nareshkamboju

openssh make tests results log

Nov 3rd, 2016
118
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 99.37 KB | None | 0 0
  1. root@linaro-alip:~/openssh-6.7p1# make tests
  2. [ -d `pwd`/regress ] || mkdir -p `pwd`/regress
  3. [ -d `pwd`/regress/unittests ] || mkdir -p `pwd`/regress/unittests
  4. [ -d `pwd`/regress/unittests/test_helper ] || \
  5. mkdir -p `pwd`/regress/unittests/test_helper
  6. [ -d `pwd`/regress/unittests/sshbuf ] || \
  7. mkdir -p `pwd`/regress/unittests/sshbuf
  8. [ -d `pwd`/regress/unittests/sshkey ] || \
  9. mkdir -p `pwd`/regress/unittests/sshkey
  10. [ -f `pwd`/regress/Makefile ] || \
  11. ln -s `cd . && pwd`/regress/Makefile `pwd`/regress/Makefile
  12. (cd openbsd-compat && make)
  13. make[1]: Entering directory '/root/openssh-6.7p1/openbsd-compat'
  14. make[1]: Nothing to be done for 'all'.
  15. make[1]: Leaving directory '/root/openssh-6.7p1/openbsd-compat'
  16. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -o regress/modpipe regress/modpipe.c \
  17. -L. -Lopenbsd-compat/ -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lssh -lopenbsd-compat -lcrypto -ldl -lutil -lz -lnsl -lcrypt -lresolv
  18. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -o regress/setuid-allowed regress/setuid-allowed.c \
  19. -L. -Lopenbsd-compat/ -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lssh -lopenbsd-compat -lcrypto -ldl -lutil -lz -lnsl -lcrypt -lresolv
  20. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/tests.c -o regress/unittests/sshbuf/tests.o
  21. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf.c -o regress/unittests/sshbuf/test_sshbuf.o
  22. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_getput_basic.c -o regress/unittests/sshbuf/test_sshbuf_getput_basic.o
  23. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_getput_crypto.c -o regress/unittests/sshbuf/test_sshbuf_getput_crypto.o
  24. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_misc.c -o regress/unittests/sshbuf/test_sshbuf_misc.o
  25. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_fuzz.c -o regress/unittests/sshbuf/test_sshbuf_fuzz.o
  26. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c -o regress/unittests/sshbuf/test_sshbuf_getput_fuzz.o
  27. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_fixed.c -o regress/unittests/sshbuf/test_sshbuf_fixed.o
  28. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/test_helper/test_helper.c -o regress/unittests/test_helper/test_helper.o
  29. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/test_helper/fuzz.c -o regress/unittests/test_helper/fuzz.o
  30. ^H/usr/bin/ar rv regress/unittests/test_helper/libtest_helper.a regress/unittests/test_helper/test_helper.o regress/unittests/test_helper/fuzz.o
  31. /usr/bin/ar: creating regress/unittests/test_helper/libtest_helper.a
  32. a - regress/unittests/test_helper/test_helper.o
  33. a - regress/unittests/test_helper/fuzz.o
  34. ranlib regress/unittests/test_helper/libtest_helper.a
  35. gcc -o regress/unittests/sshbuf/test_sshbuf -L. -Lopenbsd-compat/ -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie regress/unittests/sshbuf/tests.o regress/unittests/sshbuf/test_sshbuf.o regress/unittests/sshbuf/test_sshbuf_getput_basic.o regress/unittests/sshbuf/test_sshbuf_getput_crypto.o regress/unittests/sshbuf/test_sshbuf_misc.o regress/unittests/sshbuf/test_sshbuf_fuzz.o regress/unittests/sshbuf/test_sshbuf_getput_fuzz.o regress/unittests/sshbuf/test_sshbuf_fixed.o \
  36. regress/unittests/test_helper/libtest_helper.a \
  37. -lssh -lopenbsd-compat -lssh -lopenbsd-compat -lcrypto -ldl -lutil -lz -lnsl -lcrypt -lresolv
  38. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/test_fuzz.c -o regress/unittests/sshkey/test_fuzz.o
  39. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/tests.c -o regress/unittests/sshkey/tests.o
  40. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/common.c -o regress/unittests/sshkey/common.o
  41. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/test_file.c -o regress/unittests/sshkey/test_file.o
  42. gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/test_sshkey.c -o regress/unittests/sshkey/test_sshkey.o
  43. gcc -o regress/unittests/sshkey/test_sshkey -L. -Lopenbsd-compat/ -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie regress/unittests/sshkey/test_fuzz.o regress/unittests/sshkey/tests.o regress/unittests/sshkey/common.o regress/unittests/sshkey/test_file.o regress/unittests/sshkey/test_sshkey.o \
  44. regress/unittests/test_helper/libtest_helper.a \
  45. -lssh -lopenbsd-compat -lssh -lopenbsd-compat -lcrypto -ldl -lutil -lz -lnsl -lcrypt -lresolv
  46. BUILDDIR=`pwd`; \
  47. TEST_SSH_SCP="${BUILDDIR}/scp"; \
  48. TEST_SSH_SSH="${BUILDDIR}/ssh"; \
  49. TEST_SSH_SSHD="${BUILDDIR}/sshd"; \
  50. TEST_SSH_SSHAGENT="${BUILDDIR}/ssh-agent"; \
  51. TEST_SSH_SSHADD="${BUILDDIR}/ssh-add"; \
  52. TEST_SSH_SSHKEYGEN="${BUILDDIR}/ssh-keygen"; \
  53. TEST_SSH_SSHPKCS11HELPER="${BUILDDIR}/ssh-pkcs11-helper"; \
  54. TEST_SSH_SSHKEYSCAN="${BUILDDIR}/ssh-keyscan"; \
  55. TEST_SSH_SFTP="${BUILDDIR}/sftp"; \
  56. TEST_SSH_SFTPSERVER="${BUILDDIR}/sftp-server"; \
  57. TEST_SSH_PLINK="plink"; \
  58. TEST_SSH_PUTTYGEN="puttygen"; \
  59. TEST_SSH_CONCH="conch"; \
  60. TEST_SSH_IPV6="yes" ; \
  61. TEST_SSH_ECC="yes" ; \
  62. cd ./regress || exit $?; \
  63. make \
  64. .OBJDIR="${BUILDDIR}/regress" \
  65. .CURDIR="`pwd`" \
  66. BUILDDIR="${BUILDDIR}" \
  67. OBJ="${BUILDDIR}/regress/" \
  68. PATH="${BUILDDIR}:${PATH}" \
  69. TEST_ENV=MALLOC_OPTIONS="" \
  70. TEST_SSH_SCP="${TEST_SSH_SCP}" \
  71. TEST_SSH_SSH="${TEST_SSH_SSH}" \
  72. TEST_SSH_SSHD="${TEST_SSH_SSHD}" \
  73. TEST_SSH_SSHAGENT="${TEST_SSH_SSHAGENT}" \
  74. TEST_SSH_SSHADD="${TEST_SSH_SSHADD}" \
  75. TEST_SSH_SSHKEYGEN="${TEST_SSH_SSHKEYGEN}" \
  76. TEST_SSH_SSHPKCS11HELPER="${TEST_SSH_SSHPKCS11HELPER}" \
  77. TEST_SSH_SSHKEYSCAN="${TEST_SSH_SSHKEYSCAN}" \
  78. TEST_SSH_SFTP="${TEST_SSH_SFTP}" \
  79. TEST_SSH_SFTPSERVER="${TEST_SSH_SFTPSERVER}" \
  80. TEST_SSH_PLINK="${TEST_SSH_PLINK}" \
  81. TEST_SSH_PUTTYGEN="${TEST_SSH_PUTTYGEN}" \
  82. TEST_SSH_CONCH="${TEST_SSH_CONCH}" \
  83. TEST_SSH_IPV6="${TEST_SSH_IPV6}" \
  84. TEST_SSH_ECC="${TEST_SSH_ECC}" \
  85. TEST_SHELL="sh" \
  86. EXEEXT="" \
  87. tests && echo all tests passed
  88. make[1]: Entering directory '/root/openssh-6.7p1/regress'
  89. set -e ; if test -z "" ; then \
  90. /root/openssh-6.7p1/regress/unittests/sshbuf/test_sshbuf ; \
  91. /root/openssh-6.7p1/regress/unittests/sshkey/test_sshkey \
  92. -d /root/openssh-6.7p1/regress//unittests/sshkey/testdata ; \
  93. fi
  94. test_sshbuf: ............................................................................................... .... 100 tests ok
  95. test_sshkey: ......................................................................................... 89 tests ok
  96. /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/rsa_ssh2.prv | diff - /root/openssh-6.7p1/regress/rsa_openssh.prv
  97. tr '\n' '\r' </root/openssh-6.7p1/regress/rsa_ssh2.prv > /root/openssh-6.7p1/regress/rsa_ssh2_cr.prv
  98. /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/rsa_ssh2_cr.prv | diff - /root/openssh-6.7p1/regress/rsa_openssh.prv
  99. awk '{print $0 "\r"}' /root/openssh-6.7p1/regress/rsa_ssh2.prv > /root/openssh-6.7p1/regress/rsa_ssh2_crnl.prv
  100. /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/rsa_ssh2_crnl.prv | diff - /root/openssh-6.7p1/regress/rsa_openssh.prv
  101. cat /root/openssh-6.7p1/regress/rsa_openssh.prv > /root/openssh-6.7p1/regress//t2.out
  102. chmod 600 /root/openssh-6.7p1/regress//t2.out
  103. /root/openssh-6.7p1/ssh-keygen -yf /root/openssh-6.7p1/regress//t2.out | diff - /root/openssh-6.7p1/regress/rsa_openssh.pub
  104. /root/openssh-6.7p1/ssh-keygen -ef /root/openssh-6.7p1/regress/rsa_openssh.pub >/root/openssh-6.7p1/regress//t3.out
  105. /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress//t3.out | diff - /root/openssh-6.7p1/regress/rsa_openssh.pub
  106. /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress/rsa_openssh.pub |\
  107. awk '{print $2}' | diff - /root/openssh-6.7p1/regress/t4.ok
  108. /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress/rsa_openssh.pub |\
  109. awk '{print $2}' | diff - /root/openssh-6.7p1/regress/t5.ok
  110. /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/dsa_ssh2.prv > /root/openssh-6.7p1/regress//t6.out1
  111. /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/dsa_ssh2.pub > /root/openssh-6.7p1/regress//t6.out2
  112. chmod 600 /root/openssh-6.7p1/regress//t6.out1
  113. /root/openssh-6.7p1/ssh-keygen -yf /root/openssh-6.7p1/regress//t6.out1 | diff - /root/openssh-6.7p1/regress//t6.out2
  114. /root/openssh-6.7p1/ssh-keygen -q -t rsa -N '' -f /root/openssh-6.7p1/regress//t7.out
  115. /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress//t7.out > /dev/null
  116. /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress//t7.out > /dev/null
  117. /root/openssh-6.7p1/ssh-keygen -q -t dsa -N '' -f /root/openssh-6.7p1/regress//t8.out
  118. /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress//t8.out > /dev/null
  119. /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress//t8.out > /dev/null
  120. test "yes" != yes || \
  121. /root/openssh-6.7p1/ssh-keygen -q -t ecdsa -N '' -f /root/openssh-6.7p1/regress//t9.out
  122. test "yes" != yes || \
  123. /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress//t9.out > /dev/null
  124. test "yes" != yes || \
  125. /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress//t9.out > /dev/null
  126. /root/openssh-6.7p1/ssh-keygen -q -t ed25519 -N '' -f /root/openssh-6.7p1/regress//t10.out
  127. /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress//t10.out > /dev/null
  128. /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress//t10.out > /dev/null
  129. run test connect.sh ...
  130. ok simple connect
  131. run test proxy-connect.sh ...
  132. plain username protocol 1 privsep=no comp=no
  133. plain username protocol 1 privsep=no comp=yes
  134. plain username protocol 2 privsep=no comp=no
  135. plain username protocol 2 privsep=no comp=yes
  136. plain username protocol 1 privsep=yes comp=no
  137. plain username protocol 1 privsep=yes comp=yes
  138. plain username protocol 2 privsep=yes comp=no
  139. plain username protocol 2 privsep=yes comp=yes
  140. username with style protocol 1
  141. username with style protocol 2
  142. ok proxy connect
  143. run test connect-privsep.sh ...
  144. ok proxy connect with privsep
  145. run test proto-version.sh ...
  146. ok sshd version with different protocol combinations
  147. run test proto-mismatch.sh ...
  148. ok protocol version mismatch
  149. run test exit-status.sh ...
  150. test remote exit status: proto 1 status 0
  151. test remote exit status: proto 1 status 1
  152. test remote exit status: proto 1 status 4
  153. test remote exit status: proto 1 status 5
  154. test remote exit status: proto 1 status 44
  155. test remote exit status: proto 2 status 0
  156. test remote exit status: proto 2 status 1
  157. test remote exit status: proto 2 status 4
  158. test remote exit status: proto 2 status 5
  159. test remote exit status: proto 2 status 44
  160. ok remote exit status
  161. run test envpass.sh ...
  162. test environment passing: pass env, don't accept
  163. test environment passing: don't pass env, accept
  164. test environment passing: pass single env, accept single env
  165. test environment passing: pass multiple env, accept multiple env
  166. ok environment passing
  167. run test transfer.sh ...
  168. transfer data: proto 1
  169. transfer data: proto 2
  170. ok transfer data
  171. run test banner.sh ...
  172. test banner: missing banner file
  173. test banner: size 0
  174. test banner: size 10
  175. test banner: size 100
  176. test banner: size 1000
  177. test banner: size 10000
  178. test banner: size 100000
  179. test banner: suppress banner (-q)
  180. ok banner
  181. run test rekey.sh ...
  182. client rekey KexAlgorithms=diffie-hellman-group1-sha1
  183. client rekey KexAlgorithms=diffie-hellman-group14-sha1
  184. client rekey KexAlgorithms=diffie-hellman-group-exchange-sha1
  185. client rekey KexAlgorithms=diffie-hellman-group-exchange-sha256
  186. client rekey KexAlgorithms=ecdh-sha2-nistp256
  187. client rekey KexAlgorithms=ecdh-sha2-nistp384
  188. client rekey KexAlgorithms=ecdh-sha2-nistp521
  189. client rekey KexAlgorithms=diffie-hellman-group1-sha1
  190. client rekey KexAlgorithms=curve25519-sha256@libssh.org
  191. client rekey Ciphers=3des-cbc
  192. client rekey Ciphers=blowfish-cbc
  193. client rekey Ciphers=cast128-cbc
  194. client rekey Ciphers=arcfour
  195. client rekey Ciphers=arcfour128
  196. client rekey Ciphers=arcfour256
  197. client rekey Ciphers=aes128-cbc
  198. client rekey Ciphers=aes192-cbc
  199. client rekey Ciphers=aes256-cbc
  200. client rekey Ciphers=rijndael-cbc@lysator.liu.se
  201. client rekey Ciphers=aes128-ctr
  202. client rekey Ciphers=aes192-ctr
  203. client rekey Ciphers=aes256-ctr
  204. client rekey Ciphers=aes128-gcm@openssh.com
  205. client rekey Ciphers=aes256-gcm@openssh.com
  206. client rekey Ciphers=chacha20-poly1305@openssh.com
  207. client rekey MACs=hmac-sha1
  208. client rekey MACs=hmac-sha1-96
  209. client rekey MACs=hmac-sha2-256
  210. client rekey MACs=hmac-sha2-512
  211. client rekey MACs=hmac-md5
  212. client rekey MACs=hmac-md5-96
  213. client rekey MACs=hmac-ripemd160
  214. client rekey MACs=hmac-ripemd160@openssh.com
  215. client rekey MACs=umac-64@openssh.com
  216. client rekey MACs=umac-128@openssh.com
  217. client rekey MACs=hmac-sha1-etm@openssh.com
  218. client rekey MACs=hmac-sha1-96-etm@openssh.com
  219. client rekey MACs=hmac-sha2-256-etm@openssh.com
  220. client rekey MACs=hmac-sha2-512-etm@openssh.com
  221. client rekey MACs=hmac-md5-etm@openssh.com
  222. client rekey MACs=hmac-md5-96-etm@openssh.com
  223. client rekey MACs=hmac-ripemd160-etm@openssh.com
  224. client rekey MACs=umac-64-etm@openssh.com
  225. client rekey MACs=umac-128-etm@openssh.com
  226. client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1
  227. client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha1
  228. client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha1
  229. client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha256
  230. client rekey aes128-gcm@openssh.com ecdh-sha2-nistp256
  231. client rekey aes128-gcm@openssh.com ecdh-sha2-nistp384
  232. client rekey aes128-gcm@openssh.com ecdh-sha2-nistp521
  233. client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1
  234. client rekey aes128-gcm@openssh.com curve25519-sha256@libssh.org
  235. client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1
  236. client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha1
  237. client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha1
  238. client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha256
  239. client rekey aes256-gcm@openssh.com ecdh-sha2-nistp256
  240. client rekey aes256-gcm@openssh.com ecdh-sha2-nistp384
  241. client rekey aes256-gcm@openssh.com ecdh-sha2-nistp521
  242. client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1
  243. client rekey aes256-gcm@openssh.com curve25519-sha256@libssh.org
  244. client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1
  245. client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha1
  246. client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha1
  247. client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha256
  248. client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp256
  249. client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp384
  250. client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp521
  251. client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1
  252. client rekey chacha20-poly1305@openssh.com curve25519-sha256@libssh.org
  253. client rekeylimit 16
  254. client rekeylimit 1k
  255. client rekeylimit 128k
  256. client rekeylimit 256k
  257. client rekeylimit default 5
  258. client rekeylimit default 10
  259. client rekeylimit default 5 no data
  260. client rekeylimit default 10 no data
  261. server rekeylimit default 5 no data
  262. server rekeylimit default 10 no data
  263. rekeylimit parsing
  264. ok rekey
  265. run test stderr-data.sh ...
  266. test stderr data transfer: proto 1 ()
  267. test stderr data transfer: proto 2 ()
  268. test stderr data transfer: proto 1 (-n)
  269. test stderr data transfer: proto 2 (-n)
  270. ok stderr data transfer
  271. run test stderr-after-eof.sh ...
  272. ok stderr data after eof
  273. run test broken-pipe.sh ...
  274. ok broken pipe test
  275. run test try-ciphers.sh ...
  276. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1
  277. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-96
  278. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-256
  279. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-512
  280. test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5
  281. test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-96
  282. test try ciphers: proto 2 cipher 3des-cbc mac hmac-ripemd160
  283. test try ciphers: proto 2 cipher 3des-cbc mac hmac-ripemd160@openssh.com
  284. test try ciphers: proto 2 cipher 3des-cbc mac umac-64@openssh.com
  285. test try ciphers: proto 2 cipher 3des-cbc mac umac-128@openssh.com
  286. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-etm@openssh.com
  287. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-96-etm@openssh.com
  288. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-256-etm@openssh.com
  289. test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-512-etm@openssh.com
  290. test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-etm@openssh.com
  291. test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-96-etm@openssh.com
  292. test try ciphers: proto 2 cipher 3des-cbc mac hmac-ripemd160-etm@openssh.com
  293. test try ciphers: proto 2 cipher 3des-cbc mac umac-64-etm@openssh.com
  294. test try ciphers: proto 2 cipher 3des-cbc mac umac-128-etm@openssh.com
  295. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1
  296. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-96
  297. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-256
  298. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-512
  299. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5
  300. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-96
  301. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-ripemd160
  302. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-ripemd160@openssh.com
  303. test try ciphers: proto 2 cipher blowfish-cbc mac umac-64@openssh.com
  304. test try ciphers: proto 2 cipher blowfish-cbc mac umac-128@openssh.com
  305. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-etm@openssh.com
  306. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-96-etm@openssh.com
  307. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-256-etm@openssh.com
  308. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-512-etm@openssh.com
  309. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-etm@openssh.com
  310. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-96-etm@openssh.com
  311. test try ciphers: proto 2 cipher blowfish-cbc mac hmac-ripemd160-etm@openssh.com
  312. test try ciphers: proto 2 cipher blowfish-cbc mac umac-64-etm@openssh.com
  313. test try ciphers: proto 2 cipher blowfish-cbc mac umac-128-etm@openssh.com
  314. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1
  315. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-96
  316. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-256
  317. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-512
  318. test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5
  319. test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-96
  320. test try ciphers: proto 2 cipher cast128-cbc mac hmac-ripemd160
  321. test try ciphers: proto 2 cipher cast128-cbc mac hmac-ripemd160@openssh.com
  322. test try ciphers: proto 2 cipher cast128-cbc mac umac-64@openssh.com
  323. test try ciphers: proto 2 cipher cast128-cbc mac umac-128@openssh.com
  324. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-etm@openssh.com
  325. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-96-etm@openssh.com
  326. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-256-etm@openssh.com
  327. test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-512-etm@openssh.com
  328. test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-etm@openssh.com
  329. test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-96-etm@openssh.com
  330. test try ciphers: proto 2 cipher cast128-cbc mac hmac-ripemd160-etm@openssh.com
  331. test try ciphers: proto 2 cipher cast128-cbc mac umac-64-etm@openssh.com
  332. test try ciphers: proto 2 cipher cast128-cbc mac umac-128-etm@openssh.com
  333. test try ciphers: proto 2 cipher arcfour mac hmac-sha1
  334. test try ciphers: proto 2 cipher arcfour mac hmac-sha1-96
  335. test try ciphers: proto 2 cipher arcfour mac hmac-sha2-256
  336. test try ciphers: proto 2 cipher arcfour mac hmac-sha2-512
  337. test try ciphers: proto 2 cipher arcfour mac hmac-md5
  338. test try ciphers: proto 2 cipher arcfour mac hmac-md5-96
  339. test try ciphers: proto 2 cipher arcfour mac hmac-ripemd160
  340. test try ciphers: proto 2 cipher arcfour mac hmac-ripemd160@openssh.com
  341. test try ciphers: proto 2 cipher arcfour mac umac-64@openssh.com
  342. test try ciphers: proto 2 cipher arcfour mac umac-128@openssh.com
  343. test try ciphers: proto 2 cipher arcfour mac hmac-sha1-etm@openssh.com
  344. test try ciphers: proto 2 cipher arcfour mac hmac-sha1-96-etm@openssh.com
  345. test try ciphers: proto 2 cipher arcfour mac hmac-sha2-256-etm@openssh.com
  346. test try ciphers: proto 2 cipher arcfour mac hmac-sha2-512-etm@openssh.com
  347. test try ciphers: proto 2 cipher arcfour mac hmac-md5-etm@openssh.com
  348. test try ciphers: proto 2 cipher arcfour mac hmac-md5-96-etm@openssh.com
  349. test try ciphers: proto 2 cipher arcfour mac hmac-ripemd160-etm@openssh.com
  350. test try ciphers: proto 2 cipher arcfour mac umac-64-etm@openssh.com
  351. test try ciphers: proto 2 cipher arcfour mac umac-128-etm@openssh.com
  352. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1
  353. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-96
  354. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-256
  355. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-512
  356. test try ciphers: proto 2 cipher arcfour128 mac hmac-md5
  357. test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-96
  358. test try ciphers: proto 2 cipher arcfour128 mac hmac-ripemd160
  359. test try ciphers: proto 2 cipher arcfour128 mac hmac-ripemd160@openssh.com
  360. test try ciphers: proto 2 cipher arcfour128 mac umac-64@openssh.com
  361. test try ciphers: proto 2 cipher arcfour128 mac umac-128@openssh.com
  362. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-etm@openssh.com
  363. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-96-etm@openssh.com
  364. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-256-etm@openssh.com
  365. test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-512-etm@openssh.com
  366. test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-etm@openssh.com
  367. test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-96-etm@openssh.com
  368. test try ciphers: proto 2 cipher arcfour128 mac hmac-ripemd160-etm@openssh.com
  369. test try ciphers: proto 2 cipher arcfour128 mac umac-64-etm@openssh.com
  370. test try ciphers: proto 2 cipher arcfour128 mac umac-128-etm@openssh.com
  371. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1
  372. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-96
  373. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-256
  374. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-512
  375. test try ciphers: proto 2 cipher arcfour256 mac hmac-md5
  376. test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-96
  377. test try ciphers: proto 2 cipher arcfour256 mac hmac-ripemd160
  378. test try ciphers: proto 2 cipher arcfour256 mac hmac-ripemd160@openssh.com
  379. test try ciphers: proto 2 cipher arcfour256 mac umac-64@openssh.com
  380. test try ciphers: proto 2 cipher arcfour256 mac umac-128@openssh.com
  381. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-etm@openssh.com
  382. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-96-etm@openssh.com
  383. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-256-etm@openssh.com
  384. test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-512-etm@openssh.com
  385. test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-etm@openssh.com
  386. test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-96-etm@openssh.com
  387. test try ciphers: proto 2 cipher arcfour256 mac hmac-ripemd160-etm@openssh.com
  388. test try ciphers: proto 2 cipher arcfour256 mac umac-64-etm@openssh.com
  389. test try ciphers: proto 2 cipher arcfour256 mac umac-128-etm@openssh.com
  390. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1
  391. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-96
  392. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-256
  393. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-512
  394. test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5
  395. test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-96
  396. test try ciphers: proto 2 cipher aes128-cbc mac hmac-ripemd160
  397. test try ciphers: proto 2 cipher aes128-cbc mac hmac-ripemd160@openssh.com
  398. test try ciphers: proto 2 cipher aes128-cbc mac umac-64@openssh.com
  399. test try ciphers: proto 2 cipher aes128-cbc mac umac-128@openssh.com
  400. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-etm@openssh.com
  401. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-96-etm@openssh.com
  402. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-256-etm@openssh.com
  403. test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-512-etm@openssh.com
  404. test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-etm@openssh.com
  405. test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-96-etm@openssh.com
  406. test try ciphers: proto 2 cipher aes128-cbc mac hmac-ripemd160-etm@openssh.com
  407. test try ciphers: proto 2 cipher aes128-cbc mac umac-64-etm@openssh.com
  408. test try ciphers: proto 2 cipher aes128-cbc mac umac-128-etm@openssh.com
  409. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1
  410. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-96
  411. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-256
  412. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-512
  413. test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5
  414. test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-96
  415. test try ciphers: proto 2 cipher aes192-cbc mac hmac-ripemd160
  416. test try ciphers: proto 2 cipher aes192-cbc mac hmac-ripemd160@openssh.com
  417. test try ciphers: proto 2 cipher aes192-cbc mac umac-64@openssh.com
  418. test try ciphers: proto 2 cipher aes192-cbc mac umac-128@openssh.com
  419. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-etm@openssh.com
  420. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-96-etm@openssh.com
  421. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-256-etm@openssh.com
  422. test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-512-etm@openssh.com
  423. test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-etm@openssh.com
  424. test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-96-etm@openssh.com
  425. test try ciphers: proto 2 cipher aes192-cbc mac hmac-ripemd160-etm@openssh.com
  426. test try ciphers: proto 2 cipher aes192-cbc mac umac-64-etm@openssh.com
  427. test try ciphers: proto 2 cipher aes192-cbc mac umac-128-etm@openssh.com
  428. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1
  429. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-96
  430. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-256
  431. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-512
  432. test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5
  433. test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-96
  434. test try ciphers: proto 2 cipher aes256-cbc mac hmac-ripemd160
  435. test try ciphers: proto 2 cipher aes256-cbc mac hmac-ripemd160@openssh.com
  436. test try ciphers: proto 2 cipher aes256-cbc mac umac-64@openssh.com
  437. test try ciphers: proto 2 cipher aes256-cbc mac umac-128@openssh.com
  438. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-etm@openssh.com
  439. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-96-etm@openssh.com
  440. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-256-etm@openssh.com
  441. test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-512-etm@openssh.com
  442. test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-etm@openssh.com
  443. test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-96-etm@openssh.com
  444. test try ciphers: proto 2 cipher aes256-cbc mac hmac-ripemd160-etm@openssh.com
  445. test try ciphers: proto 2 cipher aes256-cbc mac umac-64-etm@openssh.com
  446. test try ciphers: proto 2 cipher aes256-cbc mac umac-128-etm@openssh.com
  447. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1
  448. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96
  449. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256
  450. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512
  451. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5
  452. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96
  453. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-ripemd160
  454. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-ripemd160@openssh.com
  455. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-64@openssh.com
  456. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-128@openssh.com
  457. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-etm@openssh.com
  458. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96-etm@openssh.com
  459. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256-etm@openssh.com
  460. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512-etm@openssh.com
  461. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5-etm@openssh.com
  462. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96-etm@openssh.com
  463. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-ripemd160-etm@openssh.com
  464. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-64-etm@openssh.com
  465. test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-128-etm@openssh.com
  466. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1
  467. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-96
  468. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-256
  469. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-512
  470. test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5
  471. test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-96
  472. test try ciphers: proto 2 cipher aes128-ctr mac hmac-ripemd160
  473. test try ciphers: proto 2 cipher aes128-ctr mac hmac-ripemd160@openssh.com
  474. test try ciphers: proto 2 cipher aes128-ctr mac umac-64@openssh.com
  475. test try ciphers: proto 2 cipher aes128-ctr mac umac-128@openssh.com
  476. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-etm@openssh.com
  477. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-96-etm@openssh.com
  478. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-256-etm@openssh.com
  479. test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-512-etm@openssh.com
  480. test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-etm@openssh.com
  481. test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-96-etm@openssh.com
  482. test try ciphers: proto 2 cipher aes128-ctr mac hmac-ripemd160-etm@openssh.com
  483. test try ciphers: proto 2 cipher aes128-ctr mac umac-64-etm@openssh.com
  484. test try ciphers: proto 2 cipher aes128-ctr mac umac-128-etm@openssh.com
  485. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1
  486. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-96
  487. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-256
  488. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-512
  489. test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5
  490. test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-96
  491. test try ciphers: proto 2 cipher aes192-ctr mac hmac-ripemd160
  492. test try ciphers: proto 2 cipher aes192-ctr mac hmac-ripemd160@openssh.com
  493. test try ciphers: proto 2 cipher aes192-ctr mac umac-64@openssh.com
  494. test try ciphers: proto 2 cipher aes192-ctr mac umac-128@openssh.com
  495. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-etm@openssh.com
  496. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-96-etm@openssh.com
  497. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-256-etm@openssh.com
  498. test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-512-etm@openssh.com
  499. test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-etm@openssh.com
  500. test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-96-etm@openssh.com
  501. test try ciphers: proto 2 cipher aes192-ctr mac hmac-ripemd160-etm@openssh.com
  502. test try ciphers: proto 2 cipher aes192-ctr mac umac-64-etm@openssh.com
  503. test try ciphers: proto 2 cipher aes192-ctr mac umac-128-etm@openssh.com
  504. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1
  505. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-96
  506. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-256
  507. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-512
  508. test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5
  509. test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-96
  510. test try ciphers: proto 2 cipher aes256-ctr mac hmac-ripemd160
  511. test try ciphers: proto 2 cipher aes256-ctr mac hmac-ripemd160@openssh.com
  512. test try ciphers: proto 2 cipher aes256-ctr mac umac-64@openssh.com
  513. test try ciphers: proto 2 cipher aes256-ctr mac umac-128@openssh.com
  514. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-etm@openssh.com
  515. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-96-etm@openssh.com
  516. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-256-etm@openssh.com
  517. test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-512-etm@openssh.com
  518. test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-etm@openssh.com
  519. test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-96-etm@openssh.com
  520. test try ciphers: proto 2 cipher aes256-ctr mac hmac-ripemd160-etm@openssh.com
  521. test try ciphers: proto 2 cipher aes256-ctr mac umac-64-etm@openssh.com
  522. test try ciphers: proto 2 cipher aes256-ctr mac umac-128-etm@openssh.com
  523. test try ciphers: proto 2 cipher aes128-gcm@openssh.com mac hmac-sha1
  524. test try ciphers: proto 2 cipher aes256-gcm@openssh.com mac hmac-sha1
  525. test try ciphers: proto 2 cipher chacha20-poly1305@openssh.com mac hmac-sha1
  526. test try ciphers: proto 1 cipher 3des
  527. test try ciphers: proto 1 cipher blowfish
  528. ok try ciphers
  529. run test yes-head.sh ...
  530. ok yes pipe head
  531. run test login-timeout.sh ...
  532. ok connect after login grace timeout
  533. run test agent.sh ...
  534. ok simple agent test
  535. run test agent-getpeereid.sh ...
  536. skipped: need SUDO to switch to uid nobody
  537. run test agent-timeout.sh ...
  538. ok agent timeout test
  539. run test agent-ptrace.sh ...
  540. skipped (SUDO not set)
  541. run test keyscan.sh ...
  542. ok keyscan
  543. run test keygen-change.sh ...
  544. ok change passphrase for key
  545. run test keygen-convert.sh ...
  546. ok convert keys
  547. run test key-options.sh ...
  548. key option proto 1 command="echo bar"
  549. key option proto 1 no-pty,command="echo bar"
  550. key option proto 2 command="echo bar"
  551. key option proto 2 no-pty,command="echo bar"
  552. key option proto 1 no-pty
  553. key option proto 2 no-pty
  554. key option proto 1 environment
  555. key option proto 2 environment
  556. key option proto 1 from="127.0.0.1"
  557. key option proto 1 from="127.0.0.0/8"
  558. key option proto 2 from="127.0.0.1"
  559. key option proto 2 from="127.0.0.0/8"
  560. ok key options
  561. run test scp.sh ...
  562. scp: simple copy local file to local file
  563. scp: simple copy local file to remote file
  564. scp: simple copy remote file to local file
  565. scp: simple copy local file to remote dir
  566. scp: simple copy local file to local dir
  567. scp: simple copy remote file to local dir
  568. scp: recursive local dir to remote dir
  569. scp: recursive local dir to local dir
  570. scp: recursive remote dir to local dir
  571. scp: shell metacharacters
  572. scp: disallow bad server #0
  573. scp: disallow bad server #1
  574. scp: disallow bad server #2
  575. scp: disallow bad server #3
  576. scp: disallow bad server #4
  577. scp: detect non-directory target
  578. /root/openssh-6.7p1/regress/copy2: Not a directory
  579. ok scp
  580. run test sftp.sh ...
  581. test basic sftp put/get: buffer_size 5 num_requests 1
  582. test basic sftp put/get: buffer_size 5 num_requests 2
  583. test basic sftp put/get: buffer_size 5 num_requests 10
  584. test basic sftp put/get: buffer_size 1000 num_requests 1
  585. test basic sftp put/get: buffer_size 1000 num_requests 2
  586. test basic sftp put/get: buffer_size 1000 num_requests 10
  587. test basic sftp put/get: buffer_size 32000 num_requests 1
  588. test basic sftp put/get: buffer_size 32000 num_requests 2
  589. test basic sftp put/get: buffer_size 32000 num_requests 10
  590. test basic sftp put/get: buffer_size 64000 num_requests 1
  591. test basic sftp put/get: buffer_size 64000 num_requests 2
  592. test basic sftp put/get: buffer_size 64000 num_requests 10
  593. ok basic sftp put/get
  594. run test sftp-chroot.sh ...
  595. skipped: need SUDO to create file in /var/run, test won't work without
  596. run test sftp-cmds.sh ...
  597. sftp commands: lls
  598. sftp commands: lls w/path
  599. sftp commands: ls
  600. sftp commands: shell
  601. sftp commands: pwd
  602. sftp commands: lpwd
  603. sftp commands: quit
  604. sftp commands: help
  605. sftp commands: get
  606. sftp commands: get quoted
  607. sftp commands: get filename with quotes
  608. sftp commands: get filename with spaces
  609. sftp commands: get filename with glob metacharacters
  610. sftp commands: get to directory
  611. sftp commands: glob get to directory
  612. sftp commands: get to local dir
  613. sftp commands: glob get to local dir
  614. sftp commands: put
  615. sftp commands: put filename with quotes
  616. sftp commands: put filename with spaces
  617. sftp commands: put to directory
  618. sftp commands: glob put to directory
  619. sftp commands: put to local dir
  620. sftp commands: glob put to local dir
  621. sftp commands: rename
  622. sftp commands: rename directory
  623. sftp commands: ln
  624. sftp commands: ln -s
  625. sftp commands: mkdir
  626. sftp commands: chdir
  627. sftp commands: rmdir
  628. sftp commands: lmkdir
  629. sftp commands: lchdir
  630. ok sftp commands
  631. run test sftp-badcmds.sh ...
  632. sftp invalid commands: get nonexistent
  633. sftp invalid commands: glob get to nonexistent directory
  634. sftp invalid commands: put nonexistent
  635. sftp invalid commands: glob put to nonexistent directory
  636. sftp invalid commands: rename nonexistent
  637. sftp invalid commands: rename target exists (directory)
  638. sftp invalid commands: glob put files to local file
  639. ok sftp invalid commands
  640. run test sftp-batch.sh ...
  641. sftp batchfile: good commands
  642. sftp batchfile: bad commands
  643. sftp batchfile: comments and blanks
  644. sftp batchfile: junk command
  645. ok sftp batchfile
  646. run test sftp-glob.sh ...
  647. sftp glob: file glob
  648. sftp glob: dir glob
  649. sftp glob: quoted glob
  650. sftp glob: escaped glob
  651. sftp glob: escaped quote
  652. sftp glob: quoted quote
  653. sftp glob: single-quoted quote
  654. sftp glob: escaped space
  655. sftp glob: quoted space
  656. sftp glob: escaped slash
  657. sftp glob: quoted slash
  658. sftp glob: escaped slash at EOL
  659. sftp glob: quoted slash at EOL
  660. sftp glob: escaped slash+quote
  661. sftp glob: quoted slash+quote
  662. ok sftp glob
  663. run test sftp-perm.sh ...
  664. sftp permissions: read-only upload
  665. sftp permissions: read-only setstat
  666. sftp permissions: read-only rm
  667. sftp permissions: read-only mkdir
  668. sftp permissions: read-only rmdir
  669. sftp permissions: read-only posix-rename
  670. sftp permissions: read-only oldrename
  671. sftp permissions: read-only symlink
  672. sftp permissions: read-only hardlink
  673. sftp permissions: explicit open
  674. sftp permissions: explicit read
  675. sftp permissions: explicit write
  676. sftp permissions: explicit lstat
  677. sftp permissions: explicit opendir
  678. sftp permissions: explicit readdir
  679. sftp permissions: explicit setstat
  680. sftp permissions: explicit remove
  681. sftp permissions: explicit mkdir
  682. sftp permissions: explicit rmdir
  683. sftp permissions: explicit posix-rename
  684. sftp permissions: explicit rename
  685. sftp permissions: explicit symlink
  686. sftp permissions: explicit hardlink
  687. sftp permissions: explicit statvfs
  688. ok sftp permissions
  689. run test reconfigure.sh ...
  690. ok simple connect after reconfigure
  691. run test dynamic-forward.sh ...
  692. ok dynamic forwarding
  693. run test forwarding.sh ...
  694. ok local and remote forwarding
  695. run test multiplex.sh ...
  696. test connection multiplexing: envpass
  697. test connection multiplexing: transfer
  698. test connection multiplexing: forward
  699. test connection multiplexing: status 0
  700. test connection multiplexing: status 1
  701. test connection multiplexing: status 4
  702. test connection multiplexing: status 5
  703. test connection multiplexing: status 44
  704. test connection multiplexing: cmd check
  705. test connection multiplexing: cmd forward local (TCP)
  706. test connection multiplexing: cmd forward remote (TCP)
  707. test connection multiplexing: cmd forward local (UNIX)
  708. test connection multiplexing: cmd forward remote (UNIX)
  709. test connection multiplexing: cmd exit
  710. test connection multiplexing: cmd stop
  711. ok connection multiplexing
  712. run test reexec.sh ...
  713. test config passing
  714. reexec tests: proto 1
  715. reexec tests: proto 2
  716. test reexec fallback
  717. reexec tests: proto 1
  718. reexec tests: proto 2
  719. test reexec fallback without privsep
  720. reexec tests: proto 1
  721. reexec tests: proto 2
  722. ok reexec tests
  723. run test brokenkeys.sh ...
  724. ok broken keys
  725. run test cfgmatch.sh ...
  726. ok sshd_config match
  727. run test addrmatch.sh ...
  728. test first entry for user 192.168.0.1 somehost
  729. test negative match for user 192.168.30.1 somehost
  730. test no match for user 19.0.0.1 somehost
  731. test list middle for user 10.255.255.254 somehost
  732. test faked IP in hostname for user 192.168.30.1 192.168.0.1
  733. test bare IP4 address for user 1.1.1.1 somehost.example.com
  734. test localaddress for user 19.0.0.1 somehost
  735. test localport for user 19.0.0.1 somehost
  736. test bare IP6 address for user ::1 somehost.example.com
  737. test deny IPv6 for user ::2 somehost.exaple.com
  738. test IP6 negated for user ::3 somehost
  739. test IP6 no match for user ::4 somehost
  740. test IP6 network for user 2000::1 somehost
  741. test IP6 network for user 2001::1 somehost
  742. test IP6 localaddress for user ::5 somehost
  743. test IP6 localport for user ::5 somehost
  744. ok address match
  745. run test localcommand.sh ...
  746. test localcommand: proto 1 localcommand
  747. test localcommand: proto 2 localcommand
  748. ok localcommand
  749. run test forcecommand.sh ...
  750. ok forced command
  751. run test portnum.sh ...
  752. port number parsing: invalid port 0
  753. port number parsing: invalid port 65536
  754. port number parsing: invalid port 131073
  755. port number parsing: invalid port 2000blah
  756. port number parsing: invalid port blah2000
  757. port number parsing: valid port 1
  758. port number parsing: valid port 22
  759. port number parsing: valid port 2222
  760. port number parsing: valid port 22222
  761. port number parsing: valid port 65535
  762. ok port number parsing
  763. run test keytype.sh ...
  764. keygen dsa, 1024 bits: keygen rsa, 2048 bits: keygen rsa, 3072 bits: keygen ed25519, 512 bits: keygen ecdsa, 256 bits: keygen ecdsa, 384 bits: keygen ecdsa, 521 bits: userkey dsa-1024, hostkey dsa-1024: userkey dsa-1024, hostkey dsa-1024: userkey dsa-1024, hostkey dsa-1024: userkey rsa-2048, hostkey rsa-2048: userkey rsa-2048, hostkey rsa-2048: userkey rsa-2048, hostkey rsa-2048: userkey rsa-3072, hostkey rsa-3072: userkey rsa-3072, hostkey rsa-3072: userkey rsa-3072, hostkey rsa-3072: userkey ed25519-512, hostkey ed25519-512: userkey ed25519-512, hostkey ed25519-512: userkey ed25519-512, hostkey ed25519-512: userkey ecdsa-256, hostkey ecdsa-256: userkey ecdsa-256, hostkey ecdsa-256: userkey ecdsa-256, hostkey ecdsa-256: userkey ecdsa-384, hostkey ecdsa-384: userkey ecdsa-384, hostkey ecdsa-384: userkey ecdsa-384, hostkey ecdsa-384: userkey ecdsa-521, hostkey ecdsa-521: userkey ecdsa-521, hostkey ecdsa-521: userkey ecdsa-521, hostkey ecdsa-521: ok login with different key types
  765. run test kextype.sh ...
  766. kex diffie-hellman-group1-sha1
  767. kex diffie-hellman-group14-sha1
  768. kex diffie-hellman-group-exchange-sha1
  769. kex diffie-hellman-group-exchange-sha256
  770. kex ecdh-sha2-nistp256
  771. kex ecdh-sha2-nistp384
  772. kex ecdh-sha2-nistp521
  773. kex diffie-hellman-group1-sha1
  774. kex curve25519-sha256@libssh.org
  775. ok login with different key exchange algorithms
  776. run test cert-hostkey.sh ...
  777. certified host keys: sign host ed25519 cert
  778. certified host keys: sign host rsa cert
  779. certified host keys: sign host rsa_v00 cert
  780. certified host keys: sign host dsa cert
  781. certified host keys: sign host dsa_v00 cert
  782. certified host keys: sign host ecdsa-sha2-nistp256 cert
  783. certified host keys: sign host ecdsa-sha2-nistp384 cert
  784. certified host keys: sign host ecdsa-sha2-nistp521 cert
  785. certified host keys: host ed25519 cert connect privsep yes
  786. certified host keys: host rsa cert connect privsep yes
  787. certified host keys: host dsa cert connect privsep yes
  788. certified host keys: host ecdsa-sha2-nistp256 cert connect privsep yes
  789. certified host keys: host ecdsa-sha2-nistp384 cert connect privsep yes
  790. certified host keys: host ecdsa-sha2-nistp521 cert connect privsep yes
  791. certified host keys: host rsa_v00 cert connect privsep yes
  792. certified host keys: host dsa_v00 cert connect privsep yes
  793. certified host keys: host ed25519 cert connect privsep no
  794. certified host keys: host rsa cert connect privsep no
  795. certified host keys: host dsa cert connect privsep no
  796. certified host keys: host ecdsa-sha2-nistp256 cert connect privsep no
  797. certified host keys: host ecdsa-sha2-nistp384 cert connect privsep no
  798. certified host keys: host ecdsa-sha2-nistp521 cert connect privsep no
  799. certified host keys: host rsa_v00 cert connect privsep no
  800. certified host keys: host dsa_v00 cert connect privsep no
  801. certified host keys: host ed25519 revoked cert privsep yes
  802. certified host keys: host rsa revoked cert privsep yes
  803. certified host keys: host dsa revoked cert privsep yes
  804. certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep yes
  805. certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep yes
  806. certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep yes
  807. certified host keys: host rsa_v00 revoked cert privsep yes
  808. certified host keys: host dsa_v00 revoked cert privsep yes
  809. certified host keys: host ed25519 revoked cert privsep no
  810. certified host keys: host rsa revoked cert privsep no
  811. certified host keys: host dsa revoked cert privsep no
  812. certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep no
  813. certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep no
  814. certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep no
  815. certified host keys: host rsa_v00 revoked cert privsep no
  816. certified host keys: host dsa_v00 revoked cert privsep no
  817. certified host keys: host ed25519 revoked cert
  818. certified host keys: host rsa revoked cert
  819. certified host keys: host dsa revoked cert
  820. certified host keys: host ecdsa-sha2-nistp256 revoked cert
  821. certified host keys: host ecdsa-sha2-nistp384 revoked cert
  822. certified host keys: host ecdsa-sha2-nistp521 revoked cert
  823. certified host keys: host rsa_v00 revoked cert
  824. certified host keys: host dsa_v00 revoked cert
  825. certified host keys: host cert connect user-certificate rsa expect failure
  826. certified host keys: host cert connect user-certificate rsa_v00 expect failure
  827. certified host keys: host cert connect empty principals rsa expect success
  828. certified host keys: host cert connect empty principals rsa_v00 expect success
  829. certified host keys: host cert connect wrong principals rsa expect failure
  830. certified host keys: host cert connect wrong principals rsa_v00 expect failure
  831. certified host keys: host cert connect cert not yet valid rsa expect failure
  832. certified host keys: host cert connect cert not yet valid rsa_v00 expect failure
  833. certified host keys: host cert connect cert expired rsa expect failure
  834. certified host keys: host cert connect cert expired rsa_v00 expect failure
  835. certified host keys: host cert connect cert valid interval rsa expect success
  836. certified host keys: host cert connect cert valid interval rsa_v00 expect success
  837. certified host keys: host cert connect cert has constraints rsa expect failure
  838. certified host keys: host cert connect cert has constraints rsa_v00 expect failure
  839. certified host keys: host rsa v01 cert downgrade to raw key
  840. certified host keys: host dsa v01 cert downgrade to raw key
  841. certified host keys: host rsa v00 cert downgrade to raw key
  842. certified host keys: host dsa v00 cert downgrade to raw key
  843. certified host keys: host rsa connect wrong cert
  844. certified host keys: host dsa connect wrong cert
  845. certified host keys: host rsa connect wrong cert
  846. certified host keys: host dsa connect wrong cert
  847. ok certified host keys
  848. run test cert-userkey.sh ...
  849. certified user keys: sign user ed25519 cert
  850. certified user keys: sign user rsa cert
  851. certified user keys: sign host rsa_v00 cert
  852. certified user keys: sign user dsa cert
  853. certified user keys: sign host dsa_v00 cert
  854. certified user keys: sign user ecdsa-sha2-nistp256 cert
  855. certified user keys: sign user ecdsa-sha2-nistp384 cert
  856. certified user keys: sign user ecdsa-sha2-nistp521 cert
  857. certified user keys: ed25519 privsep yes missing authorized_principals
  858. certified user keys: ed25519 privsep yes empty authorized_principals
  859. certified user keys: ed25519 privsep yes wrong authorized_principals
  860. certified user keys: ed25519 privsep yes correct authorized_principals
  861. certified user keys: ed25519 privsep yes authorized_principals bad key opt
  862. certified user keys: ed25519 privsep yes authorized_principals command=false
  863. certified user keys: ed25519 privsep yes authorized_principals command=true
  864. certified user keys: ed25519 privsep yes wrong principals key option
  865. certified user keys: ed25519 privsep yes correct principals key option
  866. certified user keys: ed25519 privsep no missing authorized_principals
  867. certified user keys: ed25519 privsep no empty authorized_principals
  868. certified user keys: ed25519 privsep no wrong authorized_principals
  869. certified user keys: ed25519 privsep no correct authorized_principals
  870. certified user keys: ed25519 privsep no authorized_principals bad key opt
  871. certified user keys: ed25519 privsep no authorized_principals command=false
  872. certified user keys: ed25519 privsep no authorized_principals command=true
  873. certified user keys: ed25519 privsep no wrong principals key option
  874. certified user keys: ed25519 privsep no correct principals key option
  875. certified user keys: rsa privsep yes missing authorized_principals
  876. certified user keys: rsa privsep yes empty authorized_principals
  877. certified user keys: rsa privsep yes wrong authorized_principals
  878. certified user keys: rsa privsep yes correct authorized_principals
  879. certified user keys: rsa privsep yes authorized_principals bad key opt
  880. certified user keys: rsa privsep yes authorized_principals command=false
  881. certified user keys: rsa privsep yes authorized_principals command=true
  882. certified user keys: rsa privsep yes wrong principals key option
  883. certified user keys: rsa privsep yes correct principals key option
  884. certified user keys: rsa privsep no missing authorized_principals
  885. certified user keys: rsa privsep no empty authorized_principals
  886. certified user keys: rsa privsep no wrong authorized_principals
  887. certified user keys: rsa privsep no correct authorized_principals
  888. certified user keys: rsa privsep no authorized_principals bad key opt
  889. certified user keys: rsa privsep no authorized_principals command=false
  890. certified user keys: rsa privsep no authorized_principals command=true
  891. certified user keys: rsa privsep no wrong principals key option
  892. certified user keys: rsa privsep no correct principals key option
  893. certified user keys: dsa privsep yes missing authorized_principals
  894. certified user keys: dsa privsep yes empty authorized_principals
  895. certified user keys: dsa privsep yes wrong authorized_principals
  896. certified user keys: dsa privsep yes correct authorized_principals
  897. certified user keys: dsa privsep yes authorized_principals bad key opt
  898. certified user keys: dsa privsep yes authorized_principals command=false
  899. certified user keys: dsa privsep yes authorized_principals command=true
  900. certified user keys: dsa privsep yes wrong principals key option
  901. certified user keys: dsa privsep yes correct principals key option
  902. certified user keys: dsa privsep no missing authorized_principals
  903. certified user keys: dsa privsep no empty authorized_principals
  904. certified user keys: dsa privsep no wrong authorized_principals
  905. certified user keys: dsa privsep no correct authorized_principals
  906. certified user keys: dsa privsep no authorized_principals bad key opt
  907. certified user keys: dsa privsep no authorized_principals command=false
  908. certified user keys: dsa privsep no authorized_principals command=true
  909. certified user keys: dsa privsep no wrong principals key option
  910. certified user keys: dsa privsep no correct principals key option
  911. certified user keys: ecdsa-sha2-nistp256 privsep yes missing authorized_principals
  912. certified user keys: ecdsa-sha2-nistp256 privsep yes empty authorized_principals
  913. certified user keys: ecdsa-sha2-nistp256 privsep yes wrong authorized_principals
  914. certified user keys: ecdsa-sha2-nistp256 privsep yes correct authorized_principals
  915. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals bad key opt
  916. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=false
  917. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=true
  918. certified user keys: ecdsa-sha2-nistp256 privsep yes wrong principals key option
  919. certified user keys: ecdsa-sha2-nistp256 privsep yes correct principals key option
  920. certified user keys: ecdsa-sha2-nistp256 privsep no missing authorized_principals
  921. certified user keys: ecdsa-sha2-nistp256 privsep no empty authorized_principals
  922. certified user keys: ecdsa-sha2-nistp256 privsep no wrong authorized_principals
  923. certified user keys: ecdsa-sha2-nistp256 privsep no correct authorized_principals
  924. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals bad key opt
  925. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals command=false
  926. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals command=true
  927. certified user keys: ecdsa-sha2-nistp256 privsep no wrong principals key option
  928. certified user keys: ecdsa-sha2-nistp256 privsep no correct principals key option
  929. certified user keys: ecdsa-sha2-nistp384 privsep yes missing authorized_principals
  930. certified user keys: ecdsa-sha2-nistp384 privsep yes empty authorized_principals
  931. certified user keys: ecdsa-sha2-nistp384 privsep yes wrong authorized_principals
  932. certified user keys: ecdsa-sha2-nistp384 privsep yes correct authorized_principals
  933. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals bad key opt
  934. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=false
  935. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=true
  936. certified user keys: ecdsa-sha2-nistp384 privsep yes wrong principals key option
  937. certified user keys: ecdsa-sha2-nistp384 privsep yes correct principals key option
  938. certified user keys: ecdsa-sha2-nistp384 privsep no missing authorized_principals
  939. certified user keys: ecdsa-sha2-nistp384 privsep no empty authorized_principals
  940. certified user keys: ecdsa-sha2-nistp384 privsep no wrong authorized_principals
  941. certified user keys: ecdsa-sha2-nistp384 privsep no correct authorized_principals
  942. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals bad key opt
  943. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals command=false
  944. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals command=true
  945. certified user keys: ecdsa-sha2-nistp384 privsep no wrong principals key option
  946. certified user keys: ecdsa-sha2-nistp384 privsep no correct principals key option
  947. certified user keys: ecdsa-sha2-nistp521 privsep yes missing authorized_principals
  948. certified user keys: ecdsa-sha2-nistp521 privsep yes empty authorized_principals
  949. certified user keys: ecdsa-sha2-nistp521 privsep yes wrong authorized_principals
  950. certified user keys: ecdsa-sha2-nistp521 privsep yes correct authorized_principals
  951. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals bad key opt
  952. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=false
  953. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=true
  954. certified user keys: ecdsa-sha2-nistp521 privsep yes wrong principals key option
  955. certified user keys: ecdsa-sha2-nistp521 privsep yes correct principals key option
  956. certified user keys: ecdsa-sha2-nistp521 privsep no missing authorized_principals
  957. certified user keys: ecdsa-sha2-nistp521 privsep no empty authorized_principals
  958. certified user keys: ecdsa-sha2-nistp521 privsep no wrong authorized_principals
  959. certified user keys: ecdsa-sha2-nistp521 privsep no correct authorized_principals
  960. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals bad key opt
  961. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals command=false
  962. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals command=true
  963. certified user keys: ecdsa-sha2-nistp521 privsep no wrong principals key option
  964. certified user keys: ecdsa-sha2-nistp521 privsep no correct principals key option
  965. certified user keys: rsa_v00 privsep yes missing authorized_principals
  966. certified user keys: rsa_v00 privsep yes empty authorized_principals
  967. certified user keys: rsa_v00 privsep yes wrong authorized_principals
  968. certified user keys: rsa_v00 privsep yes correct authorized_principals
  969. certified user keys: rsa_v00 privsep yes authorized_principals bad key opt
  970. certified user keys: rsa_v00 privsep yes authorized_principals command=false
  971. certified user keys: rsa_v00 privsep yes authorized_principals command=true
  972. certified user keys: rsa_v00 privsep yes wrong principals key option
  973. certified user keys: rsa_v00 privsep yes correct principals key option
  974. certified user keys: rsa_v00 privsep no missing authorized_principals
  975. certified user keys: rsa_v00 privsep no empty authorized_principals
  976. certified user keys: rsa_v00 privsep no wrong authorized_principals
  977. certified user keys: rsa_v00 privsep no correct authorized_principals
  978. certified user keys: rsa_v00 privsep no authorized_principals bad key opt
  979. certified user keys: rsa_v00 privsep no authorized_principals command=false
  980. certified user keys: rsa_v00 privsep no authorized_principals command=true
  981. certified user keys: rsa_v00 privsep no wrong principals key option
  982. certified user keys: rsa_v00 privsep no correct principals key option
  983. certified user keys: dsa_v00 privsep yes missing authorized_principals
  984. certified user keys: dsa_v00 privsep yes empty authorized_principals
  985. certified user keys: dsa_v00 privsep yes wrong authorized_principals
  986. certified user keys: dsa_v00 privsep yes correct authorized_principals
  987. certified user keys: dsa_v00 privsep yes authorized_principals bad key opt
  988. certified user keys: dsa_v00 privsep yes authorized_principals command=false
  989. certified user keys: dsa_v00 privsep yes authorized_principals command=true
  990. certified user keys: dsa_v00 privsep yes wrong principals key option
  991. certified user keys: dsa_v00 privsep yes correct principals key option
  992. certified user keys: dsa_v00 privsep no missing authorized_principals
  993. certified user keys: dsa_v00 privsep no empty authorized_principals
  994. certified user keys: dsa_v00 privsep no wrong authorized_principals
  995. certified user keys: dsa_v00 privsep no correct authorized_principals
  996. certified user keys: dsa_v00 privsep no authorized_principals bad key opt
  997. certified user keys: dsa_v00 privsep no authorized_principals command=false
  998. certified user keys: dsa_v00 privsep no authorized_principals command=true
  999. certified user keys: dsa_v00 privsep no wrong principals key option
  1000. certified user keys: dsa_v00 privsep no correct principals key option
  1001. certified user keys: ed25519 privsep yes authorized_keys connect
  1002. certified user keys: ed25519 privsep yes authorized_keys revoked key
  1003. certified user keys: ed25519 privsep yes authorized_keys revoked via KRL
  1004. certified user keys: ed25519 privsep yes authorized_keys empty KRL
  1005. certified user keys: ed25519 privsep no authorized_keys connect
  1006. certified user keys: ed25519 privsep no authorized_keys revoked key
  1007. certified user keys: ed25519 privsep no authorized_keys revoked via KRL
  1008. certified user keys: ed25519 privsep no authorized_keys empty KRL
  1009. certified user keys: ed25519 authorized_keys revoked CA key
  1010. certified user keys: rsa privsep yes authorized_keys connect
  1011. certified user keys: rsa privsep yes authorized_keys revoked key
  1012. certified user keys: rsa privsep yes authorized_keys revoked via KRL
  1013. certified user keys: rsa privsep yes authorized_keys empty KRL
  1014. certified user keys: rsa privsep no authorized_keys connect
  1015. certified user keys: rsa privsep no authorized_keys revoked key
  1016. certified user keys: rsa privsep no authorized_keys revoked via KRL
  1017. certified user keys: rsa privsep no authorized_keys empty KRL
  1018. certified user keys: rsa authorized_keys revoked CA key
  1019. certified user keys: dsa privsep yes authorized_keys connect
  1020. certified user keys: dsa privsep yes authorized_keys revoked key
  1021. certified user keys: dsa privsep yes authorized_keys revoked via KRL
  1022. certified user keys: dsa privsep yes authorized_keys empty KRL
  1023. certified user keys: dsa privsep no authorized_keys connect
  1024. certified user keys: dsa privsep no authorized_keys revoked key
  1025. certified user keys: dsa privsep no authorized_keys revoked via KRL
  1026. certified user keys: dsa privsep no authorized_keys empty KRL
  1027. certified user keys: dsa authorized_keys revoked CA key
  1028. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys connect
  1029. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked key
  1030. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked via KRL
  1031. certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys empty KRL
  1032. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys connect
  1033. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked key
  1034. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked via KRL
  1035. certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys empty KRL
  1036. certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked CA key
  1037. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys connect
  1038. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked key
  1039. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked via KRL
  1040. certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys empty KRL
  1041. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys connect
  1042. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked key
  1043. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked via KRL
  1044. certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys empty KRL
  1045. certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked CA key
  1046. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys connect
  1047. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked key
  1048. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked via KRL
  1049. certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys empty KRL
  1050. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys connect
  1051. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked key
  1052. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked via KRL
  1053. certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys empty KRL
  1054. certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked CA key
  1055. certified user keys: rsa_v00 privsep yes authorized_keys connect
  1056. certified user keys: rsa_v00 privsep yes authorized_keys revoked key
  1057. certified user keys: rsa_v00 privsep yes authorized_keys revoked via KRL
  1058. certified user keys: rsa_v00 privsep yes authorized_keys empty KRL
  1059. certified user keys: rsa_v00 privsep no authorized_keys connect
  1060. certified user keys: rsa_v00 privsep no authorized_keys revoked key
  1061. certified user keys: rsa_v00 privsep no authorized_keys revoked via KRL
  1062. certified user keys: rsa_v00 privsep no authorized_keys empty KRL
  1063. certified user keys: rsa_v00 authorized_keys revoked CA key
  1064. certified user keys: dsa_v00 privsep yes authorized_keys connect
  1065. certified user keys: dsa_v00 privsep yes authorized_keys revoked key
  1066. certified user keys: dsa_v00 privsep yes authorized_keys revoked via KRL
  1067. certified user keys: dsa_v00 privsep yes authorized_keys empty KRL
  1068. certified user keys: dsa_v00 privsep no authorized_keys connect
  1069. certified user keys: dsa_v00 privsep no authorized_keys revoked key
  1070. certified user keys: dsa_v00 privsep no authorized_keys revoked via KRL
  1071. certified user keys: dsa_v00 privsep no authorized_keys empty KRL
  1072. certified user keys: dsa_v00 authorized_keys revoked CA key
  1073. certified user keys: authorized_keys CA does not authenticate
  1074. certified user keys: ensure CA key does not authenticate user
  1075. certified user keys: ed25519 privsep yes TrustedUserCAKeys connect
  1076. certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked key
  1077. certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked via KRL
  1078. certified user keys: ed25519 privsep yes TrustedUserCAKeys empty KRL
  1079. certified user keys: ed25519 privsep no TrustedUserCAKeys connect
  1080. certified user keys: ed25519 privsep no TrustedUserCAKeys revoked key
  1081. certified user keys: ed25519 privsep no TrustedUserCAKeys revoked via KRL
  1082. certified user keys: ed25519 privsep no TrustedUserCAKeys empty KRL
  1083. certified user keys: ed25519 TrustedUserCAKeys revoked CA key
  1084. certified user keys: rsa privsep yes TrustedUserCAKeys connect
  1085. certified user keys: rsa privsep yes TrustedUserCAKeys revoked key
  1086. certified user keys: rsa privsep yes TrustedUserCAKeys revoked via KRL
  1087. certified user keys: rsa privsep yes TrustedUserCAKeys empty KRL
  1088. certified user keys: rsa privsep no TrustedUserCAKeys connect
  1089. certified user keys: rsa privsep no TrustedUserCAKeys revoked key
  1090. certified user keys: rsa privsep no TrustedUserCAKeys revoked via KRL
  1091. certified user keys: rsa privsep no TrustedUserCAKeys empty KRL
  1092. certified user keys: rsa TrustedUserCAKeys revoked CA key
  1093. certified user keys: dsa privsep yes TrustedUserCAKeys connect
  1094. certified user keys: dsa privsep yes TrustedUserCAKeys revoked key
  1095. certified user keys: dsa privsep yes TrustedUserCAKeys revoked via KRL
  1096. certified user keys: dsa privsep yes TrustedUserCAKeys empty KRL
  1097. certified user keys: dsa privsep no TrustedUserCAKeys connect
  1098. certified user keys: dsa privsep no TrustedUserCAKeys revoked key
  1099. certified user keys: dsa privsep no TrustedUserCAKeys revoked via KRL
  1100. certified user keys: dsa privsep no TrustedUserCAKeys empty KRL
  1101. certified user keys: dsa TrustedUserCAKeys revoked CA key
  1102. certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys connect
  1103. certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked key
  1104. certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked via KRL
  1105. certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys empty KRL
  1106. certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys connect
  1107. certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked key
  1108. certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked via KRL
  1109. certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys empty KRL
  1110. certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked CA key
  1111. certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys connect
  1112. certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked key
  1113. certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked via KRL
  1114. certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys empty KRL
  1115. certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys connect
  1116. certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked key
  1117. certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked via KRL
  1118. certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys empty KRL
  1119. certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked CA key
  1120. certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys connect
  1121. certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked key
  1122. certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked via KRL
  1123. certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys empty KRL
  1124. certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys connect
  1125. certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked key
  1126. certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked via KRL
  1127. certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys empty KRL
  1128. certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked CA key
  1129. certified user keys: rsa_v00 privsep yes TrustedUserCAKeys connect
  1130. certified user keys: rsa_v00 privsep yes TrustedUserCAKeys revoked key
  1131. certified user keys: rsa_v00 privsep yes TrustedUserCAKeys revoked via KRL
  1132. certified user keys: rsa_v00 privsep yes TrustedUserCAKeys empty KRL
  1133. certified user keys: rsa_v00 privsep no TrustedUserCAKeys connect
  1134. certified user keys: rsa_v00 privsep no TrustedUserCAKeys revoked key
  1135. certified user keys: rsa_v00 privsep no TrustedUserCAKeys revoked via KRL
  1136. certified user keys: rsa_v00 privsep no TrustedUserCAKeys empty KRL
  1137. certified user keys: rsa_v00 TrustedUserCAKeys revoked CA key
  1138. certified user keys: dsa_v00 privsep yes TrustedUserCAKeys connect
  1139. certified user keys: dsa_v00 privsep yes TrustedUserCAKeys revoked key
  1140. certified user keys: dsa_v00 privsep yes TrustedUserCAKeys revoked via KRL
  1141. certified user keys: dsa_v00 privsep yes TrustedUserCAKeys empty KRL
  1142. certified user keys: dsa_v00 privsep no TrustedUserCAKeys connect
  1143. certified user keys: dsa_v00 privsep no TrustedUserCAKeys revoked key
  1144. certified user keys: dsa_v00 privsep no TrustedUserCAKeys revoked via KRL
  1145. certified user keys: dsa_v00 privsep no TrustedUserCAKeys empty KRL
  1146. certified user keys: dsa_v00 TrustedUserCAKeys revoked CA key
  1147. certified user keys: TrustedUserCAKeys CA does not authenticate
  1148. certified user keys: ensure CA key does not authenticate user
  1149. certified user keys: correct principal auth authorized_keys expect success rsa
  1150. certified user keys: correct principal auth authorized_keys expect success rsa_v00
  1151. certified user keys: correct principal auth TrustedUserCAKeys expect success rsa
  1152. certified user keys: correct principal auth TrustedUserCAKeys expect success rsa_v00
  1153. certified user keys: host-certificate auth authorized_keys expect failure rsa
  1154. certified user keys: host-certificate auth authorized_keys expect failure rsa_v00
  1155. certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa
  1156. certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa_v00
  1157. certified user keys: wrong principals auth authorized_keys expect failure rsa
  1158. certified user keys: wrong principals auth authorized_keys expect failure rsa_v00
  1159. certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa
  1160. certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa_v00
  1161. certified user keys: cert not yet valid auth authorized_keys expect failure rsa
  1162. certified user keys: cert not yet valid auth authorized_keys expect failure rsa_v00
  1163. certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa
  1164. certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa_v00
  1165. certified user keys: cert expired auth authorized_keys expect failure rsa
  1166. certified user keys: cert expired auth authorized_keys expect failure rsa_v00
  1167. certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa
  1168. certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa_v00
  1169. certified user keys: cert valid interval auth authorized_keys expect success rsa
  1170. certified user keys: cert valid interval auth authorized_keys expect success rsa_v00
  1171. certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa
  1172. certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa_v00
  1173. certified user keys: wrong source-address auth authorized_keys expect failure rsa
  1174. certified user keys: wrong source-address auth authorized_keys expect failure rsa_v00
  1175. certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa
  1176. certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa_v00
  1177. certified user keys: force-command auth authorized_keys expect failure rsa
  1178. certified user keys: force-command auth authorized_keys expect failure rsa_v00
  1179. certified user keys: force-command auth TrustedUserCAKeys expect failure rsa
  1180. certified user keys: force-command auth TrustedUserCAKeys expect failure rsa_v00
  1181. certified user keys: empty principals auth authorized_keys expect success rsa
  1182. certified user keys: empty principals auth authorized_keys expect success rsa_v00
  1183. certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa
  1184. certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa_v00
  1185. certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa
  1186. certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa_v00
  1187. certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa
  1188. certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa_v00
  1189. certified user keys: principals key option principals auth authorized_keys expect success rsa
  1190. certified user keys: principals key option principals auth authorized_keys expect success rsa_v00
  1191. certified user keys: principals key option no principals auth authorized_keys expect failure rsa
  1192. certified user keys: principals key option no principals auth authorized_keys expect failure rsa_v00
  1193. certified user keys: user ed25519 connect wrong cert
  1194. certified user keys: user rsa connect wrong cert
  1195. certified user keys: user dsa connect wrong cert
  1196. certified user keys: user ecdsa-sha2-nistp256 connect wrong cert
  1197. certified user keys: user ecdsa-sha2-nistp384 connect wrong cert
  1198. certified user keys: user ecdsa-sha2-nistp521 connect wrong cert
  1199. certified user keys: user rsa_v00 connect wrong cert
  1200. certified user keys: user dsa_v00 connect wrong cert
  1201. ok certified user keys
  1202. run test host-expand.sh ...
  1203. test expand %h and %n: proto 1
  1204. test expand %h and %n: proto 2
  1205. ok expand %h and %n
  1206. run test keys-command.sh ...
  1207. skipped (SUDO not set)
  1208. need SUDO to create file in /var/run, test won't work without
  1209. run test forward-control.sh ...
  1210. check_lfwd done (expecting Y): proto 1, default configuration
  1211. check_rfwd done (expecting Y): proto 1, default configuration
  1212. check_lfwd done (expecting Y): proto 2, default configuration
  1213. check_rfwd done (expecting Y): proto 2, default configuration
  1214. check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=yes
  1215. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes
  1216. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=yes, !PermitOpen
  1217. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, !PermitOpen
  1218. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=yes, !permitopen
  1219. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, !permitopen
  1220. check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, permitopen
  1221. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, permitopen
  1222. check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=yes
  1223. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes
  1224. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=yes, !PermitOpen
  1225. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, !PermitOpen
  1226. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=yes, !permitopen
  1227. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, !permitopen
  1228. check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, permitopen
  1229. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, permitopen
  1230. check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=local
  1231. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local
  1232. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=local, !PermitOpen
  1233. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local, !PermitOpen
  1234. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=local, !permitopen
  1235. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local, !permitopen
  1236. check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=local, permitopen
  1237. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local, permitopen
  1238. check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=local
  1239. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local
  1240. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=local, !PermitOpen
  1241. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local, !PermitOpen
  1242. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=local, !permitopen
  1243. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local, !permitopen
  1244. check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=local, permitopen
  1245. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local, permitopen
  1246. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote
  1247. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote
  1248. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote, !PermitOpen
  1249. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote, !PermitOpen
  1250. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote, !permitopen
  1251. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote, !permitopen
  1252. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote, permitopen
  1253. check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote, permitopen
  1254. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote
  1255. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote
  1256. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote, !PermitOpen
  1257. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote, !PermitOpen
  1258. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote, !permitopen
  1259. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote, !permitopen
  1260. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote, permitopen
  1261. check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote, permitopen
  1262. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no
  1263. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no
  1264. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no, !PermitOpen
  1265. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no, !PermitOpen
  1266. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no, !permitopen
  1267. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no, !permitopen
  1268. check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no, permitopen
  1269. check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no, permitopen
  1270. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no
  1271. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no
  1272. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no, !PermitOpen
  1273. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no, !PermitOpen
  1274. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no, !permitopen
  1275. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no, !permitopen
  1276. check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no, permitopen
  1277. check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no, permitopen
  1278. ok sshd control of local and remote forwarding
  1279. run test integrity.sh ...
  1280. test integrity: hmac-sha1 @2900
  1281. test integrity: hmac-sha1 @2901
  1282. test integrity: hmac-sha1 @2902
  1283. test integrity: hmac-sha1 @2903
  1284. test integrity: hmac-sha1 @2904
  1285. test integrity: hmac-sha1 @2905
  1286. test integrity: hmac-sha1 @2906
  1287. test integrity: hmac-sha1 @2907
  1288. test integrity: hmac-sha1 @2908
  1289. test integrity: hmac-sha1 @2909
  1290. test integrity: 10 errors: mac 10 padding 0 length 0
  1291. test integrity: hmac-sha1-96 @2900
  1292. test integrity: hmac-sha1-96 @2901
  1293. test integrity: hmac-sha1-96 @2902
  1294. test integrity: hmac-sha1-96 @2903
  1295. test integrity: hmac-sha1-96 @2904
  1296. test integrity: hmac-sha1-96 @2905
  1297. test integrity: hmac-sha1-96 @2906
  1298. test integrity: hmac-sha1-96 @2907
  1299. test integrity: hmac-sha1-96 @2908
  1300. test integrity: hmac-sha1-96 @2909
  1301. test integrity: 10 errors: mac 10 padding 0 length 0
  1302. test integrity: hmac-sha2-256 @2900
  1303. test integrity: hmac-sha2-256 @2901
  1304. test integrity: hmac-sha2-256 @2902
  1305. test integrity: hmac-sha2-256 @2903
  1306. test integrity: hmac-sha2-256 @2904
  1307. test integrity: hmac-sha2-256 @2905
  1308. test integrity: hmac-sha2-256 @2906
  1309. test integrity: hmac-sha2-256 @2907
  1310. test integrity: hmac-sha2-256 @2908
  1311. test integrity: hmac-sha2-256 @2909
  1312. test integrity: 10 errors: mac 10 padding 0 length 0
  1313. test integrity: hmac-sha2-512 @2900
  1314. test integrity: hmac-sha2-512 @2901
  1315. test integrity: hmac-sha2-512 @2902
  1316. test integrity: hmac-sha2-512 @2903
  1317. test integrity: hmac-sha2-512 @2904
  1318. test integrity: hmac-sha2-512 @2905
  1319. test integrity: hmac-sha2-512 @2906
  1320. test integrity: hmac-sha2-512 @2907
  1321. test integrity: hmac-sha2-512 @2908
  1322. test integrity: hmac-sha2-512 @2909
  1323. test integrity: 10 errors: mac 10 padding 0 length 0
  1324. test integrity: hmac-md5 @2900
  1325. test integrity: hmac-md5 @2901
  1326. test integrity: hmac-md5 @2902
  1327. test integrity: hmac-md5 @2903
  1328. test integrity: hmac-md5 @2904
  1329. test integrity: hmac-md5 @2905
  1330. test integrity: hmac-md5 @2906
  1331. test integrity: hmac-md5 @2907
  1332. test integrity: hmac-md5 @2908
  1333. test integrity: hmac-md5 @2909
  1334. test integrity: 10 errors: mac 10 padding 0 length 0
  1335. test integrity: hmac-md5-96 @2900
  1336. test integrity: hmac-md5-96 @2901
  1337. test integrity: hmac-md5-96 @2902
  1338. test integrity: hmac-md5-96 @2903
  1339. test integrity: hmac-md5-96 @2904
  1340. test integrity: hmac-md5-96 @2905
  1341. test integrity: hmac-md5-96 @2906
  1342. test integrity: hmac-md5-96 @2907
  1343. test integrity: hmac-md5-96 @2908
  1344. test integrity: hmac-md5-96 @2909
  1345. test integrity: 10 errors: mac 10 padding 0 length 0
  1346. test integrity: hmac-ripemd160 @2900
  1347. test integrity: hmac-ripemd160 @2901
  1348. test integrity: hmac-ripemd160 @2902
  1349. test integrity: hmac-ripemd160 @2903
  1350. test integrity: hmac-ripemd160 @2904
  1351. test integrity: hmac-ripemd160 @2905
  1352. test integrity: hmac-ripemd160 @2906
  1353. test integrity: hmac-ripemd160 @2907
  1354. test integrity: hmac-ripemd160 @2908
  1355. test integrity: hmac-ripemd160 @2909
  1356. test integrity: 10 errors: mac 10 padding 0 length 0
  1357. test integrity: hmac-ripemd160@openssh.com @2900
  1358. test integrity: hmac-ripemd160@openssh.com @2901
  1359. test integrity: hmac-ripemd160@openssh.com @2902
  1360. test integrity: hmac-ripemd160@openssh.com @2903
  1361. test integrity: hmac-ripemd160@openssh.com @2904
  1362. test integrity: hmac-ripemd160@openssh.com @2905
  1363. test integrity: hmac-ripemd160@openssh.com @2906
  1364. test integrity: hmac-ripemd160@openssh.com @2907
  1365. test integrity: hmac-ripemd160@openssh.com @2908
  1366. test integrity: hmac-ripemd160@openssh.com @2909
  1367. test integrity: 10 errors: mac 10 padding 0 length 0
  1368. test integrity: umac-64@openssh.com @2900
  1369. test integrity: umac-64@openssh.com @2901
  1370. test integrity: umac-64@openssh.com @2902
  1371. test integrity: umac-64@openssh.com @2903
  1372. test integrity: umac-64@openssh.com @2904
  1373. test integrity: umac-64@openssh.com @2905
  1374. test integrity: umac-64@openssh.com @2906
  1375. test integrity: umac-64@openssh.com @2907
  1376. test integrity: umac-64@openssh.com @2908
  1377. test integrity: umac-64@openssh.com @2909
  1378. test integrity: 10 errors: mac 10 padding 0 length 0
  1379. test integrity: umac-128@openssh.com @2900
  1380. test integrity: umac-128@openssh.com @2901
  1381. test integrity: umac-128@openssh.com @2902
  1382. test integrity: umac-128@openssh.com @2903
  1383. test integrity: umac-128@openssh.com @2904
  1384. test integrity: umac-128@openssh.com @2905
  1385. test integrity: umac-128@openssh.com @2906
  1386. test integrity: umac-128@openssh.com @2907
  1387. test integrity: umac-128@openssh.com @2908
  1388. test integrity: umac-128@openssh.com @2909
  1389. test integrity: 10 errors: mac 10 padding 0 length 0
  1390. test integrity: hmac-sha1-etm@openssh.com @2900
  1391. test integrity: hmac-sha1-etm@openssh.com @2901
  1392. test integrity: hmac-sha1-etm@openssh.com @2902
  1393. test integrity: hmac-sha1-etm@openssh.com @2903
  1394. test integrity: hmac-sha1-etm@openssh.com @2904
  1395. test integrity: hmac-sha1-etm@openssh.com @2905
  1396. test integrity: hmac-sha1-etm@openssh.com @2906
  1397. test integrity: hmac-sha1-etm@openssh.com @2907
  1398. test integrity: hmac-sha1-etm@openssh.com @2908
  1399. test integrity: hmac-sha1-etm@openssh.com @2909
  1400. test integrity: 10 errors: mac 10 padding 0 length 0
  1401. test integrity: hmac-sha1-96-etm@openssh.com @2900
  1402. test integrity: hmac-sha1-96-etm@openssh.com @2901
  1403. test integrity: hmac-sha1-96-etm@openssh.com @2902
  1404. test integrity: hmac-sha1-96-etm@openssh.com @2903
  1405. test integrity: hmac-sha1-96-etm@openssh.com @2904
  1406. test integrity: hmac-sha1-96-etm@openssh.com @2905
  1407. test integrity: hmac-sha1-96-etm@openssh.com @2906
  1408. test integrity: hmac-sha1-96-etm@openssh.com @2907
  1409. test integrity: hmac-sha1-96-etm@openssh.com @2908
  1410. test integrity: hmac-sha1-96-etm@openssh.com @2909
  1411. test integrity: 10 errors: mac 10 padding 0 length 0
  1412. test integrity: hmac-sha2-256-etm@openssh.com @2900
  1413. test integrity: hmac-sha2-256-etm@openssh.com @2901
  1414. test integrity: hmac-sha2-256-etm@openssh.com @2902
  1415. test integrity: hmac-sha2-256-etm@openssh.com @2903
  1416. test integrity: hmac-sha2-256-etm@openssh.com @2904
  1417. test integrity: hmac-sha2-256-etm@openssh.com @2905
  1418. test integrity: hmac-sha2-256-etm@openssh.com @2906
  1419. test integrity: hmac-sha2-256-etm@openssh.com @2907
  1420. test integrity: hmac-sha2-256-etm@openssh.com @2908
  1421. test integrity: hmac-sha2-256-etm@openssh.com @2909
  1422. test integrity: 10 errors: mac 10 padding 0 length 0
  1423. test integrity: hmac-sha2-512-etm@openssh.com @2900
  1424. test integrity: hmac-sha2-512-etm@openssh.com @2901
  1425. test integrity: hmac-sha2-512-etm@openssh.com @2902
  1426. test integrity: hmac-sha2-512-etm@openssh.com @2903
  1427. test integrity: hmac-sha2-512-etm@openssh.com @2904
  1428. test integrity: hmac-sha2-512-etm@openssh.com @2905
  1429. test integrity: hmac-sha2-512-etm@openssh.com @2906
  1430. test integrity: hmac-sha2-512-etm@openssh.com @2907
  1431. test integrity: hmac-sha2-512-etm@openssh.com @2908
  1432. test integrity: hmac-sha2-512-etm@openssh.com @2909
  1433. test integrity: 10 errors: mac 10 padding 0 length 0
  1434. test integrity: hmac-md5-etm@openssh.com @2900
  1435. test integrity: hmac-md5-etm@openssh.com @2901
  1436. test integrity: hmac-md5-etm@openssh.com @2902
  1437. test integrity: hmac-md5-etm@openssh.com @2903
  1438. test integrity: hmac-md5-etm@openssh.com @2904
  1439. test integrity: hmac-md5-etm@openssh.com @2905
  1440. test integrity: hmac-md5-etm@openssh.com @2906
  1441. test integrity: hmac-md5-etm@openssh.com @2907
  1442. test integrity: hmac-md5-etm@openssh.com @2908
  1443. test integrity: hmac-md5-etm@openssh.com @2909
  1444. test integrity: 10 errors: mac 10 padding 0 length 0
  1445. test integrity: hmac-md5-96-etm@openssh.com @2900
  1446. test integrity: hmac-md5-96-etm@openssh.com @2901
  1447. test integrity: hmac-md5-96-etm@openssh.com @2902
  1448. test integrity: hmac-md5-96-etm@openssh.com @2903
  1449. test integrity: hmac-md5-96-etm@openssh.com @2904
  1450. test integrity: hmac-md5-96-etm@openssh.com @2905
  1451. test integrity: hmac-md5-96-etm@openssh.com @2906
  1452. test integrity: hmac-md5-96-etm@openssh.com @2907
  1453. test integrity: hmac-md5-96-etm@openssh.com @2908
  1454. test integrity: hmac-md5-96-etm@openssh.com @2909
  1455. test integrity: 10 errors: mac 10 padding 0 length 0
  1456. test integrity: hmac-ripemd160-etm@openssh.com @2900
  1457. test integrity: hmac-ripemd160-etm@openssh.com @2901
  1458. test integrity: hmac-ripemd160-etm@openssh.com @2902
  1459. test integrity: hmac-ripemd160-etm@openssh.com @2903
  1460. test integrity: hmac-ripemd160-etm@openssh.com @2904
  1461. test integrity: hmac-ripemd160-etm@openssh.com @2905
  1462. test integrity: hmac-ripemd160-etm@openssh.com @2906
  1463. test integrity: hmac-ripemd160-etm@openssh.com @2907
  1464. test integrity: hmac-ripemd160-etm@openssh.com @2908
  1465. test integrity: hmac-ripemd160-etm@openssh.com @2909
  1466. test integrity: 10 errors: mac 10 padding 0 length 0
  1467. test integrity: umac-64-etm@openssh.com @2900
  1468. test integrity: umac-64-etm@openssh.com @2901
  1469. test integrity: umac-64-etm@openssh.com @2902
  1470. test integrity: umac-64-etm@openssh.com @2903
  1471. test integrity: umac-64-etm@openssh.com @2904
  1472. test integrity: umac-64-etm@openssh.com @2905
  1473. test integrity: umac-64-etm@openssh.com @2906
  1474. test integrity: umac-64-etm@openssh.com @2907
  1475. test integrity: umac-64-etm@openssh.com @2908
  1476. test integrity: umac-64-etm@openssh.com @2909
  1477. test integrity: 10 errors: mac 10 padding 0 length 0
  1478. test integrity: umac-128-etm@openssh.com @2900
  1479. test integrity: umac-128-etm@openssh.com @2901
  1480. test integrity: umac-128-etm@openssh.com @2902
  1481. test integrity: umac-128-etm@openssh.com @2903
  1482. test integrity: umac-128-etm@openssh.com @2904
  1483. test integrity: umac-128-etm@openssh.com @2905
  1484. test integrity: umac-128-etm@openssh.com @2906
  1485. test integrity: umac-128-etm@openssh.com @2907
  1486. test integrity: umac-128-etm@openssh.com @2908
  1487. test integrity: umac-128-etm@openssh.com @2909
  1488. test integrity: 10 errors: mac 10 padding 0 length 0
  1489. test integrity: aes128-gcm@openssh.com @2900
  1490. test integrity: aes128-gcm@openssh.com @2901
  1491. test integrity: aes128-gcm@openssh.com @2902
  1492. test integrity: aes128-gcm@openssh.com @2903
  1493. test integrity: aes128-gcm@openssh.com @2904
  1494. test integrity: aes128-gcm@openssh.com @2905
  1495. test integrity: aes128-gcm@openssh.com @2906
  1496. test integrity: aes128-gcm@openssh.com @2907
  1497. test integrity: aes128-gcm@openssh.com @2908
  1498. test integrity: aes128-gcm@openssh.com @2909
  1499. test integrity: 10 errors: mac 10 padding 0 length 0
  1500. test integrity: aes256-gcm@openssh.com @2900
  1501. test integrity: aes256-gcm@openssh.com @2901
  1502. test integrity: aes256-gcm@openssh.com @2902
  1503. test integrity: aes256-gcm@openssh.com @2903
  1504. test integrity: aes256-gcm@openssh.com @2904
  1505. test integrity: aes256-gcm@openssh.com @2905
  1506. test integrity: aes256-gcm@openssh.com @2906
  1507. test integrity: aes256-gcm@openssh.com @2907
  1508. test integrity: aes256-gcm@openssh.com @2908
  1509. test integrity: aes256-gcm@openssh.com @2909
  1510. test integrity: 10 errors: mac 10 padding 0 length 0
  1511. test integrity: chacha20-poly1305@openssh.com @2900
  1512. test integrity: chacha20-poly1305@openssh.com @2901
  1513. test integrity: chacha20-poly1305@openssh.com @2902
  1514. test integrity: chacha20-poly1305@openssh.com @2903
  1515. test integrity: chacha20-poly1305@openssh.com @2904
  1516. test integrity: chacha20-poly1305@openssh.com @2905
  1517. test integrity: chacha20-poly1305@openssh.com @2906
  1518. test integrity: chacha20-poly1305@openssh.com @2907
  1519. test integrity: chacha20-poly1305@openssh.com @2908
  1520. test integrity: chacha20-poly1305@openssh.com @2909
  1521. test integrity: 10 errors: mac 10 padding 0 length 0
  1522. ok integrity
  1523. run test krl.sh ...
  1524. key revocation lists: generating test keys
  1525. key revocation lists: generating KRLs
  1526. key revocation lists: checking revocations for revoked keys
  1527. key revocation lists: checking revocations for unrevoked keys
  1528. key revocation lists: checking revocations for revoked certs
  1529. key revocation lists: checking revocations for unrevoked certs
  1530. key revocation lists: testing KRL update
  1531. key revocation lists: checking revocations for revoked keys
  1532. key revocation lists: checking revocations for unrevoked keys
  1533. key revocation lists: checking revocations for revoked certs
  1534. key revocation lists: checking revocations for unrevoked certs
  1535. ok key revocation lists
  1536. make[1]: Leaving directory '/root/openssh-6.7p1/regress'
  1537. all tests passed
  1538. root@linaro-alip:~/openssh-6.7p1#
  1539. root@linaro-alip:~/openssh-6.7p1#
Add Comment
Please, Sign In to add comment