1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69
|
//
// Copyright 2021 The Sigstore Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package signature
import (
"crypto"
"crypto/rsa"
"encoding/base64"
"strings"
"testing"
"github.com/sigstore/sigstore/pkg/cryptoutils"
)
// keys defined in rsapss_test.go
func TestRSAPKCS1v15SignerVerifier(t *testing.T) {
privateKey, err := cryptoutils.UnmarshalPEMToPrivateKey([]byte(rsaKey), cryptoutils.SkipPassword)
if err != nil {
t.Errorf("unexpected error unmarshalling private key: %v", err)
}
privKey, _ := privateKey.(*rsa.PrivateKey)
sv, err := LoadRSAPKCS1v15SignerVerifier(privKey, crypto.SHA256)
if err != nil {
t.Errorf("unexpected error creating signer/verifier: %v", err)
}
message := []byte("sign me")
// created with openssl dgst -sign privKey.pem -sha256
sig, _ := base64.StdEncoding.DecodeString("AMpSInspjqXdigO0vACd7KMilwLMnrHqnSitnyY0dNiIQ912I2wEme3sMqAMeWnsJ26BxObqV2iMZiggnmeMwd92+6dWpfc2is7m3IbdrUmwKG8y4WDegXEq+EWOy6qsPoqXFPgn1500MFkwrMASP035Gu6wTPmc92zimKozT91j2MNBSONWlcrP89DYBpSVnX+AUs4CKJUppRH/AeyKtftm8GC2TOGrG83U5JqDNegbp5Sji3ViAbUtbiHfob4o1VDGqlyCLgaB0sthekI0XFucWHJj9xRBFazcSBA7Bw1I+T08SqsjfP9Gz43VkItnZbwXMWdSRV81vEK0UuX/rA==")
testingSigner(t, sv, "rsa", crypto.SHA256, message)
testingVerifier(t, sv, "rsa", crypto.SHA256, sig, message)
publicKey, err := cryptoutils.UnmarshalPEMToPublicKey([]byte(pubKey))
if err != nil {
t.Errorf("unexpected error unmarshalling public key: %v", err)
}
pk, _ := publicKey.(*rsa.PublicKey)
v, err := LoadRSAPKCS1v15Verifier(pk, crypto.SHA256)
if err != nil {
t.Errorf("unexpected error creating verifier: %v", err)
}
testingVerifier(t, v, "rsa", crypto.SHA256, sig, message)
}
func TestRSAPKCS1v15SignerVerifierUnsupportedHash(t *testing.T) {
publicKey, err := cryptoutils.UnmarshalPEMToPublicKey([]byte(pubKey))
if err != nil {
t.Errorf("unexpected error unmarshalling public key: %v", err)
}
pk, _ := publicKey.(*rsa.PublicKey)
_, err = LoadRSAPKCS1v15Verifier(pk, crypto.SHA1)
if !strings.Contains(err.Error(), "invalid hash function specified") {
t.Errorf("expected error 'invalid hash function specified', got: %v", err.Error())
}
}
|