mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-07 07:07:05 +02:00
* Use DRBG based RSA key generation everywhere * switch to the conditional generator * Use DRBG based RSA key generation everywhere * switch to the conditional generator * Add an ENV var to disable the DRBG in a pinch * update go.mod * Use DRBG based RSA key generation everywhere * switch to the conditional generator * Add an ENV var to disable the DRBG in a pinch * Use DRBG based RSA key generation everywhere * update go.mod * fix import * Remove rsa2 alias, remove test code * move cryptoutil/rsa.go to sdk * move imports too * remove makefile change * rsa2->rsa * more rsa2->rsa, remove test code * fix some overzelous search/replace * Update to a real tag * changelog * copyright * work around copyright check * work around copyright check pt2 * bunch of dupe imports * missing import * wrong license * fix go.mod conflict * missed a spot * dupe import
84 lines
2.0 KiB
Go
84 lines
2.0 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package pki
|
|
|
|
import (
|
|
"crypto"
|
|
"crypto/ecdsa"
|
|
"crypto/ed25519"
|
|
"crypto/elliptic"
|
|
"crypto/rand"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/vault/sdk/helper/cryptoutil"
|
|
|
|
"github.com/hashicorp/vault/sdk/helper/certutil"
|
|
)
|
|
|
|
func TestGetKeyTypeAndBitsFromPublicKeyForRole(t *testing.T) {
|
|
rsaKey, err := cryptoutil.GenerateRSAKey(rand.Reader, 2048)
|
|
if err != nil {
|
|
t.Fatalf("error generating rsa key: %s", err)
|
|
}
|
|
|
|
ecdsaKey, err := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
|
|
if err != nil {
|
|
t.Fatalf("error generating ecdsa key: %s", err)
|
|
}
|
|
|
|
publicKey, _, err := ed25519.GenerateKey(rand.Reader)
|
|
if err != nil {
|
|
t.Fatalf("error generating ed25519 key: %s", err)
|
|
}
|
|
|
|
testCases := map[string]struct {
|
|
publicKey crypto.PublicKey
|
|
expectedKeyType certutil.PrivateKeyType
|
|
expectedKeyBits int
|
|
expectError bool
|
|
}{
|
|
"rsa": {
|
|
publicKey: rsaKey.Public(),
|
|
expectedKeyType: certutil.RSAPrivateKey,
|
|
expectedKeyBits: 2048,
|
|
},
|
|
"ecdsa": {
|
|
publicKey: ecdsaKey.Public(),
|
|
expectedKeyType: certutil.ECPrivateKey,
|
|
expectedKeyBits: 0,
|
|
},
|
|
"ed25519": {
|
|
publicKey: publicKey,
|
|
expectedKeyType: certutil.Ed25519PrivateKey,
|
|
expectedKeyBits: 0,
|
|
},
|
|
"bad key type": {
|
|
publicKey: []byte{},
|
|
expectedKeyType: certutil.UnknownPrivateKey,
|
|
expectedKeyBits: 0,
|
|
expectError: true,
|
|
},
|
|
}
|
|
|
|
for name, tt := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
keyType, keyBits, err := getKeyTypeAndBitsFromPublicKeyForRole(tt.publicKey)
|
|
if err != nil && !tt.expectError {
|
|
t.Fatalf("unexpected error: %s", err)
|
|
}
|
|
if err == nil && tt.expectError {
|
|
t.Fatal("expected error, got nil")
|
|
}
|
|
|
|
if keyType != tt.expectedKeyType {
|
|
t.Fatalf("key type mismatch: expected %s, got %s", tt.expectedKeyType, keyType)
|
|
}
|
|
|
|
if keyBits != tt.expectedKeyBits {
|
|
t.Fatalf("key bits mismatch: expected %d, got %d", tt.expectedKeyBits, keyBits)
|
|
}
|
|
})
|
|
}
|
|
}
|