Skip to content

Commit

Permalink
Merge branch 'main' into james/standardize-check-challenge-box-size
Browse files Browse the repository at this point in the history
  • Loading branch information
James-Pickett authored Apr 17, 2024
2 parents de31787 + bbffc14 commit 7660fcd
Show file tree
Hide file tree
Showing 5 changed files with 7 additions and 11 deletions.
1 change: 0 additions & 1 deletion cross_language_tests/aes_cross_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,6 @@ func TestAesRuby(t *testing.T) {

b, err := msgpack.Marshal(tt)
require.NoError(t, err)

//#nosec G306 -- Need readable files
require.NoError(t, os.WriteFile(testfile, []byte(base64.StdEncoding.EncodeToString(b)), 0644))
})
Expand Down
6 changes: 3 additions & 3 deletions cross_language_tests/challenge_cross_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -196,7 +196,7 @@ func TestChallenge_GoGenerate_RubyRespond(t *testing.T) {
outerResponse, err := challenge.UnmarshalResponse(tamperWithResponse(t, challengeOuterBoxBytes, outerResponseBytes))
require.NoError(t, err)

_, err = outerResponse.Open(*challengePrivateEncryptionKey)
_, err = outerResponse.Open(challengePrivateEncryptionKey)
require.Error(t, err)
})

Expand All @@ -210,11 +210,11 @@ func TestChallenge_GoGenerate_RubyRespond(t *testing.T) {
// try to open with a bad key
_, malloryPrivKey, err := box.GenerateKey(rand.Reader)
require.NoError(t, err)
_, err = outerResponse.Open(*malloryPrivKey)
_, err = outerResponse.Open(malloryPrivKey)
require.Error(t, err)

// open with legit key
innerResponse, err := outerResponse.Open(*challengePrivateEncryptionKey)
innerResponse, err := outerResponse.Open(challengePrivateEncryptionKey)
require.NoError(t, err)

// verify data
Expand Down
3 changes: 0 additions & 3 deletions cross_language_tests/rsa_cross_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,6 @@ func TestRsaRuby(t *testing.T) {

b, err := msgpack.Marshal(tt)
require.NoError(t, err)

//#nosec G306 -- Need readable files
require.NoError(t, os.WriteFile(testfile, []byte(base64.StdEncoding.EncodeToString(b)), 0644))

Expand Down Expand Up @@ -132,7 +131,6 @@ func TestRsaRuby(t *testing.T) {

b, err := msgpack.Marshal(tt)
require.NoError(t, err)

//#nosec G306 -- Need readable files
require.NoError(t, os.WriteFile(testfile, []byte(base64.StdEncoding.EncodeToString(b)), 0644))

Expand Down Expand Up @@ -161,7 +159,6 @@ func TestRsaRuby(t *testing.T) {

b, err := msgpack.Marshal(tt)
require.NoError(t, err)

//#nosec G306 -- Need readable files
require.NoError(t, os.WriteFile(testfile, []byte(base64.StdEncoding.EncodeToString(b)), 0644))

Expand Down
4 changes: 2 additions & 2 deletions pkg/challenge/challenge_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -107,11 +107,11 @@ func TestChallengeHappyPath(t *testing.T) {
// try to open with a bad key
_, malloryPrivKey, err := box.GenerateKey(rand.Reader)
require.NoError(t, err)
_, err = outerResponse.Open(*malloryPrivKey)
_, err = outerResponse.Open(malloryPrivKey)
require.Error(t, err)

// open with legit key
innerResponse, err := outerResponse.Open(*challengePrivateEncryptionKey)
innerResponse, err := outerResponse.Open(challengePrivateEncryptionKey)
require.NoError(t, err)

// verify data
Expand Down
4 changes: 2 additions & 2 deletions pkg/challenge/response.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,8 @@ type OuterResponse struct {
ChallengeId []byte `msgpack:"challengeId"`
}

func (o *OuterResponse) Open(privateEncryptionKey [32]byte) (*InnerResponse, error) {
innerResponseBytes, err := echelper.OpenNaCl(o.Msg, &o.PublicEncryptionKey, &privateEncryptionKey)
func (o *OuterResponse) Open(privateEncryptionKey *[32]byte) (*InnerResponse, error) {
innerResponseBytes, err := echelper.OpenNaCl(o.Msg, &o.PublicEncryptionKey, privateEncryptionKey)
if err != nil {
return nil, fmt.Errorf("opening challenge response box: %w", err)
}
Expand Down

0 comments on commit 7660fcd

Please sign in to comment.