// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include <stdint.h> #include <vector> #include "base/memory/scoped_ptr.h" #include "base/sha1.h" #include "crypto/rsa_private_key.h" #include "crypto/sha2.h" #include "crypto/signature_creator.h" #include "crypto/signature_verifier.h" #include "testing/gtest/include/gtest/gtest.h" namespace { // This is the algorithm ID for SHA-1 with RSA encryption. const uint8_t kSHA1WithRSAAlgorithmID[] = {0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x05, 0x05, 0x00}; // This is the algorithm ID for SHA-1 with RSA encryption. const uint8_t kSHA256WithRSAAlgorithmID[] = {0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0B, 0x05, 0x00}; } TEST(SignatureCreatorTest, BasicTest) { // Do a verify round trip. scoped_ptr<crypto::RSAPrivateKey> key_original( crypto::RSAPrivateKey::Create(1024)); ASSERT_TRUE(key_original.get()); std::vector<uint8_t> key_info; key_original->ExportPrivateKey(&key_info); scoped_ptr<crypto::RSAPrivateKey> key( crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info)); ASSERT_TRUE(key.get()); scoped_ptr<crypto::SignatureCreator> signer( crypto::SignatureCreator::Create(key.get(), crypto::SignatureCreator::SHA1)); ASSERT_TRUE(signer.get()); std::string data("Hello, World!"); ASSERT_TRUE(signer->Update(reinterpret_cast<const uint8_t*>(data.c_str()), data.size())); std::vector<uint8_t> signature; ASSERT_TRUE(signer->Final(&signature)); std::vector<uint8_t> public_key_info; ASSERT_TRUE(key_original->ExportPublicKey(&public_key_info)); crypto::SignatureVerifier verifier; ASSERT_TRUE(verifier.VerifyInit( kSHA1WithRSAAlgorithmID, sizeof(kSHA1WithRSAAlgorithmID), &signature.front(), signature.size(), &public_key_info.front(), public_key_info.size())); verifier.VerifyUpdate(reinterpret_cast<const uint8_t*>(data.c_str()), data.size()); ASSERT_TRUE(verifier.VerifyFinal()); } TEST(SignatureCreatorTest, SignDigestTest) { // Do a verify round trip. scoped_ptr<crypto::RSAPrivateKey> key_original( crypto::RSAPrivateKey::Create(1024)); ASSERT_TRUE(key_original.get()); std::vector<uint8_t> key_info; key_original->ExportPrivateKey(&key_info); scoped_ptr<crypto::RSAPrivateKey> key( crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info)); ASSERT_TRUE(key.get()); std::string data("Hello, World!"); std::string sha1 = base::SHA1HashString(data); // Sign sha1 of the input data. std::vector<uint8_t> signature; ASSERT_TRUE(crypto::SignatureCreator::Sign( key.get(), crypto::SignatureCreator::SHA1, reinterpret_cast<const uint8_t*>(sha1.c_str()), sha1.size(), &signature)); std::vector<uint8_t> public_key_info; ASSERT_TRUE(key_original->ExportPublicKey(&public_key_info)); // Verify the input data. crypto::SignatureVerifier verifier; ASSERT_TRUE(verifier.VerifyInit( kSHA1WithRSAAlgorithmID, sizeof(kSHA1WithRSAAlgorithmID), &signature.front(), signature.size(), &public_key_info.front(), public_key_info.size())); verifier.VerifyUpdate(reinterpret_cast<const uint8_t*>(data.c_str()), data.size()); ASSERT_TRUE(verifier.VerifyFinal()); } TEST(SignatureCreatorTest, SignSHA256DigestTest) { // Do a verify round trip. scoped_ptr<crypto::RSAPrivateKey> key_original( crypto::RSAPrivateKey::Create(1024)); ASSERT_TRUE(key_original.get()); std::vector<uint8_t> key_info; key_original->ExportPrivateKey(&key_info); scoped_ptr<crypto::RSAPrivateKey> key( crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info)); ASSERT_TRUE(key.get()); std::string data("Hello, World!"); std::string sha256 = crypto::SHA256HashString(data); // Sign sha256 of the input data. std::vector<uint8_t> signature; ASSERT_TRUE(crypto::SignatureCreator::Sign( key.get(), crypto::SignatureCreator::HashAlgorithm::SHA256, reinterpret_cast<const uint8_t*>(sha256.c_str()), sha256.size(), &signature)); std::vector<uint8_t> public_key_info; ASSERT_TRUE(key_original->ExportPublicKey(&public_key_info)); // Verify the input data. crypto::SignatureVerifier verifier; ASSERT_TRUE(verifier.VerifyInit( kSHA256WithRSAAlgorithmID, sizeof(kSHA256WithRSAAlgorithmID), &signature.front(), signature.size(), &public_key_info.front(), public_key_info.size())); verifier.VerifyUpdate(reinterpret_cast<const uint8_t*>(data.c_str()), data.size()); ASSERT_TRUE(verifier.VerifyFinal()); }