mirror of
https://git.libssh.org/projects/libssh.git
synced 2026-02-11 18:50:28 +09:00
tests: Do not require strict host key checking in openssh
as nothing really sets these keys up and they are probably preserverd
from some previous test, which is really not a good testing strategy.
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
(cherry picked from commit 8eda4165cf)
This commit is contained in:
committed by
Andreas Schneider
parent
ea198fee43
commit
92124ae65a
@@ -110,7 +110,9 @@ static void torture_options_set_proxycommand_ssh(void **state)
|
|||||||
int rc;
|
int rc;
|
||||||
socket_t fd;
|
socket_t fd;
|
||||||
|
|
||||||
rc = snprintf(command, sizeof(command), "ssh -W [%%h]:%%p alice@%s", address);
|
rc = snprintf(command, sizeof(command),
|
||||||
|
"ssh -oStrictHostKeyChecking=no -W [%%h]:%%p alice@%s",
|
||||||
|
address);
|
||||||
assert_true((size_t)rc < sizeof(command));
|
assert_true((size_t)rc < sizeof(command));
|
||||||
|
|
||||||
rc = ssh_options_set(session, SSH_OPTIONS_PROXYCOMMAND, command);
|
rc = ssh_options_set(session, SSH_OPTIONS_PROXYCOMMAND, command);
|
||||||
@@ -132,7 +134,10 @@ static void torture_options_set_proxycommand_ssh_stderr(void **state)
|
|||||||
int rc;
|
int rc;
|
||||||
socket_t fd;
|
socket_t fd;
|
||||||
|
|
||||||
rc = snprintf(command, sizeof(command), "ssh -vvv -W [%%h]:%%p alice@%s", address);
|
/* The -vvv switches produce the desired output on the standard error */
|
||||||
|
rc = snprintf(command, sizeof(command),
|
||||||
|
"ssh -vvv -oStrictHostKeyChecking=no -W [%%h]:%%p alice@%s",
|
||||||
|
address);
|
||||||
assert_true((size_t)rc < sizeof(command));
|
assert_true((size_t)rc < sizeof(command));
|
||||||
|
|
||||||
rc = ssh_options_set(session, SSH_OPTIONS_PROXYCOMMAND, command);
|
rc = ssh_options_set(session, SSH_OPTIONS_PROXYCOMMAND, command);
|
||||||
|
|||||||
Reference in New Issue
Block a user