From 0771f5dda30cef01540bc359582eae734c79f39f Mon Sep 17 00:00:00 2001 From: dtucker Date: Tue, 11 Nov 2008 05:55:25 +0000 Subject: [PATCH] - djm@cvs.openbsd.org 2008/11/10 02:06:35 [regress/putty-ciphers.sh] PuTTY supports AES CTR modes, so interop test against them too --- ChangeLog | 3 +++ regress/putty-ciphers.sh | 4 ++-- 2 files changed, 5 insertions(+), 2 deletions(-) diff --git a/ChangeLog b/ChangeLog index ec3a9f57..0327dc1d 100644 --- a/ChangeLog +++ b/ChangeLog @@ -26,6 +26,9 @@ [channels.c] for sshd -T print 'permitopen any' vs. 'permitopen' for case of no permitopen's; ok and input dtucker@ + - djm@cvs.openbsd.org 2008/11/10 02:06:35 + [regress/putty-ciphers.sh] + PuTTY supports AES CTR modes, so interop test against them too 20081105 - OpenBSD CVS Sync diff --git a/regress/putty-ciphers.sh b/regress/putty-ciphers.sh index 40435ef4..44105362 100644 --- a/regress/putty-ciphers.sh +++ b/regress/putty-ciphers.sh @@ -1,4 +1,4 @@ -# $OpenBSD: putty-ciphers.sh,v 1.2 2008/06/30 10:31:11 djm Exp $ +# $OpenBSD: putty-ciphers.sh,v 1.3 2008/11/10 02:06:35 djm Exp $ # Placed in the Public Domain. tid="putty ciphers" @@ -10,7 +10,7 @@ if test "x$REGRESS_INTEROP_PUTTY" != "xyes" ; then fatal "putty interop tests not enabled" fi -for c in aes blowfish 3des arcfour ; do +for c in aes blowfish 3des arcfour aes128-ctr aes192-ctr aes256-ctr ; do verbose "$tid: cipher $c" cp ${OBJ}/.putty/sessions/localhost_proxy \ ${OBJ}/.putty/sessions/cipher_$c -- 2.45.2