test_dss.py 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901
  1. #
  2. # SelfTest/Signature/test_dss.py: Self-test for DSS signatures
  3. #
  4. # ===================================================================
  5. #
  6. # Copyright (c) 2014, Legrandin <helderijs@gmail.com>
  7. # All rights reserved.
  8. #
  9. # Redistribution and use in source and binary forms, with or without
  10. # modification, are permitted provided that the following conditions
  11. # are met:
  12. #
  13. # 1. Redistributions of source code must retain the above copyright
  14. # notice, this list of conditions and the following disclaimer.
  15. # 2. Redistributions in binary form must reproduce the above copyright
  16. # notice, this list of conditions and the following disclaimer in
  17. # the documentation and/or other materials provided with the
  18. # distribution.
  19. #
  20. # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  21. # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  22. # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
  23. # FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
  24. # COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
  25. # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
  26. # BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  27. # LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  28. # CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  29. # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
  30. # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
  31. # POSSIBILITY OF SUCH DAMAGE.
  32. # ===================================================================
  33. import re
  34. import json
  35. import unittest
  36. from binascii import hexlify, unhexlify
  37. from Cryptodome.Util.py3compat import tobytes, bord, bchr
  38. from Cryptodome.Hash import SHA1, SHA224, SHA256, SHA384, SHA512
  39. from Cryptodome.Signature import DSS
  40. from Cryptodome.PublicKey import DSA, ECC
  41. from Cryptodome.SelfTest.st_common import list_test_cases
  42. from Cryptodome.SelfTest.loader import load_tests
  43. from Cryptodome.Util.number import bytes_to_long, long_to_bytes
  44. from Cryptodome.Util._file_system import pycryptodome_filename
  45. from Cryptodome.Util.strxor import strxor
  46. def t2b(hexstring):
  47. ws = hexstring.replace(" ", "").replace("\n", "")
  48. return unhexlify(tobytes(ws))
  49. def t2l(hexstring):
  50. ws = hexstring.replace(" ", "").replace("\n", "")
  51. return int(ws, 16)
  52. def load_hash_by_name(hash_name):
  53. return __import__("Cryptodome.Hash." + hash_name, globals(), locals(), ["new"])
  54. class StrRNG:
  55. def __init__(self, randomness):
  56. length = len(randomness)
  57. self._idx = 0
  58. # Fix required to get the right K (see how randint() works!)
  59. self._randomness = long_to_bytes(bytes_to_long(randomness) - 1, length)
  60. def __call__(self, n):
  61. out = self._randomness[self._idx:self._idx + n]
  62. self._idx += n
  63. return out
  64. class FIPS_DSA_Tests(unittest.TestCase):
  65. # 1st 1024 bit key from SigGen.txt
  66. P = 0xa8f9cd201e5e35d892f85f80e4db2599a5676a3b1d4f190330ed3256b26d0e80a0e49a8fffaaad2a24f472d2573241d4d6d6c7480c80b4c67bb4479c15ada7ea8424d2502fa01472e760241713dab025ae1b02e1703a1435f62ddf4ee4c1b664066eb22f2e3bf28bb70a2a76e4fd5ebe2d1229681b5b06439ac9c7e9d8bde283
  67. Q = 0xf85f0f83ac4df7ea0cdf8f469bfeeaea14156495
  68. G = 0x2b3152ff6c62f14622b8f48e59f8af46883b38e79b8c74deeae9df131f8b856e3ad6c8455dab87cc0da8ac973417ce4f7878557d6cdf40b35b4a0ca3eb310c6a95d68ce284ad4e25ea28591611ee08b8444bd64b25f3f7c572410ddfb39cc728b9c936f85f419129869929cdb909a6a3a99bbe089216368171bd0ba81de4fe33
  69. X = 0xc53eae6d45323164c7d07af5715703744a63fc3a
  70. Y = 0x313fd9ebca91574e1c2eebe1517c57e0c21b0209872140c5328761bbb2450b33f1b18b409ce9ab7c4cd8fda3391e8e34868357c199e16a6b2eba06d6749def791d79e95d3a4d09b24c392ad89dbf100995ae19c01062056bb14bce005e8731efde175f95b975089bdcdaea562b32786d96f5a31aedf75364008ad4fffebb970b
  71. key_pub = DSA.construct((Y, G, P, Q))
  72. key_priv = DSA.construct((Y, G, P, Q, X))
  73. def shortDescription(self):
  74. return "FIPS DSA Tests"
  75. def test_loopback(self):
  76. hashed_msg = SHA512.new(b"test")
  77. signer = DSS.new(self.key_priv, 'fips-186-3')
  78. signature = signer.sign(hashed_msg)
  79. verifier = DSS.new(self.key_pub, 'fips-186-3')
  80. verifier.verify(hashed_msg, signature)
  81. def test_negative_unapproved_hashes(self):
  82. """Verify that unapproved hashes are rejected"""
  83. from Cryptodome.Hash import RIPEMD160
  84. self.description = "Unapproved hash (RIPEMD160) test"
  85. hash_obj = RIPEMD160.new()
  86. signer = DSS.new(self.key_priv, 'fips-186-3')
  87. self.assertRaises(ValueError, signer.sign, hash_obj)
  88. self.assertRaises(ValueError, signer.verify, hash_obj, b"\x00" * 40)
  89. def test_negative_unknown_modes_encodings(self):
  90. """Verify that unknown modes/encodings are rejected"""
  91. self.description = "Unknown mode test"
  92. self.assertRaises(ValueError, DSS.new, self.key_priv, 'fips-186-0')
  93. self.description = "Unknown encoding test"
  94. self.assertRaises(ValueError, DSS.new, self.key_priv, 'fips-186-3', 'xml')
  95. def test_asn1_encoding(self):
  96. """Verify ASN.1 encoding"""
  97. self.description = "ASN.1 encoding test"
  98. hash_obj = SHA1.new()
  99. signer = DSS.new(self.key_priv, 'fips-186-3', 'der')
  100. signature = signer.sign(hash_obj)
  101. # Verify that output looks like a DER SEQUENCE
  102. self.assertEqual(bord(signature[0]), 48)
  103. signer.verify(hash_obj, signature)
  104. # Verify that ASN.1 parsing fails as expected
  105. signature = bchr(7) + signature[1:]
  106. self.assertRaises(ValueError, signer.verify, hash_obj, signature)
  107. def test_sign_verify(self):
  108. """Verify public/private method"""
  109. self.description = "can_sign() test"
  110. signer = DSS.new(self.key_priv, 'fips-186-3')
  111. self.failUnless(signer.can_sign())
  112. signer = DSS.new(self.key_pub, 'fips-186-3')
  113. self.failIf(signer.can_sign())
  114. class FIPS_DSA_Tests_KAT(unittest.TestCase):
  115. pass
  116. test_vectors_verify = load_tests(("Cryptodome", "SelfTest", "Signature", "test_vectors", "DSA"),
  117. "FIPS_186_3_SigVer.rsp",
  118. "Signature Verification 186-3",
  119. {'result' : lambda x: x})
  120. for idx, tv in enumerate(test_vectors_verify):
  121. if isinstance(tv, str):
  122. res = re.match(r"\[mod = L=([0-9]+), N=([0-9]+), ([a-zA-Z0-9-]+)\]", tv)
  123. assert(res)
  124. hash_name = res.group(3).replace("-", "")
  125. hash_module = load_hash_by_name(hash_name)
  126. continue
  127. if hasattr(tv, "p"):
  128. modulus = tv.p
  129. generator = tv.g
  130. suborder = tv.q
  131. continue
  132. hash_obj = hash_module.new(tv.msg)
  133. comps = [bytes_to_long(x) for x in (tv.y, generator, modulus, suborder)]
  134. key = DSA.construct(comps, False) # type: ignore
  135. verifier = DSS.new(key, 'fips-186-3')
  136. def positive_test(self, verifier=verifier, hash_obj=hash_obj, signature=tv.r+tv.s):
  137. verifier.verify(hash_obj, signature)
  138. def negative_test(self, verifier=verifier, hash_obj=hash_obj, signature=tv.r+tv.s):
  139. self.assertRaises(ValueError, verifier.verify, hash_obj, signature)
  140. if tv.result == 'p':
  141. setattr(FIPS_DSA_Tests_KAT, "test_verify_positive_%d" % idx, positive_test)
  142. else:
  143. setattr(FIPS_DSA_Tests_KAT, "test_verify_negative_%d" % idx, negative_test)
  144. test_vectors_sign = load_tests(("Cryptodome", "SelfTest", "Signature", "test_vectors", "DSA"),
  145. "FIPS_186_3_SigGen.txt",
  146. "Signature Creation 186-3",
  147. {})
  148. for idx, tv in enumerate(test_vectors_sign):
  149. if isinstance(tv, str):
  150. res = re.match(r"\[mod = L=([0-9]+), N=([0-9]+), ([a-zA-Z0-9-]+)\]", tv)
  151. assert(res)
  152. hash_name = res.group(3).replace("-", "")
  153. hash_module = load_hash_by_name(hash_name)
  154. continue
  155. if hasattr(tv, "p"):
  156. modulus = tv.p
  157. generator = tv.g
  158. suborder = tv.q
  159. continue
  160. hash_obj = hash_module.new(tv.msg)
  161. comps_dsa = [bytes_to_long(x) for x in (tv.y, generator, modulus, suborder, tv.x)]
  162. key = DSA.construct(comps_dsa, False) # type: ignore
  163. signer = DSS.new(key, 'fips-186-3', randfunc=StrRNG(tv.k))
  164. def new_test(self, signer=signer, hash_obj=hash_obj, signature=tv.r+tv.s):
  165. self.assertEqual(signer.sign(hash_obj), signature)
  166. setattr(FIPS_DSA_Tests_KAT, "test_sign_%d" % idx, new_test)
  167. class FIPS_ECDSA_Tests(unittest.TestCase):
  168. key_priv = ECC.generate(curve="P-256")
  169. key_pub = key_priv.public_key()
  170. def shortDescription(self):
  171. return "FIPS ECDSA Tests"
  172. def test_loopback(self):
  173. hashed_msg = SHA512.new(b"test")
  174. signer = DSS.new(self.key_priv, 'fips-186-3')
  175. signature = signer.sign(hashed_msg)
  176. verifier = DSS.new(self.key_pub, 'fips-186-3')
  177. verifier.verify(hashed_msg, signature)
  178. def test_negative_unapproved_hashes(self):
  179. """Verify that unapproved hashes are rejected"""
  180. from Cryptodome.Hash import SHA1
  181. self.description = "Unapproved hash (SHA-1) test"
  182. hash_obj = SHA1.new()
  183. signer = DSS.new(self.key_priv, 'fips-186-3')
  184. self.assertRaises(ValueError, signer.sign, hash_obj)
  185. self.assertRaises(ValueError, signer.verify, hash_obj, b"\x00" * 40)
  186. def test_sign_verify(self):
  187. """Verify public/private method"""
  188. self.description = "can_sign() test"
  189. signer = DSS.new(self.key_priv, 'fips-186-3')
  190. self.failUnless(signer.can_sign())
  191. signer = DSS.new(self.key_pub, 'fips-186-3')
  192. self.failIf(signer.can_sign())
  193. def test_negative_unknown_modes_encodings(self):
  194. """Verify that unknown modes/encodings are rejected"""
  195. self.description = "Unknown mode test"
  196. self.assertRaises(ValueError, DSS.new, self.key_priv, 'fips-186-0')
  197. self.description = "Unknown encoding test"
  198. self.assertRaises(ValueError, DSS.new, self.key_priv, 'fips-186-3', 'xml')
  199. def test_asn1_encoding(self):
  200. """Verify ASN.1 encoding"""
  201. self.description = "ASN.1 encoding test"
  202. hash_obj = SHA256.new()
  203. signer = DSS.new(self.key_priv, 'fips-186-3', 'der')
  204. signature = signer.sign(hash_obj)
  205. # Verify that output looks like a DER SEQUENCE
  206. self.assertEqual(bord(signature[0]), 48)
  207. signer.verify(hash_obj, signature)
  208. # Verify that ASN.1 parsing fails as expected
  209. signature = bchr(7) + signature[1:]
  210. self.assertRaises(ValueError, signer.verify, hash_obj, signature)
  211. class FIPS_ECDSA_Tests_KAT(unittest.TestCase):
  212. pass
  213. test_vectors_verify = load_tests(("Cryptodome", "SelfTest", "Signature", "test_vectors", "ECDSA"),
  214. "SigVer.rsp",
  215. "ECDSA Signature Verification 186-3",
  216. {'result': lambda x: x,
  217. 'qx': lambda x: int(x, 16),
  218. 'qy': lambda x: int(x, 16),
  219. })
  220. for idx, tv in enumerate(test_vectors_verify):
  221. if isinstance(tv, str):
  222. res = re.match(r"\[P-256,(SHA-[0-9]+)\]", tv)
  223. assert res
  224. hash_name = res.group(1).replace("-", "")
  225. hash_module = load_hash_by_name(hash_name)
  226. continue
  227. hash_obj = hash_module.new(tv.msg)
  228. ecc_key = ECC.construct(curve="P-256", point_x=tv.qx, point_y=tv.qy)
  229. verifier = DSS.new(ecc_key, 'fips-186-3')
  230. def positive_test(self, verifier=verifier, hash_obj=hash_obj, signature=tv.r+tv.s):
  231. verifier.verify(hash_obj, signature)
  232. def negative_test(self, verifier=verifier, hash_obj=hash_obj, signature=tv.r+tv.s):
  233. self.assertRaises(ValueError, verifier.verify, hash_obj, signature)
  234. if tv.result.startswith('p'):
  235. setattr(FIPS_ECDSA_Tests_KAT, "test_verify_positive_%d" % idx, positive_test)
  236. else:
  237. setattr(FIPS_ECDSA_Tests_KAT, "test_verify_negative_%d" % idx, negative_test)
  238. test_vectors_sign = load_tests(("Cryptodome", "SelfTest", "Signature", "test_vectors", "ECDSA"),
  239. "SigGen.txt",
  240. "ECDSA Signature Verification 186-3",
  241. {'d': lambda x: int(x, 16)})
  242. for idx, tv in enumerate(test_vectors_sign):
  243. if isinstance(tv, str):
  244. res = re.match(r"\[P-256,(SHA-[0-9]+)\]", tv)
  245. assert res
  246. hash_name = res.group(1).replace("-", "")
  247. hash_module = load_hash_by_name(hash_name)
  248. continue
  249. hash_obj = hash_module.new(tv.msg)
  250. ecc_key = ECC.construct(curve="P-256", d=tv.d)
  251. signer = DSS.new(ecc_key, 'fips-186-3', randfunc=StrRNG(tv.k))
  252. def new_test(self, signer=signer, hash_obj=hash_obj, signature=tv.r+tv.s):
  253. self.assertEqual(signer.sign(hash_obj), signature)
  254. setattr(FIPS_ECDSA_Tests_KAT, "test_sign_%d" % idx, new_test)
  255. class Det_DSA_Tests(unittest.TestCase):
  256. """Tests from rfc6979"""
  257. # Each key is (p, q, g, x, y, desc)
  258. keys = [
  259. (
  260. """
  261. 86F5CA03DCFEB225063FF830A0C769B9DD9D6153AD91D7CE27F787C43278B447
  262. E6533B86B18BED6E8A48B784A14C252C5BE0DBF60B86D6385BD2F12FB763ED88
  263. 73ABFD3F5BA2E0A8C0A59082EAC056935E529DAF7C610467899C77ADEDFC846C
  264. 881870B7B19B2B58F9BE0521A17002E3BDD6B86685EE90B3D9A1B02B782B1779""",
  265. "996F967F6C8E388D9E28D01E205FBA957A5698B1",
  266. """
  267. 07B0F92546150B62514BB771E2A0C0CE387F03BDA6C56B505209FF25FD3C133D
  268. 89BBCD97E904E09114D9A7DEFDEADFC9078EA544D2E401AEECC40BB9FBBF78FD
  269. 87995A10A1C27CB7789B594BA7EFB5C4326A9FE59A070E136DB77175464ADCA4
  270. 17BE5DCE2F40D10A46A3A3943F26AB7FD9C0398FF8C76EE0A56826A8A88F1DBD""",
  271. "411602CB19A6CCC34494D79D98EF1E7ED5AF25F7",
  272. """
  273. 5DF5E01DED31D0297E274E1691C192FE5868FEF9E19A84776454B100CF16F653
  274. 92195A38B90523E2542EE61871C0440CB87C322FC4B4D2EC5E1E7EC766E1BE8D
  275. 4CE935437DC11C3C8FD426338933EBFE739CB3465F4D3668C5E473508253B1E6
  276. 82F65CBDC4FAE93C2EA212390E54905A86E2223170B44EAA7DA5DD9FFCFB7F3B""",
  277. "DSA1024"
  278. ),
  279. (
  280. """
  281. 9DB6FB5951B66BB6FE1E140F1D2CE5502374161FD6538DF1648218642F0B5C48
  282. C8F7A41AADFA187324B87674FA1822B00F1ECF8136943D7C55757264E5A1A44F
  283. FE012E9936E00C1D3E9310B01C7D179805D3058B2A9F4BB6F9716BFE6117C6B5
  284. B3CC4D9BE341104AD4A80AD6C94E005F4B993E14F091EB51743BF33050C38DE2
  285. 35567E1B34C3D6A5C0CEAA1A0F368213C3D19843D0B4B09DCB9FC72D39C8DE41
  286. F1BF14D4BB4563CA28371621CAD3324B6A2D392145BEBFAC748805236F5CA2FE
  287. 92B871CD8F9C36D3292B5509CA8CAA77A2ADFC7BFD77DDA6F71125A7456FEA15
  288. 3E433256A2261C6A06ED3693797E7995FAD5AABBCFBE3EDA2741E375404AE25B""",
  289. "F2C3119374CE76C9356990B465374A17F23F9ED35089BD969F61C6DDE9998C1F",
  290. """
  291. 5C7FF6B06F8F143FE8288433493E4769C4D988ACE5BE25A0E24809670716C613
  292. D7B0CEE6932F8FAA7C44D2CB24523DA53FBE4F6EC3595892D1AA58C4328A06C4
  293. 6A15662E7EAA703A1DECF8BBB2D05DBE2EB956C142A338661D10461C0D135472
  294. 085057F3494309FFA73C611F78B32ADBB5740C361C9F35BE90997DB2014E2EF5
  295. AA61782F52ABEB8BD6432C4DD097BC5423B285DAFB60DC364E8161F4A2A35ACA
  296. 3A10B1C4D203CC76A470A33AFDCBDD92959859ABD8B56E1725252D78EAC66E71
  297. BA9AE3F1DD2487199874393CD4D832186800654760E1E34C09E4D155179F9EC0
  298. DC4473F996BDCE6EED1CABED8B6F116F7AD9CF505DF0F998E34AB27514B0FFE7""",
  299. "69C7548C21D0DFEA6B9A51C9EAD4E27C33D3B3F180316E5BCAB92C933F0E4DBC",
  300. """
  301. 667098C654426C78D7F8201EAC6C203EF030D43605032C2F1FA937E5237DBD94
  302. 9F34A0A2564FE126DC8B715C5141802CE0979C8246463C40E6B6BDAA2513FA61
  303. 1728716C2E4FD53BC95B89E69949D96512E873B9C8F8DFD499CC312882561ADE
  304. CB31F658E934C0C197F2C4D96B05CBAD67381E7B768891E4DA3843D24D94CDFB
  305. 5126E9B8BF21E8358EE0E0A30EF13FD6A664C0DCE3731F7FB49A4845A4FD8254
  306. 687972A2D382599C9BAC4E0ED7998193078913032558134976410B89D2C171D1
  307. 23AC35FD977219597AA7D15C1A9A428E59194F75C721EBCBCFAE44696A499AFA
  308. 74E04299F132026601638CB87AB79190D4A0986315DA8EEC6561C938996BEADF""",
  309. "DSA2048"
  310. ),
  311. ]
  312. # This is a sequence of items:
  313. # message, k, r, s, hash module
  314. signatures = [
  315. (
  316. "sample",
  317. "7BDB6B0FF756E1BB5D53583EF979082F9AD5BD5B",
  318. "2E1A0C2562B2912CAAF89186FB0F42001585DA55",
  319. "29EFB6B0AFF2D7A68EB70CA313022253B9A88DF5",
  320. SHA1,
  321. 'DSA1024'
  322. ),
  323. (
  324. "sample",
  325. "562097C06782D60C3037BA7BE104774344687649",
  326. "4BC3B686AEA70145856814A6F1BB53346F02101E",
  327. "410697B92295D994D21EDD2F4ADA85566F6F94C1",
  328. SHA224,
  329. 'DSA1024'
  330. ),
  331. (
  332. "sample",
  333. "519BA0546D0C39202A7D34D7DFA5E760B318BCFB",
  334. "81F2F5850BE5BC123C43F71A3033E9384611C545",
  335. "4CDD914B65EB6C66A8AAAD27299BEE6B035F5E89",
  336. SHA256,
  337. 'DSA1024'
  338. ),
  339. (
  340. "sample",
  341. "95897CD7BBB944AA932DBC579C1C09EB6FCFC595",
  342. "07F2108557EE0E3921BC1774F1CA9B410B4CE65A",
  343. "54DF70456C86FAC10FAB47C1949AB83F2C6F7595",
  344. SHA384,
  345. 'DSA1024'
  346. ),
  347. (
  348. "sample",
  349. "09ECE7CA27D0F5A4DD4E556C9DF1D21D28104F8B",
  350. "16C3491F9B8C3FBBDD5E7A7B667057F0D8EE8E1B",
  351. "02C36A127A7B89EDBB72E4FFBC71DABC7D4FC69C",
  352. SHA512,
  353. 'DSA1024'
  354. ),
  355. (
  356. "test",
  357. "5C842DF4F9E344EE09F056838B42C7A17F4A6433",
  358. "42AB2052FD43E123F0607F115052A67DCD9C5C77",
  359. "183916B0230D45B9931491D4C6B0BD2FB4AAF088",
  360. SHA1,
  361. 'DSA1024'
  362. ),
  363. (
  364. "test",
  365. "4598B8EFC1A53BC8AECD58D1ABBB0C0C71E67297",
  366. "6868E9964E36C1689F6037F91F28D5F2C30610F2",
  367. "49CEC3ACDC83018C5BD2674ECAAD35B8CD22940F",
  368. SHA224,
  369. 'DSA1024'
  370. ),
  371. (
  372. "test",
  373. "5A67592E8128E03A417B0484410FB72C0B630E1A",
  374. "22518C127299B0F6FDC9872B282B9E70D0790812",
  375. "6837EC18F150D55DE95B5E29BE7AF5D01E4FE160",
  376. SHA256,
  377. 'DSA1024'
  378. ),
  379. (
  380. "test",
  381. "220156B761F6CA5E6C9F1B9CF9C24BE25F98CD89",
  382. "854CF929B58D73C3CBFDC421E8D5430CD6DB5E66",
  383. "91D0E0F53E22F898D158380676A871A157CDA622",
  384. SHA384,
  385. 'DSA1024'
  386. ),
  387. (
  388. "test",
  389. "65D2C2EEB175E370F28C75BFCDC028D22C7DBE9C",
  390. "8EA47E475BA8AC6F2D821DA3BD212D11A3DEB9A0",
  391. "7C670C7AD72B6C050C109E1790008097125433E8",
  392. SHA512,
  393. 'DSA1024'
  394. ),
  395. (
  396. "sample",
  397. "888FA6F7738A41BDC9846466ABDB8174C0338250AE50CE955CA16230F9CBD53E",
  398. "3A1B2DBD7489D6ED7E608FD036C83AF396E290DBD602408E8677DAABD6E7445A",
  399. "D26FCBA19FA3E3058FFC02CA1596CDBB6E0D20CB37B06054F7E36DED0CDBBCCF",
  400. SHA1,
  401. 'DSA2048'
  402. ),
  403. (
  404. "sample",
  405. "BC372967702082E1AA4FCE892209F71AE4AD25A6DFD869334E6F153BD0C4D806",
  406. "DC9F4DEADA8D8FF588E98FED0AB690FFCE858DC8C79376450EB6B76C24537E2C",
  407. "A65A9C3BC7BABE286B195D5DA68616DA8D47FA0097F36DD19F517327DC848CEC",
  408. SHA224,
  409. 'DSA2048'
  410. ),
  411. (
  412. "sample",
  413. "8926A27C40484216F052F4427CFD5647338B7B3939BC6573AF4333569D597C52",
  414. "EACE8BDBBE353C432A795D9EC556C6D021F7A03F42C36E9BC87E4AC7932CC809",
  415. "7081E175455F9247B812B74583E9E94F9EA79BD640DC962533B0680793A38D53",
  416. SHA256,
  417. 'DSA2048'
  418. ),
  419. (
  420. "sample",
  421. "C345D5AB3DA0A5BCB7EC8F8FB7A7E96069E03B206371EF7D83E39068EC564920",
  422. "B2DA945E91858834FD9BF616EBAC151EDBC4B45D27D0DD4A7F6A22739F45C00B",
  423. "19048B63D9FD6BCA1D9BAE3664E1BCB97F7276C306130969F63F38FA8319021B",
  424. SHA384,
  425. 'DSA2048'
  426. ),
  427. (
  428. "sample",
  429. "5A12994431785485B3F5F067221517791B85A597B7A9436995C89ED0374668FC",
  430. "2016ED092DC5FB669B8EFB3D1F31A91EECB199879BE0CF78F02BA062CB4C942E",
  431. "D0C76F84B5F091E141572A639A4FB8C230807EEA7D55C8A154A224400AFF2351",
  432. SHA512,
  433. 'DSA2048'
  434. ),
  435. (
  436. "test",
  437. "6EEA486F9D41A037B2C640BC5645694FF8FF4B98D066A25F76BE641CCB24BA4F",
  438. "C18270A93CFC6063F57A4DFA86024F700D980E4CF4E2CB65A504397273D98EA0",
  439. "414F22E5F31A8B6D33295C7539C1C1BA3A6160D7D68D50AC0D3A5BEAC2884FAA",
  440. SHA1,
  441. 'DSA2048'
  442. ),
  443. (
  444. "test",
  445. "06BD4C05ED74719106223BE33F2D95DA6B3B541DAD7BFBD7AC508213B6DA6670",
  446. "272ABA31572F6CC55E30BF616B7A265312018DD325BE031BE0CC82AA17870EA3",
  447. "E9CC286A52CCE201586722D36D1E917EB96A4EBDB47932F9576AC645B3A60806",
  448. SHA224,
  449. 'DSA2048'
  450. ),
  451. (
  452. "test",
  453. "1D6CE6DDA1C5D37307839CD03AB0A5CBB18E60D800937D67DFB4479AAC8DEAD7",
  454. "8190012A1969F9957D56FCCAAD223186F423398D58EF5B3CEFD5A4146A4476F0",
  455. "7452A53F7075D417B4B013B278D1BB8BBD21863F5E7B1CEE679CF2188E1AB19E",
  456. SHA256,
  457. 'DSA2048'
  458. ),
  459. (
  460. "test",
  461. "206E61F73DBE1B2DC8BE736B22B079E9DACD974DB00EEBBC5B64CAD39CF9F91C",
  462. "239E66DDBE8F8C230A3D071D601B6FFBDFB5901F94D444C6AF56F732BEB954BE",
  463. "6BD737513D5E72FE85D1C750E0F73921FE299B945AAD1C802F15C26A43D34961",
  464. SHA384,
  465. 'DSA2048'
  466. ),
  467. (
  468. "test",
  469. "AFF1651E4CD6036D57AA8B2A05CCF1A9D5A40166340ECBBDC55BE10B568AA0AA",
  470. "89EC4BB1400ECCFF8E7D9AA515CD1DE7803F2DAFF09693EE7FD1353E90A68307",
  471. "C9F0BDABCC0D880BB137A994CC7F3980CE91CC10FAF529FC46565B15CEA854E1",
  472. SHA512,
  473. 'DSA2048'
  474. )
  475. ]
  476. def setUp(self):
  477. # Convert DSA key components from hex strings to integers
  478. # Each key is (p, q, g, x, y, desc)
  479. from collections import namedtuple
  480. TestKey = namedtuple('TestKey', 'p q g x y')
  481. new_keys = {}
  482. for k in self.keys:
  483. tk = TestKey(*[ t2l(y) for y in k[:-1] ])
  484. new_keys[k[-1]] = tk
  485. self.keys = new_keys
  486. # Convert signature encoding
  487. TestSig = namedtuple('TestSig', 'message nonce result module test_key')
  488. new_signatures = []
  489. for message, nonce, r, s, module, test_key in self.signatures:
  490. tsig = TestSig(
  491. tobytes(message),
  492. t2l(nonce),
  493. t2b(r) + t2b(s),
  494. module,
  495. self.keys[test_key]
  496. )
  497. new_signatures.append(tsig)
  498. self.signatures = new_signatures
  499. def test1(self):
  500. q = 0x4000000000000000000020108A2E0CC0D99F8A5EF
  501. x = 0x09A4D6792295A7F730FC3F2B49CBC0F62E862272F
  502. p = 2 * q + 1
  503. y = pow(2, x, p)
  504. key = DSA.construct([pow(y, 2, p), 2, p, q, x], False)
  505. signer = DSS.new(key, 'deterministic-rfc6979')
  506. # Test _int2octets
  507. self.assertEqual(hexlify(signer._int2octets(x)),
  508. b'009a4d6792295a7f730fc3f2b49cbc0f62e862272f')
  509. # Test _bits2octets
  510. h1 = SHA256.new(b"sample").digest()
  511. self.assertEqual(hexlify(signer._bits2octets(h1)),
  512. b'01795edf0d54db760f156d0dac04c0322b3a204224')
  513. def test2(self):
  514. for sig in self.signatures:
  515. tk = sig.test_key
  516. key = DSA.construct([tk.y, tk.g, tk.p, tk.q, tk.x], False)
  517. signer = DSS.new(key, 'deterministic-rfc6979')
  518. hash_obj = sig.module.new(sig.message)
  519. result = signer.sign(hash_obj)
  520. self.assertEqual(sig.result, result)
  521. class Det_ECDSA_Tests(unittest.TestCase):
  522. key_priv = ECC.construct(curve="P-256", d=0xC9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721)
  523. key_pub = key_priv.public_key()
  524. # This is a sequence of items:
  525. # message, k, r, s, hash module
  526. # taken from RFC6979
  527. signatures_ = (
  528. (
  529. "sample",
  530. "882905F1227FD620FBF2ABF21244F0BA83D0DC3A9103DBBEE43A1FB858109DB4",
  531. "61340C88C3AAEBEB4F6D667F672CA9759A6CCAA9FA8811313039EE4A35471D32",
  532. "6D7F147DAC089441BB2E2FE8F7A3FA264B9C475098FDCF6E00D7C996E1B8B7EB",
  533. SHA1
  534. ),
  535. (
  536. "sample",
  537. "103F90EE9DC52E5E7FB5132B7033C63066D194321491862059967C715985D473",
  538. "53B2FFF5D1752B2C689DF257C04C40A587FABABB3F6FC2702F1343AF7CA9AA3F",
  539. "B9AFB64FDC03DC1A131C7D2386D11E349F070AA432A4ACC918BEA988BF75C74C",
  540. SHA224
  541. ),
  542. (
  543. "sample",
  544. "A6E3C57DD01ABE90086538398355DD4C3B17AA873382B0F24D6129493D8AAD60",
  545. "EFD48B2AACB6A8FD1140DD9CD45E81D69D2C877B56AAF991C34D0EA84EAF3716",
  546. "F7CB1C942D657C41D436C7A1B6E29F65F3E900DBB9AFF4064DC4AB2F843ACDA8",
  547. SHA256
  548. ),
  549. (
  550. "sample",
  551. "09F634B188CEFD98E7EC88B1AA9852D734D0BC272F7D2A47DECC6EBEB375AAD4",
  552. "0EAFEA039B20E9B42309FB1D89E213057CBF973DC0CFC8F129EDDDC800EF7719",
  553. "4861F0491E6998B9455193E34E7B0D284DDD7149A74B95B9261F13ABDE940954",
  554. SHA384
  555. ),
  556. (
  557. "sample",
  558. "5FA81C63109BADB88C1F367B47DA606DA28CAD69AA22C4FE6AD7DF73A7173AA5",
  559. "8496A60B5E9B47C825488827E0495B0E3FA109EC4568FD3F8D1097678EB97F00",
  560. "2362AB1ADBE2B8ADF9CB9EDAB740EA6049C028114F2460F96554F61FAE3302FE",
  561. SHA512
  562. ),
  563. (
  564. "test",
  565. "8C9520267C55D6B980DF741E56B4ADEE114D84FBFA2E62137954164028632A2E",
  566. "0CBCC86FD6ABD1D99E703E1EC50069EE5C0B4BA4B9AC60E409E8EC5910D81A89",
  567. "01B9D7B73DFAA60D5651EC4591A0136F87653E0FD780C3B1BC872FFDEAE479B1",
  568. SHA1
  569. ),
  570. (
  571. "test",
  572. "669F4426F2688B8BE0DB3A6BD1989BDAEFFF84B649EEB84F3DD26080F667FAA7",
  573. "C37EDB6F0AE79D47C3C27E962FA269BB4F441770357E114EE511F662EC34A692",
  574. "C820053A05791E521FCAAD6042D40AEA1D6B1A540138558F47D0719800E18F2D",
  575. SHA224
  576. ),
  577. (
  578. "test",
  579. "D16B6AE827F17175E040871A1C7EC3500192C4C92677336EC2537ACAEE0008E0",
  580. "F1ABB023518351CD71D881567B1EA663ED3EFCF6C5132B354F28D3B0B7D38367",
  581. "019F4113742A2B14BD25926B49C649155F267E60D3814B4C0CC84250E46F0083",
  582. SHA256
  583. ),
  584. (
  585. "test",
  586. "16AEFFA357260B04B1DD199693960740066C1A8F3E8EDD79070AA914D361B3B8",
  587. "83910E8B48BB0C74244EBDF7F07A1C5413D61472BD941EF3920E623FBCCEBEB6",
  588. "8DDBEC54CF8CD5874883841D712142A56A8D0F218F5003CB0296B6B509619F2C",
  589. SHA384
  590. ),
  591. (
  592. "test",
  593. "6915D11632ACA3C40D5D51C08DAF9C555933819548784480E93499000D9F0B7F",
  594. "461D93F31B6540894788FD206C07CFA0CC35F46FA3C91816FFF1040AD1581A04",
  595. "39AF9F15DE0DB8D97E72719C74820D304CE5226E32DEDAE67519E840D1194E55",
  596. SHA512
  597. )
  598. )
  599. signatures = []
  600. for a, b, c, d, e in signatures_:
  601. new_tv = (tobytes(a), unhexlify(b), unhexlify(c), unhexlify(d), e)
  602. signatures.append(new_tv)
  603. def shortDescription(self):
  604. return "Deterministic ECDSA Tests"
  605. def test_loopback(self):
  606. hashed_msg = SHA512.new(b"test")
  607. signer = DSS.new(self.key_priv, 'deterministic-rfc6979')
  608. signature = signer.sign(hashed_msg)
  609. verifier = DSS.new(self.key_pub, 'deterministic-rfc6979')
  610. verifier.verify(hashed_msg, signature)
  611. def test_data_rfc6979(self):
  612. signer = DSS.new(self.key_priv, 'deterministic-rfc6979')
  613. for message, k, r, s, module in self.signatures:
  614. hash_obj = module.new(message)
  615. result = signer.sign(hash_obj)
  616. self.assertEqual(r + s, result)
  617. class TestVectorsDSAWycheproof(unittest.TestCase):
  618. def __init__(self, wycheproof_warnings):
  619. unittest.TestCase.__init__(self)
  620. self._wycheproof_warnings = wycheproof_warnings
  621. self._id = "None"
  622. def setUp(self):
  623. comps = "Cryptodome.SelfTest.Signature.test_vectors.wycheproof".split(".")
  624. with open(pycryptodome_filename(comps, "dsa_test.json"), "rt") as file_in:
  625. tv_tree = json.load(file_in)
  626. self.tv = []
  627. for group in tv_tree['testGroups']:
  628. key = DSA.import_key(group['keyPem'])
  629. hash_name = group['sha']
  630. if hash_name == "SHA-256":
  631. hash_module = SHA256
  632. elif hash_name == "SHA-224":
  633. hash_module = SHA224
  634. elif hash_name == "SHA-1":
  635. hash_module = SHA1
  636. else:
  637. assert False
  638. assert group['type'] == "DSAVer"
  639. from collections import namedtuple
  640. TestVector = namedtuple('TestVector', 'id comment msg sig key hash_module valid warning')
  641. for test in group['tests']:
  642. tv = TestVector(
  643. test['tcId'],
  644. test['comment'],
  645. unhexlify(test['msg']),
  646. unhexlify(test['sig']),
  647. key,
  648. hash_module,
  649. test['result'] != "invalid",
  650. test['result'] == "acceptable"
  651. )
  652. self.tv.append(tv)
  653. def shortDescription(self):
  654. return self._id
  655. def warn(self, tv):
  656. if tv.warning and self._wycheproof_warnings:
  657. import warnings
  658. warnings.warn("Wycheproof warning: %s (%s)" % (self._id, tv.comment))
  659. def test_verify(self, tv):
  660. self._id = "Wycheproof DSA Test #" + str(tv.id)
  661. hashed_msg = tv.hash_module.new(tv.msg)
  662. signer = DSS.new(tv.key, 'fips-186-3', encoding='der')
  663. try:
  664. signature = signer.verify(hashed_msg, tv.sig)
  665. except ValueError as e:
  666. if tv.warning:
  667. return
  668. assert not tv.valid
  669. else:
  670. assert tv.valid
  671. self.warn(tv)
  672. def runTest(self):
  673. for tv in self.tv:
  674. self.test_verify(tv)
  675. class TestVectorsECDSAWycheproof(unittest.TestCase):
  676. def __init__(self, wycheproof_warnings):
  677. unittest.TestCase.__init__(self)
  678. self._wycheproof_warnings = wycheproof_warnings
  679. self._id = "None"
  680. def add_tests(self, filename):
  681. comps = "Cryptodome.SelfTest.Signature.test_vectors.wycheproof".split(".")
  682. with open(pycryptodome_filename(comps, filename), "rt") as file_in:
  683. tv_tree = json.load(file_in)
  684. for group in tv_tree['testGroups']:
  685. try:
  686. key = ECC.import_key(group['keyPem'])
  687. except ValueError:
  688. continue
  689. hash_name = group['sha']
  690. if hash_name == "SHA-256":
  691. hash_module = SHA256
  692. elif hash_name == "SHA-224":
  693. hash_module = SHA224
  694. elif hash_name == "SHA-1":
  695. hash_module = SHA1
  696. else:
  697. assert False
  698. assert group['type'] == "ECDSAVer"
  699. from collections import namedtuple
  700. TestVector = namedtuple('TestVector', 'id comment msg sig key hash_module valid warning')
  701. for test in group['tests']:
  702. tv = TestVector(
  703. test['tcId'],
  704. test['comment'],
  705. unhexlify(test['msg']),
  706. unhexlify(test['sig']),
  707. key,
  708. hash_module,
  709. test['result'] != "invalid",
  710. test['result'] == "acceptable"
  711. )
  712. self.tv.append(tv)
  713. def setUp(self):
  714. self.tv = []
  715. self.add_tests("ecdsa_test.json")
  716. self.add_tests("ecdsa_secp256r1_sha256_test.json")
  717. def shortDescription(self):
  718. return self._id
  719. def warn(self, tv):
  720. if tv.warning and self._wycheproof_warnings:
  721. import warnings
  722. warnings.warn("Wycheproof warning: %s (%s)" % (self._id, tv.comment))
  723. def test_verify(self, tv):
  724. self._id = "Wycheproof ECDSA Test #%d (%s)" % (tv.id, tv.comment)
  725. hashed_msg = tv.hash_module.new(tv.msg)
  726. signer = DSS.new(tv.key, 'fips-186-3', encoding='der')
  727. try:
  728. signature = signer.verify(hashed_msg, tv.sig)
  729. except ValueError as e:
  730. if tv.warning:
  731. return
  732. if tv.comment == "k*G has a large x-coordinate":
  733. return
  734. assert not tv.valid
  735. else:
  736. assert tv.valid
  737. self.warn(tv)
  738. def runTest(self):
  739. for tv in self.tv:
  740. self.test_verify(tv)
  741. def get_tests(config={}):
  742. wycheproof_warnings = config.get('wycheproof_warnings')
  743. tests = []
  744. tests += list_test_cases(FIPS_DSA_Tests)
  745. tests += list_test_cases(FIPS_ECDSA_Tests)
  746. tests += list_test_cases(Det_DSA_Tests)
  747. tests += list_test_cases(Det_ECDSA_Tests)
  748. if config.get('slow_tests'):
  749. tests += list_test_cases(FIPS_DSA_Tests_KAT)
  750. tests += list_test_cases(FIPS_ECDSA_Tests_KAT)
  751. tests += [ TestVectorsDSAWycheproof(wycheproof_warnings) ]
  752. tests += [ TestVectorsECDSAWycheproof(wycheproof_warnings) ]
  753. return tests
  754. if __name__ == '__main__':
  755. suite = lambda: unittest.TestSuite(get_tests())
  756. unittest.main(defaultTest='suite')