kentpeacock / rpms / openssh

Forked from rpms/openssh 2 years ago
Clone
Blob Blame History Raw
diff -up openssh-6.2p2/configure.ac.ecc openssh-6.2p2/configure.ac
--- openssh-6.2p2/configure.ac.ecc	2013-06-12 15:53:42.507017657 +0200
+++ openssh-6.2p2/configure.ac	2013-06-12 15:53:42.534017598 +0200
@@ -2512,7 +2512,7 @@ AC_SUBST([TEST_SSH_SHA256])
 
 # Check complete ECC support in OpenSSL
 AC_MSG_CHECKING([whether OpenSSL has complete ECC support])
-AC_LINK_IFELSE(
+AC_RUN_IFELSE(
 	[AC_LANG_PROGRAM([[
 #include <openssl/ec.h>
 #include <openssl/ecdh.h>
@@ -2524,8 +2524,9 @@ AC_LINK_IFELSE(
 # error "OpenSSL < 0.9.8g has unreliable ECC code"
 #endif
 	]], [[
-	EC_KEY *e = EC_KEY_new_by_curve_name(NID_secp521r1);
+	EC_KEY *e = EC_KEY_new_by_curve_name(NID_secp384r1);
 	const EVP_MD *m = EVP_sha512(); /* We need this too */
+	exit (e == NULL || m == NULL);
 	]])],
 	[
 		AC_MSG_RESULT([yes])
diff -up openssh-6.2p2/regress/kextype.sh.ecc openssh-6.2p2/regress/kextype.sh
--- openssh-6.2p2/regress/kextype.sh.ecc	2013-06-12 16:06:39.718376529 +0200
+++ openssh-6.2p2/regress/kextype.sh	2013-06-12 16:06:47.587343883 +0200
@@ -8,7 +8,7 @@ cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
 cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
 
 if test "$TEST_SSH_ECC" = "yes"; then
-	kextypes="ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521"
+	kextypes="ecdh-sha2-nistp256 ecdh-sha2-nistp384"
 fi
 if test "$TEST_SSH_SHA256" = "yes"; then
 	kextypes="$kextypes diffie-hellman-group-exchange-sha256"
diff -up openssh-6.2p2/regress/keytype.sh.ecc openssh-6.2p2/regress/keytype.sh
--- openssh-6.2p2/regress/keytype.sh.ecc	2012-02-15 08:01:42.000000000 +0100
+++ openssh-6.2p2/regress/keytype.sh	2013-06-12 15:53:42.534017598 +0200
@@ -13,7 +13,7 @@ cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
 
 ktypes="dsa-1024 rsa-2048 rsa-3072"
 if test "$TEST_SSH_ECC" = "yes"; then
-	ktypes="$ktypes ecdsa-256 ecdsa-384 ecdsa-521"
+	ktypes="$ktypes ecdsa-256 ecdsa-384"
 fi
 
 for kt in $ktypes; do