]> git.ipfire.org Git - thirdparty/openssh-portable.git/commitdiff
upstream: this test has been broken since 2014, and has been
authordjm@openbsd.org <djm@openbsd.org>
Wed, 22 May 2024 04:20:00 +0000 (04:20 +0000)
committerDamien Miller <djm@mindrot.org>
Wed, 22 May 2024 04:21:50 +0000 (14:21 +1000)
testing the same key exchange algorithm repeatedly instead of testing all of
them. Spotted by nreilly AT blackberry.com in bz3692

Who broke the test? me.

OpenBSD-Regress-ID: 48f4f5946276f975667141957d25441b3c9a50e2

regress/rekey.sh

index 61723cd86608189c3e266274e3115e7620e54bb1..8005a86ad39e7c5ebb97436a4be5730aad27b288 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: rekey.sh,v 1.19 2021/07/19 05:08:54 dtucker Exp $
+#      $OpenBSD: rekey.sh,v 1.20 2024/05/22 04:20:00 djm Exp $
 #      Placed in the Public Domain.
 
 tid="rekey"
@@ -14,7 +14,7 @@ ssh_data_rekeying()
 {
        _kexopt=$1 ; shift
        _opts="$@"
-       if ! test -z "$_kexopts" ; then
+       if ! test -z "$_kexopt" ; then
                cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
                echo "$_kexopt" >> $OBJ/sshd_proxy
                _opts="$_opts -o$_kexopt"