openssh/regress/keyscan.sh
djm@openbsd.org afa59e26ee upstream: skip security-key key types for tests until we have a
dummy U2F middleware to use.

OpenBSD-Regress-ID: 37200462b44334a4ad45e6a1f7ad1bd717521a95
2019-11-01 13:10:09 +11:00

27 lines
520 B
Bash

# $OpenBSD: keyscan.sh,v 1.10 2019/11/01 01:55:41 djm Exp $
# Placed in the Public Domain.
tid="keyscan"
KEYTYPES=`${SSH} -Q key-plain | grep -v ^sk-`
for i in $KEYTYPES; do
if [ -z "$algs" ]; then
algs="$i"
else
algs="$algs,$i"
fi
done
echo "HostKeyAlgorithms $algs" >> $OBJ/sshd_config
start_sshd
for t in $KEYTYPES; do
trace "keyscan type $t"
${SSHKEYSCAN} -t $t -p $PORT 127.0.0.1 127.0.0.1 127.0.0.1 \
> /dev/null 2>&1
r=$?
if [ $r -ne 0 ]; then
fail "ssh-keyscan -t $t failed with: $r"
fi
done