Commit Graph

470 Commits

Author SHA1 Message Date
djm@openbsd.org 1d6424a6ff upstream commit
this test would accidentally delete agent.sh if run without
 obj/
2015-01-20 19:03:08 +11:00
Damien Miller 1ca3e2155a fix kex test 2015-01-20 10:11:31 +11:00
markus@openbsd.org c78a578107 upstream commit
finally enable the KEX tests I wrote some years ago...
2015-01-20 09:50:34 +11:00
markus@openbsd.org 31821d7217 upstream commit
adapt to new error message (SSH_ERR_MAC_INVALID)
2015-01-20 09:46:48 +11:00
djm@openbsd.org d3716ca19e upstream commit
this test was broken in at least two ways, such that it
 wasn't checking that a KRL was not excluding valid keys
2015-01-20 09:45:56 +11:00
djm@openbsd.org d85e062459 upstream commit
be a bit more careful in these tests to ensure that
 known_hosts is clean
2015-01-20 00:26:13 +11:00
djm@openbsd.org 7947810eab upstream commit
regression test for known_host file editing using
 ssh-keygen (-H / -R / -F) after hostkeys_foreach() change; feedback and ok
 markus@
2015-01-20 00:26:13 +11:00
djm@openbsd.org 3a2b09d147 upstream commit
more and better key tests

test signatures and verification
test certificate generation
flesh out nested cert test

removes most of the XXX todo markers
2015-01-20 00:25:12 +11:00
djm@openbsd.org 589e69fd82 upstream commit
make the signature fuzzing test much more rigorous:
 ensure that the fuzzed input cases do not match the original (using new
 fuzz_matches_original() function) and check that the verification fails in
 each case
2015-01-20 00:24:40 +11:00
djm@openbsd.org 80603c0daa upstream commit
add a fuzz_matches_original() function to the fuzzer to
 detect fuzz cases that are identical to the original data. Hacky
 implementation, but very useful when you need the fuzz to be different, e.g.
 when verifying signature
2015-01-20 00:24:39 +11:00
djm@openbsd.org 87d5495bd3 upstream commit
better dumps from the fuzzer (shown on errors) -
 include the original data as well as the fuzzed copy.
2015-01-20 00:24:39 +11:00
djm@openbsd.org d59ec478c4 upstream commit
enable hostkey-agent.sh test
2015-01-20 00:24:17 +11:00
djm@openbsd.org 26b3425170 upstream commit
unit test for hostkeys in ssh-agent
2015-01-20 00:23:43 +11:00
markus@openbsd.org 9e06a0fb23 upstream commit
add kex unit tests
2015-01-20 00:22:50 +11:00
Damien Miller 45c0fd70bb make bitmap test compile 2015-01-15 22:08:23 +11:00
djm@openbsd.org d333f89abf upstream commit
unit tests for KRL bitmap
2015-01-15 21:39:18 +11:00
markus@openbsd.org 7613f828f4 upstream commit
re-add comment about full path
2015-01-15 21:39:17 +11:00
markus@openbsd.org 6c43b48b30 upstream commit
don't reset  to the installed sshd; connect before
 reconfigure, too
2015-01-15 21:39:17 +11:00
djm@openbsd.org 771bb47a1d upstream commit
implement a SIGINFO handler so we can discern a stuck
 fuzz test from a merely glacial one; prompted by and ok markus
2015-01-15 21:39:16 +11:00
djm@openbsd.org cfaa57962f upstream commit
use $SSH instead of installed ssh to allow override;
 spotted by markus@
2015-01-15 21:39:16 +11:00
djm@openbsd.org 0920553d0a upstream commit
regress test for PubkeyAcceptedKeyTypes; ok markus@
2015-01-15 21:39:15 +11:00
markus@openbsd.org 27ca1a5c00 upstream commit
unbreak parsing of pubkey comments; with gerhard; ok
 djm/deraadt
2015-01-15 21:39:15 +11:00
djm@openbsd.org 55358f0b4e upstream commit
fatal if soft-PKCS11 library is missing rather (rather
 than continue and fail with a more cryptic error)
2015-01-15 21:39:15 +11:00
djm@openbsd.org c3554cdd2a upstream commit
let this test all supporte key types; pointed out/ok
 markus@
2015-01-15 21:39:14 +11:00
Damien Miller c332110291 some systems lack SO_REUSEPORT 2015-01-15 02:59:51 +11:00
djm@openbsd.org c4bfafcc2a upstream commit
adjust for sshkey_load_file() API change
2015-01-09 00:46:04 +11:00
Damien Miller 293cac52dc include and use OpenBSD netcat in regress/ 2014-12-23 08:38:12 +11:00
djm@openbsd.org 4bea0ab329 upstream commit
regression test for multiple required pubkey authentication;
 ok markus@
2014-12-22 19:13:38 +11:00
djm@openbsd.org 0d1b241a26 upstream commit
make this slightly easier to diff against portable
2014-12-22 17:21:51 +11:00
Damien Miller 0715bcdddb add missing regress output file 2014-12-22 13:47:07 +11:00
djm@openbsd.org 1e30483c8a upstream commit
adjust for new SHA256 key fingerprints and
 slightly-different MD5 hex fingerprint format
2014-12-22 13:21:07 +11:00
djm@openbsd.org 6b40567ed7 upstream commit
poll changes to netcat (usr.bin/netcat.c r1.125) broke
 this test; fix it by ensuring more stdio fds are sent to devnull
2014-12-22 13:18:41 +11:00
djm@openbsd.org 3dfd8d93df upstream commit
add tests for new client RevokedHostKeys option; refactor
 to make it a bit more readable
2014-12-05 09:31:08 +11:00
krw@openbsd.org a31046cad1 upstream commit
Nuke yet more obvious #include duplications.

ok deraadt@
2014-12-05 09:31:07 +11:00
djm@openbsd.org 51b64e4412 upstream commit
fix KRL generation when multiple CAs are in use

We would generate an invalid KRL when revoking certs by serial
number for multiple CA keys due to a section being written out
twice.

Also extend the regress test to catch this case by having it
produce a multi-CA KRL.

Reported by peter AT pean.org
2014-11-19 09:20:14 +11:00
Damien Miller 1b215c098b - (djm) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
[regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
   [regress/unittests/sshkey/common.c]
   [regress/unittests/sshkey/test_file.c]
   [regress/unittests/sshkey/test_fuzz.c]
   [regress/unittests/sshkey/test_sshkey.c] Don't include openssl/ec.h
   on !ECC OpenSSL systems
2014-08-27 04:04:40 +10:00
Damien Miller 4f1ff1ed78 - (djm) [regress/unittests/test_helper/test_helper.c] Fix for systems that
don't set __progname. Diagnosed by Tom Christensen.
2014-08-21 15:54:50 +10:00
Damien Miller f8988fbef0 - (djm) [regress/multiplex.sh] Use -d (detach stdin) flag to disassociate
nc from stdin, it's more portable
2014-08-01 13:31:52 +10:00
Damien Miller 5b3879fd4b - (djm) [regress/multiplex.sh] Instruct nc not to quit as soon as stdin
is closed; avoid regress failures when stdin is /dev/null
2014-08-01 12:28:31 +10:00
Damien Miller a9c46746d2 - (djm) [regress/multiplex.sh] Skip test for non-OpenBSD netcat. We need
a better solution, but this will have to do for now.
2014-08-01 12:26:49 +10:00
Damien Miller 56b840f2b8 - (djm) [regress/multiplex.sh] restore incorrectly deleted line;
pointed out by Christian Hesse
2014-07-25 08:11:30 +10:00
Darren Tucker dd417b60d5 - dtucker@cvs.openbsd.org 2014/07/22 23:35:38
[regress/unittests/sshkey/testdata/*]
     Regenerate test keys with certs signed with ed25519 instead of ecdsa.
     These can be used in -portable on platforms that don't support ECDSA.
2014-07-23 10:41:21 +10:00
Darren Tucker 40e5021189 - dtucker@cvs.openbsd.org 2014/07/22 23:57:40
[regress/unittests/sshkey/mktestdata.sh]
     Add $OpenBSD tag to make syncs easier
2014-07-23 10:35:45 +10:00
Darren Tucker 07e644251e - dtucker@cvs.openbsd.org 2014/07/22 23:23:22
[regress/unittests/sshkey/mktestdata.sh]
     Sign test certs with ed25519 instead of ecdsa so that they'll work in
     -portable on platforms that don't have ECDSA in their OpenSSL.  ok djm
2014-07-23 10:34:26 +10:00
Darren Tucker cea099a7c4 - djm@cvs.openbsd.org 2014/07/22 01:32:12
[regress/multiplex.sh]
     change the test for still-open Unix domain sockets to be robust against
     nc implementations that produce error messages. from -portable
     (Id sync only)
2014-07-23 10:04:02 +10:00
Darren Tucker c4ee219a66 - (dtucker) [regress/unittests/sshkey/test_{file,fuzz,sshkey}.c] Wrap ecdsa-
specific tests inside OPENSSL_HAS_ECC.
2014-07-23 04:27:50 +10:00
Damien Miller 04f4824940 - (djm) [regress/multiplex.sh] change the test for still-open Unix
domain sockets to be robust against nc implementations that produce
    error messages.
2014-07-22 11:31:47 +10:00
Damien Miller 5ea4fe00d5 - (djm) [regress/multiplex.sh] ssh mux master lost -N somehow;
put it back
2014-07-22 09:39:19 +10:00
Damien Miller c8f610f6cc - (djm) [regress/multiplex.sh] Not all netcat accept the -N option. 2014-07-21 10:23:27 +10:00
Damien Miller 0e4e95566c - millert@cvs.openbsd.org 2014/07/15 15:54:15
[forwarding.sh multiplex.sh]
     Add support for Unix domain socket forwarding.  A remote TCP port
     may be forwarded to a local Unix domain socket and vice versa or
     both ends may be a Unix domain socket.  This is a reimplementation
     of the streamlocal patches by William Ahern from:
         http://www.25thandclement.com/~william/projects/streamlocal.html
     OK djm@ markus@
2014-07-21 09:52:54 +10:00