aboutsummaryrefslogtreecommitdiff
path: root/src/internal/boringtest/boring_test.go
diff options
context:
space:
mode:
authorRuss Cox <rsc@golang.org>2017-09-06 22:01:50 -0400
committerRuss Cox <rsc@golang.org>2017-09-14 23:40:36 +0000
commite8eec3fbdbfae1723c8302d23514faeb833ea8f4 (patch)
tree15d0960f58746f0bb0d2a48bf093da7cdd100bce /src/internal/boringtest/boring_test.go
parent7b49445d0fab71820314a2e5bdfba6b84b7f16d0 (diff)
downloadgo-e8eec3fbdbfae1723c8302d23514faeb833ea8f4.tar.gz
go-e8eec3fbdbfae1723c8302d23514faeb833ea8f4.zip
[dev.boringcrypto] cmd/compile: refine BoringCrypto kludge
Did not consider these fields being embedded or adopted into structs defined in other packages, but that's possible too. Refine the import path check to account for that. Fixes 'go test -short golang.org/x/crypto/ssh' but also adds a new test in internal/boring for the same problem. Change-Id: Ied2d04fe2b0ac3b0a34f07bc8dfc50fc203abb9f Reviewed-on: https://go-review.googlesource.com/62152 Reviewed-by: Ian Lance Taylor <iant@golang.org> Reviewed-by: Adam Langley <agl@golang.org>
Diffstat (limited to 'src/internal/boringtest/boring_test.go')
-rw-r--r--src/internal/boringtest/boring_test.go47
1 files changed, 47 insertions, 0 deletions
diff --git a/src/internal/boringtest/boring_test.go b/src/internal/boringtest/boring_test.go
new file mode 100644
index 0000000000..a6b07eda70
--- /dev/null
+++ b/src/internal/boringtest/boring_test.go
@@ -0,0 +1,47 @@
+// Copyright 2017 The Go Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style
+// license that can be found in the LICENSE file.
+
+// Like crypto/rsa/boring_test.go but outside the crypto/ tree.
+// Tests what happens if a package outside the crypto/ tree
+// "adopts" a struct definition. This happens in golang.org/x/crypto/ssh.
+
+package boring
+
+import (
+ "crypto/rand"
+ "crypto/rsa"
+ "encoding/asn1"
+ "reflect"
+ "testing"
+)
+
+type publicKey rsa.PublicKey
+
+func TestBoringASN1Marshal(t *testing.T) {
+ k, err := rsa.GenerateKey(rand.Reader, 128)
+ if err != nil {
+ t.Fatal(err)
+ }
+ pk := (*publicKey)(&k.PublicKey)
+ // This used to fail, because of the unexported 'boring' field.
+ // Now the compiler hides it [sic].
+ _, err = asn1.Marshal(*pk)
+ if err != nil {
+ t.Fatal(err)
+ }
+}
+
+func TestBoringDeepEqual(t *testing.T) {
+ k0, err := rsa.GenerateKey(rand.Reader, 128)
+ if err != nil {
+ t.Fatal(err)
+ }
+ k := (*publicKey)(&k0.PublicKey)
+ k2 := *k
+ rsa.EncryptPKCS1v15(rand.Reader, (*rsa.PublicKey)(&k2), []byte("hello")) // initialize hidden boring field
+ if !reflect.DeepEqual(k, &k2) {
+ // compiler should be hiding the boring field from reflection
+ t.Fatalf("DeepEqual compared boring fields")
+ }
+}