aboutsummaryrefslogtreecommitdiff
path: root/tests/client/torture_auth.c
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cynapses.org>2010-06-03 12:36:00 +0200
committerAndreas Schneider <asn@cynapses.org>2010-06-03 12:36:00 +0200
commit5dd4f7604f8007df1a11ff0cab55423a622342bc (patch)
tree0570bc1200183b4be958bedf5a4e5c86cb929678 /tests/client/torture_auth.c
parent94ce1ea45119770817676c25e15fe58a503a4db2 (diff)
downloadlibssh-5dd4f7604f8007df1a11ff0cab55423a622342bc.tar.gz
libssh-5dd4f7604f8007df1a11ff0cab55423a622342bc.tar.xz
libssh-5dd4f7604f8007df1a11ff0cab55423a622342bc.zip
tests: Move client tests to a seperate directory.
Tests which require a running sshd should go to tests/client.
Diffstat (limited to 'tests/client/torture_auth.c')
-rw-r--r--tests/client/torture_auth.c113
1 files changed, 113 insertions, 0 deletions
diff --git a/tests/client/torture_auth.c b/tests/client/torture_auth.c
new file mode 100644
index 0000000..2381d8a
--- /dev/null
+++ b/tests/client/torture_auth.c
@@ -0,0 +1,113 @@
+/*
+ * This file is part of the SSH Library
+ *
+ * Copyright (c) 2010 by Aris Adamantiadis
+ *
+ * The SSH Library is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as published by
+ * the Free Software Foundation; either version 2.1 of the License, or (at your
+ * option) any later version.
+ *
+ * The SSH Library is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
+ * License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with the SSH Library; see the file COPYING. If not, write to
+ * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
+ * MA 02111-1307, USA.
+ */
+
+#define LIBSSH_STATIC
+
+#include "torture.h"
+#include "libssh/libssh.h"
+#include "libssh/priv.h"
+#include "libssh/session.h"
+ssh_session session;
+
+static void setup(void) {
+ int verbosity=torture_libssh_verbosity();
+ session = ssh_new();
+ ssh_options_set(session,SSH_OPTIONS_HOST,"localhost");
+ ssh_options_set(session,SSH_OPTIONS_LOG_VERBOSITY,&verbosity);
+}
+
+static void teardown(void) {
+ ssh_disconnect(session);
+ ssh_free(session);
+}
+
+START_TEST (torture_auth_kbdint)
+{
+ int rc;
+ char *user=getenv("TORTURE_USER");
+ char *password=getenv("TORTURE_PASSWORD");
+ ck_assert_msg(user != NULL, "Please set the environment variable TORTURE_USER"
+ " to enable this test");
+ ck_assert_msg(password != NULL, "Please set the environment variable "
+ "TORTURE_PASSWORD to enable this test");
+ ssh_options_set(session,SSH_OPTIONS_USER,user);
+ rc=ssh_connect(session);
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+
+ rc=ssh_userauth_none(session,NULL);
+ /* This request should return a SSH_REQUEST_DENIED error */
+ if(rc == SSH_ERROR){
+ ck_assert_msg(ssh_get_error_code(session)==SSH_REQUEST_DENIED,
+ ssh_get_error(session));
+ }
+ ck_assert_msg(ssh_auth_list(session) & SSH_AUTH_METHOD_INTERACTIVE,
+ "SSH server doesn't allow keyboard-interactive");
+ rc=ssh_userauth_kbdint(session,NULL,NULL);
+ ck_assert_msg(rc==SSH_AUTH_INFO,ssh_get_error(session));
+ ck_assert_int_eq(ssh_userauth_kbdint_getnprompts(session),1);
+ ssh_userauth_kbdint_setanswer(session,0,password);
+ rc=ssh_userauth_kbdint(session,NULL,NULL);
+ /* Sometimes, SSH server send an empty query at the end of exchange */
+ if(rc==SSH_AUTH_INFO){
+ ck_assert_int_eq(ssh_userauth_kbdint_getnprompts(session),0);
+ rc=ssh_userauth_kbdint(session,NULL,NULL);
+ }
+ ck_assert_msg(rc==SSH_AUTH_SUCCESS,ssh_get_error(session));
+
+}
+END_TEST
+
+START_TEST (torture_auth_password)
+{
+ int rc;
+ char *user=getenv("TORTURE_USER");
+ char *password=getenv("TORTURE_PASSWORD");
+ ck_assert_msg(user != NULL, "Please set the environment variable TORTURE_USER"
+ " to enable this test");
+ ck_assert_msg(password != NULL, "Please set the environment variable "
+ "TORTURE_PASSWORD to enable this test");
+ ssh_options_set(session,SSH_OPTIONS_USER,user);
+ rc=ssh_connect(session);
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+
+ rc=ssh_userauth_none(session,NULL);
+ /* This request should return a SSH_REQUEST_DENIED error */
+ if(rc == SSH_ERROR){
+ ck_assert_msg(ssh_get_error_code(session)==SSH_REQUEST_DENIED,
+ ssh_get_error(session));
+ }
+ ck_assert_msg(ssh_auth_list(session) & SSH_AUTH_METHOD_PASSWORD,
+ "SSH server doesn't allow password authentication");
+ rc=ssh_userauth_password(session,NULL,password);
+ ck_assert_msg(rc==SSH_AUTH_SUCCESS,ssh_get_error(session));
+}
+END_TEST
+
+Suite *torture_make_suite(void) {
+ Suite *s = suite_create("libssh_auth");
+
+ torture_create_case_fixture(s, "torture_auth_kbint",
+ torture_auth_kbdint, setup, teardown);
+ torture_create_case_fixture(s, "torture_auth_password",
+ torture_auth_password, setup, teardown);
+ return s;
+}
+