mirror of
https://github.com/QuasarApp/Heart.git
synced 2025-04-26 01:34:37 +00:00
101 lines
2.4 KiB
C++
101 lines
2.4 KiB
C++
/*
|
|
* Copyright (C) 2022-2023 QuasarApp.
|
|
* Distributed under the lgplv3 software license, see the accompanying
|
|
* Everyone is permitted to copy and distribute verbatim copies
|
|
* of this license document, but changing it is not allowed.
|
|
*/
|
|
|
|
#include "ecdsaauthtest.h"
|
|
#include <QtTest>
|
|
#include <hcryptoFeatures/authecdsa.h>
|
|
#include <thread>
|
|
|
|
#ifdef USE_HEART_SSL
|
|
|
|
/*
|
|
* test class
|
|
*/
|
|
class ECDSA: public QH::AuthECDSA {
|
|
|
|
public:
|
|
ECDSA(const QByteArray &publicKey, const QByteArray &privKey) {
|
|
setPublicKey(publicKey);
|
|
_priv = privKey;
|
|
}
|
|
|
|
// AsyncKeysAuth interface
|
|
protected:
|
|
QByteArray getPrivateKey() const override {
|
|
return _priv;
|
|
};
|
|
|
|
private:
|
|
QByteArray _priv;
|
|
|
|
};
|
|
|
|
ECDSAAuthTest::ECDSAAuthTest() {
|
|
|
|
}
|
|
|
|
ECDSAAuthTest::~ECDSAAuthTest() {
|
|
|
|
}
|
|
|
|
void ECDSAAuthTest::test() {
|
|
// create a publick and private keys array.
|
|
QByteArray pub, priv;
|
|
QString userID;
|
|
|
|
// make public and private keys.
|
|
QVERIFY(QH::AuthECDSA::makeKeys(pub, priv));
|
|
|
|
// make user id
|
|
QString userIDOfPubKey = QCryptographicHash::hash(pub,
|
|
QCryptographicHash::Sha256).
|
|
toBase64(QByteArray::Base64UrlEncoding);
|
|
|
|
// check createed keys. should be larget then 0.
|
|
QVERIFY(pub.length() && priv.length());
|
|
|
|
// create test auth object using ecdsa algorithm
|
|
ECDSA edsa(pub, priv);
|
|
|
|
// The terst object should be invalid because it is not prepared.
|
|
QVERIFY(!edsa.isValid());
|
|
|
|
// the authetication should be failed bacause ecdsa class is invalid.
|
|
QVERIFY(!edsa.auth(600, &userID));
|
|
QVERIFY(userID.isEmpty());
|
|
|
|
// prepare an authentication object.
|
|
QVERIFY(edsa.prepare());
|
|
// the prepared object should be valid.
|
|
QVERIFY(edsa.isValid());
|
|
|
|
// authentication should be finished successful because auth object contains prepared valid signature.
|
|
QVERIFY(edsa.auth(600, &userID));
|
|
QVERIFY(userID == userIDOfPubKey);
|
|
|
|
// forget user id before new auth
|
|
userID.clear();
|
|
|
|
// authentication should be failed because the time range is depricated.
|
|
QVERIFY(!edsa.auth(0, &userID));
|
|
QVERIFY(userID.isEmpty());
|
|
|
|
// change subsribe time and try login.
|
|
edsa.setUnixTime(time(0) + 1);
|
|
|
|
std::this_thread::sleep_for(std::chrono::seconds(1));
|
|
|
|
// should be failed because signature is different of the time.
|
|
QVERIFY(!edsa.auth(600, &userID));
|
|
QVERIFY(userID.isEmpty());
|
|
|
|
|
|
|
|
|
|
}
|
|
#endif
|