blob: 2a27fc0c7015398372f5bc209315e26dc7cd3e54 [file] [log] [blame] [edit]
//! PKCS#8 tests
#![cfg(all(feature = "dev", feature = "pkcs8"))]
use elliptic_curve::{
dev::{PublicKey, SecretKey},
pkcs8::{DecodePrivateKey, DecodePublicKey, EncodePrivateKey},
sec1::ToEncodedPoint,
};
use hex_literal::hex;
use pkcs8::der;
/// DER-encoded PKCS#8 public key
const PKCS8_PUBLIC_KEY_DER: &[u8; 91] = include_bytes!("examples/pkcs8-public-key.der");
/// PEM-encoded PKCS#8 public key
#[cfg(feature = "pem")]
const PKCS8_PUBLIC_KEY_PEM: &str = include_str!("examples/pkcs8-public-key.pem");
/// Example encoded scalar value
const EXAMPLE_SCALAR: [u8; 32] =
hex!("AABBCCDDEEFF0000000000000000000000000000000000000000000000000001");
/// Example PKCS#8 private key
fn example_private_key() -> der::SecretDocument {
SecretKey::from_slice(&EXAMPLE_SCALAR)
.unwrap()
.to_pkcs8_der()
.unwrap()
}
#[test]
fn decode_pkcs8_private_key_from_der() {
dbg!(example_private_key().as_bytes());
let secret_key = SecretKey::from_pkcs8_der(example_private_key().as_bytes()).unwrap();
assert_eq!(secret_key.to_bytes().as_slice(), &EXAMPLE_SCALAR);
}
#[test]
fn decode_pkcs8_public_key_from_der() {
let public_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap();
let expected_sec1_point = hex!("041CACFFB55F2F2CEFD89D89EB374B2681152452802DEEA09916068137D839CF7FC481A44492304D7EF66AC117BEFE83A8D08F155F2B52F9F618DD447029048E0F");
assert_eq!(
public_key.to_encoded_point(false).as_bytes(),
&expected_sec1_point[..]
);
}
#[test]
#[cfg(feature = "pem")]
fn decode_pkcs8_public_key_from_pem() {
let public_key = PKCS8_PUBLIC_KEY_PEM.parse::<PublicKey>().unwrap();
// Ensure key parses equivalently to DER
let der_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap();
assert_eq!(public_key, der_key);
}