summaryrefslogtreecommitdiffstats
path: root/vendor/elliptic-curve/tests/pkcs8.rs
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/elliptic-curve/tests/pkcs8.rs')
-rw-r--r--vendor/elliptic-curve/tests/pkcs8.rs57
1 files changed, 57 insertions, 0 deletions
diff --git a/vendor/elliptic-curve/tests/pkcs8.rs b/vendor/elliptic-curve/tests/pkcs8.rs
new file mode 100644
index 0000000..2a27fc0
--- /dev/null
+++ b/vendor/elliptic-curve/tests/pkcs8.rs
@@ -0,0 +1,57 @@
+//! PKCS#8 tests
+
+#![cfg(all(feature = "dev", feature = "pkcs8"))]
+
+use elliptic_curve::{
+ dev::{PublicKey, SecretKey},
+ pkcs8::{DecodePrivateKey, DecodePublicKey, EncodePrivateKey},
+ sec1::ToEncodedPoint,
+};
+use hex_literal::hex;
+use pkcs8::der;
+
+/// DER-encoded PKCS#8 public key
+const PKCS8_PUBLIC_KEY_DER: &[u8; 91] = include_bytes!("examples/pkcs8-public-key.der");
+
+/// PEM-encoded PKCS#8 public key
+#[cfg(feature = "pem")]
+const PKCS8_PUBLIC_KEY_PEM: &str = include_str!("examples/pkcs8-public-key.pem");
+
+/// Example encoded scalar value
+const EXAMPLE_SCALAR: [u8; 32] =
+ hex!("AABBCCDDEEFF0000000000000000000000000000000000000000000000000001");
+
+/// Example PKCS#8 private key
+fn example_private_key() -> der::SecretDocument {
+ SecretKey::from_slice(&EXAMPLE_SCALAR)
+ .unwrap()
+ .to_pkcs8_der()
+ .unwrap()
+}
+
+#[test]
+fn decode_pkcs8_private_key_from_der() {
+ dbg!(example_private_key().as_bytes());
+ let secret_key = SecretKey::from_pkcs8_der(example_private_key().as_bytes()).unwrap();
+ assert_eq!(secret_key.to_bytes().as_slice(), &EXAMPLE_SCALAR);
+}
+
+#[test]
+fn decode_pkcs8_public_key_from_der() {
+ let public_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap();
+ let expected_sec1_point = hex!("041CACFFB55F2F2CEFD89D89EB374B2681152452802DEEA09916068137D839CF7FC481A44492304D7EF66AC117BEFE83A8D08F155F2B52F9F618DD447029048E0F");
+ assert_eq!(
+ public_key.to_encoded_point(false).as_bytes(),
+ &expected_sec1_point[..]
+ );
+}
+
+#[test]
+#[cfg(feature = "pem")]
+fn decode_pkcs8_public_key_from_pem() {
+ let public_key = PKCS8_PUBLIC_KEY_PEM.parse::<PublicKey>().unwrap();
+
+ // Ensure key parses equivalently to DER
+ let der_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap();
+ assert_eq!(public_key, der_key);
+}