summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortb <>2018-10-07 04:40:14 +0000
committertb <>2018-10-07 04:40:14 +0000
commit60748ef0c65f6ab38d3fe58f27b4c5cecfef4c15 (patch)
tree023fc3dd4bfe252b32a999e56ed1a0468bfcc9df /src
parent6f3a7bc27fb7692e32371ed2bac7b2ba250bcd09 (diff)
downloadopenbsd-60748ef0c65f6ab38d3fe58f27b4c5cecfef4c15.tar.gz
openbsd-60748ef0c65f6ab38d3fe58f27b4c5cecfef4c15.tar.bz2
openbsd-60748ef0c65f6ab38d3fe58f27b4c5cecfef4c15.zip
whitespace cleanup and other minor things from gofmt
Diffstat (limited to 'src')
-rw-r--r--src/regress/lib/libcrypto/wycheproof/wycheproof.go83
1 files changed, 39 insertions, 44 deletions
diff --git a/src/regress/lib/libcrypto/wycheproof/wycheproof.go b/src/regress/lib/libcrypto/wycheproof/wycheproof.go
index 1243be6d60..ff15d30962 100644
--- a/src/regress/lib/libcrypto/wycheproof/wycheproof.go
+++ b/src/regress/lib/libcrypto/wycheproof/wycheproof.go
@@ -1,4 +1,4 @@
1/* $OpenBSD: wycheproof.go,v 1.80 2018/10/06 18:31:47 tb Exp $ */ 1/* $OpenBSD: wycheproof.go,v 1.81 2018/10/07 04:40:14 tb Exp $ */
2/* 2/*
3 * Copyright (c) 2018 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2018 Joel Sing <jsing@openbsd.org>
4 * Copyright (c) 2018 Theo Buehler <tb@openbsd.org> 4 * Copyright (c) 2018 Theo Buehler <tb@openbsd.org>
@@ -44,8 +44,8 @@ import (
44 "crypto/sha1" 44 "crypto/sha1"
45 "crypto/sha256" 45 "crypto/sha256"
46 "crypto/sha512" 46 "crypto/sha512"
47 "encoding/hex"
48 "encoding/base64" 47 "encoding/base64"
48 "encoding/hex"
49 "encoding/json" 49 "encoding/json"
50 "flag" 50 "flag"
51 "fmt" 51 "fmt"
@@ -878,14 +878,14 @@ func runAesCmacTest(cipher *C.EVP_CIPHER, wt *wycheproofTestAesCmac) bool {
878 ret := C.CMAC_Init(ctx, unsafe.Pointer(&key[0]), C.size_t(keyLen), cipher, nil) 878 ret := C.CMAC_Init(ctx, unsafe.Pointer(&key[0]), C.size_t(keyLen), cipher, nil)
879 if ret != 1 { 879 if ret != 1 {
880 fmt.Printf("FAIL: Test case %d (%q) %v - CMAC_Init() = %d, want %v\n", 880 fmt.Printf("FAIL: Test case %d (%q) %v - CMAC_Init() = %d, want %v\n",
881 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result) 881 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result)
882 return false 882 return false
883 } 883 }
884 884
885 ret = C.CMAC_Update(ctx, unsafe.Pointer(&msg[0]), C.size_t(msgLen)) 885 ret = C.CMAC_Update(ctx, unsafe.Pointer(&msg[0]), C.size_t(msgLen))
886 if ret != 1 { 886 if ret != 1 {
887 fmt.Printf("FAIL: Test case %d (%q) %v - CMAC_Update() = %d, want %v\n", 887 fmt.Printf("FAIL: Test case %d (%q) %v - CMAC_Update() = %d, want %v\n",
888 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result) 888 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result)
889 return false 889 return false
890 } 890 }
891 891
@@ -895,7 +895,7 @@ func runAesCmacTest(cipher *C.EVP_CIPHER, wt *wycheproofTestAesCmac) bool {
895 ret = C.CMAC_Final(ctx, (*C.uchar)(unsafe.Pointer(&outTag[0])), &outLen) 895 ret = C.CMAC_Final(ctx, (*C.uchar)(unsafe.Pointer(&outTag[0])), &outLen)
896 if ret != 1 { 896 if ret != 1 {
897 fmt.Printf("FAIL: Test case %d (%q) %v - CMAC_Final() = %d, want %v\n", 897 fmt.Printf("FAIL: Test case %d (%q) %v - CMAC_Final() = %d, want %v\n",
898 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result) 898 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result)
899 return false 899 return false
900 } 900 }
901 901
@@ -904,7 +904,7 @@ func runAesCmacTest(cipher *C.EVP_CIPHER, wt *wycheproofTestAesCmac) bool {
904 success := true 904 success := true
905 if bytes.Equal(tag, outTag) != (wt.Result == "valid") { 905 if bytes.Equal(tag, outTag) != (wt.Result == "valid") {
906 fmt.Printf("FAIL: Test case %d (%q) %v - want %v\n", 906 fmt.Printf("FAIL: Test case %d (%q) %v - want %v\n",
907 wt.TCID, wt.Comment, wt.Flags, wt.Result) 907 wt.TCID, wt.Comment, wt.Flags, wt.Result)
908 success = false 908 success = false
909 } 909 }
910 return success 910 return success
@@ -955,13 +955,13 @@ func checkAeadOpen(ctx *C.EVP_AEAD_CTX, iv []byte, ivLen int, aad []byte, aadLen
955 return true 955 return true
956 } 956 }
957 fmt.Printf("FAIL: Test case %d (%q) %v - EVP_AEAD_CTX_open() = %d, want %v\n", 957 fmt.Printf("FAIL: Test case %d (%q) %v - EVP_AEAD_CTX_open() = %d, want %v\n",
958 wt.TCID, wt.Comment, wt.Flags, int(openRet), wt.Result) 958 wt.TCID, wt.Comment, wt.Flags, int(openRet), wt.Result)
959 return false 959 return false
960 } 960 }
961 961
962 if openedMsgLen != C.size_t(msgLen) { 962 if openedMsgLen != C.size_t(msgLen) {
963 fmt.Printf("FAIL: Test case %d (%q) %v - open length mismatch: got %d, want %d\n", 963 fmt.Printf("FAIL: Test case %d (%q) %v - open length mismatch: got %d, want %d\n",
964 wt.TCID, wt.Comment, wt.Flags, openedMsgLen, msgLen) 964 wt.TCID, wt.Comment, wt.Flags, openedMsgLen, msgLen)
965 return false 965 return false
966 } 966 }
967 967
@@ -978,7 +978,7 @@ func checkAeadOpen(ctx *C.EVP_AEAD_CTX, iv []byte, ivLen int, aad []byte, aadLen
978 success = true 978 success = true
979 } else { 979 } else {
980 fmt.Printf("FAIL: Test case %d (%q) %v - msg match: %t; want %v\n", 980 fmt.Printf("FAIL: Test case %d (%q) %v - msg match: %t; want %v\n",
981 wt.TCID, wt.Comment, wt.Flags, bytes.Equal(openedMsg, msg), wt.Result) 981 wt.TCID, wt.Comment, wt.Flags, bytes.Equal(openedMsg, msg), wt.Result)
982 } 982 }
983 return success 983 return success
984} 984}
@@ -998,13 +998,13 @@ func checkAeadSeal(ctx *C.EVP_AEAD_CTX, iv []byte, ivLen int, aad []byte, aadLen
998 998
999 if sealRet != 1 { 999 if sealRet != 1 {
1000 fmt.Printf("FAIL: Test case %d (%q) %v - EVP_AEAD_CTX_seal() = %d, want %v\n", 1000 fmt.Printf("FAIL: Test case %d (%q) %v - EVP_AEAD_CTX_seal() = %d, want %v\n",
1001 wt.TCID, wt.Comment, wt.Flags, int(sealRet), wt.Result) 1001 wt.TCID, wt.Comment, wt.Flags, int(sealRet), wt.Result)
1002 return false 1002 return false
1003 } 1003 }
1004 1004
1005 if sealedLen != C.size_t(maxOutLen) { 1005 if sealedLen != C.size_t(maxOutLen) {
1006 fmt.Printf("FAIL: Test case %d (%q) %v - seal length mismatch: got %d, want %d\n", 1006 fmt.Printf("FAIL: Test case %d (%q) %v - seal length mismatch: got %d, want %d\n",
1007 wt.TCID, wt.Comment, wt.Flags, sealedLen, maxOutLen) 1007 wt.TCID, wt.Comment, wt.Flags, sealedLen, maxOutLen)
1008 return false 1008 return false
1009 } 1009 }
1010 1010
@@ -1019,7 +1019,7 @@ func checkAeadSeal(ctx *C.EVP_AEAD_CTX, iv []byte, ivLen int, aad []byte, aadLen
1019 success = true 1019 success = true
1020 } else { 1020 } else {
1021 fmt.Printf("FAIL: Test case %d (%q) %v - EVP_AEAD_CTX_seal() = %d, ct match: %t, tag match: %t; want %v\n", 1021 fmt.Printf("FAIL: Test case %d (%q) %v - EVP_AEAD_CTX_seal() = %d, ct match: %t, tag match: %t; want %v\n",
1022 wt.TCID, wt.Comment, wt.Flags, int(sealRet), 1022 wt.TCID, wt.Comment, wt.Flags, int(sealRet),
1023 bytes.Equal(sealedCt, ct), bytes.Equal(sealedTag, tag), wt.Result) 1023 bytes.Equal(sealedCt, ct), bytes.Equal(sealedTag, tag), wt.Result)
1024 } 1024 }
1025 return success 1025 return success
@@ -1122,9 +1122,9 @@ func runDSATest(dsa *C.DSA, h hash.Hash, wt *wycheproofTestDSA) bool {
1122 (*C.uchar)(unsafe.Pointer(&sig[0])), C.int(sigLen), dsa) 1122 (*C.uchar)(unsafe.Pointer(&sig[0])), C.int(sigLen), dsa)
1123 1123
1124 success := true 1124 success := true
1125 if (ret == 1) != (wt.Result == "valid") { 1125 if ret == 1 != (wt.Result == "valid") {
1126 fmt.Printf("FAIL: Test case %d (%q) %v - DSA_verify() = %d, want %v\n", 1126 fmt.Printf("FAIL: Test case %d (%q) %v - DSA_verify() = %d, want %v\n",
1127 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result) 1127 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result)
1128 success = false 1128 success = false
1129 } 1129 }
1130 return success 1130 return success
@@ -1183,7 +1183,6 @@ func runDSATestGroup(algorithm string, wtg *wycheproofTestGroupDSA) bool {
1183 log.Fatalf("Failed to get hash: %v", err) 1183 log.Fatalf("Failed to get hash: %v", err)
1184 } 1184 }
1185 1185
1186
1187 der, err := hex.DecodeString(wtg.KeyDER) 1186 der, err := hex.DecodeString(wtg.KeyDER)
1188 if err != nil { 1187 if err != nil {
1189 log.Fatalf("Failed to decode DER encoded key: %v", err) 1188 log.Fatalf("Failed to decode DER encoded key: %v", err)
@@ -1205,7 +1204,6 @@ func runDSATestGroup(algorithm string, wtg *wycheproofTestGroupDSA) bool {
1205 defer C.DSA_free(dsaDER) 1204 defer C.DSA_free(dsaDER)
1206 C.free(unsafe.Pointer(Cder)) 1205 C.free(unsafe.Pointer(Cder))
1207 1206
1208
1209 keyPEM := C.CString(wtg.KeyPEM) 1207 keyPEM := C.CString(wtg.KeyPEM)
1210 bio := C.BIO_new_mem_buf(unsafe.Pointer(keyPEM), C.int(len(wtg.KeyPEM))) 1208 bio := C.BIO_new_mem_buf(unsafe.Pointer(keyPEM), C.int(len(wtg.KeyPEM)))
1211 if bio == nil { 1209 if bio == nil {
@@ -1220,7 +1218,6 @@ func runDSATestGroup(algorithm string, wtg *wycheproofTestGroupDSA) bool {
1220 } 1218 }
1221 defer C.DSA_free(dsaPEM) 1219 defer C.DSA_free(dsaPEM)
1222 1220
1223
1224 success := true 1221 success := true
1225 for _, wt := range wtg.Tests { 1222 for _, wt := range wtg.Tests {
1226 if !runDSATest(dsa, h, wt) { 1223 if !runDSATest(dsa, h, wt) {
@@ -1254,7 +1251,7 @@ func runECDHTest(nid int, doECpoint bool, wt *wycheproofTestECDH) bool {
1254 ret := C.EC_KEY_set_private_key(privKey, bnPriv) 1251 ret := C.EC_KEY_set_private_key(privKey, bnPriv)
1255 if ret != 1 { 1252 if ret != 1 {
1256 fmt.Printf("FAIL: Test case %d (%q) %v - EC_KEY_set_private_key() = %d, want %v\n", 1253 fmt.Printf("FAIL: Test case %d (%q) %v - EC_KEY_set_private_key() = %d, want %v\n",
1257 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result) 1254 wt.TCID, wt.Comment, wt.Flags, ret, wt.Result)
1258 return false 1255 return false
1259 } 1256 }
1260 1257
@@ -1276,7 +1273,7 @@ func runECDHTest(nid int, doECpoint bool, wt *wycheproofTestECDH) bool {
1276 1273
1277 p := (*C.uchar)(Cpub) 1274 p := (*C.uchar)(Cpub)
1278 var pubKey *C.EC_KEY 1275 var pubKey *C.EC_KEY
1279 if (doECpoint) { 1276 if doECpoint {
1280 pubKey = C.EC_KEY_new_by_curve_name(C.int(nid)) 1277 pubKey = C.EC_KEY_new_by_curve_name(C.int(nid))
1281 if pubKey == nil { 1278 if pubKey == nil {
1282 log.Fatal("EC_KEY_new_by_curve_name failed") 1279 log.Fatal("EC_KEY_new_by_curve_name failed")
@@ -1293,13 +1290,13 @@ func runECDHTest(nid int, doECpoint bool, wt *wycheproofTestECDH) bool {
1293 return true 1290 return true
1294 } 1291 }
1295 fmt.Printf("FAIL: Test case %d (%q) %v - ASN decoding failed: want %v\n", 1292 fmt.Printf("FAIL: Test case %d (%q) %v - ASN decoding failed: want %v\n",
1296 wt.TCID, wt.Comment, wt.Flags, wt.Result) 1293 wt.TCID, wt.Comment, wt.Flags, wt.Result)
1297 return false 1294 return false
1298 } 1295 }
1299 1296
1300 privGroup := C.EC_KEY_get0_group(privKey) 1297 privGroup := C.EC_KEY_get0_group(privKey)
1301 1298
1302 secLen := (C.EC_GROUP_get_degree(privGroup) + 7) / 8 1299 secLen := (C.EC_GROUP_get_degree(privGroup) + 7) / 8
1303 1300
1304 secret := make([]byte, secLen) 1301 secret := make([]byte, secLen)
1305 if secLen == 0 { 1302 if secLen == 0 {
@@ -1314,19 +1311,19 @@ func runECDHTest(nid int, doECpoint bool, wt *wycheproofTestECDH) bool {
1314 return true 1311 return true
1315 } 1312 }
1316 fmt.Printf("FAIL: Test case %d (%q) %v - ECDH_compute_key() = %d, want %d, result: %v\n", 1313 fmt.Printf("FAIL: Test case %d (%q) %v - ECDH_compute_key() = %d, want %d, result: %v\n",
1317 wt.TCID, wt.Comment, wt.Flags, ret, int(secLen), wt.Result) 1314 wt.TCID, wt.Comment, wt.Flags, ret, int(secLen), wt.Result)
1318 return false 1315 return false
1319 } 1316 }
1320 1317
1321 shared, err := hex.DecodeString(wt.Shared) 1318 shared, err := hex.DecodeString(wt.Shared)
1322 if err != nil{ 1319 if err != nil {
1323 log.Fatalf("Failed to decode shared secret: %v", err) 1320 log.Fatalf("Failed to decode shared secret: %v", err)
1324 } 1321 }
1325 1322
1326 success := true 1323 success := true
1327 if !bytes.Equal(shared, secret) { 1324 if !bytes.Equal(shared, secret) {
1328 fmt.Printf("FAIL: Test case %d (%q) %v - expected and computed shared secret do not match, want %v\n", 1325 fmt.Printf("FAIL: Test case %d (%q) %v - expected and computed shared secret do not match, want %v\n",
1329 wt.TCID, wt.Comment, wt.Flags, wt.Result) 1326 wt.TCID, wt.Comment, wt.Flags, wt.Result)
1330 success = false 1327 success = false
1331 } 1328 }
1332 if acceptableAudit && success && wt.Result == "acceptable" { 1329 if acceptableAudit && success && wt.Result == "acceptable" {
@@ -1370,7 +1367,7 @@ func runECDHWebCryptoTest(nid int, wt *wycheproofTestECDHWebCrypto) bool {
1370 if err != nil { 1367 if err != nil {
1371 log.Fatalf("Failed to base64 decode d: %v", err) 1368 log.Fatalf("Failed to base64 decode d: %v", err)
1372 } 1369 }
1373 bnD = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&d[0])), (C.int)(len(d)), nil) 1370 bnD = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&d[0])), C.int(len(d)), nil)
1374 if bnD == nil { 1371 if bnD == nil {
1375 log.Fatal("Failed to decode D") 1372 log.Fatal("Failed to decode D")
1376 } 1373 }
@@ -1388,7 +1385,7 @@ func runECDHWebCryptoTest(nid int, wt *wycheproofTestECDHWebCrypto) bool {
1388 if err != nil { 1385 if err != nil {
1389 log.Fatalf("Failed to base64 decode x: %v", err) 1386 log.Fatalf("Failed to base64 decode x: %v", err)
1390 } 1387 }
1391 bnX = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&x[0])), (C.int)(len(x)), nil) 1388 bnX = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&x[0])), C.int(len(x)), nil)
1392 if bnX == nil { 1389 if bnX == nil {
1393 log.Fatal("Failed to decode X") 1390 log.Fatal("Failed to decode X")
1394 } 1391 }
@@ -1399,7 +1396,7 @@ func runECDHWebCryptoTest(nid int, wt *wycheproofTestECDHWebCrypto) bool {
1399 if err != nil { 1396 if err != nil {
1400 log.Fatalf("Failed to base64 decode y: %v", err) 1397 log.Fatalf("Failed to base64 decode y: %v", err)
1401 } 1398 }
1402 bnY = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&y[0])), (C.int)(len(y)), nil) 1399 bnY = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&y[0])), C.int(len(y)), nil)
1403 if bnY == nil { 1400 if bnY == nil {
1404 log.Fatal("Failed to decode Y") 1401 log.Fatal("Failed to decode Y")
1405 } 1402 }
@@ -1424,7 +1421,7 @@ func runECDHWebCryptoTest(nid int, wt *wycheproofTestECDHWebCrypto) bool {
1424 1421
1425 privGroup := C.EC_KEY_get0_group(privKey) 1422 privGroup := C.EC_KEY_get0_group(privKey)
1426 1423
1427 secLen := (C.EC_GROUP_get_degree(privGroup) + 7) / 8 1424 secLen := (C.EC_GROUP_get_degree(privGroup) + 7) / 8
1428 1425
1429 secret := make([]byte, secLen) 1426 secret := make([]byte, secLen)
1430 if secLen == 0 { 1427 if secLen == 0 {
@@ -1437,19 +1434,19 @@ func runECDHWebCryptoTest(nid int, wt *wycheproofTestECDHWebCrypto) bool {
1437 return true 1434 return true
1438 } 1435 }
1439 fmt.Printf("FAIL: Test case %d (%q) %v - ECDH_compute_key() = %d, want %d, result: %v\n", 1436 fmt.Printf("FAIL: Test case %d (%q) %v - ECDH_compute_key() = %d, want %d, result: %v\n",
1440 wt.TCID, wt.Comment, wt.Flags, ret, int(secLen), wt.Result) 1437 wt.TCID, wt.Comment, wt.Flags, ret, int(secLen), wt.Result)
1441 return false 1438 return false
1442 } 1439 }
1443 1440
1444 shared, err := hex.DecodeString(wt.Shared) 1441 shared, err := hex.DecodeString(wt.Shared)
1445 if err != nil{ 1442 if err != nil {
1446 log.Fatalf("Failed to decode shared secret: %v", err) 1443 log.Fatalf("Failed to decode shared secret: %v", err)
1447 } 1444 }
1448 1445
1449 success := true 1446 success := true
1450 if !bytes.Equal(shared, secret) { 1447 if !bytes.Equal(shared, secret) {
1451 fmt.Printf("FAIL: Test case %d (%q) %v - expected and computed shared secret do not match, want %v\n", 1448 fmt.Printf("FAIL: Test case %d (%q) %v - expected and computed shared secret do not match, want %v\n",
1452 wt.TCID, wt.Comment, wt.Flags, wt.Result) 1449 wt.TCID, wt.Comment, wt.Flags, wt.Result)
1453 success = false 1450 success = false
1454 } 1451 }
1455 if acceptableAudit && success && wt.Result == "acceptable" { 1452 if acceptableAudit && success && wt.Result == "acceptable" {
@@ -1518,9 +1515,9 @@ func runECDSATest(ecKey *C.EC_KEY, nid int, h hash.Hash, webcrypto bool, wt *wyc
1518 1515
1519 // XXX audit acceptable cases... 1516 // XXX audit acceptable cases...
1520 success := true 1517 success := true
1521 if (ret == 1) != (wt.Result == "valid") && wt.Result != "acceptable" { 1518 if ret == 1 != (wt.Result == "valid") && wt.Result != "acceptable" {
1522 fmt.Printf("FAIL: Test case %d (%q) %v - ECDSA_verify() = %d, want %v\n", 1519 fmt.Printf("FAIL: Test case %d (%q) %v - ECDSA_verify() = %d, want %v\n",
1523 wt.TCID, wt.Comment, wt.Flags, int(ret), wt.Result) 1520 wt.TCID, wt.Comment, wt.Flags, int(ret), wt.Result)
1524 success = false 1521 success = false
1525 } 1522 }
1526 if acceptableAudit && ret == 1 && wt.Result == "acceptable" { 1523 if acceptableAudit && ret == 1 && wt.Result == "acceptable" {
@@ -1639,7 +1636,7 @@ func runECDSAWebCryptoTestGroup(algorithm string, wtg *wycheproofTestGroupECDSAW
1639 log.Fatalf("Failed to base64 decode X: %v", err) 1636 log.Fatalf("Failed to base64 decode X: %v", err)
1640 } 1637 }
1641 var bnX *C.BIGNUM 1638 var bnX *C.BIGNUM
1642 bnX = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&x[0])), (C.int)(len(x)), nil) 1639 bnX = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&x[0])), C.int(len(x)), nil)
1643 if bnX == nil { 1640 if bnX == nil {
1644 log.Fatal("Failed to decode X") 1641 log.Fatal("Failed to decode X")
1645 } 1642 }
@@ -1650,7 +1647,7 @@ func runECDSAWebCryptoTestGroup(algorithm string, wtg *wycheproofTestGroupECDSAW
1650 log.Fatalf("Failed to base64 decode Y: %v", err) 1647 log.Fatalf("Failed to base64 decode Y: %v", err)
1651 } 1648 }
1652 var bnY *C.BIGNUM 1649 var bnY *C.BIGNUM
1653 bnY = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&y[0])), (C.int)(len(y)), nil) 1650 bnY = C.BN_bin2bn((*C.uchar)(unsafe.Pointer(&y[0])), C.int(len(y)), nil)
1654 if bnY == nil { 1651 if bnY == nil {
1655 log.Fatal("Failed to decode Y") 1652 log.Fatal("Failed to decode Y")
1656 } 1653 }
@@ -1713,7 +1710,7 @@ func runRSASSATest(rsa *C.RSA, h hash.Hash, sha *C.EVP_MD, mgfSha *C.EVP_MD, sLe
1713 return true 1710 return true
1714 } 1711 }
1715 fmt.Printf("FAIL: Test case %d (%q) %v - RSA_public_decrypt() = %d, want %v\n", 1712 fmt.Printf("FAIL: Test case %d (%q) %v - RSA_public_decrypt() = %d, want %v\n",
1716 wt.TCID, wt.Comment, wt.Flags, int(ret), wt.Result) 1713 wt.TCID, wt.Comment, wt.Flags, int(ret), wt.Result)
1717 return false 1714 return false
1718 } 1715 }
1719 1716
@@ -1732,7 +1729,7 @@ func runRSASSATest(rsa *C.RSA, h hash.Hash, sha *C.EVP_MD, mgfSha *C.EVP_MD, sLe
1732 success = true 1729 success = true
1733 } else { 1730 } else {
1734 fmt.Printf("FAIL: Test case %d (%q) %v - RSA_verify_PKCS1_PSS_mgf1() = %d, want %v\n", 1731 fmt.Printf("FAIL: Test case %d (%q) %v - RSA_verify_PKCS1_PSS_mgf1() = %d, want %v\n",
1735 wt.TCID, wt.Comment, wt.Flags, int(ret), wt.Result) 1732 wt.TCID, wt.Comment, wt.Flags, int(ret), wt.Result)
1736 } 1733 }
1737 return success 1734 return success
1738} 1735}
@@ -1810,9 +1807,9 @@ func runRSATest(rsa *C.RSA, nid int, h hash.Hash, wt *wycheproofTestRSA) bool {
1810 1807
1811 // XXX audit acceptable cases... 1808 // XXX audit acceptable cases...
1812 success := true 1809 success := true
1813 if (ret == 1) != (wt.Result == "valid") && wt.Result != "acceptable" { 1810 if ret == 1 != (wt.Result == "valid") && wt.Result != "acceptable" {
1814 fmt.Printf("FAIL: Test case %d (%q) %v - RSA_verify() = %d, want %v\n", 1811 fmt.Printf("FAIL: Test case %d (%q) %v - RSA_verify() = %d, want %v\n",
1815 wt.TCID, wt.Comment, wt.Flags, int(ret), wt.Result) 1812 wt.TCID, wt.Comment, wt.Flags, int(ret), wt.Result)
1816 success = false 1813 success = false
1817 } 1814 }
1818 if acceptableAudit && ret == 1 && wt.Result == "acceptable" { 1815 if acceptableAudit && ret == 1 && wt.Result == "acceptable" {
@@ -1888,7 +1885,7 @@ func runX25519Test(wt *wycheproofTestX25519) bool {
1888 success := true 1885 success := true
1889 if result != (wt.Result == "valid") && wt.Result != "acceptable" { 1886 if result != (wt.Result == "valid") && wt.Result != "acceptable" {
1890 fmt.Printf("FAIL: Test case %d (%q) %v - X25519(), want %v\n", 1887 fmt.Printf("FAIL: Test case %d (%q) %v - X25519(), want %v\n",
1891 wt.TCID, wt.Comment, wt.Flags, wt.Result) 1888 wt.TCID, wt.Comment, wt.Flags, wt.Result)
1892 success = false 1889 success = false
1893 } 1890 }
1894 if acceptableAudit && result && wt.Result == "acceptable" { 1891 if acceptableAudit && result && wt.Result == "acceptable" {
@@ -1947,7 +1944,6 @@ func runTestVectors(path string, webcrypto bool) bool {
1947 } else { 1944 } else {
1948 wtg = &wycheproofTestGroupECDSA{} 1945 wtg = &wycheproofTestGroupECDSA{}
1949 } 1946 }
1950
1951 case "RSASSA-PSS": 1947 case "RSASSA-PSS":
1952 wtg = &wycheproofTestGroupRSASSA{} 1948 wtg = &wycheproofTestGroupRSASSA{}
1953 case "RSASig": 1949 case "RSASig":
@@ -1998,7 +1994,6 @@ func runTestVectors(path string, webcrypto bool) bool {
1998 success = false 1994 success = false
1999 } 1995 }
2000 } 1996 }
2001
2002 case "ECDSA": 1997 case "ECDSA":
2003 if webcrypto { 1998 if webcrypto {
2004 if !runECDSAWebCryptoTestGroup(wtv.Algorithm, wtg.(*wycheproofTestGroupECDSAWebCrypto)) { 1999 if !runECDSAWebCryptoTestGroup(wtv.Algorithm, wtg.(*wycheproofTestGroupECDSAWebCrypto)) {
@@ -2037,7 +2032,7 @@ func main() {
2037 2032
2038 flag.BoolVar(&acceptableAudit, "v", false, "audit acceptable cases") 2033 flag.BoolVar(&acceptableAudit, "v", false, "audit acceptable cases")
2039 flag.Parse() 2034 flag.Parse()
2040 2035
2041 acceptableComments = make(map[string]int) 2036 acceptableComments = make(map[string]int)
2042 acceptableFlags = make(map[string]int) 2037 acceptableFlags = make(map[string]int)
2043 2038
@@ -2059,7 +2054,7 @@ func main() {
2059 success := true 2054 success := true
2060 2055
2061 for _, test := range tests { 2056 for _, test := range tests {
2062 webcrypto := (test.name == "ECDSAWebCrypto") || test.name == "ECDHWebCrypto" 2057 webcrypto := test.name == "ECDSAWebCrypto" || test.name == "ECDHWebCrypto"
2063 tvs, err := filepath.Glob(filepath.Join(testVectorPath, test.pattern)) 2058 tvs, err := filepath.Glob(filepath.Join(testVectorPath, test.pattern))
2064 if err != nil { 2059 if err != nil {
2065 log.Fatalf("Failed to glob %v test vectors: %v", test.name, err) 2060 log.Fatalf("Failed to glob %v test vectors: %v", test.name, err)