aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorcui fliter <imcusg@gmail.com>2022-09-16 09:30:45 +0000
committerGopher Robot <gobot@golang.org>2022-09-19 17:36:07 +0000
commit35f4265a4bc0c3c52524765c293aced1e60f06b7 (patch)
tree30dbafb6715acd58076103adda1b088328bb1484
parentc86fa9a7ed909e2f2a8ab8298254fca727aba16a (diff)
downloadgo-x-crypto-35f4265a4bc0c3c52524765c293aced1e60f06b7.tar.xz
all: replace io/ioutil with io and os package
For golang/go#45557 Change-Id: I447530cc66896aef7a8d528ccb8d095b80e3cf47 GitHub-Last-Rev: 5f385ff46487ac318bd1147cdbbd26bb0ffd0426 GitHub-Pull-Request: golang/crypto#230 Reviewed-on: https://go-review.googlesource.com/c/crypto/+/430797 Auto-Submit: Ian Lance Taylor <iant@google.com> Reviewed-by: Ian Lance Taylor <iant@google.com> Reviewed-by: Meng Zhuo <mzh@golangcn.org> Run-TryBot: Ian Lance Taylor <iant@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Cherry Mui <cherryyz@google.com>
-rw-r--r--acme/autocert/autocert_test.go6
-rw-r--r--acme/autocert/cache.go5
-rw-r--r--acme/autocert/cache_test.go3
-rw-r--r--acme/http.go4
-rw-r--r--acme/http_test.go4
-rw-r--r--acme/rfc8555.go5
-rw-r--r--acme/rfc8555_test.go14
-rw-r--r--internal/wycheproof/wycheproof_test.go3
-rw-r--r--openpgp/armor/armor_test.go4
-rw-r--r--openpgp/packet/compressed_test.go3
-rw-r--r--openpgp/packet/opaque.go3
-rw-r--r--openpgp/packet/packet_test.go5
-rw-r--r--openpgp/packet/private_key.go3
-rw-r--r--openpgp/packet/signature_v3_test.go3
-rw-r--r--openpgp/packet/symmetric_key_encrypted_test.go3
-rw-r--r--openpgp/packet/symmetrically_encrypted.go2
-rw-r--r--openpgp/packet/symmetrically_encrypted_test.go5
-rw-r--r--openpgp/packet/userattribute.go3
-rw-r--r--openpgp/packet/userid.go3
-rw-r--r--openpgp/read_test.go11
-rw-r--r--openpgp/write.go2
-rw-r--r--openpgp/write_test.go5
-rw-r--r--ssh/cipher.go3
-rw-r--r--ssh/example_test.go7
-rw-r--r--ssh/mux_test.go7
-rw-r--r--ssh/session.go7
-rw-r--r--ssh/session_test.go7
-rw-r--r--ssh/test/dial_unix_test.go3
-rw-r--r--ssh/test/forward_unix_test.go3
-rw-r--r--ssh/test/test_unix_test.go7
30 files changed, 60 insertions, 83 deletions
diff --git a/acme/autocert/autocert_test.go b/acme/autocert/autocert_test.go
index ab7504a..59f6e0e 100644
--- a/acme/autocert/autocert_test.go
+++ b/acme/autocert/autocert_test.go
@@ -17,7 +17,7 @@ import (
"crypto/x509/pkix"
"encoding/asn1"
"fmt"
- "io/ioutil"
+ "io"
"math/big"
"net/http"
"net/http/httptest"
@@ -941,7 +941,7 @@ func TestEndToEndALPN(t *testing.T) {
t.Fatal(err)
}
defer res.Body.Close()
- b, err := ioutil.ReadAll(res.Body)
+ b, err := io.ReadAll(res.Body)
if err != nil {
t.Fatal(err)
}
@@ -995,7 +995,7 @@ func TestEndToEndHTTP(t *testing.T) {
t.Fatal(err)
}
defer res.Body.Close()
- b, err := ioutil.ReadAll(res.Body)
+ b, err := io.ReadAll(res.Body)
if err != nil {
t.Fatal(err)
}
diff --git a/acme/autocert/cache.go b/acme/autocert/cache.go
index 3156a08..758ab12 100644
--- a/acme/autocert/cache.go
+++ b/acme/autocert/cache.go
@@ -7,7 +7,6 @@ package autocert
import (
"context"
"errors"
- "io/ioutil"
"os"
"path/filepath"
)
@@ -48,7 +47,7 @@ func (d DirCache) Get(ctx context.Context, name string) ([]byte, error) {
done = make(chan struct{})
)
go func() {
- data, err = ioutil.ReadFile(name)
+ data, err = os.ReadFile(name)
close(done)
}()
select {
@@ -119,7 +118,7 @@ func (d DirCache) Delete(ctx context.Context, name string) error {
// writeTempFile writes b to a temporary file, closes the file and returns its path.
func (d DirCache) writeTempFile(prefix string, b []byte) (name string, reterr error) {
// TempFile uses 0600 permissions
- f, err := ioutil.TempFile(string(d), prefix)
+ f, err := os.CreateTemp(string(d), prefix)
if err != nil {
return "", err
}
diff --git a/acme/autocert/cache_test.go b/acme/autocert/cache_test.go
index 4d0b162..582e6b0 100644
--- a/acme/autocert/cache_test.go
+++ b/acme/autocert/cache_test.go
@@ -6,7 +6,6 @@ package autocert
import (
"context"
- "io/ioutil"
"os"
"path/filepath"
"reflect"
@@ -17,7 +16,7 @@ import (
var _ Cache = DirCache("/")
func TestDirCache(t *testing.T) {
- dir, err := ioutil.TempDir("", "autocert")
+ dir, err := os.MkdirTemp("", "autocert")
if err != nil {
t.Fatal(err)
}
diff --git a/acme/http.go b/acme/http.go
index 2b4c1a1..2617b00 100644
--- a/acme/http.go
+++ b/acme/http.go
@@ -12,7 +12,7 @@ import (
"encoding/json"
"errors"
"fmt"
- "io/ioutil"
+ "io"
"math/big"
"net/http"
"strconv"
@@ -310,7 +310,7 @@ func isRetriable(code int) bool {
func responseError(resp *http.Response) error {
// don't care if ReadAll returns an error:
// json.Unmarshal will fail in that case anyway
- b, _ := ioutil.ReadAll(resp.Body)
+ b, _ := io.ReadAll(resp.Body)
e := &wireError{Status: resp.StatusCode}
if err := json.Unmarshal(b, e); err != nil {
// this is not a regular error response:
diff --git a/acme/http_test.go b/acme/http_test.go
index f35e04a..d124e4e 100644
--- a/acme/http_test.go
+++ b/acme/http_test.go
@@ -7,7 +7,7 @@ package acme
import (
"context"
"fmt"
- "io/ioutil"
+ "io"
"net/http"
"net/http/httptest"
"reflect"
@@ -54,7 +54,7 @@ func TestErrorResponse(t *testing.T) {
res := &http.Response{
StatusCode: 400,
Status: "400 Bad Request",
- Body: ioutil.NopCloser(strings.NewReader(s)),
+ Body: io.NopCloser(strings.NewReader(s)),
Header: http.Header{"X-Foo": {"bar"}},
}
err := responseError(res)
diff --git a/acme/rfc8555.go b/acme/rfc8555.go
index 940e70b..ee24dfd 100644
--- a/acme/rfc8555.go
+++ b/acme/rfc8555.go
@@ -13,7 +13,6 @@ import (
"errors"
"fmt"
"io"
- "io/ioutil"
"net/http"
"time"
)
@@ -390,7 +389,7 @@ func (c *Client) fetchCertRFC(ctx context.Context, url string, bundle bool) ([][
// Get all the bytes up to a sane maximum.
// Account very roughly for base64 overhead.
const max = maxCertChainSize + maxCertChainSize/33
- b, err := ioutil.ReadAll(io.LimitReader(res.Body, max+1))
+ b, err := io.ReadAll(io.LimitReader(res.Body, max+1))
if err != nil {
return nil, fmt.Errorf("acme: fetch cert response stream: %v", err)
}
@@ -469,7 +468,7 @@ func (c *Client) ListCertAlternates(ctx context.Context, url string) ([]string,
// We don't need the body but we need to discard it so we don't end up
// preventing keep-alive
- if _, err := io.Copy(ioutil.Discard, res.Body); err != nil {
+ if _, err := io.Copy(io.Discard, res.Body); err != nil {
return nil, fmt.Errorf("acme: cert alternates response stream: %v", err)
}
alts := linkHeader(res.Header, "alternate")
diff --git a/acme/rfc8555_test.go b/acme/rfc8555_test.go
index 6ea77df..4ab98f6 100644
--- a/acme/rfc8555_test.go
+++ b/acme/rfc8555_test.go
@@ -17,7 +17,7 @@ import (
"encoding/pem"
"errors"
"fmt"
- "io/ioutil"
+ "io"
"math/big"
"net/http"
"net/http/httptest"
@@ -148,7 +148,7 @@ func TestRFC_postKID(t *testing.T) {
w.Header().Set("Location", "/account-1")
w.Write([]byte(`{"status":"valid"}`))
case "/post":
- b, _ := ioutil.ReadAll(r.Body) // check err later in decodeJWSxxx
+ b, _ := io.ReadAll(r.Body) // check err later in decodeJWSxxx
head, err := decodeJWSHead(bytes.NewReader(b))
if err != nil {
t.Errorf("decodeJWSHead: %v", err)
@@ -194,7 +194,7 @@ func TestRFC_postKID(t *testing.T) {
t.Fatal(err)
}
defer res.Body.Close()
- b, _ := ioutil.ReadAll(res.Body) // don't care about err - just checking b
+ b, _ := io.ReadAll(res.Body) // don't care about err - just checking b
if string(b) != "pong" {
t.Errorf("res.Body = %q; want pong", b)
}
@@ -297,7 +297,7 @@ func TestRFC_Register(t *testing.T) {
"orders": %q
}`, email, s.url("/accounts/1/orders"))
- b, _ := ioutil.ReadAll(r.Body) // check err later in decodeJWSxxx
+ b, _ := io.ReadAll(r.Body) // check err later in decodeJWSxxx
head, err := decodeJWSHead(bytes.NewReader(b))
if err != nil {
t.Errorf("decodeJWSHead: %v", err)
@@ -528,7 +528,7 @@ func TestRFC_UpdateReg(t *testing.T) {
w.WriteHeader(http.StatusOK)
w.Write([]byte(`{"status": "valid"}`))
- b, _ := ioutil.ReadAll(r.Body) // check err later in decodeJWSxxx
+ b, _ := io.ReadAll(r.Body) // check err later in decodeJWSxxx
head, err := decodeJWSHead(bytes.NewReader(b))
if err != nil {
t.Errorf("decodeJWSHead: %v", err)
@@ -668,7 +668,7 @@ func TestRFC_DeactivateReg(t *testing.T) {
Orders: s.url("/accounts/1/orders"),
})
- b, _ := ioutil.ReadAll(r.Body) // check err later in decodeJWSxxx
+ b, _ := io.ReadAll(r.Body) // check err later in decodeJWSxxx
head, err := decodeJWSHead(bytes.NewReader(b))
if err != nil {
t.Errorf("decodeJWSHead: %v", err)
@@ -700,7 +700,7 @@ func TestRFC_DeactivateReg(t *testing.T) {
})
}
var req account
- b, _ := ioutil.ReadAll(r.Body) // check err later in decodeJWSxxx
+ b, _ := io.ReadAll(r.Body) // check err later in decodeJWSxxx
head, err := decodeJWSHead(bytes.NewReader(b))
if err != nil {
t.Errorf("decodeJWSHead: %v", err)
diff --git a/internal/wycheproof/wycheproof_test.go b/internal/wycheproof/wycheproof_test.go
index 69c6117..fcae97c 100644
--- a/internal/wycheproof/wycheproof_test.go
+++ b/internal/wycheproof/wycheproof_test.go
@@ -12,7 +12,6 @@ import (
"encoding/hex"
"encoding/json"
"fmt"
- "io/ioutil"
"log"
"os"
"os/exec"
@@ -62,7 +61,7 @@ func TestMain(m *testing.M) {
}
func readTestVector(t *testing.T, f string, dest interface{}) {
- b, err := ioutil.ReadFile(filepath.Join(wycheproofTestVectorsDir, f))
+ b, err := os.ReadFile(filepath.Join(wycheproofTestVectorsDir, f))
if err != nil {
t.Fatalf("failed to read json file: %v", err)
}
diff --git a/openpgp/armor/armor_test.go b/openpgp/armor/armor_test.go
index 9334e94..c05af95 100644
--- a/openpgp/armor/armor_test.go
+++ b/openpgp/armor/armor_test.go
@@ -7,7 +7,7 @@ package armor
import (
"bytes"
"hash/adler32"
- "io/ioutil"
+ "io"
"testing"
)
@@ -29,7 +29,7 @@ func TestDecodeEncode(t *testing.T) {
t.Errorf("result.Header: got:%#v", result.Header)
}
- contents, err := ioutil.ReadAll(result.Body)
+ contents, err := io.ReadAll(result.Body)
if err != nil {
t.Error(err)
}
diff --git a/openpgp/packet/compressed_test.go b/openpgp/packet/compressed_test.go
index cb2d70b..37fcc0b 100644
--- a/openpgp/packet/compressed_test.go
+++ b/openpgp/packet/compressed_test.go
@@ -8,7 +8,6 @@ import (
"bytes"
"encoding/hex"
"io"
- "io/ioutil"
"testing"
)
@@ -25,7 +24,7 @@ func TestCompressed(t *testing.T) {
return
}
- contents, err := ioutil.ReadAll(c.Body)
+ contents, err := io.ReadAll(c.Body)
if err != nil && err != io.EOF {
t.Error(err)
return
diff --git a/openpgp/packet/opaque.go b/openpgp/packet/opaque.go
index 456d807..3984477 100644
--- a/openpgp/packet/opaque.go
+++ b/openpgp/packet/opaque.go
@@ -7,7 +7,6 @@ package packet
import (
"bytes"
"io"
- "io/ioutil"
"golang.org/x/crypto/openpgp/errors"
)
@@ -26,7 +25,7 @@ type OpaquePacket struct {
}
func (op *OpaquePacket) parse(r io.Reader) (err error) {
- op.Contents, err = ioutil.ReadAll(r)
+ op.Contents, err = io.ReadAll(r)
return
}
diff --git a/openpgp/packet/packet_test.go b/openpgp/packet/packet_test.go
index 63a8387..c8fc4e5 100644
--- a/openpgp/packet/packet_test.go
+++ b/openpgp/packet/packet_test.go
@@ -10,7 +10,6 @@ import (
"fmt"
"golang.org/x/crypto/openpgp/errors"
"io"
- "io/ioutil"
"testing"
)
@@ -100,7 +99,7 @@ var partialLengthReaderTests = []struct {
func TestPartialLengthReader(t *testing.T) {
for i, test := range partialLengthReaderTests {
r := &partialLengthReader{readerFromHex(test.hexInput), 0, true}
- out, err := ioutil.ReadAll(r)
+ out, err := io.ReadAll(r)
if test.err != nil {
if err != test.err {
t.Errorf("%d: expected different error got:%s want:%s", i, err, test.err)
@@ -172,7 +171,7 @@ func TestReadHeader(t *testing.T) {
continue
}
- body, err := ioutil.ReadAll(contents)
+ body, err := io.ReadAll(contents)
if err != nil {
if !test.unexpectedEOF || err != io.ErrUnexpectedEOF {
t.Errorf("%d: unexpected error from contents: %s", i, err)
diff --git a/openpgp/packet/private_key.go b/openpgp/packet/private_key.go
index 81abb7c..192aac3 100644
--- a/openpgp/packet/private_key.go
+++ b/openpgp/packet/private_key.go
@@ -13,7 +13,6 @@ import (
"crypto/rsa"
"crypto/sha1"
"io"
- "io/ioutil"
"math/big"
"strconv"
"time"
@@ -133,7 +132,7 @@ func (pk *PrivateKey) parse(r io.Reader) (err error) {
}
}
- pk.encryptedData, err = ioutil.ReadAll(r)
+ pk.encryptedData, err = io.ReadAll(r)
if err != nil {
return
}
diff --git a/openpgp/packet/signature_v3_test.go b/openpgp/packet/signature_v3_test.go
index 73b46ae..abb2d8c 100644
--- a/openpgp/packet/signature_v3_test.go
+++ b/openpgp/packet/signature_v3_test.go
@@ -9,7 +9,6 @@ import (
"crypto"
"encoding/hex"
"io"
- "io/ioutil"
"testing"
"golang.org/x/crypto/openpgp/armor"
@@ -45,7 +44,7 @@ func TestSignatureV3Reserialize(t *testing.T) {
t.Errorf("error reserializing: %s", err)
return
}
- expected, err := ioutil.ReadAll(v3KeyReader(t))
+ expected, err := io.ReadAll(v3KeyReader(t))
if err != nil {
t.Error(err)
return
diff --git a/openpgp/packet/symmetric_key_encrypted_test.go b/openpgp/packet/symmetric_key_encrypted_test.go
index e1d52c1..5471d77 100644
--- a/openpgp/packet/symmetric_key_encrypted_test.go
+++ b/openpgp/packet/symmetric_key_encrypted_test.go
@@ -8,7 +8,6 @@ import (
"bytes"
"encoding/hex"
"io"
- "io/ioutil"
"testing"
)
@@ -46,7 +45,7 @@ func TestSymmetricKeyEncrypted(t *testing.T) {
return
}
- contents, err := ioutil.ReadAll(r)
+ contents, err := io.ReadAll(r)
if err != nil && err != io.EOF {
t.Error(err)
return
diff --git a/openpgp/packet/symmetrically_encrypted.go b/openpgp/packet/symmetrically_encrypted.go
index 6126030..1a1a629 100644
--- a/openpgp/packet/symmetrically_encrypted.go
+++ b/openpgp/packet/symmetrically_encrypted.go
@@ -236,7 +236,7 @@ func (w *seMDCWriter) Close() (err error) {
return w.w.Close()
}
-// noOpCloser is like an ioutil.NopCloser, but for an io.Writer.
+// noOpCloser is like an io.NopCloser, but for an io.Writer.
type noOpCloser struct {
w io.Writer
}
diff --git a/openpgp/packet/symmetrically_encrypted_test.go b/openpgp/packet/symmetrically_encrypted_test.go
index c5c00f7..4c47c7b 100644
--- a/openpgp/packet/symmetrically_encrypted_test.go
+++ b/openpgp/packet/symmetrically_encrypted_test.go
@@ -10,7 +10,6 @@ import (
"encoding/hex"
"golang.org/x/crypto/openpgp/errors"
"io"
- "io/ioutil"
"testing"
)
@@ -42,7 +41,7 @@ func testMDCReader(t *testing.T) {
for stride := 1; stride < len(mdcPlaintext)/2; stride++ {
r := &testReader{data: mdcPlaintext, stride: stride}
mdcReader := &seMDCReader{in: r, h: sha1.New()}
- body, err := ioutil.ReadAll(mdcReader)
+ body, err := io.ReadAll(mdcReader)
if err != nil {
t.Errorf("stride: %d, error: %s", stride, err)
continue
@@ -62,7 +61,7 @@ func testMDCReader(t *testing.T) {
r := &testReader{data: mdcPlaintext, stride: 2}
mdcReader := &seMDCReader{in: r, h: sha1.New()}
- _, err := ioutil.ReadAll(mdcReader)
+ _, err := io.ReadAll(mdcReader)
if err != nil {
t.Errorf("corruption test, error: %s", err)
return
diff --git a/openpgp/packet/userattribute.go b/openpgp/packet/userattribute.go
index d19ffbc..ff7ef53 100644
--- a/openpgp/packet/userattribute.go
+++ b/openpgp/packet/userattribute.go
@@ -9,7 +9,6 @@ import (
"image"
"image/jpeg"
"io"
- "io/ioutil"
)
const UserAttrImageSubpacket = 1
@@ -56,7 +55,7 @@ func NewUserAttribute(contents ...*OpaqueSubpacket) *UserAttribute {
func (uat *UserAttribute) parse(r io.Reader) (err error) {
// RFC 4880, section 5.13
- b, err := ioutil.ReadAll(r)
+ b, err := io.ReadAll(r)
if err != nil {
return
}
diff --git a/openpgp/packet/userid.go b/openpgp/packet/userid.go
index d6bea7d..359a462 100644
--- a/openpgp/packet/userid.go
+++ b/openpgp/packet/userid.go
@@ -6,7 +6,6 @@ package packet
import (
"io"
- "io/ioutil"
"strings"
)
@@ -66,7 +65,7 @@ func NewUserId(name, comment, email string) *UserId {
func (uid *UserId) parse(r io.Reader) (err error) {
// RFC 4880, section 5.11
- b, err := ioutil.ReadAll(r)
+ b, err := io.ReadAll(r)
if err != nil {
return
}
diff --git a/openpgp/read_test.go b/openpgp/read_test.go
index f5bba30..6bbfaf1 100644
--- a/openpgp/read_test.go
+++ b/openpgp/read_test.go
@@ -9,7 +9,6 @@ import (
_ "crypto/sha512"
"encoding/hex"
"io"
- "io/ioutil"
"strings"
"testing"
@@ -128,7 +127,7 @@ func checkSignedMessage(t *testing.T, signedHex, expected string) {
t.Errorf("bad MessageDetails: %#v", md)
}
- contents, err := ioutil.ReadAll(md.UnverifiedBody)
+ contents, err := io.ReadAll(md.UnverifiedBody)
if err != nil {
t.Errorf("error reading UnverifiedBody: %s", err)
}
@@ -221,7 +220,7 @@ func TestSignedEncryptedMessage(t *testing.T) {
t.Errorf("#%d: bad MessageDetails: %#v", i, md)
}
- contents, err := ioutil.ReadAll(md.UnverifiedBody)
+ contents, err := io.ReadAll(md.UnverifiedBody)
if err != nil {
t.Errorf("#%d: error reading UnverifiedBody: %s", i, err)
}
@@ -245,7 +244,7 @@ func TestUnspecifiedRecipient(t *testing.T) {
return
}
- contents, err := ioutil.ReadAll(md.UnverifiedBody)
+ contents, err := io.ReadAll(md.UnverifiedBody)
if err != nil {
t.Errorf("error reading UnverifiedBody: %s", err)
}
@@ -280,7 +279,7 @@ func TestSymmetricallyEncrypted(t *testing.T) {
return
}
- contents, err := ioutil.ReadAll(md.UnverifiedBody)
+ contents, err := io.ReadAll(md.UnverifiedBody)
if err != nil {
t.Errorf("ReadAll: %s", err)
}
@@ -454,7 +453,7 @@ func TestSignatureV3Message(t *testing.T) {
return
}
- _, err = ioutil.ReadAll(md.UnverifiedBody)
+ _, err = io.ReadAll(md.UnverifiedBody)
if err != nil {
t.Error(err)
return
diff --git a/openpgp/write.go b/openpgp/write.go
index 4ee7178..b89d48b 100644
--- a/openpgp/write.go
+++ b/openpgp/write.go
@@ -402,7 +402,7 @@ func (s signatureWriter) Close() error {
return s.encryptedData.Close()
}
-// noOpCloser is like an ioutil.NopCloser, but for an io.Writer.
+// noOpCloser is like an io.NopCloser, but for an io.Writer.
// TODO: we have two of these in OpenPGP packages alone. This probably needs
// to be promoted somewhere more common.
type noOpCloser struct {
diff --git a/openpgp/write_test.go b/openpgp/write_test.go
index cbc8f4d..8b68678 100644
--- a/openpgp/write_test.go
+++ b/openpgp/write_test.go
@@ -7,7 +7,6 @@ package openpgp
import (
"bytes"
"io"
- "io/ioutil"
"testing"
"time"
@@ -245,7 +244,7 @@ func TestEncryption(t *testing.T) {
}
}
- plaintext, err := ioutil.ReadAll(md.UnverifiedBody)
+ plaintext, err := io.ReadAll(md.UnverifiedBody)
if err != nil {
t.Errorf("#%d: error reading encrypted contents: %s", i, err)
continue
@@ -342,7 +341,7 @@ func TestSigning(t *testing.T) {
t.Errorf("#%d: failed to find the signing Entity", i)
}
- plaintext, err := ioutil.ReadAll(md.UnverifiedBody)
+ plaintext, err := io.ReadAll(md.UnverifiedBody)
if err != nil {
t.Errorf("#%d: error reading contents: %v", i, err)
continue
diff --git a/ssh/cipher.go b/ssh/cipher.go
index 770e8a6..c3062cf 100644
--- a/ssh/cipher.go
+++ b/ssh/cipher.go
@@ -15,7 +15,6 @@ import (
"fmt"
"hash"
"io"
- "io/ioutil"
"golang.org/x/crypto/chacha20"
"golang.org/x/crypto/internal/poly1305"
@@ -497,7 +496,7 @@ func (c *cbcCipher) readCipherPacket(seqNum uint32, r io.Reader) ([]byte, error)
// data, to make distinguishing between
// failing MAC and failing length check more
// difficult.
- io.CopyN(ioutil.Discard, r, int64(c.oracleCamouflage))
+ io.CopyN(io.Discard, r, int64(c.oracleCamouflage))
}
}
return p, err
diff --git a/ssh/example_test.go b/ssh/example_test.go
index 8a0aaef..bee6796 100644
--- a/ssh/example_test.go
+++ b/ssh/example_test.go
@@ -8,7 +8,6 @@ import (
"bufio"
"bytes"
"fmt"
- "io/ioutil"
"log"
"net"
"net/http"
@@ -24,7 +23,7 @@ func ExampleNewServerConn() {
// Public key authentication is done by comparing
// the public key of a received connection
// with the entries in the authorized_keys file.
- authorizedKeysBytes, err := ioutil.ReadFile("authorized_keys")
+ authorizedKeysBytes, err := os.ReadFile("authorized_keys")
if err != nil {
log.Fatalf("Failed to load authorized_keys, err: %v", err)
}
@@ -67,7 +66,7 @@ func ExampleNewServerConn() {
},
}
- privateBytes, err := ioutil.ReadFile("id_rsa")
+ privateBytes, err := os.ReadFile("id_rsa")
if err != nil {
log.Fatal("Failed to load private key: ", err)
}
@@ -225,7 +224,7 @@ func ExamplePublicKeys() {
//
// If you have an encrypted private key, the crypto/x509 package
// can be used to decrypt it.
- key, err := ioutil.ReadFile("/home/user/.ssh/id_rsa")
+ key, err := os.ReadFile("/home/user/.ssh/id_rsa")
if err != nil {
log.Fatalf("unable to read private key: %v", err)
}
diff --git a/ssh/mux_test.go b/ssh/mux_test.go
index 0b6b74d..393017c 100644
--- a/ssh/mux_test.go
+++ b/ssh/mux_test.go
@@ -6,7 +6,6 @@ package ssh
import (
"io"
- "io/ioutil"
"sync"
"testing"
"time"
@@ -73,14 +72,14 @@ func TestMuxChannelExtendedThreadSafety(t *testing.T) {
rd.Add(2)
go func() {
- c, err := ioutil.ReadAll(reader)
+ c, err := io.ReadAll(reader)
if string(c) != magic {
t.Fatalf("stdout read got %q, want %q (error %s)", c, magic, err)
}
rd.Done()
}()
go func() {
- c, err := ioutil.ReadAll(reader.Stderr())
+ c, err := io.ReadAll(reader.Stderr())
if string(c) != magic {
t.Fatalf("stderr read got %q, want %q (error %s)", c, magic, err)
}
@@ -670,7 +669,7 @@ func TestZeroWindowAdjust(t *testing.T) {
}()
want := "helloworld"
- c, _ := ioutil.ReadAll(b)
+ c, _ := io.ReadAll(b)
if string(c) != want {
t.Errorf("got %q want %q", c, want)
}
diff --git a/ssh/session.go b/ssh/session.go
index eca31a2..acef622 100644
--- a/ssh/session.go
+++ b/ssh/session.go
@@ -13,7 +13,6 @@ import (
"errors"
"fmt"
"io"
- "io/ioutil"
"sync"
)
@@ -124,7 +123,7 @@ type Session struct {
// output and error.
//
// If either is nil, Run connects the corresponding file
- // descriptor to an instance of ioutil.Discard. There is a
+ // descriptor to an instance of io.Discard. There is a
// fixed amount of buffering that is shared for the two streams.
// If either blocks it may eventually cause the remote
// command to block.
@@ -506,7 +505,7 @@ func (s *Session) stdout() {
return
}
if s.Stdout == nil {
- s.Stdout = ioutil.Discard
+ s.Stdout = io.Discard
}
s.copyFuncs = append(s.copyFuncs, func() error {
_, err := io.Copy(s.Stdout, s.ch)
@@ -519,7 +518,7 @@ func (s *Session) stderr() {
return
}
if s.Stderr == nil {
- s.Stderr = ioutil.Discard
+ s.Stderr = io.Discard
}
s.copyFuncs = append(s.copyFuncs, func() error {
_, err := io.Copy(s.Stderr, s.ch.Stderr())
diff --git a/ssh/session_test.go b/ssh/session_test.go
index a4e1a59..2568a88 100644
--- a/ssh/session_test.go
+++ b/ssh/session_test.go
@@ -11,7 +11,6 @@ import (
crypto_rand "crypto/rand"
"errors"
"io"
- "io/ioutil"
"math/rand"
"net"
"testing"
@@ -531,7 +530,7 @@ func sendSignal(signal string, ch Channel, t *testing.T) {
func discardHandler(ch Channel, t *testing.T) {
defer ch.Close()
- io.Copy(ioutil.Discard, ch)
+ io.Copy(io.Discard, ch)
}
func echoHandler(ch Channel, in <-chan *Request, t *testing.T) {
@@ -606,7 +605,7 @@ func TestClientWriteEOF(t *testing.T) {
}
stdin.Close()
- res, err := ioutil.ReadAll(stdout)
+ res, err := io.ReadAll(stdout)
if err != nil {
t.Fatalf("Read failed: %v", err)
}
@@ -618,7 +617,7 @@ func TestClientWriteEOF(t *testing.T) {
func simpleEchoHandler(ch Channel, in <-chan *Request, t *testing.T) {
defer ch.Close()
- data, err := ioutil.ReadAll(ch)
+ data, err := io.ReadAll(ch)
if err != nil {
t.Errorf("handler read error: %v", err)
}
diff --git a/ssh/test/dial_unix_test.go b/ssh/test/dial_unix_test.go
index 15c34d9..2dca0e6 100644
--- a/ssh/test/dial_unix_test.go
+++ b/ssh/test/dial_unix_test.go
@@ -12,7 +12,6 @@ package test
import (
"fmt"
"io"
- "io/ioutil"
"net"
"strings"
"testing"
@@ -55,7 +54,7 @@ func testDial(t *testing.T, n, listenAddr string, x dialTester) {
}
x.TestClientConn(t, conn)
defer conn.Close()
- b, err := ioutil.ReadAll(conn)
+ b, err := io.ReadAll(conn)
if err != nil {
t.Fatalf("ReadAll: %v", err)
}
diff --git a/ssh/test/forward_unix_test.go b/ssh/test/forward_unix_test.go
index ab8e639..9b82e7c 100644
--- a/ssh/test/forward_unix_test.go
+++ b/ssh/test/forward_unix_test.go
@@ -11,7 +11,6 @@ import (
"bytes"
"fmt"
"io"
- "io/ioutil"
"math/rand"
"net"
"testing"
@@ -58,7 +57,7 @@ func testPortForward(t *testing.T, n, listenAddr string) {
readChan := make(chan []byte)
go func() {
- data, _ := ioutil.ReadAll(netConn)
+ data, _ := io.ReadAll(netConn)
readChan <- data
}()
diff --git a/ssh/test/test_unix_test.go b/ssh/test/test_unix_test.go
index 804163c..95e2e30 100644
--- a/ssh/test/test_unix_test.go
+++ b/ssh/test/test_unix_test.go
@@ -14,7 +14,6 @@ import (
"crypto/rand"
"encoding/base64"
"fmt"
- "io/ioutil"
"log"
"net"
"os"
@@ -151,7 +150,7 @@ func clientConfig() *ssh.ClientConfig {
// is used for connecting the Go SSH client with sshd without opening
// ports.
func unixConnection() (*net.UnixConn, *net.UnixConn, error) {
- dir, err := ioutil.TempDir("", "unixConnection")
+ dir, err := os.MkdirTemp("", "unixConnection")
if err != nil {
return nil, nil, err
}
@@ -316,7 +315,7 @@ func newServerForConfig(t *testing.T, config string, configVars map[string]strin
if uname == "root" {
t.Skip("skipping test because current user is root")
}
- dir, err := ioutil.TempDir("", "sshtest")
+ dir, err := os.MkdirTemp("", "sshtest")
if err != nil {
t.Fatal(err)
}
@@ -365,7 +364,7 @@ func newServerForConfig(t *testing.T, config string, configVars map[string]strin
}
func newTempSocket(t *testing.T) (string, func()) {
- dir, err := ioutil.TempDir("", "socket")
+ dir, err := os.MkdirTemp("", "socket")
if err != nil {
t.Fatal(err)
}