Add test for ssh-keygen printing of SSHFP records.
authordtucker <dtucker@openbsd.org>
Sun, 18 Jul 2021 23:10:10 +0000 (23:10 +0000)
committerdtucker <dtucker@openbsd.org>
Sun, 18 Jul 2021 23:10:10 +0000 (23:10 +0000)
regress/usr.bin/ssh/Makefile
regress/usr.bin/ssh/keygen-sshfp.sh [new file with mode: 0644]

index 23e5c46..3dea807 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: Makefile,v 1.110 2020/12/22 06:03:36 djm Exp $
+#      $OpenBSD: Makefile,v 1.111 2021/07/18 23:10:10 dtucker Exp $
 
 .ifndef SKIP_UNIT
 SUBDIR=                unittests
@@ -37,6 +37,7 @@ LTESTS=       connect \
                keygen-change \
                keygen-convert \
                keygen-moduli \
+               keygen-sshfp \
                key-options \
                scp \
                scp-uri \
diff --git a/regress/usr.bin/ssh/keygen-sshfp.sh b/regress/usr.bin/ssh/keygen-sshfp.sh
new file mode 100644 (file)
index 0000000..2fbfee4
--- /dev/null
@@ -0,0 +1,15 @@
+#      $OpenBSD: keygen-sshfp.sh,v 1.1 2021/07/18 23:10:10 dtucker Exp $
+#      Placed in the Public Domain.
+
+tid="keygen-sshfp"
+
+trace "keygen fingerprints"
+fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="1"{print $6}'`
+if [ "$fp" != "99c79cc09f5f81069cc017cdf9552cfc94b3b929" ]; then
+       fail "keygen fingerprint sha1"
+fi
+fp=`${SSHKEYGEN} -r test -f ${SRC}/rsa_openssh.pub | awk '$5=="2"{print $6}'`
+if [ "$fp" != \
+    "e30d6b9eb7a4de495324e4d5870b8220577993ea6af417e8e4a4f1c5bf01a9b6" ]; then
+       fail "keygen fingerprint sha256"
+fi