1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
|
/* $OpenBSD: test_proposal.c,v 1.2 2023/03/06 12:15:47 dtucker Exp $ */
/*
* Regress test KEX
*
* Placed in the public domain
*/
#include "includes.h"
#include <sys/types.h>
#include <signal.h>
#include <stdio.h>
#ifdef HAVE_STDINT_H
#include <stdint.h>
#endif
#include <stdlib.h>
#include <string.h>
#include "../test_helper/test_helper.h"
#include "cipher.h"
#include "compat.h"
#include "ssherr.h"
#include "sshbuf.h"
#include "kex.h"
#include "myproposal.h"
#include "packet.h"
#include "xmalloc.h"
void kex_proposal_tests(void);
void kex_proposal_populate_tests(void);
#define CURVE25519 "curve25519-sha256@libssh.org"
#define DHGEX1 "diffie-hellman-group-exchange-sha1"
#define DHGEX256 "diffie-hellman-group-exchange-sha256"
#define KEXALGOS CURVE25519","DHGEX256","DHGEX1
void
kex_proposal_tests(void)
{
size_t i;
struct ssh ssh;
char *result, *out, *in;
struct {
char *in; /* TODO: make this const */
char *out;
int compat;
} tests[] = {
{ KEXALGOS, KEXALGOS, 0},
{ KEXALGOS, DHGEX256","DHGEX1, SSH_BUG_CURVE25519PAD },
{ KEXALGOS, CURVE25519, SSH_OLD_DHGEX },
{ "a,"KEXALGOS, "a", SSH_BUG_CURVE25519PAD|SSH_OLD_DHGEX },
/* TODO: enable once compat_kex_proposal doesn't fatal() */
/* { KEXALGOS, "", SSH_BUG_CURVE25519PAD|SSH_OLD_DHGEX }, */
};
TEST_START("compat_kex_proposal");
for (i = 0; i < sizeof(tests) / sizeof(*tests); i++) {
ssh.compat = tests[i].compat;
/* match entire string */
result = compat_kex_proposal(&ssh, tests[i].in);
ASSERT_STRING_EQ(result, tests[i].out);
free(result);
/* match at end */
in = kex_names_cat("a", tests[i].in);
out = kex_names_cat("a", tests[i].out);
result = compat_kex_proposal(&ssh, in);
ASSERT_STRING_EQ(result, out);
free(result); free(in); free(out);
/* match at start */
in = kex_names_cat(tests[i].in, "a");
out = kex_names_cat(tests[i].out, "a");
result = compat_kex_proposal(&ssh, in);
ASSERT_STRING_EQ(result, out);
free(result); free(in); free(out);
/* match in middle */
xasprintf(&in, "a,%s,b", tests[i].in);
if (*(tests[i].out) == '\0')
out = xstrdup("a,b");
else
xasprintf(&out, "a,%s,b", tests[i].out);
result = compat_kex_proposal(&ssh, in);
ASSERT_STRING_EQ(result, out);
free(result); free(in); free(out);
}
TEST_DONE();
}
void
kex_proposal_populate_tests(void)
{
char *prop[PROPOSAL_MAX], *kexalgs, *ciphers, *macs, *hkalgs;
const char *comp = compression_alg_list(0);
int i;
struct ssh ssh;
struct kex kex;
kexalgs = kex_alg_list(',');
ciphers = cipher_alg_list(',', 0);
macs = mac_alg_list(',');
hkalgs = kex_alg_list(',');
ssh.kex = &kex;
TEST_START("compat_kex_proposal_populate");
for (i = 0; i <= 1; i++) {
kex.server = i;
for (ssh.compat = 0; ssh.compat < 0x40000000; ) {
kex_proposal_populate_entries(&ssh, prop, NULL, NULL,
NULL, NULL, NULL);
kex_proposal_free_entries(prop);
kex_proposal_populate_entries(&ssh, prop, kexalgs,
ciphers, macs, hkalgs, comp);
kex_proposal_free_entries(prop);
if (ssh.compat == 0)
ssh.compat = 1;
else
ssh.compat <<= 1;
}
}
free(kexalgs);
free(ciphers);
free(macs);
free(hkalgs);
}
|