1295367Sdes/* 	$OpenBSD: test_kex.c,v 1.2 2015/07/10 06:23:25 markus Exp $ */
2285031Sdes/*
3285031Sdes * Regress test KEX
4285031Sdes *
5285031Sdes * Placed in the public domain
6285031Sdes */
7285031Sdes
8285031Sdes#include "includes.h"
9285031Sdes
10285031Sdes#include <sys/types.h>
11285031Sdes#include <sys/param.h>
12285031Sdes#include <stdio.h>
13285031Sdes#ifdef HAVE_STDINT_H
14285031Sdes#include <stdint.h>
15285031Sdes#endif
16285031Sdes#include <stdlib.h>
17285031Sdes#include <string.h>
18285031Sdes
19285031Sdes#include "../test_helper/test_helper.h"
20285031Sdes
21285031Sdes#include "ssherr.h"
22285031Sdes#include "ssh_api.h"
23285031Sdes#include "sshbuf.h"
24285031Sdes#include "packet.h"
25285031Sdes#include "myproposal.h"
26285031Sdes
27285031Sdesstruct ssh *active_state = NULL; /* XXX - needed for linking */
28285031Sdes
29285031Sdesvoid kex_tests(void);
30285031Sdesstatic int do_debug = 0;
31285031Sdes
32285031Sdesstatic int
33285031Sdesdo_send_and_receive(struct ssh *from, struct ssh *to)
34285031Sdes{
35285031Sdes	u_char type;
36285031Sdes	size_t len;
37285031Sdes	const u_char *buf;
38285031Sdes	int r;
39285031Sdes
40285031Sdes	for (;;) {
41285031Sdes		if ((r = ssh_packet_next(from, &type)) != 0) {
42285031Sdes			fprintf(stderr, "ssh_packet_next: %s\n", ssh_err(r));
43285031Sdes			return r;
44285031Sdes		}
45285031Sdes		if (type != 0)
46285031Sdes			return 0;
47285031Sdes		buf = ssh_output_ptr(from, &len);
48285031Sdes		if (do_debug)
49285031Sdes			printf("%zu", len);
50285031Sdes		if (len == 0)
51285031Sdes			return 0;
52285031Sdes		if ((r = ssh_output_consume(from, len)) != 0 ||
53285031Sdes		    (r = ssh_input_append(to, buf, len)) != 0)
54285031Sdes			return r;
55285031Sdes	}
56285031Sdes}
57285031Sdes
58285031Sdesstatic void
59285031Sdesrun_kex(struct ssh *client, struct ssh *server)
60285031Sdes{
61285031Sdes	int r = 0;
62285031Sdes
63285031Sdes	while (!server->kex->done || !client->kex->done) {
64285031Sdes		if (do_debug)
65285031Sdes			printf(" S:");
66285031Sdes		if ((r = do_send_and_receive(server, client)))
67285031Sdes			break;
68285031Sdes		if (do_debug)
69285031Sdes			printf(" C:");
70285031Sdes		if ((r = do_send_and_receive(client, server)))
71285031Sdes			break;
72285031Sdes	}
73285031Sdes	if (do_debug)
74285031Sdes		printf("done: %s\n", ssh_err(r));
75285031Sdes	ASSERT_INT_EQ(r, 0);
76285031Sdes	ASSERT_INT_EQ(server->kex->done, 1);
77285031Sdes	ASSERT_INT_EQ(client->kex->done, 1);
78285031Sdes}
79285031Sdes
80285031Sdesstatic void
81285031Sdesdo_kex_with_key(char *kex, int keytype, int bits)
82285031Sdes{
83285031Sdes	struct ssh *client = NULL, *server = NULL, *server2 = NULL;
84285031Sdes	struct sshkey *private, *public;
85285031Sdes	struct sshbuf *state;
86285031Sdes	struct kex_params kex_params;
87285031Sdes	char *myproposal[PROPOSAL_MAX] = { KEX_CLIENT };
88295367Sdes	char *keyname = NULL;
89285031Sdes
90285031Sdes	TEST_START("sshkey_generate");
91285031Sdes	ASSERT_INT_EQ(sshkey_generate(keytype, bits, &private), 0);
92285031Sdes	TEST_DONE();
93285031Sdes
94285031Sdes	TEST_START("sshkey_from_private");
95285031Sdes	ASSERT_INT_EQ(sshkey_from_private(private, &public), 0);
96285031Sdes	TEST_DONE();
97285031Sdes
98285031Sdes	TEST_START("ssh_init");
99285031Sdes	memcpy(kex_params.proposal, myproposal, sizeof(myproposal));
100285031Sdes	if (kex != NULL)
101285031Sdes		kex_params.proposal[PROPOSAL_KEX_ALGS] = kex;
102295367Sdes	keyname = strdup(sshkey_ssh_name(private));
103295367Sdes	ASSERT_PTR_NE(keyname, NULL);
104295367Sdes	kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
105285031Sdes	ASSERT_INT_EQ(ssh_init(&client, 0, &kex_params), 0);
106285031Sdes	ASSERT_INT_EQ(ssh_init(&server, 1, &kex_params), 0);
107285031Sdes	ASSERT_PTR_NE(client, NULL);
108285031Sdes	ASSERT_PTR_NE(server, NULL);
109285031Sdes	TEST_DONE();
110285031Sdes
111285031Sdes	TEST_START("ssh_add_hostkey");
112285031Sdes	ASSERT_INT_EQ(ssh_add_hostkey(server, private), 0);
113285031Sdes	ASSERT_INT_EQ(ssh_add_hostkey(client, public), 0);
114285031Sdes	TEST_DONE();
115285031Sdes
116285031Sdes	TEST_START("kex");
117285031Sdes	run_kex(client, server);
118285031Sdes	TEST_DONE();
119285031Sdes
120285031Sdes	TEST_START("rekeying client");
121285031Sdes	ASSERT_INT_EQ(kex_send_kexinit(client), 0);
122285031Sdes	run_kex(client, server);
123285031Sdes	TEST_DONE();
124285031Sdes
125285031Sdes	TEST_START("rekeying server");
126285031Sdes	ASSERT_INT_EQ(kex_send_kexinit(server), 0);
127285031Sdes	run_kex(client, server);
128285031Sdes	TEST_DONE();
129285031Sdes
130285031Sdes	TEST_START("ssh_packet_get_state");
131285031Sdes	state = sshbuf_new();
132285031Sdes	ASSERT_PTR_NE(state, NULL);
133285031Sdes	ASSERT_INT_EQ(ssh_packet_get_state(server, state), 0);
134285031Sdes	ASSERT_INT_GE(sshbuf_len(state), 1);
135285031Sdes	TEST_DONE();
136285031Sdes
137285031Sdes	TEST_START("ssh_packet_set_state");
138285031Sdes	server2 = NULL;
139285031Sdes	ASSERT_INT_EQ(ssh_init(&server2, 1, NULL), 0);
140285031Sdes	ASSERT_PTR_NE(server2, NULL);
141285031Sdes	ASSERT_INT_EQ(ssh_add_hostkey(server2, private), 0);
142285031Sdes	kex_free(server2->kex);	/* XXX or should ssh_packet_set_state()? */
143285031Sdes	ASSERT_INT_EQ(ssh_packet_set_state(server2, state), 0);
144285031Sdes	ASSERT_INT_EQ(sshbuf_len(state), 0);
145285031Sdes	sshbuf_free(state);
146285031Sdes	ASSERT_PTR_NE(server2->kex, NULL);
147285031Sdes	/* XXX we need to set the callbacks */
148285031Sdes	server2->kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server;
149285031Sdes	server2->kex->kex[KEX_DH_GRP14_SHA1] = kexdh_server;
150285031Sdes	server2->kex->kex[KEX_DH_GEX_SHA1] = kexgex_server;
151285031Sdes	server2->kex->kex[KEX_DH_GEX_SHA256] = kexgex_server;
152285031Sdes#ifdef OPENSSL_HAS_ECC
153285031Sdes	server2->kex->kex[KEX_ECDH_SHA2] = kexecdh_server;
154285031Sdes#endif
155285031Sdes	server2->kex->kex[KEX_C25519_SHA256] = kexc25519_server;
156285031Sdes	server2->kex->load_host_public_key = server->kex->load_host_public_key;
157285031Sdes	server2->kex->load_host_private_key = server->kex->load_host_private_key;
158285031Sdes	server2->kex->sign = server->kex->sign;
159285031Sdes	TEST_DONE();
160285031Sdes
161285031Sdes	TEST_START("rekeying server2");
162285031Sdes	ASSERT_INT_EQ(kex_send_kexinit(server2), 0);
163285031Sdes	run_kex(client, server2);
164285031Sdes	ASSERT_INT_EQ(kex_send_kexinit(client), 0);
165285031Sdes	run_kex(client, server2);
166285031Sdes	TEST_DONE();
167285031Sdes
168285031Sdes	TEST_START("cleanup");
169285031Sdes	sshkey_free(private);
170285031Sdes	sshkey_free(public);
171285031Sdes	ssh_free(client);
172285031Sdes	ssh_free(server);
173285031Sdes	ssh_free(server2);
174295367Sdes	free(keyname);
175285031Sdes	TEST_DONE();
176285031Sdes}
177285031Sdes
178285031Sdesstatic void
179285031Sdesdo_kex(char *kex)
180285031Sdes{
181285031Sdes	do_kex_with_key(kex, KEY_RSA, 2048);
182285031Sdes	do_kex_with_key(kex, KEY_DSA, 1024);
183285031Sdes#ifdef OPENSSL_HAS_ECC
184285031Sdes	do_kex_with_key(kex, KEY_ECDSA, 256);
185285031Sdes#endif
186285031Sdes	do_kex_with_key(kex, KEY_ED25519, 256);
187285031Sdes}
188285031Sdes
189285031Sdesvoid
190285031Sdeskex_tests(void)
191285031Sdes{
192285031Sdes	do_kex("curve25519-sha256@libssh.org");
193285031Sdes#ifdef OPENSSL_HAS_ECC
194285031Sdes	do_kex("ecdh-sha2-nistp256");
195285031Sdes	do_kex("ecdh-sha2-nistp384");
196285031Sdes	do_kex("ecdh-sha2-nistp521");
197285031Sdes#endif
198285031Sdes	do_kex("diffie-hellman-group-exchange-sha256");
199285031Sdes	do_kex("diffie-hellman-group-exchange-sha1");
200285031Sdes	do_kex("diffie-hellman-group14-sha1");
201285031Sdes	do_kex("diffie-hellman-group1-sha1");
202285031Sdes}
203