Before that '.log' files for scheme tests were fragmented and not included in test-suite.log. This unifies the semantics of SRFI-64 API with Automake test suite. * build-aux/test-driver.scm: New file. * Makefile.am (SCM_LOG_DRIVER, AM_SCM_LOG_DRIVER_FLAGS): New variables. (SCM_LOG_COMPILER, AM_SCM_LOG_FLAGS): Delete variables. (AM_TESTS_ENVIRONMENT): Set GUILE_AUTO_COMPILE to 0. * test-env.in: Silence guix-daemon. * doc/guix.texi (Running the Test Suite): Describe how to display the detailed results. Bug reports require only 'test-suite.log' file. * tests/base32.scm, tests/build-utils.scm, tests/builders.scm, tests/challenge.scm, tests/cpan.scm, tests/cpio.scm, tests/cran.scm, tests/cve.scm, tests/derivations.scm, tests/elpa.scm, tests/file-systems.scm, tests/gem.scm, tests/gexp.scm, tests/gnu-maintenance.scm, tests/grafts.scm, tests/graph.scm, tests/gremlin.scm, tests/hackage.scm, tests/hash.scm, tests/import-utils.scm, tests/lint.scm, tests/monads.scm, tests/nar.scm, tests/packages.scm, tests/pk-crypto.scm, tests/pki.scm, tests/profiles.scm, tests/publish.scm, tests/pypi.scm, tests/records.scm, tests/scripts-build.scm, tests/scripts.scm, tests/services.scm, tests/sets.scm, tests/size.scm, tests/snix.scm, tests/store.scm, tests/substitute.scm, tests/syscalls.scm, tests/system.scm, tests/ui.scm, tests/union.scm, tests/upstream.scm, tests/utils.scm: Don't exit at the end of test groups. * tests/containers.scm: Likewise. Use 'test-skip' instead of exiting with error code 77.
		
			
				
	
	
		
			289 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			Scheme
		
	
	
	
	
	
			
		
		
	
	
			289 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			Scheme
		
	
	
	
	
	
| ;;; GNU Guix --- Functional package management for GNU
 | |
| ;;; Copyright © 2013, 2014 Ludovic Courtès <ludo@gnu.org>
 | |
| ;;;
 | |
| ;;; This file is part of GNU Guix.
 | |
| ;;;
 | |
| ;;; GNU Guix is free software; you can redistribute it and/or modify it
 | |
| ;;; under the terms of the GNU General Public License as published by
 | |
| ;;; the Free Software Foundation; either version 3 of the License, or (at
 | |
| ;;; your option) any later version.
 | |
| ;;;
 | |
| ;;; GNU Guix is distributed in the hope that it will be useful, but
 | |
| ;;; WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| ;;; GNU General Public License for more details.
 | |
| ;;;
 | |
| ;;; You should have received a copy of the GNU General Public License
 | |
| ;;; along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| (define-module (test-pk-crypto)
 | |
|   #:use-module (guix pk-crypto)
 | |
|   #:use-module (guix utils)
 | |
|   #:use-module (guix hash)
 | |
|   #:use-module (srfi srfi-1)
 | |
|   #:use-module (srfi srfi-11)
 | |
|   #:use-module (srfi srfi-26)
 | |
|   #:use-module (srfi srfi-64)
 | |
|   #:use-module (rnrs bytevectors)
 | |
|   #:use-module (rnrs io ports)
 | |
|   #:use-module (ice-9 match))
 | |
| 
 | |
| ;; Test the (guix pk-crypto) module.
 | |
| 
 | |
| (define %key-pair
 | |
|   ;; RSA key pair that was generated with:
 | |
|   ;;   (generate-key (string->canonical-sexp "(genkey (rsa (nbits 4:1024)))"))
 | |
|   ;; which takes a bit of time.
 | |
|   "(key-data
 | |
|     (public-key
 | |
|      (rsa
 | |
|       (n #00C1F764069F54FFE93A126B02328903E984E4AE3AF6DF402B5B6B3907911B88C385F1BA76A002EC9DEA109A5228EF0E62EE31A06D1A5861CAB474F6C857AC66EB65A1905F25BBA1869579E73A3B7FED13AF5A1667326F88CDFC2FF24B03C14FD1384AA7E73CA89572880B606E3A974E15347963FC7B6378574936A47580DBCB45#)
 | |
|       (e #010001#)))
 | |
|     (private-key
 | |
|      (rsa
 | |
|       (n #00C1F764069F54FFE93A126B02328903E984E4AE3AF6DF402B5B6B3907911B88C385F1BA76A002EC9DEA109A5228EF0E62EE31A06D1A5861CAB474F6C857AC66EB65A1905F25BBA1869579E73A3B7FED13AF5A1667326F88CDFC2FF24B03C14FD1384AA7E73CA89572880B606E3A974E15347963FC7B6378574936A47580DBCB45#)
 | |
|       (e #010001#)
 | |
|       (d #58CAD84653D0046A8EC3F9AA82D9C829B145422109FC3F12DA01A694B92FA296E70D366FB166454D30E632CEE3A033B4C41781BA10325F69FCDC0250CA19C8EEB352FA085992494098DB133E682ED38A931701F0DED1A1E508F4341A4FB446A04F019427C7CB3C44F251EEA9D386100DA80F125E0FD5CE1B0DFEC6D21516EACD#)
 | |
|       (p #00D47F185147EC39393CCDA4E7323FFC20FC8B8073E2A54DD63BA392A66975E4204CA48572496A9DFD7522436B852C07472A5AB25B7706F7C14E6F33FBC420FF3B#)
 | |
|       (q #00E9AD22F158060BC9AE3601DA623AFC60FFF3058795802CA92371C00097335CF9A23D7782DE353C9DBA93D7BB99E6A24A411107605E722481C5C191F80D7EB77F#)
 | |
|       (u #59B45B95AE01A7A7370FAFDB08FE73A4793CE37F228961B09B1B1E7DDAD9F8D3E28F5C5E8B4B067E6B8E0BBF3F690B42991A79E46108DDCDA2514323A66964DE#))))")
 | |
| 
 | |
| (define %ecc-key-pair
 | |
|   ;; Ed25519 key pair generated with:
 | |
|   ;;   (generate-key (string->canonical-sexp "(genkey (ecdsa (curve Ed25519) (flags rfc6979 transient)))"))
 | |
|   "(key-data
 | |
|       (public-key
 | |
|         (ecc
 | |
|           (curve Ed25519)
 | |
|           (q #94869C1B9E69DB8DD910B7F7F4D6E56A63A964A59AE8F90F6703ACDDF6F50C81#)))
 | |
|       (private-key
 | |
|         (ecc
 | |
|           (curve Ed25519)
 | |
|           (q #94869C1B9E69DB8DD910B7F7F4D6E56A63A964A59AE8F90F6703ACDDF6F50C81#)
 | |
|           (d #6EFB32D0B4EC6B3237B523539F1979379B82726AAA605EB2FBA6775B2B777B78#))))")
 | |
| 
 | |
| (test-begin "pk-crypto")
 | |
| 
 | |
| (test-assert "version"
 | |
|   (gcrypt-version))
 | |
| 
 | |
| (let ((sexps '("(foo bar)"
 | |
| 
 | |
|                ;; In Libgcrypt 1.5.3 the following integer is rendered as
 | |
|                ;; binary, whereas in 1.6.0 it's rendered as is (hexadecimal.)
 | |
|                ;;"#C0FFEE#"
 | |
| 
 | |
|                "(genkey \n (rsa \n  (nbits \"1024\")\n  )\n )")))
 | |
|   (test-equal "string->canonical-sexp->string"
 | |
|     sexps
 | |
|     (let ((sexps (map string->canonical-sexp sexps)))
 | |
|       (and (every canonical-sexp? sexps)
 | |
|            (map (compose string-trim-both canonical-sexp->string) sexps)))))
 | |
| 
 | |
| (gc)                                              ; stress test!
 | |
| 
 | |
| (let ((sexps `(("(foo bar)" foo -> "(foo bar)")
 | |
|                ("(foo (bar (baz 3:123)))" baz -> "(baz \"123\")")
 | |
|                ("(foo (bar 3:123))" baz -> #f))))
 | |
|   (test-equal "find-sexp-token"
 | |
|     (map (match-lambda
 | |
|           ((_ _ '-> expected)
 | |
|            expected))
 | |
|          sexps)
 | |
|     (map (match-lambda
 | |
|           ((input token '-> _)
 | |
|            (let ((sexp (find-sexp-token (string->canonical-sexp input) token)))
 | |
|              (and sexp
 | |
|                   (string-trim-both (canonical-sexp->string sexp))))))
 | |
|          sexps)))
 | |
| 
 | |
| (gc)
 | |
| 
 | |
| (test-equal "canonical-sexp-length"
 | |
|   '(0 1 2 4 0 0)
 | |
|   (map (compose canonical-sexp-length string->canonical-sexp)
 | |
|        '("()" "(a)" "(a b)" "(a #616263# b #C001#)" "a" "#123456#")))
 | |
| 
 | |
| (test-equal "canonical-sexp-list?"
 | |
|   '(#t #f #t #f)
 | |
|   (map (compose canonical-sexp-list? string->canonical-sexp)
 | |
|        '("()" "\"abc\"" "(a b c)" "#123456#")))
 | |
| 
 | |
| (gc)
 | |
| 
 | |
| (test-equal "canonical-sexp-car + cdr"
 | |
|   '("(b \n (c xyz)\n )")
 | |
|   (let ((lst (string->canonical-sexp "(a (b (c xyz)))")))
 | |
|     (map (lambda (sexp)
 | |
|            (and sexp (string-trim-both (canonical-sexp->string sexp))))
 | |
|          ;; Note: 'car' returns #f when the first element is an atom.
 | |
|          (list (canonical-sexp-car (canonical-sexp-cdr lst))))))
 | |
| 
 | |
| (gc)
 | |
| 
 | |
| (test-equal "canonical-sexp-nth"
 | |
|   '("(b pqr)" "(c \"456\")" "(d xyz)" #f #f)
 | |
| 
 | |
|   (let ((lst (string->canonical-sexp "(a (b 3:pqr) (c 3:456) (d 3:xyz))")))
 | |
|     ;; XXX: In Libgcrypt 1.5.3, (canonical-sexp-nth lst 0) returns LST, whereas in
 | |
|     ;; 1.6.0 it returns #f.
 | |
|     (map (lambda (sexp)
 | |
|            (and sexp (string-trim-both (canonical-sexp->string sexp))))
 | |
|          (unfold (cut > <> 5)
 | |
|                  (cut canonical-sexp-nth lst <>)
 | |
|                  1+
 | |
|                  1))))
 | |
| 
 | |
| (gc)
 | |
| 
 | |
| (test-equal "canonical-sexp-nth-data"
 | |
|   `(Name Otto Meier #f ,(base16-string->bytevector "123456") #f)
 | |
|   (let ((lst (string->canonical-sexp
 | |
|               "(Name Otto Meier (address Burgplatz) #123456#)")))
 | |
|     (unfold (cut > <> 5)
 | |
|             (cut canonical-sexp-nth-data lst <>)
 | |
|             1+
 | |
|             0)))
 | |
| 
 | |
| (let ((bv (base16-string->bytevector
 | |
|            "5eff0b55c9c5f5e87b4e34cd60a2d5654ca1eb78c7b3c67c3179fed1cff07b4c")))
 | |
|   (test-equal "hash corrupt due to restrictive locale encoding"
 | |
|     bv
 | |
| 
 | |
|     ;; In Guix up to 0.6 included this test would fail because at some point
 | |
|     ;; the hash value would be cropped to ASCII.  In practice 'guix
 | |
|     ;; authenticate' would produce invalid signatures that would fail
 | |
|     ;; signature verification.  See <http://bugs.gnu.org/17312>.
 | |
|     (let ((locale (setlocale LC_ALL)))
 | |
|      (dynamic-wind
 | |
|        (lambda ()
 | |
|          (setlocale LC_ALL "C"))
 | |
|        (lambda ()
 | |
|          (hash-data->bytevector
 | |
|           (string->canonical-sexp
 | |
|            (canonical-sexp->string
 | |
|             (bytevector->hash-data bv "sha256")))))
 | |
|        (lambda ()
 | |
|          (setlocale LC_ALL locale))))))
 | |
| 
 | |
| (gc)
 | |
| 
 | |
| ;; XXX: The test below is typically too long as it needs to gather enough entropy.
 | |
| 
 | |
| ;; (test-assert "generate-key"
 | |
| ;;   (let ((key (generate-key (string->canonical-sexp
 | |
| ;;                             "(genkey (rsa (nbits 3:128)))"))))
 | |
| ;;     (and (canonical-sexp? key)
 | |
| ;;          (find-sexp-token key 'key-data)
 | |
| ;;          (find-sexp-token key 'public-key)
 | |
| ;;          (find-sexp-token key 'private-key))))
 | |
| 
 | |
| (test-assert "bytevector->hash-data->bytevector"
 | |
|   (let* ((bv   (sha256 (string->utf8 "Hello, world.")))
 | |
|          (data (bytevector->hash-data bv "sha256")))
 | |
|     (and (canonical-sexp? data)
 | |
|          (let-values (((value algo) (hash-data->bytevector data)))
 | |
|            (and (string=? algo "sha256")
 | |
|                 (bytevector=? value bv))))))
 | |
| 
 | |
| (test-equal "key-type"
 | |
|   '(rsa ecc)
 | |
|   (map (compose key-type
 | |
|                 (cut find-sexp-token <> 'public-key)
 | |
|                 string->canonical-sexp)
 | |
|        (list %key-pair %ecc-key-pair)))
 | |
| 
 | |
| (test-assert "sign + verify"
 | |
|   (let* ((pair   (string->canonical-sexp %key-pair))
 | |
|          (secret (find-sexp-token pair 'private-key))
 | |
|          (public (find-sexp-token pair 'public-key))
 | |
|          (data   (bytevector->hash-data
 | |
|                   (sha256 (string->utf8 "Hello, world."))
 | |
|                   #:key-type (key-type public)))
 | |
|          (sig    (sign data secret)))
 | |
|     (and (verify sig data public)
 | |
|          (not (verify sig
 | |
|                       (bytevector->hash-data
 | |
|                        (sha256 (string->utf8 "Hi!"))
 | |
|                        #:key-type (key-type public))
 | |
|                       public)))))
 | |
| 
 | |
| ;; Ed25519 appeared in libgcrypt 1.6.0.
 | |
| (test-skip (if (version>? (gcrypt-version) "1.6.0") 0 1))
 | |
| (test-assert "sign + verify, Ed25519"
 | |
|   (let* ((pair   (string->canonical-sexp %ecc-key-pair))
 | |
|          (secret (find-sexp-token pair 'private-key))
 | |
|          (public (find-sexp-token pair 'public-key))
 | |
|          (data   (bytevector->hash-data
 | |
|                   (sha256 (string->utf8 "Hello, world."))))
 | |
|          (sig    (sign data secret)))
 | |
|     (and (verify sig data public)
 | |
|          (not (verify sig
 | |
|                       (bytevector->hash-data
 | |
|                        (sha256 (string->utf8 "Hi!")))
 | |
|                       public)))))
 | |
| 
 | |
| (gc)
 | |
| 
 | |
| (test-equal "canonical-sexp->sexp"
 | |
|   `((data
 | |
|      (flags pkcs1)
 | |
|      (hash sha256
 | |
|            ,(base16-string->bytevector
 | |
|              "2749f0ea9f26c6c7be746a9cff8fa4c2f2a02b000070dba78429e9a11f87c6eb")))
 | |
| 
 | |
|     (public-key
 | |
|      (rsa
 | |
|       (n ,(base16-string->bytevector
 | |
|            (string-downcase
 | |
|             "00C1F764069F54FFE93A126B02328903E984E4AE3AF6DF402B5B6B3907911B88C385F1BA76A002EC9DEA109A5228EF0E62EE31A06D1A5861CAB474F6C857AC66EB65A1905F25BBA1869579E73A3B7FED13AF5A1667326F88CDFC2FF24B03C14FD1384AA7E73CA89572880B606E3A974E15347963FC7B6378574936A47580DBCB45")))
 | |
|       (e ,(base16-string->bytevector
 | |
|            "010001")))))
 | |
| 
 | |
|   (list (canonical-sexp->sexp
 | |
|          (string->canonical-sexp
 | |
|           "(data
 | |
|              (flags pkcs1)
 | |
|              (hash \"sha256\"
 | |
|                    #2749f0ea9f26c6c7be746a9cff8fa4c2f2a02b000070dba78429e9a11f87c6eb#))"))
 | |
| 
 | |
|         (canonical-sexp->sexp
 | |
|          (find-sexp-token (string->canonical-sexp %key-pair)
 | |
|                           'public-key))))
 | |
| 
 | |
| 
 | |
| (let ((lst
 | |
|        `((data
 | |
|           (flags pkcs1)
 | |
|           (hash sha256
 | |
|                 ,(base16-string->bytevector
 | |
|                   "2749f0ea9f26c6c7be746a9cff8fa4c2f2a02b000070dba78429e9a11f87c6eb")))
 | |
| 
 | |
|          (public-key
 | |
|           (rsa
 | |
|            (n ,(base16-string->bytevector
 | |
|                 (string-downcase
 | |
|                  "00C1F764069F54FFE93A126B02328903E984E4AE3AF6DF402B5B6B3907911B88C385F1BA76A002EC9DEA109A5228EF0E62EE31A06D1A5861CAB474F6C857AC66EB65A1905F25BBA1869579E73A3B7FED13AF5A1667326F88CDFC2FF24B03C14FD1384AA7E73CA89572880B606E3A974E15347963FC7B6378574936A47580DBCB45")))
 | |
|            (e ,(base16-string->bytevector
 | |
|                 "010001"))))
 | |
| 
 | |
|          ,(base16-string->bytevector
 | |
|            "2749f0ea9f26c6c7be746a9cff8fa4c2f2a02b000070dba78429e9a11f87c6eb"))))
 | |
|   (test-equal "sexp->canonical-sexp->sexp"
 | |
|     lst
 | |
|     (map (compose canonical-sexp->sexp sexp->canonical-sexp)
 | |
|          lst)))
 | |
| 
 | |
| (let ((sexp `(signature
 | |
|               (public-key
 | |
|                (rsa
 | |
|                 (n ,(make-bytevector 1024 1))
 | |
|                 (e ,(base16-string->bytevector "010001")))))))
 | |
|   (test-equal "https://bugs.g10code.com/gnupg/issue1594"
 | |
|     ;; The gcrypt bug above was primarily affecting our uses in
 | |
|     ;; 'canonical-sexp->sexp', typically when applied to a signature sexp (in
 | |
|     ;; 'guix authenticate -verify') with a "big" RSA key, such as 4096 bits.
 | |
|     sexp
 | |
|     (canonical-sexp->sexp (sexp->canonical-sexp sexp))))
 | |
| 
 | |
| (test-end)
 |