]> andersk Git - openssh.git/commitdiff
- djm@cvs.openbsd.org 2004/10/29 23:59:22
authordtucker <dtucker>
Mon, 6 Dec 2004 12:07:37 +0000 (12:07 +0000)
committerdtucker <dtucker>
Mon, 6 Dec 2004 12:07:37 +0000 (12:07 +0000)
     [Makefile added brokenkeys.sh]
     regression test for handling of corrupt keys in authorized_keys file

ChangeLog
regress/Makefile
regress/brokenkeys.sh [new file with mode: 0644]

index 7bc86cc932339c95c3ba2cd87d2869ca445933b0..15a59e54be03be63335bc114902da80ef617643c 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -35,6 +35,9 @@
    - djm@cvs.openbsd.org 2004/10/08 02:01:50
      [reexec.sh]
      shrink and tidy; ok dtucker@
+   - djm@cvs.openbsd.org 2004/10/29 23:59:22
+     [Makefile added brokenkeys.sh]
+     regression test for handling of corrupt keys in authorized_keys file
 
 20041203
  - (dtucker) OpenBSD CVS Sync
index dc7b6e35ac9f310b3e6281b70dd9b1e3049dc4bf..3e22d547fcb0b5d8fa4468149a64edba486e81c3 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: Makefile,v 1.32 2004/07/09 19:45:43 david Exp $
+#      $OpenBSD: Makefile,v 1.33 2004/10/29 23:59:22 djm Exp $
 
 REGRESS_TARGETS=       t1 t2 t3 t4 t5 t6 t7 t-exec
 tests:         $(REGRESS_TARGETS)
@@ -38,7 +38,8 @@ LTESTS=       connect \
                dynamic-forward \
                forwarding \
                multiplex \
-               reexec
+               reexec \
+               brokenkeys
 
 USER!=         id -un
 CLEANFILES=    t2.out t6.out1 t6.out2 t7.out t7.out.pub copy.1 copy.2 \
diff --git a/regress/brokenkeys.sh b/regress/brokenkeys.sh
new file mode 100644 (file)
index 0000000..3e70c34
--- /dev/null
@@ -0,0 +1,23 @@
+#      $OpenBSD: brokenkeys.sh,v 1.1 2004/10/29 23:59:22 djm Exp $
+#      Placed in the Public Domain.
+
+tid="broken keys"
+
+KEYS="$OBJ/authorized_keys_${USER}"
+
+start_sshd
+
+mv ${KEYS} ${KEYS}.bak
+
+# Truncated key
+echo "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEABTM= bad key" > $KEYS
+cat ${KEYS}.bak >> ${KEYS}
+cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
+
+${SSH} -2 -F $OBJ/ssh_config somehost true
+if [ $? -ne 0 ]; then
+       fail "ssh connect with protocol $p failed"
+fi
+
+mv ${KEYS}.bak ${KEYS}
+
This page took 0.054743 seconds and 5 git commands to generate.