0e2fd97029
* identity fixes+: + fix `peertls.NewCert` public key issue + fix `peertls.verfiyChain` issue + fix identity dial option + rename `GenerateCA` to `NewCA` and `generateCAWorker` to `newCAWorker` for better consistency/convention
128 lines
3.2 KiB
Go
128 lines
3.2 KiB
Go
// Copyright (C) 2018 Storj Labs, Inc.
|
|
// See LICENSE for copying information.
|
|
|
|
package peertls
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/ecdsa"
|
|
"crypto/x509"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/zeebo/errs"
|
|
)
|
|
|
|
func TestNewCert_CA(t *testing.T) {
|
|
k, err := NewKey()
|
|
assert.NoError(t, err)
|
|
|
|
ct, err := CATemplate()
|
|
assert.NoError(t, err)
|
|
|
|
p, _ := k.(*ecdsa.PrivateKey)
|
|
c, err := NewCert(ct, nil, &p.PublicKey, k)
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotEmpty(t, k.(*ecdsa.PrivateKey))
|
|
assert.NotEmpty(t, c)
|
|
assert.NotEmpty(t, c.PublicKey.(*ecdsa.PublicKey))
|
|
|
|
err = c.CheckSignatureFrom(c)
|
|
assert.NoError(t, err)
|
|
}
|
|
|
|
func TestNewCert_Leaf(t *testing.T) {
|
|
k, err := NewKey()
|
|
assert.NoError(t, err)
|
|
|
|
ct, err := CATemplate()
|
|
assert.NoError(t, err)
|
|
|
|
cp, _ := k.(*ecdsa.PrivateKey)
|
|
c, err := NewCert(ct, nil, &cp.PublicKey, k)
|
|
assert.NoError(t, err)
|
|
|
|
lt, err := LeafTemplate()
|
|
assert.NoError(t, err)
|
|
|
|
lp, _ := k.(*ecdsa.PrivateKey)
|
|
l, err := NewCert(lt, ct, &lp.PublicKey, k)
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotEmpty(t, k.(*ecdsa.PrivateKey))
|
|
assert.NotEmpty(t, l)
|
|
assert.NotEmpty(t, l.PublicKey.(*ecdsa.PublicKey))
|
|
|
|
err = c.CheckSignatureFrom(c)
|
|
assert.NoError(t, err)
|
|
err = l.CheckSignatureFrom(c)
|
|
assert.NoError(t, err)
|
|
}
|
|
|
|
func TestVerifyPeerFunc(t *testing.T) {
|
|
k, err := NewKey()
|
|
assert.NoError(t, err)
|
|
|
|
ct, err := CATemplate()
|
|
assert.NoError(t, err)
|
|
|
|
cp, _ := k.(*ecdsa.PrivateKey)
|
|
c, err := NewCert(ct, nil, &cp.PublicKey, k)
|
|
assert.NoError(t, err)
|
|
|
|
lt, err := LeafTemplate()
|
|
assert.NoError(t, err)
|
|
|
|
lp, _ := k.(*ecdsa.PrivateKey)
|
|
l, err := NewCert(lt, ct, &lp.PublicKey, k)
|
|
assert.NoError(t, err)
|
|
|
|
testFunc := func(chain [][]byte, parsedChains [][]*x509.Certificate) error {
|
|
switch {
|
|
case bytes.Compare(chain[1], c.Raw) != 0:
|
|
return errs.New("CA cert doesn't match")
|
|
case bytes.Compare(chain[0], l.Raw) != 0:
|
|
return errs.New("leaf's CA cert doesn't match")
|
|
case l.PublicKey.(*ecdsa.PublicKey).Curve != parsedChains[0][0].PublicKey.(*ecdsa.PublicKey).Curve:
|
|
return errs.New("leaf public key doesn't match")
|
|
case l.PublicKey.(*ecdsa.PublicKey).X.Cmp(parsedChains[0][0].PublicKey.(*ecdsa.PublicKey).X) != 0:
|
|
return errs.New("leaf public key doesn't match")
|
|
case l.PublicKey.(*ecdsa.PublicKey).Y.Cmp(parsedChains[0][0].PublicKey.(*ecdsa.PublicKey).Y) != 0:
|
|
return errs.New("leaf public key doesn't match")
|
|
case bytes.Compare(parsedChains[0][1].Raw, c.Raw) != 0:
|
|
return errs.New("parsed CA cert doesn't match")
|
|
case bytes.Compare(parsedChains[0][0].Raw, l.Raw) != 0:
|
|
return errs.New("parsed leaf cert doesn't match")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
err = VerifyPeerFunc(testFunc)([][]byte{l.Raw, c.Raw}, nil)
|
|
assert.NoError(t, err)
|
|
}
|
|
|
|
func TestVerifyPeerCertChains(t *testing.T) {
|
|
k, err := NewKey()
|
|
assert.NoError(t, err)
|
|
|
|
ct, err := CATemplate()
|
|
assert.NoError(t, err)
|
|
|
|
cp, ok := k.(*ecdsa.PrivateKey)
|
|
assert.True(t, ok)
|
|
c, err := NewCert(ct, nil, &cp.PublicKey, k)
|
|
assert.NoError(t, err)
|
|
|
|
lt, err := LeafTemplate()
|
|
assert.NoError(t, err)
|
|
|
|
lp, ok := k.(*ecdsa.PrivateKey)
|
|
assert.True(t, ok)
|
|
l, err := NewCert(lt, ct, &lp.PublicKey, k)
|
|
assert.NoError(t, err)
|
|
|
|
err = VerifyPeerFunc(VerifyPeerCertChains)([][]byte{l.Raw, c.Raw}, nil)
|
|
assert.NoError(t, err)
|
|
}
|