diff options
author | Jon Simons <jon@jonsimons.org> | 2019-02-04 17:39:36 -0500 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2019-02-07 13:54:12 +0100 |
commit | c2077ab7752c9d1fa149d7b5337d9e4aaeb96188 (patch) | |
tree | 7e590d1bfbf593694f0e2a37734c600266f4a943 /src | |
parent | 128015bb1795898ef83460f0387eacc9b10ed798 (diff) | |
download | libssh-c2077ab7752c9d1fa149d7b5337d9e4aaeb96188.tar.gz libssh-c2077ab7752c9d1fa149d7b5337d9e4aaeb96188.tar.xz libssh-c2077ab7752c9d1fa149d7b5337d9e4aaeb96188.zip |
tests/pkd: repro rsa-sha2-{256,512} negotiation bug
Add four passes to the pkd tests to exercise codepaths where an
OpenSSH client requests these HostKeyAlgorithms combinations:
* rsa-sha2-256
* rsa-sha2-512
* rsa-sha2-256,rsa-sha2-512
* rsa-sha2-512,rsa-sha2-256
The tests demonstrate that the third combination currently fails:
libssh ends up choosing `rsa-sha2-512` instead of `rsa-sha2-256`,
and the initial exchange fails on the client side citing a signature
failure.
Signed-off-by: Jon Simons <jon@jonsimons.org>
Reviewed-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'src')
0 files changed, 0 insertions, 0 deletions