@@ -10,14 +10,13 @@ import (
10
10
"crypto/x509/pkix"
11
11
"encoding/asn1"
12
12
"encoding/pem"
13
- "io/ioutil"
14
13
"math"
14
+ "os"
15
15
"testing"
16
16
"time"
17
17
18
- "golang.org/x/crypto/ocsp"
19
-
20
18
"github.com/google/certificate-transparency-go"
19
+ "golang.org/x/crypto/ocsp"
21
20
)
22
21
23
22
const (
@@ -52,7 +51,7 @@ const (
52
51
func TestParseCertificatesDER (t * testing.T ) {
53
52
var password = []string {"password" , "" , "" }
54
53
for i , testFile := range []string {testPKCS12Passwordispassword , testPKCS12EmptyPswd , testCertDERFile } {
55
- testDER , err := ioutil .ReadFile (testFile )
54
+ testDER , err := os .ReadFile (testFile )
56
55
if err != nil {
57
56
t .Fatal (err )
58
57
}
@@ -65,7 +64,7 @@ func TestParseCertificatesDER(t *testing.T) {
65
64
}
66
65
}
67
66
68
- testDER , err := ioutil .ReadFile (testEmptyPKCS7DER )
67
+ testDER , err := os .ReadFile (testEmptyPKCS7DER )
69
68
if err != nil {
70
69
t .Fatal (err )
71
70
}
@@ -89,7 +88,7 @@ func TestKeyLength(t *testing.T) {
89
88
t .Fatal ("KeyLength malfunctioning on nonsense input" )
90
89
}
91
90
92
- //test the ecdsa branch
91
+ // test the ecdsa branch
93
92
ecdsaPriv , _ := ecdsa .GenerateKey (elliptic .P224 (), rand .Reader )
94
93
ecdsaIn , _ := ecdsaPriv .Public ().(* ecdsa.PublicKey )
95
94
expEcdsa := ecdsaIn .Curve .Params ().BitSize
@@ -98,7 +97,7 @@ func TestKeyLength(t *testing.T) {
98
97
t .Fatal ("KeyLength malfunctioning on ecdsa input" )
99
98
}
100
99
101
- //test the rsa branch
100
+ // test the rsa branch
102
101
rsaPriv , _ := rsa .GenerateKey (rand .Reader , 256 )
103
102
rsaIn , _ := rsaPriv .Public ().(* rsa.PublicKey )
104
103
expRsa := rsaIn .N .BitLen ()
@@ -118,8 +117,8 @@ func TestExpiryTime(t *testing.T) {
118
117
t .Fatal ("Expiry time is malfunctioning on empty input" )
119
118
}
120
119
121
- //read a pem file and use that expiry date
122
- bytes , _ := ioutil .ReadFile (testBundleFile )
120
+ // read a pem file and use that expiry date
121
+ bytes , _ := os .ReadFile (testBundleFile )
123
122
certs , err := ParseCertificatesPEM (bytes )
124
123
if err != nil {
125
124
t .Fatalf ("%v" , err )
@@ -269,7 +268,7 @@ func TestSignatureString(t *testing.T) {
269
268
270
269
func TestParseCertificatePEM (t * testing.T ) {
271
270
for _ , testFile := range []string {testCertFile , testExtraWSCertFile , testSinglePKCS7 } {
272
- certPEM , err := ioutil .ReadFile (testFile )
271
+ certPEM , err := os .ReadFile (testFile )
273
272
if err != nil {
274
273
t .Fatal (err )
275
274
}
@@ -280,7 +279,7 @@ func TestParseCertificatePEM(t *testing.T) {
280
279
}
281
280
}
282
281
for _ , testFile := range []string {testBundleFile , testMessedUpCertFile , testEmptyPKCS7PEM , testEmptyCertFile , testMultiplePKCS7 } {
283
- certPEM , err := ioutil .ReadFile (testFile )
282
+ certPEM , err := os .ReadFile (testFile )
284
283
if err != nil {
285
284
t .Fatal (err )
286
285
}
@@ -294,7 +293,7 @@ func TestParseCertificatePEM(t *testing.T) {
294
293
func TestParseCertificatesPEM (t * testing.T ) {
295
294
// expected cases
296
295
for _ , testFile := range []string {testBundleFile , testExtraWSBundleFile , testSinglePKCS7 , testMultiplePKCS7 } {
297
- bundlePEM , err := ioutil .ReadFile (testFile )
296
+ bundlePEM , err := os .ReadFile (testFile )
298
297
if err != nil {
299
298
t .Fatal (err )
300
299
}
@@ -308,7 +307,7 @@ func TestParseCertificatesPEM(t *testing.T) {
308
307
// test failure cases
309
308
// few lines deleted, then headers removed
310
309
for _ , testFile := range []string {testMessedUpBundleFile , testEmptyPKCS7PEM , testNoHeaderCert } {
311
- bundlePEM , err := ioutil .ReadFile (testFile )
310
+ bundlePEM , err := os .ReadFile (testFile )
312
311
if err != nil {
313
312
t .Fatal (err )
314
313
}
@@ -320,7 +319,7 @@ func TestParseCertificatesPEM(t *testing.T) {
320
319
}
321
320
322
321
func TestSelfSignedCertificatePEM (t * testing.T ) {
323
- testPEM , err := ioutil .ReadFile (testCertFile )
322
+ testPEM , err := os .ReadFile (testCertFile )
324
323
if err != nil {
325
324
t .Fatal (err )
326
325
}
@@ -330,7 +329,7 @@ func TestSelfSignedCertificatePEM(t *testing.T) {
330
329
}
331
330
332
331
// a few lines deleted from the pem file
333
- wrongPEM , err := ioutil .ReadFile (testMessedUpCertFile )
332
+ wrongPEM , err := os .ReadFile (testMessedUpCertFile )
334
333
if err != nil {
335
334
t .Fatal (err )
336
335
}
@@ -353,7 +352,7 @@ func TestSelfSignedCertificatePEM(t *testing.T) {
353
352
func TestParsePrivateKeyPEM (t * testing.T ) {
354
353
355
354
// expected cases
356
- testRSAPEM , err := ioutil .ReadFile (testPrivateRSAKey )
355
+ testRSAPEM , err := os .ReadFile (testPrivateRSAKey )
357
356
if err != nil {
358
357
t .Fatal (err )
359
358
}
@@ -362,7 +361,7 @@ func TestParsePrivateKeyPEM(t *testing.T) {
362
361
t .Fatal (err )
363
362
}
364
363
365
- testECDSAPEM , err := ioutil .ReadFile (testPrivateECDSAKey )
364
+ testECDSAPEM , err := os .ReadFile (testPrivateECDSAKey )
366
365
if err != nil {
367
366
t .Fatal (err )
368
367
}
@@ -371,7 +370,7 @@ func TestParsePrivateKeyPEM(t *testing.T) {
371
370
t .Fatal (err )
372
371
}
373
372
374
- testEd25519PEM , err := ioutil .ReadFile (testPrivateEd25519Key )
373
+ testEd25519PEM , err := os .ReadFile (testPrivateEd25519Key )
375
374
if err != nil {
376
375
t .Fatal (err )
377
376
}
@@ -381,7 +380,7 @@ func TestParsePrivateKeyPEM(t *testing.T) {
381
380
t .Fatal (err )
382
381
}
383
382
384
- testOpenSSLECKey , err := ioutil .ReadFile (testPrivateOpenSSLECKey )
383
+ testOpenSSLECKey , err := os .ReadFile (testPrivateOpenSSLECKey )
385
384
if err != nil {
386
385
t .Fatal (err )
387
386
}
@@ -400,7 +399,7 @@ func TestParsePrivateKeyPEM(t *testing.T) {
400
399
}
401
400
402
401
for _ , fname := range errCases {
403
- testPEM , _ := ioutil .ReadFile (fname )
402
+ testPEM , _ := os .ReadFile (fname )
404
403
_ , err = ParsePrivateKeyPEM (testPEM )
405
404
if err == nil {
406
405
t .Fatal ("Incorrect private key failed to produce an error" )
@@ -413,7 +412,7 @@ func TestParsePrivateKeyPEM(t *testing.T) {
413
412
const ecdsaTestCSR = "testdata/ecdsa256.csr"
414
413
415
414
func TestParseCSRPEM (t * testing.T ) {
416
- in , err := ioutil .ReadFile (ecdsaTestCSR )
415
+ in , err := os .ReadFile (ecdsaTestCSR )
417
416
if err != nil {
418
417
t .Fatalf ("%v" , err )
419
418
}
@@ -432,7 +431,7 @@ func TestParseCSRPEM(t *testing.T) {
432
431
}
433
432
434
433
func TestParseCSRPEMMore (t * testing.T ) {
435
- csrPEM , err := ioutil .ReadFile (testCSRPEM )
434
+ csrPEM , err := os .ReadFile (testCSRPEM )
436
435
if err != nil {
437
436
t .Fatal (err )
438
437
}
@@ -441,7 +440,7 @@ func TestParseCSRPEMMore(t *testing.T) {
441
440
t .Fatal (err )
442
441
}
443
442
444
- csrPEM , err = ioutil .ReadFile (testCSRPEMBad )
443
+ csrPEM , err = os .ReadFile (testCSRPEMBad )
445
444
if err != nil {
446
445
t .Fatal (err )
447
446
}
@@ -459,7 +458,7 @@ func TestParseCSRPEMMore(t *testing.T) {
459
458
const rsaOldTestCSR = "testdata/rsa-old.csr"
460
459
461
460
func TestParseOldCSR (t * testing.T ) {
462
- in , err := ioutil .ReadFile (rsaOldTestCSR )
461
+ in , err := os .ReadFile (rsaOldTestCSR )
463
462
if err != nil {
464
463
t .Fatalf ("%v" , err )
465
464
}
@@ -508,7 +507,7 @@ func TestLoadPEMCertPool(t *testing.T) {
508
507
t .Fatal ("Empty file name should not generate error or a cert pool" )
509
508
}
510
509
511
- in , err := ioutil .ReadFile (testEmptyPem )
510
+ in , err := os .ReadFile (testEmptyPem )
512
511
if err != nil {
513
512
t .Fatalf ("%v" , err )
514
513
}
@@ -519,7 +518,7 @@ func TestLoadPEMCertPool(t *testing.T) {
519
518
t .Fatal ("Expected error for empty file" )
520
519
}
521
520
522
- in , err = ioutil .ReadFile (testEmptyCertFile )
521
+ in , err = os .ReadFile (testEmptyCertFile )
523
522
if err != nil {
524
523
t .Fatalf ("%v" , err )
525
524
}
@@ -530,7 +529,7 @@ func TestLoadPEMCertPool(t *testing.T) {
530
529
t .Fatal ("Expected error for empty cert" )
531
530
}
532
531
533
- in , err = ioutil .ReadFile (clientCertFile )
532
+ in , err = os .ReadFile (clientCertFile )
534
533
if err != nil {
535
534
t .Fatalf ("%v" , err )
536
535
}
0 commit comments