blob: 1f61960c175b710b0fb7c718610e5a84bde71125 [file] [log] [blame]
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "components/policy/test_support/signature_provider.h"
#include <utility>
#include "components/policy/proto/device_management_backend.pb.h"
#include "crypto/signature_verifier.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace em = enterprise_management;
namespace policy {
// Param: 1-based key version to be tested.
typedef ::testing::TestWithParam<int> SignatureProviderWithValidKeyIndexTest;
void CheckSignatureForDomain(const SignatureProvider::SigningKey* signing_key,
const std::string& domain,
bool expected_success) {
std::string signature;
bool success = signing_key->GetSignatureForDomain(domain, &signature);
ASSERT_EQ(expected_success, success);
EXPECT_NE(expected_success, signature.empty());
}
TEST_P(SignatureProviderWithValidKeyIndexTest, TestSha256Rsa) {
SignatureProvider provider;
provider.set_current_key_version(GetParam());
const SignatureProvider::SigningKey* signing_key = provider.GetCurrentKey();
ASSERT_EQ(provider.GetKeyByVersion(GetParam()), signing_key);
ASSERT_TRUE(signing_key);
EXPECT_FALSE(signing_key->public_key().empty());
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain1, true);
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain2, true);
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain3, true);
CheckSignatureForDomain(signing_key, "some-random-domain.com", false);
std::string signature;
std::string some_string = "some-string";
EXPECT_TRUE(signing_key->Sign(some_string, em::PolicyFetchRequest::SHA256_RSA,
&signature));
EXPECT_FALSE(signature.empty());
crypto::SignatureVerifier signature_verifier;
ASSERT_TRUE(signature_verifier.VerifyInit(
crypto::SignatureVerifier::RSA_PKCS1_SHA256,
base::as_byte_span(signature),
base::as_byte_span(signing_key->public_key())));
signature_verifier.VerifyUpdate(base::as_byte_span(some_string));
EXPECT_TRUE(signature_verifier.VerifyFinal());
}
TEST_P(SignatureProviderWithValidKeyIndexTest, TestSha1Rsa) {
SignatureProvider provider;
provider.set_current_key_version(GetParam());
const SignatureProvider::SigningKey* signing_key = provider.GetCurrentKey();
ASSERT_EQ(provider.GetKeyByVersion(GetParam()), signing_key);
ASSERT_TRUE(signing_key);
EXPECT_FALSE(signing_key->public_key().empty());
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain1, true);
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain2, true);
CheckSignatureForDomain(signing_key, SignatureProvider::kTestDomain3, true);
CheckSignatureForDomain(signing_key, "some-random-domain.com", false);
std::string signature;
std::string some_string = "some-string";
EXPECT_TRUE(signing_key->Sign(some_string, em::PolicyFetchRequest::SHA1_RSA,
&signature));
EXPECT_FALSE(signature.empty());
crypto::SignatureVerifier signature_verifier;
ASSERT_TRUE(signature_verifier.VerifyInit(
crypto::SignatureVerifier::RSA_PKCS1_SHA1, base::as_byte_span(signature),
base::as_byte_span(signing_key->public_key())));
signature_verifier.VerifyUpdate(base::as_byte_span(some_string));
EXPECT_TRUE(signature_verifier.VerifyFinal());
}
INSTANTIATE_TEST_SUITE_P(All,
SignatureProviderWithValidKeyIndexTest,
testing::ValuesIn({1, 2}));
// Param: 1-based key version to be tested.
typedef ::testing::TestWithParam<int> SignatureProviderWithInvalidKeyIndexTest;
TEST_P(SignatureProviderWithInvalidKeyIndexTest, DomainSignatures) {
SignatureProvider provider;
provider.set_current_key_version(GetParam());
EXPECT_FALSE(provider.GetCurrentKey());
EXPECT_FALSE(provider.GetKeyByVersion(GetParam()));
}
INSTANTIATE_TEST_SUITE_P(All,
SignatureProviderWithInvalidKeyIndexTest,
testing::ValuesIn({-1, 0, 3}));
} // namespace policy