pycryptodome/lib/Crypto/SelfTest/Signature/test_dss.py

542 lines
21 KiB
Python
Raw Normal View History

# -*- coding: utf-8 -*-
#
# SelfTest/Signature/test_dss.py: Self-test for DSS signatures
#
# ===================================================================
# The contents of this file are dedicated to the public domain. To
# the extent that dedication to the public domain is not available,
# everyone is granted a worldwide, perpetual, royalty-free,
# non-exclusive license to exercise all rights associated with the
# contents of this file for any purpose whatsoever.
# No rights are reserved.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
# SOFTWARE.
# ===================================================================
import re
import copy
import unittest
from binascii import unhexlify, hexlify
from StringIO import StringIO
from Crypto.Util.py3compat import *
from Crypto.Hash import SHA1, SHA224, SHA256, SHA384, SHA512
from Crypto.Signature import DSS
from Crypto.PublicKey import DSA
from Crypto.SelfTest.st_common import list_test_cases
from Crypto.Util.number import bytes_to_long, long_to_bytes
def t2b(hexstring):
ws = hexstring.replace(" ", "").replace("\n", "")
return unhexlify(tobytes(ws))
def t2l(hexstring):
ws = hexstring.replace(" ", "").replace("\n", "")
return long(ws, 16)
#
# This is a list of FIPS test vectors.
#
# Each item is an object with the following members:
# desc, P, Q, G, X, Y, Msg, K, Signature [, Result='P'/'F' ]
#
# http://csrc.nist.gov/groups/STM/cavp/documents/dss/186-3dsatestvectors.zip
#
fips_test_vectors = []
det_dsa_test_vectrs = []
class TestKey(object):
pass
class TestVector(object):
pass
def load_fips_test_module(module):
f = StringIO(module.content)
line = '\n'
test_count = 1
while line:
line = f.readline()
# New domain parameters
if line.startswith('[mod'):
domain_params = TestVector()
res = re.match("\[mod = L=(\d+), N=(\d+), ([^\]]+)\]", line)
if not res:
continue
domain_params.hashmod = __import__("Crypto.Hash." +
res.group(3).replace("-", ""),
globals(), locals(), ["new"])
domain_params.desc = "DSS test # (%s, %s) with " % \
(res.group(1), res.group(2))
f.readline() # Eat one empty line
line = f.readline()
for comp in 'P', 'Q', 'G':
res = re.match(comp + ' = ([0-9a-fA-F]+)', line)
setattr(domain_params, comp, long(res.group(1), 16))
line = f.readline()
continue
# Read actual test
if line.startswith('Msg'):
tv = copy.copy(domain_params)
tv.desc = tv.desc.replace("#", "#" + str(test_count))
for comp in 'Msg', 'X', 'Y', 'K', 'R', 'S':
if line == '\n':
line = f.readline()
res = re.match(comp + ' = ([0-9a-fA-F]+)', line)
if not res:
continue
if comp in ('X', 'Y'):
setattr(tv, comp, long(res.group(1), 16))
else:
setattr(tv, comp, unhexlify(res.group(1)))
line = '\n'
setattr(tv, 'Signature', tv.R + tv.S)
# Optionally add the validity flag
line = f.readline()
res = re.match("Result = ([PF])", line)
if res:
setattr(tv, "Result", res.group(1))
fips_test_vectors.append(tv)
test_count += 1
continue
# This line is ignored
def load_tests():
from Crypto.SelfTest.Signature import FIPS_186_3_SigGen_txt as SigGen_txt
from Crypto.SelfTest.Signature import FIPS_186_3_SigVer_rsp as SigVer_rsp
load_fips_test_module(SigGen_txt)
load_fips_test_module(SigVer_rsp)
class StrRNG:
def __init__(self, randomness):
length = len(randomness)
self._idx = 0
# Fix required to get the right K (see how randint() works!)
self._randomness = long_to_bytes(bytes_to_long(randomness) - 1, length)
def __call__(self, n):
out = self._randomness[self._idx:self._idx + n]
self._idx += n
return out
class FIPS_DSS_Tests(unittest.TestCase):
# 1st 1024 bit key from SigGen.txt
P = 0xa8f9cd201e5e35d892f85f80e4db2599a5676a3b1d4f190330ed3256b26d0e80a0e49a8fffaaad2a24f472d2573241d4d6d6c7480c80b4c67bb4479c15ada7ea8424d2502fa01472e760241713dab025ae1b02e1703a1435f62ddf4ee4c1b664066eb22f2e3bf28bb70a2a76e4fd5ebe2d1229681b5b06439ac9c7e9d8bde283L
Q = 0xf85f0f83ac4df7ea0cdf8f469bfeeaea14156495L
G = 0x2b3152ff6c62f14622b8f48e59f8af46883b38e79b8c74deeae9df131f8b856e3ad6c8455dab87cc0da8ac973417ce4f7878557d6cdf40b35b4a0ca3eb310c6a95d68ce284ad4e25ea28591611ee08b8444bd64b25f3f7c572410ddfb39cc728b9c936f85f419129869929cdb909a6a3a99bbe089216368171bd0ba81de4fe33L
X = 0xc53eae6d45323164c7d07af5715703744a63fc3aL
Y = 0x313fd9ebca91574e1c2eebe1517c57e0c21b0209872140c5328761bbb2450b33f1b18b409ce9ab7c4cd8fda3391e8e34868357c199e16a6b2eba06d6749def791d79e95d3a4d09b24c392ad89dbf100995ae19c01062056bb14bce005e8731efde175f95b975089bdcdaea562b32786d96f5a31aedf75364008ad4fffebb970bL
def shortDescription(self):
return self.description
def test1(self):
"""Positive tests for signature generation"""
for tv in fips_test_vectors:
if not hasattr(tv, "K"):
continue
self.description = tv.desc
key = DSA.construct([tv.Y, tv.G, tv.P, tv.Q, tv.X])
hash_obj = tv.hashmod.new(tv.Msg)
signer = DSS.new(key, 'fips-186-3', randfunc=StrRNG(tv.K))
signature = signer.sign(hash_obj)
self.assertEqual(signature, tv.Signature)
def test2(self):
"""Positive tests for signature verification"""
for tv in fips_test_vectors:
# Skip incorrect signatures
if getattr(tv, "Result", "P") != "P":
continue
self.description = tv.desc
key = DSA.construct([tv.Y, tv.G, tv.P, tv.Q])
hash_obj = tv.hashmod.new(tv.Msg)
signer = DSS.new(key, 'fips-186-3')
self.failUnless(signer.verify(hash_obj, tv.Signature))
def test3(self):
"""Negative tests for signature verification"""
for tv in fips_test_vectors:
# Skip correct signatures
if getattr(tv, "Result", None) != "F":
continue
self.description = tv.desc
key = DSA.construct([tv.Y, tv.G, tv.P, tv.Q])
hash_obj = tv.hashmod.new(tv.Msg)
signer = DSS.new(key, 'fips-186-3')
self.failIf(signer.verify(hash_obj, tv.Signature))
def test4(self):
"""Verify that unapproved hashes are rejected"""
from Crypto.Hash import RIPEMD160
self.description = "Unapproved hash (RIPEMD160) test"
key = DSA.construct((self.Y, self.G, self.P, self.Q))
hash_obj = RIPEMD160.new()
signer = DSS.new(key, 'fips-186-3')
self.assertRaises(ValueError, signer.sign, hash_obj)
self.assertRaises(ValueError, signer.verify, hash_obj, b("\x00") * 40)
def test5(self):
"""Verify that unknown modes/encodings are rejected"""
self.description = "Unknown mode test"
key = DSA.construct((self.Y, self.G, self.P, self.Q))
self.assertRaises(ValueError, DSS.new, key, 'fips-186-0')
self.description = "Unknown encoding test"
self.assertRaises(ValueError, DSS.new, key, 'fips-186-3', 'xml')
def test6(self):
"""Verify ASN.1 encoding"""
self.description = "ASN.1 encoding test"
key = DSA.construct((self.Y, self.G, self.P, self.Q, self.X))
hash_obj = SHA1.new()
signer = DSS.new(key, 'fips-186-3', 'der')
signature = signer.sign(hash_obj)
# Verify that output looks like a SEQUENCE
self.assertEqual(bord(signature[0]), 48)
self.failUnless(signer.verify(hash_obj, signature))
# Verify that ASN.1 parsing fails as expected
signature = bchr(7) + signature[1:]
self.failIf(signer.verify(hash_obj, signature))
def test7(self):
"""Verify public/private method"""
self.description = "can_sign() test"
key = DSA.construct((self.Y, self.G, self.P, self.Q, self.X))
signer = DSS.new(key, 'fips-186-3')
self.failUnless(signer.can_sign())
key = DSA.construct((self.Y, self.G, self.P, self.Q))
signer = DSS.new(key, 'fips-186-3')
self.failIf(signer.can_sign())
class Det_DSA_Tests(unittest.TestCase):
2013-08-09 21:58:51 +02:00
"""Tests from rfc6979"""
keys = {}
key = TestKey()
key.p = """
86F5CA03DCFEB225063FF830A0C769B9DD9D6153AD91D7CE27F787C43278B447
E6533B86B18BED6E8A48B784A14C252C5BE0DBF60B86D6385BD2F12FB763ED88
73ABFD3F5BA2E0A8C0A59082EAC056935E529DAF7C610467899C77ADEDFC846C
881870B7B19B2B58F9BE0521A17002E3BDD6B86685EE90B3D9A1B02B782B1779"""
key.q = "996F967F6C8E388D9E28D01E205FBA957A5698B1"
key.g = """
07B0F92546150B62514BB771E2A0C0CE387F03BDA6C56B505209FF25FD3C133D
89BBCD97E904E09114D9A7DEFDEADFC9078EA544D2E401AEECC40BB9FBBF78FD
87995A10A1C27CB7789B594BA7EFB5C4326A9FE59A070E136DB77175464ADCA4
17BE5DCE2F40D10A46A3A3943F26AB7FD9C0398FF8C76EE0A56826A8A88F1DBD"""
key.x = "411602CB19A6CCC34494D79D98EF1E7ED5AF25F7"
key.y = """
5DF5E01DED31D0297E274E1691C192FE5868FEF9E19A84776454B100CF16F653
92195A38B90523E2542EE61871C0440CB87C322FC4B4D2EC5E1E7EC766E1BE8D
4CE935437DC11C3C8FD426338933EBFE739CB3465F4D3668C5E473508253B1E6
82F65CBDC4FAE93C2EA212390E54905A86E2223170B44EAA7DA5DD9FFCFB7F3B"""
keys['DSA1024'] = key
key = TestKey()
key.p = """
9DB6FB5951B66BB6FE1E140F1D2CE5502374161FD6538DF1648218642F0B5C48
C8F7A41AADFA187324B87674FA1822B00F1ECF8136943D7C55757264E5A1A44F
FE012E9936E00C1D3E9310B01C7D179805D3058B2A9F4BB6F9716BFE6117C6B5
B3CC4D9BE341104AD4A80AD6C94E005F4B993E14F091EB51743BF33050C38DE2
35567E1B34C3D6A5C0CEAA1A0F368213C3D19843D0B4B09DCB9FC72D39C8DE41
F1BF14D4BB4563CA28371621CAD3324B6A2D392145BEBFAC748805236F5CA2FE
92B871CD8F9C36D3292B5509CA8CAA77A2ADFC7BFD77DDA6F71125A7456FEA15
3E433256A2261C6A06ED3693797E7995FAD5AABBCFBE3EDA2741E375404AE25B"""
key.q = "F2C3119374CE76C9356990B465374A17F23F9ED35089BD969F61C6DDE9998C1F"
key.g = """
5C7FF6B06F8F143FE8288433493E4769C4D988ACE5BE25A0E24809670716C613
D7B0CEE6932F8FAA7C44D2CB24523DA53FBE4F6EC3595892D1AA58C4328A06C4
6A15662E7EAA703A1DECF8BBB2D05DBE2EB956C142A338661D10461C0D135472
085057F3494309FFA73C611F78B32ADBB5740C361C9F35BE90997DB2014E2EF5
AA61782F52ABEB8BD6432C4DD097BC5423B285DAFB60DC364E8161F4A2A35ACA
3A10B1C4D203CC76A470A33AFDCBDD92959859ABD8B56E1725252D78EAC66E71
BA9AE3F1DD2487199874393CD4D832186800654760E1E34C09E4D155179F9EC0
DC4473F996BDCE6EED1CABED8B6F116F7AD9CF505DF0F998E34AB27514B0FFE7"""
key.x = "69C7548C21D0DFEA6B9A51C9EAD4E27C33D3B3F180316E5BCAB92C933F0E4DBC"
key.y = """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"""
keys['DSA2048'] = key
# This is a sequence of items:
# message, k, r, s, hash module
signatures = [
(
"sample",
"7BDB6B0FF756E1BB5D53583EF979082F9AD5BD5B",
"2E1A0C2562B2912CAAF89186FB0F42001585DA55",
"29EFB6B0AFF2D7A68EB70CA313022253B9A88DF5",
SHA1,
'DSA1024'
),
(
"sample",
"562097C06782D60C3037BA7BE104774344687649",
"4BC3B686AEA70145856814A6F1BB53346F02101E",
"410697B92295D994D21EDD2F4ADA85566F6F94C1",
SHA224,
'DSA1024'
),
(
"sample",
"519BA0546D0C39202A7D34D7DFA5E760B318BCFB",
"81F2F5850BE5BC123C43F71A3033E9384611C545",
"4CDD914B65EB6C66A8AAAD27299BEE6B035F5E89",
SHA256,
'DSA1024'
),
(
"sample",
"95897CD7BBB944AA932DBC579C1C09EB6FCFC595",
"07F2108557EE0E3921BC1774F1CA9B410B4CE65A",
"54DF70456C86FAC10FAB47C1949AB83F2C6F7595",
SHA384,
'DSA1024'
),
(
"sample",
"09ECE7CA27D0F5A4DD4E556C9DF1D21D28104F8B",
"16C3491F9B8C3FBBDD5E7A7B667057F0D8EE8E1B",
"02C36A127A7B89EDBB72E4FFBC71DABC7D4FC69C",
SHA512,
'DSA1024'
),
(
"test",
"5C842DF4F9E344EE09F056838B42C7A17F4A6433",
"42AB2052FD43E123F0607F115052A67DCD9C5C77",
"183916B0230D45B9931491D4C6B0BD2FB4AAF088",
SHA1,
'DSA1024'
),
(
"test",
"4598B8EFC1A53BC8AECD58D1ABBB0C0C71E67297",
"6868E9964E36C1689F6037F91F28D5F2C30610F2",
"49CEC3ACDC83018C5BD2674ECAAD35B8CD22940F",
SHA224,
'DSA1024'
),
(
"test",
"5A67592E8128E03A417B0484410FB72C0B630E1A",
"22518C127299B0F6FDC9872B282B9E70D0790812",
"6837EC18F150D55DE95B5E29BE7AF5D01E4FE160",
SHA256,
'DSA1024'
),
(
"test",
"220156B761F6CA5E6C9F1B9CF9C24BE25F98CD89",
"854CF929B58D73C3CBFDC421E8D5430CD6DB5E66",
"91D0E0F53E22F898D158380676A871A157CDA622",
SHA384,
'DSA1024'
),
(
"test",
"65D2C2EEB175E370F28C75BFCDC028D22C7DBE9C",
"8EA47E475BA8AC6F2D821DA3BD212D11A3DEB9A0",
"7C670C7AD72B6C050C109E1790008097125433E8",
SHA512,
'DSA1024'
),
(
"sample",
"888FA6F7738A41BDC9846466ABDB8174C0338250AE50CE955CA16230F9CBD53E",
"3A1B2DBD7489D6ED7E608FD036C83AF396E290DBD602408E8677DAABD6E7445A",
"D26FCBA19FA3E3058FFC02CA1596CDBB6E0D20CB37B06054F7E36DED0CDBBCCF",
SHA1,
'DSA2048'
),
(
"sample",
"BC372967702082E1AA4FCE892209F71AE4AD25A6DFD869334E6F153BD0C4D806",
"DC9F4DEADA8D8FF588E98FED0AB690FFCE858DC8C79376450EB6B76C24537E2C",
"A65A9C3BC7BABE286B195D5DA68616DA8D47FA0097F36DD19F517327DC848CEC",
SHA224,
'DSA2048'
),
(
"sample",
"8926A27C40484216F052F4427CFD5647338B7B3939BC6573AF4333569D597C52",
"EACE8BDBBE353C432A795D9EC556C6D021F7A03F42C36E9BC87E4AC7932CC809",
"7081E175455F9247B812B74583E9E94F9EA79BD640DC962533B0680793A38D53",
SHA256,
'DSA2048'
),
(
"sample",
"C345D5AB3DA0A5BCB7EC8F8FB7A7E96069E03B206371EF7D83E39068EC564920",
"B2DA945E91858834FD9BF616EBAC151EDBC4B45D27D0DD4A7F6A22739F45C00B",
"19048B63D9FD6BCA1D9BAE3664E1BCB97F7276C306130969F63F38FA8319021B",
SHA384,
'DSA2048'
),
(
"sample",
"5A12994431785485B3F5F067221517791B85A597B7A9436995C89ED0374668FC",
"2016ED092DC5FB669B8EFB3D1F31A91EECB199879BE0CF78F02BA062CB4C942E",
"D0C76F84B5F091E141572A639A4FB8C230807EEA7D55C8A154A224400AFF2351",
SHA512,
'DSA2048'
),
(
"test",
"6EEA486F9D41A037B2C640BC5645694FF8FF4B98D066A25F76BE641CCB24BA4F",
"C18270A93CFC6063F57A4DFA86024F700D980E4CF4E2CB65A504397273D98EA0",
"414F22E5F31A8B6D33295C7539C1C1BA3A6160D7D68D50AC0D3A5BEAC2884FAA",
SHA1,
'DSA2048'
),
(
"test",
"06BD4C05ED74719106223BE33F2D95DA6B3B541DAD7BFBD7AC508213B6DA6670",
"272ABA31572F6CC55E30BF616B7A265312018DD325BE031BE0CC82AA17870EA3",
"E9CC286A52CCE201586722D36D1E917EB96A4EBDB47932F9576AC645B3A60806",
SHA224,
'DSA2048'
),
(
"test",
"1D6CE6DDA1C5D37307839CD03AB0A5CBB18E60D800937D67DFB4479AAC8DEAD7",
"8190012A1969F9957D56FCCAAD223186F423398D58EF5B3CEFD5A4146A4476F0",
"7452A53F7075D417B4B013B278D1BB8BBD21863F5E7B1CEE679CF2188E1AB19E",
SHA256,
'DSA2048'
),
(
"test",
"206E61F73DBE1B2DC8BE736B22B079E9DACD974DB00EEBBC5B64CAD39CF9F91C",
"239E66DDBE8F8C230A3D071D601B6FFBDFB5901F94D444C6AF56F732BEB954BE",
"6BD737513D5E72FE85D1C750E0F73921FE299B945AAD1C802F15C26A43D34961",
SHA384,
'DSA2048'
),
(
"test",
"AFF1651E4CD6036D57AA8B2A05CCF1A9D5A40166340ECBBDC55BE10B568AA0AA",
"89EC4BB1400ECCFF8E7D9AA515CD1DE7803F2DAFF09693EE7FD1353E90A68307",
"C9F0BDABCC0D880BB137A994CC7F3980CE91CC10FAF529FC46565B15CEA854E1",
SHA512,
'DSA2048'
)
]
def setUp(self):
# Convert DSA key components from hex strings to integers
new_keys = {}
for tag, test_key in self.keys.items():
new_test_key = TestKey()
new_test_key.p = t2l(test_key.p)
new_test_key.q = t2l(test_key.q)
new_test_key.g = t2l(test_key.g)
new_test_key.x = t2l(test_key.x)
new_test_key.y = t2l(test_key.y)
new_keys[tag] = new_test_key
self.keys = new_keys
# Convert signature encoding
new_signatures = []
for tv in self.signatures:
new_tv = TestVector()
new_tv.message = b(tv[0]) # message
new_tv.nonce = t2l(tv[1])
new_tv.result = t2b(tv[2]) + t2b(tv[3])
new_tv.module = tv[4]
new_tv.test_key = self.keys[tv[5]]
new_signatures.append(new_tv)
self.signatures = new_signatures
def test1(self):
q = 0x4000000000000000000020108A2E0CC0D99F8A5EFL
x = 0x09A4D6792295A7F730FC3F2B49CBC0F62E862272FL
p = 2 * q + 1
y = pow(2, x, p)
key = DSA.construct([pow(y, 2, p), 2L, p, q, x])
2013-08-09 21:58:51 +02:00
signer = DSS.new(key, 'deterministic-rfc6979')
# Test _int2octets
self.assertEqual(hexlify(signer._int2octets(x)),
b("009a4d6792295a7f730fc3f2b49cbc0f"
"62e862272f"))
# Test _bits2octets
h1 = SHA256.new("sample").digest()
self.assertEqual(hexlify(signer._bits2octets(h1)),
b("01795edf0d54db760f156d0dac04c032"
"2b3a204224"))
def test2(self):
for sig in self.signatures:
tk = sig.test_key
key = DSA.construct([tk.y, tk.g, tk.p, tk.q, tk.x])
2013-08-09 21:58:51 +02:00
signer = DSS.new(key, 'deterministic-rfc6979')
hash_obj = sig.module.new(sig.message)
result = signer.sign(hash_obj)
self.assertEqual(sig.result, result)
def get_tests(config={}):
tests = []
load_tests()
tests += list_test_cases(FIPS_DSS_Tests)
tests += list_test_cases(Det_DSA_Tests)
return tests
if __name__ == '__main__':
suite = lambda: unittest.TestSuite(get_tests())
unittest.main(defaultTest='suite')