ecdsa_test.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164
  1. package jwt_test
  2. import (
  3. "crypto/ecdsa"
  4. "io/ioutil"
  5. "strings"
  6. "testing"
  7. "github.com/golang-jwt/jwt/v4"
  8. )
  9. var ecdsaTestData = []struct {
  10. name string
  11. keys map[string]string
  12. tokenString string
  13. alg string
  14. claims map[string]interface{}
  15. valid bool
  16. }{
  17. {
  18. "Basic ES256",
  19. map[string]string{"private": "test/ec256-private.pem", "public": "test/ec256-public.pem"},
  20. "eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzI1NiJ9.eyJmb28iOiJiYXIifQ.feG39E-bn8HXAKhzDZq7yEAPWYDhZlwTn3sePJnU9VrGMmwdXAIEyoOnrjreYlVM_Z4N13eK9-TmMTWyfKJtHQ",
  21. "ES256",
  22. map[string]interface{}{"foo": "bar"},
  23. true,
  24. },
  25. {
  26. "Basic ES384",
  27. map[string]string{"private": "test/ec384-private.pem", "public": "test/ec384-public.pem"},
  28. "eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzM4NCJ9.eyJmb28iOiJiYXIifQ.ngAfKMbJUh0WWubSIYe5GMsA-aHNKwFbJk_wq3lq23aPp8H2anb1rRILIzVR0gUf4a8WzDtrzmiikuPWyCS6CN4-PwdgTk-5nehC7JXqlaBZU05p3toM3nWCwm_LXcld",
  29. "ES384",
  30. map[string]interface{}{"foo": "bar"},
  31. true,
  32. },
  33. {
  34. "Basic ES512",
  35. map[string]string{"private": "test/ec512-private.pem", "public": "test/ec512-public.pem"},
  36. "eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzUxMiJ9.eyJmb28iOiJiYXIifQ.AAU0TvGQOcdg2OvrwY73NHKgfk26UDekh9Prz-L_iWuTBIBqOFCWwwLsRiHB1JOddfKAls5do1W0jR_F30JpVd-6AJeTjGKA4C1A1H6gIKwRY0o_tFDIydZCl_lMBMeG5VNFAjO86-WCSKwc3hqaGkq1MugPRq_qrF9AVbuEB4JPLyL5",
  37. "ES512",
  38. map[string]interface{}{"foo": "bar"},
  39. true,
  40. },
  41. {
  42. "basic ES256 invalid: foo => bar",
  43. map[string]string{"private": "test/ec256-private.pem", "public": "test/ec256-public.pem"},
  44. "eyJhbGciOiJFUzI1NiIsInR5cCI6IkpXVCJ9.eyJmb28iOiJiYXIifQ.MEQCIHoSJnmGlPaVQDqacx_2XlXEhhqtWceVopjomc2PJLtdAiAUTeGPoNYxZw0z8mgOnnIcjoxRuNDVZvybRZF3wR1l8W",
  45. "ES256",
  46. map[string]interface{}{"foo": "bar"},
  47. false,
  48. },
  49. }
  50. func TestECDSAVerify(t *testing.T) {
  51. for _, data := range ecdsaTestData {
  52. var err error
  53. key, _ := ioutil.ReadFile(data.keys["public"])
  54. var ecdsaKey *ecdsa.PublicKey
  55. if ecdsaKey, err = jwt.ParseECPublicKeyFromPEM(key); err != nil {
  56. t.Errorf("Unable to parse ECDSA public key: %v", err)
  57. }
  58. parts := strings.Split(data.tokenString, ".")
  59. method := jwt.GetSigningMethod(data.alg)
  60. err = method.Verify(strings.Join(parts[0:2], "."), parts[2], ecdsaKey)
  61. if data.valid && err != nil {
  62. t.Errorf("[%v] Error while verifying key: %v", data.name, err)
  63. }
  64. if !data.valid && err == nil {
  65. t.Errorf("[%v] Invalid key passed validation", data.name)
  66. }
  67. }
  68. }
  69. func TestECDSASign(t *testing.T) {
  70. for _, data := range ecdsaTestData {
  71. var err error
  72. key, _ := ioutil.ReadFile(data.keys["private"])
  73. var ecdsaKey *ecdsa.PrivateKey
  74. if ecdsaKey, err = jwt.ParseECPrivateKeyFromPEM(key); err != nil {
  75. t.Errorf("Unable to parse ECDSA private key: %v", err)
  76. }
  77. if data.valid {
  78. parts := strings.Split(data.tokenString, ".")
  79. toSign := strings.Join(parts[0:2], ".")
  80. method := jwt.GetSigningMethod(data.alg)
  81. sig, err := method.Sign(toSign, ecdsaKey)
  82. if err != nil {
  83. t.Errorf("[%v] Error signing token: %v", data.name, err)
  84. }
  85. if sig == parts[2] {
  86. t.Errorf("[%v] Identical signatures\nbefore:\n%v\nafter:\n%v", data.name, parts[2], sig)
  87. }
  88. err = method.Verify(toSign, sig, ecdsaKey.Public())
  89. if err != nil {
  90. t.Errorf("[%v] Sign produced an invalid signature: %v", data.name, err)
  91. }
  92. }
  93. }
  94. }
  95. func BenchmarkECDSAParsing(b *testing.B) {
  96. for _, data := range ecdsaTestData {
  97. key, _ := ioutil.ReadFile(data.keys["private"])
  98. b.Run(data.name, func(b *testing.B) {
  99. b.ReportAllocs()
  100. b.ResetTimer()
  101. b.RunParallel(func(pb *testing.PB) {
  102. for pb.Next() {
  103. if _, err := jwt.ParseECPrivateKeyFromPEM(key); err != nil {
  104. b.Fatalf("Unable to parse ECDSA private key: %v", err)
  105. }
  106. }
  107. })
  108. })
  109. }
  110. }
  111. func BenchmarkECDSASigning(b *testing.B) {
  112. for _, data := range ecdsaTestData {
  113. key, _ := ioutil.ReadFile(data.keys["private"])
  114. ecdsaKey, err := jwt.ParseECPrivateKeyFromPEM(key)
  115. if err != nil {
  116. b.Fatalf("Unable to parse ECDSA private key: %v", err)
  117. }
  118. method := jwt.GetSigningMethod(data.alg)
  119. b.Run(data.name, func(b *testing.B) {
  120. benchmarkSigning(b, method, ecdsaKey)
  121. })
  122. // Directly call method.Sign without the decoration of *Token.
  123. b.Run(data.name+"/sign-only", func(b *testing.B) {
  124. if !data.valid {
  125. b.Skipf("Skipping because data is not valid")
  126. }
  127. parts := strings.Split(data.tokenString, ".")
  128. toSign := strings.Join(parts[0:2], ".")
  129. b.ReportAllocs()
  130. b.ResetTimer()
  131. for i := 0; i < b.N; i++ {
  132. sig, err := method.Sign(toSign, ecdsaKey)
  133. if err != nil {
  134. b.Fatalf("[%v] Error signing token: %v", data.name, err)
  135. }
  136. if sig == parts[2] {
  137. b.Fatalf("[%v] Identical signatures\nbefore:\n%v\nafter:\n%v", data.name, parts[2], sig)
  138. }
  139. }
  140. })
  141. }
  142. }