bine/torutil/key_test.go

127 lines
5.4 KiB
Go

package torutil
import (
"crypto/rand"
"crypto/rsa"
"encoding/base64"
"math/big"
"testing"
"git.openprivacy.ca/openprivacy/bine/torutil/ed25519"
"github.com/stretchr/testify/require"
)
func genRsa(t *testing.T, bits int) *rsa.PrivateKey {
k, e := rsa.GenerateKey(rand.Reader, bits)
require.NoError(t, e)
return k
}
func genEd25519(t *testing.T) ed25519.KeyPair {
k, e := ed25519.GenerateKey(nil)
require.NoError(t, e)
return k
}
func TestOnionServiceIDFromPrivateKey(t *testing.T) {
assert := func(key interface{}, shouldPanic bool) {
if shouldPanic {
require.Panics(t, func() { OnionServiceIDFromPrivateKey(key) })
} else {
require.NotPanics(t, func() { OnionServiceIDFromPrivateKey(key) })
}
}
assert(nil, true)
assert("bad type", true)
assert(genRsa(t, 512), true)
assert(genRsa(t, 1024), false)
assert(genEd25519(t), false)
}
func TestOnionServiceIDFromPublicKey(t *testing.T) {
assert := func(key interface{}, shouldPanic bool) {
if shouldPanic {
require.Panics(t, func() { OnionServiceIDFromPublicKey(key) })
} else {
require.NotPanics(t, func() { OnionServiceIDFromPublicKey(key) })
}
}
assert(nil, true)
assert("bad type", true)
assert(genRsa(t, 512).Public(), true)
assert(genRsa(t, 1024), true)
assert(genRsa(t, 1024).Public(), false)
assert(genEd25519(t), true)
assert(genEd25519(t).Public(), false)
}
func TestOnionServiceIDFromV2PublicKey(t *testing.T) {
keyNs := []string{
// Good:
"146324450904690776677821409274235322093351159271459646966603918354799061259062657420293876128692345182038558188684966983800327732948675482476772223940488746110835191444662533167597590461666544121677987412778085089886835490778554764504249900341150942052002951429704745527158573712253866271451928082512868548761",
"128765593328258418045179848773717342016715415508670816023595649916344640363150769867803188216600032423256896646578968925175093584252663716464819945657362904808776223191437446288878991355616138261909405164010386485361833909203128674413041630645284466111155610996017814867550636519109125461589251061597106654453",
"142816677715940797613971689484332187730646681999601531244837211468050734148365138492918019219363903243436898624689103727294808675158556496441738627693945143098034304873441312947712853824963023184593797741228534339590785521072446422663170639163836372239933736851693970208563926767141632739068954958552435402293",
"145115352997770387235216741368218582671004692828327605746752722031765658311649572143281396789387808261614671508963042791801662334421789227429337599249357503724975792005849908733936522427330824294880823009884401313371327997012363609954851207630328042324027016587584799514594101157535904741483269310276131442141",
"147719637109219630754585551462675301139659936682064979504052824885582296579356301771435242063159743126441027484306731955552256555531866636211668612294755914990702770530441483651548916585382488692381916953093261634746890673551241873307767188168965986976533243218915179497387875035829308609534245761833108189053",
// Bad (512 bit):
"12406459612976799354275054531003074054562219068852891594185203203668633138039185159716483674833390801567933368800574140712590387835931746258315639847176501",
}
matchingIDs := []string{
"kqxsrkmm272hqvbj",
"75rzoc3nxzucidqb",
"l2vxsdecx6yita6r",
"hzma3bmo7mtyr5mq",
"prek6tayypvteljb",
"",
}
for i, keyN := range keyNs {
pubKey := &rsa.PublicKey{E: 65537, N: new(big.Int)}
pubKey.N, _ = pubKey.N.SetString(keyN, 10)
matchingID := matchingIDs[i]
if matchingID == "" {
require.Panics(t, func() { OnionServiceIDFromV2PublicKey(pubKey) })
} else {
require.Equal(t, matchingID, OnionServiceIDFromV2PublicKey(pubKey))
}
}
}
func TestOnionServiceIDFromV3PublicKey(t *testing.T) {
base64Keys := []string{
"SLne6D/uawqUj23619GbeYCd6HnzYPqyUvF8/xyz/3XNVpkgnonQI+J5NQVSGkppD1b0M87+qOtUBmVXsd7H3w",
"kPUs5aPoqISZVbg0q7coW+mNCODlcL4O7k2QWFOCC0gOQBiDm+g4Xz48lqucA7o2HIQ3gBdL5rlB6+q1tFdJwQ",
"YGzw/EwpcqfWb5UWIw652Ps4vTKu38VgX7Qo16XvOWjNWQK9YmfgARYiGQ1XYXEAKBJvoq8x+rKFbQN3FG1F6w",
"IJIZcWE57n5WCvHU2x7GkpBCIw0S0vWd+QyrE5RifGwPtYsbtxjyOxlb754Z0zXLZc+yQUp9hMQt5dt/YNpMag",
"SD7d4I6ZOjNlcqR2g4ptFJUw0tUHPQvfk92sExvnJ1uofPw9T9LUaaEs3rE/1yoGWKI4YejAzaTJXF9wrWQyuA",
}
matchingIDs := []string{
"2s2wk473fmotzgh6l2ycigrwegnurlzufatjm3bglrb36zbvlerskxad",
"tmcpdbgklpbywqyjpr7fijvjl7qjihd7pyubosbeohefec2m2thvzoqd",
"nrcan5uye2fwazixubug6pzrzp6ofjez43bjcyfoxhgxyygxbhgs4zqd",
"g2csv4kavhunvs45vxxc5ljz775d5a4ycqo4m4nrwpk3b4gryvz2zdyd",
"jviaiibaz7r6wqxttj5i2bi4zjfilmsevplwwtxdfyjph2sdmq5osdid",
}
for i, base64Key := range base64Keys {
key, err := base64.RawStdEncoding.DecodeString(base64Key)
require.NoError(t, err)
pubKey := ed25519.PrivateKey(key).PublicKey()
matchingID := matchingIDs[i]
require.Equal(t, matchingID, OnionServiceIDFromV3PublicKey(pubKey))
// Check verify here too
derivedPubKey, err := PublicKeyFromV3OnionServiceID(matchingID)
require.NoError(t, err)
require.Equal(t, pubKey, derivedPubKey)
// Let's mangle the matchingID a bit
tooLong := matchingID + "ddddd"
_, err = PublicKeyFromV3OnionServiceID(tooLong)
require.EqualError(t, err, "Invalid id length")
badVersion := matchingID[:len(matchingID)-1] + "e"
_, err = PublicKeyFromV3OnionServiceID(badVersion)
require.EqualError(t, err, "Invalid version")
badChecksum := []byte(matchingID)
badChecksum[len(badChecksum)-3] = 'q'
_, err = PublicKeyFromV3OnionServiceID(string(badChecksum))
require.EqualError(t, err, "Invalid checksum")
}
}