//! PKCS#8 tests #![cfg(all(feature = "dev", feature = "pkcs8"))] use elliptic_curve::{ dev::{PublicKey, SecretKey}, pkcs8::{DecodePrivateKey, DecodePublicKey, EncodePrivateKey}, sec1::ToEncodedPoint, }; use hex_literal::hex; use pkcs8::der; /// DER-encoded PKCS#8 public key const PKCS8_PUBLIC_KEY_DER: &[u8; 91] = include_bytes!("examples/pkcs8-public-key.der"); /// PEM-encoded PKCS#8 public key #[cfg(feature = "pem")] const PKCS8_PUBLIC_KEY_PEM: &str = include_str!("examples/pkcs8-public-key.pem"); /// Example encoded scalar value const EXAMPLE_SCALAR: [u8; 32] = hex!("AABBCCDDEEFF0000000000000000000000000000000000000000000000000001"); /// Example PKCS#8 private key fn example_private_key() -> der::SecretDocument { SecretKey::from_slice(&EXAMPLE_SCALAR) .unwrap() .to_pkcs8_der() .unwrap() } #[test] fn decode_pkcs8_private_key_from_der() { dbg!(example_private_key().as_bytes()); let secret_key = SecretKey::from_pkcs8_der(example_private_key().as_bytes()).unwrap(); assert_eq!(secret_key.to_bytes().as_slice(), &EXAMPLE_SCALAR); } #[test] fn decode_pkcs8_public_key_from_der() { let public_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap(); let expected_sec1_point = hex!("041CACFFB55F2F2CEFD89D89EB374B2681152452802DEEA09916068137D839CF7FC481A44492304D7EF66AC117BEFE83A8D08F155F2B52F9F618DD447029048E0F"); assert_eq!( public_key.to_encoded_point(false).as_bytes(), &expected_sec1_point[..] ); } #[test] #[cfg(feature = "pem")] fn decode_pkcs8_public_key_from_pem() { let public_key = PKCS8_PUBLIC_KEY_PEM.parse::().unwrap(); // Ensure key parses equivalently to DER let der_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap(); assert_eq!(public_key, der_key); }