Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1091)

Unified Diff: content/child/webcrypto/test/ecdsa_unittest.cc

Issue 698363002: webcrypto: Add ECDSA algorithm (chromium-side) (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@extract_more
Patch Set: sigh, more android pedantry Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « content/child/webcrypto/status.cc ('k') | content/child/webcrypto/webcrypto_util.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/child/webcrypto/test/ecdsa_unittest.cc
diff --git a/content/child/webcrypto/test/ecdsa_unittest.cc b/content/child/webcrypto/test/ecdsa_unittest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..0ffbb8823a65c27d1415af1d2c83f198f71bc118
--- /dev/null
+++ b/content/child/webcrypto/test/ecdsa_unittest.cc
@@ -0,0 +1,322 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "base/stl_util.h"
+#include "content/child/webcrypto/algorithm_dispatch.h"
+#include "content/child/webcrypto/crypto_data.h"
+#include "content/child/webcrypto/jwk.h"
+#include "content/child/webcrypto/status.h"
+#include "content/child/webcrypto/test/test_helpers.h"
+#include "content/child/webcrypto/webcrypto_util.h"
+#include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h"
+#include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h"
+
+namespace content {
+
+namespace webcrypto {
+
+namespace {
+
+bool SupportsEcdsa() {
+#if defined(USE_OPENSSL)
+ return true;
+#else
+ LOG(ERROR) << "Skipping ECDSA test because unsupported";
+ return false;
+#endif
+}
+
+// This is essentially a duplication of the curve name parsing done by Blink,
+// so tests can use the same names in data files.
+blink::WebCryptoNamedCurve GetCurveNameFromJsonTest(
+ const base::DictionaryValue* test) {
+ std::string curve_str;
+ if (!test->GetString("curve", &curve_str)) {
+ ADD_FAILURE() << "Missing \"curve\" parameter";
+ }
+
+ if (curve_str == "P-256")
+ return blink::WebCryptoNamedCurveP256;
+ if (curve_str == "P-384")
+ return blink::WebCryptoNamedCurveP384;
+ if (curve_str == "P-521")
+ return blink::WebCryptoNamedCurveP521;
+ else
+ ADD_FAILURE() << "Unrecognized curve name: " << curve_str;
+
+ return blink::WebCryptoNamedCurveP384;
+}
+
+blink::WebCryptoAlgorithm CreateEcdsaKeyGenAlgorithm(
+ blink::WebCryptoNamedCurve named_curve) {
+ return blink::WebCryptoAlgorithm::adoptParamsAndCreate(
+ blink::WebCryptoAlgorithmIdEcdsa,
+ new blink::WebCryptoEcKeyGenParams(named_curve));
+}
+
+blink::WebCryptoAlgorithm CreateEcdsaImportAlgorithm(
+ blink::WebCryptoNamedCurve named_curve) {
+ return CreateEcImportAlgorithm(blink::WebCryptoAlgorithmIdEcdsa, named_curve);
+}
+
+blink::WebCryptoAlgorithm CreateEcdsaAlgorithm(
+ blink::WebCryptoAlgorithmId hash_id) {
+ return blink::WebCryptoAlgorithm::adoptParamsAndCreate(
+ blink::WebCryptoAlgorithmIdEcdsa,
+ new blink::WebCryptoEcdsaParams(CreateAlgorithm(hash_id)));
+}
+
+// Generates some ECDSA key pairs. Validates basic properties on the keys, and
+// ensures the serialized key (as JWK) is unique. This test does nothing to
+// ensure that the keys are otherwise usable (by trying to sign/verify with
+// them).
+TEST(WebCryptoEcdsaTest, GenerateKeyIsRandom) {
+ if (!SupportsEcdsa())
+ return;
+
+ blink::WebCryptoNamedCurve named_curve = blink::WebCryptoNamedCurveP256;
+
+ std::vector<std::vector<uint8_t>> serialized_keys;
+
+ // Generate a small sample of keys.
+ for (int j = 0; j < 4; ++j) {
+ blink::WebCryptoKey public_key;
+ blink::WebCryptoKey private_key;
+
+ ASSERT_EQ(Status::Success(),
+ GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true, 0,
+ &public_key, &private_key));
+
+ // Basic sanity checks on the generated key pair.
+ EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type());
+ EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type());
+ EXPECT_EQ(named_curve, public_key.algorithm().ecParams()->namedCurve());
+ EXPECT_EQ(named_curve, private_key.algorithm().ecParams()->namedCurve());
+
+ // Export the key pair to JWK.
+ std::vector<uint8_t> key_bytes;
+ ASSERT_EQ(Status::Success(),
+ ExportKey(blink::WebCryptoKeyFormatJwk, public_key, &key_bytes));
+ serialized_keys.push_back(key_bytes);
+
+ ASSERT_EQ(Status::Success(),
+ ExportKey(blink::WebCryptoKeyFormatJwk, private_key, &key_bytes));
+ serialized_keys.push_back(key_bytes);
+ }
+
+ // Ensure all entries in the key sample set are unique. This is a simplistic
+ // estimate of whether the generated keys appear random.
+ EXPECT_FALSE(CopiesExist(serialized_keys));
+}
+
+// Verify that ECDSA signatures are probabilistic. Signing the same message two
+// times should yield different signatures. However both signatures should
+// verify correctly.
+TEST(WebCryptoEcdsaTest, SignatureIsRandom) {
+ if (!SupportsEcdsa())
+ return;
+
+ // Import a public and private keypair from "ec_private_keys.json". It doesn't
+ // really matter which one is used since they are all valid. In this case
+ // using the first one.
+ scoped_ptr<base::ListValue> private_keys;
+ ASSERT_TRUE(ReadJsonTestFileToList("ec_private_keys.json", &private_keys));
+ const base::DictionaryValue* key_dict;
+ ASSERT_TRUE(private_keys->GetDictionary(0, &key_dict));
+ blink::WebCryptoNamedCurve curve = GetCurveNameFromJsonTest(key_dict);
+ const base::DictionaryValue* key_jwk;
+ ASSERT_TRUE(key_dict->GetDictionary("jwk", &key_jwk));
+
+ blink::WebCryptoKey private_key;
+ ASSERT_EQ(
+ Status::Success(),
+ ImportKeyJwkFromDict(*key_jwk, CreateEcdsaImportAlgorithm(curve), true,
+ blink::WebCryptoKeyUsageSign, &private_key));
+
+ // Erase the "d" member so the private key JWK can be used to import the
+ // public key (WebCrypto doesn't provide a mechanism for importing a public
+ // key given a private key).
+ scoped_ptr<base::DictionaryValue> key_jwk_copy(key_jwk->DeepCopy());
+ key_jwk_copy->Remove("d", NULL);
+ blink::WebCryptoKey public_key;
+ ASSERT_EQ(Status::Success(),
+ ImportKeyJwkFromDict(*key_jwk_copy.get(),
+ CreateEcdsaImportAlgorithm(curve), true,
+ blink::WebCryptoKeyUsageVerify, &public_key));
+
+ // Sign twice
+ std::vector<uint8_t> message(10);
+ blink::WebCryptoAlgorithm algorithm =
+ CreateEcdsaAlgorithm(blink::WebCryptoAlgorithmIdSha1);
+
+ std::vector<uint8_t> signature1;
+ std::vector<uint8_t> signature2;
+ ASSERT_EQ(Status::Success(),
+ Sign(algorithm, private_key, CryptoData(message), &signature1));
+ ASSERT_EQ(Status::Success(),
+ Sign(algorithm, private_key, CryptoData(message), &signature2));
+
+ // The two signatures should be different.
+ EXPECT_NE(CryptoData(signature1), CryptoData(signature2));
+
+ // And both should be valid signatures which can be verified.
+ bool signature_matches;
+ ASSERT_EQ(Status::Success(),
+ Verify(algorithm, public_key, CryptoData(signature1),
+ CryptoData(message), &signature_matches));
+ EXPECT_TRUE(signature_matches);
+ ASSERT_EQ(Status::Success(),
+ Verify(algorithm, public_key, CryptoData(signature2),
+ CryptoData(message), &signature_matches));
+ EXPECT_TRUE(signature_matches);
+}
+
+// Tests verify() for ECDSA using an assortment of keys, curves and hashes.
+// These tests also include expected failures for bad signatures and keys.
+TEST(WebCryptoEcdsaTest, VerifyKnownAnswer) {
+ if (!SupportsEcdsa())
+ return;
+
+ scoped_ptr<base::ListValue> tests;
+ ASSERT_TRUE(ReadJsonTestFileToList("ecdsa.json", &tests));
+
+ for (size_t test_index = 0; test_index < tests->GetSize(); ++test_index) {
+ SCOPED_TRACE(test_index);
+
+ const base::DictionaryValue* test;
+ ASSERT_TRUE(tests->GetDictionary(test_index, &test));
+
+ // Import the public key.
+ blink::WebCryptoNamedCurve curve = GetCurveNameFromJsonTest(test);
+ blink::WebCryptoKeyFormat key_format = GetKeyFormatFromJsonTestCase(test);
+ std::vector<uint8_t> key_data =
+ GetKeyDataFromJsonTestCase(test, key_format);
+
+ // If the test didn't specify an error, that implies it expects success.
+ std::string expected_error = "Success";
+ test->GetString("error", &expected_error);
+
+ // Import the public key.
+ blink::WebCryptoKey key;
+ Status status = ImportKey(key_format, CryptoData(key_data),
+ CreateEcdsaImportAlgorithm(curve), true,
+ blink::WebCryptoKeyUsageVerify, &key);
+ ASSERT_EQ(expected_error, StatusToString(status));
+ if (status.IsError())
+ continue;
+
+ // Basic sanity checks on the imported public key.
+ EXPECT_EQ(blink::WebCryptoKeyTypePublic, key.type());
+ EXPECT_EQ(blink::WebCryptoKeyUsageVerify, key.usages());
+ EXPECT_EQ(curve, key.algorithm().ecParams()->namedCurve());
+
+ // Now try to verify the given message and signature.
+ std::vector<uint8_t> message = GetBytesFromHexString(test, "msg");
+ std::vector<uint8_t> signature = GetBytesFromHexString(test, "sig");
+ blink::WebCryptoAlgorithm hash = GetDigestAlgorithm(test, "hash");
+
+ bool verify_result;
+ status = Verify(CreateEcdsaAlgorithm(hash.id()), key, CryptoData(signature),
+ CryptoData(message), &verify_result);
+ ASSERT_EQ(expected_error, StatusToString(status));
+ if (status.IsError())
+ continue;
+
+ // If no error was expected, the verification's boolean must match
+ // "verify_result" for the test.
+ bool expected_result = false;
+ ASSERT_TRUE(test->GetBoolean("verify_result", &expected_result));
+ EXPECT_EQ(expected_result, verify_result);
+ }
+}
+
+// Tests importing and exporting of EC private keys, using both JWK and PKCS8
+// formats.
+//
+// The test imports a key first using JWK, and then exporting it to JWK and
+// PKCS8. It does the same thing using PKCS8 as the original source of truth.
+TEST(WebCryptoEcdsaTest, ImportExportPrivateKey) {
+ if (!SupportsEcdsa())
+ return;
+
+ scoped_ptr<base::ListValue> tests;
+ ASSERT_TRUE(ReadJsonTestFileToList("ec_private_keys.json", &tests));
+
+ for (size_t test_index = 0; test_index < tests->GetSize(); ++test_index) {
+ SCOPED_TRACE(test_index);
+
+ const base::DictionaryValue* test;
+ ASSERT_TRUE(tests->GetDictionary(test_index, &test));
+
+ blink::WebCryptoNamedCurve curve = GetCurveNameFromJsonTest(test);
+ const base::DictionaryValue* jwk_dict;
+ EXPECT_TRUE(test->GetDictionary("jwk", &jwk_dict));
+ std::vector<uint8_t> jwk_bytes = MakeJsonVector(*jwk_dict);
+ std::vector<uint8_t> pkcs8_bytes = GetBytesFromHexString(test, "pkcs8");
+
+ // -------------------------------------------------
+ // Test from JWK, and then export to {JWK, PKCS8}
+ // -------------------------------------------------
+
+ // Import the key using JWK
+ blink::WebCryptoKey key;
+ ASSERT_EQ(Status::Success(),
+ ImportKey(blink::WebCryptoKeyFormatJwk, CryptoData(jwk_bytes),
+ CreateEcdsaImportAlgorithm(curve), true,
+ blink::WebCryptoKeyUsageSign, &key));
+
+ // Export the key as JWK
+ std::vector<uint8_t> exported_bytes;
+ ASSERT_EQ(Status::Success(),
+ ExportKey(blink::WebCryptoKeyFormatJwk, key, &exported_bytes));
+
+ // NOTE: The exported bytes can't be directly compared to jwk_bytes because
+ // the exported JWK differs from the imported one. In particular it contains
+ // extra properties for extractability and key_ops.
+ //
+ // Verification is instead done by using the first exported JWK bytes as the
+ // expectation.
+ jwk_bytes = exported_bytes;
+ ASSERT_EQ(Status::Success(),
+ ImportKey(blink::WebCryptoKeyFormatJwk, CryptoData(jwk_bytes),
+ CreateEcdsaImportAlgorithm(curve), true,
+ blink::WebCryptoKeyUsageSign, &key));
+
+ // Export the key as JWK (again)
+ ASSERT_EQ(Status::Success(),
+ ExportKey(blink::WebCryptoKeyFormatJwk, key, &exported_bytes));
+ EXPECT_EQ(CryptoData(jwk_bytes), CryptoData(exported_bytes));
+
+ // Export the key as PKCS8
+ ASSERT_EQ(Status::Success(),
+ ExportKey(blink::WebCryptoKeyFormatPkcs8, key, &exported_bytes));
+ EXPECT_EQ(CryptoData(pkcs8_bytes), CryptoData(exported_bytes));
+
+ // -------------------------------------------------
+ // Test from PKCS8, and then export to {JWK, PKCS8}
+ // -------------------------------------------------
+
+ // Import the key using PKCS8
+ ASSERT_EQ(Status::Success(),
+ ImportKey(blink::WebCryptoKeyFormatPkcs8, CryptoData(pkcs8_bytes),
+ CreateEcdsaImportAlgorithm(curve), true,
+ blink::WebCryptoKeyUsageSign, &key));
+
+ // Export the key as PKCS8
+ ASSERT_EQ(Status::Success(),
+ ExportKey(blink::WebCryptoKeyFormatPkcs8, key, &exported_bytes));
+ EXPECT_EQ(CryptoData(pkcs8_bytes), CryptoData(exported_bytes));
+
+ // Export the key as JWK
+ ASSERT_EQ(Status::Success(),
+ ExportKey(blink::WebCryptoKeyFormatJwk, key, &exported_bytes));
+ EXPECT_EQ(CryptoData(jwk_bytes), CryptoData(exported_bytes));
+ }
+}
+
+} // namespace
+
+} // namespace webcrypto
+
+} // namespace content
« no previous file with comments | « content/child/webcrypto/status.cc ('k') | content/child/webcrypto/webcrypto_util.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698