1 # $OpenBSD: keytype.sh,v 1.5 2017/03/20 22:08:06 djm Exp $
2 # Placed in the Public Domain.
4 tid="login with different key types"
6 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
7 cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
9 # Traditional and builtin key types.
10 ktypes="dsa-1024 rsa-2048 rsa-3072 ed25519-512"
11 # Types not present in all OpenSSL versions.
12 for i in `$SSH -Q key`; do
14 ecdsa-sha2-nistp256) ktypes="$ktypes ecdsa-256" ;;
15 ecdsa-sha2-nistp384) ktypes="$ktypes ecdsa-384" ;;
16 ecdsa-sha2-nistp521) ktypes="$ktypes ecdsa-521" ;;
22 bits=`echo ${kt} | awk -F- '{print $2}'`
23 type=`echo ${kt} | awk -F- '{print $1}'`
24 verbose "keygen $type, $bits bits"
25 ${SSHKEYGEN} -b $bits -q -N '' -t $type -f $OBJ/key.$kt ||\
26 fail "ssh-keygen for type $type, $bits bits failed"
36 ecdsa-256) t=ecdsa-sha2-nistp256;;
37 ecdsa-384) t=ecdsa-sha2-nistp384;;
38 ecdsa-521) t=ecdsa-sha2-nistp521;;
39 ed25519-512) t=ssh-ed25519;;
42 trace "ssh connect, userkey $ut, hostkey $ht"
44 grep -v HostKey $OBJ/sshd_proxy_bak
45 echo HostKey $OBJ/key.$ht
46 echo PubkeyAcceptedKeyTypes $t
47 echo HostKeyAlgorithms $t
50 grep -v IdentityFile $OBJ/ssh_proxy_bak
51 echo IdentityFile $OBJ/key.$ut
52 echo PubkeyAcceptedKeyTypes $t
53 echo HostKeyAlgorithms $t
56 printf 'localhost-with-alias,127.0.0.1,::1 '
59 cat $OBJ/key.$ut.pub > $OBJ/authorized_keys_$USER
61 verbose "userkey $ut, hostkey ${ht}"
62 ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
64 fail "ssh userkey $ut, hostkey $ht failed"