1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59
|
package sshsig_test
import (
"crypto/ed25519"
"crypto/rand"
"errors"
"testing"
"testing/iotest"
"github.com/stretchr/testify/assert"
"golang.org/x/crypto/ssh"
"github.com/hiddeco/sshsig"
)
func TestVerify(t *testing.T) {
t.Run("different namespace", func(t *testing.T) {
cPub, _, err := ed25519.GenerateKey(rand.Reader)
assert.NoError(t, err)
pub, err := ssh.NewPublicKey(cPub)
assert.NoError(t, err)
namespaceA := "foo"
namespaceB := "bar"
err = sshsig.Verify(nil, &sshsig.Signature{
PublicKey: pub, Namespace: namespaceA,
}, pub, sshsig.HashSHA256, namespaceB)
assert.ErrorIs(t, err, sshsig.ErrNamespaceMismatch)
})
t.Run("unsupported hash algorithm", func(t *testing.T) {
cPub, _, err := ed25519.GenerateKey(rand.Reader)
assert.NoError(t, err)
pub, err := ssh.NewPublicKey(cPub)
assert.NoError(t, err)
err = sshsig.Verify(nil, &sshsig.Signature{
PublicKey: pub,
}, pub, "unsupported", "")
assert.ErrorIs(t, err, sshsig.ErrUnsupportedHashAlgorithm)
})
t.Run("message read error", func(t *testing.T) {
cPub, _, err := ed25519.GenerateKey(rand.Reader)
assert.NoError(t, err)
pub, err := ssh.NewPublicKey(cPub)
assert.NoError(t, err)
mockErr := errors.New("read error")
err = sshsig.Verify(iotest.ErrReader(mockErr), &sshsig.Signature{
PublicKey: pub,
}, pub, sshsig.HashSHA256, "")
assert.ErrorIs(t, err, mockErr)
})
}
|