1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-19 10:53:58 +00:00
freebsd/regress/keytype.sh

74 lines
1.9 KiB
Bash
Raw Normal View History

2015-08-26 09:25:17 +00:00
# $OpenBSD: keytype.sh,v 1.4 2015/07/10 06:23:25 markus Exp $
2011-02-17 11:47:40 +00:00
# Placed in the Public Domain.
tid="login with different key types"
2012-08-29 15:46:01 +00:00
TIME=`which time 2>/dev/null`
2011-02-17 11:47:40 +00:00
if test ! -x "$TIME"; then
TIME=""
fi
cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
2014-01-30 10:56:49 +00:00
# Traditional and builtin key types.
ktypes="dsa-1024 rsa-2048 rsa-3072 ed25519-512"
# Types not present in all OpenSSL versions.
for i in `$SSH -Q key`; do
case "$i" in
ecdsa-sha2-nistp256) ktypes="$ktypes ecdsa-256" ;;
ecdsa-sha2-nistp384) ktypes="$ktypes ecdsa-384" ;;
ecdsa-sha2-nistp521) ktypes="$ktypes ecdsa-521" ;;
esac
done
2011-02-17 11:47:40 +00:00
for kt in $ktypes; do
rm -f $OBJ/key.$kt
bits=`echo ${kt} | awk -F- '{print $2}'`
type=`echo ${kt} | awk -F- '{print $1}'`
printf "keygen $type, $bits bits:\t"
${TIME} ${SSHKEYGEN} -b $bits -q -N '' -t $type -f $OBJ/key.$kt ||\
fail "ssh-keygen for type $type, $bits bits failed"
done
tries="1 2 3"
for ut in $ktypes; do
htypes=$ut
#htypes=$ktypes
for ht in $htypes; do
2015-08-26 09:25:17 +00:00
case $ht in
dsa-1024) t=ssh-dss;;
ecdsa-256) t=ecdsa-sha2-nistp256;;
ecdsa-384) t=ecdsa-sha2-nistp384;;
ecdsa-521) t=ecdsa-sha2-nistp521;;
ed25519-512) t=ssh-ed25519;;
rsa-*) t=ssh-rsa;;
esac
2011-02-17 11:47:40 +00:00
trace "ssh connect, userkey $ut, hostkey $ht"
(
grep -v HostKey $OBJ/sshd_proxy_bak
echo HostKey $OBJ/key.$ht
2015-08-26 09:25:17 +00:00
echo PubkeyAcceptedKeyTypes $t
echo HostKeyAlgorithms $t
2011-02-17 11:47:40 +00:00
) > $OBJ/sshd_proxy
(
grep -v IdentityFile $OBJ/ssh_proxy_bak
echo IdentityFile $OBJ/key.$ut
2015-08-26 09:25:17 +00:00
echo PubkeyAcceptedKeyTypes $t
echo HostKeyAlgorithms $t
2011-02-17 11:47:40 +00:00
) > $OBJ/ssh_proxy
(
2013-09-18 17:27:38 +00:00
printf 'localhost-with-alias,127.0.0.1,::1 '
2011-02-17 11:47:40 +00:00
cat $OBJ/key.$ht.pub
) > $OBJ/known_hosts
cat $OBJ/key.$ut.pub > $OBJ/authorized_keys_$USER
for i in $tries; do
printf "userkey $ut, hostkey ${ht}:\t"
${TIME} ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
if [ $? -ne 0 ]; then
fail "ssh userkey $ut, hostkey $ht failed"
fi
done
done
done