8e5b17cf13
Signed-off-by: Mrunal Patel <mrunalp@gmail.com>
157 lines
3.4 KiB
Go
157 lines
3.4 KiB
Go
package libtrust
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"log"
|
|
"testing"
|
|
)
|
|
|
|
var rsaKeys []PrivateKey
|
|
|
|
func init() {
|
|
var err error
|
|
rsaKeys, err = generateRSATestKeys()
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func generateRSATestKeys() (keys []PrivateKey, err error) {
|
|
log.Println("Generating RSA 2048-bit Test Key")
|
|
rsa2048Key, err := GenerateRSA2048PrivateKey()
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
log.Println("Generating RSA 3072-bit Test Key")
|
|
rsa3072Key, err := GenerateRSA3072PrivateKey()
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
log.Println("Generating RSA 4096-bit Test Key")
|
|
rsa4096Key, err := GenerateRSA4096PrivateKey()
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
log.Println("Done generating RSA Test Keys!")
|
|
keys = []PrivateKey{rsa2048Key, rsa3072Key, rsa4096Key}
|
|
|
|
return
|
|
}
|
|
|
|
func TestRSAKeys(t *testing.T) {
|
|
for _, rsaKey := range rsaKeys {
|
|
if rsaKey.KeyType() != "RSA" {
|
|
t.Fatalf("key type must be %q, instead got %q", "RSA", rsaKey.KeyType())
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestRSASignVerify(t *testing.T) {
|
|
message := "Hello, World!"
|
|
data := bytes.NewReader([]byte(message))
|
|
|
|
sigAlgs := []*signatureAlgorithm{rs256, rs384, rs512}
|
|
|
|
for i, rsaKey := range rsaKeys {
|
|
sigAlg := sigAlgs[i]
|
|
|
|
t.Logf("%s signature of %q with kid: %s\n", sigAlg.HeaderParam(), message, rsaKey.KeyID())
|
|
|
|
data.Seek(0, 0) // Reset the byte reader
|
|
|
|
// Sign
|
|
sig, alg, err := rsaKey.Sign(data, sigAlg.HashID())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
data.Seek(0, 0) // Reset the byte reader
|
|
|
|
// Verify
|
|
err = rsaKey.Verify(data, alg, sig)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestMarshalUnmarshalRSAKeys(t *testing.T) {
|
|
data := bytes.NewReader([]byte("This is a test. I repeat: this is only a test."))
|
|
sigAlgs := []*signatureAlgorithm{rs256, rs384, rs512}
|
|
|
|
for i, rsaKey := range rsaKeys {
|
|
sigAlg := sigAlgs[i]
|
|
privateJWKJSON, err := json.MarshalIndent(rsaKey, "", " ")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
publicJWKJSON, err := json.MarshalIndent(rsaKey.PublicKey(), "", " ")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
t.Logf("JWK Private Key: %s", string(privateJWKJSON))
|
|
t.Logf("JWK Public Key: %s", string(publicJWKJSON))
|
|
|
|
privKey2, err := UnmarshalPrivateKeyJWK(privateJWKJSON)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
pubKey2, err := UnmarshalPublicKeyJWK(publicJWKJSON)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Ensure we can sign/verify a message with the unmarshalled keys.
|
|
data.Seek(0, 0) // Reset the byte reader
|
|
signature, alg, err := privKey2.Sign(data, sigAlg.HashID())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
data.Seek(0, 0) // Reset the byte reader
|
|
err = pubKey2.Verify(data, alg, signature)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// It's a good idea to validate the Private Key to make sure our
|
|
// (un)marshal process didn't corrupt the extra parameters.
|
|
k := privKey2.(*rsaPrivateKey)
|
|
err = k.PrivateKey.Validate()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFromCryptoRSAKeys(t *testing.T) {
|
|
for _, rsaKey := range rsaKeys {
|
|
cryptoPrivateKey := rsaKey.CryptoPrivateKey()
|
|
cryptoPublicKey := rsaKey.CryptoPublicKey()
|
|
|
|
pubKey, err := FromCryptoPublicKey(cryptoPublicKey)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if pubKey.KeyID() != rsaKey.KeyID() {
|
|
t.Fatal("public key key ID mismatch")
|
|
}
|
|
|
|
privKey, err := FromCryptoPrivateKey(cryptoPrivateKey)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if privKey.KeyID() != rsaKey.KeyID() {
|
|
t.Fatal("public key key ID mismatch")
|
|
}
|
|
}
|
|
}
|