Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code | Sign in
(15)

Delta Between Two Patch Sets: ssh/test/keys_test.go

Issue 6944048: code review 6944048: go.crypto/ssh/test: move some variables into common os ... (Closed)
Left Patch Set: Created 12 years, 3 months ago
Right Patch Set: diff -r a5fe000a4ea3 https://code.google.com/p/go.crypto Created 12 years, 3 months ago
Left:
Right:
Use n/p to move between diff chunks; N/P to move between comments. Please Sign in to add in-line comments.
Jump to:
Right: Side by side diff | Download
« no previous file with change/comment | « no previous file | ssh/test/test_unix_test.go » ('j') | no next file with change/comment »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
LEFTRIGHT
(no file at all)
1 package test 1 package test
2 2
3 import ( 3 import (
4 "crypto/rsa" 4 "crypto/rsa"
5 "crypto/x509" 5 "crypto/x509"
6 "encoding/pem" 6 "encoding/pem"
7 "reflect" 7 "reflect"
8 "strings" 8 "strings"
9 "testing" 9 "testing"
10 10
(...skipping 26 matching lines...) Expand all
37 authInvalid = []byte(`ssh-rsa`) 37 authInvalid = []byte(`ssh-rsa`)
38 authWithQuotedCommaInEnv = []byte(`env="HOME=/home/root,dir",no-port-for warding ssh-rsa ` + validKey + ` user@host`) 38 authWithQuotedCommaInEnv = []byte(`env="HOME=/home/root,dir",no-port-for warding ssh-rsa ` + validKey + ` user@host`)
39 authWithQuotedSpaceInEnv = []byte(`env="HOME=/home/root dir",no-port-for warding ssh-rsa ` + validKey + ` user@host`) 39 authWithQuotedSpaceInEnv = []byte(`env="HOME=/home/root dir",no-port-for warding ssh-rsa ` + validKey + ` user@host`)
40 authWithQuotedQuoteInEnv = []byte(`env="HOME=/home/\"root dir",no-port-f orwarding` + "\t" + `ssh-rsa` + "\t" + validKey + ` user@host`) 40 authWithQuotedQuoteInEnv = []byte(`env="HOME=/home/\"root dir",no-port-f orwarding` + "\t" + `ssh-rsa` + "\t" + validKey + ` user@host`)
41 41
42 authWithDoubleQuotedQuote = []byte(`no-port-forwarding,env="HOME=/home/ \"root dir\"" ssh-rsa ` + validKey + "\t" + `user@host`) 42 authWithDoubleQuotedQuote = []byte(`no-port-forwarding,env="HOME=/home/ \"root dir\"" ssh-rsa ` + validKey + "\t" + `user@host`)
43 authWithInvalidSpace = []byte(`env="HOME=/home/root dir", no-port-f orwarding ssh-rsa ` + validKey + ` user@host 43 authWithInvalidSpace = []byte(`env="HOME=/home/root dir", no-port-f orwarding ssh-rsa ` + validKey + ` user@host
44 #more to follow but still no valid keys`) 44 #more to follow but still no valid keys`)
45 authWithMissingQuote = []byte(`env="HOME=/home/root,no-port-forwarding s sh-rsa ` + validKey + ` user@host 45 authWithMissingQuote = []byte(`env="HOME=/home/root,no-port-forwarding s sh-rsa ` + validKey + ` user@host
46 env="HOME=/home/root",shared-control ssh-rsa ` + validKey + ` user@host`) 46 env="HOME=/home/root",shared-control ssh-rsa ` + validKey + ` user@host`)
47
48 testClientPrivateKey = `-----BEGIN RSA PRIVATE KEY-----
49 MIIEowIBAAKCAQEAxF/3T7uD5rb4Cty2vc4qAhA6yclK+sRCCuz6/qy4MnXKlk1P
50 5Le8O4CozsOL784B34ypdPQlsr4G/suXQok5PTMSPnqxjYbN6cGqEvhGrwG2sAe4
51 hKmMk3qd2GiSvuESeDl+2ZVzACDK0y/lFayvPbeeoQpBWGgIKN1WPs+q2/292wwW
52 LRNWNrUuwt2ru92g4Hm/abCK0lfOrnCgU5eV+thZ2IshnfvsQpyweri8YpjOTil3
53 y8yUDUv0MmcpNdoNw/MuvV8NRswkil9btfjEG6Mn9ByXBtq8lAix3XA1aaQKch8d
54 ji6ud4ZZEP8sXX5Q6gqgBOI/naGoErCHwtU9kwIDAQABAoIBAFJRKAp0QEZmTHPB
55 MZk+4r0asIoFpziXLFgIHu7C2DPOzK1Umzj1DCKlPB3wOqi7Ym2jOSWdcnAK2EPW
56 dAGgJC5TSkKGjAcXixmB5RkumfKidUI0+lQh/puTurcMnvcEwglDkLkEvMBA/sSo
57 Pw9m486rOgOnmNzGPyViItURmD2+0yDdLl/vOsO/L1p76GCd0q0J3LqnmsQmawi7
58 Zwj2Stm6BIrggG5GsF204Iet5219TYLo4g1Qb2AlJ9C8P1FtAWhMwJalDxH9Os2/
59 KCDjnaq5n3bXbIU+3QjskjeVXL/Fnbhjnh4zs1EA7eHzl9dCGbcZ2LOimo2PRo8q
60 wVQmz4ECgYEA9dhiu74TxRVoaO5N2X+FsMzRO8gZdP3Z9IrV4jVN8WT4Vdp0snoF
61 gkVkqqbQUNKUb5K6B3Js/qNKfcjLbCNq9fewTcT6WsHQdtPbX/QA6Pa2Z29wrlA2
62 wrIYaAkmVaHny7wsOmgX01aOnuf2MlUnksK43sjZHdIo/m+sDKwwY1cCgYEAzHx4
63 mwUDMdRF4qpDKJhthraBNejRextNQQYsHVnNaMwZ4aeQcH5l85Cgjm7VpGlbVyBQ
64 h4zwFvllImp3D2U3mjVkV8Tm9ID98eWvw2YDzBnS3P3SysajD23Z+BXSG9GNv/8k
65 oAm+bVlvnJy4haK2AcIMk1YFuDuAOmy73abk7iUCgYEAj4qVM1sq/eKfAM1LJRfg
66 /jbIX+hYfMePD8pUUWygIra6jJ4tjtvSBZrwyPb3IImjY3W/KoP0AcVjxAeORohz
67 dkP1a6L8LiuFxSuzpdW5BkyuebxGhXCOWKVVvMDC4jLTPVCUXlHSv3GFemCjjgXM
68 QlNxT5rjsha4Gr8nLIsJAacCgYA4VA1Q/pd7sXKy1p37X8nD8yAyvnh+Be5I/C9I
69 woUP2jFC9MqYAmmJJ4ziz2swiAkuPeuQ+2Tjnz2ZtmQnrIUdiJmkh8vrDGFnshKx
70 q7deELsCPzVCwGcIiAUkDra7DQWUHu9y2lxHePyC0rUNst2aLF8UcvzOXC2danhx
71 vViQtQKBgCmZ7YavE/GNWww8N3xHBJ6UPmUuhQlnAbgNCcdyz30MevBg/JbyUTs2
72 slftTH15QusJ1UoITnnZuFJ40LqDvh8UhiK09ffM/IbUx839/m2vUOdFZB/WNn9g
73 Cy0LzddU4KE8JZ/tlk68+hM5fjLLA0aqSunaql5CKfplwLu8x1hL
74 -----END RSA PRIVATE KEY-----
75 `
76 keys = map[string]string{
77 "ssh_host_dsa_key": `-----BEGIN DSA PRIVATE KEY-----
78 MIIBugIBAAKBgQDe2SIKvZdBp+InawtSXH0NotiMPhm3udyu4hh/E+icMz264kDX
79 v+sV7ddnSQGQWZ/eVU7Jtx29dCMD1VlFpEd7yGKzmdwJIeA+YquNWoqBRQEJsWWS
80 7Fsfvv83dA/DTNIQfOY3+TIs6Mb9vagbgQMU3JUWEhbLE9LCEU6UwwRlpQIVAL4p
81 JF83SwpE8Jx6KnDpR89npkl/AoGAAy00TdDnAXvStwrZiAFbjZi8xDmPa9WwpfhJ
82 Rkno45TthDLrS+WmqY8/LTwlqZdOBtoBAynMJfKkUiZM21lWWpL1hRKYdwBlIBy5
83 XdR2/6wcPSuZ0tCQhDBTstX0Q3P1j198KGKvzy7q9vILKQwtSRqLS1y4JJERafdO
84 E+9CnGwCgYBz0WwBe2EZtGhGhBdnelTIBeo7PIsr0PzqxQj+dc8PBl8K9FfhRyOp
85 U39stUvoUxE9vaIFrY1P5xENjLFnPf+hlcuf40GUWEssW9YWPOaBp8afa9hY5Sxs
86 pvNR6eZFEFOJnx/ZgcA4g+vbrgGi5cM0W470mbGw2CkfJQUafdoIgAIUF+2I9kZe
87 2FTBuC9uacqczDlc+0k=
88 -----END DSA PRIVATE KEY-----`,
89 "ssh_host_rsa_key": `-----BEGIN RSA PRIVATE KEY-----
90 MIIEowIBAAKCAQEAuf76Ue2Wtae9oDtaS6rIJgO7iCFTsZUTW9LBsvx/2nli6jKU
91 d9tUbBRzgdbnRLJ32UljXhERuB/axlrX8/lBzUZ+oYiM0KkEEOXY1z/bcMxdRxGF
92 XHuf4uXvyC2XyA4+ZvBeS4j1QFyIHZ62o7gAlKMTjiek3B4AQEJAlCLmhH3jB8wc
93 K/IYXAOlNGM5G44/ZLQpTi8diOV6DLs7tJ7rtEQedOEJfZng5rwp0USFkqcbfDbe
94 9/hk0J32jZvOtZNBokYtBb4YEdIiWBzzNtHzU3Dzw61+TKVXaH5HaIvzL9iMrw9f
95 kJbJyogfZk9BJfemEN+xqP72jlhE8LXNhpTxFQIDAQABAoIBAHbdf+Y5+5XuNF6h
96 b8xpwW2h9whBnDYiOnP1VfroKWFbMB7R4lZS4joMO+FfkP8zOyqvHwTvza4pFWys
97 g9SUmDvy8FyVYsC7MzEFYzX0xm3o/Te898ip7P1Zy4rXsGeWysSImwqU5X+TYx3i
98 33/zyNM1APtZVJ+jwK9QZ+sD/uPuZK2yS03HGSMZq6ebdoOSaYhluKrxXllSLO1J
99 KJxDiDdy2lEFw0W8HcI3ly1lg6OI+TRqqaCcLVNF4fNJmYIFM+2VEI9BdgynIh0Q
100 pMZlJKgaEBcSqCymnTK81ohYD1cV4st2B0km3Sw35Rl04Ij5ITeiya3hp8VfE6UY
101 PljkA6UCgYEA4811FTFj+kzNZ86C4OW1T5sM4NZt8gcz6CSvVnl+bDzbEOMMyzP7
102 2I9zKsR5ApdodH2m8d+RUw1Oe0bNGW5xig/DH/hn9lLQaO52JAi0we8A94dUUMSq
103 fUk9jKZEXpP/MlfTdJaPos9mxT7z8jREQxIiqH9AV0rLVDOCfDbSWj8CgYEA0QTE
104 IAUuki3UUqYKzLQrh/QmhY5KTx5amNW9XZ2VGtJvDPJrtBSBZlPEuXZAc4eBWEc7
105 U3Y9QwsalzupU6Yi6+gmofaXs8xJnj+jKth1DnJvrbLLGlSmf2Ijnwt22TyFUOtt
106 UAknpjHutDjQPf7pUGWaCPgwwKFsdB8EBjpJF6sCgYAfXesBQAvEK08dPBJJZVfR
107 3kenrd71tIgxLtv1zETcIoUHjjv0vvOunhH9kZAYC0EWyTZzl5UrGmn0D4uuNMbt
108 e74iaNHn2P9Zc3xQ+eHp0j8P1lKFzI6tMaiH9Vz0qOw6wl0bcJ/WizhbcI+migvc
109 MGMVUHBLlMDqly0gbWwJgQKBgQCgtb9ut01FjANSwORQ3L8Tu3/a9Lrh9n7GQKFn
110 V4CLrP1BwStavOF5ojMCPo/zxF6JV8ufsqwL3n/FhFP/QyBarpb1tTqTPiHkkR2O
111 Ffx67TY9IdnUFv4lt3mYEiKBiW0f+MSF42Qe/wmAfKZw5IzUCirTdrFVi0huSGK5
112 vxrwHQKBgHZ7RoC3I2f6F5fflA2ZAe9oJYC7XT624rY7VeOBwK0W0F47iV3euPi/
113 pKvLIBLcWL1Lboo+girnmSZtIYg2iLS3b4T9VFcKWg0y4AVwmhMWe9jWIltfWAAX
114 9l0lNikMRGAx3eXudKXEtbGt3/cUzPVaQUHy5LiBxkxnFxgaJPXs
115 -----END RSA PRIVATE KEY-----`,
116 "ssh_host_ecdsa_key": `-----BEGIN EC PRIVATE KEY-----
117 MHcCAQEEINGWx0zo6fhJ/0EAfrPzVFyFC9s18lBt3cRoEDhS3ARooAoGCCqGSM49
118 AwEHoUQDQgAEi9Hdw6KvZcWxfg2IDhA7UkpDtzzt6ZqJXSsFdLd+Kx4S3Sx4cVO+
119 6/ZOXRnPmNAlLUqjShUsUBBngG0u2fqEqA==
120 -----END EC PRIVATE KEY-----`,
121 "authorized_keys": `ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEX/dP u4PmtvgK3La9zioCEDrJyUr6xEIK7Pr+rLgydcqWTU/kt7w7gKjOw4vvzgHfjKl09CWyvgb+y5dCiTk9 MxI+erGNhs3pwaoS+EavAbawB7iEqYyTep3YaJK+4RJ4OX7ZlXMAIMrTL+UVrK89t56hCkFYaAgo3VY+ z6rb/b3bDBYtE1Y2tS7C3au73aDgeb9psIrSV86ucKBTl5X62FnYiyGd++xCnLB6uLximM5OKXfLzJQN S/QyZyk12g3D8y69Xw1GzCSKX1u1+MQboyf0HJcG2ryUCLHdcDVppApyHx2OLq53hlkQ/yxdflDqCqAE 4j+doagSsIfC1T2T user@host`,
122 }
47 ) 123 )
48 124
49 func TestMarshalParsePublicKey(t *testing.T) { 125 func TestMarshalParsePublicKey(t *testing.T) {
50 pub := getTestPublicKey(t) 126 pub := getTestPublicKey(t)
51 authKeys := ssh.MarshalAuthorizedKey(pub) 127 authKeys := ssh.MarshalAuthorizedKey(pub)
52 actualFields := strings.Fields(string(authKeys)) 128 actualFields := strings.Fields(string(authKeys))
53 if len(actualFields) == 0 { 129 if len(actualFields) == 0 {
54 t.Fatalf("failed authKeys: %v", authKeys) 130 t.Fatalf("failed authKeys: %v", authKeys)
55 } 131 }
56 132
(...skipping 110 matching lines...) Expand 10 before | Expand all | Expand 10 after
167 {pub, []string{`env="HOME=/home/root"`, `shared-control`}, "user @host", "", true}, 243 {pub, []string{`env="HOME=/home/root"`, `shared-control`}, "user @host", "", true},
168 }) 244 })
169 } 245 }
170 246
171 func TestInvalidEntry(t *testing.T) { 247 func TestInvalidEntry(t *testing.T) {
172 _, _, _, _, ok := ssh.ParseAuthorizedKey(authInvalid) 248 _, _, _, _, ok := ssh.ParseAuthorizedKey(authInvalid)
173 if ok { 249 if ok {
174 t.Errorf("Expected invalid entry, returned valid entry") 250 t.Errorf("Expected invalid entry, returned valid entry")
175 } 251 }
176 } 252 }
LEFTRIGHT

Powered by Google App Engine
RSS Feeds Recent Issues | This issue
This is Rietveld f62528b