10 knownHash = "acbd18db4cc2f85cedef654fccc4a4d8"
11 knownLocator = knownHash + "+3"
12 knownToken = "hocfupkn2pjhrpgp2vxv8rsku7tvtx49arbc9s4bvu7p7wxqvk"
13 knownKey = "13u9fkuccnboeewr0ne3mvapk28epf68a3bhj9q8sb4l6e4e5mkk" +
14 "p6nhj2mmpscgu1zze5h5enydxfe3j215024u16ij4hjaiqs5u4pzsl3nczmaoxnc" +
15 "ljkm4875xqn4xv058koz3vkptmzhyheiy6wzevzjmdvxhvcqsvr5abhl15c2d4o4" +
16 "jhl0s91lojy1mtrzqqvprqcverls0xvy9vai9t1l1lvvazpuadafm71jl4mrwq2y" +
17 "gokee3eamvjy8qq1fvy238838enjmy5wzy2md7yvsitp5vztft6j4q866efym7e6" +
18 "vu5wm9fpnwjyxfldw3vbo01mgjs75rgo7qioh8z8ij7jpyp8508okhgbbex3ceei" +
19 "786u5rw2a9gx743dj3fgq2irk"
20 knownSignature = "257f3f5f5f0a4e4626a18fc74bd42ec34dcb228a"
21 knownTimestamp = "7fffffff"
22 knownSigHint = "+A" + knownSignature + "@" + knownTimestamp
23 knownSignedLocator = knownLocator + knownSigHint
26 func TestSignLocator(t *testing.T) {
27 PermissionSecret = []byte(knownKey)
28 defer func() { PermissionSecret = nil }()
30 tsInt, err := strconv.ParseInt(knownTimestamp, 16, 0)
34 if knownSignedLocator != SignLocator(knownLocator, knownToken, time.Unix(tsInt, 0)) {
39 func TestVerifySignature(t *testing.T) {
40 PermissionSecret = []byte(knownKey)
41 defer func() { PermissionSecret = nil }()
43 if VerifySignature(knownSignedLocator, knownToken) != nil {
48 func TestVerifySignatureExtraHints(t *testing.T) {
49 PermissionSecret = []byte(knownKey)
50 defer func() { PermissionSecret = nil }()
52 if VerifySignature(knownLocator+"+K@xyzzy"+knownSigHint, knownToken) != nil {
53 t.Fatal("Verify cannot handle hint before permission signature")
56 if VerifySignature(knownLocator+knownSigHint+"+Zfoo", knownToken) != nil {
57 t.Fatal("Verify cannot handle hint after permission signature")
60 if VerifySignature(knownLocator+"+K@xyzzy"+knownSigHint+"+Zfoo", knownToken) != nil {
61 t.Fatal("Verify cannot handle hints around permission signature")
65 // The size hint on the locator string should not affect signature validation.
66 func TestVerifySignatureWrongSize(t *testing.T) {
67 PermissionSecret = []byte(knownKey)
68 defer func() { PermissionSecret = nil }()
70 if VerifySignature(knownHash+"+999999"+knownSigHint, knownToken) != nil {
71 t.Fatal("Verify cannot handle incorrect size hint")
74 if VerifySignature(knownHash+knownSigHint, knownToken) != nil {
75 t.Fatal("Verify cannot handle missing size hint")
79 func TestVerifySignatureBadSig(t *testing.T) {
80 PermissionSecret = []byte(knownKey)
81 defer func() { PermissionSecret = nil }()
83 badLocator := knownLocator + "+Aaaaaaaaaaaaaaaa@" + knownTimestamp
84 if VerifySignature(badLocator, knownToken) != PermissionError {
89 func TestVerifySignatureBadTimestamp(t *testing.T) {
90 PermissionSecret = []byte(knownKey)
91 defer func() { PermissionSecret = nil }()
93 badLocator := knownLocator + "+A" + knownSignature + "@OOOOOOOl"
94 if VerifySignature(badLocator, knownToken) != PermissionError {
99 func TestVerifySignatureBadSecret(t *testing.T) {
100 PermissionSecret = []byte("00000000000000000000")
101 defer func() { PermissionSecret = nil }()
103 if VerifySignature(knownSignedLocator, knownToken) != PermissionError {
108 func TestVerifySignatureBadToken(t *testing.T) {
109 PermissionSecret = []byte(knownKey)
110 defer func() { PermissionSecret = nil }()
112 if VerifySignature(knownSignedLocator, "00000000") != PermissionError {
117 func TestVerifySignatureExpired(t *testing.T) {
118 PermissionSecret = []byte(knownKey)
119 defer func() { PermissionSecret = nil }()
121 yesterday := time.Now().AddDate(0, 0, -1)
122 expiredLocator := SignLocator(knownHash, knownToken, yesterday)
123 if VerifySignature(expiredLocator, knownToken) != ExpiredError {