blob: fc1f6fb865002a65968ac159a410093767f5c9df [file] [log] [blame]
Alexander Afanasyevc169a812014-05-20 20:37:29 -04001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Yingdi Yu04020922014-01-22 12:46:53 -08002/**
Alexander Afanasyevaf99f462015-01-19 21:43:09 -08003 * Copyright (c) 2013-2015 Regents of the University of California.
Alexander Afanasyevdfa52c42014-04-24 21:10:11 -07004 *
5 * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
Alexander Afanasyevdfa52c42014-04-24 21:10:11 -07006 *
Alexander Afanasyevc169a812014-05-20 20:37:29 -04007 * ndn-cxx library is free software: you can redistribute it and/or modify it under the
8 * terms of the GNU Lesser General Public License as published by the Free Software
9 * Foundation, either version 3 of the License, or (at your option) any later version.
10 *
11 * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License and GNU Lesser
16 * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
17 * <http://www.gnu.org/licenses/>.
18 *
19 * See AUTHORS.md for complete list of ndn-cxx authors and contributors.
Yingdi Yu04020922014-01-22 12:46:53 -080020 */
21
Yingdi Yuf56c68f2014-04-24 21:50:13 -070022#include "security/sec-tpm-file.hpp"
Alexander Afanasyev09c613f2014-01-29 00:23:58 -080023#include "security/key-chain.hpp"
Junxiao Shi482ccc52014-03-31 13:05:24 -070024#include "security/cryptopp.hpp"
Yingdi Yu04020922014-01-22 12:46:53 -080025
Yingdi Yuf56c68f2014-04-24 21:50:13 -070026#include "util/time.hpp"
27
Yingdi Yu41546342014-11-30 23:37:53 -080028#include <boost/filesystem.hpp>
Alexander Afanasyev258ec2b2014-05-14 16:15:37 -070029#include <boost/lexical_cast.hpp>
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -070030#include "boost-test.hpp"
31
Alexander Afanasyev0abb2da2014-01-30 18:07:57 -080032namespace ndn {
Spyridon Mastorakis429634f2015-02-19 17:35:33 -080033namespace tests {
Yingdi Yu04020922014-01-22 12:46:53 -080034
Spyridon Mastorakis429634f2015-02-19 17:35:33 -080035BOOST_AUTO_TEST_SUITE(SecuritySecTpmFile)
Yingdi Yu04020922014-01-22 12:46:53 -080036
Yingdi Yu7036ce22014-06-19 18:53:37 -070037BOOST_AUTO_TEST_CASE(Delete)
Yingdi Yu28fd32f2014-01-28 19:03:03 -080038{
39 SecTpmFile tpm;
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -070040
Yingdi Yu5e96e002014-04-23 18:32:15 -070041 Name keyName("/TestSecTpmFile/Delete/ksk-" +
Yingdi Yu7036ce22014-06-19 18:53:37 -070042 boost::lexical_cast<std::string>(time::toUnixTimestamp(time::system_clock::now())));
43 RsaKeyParams params(2048);
44 BOOST_CHECK_NO_THROW(tpm.generateKeyPairInTpm(keyName, params));
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -070045
Yingdi Yu28fd32f2014-01-28 19:03:03 -080046 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), true);
47 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), true);
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -070048
Yingdi Yu28fd32f2014-01-28 19:03:03 -080049 tpm.deleteKeyPairInTpm(keyName);
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -070050
Yingdi Yu28fd32f2014-01-28 19:03:03 -080051 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), false);
52 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), false);
53}
54
Yingdi Yu7036ce22014-06-19 18:53:37 -070055BOOST_AUTO_TEST_CASE(SignVerify)
Yingdi Yu04020922014-01-22 12:46:53 -080056{
57 SecTpmFile tpm;
58
Yingdi Yu5e96e002014-04-23 18:32:15 -070059 Name keyName("/TestSecTpmFile/SignVerify/ksk-" +
Yingdi Yu7036ce22014-06-19 18:53:37 -070060 boost::lexical_cast<std::string>(time::toUnixTimestamp(time::system_clock::now())));
61 RsaKeyParams params(2048);
62 BOOST_CHECK_NO_THROW(tpm.generateKeyPairInTpm(keyName, params));
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -070063
Yingdi Yu04020922014-01-22 12:46:53 -080064 Data data("/tmp/test/1");
65 const uint8_t content[] = {0x01, 0x02, 0x03, 0x04};
66
Yingdi Yu2e57a582014-02-20 23:34:43 -080067 Block sigBlock;
Yingdi Yu5e96e002014-04-23 18:32:15 -070068 BOOST_CHECK_NO_THROW(sigBlock = tpm.signInTpm(content, sizeof(content),
69 keyName, DIGEST_ALGORITHM_SHA256));
Yingdi Yu7036ce22014-06-19 18:53:37 -070070 shared_ptr<PublicKey> publicKey;
71 BOOST_CHECK_NO_THROW(publicKey = tpm.getPublicKeyFromTpm(keyName));
Yingdi Yu04020922014-01-22 12:46:53 -080072
Yingdi Yu2e57a582014-02-20 23:34:43 -080073 try
74 {
75 using namespace CryptoPP;
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -070076
Yingdi Yu7036ce22014-06-19 18:53:37 -070077 RSA::PublicKey rsaPublicKey;
Yingdi Yu2e57a582014-02-20 23:34:43 -080078 ByteQueue queue;
Yingdi Yu7036ce22014-06-19 18:53:37 -070079 queue.Put(reinterpret_cast<const byte*>(publicKey->get().buf()), publicKey->get().size());
80 rsaPublicKey.Load(queue);
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -070081
Yingdi Yu7036ce22014-06-19 18:53:37 -070082 RSASS<PKCS1v15, SHA256>::Verifier verifier(rsaPublicKey);
Yingdi Yu2e57a582014-02-20 23:34:43 -080083 bool result = verifier.VerifyMessage(content, sizeof(content),
Yingdi Yu5e96e002014-04-23 18:32:15 -070084 sigBlock.value(), sigBlock.value_size());
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -070085
Yingdi Yu2e57a582014-02-20 23:34:43 -080086 BOOST_CHECK_EQUAL(result, true);
87 }
Yingdi Yu5e96e002014-04-23 18:32:15 -070088 catch (CryptoPP::Exception& e)
Yingdi Yu2e57a582014-02-20 23:34:43 -080089 {
90 BOOST_CHECK(false);
91 }
Yingdi Yu04020922014-01-22 12:46:53 -080092
Yingdi Yu28fd32f2014-01-28 19:03:03 -080093 tpm.deleteKeyPairInTpm(keyName);
Yingdi Yu04020922014-01-22 12:46:53 -080094}
95
Yingdi Yu7036ce22014-06-19 18:53:37 -070096BOOST_AUTO_TEST_CASE(RandomGenerator)
Yingdi Yu4b752752014-02-18 12:24:03 -080097{
98 SecTpmFile tpm;
99
100 size_t scale = 1000;
101 size_t size = 256 * scale;
102 uint8_t* block = new uint8_t[size];
103 tpm.generateRandomBlock(block, size);
104
Yingdi Yu7036ce22014-06-19 18:53:37 -0700105 std::map<uint8_t, int> counter;
106 for (size_t i = 0; i < size; i++)
107 {
108 counter[block[i]] += 1;
109 }
Yingdi Yu4b752752014-02-18 12:24:03 -0800110
111 float dev = 0.0;
Yingdi Yu7036ce22014-06-19 18:53:37 -0700112 for (size_t i = 0; i != 255; i++)
113 {
114 dev += ((counter[i] - scale) * (counter[i] - scale)) * 1.0 / (scale * scale);
115 }
Yingdi Yu4b752752014-02-18 12:24:03 -0800116
117 BOOST_CHECK_CLOSE(dev / 256, 0.001, 100);
118
119}
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800120
Yingdi Yu7036ce22014-06-19 18:53:37 -0700121BOOST_AUTO_TEST_CASE(ImportExportKey)
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800122{
123 using namespace CryptoPP;
124
Yingdi Yu7036ce22014-06-19 18:53:37 -0700125 std::string imported =
126"MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIIJzwsbTIVqgCAggAMBQGCCqG"
127"SIb3DQMHBAiEsSKdgGkCEQSCBMjaYsEeHM/EPzGNDAPaSxE1ASKxjyNkXEVPQbtGx/ju1PlQ"
128"QakTCzPpia8ziVGihrVfuacHrxxbLh+ufNZtbVVsv9kGQL2g15BN2Nic8VqyTxplKrduFkEb"
129"eOipqu627gb6eTsrSj7kubXfs/w9OAdhRZFaEc7I/S6rcPUaDai4i3O03VuvuTOrzZL/unhD"
130"CDzOa3pr2aUQlO/5Pck6GbSYL1/4aW/fB7djZrZAjsGPTqIYpPa16oWlrzsILQ4650Zlvdn8"
131"feh6elTrA4qy6RljZfhIHxzGAeuGbVVLT7zavs01y+QE88sxPpeZ0RGtlVxCYp+xoB5hOO/x"
132"Xm3n0r+HVIaBV9rHLuUSUiHVAtzwuOj/XKh7YBNXeF58lcv8Npsx10etrPuV5hRQelYirKo1"
133"QbT+Aq7sLdWI09eGClDHjvRgw54lCFEUAVUFLxhBnzfVUfw/UiR2SheixH+c7cY3gOOvSMQh"
134"1oL9Omii4S6yhzfbD3hRN/wBKC0NgiIOLRR+Ti0mEEbTxYQrVcHC9rpRcnr1fFAiQvOXrOw0"
135"HyxsbnOeYpoURgLJmUyItPi09xUMCHwUPZ/sI6aG5eRqVUGgcYaQib7MBbGG/D2PlWaKZx1w"
136"iEYtYUI7rrc7Qc2ltp4i1u46ZLtSOxUi8kM7qK2Yp1AOtcWFlGn0XBXpGsHanZRzs8KzfDjQ"
137"OPmRIuFXFmuJweqUGmg6c8P3wHYueenB4oowYELYaDwmmV96obXMG5hbsKne5kcem875d6K+"
138"hL2QzjAl+na4tUZyXYXDdUO2lgTT8IItujBn6c+b8vDcZ24NcYyWPHHb16J4uvKi/6Zb245g"
139"/N0NC6hB43KE+2F0BH0eyXRzCnen6AjF8nvx/wgYrXsFlsU47P8gaL1e7V6QECkY4vIk6//b"
140"LINmpcgZoAv23fgjvYYTMfS/IyPsooS5DJarbHzbsgAWOuqP2ewYulrKqLi0vaUyoErRedQC"
141"8J5p9c4KF56++ameiwxbyKnDynHIIFCOM8eamLnDH4VvU9E2mtfZxmi8kWDWx/NhKEK9zbQv"
142"WuaGDpOysgPK4myTp2QGQNQDvBB92gMcrVTcY//3OGHSXeJrkUfDKLOUDyz7ROghEt1vpRTL"
143"j9Xdbm/01O/0MLBqyXDY119b1qAVVY7Y2CxRIRFdw2V76INWNIwPi46t/VUGwMBGmEux8S8+"
144"79Mv7UyGhKvSUr88pWCS1KdSz1HhN1VWjDvyXPyg96+SecpZMwXCdkUCLdLdD3/8rJLt7wS5"
145"3K5/1V4sacds8GHx7NckhQ/KV0VDlUEFuaOCS4Sd3XXetXs4IFSqtKH+Rn0jX7d8Igcw7X2b"
146"eaV1gxOVquDEwLDT5+wXURw96ahq0caL/4YfoBUQIOQ6HGtPTWJz1Yax0pGu9F30VEY/ObrK"
147"L/B6peJKfqhQGJ+MObqOiP6yHBZH75EImLAkksSVmREdNVjwWkz9D9vzPoAnmP8sQ3/NZarB"
148"Ak+ynQjc19t+CCecPrS2Tlh0cJZkHRiGFF7J5a3ci7yBvg3HfD86AXMRBQuSG1UG8TrzC6BK"
149"+qIQ8DWecQwBMZ3nv/Flo2Fejd/G4/wWe6ObMytC5SB8pJNOq9ri0Ff6Zh3rPrwaSv1PPgFJ"
150"GOw=";
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800151
Yingdi Yu7036ce22014-06-19 18:53:37 -0700152 std::string decoded;
Yingdi Yu5e96e002014-04-23 18:32:15 -0700153 BOOST_CHECK_NO_THROW(StringSource source(imported,
154 true,
Yingdi Yu7036ce22014-06-19 18:53:37 -0700155 new Base64Decoder(new StringSink(decoded))));
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800156
157 SecTpmFile tpm;
158
Yingdi Yu5e96e002014-04-23 18:32:15 -0700159 Name keyName("/TestSecTpmFile/ImportKey/ksk-" +
Yingdi Yu7036ce22014-06-19 18:53:37 -0700160 boost::lexical_cast<std::string>(time::toUnixTimestamp(time::system_clock::now())));
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800161
Yingdi Yu7036ce22014-06-19 18:53:37 -0700162 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), false);
163 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), false);
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -0700164
Yingdi Yu5e96e002014-04-23 18:32:15 -0700165 BOOST_REQUIRE_NO_THROW(
166 tpm.importPrivateKeyPkcs5IntoTpm(keyName,
167 reinterpret_cast<const uint8_t*>(decoded.c_str()),
168 decoded.size(),
169 "1234"));
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800170
Yingdi Yu7036ce22014-06-19 18:53:37 -0700171 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), true);
172 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), true);
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800173
Yingdi Yu7036ce22014-06-19 18:53:37 -0700174 shared_ptr<PublicKey> publicKey;
175 BOOST_CHECK_NO_THROW(publicKey = tpm.getPublicKeyFromTpm(keyName));
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800176
177 const uint8_t content[] = {0x01, 0x02, 0x03, 0x04};
Yingdi Yu2e57a582014-02-20 23:34:43 -0800178 Block sigBlock;
Yingdi Yu5e96e002014-04-23 18:32:15 -0700179 BOOST_CHECK_NO_THROW(sigBlock = tpm.signInTpm(content, sizeof(content),
180 keyName, DIGEST_ALGORITHM_SHA256));
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800181
Yingdi Yu2e57a582014-02-20 23:34:43 -0800182 try
183 {
184 using namespace CryptoPP;
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -0700185
Yingdi Yu7036ce22014-06-19 18:53:37 -0700186 RSA::PublicKey rsaPublicKey;
Yingdi Yu2e57a582014-02-20 23:34:43 -0800187 ByteQueue queue;
Yingdi Yu7036ce22014-06-19 18:53:37 -0700188 queue.Put(reinterpret_cast<const byte*>(publicKey->get().buf()), publicKey->get().size());
189 rsaPublicKey.Load(queue);
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -0700190
Yingdi Yu7036ce22014-06-19 18:53:37 -0700191 RSASS<PKCS1v15, SHA256>::Verifier verifier(rsaPublicKey);
192 bool isVerified = verifier.VerifyMessage(content, sizeof(content),
193 sigBlock.value(), sigBlock.value_size());
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -0700194
Yingdi Yu7036ce22014-06-19 18:53:37 -0700195 BOOST_CHECK_EQUAL(isVerified, true);
Yingdi Yu2e57a582014-02-20 23:34:43 -0800196 }
Yingdi Yu5e96e002014-04-23 18:32:15 -0700197 catch (CryptoPP::Exception& e)
Yingdi Yu2e57a582014-02-20 23:34:43 -0800198 {
199 BOOST_CHECK(false);
200 }
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800201
Yingdi Yu2e57a582014-02-20 23:34:43 -0800202 ConstBufferPtr exported;
Yingdi Yu5e96e002014-04-23 18:32:15 -0700203 BOOST_CHECK_NO_THROW(exported = tpm.exportPrivateKeyPkcs5FromTpm(keyName, "5678"));
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800204
205 tpm.deleteKeyPairInTpm(keyName);
206
Yingdi Yu7036ce22014-06-19 18:53:37 -0700207 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), false);
208 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), false);
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800209
Yingdi Yu5e96e002014-04-23 18:32:15 -0700210 BOOST_REQUIRE(tpm.importPrivateKeyPkcs5IntoTpm(keyName, exported->buf(), exported->size(),
211 "5678"));
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -0700212
Yingdi Yu7036ce22014-06-19 18:53:37 -0700213 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), true);
214 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), true);
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -0700215
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800216 const uint8_t content2[] = {0x05, 0x06, 0x07, 0x08};
Yingdi Yu2e57a582014-02-20 23:34:43 -0800217 Block sigBlock2;
Yingdi Yu5e96e002014-04-23 18:32:15 -0700218 BOOST_CHECK_NO_THROW(sigBlock2 = tpm.signInTpm(content2, sizeof(content2),
219 keyName, DIGEST_ALGORITHM_SHA256));
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800220
Yingdi Yu2e57a582014-02-20 23:34:43 -0800221 try
222 {
223 using namespace CryptoPP;
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -0700224
Yingdi Yu7036ce22014-06-19 18:53:37 -0700225 RSA::PublicKey rsaPublicKey;
Yingdi Yu2e57a582014-02-20 23:34:43 -0800226 ByteQueue queue;
Yingdi Yu7036ce22014-06-19 18:53:37 -0700227 queue.Put(reinterpret_cast<const byte*>(publicKey->get().buf()), publicKey->get().size());
228 rsaPublicKey.Load(queue);
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800229
Yingdi Yu7036ce22014-06-19 18:53:37 -0700230 RSASS<PKCS1v15, SHA256>::Verifier verifier(rsaPublicKey);
231 bool isVerified = verifier.VerifyMessage(content2, sizeof(content2),
232 sigBlock2.value(), sigBlock2.value_size());
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -0700233
Yingdi Yu7036ce22014-06-19 18:53:37 -0700234 BOOST_CHECK_EQUAL(isVerified, true);
Yingdi Yu2e57a582014-02-20 23:34:43 -0800235 }
Yingdi Yu5e96e002014-04-23 18:32:15 -0700236 catch (CryptoPP::Exception& e)
Yingdi Yu2e57a582014-02-20 23:34:43 -0800237 {
238 BOOST_CHECK(false);
239 }
Alexander Afanasyevb1db7c62014-04-03 14:57:25 -0700240
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800241 tpm.deleteKeyPairInTpm(keyName);
242
Yingdi Yu7036ce22014-06-19 18:53:37 -0700243 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), false);
244 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), false);
Yingdi Yu8dceb1d2014-02-18 12:45:10 -0800245}
246
Yingdi Yuc8f883c2014-06-20 23:25:22 -0700247BOOST_AUTO_TEST_CASE(EcdsaSigning)
248{
249 SecTpmFile tpm;
250
251 Name keyName("/TestSecTpmFile/EcdsaSigning/ksk-" +
252 boost::lexical_cast<std::string>(time::toUnixTimestamp(time::system_clock::now())));
253 EcdsaKeyParams params;
254 BOOST_CHECK_NO_THROW(tpm.generateKeyPairInTpm(keyName, params));
255
256 Data data("/TestSecTpmFile/EcdsaSigning/Data/1");
257 const uint8_t content[] = {0x01, 0x02, 0x03, 0x04};
258
259 Block sigBlock;
260 BOOST_CHECK_NO_THROW(sigBlock = tpm.signInTpm(content, sizeof(content),
261 keyName, DIGEST_ALGORITHM_SHA256));
262
263 shared_ptr<PublicKey> pubkeyPtr;
264 BOOST_CHECK_NO_THROW(pubkeyPtr = tpm.getPublicKeyFromTpm(keyName));
265
266 try
267 {
268 using namespace CryptoPP;
269
270 ECDSA<ECP, SHA256>::PublicKey publicKey;
271 ByteQueue queue;
272 queue.Put(reinterpret_cast<const byte*>(pubkeyPtr->get().buf()), pubkeyPtr->get().size());
273 publicKey.Load(queue);
274
275 uint8_t buffer[64];
276 size_t usedSize = DSAConvertSignatureFormat(buffer, 64, DSA_P1363,
277 sigBlock.value(), sigBlock.value_size(), DSA_DER);
278
279 ECDSA<ECP, SHA256>::Verifier verifier(publicKey);
280 bool result = verifier.VerifyMessage(content, sizeof(content),
281 buffer, usedSize);
282
283 BOOST_CHECK_EQUAL(result, true);
284 }
285 catch (CryptoPP::Exception& e)
286 {
287 BOOST_CHECK(false);
288 }
289
290 tpm.deleteKeyPairInTpm(keyName);
291}
292
Yingdi Yu9d9d5992014-06-25 12:25:16 -0700293
294BOOST_AUTO_TEST_CASE(ImportExportEcdsaKey)
295{
296 using namespace CryptoPP;
297
298 std::string imported =
299 "MIGMMEAGCSqGSIb3DQEFDTAzMBsGCSqGSIb3DQEFDDAOBAhqkJiLfzFWtQICCAAw"
300 "FAYIKoZIhvcNAwcECJ1HLtP8OZC6BEgNv9OH2mZdbkxvqTVlRBkUqPbbP3580OG6"
301 "f0htqWSRppcb4IEKYfuPt2qPCYKL2GcAN2pU3eJqhiM7LFTSFaxgBRFozzIwusk=";
302
303 std::string decoded;
304 BOOST_CHECK_NO_THROW(StringSource source(imported,
305 true,
306 new Base64Decoder(new StringSink(decoded))));
307
308 SecTpmFile tpm;
309
310 Name keyName("/TestSecTpmFile/ImportExportEcdsaKey/ksk-" +
311 boost::lexical_cast<std::string>(time::toUnixTimestamp(time::system_clock::now())));
312
313 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), false);
314 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), false);
315
316 BOOST_REQUIRE_NO_THROW(
317 tpm.importPrivateKeyPkcs5IntoTpm(keyName,
318 reinterpret_cast<const uint8_t*>(decoded.c_str()),
319 decoded.size(),
320 "5678"));
321
322 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), true);
323 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), true);
324
325 shared_ptr<PublicKey> publicKey;
326 BOOST_CHECK_NO_THROW(publicKey = tpm.getPublicKeyFromTpm(keyName));
327
328 const uint8_t content[] = {0x01, 0x02, 0x03, 0x04};
329 Block sigBlock;
330 BOOST_CHECK_NO_THROW(sigBlock = tpm.signInTpm(content, sizeof(content),
331 keyName, DIGEST_ALGORITHM_SHA256));
332
333 try
334 {
335 using namespace CryptoPP;
336
337 ECDSA<ECP, SHA256>::PublicKey ecdsaPublicKey;
338 ByteQueue queue;
339 queue.Put(reinterpret_cast<const byte*>(publicKey->get().buf()), publicKey->get().size());
340 ecdsaPublicKey.Load(queue);
341
342 uint8_t buffer[64];
343 size_t usedSize = DSAConvertSignatureFormat(buffer, 64, DSA_P1363,
344 sigBlock.value(), sigBlock.value_size(), DSA_DER);
345
346 ECDSA<ECP, SHA256>::Verifier verifier(ecdsaPublicKey);
347 bool isVerified = verifier.VerifyMessage(content, sizeof(content),
348 buffer, usedSize);
349
350 BOOST_CHECK_EQUAL(isVerified, true);
351 }
352 catch (CryptoPP::Exception& e)
353 {
354 BOOST_CHECK(false);
355 }
356
357 ConstBufferPtr exported;
358 BOOST_CHECK_NO_THROW(exported = tpm.exportPrivateKeyPkcs5FromTpm(keyName, "1234"));
359
360 tpm.deleteKeyPairInTpm(keyName);
361
362 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), false);
363 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), false);
364
365 BOOST_REQUIRE(tpm.importPrivateKeyPkcs5IntoTpm(keyName, exported->buf(), exported->size(),
366 "1234"));
367
368 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), true);
369 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), true);
370
371 const uint8_t content2[] = {0x05, 0x06, 0x07, 0x08};
372 Block sigBlock2;
373 BOOST_CHECK_NO_THROW(sigBlock2 = tpm.signInTpm(content2, sizeof(content2),
374 keyName, DIGEST_ALGORITHM_SHA256));
375
376 try
377 {
378 using namespace CryptoPP;
379
380 ECDSA<ECP, SHA256>::PublicKey ecdsaPublicKey;
381 ByteQueue queue;
382 queue.Put(reinterpret_cast<const byte*>(publicKey->get().buf()), publicKey->get().size());
383 ecdsaPublicKey.Load(queue);
384
385 uint8_t buffer[64];
386 size_t usedSize = DSAConvertSignatureFormat(buffer, 64, DSA_P1363,
387 sigBlock2.value(), sigBlock2.value_size(),
388 DSA_DER);
389
390 ECDSA<ECP, SHA256>::Verifier verifier(ecdsaPublicKey);
391 bool isVerified = verifier.VerifyMessage(content2, sizeof(content2),
392 buffer, usedSize);
393
394 BOOST_CHECK_EQUAL(isVerified, true);
395
396 }
397 catch (CryptoPP::Exception& e)
398 {
399 BOOST_CHECK(false);
400 }
401
402 tpm.deleteKeyPairInTpm(keyName);
403
404 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PRIVATE), false);
405 BOOST_REQUIRE_EQUAL(tpm.doesKeyExistInTpm(keyName, KEY_CLASS_PUBLIC), false);
406}
407
Yingdi Yu04020922014-01-22 12:46:53 -0800408BOOST_AUTO_TEST_SUITE_END()
Alexander Afanasyev0abb2da2014-01-30 18:07:57 -0800409
Spyridon Mastorakis429634f2015-02-19 17:35:33 -0800410} // namespace tests
Alexander Afanasyev0abb2da2014-01-30 18:07:57 -0800411} // namespace ndn