summaryrefslogtreecommitdiff
path: root/tests/sshserver.pl
diff options
context:
space:
mode:
authorDan Fandrich <dan@coneharvesters.com>2007-07-18 00:27:13 +0000
committerDan Fandrich <dan@coneharvesters.com>2007-07-18 00:27:13 +0000
commit89d119646d124c642b5b4d39227e69314e2b7879 (patch)
tree7e2f6f68a914efc3d595057c2a5a858ccfd1df1f /tests/sshserver.pl
parent989dd9c34abd98ab061c4c29f6697d30111e73f4 (diff)
downloadcurl-89d119646d124c642b5b4d39227e69314e2b7879.tar.gz
Use 512 bit keys to reduce the time taken to generate them. This shouldn't
really reduce security since in the common case of a daily automated build the keys are only used for a single test run lasting a few minutes before being deleted.
Diffstat (limited to 'tests/sshserver.pl')
-rw-r--r--tests/sshserver.pl4
1 files changed, 2 insertions, 2 deletions
diff --git a/tests/sshserver.pl b/tests/sshserver.pl
index d6802ea38..38e7e7780 100644
--- a/tests/sshserver.pl
+++ b/tests/sshserver.pl
@@ -147,8 +147,8 @@ if (! -e "curl_client_key.pub") {
}
# Make sure all files are gone so ssh-keygen doesn't complain
unlink("curl_host_dsa_key", "curl_client_key","curl_host_dsa_key.pub", "curl_client_key.pub");
- system "ssh-keygen -q -t dsa -f curl_host_dsa_key -C 'curl test server' -N ''" and die "Could not generate host key";
- system "ssh-keygen -q -t dsa -f curl_client_key -C 'curl test client' -N ''" and die "Could not generate client key";
+ system "ssh-keygen -q -t dsa -b 512 -f curl_host_dsa_key -C 'curl test server' -N ''" and die "Could not generate host key";
+ system "ssh-keygen -q -t dsa -b 512 -f curl_client_key -C 'curl test client' -N ''" and die "Could not generate client key";
}
open(FILE, ">>$conffile") || die "Could not write $conffile";