first commit
This commit is contained in:
17
build/node_modules/ssh2-streams/test/fixtures/encrypted-dsa.ppk
generated
vendored
Normal file
17
build/node_modules/ssh2-streams/test/fixtures/encrypted-dsa.ppk
generated
vendored
Normal file
@@ -0,0 +1,17 @@
|
||||
PuTTY-User-Key-File-2: ssh-dss
|
||||
Encryption: aes256-cbc
|
||||
Comment: dsa-key-20141202
|
||||
Public-Lines: 10
|
||||
AAAAB3NzaC1kc3MAAACBAJn2I8YefRo3BsEeinQt8KQ4cEyArAs7Y/W733oRSYOI
|
||||
zWF1Ju124ysKrmg2okv+05CYcjV3Yp4AzQeomYAlgmB/7xCEnWaEnxCwAxmrrJMm
|
||||
PrkwNjHOIi7yM5QOE90IM/Q+IJA4EPBfSb+Xr8fYhrp53KNHVSnc2KkOqpo2FsIj
|
||||
AAAAFQC4NlP50GqyUqq2B82Vh/w5j3TzwQAAAIAeSGom9LLNdzcwCHnGfxKNnEz3
|
||||
55KITADTxiIpBvnQW+eDHwQvIw6V2Oc73bKCu5ZirZmIMW5w6KjQVwkuQBoF9Koq
|
||||
/2u6VeevtL9pD6TBzSLMVw5pV3PmE4/C/eLiaUxZLIHdbzpqPkAvAUBrXKkj0ijz
|
||||
cNzCp1fuF8H0pvR8yQAAAIAmvV+kqWhUgDYwNNz1qDaoS8XdsOponutZ/0stRQ66
|
||||
mKAy8kNVNNQ6oUx1XFl1WUt4iyFY/2Rz2fZhLz5/TbZRK5ygo666WgnxB/Ud4GAx
|
||||
/BPQTghOJJOL00vJk+8jVCGNDc942V6nFXznDMXwqxhRCW6dm+2lTh7ntrli8mCk
|
||||
5g==
|
||||
Private-Lines: 1
|
||||
BytvbK+jNyMjiVxCO5lcE4YbW7q293oC+LZjkZ8Ajlw=
|
||||
Private-MAC: c3da536ea28851fc32d5d1ff01498c8fcebc1170
|
||||
18
build/node_modules/ssh2-streams/test/fixtures/encrypted-rsa.ppk
generated
vendored
Normal file
18
build/node_modules/ssh2-streams/test/fixtures/encrypted-rsa.ppk
generated
vendored
Normal file
@@ -0,0 +1,18 @@
|
||||
PuTTY-User-Key-File-2: ssh-rsa
|
||||
Encryption: aes256-cbc
|
||||
Comment: rsa-key-20141119
|
||||
Public-Lines: 4
|
||||
AAAAB3NzaC1yc2EAAAABJQAAAIBrBWETAVAyJmuNG53jwTNDlbIcH5lrEvcx6lx5
|
||||
bM6EKg0XmOIH96VqUjS7eRRTTD9lpBA8hYhkrOjOx93/JWB/pcVN8/B3DYHshT9O
|
||||
BW1DCkrNwut2pbJ2oZOBirhhAr+xqWFr3551FqbzaCIXpOKubr4EcIwCipBl6PxL
|
||||
USfHgw==
|
||||
Private-Lines: 8
|
||||
8O3NrBePR4+4RHHys8wrRKCmgx3Gsdz1cKoRJJDgnnrQxuAxBTVUlVTC2vzSOXrP
|
||||
jlKdRP9DbtrL5YF8g9HkMPpzzTdgpiEAGikpIc+L0sJhN+S9VvMoXRRKqyuB7o1C
|
||||
xZhAeRaZ68izdUUbFd7ajUwBNpGoFppOznGXyf/3/Ao9FfoTKReZzeBd/e2/JFhc
|
||||
nsYkSbtWfKQBVXF1Fhr10UwRWSMaVJSDkcSuk8ghICoKBBCgRBnZFap0SR77oIJh
|
||||
DKgmNFktoKzEqh111vYPhQyEEyGNxpD0aEPaGUJEjPEd3C5a46n7mIiqrNX7QJoo
|
||||
xxZtkueGdXWaoe5mBf1tFc+nCA1l72nUlghJZooQhnO9NPpieu6NNZ8X+tFQ1Rq/
|
||||
xvOZHzpDOOeOgWdV7oAmRDbDjYPh0H67z2OKCFaP0Z9kgmnwqV2IJvTDrexj1VwY
|
||||
6kFaPldnK+ohXl37oVIlWA==
|
||||
Private-MAC: 9d09a15a122e48955682ba969d33c75ba8e4be2c
|
||||
27
build/node_modules/ssh2-streams/test/fixtures/id_rsa
generated
vendored
Normal file
27
build/node_modules/ssh2-streams/test/fixtures/id_rsa
generated
vendored
Normal file
@@ -0,0 +1,27 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEpgIBAAKCAQEAysX9gGx5CsLW3xHqOgnrbfCuXy1Y0OFpZBxWs6FNHxtqpxRD
|
||||
Ii8vnWQw9Ltul5NhBb1QrS/3XlODu5rv8VWZy+ciXDaeaVYvzCR3fHmQyDXA+WLR
|
||||
x8kkR4ZxHTQREj1yifGyHdZTMsMbSaW9Eh2+sgWIjZaBkLjF2NDT52HX0y+zr2WL
|
||||
TYVCcYf9ugCJIfwXN4/SpR+cV3MSak+4HfFDRo7EwFbYL8QRpNZLVVas5SUpN3CR
|
||||
e6u26zPNgcqSRmC81lA/e2t7qG1qvjFy9RgJpUJJsZan5yMYAob9p83Fo61ajLX1
|
||||
DeqpZPauEfe9e/4bkjVbU8gW/cgb9Ct6v+59fQIDAQABAoIBAQCUH6GZKKQbKk1Q
|
||||
UoPptclXXFPkjvmsTJ1yVgk32wK9UIfOWUzZMeL0dHYWsLyO2Ugsqyi9+qYXL6ax
|
||||
avMQNlnMy6Eb/4IkrKLp21G1ihArUKkRBBD+gn6QCTOkA57c1ipPflGA3kmUcVYD
|
||||
rKC7FSNyY/xmgaVQFMniIlpJUf4Y9BjIKC2FSTGxtKx2AI7eBDjmiZ7Mkcinaf62
|
||||
5jl0AfV0/PgBb7AqhPWcmJp+/jWyZ3IrlPvMspEg6PfLnNzACKrh/Qorkhf3cLcn
|
||||
aFJmnyRn4Zhx+scqoWq1NcYOfNyU+eAEofTu8TwvGVh0nx9C2vxwPftjDQlfh0kf
|
||||
wGscN72BAoGBAOZs4u5ObnFf4pNbGfjhLhSf2vXATb9TYjr8vPc4xbviukYGPaNR
|
||||
tP5d9oXHecFP37IeV6I0SmMmd0Sth56/RfRFD8Rirq3MjjKWvwwbJ1sd34n9cqN3
|
||||
goSWERfqPOzVMjxEPqq0wm/7Y61EU5Gt1ou8MOOS+lPx3LmpapSjSNutAoGBAOFH
|
||||
bLZQUpLaUf7ijCU/yykRdpzBpwDDEgRqf7RLqS8p+tzI9z39KfNSxrVEqhWe7uuZ
|
||||
3dl8EjrXhBK8FoCDAD6yrx35aUUeUJHZp/kFoXBdlHpGk8VvveTJMSqPS6KxKglB
|
||||
JqINECpwHzasQSun2vhLsH6ikUUqnB8qkJYMNGMRAoGBAJ5wio1/4pMUclAOWUp3
|
||||
U18dF8rZItyGskmLFUgMgnIRkTGrAuD0wrYQ1/zez0pr6I2qLWm7+NY6UdIoW9N9
|
||||
A9XVUuUfUarxt2jznIPve908KkPQwO3DtDwEj9ZY2vGiGruz1T89sWCcg8pU6/2E
|
||||
gbxtd1RT8MqdyL7kzgNMT0G1AoGBAMc1otOBKdPEjVeIPAfAZsXVNH8f268X0Lno
|
||||
9y6W7W/Qfo54g/HkChGqNB8dLg5accoTURO93Fz+MUNj4b4YmcHXvnUSFV3Slcqz
|
||||
nw7dRMoZZm/OM2QXEOPcacbJ2kduxM5UN3Z7eL0eUuvE3QhesYp5XARPe4ifSllh
|
||||
CWQ2PKkRAoGBAMFANW/IxEH6H60yfJbY9t/0ggu4DoVI62rmv43n2dYsdNeaF1Fl
|
||||
SbGoK16+6ERyjyJtqe0642LpgenrEcpJbXxr1qtG6gGRCJIcZ8gJDiVj4XW1d1cZ
|
||||
eCNZLVlVOrBNRkKmXDD5Sd10m52tlBMfarvskgbJVvkRO6pSz3o8Q0B1
|
||||
-----END RSA PRIVATE KEY-----
|
||||
30
build/node_modules/ssh2-streams/test/fixtures/id_rsa_enc
generated
vendored
Normal file
30
build/node_modules/ssh2-streams/test/fixtures/id_rsa_enc
generated
vendored
Normal file
@@ -0,0 +1,30 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
Proc-Type: 4,ENCRYPTED
|
||||
DEK-Info: AES-128-CBC,3E36D2FEB814842942EC58DA9722DB75
|
||||
|
||||
MBCl5tVBiTjZywjXSMPNnVcBzuAhZzLsvb/pPofnVNnx96CqBMAzaKxGu6Ls9UBu
|
||||
ejGGOik+8EJHV7p7dj6GAf5srgBnFXVYQy69eoL4xl1IuKoSKOXicS70/QXuApzY
|
||||
tBdwnqMz1y1tuWZ0q4iOZYQHqvNTvhH4s/rfm8/As7GwPi4NQ4FipsbOifKVIlJN
|
||||
0+XQAZLBjD6D2BFbVBas2RyI/zT5NyFtFxEPlQwWjuajnDrdVFf59mkzHzQc8Jo1
|
||||
qjCv6bDHTW9EeoZeloqpAaYegmOYGynb8HQzmbEBoarXsOkwtaI38jXT3WOljaVJ
|
||||
xuWV7xl181CsV4dgbyd948YKcHg3riRQiQwXXlKe4MTGwcQ3sybR4oFLzFIa6Ct2
|
||||
qbsyqvc+3tiBhOZtiAXgDdbzvXR+60aSTjduVp+52lF/m4l658Sleyx2hxQ3LEcc
|
||||
lbuG27WIbLEATeqV9gaJ1jDtEyEtGNALAdIZF6YdND5tiTSqHd0n3yUMbZVdiQ5i
|
||||
s5lSfWD38c3Is4hOdZlG9nMFoAGe7wnFmV+N5Cv3vnlFPFogoO4eVZS5S+ReAmas
|
||||
syOelwKvVNNy0FzCoQ3URZWLQTKsZ7Wkl1ve9jJ5ZPox0p09A0gcykIB5oya9/OL
|
||||
oTKDhoenoh0p3ttyQ7WbkUc9VwHNn+rX7N3v/Ui+NF8mnCfD/1UOzBhRY0LjDCfO
|
||||
qT70wd63c4cSr0HCTDNrGtShztJD9gdzwIH6q/eNDjFk1S8KOrV/K6wQwWzULs+c
|
||||
Ld/7xkELz+d60Ll5dVUHcSxOhYwBVY+GGC5ybOmSqr5+t1MDfLN0Q4d3x0X6LU2q
|
||||
sL94x93XFY342x5NpjOusKISCaCx9eBXxCpi132IAfmB7kDZXpbe02aed0bNChUP
|
||||
IM6eXFYVfPb5YZ3oXlWJ+e/E01dGPK2rHnAzOLH2DSmDZ7MWZW5hkRKQ4zU6/ECo
|
||||
0K7uGLAdpCoC8FKWcE2Gm7fol5fmHes06SNC1wLyVHtv4g7kFfnfmNIVVy3lSP1f
|
||||
WoHRL52lNOCR+E1N03djvyKoK46cKiJ9TcBrJXcMHSSjPvqLafS/AUK+FYjxlqyM
|
||||
qXgATtt/n0h+VxjPm2+xZNVHC5fD5GHhoo3PhmapLpLNyDlhzJTy/iFtrmX6uht1
|
||||
4XDYmzzQyoRu6+1DQ7HPpwXZf84+QFGGfb/LTiLUF+pgCHOt41HdHEaU6eIHGEk0
|
||||
wfTfWG2pP/2wDUtX8KVAnikfIaa5KrC/ZuDV5pfp0Tk+Rjt2iv9+YuB7fPrvKF3Z
|
||||
B7zgMuBG8FQZMFHvWsaDHE/vo8fivgeM0zVL0shigLuwL+p6EeanRdm5bRavF8M8
|
||||
XDtOjZt/id4UMQDuobawUVadTZhtGfFNfO9Wt16EAa6jhRBJ1A+FRGqFbJXV36ZV
|
||||
zzx7edCzyCd0rcsZoi6Kz4NeDxm1lcGspBBhstUT5cbgQo91wAZCU1hpj/qsqygr
|
||||
KK4NcNpDjYFc1azb/zRGe+zx1WzWhKAZR6HfMEoJwzyzTcwRmApbTEYqv+oYxC0+
|
||||
f/HNQaCH/UGDy4QEvMVaJRnjFv7oW6GpS7ob6POvi2esgYglwNJR1hN86W7kfOrF
|
||||
-----END RSA PRIVATE KEY-----
|
||||
15
build/node_modules/ssh2-streams/test/fixtures/ssh_host_rsa_key
generated
vendored
Normal file
15
build/node_modules/ssh2-streams/test/fixtures/ssh_host_rsa_key
generated
vendored
Normal file
@@ -0,0 +1,15 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIICXAIBAAKBgQC57UB/5H0M+t+mopksrltCCIXghryzofJjau+8tuMT9CG6ta3S
|
||||
O9aKApJUUG/xtc88giVhB7HFABX/oob+jrkSthR8s/whULC8E+GhvOBjHydRUZIs
|
||||
aPYOMBb42HcbOsgq3li/hwOcDk0vY00hZDKCum9BgvRAb7dPEkw2dmiCQQIDAQAB
|
||||
AoGAMG+HOwoaLbR5aR64yrQNYBF6Vvii1iUdURr9o2r9kygpVUuZIcim5kMvPbnK
|
||||
v+w+NaQt+q4XeJvCH1uG0W/69FwnphfaOVmCCUtsoJ6sU3fWr9x59MtKL2Llh8xR
|
||||
50lz6R+eDXoYRDq245hG9BFn/bu0vtqQqx06mlZJcjaRocECQQDjdYFmr+DSww3x
|
||||
VNx0G0DUkaQZZ+iqZiT3Zund2pcBB4aLiewOrqj0GFct4+YNzgxIXPejmS0eSokN
|
||||
N2lC3NxZAkEA0UGjN5TG5/LEK3zcYtx2kpXryenrYORo1n2L/WPMZ0mjLQyd4LJr
|
||||
ibfgVUfwX/kV3vgGYLwjpgcaTiMsecv4KQJAYMmMgZSPdz+WvD1e/WznXkyG5mSn
|
||||
xXJngnrhQw0TulVodBIBR5IcxJli510VdIRcB6K/oXa5ky0mOmB8wv3WKQJBAKEF
|
||||
PxE//KbzWhyUogm4180IbD4dMDCI0ltqlFRRfTJlqZi6wqnq4XFB+u/kwYU4aKoA
|
||||
dPfvDgduI8HIsyqt17ECQDI/HC8PiYsDIOyVpQuQdIAsbGmoavK7X1MVEWR2nj9t
|
||||
7BbUVFSnVKynL4TWIJZ6xP8WQwkDBQc5WjognHDaUTQ=
|
||||
-----END RSA PRIVATE KEY-----
|
||||
169
build/node_modules/ssh2-streams/test/test-durability-ssh.js
generated
vendored
Normal file
169
build/node_modules/ssh2-streams/test/test-durability-ssh.js
generated
vendored
Normal file
@@ -0,0 +1,169 @@
|
||||
var SSH2Stream = require('../lib/ssh');
|
||||
|
||||
var fs = require('fs');
|
||||
var path = require('path');
|
||||
var inspect = require('util').inspect;
|
||||
var inherits = require('util').inherits;
|
||||
var TransformStream = require('stream').Transform;
|
||||
var assert = require('assert');
|
||||
|
||||
var t = -1;
|
||||
var group = path.basename(__filename, '.js') + '/';
|
||||
var fixturesdir = path.join(__dirname, 'fixtures');
|
||||
|
||||
var HOST_KEY_RSA = fs.readFileSync(path.join(fixturesdir, 'ssh_host_rsa_key'));
|
||||
var SERVER_CONFIG = {
|
||||
server: true,
|
||||
hostKeys: { 'ssh-rsa': HOST_KEY_RSA }
|
||||
};
|
||||
|
||||
function SimpleStream() {
|
||||
TransformStream.call(this);
|
||||
this.buffer = '';
|
||||
}
|
||||
inherits(SimpleStream, TransformStream);
|
||||
SimpleStream.prototype._transform = function(chunk, encoding, cb) {
|
||||
this.buffer += chunk.toString('binary');
|
||||
cb();
|
||||
};
|
||||
|
||||
var tests = [
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var serverError = false;
|
||||
var server = new SSH2Stream(SERVER_CONFIG);
|
||||
var client = new SimpleStream();
|
||||
|
||||
client.pipe(server).pipe(client);
|
||||
|
||||
server.on('error', function(err) {
|
||||
serverError = err;
|
||||
assert(err.message === 'Protocol version not supported',
|
||||
makeMsg(what, 'Wrong error message'));
|
||||
}).on('end', function() {
|
||||
assert(client.buffer === server.config.ident + '\r\n',
|
||||
makeMsg(what, 'Wrong server ident: ' + inspect(client.buffer)));
|
||||
assert(serverError, makeMsg(what, 'Expected server error'));
|
||||
next();
|
||||
});
|
||||
|
||||
client.push('SSH-1.0-aaa\r\n');
|
||||
},
|
||||
what: 'Incompatible client SSH protocol version'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var serverError = false;
|
||||
var server = new SSH2Stream(SERVER_CONFIG);
|
||||
var client = new SimpleStream();
|
||||
|
||||
client.pipe(server).pipe(client);
|
||||
|
||||
server.on('error', function(err) {
|
||||
serverError = err;
|
||||
assert(err.message === 'Bad identification start',
|
||||
makeMsg(what, 'Wrong error message'));
|
||||
}).on('end', function() {
|
||||
assert(client.buffer === server.config.ident + '\r\n',
|
||||
makeMsg(what, 'Wrong server ident: ' + inspect(client.buffer)));
|
||||
assert(serverError, makeMsg(what, 'Expected server error'));
|
||||
next();
|
||||
});
|
||||
client.push('LOL-2.0-asdf\r\n');
|
||||
},
|
||||
what: 'Malformed client protocol identification'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var serverError = false;
|
||||
var server = new SSH2Stream(SERVER_CONFIG);
|
||||
var client = new SimpleStream();
|
||||
|
||||
client.pipe(server).pipe(client);
|
||||
|
||||
server.on('error', function(err) {
|
||||
serverError = err;
|
||||
assert(err.message === 'Max identification string size exceeded',
|
||||
makeMsg(what, 'Wrong error message'));
|
||||
}).on('end', function() {
|
||||
assert(client.buffer === server.config.ident + '\r\n',
|
||||
makeMsg(what, 'Wrong server ident: ' + inspect(client.buffer)));
|
||||
assert(serverError, makeMsg(what, 'Expected server error'));
|
||||
next();
|
||||
});
|
||||
var ident = 'SSH-2.0-';
|
||||
for (var i = 0; i < 30; ++i)
|
||||
ident += 'foobarbaz';
|
||||
ident += '\r\n';
|
||||
client.push(ident);
|
||||
},
|
||||
what: 'SSH client protocol identification too long (> 255 characters)'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var serverError = false;
|
||||
var server = new SSH2Stream(SERVER_CONFIG);
|
||||
var client = new SimpleStream();
|
||||
|
||||
client.pipe(server).pipe(client);
|
||||
|
||||
server.on('error', function(err) {
|
||||
serverError = err;
|
||||
assert(err.message === 'Bad packet length',
|
||||
makeMsg(what, 'Wrong error message'));
|
||||
}).on('end', function() {
|
||||
assert(client.buffer.length, makeMsg(what, 'Expected server data'));
|
||||
assert(serverError, makeMsg(what, 'Expected server error'));
|
||||
next();
|
||||
});
|
||||
client.push('SSH-2.0-asdf\r\n');
|
||||
// 500,000 byte packet_length
|
||||
client.push(new Buffer([0x00, 0x07, 0xA1, 0x20, 0x00, 0x00, 0x00, 0x00]));
|
||||
},
|
||||
what: 'Bad packet length (max)'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var serverError = false;
|
||||
var server = new SSH2Stream(SERVER_CONFIG);
|
||||
var client = new SimpleStream();
|
||||
|
||||
client.pipe(server).pipe(client);
|
||||
|
||||
server.on('error', function(err) {
|
||||
serverError = err;
|
||||
assert(err.message === 'Bad packet length',
|
||||
makeMsg(what, 'Wrong error message'));
|
||||
}).on('end', function() {
|
||||
assert(client.buffer.length, makeMsg(what, 'Expected server data'));
|
||||
assert(serverError, makeMsg(what, 'Expected server error'));
|
||||
next();
|
||||
});
|
||||
client.push('SSH-2.0-asdf\r\n');
|
||||
client.push(new Buffer([0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00]));
|
||||
},
|
||||
what: 'Bad packet length (min)'
|
||||
},
|
||||
];
|
||||
|
||||
function next() {
|
||||
if (Array.isArray(process._events.exit))
|
||||
process._events.exit = process._events.exit[1];
|
||||
if (++t === tests.length)
|
||||
return;
|
||||
|
||||
var v = tests[t];
|
||||
v.run.call(v);
|
||||
}
|
||||
|
||||
function makeMsg(what, msg) {
|
||||
return '[' + group + what + ']: ' + msg;
|
||||
}
|
||||
|
||||
process.once('exit', function() {
|
||||
assert(t === tests.length,
|
||||
makeMsg('_exit',
|
||||
'Only finished ' + t + '/' + tests.length + ' tests'));
|
||||
});
|
||||
|
||||
next();
|
||||
66
build/node_modules/ssh2-streams/test/test-kexdh.js
generated
vendored
Normal file
66
build/node_modules/ssh2-streams/test/test-kexdh.js
generated
vendored
Normal file
@@ -0,0 +1,66 @@
|
||||
var SSH2Stream = require('../lib/ssh');
|
||||
var parseKey = require('../lib/utils').parseKey;
|
||||
var genPubKey = require('../lib/utils').genPublicKey;
|
||||
var MESSAGE = require('../lib/constants').MESSAGE;
|
||||
|
||||
var assert = require('assert');
|
||||
var fs = require('fs');
|
||||
|
||||
var SERVER_KEY = fs.readFileSync(__dirname + '/fixtures/ssh_host_rsa_key');
|
||||
var SERVER_KEY_PRV = parseKey(SERVER_KEY);
|
||||
var SERVER_KEY_PUB = genPubKey(SERVER_KEY_PRV);
|
||||
|
||||
var server = new SSH2Stream({
|
||||
server: true,
|
||||
hostKeys: {
|
||||
'ssh-rsa': {
|
||||
privateKey: SERVER_KEY_PRV,
|
||||
publicKey: SERVER_KEY_PUB,
|
||||
}
|
||||
}
|
||||
});
|
||||
var client = new SSH2Stream();
|
||||
var cliError;
|
||||
var srvError;
|
||||
|
||||
server.on('error', function(err) {
|
||||
assert(err);
|
||||
assert(/unexpected/.test(err.message));
|
||||
assert(!srvError);
|
||||
srvError = err;
|
||||
});
|
||||
|
||||
// Removed 'KEXDH_REPLY' listeners as it causes client to send 'NEWKEYS' which
|
||||
// changes server's state.
|
||||
client.removeAllListeners('KEXDH_REPLY');
|
||||
// Removed 'NEWKEYS' listeners as server sends 'NEWKEYS' after receiving
|
||||
// 'KEXDH_INIT' which causes errors on client if 'NEWKEYS' is processed
|
||||
// without processing 'KEXDH_REPLY'
|
||||
client.removeAllListeners('NEWKEYS');
|
||||
// Added 'KEXDH_REPLY' which violates protocol and re-sends 'KEXDH_INIT'
|
||||
// packet
|
||||
client.on('KEXDH_REPLY', function(info) {
|
||||
var state = client._state;
|
||||
var outstate = state.outgoing;
|
||||
var buf = new Buffer(1 + 4 + outstate.pubkey.length);
|
||||
buf[0] = MESSAGE.KEXDH_INIT;
|
||||
buf.writeUInt32BE(outstate.pubkey.length, 1, true);
|
||||
outstate.pubkey.copy(buf, 5);
|
||||
SSH2Stream._send(client, buf, undefined, true);
|
||||
});
|
||||
client.on('error', function(err) {
|
||||
assert(!cliError);
|
||||
assert(err);
|
||||
assert.equal(
|
||||
err.message,
|
||||
'PROTOCOL_ERROR',
|
||||
'Expected Error: PROTOCOL_ERROR Got Error: ' + err.message
|
||||
);
|
||||
cliError = err;
|
||||
});
|
||||
client.pipe(server).pipe(client);
|
||||
|
||||
process.on('exit', function() {
|
||||
assert(cliError, 'Expected client error');
|
||||
//assert(srvError, 'Expected server error');
|
||||
});
|
||||
2301
build/node_modules/ssh2-streams/test/test-keyparser.js
generated
vendored
Normal file
2301
build/node_modules/ssh2-streams/test/test-keyparser.js
generated
vendored
Normal file
File diff suppressed because it is too large
Load Diff
256
build/node_modules/ssh2-streams/test/test-packet60.js
generated
vendored
Normal file
256
build/node_modules/ssh2-streams/test/test-packet60.js
generated
vendored
Normal file
@@ -0,0 +1,256 @@
|
||||
var SSH2Stream = require('../lib/ssh');
|
||||
var parseKey = require('../lib/utils').parseKey;
|
||||
var genPubKey = require('../lib/utils').genPublicKey;
|
||||
|
||||
var assert = require('assert');
|
||||
var crypto = require('crypto');
|
||||
var fs = require('fs');
|
||||
|
||||
var t = -1;
|
||||
var SERVER_PRV_KEY = fs.readFileSync(__dirname + '/fixtures/ssh_host_rsa_key');
|
||||
var PARSED_SERVER_PRV_KEY = parseKey(SERVER_PRV_KEY);
|
||||
var PARSED_SERVER_PUB_KEY = genPubKey(PARSED_SERVER_PRV_KEY);
|
||||
var CLIENT_PRV_KEY = fs.readFileSync(__dirname + '/fixtures/id_rsa');
|
||||
var PARSED_CLIENT_PRV_KEY = parseKey(CLIENT_PRV_KEY);
|
||||
var PARSED_CLIENT_PUB_KEY = genPubKey(PARSED_CLIENT_PRV_KEY);
|
||||
|
||||
function makePair(cb) {
|
||||
var server = new SSH2Stream({
|
||||
server: true,
|
||||
hostKeys: {
|
||||
'ssh-rsa': {
|
||||
privateKey: PARSED_SERVER_PRV_KEY,
|
||||
publicKey: PARSED_SERVER_PUB_KEY
|
||||
}
|
||||
}
|
||||
});
|
||||
var client = new SSH2Stream();
|
||||
|
||||
var done = [];
|
||||
function tryDone(who) {
|
||||
done.push(who);
|
||||
if (done.length !== 2)
|
||||
return;
|
||||
cb(server, client);
|
||||
}
|
||||
|
||||
server.on('NEWKEYS', function () { tryDone('server'); });
|
||||
client.on('NEWKEYS', function () { tryDone('client'); });
|
||||
server.pipe(client).pipe(server);
|
||||
}
|
||||
|
||||
function signWithClientKey(blob, syncCb) {
|
||||
var signType = (PARSED_CLIENT_PRV_KEY.type === 'rsa' ? 'R' : 'D') + 'SA-SHA1';
|
||||
var signature = crypto.createSign(signType);
|
||||
signature.update(blob);
|
||||
signature = signature.sign(PARSED_CLIENT_PRV_KEY.privateOrig);
|
||||
syncCb(signature);
|
||||
}
|
||||
|
||||
function bufferEqual(a, b) {
|
||||
if (a.length !== b.length)
|
||||
return false;
|
||||
for (var i = 0; i < a.length; ++i) {
|
||||
if (a[i] !== b[i])
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
function publickey(server, client) {
|
||||
server.on('USERAUTH_REQUEST', function(user, service, method, data) {
|
||||
assert.equal(user, 'bob');
|
||||
assert.equal(service, 'ssh-connection');
|
||||
assert.equal(method, 'publickey');
|
||||
assert.equal(data.keyAlgo, PARSED_CLIENT_PUB_KEY.fulltype);
|
||||
assert.equal(true, bufferEqual(data.key, PARSED_CLIENT_PUB_KEY.public));
|
||||
assert.equal(data.signature, undefined);
|
||||
assert.equal(data.blob, undefined);
|
||||
return server.authPKOK(data.keyAlgo, data.key);
|
||||
});
|
||||
client.on('USERAUTH_PK_OK', function() {
|
||||
next();
|
||||
}).authPK('bob', PARSED_CLIENT_PUB_KEY);
|
||||
}
|
||||
|
||||
function keyboardInteractive(server, client) {
|
||||
var infoReqsRxed = 0;
|
||||
|
||||
server.on('USERAUTH_REQUEST', function(user, service, method, data) {
|
||||
assert.equal(user, 'bob');
|
||||
assert.equal(service, 'ssh-connection');
|
||||
assert.equal(method, 'keyboard-interactive');
|
||||
assert.equal(data, '');
|
||||
process.nextTick(function() {
|
||||
server.authInfoReq('req 0', 'instructions', [
|
||||
{ prompt: 'Say something to req 0', echo: true }
|
||||
]);
|
||||
});
|
||||
}).on('USERAUTH_INFO_RESPONSE', function(responses) {
|
||||
if (infoReqsRxed === 1) {
|
||||
assert.equal(responses.length, 1);
|
||||
assert.equal(responses[0], 'hello to req 0');
|
||||
process.nextTick(function() {
|
||||
server.authInfoReq('req 1', 'new instructions', [
|
||||
{ prompt: 'Say something to req 1', echo: true },
|
||||
{ prompt: 'Say something else', echo: false }
|
||||
]);
|
||||
});
|
||||
} else if (infoReqsRxed === 2) {
|
||||
assert.equal(responses.length, 2);
|
||||
assert.equal(responses[0], 'hello to req 1');
|
||||
assert.equal(responses[1], 'something else');
|
||||
next();
|
||||
} else {
|
||||
throw new Error('Received too many info reqs: ' + infoReqsRxed);
|
||||
}
|
||||
});
|
||||
|
||||
client.on('USERAUTH_INFO_REQUEST', function (name, inst, lang, prompts) {
|
||||
infoReqsRxed++;
|
||||
if (infoReqsRxed === 1) {
|
||||
assert.equal(name, 'req 0');
|
||||
assert.equal(inst, 'instructions');
|
||||
assert.equal(lang, '');
|
||||
assert.deepEqual(prompts, [
|
||||
{ prompt: 'Say something to req 0', echo: true }
|
||||
]);
|
||||
process.nextTick(function() {
|
||||
client.authInfoRes([ 'hello to req 0' ]);
|
||||
});
|
||||
} else if (infoReqsRxed === 2) {
|
||||
assert.equal(name, 'req 1');
|
||||
assert.equal(inst, 'new instructions');
|
||||
assert.equal(lang, '');
|
||||
assert.deepEqual(prompts, [
|
||||
{ prompt: 'Say something to req 1', echo: true },
|
||||
{ prompt: 'Say something else', echo: false }
|
||||
]);
|
||||
process.nextTick(function() {
|
||||
client.authInfoRes([ 'hello to req 1', 'something else' ]);
|
||||
});
|
||||
} else {
|
||||
throw new Error('Received too many info reqs: ' + infoReqsRxed);
|
||||
}
|
||||
}).authKeyboard('bob');
|
||||
}
|
||||
|
||||
function mixedMethods(server, client) {
|
||||
var expectedStages = [
|
||||
'SERVER_SEES_PK_CHECK',
|
||||
'SERVER_SEES_PK_REQUEST',
|
||||
'SERVER_SEES_PASSWORD',
|
||||
'SERVER_SEES_KEYBOARD_INTERACTIVE',
|
||||
'CLIENT_SEES_PK_OK',
|
||||
'CLIENT_SEES_USERAUTH_FAILURE_PK',
|
||||
'CLIENT_SEES_USERAUTH_FAILURE_PASSWORD',
|
||||
'CLIENT_SEES_KEYBOARD_REQ',
|
||||
'SERVER_SEES_KEYBOARD_RES',
|
||||
'CLIENT_SEES_USERAUTH_SUCCESS',
|
||||
];
|
||||
|
||||
server.on('USERAUTH_REQUEST', function(name, service, method, data) {
|
||||
assert.equal(name, 'bob');
|
||||
assert.equal(service, 'ssh-connection');
|
||||
var expectedStage = expectedStages.shift();
|
||||
switch (expectedStage) {
|
||||
case 'SERVER_SEES_PK_CHECK':
|
||||
assert.equal(method, 'publickey');
|
||||
assert.equal(data.signature, undefined);
|
||||
return process.nextTick(function() {
|
||||
server.authPKOK(data.keyAlgo, data.key);
|
||||
});
|
||||
case 'SERVER_SEES_PK_REQUEST':
|
||||
assert.equal(method, 'publickey');
|
||||
assert.notEqual(data.signature, undefined);
|
||||
return process.nextTick(function() {
|
||||
server.authFailure(
|
||||
['publickey', 'password', 'keyboard-interactive'],
|
||||
false
|
||||
);
|
||||
});
|
||||
case 'SERVER_SEES_PASSWORD':
|
||||
assert.equal(method, 'password');
|
||||
assert.equal(data, 'seekrit');
|
||||
return process.nextTick(function() {
|
||||
server.authFailure(
|
||||
['publickey', 'password', 'keyboard-interactive'],
|
||||
false
|
||||
);
|
||||
});
|
||||
case 'SERVER_SEES_KEYBOARD_INTERACTIVE':
|
||||
assert.equal(method, 'keyboard-interactive');
|
||||
assert.equal(data, '');
|
||||
return process.nextTick(function() {
|
||||
server.authInfoReq('Password required', 'Password prompt', [
|
||||
{ prompt: 'Password:', echo: false }
|
||||
]);
|
||||
});
|
||||
default:
|
||||
throw new Error('Server saw USERAUTH_REQUEST ' + method +
|
||||
' but expected ' + expectedStage);
|
||||
}
|
||||
}).on('USERAUTH_INFO_RESPONSE', function(responses) {
|
||||
assert.equal(expectedStages.shift(), 'SERVER_SEES_KEYBOARD_RES');
|
||||
assert.deepEqual(responses, [ 'seekrit' ]);
|
||||
process.nextTick(function() {
|
||||
server.authSuccess();
|
||||
});
|
||||
});
|
||||
|
||||
|
||||
client.on('USERAUTH_PK_OK', function() {
|
||||
assert.equal(expectedStages.shift(), 'CLIENT_SEES_PK_OK');
|
||||
}).on('USERAUTH_FAILURE', function() {
|
||||
var expectedStage = expectedStages.shift();
|
||||
if (expectedStage !== 'CLIENT_SEES_USERAUTH_FAILURE_PK' &&
|
||||
expectedStage !== 'CLIENT_SEES_USERAUTH_FAILURE_PASSWORD') {
|
||||
throw new Error('Client saw USERAUTH_FAILURE but expected ' +
|
||||
expectedStage);
|
||||
}
|
||||
}).on('USERAUTH_INFO_REQUEST', function(name, inst, lang, prompts) {
|
||||
assert.equal(expectedStages.shift(), 'CLIENT_SEES_KEYBOARD_REQ');
|
||||
assert.equal(name, 'Password required');
|
||||
assert.equal(inst, 'Password prompt');
|
||||
assert.equal(lang, '');
|
||||
assert.deepEqual(prompts, [ { prompt: 'Password:', echo: false } ]);
|
||||
process.nextTick(function() {
|
||||
client.authInfoRes([ 'seekrit' ]);
|
||||
});
|
||||
}).on('USERAUTH_SUCCESS', function() {
|
||||
assert.equal(expectedStages.shift(), 'CLIENT_SEES_USERAUTH_SUCCESS');
|
||||
assert.equal(expectedStages.shift(), undefined);
|
||||
next();
|
||||
});
|
||||
|
||||
// Silly to submit all these auths at once, but allowed by RFC4252
|
||||
client.authPK('bob', PARSED_CLIENT_PUB_KEY);
|
||||
client.authPK('bob', PARSED_CLIENT_PUB_KEY, signWithClientKey);
|
||||
client.authPassword('bob', 'seekrit');
|
||||
client.authKeyboard('bob');
|
||||
}
|
||||
|
||||
var tests = [
|
||||
publickey,
|
||||
keyboardInteractive,
|
||||
// password // ssh2-streams can't generate a password change request
|
||||
mixedMethods
|
||||
];
|
||||
|
||||
|
||||
function next() {
|
||||
if (Array.isArray(process._events.exit))
|
||||
process._events.exit = process._events.exit[1];
|
||||
if (++t === tests.length)
|
||||
return;
|
||||
|
||||
var v = tests[t];
|
||||
makePair(v);
|
||||
}
|
||||
|
||||
process.once('exit', function() {
|
||||
assert(t === tests.length,
|
||||
'Only finished ' + t + '/' + tests.length + ' tests');
|
||||
});
|
||||
|
||||
next();
|
||||
1274
build/node_modules/ssh2-streams/test/test-sftp.js
generated
vendored
Normal file
1274
build/node_modules/ssh2-streams/test/test-sftp.js
generated
vendored
Normal file
File diff suppressed because it is too large
Load Diff
143
build/node_modules/ssh2-streams/test/test-ssh.js
generated
vendored
Normal file
143
build/node_modules/ssh2-streams/test/test-ssh.js
generated
vendored
Normal file
@@ -0,0 +1,143 @@
|
||||
var SSH2Stream = require('../lib/ssh');
|
||||
var utils = require('../lib/utils');
|
||||
var parseKey = utils.parseKey;
|
||||
var genPubKey = utils.genPublicKey;
|
||||
|
||||
var basename = require('path').basename;
|
||||
var assert_ = require('assert');
|
||||
var inherits = require('util').inherits;
|
||||
var inspect = require('util').inspect;
|
||||
var TransformStream = require('stream').Transform;
|
||||
var fs = require('fs');
|
||||
|
||||
var group = basename(__filename, '.js') + '/';
|
||||
var t = -1;
|
||||
var SERVER_KEY = fs.readFileSync(__dirname + '/fixtures/ssh_host_rsa_key');
|
||||
var HOST_KEYS = { 'ssh-rsa': makeServerKey(SERVER_KEY) };
|
||||
|
||||
function SimpleStream() {
|
||||
TransformStream.call(this);
|
||||
this.buffer = '';
|
||||
}
|
||||
inherits(SimpleStream, TransformStream);
|
||||
SimpleStream.prototype._transform = function(chunk, encoding, cb) {
|
||||
this.buffer += chunk.toString('binary');
|
||||
cb(null, chunk);
|
||||
};
|
||||
|
||||
var tests = [
|
||||
// client-side tests
|
||||
{ run: function() {
|
||||
var algos = ['ssh-dss', 'ssh-rsa', 'ecdsa-sha2-nistp521'];
|
||||
var client = new SSH2Stream({
|
||||
algorithms: {
|
||||
serverHostKey: algos
|
||||
}
|
||||
});
|
||||
var clientBufStream = new SimpleStream();
|
||||
var clientReady = false;
|
||||
var server = new SSH2Stream({
|
||||
server: true,
|
||||
hostKeys: HOST_KEYS
|
||||
});
|
||||
var serverBufStream = new SimpleStream();
|
||||
var serverReady = false;
|
||||
|
||||
function onNEWKEYS() {
|
||||
if (this === client) {
|
||||
assert(!clientReady, 'Already received client NEWKEYS event');
|
||||
clientReady = true;
|
||||
} else {
|
||||
assert(!serverReady, 'Already received server NEWKEYS event');
|
||||
serverReady = true;
|
||||
}
|
||||
if (clientReady && serverReady) {
|
||||
var traffic = clientBufStream.buffer;
|
||||
var algoList = algos.join(',');
|
||||
var re = new RegExp('\x00\x00\x00'
|
||||
+ hexByte(algoList.length)
|
||||
+ algoList);
|
||||
assert(re.test(traffic), 'Unexpected client algorithms');
|
||||
|
||||
traffic = serverBufStream.buffer;
|
||||
assert(/\x00\x00\x00\x07ssh-rsa/.test(traffic),
|
||||
'Unexpected server algorithms');
|
||||
|
||||
next();
|
||||
}
|
||||
}
|
||||
|
||||
client.on('NEWKEYS', onNEWKEYS);
|
||||
server.on('NEWKEYS', onNEWKEYS);
|
||||
|
||||
client.pipe(clientBufStream)
|
||||
.pipe(server)
|
||||
.pipe(serverBufStream)
|
||||
.pipe(client);
|
||||
},
|
||||
what: 'Custom algorithms'
|
||||
},
|
||||
{ run: function() {
|
||||
var serverIdent = 'testing \t';
|
||||
var expectedFullIdent = 'SSH-2.0-' + serverIdent;
|
||||
|
||||
var client = new SSH2Stream({});
|
||||
client.on('header', function(header) {
|
||||
assert(header.identRaw === expectedFullIdent,
|
||||
'\nSaw: ' + inspect(header.identRaw) + '\n'
|
||||
+ 'Expected: ' + inspect(expectedFullIdent));
|
||||
next();
|
||||
});
|
||||
|
||||
var server = new SSH2Stream({
|
||||
server: true,
|
||||
hostKeys: HOST_KEYS,
|
||||
ident: serverIdent
|
||||
});
|
||||
|
||||
client.pipe(server).pipe(client);
|
||||
},
|
||||
what: 'Remote ident is not trimmed'
|
||||
}
|
||||
];
|
||||
|
||||
function makeServerKey(raw) {
|
||||
var privateKey = parseKey(raw);
|
||||
return {
|
||||
privateKey: privateKey,
|
||||
publicKey: genPubKey(privateKey)
|
||||
};
|
||||
}
|
||||
|
||||
function hexByte(n) {
|
||||
return String.fromCharCode(n);
|
||||
}
|
||||
|
||||
function assert(expression, msg) {
|
||||
msg || (msg = 'failed assertion');
|
||||
assert_(expression, makeMsg(tests[t].what, msg));
|
||||
}
|
||||
|
||||
|
||||
|
||||
function next() {
|
||||
if (Array.isArray(process._events.exit))
|
||||
process._events.exit = process._events.exit[1];
|
||||
if (++t === tests.length)
|
||||
return;
|
||||
|
||||
var v = tests[t];
|
||||
v.run.call(v);
|
||||
}
|
||||
|
||||
function makeMsg(what, msg) {
|
||||
return '[' + group + what + ']: ' + msg;
|
||||
}
|
||||
|
||||
process.once('exit', function() {
|
||||
assert_(t === tests.length,
|
||||
makeMsg('_exit',
|
||||
'Only finished ' + t + '/' + tests.length + ' tests'));
|
||||
});
|
||||
|
||||
next();
|
||||
678
build/node_modules/ssh2-streams/test/test-utils.js
generated
vendored
Normal file
678
build/node_modules/ssh2-streams/test/test-utils.js
generated
vendored
Normal file
@@ -0,0 +1,678 @@
|
||||
var utils = require('../lib/utils');
|
||||
|
||||
var fs = require('fs');
|
||||
var path = require('path');
|
||||
var assert = require('assert');
|
||||
|
||||
var t = -1;
|
||||
var group = path.basename(__filename, '.js') + '/';
|
||||
var fixturesdir = path.join(__dirname, 'fixtures');
|
||||
|
||||
var tests = [
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var r;
|
||||
|
||||
assert.strictEqual(r = utils.readInt(new Buffer([0,0,0]), 0),
|
||||
false,
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
next();
|
||||
},
|
||||
what: 'readInt - without stream callback - failure #1'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var r;
|
||||
|
||||
assert.strictEqual(r = utils.readInt(new Buffer([]), 0),
|
||||
false,
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
next();
|
||||
},
|
||||
what: 'readInt - without stream callback - failure #2'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var r;
|
||||
|
||||
assert.strictEqual(r = utils.readInt(new Buffer([0,0,0,5]), 0),
|
||||
5,
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
next();
|
||||
},
|
||||
what: 'readInt - without stream callback - success'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var callback = function() {};
|
||||
var stream = {
|
||||
_cleanup: function(cb) {
|
||||
cleanupCalled = true;
|
||||
assert(cb === callback, makeMsg(what, 'Wrong callback'));
|
||||
}
|
||||
};
|
||||
var cleanupCalled = false;
|
||||
var r;
|
||||
|
||||
assert.strictEqual(r = utils.readInt(new Buffer([]), 0, stream, callback),
|
||||
false,
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
assert(cleanupCalled, makeMsg(what, 'Cleanup not called'));
|
||||
next();
|
||||
},
|
||||
what: 'readInt - with stream callback'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var r;
|
||||
|
||||
assert.strictEqual(r = utils.readString(new Buffer([0,0,0]), 0),
|
||||
false,
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
next();
|
||||
},
|
||||
what: 'readString - without stream callback - bad length #1'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var r;
|
||||
|
||||
assert.strictEqual(r = utils.readString(new Buffer([]), 0),
|
||||
false,
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
next();
|
||||
},
|
||||
what: 'readString - without stream callback - bad length #2'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var r;
|
||||
|
||||
assert.deepEqual(r = utils.readString(new Buffer([0,0,0,1,5]), 0),
|
||||
new Buffer([5]),
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
next();
|
||||
},
|
||||
what: 'readString - without stream callback - success'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var r;
|
||||
|
||||
assert.deepEqual(r = utils.readString(new Buffer([0,0,0,1,33]), 0, 'ascii'),
|
||||
'!',
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
next();
|
||||
},
|
||||
what: 'readString - without stream callback - encoding'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var callback = function() {};
|
||||
var stream = {
|
||||
_cleanup: function(cb) {
|
||||
cleanupCalled = true;
|
||||
assert(cb === callback, makeMsg(what, 'Wrong callback'));
|
||||
}
|
||||
};
|
||||
var cleanupCalled = false;
|
||||
var r;
|
||||
|
||||
assert.deepEqual(r = utils.readString(new Buffer([0,0,0,1]),
|
||||
0,
|
||||
stream,
|
||||
callback),
|
||||
false,
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
assert(cleanupCalled, makeMsg(what, 'Cleanup not called'));
|
||||
next();
|
||||
},
|
||||
what: 'readString - with stream callback - no encoding'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var callback = function() {};
|
||||
var stream = {
|
||||
_cleanup: function(cb) {
|
||||
cleanupCalled = true;
|
||||
assert(cb === callback, makeMsg(what, 'Wrong callback'));
|
||||
}
|
||||
};
|
||||
var cleanupCalled = false;
|
||||
var r;
|
||||
|
||||
assert.deepEqual(r = utils.readString(new Buffer([0,0,0,1]),
|
||||
0,
|
||||
'ascii',
|
||||
stream,
|
||||
callback),
|
||||
false,
|
||||
makeMsg(what, 'Wrong result: ' + r));
|
||||
assert(cleanupCalled, makeMsg(what, 'Cleanup not called'));
|
||||
next();
|
||||
},
|
||||
what: 'readString - with stream callback - encoding'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var filepath = fixturesdir + '/encrypted-rsa.ppk';
|
||||
var passphrase = 'node.js';
|
||||
var keyInfo = utils.parseKey(fs.readFileSync(filepath));
|
||||
|
||||
utils.decryptKey(keyInfo, passphrase);
|
||||
|
||||
var expPrivOrig = new Buffer([
|
||||
45,45,45,45,45,66,69,71,73,78,32,82,83,65,32,80,82,73,86,65,84,69,32,75,
|
||||
69,89,45,45,45,45,45,10,77,73,73,67,87,81,73,66,65,65,75,66,103,71,115,
|
||||
70,89,82,77,66,85,68,73,109,97,52,48,98,110,101,80,66,77,48,79,86,115,
|
||||
104,119,102,109,87,115,83,57,122,72,113,88,72,108,115,122,111,81,113,68,
|
||||
82,101,89,52,103,102,51,10,112,87,112,83,78,76,116,53,70,70,78,77,80,50,
|
||||
87,107,69,68,121,70,105,71,83,115,54,77,55,72,51,102,56,108,89,72,43,108,
|
||||
120,85,51,122,56,72,99,78,103,101,121,70,80,48,52,70,98,85,77,75,83,115,
|
||||
51,67,54,51,97,108,10,115,110,97,104,107,52,71,75,117,71,69,67,118,55,71,
|
||||
112,89,87,118,102,110,110,85,87,112,118,78,111,73,104,101,107,52,113,53,
|
||||
117,118,103,82,119,106,65,75,75,107,71,88,111,47,69,116,82,74,56,101,68,
|
||||
65,103,69,108,65,111,71,65,10,85,43,71,102,72,76,118,88,69,111,122,81,49,
|
||||
109,72,65,56,77,102,99,69,109,67,83,104,76,55,83,77,86,81,78,50,119,80,
|
||||
76,56,72,102,103,73,109,89,108,55,43,97,72,112,87,69,56,100,101,49,110,
|
||||
109,100,116,119,121,54,112,50,10,52,80,89,50,80,85,89,81,57,80,89,53,55,
|
||||
105,51,122,76,56,78,90,100,56,87,81,55,82,103,48,82,66,72,68,108,110,100,
|
||||
97,70,101,70,52,69,102,48,117,76,98,111,113,89,100,47,120,78,48,114,122,
|
||||
102,121,53,53,122,55,104,87,10,79,76,43,56,86,104,111,120,84,114,66,85,
|
||||
118,118,101,79,104,90,119,66,80,107,79,101,72,102,120,109,107,86,122,51,
|
||||
120,98,98,114,103,51,107,78,108,111,48,67,81,81,68,74,89,80,75,116,67,
|
||||
115,47,108,52,54,75,74,109,78,51,108,10,85,65,78,100,73,52,81,73,117,87,
|
||||
81,43,90,108,108,122,55,112,57,52,70,102,100,111,116,110,107,118,113,71,
|
||||
43,43,66,112,49,119,79,113,74,83,67,105,104,54,85,86,105,119,76,102,118,
|
||||
112,78,90,116,71,77,67,116,107,52,54,87,78,10,104,99,48,122,65,107,69,65,
|
||||
105,65,121,78,52,87,85,115,47,48,120,52,87,111,118,71,57,53,54,74,49,65,
|
||||
43,117,83,69,75,101,87,122,117,113,102,112,71,71,98,87,103,90,57,88,102,
|
||||
110,80,110,107,43,49,65,108,56,70,79,87,49,10,116,117,57,87,87,114,77,80,
|
||||
73,97,118,81,110,90,87,47,100,88,120,104,107,101,78,87,84,72,55,56,99,81,
|
||||
74,66,65,76,107,77,43,113,122,90,103,77,86,112,90,79,48,107,115,68,113,
|
||||
65,52,72,56,90,116,53,108,81,97,102,81,109,10,115,120,67,87,70,102,43,
|
||||
108,101,53,67,110,114,97,70,113,87,78,103,104,119,82,115,70,99,112,67,84,
|
||||
116,110,52,56,54,98,97,109,121,56,57,104,115,85,100,113,105,76,50,83,54,
|
||||
121,103,97,70,111,69,67,81,70,68,107,51,114,49,101,10,119,77,56,109,106,
|
||||
77,65,51,98,50,76,77,43,65,71,77,121,72,51,43,71,80,102,53,57,113,119,
|
||||
102,76,86,88,80,77,103,101,84,90,117,98,103,84,116,55,119,52,102,54,87,
|
||||
98,65,118,111,81,83,56,67,114,119,48,97,68,86,98,72,10,118,102,76,85,86,
|
||||
98,67,119,114,57,112,49,66,77,48,67,81,70,83,66,106,67,97,47,102,122,101,
|
||||
73,67,86,107,80,70,66,97,75,81,85,109,88,106,81,51,73,99,80,84,79,114,57,
|
||||
48,109,83,65,105,80,110,65,65,112,112,83,119,84,10,106,53,83,89,83,102,
|
||||
69,57,114,83,86,98,43,69,104,81,48,104,107,50,86,75,87,73,102,111,99,78,
|
||||
72,66,68,49,77,65,78,57,122,98,52,61,10,45,45,45,45,45,69,78,68,32,82,83,
|
||||
65,32,80,82,73,86,65,84,69,32,75,69,89,45,45,45,45,45
|
||||
]);
|
||||
assert(keyInfo.ppk === true, makeMsg(what, 'Expected PPK flag'));
|
||||
assert(keyInfo._converted === true,
|
||||
makeMsg(what, 'Expected automatic private PEM generation'));
|
||||
assert(keyInfo._macresult === true,
|
||||
makeMsg(what, 'Expected successful MAC verification'));
|
||||
assert(keyInfo._decrypted === true,
|
||||
makeMsg(what, 'Expected decrypted flag'));
|
||||
assert.deepEqual(keyInfo.privateOrig,
|
||||
expPrivOrig,
|
||||
makeMsg(what, 'Decrypted private PEM data mismatch'));
|
||||
next();
|
||||
},
|
||||
what: 'decryptKey - with encrypted RSA PPK'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var filepath = fixturesdir + '/encrypted-dsa.ppk';
|
||||
var passphrase = 'node.js';
|
||||
var keyInfo = utils.parseKey(fs.readFileSync(filepath));
|
||||
|
||||
utils.decryptKey(keyInfo, passphrase);
|
||||
|
||||
var expPrivOrig = new Buffer([
|
||||
45,45,45,45,45,66,69,71,73,78,32,68,83,65,32,80,82,73,86,65,84,69,32,75,
|
||||
69,89,45,45,45,45,45,10,77,73,73,66,117,103,73,66,65,65,75,66,103,81,67,
|
||||
90,57,105,80,71,72,110,48,97,78,119,98,66,72,111,112,48,76,102,67,107,
|
||||
79,72,66,77,103,75,119,76,79,50,80,49,117,57,57,54,69,85,109,68,105,77,
|
||||
49,104,100,83,98,116,10,100,117,77,114,67,113,53,111,78,113,74,76,47,116,
|
||||
79,81,109,72,73,49,100,50,75,101,65,77,48,72,113,74,109,65,74,89,74,103,
|
||||
102,43,56,81,104,74,49,109,104,74,56,81,115,65,77,90,113,54,121,84,74,
|
||||
106,54,53,77,68,89,120,10,122,105,73,117,56,106,79,85,68,104,80,100,67,
|
||||
68,80,48,80,105,67,81,79,66,68,119,88,48,109,47,108,54,47,72,50,73,97,54,
|
||||
101,100,121,106,82,49,85,112,51,78,105,112,68,113,113,97,78,104,98,67,73,
|
||||
119,73,86,65,76,103,50,10,85,47,110,81,97,114,74,83,113,114,89,72,122,90,
|
||||
87,72,47,68,109,80,100,80,80,66,65,111,71,65,72,107,104,113,74,118,83,
|
||||
121,122,88,99,51,77,65,104,53,120,110,56,83,106,90,120,77,57,43,101,83,
|
||||
105,69,119,65,48,56,89,105,10,75,81,98,53,48,70,118,110,103,120,56,69,76,
|
||||
121,77,79,108,100,106,110,79,57,50,121,103,114,117,87,89,113,50,90,105,
|
||||
68,70,117,99,79,105,111,48,70,99,74,76,107,65,97,66,102,83,113,75,118,57,
|
||||
114,117,108,88,110,114,55,83,47,10,97,81,43,107,119,99,48,105,122,70,99,
|
||||
79,97,86,100,122,53,104,79,80,119,118,51,105,52,109,108,77,87,83,121,66,
|
||||
51,87,56,54,97,106,53,65,76,119,70,65,97,49,121,112,73,57,73,111,56,51,
|
||||
68,99,119,113,100,88,55,104,102,66,10,57,75,98,48,102,77,107,67,103,89,
|
||||
65,109,118,86,43,107,113,87,104,85,103,68,89,119,78,78,122,49,113,68,97,
|
||||
111,83,56,88,100,115,79,112,111,110,117,116,90,47,48,115,116,82,81,54,54,
|
||||
109,75,65,121,56,107,78,86,78,78,81,54,10,111,85,120,49,88,70,108,49,87,
|
||||
85,116,52,105,121,70,89,47,50,82,122,50,102,90,104,76,122,53,47,84,98,90,
|
||||
82,75,53,121,103,111,54,54,54,87,103,110,120,66,47,85,100,52,71,65,120,
|
||||
47,66,80,81,84,103,104,79,74,74,79,76,10,48,48,118,74,107,43,56,106,86,
|
||||
67,71,78,68,99,57,52,50,86,54,110,70,88,122,110,68,77,88,119,113,120,104,
|
||||
82,67,87,54,100,109,43,50,108,84,104,55,110,116,114,108,105,56,109,67,
|
||||
107,53,103,73,85,67,74,90,75,65,77,65,122,10,107,121,114,50,118,108,50,
|
||||
80,101,52,56,97,100,105,56,86,115,57,115,61,10,45,45,45,45,45,69,78,68,
|
||||
32,68,83,65,32,80,82,73,86,65,84,69,32,75,69,89,45,45,45,45,45,
|
||||
]);
|
||||
assert(keyInfo.ppk === true, makeMsg(what, 'Expected PPK flag'));
|
||||
assert(keyInfo._converted === true,
|
||||
makeMsg(what, 'Expected automatic private PEM generation'));
|
||||
assert(keyInfo._macresult === true,
|
||||
makeMsg(what, 'Expected successful MAC verification'));
|
||||
assert(keyInfo._decrypted === true,
|
||||
makeMsg(what, 'Expected decrypted flag'));
|
||||
assert.deepEqual(keyInfo.privateOrig,
|
||||
expPrivOrig,
|
||||
makeMsg(what, 'Decrypted private PEM data mismatch'));
|
||||
next();
|
||||
},
|
||||
what: 'decryptKey - with encrypted DSA PPK'
|
||||
},
|
||||
{ run: function() {
|
||||
var what = this.what;
|
||||
var filepath = fixturesdir + '/id_rsa_enc';
|
||||
var passphrase = 'foobarbaz';
|
||||
var keyInfo = utils.parseKey(fs.readFileSync(filepath));
|
||||
|
||||
utils.decryptKey(keyInfo, passphrase);
|
||||
|
||||
var expPriv = new Buffer([
|
||||
0x30, 0x82, 0x04, 0xa5, 0x02, 0x01, 0x00, 0x02, 0x82, 0x01, 0x01, 0x00,
|
||||
0xec, 0x9f, 0xd7, 0x6e, 0x17, 0xfa, 0xe4, 0xc5, 0xff, 0xac, 0x83, 0x6e,
|
||||
0xbe, 0x60, 0x66, 0xb2, 0xf2, 0x6a, 0x34, 0xfa, 0x4f, 0xe2, 0x49, 0xcd,
|
||||
0x54, 0x29, 0x34, 0x95, 0x3b, 0x55, 0xc1, 0xf5, 0x1f, 0x16, 0x3f, 0x6a,
|
||||
0x9f, 0xe5, 0x93, 0x7c, 0x25, 0xe0, 0x92, 0xdb, 0x63, 0x8d, 0xbb, 0xb4,
|
||||
0xc2, 0x24, 0x7c, 0x9c, 0x69, 0x4c, 0xe0, 0xa7, 0x21, 0xac, 0xfc, 0xd3,
|
||||
0x44, 0x3b, 0x1a, 0xaf, 0x9e, 0x60, 0x93, 0x09, 0xd3, 0xac, 0xb4, 0x65,
|
||||
0x88, 0x39, 0x85, 0x8c, 0xd2, 0x04, 0x2c, 0xaf, 0x85, 0x27, 0x92, 0x59,
|
||||
0x1b, 0x28, 0x73, 0x99, 0xf9, 0xc1, 0x6c, 0x37, 0x08, 0xa2, 0x77, 0x58,
|
||||
0x5a, 0x8c, 0xb0, 0x96, 0xc0, 0x63, 0x8a, 0x10, 0x10, 0x84, 0xd8, 0xfa,
|
||||
0x1e, 0xb7, 0x27, 0x58, 0xc1, 0x6b, 0x34, 0xb4, 0xe6, 0xa1, 0x05, 0x68,
|
||||
0x82, 0xc9, 0xe3, 0x6a, 0x6f, 0x0b, 0xb5, 0xf7, 0x13, 0xa8, 0x8b, 0x14,
|
||||
0x4a, 0x6e, 0x0a, 0x72, 0x39, 0xa6, 0x1f, 0xa0, 0x4f, 0xcb, 0x72, 0xd9,
|
||||
0xe5, 0x61, 0x61, 0xa7, 0x63, 0x53, 0xae, 0x66, 0xd6, 0xba, 0xb4, 0xda,
|
||||
0x98, 0x92, 0xb4, 0x50, 0x93, 0x36, 0xdf, 0x9a, 0xfe, 0x58, 0x36, 0x6d,
|
||||
0x31, 0xd7, 0xff, 0x01, 0x88, 0xe4, 0x49, 0x3b, 0x71, 0x8f, 0x09, 0xe6,
|
||||
0x6f, 0xc9, 0xe1, 0x98, 0x51, 0x8c, 0xc4, 0xfa, 0x16, 0xb9, 0x45, 0x14,
|
||||
0x7b, 0x9e, 0x0e, 0x09, 0x6d, 0x07, 0x1e, 0x79, 0x4e, 0xa1, 0xb6, 0xf0,
|
||||
0xdd, 0x0a, 0x3d, 0xa3, 0x9c, 0xf4, 0xeb, 0x5f, 0xaa, 0x29, 0x37, 0x8c,
|
||||
0xb4, 0x03, 0x25, 0xac, 0xe8, 0x64, 0xf6, 0x07, 0xbe, 0xca, 0xc8, 0x48,
|
||||
0x39, 0x51, 0xaf, 0x36, 0x42, 0xdd, 0x32, 0x7d, 0x37, 0x7a, 0xdd, 0xd6,
|
||||
0xbf, 0x57, 0xf9, 0x10, 0xd7, 0x9f, 0xe4, 0xb8, 0xc8, 0xa7, 0x1b, 0x0c,
|
||||
0x89, 0x69, 0xf0, 0x9d, 0x02, 0x03, 0x01, 0x00, 0x01, 0x02, 0x82, 0x01,
|
||||
0x01, 0x00, 0xcb, 0xad, 0x9a, 0xe6, 0x6d, 0x45, 0xcd, 0x7e, 0x91, 0x61,
|
||||
0x91, 0x90, 0xd5, 0xd6, 0x6d, 0x10, 0x43, 0x92, 0x20, 0x20, 0x06, 0x7b,
|
||||
0x26, 0x43, 0xd3, 0xd9, 0xd4, 0x25, 0x50, 0x79, 0xb5, 0x06, 0xa5, 0xc7,
|
||||
0xa4, 0xb6, 0xc7, 0x03, 0xfa, 0x3b, 0xb6, 0xee, 0xe3, 0xfa, 0x6c, 0x6b,
|
||||
0x27, 0xd3, 0xa3, 0xf9, 0x7c, 0x39, 0xb6, 0x7a, 0x32, 0x36, 0x2a, 0xca,
|
||||
0x98, 0xa5, 0xd1, 0xe9, 0x7e, 0x43, 0x04, 0xf4, 0xe4, 0x1c, 0x65, 0x54,
|
||||
0x17, 0xc3, 0xfd, 0xca, 0x65, 0xa6, 0x9d, 0x70, 0x72, 0x76, 0x73, 0x0b,
|
||||
0x68, 0xf1, 0xc2, 0x6a, 0xc3, 0x77, 0x1a, 0x80, 0xe0, 0x01, 0x4f, 0x31,
|
||||
0x69, 0xc1, 0x67, 0xd0, 0x0a, 0x80, 0xf9, 0x01, 0xb5, 0x69, 0xb6, 0x8e,
|
||||
0x63, 0xa6, 0x88, 0xa1, 0xe7, 0x00, 0x83, 0x1d, 0x20, 0xb5, 0x46, 0x7f,
|
||||
0xfc, 0x03, 0xc5, 0xf0, 0xba, 0x0c, 0x77, 0xa1, 0x80, 0xf2, 0x90, 0xcf,
|
||||
0x0a, 0x57, 0x14, 0xa0, 0xc7, 0x30, 0x5b, 0x10, 0x2c, 0x78, 0x85, 0xa2,
|
||||
0x52, 0x7e, 0xf1, 0xa8, 0xd0, 0xbc, 0x78, 0x3e, 0x7e, 0xf6, 0xc5, 0xc5,
|
||||
0xac, 0xf3, 0x02, 0xd4, 0xdc, 0x02, 0x20, 0xb8, 0xcc, 0x37, 0xe1, 0xaa,
|
||||
0x2d, 0x24, 0xed, 0x44, 0xfb, 0x77, 0x20, 0xe5, 0xc4, 0x38, 0x63, 0x08,
|
||||
0xe2, 0x92, 0xd2, 0x6a, 0xdf, 0x0a, 0xcb, 0x54, 0x97, 0x91, 0xc7, 0x55,
|
||||
0x9c, 0x31, 0x00, 0xe2, 0xf2, 0x25, 0xda, 0xd8, 0x6c, 0xea, 0x6d, 0xf2,
|
||||
0xff, 0x98, 0x16, 0x17, 0xf5, 0xfa, 0x5c, 0xd8, 0xfd, 0x8a, 0xf7, 0xea,
|
||||
0x35, 0xa0, 0x96, 0xbd, 0xed, 0xd3, 0x35, 0x1c, 0xee, 0x78, 0xa3, 0x1f,
|
||||
0xfd, 0x0c, 0x24, 0x4b, 0xad, 0x4f, 0xa5, 0x08, 0xb3, 0xd7, 0x90, 0xe7,
|
||||
0x08, 0x60, 0x52, 0x26, 0xee, 0x93, 0x40, 0x80, 0xd1, 0xaf, 0xaf, 0x74,
|
||||
0x4d, 0x3b, 0x6f, 0x4e, 0x42, 0x91, 0x02, 0x81, 0x81, 0x00, 0xfe, 0x26,
|
||||
0x9d, 0x81, 0xa1, 0xf3, 0xe2, 0x48, 0xad, 0x22, 0x4d, 0xf4, 0x1c, 0x68,
|
||||
0x4d, 0xe1, 0xe2, 0xff, 0x09, 0xbf, 0xa6, 0x12, 0x0a, 0x16, 0xce, 0xd6,
|
||||
0x34, 0x73, 0x7d, 0x55, 0xd3, 0x35, 0x6f, 0xb2, 0x4d, 0x64, 0xcb, 0x5e,
|
||||
0x5e, 0x1a, 0xc8, 0xcf, 0x29, 0x58, 0x28, 0x30, 0xec, 0x29, 0x95, 0x09,
|
||||
0x1b, 0x11, 0x80, 0xba, 0xe0, 0x16, 0x99, 0x49, 0x76, 0xb3, 0x42, 0x72,
|
||||
0x05, 0x10, 0xf2, 0xf5, 0xa8, 0x36, 0x84, 0xf1, 0x83, 0x57, 0x5d, 0x27,
|
||||
0xae, 0xe9, 0xae, 0x13, 0x47, 0xf3, 0xda, 0xb1, 0x42, 0xde, 0xa1, 0x25,
|
||||
0xc7, 0x72, 0xee, 0x2e, 0x34, 0x78, 0x64, 0x6a, 0xed, 0x91, 0x81, 0xaf,
|
||||
0x1e, 0xd3, 0xed, 0x68, 0x91, 0x37, 0x2f, 0xdd, 0x57, 0x5d, 0x2a, 0x3a,
|
||||
0x21, 0x86, 0x74, 0x6d, 0xff, 0x0b, 0x56, 0xac, 0xc2, 0x65, 0x3a, 0x88,
|
||||
0x91, 0x5e, 0x3c, 0x10, 0x7e, 0x53, 0x02, 0x81, 0x81, 0x00, 0xee, 0x58,
|
||||
0x94, 0xcc, 0x96, 0x1b, 0x9a, 0x63, 0x84, 0x45, 0x7c, 0x92, 0x78, 0x35,
|
||||
0x17, 0x7e, 0x7f, 0x7d, 0x6f, 0x06, 0x77, 0x69, 0x5c, 0xc4, 0xe8, 0xc7,
|
||||
0x19, 0xd2, 0x5e, 0x58, 0xd2, 0x1d, 0xee, 0x4c, 0xf2, 0xd9, 0xcb, 0xca,
|
||||
0x2a, 0x27, 0xec, 0x5b, 0x55, 0x37, 0x66, 0x0d, 0x2c, 0xe6, 0xfd, 0x48,
|
||||
0x35, 0x51, 0x66, 0x13, 0x1e, 0xab, 0x70, 0xda, 0xe6, 0x45, 0xac, 0x25,
|
||||
0x8b, 0x2b, 0x89, 0x4b, 0x19, 0x99, 0x6a, 0x06, 0x81, 0x24, 0xd5, 0xa9,
|
||||
0x3c, 0xf6, 0xc4, 0x28, 0x39, 0x70, 0x24, 0x0d, 0x8d, 0xcd, 0x69, 0xb4,
|
||||
0x65, 0x78, 0x0d, 0xaf, 0x4f, 0x68, 0xe3, 0xac, 0x9d, 0xaf, 0x07, 0x93,
|
||||
0x10, 0xeb, 0xc9, 0x40, 0x8c, 0x82, 0x85, 0x85, 0x16, 0xc0, 0xfc, 0x49,
|
||||
0x76, 0x03, 0x63, 0x7a, 0x2c, 0x95, 0x61, 0xc8, 0x3b, 0x07, 0x79, 0x68,
|
||||
0x60, 0xb1, 0xc8, 0xf0, 0x97, 0x4f, 0x02, 0x81, 0x81, 0x00, 0xe4, 0xa3,
|
||||
0x3c, 0xa3, 0x38, 0x5d, 0x3d, 0x3f, 0x00, 0x72, 0x92, 0x0a, 0x7f, 0xdb,
|
||||
0xdd, 0xe4, 0xce, 0xdf, 0x7d, 0x97, 0xaa, 0x01, 0x24, 0x8e, 0x6c, 0x39,
|
||||
0x0c, 0x2a, 0xb1, 0xa0, 0x9a, 0x47, 0xc2, 0x5a, 0x77, 0x81, 0xab, 0xeb,
|
||||
0x13, 0x61, 0xa9, 0x31, 0xa5, 0x12, 0x27, 0xe6, 0x0b, 0x2f, 0x45, 0x62,
|
||||
0x51, 0xb5, 0xa7, 0x47, 0x76, 0xfd, 0x1d, 0x9d, 0x97, 0x69, 0xa0, 0xe7,
|
||||
0x0e, 0x63, 0xb7, 0x0f, 0x04, 0xeb, 0x37, 0x22, 0x46, 0x74, 0x3b, 0xdb,
|
||||
0xcd, 0x61, 0x70, 0x36, 0xec, 0x4e, 0x16, 0x79, 0xcd, 0x9c, 0x97, 0x00,
|
||||
0x73, 0xb3, 0x93, 0x4e, 0x81, 0xe9, 0xa4, 0xfd, 0x05, 0x08, 0x17, 0xd0,
|
||||
0xc1, 0x3d, 0x0a, 0xa1, 0x3d, 0xb2, 0x96, 0x1e, 0xdb, 0xcf, 0x76, 0x83,
|
||||
0xa1, 0x51, 0x62, 0x40, 0xea, 0x66, 0xfa, 0xec, 0xa4, 0x5d, 0x89, 0x10,
|
||||
0xff, 0x25, 0xf5, 0x87, 0x28, 0xfd, 0x02, 0x81, 0x80, 0x0e, 0xb4, 0x22,
|
||||
0x41, 0xd8, 0xc4, 0xcd, 0x2a, 0x74, 0x7f, 0x80, 0xe6, 0xdc, 0x49, 0x92,
|
||||
0x30, 0x78, 0x96, 0xf9, 0x61, 0x71, 0xbe, 0x6b, 0x3d, 0xae, 0x8a, 0x91,
|
||||
0xda, 0x3b, 0x7d, 0xc9, 0x40, 0x95, 0x71, 0xe3, 0xcd, 0x71, 0xd7, 0xff,
|
||||
0xef, 0xc4, 0x92, 0x01, 0xd8, 0xd0, 0x0f, 0xe2, 0x04, 0x41, 0xfd, 0xd1,
|
||||
0x64, 0x3b, 0x22, 0xd4, 0xd2, 0x88, 0xbc, 0xc8, 0x55, 0xe5, 0xff, 0xce,
|
||||
0xed, 0x19, 0xa4, 0x2b, 0x69, 0x1e, 0x74, 0x56, 0x45, 0x3a, 0x75, 0x1d,
|
||||
0x50, 0xaf, 0xdb, 0x37, 0x67, 0xe6, 0xa1, 0x7b, 0x6c, 0xff, 0xa7, 0x64,
|
||||
0x57, 0x1a, 0xa9, 0x05, 0x02, 0x18, 0x81, 0x8e, 0x9c, 0xbc, 0x9f, 0xe2,
|
||||
0xfc, 0x58, 0xc7, 0x05, 0xa4, 0x0b, 0xae, 0xa1, 0x2f, 0xb8, 0xa0, 0xa3,
|
||||
0x8a, 0x23, 0xf9, 0xe6, 0x84, 0x34, 0xab, 0x10, 0x91, 0x2e, 0x79, 0x34,
|
||||
0xf5, 0xe2, 0xca, 0x8c, 0xdb, 0x02, 0x81, 0x81, 0x00, 0x8e, 0x9e, 0xc9,
|
||||
0xc2, 0xdf, 0xf7, 0x36, 0xef, 0x6e, 0x2a, 0x36, 0xeb, 0xd7, 0xa4, 0x52,
|
||||
0x43, 0x27, 0x8d, 0xaa, 0x52, 0x2d, 0xa8, 0xc1, 0x66, 0xf4, 0x9f, 0xc6,
|
||||
0x78, 0x9e, 0x31, 0x64, 0xe6, 0x56, 0xc9, 0x6d, 0x85, 0x79, 0x2a, 0x5c,
|
||||
0xca, 0x53, 0x2b, 0x1a, 0x46, 0xf4, 0x16, 0x60, 0xfe, 0x41, 0xcf, 0xc7,
|
||||
0x74, 0x57, 0xd0, 0x06, 0xf4, 0xc9, 0xfa, 0x47, 0x9c, 0xa2, 0xcb, 0xe0,
|
||||
0x85, 0xc5, 0x95, 0x9f, 0x35, 0xdd, 0x4c, 0x15, 0x7a, 0xda, 0x34, 0xc4,
|
||||
0x81, 0x20, 0x7d, 0x55, 0x85, 0xee, 0x24, 0xa7, 0xa6, 0xcb, 0x0a, 0xec,
|
||||
0xa8, 0x13, 0x4a, 0xc4, 0xaa, 0x5a, 0x4c, 0xf9, 0x32, 0xc0, 0x4b, 0x65,
|
||||
0x47, 0x65, 0xba, 0x38, 0x57, 0x17, 0x0c, 0xdd, 0xe1, 0x68, 0xd1, 0x4f,
|
||||
0x3d, 0xb9, 0x0e, 0xdd, 0x3f, 0x53, 0xe6, 0x91, 0x0e, 0x33, 0xba, 0x77,
|
||||
0xc2, 0x03, 0xf5, 0x90, 0x60, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07,
|
||||
]);
|
||||
var expPrivOrig = [
|
||||
'-----BEGIN RSA PRIVATE KEY-----',
|
||||
'MIIEpQIBAAKCAQEA7J/Xbhf65MX/rINuvmBmsvJqNPpP4knNVCk0lTtVwfUfFj9qn+WTfC',
|
||||
'Xgkttjjbu0wiR8nGlM4KchrPzTRDsar55gkwnTrLRliDmFjNIELK+FJ5JZGyhzmfnBbDcI',
|
||||
'ondYWoywlsBjihAQhNj6HrcnWMFrNLTmoQVogsnjam8LtfcTqIsUSm4KcjmmH6BPy3LZ5W',
|
||||
'Fhp2NTrmbWurTamJK0UJM235r+WDZtMdf/AYjkSTtxjwnmb8nhmFGMxPoWuUUUe54OCW0H',
|
||||
'HnlOobbw3Qo9o5z061+qKTeMtAMlrOhk9ge+yshIOVGvNkLdMn03et3Wv1f5ENef5LjIpx',
|
||||
'sMiWnwnQIDAQABAoIBAQDLrZrmbUXNfpFhkZDV1m0QQ5IgIAZ7JkPT2dQlUHm1BqXHpLbH',
|
||||
'A/o7tu7j+mxrJ9Oj+Xw5tnoyNirKmKXR6X5DBPTkHGVUF8P9ymWmnXBydnMLaPHCasN3Go',
|
||||
'DgAU8xacFn0AqA+QG1abaOY6aIoecAgx0gtUZ//APF8LoMd6GA8pDPClcUoMcwWxAseIWi',
|
||||
'Un7xqNC8eD5+9sXFrPMC1NwCILjMN+GqLSTtRPt3IOXEOGMI4pLSat8Ky1SXkcdVnDEA4v',
|
||||
'Il2ths6m3y/5gWF/X6XNj9ivfqNaCWve3TNRzueKMf/QwkS61PpQiz15DnCGBSJu6TQIDR',
|
||||
'r690TTtvTkKRAoGBAP4mnYGh8+JIrSJN9BxoTeHi/wm/phIKFs7WNHN9VdM1b7JNZMteXh',
|
||||
'rIzylYKDDsKZUJGxGAuuAWmUl2s0JyBRDy9ag2hPGDV10nrumuE0fz2rFC3qElx3LuLjR4',
|
||||
'ZGrtkYGvHtPtaJE3L91XXSo6IYZ0bf8LVqzCZTqIkV48EH5TAoGBAO5YlMyWG5pjhEV8kn',
|
||||
'g1F35/fW8Gd2lcxOjHGdJeWNId7kzy2cvKKifsW1U3Zg0s5v1INVFmEx6rcNrmRawliyuJ',
|
||||
'SxmZagaBJNWpPPbEKDlwJA2NzWm0ZXgNr09o46ydrweTEOvJQIyChYUWwPxJdgNjeiyVYc',
|
||||
'g7B3loYLHI8JdPAoGBAOSjPKM4XT0/AHKSCn/b3eTO332XqgEkjmw5DCqxoJpHwlp3gavr',
|
||||
'E2GpMaUSJ+YLL0ViUbWnR3b9HZ2XaaDnDmO3DwTrNyJGdDvbzWFwNuxOFnnNnJcAc7OTTo',
|
||||
'HppP0FCBfQwT0KoT2ylh7bz3aDoVFiQOpm+uykXYkQ/yX1hyj9AoGADrQiQdjEzSp0f4Dm',
|
||||
'3EmSMHiW+WFxvms9roqR2jt9yUCVcePNcdf/78SSAdjQD+IEQf3RZDsi1NKIvMhV5f/O7R',
|
||||
'mkK2kedFZFOnUdUK/bN2fmoXts/6dkVxqpBQIYgY6cvJ/i/FjHBaQLrqEvuKCjiiP55oQ0',
|
||||
'qxCRLnk09eLKjNsCgYEAjp7Jwt/3Nu9uKjbr16RSQyeNqlItqMFm9J/GeJ4xZOZWyW2FeS',
|
||||
'pcylMrGkb0FmD+Qc/HdFfQBvTJ+kecosvghcWVnzXdTBV62jTEgSB9VYXuJKemywrsqBNK',
|
||||
'xKpaTPkywEtlR2W6OFcXDN3haNFPPbkO3T9T5pEOM7p3wgP1kGAHBwcHBwcH',
|
||||
'-----END RSA PRIVATE KEY-----'
|
||||
].join('\n');
|
||||
assert(keyInfo.ppk === undefined, makeMsg(what, 'Unexpected PPK flag'));
|
||||
assert(keyInfo._converted === undefined,
|
||||
makeMsg(what, 'Unexpected automatic private PEM generation'));
|
||||
assert(keyInfo._macresult === undefined,
|
||||
makeMsg(what, 'Unexpected MAC verification'));
|
||||
assert(keyInfo._decrypted === true,
|
||||
makeMsg(what, 'Expected decrypted flag'));
|
||||
assert.deepEqual(keyInfo.private,
|
||||
expPriv,
|
||||
makeMsg(what, 'Decrypted private data mismatch'));
|
||||
assert.deepEqual(keyInfo.privateOrig,
|
||||
expPrivOrig,
|
||||
makeMsg(what, 'Decrypted private PEM data mismatch'));
|
||||
next();
|
||||
},
|
||||
what: 'decryptKey - with encrypted RSA'
|
||||
},
|
||||
{ run: function() {
|
||||
var pubkey = [
|
||||
'---- BEGIN SSH2 PUBLIC KEY ----',
|
||||
'Comment: "dsa-key-20151028"',
|
||||
'AAAAB3NzaC1kc3MAAAEBAJ0Gth9JHw/a8RmY3Y0UFqBWVWkzWxkzG+DR2oqHwTIq',
|
||||
'jAi9Xr06oSbdmXd3Jl3bHsbd2gVq4+/j32s0uIf6FEW7mFooSiDOcRWARJSAAmkI',
|
||||
'T9ep//ag+gNUmwhtPebliCqcAn9VWE7wq2v0FJsG3trFW/pvi/hVsBOrkz4Qieqb',
|
||||
'KbwNwZc/MI+h9KAQPV7tWN2y5aG3jlVD9PERyeFPlmYkD1P+IqytxvL3thUFKeru',
|
||||
'N8w+hjKIGGonEcVzWRJ9UUBQqAaNNH4/9mzedpS8CivfnUvsIw9rSTB4N+Wf70jb',
|
||||
'6a2qD1mHs1DqOkX136UOn5HkFldBnny0NSmlR/LewQkAAAAVAMu94kPPMR0Ew6Zh',
|
||||
'mAoJJc0RjisBAAABAGkOU/b/I0opGITGCx9qFEcqiJ/VJHVsYhQgM/jCkydEc9kW',
|
||||
'yjY+wKulGWpmA8wGmYm9j4IAgMGEXjBR8dyYJNZVXK0JOJmWrqUj5Q1GCUS5hCyU',
|
||||
'iA7nmVQ4syhGE49aFBLFdyKS6t7//swEEEV+6Hw9qcQWB98zoD8qdPGz3W/9kNXB',
|
||||
'OgVHWyqfWsbA/7MW2vjjF/u2EJe8YRKIJnodLOSNwPf0iCmj1HdaIm5N2Nl1k/6/',
|
||||
'9MwlY6tjn4hinrEN/pOiC1ci/1ADmTq4L9upi1Paix51zD8Yp7q3SxOgZqFU0ELF',
|
||||
'VP/XHokm278t1mE9hxDwkepv7XgBda8uamWzwSoAAAEAYl2bjiCjIB68+DNuRgtf',
|
||||
'lvVk00nOH3dYXSslwKIFTivYDczjz0splaLsEhrdTRiOXyVsCEDhYtlvWlTw34rg',
|
||||
's2QoutpqISOiq26XwPdOlejD7Hy7gtw3yRyrhbXHYHE0nOvx0/SP7il4ub//QRTd',
|
||||
'7cUPao2f359cGpap84anqKJjF3m4oRGdZGhTAQPqtGMkchZvItKyZe6pJ9HhsE7h',
|
||||
'NMsxPHAUon8QwNL1v+JkHg7i+Oe8rEZx/51m/qGVtXLN+z885lsqzuwe9KhY5I8C',
|
||||
'C3f8nR+Mivfp1ce9pSMKCpdRASzOBuykZKYZmns6SA0UqAp7ZLDKubbhk9ZLVyAO',
|
||||
'dA==',
|
||||
'---- END SSH2 PUBLIC KEY ----'
|
||||
].join('\n');
|
||||
assert.doesNotThrow(function() {
|
||||
var res = utils.genPublicKey(utils.parseKey(pubkey));
|
||||
assert.deepEqual(
|
||||
res,
|
||||
{ type: 'dss',
|
||||
fulltype: 'ssh-dss',
|
||||
curve: undefined,
|
||||
public: new Buffer([
|
||||
0x00, 0x00, 0x00, 0x07, 0x73, 0x73, 0x68, 0x2d, 0x64, 0x73, 0x73,
|
||||
0x00, 0x00, 0x01, 0x01, 0x00, 0x9d, 0x06, 0xb6, 0x1f, 0x49, 0x1f,
|
||||
0x0f, 0xda, 0xf1, 0x19, 0x98, 0xdd, 0x8d, 0x14, 0x16, 0xa0, 0x56,
|
||||
0x55, 0x69, 0x33, 0x5b, 0x19, 0x33, 0x1b, 0xe0, 0xd1, 0xda, 0x8a,
|
||||
0x87, 0xc1, 0x32, 0x2a, 0x8c, 0x08, 0xbd, 0x5e, 0xbd, 0x3a, 0xa1,
|
||||
0x26, 0xdd, 0x99, 0x77, 0x77, 0x26, 0x5d, 0xdb, 0x1e, 0xc6, 0xdd,
|
||||
0xda, 0x05, 0x6a, 0xe3, 0xef, 0xe3, 0xdf, 0x6b, 0x34, 0xb8, 0x87,
|
||||
0xfa, 0x14, 0x45, 0xbb, 0x98, 0x5a, 0x28, 0x4a, 0x20, 0xce, 0x71,
|
||||
0x15, 0x80, 0x44, 0x94, 0x80, 0x02, 0x69, 0x08, 0x4f, 0xd7, 0xa9,
|
||||
0xff, 0xf6, 0xa0, 0xfa, 0x03, 0x54, 0x9b, 0x08, 0x6d, 0x3d, 0xe6,
|
||||
0xe5, 0x88, 0x2a, 0x9c, 0x02, 0x7f, 0x55, 0x58, 0x4e, 0xf0, 0xab,
|
||||
0x6b, 0xf4, 0x14, 0x9b, 0x06, 0xde, 0xda, 0xc5, 0x5b, 0xfa, 0x6f,
|
||||
0x8b, 0xf8, 0x55, 0xb0, 0x13, 0xab, 0x93, 0x3e, 0x10, 0x89, 0xea,
|
||||
0x9b, 0x29, 0xbc, 0x0d, 0xc1, 0x97, 0x3f, 0x30, 0x8f, 0xa1, 0xf4,
|
||||
0xa0, 0x10, 0x3d, 0x5e, 0xed, 0x58, 0xdd, 0xb2, 0xe5, 0xa1, 0xb7,
|
||||
0x8e, 0x55, 0x43, 0xf4, 0xf1, 0x11, 0xc9, 0xe1, 0x4f, 0x96, 0x66,
|
||||
0x24, 0x0f, 0x53, 0xfe, 0x22, 0xac, 0xad, 0xc6, 0xf2, 0xf7, 0xb6,
|
||||
0x15, 0x05, 0x29, 0xea, 0xee, 0x37, 0xcc, 0x3e, 0x86, 0x32, 0x88,
|
||||
0x18, 0x6a, 0x27, 0x11, 0xc5, 0x73, 0x59, 0x12, 0x7d, 0x51, 0x40,
|
||||
0x50, 0xa8, 0x06, 0x8d, 0x34, 0x7e, 0x3f, 0xf6, 0x6c, 0xde, 0x76,
|
||||
0x94, 0xbc, 0x0a, 0x2b, 0xdf, 0x9d, 0x4b, 0xec, 0x23, 0x0f, 0x6b,
|
||||
0x49, 0x30, 0x78, 0x37, 0xe5, 0x9f, 0xef, 0x48, 0xdb, 0xe9, 0xad,
|
||||
0xaa, 0x0f, 0x59, 0x87, 0xb3, 0x50, 0xea, 0x3a, 0x45, 0xf5, 0xdf,
|
||||
0xa5, 0x0e, 0x9f, 0x91, 0xe4, 0x16, 0x57, 0x41, 0x9e, 0x7c, 0xb4,
|
||||
0x35, 0x29, 0xa5, 0x47, 0xf2, 0xde, 0xc1, 0x09, 0x00, 0x00, 0x00,
|
||||
0x15, 0x00, 0xcb, 0xbd, 0xe2, 0x43, 0xcf, 0x31, 0x1d, 0x04, 0xc3,
|
||||
0xa6, 0x61, 0x98, 0x0a, 0x09, 0x25, 0xcd, 0x11, 0x8e, 0x2b, 0x01,
|
||||
0x00, 0x00, 0x01, 0x00, 0x69, 0x0e, 0x53, 0xf6, 0xff, 0x23, 0x4a,
|
||||
0x29, 0x18, 0x84, 0xc6, 0x0b, 0x1f, 0x6a, 0x14, 0x47, 0x2a, 0x88,
|
||||
0x9f, 0xd5, 0x24, 0x75, 0x6c, 0x62, 0x14, 0x20, 0x33, 0xf8, 0xc2,
|
||||
0x93, 0x27, 0x44, 0x73, 0xd9, 0x16, 0xca, 0x36, 0x3e, 0xc0, 0xab,
|
||||
0xa5, 0x19, 0x6a, 0x66, 0x03, 0xcc, 0x06, 0x99, 0x89, 0xbd, 0x8f,
|
||||
0x82, 0x00, 0x80, 0xc1, 0x84, 0x5e, 0x30, 0x51, 0xf1, 0xdc, 0x98,
|
||||
0x24, 0xd6, 0x55, 0x5c, 0xad, 0x09, 0x38, 0x99, 0x96, 0xae, 0xa5,
|
||||
0x23, 0xe5, 0x0d, 0x46, 0x09, 0x44, 0xb9, 0x84, 0x2c, 0x94, 0x88,
|
||||
0x0e, 0xe7, 0x99, 0x54, 0x38, 0xb3, 0x28, 0x46, 0x13, 0x8f, 0x5a,
|
||||
0x14, 0x12, 0xc5, 0x77, 0x22, 0x92, 0xea, 0xde, 0xff, 0xfe, 0xcc,
|
||||
0x04, 0x10, 0x45, 0x7e, 0xe8, 0x7c, 0x3d, 0xa9, 0xc4, 0x16, 0x07,
|
||||
0xdf, 0x33, 0xa0, 0x3f, 0x2a, 0x74, 0xf1, 0xb3, 0xdd, 0x6f, 0xfd,
|
||||
0x90, 0xd5, 0xc1, 0x3a, 0x05, 0x47, 0x5b, 0x2a, 0x9f, 0x5a, 0xc6,
|
||||
0xc0, 0xff, 0xb3, 0x16, 0xda, 0xf8, 0xe3, 0x17, 0xfb, 0xb6, 0x10,
|
||||
0x97, 0xbc, 0x61, 0x12, 0x88, 0x26, 0x7a, 0x1d, 0x2c, 0xe4, 0x8d,
|
||||
0xc0, 0xf7, 0xf4, 0x88, 0x29, 0xa3, 0xd4, 0x77, 0x5a, 0x22, 0x6e,
|
||||
0x4d, 0xd8, 0xd9, 0x75, 0x93, 0xfe, 0xbf, 0xf4, 0xcc, 0x25, 0x63,
|
||||
0xab, 0x63, 0x9f, 0x88, 0x62, 0x9e, 0xb1, 0x0d, 0xfe, 0x93, 0xa2,
|
||||
0x0b, 0x57, 0x22, 0xff, 0x50, 0x03, 0x99, 0x3a, 0xb8, 0x2f, 0xdb,
|
||||
0xa9, 0x8b, 0x53, 0xda, 0x8b, 0x1e, 0x75, 0xcc, 0x3f, 0x18, 0xa7,
|
||||
0xba, 0xb7, 0x4b, 0x13, 0xa0, 0x66, 0xa1, 0x54, 0xd0, 0x42, 0xc5,
|
||||
0x54, 0xff, 0xd7, 0x1e, 0x89, 0x26, 0xdb, 0xbf, 0x2d, 0xd6, 0x61,
|
||||
0x3d, 0x87, 0x10, 0xf0, 0x91, 0xea, 0x6f, 0xed, 0x78, 0x01, 0x75,
|
||||
0xaf, 0x2e, 0x6a, 0x65, 0xb3, 0xc1, 0x2a, 0x00, 0x00, 0x01, 0x00,
|
||||
0x62, 0x5d, 0x9b, 0x8e, 0x20, 0xa3, 0x20, 0x1e, 0xbc, 0xf8, 0x33,
|
||||
0x6e, 0x46, 0x0b, 0x5f, 0x96, 0xf5, 0x64, 0xd3, 0x49, 0xce, 0x1f,
|
||||
0x77, 0x58, 0x5d, 0x2b, 0x25, 0xc0, 0xa2, 0x05, 0x4e, 0x2b, 0xd8,
|
||||
0x0d, 0xcc, 0xe3, 0xcf, 0x4b, 0x29, 0x95, 0xa2, 0xec, 0x12, 0x1a,
|
||||
0xdd, 0x4d, 0x18, 0x8e, 0x5f, 0x25, 0x6c, 0x08, 0x40, 0xe1, 0x62,
|
||||
0xd9, 0x6f, 0x5a, 0x54, 0xf0, 0xdf, 0x8a, 0xe0, 0xb3, 0x64, 0x28,
|
||||
0xba, 0xda, 0x6a, 0x21, 0x23, 0xa2, 0xab, 0x6e, 0x97, 0xc0, 0xf7,
|
||||
0x4e, 0x95, 0xe8, 0xc3, 0xec, 0x7c, 0xbb, 0x82, 0xdc, 0x37, 0xc9,
|
||||
0x1c, 0xab, 0x85, 0xb5, 0xc7, 0x60, 0x71, 0x34, 0x9c, 0xeb, 0xf1,
|
||||
0xd3, 0xf4, 0x8f, 0xee, 0x29, 0x78, 0xb9, 0xbf, 0xff, 0x41, 0x14,
|
||||
0xdd, 0xed, 0xc5, 0x0f, 0x6a, 0x8d, 0x9f, 0xdf, 0x9f, 0x5c, 0x1a,
|
||||
0x96, 0xa9, 0xf3, 0x86, 0xa7, 0xa8, 0xa2, 0x63, 0x17, 0x79, 0xb8,
|
||||
0xa1, 0x11, 0x9d, 0x64, 0x68, 0x53, 0x01, 0x03, 0xea, 0xb4, 0x63,
|
||||
0x24, 0x72, 0x16, 0x6f, 0x22, 0xd2, 0xb2, 0x65, 0xee, 0xa9, 0x27,
|
||||
0xd1, 0xe1, 0xb0, 0x4e, 0xe1, 0x34, 0xcb, 0x31, 0x3c, 0x70, 0x14,
|
||||
0xa2, 0x7f, 0x10, 0xc0, 0xd2, 0xf5, 0xbf, 0xe2, 0x64, 0x1e, 0x0e,
|
||||
0xe2, 0xf8, 0xe7, 0xbc, 0xac, 0x46, 0x71, 0xff, 0x9d, 0x66, 0xfe,
|
||||
0xa1, 0x95, 0xb5, 0x72, 0xcd, 0xfb, 0x3f, 0x3c, 0xe6, 0x5b, 0x2a,
|
||||
0xce, 0xec, 0x1e, 0xf4, 0xa8, 0x58, 0xe4, 0x8f, 0x02, 0x0b, 0x77,
|
||||
0xfc, 0x9d, 0x1f, 0x8c, 0x8a, 0xf7, 0xe9, 0xd5, 0xc7, 0xbd, 0xa5,
|
||||
0x23, 0x0a, 0x0a, 0x97, 0x51, 0x01, 0x2c, 0xce, 0x06, 0xec, 0xa4,
|
||||
0x64, 0xa6, 0x19, 0x9a, 0x7b, 0x3a, 0x48, 0x0d, 0x14, 0xa8, 0x0a,
|
||||
0x7b, 0x64, 0xb0, 0xca, 0xb9, 0xb6, 0xe1, 0x93, 0xd6, 0x4b, 0x57,
|
||||
0x20, 0x0e, 0x74,
|
||||
]),
|
||||
publicOrig: new Buffer([
|
||||
0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x42, 0x45, 0x47, 0x49, 0x4e, 0x20,
|
||||
0x50, 0x55, 0x42, 0x4c, 0x49, 0x43, 0x20, 0x4b, 0x45, 0x59, 0x2d,
|
||||
0x2d, 0x2d, 0x2d, 0x2d, 0x0a, 0x4d, 0x49, 0x49, 0x44, 0x4f, 0x6a,
|
||||
0x43, 0x43, 0x41, 0x69, 0x30, 0x47, 0x42, 0x79, 0x71, 0x47, 0x53,
|
||||
0x4d, 0x34, 0x34, 0x42, 0x41, 0x45, 0x77, 0x67, 0x67, 0x49, 0x67,
|
||||
0x41, 0x6f, 0x49, 0x42, 0x41, 0x51, 0x43, 0x64, 0x42, 0x72, 0x59,
|
||||
0x66, 0x53, 0x52, 0x38, 0x50, 0x32, 0x76, 0x45, 0x5a, 0x6d, 0x4e,
|
||||
0x32, 0x4e, 0x46, 0x42, 0x61, 0x67, 0x56, 0x6c, 0x56, 0x70, 0x4d,
|
||||
0x31, 0x73, 0x5a, 0x0a, 0x4d, 0x78, 0x76, 0x67, 0x30, 0x64, 0x71,
|
||||
0x4b, 0x68, 0x38, 0x45, 0x79, 0x4b, 0x6f, 0x77, 0x49, 0x76, 0x56,
|
||||
0x36, 0x39, 0x4f, 0x71, 0x45, 0x6d, 0x33, 0x5a, 0x6c, 0x33, 0x64,
|
||||
0x79, 0x5a, 0x64, 0x32, 0x78, 0x37, 0x47, 0x33, 0x64, 0x6f, 0x46,
|
||||
0x61, 0x75, 0x50, 0x76, 0x34, 0x39, 0x39, 0x72, 0x4e, 0x4c, 0x69,
|
||||
0x48, 0x2b, 0x68, 0x52, 0x46, 0x75, 0x35, 0x68, 0x61, 0x4b, 0x45,
|
||||
0x6f, 0x67, 0x0a, 0x7a, 0x6e, 0x45, 0x56, 0x67, 0x45, 0x53, 0x55,
|
||||
0x67, 0x41, 0x4a, 0x70, 0x43, 0x45, 0x2f, 0x58, 0x71, 0x66, 0x2f,
|
||||
0x32, 0x6f, 0x50, 0x6f, 0x44, 0x56, 0x4a, 0x73, 0x49, 0x62, 0x54,
|
||||
0x33, 0x6d, 0x35, 0x59, 0x67, 0x71, 0x6e, 0x41, 0x4a, 0x2f, 0x56,
|
||||
0x56, 0x68, 0x4f, 0x38, 0x4b, 0x74, 0x72, 0x39, 0x42, 0x53, 0x62,
|
||||
0x42, 0x74, 0x37, 0x61, 0x78, 0x56, 0x76, 0x36, 0x62, 0x34, 0x76,
|
||||
0x34, 0x0a, 0x56, 0x62, 0x41, 0x54, 0x71, 0x35, 0x4d, 0x2b, 0x45,
|
||||
0x49, 0x6e, 0x71, 0x6d, 0x79, 0x6d, 0x38, 0x44, 0x63, 0x47, 0x58,
|
||||
0x50, 0x7a, 0x43, 0x50, 0x6f, 0x66, 0x53, 0x67, 0x45, 0x44, 0x31,
|
||||
0x65, 0x37, 0x56, 0x6a, 0x64, 0x73, 0x75, 0x57, 0x68, 0x74, 0x34,
|
||||
0x35, 0x56, 0x51, 0x2f, 0x54, 0x78, 0x45, 0x63, 0x6e, 0x68, 0x54,
|
||||
0x35, 0x5a, 0x6d, 0x4a, 0x41, 0x39, 0x54, 0x2f, 0x69, 0x4b, 0x73,
|
||||
0x0a, 0x72, 0x63, 0x62, 0x79, 0x39, 0x37, 0x59, 0x56, 0x42, 0x53,
|
||||
0x6e, 0x71, 0x37, 0x6a, 0x66, 0x4d, 0x50, 0x6f, 0x59, 0x79, 0x69,
|
||||
0x42, 0x68, 0x71, 0x4a, 0x78, 0x48, 0x46, 0x63, 0x31, 0x6b, 0x53,
|
||||
0x66, 0x56, 0x46, 0x41, 0x55, 0x4b, 0x67, 0x47, 0x6a, 0x54, 0x52,
|
||||
0x2b, 0x50, 0x2f, 0x5a, 0x73, 0x33, 0x6e, 0x61, 0x55, 0x76, 0x41,
|
||||
0x6f, 0x72, 0x33, 0x35, 0x31, 0x4c, 0x37, 0x43, 0x4d, 0x50, 0x0a,
|
||||
0x61, 0x30, 0x6b, 0x77, 0x65, 0x44, 0x66, 0x6c, 0x6e, 0x2b, 0x39,
|
||||
0x49, 0x32, 0x2b, 0x6d, 0x74, 0x71, 0x67, 0x39, 0x5a, 0x68, 0x37,
|
||||
0x4e, 0x51, 0x36, 0x6a, 0x70, 0x46, 0x39, 0x64, 0x2b, 0x6c, 0x44,
|
||||
0x70, 0x2b, 0x52, 0x35, 0x42, 0x5a, 0x58, 0x51, 0x5a, 0x35, 0x38,
|
||||
0x74, 0x44, 0x55, 0x70, 0x70, 0x55, 0x66, 0x79, 0x33, 0x73, 0x45,
|
||||
0x4a, 0x41, 0x68, 0x55, 0x41, 0x79, 0x37, 0x33, 0x69, 0x0a, 0x51,
|
||||
0x38, 0x38, 0x78, 0x48, 0x51, 0x54, 0x44, 0x70, 0x6d, 0x47, 0x59,
|
||||
0x43, 0x67, 0x6b, 0x6c, 0x7a, 0x52, 0x47, 0x4f, 0x4b, 0x77, 0x45,
|
||||
0x43, 0x67, 0x67, 0x45, 0x41, 0x61, 0x51, 0x35, 0x54, 0x39, 0x76,
|
||||
0x38, 0x6a, 0x53, 0x69, 0x6b, 0x59, 0x68, 0x4d, 0x59, 0x4c, 0x48,
|
||||
0x32, 0x6f, 0x55, 0x52, 0x79, 0x71, 0x49, 0x6e, 0x39, 0x55, 0x6b,
|
||||
0x64, 0x57, 0x78, 0x69, 0x46, 0x43, 0x41, 0x7a, 0x0a, 0x2b, 0x4d,
|
||||
0x4b, 0x54, 0x4a, 0x30, 0x52, 0x7a, 0x32, 0x52, 0x62, 0x4b, 0x4e,
|
||||
0x6a, 0x37, 0x41, 0x71, 0x36, 0x55, 0x5a, 0x61, 0x6d, 0x59, 0x44,
|
||||
0x7a, 0x41, 0x61, 0x5a, 0x69, 0x62, 0x32, 0x50, 0x67, 0x67, 0x43,
|
||||
0x41, 0x77, 0x59, 0x52, 0x65, 0x4d, 0x46, 0x48, 0x78, 0x33, 0x4a,
|
||||
0x67, 0x6b, 0x31, 0x6c, 0x56, 0x63, 0x72, 0x51, 0x6b, 0x34, 0x6d,
|
||||
0x5a, 0x61, 0x75, 0x70, 0x53, 0x50, 0x6c, 0x0a, 0x44, 0x55, 0x59,
|
||||
0x4a, 0x52, 0x4c, 0x6d, 0x45, 0x4c, 0x4a, 0x53, 0x49, 0x44, 0x75,
|
||||
0x65, 0x5a, 0x56, 0x44, 0x69, 0x7a, 0x4b, 0x45, 0x59, 0x54, 0x6a,
|
||||
0x31, 0x6f, 0x55, 0x45, 0x73, 0x56, 0x33, 0x49, 0x70, 0x4c, 0x71,
|
||||
0x33, 0x76, 0x2f, 0x2b, 0x7a, 0x41, 0x51, 0x51, 0x52, 0x58, 0x37,
|
||||
0x6f, 0x66, 0x44, 0x32, 0x70, 0x78, 0x42, 0x59, 0x48, 0x33, 0x7a,
|
||||
0x4f, 0x67, 0x50, 0x79, 0x70, 0x30, 0x0a, 0x38, 0x62, 0x50, 0x64,
|
||||
0x62, 0x2f, 0x32, 0x51, 0x31, 0x63, 0x45, 0x36, 0x42, 0x55, 0x64,
|
||||
0x62, 0x4b, 0x70, 0x39, 0x61, 0x78, 0x73, 0x44, 0x2f, 0x73, 0x78,
|
||||
0x62, 0x61, 0x2b, 0x4f, 0x4d, 0x58, 0x2b, 0x37, 0x59, 0x51, 0x6c,
|
||||
0x37, 0x78, 0x68, 0x45, 0x6f, 0x67, 0x6d, 0x65, 0x68, 0x30, 0x73,
|
||||
0x35, 0x49, 0x33, 0x41, 0x39, 0x2f, 0x53, 0x49, 0x4b, 0x61, 0x50,
|
||||
0x55, 0x64, 0x31, 0x6f, 0x69, 0x0a, 0x62, 0x6b, 0x33, 0x59, 0x32,
|
||||
0x58, 0x57, 0x54, 0x2f, 0x72, 0x2f, 0x30, 0x7a, 0x43, 0x56, 0x6a,
|
||||
0x71, 0x32, 0x4f, 0x66, 0x69, 0x47, 0x4b, 0x65, 0x73, 0x51, 0x33,
|
||||
0x2b, 0x6b, 0x36, 0x49, 0x4c, 0x56, 0x79, 0x4c, 0x2f, 0x55, 0x41,
|
||||
0x4f, 0x5a, 0x4f, 0x72, 0x67, 0x76, 0x32, 0x36, 0x6d, 0x4c, 0x55,
|
||||
0x39, 0x71, 0x4c, 0x48, 0x6e, 0x58, 0x4d, 0x50, 0x78, 0x69, 0x6e,
|
||||
0x75, 0x72, 0x64, 0x4c, 0x0a, 0x45, 0x36, 0x42, 0x6d, 0x6f, 0x56,
|
||||
0x54, 0x51, 0x51, 0x73, 0x56, 0x55, 0x2f, 0x39, 0x63, 0x65, 0x69,
|
||||
0x53, 0x62, 0x62, 0x76, 0x79, 0x33, 0x57, 0x59, 0x54, 0x32, 0x48,
|
||||
0x45, 0x50, 0x43, 0x52, 0x36, 0x6d, 0x2f, 0x74, 0x65, 0x41, 0x46,
|
||||
0x31, 0x72, 0x79, 0x35, 0x71, 0x5a, 0x62, 0x50, 0x42, 0x4b, 0x67,
|
||||
0x4f, 0x43, 0x41, 0x51, 0x55, 0x41, 0x41, 0x6f, 0x49, 0x42, 0x41,
|
||||
0x47, 0x4a, 0x64, 0x0a, 0x6d, 0x34, 0x34, 0x67, 0x6f, 0x79, 0x41,
|
||||
0x65, 0x76, 0x50, 0x67, 0x7a, 0x62, 0x6b, 0x59, 0x4c, 0x58, 0x35,
|
||||
0x62, 0x31, 0x5a, 0x4e, 0x4e, 0x4a, 0x7a, 0x68, 0x39, 0x33, 0x57,
|
||||
0x46, 0x30, 0x72, 0x4a, 0x63, 0x43, 0x69, 0x42, 0x55, 0x34, 0x72,
|
||||
0x32, 0x41, 0x33, 0x4d, 0x34, 0x38, 0x39, 0x4c, 0x4b, 0x5a, 0x57,
|
||||
0x69, 0x37, 0x42, 0x49, 0x61, 0x33, 0x55, 0x30, 0x59, 0x6a, 0x6c,
|
||||
0x38, 0x6c, 0x0a, 0x62, 0x41, 0x68, 0x41, 0x34, 0x57, 0x4c, 0x5a,
|
||||
0x62, 0x31, 0x70, 0x55, 0x38, 0x4e, 0x2b, 0x4b, 0x34, 0x4c, 0x4e,
|
||||
0x6b, 0x4b, 0x4c, 0x72, 0x61, 0x61, 0x69, 0x45, 0x6a, 0x6f, 0x71,
|
||||
0x74, 0x75, 0x6c, 0x38, 0x44, 0x33, 0x54, 0x70, 0x58, 0x6f, 0x77,
|
||||
0x2b, 0x78, 0x38, 0x75, 0x34, 0x4c, 0x63, 0x4e, 0x38, 0x6b, 0x63,
|
||||
0x71, 0x34, 0x57, 0x31, 0x78, 0x32, 0x42, 0x78, 0x4e, 0x4a, 0x7a,
|
||||
0x72, 0x0a, 0x38, 0x64, 0x50, 0x30, 0x6a, 0x2b, 0x34, 0x70, 0x65,
|
||||
0x4c, 0x6d, 0x2f, 0x2f, 0x30, 0x45, 0x55, 0x33, 0x65, 0x33, 0x46,
|
||||
0x44, 0x32, 0x71, 0x4e, 0x6e, 0x39, 0x2b, 0x66, 0x58, 0x42, 0x71,
|
||||
0x57, 0x71, 0x66, 0x4f, 0x47, 0x70, 0x36, 0x69, 0x69, 0x59, 0x78,
|
||||
0x64, 0x35, 0x75, 0x4b, 0x45, 0x52, 0x6e, 0x57, 0x52, 0x6f, 0x55,
|
||||
0x77, 0x45, 0x44, 0x36, 0x72, 0x52, 0x6a, 0x4a, 0x48, 0x49, 0x57,
|
||||
0x0a, 0x62, 0x79, 0x4c, 0x53, 0x73, 0x6d, 0x58, 0x75, 0x71, 0x53,
|
||||
0x66, 0x52, 0x34, 0x62, 0x42, 0x4f, 0x34, 0x54, 0x54, 0x4c, 0x4d,
|
||||
0x54, 0x78, 0x77, 0x46, 0x4b, 0x4a, 0x2f, 0x45, 0x4d, 0x44, 0x53,
|
||||
0x39, 0x62, 0x2f, 0x69, 0x5a, 0x42, 0x34, 0x4f, 0x34, 0x76, 0x6a,
|
||||
0x6e, 0x76, 0x4b, 0x78, 0x47, 0x63, 0x66, 0x2b, 0x64, 0x5a, 0x76,
|
||||
0x36, 0x68, 0x6c, 0x62, 0x56, 0x79, 0x7a, 0x66, 0x73, 0x2f, 0x0a,
|
||||
0x50, 0x4f, 0x5a, 0x62, 0x4b, 0x73, 0x37, 0x73, 0x48, 0x76, 0x53,
|
||||
0x6f, 0x57, 0x4f, 0x53, 0x50, 0x41, 0x67, 0x74, 0x33, 0x2f, 0x4a,
|
||||
0x30, 0x66, 0x6a, 0x49, 0x72, 0x33, 0x36, 0x64, 0x58, 0x48, 0x76,
|
||||
0x61, 0x55, 0x6a, 0x43, 0x67, 0x71, 0x58, 0x55, 0x51, 0x45, 0x73,
|
||||
0x7a, 0x67, 0x62, 0x73, 0x70, 0x47, 0x53, 0x6d, 0x47, 0x5a, 0x70,
|
||||
0x37, 0x4f, 0x6b, 0x67, 0x4e, 0x46, 0x4b, 0x67, 0x4b, 0x0a, 0x65,
|
||||
0x32, 0x53, 0x77, 0x79, 0x72, 0x6d, 0x32, 0x34, 0x5a, 0x50, 0x57,
|
||||
0x53, 0x31, 0x63, 0x67, 0x44, 0x6e, 0x51, 0x3d, 0x0a, 0x2d, 0x2d,
|
||||
0x2d, 0x2d, 0x2d, 0x45, 0x4e, 0x44, 0x20, 0x50, 0x55, 0x42, 0x4c,
|
||||
0x49, 0x43, 0x20, 0x4b, 0x45, 0x59, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d
|
||||
])
|
||||
}
|
||||
);
|
||||
next();
|
||||
});
|
||||
},
|
||||
what: 'Generate public key from parsed public key'
|
||||
},
|
||||
];
|
||||
|
||||
function next() {
|
||||
if (Array.isArray(process._events.exit))
|
||||
process._events.exit = process._events.exit[1];
|
||||
if (++t === tests.length)
|
||||
return;
|
||||
|
||||
var v = tests[t];
|
||||
process.nextTick(function() {
|
||||
v.run.call(v);
|
||||
});
|
||||
}
|
||||
|
||||
function makeMsg(what, msg) {
|
||||
return '[' + group + what + ']: ' + msg;
|
||||
}
|
||||
|
||||
process.once('exit', function() {
|
||||
assert(t === tests.length,
|
||||
makeMsg('_exit',
|
||||
'Only finished ' + t + '/' + tests.length + ' tests'));
|
||||
});
|
||||
|
||||
next();
|
||||
22
build/node_modules/ssh2-streams/test/test.js
generated
vendored
Normal file
22
build/node_modules/ssh2-streams/test/test.js
generated
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
var spawn = require('child_process').spawn,
|
||||
join = require('path').join;
|
||||
|
||||
var files = require('fs').readdirSync(__dirname).filter(function(f) {
|
||||
return (f.substr(0, 5) === 'test-');
|
||||
}).map(function(f) {
|
||||
return join(__dirname, f);
|
||||
}),
|
||||
f = -1;
|
||||
|
||||
function next() {
|
||||
if (++f < files.length) {
|
||||
spawn(process.argv[0], [ files[f] ], { stdio: 'inherit' })
|
||||
.on('exit', function(code) {
|
||||
if (code === 0)
|
||||
process.nextTick(next);
|
||||
else
|
||||
process.exit(code);
|
||||
});
|
||||
}
|
||||
}
|
||||
next();
|
||||
Reference in New Issue
Block a user