aboutsummaryrefslogtreecommitdiff
path: root/tests/client
diff options
context:
space:
mode:
authorJakub Jelen <jjelen@redhat.com>2019-11-21 17:02:29 +0100
committerAndreas Schneider <asn@cryptomilk.org>2019-12-23 14:31:32 +0100
commit2892b49a37e742cc6089c87cab6a89340a2e33a4 (patch)
tree9f3a0503d3ec61c7aa9a60146fe2a395a6a8bd3c /tests/client
parent4b85934198ff37fe6629de2e30c9cda07918a6f0 (diff)
downloadlibssh-2892b49a37e742cc6089c87cab6a89340a2e33a4.tar.gz
libssh-2892b49a37e742cc6089c87cab6a89340a2e33a4.tar.xz
libssh-2892b49a37e742cc6089c87cab6a89340a2e33a4.zip
tests: Use the path to SSH executable consistently
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'tests/client')
-rw-r--r--tests/client/torture_rekey.c4
-rw-r--r--tests/client/torture_sftp_read.c2
2 files changed, 3 insertions, 3 deletions
diff --git a/tests/client/torture_rekey.c b/tests/client/torture_rekey.c
index 7c9d8127..a70b39d6 100644
--- a/tests/client/torture_rekey.c
+++ b/tests/client/torture_rekey.c
@@ -283,7 +283,7 @@ static void torture_rekey_recv(void **state)
memcpy(secret_hash, c->secret_hash, c->digest_len);
/* Download a file */
- file = sftp_open(s->ssh.tsftp->sftp, "/usr/bin/ssh", O_RDONLY, 0);
+ file = sftp_open(s->ssh.tsftp->sftp, SSH_EXECUTABLE, O_RDONLY, 0);
assert_non_null(file);
mask = umask(S_IRWXO | S_IRWXG);
@@ -473,7 +473,7 @@ static void torture_rekey_server_recv(void **state)
memcpy(secret_hash, c->secret_hash, c->digest_len);
/* Download a file */
- file = sftp_open(s->ssh.tsftp->sftp, "/usr/bin/ssh", O_RDONLY, 0);
+ file = sftp_open(s->ssh.tsftp->sftp, SSH_EXECUTABLE, O_RDONLY, 0);
assert_non_null(file);
mask = umask(S_IRWXO | S_IRWXG);
diff --git a/tests/client/torture_sftp_read.c b/tests/client/torture_sftp_read.c
index 2208fbae..687153eb 100644
--- a/tests/client/torture_sftp_read.c
+++ b/tests/client/torture_sftp_read.c
@@ -73,7 +73,7 @@ static void torture_sftp_read_blocking(void **state) {
sftp_file file;
mode_t mask;
- file = sftp_open(t->sftp, "/usr/bin/ssh", O_RDONLY, 0);
+ file = sftp_open(t->sftp, SSH_EXECUTABLE, O_RDONLY, 0);
assert_non_null(file);
mask = umask(S_IRWXO | S_IRWXG);