LEFT | RIGHT |
(no file at all) | |
1 // Copyright 2012 The Go Authors. All rights reserved. | 1 // Copyright 2012 The Go Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style | 2 // Use of this source code is governed by a BSD-style |
3 // license that can be found in the LICENSE file. | 3 // license that can be found in the LICENSE file. |
4 | 4 |
5 // +build darwin freebsd linux netbsd openbsd | 5 // +build darwin freebsd linux netbsd openbsd |
6 | 6 |
7 package test | 7 package test |
8 | 8 |
9 // functional test harness for unix. | 9 // functional test harness for unix. |
10 | 10 |
(...skipping 12 matching lines...) Expand all Loading... |
23 "os/exec" | 23 "os/exec" |
24 "os/user" | 24 "os/user" |
25 "path/filepath" | 25 "path/filepath" |
26 "testing" | 26 "testing" |
27 "text/template" | 27 "text/template" |
28 "time" | 28 "time" |
29 | 29 |
30 "code.google.com/p/go.crypto/ssh" | 30 "code.google.com/p/go.crypto/ssh" |
31 ) | 31 ) |
32 | 32 |
33 const ( | 33 const sshd_config = ` |
34 » sshd_config = ` | |
35 Protocol 2 | 34 Protocol 2 |
36 HostKey {{.Dir}}/ssh_host_rsa_key | 35 HostKey {{.Dir}}/ssh_host_rsa_key |
37 HostKey {{.Dir}}/ssh_host_dsa_key | 36 HostKey {{.Dir}}/ssh_host_dsa_key |
38 HostKey {{.Dir}}/ssh_host_ecdsa_key | 37 HostKey {{.Dir}}/ssh_host_ecdsa_key |
39 Pidfile {{.Dir}}/sshd.pid | 38 Pidfile {{.Dir}}/sshd.pid |
40 #UsePrivilegeSeparation no | 39 #UsePrivilegeSeparation no |
41 KeyRegenerationInterval 3600 | 40 KeyRegenerationInterval 3600 |
42 ServerKeyBits 768 | 41 ServerKeyBits 768 |
43 SyslogFacility AUTH | 42 SyslogFacility AUTH |
44 LogLevel DEBUG2 | 43 LogLevel DEBUG2 |
45 LoginGraceTime 120 | 44 LoginGraceTime 120 |
46 PermitRootLogin no | 45 PermitRootLogin no |
47 StrictModes no | 46 StrictModes no |
48 RSAAuthentication yes | 47 RSAAuthentication yes |
49 PubkeyAuthentication yes | 48 PubkeyAuthentication yes |
50 AuthorizedKeysFile {{.Dir}}/authorized_keys | 49 AuthorizedKeysFile {{.Dir}}/authorized_keys |
51 IgnoreRhosts yes | 50 IgnoreRhosts yes |
52 RhostsRSAAuthentication no | 51 RhostsRSAAuthentication no |
53 HostbasedAuthentication no | 52 HostbasedAuthentication no |
54 ` | 53 ` |
55 testClientPrivateKey = `-----BEGIN RSA PRIVATE KEY----- | |
56 MIIEowIBAAKCAQEAxF/3T7uD5rb4Cty2vc4qAhA6yclK+sRCCuz6/qy4MnXKlk1P | |
57 5Le8O4CozsOL784B34ypdPQlsr4G/suXQok5PTMSPnqxjYbN6cGqEvhGrwG2sAe4 | |
58 hKmMk3qd2GiSvuESeDl+2ZVzACDK0y/lFayvPbeeoQpBWGgIKN1WPs+q2/292wwW | |
59 LRNWNrUuwt2ru92g4Hm/abCK0lfOrnCgU5eV+thZ2IshnfvsQpyweri8YpjOTil3 | |
60 y8yUDUv0MmcpNdoNw/MuvV8NRswkil9btfjEG6Mn9ByXBtq8lAix3XA1aaQKch8d | |
61 ji6ud4ZZEP8sXX5Q6gqgBOI/naGoErCHwtU9kwIDAQABAoIBAFJRKAp0QEZmTHPB | |
62 MZk+4r0asIoFpziXLFgIHu7C2DPOzK1Umzj1DCKlPB3wOqi7Ym2jOSWdcnAK2EPW | |
63 dAGgJC5TSkKGjAcXixmB5RkumfKidUI0+lQh/puTurcMnvcEwglDkLkEvMBA/sSo | |
64 Pw9m486rOgOnmNzGPyViItURmD2+0yDdLl/vOsO/L1p76GCd0q0J3LqnmsQmawi7 | |
65 Zwj2Stm6BIrggG5GsF204Iet5219TYLo4g1Qb2AlJ9C8P1FtAWhMwJalDxH9Os2/ | |
66 KCDjnaq5n3bXbIU+3QjskjeVXL/Fnbhjnh4zs1EA7eHzl9dCGbcZ2LOimo2PRo8q | |
67 wVQmz4ECgYEA9dhiu74TxRVoaO5N2X+FsMzRO8gZdP3Z9IrV4jVN8WT4Vdp0snoF | |
68 gkVkqqbQUNKUb5K6B3Js/qNKfcjLbCNq9fewTcT6WsHQdtPbX/QA6Pa2Z29wrlA2 | |
69 wrIYaAkmVaHny7wsOmgX01aOnuf2MlUnksK43sjZHdIo/m+sDKwwY1cCgYEAzHx4 | |
70 mwUDMdRF4qpDKJhthraBNejRextNQQYsHVnNaMwZ4aeQcH5l85Cgjm7VpGlbVyBQ | |
71 h4zwFvllImp3D2U3mjVkV8Tm9ID98eWvw2YDzBnS3P3SysajD23Z+BXSG9GNv/8k | |
72 oAm+bVlvnJy4haK2AcIMk1YFuDuAOmy73abk7iUCgYEAj4qVM1sq/eKfAM1LJRfg | |
73 /jbIX+hYfMePD8pUUWygIra6jJ4tjtvSBZrwyPb3IImjY3W/KoP0AcVjxAeORohz | |
74 dkP1a6L8LiuFxSuzpdW5BkyuebxGhXCOWKVVvMDC4jLTPVCUXlHSv3GFemCjjgXM | |
75 QlNxT5rjsha4Gr8nLIsJAacCgYA4VA1Q/pd7sXKy1p37X8nD8yAyvnh+Be5I/C9I | |
76 woUP2jFC9MqYAmmJJ4ziz2swiAkuPeuQ+2Tjnz2ZtmQnrIUdiJmkh8vrDGFnshKx | |
77 q7deELsCPzVCwGcIiAUkDra7DQWUHu9y2lxHePyC0rUNst2aLF8UcvzOXC2danhx | |
78 vViQtQKBgCmZ7YavE/GNWww8N3xHBJ6UPmUuhQlnAbgNCcdyz30MevBg/JbyUTs2 | |
79 slftTH15QusJ1UoITnnZuFJ40LqDvh8UhiK09ffM/IbUx839/m2vUOdFZB/WNn9g | |
80 Cy0LzddU4KE8JZ/tlk68+hM5fjLLA0aqSunaql5CKfplwLu8x1hL | |
81 -----END RSA PRIVATE KEY----- | |
82 ` | |
83 ) | |
84 | |
85 var keys = map[string]string{ | |
86 "ssh_host_dsa_key": `-----BEGIN DSA PRIVATE KEY----- | |
87 MIIBugIBAAKBgQDe2SIKvZdBp+InawtSXH0NotiMPhm3udyu4hh/E+icMz264kDX | |
88 v+sV7ddnSQGQWZ/eVU7Jtx29dCMD1VlFpEd7yGKzmdwJIeA+YquNWoqBRQEJsWWS | |
89 7Fsfvv83dA/DTNIQfOY3+TIs6Mb9vagbgQMU3JUWEhbLE9LCEU6UwwRlpQIVAL4p | |
90 JF83SwpE8Jx6KnDpR89npkl/AoGAAy00TdDnAXvStwrZiAFbjZi8xDmPa9WwpfhJ | |
91 Rkno45TthDLrS+WmqY8/LTwlqZdOBtoBAynMJfKkUiZM21lWWpL1hRKYdwBlIBy5 | |
92 XdR2/6wcPSuZ0tCQhDBTstX0Q3P1j198KGKvzy7q9vILKQwtSRqLS1y4JJERafdO | |
93 E+9CnGwCgYBz0WwBe2EZtGhGhBdnelTIBeo7PIsr0PzqxQj+dc8PBl8K9FfhRyOp | |
94 U39stUvoUxE9vaIFrY1P5xENjLFnPf+hlcuf40GUWEssW9YWPOaBp8afa9hY5Sxs | |
95 pvNR6eZFEFOJnx/ZgcA4g+vbrgGi5cM0W470mbGw2CkfJQUafdoIgAIUF+2I9kZe | |
96 2FTBuC9uacqczDlc+0k= | |
97 -----END DSA PRIVATE KEY-----`, | |
98 "ssh_host_rsa_key": `-----BEGIN RSA PRIVATE KEY----- | |
99 MIIEowIBAAKCAQEAuf76Ue2Wtae9oDtaS6rIJgO7iCFTsZUTW9LBsvx/2nli6jKU | |
100 d9tUbBRzgdbnRLJ32UljXhERuB/axlrX8/lBzUZ+oYiM0KkEEOXY1z/bcMxdRxGF | |
101 XHuf4uXvyC2XyA4+ZvBeS4j1QFyIHZ62o7gAlKMTjiek3B4AQEJAlCLmhH3jB8wc | |
102 K/IYXAOlNGM5G44/ZLQpTi8diOV6DLs7tJ7rtEQedOEJfZng5rwp0USFkqcbfDbe | |
103 9/hk0J32jZvOtZNBokYtBb4YEdIiWBzzNtHzU3Dzw61+TKVXaH5HaIvzL9iMrw9f | |
104 kJbJyogfZk9BJfemEN+xqP72jlhE8LXNhpTxFQIDAQABAoIBAHbdf+Y5+5XuNF6h | |
105 b8xpwW2h9whBnDYiOnP1VfroKWFbMB7R4lZS4joMO+FfkP8zOyqvHwTvza4pFWys | |
106 g9SUmDvy8FyVYsC7MzEFYzX0xm3o/Te898ip7P1Zy4rXsGeWysSImwqU5X+TYx3i | |
107 33/zyNM1APtZVJ+jwK9QZ+sD/uPuZK2yS03HGSMZq6ebdoOSaYhluKrxXllSLO1J | |
108 KJxDiDdy2lEFw0W8HcI3ly1lg6OI+TRqqaCcLVNF4fNJmYIFM+2VEI9BdgynIh0Q | |
109 pMZlJKgaEBcSqCymnTK81ohYD1cV4st2B0km3Sw35Rl04Ij5ITeiya3hp8VfE6UY | |
110 PljkA6UCgYEA4811FTFj+kzNZ86C4OW1T5sM4NZt8gcz6CSvVnl+bDzbEOMMyzP7 | |
111 2I9zKsR5ApdodH2m8d+RUw1Oe0bNGW5xig/DH/hn9lLQaO52JAi0we8A94dUUMSq | |
112 fUk9jKZEXpP/MlfTdJaPos9mxT7z8jREQxIiqH9AV0rLVDOCfDbSWj8CgYEA0QTE | |
113 IAUuki3UUqYKzLQrh/QmhY5KTx5amNW9XZ2VGtJvDPJrtBSBZlPEuXZAc4eBWEc7 | |
114 U3Y9QwsalzupU6Yi6+gmofaXs8xJnj+jKth1DnJvrbLLGlSmf2Ijnwt22TyFUOtt | |
115 UAknpjHutDjQPf7pUGWaCPgwwKFsdB8EBjpJF6sCgYAfXesBQAvEK08dPBJJZVfR | |
116 3kenrd71tIgxLtv1zETcIoUHjjv0vvOunhH9kZAYC0EWyTZzl5UrGmn0D4uuNMbt | |
117 e74iaNHn2P9Zc3xQ+eHp0j8P1lKFzI6tMaiH9Vz0qOw6wl0bcJ/WizhbcI+migvc | |
118 MGMVUHBLlMDqly0gbWwJgQKBgQCgtb9ut01FjANSwORQ3L8Tu3/a9Lrh9n7GQKFn | |
119 V4CLrP1BwStavOF5ojMCPo/zxF6JV8ufsqwL3n/FhFP/QyBarpb1tTqTPiHkkR2O | |
120 Ffx67TY9IdnUFv4lt3mYEiKBiW0f+MSF42Qe/wmAfKZw5IzUCirTdrFVi0huSGK5 | |
121 vxrwHQKBgHZ7RoC3I2f6F5fflA2ZAe9oJYC7XT624rY7VeOBwK0W0F47iV3euPi/ | |
122 pKvLIBLcWL1Lboo+girnmSZtIYg2iLS3b4T9VFcKWg0y4AVwmhMWe9jWIltfWAAX | |
123 9l0lNikMRGAx3eXudKXEtbGt3/cUzPVaQUHy5LiBxkxnFxgaJPXs | |
124 -----END RSA PRIVATE KEY-----`, | |
125 "ssh_host_ecdsa_key": `-----BEGIN EC PRIVATE KEY----- | |
126 MHcCAQEEINGWx0zo6fhJ/0EAfrPzVFyFC9s18lBt3cRoEDhS3ARooAoGCCqGSM49 | |
127 AwEHoUQDQgAEi9Hdw6KvZcWxfg2IDhA7UkpDtzzt6ZqJXSsFdLd+Kx4S3Sx4cVO+ | |
128 6/ZOXRnPmNAlLUqjShUsUBBngG0u2fqEqA== | |
129 -----END EC PRIVATE KEY-----`, | |
130 "authorized_keys": `ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEX/dPu4PmtvgK
3La9zioCEDrJyUr6xEIK7Pr+rLgydcqWTU/kt7w7gKjOw4vvzgHfjKl09CWyvgb+y5dCiTk9MxI+erGN
hs3pwaoS+EavAbawB7iEqYyTep3YaJK+4RJ4OX7ZlXMAIMrTL+UVrK89t56hCkFYaAgo3VY+z6rb/b3b
DBYtE1Y2tS7C3au73aDgeb9psIrSV86ucKBTl5X62FnYiyGd++xCnLB6uLximM5OKXfLzJQNS/QyZyk1
2g3D8y69Xw1GzCSKX1u1+MQboyf0HJcG2ryUCLHdcDVppApyHx2OLq53hlkQ/yxdflDqCqAE4j+doagS
sIfC1T2T user@host`, | |
131 } | |
132 | 54 |
133 var ( | 55 var ( |
134 configTmpl template.Template | 56 configTmpl template.Template |
135 sshd string // path to sshd | 57 sshd string // path to sshd |
136 rsakey *rsa.PrivateKey | 58 rsakey *rsa.PrivateKey |
137 ) | 59 ) |
138 | 60 |
139 func init() { | 61 func init() { |
140 template.Must(configTmpl.Parse(sshd_config)) | 62 template.Must(configTmpl.Parse(sshd_config)) |
141 block, _ := pem.Decode([]byte(testClientPrivateKey)) | 63 block, _ := pem.Decode([]byte(testClientPrivateKey)) |
(...skipping 166 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
308 if block == nil { | 230 if block == nil { |
309 return errors.New("ssh: no key found") | 231 return errors.New("ssh: no key found") |
310 } | 232 } |
311 r, err := x509.ParsePKCS1PrivateKey(block.Bytes) | 233 r, err := x509.ParsePKCS1PrivateKey(block.Bytes) |
312 if err != nil { | 234 if err != nil { |
313 return err | 235 return err |
314 } | 236 } |
315 k.keys = append(k.keys, r) | 237 k.keys = append(k.keys, r) |
316 return nil | 238 return nil |
317 } | 239 } |
LEFT | RIGHT |