mirror of
https://code.briarproject.org/briar/briar.git
synced 2026-02-19 06:09:55 +01:00
Merge branch 'constant-time-mac-verification' into 'master'
Add constant-time method for verifying MACs See merge request akwizgran/briar!773
This commit is contained in:
@@ -105,8 +105,8 @@ public interface ClientHelper {
|
|||||||
byte[] sign(String label, BdfList toSign, byte[] privateKey)
|
byte[] sign(String label, BdfList toSign, byte[] privateKey)
|
||||||
throws FormatException, GeneralSecurityException;
|
throws FormatException, GeneralSecurityException;
|
||||||
|
|
||||||
void verifySignature(String label, byte[] sig, byte[] publicKey,
|
void verifySignature(byte[] signature, String label, BdfList signed,
|
||||||
BdfList signed) throws FormatException, GeneralSecurityException;
|
byte[] publicKey) throws FormatException, GeneralSecurityException;
|
||||||
|
|
||||||
Author parseAndValidateAuthor(BdfList author) throws FormatException;
|
Author parseAndValidateAuthor(BdfList author) throws FormatException;
|
||||||
|
|
||||||
|
|||||||
@@ -67,8 +67,8 @@ public interface CryptoComponent {
|
|||||||
* signature created for another purpose
|
* signature created for another purpose
|
||||||
* @return true if the signature was valid, false otherwise.
|
* @return true if the signature was valid, false otherwise.
|
||||||
*/
|
*/
|
||||||
boolean verify(String label, byte[] signedData, byte[] publicKey,
|
boolean verifySignature(byte[] signature, String label, byte[] signed,
|
||||||
byte[] signature) throws GeneralSecurityException;
|
byte[] publicKey) throws GeneralSecurityException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the hash of the given inputs. The inputs are unambiguously
|
* Returns the hash of the given inputs. The inputs are unambiguously
|
||||||
@@ -91,6 +91,18 @@ public interface CryptoComponent {
|
|||||||
*/
|
*/
|
||||||
byte[] mac(String label, SecretKey macKey, byte[]... inputs);
|
byte[] mac(String label, SecretKey macKey, byte[]... inputs);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Verifies that the given message authentication code is valid for the
|
||||||
|
* given secret key and inputs.
|
||||||
|
*
|
||||||
|
* @param label a namespaced label indicating the purpose of this MAC, to
|
||||||
|
* prevent it from being repurposed or colliding with a MAC created for
|
||||||
|
* another purpose
|
||||||
|
* @return true if the MAC was valid, false otherwise.
|
||||||
|
*/
|
||||||
|
boolean verifyMac(byte[] mac, String label, SecretKey macKey,
|
||||||
|
byte[]... inputs);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Encrypts and authenticates the given plaintext so it can be written to
|
* Encrypts and authenticates the given plaintext so it can be written to
|
||||||
* storage. The encryption and authentication keys are derived from the
|
* storage. The encryption and authentication keys are derived from the
|
||||||
|
|||||||
@@ -381,9 +381,10 @@ class ClientHelperImpl implements ClientHelper {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void verifySignature(String label, byte[] sig, byte[] publicKey,
|
public void verifySignature(byte[] signature, String label, BdfList signed,
|
||||||
BdfList signed) throws FormatException, GeneralSecurityException {
|
byte[] publicKey) throws FormatException, GeneralSecurityException {
|
||||||
if (!crypto.verify(label, toByteArray(signed), publicKey, sig)) {
|
if (!crypto.verifySignature(signature, label, toByteArray(signed),
|
||||||
|
publicKey)) {
|
||||||
throw new GeneralSecurityException("Invalid signature");
|
throw new GeneralSecurityException("Invalid signature");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -251,7 +251,8 @@ class ContactExchangeTaskImpl extends Thread implements ContactExchangeTask {
|
|||||||
r.readListEnd();
|
r.readListEnd();
|
||||||
LOG.info("Received pseudonym");
|
LOG.info("Received pseudonym");
|
||||||
// Verify the signature
|
// Verify the signature
|
||||||
if (!crypto.verify(SIGNING_LABEL_EXCHANGE, nonce, publicKey, sig)) {
|
if (!crypto.verifySignature(sig, SIGNING_LABEL_EXCHANGE, nonce,
|
||||||
|
publicKey)) {
|
||||||
if (LOG.isLoggable(INFO))
|
if (LOG.isLoggable(INFO))
|
||||||
LOG.info("Invalid signature");
|
LOG.info("Invalid signature");
|
||||||
throw new GeneralSecurityException();
|
throw new GeneralSecurityException();
|
||||||
|
|||||||
@@ -205,12 +205,12 @@ class CryptoComponentImpl implements CryptoComponent {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean verify(String label, byte[] signedData, byte[] publicKey,
|
public boolean verifySignature(byte[] signature, String label,
|
||||||
byte[] signature) throws GeneralSecurityException {
|
byte[] signed, byte[] publicKey) throws GeneralSecurityException {
|
||||||
PublicKey key = signatureKeyParser.parsePublicKey(publicKey);
|
PublicKey key = signatureKeyParser.parsePublicKey(publicKey);
|
||||||
Signature sig = new EdSignature();
|
Signature sig = new EdSignature();
|
||||||
sig.initVerify(key);
|
sig.initVerify(key);
|
||||||
updateSignature(sig, label, signedData);
|
updateSignature(sig, label, signed);
|
||||||
return sig.verify(signature);
|
return sig.verify(signature);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -262,6 +262,17 @@ class CryptoComponentImpl implements CryptoComponent {
|
|||||||
return output;
|
return output;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean verifyMac(byte[] mac, String label, SecretKey macKey,
|
||||||
|
byte[]... inputs) {
|
||||||
|
byte[] expected = mac(label, macKey, inputs);
|
||||||
|
if (mac.length != expected.length) return false;
|
||||||
|
// Constant-time comparison
|
||||||
|
int cmp = 0;
|
||||||
|
for (int i = 0; i < mac.length; i++) cmp |= mac[i] ^ expected[i];
|
||||||
|
return cmp == 0;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public byte[] encryptWithPassword(byte[] input, String password) {
|
public byte[] encryptWithPassword(byte[] input, String password) {
|
||||||
AuthenticatedCipher cipher = new XSalsa20Poly1305AuthenticatedCipher();
|
AuthenticatedCipher cipher = new XSalsa20Poly1305AuthenticatedCipher();
|
||||||
|
|||||||
@@ -37,6 +37,7 @@ import java.util.Random;
|
|||||||
|
|
||||||
import static org.briarproject.bramble.api.identity.AuthorConstants.MAX_AUTHOR_NAME_LENGTH;
|
import static org.briarproject.bramble.api.identity.AuthorConstants.MAX_AUTHOR_NAME_LENGTH;
|
||||||
import static org.briarproject.bramble.api.identity.AuthorConstants.MAX_PUBLIC_KEY_LENGTH;
|
import static org.briarproject.bramble.api.identity.AuthorConstants.MAX_PUBLIC_KEY_LENGTH;
|
||||||
|
import static org.briarproject.bramble.api.identity.AuthorConstants.MAX_SIGNATURE_LENGTH;
|
||||||
import static org.briarproject.bramble.test.TestUtils.getAuthor;
|
import static org.briarproject.bramble.test.TestUtils.getAuthor;
|
||||||
import static org.briarproject.bramble.test.TestUtils.getRandomBytes;
|
import static org.briarproject.bramble.test.TestUtils.getRandomBytes;
|
||||||
import static org.briarproject.bramble.test.TestUtils.getRandomId;
|
import static org.briarproject.bramble.test.TestUtils.getRandomId;
|
||||||
@@ -300,30 +301,34 @@ public class ClientHelperImplTest extends BrambleTestCase {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testVerifySignature() throws Exception {
|
public void testVerifySignature() throws Exception {
|
||||||
|
byte[] signature = getRandomBytes(MAX_SIGNATURE_LENGTH);
|
||||||
byte[] publicKey = getRandomBytes(42);
|
byte[] publicKey = getRandomBytes(42);
|
||||||
byte[] bytes = expectToByteArray(list);
|
byte[] signed = expectToByteArray(list);
|
||||||
|
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(cryptoComponent).verify(label, bytes, publicKey, rawMessage);
|
oneOf(cryptoComponent).verifySignature(signature, label, signed,
|
||||||
|
publicKey);
|
||||||
will(returnValue(true));
|
will(returnValue(true));
|
||||||
}});
|
}});
|
||||||
|
|
||||||
clientHelper.verifySignature(label, rawMessage, publicKey, list);
|
clientHelper.verifySignature(signature, label, list, publicKey);
|
||||||
context.assertIsSatisfied();
|
context.assertIsSatisfied();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testVerifyWrongSignature() throws Exception {
|
public void testVerifyWrongSignature() throws Exception {
|
||||||
|
byte[] signature = getRandomBytes(MAX_SIGNATURE_LENGTH);
|
||||||
byte[] publicKey = getRandomBytes(42);
|
byte[] publicKey = getRandomBytes(42);
|
||||||
byte[] bytes = expectToByteArray(list);
|
byte[] signed = expectToByteArray(list);
|
||||||
|
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(cryptoComponent).verify(label, bytes, publicKey, rawMessage);
|
oneOf(cryptoComponent).verifySignature(signature, label, signed,
|
||||||
|
publicKey);
|
||||||
will(returnValue(false));
|
will(returnValue(false));
|
||||||
}});
|
}});
|
||||||
|
|
||||||
try {
|
try {
|
||||||
clientHelper.verifySignature(label, rawMessage, publicKey, list);
|
clientHelper.verifySignature(signature, label, list, publicKey);
|
||||||
fail();
|
fail();
|
||||||
} catch (GeneralSecurityException e) {
|
} catch (GeneralSecurityException e) {
|
||||||
// expected
|
// expected
|
||||||
|
|||||||
@@ -143,9 +143,9 @@ public class EdSignatureTest extends SignatureTest {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected boolean verify(String label, byte[] signedData, byte[] publicKey,
|
protected boolean verify(byte[] signature, String label, byte[] signed,
|
||||||
byte[] signature) throws GeneralSecurityException {
|
byte[] publicKey) throws GeneralSecurityException {
|
||||||
return crypto.verify(label, signedData, publicKey, signature);
|
return crypto.verifySignature(signature, label, signed, publicKey);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|||||||
@@ -126,13 +126,13 @@ public class KeyEncodingAndParsingTest extends BrambleTestCase {
|
|||||||
byte[] signature = crypto.sign("test", message,
|
byte[] signature = crypto.sign("test", message,
|
||||||
privateKey.getEncoded());
|
privateKey.getEncoded());
|
||||||
// Verify the signature
|
// Verify the signature
|
||||||
assertTrue(crypto.verify("test", message, publicKey.getEncoded(),
|
assertTrue(crypto.verifySignature(signature, "test", message,
|
||||||
signature));
|
publicKey.getEncoded()));
|
||||||
// Encode and parse the public key - no exceptions should be thrown
|
// Encode and parse the public key - no exceptions should be thrown
|
||||||
publicKey = parser.parsePublicKey(publicKey.getEncoded());
|
publicKey = parser.parsePublicKey(publicKey.getEncoded());
|
||||||
// Verify the signature again
|
// Verify the signature again
|
||||||
assertTrue(crypto.verify("test", message, publicKey.getEncoded(),
|
assertTrue(crypto.verifySignature(signature, "test", message,
|
||||||
signature));
|
publicKey.getEncoded()));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -146,15 +146,15 @@ public class KeyEncodingAndParsingTest extends BrambleTestCase {
|
|||||||
byte[] signature = crypto.sign("test", message,
|
byte[] signature = crypto.sign("test", message,
|
||||||
privateKey.getEncoded());
|
privateKey.getEncoded());
|
||||||
// Verify the signature
|
// Verify the signature
|
||||||
assertTrue(crypto.verify("test", message, publicKey.getEncoded(),
|
assertTrue(crypto.verifySignature(signature, "test", message,
|
||||||
signature));
|
publicKey.getEncoded()));
|
||||||
// Encode and parse the private key - no exceptions should be thrown
|
// Encode and parse the private key - no exceptions should be thrown
|
||||||
privateKey = parser.parsePrivateKey(privateKey.getEncoded());
|
privateKey = parser.parsePrivateKey(privateKey.getEncoded());
|
||||||
// Sign the data again - the signatures should be the same
|
// Sign the data again - the signatures should be the same
|
||||||
byte[] signature1 = crypto.sign("test", message,
|
byte[] signature1 = crypto.sign("test", message,
|
||||||
privateKey.getEncoded());
|
privateKey.getEncoded());
|
||||||
assertTrue(crypto.verify("test", message, publicKey.getEncoded(),
|
assertTrue(crypto.verifySignature(signature1, "test", message,
|
||||||
signature1));
|
publicKey.getEncoded()));
|
||||||
assertArrayEquals(signature, signature1);
|
assertArrayEquals(signature, signature1);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -13,6 +13,7 @@ import static org.briarproject.bramble.test.TestUtils.getSecretKey;
|
|||||||
import static org.briarproject.bramble.util.StringUtils.getRandomString;
|
import static org.briarproject.bramble.util.StringUtils.getRandomString;
|
||||||
import static org.junit.Assert.assertArrayEquals;
|
import static org.junit.Assert.assertArrayEquals;
|
||||||
import static org.junit.Assert.assertFalse;
|
import static org.junit.Assert.assertFalse;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
|
||||||
public class MacTest extends BrambleTestCase {
|
public class MacTest extends BrambleTestCase {
|
||||||
|
|
||||||
@@ -32,6 +33,7 @@ public class MacTest extends BrambleTestCase {
|
|||||||
byte[] mac = crypto.mac(label1, key1, input1, input2, input3);
|
byte[] mac = crypto.mac(label1, key1, input1, input2, input3);
|
||||||
byte[] mac1 = crypto.mac(label1, key1, input1, input2, input3);
|
byte[] mac1 = crypto.mac(label1, key1, input1, input2, input3);
|
||||||
assertArrayEquals(mac, mac1);
|
assertArrayEquals(mac, mac1);
|
||||||
|
assertTrue(crypto.verifyMac(mac, label1, key1, input1, input2, input3));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -40,6 +42,11 @@ public class MacTest extends BrambleTestCase {
|
|||||||
byte[] mac = crypto.mac(label1, key1, input1, input2, input3);
|
byte[] mac = crypto.mac(label1, key1, input1, input2, input3);
|
||||||
byte[] mac1 = crypto.mac(label2, key1, input1, input2, input3);
|
byte[] mac1 = crypto.mac(label2, key1, input1, input2, input3);
|
||||||
assertFalse(Arrays.equals(mac, mac1));
|
assertFalse(Arrays.equals(mac, mac1));
|
||||||
|
// Each MAC should fail to verify with the other MAC's label
|
||||||
|
assertFalse(crypto.verifyMac(mac, label2, key1, input1, input2,
|
||||||
|
input3));
|
||||||
|
assertFalse(crypto.verifyMac(mac1, label1, key2, input1, input2,
|
||||||
|
input3));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -48,6 +55,11 @@ public class MacTest extends BrambleTestCase {
|
|||||||
byte[] mac = crypto.mac(label1, key1, input1, input2, input3);
|
byte[] mac = crypto.mac(label1, key1, input1, input2, input3);
|
||||||
byte[] mac1 = crypto.mac(label1, key2, input1, input2, input3);
|
byte[] mac1 = crypto.mac(label1, key2, input1, input2, input3);
|
||||||
assertFalse(Arrays.equals(mac, mac1));
|
assertFalse(Arrays.equals(mac, mac1));
|
||||||
|
// Each MAC should fail to verify with the other MAC's key
|
||||||
|
assertFalse(crypto.verifyMac(mac, label1, key2, input1, input2,
|
||||||
|
input3));
|
||||||
|
assertFalse(crypto.verifyMac(mac1, label2, key1, input1, input2,
|
||||||
|
input3));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -57,6 +69,11 @@ public class MacTest extends BrambleTestCase {
|
|||||||
byte[] mac = crypto.mac(label1, key1, input1, input2, input3);
|
byte[] mac = crypto.mac(label1, key1, input1, input2, input3);
|
||||||
byte[] mac1 = crypto.mac(label1, key1, input3, input2, input1);
|
byte[] mac1 = crypto.mac(label1, key1, input3, input2, input1);
|
||||||
assertFalse(Arrays.equals(mac, mac1));
|
assertFalse(Arrays.equals(mac, mac1));
|
||||||
|
// Each MAC should fail to verify with the other MAC's inputs
|
||||||
|
assertFalse(crypto.verifyMac(mac, label1, key2, input3, input2,
|
||||||
|
input1));
|
||||||
|
assertFalse(crypto.verifyMac(mac1, label1, key1, input1, input2,
|
||||||
|
input3));
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -28,8 +28,8 @@ public abstract class SignatureTest extends BrambleTestCase {
|
|||||||
protected abstract byte[] sign(String label, byte[] toSign,
|
protected abstract byte[] sign(String label, byte[] toSign,
|
||||||
byte[] privateKey) throws GeneralSecurityException;
|
byte[] privateKey) throws GeneralSecurityException;
|
||||||
|
|
||||||
protected abstract boolean verify(String label, byte[] signedData,
|
protected abstract boolean verify(byte[] signature, String label,
|
||||||
byte[] publicKey, byte[] signature) throws GeneralSecurityException;
|
byte[] signed, byte[] publicKey) throws GeneralSecurityException;
|
||||||
|
|
||||||
SignatureTest() {
|
SignatureTest() {
|
||||||
crypto = new CryptoComponentImpl(new TestSecureRandomProvider(), null);
|
crypto = new CryptoComponentImpl(new TestSecureRandomProvider(), null);
|
||||||
@@ -85,7 +85,7 @@ public abstract class SignatureTest extends BrambleTestCase {
|
|||||||
@Test
|
@Test
|
||||||
public void testSignatureVerification() throws Exception {
|
public void testSignatureVerification() throws Exception {
|
||||||
byte[] sig = sign(label, inputBytes, privateKey);
|
byte[] sig = sign(label, inputBytes, privateKey);
|
||||||
assertTrue(verify(label, inputBytes, publicKey, sig));
|
assertTrue(verify(sig, label, inputBytes, publicKey));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -95,7 +95,7 @@ public abstract class SignatureTest extends BrambleTestCase {
|
|||||||
byte[] privateKey2 = k2.getPrivate().getEncoded();
|
byte[] privateKey2 = k2.getPrivate().getEncoded();
|
||||||
// calculate the signature with different key, should fail to verify
|
// calculate the signature with different key, should fail to verify
|
||||||
byte[] sig = sign(label, inputBytes, privateKey2);
|
byte[] sig = sign(label, inputBytes, privateKey2);
|
||||||
assertFalse(verify(label, inputBytes, publicKey, sig));
|
assertFalse(verify(sig, label, inputBytes, publicKey));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -104,7 +104,7 @@ public abstract class SignatureTest extends BrambleTestCase {
|
|||||||
byte[] inputBytes2 = TestUtils.getRandomBytes(123);
|
byte[] inputBytes2 = TestUtils.getRandomBytes(123);
|
||||||
// calculate the signature with different input, should fail to verify
|
// calculate the signature with different input, should fail to verify
|
||||||
byte[] sig = sign(label, inputBytes, privateKey);
|
byte[] sig = sign(label, inputBytes, privateKey);
|
||||||
assertFalse(verify(label, inputBytes2, publicKey, sig));
|
assertFalse(verify(sig, label, inputBytes2, publicKey));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -113,7 +113,7 @@ public abstract class SignatureTest extends BrambleTestCase {
|
|||||||
String label2 = StringUtils.getRandomString(42);
|
String label2 = StringUtils.getRandomString(42);
|
||||||
// calculate the signature with different label, should fail to verify
|
// calculate the signature with different label, should fail to verify
|
||||||
byte[] sig = sign(label, inputBytes, privateKey);
|
byte[] sig = sign(label, inputBytes, privateKey);
|
||||||
assertFalse(verify(label2, inputBytes, publicKey, sig));
|
assertFalse(verify(sig, label2, inputBytes, publicKey));
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -111,8 +111,8 @@ class BlogPostValidator extends BdfMessageValidator {
|
|||||||
Blog b = blogFactory.parseBlog(g);
|
Blog b = blogFactory.parseBlog(g);
|
||||||
Author a = b.getAuthor();
|
Author a = b.getAuthor();
|
||||||
try {
|
try {
|
||||||
clientHelper.verifySignature(SIGNING_LABEL_POST, sig,
|
clientHelper.verifySignature(sig, SIGNING_LABEL_POST, signed,
|
||||||
a.getPublicKey(), signed);
|
a.getPublicKey());
|
||||||
} catch (GeneralSecurityException e) {
|
} catch (GeneralSecurityException e) {
|
||||||
throw new InvalidMessageException(e);
|
throw new InvalidMessageException(e);
|
||||||
}
|
}
|
||||||
@@ -157,8 +157,8 @@ class BlogPostValidator extends BdfMessageValidator {
|
|||||||
Blog b = blogFactory.parseBlog(g);
|
Blog b = blogFactory.parseBlog(g);
|
||||||
Author a = b.getAuthor();
|
Author a = b.getAuthor();
|
||||||
try {
|
try {
|
||||||
clientHelper.verifySignature(SIGNING_LABEL_COMMENT, sig,
|
clientHelper.verifySignature(sig, SIGNING_LABEL_COMMENT,
|
||||||
a.getPublicKey(), signed);
|
signed, a.getPublicKey());
|
||||||
} catch (GeneralSecurityException e) {
|
} catch (GeneralSecurityException e) {
|
||||||
throw new InvalidMessageException(e);
|
throw new InvalidMessageException(e);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -66,8 +66,8 @@ class ForumPostValidator extends BdfMessageValidator {
|
|||||||
BdfList signed = BdfList.of(g.getId(), m.getTimestamp(), parent,
|
BdfList signed = BdfList.of(g.getId(), m.getTimestamp(), parent,
|
||||||
authorList, content);
|
authorList, content);
|
||||||
try {
|
try {
|
||||||
clientHelper.verifySignature(SIGNING_LABEL_POST, sig,
|
clientHelper.verifySignature(sig, SIGNING_LABEL_POST,
|
||||||
author.getPublicKey(), signed);
|
signed, author.getPublicKey());
|
||||||
} catch (GeneralSecurityException e) {
|
} catch (GeneralSecurityException e) {
|
||||||
throw new InvalidMessageException(e);
|
throw new InvalidMessageException(e);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -500,7 +500,7 @@ class IntroduceeManager {
|
|||||||
byte[] key = localState.getRaw(PUBLIC_KEY);
|
byte[] key = localState.getRaw(PUBLIC_KEY);
|
||||||
|
|
||||||
// Verify the signature
|
// Verify the signature
|
||||||
if (!cryptoComponent.verify(SIGNING_LABEL, nonce, key, sig)) {
|
if (!cryptoComponent.verifySignature(sig, SIGNING_LABEL, nonce, key)) {
|
||||||
LOG.warning("Invalid nonce signature in ACK");
|
LOG.warning("Invalid nonce signature in ACK");
|
||||||
throw new GeneralSecurityException();
|
throw new GeneralSecurityException();
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -112,8 +112,9 @@ class GroupMessageValidator extends BdfMessageValidator {
|
|||||||
creator.getId(), member.getId(), g.getId(),
|
creator.getId(), member.getId(), g.getId(),
|
||||||
inviteTimestamp);
|
inviteTimestamp);
|
||||||
try {
|
try {
|
||||||
clientHelper.verifySignature(SIGNING_LABEL_INVITE,
|
clientHelper.verifySignature(creatorSignature,
|
||||||
creatorSignature, creator.getPublicKey(), token);
|
SIGNING_LABEL_INVITE,
|
||||||
|
token, creator.getPublicKey());
|
||||||
} catch (GeneralSecurityException e) {
|
} catch (GeneralSecurityException e) {
|
||||||
throw new FormatException();
|
throw new FormatException();
|
||||||
}
|
}
|
||||||
@@ -128,8 +129,8 @@ class GroupMessageValidator extends BdfMessageValidator {
|
|||||||
inviteList
|
inviteList
|
||||||
);
|
);
|
||||||
try {
|
try {
|
||||||
clientHelper.verifySignature(SIGNING_LABEL_JOIN, memberSignature,
|
clientHelper.verifySignature(memberSignature, SIGNING_LABEL_JOIN,
|
||||||
member.getPublicKey(), signed);
|
signed, member.getPublicKey());
|
||||||
} catch (GeneralSecurityException e) {
|
} catch (GeneralSecurityException e) {
|
||||||
throw new FormatException();
|
throw new FormatException();
|
||||||
}
|
}
|
||||||
@@ -165,8 +166,8 @@ class GroupMessageValidator extends BdfMessageValidator {
|
|||||||
content
|
content
|
||||||
);
|
);
|
||||||
try {
|
try {
|
||||||
clientHelper.verifySignature(SIGNING_LABEL_POST, signature,
|
clientHelper.verifySignature(signature, SIGNING_LABEL_POST,
|
||||||
member.getPublicKey(), signed);
|
signed, member.getPublicKey());
|
||||||
} catch (GeneralSecurityException e) {
|
} catch (GeneralSecurityException e) {
|
||||||
throw new FormatException();
|
throw new FormatException();
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -94,8 +94,8 @@ class GroupInvitationValidator extends BdfMessageValidator {
|
|||||||
privateGroup.getId()
|
privateGroup.getId()
|
||||||
);
|
);
|
||||||
try {
|
try {
|
||||||
clientHelper.verifySignature(SIGNING_LABEL_INVITE, signature,
|
clientHelper.verifySignature(signature, SIGNING_LABEL_INVITE,
|
||||||
creator.getPublicKey(), signed);
|
signed, creator.getPublicKey());
|
||||||
} catch (GeneralSecurityException e) {
|
} catch (GeneralSecurityException e) {
|
||||||
throw new FormatException();
|
throw new FormatException();
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -280,7 +280,7 @@ public class BlogPostValidatorTest extends BriarTestCase {
|
|||||||
oneOf(clientHelper).toList(b.getAuthor());
|
oneOf(clientHelper).toList(b.getAuthor());
|
||||||
will(returnValue(authorList));
|
will(returnValue(authorList));
|
||||||
oneOf(clientHelper)
|
oneOf(clientHelper)
|
||||||
.verifySignature(label, sig, author.getPublicKey(), signed);
|
.verifySignature(sig, label, signed, author.getPublicKey());
|
||||||
}});
|
}});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ public class ForumPostValidatorTest extends ValidatorTestCase {
|
|||||||
public void testAcceptsNullParentId() throws Exception {
|
public void testAcceptsNullParentId() throws Exception {
|
||||||
expectCreateAuthor();
|
expectCreateAuthor();
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(clientHelper).verifySignature(SIGNING_LABEL_POST, signature,
|
oneOf(clientHelper).verifySignature(signature, SIGNING_LABEL_POST,
|
||||||
authorPublicKey, signedWithoutParent);
|
signedWithoutParent, authorPublicKey);
|
||||||
}});
|
}});
|
||||||
|
|
||||||
BdfMessageContext messageContext = v.validateMessage(message, group,
|
BdfMessageContext messageContext = v.validateMessage(message, group,
|
||||||
@@ -139,8 +139,8 @@ public class ForumPostValidatorTest extends ValidatorTestCase {
|
|||||||
|
|
||||||
expectCreateAuthor();
|
expectCreateAuthor();
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(clientHelper).verifySignature(SIGNING_LABEL_POST, signature,
|
oneOf(clientHelper).verifySignature(signature, SIGNING_LABEL_POST,
|
||||||
authorPublicKey, signedWithShortContent);
|
signedWithShortContent, authorPublicKey);
|
||||||
}});
|
}});
|
||||||
|
|
||||||
BdfMessageContext messageContext = v.validateMessage(message, group,
|
BdfMessageContext messageContext = v.validateMessage(message, group,
|
||||||
@@ -189,8 +189,8 @@ public class ForumPostValidatorTest extends ValidatorTestCase {
|
|||||||
throws Exception {
|
throws Exception {
|
||||||
expectCreateAuthor();
|
expectCreateAuthor();
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(clientHelper).verifySignature(SIGNING_LABEL_POST, signature,
|
oneOf(clientHelper).verifySignature(signature, SIGNING_LABEL_POST,
|
||||||
authorPublicKey, signedWithParent);
|
signedWithParent, authorPublicKey);
|
||||||
will(throwException(new FormatException()));
|
will(throwException(new FormatException()));
|
||||||
}});
|
}});
|
||||||
|
|
||||||
@@ -203,8 +203,8 @@ public class ForumPostValidatorTest extends ValidatorTestCase {
|
|||||||
throws Exception {
|
throws Exception {
|
||||||
expectCreateAuthor();
|
expectCreateAuthor();
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(clientHelper).verifySignature(SIGNING_LABEL_POST, signature,
|
oneOf(clientHelper).verifySignature(signature, SIGNING_LABEL_POST,
|
||||||
authorPublicKey, signedWithParent);
|
signedWithParent, authorPublicKey);
|
||||||
will(throwException(new GeneralSecurityException()));
|
will(throwException(new GeneralSecurityException()));
|
||||||
}});
|
}});
|
||||||
|
|
||||||
|
|||||||
@@ -262,8 +262,8 @@ public class IntroduceeManagerTest extends BriarTestCase {
|
|||||||
);
|
);
|
||||||
|
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(cryptoComponent).verify(SIGNING_LABEL, nonce,
|
oneOf(cryptoComponent).verifySignature(sig, SIGNING_LABEL, nonce,
|
||||||
introducee2.getAuthor().getPublicKey(), sig);
|
introducee2.getAuthor().getPublicKey());
|
||||||
will(returnValue(false));
|
will(returnValue(false));
|
||||||
}});
|
}});
|
||||||
|
|
||||||
@@ -292,8 +292,8 @@ public class IntroduceeManagerTest extends BriarTestCase {
|
|||||||
state.put(SIGNATURE, sig);
|
state.put(SIGNATURE, sig);
|
||||||
|
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(cryptoComponent).verify(SIGNING_LABEL, nonce,
|
oneOf(cryptoComponent).verifySignature(sig, SIGNING_LABEL, nonce,
|
||||||
publicKeyBytes, sig);
|
publicKeyBytes);
|
||||||
will(returnValue(true));
|
will(returnValue(true));
|
||||||
}});
|
}});
|
||||||
introduceeManager.verifySignature(state);
|
introduceeManager.verifySignature(state);
|
||||||
|
|||||||
@@ -401,8 +401,8 @@ public class GroupMessageValidatorTest extends ValidatorTestCase {
|
|||||||
expectParseAuthor(creatorList, creator);
|
expectParseAuthor(creatorList, creator);
|
||||||
expectParsePrivateGroup();
|
expectParsePrivateGroup();
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(clientHelper).verifySignature(SIGNING_LABEL_JOIN,
|
oneOf(clientHelper).verifySignature(memberSignature,
|
||||||
memberSignature, creator.getPublicKey(), signed);
|
SIGNING_LABEL_JOIN, signed, creator.getPublicKey());
|
||||||
if (!memberSigValid)
|
if (!memberSigValid)
|
||||||
will(throwException(new GeneralSecurityException()));
|
will(throwException(new GeneralSecurityException()));
|
||||||
}});
|
}});
|
||||||
@@ -422,13 +422,13 @@ public class GroupMessageValidatorTest extends ValidatorTestCase {
|
|||||||
oneOf(groupInvitationFactory).createInviteToken(creator.getId(),
|
oneOf(groupInvitationFactory).createInviteToken(creator.getId(),
|
||||||
member.getId(), privateGroup.getId(), inviteTimestamp);
|
member.getId(), privateGroup.getId(), inviteTimestamp);
|
||||||
will(returnValue(token));
|
will(returnValue(token));
|
||||||
oneOf(clientHelper).verifySignature(SIGNING_LABEL_INVITE,
|
oneOf(clientHelper).verifySignature(creatorSignature,
|
||||||
creatorSignature, creator.getPublicKey(), token);
|
SIGNING_LABEL_INVITE, token, creator.getPublicKey());
|
||||||
if (!creatorSigValid) {
|
if (!creatorSigValid) {
|
||||||
will(throwException(new GeneralSecurityException()));
|
will(throwException(new GeneralSecurityException()));
|
||||||
} else {
|
} else {
|
||||||
oneOf(clientHelper).verifySignature(SIGNING_LABEL_JOIN,
|
oneOf(clientHelper).verifySignature(memberSignature,
|
||||||
memberSignature, member.getPublicKey(), signed);
|
SIGNING_LABEL_JOIN, signed, member.getPublicKey());
|
||||||
if (!memberSigValid)
|
if (!memberSigValid)
|
||||||
will(throwException(new GeneralSecurityException()));
|
will(throwException(new GeneralSecurityException()));
|
||||||
}
|
}
|
||||||
@@ -648,8 +648,8 @@ public class GroupMessageValidatorTest extends ValidatorTestCase {
|
|||||||
);
|
);
|
||||||
expectParseAuthor(memberList, member);
|
expectParseAuthor(memberList, member);
|
||||||
context.checking(new Expectations() {{
|
context.checking(new Expectations() {{
|
||||||
oneOf(clientHelper).verifySignature(SIGNING_LABEL_POST,
|
oneOf(clientHelper).verifySignature(memberSignature,
|
||||||
memberSignature, member.getPublicKey(), signed);
|
SIGNING_LABEL_POST, signed, member.getPublicKey());
|
||||||
if (!sigValid)
|
if (!sigValid)
|
||||||
will(throwException(new GeneralSecurityException()));
|
will(throwException(new GeneralSecurityException()));
|
||||||
}});
|
}});
|
||||||
|
|||||||
@@ -256,8 +256,8 @@ public class GroupInvitationValidatorTest extends ValidatorTestCase {
|
|||||||
oneOf(privateGroupFactory).createPrivateGroup(groupName, creator,
|
oneOf(privateGroupFactory).createPrivateGroup(groupName, creator,
|
||||||
salt);
|
salt);
|
||||||
will(returnValue(privateGroup));
|
will(returnValue(privateGroup));
|
||||||
oneOf(clientHelper).verifySignature(SIGNING_LABEL_INVITE, signature,
|
oneOf(clientHelper).verifySignature(signature, SIGNING_LABEL_INVITE,
|
||||||
creator.getPublicKey(), signed);
|
signed, creator.getPublicKey());
|
||||||
if (exception) {
|
if (exception) {
|
||||||
will(throwException(new GeneralSecurityException()));
|
will(throwException(new GeneralSecurityException()));
|
||||||
} else {
|
} else {
|
||||||
|
|||||||
Reference in New Issue
Block a user