diff options
author | Darren Tucker <dtucker@zip.com.au> | 2013-11-07 15:21:19 +1100 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2013-11-07 15:21:19 +1100 |
commit | a955041c930e63405159ff7d25ef14272f36eab3 (patch) | |
tree | 139a60ab9b18607e959263b6db52dae4573fc37f /regress/integrity.sh | |
parent | 06595d639577577bc15d359e037a31eb83563269 (diff) |
- dtucker@cvs.openbsd.org 2013/11/07 02:48:38
[regress/integrity.sh regress/cipher-speed.sh regress/try-ciphers.sh]
Use ssh -Q instead of hardcoding lists of ciphers or MACs.
Diffstat (limited to 'regress/integrity.sh')
-rw-r--r-- | regress/integrity.sh | 14 |
1 files changed, 3 insertions, 11 deletions
diff --git a/regress/integrity.sh b/regress/integrity.sh index 1d17fe10a..de2b8d05a 100644 --- a/regress/integrity.sh +++ b/regress/integrity.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: integrity.sh,v 1.10 2013/05/17 01:32:11 dtucker Exp $ | 1 | # $OpenBSD: integrity.sh,v 1.11 2013/11/07 02:48:38 dtucker Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="integrity" | 4 | tid="integrity" |
@@ -8,18 +8,10 @@ tid="integrity" | |||
8 | # XXX and ssh tries to read... | 8 | # XXX and ssh tries to read... |
9 | tries=10 | 9 | tries=10 |
10 | startoffset=2900 | 10 | startoffset=2900 |
11 | macs="hmac-sha1 hmac-md5 umac-64@openssh.com umac-128@openssh.com | 11 | macs=`${SSH} -Q mac` |
12 | hmac-sha1-96 hmac-md5-96 | ||
13 | hmac-sha1-etm@openssh.com hmac-md5-etm@openssh.com | ||
14 | umac-64-etm@openssh.com umac-128-etm@openssh.com | ||
15 | hmac-sha1-96-etm@openssh.com hmac-md5-96-etm@openssh.com" | ||
16 | config_defined HAVE_EVP_SHA256 && | ||
17 | macs="$macs hmac-sha2-256 hmac-sha2-512 | ||
18 | hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com" | ||
19 | # The following are not MACs, but ciphers with integrated integrity. They are | 12 | # The following are not MACs, but ciphers with integrated integrity. They are |
20 | # handled specially below. | 13 | # handled specially below. |
21 | config_defined OPENSSL_HAVE_EVPGCM && \ | 14 | macs="$macs `${SSH} -Q cipher | grep gcm@openssh.com`" |
22 | macs="$macs aes128-gcm@openssh.com aes256-gcm@openssh.com" | ||
23 | 15 | ||
24 | # avoid DH group exchange as the extra traffic makes it harder to get the | 16 | # avoid DH group exchange as the extra traffic makes it harder to get the |
25 | # offset into the stream right. | 17 | # offset into the stream right. |