259 lines
11 KiB
C++
259 lines
11 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "BTVerifier.h"
|
|
#include "CTTestUtils.h"
|
|
#include "gtest/gtest.h"
|
|
|
|
#include "nss.h"
|
|
|
|
namespace mozilla {
|
|
namespace ct {
|
|
|
|
using namespace pkix;
|
|
|
|
struct BTVerificationTestParams {
|
|
const char* mInclusionProofHex;
|
|
const char* mExpectedRootHashHex;
|
|
const char* mInputHex;
|
|
pkix::DigestAlgorithm mDigestAlgorithm;
|
|
pkix::Result mExpectedVerificationResult;
|
|
};
|
|
|
|
class BTVerificationTest
|
|
: public ::testing::Test,
|
|
public ::testing::WithParamInterface<BTVerificationTestParams> {
|
|
void SetUp() override {
|
|
if (!NSS_IsInitialized()) {
|
|
if (NSS_NoDB_Init(nullptr) != SECSuccess) {
|
|
abort();
|
|
}
|
|
}
|
|
}
|
|
};
|
|
|
|
// This comes from testing/mozharness/test/test_mozilla_merkle.py
|
|
static const char* kValidInclusionProofHex =
|
|
"020000"
|
|
"0000000000000007" // 7 total nodes
|
|
"0000000000000005" // leaf index is 5
|
|
"0063" // 99 (in base 10) bytes follow
|
|
"20" // 32 byte hash
|
|
"2ff3bdac9bec3580b82da8a357746f15919414d9cbe517e2dd96910c9814c30c"
|
|
"20"
|
|
"bb13dfb7b202a95f241ea1715c8549dc048d9936ec747028002f7c795de72fcf"
|
|
"20"
|
|
"380d0dc6fd7d4f37859a12dbfc7171b3cce29ab0688c6cffd2b15f3e0b21af49";
|
|
|
|
static const char* kExpectedRootHashHex =
|
|
"d1a0d3947db4ae8305f2ac32985957e02659b2ea3c10da52a48d2526e9af3bbc";
|
|
|
|
static const char* kInputHex = "81aae91cf90be172eedd1c75c349bf9e";
|
|
static const char* kAlteredInputHex = "81aae91c0000000000000000c349bf9e";
|
|
|
|
// Same as kValidInclusionProofHex, but missing the last hash (the proof is
|
|
// still structurally valid, so it decodes successfully).
|
|
static const char* kShortInclusionProofHex =
|
|
"020000"
|
|
"0000000000000007" // 7 total nodes
|
|
"0000000000000005" // leaf index is 5
|
|
"0042" // 66 (in base 10) bytes follow
|
|
"20" // 32 byte hash
|
|
"2ff3bdac9bec3580b82da8a357746f15919414d9cbe517e2dd96910c9814c30c"
|
|
"20"
|
|
"bb13dfb7b202a95f241ea1715c8549dc048d9936ec747028002f7c795de72fcf";
|
|
|
|
// Same as kValidInclusionProofHex, but has too many hashes (the proof is
|
|
// still structurally valid, so it decodes successfully).
|
|
static const char* kLongInclusionProofHex =
|
|
"020000"
|
|
"0000000000000007" // 7 total nodes
|
|
"0000000000000005" // leaf index is 5
|
|
"0084" // 132 (in base 10) bytes follow
|
|
"20" // 32 byte hash
|
|
"2ff3bdac9bec3580b82da8a357746f15919414d9cbe517e2dd96910c9814c30c"
|
|
"20"
|
|
"bb13dfb7b202a95f241ea1715c8549dc048d9936ec747028002f7c795de72fcf"
|
|
"20"
|
|
"380d0dc6fd7d4f37859a12dbfc7171b3cce29ab0688c6cffd2b15f3e0b21af49"
|
|
"20"
|
|
"abbaabbaabbaabbaabbaabbaabbaabbaabbaabbaabbaabbaabbaabbaabbaabba";
|
|
|
|
static const char* kIncorrectRootHashHex =
|
|
"beebeebeebeebeebeebeebeebeebeebeebeebeebeebeebeebeebeebeebeebeee";
|
|
|
|
static const char* kWrongTreeSizeInclusionProofHex =
|
|
"020000"
|
|
"0000000000000009" // 9 total nodes (this is wrong)
|
|
"0000000000000005" // leaf index is 5
|
|
"0063" // 99 (in base 10) bytes follow
|
|
"20" // 32 byte hash
|
|
"2ff3bdac9bec3580b82da8a357746f15919414d9cbe517e2dd96910c9814c30c"
|
|
"20"
|
|
"bb13dfb7b202a95f241ea1715c8549dc048d9936ec747028002f7c795de72fcf"
|
|
"20"
|
|
"380d0dc6fd7d4f37859a12dbfc7171b3cce29ab0688c6cffd2b15f3e0b21af49";
|
|
|
|
static const char* kWrongLeafIndexInclusionProofHex =
|
|
"020000"
|
|
"0000000000000007" // 7 total nodes
|
|
"0000000000000002" // leaf index is 2 (this is wrong)
|
|
"0063" // 99 (in base 10) bytes follow
|
|
"20" // 32 byte hash
|
|
"2ff3bdac9bec3580b82da8a357746f15919414d9cbe517e2dd96910c9814c30c"
|
|
"20"
|
|
"bb13dfb7b202a95f241ea1715c8549dc048d9936ec747028002f7c795de72fcf"
|
|
"20"
|
|
"380d0dc6fd7d4f37859a12dbfc7171b3cce29ab0688c6cffd2b15f3e0b21af49";
|
|
|
|
// This is a longer proof taken from the Firefox 62.0.2 release.
|
|
static const char* kValidInclusionProof2Hex =
|
|
"020000"
|
|
"0000000000000cb3"
|
|
"00000000000000e2"
|
|
"018c"
|
|
"20"
|
|
"6d3d060c72c28cd1967a6ce4e87a470c266981ee8beb6e5956745b5839120338"
|
|
"20"
|
|
"cd028053c51f52447cd2b1ffea7761be546b72832d776db155008dc3071231eb"
|
|
"20"
|
|
"36167b32f7ba4980257c79ed65d133d8c53efbfd7addaa391a121953c78b2b98"
|
|
"20"
|
|
"f2b4abf09140b05058a74e25f4008157655e73fa4aeece9b3f2a40dbbae95c16"
|
|
"20"
|
|
"a2be4813b2ca0e7bb755ed5459789c25a83465fb3f2808590c04c64cdbb404ef"
|
|
"20"
|
|
"43e4341b74ea11f075f35761b867cb256e9d42c4c1253d6b5c958174daa800da"
|
|
"20"
|
|
"1c925ec8d2d4014c0b84d7bed8065d9e7b326e3e4eaebc90d7a6a66431249851"
|
|
"20"
|
|
"bd275e9e4e48c3725f6ef68c2661d4d6ae415129cfb0ea0881177f5347d683ae"
|
|
"20"
|
|
"01e84996a7cc1719b19a4a7e48941657b125bcd0dfd03d183daff87de6a480c3"
|
|
"20"
|
|
"664b6962909692980661be55e8bdadc48350b2461d37372457e8ff97824ae8da"
|
|
"20"
|
|
"39f7ab1500a58643fccc9e07ed409be4c707c5536b95c57f6716207656464019"
|
|
"20"
|
|
"d68c856664d660456d4c85498c2cc2abfb955a63bd1fb23f3e25850da80153f6";
|
|
|
|
static const char* kExpectedRootHash2Hex =
|
|
"0d489b16a64b80035a8d08ce55549c89c4b67be64a0456382cc5be1e51ddae1a";
|
|
|
|
// This the hex encoding of the SHA-256 hash of
|
|
// linux-x86_64/en-US/firefox-62.0.2.tar.bz2, encoded (again) in hex (because
|
|
// that's how generate-checksums.py currently builds the binary transparency
|
|
// tree).
|
|
static const char* kInput2Hex =
|
|
"3231623461306361626538663030306261663236373235643530313462386434"
|
|
"3865353561333832336538653665656131343638313062313031623034396536";
|
|
|
|
// This is the hex encoding of an inclusion proof for
|
|
// update/win32/en-GB/firefox-61.0-62.0.2.partial.mar using SHA-512.
|
|
static const char* kValidInclusionProofSHA512Hex =
|
|
"020000"
|
|
"0000000000000cb3"
|
|
"00000000000007ac"
|
|
"030c"
|
|
"40"
|
|
"b39fbe359108724ec1daed2a8c88511c6b94a74563bfaaf25b774286ab03cab9"
|
|
"b2e64bbd4eeb02003b7397cd814b5d18a160e14ad08eca04559abe146201e027"
|
|
"40"
|
|
"de119745a41884ed482a41638cc1979d89e1bd0ca295e0c412e7ee4b5c2e042d"
|
|
"a1f4aa9c7f1e58b78fac10400b207197383177401976ef6baa80d482c102a94f"
|
|
"40"
|
|
"d0fe203b0e95cbe48e2e663538aba382718c85ae167d8c4ccf326519f81b3860"
|
|
"55058f6a49943b8ed228af88b3414ec00e939ad8dc736f502ca90d63494eddcd"
|
|
"40"
|
|
"ae825352bbe12845fb1d3be27375c27dd462ebd6dc6d7bd0b5929df97aaccf1a"
|
|
"9eedb304ae1e9742b1e2a2ba8b22408d2d52e3bb3d547632d5f03cfe112572d2"
|
|
"40"
|
|
"1ab0f7f7d674c691cf8e51d4409d3402d94927231b82f7f71f16828dd9e36152"
|
|
"1a69f7e571df06aea16c83df88dc74042444ae8771375a7118477275395b570d"
|
|
"40"
|
|
"9c6b94c5be456c68518753cf626daf11b30ce981e18b76c036664dcafeba19b7"
|
|
"3f5ee20ab35aa38b11c92e2c8f103d1b19113b7171c615ce0b9c5ff520242d8c"
|
|
"40"
|
|
"d395ef3cd63ae617a96bd6c5c361d5f6aaccff1ed90599115394310dfa0c528d"
|
|
"611998d325f374c01a827ee900d72ed66d299845438bba565ba666c588b232a0"
|
|
"40"
|
|
"ce3548561f5ec7a94a6c7a2adc604f5e32869d0727cee80f12c95cab2a996965"
|
|
"6ad61a02b35e0fb2d0031ea496381f1413d33b8cbfdf092accd903881e083ee0"
|
|
"40"
|
|
"a4247b649fee9017d9c9e729c4763719b7155056013abc488de0079dc7bddce6"
|
|
"57a93f2596967cfb123d812a901bc4ffe0338cbecf30adc1a821e7261f88e3cd"
|
|
"40"
|
|
"7d2056ea6645b0306373fa2e26fbc4a4ccd4c82cb7d605d2372fa297654cd3a0"
|
|
"b151f6b0fffe7472661de79c7ce7873cb75e05cad5ea40173be540e16d51414d"
|
|
"40"
|
|
"eed2c98b3d8b8035777af74a0d5dd38963f84c09e6f42b6ca4e290674c175035"
|
|
"b9bc85bb4304fcf3d042c444f951b3b134563c6936a1b176679e35e94c42416b"
|
|
"40"
|
|
"6167cccd9d03909f95bb389936766340234b5b3e35dfa8c81d330db9055d7b7d"
|
|
"bfaf262f1821b4a68f43af62c53987550b4174eaab8357f9bd83f2715c98d441";
|
|
|
|
// This is the hex encoding of the expected root hash of the SHA-512 tree.
|
|
static const char* kExpectedRootHashSHA512Hex =
|
|
"6f20812da2980393767e98dd7f79d89aa41e029c790d3908739c02c01d9c6525"
|
|
"8bb3e24ab608c95b063259620751ce258930d48929cbe543b166c33c4de65e60";
|
|
|
|
// This the hex encoding of the SHA-512 hash of
|
|
// update/win32/en-GB/firefox-61.0-62.0.2.partial.mar, encoded (again) in hex.
|
|
static const char* kInputSHA512Hex =
|
|
"6237656563626164353363386432346230383763666437323333303162326437"
|
|
"6234326136323536663462636336356134623231636437376133613830613734"
|
|
"3865396533623666306432333839666234623763396563356638643833373534"
|
|
"6239313635313165333661373238653863303236376564653761666561316638";
|
|
|
|
MOZ_RUNINIT static const BTVerificationTestParams
|
|
BT_VERIFICATION_TEST_PARAMS[] = {
|
|
{kValidInclusionProofHex, kExpectedRootHashHex, kInputHex,
|
|
pkix::DigestAlgorithm::sha256, Success},
|
|
{kValidInclusionProofHex, kExpectedRootHashHex, kAlteredInputHex,
|
|
pkix::DigestAlgorithm::sha256, pkix::Result::ERROR_BAD_SIGNATURE},
|
|
{kShortInclusionProofHex, kExpectedRootHashHex, kInputHex,
|
|
pkix::DigestAlgorithm::sha256, pkix::Result::ERROR_BAD_SIGNATURE},
|
|
{kLongInclusionProofHex, kExpectedRootHashHex, kInputHex,
|
|
pkix::DigestAlgorithm::sha256, pkix::Result::ERROR_BAD_SIGNATURE},
|
|
{kValidInclusionProofHex, kIncorrectRootHashHex, kInputHex,
|
|
pkix::DigestAlgorithm::sha256, pkix::Result::ERROR_BAD_SIGNATURE},
|
|
{kWrongTreeSizeInclusionProofHex, kExpectedRootHashHex, kInputHex,
|
|
pkix::DigestAlgorithm::sha256, pkix::Result::ERROR_BAD_SIGNATURE},
|
|
{kWrongLeafIndexInclusionProofHex, kExpectedRootHashHex, kInputHex,
|
|
pkix::DigestAlgorithm::sha256, pkix::Result::ERROR_BAD_SIGNATURE},
|
|
{kValidInclusionProofHex, kExpectedRootHashHex, kInputHex,
|
|
pkix::DigestAlgorithm::sha512, pkix::Result::ERROR_BAD_SIGNATURE},
|
|
{kValidInclusionProof2Hex, kExpectedRootHash2Hex, kInput2Hex,
|
|
pkix::DigestAlgorithm::sha256, Success},
|
|
{kValidInclusionProofSHA512Hex, kExpectedRootHashSHA512Hex,
|
|
kInputSHA512Hex, pkix::DigestAlgorithm::sha512, Success},
|
|
{kValidInclusionProofSHA512Hex, kExpectedRootHashSHA512Hex,
|
|
kInputSHA512Hex, pkix::DigestAlgorithm::sha256,
|
|
pkix::Result::ERROR_BAD_SIGNATURE},
|
|
};
|
|
|
|
TEST_P(BTVerificationTest, BTVerificationSimpleTest) {
|
|
const BTVerificationTestParams& params(GetParam());
|
|
|
|
Buffer encodedProofBuffer(HexToBytes(params.mInclusionProofHex));
|
|
Input encodedProof = InputForBuffer(encodedProofBuffer);
|
|
InclusionProofDataV2 ipr;
|
|
ASSERT_EQ(Success, DecodeInclusionProof(encodedProof, ipr));
|
|
|
|
Buffer leafEntryBuffer(HexToBytes(params.mInputHex));
|
|
Input leafEntry = InputForBuffer(leafEntryBuffer);
|
|
Buffer expectedRootHashBuffer(HexToBytes(params.mExpectedRootHashHex));
|
|
Input expectedRootHash = InputForBuffer(expectedRootHashBuffer);
|
|
ASSERT_EQ(params.mExpectedVerificationResult,
|
|
VerifyInclusionProof(ipr, leafEntry, expectedRootHash,
|
|
params.mDigestAlgorithm));
|
|
}
|
|
|
|
INSTANTIATE_TEST_SUITE_P(BTVerificationTest, BTVerificationTest,
|
|
testing::ValuesIn(BT_VERIFICATION_TEST_PARAMS));
|
|
|
|
} // namespace ct
|
|
} // namespace mozilla
|