mirror of
git://anongit.mindrot.org/openssh.git
synced 2025-04-07 18:12:21 +00:00
upstream commit
use ${SSH} for -Q instead of installed ssh
This commit is contained in:
parent
ce1b358ea4
commit
9e1777a0d1
@ -1,4 +1,4 @@
|
|||||||
# $OpenBSD: cipher-speed.sh,v 1.12 2015/03/03 22:35:19 markus Exp $
|
# $OpenBSD: cipher-speed.sh,v 1.13 2015/03/24 20:22:17 markus Exp $
|
||||||
# Placed in the Public Domain.
|
# Placed in the Public Domain.
|
||||||
|
|
||||||
tid="cipher speed"
|
tid="cipher speed"
|
||||||
@ -25,7 +25,7 @@ for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do
|
|||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
# No point trying all MACs for AEAD ciphers since they are ignored.
|
# No point trying all MACs for AEAD ciphers since they are ignored.
|
||||||
if ssh -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
|
if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
|
||||||
break
|
break
|
||||||
fi
|
fi
|
||||||
n=`expr $n + 1`
|
n=`expr $n + 1`
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
# $OpenBSD: hostkey-rotate.sh,v 1.2 2015/03/03 17:53:40 djm Exp $
|
# $OpenBSD: hostkey-rotate.sh,v 1.3 2015/03/24 20:22:17 markus Exp $
|
||||||
# Placed in the Public Domain.
|
# Placed in the Public Domain.
|
||||||
|
|
||||||
tid="hostkey rotate"
|
tid="hostkey rotate"
|
||||||
@ -15,7 +15,7 @@ rm $OBJ/known_hosts
|
|||||||
trace "prepare hostkeys"
|
trace "prepare hostkeys"
|
||||||
nkeys=0
|
nkeys=0
|
||||||
all_algs=""
|
all_algs=""
|
||||||
for k in `ssh -Q key-plain` ; do
|
for k in `${SSH} -Q key-plain` ; do
|
||||||
${SSHKEYGEN} -qt $k -f $OBJ/hkr.$k -N '' || fatal "ssh-keygen $k"
|
${SSHKEYGEN} -qt $k -f $OBJ/hkr.$k -N '' || fatal "ssh-keygen $k"
|
||||||
echo "Hostkey $OBJ/hkr.${k}" >> $OBJ/sshd_proxy.orig
|
echo "Hostkey $OBJ/hkr.${k}" >> $OBJ/sshd_proxy.orig
|
||||||
nkeys=`expr $nkeys + 1`
|
nkeys=`expr $nkeys + 1`
|
||||||
@ -62,7 +62,7 @@ expect_nkeys $nkeys "learn hostkeys"
|
|||||||
check_key_present ssh-rsa || fail "didn't learn keys"
|
check_key_present ssh-rsa || fail "didn't learn keys"
|
||||||
|
|
||||||
# Check each key type
|
# Check each key type
|
||||||
for k in `ssh -Q key-plain` ; do
|
for k in `${SSH} -Q key-plain` ; do
|
||||||
verbose "learn additional hostkeys, type=$k"
|
verbose "learn additional hostkeys, type=$k"
|
||||||
dossh -oStrictHostKeyChecking=yes -oHostKeyAlgorithms=$k,$all_algs
|
dossh -oStrictHostKeyChecking=yes -oHostKeyAlgorithms=$k,$all_algs
|
||||||
expect_nkeys $nkeys "learn hostkeys $k"
|
expect_nkeys $nkeys "learn hostkeys $k"
|
||||||
@ -109,7 +109,7 @@ dossh -oStrictHostKeyChecking=yes -oHostKeyAlgorithms=ssh-rsa
|
|||||||
expect_nkeys 1 "learn hostkeys"
|
expect_nkeys 1 "learn hostkeys"
|
||||||
check_key_present ssh-rsa || fail "didn't learn changed key"
|
check_key_present ssh-rsa || fail "didn't learn changed key"
|
||||||
|
|
||||||
# $OpenBSD: hostkey-rotate.sh,v 1.2 2015/03/03 17:53:40 djm Exp $
|
# $OpenBSD: hostkey-rotate.sh,v 1.3 2015/03/24 20:22:17 markus Exp $
|
||||||
# Placed in the Public Domain.
|
# Placed in the Public Domain.
|
||||||
|
|
||||||
tid="hostkey rotate"
|
tid="hostkey rotate"
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
# $OpenBSD: integrity.sh,v 1.15 2015/01/19 20:42:31 markus Exp $
|
# $OpenBSD: integrity.sh,v 1.16 2015/03/24 20:22:17 markus Exp $
|
||||||
# Placed in the Public Domain.
|
# Placed in the Public Domain.
|
||||||
|
|
||||||
tid="integrity"
|
tid="integrity"
|
||||||
@ -38,7 +38,7 @@ for m in $macs; do
|
|||||||
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
|
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
|
||||||
# modify output from sshd at offset $off
|
# modify output from sshd at offset $off
|
||||||
pxy="proxycommand=$cmd | $OBJ/modpipe -wm xor:$off:1"
|
pxy="proxycommand=$cmd | $OBJ/modpipe -wm xor:$off:1"
|
||||||
if ssh -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
|
if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
|
||||||
echo "Ciphers=$m" >> $OBJ/sshd_proxy
|
echo "Ciphers=$m" >> $OBJ/sshd_proxy
|
||||||
macopt="-c $m"
|
macopt="-c $m"
|
||||||
else
|
else
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
# $OpenBSD: kextype.sh,v 1.5 2014/04/21 22:15:37 djm Exp $
|
# $OpenBSD: kextype.sh,v 1.6 2015/03/24 20:19:15 markus Exp $
|
||||||
# Placed in the Public Domain.
|
# Placed in the Public Domain.
|
||||||
|
|
||||||
tid="login with different key exchange algorithms"
|
tid="login with different key exchange algorithms"
|
||||||
@ -8,7 +8,7 @@ cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
|
|||||||
cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
|
cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
|
||||||
|
|
||||||
# Make server accept all key exchanges.
|
# Make server accept all key exchanges.
|
||||||
ALLKEX=`ssh -Q kex`
|
ALLKEX=`${SSH} -Q kex`
|
||||||
KEXOPT=`echo $ALLKEX | tr ' ' ,`
|
KEXOPT=`echo $ALLKEX | tr ' ' ,`
|
||||||
echo "KexAlgorithms=$KEXOPT" >> $OBJ/sshd_proxy
|
echo "KexAlgorithms=$KEXOPT" >> $OBJ/sshd_proxy
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
# $OpenBSD: try-ciphers.sh,v 1.24 2015/03/03 22:35:19 markus Exp $
|
# $OpenBSD: try-ciphers.sh,v 1.25 2015/03/24 20:22:17 markus Exp $
|
||||||
# Placed in the Public Domain.
|
# Placed in the Public Domain.
|
||||||
|
|
||||||
tid="try ciphers"
|
tid="try ciphers"
|
||||||
@ -19,7 +19,7 @@ for c in `${SSH} -Q cipher`; do
|
|||||||
fi
|
fi
|
||||||
# No point trying all MACs for AEAD ciphers since they
|
# No point trying all MACs for AEAD ciphers since they
|
||||||
# are ignored.
|
# are ignored.
|
||||||
if ssh -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
|
if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
|
||||||
break
|
break
|
||||||
fi
|
fi
|
||||||
n=`expr $n + 1`
|
n=`expr $n + 1`
|
||||||
|
Loading…
Reference in New Issue
Block a user