Blame tests/server/torture_server.c

Packit Service 31306d
/*
Packit Service 31306d
 * This file is part of the SSH Library
Packit Service 31306d
 *
Packit Service 31306d
 * Copyright (c) 2018 by Red Hat, Inc.
Packit Service 31306d
 *
Packit Service 31306d
 * Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
Packit Service 31306d
 *
Packit Service 31306d
 * The SSH Library is free software; you can redistribute it and/or modify
Packit Service 31306d
 * it under the terms of the GNU Lesser General Public License as published by
Packit Service 31306d
 * the Free Software Foundation; either version 2.1 of the License, or (at your
Packit Service 31306d
 * option) any later version.
Packit Service 31306d
 *
Packit Service 31306d
 * The SSH Library is distributed in the hope that it will be useful, but
Packit Service 31306d
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
Packit Service 31306d
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
Packit Service 31306d
 * License for more details.
Packit Service 31306d
 *
Packit Service 31306d
 * You should have received a copy of the GNU Lesser General Public License
Packit Service 31306d
 * along with the SSH Library; see the file COPYING.  If not, write to
Packit Service 31306d
 * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
Packit Service 31306d
 * MA 02111-1307, USA.
Packit Service 31306d
 */
Packit Service 31306d
Packit Service 31306d
#include "config.h"
Packit Service 31306d
Packit Service 31306d
#define LIBSSH_STATIC
Packit Service 31306d
Packit Service 31306d
#include <sys/types.h>
Packit Service 31306d
#include <sys/stat.h>
Packit Service 31306d
#include <errno.h>
Packit Service 31306d
#include <pwd.h>
Packit Service 31306d
Packit Service 31306d
#include "torture.h"
Packit Service 31306d
#include "torture_key.h"
Packit Service 31306d
#include "libssh/libssh.h"
Packit Service 31306d
#include "libssh/priv.h"
Packit Service 31306d
#include "libssh/session.h"
Packit Service 31306d
Packit Service 31306d
#include "test_server.h"
Packit Service 31306d
#include "default_cb.h"
Packit Service 31306d
Packit Service 31306d
#define TORTURE_KNOWN_HOSTS_FILE "libssh_torture_knownhosts"
Packit Service 31306d
Packit Service 31306d
const char template[] = "temp_dir_XXXXXX";
Packit Service 31306d
Packit Service 31306d
struct test_server_st {
Packit Service 31306d
    struct torture_state *state;
Packit Service 31306d
    struct server_state_st *ss;
Packit Service 31306d
    char *cwd;
Packit Service 31306d
    char *temp_dir;
Packit Service 31306d
};
Packit Service 31306d
Packit Service 31306d
static int setup_default_server(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct torture_state *s;
Packit Service 31306d
    struct server_state_st *ss;
Packit Service 31306d
    struct test_server_st *tss;
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
    char dsa_hostkey[1024];
Packit Service 31306d
#endif /* HAVE_DSA */
Packit Service 31306d
Packit Service 31306d
    char ed25519_hostkey[1024] = {0};
Packit Service 31306d
    char rsa_hostkey[1024];
Packit Service 31306d
    char ecdsa_hostkey[1024];
Packit Service 31306d
    //char trusted_ca_pubkey[1024];
Packit Service 31306d
Packit Service 31306d
    char sshd_path[1024];
Packit Service 31306d
    struct stat sb;
Packit Service 31306d
Packit Service 31306d
    const char *sftp_server_locations[] = {
Packit Service 31306d
        "/usr/lib/ssh/sftp-server",
Packit Service 31306d
        "/usr/libexec/sftp-server",
Packit Service 31306d
        "/usr/libexec/openssh/sftp-server",
Packit Service 31306d
        "/usr/lib/openssh/sftp-server",     /* Debian */
Packit Service 31306d
    };
Packit Service 31306d
Packit Service 31306d
    size_t sftp_sl_size = ARRAY_SIZE(sftp_server_locations);
Packit Service 31306d
    const char *sftp_server;
Packit Service 31306d
Packit Service 31306d
    size_t i;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    char pid_str[1024];
Packit Service 31306d
Packit Service 31306d
    pid_t pid;
Packit Service 31306d
Packit Service 31306d
    assert_non_null(state);
Packit Service 31306d
Packit Service 31306d
    tss = (struct test_server_st*)calloc(1, sizeof(struct test_server_st));
Packit Service 31306d
    assert_non_null(tss);
Packit Service 31306d
Packit Service 31306d
    torture_setup_socket_dir((void **)&s);
Packit Service 31306d
    assert_non_null(s->socket_dir);
Packit Service 31306d
Packit Service 31306d
    /* Set the default interface for the server */
Packit Service 31306d
    setenv("SOCKET_WRAPPER_DEFAULT_IFACE", "10", 1);
Packit Service 31306d
    setenv("PAM_WRAPPER", "1", 1);
Packit Service 31306d
Packit Service 31306d
    snprintf(sshd_path,
Packit Service 31306d
             sizeof(sshd_path),
Packit Service 31306d
             "%s/sshd",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
Packit Service 31306d
    rc = mkdir(sshd_path, 0755);
Packit Service 31306d
    assert_return_code(rc, errno);
Packit Service 31306d
Packit Service 31306d
    snprintf(ed25519_hostkey,
Packit Service 31306d
             sizeof(ed25519_hostkey),
Packit Service 31306d
             "%s/sshd/ssh_host_ed25519_key",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
    torture_write_file(ed25519_hostkey,
Packit Service 31306d
                       torture_get_openssh_testkey(SSH_KEYTYPE_ED25519, 0));
Packit Service 31306d
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
    snprintf(dsa_hostkey,
Packit Service 31306d
             sizeof(dsa_hostkey),
Packit Service 31306d
             "%s/sshd/ssh_host_dsa_key",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
    torture_write_file(dsa_hostkey, torture_get_testkey(SSH_KEYTYPE_DSS, 0));
Packit Service 31306d
#endif /* HAVE_DSA */
Packit Service 31306d
Packit Service 31306d
    snprintf(rsa_hostkey,
Packit Service 31306d
             sizeof(rsa_hostkey),
Packit Service 31306d
             "%s/sshd/ssh_host_rsa_key",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
    torture_write_file(rsa_hostkey, torture_get_testkey(SSH_KEYTYPE_RSA, 0));
Packit Service 31306d
Packit Service 31306d
    snprintf(ecdsa_hostkey,
Packit Service 31306d
             sizeof(ecdsa_hostkey),
Packit Service 31306d
             "%s/sshd/ssh_host_ecdsa_key",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
    torture_write_file(ecdsa_hostkey,
Packit Service 31306d
                       torture_get_testkey(SSH_KEYTYPE_ECDSA_P521, 0));
Packit Service 31306d
Packit Service 31306d
    sftp_server = getenv("TORTURE_SFTP_SERVER");
Packit Service 31306d
    if (sftp_server == NULL) {
Packit Service 31306d
        for (i = 0; i < sftp_sl_size; i++) {
Packit Service 31306d
            sftp_server = sftp_server_locations[i];
Packit Service 31306d
            rc = lstat(sftp_server, &sb);
Packit Service 31306d
            if (rc == 0) {
Packit Service 31306d
                break;
Packit Service 31306d
            }
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
    assert_non_null(sftp_server);
Packit Service 31306d
Packit Service 31306d
    /* Create default server state */
Packit Service 31306d
    ss = (struct server_state_st *)calloc(1, sizeof(struct server_state_st));
Packit Service 31306d
    assert_non_null(ss);
Packit Service 31306d
Packit Service 31306d
    ss->address = strdup("127.0.0.10");
Packit Service 31306d
    assert_non_null(ss->address);
Packit Service 31306d
Packit Service 31306d
    ss->port = 22;
Packit Service 31306d
Packit Service 31306d
    ss->ecdsa_key = strdup(ecdsa_hostkey);
Packit Service 31306d
    assert_non_null(ss->ecdsa_key);
Packit Service 31306d
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
    ss->dsa_key = strdup(dsa_hostkey);
Packit Service 31306d
    assert_non_null(ss->dsa_key);
Packit Service 31306d
#endif /* HAVE_DSA */
Packit Service 31306d
Packit Service 31306d
    ss->ed25519_key = strdup(ed25519_hostkey);
Packit Service 31306d
    assert_non_null(ed25519_hostkey);
Packit Service 31306d
Packit Service 31306d
    ss->rsa_key = strdup(rsa_hostkey);
Packit Service 31306d
    assert_non_null(ss->rsa_key);
Packit Service 31306d
Packit Service 31306d
    ss->host_key = NULL;
Packit Service 31306d
Packit Service 31306d
    /* Use default username and password (set in default_handle_session_cb) */
Packit Service 31306d
    ss->expected_username = NULL;
Packit Service 31306d
    ss->expected_password = NULL;
Packit Service 31306d
Packit Service 31306d
    ss->verbosity = torture_libssh_verbosity();
Packit Service 31306d
Packit Service 31306d
    ss->auth_methods = SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_PUBLICKEY;
Packit Service 31306d
Packit Service 31306d
#ifdef WITH_PCAP
Packit Service 31306d
    ss->with_pcap = 1;
Packit Service 31306d
    ss->pcap_file = strdup(s->pcap_file);
Packit Service 31306d
    assert_non_null(ss->pcap_file);
Packit Service 31306d
#endif
Packit Service 31306d
Packit Service 31306d
    /* TODO make configurable */
Packit Service 31306d
    ss->max_tries = 3;
Packit Service 31306d
    ss->error = 0;
Packit Service 31306d
Packit Service 31306d
    /* Use the default session handling function */
Packit Service 31306d
    ss->handle_session = default_handle_session_cb;
Packit Service 31306d
    assert_non_null(ss->handle_session);
Packit Service 31306d
Packit Service 31306d
    /* Do not use global configuration */
Packit Service 31306d
    ss->parse_global_config = false;
Packit Service 31306d
Packit Service 31306d
    /* Start the server using the default values */
Packit Service 31306d
    pid = fork_run_server(ss);
Packit Service 31306d
    if (pid < 0) {
Packit Service 31306d
        fail();
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    snprintf(pid_str, sizeof(pid_str), "%d", pid);
Packit Service 31306d
Packit Service 31306d
    torture_write_file(s->srv_pidfile, (const char *)pid_str);
Packit Service 31306d
Packit Service 31306d
    setenv("SOCKET_WRAPPER_DEFAULT_IFACE", "21", 1);
Packit Service 31306d
    unsetenv("PAM_WRAPPER");
Packit Service 31306d
Packit Service 31306d
    /* Wait until the sshd is ready to accept connections */
Packit Service 31306d
    //rc = torture_wait_for_daemon(5);
Packit Service 31306d
    //assert_int_equal(rc, 0);
Packit Service 31306d
Packit Service 31306d
    /* TODO properly wait for the server (use ping approach) */
Packit Service 31306d
    /* Wait 200ms */
Packit Service 31306d
    usleep(200 * 1000);
Packit Service 31306d
Packit Service 31306d
    tss->state = s;
Packit Service 31306d
    tss->ss = ss;
Packit Service 31306d
Packit Service 31306d
    *state = tss;
Packit Service 31306d
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static int teardown_default_server(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct torture_state *s;
Packit Service 31306d
    struct server_state_st *ss;
Packit Service 31306d
    struct test_server_st *tss;
Packit Service 31306d
Packit Service 31306d
    tss = *state;
Packit Service 31306d
    assert_non_null(tss);
Packit Service 31306d
Packit Service 31306d
    s = tss->state;
Packit Service 31306d
    assert_non_null(s);
Packit Service 31306d
Packit Service 31306d
    ss = tss->ss;
Packit Service 31306d
    assert_non_null(ss);
Packit Service 31306d
Packit Service 31306d
    /* This function can be reused */
Packit Service 31306d
    torture_teardown_sshd_server((void **)&s);
Packit Service 31306d
Packit Service 31306d
    free_server_state(tss->ss);
Packit Service 31306d
    SAFE_FREE(tss->ss);
Packit Service 31306d
    SAFE_FREE(tss);
Packit Service 31306d
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static int session_setup(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct test_server_st *tss = *state;
Packit Service 31306d
    struct torture_state *s;
Packit Service 31306d
    int verbosity = torture_libssh_verbosity();
Packit Service 31306d
    struct passwd *pwd;
Packit Service 31306d
    char *cwd = NULL;
Packit Service 31306d
    char *tmp_dir = NULL;
Packit Service 31306d
    bool b = false;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    assert_non_null(tss);
Packit Service 31306d
Packit Service 31306d
    /* Make sure we do not test the agent */
Packit Service 31306d
    unsetenv("SSH_AUTH_SOCK");
Packit Service 31306d
Packit Service 31306d
    cwd = torture_get_current_working_dir();
Packit Service 31306d
    assert_non_null(cwd);
Packit Service 31306d
Packit Service 31306d
    tmp_dir = torture_make_temp_dir(template);
Packit Service 31306d
    assert_non_null(tmp_dir);
Packit Service 31306d
Packit Service 31306d
    tss->cwd = cwd;
Packit Service 31306d
    tss->temp_dir = tmp_dir;
Packit Service 31306d
Packit Service 31306d
    s = tss->state;
Packit Service 31306d
    assert_non_null(s);
Packit Service 31306d
Packit Service 31306d
    pwd = getpwnam("bob");
Packit Service 31306d
    assert_non_null(pwd);
Packit Service 31306d
Packit Service 31306d
    rc = setuid(pwd->pw_uid);
Packit Service 31306d
    assert_return_code(rc, errno);
Packit Service 31306d
Packit Service 31306d
    s->ssh.session = ssh_new();
Packit Service 31306d
    assert_non_null(s->ssh.session);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity);
Packit Service 31306d
    assert_ssh_return_code(s->ssh.session, rc);
Packit Service 31306d
    rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
Packit Service 31306d
    assert_ssh_return_code(s->ssh.session, rc);
Packit Service 31306d
    /* Make sure no other configuration options from system will get used */
Packit Service 31306d
    rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_PROCESS_CONFIG, &b);
Packit Service 31306d
    assert_ssh_return_code(s->ssh.session, rc);
Packit Service 31306d
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static int session_teardown(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct test_server_st *tss = *state;
Packit Service 31306d
    struct torture_state *s;
Packit Service 31306d
    int rc = 0;
Packit Service 31306d
Packit Service 31306d
    assert_non_null(tss);
Packit Service 31306d
Packit Service 31306d
    s = tss->state;
Packit Service 31306d
    assert_non_null(s);
Packit Service 31306d
Packit Service 31306d
    ssh_disconnect(s->ssh.session);
Packit Service 31306d
    ssh_free(s->ssh.session);
Packit Service 31306d
Packit Service 31306d
    rc = torture_change_dir(tss->cwd);
Packit Service 31306d
    assert_int_equal(rc, 0);
Packit Service 31306d
Packit Service 31306d
    rc = torture_rmdirs(tss->temp_dir);
Packit Service 31306d
    assert_int_equal(rc, 0);
Packit Service 31306d
Packit Service 31306d
    SAFE_FREE(tss->temp_dir);
Packit Service 31306d
    SAFE_FREE(tss->cwd);
Packit Service 31306d
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static void torture_server_auth_none(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct test_server_st *tss = *state;
Packit Service 31306d
    struct torture_state *s = NULL;
Packit Service 31306d
    ssh_session session = NULL;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    assert_non_null(tss);
Packit Service 31306d
Packit Service 31306d
    s = tss->state;
Packit Service 31306d
    assert_non_null(s);
Packit Service 31306d
Packit Service 31306d
    session = s->ssh.session;
Packit Service 31306d
    assert_non_null(session);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_options_set(session, SSH_OPTIONS_USER, TORTURE_SSH_USER_BOB);
Packit Service 31306d
    assert_int_equal(rc, SSH_OK);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_connect(session);
Packit Service 31306d
    assert_int_equal(rc, SSH_OK);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_userauth_none(session, NULL);
Packit Service 31306d
    assert_int_equal(rc, SSH_AUTH_DENIED);
Packit Service 31306d
Packit Service 31306d
    /* This request should return a SSH_REQUEST_DENIED error */
Packit Service 31306d
    if (rc == SSH_ERROR) {
Packit Service 31306d
        assert_int_equal(ssh_get_error_code(session), SSH_REQUEST_DENIED);
Packit Service 31306d
    }
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static void torture_server_auth_password(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct test_server_st *tss = *state;
Packit Service 31306d
    struct torture_state *s;
Packit Service 31306d
    ssh_session session;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    assert_non_null(tss);
Packit Service 31306d
Packit Service 31306d
    s = tss->state;
Packit Service 31306d
    assert_non_null(s);
Packit Service 31306d
Packit Service 31306d
    session = s->ssh.session;
Packit Service 31306d
    assert_non_null(session);
Packit Service 31306d
Packit Service 31306d
    /* TODO: implement proper pam authentication in callback */
Packit Service 31306d
    /* Using the default user for the server */
Packit Service 31306d
    rc = ssh_options_set(session, SSH_OPTIONS_USER, SSHD_DEFAULT_USER);
Packit Service 31306d
    assert_int_equal(rc, SSH_OK);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_connect(session);
Packit Service 31306d
    assert_int_equal(rc, SSH_OK);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_userauth_none(session, NULL);
Packit Service 31306d
    /* This request should return a SSH_REQUEST_DENIED error */
Packit Service 31306d
    if (rc == SSH_AUTH_ERROR) {
Packit Service 31306d
        assert_int_equal(ssh_get_error_code(session), SSH_REQUEST_DENIED);
Packit Service 31306d
    }
Packit Service 31306d
    rc = ssh_userauth_list(session, NULL);
Packit Service 31306d
    assert_true(rc & SSH_AUTH_METHOD_PASSWORD);
Packit Service 31306d
Packit Service 31306d
    /* TODO: implement proper pam authentication in callback */
Packit Service 31306d
    /* Using the default password for the server */
Packit Service 31306d
    rc = ssh_userauth_password(session, NULL, SSHD_DEFAULT_PASSWORD);
Packit Service 31306d
    assert_int_equal(rc, SSH_AUTH_SUCCESS);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static void torture_server_auth_pubkey(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct test_server_st *tss = *state;
Packit Service 31306d
    struct torture_state *s;
Packit Service 31306d
    ssh_session session;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    assert_non_null(tss);
Packit Service 31306d
Packit Service 31306d
    s = tss->state;
Packit Service 31306d
    assert_non_null(s);
Packit Service 31306d
Packit Service 31306d
    session = s->ssh.session;
Packit Service 31306d
    assert_non_null(session);
Packit Service 31306d
Packit Service 31306d
    /* Authenticate as alice with bob's pubkey */
Packit Service 31306d
    rc = ssh_options_set(session, SSH_OPTIONS_USER, TORTURE_SSH_USER_ALICE);
Packit Service 31306d
    assert_int_equal(rc, SSH_OK);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_connect(session);
Packit Service 31306d
    assert_int_equal(rc, SSH_OK);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_userauth_none(session,NULL);
Packit Service 31306d
    /* This request should return a SSH_REQUEST_DENIED error */
Packit Service 31306d
    if (rc == SSH_ERROR) {
Packit Service 31306d
        assert_int_equal(ssh_get_error_code(session), SSH_REQUEST_DENIED);
Packit Service 31306d
    }
Packit Service 31306d
    rc = ssh_userauth_list(session, NULL);
Packit Service 31306d
    assert_true(rc & SSH_AUTH_METHOD_PUBLICKEY);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_userauth_publickey_auto(session, NULL, NULL);
Packit Service 31306d
    assert_int_equal(rc, SSH_AUTH_SUCCESS);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static void torture_server_hostkey_mismatch(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct test_server_st *tss = *state;
Packit Service 31306d
    struct torture_state *s = NULL;
Packit Service 31306d
    ssh_session session = NULL;
Packit Service 31306d
    char known_hosts_file[1024] = {0};
Packit Service 31306d
    FILE *file = NULL;
Packit Service 31306d
    enum ssh_known_hosts_e found;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    assert_non_null(tss);
Packit Service 31306d
Packit Service 31306d
    s = tss->state;
Packit Service 31306d
    assert_non_null(s);
Packit Service 31306d
Packit Service 31306d
    session = s->ssh.session;
Packit Service 31306d
    assert_non_null(session);
Packit Service 31306d
Packit Service 31306d
    /* Store the testkey in the knownhosts file */
Packit Service 31306d
    snprintf(known_hosts_file,
Packit Service 31306d
             sizeof(known_hosts_file),
Packit Service 31306d
             "%s/%s",
Packit Service 31306d
             s->socket_dir,
Packit Service 31306d
             TORTURE_KNOWN_HOSTS_FILE);
Packit Service 31306d
Packit Service 31306d
    file = fopen(known_hosts_file, "w");
Packit Service 31306d
    assert_non_null(file);
Packit Service 31306d
    fprintf(file,
Packit Service 31306d
            "127.0.0.10 %s\n",
Packit Service 31306d
            torture_get_testkey_pub(SSH_KEYTYPE_RSA));
Packit Service 31306d
    fclose(file);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
Packit Service 31306d
    assert_ssh_return_code(session, rc);
Packit Service 31306d
    /* Using the default user for the server */
Packit Service 31306d
    rc = ssh_options_set(session, SSH_OPTIONS_USER, SSHD_DEFAULT_USER);
Packit Service 31306d
    assert_ssh_return_code(session, rc);
Packit Service 31306d
Packit Service 31306d
    /* Configure the client to offer only rsa-sha2-256 hostkey algorithm */
Packit Service 31306d
    rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "rsa-sha2-256");
Packit Service 31306d
    assert_ssh_return_code(session, rc);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_connect(session);
Packit Service 31306d
    assert_ssh_return_code(session, rc);
Packit Service 31306d
Packit Service 31306d
    /* Make sure we can verify the signature */
Packit Service 31306d
    found = ssh_session_is_known_server(session);
Packit Service 31306d
    assert_int_equal(found, SSH_KNOWN_HOSTS_OK);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static void torture_server_unknown_global_request(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct test_server_st *tss = *state;
Packit Service 31306d
    struct torture_state *s = NULL;
Packit Service 31306d
    ssh_session session = NULL;
Packit Service 31306d
    ssh_channel channel;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    assert_non_null(tss);
Packit Service 31306d
Packit Service 31306d
    s = tss->state;
Packit Service 31306d
    assert_non_null(s);
Packit Service 31306d
Packit Service 31306d
    session = s->ssh.session;
Packit Service 31306d
    assert_non_null(session);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_options_set(session, SSH_OPTIONS_USER, SSHD_DEFAULT_USER);
Packit Service 31306d
    assert_int_equal(rc, SSH_OK);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_connect(session);
Packit Service 31306d
    assert_int_equal(rc, SSH_OK);
Packit Service 31306d
Packit Service 31306d
    /* Using the default password for the server */
Packit Service 31306d
    rc = ssh_userauth_password(session, NULL, SSHD_DEFAULT_PASSWORD);
Packit Service 31306d
    assert_int_equal(rc, SSH_AUTH_SUCCESS);
Packit Service 31306d
Packit Service 31306d
    /* Request asking for reply */
Packit Service 31306d
    rc = ssh_global_request(session, "unknown-request-00@test.com", NULL, 1);
Packit Service 31306d
    assert_ssh_return_code_equal(session, rc, SSH_ERROR);
Packit Service 31306d
Packit Service 31306d
    /* Request and don't ask for reply */
Packit Service 31306d
    rc = ssh_global_request(session, "another-bad-req-00@test.com", NULL, 0);
Packit Service 31306d
    assert_ssh_return_code(session, rc);
Packit Service 31306d
Packit Service 31306d
    /* Open channel to make sure the session is still working */
Packit Service 31306d
    channel = ssh_channel_new(session);
Packit Service 31306d
    assert_non_null(channel);
Packit Service 31306d
Packit Service 31306d
    rc = ssh_channel_open_session(channel);
Packit Service 31306d
    assert_ssh_return_code(session, rc);
Packit Service 31306d
Packit Service 31306d
    ssh_channel_close(channel);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int torture_run_tests(void) {
Packit Service 31306d
    int rc;
Packit Service 31306d
    struct CMUnitTest tests[] = {
Packit Service 31306d
        cmocka_unit_test_setup_teardown(torture_server_auth_none,
Packit Service 31306d
                                        session_setup,
Packit Service 31306d
                                        session_teardown),
Packit Service 31306d
        cmocka_unit_test_setup_teardown(torture_server_auth_password,
Packit Service 31306d
                                        session_setup,
Packit Service 31306d
                                        session_teardown),
Packit Service 31306d
        cmocka_unit_test_setup_teardown(torture_server_auth_pubkey,
Packit Service 31306d
                                        session_setup,
Packit Service 31306d
                                        session_teardown),
Packit Service 31306d
        cmocka_unit_test_setup_teardown(torture_server_hostkey_mismatch,
Packit Service 31306d
                                        session_setup,
Packit Service 31306d
                                        session_teardown),
Packit Service 31306d
        cmocka_unit_test_setup_teardown(torture_server_unknown_global_request,
Packit Service 31306d
                                        session_setup,
Packit Service 31306d
                                        session_teardown),
Packit Service 31306d
    };
Packit Service 31306d
Packit Service 31306d
    ssh_init();
Packit Service 31306d
Packit Service 31306d
    torture_filter_tests(tests);
Packit Service 31306d
    rc = cmocka_run_group_tests(tests,
Packit Service 31306d
            setup_default_server,
Packit Service 31306d
            teardown_default_server);
Packit Service 31306d
Packit Service 31306d
    ssh_finalize();
Packit Service 31306d
Packit Service 31306d
    return rc;
Packit Service 31306d
}