mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-28 21:22:07 +00:00
59d928d3b4
[regress/sftp.sh regress/putty-ciphers.sh regress/cipher-speed.sh regress/test-exec.sh regress/sftp-batch.sh regress/dynamic-forward.sh regress/putty-transfer.sh regress/conch-ciphers.sh regress/sftp-cmds.sh regress/scp.sh regress/ssh-com-sftp.sh regress/rekey.sh regress/putty-kex.sh regress/stderr-data.sh regress/stderr-after-eof.sh regress/sftp-badcmds.sh regress/reexec.sh regress/ssh-com-client.sh regress/sftp-chroot.sh regress/forwarding.sh regress/transfer.sh regress/multiplex.sh] Move the setting of DATA and COPY into test-exec.sh
59 lines
1.5 KiB
Bash
59 lines
1.5 KiB
Bash
# $OpenBSD: cipher-speed.sh,v 1.9 2013/05/17 04:29:14 dtucker Exp $
|
|
# Placed in the Public Domain.
|
|
|
|
tid="cipher speed"
|
|
|
|
getbytes ()
|
|
{
|
|
sed -n -e '/transferred/s/.*secs (\(.* bytes.sec\).*/\1/p' \
|
|
-e '/copied/s/.*s, \(.* MB.s\).*/\1/p'
|
|
}
|
|
|
|
tries="1 2"
|
|
|
|
ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc
|
|
arcfour128 arcfour256 arcfour
|
|
aes192-cbc aes256-cbc rijndael-cbc@lysator.liu.se
|
|
aes128-ctr aes192-ctr aes256-ctr"
|
|
config_defined OPENSSL_HAVE_EVPGCM && \
|
|
ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com"
|
|
macs="hmac-sha1 hmac-md5 umac-64@openssh.com umac-128@openssh.com
|
|
hmac-sha1-96 hmac-md5-96"
|
|
config_defined HAVE_EVP_SHA256 && \
|
|
macs="$macs hmac-sha2-256 hmac-sha2-512"
|
|
|
|
for c in $ciphers; do n=0; for m in $macs; do
|
|
trace "proto 2 cipher $c mac $m"
|
|
for x in $tries; do
|
|
printf "%-60s" "$c/$m:"
|
|
( ${SSH} -o 'compression no' \
|
|
-F $OBJ/ssh_proxy -2 -m $m -c $c somehost \
|
|
exec sh -c \'"dd of=/dev/null obs=32k"\' \
|
|
< ${DATA} ) 2>&1 | getbytes
|
|
|
|
if [ $? -ne 0 ]; then
|
|
fail "ssh -2 failed with mac $m cipher $c"
|
|
fi
|
|
done
|
|
# No point trying all MACs for GCM since they are ignored.
|
|
case $c in
|
|
aes*-gcm@openssh.com) test $n -gt 0 && break;;
|
|
esac
|
|
n=`expr $n + 1`
|
|
done; done
|
|
|
|
ciphers="3des blowfish"
|
|
for c in $ciphers; do
|
|
trace "proto 1 cipher $c"
|
|
for x in $tries; do
|
|
printf "%-60s" "$c:"
|
|
( ${SSH} -o 'compression no' \
|
|
-F $OBJ/ssh_proxy -1 -c $c somehost \
|
|
exec sh -c \'"dd of=/dev/null obs=32k"\' \
|
|
< ${DATA} ) 2>&1 | getbytes
|
|
if [ $? -ne 0 ]; then
|
|
fail "ssh -1 failed with cipher $c"
|
|
fi
|
|
done
|
|
done
|