clearsign_test.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197
  1. // Copyright 2012 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package clearsign
  5. import (
  6. "bytes"
  7. "golang.org/x/crypto/openpgp"
  8. "testing"
  9. )
  10. func testParse(t *testing.T, input []byte, expected, expectedPlaintext string) {
  11. b, rest := Decode(input)
  12. if b == nil {
  13. t.Fatal("failed to decode clearsign message")
  14. }
  15. if !bytes.Equal(rest, []byte("trailing")) {
  16. t.Errorf("unexpected remaining bytes returned: %s", string(rest))
  17. }
  18. if b.ArmoredSignature.Type != "PGP SIGNATURE" {
  19. t.Errorf("bad armor type, got:%s, want:PGP SIGNATURE", b.ArmoredSignature.Type)
  20. }
  21. if !bytes.Equal(b.Bytes, []byte(expected)) {
  22. t.Errorf("bad body, got:%x want:%x", b.Bytes, expected)
  23. }
  24. if !bytes.Equal(b.Plaintext, []byte(expectedPlaintext)) {
  25. t.Errorf("bad plaintext, got:%x want:%x", b.Plaintext, expectedPlaintext)
  26. }
  27. keyring, err := openpgp.ReadArmoredKeyRing(bytes.NewBufferString(signingKey))
  28. if err != nil {
  29. t.Errorf("failed to parse public key: %s", err)
  30. }
  31. if _, err := openpgp.CheckDetachedSignature(keyring, bytes.NewBuffer(b.Bytes), b.ArmoredSignature.Body); err != nil {
  32. t.Errorf("failed to check signature: %s", err)
  33. }
  34. }
  35. func TestParse(t *testing.T) {
  36. testParse(t, clearsignInput, "Hello world\r\nline 2", "Hello world\nline 2\n")
  37. testParse(t, clearsignInput2, "\r\n\r\n(This message has a couple of blank lines at the start and end.)\r\n\r\n", "\n\n(This message has a couple of blank lines at the start and end.)\n\n\n")
  38. }
  39. func TestParseWithNoNewlineAtEnd(t *testing.T) {
  40. input := clearsignInput
  41. input = input[:len(input)-len("trailing")-1]
  42. b, rest := Decode(input)
  43. if b == nil {
  44. t.Fatal("failed to decode clearsign message")
  45. }
  46. if len(rest) > 0 {
  47. t.Errorf("unexpected remaining bytes returned: %s", string(rest))
  48. }
  49. }
  50. var signingTests = []struct {
  51. in, signed, plaintext string
  52. }{
  53. {"", "", ""},
  54. {"a", "a", "a\n"},
  55. {"a\n", "a", "a\n"},
  56. {"-a\n", "-a", "-a\n"},
  57. {"--a\nb", "--a\r\nb", "--a\nb\n"},
  58. // leading whitespace
  59. {" a\n", " a", " a\n"},
  60. {" a\n", " a", " a\n"},
  61. // trailing whitespace (should be stripped)
  62. {"a \n", "a", "a\n"},
  63. {"a ", "a", "a\n"},
  64. // whitespace-only lines (should be stripped)
  65. {" \n", "", "\n"},
  66. {" ", "", "\n"},
  67. {"a\n \n \nb\n", "a\r\n\r\n\r\nb", "a\n\n\nb\n"},
  68. }
  69. func TestSigning(t *testing.T) {
  70. keyring, err := openpgp.ReadArmoredKeyRing(bytes.NewBufferString(signingKey))
  71. if err != nil {
  72. t.Errorf("failed to parse public key: %s", err)
  73. }
  74. for i, test := range signingTests {
  75. var buf bytes.Buffer
  76. plaintext, err := Encode(&buf, keyring[0].PrivateKey, nil)
  77. if err != nil {
  78. t.Errorf("#%d: error from Encode: %s", i, err)
  79. continue
  80. }
  81. if _, err := plaintext.Write([]byte(test.in)); err != nil {
  82. t.Errorf("#%d: error from Write: %s", i, err)
  83. continue
  84. }
  85. if err := plaintext.Close(); err != nil {
  86. t.Fatalf("#%d: error from Close: %s", i, err)
  87. continue
  88. }
  89. b, _ := Decode(buf.Bytes())
  90. if b == nil {
  91. t.Errorf("#%d: failed to decode clearsign message", i)
  92. continue
  93. }
  94. if !bytes.Equal(b.Bytes, []byte(test.signed)) {
  95. t.Errorf("#%d: bad result, got:%x, want:%x", i, b.Bytes, test.signed)
  96. continue
  97. }
  98. if !bytes.Equal(b.Plaintext, []byte(test.plaintext)) {
  99. t.Errorf("#%d: bad result, got:%x, want:%x", i, b.Plaintext, test.plaintext)
  100. continue
  101. }
  102. if _, err := openpgp.CheckDetachedSignature(keyring, bytes.NewBuffer(b.Bytes), b.ArmoredSignature.Body); err != nil {
  103. t.Errorf("#%d: failed to check signature: %s", i, err)
  104. }
  105. }
  106. }
  107. var clearsignInput = []byte(`
  108. ;lasjlkfdsa
  109. -----BEGIN PGP SIGNED MESSAGE-----
  110. Hash: SHA1
  111. Hello world
  112. line 2
  113. -----BEGIN PGP SIGNATURE-----
  114. Version: GnuPG v1.4.10 (GNU/Linux)
  115. iJwEAQECAAYFAk8kMuEACgkQO9o98PRieSpMsAQAhmY/vwmNpflrPgmfWsYhk5O8
  116. pjnBUzZwqTDoDeINjZEoPDSpQAHGhjFjgaDx/Gj4fAl0dM4D0wuUEBb6QOrwflog
  117. 2A2k9kfSOMOtk0IH/H5VuFN1Mie9L/erYXjTQIptv9t9J7NoRBMU0QOOaFU0JaO9
  118. MyTpno24AjIAGb+mH1U=
  119. =hIJ6
  120. -----END PGP SIGNATURE-----
  121. trailing`)
  122. var clearsignInput2 = []byte(`
  123. asdlfkjasdlkfjsadf
  124. -----BEGIN PGP SIGNED MESSAGE-----
  125. Hash: SHA256
  126. (This message has a couple of blank lines at the start and end.)
  127. -----BEGIN PGP SIGNATURE-----
  128. Version: GnuPG v1.4.11 (GNU/Linux)
  129. iJwEAQEIAAYFAlPpSREACgkQO9o98PRieSpZTAP+M8QUoCt/7Rf3YbXPcdzIL32v
  130. pt1I+cMNeopzfLy0u4ioEFi8s5VkwpL1AFmirvgViCwlf82inoRxzZRiW05JQ5LI
  131. ESEzeCoy2LIdRCQ2hcrG8pIUPzUO4TqO5D/dMbdHwNH4h5nNmGJUAEG6FpURlPm+
  132. qZg6BaTvOxepqOxnhVU=
  133. =e+C6
  134. -----END PGP SIGNATURE-----
  135. trailing`)
  136. var signingKey = `-----BEGIN PGP PRIVATE KEY BLOCK-----
  137. Version: GnuPG v1.4.10 (GNU/Linux)
  138. lQHYBE2rFNoBBADFwqWQIW/DSqcB4yCQqnAFTJ27qS5AnB46ccAdw3u4Greeu3Bp
  139. idpoHdjULy7zSKlwR1EA873dO/k/e11Ml3dlAFUinWeejWaK2ugFP6JjiieSsrKn
  140. vWNicdCS4HTWn0X4sjl0ZiAygw6GNhqEQ3cpLeL0g8E9hnYzJKQ0LWJa0QARAQAB
  141. AAP/TB81EIo2VYNmTq0pK1ZXwUpxCrvAAIG3hwKjEzHcbQznsjNvPUihZ+NZQ6+X
  142. 0HCfPAdPkGDCLCb6NavcSW+iNnLTrdDnSI6+3BbIONqWWdRDYJhqZCkqmG6zqSfL
  143. IdkJgCw94taUg5BWP/AAeQrhzjChvpMQTVKQL5mnuZbUCeMCAN5qrYMP2S9iKdnk
  144. VANIFj7656ARKt/nf4CBzxcpHTyB8+d2CtPDKCmlJP6vL8t58Jmih+kHJMvC0dzn
  145. gr5f5+sCAOOe5gt9e0am7AvQWhdbHVfJU0TQJx+m2OiCJAqGTB1nvtBLHdJnfdC9
  146. TnXXQ6ZXibqLyBies/xeY2sCKL5qtTMCAKnX9+9d/5yQxRyrQUHt1NYhaXZnJbHx
  147. q4ytu0eWz+5i68IYUSK69jJ1NWPM0T6SkqpB3KCAIv68VFm9PxqG1KmhSrQIVGVz
  148. dCBLZXmIuAQTAQIAIgUCTasU2gIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AA
  149. CgkQO9o98PRieSoLhgQAkLEZex02Qt7vGhZzMwuN0R22w3VwyYyjBx+fM3JFETy1
  150. ut4xcLJoJfIaF5ZS38UplgakHG0FQ+b49i8dMij0aZmDqGxrew1m4kBfjXw9B/v+
  151. eIqpODryb6cOSwyQFH0lQkXC040pjq9YqDsO5w0WYNXYKDnzRV0p4H1pweo2VDid
  152. AdgETasU2gEEAN46UPeWRqKHvA99arOxee38fBt2CI08iiWyI8T3J6ivtFGixSqV
  153. bRcPxYO/qLpVe5l84Nb3X71GfVXlc9hyv7CD6tcowL59hg1E/DC5ydI8K8iEpUmK
  154. /UnHdIY5h8/kqgGxkY/T/hgp5fRQgW1ZoZxLajVlMRZ8W4tFtT0DeA+JABEBAAEA
  155. A/0bE1jaaZKj6ndqcw86jd+QtD1SF+Cf21CWRNeLKnUds4FRRvclzTyUMuWPkUeX
  156. TaNNsUOFqBsf6QQ2oHUBBK4VCHffHCW4ZEX2cd6umz7mpHW6XzN4DECEzOVksXtc
  157. lUC1j4UB91DC/RNQqwX1IV2QLSwssVotPMPqhOi0ZLNY7wIA3n7DWKInxYZZ4K+6
  158. rQ+POsz6brEoRHwr8x6XlHenq1Oki855pSa1yXIARoTrSJkBtn5oI+f8AzrnN0BN
  159. oyeQAwIA/7E++3HDi5aweWrViiul9cd3rcsS0dEnksPhvS0ozCJiHsq/6GFmy7J8
  160. QSHZPteedBnZyNp5jR+H7cIfVN3KgwH/Skq4PsuPhDq5TKK6i8Pc1WW8MA6DXTdU
  161. nLkX7RGmMwjC0DBf7KWAlPjFaONAX3a8ndnz//fy1q7u2l9AZwrj1qa1iJ8EGAEC
  162. AAkFAk2rFNoCGwwACgkQO9o98PRieSo2/QP/WTzr4ioINVsvN1akKuekmEMI3LAp
  163. BfHwatufxxP1U+3Si/6YIk7kuPB9Hs+pRqCXzbvPRrI8NHZBmc8qIGthishdCYad
  164. AHcVnXjtxrULkQFGbGvhKURLvS9WnzD/m1K2zzwxzkPTzT9/Yf06O6Mal5AdugPL
  165. VrM0m72/jnpKo04=
  166. =zNCn
  167. -----END PGP PRIVATE KEY BLOCK-----
  168. `