diff options
| author | Ondřej Surý <ondrej@sury.org> | 2011-09-13 13:11:55 +0200 | 
|---|---|---|
| committer | Ondřej Surý <ondrej@sury.org> | 2011-09-13 13:11:55 +0200 | 
| commit | 80f18fc933cf3f3e829c5455a1023d69f7b86e52 (patch) | |
| tree | 4b825dc642cb6eb9a060e54bf8d69288fbee4904 /src/pkg/crypto/openpgp/write_test.go | |
| parent | 28592ee1ea1f5cdffcf85472f9de0285d928cf12 (diff) | |
| download | golang-80f18fc933cf3f3e829c5455a1023d69f7b86e52.tar.gz | |
Imported Upstream version 60
Diffstat (limited to 'src/pkg/crypto/openpgp/write_test.go')
| -rw-r--r-- | src/pkg/crypto/openpgp/write_test.go | 233 | 
1 files changed, 0 insertions, 233 deletions
| diff --git a/src/pkg/crypto/openpgp/write_test.go b/src/pkg/crypto/openpgp/write_test.go deleted file mode 100644 index c542dfa45..000000000 --- a/src/pkg/crypto/openpgp/write_test.go +++ /dev/null @@ -1,233 +0,0 @@ -// Copyright 2011 The Go Authors. All rights reserved. -// Use of this source code is governed by a BSD-style -// license that can be found in the LICENSE file. - -package openpgp - -import ( -	"bytes" -	"crypto/rand" -	"os" -	"io" -	"io/ioutil" -	"testing" -	"time" -) - -func TestSignDetached(t *testing.T) { -	kring, _ := ReadKeyRing(readerFromHex(testKeys1And2PrivateHex)) -	out := bytes.NewBuffer(nil) -	message := bytes.NewBufferString(signedInput) -	err := DetachSign(out, kring[0], message) -	if err != nil { -		t.Error(err) -	} - -	testDetachedSignature(t, kring, out, signedInput, "check", testKey1KeyId) -} - -func TestSignTextDetached(t *testing.T) { -	kring, _ := ReadKeyRing(readerFromHex(testKeys1And2PrivateHex)) -	out := bytes.NewBuffer(nil) -	message := bytes.NewBufferString(signedInput) -	err := DetachSignText(out, kring[0], message) -	if err != nil { -		t.Error(err) -	} - -	testDetachedSignature(t, kring, out, signedInput, "check", testKey1KeyId) -} - -func TestSignDetachedDSA(t *testing.T) { -	kring, _ := ReadKeyRing(readerFromHex(dsaTestKeyPrivateHex)) -	out := bytes.NewBuffer(nil) -	message := bytes.NewBufferString(signedInput) -	err := DetachSign(out, kring[0], message) -	if err != nil { -		t.Error(err) -	} - -	testDetachedSignature(t, kring, out, signedInput, "check", testKey3KeyId) -} - -func TestNewEntity(t *testing.T) { -	if testing.Short() { -		return -	} - -	e, err := NewEntity(rand.Reader, time.Seconds(), "Test User", "test", "test@example.com") -	if err != nil { -		t.Errorf("failed to create entity: %s", err) -		return -	} - -	w := bytes.NewBuffer(nil) -	if err := e.SerializePrivate(w); err != nil { -		t.Errorf("failed to serialize entity: %s", err) -		return -	} -	serialized := w.Bytes() - -	el, err := ReadKeyRing(w) -	if err != nil { -		t.Errorf("failed to reparse entity: %s", err) -		return -	} - -	if len(el) != 1 { -		t.Errorf("wrong number of entities found, got %d, want 1", len(el)) -	} - -	w = bytes.NewBuffer(nil) -	if err := e.SerializePrivate(w); err != nil { -		t.Errorf("failed to serialize entity second time: %s", err) -		return -	} - -	if !bytes.Equal(w.Bytes(), serialized) { -		t.Errorf("results differed") -	} -} - -func TestSymmetricEncryption(t *testing.T) { -	buf := new(bytes.Buffer) -	plaintext, err := SymmetricallyEncrypt(buf, []byte("testing"), nil) -	if err != nil { -		t.Errorf("error writing headers: %s", err) -		return -	} -	message := []byte("hello world\n") -	_, err = plaintext.Write(message) -	if err != nil { -		t.Errorf("error writing to plaintext writer: %s", err) -	} -	err = plaintext.Close() -	if err != nil { -		t.Errorf("error closing plaintext writer: %s", err) -	} - -	md, err := ReadMessage(buf, nil, func(keys []Key, symmetric bool) ([]byte, os.Error) { -		return []byte("testing"), nil -	}) -	if err != nil { -		t.Errorf("error rereading message: %s", err) -	} -	messageBuf := bytes.NewBuffer(nil) -	_, err = io.Copy(messageBuf, md.UnverifiedBody) -	if err != nil { -		t.Errorf("error rereading message: %s", err) -	} -	if !bytes.Equal(message, messageBuf.Bytes()) { -		t.Errorf("recovered message incorrect got '%s', want '%s'", messageBuf.Bytes(), message) -	} -} - -var testEncryptionTests = []struct { -	keyRingHex string -	isSigned   bool -}{ -	{ -		testKeys1And2PrivateHex, -		false, -	}, -	{ -		testKeys1And2PrivateHex, -		true, -	}, -	{ -		dsaElGamalTestKeysHex, -		false, -	}, -	{ -		dsaElGamalTestKeysHex, -		true, -	}, -} - -func TestEncryption(t *testing.T) { -	for i, test := range testEncryptionTests { -		kring, _ := ReadKeyRing(readerFromHex(test.keyRingHex)) - -		passphrase := []byte("passphrase") -		for _, entity := range kring { -			if entity.PrivateKey != nil && entity.PrivateKey.Encrypted { -				err := entity.PrivateKey.Decrypt(passphrase) -				if err != nil { -					t.Errorf("#%d: failed to decrypt key", i) -				} -			} -			for _, subkey := range entity.Subkeys { -				if subkey.PrivateKey != nil && subkey.PrivateKey.Encrypted { -					err := subkey.PrivateKey.Decrypt(passphrase) -					if err != nil { -						t.Errorf("#%d: failed to decrypt subkey", i) -					} -				} -			} -		} - -		var signed *Entity -		if test.isSigned { -			signed = kring[0] -		} - -		buf := new(bytes.Buffer) -		w, err := Encrypt(buf, kring[:1], signed, nil /* no hints */ ) -		if err != nil { -			t.Errorf("#%d: error in Encrypt: %s", i, err) -			continue -		} - -		const message = "testing" -		_, err = w.Write([]byte(message)) -		if err != nil { -			t.Errorf("#%d: error writing plaintext: %s", i, err) -			continue -		} -		err = w.Close() -		if err != nil { -			t.Errorf("#%d: error closing WriteCloser: %s", i, err) -			continue -		} - -		md, err := ReadMessage(buf, kring, nil /* no prompt */ ) -		if err != nil { -			t.Errorf("#%d: error reading message: %s", i, err) -			continue -		} - -		if test.isSigned { -			expectedKeyId := kring[0].signingKey().PublicKey.KeyId -			if md.SignedByKeyId != expectedKeyId { -				t.Errorf("#%d: message signed by wrong key id, got: %d, want: %d", i, *md.SignedBy, expectedKeyId) -			} -			if md.SignedBy == nil { -				t.Errorf("#%d: failed to find the signing Entity", i) -			} -		} - -		plaintext, err := ioutil.ReadAll(md.UnverifiedBody) -		if err != nil { -			t.Errorf("#%d: error reading encrypted contents: %s", i, err) -			continue -		} - -		expectedKeyId := kring[0].encryptionKey().PublicKey.KeyId -		if len(md.EncryptedToKeyIds) != 1 || md.EncryptedToKeyIds[0] != expectedKeyId { -			t.Errorf("#%d: expected message to be encrypted to %v, but got %#v", i, expectedKeyId, md.EncryptedToKeyIds) -		} - -		if string(plaintext) != message { -			t.Errorf("#%d: got: %s, want: %s", i, string(plaintext), message) -		} - -		if test.isSigned { -			if md.SignatureError != nil { -				t.Errorf("#%d: signature error: %s", i, err) -			} -			if md.Signature == nil { -				t.Error("signature missing") -			} -		} -	} -} | 
