1
0
mirror of https://git.libssh.org/projects/libssh.git synced 2025-07-29 13:01:13 +03:00

tests: Do not require strict host key checking in openssh

as nothing really sets these keys up and they are probably preserverd
from some previous test, which is really not a good testing strategy.

Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
This commit is contained in:
Jakub Jelen
2019-12-16 15:50:27 +01:00
committed by Andreas Schneider
parent 1563bddf88
commit 8eda4165cf

View File

@ -121,7 +121,9 @@ static void torture_options_set_proxycommand_ssh(void **state)
int rc;
socket_t fd;
rc = snprintf(command, sizeof(command), "ssh -W [%%h]:%%p alice@%s", address);
rc = snprintf(command, sizeof(command),
"ssh -oStrictHostKeyChecking=no -W [%%h]:%%p alice@%s",
address);
assert_true((size_t)rc < sizeof(command));
rc = ssh_options_set(session, SSH_OPTIONS_PROXYCOMMAND, command);
@ -143,7 +145,10 @@ static void torture_options_set_proxycommand_ssh_stderr(void **state)
int rc;
socket_t fd;
rc = snprintf(command, sizeof(command), "ssh -vvv -W [%%h]:%%p alice@%s", address);
/* The -vvv switches produce the desired output on the standard error */
rc = snprintf(command, sizeof(command),
"ssh -vvv -oStrictHostKeyChecking=no -W [%%h]:%%p alice@%s",
address);
assert_true((size_t)rc < sizeof(command));
rc = ssh_options_set(session, SSH_OPTIONS_PROXYCOMMAND, command);