Compare commits
No commits in common. 'c10-beta' and 'c9' have entirely different histories.
@ -1,2 +1,2 @@
|
||||
SOURCES/libssh-0.10.6.tar.xz
|
||||
SOURCES/libssh-0.10.4.tar.xz
|
||||
SOURCES/libssh.keyring
|
||||
|
@ -1,2 +1,2 @@
|
||||
e8fb3b4750db11d2483cac4b5f046e301c09b72f SOURCES/libssh-0.10.6.tar.xz
|
||||
4c48350a0a688ad82080175ed26a2019928a99c4 SOURCES/libssh-0.10.4.tar.xz
|
||||
3f2ab0bca02893402ba0ad172a6bd44456a65f86 SOURCES/libssh.keyring
|
||||
|
@ -0,0 +1,729 @@
|
||||
From 4cef5e965a46e9271aed62631b152e4bd23c1e3c Mon Sep 17 00:00:00 2001
|
||||
From: Aris Adamantiadis <aris@0xbadc0de.be>
|
||||
Date: Tue, 12 Dec 2023 23:09:57 +0100
|
||||
Subject: [PATCH 1/4] CVE-2023-48795: client side mitigation
|
||||
|
||||
Signed-off-by: Aris Adamantiadis <aris@0xbadc0de.be>
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
||||
---
|
||||
include/libssh/packet.h | 1 +
|
||||
include/libssh/session.h | 6 +++++
|
||||
src/curve25519.c | 19 +++----------
|
||||
src/dh-gex.c | 7 +----
|
||||
src/dh.c | 17 +++---------
|
||||
src/ecdh.c | 8 +-----
|
||||
src/ecdh_crypto.c | 12 +++------
|
||||
src/ecdh_gcrypt.c | 10 +++----
|
||||
src/ecdh_mbedcrypto.c | 11 +++-----
|
||||
src/kex.c | 34 +++++++++++++++++++----
|
||||
src/packet.c | 58 ++++++++++++++++++++++++++++++++++++++++
|
||||
src/packet_cb.c | 12 +++++++++
|
||||
12 files changed, 126 insertions(+), 69 deletions(-)
|
||||
|
||||
diff --git a/include/libssh/packet.h b/include/libssh/packet.h
|
||||
index 7f10a709..f0c8cb20 100644
|
||||
--- a/include/libssh/packet.h
|
||||
+++ b/include/libssh/packet.h
|
||||
@@ -67,6 +67,7 @@ SSH_PACKET_CALLBACK(ssh_packet_ext_info);
|
||||
SSH_PACKET_CALLBACK(ssh_packet_kexdh_init);
|
||||
#endif
|
||||
|
||||
+int ssh_packet_send_newkeys(ssh_session session);
|
||||
int ssh_packet_send_unimplemented(ssh_session session, uint32_t seqnum);
|
||||
int ssh_packet_parse_type(ssh_session session);
|
||||
//int packet_flush(ssh_session session, int enforce_blocking);
|
||||
diff --git a/include/libssh/session.h b/include/libssh/session.h
|
||||
index eb14e97a..97936195 100644
|
||||
--- a/include/libssh/session.h
|
||||
+++ b/include/libssh/session.h
|
||||
@@ -81,6 +81,12 @@ enum ssh_pending_call_e {
|
||||
* sending it twice during key exchange to simplify the state machine. */
|
||||
#define SSH_SESSION_FLAG_KEXINIT_SENT 4
|
||||
|
||||
+/* The current SSH2 session implements the "strict KEX" feature and should behave
|
||||
+ * differently on SSH2_MSG_NEWKEYS. */
|
||||
+#define SSH_SESSION_FLAG_KEX_STRICT 0x0010
|
||||
+/* Unexpected packets have been sent while the session was still unencrypted */
|
||||
+#define SSH_SESSION_FLAG_KEX_TAINTED 0x0020
|
||||
+
|
||||
/* codes to use with ssh_handle_packets*() */
|
||||
/* Infinite timeout */
|
||||
#define SSH_TIMEOUT_INFINITE -1
|
||||
diff --git a/src/curve25519.c b/src/curve25519.c
|
||||
index 66291b5f..4aeb4756 100644
|
||||
--- a/src/curve25519.c
|
||||
+++ b/src/curve25519.c
|
||||
@@ -335,16 +335,10 @@ static SSH_PACKET_CALLBACK(ssh_packet_client_curve25519_reply){
|
||||
}
|
||||
|
||||
/* Send the MSG_NEWKEYS */
|
||||
- if (ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS) < 0) {
|
||||
- goto error;
|
||||
- }
|
||||
-
|
||||
- rc=ssh_packet_send(session);
|
||||
+ rc = ssh_packet_send_newkeys(session);
|
||||
if (rc == SSH_ERROR) {
|
||||
goto error;
|
||||
}
|
||||
-
|
||||
- SSH_LOG(SSH_LOG_DEBUG, "SSH_MSG_NEWKEYS sent");
|
||||
session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
|
||||
return SSH_PACKET_USED;
|
||||
@@ -502,18 +496,13 @@ static SSH_PACKET_CALLBACK(ssh_packet_server_curve25519_init){
|
||||
return SSH_ERROR;
|
||||
}
|
||||
|
||||
- /* Send the MSG_NEWKEYS */
|
||||
- rc = ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS);
|
||||
- if (rc < 0) {
|
||||
- goto error;
|
||||
- }
|
||||
-
|
||||
session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
- rc = ssh_packet_send(session);
|
||||
+
|
||||
+ /* Send the MSG_NEWKEYS */
|
||||
+ rc = ssh_packet_send_newkeys(session);
|
||||
if (rc == SSH_ERROR) {
|
||||
goto error;
|
||||
}
|
||||
- SSH_LOG(SSH_LOG_DEBUG, "SSH_MSG_NEWKEYS sent");
|
||||
|
||||
return SSH_PACKET_USED;
|
||||
error:
|
||||
diff --git a/src/dh-gex.c b/src/dh-gex.c
|
||||
index 91617081..642a88ae 100644
|
||||
--- a/src/dh-gex.c
|
||||
+++ b/src/dh-gex.c
|
||||
@@ -297,15 +297,10 @@ static SSH_PACKET_CALLBACK(ssh_packet_client_dhgex_reply)
|
||||
}
|
||||
|
||||
/* Send the MSG_NEWKEYS */
|
||||
- if (ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS) < 0) {
|
||||
- goto error;
|
||||
- }
|
||||
-
|
||||
- rc = ssh_packet_send(session);
|
||||
+ rc = ssh_packet_send_newkeys(session);
|
||||
if (rc == SSH_ERROR) {
|
||||
goto error;
|
||||
}
|
||||
- SSH_LOG(SSH_LOG_DEBUG, "SSH_MSG_NEWKEYS sent");
|
||||
session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
|
||||
return SSH_PACKET_USED;
|
||||
diff --git a/src/dh.c b/src/dh.c
|
||||
index 011d97b3..e19e43d1 100644
|
||||
--- a/src/dh.c
|
||||
+++ b/src/dh.c
|
||||
@@ -398,16 +398,10 @@ SSH_PACKET_CALLBACK(ssh_packet_client_dh_reply){
|
||||
}
|
||||
|
||||
/* Send the MSG_NEWKEYS */
|
||||
- if (ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS) < 0) {
|
||||
- goto error;
|
||||
- }
|
||||
-
|
||||
- rc=ssh_packet_send(session);
|
||||
+ rc = ssh_packet_send_newkeys(session);
|
||||
if (rc == SSH_ERROR) {
|
||||
goto error;
|
||||
}
|
||||
-
|
||||
- SSH_LOG(SSH_LOG_DEBUG, "SSH_MSG_NEWKEYS sent");
|
||||
session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
return SSH_PACKET_USED;
|
||||
error:
|
||||
@@ -551,15 +545,12 @@ int ssh_server_dh_process_init(ssh_session session, ssh_buffer packet)
|
||||
}
|
||||
SSH_LOG(SSH_LOG_DEBUG, "Sent KEX_DH_[GEX]_REPLY");
|
||||
|
||||
- if (ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS) < 0) {
|
||||
- ssh_buffer_reinit(session->out_buffer);
|
||||
- goto error;
|
||||
- }
|
||||
session->dh_handshake_state=DH_STATE_NEWKEYS_SENT;
|
||||
- if (ssh_packet_send(session) == SSH_ERROR) {
|
||||
+ /* Send the MSG_NEWKEYS */
|
||||
+ rc = ssh_packet_send_newkeys(session);
|
||||
+ if (rc == SSH_ERROR) {
|
||||
goto error;
|
||||
}
|
||||
- SSH_LOG(SSH_LOG_PACKET, "SSH_MSG_NEWKEYS sent");
|
||||
|
||||
return SSH_OK;
|
||||
error:
|
||||
diff --git a/src/ecdh.c b/src/ecdh.c
|
||||
index e5b11ba9..af80beec 100644
|
||||
--- a/src/ecdh.c
|
||||
+++ b/src/ecdh.c
|
||||
@@ -93,16 +93,10 @@ SSH_PACKET_CALLBACK(ssh_packet_client_ecdh_reply){
|
||||
}
|
||||
|
||||
/* Send the MSG_NEWKEYS */
|
||||
- if (ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS) < 0) {
|
||||
- goto error;
|
||||
- }
|
||||
-
|
||||
- rc=ssh_packet_send(session);
|
||||
+ rc = ssh_packet_send_newkeys(session);
|
||||
if (rc == SSH_ERROR) {
|
||||
goto error;
|
||||
}
|
||||
-
|
||||
- SSH_LOG(SSH_LOG_DEBUG, "SSH_MSG_NEWKEYS sent");
|
||||
session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
|
||||
return SSH_PACKET_USED;
|
||||
diff --git a/src/ecdh_crypto.c b/src/ecdh_crypto.c
|
||||
index 51084b7a..069b1372 100644
|
||||
--- a/src/ecdh_crypto.c
|
||||
+++ b/src/ecdh_crypto.c
|
||||
@@ -619,18 +619,12 @@ SSH_PACKET_CALLBACK(ssh_packet_server_ecdh_init){
|
||||
goto error;
|
||||
}
|
||||
|
||||
- /* Send the MSG_NEWKEYS */
|
||||
- rc = ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS);
|
||||
- if (rc < 0) {
|
||||
- goto error;
|
||||
- }
|
||||
-
|
||||
session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
- rc = ssh_packet_send(session);
|
||||
- if (rc == SSH_ERROR){
|
||||
+ /* Send the MSG_NEWKEYS */
|
||||
+ rc = ssh_packet_send_newkeys(session);
|
||||
+ if (rc == SSH_ERROR) {
|
||||
goto error;
|
||||
}
|
||||
- SSH_LOG(SSH_LOG_DEBUG, "SSH_MSG_NEWKEYS sent");
|
||||
|
||||
return SSH_PACKET_USED;
|
||||
error:
|
||||
diff --git a/src/ecdh_gcrypt.c b/src/ecdh_gcrypt.c
|
||||
index 235f2904..3d9d426f 100644
|
||||
--- a/src/ecdh_gcrypt.c
|
||||
+++ b/src/ecdh_gcrypt.c
|
||||
@@ -372,17 +372,13 @@ SSH_PACKET_CALLBACK(ssh_packet_server_ecdh_init){
|
||||
goto out;
|
||||
}
|
||||
|
||||
-
|
||||
+ session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
/* Send the MSG_NEWKEYS */
|
||||
- rc = ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS);
|
||||
- if (rc != SSH_OK) {
|
||||
+ rc = ssh_packet_send_newkeys(session);
|
||||
+ if (rc == SSH_ERROR) {
|
||||
goto out;
|
||||
}
|
||||
|
||||
- session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
- rc = ssh_packet_send(session);
|
||||
- SSH_LOG(SSH_LOG_DEBUG, "SSH_MSG_NEWKEYS sent");
|
||||
-
|
||||
out:
|
||||
gcry_sexp_release(param);
|
||||
gcry_sexp_release(key);
|
||||
diff --git a/src/ecdh_mbedcrypto.c b/src/ecdh_mbedcrypto.c
|
||||
index cfe017a0..dda73922 100644
|
||||
--- a/src/ecdh_mbedcrypto.c
|
||||
+++ b/src/ecdh_mbedcrypto.c
|
||||
@@ -318,16 +318,13 @@ SSH_PACKET_CALLBACK(ssh_packet_server_ecdh_init){
|
||||
goto out;
|
||||
}
|
||||
|
||||
- rc = ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS);
|
||||
- if (rc < 0) {
|
||||
- rc = SSH_ERROR;
|
||||
+ session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
+ /* Send the MSG_NEWKEYS */
|
||||
+ rc = ssh_packet_send_newkeys(session);
|
||||
+ if (rc == SSH_ERROR) {
|
||||
goto out;
|
||||
}
|
||||
|
||||
- session->dh_handshake_state = DH_STATE_NEWKEYS_SENT;
|
||||
- rc = ssh_packet_send(session);
|
||||
- SSH_LOG(SSH_LOG_DEBUG, "SSH_MSG_NEWKEYS sent");
|
||||
-
|
||||
out:
|
||||
mbedtls_ecp_group_free(&grp);
|
||||
if (rc == SSH_ERROR) {
|
||||
diff --git a/src/kex.c b/src/kex.c
|
||||
index b9455d2d..3818297b 100644
|
||||
--- a/src/kex.c
|
||||
+++ b/src/kex.c
|
||||
@@ -188,6 +188,9 @@
|
||||
|
||||
/* RFC 8308 */
|
||||
#define KEX_EXTENSION_CLIENT "ext-info-c"
|
||||
+/* Strict kex mitigation against CVE-2023-48795 */
|
||||
+#define KEX_STRICT_CLIENT "kex-strict-c-v00@openssh.com"
|
||||
+#define KEX_STRICT_SERVER "kex-strict-s-v00@openssh.com"
|
||||
|
||||
/* Allowed algorithms in FIPS mode */
|
||||
#define FIPS_ALLOWED_CIPHERS "aes256-gcm@openssh.com,"\
|
||||
@@ -516,6 +519,27 @@ SSH_PACKET_CALLBACK(ssh_packet_kexinit)
|
||||
session->first_kex_follows_guess_wrong ? "wrong" : "right");
|
||||
}
|
||||
|
||||
+ /*
|
||||
+ * handle the "strict KEX" feature. If supported by peer, then set up the
|
||||
+ * flag and verify packet sequence numbers.
|
||||
+ */
|
||||
+ if (server_kex) {
|
||||
+ ok = ssh_match_group(crypto->client_kex.methods[SSH_KEX],
|
||||
+ KEX_STRICT_CLIENT);
|
||||
+ if (ok) {
|
||||
+ SSH_LOG(SSH_LOG_DEBUG, "Client supports strict kex, enabling.");
|
||||
+ session->flags |= SSH_SESSION_FLAG_KEX_STRICT;
|
||||
+ }
|
||||
+ } else {
|
||||
+ /* client kex */
|
||||
+ ok = ssh_match_group(crypto->server_kex.methods[SSH_KEX],
|
||||
+ KEX_STRICT_SERVER);
|
||||
+ if (ok) {
|
||||
+ SSH_LOG(SSH_LOG_DEBUG, "Server supports strict kex, enabling.");
|
||||
+ session->flags |= SSH_SESSION_FLAG_KEX_STRICT;
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
if (server_kex) {
|
||||
/*
|
||||
* If client sent a ext-info-c message in the kex list, it supports
|
||||
@@ -792,21 +816,21 @@ int ssh_set_client_kex(ssh_session session)
|
||||
return SSH_OK;
|
||||
}
|
||||
|
||||
- /* Here we append ext-info-c to the list of kex algorithms */
|
||||
+ /* Here we append ext-info-c and kex-strict-c-v00@openssh.com to the list of kex algorithms */
|
||||
kex = client->methods[SSH_KEX];
|
||||
len = strlen(kex);
|
||||
- if (len + strlen(KEX_EXTENSION_CLIENT) + 2 < len) {
|
||||
+ /* Comma, comma, nul byte */
|
||||
+ kex_len = len + 1 + strlen(KEX_EXTENSION_CLIENT) + 1 + strlen(KEX_STRICT_CLIENT ) + 1;
|
||||
+ if (kex_len >= MAX_PACKET_LEN) {
|
||||
/* Overflow */
|
||||
return SSH_ERROR;
|
||||
}
|
||||
- kex_len = len + strlen(KEX_EXTENSION_CLIENT) + 2; /* comma, NULL */
|
||||
kex_tmp = realloc(kex, kex_len);
|
||||
if (kex_tmp == NULL) {
|
||||
- free(kex);
|
||||
ssh_set_error_oom(session);
|
||||
return SSH_ERROR;
|
||||
}
|
||||
- snprintf(kex_tmp + len, kex_len - len, ",%s", KEX_EXTENSION_CLIENT);
|
||||
+ snprintf(kex_tmp + len, kex_len - len, ",%s,%s", KEX_EXTENSION_CLIENT, KEX_STRICT_CLIENT);
|
||||
client->methods[SSH_KEX] = kex_tmp;
|
||||
|
||||
return SSH_OK;
|
||||
diff --git a/src/packet.c b/src/packet.c
|
||||
index eb7eb42a..ea73f9ad 100644
|
||||
--- a/src/packet.c
|
||||
+++ b/src/packet.c
|
||||
@@ -1314,6 +1314,19 @@ ssh_packet_socket_callback(const void *data, size_t receivedlen, void *user)
|
||||
}
|
||||
#endif /* WITH_ZLIB */
|
||||
payloadsize = ssh_buffer_get_len(session->in_buffer);
|
||||
+ if (session->recv_seq == UINT32_MAX) {
|
||||
+ /* Overflowing sequence numbers is always fishy */
|
||||
+ if (crypto == NULL) {
|
||||
+ /* don't allow sequence number overflow when unencrypted */
|
||||
+ ssh_set_error(session,
|
||||
+ SSH_FATAL,
|
||||
+ "Incoming sequence number overflow");
|
||||
+ goto error;
|
||||
+ } else {
|
||||
+ SSH_LOG(SSH_LOG_WARNING,
|
||||
+ "Incoming sequence number overflow");
|
||||
+ }
|
||||
+ }
|
||||
session->recv_seq++;
|
||||
if (crypto != NULL) {
|
||||
struct ssh_cipher_struct *cipher = NULL;
|
||||
@@ -1354,6 +1379,9 @@ ssh_packet_socket_callback(const void *data, size_t receivedlen, void *user)
|
||||
session->in_packet.type);
|
||||
goto error;
|
||||
case SSH_PACKET_UNKNOWN:
|
||||
+ if (crypto == NULL) {
|
||||
+ session->flags |= SSH_SESSION_FLAG_KEX_TAINTED;
|
||||
+ }
|
||||
ssh_packet_send_unimplemented(session, session->recv_seq - 1);
|
||||
break;
|
||||
}
|
||||
@@ -1529,7 +1557,33 @@ void ssh_packet_process(ssh_session session, uint8_t type)
|
||||
SSH_LOG(SSH_LOG_RARE, "Failed to send unimplemented: %s",
|
||||
ssh_get_error(session));
|
||||
}
|
||||
+ if (session->current_crypto == NULL) {
|
||||
+ session->flags |= SSH_SESSION_FLAG_KEX_TAINTED;
|
||||
+ }
|
||||
+ }
|
||||
+}
|
||||
+
|
||||
+/** @internal
|
||||
+ * @brief sends a SSH_MSG_NEWKEYS when enabling the new negotiated ciphers
|
||||
+ * @param session the SSH session
|
||||
+ * @return SSH_ERROR on error, else SSH_OK
|
||||
+ */
|
||||
+int ssh_packet_send_newkeys(ssh_session session)
|
||||
+{
|
||||
+ int rc;
|
||||
+
|
||||
+ /* Send the MSG_NEWKEYS */
|
||||
+ rc = ssh_buffer_add_u8(session->out_buffer, SSH2_MSG_NEWKEYS);
|
||||
+ if (rc < 0) {
|
||||
+ return rc;
|
||||
}
|
||||
+
|
||||
+ rc = ssh_packet_send(session);
|
||||
+ if (rc == SSH_ERROR) {
|
||||
+ return rc;
|
||||
+ }
|
||||
+ SSH_LOG(SSH_LOG_DEBUG, "SSH_MSG_NEWKEYS sent");
|
||||
+ return rc;
|
||||
}
|
||||
|
||||
/** @internal
|
||||
@@ -1842,6 +1896,10 @@ int ssh_packet_send(ssh_session session)
|
||||
if (rc == SSH_OK && type == SSH2_MSG_NEWKEYS) {
|
||||
struct ssh_iterator *it;
|
||||
|
||||
+ if (session->flags & SSH_SESSION_FLAG_KEX_STRICT) {
|
||||
+ /* reset packet sequence number when running in strict kex mode */
|
||||
+ session->send_seq = 0;
|
||||
+ }
|
||||
for (it = ssh_list_get_iterator(session->out_queue);
|
||||
it != NULL;
|
||||
it = ssh_list_get_iterator(session->out_queue)) {
|
||||
diff --git a/src/packet_cb.c b/src/packet_cb.c
|
||||
index 0ecf8771..2f364c26 100644
|
||||
--- a/src/packet_cb.c
|
||||
+++ b/src/packet_cb.c
|
||||
@@ -115,6 +115,18 @@ SSH_PACKET_CALLBACK(ssh_packet_newkeys){
|
||||
goto error;
|
||||
}
|
||||
|
||||
+ if (session->flags & SSH_SESSION_FLAG_KEX_STRICT) {
|
||||
+ /* reset packet sequence number when running in strict kex mode */
|
||||
+ session->recv_seq = 0;
|
||||
+ /* Check that we aren't tainted */
|
||||
+ if (session->flags & SSH_SESSION_FLAG_KEX_TAINTED) {
|
||||
+ ssh_set_error(session,
|
||||
+ SSH_FATAL,
|
||||
+ "Received unexpected packets in strict KEX mode.");
|
||||
+ goto error;
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
if(session->server){
|
||||
/* server things are done in server.c */
|
||||
session->dh_handshake_state=DH_STATE_FINISHED;
|
||||
--
|
||||
2.41.0
|
||||
|
||||
|
||||
From 0870c8db28be9eb457ee3d4f9a168959d9507efd Mon Sep 17 00:00:00 2001
|
||||
From: Aris Adamantiadis <aris@0xbadc0de.be>
|
||||
Date: Tue, 12 Dec 2023 23:30:26 +0100
|
||||
Subject: [PATCH 2/4] CVE-2023-48795: Server side mitigations
|
||||
|
||||
Signed-off-by: Aris Adamantiadis <aris@0xbadc0de.be>
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
||||
---
|
||||
include/libssh/kex.h | 1 +
|
||||
src/kex.c | 46 ++++++++++++++++++++++++++++++++++----------
|
||||
src/server.c | 8 +++++++-
|
||||
3 files changed, 44 insertions(+), 11 deletions(-)
|
||||
|
||||
diff --git a/include/libssh/kex.h b/include/libssh/kex.h
|
||||
index ede7fa8a..ba98fded 100644
|
||||
--- a/include/libssh/kex.h
|
||||
+++ b/include/libssh/kex.h
|
||||
@@ -40,6 +40,7 @@ SSH_PACKET_CALLBACK(ssh_packet_kexinit);
|
||||
int ssh_send_kex(ssh_session session);
|
||||
void ssh_list_kex(struct ssh_kex_struct *kex);
|
||||
int ssh_set_client_kex(ssh_session session);
|
||||
+int ssh_kex_append_extensions(ssh_session session, struct ssh_kex_struct *pkex);
|
||||
int ssh_kex_select_methods(ssh_session session);
|
||||
int ssh_verify_existing_algo(enum ssh_kex_types_e algo, const char *name);
|
||||
char *ssh_keep_known_algos(enum ssh_kex_types_e algo, const char *list);
|
||||
diff --git a/src/kex.c b/src/kex.c
|
||||
index 3818297b..9ad671db 100644
|
||||
--- a/src/kex.c
|
||||
+++ b/src/kex.c
|
||||
@@ -763,11 +763,8 @@ int ssh_set_client_kex(ssh_session session)
|
||||
{
|
||||
struct ssh_kex_struct *client = &session->next_crypto->client_kex;
|
||||
const char *wanted;
|
||||
- char *kex = NULL;
|
||||
- char *kex_tmp = NULL;
|
||||
int ok;
|
||||
int i;
|
||||
- size_t kex_len, len;
|
||||
|
||||
/* Skip if already set, for example for the rekey or when we do the guessing
|
||||
* it could have been already used to make some protocol decisions. */
|
||||
@@ -816,11 +813,33 @@ int ssh_set_client_kex(ssh_session session)
|
||||
return SSH_OK;
|
||||
}
|
||||
|
||||
- /* Here we append ext-info-c and kex-strict-c-v00@openssh.com to the list of kex algorithms */
|
||||
- kex = client->methods[SSH_KEX];
|
||||
+ ok = ssh_kex_append_extensions(session, client);
|
||||
+ if (ok != SSH_OK){
|
||||
+ return ok;
|
||||
+ }
|
||||
+
|
||||
+ return SSH_OK;
|
||||
+}
|
||||
+
|
||||
+int ssh_kex_append_extensions(ssh_session session, struct ssh_kex_struct *pkex)
|
||||
+{
|
||||
+ char *kex = NULL;
|
||||
+ char *kex_tmp = NULL;
|
||||
+ size_t kex_len, len;
|
||||
+
|
||||
+ /* Here we append ext-info-c and kex-strict-c-v00@openssh.com for client
|
||||
+ * and kex-strict-s-v00@openssh.com for server to the list of kex algorithms
|
||||
+ */
|
||||
+ kex = pkex->methods[SSH_KEX];
|
||||
len = strlen(kex);
|
||||
- /* Comma, comma, nul byte */
|
||||
- kex_len = len + 1 + strlen(KEX_EXTENSION_CLIENT) + 1 + strlen(KEX_STRICT_CLIENT ) + 1;
|
||||
+ if (session->server) {
|
||||
+ /* Comma, nul byte */
|
||||
+ kex_len = len + 1 + strlen(KEX_STRICT_SERVER) + 1;
|
||||
+ } else {
|
||||
+ /* Comma, comma, nul byte */
|
||||
+ kex_len = len + 1 + strlen(KEX_EXTENSION_CLIENT) + 1 +
|
||||
+ strlen(KEX_STRICT_CLIENT) + 1;
|
||||
+ }
|
||||
if (kex_len >= MAX_PACKET_LEN) {
|
||||
/* Overflow */
|
||||
return SSH_ERROR;
|
||||
@@ -830,9 +849,16 @@ int ssh_set_client_kex(ssh_session session)
|
||||
ssh_set_error_oom(session);
|
||||
return SSH_ERROR;
|
||||
}
|
||||
- snprintf(kex_tmp + len, kex_len - len, ",%s,%s", KEX_EXTENSION_CLIENT, KEX_STRICT_CLIENT);
|
||||
- client->methods[SSH_KEX] = kex_tmp;
|
||||
-
|
||||
+ if (session->server){
|
||||
+ snprintf(kex_tmp + len, kex_len - len, ",%s", KEX_STRICT_SERVER);
|
||||
+ } else {
|
||||
+ snprintf(kex_tmp + len,
|
||||
+ kex_len - len,
|
||||
+ ",%s,%s",
|
||||
+ KEX_EXTENSION_CLIENT,
|
||||
+ KEX_STRICT_CLIENT);
|
||||
+ }
|
||||
+ pkex->methods[SSH_KEX] = kex_tmp;
|
||||
return SSH_OK;
|
||||
}
|
||||
|
||||
diff --git a/src/server.c b/src/server.c
|
||||
index dc070a73..70b90899 100644
|
||||
--- a/src/server.c
|
||||
+++ b/src/server.c
|
||||
@@ -195,7 +195,13 @@ int server_set_kex(ssh_session session)
|
||||
}
|
||||
}
|
||||
|
||||
- return 0;
|
||||
+ /* Do not append the extensions during rekey */
|
||||
+ if (session->flags & SSH_SESSION_FLAG_AUTHENTICATED) {
|
||||
+ return SSH_OK;
|
||||
+ }
|
||||
+
|
||||
+ rc = ssh_kex_append_extensions(session, server);
|
||||
+ return rc;
|
||||
}
|
||||
|
||||
int ssh_server_init_kex(ssh_session session) {
|
||||
--
|
||||
2.41.0
|
||||
|
||||
|
||||
From 5846e57538c750c5ce67df887d09fa99861c79c6 Mon Sep 17 00:00:00 2001
|
||||
From: Jakub Jelen <jjelen@redhat.com>
|
||||
Date: Thu, 14 Dec 2023 12:22:01 +0100
|
||||
Subject: [PATCH 3/4] CVE-2023-48795: Strip extensions from both kex lists for
|
||||
matching
|
||||
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
||||
---
|
||||
src/kex.c | 16 ++++++++++++----
|
||||
1 file changed, 12 insertions(+), 4 deletions(-)
|
||||
|
||||
diff --git a/src/kex.c b/src/kex.c
|
||||
index 9ad671db..fbc70cf4 100644
|
||||
--- a/src/kex.c
|
||||
+++ b/src/kex.c
|
||||
@@ -961,11 +961,19 @@ int ssh_kex_select_methods (ssh_session session)
|
||||
enum ssh_key_exchange_e kex_type;
|
||||
int i;
|
||||
|
||||
- /* Here we should drop the ext-info-c from the list so we avoid matching.
|
||||
+ /* Here we should drop the extensions from the list so we avoid matching.
|
||||
* it. We added it to the end, so we can just truncate the string here */
|
||||
- ext_start = strstr(client->methods[SSH_KEX], ","KEX_EXTENSION_CLIENT);
|
||||
- if (ext_start != NULL) {
|
||||
- ext_start[0] = '\0';
|
||||
+ if (session->client) {
|
||||
+ ext_start = strstr(client->methods[SSH_KEX], "," KEX_EXTENSION_CLIENT);
|
||||
+ if (ext_start != NULL) {
|
||||
+ ext_start[0] = '\0';
|
||||
+ }
|
||||
+ }
|
||||
+ if (session->server) {
|
||||
+ ext_start = strstr(server->methods[SSH_KEX], "," KEX_STRICT_SERVER);
|
||||
+ if (ext_start != NULL) {
|
||||
+ ext_start[0] = '\0';
|
||||
+ }
|
||||
}
|
||||
|
||||
for (i = 0; i < SSH_KEX_METHODS; i++) {
|
||||
--
|
||||
2.41.0
|
||||
|
||||
|
||||
From 89df759200d31fc79fbbe213d8eda0d329eebf6d Mon Sep 17 00:00:00 2001
|
||||
From: Jakub Jelen <jjelen@redhat.com>
|
||||
Date: Thu, 14 Dec 2023 12:47:48 +0100
|
||||
Subject: [PATCH 4/4] CVE-2023-48795: tests: Adjust calculation to strict kex
|
||||
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
||||
---
|
||||
tests/client/torture_rekey.c | 55 ++++++++++++++++++++----------------
|
||||
1 file changed, 31 insertions(+), 24 deletions(-)
|
||||
|
||||
diff --git a/tests/client/torture_rekey.c b/tests/client/torture_rekey.c
|
||||
index ccd5ae2c..57e03e3f 100644
|
||||
--- a/tests/client/torture_rekey.c
|
||||
+++ b/tests/client/torture_rekey.c
|
||||
@@ -148,6 +148,29 @@ static void torture_rekey_default(void **state)
|
||||
ssh_disconnect(s->ssh.session);
|
||||
}
|
||||
|
||||
+static void sanity_check_session(void **state)
|
||||
+{
|
||||
+ struct torture_state *s = *state;
|
||||
+ struct ssh_crypto_struct *c = NULL;
|
||||
+
|
||||
+ c = s->ssh.session->current_crypto;
|
||||
+ assert_non_null(c);
|
||||
+ assert_int_equal(c->in_cipher->max_blocks,
|
||||
+ bytes / c->in_cipher->blocksize);
|
||||
+ assert_int_equal(c->out_cipher->max_blocks,
|
||||
+ bytes / c->out_cipher->blocksize);
|
||||
+ /* when strict kex is used, the newkeys reset the sequence number */
|
||||
+ if ((s->ssh.session->flags & SSH_SESSION_FLAG_KEX_STRICT) != 0) {
|
||||
+ assert_int_equal(c->out_cipher->packets, s->ssh.session->send_seq);
|
||||
+ assert_int_equal(c->in_cipher->packets, s->ssh.session->recv_seq);
|
||||
+ } else {
|
||||
+ /* Otherwise we have less encrypted packets than transferred
|
||||
+ * (first are not encrypted) */
|
||||
+ assert_true(c->out_cipher->packets < s->ssh.session->send_seq);
|
||||
+ assert_true(c->in_cipher->packets < s->ssh.session->recv_seq);
|
||||
+ }
|
||||
+}
|
||||
+
|
||||
/* We lower the rekey limits manually and check that the rekey
|
||||
* really happens when sending data
|
||||
*/
|
||||
@@ -166,16 +189,10 @@ static void torture_rekey_send(void **state)
|
||||
rc = ssh_connect(s->ssh.session);
|
||||
assert_ssh_return_code(s->ssh.session, rc);
|
||||
|
||||
- /* The blocks limit is set correctly */
|
||||
- c = s->ssh.session->current_crypto;
|
||||
- assert_int_equal(c->in_cipher->max_blocks,
|
||||
- bytes / c->in_cipher->blocksize);
|
||||
- assert_int_equal(c->out_cipher->max_blocks,
|
||||
- bytes / c->out_cipher->blocksize);
|
||||
- /* We should have less encrypted packets than transfered (first are not encrypted) */
|
||||
- assert_true(c->out_cipher->packets < s->ssh.session->send_seq);
|
||||
- assert_true(c->in_cipher->packets < s->ssh.session->recv_seq);
|
||||
+ sanity_check_session(state);
|
||||
/* Copy the initial secret hash = session_id so we know we changed keys later */
|
||||
+ c = s->ssh.session->current_crypto;
|
||||
+ assert_non_null(c);
|
||||
secret_hash = malloc(c->digest_len);
|
||||
assert_non_null(secret_hash);
|
||||
memcpy(secret_hash, c->secret_hash, c->digest_len);
|
||||
@@ -468,15 +480,10 @@ static void torture_rekey_different_kex(void **state)
|
||||
assert_ssh_return_code(s->ssh.session, rc);
|
||||
|
||||
/* The blocks limit is set correctly */
|
||||
- c = s->ssh.session->current_crypto;
|
||||
- assert_int_equal(c->in_cipher->max_blocks,
|
||||
- bytes / c->in_cipher->blocksize);
|
||||
- assert_int_equal(c->out_cipher->max_blocks,
|
||||
- bytes / c->out_cipher->blocksize);
|
||||
- /* We should have less encrypted packets than transfered (first are not encrypted) */
|
||||
- assert_true(c->out_cipher->packets < s->ssh.session->send_seq);
|
||||
- assert_true(c->in_cipher->packets < s->ssh.session->recv_seq);
|
||||
+ sanity_check_session(state);
|
||||
/* Copy the initial secret hash = session_id so we know we changed keys later */
|
||||
+ c = s->ssh.session->current_crypto;
|
||||
+ assert_non_null(c);
|
||||
secret_hash = malloc(c->digest_len);
|
||||
assert_non_null(secret_hash);
|
||||
memcpy(secret_hash, c->secret_hash, c->digest_len);
|
||||
--
|
||||
2.41.0
|
||||
|
||||
diff -up libssh-0.10.4/src/packet.c.CVE-2023-48795.patch libssh-0.10.4/src/packet.c
|
||||
--- libssh-0.10.4/src/packet.c.CVE-2023-48795.patch 2024-01-09 05:46:53.064383034 +0100
|
||||
+++ libssh-0.10.4/src/packet.c 2024-01-09 05:48:28.360340184 +0100
|
||||
@@ -1345,6 +1345,19 @@ size_t ssh_packet_socket_callback(const
|
||||
"packet: read type %hhd [len=%d,padding=%hhd,comp=%d,payload=%d]",
|
||||
session->in_packet.type, packet_len, padding, compsize, payloadsize);
|
||||
|
||||
+ if (crypto == NULL) {
|
||||
+ /* In strict kex, only a few packets are allowed. Taint the session
|
||||
+ * if we received packets that are normally allowed but to be
|
||||
+ * refused if we are in strict kex when KEX is over.
|
||||
+ */
|
||||
+ uint8_t type = session->in_packet.type;
|
||||
+
|
||||
+ if (type != SSH2_MSG_KEXINIT && type != SSH2_MSG_NEWKEYS &&
|
||||
+ (type < SSH2_MSG_KEXDH_INIT ||
|
||||
+ type > SSH2_MSG_KEX_DH_GEX_REQUEST)) {
|
||||
+ session->flags |= SSH_SESSION_FLAG_KEX_TAINTED;
|
||||
+ }
|
||||
+ }
|
||||
/* Check if the packet is expected */
|
||||
filter_result = ssh_packet_incoming_filter(session);
|
||||
|
||||
diff -up libssh-0.10.4/tests/client/torture_rekey.c.CVE-2023-48795.patch libssh-0.10.4/tests/client/torture_rekey.c
|
||||
--- libssh-0.10.4/tests/client/torture_rekey.c.CVE-2023-48795.patch 2024-01-09 18:48:16.684366049 +0100
|
||||
+++ libssh-0.10.4/tests/client/torture_rekey.c 2024-01-09 18:50:49.135897268 +0100
|
||||
@@ -290,14 +290,10 @@ static void torture_rekey_recv(void **st
|
||||
mode_t mask;
|
||||
int rc;
|
||||
|
||||
- /* The blocks limit is set correctly */
|
||||
- c = s->ssh.session->current_crypto;
|
||||
- assert_int_equal(c->in_cipher->max_blocks, bytes / c->in_cipher->blocksize);
|
||||
- assert_int_equal(c->out_cipher->max_blocks, bytes / c->out_cipher->blocksize);
|
||||
- /* We should have less encrypted packets than transfered (first are not encrypted) */
|
||||
- assert_true(c->out_cipher->packets < s->ssh.session->send_seq);
|
||||
- assert_true(c->in_cipher->packets < s->ssh.session->recv_seq);
|
||||
+ sanity_check_session(state);
|
||||
/* Copy the initial secret hash = session_id so we know we changed keys later */
|
||||
+ c = s->ssh.session->current_crypto;
|
||||
+ assert_non_null(c);
|
||||
secret_hash = malloc(c->digest_len);
|
||||
assert_non_null(secret_hash);
|
||||
memcpy(secret_hash, c->secret_hash, c->digest_len);
|
@ -0,0 +1,82 @@
|
||||
diff --color -ru ../libssh-0.10.4/src/pki_crypto.c ./src/pki_crypto.c
|
||||
--- ../libssh-0.10.4/src/pki_crypto.c 2023-04-27 13:24:03.105744519 +0200
|
||||
+++ ./src/pki_crypto.c 2023-04-27 13:30:24.016756496 +0200
|
||||
@@ -3186,8 +3186,12 @@
|
||||
unsigned char *raw_sig_data = NULL;
|
||||
unsigned int raw_sig_len;
|
||||
|
||||
+ /* Function return code
|
||||
+ * Do not change this variable throughout the function until the signature
|
||||
+ * is successfully verified!
|
||||
+ */
|
||||
int rc = SSH_ERROR;
|
||||
- int evp_rc;
|
||||
+ int ok;
|
||||
|
||||
if (pubkey == NULL || ssh_key_is_private(pubkey) || input == NULL ||
|
||||
signature == NULL || (signature->raw_sig == NULL
|
||||
@@ -3202,8 +3206,8 @@
|
||||
}
|
||||
|
||||
/* Check if public key and hash type are compatible */
|
||||
- rc = pki_key_check_hash_compatible(pubkey, signature->hash_type);
|
||||
- if (rc != SSH_OK) {
|
||||
+ ok = pki_key_check_hash_compatible(pubkey, signature->hash_type);
|
||||
+ if (ok != SSH_OK) {
|
||||
return SSH_ERROR;
|
||||
}
|
||||
|
||||
@@ -3248,8 +3252,8 @@
|
||||
}
|
||||
|
||||
/* Verify the signature */
|
||||
- evp_rc = EVP_DigestVerifyInit(ctx, NULL, md, NULL, pkey);
|
||||
- if (evp_rc != 1){
|
||||
+ ok = EVP_DigestVerifyInit(ctx, NULL, md, NULL, pkey);
|
||||
+ if (ok != 1){
|
||||
SSH_LOG(SSH_LOG_TRACE,
|
||||
"EVP_DigestVerifyInit() failed: %s",
|
||||
ERR_error_string(ERR_get_error(), NULL));
|
||||
@@ -3257,32 +3261,30 @@
|
||||
}
|
||||
|
||||
#ifdef HAVE_OPENSSL_EVP_DIGESTVERIFY
|
||||
- evp_rc = EVP_DigestVerify(ctx, raw_sig_data, raw_sig_len, input, input_len);
|
||||
+ ok = EVP_DigestVerify(ctx, raw_sig_data, raw_sig_len, input, input_len);
|
||||
#else
|
||||
- evp_rc = EVP_DigestVerifyUpdate(ctx, input, input_len);
|
||||
- if (evp_rc != 1) {
|
||||
+ ok = EVP_DigestVerifyUpdate(ctx, input, input_len);
|
||||
+ if (ok != 1) {
|
||||
SSH_LOG(SSH_LOG_TRACE,
|
||||
"EVP_DigestVerifyUpdate() failed: %s",
|
||||
ERR_error_string(ERR_get_error(), NULL));
|
||||
goto out;
|
||||
}
|
||||
|
||||
- evp_rc = EVP_DigestVerifyFinal(ctx, raw_sig_data, raw_sig_len);
|
||||
+ ok = EVP_DigestVerifyFinal(ctx, raw_sig_data, raw_sig_len);
|
||||
#endif
|
||||
- if (evp_rc == 1) {
|
||||
- SSH_LOG(SSH_LOG_TRACE, "Signature valid");
|
||||
- rc = SSH_OK;
|
||||
- } else {
|
||||
+ if (ok != 1) {
|
||||
SSH_LOG(SSH_LOG_TRACE,
|
||||
"Signature invalid: %s",
|
||||
ERR_error_string(ERR_get_error(), NULL));
|
||||
- rc = SSH_ERROR;
|
||||
+ goto out;
|
||||
}
|
||||
|
||||
+ SSH_LOG(SSH_LOG_TRACE, "Signature valid");
|
||||
+ rc = SSH_OK;
|
||||
+
|
||||
out:
|
||||
- if (ctx != NULL) {
|
||||
- EVP_MD_CTX_free(ctx);
|
||||
- }
|
||||
+ EVP_MD_CTX_free(ctx);
|
||||
EVP_PKEY_free(pkey);
|
||||
return rc;
|
||||
}
|
@ -0,0 +1,23 @@
|
||||
diff --git a/src/dh_crypto.c b/src/dh_crypto.c
|
||||
index a847c6a2..1eb94307 100644
|
||||
--- a/src/dh_crypto.c
|
||||
+++ b/src/dh_crypto.c
|
||||
@@ -341,8 +341,16 @@ int ssh_dh_set_parameters(struct dh_ctx *ctx,
|
||||
goto done;
|
||||
}
|
||||
|
||||
- OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_P, modulus);
|
||||
- OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_G, generator);
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_P, modulus);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto done;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_G, generator);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto done;
|
||||
+ }
|
||||
params = OSSL_PARAM_BLD_to_param(param_bld);
|
||||
if (params == NULL) {
|
||||
OSSL_PARAM_BLD_free(param_bld);
|
@ -0,0 +1,228 @@
|
||||
diff --color -ru ../libssh-0.10.4/src/buffer.c ./src/buffer.c
|
||||
--- ../libssh-0.10.4/src/buffer.c 2023-05-03 12:22:40.304114511 +0200
|
||||
+++ ./src/buffer.c 2023-05-03 12:24:11.578110236 +0200
|
||||
@@ -747,7 +747,8 @@
|
||||
*/
|
||||
int ssh_buffer_validate_length(struct ssh_buffer_struct *buffer, size_t len)
|
||||
{
|
||||
- if (buffer->pos + len < len || buffer->pos + len > buffer->used) {
|
||||
+ if (buffer == NULL || buffer->pos + len < len ||
|
||||
+ buffer->pos + len > buffer->used) {
|
||||
return SSH_ERROR;
|
||||
}
|
||||
|
||||
diff --color -ru ../libssh-0.10.4/src/gssapi.c ./src/gssapi.c
|
||||
--- ../libssh-0.10.4/src/gssapi.c 2023-05-03 12:22:40.356115078 +0200
|
||||
+++ ./src/gssapi.c 2023-05-03 12:24:11.566110105 +0200
|
||||
@@ -444,11 +444,18 @@
|
||||
hexa = ssh_get_hexa(output_token.value, output_token.length);
|
||||
SSH_LOG(SSH_LOG_PACKET, "GSSAPI: sending token %s",hexa);
|
||||
SAFE_FREE(hexa);
|
||||
- ssh_buffer_pack(session->out_buffer,
|
||||
- "bdP",
|
||||
- SSH2_MSG_USERAUTH_GSSAPI_TOKEN,
|
||||
- output_token.length,
|
||||
- (size_t)output_token.length, output_token.value);
|
||||
+ rc = ssh_buffer_pack(session->out_buffer,
|
||||
+ "bdP",
|
||||
+ SSH2_MSG_USERAUTH_GSSAPI_TOKEN,
|
||||
+ output_token.length,
|
||||
+ (size_t)output_token.length, output_token.value);
|
||||
+ if (rc != SSH_OK) {
|
||||
+ ssh_set_error_oom(session);
|
||||
+ ssh_auth_reply_default(session, 0);
|
||||
+ ssh_gssapi_free(session);
|
||||
+ session->gssapi = NULL;
|
||||
+ return SSH_PACKET_USED;
|
||||
+ }
|
||||
ssh_packet_send(session);
|
||||
}
|
||||
|
||||
@@ -857,6 +864,7 @@
|
||||
}
|
||||
|
||||
SSH_PACKET_CALLBACK(ssh_packet_userauth_gssapi_response){
|
||||
+ int rc;
|
||||
ssh_string oid_s;
|
||||
gss_uint32 maj_stat, min_stat;
|
||||
gss_buffer_desc input_token = GSS_C_EMPTY_BUFFER;
|
||||
@@ -908,11 +916,15 @@
|
||||
hexa = ssh_get_hexa(output_token.value, output_token.length);
|
||||
SSH_LOG(SSH_LOG_PACKET, "GSSAPI: sending token %s", hexa);
|
||||
SAFE_FREE(hexa);
|
||||
- ssh_buffer_pack(session->out_buffer,
|
||||
- "bdP",
|
||||
- SSH2_MSG_USERAUTH_GSSAPI_TOKEN,
|
||||
- output_token.length,
|
||||
- (size_t)output_token.length, output_token.value);
|
||||
+ rc = ssh_buffer_pack(session->out_buffer,
|
||||
+ "bdP",
|
||||
+ SSH2_MSG_USERAUTH_GSSAPI_TOKEN,
|
||||
+ output_token.length,
|
||||
+ (size_t)output_token.length, output_token.value);
|
||||
+ if (rc != SSH_OK) {
|
||||
+ ssh_set_error_oom(session);
|
||||
+ goto error;
|
||||
+ }
|
||||
ssh_packet_send(session);
|
||||
session->auth.state = SSH_AUTH_STATE_GSSAPI_TOKEN;
|
||||
}
|
||||
@@ -975,6 +987,7 @@
|
||||
}
|
||||
|
||||
SSH_PACKET_CALLBACK(ssh_packet_userauth_gssapi_token_client){
|
||||
+ int rc;
|
||||
ssh_string token;
|
||||
char *hexa;
|
||||
OM_uint32 maj_stat, min_stat;
|
||||
@@ -1027,11 +1040,15 @@
|
||||
hexa = ssh_get_hexa(output_token.value, output_token.length);
|
||||
SSH_LOG(SSH_LOG_PACKET, "GSSAPI: sending token %s",hexa);
|
||||
SAFE_FREE(hexa);
|
||||
- ssh_buffer_pack(session->out_buffer,
|
||||
- "bdP",
|
||||
- SSH2_MSG_USERAUTH_GSSAPI_TOKEN,
|
||||
- output_token.length,
|
||||
- (size_t)output_token.length, output_token.value);
|
||||
+ rc = ssh_buffer_pack(session->out_buffer,
|
||||
+ "bdP",
|
||||
+ SSH2_MSG_USERAUTH_GSSAPI_TOKEN,
|
||||
+ output_token.length,
|
||||
+ (size_t)output_token.length, output_token.value);
|
||||
+ if (rc != SSH_OK) {
|
||||
+ ssh_set_error_oom(session);
|
||||
+ goto error;
|
||||
+ }
|
||||
ssh_packet_send(session);
|
||||
}
|
||||
|
||||
diff --color -ru ../libssh-0.10.4/src/options.c ./src/options.c
|
||||
--- ../libssh-0.10.4/src/options.c 2023-05-03 12:22:40.342114926 +0200
|
||||
+++ ./src/options.c 2023-05-03 12:24:11.582110280 +0200
|
||||
@@ -614,7 +614,9 @@
|
||||
}
|
||||
i = strtol(q, &p, 10);
|
||||
if (q == p) {
|
||||
+ SSH_LOG(SSH_LOG_DEBUG, "No port number was parsed");
|
||||
SAFE_FREE(q);
|
||||
+ return -1;
|
||||
}
|
||||
SAFE_FREE(q);
|
||||
if (i <= 0) {
|
||||
@@ -816,7 +818,9 @@
|
||||
}
|
||||
i = strtol(q, &p, 10);
|
||||
if (q == p) {
|
||||
+ SSH_LOG(SSH_LOG_DEBUG, "No log verbositiy was parsed");
|
||||
SAFE_FREE(q);
|
||||
+ return -1;
|
||||
}
|
||||
SAFE_FREE(q);
|
||||
if (i < 0) {
|
||||
@@ -2035,7 +2039,9 @@
|
||||
}
|
||||
i = strtol(q, &p, 10);
|
||||
if (q == p) {
|
||||
- SAFE_FREE(q);
|
||||
+ SSH_LOG(SSH_LOG_DEBUG, "No bind port was parsed");
|
||||
+ SAFE_FREE(q);
|
||||
+ return -1;
|
||||
}
|
||||
SAFE_FREE(q);
|
||||
|
||||
@@ -2062,7 +2068,9 @@
|
||||
}
|
||||
i = strtol(q, &p, 10);
|
||||
if (q == p) {
|
||||
- SAFE_FREE(q);
|
||||
+ SSH_LOG(SSH_LOG_DEBUG, "No log verbositiy was parsed");
|
||||
+ SAFE_FREE(q);
|
||||
+ return -1;
|
||||
}
|
||||
SAFE_FREE(q);
|
||||
|
||||
diff --color -ru ../libssh-0.10.4/src/pki_container_openssh.c ./src/pki_container_openssh.c
|
||||
--- ../libssh-0.10.4/src/pki_container_openssh.c 2023-05-03 12:22:40.314114620 +0200
|
||||
+++ ./src/pki_container_openssh.c 2023-05-03 12:24:11.566110105 +0200
|
||||
@@ -630,7 +630,11 @@
|
||||
goto error;
|
||||
}
|
||||
|
||||
- ssh_buffer_pack(kdf_buf, "Sd", salt, rounds);
|
||||
+ rc = ssh_buffer_pack(kdf_buf, "Sd", salt, rounds);
|
||||
+ if (rc != SSH_OK) {
|
||||
+ SSH_BUFFER_FREE(kdf_buf);
|
||||
+ goto error;
|
||||
+ }
|
||||
kdf_options = ssh_string_new(ssh_buffer_get_len(kdf_buf));
|
||||
if (kdf_options == NULL){
|
||||
SSH_BUFFER_FREE(kdf_buf);
|
||||
diff --color -ru ../libssh-0.10.4/tests/unittests/torture_options.c ./tests/unittests/torture_options.c
|
||||
--- ../libssh-0.10.4/tests/unittests/torture_options.c 2023-05-03 12:22:40.343114937 +0200
|
||||
+++ ./tests/unittests/torture_options.c 2023-05-03 12:24:11.587110335 +0200
|
||||
@@ -319,6 +319,7 @@
|
||||
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_PORT_STR, "five");
|
||||
assert_true(rc == -1);
|
||||
+ assert_int_not_equal(session->opts.port, 0);
|
||||
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_PORT, NULL);
|
||||
assert_true(rc == -1);
|
||||
@@ -1496,6 +1497,26 @@
|
||||
ssh_list_free(awaited_list);
|
||||
}
|
||||
|
||||
+static void torture_options_set_verbosity (void **state)
|
||||
+{
|
||||
+ ssh_session session = *state;
|
||||
+ int rc, new_level;
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_LOG_VERBOSITY_STR,
|
||||
+ "3");
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+ new_level = ssh_get_log_level();
|
||||
+ assert_int_equal(new_level, SSH_LOG_PACKET);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_LOG_VERBOSITY_STR,
|
||||
+ "datsun");
|
||||
+ assert_int_equal(rc, -1);
|
||||
+ new_level = ssh_get_log_level();
|
||||
+ assert_int_not_equal(new_level, 0);
|
||||
+}
|
||||
+
|
||||
#ifdef WITH_SERVER
|
||||
const char template[] = "temp_dir_XXXXXX";
|
||||
|
||||
@@ -1750,6 +1771,10 @@
|
||||
rc = ssh_bind_options_set(bind, SSH_BIND_OPTIONS_BINDPORT_STR, "23");
|
||||
assert_int_equal(rc, 0);
|
||||
assert_int_equal(bind->bindport, 23);
|
||||
+
|
||||
+ rc = ssh_bind_options_set(bind, SSH_BIND_OPTIONS_BINDPORT_STR, "twentythree");
|
||||
+ assert_int_equal(rc, -1);
|
||||
+ assert_int_not_equal(bind->bindport, 0);
|
||||
}
|
||||
|
||||
static void torture_bind_options_log_verbosity(void **state)
|
||||
@@ -1799,6 +1824,11 @@
|
||||
new_level = ssh_get_log_level();
|
||||
assert_int_equal(new_level, SSH_LOG_PACKET);
|
||||
|
||||
+ rc = ssh_bind_options_set(bind, SSH_BIND_OPTIONS_LOG_VERBOSITY_STR, "verbosity");
|
||||
+ assert_int_equal(rc, -1);
|
||||
+ new_level = ssh_get_log_level();
|
||||
+ assert_int_not_equal(new_level, 0);
|
||||
+
|
||||
rc = ssh_set_log_level(previous_level);
|
||||
assert_int_equal(rc, SSH_OK);
|
||||
}
|
||||
@@ -2297,6 +2327,7 @@
|
||||
cmocka_unit_test_setup_teardown(torture_options_caret_sign,
|
||||
setup, teardown),
|
||||
cmocka_unit_test_setup_teardown(torture_options_apply, setup, teardown),
|
||||
+ cmocka_unit_test_setup_teardown(torture_options_set_verbosity, setup, teardown),
|
||||
};
|
||||
|
||||
#ifdef WITH_SERVER
|
@ -0,0 +1,57 @@
|
||||
File ../libssh-0.10.4/.git is a regular file while file ./.git is a directory
|
||||
diff --color -ru ../libssh-0.10.4/src/sftp.c ./src/sftp.c
|
||||
--- ../libssh-0.10.4/src/sftp.c 2023-05-22 12:45:48.383509085 +0200
|
||||
+++ ./src/sftp.c 2023-05-22 12:54:31.004037650 +0200
|
||||
@@ -1755,6 +1755,10 @@
|
||||
int sftp_close(sftp_file file){
|
||||
int err = SSH_NO_ERROR;
|
||||
|
||||
+ if (file == NULL) {
|
||||
+ return err;
|
||||
+ }
|
||||
+
|
||||
SAFE_FREE(file->name);
|
||||
if (file->handle){
|
||||
err = sftp_handle_close(file->sftp,file->handle);
|
||||
@@ -1917,7 +1921,7 @@
|
||||
|
||||
/* Read from a file using an opened sftp file handle. */
|
||||
ssize_t sftp_read(sftp_file handle, void *buf, size_t count) {
|
||||
- sftp_session sftp = handle->sftp;
|
||||
+ sftp_session sftp;
|
||||
sftp_message msg = NULL;
|
||||
sftp_status_message status;
|
||||
ssh_string datastring;
|
||||
@@ -1926,6 +1930,11 @@
|
||||
uint32_t id;
|
||||
int rc;
|
||||
|
||||
+ if (handle == NULL) {
|
||||
+ return -1;
|
||||
+ }
|
||||
+ sftp = handle->sftp;
|
||||
+
|
||||
if (handle->eof) {
|
||||
return 0;
|
||||
}
|
||||
@@ -2147,7 +2156,7 @@
|
||||
}
|
||||
|
||||
ssize_t sftp_write(sftp_file file, const void *buf, size_t count) {
|
||||
- sftp_session sftp = file->sftp;
|
||||
+ sftp_session sftp;
|
||||
sftp_message msg = NULL;
|
||||
sftp_status_message status;
|
||||
ssh_buffer buffer;
|
||||
@@ -2156,6 +2165,11 @@
|
||||
size_t packetlen;
|
||||
int rc;
|
||||
|
||||
+ if (file == NULL) {
|
||||
+ return -1;
|
||||
+ }
|
||||
+ sftp = file->sftp;
|
||||
+
|
||||
buffer = ssh_buffer_new();
|
||||
if (buffer == NULL) {
|
||||
ssh_set_error_oom(sftp->session);
|
@ -0,0 +1,105 @@
|
||||
diff --git a/src/kex.c b/src/kex.c
|
||||
index 1155b9c7..528cb182 100644
|
||||
--- a/src/kex.c
|
||||
+++ b/src/kex.c
|
||||
@@ -101,12 +101,19 @@
|
||||
|
||||
#ifdef HAVE_ECDH
|
||||
#define ECDH "ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,"
|
||||
-#define EC_HOSTKEYS "ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,"
|
||||
-#define EC_PUBLIC_KEY_ALGORITHMS "ecdsa-sha2-nistp521-cert-v01@openssh.com," \
|
||||
+#define EC_HOSTKEYS "ecdsa-sha2-nistp521," \
|
||||
+ "ecdsa-sha2-nistp384," \
|
||||
+ "ecdsa-sha2-nistp256,"
|
||||
+#define EC_SK_HOSTKEYS "sk-ecdsa-sha2-nistp256@openssh.com,"
|
||||
+#define EC_FIPS_PUBLIC_KEY_ALGOS "ecdsa-sha2-nistp521-cert-v01@openssh.com," \
|
||||
"ecdsa-sha2-nistp384-cert-v01@openssh.com," \
|
||||
"ecdsa-sha2-nistp256-cert-v01@openssh.com,"
|
||||
+#define EC_PUBLIC_KEY_ALGORITHMS EC_FIPS_PUBLIC_KEY_ALGOS \
|
||||
+ "sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,"
|
||||
#else
|
||||
#define EC_HOSTKEYS ""
|
||||
+#define EC_SK_HOSTKEYS ""
|
||||
+#define EC_FIPS_PUBLIC_KEY_ALGOS ""
|
||||
#define EC_PUBLIC_KEY_ALGORITHMS ""
|
||||
#define ECDH ""
|
||||
#endif /* HAVE_ECDH */
|
||||
@@ -127,16 +134,21 @@
|
||||
|
||||
#define HOSTKEYS "ssh-ed25519," \
|
||||
EC_HOSTKEYS \
|
||||
+ "sk-ssh-ed25519@openssh.com," \
|
||||
+ EC_SK_HOSTKEYS \
|
||||
"rsa-sha2-512," \
|
||||
"rsa-sha2-256," \
|
||||
"ssh-rsa" \
|
||||
DSA_HOSTKEYS
|
||||
#define DEFAULT_HOSTKEYS "ssh-ed25519," \
|
||||
EC_HOSTKEYS \
|
||||
+ "sk-ssh-ed25519@openssh.com," \
|
||||
+ EC_SK_HOSTKEYS \
|
||||
"rsa-sha2-512," \
|
||||
"rsa-sha2-256"
|
||||
|
||||
#define PUBLIC_KEY_ALGORITHMS "ssh-ed25519-cert-v01@openssh.com," \
|
||||
+ "sk-ssh-ed25519-cert-v01@openssh.com," \
|
||||
EC_PUBLIC_KEY_ALGORITHMS \
|
||||
"rsa-sha2-512-cert-v01@openssh.com," \
|
||||
"rsa-sha2-256-cert-v01@openssh.com," \
|
||||
@@ -186,7 +198,7 @@
|
||||
"rsa-sha2-512," \
|
||||
"rsa-sha2-256"
|
||||
|
||||
-#define FIPS_ALLOWED_PUBLIC_KEY_ALGORITHMS EC_PUBLIC_KEY_ALGORITHMS \
|
||||
+#define FIPS_ALLOWED_PUBLIC_KEY_ALGORITHMS EC_FIPS_PUBLIC_KEY_ALGOS \
|
||||
"rsa-sha2-512-cert-v01@openssh.com," \
|
||||
"rsa-sha2-256-cert-v01@openssh.com," \
|
||||
FIPS_ALLOWED_HOSTKEYS
|
||||
diff --git a/src/knownhosts.c b/src/knownhosts.c
|
||||
index 1f52dedc..94618fe2 100644
|
||||
--- a/src/knownhosts.c
|
||||
+++ b/src/knownhosts.c
|
||||
@@ -480,6 +480,8 @@ static const char *ssh_known_host_sigs_from_hostkey_type(enum ssh_keytypes_e typ
|
||||
return "rsa-sha2-512,rsa-sha2-256,ssh-rsa";
|
||||
case SSH_KEYTYPE_ED25519:
|
||||
return "ssh-ed25519";
|
||||
+ case SSH_KEYTYPE_SK_ED25519:
|
||||
+ return "sk-ssh-ed25519@openssh.com";
|
||||
#ifdef HAVE_DSA
|
||||
case SSH_KEYTYPE_DSS:
|
||||
return "ssh-dss";
|
||||
@@ -494,6 +496,8 @@ static const char *ssh_known_host_sigs_from_hostkey_type(enum ssh_keytypes_e typ
|
||||
return "ecdsa-sha2-nistp384";
|
||||
case SSH_KEYTYPE_ECDSA_P521:
|
||||
return "ecdsa-sha2-nistp521";
|
||||
+ case SSH_KEYTYPE_SK_ECDSA:
|
||||
+ return "sk-ecdsa-sha2-nistp256@openssh.com";
|
||||
#else
|
||||
case SSH_KEYTYPE_ECDSA_P256:
|
||||
case SSH_KEYTYPE_ECDSA_P384:
|
||||
diff --git a/tests/unittests/torture_knownhosts_parsing.c b/tests/unittests/torture_knownhosts_parsing.c
|
||||
index fffa8296..7fd21f05 100644
|
||||
--- a/tests/unittests/torture_knownhosts_parsing.c
|
||||
+++ b/tests/unittests/torture_knownhosts_parsing.c
|
||||
@@ -634,7 +634,9 @@ static void torture_knownhosts_algorithms(void **state)
|
||||
bool process_config = false;
|
||||
const char *expect = "ssh-ed25519,rsa-sha2-512,rsa-sha2-256,"
|
||||
"ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,"
|
||||
- "ecdsa-sha2-nistp256";
|
||||
+ "ecdsa-sha2-nistp256,"
|
||||
+ "sk-ssh-ed25519@openssh.com,"
|
||||
+ "sk-ecdsa-sha2-nistp256@openssh.com";
|
||||
const char *expect_fips = "rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521,"
|
||||
"ecdsa-sha2-nistp384,ecdsa-sha2-nistp256";
|
||||
|
||||
@@ -669,7 +671,9 @@ static void torture_knownhosts_algorithms_global(void **state)
|
||||
bool process_config = false;
|
||||
const char *expect = "ssh-ed25519,rsa-sha2-512,rsa-sha2-256,"
|
||||
"ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,"
|
||||
- "ecdsa-sha2-nistp256";
|
||||
+ "ecdsa-sha2-nistp256,"
|
||||
+ "sk-ssh-ed25519@openssh.com,"
|
||||
+ "sk-ecdsa-sha2-nistp256@openssh.com";
|
||||
const char *expect_fips = "rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521,"
|
||||
"ecdsa-sha2-nistp384,ecdsa-sha2-nistp256";
|
||||
|
@ -0,0 +1,16 @@
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQIzBAABCgAdFiEEjf9T4Y8qvI2PPJIjfuD8TcwBTj0FAmMYnSEACgkQfuD8TcwB
|
||||
Tj2qGBAAn/40MU/7PcyCRK9U+MhLo28peRpTF+i1/k0V5czVLiFubeFofsa6sjy8
|
||||
C6VyQsz0NYiTf6wXLlq9jO1p31LWQ13Z3K0d7Lg2eyftsVrGM1Ue9dTLlJrZ570d
|
||||
JjcBR/J3dpO9w5fz4HawWE8GIBBstZQnZYdoT75+tIeSMJ/tnovKfE1RGYc4kRJs
|
||||
quC7tyej7Y+t86U8psFSy2iUCajS82b+ddZEhuxwamel+RBRJZsmi5B2OvhkEaOj
|
||||
mhJOIkx3UD9XAjxeooVcTlzAaJ5JFZ7Im97o+DRbQYvJYe4ZqDo17lrzBh6wruLC
|
||||
vBo+/lwh9FbCqxbDpFfqwpf8qYsWu3m0Qlu5f+BZ/9WvjFCVoRmScNHJo42tu18r
|
||||
xcX2Txis8oWysgqhvIgTFRnLq010ErL8iE9WeZwrNJgcTnf+AQLolKQiVAHumMvk
|
||||
Djv0No+ZTBG03Hsb0tbvA8kVtxI0ZZtzPcRkRqmUwiLCtcO9oo1hInhu+D1sPZwI
|
||||
Q1xK6hI6LKsF80yPKGexZxlgV/vZYhIKtD0SIoZCpx7MSBxXqHYZARtTFUAXBSqF
|
||||
tIn800/pPhGuY1/x3ho4BeWCGj1eWG5zy7dr0q/d/OiqBj3OiUfxtTl4drqrYhca
|
||||
goNhzNTs0Ps+iYbVQlk4nEAjg54M8ru1jfcuNRgrhTqCI8yiESk=
|
||||
=AG91
|
||||
-----END PGP SIGNATURE-----
|
@ -1,41 +0,0 @@
|
||||
From c9cfeb9b838b801c3e2bb070c3db914e81ca4e68 Mon Sep 17 00:00:00 2001
|
||||
From: Jakub Jelen <jjelen@redhat.com>
|
||||
Date: Mon, 12 Aug 2024 17:49:46 +0200
|
||||
Subject: [PATCH] wrapper: Avoid asymmetric termination of gzip context
|
||||
|
||||
For some reason, both compress and decompress contexts were terminated
|
||||
with both compress and decompress end functions (if the deflateEnd worked),
|
||||
which was causing for some another unexplained reasons issues on i686
|
||||
architecture when running the torture_packet unit test.
|
||||
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
||||
---
|
||||
src/wrapper.c | 8 +++-----
|
||||
1 file changed, 3 insertions(+), 5 deletions(-)
|
||||
|
||||
diff --git a/src/wrapper.c b/src/wrapper.c
|
||||
index bf949ea9..d9cf6db5 100644
|
||||
--- a/src/wrapper.c
|
||||
+++ b/src/wrapper.c
|
||||
@@ -200,14 +200,12 @@ void crypto_free(struct ssh_crypto_struct *crypto)
|
||||
SAFE_FREE(crypto->secret_hash);
|
||||
}
|
||||
#ifdef WITH_ZLIB
|
||||
- if (crypto->compress_out_ctx &&
|
||||
- (deflateEnd(crypto->compress_out_ctx) != 0)) {
|
||||
- inflateEnd(crypto->compress_out_ctx);
|
||||
+ if (crypto->compress_out_ctx) {
|
||||
+ deflateEnd(crypto->compress_out_ctx);
|
||||
}
|
||||
SAFE_FREE(crypto->compress_out_ctx);
|
||||
|
||||
- if (crypto->compress_in_ctx &&
|
||||
- (deflateEnd(crypto->compress_in_ctx) != 0)) {
|
||||
+ if (crypto->compress_in_ctx) {
|
||||
inflateEnd(crypto->compress_in_ctx);
|
||||
}
|
||||
SAFE_FREE(crypto->compress_in_ctx);
|
||||
--
|
||||
2.46.0
|
||||
|
@ -1,263 +0,0 @@
|
||||
From 4f997aee7c7d7ea346b3e8ba505da0b7601ff318 Mon Sep 17 00:00:00 2001
|
||||
From: Jakub Jelen <jjelen@redhat.com>
|
||||
Date: Fri, 22 Dec 2023 10:32:40 +0100
|
||||
Subject: [PATCH 1/2] Fix regression in IPv6 addresses in hostname parsing
|
||||
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
||||
---
|
||||
include/libssh/config_parser.h | 11 ++++++++---
|
||||
src/config.c | 4 ++--
|
||||
src/config_parser.c | 16 +++++++++++-----
|
||||
src/options.c | 10 ++--------
|
||||
4 files changed, 23 insertions(+), 18 deletions(-)
|
||||
|
||||
diff --git a/include/libssh/config_parser.h b/include/libssh/config_parser.h
|
||||
index a7dd42a2..ca353432 100644
|
||||
--- a/include/libssh/config_parser.h
|
||||
+++ b/include/libssh/config_parser.h
|
||||
@@ -30,6 +30,8 @@
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
+#include <stdbool.h>
|
||||
+
|
||||
char *ssh_config_get_cmd(char **str);
|
||||
|
||||
char *ssh_config_get_token(char **str);
|
||||
@@ -49,14 +51,17 @@ int ssh_config_get_yesno(char **str, int notfound);
|
||||
* be stored or NULL if we do not care about the result.
|
||||
* @param[out] port Pointer to the location, where the new port will
|
||||
* be stored or NULL if we do not care about the result.
|
||||
+ * @param[in] ignore_port Set to true if the we should not attempt to parse
|
||||
+ * port number.
|
||||
*
|
||||
* @returns SSH_OK if the provided string is in format of SSH URI,
|
||||
* SSH_ERROR on failure
|
||||
*/
|
||||
int ssh_config_parse_uri(const char *tok,
|
||||
- char **username,
|
||||
- char **hostname,
|
||||
- char **port);
|
||||
+ char **username,
|
||||
+ char **hostname,
|
||||
+ char **port,
|
||||
+ bool ignore_port);
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
diff --git a/src/config.c b/src/config.c
|
||||
index 5eedbce9..7135c3b1 100644
|
||||
--- a/src/config.c
|
||||
+++ b/src/config.c
|
||||
@@ -464,7 +464,7 @@ ssh_config_parse_proxy_jump(ssh_session session, const char *s, bool do_parsing)
|
||||
}
|
||||
if (parse_entry) {
|
||||
/* We actually care only about the first item */
|
||||
- rv = ssh_config_parse_uri(cp, &username, &hostname, &port);
|
||||
+ rv = ssh_config_parse_uri(cp, &username, &hostname, &port, false);
|
||||
/* The rest of the list needs to be passed on */
|
||||
if (endp != NULL) {
|
||||
next = strdup(endp + 1);
|
||||
@@ -475,7 +475,7 @@ ssh_config_parse_proxy_jump(ssh_session session, const char *s, bool do_parsing)
|
||||
}
|
||||
} else {
|
||||
/* The rest is just sanity-checked to avoid failures later */
|
||||
- rv = ssh_config_parse_uri(cp, NULL, NULL, NULL);
|
||||
+ rv = ssh_config_parse_uri(cp, NULL, NULL, NULL, false);
|
||||
}
|
||||
if (rv != SSH_OK) {
|
||||
goto out;
|
||||
diff --git a/src/config_parser.c b/src/config_parser.c
|
||||
index 9ffc8b8b..5f30cd3e 100644
|
||||
--- a/src/config_parser.c
|
||||
+++ b/src/config_parser.c
|
||||
@@ -162,9 +162,10 @@ int ssh_config_get_yesno(char **str, int notfound)
|
||||
}
|
||||
|
||||
int ssh_config_parse_uri(const char *tok,
|
||||
- char **username,
|
||||
- char **hostname,
|
||||
- char **port)
|
||||
+ char **username,
|
||||
+ char **hostname,
|
||||
+ char **port,
|
||||
+ bool ignore_port)
|
||||
{
|
||||
char *endp = NULL;
|
||||
long port_n;
|
||||
@@ -210,12 +211,17 @@ int ssh_config_parse_uri(const char *tok,
|
||||
if (endp == NULL) {
|
||||
goto error;
|
||||
}
|
||||
- } else {
|
||||
- /* Hostnames or aliases expand to the last colon or to the end */
|
||||
+ } else if (!ignore_port) {
|
||||
+ /* Hostnames or aliases expand to the last colon (if port is requested)
|
||||
+ * or to the end */
|
||||
endp = strrchr(tok, ':');
|
||||
if (endp == NULL) {
|
||||
endp = strchr(tok, '\0');
|
||||
}
|
||||
+ } else {
|
||||
+ /* If no port is requested, expand to the end of line
|
||||
+ * (to accommodate the IPv6 addresses) */
|
||||
+ endp = strchr(tok, '\0');
|
||||
}
|
||||
if (tok == endp) {
|
||||
/* Zero-length hostnames are not valid */
|
||||
diff --git a/src/options.c b/src/options.c
|
||||
index 2e73be46..676c49e7 100644
|
||||
--- a/src/options.c
|
||||
+++ b/src/options.c
|
||||
@@ -634,17 +634,11 @@ int ssh_options_set(ssh_session session, enum ssh_options_e type,
|
||||
ssh_set_error_invalid(session);
|
||||
return -1;
|
||||
} else {
|
||||
- char *username = NULL, *hostname = NULL, *port = NULL;
|
||||
- rc = ssh_config_parse_uri(value, &username, &hostname, &port);
|
||||
+ char *username = NULL, *hostname = NULL;
|
||||
+ rc = ssh_config_parse_uri(value, &username, &hostname, NULL, true);
|
||||
if (rc != SSH_OK) {
|
||||
return -1;
|
||||
}
|
||||
- if (port != NULL) {
|
||||
- SAFE_FREE(username);
|
||||
- SAFE_FREE(hostname);
|
||||
- SAFE_FREE(port);
|
||||
- return -1;
|
||||
- }
|
||||
if (username != NULL) {
|
||||
SAFE_FREE(session->opts.username);
|
||||
session->opts.username = username;
|
||||
--
|
||||
2.43.0
|
||||
|
||||
|
||||
From 6f6e453d7b0ad4ee6a6f6a1c96a9a6b27821410d Mon Sep 17 00:00:00 2001
|
||||
From: Jakub Jelen <jjelen@redhat.com>
|
||||
Date: Fri, 22 Dec 2023 09:52:18 +0100
|
||||
Subject: [PATCH 2/2] tests: Increase test coverage for IPv6 address parsing as
|
||||
hostnames
|
||||
|
||||
This was an issue in cockpit:
|
||||
|
||||
https://github.com/cockpit-project/cockpit/issues/19772
|
||||
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
||||
---
|
||||
tests/unittests/torture_config.c | 49 +++++++++++++++++++++++++++++++
|
||||
tests/unittests/torture_options.c | 16 ++++++++++
|
||||
2 files changed, 65 insertions(+)
|
||||
|
||||
diff --git a/tests/unittests/torture_config.c b/tests/unittests/torture_config.c
|
||||
index bc6b08f9..751aa126 100644
|
||||
--- a/tests/unittests/torture_config.c
|
||||
+++ b/tests/unittests/torture_config.c
|
||||
@@ -2332,6 +2332,53 @@ static void torture_config_make_absolute_no_sshdir(void **state)
|
||||
torture_config_make_absolute_int(state, 1);
|
||||
}
|
||||
|
||||
+static void torture_config_parse_uri(void **state)
|
||||
+{
|
||||
+ char *username = NULL;
|
||||
+ char *hostname = NULL;
|
||||
+ char *port = NULL;
|
||||
+ int rc;
|
||||
+
|
||||
+ (void)state; /* unused */
|
||||
+
|
||||
+ rc = ssh_config_parse_uri("localhost", &username, &hostname, &port, false);
|
||||
+ assert_return_code(rc, errno);
|
||||
+ assert_null(username);
|
||||
+ assert_string_equal(hostname, "localhost");
|
||||
+ SAFE_FREE(hostname);
|
||||
+ assert_null(port);
|
||||
+
|
||||
+ rc = ssh_config_parse_uri("1.2.3.4", &username, &hostname, &port, false);
|
||||
+ assert_return_code(rc, errno);
|
||||
+ assert_null(username);
|
||||
+ assert_string_equal(hostname, "1.2.3.4");
|
||||
+ SAFE_FREE(hostname);
|
||||
+ assert_null(port);
|
||||
+
|
||||
+ rc = ssh_config_parse_uri("1.2.3.4:2222", &username, &hostname, &port, false);
|
||||
+ assert_return_code(rc, errno);
|
||||
+ assert_null(username);
|
||||
+ assert_string_equal(hostname, "1.2.3.4");
|
||||
+ SAFE_FREE(hostname);
|
||||
+ assert_string_equal(port, "2222");
|
||||
+ SAFE_FREE(port);
|
||||
+
|
||||
+ rc = ssh_config_parse_uri("[1:2:3::4]:2222", &username, &hostname, &port, false);
|
||||
+ assert_return_code(rc, errno);
|
||||
+ assert_null(username);
|
||||
+ assert_string_equal(hostname, "1:2:3::4");
|
||||
+ SAFE_FREE(hostname);
|
||||
+ assert_string_equal(port, "2222");
|
||||
+ SAFE_FREE(port);
|
||||
+
|
||||
+ /* do not want port */
|
||||
+ rc = ssh_config_parse_uri("1:2:3::4", &username, &hostname, NULL, true);
|
||||
+ assert_return_code(rc, errno);
|
||||
+ assert_null(username);
|
||||
+ assert_string_equal(hostname, "1:2:3::4");
|
||||
+ SAFE_FREE(hostname);
|
||||
+}
|
||||
+
|
||||
int torture_run_tests(void)
|
||||
{
|
||||
int rc;
|
||||
@@ -2424,6 +2471,8 @@ int torture_run_tests(void)
|
||||
setup, teardown),
|
||||
cmocka_unit_test_setup_teardown(torture_config_make_absolute_no_sshdir,
|
||||
setup_no_sshdir, teardown),
|
||||
+ cmocka_unit_test_setup_teardown(torture_config_parse_uri,
|
||||
+ setup, teardown),
|
||||
};
|
||||
|
||||
|
||||
diff --git a/tests/unittests/torture_options.c b/tests/unittests/torture_options.c
|
||||
index 5ba3bdc6..b07712d8 100644
|
||||
--- a/tests/unittests/torture_options.c
|
||||
+++ b/tests/unittests/torture_options.c
|
||||
@@ -57,6 +57,20 @@ static void torture_options_set_host(void **state) {
|
||||
assert_non_null(session->opts.host);
|
||||
assert_string_equal(session->opts.host, "localhost");
|
||||
|
||||
+ /* IPv4 address */
|
||||
+ rc = ssh_options_set(session, SSH_OPTIONS_HOST, "127.1.1.1");
|
||||
+ assert_true(rc == 0);
|
||||
+ assert_non_null(session->opts.host);
|
||||
+ assert_string_equal(session->opts.host, "127.1.1.1");
|
||||
+ assert_null(session->opts.username);
|
||||
+
|
||||
+ /* IPv6 address */
|
||||
+ rc = ssh_options_set(session, SSH_OPTIONS_HOST, "::1");
|
||||
+ assert_true(rc == 0);
|
||||
+ assert_non_null(session->opts.host);
|
||||
+ assert_string_equal(session->opts.host, "::1");
|
||||
+ assert_null(session->opts.username);
|
||||
+
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_HOST, "guru@meditation");
|
||||
assert_true(rc == 0);
|
||||
assert_non_null(session->opts.host);
|
||||
@@ -64,12 +78,14 @@ static void torture_options_set_host(void **state) {
|
||||
assert_non_null(session->opts.username);
|
||||
assert_string_equal(session->opts.username, "guru");
|
||||
|
||||
+ /* more @ in uri is OK -- it should go to the username */
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_HOST, "at@login@hostname");
|
||||
assert_true(rc == 0);
|
||||
assert_non_null(session->opts.host);
|
||||
assert_string_equal(session->opts.host, "hostname");
|
||||
assert_non_null(session->opts.username);
|
||||
assert_string_equal(session->opts.username, "at@login");
|
||||
+
|
||||
}
|
||||
|
||||
static void torture_options_set_ciphers(void **state) {
|
||||
--
|
||||
2.43.0
|
||||
|
@ -1,48 +0,0 @@
|
||||
diff -up libssh-0.10.6/src/libcrypto.c.no-engine libssh-0.10.6/src/libcrypto.c
|
||||
--- libssh-0.10.6/src/libcrypto.c.no-engine 2024-07-31 09:25:56.460404672 +0200
|
||||
+++ libssh-0.10.6/src/libcrypto.c 2024-07-31 09:28:46.900273530 +0200
|
||||
@@ -94,7 +94,7 @@ void ssh_reseed(void){
|
||||
#endif
|
||||
}
|
||||
|
||||
-#ifndef WITH_PKCS11_PROVIDER
|
||||
+#if defined(WITH_PKCS11_URI) && !defined(WITH_PKCS11_PROVIDER)
|
||||
static ENGINE *engine = NULL;
|
||||
|
||||
ENGINE *pki_get_engine(void)
|
||||
@@ -126,7 +126,7 @@ ENGINE *pki_get_engine(void)
|
||||
}
|
||||
return engine;
|
||||
}
|
||||
-#endif /* WITH_PKCS11_PROVIDER */
|
||||
+#endif /* defined(WITH_PKCS11_URI) && !defined(WITH_PKCS11_PROVIDER) */
|
||||
|
||||
#ifdef HAVE_OPENSSL_EVP_KDF_CTX
|
||||
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
diff -up libssh-0.10.6/src/pki_crypto.c.no-engine libssh-0.10.6/src/pki_crypto.c
|
||||
--- libssh-0.10.6/src/pki_crypto.c.no-engine 2024-07-31 09:26:34.296823306 +0200
|
||||
+++ libssh-0.10.6/src/pki_crypto.c 2024-07-31 09:29:36.414810967 +0200
|
||||
@@ -33,7 +33,9 @@
|
||||
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/evp.h>
|
||||
+#if defined(WITH_PKCS11_URI) && !defined(WITH_PKCS11_PROVIDER)
|
||||
#include <openssl/engine.h>
|
||||
+#endif
|
||||
#include <openssl/err.h>
|
||||
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
#include <openssl/dsa.h>
|
||||
diff -up libssh-0.10.6/src/libcrypto.c.no-engine libssh-0.10.6/src/libcrypto.c
|
||||
--- libssh-0.10.6/src/libcrypto.c.no-engine 2024-07-31 11:03:45.262319724 +0200
|
||||
+++ libssh-0.10.6/src/libcrypto.c 2024-07-31 11:04:59.842161279 +0200
|
||||
@@ -53,7 +53,9 @@
|
||||
#include <openssl/core_names.h>
|
||||
#endif /* OPENSSL_VERSION_NUMBER */
|
||||
#include <openssl/rand.h>
|
||||
+#if defined(WITH_PKCS11_URI) && !defined(WITH_PKCS11_PROVIDER)
|
||||
#include <openssl/engine.h>
|
||||
+#endif
|
||||
|
||||
#include "libcrypto-compat.h"
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -1,47 +0,0 @@
|
||||
From 7b89ff760a2c7119916eaa8fd6a62afbd15fc3ad Mon Sep 17 00:00:00 2001
|
||||
From: Jakub Jelen <jjelen@redhat.com>
|
||||
Date: Fri, 9 Aug 2024 11:30:15 +0200
|
||||
Subject: [PATCH] test: Workaround the new OpenSSH failure rate limiting
|
||||
|
||||
The new OpenSSH rate limits the failed authentication attempts per source
|
||||
address and drops connection when the amount is reached, which is happening
|
||||
in our testsuite.
|
||||
|
||||
By whitelisting the IP address of the client on the socket wrapper,
|
||||
this allows the tests to pass.
|
||||
|
||||
https://man.openbsd.org/sshd_config.5#PerSourcePenaltyExemptList
|
||||
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
||||
---
|
||||
tests/torture.c | 6 ++++++
|
||||
1 file changed, 6 insertions(+)
|
||||
|
||||
diff --git a/tests/torture.c b/tests/torture.c
|
||||
index c832dfa6..ad0a7836 100644
|
||||
--- a/tests/torture.c
|
||||
+++ b/tests/torture.c
|
||||
@@ -755,6 +755,9 @@ static void torture_setup_create_sshd_config(void **state, bool pam)
|
||||
"HostKeyAlgorithms " OPENSSH_KEYS "\n"
|
||||
#if OPENSSH_VERSION_MAJOR == 8 && OPENSSH_VERSION_MINOR >= 2
|
||||
"CASignatureAlgorithms " OPENSSH_KEYS "\n"
|
||||
+#endif
|
||||
+#if (OPENSSH_VERSION_MAJOR == 9 && OPENSSH_VERSION_MINOR >= 8) || OPENSSH_VERSION_MAJOR > 9
|
||||
+ "PerSourcePenaltyExemptList 127.0.0.21\n"
|
||||
#endif
|
||||
"Ciphers " OPENSSH_CIPHERS "\n"
|
||||
"KexAlgorithms " OPENSSH_KEX "\n"
|
||||
@@ -786,6 +789,9 @@ static void torture_setup_create_sshd_config(void **state, bool pam)
|
||||
"%s\n" /* Here comes UsePam */
|
||||
"%s" /* The space for test-specific options */
|
||||
"\n"
|
||||
+#if (OPENSSH_VERSION_MAJOR == 9 && OPENSSH_VERSION_MINOR >= 8) || OPENSSH_VERSION_MAJOR > 9
|
||||
+ "PerSourcePenaltyExemptList 127.0.0.21\n"
|
||||
+#endif
|
||||
"Ciphers "
|
||||
"aes256-gcm@openssh.com,aes256-ctr,aes256-cbc,"
|
||||
"aes128-gcm@openssh.com,aes128-ctr,aes128-cbc"
|
||||
--
|
||||
2.46.0
|
||||
|
@ -1,37 +0,0 @@
|
||||
From 96d76161666b117099696afebcef2fe42ae80715 Mon Sep 17 00:00:00 2001
|
||||
From: Jakub Jelen <jjelen@redhat.com>
|
||||
Date: Tue, 16 May 2023 22:55:11 +0200
|
||||
Subject: [PATCH] tests: Give the server more time handle rekey
|
||||
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
Reviewed-by: Norbert Pocs <npocs@redhat.com>
|
||||
---
|
||||
tests/client/torture_rekey.c | 4 ++--
|
||||
1 file changed, 2 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/tests/client/torture_rekey.c b/tests/client/torture_rekey.c
|
||||
index ccd5ae2cf..0fc13b8b3 100644
|
||||
--- a/tests/client/torture_rekey.c
|
||||
+++ b/tests/client/torture_rekey.c
|
||||
@@ -505,7 +505,7 @@ static void torture_rekey_different_kex(void **state)
|
||||
memset(data, 'A', 128);
|
||||
for (i = 0; i < KEX_RETRY; i++) {
|
||||
ssh_send_ignore(s->ssh.session, data);
|
||||
- ssh_handle_packets(s->ssh.session, 100);
|
||||
+ ssh_handle_packets(s->ssh.session, 1000);
|
||||
|
||||
c = s->ssh.session->current_crypto;
|
||||
/* SHA256 len */
|
||||
@@ -583,7 +583,7 @@ static void torture_rekey_server_different_kex(void **state)
|
||||
memset(data, 'A', 128);
|
||||
for (i = 0; i < KEX_RETRY; i++) {
|
||||
ssh_send_ignore(s->ssh.session, data);
|
||||
- ssh_handle_packets(s->ssh.session, 100);
|
||||
+ ssh_handle_packets(s->ssh.session, 1000);
|
||||
|
||||
c = s->ssh.session->current_crypto;
|
||||
/* SHA256 len */
|
||||
--
|
||||
GitLab
|
||||
|
||||
|
@ -1,16 +0,0 @@
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQIzBAABCgAdFiEEjf9T4Y8qvI2PPJIjfuD8TcwBTj0FAmWAeGkACgkQfuD8TcwB
|
||||
Tj2yAw//QOMEcCiijJvOgXCKsVoV9oSuK3aYxqpOS9cV2P40eev0KQrAZC2EXNt3
|
||||
XAdfNhA21b2C6qSxckmkCWg3vwPmM6LousHG+zpyZkiSziolMoeBkvbEdU42fufE
|
||||
SD39cA1bBEbZahyrILWT2I3Bi0d0G7FC13tIBXShS2zIITSXs/2SSRIhg3OXB979
|
||||
FTwvEE4zHeSXO4itTMNA/sMJ/0qPccQIzisH0g/TF4318b0qjlQjkHJS1y0f3/PL
|
||||
Ge3RORQVcZqGTnhJNlF/tKD8wZ9mfqqurQ9yNshiAu8hH8sDH5ZhI3o5pjQe0mGO
|
||||
JNEwTw0X/vZ4iglWFmm2CusiHrh0KUFsrp8f3oaL3HU4i7yYgo0FhzFtgFVt0gXO
|
||||
JQOhlSUq50yqbBj6S9C5ecuSR0uPgYA4d8qCFrt9oD77m7Qi3mMi+f/kP+HctIaV
|
||||
4ro7lZf6IS54J4/m5hRY3F0nweFnZZL8gn8Da8mBZSvhXCqQL6qbD9buwrTzxGft
|
||||
Fct7+PrRwz9igO7j2nNMyWxtX55/GpX06n7vuonRgQQQiT8eQ5R71STMHJaACFPS
|
||||
CJHCpuVL28HGdyAxN5d65TCvkNo9/gFGM6ocIH3OlreTFUvy22qNrqwHpCkLgYWU
|
||||
ylntVoE/VYtHtwFOe0uuCX+2TiM03P5UT2NqAAa/8D4Z5ur3qUY=
|
||||
=nXW5
|
||||
-----END PGP SIGNATURE-----
|
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,514 @@
|
||||
From 8795d8912c8a83aaf900c0260e252a35f64eb200 Mon Sep 17 00:00:00 2001
|
||||
From: Norbert Pocs <npocs@redhat.com>
|
||||
Date: Fri, 18 Nov 2022 17:22:46 +0100
|
||||
Subject: [PATCH] Fix memory leaks of bignums when openssl >= 3.0
|
||||
|
||||
The openssl 3.0 support has introduced some memory leaks at key build as
|
||||
OSSL_PARAM_BLD_push_BN duplicates the bignum and does not save the pointer
|
||||
itself.
|
||||
|
||||
Signed-off-by: Norbert Pocs <npocs@redhat.com>
|
||||
Reviewed-by: Jakub Jelen <jjelen@redhat.com>
|
||||
---
|
||||
include/libssh/dh.h | 2 +-
|
||||
src/dh_crypto.c | 28 ++---
|
||||
src/pki_crypto.c | 262 ++++++++++++++++++++++++--------------------
|
||||
3 files changed, 151 insertions(+), 141 deletions(-)
|
||||
|
||||
diff --git a/include/libssh/dh.h b/include/libssh/dh.h
|
||||
index 353dc233..9b9bb472 100644
|
||||
--- a/include/libssh/dh.h
|
||||
+++ b/include/libssh/dh.h
|
||||
@@ -53,7 +53,7 @@ int ssh_dh_keypair_get_keys(struct dh_ctx *ctx, int peer,
|
||||
bignum *priv, bignum *pub);
|
||||
#endif /* OPENSSL_VERSION_NUMBER */
|
||||
int ssh_dh_keypair_set_keys(struct dh_ctx *ctx, int peer,
|
||||
- const bignum priv, const bignum pub);
|
||||
+ bignum priv, bignum pub);
|
||||
|
||||
int ssh_dh_compute_shared_secret(struct dh_ctx *ctx, int local, int remote,
|
||||
bignum *dest);
|
||||
diff --git a/src/dh_crypto.c b/src/dh_crypto.c
|
||||
index a847c6a2..b578ddec 100644
|
||||
--- a/src/dh_crypto.c
|
||||
+++ b/src/dh_crypto.c
|
||||
@@ -154,12 +154,9 @@ int ssh_dh_keypair_get_keys(struct dh_ctx *ctx, int peer,
|
||||
#endif /* OPENSSL_VERSION_NUMBER */
|
||||
|
||||
int ssh_dh_keypair_set_keys(struct dh_ctx *ctx, int peer,
|
||||
- const bignum priv, const bignum pub)
|
||||
+ bignum priv, bignum pub)
|
||||
{
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
- bignum priv_key = NULL;
|
||||
- bignum pub_key = NULL;
|
||||
-#else
|
||||
+#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||
int rc;
|
||||
OSSL_PARAM *params = NULL, *out_params = NULL, *merged_params = NULL;
|
||||
OSSL_PARAM_BLD *param_bld = NULL;
|
||||
@@ -172,7 +169,11 @@ int ssh_dh_keypair_set_keys(struct dh_ctx *ctx, int peer,
|
||||
return SSH_ERROR;
|
||||
}
|
||||
|
||||
-#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||
+#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
+ (void)DH_set0_key(ctx->keypair[peer], pub, priv);
|
||||
+
|
||||
+ return SSH_OK;
|
||||
+#else
|
||||
rc = EVP_PKEY_todata(ctx->keypair[peer], EVP_PKEY_KEYPAIR, &out_params);
|
||||
if (rc != 1) {
|
||||
return SSH_ERROR;
|
||||
@@ -195,35 +196,22 @@ int ssh_dh_keypair_set_keys(struct dh_ctx *ctx, int peer,
|
||||
rc = SSH_ERROR;
|
||||
goto out;
|
||||
}
|
||||
-#endif /* OPENSSL_VERSION_NUMBER */
|
||||
|
||||
if (priv) {
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
- priv_key = priv;
|
||||
-#else
|
||||
rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_PRIV_KEY, priv);
|
||||
if (rc != 1) {
|
||||
rc = SSH_ERROR;
|
||||
goto out;
|
||||
}
|
||||
-#endif /* OPENSSL_VERSION_NUMBER */
|
||||
}
|
||||
if (pub) {
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
- pub_key = pub;
|
||||
-#else
|
||||
rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_PUB_KEY, pub);
|
||||
if (rc != 1) {
|
||||
rc = SSH_ERROR;
|
||||
goto out;
|
||||
}
|
||||
-#endif /* OPENSSL_VERSION_NUMBER */
|
||||
}
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
- (void)DH_set0_key(ctx->keypair[peer], pub_key, priv_key);
|
||||
|
||||
- return SSH_OK;
|
||||
-#else
|
||||
params = OSSL_PARAM_BLD_to_param(param_bld);
|
||||
if (params == NULL) {
|
||||
rc = SSH_ERROR;
|
||||
@@ -248,6 +236,8 @@ int ssh_dh_keypair_set_keys(struct dh_ctx *ctx, int peer,
|
||||
|
||||
rc = SSH_OK;
|
||||
out:
|
||||
+ bignum_safe_free(priv);
|
||||
+ bignum_safe_free(pub);
|
||||
EVP_PKEY_CTX_free(evp_ctx);
|
||||
OSSL_PARAM_free(out_params);
|
||||
OSSL_PARAM_free(params);
|
||||
diff --git a/src/pki_crypto.c b/src/pki_crypto.c
|
||||
index 0a5003da..d3359e2d 100644
|
||||
--- a/src/pki_crypto.c
|
||||
+++ b/src/pki_crypto.c
|
||||
@@ -1492,18 +1492,18 @@ int pki_privkey_build_dss(ssh_key key,
|
||||
ssh_string privkey)
|
||||
{
|
||||
int rc;
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
BIGNUM *bp, *bq, *bg, *bpub_key, *bpriv_key;
|
||||
+#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||
+ OSSL_PARAM_BLD *param_bld = OSSL_PARAM_BLD_new();
|
||||
+ if (param_bld == NULL) {
|
||||
+ return SSH_ERROR;
|
||||
+ }
|
||||
#else
|
||||
- const BIGNUM *pb, *qb, *gb, *pubb, *privb;
|
||||
- OSSL_PARAM_BLD *param_bld;
|
||||
-#endif /* OPENSSL_VERSION_NUMBER */
|
||||
-
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
key->dsa = DSA_new();
|
||||
if (key->dsa == NULL) {
|
||||
return SSH_ERROR;
|
||||
}
|
||||
+#endif /* OPENSSL_VERSION_NUMBER */
|
||||
|
||||
bp = ssh_make_string_bn(p);
|
||||
bq = ssh_make_string_bn(q);
|
||||
@@ -1512,9 +1512,11 @@ int pki_privkey_build_dss(ssh_key key,
|
||||
bpriv_key = ssh_make_string_bn(privkey);
|
||||
if (bp == NULL || bq == NULL ||
|
||||
bg == NULL || bpub_key == NULL) {
|
||||
+ rc = SSH_ERROR;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
+#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
/* Memory management of bp, qq and bg is transferred to DSA object */
|
||||
rc = DSA_set0_pqg(key->dsa, bp, bq, bg);
|
||||
if (rc == 0) {
|
||||
@@ -1532,39 +1534,43 @@ fail:
|
||||
DSA_free(key->dsa);
|
||||
return SSH_ERROR;
|
||||
#else
|
||||
- param_bld = OSSL_PARAM_BLD_new();
|
||||
- if (param_bld == NULL)
|
||||
- goto err;
|
||||
-
|
||||
- pb = ssh_make_string_bn(p);
|
||||
- qb = ssh_make_string_bn(q);
|
||||
- gb = ssh_make_string_bn(g);
|
||||
- pubb = ssh_make_string_bn(pubkey);
|
||||
- privb = ssh_make_string_bn(privkey);
|
||||
-
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_P, pb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_Q, qb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_G, gb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_PUB_KEY, pubb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_PRIV_KEY, privb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_P, bp);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_Q, bq);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_G, bg);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_PUB_KEY, bpub_key);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_PRIV_KEY, bpriv_key);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
|
||||
rc = evp_build_pkey("DSA", param_bld, &(key->key), EVP_PKEY_KEYPAIR);
|
||||
+
|
||||
+fail:
|
||||
OSSL_PARAM_BLD_free(param_bld);
|
||||
+ bignum_safe_free(bp);
|
||||
+ bignum_safe_free(bq);
|
||||
+ bignum_safe_free(bg);
|
||||
+ bignum_safe_free(bpub_key);
|
||||
+ bignum_safe_free(bpriv_key);
|
||||
|
||||
return rc;
|
||||
-err:
|
||||
- OSSL_PARAM_BLD_free(param_bld);
|
||||
- return -1;
|
||||
#endif /* OPENSSL_VERSION_NUMBER */
|
||||
}
|
||||
|
||||
@@ -1574,18 +1580,18 @@ int pki_pubkey_build_dss(ssh_key key,
|
||||
ssh_string g,
|
||||
ssh_string pubkey) {
|
||||
int rc;
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
BIGNUM *bp = NULL, *bq = NULL, *bg = NULL, *bpub_key = NULL;
|
||||
+#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||
+ OSSL_PARAM_BLD *param_bld = OSSL_PARAM_BLD_new();
|
||||
+ if (param_bld == NULL) {
|
||||
+ return SSH_ERROR;
|
||||
+ }
|
||||
#else
|
||||
- const BIGNUM *pb, *qb, *gb, *pubb;
|
||||
- OSSL_PARAM_BLD *param_bld;
|
||||
-#endif /* OPENSSL_VERSION_NUMBER */
|
||||
-
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
key->dsa = DSA_new();
|
||||
if (key->dsa == NULL) {
|
||||
return SSH_ERROR;
|
||||
}
|
||||
+#endif /* OPENSSL_VERSION_NUMBER */
|
||||
|
||||
bp = ssh_make_string_bn(p);
|
||||
bq = ssh_make_string_bn(q);
|
||||
@@ -1593,9 +1599,11 @@ int pki_pubkey_build_dss(ssh_key key,
|
||||
bpub_key = ssh_make_string_bn(pubkey);
|
||||
if (bp == NULL || bq == NULL ||
|
||||
bg == NULL || bpub_key == NULL) {
|
||||
+ rc = SSH_ERROR;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
+#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
/* Memory management of bp, bq and bg is transferred to DSA object */
|
||||
rc = DSA_set0_pqg(key->dsa, bp, bq, bg);
|
||||
if (rc == 0) {
|
||||
@@ -1613,35 +1621,37 @@ fail:
|
||||
DSA_free(key->dsa);
|
||||
return SSH_ERROR;
|
||||
#else
|
||||
- param_bld = OSSL_PARAM_BLD_new();
|
||||
- if (param_bld == NULL)
|
||||
- goto err;
|
||||
-
|
||||
- pb = ssh_make_string_bn(p);
|
||||
- qb = ssh_make_string_bn(q);
|
||||
- gb = ssh_make_string_bn(g);
|
||||
- pubb = ssh_make_string_bn(pubkey);
|
||||
-
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_P, pb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_Q, qb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_G, gb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_PUB_KEY, pubb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_P, bp);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_Q, bq);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_G, bg);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_PUB_KEY, bpub_key);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
|
||||
rc = evp_build_pkey("DSA", param_bld, &(key->key), EVP_PKEY_PUBLIC_KEY);
|
||||
+
|
||||
+fail:
|
||||
OSSL_PARAM_BLD_free(param_bld);
|
||||
+ bignum_safe_free(bp);
|
||||
+ bignum_safe_free(bq);
|
||||
+ bignum_safe_free(bg);
|
||||
+ bignum_safe_free(bpub_key);
|
||||
|
||||
return rc;
|
||||
-err:
|
||||
- OSSL_PARAM_BLD_free(param_bld);
|
||||
- return -1;
|
||||
#endif /* OPENSSL_VERSION_NUMBER */
|
||||
}
|
||||
|
||||
@@ -1654,18 +1664,18 @@ int pki_privkey_build_rsa(ssh_key key,
|
||||
ssh_string q)
|
||||
{
|
||||
int rc;
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
BIGNUM *be, *bn, *bd/*, *biqmp*/, *bp, *bq;
|
||||
+#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||
+ OSSL_PARAM_BLD *param_bld = OSSL_PARAM_BLD_new();
|
||||
+ if (param_bld == NULL) {
|
||||
+ return SSH_ERROR;
|
||||
+ }
|
||||
#else
|
||||
- const BIGNUM *nb, *eb, *db, *pb, *qb;
|
||||
- OSSL_PARAM_BLD *param_bld;
|
||||
-#endif /* OPENSSL_VERSION_NUMBER */
|
||||
-
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
key->rsa = RSA_new();
|
||||
if (key->rsa == NULL) {
|
||||
return SSH_ERROR;
|
||||
}
|
||||
+#endif /* OPENSSL_VERSION_NUMBER */
|
||||
|
||||
bn = ssh_make_string_bn(n);
|
||||
be = ssh_make_string_bn(e);
|
||||
@@ -1675,9 +1685,11 @@ int pki_privkey_build_rsa(ssh_key key,
|
||||
bq = ssh_make_string_bn(q);
|
||||
if (be == NULL || bn == NULL || bd == NULL ||
|
||||
/*biqmp == NULL ||*/ bp == NULL || bq == NULL) {
|
||||
+ rc = SSH_ERROR;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
+#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
/* Memory management of be, bn and bd is transferred to RSA object */
|
||||
rc = RSA_set0_key(key->rsa, bn, be, bd);
|
||||
if (rc == 0) {
|
||||
@@ -1702,41 +1714,49 @@ fail:
|
||||
RSA_free(key->rsa);
|
||||
return SSH_ERROR;
|
||||
#else
|
||||
- param_bld = OSSL_PARAM_BLD_new();
|
||||
- if (param_bld == NULL)
|
||||
- goto err;
|
||||
-
|
||||
- nb = ssh_make_string_bn(n);
|
||||
- eb = ssh_make_string_bn(e);
|
||||
- db = ssh_make_string_bn(d);
|
||||
- pb = ssh_make_string_bn(p);
|
||||
- qb = ssh_make_string_bn(q);
|
||||
-
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_N, nb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_E, eb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_D, db);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_N, bn);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_E, be);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_D, bd);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
|
||||
rc = evp_build_pkey("RSA", param_bld, &(key->key), EVP_PKEY_KEYPAIR);
|
||||
- OSSL_PARAM_BLD_free(param_bld);
|
||||
+ if (rc != SSH_OK) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
|
||||
- rc = EVP_PKEY_set_bn_param(key->key, OSSL_PKEY_PARAM_RSA_FACTOR1, pb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
+ rc = EVP_PKEY_set_bn_param(key->key, OSSL_PKEY_PARAM_RSA_FACTOR1, bp);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
|
||||
- rc = EVP_PKEY_set_bn_param(key->key, OSSL_PKEY_PARAM_RSA_FACTOR2, qb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
+ rc = EVP_PKEY_set_bn_param(key->key, OSSL_PKEY_PARAM_RSA_FACTOR2, bq);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
|
||||
- return rc;
|
||||
-err:
|
||||
+fail:
|
||||
OSSL_PARAM_BLD_free(param_bld);
|
||||
- return -1;
|
||||
+ bignum_safe_free(bn);
|
||||
+ bignum_safe_free(be);
|
||||
+ bignum_safe_free(bd);
|
||||
+ bignum_safe_free(bp);
|
||||
+ bignum_safe_free(bq);
|
||||
+
|
||||
+ return rc;
|
||||
#endif /* OPENSSL_VERSION_NUMBER */
|
||||
}
|
||||
|
||||
@@ -1744,25 +1764,27 @@ int pki_pubkey_build_rsa(ssh_key key,
|
||||
ssh_string e,
|
||||
ssh_string n) {
|
||||
int rc;
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
BIGNUM *be = NULL, *bn = NULL;
|
||||
+#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
||||
+ OSSL_PARAM_BLD *param_bld = OSSL_PARAM_BLD_new();
|
||||
+ if (param_bld == NULL) {
|
||||
+ return SSH_ERROR;
|
||||
+ }
|
||||
#else
|
||||
- const BIGNUM *eb, *nb;
|
||||
- OSSL_PARAM_BLD *param_bld;
|
||||
-#endif /* OPENSSL_VERSION_NUMBER */
|
||||
-
|
||||
-#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
key->rsa = RSA_new();
|
||||
if (key->rsa == NULL) {
|
||||
return SSH_ERROR;
|
||||
}
|
||||
+#endif /* OPENSSL_VERSION_NUMBER */
|
||||
|
||||
be = ssh_make_string_bn(e);
|
||||
bn = ssh_make_string_bn(n);
|
||||
if (be == NULL || bn == NULL) {
|
||||
+ rc = SSH_ERROR;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
+#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
||||
/* Memory management of bn and be is transferred to RSA object */
|
||||
rc = RSA_set0_key(key->rsa, bn, be, NULL);
|
||||
if (rc == 0) {
|
||||
@@ -1774,27 +1796,25 @@ fail:
|
||||
RSA_free(key->rsa);
|
||||
return SSH_ERROR;
|
||||
#else
|
||||
- nb = ssh_make_string_bn(n);
|
||||
- eb = ssh_make_string_bn(e);
|
||||
-
|
||||
- param_bld = OSSL_PARAM_BLD_new();
|
||||
- if (param_bld == NULL)
|
||||
- goto err;
|
||||
-
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_N, nb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
- rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_E, eb);
|
||||
- if (rc != 1)
|
||||
- goto err;
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_N, bn);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_RSA_E, be);
|
||||
+ if (rc != 1) {
|
||||
+ rc = SSH_ERROR;
|
||||
+ goto fail;
|
||||
+ }
|
||||
|
||||
rc = evp_build_pkey("RSA", param_bld, &(key->key), EVP_PKEY_PUBLIC_KEY);
|
||||
+
|
||||
+fail:
|
||||
OSSL_PARAM_BLD_free(param_bld);
|
||||
+ bignum_safe_free(bn);
|
||||
+ bignum_safe_free(be);
|
||||
|
||||
return rc;
|
||||
-err:
|
||||
- OSSL_PARAM_BLD_free(param_bld);
|
||||
- return -1;
|
||||
#endif /* OPENSSL_VERSION_NUMBER */
|
||||
}
|
||||
|
||||
--
|
||||
2.38.1
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,842 @@
|
||||
From 11c0d687a081fe64501e21c95def7f893611d029 Mon Sep 17 00:00:00 2001
|
||||
From: Norbert Pocs <npocs@redhat.com>
|
||||
Date: Wed, 16 Nov 2022 10:40:38 +0100
|
||||
Subject: [PATCH 1/5] Add a placehohlder for non-expanded identities
|
||||
|
||||
Expanding a string twice could lead to unwanted behaviour.
|
||||
This solution creates a ssh_list (`opts.identites_non_exp`) to store the strings
|
||||
before expansion and by using ssh_apply it moves the string to the
|
||||
`opts.identities`. This way the expanded strings are separated.
|
||||
|
||||
Signed-off-by: Norbert Pocs <npocs@redhat.com>
|
||||
Reviewed-by: Jakub Jelen <jjelen@redhat.com>
|
||||
---
|
||||
include/libssh/session.h | 1 +
|
||||
src/options.c | 86 +++++++++++++++++++++++++---------------
|
||||
src/session.c | 23 +++++++++--
|
||||
3 files changed, 75 insertions(+), 35 deletions(-)
|
||||
|
||||
diff --git a/include/libssh/session.h b/include/libssh/session.h
|
||||
index d3e5787c..e22b0d67 100644
|
||||
--- a/include/libssh/session.h
|
||||
+++ b/include/libssh/session.h
|
||||
@@ -209,6 +209,7 @@ struct ssh_session_struct {
|
||||
#endif
|
||||
struct {
|
||||
struct ssh_list *identity;
|
||||
+ struct ssh_list *identity_non_exp;
|
||||
char *username;
|
||||
char *host;
|
||||
char *bindaddr; /* bind the client to an ip addr */
|
||||
diff --git a/src/options.c b/src/options.c
|
||||
index 56e09c65..bb085384 100644
|
||||
--- a/src/options.c
|
||||
+++ b/src/options.c
|
||||
@@ -52,7 +52,7 @@
|
||||
* @brief Duplicate the options of a session structure.
|
||||
*
|
||||
* If you make several sessions with the same options this is useful. You
|
||||
- * cannot use twice the same option structure in ssh_session_connect.
|
||||
+ * cannot use twice the same option structure in ssh_connect.
|
||||
*
|
||||
* @param src The session to use to copy the options.
|
||||
*
|
||||
@@ -61,13 +61,14 @@
|
||||
*
|
||||
* @returns 0 on success, -1 on error with errno set.
|
||||
*
|
||||
- * @see ssh_session_connect()
|
||||
+ * @see ssh_connect()
|
||||
* @see ssh_free()
|
||||
*/
|
||||
int ssh_options_copy(ssh_session src, ssh_session *dest)
|
||||
{
|
||||
ssh_session new;
|
||||
struct ssh_iterator *it = NULL;
|
||||
+ struct ssh_list *list = NULL;
|
||||
char *id = NULL;
|
||||
int i;
|
||||
|
||||
@@ -105,14 +106,15 @@ int ssh_options_copy(ssh_session src, ssh_session *dest)
|
||||
}
|
||||
|
||||
/* Remove the default identities */
|
||||
- for (id = ssh_list_pop_head(char *, new->opts.identity);
|
||||
+ for (id = ssh_list_pop_head(char *, new->opts.identity_non_exp);
|
||||
id != NULL;
|
||||
- id = ssh_list_pop_head(char *, new->opts.identity)) {
|
||||
+ id = ssh_list_pop_head(char *, new->opts.identity_non_exp)) {
|
||||
SAFE_FREE(id);
|
||||
}
|
||||
/* Copy the new identities from the source list */
|
||||
- if (src->opts.identity != NULL) {
|
||||
- it = ssh_list_get_iterator(src->opts.identity);
|
||||
+ list = new->opts.identity_non_exp;
|
||||
+ it = ssh_list_get_iterator(src->opts.identity_non_exp);
|
||||
+ for (i = 0; i < 2; i++) {
|
||||
while (it) {
|
||||
int rc;
|
||||
|
||||
@@ -122,7 +124,7 @@ int ssh_options_copy(ssh_session src, ssh_session *dest)
|
||||
return -1;
|
||||
}
|
||||
|
||||
- rc = ssh_list_append(new->opts.identity, id);
|
||||
+ rc = ssh_list_append(list, id);
|
||||
if (rc < 0) {
|
||||
free(id);
|
||||
ssh_free(new);
|
||||
@@ -130,6 +132,10 @@ int ssh_options_copy(ssh_session src, ssh_session *dest)
|
||||
}
|
||||
it = it->next;
|
||||
}
|
||||
+
|
||||
+ /* copy the identity list if there is any already */
|
||||
+ list = new->opts.identity;
|
||||
+ it = ssh_list_get_iterator(src->opts.identity);
|
||||
}
|
||||
|
||||
if (src->opts.sshdir != NULL) {
|
||||
@@ -331,7 +337,7 @@ int ssh_options_set_algo(ssh_session session,
|
||||
* Add a new identity file (const char *, format string) to
|
||||
* the identity list.\n
|
||||
* \n
|
||||
- * By default identity, id_dsa and id_rsa are checked.\n
|
||||
+ * By default id_rsa, id_ecdsa and id_ed25519 files are used.\n
|
||||
* \n
|
||||
* The identity used to authenticate with public key will be
|
||||
* prepended to the list.
|
||||
@@ -700,7 +706,11 @@ int ssh_options_set(ssh_session session, enum ssh_options_e type,
|
||||
if (q == NULL) {
|
||||
return -1;
|
||||
}
|
||||
- rc = ssh_list_prepend(session->opts.identity, q);
|
||||
+ if (session->opts.exp_flags & SSH_OPT_EXP_FLAG_IDENTITY) {
|
||||
+ rc = ssh_list_append(session->opts.identity_non_exp, q);
|
||||
+ } else {
|
||||
+ rc = ssh_list_prepend(session->opts.identity_non_exp, q);
|
||||
+ }
|
||||
if (rc < 0) {
|
||||
free(q);
|
||||
return -1;
|
||||
@@ -1202,7 +1212,7 @@ int ssh_options_get_port(ssh_session session, unsigned int* port_target) {
|
||||
* - SSH_OPTIONS_IDENTITY:
|
||||
* Get the first identity file name (const char *).\n
|
||||
* \n
|
||||
- * By default identity, id_dsa and id_rsa are checked.
|
||||
+ * By default id_rsa, id_ecdsa and id_ed25519 files are used.
|
||||
*
|
||||
* - SSH_OPTIONS_PROXYCOMMAND:
|
||||
* Get the proxycommand necessary to log into the
|
||||
@@ -1246,7 +1256,11 @@ int ssh_options_get(ssh_session session, enum ssh_options_e type, char** value)
|
||||
break;
|
||||
}
|
||||
case SSH_OPTIONS_IDENTITY: {
|
||||
- struct ssh_iterator *it = ssh_list_get_iterator(session->opts.identity);
|
||||
+ struct ssh_iterator *it;
|
||||
+ it = ssh_list_get_iterator(session->opts.identity);
|
||||
+ if (it == NULL) {
|
||||
+ it = ssh_list_get_iterator(session->opts.identity_non_exp);
|
||||
+ }
|
||||
if (it == NULL) {
|
||||
return SSH_ERROR;
|
||||
}
|
||||
@@ -1541,7 +1555,6 @@ out:
|
||||
|
||||
int ssh_options_apply(ssh_session session)
|
||||
{
|
||||
- struct ssh_iterator *it;
|
||||
char *tmp;
|
||||
int rc;
|
||||
|
||||
@@ -1586,15 +1599,17 @@ int ssh_options_apply(ssh_session session)
|
||||
size_t plen = strlen(session->opts.ProxyCommand) +
|
||||
5 /* strlen("exec ") */;
|
||||
|
||||
- p = malloc(plen + 1 /* \0 */);
|
||||
- if (p == NULL) {
|
||||
- return -1;
|
||||
- }
|
||||
+ if (strncmp(session->opts.ProxyCommand, "exec ", 5) != 0) {
|
||||
+ p = malloc(plen + 1 /* \0 */);
|
||||
+ if (p == NULL) {
|
||||
+ return -1;
|
||||
+ }
|
||||
|
||||
- rc = snprintf(p, plen + 1, "exec %s", session->opts.ProxyCommand);
|
||||
- if ((size_t)rc != plen) {
|
||||
- free(p);
|
||||
- return -1;
|
||||
+ rc = snprintf(p, plen + 1, "exec %s", session->opts.ProxyCommand);
|
||||
+ if ((size_t)rc != plen) {
|
||||
+ free(p);
|
||||
+ return -1;
|
||||
+ }
|
||||
}
|
||||
|
||||
tmp = ssh_path_expand_escape(session, p);
|
||||
@@ -1606,24 +1621,33 @@ int ssh_options_apply(ssh_session session)
|
||||
session->opts.ProxyCommand = tmp;
|
||||
}
|
||||
|
||||
- for (it = ssh_list_get_iterator(session->opts.identity);
|
||||
- it != NULL;
|
||||
- it = it->next) {
|
||||
- char *id = (char *) it->data;
|
||||
- if (strncmp(id, "pkcs11:", 6) == 0) {
|
||||
+ for (tmp = ssh_list_pop_head(char *, session->opts.identity_non_exp);
|
||||
+ tmp != NULL;
|
||||
+ tmp = ssh_list_pop_head(char *, session->opts.identity_non_exp)) {
|
||||
+ char *id = tmp;
|
||||
+ if (strncmp(id, "pkcs11:", 6) != 0) {
|
||||
/* PKCS#11 URIs are using percent-encoding so we can not mix
|
||||
* it with ssh expansion of ssh escape characters.
|
||||
- * Skip these identities now, before we will have PKCS#11 support
|
||||
*/
|
||||
- continue;
|
||||
+ tmp = ssh_path_expand_escape(session, id);
|
||||
+ if (tmp == NULL) {
|
||||
+ return -1;
|
||||
+ }
|
||||
+ free(id);
|
||||
}
|
||||
- tmp = ssh_path_expand_escape(session, id);
|
||||
- if (tmp == NULL) {
|
||||
+
|
||||
+ /* use append to keep the order at first call and use prepend
|
||||
+ * to put anything that comes on the nth calls to the beginning */
|
||||
+ if (session->opts.exp_flags & SSH_OPT_EXP_FLAG_IDENTITY) {
|
||||
+ rc = ssh_list_prepend(session->opts.identity, tmp);
|
||||
+ } else {
|
||||
+ rc = ssh_list_append(session->opts.identity, tmp);
|
||||
+ }
|
||||
+ if (rc != SSH_OK) {
|
||||
return -1;
|
||||
}
|
||||
- free(id);
|
||||
- it->data = tmp;
|
||||
}
|
||||
+ session->opts.exp_flags |= SSH_OPT_EXP_FLAG_IDENTITY;
|
||||
|
||||
return 0;
|
||||
}
|
||||
diff --git a/src/session.c b/src/session.c
|
||||
index 64e54957..34a492e4 100644
|
||||
--- a/src/session.c
|
||||
+++ b/src/session.c
|
||||
@@ -118,13 +118,17 @@ ssh_session ssh_new(void)
|
||||
if (session->opts.identity == NULL) {
|
||||
goto err;
|
||||
}
|
||||
+ session->opts.identity_non_exp = ssh_list_new();
|
||||
+ if (session->opts.identity_non_exp == NULL) {
|
||||
+ goto err;
|
||||
+ }
|
||||
|
||||
id = strdup("%d/id_ed25519");
|
||||
if (id == NULL) {
|
||||
goto err;
|
||||
}
|
||||
|
||||
- rc = ssh_list_append(session->opts.identity, id);
|
||||
+ rc = ssh_list_append(session->opts.identity_non_exp, id);
|
||||
if (rc == SSH_ERROR) {
|
||||
goto err;
|
||||
}
|
||||
@@ -134,7 +138,7 @@ ssh_session ssh_new(void)
|
||||
if (id == NULL) {
|
||||
goto err;
|
||||
}
|
||||
- rc = ssh_list_append(session->opts.identity, id);
|
||||
+ rc = ssh_list_append(session->opts.identity_non_exp, id);
|
||||
if (rc == SSH_ERROR) {
|
||||
goto err;
|
||||
}
|
||||
@@ -144,7 +148,7 @@ ssh_session ssh_new(void)
|
||||
if (id == NULL) {
|
||||
goto err;
|
||||
}
|
||||
- rc = ssh_list_append(session->opts.identity, id);
|
||||
+ rc = ssh_list_append(session->opts.identity_non_exp, id);
|
||||
if (rc == SSH_ERROR) {
|
||||
goto err;
|
||||
}
|
||||
@@ -154,7 +158,7 @@ ssh_session ssh_new(void)
|
||||
if (id == NULL) {
|
||||
goto err;
|
||||
}
|
||||
- rc = ssh_list_append(session->opts.identity, id);
|
||||
+ rc = ssh_list_append(session->opts.identity_non_exp, id);
|
||||
if (rc == SSH_ERROR) {
|
||||
goto err;
|
||||
}
|
||||
@@ -284,6 +288,17 @@ void ssh_free(ssh_session session)
|
||||
ssh_list_free(session->opts.identity);
|
||||
}
|
||||
|
||||
+ if (session->opts.identity_non_exp) {
|
||||
+ char *id;
|
||||
+
|
||||
+ for (id = ssh_list_pop_head(char *, session->opts.identity_non_exp);
|
||||
+ id != NULL;
|
||||
+ id = ssh_list_pop_head(char *, session->opts.identity_non_exp)) {
|
||||
+ SAFE_FREE(id);
|
||||
+ }
|
||||
+ ssh_list_free(session->opts.identity_non_exp);
|
||||
+ }
|
||||
+
|
||||
while ((b = ssh_list_pop_head(struct ssh_buffer_struct *,
|
||||
session->out_queue)) != NULL) {
|
||||
SSH_BUFFER_FREE(b);
|
||||
--
|
||||
2.38.1
|
||||
|
||||
|
||||
From 4cb84b99fdb1ffd26c0241f5809e4f67ddd407c6 Mon Sep 17 00:00:00 2001
|
||||
From: Norbert Pocs <npocs@redhat.com>
|
||||
Date: Wed, 16 Nov 2022 11:03:30 +0100
|
||||
Subject: [PATCH 2/5] tests: Use opts.identites_non_exp not opts.identities
|
||||
|
||||
The configuration of identities are first saved to `opts.identities_non_exp`,
|
||||
then moved to `opts.identities` after calling ssh_options_apply and expanding
|
||||
the identity strings. These tests are testing against the proper configuration
|
||||
|
||||
Signed-off-by: Norbert Pocs <npocs@redhat.com>
|
||||
Reviewed-by: Jakub Jelen <jjelen@redhat.com>
|
||||
---
|
||||
tests/client/torture_auth_pkcs11.c | 2 +-
|
||||
tests/unittests/torture_config.c | 3 ++-
|
||||
tests/unittests/torture_options.c | 14 +++++++-------
|
||||
3 files changed, 10 insertions(+), 9 deletions(-)
|
||||
|
||||
diff --git a/tests/client/torture_auth_pkcs11.c b/tests/client/torture_auth_pkcs11.c
|
||||
index ee97bff4..e75fea0e 100644
|
||||
--- a/tests/client/torture_auth_pkcs11.c
|
||||
+++ b/tests/client/torture_auth_pkcs11.c
|
||||
@@ -196,7 +196,7 @@ static void torture_auth_autopubkey(void **state, const char *obj_name, const ch
|
||||
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_IDENTITY, priv_uri);
|
||||
assert_int_equal(rc, SSH_OK);
|
||||
- assert_string_equal(session->opts.identity->root->data, priv_uri);
|
||||
+ assert_string_equal(session->opts.identity_non_exp->root->data, priv_uri);
|
||||
|
||||
rc = ssh_connect(session);
|
||||
assert_int_equal(rc, SSH_OK);
|
||||
diff --git a/tests/unittests/torture_config.c b/tests/unittests/torture_config.c
|
||||
index 354adc2f..100e68f6 100644
|
||||
--- a/tests/unittests/torture_config.c
|
||||
+++ b/tests/unittests/torture_config.c
|
||||
@@ -2078,7 +2078,8 @@ static void torture_config_identity(void **state)
|
||||
|
||||
_parse_config(session, NULL, LIBSSH_TESTCONFIG_STRING13, SSH_OK);
|
||||
|
||||
- it = ssh_list_get_iterator(session->opts.identity);
|
||||
+ /* The identities are first added to this temporary list before expanding */
|
||||
+ it = ssh_list_get_iterator(session->opts.identity_non_exp);
|
||||
assert_non_null(it);
|
||||
id = it->data;
|
||||
/* The identities are prepended to the list so we start with second one */
|
||||
diff --git a/tests/unittests/torture_options.c b/tests/unittests/torture_options.c
|
||||
index dc4df383..3be2de8a 100644
|
||||
--- a/tests/unittests/torture_options.c
|
||||
+++ b/tests/unittests/torture_options.c
|
||||
@@ -406,12 +406,12 @@ static void torture_options_set_identity(void **state) {
|
||||
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_ADD_IDENTITY, "identity1");
|
||||
assert_true(rc == 0);
|
||||
- assert_string_equal(session->opts.identity->root->data, "identity1");
|
||||
+ assert_string_equal(session->opts.identity_non_exp->root->data, "identity1");
|
||||
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_IDENTITY, "identity2");
|
||||
assert_true(rc == 0);
|
||||
- assert_string_equal(session->opts.identity->root->data, "identity2");
|
||||
- assert_string_equal(session->opts.identity->root->next->data, "identity1");
|
||||
+ assert_string_equal(session->opts.identity_non_exp->root->data, "identity2");
|
||||
+ assert_string_equal(session->opts.identity_non_exp->root->next->data, "identity1");
|
||||
}
|
||||
|
||||
static void torture_options_get_identity(void **state) {
|
||||
@@ -429,7 +429,7 @@ static void torture_options_get_identity(void **state) {
|
||||
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_IDENTITY, "identity2");
|
||||
assert_int_equal(rc, SSH_OK);
|
||||
- assert_string_equal(session->opts.identity->root->data, "identity2");
|
||||
+ assert_string_equal(session->opts.identity_non_exp->root->data, "identity2");
|
||||
rc = ssh_options_get(session, SSH_OPTIONS_IDENTITY, &identity);
|
||||
assert_int_equal(rc, SSH_OK);
|
||||
assert_non_null(identity);
|
||||
@@ -867,9 +867,9 @@ static void torture_options_copy(void **state)
|
||||
assert_non_null(new);
|
||||
|
||||
/* Check the identities match */
|
||||
- it = ssh_list_get_iterator(session->opts.identity);
|
||||
+ it = ssh_list_get_iterator(session->opts.identity_non_exp);
|
||||
assert_non_null(it);
|
||||
- it2 = ssh_list_get_iterator(new->opts.identity);
|
||||
+ it2 = ssh_list_get_iterator(new->opts.identity_non_exp);
|
||||
assert_non_null(it2);
|
||||
while (it != NULL && it2 != NULL) {
|
||||
assert_string_equal(it->data, it2->data);
|
||||
@@ -956,7 +956,7 @@ static void torture_options_getopt(void **state)
|
||||
"aes128-ctr");
|
||||
assert_string_equal(session->opts.wanted_methods[SSH_CRYPT_S_C],
|
||||
"aes128-ctr");
|
||||
- assert_string_equal(session->opts.identity->root->data, "id_rsa");
|
||||
+ assert_string_equal(session->opts.identity_non_exp->root->data, "id_rsa");
|
||||
#ifdef WITH_ZLIB
|
||||
assert_string_equal(session->opts.wanted_methods[SSH_COMP_C_S],
|
||||
"zlib@openssh.com,zlib,none");
|
||||
--
|
||||
2.38.1
|
||||
|
||||
|
||||
From cd30217c9032419ebcf722c0bfc6b5ebfa3518d0 Mon Sep 17 00:00:00 2001
|
||||
From: Norbert Pocs <npocs@redhat.com>
|
||||
Date: Wed, 16 Nov 2022 16:51:02 +0100
|
||||
Subject: [PATCH 3/5] Add flags for escape expand operation
|
||||
|
||||
Calling `ssh_options_apply` more times can result in an unwanted behaviour of
|
||||
expanding the escape characters more times. Adding flags to check if the
|
||||
expansion was already done on the current string variables.
|
||||
|
||||
Signed-off-by: Norbert Pocs <npocs@redhat.com>
|
||||
Reviewed-by: Jakub Jelen <jjelen@redhat.com>
|
||||
---
|
||||
include/libssh/session.h | 7 ++++
|
||||
src/options.c | 91 ++++++++++++++++++++++++----------------
|
||||
src/session.c | 2 +
|
||||
3 files changed, 63 insertions(+), 37 deletions(-)
|
||||
|
||||
diff --git a/include/libssh/session.h b/include/libssh/session.h
|
||||
index e22b0d67..cf219c2a 100644
|
||||
--- a/include/libssh/session.h
|
||||
+++ b/include/libssh/session.h
|
||||
@@ -93,6 +93,12 @@ enum ssh_pending_call_e {
|
||||
#define SSH_OPT_FLAG_KBDINT_AUTH 0x4
|
||||
#define SSH_OPT_FLAG_GSSAPI_AUTH 0x8
|
||||
|
||||
+/* Escape expansion of different variables */
|
||||
+#define SSH_OPT_EXP_FLAG_KNOWNHOSTS 0x1
|
||||
+#define SSH_OPT_EXP_FLAG_GLOBAL_KNOWNHOSTS 0x2
|
||||
+#define SSH_OPT_EXP_FLAG_PROXYCOMMAND 0x4
|
||||
+#define SSH_OPT_EXP_FLAG_IDENTITY 0x8
|
||||
+
|
||||
/* extensions flags */
|
||||
/* negotiation enabled */
|
||||
#define SSH_EXT_NEGOTIATION 0x01
|
||||
@@ -232,6 +238,7 @@ struct ssh_session_struct {
|
||||
char *gss_client_identity;
|
||||
int gss_delegate_creds;
|
||||
int flags;
|
||||
+ int exp_flags;
|
||||
int nodelay;
|
||||
bool config_processed;
|
||||
uint8_t options_seen[SOC_MAX];
|
||||
diff --git a/src/options.c b/src/options.c
|
||||
index bb085384..c566244b 100644
|
||||
--- a/src/options.c
|
||||
+++ b/src/options.c
|
||||
@@ -730,6 +730,7 @@ int ssh_options_set(ssh_session session, enum ssh_options_e type,
|
||||
ssh_set_error_oom(session);
|
||||
return -1;
|
||||
}
|
||||
+ session->opts.exp_flags &= ~SSH_OPT_EXP_FLAG_KNOWNHOSTS;
|
||||
}
|
||||
break;
|
||||
case SSH_OPTIONS_GLOBAL_KNOWNHOSTS:
|
||||
@@ -751,6 +752,7 @@ int ssh_options_set(ssh_session session, enum ssh_options_e type,
|
||||
ssh_set_error_oom(session);
|
||||
return -1;
|
||||
}
|
||||
+ session->opts.exp_flags &= ~SSH_OPT_EXP_FLAG_GLOBAL_KNOWNHOSTS;
|
||||
}
|
||||
break;
|
||||
case SSH_OPTIONS_TIMEOUT:
|
||||
@@ -1014,6 +1016,7 @@ int ssh_options_set(ssh_session session, enum ssh_options_e type,
|
||||
return -1;
|
||||
}
|
||||
session->opts.ProxyCommand = q;
|
||||
+ session->opts.exp_flags &= ~SSH_OPT_EXP_FLAG_PROXYCOMMAND;
|
||||
}
|
||||
}
|
||||
break;
|
||||
@@ -1572,53 +1575,67 @@ int ssh_options_apply(ssh_session session)
|
||||
}
|
||||
}
|
||||
|
||||
- if (session->opts.knownhosts == NULL) {
|
||||
- tmp = ssh_path_expand_escape(session, "%d/known_hosts");
|
||||
- } else {
|
||||
- tmp = ssh_path_expand_escape(session, session->opts.knownhosts);
|
||||
- }
|
||||
- if (tmp == NULL) {
|
||||
- return -1;
|
||||
+ if ((session->opts.exp_flags & SSH_OPT_EXP_FLAG_KNOWNHOSTS) == 0) {
|
||||
+ if (session->opts.knownhosts == NULL) {
|
||||
+ tmp = ssh_path_expand_escape(session, "%d/known_hosts");
|
||||
+ } else {
|
||||
+ tmp = ssh_path_expand_escape(session, session->opts.knownhosts);
|
||||
+ }
|
||||
+ if (tmp == NULL) {
|
||||
+ return -1;
|
||||
+ }
|
||||
+ free(session->opts.knownhosts);
|
||||
+ session->opts.knownhosts = tmp;
|
||||
+ session->opts.exp_flags |= SSH_OPT_EXP_FLAG_KNOWNHOSTS;
|
||||
}
|
||||
- free(session->opts.knownhosts);
|
||||
- session->opts.knownhosts = tmp;
|
||||
|
||||
- if (session->opts.global_knownhosts == NULL) {
|
||||
- tmp = strdup("/etc/ssh/ssh_known_hosts");
|
||||
- } else {
|
||||
- tmp = ssh_path_expand_escape(session, session->opts.global_knownhosts);
|
||||
- }
|
||||
- if (tmp == NULL) {
|
||||
- return -1;
|
||||
+ if ((session->opts.exp_flags & SSH_OPT_EXP_FLAG_GLOBAL_KNOWNHOSTS) == 0) {
|
||||
+ if (session->opts.global_knownhosts == NULL) {
|
||||
+ tmp = strdup("/etc/ssh/ssh_known_hosts");
|
||||
+ } else {
|
||||
+ tmp = ssh_path_expand_escape(session,
|
||||
+ session->opts.global_knownhosts);
|
||||
+ }
|
||||
+ if (tmp == NULL) {
|
||||
+ return -1;
|
||||
+ }
|
||||
+ free(session->opts.global_knownhosts);
|
||||
+ session->opts.global_knownhosts = tmp;
|
||||
+ session->opts.exp_flags |= SSH_OPT_EXP_FLAG_GLOBAL_KNOWNHOSTS;
|
||||
}
|
||||
- free(session->opts.global_knownhosts);
|
||||
- session->opts.global_knownhosts = tmp;
|
||||
|
||||
- if (session->opts.ProxyCommand != NULL) {
|
||||
- char *p = NULL;
|
||||
- size_t plen = strlen(session->opts.ProxyCommand) +
|
||||
- 5 /* strlen("exec ") */;
|
||||
|
||||
- if (strncmp(session->opts.ProxyCommand, "exec ", 5) != 0) {
|
||||
- p = malloc(plen + 1 /* \0 */);
|
||||
- if (p == NULL) {
|
||||
- return -1;
|
||||
- }
|
||||
+ if ((session->opts.exp_flags & SSH_OPT_EXP_FLAG_PROXYCOMMAND) == 0) {
|
||||
+ if (session->opts.ProxyCommand != NULL) {
|
||||
+ char *p = NULL;
|
||||
+ size_t plen = strlen(session->opts.ProxyCommand) +
|
||||
+ 5 /* strlen("exec ") */;
|
||||
+
|
||||
+ if (strncmp(session->opts.ProxyCommand, "exec ", 5) != 0) {
|
||||
+ p = malloc(plen + 1 /* \0 */);
|
||||
+ if (p == NULL) {
|
||||
+ return -1;
|
||||
+ }
|
||||
|
||||
- rc = snprintf(p, plen + 1, "exec %s", session->opts.ProxyCommand);
|
||||
- if ((size_t)rc != plen) {
|
||||
+ rc = snprintf(p, plen + 1, "exec %s", session->opts.ProxyCommand);
|
||||
+ if ((size_t)rc != plen) {
|
||||
+ free(p);
|
||||
+ return -1;
|
||||
+ }
|
||||
+ tmp = ssh_path_expand_escape(session, p);
|
||||
free(p);
|
||||
- return -1;
|
||||
+ } else {
|
||||
+ tmp = ssh_path_expand_escape(session,
|
||||
+ session->opts.ProxyCommand);
|
||||
}
|
||||
- }
|
||||
|
||||
- tmp = ssh_path_expand_escape(session, p);
|
||||
- free(p);
|
||||
- if (tmp == NULL) {
|
||||
- return -1;
|
||||
+ if (tmp == NULL) {
|
||||
+ return -1;
|
||||
+ }
|
||||
+ free(session->opts.ProxyCommand);
|
||||
+ session->opts.ProxyCommand = tmp;
|
||||
+ session->opts.exp_flags |= SSH_OPT_EXP_FLAG_PROXYCOMMAND;
|
||||
}
|
||||
- free(session->opts.ProxyCommand);
|
||||
- session->opts.ProxyCommand = tmp;
|
||||
}
|
||||
|
||||
for (tmp = ssh_list_pop_head(char *, session->opts.identity_non_exp);
|
||||
diff --git a/src/session.c b/src/session.c
|
||||
index 34a492e4..06f6a26f 100644
|
||||
--- a/src/session.c
|
||||
+++ b/src/session.c
|
||||
@@ -114,6 +114,8 @@ ssh_session ssh_new(void)
|
||||
SSH_OPT_FLAG_KBDINT_AUTH |
|
||||
SSH_OPT_FLAG_GSSAPI_AUTH;
|
||||
|
||||
+ session->opts.exp_flags = 0;
|
||||
+
|
||||
session->opts.identity = ssh_list_new();
|
||||
if (session->opts.identity == NULL) {
|
||||
goto err;
|
||||
--
|
||||
2.38.1
|
||||
|
||||
|
||||
From ed58082f9706f2ab3bdeca24f632356b9bc325e6 Mon Sep 17 00:00:00 2001
|
||||
From: Norbert Pocs <npocs@redhat.com>
|
||||
Date: Wed, 16 Nov 2022 17:17:14 +0100
|
||||
Subject: [PATCH 4/5] torture_options.c: Add identity test for ssh_options_copy
|
||||
|
||||
Test if the ssh_options_apply is called on session before ssh_options_copy,
|
||||
then `opts.identity` ssh_list will be copied
|
||||
|
||||
Signed-off-by: Norbert Pocs <npocs@redhat.com>
|
||||
Reviewed-by: Jakub Jelen <jjelen@redhat.com>
|
||||
---
|
||||
tests/unittests/torture_options.c | 28 ++++++++++++++++++++++++++++
|
||||
1 file changed, 28 insertions(+)
|
||||
|
||||
diff --git a/tests/unittests/torture_options.c b/tests/unittests/torture_options.c
|
||||
index 3be2de8a..907cc8df 100644
|
||||
--- a/tests/unittests/torture_options.c
|
||||
+++ b/tests/unittests/torture_options.c
|
||||
@@ -918,6 +918,34 @@ static void torture_options_copy(void **state)
|
||||
sizeof(session->opts.options_seen));
|
||||
|
||||
ssh_free(new);
|
||||
+
|
||||
+ /* test if ssh_options_apply was called before ssh_options_copy
|
||||
+ * the opts.identity list gets copied (percent expanded list) */
|
||||
+ rv = ssh_options_apply(session);
|
||||
+ assert_ssh_return_code(session, rv);
|
||||
+
|
||||
+ rv = ssh_options_copy(session, &new);
|
||||
+ assert_ssh_return_code(session, rv);
|
||||
+ assert_non_null(new);
|
||||
+
|
||||
+ it = ssh_list_get_iterator(session->opts.identity_non_exp);
|
||||
+ assert_null(it);
|
||||
+ it2 = ssh_list_get_iterator(new->opts.identity_non_exp);
|
||||
+ assert_null(it2);
|
||||
+
|
||||
+ it = ssh_list_get_iterator(session->opts.identity);
|
||||
+ assert_non_null(it);
|
||||
+ it2 = ssh_list_get_iterator(new->opts.identity);
|
||||
+ assert_non_null(it2);
|
||||
+ while (it != NULL && it2 != NULL) {
|
||||
+ assert_string_equal(it->data, it2->data);
|
||||
+ it = it->next;
|
||||
+ it2 = it2->next;
|
||||
+ }
|
||||
+ assert_null(it);
|
||||
+ assert_null(it2);
|
||||
+
|
||||
+ ssh_free(new);
|
||||
}
|
||||
|
||||
#define EXECUTABLE_NAME "test-exec"
|
||||
--
|
||||
2.38.1
|
||||
|
||||
|
||||
From 89dd4a927b946d4df5c48073ca25cd843e0acde0 Mon Sep 17 00:00:00 2001
|
||||
From: Norbert Pocs <npocs@redhat.com>
|
||||
Date: Wed, 16 Nov 2022 17:18:49 +0100
|
||||
Subject: [PATCH 5/5] torture_options.c: Add test for ssh_options_apply
|
||||
|
||||
Test that ssh_options_apply can be called multiple times without expanding
|
||||
escape characters more than once. If the options are updated after calling
|
||||
ssh_options_apply keep the last options.
|
||||
|
||||
Signed-off-by: Norbert Pocs <npocs@redhat.com>
|
||||
Reviewed-by: Jakub Jelen <jjelen@redhat.com>
|
||||
---
|
||||
tests/unittests/torture_options.c | 165 ++++++++++++++++++++++++++++++
|
||||
1 file changed, 165 insertions(+)
|
||||
|
||||
diff --git a/tests/unittests/torture_options.c b/tests/unittests/torture_options.c
|
||||
index 907cc8df..ea63b45e 100644
|
||||
--- a/tests/unittests/torture_options.c
|
||||
+++ b/tests/unittests/torture_options.c
|
||||
@@ -1332,6 +1332,170 @@ static void torture_options_caret_sign(void **state)
|
||||
free(awaited);
|
||||
}
|
||||
|
||||
+static void torture_options_apply (void **state) {
|
||||
+ ssh_session session = *state;
|
||||
+ struct ssh_list *awaited_list = NULL;
|
||||
+ struct ssh_iterator *it1 = NULL, *it2 = NULL;
|
||||
+ char *id = NULL;
|
||||
+ int rc;
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_KNOWNHOSTS,
|
||||
+ "%%d/.ssh/known_hosts");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_GLOBAL_KNOWNHOSTS,
|
||||
+ "/etc/%%u/libssh/known_hosts");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_PROXYCOMMAND,
|
||||
+ "exec echo \"Hello libssh %%d!\"");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_ADD_IDENTITY,
|
||||
+ "%%d/do_not_expand");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_apply(session);
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ /* check that the values got expanded */
|
||||
+ assert_true(session->opts.exp_flags & SSH_OPT_EXP_FLAG_KNOWNHOSTS);
|
||||
+ assert_true(session->opts.exp_flags & SSH_OPT_EXP_FLAG_GLOBAL_KNOWNHOSTS);
|
||||
+ assert_true(session->opts.exp_flags & SSH_OPT_EXP_FLAG_PROXYCOMMAND);
|
||||
+ assert_true(ssh_list_count(session->opts.identity_non_exp) == 0);
|
||||
+ assert_true(ssh_list_count(session->opts.identity) > 0);
|
||||
+
|
||||
+ /* should not change anything calling it again */
|
||||
+ rc = ssh_options_apply(session);
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ /* check that the expansion was done only once */
|
||||
+ assert_string_equal(session->opts.knownhosts, "%d/.ssh/known_hosts");
|
||||
+ assert_string_equal(session->opts.global_knownhosts,
|
||||
+ "/etc/%u/libssh/known_hosts");
|
||||
+ /* no exec should be added if there already is one */
|
||||
+ assert_string_equal(session->opts.ProxyCommand,
|
||||
+ "exec echo \"Hello libssh %d!\"");
|
||||
+ assert_string_equal(session->opts.identity->root->data,
|
||||
+ "%d/do_not_expand");
|
||||
+
|
||||
+ /* apply should keep the freshest setting */
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_KNOWNHOSTS,
|
||||
+ "hello there");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_GLOBAL_KNOWNHOSTS,
|
||||
+ "lorem ipsum");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_PROXYCOMMAND,
|
||||
+ "mission_impossible");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_ADD_IDENTITY,
|
||||
+ "007");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_ADD_IDENTITY,
|
||||
+ "3");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_ADD_IDENTITY,
|
||||
+ "2");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ rc = ssh_options_set(session,
|
||||
+ SSH_OPTIONS_ADD_IDENTITY,
|
||||
+ "1");
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ /* check that flags show need of escape expansion */
|
||||
+ assert_false(session->opts.exp_flags & SSH_OPT_EXP_FLAG_KNOWNHOSTS);
|
||||
+ assert_false(session->opts.exp_flags & SSH_OPT_EXP_FLAG_GLOBAL_KNOWNHOSTS);
|
||||
+ assert_false(session->opts.exp_flags & SSH_OPT_EXP_FLAG_PROXYCOMMAND);
|
||||
+ assert_false(ssh_list_count(session->opts.identity_non_exp) == 0);
|
||||
+
|
||||
+ rc = ssh_options_apply(session);
|
||||
+ assert_ssh_return_code(session, rc);
|
||||
+
|
||||
+ /* check that the values got expanded */
|
||||
+ assert_true(session->opts.exp_flags & SSH_OPT_EXP_FLAG_KNOWNHOSTS);
|
||||
+ assert_true(session->opts.exp_flags & SSH_OPT_EXP_FLAG_GLOBAL_KNOWNHOSTS);
|
||||
+ assert_true(session->opts.exp_flags & SSH_OPT_EXP_FLAG_PROXYCOMMAND);
|
||||
+ assert_true(ssh_list_count(session->opts.identity_non_exp) == 0);
|
||||
+
|
||||
+ assert_string_equal(session->opts.knownhosts, "hello there");
|
||||
+ assert_string_equal(session->opts.global_knownhosts, "lorem ipsum");
|
||||
+ /* check that the "exec " was added at the beginning */
|
||||
+ assert_string_equal(session->opts.ProxyCommand, "exec mission_impossible");
|
||||
+ assert_string_equal(session->opts.identity->root->data, "1");
|
||||
+
|
||||
+ /* check the order of the identity files after double expansion */
|
||||
+ awaited_list = ssh_list_new();
|
||||
+ /* append the new data in order */
|
||||
+ id = strdup("1");
|
||||
+ rc = ssh_list_append(awaited_list, id);
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+ id = strdup("2");
|
||||
+ rc = ssh_list_append(awaited_list, id);
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+ id = strdup("3");
|
||||
+ rc = ssh_list_append(awaited_list, id);
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+ id = strdup("007");
|
||||
+ rc = ssh_list_append(awaited_list, id);
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+ id = strdup("%d/do_not_expand");
|
||||
+ rc = ssh_list_append(awaited_list, id);
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+ /* append the defaults; this list is copied from ssh_new@src/session.c */
|
||||
+ id = ssh_path_expand_escape(session, "%d/id_ed25519");
|
||||
+ rc = ssh_list_append(awaited_list, id);
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+#ifdef HAVE_ECC
|
||||
+ id = ssh_path_expand_escape(session, "%d/id_ecdsa");
|
||||
+ rc = ssh_list_append(awaited_list, id);
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+#endif
|
||||
+ id = ssh_path_expand_escape(session, "%d/id_rsa");
|
||||
+ rc = ssh_list_append(awaited_list, id);
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+#ifdef HAVE_DSA
|
||||
+ id = ssh_path_expand_escape(session, "%d/id_dsa");
|
||||
+ rc = ssh_list_append(awaited_list, id);
|
||||
+ assert_int_equal(rc, SSH_OK);
|
||||
+#endif
|
||||
+
|
||||
+ assert_int_equal(ssh_list_count(awaited_list),
|
||||
+ ssh_list_count(session->opts.identity));
|
||||
+
|
||||
+ it1 = ssh_list_get_iterator(awaited_list);
|
||||
+ assert_non_null(it1);
|
||||
+ it2 = ssh_list_get_iterator(session->opts.identity);
|
||||
+ assert_non_null(it2);
|
||||
+ while (it1 != NULL && it2 != NULL) {
|
||||
+ assert_string_equal(it1->data, it2->data);
|
||||
+
|
||||
+ free((void*)it1->data);
|
||||
+ it1 = it1->next;
|
||||
+ it2 = it2->next;
|
||||
+ }
|
||||
+ assert_null(it1);
|
||||
+ assert_null(it2);
|
||||
+
|
||||
+ ssh_list_free(awaited_list);
|
||||
+}
|
||||
+
|
||||
#ifdef WITH_SERVER
|
||||
const char template[] = "temp_dir_XXXXXX";
|
||||
|
||||
@@ -2132,6 +2296,7 @@ int torture_run_tests(void) {
|
||||
setup, teardown),
|
||||
cmocka_unit_test_setup_teardown(torture_options_caret_sign,
|
||||
setup, teardown),
|
||||
+ cmocka_unit_test_setup_teardown(torture_options_apply, setup, teardown),
|
||||
};
|
||||
|
||||
#ifdef WITH_SERVER
|
||||
--
|
||||
2.38.1
|
||||
|
@ -0,0 +1,98 @@
|
||||
diff --git a/tests/pkcs11/setup-softhsm-tokens.sh b/tests/pkcs11/setup-softhsm-tokens.sh
|
||||
index 532c86a7..9050cea6 100755
|
||||
--- a/tests/pkcs11/setup-softhsm-tokens.sh
|
||||
+++ b/tests/pkcs11/setup-softhsm-tokens.sh
|
||||
@@ -17,10 +17,10 @@ echo "OBJNAME: $OBJNAME"
|
||||
echo "LOADPUBLIC: $LOADPUBLIC"
|
||||
|
||||
# Create temporary directory for tokens
|
||||
-install -d -m 0755 $TESTDIR/db
|
||||
+install -d -m 0755 "$TESTDIR/db"
|
||||
|
||||
# Create SoftHSM configuration file
|
||||
-cat >$TESTDIR/softhsm.conf <<EOF
|
||||
+cat >"$TESTDIR/softhsm.conf" <<EOF
|
||||
directories.tokendir = $TESTDIR/db
|
||||
objectstore.backend = file
|
||||
log.level = DEBUG
|
||||
@@ -28,12 +28,12 @@ EOF
|
||||
|
||||
export SOFTHSM2_CONF=$TESTDIR/softhsm.conf
|
||||
|
||||
-cat $TESTDIR/softhsm.conf
|
||||
+cat "$TESTDIR/softhsm.conf"
|
||||
|
||||
#init
|
||||
-cmd='softhsm2-util --init-token --label "$OBJNAME" --free --pin 1234 --so-pin 1234'
|
||||
+cmd="softhsm2-util --init-token --label $OBJNAME --free --pin 1234 --so-pin 1234"
|
||||
eval echo "$cmd"
|
||||
-out=$(eval $cmd)
|
||||
+out=$(eval "$cmd")
|
||||
ret=$?
|
||||
if [ $ret -ne 0 ]; then
|
||||
echo "Init token failed"
|
||||
@@ -41,10 +41,29 @@ if [ $ret -ne 0 ]; then
|
||||
exit 1
|
||||
fi
|
||||
|
||||
+find_library_path() {
|
||||
+ echo "$@"
|
||||
+ for _lib in "$@" ; do
|
||||
+ if test -f "$_lib" ; then
|
||||
+ LIBSOFTHSM_PATH="$_lib"
|
||||
+ echo "Using libsofthsm path: $LIBSOFTHSM_PATH"
|
||||
+ return
|
||||
+ fi
|
||||
+ done
|
||||
+ echo "libsofthsm2.so not found"
|
||||
+ exit 1
|
||||
+}
|
||||
+
|
||||
+find_library_path \
|
||||
+ /usr/lib64/libsofthsm2.so \
|
||||
+ /usr/lib/libsofthsm2.so \
|
||||
+ /usr/local/lib/softhsm/libsofthsm2.so \
|
||||
+ /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so
|
||||
+
|
||||
#load private key
|
||||
-cmd='p11tool --provider /usr/lib64/pkcs11/libsofthsm2.so --write --load-privkey "$PRIVKEY" --label "$OBJNAME" --login --set-pin=1234 "pkcs11:token="$OBJNAME""'
|
||||
+cmd="p11tool --provider $LIBSOFTHSM_PATH --write --load-privkey $PRIVKEY --label $OBJNAME --login --set-pin=1234 \"pkcs11:token=$OBJNAME\""
|
||||
eval echo "$cmd"
|
||||
-out=$(eval $cmd)
|
||||
+out=$(eval "$cmd")
|
||||
ret=$?
|
||||
if [ $ret -ne 0 ]; then
|
||||
echo "Loading privkey failed"
|
||||
@@ -52,15 +71,15 @@ if [ $ret -ne 0 ]; then
|
||||
exit 1
|
||||
fi
|
||||
|
||||
-cat $PUBKEY
|
||||
+cat "$PUBKEY"
|
||||
|
||||
-ls -l $TESTDIR
|
||||
+ls -l "$TESTDIR"
|
||||
|
||||
-if [ $LOADPUBLIC -ne 0 ]; then
|
||||
+if [ "$LOADPUBLIC" -ne 0 ]; then
|
||||
#load public key
|
||||
- cmd='p11tool --provider /usr/lib64/pkcs11/libsofthsm2.so --write --load-pubkey "$PUBKEY" --label "$OBJNAME" --login --set-pin=1234 "pkcs11:token="$OBJNAME""'
|
||||
+ cmd="p11tool --provider $LIBSOFTHSM_PATH --write --load-pubkey $PUBKEY --label $OBJNAME --login --set-pin=1234 \"pkcs11:token=$OBJNAME\""
|
||||
eval echo "$cmd"
|
||||
- out=$(eval $cmd)
|
||||
+ out=$(eval "$cmd")
|
||||
ret=$?
|
||||
if [ $ret -ne 0 ]; then
|
||||
echo "Loading pubkey failed"
|
||||
@@ -69,9 +88,9 @@ if [ $LOADPUBLIC -ne 0 ]; then
|
||||
fi
|
||||
fi
|
||||
|
||||
-cmd='p11tool --list-all --login "pkcs11:token="$OBJNAME"" --set-pin=1234'
|
||||
+cmd="p11tool --list-all --login \"pkcs11:token=$OBJNAME\" --set-pin=1234"
|
||||
eval echo "$cmd"
|
||||
-out=$(eval $cmd)
|
||||
+out=$(eval "$cmd")
|
||||
ret=$?
|
||||
if [ $ret -ne 0 ]; then
|
||||
echo "Loging failed"
|
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,21 @@
|
||||
diff --color -ru ../libssh-0.10.4/tests/client/torture_rekey.c ./tests/client/torture_rekey.c
|
||||
--- ../libssh-0.10.4/tests/client/torture_rekey.c 2023-05-17 10:55:23.384684129 +0200
|
||||
+++ ./tests/client/torture_rekey.c 2023-05-17 10:56:29.819334665 +0200
|
||||
@@ -504,7 +504,7 @@
|
||||
memset(data, 'A', 128);
|
||||
for (i = 0; i < KEX_RETRY; i++) {
|
||||
ssh_send_ignore(s->ssh.session, data);
|
||||
- ssh_handle_packets(s->ssh.session, 100);
|
||||
+ ssh_handle_packets(s->ssh.session, 1000);
|
||||
|
||||
c = s->ssh.session->current_crypto;
|
||||
/* SHA256 len */
|
||||
@@ -582,7 +582,7 @@
|
||||
memset(data, 'A', 128);
|
||||
for (i = 0; i < KEX_RETRY; i++) {
|
||||
ssh_send_ignore(s->ssh.session, data);
|
||||
- ssh_handle_packets(s->ssh.session, 100);
|
||||
+ ssh_handle_packets(s->ssh.session, 1000);
|
||||
|
||||
c = s->ssh.session->current_crypto;
|
||||
/* SHA256 len */
|
Loading…
Reference in new issue