diff options
author | Darren Tucker <dtucker@cvs.openbsd.org> | 2018-10-31 11:09:28 +0000 |
---|---|---|
committer | Darren Tucker <dtucker@cvs.openbsd.org> | 2018-10-31 11:09:28 +0000 |
commit | cb0d18238e3d386dc0b72491387939d52da38530 (patch) | |
tree | f8dea4db0626163cb57cb30f77ca5ce1f944210f /regress/usr.bin | |
parent | ccc3272fdc64e0c7f2ad334e1289332bb2940a71 (diff) |
UsePrivilegeSeparation no is deprecated, test "yes" and "sandbox".
rCVS: ----------------------------------------------------------------------
Diffstat (limited to 'regress/usr.bin')
-rw-r--r-- | regress/usr.bin/ssh/cert-hostkey.sh | 6 | ||||
-rw-r--r-- | regress/usr.bin/ssh/cert-userkey.sh | 4 | ||||
-rw-r--r-- | regress/usr.bin/ssh/multipubkey.sh | 4 | ||||
-rw-r--r-- | regress/usr.bin/ssh/principals-command.sh | 4 |
4 files changed, 9 insertions, 9 deletions
diff --git a/regress/usr.bin/ssh/cert-hostkey.sh b/regress/usr.bin/ssh/cert-hostkey.sh index d2ecd318bea..3ce777967a5 100644 --- a/regress/usr.bin/ssh/cert-hostkey.sh +++ b/regress/usr.bin/ssh/cert-hostkey.sh @@ -1,4 +1,4 @@ -# $OpenBSD: cert-hostkey.sh,v 1.16 2018/07/03 11:43:49 djm Exp $ +# $OpenBSD: cert-hostkey.sh,v 1.17 2018/10/31 11:09:27 dtucker Exp $ # Placed in the Public Domain. tid="certified host keys" @@ -127,7 +127,7 @@ attempt_connect() { } # Basic connect and revocation tests. -for privsep in yes no ; do +for privsep in yes sandbox ; do for ktype in $PLAIN_TYPES ; do verbose "$tid: host ${ktype} cert connect privsep $privsep" ( @@ -165,7 +165,7 @@ for ktype in $PLAIN_TYPES ; do kh_revoke cert_host_key_${ktype}.pub >> $OBJ/known_hosts-cert.orig done cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert -for privsep in yes no ; do +for privsep in yes sandbox ; do for ktype in $PLAIN_TYPES ; do verbose "$tid: host ${ktype} revoked cert privsep $privsep" ( diff --git a/regress/usr.bin/ssh/cert-userkey.sh b/regress/usr.bin/ssh/cert-userkey.sh index 30c2c156d2f..6849e992264 100644 --- a/regress/usr.bin/ssh/cert-userkey.sh +++ b/regress/usr.bin/ssh/cert-userkey.sh @@ -1,4 +1,4 @@ -# $OpenBSD: cert-userkey.sh,v 1.19 2018/03/12 00:54:04 djm Exp $ +# $OpenBSD: cert-userkey.sh,v 1.20 2018/10/31 11:09:27 dtucker Exp $ # Placed in the Public Domain. tid="certified user keys" @@ -47,7 +47,7 @@ done # Test explicitly-specified principals for ktype in $EXTRA_TYPES $PLAIN_TYPES ; do t=$(kname $ktype) - for privsep in yes no ; do + for privsep in yes sandbox ; do _prefix="${ktype} privsep $privsep" # Setup for AuthorizedPrincipalsFile diff --git a/regress/usr.bin/ssh/multipubkey.sh b/regress/usr.bin/ssh/multipubkey.sh index e9d15306ff2..4d443ec45da 100644 --- a/regress/usr.bin/ssh/multipubkey.sh +++ b/regress/usr.bin/ssh/multipubkey.sh @@ -1,4 +1,4 @@ -# $OpenBSD: multipubkey.sh,v 1.1 2014/12/22 08:06:03 djm Exp $ +# $OpenBSD: multipubkey.sh,v 1.2 2018/10/31 11:09:27 dtucker Exp $ # Placed in the Public Domain. tid="multiple pubkey" @@ -31,7 +31,7 @@ grep -v IdentityFile $OBJ/ssh_proxy.orig > $OBJ/ssh_proxy opts="-oProtocol=2 -F $OBJ/ssh_proxy -oIdentitiesOnly=yes" opts="$opts -i $OBJ/cert_user_key1 -i $OBJ/user_key1 -i $OBJ/user_key2" -for privsep in no yes; do +for privsep in yes sandbox ; do ( grep -v "Protocol" $OBJ/sshd_proxy.orig echo "Protocol 2" diff --git a/regress/usr.bin/ssh/principals-command.sh b/regress/usr.bin/ssh/principals-command.sh index 280d2c89ed3..adfcd82164d 100644 --- a/regress/usr.bin/ssh/principals-command.sh +++ b/regress/usr.bin/ssh/principals-command.sh @@ -1,4 +1,4 @@ -# $OpenBSD: principals-command.sh,v 1.4 2017/04/30 23:34:55 djm Exp $ +# $OpenBSD: principals-command.sh,v 1.5 2018/10/31 11:09:27 dtucker Exp $ # Placed in the Public Domain. tid="authorized principals command" @@ -47,7 +47,7 @@ test $? -eq 0 || fatal "couldn't prepare principals command" $SUDO chmod 0755 "$PRINCIPALS_COMMAND" # Test explicitly-specified principals -for privsep in yes no ; do +for privsep in yes sandbox ; do _prefix="privsep $privsep" # Setup for AuthorizedPrincipalsCommand |