Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code | Sign in
(55)

Side by Side Diff: src/crypto/x509/x509_test.go

Issue 145910043: code review 145910043: x509: implement crypto.Signer (Closed)
Patch Set: diff -r 6b163ec2122a172030284060788f535ab3b9d0e3 https://code.google.com/p/go Created 9 years, 6 months ago
Left:
Right:
Use n/p to move between diff chunks; N/P to move between comments. Please Sign in to add in-line comments.
Jump to:
View unified diff | Download patch
« src/crypto/x509/x509.go ('K') | « src/crypto/x509/x509.go ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2009 The Go Authors. All rights reserved. 1 // Copyright 2009 The Go Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style 2 // Use of this source code is governed by a BSD-style
3 // license that can be found in the LICENSE file. 3 // license that can be found in the LICENSE file.
4 4
5 package x509 5 package x509
6 6
7 import ( 7 import (
8 "bytes" 8 "bytes"
9 "crypto/dsa" 9 "crypto/dsa"
10 "crypto/ecdsa" 10 "crypto/ecdsa"
(...skipping 292 matching lines...) Expand 10 before | Expand all | Expand 10 after
303 t.Fatalf("Failed to generate ECDSA key: %s", err) 303 t.Fatalf("Failed to generate ECDSA key: %s", err)
304 } 304 }
305 305
306 tests := []struct { 306 tests := []struct {
307 name string 307 name string
308 pub, priv interface{} 308 pub, priv interface{}
309 checkSig bool 309 checkSig bool
310 sigAlgo SignatureAlgorithm 310 sigAlgo SignatureAlgorithm
311 }{ 311 }{
312 {"RSA/RSA", &rsaPriv.PublicKey, rsaPriv, true, SHA1WithRSA}, 312 {"RSA/RSA", &rsaPriv.PublicKey, rsaPriv, true, SHA1WithRSA},
313 {"RSA/ECDSA", &rsaPriv.PublicKey, ecdsaPriv, false, ECDSAWithSHA 384},
agl 2014/09/18 17:33:23 These lines can't be removed and there shouldn't b
Paul van Brouwershaven 2014/09/18 20:08:33 I'm using the public key for signingParamsForPubli
314 {"ECDSA/RSA", &ecdsaPriv.PublicKey, rsaPriv, false, SHA256WithRS A},
315 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWith SHA1}, 313 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWith SHA1},
316 } 314 }
317 315
318 testExtKeyUsage := []ExtKeyUsage{ExtKeyUsageClientAuth, ExtKeyUsageServe rAuth} 316 testExtKeyUsage := []ExtKeyUsage{ExtKeyUsageClientAuth, ExtKeyUsageServe rAuth}
319 testUnknownExtKeyUsage := []asn1.ObjectIdentifier{[]int{1, 2, 3}, []int{ 2, 59, 1}} 317 testUnknownExtKeyUsage := []asn1.ObjectIdentifier{[]int{1, 2, 3}, []int{ 2, 59, 1}}
320 extraExtensionData := []byte("extra extension") 318 extraExtensionData := []byte("extra extension")
321 319
322 for _, test := range tests { 320 for _, test := range tests {
323 commonName := "test.example.com" 321 commonName := "test.example.com"
324 template := Certificate{ 322 template := Certificate{
(...skipping 619 matching lines...) Expand 10 before | Expand all | Expand 10 after
944 942
945 // This CSR was generated with OpenSSL: 943 // This CSR was generated with OpenSSL:
946 // openssl req -out CSR.csr -new -newkey rsa:2048 -nodes -keyout privateKey.key -config openssl.cnf 944 // openssl req -out CSR.csr -new -newkey rsa:2048 -nodes -keyout privateKey.key -config openssl.cnf
947 // 945 //
948 // The openssl.cnf needs to include this section: 946 // The openssl.cnf needs to include this section:
949 // [ v3_req ] 947 // [ v3_req ]
950 // basicConstraints = CA:FALSE 948 // basicConstraints = CA:FALSE
951 // keyUsage = nonRepudiation, digitalSignature, keyEncipherment 949 // keyUsage = nonRepudiation, digitalSignature, keyEncipherment
952 // subjectAltName = email:gopher@golang.org,DNS:test.example.com 950 // subjectAltName = email:gopher@golang.org,DNS:test.example.com
953 const csrBase64 = "MIIC4zCCAcsCAQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3Rhd GUxITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDCCASIwDQYJKoZIhvcNAQEBBQADggEPA DCCAQoCggEBAOY+MVedRg2JEnyeLcSzcsMv2VcsTfkB5+Etd6hihAh6MrGezNyASMMKuQN6YhCX1icQD iQtGsDLTtheNnSXK06tAhHjAP/hGlszRJp+5+rP2M58fDBAkUBEhskbCUWwpY14jFtVuGNJ8vF8h8Iec zdolvQhX9lVai9G0EUXJMliMKdjA899H0mRs9PzHyidyrXFNiZlQXfD8Kg7gETn2Ny965iyI6ujAIYSC vam6TnxRHYH2MBKyVGvsYGbPYUQJCsgdgyajEg6ekihvQY3SzO1HSAlZAd7d1QYO4VeWJ2mY6Wu3Jpmh +AmG19S9CcHqGjd0bhuAX9cpPOKgnEmqn0CAwEAAaBZMFcGCSqGSIb3DQEJDjFKMEgwCQYDVR0TBAIwA DALBgNVHQ8EBAMCBeAwLgYDVR0RBCcwJYERZ29waGVyQGdvbGFuZy5vcmeCEHRlc3QuZXhhbXBsZS5jb 20wDQYJKoZIhvcNAQEFBQADggEBAC9+QpKfdabxwCWwf4IEe1cKjdXLS1ScSuw27a3kZzQiPV78WJMa6 dB8dqhdH5BRwGZ/qsgLrO6ZHlNeIv2Ib41Ccq71ecHW/nXc94A1BzJ/bVdI9LZcmTUvR1/m1jCpN7UqQ 0ml1u9VihK7Pe762hEYxuWDQzYEU0l15S/bXmqeq3eF1A59XT/2jwe5+NV0Wwf4UQlkTXsAQMsJ+KzrQ afd8Qv2A49o048uRvmjeJDrXLawGVianZ7D5A6Fpd1rZh6XcjqBpmgLw41DRQWENOdzhy+HyphKRv1Ml Y8OLkNqpGMhu8DdgJVGoT16DGiickoEa7Z3UCPVNgdTkT9jq7U=" 951 const csrBase64 = "MIIC4zCCAcsCAQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3Rhd GUxITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDCCASIwDQYJKoZIhvcNAQEBBQADggEPA DCCAQoCggEBAOY+MVedRg2JEnyeLcSzcsMv2VcsTfkB5+Etd6hihAh6MrGezNyASMMKuQN6YhCX1icQD iQtGsDLTtheNnSXK06tAhHjAP/hGlszRJp+5+rP2M58fDBAkUBEhskbCUWwpY14jFtVuGNJ8vF8h8Iec zdolvQhX9lVai9G0EUXJMliMKdjA899H0mRs9PzHyidyrXFNiZlQXfD8Kg7gETn2Ny965iyI6ujAIYSC vam6TnxRHYH2MBKyVGvsYGbPYUQJCsgdgyajEg6ekihvQY3SzO1HSAlZAd7d1QYO4VeWJ2mY6Wu3Jpmh +AmG19S9CcHqGjd0bhuAX9cpPOKgnEmqn0CAwEAAaBZMFcGCSqGSIb3DQEJDjFKMEgwCQYDVR0TBAIwA DALBgNVHQ8EBAMCBeAwLgYDVR0RBCcwJYERZ29waGVyQGdvbGFuZy5vcmeCEHRlc3QuZXhhbXBsZS5jb 20wDQYJKoZIhvcNAQEFBQADggEBAC9+QpKfdabxwCWwf4IEe1cKjdXLS1ScSuw27a3kZzQiPV78WJMa6 dB8dqhdH5BRwGZ/qsgLrO6ZHlNeIv2Ib41Ccq71ecHW/nXc94A1BzJ/bVdI9LZcmTUvR1/m1jCpN7UqQ 0ml1u9VihK7Pe762hEYxuWDQzYEU0l15S/bXmqeq3eF1A59XT/2jwe5+NV0Wwf4UQlkTXsAQMsJ+KzrQ afd8Qv2A49o048uRvmjeJDrXLawGVianZ7D5A6Fpd1rZh6XcjqBpmgLw41DRQWENOdzhy+HyphKRv1Ml Y8OLkNqpGMhu8DdgJVGoT16DGiickoEa7Z3UCPVNgdTkT9jq7U="
OLDNEW
« src/crypto/x509/x509.go ('K') | « src/crypto/x509/x509.go ('k') | no next file » | no next file with comments »

Powered by Google App Engine
RSS Feeds Recent Issues | This issue
This is Rietveld f62528b