aboutsummaryrefslogtreecommitdiff
path: root/tests/unittests/torture_pki_rsa.c
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cryptomilk.org>2018-06-28 17:52:58 +0200
committerAndreas Schneider <asn@cryptomilk.org>2018-06-29 14:41:14 +0200
commit206f3ff895d3d822ac4f23426136537129f9f062 (patch)
tree59728e18437ec9308d14a50082ef831b5b158612 /tests/unittests/torture_pki_rsa.c
parent81b4320318966e83678641a06717c301b071971b (diff)
downloadlibssh-206f3ff895d3d822ac4f23426136537129f9f062.tar.gz
libssh-206f3ff895d3d822ac4f23426136537129f9f062.tar.xz
libssh-206f3ff895d3d822ac4f23426136537129f9f062.zip
Rest in Peace SSHv1
Signed-off-by: Andreas Schneider <asn@cryptomilk.org> Reviewed-by: Jakub Jelen <jjelen@redhat.com>
Diffstat (limited to 'tests/unittests/torture_pki_rsa.c')
-rw-r--r--tests/unittests/torture_pki_rsa.c48
1 files changed, 1 insertions, 47 deletions
diff --git a/tests/unittests/torture_pki_rsa.c b/tests/unittests/torture_pki_rsa.c
index 1f4f8402..c265f88c 100644
--- a/tests/unittests/torture_pki_rsa.c
+++ b/tests/unittests/torture_pki_rsa.c
@@ -244,8 +244,7 @@ static void torture_pki_rsa_publickey_base64(void **state)
*p = '\0';
type = ssh_key_type_from_name(q);
- assert_true(((type == SSH_KEYTYPE_RSA) ||
- (type == SSH_KEYTYPE_RSA1)));
+ assert_true(type == SSH_KEYTYPE_RSA);
q = ++p;
while (*p != ' ') p++;
@@ -393,50 +392,6 @@ static void torture_pki_rsa_generate_key(void **state)
ssh_free(session);
}
-static void torture_pki_rsa_generate_key1(void **state)
-{
- int rc;
- ssh_key key;
- ssh_signature sign;
- ssh_session session=ssh_new();
- (void) state;
-
- rc = ssh_pki_generate(SSH_KEYTYPE_RSA1, 1024, &key);
- assert_true(rc == SSH_OK);
- assert_true(key != NULL);
- sign = pki_do_sign(key, RSA_HASH, 20);
- assert_true(sign != NULL);
- rc = pki_signature_verify(session,sign,key,RSA_HASH,20);
- assert_true(rc == SSH_OK);
- ssh_signature_free(sign);
- ssh_key_free(key);
- key=NULL;
-
- rc = ssh_pki_generate(SSH_KEYTYPE_RSA1, 2048, &key);
- assert_true(rc == SSH_OK);
- assert_true(key != NULL);
- sign = pki_do_sign(key, RSA_HASH, 20);
- assert_true(sign != NULL);
- rc = pki_signature_verify(session,sign,key,RSA_HASH,20);
- assert_true(rc == SSH_OK);
- ssh_signature_free(sign);
- ssh_key_free(key);
- key=NULL;
-
- rc = ssh_pki_generate(SSH_KEYTYPE_RSA1, 4096, &key);
- assert_true(rc == SSH_OK);
- assert_true(key != NULL);
- sign = pki_do_sign(key, RSA_HASH, 20);
- assert_true(sign != NULL);
- rc = pki_signature_verify(session,sign,key,RSA_HASH,20);
- assert_true(rc == SSH_OK);
- ssh_signature_free(sign);
- ssh_key_free(key);
- key=NULL;
-
- ssh_free(session);
-}
-
#ifdef HAVE_LIBCRYPTO
static void torture_pki_rsa_write_privkey(void **state)
{
@@ -595,7 +550,6 @@ int torture_run_tests(void) {
setup_rsa_key,
teardown),
cmocka_unit_test(torture_pki_rsa_generate_key),
- cmocka_unit_test(torture_pki_rsa_generate_key1),
#ifdef HAVE_LIBCRYPTO
cmocka_unit_test_setup_teardown(torture_pki_rsa_write_privkey,
setup_rsa_key,