|
Packit Service |
31306d |
#include "config.h"
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#define LIBSSH_STATIC
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#include "torture.h"
|
|
Packit Service |
31306d |
#include "torture_key.h"
|
|
Packit Service |
31306d |
#include "legacy.c"
|
|
Packit Service |
31306d |
#include "dh.c"
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
static int setup_rsa_key(void **state)
|
|
Packit Service |
31306d |
{
|
|
Packit Service |
31306d |
int rc=0;
|
|
Packit Service |
31306d |
enum ssh_keytypes_e type;
|
|
Packit Service |
31306d |
char *b64_key, *p;
|
|
Packit Service |
31306d |
ssh_key key;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
const char *q;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
b64_key = strdup(torture_get_testkey_pub(SSH_KEYTYPE_RSA));
|
|
Packit Service |
31306d |
assert_non_null(b64_key);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
q = p = b64_key;
|
|
Packit Service |
31306d |
while (p != NULL && *p != '\0' && *p != ' ') p++;
|
|
Packit Service |
31306d |
if (p != NULL) {
|
|
Packit Service |
31306d |
*p = '\0';
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
type = ssh_key_type_from_name(q);
|
|
Packit Service |
31306d |
assert_true(type == SSH_KEYTYPE_RSA);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
q = ++p;
|
|
Packit Service |
31306d |
while (p != NULL && *p != '\0' && *p != ' ') p++;
|
|
Packit Service |
31306d |
if (p != NULL) {
|
|
Packit Service |
31306d |
*p = '\0';
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
rc = ssh_pki_import_pubkey_base64(q, type, &key);
|
|
Packit Service |
31306d |
assert_true(rc == 0);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
free(b64_key);
|
|
Packit Service |
31306d |
*state = key;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
return 0;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
static int teardown(void **state)
|
|
Packit Service |
31306d |
{
|
|
Packit Service |
31306d |
SSH_KEY_FREE(*state);
|
|
Packit Service |
31306d |
return 0;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
static void torture_md5_hash(void **state)
|
|
Packit Service |
31306d |
{
|
|
Packit Service |
31306d |
ssh_key pubkey = *state;
|
|
Packit Service |
31306d |
char *hash = NULL;
|
|
Packit Service |
31306d |
char *hexa = NULL;
|
|
Packit Service |
31306d |
size_t hlen;
|
|
Packit Service |
31306d |
int rc = 0;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (ssh_fips_mode()) {
|
|
Packit Service |
31306d |
skip();
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
rc = ssh_get_publickey_hash(pubkey, SSH_PUBLICKEY_HASH_MD5,
|
|
Packit Service |
31306d |
(unsigned char **)&hash, &hlen);
|
|
Packit Service |
31306d |
if (ssh_fips_mode()) {
|
|
Packit Service |
31306d |
/* When in FIPS mode, expect the call to fail */
|
|
Packit Service |
31306d |
assert_int_equal(rc, SSH_ERROR);
|
|
Packit Service |
31306d |
} else {
|
|
Packit Service |
31306d |
assert_int_equal(rc, SSH_OK);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
hexa = ssh_get_hexa((unsigned char *)hash, hlen);
|
|
Packit Service |
31306d |
SSH_STRING_FREE_CHAR(hash);
|
|
Packit Service |
31306d |
assert_string_equal(hexa,
|
|
Packit Service |
31306d |
"50:15:a0:9b:92:bf:33:1c:01:c5:8c:fe:18:fa:ce:78");
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
SSH_STRING_FREE_CHAR(hexa);
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
static void torture_sha1_hash(void **state)
|
|
Packit Service |
31306d |
{
|
|
Packit Service |
31306d |
ssh_key pubkey = *state;
|
|
Packit Service |
31306d |
char *hash = NULL;
|
|
Packit Service |
31306d |
char *sha1 = NULL;
|
|
Packit Service |
31306d |
int rc = 0;
|
|
Packit Service |
31306d |
size_t hlen;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
rc = ssh_get_publickey_hash(pubkey, SSH_PUBLICKEY_HASH_SHA1,
|
|
Packit Service |
31306d |
(unsigned char **)&hash, &hlen);
|
|
Packit Service |
31306d |
assert_true(rc == 0);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
sha1 = ssh_get_b64_unpadded((unsigned char *)hash, hlen);
|
|
Packit Service |
31306d |
SSH_STRING_FREE_CHAR(hash);
|
|
Packit Service |
31306d |
assert_string_equal(sha1, "6wP+houujQmxLBiFugTcoeoODCM");
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
SSH_STRING_FREE_CHAR(sha1);
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
static void torture_sha256_hash(void **state)
|
|
Packit Service |
31306d |
{
|
|
Packit Service |
31306d |
ssh_key pubkey = *state;
|
|
Packit Service |
31306d |
char *hash = NULL;
|
|
Packit Service |
31306d |
char *sha256 = NULL;
|
|
Packit Service |
31306d |
int rc = 0;
|
|
Packit Service |
31306d |
size_t hlen;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
rc = ssh_get_publickey_hash(pubkey, SSH_PUBLICKEY_HASH_SHA256,
|
|
Packit Service |
31306d |
(unsigned char **)&hash, &hlen);
|
|
Packit Service |
31306d |
assert_true(rc == 0);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
sha256 = ssh_get_b64_unpadded((unsigned char *)hash, hlen);
|
|
Packit Service |
31306d |
SSH_STRING_FREE_CHAR(hash);
|
|
Packit Service |
31306d |
assert_string_equal(sha256, "jXstVLLe84fSDo1kEYGn6iumnPCSorhaiWxnJz8VTII");
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
SSH_STRING_FREE_CHAR(sha256);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
static void torture_sha256_fingerprint(void **state)
|
|
Packit Service |
31306d |
{
|
|
Packit Service |
31306d |
ssh_key pubkey = *state;
|
|
Packit Service |
31306d |
char *hash = NULL;
|
|
Packit Service |
31306d |
char *sha256 = NULL;
|
|
Packit Service |
31306d |
int rc = 0;
|
|
Packit Service |
31306d |
size_t hlen;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
rc = ssh_get_publickey_hash(pubkey,
|
|
Packit Service |
31306d |
SSH_PUBLICKEY_HASH_SHA256,
|
|
Packit Service |
31306d |
(unsigned char **)&hash,
|
|
Packit Service |
31306d |
&hlen);
|
|
Packit Service |
31306d |
assert_true(rc == 0);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
sha256 = ssh_get_fingerprint_hash(SSH_PUBLICKEY_HASH_SHA256,
|
|
Packit Service |
31306d |
(unsigned char *)hash,
|
|
Packit Service |
31306d |
hlen);
|
|
Packit Service |
31306d |
SSH_STRING_FREE_CHAR(hash);
|
|
Packit Service |
31306d |
assert_string_equal(sha256,
|
|
Packit Service |
31306d |
"SHA256:jXstVLLe84fSDo1kEYGn6iumnPCSorhaiWxnJz8VTII");
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
SSH_STRING_FREE_CHAR(sha256);
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
int torture_run_tests(void) {
|
|
Packit Service |
31306d |
int rc;
|
|
Packit Service |
31306d |
struct CMUnitTest tests[] = {
|
|
Packit Service |
31306d |
cmocka_unit_test_setup_teardown(torture_md5_hash,
|
|
Packit Service |
31306d |
setup_rsa_key,
|
|
Packit Service |
31306d |
teardown),
|
|
Packit Service |
31306d |
cmocka_unit_test_setup_teardown(torture_sha1_hash,
|
|
Packit Service |
31306d |
setup_rsa_key,
|
|
Packit Service |
31306d |
teardown),
|
|
Packit Service |
31306d |
cmocka_unit_test_setup_teardown(torture_sha256_hash,
|
|
Packit Service |
31306d |
setup_rsa_key,
|
|
Packit Service |
31306d |
teardown),
|
|
Packit Service |
31306d |
cmocka_unit_test_setup_teardown(torture_sha256_fingerprint,
|
|
Packit Service |
31306d |
setup_rsa_key,
|
|
Packit Service |
31306d |
teardown),
|
|
Packit Service |
31306d |
};
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
torture_filter_tests(tests);
|
|
Packit Service |
31306d |
rc = cmocka_run_group_tests(tests, NULL, NULL);
|
|
Packit Service |
31306d |
return rc;
|
|
Packit Service |
31306d |
}
|