Skip to content

Commit 1dbdb94

Browse files
committed
corrected all rubocop errors
1 parent b182883 commit 1dbdb94

File tree

1 file changed

+50
-32
lines changed

1 file changed

+50
-32
lines changed

spec/fabric/ec_crypto_suite_spec.rb

Lines changed: 50 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,26 @@
55

66
let(:private_key) { 'd62e76ab4a907d7634ada0d9709b4ed2bfc7c51c421127b7fc93c0141e461797' }
77
let(:public_key) do
8-
'04a01f01fa942d2233a64aebe0b36c16ebdfd1c453ac5297591f20e2bfaba869e17e15f5f7367ee6f16121c64cac3ecdd517920a36f5145dc2a881ae9371873ac6'
8+
'04a01f01fa942d2233a64aebe0b36c16ebdfd1c453ac5297591f20e2bfaba869e17e15f5f7367ee6f1' \
9+
'6121c64cac3ecdd517920a36f5145dc2a881ae9371873ac6'
910
end
1011
let(:random_secret) { 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa' }
1112

1213
describe '#initialize' do
1314
context 'when no parameters are passed' do
14-
it 'utilizes default options' do
15+
it 'utilizes default key_size' do
1516
expect(crypto_suite.key_size).to be(256)
17+
end
18+
19+
it 'utilizes default digest_algorithm' do
1620
expect(crypto_suite.digest_algorithm).to eql('SHA256')
21+
end
22+
23+
it 'utilizes default curve' do
1724
expect(crypto_suite.curve).to eql('prime256v1')
25+
end
26+
27+
it 'utilizes default cipher' do
1828
expect(crypto_suite.cipher).to eql('aes-256-cbc')
1929
end
2030
end
@@ -30,10 +40,19 @@
3040
)
3141
end
3242

33-
it 'utilizes options passed' do
43+
it 'utilizes key_size option passed' do
3444
expect(crypto_suite.key_size).to be(384)
45+
end
46+
47+
it 'utilizes digest_algorithm option passed' do
3548
expect(crypto_suite.digest_algorithm).to eql('SHA224')
49+
end
50+
51+
it 'utilizes curve option passed' do
3652
expect(crypto_suite.curve).to eql('secp384r1')
53+
end
54+
55+
it 'utilizes cipher option passed' do
3756
expect(crypto_suite.cipher).to eql('aes-128-cbc')
3857
end
3958
end
@@ -69,40 +88,33 @@
6988
end
7089

7190
describe '#generate_private_key' do
72-
it 'generates a valid EC private_key' do
91+
it 'generates a private_key string' do
7392
private_key = crypto_suite.generate_private_key
7493
expect(private_key).to be_a(String)
94+
end
7595

76-
public_key = crypto_suite.restore_public_key private_key
77-
78-
group = OpenSSL::PKey::EC::Group.new(crypto_suite.curve)
79-
80-
private_key_bn = OpenSSL::BN.new(private_key, 16)
81-
public_key_bn = OpenSSL::BN.new(public_key, 16)
82-
public_key_point = OpenSSL::PKey::EC::Point.new(group, public_key_bn)
83-
84-
asn1 = OpenSSL::ASN1::Sequence(
85-
[
86-
OpenSSL::ASN1::Integer.new(1),
87-
OpenSSL::ASN1::OctetString(private_key_bn.to_s(2)),
88-
OpenSSL::ASN1::ObjectId(crypto_suite.curve, 0, :EXPLICIT),
89-
OpenSSL::ASN1::BitString(public_key_point.to_octet_string(:uncompressed), 1, :EXPLICIT)
90-
]
91-
)
92-
93-
pkey = OpenSSL::PKey::EC.new(asn1.to_der)
94-
96+
it 'generates a private_key' do
97+
private_key = crypto_suite.generate_private_key
98+
pkey = crypto_suite.pkey_from_private_key(private_key)
9599
expect(pkey.private?).to be(true)
100+
end
101+
102+
it 'matches itself' do
103+
private_key = crypto_suite.generate_private_key
104+
pkey = crypto_suite.pkey_from_private_key(private_key)
96105
expect(pkey.private_key.to_s(16).downcase).to eql(private_key)
97106
end
98107
end
99108

100109
describe '#generate_csr' do
101-
it 'generates a OpenSSL::X509::Request with the proper key' do
102-
req = crypto_suite.generate_csr(private_key)
110+
subject(:response_value) { crypto_suite.generate_csr(private_key) }
111+
112+
it 'generates a OpenSSL::X509::Request' do
113+
expect(response_value).to be_a(OpenSSL::X509::Request)
114+
end
103115

104-
expect(req).to be_a(OpenSSL::X509::Request)
105-
expect(req.public_key.private_key.to_s(16).downcase).to eql(private_key)
116+
it 'returns the proper value' do
117+
expect(response_value.public_key.private_key.to_s(16).downcase).to eql(private_key)
106118
end
107119
end
108120

@@ -122,7 +134,8 @@
122134

123135
describe '#hexdigest' do
124136
it 'generates a hexdigest' do
125-
expect(crypto_suite.hexdigest('hello world')).to eql('b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9')
137+
expected_digest = 'b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9'
138+
expect(crypto_suite.hexdigest('hello world')).to eql(expected_digest)
126139
end
127140
end
128141

@@ -187,10 +200,14 @@
187200
end
188201

189202
describe '#pkey_from_private_key' do
203+
subject(:return_value) { crypto_suite.pkey_from_private_key(private_key) }
204+
190205
it 'converts a private key into a OpenSSL::PKey::EC' do
191-
pkey = crypto_suite.pkey_from_private_key(private_key)
192-
expect(pkey).to be_a(OpenSSL::PKey::EC)
193-
expect(pkey.private_key).to eql(OpenSSL::BN.new(private_key, 16))
206+
expect(return_value).to be_a(OpenSSL::PKey::EC)
207+
end
208+
209+
it 'private_key is expected to equal the original private key' do
210+
expect(return_value.private_key).to eql(OpenSSL::BN.new(private_key, 16))
194211
end
195212
end
196213

@@ -222,7 +239,8 @@
222239
'-----END CERTIFICATE-----'
223240
end
224241
let(:random_certificate_public_key) do
225-
'04ca2509600ed223fbb645ff28b8d0f4229e3a81d8ca70607c571dd591a8c5c79f9886d68c7c76f5e588df19616e34bab2c4b186bc352ae87946b0127d40870fb4'
242+
'04ca2509600ed223fbb645ff28b8d0f4229e3a81d8ca70607c571dd591a8c5c79f9886d' \
243+
'68c7c76f5e588df19616e34bab2c4b186bc352ae87946b0127d40870fb4'
226244
end
227245

228246
it 'returns public_key from x509 certificate' do

0 commit comments

Comments
 (0)