package main import ( "strconv" "testing" "time" ) const ( knownHash = "acbd18db4cc2f85cedef654fccc4a4d8" knownLocator = knownHash + "+3" knownToken = "hocfupkn2pjhrpgp2vxv8rsku7tvtx49arbc9s4bvu7p7wxqvk" knownKey = "13u9fkuccnboeewr0ne3mvapk28epf68a3bhj9q8sb4l6e4e5mkk" + "p6nhj2mmpscgu1zze5h5enydxfe3j215024u16ij4hjaiqs5u4pzsl3nczmaoxnc" + "ljkm4875xqn4xv058koz3vkptmzhyheiy6wzevzjmdvxhvcqsvr5abhl15c2d4o4" + "jhl0s91lojy1mtrzqqvprqcverls0xvy9vai9t1l1lvvazpuadafm71jl4mrwq2y" + "gokee3eamvjy8qq1fvy238838enjmy5wzy2md7yvsitp5vztft6j4q866efym7e6" + "vu5wm9fpnwjyxfldw3vbo01mgjs75rgo7qioh8z8ij7jpyp8508okhgbbex3ceei" + "786u5rw2a9gx743dj3fgq2irk" knownSignature = "257f3f5f5f0a4e4626a18fc74bd42ec34dcb228a" knownTimestamp = "7fffffff" knownSigHint = "+A" + knownSignature + "@" + knownTimestamp knownSignedLocator = knownLocator + knownSigHint ) func TestSignLocator(t *testing.T) { PermissionSecret = []byte(knownKey) defer func() { PermissionSecret = nil }() tsInt, err := strconv.ParseInt(knownTimestamp, 16, 0) if err != nil { t.Fail() } if knownSignedLocator != SignLocator(knownLocator, knownToken, time.Unix(tsInt, 0)) { t.Fail() } } func TestVerifySignature(t *testing.T) { PermissionSecret = []byte(knownKey) defer func() { PermissionSecret = nil }() if VerifySignature(knownSignedLocator, knownToken) != nil { t.Fail() } } func TestVerifySignatureExtraHints(t *testing.T) { PermissionSecret = []byte(knownKey) defer func() { PermissionSecret = nil }() if VerifySignature(knownLocator+"+K@xyzzy"+knownSigHint, knownToken) != nil { t.Fatal("Verify cannot handle hint before permission signature") } if VerifySignature(knownLocator+knownSigHint+"+Zfoo", knownToken) != nil { t.Fatal("Verify cannot handle hint after permission signature") } if VerifySignature(knownLocator+"+K@xyzzy"+knownSigHint+"+Zfoo", knownToken) != nil { t.Fatal("Verify cannot handle hints around permission signature") } } // The size hint on the locator string should not affect signature validation. func TestVerifySignatureWrongSize(t *testing.T) { PermissionSecret = []byte(knownKey) defer func() { PermissionSecret = nil }() if VerifySignature(knownHash+"+999999"+knownSigHint, knownToken) != nil { t.Fatal("Verify cannot handle incorrect size hint") } if VerifySignature(knownHash+knownSigHint, knownToken) != nil { t.Fatal("Verify cannot handle missing size hint") } } func TestVerifySignatureBadSig(t *testing.T) { PermissionSecret = []byte(knownKey) defer func() { PermissionSecret = nil }() badLocator := knownLocator + "+Aaaaaaaaaaaaaaaa@" + knownTimestamp if VerifySignature(badLocator, knownToken) != PermissionError { t.Fail() } } func TestVerifySignatureBadTimestamp(t *testing.T) { PermissionSecret = []byte(knownKey) defer func() { PermissionSecret = nil }() badLocator := knownLocator + "+A" + knownSignature + "@OOOOOOOl" if VerifySignature(badLocator, knownToken) != PermissionError { t.Fail() } } func TestVerifySignatureBadSecret(t *testing.T) { PermissionSecret = []byte("00000000000000000000") defer func() { PermissionSecret = nil }() if VerifySignature(knownSignedLocator, knownToken) != PermissionError { t.Fail() } } func TestVerifySignatureBadToken(t *testing.T) { PermissionSecret = []byte(knownKey) defer func() { PermissionSecret = nil }() if VerifySignature(knownSignedLocator, "00000000") != PermissionError { t.Fail() } } func TestVerifySignatureExpired(t *testing.T) { PermissionSecret = []byte(knownKey) defer func() { PermissionSecret = nil }() yesterday := time.Now().AddDate(0, 0, -1) expiredLocator := SignLocator(knownHash, knownToken, yesterday) if VerifySignature(expiredLocator, knownToken) != ExpiredError { t.Fail() } }