|
8 | 8 |
|
9 | 9 | RSpec.describe "Packed attestation" do |
10 | 10 | describe "#valid?" do |
11 | | - let(:credential_key) { OpenSSL::PKey::EC.new("prime256v1").generate_key } |
| 11 | + let(:credential_key) { create_ec_key } |
12 | 12 | let(:client_data_hash) { OpenSSL::Digest::SHA256.digest({}.to_json) } |
13 | 13 |
|
14 | 14 | let(:authenticator_data_bytes) do |
|
61 | 61 | end |
62 | 62 |
|
63 | 63 | context "because it was signed with a different signing key" do |
64 | | - let(:signature) { OpenSSL::PKey::EC.new("prime256v1").generate_key.sign("SHA256", to_be_signed) } |
| 64 | + let(:signature) { create_ec_key.sign("SHA256", to_be_signed) } |
65 | 65 |
|
66 | 66 | it "fails" do |
67 | 67 | expect(statement.valid?(authenticator_data, client_data_hash)).to be_falsy |
|
88 | 88 |
|
89 | 89 | context "x5c attestation" do |
90 | 90 | let(:algorithm) { -7 } |
91 | | - let(:attestation_key) { OpenSSL::PKey::EC.new("prime256v1").generate_key } |
| 91 | + let(:attestation_key) { create_ec_key } |
92 | 92 | let(:signature) { attestation_key.sign("SHA256", to_be_signed) } |
93 | 93 | let(:attestation_certificate_version) { 2 } |
94 | 94 | let(:attestation_certificate_subject) { "/C=UY/O=ACME/OU=Authenticator Attestation/CN=CN" } |
|
118 | 118 | certificate.to_der |
119 | 119 | end |
120 | 120 |
|
121 | | - let(:root_key) { OpenSSL::PKey::EC.new("prime256v1").generate_key } |
| 121 | + let(:root_key) { create_ec_key } |
122 | 122 | let(:root_certificate_start_time) { Time.now - 1 } |
123 | 123 | let(:root_certificate_end_time) { Time.now + 60 } |
124 | 124 |
|
|
172 | 172 | end |
173 | 173 |
|
174 | 174 | context "because it was signed with a different signing key (self attested)" do |
175 | | - let(:signature) { OpenSSL::PKey::EC.new("prime256v1").generate_key.sign("SHA256", to_be_signed) } |
| 175 | + let(:signature) { create_ec_key.sign("SHA256", to_be_signed) } |
176 | 176 |
|
177 | 177 | it "fails" do |
178 | 178 | expect(statement.valid?(authenticator_data, client_data_hash)).to be_falsy |
|
0 commit comments