2013-12-19 18:36:26 -05:00
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
utils: Move base16 procedures to (guix base16).
* guix/utils.scm (bytevector->base16-string, base16-string->bytevector):
Move to...
* guix/base16.scm: ... here. New file.
* tests/utils.scm ("bytevector->base16-string->bytevector"): Move to...
* tests/base16.scm: ... here. New file.
* Makefile.am (MODULES): Add guix/base16.scm.
(SCM_TESTS): Add tests/base16.scm.
* build-aux/download.scm, guix/derivations.scm,
guix/docker.scm, guix/import/snix.scm, guix/pk-crypto.scm,
guix/scripts/authenticate.scm, guix/scripts/download.scm,
guix/scripts/hash.scm, guix/store.scm, tests/hash.scm,
tests/pk-crypto.scm: Adjust imports accordingly.
2017-03-15 16:54:34 -04:00
|
|
|
;;; Copyright © 2013, 2014, 2017 Ludovic Courtès <ludo@gnu.org>
|
2013-12-19 18:36:26 -05:00
|
|
|
;;;
|
|
|
|
;;; This file is part of GNU Guix.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
;;; your option) any later version.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
;;;
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
(define-module (test-pk-crypto)
|
|
|
|
#:use-module (guix pk-crypto)
|
|
|
|
#:use-module (guix utils)
|
utils: Move base16 procedures to (guix base16).
* guix/utils.scm (bytevector->base16-string, base16-string->bytevector):
Move to...
* guix/base16.scm: ... here. New file.
* tests/utils.scm ("bytevector->base16-string->bytevector"): Move to...
* tests/base16.scm: ... here. New file.
* Makefile.am (MODULES): Add guix/base16.scm.
(SCM_TESTS): Add tests/base16.scm.
* build-aux/download.scm, guix/derivations.scm,
guix/docker.scm, guix/import/snix.scm, guix/pk-crypto.scm,
guix/scripts/authenticate.scm, guix/scripts/download.scm,
guix/scripts/hash.scm, guix/store.scm, tests/hash.scm,
tests/pk-crypto.scm: Adjust imports accordingly.
2017-03-15 16:54:34 -04:00
|
|
|
#:use-module (guix base16)
|
2013-12-19 18:36:26 -05:00
|
|
|
#:use-module (guix hash)
|
|
|
|
#:use-module (srfi srfi-1)
|
2013-12-20 09:22:15 -05:00
|
|
|
#:use-module (srfi srfi-11)
|
|
|
|
#:use-module (srfi srfi-26)
|
2013-12-19 18:36:26 -05:00
|
|
|
#:use-module (srfi srfi-64)
|
|
|
|
#:use-module (rnrs bytevectors)
|
|
|
|
#:use-module (rnrs io ports)
|
|
|
|
#:use-module (ice-9 match))
|
|
|
|
|
|
|
|
;; Test the (guix pk-crypto) module.
|
|
|
|
|
|
|
|
(define %key-pair
|
2014-03-19 16:40:10 -04:00
|
|
|
;; RSA key pair that was generated with:
|
2013-12-27 17:32:26 -05:00
|
|
|
;; (generate-key (string->canonical-sexp "(genkey (rsa (nbits 4:1024)))"))
|
2013-12-19 18:36:26 -05:00
|
|
|
;; which takes a bit of time.
|
|
|
|
"(key-data
|
|
|
|
(public-key
|
|
|
|
(rsa
|
|
|
|
(n #00C1F764069F54FFE93A126B02328903E984E4AE3AF6DF402B5B6B3907911B88C385F1BA76A002EC9DEA109A5228EF0E62EE31A06D1A5861CAB474F6C857AC66EB65A1905F25BBA1869579E73A3B7FED13AF5A1667326F88CDFC2FF24B03C14FD1384AA7E73CA89572880B606E3A974E15347963FC7B6378574936A47580DBCB45#)
|
|
|
|
(e #010001#)))
|
|
|
|
(private-key
|
|
|
|
(rsa
|
|
|
|
(n #00C1F764069F54FFE93A126B02328903E984E4AE3AF6DF402B5B6B3907911B88C385F1BA76A002EC9DEA109A5228EF0E62EE31A06D1A5861CAB474F6C857AC66EB65A1905F25BBA1869579E73A3B7FED13AF5A1667326F88CDFC2FF24B03C14FD1384AA7E73CA89572880B606E3A974E15347963FC7B6378574936A47580DBCB45#)
|
|
|
|
(e #010001#)
|
|
|
|
(d #58CAD84653D0046A8EC3F9AA82D9C829B145422109FC3F12DA01A694B92FA296E70D366FB166454D30E632CEE3A033B4C41781BA10325F69FCDC0250CA19C8EEB352FA085992494098DB133E682ED38A931701F0DED1A1E508F4341A4FB446A04F019427C7CB3C44F251EEA9D386100DA80F125E0FD5CE1B0DFEC6D21516EACD#)
|
|
|
|
(p #00D47F185147EC39393CCDA4E7323FFC20FC8B8073E2A54DD63BA392A66975E4204CA48572496A9DFD7522436B852C07472A5AB25B7706F7C14E6F33FBC420FF3B#)
|
|
|
|
(q #00E9AD22F158060BC9AE3601DA623AFC60FFF3058795802CA92371C00097335CF9A23D7782DE353C9DBA93D7BB99E6A24A411107605E722481C5C191F80D7EB77F#)
|
|
|
|
(u #59B45B95AE01A7A7370FAFDB08FE73A4793CE37F228961B09B1B1E7DDAD9F8D3E28F5C5E8B4B067E6B8E0BBF3F690B42991A79E46108DDCDA2514323A66964DE#))))")
|
|
|
|
|
2014-03-19 16:40:10 -04:00
|
|
|
(define %ecc-key-pair
|
|
|
|
;; Ed25519 key pair generated with:
|
|
|
|
;; (generate-key (string->canonical-sexp "(genkey (ecdsa (curve Ed25519) (flags rfc6979 transient)))"))
|
|
|
|
"(key-data
|
|
|
|
(public-key
|
|
|
|
(ecc
|
|
|
|
(curve Ed25519)
|
|
|
|
(q #94869C1B9E69DB8DD910B7F7F4D6E56A63A964A59AE8F90F6703ACDDF6F50C81#)))
|
|
|
|
(private-key
|
|
|
|
(ecc
|
|
|
|
(curve Ed25519)
|
|
|
|
(q #94869C1B9E69DB8DD910B7F7F4D6E56A63A964A59AE8F90F6703ACDDF6F50C81#)
|
|
|
|
(d #6EFB32D0B4EC6B3237B523539F1979379B82726AAA605EB2FBA6775B2B777B78#))))")
|
|
|
|
|
2013-12-19 18:36:26 -05:00
|
|
|
(test-begin "pk-crypto")
|
|
|
|
|
2014-04-21 19:36:31 -04:00
|
|
|
(test-assert "version"
|
|
|
|
(gcrypt-version))
|
|
|
|
|
2013-12-20 18:09:51 -05:00
|
|
|
(let ((sexps '("(foo bar)"
|
|
|
|
|
|
|
|
;; In Libgcrypt 1.5.3 the following integer is rendered as
|
|
|
|
;; binary, whereas in 1.6.0 it's rendered as is (hexadecimal.)
|
|
|
|
;;"#C0FFEE#"
|
|
|
|
|
2013-12-19 18:36:26 -05:00
|
|
|
"(genkey \n (rsa \n (nbits \"1024\")\n )\n )")))
|
2013-12-27 17:32:26 -05:00
|
|
|
(test-equal "string->canonical-sexp->string"
|
2013-12-19 18:36:26 -05:00
|
|
|
sexps
|
2013-12-27 17:32:26 -05:00
|
|
|
(let ((sexps (map string->canonical-sexp sexps)))
|
|
|
|
(and (every canonical-sexp? sexps)
|
|
|
|
(map (compose string-trim-both canonical-sexp->string) sexps)))))
|
2013-12-19 18:36:26 -05:00
|
|
|
|
|
|
|
(gc) ; stress test!
|
|
|
|
|
|
|
|
(let ((sexps `(("(foo bar)" foo -> "(foo bar)")
|
|
|
|
("(foo (bar (baz 3:123)))" baz -> "(baz \"123\")")
|
|
|
|
("(foo (bar 3:123))" baz -> #f))))
|
|
|
|
(test-equal "find-sexp-token"
|
|
|
|
(map (match-lambda
|
|
|
|
((_ _ '-> expected)
|
|
|
|
expected))
|
|
|
|
sexps)
|
|
|
|
(map (match-lambda
|
|
|
|
((input token '-> _)
|
2013-12-27 17:32:26 -05:00
|
|
|
(let ((sexp (find-sexp-token (string->canonical-sexp input) token)))
|
2013-12-19 18:36:26 -05:00
|
|
|
(and sexp
|
2013-12-27 17:32:26 -05:00
|
|
|
(string-trim-both (canonical-sexp->string sexp))))))
|
2013-12-19 18:36:26 -05:00
|
|
|
sexps)))
|
|
|
|
|
|
|
|
(gc)
|
|
|
|
|
2013-12-28 09:47:35 -05:00
|
|
|
(test-equal "canonical-sexp-length"
|
|
|
|
'(0 1 2 4 0 0)
|
|
|
|
(map (compose canonical-sexp-length string->canonical-sexp)
|
|
|
|
'("()" "(a)" "(a b)" "(a #616263# b #C001#)" "a" "#123456#")))
|
|
|
|
|
|
|
|
(test-equal "canonical-sexp-list?"
|
|
|
|
'(#t #f #t #f)
|
|
|
|
(map (compose canonical-sexp-list? string->canonical-sexp)
|
|
|
|
'("()" "\"abc\"" "(a b c)" "#123456#")))
|
|
|
|
|
|
|
|
(gc)
|
|
|
|
|
2013-12-27 17:32:26 -05:00
|
|
|
(test-equal "canonical-sexp-car + cdr"
|
2013-12-20 09:22:15 -05:00
|
|
|
'("(b \n (c xyz)\n )")
|
2013-12-27 17:32:26 -05:00
|
|
|
(let ((lst (string->canonical-sexp "(a (b (c xyz)))")))
|
2013-12-20 09:22:15 -05:00
|
|
|
(map (lambda (sexp)
|
2013-12-27 17:32:26 -05:00
|
|
|
(and sexp (string-trim-both (canonical-sexp->string sexp))))
|
2013-12-20 09:22:15 -05:00
|
|
|
;; Note: 'car' returns #f when the first element is an atom.
|
2013-12-27 17:32:26 -05:00
|
|
|
(list (canonical-sexp-car (canonical-sexp-cdr lst))))))
|
2013-12-20 09:22:15 -05:00
|
|
|
|
|
|
|
(gc)
|
|
|
|
|
2013-12-27 17:32:26 -05:00
|
|
|
(test-equal "canonical-sexp-nth"
|
2013-12-20 18:09:51 -05:00
|
|
|
'("(b pqr)" "(c \"456\")" "(d xyz)" #f #f)
|
|
|
|
|
2013-12-27 17:32:26 -05:00
|
|
|
(let ((lst (string->canonical-sexp "(a (b 3:pqr) (c 3:456) (d 3:xyz))")))
|
|
|
|
;; XXX: In Libgcrypt 1.5.3, (canonical-sexp-nth lst 0) returns LST, whereas in
|
2013-12-20 18:09:51 -05:00
|
|
|
;; 1.6.0 it returns #f.
|
2013-12-20 09:22:15 -05:00
|
|
|
(map (lambda (sexp)
|
2013-12-27 17:32:26 -05:00
|
|
|
(and sexp (string-trim-both (canonical-sexp->string sexp))))
|
2013-12-20 09:22:15 -05:00
|
|
|
(unfold (cut > <> 5)
|
2013-12-27 17:32:26 -05:00
|
|
|
(cut canonical-sexp-nth lst <>)
|
2013-12-20 09:22:15 -05:00
|
|
|
1+
|
2013-12-20 18:09:51 -05:00
|
|
|
1))))
|
2013-12-20 09:22:15 -05:00
|
|
|
|
|
|
|
(gc)
|
|
|
|
|
2013-12-27 17:32:26 -05:00
|
|
|
(test-equal "canonical-sexp-nth-data"
|
2013-12-28 09:41:48 -05:00
|
|
|
`(Name Otto Meier #f ,(base16-string->bytevector "123456") #f)
|
|
|
|
(let ((lst (string->canonical-sexp
|
|
|
|
"(Name Otto Meier (address Burgplatz) #123456#)")))
|
2013-12-20 09:22:15 -05:00
|
|
|
(unfold (cut > <> 5)
|
2013-12-27 17:32:26 -05:00
|
|
|
(cut canonical-sexp-nth-data lst <>)
|
2013-12-20 09:22:15 -05:00
|
|
|
1+
|
|
|
|
0)))
|
|
|
|
|
2014-04-21 19:36:31 -04:00
|
|
|
(let ((bv (base16-string->bytevector
|
|
|
|
"5eff0b55c9c5f5e87b4e34cd60a2d5654ca1eb78c7b3c67c3179fed1cff07b4c")))
|
|
|
|
(test-equal "hash corrupt due to restrictive locale encoding"
|
|
|
|
bv
|
|
|
|
|
|
|
|
;; In Guix up to 0.6 included this test would fail because at some point
|
|
|
|
;; the hash value would be cropped to ASCII. In practice 'guix
|
|
|
|
;; authenticate' would produce invalid signatures that would fail
|
2014-04-22 05:30:51 -04:00
|
|
|
;; signature verification. See <http://bugs.gnu.org/17312>.
|
2014-04-21 19:36:31 -04:00
|
|
|
(let ((locale (setlocale LC_ALL)))
|
|
|
|
(dynamic-wind
|
|
|
|
(lambda ()
|
|
|
|
(setlocale LC_ALL "C"))
|
|
|
|
(lambda ()
|
|
|
|
(hash-data->bytevector
|
|
|
|
(string->canonical-sexp
|
|
|
|
(canonical-sexp->string
|
|
|
|
(bytevector->hash-data bv "sha256")))))
|
|
|
|
(lambda ()
|
|
|
|
(setlocale LC_ALL locale))))))
|
|
|
|
|
2013-12-20 09:22:15 -05:00
|
|
|
(gc)
|
|
|
|
|
2013-12-19 18:36:26 -05:00
|
|
|
;; XXX: The test below is typically too long as it needs to gather enough entropy.
|
|
|
|
|
|
|
|
;; (test-assert "generate-key"
|
2013-12-27 17:32:26 -05:00
|
|
|
;; (let ((key (generate-key (string->canonical-sexp
|
2013-12-19 18:36:26 -05:00
|
|
|
;; "(genkey (rsa (nbits 3:128)))"))))
|
2013-12-27 17:32:26 -05:00
|
|
|
;; (and (canonical-sexp? key)
|
2013-12-19 18:36:26 -05:00
|
|
|
;; (find-sexp-token key 'key-data)
|
|
|
|
;; (find-sexp-token key 'public-key)
|
|
|
|
;; (find-sexp-token key 'private-key))))
|
|
|
|
|
2013-12-20 09:22:15 -05:00
|
|
|
(test-assert "bytevector->hash-data->bytevector"
|
|
|
|
(let* ((bv (sha256 (string->utf8 "Hello, world.")))
|
|
|
|
(data (bytevector->hash-data bv "sha256")))
|
2013-12-27 17:32:26 -05:00
|
|
|
(and (canonical-sexp? data)
|
2013-12-20 09:22:15 -05:00
|
|
|
(let-values (((value algo) (hash-data->bytevector data)))
|
|
|
|
(and (string=? algo "sha256")
|
|
|
|
(bytevector=? value bv))))))
|
|
|
|
|
2014-03-19 16:40:10 -04:00
|
|
|
(test-equal "key-type"
|
|
|
|
'(rsa ecc)
|
|
|
|
(map (compose key-type
|
|
|
|
(cut find-sexp-token <> 'public-key)
|
|
|
|
string->canonical-sexp)
|
|
|
|
(list %key-pair %ecc-key-pair)))
|
|
|
|
|
2013-12-19 18:36:26 -05:00
|
|
|
(test-assert "sign + verify"
|
2013-12-27 17:32:26 -05:00
|
|
|
(let* ((pair (string->canonical-sexp %key-pair))
|
2014-03-19 16:40:10 -04:00
|
|
|
(secret (find-sexp-token pair 'private-key))
|
|
|
|
(public (find-sexp-token pair 'public-key))
|
|
|
|
(data (bytevector->hash-data
|
|
|
|
(sha256 (string->utf8 "Hello, world."))
|
|
|
|
#:key-type (key-type public)))
|
|
|
|
(sig (sign data secret)))
|
|
|
|
(and (verify sig data public)
|
|
|
|
(not (verify sig
|
|
|
|
(bytevector->hash-data
|
|
|
|
(sha256 (string->utf8 "Hi!"))
|
|
|
|
#:key-type (key-type public))
|
|
|
|
public)))))
|
|
|
|
|
2014-03-20 17:33:52 -04:00
|
|
|
;; Ed25519 appeared in libgcrypt 1.6.0.
|
|
|
|
(test-skip (if (version>? (gcrypt-version) "1.6.0") 0 1))
|
2014-03-19 16:40:10 -04:00
|
|
|
(test-assert "sign + verify, Ed25519"
|
|
|
|
(let* ((pair (string->canonical-sexp %ecc-key-pair))
|
2013-12-19 18:36:26 -05:00
|
|
|
(secret (find-sexp-token pair 'private-key))
|
|
|
|
(public (find-sexp-token pair 'public-key))
|
|
|
|
(data (bytevector->hash-data
|
|
|
|
(sha256 (string->utf8 "Hello, world."))))
|
|
|
|
(sig (sign data secret)))
|
|
|
|
(and (verify sig data public)
|
|
|
|
(not (verify sig
|
|
|
|
(bytevector->hash-data
|
|
|
|
(sha256 (string->utf8 "Hi!")))
|
|
|
|
public)))))
|
|
|
|
|
|
|
|
(gc)
|
|
|
|
|
2013-12-28 10:16:00 -05:00
|
|
|
(test-equal "canonical-sexp->sexp"
|
|
|
|
`((data
|
|
|
|
(flags pkcs1)
|
|
|
|
(hash sha256
|
|
|
|
,(base16-string->bytevector
|
|
|
|
"2749f0ea9f26c6c7be746a9cff8fa4c2f2a02b000070dba78429e9a11f87c6eb")))
|
|
|
|
|
|
|
|
(public-key
|
|
|
|
(rsa
|
|
|
|
(n ,(base16-string->bytevector
|
|
|
|
(string-downcase
|
|
|
|
"00C1F764069F54FFE93A126B02328903E984E4AE3AF6DF402B5B6B3907911B88C385F1BA76A002EC9DEA109A5228EF0E62EE31A06D1A5861CAB474F6C857AC66EB65A1905F25BBA1869579E73A3B7FED13AF5A1667326F88CDFC2FF24B03C14FD1384AA7E73CA89572880B606E3A974E15347963FC7B6378574936A47580DBCB45")))
|
|
|
|
(e ,(base16-string->bytevector
|
|
|
|
"010001")))))
|
|
|
|
|
|
|
|
(list (canonical-sexp->sexp
|
|
|
|
(string->canonical-sexp
|
|
|
|
"(data
|
|
|
|
(flags pkcs1)
|
|
|
|
(hash \"sha256\"
|
|
|
|
#2749f0ea9f26c6c7be746a9cff8fa4c2f2a02b000070dba78429e9a11f87c6eb#))"))
|
|
|
|
|
|
|
|
(canonical-sexp->sexp
|
|
|
|
(find-sexp-token (string->canonical-sexp %key-pair)
|
|
|
|
'public-key))))
|
|
|
|
|
|
|
|
|
|
|
|
(let ((lst
|
|
|
|
`((data
|
|
|
|
(flags pkcs1)
|
|
|
|
(hash sha256
|
|
|
|
,(base16-string->bytevector
|
|
|
|
"2749f0ea9f26c6c7be746a9cff8fa4c2f2a02b000070dba78429e9a11f87c6eb")))
|
|
|
|
|
|
|
|
(public-key
|
|
|
|
(rsa
|
|
|
|
(n ,(base16-string->bytevector
|
|
|
|
(string-downcase
|
|
|
|
"00C1F764069F54FFE93A126B02328903E984E4AE3AF6DF402B5B6B3907911B88C385F1BA76A002EC9DEA109A5228EF0E62EE31A06D1A5861CAB474F6C857AC66EB65A1905F25BBA1869579E73A3B7FED13AF5A1667326F88CDFC2FF24B03C14FD1384AA7E73CA89572880B606E3A974E15347963FC7B6378574936A47580DBCB45")))
|
|
|
|
(e ,(base16-string->bytevector
|
2013-12-30 16:29:12 -05:00
|
|
|
"010001"))))
|
|
|
|
|
|
|
|
,(base16-string->bytevector
|
|
|
|
"2749f0ea9f26c6c7be746a9cff8fa4c2f2a02b000070dba78429e9a11f87c6eb"))))
|
2013-12-28 10:16:00 -05:00
|
|
|
(test-equal "sexp->canonical-sexp->sexp"
|
|
|
|
lst
|
|
|
|
(map (compose canonical-sexp->sexp sexp->canonical-sexp)
|
|
|
|
lst)))
|
|
|
|
|
2013-12-30 16:19:19 -05:00
|
|
|
(let ((sexp `(signature
|
|
|
|
(public-key
|
|
|
|
(rsa
|
|
|
|
(n ,(make-bytevector 1024 1))
|
|
|
|
(e ,(base16-string->bytevector "010001")))))))
|
|
|
|
(test-equal "https://bugs.g10code.com/gnupg/issue1594"
|
|
|
|
;; The gcrypt bug above was primarily affecting our uses in
|
|
|
|
;; 'canonical-sexp->sexp', typically when applied to a signature sexp (in
|
|
|
|
;; 'guix authenticate -verify') with a "big" RSA key, such as 4096 bits.
|
|
|
|
sexp
|
|
|
|
(canonical-sexp->sexp (sexp->canonical-sexp sexp))))
|
|
|
|
|
2013-12-19 18:36:26 -05:00
|
|
|
(test-end)
|