]> git.ipfire.org Git - thirdparty/openssh-portable.git/commitdiff
upstream: unbreak unittests for recent API / source file changes
authordjm@openbsd.org <djm@openbsd.org>
Sun, 26 Jan 2020 00:09:50 +0000 (00:09 +0000)
committerDarren Tucker <dtucker@dtucker.net>
Sun, 26 Jan 2020 03:19:43 +0000 (14:19 +1100)
OpenBSD-Regress-ID: 075a899a01bbf7781d38bf0b33d8366faaf6d3c0

regress/misc/kexfuzz/Makefile
regress/misc/kexfuzz/kexfuzz.c
regress/unittests/authopt/Makefile
regress/unittests/hostkeys/Makefile
regress/unittests/kex/Makefile
regress/unittests/sshbuf/Makefile
regress/unittests/sshkey/Makefile
regress/unittests/sshkey/common.c

index 9cac412dc775b880419e8cd728fcbb59b2abb75a..9eb86931cab152dc606bb1ee1c194071b9c7a241 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: Makefile,v 1.6 2019/12/15 18:58:33 djm Exp $
+#      $OpenBSD: Makefile,v 1.7 2020/01/26 00:09:50 djm Exp $
 
 .include <bsd.own.mk>
 .include <bsd.obj.mk>
@@ -20,7 +20,7 @@ SRCS+=ssherr.c uidswap.c cleanup.c xmalloc.c match.c krl.c fatal.c
 SRCS+=addrmatch.c bitmap.c packet.c dispatch.c canohost.c ssh_api.c
 SRCS+=compat.c ed25519.c hash.c ge25519.c fe25519.c sc25519.c verify.c
 SRCS+=cipher-chachapoly.c chacha.c poly1305.c
-SRCS+=ssh-ecdsa-sk.c ssh-ed25519-sk.c msg.c ssh-sk-client.c
+SRCS+=sshbuf-io.c ssh-ecdsa-sk.c ssh-ed25519-sk.c msg.c ssh-sk-client.c
 
 SRCS+= kex.c
 SRCS+= dh.c
index 7051e87b1accf00f4f2080dc008ec8de855d0809..56697c9189e5609d41d7623283d7028fa15c13d6 100644 (file)
@@ -1,4 +1,4 @@
-/*     $OpenBSD: kexfuzz.c,v 1.5 2019/01/21 12:50:12 djm Exp $ */
+/*     $OpenBSD: kexfuzz.c,v 1.6 2020/01/26 00:09:50 djm Exp $ */
 /*
  * Fuzz harness for KEX code
  *
@@ -424,12 +424,8 @@ main(int argc, char **argv)
                if (packet_index == -1 || direction == -1 || data_path == NULL)
                        badusage("Replace (-r) mode must specify direction "
                            "(-D) packet index (-i) and data path (-f)");
-               if ((fd = open(data_path, O_RDONLY)) == -1)
-                       err(1, "open %s", data_path);
-               replace_data = sshbuf_new();
-               if ((r = sshkey_load_file(fd, replace_data)) != 0)
+               if ((r = sshbuf_load_file(data_path, &replace_data)) != 0)
                        errx(1, "read %s: %s", data_path, ssh_err(r));
-               close(fd);
        }
 
        /* Dump mode */
index dfec2517404afdb2c3ffdef5bc4c9b521ca5867d..492092fc6854710af4c1c11bd77809dfd1bb43a6 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: Makefile,v 1.3 2019/11/25 10:32:35 djm Exp $
+#      $OpenBSD: Makefile,v 1.4 2020/01/26 00:09:50 djm Exp $
 
 PROG=test_authopt
 SRCS=tests.c
@@ -7,8 +7,8 @@ SRCS+=auth-options.c
 
 # From usr.bin/ssh
 SRCS+=sshbuf-getput-basic.c sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c
-SRCS+=atomicio.c sshkey.c authfile.c cipher.c log.c ssh-rsa.c ssh-dss.c
-SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
+SRCS+=sshbuf-io.c atomicio.c sshkey.c authfile.c cipher.c log.c ssh-rsa.c
+SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
 SRCS+=ssherr.c uidswap.c cleanup.c xmalloc.c match.c krl.c fatal.c
 SRCS+=addrmatch.c bitmap.c
 SRCS+=ed25519.c hash.c ge25519.c fe25519.c sc25519.c verify.c
index e3632c43d8c995c3886a57bba030f47561e6d3c4..c0a8931352de32b9a9c5477d655c283341c70838 100644 (file)
@@ -1,12 +1,12 @@
-#      $OpenBSD: Makefile,v 1.6 2019/11/25 10:32:35 djm Exp $
+#      $OpenBSD: Makefile,v 1.7 2020/01/26 00:09:50 djm Exp $
 
 PROG=test_hostkeys
 SRCS=tests.c test_iterate.c
 
 # From usr.bin/ssh
 SRCS+=sshbuf-getput-basic.c sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c
-SRCS+=atomicio.c sshkey.c authfile.c cipher.c log.c ssh-rsa.c ssh-dss.c
-SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
+SRCS+=sshbuf-io.c atomicio.c sshkey.c authfile.c cipher.c log.c ssh-rsa.c
+SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
 SRCS+=ssherr.c uidswap.c cleanup.c xmalloc.c match.c krl.c fatal.c
 SRCS+=addrmatch.c bitmap.c hostfile.c
 SRCS+=ed25519.c hash.c ge25519.c fe25519.c sc25519.c verify.c
index c897a7ef59b5810b0ce4ce3ea8a99032b5046e04..648006c7897d273868f02dc67373b2f3dda090a0 100644 (file)
@@ -1,12 +1,12 @@
-#      $OpenBSD: Makefile,v 1.8 2019/11/25 10:32:35 djm Exp $
+#      $OpenBSD: Makefile,v 1.9 2020/01/26 00:09:50 djm Exp $
 
 PROG=test_kex
 SRCS=tests.c test_kex.c
 
 # From usr.bin/ssh
 SRCS+=sshbuf-getput-basic.c sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c
-SRCS+=atomicio.c sshkey.c authfile.c cipher.c log.c ssh-rsa.c ssh-dss.c
-SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
+SRCS+=sshbuf-io.c atomicio.c sshkey.c authfile.c cipher.c log.c ssh-rsa.c
+SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
 SRCS+=ssherr.c uidswap.c cleanup.c xmalloc.c match.c krl.c fatal.c
 SRCS+=addrmatch.c bitmap.c packet.c dispatch.c canohost.c ssh_api.c
 SRCS+=compat.c ed25519.c hash.c ge25519.c fe25519.c sc25519.c verify.c
index 0e8e9fd1010e8d39ffccd62d2f573f114654767e..388cb5a788d474f95bd9eda3dd0d85b7a5536d55 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: Makefile,v 1.7 2018/10/17 23:28:05 djm Exp $
+#      $OpenBSD: Makefile,v 1.8 2020/01/26 00:09:50 djm Exp $
 
 .include <bsd.regress.mk>
 
@@ -14,7 +14,7 @@ SRCS+=test_sshbuf_fixed.c
 
 # From usr.bin/ssh
 SRCS+=sshbuf-getput-basic.c sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c
-SRCS+=atomicio.c
+SRCS+=sshbuf-io.c atomicio.c misc.c xmalloc.c log.c fatal.c ssherr.c cleanup.c
 
 run-regress-${PROG}: ${PROG}
        env ${TEST_ENV} ./${PROG} ${UNITTEST_ARGS}
index 607a6d3fd6d6fa9137b866b3b2f190ad081600b8..78b2cf0ce576634bd931f5275f8134e582336875 100644 (file)
@@ -1,12 +1,12 @@
-#      $OpenBSD: Makefile,v 1.8 2019/11/25 10:32:35 djm Exp $
+#      $OpenBSD: Makefile,v 1.9 2020/01/26 00:09:50 djm Exp $
 
 PROG=test_sshkey
 SRCS=tests.c test_sshkey.c test_file.c test_fuzz.c common.c
 
 # From usr.bin/ssh
 SRCS+=sshbuf-getput-basic.c sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c
-SRCS+=atomicio.c sshkey.c authfile.c cipher.c log.c ssh-rsa.c ssh-dss.c
-SRCS+=ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
+SRCS+=sshbuf-io.c atomicio.c sshkey.c authfile.c cipher.c log.c ssh-rsa.c
+SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
 SRCS+=ssherr.c uidswap.c cleanup.c xmalloc.c match.c krl.c fatal.c
 SRCS+=addrmatch.c bitmap.c
 SRCS+=ed25519.c hash.c ge25519.c fe25519.c sc25519.c verify.c
index e21638093520fbac018f880a866b2ec158089146..effea578c0947ef325cf9883b5cb93663e965d77 100644 (file)
@@ -1,4 +1,4 @@
-/*     $OpenBSD: common.c,v 1.3 2018/09/13 09:03:20 djm Exp $ */
+/*     $OpenBSD: common.c,v 1.4 2020/01/26 00:09:50 djm Exp $ */
 /*
  * Helpers for key API tests
  *
 struct sshbuf *
 load_file(const char *name)
 {
-       int fd;
-       struct sshbuf *ret;
+       struct sshbuf *ret = NULL;
 
-       ASSERT_PTR_NE(ret = sshbuf_new(), NULL);
-       ASSERT_INT_NE(fd = open(test_data_file(name), O_RDONLY), -1);
-       ASSERT_INT_EQ(sshkey_load_file(fd, ret), 0);
-       close(fd);
+       ASSERT_INT_EQ(sshbuf_load_file(test_data_file(name), &ret), 0);
+       ASSERT_PTR_NE(ret, NULL);
        return ret;
 }