diff options
-rw-r--r-- | regress/cert-hostkey.sh | 6 | ||||
-rw-r--r-- | regress/cert-userkey.sh | 4 | ||||
-rw-r--r-- | regress/hostkey-agent.sh | 6 | ||||
-rw-r--r-- | regress/hostkey-rotate.sh | 4 | ||||
-rw-r--r-- | regress/keygen-change.sh | 4 | ||||
-rw-r--r-- | regress/keyscan.sh | 4 | ||||
-rw-r--r-- | regress/krl.sh | 4 | ||||
-rw-r--r-- | regress/limit-keytype.sh | 4 | ||||
-rw-r--r-- | regress/principals-command.sh | 4 | ||||
-rw-r--r-- | regress/test-exec.sh | 4 |
10 files changed, 22 insertions, 22 deletions
diff --git a/regress/cert-hostkey.sh b/regress/cert-hostkey.sh index 86ea62504..82195b11b 100644 --- a/regress/cert-hostkey.sh +++ b/regress/cert-hostkey.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: cert-hostkey.sh,v 1.18 2019/07/25 08:28:15 dtucker Exp $ | 1 | # $OpenBSD: cert-hostkey.sh,v 1.19 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="certified host keys" | 4 | tid="certified host keys" |
@@ -9,7 +9,7 @@ rm -f $OBJ/cert_host_key* $OBJ/host_krl_* | |||
9 | # Allow all hostkey/pubkey types, prefer certs for the client | 9 | # Allow all hostkey/pubkey types, prefer certs for the client |
10 | rsa=0 | 10 | rsa=0 |
11 | types="" | 11 | types="" |
12 | for i in `$SSH -Q key`; do | 12 | for i in `$SSH -Q key | grep -v ^sk-`; do |
13 | if [ -z "$types" ]; then | 13 | if [ -z "$types" ]; then |
14 | types="$i" | 14 | types="$i" |
15 | continue | 15 | continue |
@@ -70,7 +70,7 @@ touch $OBJ/host_revoked_plain | |||
70 | touch $OBJ/host_revoked_cert | 70 | touch $OBJ/host_revoked_cert |
71 | cat $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub > $OBJ/host_revoked_ca | 71 | cat $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub > $OBJ/host_revoked_ca |
72 | 72 | ||
73 | PLAIN_TYPES=`$SSH -Q key-plain | sed 's/^ssh-dss/ssh-dsa/g;s/^ssh-//'` | 73 | PLAIN_TYPES=`$SSH -Q key-plain | grep -v ^sk- | sed 's/^ssh-dss/ssh-dsa/g;s/^ssh-//'` |
74 | 74 | ||
75 | if echo "$PLAIN_TYPES" | grep '^rsa$' >/dev/null 2>&1 ; then | 75 | if echo "$PLAIN_TYPES" | grep '^rsa$' >/dev/null 2>&1 ; then |
76 | PLAIN_TYPES="$PLAIN_TYPES rsa-sha2-256 rsa-sha2-512" | 76 | PLAIN_TYPES="$PLAIN_TYPES rsa-sha2-256 rsa-sha2-512" |
diff --git a/regress/cert-userkey.sh b/regress/cert-userkey.sh index 38c14a698..51ac8dcb9 100644 --- a/regress/cert-userkey.sh +++ b/regress/cert-userkey.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: cert-userkey.sh,v 1.21 2019/07/25 08:28:15 dtucker Exp $ | 1 | # $OpenBSD: cert-userkey.sh,v 1.22 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="certified user keys" | 4 | tid="certified user keys" |
@@ -7,7 +7,7 @@ rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* | |||
7 | cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak | 7 | cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak |
8 | cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak | 8 | cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak |
9 | 9 | ||
10 | PLAIN_TYPES=`$SSH -Q key-plain | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'` | 10 | PLAIN_TYPES=`$SSH -Q key-plain | grep -v ^sk- | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'` |
11 | EXTRA_TYPES="" | 11 | EXTRA_TYPES="" |
12 | rsa="" | 12 | rsa="" |
13 | 13 | ||
diff --git a/regress/hostkey-agent.sh b/regress/hostkey-agent.sh index 811b6b9ab..c581c7bfd 100644 --- a/regress/hostkey-agent.sh +++ b/regress/hostkey-agent.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: hostkey-agent.sh,v 1.7 2017/04/30 23:34:55 djm Exp $ | 1 | # $OpenBSD: hostkey-agent.sh,v 1.8 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="hostkey agent" | 4 | tid="hostkey agent" |
@@ -14,7 +14,7 @@ grep -vi 'hostkey' $OBJ/sshd_proxy > $OBJ/sshd_proxy.orig | |||
14 | echo "HostKeyAgent $SSH_AUTH_SOCK" >> $OBJ/sshd_proxy.orig | 14 | echo "HostKeyAgent $SSH_AUTH_SOCK" >> $OBJ/sshd_proxy.orig |
15 | 15 | ||
16 | trace "load hostkeys" | 16 | trace "load hostkeys" |
17 | for k in `${SSH} -Q key-plain` ; do | 17 | for k in `${SSH} -Q key-plain | grep -v ^sk-` ; do |
18 | ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k" | 18 | ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k" |
19 | ( | 19 | ( |
20 | printf 'localhost-with-alias,127.0.0.1,::1 ' | 20 | printf 'localhost-with-alias,127.0.0.1,::1 ' |
@@ -31,7 +31,7 @@ cp $OBJ/known_hosts.orig $OBJ/known_hosts | |||
31 | unset SSH_AUTH_SOCK | 31 | unset SSH_AUTH_SOCK |
32 | 32 | ||
33 | for ps in no yes; do | 33 | for ps in no yes; do |
34 | for k in `${SSH} -Q key-plain` ; do | 34 | for k in `${SSH} -Q key-plain | grep -v ^sk-` ; do |
35 | verbose "key type $k privsep=$ps" | 35 | verbose "key type $k privsep=$ps" |
36 | cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy | 36 | cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy |
37 | echo "UsePrivilegeSeparation $ps" >> $OBJ/sshd_proxy | 37 | echo "UsePrivilegeSeparation $ps" >> $OBJ/sshd_proxy |
diff --git a/regress/hostkey-rotate.sh b/regress/hostkey-rotate.sh index cc6bd9cf6..707e32908 100644 --- a/regress/hostkey-rotate.sh +++ b/regress/hostkey-rotate.sh | |||
@@ -1,10 +1,10 @@ | |||
1 | # $OpenBSD: hostkey-rotate.sh,v 1.6 2019/08/30 05:08:28 dtucker Exp $ | 1 | # $OpenBSD: hostkey-rotate.sh,v 1.7 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="hostkey rotate" | 4 | tid="hostkey rotate" |
5 | 5 | ||
6 | # Need full names here since they are used in HostKeyAlgorithms | 6 | # Need full names here since they are used in HostKeyAlgorithms |
7 | HOSTKEY_TYPES="`${SSH} -Q key-plain`" | 7 | HOSTKEY_TYPES="`${SSH} -Q key-plain | grep -v ^sk-`" |
8 | 8 | ||
9 | rm -f $OBJ/hkr.* $OBJ/ssh_proxy.orig | 9 | rm -f $OBJ/hkr.* $OBJ/ssh_proxy.orig |
10 | 10 | ||
diff --git a/regress/keygen-change.sh b/regress/keygen-change.sh index 8b8acd52f..c62f2c17c 100644 --- a/regress/keygen-change.sh +++ b/regress/keygen-change.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: keygen-change.sh,v 1.6 2017/04/30 23:34:55 djm Exp $ | 1 | # $OpenBSD: keygen-change.sh,v 1.7 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="change passphrase for key" | 4 | tid="change passphrase for key" |
@@ -6,7 +6,7 @@ tid="change passphrase for key" | |||
6 | S1="secret1" | 6 | S1="secret1" |
7 | S2="2secret" | 7 | S2="2secret" |
8 | 8 | ||
9 | KEYTYPES=`${SSH} -Q key-plain` | 9 | KEYTYPES=`${SSH} -Q key-plain | grep -v ^sk-` |
10 | 10 | ||
11 | for t in $KEYTYPES; do | 11 | for t in $KEYTYPES; do |
12 | # generate user key for agent | 12 | # generate user key for agent |
diff --git a/regress/keyscan.sh b/regress/keyscan.sh index 8940d24b6..4e16ecd87 100644 --- a/regress/keyscan.sh +++ b/regress/keyscan.sh | |||
@@ -1,9 +1,9 @@ | |||
1 | # $OpenBSD: keyscan.sh,v 1.9 2019/01/28 03:50:39 dtucker Exp $ | 1 | # $OpenBSD: keyscan.sh,v 1.10 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="keyscan" | 4 | tid="keyscan" |
5 | 5 | ||
6 | KEYTYPES=`${SSH} -Q key-plain` | 6 | KEYTYPES=`${SSH} -Q key-plain | grep -v ^sk-` |
7 | for i in $KEYTYPES; do | 7 | for i in $KEYTYPES; do |
8 | if [ -z "$algs" ]; then | 8 | if [ -z "$algs" ]; then |
9 | algs="$i" | 9 | algs="$i" |
diff --git a/regress/krl.sh b/regress/krl.sh index e18d0ec7f..c9b2e67eb 100644 --- a/regress/krl.sh +++ b/regress/krl.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: krl.sh,v 1.8 2019/07/25 09:17:35 dtucker Exp $ | 1 | # $OpenBSD: krl.sh,v 1.9 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="key revocation lists" | 4 | tid="key revocation lists" |
@@ -6,7 +6,7 @@ tid="key revocation lists" | |||
6 | # Use ed25519 by default since it's fast and it's supported when building | 6 | # Use ed25519 by default since it's fast and it's supported when building |
7 | # w/out OpenSSL. Populate ktype[2-4] with the other types if supported. | 7 | # w/out OpenSSL. Populate ktype[2-4] with the other types if supported. |
8 | ktype1=ed25519; ktype2=ed25519; ktype3=ed25519; ktype4=ed25519 | 8 | ktype1=ed25519; ktype2=ed25519; ktype3=ed25519; ktype4=ed25519 |
9 | for t in `${SSH} -Q key-plain`; do | 9 | for t in `${SSH} -Q key-plain | grep -v ^sk-`; do |
10 | case "$t" in | 10 | case "$t" in |
11 | ecdsa*) ktype2=ecdsa ;; | 11 | ecdsa*) ktype2=ecdsa ;; |
12 | ssh-rsa) ktype3=rsa ;; | 12 | ssh-rsa) ktype3=rsa ;; |
diff --git a/regress/limit-keytype.sh b/regress/limit-keytype.sh index 5c30af006..6eb255c24 100644 --- a/regress/limit-keytype.sh +++ b/regress/limit-keytype.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: limit-keytype.sh,v 1.6 2019/07/26 04:22:21 dtucker Exp $ | 1 | # $OpenBSD: limit-keytype.sh,v 1.7 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="restrict pubkey type" | 4 | tid="restrict pubkey type" |
@@ -10,7 +10,7 @@ mv $OBJ/sshd_proxy $OBJ/sshd_proxy.orig | |||
10 | mv $OBJ/ssh_proxy $OBJ/ssh_proxy.orig | 10 | mv $OBJ/ssh_proxy $OBJ/ssh_proxy.orig |
11 | 11 | ||
12 | ktype1=ed25519; ktype2=$ktype1; ktype3=$ktype1; ktype4=$ktype1 | 12 | ktype1=ed25519; ktype2=$ktype1; ktype3=$ktype1; ktype4=$ktype1 |
13 | for t in `${SSH} -Q key-plain`; do | 13 | for t in `${SSH} -Q key-plain | grep -v ^sk-`; do |
14 | case "$t" in | 14 | case "$t" in |
15 | ssh-rsa) ktype2=rsa ;; | 15 | ssh-rsa) ktype2=rsa ;; |
16 | ecdsa*) ktype3=ecdsa ;; # unused | 16 | ecdsa*) ktype3=ecdsa ;; # unused |
diff --git a/regress/principals-command.sh b/regress/principals-command.sh index 7d380325b..005c6b7d6 100644 --- a/regress/principals-command.sh +++ b/regress/principals-command.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: principals-command.sh,v 1.7 2019/09/06 04:24:06 dtucker Exp $ | 1 | # $OpenBSD: principals-command.sh,v 1.8 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="authorized principals command" | 4 | tid="authorized principals command" |
@@ -12,7 +12,7 @@ if [ -z "$SUDO" -a ! -w /var/run ]; then | |||
12 | exit 0 | 12 | exit 0 |
13 | fi | 13 | fi |
14 | 14 | ||
15 | case "`${SSH} -Q key-plain`" in | 15 | case "`${SSH} -Q key-plain | grep -v ^sk-`" in |
16 | *ssh-rsa*) userkeytype=rsa ;; | 16 | *ssh-rsa*) userkeytype=rsa ;; |
17 | *) userkeytype=ed25519 ;; | 17 | *) userkeytype=ed25519 ;; |
18 | esac | 18 | esac |
diff --git a/regress/test-exec.sh b/regress/test-exec.sh index 508b93284..3f1685bb0 100644 --- a/regress/test-exec.sh +++ b/regress/test-exec.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: test-exec.sh,v 1.66 2019/07/05 04:12:46 dtucker Exp $ | 1 | # $OpenBSD: test-exec.sh,v 1.67 2019/11/01 01:55:41 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | #SUDO=sudo | 4 | #SUDO=sudo |
@@ -475,7 +475,7 @@ fi | |||
475 | 475 | ||
476 | rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER | 476 | rm -f $OBJ/known_hosts $OBJ/authorized_keys_$USER |
477 | 477 | ||
478 | SSH_KEYTYPES=`$SSH -Q key-plain` | 478 | SSH_KEYTYPES=`$SSH -Q key-plain | grep -v ^sk` |
479 | 479 | ||
480 | for t in ${SSH_KEYTYPES}; do | 480 | for t in ${SSH_KEYTYPES}; do |
481 | # generate user key | 481 | # generate user key |