Stop using DSA in dropbear interop tests.
authoranton <anton@openbsd.org>
Tue, 18 Jun 2024 06:14:27 +0000 (06:14 +0000)
committeranton <anton@openbsd.org>
Tue, 18 Jun 2024 06:14:27 +0000 (06:14 +0000)
regress/usr.bin/ssh/dropbear-kex.sh
regress/usr.bin/ssh/test-exec.sh

index a25de3e..092a26f 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: dropbear-kex.sh,v 1.1 2023/10/20 06:56:45 dtucker Exp $
+#      $OpenBSD: dropbear-kex.sh,v 1.2 2024/06/18 06:14:27 anton Exp $
 #      Placed in the Public Domain.
 
 tid="dropbear kex"
@@ -8,8 +8,8 @@ if test "x$REGRESS_INTEROP_DROPBEAR" != "xyes" ; then
 fi
 
 cat >>$OBJ/sshd_proxy <<EOD
-PubkeyAcceptedAlgorithms +ssh-rsa,ssh-dss
-HostkeyAlgorithms +ssh-rsa,ssh-dss
+PubkeyAcceptedAlgorithms +ssh-rsa
+HostkeyAlgorithms +ssh-rsa
 EOD
 cp $OBJ/sshd_proxy $OBJ/sshd_proxy.bak
 
index 7adf088..e5f0254 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: test-exec.sh,v 1.115 2024/06/11 01:58:27 djm Exp $
+#      $OpenBSD: test-exec.sh,v 1.116 2024/06/18 06:14:27 anton Exp $
 #      Placed in the Public Domain.
 
 #SUDO=sudo
@@ -647,7 +647,7 @@ esac
 if test "$REGRESS_INTEROP_DROPBEAR" = "yes" ; then
        trace Create dropbear keys and add to authorized_keys
        mkdir -p $OBJ/.dropbear
-       for i in rsa ecdsa ed25519 dss; do
+       for i in rsa ecdsa ed25519; do
                if [ ! -f "$OBJ/.dropbear/id_$i" ]; then
                        ($DROPBEARKEY -t $i -f $OBJ/.dropbear/id_$i
                        $DROPBEARCONVERT dropbear openssh \