| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364 | // Copyright 2014 The Go Authors. All rights reserved.// Use of this source code is governed by a BSD-style// license that can be found in the LICENSE file.// IMPLEMENTOR NOTE: To avoid a package loop, this file is in three places:// ssh/, ssh/agent, and ssh/test/. It should be kept in sync across all three// instances.package agentimport (	"crypto/rand"	"fmt"	"github.com/gogits/gogs/modules/crypto/ssh"	"github.com/gogits/gogs/modules/crypto/ssh/testdata")var (	testPrivateKeys map[string]interface{}	testSigners     map[string]ssh.Signer	testPublicKeys  map[string]ssh.PublicKey)func init() {	var err error	n := len(testdata.PEMBytes)	testPrivateKeys = make(map[string]interface{}, n)	testSigners = make(map[string]ssh.Signer, n)	testPublicKeys = make(map[string]ssh.PublicKey, n)	for t, k := range testdata.PEMBytes {		testPrivateKeys[t], err = ssh.ParseRawPrivateKey(k)		if err != nil {			panic(fmt.Sprintf("Unable to parse test key %s: %v", t, err))		}		testSigners[t], err = ssh.NewSignerFromKey(testPrivateKeys[t])		if err != nil {			panic(fmt.Sprintf("Unable to create signer for test key %s: %v", t, err))		}		testPublicKeys[t] = testSigners[t].PublicKey()	}	// Create a cert and sign it for use in tests.	testCert := &ssh.Certificate{		Nonce:           []byte{},                       // To pass reflect.DeepEqual after marshal & parse, this must be non-nil		ValidPrincipals: []string{"gopher1", "gopher2"}, // increases test coverage		ValidAfter:      0,                              // unix epoch		ValidBefore:     ssh.CertTimeInfinity,           // The end of currently representable time.		Reserved:        []byte{},                       // To pass reflect.DeepEqual after marshal & parse, this must be non-nil		Key:             testPublicKeys["ecdsa"],		SignatureKey:    testPublicKeys["rsa"],		Permissions: ssh.Permissions{			CriticalOptions: map[string]string{},			Extensions:      map[string]string{},		},	}	testCert.SignCert(rand.Reader, testSigners["rsa"])	testPrivateKeys["cert"] = testPrivateKeys["ecdsa"]	testSigners["cert"], err = ssh.NewCertSigner(testCert, testSigners["ecdsa"])	if err != nil {		panic(fmt.Sprintf("Unable to create certificate signer: %v", err))	}}
 |