- (djm) [openbsd-compat/port-linux.c] Check whether SELinux is enabled
[openssh-git.git] / regress / rekey.sh
blob3c5f266fc99c386d1606c3f693d02e2f46ad219d
1 # $OpenBSD: rekey.sh,v 1.1 2003/03/28 13:58:28 markus Exp $
2 # Placed in the Public Domain.
4 tid="rekey during transfer data"
6 DATA=${OBJ}/data
7 COPY=${OBJ}/copy
8 LOG=${OBJ}/log
10 rm -f ${COPY} ${LOG} ${DATA}
11 touch ${DATA}
12 dd if=/bin/ls${EXEEXT} of=${DATA} bs=1k seek=511 count=1 > /dev/null 2>&1
14 for s in 16 1k 128k 256k; do
15 trace "rekeylimit ${s}"
16 rm -f ${COPY}
17 cat $DATA | \
18 ${SSH} -oCompression=no -oRekeyLimit=$s \
19 -v -F $OBJ/ssh_proxy somehost "cat > ${COPY}" \
20 2> ${LOG}
21 if [ $? -ne 0 ]; then
22 fail "ssh failed"
24 cmp $DATA ${COPY} || fail "corrupted copy"
25 n=`grep 'NEWKEYS sent' ${LOG} | wc -l`
26 n=`expr $n - 1`
27 trace "$n rekeying(s)"
28 if [ $n -lt 1 ]; then
29 fail "no rekeying occured"
31 done
32 rm -f ${COPY} ${LOG} ${DATA}