summaryrefslogtreecommitdiff
path: root/regress/integrity.sh
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2013-11-07 15:21:19 +1100
committerDarren Tucker <dtucker@zip.com.au>2013-11-07 15:21:19 +1100
commita955041c930e63405159ff7d25ef14272f36eab3 (patch)
tree139a60ab9b18607e959263b6db52dae4573fc37f /regress/integrity.sh
parent06595d639577577bc15d359e037a31eb83563269 (diff)
- dtucker@cvs.openbsd.org 2013/11/07 02:48:38
[regress/integrity.sh regress/cipher-speed.sh regress/try-ciphers.sh] Use ssh -Q instead of hardcoding lists of ciphers or MACs.
Diffstat (limited to 'regress/integrity.sh')
-rw-r--r--regress/integrity.sh14
1 files changed, 3 insertions, 11 deletions
diff --git a/regress/integrity.sh b/regress/integrity.sh
index 1d17fe10a..de2b8d05a 100644
--- a/regress/integrity.sh
+++ b/regress/integrity.sh
@@ -1,4 +1,4 @@
1# $OpenBSD: integrity.sh,v 1.10 2013/05/17 01:32:11 dtucker Exp $ 1# $OpenBSD: integrity.sh,v 1.11 2013/11/07 02:48:38 dtucker Exp $
2# Placed in the Public Domain. 2# Placed in the Public Domain.
3 3
4tid="integrity" 4tid="integrity"
@@ -8,18 +8,10 @@ tid="integrity"
8# XXX and ssh tries to read... 8# XXX and ssh tries to read...
9tries=10 9tries=10
10startoffset=2900 10startoffset=2900
11macs="hmac-sha1 hmac-md5 umac-64@openssh.com umac-128@openssh.com 11macs=`${SSH} -Q mac`
12 hmac-sha1-96 hmac-md5-96
13 hmac-sha1-etm@openssh.com hmac-md5-etm@openssh.com
14 umac-64-etm@openssh.com umac-128-etm@openssh.com
15 hmac-sha1-96-etm@openssh.com hmac-md5-96-etm@openssh.com"
16config_defined HAVE_EVP_SHA256 &&
17 macs="$macs hmac-sha2-256 hmac-sha2-512
18 hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com"
19# The following are not MACs, but ciphers with integrated integrity. They are 12# The following are not MACs, but ciphers with integrated integrity. They are
20# handled specially below. 13# handled specially below.
21config_defined OPENSSL_HAVE_EVPGCM && \ 14macs="$macs `${SSH} -Q cipher | grep gcm@openssh.com`"
22 macs="$macs aes128-gcm@openssh.com aes256-gcm@openssh.com"
23 15
24# avoid DH group exchange as the extra traffic makes it harder to get the 16# avoid DH group exchange as the extra traffic makes it harder to get the
25# offset into the stream right. 17# offset into the stream right.