blob: e3fbc3b3f530e85f79fb392325cff5d98ec546e5 [file] [log] [blame]
/*
* Copyright (C) 2024 Michael Brown <mbrown@fensystems.co.uk>.
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation; either version 2 of the
* License, or any later version.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
* 02110-1301, USA.
*
* You can also choose to distribute this program under the terms of
* the Unmodified Binary Distribution Licence (as given in the file
* COPYING.UBDL), provided that you have satisfied its requirements.
*/
FILE_LICENCE ( GPL2_OR_LATER_OR_UBDL );
/** @file
*
* Public key self-tests
*
*/
/* Forcibly enable assertions */
#undef NDEBUG
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
#include <assert.h>
#include <ipxe/crypto.h>
#include <ipxe/test.h>
#include "pubkey_test.h"
/**
* Report public key encryption and decryption test result
*
* @v test Public key encryption and decryption test
* @v file Test code file
* @v line Test code line
*/
void pubkey_okx ( struct pubkey_test *test, const char *file,
unsigned int line ) {
struct pubkey_algorithm *pubkey = test->pubkey;
size_t max_len = pubkey_max_len ( pubkey, &test->private );
uint8_t encrypted[max_len];
uint8_t decrypted[max_len];
int encrypted_len;
int decrypted_len;
/* Test decrypting with private key to obtain known plaintext */
decrypted_len = pubkey_decrypt ( pubkey, &test->private,
test->ciphertext, test->ciphertext_len,
decrypted );
okx ( decrypted_len == ( ( int ) test->plaintext_len ), file, line );
okx ( memcmp ( decrypted, test->plaintext, test->plaintext_len ) == 0,
file, line );
/* Test encrypting with private key and decrypting with public key */
encrypted_len = pubkey_encrypt ( pubkey, &test->private,
test->plaintext, test->plaintext_len,
encrypted );
okx ( encrypted_len >= 0, file, line );
decrypted_len = pubkey_decrypt ( pubkey, &test->public, encrypted,
encrypted_len, decrypted );
okx ( decrypted_len == ( ( int ) test->plaintext_len ), file, line );
okx ( memcmp ( decrypted, test->plaintext, test->plaintext_len ) == 0,
file, line );
/* Test encrypting with public key and decrypting with private key */
encrypted_len = pubkey_encrypt ( pubkey, &test->public,
test->plaintext, test->plaintext_len,
encrypted );
okx ( encrypted_len >= 0, file, line );
decrypted_len = pubkey_decrypt ( pubkey, &test->private, encrypted,
encrypted_len, decrypted );
okx ( decrypted_len == ( ( int ) test->plaintext_len ), file, line );
okx ( memcmp ( decrypted, test->plaintext, test->plaintext_len ) == 0,
file, line );
}
/**
* Report public key signature test result
*
* @v test Public key signature test
* @v file Test code file
* @v line Test code line
*/
void pubkey_sign_okx ( struct pubkey_sign_test *test, const char *file,
unsigned int line ) {
struct pubkey_algorithm *pubkey = test->pubkey;
struct digest_algorithm *digest = test->digest;
uint8_t digestctx[digest->ctxsize ];
uint8_t digestout[digest->digestsize];
struct asn1_builder signature = { NULL, 0 };
uint8_t *bad;
/* Construct digest over plaintext */
digest_init ( digest, digestctx );
digest_update ( digest, digestctx, test->plaintext,
test->plaintext_len );
digest_final ( digest, digestctx, digestout );
/* Test signing using private key */
okx ( pubkey_sign ( pubkey, &test->private, digest, digestout,
&signature ) == 0, file, line );
okx ( signature.len != 0, file, line );
okx ( asn1_compare ( asn1_built ( &signature ),
&test->signature ) == 0, file, line );
/* Test verification using public key */
okx ( pubkey_verify ( pubkey, &test->public, digest, digestout,
&test->signature ) == 0, file, line );
/* Test verification failure of modified signature */
bad = ( signature.data + ( test->signature.len / 2 ) );
okx ( pubkey_verify ( pubkey, &test->public, digest, digestout,
asn1_built ( &signature ) ) == 0, file, line );
*bad ^= 0x40;
okx ( pubkey_verify ( pubkey, &test->public, digest, digestout,
asn1_built ( &signature ) ) != 0, file, line );
/* Free signature */
free ( signature.data );
}