Blame tests/unittests/torture_misc.c

Packit 6c0a39
#include "config.h"
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_UNISTD_H
Packit 6c0a39
#include <unistd.h>
Packit 6c0a39
#endif
Packit 6c0a39
#include <sys/types.h>
Packit 6c0a39
#ifndef _WIN32
Packit 6c0a39
Packit 6c0a39
#define _POSIX_PTHREAD_SEMANTICS
Packit 6c0a39
#include <pwd.h>
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
#define LIBSSH_STATIC
Packit 6c0a39
#include <libssh/priv.h>
Packit 6c0a39
Packit 6c0a39
#include "torture.h"
Packit 6c0a39
#include "misc.c"
Packit 6c0a39
#include "error.c"
Packit 6c0a39
Packit 6c0a39
#define TORTURE_TEST_DIR "/usr/local/bin/truc/much/.."
Packit 6c0a39
Packit 6c0a39
Packit 6c0a39
static int setup(void **state)
Packit 6c0a39
{
Packit 6c0a39
    ssh_session session = ssh_new();
Packit 6c0a39
    *state = session;
Packit 6c0a39
Packit 6c0a39
    return 0;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static int teardown(void **state)
Packit 6c0a39
{
Packit 6c0a39
    ssh_free(*state);
Packit 6c0a39
Packit 6c0a39
    return 0;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void torture_get_user_home_dir(void **state) {
Packit 6c0a39
#ifndef _WIN32
Packit 6c0a39
    struct passwd *pwd = getpwuid(getuid());
Packit 6c0a39
#endif /* _WIN32 */
Packit 6c0a39
    char *user;
Packit 6c0a39
Packit 6c0a39
    (void) state;
Packit 6c0a39
Packit 6c0a39
    user = ssh_get_user_home_dir();
Packit 6c0a39
    assert_non_null(user);
Packit 6c0a39
#ifndef _WIN32
Packit 6c0a39
    assert_string_equal(user, pwd->pw_dir);
Packit 6c0a39
#endif /* _WIN32 */
Packit 6c0a39
Packit 6c0a39
    SAFE_FREE(user);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void torture_basename(void **state) {
Packit 6c0a39
    char *path;
Packit 6c0a39
Packit 6c0a39
    (void) state;
Packit 6c0a39
Packit 6c0a39
    path=ssh_basename(TORTURE_TEST_DIR "/test");
Packit 6c0a39
    assert_non_null(path);
Packit 6c0a39
    assert_string_equal(path, "test");
Packit 6c0a39
    SAFE_FREE(path);
Packit 6c0a39
    path=ssh_basename(TORTURE_TEST_DIR "/test/");
Packit 6c0a39
    assert_non_null(path);
Packit 6c0a39
    assert_string_equal(path, "test");
Packit 6c0a39
    SAFE_FREE(path);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void torture_dirname(void **state) {
Packit 6c0a39
    char *path;
Packit 6c0a39
Packit 6c0a39
    (void) state;
Packit 6c0a39
Packit 6c0a39
    path=ssh_dirname(TORTURE_TEST_DIR "/test");
Packit 6c0a39
    assert_non_null(path);
Packit 6c0a39
    assert_string_equal(path, TORTURE_TEST_DIR );
Packit 6c0a39
    SAFE_FREE(path);
Packit 6c0a39
    path=ssh_dirname(TORTURE_TEST_DIR "/test/");
Packit 6c0a39
    assert_non_null(path);
Packit 6c0a39
    assert_string_equal(path, TORTURE_TEST_DIR);
Packit 6c0a39
    SAFE_FREE(path);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void torture_ntohll(void **state) {
Packit 6c0a39
    uint64_t value = 0x0123456789abcdef;
Packit 6c0a39
    uint32_t sample = 1;
Packit 6c0a39
    unsigned char *ptr = (unsigned char *) &sample;
Packit 6c0a39
    uint64_t check;
Packit 6c0a39
Packit 6c0a39
    (void) state;
Packit 6c0a39
Packit 6c0a39
    if (ptr[0] == 1){
Packit 6c0a39
        /* we're in little endian */
Packit 6c0a39
        check = 0xefcdab8967452301;
Packit 6c0a39
    } else {
Packit 6c0a39
        /* big endian */
Packit 6c0a39
        check = value;
Packit 6c0a39
    }
Packit 6c0a39
    value = ntohll(value);
Packit 6c0a39
    assert_true(value == check);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#ifdef _WIN32
Packit 6c0a39
Packit 6c0a39
static void torture_path_expand_tilde_win(void **state) {
Packit 6c0a39
    char *d;
Packit 6c0a39
Packit 6c0a39
    (void) state;
Packit 6c0a39
Packit 6c0a39
    d = ssh_path_expand_tilde("~\\.ssh");
Packit 6c0a39
    assert_non_null(d);
Packit 6c0a39
    print_message("Expanded path: %s\n", d);
Packit 6c0a39
    free(d);
Packit 6c0a39
Packit 6c0a39
    d = ssh_path_expand_tilde("/guru/meditation");
Packit 6c0a39
    assert_string_equal(d, "/guru/meditation");
Packit 6c0a39
    free(d);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#else /* _WIN32 */
Packit 6c0a39
Packit 6c0a39
static void torture_path_expand_tilde_unix(void **state) {
Packit 6c0a39
    char h[256];
Packit 6c0a39
    char *d;
Packit 6c0a39
    char *user;
Packit 6c0a39
    char *home;
Packit 6c0a39
Packit 6c0a39
    (void) state;
Packit 6c0a39
Packit 6c0a39
    user = getenv("USER");
Packit 6c0a39
    if (user == NULL){
Packit 6c0a39
        user = getenv("LOGNAME");
Packit 6c0a39
    }
Packit 6c0a39
    /* in certain CIs there no such variables */
Packit 6c0a39
    if (!user){
Packit 6c0a39
        struct passwd *pw = getpwuid(getuid());
Packit 6c0a39
        if (pw){
Packit 6c0a39
            user = pw->pw_name;
Packit 6c0a39
        }
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    home = getenv("HOME");
Packit 6c0a39
    assert_non_null(home);
Packit 6c0a39
    snprintf(h, 256 - 1, "%s/.ssh", home);
Packit 6c0a39
Packit 6c0a39
    d = ssh_path_expand_tilde("~/.ssh");
Packit 6c0a39
    assert_non_null(d);
Packit 6c0a39
    assert_string_equal(d, h);
Packit 6c0a39
    free(d);
Packit 6c0a39
Packit 6c0a39
    d = ssh_path_expand_tilde("/guru/meditation");
Packit 6c0a39
    assert_non_null(d);
Packit 6c0a39
    assert_string_equal(d, "/guru/meditation");
Packit 6c0a39
    free(d);
Packit 6c0a39
Packit 6c0a39
    snprintf(h, 256 - 1, "~%s/.ssh", user);
Packit 6c0a39
    d = ssh_path_expand_tilde(h);
Packit 6c0a39
    assert_non_null(d);
Packit 6c0a39
Packit 6c0a39
    snprintf(h, 256 - 1, "%s/.ssh", home);
Packit 6c0a39
    assert_string_equal(d, h);
Packit 6c0a39
    free(d);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#endif /* _WIN32 */
Packit 6c0a39
Packit 6c0a39
static void torture_path_expand_escape(void **state) {
Packit 6c0a39
    ssh_session session = *state;
Packit 6c0a39
    const char *s = "%d/%h/by/%r";
Packit 6c0a39
    char *e;
Packit 6c0a39
Packit 6c0a39
    session->opts.sshdir = strdup("guru");
Packit 6c0a39
    session->opts.host = strdup("meditation");
Packit 6c0a39
    session->opts.username = strdup("root");
Packit 6c0a39
Packit 6c0a39
    e = ssh_path_expand_escape(session, s);
Packit 6c0a39
    assert_non_null(e);
Packit 6c0a39
    assert_string_equal(e, "guru/meditation/by/root");
Packit 6c0a39
    free(e);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void torture_path_expand_known_hosts(void **state) {
Packit 6c0a39
    ssh_session session = *state;
Packit 6c0a39
    char *tmp;
Packit 6c0a39
Packit 6c0a39
    session->opts.sshdir = strdup("/home/guru/.ssh");
Packit 6c0a39
Packit 6c0a39
    tmp = ssh_path_expand_escape(session, "%d/known_hosts");
Packit 6c0a39
    assert_non_null(tmp);
Packit 6c0a39
    assert_string_equal(tmp, "/home/guru/.ssh/known_hosts");
Packit 6c0a39
    free(tmp);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void torture_timeout_elapsed(void **state){
Packit 6c0a39
    struct ssh_timestamp ts;
Packit 6c0a39
    (void) state;
Packit 6c0a39
    ssh_timestamp_init(&ts);
Packit 6c0a39
    usleep(50000);
Packit 6c0a39
    assert_true(ssh_timeout_elapsed(&ts,25));
Packit 6c0a39
    assert_false(ssh_timeout_elapsed(&ts,30000));
Packit 6c0a39
    assert_false(ssh_timeout_elapsed(&ts,75));
Packit 6c0a39
    assert_true(ssh_timeout_elapsed(&ts,0));
Packit 6c0a39
    assert_false(ssh_timeout_elapsed(&ts,-1));
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void torture_timeout_update(void **state){
Packit 6c0a39
    struct ssh_timestamp ts;
Packit 6c0a39
    (void) state;
Packit 6c0a39
    ssh_timestamp_init(&ts);
Packit 6c0a39
    usleep(50000);
Packit 6c0a39
    assert_int_equal(ssh_timeout_update(&ts,25), 0);
Packit 6c0a39
    assert_in_range(ssh_timeout_update(&ts,30000),29000,29960);
Packit 6c0a39
    assert_in_range(ssh_timeout_update(&ts,75),1,40);
Packit 6c0a39
    assert_int_equal(ssh_timeout_update(&ts,0),0);
Packit 6c0a39
    assert_int_equal(ssh_timeout_update(&ts,-1),-1);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void torture_ssh_analyze_banner(void **state) {
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
    ssh_session session = NULL;
Packit 6c0a39
    (void) state;
Packit 6c0a39
Packit 6c0a39
#define reset_banner_test() \
Packit 6c0a39
    do {                           \
Packit 6c0a39
        rc = 0;                    \
Packit 6c0a39
        ssh_free(session);         \
Packit 6c0a39
        session = ssh_new();       \
Packit 6c0a39
        assert_non_null(session);  \
Packit 6c0a39
    } while (0)
Packit 6c0a39
Packit 6c0a39
#define assert_banner_rejected(is_server) \
Packit 6c0a39
    do {                                                            \
Packit 6c0a39
        rc = ssh_analyze_banner(session, is_server);  \
Packit 6c0a39
        assert_int_not_equal(0, rc);                                \
Packit 6c0a39
    } while (0);
Packit 6c0a39
Packit 6c0a39
#define assert_client_banner_rejected(banner) \
Packit 6c0a39
    do {                                         \
Packit 6c0a39
        reset_banner_test();                     \
Packit 6c0a39
        session->clientbanner = strdup(banner);  \
Packit 6c0a39
        assert_non_null(session->clientbanner);  \
Packit 6c0a39
        assert_banner_rejected(1 /*server*/);    \
Packit 6c0a39
        SAFE_FREE(session->clientbanner);        \
Packit 6c0a39
    } while (0)
Packit 6c0a39
Packit 6c0a39
#define assert_server_banner_rejected(banner) \
Packit 6c0a39
    do {                                         \
Packit 6c0a39
        reset_banner_test();                     \
Packit 6c0a39
        session->serverbanner = strdup(banner);  \
Packit 6c0a39
        assert_non_null(session->serverbanner);  \
Packit 6c0a39
        assert_banner_rejected(0 /*client*/);    \
Packit 6c0a39
        SAFE_FREE(session->serverbanner);        \
Packit 6c0a39
    } while (0)
Packit 6c0a39
Packit 6c0a39
#define assert_banner_accepted(is_server) \
Packit 6c0a39
    do {                                                            \
Packit 6c0a39
        rc = ssh_analyze_banner(session, is_server);  \
Packit 6c0a39
        assert_int_equal(0, rc);                                    \
Packit 6c0a39
    } while (0)
Packit 6c0a39
Packit 6c0a39
#define assert_client_banner_accepted(banner)          \
Packit 6c0a39
    do {                                               \
Packit 6c0a39
        reset_banner_test();                           \
Packit 6c0a39
        session->clientbanner = strdup(banner);        \
Packit 6c0a39
        assert_non_null(session->clientbanner);        \
Packit 6c0a39
        assert_banner_accepted(1 /*server*/);          \
Packit 6c0a39
        SAFE_FREE(session->clientbanner);              \
Packit 6c0a39
    } while (0)
Packit 6c0a39
Packit 6c0a39
#define assert_server_banner_accepted(banner)          \
Packit 6c0a39
    do {                                               \
Packit 6c0a39
        reset_banner_test();                           \
Packit 6c0a39
        session->serverbanner = strdup(banner);        \
Packit 6c0a39
        assert_non_null(session->serverbanner);        \
Packit 6c0a39
        assert_banner_accepted(0 /*client*/);          \
Packit 6c0a39
        SAFE_FREE(session->serverbanner);              \
Packit 6c0a39
    } while (0)
Packit 6c0a39
Packit 6c0a39
    /* no banner is set */
Packit 6c0a39
    reset_banner_test();
Packit 6c0a39
    assert_banner_rejected(0 /*client*/);
Packit 6c0a39
    reset_banner_test();
Packit 6c0a39
    assert_banner_rejected(1 /*server*/);
Packit 6c0a39
Packit 6c0a39
    /* banner is too short */
Packit 6c0a39
    assert_client_banner_rejected("abc");
Packit 6c0a39
    assert_server_banner_rejected("abc");
Packit 6c0a39
Packit 6c0a39
    /* banner doesn't start "SSH-" */
Packit 6c0a39
    assert_client_banner_rejected("abc-2.0");
Packit 6c0a39
    assert_server_banner_rejected("abc-2.0");
Packit 6c0a39
Packit 6c0a39
    /* SSH v1 */
Packit 6c0a39
    assert_client_banner_rejected("SSH-1.0");
Packit 6c0a39
    assert_server_banner_rejected("SSH-1.0");
Packit 6c0a39
Packit 6c0a39
    /* SSH v1.9 gets counted as both v1 and v2 */
Packit 6c0a39
    assert_client_banner_accepted("SSH-1.9");
Packit 6c0a39
    assert_server_banner_accepted("SSH-1.9");
Packit 6c0a39
Packit 6c0a39
    /* SSH v2 */
Packit 6c0a39
    assert_client_banner_accepted("SSH-2.0");
Packit 6c0a39
    assert_server_banner_accepted("SSH-2.0");
Packit 6c0a39
Packit 6c0a39
    /* OpenSSH banners: too short to extract major and minor versions */
Packit 6c0a39
    assert_client_banner_accepted("SSH-2.0-OpenSSH");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
    assert_server_banner_accepted("SSH-2.0-OpenSSH");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
Packit 6c0a39
    /* OpenSSH banners: big enough to extract major and minor versions */
Packit 6c0a39
    assert_client_banner_accepted("SSH-2.0-OpenSSH_5.9p1");
Packit 6c0a39
    assert_int_equal(SSH_VERSION_INT(5, 9, 0), session->openssh);
Packit 6c0a39
    assert_server_banner_accepted("SSH-2.0-OpenSSH_5.9p1");
Packit 6c0a39
    assert_int_equal(SSH_VERSION_INT(5, 9, 0), session->openssh);
Packit 6c0a39
Packit 6c0a39
    assert_client_banner_accepted("SSH-2.0-OpenSSH_1.99");
Packit 6c0a39
    assert_int_equal(SSH_VERSION_INT(1, 99, 0), session->openssh);
Packit 6c0a39
    assert_server_banner_accepted("SSH-2.0-OpenSSH_1.99");
Packit 6c0a39
    assert_int_equal(SSH_VERSION_INT(1, 99, 0), session->openssh);
Packit 6c0a39
Packit 6c0a39
    /* OpenSSH banners: major, minor version limits result in zero */
Packit 6c0a39
    assert_client_banner_accepted("SSH-2.0-OpenSSH_0.99p1");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
    assert_server_banner_accepted("SSH-2.0-OpenSSH_0.99p1");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
    assert_client_banner_accepted("SSH-2.0-OpenSSH_1.101p1");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
    assert_server_banner_accepted("SSH-2.0-OpenSSH_1.101p1");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
Packit 6c0a39
    /* OpenSSH banners: bogus major results in zero */
Packit 6c0a39
    assert_client_banner_accepted("SSH-2.0-OpenSSH_X.9p1");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
    assert_server_banner_accepted("SSH-2.0-OpenSSH_X.9p1");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
Packit 6c0a39
    /* OpenSSH banners: bogus minor results in zero */
Packit 6c0a39
    assert_server_banner_accepted("SSH-2.0-OpenSSH_5.Yp1");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
    assert_client_banner_accepted("SSH-2.0-OpenSSH_5.Yp1");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
Packit 6c0a39
    /* OpenSSH banners: ssh-keyscan(1) */
Packit 6c0a39
    assert_client_banner_accepted("SSH-2.0-OpenSSH-keyscan");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
    assert_server_banner_accepted("SSH-2.0-OpenSSH-keyscan");
Packit 6c0a39
    assert_int_equal(0, session->openssh);
Packit 6c0a39
Packit 6c0a39
    ssh_free(session);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
int torture_run_tests(void) {
Packit 6c0a39
    int rc;
Packit 6c0a39
    struct CMUnitTest tests[] = {
Packit 6c0a39
        cmocka_unit_test(torture_get_user_home_dir),
Packit 6c0a39
        cmocka_unit_test(torture_basename),
Packit 6c0a39
        cmocka_unit_test(torture_dirname),
Packit 6c0a39
        cmocka_unit_test(torture_ntohll),
Packit 6c0a39
#ifdef _WIN32
Packit 6c0a39
        cmocka_unit_test(torture_path_expand_tilde_win),
Packit 6c0a39
#else
Packit 6c0a39
        cmocka_unit_test(torture_path_expand_tilde_unix),
Packit 6c0a39
#endif
Packit 6c0a39
        cmocka_unit_test_setup_teardown(torture_path_expand_escape, setup, teardown),
Packit 6c0a39
        cmocka_unit_test_setup_teardown(torture_path_expand_known_hosts, setup, teardown),
Packit 6c0a39
        cmocka_unit_test(torture_timeout_elapsed),
Packit 6c0a39
        cmocka_unit_test(torture_timeout_update),
Packit 6c0a39
        cmocka_unit_test(torture_ssh_analyze_banner),
Packit 6c0a39
    };
Packit 6c0a39
Packit 6c0a39
    ssh_init();
Packit 6c0a39
    torture_filter_tests(tests);
Packit 6c0a39
    rc = cmocka_run_group_tests(tests, NULL, NULL);
Packit 6c0a39
    ssh_finalize();
Packit 6c0a39
    return rc;
Packit 6c0a39
}