xref: /freebsd/crypto/openssh/regress/conch-ciphers.sh (revision 069ac18495ad8fde2748bc94b0f80a50250bb01d)
1#	$OpenBSD: conch-ciphers.sh,v 1.7 2023/10/26 12:44:07 dtucker Exp $
2#	Placed in the Public Domain.
3
4tid="conch ciphers"
5
6if test "x$REGRESS_INTEROP_CONCH" != "xyes" ; then
7	skip "conch interop tests not enabled"
8fi
9
10if ! [ -t 0 ]; then
11	skip "conch interop tests requires a controlling terminal"
12fi
13
14start_sshd
15
16for c in aes256-ctr aes256-cbc aes192-ctr aes192-cbc aes128-ctr aes128-cbc \
17         cast128-cbc blowfish 3des-cbc ; do
18	verbose "$tid: cipher $c"
19	rm -f ${COPY}
20	# XXX the 2nd "cat" seems to be needed because of buggy FD handling
21	# in conch
22	${CONCH} --identity $OBJ/ssh-ed25519 --port $PORT --user $USER -e none \
23	    --known-hosts $OBJ/known_hosts --notty --noagent --nox11 -n \
24	    127.0.0.1 "cat ${DATA}" 2>/dev/null | cat > ${COPY}
25	if [ $? -ne 0 ]; then
26		fail "ssh cat $DATA failed"
27	fi
28	cmp ${DATA} ${COPY}		|| fail "corrupted copy"
29done
30rm -f ${COPY}
31
32