175375bc09
Support an optional --rekey input to set the SSH session rekey data limit using SSH_OPTIONS_REKEY_DATA. This flag can be used together with --buffer to test out server rekeying. Signed-off-by: Jon Simons <jon@jonsimons.org> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
58 строки
969 B
C
58 строки
969 B
C
/*
|
|
* pkd_daemon.h -- tests use this interface to start, stop pkd
|
|
* instances and get results
|
|
*
|
|
* (c) 2014 Jon Simons
|
|
*/
|
|
|
|
#ifndef __PKD_DAEMON_H__
|
|
#define __PKD_DAEMON_H__
|
|
|
|
#include "config.h"
|
|
|
|
enum pkd_hostkey_type_e {
|
|
PKD_RSA,
|
|
#ifdef HAVE_DSA
|
|
PKD_DSA,
|
|
#endif
|
|
PKD_ED25519,
|
|
PKD_ECDSA
|
|
};
|
|
|
|
struct pkd_daemon_args {
|
|
enum pkd_hostkey_type_e type;
|
|
const char *hostkeypath;
|
|
|
|
struct {
|
|
const uint8_t *buf;
|
|
size_t len;
|
|
} payload;
|
|
|
|
uint64_t rekey_data_limit;
|
|
|
|
struct {
|
|
int list;
|
|
|
|
int log_stdout;
|
|
int log_stderr;
|
|
int libssh_log_level;
|
|
|
|
const char *testname;
|
|
const char *testmatch;
|
|
unsigned int iterations;
|
|
|
|
struct {
|
|
char *mkdtemp_str;
|
|
} socket_wrapper;
|
|
} opts;
|
|
};
|
|
|
|
struct pkd_result {
|
|
int ok;
|
|
};
|
|
|
|
int pkd_start(struct pkd_daemon_args *args);
|
|
void pkd_stop(struct pkd_result *out);
|
|
|
|
#endif /* __PKD_DAEMON_H__ */
|