diff options
author | Jakub Jelen <jjelen@redhat.com> | 2023-04-17 16:53:35 +0200 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2023-05-04 11:52:23 +0200 |
commit | dc1254d53e4fc6cbeb4797fc6ca1c9ed2c21f15c (patch) | |
tree | c785934bd8a490e1254a7690ffc8b5fefe3dda60 | |
parent | d08f1b2377fead6489aa1d6a102bf65895ecf858 (diff) | |
download | libssh-dc1254d53e4fc6cbeb4797fc6ca1c9ed2c21f15c.tar.gz libssh-dc1254d53e4fc6cbeb4797fc6ca1c9ed2c21f15c.tar.xz libssh-dc1254d53e4fc6cbeb4797fc6ca1c9ed2c21f15c.zip |
CVE-2023-1667:tests: Send a bit more to make sure rekey is completed
This was for some reason failing on CentOS 7 in 0.10 branch so bringing this to
the master too.
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Norbert Pocs <npocs@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r-- | tests/client/torture_rekey.c | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/tests/client/torture_rekey.c b/tests/client/torture_rekey.c index d9667267..ccd5ae2c 100644 --- a/tests/client/torture_rekey.c +++ b/tests/client/torture_rekey.c @@ -192,10 +192,11 @@ static void torture_rekey_send(void **state) rc = ssh_userauth_publickey_auto(s->ssh.session, NULL, NULL); assert_int_equal(rc, SSH_AUTH_SUCCESS); - /* send ignore packets of up to 1KB to trigger rekey */ + /* send ignore packets of up to 1KB to trigger rekey. Send little bit more + * to make sure it completes with all different ciphers */ memset(data, 0, sizeof(data)); memset(data, 'A', 128); - for (i = 0; i < 16; i++) { + for (i = 0; i < KEX_RETRY; i++) { ssh_send_ignore(s->ssh.session, data); ssh_handle_packets(s->ssh.session, 50); } |