Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 1 | /* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */ |
Davide Pesavento | a84f464 | 2017-08-23 16:14:51 -0400 | [diff] [blame] | 2 | /* |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 3 | * Copyright (c) 2013-2021 Regents of the University of California. |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 4 | * |
| 5 | * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions). |
| 6 | * |
| 7 | * ndn-cxx library is free software: you can redistribute it and/or modify it under the |
| 8 | * terms of the GNU Lesser General Public License as published by the Free Software |
| 9 | * Foundation, either version 3 of the License, or (at your option) any later version. |
| 10 | * |
| 11 | * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY |
| 12 | * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A |
| 13 | * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. |
| 14 | * |
| 15 | * You should have received copies of the GNU General Public License and GNU Lesser |
| 16 | * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see |
| 17 | * <http://www.gnu.org/licenses/>. |
| 18 | * |
| 19 | * See AUTHORS.md for complete list of ndn-cxx authors and contributors. |
| 20 | */ |
| 21 | |
Davide Pesavento | 7e78064 | 2018-11-24 15:51:34 -0500 | [diff] [blame] | 22 | #include "ndn-cxx/security/transform/private-key.hpp" |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 23 | |
Davide Pesavento | 7e78064 | 2018-11-24 15:51:34 -0500 | [diff] [blame] | 24 | #include "ndn-cxx/encoding/buffer-stream.hpp" |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 25 | #include "ndn-cxx/security/impl/openssl.hpp" |
Davide Pesavento | 7e78064 | 2018-11-24 15:51:34 -0500 | [diff] [blame] | 26 | #include "ndn-cxx/security/key-params.hpp" |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 27 | #include "ndn-cxx/security/transform/base64-decode.hpp" |
| 28 | #include "ndn-cxx/security/transform/bool-sink.hpp" |
| 29 | #include "ndn-cxx/security/transform/buffer-source.hpp" |
| 30 | #include "ndn-cxx/security/transform/public-key.hpp" |
| 31 | #include "ndn-cxx/security/transform/signer-filter.hpp" |
| 32 | #include "ndn-cxx/security/transform/stream-sink.hpp" |
| 33 | #include "ndn-cxx/security/transform/verifier-filter.hpp" |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 34 | #include "ndn-cxx/util/string-helper.hpp" |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 35 | |
Davide Pesavento | 7e78064 | 2018-11-24 15:51:34 -0500 | [diff] [blame] | 36 | #include "tests/boost-test.hpp" |
| 37 | |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 38 | #include <boost/mpl/vector.hpp> |
Davide Pesavento | a84f464 | 2017-08-23 16:14:51 -0400 | [diff] [blame] | 39 | |
| 40 | #include <sstream> |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 41 | |
| 42 | namespace ndn { |
| 43 | namespace security { |
| 44 | namespace transform { |
| 45 | namespace tests { |
| 46 | |
| 47 | BOOST_AUTO_TEST_SUITE(Security) |
| 48 | BOOST_AUTO_TEST_SUITE(Transform) |
| 49 | BOOST_AUTO_TEST_SUITE(TestPrivateKey) |
| 50 | |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 51 | BOOST_AUTO_TEST_CASE(Empty) |
| 52 | { |
| 53 | // test invoking member functions on an empty (default-constructed) PrivateKey |
| 54 | PrivateKey sKey; |
| 55 | BOOST_CHECK_EQUAL(sKey.getKeyType(), KeyType::NONE); |
| 56 | BOOST_CHECK_EQUAL(sKey.getKeySize(), 0); |
laqinfan | 56a812d | 2019-06-03 15:33:58 -0500 | [diff] [blame] | 57 | BOOST_CHECK_THROW(sKey.getKeyDigest(DigestAlgorithm::SHA256), PrivateKey::Error); |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 58 | BOOST_CHECK_THROW(sKey.derivePublicKey(), PrivateKey::Error); |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 59 | BOOST_CHECK_THROW(sKey.decrypt({}), PrivateKey::Error); |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 60 | std::ostringstream os; |
| 61 | BOOST_CHECK_THROW(sKey.savePkcs1(os), PrivateKey::Error); |
| 62 | std::string passwd("password"); |
| 63 | BOOST_CHECK_THROW(sKey.savePkcs8(os, passwd.data(), passwd.size()), PrivateKey::Error); |
| 64 | } |
| 65 | |
Davide Pesavento | 94dfcf1 | 2021-09-26 14:18:45 -0400 | [diff] [blame] | 66 | #if OPENSSL_VERSION_NUMBER < 0x30000000L // FIXME #5154 |
laqinfan | 56a812d | 2019-06-03 15:33:58 -0500 | [diff] [blame] | 67 | BOOST_AUTO_TEST_CASE(KeyDigest) |
| 68 | { |
| 69 | const Buffer buf(16); |
| 70 | PrivateKey sKey; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 71 | sKey.loadRaw(KeyType::HMAC, buf); |
laqinfan | 56a812d | 2019-06-03 15:33:58 -0500 | [diff] [blame] | 72 | auto digest = sKey.getKeyDigest(DigestAlgorithm::SHA256); |
| 73 | |
| 74 | const uint8_t expected[] = { |
| 75 | 0x37, 0x47, 0x08, 0xff, 0xf7, 0x71, 0x9d, 0xd5, 0x97, 0x9e, 0xc8, 0x75, 0xd5, 0x6c, 0xd2, 0x28, |
| 76 | 0x6f, 0x6d, 0x3c, 0xf7, 0xec, 0x31, 0x7a, 0x3b, 0x25, 0x63, 0x2a, 0xab, 0x28, 0xec, 0x37, 0xbb, |
| 77 | }; |
| 78 | BOOST_CHECK_EQUAL_COLLECTIONS(digest->begin(), digest->end(), |
| 79 | expected, expected + sizeof(expected)); |
| 80 | } |
Davide Pesavento | 94dfcf1 | 2021-09-26 14:18:45 -0400 | [diff] [blame] | 81 | #endif |
laqinfan | 56a812d | 2019-06-03 15:33:58 -0500 | [diff] [blame] | 82 | |
laqinfan | 48f9724 | 2019-06-03 15:33:58 -0500 | [diff] [blame] | 83 | BOOST_AUTO_TEST_CASE(LoadRaw) |
| 84 | { |
| 85 | const Buffer buf(32); |
| 86 | PrivateKey sKey; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 87 | sKey.loadRaw(KeyType::HMAC, buf); |
Davide Pesavento | 94dfcf1 | 2021-09-26 14:18:45 -0400 | [diff] [blame] | 88 | #if OPENSSL_VERSION_NUMBER < 0x30000000L // FIXME #5154 |
laqinfan | 48f9724 | 2019-06-03 15:33:58 -0500 | [diff] [blame] | 89 | BOOST_CHECK_EQUAL(sKey.getKeyType(), KeyType::HMAC); |
| 90 | BOOST_CHECK_EQUAL(sKey.getKeySize(), 256); |
Davide Pesavento | 94dfcf1 | 2021-09-26 14:18:45 -0400 | [diff] [blame] | 91 | #endif |
laqinfan | 48f9724 | 2019-06-03 15:33:58 -0500 | [diff] [blame] | 92 | |
| 93 | PrivateKey sKey2; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 94 | BOOST_CHECK_THROW(sKey2.loadRaw(KeyType::NONE, buf), std::invalid_argument); |
| 95 | BOOST_CHECK_THROW(sKey2.loadRaw(KeyType::RSA, buf), std::invalid_argument); |
| 96 | BOOST_CHECK_THROW(sKey2.loadRaw(KeyType::EC, buf), std::invalid_argument); |
| 97 | BOOST_CHECK_THROW(sKey2.loadRaw(KeyType::AES, buf), std::invalid_argument); |
laqinfan | 48f9724 | 2019-06-03 15:33:58 -0500 | [diff] [blame] | 98 | } |
| 99 | |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 100 | struct RsaKey_DesEncrypted |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 101 | { |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 102 | const size_t keySize = 2048; |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 103 | const std::string privateKeyPkcs1 = |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 104 | R"PEM(MIIEpAIBAAKCAQEAw0WM1/WhAxyLtEqsiAJgWDZWuzkYpeYVdeeZcqRZzzfRgBQT |
| 105 | sNozS5t4HnwTZhwwXbH7k3QN0kRTV826Xobws3iigohnM9yTK+KKiayPhIAm/+5H |
| 106 | GT6SgFJhYhqo1/upWdueojil6RP4/AgavHhopxlAVbk6G9VdVnlQcQ5Zv0OcGi73 |
| 107 | c+EnYD/YgURYGSngUi/Ynsh779p2U69/te9gZwIL5PuE9BiO6I39cL9z7EK1SfZh |
| 108 | OWvDe/qH7YhD/BHwcWit8FjRww1glwRVTJsA9rH58ynaAix0tcR/nBMRLUX+e3rU |
| 109 | RHg6UbSjJbdb9qmKM1fTGHKUzL/5pMG6uBU0ywIDAQABAoIBADQkckOIl4IZMUTn |
| 110 | W8LFv6xOdkJwMKC8G6bsPRFbyY+HvC2TLt7epSvfS+f4AcYWaOPcDu2E49vt2sNr |
| 111 | cASly8hgwiRRAB3dHH9vcsboiTo8bi2RFvMqvjv9w3tK2yMxVDtmZamzrrnaV3YV |
| 112 | Q+5nyKo2F/PMDjQ4eUAKDOzjhBuKHsZBTFnA1MFNI+UKj5X4Yp64DFmKlxTX/U2b |
| 113 | wzVywo5hzx2Uhw51jmoLls4YUvMJXD0wW5ZtYRuPogXvXb/of9ef/20/wU11WFKg |
| 114 | Xb4gfR8zUXaXS1sXcnVm3+24vIs9dApUwykuoyjOqxWqcHRec2QT2FxVGkFEraze |
| 115 | CPa4rMECgYEA5Y8CywomIcTgerFGFCeMHJr8nQGqY2V/owFb3k9maczPnC9p4a9R |
| 116 | c5szLxA9FMYFxurQZMBWSEG2JS1HR2mnjigx8UKjYML/A+rvvjZOMe4M6Sy2ggh4 |
| 117 | SkLZKpWTzjTe07ByM/j5v/SjNZhWAG7sw4/LmPGRQkwJv+KZhGojuOkCgYEA2cOF |
| 118 | T6cJRv6kvzTz9S0COZOVm+euJh/BXp7oAsAmbNfOpckPMzqHXy8/wpdKl6AAcB57 |
| 119 | OuztlNfV1D7qvbz7JuRlYwQ0cEfBgbZPcz1p18HHDXhwn57ZPb8G33Yh9Omg0HNA |
| 120 | Imb4LsVuSqxA6NwSj7cpRekgTedrhLFPJ+Ydb5MCgYEAsM3Q7OjILcIg0t6uht9e |
| 121 | vrlwTsz1mtCV2co2I6crzdj9HeI2vqf1KAElDt6G7PUHhglcr/yjd8uEqmWRPKNX |
| 122 | ddnnfVZB10jYeP/93pac6z/Zmc3iU4yKeUe7U10ZFf0KkiiYDQd59CpLef/2XScS |
| 123 | HB0oRofnxRQjfjLc4muNT+ECgYEAlcDk06MOOTly+F8lCc1bA1dgAmgwFd2usDBd |
| 124 | Y07a3e0HGnGLN3Kfl7C5i0tZq64HvxLnMd2vgLVxQlXGPpdQrC1TH+XLXg+qnlZO |
| 125 | ivSH7i0/gx75bHvj75eH1XK65V8pDVDEoSPottllAIs21CxLw3N1ObOZWJm2EfmR |
| 126 | cuHICmsCgYAtFJ1idqMoHxES3mlRpf2JxyQudP3SCm2WpGmqVzhRYInqeatY5sUd |
| 127 | lPLHm/p77RT7EyxQHTlwn8FJPuM/4ZH1rQd/vB+Y8qAtYJCexDMsbvLW+Js+VOvk |
| 128 | jweEC0nrcL31j9mF0vz5E6tfRu4hhJ6L4yfWs0gSejskeVB/w8QY4g== |
| 129 | )PEM"; |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 130 | const std::string privateKeyPkcs8 = |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 131 | R"PEM(MIIFCzA9BgkqhkiG9w0BBQ0wMDAbBgkqhkiG9w0BBQwwDgQIOKYJXvB6p8kCAggA |
| 132 | MBEGBSsOAwIHBAiQgMK8kQXTyASCBMjeNiKYYw5/yHgs9BfSGrpqvV0LkkgMQNUW |
| 133 | R4ZY8fuNjZynd+PxDuw2pyrv1Yv3jc+tupwUehZEzYOnGd53wQAuLO+Z0TBgRFN7 |
| 134 | Lhk+AxlT7hu0xaB3ZpJ/uvWpgEJHsq/aB/GYgyzXcQo2AiqzERVpMCWJVmE1L977 |
| 135 | CHwJmLm5mxclVLYp1UK5lkIBFu/M4nPavmNmYNUU1LOrXRo56TlJ2kUp8gQyQI1P |
| 136 | VPxi4chmlsr/OnQ2d1eZN+euFm0CS+yP+LFgI9ZqdyH1w+J43SXdHDzauVcZp7oa |
| 137 | Kw24OrhHfolLAnQIECXEJYeT7tZmhC4O9V6B18PFVyxWnEU4eFNpFE8kYSmm8Um2 |
| 138 | buvDKI71q43hm23moYT9uIM1f4M8UkoOliJGrlf4xgEcmDuokEX01PdOq1gc4nvG |
| 139 | 0DCwDI9cOsyn8cxhk9UVtFgzuG/seuznxIv1F5H0hzYOyloStXxRisJES0kgByBt |
| 140 | FFTfyoFKRrmCjRIygwVKUSkSDR0DlQS5ZLvQyIswnSQFwxAHqfvoSL4dB9UAIAQ+ |
| 141 | ALVF1maaHgptbL6Ifqf0GFCv0hdNCVNDNCdy8R+S6nEYE+YdYSIdT1L88KD5PjU3 |
| 142 | YY/CMnxhTncMaT4acPO1UUYuSGRZ/JL6E0ihoqIU+bqUgLSHNzhPySPfN9uqN61Y |
| 143 | HFBtxeEPWKU0f/JPkRBMmZdMI1/OVmA3QHSRBydI+CQN8no2gZRFoVbHTkG8IMpE |
| 144 | 1fiDJpwFkpzIv/JPiTSE7DeBH5NJk1bgu7TcuZfa4unyAqss0UuLnXzS06TppkUj |
| 145 | QGft0g8VPW56eli6B4xrSzzuvAdbrxsVfxdmtHPyYxLb3/UG1g4x/H/yULhx7x9P |
| 146 | iI6cw6JUE+8bwJV2ZIlHXXHO+wUp/gCFJ6MHo9wkR1QvnHP2ClJAzBm9OvYnUx2Y |
| 147 | SX0HxEowW8BkhxOF184LEmxeua0yyZUqCdrYmErp7x9EY/LhD1zBwH8OGRa0qzmR |
| 148 | VKxAPKihkb9OgxcUKbvKePx3k2cQ7fbCUspGPm4Kn1zwMgRAZ4fz/o8Lnwc8MSY3 |
| 149 | lPWnmLTFu420SRH2g9N0o/r195hiZ5cc+KfF4pwZWKbEbKFk/UfXA9vmOi7BBtDJ |
| 150 | RWshOINhzMU6Ij3KuaEpHni1HoHjw0SQ97ow2x/aB8k2QC28tbsa49lD2KKJku6b |
| 151 | 2Or89adwFKqMgS2IXfXMXs/iG5EFLYN6r8e40Dn5f1vJfRLJl03XByIfT2n92pw3 |
| 152 | fP7muOIKLUsEKjOrmn94NwMlfeW13oQHEH2KjPOWFS/tyJHDdVU+of4COH5yg59a |
| 153 | TZqFkOTGeliE1O+6sfF9fRuVxFUF3D8Hpr0JIjdc6+3RgIlGsXc8BwiSjDSI2XW+ |
| 154 | vo75/2zPU9t8OeXEIJk2CQGyqLwUJ6dyi/yDRrvZAgjrUvbpcxydnBAHrLbLUGXJ |
| 155 | aEHH2tjEtnTqVyTchr1yHoupcFOCkA0dAA66XqwcssQxJiMGrWTpCbgd9mrTXQaZ |
| 156 | U7afFN1jpO78tgBQUUpImXdHLLsqdN5tefqjileZGZ9x3/C6TNAfDwYJdsicNNn5 |
| 157 | y+JVsbltfLWlJxb9teb3dtQiFlJ7ofprLJnJVqI/Js8lozY+KaxV2vtbZkcD4dM= |
| 158 | )PEM"; |
| 159 | const std::string publicKey = |
| 160 | R"PEM(MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw0WM1/WhAxyLtEqsiAJg |
| 161 | WDZWuzkYpeYVdeeZcqRZzzfRgBQTsNozS5t4HnwTZhwwXbH7k3QN0kRTV826Xobw |
| 162 | s3iigohnM9yTK+KKiayPhIAm/+5HGT6SgFJhYhqo1/upWdueojil6RP4/AgavHho |
| 163 | pxlAVbk6G9VdVnlQcQ5Zv0OcGi73c+EnYD/YgURYGSngUi/Ynsh779p2U69/te9g |
| 164 | ZwIL5PuE9BiO6I39cL9z7EK1SfZhOWvDe/qH7YhD/BHwcWit8FjRww1glwRVTJsA |
| 165 | 9rH58ynaAix0tcR/nBMRLUX+e3rURHg6UbSjJbdb9qmKM1fTGHKUzL/5pMG6uBU0 |
| 166 | ywIDAQAB |
| 167 | )PEM"; |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 168 | }; |
| 169 | |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 170 | struct RsaKey_Aes256Encrypted |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 171 | { |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 172 | // Generated with OpenSSL 3.0.0 |
| 173 | // openssl genpkey -quiet -algorithm RSA -pkeyopt rsa_keygen_bits:2048 -outform PEM -out key.pem |
| 174 | // openssl pkcs8 -in key.pem -nocrypt -traditional -outform PEM -out pvt1.pem |
| 175 | // openssl pkcs8 -in key.pem -topk8 -v2 aes256 -passout pass:password -outform PEM -out pvt8.pem |
| 176 | // openssl pkey -in key.pem -pubout -outform PEM -out pub.pem |
| 177 | |
| 178 | const size_t keySize = 2048; |
| 179 | const std::string privateKeyPkcs1 = |
| 180 | R"PEM(MIIEowIBAAKCAQEAzEKtiRrzvhwGDMpsUlKMd7Veo9+lvLpttdX/ETo2exU36HqV |
| 181 | 6zSM7LnpfqId7zug+l+VGwPd+oJOzROSCAoUcP3C3m9CkfqT97H9g2zdfwXqJnMQ |
| 182 | tnpAGngXOTF6RSBDVqo+jfeRw3c+MCXDZ0cHd49uv+CnWks6Sj+gowppdsQfvQRr |
| 183 | 2incnwqht3JuaiTytxNrk6DjpoNTHyZJ53SY6DibGSk6aDFWMJcfvTZ6EuUbcepP |
| 184 | 7HRwABn4Ctj1FTx3hDPe4sIrBFrbfP7yDQ9NxYh1baxXcCjWfCS43qUjrtcQFVkK |
| 185 | vE3uucmw1rf0C0Wy7dDvF2n1v+WLAEPSgJnumwIDAQABAoIBAEdNgWGKkIqNIsmF |
| 186 | QhHssg85t2tSL3t1wsWGic8cOJd3vTgAzuO3yPf8IBeuBPAVqyirhBPVokAIC/UH |
| 187 | v2LiDeexlbxrL1xhEhUVw48Eyj9Es8uvQCbK/ySeRlEXRfzqecc/j62kPfRzZDiP |
| 188 | fipHv8ILRlhh1lmtSBBSLMOtZ0pnJUmrNIOaFlJa56t0G3a+4C1u2swOtoCOWtyR |
| 189 | o7NAHiCcZNbnFQQSLyfDj3Sqnsaxke41A+gtrSeeUHkqnP0rxdmqChdyU36Yszi2 |
| 190 | nB+yUXJT7Iw5GD+/vVUoby1/FVCRbh8zNfXvozC3llUSmsn3CBzVLoI+uwD5/zSz |
| 191 | +zMZ1x0CgYEA1o/cuEnALy+FXYbyrdV2R+ecy6t2/3WFDmK7+7klFFHcPBbmh/nL |
| 192 | OIjFPHVYUcyv2qW6JnCYqCutPOJ97JGvyScriNdg047UPGHaFaPZY/4rTXLm6tzN |
| 193 | I6E5eTRLkaFDVb96zYevxLjf88Lceocp2g8vR88kHqKe//0K8sBw+n0CgYEA87WA |
| 194 | CJOzmBdeWN7GbfA9rqxQq8qsFMaG+mJ5sE1MQHW5j/Hzsj6xi5qS9Uy8D9qlQiSV |
| 195 | nA/frqNBjaXiagVIqvfKvkkOFqRFIkVfGIJcYJk3tzi3tgdcHJ0B0LNCg/xHtjuZ |
| 196 | 9KiuBNlDfkhsV6d7g/YQ0Sf/ghWmSGyOtVEtQPcCgYEAs5wYK1jpfVZtcN5/lc8k |
| 197 | RYr4MXJmmfB5opI6RL028eyYzOBquJb9bGTpnvOoLEmJSCIFUxpcYCK30UjUGs3V |
| 198 | 9jBI/DM3hcGBns5W7liLqW3iN+IgtaiCPPpAj1qci9sP797rYNPd6nLMXlTXleZB |
| 199 | vZ2KebVHyjFdonLj0FQR/00CgYBSbXLuc7ZsnIrGmCKZEIZsS8/FKvlk1XjVuvTZ |
| 200 | kmtV6ftnGjiIcvft9cv6t4dr/VGju2f2rs/C62jClfasUTkwyjqCfYcMVWcknj35 |
| 201 | ti20Zl4X1FEeegLHkrsIcXjv1yYSFrqNq3egIDPZxHkQdI8sJM+vTk33G4dwO3dR |
| 202 | EDG0JQKBgBeZhFw4R4MgCYUjNecw+k6AcU5J1JZ+KCJpSBv6J9ilQhkM0PeGLEab |
| 203 | TsurvpoIdAlqojgMnNf98gBahz+zjyLJEB+SPU6AGsahkQZ8wRY1a7ua/SjHPbCk |
| 204 | I3CkY6wqJK8vcjQkUQhE+5y1ZBIhQpH22eHyM4WMLaTFsL9yMvzY |
| 205 | )PEM"; |
| 206 | const std::string privateKeyPkcs8 = |
| 207 | R"PEM(MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIc3ZMcKTZDhcCAggA |
| 208 | MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBA1/62RtDr/mX2ZuI3Nq9tTBIIE |
| 209 | 0ITRsiXopz4ox+k3ltt64vwQDLrKhm3uoz9lb885mD/wDkRU+02a3Kq+LjhExawM |
| 210 | Po8VVIbMjyXa3c2eYlmPOUXuXyMz8zi1NyDD1ypZTcVQxIT1ZZK+qsTlIy9Q2MIt |
| 211 | PU/Xg/nPCCJn7FBjkjqpGa942SVnvAbBLk342y8XozHmdbKYDVvNRjkYd6zUpR/n |
| 212 | 5EG1AHBHNFySbtJSg5/6HU5sX6pM7LNAiTT3i0r8LcCWijHofhmUbCfrg+DdgW5+ |
| 213 | ttmsTo/HZCjSSsHtd6xqxdOJyfvFIV1BvVKFP5X6OK8cnHtk/0SuNt2OROjvbOtU |
| 214 | JqSGkzV6MukagrMVtTu9BuXGNz8ee1zVglArEwHw13MihI9a/lGD/AujwjU9CdOd |
| 215 | jH6l2Ibp1MrSn52injoY9i6VmFSTktOrTrIzkGVevHcHkyZBqN3mwQRL3M16t0Bp |
| 216 | RJl01z5b7UYoSDO/w4BOtf6NK/zWix1+GHDnz9fplsaebiDF3YFOq6+p+1/14zPg |
| 217 | cfMkqgco6AGijPimhCQhMVnuWoBKcwIHCs6+sp02lI5HsVl3Lke4586w3qqOU9QY |
| 218 | L8iJFlLax/Sm9MVM/usWUaolXY6BElqkqhd3Z7KJoCazWos2oxVHkutKArNYf9XI |
| 219 | DV309jwBSnBDzmgDpXk7VZWFswxJIc8I1z5759wh370NJ06HeGCLvgBuLp6Dkq2c |
| 220 | hNqR32HWN7wjVqX2hB7X7RPjwX4a/z2oih/fQFc5WuIHfKWTviWcVq8jhIxocLqz |
| 221 | dSGWVvj6j0LoDh7s26iCXe6hb5N5khWHI6Dh7ZFC27aSejljyNqB+KEblIHvTPjS |
| 222 | WgGF14QTwDL6L4tpwtxoPG+QFnoHhM2ORkvwFkmQRmfSKeBfTapiRDLPQvlfIzTI |
| 223 | 6Ie3l9gA4H14HqffawdwfP1fS/lOlLFH7SyO59tSjtVC3ErLMhHD+1R+Q3X1w/lF |
| 224 | jUZ2vwvE+86ikhxZvQCVOiCGXqry9qZfm67cuXD/tolAv5pV2qFDxHAEe5QqUYSv |
| 225 | bJTgo6zin1XByu3jlQPblcEeJ33iRcQDqh96GgMnJstsGuUjBREVjbNZ30YZYeVg |
| 226 | +L/h9otyO92Nq0knADHeixy9JZ2ATRMoTAT4XydSN9lHOh+K5pC3kf9pke2NCJyr |
| 227 | r/w9VQnQiIkxZ+THFshHHJxZZLlLwYWWr894rKftyZB+nDidNZfXr6K8VWoCAwh4 |
| 228 | XwV6109KeHx86Kim9KQPn5RYVFdoxt2dO5O9vcXWtcNciIEi4MPyUM+oHwWrKTLX |
| 229 | EQsVu5gaz8vFt3lg0+Ctf8vAIA1/FxXEZ/BTAiV96lvRcUbXU2AdL+rNU2rtpqxH |
| 230 | h9L3r6IEN9WVIkNH5Q4CqSS9z+BxIPj76dA1MXK1nb8OJ9Y+BMPhktMz9M+KcVpD |
| 231 | 1rXebv+/9Tw0lKLcNL50AglJOP+IRL0hHh62xtXs+FP5KocBs1kVAJORrS6wiy22 |
| 232 | DGwcVmgTvWsPHzIf3IEa7DEjhClnU6alxKxCEmzPtm29upYXL9o3y7CMwidvCYpD |
| 233 | zFU2pIKA85YpjUYL25MiCyJPODc3VoW9l+rBqPu6bVWZXsfgsD4lcdFaJbPqcVby |
| 234 | PEe2dEUjhwpYgjbjOO7geMe+VeShipZJ63yFsNaPWzcz |
| 235 | )PEM"; |
| 236 | const std::string publicKey = |
| 237 | R"PEM(MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzEKtiRrzvhwGDMpsUlKM |
| 238 | d7Veo9+lvLpttdX/ETo2exU36HqV6zSM7LnpfqId7zug+l+VGwPd+oJOzROSCAoU |
| 239 | cP3C3m9CkfqT97H9g2zdfwXqJnMQtnpAGngXOTF6RSBDVqo+jfeRw3c+MCXDZ0cH |
| 240 | d49uv+CnWks6Sj+gowppdsQfvQRr2incnwqht3JuaiTytxNrk6DjpoNTHyZJ53SY |
| 241 | 6DibGSk6aDFWMJcfvTZ6EuUbcepP7HRwABn4Ctj1FTx3hDPe4sIrBFrbfP7yDQ9N |
| 242 | xYh1baxXcCjWfCS43qUjrtcQFVkKvE3uucmw1rf0C0Wy7dDvF2n1v+WLAEPSgJnu |
| 243 | mwIDAQAB |
| 244 | )PEM"; |
| 245 | }; |
| 246 | |
| 247 | struct EcKeySpecifiedCurve_DesEncrypted |
| 248 | { |
| 249 | // EC keys are generated in "namedCurve" format only. However, old keys in "specifiedCurve" |
| 250 | // format are still accepted. See https://redmine.named-data.net/issues/5037 |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 251 | |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 252 | const size_t keySize = 256; |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 253 | const std::string privateKeyPkcs1 = |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 254 | R"PEM(MIIBaAIBAQQgRxwcbzK9RV6AHYFsDcykI86o3M/a1KlJn0z8PcLMBZOggfowgfcC |
| 255 | AQEwLAYHKoZIzj0BAQIhAP////8AAAABAAAAAAAAAAAAAAAA//////////////// |
| 256 | MFsEIP////8AAAABAAAAAAAAAAAAAAAA///////////////8BCBaxjXYqjqT57Pr |
| 257 | vVV2mIa8ZR0GsMxTsPY7zjw+J9JgSwMVAMSdNgiG5wSTamZ44ROdJreBn36QBEEE |
| 258 | axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpZP40Li/hp/m47n60p8D54W |
| 259 | K84zV2sxXs7LtkBoN79R9QIhAP////8AAAAA//////////+85vqtpxeehPO5ysL8 |
| 260 | YyVRAgEBoUQDQgAEaG4WJuDAt0QkEM4t29KDUdzkQlMPGrqWzkWhgt9OGnwc6O7A |
| 261 | ZLPSrDyhwyrKS7XLRXml5DisQ93RvByll32y8A== |
| 262 | )PEM"; |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 263 | const std::string privateKeyPkcs8 = |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 264 | R"PEM(MIIBwzA9BgkqhkiG9w0BBQ0wMDAbBgkqhkiG9w0BBQwwDgQIVHkBzLGtDvICAggA |
| 265 | MBEGBSsOAwIHBAhk6g9eI3toNwSCAYDd+LWPDBTrKV7vUyxTvDbpUd0eXfh73DKA |
| 266 | MHkdHuVmhpmpBbsF9XvaFuL8J/1xi1Yl2XGw8j3WyrprD2YEhl/+zKjNbdTDJmNO |
| 267 | SlomuwWb5AVCJ9reT94zIXKCnexUcyBFS7ep+P4dwuef0VjzprjfmnAZHrP+u594 |
| 268 | ELHpKwi0ZpQLtcJjjud13bn43vbXb+aU7jmPV5lU2XP8TxaQJiYIibNEh1Y3TZGr |
| 269 | akJormYvhaYbiZkKLHQ9AvQMEjhoIW5WCB3q+tKZUKTzcQpjNnf9FOTeKN3jk3Kd |
| 270 | 2OmibPZcbMJdgCD/nRVn1cBo7Hjn3IMjgtszQHtEUphOQiAkOJUnKmy9MTYqtcNN |
| 271 | 6cuFItbu4QvbVwailgdUjOYwIJCmIxExlPV0ohS24pFGsO03Yn7W8rBB9VWENYmG |
| 272 | HkZIbGsHv7O9Wy7fv+FJgZkjeti0807IsNXSJl8LUK0ZIhAR7OU8uONWMsbHdQnk |
| 273 | q1HB1ZKa52ugACl7g/DF9b7CoSAjFeE= |
| 274 | )PEM"; |
| 275 | const std::string publicKey = |
| 276 | R"PEM(MIIBSzCCAQMGByqGSM49AgEwgfcCAQEwLAYHKoZIzj0BAQIhAP////8AAAABAAAA |
| 277 | AAAAAAAAAAAA////////////////MFsEIP////8AAAABAAAAAAAAAAAAAAAA//// |
| 278 | ///////////8BCBaxjXYqjqT57PrvVV2mIa8ZR0GsMxTsPY7zjw+J9JgSwMVAMSd |
| 279 | NgiG5wSTamZ44ROdJreBn36QBEEEaxfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5 |
| 280 | RdiYwpZP40Li/hp/m47n60p8D54WK84zV2sxXs7LtkBoN79R9QIhAP////8AAAAA |
| 281 | //////////+85vqtpxeehPO5ysL8YyVRAgEBA0IABGhuFibgwLdEJBDOLdvSg1Hc |
| 282 | 5EJTDxq6ls5FoYLfThp8HOjuwGSz0qw8ocMqyku1y0V5peQ4rEPd0bwcpZd9svA= |
| 283 | )PEM"; |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 284 | }; |
| 285 | |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 286 | struct EcKeyNamedCurve_DesEncrypted |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 287 | { |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 288 | // Generated with older (1.0.x?) OpenSSL |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 289 | // openssl ecparam -name secp384r1 -genkey -out pvt1.pem |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 290 | // openssl pkcs8 -in pvt1.pem -topk8 -passout pass:password -outform PEM -out pvt8.pem |
| 291 | // openssl ec -in pvt1.pem -pubout -outform PEM -out pub.pem |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 292 | |
| 293 | const size_t keySize = 384; |
| 294 | const std::string privateKeyPkcs1 = |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 295 | R"PEM(MIGkAgEBBDCUsb7NymksCkQAjdLMjUilWhOEyeYmGi79sX1RbsmfnoF/8SesKBhO |
| 296 | or+TZ8g8/8igBwYFK4EEACKhZANiAARWGplLOGdQiXRFQcd0VLPeTt0zXEj5zvSv |
| 297 | aHx9MrzBy57wgz10wTAiR561wuLtFAYxmqL9Ikrzx/BaEg0+v2zQ05NCzMNN8v2c |
| 298 | 7/FzOhD7fmZrlJsT6Q2aHGExW0Rj3GE= |
| 299 | )PEM"; |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 300 | const std::string privateKeyPkcs8 = |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 301 | R"PEM(MIHgMBsGCSqGSIb3DQEFAzAOBAjniUjwJfWsMQICCAAEgcCakGTKa49csaPpmtzi |
| 302 | 5sTJw+AH8ajUqcDbtp2pJP/Ni6M1p9fai9hOKPElf9uJuYh/S80FAU6WQmZBAxL4 |
| 303 | bF598ncLPogpGvz21wLuSc1xnbD829zAsMmh0XZvMZpBWX2g0NnZJx7GOraskTSh |
| 304 | 7qGu70B+uKzw+JxIzgBEeMcoBUg8mTEht5zghfLGYkQp6BpTPdpU64udpPAKzFNs |
| 305 | 5X+BzBnT5Yy49/Lp4uYIji8qwJFF3VqTn8RFKunFYDDejRU= |
| 306 | )PEM"; |
| 307 | const std::string publicKey = |
| 308 | R"PEM(MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEVhqZSzhnUIl0RUHHdFSz3k7dM1xI+c70 |
| 309 | r2h8fTK8wcue8IM9dMEwIkeetcLi7RQGMZqi/SJK88fwWhINPr9s0NOTQszDTfL9 |
| 310 | nO/xczoQ+35ma5SbE+kNmhxhMVtEY9xh |
| 311 | )PEM"; |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 312 | }; |
| 313 | |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 314 | struct EcKeyNamedCurve_Aes256Encrypted |
| 315 | { |
| 316 | // Generated with OpenSSL 3.0.0 |
| 317 | // openssl genpkey -quiet -algorithm EC -pkeyopt ec_paramgen_curve:P-384 |
| 318 | // -pkeyopt ec_param_enc:named_curve -outform PEM -out key.pem |
| 319 | // openssl pkcs8 -in key.pem -nocrypt -traditional -outform PEM -out pvt1.pem |
| 320 | // openssl pkcs8 -in key.pem -topk8 -v2 aes256 -passout pass:password -outform PEM -out pvt8.pem |
| 321 | // openssl pkey -in key.pem -pubout -outform PEM -out pub.pem |
| 322 | |
| 323 | const size_t keySize = 384; |
| 324 | const std::string privateKeyPkcs1 = |
| 325 | R"PEM(MIGkAgEBBDAa5I6hfwcDZ8Hzn6/ZU3jV/Fp6jZP+tgUHSdMcfRS3iLOY296KdcXd |
| 326 | xISVHU3g+XygBwYFK4EEACKhZANiAAQh3xGTxgMFXwoRNBCrnzawZnoQUojZ1Qe5 |
| 327 | 3VrR+9ECawVf2sPklX+Lw1pE1TG5q+YepM8imRclRbXLBSGPF6f+qJCiFWR71XS2 |
| 328 | CX2kW/AZOGluxYrVMe22ns5TY2o50G8= |
| 329 | )PEM"; |
| 330 | const std::string privateKeyPkcs8 = |
| 331 | R"PEM(MIIBHDBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIy4A7Il3JRNQCAggA |
| 332 | MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBBPYOn/2qSDBlKhZ6+ckre8BIHA |
| 333 | jXwlDh+OX+1VayCWohXUooxZPfgKmIVkxhNrQzn0DV/FW9WbiXC72vss75/o5O2H |
| 334 | o4EuIOxnbxIM5HhsrdDY5g8Abkk5gKYt+eVJQn1EPAR+PU9T8OUKyQr9rO0Pvsu8 |
| 335 | 9h5V9+WFHNnNBTN3pqIV5cU25oVX7tqeZKs+5I4QIaq4hzPj+k15dLFaaq5XejZH |
| 336 | KjMKNdKbfz4TEs7u1W9YyrD3Z8/RgzLwVRjJqqOKeoJF4b1lOqOd5rWb4Oa06alr |
| 337 | )PEM"; |
| 338 | const std::string publicKey = |
| 339 | R"PEM(MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEId8Rk8YDBV8KETQQq582sGZ6EFKI2dUH |
| 340 | ud1a0fvRAmsFX9rD5JV/i8NaRNUxuavmHqTPIpkXJUW1ywUhjxen/qiQohVke9V0 |
| 341 | tgl9pFvwGThpbsWK1THttp7OU2NqOdBv |
| 342 | )PEM"; |
| 343 | }; |
| 344 | |
| 345 | struct EcKeyNamedCurve_Des3Encrypted |
| 346 | { |
| 347 | // Generated with OpenSSL 3.0.0 |
| 348 | // openssl genpkey -quiet -algorithm EC -pkeyopt ec_paramgen_curve:P-256 |
| 349 | // -pkeyopt ec_param_enc:named_curve -outform PEM -out key.pem |
| 350 | // openssl pkcs8 -in key.pem -nocrypt -traditional -outform PEM -out pvt1.pem |
| 351 | // openssl pkcs8 -in key.pem -topk8 -v2 des3 -passout pass:password -outform PEM -out pvt8.pem |
| 352 | // openssl pkey -in key.pem -pubout -outform PEM -out pub.pem |
| 353 | |
| 354 | const size_t keySize = 256; |
| 355 | const std::string privateKeyPkcs1 = |
| 356 | R"PEM(MHcCAQEEIEbb/pnOVzkIZP4jrpZQCxl2OTJVQD7rHBJxxv8Aa215oAoGCCqGSM49 |
| 357 | AwEHoUQDQgAEvSFhYwmFe17QAj0xhumERNJFf5MTkAegdE+db4ojchAbcDLRcnzY |
| 358 | +TUx5pTBqdBg+STMK7h36ZUn+KcMeizMRA== |
| 359 | )PEM"; |
| 360 | const std::string privateKeyPkcs8 = |
| 361 | R"PEM(MIHjME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAj2rY09BeCZGgICCAAw |
| 362 | DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQI6CIHMAz7K7AEgZBzyr8QcH1OWEqc |
| 363 | ByPy4Vlze9D0izD7/NIxUeauHILqXMjU6Z057oYZ14Nm+DpbyJWu16gjZ2N+M2GH |
| 364 | 4bH8gS6JUGhqtSbQ1Oo5lmjPXphefZp0tarv19Hp8S1VKmcVoj65kxfn5x0GKepg |
| 365 | fhXlMB2uQHvNoujU9PyeTZhwjAPQ6vHgFonbPPaL/f256NqMmnA= |
| 366 | )PEM"; |
| 367 | const std::string publicKey = |
| 368 | R"PEM(MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEvSFhYwmFe17QAj0xhumERNJFf5MT |
| 369 | kAegdE+db4ojchAbcDLRcnzY+TUx5pTBqdBg+STMK7h36ZUn+KcMeizMRA== |
| 370 | )PEM"; |
| 371 | }; |
| 372 | |
| 373 | using KeyTestDataSets = boost::mpl::vector< |
| 374 | #if OPENSSL_VERSION_NUMBER < 0x30000000L |
| 375 | // DES-encrypted keys |
| 376 | // .privateKeyPkcs8 uses either the PBES1 or PBES2 encryption scheme with DES-CBC-Pad (see RFC 8018) |
| 377 | // This is no longer supported out-of-the-box by OpenSSL 3.0 and later |
| 378 | RsaKey_DesEncrypted, |
| 379 | EcKeySpecifiedCurve_DesEncrypted, |
| 380 | EcKeyNamedCurve_DesEncrypted, |
| 381 | #endif |
| 382 | // AES-encrypted keys |
| 383 | // .privateKeyPkcs8 uses the PBES2 encryption scheme with AES-CBC-Pad (see RFC 8018) |
| 384 | // This works with all supported versions of OpenSSL |
| 385 | RsaKey_Aes256Encrypted, |
| 386 | EcKeyNamedCurve_Aes256Encrypted, |
| 387 | // 3DES-encrypted keys |
| 388 | // .privateKeyPkcs8 uses the PBES2 encryption scheme with DES-EDE3-CBC-Pad (see RFC 8018) |
| 389 | // This works with all supported versions of OpenSSL |
| 390 | EcKeyNamedCurve_Des3Encrypted |
| 391 | >; |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 392 | |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 393 | static void |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 394 | checkPkcs8Encoding(const ConstBufferPtr& encoding, |
| 395 | const std::string& password, |
| 396 | const ConstBufferPtr& pkcs1) |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 397 | { |
| 398 | PrivateKey sKey; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 399 | sKey.loadPkcs8(*encoding, password.data(), password.size()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 400 | OBufferStream os; |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 401 | sKey.savePkcs1(os); |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 402 | BOOST_CHECK_EQUAL_COLLECTIONS(pkcs1->begin(), pkcs1->end(), |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 403 | os.buf()->begin(), os.buf()->end()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 404 | } |
| 405 | |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 406 | static void |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 407 | checkPkcs8Base64Encoding(const ConstBufferPtr& encoding, |
| 408 | const std::string& password, |
| 409 | const ConstBufferPtr& pkcs1) |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 410 | { |
| 411 | OBufferStream os; |
| 412 | bufferSource(*encoding) >> base64Decode() >> streamSink(os); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 413 | checkPkcs8Encoding(os.buf(), password, pkcs1); |
| 414 | } |
| 415 | |
| 416 | BOOST_AUTO_TEST_CASE_TEMPLATE(SaveLoad, T, KeyTestDataSets) |
| 417 | { |
| 418 | T dataSet; |
| 419 | |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 420 | auto sKeyPkcs1Base64 = make_span(reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs1.data()), |
| 421 | dataSet.privateKeyPkcs1.size()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 422 | OBufferStream os; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 423 | bufferSource(sKeyPkcs1Base64) >> base64Decode() >> streamSink(os); |
| 424 | auto sKeyPkcs1 = os.buf(); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 425 | |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 426 | // load key in base64-encoded pkcs1 format |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 427 | PrivateKey sKey; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 428 | BOOST_CHECK_NO_THROW(sKey.loadPkcs1Base64(sKeyPkcs1Base64)); |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 429 | BOOST_CHECK_EQUAL(sKey.getKeySize(), dataSet.keySize); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 430 | |
| 431 | std::stringstream ss2(dataSet.privateKeyPkcs1); |
| 432 | PrivateKey sKey2; |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 433 | BOOST_CHECK_NO_THROW(sKey2.loadPkcs1Base64(ss2)); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 434 | |
| 435 | // load key in pkcs1 format |
| 436 | PrivateKey sKey3; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 437 | BOOST_CHECK_NO_THROW(sKey3.loadPkcs1(*sKeyPkcs1)); |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 438 | BOOST_CHECK_EQUAL(sKey3.getKeySize(), dataSet.keySize); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 439 | |
| 440 | std::stringstream ss4; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 441 | ss4.write(reinterpret_cast<const char*>(sKeyPkcs1->data()), sKeyPkcs1->size()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 442 | PrivateKey sKey4; |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 443 | BOOST_CHECK_NO_THROW(sKey4.loadPkcs1(ss4)); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 444 | |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 445 | // save key in base64-encoded pkcs1 format |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 446 | OBufferStream os2; |
| 447 | BOOST_REQUIRE_NO_THROW(sKey.savePkcs1Base64(os2)); |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 448 | BOOST_CHECK_EQUAL_COLLECTIONS(sKeyPkcs1Base64.begin(), sKeyPkcs1Base64.end(), |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 449 | os2.buf()->begin(), os2.buf()->end()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 450 | |
| 451 | // save key in pkcs1 format |
| 452 | OBufferStream os3; |
| 453 | BOOST_REQUIRE_NO_THROW(sKey.savePkcs1(os3)); |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 454 | BOOST_CHECK_EQUAL_COLLECTIONS(sKeyPkcs1->begin(), sKeyPkcs1->end(), |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 455 | os3.buf()->begin(), os3.buf()->end()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 456 | |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 457 | auto sKeyPkcs8Base64 = make_span(reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs8.data()), |
| 458 | dataSet.privateKeyPkcs8.size()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 459 | OBufferStream os4; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 460 | bufferSource(sKeyPkcs8Base64) >> base64Decode() >> streamSink(os4); |
| 461 | auto sKeyPkcs8 = os4.buf(); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 462 | |
| 463 | std::string password("password"); |
| 464 | std::string wrongpw("wrongpw"); |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 465 | auto pwCallback = [&password] (char* buf, size_t size, int) -> int { |
| 466 | BOOST_REQUIRE_LE(password.size(), size); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 467 | std::copy(password.begin(), password.end(), buf); |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 468 | return static_cast<int>(password.size()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 469 | }; |
| 470 | |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 471 | // load key in base64-encoded pkcs8 format |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 472 | PrivateKey sKey5; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 473 | BOOST_CHECK_NO_THROW(sKey5.loadPkcs8Base64(sKeyPkcs8Base64, password.data(), password.size())); |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 474 | BOOST_CHECK_EQUAL(sKey5.getKeySize(), dataSet.keySize); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 475 | |
| 476 | PrivateKey sKey6; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 477 | BOOST_CHECK_NO_THROW(sKey6.loadPkcs8Base64(sKeyPkcs8Base64, pwCallback)); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 478 | |
| 479 | std::stringstream ss7(dataSet.privateKeyPkcs8); |
| 480 | PrivateKey sKey7; |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 481 | BOOST_CHECK_NO_THROW(sKey7.loadPkcs8Base64(ss7, password.data(), password.size())); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 482 | |
| 483 | std::stringstream ss8(dataSet.privateKeyPkcs8); |
| 484 | PrivateKey sKey8; |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 485 | BOOST_CHECK_NO_THROW(sKey8.loadPkcs8Base64(ss8, pwCallback)); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 486 | |
| 487 | // load key in pkcs8 format |
| 488 | PrivateKey sKey9; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 489 | BOOST_CHECK_NO_THROW(sKey9.loadPkcs8(*sKeyPkcs8, password.data(), password.size())); |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 490 | BOOST_CHECK_EQUAL(sKey9.getKeySize(), dataSet.keySize); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 491 | |
| 492 | PrivateKey sKey10; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 493 | BOOST_CHECK_NO_THROW(sKey10.loadPkcs8(*sKeyPkcs8, pwCallback)); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 494 | |
| 495 | std::stringstream ss11; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 496 | ss11.write(reinterpret_cast<const char*>(sKeyPkcs8->data()), sKeyPkcs8->size()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 497 | PrivateKey sKey11; |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 498 | BOOST_CHECK_NO_THROW(sKey11.loadPkcs8(ss11, password.data(), password.size())); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 499 | |
| 500 | std::stringstream ss12; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 501 | ss12.write(reinterpret_cast<const char*>(sKeyPkcs8->data()), sKeyPkcs8->size()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 502 | PrivateKey sKey12; |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 503 | BOOST_CHECK_NO_THROW(sKey12.loadPkcs8(ss12, pwCallback)); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 504 | |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 505 | // load key using wrong password, Error is expected |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 506 | PrivateKey sKey13; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 507 | BOOST_CHECK_THROW(sKey13.loadPkcs8Base64(sKeyPkcs8Base64, wrongpw.data(), wrongpw.size()), |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 508 | PrivateKey::Error); |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 509 | BOOST_CHECK_EQUAL(sKey13.getKeyType(), KeyType::NONE); |
| 510 | BOOST_CHECK_EQUAL(sKey13.getKeySize(), 0); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 511 | |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 512 | // save key in base64-encoded pkcs8 format |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 513 | OBufferStream os14; |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 514 | BOOST_REQUIRE_NO_THROW(sKey.savePkcs8Base64(os14, password.data(), password.size())); |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 515 | checkPkcs8Base64Encoding(os14.buf(), password, sKeyPkcs1); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 516 | |
| 517 | OBufferStream os15; |
| 518 | BOOST_REQUIRE_NO_THROW(sKey.savePkcs8Base64(os15, pwCallback)); |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 519 | checkPkcs8Base64Encoding(os15.buf(), password, sKeyPkcs1); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 520 | |
| 521 | // save key in pkcs8 format |
| 522 | OBufferStream os16; |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 523 | BOOST_REQUIRE_NO_THROW(sKey.savePkcs8(os16, password.data(), password.size())); |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 524 | checkPkcs8Encoding(os16.buf(), password, sKeyPkcs1); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 525 | |
| 526 | OBufferStream os17; |
| 527 | BOOST_REQUIRE_NO_THROW(sKey.savePkcs8(os17, pwCallback)); |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 528 | checkPkcs8Encoding(os17.buf(), password, sKeyPkcs1); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 529 | } |
| 530 | |
| 531 | BOOST_AUTO_TEST_CASE_TEMPLATE(DerivePublicKey, T, KeyTestDataSets) |
| 532 | { |
| 533 | T dataSet; |
| 534 | |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 535 | auto sKeyPkcs1Base64 = make_span(reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs1.data()), |
| 536 | dataSet.privateKeyPkcs1.size()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 537 | PrivateKey sKey; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 538 | sKey.loadPkcs1Base64(sKeyPkcs1Base64); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 539 | |
| 540 | // derive public key and compare |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 541 | ConstBufferPtr pKeyBits = sKey.derivePublicKey(); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 542 | OBufferStream os; |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 543 | bufferSource(dataSet.publicKey) >> base64Decode() >> streamSink(os); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 544 | BOOST_CHECK_EQUAL_COLLECTIONS(pKeyBits->begin(), pKeyBits->end(), |
| 545 | os.buf()->begin(), os.buf()->end()); |
| 546 | } |
| 547 | |
| 548 | BOOST_AUTO_TEST_CASE(RsaDecryption) |
| 549 | { |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 550 | RsaKey_Aes256Encrypted dataSet; |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 551 | |
| 552 | PrivateKey sKey; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 553 | sKey.loadPkcs1Base64({reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs1.data()), |
| 554 | dataSet.privateKeyPkcs1.size()}); |
Davide Pesavento | 06f1bdf | 2017-09-16 18:59:15 -0400 | [diff] [blame] | 555 | BOOST_CHECK_EQUAL(sKey.getKeyType(), KeyType::RSA); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 556 | |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 557 | const uint8_t plaintext[] = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07}; |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 558 | |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 559 | // Ciphertext generated with OpenSSL 3.0.0 |
| 560 | // printf ... | openssl pkeyutl -encrypt -inkey pub.pem -pubin -pkeyopt rsa_padding_mode:oaep | base64 |
| 561 | const std::string ciphertext = |
| 562 | R"BASE64(BgVqf6yKhMytCeL6+/oEoyx9rahh2+a1iU0D17RgfX6Q/3eNEcC2xY5QomjI7k/no8yiTZbXT9R4 |
| 563 | REE6ic0DjFSbFwJjC/P0/oTSQyUNn4xNO+aK0MGnyeN34A8c3bZfLuo2DU496SQF0B9I5SS3gEA9 |
| 564 | rqdIAdbWoOCKi1EX5SXtAOPTsj5PHHH+UM52bxOrUPvGSl9tRaz5S6hVf2haSoio4nnG3/bA6pdb |
| 565 | hHjyHHA/oi1PlFRIe0EO2/riAdqdIW3eOqZGP5t5QAMmiP178A9YQdbSavTgBSuE20T01U82Ln+L |
| 566 | pNk+PE/mmM20iNBo8C9cAJVUju6T4DCNZk7H5Q== |
| 567 | )BASE64"; |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 568 | OBufferStream os; |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 569 | bufferSource(ciphertext) >> base64Decode() >> streamSink(os); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 570 | |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 571 | auto decrypted = sKey.decrypt(*os.buf()); |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 572 | BOOST_CHECK_EQUAL_COLLECTIONS(plaintext, plaintext + sizeof(plaintext), |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 573 | decrypted->begin(), decrypted->end()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 574 | } |
| 575 | |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 576 | BOOST_AUTO_TEST_CASE(RsaEncryptDecrypt) |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 577 | { |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 578 | RsaKey_Aes256Encrypted dataSet; |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 579 | |
| 580 | PublicKey pKey; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 581 | pKey.loadPkcs8Base64({reinterpret_cast<const uint8_t*>(dataSet.publicKey.data()), |
| 582 | dataSet.publicKey.size()}); |
Davide Pesavento | 06f1bdf | 2017-09-16 18:59:15 -0400 | [diff] [blame] | 583 | BOOST_CHECK_EQUAL(pKey.getKeyType(), KeyType::RSA); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 584 | |
| 585 | PrivateKey sKey; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 586 | sKey.loadPkcs1Base64({reinterpret_cast<const uint8_t*>(dataSet.privateKeyPkcs1.data()), |
| 587 | dataSet.privateKeyPkcs1.size()}); |
Davide Pesavento | 06f1bdf | 2017-09-16 18:59:15 -0400 | [diff] [blame] | 588 | BOOST_CHECK_EQUAL(sKey.getKeyType(), KeyType::RSA); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 589 | |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 590 | const uint8_t plaintext[] = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07}; |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 591 | |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 592 | auto ciphertext = pKey.encrypt(plaintext); |
| 593 | auto decrypted = sKey.decrypt(*ciphertext); |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 594 | BOOST_CHECK_EQUAL_COLLECTIONS(plaintext, plaintext + sizeof(plaintext), |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 595 | decrypted->begin(), decrypted->end()); |
| 596 | } |
| 597 | |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 598 | BOOST_AUTO_TEST_CASE(UnsupportedDecryption) |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 599 | { |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 600 | OBufferStream os; |
| 601 | bufferSource("Y2lhbyFob2xhIWhlbGxvIQ==") >> base64Decode() >> streamSink(os); |
| 602 | |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 603 | auto ecKey = generatePrivateKey(EcKeyParams()); |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 604 | BOOST_CHECK_THROW(ecKey->decrypt(*os.buf()), PrivateKey::Error); |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 605 | |
| 606 | auto hmacKey = generatePrivateKey(HmacKeyParams()); |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 607 | BOOST_CHECK_THROW(hmacKey->decrypt(*os.buf()), PrivateKey::Error); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 608 | } |
| 609 | |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 610 | class RsaKeyGenParams |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 611 | { |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 612 | public: |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 613 | using Params = RsaKeyParams; |
| 614 | using hasPublicKey = std::true_type; |
| 615 | using canSavePkcs1 = std::true_type; |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 616 | |
| 617 | static void |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 618 | checkPublicKey(const Buffer&) |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 619 | { |
| 620 | } |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 621 | }; |
| 622 | |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 623 | class EcKeyGenParams |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 624 | { |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 625 | public: |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 626 | using Params = EcKeyParams; |
| 627 | using hasPublicKey = std::true_type; |
| 628 | using canSavePkcs1 = std::true_type; |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 629 | |
| 630 | static void |
| 631 | checkPublicKey(const Buffer& bits) |
| 632 | { |
| 633 | // EC key generation should use named curve format. See https://redmine.named-data.net/issues/5037 |
| 634 | // OBJECT IDENTIFIER 1.2.840.10045.3.1.7 prime256v1 (ANSI X9.62 named elliptic curve) |
| 635 | const uint8_t oid[] = {0x06, 0x08, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07}; |
| 636 | BOOST_CHECK_MESSAGE(std::search(bits.begin(), bits.end(), oid, oid + sizeof(oid)) != bits.end(), |
| 637 | "OID not found in " << toHex(bits)); |
| 638 | } |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 639 | }; |
| 640 | |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 641 | class HmacKeyGenParams |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 642 | { |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 643 | public: |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 644 | using Params = HmacKeyParams; |
| 645 | using hasPublicKey = std::false_type; |
| 646 | using canSavePkcs1 = std::false_type; |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 647 | |
| 648 | static void |
Davide Pesavento | ea9e43e | 2021-09-20 00:45:03 -0400 | [diff] [blame] | 649 | checkPublicKey(const Buffer&) |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 650 | { |
| 651 | } |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 652 | }; |
| 653 | |
Davide Pesavento | 94dfcf1 | 2021-09-26 14:18:45 -0400 | [diff] [blame] | 654 | using KeyGenParams = boost::mpl::vector< |
| 655 | #if OPENSSL_VERSION_NUMBER < 0x30000000L // FIXME #5154 |
| 656 | HmacKeyGenParams, |
| 657 | #endif |
| 658 | RsaKeyGenParams, |
| 659 | EcKeyGenParams |
| 660 | >; |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 661 | |
| 662 | BOOST_AUTO_TEST_CASE_TEMPLATE(GenerateKey, T, KeyGenParams) |
| 663 | { |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 664 | typename T::Params params; |
| 665 | auto sKey = generatePrivateKey(params); |
| 666 | BOOST_CHECK_EQUAL(sKey->getKeyType(), params.getKeyType()); |
| 667 | BOOST_CHECK_EQUAL(sKey->getKeySize(), params.getKeySize()); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 668 | |
Luca Keidel | 941fd8c | 2017-07-24 15:21:22 +0200 | [diff] [blame] | 669 | const uint8_t data[] = {0x01, 0x02, 0x03, 0x04}; |
Yingdi Yu | b263f15 | 2015-07-12 16:50:13 -0700 | [diff] [blame] | 670 | OBufferStream os; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 671 | BOOST_REQUIRE_NO_THROW(bufferSource(data) >> |
Yingdi Yu | b263f15 | 2015-07-12 16:50:13 -0700 | [diff] [blame] | 672 | signerFilter(DigestAlgorithm::SHA256, *sKey) >> |
| 673 | streamSink(os)); |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 674 | auto sig = os.buf(); |
Yingdi Yu | b263f15 | 2015-07-12 16:50:13 -0700 | [diff] [blame] | 675 | |
Yingdi Yu | b263f15 | 2015-07-12 16:50:13 -0700 | [diff] [blame] | 676 | bool result = false; |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 677 | if (typename T::hasPublicKey()) { |
| 678 | auto pKeyBits = sKey->derivePublicKey(); |
Junxiao Shi | fbb6990 | 2020-04-24 08:39:18 +0000 | [diff] [blame] | 679 | BOOST_REQUIRE(pKeyBits != nullptr); |
| 680 | T::checkPublicKey(*pKeyBits); |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 681 | PublicKey pKey; |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 682 | pKey.loadPkcs8(*pKeyBits); |
| 683 | BOOST_CHECK_NO_THROW(bufferSource(data) >> |
Davide Pesavento | 5d0b010 | 2017-10-07 13:43:16 -0400 | [diff] [blame] | 684 | verifierFilter(DigestAlgorithm::SHA256, pKey, sig->data(), sig->size()) >> |
Yingdi Yu | b263f15 | 2015-07-12 16:50:13 -0700 | [diff] [blame] | 685 | boolSink(result)); |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 686 | } |
| 687 | else { |
| 688 | #if OPENSSL_VERSION_NUMBER >= 0x1010100fL |
| 689 | BOOST_CHECK_THROW(sKey->derivePublicKey(), PrivateKey::Error); |
| 690 | #endif |
Davide Pesavento | 765abc9 | 2021-12-27 00:44:04 -0500 | [diff] [blame] | 691 | BOOST_CHECK_NO_THROW(bufferSource(data) >> |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 692 | verifierFilter(DigestAlgorithm::SHA256, *sKey, sig->data(), sig->size()) >> |
| 693 | boolSink(result)); |
| 694 | } |
Yingdi Yu | b263f15 | 2015-07-12 16:50:13 -0700 | [diff] [blame] | 695 | BOOST_CHECK(result); |
| 696 | |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 697 | if (typename T::canSavePkcs1()) { |
Davide Pesavento | 1bac111 | 2019-06-13 21:48:46 -0400 | [diff] [blame] | 698 | auto sKey2 = generatePrivateKey(params); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 699 | |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 700 | OBufferStream os1; |
| 701 | sKey->savePkcs1(os1); |
| 702 | OBufferStream os2; |
| 703 | sKey2->savePkcs1(os2); |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 704 | |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 705 | BOOST_CHECK(*os1.buf() != *os2.buf()); |
| 706 | } |
| 707 | else { |
| 708 | #if OPENSSL_VERSION_NUMBER >= 0x1010100fL |
| 709 | OBufferStream os1; |
| 710 | BOOST_CHECK_THROW(sKey->savePkcs1(os1), PrivateKey::Error); |
| 711 | #endif |
| 712 | } |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 713 | } |
| 714 | |
Laqin Fan | 0fe72ea | 2019-05-22 16:42:59 -0500 | [diff] [blame] | 715 | BOOST_AUTO_TEST_CASE(GenerateKeyUnsupportedType) |
Davide Pesavento | f45fa21 | 2017-09-14 17:23:56 -0400 | [diff] [blame] | 716 | { |
| 717 | BOOST_CHECK_THROW(generatePrivateKey(AesKeyParams()), std::invalid_argument); |
| 718 | } |
| 719 | |
Yingdi Yu | 202a2e9 | 2015-07-12 16:49:25 -0700 | [diff] [blame] | 720 | BOOST_AUTO_TEST_SUITE_END() // TestPrivateKey |
| 721 | BOOST_AUTO_TEST_SUITE_END() // Transform |
| 722 | BOOST_AUTO_TEST_SUITE_END() // Security |
| 723 | |
| 724 | } // namespace tests |
| 725 | } // namespace transform |
| 726 | } // namespace security |
| 727 | } // namespace ndn |