aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cryptomilk.org>2013-11-27 20:08:54 +0100
committerAndreas Schneider <asn@cryptomilk.org>2013-11-27 22:54:40 +0100
commit9773c0852af50da7f998c5232455adc23ba419f6 (patch)
treec4162cf8c24cde710881e95f0a4d36f5936deb49
parentf1c56e4309fdaeef611322321205bfe801efd14e (diff)
downloadlibssh-9773c0852af50da7f998c5232455adc23ba419f6.tar.gz
libssh-9773c0852af50da7f998c5232455adc23ba419f6.tar.xz
libssh-9773c0852af50da7f998c5232455adc23ba419f6.zip
tests: Add torture_pki_write_privkey_rsa test.
-rw-r--r--tests/unittests/torture_pki.c40
1 files changed, 40 insertions, 0 deletions
diff --git a/tests/unittests/torture_pki.c b/tests/unittests/torture_pki.c
index 7324177e..90f614ce 100644
--- a/tests/unittests/torture_pki.c
+++ b/tests/unittests/torture_pki.c
@@ -946,6 +946,43 @@ static void torture_pki_generate_key_ecdsa(void **state)
}
#endif
+static void torture_pki_write_privkey_rsa(void **state)
+{
+ ssh_key origkey;
+ ssh_key privkey;
+ int rc;
+
+ (void) state; /* unused */
+
+ ssh_set_log_level(5);
+
+ rc = ssh_pki_import_privkey_file(LIBSSH_RSA_TESTKEY,
+ NULL,
+ NULL,
+ NULL,
+ &origkey);
+ assert_true(rc == 0);
+
+ unlink(LIBSSH_RSA_TESTKEY);
+
+ rc = ssh_pki_export_privkey_file(origkey,
+ "",
+ NULL,
+ NULL,
+ LIBSSH_RSA_TESTKEY);
+ assert_true(rc == 0);
+
+ rc = ssh_pki_import_privkey_file(LIBSSH_RSA_TESTKEY,
+ NULL,
+ NULL,
+ NULL,
+ &privkey);
+ assert_true(rc == 0);
+
+ rc = ssh_key_cmp(origkey, privkey, SSH_KEY_CMP_PRIVATE);
+ assert_true(rc == 0);
+}
+
int torture_run_tests(void) {
int rc;
const UnitTest tests[] = {
@@ -1028,6 +1065,9 @@ int torture_run_tests(void) {
#ifdef HAVE_ECC
unit_test(torture_pki_generate_key_ecdsa),
#endif
+ unit_test_setup_teardown(torture_pki_write_privkey_rsa,
+ setup_rsa_key,
+ teardown),
};
(void)setup_both_keys;