2023-10-25 10:01:59 +02:00
|
|
|
# $OpenBSD: conch-ciphers.sh,v 1.6 2023/10/25 08:01:59 anton Exp $
|
2008-06-30 00:07:56 +02:00
|
|
|
# Placed in the Public Domain.
|
|
|
|
|
|
|
|
tid="conch ciphers"
|
|
|
|
|
|
|
|
if test "x$REGRESS_INTEROP_CONCH" != "xyes" ; then
|
2023-10-25 10:01:59 +02:00
|
|
|
fatal "conch interop tests not enabled"
|
|
|
|
fi
|
|
|
|
|
|
|
|
if ! [ -t 0 ]; then
|
|
|
|
skip "conch interop tests requires a controlling terminal"
|
2008-06-30 00:07:56 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
start_sshd
|
|
|
|
|
|
|
|
for c in aes256-ctr aes256-cbc aes192-ctr aes192-cbc aes128-ctr aes128-cbc \
|
|
|
|
cast128-cbc blowfish 3des-cbc ; do
|
|
|
|
verbose "$tid: cipher $c"
|
|
|
|
rm -f ${COPY}
|
2008-07-04 09:11:30 +02:00
|
|
|
# XXX the 2nd "cat" seems to be needed because of buggy FD handling
|
|
|
|
# in conch
|
2023-10-23 13:30:49 +02:00
|
|
|
${CONCH} --identity $OBJ/ssh-ed25519 --port $PORT --user $USER -e none \
|
2008-07-04 09:11:30 +02:00
|
|
|
--known-hosts $OBJ/known_hosts --notty --noagent --nox11 -n \
|
|
|
|
127.0.0.1 "cat ${DATA}" 2>/dev/null | cat > ${COPY}
|
2008-06-30 00:07:56 +02:00
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
fail "ssh cat $DATA failed"
|
|
|
|
fi
|
|
|
|
cmp ${DATA} ${COPY} || fail "corrupted copy"
|
|
|
|
done
|
|
|
|
rm -f ${COPY}
|
|
|
|
|