Blame tests/torture.c

Packit Service 31306d
/*
Packit Service 31306d
 * torture.c - torture library for testing libssh
Packit Service 31306d
 *
Packit Service 31306d
 * This file is part of the SSH Library
Packit Service 31306d
 *
Packit Service 31306d
 * Copyright (c) 2008-2009 by Andreas Schneider <asn@cryptomilk.org>
Packit Service 31306d
 *
Packit Service 31306d
 * The SSH Library is free software; you can redistribute it and/or modify
Packit Service 31306d
 * it under the terms of the GNU Lesser General Public License as published by
Packit Service 31306d
 * the Free Software Foundation; either version 2.1 of the License, or (at your
Packit Service 31306d
 * option) any later version.
Packit Service 31306d
 *
Packit Service 31306d
 * The SSH Library is distributed in the hope that it will be useful, but
Packit Service 31306d
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
Packit Service 31306d
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
Packit Service 31306d
 * License for more details.
Packit Service 31306d
 *
Packit Service 31306d
 * You should have received a copy of the GNU Lesser General Public License
Packit Service 31306d
 * along with the SSH Library; see the file COPYING.  If not, write to
Packit Service 31306d
 * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
Packit Service 31306d
 * MA 02111-1307, USA.
Packit Service 31306d
 */
Packit Service 31306d
Packit Service 31306d
#include "config.h"
Packit Service 31306d
Packit Service 31306d
#include <stdio.h>
Packit Service 31306d
#include <stdlib.h>
Packit Service 31306d
#include <sys/types.h>
Packit Service 31306d
#include <sys/stat.h>
Packit Service 31306d
#include <fcntl.h>
Packit Service 31306d
#include <signal.h>
Packit Service 31306d
Packit Service 31306d
#ifndef _WIN32
Packit Service 31306d
# include <dirent.h>
Packit Service 31306d
# include <errno.h>
Packit Service 31306d
# include <sys/socket.h>
Packit Service 31306d
#endif
Packit Service 31306d
Packit Service 31306d
#ifdef HAVE_UNISTD_H
Packit Service 31306d
#include <unistd.h>
Packit Service 31306d
#elif (defined _WIN32) || (defined _WIN64)
Packit Service 31306d
#include <direct.h>
Packit Service 31306d
#include <io.h>
Packit Service 31306d
#define read _read
Packit Service 31306d
#define open _open
Packit Service 31306d
#define write _write
Packit Service 31306d
#define close _close
Packit Service 31306d
#define chdir _chdir
Packit Service 31306d
#endif
Packit Service 31306d
Packit Service 31306d
#include "torture.h"
Packit Service 31306d
#include "torture_key.h"
Packit Service 31306d
#include "libssh/misc.h"
Packit Service 31306d
Packit Service 31306d
#define TORTURE_SSHD_SRV_IPV4 "127.0.0.10"
Packit Service 31306d
/* socket wrapper IPv6 prefix  fd00::5357:5fxx */
Packit Service 31306d
#define TORTURE_SSHD_SRV_IPV6 "fd00::5357:5f0a"
Packit Service 31306d
#define TORTURE_SSHD_SRV_PORT 22
Packit Service 31306d
Packit Service 31306d
#define TORTURE_SOCKET_DIR "/tmp/test_socket_wrapper_XXXXXX"
Packit Service 31306d
#define TORTURE_SSHD_PIDFILE "sshd/sshd.pid"
Packit Service 31306d
#define TORTURE_SSHD_CONFIG "sshd/sshd_config"
Packit Service 31306d
#define TORTURE_PCAP_FILE "socket_trace.pcap"
Packit Service 31306d
Packit Service 31306d
static const char torture_rsa_certauth_pub[]=
Packit Service 31306d
        "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnA2n5vHzZbs/GvRkGloJNV1CXHI"
Packit Service 31306d
        "S5Xnrm05HusUJSWyPq3I1iCMHdYA7oezHa9GCFYbIenaYPy+G6USQRjYQz8SvAZo06"
Packit Service 31306d
        "SFNeJSsa1kAIqxzdPT9kBrRrYK39PZQPsYVfRPqZBdmc+jwrfz97IFEJyXMI47FoTG"
Packit Service 31306d
        "kgEq7eu3z2px/tdIZ34I5Hr5DDBxicZi4jluyRUJHfSPoBxyhF7OkPX4bYkrc691je"
Packit Service 31306d
        "IQDxubl650WYLHgFfad0xTzBIFE6XUb55Dp5AgRdevSoso1Pe0IKFxxMVpP664LCbY"
Packit Service 31306d
        "K06Lv6kcotfFlpvUtR1yx8jToGcSoq5sSzTwvXSHCQQ9ZA1hvF "
Packit Service 31306d
        "torture_certauth_key";
Packit Service 31306d
Packit Service 31306d
static int verbosity = 0;
Packit Service 31306d
static const char *pattern = NULL;
Packit Service 31306d
Packit Service 31306d
#ifndef _WIN32
Packit Service 31306d
Packit Service 31306d
static int _torture_auth_kbdint(ssh_session session,
Packit Service 31306d
                               const char *password) {
Packit Service 31306d
    const char *prompt;
Packit Service 31306d
    char echo;
Packit Service 31306d
    int err;
Packit Service 31306d
Packit Service 31306d
    if (session == NULL || password == NULL) {
Packit Service 31306d
        return SSH_AUTH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    err = ssh_userauth_kbdint(session, NULL, NULL);
Packit Service 31306d
    if (err == SSH_AUTH_ERROR) {
Packit Service 31306d
        return err;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (ssh_userauth_kbdint_getnprompts(session) != 1) {
Packit Service 31306d
        return SSH_AUTH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    prompt = ssh_userauth_kbdint_getprompt(session, 0, &echo);
Packit Service 31306d
    if (prompt == NULL) {
Packit Service 31306d
        return SSH_AUTH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (ssh_userauth_kbdint_setanswer(session, 0, password) < 0) {
Packit Service 31306d
        return SSH_AUTH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
    err = ssh_userauth_kbdint(session, NULL, NULL);
Packit Service 31306d
    if (err == SSH_AUTH_INFO) {
Packit Service 31306d
        if (ssh_userauth_kbdint_getnprompts(session) != 0) {
Packit Service 31306d
            return SSH_AUTH_ERROR;
Packit Service 31306d
        }
Packit Service 31306d
        err = ssh_userauth_kbdint(session, NULL, NULL);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return err;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int torture_rmdirs(const char *path) {
Packit Service 31306d
    DIR *d;
Packit Service 31306d
    struct dirent *dp;
Packit Service 31306d
    struct stat sb;
Packit Service 31306d
    char *fname;
Packit Service 31306d
Packit Service 31306d
    if ((d = opendir(path)) != NULL) {
Packit Service 31306d
        while(stat(path, &sb) == 0) {
Packit Service 31306d
            /* if we can remove the directory we're done */
Packit Service 31306d
            if (rmdir(path) == 0) {
Packit Service 31306d
                break;
Packit Service 31306d
            }
Packit Service 31306d
            switch (errno) {
Packit Service 31306d
                case ENOTEMPTY:
Packit Service 31306d
                case EEXIST:
Packit Service 31306d
                case EBADF:
Packit Service 31306d
                    break; /* continue */
Packit Service 31306d
                default:
Packit Service 31306d
                    closedir(d);
Packit Service 31306d
                    return 0;
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            while ((dp = readdir(d)) != NULL) {
Packit Service 31306d
                size_t len;
Packit Service 31306d
                /* skip '.' and '..' */
Packit Service 31306d
                if (dp->d_name[0] == '.' &&
Packit Service 31306d
                        (dp->d_name[1] == '\0' ||
Packit Service 31306d
                         (dp->d_name[1] == '.' && dp->d_name[2] == '\0'))) {
Packit Service 31306d
                    continue;
Packit Service 31306d
                }
Packit Service 31306d
Packit Service 31306d
                len = strlen(path) + strlen(dp->d_name) + 2;
Packit Service 31306d
                fname = malloc(len);
Packit Service 31306d
                if (fname == NULL) {
Packit Service 31306d
                    closedir(d);
Packit Service 31306d
                    return -1;
Packit Service 31306d
                }
Packit Service 31306d
                snprintf(fname, len, "%s/%s", path, dp->d_name);
Packit Service 31306d
Packit Service 31306d
                /* stat the file */
Packit Service 31306d
                if (lstat(fname, &sb) != -1) {
Packit Service 31306d
                    if (S_ISDIR(sb.st_mode) && !S_ISLNK(sb.st_mode)) {
Packit Service 31306d
                        if (rmdir(fname) < 0) { /* can't be deleted */
Packit Service 31306d
                            if (errno == EACCES) {
Packit Service 31306d
                                closedir(d);
Packit Service 31306d
                                SAFE_FREE(fname);
Packit Service 31306d
                                return -1;
Packit Service 31306d
                            }
Packit Service 31306d
                            torture_rmdirs(fname);
Packit Service 31306d
                        }
Packit Service 31306d
                    } else {
Packit Service 31306d
                        unlink(fname);
Packit Service 31306d
                    }
Packit Service 31306d
                } /* lstat */
Packit Service 31306d
                SAFE_FREE(fname);
Packit Service 31306d
            } /* readdir */
Packit Service 31306d
Packit Service 31306d
            rewinddir(d);
Packit Service 31306d
        }
Packit Service 31306d
    } else {
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    closedir(d);
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int torture_isdir(const char *path) {
Packit Service 31306d
    struct stat sb;
Packit Service 31306d
Packit Service 31306d
    if (lstat (path, &sb) == 0 && S_ISDIR(sb.st_mode)) {
Packit Service 31306d
        return 1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static pid_t
Packit Service 31306d
torture_read_pidfile(const char *pidfile)
Packit Service 31306d
{
Packit Service 31306d
    char buf[8] = {0};
Packit Service 31306d
    long int tmp;
Packit Service 31306d
    pid_t ret;
Packit Service 31306d
    ssize_t rc;
Packit Service 31306d
    int fd;
Packit Service 31306d
Packit Service 31306d
    fd = open(pidfile, O_RDONLY);
Packit Service 31306d
    if (fd < 0) {
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = read(fd, buf, sizeof(buf));
Packit Service 31306d
    close(fd);
Packit Service 31306d
    if (rc <= 0) {
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    buf[sizeof(buf) - 1] = '\0';
Packit Service 31306d
Packit Service 31306d
    tmp = strtol(buf, NULL, 10);
Packit Service 31306d
    if (tmp == 0 || errno == ERANGE) {
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
    ret = (pid_t)tmp;
Packit Service 31306d
    /* Check if we are out of pid_t range on this system */
Packit Service 31306d
    if ((long)ret != tmp) {
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return ret;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int torture_terminate_process(const char *pidfile)
Packit Service 31306d
{
Packit Service 31306d
    ssize_t rc;
Packit Service 31306d
    pid_t pid;
Packit Service 31306d
    int is_running = 1;
Packit Service 31306d
    int count;
Packit Service 31306d
Packit Service 31306d
    /* read the pidfile */
Packit Service 31306d
    pid = torture_read_pidfile(pidfile);
Packit Service 31306d
    assert_int_not_equal(pid, -1);
Packit Service 31306d
Packit Service 31306d
    for (count = 0; count < 10; count++) {
Packit Service 31306d
        /* Make sure the daemon goes away! */
Packit Service 31306d
        kill(pid, SIGTERM);
Packit Service 31306d
Packit Service 31306d
        /* 10 ms */
Packit Service 31306d
        usleep(10 * 1000);
Packit Service 31306d
Packit Service 31306d
        rc = kill(pid, 0);
Packit Service 31306d
        if (rc != 0) {
Packit Service 31306d
            is_running = 0;
Packit Service 31306d
            break;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (is_running) {
Packit Service 31306d
        fprintf(stderr,
Packit Service 31306d
                "WARNING: The process with pid %u is still running!\n", pid);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
ssh_session torture_ssh_session(struct torture_state *s,
Packit Service 31306d
                                const char *host,
Packit Service 31306d
                                const unsigned int *port,
Packit Service 31306d
                                const char *user,
Packit Service 31306d
                                const char *password) {
Packit Service 31306d
    ssh_session session;
Packit Service 31306d
    int method;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    bool process_config = false;
Packit Service 31306d
Packit Service 31306d
    if (host == NULL) {
Packit Service 31306d
        return NULL;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    session = ssh_new();
Packit Service 31306d
    if (session == NULL) {
Packit Service 31306d
        return NULL;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
#ifdef WITH_PCAP
Packit Service 31306d
    if (s != NULL && s->plain_pcap != NULL) {
Packit Service 31306d
        ssh_set_pcap_file(session, s->plain_pcap);
Packit Service 31306d
    }
Packit Service 31306d
#endif /* WITH_PCAP */
Packit Service 31306d
Packit Service 31306d
    if (ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity) < 0) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (ssh_options_set(session, SSH_OPTIONS_HOST, host) < 0) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (port != NULL) {
Packit Service 31306d
      if (ssh_options_set(session, SSH_OPTIONS_PORT, port) < 0) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
      }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (user != NULL) {
Packit Service 31306d
        if (ssh_options_set(session, SSH_OPTIONS_USER, user) < 0) {
Packit Service 31306d
            goto failed;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG,
Packit Service 31306d
                        &process_config) < 0) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (ssh_connect(session)) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* We are in testing mode, so consinder the hostkey as verified ;) */
Packit Service 31306d
Packit Service 31306d
    /* This request should return a SSH_REQUEST_DENIED error */
Packit Service 31306d
    rc = ssh_userauth_none(session, NULL);
Packit Service 31306d
    if (rc == SSH_ERROR) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
    method = ssh_userauth_list(session, NULL);
Packit Service 31306d
    if (method == 0) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (password != NULL) {
Packit Service 31306d
        if (method & SSH_AUTH_METHOD_PASSWORD) {
Packit Service 31306d
            rc = ssh_userauth_password(session, NULL, password);
Packit Service 31306d
        } else if (method & SSH_AUTH_METHOD_INTERACTIVE) {
Packit Service 31306d
            rc = _torture_auth_kbdint(session, password);
Packit Service 31306d
        }
Packit Service 31306d
    } else {
Packit Service 31306d
        rc = ssh_userauth_publickey_auto(session, NULL, NULL);
Packit Service 31306d
        if (rc == SSH_AUTH_ERROR) {
Packit Service 31306d
            goto failed;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
    if (rc != SSH_AUTH_SUCCESS) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return session;
Packit Service 31306d
failed:
Packit Service 31306d
    if (ssh_is_connected(session)) {
Packit Service 31306d
        ssh_disconnect(session);
Packit Service 31306d
    }
Packit Service 31306d
    ssh_free(session);
Packit Service 31306d
Packit Service 31306d
    return NULL;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
#ifdef WITH_SERVER
Packit Service 31306d
Packit Service 31306d
ssh_bind torture_ssh_bind(const char *addr,
Packit Service 31306d
                          const unsigned int port,
Packit Service 31306d
                          enum ssh_keytypes_e key_type,
Packit Service 31306d
                          const char *private_key_file) {
Packit Service 31306d
    int rc;
Packit Service 31306d
    ssh_bind sshbind = NULL;
Packit Service 31306d
    enum ssh_bind_options_e opts = -1;
Packit Service 31306d
Packit Service 31306d
    sshbind = ssh_bind_new();
Packit Service 31306d
    if (sshbind == NULL) {
Packit Service 31306d
        goto out;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, addr);
Packit Service 31306d
    if (rc != 0) {
Packit Service 31306d
        goto out_free;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT, &port);
Packit Service 31306d
    if (rc != 0) {
Packit Service 31306d
        goto out_free;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    switch (key_type) {
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
        case SSH_KEYTYPE_DSS:
Packit Service 31306d
            opts = SSH_BIND_OPTIONS_DSAKEY;
Packit Service 31306d
            break;
Packit Service 31306d
#endif /* HAVE_DSA */
Packit Service 31306d
        case SSH_KEYTYPE_RSA:
Packit Service 31306d
            opts = SSH_BIND_OPTIONS_RSAKEY;
Packit Service 31306d
            break;
Packit Service 31306d
        case SSH_KEYTYPE_ECDSA_P256:
Packit Service 31306d
        case SSH_KEYTYPE_ECDSA_P384:
Packit Service 31306d
        case SSH_KEYTYPE_ECDSA_P521:
Packit Service 31306d
            opts = SSH_BIND_OPTIONS_ECDSAKEY;
Packit Service 31306d
            break;
Packit Service 31306d
        default:
Packit Service 31306d
            goto out_free;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = ssh_bind_options_set(sshbind, opts, private_key_file);
Packit Service 31306d
    if (rc != 0) {
Packit Service 31306d
        goto out_free;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = ssh_bind_listen(sshbind);
Packit Service 31306d
    if (rc != SSH_OK) {
Packit Service 31306d
        goto out_free;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    goto out;
Packit Service 31306d
 out_free:
Packit Service 31306d
    ssh_bind_free(sshbind);
Packit Service 31306d
    sshbind = NULL;
Packit Service 31306d
 out:
Packit Service 31306d
    return sshbind;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
#endif /* WITH_SERVER */
Packit Service 31306d
Packit Service 31306d
#ifdef WITH_SFTP
Packit Service 31306d
Packit Service 31306d
struct torture_sftp *torture_sftp_session(ssh_session session) {
Packit Service 31306d
    struct torture_sftp *t;
Packit Service 31306d
    char template[] = "/tmp/ssh_torture_XXXXXX";
Packit Service 31306d
    char *p;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    if (session == NULL) {
Packit Service 31306d
        return NULL;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    t = malloc(sizeof(struct torture_sftp));
Packit Service 31306d
    if (t == NULL) {
Packit Service 31306d
        return NULL;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    t->ssh = session;
Packit Service 31306d
    t->sftp = sftp_new(session);
Packit Service 31306d
    if (t->sftp == NULL) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = sftp_init(t->sftp);
Packit Service 31306d
    if (rc < 0) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    p = mkdtemp(template);
Packit Service 31306d
    if (p == NULL) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
    /* useful if TESTUSER is not the local user */
Packit Service 31306d
    chmod(template,0777);
Packit Service 31306d
    t->testdir = strdup(p);
Packit Service 31306d
    if (t->testdir == NULL) {
Packit Service 31306d
        goto failed;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return t;
Packit Service 31306d
failed:
Packit Service 31306d
    if (t->sftp != NULL) {
Packit Service 31306d
        sftp_free(t->sftp);
Packit Service 31306d
    }
Packit Service 31306d
    ssh_disconnect(t->ssh);
Packit Service 31306d
    ssh_free(t->ssh);
Packit Service 31306d
    free(t);
Packit Service 31306d
Packit Service 31306d
    return NULL;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void torture_sftp_close(struct torture_sftp *t) {
Packit Service 31306d
    if (t == NULL) {
Packit Service 31306d
        return;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (t->sftp != NULL) {
Packit Service 31306d
        sftp_free(t->sftp);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    free(t->testdir);
Packit Service 31306d
    free(t);
Packit Service 31306d
}
Packit Service 31306d
#endif /* WITH_SFTP */
Packit Service 31306d
Packit Service 31306d
int torture_server_port(void)
Packit Service 31306d
{
Packit Service 31306d
    char *env = getenv("TORTURE_SERVER_PORT");
Packit Service 31306d
Packit Service 31306d
    if (env != NULL && env[0] != '\0' && strlen(env) < 6) {
Packit Service 31306d
        int port = atoi(env);
Packit Service 31306d
Packit Service 31306d
        if (port > 0 && port < 65536) {
Packit Service 31306d
            return port;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return TORTURE_SSHD_SRV_PORT;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
const char *torture_server_address(int family)
Packit Service 31306d
{
Packit Service 31306d
    switch (family) {
Packit Service 31306d
    case AF_INET: {
Packit Service 31306d
        const char *ip4 = getenv("TORTURE_SERVER_ADDRESS_IPV4");
Packit Service 31306d
Packit Service 31306d
        if (ip4 != NULL && ip4[0] != '\0') {
Packit Service 31306d
            return ip4;
Packit Service 31306d
        }
Packit Service 31306d
Packit Service 31306d
        return TORTURE_SSHD_SRV_IPV4;
Packit Service 31306d
    }
Packit Service 31306d
    case AF_INET6: {
Packit Service 31306d
        const char *ip6 = getenv("TORTURE_SERVER_ADDRESS_IPV6");
Packit Service 31306d
Packit Service 31306d
        if (ip6 != NULL && ip6[0] != '\0') {
Packit Service 31306d
            return ip6;
Packit Service 31306d
        }
Packit Service 31306d
Packit Service 31306d
        return TORTURE_SSHD_SRV_IPV6;
Packit Service 31306d
    }
Packit Service 31306d
    default:
Packit Service 31306d
        return NULL;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return NULL;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void torture_setup_socket_dir(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct torture_state *s;
Packit Service 31306d
    const char *p;
Packit Service 31306d
    size_t len;
Packit Service 31306d
    char *env = NULL;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    s = calloc(1, sizeof(struct torture_state));
Packit Service 31306d
    assert_non_null(s);
Packit Service 31306d
Packit Service 31306d
#ifdef WITH_PCAP
Packit Service 31306d
    env = getenv("TORTURE_PLAIN_PCAP_FILE");
Packit Service 31306d
    if (env != NULL && env[0] != '\0') {
Packit Service 31306d
        s->plain_pcap = ssh_pcap_file_new();
Packit Service 31306d
        assert_non_null(s->plain_pcap);
Packit Service 31306d
Packit Service 31306d
        rc = ssh_pcap_file_open(s->plain_pcap, env);
Packit Service 31306d
        assert_int_equal(rc, SSH_OK);
Packit Service 31306d
    }
Packit Service 31306d
#endif /* WITH_PCAP */
Packit Service 31306d
Packit Service 31306d
    s->socket_dir = torture_make_temp_dir(TORTURE_SOCKET_DIR);
Packit Service 31306d
    assert_non_null(s->socket_dir);
Packit Service 31306d
Packit Service 31306d
    p = s->socket_dir;
Packit Service 31306d
Packit Service 31306d
    /* pcap file */
Packit Service 31306d
    len = strlen(p) + 1 + strlen(TORTURE_PCAP_FILE) + 1;
Packit Service 31306d
Packit Service 31306d
    s->pcap_file = malloc(len);
Packit Service 31306d
    assert_non_null(s->pcap_file);
Packit Service 31306d
Packit Service 31306d
    snprintf(s->pcap_file, len, "%s/%s", p, TORTURE_PCAP_FILE);
Packit Service 31306d
Packit Service 31306d
    /* pid file */
Packit Service 31306d
    len = strlen(p) + 1 + strlen(TORTURE_SSHD_PIDFILE) + 1;
Packit Service 31306d
Packit Service 31306d
    s->srv_pidfile = malloc(len);
Packit Service 31306d
    assert_non_null(s->srv_pidfile);
Packit Service 31306d
Packit Service 31306d
    snprintf(s->srv_pidfile, len, "%s/%s", p, TORTURE_SSHD_PIDFILE);
Packit Service 31306d
Packit Service 31306d
    /* config file */
Packit Service 31306d
    len = strlen(p) + 1 + strlen(TORTURE_SSHD_CONFIG) + 1;
Packit Service 31306d
Packit Service 31306d
    s->srv_config = malloc(len);
Packit Service 31306d
    assert_non_null(s->srv_config);
Packit Service 31306d
Packit Service 31306d
    snprintf(s->srv_config, len, "%s/%s", p, TORTURE_SSHD_CONFIG);
Packit Service 31306d
Packit Service 31306d
    setenv("SOCKET_WRAPPER_DIR", p, 1);
Packit Service 31306d
    setenv("SOCKET_WRAPPER_DEFAULT_IFACE", "170", 1);
Packit Service 31306d
    env = getenv("TORTURE_GENERATE_PCAP");
Packit Service 31306d
    if (env != NULL && env[0] == '1') {
Packit Service 31306d
        setenv("SOCKET_WRAPPER_PCAP_FILE", s->pcap_file, 1);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    *state = s;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static void torture_setup_create_sshd_config(void **state, bool pam)
Packit Service 31306d
{
Packit Service 31306d
    struct torture_state *s = *state;
Packit Service 31306d
    char ed25519_hostkey[1024] = {0};
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
    char dsa_hostkey[1024];
Packit Service 31306d
#endif /* HAVE_DSA */
Packit Service 31306d
    char rsa_hostkey[1024];
Packit Service 31306d
    char ecdsa_hostkey[1024];
Packit Service 31306d
    char trusted_ca_pubkey[1024];
Packit Service 31306d
    char sshd_config[4096];
Packit Service 31306d
    char sshd_path[1024];
Packit Service 31306d
    const char *additional_config = NULL;
Packit Service 31306d
    struct stat sb;
Packit Service 31306d
    const char *sftp_server_locations[] = {
Packit Service 31306d
        "/usr/lib/ssh/sftp-server",
Packit Service 31306d
        "/usr/libexec/sftp-server",
Packit Service 31306d
        "/usr/libexec/openssh/sftp-server",
Packit Service 31306d
        "/usr/lib/openssh/sftp-server",     /* Debian */
Packit Service 31306d
    };
Packit Service 31306d
#ifndef OPENSSH_VERSION_MAJOR
Packit Service 31306d
#define OPENSSH_VERSION_MAJOR 7U
Packit Service 31306d
#define OPENSSH_VERSION_MINOR 0U
Packit Service 31306d
#endif /* OPENSSH_VERSION_MAJOR */
Packit Service 31306d
    const char config_string[]=
Packit Service 31306d
             "Port 22\n"
Packit Service 31306d
             "ListenAddress 127.0.0.10\n"
Packit Service 31306d
             "%s %s\n"
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
             "%s %s\n"
Packit Service 31306d
#endif /* HAVE_DSA */
Packit Service 31306d
             "%s %s\n"
Packit Service 31306d
             "%s %s\n"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "TrustedUserCAKeys %s\n"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "LogLevel DEBUG3\n"
Packit Service 31306d
             "Subsystem sftp %s -l DEBUG2\n"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "PasswordAuthentication yes\n"
Packit Service 31306d
             "PubkeyAuthentication yes\n"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "StrictModes no\n"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "%s" /* Here comes UsePam */
Packit Service 31306d
             "\n"
Packit Service 31306d
#if (OPENSSH_VERSION_MAJOR == 6 && OPENSSH_VERSION_MINOR >= 7) || (OPENSSH_VERSION_MAJOR >= 7)
Packit Service 31306d
# ifdef HAVE_DSA
Packit Service 31306d
             "HostKeyAlgorithms +ssh-dss\n"
Packit Service 31306d
# else /* HAVE_DSA */
Packit Service 31306d
             "HostKeyAlgorithms +ssh-rsa\n"
Packit Service 31306d
# endif /* HAVE_DSA */
Packit Service e2dda9
/* Add back algorithms removed from default in OpenSSH-8.2 due to SHA1
Packit Service e2dda9
 * deprecation*/
Packit Service e2dda9
# if (OPENSSH_VERSION_MAJOR == 8 && OPENSSH_VERSION_MINOR >= 2)
Packit Service e2dda9
             "KexAlgorithms +diffie-hellman-group14-sha1,"
Packit Service e2dda9
             "diffie-hellman-group-exchange-sha1,"
Packit Service e2dda9
             "diffie-hellman-group1-sha1\n"
Packit Service e2dda9
             "HostKeyAlgorithms +ssh-rsa\n"
Packit Service e2dda9
             "CASignatureAlgorithms +ssh-rsa\n"
Packit Service e2dda9
#endif
Packit Service 31306d
# if (OPENSSH_VERSION_MAJOR == 7 && OPENSSH_VERSION_MINOR < 6)
Packit Service 31306d
             "Ciphers +3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc\n"
Packit Service 31306d
# else /* OPENSSH_VERSION 7.0 - 7.5 */
Packit Service 31306d
             "Ciphers +3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc\n"
Packit Service 31306d
# endif /* OPENSSH_VERSION 7.0 - 7.6 */
Packit Service 31306d
             "KexAlgorithms +diffie-hellman-group1-sha1,"
Packit Service 31306d
             "diffie-hellman-group-exchange-sha1"
Packit Service 31306d
#else /* OPENSSH_VERSION >= 6.7 */
Packit Service 31306d
             "Ciphers 3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,"
Packit Service 31306d
                     "aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,"
Packit Service 31306d
                     "aes256-gcm@openssh.com,arcfour128,arcfour256,arcfour,"
Packit Service 31306d
                     "blowfish-cbc,cast128-cbc,chacha20-poly1305@openssh.com\n"
Packit Service 31306d
             "KexAlgorithms curve25519-sha256@libssh.org,ecdh-sha2-nistp256,"
Packit Service 31306d
                           "ecdh-sha2-nistp384,ecdh-sha2-nistp521,"
Packit Service 31306d
                           "diffie-hellman-group-exchange-sha256,"
Packit Service 31306d
                           "diffie-hellman-group-exchange-sha1,"
Packit Service 31306d
                           "diffie-hellman-group16-sha512,"
Packit Service 31306d
                           "diffie-hellman-group18-sha512,"
Packit Service 31306d
                           "diffie-hellman-group14-sha1,"
Packit Service 31306d
                           "diffie-hellman-group1-sha1\n"
Packit Service 31306d
#endif /* OPENSSH_VERSION >= 6.7 */
Packit Service 31306d
             "\n"
Packit Service 31306d
             "AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES\n"
Packit Service 31306d
             "AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT\n"
Packit Service 31306d
             "AcceptEnv LC_IDENTIFICATION LC_ALL LC_LIBSSH\n"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "PidFile %s\n"
Packit Service 31306d
             "%s\n"; /* The space for test-specific options */
Packit Service 31306d
    /* FIPS config */
Packit Service 31306d
    const char fips_config_string[]=
Packit Service 31306d
             "Port 22\n"
Packit Service 31306d
             "ListenAddress 127.0.0.10\n"
Packit Service 31306d
             "%s %s\n" /* HostKey */
Packit Service 31306d
             "%s %s\n" /* HostKey */
Packit Service 31306d
             "\n"
Packit Service 31306d
             "TrustedUserCAKeys %s\n" /* Trusted CA */
Packit Service 31306d
             "\n"
Packit Service 31306d
             "LogLevel DEBUG3\n"
Packit Service 31306d
             "Subsystem sftp %s -l DEBUG2\n" /* SFTP server */
Packit Service 31306d
             "\n"
Packit Service 31306d
             "PasswordAuthentication yes\n"
Packit Service 31306d
             "PubkeyAuthentication yes\n"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "StrictModes no\n"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "%s" /* UsePam */
Packit Service 31306d
             "\n"
Packit Service 31306d
             "Ciphers "
Packit Service 31306d
                "aes256-gcm@openssh.com,aes256-ctr,aes256-cbc,"
Packit Service 31306d
                "aes128-gcm@openssh.com,aes128-ctr,aes128-cbc"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "MACs "
Packit Service 31306d
                "hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,"
Packit Service 31306d
                "hmac-sha2-512-etm@openssh.com,hmac-sha2-256,"
Packit Service 31306d
                "hmac-sha1,hmac-sha2-512"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "GSSAPIKeyExchange no\n"
Packit Service 31306d
             "KexAlgorithms "
Packit Service 31306d
                "ecdh-sha2-nistp256,ecdh-sha2-nistp384,"
Packit Service 31306d
                "ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,"
Packit Service 31306d
                "diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,"
Packit Service 31306d
                "diffie-hellman-group18-sha512"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "PubkeyAcceptedKeyTypes "
Packit Service 31306d
                "rsa-sha2-256,rsa-sha2-256-cert-v01@openssh.com,"
Packit Service 31306d
                "ecdsa-sha2-nistp256,ecdsa-sha2-nistp256-cert-v01@openssh.com,"
Packit Service 31306d
                "ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com,"
Packit Service 31306d
                "rsa-sha2-512,rsa-sha2-512-cert-v01@openssh.com,"
Packit Service 31306d
                "ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES\n"
Packit Service 31306d
             "AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT\n"
Packit Service 31306d
             "AcceptEnv LC_IDENTIFICATION LC_ALL LC_LIBSSH\n"
Packit Service 31306d
             "\n"
Packit Service 31306d
             "PidFile %s\n" /* PID file */
Packit Service 31306d
             "%s\n"; /* The space for test-specific options */
Packit Service 31306d
    const char usepam_yes[] =
Packit Service 31306d
             "UsePAM yes\n"
Packit Service 31306d
             "KbdInteractiveAuthentication yes\n";
Packit Service 31306d
    const char usepam_no[] =
Packit Service 31306d
             "UsePAM no\n"
Packit Service 31306d
             "KbdInteractiveAuthentication no\n";
Packit Service 31306d
    size_t sftp_sl_size = ARRAY_SIZE(sftp_server_locations);
Packit Service 31306d
    const char *sftp_server, *usepam;
Packit Service 31306d
    size_t i;
Packit Service 31306d
    bool written = false;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    s->srv_pam = pam;
Packit Service 31306d
    if (pam) {
Packit Service 31306d
        usepam = usepam_yes;
Packit Service 31306d
    } else {
Packit Service 31306d
        usepam = usepam_no;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    assert_non_null(s->socket_dir);
Packit Service 31306d
Packit Service 31306d
    snprintf(sshd_path,
Packit Service 31306d
             sizeof(sshd_path),
Packit Service 31306d
             "%s/sshd",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
Packit Service 31306d
    rc = lstat(sshd_path, &sb);
Packit Service 31306d
    if (rc == 0 ) { /* The directory is already in place */
Packit Service 31306d
        written = true;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (!written) {
Packit Service 31306d
        rc = mkdir(sshd_path, 0755);
Packit Service 31306d
        assert_return_code(rc, errno);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    snprintf(ed25519_hostkey,
Packit Service 31306d
             sizeof(ed25519_hostkey),
Packit Service 31306d
             "%s/sshd/ssh_host_ed25519_key",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
    snprintf(dsa_hostkey,
Packit Service 31306d
             sizeof(dsa_hostkey),
Packit Service 31306d
             "%s/sshd/ssh_host_dsa_key",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
#endif /* HAVE_DSA */
Packit Service 31306d
Packit Service 31306d
    snprintf(rsa_hostkey,
Packit Service 31306d
             sizeof(rsa_hostkey),
Packit Service 31306d
             "%s/sshd/ssh_host_rsa_key",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
Packit Service 31306d
    snprintf(ecdsa_hostkey,
Packit Service 31306d
             sizeof(ecdsa_hostkey),
Packit Service 31306d
             "%s/sshd/ssh_host_ecdsa_key",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
Packit Service 31306d
    snprintf(trusted_ca_pubkey,
Packit Service 31306d
             sizeof(trusted_ca_pubkey),
Packit Service 31306d
             "%s/sshd/user_ca.pub",
Packit Service 31306d
             s->socket_dir);
Packit Service 31306d
Packit Service 31306d
    if (!written) {
Packit Service 31306d
        torture_write_file(ed25519_hostkey,
Packit Service 31306d
                           torture_get_openssh_testkey(SSH_KEYTYPE_ED25519, 0));
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
        torture_write_file(dsa_hostkey,
Packit Service 31306d
                           torture_get_testkey(SSH_KEYTYPE_DSS, 0));
Packit Service 31306d
#endif /* HAVE_DSA */
Packit Service 31306d
        torture_write_file(rsa_hostkey,
Packit Service 31306d
                           torture_get_testkey(SSH_KEYTYPE_RSA, 0));
Packit Service 31306d
        torture_write_file(ecdsa_hostkey,
Packit Service 31306d
                           torture_get_testkey(SSH_KEYTYPE_ECDSA_P521, 0));
Packit Service 31306d
        torture_write_file(trusted_ca_pubkey, torture_rsa_certauth_pub);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    sftp_server = getenv("TORTURE_SFTP_SERVER");
Packit Service 31306d
    if (sftp_server == NULL) {
Packit Service 31306d
        for (i = 0; i < sftp_sl_size; i++) {
Packit Service 31306d
            sftp_server = sftp_server_locations[i];
Packit Service 31306d
            rc = lstat(sftp_server, &sb);
Packit Service 31306d
            if (rc == 0) {
Packit Service 31306d
                break;
Packit Service 31306d
            }
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
    assert_non_null(sftp_server);
Packit Service 31306d
Packit Service 31306d
    additional_config = (s->srv_additional_config != NULL ?
Packit Service 31306d
                         s->srv_additional_config : "");
Packit Service 31306d
Packit Service 31306d
    if (ssh_fips_mode()) {
Packit Service 31306d
        snprintf(sshd_config, sizeof(sshd_config),
Packit Service 31306d
                fips_config_string,
Packit Service 31306d
                "HostKey", rsa_hostkey,
Packit Service 31306d
                "HostKey", ecdsa_hostkey,
Packit Service 31306d
                trusted_ca_pubkey,
Packit Service 31306d
                sftp_server,
Packit Service 31306d
                usepam,
Packit Service 31306d
                s->srv_pidfile,
Packit Service 31306d
                additional_config);
Packit Service 31306d
    } else {
Packit Service 31306d
        snprintf(sshd_config, sizeof(sshd_config),
Packit Service 31306d
                config_string,
Packit Service 31306d
                "HostKey", ed25519_hostkey,
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
                "HostKey", dsa_hostkey,
Packit Service 31306d
#endif /* HAVE_DSA */
Packit Service 31306d
                "HostKey", rsa_hostkey,
Packit Service 31306d
                "HostKey", ecdsa_hostkey,
Packit Service 31306d
                trusted_ca_pubkey,
Packit Service 31306d
                sftp_server,
Packit Service 31306d
                usepam,
Packit Service 31306d
                s->srv_pidfile,
Packit Service 31306d
                additional_config);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    torture_write_file(s->srv_config, sshd_config);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static int torture_wait_for_daemon(unsigned int seconds)
Packit Service 31306d
{
Packit Service 31306d
    struct ssh_timestamp start;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    ssh_timestamp_init(&start;;
Packit Service 31306d
Packit Service 31306d
    while (!ssh_timeout_elapsed(&start, seconds * 1000)) {
Packit Service 31306d
        rc = system(SSH_PING_EXECUTABLE " " TORTURE_SSH_SERVER);
Packit Service 31306d
        if (rc == 0) {
Packit Service 31306d
            return 0;
Packit Service 31306d
        }
Packit Service 31306d
        /* Wait 200 ms before retrying */
Packit Service 31306d
        usleep(200 * 1000);
Packit Service 31306d
    }
Packit Service 31306d
    return 1;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void torture_setup_sshd_server(void **state, bool pam)
Packit Service 31306d
{
Packit Service 31306d
    struct torture_state *s;
Packit Service 31306d
    char sshd_start_cmd[1024];
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    torture_setup_socket_dir(state);
Packit Service 31306d
    torture_setup_create_sshd_config(state, pam);
Packit Service 31306d
Packit Service 31306d
    /* Set the default interface for the server */
Packit Service 31306d
    setenv("SOCKET_WRAPPER_DEFAULT_IFACE", "10", 1);
Packit Service 31306d
    setenv("PAM_WRAPPER", "1", 1);
Packit Service 31306d
Packit Service 31306d
    s = *state;
Packit Service 31306d
Packit Service 31306d
    snprintf(sshd_start_cmd, sizeof(sshd_start_cmd),
Packit Service 31306d
             "/usr/sbin/sshd -r -f %s -E %s/sshd/daemon.log 2> %s/sshd/cwrap.log",
Packit Service 31306d
             s->srv_config, s->socket_dir, s->socket_dir);
Packit Service 31306d
Packit Service 31306d
    rc = system(sshd_start_cmd);
Packit Service 31306d
    assert_return_code(rc, errno);
Packit Service 31306d
Packit Service 31306d
    setenv("SOCKET_WRAPPER_DEFAULT_IFACE", "21", 1);
Packit Service 31306d
    unsetenv("PAM_WRAPPER");
Packit Service 31306d
Packit Service 31306d
    /* Wait until the sshd is ready to accept connections */
Packit Service 31306d
    rc = torture_wait_for_daemon(5);
Packit Service 31306d
    assert_int_equal(rc, 0);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void torture_teardown_socket_dir(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct torture_state *s = *state;
Packit Service 31306d
    char *env = getenv("TORTURE_SKIP_CLEANUP");
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    if (env != NULL && env[0] == '1') {
Packit Service 31306d
        fprintf(stderr, "[ TORTURE  ] >>> Skipping cleanup of %s\n", s->socket_dir);
Packit Service 31306d
    } else {
Packit Service 31306d
        rc = torture_rmdirs(s->socket_dir);
Packit Service 31306d
        if (rc < 0) {
Packit Service 31306d
            fprintf(stderr,
Packit Service 31306d
                    "torture_rmdirs(%s) failed: %s",
Packit Service 31306d
                    s->socket_dir,
Packit Service 31306d
                    strerror(errno));
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
#ifdef WITH_PCAP
Packit Service 31306d
    if (s->plain_pcap != NULL) {
Packit Service 31306d
        ssh_pcap_file_free(s->plain_pcap);
Packit Service 31306d
    }
Packit Service 31306d
    s->plain_pcap = NULL;
Packit Service 31306d
#endif /* WITH_PCAP */
Packit Service 31306d
Packit Service 31306d
    free(s->srv_config);
Packit Service 31306d
    free(s->socket_dir);
Packit Service 31306d
    free(s->pcap_file);
Packit Service 31306d
    free(s->srv_pidfile);
Packit Service 31306d
    free(s->srv_additional_config);
Packit Service 31306d
    free(s);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static int
Packit Service 31306d
torture_reload_sshd_server(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct torture_state *s = *state;
Packit Service 31306d
    pid_t pid;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    /* read the pidfile */
Packit Service 31306d
    pid = torture_read_pidfile(s->srv_pidfile);
Packit Service 31306d
    assert_int_not_equal(pid, -1);
Packit Service 31306d
Packit Service 31306d
    kill(pid, SIGHUP);
Packit Service 31306d
Packit Service 31306d
    /* 10 ms */
Packit Service 31306d
    usleep(10 * 1000);
Packit Service 31306d
Packit Service 31306d
    rc = kill(pid, 0);
Packit Service 31306d
    if (rc != 0) {
Packit Service 31306d
        fprintf(stderr,
Packit Service 31306d
                "ERROR: SSHD process %u died during reload!\n", pid);
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* Wait until the sshd is ready to accept connections */
Packit Service 31306d
    rc = torture_wait_for_daemon(5);
Packit Service 31306d
    assert_int_equal(rc, 0);
Packit Service 31306d
    return SSH_OK;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/* @brief: Updates SSHD server configuration with more options and
Packit Service 31306d
 *         reloads the server to apply them.
Packit Service 31306d
 * Note, that this still uses the default configuration options specified
Packit Service 31306d
 * in this file and overwrites options previously specified by this function.
Packit Service 31306d
 */
Packit Service 31306d
int
Packit Service 31306d
torture_update_sshd_config(void **state, const char *config)
Packit Service 31306d
{
Packit Service 31306d
    struct torture_state *s = *state;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    /* Store the configuration in internal structure */
Packit Service 31306d
    SAFE_FREE(s->srv_additional_config);
Packit Service 31306d
    s->srv_additional_config = strdup(config);
Packit Service 31306d
    assert_non_null(s->srv_additional_config);
Packit Service 31306d
Packit Service 31306d
    /* Rewrite the configuration file */
Packit Service 31306d
    torture_setup_create_sshd_config(state, s->srv_pam);
Packit Service 31306d
Packit Service 31306d
    /* Reload the server */
Packit Service 31306d
    rc = torture_reload_sshd_server(state);
Packit Service 31306d
    assert_int_equal(rc, SSH_OK);
Packit Service 31306d
Packit Service 31306d
    return SSH_OK;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
Packit Service 31306d
void torture_teardown_sshd_server(void **state)
Packit Service 31306d
{
Packit Service 31306d
    struct torture_state *s = *state;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    rc = torture_terminate_process(s->srv_pidfile);
Packit Service 31306d
    if (rc != 0) {
Packit Service 31306d
        fprintf(stderr, "XXXXXX Failed to terminate sshd\n");
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    torture_teardown_socket_dir(state);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
char *torture_make_temp_dir(const char *template)
Packit Service 31306d
{
Packit Service 31306d
    char *new_dir = NULL;
Packit Service 31306d
    char *template_copy = NULL;
Packit Service 31306d
Packit Service 31306d
    if (template == NULL) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    template_copy = strdup(template);
Packit Service 31306d
    if (template_copy == NULL) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    new_dir = mkdtemp(template_copy);
Packit Service 31306d
    if (new_dir == NULL) {
Packit Service 31306d
        SAFE_FREE(template_copy);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
end:
Packit Service 31306d
    return template_copy;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
char *torture_create_temp_file(const char *template)
Packit Service 31306d
{
Packit Service 31306d
    char *new_file = NULL;
Packit Service 31306d
    FILE *fp = NULL;
Packit Service 31306d
    mode_t mask;
Packit Service 31306d
    int fd;
Packit Service 31306d
Packit Service 31306d
    new_file = strdup(template);
Packit Service 31306d
    if (new_file == NULL) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    mask = umask(S_IRWXO | S_IRWXG);
Packit Service 31306d
    fd = mkstemp(new_file);
Packit Service 31306d
    umask(mask);
Packit Service 31306d
    if (fd == -1) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    fp = fdopen(fd, "w");
Packit Service 31306d
    if (fp == NULL) {
Packit Service 31306d
        SAFE_FREE(new_file);
Packit Service 31306d
        close(fd);
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    fclose(fp);
Packit Service 31306d
Packit Service 31306d
end:
Packit Service 31306d
    return new_file;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
char *torture_get_current_working_dir(void)
Packit Service 31306d
{
Packit Service 31306d
Packit Service 31306d
    char *cwd = NULL;
Packit Service 31306d
    char *result = NULL;
Packit Service 31306d
Packit Service 31306d
    cwd = (char *)malloc(PATH_MAX + 1);
Packit Service 31306d
    if (cwd == NULL) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    result = getcwd(cwd, PATH_MAX);
Packit Service 31306d
Packit Service 31306d
    if (result == NULL) {
Packit Service 31306d
        SAFE_FREE(cwd);
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
end:
Packit Service 31306d
    return cwd;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
#else /* _WIN32 */
Packit Service 31306d
Packit Service 31306d
char *torture_make_temp_dir(const char *template)
Packit Service 31306d
{
Packit Service 31306d
    DWORD rc = 0;
Packit Service 31306d
    char tmp_dir_path[MAX_PATH];
Packit Service 31306d
    char tmp_file_name[MAX_PATH];
Packit Service 31306d
    char *prefix = NULL;
Packit Service 31306d
    char *path = NULL;
Packit Service 31306d
    char *prefix_end = NULL;
Packit Service 31306d
    char *slash = NULL;
Packit Service 31306d
Packit Service 31306d
    BOOL created;
Packit Service 31306d
Packit Service 31306d
    if (template == NULL) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    prefix = strdup(template);
Packit Service 31306d
    if (prefix == NULL) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* Replace slashes with backslashes */
Packit Service 31306d
    slash = strchr(prefix, '/');
Packit Service 31306d
    for (; slash != NULL; slash = strchr(prefix, '/')) {
Packit Service 31306d
        *slash = '\\';
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    prefix_end = strstr(prefix, "XXXXXX");
Packit Service 31306d
    if (prefix_end != NULL) {
Packit Service 31306d
        *prefix_end = '\0';
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = GetTempPathA(MAX_PATH, tmp_dir_path);
Packit Service 31306d
    if ((rc > MAX_PATH) || (rc == 0)) {
Packit Service 31306d
        goto free_prefix;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = GetTempFileNameA(tmp_dir_path, TEXT(prefix), 0, tmp_file_name);
Packit Service 31306d
    if (rc == 0) {
Packit Service 31306d
        goto free_prefix;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    path = strdup(tmp_file_name);
Packit Service 31306d
    if (path == NULL) {
Packit Service 31306d
        goto free_prefix;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* GetTempFileNameA() creates a temporary file; we need to remove it */
Packit Service 31306d
    rc = DeleteFileA(path);
Packit Service 31306d
    if (rc == 0) {
Packit Service 31306d
        rc = -1;
Packit Service 31306d
        SAFE_FREE(path);
Packit Service 31306d
        goto free_prefix;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    created = CreateDirectoryA(path, NULL);
Packit Service 31306d
    if (!created) {
Packit Service 31306d
        SAFE_FREE(path);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
free_prefix:
Packit Service 31306d
    SAFE_FREE(prefix);
Packit Service 31306d
end:
Packit Service 31306d
    return path;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static int recursive_rm_dir_content(const char *path)
Packit Service 31306d
{
Packit Service 31306d
    WIN32_FIND_DATA file_data;
Packit Service 31306d
    HANDLE file_handle;
Packit Service 31306d
    DWORD attributes;
Packit Service 31306d
Packit Service 31306d
    DWORD last_error = 0;
Packit Service 31306d
Packit Service 31306d
    char file_path[MAX_PATH];
Packit Service 31306d
Packit Service 31306d
    int rc = 0;
Packit Service 31306d
    BOOL removed;
Packit Service 31306d
Packit Service 31306d
    strcpy(file_path, path);
Packit Service 31306d
    strcat(file_path, "\\*");
Packit Service 31306d
Packit Service 31306d
    file_handle = FindFirstFile(file_path, &file_data);
Packit Service 31306d
Packit Service 31306d
    if (file_handle == INVALID_HANDLE_VALUE) {
Packit Service 31306d
        last_error = GetLastError();
Packit Service 31306d
Packit Service 31306d
        /* Empty directory */
Packit Service 31306d
        if (last_error == ERROR_FILE_NOT_FOUND) {
Packit Service 31306d
            rc = 0;
Packit Service 31306d
        }
Packit Service 31306d
        else {
Packit Service 31306d
            /*TODO print error message?*/
Packit Service 31306d
            rc = last_error;
Packit Service 31306d
        }
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
    else {
Packit Service 31306d
        do {
Packit Service 31306d
            rc = strcmp(file_data.cFileName, ".");
Packit Service 31306d
            if (rc == 0) {
Packit Service 31306d
                continue;
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            rc = strcmp(file_data.cFileName, "..");
Packit Service 31306d
            if (rc == 0) {
Packit Service 31306d
                continue;
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            /* Create full file path */
Packit Service 31306d
            strcpy(file_path, path);
Packit Service 31306d
            strcat(file_path, "\\");
Packit Service 31306d
            strcat(file_path, file_data.cFileName);
Packit Service 31306d
Packit Service 31306d
            attributes = GetFileAttributes(file_path);
Packit Service 31306d
            if (attributes & FILE_ATTRIBUTE_DIRECTORY) {
Packit Service 31306d
                rc = recursive_rm_dir_content((const char *)file_path);
Packit Service 31306d
                if (rc != 0) {
Packit Service 31306d
                    goto end;
Packit Service 31306d
                }
Packit Service 31306d
Packit Service 31306d
                removed = RemoveDirectoryA(file_path);
Packit Service 31306d
Packit Service 31306d
                if (!removed) {
Packit Service 31306d
                    last_error = GetLastError();
Packit Service 31306d
Packit Service 31306d
                    /*TODO print error message?*/
Packit Service 31306d
Packit Service 31306d
                    rc = last_error;
Packit Service 31306d
                    goto end;
Packit Service 31306d
                }
Packit Service 31306d
            }
Packit Service 31306d
            else {
Packit Service 31306d
                rc = remove(file_path);
Packit Service 31306d
                if (rc) {
Packit Service 31306d
                    goto end;
Packit Service 31306d
                }
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
        } while(FindNextFile(file_handle, &file_data));
Packit Service 31306d
Packit Service 31306d
        FindClose(file_handle);
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
end:
Packit Service 31306d
    return rc;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int torture_rmdirs(const char *path)
Packit Service 31306d
{
Packit Service 31306d
    int rc = 0;
Packit Service 31306d
    BOOL removed;
Packit Service 31306d
Packit Service 31306d
    rc = recursive_rm_dir_content(path);
Packit Service 31306d
    if (rc) {
Packit Service 31306d
        return rc;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    removed = RemoveDirectoryA(path);
Packit Service 31306d
    if (!removed) {
Packit Service 31306d
        rc = -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return rc;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int torture_isdir(const char *path)
Packit Service 31306d
{
Packit Service 31306d
Packit Service 31306d
    DWORD attributes = 0;
Packit Service 31306d
Packit Service 31306d
    attributes = GetFileAttributes(path);
Packit Service 31306d
    if (attributes & FILE_ATTRIBUTE_DIRECTORY) {
Packit Service 31306d
        return 1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
char *torture_create_temp_file(const char *template)
Packit Service 31306d
{
Packit Service 31306d
    DWORD rc = 0;
Packit Service 31306d
    char tmp_dir_path[MAX_PATH];
Packit Service 31306d
    char tmp_file_name[MAX_PATH];
Packit Service 31306d
    char *prefix = NULL;
Packit Service 31306d
    char *path = NULL;
Packit Service 31306d
    char *prefix_end = NULL;
Packit Service 31306d
    char *slash = NULL;
Packit Service 31306d
Packit Service 31306d
    if (template == NULL) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    prefix = strdup(template);
Packit Service 31306d
    if (prefix == NULL) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* Replace slashes with backslashes */
Packit Service 31306d
    slash = strchr(prefix, '/');
Packit Service 31306d
    for (; slash != NULL; slash = strchr(prefix, '/')) {
Packit Service 31306d
        *slash = '\\';
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    prefix_end = strstr(prefix, "XXXXXX");
Packit Service 31306d
    if (prefix_end != NULL) {
Packit Service 31306d
        *prefix_end = '\0';
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = GetTempPathA(MAX_PATH, tmp_dir_path);
Packit Service 31306d
    if ((rc > MAX_PATH) || (rc == 0)) {
Packit Service 31306d
        goto free_prefix;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* Remark: this function creates the file */
Packit Service 31306d
    rc = GetTempFileNameA(tmp_dir_path, TEXT(prefix), 0, tmp_file_name);
Packit Service 31306d
    if (rc == 0) {
Packit Service 31306d
        goto free_prefix;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    path = strdup(tmp_file_name);
Packit Service 31306d
Packit Service 31306d
free_prefix:
Packit Service 31306d
    SAFE_FREE(prefix);
Packit Service 31306d
end:
Packit Service 31306d
    return path;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
char *torture_get_current_working_dir(void)
Packit Service 31306d
{
Packit Service 31306d
    char *cwd = NULL;
Packit Service 31306d
    char *result = NULL;
Packit Service 31306d
Packit Service 31306d
    cwd = (char *)malloc(_MAX_PATH + 1);
Packit Service 31306d
    if (cwd == NULL) {
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    result = _getcwd(cwd, _MAX_PATH);
Packit Service 31306d
Packit Service 31306d
    if (result == NULL) {
Packit Service 31306d
        SAFE_FREE(cwd);
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
end:
Packit Service 31306d
    return cwd;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
#endif /* _WIN32 */
Packit Service 31306d
Packit Service 31306d
int torture_change_dir(char *path)
Packit Service 31306d
{
Packit Service 31306d
    int rc = 0;
Packit Service 31306d
Packit Service 31306d
    if (path == NULL) {
Packit Service 31306d
        rc = -1;
Packit Service 31306d
        goto end;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    rc = chdir(path);
Packit Service 31306d
Packit Service 31306d
end:
Packit Service 31306d
    return rc;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int torture_libssh_verbosity(void){
Packit Service 31306d
  return verbosity;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void _torture_filter_tests(struct CMUnitTest *tests, size_t ntests)
Packit Service 31306d
{
Packit Service 31306d
    (void) tests;
Packit Service 31306d
    (void) ntests;
Packit Service 31306d
Packit Service 31306d
    return;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void torture_write_file(const char *filename, const char *data){
Packit Service 31306d
    int fd;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    assert_non_null(filename);
Packit Service 31306d
    assert_true(filename[0] != '\0');
Packit Service 31306d
    assert_non_null(data);
Packit Service 31306d
Packit Service 31306d
    fd = open(filename, O_WRONLY | O_TRUNC | O_CREAT, 0600);
Packit Service 31306d
    assert_true(fd >= 0);
Packit Service 31306d
Packit Service 31306d
    rc = write(fd, data, strlen(data));
Packit Service 31306d
    assert_int_equal(rc, strlen(data));
Packit Service 31306d
Packit Service 31306d
    close(fd);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void torture_reset_config(ssh_session session)
Packit Service 31306d
{
Packit Service 31306d
    memset(session->opts.options_seen, 0, sizeof(session->opts.options_seen));
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int main(int argc, char **argv) {
Packit Service 31306d
    struct argument_s arguments;
Packit Service 31306d
    char *env = getenv("LIBSSH_VERBOSITY");
Packit Service 31306d
Packit Service 31306d
    arguments.verbose=0;
Packit Service 31306d
    arguments.pattern=NULL;
Packit Service 31306d
    torture_cmdline_parse(argc, argv, &arguments);
Packit Service 31306d
    verbosity=arguments.verbose;
Packit Service 31306d
    pattern=arguments.pattern;
Packit Service 31306d
Packit Service 31306d
    if (verbosity == 0 && env != NULL && env[0] != '\0') {
Packit Service 31306d
        if (env[0] > '0' && env[0] < '9') {
Packit Service 31306d
            verbosity = atoi(env);
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
#if defined HAVE_CMOCKA_SET_TEST_FILTER
Packit Service 31306d
    cmocka_set_test_filter(pattern);
Packit Service 31306d
#endif
Packit Service 31306d
Packit Service 31306d
    return torture_run_tests();
Packit Service 31306d
}