diff options
| author | Adam Langley <agl@golang.org> | 2011-06-21 21:00:49 -0400 |
|---|---|---|
| committer | Adam Langley <agl@golang.org> | 2011-06-21 21:00:49 -0400 |
| commit | f2e94de6d62be39044b28ca61b8659cd295253c2 (patch) | |
| tree | 84c849976f554ba61599c666faf2dfbdfdcdd6f8 /src/pkg/crypto/openpgp/packet/encrypted_key_test.go | |
| parent | 10b5519d3a15e9489c998a720fe19989af89da11 (diff) | |
| download | go-f2e94de6d62be39044b28ca61b8659cd295253c2.tar.xz | |
crypto/openpgp: add ElGamal support.
R=bradfitz, r
CC=golang-dev
https://golang.org/cl/4639049
Diffstat (limited to 'src/pkg/crypto/openpgp/packet/encrypted_key_test.go')
| -rw-r--r-- | src/pkg/crypto/openpgp/packet/encrypted_key_test.go | 17 |
1 files changed, 12 insertions, 5 deletions
diff --git a/src/pkg/crypto/openpgp/packet/encrypted_key_test.go b/src/pkg/crypto/openpgp/packet/encrypted_key_test.go index d4e147c0ef..b0a14904a8 100644 --- a/src/pkg/crypto/openpgp/packet/encrypted_key_test.go +++ b/src/pkg/crypto/openpgp/packet/encrypted_key_test.go @@ -27,11 +27,18 @@ var encryptedKeyPub = rsa.PublicKey{ N: bigFromBase10("115804063926007623305902631768113868327816898845124614648849934718568541074358183759250136204762053879858102352159854352727097033322663029387610959884180306668628526686121021235757016368038585212410610742029286439607686208110250133174279811431933746643015923132833417396844716207301518956640020862630546868823"), } -var encryptedKeyPriv = &rsa.PrivateKey{ +var encryptedKeyRSAPriv = &rsa.PrivateKey{ PublicKey: encryptedKeyPub, D: bigFromBase10("32355588668219869544751561565313228297765464314098552250409557267371233892496951383426602439009993875125222579159850054973310859166139474359774543943714622292329487391199285040721944491839695981199720170366763547754915493640685849961780092241140181198779299712578774460837139360803883139311171713302987058393"), } +var encryptedKeyPriv = &PrivateKey{ + PublicKey: PublicKey{ + PubKeyAlgo: PubKeyAlgoRSA, + }, + PrivateKey: encryptedKeyRSAPriv, +} + func TestDecryptingEncryptedKey(t *testing.T) { const encryptedKeyHex = "c18c032a67d68660df41c70104005789d0de26b6a50c985a02a13131ca829c413a35d0e6fa8d6842599252162808ac7439c72151c8c6183e76923fe3299301414d0c25a2f06a2257db3839e7df0ec964773f6e4c4ac7ff3b48c444237166dd46ba8ff443a5410dc670cb486672fdbe7c9dfafb75b4fea83af3a204fe2a7dfa86bd20122b4f3d2646cbeecb8f7be8" const expectedKeyHex = "d930363f7e0308c333b9618617ea728963d8df993665ae7be1092d4926fd864b" @@ -52,9 +59,9 @@ func TestDecryptingEncryptedKey(t *testing.T) { return } - err = ek.DecryptRSA(encryptedKeyPriv) + err = ek.Decrypt(encryptedKeyPriv) if err != nil { - t.Errorf("error from DecryptRSA: %s", err) + t.Errorf("error from Decrypt: %s", err) return } @@ -102,9 +109,9 @@ func TestEncryptingEncryptedKey(t *testing.T) { return } - err = ek.DecryptRSA(encryptedKeyPriv) + err = ek.Decrypt(encryptedKeyPriv) if err != nil { - t.Errorf("error from DecryptRSA: %s", err) + t.Errorf("error from Decrypt: %s", err) return } |
