gitee.com/ks-custle/core-gm@v0.0.0-20230922171213-b83bdd97b62c/xcrypto/pkcs12/crypto_test.go (about) 1 // Copyright 2015 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 package pkcs12 6 7 import ( 8 "bytes" 9 "crypto/x509/pkix" 10 "encoding/asn1" 11 "testing" 12 ) 13 14 var sha1WithTripleDES = asn1.ObjectIdentifier([]int{1, 2, 840, 113549, 1, 12, 1, 3}) 15 16 func TestPbDecrypterFor(t *testing.T) { 17 params, _ := asn1.Marshal(pbeParams{ 18 Salt: []byte{1, 2, 3, 4, 5, 6, 7, 8}, 19 Iterations: 2048, 20 }) 21 alg := pkix.AlgorithmIdentifier{ 22 Algorithm: asn1.ObjectIdentifier([]int{1, 2, 3}), 23 Parameters: asn1.RawValue{ 24 FullBytes: params, 25 }, 26 } 27 28 pass, _ := bmpString("Sesame open") 29 30 _, _, err := pbDecrypterFor(alg, pass) 31 if _, ok := err.(NotImplementedError); !ok { 32 t.Errorf("expected not implemented error, got: %T %s", err, err) 33 } 34 35 alg.Algorithm = sha1WithTripleDES 36 cbc, blockSize, err := pbDecrypterFor(alg, pass) 37 if err != nil { 38 t.Errorf("unexpected error from pbDecrypterFor %v", err) 39 } 40 if blockSize != 8 { 41 t.Errorf("unexpected block size %d, wanted 8", blockSize) 42 } 43 44 plaintext := []byte{1, 2, 3, 4, 5, 6, 7, 8} 45 expectedCiphertext := []byte{185, 73, 135, 249, 137, 1, 122, 247} 46 ciphertext := make([]byte, len(plaintext)) 47 cbc.CryptBlocks(ciphertext, plaintext) 48 49 if bytes.Compare(ciphertext, expectedCiphertext) != 0 { 50 t.Errorf("bad ciphertext, got %x but wanted %x", ciphertext, expectedCiphertext) 51 } 52 } 53 54 var pbDecryptTests = []struct { 55 in []byte 56 expected []byte 57 expectedError error 58 }{ 59 { 60 []byte("\x33\x73\xf3\x9f\xda\x49\xae\xfc\xa0\x9a\xdf\x5a\x58\xa0\xea\x46"), // 7 padding bytes 61 []byte("A secret!"), 62 nil, 63 }, 64 { 65 []byte("\x33\x73\xf3\x9f\xda\x49\xae\xfc\x96\x24\x2f\x71\x7e\x32\x3f\xe7"), // 8 padding bytes 66 []byte("A secret"), 67 nil, 68 }, 69 { 70 []byte("\x35\x0c\xc0\x8d\xab\xa9\x5d\x30\x7f\x9a\xec\x6a\xd8\x9b\x9c\xd9"), // 9 padding bytes, incorrect 71 nil, 72 ErrDecryption, 73 }, 74 { 75 []byte("\xb2\xf9\x6e\x06\x60\xae\x20\xcf\x08\xa0\x7b\xd9\x6b\x20\xef\x41"), // incorrect padding bytes: [ ... 0x04 0x02 ] 76 nil, 77 ErrDecryption, 78 }, 79 } 80 81 func TestPbDecrypt(t *testing.T) { 82 for i, test := range pbDecryptTests { 83 decryptable := testDecryptable{ 84 data: test.in, 85 algorithm: pkix.AlgorithmIdentifier{ 86 Algorithm: sha1WithTripleDES, 87 Parameters: pbeParams{ 88 Salt: []byte("\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8"), 89 Iterations: 4096, 90 }.RawASN1(), 91 }, 92 } 93 password, _ := bmpString("sesame") 94 95 plaintext, err := pbDecrypt(decryptable, password) 96 if err != test.expectedError { 97 t.Errorf("#%d: got error %q, but wanted %q", i, err, test.expectedError) 98 continue 99 } 100 101 if !bytes.Equal(plaintext, test.expected) { 102 t.Errorf("#%d: got %x, but wanted %x", i, plaintext, test.expected) 103 } 104 } 105 } 106 107 type testDecryptable struct { 108 data []byte 109 algorithm pkix.AlgorithmIdentifier 110 } 111 112 func (d testDecryptable) Algorithm() pkix.AlgorithmIdentifier { return d.algorithm } 113 func (d testDecryptable) Data() []byte { return d.data } 114 115 func (params pbeParams) RawASN1() (raw asn1.RawValue) { 116 asn1Bytes, err := asn1.Marshal(params) 117 if err != nil { 118 panic(err) 119 } 120 _, err = asn1.Unmarshal(asn1Bytes, &raw) 121 if err != nil { 122 panic(err) 123 } 124 return 125 }