diff options
author | Alex Wilson <[email protected]> | 2014-08-28 11:13:57 +1000 |
---|---|---|
committer | Alex Wilson <[email protected]> | 2014-08-28 11:13:57 +1000 |
commit | cf53a360685b1a01a5c7fc0e06660ce8d76d96b0 (patch) | |
tree | 82f187ca8b58b21ff3ca72ace1dc51a2d7bbe75b /lib/ssh/test | |
parent | ccf1e0385fe0877279141acdcb0ac4f43e5596e4 (diff) | |
download | otp-cf53a360685b1a01a5c7fc0e06660ce8d76d96b0.tar.gz otp-cf53a360685b1a01a5c7fc0e06660ce8d76d96b0.tar.bz2 otp-cf53a360685b1a01a5c7fc0e06660ce8d76d96b0.zip |
SSH: only enable ciphers/MACs when they are available in crypto
Also adjusts tests to only expect a positive outcome when
crypto supports the relevant base ciphers/MACs.
Diffstat (limited to 'lib/ssh/test')
-rw-r--r-- | lib/ssh/test/ssh_to_openssh_SUITE.erl | 20 |
1 files changed, 13 insertions, 7 deletions
diff --git a/lib/ssh/test/ssh_to_openssh_SUITE.erl b/lib/ssh/test/ssh_to_openssh_SUITE.erl index 5a3bd21b55..e003b135b1 100644 --- a/lib/ssh/test/ssh_to_openssh_SUITE.erl +++ b/lib/ssh/test/ssh_to_openssh_SUITE.erl @@ -237,10 +237,14 @@ erlang_server_openssh_client_cipher_suites(Config) when is_list(Config) -> ct:sleep(500), - Ciphers = [{"3des-cbc", true}, - {"aes128-cbc", true}, - {"aes128-ctr", true}, - {"aes256-cbc", false}], + Supports = crypto:supports(), + Ciphers = proplists:get_value(ciphers, Supports), + Tests = [ + {"3des-cbc", lists:member(des3_cbc, Ciphers)}, + {"aes128-cbc", lists:member(aes_cbc128, Ciphers)}, + {"aes128-ctr", lists:member(aes_ctr, Ciphers)}, + {"aes256-cbc", false} + ], lists:foreach(fun({Cipher, Expect}) -> Cmd = "ssh -p " ++ integer_to_list(Port) ++ " -o UserKnownHostsFile=" ++ KnownHosts ++ " " ++ Host ++ " " ++ @@ -266,7 +270,7 @@ erlang_server_openssh_client_cipher_suites(Config) when is_list(Config) -> ct:fail("Did not receive no matching cipher message") end end - end, Ciphers), + end, Tests), ssh:stop_daemon(Pid). @@ -285,8 +289,10 @@ erlang_server_openssh_client_macs(Config) when is_list(Config) -> ct:sleep(500), - MACs = [{"hmac-sha1", true}, - {"hmac-sha2-256", true}, + Supports = crypto:supports(), + Hashs = proplists:get_value(hashs, Supports), + MACs = [{"hmac-sha1", lists:member(sha, Hashs)}, + {"hmac-sha2-256", lists:member(sha256, Hashs)}, {"hmac-md5-96", false}, {"hmac-ripemd160", false}], lists:foreach(fun({MAC, Expect}) -> |