diff --git a/acme/acme_test.go b/acme/acme_test.go index 3f6e2748f3..a0906708c9 100644 --- a/acme/acme_test.go +++ b/acme/acme_test.go @@ -757,7 +757,7 @@ func TestTLSALPN01ChallengeCert(t *testing.T) { } func TestTLSChallengeCertOpt(t *testing.T) { - key, err := rsa.GenerateKey(rand.Reader, 512) + key, err := rsa.GenerateKey(rand.Reader, 1024) if err != nil { t.Fatal(err) } diff --git a/acme/autocert/autocert_test.go b/acme/autocert/autocert_test.go index 725677574b..269bc2a6c2 100644 --- a/acme/autocert/autocert_test.go +++ b/acme/autocert/autocert_test.go @@ -619,7 +619,7 @@ func TestCache(t *testing.T) { PrivateKey: ecdsaKey, } - rsaKey, err := rsa.GenerateKey(rand.Reader, 512) + rsaKey, err := rsa.GenerateKey(rand.Reader, 1024) if err != nil { t.Fatal(err) } @@ -694,7 +694,7 @@ func TestValidCert(t *testing.T) { if err != nil { t.Fatal(err) } - key3, err := rsa.GenerateKey(rand.Reader, 512) + key3, err := rsa.GenerateKey(rand.Reader, 1024) if err != nil { t.Fatal(err) } diff --git a/ssh/certs_test.go b/ssh/certs_test.go index 66000f19a2..6208bb37a9 100644 --- a/ssh/certs_test.go +++ b/ssh/certs_test.go @@ -15,14 +15,12 @@ import ( "reflect" "testing" "time" -) -// Cert generated by ssh-keygen 6.0p1 Debian-4. -// % ssh-keygen -s ca-key -I test user-key -const exampleSSHCert = `ssh-rsa-cert-v01@openssh.com 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` + "golang.org/x/crypto/ssh/testdata" +) func TestParseCert(t *testing.T) { - authKeyBytes := []byte(exampleSSHCert) + authKeyBytes := bytes.TrimSuffix(testdata.SSHCertificates["rsa"], []byte(" host.example.com\n")) key, _, _, rest, err := ParseAuthorizedKey(authKeyBytes) if err != nil { @@ -103,7 +101,7 @@ func TestParseCertWithOptions(t *testing.T) { } func TestValidateCert(t *testing.T) { - key, _, _, _, err := ParseAuthorizedKey([]byte(exampleSSHCert)) + key, _, _, _, err := ParseAuthorizedKey(testdata.SSHCertificates["rsa-user-testcertificate"]) if err != nil { t.Fatalf("ParseAuthorizedKey: %v", err) } @@ -116,7 +114,7 @@ func TestValidateCert(t *testing.T) { return bytes.Equal(k.Marshal(), validCert.SignatureKey.Marshal()) } - if err := checker.CheckCert("user", validCert); err != nil { + if err := checker.CheckCert("testcertificate", validCert); err != nil { t.Errorf("Unable to validate certificate: %v", err) } invalidCert := &Certificate{ @@ -125,7 +123,7 @@ func TestValidateCert(t *testing.T) { ValidBefore: CertTimeInfinity, Signature: &Signature{}, } - if err := checker.CheckCert("user", invalidCert); err == nil { + if err := checker.CheckCert("testcertificate", invalidCert); err == nil { t.Error("Invalid cert signature passed validation") } }