diff -up openssh-6.2p2/configure.ac.ecc openssh-6.2p2/configure.ac --- openssh-6.2p2/configure.ac.ecc 2013-06-12 15:53:42.507017657 +0200 +++ openssh-6.2p2/configure.ac 2013-06-12 15:53:42.534017598 +0200 @@ -2512,7 +2512,7 @@ AC_SUBST([TEST_SSH_SHA256]) # Check complete ECC support in OpenSSL AC_MSG_CHECKING([whether OpenSSL has complete ECC support]) -AC_LINK_IFELSE( +AC_RUN_IFELSE( [AC_LANG_PROGRAM([[ #include #include @@ -2524,8 +2524,9 @@ AC_LINK_IFELSE( # error "OpenSSL < 0.9.8g has unreliable ECC code" #endif ]], [[ - EC_KEY *e = EC_KEY_new_by_curve_name(NID_secp521r1); + EC_KEY *e = EC_KEY_new_by_curve_name(NID_secp384r1); const EVP_MD *m = EVP_sha512(); /* We need this too */ + exit (e == NULL || m == NULL); ]])], [ AC_MSG_RESULT([yes]) diff -up openssh-6.2p2/regress/kextype.sh.ecc openssh-6.2p2/regress/kextype.sh --- openssh-6.2p2/regress/kextype.sh.ecc 2013-06-12 16:06:39.718376529 +0200 +++ openssh-6.2p2/regress/kextype.sh 2013-06-12 16:06:47.587343883 +0200 @@ -8,7 +8,7 @@ cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak if test "$TEST_SSH_ECC" = "yes"; then - kextypes="ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521" + kextypes="ecdh-sha2-nistp256 ecdh-sha2-nistp384" fi if test "$TEST_SSH_SHA256" = "yes"; then kextypes="$kextypes diffie-hellman-group-exchange-sha256" diff -up openssh-6.2p2/regress/keytype.sh.ecc openssh-6.2p2/regress/keytype.sh --- openssh-6.2p2/regress/keytype.sh.ecc 2012-02-15 08:01:42.000000000 +0100 +++ openssh-6.2p2/regress/keytype.sh 2013-06-12 15:53:42.534017598 +0200 @@ -13,7 +13,7 @@ cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak ktypes="dsa-1024 rsa-2048 rsa-3072" if test "$TEST_SSH_ECC" = "yes"; then - ktypes="$ktypes ecdsa-256 ecdsa-384 ecdsa-521" + ktypes="$ktypes ecdsa-256 ecdsa-384" fi for kt in $ktypes; do