Skip to content

Commit 7cc8e15

Browse files
committed
upstream: remove DSA from the regression/unit test suite too.
OpenBSD-Regress-ID: 4424d2eaf0bce3887318ef6d18de6c06f3617d6e
1 parent 0404fa7 commit 7cc8e15

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+126
-843
lines changed

INSTALL

+1-1
Original file line numberDiff line numberDiff line change
@@ -245,7 +245,7 @@ manually using the following commands:
245245

246246
ssh-keygen -t [type] -f /etc/ssh/ssh_host_key -N ""
247247

248-
for each of the types you wish to generate (rsa, dsa or ecdsa) or
248+
for each of the types you wish to generate (rsa, ed25519 or ecdsa) or
249249

250250
ssh-keygen -A
251251

Makefile.in

-2
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,6 @@ PATHSUBS = \
194194
-e 's|/etc/shosts.equiv|$(sysconfdir)/shosts.equiv|g' \
195195
-e 's|/etc/ssh/ssh_host_key|$(sysconfdir)/ssh_host_key|g' \
196196
-e 's|/etc/ssh/ssh_host_ecdsa_key|$(sysconfdir)/ssh_host_ecdsa_key|g' \
197-
-e 's|/etc/ssh/ssh_host_dsa_key|$(sysconfdir)/ssh_host_dsa_key|g' \
198197
-e 's|/etc/ssh/ssh_host_rsa_key|$(sysconfdir)/ssh_host_rsa_key|g' \
199198
-e 's|/etc/ssh/ssh_host_ed25519_key|$(sysconfdir)/ssh_host_ed25519_key|g' \
200199
-e 's|/var/run/sshd.pid|$(piddir)/sshd.pid|g' \
@@ -494,7 +493,6 @@ host-key: ssh-keygen$(EXEEXT)
494493
fi
495494

496495
host-key-force: ssh-keygen$(EXEEXT) ssh$(EXEEXT)
497-
./ssh-keygen -t dsa -f $(DESTDIR)$(sysconfdir)/ssh_host_dsa_key -N ""
498496
./ssh-keygen -t rsa -f $(DESTDIR)$(sysconfdir)/ssh_host_rsa_key -N ""
499497
./ssh-keygen -t ed25519 -f $(DESTDIR)$(sysconfdir)/ssh_host_ed25519_key -N ""
500498
if ./ssh -Q key | grep ecdsa >/dev/null ; then \

contrib/redhat/openssh.spec

-14
Original file line numberDiff line numberDiff line change
@@ -281,20 +281,6 @@ if [ "$1" != 0 -a -r /var/run/sshd.pid ] ; then
281281
touch /var/run/sshd.restart
282282
fi
283283

284-
%triggerun server -- openssh-server < 2.5.0p1
285-
# Count the number of HostKey and HostDsaKey statements we have.
286-
gawk 'BEGIN {IGNORECASE=1}
287-
/^hostkey/ || /^hostdsakey/ {sawhostkey = sawhostkey + 1}
288-
END {exit sawhostkey}' /etc/ssh/sshd_config
289-
# And if we only found one, we know the client was relying on the old default
290-
# behavior, which loaded the the SSH2 DSA host key when HostDsaKey wasn't
291-
# specified. Now that HostKey is used for both SSH1 and SSH2 keys, specifying
292-
# one nullifies the default, which would have loaded both.
293-
if [ $? -eq 1 ] ; then
294-
echo HostKey /etc/ssh/ssh_host_rsa_key >> /etc/ssh/sshd_config
295-
echo HostKey /etc/ssh/ssh_host_dsa_key >> /etc/ssh/sshd_config
296-
fi
297-
298284
%triggerpostun server -- ssh-server
299285
if [ "$1" != 0 ] ; then
300286
/sbin/chkconfig --add sshd

contrib/redhat/sshd.init

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ start()
4141
/usr/bin/ssh-keygen -A
4242
if [ -x /sbin/restorecon ]; then
4343
/sbin/restorecon /etc/ssh/ssh_host_rsa_key.pub
44-
/sbin/restorecon /etc/ssh/ssh_host_dsa_key.pub
44+
/sbin/restorecon /etc/ssh/ssh_host_ed25519_key.pub
4545
/sbin/restorecon /etc/ssh/ssh_host_ecdsa_key.pub
4646
fi
4747

openbsd-compat/openssl-compat.h

-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@
2424
#include <openssl/crypto.h>
2525
#include <openssl/evp.h>
2626
#include <openssl/rsa.h>
27-
#include <openssl/dsa.h>
2827
#ifdef OPENSSL_HAS_ECC
2928
#include <openssl/ecdsa.h>
3029
#endif

regress/Makefile

+6-24
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
tests: prep file-tests t-exec unit
44

5-
REGRESS_TARGETS= t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12
5+
REGRESS_TARGETS= t1 t2 t3 t4 t5 t7 t9 t10 t11 t12
66

77
# File based tests
88
file-tests: $(REGRESS_TARGETS)
@@ -130,9 +130,9 @@ CLEANFILES= *.core actual agent-key.* authorized_keys_${USERNAME} \
130130
ed25519-agent.pub ed25519 ed25519.pub empty.in \
131131
expect failed-regress.log failed-ssh.log failed-sshd.log \
132132
hkr.* host.ecdsa-sha2-nistp256 host.ecdsa-sha2-nistp384 \
133-
host.ecdsa-sha2-nistp521 host.ssh-dss host.ssh-ed25519 \
133+
host.ecdsa-sha2-nistp521 host.ssh-ed25519 \
134134
host.ssh-rsa host_ca_key* host_krl_* host_revoked_* key.* \
135-
key.dsa-* key.ecdsa-* key.ed25519-512 \
135+
key.ecdsa-* key.ed25519-512 \
136136
key.ed25519-512.pub key.rsa-* keys-command-args kh.* askpass \
137137
known_hosts known_hosts-cert known_hosts.* krl-* ls.copy \
138138
modpipe netcat no_identity_config \
@@ -191,36 +191,18 @@ t5:
191191
${TEST_SSH_SSHKEYGEN} -Bf ${.CURDIR}/rsa_openssh.pub |\
192192
awk '{print $$2}' | diff - ${.CURDIR}/t5.ok ; \
193193
fi
194-
t6:
195-
set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-dss" ; then \
196-
${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.prv > $(OBJ)/t6.out1 ; \
197-
${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.pub > $(OBJ)/t6.out2 ; \
198-
chmod 600 $(OBJ)/t6.out1 ; \
199-
${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t6.out1 | diff - $(OBJ)/t6.out2 ; \
200-
fi
201194

202195
$(OBJ)/t7.out:
203-
set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-dss" ; then \
196+
set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-rsa" ; then \
204197
${TEST_SSH_SSHKEYGEN} -q -t rsa -N '' -f $@ ; \
205198
fi
206199

207200
t7: $(OBJ)/t7.out
208-
set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-dss" ; then \
201+
set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-rsa" ; then \
209202
${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t7.out > /dev/null ; \
210203
${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t7.out > /dev/null ; \
211204
fi
212205

213-
$(OBJ)/t8.out:
214-
set -xe ; if ssh -Q key | grep -q "^ssh-dss" ; then \
215-
${TEST_SSH_SSHKEYGEN} -q -t dsa -N '' -f $@ ; \
216-
fi
217-
218-
t8: $(OBJ)/t8.out
219-
set -xe ; if ssh -Q key | grep -q "^ssh-dss" ; then \
220-
${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t8.out > /dev/null ; \
221-
${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t8.out > /dev/null ; \
222-
fi
223-
224206
$(OBJ)/t9.out:
225207
! ${TEST_SSH_SSH} -Q key-plain | grep ecdsa >/dev/null || \
226208
${TEST_SSH_SSHKEYGEN} -q -t ecdsa -N '' -f $@
@@ -240,7 +222,7 @@ t10: $(OBJ)/t10.out
240222
${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t10.out > /dev/null
241223

242224
t11:
243-
set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-dss" ; then \
225+
set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-rsa" ; then \
244226
${TEST_SSH_SSHKEYGEN} -E sha256 -lf ${.CURDIR}/rsa_openssh.pub |\
245227
awk '{print $$2}' | diff - ${.CURDIR}/t11.ok ; \
246228
fi

regress/agent.sh

+1-7
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# $OpenBSD: agent.sh,v 1.22 2024/10/24 03:28:34 djm Exp $
1+
# $OpenBSD: agent.sh,v 1.23 2025/05/06 06:05:48 djm Exp $
22
# Placed in the Public Domain.
33

44
tid="simple agent test"
@@ -86,10 +86,6 @@ fi
8686

8787
for t in ${SSH_KEYTYPES}; do
8888
trace "connect via agent using $t key"
89-
if [ "$t" = "ssh-dss" ]; then
90-
echo "PubkeyAcceptedAlgorithms +ssh-dss" >> $OBJ/ssh_proxy
91-
echo "PubkeyAcceptedAlgorithms +ssh-dss" >> $OBJ/sshd_proxy
92-
fi
9389
${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub -oIdentitiesOnly=yes \
9490
somehost exit 52
9591
r=$?
@@ -143,7 +139,6 @@ fi
143139
(printf 'cert-authority,principals="estragon" '; cat $OBJ/user_ca_key.pub) \
144140
> $OBJ/authorized_keys_$USER
145141
for t in ${SSH_KEYTYPES}; do
146-
if [ "$t" != "ssh-dss" ]; then
147142
trace "connect via agent using $t key"
148143
${SSH} -F $OBJ/ssh_proxy -i $OBJ/$t-agent.pub \
149144
-oCertificateFile=$OBJ/$t-agent-cert.pub \
@@ -152,7 +147,6 @@ for t in ${SSH_KEYTYPES}; do
152147
if [ $r -ne 52 ]; then
153148
fail "ssh connect with failed (exit code $r)"
154149
fi
155-
fi
156150
done
157151

158152
## Deletion tests.

regress/cert-hostkey.sh

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# $OpenBSD: cert-hostkey.sh,v 1.27 2021/09/30 05:26:26 dtucker Exp $
1+
# $OpenBSD: cert-hostkey.sh,v 1.28 2025/05/06 06:05:48 djm Exp $
22
# Placed in the Public Domain.
33

44
tid="certified host keys"
@@ -70,7 +70,7 @@ touch $OBJ/host_revoked_plain
7070
touch $OBJ/host_revoked_cert
7171
cat $OBJ/host_ca_key.pub $OBJ/host_ca_key2.pub > $OBJ/host_revoked_ca
7272

73-
PLAIN_TYPES=`echo "$SSH_KEYTYPES" | sed 's/^ssh-dss/ssh-dsa/g;s/^ssh-//'`
73+
PLAIN_TYPES=`echo "$SSH_KEYTYPES" | sed 's/^ssh-//'`
7474

7575
if echo "$PLAIN_TYPES" | grep '^rsa$' >/dev/null 2>&1 ; then
7676
PLAIN_TYPES="$PLAIN_TYPES rsa-sha2-256 rsa-sha2-512"

regress/cert-userkey.sh

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# $OpenBSD: cert-userkey.sh,v 1.29 2024/12/06 16:25:58 djm Exp $
1+
# $OpenBSD: cert-userkey.sh,v 1.30 2025/05/06 06:05:48 djm Exp $
22
# Placed in the Public Domain.
33

44
tid="certified user keys"
@@ -10,7 +10,7 @@ cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
1010
grep -v AuthorizedKeysFile $OBJ/sshd_proxy > $OBJ/sshd_proxy_bak
1111
echo "AuthorizedKeysFile $OBJ/authorized_keys_%u_*" >> $OBJ/sshd_proxy_bak
1212

13-
PLAIN_TYPES=`$SSH -Q key-plain | maybe_filter_sk | sed 's/^ssh-dss/ssh-dsa/;s/^ssh-//'`
13+
PLAIN_TYPES=`$SSH -Q key-plain | maybe_filter_sk | sed 's/^ssh-//'`
1414
EXTRA_TYPES=""
1515
rsa=""
1616

@@ -25,7 +25,7 @@ kname() {
2525
sk-ecdsa-*) n="sk-ecdsa" ;;
2626
sk-ssh-ed25519*) n="sk-ssh-ed25519" ;;
2727
# subshell because some seds will add a newline
28-
*) n=$(echo $1 | sed 's/^dsa/ssh-dss/;s/^rsa/ssh-rsa/;s/^ed/ssh-ed/') ;;
28+
*) n=$(echo $1 | sed 's/^rsa/ssh-rsa/;s/^ed/ssh-ed/') ;;
2929
esac
3030
if [ -z "$rsa" ]; then
3131
echo "$n*,ssh-ed25519*"

regress/dsa_ssh2.prv

-14
This file was deleted.

regress/dsa_ssh2.pub

-13
This file was deleted.

regress/hostbased.sh

+1-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# $OpenBSD: hostbased.sh,v 1.4 2022/12/07 11:45:43 dtucker Exp $
1+
# $OpenBSD: hostbased.sh,v 1.5 2025/05/06 06:05:48 djm Exp $
22
# Placed in the Public Domain.
33

44
# This test requires external setup and thus is skipped unless
@@ -43,7 +43,6 @@ for key in `${SUDO} ${SSHD} -T | awk '$1=="hostkey"{print $2}'`; do
4343
521*ECDSA*) algos="$algos ecdsa-sha2-nistp521" ;;
4444
*RSA*) algos="$algos ssh-rsa rsa-sha2-256 rsa-sha2-512" ;;
4545
*ED25519*) algos="$algos ssh-ed25519" ;;
46-
*DSA*) algos="$algos ssh-dss" ;;
4746
*) verbose "unknown host key type $key" ;;
4847
esac
4948
done

regress/keytype.sh

+1-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# $OpenBSD: keytype.sh,v 1.11 2021/02/25 03:27:34 djm Exp $
1+
# $OpenBSD: keytype.sh,v 1.12 2025/05/06 06:05:48 djm Exp $
22
# Placed in the Public Domain.
33

44
tid="login with different key types"
@@ -10,7 +10,6 @@ cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
1010
ktypes=""
1111
for i in ${SSH_KEYTYPES}; do
1212
case "$i" in
13-
ssh-dss) ktypes="$ktypes dsa-1024" ;;
1413
ssh-rsa) ktypes="$ktypes rsa-2048 rsa-3072" ;;
1514
ssh-ed25519) ktypes="$ktypes ed25519-512" ;;
1615
ecdsa-sha2-nistp256) ktypes="$ktypes ecdsa-256" ;;
@@ -36,7 +35,6 @@ done
3635

3736
kname_to_ktype() {
3837
case $1 in
39-
dsa-1024) echo ssh-dss;;
4038
ecdsa-256) echo ecdsa-sha2-nistp256;;
4139
ecdsa-384) echo ecdsa-sha2-nistp384;;
4240
ecdsa-521) echo ecdsa-sha2-nistp521;;

regress/knownhosts-command.sh

+1-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# $OpenBSD: knownhosts-command.sh,v 1.3 2021/08/30 01:15:45 djm Exp $
1+
# $OpenBSD: knownhosts-command.sh,v 1.4 2025/05/06 06:05:48 djm Exp $
22
# Placed in the Public Domain.
33

44
tid="known hosts command "
@@ -40,7 +40,6 @@ ${SSH} -F $OBJ/ssh_proxy x true && fail "ssh connect succeeded with bad exit"
4040

4141
for keytype in ${SSH_HOSTKEY_TYPES} ; do
4242
algs=$keytype
43-
test "x$keytype" = "xssh-dss" && continue
4443
test "x$keytype" = "xssh-rsa" && algs=ssh-rsa,rsa-sha2-256,rsa-sha2-512
4544
verbose "keytype $keytype"
4645
cat > $OBJ/knownhosts_command << _EOF

regress/krl.sh

+1-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# $OpenBSD: krl.sh,v 1.12 2023/01/16 04:11:29 djm Exp $
1+
# $OpenBSD: krl.sh,v 1.13 2025/05/06 06:05:48 djm Exp $
22
# Placed in the Public Domain.
33

44
tid="key revocation lists"
@@ -11,7 +11,6 @@ for t in $SSH_KEYTYPES; do
1111
case "$t" in
1212
ecdsa*) ktype2=ecdsa ;;
1313
ssh-rsa) ktype3=rsa ;;
14-
ssh-dss) ktype4=dsa ;;
1514
[email protected]) ktype5=ed25519-sk ;;
1615
[email protected]) ktype6=ecdsa-sk ;;
1716
esac

regress/limit-keytype.sh

+2-4
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# $OpenBSD: limit-keytype.sh,v 1.10 2021/02/25 03:27:34 djm Exp $
1+
# $OpenBSD: limit-keytype.sh,v 1.11 2025/05/06 06:05:48 djm Exp $
22
# Placed in the Public Domain.
33

44
tid="restrict pubkey type"
@@ -17,7 +17,6 @@ for t in $SSH_KEYTYPES ; do
1717
case "$t" in
1818
ssh-rsa) ktype2=rsa ;;
1919
ecdsa*) ktype3=ecdsa ;; # unused
20-
ssh-dss) ktype4=dsa ;;
2120
[email protected]) ktype5=ed25519-sk ;;
2221
[email protected]) ktype6=ecdsa-sk ;;
2322
esac
@@ -75,7 +74,6 @@ keytype() {
7574
case "$1" in
7675
ecdsa) printf "ecdsa-sha2-*" ;;
7776
ed25519) printf "ssh-ed25519" ;;
78-
dsa) printf "ssh-dss" ;;
7977
rsa) printf "rsa-sha2-256,rsa-sha2-512,ssh-rsa" ;;
8078
sk-ecdsa) printf "sk-ecdsa-*" ;;
8179
sk-ssh-ed25519) printf "sk-ssh-ed25519-*" ;;
@@ -123,7 +121,7 @@ if [ "$ktype1" != "$ktype2" ]; then
123121
fi
124122
${SSH} $opts -i $OBJ/user_key2 proxy true || fatal "key2 failed"
125123

126-
# Allow only DSA in main config, Ed25519 for user.
124+
# Allow only Ed25519 in main config, Ed25519 for user.
127125
verbose "match w/ matching"
128126
prepare_config "PubkeyAcceptedAlgorithms `keytype $ktype4`" \
129127
"Match user $USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"

regress/misc/fuzz-harness/fixed-keys.h

-35
Original file line numberDiff line numberDiff line change
@@ -34,41 +34,6 @@
3434
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDf56l/5UYqgY9oBlet/pLRzK6ZCd12QYGdUVfQDl6HftG0u6DSpjm2HGwFRsYZWv2ZN3ZBfAu6MHBiDmXUw/8WaD7nfXZmDH2keZL6opQttqvSGU2Cm00Rv5o1R3ej2qDdpepebv5meMBXTl5/+bE1E3Zm+4STDtxGmlMlxsEj68XeVe4JedfaSUMj3kaXYBbdYdG1qeosdle4GSONEEMpzsxSr8Y/WGYuIB33l29Tt9mNGUgSw/zjMYQjUVvQv+SY8dw62JV8d+3wK2YL2/r73gms6I8EE1JxX53KuAAY+x0p2v/W8ilCYI2Ijyzc8KIPwntmIFpibQjx+rkb+qdT"
3535
#define CERT_RSA \
3636
"[email protected] AAAAHHNzaC1yc2EtY2VydC12MDFAb3BlbnNzaC5jb20AAAAg89JX6OBMYDSxER8fnU5y8xxeMCHR/hI0uVqdEhNyCpcAAAADAQABAAABAQDf56l/5UYqgY9oBlet/pLRzK6ZCd12QYGdUVfQDl6HftG0u6DSpjm2HGwFRsYZWv2ZN3ZBfAu6MHBiDmXUw/8WaD7nfXZmDH2keZL6opQttqvSGU2Cm00Rv5o1R3ej2qDdpepebv5meMBXTl5/+bE1E3Zm+4STDtxGmlMlxsEj68XeVe4JedfaSUMj3kaXYBbdYdG1qeosdle4GSONEEMpzsxSr8Y/WGYuIB33l29Tt9mNGUgSw/zjMYQjUVvQv+SY8dw62JV8d+3wK2YL2/r73gms6I8EE1JxX53KuAAY+x0p2v/W8ilCYI2Ijyzc8KIPwntmIFpibQjx+rkb+qdTAAAAAAAAA+0AAAABAAAAB3VseXNzZXMAAAAXAAAAB3VseXNzZXMAAAAIb2R5c3NldXMAAAAAAAAAAP//////////AAAAAAAAAIIAAAAVcGVybWl0LVgxMS1mb3J3YXJkaW5nAAAAAAAAABdwZXJtaXQtYWdlbnQtZm9yd2FyZGluZwAAAAAAAAAWcGVybWl0LXBvcnQtZm9yd2FyZGluZwAAAAAAAAAKcGVybWl0LXB0eQAAAAAAAAAOcGVybWl0LXVzZXItcmMAAAAAAAAAAAAAADMAAAALc3NoLWVkMjU1MTkAAAAgM9BeYRUxUuZ4VHJp8oxVaA8OS/z+5EFPCZwQNq1nMwMAAABTAAAAC3NzaC1lZDI1NTE5AAAAQGCDA6PWw4x9bHQl0w7NqifHepumqD3dmyMx+hZGuPRon+TsyCjfytu7hWmV7l9XUF0fPQNFQ7FGat5e+7YUNgE= id_rsa.pub"
37-
#define PRIV_DSA \
38-
"-----BEGIN OPENSSH PRIVATE KEY-----\n"\
39-
"b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABsgAAAAdzc2gtZH\n"\
40-
"NzAAAAgQCsGTfjpQ465EOkfQXJM9BOvfRQE0fqlykAls+ncz+T7hrbeScRu8xpwzsznJNm\n"\
41-
"xlW8o6cUDiHmBJ5OHgamUC9N7YJeU/6fnOAZifgN8mqK6k8pKHuje8ANOiYgHLl0yiASQA\n"\
42-
"3//qMyzZ+W/hemoLSmLAbEqlfWVeyYx+wta1Vm+QAAABUAvWyehvUvdHvQxavYgS5p0t5Q\n"\
43-
"d7UAAACBAIRA9Yy+f4Kzqpv/qICPO3zk42UuP7WAhSW2nCbQdLlCiSTxcjKgcvXNRckwJP\n"\
44-
"44JjSHOtJy/AMtJrPIbLYG6KuWTdBlEHFiG6DafvLG+qPMSL2bPjXTOhuOMbCHIZ+5WBkW\n"\
45-
"THeG/Nv11iI01Of9V6tXkig23K370flkRkXFi9MdAAAAgCt6YUcQkNwG7B/e5M1FZsLP9O\n"\
46-
"kVB3BwLAOjmWdHpyhu3HpwSJa3XLEvhXN0i6IVI2KgPo/2GtYA6rHt14L+6u1pmhh8sAvQ\n"\
47-
"ksp3qZB+xh/NP+hBqf0sbHX0yYbzKOvI5SCc/kKK6yagcBZOsubM/KC8TxyVgmD5c6WzYs\n"\
48-
"h5TEpvAAAB2PHjRbbx40W2AAAAB3NzaC1kc3MAAACBAKwZN+OlDjrkQ6R9Bckz0E699FAT\n"\
49-
"R+qXKQCWz6dzP5PuGtt5JxG7zGnDOzOck2bGVbyjpxQOIeYEnk4eBqZQL03tgl5T/p+c4B\n"\
50-
"mJ+A3yaorqTykoe6N7wA06JiAcuXTKIBJADf/+ozLNn5b+F6agtKYsBsSqV9ZV7JjH7C1r\n"\
51-
"VWb5AAAAFQC9bJ6G9S90e9DFq9iBLmnS3lB3tQAAAIEAhED1jL5/grOqm/+ogI87fOTjZS\n"\
52-
"4/tYCFJbacJtB0uUKJJPFyMqBy9c1FyTAk/jgmNIc60nL8Ay0ms8hstgboq5ZN0GUQcWIb\n"\
53-
"oNp+8sb6o8xIvZs+NdM6G44xsIchn7lYGRZMd4b82/XWIjTU5/1Xq1eSKDbcrfvR+WRGRc\n"\
54-
"WL0x0AAACAK3phRxCQ3AbsH97kzUVmws/06RUHcHAsA6OZZ0enKG7cenBIlrdcsS+Fc3SL\n"\
55-
"ohUjYqA+j/Ya1gDqse3Xgv7q7WmaGHywC9CSynepkH7GH80/6EGp/SxsdfTJhvMo68jlIJ\n"\
56-
"z+QorrJqBwFk6y5sz8oLxPHJWCYPlzpbNiyHlMSm8AAAAUUA+OGldMi76ClO/sstpdbBUE\n"\
57-
"lq8AAAAAAQI=\n"\
58-
"-----END OPENSSH PRIVATE KEY-----\n"
59-
#define PUB_DSA \
60-
"ssh-dss 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"
61-
#define CERT_DSA \
62-
"[email protected] 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 id_dsa.pub"
63-
#define PRIV_ECDSA \
64-
"-----BEGIN OPENSSH PRIVATE KEY-----\n"\
65-
"b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAaAAAABNlY2RzYS\n"\
66-
"1zaGEyLW5pc3RwMjU2AAAACG5pc3RwMjU2AAAAQQTDJ0VlMv+0rguNzaJ1DF2KueHaxRSQ\n"\
67-
"6LpIxGbulrg1a8RPbnMXwag5GcDiDllD2lDUJUuBEWyjXA0rZoZX35ELAAAAoE/Bbr5PwW\n"\
68-
"6+AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMMnRWUy/7SuC43N\n"\
69-
"onUMXYq54drFFJDoukjEZu6WuDVrxE9ucxfBqDkZwOIOWUPaUNQlS4ERbKNcDStmhlffkQ\n"\
70-
"sAAAAhAIhE6hCID5oOm1TDktc++KFKyScjLifcZ6Cgv5xSSyLOAAAAAAECAwQFBgc=\n"\
71-
"-----END OPENSSH PRIVATE KEY-----\n"
7237
#define PUB_ECDSA \
7338
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMMnRWUy/7SuC43NonUMXYq54drFFJDoukjEZu6WuDVrxE9ucxfBqDkZwOIOWUPaUNQlS4ERbKNcDStmhlffkQs="
7439
#define CERT_ECDSA \

regress/misc/fuzz-harness/testdata/create-agent-corpus.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ sleep 1
1414
AGENT_PID=$!
1515
trap "kill $AGENT_PID" EXIT
1616

17-
PRIV="id_dsa id_ecdsa id_ecdsa_sk id_ed25519 id_ed25519_sk id_rsa"
17+
PRIV="id_ecdsa id_ecdsa_sk id_ed25519 id_ed25519_sk id_rsa"
1818

1919
# add keys
2020
ssh-add $PRIV

regress/misc/fuzz-harness/testdata/id_dsa-cert.pub

-1
This file was deleted.

0 commit comments

Comments
 (0)