test_pss.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379
  1. # ===================================================================
  2. #
  3. # Copyright (c) 2014, Legrandin <helderijs@gmail.com>
  4. # All rights reserved.
  5. #
  6. # Redistribution and use in source and binary forms, with or without
  7. # modification, are permitted provided that the following conditions
  8. # are met:
  9. #
  10. # 1. Redistributions of source code must retain the above copyright
  11. # notice, this list of conditions and the following disclaimer.
  12. # 2. Redistributions in binary form must reproduce the above copyright
  13. # notice, this list of conditions and the following disclaimer in
  14. # the documentation and/or other materials provided with the
  15. # distribution.
  16. #
  17. # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  18. # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  19. # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
  20. # FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
  21. # COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
  22. # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
  23. # BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  24. # LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  25. # CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  26. # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
  27. # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
  28. # POSSIBILITY OF SUCH DAMAGE.
  29. # ===================================================================
  30. import json
  31. import unittest
  32. from binascii import unhexlify
  33. from tls.Crypto.Util.py3compat import b, bchr
  34. from tls.Crypto.Util.number import bytes_to_long
  35. from tls.Crypto.Util.strxor import strxor
  36. from tls.Crypto.SelfTest.st_common import list_test_cases
  37. from tls.Crypto.SelfTest.loader import load_tests
  38. from tls.Crypto.Hash import SHA1, SHA224, SHA256, SHA384, SHA512
  39. from tls.Crypto.PublicKey import RSA
  40. from tls.Crypto.Signature import pss
  41. from tls.Crypto.Signature import PKCS1_PSS
  42. from tls.Crypto.Signature.pss import MGF1
  43. from tls.Crypto.Util._file_system import pycryptodome_filename
  44. def load_hash_by_name(hash_name):
  45. return __import__("Crypto.Hash." + hash_name, globals(), locals(), ["new"])
  46. class PRNG(object):
  47. def __init__(self, stream):
  48. self.stream = stream
  49. self.idx = 0
  50. def __call__(self, rnd_size):
  51. result = self.stream[self.idx:self.idx + rnd_size]
  52. self.idx += rnd_size
  53. return result
  54. class PSS_Tests(unittest.TestCase):
  55. rsa_key = b'-----BEGIN RSA PRIVATE KEY-----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\nD+NmPL/N4uE57e40tbiU/H7KdyZaDt+5QiTmdhuyAe6CBjKsF2jy\n-----END RSA PRIVATE KEY-----'
  56. msg = b'AAA'
  57. tag = b'\x00[c5\xd8\xb0\x8b!D\x81\x83\x07\xc0\xdd\xb9\xb4\xb2`\x92\xe7\x02\xf1\xe1P\xea\xc3\xf0\xe3>\xddX5\xdd\x8e\xc5\x89\xef\xf3\xc2\xdc\xfeP\x02\x7f\x12+\xc9\xaf\xbb\xec\xfe\xb0\xa5\xb9\x08\x11P\x8fL\xee5\x9b\xb0k{=_\xd2\x14\xfb\x01R\xb7\xfe\x14}b\x03\x8d5Y\x89~}\xfc\xf2l\xd01-\xbd\xeb\x11\xcdV\x11\xe9l\x19k/o5\xa2\x0f\x15\xe7Q$\t=\xec\x1dAB\x19\xa5P\x9a\xaf\xa3G\x86"\xd6~\xf0<p5\x00\x86\xe0\xf3\x99\xc7+\xcfc,\\\x13)v\xcd\xff\x08o\x90\xc5\xd1\xca\x869\xf45\x1e\xfd\xa2\xf1n\xa3\xa6e\xc5\x11Q\xe4@\xbd\x17\x83x\xc9\x9b\xb5\xc7\xea\x03U\x9b\xa0\xccC\x17\xc9T\x86/\x05\x1c\xc7\x95hC\xf9b1\xbb\x05\xc3\xf0\x9a>j\xfcqkbs\x13\x84b\xe4\xbdm(\xed`\xa4F\xfb\x8f.\xe1\x8c)/_\x9eS\x98\xa4v\xb8\xdc\xfe\xf7/D\x18\x19\xb3T\x97:\xe2\x96s\xe8<\xa2\xb4\xb9\xf8/'
  58. def test_positive_1(self):
  59. key = RSA.import_key(self.rsa_key)
  60. h = SHA256.new(self.msg)
  61. verifier = pss.new(key)
  62. verifier.verify(h, self.tag)
  63. def test_negative_1(self):
  64. key = RSA.import_key(self.rsa_key)
  65. h = SHA256.new(self.msg + b'A')
  66. verifier = pss.new(key)
  67. tag = bytearray(self.tag)
  68. self.assertRaises(ValueError, verifier.verify, h, tag)
  69. def test_negative_2(self):
  70. key = RSA.import_key(self.rsa_key)
  71. h = SHA256.new(self.msg)
  72. verifier = pss.new(key, salt_bytes=1000)
  73. tag = bytearray(self.tag)
  74. self.assertRaises(ValueError, verifier.verify, h, tag)
  75. class FIPS_PKCS1_Verify_Tests(unittest.TestCase):
  76. def shortDescription(self):
  77. return "FIPS PKCS1 Tests (Verify)"
  78. def verify_positive(self, hashmod, message, public_key, salt, signature):
  79. prng = PRNG(salt)
  80. hashed = hashmod.new(message)
  81. verifier = pss.new(public_key, salt_bytes=len(salt), rand_func=prng)
  82. verifier.verify(hashed, signature)
  83. def verify_negative(self, hashmod, message, public_key, salt, signature):
  84. prng = PRNG(salt)
  85. hashed = hashmod.new(message)
  86. verifier = pss.new(public_key, salt_bytes=len(salt), rand_func=prng)
  87. self.assertRaises(ValueError, verifier.verify, hashed, signature)
  88. def test_can_sign(self):
  89. test_public_key = RSA.generate(1024).publickey()
  90. verifier = pss.new(test_public_key)
  91. self.assertEqual(verifier.can_sign(), False)
  92. class FIPS_PKCS1_Verify_Tests_KAT(unittest.TestCase):
  93. pass
  94. test_vectors_verify = load_tests(("Crypto", "SelfTest", "Signature", "test_vectors", "PKCS1-PSS"),
  95. "SigVerPSS_186-3.rsp",
  96. "Signature Verification 186-3",
  97. { 'shaalg' : lambda x: x,
  98. 'result' : lambda x: x })
  99. for count, tv in enumerate(test_vectors_verify):
  100. if isinstance(tv, str):
  101. continue
  102. if hasattr(tv, "n"):
  103. modulus = tv.n
  104. continue
  105. if hasattr(tv, "p"):
  106. continue
  107. hash_module = load_hash_by_name(tv.shaalg.upper())
  108. hash_obj = hash_module.new(tv.msg)
  109. public_key = RSA.construct([bytes_to_long(x) for x in (modulus, tv.e)]) # type: ignore
  110. if tv.saltval != b("\x00"):
  111. prng = PRNG(tv.saltval)
  112. verifier = pss.new(public_key, salt_bytes=len(tv.saltval), rand_func=prng)
  113. else:
  114. verifier = pss.new(public_key, salt_bytes=0)
  115. def positive_test(self, hash_obj=hash_obj, verifier=verifier, signature=tv.s):
  116. verifier.verify(hash_obj, signature)
  117. def negative_test(self, hash_obj=hash_obj, verifier=verifier, signature=tv.s):
  118. self.assertRaises(ValueError, verifier.verify, hash_obj, signature)
  119. if tv.result == 'p':
  120. setattr(FIPS_PKCS1_Verify_Tests_KAT, "test_positive_%d" % count, positive_test)
  121. else:
  122. setattr(FIPS_PKCS1_Verify_Tests_KAT, "test_negative_%d" % count, negative_test)
  123. class FIPS_PKCS1_Sign_Tests(unittest.TestCase):
  124. def shortDescription(self):
  125. return "FIPS PKCS1 Tests (Sign)"
  126. def test_can_sign(self):
  127. test_private_key = RSA.generate(1024)
  128. signer = pss.new(test_private_key)
  129. self.assertEqual(signer.can_sign(), True)
  130. class FIPS_PKCS1_Sign_Tests_KAT(unittest.TestCase):
  131. pass
  132. test_vectors_sign = load_tests(("Crypto", "SelfTest", "Signature", "test_vectors", "PKCS1-PSS"),
  133. "SigGenPSS_186-2.txt",
  134. "Signature Generation 186-2",
  135. { 'shaalg' : lambda x: x })
  136. test_vectors_sign += load_tests(("Crypto", "SelfTest", "Signature", "test_vectors", "PKCS1-PSS"),
  137. "SigGenPSS_186-3.txt",
  138. "Signature Generation 186-3",
  139. { 'shaalg' : lambda x: x })
  140. for count, tv in enumerate(test_vectors_sign):
  141. if isinstance(tv, str):
  142. continue
  143. if hasattr(tv, "n"):
  144. modulus = tv.n
  145. continue
  146. if hasattr(tv, "e"):
  147. private_key = RSA.construct([bytes_to_long(x) for x in (modulus, tv.e, tv.d)]) # type: ignore
  148. continue
  149. hash_module = load_hash_by_name(tv.shaalg.upper())
  150. hash_obj = hash_module.new(tv.msg)
  151. if tv.saltval != b("\x00"):
  152. prng = PRNG(tv.saltval)
  153. signer = pss.new(private_key, salt_bytes=len(tv.saltval), rand_func=prng)
  154. else:
  155. signer = pss.new(private_key, salt_bytes=0)
  156. def new_test(self, hash_obj=hash_obj, signer=signer, result=tv.s):
  157. signature = signer.sign(hash_obj)
  158. self.assertEqual(signature, result)
  159. setattr(FIPS_PKCS1_Sign_Tests_KAT, "test_%d" % count, new_test)
  160. class PKCS1_Legacy_Module_Tests(unittest.TestCase):
  161. """Verify that the legacy module Crypto.Signature.PKCS1_PSS
  162. behaves as expected. The only difference is that the verify()
  163. method returns True/False and does not raise exceptions."""
  164. def shortDescription(self):
  165. return "Test legacy Crypto.Signature.PKCS1_PSS"
  166. def runTest(self):
  167. key = RSA.generate(1024)
  168. hashed = SHA1.new(b("Test"))
  169. good_signature = PKCS1_PSS.new(key).sign(hashed)
  170. verifier = PKCS1_PSS.new(key.publickey())
  171. self.assertEqual(verifier.verify(hashed, good_signature), True)
  172. # Flip a few bits in the signature
  173. bad_signature = strxor(good_signature, bchr(1) * len(good_signature))
  174. self.assertEqual(verifier.verify(hashed, bad_signature), False)
  175. class PKCS1_All_Hashes_Tests(unittest.TestCase):
  176. def shortDescription(self):
  177. return "Test PKCS#1 PSS signature in combination with all hashes"
  178. def runTest(self):
  179. key = RSA.generate(1280)
  180. signer = pss.new(key)
  181. hash_names = ("MD2", "MD4", "MD5", "RIPEMD160", "SHA1",
  182. "SHA224", "SHA256", "SHA384", "SHA512",
  183. "SHA3_224", "SHA3_256", "SHA3_384", "SHA3_512")
  184. for name in hash_names:
  185. hashed = load_hash_by_name(name).new(b("Test"))
  186. signer.sign(hashed)
  187. from tls.Crypto.Hash import BLAKE2b, BLAKE2s
  188. for hash_size in (20, 32, 48, 64):
  189. hashed_b = BLAKE2b.new(digest_bytes=hash_size, data=b("Test"))
  190. signer.sign(hashed_b)
  191. for hash_size in (16, 20, 28, 32):
  192. hashed_s = BLAKE2s.new(digest_bytes=hash_size, data=b("Test"))
  193. signer.sign(hashed_s)
  194. def get_hash_module(hash_name):
  195. if hash_name == "SHA-512":
  196. hash_module = SHA512
  197. elif hash_name == "SHA-512/224":
  198. hash_module = SHA512.new(truncate="224")
  199. elif hash_name == "SHA-512/256":
  200. hash_module = SHA512.new(truncate="256")
  201. elif hash_name == "SHA-384":
  202. hash_module = SHA384
  203. elif hash_name == "SHA-256":
  204. hash_module = SHA256
  205. elif hash_name == "SHA-224":
  206. hash_module = SHA224
  207. elif hash_name == "SHA-1":
  208. hash_module = SHA1
  209. else:
  210. raise ValueError("Unknown hash algorithm: " + hash_name)
  211. return hash_module
  212. class TestVectorsPSSWycheproof(unittest.TestCase):
  213. def __init__(self, wycheproof_warnings):
  214. unittest.TestCase.__init__(self)
  215. self._wycheproof_warnings = wycheproof_warnings
  216. self._id = "None"
  217. def add_tests(self, filename):
  218. comps = "Crypto.SelfTest.Signature.test_vectors.wycheproof".split(".")
  219. with open(pycryptodome_filename(comps, filename), "rt") as file_in:
  220. tv_tree = json.load(file_in)
  221. for group in tv_tree['testGroups']:
  222. key = RSA.import_key(group['keyPem'])
  223. hash_module = get_hash_module(group['sha'])
  224. sLen = group['sLen']
  225. assert group['type'] == "RsassaPssVerify"
  226. assert group['mgf'] == "MGF1"
  227. mgf1_hash = get_hash_module(group['mgfSha'])
  228. def mgf(x, y, mh=mgf1_hash):
  229. return MGF1(x, y, mh)
  230. from collections import namedtuple
  231. TestVector = namedtuple('TestVector', 'id comment msg sig key mgf sLen hash_module valid warning')
  232. for test in group['tests']:
  233. tv = TestVector(
  234. test['tcId'],
  235. test['comment'],
  236. unhexlify(test['msg']),
  237. unhexlify(test['sig']),
  238. key,
  239. mgf,
  240. sLen,
  241. hash_module,
  242. test['result'] != "invalid",
  243. test['result'] == "acceptable"
  244. )
  245. self.tv.append(tv)
  246. def setUp(self):
  247. self.tv = []
  248. self.add_tests("rsa_pss_2048_sha1_mgf1_20_test.json")
  249. self.add_tests("rsa_pss_2048_sha256_mgf1_0_test.json")
  250. self.add_tests("rsa_pss_2048_sha256_mgf1_32_test.json")
  251. self.add_tests("rsa_pss_2048_sha512_256_mgf1_28_test.json")
  252. self.add_tests("rsa_pss_2048_sha512_256_mgf1_32_test.json")
  253. self.add_tests("rsa_pss_3072_sha256_mgf1_32_test.json")
  254. self.add_tests("rsa_pss_4096_sha256_mgf1_32_test.json")
  255. self.add_tests("rsa_pss_4096_sha512_mgf1_32_test.json")
  256. self.add_tests("rsa_pss_misc_test.json")
  257. def shortDescription(self):
  258. return self._id
  259. def warn(self, tv):
  260. if tv.warning and self._wycheproof_warnings:
  261. import warnings
  262. warnings.warn("Wycheproof warning: %s (%s)" % (self._id, tv.comment))
  263. def test_verify(self, tv):
  264. self._id = "Wycheproof RSA PSS Test #%d (%s)" % (tv.id, tv.comment)
  265. hashed_msg = tv.hash_module.new(tv.msg)
  266. signer = pss.new(tv.key, mask_func=tv.mgf, salt_bytes=tv.sLen)
  267. try:
  268. signature = signer.verify(hashed_msg, tv.sig)
  269. except ValueError as e:
  270. if tv.warning:
  271. return
  272. assert not tv.valid
  273. else:
  274. assert tv.valid
  275. self.warn(tv)
  276. def runTest(self):
  277. for tv in self.tv:
  278. self.test_verify(tv)
  279. def get_tests(config={}):
  280. wycheproof_warnings = config.get('wycheproof_warnings')
  281. tests = []
  282. tests += list_test_cases(PSS_Tests)
  283. tests += list_test_cases(FIPS_PKCS1_Verify_Tests)
  284. tests += list_test_cases(FIPS_PKCS1_Sign_Tests)
  285. tests += list_test_cases(PKCS1_Legacy_Module_Tests)
  286. tests += list_test_cases(PKCS1_All_Hashes_Tests)
  287. if config.get('slow_tests'):
  288. tests += list_test_cases(FIPS_PKCS1_Verify_Tests_KAT)
  289. tests += list_test_cases(FIPS_PKCS1_Sign_Tests_KAT)
  290. tests += [ TestVectorsPSSWycheproof(wycheproof_warnings) ]
  291. return tests
  292. if __name__ == '__main__':
  293. suite = lambda: unittest.TestSuite(get_tests())
  294. unittest.main(defaultTest='suite')