github.com/true-sqn/fabric@v2.1.1+incompatible/bccsp/pkcs11/impl_test.go (about)

     1  // +build pkcs11
     2  
     3  /*
     4  Copyright IBM Corp. All Rights Reserved.
     5  
     6  SPDX-License-Identifier: Apache-2.0
     7  */
     8  
     9  package pkcs11
    10  
    11  import (
    12  	"bytes"
    13  	"crypto"
    14  	"crypto/elliptic"
    15  	"crypto/rand"
    16  	"crypto/sha256"
    17  	"crypto/sha512"
    18  	"crypto/x509"
    19  	"crypto/x509/pkix"
    20  	"encoding/asn1"
    21  	"fmt"
    22  	"hash"
    23  	"io/ioutil"
    24  	"math/big"
    25  	"net"
    26  	"os"
    27  	"strings"
    28  	"testing"
    29  	"time"
    30  
    31  	"github.com/hyperledger/fabric/bccsp"
    32  	"github.com/hyperledger/fabric/bccsp/signer"
    33  	"github.com/hyperledger/fabric/bccsp/sw"
    34  	"github.com/hyperledger/fabric/bccsp/utils"
    35  	"github.com/stretchr/testify/assert"
    36  	"golang.org/x/crypto/sha3"
    37  )
    38  
    39  var (
    40  	currentKS         bccsp.KeyStore
    41  	currentBCCSP      bccsp.BCCSP
    42  	currentTestConfig testConfig
    43  )
    44  
    45  type testConfig struct {
    46  	securityLevel int
    47  	hashFamily    string
    48  	softVerify    bool
    49  	immutable     bool
    50  }
    51  
    52  func TestMain(m *testing.M) {
    53  	os.Exit(testMain(m))
    54  }
    55  
    56  func testMain(m *testing.M) int {
    57  	tmpDir, err := ioutil.TempDir("", "pkcs11_ks")
    58  	if err != nil {
    59  		fmt.Printf("Failed to create keystore directory [%s]\n", err)
    60  		return -1
    61  	}
    62  	defer os.RemoveAll(tmpDir)
    63  
    64  	keyStore, err := sw.NewFileBasedKeyStore(nil, tmpDir, false)
    65  	if err != nil {
    66  		fmt.Printf("Failed initiliazing KeyStore [%s]\n", err)
    67  		return -1
    68  	}
    69  	currentKS = keyStore
    70  
    71  	lib, pin, label := FindPKCS11Lib()
    72  	tests := []testConfig{
    73  		{256, "SHA2", true, false},
    74  		{256, "SHA3", false, false},
    75  		{384, "SHA2", false, false},
    76  		{384, "SHA3", false, false},
    77  		{384, "SHA3", true, false},
    78  	}
    79  
    80  	if strings.Contains(lib, "softhsm") {
    81  		tests = append(tests, []testConfig{
    82  			{256, "SHA2", true, false},
    83  			{256, "SHA2", true, true},
    84  		}...)
    85  	}
    86  
    87  	opts := PKCS11Opts{
    88  		Library: lib,
    89  		Label:   label,
    90  		Pin:     pin,
    91  	}
    92  
    93  	for _, config := range tests {
    94  		currentTestConfig = config
    95  
    96  		opts.HashFamily = config.hashFamily
    97  		opts.SecLevel = config.securityLevel
    98  		opts.SoftVerify = config.softVerify
    99  		opts.Immutable = config.immutable
   100  		fmt.Printf("Immutable = [%v]\n", opts.Immutable)
   101  		currentBCCSP, err = New(opts, keyStore)
   102  		if err != nil {
   103  			fmt.Printf("Failed initiliazing BCCSP at [%+v] \n%s\n", opts, err)
   104  			return -1
   105  		}
   106  
   107  		ret := m.Run()
   108  		if ret != 0 {
   109  			fmt.Printf("Failed testing at [%+v]\n", opts)
   110  			return -1
   111  		}
   112  	}
   113  	return 0
   114  }
   115  
   116  func TestNew(t *testing.T) {
   117  	opts := PKCS11Opts{
   118  		HashFamily: "SHA2",
   119  		SecLevel:   256,
   120  		SoftVerify: false,
   121  		Library:    "lib",
   122  		Label:      "ForFabric",
   123  		Pin:        "98765432",
   124  	}
   125  
   126  	// Setup PKCS11 library and provide initial set of values
   127  	lib, _, _ := FindPKCS11Lib()
   128  	opts.Library = lib
   129  
   130  	// Test for nil keystore
   131  	_, err := New(opts, nil)
   132  	assert.Error(t, err)
   133  	assert.Contains(t, err.Error(), "Invalid bccsp.KeyStore instance. It must be different from nil")
   134  
   135  	// Test for invalid PKCS11 loadLib
   136  	opts.Library = ""
   137  	_, err = New(opts, currentKS)
   138  	assert.Error(t, err)
   139  	assert.Contains(t, err.Error(), "Failed initializing PKCS11 library")
   140  }
   141  
   142  func TestFindPKCS11LibEnvVars(t *testing.T) {
   143  	const (
   144  		dummy_PKCS11_LIB   = "/usr/lib/pkcs11"
   145  		dummy_PKCS11_PIN   = "98765432"
   146  		dummy_PKCS11_LABEL = "testing"
   147  	)
   148  
   149  	// Set environment variables used for test and preserve
   150  	// original values for restoration after test completion
   151  	orig_PKCS11_LIB := os.Getenv("PKCS11_LIB")
   152  	os.Setenv("PKCS11_LIB", dummy_PKCS11_LIB)
   153  
   154  	orig_PKCS11_PIN := os.Getenv("PKCS11_PIN")
   155  	os.Setenv("PKCS11_PIN", dummy_PKCS11_PIN)
   156  
   157  	orig_PKCS11_LABEL := os.Getenv("PKCS11_LABEL")
   158  	os.Setenv("PKCS11_LABEL", dummy_PKCS11_LABEL)
   159  
   160  	lib, pin, label := FindPKCS11Lib()
   161  	assert.EqualValues(t, dummy_PKCS11_LIB, lib, "FindPKCS11Lib did not return expected library")
   162  	assert.EqualValues(t, dummy_PKCS11_PIN, pin, "FindPKCS11Lib did not return expected pin")
   163  	assert.EqualValues(t, dummy_PKCS11_LABEL, label, "FindPKCS11Lib did not return expected label")
   164  
   165  	os.Setenv("PKCS11_LIB", orig_PKCS11_LIB)
   166  	os.Setenv("PKCS11_PIN", orig_PKCS11_PIN)
   167  	os.Setenv("PKCS11_LABEL", orig_PKCS11_LABEL)
   168  }
   169  
   170  func TestInvalidNewParameter(t *testing.T) {
   171  	lib, pin, label := FindPKCS11Lib()
   172  	opts := PKCS11Opts{
   173  		Library:    lib,
   174  		Label:      label,
   175  		Pin:        pin,
   176  		SoftVerify: true,
   177  	}
   178  
   179  	opts.HashFamily = "SHA2"
   180  	opts.SecLevel = 0
   181  	r, err := New(opts, currentKS)
   182  	if err == nil {
   183  		t.Fatal("Error should be different from nil in this case")
   184  	}
   185  	if r != nil {
   186  		t.Fatal("Return value should be equal to nil in this case")
   187  	}
   188  
   189  	opts.HashFamily = "SHA8"
   190  	opts.SecLevel = 256
   191  	r, err = New(opts, currentKS)
   192  	if err == nil {
   193  		t.Fatal("Error should be different from nil in this case")
   194  	}
   195  	if r != nil {
   196  		t.Fatal("Return value should be equal to nil in this case")
   197  	}
   198  
   199  	opts.HashFamily = "SHA2"
   200  	opts.SecLevel = 256
   201  	r, err = New(opts, nil)
   202  	if err == nil {
   203  		t.Fatal("Error should be different from nil in this case")
   204  	}
   205  	if r != nil {
   206  		t.Fatal("Return value should be equal to nil in this case")
   207  	}
   208  
   209  	opts.HashFamily = "SHA3"
   210  	opts.SecLevel = 0
   211  	r, err = New(opts, nil)
   212  	if err == nil {
   213  		t.Fatal("Error should be different from nil in this case")
   214  	}
   215  	if r != nil {
   216  		t.Fatal("Return value should be equal to nil in this case")
   217  	}
   218  }
   219  
   220  func TestInvalidSKI(t *testing.T) {
   221  	k, err := currentBCCSP.GetKey(nil)
   222  	if err == nil {
   223  		t.Fatal("Error should be different from nil in this case")
   224  	}
   225  	if k != nil {
   226  		t.Fatal("Return value should be equal to nil in this case")
   227  	}
   228  
   229  	k, err = currentBCCSP.GetKey([]byte{0, 1, 2, 3, 4, 5, 6})
   230  	if err == nil {
   231  		t.Fatal("Error should be different from nil in this case")
   232  	}
   233  	if k != nil {
   234  		t.Fatal("Return value should be equal to nil in this case")
   235  	}
   236  }
   237  
   238  func TestKeyGenECDSAOpts(t *testing.T) {
   239  	if testing.Short() {
   240  		t.Skip("Skipping TestKeyGenECDSAOpts")
   241  	}
   242  	// Curve P256
   243  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAP256KeyGenOpts{Temporary: false})
   244  	if err != nil {
   245  		t.Fatalf("Failed generating ECDSA P256 key [%s]", err)
   246  	}
   247  	if k == nil {
   248  		t.Fatal("Failed generating ECDSA P256 key. Key must be different from nil")
   249  	}
   250  	if !k.Private() {
   251  		t.Fatal("Failed generating ECDSA P256 key. Key should be private")
   252  	}
   253  	if k.Symmetric() {
   254  		t.Fatal("Failed generating ECDSA P256 key. Key should be asymmetric")
   255  	}
   256  
   257  	ecdsaKey := k.(*ecdsaPrivateKey).pub
   258  	if elliptic.P256() != ecdsaKey.pub.Curve {
   259  		t.Fatal("P256 generated key in invalid. The curve must be P256.")
   260  	}
   261  
   262  	// Curve P384
   263  	k, err = currentBCCSP.KeyGen(&bccsp.ECDSAP384KeyGenOpts{Temporary: false})
   264  	if err != nil {
   265  		t.Fatalf("Failed generating ECDSA P384 key [%s]", err)
   266  	}
   267  	if k == nil {
   268  		t.Fatal("Failed generating ECDSA P384 key. Key must be different from nil")
   269  	}
   270  	if !k.Private() {
   271  		t.Fatal("Failed generating ECDSA P384 key. Key should be private")
   272  	}
   273  	if k.Symmetric() {
   274  		t.Fatal("Failed generating ECDSA P384 key. Key should be asymmetric")
   275  	}
   276  
   277  	ecdsaKey = k.(*ecdsaPrivateKey).pub
   278  	if elliptic.P384() != ecdsaKey.pub.Curve {
   279  		t.Fatal("P256 generated key in invalid. The curve must be P384.")
   280  	}
   281  }
   282  
   283  func TestKeyGenAESOpts(t *testing.T) {
   284  	if testing.Short() {
   285  		t.Skip("Skipping TestKeyGenAESOpts")
   286  	}
   287  	// AES 128
   288  	k, err := currentBCCSP.KeyGen(&bccsp.AES128KeyGenOpts{Temporary: false})
   289  	if err != nil {
   290  		t.Fatalf("Failed generating AES 128 key [%s]", err)
   291  	}
   292  	if k == nil {
   293  		t.Fatal("Failed generating AES 128 key. Key must be different from nil")
   294  	}
   295  	if !k.Private() {
   296  		t.Fatal("Failed generating AES 128 key. Key should be private")
   297  	}
   298  	if !k.Symmetric() {
   299  		t.Fatal("Failed generating AES 128 key. Key should be symmetric")
   300  	}
   301  
   302  	// AES 192
   303  	k, err = currentBCCSP.KeyGen(&bccsp.AES192KeyGenOpts{Temporary: false})
   304  	if err != nil {
   305  		t.Fatalf("Failed generating AES 192 key [%s]", err)
   306  	}
   307  	if k == nil {
   308  		t.Fatal("Failed generating AES 192 key. Key must be different from nil")
   309  	}
   310  	if !k.Private() {
   311  		t.Fatal("Failed generating AES 192 key. Key should be private")
   312  	}
   313  	if !k.Symmetric() {
   314  		t.Fatal("Failed generating AES 192 key. Key should be symmetric")
   315  	}
   316  
   317  	// AES 256
   318  	k, err = currentBCCSP.KeyGen(&bccsp.AES256KeyGenOpts{Temporary: false})
   319  	if err != nil {
   320  		t.Fatalf("Failed generating AES 256 key [%s]", err)
   321  	}
   322  	if k == nil {
   323  		t.Fatal("Failed generating AES 256 key. Key must be different from nil")
   324  	}
   325  	if !k.Private() {
   326  		t.Fatal("Failed generating AES 256 key. Key should be private")
   327  	}
   328  	if !k.Symmetric() {
   329  		t.Fatal("Failed generating AES 256 key. Key should be symmetric")
   330  	}
   331  }
   332  
   333  func TestHashOpts(t *testing.T) {
   334  	if testing.Short() {
   335  		t.Skip("Skipping TestHashOpts")
   336  	}
   337  	msg := []byte("abcd")
   338  
   339  	// SHA256
   340  	digest1, err := currentBCCSP.Hash(msg, &bccsp.SHA256Opts{})
   341  	if err != nil {
   342  		t.Fatalf("Failed computing SHA256 [%s]", err)
   343  	}
   344  
   345  	h := sha256.New()
   346  	h.Write(msg)
   347  	digest2 := h.Sum(nil)
   348  
   349  	if !bytes.Equal(digest1, digest2) {
   350  		t.Fatalf("Different SHA256 computed. [%x][%x]", digest1, digest2)
   351  	}
   352  
   353  	// SHA384
   354  	digest1, err = currentBCCSP.Hash(msg, &bccsp.SHA384Opts{})
   355  	if err != nil {
   356  		t.Fatalf("Failed computing SHA384 [%s]", err)
   357  	}
   358  
   359  	h = sha512.New384()
   360  	h.Write(msg)
   361  	digest2 = h.Sum(nil)
   362  
   363  	if !bytes.Equal(digest1, digest2) {
   364  		t.Fatalf("Different SHA384 computed. [%x][%x]", digest1, digest2)
   365  	}
   366  
   367  	// SHA3_256O
   368  	digest1, err = currentBCCSP.Hash(msg, &bccsp.SHA3_256Opts{})
   369  	if err != nil {
   370  		t.Fatalf("Failed computing SHA3_256 [%s]", err)
   371  	}
   372  
   373  	h = sha3.New256()
   374  	h.Write(msg)
   375  	digest2 = h.Sum(nil)
   376  
   377  	if !bytes.Equal(digest1, digest2) {
   378  		t.Fatalf("Different SHA3_256 computed. [%x][%x]", digest1, digest2)
   379  	}
   380  
   381  	// SHA3_384
   382  	digest1, err = currentBCCSP.Hash(msg, &bccsp.SHA3_384Opts{})
   383  	if err != nil {
   384  		t.Fatalf("Failed computing SHA3_384 [%s]", err)
   385  	}
   386  
   387  	h = sha3.New384()
   388  	h.Write(msg)
   389  	digest2 = h.Sum(nil)
   390  
   391  	if !bytes.Equal(digest1, digest2) {
   392  		t.Fatalf("Different SHA3_384 computed. [%x][%x]", digest1, digest2)
   393  	}
   394  }
   395  
   396  func TestECDSAKeyGenEphemeral(t *testing.T) {
   397  	if testing.Short() {
   398  		t.Skip("Skipping TestECDSAKeyGenEphemeral")
   399  	}
   400  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: true})
   401  	if err != nil {
   402  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   403  	}
   404  	if k == nil {
   405  		t.Fatal("Failed generating ECDSA key. Key must be different from nil")
   406  	}
   407  	if !k.Private() {
   408  		t.Fatal("Failed generating ECDSA key. Key should be private")
   409  	}
   410  	if k.Symmetric() {
   411  		t.Fatal("Failed generating ECDSA key. Key should be asymmetric")
   412  	}
   413  	raw, err := k.Bytes()
   414  	if err == nil {
   415  		t.Fatal("Failed marshalling to bytes. Marshalling must fail.")
   416  	}
   417  	if len(raw) != 0 {
   418  		t.Fatal("Failed marshalling to bytes. Output should be 0 bytes")
   419  	}
   420  	pk, err := k.PublicKey()
   421  	if err != nil {
   422  		t.Fatalf("Failed getting corresponding public key [%s]", err)
   423  	}
   424  	if pk == nil {
   425  		t.Fatal("Public key must be different from nil.")
   426  	}
   427  }
   428  
   429  func TestECDSAPrivateKeySKI(t *testing.T) {
   430  	if testing.Short() {
   431  		t.Skip("Skipping TestECDSAPrivateKeySKI")
   432  	}
   433  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   434  	if err != nil {
   435  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   436  	}
   437  
   438  	ski := k.SKI()
   439  	if len(ski) == 0 {
   440  		t.Fatal("SKI not valid. Zero length.")
   441  	}
   442  }
   443  
   444  func TestECDSAKeyGenNonEphemeral(t *testing.T) {
   445  	if testing.Short() {
   446  		t.Skip("Skipping TestECDSAKeyGenNonEphemeral")
   447  	}
   448  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   449  	if err != nil {
   450  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   451  	}
   452  	if k == nil {
   453  		t.Fatal("Failed generating ECDSA key. Key must be different from nil")
   454  	}
   455  	if !k.Private() {
   456  		t.Fatal("Failed generating ECDSA key. Key should be private")
   457  	}
   458  	if k.Symmetric() {
   459  		t.Fatal("Failed generating ECDSA key. Key should be asymmetric")
   460  	}
   461  }
   462  
   463  func TestECDSAGetKeyBySKI(t *testing.T) {
   464  	if testing.Short() {
   465  		t.Skip("Skipping TestECDSAGetKeyBySKI")
   466  	}
   467  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   468  	if err != nil {
   469  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   470  	}
   471  
   472  	k2, err := currentBCCSP.GetKey(k.SKI())
   473  	if err != nil {
   474  		t.Fatalf("Failed getting ECDSA key [%s]", err)
   475  	}
   476  	if k2 == nil {
   477  		t.Fatal("Failed getting ECDSA key. Key must be different from nil")
   478  	}
   479  	if !k2.Private() {
   480  		t.Fatal("Failed getting ECDSA key. Key should be private")
   481  	}
   482  	if k2.Symmetric() {
   483  		t.Fatal("Failed getting ECDSA key. Key should be asymmetric")
   484  	}
   485  
   486  	// Check that the SKIs are the same
   487  	if !bytes.Equal(k.SKI(), k2.SKI()) {
   488  		t.Fatalf("SKIs are different [%x]!=[%x]", k.SKI(), k2.SKI())
   489  	}
   490  }
   491  
   492  func TestECDSAPublicKeyFromPrivateKey(t *testing.T) {
   493  	if testing.Short() {
   494  		t.Skip("Skipping TestECDSAPublicKeyFromPrivateKey")
   495  	}
   496  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   497  	if err != nil {
   498  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   499  	}
   500  
   501  	pk, err := k.PublicKey()
   502  	if err != nil {
   503  		t.Fatalf("Failed getting public key from private ECDSA key [%s]", err)
   504  	}
   505  	if pk == nil {
   506  		t.Fatal("Failed getting public key from private ECDSA key. Key must be different from nil")
   507  	}
   508  	if pk.Private() {
   509  		t.Fatal("Failed generating ECDSA key. Key should be public")
   510  	}
   511  	if pk.Symmetric() {
   512  		t.Fatal("Failed generating ECDSA key. Key should be asymmetric")
   513  	}
   514  }
   515  
   516  func TestECDSAPublicKeyBytes(t *testing.T) {
   517  	if testing.Short() {
   518  		t.Skip("Skipping TestECDSAPublicKeyBytes")
   519  	}
   520  
   521  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   522  	if err != nil {
   523  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   524  	}
   525  
   526  	pk, err := k.PublicKey()
   527  	if err != nil {
   528  		t.Fatalf("Failed getting public key from private ECDSA key [%s]", err)
   529  	}
   530  
   531  	raw, err := pk.Bytes()
   532  	if err != nil {
   533  		t.Fatalf("Failed marshalling ECDSA public key [%s]", err)
   534  	}
   535  	if len(raw) == 0 {
   536  		t.Fatal("Failed marshalling ECDSA public key. Zero length")
   537  	}
   538  }
   539  
   540  func TestECDSAPublicKeySKI(t *testing.T) {
   541  	if testing.Short() {
   542  		t.Skip("Skipping TestECDSAPublicKeySKI")
   543  	}
   544  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   545  	if err != nil {
   546  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   547  	}
   548  
   549  	pk, err := k.PublicKey()
   550  	if err != nil {
   551  		t.Fatalf("Failed getting public key from private ECDSA key [%s]", err)
   552  	}
   553  
   554  	ski := pk.SKI()
   555  	if len(ski) == 0 {
   556  		t.Fatal("SKI not valid. Zero length.")
   557  	}
   558  }
   559  
   560  func TestECDSASign(t *testing.T) {
   561  	if testing.Short() {
   562  		t.Skip("Skipping TestECDSASign")
   563  	}
   564  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   565  	if err != nil {
   566  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   567  	}
   568  
   569  	msg := []byte("Hello World")
   570  
   571  	digest, err := currentBCCSP.Hash(msg, &bccsp.SHAOpts{})
   572  	if err != nil {
   573  		t.Fatalf("Failed computing HASH [%s]", err)
   574  	}
   575  
   576  	signature, err := currentBCCSP.Sign(k, digest, nil)
   577  	if err != nil {
   578  		t.Fatalf("Failed generating ECDSA signature [%s]", err)
   579  	}
   580  	if len(signature) == 0 {
   581  		t.Fatal("Failed generating ECDSA key. Signature must be different from nil")
   582  	}
   583  
   584  	_, err = currentBCCSP.Sign(nil, digest, nil)
   585  	assert.Error(t, err)
   586  	assert.Contains(t, err.Error(), "Invalid Key. It must not be nil")
   587  
   588  	_, err = currentBCCSP.Sign(k, nil, nil)
   589  	assert.Error(t, err)
   590  	assert.Contains(t, err.Error(), "Invalid digest. Cannot be empty")
   591  }
   592  
   593  func TestECDSAVerify(t *testing.T) {
   594  	if testing.Short() {
   595  		t.Skip("Skipping TestECDSAVerify")
   596  	}
   597  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   598  	if err != nil {
   599  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   600  	}
   601  
   602  	msg := []byte("Hello World")
   603  
   604  	digest, err := currentBCCSP.Hash(msg, &bccsp.SHAOpts{})
   605  	if err != nil {
   606  		t.Fatalf("Failed computing HASH [%s]", err)
   607  	}
   608  
   609  	signature, err := currentBCCSP.Sign(k, digest, nil)
   610  	if err != nil {
   611  		t.Fatalf("Failed generating ECDSA signature  [%s]", err)
   612  	}
   613  
   614  	valid, err := currentBCCSP.Verify(k, signature, digest, nil)
   615  	if err != nil {
   616  		t.Fatalf("Failed verifying ECDSA signature [%s]", err)
   617  	}
   618  	if !valid {
   619  		t.Fatal("Failed verifying ECDSA signature. Signature not valid.")
   620  	}
   621  
   622  	pk, err := k.PublicKey()
   623  	if err != nil {
   624  		t.Fatalf("Failed getting corresponding public key [%s]", err)
   625  	}
   626  
   627  	valid, err = currentBCCSP.Verify(pk, signature, digest, nil)
   628  	if err != nil {
   629  		t.Fatalf("Failed verifying ECDSA signature [%s]", err)
   630  	}
   631  	if !valid {
   632  		t.Fatal("Failed verifying ECDSA signature. Signature not valid.")
   633  	}
   634  
   635  	_, err = currentBCCSP.Verify(nil, signature, digest, nil)
   636  	assert.Error(t, err)
   637  	assert.Contains(t, err.Error(), "Invalid Key. It must not be nil")
   638  
   639  	_, err = currentBCCSP.Verify(pk, nil, digest, nil)
   640  	assert.Error(t, err)
   641  	assert.Contains(t, err.Error(), "Invalid signature. Cannot be empty")
   642  
   643  	_, err = currentBCCSP.Verify(pk, signature, nil, nil)
   644  	assert.Error(t, err)
   645  	assert.Contains(t, err.Error(), "Invalid digest. Cannot be empty")
   646  
   647  	// Import the exported public key
   648  	pkRaw, err := pk.Bytes()
   649  	if err != nil {
   650  		t.Fatalf("Failed getting ECDSA raw public key [%s]", err)
   651  	}
   652  
   653  	// Store public key
   654  	_, err = currentBCCSP.KeyImport(pkRaw, &bccsp.ECDSAPKIXPublicKeyImportOpts{Temporary: false})
   655  	if err != nil {
   656  		t.Fatalf("Failed storing corresponding public key [%s]", err)
   657  	}
   658  
   659  	pk2, err := currentBCCSP.GetKey(pk.SKI())
   660  	if err != nil {
   661  		t.Fatalf("Failed retrieving corresponding public key [%s]", err)
   662  	}
   663  
   664  	valid, err = currentBCCSP.Verify(pk2, signature, digest, nil)
   665  	if err != nil {
   666  		t.Fatalf("Failed verifying ECDSA signature [%s]", err)
   667  	}
   668  	if !valid {
   669  		t.Fatal("Failed verifying ECDSA signature. Signature not valid.")
   670  	}
   671  }
   672  
   673  func TestECDSAKeyImportFromExportedKey(t *testing.T) {
   674  	if testing.Short() {
   675  		t.Skip("Skipping TestECDSAKeyImportFromExportedKey")
   676  	}
   677  	// Generate an ECDSA key
   678  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   679  	if err != nil {
   680  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   681  	}
   682  
   683  	// Export the public key
   684  	pk, err := k.PublicKey()
   685  	if err != nil {
   686  		t.Fatalf("Failed getting ECDSA public key [%s]", err)
   687  	}
   688  
   689  	pkRaw, err := pk.Bytes()
   690  	if err != nil {
   691  		t.Fatalf("Failed getting ECDSA raw public key [%s]", err)
   692  	}
   693  
   694  	// Import the exported public key
   695  	pk2, err := currentBCCSP.KeyImport(pkRaw, &bccsp.ECDSAPKIXPublicKeyImportOpts{Temporary: false})
   696  	if err != nil {
   697  		t.Fatalf("Failed importing ECDSA public key [%s]", err)
   698  	}
   699  	if pk2 == nil {
   700  		t.Fatal("Failed importing ECDSA public key. Return BCCSP key cannot be nil.")
   701  	}
   702  
   703  	// Sign and verify with the imported public key
   704  	msg := []byte("Hello World")
   705  
   706  	digest, err := currentBCCSP.Hash(msg, &bccsp.SHAOpts{})
   707  	if err != nil {
   708  		t.Fatalf("Failed computing HASH [%s]", err)
   709  	}
   710  
   711  	signature, err := currentBCCSP.Sign(k, digest, nil)
   712  	if err != nil {
   713  		t.Fatalf("Failed generating ECDSA signature [%s]", err)
   714  	}
   715  
   716  	valid, err := currentBCCSP.Verify(pk2, signature, digest, nil)
   717  	if err != nil {
   718  		t.Fatalf("Failed verifying ECDSA signature [%s]", err)
   719  	}
   720  	if !valid {
   721  		t.Fatal("Failed verifying ECDSA signature. Signature not valid.")
   722  	}
   723  }
   724  
   725  func TestECDSAKeyImportFromECDSAPublicKey(t *testing.T) {
   726  	if testing.Short() {
   727  		t.Skip("Skipping TestECDSAKeyImportFromECDSAPublicKey")
   728  	}
   729  	// Generate an ECDSA key
   730  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   731  	if err != nil {
   732  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   733  	}
   734  
   735  	// Export the public key
   736  	pk, err := k.PublicKey()
   737  	if err != nil {
   738  		t.Fatalf("Failed getting ECDSA public key [%s]", err)
   739  	}
   740  
   741  	pkRaw, err := pk.Bytes()
   742  	if err != nil {
   743  		t.Fatalf("Failed getting ECDSA raw public key [%s]", err)
   744  	}
   745  
   746  	pub, err := utils.DERToPublicKey(pkRaw)
   747  	if err != nil {
   748  		t.Fatalf("Failed converting raw to ecdsa.PublicKey [%s]", err)
   749  	}
   750  
   751  	// Import the ecdsa.PublicKey
   752  	pk2, err := currentBCCSP.KeyImport(pub, &bccsp.ECDSAGoPublicKeyImportOpts{Temporary: false})
   753  	if err != nil {
   754  		t.Fatalf("Failed importing ECDSA public key [%s]", err)
   755  	}
   756  	if pk2 == nil {
   757  		t.Fatal("Failed importing ECDSA public key. Return BCCSP key cannot be nil.")
   758  	}
   759  
   760  	// Sign and verify with the imported public key
   761  	msg := []byte("Hello World")
   762  
   763  	digest, err := currentBCCSP.Hash(msg, &bccsp.SHAOpts{})
   764  	if err != nil {
   765  		t.Fatalf("Failed computing HASH [%s]", err)
   766  	}
   767  
   768  	signature, err := currentBCCSP.Sign(k, digest, nil)
   769  	if err != nil {
   770  		t.Fatalf("Failed generating ECDSA signature [%s]", err)
   771  	}
   772  
   773  	valid, err := currentBCCSP.Verify(pk2, signature, digest, nil)
   774  	if err != nil {
   775  		t.Fatalf("Failed verifying ECDSA signature [%s]", err)
   776  	}
   777  	if !valid {
   778  		t.Fatal("Failed verifying ECDSA signature. Signature not valid.")
   779  	}
   780  }
   781  
   782  func TestKeyImportFromX509ECDSAPublicKey(t *testing.T) {
   783  	if testing.Short() {
   784  		t.Skip("Skipping TestKeyImportFromX509ECDSAPublicKey")
   785  	}
   786  	// Generate an ECDSA key
   787  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   788  	if err != nil {
   789  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   790  	}
   791  
   792  	// Generate a self-signed certificate
   793  	testExtKeyUsage := []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth}
   794  	testUnknownExtKeyUsage := []asn1.ObjectIdentifier{[]int{1, 2, 3}, []int{2, 59, 1}}
   795  	extraExtensionData := []byte("extra extension")
   796  	commonName := "test.example.com"
   797  	template := x509.Certificate{
   798  		SerialNumber: big.NewInt(1),
   799  		Subject: pkix.Name{
   800  			CommonName:   commonName,
   801  			Organization: []string{"Σ Acme Co"},
   802  			Country:      []string{"US"},
   803  			ExtraNames: []pkix.AttributeTypeAndValue{
   804  				{
   805  					Type:  []int{2, 5, 4, 42},
   806  					Value: "Gopher",
   807  				},
   808  				// This should override the Country, above.
   809  				{
   810  					Type:  []int{2, 5, 4, 6},
   811  					Value: "NL",
   812  				},
   813  			},
   814  		},
   815  		NotBefore: time.Now().Add(-1 * time.Hour),
   816  		NotAfter:  time.Now().Add(1 * time.Hour),
   817  
   818  		SignatureAlgorithm: x509.ECDSAWithSHA256,
   819  
   820  		SubjectKeyId: []byte{1, 2, 3, 4},
   821  		KeyUsage:     x509.KeyUsageCertSign,
   822  
   823  		ExtKeyUsage:        testExtKeyUsage,
   824  		UnknownExtKeyUsage: testUnknownExtKeyUsage,
   825  
   826  		BasicConstraintsValid: true,
   827  		IsCA:                  true,
   828  
   829  		OCSPServer:            []string{"http://ocurrentBCCSP.example.com"},
   830  		IssuingCertificateURL: []string{"http://crt.example.com/ca1.crt"},
   831  
   832  		DNSNames:       []string{"test.example.com"},
   833  		EmailAddresses: []string{"gopher@golang.org"},
   834  		IPAddresses:    []net.IP{net.IPv4(127, 0, 0, 1).To4(), net.ParseIP("2001:4860:0:2001::68")},
   835  
   836  		PolicyIdentifiers:   []asn1.ObjectIdentifier{[]int{1, 2, 3}},
   837  		PermittedDNSDomains: []string{".example.com", "example.com"},
   838  
   839  		CRLDistributionPoints: []string{"http://crl1.example.com/ca1.crl", "http://crl2.example.com/ca1.crl"},
   840  
   841  		ExtraExtensions: []pkix.Extension{
   842  			{
   843  				Id:    []int{1, 2, 3, 4},
   844  				Value: extraExtensionData,
   845  			},
   846  		},
   847  	}
   848  
   849  	cryptoSigner, err := signer.New(currentBCCSP, k)
   850  	if err != nil {
   851  		t.Fatalf("Failed initializing CyrptoSigner [%s]", err)
   852  	}
   853  
   854  	// Export the public key
   855  	pk, err := k.PublicKey()
   856  	if err != nil {
   857  		t.Fatalf("Failed getting ECDSA public key [%s]", err)
   858  	}
   859  
   860  	pkRaw, err := pk.Bytes()
   861  	if err != nil {
   862  		t.Fatalf("Failed getting ECDSA raw public key [%s]", err)
   863  	}
   864  
   865  	pub, err := utils.DERToPublicKey(pkRaw)
   866  	if err != nil {
   867  		t.Fatalf("Failed converting raw to ECDSA.PublicKey [%s]", err)
   868  	}
   869  
   870  	certRaw, err := x509.CreateCertificate(rand.Reader, &template, &template, pub, cryptoSigner)
   871  	if err != nil {
   872  		t.Fatalf("Failed generating self-signed certificate [%s]", err)
   873  	}
   874  
   875  	cert, err := x509.ParseCertificate(certRaw)
   876  	if err != nil {
   877  		t.Fatalf("Failed generating X509 certificate object from raw [%s]", err)
   878  	}
   879  
   880  	// Import the certificate's public key
   881  	pk2, err := currentBCCSP.KeyImport(cert, &bccsp.X509PublicKeyImportOpts{Temporary: false})
   882  
   883  	if err != nil {
   884  		t.Fatalf("Failed importing ECDSA public key [%s]", err)
   885  	}
   886  	if pk2 == nil {
   887  		t.Fatal("Failed importing ECDSA public key. Return BCCSP key cannot be nil.")
   888  	}
   889  
   890  	// Sign and verify with the imported public key
   891  	msg := []byte("Hello World")
   892  
   893  	digest, err := currentBCCSP.Hash(msg, &bccsp.SHAOpts{})
   894  	if err != nil {
   895  		t.Fatalf("Failed computing HASH [%s]", err)
   896  	}
   897  
   898  	signature, err := currentBCCSP.Sign(k, digest, nil)
   899  	if err != nil {
   900  		t.Fatalf("Failed generating ECDSA signature [%s]", err)
   901  	}
   902  
   903  	valid, err := currentBCCSP.Verify(pk2, signature, digest, nil)
   904  	if err != nil {
   905  		t.Fatalf("Failed verifying ECDSA signature [%s]", err)
   906  	}
   907  	if !valid {
   908  		t.Fatal("Failed verifying ECDSA signature. Signature not valid.")
   909  	}
   910  }
   911  
   912  func TestECDSASignatureEncoding(t *testing.T) {
   913  	if testing.Short() {
   914  		t.Skip("Skipping TestECDSASignatureEncoding")
   915  	}
   916  	v := []byte{0x30, 0x07, 0x02, 0x01, 0x8F, 0x02, 0x02, 0xff, 0xf1}
   917  	_, err := asn1.Unmarshal(v, &utils.ECDSASignature{})
   918  	if err == nil {
   919  		t.Fatalf("Unmarshalling should fail for [% x]", v)
   920  	}
   921  	t.Logf("Unmarshalling correctly failed for [% x] [%s]", v, err)
   922  
   923  	v = []byte{0x30, 0x07, 0x02, 0x01, 0x8F, 0x02, 0x02, 0x00, 0x01}
   924  	_, err = asn1.Unmarshal(v, &utils.ECDSASignature{})
   925  	if err == nil {
   926  		t.Fatalf("Unmarshalling should fail for [% x]", v)
   927  	}
   928  	t.Logf("Unmarshalling correctly failed for [% x] [%s]", v, err)
   929  
   930  	v = []byte{0x30, 0x07, 0x02, 0x01, 0x8F, 0x02, 0x81, 0x01, 0x01}
   931  	_, err = asn1.Unmarshal(v, &utils.ECDSASignature{})
   932  	if err == nil {
   933  		t.Fatalf("Unmarshalling should fail for [% x]", v)
   934  	}
   935  	t.Logf("Unmarshalling correctly failed for [% x] [%s]", v, err)
   936  
   937  	v = []byte{0x30, 0x07, 0x02, 0x01, 0x8F, 0x02, 0x81, 0x01, 0x8F}
   938  	_, err = asn1.Unmarshal(v, &utils.ECDSASignature{})
   939  	if err == nil {
   940  		t.Fatalf("Unmarshalling should fail for [% x]", v)
   941  	}
   942  	t.Logf("Unmarshalling correctly failed for [% x] [%s]", v, err)
   943  
   944  	v = []byte{0x30, 0x0A, 0x02, 0x01, 0x8F, 0x02, 0x05, 0x00, 0x00, 0x00, 0x00, 0x8F}
   945  	_, err = asn1.Unmarshal(v, &utils.ECDSASignature{})
   946  	if err == nil {
   947  		t.Fatalf("Unmarshalling should fail for [% x]", v)
   948  	}
   949  	t.Logf("Unmarshalling correctly failed for [% x] [%s]", v, err)
   950  
   951  }
   952  
   953  func TestECDSALowS(t *testing.T) {
   954  	if testing.Short() {
   955  		t.Skip("Skipping TestECDSALowS")
   956  	}
   957  	// Ensure that signature with low-S are generated
   958  	k, err := currentBCCSP.KeyGen(&bccsp.ECDSAKeyGenOpts{Temporary: false})
   959  	if err != nil {
   960  		t.Fatalf("Failed generating ECDSA key [%s]", err)
   961  	}
   962  
   963  	msg := []byte("Hello World")
   964  
   965  	digest, err := currentBCCSP.Hash(msg, &bccsp.SHAOpts{})
   966  	if err != nil {
   967  		t.Fatalf("Failed computing HASH [%s]", err)
   968  	}
   969  
   970  	signature, err := currentBCCSP.Sign(k, digest, nil)
   971  	if err != nil {
   972  		t.Fatalf("Failed generating ECDSA signature [%s]", err)
   973  	}
   974  
   975  	R, S, err := utils.UnmarshalECDSASignature(signature)
   976  	if err != nil {
   977  		t.Fatalf("Failed unmarshalling signature [%s]", err)
   978  	}
   979  
   980  	if S.Cmp(utils.GetCurveHalfOrdersAt(k.(*ecdsaPrivateKey).pub.pub.Curve)) >= 0 {
   981  		t.Fatal("Invalid signature. It must have low-S")
   982  	}
   983  
   984  	valid, err := currentBCCSP.Verify(k, signature, digest, nil)
   985  	if err != nil {
   986  		t.Fatalf("Failed verifying ECDSA signature [%s]", err)
   987  	}
   988  	if !valid {
   989  		t.Fatal("Failed verifying ECDSA signature. Signature not valid.")
   990  	}
   991  
   992  	// Ensure that signature with high-S are rejected.
   993  	for {
   994  		R, S, err = currentBCCSP.(*impl).signP11ECDSA(k.SKI(), digest)
   995  		if err != nil {
   996  			t.Fatalf("Failed generating signature [%s]", err)
   997  		}
   998  
   999  		if S.Cmp(utils.GetCurveHalfOrdersAt(k.(*ecdsaPrivateKey).pub.pub.Curve)) > 0 {
  1000  			break
  1001  		}
  1002  	}
  1003  
  1004  	sig, err := utils.MarshalECDSASignature(R, S)
  1005  	if err != nil {
  1006  		t.Fatalf("Failing unmarshalling signature [%s]", err)
  1007  	}
  1008  
  1009  	valid, err = currentBCCSP.Verify(k, sig, digest, nil)
  1010  	if err == nil {
  1011  		t.Fatal("Failed verifying ECDSA signature. It must fail for a signature with high-S")
  1012  	}
  1013  	if valid {
  1014  		t.Fatal("Failed verifying ECDSA signature. It must fail for a signature with high-S")
  1015  	}
  1016  }
  1017  
  1018  func TestAESKeyGen(t *testing.T) {
  1019  	if testing.Short() {
  1020  		t.Skip("Skipping TestAESKeyGen")
  1021  	}
  1022  	k, err := currentBCCSP.KeyGen(&bccsp.AESKeyGenOpts{Temporary: false})
  1023  	if err != nil {
  1024  		t.Fatalf("Failed generating AES_256 key [%s]", err)
  1025  	}
  1026  	if k == nil {
  1027  		t.Fatal("Failed generating AES_256 key. Key must be different from nil")
  1028  	}
  1029  	if !k.Private() {
  1030  		t.Fatal("Failed generating AES_256 key. Key should be private")
  1031  	}
  1032  	if !k.Symmetric() {
  1033  		t.Fatal("Failed generating AES_256 key. Key should be symmetric")
  1034  	}
  1035  
  1036  	pk, err := k.PublicKey()
  1037  	if err == nil {
  1038  		t.Fatal("Error should be different from nil in this case")
  1039  	}
  1040  	if pk != nil {
  1041  		t.Fatal("Return value should be equal to nil in this case")
  1042  	}
  1043  }
  1044  
  1045  func TestAESEncrypt(t *testing.T) {
  1046  	if testing.Short() {
  1047  		t.Skip("Skipping TestAESEncrypt")
  1048  	}
  1049  	k, err := currentBCCSP.KeyGen(&bccsp.AESKeyGenOpts{Temporary: false})
  1050  	if err != nil {
  1051  		t.Fatalf("Failed generating AES_256 key [%s]", err)
  1052  	}
  1053  
  1054  	ct, err := currentBCCSP.Encrypt(k, []byte("Hello World"), &bccsp.AESCBCPKCS7ModeOpts{})
  1055  	if err != nil {
  1056  		t.Fatalf("Failed encrypting [%s]", err)
  1057  	}
  1058  	if len(ct) == 0 {
  1059  		t.Fatal("Failed encrypting. Nil ciphertext")
  1060  	}
  1061  }
  1062  
  1063  func TestAESDecrypt(t *testing.T) {
  1064  	if testing.Short() {
  1065  		t.Skip("Skipping TestAESDecrypt")
  1066  	}
  1067  	k, err := currentBCCSP.KeyGen(&bccsp.AESKeyGenOpts{Temporary: false})
  1068  	if err != nil {
  1069  		t.Fatalf("Failed generating AES_256 key [%s]", err)
  1070  	}
  1071  
  1072  	msg := []byte("Hello World")
  1073  
  1074  	ct, err := currentBCCSP.Encrypt(k, msg, &bccsp.AESCBCPKCS7ModeOpts{})
  1075  	if err != nil {
  1076  		t.Fatalf("Failed encrypting [%s]", err)
  1077  	}
  1078  
  1079  	pt, err := currentBCCSP.Decrypt(k, ct, bccsp.AESCBCPKCS7ModeOpts{})
  1080  	if err != nil {
  1081  		t.Fatalf("Failed decrypting [%s]", err)
  1082  	}
  1083  	if len(ct) == 0 {
  1084  		t.Fatal("Failed decrypting. Nil plaintext")
  1085  	}
  1086  
  1087  	if !bytes.Equal(msg, pt) {
  1088  		t.Fatalf("Failed decrypting. Decrypted plaintext is different from the original. [%x][%x]", msg, pt)
  1089  	}
  1090  }
  1091  
  1092  func TestHMACTruncated256KeyDerivOverAES256Key(t *testing.T) {
  1093  	if testing.Short() {
  1094  		t.Skip("Skipping TestHMACTruncated256KeyDerivOverAES256Key")
  1095  	}
  1096  	k, err := currentBCCSP.KeyGen(&bccsp.AESKeyGenOpts{Temporary: false})
  1097  	if err != nil {
  1098  		t.Fatalf("Failed generating AES_256 key [%s]", err)
  1099  	}
  1100  
  1101  	hmcaedKey, err := currentBCCSP.KeyDeriv(k, &bccsp.HMACTruncated256AESDeriveKeyOpts{Temporary: false, Arg: []byte{1}})
  1102  	if err != nil {
  1103  		t.Fatalf("Failed HMACing AES_256 key [%s]", err)
  1104  	}
  1105  	if k == nil {
  1106  		t.Fatal("Failed HMACing AES_256 key. HMACed Key must be different from nil")
  1107  	}
  1108  	if !hmcaedKey.Private() {
  1109  		t.Fatal("Failed HMACing AES_256 key. HMACed Key should be private")
  1110  	}
  1111  	if !hmcaedKey.Symmetric() {
  1112  		t.Fatal("Failed HMACing AES_256 key. HMACed Key should be asymmetric")
  1113  	}
  1114  	raw, err := hmcaedKey.Bytes()
  1115  	if err == nil {
  1116  		t.Fatal("Failed marshalling to bytes. Operation must be forbidden")
  1117  	}
  1118  	if len(raw) != 0 {
  1119  		t.Fatal("Failed marshalling to bytes. Operation must return 0 bytes")
  1120  	}
  1121  
  1122  	msg := []byte("Hello World")
  1123  
  1124  	ct, err := currentBCCSP.Encrypt(hmcaedKey, msg, &bccsp.AESCBCPKCS7ModeOpts{})
  1125  	if err != nil {
  1126  		t.Fatalf("Failed encrypting [%s]", err)
  1127  	}
  1128  
  1129  	pt, err := currentBCCSP.Decrypt(hmcaedKey, ct, bccsp.AESCBCPKCS7ModeOpts{})
  1130  	if err != nil {
  1131  		t.Fatalf("Failed decrypting [%s]", err)
  1132  	}
  1133  	if len(ct) == 0 {
  1134  		t.Fatal("Failed decrypting. Nil plaintext")
  1135  	}
  1136  
  1137  	if !bytes.Equal(msg, pt) {
  1138  		t.Fatalf("Failed decrypting. Decrypted plaintext is different from the original. [%x][%x]", msg, pt)
  1139  	}
  1140  
  1141  }
  1142  
  1143  func TestHMACKeyDerivOverAES256Key(t *testing.T) {
  1144  	if testing.Short() {
  1145  		t.Skip("Skipping TestHMACKeyDerivOverAES256Key")
  1146  	}
  1147  	k, err := currentBCCSP.KeyGen(&bccsp.AESKeyGenOpts{Temporary: false})
  1148  	if err != nil {
  1149  		t.Fatalf("Failed generating AES_256 key [%s]", err)
  1150  	}
  1151  
  1152  	hmcaedKey, err := currentBCCSP.KeyDeriv(k, &bccsp.HMACDeriveKeyOpts{Temporary: false, Arg: []byte{1}})
  1153  
  1154  	if err != nil {
  1155  		t.Fatalf("Failed HMACing AES_256 key [%s]", err)
  1156  	}
  1157  	if k == nil {
  1158  		t.Fatal("Failed HMACing AES_256 key. HMACed Key must be different from nil")
  1159  	}
  1160  	if !hmcaedKey.Private() {
  1161  		t.Fatal("Failed HMACing AES_256 key. HMACed Key should be private")
  1162  	}
  1163  	if !hmcaedKey.Symmetric() {
  1164  		t.Fatal("Failed HMACing AES_256 key. HMACed Key should be asymmetric")
  1165  	}
  1166  	raw, err := hmcaedKey.Bytes()
  1167  	if err != nil {
  1168  		t.Fatalf("Failed marshalling to bytes [%s]", err)
  1169  	}
  1170  	if len(raw) == 0 {
  1171  		t.Fatal("Failed marshalling to bytes. 0 bytes")
  1172  	}
  1173  }
  1174  
  1175  func TestAES256KeyImport(t *testing.T) {
  1176  	if testing.Short() {
  1177  		t.Skip("Skipping TestAES256KeyImport")
  1178  	}
  1179  	raw, err := sw.GetRandomBytes(32)
  1180  	if err != nil {
  1181  		t.Fatalf("Failed generating AES key [%s]", err)
  1182  	}
  1183  
  1184  	k, err := currentBCCSP.KeyImport(raw, &bccsp.AES256ImportKeyOpts{Temporary: false})
  1185  	if err != nil {
  1186  		t.Fatalf("Failed importing AES_256 key [%s]", err)
  1187  	}
  1188  	if k == nil {
  1189  		t.Fatal("Failed importing AES_256 key. Imported Key must be different from nil")
  1190  	}
  1191  	if !k.Private() {
  1192  		t.Fatal("Failed HMACing AES_256 key. Imported Key should be private")
  1193  	}
  1194  	if !k.Symmetric() {
  1195  		t.Fatal("Failed HMACing AES_256 key. Imported Key should be asymmetric")
  1196  	}
  1197  	raw, err = k.Bytes()
  1198  	if err == nil {
  1199  		t.Fatal("Failed marshalling to bytes. Marshalling must fail.")
  1200  	}
  1201  	if len(raw) != 0 {
  1202  		t.Fatal("Failed marshalling to bytes. Output should be 0 bytes")
  1203  	}
  1204  
  1205  	msg := []byte("Hello World")
  1206  
  1207  	ct, err := currentBCCSP.Encrypt(k, msg, &bccsp.AESCBCPKCS7ModeOpts{})
  1208  	if err != nil {
  1209  		t.Fatalf("Failed encrypting [%s]", err)
  1210  	}
  1211  
  1212  	pt, err := currentBCCSP.Decrypt(k, ct, bccsp.AESCBCPKCS7ModeOpts{})
  1213  	if err != nil {
  1214  		t.Fatalf("Failed decrypting [%s]", err)
  1215  	}
  1216  	if len(ct) == 0 {
  1217  		t.Fatal("Failed decrypting. Nil plaintext")
  1218  	}
  1219  
  1220  	if !bytes.Equal(msg, pt) {
  1221  		t.Fatalf("Failed decrypting. Decrypted plaintext is different from the original. [%x][%x]", msg, pt)
  1222  	}
  1223  }
  1224  
  1225  func TestAES256KeyImportBadPaths(t *testing.T) {
  1226  	if testing.Short() {
  1227  		t.Skip("Skipping TestAES256KeyImportBadPaths")
  1228  	}
  1229  	_, err := currentBCCSP.KeyImport(nil, &bccsp.AES256ImportKeyOpts{Temporary: false})
  1230  	if err == nil {
  1231  		t.Fatal("Failed importing key. Must fail on importing nil key")
  1232  	}
  1233  
  1234  	_, err = currentBCCSP.KeyImport([]byte{1}, &bccsp.AES256ImportKeyOpts{Temporary: false})
  1235  	if err == nil {
  1236  		t.Fatal("Failed importing key. Must fail on importing a key with an invalid length")
  1237  	}
  1238  }
  1239  
  1240  func TestAES256KeyGenSKI(t *testing.T) {
  1241  	if testing.Short() {
  1242  		t.Skip("Skipping TestAES256KeyGenSKI")
  1243  	}
  1244  	k, err := currentBCCSP.KeyGen(&bccsp.AESKeyGenOpts{Temporary: false})
  1245  	if err != nil {
  1246  		t.Fatalf("Failed generating AES_256 key [%s]", err)
  1247  	}
  1248  
  1249  	k2, err := currentBCCSP.GetKey(k.SKI())
  1250  	if err != nil {
  1251  		t.Fatalf("Failed getting AES_256 key [%s]", err)
  1252  	}
  1253  	if k2 == nil {
  1254  		t.Fatal("Failed getting AES_256 key. Key must be different from nil")
  1255  	}
  1256  	if !k2.Private() {
  1257  		t.Fatal("Failed getting AES_256 key. Key should be private")
  1258  	}
  1259  	if !k2.Symmetric() {
  1260  		t.Fatal("Failed getting AES_256 key. Key should be symmetric")
  1261  	}
  1262  
  1263  	// Check that the SKIs are the same
  1264  	if !bytes.Equal(k.SKI(), k2.SKI()) {
  1265  		t.Fatalf("SKIs are different [%x]!=[%x]", k.SKI(), k2.SKI())
  1266  	}
  1267  
  1268  }
  1269  
  1270  func TestSHA(t *testing.T) {
  1271  	if testing.Short() {
  1272  		t.Skip("Skipping TestSHA")
  1273  	}
  1274  	for i := 0; i < 100; i++ {
  1275  		b, err := sw.GetRandomBytes(i)
  1276  		if err != nil {
  1277  			t.Fatalf("Failed getting random bytes [%s]", err)
  1278  		}
  1279  
  1280  		h1, err := currentBCCSP.Hash(b, &bccsp.SHAOpts{})
  1281  		if err != nil {
  1282  			t.Fatalf("Failed computing SHA [%s]", err)
  1283  		}
  1284  
  1285  		var h hash.Hash
  1286  		switch currentTestConfig.hashFamily {
  1287  		case "SHA2":
  1288  			switch currentTestConfig.securityLevel {
  1289  			case 256:
  1290  				h = sha256.New()
  1291  			case 384:
  1292  				h = sha512.New384()
  1293  			default:
  1294  				t.Fatalf("Invalid security level [%d]", currentTestConfig.securityLevel)
  1295  			}
  1296  		case "SHA3":
  1297  			switch currentTestConfig.securityLevel {
  1298  			case 256:
  1299  				h = sha3.New256()
  1300  			case 384:
  1301  				h = sha3.New384()
  1302  			default:
  1303  				t.Fatalf("Invalid security level [%d]", currentTestConfig.securityLevel)
  1304  			}
  1305  		default:
  1306  			t.Fatalf("Invalid hash family [%s]", currentTestConfig.hashFamily)
  1307  		}
  1308  
  1309  		h.Write(b)
  1310  		h2 := h.Sum(nil)
  1311  		if !bytes.Equal(h1, h2) {
  1312  			t.Fatalf("Discrempancy found in HASH result [%x], [%x]!=[%x]", b, h1, h2)
  1313  		}
  1314  	}
  1315  }
  1316  
  1317  func getCryptoHashIndex(t *testing.T) crypto.Hash {
  1318  	switch currentTestConfig.hashFamily {
  1319  	case "SHA2":
  1320  		switch currentTestConfig.securityLevel {
  1321  		case 256:
  1322  			return crypto.SHA256
  1323  		case 384:
  1324  			return crypto.SHA384
  1325  		default:
  1326  			t.Fatalf("Invalid security level [%d]", currentTestConfig.securityLevel)
  1327  		}
  1328  	case "SHA3":
  1329  		switch currentTestConfig.securityLevel {
  1330  		case 256:
  1331  			return crypto.SHA3_256
  1332  		case 384:
  1333  			return crypto.SHA3_384
  1334  		default:
  1335  			t.Fatalf("Invalid security level [%d]", currentTestConfig.securityLevel)
  1336  		}
  1337  	default:
  1338  		t.Fatalf("Invalid hash family [%s]", currentTestConfig.hashFamily)
  1339  	}
  1340  
  1341  	return crypto.SHA3_256
  1342  }