OSDN Git Service

Hulk did something
[bytom/vapor.git] / vendor / golang.org / x / crypto / pkcs12 / crypto_test.go
diff --git a/vendor/golang.org/x/crypto/pkcs12/crypto_test.go b/vendor/golang.org/x/crypto/pkcs12/crypto_test.go
new file mode 100644 (file)
index 0000000..eb4dae8
--- /dev/null
@@ -0,0 +1,125 @@
+// Copyright 2015 The Go Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style
+// license that can be found in the LICENSE file.
+
+package pkcs12
+
+import (
+       "bytes"
+       "crypto/x509/pkix"
+       "encoding/asn1"
+       "testing"
+)
+
+var sha1WithTripleDES = asn1.ObjectIdentifier([]int{1, 2, 840, 113549, 1, 12, 1, 3})
+
+func TestPbDecrypterFor(t *testing.T) {
+       params, _ := asn1.Marshal(pbeParams{
+               Salt:       []byte{1, 2, 3, 4, 5, 6, 7, 8},
+               Iterations: 2048,
+       })
+       alg := pkix.AlgorithmIdentifier{
+               Algorithm: asn1.ObjectIdentifier([]int{1, 2, 3}),
+               Parameters: asn1.RawValue{
+                       FullBytes: params,
+               },
+       }
+
+       pass, _ := bmpString("Sesame open")
+
+       _, _, err := pbDecrypterFor(alg, pass)
+       if _, ok := err.(NotImplementedError); !ok {
+               t.Errorf("expected not implemented error, got: %T %s", err, err)
+       }
+
+       alg.Algorithm = sha1WithTripleDES
+       cbc, blockSize, err := pbDecrypterFor(alg, pass)
+       if err != nil {
+               t.Errorf("unexpected error from pbDecrypterFor %v", err)
+       }
+       if blockSize != 8 {
+               t.Errorf("unexpected block size %d, wanted 8", blockSize)
+       }
+
+       plaintext := []byte{1, 2, 3, 4, 5, 6, 7, 8}
+       expectedCiphertext := []byte{185, 73, 135, 249, 137, 1, 122, 247}
+       ciphertext := make([]byte, len(plaintext))
+       cbc.CryptBlocks(ciphertext, plaintext)
+
+       if bytes.Compare(ciphertext, expectedCiphertext) != 0 {
+               t.Errorf("bad ciphertext, got %x but wanted %x", ciphertext, expectedCiphertext)
+       }
+}
+
+var pbDecryptTests = []struct {
+       in            []byte
+       expected      []byte
+       expectedError error
+}{
+       {
+               []byte("\x33\x73\xf3\x9f\xda\x49\xae\xfc\xa0\x9a\xdf\x5a\x58\xa0\xea\x46"), // 7 padding bytes
+               []byte("A secret!"),
+               nil,
+       },
+       {
+               []byte("\x33\x73\xf3\x9f\xda\x49\xae\xfc\x96\x24\x2f\x71\x7e\x32\x3f\xe7"), // 8 padding bytes
+               []byte("A secret"),
+               nil,
+       },
+       {
+               []byte("\x35\x0c\xc0\x8d\xab\xa9\x5d\x30\x7f\x9a\xec\x6a\xd8\x9b\x9c\xd9"), // 9 padding bytes, incorrect
+               nil,
+               ErrDecryption,
+       },
+       {
+               []byte("\xb2\xf9\x6e\x06\x60\xae\x20\xcf\x08\xa0\x7b\xd9\x6b\x20\xef\x41"), // incorrect padding bytes: [ ... 0x04 0x02 ]
+               nil,
+               ErrDecryption,
+       },
+}
+
+func TestPbDecrypt(t *testing.T) {
+       for i, test := range pbDecryptTests {
+               decryptable := testDecryptable{
+                       data: test.in,
+                       algorithm: pkix.AlgorithmIdentifier{
+                               Algorithm: sha1WithTripleDES,
+                               Parameters: pbeParams{
+                                       Salt:       []byte("\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8"),
+                                       Iterations: 4096,
+                               }.RawASN1(),
+                       },
+               }
+               password, _ := bmpString("sesame")
+
+               plaintext, err := pbDecrypt(decryptable, password)
+               if err != test.expectedError {
+                       t.Errorf("#%d: got error %q, but wanted %q", i, err, test.expectedError)
+                       continue
+               }
+
+               if !bytes.Equal(plaintext, test.expected) {
+                       t.Errorf("#%d: got %x, but wanted %x", i, plaintext, test.expected)
+               }
+       }
+}
+
+type testDecryptable struct {
+       data      []byte
+       algorithm pkix.AlgorithmIdentifier
+}
+
+func (d testDecryptable) Algorithm() pkix.AlgorithmIdentifier { return d.algorithm }
+func (d testDecryptable) Data() []byte                        { return d.data }
+
+func (params pbeParams) RawASN1() (raw asn1.RawValue) {
+       asn1Bytes, err := asn1.Marshal(params)
+       if err != nil {
+               panic(err)
+       }
+       _, err = asn1.Unmarshal(asn1Bytes, &raw)
+       if err != nil {
+               panic(err)
+       }
+       return
+}