Jonathan Turner 8 anos atrás
pai
commit
548a45032d
93 arquivos alterados com 187 adições e 98 exclusões
  1. 3 2
      client/http.go
  2. 4 3
      client/network.go
  3. 1 1
      config/krb5conf.go
  4. 3 2
      credentials/ccache.go
  5. 2 1
      credentials/ccache_test.go
  6. 1 1
      credentials/credentials_test.go
  7. 2 1
      crypto/aes128-cts-hmac-sha1-96.go
  8. 2 1
      crypto/aes128-cts-hmac-sha1-96_test.go
  9. 2 1
      crypto/aes128-cts-hmac-sha256-128.go
  10. 3 2
      crypto/aes128-cts-hmac-sha256-128_test.go
  11. 2 1
      crypto/aes256-cts-hmac-sha1-96.go
  12. 2 1
      crypto/aes256-cts-hmac-sha1-96_test.go
  13. 2 1
      crypto/aes256-cts-hmac-sha384-192.go
  14. 3 2
      crypto/aes256-cts-hmac-sha384-192_test.go
  15. 1 0
      crypto/common/common.go
  16. 1 0
      crypto/crypto.go
  17. 2 1
      crypto/des3-cbc-sha1-kd.go
  18. 2 1
      crypto/des3-cbc-sha1-kd_test.go
  19. 3 2
      crypto/rc4-hmac.go
  20. 1 0
      crypto/rfc3961/encryption.go
  21. 1 1
      crypto/rfc3961/nfold.go
  22. 2 1
      crypto/rfc3961/nfold_test.go
  23. 2 1
      crypto/rfc3962/encryption.go
  24. 1 0
      crypto/rfc3962/keyDerivation.go
  25. 1 0
      crypto/rfc4757/encryption.go
  26. 2 1
      crypto/rfc4757/keyDerivation.go
  27. 2 1
      crypto/rfc4757/keyDerivation_test.go
  28. 2 1
      crypto/rfc8009/encryption.go
  29. 1 0
      crypto/rfc8009/keyDerivation.go
  30. 1 0
      gssapi/NegotiationToken.go
  31. 2 1
      gssapi/NegotiationToken_test.go
  32. 1 0
      gssapi/WrapToken.go
  33. 2 1
      gssapi/WrapToken_test.go
  34. 1 0
      gssapi/gssapi.go
  35. 2 1
      gssapi/gssapi_test.go
  36. 1 0
      gssapi/krb5Token.go
  37. 3 2
      gssapi/krb5Token_test.go
  38. 2 1
      keytab/keytab.go
  39. 3 2
      keytab/keytab_test.go
  40. 2 1
      messages/APRep.go
  41. 3 2
      messages/APRep_test.go
  42. 1 0
      messages/APReq.go
  43. 2 1
      messages/APReq_test.go
  44. 2 1
      messages/KDCRep.go
  45. 3 2
      messages/KDCRep_test.go
  46. 3 2
      messages/KDCReq_test.go
  47. 2 1
      messages/KRBCred.go
  48. 3 2
      messages/KRBCred_test.go
  49. 2 1
      messages/KRBError.go
  50. 3 2
      messages/KRBError_test.go
  51. 2 1
      messages/KRBPriv.go
  52. 3 2
      messages/KRBPriv_test.go
  53. 2 1
      messages/KRBSafe.go
  54. 3 2
      messages/KRBSafe_test.go
  55. 2 1
      messages/Ticket.go
  56. 3 2
      messages/Ticket_test.go
  57. 1 0
      mstypes/claims_set_metadata.go
  58. 2 1
      mstypes/filetime.go
  59. 1 0
      mstypes/group_membership.go
  60. 1 0
      mstypes/kerb_sid_and_attributes.go
  61. 1 0
      mstypes/rpc_unicode_string.go
  62. 1 0
      mstypes/sid.go
  63. 1 0
      mstypes/user_session_key.go
  64. 1 0
      pac/client_claims.go
  65. 1 0
      pac/client_info.go
  66. 3 2
      pac/client_info_test.go
  67. 1 0
      pac/credentials_info.go
  68. 1 0
      pac/device_claims.go
  69. 1 0
      pac/device_info.go
  70. 1 0
      pac/kerb_validation_info.go
  71. 3 2
      pac/kerb_validation_info_test.go
  72. 1 0
      pac/pac_info_buffer.go
  73. 1 0
      pac/pac_type.go
  74. 2 1
      pac/pac_type_test.go
  75. 1 0
      pac/s4u_delegation_info.go
  76. 1 0
      pac/signature_data.go
  77. 2 1
      pac/signature_data_test.go
  78. 2 1
      pac/upn_dns_info.go
  79. 2 1
      pac/upn_dns_info_test.go
  80. 2 1
      service/APExchange.go
  81. 3 2
      service/APExchange_test.go
  82. 3 2
      service/authenticator.go
  83. 1 1
      service/authenticator_test.go
  84. 3 2
      service/http.go
  85. 8 7
      service/http_test.go
  86. 4 3
      types/Authenticator.go
  87. 3 2
      types/Authenticator_test.go
  88. 2 1
      types/AuthorizationData_test.go
  89. 2 1
      types/Cryptosystem_test.go
  90. 2 1
      types/HostAddress.go
  91. 2 1
      types/PAData.go
  92. 3 2
      types/PAData_test.go
  93. 2 1
      types/TypedData_test.go

+ 3 - 2
client/http.go

@@ -3,13 +3,14 @@ package client
 import (
 	"encoding/base64"
 	"fmt"
+	"net/http"
+	"strings"
+
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"
 	"gopkg.in/jcmturner/gokrb5.v4/gssapi"
 	"gopkg.in/jcmturner/gokrb5.v4/krberror"
 	"gopkg.in/jcmturner/gokrb5.v4/messages"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"net/http"
-	"strings"
 )
 
 // SetSPNEGOHeader gets the service ticket and sets it as the SPNEGO authorization header on HTTP request object.

+ 4 - 3
client/network.go

@@ -5,15 +5,16 @@ import (
 	"encoding/binary"
 	"errors"
 	"fmt"
-	"gopkg.in/jcmturner/dnsutils.v1"
-	"gopkg.in/jcmturner/gokrb5.v4/iana/errorcode"
-	"gopkg.in/jcmturner/gokrb5.v4/messages"
 	"io"
 	"math/rand"
 	"net"
 	"strconv"
 	"strings"
 	"time"
+
+	"gopkg.in/jcmturner/dnsutils.v1"
+	"gopkg.in/jcmturner/gokrb5.v4/iana/errorcode"
+	"gopkg.in/jcmturner/gokrb5.v4/messages"
 )
 
 func (cl *Client) resolveKDC(realm string, tcp bool) (int, map[int]string, error) {

+ 1 - 1
config/krb5conf.go

@@ -7,6 +7,7 @@ import (
 	"errors"
 	"fmt"
 	"io"
+	"net"
 	"os"
 	"os/user"
 	"regexp"
@@ -16,7 +17,6 @@ import (
 
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"
-	"net"
 )
 
 // Config represents the KRB5 configuration.

+ 3 - 2
credentials/ccache.go

@@ -4,12 +4,13 @@ import (
 	"bytes"
 	"encoding/binary"
 	"errors"
-	"github.com/jcmturner/gofork/encoding/asn1"
-	"gopkg.in/jcmturner/gokrb5.v4/types"
 	"io/ioutil"
 	"strings"
 	"time"
 	"unsafe"
+
+	"github.com/jcmturner/gofork/encoding/asn1"
+	"gopkg.in/jcmturner/gokrb5.v4/types"
 )
 
 const (

+ 2 - 1
credentials/ccache_test.go

@@ -2,11 +2,12 @@ package credentials
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/nametype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"testing"
 )
 
 func TestParse(t *testing.T) {

+ 1 - 1
credentials/credentials_test.go

@@ -2,7 +2,7 @@ package credentials
 
 import (
 	"github.com/stretchr/testify/assert"
-	goidentity "gopkg.in/jcmturner/goidentity.v1"
+	"gopkg.in/jcmturner/goidentity.v1"
 	"testing"
 )
 

+ 2 - 1
crypto/aes128-cts-hmac-sha1-96.go

@@ -4,12 +4,13 @@ import (
 	"crypto/aes"
 	"crypto/hmac"
 	"crypto/sha1"
+	"hash"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc3961"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc3962"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/chksumtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"
-	"hash"
 )
 
 // RFC 3962

+ 2 - 1
crypto/aes128-cts-hmac-sha1-96_test.go

@@ -2,10 +2,11 @@ package crypto
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc3962"
-	"testing"
 )
 
 func TestAes128CtsHmacSha196_StringToKey(t *testing.T) {

+ 2 - 1
crypto/aes128-cts-hmac-sha256-128.go

@@ -4,11 +4,12 @@ import (
 	"crypto/aes"
 	"crypto/hmac"
 	"crypto/sha256"
+	"hash"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc8009"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/chksumtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"
-	"hash"
 )
 
 // RFC https://tools.ietf.org/html/rfc8009

+ 3 - 2
crypto/aes128-cts-hmac-sha256-128_test.go

@@ -2,10 +2,11 @@ package crypto
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc8009"
-	"testing"
 )
 
 func TestAes128CtsHmacSha256128_StringToKey(t *testing.T) {
@@ -25,7 +26,7 @@ func TestAes128CtsHmacSha256128_StringToKey(t *testing.T) {
 	var e Aes128CtsHmacSha256128
 	for _, test := range tests {
 		saltp := rfc8009.GetSaltP(test.salt, "aes128-cts-hmac-sha256-128")
-		assert.Equal(t, test.saltp, hex.EncodeToString(([]byte(saltp))), "SaltP not as expected")
+		assert.Equal(t, test.saltp, hex.EncodeToString([]byte(saltp)), "SaltP not as expected")
 
 		k, _ := e.StringToKey(test.phrase, test.salt, common.IterationsToS2Kparams(test.iterations))
 		assert.Equal(t, test.key, hex.EncodeToString(k), "String to Key not as expected")

+ 2 - 1
crypto/aes256-cts-hmac-sha1-96.go

@@ -4,12 +4,13 @@ import (
 	"crypto/aes"
 	"crypto/hmac"
 	"crypto/sha1"
+	"hash"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc3961"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc3962"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/chksumtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"
-	"hash"
 )
 
 // RFC 3962

+ 2 - 1
crypto/aes256-cts-hmac-sha1-96_test.go

@@ -2,10 +2,11 @@ package crypto
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc3962"
-	"testing"
 )
 
 func TestAes256CtsHmacSha196_StringToKey(t *testing.T) {

+ 2 - 1
crypto/aes256-cts-hmac-sha384-192.go

@@ -4,11 +4,12 @@ import (
 	"crypto/aes"
 	"crypto/hmac"
 	"crypto/sha512"
+	"hash"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc8009"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/chksumtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"
-	"hash"
 )
 
 // RFC https://tools.ietf.org/html/rfc8009

+ 3 - 2
crypto/aes256-cts-hmac-sha384-192_test.go

@@ -2,10 +2,11 @@ package crypto
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc8009"
-	"testing"
 )
 
 func TestAes256CtsHmacSha384192_StringToKey(t *testing.T) {
@@ -25,7 +26,7 @@ func TestAes256CtsHmacSha384192_StringToKey(t *testing.T) {
 	var e Aes256CtsHmacSha384192
 	for _, test := range tests {
 		saltp := rfc8009.GetSaltP(test.salt, "aes256-cts-hmac-sha384-192")
-		assert.Equal(t, test.saltp, hex.EncodeToString(([]byte(saltp))), "SaltP not as expected")
+		assert.Equal(t, test.saltp, hex.EncodeToString([]byte(saltp)), "SaltP not as expected")
 
 		k, _ := e.StringToKey(test.phrase, test.salt, common.IterationsToS2Kparams(test.iterations))
 		assert.Equal(t, test.key, hex.EncodeToString(k), "String to Key not as expected")

+ 1 - 0
crypto/common/common.go

@@ -8,6 +8,7 @@ import (
 	"encoding/hex"
 	"errors"
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/etype"
 )
 

+ 1 - 0
crypto/crypto.go

@@ -4,6 +4,7 @@ package crypto
 import (
 	"encoding/hex"
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/etype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/chksumtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"

+ 2 - 1
crypto/des3-cbc-sha1-kd.go

@@ -5,11 +5,12 @@ import (
 	"crypto/hmac"
 	"crypto/sha1"
 	"errors"
+	"hash"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc3961"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/chksumtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"
-	"hash"
 )
 
 //RFC: 3961 Section 6.3

+ 2 - 1
crypto/des3-cbc-sha1-kd_test.go

@@ -3,8 +3,9 @@ package crypto
 import (
 	"encoding/hex"
 	"fmt"
-	"github.com/stretchr/testify/assert"
 	"testing"
+
+	"github.com/stretchr/testify/assert"
 )
 
 func TestDes3CbcSha1Kd_DR_DK(t *testing.T) {

+ 3 - 2
crypto/rc4-hmac.go

@@ -3,13 +3,14 @@ package crypto
 import (
 	"bytes"
 	"crypto/md5"
+	"hash"
+	"io"
+
 	"golang.org/x/crypto/md4"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc3961"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/rfc4757"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/chksumtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"
-	"hash"
-	"io"
 )
 
 //http://grepcode.com/file/repository.grepcode.com/java/root/jdk/openjdk/8u40-b25/sun/security/krb5/internal/crypto/dk/ArcFourCrypto.java#ArcFourCrypto.encrypt%28byte%5B%5D%2Cint%2Cbyte%5B%5D%2Cbyte%5B%5D%2Cbyte%5B%5D%2Cint%2Cint%29

+ 1 - 0
crypto/rfc3961/encryption.go

@@ -8,6 +8,7 @@ import (
 	"crypto/rand"
 	"errors"
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/etype"
 )

+ 1 - 1
crypto/rfc3961/nfold.go

@@ -123,6 +123,6 @@ func setBit(b *[]byte, p, v int) {
 	pBit := uint(p % 8)
 	oldByte := (*b)[pByte]
 	var newByte byte
-	newByte = (byte((v << (8 - (pBit + 1)))) | oldByte)
+	newByte = byte(v<<(8-(pBit+1))) | oldByte
 	(*b)[pByte] = newByte
 }

+ 2 - 1
crypto/rfc3961/nfold_test.go

@@ -2,8 +2,9 @@ package rfc3961
 
 import (
 	"encoding/hex"
-	"github.com/stretchr/testify/assert"
 	"testing"
+
+	"github.com/stretchr/testify/assert"
 )
 
 func Test_nfold(t *testing.T) {

+ 2 - 1
crypto/rfc3962/encryption.go

@@ -5,7 +5,8 @@ import (
 	"crypto/rand"
 	"errors"
 	"fmt"
-	aescts "gopkg.in/jcmturner/aescts.v1"
+
+	"gopkg.in/jcmturner/aescts.v1"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/etype"
 )

+ 1 - 0
crypto/rfc3962/keyDerivation.go

@@ -4,6 +4,7 @@ import (
 	"encoding/binary"
 	"encoding/hex"
 	"errors"
+
 	"github.com/jcmturner/gofork/x/crypto/pbkdf2"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/etype"
 )

+ 1 - 0
crypto/rfc4757/encryption.go

@@ -7,6 +7,7 @@ import (
 	"crypto/rc4"
 	"errors"
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/etype"
 )
 

+ 2 - 1
crypto/rfc4757/keyDerivation.go

@@ -5,8 +5,9 @@ import (
 	"encoding/hex"
 	"errors"
 	"fmt"
-	"golang.org/x/crypto/md4"
 	"io"
+
+	"golang.org/x/crypto/md4"
 )
 
 // StringToKey returns a key derived from the string provided according to the definition in RFC 4757.

+ 2 - 1
crypto/rfc4757/keyDerivation_test.go

@@ -2,8 +2,9 @@ package rfc4757
 
 import (
 	"encoding/hex"
-	"github.com/stretchr/testify/assert"
 	"testing"
+
+	"github.com/stretchr/testify/assert"
 )
 
 const (

+ 2 - 1
crypto/rfc8009/encryption.go

@@ -7,7 +7,8 @@ import (
 	"crypto/rand"
 	"errors"
 	"fmt"
-	aescts "gopkg.in/jcmturner/aescts.v1"
+
+	"gopkg.in/jcmturner/aescts.v1"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/common"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/etype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"

+ 1 - 0
crypto/rfc8009/keyDerivation.go

@@ -5,6 +5,7 @@ import (
 	"encoding/binary"
 	"encoding/hex"
 	"errors"
+
 	"golang.org/x/crypto/pbkdf2"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto/etype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"

+ 1 - 0
gssapi/NegotiationToken.go

@@ -3,6 +3,7 @@ package gssapi
 import (
 	"errors"
 	"fmt"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"
 	"gopkg.in/jcmturner/gokrb5.v4/messages"

+ 2 - 1
gssapi/NegotiationToken_test.go

@@ -2,9 +2,10 @@ package gssapi
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"github.com/stretchr/testify/assert"
-	"testing"
 )
 
 const (

+ 1 - 0
gssapi/WrapToken.go

@@ -6,6 +6,7 @@ import (
 	"encoding/hex"
 	"errors"
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/keyusage"
 	"gopkg.in/jcmturner/gokrb5.v4/types"

+ 2 - 1
gssapi/WrapToken_test.go

@@ -3,10 +3,11 @@ package gssapi
 import (
 	"encoding/binary"
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/keyusage"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"testing"
 )
 
 const (

+ 1 - 0
gssapi/gssapi.go

@@ -4,6 +4,7 @@ package gssapi
 import (
 	"errors"
 	"fmt"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/asn1tools"
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"

+ 2 - 1
gssapi/gssapi_test.go

@@ -2,9 +2,10 @@ package gssapi
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"github.com/stretchr/testify/assert"
-	"testing"
 )
 
 const (

+ 1 - 0
gssapi/krb5Token.go

@@ -5,6 +5,7 @@ import (
 	"encoding/hex"
 	"errors"
 	"fmt"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/asn1tools"
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"

+ 3 - 2
gssapi/krb5Token_test.go

@@ -2,14 +2,15 @@ package gssapi
 
 import (
 	"encoding/hex"
+	"math"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/messages"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"math"
-	"testing"
 )
 
 const (

+ 2 - 1
keytab/keytab.go

@@ -6,11 +6,12 @@ import (
 	"encoding/binary"
 	"errors"
 	"fmt"
-	"gopkg.in/jcmturner/gokrb5.v4/types"
 	"io"
 	"io/ioutil"
 	"time"
 	"unsafe"
+
+	"gopkg.in/jcmturner/gokrb5.v4/types"
 )
 
 const (

+ 3 - 2
keytab/keytab_test.go

@@ -2,10 +2,11 @@ package keytab
 
 import (
 	"encoding/hex"
-	"github.com/stretchr/testify/assert"
-	"gopkg.in/jcmturner/gokrb5.v4/testdata"
 	"testing"
 	"time"
+
+	"github.com/stretchr/testify/assert"
+	"gopkg.in/jcmturner/gokrb5.v4/testdata"
 )
 
 func TestParse(t *testing.T) {

+ 2 - 1
messages/APRep.go

@@ -2,12 +2,13 @@ package messages
 
 import (
 	"fmt"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/asnAppTag"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/krberror"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"time"
 )
 
 /*

+ 3 - 2
messages/APRep_test.go

@@ -2,12 +2,13 @@ package messages
 
 import (
 	"encoding/hex"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 func TestUnmarshalAPRep(t *testing.T) {

+ 1 - 0
messages/APReq.go

@@ -2,6 +2,7 @@ package messages
 
 import (
 	"fmt"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/asn1tools"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto"

+ 2 - 1
messages/APReq_test.go

@@ -2,12 +2,13 @@ package messages
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/nametype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
 )
 
 func TestUnmarshalAPReq(t *testing.T) {

+ 2 - 1
messages/KDCRep.go

@@ -5,6 +5,8 @@ package messages
 
 import (
 	"fmt"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/config"
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"
@@ -16,7 +18,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/iana/patype"
 	"gopkg.in/jcmturner/gokrb5.v4/krberror"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"time"
 )
 
 type marshalKDCRep struct {

+ 3 - 2
messages/KDCRep_test.go

@@ -3,6 +3,9 @@ package messages
 import (
 	"encoding/hex"
 	"fmt"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
@@ -12,8 +15,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/iana/patype"
 	"gopkg.in/jcmturner/gokrb5.v4/keytab"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 const (

+ 3 - 2
messages/KDCReq_test.go

@@ -3,6 +3,9 @@ package messages
 import (
 	"encoding/hex"
 	"fmt"
+	"testing"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
@@ -11,8 +14,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/iana/nametype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/patype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 func TestUnmarshalKDCReqBody(t *testing.T) {

+ 2 - 1
messages/KRBCred.go

@@ -2,6 +2,8 @@ package messages
 
 import (
 	"fmt"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/asnAppTag"
@@ -9,7 +11,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/krberror"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"time"
 )
 
 type marshalKRBCred struct {

+ 3 - 2
messages/KRBCred_test.go

@@ -3,14 +3,15 @@ package messages
 import (
 	"encoding/hex"
 	"fmt"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/addrtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/nametype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 func TestUnmarshalKRBCred(t *testing.T) {

+ 2 - 1
messages/KRBError.go

@@ -3,6 +3,8 @@ package messages
 
 import (
 	"fmt"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/asnAppTag"
@@ -10,7 +12,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/krberror"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"time"
 )
 
 // KRBError implements RFC 4120 KRB_ERROR: https://tools.ietf.org/html/rfc4120#section-5.9.1.

+ 3 - 2
messages/KRBError_test.go

@@ -2,14 +2,15 @@ package messages
 
 import (
 	"encoding/hex"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/errorcode"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/nametype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 func TestUnmarshalKRBError(t *testing.T) {

+ 2 - 1
messages/KRBPriv.go

@@ -2,12 +2,13 @@ package messages
 
 import (
 	"fmt"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/asnAppTag"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/krberror"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"time"
 )
 
 // KRBPriv implements RFC 4120 type: https://tools.ietf.org/html/rfc4120#section-5.7.1.

+ 3 - 2
messages/KRBPriv_test.go

@@ -2,13 +2,14 @@ package messages
 
 import (
 	"encoding/hex"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/addrtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 func TestUnmarshalKRBPriv(t *testing.T) {

+ 2 - 1
messages/KRBSafe.go

@@ -2,12 +2,13 @@ package messages
 
 import (
 	"fmt"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/asnAppTag"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/krberror"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"time"
 )
 
 /*

+ 3 - 2
messages/KRBSafe_test.go

@@ -2,13 +2,14 @@ package messages
 
 import (
 	"encoding/hex"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/addrtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/msgtype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 func TestUnmarshalKRBSafe(t *testing.T) {

+ 2 - 1
messages/Ticket.go

@@ -3,6 +3,8 @@ package messages
 import (
 	"crypto/rand"
 	"fmt"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/asn1tools"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto"
@@ -15,7 +17,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/krberror"
 	"gopkg.in/jcmturner/gokrb5.v4/pac"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"time"
 )
 
 // Reference: https://www.ietf.org/rfc/rfc4120.txt

+ 3 - 2
messages/Ticket_test.go

@@ -3,6 +3,9 @@ package messages
 import (
 	"encoding/hex"
 	"fmt"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/addrtype"
@@ -12,8 +15,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/keytab"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"testing"
-	"time"
 )
 
 func TestUnmarshalTicket(t *testing.T) {

+ 1 - 0
mstypes/claims_set_metadata.go

@@ -2,6 +2,7 @@ package mstypes
 
 import (
 	"encoding/binary"
+
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )
 

+ 2 - 1
mstypes/filetime.go

@@ -3,8 +3,9 @@ package mstypes
 
 import (
 	"encoding/binary"
-	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 	"time"
+
+	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )
 
 /*

+ 1 - 0
mstypes/group_membership.go

@@ -2,6 +2,7 @@ package mstypes
 
 import (
 	"encoding/binary"
+
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )
 

+ 1 - 0
mstypes/kerb_sid_and_attributes.go

@@ -2,6 +2,7 @@ package mstypes
 
 import (
 	"encoding/binary"
+
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )
 

+ 1 - 0
mstypes/rpc_unicode_string.go

@@ -2,6 +2,7 @@ package mstypes
 
 import (
 	"encoding/binary"
+
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )
 

+ 1 - 0
mstypes/sid.go

@@ -4,6 +4,7 @@ import (
 	"encoding/binary"
 	"encoding/hex"
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )
 

+ 1 - 0
mstypes/user_session_key.go

@@ -2,6 +2,7 @@ package mstypes
 
 import (
 	"encoding/binary"
+
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )
 

+ 1 - 0
pac/client_claims.go

@@ -2,6 +2,7 @@ package pac
 
 import (
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/mstypes"
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )

+ 1 - 0
pac/client_info.go

@@ -2,6 +2,7 @@ package pac
 
 import (
 	"encoding/binary"
+
 	"gopkg.in/jcmturner/gokrb5.v4/mstypes"
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )

+ 3 - 2
pac/client_info_test.go

@@ -2,10 +2,11 @@ package pac
 
 import (
 	"encoding/hex"
-	"github.com/stretchr/testify/assert"
-	"gopkg.in/jcmturner/gokrb5.v4/testdata"
 	"testing"
 	"time"
+
+	"github.com/stretchr/testify/assert"
+	"gopkg.in/jcmturner/gokrb5.v4/testdata"
 )
 
 func TestPAC_ClientInfo_Unmarshal(t *testing.T) {

+ 1 - 0
pac/credentials_info.go

@@ -3,6 +3,7 @@ package pac
 import (
 	"encoding/binary"
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/keyusage"
 	"gopkg.in/jcmturner/gokrb5.v4/mstypes"

+ 1 - 0
pac/device_claims.go

@@ -2,6 +2,7 @@ package pac
 
 import (
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/mstypes"
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )

+ 1 - 0
pac/device_info.go

@@ -2,6 +2,7 @@ package pac
 
 import (
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/mstypes"
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )

+ 1 - 0
pac/kerb_validation_info.go

@@ -4,6 +4,7 @@ package pac
 import (
 	"errors"
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/mstypes"
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )

+ 3 - 2
pac/kerb_validation_info_test.go

@@ -2,11 +2,12 @@ package pac
 
 import (
 	"encoding/hex"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/mstypes"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 func TestKerbValidationInfo_Unmarshal(t *testing.T) {

+ 1 - 0
pac/pac_info_buffer.go

@@ -2,6 +2,7 @@ package pac
 
 import (
 	"encoding/binary"
+
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )
 

+ 1 - 0
pac/pac_type.go

@@ -4,6 +4,7 @@ import (
 	"encoding/binary"
 	"errors"
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/crypto"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/keyusage"
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"

+ 2 - 1
pac/pac_type_test.go

@@ -3,10 +3,11 @@ package pac
 import (
 	"encoding/hex"
 	"fmt"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/keytab"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
 )
 
 func TestPACTypeValidate(t *testing.T) {

+ 1 - 0
pac/s4u_delegation_info.go

@@ -2,6 +2,7 @@ package pac
 
 import (
 	"fmt"
+
 	"gopkg.in/jcmturner/gokrb5.v4/mstypes"
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )

+ 1 - 0
pac/signature_data.go

@@ -2,6 +2,7 @@ package pac
 
 import (
 	"encoding/binary"
+
 	"gopkg.in/jcmturner/gokrb5.v4/iana/chksumtype"
 	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )

+ 2 - 1
pac/signature_data_test.go

@@ -2,10 +2,11 @@ package pac
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/chksumtype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
 )
 
 func TestPAC_SignatureData_Unmarshal_Server_Signature(t *testing.T) {

+ 2 - 1
pac/upn_dns_info.go

@@ -2,8 +2,9 @@ package pac
 
 import (
 	"encoding/binary"
-	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 	"sort"
+
+	"gopkg.in/jcmturner/gokrb5.v4/ndr"
 )
 
 // UPNDNSInfo implements https://msdn.microsoft.com/en-us/library/dd240468.aspx

+ 2 - 1
pac/upn_dns_info_test.go

@@ -2,9 +2,10 @@ package pac
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
 )
 
 func TestUPN_DNSInfo_Unmarshal(t *testing.T) {

+ 2 - 1
service/APExchange.go

@@ -2,6 +2,8 @@ package service
 
 import (
 	"fmt"
+	"time"
+
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"
 	"gopkg.in/jcmturner/gokrb5.v4/crypto"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/errorcode"
@@ -11,7 +13,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/krberror"
 	"gopkg.in/jcmturner/gokrb5.v4/messages"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"time"
 )
 
 // ValidateAPREQ validates an AP_REQ sent to the service. Returns a boolean for if the AP_REQ is valid and the client's principal name and realm.

+ 3 - 2
service/APExchange_test.go

@@ -2,6 +2,9 @@ package service
 
 import (
 	"encoding/hex"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/client"
 	"gopkg.in/jcmturner/gokrb5.v4/config"
@@ -13,8 +16,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/messages"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"testing"
-	"time"
 )
 
 func TestValidateAPREQ(t *testing.T) {

+ 3 - 2
service/authenticator.go

@@ -4,14 +4,15 @@ import (
 	"encoding/base64"
 	"errors"
 	"fmt"
+	"strings"
+	"time"
+
 	goidentity "gopkg.in/jcmturner/goidentity.v1"
 	"gopkg.in/jcmturner/gokrb5.v4/client"
 	"gopkg.in/jcmturner/gokrb5.v4/config"
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"
 	"gopkg.in/jcmturner/gokrb5.v4/gssapi"
 	"gopkg.in/jcmturner/gokrb5.v4/keytab"
-	"strings"
-	"time"
 )
 
 // SPNEGOAuthenticator implements gopkg.in/jcmturner/goidentity.v1.Authenticator interface

+ 1 - 1
service/authenticator_test.go

@@ -2,7 +2,7 @@ package service
 
 import (
 	"github.com/stretchr/testify/assert"
-	goidentity "gopkg.in/jcmturner/goidentity.v1"
+	"gopkg.in/jcmturner/goidentity.v1"
 	"testing"
 )
 

+ 3 - 2
service/http.go

@@ -4,11 +4,12 @@ import (
 	"context"
 	"encoding/base64"
 	"fmt"
-	"gopkg.in/jcmturner/gokrb5.v4/gssapi"
-	"gopkg.in/jcmturner/gokrb5.v4/keytab"
 	"log"
 	"net/http"
 	"strings"
+
+	"gopkg.in/jcmturner/gokrb5.v4/gssapi"
+	"gopkg.in/jcmturner/gokrb5.v4/keytab"
 )
 
 type ctxKey int

+ 8 - 7
service/http_test.go

@@ -3,6 +3,14 @@ package service
 import (
 	"encoding/hex"
 	"fmt"
+	"io/ioutil"
+	"log"
+	"net/http"
+	"net/http/httptest"
+	"sync"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/client"
 	"gopkg.in/jcmturner/gokrb5.v4/credentials"
@@ -11,13 +19,6 @@ import (
 	"gopkg.in/jcmturner/gokrb5.v4/messages"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
 	"gopkg.in/jcmturner/gokrb5.v4/types"
-	"io/ioutil"
-	"log"
-	"net/http"
-	"net/http/httptest"
-	"sync"
-	"testing"
-	"time"
 )
 
 func TestService_SPNEGOKRB_NoAuthHeader(t *testing.T) {

+ 4 - 3
types/Authenticator.go

@@ -4,13 +4,14 @@ package types
 import (
 	"crypto/rand"
 	"fmt"
+	"math"
+	"math/big"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/asn1tools"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/asnAppTag"
-	"math"
-	"math/big"
-	"time"
 )
 
 /*Authenticator   ::= [APPLICATION 2] SEQUENCE  {

+ 3 - 2
types/Authenticator_test.go

@@ -3,13 +3,14 @@ package types
 import (
 	"encoding/hex"
 	"fmt"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/adtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/nametype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 func unmarshalAuthenticatorTest(t *testing.T, v string) Authenticator {

+ 2 - 1
types/AuthorizationData_test.go

@@ -3,11 +3,12 @@ package types
 import (
 	"encoding/hex"
 	"fmt"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/adtype"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/nametype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
 )
 
 func TestUnmarshalAuthorizationData(t *testing.T) {

+ 2 - 1
types/Cryptosystem_test.go

@@ -2,10 +2,11 @@ package types
 
 import (
 	"encoding/hex"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
 )
 
 func TestUnmarshalEncryptedData(t *testing.T) {

+ 2 - 1
types/HostAddress.go

@@ -6,9 +6,10 @@ package types
 import (
 	"bytes"
 	"fmt"
+	"net"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/addrtype"
-	"net"
 )
 
 /*

+ 2 - 1
types/PAData.go

@@ -4,9 +4,10 @@ package types
 // Section: 5.2.7
 import (
 	"fmt"
+	"time"
+
 	"github.com/jcmturner/gofork/encoding/asn1"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/patype"
-	"time"
 )
 
 // PAData implements RFC 4120 types: https://tools.ietf.org/html/rfc4120#section-5.2.7

+ 3 - 2
types/PAData_test.go

@@ -3,11 +3,12 @@ package types
 import (
 	"encoding/hex"
 	"fmt"
+	"testing"
+	"time"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/patype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
-	"time"
 )
 
 func TestUnmarshalPADataSequence(t *testing.T) {

+ 2 - 1
types/TypedData_test.go

@@ -3,10 +3,11 @@ package types
 import (
 	"encoding/hex"
 	"fmt"
+	"testing"
+
 	"github.com/stretchr/testify/assert"
 	"gopkg.in/jcmturner/gokrb5.v4/iana/patype"
 	"gopkg.in/jcmturner/gokrb5.v4/testdata"
-	"testing"
 )
 
 func TestUnmarshalTypedData(t *testing.T) {