1 # $OpenBSD: dhgex.sh,v 1.4 2017/05/08 01:52:49 djm Exp $
2 # Placed in the Public Domain.
6 LOG=${TEST_SSH_LOGFILE}
8 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
10 kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange`
18 cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
19 echo "KexAlgorithms=$kex" >> $OBJ/sshd_proxy
20 echo "Ciphers=$cipher" >> $OBJ/sshd_proxy
22 opts="-oKexAlgorithms=$kex -oCiphers=$cipher"
25 groupsz="$min<$bits<$max"
26 verbose "$tid bits $bits $kex $cipher"
27 ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true
29 fail "ssh failed ($@)"
31 # check what we request
32 grep "SSH2_MSG_KEX_DH_GEX_REQUEST($groupsz) sent" ${LOG} >/dev/null
34 got=`egrep "SSH2_MSG_KEX_DH_GEX_REQUEST(.*) sent" ${LOG}`
35 fail "$tid unexpected GEX sizes, expected $groupsz, got $got"
37 # check what we got (depends on contents of system moduli file)
38 gotbits="`awk '/bits set:/{print $4}' ${LOG} | head -1 | cut -f2 -d/`"
39 if [ "$gotbits" -lt "$bits" ]; then
40 fatal "$tid expected $bits bit group, got $gotbits"
50 ssh_test_dhgex $bits $c $k
56 check 3072 `${SSH} -Q cipher | grep 128`
57 check 7680 `${SSH} -Q cipher | grep 192`
58 check 8192 `${SSH} -Q cipher | grep 256`
59 check 8192 rijndael-cbc@lysator.liu.se chacha20-poly1305@openssh.com