-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* add support for AES256-CTR in new OpenSSH key format * refactor test to use table test and include new keys * added go module * update travis config * move test in a different package * add .gitignore and exclude vendor folder * format test using placeholders * fixed import sorting * reverted changes to go mod and fixed license removing * remove old golang versions since they are not supported from golang.org/x/cryptho
- Loading branch information
Showing
7 changed files
with
264 additions
and
105 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
/vendor |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,17 @@ | ||
language: go | ||
|
||
sudo: false | ||
|
||
go_import_path: github.com/ScaleFT/sshkeys | ||
|
||
go: | ||
- 1.6 | ||
- 1.7 | ||
- master | ||
- 1.9.x | ||
- 1.10.x | ||
- 1.11.x | ||
- tip | ||
|
||
before_install: | ||
- go get -u github.com/stretchr/testify/require github.com/dchest/bcrypt_pbkdf golang.org/x/crypto/ed25519 golang.org/x/crypto/ssh | ||
|
||
install: | ||
- go get -u github.com/stretchr/testify/require github.com/dchest/bcrypt_pbkdf | ||
script: | ||
- go test -v ./... |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,75 +1,92 @@ | ||
package sshkeys | ||
package sshkeys_test | ||
|
||
import ( | ||
"crypto/rand" | ||
"testing" | ||
|
||
"golang.org/x/crypto/ssh" | ||
|
||
"github.com/ScaleFT/sshkeys" | ||
"github.com/ScaleFT/sshkeys/testdata" | ||
"github.com/stretchr/testify/require" | ||
"golang.org/x/crypto/ssh" | ||
) | ||
|
||
func testSigners(t *testing.T, name string, a ssh.Signer, b ssh.Signer) { | ||
require.Equal(t, a.PublicKey().Marshal(), b.PublicKey().Marshal()) | ||
|
||
sign := []byte("hello world") | ||
sig, err := a.Sign(rand.Reader, sign) | ||
require.NoError(t, err, "signer failed for "+name) | ||
require.NoError(t, err, "signer failed for %s", name) | ||
|
||
err = b.PublicKey().Verify(sign, sig) | ||
require.NoError(t, err, "verify failed for "+name) | ||
require.NoError(t, err, "verify failed for %s", name) | ||
} | ||
|
||
func TestMarshal(t *testing.T) { | ||
func TestMarshalOldFormat(t *testing.T) { | ||
password := []byte("gopher") | ||
for _, k := range testdata.PEMEncryptedKeys { | ||
pk, err := ParseEncryptedRawPrivateKey(k.PEMBytes, []byte(k.EncryptionKey)) | ||
require.NoError(t, err, "error parsing "+k.Name) | ||
require.NotNil(t, pk, "nil return from parsing "+k.Name) | ||
// ed25519 is only specified in the new format | ||
if k.Name == "ed25519-openssh-encrypted-aes256-cbc" || k.Name == "ed25519-openssh-encrypted-aes256-ctr" { | ||
continue | ||
} | ||
t.Run(k.Name, func(t *testing.T) { | ||
pk, err := sshkeys.ParseEncryptedRawPrivateKey(k.PEMBytes, []byte(k.EncryptionKey)) | ||
require.NoError(t, err, "error parsing %s", k.Name) | ||
require.NotNil(t, pk, "nil return from parsing %s", k.Name) | ||
|
||
signer, err := ssh.NewSignerFromKey(pk) | ||
require.NoError(t, err) | ||
signer, err := ssh.NewSignerFromKey(pk) | ||
require.NoError(t, err) | ||
|
||
data, err := Marshal(pk, &MarshalOptions{ | ||
Passphrase: password, | ||
Format: FormatClassicPEM, | ||
}) | ||
data, err := sshkeys.Marshal(pk, &sshkeys.MarshalOptions{ | ||
Passphrase: password, | ||
Format: sshkeys.FormatClassicPEM, | ||
}) | ||
|
||
// ed25519 is only specified in the new format | ||
if k.Name != "ed25519-openssh-encrypted" { | ||
require.NoError(t, err) | ||
require.NotNil(t, data, "nil return from marshaling "+k.Name) | ||
require.NotNil(t, data, "nil return from marshaling %s", k.Name) | ||
|
||
pk2, err := ParseEncryptedRawPrivateKey(data, password) | ||
require.NoError(t, err, "error from parsing "+k.Name) | ||
require.NotNil(t, pk2, "nil return from parsing "+k.Name) | ||
pk2, err := sshkeys.ParseEncryptedRawPrivateKey(data, password) | ||
require.NoError(t, err, "error from parsing %s", k.Name) | ||
require.NotNil(t, pk2, "nil return from parsing %s", k.Name) | ||
|
||
signer2, err := ssh.NewSignerFromKey(pk2) | ||
require.NoError(t, err) | ||
|
||
testSigners(t, k.Name, signer, signer2) | ||
} | ||
|
||
// now use new format | ||
data, err = Marshal(pk, &MarshalOptions{ | ||
Passphrase: password, | ||
Format: FormatOpenSSHv1, | ||
}) | ||
if err != nil && err.Error() == "sshkeys: unsupported key type *dsa.PrivateKey" { | ||
} | ||
} | ||
|
||
func TestMarshalNewFormat(t *testing.T) { | ||
password := []byte("gopher") | ||
for _, k := range testdata.PEMEncryptedKeys { | ||
if k.Name == "dsa-encrypted-aes256-cbc" { | ||
continue | ||
} | ||
require.NoError(t, err) | ||
require.NotNil(t, data, "nil return from marshaling "+k.Name) | ||
|
||
// println("input: " + string(data)) | ||
pk3, err := ParseEncryptedRawPrivateKey(data, password) | ||
require.NoError(t, err, "error from parsing "+k.Name) | ||
require.NotNil(t, pk3, "nil return from parsing "+k.Name) | ||
t.Run(k.Name, func(t *testing.T) { | ||
pk, err := sshkeys.ParseEncryptedRawPrivateKey(k.PEMBytes, []byte(k.EncryptionKey)) | ||
require.NoError(t, err, "error parsing %s", k.Name) | ||
require.NotNil(t, pk, "nil return from parsing %s", k.Name) | ||
|
||
signer3, err := ssh.NewSignerFromKey(pk3) | ||
require.NoError(t, err) | ||
signer, err := ssh.NewSignerFromKey(pk) | ||
require.NoError(t, err) | ||
|
||
data, err := sshkeys.Marshal(pk, &sshkeys.MarshalOptions{ | ||
Passphrase: password, | ||
Format: sshkeys.FormatOpenSSHv1, | ||
}) | ||
|
||
require.NoError(t, err) | ||
require.NotNil(t, data, "nil return from marshaling %s", k.Name) | ||
|
||
testSigners(t, k.Name, signer, signer3) | ||
pk2, err := sshkeys.ParseEncryptedRawPrivateKey(data, password) | ||
require.NoError(t, err, "error from parsing %s", k.Name) | ||
require.NotNil(t, pk2, "nil return from parsing %s", k.Name) | ||
|
||
signer2, err := ssh.NewSignerFromKey(pk2) | ||
require.NoError(t, err) | ||
|
||
testSigners(t, k.Name, signer, signer2) | ||
}) | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,30 +1,35 @@ | ||
package sshkeys | ||
package sshkeys_test | ||
|
||
import ( | ||
"testing" | ||
|
||
"github.com/ScaleFT/sshkeys" | ||
"github.com/ScaleFT/sshkeys/testdata" | ||
"github.com/stretchr/testify/require" | ||
) | ||
|
||
func TestParse(t *testing.T) { | ||
for name, k := range testdata.PEMBytes { | ||
pk, err := ParseEncryptedPrivateKey(k, nil) | ||
require.NoError(t, err, "error parsing "+name) | ||
require.NotNil(t, pk, "nil return from parsing "+name) | ||
for _, k := range testdata.PEMBytes { | ||
t.Run(k.Name, func(t *testing.T) { | ||
pk, err := sshkeys.ParseEncryptedPrivateKey(k.PEMBytes, nil) | ||
require.NoError(t, err, "error parsing %s", k.Name) | ||
require.NotNil(t, pk, "nil return from parsing %s", k.Name) | ||
}) | ||
} | ||
} | ||
|
||
func TestEncryptedParse(t *testing.T) { | ||
wrongKey := []byte("hello world") | ||
for _, k := range testdata.PEMEncryptedKeys { | ||
pk, err := ParseEncryptedPrivateKey(k.PEMBytes, wrongKey) | ||
require.Error(t, err, "expected error from "+k.Name) | ||
require.Equal(t, err, ErrIncorrectPassword, "expected error from "+k.Name) | ||
require.Nil(t, pk, "non-nil return from parsing "+k.Name) | ||
t.Run(k.Name, func(t *testing.T) { | ||
pk, err := sshkeys.ParseEncryptedPrivateKey(k.PEMBytes, wrongKey) | ||
require.Error(t, err, "expected error from %s", k.Name) | ||
require.Equal(t, err, sshkeys.ErrIncorrectPassword, "expected error from %s", k.Name) | ||
require.Nil(t, pk, "non-nil return from parsing %s", k.Name) | ||
|
||
pk, err = ParseEncryptedPrivateKey(k.PEMBytes, []byte(k.EncryptionKey)) | ||
require.NoError(t, err) | ||
require.NotNil(t, pk, "nil return from parsing "+k.Name) | ||
pk, err = sshkeys.ParseEncryptedPrivateKey(k.PEMBytes, []byte(k.EncryptionKey)) | ||
require.NoError(t, err) | ||
require.NotNil(t, pk, "nil return from parsing %s", k.Name) | ||
}) | ||
} | ||
} |
Oops, something went wrong.