mirror of
https://github.com/keepassxreboot/keepassxc.git
synced 2025-04-04 21:17:43 +03:00
SSH Agent: Integration tests against ssh-agent
Windows testing is currently explicitly disabled due to too many different scenarios to run an agent and MSYS2 having its own.
This commit is contained in:
parent
2359742de1
commit
dce9af219f
6 changed files with 361 additions and 32 deletions
|
@ -212,36 +212,6 @@ bool SSHAgent::sendMessagePageant(const QByteArray& in, QByteArray& out)
|
|||
}
|
||||
#endif
|
||||
|
||||
/**
|
||||
* Test if connection to SSH agent is working.
|
||||
*
|
||||
* @return true on success
|
||||
*/
|
||||
bool SSHAgent::testConnection()
|
||||
{
|
||||
if (!isAgentRunning()) {
|
||||
m_error = tr("No agent running, cannot test connection.");
|
||||
return false;
|
||||
}
|
||||
|
||||
QByteArray requestData;
|
||||
BinaryStream request(&requestData);
|
||||
|
||||
request.write(SSH_AGENTC_REQUEST_IDENTITIES);
|
||||
|
||||
QByteArray responseData;
|
||||
if (!sendMessage(requestData, responseData)) {
|
||||
return false;
|
||||
}
|
||||
|
||||
if (responseData.length() < 1 || static_cast<quint8>(responseData[0]) != SSH_AGENT_IDENTITIES_ANSWER) {
|
||||
m_error = tr("Agent protocol error.");
|
||||
return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Add the identity to the SSH agent.
|
||||
*
|
||||
|
@ -328,6 +298,99 @@ bool SSHAgent::removeIdentity(OpenSSHKey& key)
|
|||
return sendMessage(requestData, responseData);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get a list of identities from the SSH agent.
|
||||
*
|
||||
* @param list list of keys to append
|
||||
* @return true on success
|
||||
*/
|
||||
bool SSHAgent::listIdentities(QList<QSharedPointer<OpenSSHKey>>& list)
|
||||
{
|
||||
if (!isAgentRunning()) {
|
||||
m_error = tr("No agent running, cannot list identities.");
|
||||
return false;
|
||||
}
|
||||
|
||||
QByteArray requestData;
|
||||
BinaryStream request(&requestData);
|
||||
|
||||
request.write(SSH_AGENTC_REQUEST_IDENTITIES);
|
||||
|
||||
QByteArray responseData;
|
||||
if (!sendMessage(requestData, responseData)) {
|
||||
return false;
|
||||
}
|
||||
|
||||
BinaryStream response(&responseData);
|
||||
|
||||
quint8 responseType;
|
||||
if (!response.read(responseType) || responseType != SSH_AGENT_IDENTITIES_ANSWER) {
|
||||
m_error = tr("Agent protocol error.");
|
||||
return false;
|
||||
}
|
||||
|
||||
quint32 nKeys;
|
||||
if (!response.read(nKeys)) {
|
||||
m_error = tr("Agent protocol error.");
|
||||
return false;
|
||||
}
|
||||
|
||||
for (quint32 i = 0; i < nKeys; i++) {
|
||||
QByteArray publicData;
|
||||
QString comment;
|
||||
|
||||
if (!response.readString(publicData)) {
|
||||
m_error = tr("Agent protocol error.");
|
||||
return false;
|
||||
}
|
||||
|
||||
if (!response.readString(comment)) {
|
||||
m_error = tr("Agent protocol error.");
|
||||
return false;
|
||||
}
|
||||
|
||||
OpenSSHKey* key = new OpenSSHKey();
|
||||
key->setComment(comment);
|
||||
|
||||
list.append(QSharedPointer<OpenSSHKey>(key));
|
||||
|
||||
BinaryStream publicDataStream(&publicData);
|
||||
if (!key->readPublic(publicDataStream)) {
|
||||
m_error = key->errorString();
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if this identity is loaded in the SSH Agent.
|
||||
*
|
||||
* @param key identity to remove
|
||||
* @param loaded is the key laoded
|
||||
* @return true on success
|
||||
*/
|
||||
bool SSHAgent::checkIdentity(OpenSSHKey& key, bool& loaded)
|
||||
{
|
||||
QList<QSharedPointer<OpenSSHKey>> list;
|
||||
|
||||
if (!listIdentities(list)) {
|
||||
return false;
|
||||
}
|
||||
|
||||
loaded = false;
|
||||
|
||||
for (const auto it : list) {
|
||||
if (*it == key) {
|
||||
loaded = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Remove all identities known to this instance
|
||||
*/
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue