diff options
author | Jeff Forcier <jeff@bitprophet.org> | 2023-05-17 20:51:47 -0400 |
---|---|---|
committer | Jeff Forcier <jeff@bitprophet.org> | 2023-05-18 13:57:19 -0400 |
commit | 6e5aea5fb1cb56b32541e3cb24b27dc8fdfb0598 (patch) | |
tree | c129d0ef9434ce63b1a85d96ba36283aaba4e311 /tests/test_client.py | |
parent | 042cf8cf1afd05fb9f42e39ce1a9838ee734091e (diff) |
Test AgentKey.asbytes
Plus related twiddling of test key files
Diffstat (limited to 'tests/test_client.py')
-rw-r--r-- | tests/test_client.py | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/tests/test_client.py b/tests/test_client.py index 5ce6f0a2..1c0c6c84 100644 --- a/tests/test_client.py +++ b/tests/test_client.py @@ -327,7 +327,7 @@ class SSHClientTest(ClientTest): # They're similar except for which path is given; the expected auth and # server-side behavior is 100% identical.) # NOTE: only bothered whipping up one cert per overall class/family. - for type_ in ("rsa", "dss", "ecdsa_256", "ed25519"): + for type_ in ("rsa", "dss", "ecdsa-256", "ed25519"): key_path = _support(f"{type_}.key") self._test_connection( key_filename=key_path, @@ -342,7 +342,7 @@ class SSHClientTest(ClientTest): # about the server-side key object's public blob. Thus, we can prove # that a specific cert was found, along with regular authorization # succeeding proving that the overall flow works. - for type_ in ("rsa", "dss", "ecdsa_256", "ed25519"): + for type_ in ("rsa", "dss", "ecdsa-256", "ed25519"): key_path = _support(f"{type_}.key") self._test_connection( key_filename=key_path, |