- djm@cvs.openbsd.org 2008/11/10 02:06:35

[regress/putty-ciphers.sh]
     PuTTY supports AES CTR modes, so interop test against them too
This commit is contained in:
Darren Tucker 2008-11-11 16:55:25 +11:00
parent 22662e880f
commit 4a6f62d4ae
2 changed files with 6 additions and 3 deletions

View File

@ -26,6 +26,9 @@
[channels.c]
for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
permitopen's; ok and input dtucker@
- djm@cvs.openbsd.org 2008/11/10 02:06:35
[regress/putty-ciphers.sh]
PuTTY supports AES CTR modes, so interop test against them too
20081105
- OpenBSD CVS Sync
@ -4918,4 +4921,4 @@
OpenServer 6 and add osr5bigcrypt support so when someone migrates
passwords between UnixWare and OpenServer they will still work. OK dtucker@
$Id: ChangeLog,v 1.5139 2008/11/11 05:40:22 dtucker Exp $
$Id: ChangeLog,v 1.5140 2008/11/11 05:55:25 dtucker Exp $

View File

@ -1,4 +1,4 @@
# $OpenBSD: putty-ciphers.sh,v 1.2 2008/06/30 10:31:11 djm Exp $
# $OpenBSD: putty-ciphers.sh,v 1.3 2008/11/10 02:06:35 djm Exp $
# Placed in the Public Domain.
tid="putty ciphers"
@ -10,7 +10,7 @@ if test "x$REGRESS_INTEROP_PUTTY" != "xyes" ; then
fatal "putty interop tests not enabled"
fi
for c in aes blowfish 3des arcfour ; do
for c in aes blowfish 3des arcfour aes128-ctr aes192-ctr aes256-ctr ; do
verbose "$tid: cipher $c"
cp ${OBJ}/.putty/sessions/localhost_proxy \
${OBJ}/.putty/sessions/cipher_$c