From a7fc1df246e80bfdabd09b069b91c72f9c578ca8 Mon Sep 17 00:00:00 2001 From: "djm@openbsd.org" Date: Wed, 11 Dec 2019 18:47:14 +0000 Subject: upstream: it's no longer possible to disable privilege separation in sshd, so don't double the tests' work by trying both off/on OpenBSD-Regress-ID: d366665466dbd09e9b707305da884be3e7619c68 --- regress/cert-userkey.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'regress/cert-userkey.sh') diff --git a/regress/cert-userkey.sh b/regress/cert-userkey.sh index d6e293d57..87d30d27b 100644 --- a/regress/cert-userkey.sh +++ b/regress/cert-userkey.sh @@ -1,4 +1,4 @@ -# $OpenBSD: cert-userkey.sh,v 1.23 2019/11/26 23:43:10 djm Exp $ +# $OpenBSD: cert-userkey.sh,v 1.24 2019/12/11 18:47:14 djm Exp $ # Placed in the Public Domain. tid="certified user keys" @@ -60,7 +60,7 @@ done # Test explicitly-specified principals for ktype in $EXTRA_TYPES $PLAIN_TYPES ; do t=$(kname $ktype) - for privsep in yes sandbox ; do + for privsep in yes ; do _prefix="${ktype} privsep $privsep" # Setup for AuthorizedPrincipalsFile @@ -197,7 +197,7 @@ basic_tests() { for ktype in $PLAIN_TYPES ; do t=$(kname $ktype) - for privsep in yes no ; do + for privsep in yes ; do _prefix="${ktype} privsep $privsep $auth" # Simple connect verbose "$tid: ${_prefix} connect" -- cgit v1.2.3