nareshkamboju

openssh test suite on redhat

Nov 4th, 2016
92
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 83.82 KB | None | 0 0
  1. [ec2-user@ip-172-31-40-44 openssh-6.6p1]$ make tests
  2. (cd openbsd-compat && make)
  3. make[1]: Entering directory `/home/ec2-user/openssh-6.6p1/openbsd-compat'
  4. make[1]: Nothing to be done for `all'.
  5. make[1]: Leaving directory `/home/ec2-user/openssh-6.6p1/openbsd-compat'
  6. BUILDDIR=`pwd`; \
  7. TEST_SHELL="sh"; \
  8. TEST_SSH_SCP="${BUILDDIR}/scp"; \
  9. TEST_SSH_SSH="${BUILDDIR}/ssh"; \
  10. TEST_SSH_SSHD="${BUILDDIR}/sshd"; \
  11. TEST_SSH_SSHAGENT="${BUILDDIR}/ssh-agent"; \
  12. TEST_SSH_SSHADD="${BUILDDIR}/ssh-add"; \
  13. TEST_SSH_SSHKEYGEN="${BUILDDIR}/ssh-keygen"; \
  14. TEST_SSH_SSHPKCS11HELPER="${BUILDDIR}/ssh-pkcs11-helper"; \
  15. TEST_SSH_SSHKEYSCAN="${BUILDDIR}/ssh-keyscan"; \
  16. TEST_SSH_SFTP="${BUILDDIR}/sftp"; \
  17. TEST_SSH_SFTPSERVER="${BUILDDIR}/sftp-server"; \
  18. TEST_SSH_PLINK="plink"; \
  19. TEST_SSH_PUTTYGEN="puttygen"; \
  20. TEST_SSH_CONCH="conch"; \
  21. TEST_SSH_IPV6="yes" ; \
  22. TEST_SSH_ECC="yes" ; \
  23. cd ./regress || exit $?; \
  24. make \
  25. .OBJDIR="${BUILDDIR}/regress" \
  26. .CURDIR="`pwd`" \
  27. BUILDDIR="${BUILDDIR}" \
  28. OBJ="${BUILDDIR}/regress/" \
  29. PATH="${BUILDDIR}:${PATH}" \
  30. TEST_ENV=MALLOC_OPTIONS="" \
  31. TEST_SHELL="${TEST_SHELL}" \
  32. TEST_SSH_SCP="${TEST_SSH_SCP}" \
  33. TEST_SSH_SSH="${TEST_SSH_SSH}" \
  34. TEST_SSH_SSHD="${TEST_SSH_SSHD}" \
  35. TEST_SSH_SSHAGENT="${TEST_SSH_SSHAGENT}" \
  36. TEST_SSH_SSHADD="${TEST_SSH_SSHADD}" \
  37. TEST_SSH_SSHKEYGEN="${TEST_SSH_SSHKEYGEN}" \
  38. TEST_SSH_SSHPKCS11HELPER="${TEST_SSH_SSHPKCS11HELPER}" \
  39. TEST_SSH_SSHKEYSCAN="${TEST_SSH_SSHKEYSCAN}" \
  40. TEST_SSH_SFTP="${TEST_SSH_SFTP}" \
  41. TEST_SSH_SFTPSERVER="${TEST_SSH_SFTPSERVER}" \
  42. TEST_SSH_PLINK="${TEST_SSH_PLINK}" \
  43. TEST_SSH_PUTTYGEN="${TEST_SSH_PUTTYGEN}" \
  44. TEST_SSH_CONCH="${TEST_SSH_CONCH}" \
  45. TEST_SSH_IPV6="${TEST_SSH_IPV6}" \
  46. TEST_SSH_ECC="${TEST_SSH_ECC}" \
  47. EXEEXT="" \
  48. tests && echo all tests passed
  49. make[1]: Entering directory `/home/ec2-user/openssh-6.6p1/regress'
  50. /home/ec2-user/openssh-6.6p1/ssh-keygen -if /home/ec2-user/openssh-6.6p1/regress/rsa_ssh2.prv | diff - /home/ec2-user/openssh-6.6p1/regress/rsa_openssh.prv
  51. tr '\n' '\r' </home/ec2-user/openssh-6.6p1/regress/rsa_ssh2.prv > /home/ec2-user/openssh-6.6p1/regress/rsa_ssh2_cr.prv
  52. /home/ec2-user/openssh-6.6p1/ssh-keygen -if /home/ec2-user/openssh-6.6p1/regress/rsa_ssh2_cr.prv | diff - /home/ec2-user/openssh-6.6p1/regress/rsa_openssh.prv
  53. awk '{print $0 "\r"}' /home/ec2-user/openssh-6.6p1/regress/rsa_ssh2.prv > /home/ec2-user/openssh-6.6p1/regress/rsa_ssh2_crnl.prv
  54. /home/ec2-user/openssh-6.6p1/ssh-keygen -if /home/ec2-user/openssh-6.6p1/regress/rsa_ssh2_crnl.prv | diff - /home/ec2-user/openssh-6.6p1/regress/rsa_openssh.prv
  55. cat /home/ec2-user/openssh-6.6p1/regress/rsa_openssh.prv > /home/ec2-user/openssh-6.6p1/regress//t2.out
  56. chmod 600 /home/ec2-user/openssh-6.6p1/regress//t2.out
  57. /home/ec2-user/openssh-6.6p1/ssh-keygen -yf /home/ec2-user/openssh-6.6p1/regress//t2.out | diff - /home/ec2-user/openssh-6.6p1/regress/rsa_openssh.pub
  58. /home/ec2-user/openssh-6.6p1/ssh-keygen -ef /home/ec2-user/openssh-6.6p1/regress/rsa_openssh.pub >/home/ec2-user/openssh-6.6p1/regress//t3.out
  59. /home/ec2-user/openssh-6.6p1/ssh-keygen -if /home/ec2-user/openssh-6.6p1/regress//t3.out | diff - /home/ec2-user/openssh-6.6p1/regress/rsa_openssh.pub
  60. /home/ec2-user/openssh-6.6p1/ssh-keygen -lf /home/ec2-user/openssh-6.6p1/regress/rsa_openssh.pub |\
  61. awk '{print $2}' | diff - /home/ec2-user/openssh-6.6p1/regress/t4.ok
  62. /home/ec2-user/openssh-6.6p1/ssh-keygen -Bf /home/ec2-user/openssh-6.6p1/regress/rsa_openssh.pub |\
  63. awk '{print $2}' | diff - /home/ec2-user/openssh-6.6p1/regress/t5.ok
  64. /home/ec2-user/openssh-6.6p1/ssh-keygen -if /home/ec2-user/openssh-6.6p1/regress/dsa_ssh2.prv > /home/ec2-user/openssh-6.6p1/regress//t6.out1
  65. /home/ec2-user/openssh-6.6p1/ssh-keygen -if /home/ec2-user/openssh-6.6p1/regress/dsa_ssh2.pub > /home/ec2-user/openssh-6.6p1/regress//t6.out2
  66. chmod 600 /home/ec2-user/openssh-6.6p1/regress//t6.out1
  67. /home/ec2-user/openssh-6.6p1/ssh-keygen -yf /home/ec2-user/openssh-6.6p1/regress//t6.out1 | diff - /home/ec2-user/openssh-6.6p1/regress//t6.out2
  68. /home/ec2-user/openssh-6.6p1/ssh-keygen -lf /home/ec2-user/openssh-6.6p1/regress//t7.out > /dev/null
  69. /home/ec2-user/openssh-6.6p1/ssh-keygen -Bf /home/ec2-user/openssh-6.6p1/regress//t7.out > /dev/null
  70. /home/ec2-user/openssh-6.6p1/ssh-keygen -lf /home/ec2-user/openssh-6.6p1/regress//t8.out > /dev/null
  71. /home/ec2-user/openssh-6.6p1/ssh-keygen -Bf /home/ec2-user/openssh-6.6p1/regress//t8.out > /dev/null
  72. test "yes" != yes || \
  73. /home/ec2-user/openssh-6.6p1/ssh-keygen -lf /home/ec2-user/openssh-6.6p1/regress//t9.out > /dev/null
  74. test "yes" != yes || \
  75. /home/ec2-user/openssh-6.6p1/ssh-keygen -Bf /home/ec2-user/openssh-6.6p1/regress//t9.out > /dev/null
  76. /home/ec2-user/openssh-6.6p1/ssh-keygen -lf /home/ec2-user/openssh-6.6p1/regress//t10.out > /dev/null
  77. /home/ec2-user/openssh-6.6p1/ssh-keygen -Bf /home/ec2-user/openssh-6.6p1/regress//t10.out > /dev/null
  78. run test connect.sh ...
  79. ok simple connect
  80. run test proxy-connect.sh ...
  81. plain username
  82. username with style
  83. ok proxy connect
  84. run test connect-privsep.sh ...
  85. ok proxy connect with privsep
  86. run test proto-version.sh ...
  87. ok sshd version with different protocol combinations
  88. run test proto-mismatch.sh ...
  89. ok protocol version mismatch
  90. run test exit-status.sh ...
  91. test remote exit status: proto 1 status 0
  92. test remote exit status: proto 1 status 1
  93. test remote exit status: proto 1 status 4
  94. test remote exit status: proto 1 status 5
  95. test remote exit status: proto 1 status 44
  96. test remote exit status: proto 2 status 0
  97. test remote exit status: proto 2 status 1
  98. test remote exit status: proto 2 status 4
  99. test remote exit status: proto 2 status 5
  100. test remote exit status: proto 2 status 44
  101. ok remote exit status
  102. run test envpass.sh ...
  103. test environment passing: pass env, don't accept
  104. test environment passing: don't pass env, accept
  105. test environment passing: pass single env, accept single env
  106. test environment passing: pass multiple env, accept multiple env
  107. ok environment passing
  108. run test transfer.sh ...
  109. transfer data: proto 1
  110. transfer data: proto 2
  111. ok transfer data
  112. run test banner.sh ...
  113. test banner: missing banner file
  114. test banner: size 0
  115. test banner: size 10
  116. test banner: size 100
  117. test banner: size 1000
  118. test banner: size 10000
  119. test banner: size 100000
  120. test banner: suppress banner (-q)
  121. ok banner
  122. run test rekey.sh ...
  123. client rekey KexAlgorithms=diffie-hellman-group1-sha1
  124. client rekey KexAlgorithms=diffie-hellman-group14-sha1
  125. client rekey KexAlgorithms=diffie-hellman-group-exchange-sha1
  126. client rekey KexAlgorithms=diffie-hellman-group-exchange-sha256
  127. client rekey KexAlgorithms=ecdh-sha2-nistp256
  128. client rekey KexAlgorithms=ecdh-sha2-nistp384
  129. client rekey KexAlgorithms=ecdh-sha2-nistp521
  130. client rekey KexAlgorithms=diffie-hellman-group1-sha1
  131. client rekey KexAlgorithms=curve25519-sha256@libssh.org
  132. client rekey Ciphers=3des-cbc
  133. client rekey Ciphers=blowfish-cbc
  134. client rekey Ciphers=cast128-cbc
  135. client rekey Ciphers=arcfour
  136. client rekey Ciphers=arcfour128
  137. client rekey Ciphers=arcfour256
  138. client rekey Ciphers=aes128-cbc
  139. client rekey Ciphers=aes192-cbc
  140. client rekey Ciphers=aes256-cbc
  141. client rekey Ciphers=rijndael-cbc@lysator.liu.se
  142. client rekey Ciphers=aes128-ctr
  143. client rekey Ciphers=aes192-ctr
  144. client rekey Ciphers=aes256-ctr
  145. client rekey Ciphers=aes128-gcm@openssh.com
  146. client rekey Ciphers=aes256-gcm@openssh.com
  147. client rekey Ciphers=chacha20-poly1305@openssh.com
  148. client rekey MACs=hmac-sha1
  149. client rekey MACs=hmac-sha1-96
  150. client rekey MACs=hmac-sha2-256
  151. client rekey MACs=hmac-sha2-512
  152. client rekey MACs=hmac-md5
  153. client rekey MACs=hmac-md5-96
  154. client rekey MACs=hmac-ripemd160
  155. client rekey MACs=hmac-ripemd160@openssh.com
  156. client rekey MACs=umac-64@openssh.com
  157. client rekey MACs=umac-128@openssh.com
  158. client rekey MACs=hmac-sha1-etm@openssh.com
  159. client rekey MACs=hmac-sha1-96-etm@openssh.com
  160. client rekey MACs=hmac-sha2-256-etm@openssh.com
  161. client rekey MACs=hmac-sha2-512-etm@openssh.com
  162. client rekey MACs=hmac-md5-etm@openssh.com
  163. client rekey MACs=hmac-md5-96-etm@openssh.com
  164. client rekey MACs=hmac-ripemd160-etm@openssh.com
  165. client rekey MACs=umac-64-etm@openssh.com
  166. client rekey MACs=umac-128-etm@openssh.com
  167. client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1
  168. client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha1
  169. client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha1
  170. client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha256
  171. client rekey aes128-gcm@openssh.com ecdh-sha2-nistp256
  172. client rekey aes128-gcm@openssh.com ecdh-sha2-nistp384
  173. client rekey aes128-gcm@openssh.com ecdh-sha2-nistp521
  174. client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1
  175. client rekey aes128-gcm@openssh.com curve25519-sha256@libssh.org
  176. client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1
  177. client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha1
  178. client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha1
  179. client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha256
  180. client rekey aes256-gcm@openssh.com ecdh-sha2-nistp256
  181. client rekey aes256-gcm@openssh.com ecdh-sha2-nistp384
  182. client rekey aes256-gcm@openssh.com ecdh-sha2-nistp521
  183. client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1
  184. client rekey aes256-gcm@openssh.com curve25519-sha256@libssh.org
  185. client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1
  186. client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha1
  187. client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha1
  188. client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha256
  189. client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp256
  190. client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp384
  191. client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp521
  192. client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1
  193. client rekey chacha20-poly1305@openssh.com curve25519-sha256@libssh.org
  194. client rekeylimit 16
  195. client rekeylimit 1k
  196. client rekeylimit 128k
  197. client rekeylimit 256k
  198. client rekeylimit default 5
  199. client rekeylimit default 10
  200. client rekeylimit default 5 no data
  201. client rekeylimit default 10 no data
  202. server rekeylimit default 5 no data
  203. server rekeylimit default 10 no data
  204. rekeylimit parsing
  205. ok rekey
  206. run test stderr-data.sh ...
  207. test stderr data transfer: proto 1 ()
  208. test stderr data transfer: proto 2 ()
  209. test stderr data transfer: proto 1 (-n)
  210. test stderr data transfer: proto 2 (-n)
  211. ok stderr data transfer
  212. run test stderr-after-eof.sh ...
  213. ok stderr data after eof
  214. run test broken-pipe.sh ...
  215. ok broken pipe test
  216. run test try-ciphers.sh ...
  217. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1
  218. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-96
  219. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-256
  220. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-512
  221. test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5
  222. test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-96
  223. test try ciphers: proto 2 cipher 3des-cbc mac hmac-ripemd160
  224. test try ciphers: proto 2 cipher 3des-cbc mac hmac-ripemd160@openssh.com
  225. test try ciphers: proto 2 cipher 3des-cbc mac umac-64@openssh.com
  226. test try ciphers: proto 2 cipher 3des-cbc mac umac-128@openssh.com
  227. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-etm@openssh.com
  228. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-96-etm@openssh.com
  229. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-256-etm@openssh.com
  230. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-512-etm@openssh.com
  231. test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-etm@openssh.com
  232. test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-96-etm@openssh.com
  233. test try ciphers: proto 2 cipher 3des-cbc mac hmac-ripemd160-etm@openssh.com
  234. test try ciphers: proto 2 cipher 3des-cbc mac umac-64-etm@openssh.com
  235. test try ciphers: proto 2 cipher 3des-cbc mac umac-128-etm@openssh.com
  236. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1
  237. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-96
  238. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-256
  239. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-512
  240. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5
  241. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-96
  242. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-ripemd160
  243. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-ripemd160@openssh.com
  244. test try ciphers: proto 2 cipher blowfish-cbc mac umac-64@openssh.com
  245. test try ciphers: proto 2 cipher blowfish-cbc mac umac-128@openssh.com
  246. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-etm@openssh.com
  247. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-96-etm@openssh.com
  248. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-256-etm@openssh.com
  249. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-512-etm@openssh.com
  250. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-etm@openssh.com
  251. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-96-etm@openssh.com
  252. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-ripemd160-etm@openssh.com
  253. test try ciphers: proto 2 cipher blowfish-cbc mac umac-64-etm@openssh.com
  254. test try ciphers: proto 2 cipher blowfish-cbc mac umac-128-etm@openssh.com
  255. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1
  256. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-96
  257. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-256
  258. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-512
  259. test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5
  260. test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-96
  261. test try ciphers: proto 2 cipher cast128-cbc mac hmac-ripemd160
  262. test try ciphers: proto 2 cipher cast128-cbc mac hmac-ripemd160@openssh.com
  263. test try ciphers: proto 2 cipher cast128-cbc mac umac-64@openssh.com
  264. test try ciphers: proto 2 cipher cast128-cbc mac umac-128@openssh.com
  265. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-etm@openssh.com
  266. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-96-etm@openssh.com
  267. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-256-etm@openssh.com
  268. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-512-etm@openssh.com
  269. test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-etm@openssh.com
  270. test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-96-etm@openssh.com
  271. test try ciphers: proto 2 cipher cast128-cbc mac hmac-ripemd160-etm@openssh.com
  272. test try ciphers: proto 2 cipher cast128-cbc mac umac-64-etm@openssh.com
  273. test try ciphers: proto 2 cipher cast128-cbc mac umac-128-etm@openssh.com
  274. test try ciphers: proto 2 cipher arcfour mac hmac-sha1
  275. test try ciphers: proto 2 cipher arcfour mac hmac-sha1-96
  276. test try ciphers: proto 2 cipher arcfour mac hmac-sha2-256
  277. test try ciphers: proto 2 cipher arcfour mac hmac-sha2-512
  278. test try ciphers: proto 2 cipher arcfour mac hmac-md5
  279. test try ciphers: proto 2 cipher arcfour mac hmac-md5-96
  280. test try ciphers: proto 2 cipher arcfour mac hmac-ripemd160
  281. test try ciphers: proto 2 cipher arcfour mac hmac-ripemd160@openssh.com
  282. test try ciphers: proto 2 cipher arcfour mac umac-64@openssh.com
  283. test try ciphers: proto 2 cipher arcfour mac umac-128@openssh.com
  284. test try ciphers: proto 2 cipher arcfour mac hmac-sha1-etm@openssh.com
  285. test try ciphers: proto 2 cipher arcfour mac hmac-sha1-96-etm@openssh.com
  286. test try ciphers: proto 2 cipher arcfour mac hmac-sha2-256-etm@openssh.com
  287. test try ciphers: proto 2 cipher arcfour mac hmac-sha2-512-etm@openssh.com
  288. test try ciphers: proto 2 cipher arcfour mac hmac-md5-etm@openssh.com
  289. test try ciphers: proto 2 cipher arcfour mac hmac-md5-96-etm@openssh.com
  290. test try ciphers: proto 2 cipher arcfour mac hmac-ripemd160-etm@openssh.com
  291. test try ciphers: proto 2 cipher arcfour mac umac-64-etm@openssh.com
  292. test try ciphers: proto 2 cipher arcfour mac umac-128-etm@openssh.com
  293. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1
  294. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-96
  295. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-256
  296. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-512
  297. test try ciphers: proto 2 cipher arcfour128 mac hmac-md5
  298. test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-96
  299. test try ciphers: proto 2 cipher arcfour128 mac hmac-ripemd160
  300. test try ciphers: proto 2 cipher arcfour128 mac hmac-ripemd160@openssh.com
  301. test try ciphers: proto 2 cipher arcfour128 mac umac-64@openssh.com
  302. test try ciphers: proto 2 cipher arcfour128 mac umac-128@openssh.com
  303. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-etm@openssh.com
  304. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-96-etm@openssh.com
  305. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-256-etm@openssh.com
  306. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-512-etm@openssh.com
  307. test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-etm@openssh.com
  308. test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-96-etm@openssh.com
  309. test try ciphers: proto 2 cipher arcfour128 mac hmac-ripemd160-etm@openssh.com
  310. test try ciphers: proto 2 cipher arcfour128 mac umac-64-etm@openssh.com
  311. test try ciphers: proto 2 cipher arcfour128 mac umac-128-etm@openssh.com
  312. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1
  313. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-96
  314. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-256
  315. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-512
  316. test try ciphers: proto 2 cipher arcfour256 mac hmac-md5
  317. test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-96
  318. test try ciphers: proto 2 cipher arcfour256 mac hmac-ripemd160
  319. test try ciphers: proto 2 cipher arcfour256 mac hmac-ripemd160@openssh.com
  320. test try ciphers: proto 2 cipher arcfour256 mac umac-64@openssh.com
  321. test try ciphers: proto 2 cipher arcfour256 mac umac-128@openssh.com
  322. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-etm@openssh.com
  323. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-96-etm@openssh.com
  324. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-256-etm@openssh.com
  325. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-512-etm@openssh.com
  326. test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-etm@openssh.com
  327. test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-96-etm@openssh.com
  328. test try ciphers: proto 2 cipher arcfour256 mac hmac-ripemd160-etm@openssh.com
  329. test try ciphers: proto 2 cipher arcfour256 mac umac-64-etm@openssh.com
  330. test try ciphers: proto 2 cipher arcfour256 mac umac-128-etm@openssh.com
  331. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1
  332. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-96
  333. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-256
  334. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-512
  335. test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5
  336. test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-96
  337. test try ciphers: proto 2 cipher aes128-cbc mac hmac-ripemd160
  338. test try ciphers: proto 2 cipher aes128-cbc mac hmac-ripemd160@openssh.com
  339. test try ciphers: proto 2 cipher aes128-cbc mac umac-64@openssh.com
  340. test try ciphers: proto 2 cipher aes128-cbc mac umac-128@openssh.com
  341. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-etm@openssh.com
  342. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-96-etm@openssh.com
  343. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-256-etm@openssh.com
  344. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-512-etm@openssh.com
  345. test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-etm@openssh.com
  346. test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-96-etm@openssh.com
  347. test try ciphers: proto 2 cipher aes128-cbc mac hmac-ripemd160-etm@openssh.com
  348. test try ciphers: proto 2 cipher aes128-cbc mac umac-64-etm@openssh.com
  349. test try ciphers: proto 2 cipher aes128-cbc mac umac-128-etm@openssh.com
  350. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1
  351. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-96
  352. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-256
  353. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-512
  354. test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5
  355. test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-96
  356. test try ciphers: proto 2 cipher aes192-cbc mac hmac-ripemd160
  357. test try ciphers: proto 2 cipher aes192-cbc mac hmac-ripemd160@openssh.com
  358. test try ciphers: proto 2 cipher aes192-cbc mac umac-64@openssh.com
  359. test try ciphers: proto 2 cipher aes192-cbc mac umac-128@openssh.com
  360. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-etm@openssh.com
  361. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-96-etm@openssh.com
  362. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-256-etm@openssh.com
  363. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-512-etm@openssh.com
  364. test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-etm@openssh.com
  365. test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-96-etm@openssh.com
  366. test try ciphers: proto 2 cipher aes192-cbc mac hmac-ripemd160-etm@openssh.com
  367. test try ciphers: proto 2 cipher aes192-cbc mac umac-64-etm@openssh.com
  368. test try ciphers: proto 2 cipher aes192-cbc mac umac-128-etm@openssh.com
  369. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1
  370. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-96
  371. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-256
  372. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-512
  373. test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5
  374. test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-96
  375. test try ciphers: proto 2 cipher aes256-cbc mac hmac-ripemd160
  376. test try ciphers: proto 2 cipher aes256-cbc mac hmac-ripemd160@openssh.com
  377. test try ciphers: proto 2 cipher aes256-cbc mac umac-64@openssh.com
  378. test try ciphers: proto 2 cipher aes256-cbc mac umac-128@openssh.com
  379. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-etm@openssh.com
  380. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-96-etm@openssh.com
  381. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-256-etm@openssh.com
  382. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-512-etm@openssh.com
  383. test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-etm@openssh.com
  384. test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-96-etm@openssh.com
  385. test try ciphers: proto 2 cipher aes256-cbc mac hmac-ripemd160-etm@openssh.com
  386. test try ciphers: proto 2 cipher aes256-cbc mac umac-64-etm@openssh.com
  387. test try ciphers: proto 2 cipher aes256-cbc mac umac-128-etm@openssh.com
  388. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1
  389. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96
  390. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256
  391. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512
  392. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5
  393. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96
  394. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-ripemd160
  395. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-ripemd160@openssh.com
  396. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-64@openssh.com
  397. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-128@openssh.com
  398. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-etm@openssh.com
  399. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96-etm@openssh.com
  400. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256-etm@openssh.com
  401. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512-etm@openssh.com
  402. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5-etm@openssh.com
  403. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96-etm@openssh.com
  404. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-ripemd160-etm@openssh.com
  405. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-64-etm@openssh.com
  406. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-128-etm@openssh.com
  407. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1
  408. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-96
  409. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-256
  410. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-512
  411. test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5
  412. test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-96
  413. test try ciphers: proto 2 cipher aes128-ctr mac hmac-ripemd160
  414. test try ciphers: proto 2 cipher aes128-ctr mac hmac-ripemd160@openssh.com
  415. test try ciphers: proto 2 cipher aes128-ctr mac umac-64@openssh.com
  416. test try ciphers: proto 2 cipher aes128-ctr mac umac-128@openssh.com
  417. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-etm@openssh.com
  418. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-96-etm@openssh.com
  419. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-256-etm@openssh.com
  420. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-512-etm@openssh.com
  421. test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-etm@openssh.com
  422. test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-96-etm@openssh.com
  423. test try ciphers: proto 2 cipher aes128-ctr mac hmac-ripemd160-etm@openssh.com
  424. test try ciphers: proto 2 cipher aes128-ctr mac umac-64-etm@openssh.com
  425. test try ciphers: proto 2 cipher aes128-ctr mac umac-128-etm@openssh.com
  426. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1
  427. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-96
  428. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-256
  429. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-512
  430. test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5
  431. test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-96
  432. test try ciphers: proto 2 cipher aes192-ctr mac hmac-ripemd160
  433. test try ciphers: proto 2 cipher aes192-ctr mac hmac-ripemd160@openssh.com
  434. test try ciphers: proto 2 cipher aes192-ctr mac umac-64@openssh.com
  435. test try ciphers: proto 2 cipher aes192-ctr mac umac-128@openssh.com
  436. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-etm@openssh.com
  437. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-96-etm@openssh.com
  438. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-256-etm@openssh.com
  439. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-512-etm@openssh.com
  440. test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-etm@openssh.com
  441. test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-96-etm@openssh.com
  442. test try ciphers: proto 2 cipher aes192-ctr mac hmac-ripemd160-etm@openssh.com
  443. test try ciphers: proto 2 cipher aes192-ctr mac umac-64-etm@openssh.com
  444. test try ciphers: proto 2 cipher aes192-ctr mac umac-128-etm@openssh.com
  445. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1
  446. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-96
  447. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-256
  448. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-512
  449. test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5
  450. test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-96
  451. test try ciphers: proto 2 cipher aes256-ctr mac hmac-ripemd160
  452. test try ciphers: proto 2 cipher aes256-ctr mac hmac-ripemd160@openssh.com
  453. test try ciphers: proto 2 cipher aes256-ctr mac umac-64@openssh.com
  454. test try ciphers: proto 2 cipher aes256-ctr mac umac-128@openssh.com
  455. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-etm@openssh.com
  456. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-96-etm@openssh.com
  457. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-256-etm@openssh.com
  458. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-512-etm@openssh.com
  459. test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-etm@openssh.com
  460. test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-96-etm@openssh.com
  461. test try ciphers: proto 2 cipher aes256-ctr mac hmac-ripemd160-etm@openssh.com
  462. test try ciphers: proto 2 cipher aes256-ctr mac umac-64-etm@openssh.com
  463. test try ciphers: proto 2 cipher aes256-ctr mac umac-128-etm@openssh.com
  464. test try ciphers: proto 2 cipher aes128-gcm@openssh.com mac hmac-sha1
  465. test try ciphers: proto 2 cipher aes256-gcm@openssh.com mac hmac-sha1
  466. test try ciphers: proto 2 cipher chacha20-poly1305@openssh.com mac hmac-sha1
  467. test try ciphers: proto 1 cipher 3des
  468. test try ciphers: proto 1 cipher blowfish
  469. ok try ciphers
  470. run test yes-head.sh ...
  471. ok yes pipe head
  472. run test login-timeout.sh ...
  473. ok connect after login grace timeout
  474. run test agent.sh ...
  475. ok simple agent test
  476. run test agent-getpeereid.sh ...
  477. skipped: need SUDO to switch to uid nobody
  478. run test agent-timeout.sh ...
  479. ok agent timeout test
  480. run test agent-ptrace.sh ...
  481. skipped (SUDO not set)
  482. run test keyscan.sh ...
  483. ok keyscan
  484. run test keygen-change.sh ...
  485. ok change passphrase for key
  486. run test keygen-convert.sh ...
  487. ok convert keys
  488. run test key-options.sh ...
  489. key option proto 1 command="echo bar"
  490. key option proto 1 no-pty,command="echo bar"
  491. key option proto 2 command="echo bar"
  492. key option proto 2 no-pty,command="echo bar"
  493. key option proto 1 no-pty
  494. key option proto 2 no-pty
  495. key option proto 1 environment
  496. key option proto 2 environment
  497. key option proto 1 from="127.0.0.1"
  498. key option proto 1 from="127.0.0.0/8"
  499. key option proto 2 from="127.0.0.1"
  500. key option proto 2 from="127.0.0.0/8"
  501. ok key options
  502. run test scp.sh ...
  503. scp: simple copy local file to local file
  504. scp: simple copy local file to remote file
  505. scp: simple copy remote file to local file
  506. scp: simple copy local file to remote dir
  507. scp: simple copy local file to local dir
  508. scp: simple copy remote file to local dir
  509. scp: recursive local dir to remote dir
  510. scp: recursive local dir to local dir
  511. scp: recursive remote dir to local dir
  512. scp: shell metacharacters
  513. scp: disallow bad server #0
  514. scp: disallow bad server #1
  515. scp: disallow bad server #2
  516. scp: disallow bad server #3
  517. scp: disallow bad server #4
  518. scp: detect non-directory target
  519. /home/ec2-user/openssh-6.6p1/regress/copy2: Not a directory
  520. ok scp
  521. run test sftp.sh ...
  522. test basic sftp put/get: buffer_size 5 num_requests 1
  523. test basic sftp put/get: buffer_size 5 num_requests 2
  524. test basic sftp put/get: buffer_size 5 num_requests 10
  525. test basic sftp put/get: buffer_size 1000 num_requests 1
  526. test basic sftp put/get: buffer_size 1000 num_requests 2
  527. test basic sftp put/get: buffer_size 1000 num_requests 10
  528. test basic sftp put/get: buffer_size 32000 num_requests 1
  529. test basic sftp put/get: buffer_size 32000 num_requests 2
  530. test basic sftp put/get: buffer_size 32000 num_requests 10
  531. test basic sftp put/get: buffer_size 64000 num_requests 1
  532. test basic sftp put/get: buffer_size 64000 num_requests 2
  533. test basic sftp put/get: buffer_size 64000 num_requests 10
  534. ok basic sftp put/get
  535. run test sftp-chroot.sh ...
  536. skipped: need SUDO to create file in /var/run, test won't work without
  537. run test sftp-cmds.sh ...
  538. sftp commands: lls
  539. sftp commands: lls w/path
  540. sftp commands: ls
  541. sftp commands: shell
  542. sftp commands: pwd
  543. sftp commands: lpwd
  544. sftp commands: quit
  545. sftp commands: help
  546. sftp commands: get
  547. sftp commands: get quoted
  548. sftp commands: get filename with quotes
  549. sftp commands: get filename with spaces
  550. sftp commands: get filename with glob metacharacters
  551. sftp commands: get to directory
  552. sftp commands: glob get to directory
  553. sftp commands: get to local dir
  554. sftp commands: glob get to local dir
  555. sftp commands: put
  556. sftp commands: put filename with quotes
  557. sftp commands: put filename with spaces
  558. sftp commands: put to directory
  559. sftp commands: glob put to directory
  560. sftp commands: put to local dir
  561. sftp commands: glob put to local dir
  562. sftp commands: rename
  563. sftp commands: rename directory
  564. sftp commands: ln
  565. sftp commands: ln -s
  566. sftp commands: mkdir
  567. sftp commands: chdir
  568. sftp commands: rmdir
  569. sftp commands: lmkdir
  570. sftp commands: lchdir
  571. ok sftp commands
  572. run test sftp-badcmds.sh ...
  573. sftp invalid commands: get nonexistent
  574. sftp invalid commands: glob get to nonexistent directory
  575. sftp invalid commands: put nonexistent
  576. sftp invalid commands: glob put to nonexistent directory
  577. sftp invalid commands: rename nonexistent
  578. sftp invalid commands: rename target exists (directory)
  579. sftp invalid commands: glob put files to local file
  580. ok sftp invalid commands
  581. run test sftp-batch.sh ...
  582. sftp batchfile: good commands
  583. sftp batchfile: bad commands
  584. sftp batchfile: comments and blanks
  585. sftp batchfile: junk command
  586. ok sftp batchfile
  587. run test sftp-glob.sh ...
  588. sftp glob: file glob
  589. sftp glob: dir glob
  590. sftp glob: quoted glob
  591. sftp glob: escaped glob
  592. sftp glob: escaped quote
  593. sftp glob: quoted quote
  594. sftp glob: single-quoted quote
  595. sftp glob: escaped space
  596. sftp glob: quoted space
  597. sftp glob: escaped slash
  598. sftp glob: quoted slash
  599. sftp glob: escaped slash at EOL
  600. sftp glob: quoted slash at EOL
  601. sftp glob: escaped slash+quote
  602. sftp glob: quoted slash+quote
  603. ok sftp glob
  604. run test sftp-perm.sh ...
  605. sftp permissions: read-only upload
  606. sftp permissions: read-only setstat
  607. sftp permissions: read-only rm
  608. sftp permissions: read-only mkdir
  609. sftp permissions: read-only rmdir
  610. sftp permissions: read-only posix-rename
  611. sftp permissions: read-only oldrename
  612. sftp permissions: read-only symlink
  613. sftp permissions: read-only hardlink
  614. sftp permissions: explicit open
  615. sftp permissions: explicit read
  616. sftp permissions: explicit write
  617. sftp permissions: explicit lstat
  618. sftp permissions: explicit opendir
  619. sftp permissions: explicit readdir
  620. sftp permissions: explicit setstat
  621. sftp permissions: explicit remove
  622. sftp permissions: explicit mkdir
  623. sftp permissions: explicit rmdir
  624. sftp permissions: explicit posix-rename
  625. sftp permissions: explicit rename
  626. sftp permissions: explicit symlink
  627. sftp permissions: explicit hardlink
  628. sftp permissions: explicit statvfs
  629. ok sftp permissions
  630. run test reconfigure.sh ...
  631. ok simple connect after reconfigure
  632. run test dynamic-forward.sh ...
  633. skipped (no suitable ProxyCommand found)
  634. run test forwarding.sh ...
  635. ok local and remote forwarding
  636. run test multiplex.sh ...
  637. test connection multiplexing: envpass
  638. test connection multiplexing: transfer
  639. test connection multiplexing: status 0
  640. test connection multiplexing: status 1
  641. test connection multiplexing: status 4
  642. test connection multiplexing: status 5
  643. test connection multiplexing: status 44
  644. test connection multiplexing: cmd check
  645. test connection multiplexing: cmd forward local
  646. test connection multiplexing: cmd forward remote
  647. test connection multiplexing: cmd exit
  648. test connection multiplexing: cmd stop
  649. ok connection multiplexing
  650. run test reexec.sh ...
  651. test config passing
  652. reexec tests: proto 1
  653. reexec tests: proto 2
  654. test reexec fallback
  655. reexec tests: proto 1
  656. reexec tests: proto 2
  657. test reexec fallback without privsep
  658. reexec tests: proto 1
  659. reexec tests: proto 2
  660. ok reexec tests
  661. run test brokenkeys.sh ...
  662. ok broken keys
  663. run test cfgmatch.sh ...
  664. ok sshd_config match
  665. run test addrmatch.sh ...
  666. test first entry for user 192.168.0.1 somehost
  667. test negative match for user 192.168.30.1 somehost
  668. test no match for user 19.0.0.1 somehost
  669. test list middle for user 10.255.255.254 somehost
  670. test faked IP in hostname for user 192.168.30.1 192.168.0.1
  671. test bare IP4 address for user 1.1.1.1 somehost.example.com
  672. test localaddress for user 19.0.0.1 somehost
  673. test localport for user 19.0.0.1 somehost
  674. test bare IP6 address for user ::1 somehost.example.com
  675. test deny IPv6 for user ::2 somehost.exaple.com
  676. test IP6 negated for user ::3 somehost
  677. test IP6 no match for user ::4 somehost
  678. test IP6 network for user 2000::1 somehost
  679. test IP6 network for user 2001::1 somehost
  680. test IP6 localaddress for user ::5 somehost
  681. test IP6 localport for user ::5 somehost
  682. ok address match
  683. run test localcommand.sh ...
  684. test localcommand: proto 1 localcommand
  685. test localcommand: proto 2 localcommand
  686. ok localcommand
  687. run test forcecommand.sh ...
  688. ok forced command
  689. run test portnum.sh ...
  690. port number parsing: invalid port 0
  691. port number parsing: invalid port 65536
  692. port number parsing: invalid port 131073
  693. port number parsing: invalid port 2000blah
  694. port number parsing: invalid port blah2000
  695. port number parsing: valid port 1
  696. port number parsing: valid port 22
  697. port number parsing: valid port 2222
  698. port number parsing: valid port 22222
  699. port number parsing: valid port 65535
  700. ok port number parsing
  701. run test keytype.sh ...
  702. keygen dsa, 1024 bits: keygen rsa, 2048 bits: keygen rsa, 3072 bits: keygen ed25519, 512 bits: keygen ecdsa, 256 bits: keygen ecdsa, 384 bits: keygen ecdsa, 521 bits: userkey dsa-1024, hostkey dsa-1024: userkey dsa-1024, hostkey dsa-1024: userkey dsa-1024, hostkey dsa-1024: userkey rsa-2048, hostkey rsa-2048: userkey rsa-2048, hostkey rsa-2048: userkey rsa-2048, hostkey rsa-2048: userkey rsa-3072, hostkey rsa-3072: userkey rsa-3072, hostkey rsa-3072: userkey rsa-3072, hostkey rsa-3072: userkey ed25519-512, hostkey ed25519-512: userkey ed25519-512, hostkey ed25519-512: userkey ed25519-512, hostkey ed25519-512:userkey ecdsa-256, hostkey ecdsa-256: userkey ecdsa-256, hostkey ecdsa-256: userkey ecdsa-256, hostkey ecdsa-256: userkey ecdsa-384, hostkey ecdsa-384: userkey ecdsa-384, hostkey ecdsa-384: userkey ecdsa-384, hostkey ecdsa-384: userkey ecdsa-521, hostkey ecdsa-521: userkey ecdsa-521, hostkey ecdsa-521: userkey ecdsa-521, hostkey ecdsa-521: ok login with different key types
  703. run test kextype.sh ...
  704. kex diffie-hellman-group1-sha1
  705. kex diffie-hellman-group14-sha1
  706. kex diffie-hellman-group-exchange-sha1
  707. kex diffie-hellman-group-exchange-sha256
  708. kex ecdh-sha2-nistp256
  709. kex ecdh-sha2-nistp384
  710. kex ecdh-sha2-nistp521
  711. kex diffie-hellman-group1-sha1
  712. kex curve25519-sha256@libssh.org
  713. ok login with different key exchange algorithms
  714. run test cert-hostkey.sh ...
  715. certified host keys: sign host rsa cert
  716. certified host keys: sign host rsa_v00 cert
  717. certified host keys: sign host dsa cert
  718. certified host keys: sign host dsa_v00 cert
  719. certified host keys: sign host ed25519 cert
  720. certified host keys: sign host ecdsa-sha2-nistp256 cert
  721. certified host keys: sign host ecdsa-sha2-nistp384 cert
  722. certified host keys: sign host ecdsa-sha2-nistp521 cert
  723. certified host keys: host rsa cert connect privsep yes
  724. certified host keys: host dsa cert connect privsep yes
  725. certified host keys: host ed25519 cert connect privsep yes
  726. certified host keys: host ecdsa-sha2-nistp256 cert connect privsep yes
  727. certified host keys: host ecdsa-sha2-nistp384 cert connect privsep yes
  728. certified host keys: host ecdsa-sha2-nistp521 cert connect privsep yes
  729. certified host keys: host rsa_v00 cert connect privsep yes
  730. certified host keys: host dsa_v00 cert connect privsep yes
  731. certified host keys: host rsa cert connect privsep no
  732. certified host keys: host dsa cert connect privsep no
  733. certified host keys: host ed25519 cert connect privsep no
  734. certified host keys: host ecdsa-sha2-nistp256 cert connect privsep no
  735. certified host keys: host ecdsa-sha2-nistp384 cert connect privsep no
  736. certified host keys: host ecdsa-sha2-nistp521 cert connect privsep no
  737. certified host keys: host rsa_v00 cert connect privsep no
  738. certified host keys: host dsa_v00 cert connect privsep no
  739. certified host keys: host rsa revoked cert privsep yes
  740. certified host keys: host dsa revoked cert privsep yes
  741. certified host keys: host ed25519 revoked cert privsep yes
  742. certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep yes
  743. certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep yes
  744. certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep yes
  745. certified host keys: host rsa_v00 revoked cert privsep yes
  746. certified host keys: host dsa_v00 revoked cert privsep yes
  747. certified host keys: host rsa revoked cert privsep no
  748. certified host keys: host dsa revoked cert privsep no
  749. certified host keys: host ed25519 revoked cert privsep no
  750. certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep no
  751. certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep no
  752. certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep no
  753. certified host keys: host rsa_v00 revoked cert privsep no
  754. certified host keys: host dsa_v00 revoked cert privsep no
  755. certified host keys: host rsa revoked cert
  756. certified host keys: host dsa revoked cert
  757. certified host keys: host ed25519 revoked cert
  758. certified host keys: host ecdsa-sha2-nistp256 revoked cert
  759. certified host keys: host ecdsa-sha2-nistp384 revoked cert
  760. certified host keys: host ecdsa-sha2-nistp521 revoked cert
  761. certified host keys: host rsa_v00 revoked cert
  762. certified host keys: host dsa_v00 revoked cert
  763. certified host keys: host cert connect user-certificate rsa expect failure
  764. certified host keys: host cert connect user-certificate rsa_v00 expect failure
  765. certified host keys: host cert connect empty principals rsa expect success
  766. certified host keys: host cert connect empty principals rsa_v00 expect success
  767. certified host keys: host cert connect wrong principals rsa expect failure
  768. certified host keys: host cert connect wrong principals rsa_v00 expect failure
  769. certified host keys: host cert connect cert not yet valid rsa expect failure
  770. certified host keys: host cert connect cert not yet valid rsa_v00 expect failure
  771. certified host keys: host cert connect cert expired rsa expect failure
  772. certified host keys: host cert connect cert expired rsa_v00 expect failure
  773. certified host keys: host cert connect cert valid interval rsa expect success
  774. certified host keys: host cert connect cert valid interval rsa_v00 expect success
  775. certified host keys: host cert connect cert has constraints rsa expect failure
  776. certified host keys: host cert connect cert has constraints rsa_v00 expect failure
  777. certified host keys: host rsa v01 cert downgrade to raw key
  778. certified host keys: host dsa v01 cert downgrade to raw key
  779. certified host keys: host rsa v00 cert downgrade to raw key
  780. certified host keys: host dsa v00 cert downgrade to raw key
  781. certified host keys: host rsa connect wrong cert
  782. certified host keys: host dsa connect wrong cert
  783. certified host keys: host rsa connect wrong cert
  784. certified host keys: host dsa connect wrong cert
  785. ok certified host keys
  786. run test cert-userkey.sh ...
  787. certified user keys: sign user rsa cert
  788. certified user keys: sign host rsa_v00 cert
  789. certified user keys: sign user dsa cert
  790. certified user keys: sign host dsa_v00 cert
  791. certified user keys: sign user ed25519 cert
  792. certified user keys: sign user ecdsa-sha2-nistp256 cert
  793. certified user keys: sign user ecdsa-sha2-nistp384 cert
  794. certified user keys: sign user ecdsa-sha2-nistp521 cert
  795. certified user keys: rsa privsep yes missing authorized_principals
  796. certified user keys: rsa privsep yes empty authorized_principals
  797. certified user keys: rsa privsep yes wrong authorized_principals
  798. certified user keys: rsa privsep yes correct authorized_principals
  799. certified user keys: rsa privsep yes authorized_principals bad key opt
  800. certified user keys: rsa privsep yes authorized_principals command=false
  801. certified user keys: rsa privsep yes authorized_principals command=true
  802. certified user keys: rsa privsep yes wrong principals key option
  803. certified user keys: rsa privsep yes correct principals key option
  804. certified user keys: rsa privsep no missing authorized_principals
  805. certified user keys: rsa privsep no empty authorized_principals
  806. certified user keys: rsa privsep no wrong authorized_principals
  807. certified user keys: rsa privsep no correct authorized_principals
  808. certified user keys: rsa privsep no authorized_principals bad key opt
  809. certified user keys: rsa privsep no authorized_principals command=false
  810. certified user keys: rsa privsep no authorized_principals command=true
  811. certified user keys: rsa privsep no wrong principals key option
  812. certified user keys: rsa privsep no correct principals key option
  813. certified user keys: dsa privsep yes missing authorized_principals
  814. certified user keys: dsa privsep yes empty authorized_principals
  815. certified user keys: dsa privsep yes wrong authorized_principals
  816. certified user keys: dsa privsep yes correct authorized_principals
  817. certified user keys: dsa privsep yes authorized_principals bad key opt
  818. certified user keys: dsa privsep yes authorized_principals command=false
  819. certified user keys: dsa privsep yes authorized_principals command=true
  820. certified user keys: dsa privsep yes wrong principals key option
  821. certified user keys: dsa privsep yes correct principals key option
  822. certified user keys: dsa privsep no missing authorized_principals
  823. certified user keys: dsa privsep no empty authorized_principals
  824. certified user keys: dsa privsep no wrong authorized_principals
  825. certified user keys: dsa privsep no correct authorized_principals
  826. certified user keys: dsa privsep no authorized_principals bad key opt
  827. certified user keys: dsa privsep no authorized_principals command=false
  828. certified user keys: dsa privsep no authorized_principals command=true
  829. certified user keys: dsa privsep no wrong principals key option
  830. certified user keys: dsa privsep no correct principals key option
  831. certified user keys: ed25519 privsep yes missing authorized_principals
  832. certified user keys: ed25519 privsep yes empty authorized_principals
  833. certified user keys: ed25519 privsep yes wrong authorized_principals
  834. certified user keys: ed25519 privsep yes correct authorized_principals
  835. certified user keys: ed25519 privsep yes authorized_principals bad key opt
  836. certified user keys: ed25519 privsep yes authorized_principals command=false
  837. certified user keys: ed25519 privsep yes authorized_principals command=true
  838. certified user keys: ed25519 privsep yes wrong principals key option
  839. certified user keys: ed25519 privsep yes correct principals key option
  840. certified user keys: ed25519 privsep no missing authorized_principals
  841. certified user keys: ed25519 privsep no empty authorized_principals
  842. certified user keys: ed25519 privsep no wrong authorized_principals
  843. certified user keys: ed25519 privsep no correct authorized_principals
  844. certified user keys: ed25519 privsep no authorized_principals bad key opt
  845. certified user keys: ed25519 privsep no authorized_principals command=false
  846. certified user keys: ed25519 privsep no authorized_principals command=true
  847. certified user keys: ed25519 privsep no wrong principals key option
  848. certified user keys: ed25519 privsep no correct principals key option
  849. certified user keys: ecdsa-sha2-nistp256 privsep yes missing authorized_principals
  850. certified user keys: ecdsa-sha2-nistp256 privsep yes empty authorized_principals
  851. certified user keys: ecdsa-sha2-nistp256 privsep yes wrong authorized_principals
  852. certified user keys: ecdsa-sha2-nistp256 privsep yes correct authorized_principals
  853. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals bad key opt
  854. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=false
  855. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=true
  856. certified user keys: ecdsa-sha2-nistp256 privsep yes wrong principals key option
  857. certified user keys: ecdsa-sha2-nistp256 privsep yes correct principals key option
  858. certified user keys: ecdsa-sha2-nistp256 privsep no missing authorized_principals
  859. certified user keys: ecdsa-sha2-nistp256 privsep no empty authorized_principals
  860. certified user keys: ecdsa-sha2-nistp256 privsep no wrong authorized_principals
  861. certified user keys: ecdsa-sha2-nistp256 privsep no correct authorized_principals
  862. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals bad key opt
  863. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals command=false
  864. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals command=true
  865. certified user keys: ecdsa-sha2-nistp256 privsep no wrong principals key option
  866. certified user keys: ecdsa-sha2-nistp256 privsep no correct principals key option
  867. certified user keys: ecdsa-sha2-nistp384 privsep yes missing authorized_principals
  868. certified user keys: ecdsa-sha2-nistp384 privsep yes empty authorized_principals
  869. certified user keys: ecdsa-sha2-nistp384 privsep yes wrong authorized_principals
  870. certified user keys: ecdsa-sha2-nistp384 privsep yes correct authorized_principals
  871. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals bad key opt
  872. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=false
  873. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=true
  874. certified user keys: ecdsa-sha2-nistp384 privsep yes wrong principals key option
  875. certified user keys: ecdsa-sha2-nistp384 privsep yes correct principals key option
  876. certified user keys: ecdsa-sha2-nistp384 privsep no missing authorized_principals
  877. certified user keys: ecdsa-sha2-nistp384 privsep no empty authorized_principals
  878. certified user keys: ecdsa-sha2-nistp384 privsep no wrong authorized_principals
  879. certified user keys: ecdsa-sha2-nistp384 privsep no correct authorized_principals
  880. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals bad key opt
  881. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals command=false
  882. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals command=true
  883. certified user keys: ecdsa-sha2-nistp384 privsep no wrong principals key option
  884. certified user keys: ecdsa-sha2-nistp384 privsep no correct principals key option
  885. certified user keys: ecdsa-sha2-nistp521 privsep yes missing authorized_principals
  886. certified user keys: ecdsa-sha2-nistp521 privsep yes empty authorized_principals
  887. certified user keys: ecdsa-sha2-nistp521 privsep yes wrong authorized_principals
  888. certified user keys: ecdsa-sha2-nistp521 privsep yes correct authorized_principals
  889. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals bad key opt
  890. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=false
  891. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=true
  892. certified user keys: ecdsa-sha2-nistp521 privsep yes wrong principals key option
  893. certified user keys: ecdsa-sha2-nistp521 privsep yes correct principals key option
  894. certified user keys: ecdsa-sha2-nistp521 privsep no missing authorized_principals
  895. certified user keys: ecdsa-sha2-nistp521 privsep no empty authorized_principals
  896. certified user keys: ecdsa-sha2-nistp521 privsep no wrong authorized_principals
  897. certified user keys: ecdsa-sha2-nistp521 privsep no correct authorized_principals
  898. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals bad key opt
  899. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals command=false
  900. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals command=true
  901. certified user keys: ecdsa-sha2-nistp521 privsep no wrong principals key option
  902. certified user keys: ecdsa-sha2-nistp521 privsep no correct principals key option
  903. certified user keys: rsa_v00 privsep yes missing authorized_principals
  904. certified user keys: rsa_v00 privsep yes empty authorized_principals
  905. certified user keys: rsa_v00 privsep yes wrong authorized_principals
  906. certified user keys: rsa_v00 privsep yes correct authorized_principals
  907. certified user keys: rsa_v00 privsep yes authorized_principals bad key opt
  908. certified user keys: rsa_v00 privsep yes authorized_principals command=false
  909. certified user keys: rsa_v00 privsep yes authorized_principals command=true
  910. certified user keys: rsa_v00 privsep yes wrong principals key option
  911. certified user keys: rsa_v00 privsep yes correct principals key option
  912. certified user keys: rsa_v00 privsep no missing authorized_principals
  913. certified user keys: rsa_v00 privsep no empty authorized_principals
  914. certified user keys: rsa_v00 privsep no wrong authorized_principals
  915. certified user keys: rsa_v00 privsep no correct authorized_principals
  916. certified user keys: rsa_v00 privsep no authorized_principals bad key opt
  917. certified user keys: rsa_v00 privsep no authorized_principals command=false
  918. certified user keys: rsa_v00 privsep no authorized_principals command=true
  919. certified user keys: rsa_v00 privsep no wrong principals key option
  920. certified user keys: rsa_v00 privsep no correct principals key option
  921. certified user keys: dsa_v00 privsep yes missing authorized_principals
  922. certified user keys: dsa_v00 privsep yes empty authorized_principals
  923. certified user keys: dsa_v00 privsep yes wrong authorized_principals
  924. certified user keys: dsa_v00 privsep yes correct authorized_principals
  925. certified user keys: dsa_v00 privsep yes authorized_principals bad key opt
  926. certified user keys: dsa_v00 privsep yes authorized_principals command=false
  927. certified user keys: dsa_v00 privsep yes authorized_principals command=true
  928. certified user keys: dsa_v00 privsep yes wrong principals key option
  929. certified user keys: dsa_v00 privsep yes correct principals key option
  930. certified user keys: dsa_v00 privsep no missing authorized_principals
  931. certified user keys: dsa_v00 privsep no empty authorized_principals
  932. certified user keys: dsa_v00 privsep no wrong authorized_principals
  933. certified user keys: dsa_v00 privsep no correct authorized_principals
  934. certified user keys: dsa_v00 privsep no authorized_principals bad key opt
  935. certified user keys: dsa_v00 privsep no authorized_principals command=false
  936. certified user keys: dsa_v00 privsep no authorized_principals command=true
  937. certified user keys: dsa_v00 privsep no wrong principals key option
  938. certified user keys: dsa_v00 privsep no correct principals key option
  939. certified user keys: rsa privsep yes authorized_keys connect
  940. certified user keys: rsa privsep yes authorized_keys revoked key
  941. certified user keys: rsa privsep yes authorized_keys revoked via KRL
  942. certified user keys: rsa privsep yes authorized_keys empty KRL
  943. certified user keys: rsa privsep no authorized_keys connect
  944. certified user keys: rsa privsep no authorized_keys revoked key
  945. certified user keys: rsa privsep no authorized_keys revoked via KRL
  946. certified user keys: rsa privsep no authorized_keys empty KRL
  947. certified user keys: rsa authorized_keys revoked CA key
  948. certified user keys: dsa privsep yes authorized_keys connect
  949. certified user keys: dsa privsep yes authorized_keys revoked key
  950. certified user keys: dsa privsep yes authorized_keys revoked via KRL
  951. certified user keys: dsa privsep yes authorized_keys empty KRL
  952. certified user keys: dsa privsep no authorized_keys connect
  953. certified user keys: dsa privsep no authorized_keys revoked key
  954. certified user keys: dsa privsep no authorized_keys revoked via KRL
  955. certified user keys: dsa privsep no authorized_keys empty KRL
  956. certified user keys: dsa authorized_keys revoked CA key
  957. certified user keys: ed25519 privsep yes authorized_keys connect
  958. certified user keys: ed25519 privsep yes authorized_keys revoked key
  959. certified user keys: ed25519 privsep yes authorized_keys revoked via KRL
  960. certified user keys: ed25519 privsep yes authorized_keys empty KRL
  961. certified user keys: ed25519 privsep no authorized_keys connect
  962. certified user keys: ed25519 privsep no authorized_keys revoked key
  963. certified user keys: ed25519 privsep no authorized_keys revoked via KRL
  964. certified user keys: ed25519 privsep no authorized_keys empty KRL
  965. certified user keys: ed25519 authorized_keys revoked CA key
  966. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys connect
  967. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked key
  968. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked via KRL
  969. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys empty KRL
  970. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys connect
  971. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked key
  972. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked via KRL
  973. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys empty KRL
  974. certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked CA key
  975. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys connect
  976. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked key
  977. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked via KRL
  978. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys empty KRL
  979. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys connect
  980. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked key
  981. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked via KRL
  982. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys empty KRL
  983. certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked CA key
  984. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys connect
  985. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked key
  986. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked via KRL
  987. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys empty KRL
  988. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys connect
  989. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked key
  990. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked via KRL
  991. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys empty KRL
  992. certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked CA key
  993. certified user keys: rsa_v00 privsep yes authorized_keys connect
  994. certified user keys: rsa_v00 privsep yes authorized_keys revoked key
  995. certified user keys: rsa_v00 privsep yes authorized_keys revoked via KRL
  996. certified user keys: rsa_v00 privsep yes authorized_keys empty KRL
  997. certified user keys: rsa_v00 privsep no authorized_keys connect
  998. certified user keys: rsa_v00 privsep no authorized_keys revoked key
  999. certified user keys: rsa_v00 privsep no authorized_keys revoked via KRL
  1000. certified user keys: rsa_v00 privsep no authorized_keys empty KRL
  1001. certified user keys: rsa_v00 authorized_keys revoked CA key
  1002. certified user keys: dsa_v00 privsep yes authorized_keys connect
  1003. certified user keys: dsa_v00 privsep yes authorized_keys revoked key
  1004. certified user keys: dsa_v00 privsep yes authorized_keys revoked via KRL
  1005. certified user keys: dsa_v00 privsep yes authorized_keys empty KRL
  1006. certified user keys: dsa_v00 privsep no authorized_keys connect
  1007. certified user keys: dsa_v00 privsep no authorized_keys revoked key
  1008. certified user keys: dsa_v00 privsep no authorized_keys revoked via KRL
  1009. certified user keys: dsa_v00 privsep no authorized_keys empty KRL
  1010. certified user keys: dsa_v00 authorized_keys revoked CA key
  1011. certified user keys: authorized_keys CA does not authenticate
  1012. certified user keys: ensure CA key does not authenticate user
  1013. certified user keys: rsa privsep yes TrustedUserCAKeys connect
  1014. certified user keys: rsa privsep yes TrustedUserCAKeys revoked key
  1015. certified user keys: rsa privsep yes TrustedUserCAKeys revoked via KRL
  1016. certified user keys: rsa privsep yes TrustedUserCAKeys empty KRL
  1017. certified user keys: rsa privsep no TrustedUserCAKeys connect
  1018. certified user keys: rsa privsep no TrustedUserCAKeys revoked key
  1019. certified user keys: rsa privsep no TrustedUserCAKeys revoked via KRL
  1020. certified user keys: rsa privsep no TrustedUserCAKeys empty KRL
  1021. certified user keys: rsa TrustedUserCAKeys revoked CA key
  1022. certified user keys: dsa privsep yes TrustedUserCAKeys connect
  1023. certified user keys: dsa privsep yes TrustedUserCAKeys revoked key
  1024. certified user keys: dsa privsep yes TrustedUserCAKeys revoked via KRL
  1025. certified user keys: dsa privsep yes TrustedUserCAKeys empty KRL
  1026. certified user keys: dsa privsep no TrustedUserCAKeys connect
  1027. certified user keys: dsa privsep no TrustedUserCAKeys revoked key
  1028. certified user keys: dsa privsep no TrustedUserCAKeys revoked via KRL
  1029. certified user keys: dsa privsep no TrustedUserCAKeys empty KRL
  1030. certified user keys: dsa TrustedUserCAKeys revoked CA key
  1031. certified user keys: ed25519 privsep yes TrustedUserCAKeys connect
  1032. certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked key
  1033. certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked via KRL
  1034. certified user keys: ed25519 privsep yes TrustedUserCAKeys empty KRL
  1035. certified user keys: ed25519 privsep no TrustedUserCAKeys connect
  1036. certified user keys: ed25519 privsep no TrustedUserCAKeys revoked key
  1037. certified user keys: ed25519 privsep no TrustedUserCAKeys revoked via KRL
  1038. certified user keys: ed25519 privsep no TrustedUserCAKeys empty KRL
  1039. certified user keys: ed25519 TrustedUserCAKeys revoked CA key
  1040. certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys connect
  1041. certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked key
  1042. certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked via KRL
  1043. certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys empty KRL
  1044. certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys connect
  1045. certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked key
  1046. certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked via KRL
  1047. certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys empty KRL
  1048. certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked CA key
  1049. certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys connect
  1050. certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked key
  1051. certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked via KRL
  1052. certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys empty KRL
  1053. certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys connect
  1054. certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked key
  1055. certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked via KRL
  1056. certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys empty KRL
  1057. certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked CA key
  1058. certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys connect
  1059. certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked key
  1060. certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked via KRL
  1061. certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys empty KRL
  1062. certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys connect
  1063. certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked key
  1064. certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked via KRL
  1065. certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys empty KRL
  1066. certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked CA key
  1067. certified user keys: rsa_v00 privsep yes TrustedUserCAKeys connect
  1068. certified user keys: rsa_v00 privsep yes TrustedUserCAKeys revoked key
  1069. certified user keys: rsa_v00 privsep yes TrustedUserCAKeys revoked via KRL
  1070. certified user keys: rsa_v00 privsep yes TrustedUserCAKeys empty KRL
  1071. certified user keys: rsa_v00 privsep no TrustedUserCAKeys connect
  1072. certified user keys: rsa_v00 privsep no TrustedUserCAKeys revoked key
  1073. certified user keys: rsa_v00 privsep no TrustedUserCAKeys revoked via KRL
  1074. certified user keys: rsa_v00 privsep no TrustedUserCAKeys empty KRL
  1075. certified user keys: rsa_v00 TrustedUserCAKeys revoked CA key
  1076. certified user keys: dsa_v00 privsep yes TrustedUserCAKeys connect
  1077. certified user keys: dsa_v00 privsep yes TrustedUserCAKeys revoked key
  1078. certified user keys: dsa_v00 privsep yes TrustedUserCAKeys revoked via KRL
  1079. certified user keys: dsa_v00 privsep yes TrustedUserCAKeys empty KRL
  1080. certified user keys: dsa_v00 privsep no TrustedUserCAKeys connect
  1081. certified user keys: dsa_v00 privsep no TrustedUserCAKeys revoked key
  1082. certified user keys: dsa_v00 privsep no TrustedUserCAKeys revoked via KRL
  1083. certified user keys: dsa_v00 privsep no TrustedUserCAKeys empty KRL
  1084. certified user keys: dsa_v00 TrustedUserCAKeys revoked CA key
  1085. certified user keys: TrustedUserCAKeys CA does not authenticate
  1086. certified user keys: ensure CA key does not authenticate user
  1087. certified user keys: correct principal auth authorized_keys expect success rsa
  1088. certified user keys: correct principal auth authorized_keys expect success rsa_v00
  1089. certified user keys: correct principal auth TrustedUserCAKeys expect success rsa
  1090. certified user keys: correct principal auth TrustedUserCAKeys expect success rsa_v00
  1091. certified user keys: host-certificate auth authorized_keys expect failure rsa
  1092. certified user keys: host-certificate auth authorized_keys expect failure rsa_v00
  1093. certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa
  1094. certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa_v00
  1095. certified user keys: wrong principals auth authorized_keys expect failure rsa
  1096. certified user keys: wrong principals auth authorized_keys expect failure rsa_v00
  1097. certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa
  1098. certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa_v00
  1099. certified user keys: cert not yet valid auth authorized_keys expect failure rsa
  1100. certified user keys: cert not yet valid auth authorized_keys expect failure rsa_v00
  1101. certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa
  1102. certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa_v00
  1103. certified user keys: cert expired auth authorized_keys expect failure rsa
  1104. certified user keys: cert expired auth authorized_keys expect failure rsa_v00
  1105. certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa
  1106. certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa_v00
  1107. certified user keys: cert valid interval auth authorized_keys expect success rsa
  1108. certified user keys: cert valid interval auth authorized_keys expect success rsa_v00
  1109. certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa
  1110. certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa_v00
  1111. certified user keys: wrong source-address auth authorized_keys expect failure rsa
  1112. certified user keys: wrong source-address auth authorized_keys expect failure rsa_v00
  1113. certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa
  1114. certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa_v00
  1115. certified user keys: force-command auth authorized_keys expect failure rsa
  1116. certified user keys: force-command auth authorized_keys expect failure rsa_v00
  1117. certified user keys: force-command auth TrustedUserCAKeys expect failure rsa
  1118. certified user keys: force-command auth TrustedUserCAKeys expect failure rsa_v00
  1119. certified user keys: empty principals auth authorized_keys expect success rsa
  1120. certified user keys: empty principals auth authorized_keys expect success rsa_v00
  1121. certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa
  1122. certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa_v00
  1123. certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa
  1124. certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa_v00
  1125. certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa
  1126. certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa_v00
  1127. certified user keys: principals key option principals auth authorized_keys expect success rsa
  1128. certified user keys: principals key option principals auth authorized_keys expect success rsa_v00
  1129. certified user keys: principals key option no principals auth authorized_keys expect failure rsa
  1130. certified user keys: principals key option no principals auth authorized_keys expect failure rsa_v00
  1131. certified user keys: user rsa connect wrong cert
  1132. certified user keys: user dsa connect wrong cert
  1133. certified user keys: user ed25519 connect wrong cert
  1134. certified user keys: user ecdsa-sha2-nistp256 connect wrong cert
  1135. certified user keys: user ecdsa-sha2-nistp384 connect wrong cert
  1136. certified user keys: user ecdsa-sha2-nistp521 connect wrong cert
  1137. certified user keys: user rsa_v00 connect wrong cert
  1138. certified user keys: user dsa_v00 connect wrong cert
  1139. ok certified user keys
  1140. run test host-expand.sh ...
  1141. test expand %h and %n: proto 1
  1142. test expand %h and %n: proto 2
  1143. ok expand %h and %n
  1144. run test keys-command.sh ...
  1145. skipped (SUDO not set)
  1146. need SUDO to create file in /var/run, test won't work without
  1147. run test forward-control.sh ...
  1148. check_lfwd done (expecting Y): proto 1, default configuration
  1149. check_rfwd done (expecting Y): proto 1, default configuration
  1150. check_lfwd done (expecting Y): proto 2, default configuration
  1151. check_rfwd done (expecting Y): proto 2, default configuration
  1152. check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=yes
  1153. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes
  1154. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=yes, !PermitOpen
  1155. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, !PermitOpen
  1156. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=yes, !permitopen
  1157. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, !permitopen
  1158. check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, permitopen
  1159. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, permitopen
  1160. check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=yes
  1161. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes
  1162. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=yes, !PermitOpen
  1163. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, !PermitOpen
  1164. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=yes, !permitopen
  1165. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, !permitopen
  1166. check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, permitopen
  1167. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, permitopen
  1168. check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=local
  1169. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local
  1170. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=local, !PermitOpen
  1171. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local, !PermitOpen
  1172. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=local, !permitopen
  1173. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local, !permitopen
  1174. check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=local, permitopen
  1175. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local, permitopen
  1176. check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=local
  1177. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local
  1178. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=local, !PermitOpen
  1179. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local, !PermitOpen
  1180. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=local, !permitopen
  1181. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local, !permitopen
  1182. check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=local, permitopen
  1183. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local, permitopen
  1184. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote
  1185. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote
  1186. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote, !PermitOpen
  1187. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote, !PermitOpen
  1188. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote, !permitopen
  1189. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote, !permitopen
  1190. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote, permitopen
  1191. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote, permitopen
  1192. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote
  1193. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote
  1194. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote, !PermitOpen
  1195. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote, !PermitOpen
  1196. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote, !permitopen
  1197. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote, !permitopen
  1198. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote, permitopen
  1199. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote, permitopen
  1200. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no
  1201. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no
  1202. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no, !PermitOpen
  1203. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no, !PermitOpen
  1204. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no, !permitopen
  1205. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no, !permitopen
  1206. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no, permitopen
  1207. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no, permitopen
  1208. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no
  1209. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no
  1210. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no, !PermitOpen
  1211. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no, !PermitOpen
  1212. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no, !permitopen
  1213. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no, !permitopen
  1214. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no, permitopen
  1215. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no, permitopen
  1216. ok sshd control of local and remote forwarding
  1217. run test integrity.sh ...
  1218. test integrity: hmac-sha1 @2900
  1219. test integrity: hmac-sha1 @2901
  1220. test integrity: hmac-sha1 @2902
  1221. test integrity: hmac-sha1 @2903
  1222. test integrity: hmac-sha1 @2904
  1223. test integrity: hmac-sha1 @2905
  1224. test integrity: hmac-sha1 @2906
  1225. test integrity: hmac-sha1 @2907
  1226. test integrity: hmac-sha1 @2908
  1227. test integrity: hmac-sha1 @2909
  1228. test integrity: 10 errors: mac 10 padding 0 length 0
  1229. test integrity: hmac-sha1-96 @2900
  1230. test integrity: hmac-sha1-96 @2901
  1231. test integrity: hmac-sha1-96 @2902
  1232. test integrity: hmac-sha1-96 @2903
  1233. test integrity: hmac-sha1-96 @2904
  1234. test integrity: hmac-sha1-96 @2905
  1235. test integrity: hmac-sha1-96 @2906
  1236. test integrity: hmac-sha1-96 @2907
  1237. test integrity: hmac-sha1-96 @2908
  1238. test integrity: hmac-sha1-96 @2909
  1239. test integrity: 10 errors: mac 10 padding 0 length 0
  1240. test integrity: hmac-sha2-256 @2900
  1241. test integrity: hmac-sha2-256 @2901
  1242. test integrity: hmac-sha2-256 @2902
  1243. test integrity: hmac-sha2-256 @2903
  1244. test integrity: hmac-sha2-256 @2904
  1245. test integrity: hmac-sha2-256 @2905
  1246. test integrity: hmac-sha2-256 @2906
  1247. test integrity: hmac-sha2-256 @2907
  1248. test integrity: hmac-sha2-256 @2908
  1249. test integrity: hmac-sha2-256 @2909
  1250. test integrity: 10 errors: mac 10 padding 0 length 0
  1251. test integrity: hmac-sha2-512 @2900
  1252. test integrity: hmac-sha2-512 @2901
  1253. test integrity: hmac-sha2-512 @2902
  1254. test integrity: hmac-sha2-512 @2903
  1255. test integrity: hmac-sha2-512 @2904
  1256. test integrity: hmac-sha2-512 @2905
  1257. test integrity: hmac-sha2-512 @2906
  1258. test integrity: hmac-sha2-512 @2907
  1259. test integrity: hmac-sha2-512 @2908
  1260. test integrity: hmac-sha2-512 @2909
  1261. test integrity: 10 errors: mac 10 padding 0 length 0
  1262. test integrity: hmac-md5 @2900
  1263. test integrity: hmac-md5 @2901
  1264. test integrity: hmac-md5 @2902
  1265. test integrity: hmac-md5 @2903
  1266. test integrity: hmac-md5 @2904
  1267. test integrity: hmac-md5 @2905
  1268. test integrity: hmac-md5 @2906
  1269. test integrity: hmac-md5 @2907
  1270. test integrity: hmac-md5 @2908
  1271. test integrity: hmac-md5 @2909
  1272. test integrity: 10 errors: mac 10 padding 0 length 0
  1273. test integrity: hmac-md5-96 @2900
  1274. test integrity: hmac-md5-96 @2901
  1275. test integrity: hmac-md5-96 @2902
  1276. test integrity: hmac-md5-96 @2903
  1277. test integrity: hmac-md5-96 @2904
  1278. test integrity: hmac-md5-96 @2905
  1279. test integrity: hmac-md5-96 @2906
  1280. test integrity: hmac-md5-96 @2907
  1281. test integrity: hmac-md5-96 @2908
  1282. test integrity: hmac-md5-96 @2909
  1283. test integrity: 10 errors: mac 10 padding 0 length 0
  1284. test integrity: hmac-ripemd160 @2900
  1285. test integrity: hmac-ripemd160 @2901
  1286. test integrity: hmac-ripemd160 @2902
  1287. test integrity: hmac-ripemd160 @2903
  1288. test integrity: hmac-ripemd160 @2904
  1289. test integrity: hmac-ripemd160 @2905
  1290. test integrity: hmac-ripemd160 @2906
  1291. test integrity: hmac-ripemd160 @2907
  1292. test integrity: hmac-ripemd160 @2908
  1293. test integrity: hmac-ripemd160 @2909
  1294. test integrity: 10 errors: mac 10 padding 0 length 0
  1295. test integrity: hmac-ripemd160@openssh.com @2900
  1296. test integrity: hmac-ripemd160@openssh.com @2901
  1297. test integrity: hmac-ripemd160@openssh.com @2902
  1298. test integrity: hmac-ripemd160@openssh.com @2903
  1299. test integrity: hmac-ripemd160@openssh.com @2904
  1300. test integrity: hmac-ripemd160@openssh.com @2905
  1301. test integrity: hmac-ripemd160@openssh.com @2906
  1302. test integrity: hmac-ripemd160@openssh.com @2907
  1303. test integrity: hmac-ripemd160@openssh.com @2908
  1304. test integrity: hmac-ripemd160@openssh.com @2909
  1305. test integrity: 10 errors: mac 10 padding 0 length 0
  1306. test integrity: umac-64@openssh.com @2900
  1307. test integrity: umac-64@openssh.com @2901
  1308. test integrity: umac-64@openssh.com @2902
  1309. test integrity: umac-64@openssh.com @2903
  1310. test integrity: umac-64@openssh.com @2906
  1311. test integrity: umac-64@openssh.com @2907
  1312. test integrity: umac-64@openssh.com @2908
  1313. test integrity: umac-64@openssh.com @2909
  1314. test integrity: 8 errors: mac 6 padding 1 length 1
  1315. test integrity: umac-128@openssh.com @2900
  1316. test integrity: umac-128@openssh.com @2901
  1317. test integrity: umac-128@openssh.com @2902
  1318. test integrity: umac-128@openssh.com @2903
  1319. test integrity: umac-128@openssh.com @2904
  1320. test integrity: umac-128@openssh.com @2905
  1321. test integrity: umac-128@openssh.com @2906
  1322. test integrity: umac-128@openssh.com @2907
  1323. test integrity: umac-128@openssh.com @2908
  1324. test integrity: umac-128@openssh.com @2909
  1325. test integrity: 10 errors: mac 10 padding 0 length 0
  1326. test integrity: hmac-sha1-etm@openssh.com @2900
  1327. test integrity: hmac-sha1-etm@openssh.com @2901
  1328. test integrity: hmac-sha1-etm@openssh.com @2902
  1329. test integrity: hmac-sha1-etm@openssh.com @2903
  1330. test integrity: hmac-sha1-etm@openssh.com @2904
  1331. test integrity: hmac-sha1-etm@openssh.com @2905
  1332. test integrity: hmac-sha1-etm@openssh.com @2906
  1333. test integrity: hmac-sha1-etm@openssh.com @2907
  1334. test integrity: hmac-sha1-etm@openssh.com @2908
  1335. test integrity: hmac-sha1-etm@openssh.com @2909
  1336. test integrity: 10 errors: mac 10 padding 0 length 0
  1337. test integrity: hmac-sha1-96-etm@openssh.com @2900
  1338. test integrity: hmac-sha1-96-etm@openssh.com @2901
  1339. test integrity: hmac-sha1-96-etm@openssh.com @2902
  1340. test integrity: hmac-sha1-96-etm@openssh.com @2903
  1341. test integrity: hmac-sha1-96-etm@openssh.com @2904
  1342. test integrity: hmac-sha1-96-etm@openssh.com @2905
  1343. test integrity: hmac-sha1-96-etm@openssh.com @2906
  1344. test integrity: hmac-sha1-96-etm@openssh.com @2907
  1345. test integrity: hmac-sha1-96-etm@openssh.com @2908
  1346. test integrity: hmac-sha1-96-etm@openssh.com @2909
  1347. test integrity: 10 errors: mac 10 padding 0 length 0
  1348. test integrity: hmac-sha2-256-etm@openssh.com @2900
  1349. test integrity: hmac-sha2-256-etm@openssh.com @2901
  1350. test integrity: hmac-sha2-256-etm@openssh.com @2902
  1351. test integrity: hmac-sha2-256-etm@openssh.com @2903
  1352. test integrity: hmac-sha2-256-etm@openssh.com @2904
  1353. test integrity: hmac-sha2-256-etm@openssh.com @2905
  1354. test integrity: hmac-sha2-256-etm@openssh.com @2906
  1355. test integrity: hmac-sha2-256-etm@openssh.com @2907
  1356. test integrity: hmac-sha2-256-etm@openssh.com @2908
  1357. test integrity: hmac-sha2-256-etm@openssh.com @2909
  1358. test integrity: 10 errors: mac 10 padding 0 length 0
  1359. test integrity: hmac-sha2-512-etm@openssh.com @2900
  1360. test integrity: hmac-sha2-512-etm@openssh.com @2901
  1361. test integrity: hmac-sha2-512-etm@openssh.com @2902
  1362. test integrity: hmac-sha2-512-etm@openssh.com @2903
  1363. test integrity: hmac-sha2-512-etm@openssh.com @2904
  1364. test integrity: hmac-sha2-512-etm@openssh.com @2905
  1365. test integrity: hmac-sha2-512-etm@openssh.com @2906
  1366. test integrity: hmac-sha2-512-etm@openssh.com @2907
  1367. test integrity: hmac-sha2-512-etm@openssh.com @2908
  1368. test integrity: hmac-sha2-512-etm@openssh.com @2909
  1369. test integrity: 10 errors: mac 10 padding 0 length 0
  1370. test integrity: hmac-md5-etm@openssh.com @2900
  1371. test integrity: hmac-md5-etm@openssh.com @2901
  1372. test integrity: hmac-md5-etm@openssh.com @2902
  1373. test integrity: hmac-md5-etm@openssh.com @2903
  1374. test integrity: hmac-md5-etm@openssh.com @2904
  1375. test integrity: hmac-md5-etm@openssh.com @2905
  1376. test integrity: hmac-md5-etm@openssh.com @2906
  1377. test integrity: hmac-md5-etm@openssh.com @2907
  1378. test integrity: hmac-md5-etm@openssh.com @2908
  1379. test integrity: hmac-md5-etm@openssh.com @2909
  1380. test integrity: 10 errors: mac 10 padding 0 length 0
  1381. test integrity: hmac-md5-96-etm@openssh.com @2900
  1382. test integrity: hmac-md5-96-etm@openssh.com @2901
  1383. test integrity: hmac-md5-96-etm@openssh.com @2902
  1384. test integrity: hmac-md5-96-etm@openssh.com @2903
  1385. test integrity: hmac-md5-96-etm@openssh.com @2904
  1386. test integrity: hmac-md5-96-etm@openssh.com @2905
  1387. test integrity: hmac-md5-96-etm@openssh.com @2906
  1388. test integrity: hmac-md5-96-etm@openssh.com @2907
  1389. test integrity: hmac-md5-96-etm@openssh.com @2908
  1390. test integrity: hmac-md5-96-etm@openssh.com @2909
  1391. test integrity: 10 errors: mac 10 padding 0 length 0
  1392. test integrity: hmac-ripemd160-etm@openssh.com @2900
  1393. test integrity: hmac-ripemd160-etm@openssh.com @2901
  1394. test integrity: hmac-ripemd160-etm@openssh.com @2902
  1395. test integrity: hmac-ripemd160-etm@openssh.com @2903
  1396. test integrity: hmac-ripemd160-etm@openssh.com @2904
  1397. test integrity: hmac-ripemd160-etm@openssh.com @2905
  1398. test integrity: hmac-ripemd160-etm@openssh.com @2906
  1399. test integrity: hmac-ripemd160-etm@openssh.com @2907
  1400. test integrity: hmac-ripemd160-etm@openssh.com @2908
  1401. test integrity: hmac-ripemd160-etm@openssh.com @2909
  1402. test integrity: 10 errors: mac 10 padding 0 length 0
  1403. test integrity: umac-64-etm@openssh.com @2900
  1404. test integrity: umac-64-etm@openssh.com @2901
  1405. test integrity: umac-64-etm@openssh.com @2902
  1406. test integrity: umac-64-etm@openssh.com @2903
  1407. test integrity: umac-64-etm@openssh.com @2904
  1408. test integrity: umac-64-etm@openssh.com @2905
  1409. test integrity: umac-64-etm@openssh.com @2906
  1410. test integrity: umac-64-etm@openssh.com @2907
  1411. test integrity: umac-64-etm@openssh.com @2908
  1412. test integrity: umac-64-etm@openssh.com @2909
  1413. test integrity: 10 errors: mac 10 padding 0 length 0
  1414. test integrity: umac-128-etm@openssh.com @2900
  1415. test integrity: umac-128-etm@openssh.com @2901
  1416. test integrity: umac-128-etm@openssh.com @2902
  1417. test integrity: umac-128-etm@openssh.com @2903
  1418. test integrity: umac-128-etm@openssh.com @2904
  1419. test integrity: umac-128-etm@openssh.com @2905
  1420. test integrity: umac-128-etm@openssh.com @2906
  1421. test integrity: umac-128-etm@openssh.com @2907
  1422. test integrity: umac-128-etm@openssh.com @2908
  1423. test integrity: umac-128-etm@openssh.com @2909
  1424. test integrity: 10 errors: mac 10 padding 0 length 0
  1425. test integrity: aes128-gcm@openssh.com @2900
  1426. test integrity: aes128-gcm@openssh.com @2901
  1427. test integrity: aes128-gcm@openssh.com @2902
  1428. test integrity: aes128-gcm@openssh.com @2903
  1429. test integrity: aes128-gcm@openssh.com @2904
  1430. test integrity: aes128-gcm@openssh.com @2905
  1431. test integrity: aes128-gcm@openssh.com @2906
  1432. test integrity: aes128-gcm@openssh.com @2907
  1433. test integrity: aes128-gcm@openssh.com @2908
  1434. test integrity: aes128-gcm@openssh.com @2909
  1435. test integrity: 10 errors: mac 10 padding 0 length 0
  1436. test integrity: aes256-gcm@openssh.com @2900
  1437. test integrity: aes256-gcm@openssh.com @2901
  1438. test integrity: aes256-gcm@openssh.com @2902
  1439. test integrity: aes256-gcm@openssh.com @2903
  1440. test integrity: aes256-gcm@openssh.com @2904
  1441. test integrity: aes256-gcm@openssh.com @2905
  1442. test integrity: aes256-gcm@openssh.com @2906
  1443. test integrity: aes256-gcm@openssh.com @2907
  1444. test integrity: aes256-gcm@openssh.com @2908
  1445. test integrity: aes256-gcm@openssh.com @2909
  1446. test integrity: 10 errors: mac 10 padding 0 length 0
  1447. test integrity: chacha20-poly1305@openssh.com @2900
  1448. test integrity: chacha20-poly1305@openssh.com @2901
  1449. test integrity: chacha20-poly1305@openssh.com @2902
  1450. test integrity: chacha20-poly1305@openssh.com @2903
  1451. test integrity: chacha20-poly1305@openssh.com @2904
  1452. test integrity: chacha20-poly1305@openssh.com @2905
  1453. test integrity: chacha20-poly1305@openssh.com @2906
  1454. test integrity: chacha20-poly1305@openssh.com @2907
  1455. test integrity: chacha20-poly1305@openssh.com @2908
  1456. test integrity: chacha20-poly1305@openssh.com @2909
  1457. test integrity: 10 errors: mac 10 padding 0 length 0
  1458. ok integrity
  1459. run test krl.sh ...
  1460. key revocation lists: generating test keys
  1461. key revocation lists: generating KRLs
  1462. key revocation lists: checking revocations for revoked keys
  1463. key revocation lists: checking revocations for unrevoked keys
  1464. key revocation lists: checking revocations for revoked certs
  1465. key revocation lists: checking revocations for unrevoked certs
  1466. key revocation lists: testing KRL update
  1467. key revocation lists: checking revocations for revoked keys
  1468. key revocation lists: checking revocations for unrevoked keys
  1469. key revocation lists: checking revocations for revoked certs
  1470. key revocation lists: checking revocations for unrevoked certs
  1471. ok key revocation lists
  1472. make[1]: Leaving directory `/home/ec2-user/openssh-6.6p1/regress'
  1473. all tests passed
  1474. [ec2-user@ip-172-31-40-44 openssh-6.6p1]$
Add Comment
Please, Sign In to add comment