aboutsummaryrefslogtreecommitdiff
path: root/tests/client
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cynapses.org>2010-06-03 12:36:00 +0200
committerAndreas Schneider <asn@cynapses.org>2010-06-03 12:36:00 +0200
commit5dd4f7604f8007df1a11ff0cab55423a622342bc (patch)
tree0570bc1200183b4be958bedf5a4e5c86cb929678 /tests/client
parent94ce1ea45119770817676c25e15fe58a503a4db2 (diff)
downloadlibssh-5dd4f7604f8007df1a11ff0cab55423a622342bc.tar.gz
libssh-5dd4f7604f8007df1a11ff0cab55423a622342bc.tar.xz
libssh-5dd4f7604f8007df1a11ff0cab55423a622342bc.zip
tests: Move client tests to a seperate directory.
Tests which require a running sshd should go to tests/client.
Diffstat (limited to 'tests/client')
-rw-r--r--tests/client/CMakeLists.txt4
-rw-r--r--tests/client/torture_algorithms.c144
-rw-r--r--tests/client/torture_auth.c113
3 files changed, 261 insertions, 0 deletions
diff --git a/tests/client/CMakeLists.txt b/tests/client/CMakeLists.txt
new file mode 100644
index 0000000..b92f08e
--- /dev/null
+++ b/tests/client/CMakeLists.txt
@@ -0,0 +1,4 @@
+project(clienttests C)
+
+add_check_test(torture_algorithms torture_algorithms.c ${TORTURE_LIBRARY})
+add_check_test(torture_auth torture_auth.c ${TORTURE_LIBRARY})
diff --git a/tests/client/torture_algorithms.c b/tests/client/torture_algorithms.c
new file mode 100644
index 0000000..300fe05
--- /dev/null
+++ b/tests/client/torture_algorithms.c
@@ -0,0 +1,144 @@
+/*
+ * This file is part of the SSH Library
+ *
+ * Copyright (c) 2010 by Aris Adamantiadis
+ *
+ * The SSH Library is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as published by
+ * the Free Software Foundation; either version 2.1 of the License, or (at your
+ * option) any later version.
+ *
+ * The SSH Library is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
+ * License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with the SSH Library; see the file COPYING. If not, write to
+ * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
+ * MA 02111-1307, USA.
+ */
+
+#define LIBSSH_STATIC
+
+#include "torture.h"
+#include "libssh/libssh.h"
+#include "libssh/priv.h"
+
+ssh_session session;
+
+static void setup(void) {
+ session = ssh_new();
+}
+
+static void teardown(void) {
+ ssh_free(session);
+}
+
+static void test_algorithm(const char *algo) {
+ int rc;
+ ssh_options_set(session,SSH_OPTIONS_HOST,"localhost");
+ rc=ssh_options_set(session,SSH_OPTIONS_CIPHERS_C_S,algo);
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+ rc=ssh_options_set(session,SSH_OPTIONS_CIPHERS_S_C,algo);
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+ rc=ssh_connect(session);
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+ rc=ssh_userauth_none(session,NULL);
+ if(rc != SSH_OK){
+ rc=ssh_get_error_code(session);
+ ck_assert_msg(rc==SSH_REQUEST_DENIED,ssh_get_error(session));
+ }
+ ssh_disconnect(session);
+}
+
+START_TEST (torture_algorithms_aes128_cbc)
+{
+ test_algorithm("aes128-cbc");
+}
+END_TEST
+
+START_TEST (torture_algorithms_aes192_cbc)
+{
+ test_algorithm("aes192-cbc");
+}
+END_TEST
+
+START_TEST (torture_algorithms_aes256_cbc)
+{
+ test_algorithm("aes256-cbc");
+}
+END_TEST
+
+START_TEST (torture_algorithms_aes128_ctr)
+{
+ test_algorithm("aes128-ctr");
+}
+END_TEST
+
+START_TEST (torture_algorithms_aes192_ctr)
+{
+ test_algorithm("aes192-ctr");
+}
+END_TEST
+
+START_TEST (torture_algorithms_aes256_ctr)
+{
+ test_algorithm("aes256-ctr");
+}
+END_TEST
+
+START_TEST (torture_algorithms_3des_cbc)
+{
+ test_algorithm("3des-cbc");
+}
+END_TEST
+
+START_TEST (torture_algorithms_blowfish_cbc)
+{
+ test_algorithm("blowfish-cbc");
+}
+END_TEST
+
+START_TEST (torture_algorithms_zlib)
+{
+ int rc;
+ ssh_options_set(session,SSH_OPTIONS_HOST,"localhost");
+ rc=ssh_options_set(session,SSH_OPTIONS_COMPRESSION_C_S,"zlib");
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+ rc=ssh_options_set(session,SSH_OPTIONS_COMPRESSION_S_C,"zlib");
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+ rc=ssh_connect(session);
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+ rc=ssh_userauth_none(session,NULL);
+ if(rc != SSH_OK){
+ rc=ssh_get_error_code(session);
+ ck_assert_msg(rc==SSH_REQUEST_DENIED,ssh_get_error(session));
+ }
+ ssh_disconnect(session);
+}
+END_TEST
+
+Suite *torture_make_suite(void) {
+ Suite *s = suite_create("libssh_algorithms");
+
+ torture_create_case_fixture(s, "torture_algorithms_aes128-cbc",
+ torture_algorithms_aes128_cbc, setup, teardown);
+ torture_create_case_fixture(s, "torture_algorithms_aes192-cbc",
+ torture_algorithms_aes192_cbc, setup, teardown);
+ torture_create_case_fixture(s, "torture_algorithms_aes256-cbc",
+ torture_algorithms_aes256_cbc, setup, teardown);
+ torture_create_case_fixture(s, "torture_algorithms_aes128-ctr",
+ torture_algorithms_aes128_ctr, setup, teardown);
+ torture_create_case_fixture(s, "torture_algorithms_aes192-ctr",
+ torture_algorithms_aes192_ctr, setup, teardown);
+ torture_create_case_fixture(s, "torture_algorithms_aes256-ctr",
+ torture_algorithms_aes256_ctr, setup, teardown);
+ torture_create_case_fixture(s, "torture_algorithms_3des-cbc",
+ torture_algorithms_3des_cbc, setup, teardown);
+ torture_create_case_fixture(s, "torture_algorithms_blowfish-cbc",
+ torture_algorithms_blowfish_cbc, setup, teardown);
+ torture_create_case_fixture(s, "torture_algorithms_zlib",
+ torture_algorithms_zlib, setup, teardown);
+ return s;
+}
diff --git a/tests/client/torture_auth.c b/tests/client/torture_auth.c
new file mode 100644
index 0000000..2381d8a
--- /dev/null
+++ b/tests/client/torture_auth.c
@@ -0,0 +1,113 @@
+/*
+ * This file is part of the SSH Library
+ *
+ * Copyright (c) 2010 by Aris Adamantiadis
+ *
+ * The SSH Library is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as published by
+ * the Free Software Foundation; either version 2.1 of the License, or (at your
+ * option) any later version.
+ *
+ * The SSH Library is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
+ * License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with the SSH Library; see the file COPYING. If not, write to
+ * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
+ * MA 02111-1307, USA.
+ */
+
+#define LIBSSH_STATIC
+
+#include "torture.h"
+#include "libssh/libssh.h"
+#include "libssh/priv.h"
+#include "libssh/session.h"
+ssh_session session;
+
+static void setup(void) {
+ int verbosity=torture_libssh_verbosity();
+ session = ssh_new();
+ ssh_options_set(session,SSH_OPTIONS_HOST,"localhost");
+ ssh_options_set(session,SSH_OPTIONS_LOG_VERBOSITY,&verbosity);
+}
+
+static void teardown(void) {
+ ssh_disconnect(session);
+ ssh_free(session);
+}
+
+START_TEST (torture_auth_kbdint)
+{
+ int rc;
+ char *user=getenv("TORTURE_USER");
+ char *password=getenv("TORTURE_PASSWORD");
+ ck_assert_msg(user != NULL, "Please set the environment variable TORTURE_USER"
+ " to enable this test");
+ ck_assert_msg(password != NULL, "Please set the environment variable "
+ "TORTURE_PASSWORD to enable this test");
+ ssh_options_set(session,SSH_OPTIONS_USER,user);
+ rc=ssh_connect(session);
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+
+ rc=ssh_userauth_none(session,NULL);
+ /* This request should return a SSH_REQUEST_DENIED error */
+ if(rc == SSH_ERROR){
+ ck_assert_msg(ssh_get_error_code(session)==SSH_REQUEST_DENIED,
+ ssh_get_error(session));
+ }
+ ck_assert_msg(ssh_auth_list(session) & SSH_AUTH_METHOD_INTERACTIVE,
+ "SSH server doesn't allow keyboard-interactive");
+ rc=ssh_userauth_kbdint(session,NULL,NULL);
+ ck_assert_msg(rc==SSH_AUTH_INFO,ssh_get_error(session));
+ ck_assert_int_eq(ssh_userauth_kbdint_getnprompts(session),1);
+ ssh_userauth_kbdint_setanswer(session,0,password);
+ rc=ssh_userauth_kbdint(session,NULL,NULL);
+ /* Sometimes, SSH server send an empty query at the end of exchange */
+ if(rc==SSH_AUTH_INFO){
+ ck_assert_int_eq(ssh_userauth_kbdint_getnprompts(session),0);
+ rc=ssh_userauth_kbdint(session,NULL,NULL);
+ }
+ ck_assert_msg(rc==SSH_AUTH_SUCCESS,ssh_get_error(session));
+
+}
+END_TEST
+
+START_TEST (torture_auth_password)
+{
+ int rc;
+ char *user=getenv("TORTURE_USER");
+ char *password=getenv("TORTURE_PASSWORD");
+ ck_assert_msg(user != NULL, "Please set the environment variable TORTURE_USER"
+ " to enable this test");
+ ck_assert_msg(password != NULL, "Please set the environment variable "
+ "TORTURE_PASSWORD to enable this test");
+ ssh_options_set(session,SSH_OPTIONS_USER,user);
+ rc=ssh_connect(session);
+ ck_assert_msg(rc==SSH_OK,ssh_get_error(session));
+
+ rc=ssh_userauth_none(session,NULL);
+ /* This request should return a SSH_REQUEST_DENIED error */
+ if(rc == SSH_ERROR){
+ ck_assert_msg(ssh_get_error_code(session)==SSH_REQUEST_DENIED,
+ ssh_get_error(session));
+ }
+ ck_assert_msg(ssh_auth_list(session) & SSH_AUTH_METHOD_PASSWORD,
+ "SSH server doesn't allow password authentication");
+ rc=ssh_userauth_password(session,NULL,password);
+ ck_assert_msg(rc==SSH_AUTH_SUCCESS,ssh_get_error(session));
+}
+END_TEST
+
+Suite *torture_make_suite(void) {
+ Suite *s = suite_create("libssh_auth");
+
+ torture_create_case_fixture(s, "torture_auth_kbint",
+ torture_auth_kbdint, setup, teardown);
+ torture_create_case_fixture(s, "torture_auth_password",
+ torture_auth_password, setup, teardown);
+ return s;
+}
+