1 {-# LANGUAGE OverloadedStrings #-}
6 import Data.ByteString (ByteString)
7 import qualified Data.ByteString as B
11 import Test.Tasty.HUnit
13 import qualified Crypto.Macaroon.Serializer.Base64.Tests
14 import qualified Crypto.Macaroon.Tests
17 tests = testGroup "Python HMAC Sanity check" [ checkKey
26 secret = "this is our super secret key; only we should know it"
29 public = "we used our secret key"
32 key = B.take 32 secret
35 mac1 = toBytes (hmac key public :: HMAC SHA256)
38 mac2 = toBytes (hmac mac1 "account = 3735928559" :: HMAC SHA256)
41 mac3 = toBytes (hmac mac2 "time < 2015-01-01T00:00" :: HMAC SHA256)
44 mac4 = toBytes (hmac mac3 "email = alice@example.org" :: HMAC SHA256)
47 checkKey = testCase "Truncated key" $
48 key @?= "this is our super secret key; on"
50 checkMac1 = testCase "HMAC key" $
51 "C60B4B3540BB1B2F2EF28D1C895691CC4A5E07A38A9D3B1C3379FB485293372F" @=? hex mac1
53 checkMac2 = testCase "HMAC key account" $
54 "5C933DC9A7D036DFCD1740B4F26D737397A1FF635EAC900F3226973503CAAAA5" @=? hex mac2
56 checkMac3 = testCase "HMAC key account time" $
57 "7A559B20C8B607009EBCE138C200585E9D0DECA6D23B3EAD6C5E0BA6861D3858" @=? hex mac3
59 checkMac4 = testCase "HMAC key account time email" $
60 "E42BBB02A9A5A303483CB6295C497AE51AD1D5CB10003CBE548D907E7E62F5E4" @=? hex mac4