271dcc6a42
This completely removes client-side support for the SSH 1 protocol, which was already disabled in 12 but is still enabled in 11. For that reason, we will not be able to merge 7.6p1 or newer back to 11.
33 lines
799 B
Bash
33 lines
799 B
Bash
# $OpenBSD: cipher-speed.sh,v 1.14 2017/04/30 23:34:55 djm Exp $
|
|
# Placed in the Public Domain.
|
|
|
|
tid="cipher speed"
|
|
|
|
getbytes ()
|
|
{
|
|
sed -n -e '/transferred/s/.*secs (\(.* bytes.sec\).*/\1/p' \
|
|
-e '/copied/s/.*s, \(.* MB.s\).*/\1/p'
|
|
}
|
|
|
|
tries="1 2"
|
|
|
|
for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do
|
|
trace "cipher $c mac $m"
|
|
for x in $tries; do
|
|
printf "%-60s" "$c/$m:"
|
|
( ${SSH} -o 'compression no' \
|
|
-F $OBJ/ssh_proxy -m $m -c $c somehost \
|
|
exec sh -c \'"dd of=/dev/null obs=32k"\' \
|
|
< ${DATA} ) 2>&1 | getbytes
|
|
|
|
if [ $? -ne 0 ]; then
|
|
fail "ssh failed with mac $m cipher $c"
|
|
fi
|
|
done
|
|
# No point trying all MACs for AEAD ciphers since they are ignored.
|
|
if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
|
|
break
|
|
fi
|
|
n=`expr $n + 1`
|
|
done; done
|