diff options
author | Aris Adamantiadis <aris@0xbadc0de.be> | 2018-02-28 10:24:58 -0600 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2018-06-28 09:06:30 +0200 |
commit | 23accdde1a9a18f846b3bfb0a7ba6a2a1e236805 (patch) | |
tree | ced7791e652a45e89fff92f9a8152568af59af6d /tests | |
parent | 321ec2cb1cd341bfac3c05fac25391dd098cc56f (diff) | |
download | libssh-23accdde1a9a18f846b3bfb0a7ba6a2a1e236805.tar.gz libssh-23accdde1a9a18f846b3bfb0a7ba6a2a1e236805.tar.xz libssh-23accdde1a9a18f846b3bfb0a7ba6a2a1e236805.zip |
tests: send more packets of various sizes
Signed-off-by: Aris Adamantiadis <aris@0xbadc0de.be>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'tests')
-rw-r--r-- | tests/client/torture_algorithms.c | 19 |
1 files changed, 18 insertions, 1 deletions
diff --git a/tests/client/torture_algorithms.c b/tests/client/torture_algorithms.c index 15330ffd..56061388 100644 --- a/tests/client/torture_algorithms.c +++ b/tests/client/torture_algorithms.c @@ -26,6 +26,7 @@ #include "torture.h" #include "libssh/libssh.h" #include "libssh/priv.h" +#include "libssh/session.h" #include <errno.h> #include <sys/types.h> @@ -49,7 +50,6 @@ static int session_setup(void **state) { int verbosity = torture_libssh_verbosity(); struct passwd *pwd; int rc; - pwd = getpwnam("bob"); assert_non_null(pwd); @@ -80,6 +80,15 @@ static void test_algorithm(ssh_session session, const char *cipher, const char *hmac) { int rc; + char data[256]; + size_t len_to_test[] = { + 1, 2, 3, 4, 5, 6, 7, 8, 10, + 12, 15, 16, 20, + 31, 32, 33, + 63, 64, 65, + 100, 127, 128 + }; + unsigned int i; int verbosity = torture_libssh_verbosity(); ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity); @@ -106,6 +115,14 @@ static void test_algorithm(ssh_session session, rc = ssh_connect(session); assert_int_equal(rc, SSH_OK); + /* send ignore packets of all sizes */ + memset(data, 0, sizeof(data)); + for (i = 0; i < (sizeof(len_to_test) / sizeof(size_t)); i++) { + memset(data, 'A', len_to_test[i]); + ssh_send_ignore(session, data); + ssh_handle_packets(session, 50); + } + rc = ssh_userauth_none(session, NULL); if (rc != SSH_OK) { rc = ssh_get_error_code(session); |