diff options
-rw-r--r-- | ChangeLog | 3 | ||||
-rw-r--r-- | regress/krl.sh | 10 |
2 files changed, 11 insertions, 2 deletions
@@ -1,3 +1,6 @@ | |||
1 | 20130214 | ||
2 | - (djm) [regress/krl.sh] Don't use ecdsa keys in environment that lack ECC. | ||
3 | |||
1 | 20130212 | 4 | 20130212 |
2 | - (djm) OpenBSD CVS Sync | 5 | - (djm) OpenBSD CVS Sync |
3 | - djm@cvs.openbsd.org 2013/01/24 21:45:37 | 6 | - djm@cvs.openbsd.org 2013/01/24 21:45:37 |
diff --git a/regress/krl.sh b/regress/krl.sh index 46a2ad3f9..1e767f335 100644 --- a/regress/krl.sh +++ b/regress/krl.sh | |||
@@ -3,13 +3,19 @@ | |||
3 | 3 | ||
4 | tid="key revocation lists" | 4 | tid="key revocation lists" |
5 | 5 | ||
6 | # If we don't support ecdsa keys then this tell will be much slower. | ||
7 | ECDSA=ecdsa | ||
8 | if test "x$TEST_SSH_ECC" != "xyes"; then | ||
9 | $ECDSA=rsa | ||
10 | fi | ||
11 | |||
6 | # Do most testing with ssh-keygen; it uses the same verification code as sshd. | 12 | # Do most testing with ssh-keygen; it uses the same verification code as sshd. |
7 | 13 | ||
8 | # Old keys will interfere with ssh-keygen. | 14 | # Old keys will interfere with ssh-keygen. |
9 | rm -f $OBJ/revoked-* $OBJ/krl-* | 15 | rm -f $OBJ/revoked-* $OBJ/krl-* |
10 | 16 | ||
11 | # Generate a CA key | 17 | # Generate a CA key |
12 | $SSHKEYGEN -t ecdsa -f $OBJ/revoked-ca -C "" -N "" > /dev/null || | 18 | $SSHKEYGEN -t $ECDSA -f $OBJ/revoked-ca -C "" -N "" > /dev/null || |
13 | fatal "$SSHKEYGEN CA failed" | 19 | fatal "$SSHKEYGEN CA failed" |
14 | 20 | ||
15 | # A specification that revokes some certificates by serial numbers | 21 | # A specification that revokes some certificates by serial numbers |
@@ -48,7 +54,7 @@ keygen() { | |||
48 | N=$1 | 54 | N=$1 |
49 | f=$OBJ/revoked-`printf "%04d" $N` | 55 | f=$OBJ/revoked-`printf "%04d" $N` |
50 | # Vary the keytype. We use mostly ECDSA since this is fastest by far. | 56 | # Vary the keytype. We use mostly ECDSA since this is fastest by far. |
51 | keytype=ecdsa | 57 | keytype=$ECDSA |
52 | case $N in | 58 | case $N in |
53 | 2 | 10 | 510 | 1001) keytype=rsa;; | 59 | 2 | 10 | 510 | 1001) keytype=rsa;; |
54 | 4 | 30 | 520 | 1002) keytype=dsa;; | 60 | 4 | 30 | 520 | 1002) keytype=dsa;; |