diff options
author | Andreas Schneider <asn@cryptomilk.org> | 2018-06-29 10:04:40 +0200 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2018-06-29 10:05:06 +0200 |
commit | f4ddf9df5338d15ec4ec21f4062f73e6caf12b7d (patch) | |
tree | 25841ed365c3cc6d3872982a7bc2b7a77fa6fceb | |
parent | d7477dc74563114aac3c30908e50edc399efb0fa (diff) | |
download | libssh-f4ddf9df5338d15ec4ec21f4062f73e6caf12b7d.tar.gz libssh-f4ddf9df5338d15ec4ec21f4062f73e6caf12b7d.tar.xz libssh-f4ddf9df5338d15ec4ec21f4062f73e6caf12b7d.zip |
tests: Fix key parsing in torture_pki_dsa_publickey_base64
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r-- | tests/unittests/torture_pki_dsa.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/tests/unittests/torture_pki_dsa.c b/tests/unittests/torture_pki_dsa.c index 836b2538..2bcbbc58 100644 --- a/tests/unittests/torture_pki_dsa.c +++ b/tests/unittests/torture_pki_dsa.c @@ -277,14 +277,14 @@ static void torture_pki_dsa_publickey_base64(void **state) assert_true(key_buf != NULL); q = p = key_buf; - while (*p != ' ') p++; + while (*p != '\0' && !isspace((int)*p)) p++; *p = '\0'; type = ssh_key_type_from_name(q); assert_true(type == SSH_KEYTYPE_DSS); q = ++p; - while (*p != ' ') p++; + while (*p != '\0' && !isspace((int)*p)) p++; *p = '\0'; rc = ssh_pki_import_pubkey_base64(q, type, &key); |