/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this file, * You can obtain one at http://mozilla.org/MPL/2.0/. */ #include #include "nss.h" #include "pk11pub.h" #include "sechash.h" #include "nss_scoped_ptrs.h" #include "databuffer.h" #include "gtest/gtest.h" namespace nss_test { // For test vectors. struct Pkcs11SignatureTestParams { const DataBuffer pkcs8_; const DataBuffer spki_; const DataBuffer data_; const DataBuffer signature_; }; class Pk11SignatureTest : public ::testing::Test { protected: Pk11SignatureTest(CK_MECHANISM_TYPE mech, SECOidTag hash_oid, CK_MECHANISM_TYPE combo) : mechanism_(mech), hash_oid_(hash_oid), combo_(combo) { skip_raw_ = false; skip_digest_ = false; } Pk11SignatureTest(CK_MECHANISM_TYPE mech) : mechanism_(mech) { skip_digest_ = true; } virtual const SECItem* parameters() const { return nullptr; } CK_MECHANISM_TYPE mechanism() const { return mechanism_; } void setSkipRaw(bool skip_raw) { skip_raw_ = true; } bool ExportPrivateKey(ScopedSECKEYPrivateKey* key, DataBuffer& pkcs8) { SECItem* pkcs8Item = PK11_ExportDERPrivateKeyInfo(key->get(), nullptr); if (!pkcs8Item) { return false; } pkcs8.Assign(pkcs8Item->data, pkcs8Item->len); SECITEM_ZfreeItem(pkcs8Item, PR_TRUE); return true; } ScopedSECKEYPrivateKey ImportPrivateKey(const DataBuffer& pkcs8); ScopedSECKEYPublicKey ImportPublicKey(const DataBuffer& spki); bool ComputeHash(const DataBuffer& data, DataBuffer* hash) { hash->Allocate(static_cast(HASH_ResultLenByOidTag(hash_oid_))); SECStatus rv = PK11_HashBuf(hash_oid_, hash->data(), data.data(), data.len()); return rv == SECSuccess; } bool SignRaw(ScopedSECKEYPrivateKey& privKey, const DataBuffer& hash, DataBuffer* sig); bool DigestAndSign(ScopedSECKEYPrivateKey& privKey, const DataBuffer& data, DataBuffer* sig); bool ImportPrivateKeyAndSignHashedData(const DataBuffer& pkcs8, const DataBuffer& data, DataBuffer* sig, DataBuffer* sig2); /* most primitive verify implemented in pk11_signature_test.cpp */ void Verify(ScopedSECKEYPublicKey& pubKey, const DataBuffer& data, const DataBuffer& sig, bool valid); /* quick helper functions that use the primitive verify */ void Verify(ScopedSECKEYPublicKey& pubKey, const DataBuffer& data, const DataBuffer& sig) { Verify(pubKey, data, sig, true); } void Verify(const Pkcs11SignatureTestParams& params, const DataBuffer& sig, bool valid) { ScopedSECKEYPublicKey pubKey(ImportPublicKey(params.spki_)); ASSERT_TRUE(pubKey); Verify(pubKey, params.data_, sig, valid); } void Verify(const Pkcs11SignatureTestParams& params, bool valid) { Verify(params, params.signature_, valid); } void Verify(const Pkcs11SignatureTestParams& params) { Verify(params, params.signature_, true); } void SignAndVerify(const Pkcs11SignatureTestParams& params) { DataBuffer sig; DataBuffer sig2; ASSERT_TRUE(ImportPrivateKeyAndSignHashedData(params.pkcs8_, params.data_, &sig, &sig2)); Verify(params, sig, true); Verify(params, sig2, true); } void SignAndVerifyRaw(const Pkcs11SignatureTestParams& params) { ScopedSECKEYPrivateKey privKey(ImportPrivateKey(params.pkcs8_)); ASSERT_NE(privKey, nullptr); DataBuffer sig; SignRaw(privKey, params.data_, &sig); EXPECT_EQ(sig, params.signature_); Verify(params, sig, true); } // Importing a private key in PKCS#8 format and reexporting it should // result in the same binary representation. void ImportExport(const DataBuffer& k) { DataBuffer exported; ScopedSECKEYPrivateKey key = ImportPrivateKey(k); ExportPrivateKey(&key, exported); EXPECT_EQ(k, exported); } private: CK_MECHANISM_TYPE mechanism_; SECOidTag hash_oid_; CK_MECHANISM_TYPE combo_; bool skip_raw_; bool skip_digest_; }; } // namespace nss_test