blob: 3c5f266fc99c386d1606c3f693d02e2f46ad219d [file] [log] [blame]
Darren Tuckerfc8a7ea2003-06-18 22:18:57 +10001# $OpenBSD: rekey.sh,v 1.1 2003/03/28 13:58:28 markus Exp $
2# Placed in the Public Domain.
3
4tid="rekey during transfer data"
5
6DATA=${OBJ}/data
7COPY=${OBJ}/copy
8LOG=${OBJ}/log
9
10rm -f ${COPY} ${LOG} ${DATA}
Darren Tucker5caa78b2004-12-20 12:35:42 +110011touch ${DATA}
Darren Tucker60de9f12003-09-04 14:02:56 +100012dd if=/bin/ls${EXEEXT} of=${DATA} bs=1k seek=511 count=1 > /dev/null 2>&1
Darren Tuckerfc8a7ea2003-06-18 22:18:57 +100013
14for s in 16 1k 128k 256k; do
15 trace "rekeylimit ${s}"
16 rm -f ${COPY}
17 cat $DATA | \
18 ${SSH} -oCompression=no -oRekeyLimit=$s \
19 -v -F $OBJ/ssh_proxy somehost "cat > ${COPY}" \
20 2> ${LOG}
21 if [ $? -ne 0 ]; then
22 fail "ssh failed"
23 fi
24 cmp $DATA ${COPY} || fail "corrupted copy"
25 n=`grep 'NEWKEYS sent' ${LOG} | wc -l`
26 n=`expr $n - 1`
27 trace "$n rekeying(s)"
28 if [ $n -lt 1 ]; then
29 fail "no rekeying occured"
30 fi
31done
32rm -f ${COPY} ${LOG} ${DATA}