Black Lives Matter. Support the Equal Justice Initiative.

Source file src/crypto/dsa/dsa_test.go

Documentation: crypto/dsa

     1  // Copyright 2011 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  package dsa
     6  
     7  import (
     8  	"crypto/rand"
     9  	"math/big"
    10  	"testing"
    11  )
    12  
    13  func testSignAndVerify(t *testing.T, i int, priv *PrivateKey) {
    14  	hashed := []byte("testing")
    15  	r, s, err := Sign(rand.Reader, priv, hashed)
    16  	if err != nil {
    17  		t.Errorf("%d: error signing: %s", i, err)
    18  		return
    19  	}
    20  
    21  	if !Verify(&priv.PublicKey, hashed, r, s) {
    22  		t.Errorf("%d: Verify failed", i)
    23  	}
    24  }
    25  
    26  func testParameterGeneration(t *testing.T, sizes ParameterSizes, L, N int) {
    27  	var priv PrivateKey
    28  	params := &priv.Parameters
    29  
    30  	err := GenerateParameters(params, rand.Reader, sizes)
    31  	if err != nil {
    32  		t.Errorf("%d: %s", int(sizes), err)
    33  		return
    34  	}
    35  
    36  	if params.P.BitLen() != L {
    37  		t.Errorf("%d: params.BitLen got:%d want:%d", int(sizes), params.P.BitLen(), L)
    38  	}
    39  
    40  	if params.Q.BitLen() != N {
    41  		t.Errorf("%d: q.BitLen got:%d want:%d", int(sizes), params.Q.BitLen(), L)
    42  	}
    43  
    44  	one := new(big.Int)
    45  	one.SetInt64(1)
    46  	pm1 := new(big.Int).Sub(params.P, one)
    47  	quo, rem := new(big.Int).DivMod(pm1, params.Q, new(big.Int))
    48  	if rem.Sign() != 0 {
    49  		t.Errorf("%d: p-1 mod q != 0", int(sizes))
    50  	}
    51  	x := new(big.Int).Exp(params.G, quo, params.P)
    52  	if x.Cmp(one) == 0 {
    53  		t.Errorf("%d: invalid generator", int(sizes))
    54  	}
    55  
    56  	err = GenerateKey(&priv, rand.Reader)
    57  	if err != nil {
    58  		t.Errorf("error generating key: %s", err)
    59  		return
    60  	}
    61  
    62  	testSignAndVerify(t, int(sizes), &priv)
    63  }
    64  
    65  func TestParameterGeneration(t *testing.T) {
    66  	if testing.Short() {
    67  		t.Skip("skipping parameter generation test in short mode")
    68  	}
    69  
    70  	testParameterGeneration(t, L1024N160, 1024, 160)
    71  	testParameterGeneration(t, L2048N224, 2048, 224)
    72  	testParameterGeneration(t, L2048N256, 2048, 256)
    73  	testParameterGeneration(t, L3072N256, 3072, 256)
    74  }
    75  
    76  func fromHex(s string) *big.Int {
    77  	result, ok := new(big.Int).SetString(s, 16)
    78  	if !ok {
    79  		panic(s)
    80  	}
    81  	return result
    82  }
    83  
    84  func TestSignAndVerify(t *testing.T) {
    85  	priv := PrivateKey{
    86  		PublicKey: PublicKey{
    87  			Parameters: Parameters{
    88  				P: fromHex("A9B5B793FB4785793D246BAE77E8FF63CA52F442DA763C440259919FE1BC1D6065A9350637A04F75A2F039401D49F08E066C4D275A5A65DA5684BC563C14289D7AB8A67163BFBF79D85972619AD2CFF55AB0EE77A9002B0EF96293BDD0F42685EBB2C66C327079F6C98000FBCB79AACDE1BC6F9D5C7B1A97E3D9D54ED7951FEF"),
    89  				Q: fromHex("E1D3391245933D68A0714ED34BBCB7A1F422B9C1"),
    90  				G: fromHex("634364FC25248933D01D1993ECABD0657CC0CB2CEED7ED2E3E8AECDFCDC4A25C3B15E9E3B163ACA2984B5539181F3EFF1A5E8903D71D5B95DA4F27202B77D2C44B430BB53741A8D59A8F86887525C9F2A6A5980A195EAA7F2FF910064301DEF89D3AA213E1FAC7768D89365318E370AF54A112EFBA9246D9158386BA1B4EEFDA"),
    91  			},
    92  			Y: fromHex("32969E5780CFE1C849A1C276D7AEB4F38A23B591739AA2FE197349AEEBD31366AEE5EB7E6C6DDB7C57D02432B30DB5AA66D9884299FAA72568944E4EEDC92EA3FBC6F39F53412FBCC563208F7C15B737AC8910DBC2D9C9B8C001E72FDC40EB694AB1F06A5A2DBD18D9E36C66F31F566742F11EC0A52E9F7B89355C02FB5D32D2"),
    93  		},
    94  		X: fromHex("5078D4D29795CBE76D3AACFE48C9AF0BCDBEE91A"),
    95  	}
    96  
    97  	testSignAndVerify(t, 0, &priv)
    98  }
    99  
   100  func TestSignAndVerifyWithBadPublicKey(t *testing.T) {
   101  	pub := PublicKey{
   102  		Parameters: Parameters{
   103  			P: fromHex("A9B5B793FB4785793D246BAE77E8FF63CA52F442DA763C440259919FE1BC1D6065A9350637A04F75A2F039401D49F08E066C4D275A5A65DA5684BC563C14289D7AB8A67163BFBF79D85972619AD2CFF55AB0EE77A9002B0EF96293BDD0F42685EBB2C66C327079F6C98000FBCB79AACDE1BC6F9D5C7B1A97E3D9D54ED7951FEF"),
   104  			Q: fromHex("FA"),
   105  			G: fromHex("634364FC25248933D01D1993ECABD0657CC0CB2CEED7ED2E3E8AECDFCDC4A25C3B15E9E3B163ACA2984B5539181F3EFF1A5E8903D71D5B95DA4F27202B77D2C44B430BB53741A8D59A8F86887525C9F2A6A5980A195EAA7F2FF910064301DEF89D3AA213E1FAC7768D89365318E370AF54A112EFBA9246D9158386BA1B4EEFDA"),
   106  		},
   107  		Y: fromHex("32969E5780CFE1C849A1C276D7AEB4F38A23B591739AA2FE197349AEEBD31366AEE5EB7E6C6DDB7C57D02432B30DB5AA66D9884299FAA72568944E4EEDC92EA3FBC6F39F53412FBCC563208F7C15B737AC8910DBC2D9C9B8C001E72FDC40EB694AB1F06A5A2DBD18D9E36C66F31F566742F11EC0A52E9F7B89355C02FB5D32D2"),
   108  	}
   109  
   110  	if Verify(&pub, []byte("testing"), fromHex("2"), fromHex("4")) {
   111  		t.Errorf("Verify unexpected success with non-existent mod inverse of Q")
   112  	}
   113  }
   114  
   115  func TestSigningWithDegenerateKeys(t *testing.T) {
   116  	// Signing with degenerate private keys should not cause an infinite
   117  	// loop.
   118  	badKeys := []struct {
   119  		p, q, g, y, x string
   120  	}{
   121  		{"00", "01", "00", "00", "00"},
   122  		{"01", "ff", "00", "00", "00"},
   123  	}
   124  
   125  	for i, test := range badKeys {
   126  		priv := PrivateKey{
   127  			PublicKey: PublicKey{
   128  				Parameters: Parameters{
   129  					P: fromHex(test.p),
   130  					Q: fromHex(test.q),
   131  					G: fromHex(test.g),
   132  				},
   133  				Y: fromHex(test.y),
   134  			},
   135  			X: fromHex(test.x),
   136  		}
   137  
   138  		hashed := []byte("testing")
   139  		if _, _, err := Sign(rand.Reader, &priv, hashed); err == nil {
   140  			t.Errorf("#%d: unexpected success", i)
   141  		}
   142  	}
   143  }
   144  

View as plain text