aboutsummaryrefslogtreecommitdiff
path: root/tests/client
diff options
context:
space:
mode:
authorJakub Jelen <jjelen@redhat.com>2019-02-07 17:50:39 +0100
committerAndreas Schneider <asn@cryptomilk.org>2019-05-14 17:26:30 +0200
commiteae971c0027726d723456bd1c5266764caf094bb (patch)
tree34c873db0257c35f8bd555eb0e7f4ad0d0b9872a /tests/client
parent962bdf806c6fd71a64be828933caf4932fa11fa0 (diff)
downloadlibssh-eae971c0027726d723456bd1c5266764caf094bb.tar.gz
libssh-eae971c0027726d723456bd1c5266764caf094bb.tar.xz
libssh-eae971c0027726d723456bd1c5266764caf094bb.zip
tests: Update knownhost tests with reproducer from T110
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'tests/client')
-rw-r--r--tests/client/torture_knownhosts.c73
1 files changed, 73 insertions, 0 deletions
diff --git a/tests/client/torture_knownhosts.c b/tests/client/torture_knownhosts.c
index 40bb3608..0815868d 100644
--- a/tests/client/torture_knownhosts.c
+++ b/tests/client/torture_knownhosts.c
@@ -24,6 +24,7 @@
#define LIBSSH_STATIC
#include "torture.h"
+#include "torture_key.h"
#include <sys/types.h>
#include <pwd.h>
@@ -150,6 +151,72 @@ static void torture_knownhosts_port(void **state) {
assert_int_equal(rc, SSH_SERVER_KNOWN_OK);
}
+static void torture_knownhosts_wildcard(void **state)
+{
+ struct torture_state *s = *state;
+ ssh_session session = s->ssh.session;
+ char known_hosts_file[1024];
+ const char *key = NULL;
+ FILE *file;
+ int rc;
+
+ snprintf(known_hosts_file,
+ sizeof(known_hosts_file),
+ "%s/%s",
+ s->socket_dir,
+ TORTURE_KNOWN_HOSTS_FILE);
+
+ file = fopen(known_hosts_file, "w");
+ assert_non_null(file);
+ key = torture_get_testkey_pub(SSH_KEYTYPE_RSA);
+ fprintf(file, "[127.0.0.10]:* %s\n", key);
+ fclose(file);
+
+ rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
+ assert_ssh_return_code(session, rc);
+ rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
+ assert_ssh_return_code(session, rc);
+
+ rc = ssh_connect(session);
+ assert_ssh_return_code(session, rc);
+
+ rc = ssh_is_server_known(session);
+ assert_int_equal(rc, SSH_SERVER_KNOWN_OK);
+}
+
+static void torture_knownhosts_standard_port(void **state)
+{
+ struct torture_state *s = *state;
+ ssh_session session = s->ssh.session;
+ char known_hosts_file[1024];
+ const char *key = NULL;
+ FILE *file;
+ int rc;
+
+ snprintf(known_hosts_file,
+ sizeof(known_hosts_file),
+ "%s/%s",
+ s->socket_dir,
+ TORTURE_KNOWN_HOSTS_FILE);
+
+ file = fopen(known_hosts_file, "w");
+ assert_non_null(file);
+ key = torture_get_testkey_pub(SSH_KEYTYPE_RSA);
+ fprintf(file, "[127.0.0.10]:22 %s\n", key);
+ fclose(file);
+
+ rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
+ assert_ssh_return_code(session, rc);
+ rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
+ assert_ssh_return_code(session, rc);
+
+ rc = ssh_connect(session);
+ assert_ssh_return_code(session, rc);
+
+ rc = ssh_is_server_known(session);
+ assert_int_equal(rc, SSH_SERVER_KNOWN_OK);
+}
+
static void torture_knownhosts_fail(void **state) {
struct torture_state *s = *state;
ssh_session session = s->ssh.session;
@@ -366,6 +433,12 @@ static void torture_knownhosts_no_hostkeychecking(void **state)
int torture_run_tests(void) {
int rc;
struct CMUnitTest tests[] = {
+ cmocka_unit_test_setup_teardown(torture_knownhosts_wildcard,
+ session_setup,
+ session_teardown),
+ cmocka_unit_test_setup_teardown(torture_knownhosts_standard_port,
+ session_setup,
+ session_teardown),
cmocka_unit_test_setup_teardown(torture_knownhosts_port,
session_setup,
session_teardown),