123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129 |
- /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
- /* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
- #include "CTLogVerifier.h"
- #include "CTTestUtils.h"
- #include "nss.h"
- #include "gtest/gtest.h"
- namespace mozilla { namespace ct {
- using namespace pkix;
- class CTLogVerifierTest : public ::testing::Test
- {
- public:
- void SetUp() override
- {
- // Does nothing if NSS is already initialized.
- MOZ_RELEASE_ASSERT(NSS_NoDB_Init(nullptr) == SECSuccess);
- ASSERT_EQ(Success, mLog.Init(InputForBuffer(GetTestPublicKey())));
- ASSERT_EQ(GetTestPublicKeyId(), mLog.keyId());
- }
- protected:
- CTLogVerifier mLog;
- };
- TEST_F(CTLogVerifierTest, VerifiesCertSCT)
- {
- LogEntry certEntry;
- GetX509CertLogEntry(certEntry);
- SignedCertificateTimestamp certSct;
- GetX509CertSCT(certSct);
- EXPECT_EQ(Success, mLog.Verify(certEntry, certSct));
- }
- TEST_F(CTLogVerifierTest, VerifiesPrecertSCT)
- {
- LogEntry precertEntry;
- GetPrecertLogEntry(precertEntry);
- SignedCertificateTimestamp precertSct;
- GetPrecertSCT(precertSct);
- EXPECT_EQ(Success, mLog.Verify(precertEntry, precertSct));
- }
- TEST_F(CTLogVerifierTest, FailsInvalidTimestamp)
- {
- LogEntry certEntry;
- GetX509CertLogEntry(certEntry);
- SignedCertificateTimestamp certSct;
- GetX509CertSCT(certSct);
- // Mangle the timestamp, so that it should fail signature validation.
- certSct.timestamp = 0;
- EXPECT_EQ(Result::ERROR_BAD_SIGNATURE, mLog.Verify(certEntry, certSct));
- }
- TEST_F(CTLogVerifierTest, FailsInvalidSignature)
- {
- LogEntry certEntry;
- GetX509CertLogEntry(certEntry);
- // Mangle the signature, making VerifyECDSASignedDigestNSS (used by
- // CTLogVerifier) return ERROR_BAD_SIGNATURE.
- SignedCertificateTimestamp certSct;
- GetX509CertSCT(certSct);
- certSct.signature.signatureData[20] ^= '\xFF';
- EXPECT_EQ(Result::ERROR_BAD_SIGNATURE, mLog.Verify(certEntry, certSct));
- // Make VerifyECDSASignedDigestNSS return ERROR_BAD_DER. We still expect
- // the verifier to return ERROR_BAD_SIGNATURE.
- SignedCertificateTimestamp certSct2;
- GetX509CertSCT(certSct2);
- certSct2.signature.signatureData[0] ^= '\xFF';
- EXPECT_EQ(Result::ERROR_BAD_SIGNATURE, mLog.Verify(certEntry, certSct2));
- }
- TEST_F(CTLogVerifierTest, FailsInvalidLogID)
- {
- LogEntry certEntry;
- GetX509CertLogEntry(certEntry);
- SignedCertificateTimestamp certSct;
- GetX509CertSCT(certSct);
- // Mangle the log ID, which should cause it to match a different log before
- // attempting signature validation.
- MOZ_RELEASE_ASSERT(certSct.logId.append('\x0'));
- EXPECT_EQ(Result::FATAL_ERROR_INVALID_ARGS, mLog.Verify(certEntry, certSct));
- }
- TEST_F(CTLogVerifierTest, VerifiesValidSTH)
- {
- SignedTreeHead sth;
- GetSampleSignedTreeHead(sth);
- EXPECT_EQ(Success, mLog.VerifySignedTreeHead(sth));
- }
- TEST_F(CTLogVerifierTest, DoesNotVerifyInvalidSTH)
- {
- SignedTreeHead sth;
- GetSampleSignedTreeHead(sth);
- sth.sha256RootHash[0] ^= '\xFF';
- EXPECT_EQ(Result::ERROR_BAD_SIGNATURE, mLog.VerifySignedTreeHead(sth));
- }
- // Test that excess data after the public key is rejected.
- TEST_F(CTLogVerifierTest, ExcessDataInPublicKey)
- {
- Buffer key = GetTestPublicKey();
- MOZ_RELEASE_ASSERT(key.append("extra", 5));
- CTLogVerifier log;
- EXPECT_NE(Success, log.Init(InputForBuffer(key)));
- }
- } } // namespace mozilla::ct
|