summaryrefslogtreecommitdiff
path: root/regress/unittests/sshkey
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2015-02-25 15:32:49 +1100
committerDarren Tucker <dtucker@zip.com.au>2015-02-25 15:32:49 +1100
commit5d5ec165c5b614b03678afdad881f10e25832e46 (patch)
tree35805270fc194b91f98a04ed2efb481f8a245516 /regress/unittests/sshkey
parent1734e276d99b17e92d4233fac7aef3a3180aaca7 (diff)
Restrict ECDSA and ECDH tests.
ifdef out some more ECDSA and ECDH tests when built against an OpenSSL that does not have eliptic curve functionality.
Diffstat (limited to 'regress/unittests/sshkey')
-rw-r--r--regress/unittests/sshkey/test_sshkey.c6
1 files changed, 6 insertions, 0 deletions
diff --git a/regress/unittests/sshkey/test_sshkey.c b/regress/unittests/sshkey/test_sshkey.c
index 3e4e39b62..b233a254b 100644
--- a/regress/unittests/sshkey/test_sshkey.c
+++ b/regress/unittests/sshkey/test_sshkey.c
@@ -217,12 +217,14 @@ sshkey_tests(void)
217 sshkey_free(k1); 217 sshkey_free(k1);
218 TEST_DONE(); 218 TEST_DONE();
219 219
220#ifdef OPENSSL_HAS_ECC
220 TEST_START("new/free KEY_ECDSA"); 221 TEST_START("new/free KEY_ECDSA");
221 k1 = sshkey_new(KEY_ECDSA); 222 k1 = sshkey_new(KEY_ECDSA);
222 ASSERT_PTR_NE(k1, NULL); 223 ASSERT_PTR_NE(k1, NULL);
223 ASSERT_PTR_EQ(k1->ecdsa, NULL); /* Can't allocate without NID */ 224 ASSERT_PTR_EQ(k1->ecdsa, NULL); /* Can't allocate without NID */
224 sshkey_free(k1); 225 sshkey_free(k1);
225 TEST_DONE(); 226 TEST_DONE();
227#endif
226 228
227 TEST_START("new/free KEY_ED25519"); 229 TEST_START("new/free KEY_ED25519");
228 k1 = sshkey_new(KEY_ED25519); 230 k1 = sshkey_new(KEY_ED25519);
@@ -273,12 +275,14 @@ sshkey_tests(void)
273 sshkey_free(k1); 275 sshkey_free(k1);
274 TEST_DONE(); 276 TEST_DONE();
275 277
278#ifdef OPENSSL_HAS_ECC
276 TEST_START("generate KEY_ECDSA wrong bits"); 279 TEST_START("generate KEY_ECDSA wrong bits");
277 ASSERT_INT_EQ(sshkey_generate(KEY_ECDSA, 42, &k1), 280 ASSERT_INT_EQ(sshkey_generate(KEY_ECDSA, 42, &k1),
278 SSH_ERR_INVALID_ARGUMENT); 281 SSH_ERR_INVALID_ARGUMENT);
279 ASSERT_PTR_EQ(k1, NULL); 282 ASSERT_PTR_EQ(k1, NULL);
280 sshkey_free(k1); 283 sshkey_free(k1);
281 TEST_DONE(); 284 TEST_DONE();
285#endif
282 286
283 TEST_START("generate KEY_RSA"); 287 TEST_START("generate KEY_RSA");
284 ASSERT_INT_EQ(sshkey_generate(KEY_RSA, 768, &kr), 0); 288 ASSERT_INT_EQ(sshkey_generate(KEY_RSA, 768, &kr), 0);
@@ -474,6 +478,7 @@ sshkey_tests(void)
474 sshkey_free(k2); 478 sshkey_free(k2);
475 TEST_DONE(); 479 TEST_DONE();
476 480
481#ifdef OPENSSL_HAS_ECC
477 TEST_START("sign and verify ECDSA"); 482 TEST_START("sign and verify ECDSA");
478 k1 = get_private("ecdsa_1"); 483 k1 = get_private("ecdsa_1");
479 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_2.pub"), &k2, 484 ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_2.pub"), &k2,
@@ -482,6 +487,7 @@ sshkey_tests(void)
482 sshkey_free(k1); 487 sshkey_free(k1);
483 sshkey_free(k2); 488 sshkey_free(k2);
484 TEST_DONE(); 489 TEST_DONE();
490#endif
485 491
486 TEST_START("sign and verify ED25519"); 492 TEST_START("sign and verify ED25519");
487 k1 = get_private("ed25519_1"); 493 k1 = get_private("ed25519_1");