
This commit lands full ECDSA key support when using the OpenSSL backend. Which includes: New KEX methods: ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521 Can now read OpenSSL formatted ECDSA key files. Now supports known host keys of type ecdsa-sha2-nistp256. New curve types: NID_X9_62_prime256v1, NID_secp384r1, NID_secp521r1 Default host key preferred ordering is now nistp256, nistp384, nistp521, rsa, dss. Ref: https://github.com/libssh2/libssh2/issues/41 Closes https://github.com/libssh2/libssh2/pull/206
64 строки
2.0 KiB
C
64 строки
2.0 KiB
C
#include "session_fixture.h"
|
|
|
|
#include <libssh2.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
const char *EXPECTED_RSA_HOSTKEY =
|
|
"AAAAB3NzaC1yc2EAAAABIwAAAQEArrr/JuJmaZligyfS8vcNur+mWR2ddDQtVdhHzdKU"
|
|
"UoR6/Om6cvxpe61H1YZO1xCpLUBXmkki4HoNtYOpPB2W4V+8U4BDeVBD5crypEOE1+7B"
|
|
"Am99fnEDxYIOZq2/jTP0yQmzCpWYS3COyFmkOL7sfX1wQMeW5zQT2WKcxC6FSWbhDqrB"
|
|
"eNEGi687hJJoJ7YXgY/IdiYW5NcOuqRSWljjGS3dAJsHHWk4nJbhjEDXbPaeduMAwQU9"
|
|
"i6ELfP3r+q6wdu0P4jWaoo3De1aYxnToV/ldXykpipON4NPamsb6Ph2qlJQKypq7J4iQ"
|
|
"gkIIbCU1A31+4ExvcIVoxLQw/aTSbw==";
|
|
|
|
const char *EXPECTED_ECDSA_HOSTKEY =
|
|
"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBC+/syyeKJD9dC2ZH"
|
|
"9Q7iJGReR4YM3rUCMsSynkyXojdfSClGCMY7JvWlt30ESjYvxoTfSRGx6WvaqYK/vPoYQ4=";
|
|
|
|
int test(LIBSSH2_SESSION *session)
|
|
{
|
|
int rc;
|
|
size_t len;
|
|
int type;
|
|
unsigned int expected_len = 0;
|
|
char *expected_hostkey = NULL;
|
|
|
|
const char *hostkey = libssh2_session_hostkey(session, &len, &type);
|
|
if (hostkey == NULL) {
|
|
print_last_session_error("libssh2_session_hostkey");
|
|
return 1;
|
|
}
|
|
|
|
if (type == LIBSSH2_HOSTKEY_TYPE_ECDSA) {
|
|
rc = libssh2_base64_decode(session, &expected_hostkey, &expected_len,
|
|
EXPECTED_ECDSA_HOSTKEY, strlen(EXPECTED_ECDSA_HOSTKEY));
|
|
}
|
|
else if (type == LIBSSH2_HOSTKEY_TYPE_RSA) {
|
|
rc = libssh2_base64_decode(session, &expected_hostkey, &expected_len,
|
|
EXPECTED_RSA_HOSTKEY, strlen(EXPECTED_RSA_HOSTKEY));
|
|
}
|
|
else {
|
|
fprintf(stderr, "Unexpected type of hostkey: %i\n", type);
|
|
return 1;
|
|
}
|
|
|
|
if (rc != 0) {
|
|
print_last_session_error("libssh2_base64_decode");
|
|
return 1;
|
|
}
|
|
|
|
if (len != expected_len) {
|
|
fprintf(stderr, "Hostkey does not have the expected length %ld != %d\n",
|
|
len, expected_len);
|
|
return 1;
|
|
}
|
|
|
|
if (memcmp(hostkey, expected_hostkey, len) != 0) {
|
|
fprintf(stderr, "Hostkeys do not match\n");
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|