Change-Id: Ib65febca30ce312f2c8fd6d6dbc85f24987b50d8 Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/62245 Auto-Submit: Bob Beck <bbe@google.com> Reviewed-by: David Benjamin <davidben@google.com> Commit-Queue: David Benjamin <davidben@google.com>
109 lines
3.4 KiB
C++
109 lines
3.4 KiB
C++
// Copyright 2017 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
#include "simple_path_builder_delegate.h"
|
|
|
|
#include <memory>
|
|
#include <set>
|
|
|
|
#include "cert_errors.h"
|
|
#include "signature_algorithm.h"
|
|
#include "test_helpers.h"
|
|
#include "verify_signed_data.h"
|
|
#include "input.h"
|
|
#include "parse_values.h"
|
|
#include "parser.h"
|
|
#include <gtest/gtest.h>
|
|
#include <openssl/nid.h>
|
|
|
|
namespace bssl {
|
|
|
|
namespace {
|
|
|
|
// Reads the public key and algorithm from the test data at |file_name|.
|
|
void ReadTestCase(const char* file_name,
|
|
SignatureAlgorithm* signature_algorithm,
|
|
bssl::UniquePtr<EVP_PKEY>* public_key) {
|
|
std::string path =
|
|
std::string("testdata/verify_signed_data_unittest/") + file_name;
|
|
|
|
std::string public_key_str;
|
|
std::string algorithm_str;
|
|
|
|
const PemBlockMapping mappings[] = {
|
|
{"PUBLIC KEY", &public_key_str},
|
|
{"ALGORITHM", &algorithm_str},
|
|
};
|
|
|
|
ASSERT_TRUE(ReadTestDataFromPemFile(path, mappings));
|
|
|
|
std::optional<SignatureAlgorithm> sigalg_opt =
|
|
ParseSignatureAlgorithm(der::Input(algorithm_str));
|
|
ASSERT_TRUE(sigalg_opt);
|
|
*signature_algorithm = *sigalg_opt;
|
|
|
|
ASSERT_TRUE(ParsePublicKey(der::Input(public_key_str), public_key));
|
|
}
|
|
|
|
class SimplePathBuilderDelegate1024SuccessTest
|
|
: public ::testing::TestWithParam<const char*> {};
|
|
|
|
const char* kSuccess1024Filenames[] = {
|
|
"rsa-pkcs1-sha1.pem", "rsa-pkcs1-sha256.pem",
|
|
"rsa2048-pkcs1-sha512.pem", "ecdsa-secp384r1-sha256.pem",
|
|
"ecdsa-prime256v1-sha512.pem", "rsa-pss-sha256.pem",
|
|
"ecdsa-secp384r1-sha256.pem", "ecdsa-prime256v1-sha512.pem",
|
|
};
|
|
|
|
INSTANTIATE_TEST_SUITE_P(All,
|
|
SimplePathBuilderDelegate1024SuccessTest,
|
|
::testing::ValuesIn(kSuccess1024Filenames));
|
|
|
|
TEST_P(SimplePathBuilderDelegate1024SuccessTest, IsAcceptableSignatureAndKey) {
|
|
SignatureAlgorithm signature_algorithm{};
|
|
bssl::UniquePtr<EVP_PKEY> public_key;
|
|
ASSERT_NO_FATAL_FAILURE(
|
|
ReadTestCase(GetParam(), &signature_algorithm, &public_key));
|
|
ASSERT_TRUE(public_key);
|
|
|
|
CertErrors errors;
|
|
SimplePathBuilderDelegate delegate(
|
|
1024, SimplePathBuilderDelegate::DigestPolicy::kWeakAllowSha1);
|
|
|
|
EXPECT_TRUE(
|
|
delegate.IsSignatureAlgorithmAcceptable(signature_algorithm, &errors));
|
|
|
|
EXPECT_TRUE(delegate.IsPublicKeyAcceptable(public_key.get(), &errors));
|
|
}
|
|
|
|
class SimplePathBuilderDelegate2048FailTest
|
|
: public ::testing::TestWithParam<const char*> {};
|
|
|
|
const char* kFail2048Filenames[] = {"rsa-pkcs1-sha1.pem",
|
|
"rsa-pkcs1-sha256.pem"};
|
|
|
|
INSTANTIATE_TEST_SUITE_P(All,
|
|
SimplePathBuilderDelegate2048FailTest,
|
|
::testing::ValuesIn(kFail2048Filenames));
|
|
|
|
TEST_P(SimplePathBuilderDelegate2048FailTest, RsaKeySmallerThan2048) {
|
|
SignatureAlgorithm signature_algorithm{};
|
|
bssl::UniquePtr<EVP_PKEY> public_key;
|
|
ASSERT_NO_FATAL_FAILURE(
|
|
ReadTestCase(GetParam(), &signature_algorithm, &public_key));
|
|
ASSERT_TRUE(public_key);
|
|
|
|
CertErrors errors;
|
|
SimplePathBuilderDelegate delegate(
|
|
2048, SimplePathBuilderDelegate::DigestPolicy::kWeakAllowSha1);
|
|
|
|
EXPECT_TRUE(
|
|
delegate.IsSignatureAlgorithmAcceptable(signature_algorithm, &errors));
|
|
|
|
EXPECT_FALSE(delegate.IsPublicKeyAcceptable(public_key.get(), &errors));
|
|
}
|
|
|
|
} // namespace
|
|
|
|
} // namespace net
|