github.com/maenmax/kairep@v0.0.0-20210218001208-55bf3df36788/src/golang.org/x/crypto/openpgp/packet/private_key_test.go (about)

     1  // Copyright 2011 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  package packet
     6  
     7  import (
     8  	"bytes"
     9  	"crypto"
    10  	"crypto/ecdsa"
    11  	"crypto/elliptic"
    12  	"crypto/rand"
    13  	"hash"
    14  	"testing"
    15  	"time"
    16  )
    17  
    18  var privateKeyTests = []struct {
    19  	privateKeyHex string
    20  	creationTime  time.Time
    21  }{
    22  	{
    23  		privKeyRSAHex,
    24  		time.Unix(0x4cc349a8, 0),
    25  	},
    26  	{
    27  		privKeyElGamalHex,
    28  		time.Unix(0x4df9ee1a, 0),
    29  	},
    30  }
    31  
    32  func TestPrivateKeyRead(t *testing.T) {
    33  	for i, test := range privateKeyTests {
    34  		packet, err := Read(readerFromHex(test.privateKeyHex))
    35  		if err != nil {
    36  			t.Errorf("#%d: failed to parse: %s", i, err)
    37  			continue
    38  		}
    39  
    40  		privKey := packet.(*PrivateKey)
    41  
    42  		if !privKey.Encrypted {
    43  			t.Errorf("#%d: private key isn't encrypted", i)
    44  			continue
    45  		}
    46  
    47  		err = privKey.Decrypt([]byte("wrong password"))
    48  		if err == nil {
    49  			t.Errorf("#%d: decrypted with incorrect key", i)
    50  			continue
    51  		}
    52  
    53  		err = privKey.Decrypt([]byte("testing"))
    54  		if err != nil {
    55  			t.Errorf("#%d: failed to decrypt: %s", i, err)
    56  			continue
    57  		}
    58  
    59  		if !privKey.CreationTime.Equal(test.creationTime) || privKey.Encrypted {
    60  			t.Errorf("#%d: bad result, got: %#v", i, privKey)
    61  		}
    62  	}
    63  }
    64  
    65  func populateHash(hashFunc crypto.Hash, msg []byte) (hash.Hash, error) {
    66  	h := hashFunc.New()
    67  	if _, err := h.Write(msg); err != nil {
    68  		return nil, err
    69  	}
    70  	return h, nil
    71  }
    72  
    73  func TestECDSAPrivateKey(t *testing.T) {
    74  	ecdsaPriv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
    75  	if err != nil {
    76  		t.Fatal(err)
    77  	}
    78  
    79  	var buf bytes.Buffer
    80  	if err := NewECDSAPrivateKey(time.Now(), ecdsaPriv).Serialize(&buf); err != nil {
    81  		t.Fatal(err)
    82  	}
    83  
    84  	p, err := Read(&buf)
    85  	if err != nil {
    86  		t.Fatal(err)
    87  	}
    88  
    89  	priv, ok := p.(*PrivateKey)
    90  	if !ok {
    91  		t.Fatal("didn't parse private key")
    92  	}
    93  
    94  	sig := &Signature{
    95  		PubKeyAlgo: PubKeyAlgoECDSA,
    96  		Hash:       crypto.SHA256,
    97  	}
    98  	msg := []byte("Hello World!")
    99  
   100  	h, err := populateHash(sig.Hash, msg)
   101  	if err != nil {
   102  		t.Fatal(err)
   103  	}
   104  	if err := sig.Sign(h, priv, nil); err != nil {
   105  		t.Fatal(err)
   106  	}
   107  
   108  	if h, err = populateHash(sig.Hash, msg); err != nil {
   109  		t.Fatal(err)
   110  	}
   111  	if err := priv.VerifySignature(h, sig); err != nil {
   112  		t.Fatal(err)
   113  	}
   114  }
   115  
   116  func TestIssue11505(t *testing.T) {
   117  	// parsing a rsa private key with p or q == 1 used to panic due to a divide by zero
   118  	_, _ = Read(readerFromHex("9c3004303030300100000011303030000000000000010130303030303030303030303030303030303030303030303030303030303030303030303030303030303030"))
   119  }
   120  
   121  // Generated with `gpg --export-secret-keys "Test Key 2"`
   122  const privKeyRSAHex = "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"
   123  
   124  // Generated by `gpg --export-secret-keys` followed by a manual extraction of
   125  // the ElGamal subkey from the packets.
   126  const privKeyElGamalHex = "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"