blob: f9a511d630297b4e6a09d9dce2b0f4f33f7fdca2 [file] [log] [blame]
Yingdi Yu202a2e92015-07-12 16:49:25 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Davide Pesaventoa84f4642017-08-23 16:14:51 -04002/*
Davide Pesavento47ce2ee2023-05-09 01:33:33 -04003 * Copyright (c) 2013-2023 Regents of the University of California.
Yingdi Yu202a2e92015-07-12 16:49:25 -07004 *
5 * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
6 *
7 * ndn-cxx library is free software: you can redistribute it and/or modify it under the
8 * terms of the GNU Lesser General Public License as published by the Free Software
9 * Foundation, either version 3 of the License, or (at your option) any later version.
10 *
11 * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License and GNU Lesser
16 * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
17 * <http://www.gnu.org/licenses/>.
18 *
19 * See AUTHORS.md for complete list of ndn-cxx authors and contributors.
20 */
21
Davide Pesavento7e780642018-11-24 15:51:34 -050022#include "ndn-cxx/security/transform/private-key.hpp"
Davide Pesaventof45fa212017-09-14 17:23:56 -040023
Davide Pesavento7e780642018-11-24 15:51:34 -050024#include "ndn-cxx/encoding/buffer-stream.hpp"
25#include "ndn-cxx/security/key-params.hpp"
Laqin Fan0fe72ea2019-05-22 16:42:59 -050026#include "ndn-cxx/security/transform/base64-decode.hpp"
27#include "ndn-cxx/security/transform/bool-sink.hpp"
28#include "ndn-cxx/security/transform/buffer-source.hpp"
29#include "ndn-cxx/security/transform/public-key.hpp"
30#include "ndn-cxx/security/transform/signer-filter.hpp"
31#include "ndn-cxx/security/transform/stream-sink.hpp"
32#include "ndn-cxx/security/transform/verifier-filter.hpp"
Junxiao Shifbb69902020-04-24 08:39:18 +000033#include "ndn-cxx/util/string-helper.hpp"
Yingdi Yu202a2e92015-07-12 16:49:25 -070034
Davide Pesavento7e780642018-11-24 15:51:34 -050035#include "tests/boost-test.hpp"
36
Davide Pesavento80d671f2022-06-08 04:04:52 -040037#include <openssl/opensslv.h>
Luca Keidel941fd8c2017-07-24 15:21:22 +020038#include <boost/mpl/vector.hpp>
Davide Pesaventoa84f4642017-08-23 16:14:51 -040039#include <sstream>
Yingdi Yu202a2e92015-07-12 16:49:25 -070040
Davide Pesavento47ce2ee2023-05-09 01:33:33 -040041namespace ndn::tests {
42
43using namespace ndn::security::transform;
Yingdi Yu202a2e92015-07-12 16:49:25 -070044
45BOOST_AUTO_TEST_SUITE(Security)
46BOOST_AUTO_TEST_SUITE(Transform)
47BOOST_AUTO_TEST_SUITE(TestPrivateKey)
48
Davide Pesavento1bac1112019-06-13 21:48:46 -040049BOOST_AUTO_TEST_CASE(Empty)
50{
51 // test invoking member functions on an empty (default-constructed) PrivateKey
52 PrivateKey sKey;
53 BOOST_CHECK_EQUAL(sKey.getKeyType(), KeyType::NONE);
54 BOOST_CHECK_EQUAL(sKey.getKeySize(), 0);
laqinfan56a812d2019-06-03 15:33:58 -050055 BOOST_CHECK_THROW(sKey.getKeyDigest(DigestAlgorithm::SHA256), PrivateKey::Error);
Davide Pesavento1bac1112019-06-13 21:48:46 -040056 BOOST_CHECK_THROW(sKey.derivePublicKey(), PrivateKey::Error);
Davide Pesavento765abc92021-12-27 00:44:04 -050057 BOOST_CHECK_THROW(sKey.decrypt({}), PrivateKey::Error);
Davide Pesavento1bac1112019-06-13 21:48:46 -040058 std::ostringstream os;
59 BOOST_CHECK_THROW(sKey.savePkcs1(os), PrivateKey::Error);
60 std::string passwd("password");
61 BOOST_CHECK_THROW(sKey.savePkcs8(os, passwd.data(), passwd.size()), PrivateKey::Error);
62}
63
Davide Pesavento94dfcf12021-09-26 14:18:45 -040064#if OPENSSL_VERSION_NUMBER < 0x30000000L // FIXME #5154
laqinfan56a812d2019-06-03 15:33:58 -050065BOOST_AUTO_TEST_CASE(KeyDigest)
66{
67 const Buffer buf(16);
68 PrivateKey sKey;
Davide Pesavento765abc92021-12-27 00:44:04 -050069 sKey.loadRaw(KeyType::HMAC, buf);
laqinfan56a812d2019-06-03 15:33:58 -050070 auto digest = sKey.getKeyDigest(DigestAlgorithm::SHA256);
71
72 const uint8_t expected[] = {
73 0x37, 0x47, 0x08, 0xff, 0xf7, 0x71, 0x9d, 0xd5, 0x97, 0x9e, 0xc8, 0x75, 0xd5, 0x6c, 0xd2, 0x28,
74 0x6f, 0x6d, 0x3c, 0xf7, 0xec, 0x31, 0x7a, 0x3b, 0x25, 0x63, 0x2a, 0xab, 0x28, 0xec, 0x37, 0xbb,
75 };
76 BOOST_CHECK_EQUAL_COLLECTIONS(digest->begin(), digest->end(),
77 expected, expected + sizeof(expected));
78}
Davide Pesavento94dfcf12021-09-26 14:18:45 -040079#endif
laqinfan56a812d2019-06-03 15:33:58 -050080
laqinfan48f97242019-06-03 15:33:58 -050081BOOST_AUTO_TEST_CASE(LoadRaw)
82{
83 const Buffer buf(32);
84 PrivateKey sKey;
Davide Pesavento765abc92021-12-27 00:44:04 -050085 sKey.loadRaw(KeyType::HMAC, buf);
Davide Pesavento94dfcf12021-09-26 14:18:45 -040086#if OPENSSL_VERSION_NUMBER < 0x30000000L // FIXME #5154
laqinfan48f97242019-06-03 15:33:58 -050087 BOOST_CHECK_EQUAL(sKey.getKeyType(), KeyType::HMAC);
88 BOOST_CHECK_EQUAL(sKey.getKeySize(), 256);
Davide Pesavento94dfcf12021-09-26 14:18:45 -040089#endif
laqinfan48f97242019-06-03 15:33:58 -050090
91 PrivateKey sKey2;
Davide Pesavento765abc92021-12-27 00:44:04 -050092 BOOST_CHECK_THROW(sKey2.loadRaw(KeyType::NONE, buf), std::invalid_argument);
93 BOOST_CHECK_THROW(sKey2.loadRaw(KeyType::RSA, buf), std::invalid_argument);
94 BOOST_CHECK_THROW(sKey2.loadRaw(KeyType::EC, buf), std::invalid_argument);
95 BOOST_CHECK_THROW(sKey2.loadRaw(KeyType::AES, buf), std::invalid_argument);
laqinfan48f97242019-06-03 15:33:58 -050096}
97
Davide Pesaventoea9e43e2021-09-20 00:45:03 -040098struct RsaKey_DesEncrypted
Yingdi Yu202a2e92015-07-12 16:49:25 -070099{
Davide Pesavento1bac1112019-06-13 21:48:46 -0400100 const size_t keySize = 2048;
Davide Pesaventof45fa212017-09-14 17:23:56 -0400101 const std::string privateKeyPkcs1 =
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400102R"PEM(MIIEpAIBAAKCAQEAw0WM1/WhAxyLtEqsiAJgWDZWuzkYpeYVdeeZcqRZzzfRgBQT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127)PEM";
Davide Pesaventof45fa212017-09-14 17:23:56 -0400128 const std::string privateKeyPkcs8 =
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400129R"PEM(MIIFCzA9BgkqhkiG9w0BBQ0wMDAbBgkqhkiG9w0BBQwwDgQIOKYJXvB6p8kCAggA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=
156)PEM";
157 const std::string publicKey =
158R"PEM(MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw0WM1/WhAxyLtEqsiAJg
159WDZWuzkYpeYVdeeZcqRZzzfRgBQTsNozS5t4HnwTZhwwXbH7k3QN0kRTV826Xobw
160s3iigohnM9yTK+KKiayPhIAm/+5HGT6SgFJhYhqo1/upWdueojil6RP4/AgavHho
161pxlAVbk6G9VdVnlQcQ5Zv0OcGi73c+EnYD/YgURYGSngUi/Ynsh779p2U69/te9g
162ZwIL5PuE9BiO6I39cL9z7EK1SfZhOWvDe/qH7YhD/BHwcWit8FjRww1glwRVTJsA
1639rH58ynaAix0tcR/nBMRLUX+e3rURHg6UbSjJbdb9qmKM1fTGHKUzL/5pMG6uBU0
164ywIDAQAB
165)PEM";
Yingdi Yu202a2e92015-07-12 16:49:25 -0700166};
167
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400168struct RsaKey_Aes256Encrypted
Yingdi Yu202a2e92015-07-12 16:49:25 -0700169{
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400170 // Generated with OpenSSL 3.0.0
171 // openssl genpkey -quiet -algorithm RSA -pkeyopt rsa_keygen_bits:2048 -outform PEM -out key.pem
172 // openssl pkcs8 -in key.pem -nocrypt -traditional -outform PEM -out pvt1.pem
173 // openssl pkcs8 -in key.pem -topk8 -v2 aes256 -passout pass:password -outform PEM -out pvt8.pem
174 // openssl pkey -in key.pem -pubout -outform PEM -out pub.pem
175
176 const size_t keySize = 2048;
177 const std::string privateKeyPkcs1 =
178R"PEM(MIIEowIBAAKCAQEAzEKtiRrzvhwGDMpsUlKMd7Veo9+lvLpttdX/ETo2exU36HqV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203)PEM";
204 const std::string privateKeyPkcs8 =
205R"PEM(MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIc3ZMcKTZDhcCAggA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233)PEM";
234 const std::string publicKey =
235R"PEM(MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzEKtiRrzvhwGDMpsUlKM
236d7Veo9+lvLpttdX/ETo2exU36HqV6zSM7LnpfqId7zug+l+VGwPd+oJOzROSCAoU
237cP3C3m9CkfqT97H9g2zdfwXqJnMQtnpAGngXOTF6RSBDVqo+jfeRw3c+MCXDZ0cH
238d49uv+CnWks6Sj+gowppdsQfvQRr2incnwqht3JuaiTytxNrk6DjpoNTHyZJ53SY
2396DibGSk6aDFWMJcfvTZ6EuUbcepP7HRwABn4Ctj1FTx3hDPe4sIrBFrbfP7yDQ9N
240xYh1baxXcCjWfCS43qUjrtcQFVkKvE3uucmw1rf0C0Wy7dDvF2n1v+WLAEPSgJnu
241mwIDAQAB
242)PEM";
243};
244
245struct EcKeySpecifiedCurve_DesEncrypted
246{
247 // EC keys are generated in "namedCurve" format only. However, old keys in "specifiedCurve"
248 // format are still accepted. See https://redmine.named-data.net/issues/5037
Junxiao Shifbb69902020-04-24 08:39:18 +0000249
Davide Pesavento1bac1112019-06-13 21:48:46 -0400250 const size_t keySize = 256;
Davide Pesaventof45fa212017-09-14 17:23:56 -0400251 const std::string privateKeyPkcs1 =
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400252R"PEM(MIIBaAIBAQQgRxwcbzK9RV6AHYFsDcykI86o3M/a1KlJn0z8PcLMBZOggfowgfcC
253AQEwLAYHKoZIzj0BAQIhAP////8AAAABAAAAAAAAAAAAAAAA////////////////
254MFsEIP////8AAAABAAAAAAAAAAAAAAAA///////////////8BCBaxjXYqjqT57Pr
255vVV2mIa8ZR0GsMxTsPY7zjw+J9JgSwMVAMSdNgiG5wSTamZ44ROdJreBn36QBEEE
256axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpZP40Li/hp/m47n60p8D54W
257K84zV2sxXs7LtkBoN79R9QIhAP////8AAAAA//////////+85vqtpxeehPO5ysL8
258YyVRAgEBoUQDQgAEaG4WJuDAt0QkEM4t29KDUdzkQlMPGrqWzkWhgt9OGnwc6O7A
259ZLPSrDyhwyrKS7XLRXml5DisQ93RvByll32y8A==
260)PEM";
Davide Pesaventof45fa212017-09-14 17:23:56 -0400261 const std::string privateKeyPkcs8 =
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400262R"PEM(MIIBwzA9BgkqhkiG9w0BBQ0wMDAbBgkqhkiG9w0BBQwwDgQIVHkBzLGtDvICAggA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272)PEM";
273 const std::string publicKey =
274R"PEM(MIIBSzCCAQMGByqGSM49AgEwgfcCAQEwLAYHKoZIzj0BAQIhAP////8AAAABAAAA
275AAAAAAAAAAAA////////////////MFsEIP////8AAAABAAAAAAAAAAAAAAAA////
276///////////8BCBaxjXYqjqT57PrvVV2mIa8ZR0GsMxTsPY7zjw+J9JgSwMVAMSd
277NgiG5wSTamZ44ROdJreBn36QBEEEaxfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5
278RdiYwpZP40Li/hp/m47n60p8D54WK84zV2sxXs7LtkBoN79R9QIhAP////8AAAAA
279//////////+85vqtpxeehPO5ysL8YyVRAgEBA0IABGhuFibgwLdEJBDOLdvSg1Hc
2805EJTDxq6ls5FoYLfThp8HOjuwGSz0qw8ocMqyku1y0V5peQ4rEPd0bwcpZd9svA=
281)PEM";
Yingdi Yu202a2e92015-07-12 16:49:25 -0700282};
283
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400284struct EcKeyNamedCurve_DesEncrypted
Junxiao Shifbb69902020-04-24 08:39:18 +0000285{
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400286 // Generated with older (1.0.x?) OpenSSL
Junxiao Shifbb69902020-04-24 08:39:18 +0000287 // openssl ecparam -name secp384r1 -genkey -out pvt1.pem
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400288 // openssl pkcs8 -in pvt1.pem -topk8 -passout pass:password -outform PEM -out pvt8.pem
289 // openssl ec -in pvt1.pem -pubout -outform PEM -out pub.pem
Junxiao Shifbb69902020-04-24 08:39:18 +0000290
291 const size_t keySize = 384;
292 const std::string privateKeyPkcs1 =
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400293R"PEM(MIGkAgEBBDCUsb7NymksCkQAjdLMjUilWhOEyeYmGi79sX1RbsmfnoF/8SesKBhO
294or+TZ8g8/8igBwYFK4EEACKhZANiAARWGplLOGdQiXRFQcd0VLPeTt0zXEj5zvSv
295aHx9MrzBy57wgz10wTAiR561wuLtFAYxmqL9Ikrzx/BaEg0+v2zQ05NCzMNN8v2c
2967/FzOhD7fmZrlJsT6Q2aHGExW0Rj3GE=
297)PEM";
Junxiao Shifbb69902020-04-24 08:39:18 +0000298 const std::string privateKeyPkcs8 =
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400299R"PEM(MIHgMBsGCSqGSIb3DQEFAzAOBAjniUjwJfWsMQICCAAEgcCakGTKa49csaPpmtzi
3005sTJw+AH8ajUqcDbtp2pJP/Ni6M1p9fai9hOKPElf9uJuYh/S80FAU6WQmZBAxL4
301bF598ncLPogpGvz21wLuSc1xnbD829zAsMmh0XZvMZpBWX2g0NnZJx7GOraskTSh
3027qGu70B+uKzw+JxIzgBEeMcoBUg8mTEht5zghfLGYkQp6BpTPdpU64udpPAKzFNs
3035X+BzBnT5Yy49/Lp4uYIji8qwJFF3VqTn8RFKunFYDDejRU=
304)PEM";
305 const std::string publicKey =
306R"PEM(MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEVhqZSzhnUIl0RUHHdFSz3k7dM1xI+c70
307r2h8fTK8wcue8IM9dMEwIkeetcLi7RQGMZqi/SJK88fwWhINPr9s0NOTQszDTfL9
308nO/xczoQ+35ma5SbE+kNmhxhMVtEY9xh
309)PEM";
Junxiao Shifbb69902020-04-24 08:39:18 +0000310};
311
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400312struct EcKeyNamedCurve_Aes256Encrypted
313{
314 // Generated with OpenSSL 3.0.0
315 // openssl genpkey -quiet -algorithm EC -pkeyopt ec_paramgen_curve:P-384
316 // -pkeyopt ec_param_enc:named_curve -outform PEM -out key.pem
317 // openssl pkcs8 -in key.pem -nocrypt -traditional -outform PEM -out pvt1.pem
318 // openssl pkcs8 -in key.pem -topk8 -v2 aes256 -passout pass:password -outform PEM -out pvt8.pem
319 // openssl pkey -in key.pem -pubout -outform PEM -out pub.pem
320
321 const size_t keySize = 384;
322 const std::string privateKeyPkcs1 =
323R"PEM(MIGkAgEBBDAa5I6hfwcDZ8Hzn6/ZU3jV/Fp6jZP+tgUHSdMcfRS3iLOY296KdcXd
324xISVHU3g+XygBwYFK4EEACKhZANiAAQh3xGTxgMFXwoRNBCrnzawZnoQUojZ1Qe5
3253VrR+9ECawVf2sPklX+Lw1pE1TG5q+YepM8imRclRbXLBSGPF6f+qJCiFWR71XS2
326CX2kW/AZOGluxYrVMe22ns5TY2o50G8=
327)PEM";
328 const std::string privateKeyPkcs8 =
329R"PEM(MIIBHDBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIy4A7Il3JRNQCAggA
330MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBBPYOn/2qSDBlKhZ6+ckre8BIHA
331jXwlDh+OX+1VayCWohXUooxZPfgKmIVkxhNrQzn0DV/FW9WbiXC72vss75/o5O2H
332o4EuIOxnbxIM5HhsrdDY5g8Abkk5gKYt+eVJQn1EPAR+PU9T8OUKyQr9rO0Pvsu8
3339h5V9+WFHNnNBTN3pqIV5cU25oVX7tqeZKs+5I4QIaq4hzPj+k15dLFaaq5XejZH
334KjMKNdKbfz4TEs7u1W9YyrD3Z8/RgzLwVRjJqqOKeoJF4b1lOqOd5rWb4Oa06alr
335)PEM";
336 const std::string publicKey =
337R"PEM(MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEId8Rk8YDBV8KETQQq582sGZ6EFKI2dUH
338ud1a0fvRAmsFX9rD5JV/i8NaRNUxuavmHqTPIpkXJUW1ywUhjxen/qiQohVke9V0
339tgl9pFvwGThpbsWK1THttp7OU2NqOdBv
340)PEM";
341};
342
343struct EcKeyNamedCurve_Des3Encrypted
344{
345 // Generated with OpenSSL 3.0.0
346 // openssl genpkey -quiet -algorithm EC -pkeyopt ec_paramgen_curve:P-256
347 // -pkeyopt ec_param_enc:named_curve -outform PEM -out key.pem
348 // openssl pkcs8 -in key.pem -nocrypt -traditional -outform PEM -out pvt1.pem
349 // openssl pkcs8 -in key.pem -topk8 -v2 des3 -passout pass:password -outform PEM -out pvt8.pem
350 // openssl pkey -in key.pem -pubout -outform PEM -out pub.pem
351
352 const size_t keySize = 256;
353 const std::string privateKeyPkcs1 =
354R"PEM(MHcCAQEEIEbb/pnOVzkIZP4jrpZQCxl2OTJVQD7rHBJxxv8Aa215oAoGCCqGSM49
355AwEHoUQDQgAEvSFhYwmFe17QAj0xhumERNJFf5MTkAegdE+db4ojchAbcDLRcnzY
356+TUx5pTBqdBg+STMK7h36ZUn+KcMeizMRA==
357)PEM";
358 const std::string privateKeyPkcs8 =
359R"PEM(MIHjME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAj2rY09BeCZGgICCAAw
360DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQI6CIHMAz7K7AEgZBzyr8QcH1OWEqc
361ByPy4Vlze9D0izD7/NIxUeauHILqXMjU6Z057oYZ14Nm+DpbyJWu16gjZ2N+M2GH
3624bH8gS6JUGhqtSbQ1Oo5lmjPXphefZp0tarv19Hp8S1VKmcVoj65kxfn5x0GKepg
363fhXlMB2uQHvNoujU9PyeTZhwjAPQ6vHgFonbPPaL/f256NqMmnA=
364)PEM";
365 const std::string publicKey =
366R"PEM(MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEvSFhYwmFe17QAj0xhumERNJFf5MT
367kAegdE+db4ojchAbcDLRcnzY+TUx5pTBqdBg+STMK7h36ZUn+KcMeizMRA==
368)PEM";
369};
370
371using KeyTestDataSets = boost::mpl::vector<
372#if OPENSSL_VERSION_NUMBER < 0x30000000L
373 // DES-encrypted keys
374 // .privateKeyPkcs8 uses either the PBES1 or PBES2 encryption scheme with DES-CBC-Pad (see RFC 8018)
375 // This is no longer supported out-of-the-box by OpenSSL 3.0 and later
376 RsaKey_DesEncrypted,
377 EcKeySpecifiedCurve_DesEncrypted,
378 EcKeyNamedCurve_DesEncrypted,
379#endif
380 // AES-encrypted keys
381 // .privateKeyPkcs8 uses the PBES2 encryption scheme with AES-CBC-Pad (see RFC 8018)
382 // This works with all supported versions of OpenSSL
383 RsaKey_Aes256Encrypted,
384 EcKeyNamedCurve_Aes256Encrypted,
385 // 3DES-encrypted keys
386 // .privateKeyPkcs8 uses the PBES2 encryption scheme with DES-EDE3-CBC-Pad (see RFC 8018)
387 // This works with all supported versions of OpenSSL
388 EcKeyNamedCurve_Des3Encrypted
389>;
Yingdi Yu202a2e92015-07-12 16:49:25 -0700390
Luca Keidel941fd8c2017-07-24 15:21:22 +0200391static void
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400392checkPkcs8Encoding(const ConstBufferPtr& encoding,
393 const std::string& password,
394 const ConstBufferPtr& pkcs1)
Yingdi Yu202a2e92015-07-12 16:49:25 -0700395{
396 PrivateKey sKey;
Davide Pesavento765abc92021-12-27 00:44:04 -0500397 sKey.loadPkcs8(*encoding, password.data(), password.size());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700398 OBufferStream os;
Luca Keidel941fd8c2017-07-24 15:21:22 +0200399 sKey.savePkcs1(os);
Luca Keidel941fd8c2017-07-24 15:21:22 +0200400 BOOST_CHECK_EQUAL_COLLECTIONS(pkcs1->begin(), pkcs1->end(),
Davide Pesaventof45fa212017-09-14 17:23:56 -0400401 os.buf()->begin(), os.buf()->end());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700402}
403
Luca Keidel941fd8c2017-07-24 15:21:22 +0200404static void
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400405checkPkcs8Base64Encoding(const ConstBufferPtr& encoding,
406 const std::string& password,
407 const ConstBufferPtr& pkcs1)
Yingdi Yu202a2e92015-07-12 16:49:25 -0700408{
409 OBufferStream os;
410 bufferSource(*encoding) >> base64Decode() >> streamSink(os);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700411 checkPkcs8Encoding(os.buf(), password, pkcs1);
412}
413
414BOOST_AUTO_TEST_CASE_TEMPLATE(SaveLoad, T, KeyTestDataSets)
415{
416 T dataSet;
417
Davide Pesavento765abc92021-12-27 00:44:04 -0500418 auto sKeyPkcs1Base64 = make_span(reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs1.data()),
419 dataSet.privateKeyPkcs1.size());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700420 OBufferStream os;
Davide Pesavento765abc92021-12-27 00:44:04 -0500421 bufferSource(sKeyPkcs1Base64) >> base64Decode() >> streamSink(os);
422 auto sKeyPkcs1 = os.buf();
Yingdi Yu202a2e92015-07-12 16:49:25 -0700423
Luca Keidel941fd8c2017-07-24 15:21:22 +0200424 // load key in base64-encoded pkcs1 format
Yingdi Yu202a2e92015-07-12 16:49:25 -0700425 PrivateKey sKey;
Davide Pesavento765abc92021-12-27 00:44:04 -0500426 BOOST_CHECK_NO_THROW(sKey.loadPkcs1Base64(sKeyPkcs1Base64));
Davide Pesavento1bac1112019-06-13 21:48:46 -0400427 BOOST_CHECK_EQUAL(sKey.getKeySize(), dataSet.keySize);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700428
429 std::stringstream ss2(dataSet.privateKeyPkcs1);
430 PrivateKey sKey2;
Davide Pesaventof45fa212017-09-14 17:23:56 -0400431 BOOST_CHECK_NO_THROW(sKey2.loadPkcs1Base64(ss2));
Yingdi Yu202a2e92015-07-12 16:49:25 -0700432
433 // load key in pkcs1 format
434 PrivateKey sKey3;
Davide Pesavento765abc92021-12-27 00:44:04 -0500435 BOOST_CHECK_NO_THROW(sKey3.loadPkcs1(*sKeyPkcs1));
Davide Pesavento1bac1112019-06-13 21:48:46 -0400436 BOOST_CHECK_EQUAL(sKey3.getKeySize(), dataSet.keySize);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700437
438 std::stringstream ss4;
Davide Pesavento765abc92021-12-27 00:44:04 -0500439 ss4.write(reinterpret_cast<const char*>(sKeyPkcs1->data()), sKeyPkcs1->size());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700440 PrivateKey sKey4;
Davide Pesaventof45fa212017-09-14 17:23:56 -0400441 BOOST_CHECK_NO_THROW(sKey4.loadPkcs1(ss4));
Yingdi Yu202a2e92015-07-12 16:49:25 -0700442
Luca Keidel941fd8c2017-07-24 15:21:22 +0200443 // save key in base64-encoded pkcs1 format
Yingdi Yu202a2e92015-07-12 16:49:25 -0700444 OBufferStream os2;
445 BOOST_REQUIRE_NO_THROW(sKey.savePkcs1Base64(os2));
Davide Pesavento765abc92021-12-27 00:44:04 -0500446 BOOST_CHECK_EQUAL_COLLECTIONS(sKeyPkcs1Base64.begin(), sKeyPkcs1Base64.end(),
Davide Pesaventof45fa212017-09-14 17:23:56 -0400447 os2.buf()->begin(), os2.buf()->end());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700448
449 // save key in pkcs1 format
450 OBufferStream os3;
451 BOOST_REQUIRE_NO_THROW(sKey.savePkcs1(os3));
Davide Pesavento765abc92021-12-27 00:44:04 -0500452 BOOST_CHECK_EQUAL_COLLECTIONS(sKeyPkcs1->begin(), sKeyPkcs1->end(),
Davide Pesaventof45fa212017-09-14 17:23:56 -0400453 os3.buf()->begin(), os3.buf()->end());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700454
Davide Pesavento765abc92021-12-27 00:44:04 -0500455 auto sKeyPkcs8Base64 = make_span(reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs8.data()),
456 dataSet.privateKeyPkcs8.size());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700457 OBufferStream os4;
Davide Pesavento765abc92021-12-27 00:44:04 -0500458 bufferSource(sKeyPkcs8Base64) >> base64Decode() >> streamSink(os4);
459 auto sKeyPkcs8 = os4.buf();
Yingdi Yu202a2e92015-07-12 16:49:25 -0700460
461 std::string password("password");
462 std::string wrongpw("wrongpw");
Luca Keidel941fd8c2017-07-24 15:21:22 +0200463 auto pwCallback = [&password] (char* buf, size_t size, int) -> int {
464 BOOST_REQUIRE_LE(password.size(), size);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700465 std::copy(password.begin(), password.end(), buf);
Luca Keidel941fd8c2017-07-24 15:21:22 +0200466 return static_cast<int>(password.size());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700467 };
468
Luca Keidel941fd8c2017-07-24 15:21:22 +0200469 // load key in base64-encoded pkcs8 format
Yingdi Yu202a2e92015-07-12 16:49:25 -0700470 PrivateKey sKey5;
Davide Pesavento765abc92021-12-27 00:44:04 -0500471 BOOST_CHECK_NO_THROW(sKey5.loadPkcs8Base64(sKeyPkcs8Base64, password.data(), password.size()));
Davide Pesavento1bac1112019-06-13 21:48:46 -0400472 BOOST_CHECK_EQUAL(sKey5.getKeySize(), dataSet.keySize);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700473
474 PrivateKey sKey6;
Davide Pesavento765abc92021-12-27 00:44:04 -0500475 BOOST_CHECK_NO_THROW(sKey6.loadPkcs8Base64(sKeyPkcs8Base64, pwCallback));
Yingdi Yu202a2e92015-07-12 16:49:25 -0700476
477 std::stringstream ss7(dataSet.privateKeyPkcs8);
478 PrivateKey sKey7;
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500479 BOOST_CHECK_NO_THROW(sKey7.loadPkcs8Base64(ss7, password.data(), password.size()));
Yingdi Yu202a2e92015-07-12 16:49:25 -0700480
481 std::stringstream ss8(dataSet.privateKeyPkcs8);
482 PrivateKey sKey8;
Davide Pesaventof45fa212017-09-14 17:23:56 -0400483 BOOST_CHECK_NO_THROW(sKey8.loadPkcs8Base64(ss8, pwCallback));
Yingdi Yu202a2e92015-07-12 16:49:25 -0700484
485 // load key in pkcs8 format
486 PrivateKey sKey9;
Davide Pesavento765abc92021-12-27 00:44:04 -0500487 BOOST_CHECK_NO_THROW(sKey9.loadPkcs8(*sKeyPkcs8, password.data(), password.size()));
Davide Pesavento1bac1112019-06-13 21:48:46 -0400488 BOOST_CHECK_EQUAL(sKey9.getKeySize(), dataSet.keySize);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700489
490 PrivateKey sKey10;
Davide Pesavento765abc92021-12-27 00:44:04 -0500491 BOOST_CHECK_NO_THROW(sKey10.loadPkcs8(*sKeyPkcs8, pwCallback));
Yingdi Yu202a2e92015-07-12 16:49:25 -0700492
493 std::stringstream ss11;
Davide Pesavento765abc92021-12-27 00:44:04 -0500494 ss11.write(reinterpret_cast<const char*>(sKeyPkcs8->data()), sKeyPkcs8->size());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700495 PrivateKey sKey11;
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500496 BOOST_CHECK_NO_THROW(sKey11.loadPkcs8(ss11, password.data(), password.size()));
Yingdi Yu202a2e92015-07-12 16:49:25 -0700497
498 std::stringstream ss12;
Davide Pesavento765abc92021-12-27 00:44:04 -0500499 ss12.write(reinterpret_cast<const char*>(sKeyPkcs8->data()), sKeyPkcs8->size());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700500 PrivateKey sKey12;
Davide Pesaventof45fa212017-09-14 17:23:56 -0400501 BOOST_CHECK_NO_THROW(sKey12.loadPkcs8(ss12, pwCallback));
Yingdi Yu202a2e92015-07-12 16:49:25 -0700502
Davide Pesaventof45fa212017-09-14 17:23:56 -0400503 // load key using wrong password, Error is expected
Yingdi Yu202a2e92015-07-12 16:49:25 -0700504 PrivateKey sKey13;
Davide Pesavento765abc92021-12-27 00:44:04 -0500505 BOOST_CHECK_THROW(sKey13.loadPkcs8Base64(sKeyPkcs8Base64, wrongpw.data(), wrongpw.size()),
Luca Keidel941fd8c2017-07-24 15:21:22 +0200506 PrivateKey::Error);
Davide Pesavento1bac1112019-06-13 21:48:46 -0400507 BOOST_CHECK_EQUAL(sKey13.getKeyType(), KeyType::NONE);
508 BOOST_CHECK_EQUAL(sKey13.getKeySize(), 0);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700509
Luca Keidel941fd8c2017-07-24 15:21:22 +0200510 // save key in base64-encoded pkcs8 format
Yingdi Yu202a2e92015-07-12 16:49:25 -0700511 OBufferStream os14;
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500512 BOOST_REQUIRE_NO_THROW(sKey.savePkcs8Base64(os14, password.data(), password.size()));
Davide Pesavento765abc92021-12-27 00:44:04 -0500513 checkPkcs8Base64Encoding(os14.buf(), password, sKeyPkcs1);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700514
515 OBufferStream os15;
516 BOOST_REQUIRE_NO_THROW(sKey.savePkcs8Base64(os15, pwCallback));
Davide Pesavento765abc92021-12-27 00:44:04 -0500517 checkPkcs8Base64Encoding(os15.buf(), password, sKeyPkcs1);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700518
519 // save key in pkcs8 format
520 OBufferStream os16;
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500521 BOOST_REQUIRE_NO_THROW(sKey.savePkcs8(os16, password.data(), password.size()));
Davide Pesavento765abc92021-12-27 00:44:04 -0500522 checkPkcs8Encoding(os16.buf(), password, sKeyPkcs1);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700523
524 OBufferStream os17;
525 BOOST_REQUIRE_NO_THROW(sKey.savePkcs8(os17, pwCallback));
Davide Pesavento765abc92021-12-27 00:44:04 -0500526 checkPkcs8Encoding(os17.buf(), password, sKeyPkcs1);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700527}
528
529BOOST_AUTO_TEST_CASE_TEMPLATE(DerivePublicKey, T, KeyTestDataSets)
530{
531 T dataSet;
532
Davide Pesavento765abc92021-12-27 00:44:04 -0500533 auto sKeyPkcs1Base64 = make_span(reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs1.data()),
534 dataSet.privateKeyPkcs1.size());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700535 PrivateKey sKey;
Davide Pesavento765abc92021-12-27 00:44:04 -0500536 sKey.loadPkcs1Base64(sKeyPkcs1Base64);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700537
538 // derive public key and compare
Davide Pesaventof45fa212017-09-14 17:23:56 -0400539 ConstBufferPtr pKeyBits = sKey.derivePublicKey();
Yingdi Yu202a2e92015-07-12 16:49:25 -0700540 OBufferStream os;
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400541 bufferSource(dataSet.publicKey) >> base64Decode() >> streamSink(os);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700542 BOOST_CHECK_EQUAL_COLLECTIONS(pKeyBits->begin(), pKeyBits->end(),
543 os.buf()->begin(), os.buf()->end());
544}
545
546BOOST_AUTO_TEST_CASE(RsaDecryption)
547{
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400548 RsaKey_Aes256Encrypted dataSet;
Yingdi Yu202a2e92015-07-12 16:49:25 -0700549
550 PrivateKey sKey;
Davide Pesavento765abc92021-12-27 00:44:04 -0500551 sKey.loadPkcs1Base64({reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs1.data()),
552 dataSet.privateKeyPkcs1.size()});
Davide Pesavento06f1bdf2017-09-16 18:59:15 -0400553 BOOST_CHECK_EQUAL(sKey.getKeyType(), KeyType::RSA);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700554
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400555 const uint8_t plaintext[] = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07};
Yingdi Yu202a2e92015-07-12 16:49:25 -0700556
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400557 // Ciphertext generated with OpenSSL 3.0.0
558 // printf ... | openssl pkeyutl -encrypt -inkey pub.pem -pubin -pkeyopt rsa_padding_mode:oaep | base64
559 const std::string ciphertext =
560R"BASE64(BgVqf6yKhMytCeL6+/oEoyx9rahh2+a1iU0D17RgfX6Q/3eNEcC2xY5QomjI7k/no8yiTZbXT9R4
561REE6ic0DjFSbFwJjC/P0/oTSQyUNn4xNO+aK0MGnyeN34A8c3bZfLuo2DU496SQF0B9I5SS3gEA9
562rqdIAdbWoOCKi1EX5SXtAOPTsj5PHHH+UM52bxOrUPvGSl9tRaz5S6hVf2haSoio4nnG3/bA6pdb
563hHjyHHA/oi1PlFRIe0EO2/riAdqdIW3eOqZGP5t5QAMmiP178A9YQdbSavTgBSuE20T01U82Ln+L
564pNk+PE/mmM20iNBo8C9cAJVUju6T4DCNZk7H5Q==
565)BASE64";
Yingdi Yu202a2e92015-07-12 16:49:25 -0700566 OBufferStream os;
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400567 bufferSource(ciphertext) >> base64Decode() >> streamSink(os);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700568
Davide Pesavento765abc92021-12-27 00:44:04 -0500569 auto decrypted = sKey.decrypt(*os.buf());
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400570 BOOST_CHECK_EQUAL_COLLECTIONS(plaintext, plaintext + sizeof(plaintext),
Davide Pesaventof45fa212017-09-14 17:23:56 -0400571 decrypted->begin(), decrypted->end());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700572}
573
Davide Pesaventof45fa212017-09-14 17:23:56 -0400574BOOST_AUTO_TEST_CASE(RsaEncryptDecrypt)
Yingdi Yu202a2e92015-07-12 16:49:25 -0700575{
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400576 RsaKey_Aes256Encrypted dataSet;
Yingdi Yu202a2e92015-07-12 16:49:25 -0700577
578 PublicKey pKey;
Davide Pesavento765abc92021-12-27 00:44:04 -0500579 pKey.loadPkcs8Base64({reinterpret_cast<const uint8_t*>(dataSet.publicKey.data()),
580 dataSet.publicKey.size()});
Davide Pesavento06f1bdf2017-09-16 18:59:15 -0400581 BOOST_CHECK_EQUAL(pKey.getKeyType(), KeyType::RSA);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700582
583 PrivateKey sKey;
Davide Pesavento765abc92021-12-27 00:44:04 -0500584 sKey.loadPkcs1Base64({reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs1.data()),
585 dataSet.privateKeyPkcs1.size()});
Davide Pesavento06f1bdf2017-09-16 18:59:15 -0400586 BOOST_CHECK_EQUAL(sKey.getKeyType(), KeyType::RSA);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700587
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400588 const uint8_t plaintext[] = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07};
Yingdi Yu202a2e92015-07-12 16:49:25 -0700589
Davide Pesavento765abc92021-12-27 00:44:04 -0500590 auto ciphertext = pKey.encrypt(plaintext);
591 auto decrypted = sKey.decrypt(*ciphertext);
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400592 BOOST_CHECK_EQUAL_COLLECTIONS(plaintext, plaintext + sizeof(plaintext),
Davide Pesaventof45fa212017-09-14 17:23:56 -0400593 decrypted->begin(), decrypted->end());
594}
595
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500596BOOST_AUTO_TEST_CASE(UnsupportedDecryption)
Davide Pesaventof45fa212017-09-14 17:23:56 -0400597{
Davide Pesaventof45fa212017-09-14 17:23:56 -0400598 OBufferStream os;
599 bufferSource("Y2lhbyFob2xhIWhlbGxvIQ==") >> base64Decode() >> streamSink(os);
600
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500601 auto ecKey = generatePrivateKey(EcKeyParams());
Davide Pesavento765abc92021-12-27 00:44:04 -0500602 BOOST_CHECK_THROW(ecKey->decrypt(*os.buf()), PrivateKey::Error);
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500603
604 auto hmacKey = generatePrivateKey(HmacKeyParams());
Davide Pesavento765abc92021-12-27 00:44:04 -0500605 BOOST_CHECK_THROW(hmacKey->decrypt(*os.buf()), PrivateKey::Error);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700606}
607
Junxiao Shifbb69902020-04-24 08:39:18 +0000608class RsaKeyGenParams
Yingdi Yu202a2e92015-07-12 16:49:25 -0700609{
Junxiao Shifbb69902020-04-24 08:39:18 +0000610public:
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500611 using Params = RsaKeyParams;
612 using hasPublicKey = std::true_type;
613 using canSavePkcs1 = std::true_type;
Junxiao Shifbb69902020-04-24 08:39:18 +0000614
615 static void
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400616 checkPublicKey(const Buffer&)
Junxiao Shifbb69902020-04-24 08:39:18 +0000617 {
618 }
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500619};
620
Junxiao Shifbb69902020-04-24 08:39:18 +0000621class EcKeyGenParams
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500622{
Junxiao Shifbb69902020-04-24 08:39:18 +0000623public:
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500624 using Params = EcKeyParams;
625 using hasPublicKey = std::true_type;
626 using canSavePkcs1 = std::true_type;
Junxiao Shifbb69902020-04-24 08:39:18 +0000627
628 static void
629 checkPublicKey(const Buffer& bits)
630 {
631 // EC key generation should use named curve format. See https://redmine.named-data.net/issues/5037
632 // OBJECT IDENTIFIER 1.2.840.10045.3.1.7 prime256v1 (ANSI X9.62 named elliptic curve)
633 const uint8_t oid[] = {0x06, 0x08, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07};
634 BOOST_CHECK_MESSAGE(std::search(bits.begin(), bits.end(), oid, oid + sizeof(oid)) != bits.end(),
635 "OID not found in " << toHex(bits));
636 }
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500637};
638
Junxiao Shifbb69902020-04-24 08:39:18 +0000639class HmacKeyGenParams
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500640{
Junxiao Shifbb69902020-04-24 08:39:18 +0000641public:
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500642 using Params = HmacKeyParams;
643 using hasPublicKey = std::false_type;
644 using canSavePkcs1 = std::false_type;
Junxiao Shifbb69902020-04-24 08:39:18 +0000645
646 static void
Davide Pesaventoea9e43e2021-09-20 00:45:03 -0400647 checkPublicKey(const Buffer&)
Junxiao Shifbb69902020-04-24 08:39:18 +0000648 {
649 }
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500650};
651
Davide Pesavento94dfcf12021-09-26 14:18:45 -0400652using KeyGenParams = boost::mpl::vector<
653#if OPENSSL_VERSION_NUMBER < 0x30000000L // FIXME #5154
654 HmacKeyGenParams,
655#endif
656 RsaKeyGenParams,
657 EcKeyGenParams
658>;
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500659
660BOOST_AUTO_TEST_CASE_TEMPLATE(GenerateKey, T, KeyGenParams)
661{
Davide Pesavento1bac1112019-06-13 21:48:46 -0400662 typename T::Params params;
663 auto sKey = generatePrivateKey(params);
664 BOOST_CHECK_EQUAL(sKey->getKeyType(), params.getKeyType());
665 BOOST_CHECK_EQUAL(sKey->getKeySize(), params.getKeySize());
Yingdi Yu202a2e92015-07-12 16:49:25 -0700666
Luca Keidel941fd8c2017-07-24 15:21:22 +0200667 const uint8_t data[] = {0x01, 0x02, 0x03, 0x04};
Yingdi Yub263f152015-07-12 16:50:13 -0700668 OBufferStream os;
Davide Pesavento765abc92021-12-27 00:44:04 -0500669 BOOST_REQUIRE_NO_THROW(bufferSource(data) >>
Yingdi Yub263f152015-07-12 16:50:13 -0700670 signerFilter(DigestAlgorithm::SHA256, *sKey) >>
671 streamSink(os));
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500672 auto sig = os.buf();
Yingdi Yub263f152015-07-12 16:50:13 -0700673
Yingdi Yub263f152015-07-12 16:50:13 -0700674 bool result = false;
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500675 if (typename T::hasPublicKey()) {
676 auto pKeyBits = sKey->derivePublicKey();
Junxiao Shifbb69902020-04-24 08:39:18 +0000677 BOOST_REQUIRE(pKeyBits != nullptr);
678 T::checkPublicKey(*pKeyBits);
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500679 PublicKey pKey;
Davide Pesavento765abc92021-12-27 00:44:04 -0500680 pKey.loadPkcs8(*pKeyBits);
681 BOOST_CHECK_NO_THROW(bufferSource(data) >>
Davide Pesavento35c63792022-01-17 02:06:03 -0500682 verifierFilter(DigestAlgorithm::SHA256, pKey, *sig) >>
Yingdi Yub263f152015-07-12 16:50:13 -0700683 boolSink(result));
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500684 }
685 else {
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500686 BOOST_CHECK_THROW(sKey->derivePublicKey(), PrivateKey::Error);
Davide Pesavento765abc92021-12-27 00:44:04 -0500687 BOOST_CHECK_NO_THROW(bufferSource(data) >>
Davide Pesavento35c63792022-01-17 02:06:03 -0500688 verifierFilter(DigestAlgorithm::SHA256, *sKey, *sig) >>
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500689 boolSink(result));
690 }
Yingdi Yub263f152015-07-12 16:50:13 -0700691 BOOST_CHECK(result);
692
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500693 if (typename T::canSavePkcs1()) {
Davide Pesavento1bac1112019-06-13 21:48:46 -0400694 auto sKey2 = generatePrivateKey(params);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700695
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500696 OBufferStream os1;
697 sKey->savePkcs1(os1);
698 OBufferStream os2;
699 sKey2->savePkcs1(os2);
Yingdi Yu202a2e92015-07-12 16:49:25 -0700700
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500701 BOOST_CHECK(*os1.buf() != *os2.buf());
702 }
703 else {
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500704 OBufferStream os1;
705 BOOST_CHECK_THROW(sKey->savePkcs1(os1), PrivateKey::Error);
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500706 }
Yingdi Yu202a2e92015-07-12 16:49:25 -0700707}
708
Laqin Fan0fe72ea2019-05-22 16:42:59 -0500709BOOST_AUTO_TEST_CASE(GenerateKeyUnsupportedType)
Davide Pesaventof45fa212017-09-14 17:23:56 -0400710{
711 BOOST_CHECK_THROW(generatePrivateKey(AesKeyParams()), std::invalid_argument);
712}
713
Yingdi Yu202a2e92015-07-12 16:49:25 -0700714BOOST_AUTO_TEST_SUITE_END() // TestPrivateKey
715BOOST_AUTO_TEST_SUITE_END() // Transform
716BOOST_AUTO_TEST_SUITE_END() // Security
717
Davide Pesavento47ce2ee2023-05-09 01:33:33 -0400718} // namespace ndn::tests