diff options
author | Julien Tanguy <julien.tanguy@jhome.fr> | 2015-04-15 11:27:54 +0200 |
---|---|---|
committer | Julien Tanguy <julien.tanguy@jhome.fr> | 2015-04-15 11:27:54 +0200 |
commit | 46af385cc6f7c7e378ef7866a3da4ad9fb6e941c (patch) | |
tree | 1e78ef559d84875cb377ae2ff148d13cf35f0f1a /test/tests.hs | |
parent | b1f77d7e6dcf03dd20c36e1a10429e1b2b9900b1 (diff) | |
download | hmacaroons-46af385cc6f7c7e378ef7866a3da4ad9fb6e941c.tar.gz hmacaroons-46af385cc6f7c7e378ef7866a3da4ad9fb6e941c.tar.zst hmacaroons-46af385cc6f7c7e378ef7866a3da4ad9fb6e941c.zip |
Extract sanity check
Diffstat (limited to 'test/tests.hs')
-rw-r--r-- | test/tests.hs | 68 |
1 files changed, 0 insertions, 68 deletions
diff --git a/test/tests.hs b/test/tests.hs deleted file mode 100644 index 85564f0..0000000 --- a/test/tests.hs +++ /dev/null | |||
@@ -1,68 +0,0 @@ | |||
1 | {-#LANGUAGE OverloadedStrings#-} | ||
2 | |||
3 | import Crypto.Hash | ||
4 | import Data.ByteString (ByteString) | ||
5 | import qualified Data.ByteString as B | ||
6 | import Data.Hex | ||
7 | import Data.Byteable | ||
8 | |||
9 | import Test.Tasty | ||
10 | import Test.Tasty.HUnit | ||
11 | |||
12 | import qualified Crypto.Macaroon.Tests | ||
13 | import qualified Crypto.Macaroon.Serializer.Base64.Tests | ||
14 | |||
15 | main = defaultMain tests | ||
16 | |||
17 | tests :: TestTree | ||
18 | tests = testGroup "Tests" [ sanityCheck | ||
19 | , Crypto.Macaroon.Tests.tests | ||
20 | , Crypto.Macaroon.Serializer.Base64.Tests.tests | ||
21 | ] | ||
22 | |||
23 | sanityCheck :: TestTree | ||
24 | sanityCheck = testGroup "Python HMAC Sanity check" [ checkKey | ||
25 | , checkMac1 | ||
26 | , checkMac2 | ||
27 | , checkMac3 | ||
28 | , checkMac4 | ||
29 | ] | ||
30 | |||
31 | |||
32 | secret :: ByteString | ||
33 | secret = "this is our super secret key; only we should know it" | ||
34 | |||
35 | public :: ByteString | ||
36 | public = "we used our secret key" | ||
37 | |||
38 | key :: ByteString | ||
39 | key = B.take 32 secret | ||
40 | |||
41 | mac1 :: ByteString | ||
42 | mac1 = toBytes $ (hmac key public :: HMAC SHA256) | ||
43 | |||
44 | mac2 :: ByteString | ||
45 | mac2 = toBytes $ (hmac mac1 "account = 3735928559" :: HMAC SHA256) | ||
46 | |||
47 | mac3 :: ByteString | ||
48 | mac3 = toBytes $ (hmac mac2 "time < 2015-01-01T00:00" :: HMAC SHA256) | ||
49 | |||
50 | mac4 :: ByteString | ||
51 | mac4 = toBytes $ (hmac mac3 "email = alice@example.org" :: HMAC SHA256) | ||
52 | |||
53 | |||
54 | checkKey = testCase "Truncated key" $ | ||
55 | key @?= "this is our super secret key; on" | ||
56 | |||
57 | checkMac1 = testCase "HMAC key" $ | ||
58 | "C60B4B3540BB1B2F2EF28D1C895691CC4A5E07A38A9D3B1C3379FB485293372F" @=? hex mac1 | ||
59 | |||
60 | checkMac2 = testCase "HMAC key account" $ | ||
61 | "5C933DC9A7D036DFCD1740B4F26D737397A1FF635EAC900F3226973503CAAAA5" @=? hex mac2 | ||
62 | |||
63 | checkMac3 = testCase "HMAC key account time" $ | ||
64 | "7A559B20C8B607009EBCE138C200585E9D0DECA6D23B3EAD6C5E0BA6861D3858" @=? hex mac3 | ||
65 | |||
66 | checkMac4 = testCase "HMAC key account time email" $ | ||
67 | "E42BBB02A9A5A303483CB6295C497AE51AD1D5CB10003CBE548D907E7E62F5E4" @=? hex mac4 | ||
68 | |||