diff options
Diffstat (limited to 'regress/unittests/sshkey')
-rw-r--r-- | regress/unittests/sshkey/test_sshkey.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/regress/unittests/sshkey/test_sshkey.c b/regress/unittests/sshkey/test_sshkey.c index 3e4e39b62..b233a254b 100644 --- a/regress/unittests/sshkey/test_sshkey.c +++ b/regress/unittests/sshkey/test_sshkey.c | |||
@@ -217,12 +217,14 @@ sshkey_tests(void) | |||
217 | sshkey_free(k1); | 217 | sshkey_free(k1); |
218 | TEST_DONE(); | 218 | TEST_DONE(); |
219 | 219 | ||
220 | #ifdef OPENSSL_HAS_ECC | ||
220 | TEST_START("new/free KEY_ECDSA"); | 221 | TEST_START("new/free KEY_ECDSA"); |
221 | k1 = sshkey_new(KEY_ECDSA); | 222 | k1 = sshkey_new(KEY_ECDSA); |
222 | ASSERT_PTR_NE(k1, NULL); | 223 | ASSERT_PTR_NE(k1, NULL); |
223 | ASSERT_PTR_EQ(k1->ecdsa, NULL); /* Can't allocate without NID */ | 224 | ASSERT_PTR_EQ(k1->ecdsa, NULL); /* Can't allocate without NID */ |
224 | sshkey_free(k1); | 225 | sshkey_free(k1); |
225 | TEST_DONE(); | 226 | TEST_DONE(); |
227 | #endif | ||
226 | 228 | ||
227 | TEST_START("new/free KEY_ED25519"); | 229 | TEST_START("new/free KEY_ED25519"); |
228 | k1 = sshkey_new(KEY_ED25519); | 230 | k1 = sshkey_new(KEY_ED25519); |
@@ -273,12 +275,14 @@ sshkey_tests(void) | |||
273 | sshkey_free(k1); | 275 | sshkey_free(k1); |
274 | TEST_DONE(); | 276 | TEST_DONE(); |
275 | 277 | ||
278 | #ifdef OPENSSL_HAS_ECC | ||
276 | TEST_START("generate KEY_ECDSA wrong bits"); | 279 | TEST_START("generate KEY_ECDSA wrong bits"); |
277 | ASSERT_INT_EQ(sshkey_generate(KEY_ECDSA, 42, &k1), | 280 | ASSERT_INT_EQ(sshkey_generate(KEY_ECDSA, 42, &k1), |
278 | SSH_ERR_INVALID_ARGUMENT); | 281 | SSH_ERR_INVALID_ARGUMENT); |
279 | ASSERT_PTR_EQ(k1, NULL); | 282 | ASSERT_PTR_EQ(k1, NULL); |
280 | sshkey_free(k1); | 283 | sshkey_free(k1); |
281 | TEST_DONE(); | 284 | TEST_DONE(); |
285 | #endif | ||
282 | 286 | ||
283 | TEST_START("generate KEY_RSA"); | 287 | TEST_START("generate KEY_RSA"); |
284 | ASSERT_INT_EQ(sshkey_generate(KEY_RSA, 768, &kr), 0); | 288 | ASSERT_INT_EQ(sshkey_generate(KEY_RSA, 768, &kr), 0); |
@@ -474,6 +478,7 @@ sshkey_tests(void) | |||
474 | sshkey_free(k2); | 478 | sshkey_free(k2); |
475 | TEST_DONE(); | 479 | TEST_DONE(); |
476 | 480 | ||
481 | #ifdef OPENSSL_HAS_ECC | ||
477 | TEST_START("sign and verify ECDSA"); | 482 | TEST_START("sign and verify ECDSA"); |
478 | k1 = get_private("ecdsa_1"); | 483 | k1 = get_private("ecdsa_1"); |
479 | ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_2.pub"), &k2, | 484 | ASSERT_INT_EQ(sshkey_load_public(test_data_file("ecdsa_2.pub"), &k2, |
@@ -482,6 +487,7 @@ sshkey_tests(void) | |||
482 | sshkey_free(k1); | 487 | sshkey_free(k1); |
483 | sshkey_free(k2); | 488 | sshkey_free(k2); |
484 | TEST_DONE(); | 489 | TEST_DONE(); |
490 | #endif | ||
485 | 491 | ||
486 | TEST_START("sign and verify ED25519"); | 492 | TEST_START("sign and verify ED25519"); |
487 | k1 = get_private("ed25519_1"); | 493 | k1 = get_private("ed25519_1"); |