...

Source file src/golang.org/x/crypto/openpgp/packet/public_key_test.go

Documentation: golang.org/x/crypto/openpgp/packet

     1  // Copyright 2011 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  package packet
     6  
     7  import (
     8  	"bytes"
     9  	"crypto/ecdsa"
    10  	"crypto/elliptic"
    11  	"encoding/hex"
    12  	"math/big"
    13  	"testing"
    14  	"time"
    15  )
    16  
    17  var pubKeyTests = []struct {
    18  	hexData        string
    19  	hexFingerprint string
    20  	creationTime   time.Time
    21  	pubKeyAlgo     PublicKeyAlgorithm
    22  	keyId          uint64
    23  	keyIdString    string
    24  	keyIdShort     string
    25  }{
    26  	{rsaPkDataHex, rsaFingerprintHex, time.Unix(0x4d3c5c10, 0), PubKeyAlgoRSA, 0xa34d7e18c20c31bb, "A34D7E18C20C31BB", "C20C31BB"},
    27  	{dsaPkDataHex, dsaFingerprintHex, time.Unix(0x4d432f89, 0), PubKeyAlgoDSA, 0x8e8fbe54062f19ed, "8E8FBE54062F19ED", "062F19ED"},
    28  	{ecdsaPkDataHex, ecdsaFingerprintHex, time.Unix(0x5071c294, 0), PubKeyAlgoECDSA, 0x43fe956c542ca00b, "43FE956C542CA00B", "542CA00B"},
    29  }
    30  
    31  func TestPublicKeyRead(t *testing.T) {
    32  	for i, test := range pubKeyTests {
    33  		packet, err := Read(readerFromHex(test.hexData))
    34  		if err != nil {
    35  			t.Errorf("#%d: Read error: %s", i, err)
    36  			continue
    37  		}
    38  		pk, ok := packet.(*PublicKey)
    39  		if !ok {
    40  			t.Errorf("#%d: failed to parse, got: %#v", i, packet)
    41  			continue
    42  		}
    43  		if pk.PubKeyAlgo != test.pubKeyAlgo {
    44  			t.Errorf("#%d: bad public key algorithm got:%x want:%x", i, pk.PubKeyAlgo, test.pubKeyAlgo)
    45  		}
    46  		if !pk.CreationTime.Equal(test.creationTime) {
    47  			t.Errorf("#%d: bad creation time got:%v want:%v", i, pk.CreationTime, test.creationTime)
    48  		}
    49  		expectedFingerprint, _ := hex.DecodeString(test.hexFingerprint)
    50  		if !bytes.Equal(expectedFingerprint, pk.Fingerprint[:]) {
    51  			t.Errorf("#%d: bad fingerprint got:%x want:%x", i, pk.Fingerprint[:], expectedFingerprint)
    52  		}
    53  		if pk.KeyId != test.keyId {
    54  			t.Errorf("#%d: bad keyid got:%x want:%x", i, pk.KeyId, test.keyId)
    55  		}
    56  		if g, e := pk.KeyIdString(), test.keyIdString; g != e {
    57  			t.Errorf("#%d: bad KeyIdString got:%q want:%q", i, g, e)
    58  		}
    59  		if g, e := pk.KeyIdShortString(), test.keyIdShort; g != e {
    60  			t.Errorf("#%d: bad KeyIdShortString got:%q want:%q", i, g, e)
    61  		}
    62  	}
    63  }
    64  
    65  func TestPublicKeySerialize(t *testing.T) {
    66  	for i, test := range pubKeyTests {
    67  		packet, err := Read(readerFromHex(test.hexData))
    68  		if err != nil {
    69  			t.Errorf("#%d: Read error: %s", i, err)
    70  			continue
    71  		}
    72  		pk, ok := packet.(*PublicKey)
    73  		if !ok {
    74  			t.Errorf("#%d: failed to parse, got: %#v", i, packet)
    75  			continue
    76  		}
    77  		serializeBuf := bytes.NewBuffer(nil)
    78  		err = pk.Serialize(serializeBuf)
    79  		if err != nil {
    80  			t.Errorf("#%d: failed to serialize: %s", i, err)
    81  			continue
    82  		}
    83  
    84  		packet, err = Read(serializeBuf)
    85  		if err != nil {
    86  			t.Errorf("#%d: Read error (from serialized data): %s", i, err)
    87  			continue
    88  		}
    89  		pk, ok = packet.(*PublicKey)
    90  		if !ok {
    91  			t.Errorf("#%d: failed to parse serialized data, got: %#v", i, packet)
    92  			continue
    93  		}
    94  	}
    95  }
    96  
    97  func TestEcc384Serialize(t *testing.T) {
    98  	r := readerFromHex(ecc384PubHex)
    99  	var w bytes.Buffer
   100  	for i := 0; i < 2; i++ {
   101  		// Public key
   102  		p, err := Read(r)
   103  		if err != nil {
   104  			t.Error(err)
   105  		}
   106  		pubkey := p.(*PublicKey)
   107  		if !bytes.Equal(pubkey.ec.oid, []byte{0x2b, 0x81, 0x04, 0x00, 0x22}) {
   108  			t.Errorf("Unexpected pubkey OID: %x", pubkey.ec.oid)
   109  		}
   110  		if !bytes.Equal(pubkey.ec.p.bytes[:5], []byte{0x04, 0xf6, 0xb8, 0xc5, 0xac}) {
   111  			t.Errorf("Unexpected pubkey P[:5]: %x", pubkey.ec.p.bytes)
   112  		}
   113  		if pubkey.KeyId != 0x098033880F54719F {
   114  			t.Errorf("Unexpected pubkey ID: %x", pubkey.KeyId)
   115  		}
   116  		err = pubkey.Serialize(&w)
   117  		if err != nil {
   118  			t.Error(err)
   119  		}
   120  		// User ID
   121  		p, err = Read(r)
   122  		if err != nil {
   123  			t.Error(err)
   124  		}
   125  		uid := p.(*UserId)
   126  		if uid.Id != "ec_dsa_dh_384 <openpgp@brainhub.org>" {
   127  			t.Error("Unexpected UID:", uid.Id)
   128  		}
   129  		err = uid.Serialize(&w)
   130  		if err != nil {
   131  			t.Error(err)
   132  		}
   133  		// User ID Sig
   134  		p, err = Read(r)
   135  		if err != nil {
   136  			t.Error(err)
   137  		}
   138  		uidSig := p.(*Signature)
   139  		err = pubkey.VerifyUserIdSignature(uid.Id, pubkey, uidSig)
   140  		if err != nil {
   141  			t.Error(err, ": UID")
   142  		}
   143  		err = uidSig.Serialize(&w)
   144  		if err != nil {
   145  			t.Error(err)
   146  		}
   147  		// Subkey
   148  		p, err = Read(r)
   149  		if err != nil {
   150  			t.Error(err)
   151  		}
   152  		subkey := p.(*PublicKey)
   153  		if !bytes.Equal(subkey.ec.oid, []byte{0x2b, 0x81, 0x04, 0x00, 0x22}) {
   154  			t.Errorf("Unexpected subkey OID: %x", subkey.ec.oid)
   155  		}
   156  		if !bytes.Equal(subkey.ec.p.bytes[:5], []byte{0x04, 0x2f, 0xaa, 0x84, 0x02}) {
   157  			t.Errorf("Unexpected subkey P[:5]: %x", subkey.ec.p.bytes)
   158  		}
   159  		if subkey.ecdh.KdfHash != 0x09 {
   160  			t.Error("Expected KDF hash function SHA384 (0x09), got", subkey.ecdh.KdfHash)
   161  		}
   162  		if subkey.ecdh.KdfAlgo != 0x09 {
   163  			t.Error("Expected KDF symmetric alg AES256 (0x09), got", subkey.ecdh.KdfAlgo)
   164  		}
   165  		if subkey.KeyId != 0xAA8B938F9A201946 {
   166  			t.Errorf("Unexpected subkey ID: %x", subkey.KeyId)
   167  		}
   168  		err = subkey.Serialize(&w)
   169  		if err != nil {
   170  			t.Error(err)
   171  		}
   172  		// Subkey Sig
   173  		p, err = Read(r)
   174  		if err != nil {
   175  			t.Error(err)
   176  		}
   177  		subkeySig := p.(*Signature)
   178  		err = pubkey.VerifyKeySignature(subkey, subkeySig)
   179  		if err != nil {
   180  			t.Error(err)
   181  		}
   182  		err = subkeySig.Serialize(&w)
   183  		if err != nil {
   184  			t.Error(err)
   185  		}
   186  		// Now read back what we've written again
   187  		r = bytes.NewBuffer(w.Bytes())
   188  		w.Reset()
   189  	}
   190  }
   191  
   192  func TestP256KeyID(t *testing.T) {
   193  	// Confirm that key IDs are correctly calculated for ECC keys.
   194  	ecdsaPub := &ecdsa.PublicKey{
   195  		Curve: elliptic.P256(),
   196  		X:     fromHex("81fbbc20eea9e8d1c3ceabb0a8185925b113d1ac42cd5c78403bd83da19235c6"),
   197  		Y:     fromHex("5ed6db13d91db34507d0129bf88981878d29adbf8fcd1720afdb767bb3fcaaff"),
   198  	}
   199  	pub := NewECDSAPublicKey(time.Unix(1297309478, 0), ecdsaPub)
   200  
   201  	const want = uint64(0xd01055fbcadd268e)
   202  	if pub.KeyId != want {
   203  		t.Errorf("want key ID: %x, got %x", want, pub.KeyId)
   204  	}
   205  }
   206  
   207  func fromHex(hex string) *big.Int {
   208  	n, ok := new(big.Int).SetString(hex, 16)
   209  	if !ok {
   210  		panic("bad hex number: " + hex)
   211  	}
   212  	return n
   213  }
   214  
   215  const rsaFingerprintHex = "5fb74b1d03b1e3cb31bc2f8aa34d7e18c20c31bb"
   216  
   217  const rsaPkDataHex = "988d044d3c5c10010400b1d13382944bd5aba23a4312968b5095d14f947f600eb478e14a6fcb16b0e0cac764884909c020bc495cfcc39a935387c661507bdb236a0612fb582cac3af9b29cc2c8c70090616c41b662f4da4c1201e195472eb7f4ae1ccbcbf9940fe21d985e379a5563dde5b9a23d35f1cfaa5790da3b79db26f23695107bfaca8e7b5bcd0011010001"
   218  
   219  const dsaFingerprintHex = "eece4c094db002103714c63c8e8fbe54062f19ed"
   220  
   221  const dsaPkDataHex = "9901a2044d432f89110400cd581334f0d7a1e1bdc8b9d6d8c0baf68793632735d2bb0903224cbaa1dfbf35a60ee7a13b92643421e1eb41aa8d79bea19a115a677f6b8ba3c7818ce53a6c2a24a1608bd8b8d6e55c5090cbde09dd26e356267465ae25e69ec8bdd57c7bbb2623e4d73336f73a0a9098f7f16da2e25252130fd694c0e8070c55a812a423ae7f00a0ebf50e70c2f19c3520a551bd4b08d30f23530d3d03ff7d0bf4a53a64a09dc5e6e6e35854b7d70c882b0c60293401958b1bd9e40abec3ea05ba87cf64899299d4bd6aa7f459c201d3fbbd6c82004bdc5e8a9eb8082d12054cc90fa9d4ec251a843236a588bf49552441817436c4f43326966fe85447d4e6d0acf8fa1ef0f014730770603ad7634c3088dc52501c237328417c31c89ed70400b2f1a98b0bf42f11fefc430704bebbaa41d9f355600c3facee1e490f64208e0e094ea55e3a598a219a58500bf78ac677b670a14f4e47e9cf8eab4f368cc1ddcaa18cc59309d4cc62dd4f680e73e6cc3e1ce87a84d0925efbcb26c575c093fc42eecf45135fabf6403a25c2016e1774c0484e440a18319072c617cc97ac0a3bb0"
   222  
   223  const ecdsaFingerprintHex = "9892270b38b8980b05c8d56d43fe956c542ca00b"
   224  
   225  const ecdsaPkDataHex = "9893045071c29413052b8104002304230401f4867769cedfa52c325018896245443968e52e51d0c2df8d939949cb5b330f2921711fbee1c9b9dddb95d15cb0255e99badeddda7cc23d9ddcaacbc290969b9f24019375d61c2e4e3b36953a28d8b2bc95f78c3f1d592fb24499be348656a7b17e3963187b4361afe497bc5f9f81213f04069f8e1fb9e6a6290ae295ca1a92b894396cb4"
   226  
   227  // Source: https://sites.google.com/site/brainhub/pgpecckeys#TOC-ECC-NIST-P-384-key
   228  const ecc384PubHex = `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`
   229  

View as plain text