History log of /openbsd/regress/usr.bin/ssh/cert-hostkey.sh (Results 1 – 25 of 27)
Revision Date Author Comments
# b96e583a 30-Sep-2021 dtucker <dtucker@openbsd.org>

Fix up whitespace left by previous change removing privsep. No other
changes.


# a37860eb 30-Sep-2021 dtucker <dtucker@openbsd.org>

Remove (almost all) references to privsep. This removes several do..while
loops but does not change the indentation of the now-shallower loops,
which will be done in a separate whitespace-only commi

Remove (almost all) references to privsep. This removes several do..while
loops but does not change the indentation of the now-shallower loops,
which will be done in a separate whitespace-only commit to keep changes
of style and substance separate.

show more ...


# 14a2cf57 08-Jun-2021 djm <djm@openbsd.org>

test that UserKnownHostsFile correctly accepts multiple arguments;
would have caught readconf.c r1.356 regression


# 5bdc47d2 25-Feb-2021 djm <djm@openbsd.org>

s/PubkeyAcceptedKeyTypes/PubkeyAcceptedAlgorithms/


# 67336acf 03-Jan-2020 djm <djm@openbsd.org>

what bozo decided to use 2020 as a future date in a regress test?


# 364308cc 16-Dec-2019 djm <djm@openbsd.org>

test security key host keys in addition to user keys


# 8780b133 11-Dec-2019 djm <djm@openbsd.org>

it's no longer possible to disable privilege separation in sshd, so
don't double the tests' work by trying both off/on


# 2a103fde 26-Nov-2019 djm <djm@openbsd.org>

test FIDO2/U2F key types; ok markus@


# d424b3cc 01-Nov-2019 djm <djm@openbsd.org>

skip security-key key types for tests until we have a dummy
U2F middleware to use.


# 7512f89f 25-Jul-2019 dtucker <dtucker@openbsd.org>

Make certificate tests work with the supported key algorithms. Allows
tests to pass when built without OpenSSL.


# 211f0df0 31-Oct-2018 dtucker <dtucker@openbsd.org>

UsePrivilegeSeparation no is deprecated, test "yes" and "sandbox".
rCVS: ----------------------------------------------------------------------


# c863fdc6 03-Jul-2018 djm <djm@openbsd.org>

some magic for RSA-SHA2 checks


# 773d7cab 30-Apr-2017 djm <djm@openbsd.org>

eliminate explicit specification of protocol in tests and loops over
protocol. We only support SSHv2 now.


# 71d3c857 02-May-2016 djm <djm@openbsd.org>

unit and regress tests for SHA256/512; ok markus


# a87f2307 10-Jul-2015 markus <markus@openbsd.org>

Adapt tests, now that DSA if off by default; use PubkeyAcceptedKeyTypes
and PubkeyAcceptedKeyTypes to test DSA.


# 25852f75 03-Jul-2015 djm <djm@openbsd.org>

legacy v00 certificates are gone; adapt and don't try to test them;
"sure" markus@ dtucker@


# f202ff7e 19-Jan-2015 djm <djm@openbsd.org>

be a bit more careful in these tests to ensure that
known_hosts is clean


# 2599342d 04-Dec-2014 djm <djm@openbsd.org>

add tests for new client RevokedHostKeys option;
refactor to make it a bit more readable


# 1a3a9687 26-Jan-2014 djm <djm@openbsd.org>

automatically generate revoked keys from listed keys rather than
manually specifying each type; from portable


# fb0b1e1a 06-Dec-2013 markus <markus@openbsd.org>

test ed25519 support; from djm@


# 2322c035 17-May-2013 dtucker <dtucker@openbsd.org>

replace 'echo -n' with 'printf' since it's more portable


# 630d55c6 20-May-2011 djm <djm@openbsd.org>

another attempt to generate a v00 ECDSA key that broke the test


# 86864404 31-Aug-2010 djm <djm@openbsd.org>

tests for ECDSA certificates


# d2d306b5 16-Apr-2010 djm <djm@openbsd.org>

regression tests for v01 certificate format
includes interop tests for v00 certs


# 3b1b53d5 04-Mar-2010 djm <djm@openbsd.org>

additional regression tests for revoked keys and TrustedUserCAKeys


12