/* $OpenBSD: common.c,v 1.8 2025/06/16 08:49:27 dtucker Exp $ */ /* * Helpers for key API tests * * Placed in the public domain */ #include #include #include #include #include #include #include #include #include #include #include #include #include "test_helper.h" #include "ssherr.h" #include "authfile.h" #include "sshkey.h" #include "sshbuf.h" #include "common.h" struct sshbuf * load_file(const char *name) { struct sshbuf *ret = NULL; ASSERT_INT_EQ(sshbuf_load_file(test_data_file(name), &ret), 0); ASSERT_PTR_NE(ret, NULL); return ret; } struct sshbuf * load_text_file(const char *name) { struct sshbuf *ret = load_file(name); const u_char *p; size_t len; /* Trim whitespace at EOL */ for (p = sshbuf_ptr(ret); (len = sshbuf_len(ret)) > 0;) { len--; if (p[len] == '\r' || p[len] == '\t' || p[len] == ' ' || p[len] == '\n') ASSERT_INT_EQ(sshbuf_consume_end(ret, 1), 0); else break; } /* \0 terminate */ ASSERT_INT_EQ(sshbuf_put_u8(ret, 0), 0); return ret; } BIGNUM * load_bignum(const char *name) { BIGNUM *ret = NULL; struct sshbuf *buf; buf = load_text_file(name); ASSERT_INT_NE(BN_hex2bn(&ret, (const char *)sshbuf_ptr(buf)), 0); sshbuf_free(buf); return ret; } const BIGNUM * rsa_n(struct sshkey *k) { const BIGNUM *n = NULL; ASSERT_PTR_NE(k, NULL); ASSERT_PTR_NE(k->pkey, NULL); RSA_get0_key(EVP_PKEY_get0_RSA(k->pkey), &n, NULL, NULL); return n; } const BIGNUM * rsa_e(struct sshkey *k) { const BIGNUM *e = NULL; ASSERT_PTR_NE(k, NULL); ASSERT_PTR_NE(k->pkey, NULL); RSA_get0_key(EVP_PKEY_get0_RSA(k->pkey), NULL, &e, NULL); return e; } const BIGNUM * rsa_p(struct sshkey *k) { const BIGNUM *p = NULL; ASSERT_PTR_NE(k, NULL); ASSERT_PTR_NE(EVP_PKEY_get0_RSA(k->pkey), NULL); RSA_get0_factors(EVP_PKEY_get0_RSA(k->pkey), &p, NULL); return p; } const BIGNUM * rsa_q(struct sshkey *k) { const BIGNUM *q = NULL; ASSERT_PTR_NE(k, NULL); ASSERT_PTR_NE(EVP_PKEY_get0_RSA(k->pkey), NULL); RSA_get0_factors(EVP_PKEY_get0_RSA(k->pkey), NULL, &q); return q; }