aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJakub Jelen <jjelen@redhat.com>2020-04-15 07:52:24 +0200
committerAnderson Toshiyuki Sasaki <ansasaki@redhat.com>2020-08-13 17:35:09 +0200
commit6672a457fb61b412b642a3130789da2026cdd84e (patch)
tree2ee28fd747d1b558f3d2f8f60fb849847e4d1032
parent737ba4a6804b99c174360195ea3967d8531ebf6b (diff)
downloadlibssh-6672a457fb61b412b642a3130789da2026cdd84e.tar.gz
libssh-6672a457fb61b412b642a3130789da2026cdd84e.tar.xz
libssh-6672a457fb61b412b642a3130789da2026cdd84e.zip
tests: Enable RSA SHA1 certs for testing against older OpenSSH
The OpenSSH 7.4 or 7.6 in Ubuntu and CentOS 7 does not support SHA2 RSA certificates and libssh automatically falls back to SHA1, which is not allowed by default. Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> (cherry picked from commit db948bdac87ec9ad190cadbd9444902e5fbe691a)
-rw-r--r--tests/client/torture_auth.c6
1 files changed, 6 insertions, 0 deletions
diff --git a/tests/client/torture_auth.c b/tests/client/torture_auth.c
index 5a3d2e0d..4b97f5da 100644
--- a/tests/client/torture_auth.c
+++ b/tests/client/torture_auth.c
@@ -52,6 +52,7 @@ static int session_setup(void **state)
{
struct torture_state *s = *state;
int verbosity = torture_libssh_verbosity();
+ const char *all_keytypes = NULL;
struct passwd *pwd;
bool b = false;
int rc;
@@ -71,6 +72,11 @@ static int session_setup(void **state)
rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_PROCESS_CONFIG, &b);
assert_ssh_return_code(s->ssh.session, rc);
+ /* Enable all hostkeys */
+ all_keytypes = ssh_kex_get_supported_method(SSH_HOSTKEYS);
+ rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_PUBLICKEY_ACCEPTED_TYPES, all_keytypes);
+ assert_ssh_return_code(s->ssh.session, rc);
+
return 0;
}