1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169
|
//===----------------------------------------------------------------------===//
//
// This source file is part of the Swift open source project
//
// Copyright (c) 2021-2023 Apple Inc. and the Swift project authors
// Licensed under Apache License v2.0 with Runtime Library Exception
//
// See http://swift.org/LICENSE.txt for license information
// See http://swift.org/CONTRIBUTORS.txt for the list of Swift project authors
//
//===----------------------------------------------------------------------===//
import _CryptoExtras
import Basics
import Crypto
import Foundation
@testable import PackageCollectionsSigning
import SPMTestSupport
import X509
import XCTest
class SignatureTests: XCTestCase {
func test_RS256_generateAndValidate_happyCase() async throws {
let jsonEncoder = JSONEncoder.makeWithDefaults()
let jsonDecoder = JSONDecoder.makeWithDefaults()
let certData = try await self.readTestCertData(
path: { fixturePath in fixturePath.appending(components: "Certificates", "Test_rsa.cer") }
)
let certBase64Encoded = certData.base64EncodedString()
let certificate = try Certificate(derEncoded: Array(certData))
let payload = ["foo": "bar"]
let privateKey = try _RSA.Signing.PrivateKey(pemRepresentation: certRSAPrivateKey)
let signature = try Signature.generate(
payload: payload,
certChainData: [certData],
jsonEncoder: jsonEncoder,
signatureAlgorithm: .RS256
) {
try privateKey.signature(for: SHA256.hash(data: $0), padding: Signature.rsaSigningPadding).rawRepresentation
}
let parsedSignature = try await Signature.parse(
signature,
certChainValidate: { _ in [certificate] },
jsonDecoder: jsonDecoder
)
XCTAssertEqual(try jsonDecoder.decode([String: String].self, from: parsedSignature.payload), payload)
XCTAssertEqual(parsedSignature.header.algorithm, Signature.Algorithm.RS256)
XCTAssertEqual(parsedSignature.header.certChain, [certBase64Encoded])
}
func test_RS256_generateAndValidate_keyMismatch() async throws {
let jsonEncoder = JSONEncoder.makeWithDefaults()
let jsonDecoder = JSONDecoder.makeWithDefaults()
let certData = try await self.readTestCertData(
path: { fixturePath in fixturePath.appending(components: "Certificates", "Test_rsa.cer") }
)
let certificate = try Certificate(derEncoded: Array(certData))
let payload = ["foo": "bar"]
// This is not cert's key so `parse` will fail
let privateKey = try _RSA.Signing.PrivateKey(pemRepresentation: rsaPrivateKey)
let signature = try Signature.generate(
payload: payload,
certChainData: [certData],
jsonEncoder: jsonEncoder,
signatureAlgorithm: .RS256
) {
try privateKey.signature(for: SHA256.hash(data: $0), padding: Signature.rsaSigningPadding).rawRepresentation
}
do {
_ = try await Signature.parse(
signature,
certChainValidate: { _ in [certificate] },
jsonDecoder: jsonDecoder
)
XCTFail("Expected error")
} catch {
guard SignatureError.invalidSignature == error as? SignatureError else {
return XCTFail("Expected SignatureError.invalidSignature")
}
}
}
func test_ES256_generateAndValidate_happyCase() async throws {
let jsonEncoder = JSONEncoder.makeWithDefaults()
let jsonDecoder = JSONDecoder.makeWithDefaults()
let certData = try await self.readTestCertData(
path: { fixturePath in fixturePath.appending(components: "Certificates", "Test_ec.cer") }
)
let certBase64Encoded = certData.base64EncodedString()
let certificate = try Certificate(derEncoded: Array(certData))
let payload = ["foo": "bar"]
let privateKey = try P256.Signing.PrivateKey(pemRepresentation: certECPrivateKey)
let signature = try Signature.generate(
payload: payload,
certChainData: [certData],
jsonEncoder: jsonEncoder,
signatureAlgorithm: .ES256
) {
try privateKey.signature(for: SHA256.hash(data: $0)).rawRepresentation
}
let parsedSignature = try await Signature.parse(
signature,
certChainValidate: { _ in [certificate] },
jsonDecoder: jsonDecoder
)
XCTAssertEqual(try jsonDecoder.decode([String: String].self, from: parsedSignature.payload), payload)
XCTAssertEqual(parsedSignature.header.algorithm, Signature.Algorithm.ES256)
XCTAssertEqual(parsedSignature.header.certChain, [certBase64Encoded])
}
func test_ES256_generateAndValidate_keyMismatch() async throws {
let jsonEncoder = JSONEncoder.makeWithDefaults()
let jsonDecoder = JSONDecoder.makeWithDefaults()
let certData = try await self.readTestCertData(
path: { fixturePath in fixturePath.appending(components: "Certificates", "Test_ec.cer") }
)
let certificate = try Certificate(derEncoded: Array(certData))
let payload = ["foo": "bar"]
// This is not cert's key so `parse` will fail
let privateKey = try P256.Signing.PrivateKey(pemRepresentation: ecPrivateKey)
let signature = try Signature.generate(
payload: payload,
certChainData: [certData],
jsonEncoder: jsonEncoder,
signatureAlgorithm: .ES256
) {
try privateKey.signature(for: SHA256.hash(data: $0)).rawRepresentation
}
do {
_ = try await Signature.parse(
signature,
certChainValidate: { _ in [certificate] },
jsonDecoder: jsonDecoder
)
XCTFail("Expected error")
} catch {
guard SignatureError.invalidSignature == error as? SignatureError else {
return XCTFail("Expected SignatureError.invalidSignature")
}
}
}
private func readTestCertData(path: (AbsolutePath) -> AbsolutePath) async throws -> Data {
try await withCheckedThrowingContinuation { continuation in
do {
try fixture(name: "Signing", createGitRepo: false) { fixturePath in
let certPath = path(fixturePath)
let certData: Data = try localFileSystem.readFileContents(certPath)
continuation.resume(returning: certData)
}
} catch {
continuation.resume(throwing: error)
}
}
}
}
|