diff options
author | Colin Watson <cjwatson@debian.org> | 2019-06-05 06:41:44 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2019-06-05 06:41:44 +0100 |
commit | 102062f825fb26a74295a1c089c00c4c4c76b68a (patch) | |
tree | 3db66bc8c8483cce66516dff36f6ef56065143d9 /regress/misc | |
parent | 3d246f10429fc9a37b98eabef94fe8dc7c61002b (diff) | |
parent | fd0fa130ecf06d7d092932adcd5d77f1549bfc8d (diff) |
Import openssh_8.0p1.orig.tar.gz
Diffstat (limited to 'regress/misc')
-rw-r--r-- | regress/misc/kexfuzz/Makefile | 21 | ||||
-rw-r--r-- | regress/misc/kexfuzz/kexfuzz.c | 18 |
2 files changed, 23 insertions, 16 deletions
diff --git a/regress/misc/kexfuzz/Makefile b/regress/misc/kexfuzz/Makefile index a7bb6b70d..20802cb87 100644 --- a/regress/misc/kexfuzz/Makefile +++ b/regress/misc/kexfuzz/Makefile | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: Makefile,v 1.3 2017/12/21 05:46:35 djm Exp $ | 1 | # $OpenBSD: Makefile,v 1.4 2019/01/21 12:50:12 djm Exp $ |
2 | 2 | ||
3 | .include <bsd.own.mk> | 3 | .include <bsd.own.mk> |
4 | .include <bsd.obj.mk> | 4 | .include <bsd.obj.mk> |
@@ -18,12 +18,21 @@ SRCS+=atomicio.c sshkey.c authfile.c cipher.c log.c ssh-rsa.c ssh-dss.c | |||
18 | SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c | 18 | SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c |
19 | SRCS+=ssherr.c uidswap.c cleanup.c xmalloc.c match.c krl.c fatal.c | 19 | SRCS+=ssherr.c uidswap.c cleanup.c xmalloc.c match.c krl.c fatal.c |
20 | SRCS+=addrmatch.c bitmap.c packet.c dispatch.c canohost.c ssh_api.c | 20 | SRCS+=addrmatch.c bitmap.c packet.c dispatch.c canohost.c ssh_api.c |
21 | SRCS+=kex.c kexc25519.c kexc25519c.c kexc25519s.c kexdh.c kexdhc.c kexdhs.c | 21 | SRCS+=compat.c ed25519.c hash.c ge25519.c fe25519.c sc25519.c verify.c |
22 | SRCS+=kexecdh.c kexecdhc.c kexecdhs.c kexgex.c kexgexc.c kexgexs.c | ||
23 | SRCS+=dh.c compat.c | ||
24 | SRCS+=ed25519.c hash.c ge25519.c fe25519.c sc25519.c verify.c | ||
25 | SRCS+=cipher-chachapoly.c chacha.c poly1305.c | 22 | SRCS+=cipher-chachapoly.c chacha.c poly1305.c |
26 | SRCS+=smult_curve25519_ref.c | 23 | |
24 | SRCS+= kex.c | ||
25 | SRCS+= dh.c | ||
26 | SRCS+= kexdh.c | ||
27 | SRCS+= kexecdh.c | ||
28 | SRCS+= kexgex.c | ||
29 | SRCS+= kexgexc.c | ||
30 | SRCS+= kexgexs.c | ||
31 | SRCS+= kexc25519.c | ||
32 | SRCS+= smult_curve25519_ref.c | ||
33 | SRCS+= kexgen.c | ||
34 | SRCS+= kexsntrup4591761x25519.c | ||
35 | SRCS+= sntrup4591761.c | ||
27 | 36 | ||
28 | SRCS+=digest-openssl.c | 37 | SRCS+=digest-openssl.c |
29 | #SRCS+=digest-libc.c | 38 | #SRCS+=digest-libc.c |
diff --git a/regress/misc/kexfuzz/kexfuzz.c b/regress/misc/kexfuzz/kexfuzz.c index 3e2c48160..7051e87b1 100644 --- a/regress/misc/kexfuzz/kexfuzz.c +++ b/regress/misc/kexfuzz/kexfuzz.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: kexfuzz.c,v 1.4 2017/04/30 23:34:55 djm Exp $ */ | 1 | /* $OpenBSD: kexfuzz.c,v 1.5 2019/01/21 12:50:12 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Fuzz harness for KEX code | 3 | * Fuzz harness for KEX code |
4 | * | 4 | * |
@@ -29,8 +29,6 @@ | |||
29 | #include "authfile.h" | 29 | #include "authfile.h" |
30 | #include "log.h" | 30 | #include "log.h" |
31 | 31 | ||
32 | struct ssh *active_state = NULL; /* XXX - needed for linking */ | ||
33 | |||
34 | void kex_tests(void); | 32 | void kex_tests(void); |
35 | static int do_debug = 0; | 33 | static int do_debug = 0; |
36 | 34 | ||
@@ -275,18 +273,18 @@ do_kex_with_key(const char *kex, struct sshkey *prvkey, int *c2s, int *s2c, | |||
275 | ASSERT_PTR_NE(server2->kex, NULL); | 273 | ASSERT_PTR_NE(server2->kex, NULL); |
276 | /* XXX we need to set the callbacks */ | 274 | /* XXX we need to set the callbacks */ |
277 | #ifdef WITH_OPENSSL | 275 | #ifdef WITH_OPENSSL |
278 | server2->kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; | 276 | server2->kex->kex[KEX_DH_GRP1_SHA1] = kex_gen_server; |
279 | server2->kex->kex[KEX_DH_GRP14_SHA1] = kexdh_server; | 277 | server2->kex->kex[KEX_DH_GRP14_SHA1] = kex_gen_server; |
280 | server2->kex->kex[KEX_DH_GRP14_SHA256] = kexdh_server; | 278 | server2->kex->kex[KEX_DH_GRP14_SHA256] = kex_gen_server; |
281 | server2->kex->kex[KEX_DH_GRP16_SHA512] = kexdh_server; | 279 | server2->kex->kex[KEX_DH_GRP16_SHA512] = kex_gen_server; |
282 | server2->kex->kex[KEX_DH_GRP18_SHA512] = kexdh_server; | 280 | server2->kex->kex[KEX_DH_GRP18_SHA512] = kex_gen_server; |
283 | server2->kex->kex[KEX_DH_GEX_SHA1] = kexgex_server; | 281 | server2->kex->kex[KEX_DH_GEX_SHA1] = kexgex_server; |
284 | server2->kex->kex[KEX_DH_GEX_SHA256] = kexgex_server; | 282 | server2->kex->kex[KEX_DH_GEX_SHA256] = kexgex_server; |
285 | # ifdef OPENSSL_HAS_ECC | 283 | # ifdef OPENSSL_HAS_ECC |
286 | server2->kex->kex[KEX_ECDH_SHA2] = kexecdh_server; | 284 | server2->kex->kex[KEX_ECDH_SHA2] = kex_gen_server; |
287 | # endif | 285 | # endif |
288 | #endif | 286 | #endif |
289 | server2->kex->kex[KEX_C25519_SHA256] = kexc25519_server; | 287 | server2->kex->kex[KEX_C25519_SHA256] = kex_gen_server; |
290 | server2->kex->load_host_public_key = server->kex->load_host_public_key; | 288 | server2->kex->load_host_public_key = server->kex->load_host_public_key; |
291 | server2->kex->load_host_private_key = server->kex->load_host_private_key; | 289 | server2->kex->load_host_private_key = server->kex->load_host_private_key; |
292 | server2->kex->sign = server->kex->sign; | 290 | server2->kex->sign = server->kex->sign; |