mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-28 21:22:07 +00:00
upstream commit
remove SSHv1 support from unit tests Upstream-Regress-ID: 395ca2aa48f1f7d23eefff6cb849ea733ca8bbfe
This commit is contained in:
parent
e77e156271
commit
557f921aad
@ -1,4 +1,4 @@
|
||||
# $OpenBSD: Makefile.inc,v 1.10 2017/04/17 11:02:31 jsg Exp $
|
||||
# $OpenBSD: Makefile.inc,v 1.11 2017/04/30 23:33:48 djm Exp $
|
||||
|
||||
.include <bsd.own.mk>
|
||||
.include <bsd.obj.mk>
|
||||
|
@ -1,11 +1,11 @@
|
||||
#!/bin/sh
|
||||
# $OpenBSD: mktestdata.sh,v 1.1 2015/02/16 22:18:34 djm Exp $
|
||||
# $OpenBSD: mktestdata.sh,v 1.2 2017/04/30 23:33:48 djm Exp $
|
||||
|
||||
set -ex
|
||||
|
||||
cd testdata
|
||||
|
||||
rm -f rsa1* rsa* dsa* ecdsa* ed25519*
|
||||
rm -f rsa* dsa* ecdsa* ed25519*
|
||||
rm -f known_hosts*
|
||||
|
||||
gen_all() {
|
||||
@ -13,13 +13,12 @@ gen_all() {
|
||||
_ecdsa_bits=256
|
||||
test "x$_n" = "x1" && _ecdsa_bits=384
|
||||
test "x$_n" = "x2" && _ecdsa_bits=521
|
||||
ssh-keygen -qt rsa1 -b 1024 -C "RSA1 #$_n" -N "" -f rsa1_$_n
|
||||
ssh-keygen -qt rsa -b 1024 -C "RSA #$_n" -N "" -f rsa_$_n
|
||||
ssh-keygen -qt dsa -b 1024 -C "DSA #$_n" -N "" -f dsa_$_n
|
||||
ssh-keygen -qt ecdsa -b $_ecdsa_bits -C "ECDSA #$_n" -N "" -f ecdsa_$_n
|
||||
ssh-keygen -qt ed25519 -C "ED25519 #$_n" -N "" -f ed25519_$_n
|
||||
# Don't need private keys
|
||||
rm -f rsa1_$_n rsa_$_n dsa_$_n ecdsa_$_n ed25519_$_n
|
||||
rm -f rsa_$_n dsa_$_n ecdsa_$_n ed25519_$_n
|
||||
}
|
||||
|
||||
hentries() {
|
||||
@ -64,7 +63,6 @@ rm -f known_hosts_hash_frag.old
|
||||
echo
|
||||
|
||||
echo "# Revoked and CA keys"
|
||||
printf "@revoked sisyphus.example.com " ; cat rsa1_4.pub
|
||||
printf "@revoked sisyphus.example.com " ; cat ed25519_4.pub
|
||||
printf "@cert-authority prometheus.example.com " ; cat ecdsa_4.pub
|
||||
printf "@cert-authority *.example.com " ; cat dsa_4.pub
|
||||
@ -72,19 +70,13 @@ rm -f known_hosts_hash_frag.old
|
||||
printf "\n"
|
||||
echo "# Some invalid lines"
|
||||
# Invalid marker
|
||||
printf "@what sisyphus.example.com " ; cat rsa1_1.pub
|
||||
printf "@what sisyphus.example.com " ; cat dsa_1.pub
|
||||
# Key missing
|
||||
echo "sisyphus.example.com "
|
||||
# Key blob missing
|
||||
echo "prometheus.example.com ssh-ed25519 "
|
||||
# Key blob truncated
|
||||
echo "sisyphus.example.com ssh-dsa AAAATgAAAAdz"
|
||||
# RSA1 key truncated after key bits
|
||||
echo "prometheus.example.com 1024 "
|
||||
# RSA1 key truncated after exponent
|
||||
echo "sisyphus.example.com 1024 65535 "
|
||||
# RSA1 key incorrect key bits
|
||||
printf "prometheus.example.com 1025 " ; cut -d' ' -f2- < rsa1_1.pub
|
||||
# Invalid type
|
||||
echo "sisyphus.example.com ssh-XXX AAAATgAAAAdzc2gtWFhYAAAAP0ZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRg=="
|
||||
# Type mismatch with blob
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $OpenBSD: test_iterate.c,v 1.4 2015/03/31 22:59:01 djm Exp $ */
|
||||
/* $OpenBSD: test_iterate.c,v 1.5 2017/04/30 23:33:48 djm Exp $ */
|
||||
/*
|
||||
* Regress test for hostfile.h hostkeys_foreach()
|
||||
*
|
||||
@ -90,14 +90,6 @@ check(struct hostkey_foreach_line *l, void *_ctx)
|
||||
expected_keytype = (parse_key || expected->no_parse_keytype < 0) ?
|
||||
expected->l.keytype : expected->no_parse_keytype;
|
||||
|
||||
#ifndef WITH_SSH1
|
||||
if (parse_key && (expected->l.keytype == KEY_RSA1 ||
|
||||
expected->no_parse_keytype == KEY_RSA1)) {
|
||||
expected_status = HKF_STATUS_INVALID;
|
||||
expected_keytype = KEY_UNSPEC;
|
||||
parse_key = 0;
|
||||
}
|
||||
#endif
|
||||
#ifndef OPENSSL_HAS_ECC
|
||||
if (expected->l.keytype == KEY_ECDSA ||
|
||||
expected->no_parse_keytype == KEY_ECDSA) {
|
||||
@ -150,10 +142,6 @@ prepare_expected(struct expected *expected, size_t n)
|
||||
for (i = 0; i < n; i++) {
|
||||
if (expected[i].key_file == NULL)
|
||||
continue;
|
||||
#ifndef WITH_SSH1
|
||||
if (expected[i].l.keytype == KEY_RSA1)
|
||||
continue;
|
||||
#endif
|
||||
#ifndef OPENSSL_HAS_ECC
|
||||
if (expected[i].l.keytype == KEY_ECDSA)
|
||||
continue;
|
||||
@ -217,22 +205,9 @@ struct expected expected_full[] = {
|
||||
NULL, /* filled at runtime */
|
||||
"ED25519 #1",
|
||||
} },
|
||||
{ "rsa1_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, {
|
||||
NULL,
|
||||
5,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
"sisyphus.example.com",
|
||||
NULL,
|
||||
KEY_RSA1,
|
||||
NULL, /* filled at runtime */
|
||||
"RSA1 #1",
|
||||
} },
|
||||
{ "rsa_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, {
|
||||
NULL,
|
||||
6,
|
||||
5,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -245,7 +220,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
7,
|
||||
6,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"",
|
||||
@ -258,7 +233,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
8,
|
||||
7,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"# Plain host keys, hostnames + addresses",
|
||||
@ -271,7 +246,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "dsa_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
9,
|
||||
8,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -284,7 +259,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ecdsa_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
10,
|
||||
9,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -297,7 +272,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ed25519_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
11,
|
||||
10,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -308,22 +283,9 @@ struct expected expected_full[] = {
|
||||
NULL, /* filled at runtime */
|
||||
"ED25519 #2",
|
||||
} },
|
||||
{ "rsa1_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
12,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
"prometheus.example.com,192.0.2.1,2001:db8::1",
|
||||
NULL,
|
||||
KEY_RSA1,
|
||||
NULL, /* filled at runtime */
|
||||
"RSA1 #2",
|
||||
} },
|
||||
{ "rsa_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
13,
|
||||
11,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -336,7 +298,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
14,
|
||||
12,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"",
|
||||
@ -349,7 +311,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
15,
|
||||
13,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"# Some hosts with wildcard names / IPs",
|
||||
@ -362,7 +324,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "dsa_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
16,
|
||||
14,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -375,7 +337,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ecdsa_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
17,
|
||||
15,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -388,7 +350,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ed25519_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
18,
|
||||
16,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -399,22 +361,9 @@ struct expected expected_full[] = {
|
||||
NULL, /* filled at runtime */
|
||||
"ED25519 #3",
|
||||
} },
|
||||
{ "rsa1_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
19,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
"*.example.com,192.0.2.*,2001:*",
|
||||
NULL,
|
||||
KEY_RSA1,
|
||||
NULL, /* filled at runtime */
|
||||
"RSA1 #3",
|
||||
} },
|
||||
{ "rsa_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
|
||||
NULL,
|
||||
20,
|
||||
17,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -427,7 +376,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
21,
|
||||
18,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"",
|
||||
@ -440,7 +389,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
22,
|
||||
19,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"# Hashed hostname and address entries",
|
||||
@ -453,7 +402,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "dsa_5.pub" , -1, -1, 0, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, -1, {
|
||||
NULL,
|
||||
23,
|
||||
20,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -466,7 +415,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ecdsa_5.pub" , -1, -1, 0, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, -1, {
|
||||
NULL,
|
||||
24,
|
||||
21,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -479,7 +428,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ed25519_5.pub" , -1, -1, 0, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, -1, {
|
||||
NULL,
|
||||
25,
|
||||
22,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -490,22 +439,9 @@ struct expected expected_full[] = {
|
||||
NULL, /* filled at runtime */
|
||||
"ED25519 #5",
|
||||
} },
|
||||
{ "rsa1_5.pub" , -1, -1, 0, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, -1, {
|
||||
NULL,
|
||||
26,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
NULL,
|
||||
NULL,
|
||||
KEY_RSA1,
|
||||
NULL, /* filled at runtime */
|
||||
"RSA1 #5",
|
||||
} },
|
||||
{ "rsa_5.pub" , -1, -1, 0, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, -1, {
|
||||
NULL,
|
||||
27,
|
||||
23,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -518,7 +454,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
28,
|
||||
24,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"",
|
||||
@ -536,7 +472,7 @@ struct expected expected_full[] = {
|
||||
*/
|
||||
{ "dsa_6.pub" , -1, -1, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
29,
|
||||
25,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -549,7 +485,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "dsa_6.pub" , -1, -1, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, 0, -1, {
|
||||
NULL,
|
||||
30,
|
||||
26,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -562,7 +498,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "dsa_6.pub" , -1, -1, 0, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, -1, {
|
||||
NULL,
|
||||
31,
|
||||
27,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -575,7 +511,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ecdsa_6.pub" , -1, -1, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
32,
|
||||
28,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -588,7 +524,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ecdsa_6.pub" , -1, -1, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, 0, -1, {
|
||||
NULL,
|
||||
33,
|
||||
29,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -601,7 +537,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ecdsa_6.pub" , -1, -1, 0, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, -1, {
|
||||
NULL,
|
||||
34,
|
||||
30,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -614,7 +550,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ed25519_6.pub" , -1, -1, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
35,
|
||||
31,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -627,7 +563,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ed25519_6.pub" , -1, -1, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, 0, -1, {
|
||||
NULL,
|
||||
36,
|
||||
32,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -640,7 +576,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ed25519_6.pub" , -1, -1, 0, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, -1, {
|
||||
NULL,
|
||||
37,
|
||||
33,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -651,48 +587,9 @@ struct expected expected_full[] = {
|
||||
NULL, /* filled at runtime */
|
||||
"ED25519 #6",
|
||||
} },
|
||||
{ "rsa1_6.pub" , -1, -1, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
38,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
NULL,
|
||||
NULL,
|
||||
KEY_RSA1,
|
||||
NULL, /* filled at runtime */
|
||||
"RSA1 #6",
|
||||
} },
|
||||
{ "rsa1_6.pub" , -1, -1, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, 0, -1, {
|
||||
NULL,
|
||||
39,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
NULL,
|
||||
NULL,
|
||||
KEY_RSA1,
|
||||
NULL, /* filled at runtime */
|
||||
"RSA1 #6",
|
||||
} },
|
||||
{ "rsa1_6.pub" , -1, -1, 0, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, -1, {
|
||||
NULL,
|
||||
40,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
NULL,
|
||||
NULL,
|
||||
KEY_RSA1,
|
||||
NULL, /* filled at runtime */
|
||||
"RSA1 #6",
|
||||
} },
|
||||
{ "rsa_6.pub" , -1, -1, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
41,
|
||||
34,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -705,7 +602,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "rsa_6.pub" , -1, -1, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, 0, -1, {
|
||||
NULL,
|
||||
42,
|
||||
35,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -718,7 +615,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "rsa_6.pub" , -1, -1, 0, 0, 0, HKF_MATCH_IP|HKF_MATCH_IP_HASHED, -1, {
|
||||
NULL,
|
||||
43,
|
||||
36,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -731,7 +628,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
44,
|
||||
37,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"",
|
||||
@ -744,7 +641,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
45,
|
||||
38,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"",
|
||||
@ -757,7 +654,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
46,
|
||||
39,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"# Revoked and CA keys",
|
||||
@ -768,22 +665,9 @@ struct expected expected_full[] = {
|
||||
NULL,
|
||||
NULL,
|
||||
} },
|
||||
{ "rsa1_4.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, {
|
||||
NULL,
|
||||
47,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
MRK_REVOKE,
|
||||
"sisyphus.example.com",
|
||||
NULL,
|
||||
KEY_RSA1,
|
||||
NULL, /* filled at runtime */
|
||||
"RSA1 #4",
|
||||
} },
|
||||
{ "ed25519_4.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, {
|
||||
NULL,
|
||||
48,
|
||||
40,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -796,7 +680,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "ecdsa_4.pub" , -1, -1, HKF_MATCH_HOST, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
49,
|
||||
41,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -809,7 +693,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ "dsa_4.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, 0, 0, -1, {
|
||||
NULL,
|
||||
50,
|
||||
42,
|
||||
HKF_STATUS_OK,
|
||||
0,
|
||||
NULL,
|
||||
@ -822,7 +706,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
51,
|
||||
43,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"",
|
||||
@ -835,7 +719,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
52,
|
||||
44,
|
||||
HKF_STATUS_COMMENT,
|
||||
0,
|
||||
"# Some invalid lines",
|
||||
@ -848,7 +732,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
53,
|
||||
45,
|
||||
HKF_STATUS_INVALID,
|
||||
0,
|
||||
NULL,
|
||||
@ -861,7 +745,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, {
|
||||
NULL,
|
||||
54,
|
||||
46,
|
||||
HKF_STATUS_INVALID,
|
||||
0,
|
||||
NULL,
|
||||
@ -874,7 +758,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, HKF_MATCH_HOST, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
55,
|
||||
47,
|
||||
HKF_STATUS_INVALID,
|
||||
0,
|
||||
NULL,
|
||||
@ -887,7 +771,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, {
|
||||
NULL,
|
||||
56,
|
||||
48,
|
||||
HKF_STATUS_INVALID, /* Would be ok if key not parsed */
|
||||
0,
|
||||
NULL,
|
||||
@ -898,48 +782,9 @@ struct expected expected_full[] = {
|
||||
NULL,
|
||||
NULL,
|
||||
} },
|
||||
{ NULL, -1, -1, HKF_MATCH_HOST, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
57,
|
||||
HKF_STATUS_INVALID, /* Would be ok if key not parsed */
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
"prometheus.example.com",
|
||||
NULL,
|
||||
KEY_UNSPEC,
|
||||
NULL,
|
||||
NULL,
|
||||
} },
|
||||
{ NULL, HKF_STATUS_OK, KEY_RSA1, 0, HKF_MATCH_HOST, 0, 0, -1, {
|
||||
NULL,
|
||||
58,
|
||||
HKF_STATUS_INVALID, /* Would be ok if key not parsed */
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
"sisyphus.example.com",
|
||||
NULL,
|
||||
KEY_UNSPEC,
|
||||
NULL,
|
||||
NULL,
|
||||
} },
|
||||
{ NULL, HKF_STATUS_OK, KEY_RSA1, HKF_MATCH_HOST, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
59,
|
||||
HKF_STATUS_INVALID, /* Would be ok if key not parsed */
|
||||
0,
|
||||
NULL,
|
||||
MRK_NONE,
|
||||
"prometheus.example.com",
|
||||
NULL,
|
||||
KEY_UNSPEC,
|
||||
NULL, /* filled at runtime */
|
||||
NULL,
|
||||
} },
|
||||
{ NULL, -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, {
|
||||
NULL,
|
||||
60,
|
||||
49,
|
||||
HKF_STATUS_INVALID,
|
||||
0,
|
||||
NULL,
|
||||
@ -952,7 +797,7 @@ struct expected expected_full[] = {
|
||||
} },
|
||||
{ NULL, HKF_STATUS_OK, KEY_RSA, HKF_MATCH_HOST, 0, 0, 0, -1, {
|
||||
NULL,
|
||||
61,
|
||||
50,
|
||||
HKF_STATUS_INVALID, /* Would be ok if key not parsed */
|
||||
0,
|
||||
NULL,
|
||||
|
45
regress/unittests/hostkeys/testdata/known_hosts
vendored
45
regress/unittests/hostkeys/testdata/known_hosts
vendored
@ -2,60 +2,49 @@
|
||||
sisyphus.example.com ssh-dss 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 DSA #1
|
||||
sisyphus.example.com ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBF6yQEtD9yBw9gmDRf477WBBzvWhAa0ioBI3nbA4emKykj0RbuQd5C4XdQAEOZGzE7v//FcCjwB2wi+JH5eKkxCtN6CjohDASZ1huoIV2UVyYIicZJEEOg1IWjjphvaxtw== ECDSA #1
|
||||
sisyphus.example.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK9ks7jkua5YWIwByRnnnc6UPJQWI75O0e/UJdPYU1JI ED25519 #1
|
||||
sisyphus.example.com 1024 65537 153895431603677073925890314548566704948446776958334195280085080329934839226701954473292358821568047724356487621573742372399387931887004184139835510820577359977148363519970774657801798872789118894962853659233045778161859413980935372685480527355016624825696983269800574755126132814333241868538220824608980319407 RSA1 #1
|
||||
sisyphus.example.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDg4hB4vAZHJ0PVRiJajOv/GlytFWNpv5/9xgB9+5BIbvp8LOrFZ5D9K0Gsmwpd4G4rfaAz8j896DhMArg0vtkilIPPGt/6VzWMERgvaIQPJ/IE99X3+fjcAG56oAWwy29JX10lQMzBPU6XJIaN/zqpkb6qUBiAHBdLpxrFBBU0/w== RSA #1
|
||||
|
||||
# Plain host keys, hostnames + addresses
|
||||
prometheus.example.com,192.0.2.1,2001:db8::1 ssh-dss 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 DSA #2
|
||||
prometheus.example.com,192.0.2.1,2001:db8::1 ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAB8qVcXwgBM92NCmReQlPrZAoui4Bz/mW0VUBFOpHXXW1n+15b/Y7Pc6UBd/ITTZmaBciXY+PWaSBGdwc5GdqGdLgFyJ/QAGrFMPNpVutm/82gNQzlxpNwjbMcKyiZEXzSgnjS6DzMQ0WuSMdzIBXq8OW/Kafxg4ZkU6YqALUXxlQMZuQ== ECDSA #2
|
||||
prometheus.example.com,192.0.2.1,2001:db8::1 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIBp6PVW0z2o9C4Ukv/JOgmK7QMFe1pD1s3ADFF7IQob ED25519 #2
|
||||
prometheus.example.com,192.0.2.1,2001:db8::1 1024 65537 135970715082947442639683969597180728933388298633245835186618852623800675939308729462220235058285909679252157995530180587329132927339620517781785310829060832352381015614725360278571924286986474946772141568893116432268565829418506866604294073334978275702221949783314402806080929601995102334442541344606109853641 RSA1 #2
|
||||
prometheus.example.com,192.0.2.1,2001:db8::1 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDmbUhNabB5AmBDX6GNHZ3lbn7pRxqfpW+f53QqNGlK0sLV+0gkMIrOfUp1kdE2ZLE6tfzdicatj/RlH6/wuo4yyYb+Pyx3G0vxdmAIiA4aANq38XweDucBC0TZkRWVHK+Gs5V/uV0z7N0axJvkkJujMLvST3CRiiWwlficBc6yVQ== RSA #2
|
||||
|
||||
# Some hosts with wildcard names / IPs
|
||||
*.example.com,192.0.2.*,2001:* ssh-dss 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 DSA #3
|
||||
*.example.com,192.0.2.*,2001:* ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIb3BhJZk+vUQPg5TQc1koIzuGqloCq7wjr9LjlhG24IBeiFHLsdWw74HDlH4DrOmlxToVYk2lTdnjARleRByjk= ECDSA #3
|
||||
*.example.com,192.0.2.*,2001:* ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBlYfExtYZAPqYvYdrlpGlSWhh/XNHcH3v3c2JzsVNbB ED25519 #3
|
||||
*.example.com,192.0.2.*,2001:* 1024 65537 125895605498029643697051635076028105429632810811904702876152645261610759866299221305725069141163240694267669117205342283569102183636228981857946763978553664895308762890072813014496700601576921921752482059207749978374872713540759920335553799711267170948655579130584031555334229966603000896364091459595522912269 RSA1 #3
|
||||
*.example.com,192.0.2.*,2001:* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQDX8F93W3SH4ZSus4XUQ2cw9dqcuyUETTlKEeGv3zlknV3YCoe2Mp04naDhiuwj8sOsytrZSESzLY1ZEyzrjxE6ZFVv8NKgck/AbRjcwlRFOcx9oKUxOrXRa0IoXlTq0kyjKCJfaHBKnGitZThknCPTbVmpATkm5xx6J0WEDozfoQ== RSA #3
|
||||
|
||||
# Hashed hostname and address entries
|
||||
|1|6FWxoqTCAfm8sZ7T/q73OmxCFGM=|S4eQmusok4cbyDzzGEFGIAthDbw= ssh-dss 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 DSA #5
|
||||
|1|hTrfD0CuuB9ZbOa1CHFYvIk/gKE=|tPmW50t7flncm1UyM+DR97ubDNU= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPIudcagzq4QPtP1jkpje34+0POLB0jwT64hqrbCqhTH2T800KDZ0h2vwlJYa3OP3Oqru9AB5pnuHsKw7mAhUGY= ECDSA #5
|
||||
|1|fOGqe75X5ZpTz4c7DitP4E8/y30=|Lmcch2fh54bUYoV//S2VqDFVeiY= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINf63qSV8rD57N+digID8t28WVhd3Yf2K2UhaoG8TsWQ ED25519 #5
|
||||
|1|0RVzLjY3lwE3MRweguaAXaCCWk8=|DbcIgJQcRZJMYI6NYDOM6oJycPk= 1024 65537 127931411493401587586867047972295564331543694182352197506125410692673654572057908999642645524647232712160516076508316152810117209181150078352725299319149726341058893406440426414316276977768958023952319602422835879783057966985348561111880658922724668687074412548487722084792283453716871417610020757212399252171 RSA1 #5
|
||||
|1|4q79XnHpKBNQhyMLAqbPPDN+JKo=|k1Wvjjb52zDdrXWM801+wX5oH8U= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQC/C15Q4sfnk7BZff1er8bscay+5s51oD4eWArlHWMK/ZfYeeTAccTy+7B7Jv+MS4nKCpflrvJI2RQz4kS8vF0ATdBbi4jeWefStlHNg0HLhnCY7NAfDIlRdaN9lm3Pqm2vmr+CkqwcJaSpycDg8nPN9yNAuD6pv7NDuUnECezojQ== RSA #5
|
||||
|1|z3xOIdT5ue3Vuf3MzT67kaioqjw=|GZhhe5uwDOBQrC9N4cCjpbLpSn4= ssh-dss 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 DSA #5
|
||||
|1|B7t/AYabn8zgwU47Cb4A/Nqt3eI=|arQPZyRphkzisr7w6wwikvhaOyE= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPIudcagzq4QPtP1jkpje34+0POLB0jwT64hqrbCqhTH2T800KDZ0h2vwlJYa3OP3Oqru9AB5pnuHsKw7mAhUGY= ECDSA #5
|
||||
|1|JR81WxEocTP5d7goIRkl8fHBbno=|l6sj6FOsoXxgEZMzn/BnOfPKN68= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINf63qSV8rD57N+digID8t28WVhd3Yf2K2UhaoG8TsWQ ED25519 #5
|
||||
|1|W7x4zY6KtTZJgsopyOusJqvVPag=|QauLt7hKezBZFZi2i4Xopho7Nsk= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQC/C15Q4sfnk7BZff1er8bscay+5s51oD4eWArlHWMK/ZfYeeTAccTy+7B7Jv+MS4nKCpflrvJI2RQz4kS8vF0ATdBbi4jeWefStlHNg0HLhnCY7NAfDIlRdaN9lm3Pqm2vmr+CkqwcJaSpycDg8nPN9yNAuD6pv7NDuUnECezojQ== RSA #5
|
||||
|
||||
|1|0M6PIx6THA3ipIOvTl3fcgn2z+A=|bwEJAOwJz+Sm7orFdgj170mD/zY= ssh-dss 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 DSA #6
|
||||
|1|a6WGHcL+9gX3e96tMlgDSDJwtSg=|5Dqlb/yqNEf7jgfllrp/ygLmRV8= ssh-dss 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 DSA #6
|
||||
|1|OeCpi7Pn5Q6c8la4fPf9G8YctT8=|sC6D7lDXTafIpokZJ1+1xWg2R6Q= ssh-dss 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 DSA #6
|
||||
|1|BHESVyiJ7G2NN0lxrw7vT109jmk=|TKof+015J77bXqibsh0N1Lp0MKk= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK1wRLyKtvK3Mmhd0XPkKwW4ev1KBVf8J4aG8lESq1TsaqqfOXYGyxMq5pN8fCGiD5UPOqyTYz/ZNzClRhJRHao= ECDSA #6
|
||||
|1|wY53mZNASDJ5/P3JYCJ4FUNa6WQ=|v8p0MfV5lqlZB2J0yLxl/gsWVQo= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK1wRLyKtvK3Mmhd0XPkKwW4ev1KBVf8J4aG8lESq1TsaqqfOXYGyxMq5pN8fCGiD5UPOqyTYz/ZNzClRhJRHao= ECDSA #6
|
||||
|1|horeoyFPwfKhyFN+zJZ5LCfOo/I=|2ofvp0tNwCbKsV8FuiFA4gQG2Z8= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK1wRLyKtvK3Mmhd0XPkKwW4ev1KBVf8J4aG8lESq1TsaqqfOXYGyxMq5pN8fCGiD5UPOqyTYz/ZNzClRhJRHao= ECDSA #6
|
||||
|1|Aw4fXumZfx6jEIJuDGIyeEMd81A=|5FdLtdm2JeKNsS8IQeQlGYIadOE= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPLW0ZwCkRQldpLa4I5BpwGa/om+WE6OgC8jdVqakt0Z ED25519 #6
|
||||
|1|+dGUNpv6GblrDd5fgHLlOWpSbEo=|He/pQ1yJjtiCyTNWpGwjBD4sZFI= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPLW0ZwCkRQldpLa4I5BpwGa/om+WE6OgC8jdVqakt0Z ED25519 #6
|
||||
|1|E/PACGl8m1T7QnPedOoooozstP0=|w6DQAFT8yZgj0Hlkz5R1TppYHCA= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPLW0ZwCkRQldpLa4I5BpwGa/om+WE6OgC8jdVqakt0Z ED25519 #6
|
||||
|1|SaoyMStgxpYfwedSXBAghi8Zo0s=|Gz78k69GaE6iViV3OOvbStKqyTA= 1024 65537 140883028436203600354693376066567741282115117509696517282419557936340193768851493584179972504103033755515036493433917203732876685813283050574208967197963391667532902202382549275760997891673884333346000558018002659506756213191532156293935482587878596032743105911487673274674568768638010598205190227631909167257 RSA1 #6
|
||||
|1|8qfGeiT5WTCzWYbXPQ+lsLg7km4=|1sIBwiSUr8IGkvrUGm3/9QYurmA= 1024 65537 140883028436203600354693376066567741282115117509696517282419557936340193768851493584179972504103033755515036493433917203732876685813283050574208967197963391667532902202382549275760997891673884333346000558018002659506756213191532156293935482587878596032743105911487673274674568768638010598205190227631909167257 RSA1 #6
|
||||
|1|87M1OtyHg1BZiDY3rT6lYsZFnAU=|eddAQVcMNbn2OB87XWXFQnYo6R4= 1024 65537 140883028436203600354693376066567741282115117509696517282419557936340193768851493584179972504103033755515036493433917203732876685813283050574208967197963391667532902202382549275760997891673884333346000558018002659506756213191532156293935482587878596032743105911487673274674568768638010598205190227631909167257 RSA1 #6
|
||||
|1|60w3wFfC0XWI+rRmRlxIRhh8lwE=|yMhsGrzBJKiesAdSQ/PVgkCrDKk= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQClu/3I6GG1Ai89Imnw0vXmWJ2OW0ftQwRrsbIAD0qzLFYpkJ76QWnzpCehvK9u0L5hcw7z2Y6mRLcSBsqONc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
|
||||
|1|5gdEMmLUJC7grqWhRJPy2OTaSyE=|/XTfmLMa/B8npcVCGFRdaHl+d/0= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQClu/3I6GG1Ai89Imnw0vXmWJ2OW0ftQwRrsbIAD0qzLFYpkJ76QWnzpCehvK9u0L5hcw7z2Y6mRLcSBsqONc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
|
||||
|1|6FGCWUr42GHdMB/eifnHNCuwgdk=|ONJvYZ/ANmi59R5HrOhLPmvYENM= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQClu/3I6GG1Ai89Imnw0vXmWJ2OW0ftQwRrsbIAD0qzLFYpkJ76QWnzpCehvK9u0L5hcw7z2Y6mRLcSBsqONc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
|
||||
|1|mxnU8luzqWLvfVi5qBm5xVIyCRM=|9Epopft7LBd80Bf6RmWPIpwa8yU= ssh-dss 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 DSA #6
|
||||
|1|klvLmvh2vCpkNMDEjVvrE8SJWTg=|e/dqEEBLnbgqmwEesl4cDRu/7TM= ssh-dss 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 DSA #6
|
||||
|1|wsk3ddB3UjuxEsoeNCeZjZ6NvZs=|O3O/q2Z/u7DrxoTiIq6kzCevQT0= ssh-dss AAAAB3NzaC1kc3MAAACBAIutigAse65TCW6hHDOEGXenE9L4L0talHbs65hj3UUNtWflKdQeXLofqXgW8AwaDKmnuRPrxRoxVNXj84n45wtBEdt4ztmdAZteAbXSnHqpcxME3jDxh3EtxzGPXLs+RUmKPVguraSgo7W2oN7KFx6VM+AcAtxANSTlvDid3s47AAAAFQCd9Q3kkHSLWe77sW0eRaayI45ovwAAAIAw6srGF6xvFasI44Y3r9JJ2K+3ezozl3ldL3p2+p2HG3iWafC4SdV8pB6ZIxKlYAywiiFb3LzH/JweGFq1jtoFDRM3MlYORBevydU4zPz7b5QLDVB0sY4evYtWmg2BFJvoWRfhLnlZVW7h5N8v4fNIwdVmVsw4Ljes7iF2HRGhHgAAAIBDFT3fww2Oby1xUA6G9pDAcVikrQFqp1sJRylNTUyeyQ37SNAGzYxwHJFgQr8gZLdRQ1UW+idYpqVbVNcYFMOiw/zSqK2OfVwPZ9U+TTKdc992ChSup6vJEKM/ZVIyDWDbJr7igQ4ahy7jo9mFvm8ljN926EnspQzCvs0Dxk6tHA== DSA #6
|
||||
|1|B8epmkLSni+vGZDijr/EwxeR2k4=|7ct8yzNOVJhKm3ZD2w0XIT7df8E= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK1wRLyKtvK3Mmhd0XPkKwW4ev1KBVf8J4aG8lESq1TsaqqfOXYGyxMq5pN8fCGiD5UPOqyTYz/ZNzClRhJRHao= ECDSA #6
|
||||
|1|JojD885UhYhbCu571rgyM/5PpYU=|BJaU2aE1FebQZy3B5tzTDRWFRG0= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK1wRLyKtvK3Mmhd0XPkKwW4ev1KBVf8J4aG8lESq1TsaqqfOXYGyxMq5pN8fCGiD5UPOqyTYz/ZNzClRhJRHao= ECDSA #6
|
||||
|1|5t7UDHDybVrDZVQPCpwdnr6nk4k=|EqJ73W/veIL3H2x+YWHcJxI5ETA= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK1wRLyKtvK3Mmhd0XPkKwW4ev1KBVf8J4aG8lESq1TsaqqfOXYGyxMq5pN8fCGiD5UPOqyTYz/ZNzClRhJRHao= ECDSA #6
|
||||
|1|OCcBfGc/b9+ip+W6Gp+3ftdluO4=|VbrKUdzOOtIBOOmEE+jlK4SD3Xc= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPLW0ZwCkRQldpLa4I5BpwGa/om+WE6OgC8jdVqakt0Z ED25519 #6
|
||||
|1|9fLN0YdP+BJ25lKuKvYuOdUo93w=|vZyr0rOiX01hv5XbghhHMW+Zb3U= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPLW0ZwCkRQldpLa4I5BpwGa/om+WE6OgC8jdVqakt0Z ED25519 #6
|
||||
|1|nc9RoaaQ0s5jdPxwlUmluGHU3uk=|un6OsJajokKQ3MgyS9mfDNeyP6U= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPLW0ZwCkRQldpLa4I5BpwGa/om+WE6OgC8jdVqakt0Z ED25519 #6
|
||||
|1|rsHB6juT9q6GOY91qOeOwL6TSJE=|ps/vXF9Izuues5PbOn887Gw/2Dg= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQClu/3I6GG1Ai89Imnw0vXmWJ2OW0ftQwRrsbIAD0qzLFYpkJ76QWnzpCehvK9u0L5hcw7z2Y6mRLcSBsqONc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
|
||||
|1|BsckdLH2aRyWQooRmv+Yo3t4dKg=|Lf3tJc5Iyx0KxNwAG89FsImsfEE= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQClu/3I6GG1Ai89Imnw0vXmWJ2OW0ftQwRrsbIAD0qzLFYpkJ76QWnzpCehvK9u0L5hcw7z2Y6mRLcSBsqONc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
|
||||
|1|plqkBA4hq7UATyd5+/Xl+zL7ghw=|stacofaUed46666mfqxp9gJFjt4= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQClu/3I6GG1Ai89Imnw0vXmWJ2OW0ftQwRrsbIAD0qzLFYpkJ76QWnzpCehvK9u0L5hcw7z2Y6mRLcSBsqONc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
|
||||
|
||||
|
||||
# Revoked and CA keys
|
||||
@revoked sisyphus.example.com 1024 65537 174143366122697048196335388217056770310345753698079464367148030836533360510864881734142526411160017107552815906024399248049666856133771656680462456979369587903909343046704480897527203474513676654933090991684252819423129896444427656841613263783484827101210734799449281639493127615902427443211183258155381810593 RSA1 #4
|
||||
@revoked sisyphus.example.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDFP8L9REfN/iYy1KIRtFqSCn3V2+vOCpoZYENFGLdOF ED25519 #4
|
||||
@cert-authority prometheus.example.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBHZd0OXHIWwK3xnjAdMZ1tojxWycdu38pORO/UX5cqsKMgGCKQVBWWO3TFk1ePkGIE9VMWT1hCGqWRRwYlH+dSE= ECDSA #4
|
||||
@cert-authority *.example.com ssh-dss AAAAB3NzaC1kc3MAAACBAKvjnFHm0VvMr5h2Zu3nURsxQKGoxm+DCzYDxRYcilK07Cm5c4XTrFbA2X86+9sGs++W7QRMcTJUYIg0a+UtIMtAjwORd6ZPXM2K5dBW+gh1oHyvKi767tWX7I2c+1ZPJDY95mUUfZQUEfdy9eGDSBmw/pSsveQ1ur6XNUh/MtP/AAAAFQDHnXk/9jBJAdce1pHtLWnbdPSGdQAAAIEAm2OLy8tZBfiEO3c3X1yyB/GTcDwrQCqRMDkhnsmrliec3dWkOfNTzu+MrdvF8ymTWLEqPpbMheYtvNyZ3TF0HO5W7aVBpdGZbOdOAIfB+6skqGbI8A5Up1d7dak/bSsqL2r5NjwbDOdq+1hBzzvbl/qjh+sQarV2zHrpKoQaV28AAACANtkBVedBbqIAdphCrN/LbUi9WlyuF9UZz+tlpVLYrj8GJVwnplV2tvOmUw6yP5/pzCimTsao8dpL5PWxm7fKxLWVxA+lEsA4WeC885CiZn8xhdaJOCN+NyJ2bqkz+4VPI7oDGBm0aFwUqJn+M1PiSgvI50XdF2dBsFRTRNY0wzA= DSA #4
|
||||
|
||||
# Some invalid lines
|
||||
@what sisyphus.example.com 1024 65537 153895431603677073925890314548566704948446776958334195280085080329934839226701954473292358821568047724356487621573742372399387931887004184139835510820577359977148363519970774657801798872789118894962853659233045778161859413980935372685480527355016624825696983269800574755126132814333241868538220824608980319407 RSA1 #1
|
||||
@what sisyphus.example.com ssh-dss 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 DSA #1
|
||||
sisyphus.example.com
|
||||
prometheus.example.com ssh-ed25519
|
||||
sisyphus.example.com ssh-dsa AAAATgAAAAdz
|
||||
prometheus.example.com 1024
|
||||
sisyphus.example.com 1024 65535
|
||||
prometheus.example.com 1025 65537 153895431603677073925890314548566704948446776958334195280085080329934839226701954473292358821568047724356487621573742372399387931887004184139835510820577359977148363519970774657801798872789118894962853659233045778161859413980935372685480527355016624825696983269800574755126132814333241868538220824608980319407 RSA1 #1
|
||||
sisyphus.example.com ssh-XXX AAAATgAAAAdzc2gtWFhYAAAAP0ZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRg==
|
||||
prometheus.example.com ssh-rsa AAAATgAAAAdzc2gtWFhYAAAAP0ZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRg==
|
||||
|
@ -1,25 +1,8 @@
|
||||
#!/bin/sh
|
||||
# $OpenBSD: mktestdata.sh,v 1.5 2015/07/07 14:53:30 markus Exp $
|
||||
# $OpenBSD: mktestdata.sh,v 1.6 2017/04/30 23:33:48 djm Exp $
|
||||
|
||||
PW=mekmitasdigoat
|
||||
|
||||
rsa1_params() {
|
||||
_in="$1"
|
||||
_outbase="$2"
|
||||
set -e
|
||||
ssh-keygen -f $_in -e -m pkcs8 | \
|
||||
openssl rsa -noout -text -pubin | \
|
||||
awk '/^Modulus:$/,/^Exponent:/' | \
|
||||
grep -v '^[a-zA-Z]' | tr -d ' \n:' > ${_outbase}.n
|
||||
# XXX need conversion support in ssh-keygen for the other params
|
||||
for x in n ; do
|
||||
echo "" >> ${_outbase}.$x
|
||||
echo ============ ${_outbase}.$x
|
||||
cat ${_outbase}.$x
|
||||
echo ============
|
||||
done
|
||||
}
|
||||
|
||||
rsa_params() {
|
||||
_in="$1"
|
||||
_outbase="$2"
|
||||
@ -87,20 +70,18 @@ set -ex
|
||||
|
||||
cd testdata
|
||||
|
||||
rm -f rsa1_1 rsa_1 dsa_1 ecdsa_1 ed25519_1
|
||||
rm -f rsa1_2 rsa_2 dsa_2 ecdsa_2 ed25519_2
|
||||
rm -f rsa_1 dsa_1 ecdsa_1 ed25519_1
|
||||
rm -f rsa_2 dsa_2 ecdsa_2 ed25519_2
|
||||
rm -f rsa_n dsa_n ecdsa_n # new-format keys
|
||||
rm -f rsa1_1_pw rsa_1_pw dsa_1_pw ecdsa_1_pw ed25519_1_pw
|
||||
rm -f rsa_1_pw dsa_1_pw ecdsa_1_pw ed25519_1_pw
|
||||
rm -f rsa_n_pw dsa_n_pw ecdsa_n_pw
|
||||
rm -f pw *.pub *.bn.* *.param.* *.fp *.fp.bb
|
||||
|
||||
ssh-keygen -t rsa1 -b 1024 -C "RSA1 test key #1" -N "" -f rsa1_1
|
||||
ssh-keygen -t rsa -b 1024 -C "RSA test key #1" -N "" -f rsa_1
|
||||
ssh-keygen -t dsa -b 1024 -C "DSA test key #1" -N "" -f dsa_1
|
||||
ssh-keygen -t ecdsa -b 256 -C "ECDSA test key #1" -N "" -f ecdsa_1
|
||||
ssh-keygen -t ed25519 -C "ED25519 test key #1" -N "" -f ed25519_1
|
||||
|
||||
ssh-keygen -t rsa1 -b 2048 -C "RSA1 test key #2" -N "" -f rsa1_2
|
||||
ssh-keygen -t rsa -b 2048 -C "RSA test key #2" -N "" -f rsa_2
|
||||
ssh-keygen -t dsa -b 1024 -C "DSA test key #2" -N "" -f dsa_2
|
||||
ssh-keygen -t ecdsa -b 521 -C "ECDSA test key #2" -N "" -f ecdsa_2
|
||||
@ -110,7 +91,6 @@ cp rsa_1 rsa_n
|
||||
cp dsa_1 dsa_n
|
||||
cp ecdsa_1 ecdsa_n
|
||||
|
||||
cp rsa1_1 rsa1_1_pw
|
||||
cp rsa_1 rsa_1_pw
|
||||
cp dsa_1 dsa_1_pw
|
||||
cp ecdsa_1 ecdsa_1_pw
|
||||
@ -119,7 +99,6 @@ cp rsa_1 rsa_n_pw
|
||||
cp dsa_1 dsa_n_pw
|
||||
cp ecdsa_1 ecdsa_n_pw
|
||||
|
||||
ssh-keygen -pf rsa1_1_pw -N "$PW"
|
||||
ssh-keygen -pf rsa_1_pw -N "$PW"
|
||||
ssh-keygen -pf dsa_1_pw -N "$PW"
|
||||
ssh-keygen -pf ecdsa_1_pw -N "$PW"
|
||||
@ -128,8 +107,6 @@ ssh-keygen -opf rsa_n_pw -N "$PW"
|
||||
ssh-keygen -opf dsa_n_pw -N "$PW"
|
||||
ssh-keygen -opf ecdsa_n_pw -N "$PW"
|
||||
|
||||
rsa1_params rsa1_1 rsa1_1.param
|
||||
rsa1_params rsa1_2 rsa1_2.param
|
||||
rsa_params rsa_1 rsa_1.param
|
||||
rsa_params rsa_2 rsa_2.param
|
||||
dsa_params dsa_1 dsa_1.param
|
||||
@ -160,12 +137,10 @@ ssh-keygen -s ecdsa_1 -I julius -n host1,host2 -h \
|
||||
ssh-keygen -s ed25519_1 -I julius -n host1,host2 -h \
|
||||
-V 19990101:20110101 -z 8 ed25519_1.pub
|
||||
|
||||
ssh-keygen -lf rsa1_1 | awk '{print $2}' > rsa1_1.fp
|
||||
ssh-keygen -lf rsa_1 | awk '{print $2}' > rsa_1.fp
|
||||
ssh-keygen -lf dsa_1 | awk '{print $2}' > dsa_1.fp
|
||||
ssh-keygen -lf ecdsa_1 | awk '{print $2}' > ecdsa_1.fp
|
||||
ssh-keygen -lf ed25519_1 | awk '{print $2}' > ed25519_1.fp
|
||||
ssh-keygen -lf rsa1_2 | awk '{print $2}' > rsa1_2.fp
|
||||
ssh-keygen -lf rsa_2 | awk '{print $2}' > rsa_2.fp
|
||||
ssh-keygen -lf dsa_2 | awk '{print $2}' > dsa_2.fp
|
||||
ssh-keygen -lf ecdsa_2 | awk '{print $2}' > ecdsa_2.fp
|
||||
@ -176,12 +151,10 @@ ssh-keygen -lf ecdsa_1-cert.pub | awk '{print $2}' > ecdsa_1-cert.fp
|
||||
ssh-keygen -lf ed25519_1-cert.pub | awk '{print $2}' > ed25519_1-cert.fp
|
||||
ssh-keygen -lf rsa_1-cert.pub | awk '{print $2}' > rsa_1-cert.fp
|
||||
|
||||
ssh-keygen -Bf rsa1_1 | awk '{print $2}' > rsa1_1.fp.bb
|
||||
ssh-keygen -Bf rsa_1 | awk '{print $2}' > rsa_1.fp.bb
|
||||
ssh-keygen -Bf dsa_1 | awk '{print $2}' > dsa_1.fp.bb
|
||||
ssh-keygen -Bf ecdsa_1 | awk '{print $2}' > ecdsa_1.fp.bb
|
||||
ssh-keygen -Bf ed25519_1 | awk '{print $2}' > ed25519_1.fp.bb
|
||||
ssh-keygen -Bf rsa1_2 | awk '{print $2}' > rsa1_2.fp.bb
|
||||
ssh-keygen -Bf rsa_2 | awk '{print $2}' > rsa_2.fp.bb
|
||||
ssh-keygen -Bf dsa_2 | awk '{print $2}' > dsa_2.fp.bb
|
||||
ssh-keygen -Bf ecdsa_2 | awk '{print $2}' > ecdsa_2.fp.bb
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $OpenBSD: test_file.c,v 1.5 2015/10/06 01:20:59 djm Exp $ */
|
||||
/* $OpenBSD: test_file.c,v 1.6 2017/04/30 23:33:48 djm Exp $ */
|
||||
/*
|
||||
* Regress test for sshkey.h key management API
|
||||
*
|
||||
@ -51,55 +51,6 @@ sshkey_file_tests(void)
|
||||
pw = load_text_file("pw");
|
||||
TEST_DONE();
|
||||
|
||||
#ifdef WITH_SSH1
|
||||
TEST_START("parse RSA1 from private");
|
||||
buf = load_file("rsa1_1");
|
||||
ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
|
||||
sshbuf_free(buf);
|
||||
ASSERT_PTR_NE(k1, NULL);
|
||||
a = load_bignum("rsa1_1.param.n");
|
||||
ASSERT_BIGNUM_EQ(k1->rsa->n, a);
|
||||
BN_free(a);
|
||||
TEST_DONE();
|
||||
|
||||
TEST_START("parse RSA1 from private w/ passphrase");
|
||||
buf = load_file("rsa1_1_pw");
|
||||
ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf,
|
||||
(const char *)sshbuf_ptr(pw), &k2, NULL), 0);
|
||||
sshbuf_free(buf);
|
||||
ASSERT_PTR_NE(k2, NULL);
|
||||
ASSERT_INT_EQ(sshkey_equal(k1, k2), 1);
|
||||
sshkey_free(k2);
|
||||
TEST_DONE();
|
||||
|
||||
TEST_START("load RSA1 from public");
|
||||
ASSERT_INT_EQ(sshkey_load_public(test_data_file("rsa1_1.pub"), &k2,
|
||||
NULL), 0);
|
||||
ASSERT_PTR_NE(k2, NULL);
|
||||
ASSERT_INT_EQ(sshkey_equal(k1, k2), 1);
|
||||
sshkey_free(k2);
|
||||
TEST_DONE();
|
||||
|
||||
TEST_START("RSA1 key hex fingerprint");
|
||||
buf = load_text_file("rsa1_1.fp");
|
||||
cp = sshkey_fingerprint(k1, SSH_DIGEST_SHA256, SSH_FP_BASE64);
|
||||
ASSERT_PTR_NE(cp, NULL);
|
||||
ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf));
|
||||
sshbuf_free(buf);
|
||||
free(cp);
|
||||
TEST_DONE();
|
||||
|
||||
TEST_START("RSA1 key bubblebabble fingerprint");
|
||||
buf = load_text_file("rsa1_1.fp.bb");
|
||||
cp = sshkey_fingerprint(k1, SSH_DIGEST_SHA1, SSH_FP_BUBBLEBABBLE);
|
||||
ASSERT_PTR_NE(cp, NULL);
|
||||
ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf));
|
||||
sshbuf_free(buf);
|
||||
free(cp);
|
||||
TEST_DONE();
|
||||
|
||||
sshkey_free(k1);
|
||||
#endif
|
||||
|
||||
TEST_START("parse RSA from private");
|
||||
buf = load_file("rsa_1");
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $OpenBSD: test_fuzz.c,v 1.6 2015/12/07 02:20:46 djm Exp $ */
|
||||
/* $OpenBSD: test_fuzz.c,v 1.7 2017/04/30 23:33:48 djm Exp $ */
|
||||
/*
|
||||
* Fuzz tests for key parsing
|
||||
*
|
||||
@ -104,49 +104,6 @@ sshkey_fuzz_tests(void)
|
||||
struct fuzz *fuzz;
|
||||
int r;
|
||||
|
||||
#ifdef WITH_SSH1
|
||||
TEST_START("fuzz RSA1 private");
|
||||
buf = load_file("rsa1_1");
|
||||
fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | FUZZ_1_BYTE_FLIP |
|
||||
FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END,
|
||||
sshbuf_mutable_ptr(buf), sshbuf_len(buf));
|
||||
ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
|
||||
sshkey_free(k1);
|
||||
sshbuf_free(buf);
|
||||
ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
|
||||
TEST_ONERROR(onerror, fuzz);
|
||||
for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
|
||||
r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
|
||||
ASSERT_INT_EQ(r, 0);
|
||||
if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0)
|
||||
sshkey_free(k1);
|
||||
sshbuf_reset(fuzzed);
|
||||
}
|
||||
sshbuf_free(fuzzed);
|
||||
fuzz_cleanup(fuzz);
|
||||
TEST_DONE();
|
||||
|
||||
TEST_START("fuzz RSA1 public");
|
||||
buf = load_file("rsa1_1_pw");
|
||||
fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | FUZZ_1_BYTE_FLIP |
|
||||
FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END,
|
||||
sshbuf_mutable_ptr(buf), sshbuf_len(buf));
|
||||
ASSERT_INT_EQ(sshkey_parse_public_rsa1_fileblob(buf, &k1, NULL), 0);
|
||||
sshkey_free(k1);
|
||||
sshbuf_free(buf);
|
||||
ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
|
||||
TEST_ONERROR(onerror, fuzz);
|
||||
for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
|
||||
r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
|
||||
ASSERT_INT_EQ(r, 0);
|
||||
if (sshkey_parse_public_rsa1_fileblob(fuzzed, &k1, NULL) == 0)
|
||||
sshkey_free(k1);
|
||||
sshbuf_reset(fuzzed);
|
||||
}
|
||||
sshbuf_free(fuzzed);
|
||||
fuzz_cleanup(fuzz);
|
||||
TEST_DONE();
|
||||
#endif
|
||||
|
||||
TEST_START("fuzz RSA private");
|
||||
buf = load_file("rsa_1");
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $OpenBSD: test_sshkey.c,v 1.10 2016/05/02 09:52:00 djm Exp $ */
|
||||
/* $OpenBSD: test_sshkey.c,v 1.11 2017/04/30 23:33:48 djm Exp $ */
|
||||
/*
|
||||
* Regress test for sshkey.h key management API
|
||||
*
|
||||
@ -193,16 +193,6 @@ sshkey_tests(void)
|
||||
sshkey_free(k1);
|
||||
TEST_DONE();
|
||||
|
||||
TEST_START("new/free KEY_RSA1");
|
||||
k1 = sshkey_new(KEY_RSA1);
|
||||
ASSERT_PTR_NE(k1, NULL);
|
||||
ASSERT_PTR_NE(k1->rsa, NULL);
|
||||
ASSERT_PTR_NE(k1->rsa->n, NULL);
|
||||
ASSERT_PTR_NE(k1->rsa->e, NULL);
|
||||
ASSERT_PTR_EQ(k1->rsa->p, NULL);
|
||||
sshkey_free(k1);
|
||||
TEST_DONE();
|
||||
|
||||
TEST_START("new/free KEY_RSA");
|
||||
k1 = sshkey_new(KEY_RSA);
|
||||
ASSERT_PTR_NE(k1, NULL);
|
||||
|
Loading…
Reference in New Issue
Block a user