schemes); i++)
47 {
48 if (!lib->plugins->has_feature(lib->plugins,
49 PLUGIN_PROVIDE(PUBKEY_VERIFY, schemes[i].scheme)) ||
50 !lib->plugins->has_feature(lib->plugins,
51 PLUGIN_PROVIDE(PRIVKEY_SIGN, schemes[i].scheme)))
52 {
53 continue;
54 }
55 if (schemes[i].key_size != 0 &&
56 schemes[i].scheme != privkey->get_keysize(privkey))
57 {
58 continue;
59 }
60 fail_unless(privkey->sign(privkey, schemes[i].scheme, data, &sig),
61 "sign %N", signature_scheme_names, schemes[i].scheme);
62 fail_unless(pubkey->verify(pubkey, schemes[i].scheme, data, sig),
63 "verify %N", signature_scheme_names, schemes[i].scheme);
64 free(sig.ptr);
65 }
66 }
67
68 /**
69 * Some special signatures that should never validate successfully
70 */
71 static chunk_t invalid_sigs[] = {
72 chunk_from_chars(),
73 chunk_from_chars(0x00),
74 chunk_from_chars(0x00,0x00),
75 chunk_from_chars(0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00),
76 chunk_from_chars(0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
77 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00),
78 chunk_from_chars(0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
79 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
80 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00),
81 chunk_from_chars(0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
82 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
83 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
84 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00),
85 chunk_from_chars(0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
86 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
87 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
88 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
89 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
90 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00),
91 chunk_from_chars(0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
92 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
93 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
94 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
95 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
96 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
97 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
98 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00),
99 };
100
101 /**
102 * Check public key that it properly fails against some crafted sigs
103 */
104 static void test_bad_sigs(public_key_t *pubkey)
105 {
106 chunk_t data = chunk_from_chars(0x01,0x02,0x03,0xFD,0xFE,0xFF);
107 int s, i;
108
109 for (s = 0; s < countof(schemes); s++)
110 {
111 if (schemes[s].key_size != 0 &&
112 schemes[s].scheme != pubkey->get_keysize(pubkey))
113 {
114 continue;
115 }
116 if (!lib->plugins->has_feature(lib->plugins,
117 PLUGIN_PROVIDE(PUBKEY_VERIFY, schemes[s].scheme)))
118 {
119 continue;
120 }
121 for (i = 0; i < countof(invalid_sigs); i++)
122 {
123 fail_if(
124 pubkey->verify(pubkey, schemes[s].scheme, data, invalid_sigs[i]),
125 "bad %N sig accepted %B",
126 signature_scheme_names, schemes[s].scheme,
127 &invalid_sigs[i]);
128 }
129 }
130 }
131
132 /**
133 * ECDSA key sizes to test
134 */
135 static int key_sizes[] = {
136 256, 384, 521,
137 };
138
139 START_TEST(test_gen)
140 {
141 private_key_t *privkey;
142 public_key_t *pubkey;
143
144 privkey = lib->creds->create(lib->creds, CRED_PRIVATE_KEY, KEY_ECDSA,
145 BUILD_KEY_SIZE, key_sizes[_i], BUILD_END);
146 ck_assert(privkey != NULL);
147 pubkey = privkey->get_public_key(privkey);
148 ck_assert(pubkey != NULL);
149
150 test_good_sig(privkey, pubkey);
151
152 test_bad_sigs(pubkey);
153
154 pubkey->destroy(pubkey);
155 privkey->destroy(privkey);
156 }
157 END_TEST
158
159 /**
160 * Private keys to load
161 */
162 static chunk_t keys[] = {
163 chunk_from_chars( /* ECDSA-256 */
164 0x30,0x77,0x02,0x01,0x01,0x04,0x20,0x42,0xc6,0x8c,0xff,0x2b,0x8b,0x87,0xa1,0xfb,
165 0x50,0xf6,0xfe,0xd6,0x88,0xb3,0x0a,0x48,0xb2,0xc5,0x8f,0x50,0xe0,0xcf,0x40,0xfa,
166 0x57,0xd1,0xc6,0x6c,0x20,0x64,0xc5,0xa0,0x0a,0x06,0x08,0x2a,0x86,0x48,0xce,0x3d,
167 0x03,0x01,0x07,0xa1,0x44,0x03,0x42,0x00,0x04,0x9c,0xb2,0x52,0xcb,0xc0,0x5c,0xcf,
168 0x97,0xdd,0xd6,0xe7,0x49,0x32,0x47,0x0c,0x8e,0xdb,0x6d,0xbf,0xc8,0x1a,0x0a,0x01,
169 0xe8,0x5e,0x3f,0x8e,0x64,0x33,0xb4,0x15,0xbb,0x1b,0xa5,0xed,0xf9,0x4b,0xa7,0xe8,
170 0x5e,0x6f,0x49,0x24,0xf7,0x32,0xf4,0x9b,0x4c,0x47,0xdc,0xf1,0x28,0x44,0x1c,0x37,
171 0xdb,0xee,0xfb,0xd8,0xbd,0x4e,0x5c,0xeb,0x07),
172 chunk_from_chars( /* ECDSA-384 */
173 0x30,0x81,0xa4,0x02,0x01,0x01,0x04,0x30,0x4b,0xbf,0x6c,0xf5,0x24,0x78,0x53,0x4b,
174 0x1a,0x91,0x23,0xae,0x30,0xc8,0xb3,0xc9,0xc2,0x9b,0x23,0x07,0x10,0x6f,0x1b,0x47,
175 0x7c,0xa0,0xd4,0x79,0x3c,0xc4,0x83,0x10,0xd1,0x44,0x07,0xc2,0x1b,0x66,0xff,0xae,
176 0x76,0x57,0x72,0x90,0x53,0xc2,0xf5,0x29,0xa0,0x07,0x06,0x05,0x2b,0x81,0x04,0x00,
177 0x22,0xa1,0x64,0x03,0x62,0x00,0x04,0x1e,0xcf,0x1c,0x85,0x9d,0x06,0xa0,0x54,0xa2,
178 0x24,0x2f,0xd8,0x63,0x56,0x7b,0x70,0x0b,0x7f,0x81,0x96,0xce,0xb9,0x2e,0x35,0x03,
179 0x9c,0xf9,0x0a,0x5d,0x3b,0x10,0xf7,0x13,0x7a,0x0d,0xca,0x56,0xda,0x1d,0x44,0x84,
180 0x07,0x6f,0x58,0xdc,0x34,0x7b,0x1d,0x4c,0xdd,0x28,0x10,0xc0,0xe2,0xae,0xf4,0xd6,
181 0xda,0xea,0xaf,0xfc,0x7a,0xaf,0x59,0x5f,0xbc,0x91,0x65,0xd3,0x21,0x19,0x61,0xbb,
182 0xfe,0x3c,0xdb,0x47,0xcb,0x7a,0xe7,0x5d,0xbd,0x28,0xde,0x25,0x64,0x9e,0x3a,0xa9,
183 0x18,0xed,0x24,0xe1,0x1f,0x73,0xcc),
184 chunk_from_chars( /* ECDSA-521 */
185 0x30,0x81,0xdc,0x02,0x01,0x01,0x04,0x42,0x01,0xcf,0x38,0xaa,0xa7,0x7a,0x79,0x48,
186 0xa9,0x60,0x55,0x24,0xa8,0x7e,0xe1,0xbc,0x45,0x35,0x16,0xff,0x18,0xce,0x44,0xa2,
187 0x0b,0x72,0x6b,0xca,0x0a,0x40,0xb4,0x97,0x13,0x17,0x90,0x50,0x15,0xb9,0xba,0xfc,
188 0x08,0x0e,0xdb,0xf8,0xfc,0x06,0x35,0x37,0xbf,0xfb,0x25,0x74,0xfe,0x0f,0xe1,0x3c,
189 0x3a,0xf0,0x0d,0xe0,0x52,0x15,0xa8,0x07,0x6f,0x3e,0xa0,0x07,0x06,0x05,0x2b,0x81,
190 0x04,0x00,0x23,0xa1,0x81,0x89,0x03,0x81,0x86,0x00,0x04,0x00,0x56,0x81,0x28,0xd6,
191 0xac,0xe9,0xc8,0x82,0x2c,0xac,0x61,0x6d,0xdd,0x88,0x79,0x00,0xe3,0x7a,0x4d,0x25,
192 0xc4,0xea,0x05,0x80,0x75,0x48,0xbc,0x75,0x73,0xc4,0xe9,0x76,0x68,0xba,0x51,0xc3,
193 0x29,0xce,0x7d,0x1b,0xb0,0x8b,0xac,0xc1,0xcc,0x23,0xa7,0x2d,0xa7,0x2c,0x95,0xf6,
194 0x01,0x40,0x26,0x01,0x1c,0x1c,0x9c,0xe7,0xa7,0xb4,0x0f,0x8e,0xba,0x01,0x07,0xb3,
195 0xf7,0xbe,0x45,0x20,0xa9,0x9e,0x70,0xf0,0xcf,0x9b,0xa0,0x91,0xe3,0x88,0x8f,0x04,
196 0x69,0x3d,0x0f,0x2b,0xf3,0xb4,0x03,0x19,0x89,0xcf,0xfa,0x77,0x04,0x15,0xaf,0xdd,
197 0xf7,0x32,0x76,0x25,0x25,0x05,0x8d,0xfd,0x18,0x8a,0xda,0xd6,0xbc,0x71,0xb8,0x9f,
198 0x39,0xb0,0xaf,0xcc,0x54,0xb0,0x9c,0x4d,0x54,0xfb,0x46,0x53,0x5f,0xf8,0x45),
199 };
200
201 START_TEST(test_load)
202 {
203 private_key_t *privkey;
204 public_key_t *pubkey;
205
206 privkey = lib->creds->create(lib->creds, CRED_PRIVATE_KEY, KEY_ECDSA,
207 BUILD_BLOB_ASN1_DER, keys[_i], BUILD_END);
208 ck_assert(privkey != NULL);
209 pubkey = privkey->get_public_key(privkey);
210 ck_assert(pubkey != NULL);
211
212 test_good_sig(privkey, pubkey);
213
214 test_bad_sigs(pubkey);
215
216 pubkey->destroy(pubkey);
217 privkey->destroy(privkey);
218 }
219 END_TEST
220
221 Suite *ecdsa_suite_create()
222 {
223 Suite *s;
224 TCase *tc;
225
226 s = suite_create("ecdsa");
227
228 tc = tcase_create("generate");
229 tcase_add_loop_test(tc, test_gen, 0, countof(key_sizes));
230 suite_add_tcase(s, tc);
231
232 tc = tcase_create("load");
233 tcase_add_loop_test(tc, test_load, 0, countof(keys));
234 suite_add_tcase(s, tc);
235
236 return s;
237 }