networksecurity/tlsprovider/Test/tlstest2/verifysignaturestep.cpp
author Dremov Kirill (Nokia-D-MSW/Tampere) <kirill.dremov@nokia.com>
Tue, 31 Aug 2010 16:45:15 +0300
branchRCL_3
changeset 21 abbed5a4b42a
parent 0 af10295192d8
permissions -rw-r--r--
Revision: 201035 Kit: 201035

// Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
// All rights reserved.
// This component and the accompanying materials are made available
// under the terms of "Eclipse Public License v1.0"
// which accompanies this distribution, and is available
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
//
// Initial Contributors:
// Nokia Corporation - initial contribution.
//
// Contributors:
//
// Description:
//

/**
 @file verifysignaturestep.cpp
 @internalTechnology
*/
#include "verifysignaturestep.h"

#include <tlsprovinterface.h>
#include <asymmetric.h>
#include <asnpkcs.h>
#include <asn1enc.h>

CVerifySignatureStep::CVerifySignatureStep()
	{
	SetTestStepName(KVerifySignatureStep);
	}
	
TVerdict CVerifySignatureStep::doTestStepPreambleL()
	{
	ConstructL();
	
	CTlsCryptoAttributes* atts = Provider()->Attributes();
	
	// read the "server" random
	HBufC8* random = ServerRandomL();
	atts->iMasterSecretInput.iServerRandom.Copy(*random);
	delete random;
	
	// and the client random
	random = ClientRandomL();
	atts->iMasterSecretInput.iClientRandom.Copy(*random);
	delete random;
	
	// we only support null compression...
	atts->iCompressionMethod = ENullCompression;
	
	// read the cipher suite for the test
	atts->iCurrentCipherSuite = CipherSuiteL();
	
	// read the protocol version
	TTLSProtocolVersion version = ProtocolVersionL();
	atts->iNegotiatedProtocol = version;
	atts->iProposedProtocol = version;
	
	// set the session ID and "server" name (localhost)
	atts->iSessionNameAndID.iSessionId = SessionId();
	atts->iSessionNameAndID.iServerName.iAddress = KLocalHost; 
	atts->iSessionNameAndID.iServerName.iPort = 443;
	atts->idomainName.Copy(DomainNameL());
	
	// try and read DH params, this section may not exist
	RInteger gen;
	CleanupClosePushL(gen);
	
	RInteger prime;
	CleanupClosePushL(prime);
	
	TRAPD(err, ReadDHParamsL());
	if (err == KErrNone)
		{
		atts->iPublicKeyParams->iKeyType = EDHE;
		
		// The params are:
		// 1 - Prime
		// 2 - Generator
		// 3 - generator ^ random mod prime
		
		atts->iPublicKeyParams->iValue1 = Prime().BufferLC();
		CleanupStack::Pop(atts->iPublicKeyParams->iValue1);
		
		atts->iPublicKeyParams->iValue2 = Generator().BufferLC();
		CleanupStack::Pop(atts->iPublicKeyParams->iValue2);
		
		atts->iPublicKeyParams->iValue3 = KeyPair()->PublicKey().X().BufferLC();
		CleanupStack::Pop(atts->iPublicKeyParams->iValue3);
		}
		
	CleanupStack::PopAndDestroy(2, &gen); // prime
	
	// No client authentication or dialogs for this test, please
	atts->iClientAuthenticate = EFalse;
	atts->iDialogNonAttendedMode = ETrue;
	
	return EPass;
	}
	
TVerdict CVerifySignatureStep::doTestStepL()
	{
	INFO_PRINTF1(_L("Calling TLS Provider to fetch cipher suites."));
	// first we have to retrieve the available cipher suites
	TInt err = GetCipherSuitesL();
	
	if (err != KErrNone)
		{
		SetTestStepResult(EFail);
		return TestStepResult();
		}
	
	INFO_PRINTF1(_L("Calling TLS Provider to verify server certificate."));
	CX509Certificate* cert = NULL;
	err = VerifyServerCertificateL(cert);
	CleanupStack::PushL(cert);

	if (err != KErrNone)
		{
		SetTestStepResult(EFail);
		return TestStepResult();
		}
		
	// sign some random data, and call it a signature....
	// doesn't have to be an actual digest, since we don't pass the data buffer.
	
	TBuf8<36> digest;
	CTlsCryptoAttributes* atts = Provider()->Attributes();

	TInt index = KErrNotFound;
	for(TInt j=0;j<CipherSuites().Count();j++)
		{
		if(CipherSuites()[j] == atts->iCurrentCipherSuite)
			{
			index = j;
			break;
			}
		}
	User::LeaveIfError(index);

	TTLSCipherSuite suite = CipherSuites()[index];
	// ajust the pseudo-digest size for sig algorithm
	switch(suite.CipherDetails()->iSigAlg)
		{
	case EDsa:
		atts->isignatureAlgorithm = EDsa;
		digest.SetLength(20); // only one SHA-1 in size
		break;
	
	case ERsaSigAlg:
		atts->isignatureAlgorithm = ERsaSigAlg;
		digest.SetLength(36); // MD5 + SHA-1 in size
		break;
	
	default:
		User::Leave(KErrUnknown);
		break;
		}
	
	TRandom::RandomL(digest);
	
	// get the server private key data
	CDecPKCS8Data* keyData = ServerPrivateKeyL();
	CleanupStack::PushL(keyData);
	
	// sign the "digest" with the appropriate signature algorithm
	HBufC8* signature = NULL;
	switch(suite.CipherDetails()->iSigAlg)
		{
	case EDsa:
		{
		// we don't own this pointer
		CPKCS8KeyPairDSA* key = static_cast<CPKCS8KeyPairDSA*>(keyData->KeyPairData());
		
		CDSASigner* signer = CDSASigner::NewLC(key->PrivateKey());
		const CDSASignature* sig = signer->SignL(digest);
		CleanupStack::PushL(const_cast<CDSASignature*>(sig));
		
		// DSA sig is an ASN.1 sequence of R followed by S
		CASN1EncSequence* sigSeq = CASN1EncSequence::NewLC();
		
		CASN1EncBigInt* rAsn = CASN1EncBigInt::NewLC(sig->R());
		sigSeq->AddAndPopChildL(rAsn);
		
		CASN1EncBigInt* sAsn = CASN1EncBigInt::NewLC(sig->S());
		sigSeq->AddAndPopChildL(sAsn);
		
		signature = HBufC8::NewLC(sigSeq->LengthDER());
		TPtr8 sigPtr = signature->Des();
		sigPtr.SetLength(sigSeq->LengthDER());
		TUint pos = 0;
		sigSeq->WriteDERL(sigPtr, pos);
		CleanupStack::Pop(signature);
		
		CleanupStack::PopAndDestroy(3, signer); //sig, sigSeq
		}
		break;

	case ERsaSigAlg:
		{
		// we don't own this pointer
		CPKCS8KeyPairRSA* key = static_cast<CPKCS8KeyPairRSA*>(keyData->KeyPairData());
		
		CRSAPKCS1v15Signer* signer = CRSAPKCS1v15Signer::NewLC(key->PrivateKey());
		const CRSASignature* sig = signer->SignL(digest);
		CleanupStack::PushL(const_cast<CRSASignature*>(sig));
		
		signature = sig->S().BufferLC();
		CleanupStack::Pop(signature);
	
		CleanupStack::PopAndDestroy(2, signer); // sig
		}
		break;
		
	default:
		User::Leave(KErrUnknown);
		break;
		}
	
	CleanupStack::PushL(signature);
	
	//Code to check VerifySignatureL()
	TBool expectedResult = ETrue;
	
	// security test - we may wish to munge the digest we pass to the method
	TBool tamperDigest(EFalse);
	GetBoolFromConfig(ConfigSection(), KTamperedDigest, tamperDigest); // ignore error
	
	if (tamperDigest)
		{
		expectedResult = EFalse;
		TRandom::RandomL(digest);
		}
	// now, invoke the verify signature method.
	TBool result = Provider()->VerifySignatureL(cert->PublicKey(), digest, *signature);
	
	if (result == expectedResult)
		{
		SetTestStepResult(EPass);
		}
	else
		{
		SetTestStepResult(EFail);
		}
		
	//now invoke the verify signature method with invalid params and ensure that it fails accordingly
		TRandom::RandomL(digest);
	result = Provider()->VerifySignatureL(cert->PublicKey(), digest, *signature);
			expectedResult = EFalse;
	if (result == expectedResult)
		{
		SetTestStepResult(EPass);
		}
	else
		{
		SetTestStepResult(EFail);
		}
	
	CleanupStack::PopAndDestroy(3, cert); // keyData, signature
	return TestStepResult();
	}