Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(141)

Unified Diff: net/cert/internal/verify_signed_data_unittest.cc

Issue 1259313002: Add some policy controls for VerifySignedData(). (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@add_python
Patch Set: Address Ryan's comments Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/cert/internal/verify_signed_data_unittest.cc
diff --git a/net/cert/internal/verify_signed_data_unittest.cc b/net/cert/internal/verify_signed_data_unittest.cc
index ebd8e461c1a4b9f5c5bf2368bc91311e73275cb7..41ca4428b6f7f9554ef38103dc1b86428b677862 100644
--- a/net/cert/internal/verify_signed_data_unittest.cc
+++ b/net/cert/internal/verify_signed_data_unittest.cc
@@ -10,10 +10,15 @@
#include "base/files/file_util.h"
#include "base/path_service.h"
#include "net/cert/internal/signature_algorithm.h"
+#include "net/cert/internal/signature_policy.h"
#include "net/cert/pem_tokenizer.h"
#include "net/der/input.h"
#include "testing/gtest/include/gtest/gtest.h"
+#if defined(USE_OPENSSL)
+#include <openssl/obj_mac.h>
+#endif
+
namespace net {
namespace {
@@ -102,14 +107,17 @@ enum VerifyResult {
FAILURE,
};
-// Reads test data from |file_name| and runs VerifySignedData() over its inputs.
+// Reads test data from |file_name| and runs VerifySignedData() over its
+// inputs, using |policy|.
//
// If expected_result was SUCCESS then the test will only succeed if
// VerifySignedData() returns true.
//
// If expected_result was FAILURE then the test will only succeed if
// VerifySignedData() returns false.
-void RunTestCase(VerifyResult expected_result, const char* file_name) {
+void RunTestCaseUsingPolicy(VerifyResult expected_result,
+ const char* file_name,
+ const SignaturePolicy* policy) {
#if !defined(USE_OPENSSL)
LOG(INFO) << "Skipping test, only implemented for BoringSSL";
return;
@@ -139,7 +147,15 @@ void RunTestCase(VerifyResult expected_result, const char* file_name) {
expected_result_bool,
VerifySignedData(*signature_algorithm, InputFromString(&signed_data),
InputFromString(&signature_value),
- InputFromString(&public_key)));
+ InputFromString(&public_key), policy));
+}
+
+// RunTestCase() is the same as RunTestCaseUsingPolicy(), only it uses a
+// default policy. This policy will accept a basic profile of signature
+// algorithms (including ANY sized RSA key >= 1024).
+void RunTestCase(VerifyResult expected_result, const char* file_name) {
+ SimpleSignaturePolicy policy(1024);
+ return RunTestCaseUsingPolicy(expected_result, file_name, &policy);
}
// Read the descriptions in the test files themselves for details on what is
@@ -153,6 +169,10 @@ TEST(VerifySignedDataTest, RsaPkcs1Sha256) {
RunTestCase(SUCCESS, "rsa-pkcs1-sha256.pem");
}
+TEST(VerifySignedDataTest, Rsa2048Pkcs1Sha512) {
+ RunTestCase(SUCCESS, "rsa2048-pkcs1-sha512.pem");
+}
+
TEST(VerifySignedDataTest, RsaPkcs1Sha256KeyEncodedBer) {
// TODO(eroman): This should fail! (SPKI should be DER-encoded).
RunTestCase(SUCCESS, "rsa-pkcs1-sha256-key-encoded-ber.pem");
@@ -276,6 +296,91 @@ TEST(VerifySignedDataTest, EcdsaPrime256v1Sha512SignatureNotBitString) {
RunTestCase(FAILURE, "ecdsa-prime256v1-sha512-signature-not-bitstring.pem");
}
+// This policy rejects specifically secp384r1 curves.
+class RejectSecp384r1Policy : public SignaturePolicy {
+ public:
+ bool IsAcceptableCurveForEcdsa(int curve_nid) const override {
+#if defined(USE_OPENSSL)
+ if (curve_nid == NID_secp384r1)
+ return false;
+#endif
+ return true;
+ }
+};
+
+TEST(VerifySignedDataTest, PolicyIsAcceptableCurveForEcdsa) {
+ RejectSecp384r1Policy policy;
+
+ // Using the regular policy both secp384r1 and secp256r1 should be accepted.
+ RunTestCase(SUCCESS, "ecdsa-secp384r1-sha256.pem");
+ RunTestCase(SUCCESS, "ecdsa-prime256v1-sha512.pem");
+
+ // However when using a policy that specifically rejects secp384r1, only
+ // prime256v1 should be accepted.
+ RunTestCaseUsingPolicy(FAILURE, "ecdsa-secp384r1-sha256.pem", &policy);
+ RunTestCaseUsingPolicy(SUCCESS, "ecdsa-prime256v1-sha512.pem", &policy);
+}
+
+TEST(VerifySignedDataTest, PolicyIsAcceptableModulusLengthForRsa) {
+ SimpleSignaturePolicy policy_1024(1024);
+ SimpleSignaturePolicy policy_2048(2048);
+
+ // Using the regular policy both 1024-bit and 2048-bit RSA keys should be
+ // accepted.
+ RunTestCaseUsingPolicy(SUCCESS, "rsa-pkcs1-sha256.pem", &policy_1024);
+ RunTestCaseUsingPolicy(SUCCESS, "rsa2048-pkcs1-sha512.pem", &policy_1024);
+
+ // However when using a policy that rejects any keys less than 2048-bits, only
+ // one of the tests will pass.
+ RunTestCaseUsingPolicy(FAILURE, "rsa-pkcs1-sha256.pem", &policy_2048);
+ RunTestCaseUsingPolicy(SUCCESS, "rsa2048-pkcs1-sha512.pem", &policy_2048);
+}
+
+// This policy rejects the use of SHA-512.
+class RejectSha512 : public SignaturePolicy {
+ public:
+ RejectSha512() : SignaturePolicy() {}
+
+ bool IsAcceptableSignatureAlgorithm(
+ const SignatureAlgorithm& algorithm) const override {
+ if (algorithm.ParamsForRsaPss() &&
+ algorithm.ParamsForRsaPss()->mgf1_hash() == DigestAlgorithm::Sha512) {
+ return false;
+ }
+
+ return algorithm.digest() != DigestAlgorithm::Sha512;
+ }
+
+ bool IsAcceptableModulusLengthForRsa(
+ size_t modulus_length_bits) const override {
+ return true;
+ }
+};
+
+TEST(VerifySignedDataTest, PolicyIsAcceptableDigestAlgorithm) {
+ RejectSha512 policy;
+
+ // Using the regular policy use of either SHA256 or SHA512 should work
+ // (whether as the main digest, or the MGF1 for RSASSA-PSS)
+ RunTestCase(SUCCESS, "rsa2048-pkcs1-sha512.pem");
+ RunTestCase(SUCCESS, "ecdsa-prime256v1-sha512.pem");
+ RunTestCase(SUCCESS, "ecdsa-secp384r1-sha256.pem");
+ RunTestCase(SUCCESS, "rsa-pkcs1-sha256.pem");
+ RunTestCase(SUCCESS, "rsa-pss-sha256-salt10.pem");
+ // This one uses both SHA256 and SHA512
+ RunTestCase(SUCCESS, "rsa-pss-sha256-mgf1-sha512-salt33.pem");
+
+ // However when using a policy that rejects SHA512, only the tests using
+ // exclusively SHA256 should pass).
+ RunTestCaseUsingPolicy(FAILURE, "rsa2048-pkcs1-sha512.pem", &policy);
+ RunTestCaseUsingPolicy(FAILURE, "ecdsa-prime256v1-sha512.pem", &policy);
+ RunTestCaseUsingPolicy(SUCCESS, "ecdsa-secp384r1-sha256.pem", &policy);
+ RunTestCaseUsingPolicy(SUCCESS, "rsa-pkcs1-sha256.pem", &policy);
+ RunTestCaseUsingPolicy(SUCCESS, "rsa-pss-sha256-salt10.pem", &policy);
+ RunTestCaseUsingPolicy(FAILURE, "rsa-pss-sha256-mgf1-sha512-salt33.pem",
+ &policy);
+}
+
} // namespace
} // namespace net

Powered by Google App Engine
This is Rietveld 408576698