diff options
author | Jakub Jelen <jjelen@redhat.com> | 2020-04-15 07:52:24 +0200 |
---|---|---|
committer | Anderson Toshiyuki Sasaki <ansasaki@redhat.com> | 2020-08-13 17:35:09 +0200 |
commit | 6672a457fb61b412b642a3130789da2026cdd84e (patch) | |
tree | 2ee28fd747d1b558f3d2f8f60fb849847e4d1032 | |
parent | 737ba4a6804b99c174360195ea3967d8531ebf6b (diff) | |
download | libssh-6672a457fb61b412b642a3130789da2026cdd84e.tar.gz libssh-6672a457fb61b412b642a3130789da2026cdd84e.tar.xz libssh-6672a457fb61b412b642a3130789da2026cdd84e.zip |
tests: Enable RSA SHA1 certs for testing against older OpenSSH
The OpenSSH 7.4 or 7.6 in Ubuntu and CentOS 7 does not support SHA2
RSA certificates and libssh automatically falls back to SHA1, which
is not allowed by default.
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
(cherry picked from commit db948bdac87ec9ad190cadbd9444902e5fbe691a)
-rw-r--r-- | tests/client/torture_auth.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/tests/client/torture_auth.c b/tests/client/torture_auth.c index 5a3d2e0d..4b97f5da 100644 --- a/tests/client/torture_auth.c +++ b/tests/client/torture_auth.c @@ -52,6 +52,7 @@ static int session_setup(void **state) { struct torture_state *s = *state; int verbosity = torture_libssh_verbosity(); + const char *all_keytypes = NULL; struct passwd *pwd; bool b = false; int rc; @@ -71,6 +72,11 @@ static int session_setup(void **state) rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_PROCESS_CONFIG, &b); assert_ssh_return_code(s->ssh.session, rc); + /* Enable all hostkeys */ + all_keytypes = ssh_kex_get_supported_method(SSH_HOSTKEYS); + rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_PUBLICKEY_ACCEPTED_TYPES, all_keytypes); + assert_ssh_return_code(s->ssh.session, rc); + return 0; } |