func TestGenerator(t *testing.T) { pubkey, privkey, _ := ed25519.GenerateKey(rand.Reader) kp := keypool.New(signkeys.New(elliptic.P256, rand.Reader, eccutil.Sha1Hash)) Add(kp, keydirectory) kp.Generator.PrivateKey = privkey kp.Generator.PublicKey = pubkey kp.AddVerifyKey(pubkey) _ = pubkey key, _, err := kp.Current() if err != nil { t.Fatalf("Current failed: %s", err) } pkey, err := kp.Lookup(key.PublicKey.KeyID) if err != nil { t.Errorf("Lookup failed: %s", err) } kp2 := keypool.New(signkeys.New(elliptic.P256, rand.Reader, eccutil.Sha1Hash)) Add(kp2, keydirectory) kp2.Generator.PrivateKey = privkey kp.Generator.PublicKey = pubkey kp2.AddVerifyKey(pubkey) err = kp2.Load() if err != nil { t.Errorf("Load failed: %s", err) } pkey2, err := kp2.Lookup(key.PublicKey.KeyID) if err != nil { t.Fatalf("Loaded keys incomplete: %s", err) } if pkey2.KeyID != pkey.KeyID { t.Error("KeyID mismatch") } if pkey2.Usage != pkey.Usage { t.Error("Usage mismatch") } if pkey2.Signature != pkey.Signature { t.Error("Signature mismatch") } }
// New returns a new protocol client func New(keyBackends []types.Backend) (*Client, error) { var err error c := new(Client) c.Curve = eccutil.SetCurve(Curve, Rand, HashFunc) c.Keypool = keypool.New(signkeys.New(Curve, Rand, HashFunc)) for _, v := range keyBackends { if v.Type == "keydir" { err = keydir.Add(c.Keypool, v.Value.(string)) } else if v.Type == "database" { err = keydb.Add(c.Keypool, v.Value) } if err != nil { return nil, err } } return c, nil }
func TestGenerator(t *testing.T) { pubkey, privkey, _ := ed25519.GenerateKey(rand.Reader) kp := New(signkeys.New(elliptic.P256, rand.Reader, eccutil.Sha1Hash)) kp.Generator.PrivateKey = privkey kp.Generator.PublicKey = pubkey kp.AddVerifyKey(pubkey) _ = pubkey key, _, err := kp.Current() if err != nil { t.Fatalf("Current failed: %s", err) } pkey, err := kp.Lookup(key.PublicKey.KeyID) if err != nil { t.Errorf("Lookup failed: %s", err) } _ = pkey }
func TestGeneratorSQLite3(t *testing.T) { dbHandle, err := sql.Open("sqlite3", sqliteDB) if err != nil { t.Fatalf("SQLiteDB Open failed: %s", err) } pubkey, privkey, _ := ed25519.GenerateKey(rand.Reader) kp := keypool.New(signkeys.New(elliptic.P256, rand.Reader, eccutil.Sha1Hash)) err = Add(kp, dbHandle) if err != nil { t.Fatalf("Storage addition failed: %s", err) } kp.Generator.PrivateKey = privkey kp.Generator.PublicKey = pubkey kp.AddVerifyKey(pubkey) _ = pubkey key, _, err := kp.Current() if err != nil { t.Fatalf("Current failed: %s", err) } pkey, err := kp.Lookup(key.PublicKey.KeyID) if err != nil { t.Errorf("Lookup failed: %s", err) } kp2 := keypool.New(signkeys.New(elliptic.P256, rand.Reader, eccutil.Sha1Hash)) err = Add(kp2, dbHandle) if err != nil { t.Fatalf("Storage addition failed: %s", err) } kp2.Generator.PrivateKey = privkey kp2.Generator.PublicKey = pubkey kp2.AddVerifyKey(pubkey) err = kp2.Load() if err != nil { t.Errorf("Load failed: %s", err) } pkey2, err := kp2.Lookup(key.PublicKey.KeyID) if err != nil { t.Fatalf("Loaded keys incomplete: %s", err) } if pkey2.KeyID != pkey.KeyID { t.Error("KeyID mismatch") } if pkey2.Usage != pkey.Usage { t.Error("Usage mismatch") } if pkey2.Signature != pkey.Signature { t.Error("Signature mismatch") } kp3 := keypool.New(signkeys.New(elliptic.P256, rand.Reader, eccutil.Sha1Hash)) kp3.Generator.PrivateKey = privkey kp3.Generator.PublicKey = pubkey kp3.AddVerifyKey(pubkey) err = Add(kp3, dbHandle) if err != nil { t.Fatalf("Storage addition failed: %s", err) } pkey3, err := kp3.Lookup(key.PublicKey.KeyID) if err != nil { t.Fatalf("Fetch does not work: %s", err) } if pkey3.KeyID != pkey.KeyID { t.Error("KeyID mismatch") } if pkey3.Usage != pkey.Usage { t.Error("Usage mismatch") } if pkey3.Signature != pkey.Signature { t.Error("Signature mismatch") } dbHandle.Close() os.Remove(sqliteDB) }