Remove dropbear key types not supported by current OpenSSH.
authordtucker <dtucker@openbsd.org>
Thu, 20 Jun 2024 08:18:34 +0000 (08:18 +0000)
committerdtucker <dtucker@openbsd.org>
Thu, 20 Jun 2024 08:18:34 +0000 (08:18 +0000)
Allows subsequent test runs to work if OpenSSH is rebuilt w/out OpenSSL.

regress/usr.bin/ssh/test-exec.sh

index 7f53285..9c15661 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: test-exec.sh,v 1.118 2024/06/19 10:08:34 dtucker Exp $
+#      $OpenBSD: test-exec.sh,v 1.119 2024/06/20 08:18:34 dtucker Exp $
 #      Placed in the Public Domain.
 
 #SUDO=sudo
@@ -646,17 +646,15 @@ esac
 
 if test "$REGRESS_INTEROP_DROPBEAR" = "yes" ; then
        trace Create dropbear keys and add to authorized_keys
-       kt="ed25519"
-       if $SSH -Q key-plain | grep '^ssh-dss$' >/dev/null; then
-               kt="$kt dss"
-       fi
-       if $SSH -Q key-plain | grep '^ssh-rsa$' >/dev/null; then
-               kt="$kt rsa"
-       fi
-       if $SSH -Q key-plain | grep '^ecdsa-sha2' >/dev/null; then
-               kt="$kt ecdsa"
-       fi
        mkdir -p $OBJ/.dropbear
+       kt="ed25519"
+       for i in dss rsa ecdsa; do
+               if $SSH -Q key-plain | grep "$i" >/dev/null; then
+                       kt="$kt $i"
+               else
+                       rm -f "$OBJ/.dropbear/id_$i"
+               fi
+       done
        for i in $kt; do
                if [ ! -f "$OBJ/.dropbear/id_$i" ]; then
                        verbose Create dropbear key type $i