upstream: this test has been broken since 2014, and has been

testing the same key exchange algorithm repeatedly instead of testing all of
them. Spotted by nreilly AT blackberry.com in bz3692

Who broke the test? me.

OpenBSD-Regress-ID: 48f4f5946276f975667141957d25441b3c9a50e2
This commit is contained in:
djm@openbsd.org 2024-05-22 04:20:00 +00:00 committed by Damien Miller
parent fd4816791b
commit fc5dc09283
No known key found for this signature in database

View File

@ -1,4 +1,4 @@
# $OpenBSD: rekey.sh,v 1.19 2021/07/19 05:08:54 dtucker Exp $ # $OpenBSD: rekey.sh,v 1.20 2024/05/22 04:20:00 djm Exp $
# Placed in the Public Domain. # Placed in the Public Domain.
tid="rekey" tid="rekey"
@ -14,7 +14,7 @@ ssh_data_rekeying()
{ {
_kexopt=$1 ; shift _kexopt=$1 ; shift
_opts="$@" _opts="$@"
if ! test -z "$_kexopts" ; then if ! test -z "$_kexopt" ; then
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
echo "$_kexopt" >> $OBJ/sshd_proxy echo "$_kexopt" >> $OBJ/sshd_proxy
_opts="$_opts -o$_kexopt" _opts="$_opts -o$_kexopt"