libcryptx-perl/t/jwk.t
2018-03-22 15:51:09 +01:00

250 lines
14 KiB
Perl
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

use strict;
use warnings;
use Test::More;
plan skip_all => "No JSON::* module installed" unless eval { require JSON::PP } || eval { require JSON::XS } || eval { require Cpanel::JSON::XS };
plan tests => 97;
use Crypt::PK::RSA;
use Crypt::PK::ECC;
my $rsa = Crypt::PK::RSA->new;
my $ec = Crypt::PK::ECC->new;
ok($rsa, "RSA new");
ok($ec, "ECC new");
### RSA
# test whether exported JWK JSON is canonical
$rsa->import_key("t/data/jwk_rsa-priv.json");
is($rsa->export_key_jwk('public'), '{"e":"AQAB","kty":"RSA","n":"t6Q8PWSi1dkJj9hTP8hNYFlvadM7DflW9mWepOJhJ66w7nyoK1gPNqFMSQRyO125Gp-TEkodhWr0iujjHVx7BcV0llS4w5ACGgPrcAd6ZcSR0-Iqom-QFcNP8Sjg086MwoqQU_LYywlAGZ21WSdS_PERyGFiNnj3QQlO8Yns5jCtLCRwLHL0Pb1fEv45AuRIuUfVcPySBWYnDyGxvjYGDSM-AqWS9zIQ2ZilgT-GqUmipg0XOC0Cc20rgLe2ymLHjpHciCKVAbY5-L32-lSeZO-Os6U15_aXrk9Gw8cPUaX1_I8sLGuSiVdt3C_Fn2PZ3Z8i744FPFGGcG1qs2Wz-Q"}');
is($rsa->export_key_jwk('private'),'{"d":"GRtbIQmhOZtyszfgKdg4u_N-R_mZGU_9k7JQ_jn1DnfTuMdSNprTeaSTyWfSNkuaAwnOEbIQVy1IQbWVV25NY3ybc_IhUJtfri7bAXYEReWaCl3hdlPKXy9UvqPYGR0kIXTQRqns-dVJ7jahlI7LyckrpTmrM8dWBo4_PMaenNnPiQgO0xnuToxutRZJfJvG4Ox4ka3GORQd9CsCZ2vsUDmsXOfUENOyMqADC6p1M3h33tsurY15k9qMSpG9OX_IJAXmxzAh_tWiZOwk2K4yxH9tS3Lq1yX8C1EWmeRDkK2ahecG85-oLKQt5VEpWHKmjOi_gJSdSgqcN96X52esAQ","dp":"KkMTWqBUefVwZ2_Dbj1pPQqyHSHjj90L5x_MOzqYAJMcLMZtbUtwKqvVDq3tbEo3ZIcohbDtt6SbfmWzggabpQxNxuBpoOOf_a_HgMXK_lhqigI4y_kqS1wY52IwjUn5rgRrJ-yYo1h41KR-vz2pYhEAeYrhttWtxVqLCRViD6c","dq":"AvfS0-gRxvn0bwJoMSnFxYcK1WnuEjQFluMGfwGitQBWtfZ1Er7t1xDkbN9GQTB9yqpDoYaN06H7CFtrkxhJIBQaj6nkF5KKS3TQtQ5qCzkOkmxIe3KRbBymXxkb5qwUpX5ELD5xFc6FeiafWYY63TmmEAu_lRFCOJ3xDea-ots","e":"AQAB","kty":"RSA","n":"t6Q8PWSi1dkJj9hTP8hNYFlvadM7DflW9mWepOJhJ66w7nyoK1gPNqFMSQRyO125Gp-TEkodhWr0iujjHVx7BcV0llS4w5ACGgPrcAd6ZcSR0-Iqom-QFcNP8Sjg086MwoqQU_LYywlAGZ21WSdS_PERyGFiNnj3QQlO8Yns5jCtLCRwLHL0Pb1fEv45AuRIuUfVcPySBWYnDyGxvjYGDSM-AqWS9zIQ2ZilgT-GqUmipg0XOC0Cc20rgLe2ymLHjpHciCKVAbY5-L32-lSeZO-Os6U15_aXrk9Gw8cPUaX1_I8sLGuSiVdt3C_Fn2PZ3Z8i744FPFGGcG1qs2Wz-Q","p":"2rnSOV4hKSN8sS4CgcQHFbs08XboFDqKum3sc4h3GRxrTmQdl1ZK9uw-PIHfQP0FkxXVrx-WE-ZEbrqivH_2iCLUS7wAl6XvARt1KkIaUxPPSYB9yk31s0Q8UK96E3_OrADAYtAJs-M3JxCLfNgqh56HDnETTQhH3rCT5T3yJws","q":"1u_RiFDP7LBYh3N4GXLT9OpSKYP0uQZyiaZwBtOCBNJgQxaj10RWjsZu0c6Iedis4S7B_coSKB0Kj9PaPaBzg-IySRvvcQuPamQu66riMhjVtG6TlV8CLCYKrYl52ziqK0E_ym2QnkwsUX7eYTB7LbAHRK9GqocDE5B0f808I4s","qi":"lSQi-w9CpyUReMErP1RsBLk7wNtOvs5EQpPqmuMvqW57NBUczScEoPwmUqqabu9V0-Py4dQ57_bapoKRu1R90bvuFnU63SHWEFglZQvJDMeAvmj4sm-Fp0oYu_neotgQ0hzbI5gry7ajdYy9-2lNx_76aBZoOUu9HCJ-UsfSOI8"}');
for my $f (qw/jwk_rsa-priv.json jwk_rsa-priv1.json jwk_rsa-pub1.json /) {
$rsa->import_key("t/data/$f");
my $kh = $rsa->key2hash;
ok($kh->{N}, "RSA N test $f");
ok($kh->{e}, "RSA e test $f");
}
my $RSA1 = {
d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
dP => "1B8B0F5E473A61AF72F28256F7F20B8F8C6EA69BB49738BF1FB553912F318F949D5F7728134A22998C31222D9E99302E7B450E6B97698051B2049E1CF2D436545E34D9746E80A0D33FC6A4621168E6D000EFB41EFCD9ADB9865CDC2DE6DC8DB81B61AF479B120F153200DDB3ABC2DF9FD1149ACEAB63739BF187A22A44E2063D",
dQ => "1B8B0F5E473A61AF72F28256F7F20B8F8C6EA69BB49738BF1FB553912F318F949D5F7728134A22998C31222D9E99302E7B450E6B97698051B2049E1CF2D436545E34D9746E80A0D33FC6A4621168E6D000EFB41EFCD9ADB9865CDC2DE6DC8DB81B61AF479B120F153200DDB3ABC2DF9FD1149ACEAB63739BF187A22A44E2063D",
e => "010001",
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
p => "F378BEEC8BCC197A0C5C2B24BFBDD32ABF3ADFB1623BB676EF3BFCA23EA96D6510C8B3D0050C6D3D59F00F6D11FBAD1E4C3983DAE8E732DE4FA2A32B9BC45F98D855583B638CC9823233A949789C1478FB5CEB95218432A955A558487A74DDFA19565893DDCDF0173DBD8E35C72F01F51CF3386550CD7BCD12F9FB3B49D56DFB",
q => "DDD7CE47D72E62AFB44BE9A414BCE022D80C11F173076AB78567A132E1B4A02BAA9DBDEFA1B2F2BA6AA355940ED5D22B7708139C276963305C39F5B9AF7EF40055E38967EDFCD1848A8BE89E2CE12A9A3D5554BBF13CC583190876B79C45ECEC67ED6461DFECD6A0DBC6D9031207C0213006F4B527003BA7E2F21C6FAC9E9719",
qP => "1B233FA7A26B5F24A2CF5B6816029B595F89748DE3438CA9BBDADB316C77AD02417E6B7416863381421911514470EAB07A644DF35CE80C069AF819342963460E3247643743985856DC037B948FA9BB193F987646275D6BC7247C3B9E572D27B748F9917CAC1923AC94DB8671BD0285608B5D95D50A1B33BA21AEB34CA8405515",
size => 256,
type => 1,
};
my $RSA1_jwk_thumbprint_sha256 = 'NzbLsXh8uDCcd-6MNwXF4W_7noWXFZAfHkxZsRGC9Xs';
my $RSA2 = {
d => "",
dP => "",
dQ => "",
e => "010001",
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
p => "",
q => "",
qP => "",
size => 256,
type => 0,
};
{
$rsa->import_key($RSA1);
my $kh = $rsa->key2hash;
is($kh->{N}, $RSA1->{N}, "RSA N test HASH1");
is($kh->{e}, $RSA1->{e}, "RSA e test HASH1");
is($kh->{p}, $RSA1->{p}, "RSA private p test HASH1");
is($kh->{q}, $RSA1->{q}, "RSA private q test HASH1");
is($kh->{d}, $RSA1->{d}, "RSA private d test HASH1");
is($kh->{dP}, $RSA1->{dP}, "RSA private dP test HASH1");
is($kh->{dQ}, $RSA1->{dQ}, "RSA private dQ test HASH1");
is($kh->{qP}, $RSA1->{qP}, "RSA private qP test HASH1");
ok($rsa->is_private, "RSA private test HASH1");
my $jwk = $rsa->export_key_jwk('private');
my $jwkp = $rsa->export_key_jwk('public');
my $jwkh = $rsa->export_key_jwk('private', 1);
my $jwkhp = $rsa->export_key_jwk('public', 1);
is($jwkh->{kty}, "RSA", "RSA kty test export_key_jwk as hash");
is($jwkhp->{kty}, "RSA", "RSA(pub) kty test export_key_jwk as hash");
ok(exists $jwkhp->{n}, "RSA(pub) n test export_key_jwk as hash");
ok(exists $jwkhp->{e}, "RSA(pub) e test export_key_jwk as hash");
ok(!exists $jwkhp->{p}, "RSA(pub) p test export_key_jwk as hash");
ok(exists $jwkh->{n}, "RSA n test export_key_jwk as hash");
ok(exists $jwkh->{e}, "RSA e test export_key_jwk as hash");
ok(exists $jwkh->{p}, "RSA p test export_key_jwk as hash");
my $jwk_tp = $rsa->export_key_jwk_thumbprint('SHA256');
is($jwk_tp, $RSA1_jwk_thumbprint_sha256, 'export_key_jwk_thumbprint(SHA256)');
### jwk re-import private key
$rsa->import_key(\$jwk);
$kh = $rsa->key2hash;
ok($rsa->is_private, "RSA private test JWK1");
is($kh->{N}, $RSA1->{N}, "RSA N test JWK1");
is($kh->{e}, $RSA1->{e}, "RSA e test JWK1");
is($kh->{p}, $RSA1->{p}, "RSA private p test JWK1");
is($kh->{q}, $RSA1->{q}, "RSA private q test JWK1");
is($kh->{d}, $RSA1->{d}, "RSA private d test JWK1");
is($kh->{dP}, $RSA1->{dP}, "RSA private dP test JWK1");
is($kh->{dQ}, $RSA1->{dQ}, "RSA private dQ test JWK1");
is($kh->{qP}, $RSA1->{qP}, "RSA private qP test JWK1");
$jwk_tp = $rsa->export_key_jwk_thumbprint('SHA256');
is($jwk_tp, $RSA1_jwk_thumbprint_sha256, 'export_key_jwk_thumbprint(SHA256)');
### jwk re-import public key
$rsa->import_key(\$jwkp);
$kh = $rsa->key2hash;
ok(!$rsa->is_private, "RSA !private test JWK2");
is($kh->{N}, $RSA1->{N}, "RSA N test JWK2");
is($kh->{e}, $RSA1->{e}, "RSA e test JWK2");
is($kh->{p}, "", "RSA private p test JWK2");
is($kh->{q}, "", "RSA private q test JWK2");
is($kh->{d}, "", "RSA private d test JWK2");
is($kh->{dP}, "", "RSA private dP test JWK2");
is($kh->{dQ}, "", "RSA private dQ test JWK2");
is($kh->{qP}, "", "RSA private qP test JWK2");
$jwk_tp = $rsa->export_key_jwk_thumbprint('SHA256');
is($jwk_tp, $RSA1_jwk_thumbprint_sha256, 'export_key_jwk_thumbprint(SHA256)');
}
{
$rsa->import_key($RSA2);
my $kh = $rsa->key2hash;
is($kh->{N}, $RSA1->{N}, "RSA N test HASH2");
is($kh->{e}, $RSA1->{e}, "RSA e test HASH2");
is($kh->{p}, "", "RSA private p test HASH2");
is($kh->{q}, "", "RSA private q test HASH2");
is($kh->{d}, "", "RSA private d test HASH2");
is($kh->{dP}, "", "RSA private dP test HASH2");
is($kh->{dQ}, "", "RSA private dQ test HASH2");
is($kh->{qP}, "", "RSA private qP test HASH2");
ok(!$rsa->is_private, "RSA private test HASH2");
}
### ECC
# test whether exported JWK JSON is canonical
$ec->import_key("t/data/jwk_ec-priv1.json");
is($ec->export_key_jwk('public'), '{"crv":"P-256","kty":"EC","x":"MKBCTNIcKUSDii11ySs3526iDZ8AiTo7Tu6KPAqv7D4","y":"4Etl6SRW2YiLUrN5vfvVHuhp7x8PxltmWWlbbM4IFyM"}');
is($ec->export_key_jwk('private'),'{"crv":"P-256","d":"870MB6gfuTJ4HtUnUvYMyJpr5eUZNP4Bk43bVdj3eAE","kty":"EC","x":"MKBCTNIcKUSDii11ySs3526iDZ8AiTo7Tu6KPAqv7D4","y":"4Etl6SRW2YiLUrN5vfvVHuhp7x8PxltmWWlbbM4IFyM"}');
for my $f (qw/jwk_ec-priv1.json jwk_ec-pub.json jwk_ec-pub1.json/) {
$ec->import_key("t/data/$f");
my $kh = $ec->key2hash;
ok($kh->{pub_x}, "EC x test $f");
ok($kh->{pub_y}, "EC y test $f");
}
my $EC1 = {
curve_A => "FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC",
curve_B => "5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B",
curve_bits => 256,
curve_bytes => 32,
curve_cofactor => 1,
curve_Gx => "6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296",
curve_Gy => "4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5",
curve_name => "secp256r1",
curve_order => "FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551",
curve_prime => "FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF",
k => "F3BD0C07A81FB932781ED52752F60CC89A6BE5E51934FE01938DDB55D8F77801",
pub_x => "30A0424CD21C2944838A2D75C92B37E76EA20D9F00893A3B4EEE8A3C0AAFEC3E",
pub_y => "E04B65E92456D9888B52B379BDFBD51EE869EF1F0FC65B6659695B6CCE081723",
size => 32,
type => 1,
};
my $ec1_jwk_thumbprint_sha256 = 'cn-I_WNMClehiVp51i_0VpOENW1upEerA8sEam5hn-s';
my $EC2 = {
curve_A => "FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC",
curve_B => "5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B",
curve_bits => 256,
curve_bytes => 32,
curve_cofactor => 1,
curve_Gx => "6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296",
curve_Gy => "4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5",
curve_name => "secp256r1",
curve_order => "FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551",
curve_prime => "FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF",
k => "",
pub_x => "30A0424CD21C2944838A2D75C92B37E76EA20D9F00893A3B4EEE8A3C0AAFEC3E",
pub_y => "E04B65E92456D9888B52B379BDFBD51EE869EF1F0FC65B6659695B6CCE081723",
size => 32,
type => 0,
};
{
$ec->import_key($EC1);
my $kh = $ec->key2hash;
is($kh->{pub_x}, $EC1->{pub_x}, "EC x test HASH1");
is($kh->{pub_y}, $EC1->{pub_y}, "EC y test HASH1");
is($kh->{k}, $EC1->{k}, "EC k test HASH1");
is($kh->{curve_name}, "secp256r1", "EC curve test HASH1");
ok($ec->is_private, "EC private test HASH1");
my $jwk = $ec->export_key_jwk('private');
my $jwkp = $ec->export_key_jwk('public');
my $jwkh = $ec->export_key_jwk('private', 1);
my $jwkhp = $ec->export_key_jwk('public', 1);
is($jwkh->{kty}, "EC", "ECC kty test export_key_jwk as hash");
is($jwkhp->{kty}, "EC", "ECC(pub) kty test export_key_jwk as hash");
ok(exists $jwkhp->{x}, "ECC(pub) x test export_key_jwk as hash");
ok(exists $jwkhp->{y}, "ECC(pub) y test export_key_jwk as hash");
ok(!exists $jwkhp->{d}, "ECC(pub) d test export_key_jwk as hash");
ok(exists $jwkh->{x}, "ECC x test export_key_jwk as hash");
ok(exists $jwkh->{y}, "ECC y test export_key_jwk as hash");
ok(exists $jwkh->{d}, "ECC d test export_key_jwk as hash");
my $jwk_tp = $ec->export_key_jwk_thumbprint('SHA256');
is($jwk_tp, $ec1_jwk_thumbprint_sha256, 'export_key_jwk_thumbprint(SHA256)');
### jwk re-import private key
$ec->import_key(\$jwk);
$kh = $ec->key2hash;
is($kh->{pub_x}, $EC1->{pub_x}, "EC x test JWK1");
is($kh->{pub_y}, $EC1->{pub_y}, "EC y test JWK1");
is($kh->{k}, $EC1->{k}, "EC k test JWK1");
is($kh->{curve_name}, "secp256r1", "EC curve test JWK1");
ok($ec->is_private, "EC private test JWK1");
$jwk_tp = $ec->export_key_jwk_thumbprint('SHA256');
is($jwk_tp, $ec1_jwk_thumbprint_sha256, 'export_key_jwk_thumbprint(SHA256)');
### jwk re-import public key
$ec->import_key(\$jwkp);
$kh = $ec->key2hash;
is($kh->{pub_x}, $EC1->{pub_x}, "EC x test JWK2");
is($kh->{pub_y}, $EC1->{pub_y}, "EC y test JWK2");
is($kh->{k}, "", "EC k test JWK2");
is($kh->{curve_name}, "secp256r1", "EC curve test JWK2");
ok(!$ec->is_private, "EC !private test JWK2");
$jwk_tp = $ec->export_key_jwk_thumbprint('SHA256');
is($jwk_tp, $ec1_jwk_thumbprint_sha256, 'export_key_jwk_thumbprint(SHA256)');
}
{
$ec->import_key($EC2);
my $kh = $ec->key2hash;
is($kh->{pub_x}, $EC1->{pub_x}, "EC x test HASH2");
is($kh->{pub_y}, $EC1->{pub_y}, "EC y test HASH2");
is($kh->{k}, "", "EC k test HASH2");
is($kh->{curve_name}, "secp256r1", "EC curve test HASH2");
ok(!$ec->is_private, "EC private test HASH2");
}
{
my $jwk = {
e => 'AQAB',
kty => 'RSA',
n => 'ln_cp6g_c65R6uYmwFx6AF1PyyZF7N1EaLhvUjDStK6Scmp_XCD-ynz5Q1iS0Q2t8gnh_s5dQtThiuvOGxCK1j69TA6Jpo0uUBL-gzf3J25PhqdNmTbGGRNkD0aT8qfeY9_bXTA1vmawh-46A6xrVFiT62NK7IdsyQNzrtR9QwzcSR79m9UqTVe5MdDB9tZZIotmqWQlZ5MVb26PPmgkuh6AthS-an2KeDdYRwAyQtfR1B6f-swzIPwq-AUy1pfmGVe-d6K5dCOU9RUMPPRiQ7atmodAxfcWywmnrCtSCfPk0fkTLN4RsuCWV85NXcGnpr41m4uacALT0Xs0IqBKbw',
};
my $before_json = {%$jwk};
Crypt::PK::RSA->new($jwk);
is_deeply(
$jwk,
$before_json,
'new($jwk) doesnt change $jwk',
);
}