778652460f
Summary: This patch adds support for mbedTLS as a crypto backend for libssh. mbedTLS is an SSL/TLS library that has been designed to mainly be used in embedded systems. It is loosely coupled and has a low memory footprint. mbedTLS also provides a cryptography library (libmbedcrypto) that can be used without the TLS modules. The patch is unfortunately quite big, since several new files had to be added. DSA is disabled at compile time, since mbedTLS doesn't support DSA Patch review and feedback would be appreciated, and if any issues or suggestions appear, I'm willing to work on them. Signed-off-by: Juraj Vijtiuk <juraj.vijtiuk@sartura.hr> Test Plan: * The patch has been tested with a Debug and MinSizeRel build, with libssh unit tests, client tests and the pkd tests. * All the tests have been run with valgrind's memcheck, drd and helgrind tools. * The examples/samplessh client works when built with the patch. Reviewers: asn, aris Subscribers: simonsj Differential Revision: https://bugs.libssh.org/D1
417 строки
12 KiB
C
417 строки
12 KiB
C
/*
|
|
* This file is part of the SSH Library
|
|
*
|
|
* Copyright (c) 2010 by Aris Adamantiadis
|
|
*
|
|
* The SSH Library is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation; either version 2.1 of the License, or (at your
|
|
* option) any later version.
|
|
*
|
|
* The SSH Library is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
* License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with the SSH Library; see the file COPYING. If not, write to
|
|
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
|
|
* MA 02111-1307, USA.
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#define LIBSSH_STATIC
|
|
|
|
#include "torture.h"
|
|
|
|
#include <sys/types.h>
|
|
#include <pwd.h>
|
|
|
|
#include "session.c"
|
|
#include "known_hosts.c"
|
|
|
|
#define TORTURE_KNOWN_HOSTS_FILE "libssh_torture_knownhosts"
|
|
|
|
#define BADRSA "AAAAB3NzaC1yc2EAAAADAQABAAABAQChm5" \
|
|
"a6Av65O8cKtx5YXOnui3wJnYE6A6J/I4kZSAibbn14Jcl+34VJQwv96f25AxNmo" \
|
|
"NwoiZV93IzdypQmiuieh6s6wB9WhYjU9K/6CkIpNhpCxswA90b3ePjS7LnR9B9J" \
|
|
"slPSbG1H0KC1c5lb7G3utXteXtM+4YvCvpN5VdC4CpghT+p0cwN2Na8Md5vRItz" \
|
|
"YgIytryNn7LLiwYfoSxvWigFrTTZsrVtCOYyNgklmffpGdzuC43wdANvTewfI9G" \
|
|
"o71r8EXmEc228CrYPmb8Scv3mpXFK/BosohSGkPlEHu9lf3YjnknBicDaVtJOYp" \
|
|
"wnXJPjZo2EhG79HxDRpjJHH"
|
|
#ifdef HAVE_DSA
|
|
#define BADDSA "AAAAB3NzaC1kc3MAAACBAITDKqGQ5aC5wHySG6ZdL1+BVBY2nLP5vzw3i3pvZfP" \
|
|
"yNUS0UCwrt5pajsMvDRGXXebTJhWVonDnv8tpSgiuIBXMZrma8CU1KCFGRzwb/n8" \
|
|
"cc5tJmIphlOUTrObjBmsRz7u1eZmoaddXC9ask6BNnt0DmhzYi2esL3mbardy8IN" \
|
|
"zAAAAFQDlPFCm410pgQQPb3X5FWjyVEIl+QAAAIAp0vqfir8K8p+zP4dzFG7ppnt" \
|
|
"DjaXf3ge6URF7f5xPDo6CClGo2JQ2REF8NxM7K9cLgR9Ifx2ahO48UMgrXEl/BOp" \
|
|
"IQHpeBqUz26a49O5J0WEW16YSUHxWwMxWVe/SRmyKdTUZJ6fcepH88JNqm3XudNn" \
|
|
"s78grM+yx9mcXnK2AsAAAAIBxpF8ZQIlGrSgwCmCfwjP156bC3Ya6LYf9ZpLJ0dX" \
|
|
"EcxqLVllrNEvd2EGD9p16BYO2yaalYon8im59PtOcul2ay5XQ6rVDQ2T0pgNUpsI" \
|
|
"h0dSi8VJXI1wes5HTyLsv9VBmU1uCXUUvufoQKfF/OcSH0ufcCpnd62g1/adZcy2" \
|
|
"WJg=="
|
|
#endif
|
|
|
|
static int sshd_setup(void **state)
|
|
{
|
|
torture_setup_sshd_server(state);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int sshd_teardown(void **state) {
|
|
torture_teardown_sshd_server(state);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int session_setup(void **state)
|
|
{
|
|
struct torture_state *s = *state;
|
|
int verbosity = torture_libssh_verbosity();
|
|
struct passwd *pwd;
|
|
|
|
pwd = getpwnam("bob");
|
|
assert_non_null(pwd);
|
|
setuid(pwd->pw_uid);
|
|
|
|
s->ssh.session = ssh_new();
|
|
assert_non_null(s->ssh.session);
|
|
|
|
ssh_options_set(s->ssh.session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity);
|
|
ssh_options_set(s->ssh.session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
|
|
ssh_options_set(s->ssh.session, SSH_OPTIONS_USER, TORTURE_SSH_USER_ALICE);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int session_teardown(void **state)
|
|
{
|
|
struct torture_state *s = *state;
|
|
char known_hosts_file[1024];
|
|
|
|
snprintf(known_hosts_file,
|
|
sizeof(known_hosts_file),
|
|
"%s/%s",
|
|
s->socket_dir,
|
|
TORTURE_KNOWN_HOSTS_FILE);
|
|
|
|
ssh_disconnect(s->ssh.session);
|
|
ssh_free(s->ssh.session);
|
|
|
|
unlink(known_hosts_file);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void torture_knownhosts_port(void **state) {
|
|
struct torture_state *s = *state;
|
|
ssh_session session = s->ssh.session;
|
|
char known_hosts_file[1024];
|
|
char buffer[200];
|
|
char *p;
|
|
FILE *file;
|
|
int rc;
|
|
|
|
snprintf(known_hosts_file,
|
|
sizeof(known_hosts_file),
|
|
"%s/%s",
|
|
s->socket_dir,
|
|
TORTURE_KNOWN_HOSTS_FILE);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_connect(session);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
session->opts.port = 1234;
|
|
rc = ssh_write_knownhost(session);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
file = fopen(known_hosts_file, "r");
|
|
assert_true(file != NULL);
|
|
p = fgets(buffer, sizeof(buffer), file);
|
|
assert_false(p == NULL);
|
|
fclose(file);
|
|
buffer[sizeof(buffer) - 1] = '\0';
|
|
assert_true(strstr(buffer,"[127.0.0.10]:1234 ") != NULL);
|
|
|
|
ssh_disconnect(session);
|
|
ssh_free(session);
|
|
|
|
/* Now, connect back to the ssh server and verify the known host line */
|
|
s->ssh.session = session = ssh_new();
|
|
|
|
ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
|
|
rc = ssh_connect(session);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
session->opts.port = 1234;
|
|
rc = ssh_is_server_known(session);
|
|
assert_int_equal(rc, SSH_SERVER_KNOWN_OK);
|
|
}
|
|
|
|
static void torture_knownhosts_fail(void **state) {
|
|
struct torture_state *s = *state;
|
|
ssh_session session = s->ssh.session;
|
|
char known_hosts_file[1024];
|
|
FILE *file;
|
|
int rc;
|
|
|
|
snprintf(known_hosts_file,
|
|
sizeof(known_hosts_file),
|
|
"%s/%s",
|
|
s->socket_dir,
|
|
TORTURE_KNOWN_HOSTS_FILE);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ssh-rsa");
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
file = fopen(known_hosts_file, "w");
|
|
assert_non_null(file);
|
|
|
|
fprintf(file, "127.0.0.10 ssh-rsa %s\n", BADRSA);
|
|
fclose(file);
|
|
|
|
rc = ssh_connect(session);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_is_server_known(session);
|
|
assert_int_equal(rc, SSH_SERVER_KNOWN_CHANGED);
|
|
}
|
|
|
|
#ifdef HAVE_DSA
|
|
static void torture_knownhosts_other(void **state) {
|
|
struct torture_state *s = *state;
|
|
ssh_session session = s->ssh.session;
|
|
char known_hosts_file[1024];
|
|
FILE *file;
|
|
int rc;
|
|
|
|
snprintf(known_hosts_file,
|
|
sizeof(known_hosts_file),
|
|
"%s/%s",
|
|
s->socket_dir,
|
|
TORTURE_KNOWN_HOSTS_FILE);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ssh-dss");
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
file = fopen(known_hosts_file, "w");
|
|
assert_non_null(file);
|
|
fprintf(file, "127.0.0.10 ssh-rsa %s\n", BADRSA);
|
|
fclose(file);
|
|
|
|
rc = ssh_connect(session);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_is_server_known(session);
|
|
assert_int_equal(rc, SSH_SERVER_FOUND_OTHER);
|
|
}
|
|
|
|
static void torture_knownhosts_other_auto(void **state) {
|
|
struct torture_state *s = *state;
|
|
ssh_session session = s->ssh.session;
|
|
char known_hosts_file[1024];
|
|
int rc;
|
|
|
|
snprintf(known_hosts_file,
|
|
sizeof(known_hosts_file),
|
|
"%s/%s",
|
|
s->socket_dir,
|
|
TORTURE_KNOWN_HOSTS_FILE);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ssh-dss");
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_connect(session);
|
|
assert_true(rc==SSH_OK);
|
|
|
|
rc = ssh_is_server_known(session);
|
|
assert_int_equal(rc, SSH_SERVER_NOT_KNOWN);
|
|
|
|
rc = ssh_write_knownhost(session);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
ssh_disconnect(session);
|
|
ssh_free(session);
|
|
|
|
/* connect again and check host key */
|
|
session = ssh_new();
|
|
assert_non_null(session);
|
|
|
|
s->ssh.session = session;
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_connect(session);
|
|
assert_true(rc==SSH_OK);
|
|
|
|
/* ssh-rsa is the default but libssh should try ssh-dss instead */
|
|
rc = ssh_is_server_known(session);
|
|
assert_int_equal(rc, SSH_SERVER_KNOWN_OK);
|
|
|
|
/* session will be freed by session_teardown() */
|
|
}
|
|
#endif
|
|
|
|
static void torture_knownhosts_conflict(void **state) {
|
|
struct torture_state *s = *state;
|
|
ssh_session session = s->ssh.session;
|
|
char known_hosts_file[1024];
|
|
FILE *file;
|
|
int rc;
|
|
|
|
snprintf(known_hosts_file,
|
|
sizeof(known_hosts_file),
|
|
"%s/%s",
|
|
s->socket_dir,
|
|
TORTURE_KNOWN_HOSTS_FILE);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ssh-rsa");
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
file = fopen(known_hosts_file, "w");
|
|
assert_true(file != NULL);
|
|
fprintf(file, "127.0.0.10 ssh-rsa %s\n", BADRSA);
|
|
#ifdef HAVE_DSA
|
|
fprintf(file, "127.0.0.10 ssh-dss %s\n", BADDSA);
|
|
#endif
|
|
fclose(file);
|
|
|
|
rc = ssh_connect(session);
|
|
assert_true(rc==SSH_OK);
|
|
|
|
rc = ssh_is_server_known(session);
|
|
assert_int_equal(rc, SSH_SERVER_KNOWN_CHANGED);
|
|
|
|
rc = ssh_write_knownhost(session);
|
|
assert_true(rc==SSH_OK);
|
|
|
|
ssh_disconnect(session);
|
|
ssh_free(session);
|
|
|
|
/* connect again and check host key */
|
|
session = ssh_new();
|
|
assert_non_null(session);
|
|
|
|
s->ssh.session = session;
|
|
|
|
ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ssh-rsa");
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_connect(session);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_is_server_known(session);
|
|
assert_int_equal(rc, SSH_SERVER_KNOWN_OK);
|
|
|
|
/* session will be freed by session_teardown() */
|
|
}
|
|
|
|
static void torture_knownhosts_precheck(void **state) {
|
|
struct torture_state *s = *state;
|
|
ssh_session session = s->ssh.session;
|
|
char known_hosts_file[1024];
|
|
FILE *file;
|
|
int rc;
|
|
char **kex;
|
|
|
|
snprintf(known_hosts_file,
|
|
sizeof(known_hosts_file),
|
|
"%s/%s",
|
|
s->socket_dir,
|
|
TORTURE_KNOWN_HOSTS_FILE);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file);
|
|
assert_int_equal(rc, SSH_OK);
|
|
|
|
file = fopen(known_hosts_file, "w");
|
|
assert_true(file != NULL);
|
|
fprintf(file, "127.0.0.10 ssh-rsa %s\n", BADRSA);
|
|
#ifdef HAVE_DSA
|
|
fprintf(file, "127.0.0.10 ssh-dss %s\n", BADDSA);
|
|
#endif
|
|
fclose(file);
|
|
|
|
kex = ssh_knownhosts_algorithms(session);
|
|
assert_true(kex != NULL);
|
|
assert_string_equal(kex[0],"ssh-rsa");
|
|
#ifdef HAVE_DSA
|
|
assert_string_equal(kex[1],"ssh-dss");
|
|
assert_true(kex[2]==NULL);
|
|
free(kex[1]);
|
|
#else
|
|
assert_true(kex[1]==NULL);
|
|
#endif
|
|
free(kex[0]);
|
|
free(kex);
|
|
}
|
|
|
|
int torture_run_tests(void) {
|
|
int rc;
|
|
struct CMUnitTest tests[] = {
|
|
cmocka_unit_test_setup_teardown(torture_knownhosts_port,
|
|
session_setup,
|
|
session_teardown),
|
|
cmocka_unit_test_setup_teardown(torture_knownhosts_fail,
|
|
session_setup,
|
|
session_teardown),
|
|
#ifdef HAVE_DSA
|
|
cmocka_unit_test_setup_teardown(torture_knownhosts_other,
|
|
session_setup,
|
|
session_teardown),
|
|
cmocka_unit_test_setup_teardown(torture_knownhosts_other_auto,
|
|
session_setup,
|
|
session_teardown),
|
|
#endif
|
|
cmocka_unit_test_setup_teardown(torture_knownhosts_conflict,
|
|
session_setup,
|
|
session_teardown),
|
|
cmocka_unit_test_setup_teardown(torture_knownhosts_precheck,
|
|
session_setup,
|
|
session_teardown),
|
|
};
|
|
|
|
ssh_init();
|
|
|
|
torture_filter_tests(tests);
|
|
rc = cmocka_run_group_tests(tests, sshd_setup, sshd_teardown);
|
|
|
|
ssh_finalize();
|
|
return rc;
|
|
}
|