diff options
author | Andreas Schneider <asn@cryptomilk.org> | 2018-01-10 21:47:09 +0100 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2018-01-10 22:31:02 +0100 |
commit | 9086d5ca33989755faeea655fbd8d07e01bf15ee (patch) | |
tree | 34f8184dce9e4b32e8ea8d916e5a560a0fa3e4a5 | |
parent | 3c65057fadacbc309b3780828818b50895fd8838 (diff) | |
download | libssh-9086d5ca33989755faeea655fbd8d07e01bf15ee.tar.gz libssh-9086d5ca33989755faeea655fbd8d07e01bf15ee.tar.xz libssh-9086d5ca33989755faeea655fbd8d07e01bf15ee.zip |
torture_pki_ecdsa: Add tests for private key with passphrase
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r-- | tests/unittests/torture_pki_ecdsa.c | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/tests/unittests/torture_pki_ecdsa.c b/tests/unittests/torture_pki_ecdsa.c index 18c5a78a..82b0ab06 100644 --- a/tests/unittests/torture_pki_ecdsa.c +++ b/tests/unittests/torture_pki_ecdsa.c @@ -11,6 +11,7 @@ #include "pki.c" #define LIBSSH_ECDSA_TESTKEY "libssh_testkey.id_ecdsa" +#define LIBSSH_ECDSA_TESTKEY_PASSPHRASE "libssh_testkey_passphrase.id_ecdsa" const unsigned char ECDSA_HASH[] = "12345678901234567890"; @@ -19,10 +20,13 @@ static int setup_ecdsa_key(void **state, int ecdsa_bits) (void) state; /* unused */ unlink(LIBSSH_ECDSA_TESTKEY); + unlink(LIBSSH_ECDSA_TESTKEY_PASSPHRASE); unlink(LIBSSH_ECDSA_TESTKEY ".pub"); torture_write_file(LIBSSH_ECDSA_TESTKEY, torture_get_testkey(SSH_KEYTYPE_ECDSA, ecdsa_bits, 0)); + torture_write_file(LIBSSH_ECDSA_TESTKEY_PASSPHRASE, + torture_get_testkey(SSH_KEYTYPE_ECDSA, ecdsa_bits, 0)); torture_write_file(LIBSSH_ECDSA_TESTKEY ".pub", torture_get_testkey_pub(SSH_KEYTYPE_ECDSA, ecdsa_bits)); @@ -55,6 +59,7 @@ static int teardown(void **state) (void) state; /* unused */ unlink(LIBSSH_ECDSA_TESTKEY); + unlink(LIBSSH_ECDSA_TESTKEY_PASSPHRASE); unlink(LIBSSH_ECDSA_TESTKEY ".pub"); return 0; @@ -372,6 +377,43 @@ static void torture_pki_ecdsa_write_privkey(void **state) ssh_key_free(origkey); ssh_key_free(privkey); + + /* Test with passphrase */ + rc = ssh_pki_import_privkey_file(LIBSSH_ECDSA_TESTKEY_PASSPHRASE, + torture_get_testkey_passphrase(), + NULL, + NULL, + &origkey); + assert_true(rc == 0); + + unlink(LIBSSH_ECDSA_TESTKEY_PASSPHRASE); + rc = ssh_pki_export_privkey_file(origkey, + torture_get_testkey_passphrase(), + NULL, + NULL, + LIBSSH_ECDSA_TESTKEY_PASSPHRASE); + assert_true(rc == 0); + + /* Test with invalid passphrase */ + rc = ssh_pki_import_privkey_file(LIBSSH_ECDSA_TESTKEY_PASSPHRASE, + "invalid secret", + NULL, + NULL, + &privkey); + assert_true(rc == SSH_ERROR); + + rc = ssh_pki_import_privkey_file(LIBSSH_ECDSA_TESTKEY_PASSPHRASE, + torture_get_testkey_passphrase(), + NULL, + NULL, + &privkey); + assert_true(rc == 0); + + rc = ssh_key_cmp(origkey, privkey, SSH_KEY_CMP_PRIVATE); + assert_true(rc == 0); + + ssh_key_free(origkey); + ssh_key_free(privkey); } static void torture_pki_ecdsa_name(void **state, const char *expected_name) |