chore: checkpoint before Python removal

This commit is contained in:
2026-03-26 22:33:59 +00:00
parent 683cec9307
commit e568ddf82a
29972 changed files with 11269302 additions and 2 deletions

Binary file not shown.

View File

@@ -0,0 +1,5 @@
-----BEGIN PRIVATE KEY-----
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgaWJBcVYaYzQN4OfY
afKgVJJVjhoEhotqn4VKhmeIGI2hRANCAAQcrP+1Xy8s79idies3SyaBFSRSgC3u
oJkWBoE32DnPf8SBpESSME1+9mrBF77+g6jQjxVfK1L59hjdRHApBI4P
-----END PRIVATE KEY-----

Binary file not shown.

View File

@@ -0,0 +1,4 @@
-----BEGIN PUBLIC KEY-----
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEHKz/tV8vLO/YnYnrN0smgRUkUoAt
7qCZFgaBN9g5z3/EgaREkjBNfvZqwRe+/oOo0I8VXytS+fYY3URwKQSODw==
-----END PUBLIC KEY-----

57
vendor/elliptic-curve/tests/pkcs8.rs vendored Normal file
View File

@@ -0,0 +1,57 @@
//! PKCS#8 tests
#![cfg(all(feature = "dev", feature = "pkcs8"))]
use elliptic_curve::{
dev::{PublicKey, SecretKey},
pkcs8::{DecodePrivateKey, DecodePublicKey, EncodePrivateKey},
sec1::ToEncodedPoint,
};
use hex_literal::hex;
use pkcs8::der;
/// DER-encoded PKCS#8 public key
const PKCS8_PUBLIC_KEY_DER: &[u8; 91] = include_bytes!("examples/pkcs8-public-key.der");
/// PEM-encoded PKCS#8 public key
#[cfg(feature = "pem")]
const PKCS8_PUBLIC_KEY_PEM: &str = include_str!("examples/pkcs8-public-key.pem");
/// Example encoded scalar value
const EXAMPLE_SCALAR: [u8; 32] =
hex!("AABBCCDDEEFF0000000000000000000000000000000000000000000000000001");
/// Example PKCS#8 private key
fn example_private_key() -> der::SecretDocument {
SecretKey::from_slice(&EXAMPLE_SCALAR)
.unwrap()
.to_pkcs8_der()
.unwrap()
}
#[test]
fn decode_pkcs8_private_key_from_der() {
dbg!(example_private_key().as_bytes());
let secret_key = SecretKey::from_pkcs8_der(example_private_key().as_bytes()).unwrap();
assert_eq!(secret_key.to_bytes().as_slice(), &EXAMPLE_SCALAR);
}
#[test]
fn decode_pkcs8_public_key_from_der() {
let public_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap();
let expected_sec1_point = hex!("041CACFFB55F2F2CEFD89D89EB374B2681152452802DEEA09916068137D839CF7FC481A44492304D7EF66AC117BEFE83A8D08F155F2B52F9F618DD447029048E0F");
assert_eq!(
public_key.to_encoded_point(false).as_bytes(),
&expected_sec1_point[..]
);
}
#[test]
#[cfg(feature = "pem")]
fn decode_pkcs8_public_key_from_pem() {
let public_key = PKCS8_PUBLIC_KEY_PEM.parse::<PublicKey>().unwrap();
// Ensure key parses equivalently to DER
let der_key = PublicKey::from_public_key_der(&PKCS8_PUBLIC_KEY_DER[..]).unwrap();
assert_eq!(public_key, der_key);
}

View File

@@ -0,0 +1,28 @@
//! Secret key tests
#![cfg(feature = "dev")]
use elliptic_curve::dev::SecretKey;
#[test]
fn from_empty_slice() {
assert!(SecretKey::from_slice(&[]).is_err());
}
#[test]
fn from_slice_expected_size() {
let bytes = [1u8; 32];
assert!(SecretKey::from_slice(&bytes).is_ok());
}
#[test]
fn from_slice_allowed_short() {
let bytes = [1u8; 24];
assert!(SecretKey::from_slice(&bytes).is_ok());
}
#[test]
fn from_slice_too_short() {
let bytes = [1u8; 23]; // min 24-bytes
assert!(SecretKey::from_slice(&bytes).is_err());
}