using System;
using System.Collections.Generic;
using System.IO;
using System.Linq;
using System.Text;
using Microsoft.VisualStudio.TestTools.UnitTesting;
using Renci.SshNet.Common;
using Renci.SshNet.Security;
using Renci.SshNet.Tests.Common;
namespace Renci.SshNet.Tests.Classes
{
///
/// old private key information/
///
[TestClass]
public class PrivateKeyFileTest : TestBase
{
#if NETFRAMEWORK
private static readonly DateTimeOffset UnixEpoch = new(1970, 01, 01, 00, 00, 00, TimeSpan.Zero);
#else
private static readonly DateTimeOffset UnixEpoch = DateTimeOffset.UnixEpoch;
#endif
private string _temporaryFile;
[TestInitialize]
public void SetUp()
{
_temporaryFile = GetTempFileName();
}
[TestCleanup]
public void TearDown()
{
if (_temporaryFile != null)
{
File.Delete(_temporaryFile);
}
}
///
/// A test for ctor.
///
[TestMethod]
public void ConstructorWithFileNameShouldThrowArgumentNullExceptionWhenFileNameIsNull()
{
string fileName = null;
try
{
_ = new PrivateKeyFile(fileName);
Assert.Fail();
}
catch (ArgumentNullException ex)
{
Assert.IsNull(ex.InnerException);
Assert.AreEqual("fileName", ex.ParamName);
}
}
///
/// A test for ctor.
///
[TestMethod]
public void ConstructorWithFileNameAndPassphraseShouldThrowArgumentNullExceptionWhenFileNameIsNull()
{
string fileName = null;
try
{
_ = new PrivateKeyFile(fileName, "12345");
Assert.Fail();
}
catch (ArgumentNullException ex)
{
Assert.IsNull(ex.InnerException);
Assert.AreEqual("fileName", ex.ParamName);
}
}
[TestMethod]
public void ConstructorWithPrivateKeyShouldThrowArgumentNullExceptionWhenPrivateKeyIsNull()
{
Stream privateKey = null;
try
{
_ = new PrivateKeyFile(privateKey);
Assert.Fail();
}
catch (ArgumentNullException ex)
{
Assert.IsNull(ex.InnerException);
Assert.AreEqual("privateKey", ex.ParamName);
}
}
[TestMethod]
public void ConstructorWithPrivateKeyAndPassphraseShouldThrowArgumentNullExceptionWhenPrivateKeyIsNull()
{
Stream privateKey = null;
try
{
_ = new PrivateKeyFile(privateKey, "12345");
Assert.Fail();
}
catch (ArgumentNullException ex)
{
Assert.IsNull(ex.InnerException);
Assert.AreEqual("privateKey", ex.ParamName);
}
}
[TestMethod]
public void ConstructorWithKeyShouldThrowArgumentNullExceptionWhenKeyIsNull()
{
Key key = null;
try
{
_ = new PrivateKeyFile(key);
Assert.Fail();
}
catch (ArgumentNullException ex)
{
Assert.IsNull(ex.InnerException);
Assert.AreEqual("key", ex.ParamName);
}
}
[TestMethod]
public void Test_PrivateKey_SSH2_Encrypted_ShouldThrowSshExceptionWhenPassphraseIsWrong()
{
using (var stream = GetData("Key.SSH2.RSA.Encrypted.Des.CBC.12345.txt"))
{
try
{
_ = new PrivateKeyFile(stream, "34567");
Assert.Fail();
}
catch (SshException ex)
{
Assert.IsInstanceOfType(ex);
Assert.IsNull(ex.InnerException);
Assert.AreEqual("Invalid passphrase.", ex.Message);
}
}
}
[TestMethod]
public void Test_PrivateKey_SSH2_Encrypted_ShouldThrowSshPassPhraseNullOrEmptyExceptionWhenPassphraseIsNull()
{
using (var stream = GetData("Key.SSH2.RSA.Encrypted.Des.CBC.12345.txt"))
{
try
{
_ = new PrivateKeyFile(stream, null);
Assert.Fail();
}
catch (SshPassPhraseNullOrEmptyException ex)
{
Assert.IsInstanceOfType(ex);
Assert.IsNull(ex.InnerException);
Assert.AreEqual("Private key is encrypted but passphrase is empty.", ex.Message);
}
}
}
[TestMethod]
public void Test_PrivateKey_SSH2_Encrypted_ShouldThrowSshPassPhraseNullOrEmptyExceptionWhenPassphraseIsEmpty()
{
using (var stream = GetData("Key.SSH2.RSA.Encrypted.Des.CBC.12345.txt"))
{
try
{
_ = new PrivateKeyFile(stream, string.Empty);
Assert.Fail();
}
catch (SshPassPhraseNullOrEmptyException ex)
{
Assert.IsInstanceOfType(ex);
Assert.IsNull(ex.InnerException);
Assert.AreEqual("Private key is encrypted but passphrase is empty.", ex.Message);
}
}
}
///
///A test for Dispose
///
[TestMethod]
public void DisposeTest()
{
using (var privateKeyStream = GetData("Key.RSA.txt"))
{
var target = new PrivateKeyFile(privateKeyStream);
target.Dispose();
}
}
///
/// A test for ctor.
///
[TestMethod]
public void ConstructorWithFileNameAndPassphrase()
{
using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
{
SaveStreamToFile(stream, _temporaryFile);
}
using (var fs = File.Open(_temporaryFile, FileMode.Open, FileAccess.Read, FileShare.Read))
{
var privateKeyFile = new PrivateKeyFile(_temporaryFile, "12345");
TestRsaKeyFile(privateKeyFile);
}
}
///
/// A test for ctor.
///
[TestMethod]
public void ConstructorWithFileNameAndPassphraseShouldThrowSshPassPhraseNullOrEmptyExceptionWhenNeededPassphraseIsEmpty()
{
var passphrase = string.Empty;
using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
{
SaveStreamToFile(stream, _temporaryFile);
}
try
{
_ = new PrivateKeyFile(_temporaryFile, passphrase);
Assert.Fail();
}
catch (SshPassPhraseNullOrEmptyException ex)
{
Assert.IsNull(ex.InnerException);
Assert.AreEqual("Private key is encrypted but passphrase is empty.", ex.Message);
}
}
///
/// A test for ctor.
///
[TestMethod]
public void ConstructorWithFileNameAndPassphraseShouldThrowSshPassPhraseNullOrEmptyExceptionWhenNeededPassphraseIsNull()
{
string passphrase = null;
using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
{
SaveStreamToFile(stream, _temporaryFile);
}
try
{
_ = new PrivateKeyFile(_temporaryFile, passphrase);
Assert.Fail();
}
catch (SshPassPhraseNullOrEmptyException ex)
{
Assert.IsNull(ex.InnerException);
Assert.AreEqual("Private key is encrypted but passphrase is empty.", ex.Message);
}
}
///
/// A test for ctor.
///
[TestMethod]
public void ConstructorWithFileName()
{
using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
{
SaveStreamToFile(stream, _temporaryFile);
}
var privateKeyFile = new PrivateKeyFile(_temporaryFile, "12345");
TestRsaKeyFile(privateKeyFile);
}
[TestMethod]
public void ConstructorWithFileNameShouldBeAbleToReadFileThatIsSharedForReadAccess()
{
using (var stream = GetData("Key.RSA.txt"))
{
SaveStreamToFile(stream, _temporaryFile);
}
using (var fs = File.Open(_temporaryFile, FileMode.Open, FileAccess.Read, FileShare.Read))
{
var privateKeyFile = new PrivateKeyFile(_temporaryFile);
TestRsaKeyFile(privateKeyFile);
}
}
[TestMethod]
public void ConstructorWithFileNameAndPassPhraseShouldBeAbleToReadFileThatIsSharedForReadAccess()
{
using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
{
SaveStreamToFile(stream, _temporaryFile);
}
using (var fs = File.Open(_temporaryFile, FileMode.Open, FileAccess.Read, FileShare.Read))
{
var privateKeyFile = new PrivateKeyFile(_temporaryFile, "12345");
TestRsaKeyFile(privateKeyFile);
}
}
[TestMethod]
[DataRow("Key.DSA.PKCS8.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(DsaKey))]
[DataRow("Key.DSA.PKCS8.txt", null, typeof(DsaKey))]
[DataRow("Key.DSA.txt", null, typeof(DsaKey))]
[DataRow("Key.ECDSA.Encrypted.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.ECDSA.PKCS8.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.ECDSA.PKCS8.txt", null, typeof(EcdsaKey))]
[DataRow("Key.ECDSA.txt", null, typeof(EcdsaKey))]
[DataRow("Key.ECDSA384.Encrypted.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.ECDSA384.txt", null, typeof(EcdsaKey))]
[DataRow("Key.ECDSA521.Encrypted.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.ECDSA521.txt", null, typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ECDSA.Encrypted.Aes.128.CTR.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ECDSA.Encrypted.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ECDSA.txt", null, typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ECDSA384.Encrypted.Aes.256.GCM.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ECDSA384.Encrypted.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ECDSA384.txt", null, typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ECDSA521.Encrypted.Aes.192.CBC.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ECDSA521.Encrypted.txt", "12345", typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ECDSA521.txt", null, typeof(EcdsaKey))]
[DataRow("Key.OPENSSH.ED25519.Encrypted.3Des.CBC.txt", "12345", typeof(ED25519Key))]
[DataRow("Key.OPENSSH.ED25519.Encrypted.Aes.128.CBC.txt", "12345", typeof(ED25519Key))]
[DataRow("Key.OPENSSH.ED25519.Encrypted.Aes.128.GCM.txt", "12345", typeof(ED25519Key))]
[DataRow("Key.OPENSSH.ED25519.Encrypted.Aes.256.CBC.txt", "12345", typeof(ED25519Key))]
[DataRow("Key.OPENSSH.ED25519.Encrypted.Aes.256.CTR.txt", "12345", typeof(ED25519Key))]
[DataRow("Key.OPENSSH.ED25519.Encrypted.ChaCha20.Poly1305.txt", "12345", typeof(ED25519Key))]
[DataRow("Key.OPENSSH.ED25519.Encrypted.txt", "12345", typeof(ED25519Key))]
[DataRow("Key.OPENSSH.ED25519.PKCS8.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(ED25519Key))]
[DataRow("Key.OPENSSH.ED25519.PKCS8.txt", null, typeof(ED25519Key))]
[DataRow("Key.OPENSSH.ED25519.txt", null, typeof(ED25519Key))]
[DataRow("Key.OPENSSH.RSA.Encrypted.Aes.192.CTR.txt", "12345", typeof(RsaKey))]
[DataRow("Key.OPENSSH.RSA.Encrypted.txt", "12345", typeof(RsaKey))]
[DataRow("Key.OPENSSH.RSA.txt", null, typeof(RsaKey))]
[DataRow("Key.PuTTY2.Ed25519.Encrypted.12345.ppk", "12345", typeof(ED25519Key))]
[DataRow("Key.PuTTY2.Ed25519.ppk", null, typeof(ED25519Key))]
[DataRow("Key.PuTTY2.RSA.Encrypted.12345.ppk", "12345", typeof(RsaKey))]
[DataRow("Key.PuTTY2.RSA.ppk", null, typeof(RsaKey))]
[DataRow("Key.PuTTY3.DSA.Encrypted.Argon2id.12345.ppk", "12345", typeof(DsaKey))]
[DataRow("Key.PuTTY3.DSA.ppk", null, typeof(DsaKey))]
[DataRow("Key.PuTTY3.ECDSA.Encrypted.Argon2id.12345.ppk", "12345", typeof(EcdsaKey))]
[DataRow("Key.PuTTY3.ECDSA.ppk", null, typeof(EcdsaKey))]
[DataRow("Key.PuTTY3.Ed25519.Encrypted.Argon2i.12345.ppk", "12345", typeof(ED25519Key))]
[DataRow("Key.PuTTY3.Ed25519.Encrypted.Argon2d.12345.ppk", "12345", typeof(ED25519Key))]
[DataRow("Key.PuTTY3.Ed25519.Encrypted.Argon2id.12345.ppk", "12345", typeof(ED25519Key))]
[DataRow("Key.PuTTY3.Ed25519.ppk", null, typeof(ED25519Key))]
[DataRow("Key.PuTTY3.RSA.Encrypted.Argon2id.12345.ppk", "12345", typeof(RsaKey))]
[DataRow("Key.PuTTY3.RSA.ppk", null, typeof(RsaKey))]
[DataRow("Key.RSA.Encrypted.Aes.128.CBC.12345.txt", "12345", typeof(RsaKey))]
[DataRow("Key.RSA.Encrypted.Aes.192.CBC.12345.txt", "12345", typeof(RsaKey))]
[DataRow("Key.RSA.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(RsaKey))]
[DataRow("Key.RSA.Encrypted.Des.Ede3.CBC.12345.txt", "12345", typeof(RsaKey))]
[DataRow("Key.RSA.Encrypted.Des.Ede3.CFB.1234567890.txt", "1234567890", typeof(RsaKey))]
[DataRow("Key.RSA.PKCS8.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(RsaKey))]
[DataRow("Key.RSA.PKCS8.txt", null, typeof(RsaKey))]
[DataRow("Key.RSA.txt", null, typeof(RsaKey))]
[DataRow("Key.SSH2.DSA.Encrypted.Des.CBC.12345.txt", "12345", typeof(DsaKey))]
[DataRow("Key.SSH2.DSA.txt", null, typeof(DsaKey))]
[DataRow("Key.SSH2.RSA.Encrypted.Des.CBC.12345.txt", "12345", typeof(RsaKey))]
[DataRow("Key.SSH2.RSA.txt", null, typeof(RsaKey))]
public void Test_PrivateKey(string name, string passPhrase, Type expectedKeyType)
{
using (var stream = GetData(name))
{
var pkFile = new PrivateKeyFile(stream, passPhrase);
Assert.IsInstanceOfType(pkFile.Key, expectedKeyType);
if (expectedKeyType == typeof(RsaKey))
{
TestRsaKeyFile(pkFile);
}
}
}
[TestMethod]
public void Test_Certificate_OPENSSH_RSA()
{
PrivateKeyFile pkFile;
using (var privateKeyStream = GetData("Key.OPENSSH.RSA.txt"))
using (var certificateStream = GetData("Key.OPENSSH.RSA-cert.pub"))
{
pkFile = new PrivateKeyFile(privateKeyStream, passPhrase: null, certificateStream);
}
Certificate cert = pkFile.Certificate;
// ssh-keygen -L -f Key.OPENSSH.RSA-cert.pub
Assert.AreEqual("ssh-rsa-cert-v01@openssh.com", cert.Name);
Assert.IsInstanceOfType(cert.Key);
CollectionAssert.AreEqual(((RsaKey)pkFile.Key).Public, ((RsaKey)cert.Key).Public);
Assert.AreEqual(0UL, cert.Serial);
Assert.AreEqual(Certificate.CertificateType.User, cert.Type);
Assert.AreEqual("rsa-cert-rsa", cert.KeyId);
CollectionAssert.AreEqual(new string[] { "sshnet" }, cert.ValidPrincipals.ToList());
Assert.AreEqual(0, cert.CriticalOptions.Count);
Assert.IsTrue(cert.ValidAfter.EqualsExact(new DateTimeOffset(2024, 07, 17, 20, 50, 34, TimeSpan.Zero)));
Assert.AreEqual(ulong.MaxValue, cert.ValidBeforeUnixSeconds);
Assert.AreEqual(DateTimeOffset.MaxValue, cert.ValidBefore);
CollectionAssert.AreEqual(new Dictionary
{
["permit-X11-forwarding"] = "",
["permit-agent-forwarding"] = "",
["permit-port-forwarding"] = "",
["permit-pty"] = "",
["permit-user-rc"] = "",
}, new Dictionary(cert.Extensions));
Assert.AreEqual("NqLEgdYti0XjUkYjGyQv2Ddy1O5v2NZDZFRtlfESLIA", cert.CertificateAuthorityKeyFingerPrint);
Assert.AreEqual(6, pkFile.HostKeyAlgorithms.Count);
var algorithms = pkFile.HostKeyAlgorithms.ToList();
Assert.AreEqual("rsa-sha2-512-cert-v01@openssh.com", algorithms[0].Name);
Assert.AreEqual("rsa-sha2-256-cert-v01@openssh.com", algorithms[1].Name);
Assert.AreEqual("ssh-rsa-cert-v01@openssh.com", algorithms[2].Name);
Assert.AreEqual("ssh-rsa", algorithms[3].Name);
Assert.AreEqual("rsa-sha2-512", algorithms[4].Name);
Assert.AreEqual("rsa-sha2-256", algorithms[5].Name);
}
[TestMethod]
public void Test_CertificateKeyMismatch()
{
using (var privateKey = GetData("Key.OPENSSH.RSA.txt"))
using (var certificate = GetData("Key.OPENSSH.ECDSA521-cert.pub"))
{
Assert.ThrowsException(() => new PrivateKeyFile(privateKey, passPhrase: null, certificate));
}
}
[TestMethod]
public void Test_Certificate_OPENSSH_ECDSA()
{
PrivateKeyFile pkFile;
using (var privateKeyStream = GetData("Key.OPENSSH.ECDSA521.txt"))
using (var certificateStream = GetData("Key.OPENSSH.ECDSA521-cert.pub"))
{
pkFile = new PrivateKeyFile(privateKeyStream, passPhrase: null, certificateStream);
}
Certificate cert = pkFile.Certificate;
// ssh-keygen -L -f Key.OPENSSH.ECDSA521-cert.pub
Assert.AreEqual("ecdsa-sha2-nistp521-cert-v01@openssh.com", cert.Name);
Assert.IsInstanceOfType(cert.Key);
CollectionAssert.AreEqual(((EcdsaKey)pkFile.Key).Public, ((EcdsaKey)cert.Key).Public);
Assert.AreEqual(0UL, cert.Serial);
Assert.AreEqual(Certificate.CertificateType.User, cert.Type);
Assert.AreEqual("ecdsa521certEcdsa", cert.KeyId);
CollectionAssert.AreEqual(new string[] { "sshnet" }, cert.ValidPrincipals.ToList());
Assert.AreEqual(0, cert.CriticalOptions.Count);
Assert.AreEqual(0UL, cert.ValidAfterUnixSeconds);
Assert.IsTrue(cert.ValidAfter.EqualsExact(UnixEpoch));
Assert.AreEqual(ulong.MaxValue, cert.ValidBeforeUnixSeconds);
Assert.AreEqual(DateTimeOffset.MaxValue, cert.ValidBefore);
CollectionAssert.AreEqual(new Dictionary
{
["permit-X11-forwarding"] = "",
["permit-agent-forwarding"] = "",
["permit-port-forwarding"] = "",
["permit-pty"] = "",
["permit-user-rc"] = "",
}, new Dictionary(cert.Extensions));
Assert.AreEqual("r/t6I+bZQzN5BhSuntFSHDHlrnNHVM2lAo6gbvynG/4", cert.CertificateAuthorityKeyFingerPrint);
Assert.AreEqual(2, pkFile.HostKeyAlgorithms.Count);
var algorithms = pkFile.HostKeyAlgorithms.ToList();
Assert.AreEqual("ecdsa-sha2-nistp521-cert-v01@openssh.com", algorithms[0].Name);
Assert.AreEqual("ecdsa-sha2-nistp521", algorithms[1].Name);
}
[TestMethod]
public void Test_LowercaseSalt()
{
// Occurs occasionally in keys generated from older BouncyCastle versions
string pk = """
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-256-CBC,063de67ae11456c89bce9d4a21be3dfb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-----END RSA PRIVATE KEY-----
""";
using (var stream = new MemoryStream(Encoding.UTF8.GetBytes(pk)))
{
var pkFile = new PrivateKeyFile(stream, "12345");
TestRsaKeyFile(pkFile);
}
}
[TestMethod]
public void PuTTYv2_InvalidMac_ThrowsSshException()
{
string pk = """
PuTTY-User-Key-File-2: ssh-rsa
Encryption: none
Comment: Key.OPENSSH.RSA
Public-Lines: 6
AAAAB3NzaC1yc2EAAAADAQABAAABAQDtbs6KCLsePWaxraXweKYs/NqBWYT8Kx4w
oJHE8xO1ZO+hl0y3uF+S2FYDuHbRruhJJ4fa3sWp46lU0YVi9FXcFVawpkkxFx0m
JMJkCMffytiT3Re9neYqso3/d9xCyHg6I+dapPodKqDXiiJXxQ+1TCcTrmyRZLG/
G34QuVWkKobm8TY78Y0MpATsXNi3q9CKEwVIAEGqO9q7SaNfTTYpiIIyvq+CXxdi
QMDifn4nJBJDHOed+sv3dmhqq6NE/ZtPlSFeBvOvwcXC6pAa9REQJlNMjwGK//q0
4if3HaERo3q/EMu1dz30TZ3o1bpx2uLBoYUniOBVYMTmZTTTpd09
Private-Lines: 14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Private-MAC: 7f487d19cb5d03257c9b9a2aaaaaaaaaaaaaaaaa
""";
using (var stream = new MemoryStream(Encoding.UTF8.GetBytes(pk)))
{
var ex = Assert.ThrowsException(() => new PrivateKeyFile(stream));
Assert.AreEqual("MAC verification failed for PuTTY key file", ex.Message);
}
}
[TestMethod]
public void PuTTYv3_InvalidMac_ThrowsSshException()
{
string pk = """
PuTTY-User-Key-File-3: ssh-rsa
Encryption: none
Comment: Key.OPENSSH.RSA
Public-Lines: 6
AAAAB3NzaC1yc2EAAAADAQABAAABAQDtbs6KCLsePWaxraXweKYs/NqBWYT8Kx4w
oJHE8xO1ZO+hl0y3uF+S2FYDuHbRruhJJ4fa3sWp46lU0YVi9FXcFVawpkkxFx0m
JMJkCMffytiT3Re9neYqso3/d9xCyHg6I+dapPodKqDXiiJXxQ+1TCcTrmyRZLG/
G34QuVWkKobm8TY78Y0MpATsXNi3q9CKEwVIAEGqO9q7SaNfTTYpiIIyvq+CXxdi
QMDifn4nJBJDHOed+sv3dmhqq6NE/ZtPlSFeBvOvwcXC6pAa9REQJlNMjwGK//q0
4if3HaERo3q/EMu1dz30TZ3o1bpx2uLBoYUniOBVYMTmZTTTpd09
Private-Lines: 14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Private-MAC: ef76b1cf66a4a28d6fe08c70012c4bfa61771502e496d227dddddddddddddddd
""";
using (var stream = new MemoryStream(Encoding.UTF8.GetBytes(pk)))
{
var ex = Assert.ThrowsException(() => new PrivateKeyFile(stream));
Assert.AreEqual("MAC verification failed for PuTTY key file", ex.Message);
}
}
private void SaveStreamToFile(Stream stream, string fileName)
{
var buffer = new byte[4000];
using (var fs = new FileStream(fileName, FileMode.Create, FileAccess.Write))
{
var bytesRead = stream.Read(buffer, 0, buffer.Length);
while (bytesRead > 0)
{
fs.Write(buffer, 0, bytesRead);
bytesRead = stream.Read(buffer, 0, buffer.Length);
}
}
}
private string GetTempFileName()
{
var tempFile = Path.GetTempFileName();
File.Delete(tempFile);
return tempFile;
}
private static void TestRsaKeyFile(PrivateKeyFile rsaPrivateKeyFile)
{
Assert.IsInstanceOfType(rsaPrivateKeyFile.Key);
Assert.IsNotNull(rsaPrivateKeyFile.HostKeyAlgorithms);
Assert.AreEqual(3, rsaPrivateKeyFile.HostKeyAlgorithms.Count);
var algorithms = rsaPrivateKeyFile.HostKeyAlgorithms.ToList();
// ssh-rsa should be attempted first during authentication by default.
// See https://github.com/sshnet/SSH.NET/issues/1233#issuecomment-1871196405
Assert.AreEqual("ssh-rsa", algorithms[0].Name);
Assert.AreEqual("rsa-sha2-512", algorithms[1].Name);
Assert.AreEqual("rsa-sha2-256", algorithms[2].Name);
}
}
}