1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106
|
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "components/policy/test_support/signature_provider.h"
#include <utility>
#include "components/policy/proto/device_management_backend.pb.h"
#include "crypto/rsa_private_key.h"
#include "crypto/signature_verifier.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace em = enterprise_management;
namespace policy {
// Param: 1-based key version to be tested.
typedef ::testing::TestWithParam<int> SignatureProviderWithValidKeyIndexTest;
void CheckSignatureForDomain(const SignatureProvider::SigningKey* signing_key,
const std::string& domain,
bool expected_success) {
std::string signature;
bool success = signing_key->GetSignatureForDomain(domain, &signature);
ASSERT_EQ(expected_success, success);
EXPECT_NE(expected_success, signature.empty());
}
TEST_P(SignatureProviderWithValidKeyIndexTest, TestSha256Rsa) {
SignatureProvider provider;
provider.set_current_key_version(GetParam());
const SignatureProvider::SigningKey* signing_key = provider.GetCurrentKey();
ASSERT_EQ(provider.GetKeyByVersion(GetParam()), signing_key);
ASSERT_TRUE(signing_key);
EXPECT_FALSE(signing_key->public_key().empty());
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain1, true);
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain2, true);
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain3, true);
CheckSignatureForDomain(signing_key, "some-random-domain.com", false);
std::string signature;
std::string some_string = "some-string";
EXPECT_TRUE(signing_key->Sign(some_string, em::PolicyFetchRequest::SHA256_RSA,
&signature));
EXPECT_FALSE(signature.empty());
crypto::SignatureVerifier signature_verifier;
ASSERT_TRUE(signature_verifier.VerifyInit(
crypto::SignatureVerifier::RSA_PKCS1_SHA256,
base::as_byte_span(signature),
base::as_byte_span(signing_key->public_key())));
signature_verifier.VerifyUpdate(base::as_byte_span(some_string));
EXPECT_TRUE(signature_verifier.VerifyFinal());
}
TEST_P(SignatureProviderWithValidKeyIndexTest, TestSha1Rsa) {
SignatureProvider provider;
provider.set_current_key_version(GetParam());
const SignatureProvider::SigningKey* signing_key = provider.GetCurrentKey();
ASSERT_EQ(provider.GetKeyByVersion(GetParam()), signing_key);
ASSERT_TRUE(signing_key);
EXPECT_FALSE(signing_key->public_key().empty());
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain1, true);
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain2, true);
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain3, true);
CheckSignatureForDomain(signing_key, "some-random-domain.com", false);
std::string signature;
std::string some_string = "some-string";
EXPECT_TRUE(signing_key->Sign(some_string, em::PolicyFetchRequest::SHA1_RSA,
&signature));
EXPECT_FALSE(signature.empty());
crypto::SignatureVerifier signature_verifier;
ASSERT_TRUE(signature_verifier.VerifyInit(
crypto::SignatureVerifier::RSA_PKCS1_SHA1, base::as_byte_span(signature),
base::as_byte_span(signing_key->public_key())));
signature_verifier.VerifyUpdate(base::as_byte_span(some_string));
EXPECT_TRUE(signature_verifier.VerifyFinal());
}
INSTANTIATE_TEST_SUITE_P(All,
SignatureProviderWithValidKeyIndexTest,
testing::ValuesIn({1, 2}));
// Param: 1-based key version to be tested.
typedef ::testing::TestWithParam<int> SignatureProviderWithInvalidKeyIndexTest;
TEST_P(SignatureProviderWithInvalidKeyIndexTest, DomainSignatures) {
SignatureProvider provider;
provider.set_current_key_version(GetParam());
EXPECT_FALSE(provider.GetCurrentKey());
EXPECT_FALSE(provider.GetKeyByVersion(GetParam()));
}
INSTANTIATE_TEST_SUITE_P(All,
SignatureProviderWithInvalidKeyIndexTest,
testing::ValuesIn({-1, 0, 3}));
} // namespace policy
|