File: secpECDH_Runner.swift

package info (click to toggle)
swiftlang 6.0.3-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 2,519,992 kB
  • sloc: cpp: 9,107,863; ansic: 2,040,022; asm: 1,135,751; python: 296,500; objc: 82,456; f90: 60,502; lisp: 34,951; pascal: 19,946; sh: 18,133; perl: 7,482; ml: 4,937; javascript: 4,117; makefile: 3,840; awk: 3,535; xml: 914; fortran: 619; cs: 573; ruby: 573
file content (127 lines) | stat: -rw-r--r-- 5,232 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
//===----------------------------------------------------------------------===//
//
// This source file is part of the SwiftCrypto open source project
//
// Copyright (c) 2019-2020 Apple Inc. and the SwiftCrypto project authors
// Licensed under Apache License v2.0
//
// See LICENSE.txt for license information
// See CONTRIBUTORS.md for the list of SwiftCrypto project authors
//
// SPDX-License-Identifier: Apache-2.0
//
//===----------------------------------------------------------------------===//
import Foundation
import XCTest

#if CRYPTO_IN_SWIFTPM && !CRYPTO_IN_SWIFTPM_FORCE_BUILD_API
// Skip tests that require @testable imports of CryptoKit.
#else
#if !CRYPTO_IN_SWIFTPM_FORCE_BUILD_API
@testable import CryptoKit
#else
@testable import Crypto
#endif

enum ECDHTestErrors: Error {
    case PublicKeyFailure
    case ParseSPKIFailure
}

class NISTECDHTests: XCTestCase {
    func testInteropFIPSKeys() throws {
        var fipsKey: P256.KeyAgreement.PrivateKey = P256.KeyAgreement.PrivateKey(compactRepresentable: false)
        for _ in 0...10_000 {
            fipsKey = P256.KeyAgreement.PrivateKey(compactRepresentable: false)
            
            // We ensure we have a key that's not compact representable. (Some FIPS keys are)
            if fipsKey.publicKey.compactRepresentation != nil {
                continue
            } else {
                break
            }
        }
        
        let compactKey = P256.KeyAgreement.PrivateKey(compactRepresentable: true)
        
        XCTAssertNil(fipsKey.publicKey.compactRepresentation)
        XCTAssertNotNil(compactKey.publicKey.compactRepresentation)
        
        let ss1 = try orFail { try fipsKey.sharedSecretFromKeyAgreement(with: compactKey.publicKey) }
        let ss2 = try orFail { try compactKey.sharedSecretFromKeyAgreement(with: fipsKey.publicKey) }
        XCTAssertEqual(ss1, ss2)
        
        XCTAssertThrowsError(try P256.KeyAgreement.PublicKey(compactRepresentation: fipsKey.publicKey.rawRepresentation))
        let compactRepresentation = try unwrap(compactKey.publicKey.compactRepresentation)
        XCTAssertNotNil(try P256.KeyAgreement.PublicKey(compactRepresentation: compactRepresentation))
    }
    
    func testWycheproof() throws {
        try orFail {
            try wycheproofTest(
                bundleType: self,
                jsonName: "ecdh_secp256r1_test",
                testFunction: { (group: ECDHTestGroup) in
                    testGroup(group: group, privateKeys: P256.KeyAgreement.PrivateKey.self, onCurve: P256.self)
                })
        }
        try orFail {
            try wycheproofTest(
                bundleType: self,
                jsonName: "ecdh_secp384r1_test",
                testFunction: { (group: ECDHTestGroup) in
                    testGroup(group: group, privateKeys: P384.KeyAgreement.PrivateKey.self, onCurve: P384.self)
                })
        }
        try orFail {
            try wycheproofTest(
                bundleType: self,
                jsonName: "ecdh_secp521r1_test",
                testFunction: { (group: ECDHTestGroup) in
                    testGroup(group: group, privateKeys: P521.KeyAgreement.PrivateKey.self, onCurve: P521.self)
                })
        }

        try orFail {
            try wycheproofTest(
                bundleType: self,
                jsonName: "ecdh_secp256r1_ecpoint_test",
                testFunction: { (group: ECDHTestGroup) in
                    testGroupPoint(group: group, privateKeys: P256.KeyAgreement.PrivateKey.self, onCurve: P256.self)
                })
        }
        try orFail {
            try wycheproofTest(
                bundleType: self,
                jsonName: "ecdh_secp384r1_ecpoint_test",
                testFunction: { (group: ECDHTestGroup) in
                    testGroupPoint(group: group, privateKeys: P384.KeyAgreement.PrivateKey.self, onCurve: P384.self)
                })
        }
        try orFail {
            try wycheproofTest(
                bundleType: self,
                jsonName: "ecdh_secp521r1_ecpoint_test",
                testFunction: { (group: ECDHTestGroup) in
                    testGroupPoint(group: group, privateKeys: P521.KeyAgreement.PrivateKey.self, onCurve: P521.self)
                })
        }
    }
    
    func testGroup<PrivKey: NISTECPrivateKey & DiffieHellmanKeyAgreement, Curve: SupportedCurveDetailsImpl>(group: ECDHTestGroup, privateKeys: PrivKey.Type, onCurve curve: Curve.Type) {
        #if !CRYPTO_IN_SWIFTPM_FORCE_BUILD_API
        self.testGroupCC(group: group, privateKeys: privateKeys, onCurve: curve)
        #else
        self.testGroupOpenSSL(group: group, privateKeys: privateKeys, onCurve: curve)
        #endif
    }

    func testGroupPoint<PrivKey: NISTECPrivateKey & DiffieHellmanKeyAgreement, Curve: SupportedCurveDetailsImpl>(group: ECDHTestGroup, privateKeys: PrivKey.Type, onCurve curve: Curve.Type) {
        #if !CRYPTO_IN_SWIFTPM_FORCE_BUILD_API
        self.testGroupPointCC(group: group, privateKeys: privateKeys, onCurve: curve)
        #else
        self.testGroupPointOpenSSL(group: group, privateKeys: privateKeys, onCurve: curve)
        #endif
    }
}
#endif // CRYPTO_IN_SWIFTPM