mirror of
https://git.libssh.org/projects/libssh.git
synced 2025-07-29 13:01:13 +03:00
Remove support for DSA Keys
Solving issue #110. The original work is at !231 Some changes were needed because the newly added features in master through time Signed-off-by: Mohammad Shehar Yaar Tausif <sheharyaar48@gmail.com> Signed-off-by: Norbert Pocs <npocs@redhat.com> Reviewed-by: Jakub Jelen <jjelen@redhat.com>
This commit is contained in:
committed by
Jakub Jelen
parent
486df37a84
commit
a3a13eb3a8
@ -127,30 +127,6 @@ static void torture_hostkey_ed25519(void **state) {
|
||||
assert_ssh_return_code(session, rc);
|
||||
}
|
||||
|
||||
#ifdef HAVE_DSA
|
||||
static void torture_hostkey_dss(void **state) {
|
||||
struct torture_state *s = *state;
|
||||
ssh_session session = s->ssh.session;
|
||||
char rsa[] = "ssh-dss";
|
||||
|
||||
int rc;
|
||||
|
||||
if (ssh_fips_mode()) {
|
||||
skip();
|
||||
}
|
||||
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, &rsa);
|
||||
assert_ssh_return_code(session, rc);
|
||||
|
||||
rc = ssh_connect(session);
|
||||
assert_ssh_return_code(session, rc);
|
||||
ssh_disconnect(session);
|
||||
|
||||
rc = ssh_connect(session);
|
||||
assert_ssh_return_code(session, rc);
|
||||
}
|
||||
#endif /* HAVE_DSA */
|
||||
|
||||
#ifdef HAVE_ECC
|
||||
static void torture_hostkey_ecdsa(void **state) {
|
||||
struct torture_state *s = *state;
|
||||
@ -220,10 +196,6 @@ int torture_run_tests(void) {
|
||||
#ifdef HAVE_ECC
|
||||
cmocka_unit_test_setup_teardown(torture_hostkey_ecdsa, session_setup,
|
||||
session_teardown),
|
||||
#endif
|
||||
#ifdef HAVE_DSA
|
||||
cmocka_unit_test_setup_teardown(torture_hostkey_dss, session_setup,
|
||||
session_teardown),
|
||||
#endif
|
||||
/* the client is able to handle SHA2 extension (if negotiated) */
|
||||
cmocka_unit_test_setup_teardown(torture_hostkey_rsa_sha256,
|
||||
|
Reference in New Issue
Block a user