github.com/insolar/x-crypto@v0.0.0-20191031140942-75fab8a325f6/x509/sec1_test.go (about)

     1  // Copyright 2012 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  package x509
     6  
     7  import (
     8  	"bytes"
     9  	"encoding/hex"
    10  	"testing"
    11  )
    12  
    13  var ecKeyTests = []struct {
    14  	derHex            string
    15  	shouldReserialize bool
    16  }{
    17  	// Generated using:
    18  	//   openssl ecparam -genkey -name secp384r1 -outform PEM
    19  	{"3081a40201010430bdb9839c08ee793d1157886a7a758a3c8b2a17a4df48f17ace57c72c56b4723cf21dcda21d4e1ad57ff034f19fcfd98ea00706052b81040022a16403620004feea808b5ee2429cfcce13c32160e1c960990bd050bb0fdf7222f3decd0a55008e32a6aa3c9062051c4cba92a7a3b178b24567412d43cdd2f882fa5addddd726fe3e208d2c26d733a773a597abb749714df7256ead5105fa6e7b3650de236b50", true},
    20  	// This key was generated by GnuTLS and has illegal zero-padding of the
    21  	// private key. See https://golang.org/issues/13699.
    22  	{"3078020101042100f9f43a04b9bdc3ab01f53be6df80e7a7bc3eaf7b87fc24e630a4a0aa97633645a00a06082a8648ce3d030107a1440342000441a51bc318461b4c39a45048a16d4fc2a935b1ea7fe86e8c1fa219d6f2438f7c7fd62957d3442efb94b6a23eb0ea66dda663dc42f379cda6630b21b7888a5d3d", false},
    23  	// This was generated using an old version of OpenSSL and is missing a
    24  	// leading zero byte in the private key that should be present.
    25  	{"3081db0201010441607b4f985774ac21e633999794542e09312073480baa69550914d6d43d8414441e61b36650567901da714f94dffb3ce0e2575c31928a0997d51df5c440e983ca17a00706052b81040023a181890381860004001661557afedd7ac8d6b70e038e576558c626eb62edda36d29c3a1310277c11f67a8c6f949e5430a37dcfb95d902c1b5b5379c389873b9dd17be3bdb088a4774a7401072f830fb9a08d93bfa50a03dd3292ea07928724ddb915d831917a338f6b0aecfbc3cf5352c4a1295d356890c41c34116d29eeb93779aab9d9d78e2613437740f6", false},
    26  }
    27  
    28  func TestParseECPrivateKey(t *testing.T) {
    29  	for i, test := range ecKeyTests {
    30  		derBytes, _ := hex.DecodeString(test.derHex)
    31  		key, err := ParseECPrivateKey(derBytes)
    32  		if err != nil {
    33  			t.Fatalf("#%d: failed to decode EC private key: %s", i, err)
    34  		}
    35  		serialized, err := MarshalECPrivateKey(key)
    36  		if err != nil {
    37  			t.Fatalf("#%d: failed to encode EC private key: %s", i, err)
    38  		}
    39  		matches := bytes.Equal(serialized, derBytes)
    40  		if matches != test.shouldReserialize {
    41  			t.Fatalf("#%d: when serializing key: matches=%t, should match=%t: original %x, reserialized %x", i, matches, test.shouldReserialize, serialized, derBytes)
    42  		}
    43  	}
    44  }