2017-09-02 19:09:29 -04:00
|
|
|
// Copyright 2016 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
2016-04-21 19:50:03 -04:00
|
|
|
package pkcs12
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
|
|
|
"encoding/asn1"
|
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Assert the default algorithm parameters are in the correct order,
|
|
|
|
// and default to the correct value. Defaults are based on OpenSSL.
|
|
|
|
// 1. IterationCount, defaults to 2,048 long.
|
|
|
|
// 2. Salt, is 8 bytes long.
|
|
|
|
func TestDefaultAlgorithmParametersPkcs8ShroudedKeyBag(t *testing.T) {
|
|
|
|
privateKey, err := rsa.GenerateKey(rand.Reader, 512)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to generate a private key: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
password := []byte("sesame")
|
|
|
|
bytes, err := encodePkcs8ShroudedKeyBag(privateKey, password)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to encode PKCS#8 shrouded key bag: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var pkinfo encryptedPrivateKeyInfo
|
|
|
|
rest, err := asn1.Unmarshal(bytes, &pkinfo)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to unmarshal encryptedPrivateKeyInfo %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(rest) != 0 {
|
|
|
|
t.Fatalf("unexpected trailing bytes of len=%d, bytes=%x", len(rest), rest)
|
|
|
|
}
|
|
|
|
|
|
|
|
var params pbeParams
|
2017-09-02 19:09:29 -04:00
|
|
|
rest, err = asn1.Unmarshal(pkinfo.Algorithm().Parameters.FullBytes, ¶ms)
|
2016-04-21 19:50:03 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to unmarshal encryptedPrivateKeyInfo %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(rest) != 0 {
|
|
|
|
t.Fatalf("unexpected trailing bytes of len=%d, bytes=%x", len(rest), rest)
|
|
|
|
}
|
|
|
|
|
|
|
|
if params.Iterations != pbeIterationCount {
|
|
|
|
t.Errorf("expected iteration count to be %d, but actual=%d", pbeIterationCount, params.Iterations)
|
|
|
|
}
|
|
|
|
if len(params.Salt) != pbeSaltSizeBytes {
|
|
|
|
t.Errorf("expected the number of salt bytes to be %d, but actual=%d", pbeSaltSizeBytes, len(params.Salt))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRoundTripPkcs8ShroudedKeyBag(t *testing.T) {
|
|
|
|
privateKey, err := rsa.GenerateKey(rand.Reader, 512)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to generate a private key: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
password := []byte("sesame")
|
|
|
|
bytes, err := encodePkcs8ShroudedKeyBag(privateKey, password)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to encode PKCS#8 shrouded key bag: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := decodePkcs8ShroudedKeyBag(bytes, password)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to decode PKCS#8 shrouded key bag: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
actualPrivateKey := key.(*rsa.PrivateKey)
|
|
|
|
if actualPrivateKey.D.Cmp(privateKey.D) != 0 {
|
2017-09-02 19:09:29 -04:00
|
|
|
t.Fatalf("failed to round-trip rsa.PrivateKey.D")
|
2016-04-21 19:50:03 -04:00
|
|
|
}
|
|
|
|
}
|