From abfd1f7a3cbd0a92581a0febba254b2f6649c0d9 Mon Sep 17 00:00:00 2001 From: "djm@openbsd.org" Date: Fri, 14 Jun 2024 00:23:55 +0000 Subject: [PATCH] upstream: specify an algorithm for ssh-keyscan, otherwise it will make multiple attempts simultaneously and confuse the test OpenBSD-Regress-ID: 6e910f3315c4345053db1bf5cbf61826b194d0b9 --- regress/penalty.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/regress/penalty.sh b/regress/penalty.sh index 5ac7ef67e..ae37aaef8 100644 --- a/regress/penalty.sh +++ b/regress/penalty.sh @@ -44,8 +44,8 @@ sleep 8 ${SSH} -F $OBJ/ssh_config somehost true || fail "authfail not expired" verbose "penalty for no authentication" -${SSHKEYSCAN} -p $PORT 127.0.0.1 >/dev/null 2>&1 || fatal "keyscan failed" +${SSHKEYSCAN} -t ssh-ed25519 -p $PORT 127.0.0.1 >/dev/null 2>&1 || fatal "keyscan failed" # Repeat attempt should be penalised -${SSHKEYSCAN} -p $PORT 127.0.0.1 >/dev/null 2>&1 && fail "keyscan not rejected" +${SSHKEYSCAN} -t ssh-ed25519 -p $PORT 127.0.0.1 >/dev/null 2>&1 && fail "keyscan not rejected"