aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cryptomilk.org>2018-01-09 22:00:51 +0100
committerAndreas Schneider <asn@cryptomilk.org>2018-01-10 22:31:02 +0100
commitf7a2330de7fe7a83b5f8971ccb747e8c31b35a5b (patch)
treee0b8fa31a49a5b8bb507185873cc000ef7efbc8a
parent67b8f3d6dfa2c631a92da74f483d24242621ac37 (diff)
downloadlibssh-f7a2330de7fe7a83b5f8971ccb747e8c31b35a5b.tar.gz
libssh-f7a2330de7fe7a83b5f8971ccb747e8c31b35a5b.tar.xz
libssh-f7a2330de7fe7a83b5f8971ccb747e8c31b35a5b.zip
torture_pki_rsa: Add tests for private key with passphrase
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r--tests/unittests/torture_pki_rsa.c42
1 files changed, 42 insertions, 0 deletions
diff --git a/tests/unittests/torture_pki_rsa.c b/tests/unittests/torture_pki_rsa.c
index b1dd97d0..54e459f9 100644
--- a/tests/unittests/torture_pki_rsa.c
+++ b/tests/unittests/torture_pki_rsa.c
@@ -12,6 +12,7 @@
#include "pki.c"
#define LIBSSH_RSA_TESTKEY "libssh_testkey.id_rsa"
+#define LIBSSH_RSA_TESTKEY_PASSPHRASE "libssh_testkey_passphrase.id_rsa"
const unsigned char RSA_HASH[] = "12345678901234567890";
@@ -20,11 +21,14 @@ static int setup_rsa_key(void **state)
(void) state; /* unused */
unlink(LIBSSH_RSA_TESTKEY);
+ unlink(LIBSSH_RSA_TESTKEY_PASSPHRASE);
unlink(LIBSSH_RSA_TESTKEY ".pub");
unlink(LIBSSH_RSA_TESTKEY "-cert.pub");
torture_write_file(LIBSSH_RSA_TESTKEY,
torture_get_testkey(SSH_KEYTYPE_RSA, 0, 0));
+ torture_write_file(LIBSSH_RSA_TESTKEY_PASSPHRASE,
+ torture_get_testkey(SSH_KEYTYPE_RSA, 0, 1));
torture_write_file(LIBSSH_RSA_TESTKEY ".pub",
torture_get_testkey_pub(SSH_KEYTYPE_RSA, 0));
torture_write_file(LIBSSH_RSA_TESTKEY "-cert.pub",
@@ -37,6 +41,7 @@ static int teardown(void **state) {
(void) state; /* unused */
unlink(LIBSSH_RSA_TESTKEY);
+ unlink(LIBSSH_RSA_TESTKEY_PASSPHRASE);
unlink(LIBSSH_RSA_TESTKEY ".pub");
unlink(LIBSSH_RSA_TESTKEY "-cert.pub");
@@ -452,6 +457,43 @@ static void torture_pki_rsa_write_privkey(void **state)
ssh_key_free(origkey);
ssh_key_free(privkey);
+
+ /* Test with passphrase */
+ rc = ssh_pki_import_privkey_file(LIBSSH_RSA_TESTKEY_PASSPHRASE,
+ torture_get_testkey_passphrase(),
+ NULL,
+ NULL,
+ &origkey);
+ assert_true(rc == 0);
+
+ unlink(LIBSSH_RSA_TESTKEY_PASSPHRASE);
+ rc = ssh_pki_export_privkey_file(origkey,
+ torture_get_testkey_passphrase(),
+ NULL,
+ NULL,
+ LIBSSH_RSA_TESTKEY_PASSPHRASE);
+ assert_true(rc == 0);
+
+ /* Test with invalid passphrase */
+ rc = ssh_pki_import_privkey_file(LIBSSH_RSA_TESTKEY_PASSPHRASE,
+ "invalid secret",
+ NULL,
+ NULL,
+ &privkey);
+ assert_true(rc == SSH_ERROR);
+
+ rc = ssh_pki_import_privkey_file(LIBSSH_RSA_TESTKEY_PASSPHRASE,
+ torture_get_testkey_passphrase(),
+ NULL,
+ NULL,
+ &privkey);
+ assert_true(rc == 0);
+
+ rc = ssh_key_cmp(origkey, privkey, SSH_KEY_CMP_PRIVATE);
+ assert_true(rc == 0);
+
+ ssh_key_free(origkey);
+ ssh_key_free(privkey);
}
#endif /* HAVE_LIBCRYPTO */