Charisee | d720b3f | 2023-03-09 17:35:07 +0000 | [diff] [blame] | 1 | //! PKCS#8 tests |
| 2 | |
| 3 | #![cfg(all(feature = "dev", feature = "pkcs8"))] |
| 4 | |
| 5 | use elliptic_curve::{ |
| 6 | dev::{PublicKey, SecretKey}, |
| 7 | pkcs8::{DecodePrivateKey, DecodePublicKey, EncodePrivateKey}, |
| 8 | sec1::ToEncodedPoint, |
| 9 | }; |
| 10 | use hex_literal::hex; |
Chris Wailes | cd1aefd | 2023-07-13 13:36:21 -0700 | [diff] [blame^] | 11 | use pkcs8::der; |
Charisee | d720b3f | 2023-03-09 17:35:07 +0000 | [diff] [blame] | 12 | |
| 13 | /// DER-encoded PKCS#8 public key |
| 14 | const PKCS8_PUBLIC_KEY_DER: &[u8; 91] = include_bytes!("examples/pkcs8-public-key.der"); |
| 15 | |
| 16 | /// PEM-encoded PKCS#8 public key |
| 17 | #[cfg(feature = "pem")] |
| 18 | const PKCS8_PUBLIC_KEY_PEM: &str = include_str!("examples/pkcs8-public-key.pem"); |
| 19 | |
| 20 | /// Example encoded scalar value |
| 21 | const EXAMPLE_SCALAR: [u8; 32] = |
| 22 | hex!("AABBCCDDEEFF0000000000000000000000000000000000000000000000000001"); |
| 23 | |
| 24 | /// Example PKCS#8 private key |
| 25 | fn example_private_key() -> der::SecretDocument { |
Chris Wailes | cd1aefd | 2023-07-13 13:36:21 -0700 | [diff] [blame^] | 26 | SecretKey::from_slice(&EXAMPLE_SCALAR) |
Charisee | d720b3f | 2023-03-09 17:35:07 +0000 | [diff] [blame] | 27 | .unwrap() |
| 28 | .to_pkcs8_der() |
| 29 | .unwrap() |
| 30 | } |
| 31 | |
| 32 | #[test] |
| 33 | fn decode_pkcs8_private_key_from_der() { |
Chris Wailes | cd1aefd | 2023-07-13 13:36:21 -0700 | [diff] [blame^] | 34 | dbg!(example_private_key().as_bytes()); |
Charisee | d720b3f | 2023-03-09 17:35:07 +0000 | [diff] [blame] | 35 | let secret_key = SecretKey::from_pkcs8_der(example_private_key().as_bytes()).unwrap(); |
Chris Wailes | cd1aefd | 2023-07-13 13:36:21 -0700 | [diff] [blame^] | 36 | assert_eq!(secret_key.to_bytes().as_slice(), &EXAMPLE_SCALAR); |
Charisee | d720b3f | 2023-03-09 17:35:07 +0000 | [diff] [blame] | 37 | } |
| 38 | |
| 39 | #[test] |
| 40 | fn decode_pkcs8_public_key_from_der() { |
| 41 | let public_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap(); |
| 42 | let expected_sec1_point = hex!("041CACFFB55F2F2CEFD89D89EB374B2681152452802DEEA09916068137D839CF7FC481A44492304D7EF66AC117BEFE83A8D08F155F2B52F9F618DD447029048E0F"); |
| 43 | assert_eq!( |
| 44 | public_key.to_encoded_point(false).as_bytes(), |
| 45 | &expected_sec1_point[..] |
| 46 | ); |
| 47 | } |
| 48 | |
| 49 | #[test] |
| 50 | #[cfg(feature = "pem")] |
| 51 | fn decode_pkcs8_public_key_from_pem() { |
| 52 | let public_key = PKCS8_PUBLIC_KEY_PEM.parse::<PublicKey>().unwrap(); |
| 53 | |
| 54 | // Ensure key parses equivalently to DER |
| 55 | let der_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap(); |
| 56 | assert_eq!(public_key, der_key); |
| 57 | } |