summaryrefslogtreecommitdiff
path: root/regress/unittests/hostkeys/test_iterate.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2015-02-25 15:32:49 +1100
committerDarren Tucker <dtucker@zip.com.au>2015-02-25 15:32:49 +1100
commit5d5ec165c5b614b03678afdad881f10e25832e46 (patch)
tree35805270fc194b91f98a04ed2efb481f8a245516 /regress/unittests/hostkeys/test_iterate.c
parent1734e276d99b17e92d4233fac7aef3a3180aaca7 (diff)
Restrict ECDSA and ECDH tests.
ifdef out some more ECDSA and ECDH tests when built against an OpenSSL that does not have eliptic curve functionality.
Diffstat (limited to 'regress/unittests/hostkeys/test_iterate.c')
-rw-r--r--regress/unittests/hostkeys/test_iterate.c12
1 files changed, 12 insertions, 0 deletions
diff --git a/regress/unittests/hostkeys/test_iterate.c b/regress/unittests/hostkeys/test_iterate.c
index 526e1c06e..68a70610e 100644
--- a/regress/unittests/hostkeys/test_iterate.c
+++ b/regress/unittests/hostkeys/test_iterate.c
@@ -165,6 +165,7 @@ struct expected expected_full[] = {
165 NULL, /* filled at runtime */ 165 NULL, /* filled at runtime */
166 "DSA #1", 166 "DSA #1",
167 } }, 167 } },
168#ifdef OPENSSL_HAS_ECC
168 { "ecdsa_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, { 169 { "ecdsa_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, {
169 NULL, 170 NULL,
170 3, 171 3,
@@ -178,6 +179,7 @@ struct expected expected_full[] = {
178 NULL, /* filled at runtime */ 179 NULL, /* filled at runtime */
179 "ECDSA #1", 180 "ECDSA #1",
180 } }, 181 } },
182#endif
181 { "ed25519_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, { 183 { "ed25519_1.pub" , -1, -1, 0, HKF_MATCH_HOST, 0, 0, -1, {
182 NULL, 184 NULL,
183 4, 185 4,
@@ -256,6 +258,7 @@ struct expected expected_full[] = {
256 NULL, /* filled at runtime */ 258 NULL, /* filled at runtime */
257 "DSA #2", 259 "DSA #2",
258 } }, 260 } },
261#ifdef OPENSSL_HAS_ECC
259 { "ecdsa_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, { 262 { "ecdsa_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
260 NULL, 263 NULL,
261 10, 264 10,
@@ -269,6 +272,7 @@ struct expected expected_full[] = {
269 NULL, /* filled at runtime */ 272 NULL, /* filled at runtime */
270 "ECDSA #2", 273 "ECDSA #2",
271 } }, 274 } },
275#endif
272 { "ed25519_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, { 276 { "ed25519_2.pub" , -1, -1, HKF_MATCH_HOST, 0, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
273 NULL, 277 NULL,
274 11, 278 11,
@@ -347,6 +351,7 @@ struct expected expected_full[] = {
347 NULL, /* filled at runtime */ 351 NULL, /* filled at runtime */
348 "DSA #3", 352 "DSA #3",
349 } }, 353 } },
354#ifdef OPENSSL_HAS_ECC
350 { "ecdsa_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, { 355 { "ecdsa_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
351 NULL, 356 NULL,
352 17, 357 17,
@@ -360,6 +365,7 @@ struct expected expected_full[] = {
360 NULL, /* filled at runtime */ 365 NULL, /* filled at runtime */
361 "ECDSA #3", 366 "ECDSA #3",
362 } }, 367 } },
368#endif
363 { "ed25519_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, { 369 { "ed25519_3.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, HKF_MATCH_IP, HKF_MATCH_IP, -1, {
364 NULL, 370 NULL,
365 18, 371 18,
@@ -438,6 +444,7 @@ struct expected expected_full[] = {
438 NULL, /* filled at runtime */ 444 NULL, /* filled at runtime */
439 "DSA #5", 445 "DSA #5",
440 } }, 446 } },
447#ifdef OPENSSL_HAS_ECC
441 { "ecdsa_5.pub" , -1, -1, 0, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, -1, { 448 { "ecdsa_5.pub" , -1, -1, 0, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, -1, {
442 NULL, 449 NULL,
443 24, 450 24,
@@ -451,6 +458,7 @@ struct expected expected_full[] = {
451 NULL, /* filled at runtime */ 458 NULL, /* filled at runtime */
452 "ECDSA #5", 459 "ECDSA #5",
453 } }, 460 } },
461#endif
454 { "ed25519_5.pub" , -1, -1, 0, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, -1, { 462 { "ed25519_5.pub" , -1, -1, 0, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, -1, {
455 NULL, 463 NULL,
456 25, 464 25,
@@ -547,6 +555,7 @@ struct expected expected_full[] = {
547 NULL, /* filled at runtime */ 555 NULL, /* filled at runtime */
548 "DSA #6", 556 "DSA #6",
549 } }, 557 } },
558#ifdef OPENSSL_HAS_ECC
550 { "ecdsa_6.pub" , -1, -1, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, 0, -1, { 559 { "ecdsa_6.pub" , -1, -1, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, 0, -1, {
551 NULL, 560 NULL,
552 32, 561 32,
@@ -586,6 +595,7 @@ struct expected expected_full[] = {
586 NULL, /* filled at runtime */ 595 NULL, /* filled at runtime */
587 "ECDSA #6", 596 "ECDSA #6",
588 } }, 597 } },
598#endif
589 { "ed25519_6.pub" , -1, -1, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, 0, -1, { 599 { "ed25519_6.pub" , -1, -1, HKF_MATCH_HOST|HKF_MATCH_HOST_HASHED, 0, 0, 0, -1, {
590 NULL, 600 NULL,
591 35, 601 35,
@@ -768,6 +778,7 @@ struct expected expected_full[] = {
768 NULL, /* filled at runtime */ 778 NULL, /* filled at runtime */
769 "ED25519 #4", 779 "ED25519 #4",
770 } }, 780 } },
781#ifdef OPENSSL_HAS_ECC
771 { "ecdsa_4.pub" , -1, -1, HKF_MATCH_HOST, 0, 0, 0, -1, { 782 { "ecdsa_4.pub" , -1, -1, HKF_MATCH_HOST, 0, 0, 0, -1, {
772 NULL, 783 NULL,
773 49, 784 49,
@@ -781,6 +792,7 @@ struct expected expected_full[] = {
781 NULL, /* filled at runtime */ 792 NULL, /* filled at runtime */
782 "ECDSA #4", 793 "ECDSA #4",
783 } }, 794 } },
795#endif
784 { "dsa_4.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, 0, 0, -1, { 796 { "dsa_4.pub" , -1, -1, HKF_MATCH_HOST, HKF_MATCH_HOST, 0, 0, -1, {
785 NULL, 797 NULL,
786 50, 798 50,