test_dss.py 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704
  1. #
  2. # SelfTest/Signature/test_dss.py: Self-test for DSS signatures
  3. #
  4. # ===================================================================
  5. #
  6. # Copyright (c) 2014, Legrandin <helderijs@gmail.com>
  7. # All rights reserved.
  8. #
  9. # Redistribution and use in source and binary forms, with or without
  10. # modification, are permitted provided that the following conditions
  11. # are met:
  12. #
  13. # 1. Redistributions of source code must retain the above copyright
  14. # notice, this list of conditions and the following disclaimer.
  15. # 2. Redistributions in binary form must reproduce the above copyright
  16. # notice, this list of conditions and the following disclaimer in
  17. # the documentation and/or other materials provided with the
  18. # distribution.
  19. #
  20. # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  21. # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  22. # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
  23. # FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
  24. # COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
  25. # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
  26. # BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  27. # LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  28. # CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  29. # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
  30. # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
  31. # POSSIBILITY OF SUCH DAMAGE.
  32. # ===================================================================
  33. import re
  34. import unittest
  35. from binascii import hexlify
  36. from Crypto.Util.py3compat import b, tobytes, bord, bchr, unhexlify
  37. from Crypto.Hash import SHA1, SHA224, SHA256, SHA384, SHA512
  38. from Crypto.Signature import DSS
  39. from Crypto.PublicKey import DSA, ECC
  40. from Crypto.SelfTest.st_common import list_test_cases
  41. from Crypto.SelfTest.loader import load_tests
  42. from Crypto.Util.number import bytes_to_long, long_to_bytes
  43. def t2b(hexstring):
  44. ws = hexstring.replace(" ", "").replace("\n", "")
  45. return unhexlify(tobytes(ws))
  46. def t2l(hexstring):
  47. ws = hexstring.replace(" ", "").replace("\n", "")
  48. return long(ws, 16)
  49. def load_hash_by_name(hash_name):
  50. return __import__("Crypto.Hash." + hash_name, globals(), locals(), ["new"])
  51. class TestKey(object):
  52. pass
  53. class TestVector(object):
  54. pass
  55. class StrRNG:
  56. def __init__(self, randomness):
  57. length = len(randomness)
  58. self._idx = 0
  59. # Fix required to get the right K (see how randint() works!)
  60. self._randomness = long_to_bytes(bytes_to_long(randomness) - 1, length)
  61. def __call__(self, n):
  62. out = self._randomness[self._idx:self._idx + n]
  63. self._idx += n
  64. return out
  65. class FIPS_DSA_Tests(unittest.TestCase):
  66. # 1st 1024 bit key from SigGen.txt
  67. P = 0xa8f9cd201e5e35d892f85f80e4db2599a5676a3b1d4f190330ed3256b26d0e80a0e49a8fffaaad2a24f472d2573241d4d6d6c7480c80b4c67bb4479c15ada7ea8424d2502fa01472e760241713dab025ae1b02e1703a1435f62ddf4ee4c1b664066eb22f2e3bf28bb70a2a76e4fd5ebe2d1229681b5b06439ac9c7e9d8bde283L
  68. Q = 0xf85f0f83ac4df7ea0cdf8f469bfeeaea14156495L
  69. G = 0x2b3152ff6c62f14622b8f48e59f8af46883b38e79b8c74deeae9df131f8b856e3ad6c8455dab87cc0da8ac973417ce4f7878557d6cdf40b35b4a0ca3eb310c6a95d68ce284ad4e25ea28591611ee08b8444bd64b25f3f7c572410ddfb39cc728b9c936f85f419129869929cdb909a6a3a99bbe089216368171bd0ba81de4fe33L
  70. X = 0xc53eae6d45323164c7d07af5715703744a63fc3aL
  71. Y = 0x313fd9ebca91574e1c2eebe1517c57e0c21b0209872140c5328761bbb2450b33f1b18b409ce9ab7c4cd8fda3391e8e34868357c199e16a6b2eba06d6749def791d79e95d3a4d09b24c392ad89dbf100995ae19c01062056bb14bce005e8731efde175f95b975089bdcdaea562b32786d96f5a31aedf75364008ad4fffebb970bL
  72. key_pub = DSA.construct((Y, G, P, Q))
  73. key_priv = DSA.construct((Y, G, P, Q, X))
  74. def shortDescription(self):
  75. return "FIPS DSA Tests"
  76. def test_loopback(self):
  77. hashed_msg = SHA512.new(b("test"))
  78. signer = DSS.new(self.key_priv, 'fips-186-3')
  79. signature = signer.sign(hashed_msg)
  80. verifier = DSS.new(self.key_pub, 'fips-186-3')
  81. verifier.verify(hashed_msg, signature)
  82. def test_negative_unapproved_hashes(self):
  83. """Verify that unapproved hashes are rejected"""
  84. from Crypto.Hash import RIPEMD160
  85. self.description = "Unapproved hash (RIPEMD160) test"
  86. hash_obj = RIPEMD160.new()
  87. signer = DSS.new(self.key_priv, 'fips-186-3')
  88. self.assertRaises(ValueError, signer.sign, hash_obj)
  89. self.assertRaises(ValueError, signer.verify, hash_obj, b("\x00") * 40)
  90. def test_negative_unknown_modes_encodings(self):
  91. """Verify that unknown modes/encodings are rejected"""
  92. self.description = "Unknown mode test"
  93. self.assertRaises(ValueError, DSS.new, self.key_priv, 'fips-186-0')
  94. self.description = "Unknown encoding test"
  95. self.assertRaises(ValueError, DSS.new, self.key_priv, 'fips-186-3', 'xml')
  96. def test_asn1_encoding(self):
  97. """Verify ASN.1 encoding"""
  98. self.description = "ASN.1 encoding test"
  99. hash_obj = SHA1.new()
  100. signer = DSS.new(self.key_priv, 'fips-186-3', 'der')
  101. signature = signer.sign(hash_obj)
  102. # Verify that output looks like a SEQUENCE
  103. self.assertEqual(bord(signature[0]), 48)
  104. signer.verify(hash_obj, signature)
  105. # Verify that ASN.1 parsing fails as expected
  106. signature = bchr(7) + signature[1:]
  107. self.assertRaises(ValueError, signer.verify, hash_obj, signature)
  108. def test_sign_verify(self):
  109. """Verify public/private method"""
  110. self.description = "can_sign() test"
  111. signer = DSS.new(self.key_priv, 'fips-186-3')
  112. self.failUnless(signer.can_sign())
  113. signer = DSS.new(self.key_pub, 'fips-186-3')
  114. self.failIf(signer.can_sign())
  115. test_vectors_verify = load_tests(("Crypto", "SelfTest", "Signature", "test_vectors", "DSA"),
  116. "FIPS_186_3_SigVer.rsp",
  117. "Signature Verification 186-3",
  118. {'result' : lambda x: x})
  119. for idx, tv in enumerate(test_vectors_verify):
  120. if isinstance(tv, basestring):
  121. res = re.match("\[mod = L=([0-9]+), N=([0-9]+), ([a-zA-Z0-9-]+)\]", tv)
  122. hash_name = res.group(3).replace("-", "")
  123. hash_module = load_hash_by_name(hash_name)
  124. continue
  125. if hasattr(tv, "p"):
  126. modulus = tv.p
  127. generator = tv.g
  128. suborder = tv.q
  129. continue
  130. hash_obj = hash_module.new(tv.msg)
  131. key = DSA.construct([bytes_to_long(x) for x in tv.y, generator, modulus, suborder], False)
  132. verifier = DSS.new(key, 'fips-186-3')
  133. def positive_test(self, verifier=verifier, hash_obj=hash_obj, signature=tv.r+tv.s):
  134. verifier.verify(hash_obj, signature)
  135. def negative_test(self, verifier=verifier, hash_obj=hash_obj, signature=tv.r+tv.s):
  136. self.assertRaises(ValueError, verifier.verify, hash_obj, signature)
  137. if tv.result == 'p':
  138. setattr(FIPS_DSA_Tests, "test_verify_positive_%d" % idx, positive_test)
  139. else:
  140. setattr(FIPS_DSA_Tests, "test_verify_negative_%d" % idx, negative_test)
  141. test_vectors_sign = load_tests(("Crypto", "SelfTest", "Signature", "test_vectors", "DSA"),
  142. "FIPS_186_3_SigGen.txt",
  143. "Signature Creation 186-3",
  144. {})
  145. for idx, tv in enumerate(test_vectors_sign):
  146. if isinstance(tv, basestring):
  147. res = re.match("\[mod = L=([0-9]+), N=([0-9]+), ([a-zA-Z0-9-]+)\]", tv)
  148. hash_name = res.group(3).replace("-", "")
  149. hash_module = load_hash_by_name(hash_name)
  150. continue
  151. if hasattr(tv, "p"):
  152. modulus = tv.p
  153. generator = tv.g
  154. suborder = tv.q
  155. continue
  156. hash_obj = hash_module.new(tv.msg)
  157. key = DSA.construct([bytes_to_long(x) for x in tv.y, generator, modulus, suborder, tv.x], False)
  158. signer = DSS.new(key, 'fips-186-3', randfunc=StrRNG(tv.k))
  159. def new_test(self, signer=signer, hash_obj=hash_obj, signature=tv.r+tv.s):
  160. self.assertEqual(signer.sign(hash_obj), signature)
  161. setattr(FIPS_DSA_Tests, "test_sign_%d" % idx, new_test)
  162. class FIPS_ECDSA_Tests(unittest.TestCase):
  163. key_priv = ECC.generate(curve="P-256")
  164. key_pub = key_priv.public_key()
  165. def shortDescription(self):
  166. return "FIPS ECDSA Tests"
  167. def test_loopback(self):
  168. hashed_msg = SHA512.new(b("test"))
  169. signer = DSS.new(self.key_priv, 'fips-186-3')
  170. signature = signer.sign(hashed_msg)
  171. verifier = DSS.new(self.key_pub, 'fips-186-3')
  172. verifier.verify(hashed_msg, signature)
  173. def test_negative_unapproved_hashes(self):
  174. """Verify that unapproved hashes are rejected"""
  175. from Crypto.Hash import SHA1
  176. self.description = "Unapproved hash (SHA-1) test"
  177. hash_obj = SHA1.new()
  178. signer = DSS.new(self.key_priv, 'fips-186-3')
  179. self.assertRaises(ValueError, signer.sign, hash_obj)
  180. self.assertRaises(ValueError, signer.verify, hash_obj, b("\x00") * 40)
  181. def test_sign_verify(self):
  182. """Verify public/private method"""
  183. self.description = "can_sign() test"
  184. signer = DSS.new(self.key_priv, 'fips-186-3')
  185. self.failUnless(signer.can_sign())
  186. signer = DSS.new(self.key_pub, 'fips-186-3')
  187. self.failIf(signer.can_sign())
  188. test_vectors_verify = load_tests(("Crypto", "SelfTest", "Signature", "test_vectors", "ECDSA"),
  189. "SigVer.rsp",
  190. "ECDSA Signature Verification 186-3",
  191. {'result': lambda x: x,
  192. 'qx': lambda x: int(x, 16),
  193. 'qy': lambda x: int(x, 16),
  194. })
  195. for idx, tv in enumerate(test_vectors_verify):
  196. if isinstance(tv, basestring):
  197. res = re.match("\[P-256,(SHA-[0-9]+)\]", tv)
  198. assert res
  199. hash_name = res.group(1).replace("-", "")
  200. hash_module = load_hash_by_name(hash_name)
  201. continue
  202. hash_obj = hash_module.new(tv.msg)
  203. key = ECC.construct(curve="P-256", point_x=tv.qx, point_y=tv.qy)
  204. verifier = DSS.new(key, 'fips-186-3')
  205. def positive_test(self, verifier=verifier, hash_obj=hash_obj, signature=tv.r+tv.s):
  206. verifier.verify(hash_obj, signature)
  207. def negative_test(self, verifier=verifier, hash_obj=hash_obj, signature=tv.r+tv.s):
  208. self.assertRaises(ValueError, verifier.verify, hash_obj, signature)
  209. if tv.result.startswith('p'):
  210. setattr(FIPS_ECDSA_Tests, "test_verify_positive_%d" % idx, positive_test)
  211. else:
  212. setattr(FIPS_ECDSA_Tests, "test_verify_negative_%d" % idx, negative_test)
  213. test_vectors_sign = load_tests(("Crypto", "SelfTest", "Signature", "test_vectors", "ECDSA"),
  214. "SigGen.txt",
  215. "ECDSA Signature Verification 186-3",
  216. {'d': lambda x: int(x, 16)})
  217. for idx, tv in enumerate(test_vectors_sign):
  218. if isinstance(tv, basestring):
  219. res = re.match("\[P-256,(SHA-[0-9]+)\]", tv)
  220. assert res
  221. hash_name = res.group(1).replace("-", "")
  222. hash_module = load_hash_by_name(hash_name)
  223. continue
  224. hash_obj = hash_module.new(tv.msg)
  225. key = ECC.construct(curve="P-256", d=tv.d)
  226. signer = DSS.new(key, 'fips-186-3', randfunc=StrRNG(tv.k))
  227. def new_test(self, signer=signer, hash_obj=hash_obj, signature=tv.r+tv.s):
  228. self.assertEqual(signer.sign(hash_obj), signature)
  229. setattr(FIPS_ECDSA_Tests, "test_sign_%d" % idx, new_test)
  230. class Det_DSA_Tests(unittest.TestCase):
  231. """Tests from rfc6979"""
  232. keys = {}
  233. key = TestKey()
  234. key.p = """
  235. 86F5CA03DCFEB225063FF830A0C769B9DD9D6153AD91D7CE27F787C43278B447
  236. E6533B86B18BED6E8A48B784A14C252C5BE0DBF60B86D6385BD2F12FB763ED88
  237. 73ABFD3F5BA2E0A8C0A59082EAC056935E529DAF7C610467899C77ADEDFC846C
  238. 881870B7B19B2B58F9BE0521A17002E3BDD6B86685EE90B3D9A1B02B782B1779"""
  239. key.q = "996F967F6C8E388D9E28D01E205FBA957A5698B1"
  240. key.g = """
  241. 07B0F92546150B62514BB771E2A0C0CE387F03BDA6C56B505209FF25FD3C133D
  242. 89BBCD97E904E09114D9A7DEFDEADFC9078EA544D2E401AEECC40BB9FBBF78FD
  243. 87995A10A1C27CB7789B594BA7EFB5C4326A9FE59A070E136DB77175464ADCA4
  244. 17BE5DCE2F40D10A46A3A3943F26AB7FD9C0398FF8C76EE0A56826A8A88F1DBD"""
  245. key.x = "411602CB19A6CCC34494D79D98EF1E7ED5AF25F7"
  246. key.y = """
  247. 5DF5E01DED31D0297E274E1691C192FE5868FEF9E19A84776454B100CF16F653
  248. 92195A38B90523E2542EE61871C0440CB87C322FC4B4D2EC5E1E7EC766E1BE8D
  249. 4CE935437DC11C3C8FD426338933EBFE739CB3465F4D3668C5E473508253B1E6
  250. 82F65CBDC4FAE93C2EA212390E54905A86E2223170B44EAA7DA5DD9FFCFB7F3B"""
  251. keys['DSA1024'] = key
  252. key = TestKey()
  253. key.p = """
  254. 9DB6FB5951B66BB6FE1E140F1D2CE5502374161FD6538DF1648218642F0B5C48
  255. C8F7A41AADFA187324B87674FA1822B00F1ECF8136943D7C55757264E5A1A44F
  256. FE012E9936E00C1D3E9310B01C7D179805D3058B2A9F4BB6F9716BFE6117C6B5
  257. B3CC4D9BE341104AD4A80AD6C94E005F4B993E14F091EB51743BF33050C38DE2
  258. 35567E1B34C3D6A5C0CEAA1A0F368213C3D19843D0B4B09DCB9FC72D39C8DE41
  259. F1BF14D4BB4563CA28371621CAD3324B6A2D392145BEBFAC748805236F5CA2FE
  260. 92B871CD8F9C36D3292B5509CA8CAA77A2ADFC7BFD77DDA6F71125A7456FEA15
  261. 3E433256A2261C6A06ED3693797E7995FAD5AABBCFBE3EDA2741E375404AE25B"""
  262. key.q = "F2C3119374CE76C9356990B465374A17F23F9ED35089BD969F61C6DDE9998C1F"
  263. key.g = """
  264. 5C7FF6B06F8F143FE8288433493E4769C4D988ACE5BE25A0E24809670716C613
  265. D7B0CEE6932F8FAA7C44D2CB24523DA53FBE4F6EC3595892D1AA58C4328A06C4
  266. 6A15662E7EAA703A1DECF8BBB2D05DBE2EB956C142A338661D10461C0D135472
  267. 085057F3494309FFA73C611F78B32ADBB5740C361C9F35BE90997DB2014E2EF5
  268. AA61782F52ABEB8BD6432C4DD097BC5423B285DAFB60DC364E8161F4A2A35ACA
  269. 3A10B1C4D203CC76A470A33AFDCBDD92959859ABD8B56E1725252D78EAC66E71
  270. BA9AE3F1DD2487199874393CD4D832186800654760E1E34C09E4D155179F9EC0
  271. DC4473F996BDCE6EED1CABED8B6F116F7AD9CF505DF0F998E34AB27514B0FFE7"""
  272. key.x = "69C7548C21D0DFEA6B9A51C9EAD4E27C33D3B3F180316E5BCAB92C933F0E4DBC"
  273. key.y = """
  274. 667098C654426C78D7F8201EAC6C203EF030D43605032C2F1FA937E5237DBD94
  275. 9F34A0A2564FE126DC8B715C5141802CE0979C8246463C40E6B6BDAA2513FA61
  276. 1728716C2E4FD53BC95B89E69949D96512E873B9C8F8DFD499CC312882561ADE
  277. CB31F658E934C0C197F2C4D96B05CBAD67381E7B768891E4DA3843D24D94CDFB
  278. 5126E9B8BF21E8358EE0E0A30EF13FD6A664C0DCE3731F7FB49A4845A4FD8254
  279. 687972A2D382599C9BAC4E0ED7998193078913032558134976410B89D2C171D1
  280. 23AC35FD977219597AA7D15C1A9A428E59194F75C721EBCBCFAE44696A499AFA
  281. 74E04299F132026601638CB87AB79190D4A0986315DA8EEC6561C938996BEADF"""
  282. keys['DSA2048'] = key
  283. # This is a sequence of items:
  284. # message, k, r, s, hash module
  285. signatures = [
  286. (
  287. "sample",
  288. "7BDB6B0FF756E1BB5D53583EF979082F9AD5BD5B",
  289. "2E1A0C2562B2912CAAF89186FB0F42001585DA55",
  290. "29EFB6B0AFF2D7A68EB70CA313022253B9A88DF5",
  291. SHA1,
  292. 'DSA1024'
  293. ),
  294. (
  295. "sample",
  296. "562097C06782D60C3037BA7BE104774344687649",
  297. "4BC3B686AEA70145856814A6F1BB53346F02101E",
  298. "410697B92295D994D21EDD2F4ADA85566F6F94C1",
  299. SHA224,
  300. 'DSA1024'
  301. ),
  302. (
  303. "sample",
  304. "519BA0546D0C39202A7D34D7DFA5E760B318BCFB",
  305. "81F2F5850BE5BC123C43F71A3033E9384611C545",
  306. "4CDD914B65EB6C66A8AAAD27299BEE6B035F5E89",
  307. SHA256,
  308. 'DSA1024'
  309. ),
  310. (
  311. "sample",
  312. "95897CD7BBB944AA932DBC579C1C09EB6FCFC595",
  313. "07F2108557EE0E3921BC1774F1CA9B410B4CE65A",
  314. "54DF70456C86FAC10FAB47C1949AB83F2C6F7595",
  315. SHA384,
  316. 'DSA1024'
  317. ),
  318. (
  319. "sample",
  320. "09ECE7CA27D0F5A4DD4E556C9DF1D21D28104F8B",
  321. "16C3491F9B8C3FBBDD5E7A7B667057F0D8EE8E1B",
  322. "02C36A127A7B89EDBB72E4FFBC71DABC7D4FC69C",
  323. SHA512,
  324. 'DSA1024'
  325. ),
  326. (
  327. "test",
  328. "5C842DF4F9E344EE09F056838B42C7A17F4A6433",
  329. "42AB2052FD43E123F0607F115052A67DCD9C5C77",
  330. "183916B0230D45B9931491D4C6B0BD2FB4AAF088",
  331. SHA1,
  332. 'DSA1024'
  333. ),
  334. (
  335. "test",
  336. "4598B8EFC1A53BC8AECD58D1ABBB0C0C71E67297",
  337. "6868E9964E36C1689F6037F91F28D5F2C30610F2",
  338. "49CEC3ACDC83018C5BD2674ECAAD35B8CD22940F",
  339. SHA224,
  340. 'DSA1024'
  341. ),
  342. (
  343. "test",
  344. "5A67592E8128E03A417B0484410FB72C0B630E1A",
  345. "22518C127299B0F6FDC9872B282B9E70D0790812",
  346. "6837EC18F150D55DE95B5E29BE7AF5D01E4FE160",
  347. SHA256,
  348. 'DSA1024'
  349. ),
  350. (
  351. "test",
  352. "220156B761F6CA5E6C9F1B9CF9C24BE25F98CD89",
  353. "854CF929B58D73C3CBFDC421E8D5430CD6DB5E66",
  354. "91D0E0F53E22F898D158380676A871A157CDA622",
  355. SHA384,
  356. 'DSA1024'
  357. ),
  358. (
  359. "test",
  360. "65D2C2EEB175E370F28C75BFCDC028D22C7DBE9C",
  361. "8EA47E475BA8AC6F2D821DA3BD212D11A3DEB9A0",
  362. "7C670C7AD72B6C050C109E1790008097125433E8",
  363. SHA512,
  364. 'DSA1024'
  365. ),
  366. (
  367. "sample",
  368. "888FA6F7738A41BDC9846466ABDB8174C0338250AE50CE955CA16230F9CBD53E",
  369. "3A1B2DBD7489D6ED7E608FD036C83AF396E290DBD602408E8677DAABD6E7445A",
  370. "D26FCBA19FA3E3058FFC02CA1596CDBB6E0D20CB37B06054F7E36DED0CDBBCCF",
  371. SHA1,
  372. 'DSA2048'
  373. ),
  374. (
  375. "sample",
  376. "BC372967702082E1AA4FCE892209F71AE4AD25A6DFD869334E6F153BD0C4D806",
  377. "DC9F4DEADA8D8FF588E98FED0AB690FFCE858DC8C79376450EB6B76C24537E2C",
  378. "A65A9C3BC7BABE286B195D5DA68616DA8D47FA0097F36DD19F517327DC848CEC",
  379. SHA224,
  380. 'DSA2048'
  381. ),
  382. (
  383. "sample",
  384. "8926A27C40484216F052F4427CFD5647338B7B3939BC6573AF4333569D597C52",
  385. "EACE8BDBBE353C432A795D9EC556C6D021F7A03F42C36E9BC87E4AC7932CC809",
  386. "7081E175455F9247B812B74583E9E94F9EA79BD640DC962533B0680793A38D53",
  387. SHA256,
  388. 'DSA2048'
  389. ),
  390. (
  391. "sample",
  392. "C345D5AB3DA0A5BCB7EC8F8FB7A7E96069E03B206371EF7D83E39068EC564920",
  393. "B2DA945E91858834FD9BF616EBAC151EDBC4B45D27D0DD4A7F6A22739F45C00B",
  394. "19048B63D9FD6BCA1D9BAE3664E1BCB97F7276C306130969F63F38FA8319021B",
  395. SHA384,
  396. 'DSA2048'
  397. ),
  398. (
  399. "sample",
  400. "5A12994431785485B3F5F067221517791B85A597B7A9436995C89ED0374668FC",
  401. "2016ED092DC5FB669B8EFB3D1F31A91EECB199879BE0CF78F02BA062CB4C942E",
  402. "D0C76F84B5F091E141572A639A4FB8C230807EEA7D55C8A154A224400AFF2351",
  403. SHA512,
  404. 'DSA2048'
  405. ),
  406. (
  407. "test",
  408. "6EEA486F9D41A037B2C640BC5645694FF8FF4B98D066A25F76BE641CCB24BA4F",
  409. "C18270A93CFC6063F57A4DFA86024F700D980E4CF4E2CB65A504397273D98EA0",
  410. "414F22E5F31A8B6D33295C7539C1C1BA3A6160D7D68D50AC0D3A5BEAC2884FAA",
  411. SHA1,
  412. 'DSA2048'
  413. ),
  414. (
  415. "test",
  416. "06BD4C05ED74719106223BE33F2D95DA6B3B541DAD7BFBD7AC508213B6DA6670",
  417. "272ABA31572F6CC55E30BF616B7A265312018DD325BE031BE0CC82AA17870EA3",
  418. "E9CC286A52CCE201586722D36D1E917EB96A4EBDB47932F9576AC645B3A60806",
  419. SHA224,
  420. 'DSA2048'
  421. ),
  422. (
  423. "test",
  424. "1D6CE6DDA1C5D37307839CD03AB0A5CBB18E60D800937D67DFB4479AAC8DEAD7",
  425. "8190012A1969F9957D56FCCAAD223186F423398D58EF5B3CEFD5A4146A4476F0",
  426. "7452A53F7075D417B4B013B278D1BB8BBD21863F5E7B1CEE679CF2188E1AB19E",
  427. SHA256,
  428. 'DSA2048'
  429. ),
  430. (
  431. "test",
  432. "206E61F73DBE1B2DC8BE736B22B079E9DACD974DB00EEBBC5B64CAD39CF9F91C",
  433. "239E66DDBE8F8C230A3D071D601B6FFBDFB5901F94D444C6AF56F732BEB954BE",
  434. "6BD737513D5E72FE85D1C750E0F73921FE299B945AAD1C802F15C26A43D34961",
  435. SHA384,
  436. 'DSA2048'
  437. ),
  438. (
  439. "test",
  440. "AFF1651E4CD6036D57AA8B2A05CCF1A9D5A40166340ECBBDC55BE10B568AA0AA",
  441. "89EC4BB1400ECCFF8E7D9AA515CD1DE7803F2DAFF09693EE7FD1353E90A68307",
  442. "C9F0BDABCC0D880BB137A994CC7F3980CE91CC10FAF529FC46565B15CEA854E1",
  443. SHA512,
  444. 'DSA2048'
  445. )
  446. ]
  447. def setUp(self):
  448. # Convert DSA key components from hex strings to integers
  449. new_keys = {}
  450. for tag, test_key in self.keys.items():
  451. new_test_key = TestKey()
  452. new_test_key.p = t2l(test_key.p)
  453. new_test_key.q = t2l(test_key.q)
  454. new_test_key.g = t2l(test_key.g)
  455. new_test_key.x = t2l(test_key.x)
  456. new_test_key.y = t2l(test_key.y)
  457. new_keys[tag] = new_test_key
  458. self.keys = new_keys
  459. # Convert signature encoding
  460. new_signatures = []
  461. for tv in self.signatures:
  462. new_tv = TestVector()
  463. new_tv.message = b(tv[0]) # message
  464. new_tv.nonce = t2l(tv[1])
  465. new_tv.result = t2b(tv[2]) + t2b(tv[3])
  466. new_tv.module = tv[4]
  467. new_tv.test_key = self.keys[tv[5]]
  468. new_signatures.append(new_tv)
  469. self.signatures = new_signatures
  470. def test1(self):
  471. q = 0x4000000000000000000020108A2E0CC0D99F8A5EFL
  472. x = 0x09A4D6792295A7F730FC3F2B49CBC0F62E862272FL
  473. p = 2 * q + 1
  474. y = pow(2, x, p)
  475. key = DSA.construct([pow(y, 2, p), 2L, p, q, x], False)
  476. signer = DSS.new(key, 'deterministic-rfc6979')
  477. # Test _int2octets
  478. self.assertEqual(hexlify(signer._int2octets(x)),
  479. b("009a4d6792295a7f730fc3f2b49cbc0f"
  480. "62e862272f"))
  481. # Test _bits2octets
  482. h1 = SHA256.new(b("sample")).digest()
  483. self.assertEqual(hexlify(signer._bits2octets(h1)),
  484. b("01795edf0d54db760f156d0dac04c032"
  485. "2b3a204224"))
  486. def test2(self):
  487. for sig in self.signatures:
  488. tk = sig.test_key
  489. key = DSA.construct([tk.y, tk.g, tk.p, tk.q, tk.x], False)
  490. signer = DSS.new(key, 'deterministic-rfc6979')
  491. hash_obj = sig.module.new(sig.message)
  492. result = signer.sign(hash_obj)
  493. self.assertEqual(sig.result, result)
  494. class Det_ECDSA_Tests(unittest.TestCase):
  495. key_priv = ECC.construct(curve="P-256", d=0xC9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721)
  496. key_pub = key_priv.public_key()
  497. # This is a sequence of items:
  498. # message, k, r, s, hash module
  499. # taken from RFC6979
  500. signatures_ = (
  501. (
  502. "sample",
  503. "882905F1227FD620FBF2ABF21244F0BA83D0DC3A9103DBBEE43A1FB858109DB4",
  504. "61340C88C3AAEBEB4F6D667F672CA9759A6CCAA9FA8811313039EE4A35471D32",
  505. "6D7F147DAC089441BB2E2FE8F7A3FA264B9C475098FDCF6E00D7C996E1B8B7EB",
  506. SHA1
  507. ),
  508. (
  509. "sample",
  510. "103F90EE9DC52E5E7FB5132B7033C63066D194321491862059967C715985D473",
  511. "53B2FFF5D1752B2C689DF257C04C40A587FABABB3F6FC2702F1343AF7CA9AA3F",
  512. "B9AFB64FDC03DC1A131C7D2386D11E349F070AA432A4ACC918BEA988BF75C74C",
  513. SHA224
  514. ),
  515. (
  516. "sample",
  517. "A6E3C57DD01ABE90086538398355DD4C3B17AA873382B0F24D6129493D8AAD60",
  518. "EFD48B2AACB6A8FD1140DD9CD45E81D69D2C877B56AAF991C34D0EA84EAF3716",
  519. "F7CB1C942D657C41D436C7A1B6E29F65F3E900DBB9AFF4064DC4AB2F843ACDA8",
  520. SHA256
  521. ),
  522. (
  523. "sample",
  524. "09F634B188CEFD98E7EC88B1AA9852D734D0BC272F7D2A47DECC6EBEB375AAD4",
  525. "0EAFEA039B20E9B42309FB1D89E213057CBF973DC0CFC8F129EDDDC800EF7719",
  526. "4861F0491E6998B9455193E34E7B0D284DDD7149A74B95B9261F13ABDE940954",
  527. SHA384
  528. ),
  529. (
  530. "sample",
  531. "5FA81C63109BADB88C1F367B47DA606DA28CAD69AA22C4FE6AD7DF73A7173AA5",
  532. "8496A60B5E9B47C825488827E0495B0E3FA109EC4568FD3F8D1097678EB97F00",
  533. "2362AB1ADBE2B8ADF9CB9EDAB740EA6049C028114F2460F96554F61FAE3302FE",
  534. SHA512
  535. ),
  536. (
  537. "test",
  538. "8C9520267C55D6B980DF741E56B4ADEE114D84FBFA2E62137954164028632A2E",
  539. "0CBCC86FD6ABD1D99E703E1EC50069EE5C0B4BA4B9AC60E409E8EC5910D81A89",
  540. "01B9D7B73DFAA60D5651EC4591A0136F87653E0FD780C3B1BC872FFDEAE479B1",
  541. SHA1
  542. ),
  543. (
  544. "test",
  545. "669F4426F2688B8BE0DB3A6BD1989BDAEFFF84B649EEB84F3DD26080F667FAA7",
  546. "C37EDB6F0AE79D47C3C27E962FA269BB4F441770357E114EE511F662EC34A692",
  547. "C820053A05791E521FCAAD6042D40AEA1D6B1A540138558F47D0719800E18F2D",
  548. SHA224
  549. ),
  550. (
  551. "test",
  552. "D16B6AE827F17175E040871A1C7EC3500192C4C92677336EC2537ACAEE0008E0",
  553. "F1ABB023518351CD71D881567B1EA663ED3EFCF6C5132B354F28D3B0B7D38367",
  554. "019F4113742A2B14BD25926B49C649155F267E60D3814B4C0CC84250E46F0083",
  555. SHA256
  556. ),
  557. (
  558. "test",
  559. "16AEFFA357260B04B1DD199693960740066C1A8F3E8EDD79070AA914D361B3B8",
  560. "83910E8B48BB0C74244EBDF7F07A1C5413D61472BD941EF3920E623FBCCEBEB6",
  561. "8DDBEC54CF8CD5874883841D712142A56A8D0F218F5003CB0296B6B509619F2C",
  562. SHA384
  563. ),
  564. (
  565. "test",
  566. "6915D11632ACA3C40D5D51C08DAF9C555933819548784480E93499000D9F0B7F",
  567. "461D93F31B6540894788FD206C07CFA0CC35F46FA3C91816FFF1040AD1581A04",
  568. "39AF9F15DE0DB8D97E72719C74820D304CE5226E32DEDAE67519E840D1194E55",
  569. SHA512
  570. )
  571. )
  572. signatures = []
  573. for a, b, c, d, e in signatures_:
  574. new_tv = (tobytes(a), unhexlify(b), unhexlify(c), unhexlify(d), e)
  575. signatures.append(new_tv)
  576. def shortDescription(self):
  577. return "Deterministic ECDSA Tests"
  578. def test_loopback(self):
  579. hashed_msg = SHA512.new(b("test"))
  580. signer = DSS.new(self.key_priv, 'deterministic-rfc6979')
  581. signature = signer.sign(hashed_msg)
  582. verifier = DSS.new(self.key_pub, 'deterministic-rfc6979')
  583. verifier.verify(hashed_msg, signature)
  584. def test_data_rfc6979(self):
  585. signer = DSS.new(self.key_priv, 'deterministic-rfc6979')
  586. for message, k, r, s, module in self.signatures:
  587. hash_obj = module.new(message)
  588. result = signer.sign(hash_obj)
  589. self.assertEqual(r + s, result)
  590. def get_tests(config={}):
  591. tests = []
  592. tests += list_test_cases(FIPS_DSA_Tests)
  593. tests += list_test_cases(FIPS_ECDSA_Tests)
  594. tests += list_test_cases(Det_DSA_Tests)
  595. tests += list_test_cases(Det_ECDSA_Tests)
  596. return tests
  597. if __name__ == '__main__':
  598. suite = lambda: unittest.TestSuite(get_tests())
  599. unittest.main(defaultTest='suite')