xref: /freebsd/crypto/openssh/regress/conch-ciphers.sh (revision f4b37ed0f8b307b1f3f0f630ca725d68f1dff30d)
1#	$OpenBSD: conch-ciphers.sh,v 1.3 2013/05/17 04:29:14 dtucker Exp $
2#	Placed in the Public Domain.
3
4tid="conch ciphers"
5
6if test "x$REGRESS_INTEROP_CONCH" != "xyes" ; then
7	echo "conch interop tests not enabled"
8	exit 0
9fi
10
11start_sshd
12
13for c in aes256-ctr aes256-cbc aes192-ctr aes192-cbc aes128-ctr aes128-cbc \
14         cast128-cbc blowfish 3des-cbc ; do
15	verbose "$tid: cipher $c"
16	rm -f ${COPY}
17	# XXX the 2nd "cat" seems to be needed because of buggy FD handling
18	# in conch
19	${CONCH} --identity $OBJ/rsa --port $PORT --user $USER  -e none \
20	    --known-hosts $OBJ/known_hosts --notty --noagent --nox11 -n \
21	    127.0.0.1 "cat ${DATA}" 2>/dev/null | cat > ${COPY}
22	if [ $? -ne 0 ]; then
23		fail "ssh cat $DATA failed"
24	fi
25	cmp ${DATA} ${COPY}		|| fail "corrupted copy"
26done
27rm -f ${COPY}
28
29