1295367Sdes/* $OpenBSD: test_kex.c,v 1.2 2015/07/10 06:23:25 markus Exp $ */ 2285031Sdes/* 3285031Sdes * Regress test KEX 4285031Sdes * 5285031Sdes * Placed in the public domain 6285031Sdes */ 7285031Sdes 8285031Sdes#include "includes.h" 9285031Sdes 10285031Sdes#include <sys/types.h> 11285031Sdes#include <sys/param.h> 12285031Sdes#include <stdio.h> 13285031Sdes#ifdef HAVE_STDINT_H 14285031Sdes#include <stdint.h> 15285031Sdes#endif 16285031Sdes#include <stdlib.h> 17285031Sdes#include <string.h> 18285031Sdes 19285031Sdes#include "../test_helper/test_helper.h" 20285031Sdes 21285031Sdes#include "ssherr.h" 22285031Sdes#include "ssh_api.h" 23285031Sdes#include "sshbuf.h" 24285031Sdes#include "packet.h" 25285031Sdes#include "myproposal.h" 26285031Sdes 27285031Sdesstruct ssh *active_state = NULL; /* XXX - needed for linking */ 28285031Sdes 29285031Sdesvoid kex_tests(void); 30285031Sdesstatic int do_debug = 0; 31285031Sdes 32285031Sdesstatic int 33285031Sdesdo_send_and_receive(struct ssh *from, struct ssh *to) 34285031Sdes{ 35285031Sdes u_char type; 36285031Sdes size_t len; 37285031Sdes const u_char *buf; 38285031Sdes int r; 39285031Sdes 40285031Sdes for (;;) { 41285031Sdes if ((r = ssh_packet_next(from, &type)) != 0) { 42285031Sdes fprintf(stderr, "ssh_packet_next: %s\n", ssh_err(r)); 43285031Sdes return r; 44285031Sdes } 45285031Sdes if (type != 0) 46285031Sdes return 0; 47285031Sdes buf = ssh_output_ptr(from, &len); 48285031Sdes if (do_debug) 49285031Sdes printf("%zu", len); 50285031Sdes if (len == 0) 51285031Sdes return 0; 52285031Sdes if ((r = ssh_output_consume(from, len)) != 0 || 53285031Sdes (r = ssh_input_append(to, buf, len)) != 0) 54285031Sdes return r; 55285031Sdes } 56285031Sdes} 57285031Sdes 58285031Sdesstatic void 59285031Sdesrun_kex(struct ssh *client, struct ssh *server) 60285031Sdes{ 61285031Sdes int r = 0; 62285031Sdes 63285031Sdes while (!server->kex->done || !client->kex->done) { 64285031Sdes if (do_debug) 65285031Sdes printf(" S:"); 66285031Sdes if ((r = do_send_and_receive(server, client))) 67285031Sdes break; 68285031Sdes if (do_debug) 69285031Sdes printf(" C:"); 70285031Sdes if ((r = do_send_and_receive(client, server))) 71285031Sdes break; 72285031Sdes } 73285031Sdes if (do_debug) 74285031Sdes printf("done: %s\n", ssh_err(r)); 75285031Sdes ASSERT_INT_EQ(r, 0); 76285031Sdes ASSERT_INT_EQ(server->kex->done, 1); 77285031Sdes ASSERT_INT_EQ(client->kex->done, 1); 78285031Sdes} 79285031Sdes 80285031Sdesstatic void 81285031Sdesdo_kex_with_key(char *kex, int keytype, int bits) 82285031Sdes{ 83285031Sdes struct ssh *client = NULL, *server = NULL, *server2 = NULL; 84285031Sdes struct sshkey *private, *public; 85285031Sdes struct sshbuf *state; 86285031Sdes struct kex_params kex_params; 87285031Sdes char *myproposal[PROPOSAL_MAX] = { KEX_CLIENT }; 88295367Sdes char *keyname = NULL; 89285031Sdes 90285031Sdes TEST_START("sshkey_generate"); 91285031Sdes ASSERT_INT_EQ(sshkey_generate(keytype, bits, &private), 0); 92285031Sdes TEST_DONE(); 93285031Sdes 94285031Sdes TEST_START("sshkey_from_private"); 95285031Sdes ASSERT_INT_EQ(sshkey_from_private(private, &public), 0); 96285031Sdes TEST_DONE(); 97285031Sdes 98285031Sdes TEST_START("ssh_init"); 99285031Sdes memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); 100285031Sdes if (kex != NULL) 101285031Sdes kex_params.proposal[PROPOSAL_KEX_ALGS] = kex; 102295367Sdes keyname = strdup(sshkey_ssh_name(private)); 103295367Sdes ASSERT_PTR_NE(keyname, NULL); 104295367Sdes kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; 105285031Sdes ASSERT_INT_EQ(ssh_init(&client, 0, &kex_params), 0); 106285031Sdes ASSERT_INT_EQ(ssh_init(&server, 1, &kex_params), 0); 107285031Sdes ASSERT_PTR_NE(client, NULL); 108285031Sdes ASSERT_PTR_NE(server, NULL); 109285031Sdes TEST_DONE(); 110285031Sdes 111285031Sdes TEST_START("ssh_add_hostkey"); 112285031Sdes ASSERT_INT_EQ(ssh_add_hostkey(server, private), 0); 113285031Sdes ASSERT_INT_EQ(ssh_add_hostkey(client, public), 0); 114285031Sdes TEST_DONE(); 115285031Sdes 116285031Sdes TEST_START("kex"); 117285031Sdes run_kex(client, server); 118285031Sdes TEST_DONE(); 119285031Sdes 120285031Sdes TEST_START("rekeying client"); 121285031Sdes ASSERT_INT_EQ(kex_send_kexinit(client), 0); 122285031Sdes run_kex(client, server); 123285031Sdes TEST_DONE(); 124285031Sdes 125285031Sdes TEST_START("rekeying server"); 126285031Sdes ASSERT_INT_EQ(kex_send_kexinit(server), 0); 127285031Sdes run_kex(client, server); 128285031Sdes TEST_DONE(); 129285031Sdes 130285031Sdes TEST_START("ssh_packet_get_state"); 131285031Sdes state = sshbuf_new(); 132285031Sdes ASSERT_PTR_NE(state, NULL); 133285031Sdes ASSERT_INT_EQ(ssh_packet_get_state(server, state), 0); 134285031Sdes ASSERT_INT_GE(sshbuf_len(state), 1); 135285031Sdes TEST_DONE(); 136285031Sdes 137285031Sdes TEST_START("ssh_packet_set_state"); 138285031Sdes server2 = NULL; 139285031Sdes ASSERT_INT_EQ(ssh_init(&server2, 1, NULL), 0); 140285031Sdes ASSERT_PTR_NE(server2, NULL); 141285031Sdes ASSERT_INT_EQ(ssh_add_hostkey(server2, private), 0); 142285031Sdes kex_free(server2->kex); /* XXX or should ssh_packet_set_state()? */ 143285031Sdes ASSERT_INT_EQ(ssh_packet_set_state(server2, state), 0); 144285031Sdes ASSERT_INT_EQ(sshbuf_len(state), 0); 145285031Sdes sshbuf_free(state); 146285031Sdes ASSERT_PTR_NE(server2->kex, NULL); 147285031Sdes /* XXX we need to set the callbacks */ 148285031Sdes server2->kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; 149285031Sdes server2->kex->kex[KEX_DH_GRP14_SHA1] = kexdh_server; 150285031Sdes server2->kex->kex[KEX_DH_GEX_SHA1] = kexgex_server; 151285031Sdes server2->kex->kex[KEX_DH_GEX_SHA256] = kexgex_server; 152285031Sdes#ifdef OPENSSL_HAS_ECC 153285031Sdes server2->kex->kex[KEX_ECDH_SHA2] = kexecdh_server; 154285031Sdes#endif 155285031Sdes server2->kex->kex[KEX_C25519_SHA256] = kexc25519_server; 156285031Sdes server2->kex->load_host_public_key = server->kex->load_host_public_key; 157285031Sdes server2->kex->load_host_private_key = server->kex->load_host_private_key; 158285031Sdes server2->kex->sign = server->kex->sign; 159285031Sdes TEST_DONE(); 160285031Sdes 161285031Sdes TEST_START("rekeying server2"); 162285031Sdes ASSERT_INT_EQ(kex_send_kexinit(server2), 0); 163285031Sdes run_kex(client, server2); 164285031Sdes ASSERT_INT_EQ(kex_send_kexinit(client), 0); 165285031Sdes run_kex(client, server2); 166285031Sdes TEST_DONE(); 167285031Sdes 168285031Sdes TEST_START("cleanup"); 169285031Sdes sshkey_free(private); 170285031Sdes sshkey_free(public); 171285031Sdes ssh_free(client); 172285031Sdes ssh_free(server); 173285031Sdes ssh_free(server2); 174295367Sdes free(keyname); 175285031Sdes TEST_DONE(); 176285031Sdes} 177285031Sdes 178285031Sdesstatic void 179285031Sdesdo_kex(char *kex) 180285031Sdes{ 181285031Sdes do_kex_with_key(kex, KEY_RSA, 2048); 182285031Sdes do_kex_with_key(kex, KEY_DSA, 1024); 183285031Sdes#ifdef OPENSSL_HAS_ECC 184285031Sdes do_kex_with_key(kex, KEY_ECDSA, 256); 185285031Sdes#endif 186285031Sdes do_kex_with_key(kex, KEY_ED25519, 256); 187285031Sdes} 188285031Sdes 189285031Sdesvoid 190285031Sdeskex_tests(void) 191285031Sdes{ 192285031Sdes do_kex("curve25519-sha256@libssh.org"); 193285031Sdes#ifdef OPENSSL_HAS_ECC 194285031Sdes do_kex("ecdh-sha2-nistp256"); 195285031Sdes do_kex("ecdh-sha2-nistp384"); 196285031Sdes do_kex("ecdh-sha2-nistp521"); 197285031Sdes#endif 198285031Sdes do_kex("diffie-hellman-group-exchange-sha256"); 199285031Sdes do_kex("diffie-hellman-group-exchange-sha1"); 200285031Sdes do_kex("diffie-hellman-group14-sha1"); 201285031Sdes do_kex("diffie-hellman-group1-sha1"); 202285031Sdes} 203