Created attachment 2891 [details] Fix PuTTY interop tests The PuTTY interop tests require manual interaction to enter a passphrase. Even after doing so, they fail as follows, and have done for some time: run test putty-transfer.sh ... Enter passphrase to save key: Re-enter passphrase to verify: putty transfer data: proto 2 compression 0 WARNING - POTENTIAL SECURITY BREACH! The server's host key does not match the one PuTTY has cached. This means that either the server administrator has changed the host key, or you have actually connected to another computer pretending to be the server. The new rsa2 key fingerprint is: ssh-rsa 2048 6d:a7:9e:cf:0c:16:a2:9e:2c:99:d9:de:cd:8c:08:c6 Connection abandoned. cmp: EOF on /tmp/tmp.L0zo5sPJ8w/tree/regress/copy corrupted copy [... lots of similar output ...] failed putty transfer data Makefile:203: recipe for target 't-exec-interop' failed The attached patch fixes all this.
Thanks, I'll look at this for 7.4 when I get a chance.
Applied to OpenBSD, will be pulled into portable during the next sync. Thanks.
Close all resolved bugs after release of OpenSSH 7.7.