Jakub Jelen
3d3b12891f
tests: Avoid prefix matching when selecting algorithmms
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Sahana Prasad <sahana@redhat.com >
2025-09-10 13:05:50 +02:00
Jakub Jelen
d357a9f3e2
tests: Invoke all combinations of wrong guesses during rekey
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2025-08-14 10:32:13 +02:00
Jakub Jelen
a8b9d13687
CVE-2023-48795: tests: Adjust calculation to strict kex
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2023-12-18 17:35:04 +01:00
Jakub Jelen
96d7616166
tests: Give the server more time handle rekey
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Norbert Pocs <npocs@redhat.com >
2023-05-19 11:38:23 +02:00
Jakub Jelen
4e8db9d44b
CVE-2023-1667:tests: Send a bit more to make sure rekey is completed
...
This was for some reason failing on CentOS 7 in 0.10 branch so bringing this to
the master too.
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Norbert Pocs <npocs@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2023-05-04 11:51:17 +02:00
Jakub Jelen
8bb17c46a8
CVE-2023-1667:tests: Client coverage for key exchange with kex guessing
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Norbert Pocs <npocs@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2023-05-04 11:51:17 +02:00
Jakub Jelen
c52f40bcb2
tests: Reproducer for delayed compression rekey
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Norbert Pocs <npocs@redhat.com >
2023-01-09 22:40:10 +01:00
Jakub Jelen
97c9ac2f58
Fix various spelling issues reported by codespell
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
2022-10-12 13:50:38 +02:00
Andreas Schneider
b3b3fbfa1d
tests: Fix rekey test so it passes on build systems
...
The test failed on Fedora Koji and openSUSE Build Service on i686 only. Probably
the rekey on the server needs longer here to collect enough entropy. So we need
to try harder before we stop :-)
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
2022-09-02 09:55:22 +02:00
Jakub Jelen
f8817c0c35
tests: Simple reproducer for rekeying with different kex
...
We do not use SHA1 as it is disabled in many systems
Verifies CVE-2021-3634
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2021-08-18 14:13:56 +02:00
Anderson Toshiyuki Sasaki
c5fa08a2a4
tests: Close SFTP file opened during rekey tests
...
The SFTP files wouldn't be closed during the rekey tests leading to
memory leak.
Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
2020-02-24 19:30:35 +01:00
Jakub Jelen
2892b49a37
tests: Use the path to SSH executable consistently
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2019-12-23 14:31:32 +01:00
Aris Adamantiadis
23c529c888
tests: fix typos
...
Signed-off-by: Aris Adamantiadis <aris@0xbadc0de.be >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2019-12-23 14:31:32 +01:00
Anderson Toshiyuki Sasaki
fba384ac58
tests/torture_rekey: Replace long long with uint64_t
...
Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2019-06-14 15:22:45 +02:00
Anderson Toshiyuki Sasaki
dc4d4cc8d4
tests/torture_rekey: Do not mix integer types
...
In torture_rekey_time(), "long long" was used instead of uint32_t. This
makes the test to fail in some architectures where the sizes don't match.
Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2019-06-14 07:48:01 +02:00
Jakub Jelen
c7c3c16fc8
tests: There is no 8B block cipher in FIPS Mode
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2019-06-13 16:29:32 +02:00
Jakub Jelen
c7aba3a716
tests: Refactor the sftp initilization to avoid invalid memory access on sftp failures
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2019-01-11 15:06:56 +01:00
Jakub Jelen
40b63f7c39
tests: Verify rekeying initialized by the server works
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2019-01-09 13:15:44 +01:00
Jakub Jelen
347af845ab
tests: Verify that rekey limits are effective from the client side
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Daiki Ueno <dueno@redhat.com >
2019-01-09 10:31:49 +01:00