mirror of
https://github.com/golang/go.git
synced 2025-12-08 06:10:04 +00:00
build: move package sources from src/pkg to src
Preparation was in CL 134570043. This CL contains only the effect of 'hg mv src/pkg/* src'. For more about the move, see golang.org/s/go14nopkg.
This commit is contained in:
parent
220a6de47e
commit
c007ce824d
2097 changed files with 0 additions and 0 deletions
191
src/crypto/ecdsa/ecdsa_test.go
Normal file
191
src/crypto/ecdsa/ecdsa_test.go
Normal file
|
|
@ -0,0 +1,191 @@
|
|||
// Copyright 2011 The Go Authors. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package ecdsa
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"compress/bzip2"
|
||||
"crypto/elliptic"
|
||||
"crypto/rand"
|
||||
"crypto/sha1"
|
||||
"crypto/sha256"
|
||||
"crypto/sha512"
|
||||
"encoding/hex"
|
||||
"hash"
|
||||
"io"
|
||||
"math/big"
|
||||
"os"
|
||||
"strings"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func testKeyGeneration(t *testing.T, c elliptic.Curve, tag string) {
|
||||
priv, err := GenerateKey(c, rand.Reader)
|
||||
if err != nil {
|
||||
t.Errorf("%s: error: %s", tag, err)
|
||||
return
|
||||
}
|
||||
if !c.IsOnCurve(priv.PublicKey.X, priv.PublicKey.Y) {
|
||||
t.Errorf("%s: public key invalid: %s", tag, err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestKeyGeneration(t *testing.T) {
|
||||
testKeyGeneration(t, elliptic.P224(), "p224")
|
||||
if testing.Short() {
|
||||
return
|
||||
}
|
||||
testKeyGeneration(t, elliptic.P256(), "p256")
|
||||
testKeyGeneration(t, elliptic.P384(), "p384")
|
||||
testKeyGeneration(t, elliptic.P521(), "p521")
|
||||
}
|
||||
|
||||
func testSignAndVerify(t *testing.T, c elliptic.Curve, tag string) {
|
||||
priv, _ := GenerateKey(c, rand.Reader)
|
||||
|
||||
hashed := []byte("testing")
|
||||
r, s, err := Sign(rand.Reader, priv, hashed)
|
||||
if err != nil {
|
||||
t.Errorf("%s: error signing: %s", tag, err)
|
||||
return
|
||||
}
|
||||
|
||||
if !Verify(&priv.PublicKey, hashed, r, s) {
|
||||
t.Errorf("%s: Verify failed", tag)
|
||||
}
|
||||
|
||||
hashed[0] ^= 0xff
|
||||
if Verify(&priv.PublicKey, hashed, r, s) {
|
||||
t.Errorf("%s: Verify always works!", tag)
|
||||
}
|
||||
}
|
||||
|
||||
func TestSignAndVerify(t *testing.T) {
|
||||
testSignAndVerify(t, elliptic.P224(), "p224")
|
||||
if testing.Short() {
|
||||
return
|
||||
}
|
||||
testSignAndVerify(t, elliptic.P256(), "p256")
|
||||
testSignAndVerify(t, elliptic.P384(), "p384")
|
||||
testSignAndVerify(t, elliptic.P521(), "p521")
|
||||
}
|
||||
|
||||
func fromHex(s string) *big.Int {
|
||||
r, ok := new(big.Int).SetString(s, 16)
|
||||
if !ok {
|
||||
panic("bad hex")
|
||||
}
|
||||
return r
|
||||
}
|
||||
|
||||
func TestVectors(t *testing.T) {
|
||||
// This test runs the full set of NIST test vectors from
|
||||
// http://csrc.nist.gov/groups/STM/cavp/documents/dss/186-3ecdsatestvectors.zip
|
||||
//
|
||||
// The SigVer.rsp file has been edited to remove test vectors for
|
||||
// unsupported algorithms and has been compressed.
|
||||
|
||||
if testing.Short() {
|
||||
return
|
||||
}
|
||||
|
||||
f, err := os.Open("testdata/SigVer.rsp.bz2")
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
buf := bufio.NewReader(bzip2.NewReader(f))
|
||||
|
||||
lineNo := 1
|
||||
var h hash.Hash
|
||||
var msg []byte
|
||||
var hashed []byte
|
||||
var r, s *big.Int
|
||||
pub := new(PublicKey)
|
||||
|
||||
for {
|
||||
line, err := buf.ReadString('\n')
|
||||
if len(line) == 0 {
|
||||
if err == io.EOF {
|
||||
break
|
||||
}
|
||||
t.Fatalf("error reading from input: %s", err)
|
||||
}
|
||||
lineNo++
|
||||
// Need to remove \r\n from the end of the line.
|
||||
if !strings.HasSuffix(line, "\r\n") {
|
||||
t.Fatalf("bad line ending (expected \\r\\n) on line %d", lineNo)
|
||||
}
|
||||
line = line[:len(line)-2]
|
||||
|
||||
if len(line) == 0 || line[0] == '#' {
|
||||
continue
|
||||
}
|
||||
|
||||
if line[0] == '[' {
|
||||
line = line[1 : len(line)-1]
|
||||
parts := strings.SplitN(line, ",", 2)
|
||||
|
||||
switch parts[0] {
|
||||
case "P-224":
|
||||
pub.Curve = elliptic.P224()
|
||||
case "P-256":
|
||||
pub.Curve = elliptic.P256()
|
||||
case "P-384":
|
||||
pub.Curve = elliptic.P384()
|
||||
case "P-521":
|
||||
pub.Curve = elliptic.P521()
|
||||
default:
|
||||
pub.Curve = nil
|
||||
}
|
||||
|
||||
switch parts[1] {
|
||||
case "SHA-1":
|
||||
h = sha1.New()
|
||||
case "SHA-224":
|
||||
h = sha256.New224()
|
||||
case "SHA-256":
|
||||
h = sha256.New()
|
||||
case "SHA-384":
|
||||
h = sha512.New384()
|
||||
case "SHA-512":
|
||||
h = sha512.New()
|
||||
default:
|
||||
h = nil
|
||||
}
|
||||
|
||||
continue
|
||||
}
|
||||
|
||||
if h == nil || pub.Curve == nil {
|
||||
continue
|
||||
}
|
||||
|
||||
switch {
|
||||
case strings.HasPrefix(line, "Msg = "):
|
||||
if msg, err = hex.DecodeString(line[6:]); err != nil {
|
||||
t.Fatalf("failed to decode message on line %d: %s", lineNo, err)
|
||||
}
|
||||
case strings.HasPrefix(line, "Qx = "):
|
||||
pub.X = fromHex(line[5:])
|
||||
case strings.HasPrefix(line, "Qy = "):
|
||||
pub.Y = fromHex(line[5:])
|
||||
case strings.HasPrefix(line, "R = "):
|
||||
r = fromHex(line[4:])
|
||||
case strings.HasPrefix(line, "S = "):
|
||||
s = fromHex(line[4:])
|
||||
case strings.HasPrefix(line, "Result = "):
|
||||
expected := line[9] == 'P'
|
||||
h.Reset()
|
||||
h.Write(msg)
|
||||
hashed := h.Sum(hashed[:0])
|
||||
if Verify(pub, hashed, r, s) != expected {
|
||||
t.Fatalf("incorrect result on line %d", lineNo)
|
||||
}
|
||||
default:
|
||||
t.Fatalf("unknown variable on line %d: %s", lineNo, line)
|
||||
}
|
||||
}
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue