2013-05-17 07:32:29 +02:00
|
|
|
# $OpenBSD: putty-ciphers.sh,v 1.4 2013/05/17 04:29:14 dtucker Exp $
|
2008-03-12 14:17:00 +01:00
|
|
|
# Placed in the Public Domain.
|
|
|
|
|
|
|
|
tid="putty ciphers"
|
|
|
|
|
|
|
|
if test "x$REGRESS_INTEROP_PUTTY" != "xyes" ; then
|
2009-02-16 05:21:39 +01:00
|
|
|
echo "putty interop tests not enabled"
|
|
|
|
exit 0
|
2008-03-12 14:17:00 +01:00
|
|
|
fi
|
|
|
|
|
2008-11-11 06:55:25 +01:00
|
|
|
for c in aes blowfish 3des arcfour aes128-ctr aes192-ctr aes256-ctr ; do
|
2008-03-12 14:17:00 +01:00
|
|
|
verbose "$tid: cipher $c"
|
|
|
|
cp ${OBJ}/.putty/sessions/localhost_proxy \
|
|
|
|
${OBJ}/.putty/sessions/cipher_$c
|
|
|
|
echo "Cipher=$c" >> ${OBJ}/.putty/sessions/cipher_$c
|
|
|
|
|
|
|
|
rm -f ${COPY}
|
|
|
|
env HOME=$PWD ${PLINK} -load cipher_$c -batch -i putty.rsa2 \
|
|
|
|
127.0.0.1 cat ${DATA} > ${COPY}
|
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
fail "ssh cat $DATA failed"
|
|
|
|
fi
|
|
|
|
cmp ${DATA} ${COPY} || fail "corrupted copy"
|
|
|
|
done
|
|
|
|
rm -f ${COPY}
|
|
|
|
|