github.com/insolar/x-crypto@v0.0.0-20191031140942-75fab8a325f6/x509/sec1_test.go (about) 1 // Copyright 2012 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 package x509 6 7 import ( 8 "bytes" 9 "encoding/hex" 10 "testing" 11 ) 12 13 var ecKeyTests = []struct { 14 derHex string 15 shouldReserialize bool 16 }{ 17 // Generated using: 18 // openssl ecparam -genkey -name secp384r1 -outform PEM 19 {"3081a40201010430bdb9839c08ee793d1157886a7a758a3c8b2a17a4df48f17ace57c72c56b4723cf21dcda21d4e1ad57ff034f19fcfd98ea00706052b81040022a16403620004feea808b5ee2429cfcce13c32160e1c960990bd050bb0fdf7222f3decd0a55008e32a6aa3c9062051c4cba92a7a3b178b24567412d43cdd2f882fa5addddd726fe3e208d2c26d733a773a597abb749714df7256ead5105fa6e7b3650de236b50", true}, 20 // This key was generated by GnuTLS and has illegal zero-padding of the 21 // private key. See https://golang.org/issues/13699. 22 {"3078020101042100f9f43a04b9bdc3ab01f53be6df80e7a7bc3eaf7b87fc24e630a4a0aa97633645a00a06082a8648ce3d030107a1440342000441a51bc318461b4c39a45048a16d4fc2a935b1ea7fe86e8c1fa219d6f2438f7c7fd62957d3442efb94b6a23eb0ea66dda663dc42f379cda6630b21b7888a5d3d", false}, 23 // This was generated using an old version of OpenSSL and is missing a 24 // leading zero byte in the private key that should be present. 25 {"3081db0201010441607b4f985774ac21e633999794542e09312073480baa69550914d6d43d8414441e61b36650567901da714f94dffb3ce0e2575c31928a0997d51df5c440e983ca17a00706052b81040023a181890381860004001661557afedd7ac8d6b70e038e576558c626eb62edda36d29c3a1310277c11f67a8c6f949e5430a37dcfb95d902c1b5b5379c389873b9dd17be3bdb088a4774a7401072f830fb9a08d93bfa50a03dd3292ea07928724ddb915d831917a338f6b0aecfbc3cf5352c4a1295d356890c41c34116d29eeb93779aab9d9d78e2613437740f6", false}, 26 } 27 28 func TestParseECPrivateKey(t *testing.T) { 29 for i, test := range ecKeyTests { 30 derBytes, _ := hex.DecodeString(test.derHex) 31 key, err := ParseECPrivateKey(derBytes) 32 if err != nil { 33 t.Fatalf("#%d: failed to decode EC private key: %s", i, err) 34 } 35 serialized, err := MarshalECPrivateKey(key) 36 if err != nil { 37 t.Fatalf("#%d: failed to encode EC private key: %s", i, err) 38 } 39 matches := bytes.Equal(serialized, derBytes) 40 if matches != test.shouldReserialize { 41 t.Fatalf("#%d: when serializing key: matches=%t, should match=%t: original %x, reserialized %x", i, matches, test.shouldReserialize, serialized, derBytes) 42 } 43 } 44 }