PrivateKeyFileTest.cs 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657
  1. using System;
  2. using System.Collections.Generic;
  3. using System.IO;
  4. using System.Linq;
  5. using System.Text;
  6. using Microsoft.VisualStudio.TestTools.UnitTesting;
  7. using Renci.SshNet.Common;
  8. using Renci.SshNet.Security;
  9. using Renci.SshNet.Tests.Common;
  10. namespace Renci.SshNet.Tests.Classes
  11. {
  12. /// <summary>
  13. /// old private key information/
  14. /// </summary>
  15. [TestClass]
  16. public class PrivateKeyFileTest : TestBase
  17. {
  18. #if NETFRAMEWORK
  19. private static readonly DateTimeOffset UnixEpoch = new(1970, 01, 01, 00, 00, 00, TimeSpan.Zero);
  20. #else
  21. private static readonly DateTimeOffset UnixEpoch = DateTimeOffset.UnixEpoch;
  22. #endif
  23. private string _temporaryFile;
  24. [TestInitialize]
  25. public void SetUp()
  26. {
  27. _temporaryFile = GetTempFileName();
  28. }
  29. [TestCleanup]
  30. public void TearDown()
  31. {
  32. if (_temporaryFile != null)
  33. {
  34. File.Delete(_temporaryFile);
  35. }
  36. }
  37. /// <summary>
  38. /// A test for <see cref="PrivateKeyFile(string)"/> ctor.
  39. ///</summary>
  40. [TestMethod]
  41. public void ConstructorWithFileNameShouldThrowArgumentNullExceptionWhenFileNameIsNull()
  42. {
  43. string fileName = null;
  44. try
  45. {
  46. _ = new PrivateKeyFile(fileName);
  47. Assert.Fail();
  48. }
  49. catch (ArgumentNullException ex)
  50. {
  51. Assert.IsNull(ex.InnerException);
  52. Assert.AreEqual("fileName", ex.ParamName);
  53. }
  54. }
  55. /// <summary>
  56. /// A test for <see cref="PrivateKeyFile(string, string)"/> ctor.
  57. ///</summary>
  58. [TestMethod]
  59. public void ConstructorWithFileNameAndPassphraseShouldThrowArgumentNullExceptionWhenFileNameIsNull()
  60. {
  61. string fileName = null;
  62. try
  63. {
  64. _ = new PrivateKeyFile(fileName, "12345");
  65. Assert.Fail();
  66. }
  67. catch (ArgumentNullException ex)
  68. {
  69. Assert.IsNull(ex.InnerException);
  70. Assert.AreEqual("fileName", ex.ParamName);
  71. }
  72. }
  73. [TestMethod]
  74. public void ConstructorWithPrivateKeyShouldThrowArgumentNullExceptionWhenPrivateKeyIsNull()
  75. {
  76. Stream privateKey = null;
  77. try
  78. {
  79. _ = new PrivateKeyFile(privateKey);
  80. Assert.Fail();
  81. }
  82. catch (ArgumentNullException ex)
  83. {
  84. Assert.IsNull(ex.InnerException);
  85. Assert.AreEqual("privateKey", ex.ParamName);
  86. }
  87. }
  88. [TestMethod]
  89. public void ConstructorWithPrivateKeyAndPassphraseShouldThrowArgumentNullExceptionWhenPrivateKeyIsNull()
  90. {
  91. Stream privateKey = null;
  92. try
  93. {
  94. _ = new PrivateKeyFile(privateKey, "12345");
  95. Assert.Fail();
  96. }
  97. catch (ArgumentNullException ex)
  98. {
  99. Assert.IsNull(ex.InnerException);
  100. Assert.AreEqual("privateKey", ex.ParamName);
  101. }
  102. }
  103. [TestMethod]
  104. public void ConstructorWithKeyShouldThrowArgumentNullExceptionWhenKeyIsNull()
  105. {
  106. Key key = null;
  107. try
  108. {
  109. _ = new PrivateKeyFile(key);
  110. Assert.Fail();
  111. }
  112. catch (ArgumentNullException ex)
  113. {
  114. Assert.IsNull(ex.InnerException);
  115. Assert.AreEqual("key", ex.ParamName);
  116. }
  117. }
  118. [TestMethod]
  119. public void Test_PrivateKey_SSH2_Encrypted_ShouldThrowSshExceptionWhenPassphraseIsWrong()
  120. {
  121. using (var stream = GetData("Key.SSH2.RSA.Encrypted.Des.CBC.12345.txt"))
  122. {
  123. try
  124. {
  125. _ = new PrivateKeyFile(stream, "34567");
  126. Assert.Fail();
  127. }
  128. catch (SshException ex)
  129. {
  130. Assert.IsInstanceOfType<SshException>(ex);
  131. Assert.IsNull(ex.InnerException);
  132. Assert.AreEqual("Invalid passphrase.", ex.Message);
  133. }
  134. }
  135. }
  136. [TestMethod]
  137. public void Test_PrivateKey_SSH2_Encrypted_ShouldThrowSshPassPhraseNullOrEmptyExceptionWhenPassphraseIsNull()
  138. {
  139. using (var stream = GetData("Key.SSH2.RSA.Encrypted.Des.CBC.12345.txt"))
  140. {
  141. try
  142. {
  143. _ = new PrivateKeyFile(stream, null);
  144. Assert.Fail();
  145. }
  146. catch (SshPassPhraseNullOrEmptyException ex)
  147. {
  148. Assert.IsInstanceOfType<SshPassPhraseNullOrEmptyException>(ex);
  149. Assert.IsNull(ex.InnerException);
  150. Assert.AreEqual("Private key is encrypted but passphrase is empty.", ex.Message);
  151. }
  152. }
  153. }
  154. [TestMethod]
  155. public void Test_PrivateKey_SSH2_Encrypted_ShouldThrowSshPassPhraseNullOrEmptyExceptionWhenPassphraseIsEmpty()
  156. {
  157. using (var stream = GetData("Key.SSH2.RSA.Encrypted.Des.CBC.12345.txt"))
  158. {
  159. try
  160. {
  161. _ = new PrivateKeyFile(stream, string.Empty);
  162. Assert.Fail();
  163. }
  164. catch (SshPassPhraseNullOrEmptyException ex)
  165. {
  166. Assert.IsInstanceOfType<SshPassPhraseNullOrEmptyException>(ex);
  167. Assert.IsNull(ex.InnerException);
  168. Assert.AreEqual("Private key is encrypted but passphrase is empty.", ex.Message);
  169. }
  170. }
  171. }
  172. /// <summary>
  173. ///A test for Dispose
  174. ///</summary>
  175. [TestMethod]
  176. public void DisposeTest()
  177. {
  178. using (var privateKeyStream = GetData("Key.RSA.txt"))
  179. {
  180. var target = new PrivateKeyFile(privateKeyStream);
  181. target.Dispose();
  182. }
  183. }
  184. /// <summary>
  185. /// A test for <see cref="PrivateKeyFile(string, string)"/> ctor.
  186. ///</summary>
  187. [TestMethod]
  188. public void ConstructorWithFileNameAndPassphrase()
  189. {
  190. using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
  191. {
  192. SaveStreamToFile(stream, _temporaryFile);
  193. }
  194. using (var fs = File.Open(_temporaryFile, FileMode.Open, FileAccess.Read, FileShare.Read))
  195. {
  196. var privateKeyFile = new PrivateKeyFile(_temporaryFile, "12345");
  197. TestRsaKeyFile(privateKeyFile);
  198. }
  199. }
  200. /// <summary>
  201. /// A test for <see cref="PrivateKeyFile(string, string)"/> ctor.
  202. ///</summary>
  203. [TestMethod]
  204. public void ConstructorWithFileNameAndPassphraseShouldThrowSshPassPhraseNullOrEmptyExceptionWhenNeededPassphraseIsEmpty()
  205. {
  206. var passphrase = string.Empty;
  207. using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
  208. {
  209. SaveStreamToFile(stream, _temporaryFile);
  210. }
  211. try
  212. {
  213. _ = new PrivateKeyFile(_temporaryFile, passphrase);
  214. Assert.Fail();
  215. }
  216. catch (SshPassPhraseNullOrEmptyException ex)
  217. {
  218. Assert.IsNull(ex.InnerException);
  219. Assert.AreEqual("Private key is encrypted but passphrase is empty.", ex.Message);
  220. }
  221. }
  222. /// <summary>
  223. /// A test for <see cref="PrivateKeyFile(string, string)"/> ctor.
  224. ///</summary>
  225. [TestMethod]
  226. public void ConstructorWithFileNameAndPassphraseShouldThrowSshPassPhraseNullOrEmptyExceptionWhenNeededPassphraseIsNull()
  227. {
  228. string passphrase = null;
  229. using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
  230. {
  231. SaveStreamToFile(stream, _temporaryFile);
  232. }
  233. try
  234. {
  235. _ = new PrivateKeyFile(_temporaryFile, passphrase);
  236. Assert.Fail();
  237. }
  238. catch (SshPassPhraseNullOrEmptyException ex)
  239. {
  240. Assert.IsNull(ex.InnerException);
  241. Assert.AreEqual("Private key is encrypted but passphrase is empty.", ex.Message);
  242. }
  243. }
  244. /// <summary>
  245. /// A test for <see cref="PrivateKeyFile(string)"/> ctor.
  246. ///</summary>
  247. [TestMethod]
  248. public void ConstructorWithFileName()
  249. {
  250. using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
  251. {
  252. SaveStreamToFile(stream, _temporaryFile);
  253. }
  254. var privateKeyFile = new PrivateKeyFile(_temporaryFile, "12345");
  255. TestRsaKeyFile(privateKeyFile);
  256. }
  257. [TestMethod]
  258. public void ConstructorWithFileNameShouldBeAbleToReadFileThatIsSharedForReadAccess()
  259. {
  260. using (var stream = GetData("Key.RSA.txt"))
  261. {
  262. SaveStreamToFile(stream, _temporaryFile);
  263. }
  264. using (var fs = File.Open(_temporaryFile, FileMode.Open, FileAccess.Read, FileShare.Read))
  265. {
  266. var privateKeyFile = new PrivateKeyFile(_temporaryFile);
  267. TestRsaKeyFile(privateKeyFile);
  268. }
  269. }
  270. [TestMethod]
  271. public void ConstructorWithFileNameAndPassPhraseShouldBeAbleToReadFileThatIsSharedForReadAccess()
  272. {
  273. using (var stream = GetData("Key.RSA.Encrypted.Aes.128.CBC.12345.txt"))
  274. {
  275. SaveStreamToFile(stream, _temporaryFile);
  276. }
  277. using (var fs = File.Open(_temporaryFile, FileMode.Open, FileAccess.Read, FileShare.Read))
  278. {
  279. var privateKeyFile = new PrivateKeyFile(_temporaryFile, "12345");
  280. TestRsaKeyFile(privateKeyFile);
  281. }
  282. }
  283. [TestMethod]
  284. [DataRow("Key.DSA.PKCS8.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(DsaKey))]
  285. [DataRow("Key.DSA.PKCS8.txt", null, typeof(DsaKey))]
  286. [DataRow("Key.DSA.txt", null, typeof(DsaKey))]
  287. [DataRow("Key.ECDSA.Encrypted.txt", "12345", typeof(EcdsaKey))]
  288. [DataRow("Key.ECDSA.PKCS8.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(EcdsaKey))]
  289. [DataRow("Key.ECDSA.PKCS8.txt", null, typeof(EcdsaKey))]
  290. [DataRow("Key.ECDSA.txt", null, typeof(EcdsaKey))]
  291. [DataRow("Key.ECDSA384.Encrypted.txt", "12345", typeof(EcdsaKey))]
  292. [DataRow("Key.ECDSA384.txt", null, typeof(EcdsaKey))]
  293. [DataRow("Key.ECDSA521.Encrypted.txt", "12345", typeof(EcdsaKey))]
  294. [DataRow("Key.ECDSA521.txt", null, typeof(EcdsaKey))]
  295. [DataRow("Key.OPENSSH.ECDSA.Encrypted.Aes.128.CTR.txt", "12345", typeof(EcdsaKey))]
  296. [DataRow("Key.OPENSSH.ECDSA.Encrypted.txt", "12345", typeof(EcdsaKey))]
  297. [DataRow("Key.OPENSSH.ECDSA.txt", null, typeof(EcdsaKey))]
  298. [DataRow("Key.OPENSSH.ECDSA384.Encrypted.Aes.256.GCM.txt", "12345", typeof(EcdsaKey))]
  299. [DataRow("Key.OPENSSH.ECDSA384.Encrypted.txt", "12345", typeof(EcdsaKey))]
  300. [DataRow("Key.OPENSSH.ECDSA384.txt", null, typeof(EcdsaKey))]
  301. [DataRow("Key.OPENSSH.ECDSA521.Encrypted.Aes.192.CBC.txt", "12345", typeof(EcdsaKey))]
  302. [DataRow("Key.OPENSSH.ECDSA521.Encrypted.txt", "12345", typeof(EcdsaKey))]
  303. [DataRow("Key.OPENSSH.ECDSA521.txt", null, typeof(EcdsaKey))]
  304. [DataRow("Key.OPENSSH.ED25519.Encrypted.3Des.CBC.txt", "12345", typeof(ED25519Key))]
  305. [DataRow("Key.OPENSSH.ED25519.Encrypted.Aes.128.CBC.txt", "12345", typeof(ED25519Key))]
  306. [DataRow("Key.OPENSSH.ED25519.Encrypted.Aes.128.GCM.txt", "12345", typeof(ED25519Key))]
  307. [DataRow("Key.OPENSSH.ED25519.Encrypted.Aes.256.CBC.txt", "12345", typeof(ED25519Key))]
  308. [DataRow("Key.OPENSSH.ED25519.Encrypted.Aes.256.CTR.txt", "12345", typeof(ED25519Key))]
  309. [DataRow("Key.OPENSSH.ED25519.Encrypted.ChaCha20.Poly1305.txt", "12345", typeof(ED25519Key))]
  310. [DataRow("Key.OPENSSH.ED25519.Encrypted.txt", "12345", typeof(ED25519Key))]
  311. [DataRow("Key.OPENSSH.ED25519.PKCS8.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(ED25519Key))]
  312. [DataRow("Key.OPENSSH.ED25519.PKCS8.txt", null, typeof(ED25519Key))]
  313. [DataRow("Key.OPENSSH.ED25519.txt", null, typeof(ED25519Key))]
  314. [DataRow("Key.OPENSSH.RSA.Encrypted.Aes.192.CTR.txt", "12345", typeof(RsaKey))]
  315. [DataRow("Key.OPENSSH.RSA.Encrypted.txt", "12345", typeof(RsaKey))]
  316. [DataRow("Key.OPENSSH.RSA.txt", null, typeof(RsaKey))]
  317. [DataRow("Key.PuTTY2.Ed25519.Encrypted.12345.ppk", "12345", typeof(ED25519Key))]
  318. [DataRow("Key.PuTTY2.Ed25519.ppk", null, typeof(ED25519Key))]
  319. [DataRow("Key.PuTTY2.RSA.Encrypted.12345.ppk", "12345", typeof(RsaKey))]
  320. [DataRow("Key.PuTTY2.RSA.ppk", null, typeof(RsaKey))]
  321. [DataRow("Key.PuTTY3.DSA.Encrypted.Argon2id.12345.ppk", "12345", typeof(DsaKey))]
  322. [DataRow("Key.PuTTY3.DSA.ppk", null, typeof(DsaKey))]
  323. [DataRow("Key.PuTTY3.ECDSA.Encrypted.Argon2id.12345.ppk", "12345", typeof(EcdsaKey))]
  324. [DataRow("Key.PuTTY3.ECDSA.ppk", null, typeof(EcdsaKey))]
  325. [DataRow("Key.PuTTY3.Ed25519.Encrypted.Argon2i.12345.ppk", "12345", typeof(ED25519Key))]
  326. [DataRow("Key.PuTTY3.Ed25519.Encrypted.Argon2d.12345.ppk", "12345", typeof(ED25519Key))]
  327. [DataRow("Key.PuTTY3.Ed25519.Encrypted.Argon2id.12345.ppk", "12345", typeof(ED25519Key))]
  328. [DataRow("Key.PuTTY3.Ed25519.ppk", null, typeof(ED25519Key))]
  329. [DataRow("Key.PuTTY3.RSA.Encrypted.Argon2id.12345.ppk", "12345", typeof(RsaKey))]
  330. [DataRow("Key.PuTTY3.RSA.ppk", null, typeof(RsaKey))]
  331. [DataRow("Key.RSA.Encrypted.Aes.128.CBC.12345.txt", "12345", typeof(RsaKey))]
  332. [DataRow("Key.RSA.Encrypted.Aes.192.CBC.12345.txt", "12345", typeof(RsaKey))]
  333. [DataRow("Key.RSA.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(RsaKey))]
  334. [DataRow("Key.RSA.Encrypted.Des.CBC.12345.txt", "12345", typeof(RsaKey))]
  335. [DataRow("Key.RSA.Encrypted.Des.Ede3.CBC.12345.txt", "12345", typeof(RsaKey))]
  336. [DataRow("Key.RSA.Encrypted.Des.Ede3.CFB.1234567890.txt", "1234567890", typeof(RsaKey))]
  337. [DataRow("Key.RSA.PKCS8.Encrypted.Aes.256.CBC.12345.txt", "12345", typeof(RsaKey))]
  338. [DataRow("Key.RSA.PKCS8.txt", null, typeof(RsaKey))]
  339. [DataRow("Key.RSA.txt", null, typeof(RsaKey))]
  340. [DataRow("Key.SSH2.DSA.Encrypted.Des.CBC.12345.txt", "12345", typeof(DsaKey))]
  341. [DataRow("Key.SSH2.DSA.txt", null, typeof(DsaKey))]
  342. [DataRow("Key.SSH2.RSA.Encrypted.Des.CBC.12345.txt", "12345", typeof(RsaKey))]
  343. [DataRow("Key.SSH2.RSA.txt", null, typeof(RsaKey))]
  344. public void Test_PrivateKey(string name, string passPhrase, Type expectedKeyType)
  345. {
  346. using (var stream = GetData(name))
  347. {
  348. var pkFile = new PrivateKeyFile(stream, passPhrase);
  349. Assert.IsInstanceOfType(pkFile.Key, expectedKeyType);
  350. if (expectedKeyType == typeof(RsaKey))
  351. {
  352. TestRsaKeyFile(pkFile);
  353. }
  354. }
  355. }
  356. [TestMethod]
  357. public void Test_Certificate_OPENSSH_RSA()
  358. {
  359. PrivateKeyFile pkFile;
  360. using (var privateKeyStream = GetData("Key.OPENSSH.RSA.txt"))
  361. using (var certificateStream = GetData("Key.OPENSSH.RSA-cert.pub"))
  362. {
  363. pkFile = new PrivateKeyFile(privateKeyStream, passPhrase: null, certificateStream);
  364. }
  365. Certificate cert = pkFile.Certificate;
  366. // ssh-keygen -L -f Key.OPENSSH.RSA-cert.pub
  367. Assert.AreEqual("ssh-rsa-cert-v01@openssh.com", cert.Name);
  368. Assert.IsInstanceOfType<RsaKey>(cert.Key);
  369. CollectionAssert.AreEqual(((RsaKey)pkFile.Key).Public, ((RsaKey)cert.Key).Public);
  370. Assert.AreEqual(0UL, cert.Serial);
  371. Assert.AreEqual(Certificate.CertificateType.User, cert.Type);
  372. Assert.AreEqual("rsa-cert-rsa", cert.KeyId);
  373. CollectionAssert.AreEqual(new string[] { "sshnet" }, cert.ValidPrincipals.ToList());
  374. Assert.AreEqual(0, cert.CriticalOptions.Count);
  375. Assert.IsTrue(cert.ValidAfter.EqualsExact(new DateTimeOffset(2024, 07, 17, 20, 50, 34, TimeSpan.Zero)));
  376. Assert.AreEqual(ulong.MaxValue, cert.ValidBeforeUnixSeconds);
  377. Assert.AreEqual(DateTimeOffset.MaxValue, cert.ValidBefore);
  378. CollectionAssert.AreEqual(new Dictionary<string, string>
  379. {
  380. ["permit-X11-forwarding"] = "",
  381. ["permit-agent-forwarding"] = "",
  382. ["permit-port-forwarding"] = "",
  383. ["permit-pty"] = "",
  384. ["permit-user-rc"] = "",
  385. }, new Dictionary<string, string>(cert.Extensions));
  386. Assert.AreEqual("NqLEgdYti0XjUkYjGyQv2Ddy1O5v2NZDZFRtlfESLIA", cert.CertificateAuthorityKeyFingerPrint);
  387. Assert.AreEqual(6, pkFile.HostKeyAlgorithms.Count);
  388. var algorithms = pkFile.HostKeyAlgorithms.ToList();
  389. Assert.AreEqual("rsa-sha2-512-cert-v01@openssh.com", algorithms[0].Name);
  390. Assert.AreEqual("rsa-sha2-256-cert-v01@openssh.com", algorithms[1].Name);
  391. Assert.AreEqual("ssh-rsa-cert-v01@openssh.com", algorithms[2].Name);
  392. Assert.AreEqual("ssh-rsa", algorithms[3].Name);
  393. Assert.AreEqual("rsa-sha2-512", algorithms[4].Name);
  394. Assert.AreEqual("rsa-sha2-256", algorithms[5].Name);
  395. }
  396. [TestMethod]
  397. public void Test_CertificateKeyMismatch()
  398. {
  399. using (var privateKey = GetData("Key.OPENSSH.RSA.txt"))
  400. using (var certificate = GetData("Key.OPENSSH.ECDSA521-cert.pub"))
  401. {
  402. Assert.ThrowsException<ArgumentException>(() => new PrivateKeyFile(privateKey, passPhrase: null, certificate));
  403. }
  404. }
  405. [TestMethod]
  406. public void Test_Certificate_OPENSSH_ECDSA()
  407. {
  408. PrivateKeyFile pkFile;
  409. using (var privateKeyStream = GetData("Key.OPENSSH.ECDSA521.txt"))
  410. using (var certificateStream = GetData("Key.OPENSSH.ECDSA521-cert.pub"))
  411. {
  412. pkFile = new PrivateKeyFile(privateKeyStream, passPhrase: null, certificateStream);
  413. }
  414. Certificate cert = pkFile.Certificate;
  415. // ssh-keygen -L -f Key.OPENSSH.ECDSA521-cert.pub
  416. Assert.AreEqual("ecdsa-sha2-nistp521-cert-v01@openssh.com", cert.Name);
  417. Assert.IsInstanceOfType<EcdsaKey>(cert.Key);
  418. CollectionAssert.AreEqual(((EcdsaKey)pkFile.Key).Public, ((EcdsaKey)cert.Key).Public);
  419. Assert.AreEqual(0UL, cert.Serial);
  420. Assert.AreEqual(Certificate.CertificateType.User, cert.Type);
  421. Assert.AreEqual("ecdsa521certEcdsa", cert.KeyId);
  422. CollectionAssert.AreEqual(new string[] { "sshnet" }, cert.ValidPrincipals.ToList());
  423. Assert.AreEqual(0, cert.CriticalOptions.Count);
  424. Assert.AreEqual(0UL, cert.ValidAfterUnixSeconds);
  425. Assert.IsTrue(cert.ValidAfter.EqualsExact(UnixEpoch));
  426. Assert.AreEqual(ulong.MaxValue, cert.ValidBeforeUnixSeconds);
  427. Assert.AreEqual(DateTimeOffset.MaxValue, cert.ValidBefore);
  428. CollectionAssert.AreEqual(new Dictionary<string, string>
  429. {
  430. ["permit-X11-forwarding"] = "",
  431. ["permit-agent-forwarding"] = "",
  432. ["permit-port-forwarding"] = "",
  433. ["permit-pty"] = "",
  434. ["permit-user-rc"] = "",
  435. }, new Dictionary<string, string>(cert.Extensions));
  436. Assert.AreEqual("r/t6I+bZQzN5BhSuntFSHDHlrnNHVM2lAo6gbvynG/4", cert.CertificateAuthorityKeyFingerPrint);
  437. Assert.AreEqual(2, pkFile.HostKeyAlgorithms.Count);
  438. var algorithms = pkFile.HostKeyAlgorithms.ToList();
  439. Assert.AreEqual("ecdsa-sha2-nistp521-cert-v01@openssh.com", algorithms[0].Name);
  440. Assert.AreEqual("ecdsa-sha2-nistp521", algorithms[1].Name);
  441. }
  442. [TestMethod]
  443. public void Test_LowercaseSalt()
  444. {
  445. // Occurs occasionally in keys generated from older BouncyCastle versions
  446. string pk = """
  447. -----BEGIN RSA PRIVATE KEY-----
  448. Proc-Type: 4,ENCRYPTED
  449. DEK-Info: AES-256-CBC,063de67ae11456c89bce9d4a21be3dfb
  450. 6mS1GhCjAg5mEwMFcKRJwg1uxCeY3ekJNCQewIN9NSI5A8prBOQ+JSyWAsn6c3Gw
  451. OeRyur+5dxMFdt5Hz1CBi9EePvhVyMry7U5U86BWB0HgtDAD02b324sfc6Wk+kj5
  452. PZvuKyXDiqdwy0rsbBUT+bLtXjCI4Ws1k/KbbF0OqGhFJJvErNU5x8zMD9mqp92R
  453. D8ZZ/F8Sks3V/JeUisAF86sgMfVCELJobn5Zq/IaUyzQwC6IEL+Sy5fSBB5NHiex
  454. NDIJg2RW79uLbufCpuoMPS/GKydf4dq0L5MwvKeqtUgf9Wddc+ZAE4+q1Xz/T8iN
  455. 3IMqsQfVbYjVK7uTaVGKH+Ew77Qryj01Vg+zyzdf4UwOV3XXQKLVCjNxpMCVtoq7
  456. S45M3Ad7598vb7ooa/BFCIcEM8TkuzPnuttLqjzXEzUcA5kqm3kV14IKtlexBfNT
  457. tarbidlZcOinvJaoIT3baP4rVnEWDKcxpc+UzNU5RRty6l0zpRmw/9RQ5+FKreh8
  458. eXDHD8TT8ArdaREFM8J2OGpkmIK5sLhhYi9gnTopmKIHn8OAXusmQosEOzS6kGxk
  459. aFtZezXSCBGgXp5RsrBGGx3oXWHGuWbEFXAq+M7PKXMQe5rLRv6sQdfTFSB5hgNK
  460. 82P8UzV1wWtAX4JYAhRh2zA8agY2arbNvbjRyjSbp9HNVBgSbVQ60JInesOqLxEg
  461. XURuCYp4F8AeHzyO805MTNpcX7PZT2kOxp9sKKABJ9BJ0RoSWa0LJqXzGCHvrExE
  462. g7XY/ZfDFZlPLbQnrOgVlYh7pzyfyKB74/oXHkonAisRfsgnQ87yT2DmcHNP6Cek
  463. eae2nrpx2yn9Bf8rYdpmJgNxduO8IZvpn84xEyPqK+FbQsdOefBvsg5TgfzETkh/
  464. SJjzbqCTDa3XHEUCInixo/wT7FxT8KR9vk43FGPNVRUvPB2GNxe9ZwLYIir64hcQ
  465. CpdA3ipVx4/jVzWQH8KXG9UP9TDAKXEvbndLnr2taPnUdAnznwHN2EkfzS/PrFG4
  466. /j3l1+VY2AyRybbCTI2iuwJPnKdxOR5oWW6I2Ksfq93Oy+NQz/zasjyNpCZBZWds
  467. 5gBmwiNk2Xzq7ikEVtVk3osOQRw/u9GbretfaT9jtClALL3DFbOzL4WxA+0NJqpd
  468. NB2MohOJa1BJjdfh6x6EVhugH85Y9uYyz/MQj7piljAJY96190n3Q86b/7phfwuD
  469. A/ixS42nqpyOPO+EjiWFerFVTJ3iBj7GXXOZGwCrZfpTbqE7OdTDnE3Vr4MO/Etq
  470. kSDmJ/+4SFFh80YwYVERDNFdDxCYxx5AnxaBFwbqjzatTV/btgGVabIf6zm2L6aY
  471. BJ5wnBZnRnsRaIMehDQmTjioMcyHBSMqId+LYQp+KFpBXqXQTEjJPnq+t4o2FF/N
  472. 8yoKR8BX6HXSO5qUndI8emwec1JeveiRai6SDnEz1EFfetYXImR290mlqt0aRjQk
  473. t/HXRv+fmDQk5hJbCPICydcVSRyrbzxKkppVceEf9NwkBT1MBsOZIFJ3s3A9I72n
  474. XPIab5czlgSLYA/U9nEg2XU21hKD2kRH1OF0WSlpNhN2SJFViVqlC3v36MgHoWNh
  475. -----END RSA PRIVATE KEY-----
  476. """;
  477. using (var stream = new MemoryStream(Encoding.UTF8.GetBytes(pk)))
  478. {
  479. var pkFile = new PrivateKeyFile(stream, "12345");
  480. TestRsaKeyFile(pkFile);
  481. }
  482. }
  483. [TestMethod]
  484. public void PuTTYv2_InvalidMac_ThrowsSshException()
  485. {
  486. string pk = """
  487. PuTTY-User-Key-File-2: ssh-rsa
  488. Encryption: none
  489. Comment: Key.OPENSSH.RSA
  490. Public-Lines: 6
  491. AAAAB3NzaC1yc2EAAAADAQABAAABAQDtbs6KCLsePWaxraXweKYs/NqBWYT8Kx4w
  492. oJHE8xO1ZO+hl0y3uF+S2FYDuHbRruhJJ4fa3sWp46lU0YVi9FXcFVawpkkxFx0m
  493. JMJkCMffytiT3Re9neYqso3/d9xCyHg6I+dapPodKqDXiiJXxQ+1TCcTrmyRZLG/
  494. G34QuVWkKobm8TY78Y0MpATsXNi3q9CKEwVIAEGqO9q7SaNfTTYpiIIyvq+CXxdi
  495. QMDifn4nJBJDHOed+sv3dmhqq6NE/ZtPlSFeBvOvwcXC6pAa9REQJlNMjwGK//q0
  496. 4if3HaERo3q/EMu1dz30TZ3o1bpx2uLBoYUniOBVYMTmZTTTpd09
  497. Private-Lines: 14
  498. AAABAQDpeCr6CmnM632eu2zPkCN/W0eVJ6yftdpi4JFWA9veY5lK4RbcFR1NrRKv
  499. Z+TWfNIGlSt+qc3eJ3IraDdsPWxsFEOBQpH4Bo1wI3dOnF/GDJV4mFAu8SQR2i/N
  500. BFR/CtdF/GYTeOREZ9Vu/HKWsbynfnFyZfJ16XjqvaLx2PyAhje0qnREy9nhmU1u
  501. FYc93k7HIdYv17eBs5LIjKNCBMpl7OHMStL9f8on9dirPIECo2pnZGDWQqIdGUdL
  502. ooQja3IXBh+H5Fvov3FyHVKo61CFNaKubFLbl2kYPaOBqVd7KLDw+a6pOJYKpSZQ
  503. zHox0Xe0WyKuvngrhAD2Sox5pEu1AAAAgQD+dPDqesFjwMJ9SXwWbqkLY3H5yXje
  504. DZGEAXcm59L1buVHcqkkC2vIZQM0ToQPqib65bGYDPYfAsi08ropvJYpGR6HMDtd
  505. 8wU3VWkPHNpSb39rl0yFzWR7HkuyE5HwYjtYUgeM/EQ5Dq9+Zhn3W8iSBQMBWReF
  506. 7PFp0BfrxxGnawAAAIEA7t9vXgsFRX/YNMzR32bt9adFrRK3LEb+e36vlKD7aL/J
  507. 8VBe9aDlnuSkhpxrTCAiN9ZAbT4VG73zprqja4CQY4I2z0JotMUgBOS90LhCkTY5
  508. WhN/1mnSgcM4SQ7WrrmJNYn5K3QFaeu18kOabsrhoFWkATT268QPYNSG8ni+P/cA
  509. AACBALFEE9FIau5dLoE3eGPfPWx+nltH6Jdtf5uwec5CUHqTWnVD07NfPLr7+Ip1
  510. vJ9jt0Qmp11h2XwidQLEfzBBFtgukA7b6ilx2831kJQmElcQdewo1ESmvHzWiAJP
  511. fM4JjTcDudzQZXsq1IT4L5t8bewAoKc12OUcDSS/P2tFjpoM
  512. Private-MAC: 7f487d19cb5d03257c9b9a2aaaaaaaaaaaaaaaaa
  513. """;
  514. using (var stream = new MemoryStream(Encoding.UTF8.GetBytes(pk)))
  515. {
  516. var ex = Assert.ThrowsException<SshException>(() => new PrivateKeyFile(stream));
  517. Assert.AreEqual("MAC verification failed for PuTTY key file", ex.Message);
  518. }
  519. }
  520. [TestMethod]
  521. public void PuTTYv3_InvalidMac_ThrowsSshException()
  522. {
  523. string pk = """
  524. PuTTY-User-Key-File-3: ssh-rsa
  525. Encryption: none
  526. Comment: Key.OPENSSH.RSA
  527. Public-Lines: 6
  528. AAAAB3NzaC1yc2EAAAADAQABAAABAQDtbs6KCLsePWaxraXweKYs/NqBWYT8Kx4w
  529. oJHE8xO1ZO+hl0y3uF+S2FYDuHbRruhJJ4fa3sWp46lU0YVi9FXcFVawpkkxFx0m
  530. JMJkCMffytiT3Re9neYqso3/d9xCyHg6I+dapPodKqDXiiJXxQ+1TCcTrmyRZLG/
  531. G34QuVWkKobm8TY78Y0MpATsXNi3q9CKEwVIAEGqO9q7SaNfTTYpiIIyvq+CXxdi
  532. QMDifn4nJBJDHOed+sv3dmhqq6NE/ZtPlSFeBvOvwcXC6pAa9REQJlNMjwGK//q0
  533. 4if3HaERo3q/EMu1dz30TZ3o1bpx2uLBoYUniOBVYMTmZTTTpd09
  534. Private-Lines: 14
  535. AAABAQDpeCr6CmnM632eu2zPkCN/W0eVJ6yftdpi4JFWA9veY5lK4RbcFR1NrRKv
  536. Z+TWfNIGlSt+qc3eJ3IraDdsPWxsFEOBQpH4Bo1wI3dOnF/GDJV4mFAu8SQR2i/N
  537. BFR/CtdF/GYTeOREZ9Vu/HKWsbynfnFyZfJ16XjqvaLx2PyAhje0qnREy9nhmU1u
  538. FYc93k7HIdYv17eBs5LIjKNCBMpl7OHMStL9f8on9dirPIECo2pnZGDWQqIdGUdL
  539. ooQja3IXBh+H5Fvov3FyHVKo61CFNaKubFLbl2kYPaOBqVd7KLDw+a6pOJYKpSZQ
  540. zHox0Xe0WyKuvngrhAD2Sox5pEu1AAAAgQD+dPDqesFjwMJ9SXwWbqkLY3H5yXje
  541. DZGEAXcm59L1buVHcqkkC2vIZQM0ToQPqib65bGYDPYfAsi08ropvJYpGR6HMDtd
  542. 8wU3VWkPHNpSb39rl0yFzWR7HkuyE5HwYjtYUgeM/EQ5Dq9+Zhn3W8iSBQMBWReF
  543. 7PFp0BfrxxGnawAAAIEA7t9vXgsFRX/YNMzR32bt9adFrRK3LEb+e36vlKD7aL/J
  544. 8VBe9aDlnuSkhpxrTCAiN9ZAbT4VG73zprqja4CQY4I2z0JotMUgBOS90LhCkTY5
  545. WhN/1mnSgcM4SQ7WrrmJNYn5K3QFaeu18kOabsrhoFWkATT268QPYNSG8ni+P/cA
  546. AACBALFEE9FIau5dLoE3eGPfPWx+nltH6Jdtf5uwec5CUHqTWnVD07NfPLr7+Ip1
  547. vJ9jt0Qmp11h2XwidQLEfzBBFtgukA7b6ilx2831kJQmElcQdewo1ESmvHzWiAJP
  548. fM4JjTcDudzQZXsq1IT4L5t8bewAoKc12OUcDSS/P2tFjpoM
  549. Private-MAC: ef76b1cf66a4a28d6fe08c70012c4bfa61771502e496d227dddddddddddddddd
  550. """;
  551. using (var stream = new MemoryStream(Encoding.UTF8.GetBytes(pk)))
  552. {
  553. var ex = Assert.ThrowsException<SshException>(() => new PrivateKeyFile(stream));
  554. Assert.AreEqual("MAC verification failed for PuTTY key file", ex.Message);
  555. }
  556. }
  557. private void SaveStreamToFile(Stream stream, string fileName)
  558. {
  559. var buffer = new byte[4000];
  560. using (var fs = new FileStream(fileName, FileMode.Create, FileAccess.Write))
  561. {
  562. var bytesRead = stream.Read(buffer, 0, buffer.Length);
  563. while (bytesRead > 0)
  564. {
  565. fs.Write(buffer, 0, bytesRead);
  566. bytesRead = stream.Read(buffer, 0, buffer.Length);
  567. }
  568. }
  569. }
  570. private string GetTempFileName()
  571. {
  572. var tempFile = Path.GetTempFileName();
  573. File.Delete(tempFile);
  574. return tempFile;
  575. }
  576. private static void TestRsaKeyFile(PrivateKeyFile rsaPrivateKeyFile)
  577. {
  578. Assert.IsInstanceOfType<RsaKey>(rsaPrivateKeyFile.Key);
  579. Assert.IsNotNull(rsaPrivateKeyFile.HostKeyAlgorithms);
  580. Assert.AreEqual(3, rsaPrivateKeyFile.HostKeyAlgorithms.Count);
  581. var algorithms = rsaPrivateKeyFile.HostKeyAlgorithms.ToList();
  582. // ssh-rsa should be attempted first during authentication by default.
  583. // See https://github.com/sshnet/SSH.NET/issues/1233#issuecomment-1871196405
  584. Assert.AreEqual("ssh-rsa", algorithms[0].Name);
  585. Assert.AreEqual("rsa-sha2-512", algorithms[1].Name);
  586. Assert.AreEqual("rsa-sha2-256", algorithms[2].Name);
  587. }
  588. }
  589. }