Age | Commit message (Collapse) | Author |
|
[regress/cipher-speed.sh regress/integrity.sh regress/rekey.sh]
[regress/try-ciphers.sh]
use new "ssh -Q cipher-auth" query to obtain lists of authenticated
encryption ciphers instead of specifying them manually; ensures that
the new chacha20poly1305@openssh.com mode is tested;
ok markus@ and naddy@ as part of the diff to add
chacha20poly1305@openssh.com
|
|
[regress/integrity.sh regress/cipher-speed.sh regress/try-ciphers.sh]
Use ssh -Q instead of hardcoding lists of ciphers or MACs.
|
|
[regress/try-ciphers.sh]
use expr for math to keep diffs vs portable down
(id sync only)
|
|
|
|
|
|
[try-ciphers.sh]
remove acss here too
|
|
check for GCM support before testing GCM ciphers.
|
|
[regress/cipher-speed.sh regress/integrity.sh regress/try-ciphers.sh]
test AES-GCM modes; feedback markus@
|
|
[try-ciphers.sh]
add hmac-ripemd160-etm@openssh.com
|
|
[regress/try-ciphers.sh]
add etm modes
|
|
[regress/cipher-speed.sh regress/try-ciphers.sh]
Add umac-128@openssh.com to the list of MACs to be tested
|
|
[regress/try-ciphers.sh]
Restore missing space. (Id sync only).
|
|
[regress/try-ciphers.sh regress/cipher-speed.sh]
Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removed
from draft6 of the spec and will not be in the RFC when published. Patch
from mdb at juniper net via bz#2023, ok markus
|
|
MAC tests for platforms that hack EVP_SHA2 support
|
|
[regress/cipher-speed.sh regress/try-ciphers.sh]
add SHA256/SHA512 based HMAC modes
|
|
[regress/cipher-speed.sh regress/try-ciphers.sh]
test umac-64@openssh.com
ok djm@
|
|
[regress/try-ciphers.sh]
oops, new arcfour modes here too
|
|
|
|
built with openssl < 0.9.7)
|
|
[regress/try-ciphers.sh]
Test acss too; ok markus@
|
|
- markus@cvs.openbsd.org 2003/06/12 15:40:01
[try-ciphers.sh]
add ctr
|
|
|