diff options
-rw-r--r-- | regress/Makefile | 10 | ||||
-rw-r--r-- | regress/t4.ok | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/test_file.c | 31 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/dsa_1-cert.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/dsa_1.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/dsa_2.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/ecdsa_1-cert.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/ecdsa_1.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/ecdsa_2.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/ed25519_1-cert.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/ed25519_1.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/ed25519_2.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/rsa1_1.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/rsa1_2.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/rsa_1-cert.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/rsa_1.fp | 2 | ||||
-rw-r--r-- | regress/unittests/sshkey/testdata/rsa_2.fp | 2 |
17 files changed, 38 insertions, 33 deletions
diff --git a/regress/Makefile b/regress/Makefile index 3feb7a997..2905a0d0a 100644 --- a/regress/Makefile +++ b/regress/Makefile | |||
@@ -1,6 +1,6 @@ | |||
1 | # $OpenBSD: Makefile,v 1.70 2014/06/24 01:14:17 djm Exp $ | 1 | # $OpenBSD: Makefile,v 1.71 2014/12/22 02:15:52 djm Exp $ |
2 | 2 | ||
3 | REGRESS_TARGETS= unit t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t-exec | 3 | REGRESS_TARGETS= unit t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t-exec |
4 | tests: $(REGRESS_TARGETS) | 4 | tests: $(REGRESS_TARGETS) |
5 | 5 | ||
6 | # Interop tests are not run by default | 6 | # Interop tests are not run by default |
@@ -119,7 +119,7 @@ t3: | |||
119 | ${TEST_SSH_SSHKEYGEN} -if $(OBJ)/t3.out | diff - ${.CURDIR}/rsa_openssh.pub | 119 | ${TEST_SSH_SSHKEYGEN} -if $(OBJ)/t3.out | diff - ${.CURDIR}/rsa_openssh.pub |
120 | 120 | ||
121 | t4: | 121 | t4: |
122 | ${TEST_SSH_SSHKEYGEN} -lf ${.CURDIR}/rsa_openssh.pub |\ | 122 | ${TEST_SSH_SSHKEYGEN} -E md5 -lf ${.CURDIR}/rsa_openssh.pub |\ |
123 | awk '{print $$2}' | diff - ${.CURDIR}/t4.ok | 123 | awk '{print $$2}' | diff - ${.CURDIR}/t4.ok |
124 | 124 | ||
125 | t5: | 125 | t5: |
@@ -164,6 +164,10 @@ t10: $(OBJ)/t10.out | |||
164 | ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t10.out > /dev/null | 164 | ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t10.out > /dev/null |
165 | ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t10.out > /dev/null | 165 | ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t10.out > /dev/null |
166 | 166 | ||
167 | t11: | ||
168 | ${TEST_SSH_SSHKEYGEN} -E sha256 -lf ${.CURDIR}/rsa_openssh.pub |\ | ||
169 | awk '{print $$2}' | diff - ${.CURDIR}/t11.ok | ||
170 | |||
167 | t-exec: ${LTESTS:=.sh} | 171 | t-exec: ${LTESTS:=.sh} |
168 | @if [ "x$?" = "x" ]; then exit 0; fi; \ | 172 | @if [ "x$?" = "x" ]; then exit 0; fi; \ |
169 | for TEST in ""$?; do \ | 173 | for TEST in ""$?; do \ |
diff --git a/regress/t4.ok b/regress/t4.ok index 8c4942bf1..4631ea8c7 100644 --- a/regress/t4.ok +++ b/regress/t4.ok | |||
@@ -1 +1 @@ | |||
3b:dd:44:e9:49:18:84:95:f1:e7:33:6b:9d:93:b1:36 | MD5:3b:dd:44:e9:49:18:84:95:f1:e7:33:6b:9d:93:b1:36 | ||
diff --git a/regress/unittests/sshkey/test_file.c b/regress/unittests/sshkey/test_file.c index 764f7fb76..9c38a7c61 100644 --- a/regress/unittests/sshkey/test_file.c +++ b/regress/unittests/sshkey/test_file.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: test_file.c,v 1.1 2014/06/24 01:14:18 djm Exp $ */ | 1 | /* $OpenBSD: test_file.c,v 1.2 2014/12/22 02:15:52 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Regress test for sshkey.h key management API | 3 | * Regress test for sshkey.h key management API |
4 | * | 4 | * |
@@ -33,6 +33,7 @@ | |||
33 | #include "authfile.h" | 33 | #include "authfile.h" |
34 | #include "sshkey.h" | 34 | #include "sshkey.h" |
35 | #include "sshbuf.h" | 35 | #include "sshbuf.h" |
36 | #include "digest.h" | ||
36 | 37 | ||
37 | #include "common.h" | 38 | #include "common.h" |
38 | 39 | ||
@@ -81,7 +82,7 @@ sshkey_file_tests(void) | |||
81 | 82 | ||
82 | TEST_START("RSA1 key hex fingerprint"); | 83 | TEST_START("RSA1 key hex fingerprint"); |
83 | buf = load_text_file("rsa1_1.fp"); | 84 | buf = load_text_file("rsa1_1.fp"); |
84 | cp = sshkey_fingerprint(k1, SSH_FP_MD5, SSH_FP_HEX); | 85 | cp = sshkey_fingerprint(k1, SSH_DIGEST_MD5, SSH_FP_HEX); |
85 | ASSERT_PTR_NE(cp, NULL); | 86 | ASSERT_PTR_NE(cp, NULL); |
86 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 87 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
87 | sshbuf_free(buf); | 88 | sshbuf_free(buf); |
@@ -90,7 +91,7 @@ sshkey_file_tests(void) | |||
90 | 91 | ||
91 | TEST_START("RSA1 key bubblebabble fingerprint"); | 92 | TEST_START("RSA1 key bubblebabble fingerprint"); |
92 | buf = load_text_file("rsa1_1.fp.bb"); | 93 | buf = load_text_file("rsa1_1.fp.bb"); |
93 | cp = sshkey_fingerprint(k1, SSH_FP_SHA1, SSH_FP_BUBBLEBABBLE); | 94 | cp = sshkey_fingerprint(k1, SSH_DIGEST_SHA1, SSH_FP_BUBBLEBABBLE); |
94 | ASSERT_PTR_NE(cp, NULL); | 95 | ASSERT_PTR_NE(cp, NULL); |
95 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 96 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
96 | sshbuf_free(buf); | 97 | sshbuf_free(buf); |
@@ -164,7 +165,7 @@ sshkey_file_tests(void) | |||
164 | 165 | ||
165 | TEST_START("RSA key hex fingerprint"); | 166 | TEST_START("RSA key hex fingerprint"); |
166 | buf = load_text_file("rsa_1.fp"); | 167 | buf = load_text_file("rsa_1.fp"); |
167 | cp = sshkey_fingerprint(k1, SSH_FP_MD5, SSH_FP_HEX); | 168 | cp = sshkey_fingerprint(k1, SSH_DIGEST_MD5, SSH_FP_HEX); |
168 | ASSERT_PTR_NE(cp, NULL); | 169 | ASSERT_PTR_NE(cp, NULL); |
169 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 170 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
170 | sshbuf_free(buf); | 171 | sshbuf_free(buf); |
@@ -173,7 +174,7 @@ sshkey_file_tests(void) | |||
173 | 174 | ||
174 | TEST_START("RSA cert hex fingerprint"); | 175 | TEST_START("RSA cert hex fingerprint"); |
175 | buf = load_text_file("rsa_1-cert.fp"); | 176 | buf = load_text_file("rsa_1-cert.fp"); |
176 | cp = sshkey_fingerprint(k2, SSH_FP_MD5, SSH_FP_HEX); | 177 | cp = sshkey_fingerprint(k2, SSH_DIGEST_MD5, SSH_FP_HEX); |
177 | ASSERT_PTR_NE(cp, NULL); | 178 | ASSERT_PTR_NE(cp, NULL); |
178 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 179 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
179 | sshbuf_free(buf); | 180 | sshbuf_free(buf); |
@@ -183,7 +184,7 @@ sshkey_file_tests(void) | |||
183 | 184 | ||
184 | TEST_START("RSA key bubblebabble fingerprint"); | 185 | TEST_START("RSA key bubblebabble fingerprint"); |
185 | buf = load_text_file("rsa_1.fp.bb"); | 186 | buf = load_text_file("rsa_1.fp.bb"); |
186 | cp = sshkey_fingerprint(k1, SSH_FP_SHA1, SSH_FP_BUBBLEBABBLE); | 187 | cp = sshkey_fingerprint(k1, SSH_DIGEST_SHA1, SSH_FP_BUBBLEBABBLE); |
187 | ASSERT_PTR_NE(cp, NULL); | 188 | ASSERT_PTR_NE(cp, NULL); |
188 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 189 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
189 | sshbuf_free(buf); | 190 | sshbuf_free(buf); |
@@ -257,7 +258,7 @@ sshkey_file_tests(void) | |||
257 | 258 | ||
258 | TEST_START("DSA key hex fingerprint"); | 259 | TEST_START("DSA key hex fingerprint"); |
259 | buf = load_text_file("dsa_1.fp"); | 260 | buf = load_text_file("dsa_1.fp"); |
260 | cp = sshkey_fingerprint(k1, SSH_FP_MD5, SSH_FP_HEX); | 261 | cp = sshkey_fingerprint(k1, SSH_DIGEST_MD5, SSH_FP_HEX); |
261 | ASSERT_PTR_NE(cp, NULL); | 262 | ASSERT_PTR_NE(cp, NULL); |
262 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 263 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
263 | sshbuf_free(buf); | 264 | sshbuf_free(buf); |
@@ -266,7 +267,7 @@ sshkey_file_tests(void) | |||
266 | 267 | ||
267 | TEST_START("DSA cert hex fingerprint"); | 268 | TEST_START("DSA cert hex fingerprint"); |
268 | buf = load_text_file("dsa_1-cert.fp"); | 269 | buf = load_text_file("dsa_1-cert.fp"); |
269 | cp = sshkey_fingerprint(k2, SSH_FP_MD5, SSH_FP_HEX); | 270 | cp = sshkey_fingerprint(k2, SSH_DIGEST_MD5, SSH_FP_HEX); |
270 | ASSERT_PTR_NE(cp, NULL); | 271 | ASSERT_PTR_NE(cp, NULL); |
271 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 272 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
272 | sshbuf_free(buf); | 273 | sshbuf_free(buf); |
@@ -276,7 +277,7 @@ sshkey_file_tests(void) | |||
276 | 277 | ||
277 | TEST_START("DSA key bubblebabble fingerprint"); | 278 | TEST_START("DSA key bubblebabble fingerprint"); |
278 | buf = load_text_file("dsa_1.fp.bb"); | 279 | buf = load_text_file("dsa_1.fp.bb"); |
279 | cp = sshkey_fingerprint(k1, SSH_FP_SHA1, SSH_FP_BUBBLEBABBLE); | 280 | cp = sshkey_fingerprint(k1, SSH_DIGEST_SHA1, SSH_FP_BUBBLEBABBLE); |
280 | ASSERT_PTR_NE(cp, NULL); | 281 | ASSERT_PTR_NE(cp, NULL); |
281 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 282 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
282 | sshbuf_free(buf); | 283 | sshbuf_free(buf); |
@@ -357,7 +358,7 @@ sshkey_file_tests(void) | |||
357 | 358 | ||
358 | TEST_START("ECDSA key hex fingerprint"); | 359 | TEST_START("ECDSA key hex fingerprint"); |
359 | buf = load_text_file("ecdsa_1.fp"); | 360 | buf = load_text_file("ecdsa_1.fp"); |
360 | cp = sshkey_fingerprint(k1, SSH_FP_MD5, SSH_FP_HEX); | 361 | cp = sshkey_fingerprint(k1, SSH_DIGEST_MD5, SSH_FP_HEX); |
361 | ASSERT_PTR_NE(cp, NULL); | 362 | ASSERT_PTR_NE(cp, NULL); |
362 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 363 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
363 | sshbuf_free(buf); | 364 | sshbuf_free(buf); |
@@ -366,7 +367,7 @@ sshkey_file_tests(void) | |||
366 | 367 | ||
367 | TEST_START("ECDSA cert hex fingerprint"); | 368 | TEST_START("ECDSA cert hex fingerprint"); |
368 | buf = load_text_file("ecdsa_1-cert.fp"); | 369 | buf = load_text_file("ecdsa_1-cert.fp"); |
369 | cp = sshkey_fingerprint(k2, SSH_FP_MD5, SSH_FP_HEX); | 370 | cp = sshkey_fingerprint(k2, SSH_DIGEST_MD5, SSH_FP_HEX); |
370 | ASSERT_PTR_NE(cp, NULL); | 371 | ASSERT_PTR_NE(cp, NULL); |
371 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 372 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
372 | sshbuf_free(buf); | 373 | sshbuf_free(buf); |
@@ -376,7 +377,7 @@ sshkey_file_tests(void) | |||
376 | 377 | ||
377 | TEST_START("ECDSA key bubblebabble fingerprint"); | 378 | TEST_START("ECDSA key bubblebabble fingerprint"); |
378 | buf = load_text_file("ecdsa_1.fp.bb"); | 379 | buf = load_text_file("ecdsa_1.fp.bb"); |
379 | cp = sshkey_fingerprint(k1, SSH_FP_SHA1, SSH_FP_BUBBLEBABBLE); | 380 | cp = sshkey_fingerprint(k1, SSH_DIGEST_SHA1, SSH_FP_BUBBLEBABBLE); |
380 | ASSERT_PTR_NE(cp, NULL); | 381 | ASSERT_PTR_NE(cp, NULL); |
381 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 382 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
382 | sshbuf_free(buf); | 383 | sshbuf_free(buf); |
@@ -424,7 +425,7 @@ sshkey_file_tests(void) | |||
424 | 425 | ||
425 | TEST_START("Ed25519 key hex fingerprint"); | 426 | TEST_START("Ed25519 key hex fingerprint"); |
426 | buf = load_text_file("ed25519_1.fp"); | 427 | buf = load_text_file("ed25519_1.fp"); |
427 | cp = sshkey_fingerprint(k1, SSH_FP_MD5, SSH_FP_HEX); | 428 | cp = sshkey_fingerprint(k1, SSH_DIGEST_MD5, SSH_FP_HEX); |
428 | ASSERT_PTR_NE(cp, NULL); | 429 | ASSERT_PTR_NE(cp, NULL); |
429 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 430 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
430 | sshbuf_free(buf); | 431 | sshbuf_free(buf); |
@@ -433,7 +434,7 @@ sshkey_file_tests(void) | |||
433 | 434 | ||
434 | TEST_START("Ed25519 cert hex fingerprint"); | 435 | TEST_START("Ed25519 cert hex fingerprint"); |
435 | buf = load_text_file("ed25519_1-cert.fp"); | 436 | buf = load_text_file("ed25519_1-cert.fp"); |
436 | cp = sshkey_fingerprint(k2, SSH_FP_MD5, SSH_FP_HEX); | 437 | cp = sshkey_fingerprint(k2, SSH_DIGEST_MD5, SSH_FP_HEX); |
437 | ASSERT_PTR_NE(cp, NULL); | 438 | ASSERT_PTR_NE(cp, NULL); |
438 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 439 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
439 | sshbuf_free(buf); | 440 | sshbuf_free(buf); |
@@ -443,7 +444,7 @@ sshkey_file_tests(void) | |||
443 | 444 | ||
444 | TEST_START("Ed25519 key bubblebabble fingerprint"); | 445 | TEST_START("Ed25519 key bubblebabble fingerprint"); |
445 | buf = load_text_file("ed25519_1.fp.bb"); | 446 | buf = load_text_file("ed25519_1.fp.bb"); |
446 | cp = sshkey_fingerprint(k1, SSH_FP_SHA1, SSH_FP_BUBBLEBABBLE); | 447 | cp = sshkey_fingerprint(k1, SSH_DIGEST_SHA1, SSH_FP_BUBBLEBABBLE); |
447 | ASSERT_PTR_NE(cp, NULL); | 448 | ASSERT_PTR_NE(cp, NULL); |
448 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); | 449 | ASSERT_STRING_EQ(cp, (const char *)sshbuf_ptr(buf)); |
449 | sshbuf_free(buf); | 450 | sshbuf_free(buf); |
diff --git a/regress/unittests/sshkey/testdata/dsa_1-cert.fp b/regress/unittests/sshkey/testdata/dsa_1-cert.fp index 56ee1f89b..b26145b24 100644 --- a/regress/unittests/sshkey/testdata/dsa_1-cert.fp +++ b/regress/unittests/sshkey/testdata/dsa_1-cert.fp | |||
@@ -1 +1 @@ | |||
5a:4a:41:8c:4e:fa:4c:52:19:f9:39:49:31:fb:fd:74 | MD5:5a:4a:41:8c:4e:fa:4c:52:19:f9:39:49:31:fb:fd:74 | ||
diff --git a/regress/unittests/sshkey/testdata/dsa_1.fp b/regress/unittests/sshkey/testdata/dsa_1.fp index 56ee1f89b..b26145b24 100644 --- a/regress/unittests/sshkey/testdata/dsa_1.fp +++ b/regress/unittests/sshkey/testdata/dsa_1.fp | |||
@@ -1 +1 @@ | |||
5a:4a:41:8c:4e:fa:4c:52:19:f9:39:49:31:fb:fd:74 | MD5:5a:4a:41:8c:4e:fa:4c:52:19:f9:39:49:31:fb:fd:74 | ||
diff --git a/regress/unittests/sshkey/testdata/dsa_2.fp b/regress/unittests/sshkey/testdata/dsa_2.fp index ba9de82a8..822657403 100644 --- a/regress/unittests/sshkey/testdata/dsa_2.fp +++ b/regress/unittests/sshkey/testdata/dsa_2.fp | |||
@@ -1 +1 @@ | |||
72:5f:50:6b:e5:64:c5:62:21:92:3f:8b:10:9b:9f:1a | MD5:72:5f:50:6b:e5:64:c5:62:21:92:3f:8b:10:9b:9f:1a | ||
diff --git a/regress/unittests/sshkey/testdata/ecdsa_1-cert.fp b/regress/unittests/sshkey/testdata/ecdsa_1-cert.fp index a56dbc8d0..c3d747aff 100644 --- a/regress/unittests/sshkey/testdata/ecdsa_1-cert.fp +++ b/regress/unittests/sshkey/testdata/ecdsa_1-cert.fp | |||
@@ -1 +1 @@ | |||
f7:be:4c:02:65:ed:4c:11:af:ab:a8:dd:0a:92:e7:44 | MD5:f7:be:4c:02:65:ed:4c:11:af:ab:a8:dd:0a:92:e7:44 | ||
diff --git a/regress/unittests/sshkey/testdata/ecdsa_1.fp b/regress/unittests/sshkey/testdata/ecdsa_1.fp index a56dbc8d0..c3d747aff 100644 --- a/regress/unittests/sshkey/testdata/ecdsa_1.fp +++ b/regress/unittests/sshkey/testdata/ecdsa_1.fp | |||
@@ -1 +1 @@ | |||
f7:be:4c:02:65:ed:4c:11:af:ab:a8:dd:0a:92:e7:44 | MD5:f7:be:4c:02:65:ed:4c:11:af:ab:a8:dd:0a:92:e7:44 | ||
diff --git a/regress/unittests/sshkey/testdata/ecdsa_2.fp b/regress/unittests/sshkey/testdata/ecdsa_2.fp index eb4bbdf03..fe7526b92 100644 --- a/regress/unittests/sshkey/testdata/ecdsa_2.fp +++ b/regress/unittests/sshkey/testdata/ecdsa_2.fp | |||
@@ -1 +1 @@ | |||
51:bd:ff:2b:6d:26:9b:90:f9:e1:4a:ca:a0:29:8e:70 | MD5:51:bd:ff:2b:6d:26:9b:90:f9:e1:4a:ca:a0:29:8e:70 | ||
diff --git a/regress/unittests/sshkey/testdata/ed25519_1-cert.fp b/regress/unittests/sshkey/testdata/ed25519_1-cert.fp index e6d23d0b8..fbde87af0 100644 --- a/regress/unittests/sshkey/testdata/ed25519_1-cert.fp +++ b/regress/unittests/sshkey/testdata/ed25519_1-cert.fp | |||
@@ -1 +1 @@ | |||
19:08:8e:7e:4d:e5:de:86:2a:09:47:65:eb:0a:51:2f | MD5:19:08:8e:7e:4d:e5:de:86:2a:09:47:65:eb:0a:51:2f | ||
diff --git a/regress/unittests/sshkey/testdata/ed25519_1.fp b/regress/unittests/sshkey/testdata/ed25519_1.fp index e6d23d0b8..fbde87af0 100644 --- a/regress/unittests/sshkey/testdata/ed25519_1.fp +++ b/regress/unittests/sshkey/testdata/ed25519_1.fp | |||
@@ -1 +1 @@ | |||
19:08:8e:7e:4d:e5:de:86:2a:09:47:65:eb:0a:51:2f | MD5:19:08:8e:7e:4d:e5:de:86:2a:09:47:65:eb:0a:51:2f | ||
diff --git a/regress/unittests/sshkey/testdata/ed25519_2.fp b/regress/unittests/sshkey/testdata/ed25519_2.fp index 02c684f36..ec1cdbb94 100644 --- a/regress/unittests/sshkey/testdata/ed25519_2.fp +++ b/regress/unittests/sshkey/testdata/ed25519_2.fp | |||
@@ -1 +1 @@ | |||
5c:c9:ae:a3:0c:aa:28:29:b8:fc:7c:64:ba:6e:e9:c9 | MD5:5c:c9:ae:a3:0c:aa:28:29:b8:fc:7c:64:ba:6e:e9:c9 | ||
diff --git a/regress/unittests/sshkey/testdata/rsa1_1.fp b/regress/unittests/sshkey/testdata/rsa1_1.fp index 782ece0db..2e1068c64 100644 --- a/regress/unittests/sshkey/testdata/rsa1_1.fp +++ b/regress/unittests/sshkey/testdata/rsa1_1.fp | |||
@@ -1 +1 @@ | |||
a8:82:9b:98:c5:e6:19:d6:83:39:9f:4d:3a:8f:7c:80 | MD5:a8:82:9b:98:c5:e6:19:d6:83:39:9f:4d:3a:8f:7c:80 | ||
diff --git a/regress/unittests/sshkey/testdata/rsa1_2.fp b/regress/unittests/sshkey/testdata/rsa1_2.fp index c3325371d..cd0039306 100644 --- a/regress/unittests/sshkey/testdata/rsa1_2.fp +++ b/regress/unittests/sshkey/testdata/rsa1_2.fp | |||
@@ -1 +1 @@ | |||
c0:83:1c:97:5f:32:77:7e:e4:e3:e9:29:b9:eb:76:9c | MD5:c0:83:1c:97:5f:32:77:7e:e4:e3:e9:29:b9:eb:76:9c | ||
diff --git a/regress/unittests/sshkey/testdata/rsa_1-cert.fp b/regress/unittests/sshkey/testdata/rsa_1-cert.fp index bf9c2e362..1cf780dd9 100644 --- a/regress/unittests/sshkey/testdata/rsa_1-cert.fp +++ b/regress/unittests/sshkey/testdata/rsa_1-cert.fp | |||
@@ -1 +1 @@ | |||
be:27:4c:16:27:f5:04:03:62:a8:b7:91:df:a5:b1:3b | MD5:be:27:4c:16:27:f5:04:03:62:a8:b7:91:df:a5:b1:3b | ||
diff --git a/regress/unittests/sshkey/testdata/rsa_1.fp b/regress/unittests/sshkey/testdata/rsa_1.fp index bf9c2e362..1cf780dd9 100644 --- a/regress/unittests/sshkey/testdata/rsa_1.fp +++ b/regress/unittests/sshkey/testdata/rsa_1.fp | |||
@@ -1 +1 @@ | |||
be:27:4c:16:27:f5:04:03:62:a8:b7:91:df:a5:b1:3b | MD5:be:27:4c:16:27:f5:04:03:62:a8:b7:91:df:a5:b1:3b | ||
diff --git a/regress/unittests/sshkey/testdata/rsa_2.fp b/regress/unittests/sshkey/testdata/rsa_2.fp index 53939f413..8d4367610 100644 --- a/regress/unittests/sshkey/testdata/rsa_2.fp +++ b/regress/unittests/sshkey/testdata/rsa_2.fp | |||
@@ -1 +1 @@ | |||
fb:8f:7b:26:3d:42:40:ef:ed:f1:ed:ee:66:9e:ba:b0 | MD5:fb:8f:7b:26:3d:42:40:ef:ed:f1:ed:ee:66:9e:ba:b0 | ||