|
Packit |
6c0a39 |
/*
|
|
Packit |
6c0a39 |
* This file is part of the SSH Library
|
|
Packit |
6c0a39 |
*
|
|
Packit |
6c0a39 |
* Copyright (c) 2018 by Andreas Schneider
|
|
Packit |
6c0a39 |
*
|
|
Packit |
6c0a39 |
* The SSH Library is free software; you can redistribute it and/or modify
|
|
Packit |
6c0a39 |
* it under the terms of the GNU Lesser General Public License as published by
|
|
Packit |
6c0a39 |
* the Free Software Foundation; either version 2.1 of the License, or (at your
|
|
Packit |
6c0a39 |
* option) any later version.
|
|
Packit |
6c0a39 |
*
|
|
Packit |
6c0a39 |
* The SSH Library is distributed in the hope that it will be useful, but
|
|
Packit |
6c0a39 |
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
Packit |
6c0a39 |
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
Packit |
6c0a39 |
* License for more details.
|
|
Packit |
6c0a39 |
*
|
|
Packit |
6c0a39 |
* You should have received a copy of the GNU Lesser General Public License
|
|
Packit |
6c0a39 |
* along with the SSH Library; see the file COPYING. If not, write to
|
|
Packit |
6c0a39 |
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
|
|
Packit |
6c0a39 |
* MA 02111-1307, USA.
|
|
Packit |
6c0a39 |
*/
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
#include "config.h"
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
#define LIBSSH_STATIC
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
#include "torture.h"
|
|
Packit |
6c0a39 |
#include "torture_key.h"
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
#include <sys/types.h>
|
|
Packit |
6c0a39 |
#include <pwd.h>
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
#include "knownhosts.c"
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
#define TORTURE_KNOWN_HOSTS_FILE "libssh_torture_knownhosts"
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
#define BAD_RSA "AAAAB3NzaC1yc2EAAAADAQABAAABAQDXvXuawzaArEwkLIXTz/EWywLOCtqQL3P9yKkrhz6AplXP2PhOh5pyxa1VfGKe453jNeYBJ0ROto3BshXgZXbo86oLXTkbe0gO5xi3r5WjXxjOFvRRTLot5fPLNDOv9+TnsPmkNn0iIeyPnfrcPIyjWt5zSWUfkNC8oNHxsiSshjpbJvTXSDipukpUy41d7jg4uWGuonMTF7yu7HfuHqq7lhb0WlwSpfbqAbfYARBddcdcARyhix4RMWZZqVY20H3Vsjq8bjKC+NJXFce1PRg+qcOWQdlXEei4dkzAvHvfQRx1TjzkrBZ6B6thmZtyeb9IsiB0tg2g0JN2VTAGkxqp"
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static int sshd_group_setup(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
torture_setup_sshd_server(state, false);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
return 0;
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static int sshd_group_teardown(void **state) {
|
|
Packit |
6c0a39 |
torture_teardown_sshd_server(state);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
return 0;
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static int session_setup(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
struct torture_state *s = *state;
|
|
Packit |
6c0a39 |
int verbosity = torture_libssh_verbosity();
|
|
Packit |
6c0a39 |
struct passwd *pwd;
|
|
Packit |
6c0a39 |
int rc;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
pwd = getpwnam("bob");
|
|
Packit |
6c0a39 |
assert_non_null(pwd);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = setuid(pwd->pw_uid);
|
|
Packit |
6c0a39 |
assert_return_code(rc, errno);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
s->ssh.session = ssh_new();
|
|
Packit |
6c0a39 |
assert_non_null(s->ssh.session);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(s->ssh.session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(s->ssh.session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(s->ssh.session,
|
|
Packit |
6c0a39 |
SSH_OPTIONS_USER,
|
|
Packit |
6c0a39 |
TORTURE_SSH_USER_ALICE);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(s->ssh.session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
return 0;
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static int session_teardown(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
struct torture_state *s = *state;
|
|
Packit |
6c0a39 |
char known_hosts_file[1024];
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
snprintf(known_hosts_file,
|
|
Packit |
6c0a39 |
sizeof(known_hosts_file),
|
|
Packit |
6c0a39 |
"%s/%s",
|
|
Packit |
6c0a39 |
s->socket_dir,
|
|
Packit |
6c0a39 |
TORTURE_KNOWN_HOSTS_FILE);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
ssh_disconnect(s->ssh.session);
|
|
Packit |
6c0a39 |
ssh_free(s->ssh.session);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
unlink(known_hosts_file);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
return 0;
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
#define KNOWN_HOST_ENTRY_ECDSA "127.0.0.10 ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAHOg+9vHW2kJB50j7c7WkcCcOtwgZdeXMpAeEl17sFnTTrT8wYo1FCzE07wV262vIC+AE3fXUJ7sJ/CkFIdk/8/gQEY1jyoXB3Bsee16VwhJGsMzGGh1FJ0XXhRJjUbG18qbH9JiSgE1N4fIM0zJG68fAyUxRxCI1wUobOOB7EmFZd18g==\n"
|
|
Packit |
6c0a39 |
#define KNOWN_HOST_ENTRY_ED25519 "127.0.0.10 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBWWnxuCYiOyvMYLtkgoEyEKlLV+klM+BU6Nh3PmAiqX\n"
|
|
Packit |
6c0a39 |
static void torture_knownhosts_export(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
struct torture_state *s = *state;
|
|
Packit |
6c0a39 |
ssh_session session = s->ssh.session;
|
|
Packit |
6c0a39 |
char *entry = NULL;
|
|
Packit |
6c0a39 |
char *p = NULL;
|
|
Packit |
6c0a39 |
int rc;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_connect(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_session_export_known_hosts_entry(session, &entry);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
p = strstr(entry, "ssh-ed25519");
|
|
Packit |
6c0a39 |
if (p != NULL) {
|
|
Packit |
6c0a39 |
assert_string_equal(entry, KNOWN_HOST_ENTRY_ED25519);
|
|
Packit |
6c0a39 |
} else {
|
|
Packit |
6c0a39 |
assert_string_equal(entry, KNOWN_HOST_ENTRY_ECDSA);
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
SAFE_FREE(entry);
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static void torture_knownhosts_write_and_verify(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
struct torture_state *s = *state;
|
|
Packit |
6c0a39 |
ssh_session session = s->ssh.session;
|
|
Packit |
6c0a39 |
enum ssh_known_hosts_e found;
|
|
Packit |
6c0a39 |
int rc;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_connect(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_session_update_known_hosts(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
found = ssh_session_is_known_server(session);
|
|
Packit |
6c0a39 |
assert_int_equal(found, SSH_KNOWN_HOSTS_OK);
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static void torture_knownhosts_precheck(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
struct torture_state *s = *state;
|
|
Packit |
6c0a39 |
ssh_session session = s->ssh.session;
|
|
Packit |
6c0a39 |
struct ssh_list *algo_list = NULL;
|
|
Packit |
6c0a39 |
struct ssh_iterator *it = NULL;
|
|
Packit |
6c0a39 |
size_t algo_count;
|
|
Packit |
6c0a39 |
const char *algo = NULL;
|
|
Packit |
6c0a39 |
char known_hosts_file[1024] = {0};
|
|
Packit |
6c0a39 |
FILE *file;
|
|
Packit |
6c0a39 |
int rc;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
snprintf(known_hosts_file,
|
|
Packit |
6c0a39 |
sizeof(known_hosts_file),
|
|
Packit |
6c0a39 |
"%s/%s",
|
|
Packit |
6c0a39 |
s->socket_dir,
|
|
Packit |
6c0a39 |
TORTURE_KNOWN_HOSTS_FILE);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
file = fopen(known_hosts_file, "w");
|
|
Packit |
6c0a39 |
assert_non_null(file);
|
|
Packit |
6c0a39 |
fprintf(file,
|
|
Packit |
6c0a39 |
"127.0.0.10 %s\n",
|
|
Packit |
6c0a39 |
torture_get_testkey_pub(SSH_KEYTYPE_RSA));
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
fprintf(file,
|
|
Packit |
6c0a39 |
"127.0.0.10 %s\n",
|
|
Packit |
6c0a39 |
torture_get_testkey_pub(SSH_KEYTYPE_ED25519));
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
fprintf(file,
|
|
Packit |
6c0a39 |
"127.0.0.10 %s\n",
|
|
Packit |
6c0a39 |
torture_get_testkey_pub(SSH_KEYTYPE_ECDSA_P521));
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
fclose(file);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
algo_list = ssh_known_hosts_get_algorithms(session);
|
|
Packit |
6c0a39 |
assert_non_null(algo_list);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
algo_count = ssh_list_count(algo_list);
|
|
Packit |
6c0a39 |
assert_int_equal(algo_count, 3);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
it = ssh_list_get_iterator(algo_list);
|
|
Packit |
6c0a39 |
assert_non_null(it);
|
|
Packit |
6c0a39 |
algo = ssh_iterator_value(const char *, it);
|
|
Packit |
6c0a39 |
assert_string_equal(algo, "ssh-rsa");
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
ssh_list_remove(algo_list, it);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
it = ssh_list_get_iterator(algo_list);
|
|
Packit |
6c0a39 |
assert_non_null(it);
|
|
Packit |
6c0a39 |
algo = ssh_iterator_value(const char *, it);
|
|
Packit |
6c0a39 |
assert_string_equal(algo, "ssh-ed25519");
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
ssh_list_remove(algo_list, it);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
it = ssh_list_get_iterator(algo_list);
|
|
Packit |
6c0a39 |
assert_non_null(it);
|
|
Packit |
6c0a39 |
algo = ssh_iterator_value(const char *, it);
|
|
Packit |
6c0a39 |
assert_string_equal(algo, "ecdsa-sha2-nistp521");
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
ssh_list_free(algo_list);
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static void torture_knownhosts_duplicate(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
struct torture_state *s = *state;
|
|
Packit |
6c0a39 |
ssh_session session = s->ssh.session;
|
|
Packit |
6c0a39 |
struct ssh_list *algo_list = NULL;
|
|
Packit |
6c0a39 |
struct ssh_iterator *it = NULL;
|
|
Packit |
6c0a39 |
size_t algo_count;
|
|
Packit |
6c0a39 |
const char *algo = NULL;
|
|
Packit |
6c0a39 |
char known_hosts_file[1024] = {0};
|
|
Packit |
6c0a39 |
FILE *file;
|
|
Packit |
6c0a39 |
int rc;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
snprintf(known_hosts_file,
|
|
Packit |
6c0a39 |
sizeof(known_hosts_file),
|
|
Packit |
6c0a39 |
"%s/%s",
|
|
Packit |
6c0a39 |
s->socket_dir,
|
|
Packit |
6c0a39 |
TORTURE_KNOWN_HOSTS_FILE);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
file = fopen(known_hosts_file, "w");
|
|
Packit |
6c0a39 |
assert_non_null(file);
|
|
Packit |
6c0a39 |
fprintf(file,
|
|
Packit |
6c0a39 |
"127.0.0.10 %s\n",
|
|
Packit |
6c0a39 |
torture_get_testkey_pub(SSH_KEYTYPE_RSA));
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
fprintf(file,
|
|
Packit |
6c0a39 |
"127.0.0.10 %s\n",
|
|
Packit |
6c0a39 |
torture_get_testkey_pub(SSH_KEYTYPE_RSA));
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
fprintf(file,
|
|
Packit |
6c0a39 |
"127.0.0.10 %s\n",
|
|
Packit |
6c0a39 |
torture_get_testkey_pub(SSH_KEYTYPE_RSA));
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
fclose(file);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
algo_list = ssh_known_hosts_get_algorithms(session);
|
|
Packit |
6c0a39 |
assert_non_null(algo_list);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
algo_count = ssh_list_count(algo_list);
|
|
Packit |
6c0a39 |
assert_int_equal(algo_count, 1);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
it = ssh_list_get_iterator(algo_list);
|
|
Packit |
6c0a39 |
assert_non_null(it);
|
|
Packit |
6c0a39 |
algo = ssh_iterator_value(const char *, it);
|
|
Packit |
6c0a39 |
assert_string_equal(algo, "ssh-rsa");
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
ssh_list_free(algo_list);
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static void torture_knownhosts_other(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
struct torture_state *s = *state;
|
|
Packit |
6c0a39 |
ssh_session session = s->ssh.session;
|
|
Packit |
6c0a39 |
char known_hosts_file[1024] = {0};
|
|
Packit |
6c0a39 |
enum ssh_known_hosts_e found;
|
|
Packit |
6c0a39 |
FILE *file = NULL;
|
|
Packit |
6c0a39 |
int rc;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
snprintf(known_hosts_file,
|
|
Packit |
6c0a39 |
sizeof(known_hosts_file),
|
|
Packit |
6c0a39 |
"%s/%s",
|
|
Packit |
6c0a39 |
s->socket_dir,
|
|
Packit |
6c0a39 |
TORTURE_KNOWN_HOSTS_FILE);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ecdsa-sha2-nistp521");
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
file = fopen(known_hosts_file, "w");
|
|
Packit |
6c0a39 |
assert_non_null(file);
|
|
Packit |
6c0a39 |
fprintf(file,
|
|
Packit |
6c0a39 |
"127.0.0.10 %s\n",
|
|
Packit |
6c0a39 |
torture_get_testkey_pub(SSH_KEYTYPE_RSA));
|
|
Packit |
6c0a39 |
fclose(file);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_connect(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
found = ssh_session_is_known_server(session);
|
|
Packit |
6c0a39 |
assert_int_equal(found, SSH_KNOWN_HOSTS_OTHER);
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static void torture_knownhosts_unknown(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
struct torture_state *s = *state;
|
|
Packit |
6c0a39 |
ssh_session session = s->ssh.session;
|
|
Packit |
6c0a39 |
char known_hosts_file[1024] = {0};
|
|
Packit |
6c0a39 |
enum ssh_known_hosts_e found;
|
|
Packit |
6c0a39 |
int rc;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
snprintf(known_hosts_file,
|
|
Packit |
6c0a39 |
sizeof(known_hosts_file),
|
|
Packit |
6c0a39 |
"%s/%s",
|
|
Packit |
6c0a39 |
s->socket_dir,
|
|
Packit |
6c0a39 |
TORTURE_KNOWN_HOSTS_FILE);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ecdsa-sha2-nistp521");
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_connect(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
found = ssh_session_is_known_server(session);
|
|
Packit |
6c0a39 |
assert_int_equal(found, SSH_KNOWN_HOSTS_UNKNOWN);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_session_update_known_hosts(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
ssh_disconnect(session);
|
|
Packit |
6c0a39 |
ssh_free(session);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
/* connect again and check host key */
|
|
Packit |
6c0a39 |
session = ssh_new();
|
|
Packit |
6c0a39 |
assert_non_null(session);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
s->ssh.session = session;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(s->ssh.session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(s->ssh.session,
|
|
Packit |
6c0a39 |
SSH_OPTIONS_USER,
|
|
Packit |
6c0a39 |
TORTURE_SSH_USER_ALICE);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(s->ssh.session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_connect(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
/* ssh-rsa is the default but libssh should try ssh-ed25519 instead */
|
|
Packit |
6c0a39 |
found = ssh_session_is_known_server(session);
|
|
Packit |
6c0a39 |
assert_int_equal(found, SSH_KNOWN_HOSTS_OK);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
/* session will be freed by session_teardown() */
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
static void torture_knownhosts_conflict(void **state)
|
|
Packit |
6c0a39 |
{
|
|
Packit |
6c0a39 |
struct torture_state *s = *state;
|
|
Packit |
6c0a39 |
ssh_session session = s->ssh.session;
|
|
Packit |
6c0a39 |
char known_hosts_file[1024] = {0};
|
|
Packit |
6c0a39 |
enum ssh_known_hosts_e found;
|
|
Packit |
6c0a39 |
FILE *file = NULL;
|
|
Packit |
6c0a39 |
int rc;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
snprintf(known_hosts_file,
|
|
Packit |
6c0a39 |
sizeof(known_hosts_file),
|
|
Packit |
6c0a39 |
"%s/%s",
|
|
Packit |
6c0a39 |
s->socket_dir,
|
|
Packit |
6c0a39 |
TORTURE_KNOWN_HOSTS_FILE);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
file = fopen(known_hosts_file, "w");
|
|
Packit |
6c0a39 |
assert_non_null(file);
|
|
Packit |
6c0a39 |
fprintf(file,
|
|
Packit |
6c0a39 |
"127.0.0.10 %s %s\n",
|
|
Packit |
6c0a39 |
"ssh-rsa",
|
|
Packit |
6c0a39 |
BAD_RSA);
|
|
Packit |
6c0a39 |
fclose(file);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "rsa-sha2-256");
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_connect(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
found = ssh_session_is_known_server(session);
|
|
Packit |
6c0a39 |
assert_int_equal(found, SSH_KNOWN_HOSTS_CHANGED);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_session_update_known_hosts(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
ssh_disconnect(session);
|
|
Packit |
6c0a39 |
ssh_free(session);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
/* connect again and check host key */
|
|
Packit |
6c0a39 |
session = ssh_new();
|
|
Packit |
6c0a39 |
assert_non_null(session);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
s->ssh.session = session;
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "rsa-sha2-256");
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
rc = ssh_connect(session);
|
|
Packit |
6c0a39 |
assert_ssh_return_code(session, rc);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
found = ssh_session_is_known_server(session);
|
|
Packit |
6c0a39 |
assert_int_equal(found, SSH_KNOWN_HOSTS_OK);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
/* session will be freed by session_teardown() */
|
|
Packit |
6c0a39 |
}
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
int torture_run_tests(void) {
|
|
Packit |
6c0a39 |
int rc;
|
|
Packit |
6c0a39 |
struct CMUnitTest tests[] = {
|
|
Packit |
6c0a39 |
cmocka_unit_test_setup_teardown(torture_knownhosts_export,
|
|
Packit |
6c0a39 |
session_setup,
|
|
Packit |
6c0a39 |
session_teardown),
|
|
Packit |
6c0a39 |
cmocka_unit_test_setup_teardown(torture_knownhosts_write_and_verify,
|
|
Packit |
6c0a39 |
session_setup,
|
|
Packit |
6c0a39 |
session_teardown),
|
|
Packit |
6c0a39 |
cmocka_unit_test_setup_teardown(torture_knownhosts_precheck,
|
|
Packit |
6c0a39 |
session_setup,
|
|
Packit |
6c0a39 |
session_teardown),
|
|
Packit |
6c0a39 |
cmocka_unit_test_setup_teardown(torture_knownhosts_other,
|
|
Packit |
6c0a39 |
session_setup,
|
|
Packit |
6c0a39 |
session_teardown),
|
|
Packit |
6c0a39 |
cmocka_unit_test_setup_teardown(torture_knownhosts_unknown,
|
|
Packit |
6c0a39 |
session_setup,
|
|
Packit |
6c0a39 |
session_teardown),
|
|
Packit |
6c0a39 |
cmocka_unit_test_setup_teardown(torture_knownhosts_conflict,
|
|
Packit |
6c0a39 |
session_setup,
|
|
Packit |
6c0a39 |
session_teardown),
|
|
Packit |
6c0a39 |
cmocka_unit_test_setup_teardown(torture_knownhosts_duplicate,
|
|
Packit |
6c0a39 |
session_setup,
|
|
Packit |
6c0a39 |
session_teardown),
|
|
Packit |
6c0a39 |
};
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
ssh_init();
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
torture_filter_tests(tests);
|
|
Packit |
6c0a39 |
rc = cmocka_run_group_tests(tests, sshd_group_setup, sshd_group_teardown);
|
|
Packit |
6c0a39 |
|
|
Packit |
6c0a39 |
ssh_finalize();
|
|
Packit |
6c0a39 |
return rc;
|
|
Packit |
6c0a39 |
}
|