mirror of
https://github.com/FiloSottile/age.git
synced 2025-12-23 05:25:14 +00:00
If the implementation re-encodes the header before checking the HMAC, that would mask malleability issues: the HMAC check would fail because the tests HMAC'd the original header, but an attacker could also produce the right HMAC. Instead of duplicating every parsing tests (with the original and re-encoded HMAC), we make the test framework distinguish HMAC errors, which ensures bad encodings are recognized as such and not bypassable HMAC errors.
161 lines
3.4 KiB
Go
161 lines
3.4 KiB
Go
// Copyright 2022 The age Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package age_test
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/sha256"
|
|
"encoding/hex"
|
|
"flag"
|
|
"io"
|
|
"log"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"strings"
|
|
"testing"
|
|
|
|
"filippo.io/age"
|
|
)
|
|
|
|
//go:generate go test -generate -run ^$
|
|
|
|
func TestMain(m *testing.M) {
|
|
genFlag := flag.Bool("generate", false, "regenerate test files")
|
|
flag.Parse()
|
|
if *genFlag {
|
|
log.SetFlags(0)
|
|
tests, err := filepath.Glob("testdata/testkit/*")
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
for _, test := range tests {
|
|
os.Remove(test)
|
|
}
|
|
generators, err := filepath.Glob("tests/*.go")
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
for _, generator := range generators {
|
|
vector := strings.TrimSuffix(generator, ".go")
|
|
vector = "testdata/testkit/" + strings.TrimPrefix(vector, "tests/")
|
|
log.Printf("%s -> %s\n", generator, vector)
|
|
out, err := exec.Command("go", "run", generator).Output()
|
|
if err != nil {
|
|
if err, ok := err.(*exec.ExitError); ok {
|
|
log.Fatalf("%s", err.Stderr)
|
|
}
|
|
log.Fatal(err)
|
|
}
|
|
os.WriteFile(vector, out, 0664)
|
|
}
|
|
}
|
|
|
|
os.Exit(m.Run())
|
|
}
|
|
|
|
func TestVectors(t *testing.T) {
|
|
tests, err := filepath.Glob("testdata/testkit/*")
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
for _, test := range tests {
|
|
contents, err := os.ReadFile(test)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
name := strings.TrimPrefix(test, "testdata/testkit/")
|
|
t.Run(name, func(t *testing.T) {
|
|
testVector(t, contents)
|
|
})
|
|
}
|
|
}
|
|
|
|
func testVector(t *testing.T, test []byte) {
|
|
var (
|
|
expect string
|
|
payloadHash *[32]byte
|
|
identities []age.Identity
|
|
)
|
|
|
|
for {
|
|
line, rest, ok := bytes.Cut(test, []byte("\n"))
|
|
if !ok {
|
|
t.Fatal("invalid test file: no payload")
|
|
}
|
|
test = rest
|
|
if len(line) == 0 {
|
|
break
|
|
}
|
|
key, value, _ := strings.Cut(string(line), ": ")
|
|
switch key {
|
|
case "expect":
|
|
switch value {
|
|
case "success":
|
|
case "HMAC failure":
|
|
case "header failure":
|
|
case "payload failure":
|
|
default:
|
|
t.Fatal("invalid test file: unknown expect value:", value)
|
|
}
|
|
expect = value
|
|
case "payload":
|
|
h, err := hex.DecodeString(value)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
payloadHash = (*[32]byte)(h)
|
|
case "identity":
|
|
i, err := age.ParseX25519Identity(value)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
identities = append(identities, i)
|
|
case "passphrase":
|
|
i, err := age.NewScryptIdentity(value)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
identities = append(identities, i)
|
|
case "file key":
|
|
// Ignored.
|
|
case "comment":
|
|
t.Log(value)
|
|
default:
|
|
t.Fatal("invalid test file: unknown header key:", key)
|
|
}
|
|
}
|
|
|
|
r, err := age.Decrypt(bytes.NewReader(test), identities...)
|
|
if err != nil && strings.HasSuffix(err.Error(), "bad header MAC") {
|
|
if expect == "HMAC failure" {
|
|
t.Log(err)
|
|
return
|
|
}
|
|
t.Fatalf("expected %s, got HMAC error", expect)
|
|
} else if err != nil {
|
|
if expect == "header failure" {
|
|
t.Log(err)
|
|
return
|
|
}
|
|
t.Fatalf("expected %s, got: %v", expect, err)
|
|
} else if expect != "success" && expect != "payload failure" {
|
|
t.Fatalf("expected %s, got success", expect)
|
|
}
|
|
out, err := io.ReadAll(r)
|
|
if err != nil {
|
|
if expect == "payload failure" {
|
|
t.Log(err)
|
|
return
|
|
}
|
|
t.Fatalf("expected %s, got: %v", expect, err)
|
|
} else if expect != "success" {
|
|
t.Fatalf("expected %s, got success", expect)
|
|
}
|
|
if sha256.Sum256(out) != *payloadHash {
|
|
t.Error("payload hash mismatch")
|
|
}
|
|
}
|