@@ -58,11 +58,11 @@ func TestKDF(t *testing.T) {
58
58
59
59
k , err := concatKDF (h , msg , nil , 64 )
60
60
if err != nil {
61
- fmt . Println (err .Error ())
61
+ t . Log (err .Error ())
62
62
t .FailNow ()
63
63
}
64
64
if len (k ) != 64 {
65
- fmt . Printf ("KDF: generated key is the wrong size (%d instead of 64\n " , len (k ))
65
+ t . Logf ("KDF: generated key is the wrong size (%d instead of 64\n " , len (k ))
66
66
t .FailNow ()
67
67
}
68
68
}
@@ -97,31 +97,31 @@ func cmpPublic(pub1, pub2 PublicKey) bool {
97
97
func TestSharedKey (t * testing.T ) {
98
98
prv1 , err := GenerateKey (rand .Reader , DefaultCurve , nil )
99
99
if err != nil {
100
- fmt . Println (err .Error ())
100
+ t . Log (err .Error ())
101
101
t .FailNow ()
102
102
}
103
103
skLen := MaxSharedKeyLength (& prv1 .PublicKey ) / 2
104
104
105
105
prv2 , err := GenerateKey (rand .Reader , DefaultCurve , nil )
106
106
if err != nil {
107
- fmt . Println (err .Error ())
107
+ t . Log (err .Error ())
108
108
t .FailNow ()
109
109
}
110
110
111
111
sk1 , err := prv1 .GenerateShared (& prv2 .PublicKey , skLen , skLen )
112
112
if err != nil {
113
- fmt . Println (err .Error ())
113
+ t . Log (err .Error ())
114
114
t .FailNow ()
115
115
}
116
116
117
117
sk2 , err := prv2 .GenerateShared (& prv1 .PublicKey , skLen , skLen )
118
118
if err != nil {
119
- fmt . Println (err .Error ())
119
+ t . Log (err .Error ())
120
120
t .FailNow ()
121
121
}
122
122
123
123
if ! bytes .Equal (sk1 , sk2 ) {
124
- fmt . Println (ErrBadSharedKeys .Error ())
124
+ t . Log (ErrBadSharedKeys .Error ())
125
125
t .FailNow ()
126
126
}
127
127
}
@@ -151,7 +151,7 @@ func TestSharedKeyPadding(t *testing.T) {
151
151
// test shared secret generation
152
152
sk1 , err := prv0 .GenerateShared (& prv1 .PublicKey , 16 , 16 )
153
153
if err != nil {
154
- fmt . Println (err .Error ())
154
+ t . Log (err .Error ())
155
155
}
156
156
157
157
sk2 , err := prv1 .GenerateShared (& prv0 .PublicKey , 16 , 16 )
@@ -169,25 +169,25 @@ func TestSharedKeyPadding(t *testing.T) {
169
169
func TestTooBigSharedKey (t * testing.T ) {
170
170
prv1 , err := GenerateKey (rand .Reader , DefaultCurve , nil )
171
171
if err != nil {
172
- fmt . Println (err .Error ())
172
+ t . Log (err .Error ())
173
173
t .FailNow ()
174
174
}
175
175
176
176
prv2 , err := GenerateKey (rand .Reader , DefaultCurve , nil )
177
177
if err != nil {
178
- fmt . Println (err .Error ())
178
+ t . Log (err .Error ())
179
179
t .FailNow ()
180
180
}
181
181
182
182
_ , err = prv1 .GenerateShared (& prv2 .PublicKey , 32 , 32 )
183
183
if err != ErrSharedKeyTooBig {
184
- fmt . Println ("ecdh: shared key should be too large for curve" )
184
+ t . Log ("ecdh: shared key should be too large for curve" )
185
185
t .FailNow ()
186
186
}
187
187
188
188
_ , err = prv2 .GenerateShared (& prv1 .PublicKey , 32 , 32 )
189
189
if err != ErrSharedKeyTooBig {
190
- fmt . Println ("ecdh: shared key should be too large for curve" )
190
+ t . Log ("ecdh: shared key should be too large for curve" )
191
191
t .FailNow ()
192
192
}
193
193
}
@@ -196,7 +196,7 @@ func TestTooBigSharedKey(t *testing.T) {
196
196
func BenchmarkGenerateKeyP256 (b * testing.B ) {
197
197
for i := 0 ; i < b .N ; i ++ {
198
198
if _ , err := GenerateKey (rand .Reader , elliptic .P256 (), nil ); err != nil {
199
- fmt . Println (err .Error ())
199
+ b . Log (err .Error ())
200
200
b .FailNow ()
201
201
}
202
202
}
@@ -206,14 +206,14 @@ func BenchmarkGenerateKeyP256(b *testing.B) {
206
206
func BenchmarkGenSharedKeyP256 (b * testing.B ) {
207
207
prv , err := GenerateKey (rand .Reader , elliptic .P256 (), nil )
208
208
if err != nil {
209
- fmt . Println (err .Error ())
209
+ b . Log (err .Error ())
210
210
b .FailNow ()
211
211
}
212
212
b .ResetTimer ()
213
213
for i := 0 ; i < b .N ; i ++ {
214
214
_ , err := prv .GenerateShared (& prv .PublicKey , 16 , 16 )
215
215
if err != nil {
216
- fmt . Println (err .Error ())
216
+ b . Log (err .Error ())
217
217
b .FailNow ()
218
218
}
219
219
}
@@ -223,14 +223,14 @@ func BenchmarkGenSharedKeyP256(b *testing.B) {
223
223
func BenchmarkGenSharedKeyS256 (b * testing.B ) {
224
224
prv , err := GenerateKey (rand .Reader , crypto .S256 (), nil )
225
225
if err != nil {
226
- fmt . Println (err .Error ())
226
+ b . Log (err .Error ())
227
227
b .FailNow ()
228
228
}
229
229
b .ResetTimer ()
230
230
for i := 0 ; i < b .N ; i ++ {
231
231
_ , err := prv .GenerateShared (& prv .PublicKey , 16 , 16 )
232
232
if err != nil {
233
- fmt . Println (err .Error ())
233
+ b . Log (err .Error ())
234
234
b .FailNow ()
235
235
}
236
236
}
@@ -240,37 +240,37 @@ func BenchmarkGenSharedKeyS256(b *testing.B) {
240
240
func TestEncryptDecrypt (t * testing.T ) {
241
241
prv1 , err := GenerateKey (rand .Reader , DefaultCurve , nil )
242
242
if err != nil {
243
- fmt . Println (err .Error ())
243
+ t . Log (err .Error ())
244
244
t .FailNow ()
245
245
}
246
246
247
247
prv2 , err := GenerateKey (rand .Reader , DefaultCurve , nil )
248
248
if err != nil {
249
- fmt . Println (err .Error ())
249
+ t . Log (err .Error ())
250
250
t .FailNow ()
251
251
}
252
252
253
253
message := []byte ("Hello, world." )
254
254
ct , err := Encrypt (rand .Reader , & prv2 .PublicKey , message , nil , nil )
255
255
if err != nil {
256
- fmt . Println (err .Error ())
256
+ t . Log (err .Error ())
257
257
t .FailNow ()
258
258
}
259
259
260
260
pt , err := prv2 .Decrypt (ct , nil , nil )
261
261
if err != nil {
262
- fmt . Println (err .Error ())
262
+ t . Log (err .Error ())
263
263
t .FailNow ()
264
264
}
265
265
266
266
if ! bytes .Equal (pt , message ) {
267
- fmt . Println ("ecies: plaintext doesn't match message" )
267
+ t . Log ("ecies: plaintext doesn't match message" )
268
268
t .FailNow ()
269
269
}
270
270
271
271
_ , err = prv1 .Decrypt (ct , nil , nil )
272
272
if err == nil {
273
- fmt . Println ("ecies: encryption should not have succeeded" )
273
+ t . Log ("ecies: encryption should not have succeeded" )
274
274
t .FailNow ()
275
275
}
276
276
}
@@ -341,48 +341,48 @@ func TestParamSelection(t *testing.T) {
341
341
func testParamSelection (t * testing.T , c testCase ) {
342
342
params := ParamsFromCurve (c .Curve )
343
343
if params == nil && c .Expected != nil {
344
- fmt . Printf ("%s (%s)\n " , ErrInvalidParams .Error (), c .Name )
344
+ t . Logf ("%s (%s)\n " , ErrInvalidParams .Error (), c .Name )
345
345
t .FailNow ()
346
346
} else if params != nil && ! cmpParams (params , c .Expected ) {
347
- fmt . Printf ("ecies: parameters should be invalid (%s)\n " ,
347
+ t . Logf ("ecies: parameters should be invalid (%s)\n " ,
348
348
c .Name )
349
349
t .FailNow ()
350
350
}
351
351
352
352
prv1 , err := GenerateKey (rand .Reader , DefaultCurve , nil )
353
353
if err != nil {
354
- fmt . Printf ("%s (%s)\n " , err .Error (), c .Name )
354
+ t . Logf ("%s (%s)\n " , err .Error (), c .Name )
355
355
t .FailNow ()
356
356
}
357
357
358
358
prv2 , err := GenerateKey (rand .Reader , DefaultCurve , nil )
359
359
if err != nil {
360
- fmt . Printf ("%s (%s)\n " , err .Error (), c .Name )
360
+ t . Logf ("%s (%s)\n " , err .Error (), c .Name )
361
361
t .FailNow ()
362
362
}
363
363
364
364
message := []byte ("Hello, world." )
365
365
ct , err := Encrypt (rand .Reader , & prv2 .PublicKey , message , nil , nil )
366
366
if err != nil {
367
- fmt . Printf ("%s (%s)\n " , err .Error (), c .Name )
367
+ t . Logf ("%s (%s)\n " , err .Error (), c .Name )
368
368
t .FailNow ()
369
369
}
370
370
371
371
pt , err := prv2 .Decrypt (ct , nil , nil )
372
372
if err != nil {
373
- fmt . Printf ("%s (%s)\n " , err .Error (), c .Name )
373
+ t . Logf ("%s (%s)\n " , err .Error (), c .Name )
374
374
t .FailNow ()
375
375
}
376
376
377
377
if ! bytes .Equal (pt , message ) {
378
- fmt . Printf ("ecies: plaintext doesn't match message (%s)\n " ,
378
+ t . Logf ("ecies: plaintext doesn't match message (%s)\n " ,
379
379
c .Name )
380
380
t .FailNow ()
381
381
}
382
382
383
383
_ , err = prv1 .Decrypt (ct , nil , nil )
384
384
if err == nil {
385
- fmt . Printf ("ecies: encryption should not have succeeded (%s)\n " ,
385
+ t . Logf ("ecies: encryption should not have succeeded (%s)\n " ,
386
386
c .Name )
387
387
t .FailNow ()
388
388
}
@@ -396,22 +396,22 @@ func TestBasicKeyValidation(t *testing.T) {
396
396
397
397
prv , err := GenerateKey (rand .Reader , DefaultCurve , nil )
398
398
if err != nil {
399
- fmt . Println (err .Error ())
399
+ t . Log (err .Error ())
400
400
t .FailNow ()
401
401
}
402
402
403
403
message := []byte ("Hello, world." )
404
404
ct , err := Encrypt (rand .Reader , & prv .PublicKey , message , nil , nil )
405
405
if err != nil {
406
- fmt . Println (err .Error ())
406
+ t . Log (err .Error ())
407
407
t .FailNow ()
408
408
}
409
409
410
410
for _ , b := range badBytes {
411
411
ct [0 ] = b
412
412
_ , err := prv .Decrypt (ct , nil , nil )
413
413
if err != ErrInvalidPublicKey {
414
- fmt . Println ("ecies: validated an invalid key" )
414
+ t . Log ("ecies: validated an invalid key" )
415
415
t .FailNow ()
416
416
}
417
417
}
@@ -450,18 +450,18 @@ func TestSharedKeyStatic(t *testing.T) {
450
450
451
451
sk1 , err := prv1 .GenerateShared (& prv2 .PublicKey , skLen , skLen )
452
452
if err != nil {
453
- fmt . Println (err .Error ())
453
+ t . Log (err .Error ())
454
454
t .FailNow ()
455
455
}
456
456
457
457
sk2 , err := prv2 .GenerateShared (& prv1 .PublicKey , skLen , skLen )
458
458
if err != nil {
459
- fmt . Println (err .Error ())
459
+ t . Log (err .Error ())
460
460
t .FailNow ()
461
461
}
462
462
463
463
if ! bytes .Equal (sk1 , sk2 ) {
464
- fmt . Println (ErrBadSharedKeys .Error ())
464
+ t . Log (ErrBadSharedKeys .Error ())
465
465
t .FailNow ()
466
466
}
467
467
0 commit comments