
s/Mock/Fake/ because the software implementation is a fake, not a mock. This clarifies expectations about what this key provider does and also avoids confusion with providers that actually return mock objects (see attached bug for a motivation). Bug: 400903525 Change-Id: I3a80687f0d55c66850135c6c0b7c496c5890f21a Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/6386695 Reviewed-by: Nicolas Ouellet-Payeur <nicolaso@chromium.org> Reviewed-by: Matt Mueller <mattm@chromium.org> Reviewed-by: Adam Rice <ricea@chromium.org> Commit-Queue: Alex Ilin <alexilin@chromium.org> Cr-Commit-Position: refs/heads/main@{#1439905}
162 lines
5.0 KiB
C++
162 lines
5.0 KiB
C++
// Copyright 2021 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "crypto/unexportable_key.h"
|
|
|
|
#include <optional>
|
|
#include <tuple>
|
|
|
|
#include "base/logging.h"
|
|
#include "base/time/time.h"
|
|
#include "crypto/scoped_fake_unexportable_key_provider.h"
|
|
#include "testing/gtest/include/gtest/gtest.h"
|
|
|
|
#if BUILDFLAG(IS_MAC)
|
|
#include "crypto/scoped_fake_apple_keychain_v2.h"
|
|
#endif // BUILDFLAG(IS_MAC)
|
|
|
|
namespace {
|
|
|
|
enum class Provider {
|
|
kTPM,
|
|
kFake,
|
|
kMicrosoftSoftware,
|
|
};
|
|
|
|
const Provider kAllProviders[] = {
|
|
Provider::kTPM,
|
|
Provider::kFake,
|
|
Provider::kMicrosoftSoftware,
|
|
};
|
|
|
|
const crypto::SignatureVerifier::SignatureAlgorithm kAllAlgorithms[] = {
|
|
crypto::SignatureVerifier::SignatureAlgorithm::ECDSA_SHA256,
|
|
crypto::SignatureVerifier::SignatureAlgorithm::RSA_PKCS1_SHA256,
|
|
};
|
|
|
|
#if BUILDFLAG(IS_MAC)
|
|
constexpr char kTestKeychainAccessGroup[] = "test-keychain-access-group";
|
|
#endif // BUILDFLAG(IS_MAC)
|
|
|
|
std::string ToString(Provider provider) {
|
|
switch (provider) {
|
|
case Provider::kTPM:
|
|
return "TPM";
|
|
case Provider::kFake:
|
|
return "Fake";
|
|
case Provider::kMicrosoftSoftware:
|
|
return "Microsoft Software";
|
|
}
|
|
}
|
|
|
|
class UnexportableKeySigningTest
|
|
: public testing::TestWithParam<
|
|
std::tuple<crypto::SignatureVerifier::SignatureAlgorithm, Provider>> {
|
|
private:
|
|
#if BUILDFLAG(IS_MAC)
|
|
crypto::ScopedFakeAppleKeychainV2 scoped_fake_apple_keychain_{
|
|
kTestKeychainAccessGroup};
|
|
#endif // BUILDFLAG(IS_MAC)
|
|
};
|
|
|
|
INSTANTIATE_TEST_SUITE_P(All,
|
|
UnexportableKeySigningTest,
|
|
testing::Combine(testing::ValuesIn(kAllAlgorithms),
|
|
testing::ValuesIn(kAllProviders)));
|
|
|
|
TEST_P(UnexportableKeySigningTest, RoundTrip) {
|
|
const crypto::SignatureVerifier::SignatureAlgorithm algo =
|
|
std::get<0>(GetParam());
|
|
const Provider provider_type = std::get<1>(GetParam());
|
|
|
|
switch (algo) {
|
|
case crypto::SignatureVerifier::SignatureAlgorithm::ECDSA_SHA256:
|
|
LOG(INFO) << "ECDSA P-256, provider=" << ToString(provider_type);
|
|
break;
|
|
case crypto::SignatureVerifier::SignatureAlgorithm::RSA_PKCS1_SHA256:
|
|
LOG(INFO) << "RSA, provider=" << ToString(provider_type);
|
|
break;
|
|
default:
|
|
ASSERT_TRUE(false);
|
|
}
|
|
|
|
SCOPED_TRACE(static_cast<int>(algo));
|
|
SCOPED_TRACE(ToString(provider_type));
|
|
|
|
std::optional<crypto::ScopedFakeUnexportableKeyProvider> fake;
|
|
if (provider_type == Provider::kFake) {
|
|
fake.emplace();
|
|
}
|
|
|
|
const crypto::SignatureVerifier::SignatureAlgorithm algorithms[] = {algo};
|
|
|
|
crypto::UnexportableKeyProvider::Config config{
|
|
#if BUILDFLAG(IS_MAC)
|
|
.keychain_access_group = kTestKeychainAccessGroup
|
|
#endif // BUILDLFAG(IS_MAC)
|
|
};
|
|
std::unique_ptr<crypto::UnexportableKeyProvider> provider;
|
|
if (provider_type == Provider::kMicrosoftSoftware) {
|
|
provider = crypto::GetMicrosoftSoftwareUnexportableKeyProvider();
|
|
} else {
|
|
provider = crypto::GetUnexportableKeyProvider(std::move(config));
|
|
}
|
|
if (!provider) {
|
|
LOG(INFO) << "Skipping test because of lack of hardware support.";
|
|
return;
|
|
}
|
|
|
|
if (!provider->SelectAlgorithm(algorithms)) {
|
|
LOG(INFO) << "Skipping test because of lack of support for this key type.";
|
|
return;
|
|
}
|
|
|
|
const base::TimeTicks generate_start = base::TimeTicks::Now();
|
|
std::unique_ptr<crypto::UnexportableSigningKey> key =
|
|
provider->GenerateSigningKeySlowly(algorithms);
|
|
if (algo == crypto::SignatureVerifier::SignatureAlgorithm::ECDSA_SHA256) {
|
|
if (!key) {
|
|
GTEST_SKIP()
|
|
<< "Workaround for https://issues.chromium.org/issues/41494935";
|
|
}
|
|
}
|
|
|
|
ASSERT_TRUE(key);
|
|
LOG(INFO) << "Generation took " << (base::TimeTicks::Now() - generate_start);
|
|
|
|
ASSERT_EQ(key->Algorithm(), algo);
|
|
const std::vector<uint8_t> wrapped = key->GetWrappedKey();
|
|
const std::vector<uint8_t> spki = key->GetSubjectPublicKeyInfo();
|
|
const uint8_t msg[] = {1, 2, 3, 4};
|
|
|
|
const base::TimeTicks sign_start = base::TimeTicks::Now();
|
|
const std::optional<std::vector<uint8_t>> sig = key->SignSlowly(msg);
|
|
LOG(INFO) << "Signing took " << (base::TimeTicks::Now() - sign_start);
|
|
ASSERT_TRUE(sig);
|
|
|
|
crypto::SignatureVerifier verifier;
|
|
ASSERT_TRUE(verifier.VerifyInit(algo, *sig, spki));
|
|
verifier.VerifyUpdate(msg);
|
|
ASSERT_TRUE(verifier.VerifyFinal());
|
|
|
|
const base::TimeTicks import2_start = base::TimeTicks::Now();
|
|
std::unique_ptr<crypto::UnexportableSigningKey> key2 =
|
|
provider->FromWrappedSigningKeySlowly(wrapped);
|
|
ASSERT_TRUE(key2);
|
|
LOG(INFO) << "Import took " << (base::TimeTicks::Now() - import2_start);
|
|
|
|
const base::TimeTicks sign2_start = base::TimeTicks::Now();
|
|
const std::optional<std::vector<uint8_t>> sig2 = key->SignSlowly(msg);
|
|
LOG(INFO) << "Signing took " << (base::TimeTicks::Now() - sign2_start);
|
|
ASSERT_TRUE(sig2);
|
|
|
|
crypto::SignatureVerifier verifier2;
|
|
ASSERT_TRUE(verifier2.VerifyInit(algo, *sig2, spki));
|
|
verifier2.VerifyUpdate(msg);
|
|
ASSERT_TRUE(verifier2.VerifyFinal());
|
|
|
|
EXPECT_TRUE(provider->DeleteSigningKeySlowly(wrapped));
|
|
}
|
|
} // namespace
|