diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | regress/conch-ciphers.sh | 12 |
2 files changed, 10 insertions, 7 deletions
@@ -25,6 +25,9 @@ | |||
25 | - djm@cvs.openbsd.org 2008/06/30 10:31:11 | 25 | - djm@cvs.openbsd.org 2008/06/30 10:31:11 |
26 | [regress/{putty-transfer,putty-kex,putty-ciphers}.sh] | 26 | [regress/{putty-transfer,putty-kex,putty-ciphers}.sh] |
27 | remove "set -e" left over from debugging | 27 | remove "set -e" left over from debugging |
28 | - djm@cvs.openbsd.org 2008/06/30 10:43:03 | ||
29 | [regress/conch-ciphers.sh] | ||
30 | explicitly disable conch options that could interfere with the test | ||
28 | - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link | 31 | - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link |
29 | returns EXDEV. Patch from Mike Garrison, ok djm@ | 32 | returns EXDEV. Patch from Mike Garrison, ok djm@ |
30 | h | 33 | h |
@@ -4562,4 +4565,4 @@ h | |||
4562 | OpenServer 6 and add osr5bigcrypt support so when someone migrates | 4565 | OpenServer 6 and add osr5bigcrypt support so when someone migrates |
4563 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ | 4566 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ |
4564 | 4567 | ||
4565 | $Id: ChangeLog,v 1.5056 2008/07/04 07:10:30 dtucker Exp $ | 4568 | $Id: ChangeLog,v 1.5057 2008/07/04 07:11:30 dtucker Exp $ |
diff --git a/regress/conch-ciphers.sh b/regress/conch-ciphers.sh index c371d3030..84b190618 100644 --- a/regress/conch-ciphers.sh +++ b/regress/conch-ciphers.sh | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: conch-ciphers.sh,v 1.1 2008/06/28 13:57:25 djm Exp $ | 1 | # $OpenBSD: conch-ciphers.sh,v 1.2 2008/06/30 10:43:03 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="conch ciphers" | 4 | tid="conch ciphers" |
@@ -6,8 +6,6 @@ tid="conch ciphers" | |||
6 | DATA=/bin/ls | 6 | DATA=/bin/ls |
7 | COPY=${OBJ}/copy | 7 | COPY=${OBJ}/copy |
8 | 8 | ||
9 | set -e | ||
10 | |||
11 | if test "x$REGRESS_INTEROP_CONCH" != "xyes" ; then | 9 | if test "x$REGRESS_INTEROP_CONCH" != "xyes" ; then |
12 | fatal "conch interop tests not enabled" | 10 | fatal "conch interop tests not enabled" |
13 | fi | 11 | fi |
@@ -18,9 +16,11 @@ for c in aes256-ctr aes256-cbc aes192-ctr aes192-cbc aes128-ctr aes128-cbc \ | |||
18 | cast128-cbc blowfish 3des-cbc ; do | 16 | cast128-cbc blowfish 3des-cbc ; do |
19 | verbose "$tid: cipher $c" | 17 | verbose "$tid: cipher $c" |
20 | rm -f ${COPY} | 18 | rm -f ${COPY} |
21 | ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER \ | 19 | # XXX the 2nd "cat" seems to be needed because of buggy FD handling |
22 | --known-hosts $OBJ/known_hosts \ | 20 | # in conch |
23 | 127.0.0.1 cat ${DATA} > ${COPY} 2>/dev/null | 21 | ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \ |
22 | --known-hosts $OBJ/known_hosts --notty --noagent --nox11 -n \ | ||
23 | 127.0.0.1 "cat ${DATA}" 2>/dev/null | cat > ${COPY} | ||
24 | if [ $? -ne 0 ]; then | 24 | if [ $? -ne 0 ]; then |
25 | fail "ssh cat $DATA failed" | 25 | fail "ssh cat $DATA failed" |
26 | fi | 26 | fi |