Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@linaro-alip:~/openssh-6.7p1# make tests
- [ -d `pwd`/regress ] || mkdir -p `pwd`/regress
- [ -d `pwd`/regress/unittests ] || mkdir -p `pwd`/regress/unittests
- [ -d `pwd`/regress/unittests/test_helper ] || \
- mkdir -p `pwd`/regress/unittests/test_helper
- [ -d `pwd`/regress/unittests/sshbuf ] || \
- mkdir -p `pwd`/regress/unittests/sshbuf
- [ -d `pwd`/regress/unittests/sshkey ] || \
- mkdir -p `pwd`/regress/unittests/sshkey
- [ -f `pwd`/regress/Makefile ] || \
- ln -s `cd . && pwd`/regress/Makefile `pwd`/regress/Makefile
- (cd openbsd-compat && make)
- make[1]: Entering directory '/root/openssh-6.7p1/openbsd-compat'
- make[1]: Nothing to be done for 'all'.
- make[1]: Leaving directory '/root/openssh-6.7p1/openbsd-compat'
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -o regress/modpipe regress/modpipe.c \
- -L. -Lopenbsd-compat/ -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lssh -lopenbsd-compat -lcrypto -ldl -lutil -lz -lnsl -lcrypt -lresolv
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -o regress/setuid-allowed regress/setuid-allowed.c \
- -L. -Lopenbsd-compat/ -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lssh -lopenbsd-compat -lcrypto -ldl -lutil -lz -lnsl -lcrypt -lresolv
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/tests.c -o regress/unittests/sshbuf/tests.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf.c -o regress/unittests/sshbuf/test_sshbuf.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_getput_basic.c -o regress/unittests/sshbuf/test_sshbuf_getput_basic.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_getput_crypto.c -o regress/unittests/sshbuf/test_sshbuf_getput_crypto.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_misc.c -o regress/unittests/sshbuf/test_sshbuf_misc.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_fuzz.c -o regress/unittests/sshbuf/test_sshbuf_fuzz.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c -o regress/unittests/sshbuf/test_sshbuf_getput_fuzz.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshbuf/test_sshbuf_fixed.c -o regress/unittests/sshbuf/test_sshbuf_fixed.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/test_helper/test_helper.c -o regress/unittests/test_helper/test_helper.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/test_helper/fuzz.c -o regress/unittests/test_helper/fuzz.o
- ^H/usr/bin/ar rv regress/unittests/test_helper/libtest_helper.a regress/unittests/test_helper/test_helper.o regress/unittests/test_helper/fuzz.o
- /usr/bin/ar: creating regress/unittests/test_helper/libtest_helper.a
- a - regress/unittests/test_helper/test_helper.o
- a - regress/unittests/test_helper/fuzz.o
- ranlib regress/unittests/test_helper/libtest_helper.a
- gcc -o regress/unittests/sshbuf/test_sshbuf -L. -Lopenbsd-compat/ -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie regress/unittests/sshbuf/tests.o regress/unittests/sshbuf/test_sshbuf.o regress/unittests/sshbuf/test_sshbuf_getput_basic.o regress/unittests/sshbuf/test_sshbuf_getput_crypto.o regress/unittests/sshbuf/test_sshbuf_misc.o regress/unittests/sshbuf/test_sshbuf_fuzz.o regress/unittests/sshbuf/test_sshbuf_getput_fuzz.o regress/unittests/sshbuf/test_sshbuf_fixed.o \
- regress/unittests/test_helper/libtest_helper.a \
- -lssh -lopenbsd-compat -lssh -lopenbsd-compat -lcrypto -ldl -lutil -lz -lnsl -lcrypt -lresolv
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/test_fuzz.c -o regress/unittests/sshkey/test_fuzz.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/tests.c -o regress/unittests/sshkey/tests.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/common.c -o regress/unittests/sshkey/common.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/test_file.c -o regress/unittests/sshkey/test_file.o
- gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-result -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -DSSHDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/local/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/local/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/local/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c regress/unittests/sshkey/test_sshkey.c -o regress/unittests/sshkey/test_sshkey.o
- gcc -o regress/unittests/sshkey/test_sshkey -L. -Lopenbsd-compat/ -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie regress/unittests/sshkey/test_fuzz.o regress/unittests/sshkey/tests.o regress/unittests/sshkey/common.o regress/unittests/sshkey/test_file.o regress/unittests/sshkey/test_sshkey.o \
- regress/unittests/test_helper/libtest_helper.a \
- -lssh -lopenbsd-compat -lssh -lopenbsd-compat -lcrypto -ldl -lutil -lz -lnsl -lcrypt -lresolv
- BUILDDIR=`pwd`; \
- TEST_SSH_SCP="${BUILDDIR}/scp"; \
- TEST_SSH_SSH="${BUILDDIR}/ssh"; \
- TEST_SSH_SSHD="${BUILDDIR}/sshd"; \
- TEST_SSH_SSHAGENT="${BUILDDIR}/ssh-agent"; \
- TEST_SSH_SSHADD="${BUILDDIR}/ssh-add"; \
- TEST_SSH_SSHKEYGEN="${BUILDDIR}/ssh-keygen"; \
- TEST_SSH_SSHPKCS11HELPER="${BUILDDIR}/ssh-pkcs11-helper"; \
- TEST_SSH_SSHKEYSCAN="${BUILDDIR}/ssh-keyscan"; \
- TEST_SSH_SFTP="${BUILDDIR}/sftp"; \
- TEST_SSH_SFTPSERVER="${BUILDDIR}/sftp-server"; \
- TEST_SSH_PLINK="plink"; \
- TEST_SSH_PUTTYGEN="puttygen"; \
- TEST_SSH_CONCH="conch"; \
- TEST_SSH_IPV6="yes" ; \
- TEST_SSH_ECC="yes" ; \
- cd ./regress || exit $?; \
- make \
- .OBJDIR="${BUILDDIR}/regress" \
- .CURDIR="`pwd`" \
- BUILDDIR="${BUILDDIR}" \
- OBJ="${BUILDDIR}/regress/" \
- PATH="${BUILDDIR}:${PATH}" \
- TEST_ENV=MALLOC_OPTIONS="" \
- TEST_SSH_SCP="${TEST_SSH_SCP}" \
- TEST_SSH_SSH="${TEST_SSH_SSH}" \
- TEST_SSH_SSHD="${TEST_SSH_SSHD}" \
- TEST_SSH_SSHAGENT="${TEST_SSH_SSHAGENT}" \
- TEST_SSH_SSHADD="${TEST_SSH_SSHADD}" \
- TEST_SSH_SSHKEYGEN="${TEST_SSH_SSHKEYGEN}" \
- TEST_SSH_SSHPKCS11HELPER="${TEST_SSH_SSHPKCS11HELPER}" \
- TEST_SSH_SSHKEYSCAN="${TEST_SSH_SSHKEYSCAN}" \
- TEST_SSH_SFTP="${TEST_SSH_SFTP}" \
- TEST_SSH_SFTPSERVER="${TEST_SSH_SFTPSERVER}" \
- TEST_SSH_PLINK="${TEST_SSH_PLINK}" \
- TEST_SSH_PUTTYGEN="${TEST_SSH_PUTTYGEN}" \
- TEST_SSH_CONCH="${TEST_SSH_CONCH}" \
- TEST_SSH_IPV6="${TEST_SSH_IPV6}" \
- TEST_SSH_ECC="${TEST_SSH_ECC}" \
- TEST_SHELL="sh" \
- EXEEXT="" \
- tests && echo all tests passed
- make[1]: Entering directory '/root/openssh-6.7p1/regress'
- set -e ; if test -z "" ; then \
- /root/openssh-6.7p1/regress/unittests/sshbuf/test_sshbuf ; \
- /root/openssh-6.7p1/regress/unittests/sshkey/test_sshkey \
- -d /root/openssh-6.7p1/regress//unittests/sshkey/testdata ; \
- fi
- test_sshbuf: ............................................................................................... .... 100 tests ok
- test_sshkey: ......................................................................................... 89 tests ok
- /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/rsa_ssh2.prv | diff - /root/openssh-6.7p1/regress/rsa_openssh.prv
- tr '\n' '\r' </root/openssh-6.7p1/regress/rsa_ssh2.prv > /root/openssh-6.7p1/regress/rsa_ssh2_cr.prv
- /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/rsa_ssh2_cr.prv | diff - /root/openssh-6.7p1/regress/rsa_openssh.prv
- awk '{print $0 "\r"}' /root/openssh-6.7p1/regress/rsa_ssh2.prv > /root/openssh-6.7p1/regress/rsa_ssh2_crnl.prv
- /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/rsa_ssh2_crnl.prv | diff - /root/openssh-6.7p1/regress/rsa_openssh.prv
- cat /root/openssh-6.7p1/regress/rsa_openssh.prv > /root/openssh-6.7p1/regress//t2.out
- chmod 600 /root/openssh-6.7p1/regress//t2.out
- /root/openssh-6.7p1/ssh-keygen -yf /root/openssh-6.7p1/regress//t2.out | diff - /root/openssh-6.7p1/regress/rsa_openssh.pub
- /root/openssh-6.7p1/ssh-keygen -ef /root/openssh-6.7p1/regress/rsa_openssh.pub >/root/openssh-6.7p1/regress//t3.out
- /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress//t3.out | diff - /root/openssh-6.7p1/regress/rsa_openssh.pub
- /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress/rsa_openssh.pub |\
- awk '{print $2}' | diff - /root/openssh-6.7p1/regress/t4.ok
- /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress/rsa_openssh.pub |\
- awk '{print $2}' | diff - /root/openssh-6.7p1/regress/t5.ok
- /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/dsa_ssh2.prv > /root/openssh-6.7p1/regress//t6.out1
- /root/openssh-6.7p1/ssh-keygen -if /root/openssh-6.7p1/regress/dsa_ssh2.pub > /root/openssh-6.7p1/regress//t6.out2
- chmod 600 /root/openssh-6.7p1/regress//t6.out1
- /root/openssh-6.7p1/ssh-keygen -yf /root/openssh-6.7p1/regress//t6.out1 | diff - /root/openssh-6.7p1/regress//t6.out2
- /root/openssh-6.7p1/ssh-keygen -q -t rsa -N '' -f /root/openssh-6.7p1/regress//t7.out
- /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress//t7.out > /dev/null
- /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress//t7.out > /dev/null
- /root/openssh-6.7p1/ssh-keygen -q -t dsa -N '' -f /root/openssh-6.7p1/regress//t8.out
- /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress//t8.out > /dev/null
- /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress//t8.out > /dev/null
- test "yes" != yes || \
- /root/openssh-6.7p1/ssh-keygen -q -t ecdsa -N '' -f /root/openssh-6.7p1/regress//t9.out
- test "yes" != yes || \
- /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress//t9.out > /dev/null
- test "yes" != yes || \
- /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress//t9.out > /dev/null
- /root/openssh-6.7p1/ssh-keygen -q -t ed25519 -N '' -f /root/openssh-6.7p1/regress//t10.out
- /root/openssh-6.7p1/ssh-keygen -lf /root/openssh-6.7p1/regress//t10.out > /dev/null
- /root/openssh-6.7p1/ssh-keygen -Bf /root/openssh-6.7p1/regress//t10.out > /dev/null
- run test connect.sh ...
- ok simple connect
- run test proxy-connect.sh ...
- plain username protocol 1 privsep=no comp=no
- plain username protocol 1 privsep=no comp=yes
- plain username protocol 2 privsep=no comp=no
- plain username protocol 2 privsep=no comp=yes
- plain username protocol 1 privsep=yes comp=no
- plain username protocol 1 privsep=yes comp=yes
- plain username protocol 2 privsep=yes comp=no
- plain username protocol 2 privsep=yes comp=yes
- username with style protocol 1
- username with style protocol 2
- ok proxy connect
- run test connect-privsep.sh ...
- ok proxy connect with privsep
- run test proto-version.sh ...
- ok sshd version with different protocol combinations
- run test proto-mismatch.sh ...
- ok protocol version mismatch
- run test exit-status.sh ...
- test remote exit status: proto 1 status 0
- test remote exit status: proto 1 status 1
- test remote exit status: proto 1 status 4
- test remote exit status: proto 1 status 5
- test remote exit status: proto 1 status 44
- test remote exit status: proto 2 status 0
- test remote exit status: proto 2 status 1
- test remote exit status: proto 2 status 4
- test remote exit status: proto 2 status 5
- test remote exit status: proto 2 status 44
- ok remote exit status
- run test envpass.sh ...
- test environment passing: pass env, don't accept
- test environment passing: don't pass env, accept
- test environment passing: pass single env, accept single env
- test environment passing: pass multiple env, accept multiple env
- ok environment passing
- run test transfer.sh ...
- transfer data: proto 1
- transfer data: proto 2
- ok transfer data
- run test banner.sh ...
- test banner: missing banner file
- test banner: size 0
- test banner: size 10
- test banner: size 100
- test banner: size 1000
- test banner: size 10000
- test banner: size 100000
- test banner: suppress banner (-q)
- ok banner
- run test rekey.sh ...
- client rekey KexAlgorithms=diffie-hellman-group1-sha1
- client rekey KexAlgorithms=diffie-hellman-group14-sha1
- client rekey KexAlgorithms=diffie-hellman-group-exchange-sha1
- client rekey KexAlgorithms=diffie-hellman-group-exchange-sha256
- client rekey KexAlgorithms=ecdh-sha2-nistp256
- client rekey KexAlgorithms=ecdh-sha2-nistp384
- client rekey KexAlgorithms=ecdh-sha2-nistp521
- client rekey KexAlgorithms=diffie-hellman-group1-sha1
- client rekey KexAlgorithms=curve25519-sha256@libssh.org
- client rekey Ciphers=3des-cbc
- client rekey Ciphers=blowfish-cbc
- client rekey Ciphers=cast128-cbc
- client rekey Ciphers=arcfour
- client rekey Ciphers=arcfour128
- client rekey Ciphers=arcfour256
- client rekey Ciphers=aes128-cbc
- client rekey Ciphers=aes192-cbc
- client rekey Ciphers=aes256-cbc
- client rekey Ciphers=rijndael-cbc@lysator.liu.se
- client rekey Ciphers=aes128-ctr
- client rekey Ciphers=aes192-ctr
- client rekey Ciphers=aes256-ctr
- client rekey Ciphers=aes128-gcm@openssh.com
- client rekey Ciphers=aes256-gcm@openssh.com
- client rekey Ciphers=chacha20-poly1305@openssh.com
- client rekey MACs=hmac-sha1
- client rekey MACs=hmac-sha1-96
- client rekey MACs=hmac-sha2-256
- client rekey MACs=hmac-sha2-512
- client rekey MACs=hmac-md5
- client rekey MACs=hmac-md5-96
- client rekey MACs=hmac-ripemd160
- client rekey MACs=hmac-ripemd160@openssh.com
- client rekey MACs=umac-64@openssh.com
- client rekey MACs=umac-128@openssh.com
- client rekey MACs=hmac-sha1-etm@openssh.com
- client rekey MACs=hmac-sha1-96-etm@openssh.com
- client rekey MACs=hmac-sha2-256-etm@openssh.com
- client rekey MACs=hmac-sha2-512-etm@openssh.com
- client rekey MACs=hmac-md5-etm@openssh.com
- client rekey MACs=hmac-md5-96-etm@openssh.com
- client rekey MACs=hmac-ripemd160-etm@openssh.com
- client rekey MACs=umac-64-etm@openssh.com
- client rekey MACs=umac-128-etm@openssh.com
- client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1
- client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha1
- client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha1
- client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha256
- client rekey aes128-gcm@openssh.com ecdh-sha2-nistp256
- client rekey aes128-gcm@openssh.com ecdh-sha2-nistp384
- client rekey aes128-gcm@openssh.com ecdh-sha2-nistp521
- client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1
- client rekey aes128-gcm@openssh.com curve25519-sha256@libssh.org
- client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1
- client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha1
- client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha1
- client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha256
- client rekey aes256-gcm@openssh.com ecdh-sha2-nistp256
- client rekey aes256-gcm@openssh.com ecdh-sha2-nistp384
- client rekey aes256-gcm@openssh.com ecdh-sha2-nistp521
- client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1
- client rekey aes256-gcm@openssh.com curve25519-sha256@libssh.org
- client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1
- client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha1
- client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha1
- client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha256
- client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp256
- client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp384
- client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp521
- client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1
- client rekey chacha20-poly1305@openssh.com curve25519-sha256@libssh.org
- client rekeylimit 16
- client rekeylimit 1k
- client rekeylimit 128k
- client rekeylimit 256k
- client rekeylimit default 5
- client rekeylimit default 10
- client rekeylimit default 5 no data
- client rekeylimit default 10 no data
- server rekeylimit default 5 no data
- server rekeylimit default 10 no data
- rekeylimit parsing
- ok rekey
- run test stderr-data.sh ...
- test stderr data transfer: proto 1 ()
- test stderr data transfer: proto 2 ()
- test stderr data transfer: proto 1 (-n)
- test stderr data transfer: proto 2 (-n)
- ok stderr data transfer
- run test stderr-after-eof.sh ...
- ok stderr data after eof
- run test broken-pipe.sh ...
- ok broken pipe test
- run test try-ciphers.sh ...
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-96
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-256
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-512
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-96
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-ripemd160
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac umac-64@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac umac-128@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher 3des-cbc mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-96
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-256
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-512
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-96
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-ripemd160
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac umac-64@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac umac-128@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher blowfish-cbc mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-96
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-256
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-512
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-96
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-ripemd160
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac umac-64@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac umac-128@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher cast128-cbc mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour mac hmac-sha1
- test try ciphers: proto 2 cipher arcfour mac hmac-sha1-96
- test try ciphers: proto 2 cipher arcfour mac hmac-sha2-256
- test try ciphers: proto 2 cipher arcfour mac hmac-sha2-512
- test try ciphers: proto 2 cipher arcfour mac hmac-md5
- test try ciphers: proto 2 cipher arcfour mac hmac-md5-96
- test try ciphers: proto 2 cipher arcfour mac hmac-ripemd160
- test try ciphers: proto 2 cipher arcfour mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher arcfour mac umac-64@openssh.com
- test try ciphers: proto 2 cipher arcfour mac umac-128@openssh.com
- test try ciphers: proto 2 cipher arcfour mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1
- test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-96
- test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-256
- test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-512
- test try ciphers: proto 2 cipher arcfour128 mac hmac-md5
- test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-96
- test try ciphers: proto 2 cipher arcfour128 mac hmac-ripemd160
- test try ciphers: proto 2 cipher arcfour128 mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac umac-64@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac umac-128@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour128 mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1
- test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-96
- test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-256
- test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-512
- test try ciphers: proto 2 cipher arcfour256 mac hmac-md5
- test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-96
- test try ciphers: proto 2 cipher arcfour256 mac hmac-ripemd160
- test try ciphers: proto 2 cipher arcfour256 mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac umac-64@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac umac-128@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher arcfour256 mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-96
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-256
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-512
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-96
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-ripemd160
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac umac-64@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac umac-128@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-cbc mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-96
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-256
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-512
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-96
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-ripemd160
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac umac-64@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac umac-128@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-cbc mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-96
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-256
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-512
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-96
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-ripemd160
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac umac-64@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac umac-128@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-cbc mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-ripemd160
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-64@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-128@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher rijndael-cbc@lysator.liu.se mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-96
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-256
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-512
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-96
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-ripemd160
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac umac-64@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac umac-128@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-ctr mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-96
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-256
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-512
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-96
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-ripemd160
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac umac-64@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac umac-128@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher aes192-ctr mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-96
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-256
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-512
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-96
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-ripemd160
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-ripemd160@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac umac-64@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac umac-128@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-256-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha2-512-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-96-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac hmac-ripemd160-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac umac-64-etm@openssh.com
- test try ciphers: proto 2 cipher aes256-ctr mac umac-128-etm@openssh.com
- test try ciphers: proto 2 cipher aes128-gcm@openssh.com mac hmac-sha1
- test try ciphers: proto 2 cipher aes256-gcm@openssh.com mac hmac-sha1
- test try ciphers: proto 2 cipher chacha20-poly1305@openssh.com mac hmac-sha1
- test try ciphers: proto 1 cipher 3des
- test try ciphers: proto 1 cipher blowfish
- ok try ciphers
- run test yes-head.sh ...
- ok yes pipe head
- run test login-timeout.sh ...
- ok connect after login grace timeout
- run test agent.sh ...
- ok simple agent test
- run test agent-getpeereid.sh ...
- skipped: need SUDO to switch to uid nobody
- run test agent-timeout.sh ...
- ok agent timeout test
- run test agent-ptrace.sh ...
- skipped (SUDO not set)
- run test keyscan.sh ...
- ok keyscan
- run test keygen-change.sh ...
- ok change passphrase for key
- run test keygen-convert.sh ...
- ok convert keys
- run test key-options.sh ...
- key option proto 1 command="echo bar"
- key option proto 1 no-pty,command="echo bar"
- key option proto 2 command="echo bar"
- key option proto 2 no-pty,command="echo bar"
- key option proto 1 no-pty
- key option proto 2 no-pty
- key option proto 1 environment
- key option proto 2 environment
- key option proto 1 from="127.0.0.1"
- key option proto 1 from="127.0.0.0/8"
- key option proto 2 from="127.0.0.1"
- key option proto 2 from="127.0.0.0/8"
- ok key options
- run test scp.sh ...
- scp: simple copy local file to local file
- scp: simple copy local file to remote file
- scp: simple copy remote file to local file
- scp: simple copy local file to remote dir
- scp: simple copy local file to local dir
- scp: simple copy remote file to local dir
- scp: recursive local dir to remote dir
- scp: recursive local dir to local dir
- scp: recursive remote dir to local dir
- scp: shell metacharacters
- scp: disallow bad server #0
- scp: disallow bad server #1
- scp: disallow bad server #2
- scp: disallow bad server #3
- scp: disallow bad server #4
- scp: detect non-directory target
- /root/openssh-6.7p1/regress/copy2: Not a directory
- ok scp
- run test sftp.sh ...
- test basic sftp put/get: buffer_size 5 num_requests 1
- test basic sftp put/get: buffer_size 5 num_requests 2
- test basic sftp put/get: buffer_size 5 num_requests 10
- test basic sftp put/get: buffer_size 1000 num_requests 1
- test basic sftp put/get: buffer_size 1000 num_requests 2
- test basic sftp put/get: buffer_size 1000 num_requests 10
- test basic sftp put/get: buffer_size 32000 num_requests 1
- test basic sftp put/get: buffer_size 32000 num_requests 2
- test basic sftp put/get: buffer_size 32000 num_requests 10
- test basic sftp put/get: buffer_size 64000 num_requests 1
- test basic sftp put/get: buffer_size 64000 num_requests 2
- test basic sftp put/get: buffer_size 64000 num_requests 10
- ok basic sftp put/get
- run test sftp-chroot.sh ...
- skipped: need SUDO to create file in /var/run, test won't work without
- run test sftp-cmds.sh ...
- sftp commands: lls
- sftp commands: lls w/path
- sftp commands: ls
- sftp commands: shell
- sftp commands: pwd
- sftp commands: lpwd
- sftp commands: quit
- sftp commands: help
- sftp commands: get
- sftp commands: get quoted
- sftp commands: get filename with quotes
- sftp commands: get filename with spaces
- sftp commands: get filename with glob metacharacters
- sftp commands: get to directory
- sftp commands: glob get to directory
- sftp commands: get to local dir
- sftp commands: glob get to local dir
- sftp commands: put
- sftp commands: put filename with quotes
- sftp commands: put filename with spaces
- sftp commands: put to directory
- sftp commands: glob put to directory
- sftp commands: put to local dir
- sftp commands: glob put to local dir
- sftp commands: rename
- sftp commands: rename directory
- sftp commands: ln
- sftp commands: ln -s
- sftp commands: mkdir
- sftp commands: chdir
- sftp commands: rmdir
- sftp commands: lmkdir
- sftp commands: lchdir
- ok sftp commands
- run test sftp-badcmds.sh ...
- sftp invalid commands: get nonexistent
- sftp invalid commands: glob get to nonexistent directory
- sftp invalid commands: put nonexistent
- sftp invalid commands: glob put to nonexistent directory
- sftp invalid commands: rename nonexistent
- sftp invalid commands: rename target exists (directory)
- sftp invalid commands: glob put files to local file
- ok sftp invalid commands
- run test sftp-batch.sh ...
- sftp batchfile: good commands
- sftp batchfile: bad commands
- sftp batchfile: comments and blanks
- sftp batchfile: junk command
- ok sftp batchfile
- run test sftp-glob.sh ...
- sftp glob: file glob
- sftp glob: dir glob
- sftp glob: quoted glob
- sftp glob: escaped glob
- sftp glob: escaped quote
- sftp glob: quoted quote
- sftp glob: single-quoted quote
- sftp glob: escaped space
- sftp glob: quoted space
- sftp glob: escaped slash
- sftp glob: quoted slash
- sftp glob: escaped slash at EOL
- sftp glob: quoted slash at EOL
- sftp glob: escaped slash+quote
- sftp glob: quoted slash+quote
- ok sftp glob
- run test sftp-perm.sh ...
- sftp permissions: read-only upload
- sftp permissions: read-only setstat
- sftp permissions: read-only rm
- sftp permissions: read-only mkdir
- sftp permissions: read-only rmdir
- sftp permissions: read-only posix-rename
- sftp permissions: read-only oldrename
- sftp permissions: read-only symlink
- sftp permissions: read-only hardlink
- sftp permissions: explicit open
- sftp permissions: explicit read
- sftp permissions: explicit write
- sftp permissions: explicit lstat
- sftp permissions: explicit opendir
- sftp permissions: explicit readdir
- sftp permissions: explicit setstat
- sftp permissions: explicit remove
- sftp permissions: explicit mkdir
- sftp permissions: explicit rmdir
- sftp permissions: explicit posix-rename
- sftp permissions: explicit rename
- sftp permissions: explicit symlink
- sftp permissions: explicit hardlink
- sftp permissions: explicit statvfs
- ok sftp permissions
- run test reconfigure.sh ...
- ok simple connect after reconfigure
- run test dynamic-forward.sh ...
- ok dynamic forwarding
- run test forwarding.sh ...
- ok local and remote forwarding
- run test multiplex.sh ...
- test connection multiplexing: envpass
- test connection multiplexing: transfer
- test connection multiplexing: forward
- test connection multiplexing: status 0
- test connection multiplexing: status 1
- test connection multiplexing: status 4
- test connection multiplexing: status 5
- test connection multiplexing: status 44
- test connection multiplexing: cmd check
- test connection multiplexing: cmd forward local (TCP)
- test connection multiplexing: cmd forward remote (TCP)
- test connection multiplexing: cmd forward local (UNIX)
- test connection multiplexing: cmd forward remote (UNIX)
- test connection multiplexing: cmd exit
- test connection multiplexing: cmd stop
- ok connection multiplexing
- run test reexec.sh ...
- test config passing
- reexec tests: proto 1
- reexec tests: proto 2
- test reexec fallback
- reexec tests: proto 1
- reexec tests: proto 2
- test reexec fallback without privsep
- reexec tests: proto 1
- reexec tests: proto 2
- ok reexec tests
- run test brokenkeys.sh ...
- ok broken keys
- run test cfgmatch.sh ...
- ok sshd_config match
- run test addrmatch.sh ...
- test first entry for user 192.168.0.1 somehost
- test negative match for user 192.168.30.1 somehost
- test no match for user 19.0.0.1 somehost
- test list middle for user 10.255.255.254 somehost
- test faked IP in hostname for user 192.168.30.1 192.168.0.1
- test bare IP4 address for user 1.1.1.1 somehost.example.com
- test localaddress for user 19.0.0.1 somehost
- test localport for user 19.0.0.1 somehost
- test bare IP6 address for user ::1 somehost.example.com
- test deny IPv6 for user ::2 somehost.exaple.com
- test IP6 negated for user ::3 somehost
- test IP6 no match for user ::4 somehost
- test IP6 network for user 2000::1 somehost
- test IP6 network for user 2001::1 somehost
- test IP6 localaddress for user ::5 somehost
- test IP6 localport for user ::5 somehost
- ok address match
- run test localcommand.sh ...
- test localcommand: proto 1 localcommand
- test localcommand: proto 2 localcommand
- ok localcommand
- run test forcecommand.sh ...
- ok forced command
- run test portnum.sh ...
- port number parsing: invalid port 0
- port number parsing: invalid port 65536
- port number parsing: invalid port 131073
- port number parsing: invalid port 2000blah
- port number parsing: invalid port blah2000
- port number parsing: valid port 1
- port number parsing: valid port 22
- port number parsing: valid port 2222
- port number parsing: valid port 22222
- port number parsing: valid port 65535
- ok port number parsing
- run test keytype.sh ...
- keygen dsa, 1024 bits: keygen rsa, 2048 bits: keygen rsa, 3072 bits: keygen ed25519, 512 bits: keygen ecdsa, 256 bits: keygen ecdsa, 384 bits: keygen ecdsa, 521 bits: userkey dsa-1024, hostkey dsa-1024: userkey dsa-1024, hostkey dsa-1024: userkey dsa-1024, hostkey dsa-1024: userkey rsa-2048, hostkey rsa-2048: userkey rsa-2048, hostkey rsa-2048: userkey rsa-2048, hostkey rsa-2048: userkey rsa-3072, hostkey rsa-3072: userkey rsa-3072, hostkey rsa-3072: userkey rsa-3072, hostkey rsa-3072: userkey ed25519-512, hostkey ed25519-512: userkey ed25519-512, hostkey ed25519-512: userkey ed25519-512, hostkey ed25519-512: userkey ecdsa-256, hostkey ecdsa-256: userkey ecdsa-256, hostkey ecdsa-256: userkey ecdsa-256, hostkey ecdsa-256: userkey ecdsa-384, hostkey ecdsa-384: userkey ecdsa-384, hostkey ecdsa-384: userkey ecdsa-384, hostkey ecdsa-384: userkey ecdsa-521, hostkey ecdsa-521: userkey ecdsa-521, hostkey ecdsa-521: userkey ecdsa-521, hostkey ecdsa-521: ok login with different key types
- run test kextype.sh ...
- kex diffie-hellman-group1-sha1
- kex diffie-hellman-group14-sha1
- kex diffie-hellman-group-exchange-sha1
- kex diffie-hellman-group-exchange-sha256
- kex ecdh-sha2-nistp256
- kex ecdh-sha2-nistp384
- kex ecdh-sha2-nistp521
- kex diffie-hellman-group1-sha1
- kex curve25519-sha256@libssh.org
- ok login with different key exchange algorithms
- run test cert-hostkey.sh ...
- certified host keys: sign host ed25519 cert
- certified host keys: sign host rsa cert
- certified host keys: sign host rsa_v00 cert
- certified host keys: sign host dsa cert
- certified host keys: sign host dsa_v00 cert
- certified host keys: sign host ecdsa-sha2-nistp256 cert
- certified host keys: sign host ecdsa-sha2-nistp384 cert
- certified host keys: sign host ecdsa-sha2-nistp521 cert
- certified host keys: host ed25519 cert connect privsep yes
- certified host keys: host rsa cert connect privsep yes
- certified host keys: host dsa cert connect privsep yes
- certified host keys: host ecdsa-sha2-nistp256 cert connect privsep yes
- certified host keys: host ecdsa-sha2-nistp384 cert connect privsep yes
- certified host keys: host ecdsa-sha2-nistp521 cert connect privsep yes
- certified host keys: host rsa_v00 cert connect privsep yes
- certified host keys: host dsa_v00 cert connect privsep yes
- certified host keys: host ed25519 cert connect privsep no
- certified host keys: host rsa cert connect privsep no
- certified host keys: host dsa cert connect privsep no
- certified host keys: host ecdsa-sha2-nistp256 cert connect privsep no
- certified host keys: host ecdsa-sha2-nistp384 cert connect privsep no
- certified host keys: host ecdsa-sha2-nistp521 cert connect privsep no
- certified host keys: host rsa_v00 cert connect privsep no
- certified host keys: host dsa_v00 cert connect privsep no
- certified host keys: host ed25519 revoked cert privsep yes
- certified host keys: host rsa revoked cert privsep yes
- certified host keys: host dsa revoked cert privsep yes
- certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep yes
- certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep yes
- certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep yes
- certified host keys: host rsa_v00 revoked cert privsep yes
- certified host keys: host dsa_v00 revoked cert privsep yes
- certified host keys: host ed25519 revoked cert privsep no
- certified host keys: host rsa revoked cert privsep no
- certified host keys: host dsa revoked cert privsep no
- certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep no
- certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep no
- certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep no
- certified host keys: host rsa_v00 revoked cert privsep no
- certified host keys: host dsa_v00 revoked cert privsep no
- certified host keys: host ed25519 revoked cert
- certified host keys: host rsa revoked cert
- certified host keys: host dsa revoked cert
- certified host keys: host ecdsa-sha2-nistp256 revoked cert
- certified host keys: host ecdsa-sha2-nistp384 revoked cert
- certified host keys: host ecdsa-sha2-nistp521 revoked cert
- certified host keys: host rsa_v00 revoked cert
- certified host keys: host dsa_v00 revoked cert
- certified host keys: host cert connect user-certificate rsa expect failure
- certified host keys: host cert connect user-certificate rsa_v00 expect failure
- certified host keys: host cert connect empty principals rsa expect success
- certified host keys: host cert connect empty principals rsa_v00 expect success
- certified host keys: host cert connect wrong principals rsa expect failure
- certified host keys: host cert connect wrong principals rsa_v00 expect failure
- certified host keys: host cert connect cert not yet valid rsa expect failure
- certified host keys: host cert connect cert not yet valid rsa_v00 expect failure
- certified host keys: host cert connect cert expired rsa expect failure
- certified host keys: host cert connect cert expired rsa_v00 expect failure
- certified host keys: host cert connect cert valid interval rsa expect success
- certified host keys: host cert connect cert valid interval rsa_v00 expect success
- certified host keys: host cert connect cert has constraints rsa expect failure
- certified host keys: host cert connect cert has constraints rsa_v00 expect failure
- certified host keys: host rsa v01 cert downgrade to raw key
- certified host keys: host dsa v01 cert downgrade to raw key
- certified host keys: host rsa v00 cert downgrade to raw key
- certified host keys: host dsa v00 cert downgrade to raw key
- certified host keys: host rsa connect wrong cert
- certified host keys: host dsa connect wrong cert
- certified host keys: host rsa connect wrong cert
- certified host keys: host dsa connect wrong cert
- ok certified host keys
- run test cert-userkey.sh ...
- certified user keys: sign user ed25519 cert
- certified user keys: sign user rsa cert
- certified user keys: sign host rsa_v00 cert
- certified user keys: sign user dsa cert
- certified user keys: sign host dsa_v00 cert
- certified user keys: sign user ecdsa-sha2-nistp256 cert
- certified user keys: sign user ecdsa-sha2-nistp384 cert
- certified user keys: sign user ecdsa-sha2-nistp521 cert
- certified user keys: ed25519 privsep yes missing authorized_principals
- certified user keys: ed25519 privsep yes empty authorized_principals
- certified user keys: ed25519 privsep yes wrong authorized_principals
- certified user keys: ed25519 privsep yes correct authorized_principals
- certified user keys: ed25519 privsep yes authorized_principals bad key opt
- certified user keys: ed25519 privsep yes authorized_principals command=false
- certified user keys: ed25519 privsep yes authorized_principals command=true
- certified user keys: ed25519 privsep yes wrong principals key option
- certified user keys: ed25519 privsep yes correct principals key option
- certified user keys: ed25519 privsep no missing authorized_principals
- certified user keys: ed25519 privsep no empty authorized_principals
- certified user keys: ed25519 privsep no wrong authorized_principals
- certified user keys: ed25519 privsep no correct authorized_principals
- certified user keys: ed25519 privsep no authorized_principals bad key opt
- certified user keys: ed25519 privsep no authorized_principals command=false
- certified user keys: ed25519 privsep no authorized_principals command=true
- certified user keys: ed25519 privsep no wrong principals key option
- certified user keys: ed25519 privsep no correct principals key option
- certified user keys: rsa privsep yes missing authorized_principals
- certified user keys: rsa privsep yes empty authorized_principals
- certified user keys: rsa privsep yes wrong authorized_principals
- certified user keys: rsa privsep yes correct authorized_principals
- certified user keys: rsa privsep yes authorized_principals bad key opt
- certified user keys: rsa privsep yes authorized_principals command=false
- certified user keys: rsa privsep yes authorized_principals command=true
- certified user keys: rsa privsep yes wrong principals key option
- certified user keys: rsa privsep yes correct principals key option
- certified user keys: rsa privsep no missing authorized_principals
- certified user keys: rsa privsep no empty authorized_principals
- certified user keys: rsa privsep no wrong authorized_principals
- certified user keys: rsa privsep no correct authorized_principals
- certified user keys: rsa privsep no authorized_principals bad key opt
- certified user keys: rsa privsep no authorized_principals command=false
- certified user keys: rsa privsep no authorized_principals command=true
- certified user keys: rsa privsep no wrong principals key option
- certified user keys: rsa privsep no correct principals key option
- certified user keys: dsa privsep yes missing authorized_principals
- certified user keys: dsa privsep yes empty authorized_principals
- certified user keys: dsa privsep yes wrong authorized_principals
- certified user keys: dsa privsep yes correct authorized_principals
- certified user keys: dsa privsep yes authorized_principals bad key opt
- certified user keys: dsa privsep yes authorized_principals command=false
- certified user keys: dsa privsep yes authorized_principals command=true
- certified user keys: dsa privsep yes wrong principals key option
- certified user keys: dsa privsep yes correct principals key option
- certified user keys: dsa privsep no missing authorized_principals
- certified user keys: dsa privsep no empty authorized_principals
- certified user keys: dsa privsep no wrong authorized_principals
- certified user keys: dsa privsep no correct authorized_principals
- certified user keys: dsa privsep no authorized_principals bad key opt
- certified user keys: dsa privsep no authorized_principals command=false
- certified user keys: dsa privsep no authorized_principals command=true
- certified user keys: dsa privsep no wrong principals key option
- certified user keys: dsa privsep no correct principals key option
- certified user keys: ecdsa-sha2-nistp256 privsep yes missing authorized_principals
- certified user keys: ecdsa-sha2-nistp256 privsep yes empty authorized_principals
- certified user keys: ecdsa-sha2-nistp256 privsep yes wrong authorized_principals
- certified user keys: ecdsa-sha2-nistp256 privsep yes correct authorized_principals
- certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals bad key opt
- certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=false
- certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=true
- certified user keys: ecdsa-sha2-nistp256 privsep yes wrong principals key option
- certified user keys: ecdsa-sha2-nistp256 privsep yes correct principals key option
- certified user keys: ecdsa-sha2-nistp256 privsep no missing authorized_principals
- certified user keys: ecdsa-sha2-nistp256 privsep no empty authorized_principals
- certified user keys: ecdsa-sha2-nistp256 privsep no wrong authorized_principals
- certified user keys: ecdsa-sha2-nistp256 privsep no correct authorized_principals
- certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals bad key opt
- certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals command=false
- certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals command=true
- certified user keys: ecdsa-sha2-nistp256 privsep no wrong principals key option
- certified user keys: ecdsa-sha2-nistp256 privsep no correct principals key option
- certified user keys: ecdsa-sha2-nistp384 privsep yes missing authorized_principals
- certified user keys: ecdsa-sha2-nistp384 privsep yes empty authorized_principals
- certified user keys: ecdsa-sha2-nistp384 privsep yes wrong authorized_principals
- certified user keys: ecdsa-sha2-nistp384 privsep yes correct authorized_principals
- certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals bad key opt
- certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=false
- certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=true
- certified user keys: ecdsa-sha2-nistp384 privsep yes wrong principals key option
- certified user keys: ecdsa-sha2-nistp384 privsep yes correct principals key option
- certified user keys: ecdsa-sha2-nistp384 privsep no missing authorized_principals
- certified user keys: ecdsa-sha2-nistp384 privsep no empty authorized_principals
- certified user keys: ecdsa-sha2-nistp384 privsep no wrong authorized_principals
- certified user keys: ecdsa-sha2-nistp384 privsep no correct authorized_principals
- certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals bad key opt
- certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals command=false
- certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals command=true
- certified user keys: ecdsa-sha2-nistp384 privsep no wrong principals key option
- certified user keys: ecdsa-sha2-nistp384 privsep no correct principals key option
- certified user keys: ecdsa-sha2-nistp521 privsep yes missing authorized_principals
- certified user keys: ecdsa-sha2-nistp521 privsep yes empty authorized_principals
- certified user keys: ecdsa-sha2-nistp521 privsep yes wrong authorized_principals
- certified user keys: ecdsa-sha2-nistp521 privsep yes correct authorized_principals
- certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals bad key opt
- certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=false
- certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=true
- certified user keys: ecdsa-sha2-nistp521 privsep yes wrong principals key option
- certified user keys: ecdsa-sha2-nistp521 privsep yes correct principals key option
- certified user keys: ecdsa-sha2-nistp521 privsep no missing authorized_principals
- certified user keys: ecdsa-sha2-nistp521 privsep no empty authorized_principals
- certified user keys: ecdsa-sha2-nistp521 privsep no wrong authorized_principals
- certified user keys: ecdsa-sha2-nistp521 privsep no correct authorized_principals
- certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals bad key opt
- certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals command=false
- certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals command=true
- certified user keys: ecdsa-sha2-nistp521 privsep no wrong principals key option
- certified user keys: ecdsa-sha2-nistp521 privsep no correct principals key option
- certified user keys: rsa_v00 privsep yes missing authorized_principals
- certified user keys: rsa_v00 privsep yes empty authorized_principals
- certified user keys: rsa_v00 privsep yes wrong authorized_principals
- certified user keys: rsa_v00 privsep yes correct authorized_principals
- certified user keys: rsa_v00 privsep yes authorized_principals bad key opt
- certified user keys: rsa_v00 privsep yes authorized_principals command=false
- certified user keys: rsa_v00 privsep yes authorized_principals command=true
- certified user keys: rsa_v00 privsep yes wrong principals key option
- certified user keys: rsa_v00 privsep yes correct principals key option
- certified user keys: rsa_v00 privsep no missing authorized_principals
- certified user keys: rsa_v00 privsep no empty authorized_principals
- certified user keys: rsa_v00 privsep no wrong authorized_principals
- certified user keys: rsa_v00 privsep no correct authorized_principals
- certified user keys: rsa_v00 privsep no authorized_principals bad key opt
- certified user keys: rsa_v00 privsep no authorized_principals command=false
- certified user keys: rsa_v00 privsep no authorized_principals command=true
- certified user keys: rsa_v00 privsep no wrong principals key option
- certified user keys: rsa_v00 privsep no correct principals key option
- certified user keys: dsa_v00 privsep yes missing authorized_principals
- certified user keys: dsa_v00 privsep yes empty authorized_principals
- certified user keys: dsa_v00 privsep yes wrong authorized_principals
- certified user keys: dsa_v00 privsep yes correct authorized_principals
- certified user keys: dsa_v00 privsep yes authorized_principals bad key opt
- certified user keys: dsa_v00 privsep yes authorized_principals command=false
- certified user keys: dsa_v00 privsep yes authorized_principals command=true
- certified user keys: dsa_v00 privsep yes wrong principals key option
- certified user keys: dsa_v00 privsep yes correct principals key option
- certified user keys: dsa_v00 privsep no missing authorized_principals
- certified user keys: dsa_v00 privsep no empty authorized_principals
- certified user keys: dsa_v00 privsep no wrong authorized_principals
- certified user keys: dsa_v00 privsep no correct authorized_principals
- certified user keys: dsa_v00 privsep no authorized_principals bad key opt
- certified user keys: dsa_v00 privsep no authorized_principals command=false
- certified user keys: dsa_v00 privsep no authorized_principals command=true
- certified user keys: dsa_v00 privsep no wrong principals key option
- certified user keys: dsa_v00 privsep no correct principals key option
- certified user keys: ed25519 privsep yes authorized_keys connect
- certified user keys: ed25519 privsep yes authorized_keys revoked key
- certified user keys: ed25519 privsep yes authorized_keys revoked via KRL
- certified user keys: ed25519 privsep yes authorized_keys empty KRL
- certified user keys: ed25519 privsep no authorized_keys connect
- certified user keys: ed25519 privsep no authorized_keys revoked key
- certified user keys: ed25519 privsep no authorized_keys revoked via KRL
- certified user keys: ed25519 privsep no authorized_keys empty KRL
- certified user keys: ed25519 authorized_keys revoked CA key
- certified user keys: rsa privsep yes authorized_keys connect
- certified user keys: rsa privsep yes authorized_keys revoked key
- certified user keys: rsa privsep yes authorized_keys revoked via KRL
- certified user keys: rsa privsep yes authorized_keys empty KRL
- certified user keys: rsa privsep no authorized_keys connect
- certified user keys: rsa privsep no authorized_keys revoked key
- certified user keys: rsa privsep no authorized_keys revoked via KRL
- certified user keys: rsa privsep no authorized_keys empty KRL
- certified user keys: rsa authorized_keys revoked CA key
- certified user keys: dsa privsep yes authorized_keys connect
- certified user keys: dsa privsep yes authorized_keys revoked key
- certified user keys: dsa privsep yes authorized_keys revoked via KRL
- certified user keys: dsa privsep yes authorized_keys empty KRL
- certified user keys: dsa privsep no authorized_keys connect
- certified user keys: dsa privsep no authorized_keys revoked key
- certified user keys: dsa privsep no authorized_keys revoked via KRL
- certified user keys: dsa privsep no authorized_keys empty KRL
- certified user keys: dsa authorized_keys revoked CA key
- certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys connect
- certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked key
- certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked via KRL
- certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys empty KRL
- certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys connect
- certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked key
- certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked via KRL
- certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys empty KRL
- certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked CA key
- certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys connect
- certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked key
- certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked via KRL
- certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys empty KRL
- certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys connect
- certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked key
- certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked via KRL
- certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys empty KRL
- certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked CA key
- certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys connect
- certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked key
- certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked via KRL
- certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys empty KRL
- certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys connect
- certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked key
- certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked via KRL
- certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys empty KRL
- certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked CA key
- certified user keys: rsa_v00 privsep yes authorized_keys connect
- certified user keys: rsa_v00 privsep yes authorized_keys revoked key
- certified user keys: rsa_v00 privsep yes authorized_keys revoked via KRL
- certified user keys: rsa_v00 privsep yes authorized_keys empty KRL
- certified user keys: rsa_v00 privsep no authorized_keys connect
- certified user keys: rsa_v00 privsep no authorized_keys revoked key
- certified user keys: rsa_v00 privsep no authorized_keys revoked via KRL
- certified user keys: rsa_v00 privsep no authorized_keys empty KRL
- certified user keys: rsa_v00 authorized_keys revoked CA key
- certified user keys: dsa_v00 privsep yes authorized_keys connect
- certified user keys: dsa_v00 privsep yes authorized_keys revoked key
- certified user keys: dsa_v00 privsep yes authorized_keys revoked via KRL
- certified user keys: dsa_v00 privsep yes authorized_keys empty KRL
- certified user keys: dsa_v00 privsep no authorized_keys connect
- certified user keys: dsa_v00 privsep no authorized_keys revoked key
- certified user keys: dsa_v00 privsep no authorized_keys revoked via KRL
- certified user keys: dsa_v00 privsep no authorized_keys empty KRL
- certified user keys: dsa_v00 authorized_keys revoked CA key
- certified user keys: authorized_keys CA does not authenticate
- certified user keys: ensure CA key does not authenticate user
- certified user keys: ed25519 privsep yes TrustedUserCAKeys connect
- certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked key
- certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked via KRL
- certified user keys: ed25519 privsep yes TrustedUserCAKeys empty KRL
- certified user keys: ed25519 privsep no TrustedUserCAKeys connect
- certified user keys: ed25519 privsep no TrustedUserCAKeys revoked key
- certified user keys: ed25519 privsep no TrustedUserCAKeys revoked via KRL
- certified user keys: ed25519 privsep no TrustedUserCAKeys empty KRL
- certified user keys: ed25519 TrustedUserCAKeys revoked CA key
- certified user keys: rsa privsep yes TrustedUserCAKeys connect
- certified user keys: rsa privsep yes TrustedUserCAKeys revoked key
- certified user keys: rsa privsep yes TrustedUserCAKeys revoked via KRL
- certified user keys: rsa privsep yes TrustedUserCAKeys empty KRL
- certified user keys: rsa privsep no TrustedUserCAKeys connect
- certified user keys: rsa privsep no TrustedUserCAKeys revoked key
- certified user keys: rsa privsep no TrustedUserCAKeys revoked via KRL
- certified user keys: rsa privsep no TrustedUserCAKeys empty KRL
- certified user keys: rsa TrustedUserCAKeys revoked CA key
- certified user keys: dsa privsep yes TrustedUserCAKeys connect
- certified user keys: dsa privsep yes TrustedUserCAKeys revoked key
- certified user keys: dsa privsep yes TrustedUserCAKeys revoked via KRL
- certified user keys: dsa privsep yes TrustedUserCAKeys empty KRL
- certified user keys: dsa privsep no TrustedUserCAKeys connect
- certified user keys: dsa privsep no TrustedUserCAKeys revoked key
- certified user keys: dsa privsep no TrustedUserCAKeys revoked via KRL
- certified user keys: dsa privsep no TrustedUserCAKeys empty KRL
- certified user keys: dsa TrustedUserCAKeys revoked CA key
- certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys connect
- certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked key
- certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked via KRL
- certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys empty KRL
- certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys connect
- certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked key
- certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked via KRL
- certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys empty KRL
- certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked CA key
- certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys connect
- certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked key
- certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked via KRL
- certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys empty KRL
- certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys connect
- certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked key
- certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked via KRL
- certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys empty KRL
- certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked CA key
- certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys connect
- certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked key
- certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked via KRL
- certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys empty KRL
- certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys connect
- certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked key
- certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked via KRL
- certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys empty KRL
- certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked CA key
- certified user keys: rsa_v00 privsep yes TrustedUserCAKeys connect
- certified user keys: rsa_v00 privsep yes TrustedUserCAKeys revoked key
- certified user keys: rsa_v00 privsep yes TrustedUserCAKeys revoked via KRL
- certified user keys: rsa_v00 privsep yes TrustedUserCAKeys empty KRL
- certified user keys: rsa_v00 privsep no TrustedUserCAKeys connect
- certified user keys: rsa_v00 privsep no TrustedUserCAKeys revoked key
- certified user keys: rsa_v00 privsep no TrustedUserCAKeys revoked via KRL
- certified user keys: rsa_v00 privsep no TrustedUserCAKeys empty KRL
- certified user keys: rsa_v00 TrustedUserCAKeys revoked CA key
- certified user keys: dsa_v00 privsep yes TrustedUserCAKeys connect
- certified user keys: dsa_v00 privsep yes TrustedUserCAKeys revoked key
- certified user keys: dsa_v00 privsep yes TrustedUserCAKeys revoked via KRL
- certified user keys: dsa_v00 privsep yes TrustedUserCAKeys empty KRL
- certified user keys: dsa_v00 privsep no TrustedUserCAKeys connect
- certified user keys: dsa_v00 privsep no TrustedUserCAKeys revoked key
- certified user keys: dsa_v00 privsep no TrustedUserCAKeys revoked via KRL
- certified user keys: dsa_v00 privsep no TrustedUserCAKeys empty KRL
- certified user keys: dsa_v00 TrustedUserCAKeys revoked CA key
- certified user keys: TrustedUserCAKeys CA does not authenticate
- certified user keys: ensure CA key does not authenticate user
- certified user keys: correct principal auth authorized_keys expect success rsa
- certified user keys: correct principal auth authorized_keys expect success rsa_v00
- certified user keys: correct principal auth TrustedUserCAKeys expect success rsa
- certified user keys: correct principal auth TrustedUserCAKeys expect success rsa_v00
- certified user keys: host-certificate auth authorized_keys expect failure rsa
- certified user keys: host-certificate auth authorized_keys expect failure rsa_v00
- certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa
- certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa_v00
- certified user keys: wrong principals auth authorized_keys expect failure rsa
- certified user keys: wrong principals auth authorized_keys expect failure rsa_v00
- certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa
- certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa_v00
- certified user keys: cert not yet valid auth authorized_keys expect failure rsa
- certified user keys: cert not yet valid auth authorized_keys expect failure rsa_v00
- certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa
- certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa_v00
- certified user keys: cert expired auth authorized_keys expect failure rsa
- certified user keys: cert expired auth authorized_keys expect failure rsa_v00
- certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa
- certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa_v00
- certified user keys: cert valid interval auth authorized_keys expect success rsa
- certified user keys: cert valid interval auth authorized_keys expect success rsa_v00
- certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa
- certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa_v00
- certified user keys: wrong source-address auth authorized_keys expect failure rsa
- certified user keys: wrong source-address auth authorized_keys expect failure rsa_v00
- certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa
- certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa_v00
- certified user keys: force-command auth authorized_keys expect failure rsa
- certified user keys: force-command auth authorized_keys expect failure rsa_v00
- certified user keys: force-command auth TrustedUserCAKeys expect failure rsa
- certified user keys: force-command auth TrustedUserCAKeys expect failure rsa_v00
- certified user keys: empty principals auth authorized_keys expect success rsa
- certified user keys: empty principals auth authorized_keys expect success rsa_v00
- certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa
- certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa_v00
- certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa
- certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa_v00
- certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa
- certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa_v00
- certified user keys: principals key option principals auth authorized_keys expect success rsa
- certified user keys: principals key option principals auth authorized_keys expect success rsa_v00
- certified user keys: principals key option no principals auth authorized_keys expect failure rsa
- certified user keys: principals key option no principals auth authorized_keys expect failure rsa_v00
- certified user keys: user ed25519 connect wrong cert
- certified user keys: user rsa connect wrong cert
- certified user keys: user dsa connect wrong cert
- certified user keys: user ecdsa-sha2-nistp256 connect wrong cert
- certified user keys: user ecdsa-sha2-nistp384 connect wrong cert
- certified user keys: user ecdsa-sha2-nistp521 connect wrong cert
- certified user keys: user rsa_v00 connect wrong cert
- certified user keys: user dsa_v00 connect wrong cert
- ok certified user keys
- run test host-expand.sh ...
- test expand %h and %n: proto 1
- test expand %h and %n: proto 2
- ok expand %h and %n
- run test keys-command.sh ...
- skipped (SUDO not set)
- need SUDO to create file in /var/run, test won't work without
- run test forward-control.sh ...
- check_lfwd done (expecting Y): proto 1, default configuration
- check_rfwd done (expecting Y): proto 1, default configuration
- check_lfwd done (expecting Y): proto 2, default configuration
- check_rfwd done (expecting Y): proto 2, default configuration
- check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=yes
- check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=yes, !PermitOpen
- check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, !PermitOpen
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=yes, !permitopen
- check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, !permitopen
- check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, permitopen
- check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=yes, permitopen
- check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=yes
- check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=yes, !PermitOpen
- check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, !PermitOpen
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=yes, !permitopen
- check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, !permitopen
- check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, permitopen
- check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=yes, permitopen
- check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=local
- check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=local, !PermitOpen
- check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local, !PermitOpen
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=local, !permitopen
- check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local, !permitopen
- check_lfwd done (expecting Y): proto 1, AllowTcpForwarding=local, permitopen
- check_rfwd done (expecting N): proto 1, AllowTcpForwarding=local, permitopen
- check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=local
- check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=local, !PermitOpen
- check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local, !PermitOpen
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=local, !permitopen
- check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local, !permitopen
- check_lfwd done (expecting Y): proto 2, AllowTcpForwarding=local, permitopen
- check_rfwd done (expecting N): proto 2, AllowTcpForwarding=local, permitopen
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote
- check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote, !PermitOpen
- check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote, !PermitOpen
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote, !permitopen
- check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote, !permitopen
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=remote, permitopen
- check_rfwd done (expecting Y): proto 1, AllowTcpForwarding=remote, permitopen
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote
- check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote, !PermitOpen
- check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote, !PermitOpen
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote, !permitopen
- check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote, !permitopen
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=remote, permitopen
- check_rfwd done (expecting Y): proto 2, AllowTcpForwarding=remote, permitopen
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no
- check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no, !PermitOpen
- check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no, !PermitOpen
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no, !permitopen
- check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no, !permitopen
- check_lfwd done (expecting N): proto 1, AllowTcpForwarding=no, permitopen
- check_rfwd done (expecting N): proto 1, AllowTcpForwarding=no, permitopen
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no
- check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no, !PermitOpen
- check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no, !PermitOpen
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no, !permitopen
- check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no, !permitopen
- check_lfwd done (expecting N): proto 2, AllowTcpForwarding=no, permitopen
- check_rfwd done (expecting N): proto 2, AllowTcpForwarding=no, permitopen
- ok sshd control of local and remote forwarding
- run test integrity.sh ...
- test integrity: hmac-sha1 @2900
- test integrity: hmac-sha1 @2901
- test integrity: hmac-sha1 @2902
- test integrity: hmac-sha1 @2903
- test integrity: hmac-sha1 @2904
- test integrity: hmac-sha1 @2905
- test integrity: hmac-sha1 @2906
- test integrity: hmac-sha1 @2907
- test integrity: hmac-sha1 @2908
- test integrity: hmac-sha1 @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-sha1-96 @2900
- test integrity: hmac-sha1-96 @2901
- test integrity: hmac-sha1-96 @2902
- test integrity: hmac-sha1-96 @2903
- test integrity: hmac-sha1-96 @2904
- test integrity: hmac-sha1-96 @2905
- test integrity: hmac-sha1-96 @2906
- test integrity: hmac-sha1-96 @2907
- test integrity: hmac-sha1-96 @2908
- test integrity: hmac-sha1-96 @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-sha2-256 @2900
- test integrity: hmac-sha2-256 @2901
- test integrity: hmac-sha2-256 @2902
- test integrity: hmac-sha2-256 @2903
- test integrity: hmac-sha2-256 @2904
- test integrity: hmac-sha2-256 @2905
- test integrity: hmac-sha2-256 @2906
- test integrity: hmac-sha2-256 @2907
- test integrity: hmac-sha2-256 @2908
- test integrity: hmac-sha2-256 @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-sha2-512 @2900
- test integrity: hmac-sha2-512 @2901
- test integrity: hmac-sha2-512 @2902
- test integrity: hmac-sha2-512 @2903
- test integrity: hmac-sha2-512 @2904
- test integrity: hmac-sha2-512 @2905
- test integrity: hmac-sha2-512 @2906
- test integrity: hmac-sha2-512 @2907
- test integrity: hmac-sha2-512 @2908
- test integrity: hmac-sha2-512 @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-md5 @2900
- test integrity: hmac-md5 @2901
- test integrity: hmac-md5 @2902
- test integrity: hmac-md5 @2903
- test integrity: hmac-md5 @2904
- test integrity: hmac-md5 @2905
- test integrity: hmac-md5 @2906
- test integrity: hmac-md5 @2907
- test integrity: hmac-md5 @2908
- test integrity: hmac-md5 @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-md5-96 @2900
- test integrity: hmac-md5-96 @2901
- test integrity: hmac-md5-96 @2902
- test integrity: hmac-md5-96 @2903
- test integrity: hmac-md5-96 @2904
- test integrity: hmac-md5-96 @2905
- test integrity: hmac-md5-96 @2906
- test integrity: hmac-md5-96 @2907
- test integrity: hmac-md5-96 @2908
- test integrity: hmac-md5-96 @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-ripemd160 @2900
- test integrity: hmac-ripemd160 @2901
- test integrity: hmac-ripemd160 @2902
- test integrity: hmac-ripemd160 @2903
- test integrity: hmac-ripemd160 @2904
- test integrity: hmac-ripemd160 @2905
- test integrity: hmac-ripemd160 @2906
- test integrity: hmac-ripemd160 @2907
- test integrity: hmac-ripemd160 @2908
- test integrity: hmac-ripemd160 @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-ripemd160@openssh.com @2900
- test integrity: hmac-ripemd160@openssh.com @2901
- test integrity: hmac-ripemd160@openssh.com @2902
- test integrity: hmac-ripemd160@openssh.com @2903
- test integrity: hmac-ripemd160@openssh.com @2904
- test integrity: hmac-ripemd160@openssh.com @2905
- test integrity: hmac-ripemd160@openssh.com @2906
- test integrity: hmac-ripemd160@openssh.com @2907
- test integrity: hmac-ripemd160@openssh.com @2908
- test integrity: hmac-ripemd160@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: umac-64@openssh.com @2900
- test integrity: umac-64@openssh.com @2901
- test integrity: umac-64@openssh.com @2902
- test integrity: umac-64@openssh.com @2903
- test integrity: umac-64@openssh.com @2904
- test integrity: umac-64@openssh.com @2905
- test integrity: umac-64@openssh.com @2906
- test integrity: umac-64@openssh.com @2907
- test integrity: umac-64@openssh.com @2908
- test integrity: umac-64@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: umac-128@openssh.com @2900
- test integrity: umac-128@openssh.com @2901
- test integrity: umac-128@openssh.com @2902
- test integrity: umac-128@openssh.com @2903
- test integrity: umac-128@openssh.com @2904
- test integrity: umac-128@openssh.com @2905
- test integrity: umac-128@openssh.com @2906
- test integrity: umac-128@openssh.com @2907
- test integrity: umac-128@openssh.com @2908
- test integrity: umac-128@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-sha1-etm@openssh.com @2900
- test integrity: hmac-sha1-etm@openssh.com @2901
- test integrity: hmac-sha1-etm@openssh.com @2902
- test integrity: hmac-sha1-etm@openssh.com @2903
- test integrity: hmac-sha1-etm@openssh.com @2904
- test integrity: hmac-sha1-etm@openssh.com @2905
- test integrity: hmac-sha1-etm@openssh.com @2906
- test integrity: hmac-sha1-etm@openssh.com @2907
- test integrity: hmac-sha1-etm@openssh.com @2908
- test integrity: hmac-sha1-etm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-sha1-96-etm@openssh.com @2900
- test integrity: hmac-sha1-96-etm@openssh.com @2901
- test integrity: hmac-sha1-96-etm@openssh.com @2902
- test integrity: hmac-sha1-96-etm@openssh.com @2903
- test integrity: hmac-sha1-96-etm@openssh.com @2904
- test integrity: hmac-sha1-96-etm@openssh.com @2905
- test integrity: hmac-sha1-96-etm@openssh.com @2906
- test integrity: hmac-sha1-96-etm@openssh.com @2907
- test integrity: hmac-sha1-96-etm@openssh.com @2908
- test integrity: hmac-sha1-96-etm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-sha2-256-etm@openssh.com @2900
- test integrity: hmac-sha2-256-etm@openssh.com @2901
- test integrity: hmac-sha2-256-etm@openssh.com @2902
- test integrity: hmac-sha2-256-etm@openssh.com @2903
- test integrity: hmac-sha2-256-etm@openssh.com @2904
- test integrity: hmac-sha2-256-etm@openssh.com @2905
- test integrity: hmac-sha2-256-etm@openssh.com @2906
- test integrity: hmac-sha2-256-etm@openssh.com @2907
- test integrity: hmac-sha2-256-etm@openssh.com @2908
- test integrity: hmac-sha2-256-etm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-sha2-512-etm@openssh.com @2900
- test integrity: hmac-sha2-512-etm@openssh.com @2901
- test integrity: hmac-sha2-512-etm@openssh.com @2902
- test integrity: hmac-sha2-512-etm@openssh.com @2903
- test integrity: hmac-sha2-512-etm@openssh.com @2904
- test integrity: hmac-sha2-512-etm@openssh.com @2905
- test integrity: hmac-sha2-512-etm@openssh.com @2906
- test integrity: hmac-sha2-512-etm@openssh.com @2907
- test integrity: hmac-sha2-512-etm@openssh.com @2908
- test integrity: hmac-sha2-512-etm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-md5-etm@openssh.com @2900
- test integrity: hmac-md5-etm@openssh.com @2901
- test integrity: hmac-md5-etm@openssh.com @2902
- test integrity: hmac-md5-etm@openssh.com @2903
- test integrity: hmac-md5-etm@openssh.com @2904
- test integrity: hmac-md5-etm@openssh.com @2905
- test integrity: hmac-md5-etm@openssh.com @2906
- test integrity: hmac-md5-etm@openssh.com @2907
- test integrity: hmac-md5-etm@openssh.com @2908
- test integrity: hmac-md5-etm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-md5-96-etm@openssh.com @2900
- test integrity: hmac-md5-96-etm@openssh.com @2901
- test integrity: hmac-md5-96-etm@openssh.com @2902
- test integrity: hmac-md5-96-etm@openssh.com @2903
- test integrity: hmac-md5-96-etm@openssh.com @2904
- test integrity: hmac-md5-96-etm@openssh.com @2905
- test integrity: hmac-md5-96-etm@openssh.com @2906
- test integrity: hmac-md5-96-etm@openssh.com @2907
- test integrity: hmac-md5-96-etm@openssh.com @2908
- test integrity: hmac-md5-96-etm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: hmac-ripemd160-etm@openssh.com @2900
- test integrity: hmac-ripemd160-etm@openssh.com @2901
- test integrity: hmac-ripemd160-etm@openssh.com @2902
- test integrity: hmac-ripemd160-etm@openssh.com @2903
- test integrity: hmac-ripemd160-etm@openssh.com @2904
- test integrity: hmac-ripemd160-etm@openssh.com @2905
- test integrity: hmac-ripemd160-etm@openssh.com @2906
- test integrity: hmac-ripemd160-etm@openssh.com @2907
- test integrity: hmac-ripemd160-etm@openssh.com @2908
- test integrity: hmac-ripemd160-etm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: umac-64-etm@openssh.com @2900
- test integrity: umac-64-etm@openssh.com @2901
- test integrity: umac-64-etm@openssh.com @2902
- test integrity: umac-64-etm@openssh.com @2903
- test integrity: umac-64-etm@openssh.com @2904
- test integrity: umac-64-etm@openssh.com @2905
- test integrity: umac-64-etm@openssh.com @2906
- test integrity: umac-64-etm@openssh.com @2907
- test integrity: umac-64-etm@openssh.com @2908
- test integrity: umac-64-etm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: umac-128-etm@openssh.com @2900
- test integrity: umac-128-etm@openssh.com @2901
- test integrity: umac-128-etm@openssh.com @2902
- test integrity: umac-128-etm@openssh.com @2903
- test integrity: umac-128-etm@openssh.com @2904
- test integrity: umac-128-etm@openssh.com @2905
- test integrity: umac-128-etm@openssh.com @2906
- test integrity: umac-128-etm@openssh.com @2907
- test integrity: umac-128-etm@openssh.com @2908
- test integrity: umac-128-etm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: aes128-gcm@openssh.com @2900
- test integrity: aes128-gcm@openssh.com @2901
- test integrity: aes128-gcm@openssh.com @2902
- test integrity: aes128-gcm@openssh.com @2903
- test integrity: aes128-gcm@openssh.com @2904
- test integrity: aes128-gcm@openssh.com @2905
- test integrity: aes128-gcm@openssh.com @2906
- test integrity: aes128-gcm@openssh.com @2907
- test integrity: aes128-gcm@openssh.com @2908
- test integrity: aes128-gcm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: aes256-gcm@openssh.com @2900
- test integrity: aes256-gcm@openssh.com @2901
- test integrity: aes256-gcm@openssh.com @2902
- test integrity: aes256-gcm@openssh.com @2903
- test integrity: aes256-gcm@openssh.com @2904
- test integrity: aes256-gcm@openssh.com @2905
- test integrity: aes256-gcm@openssh.com @2906
- test integrity: aes256-gcm@openssh.com @2907
- test integrity: aes256-gcm@openssh.com @2908
- test integrity: aes256-gcm@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- test integrity: chacha20-poly1305@openssh.com @2900
- test integrity: chacha20-poly1305@openssh.com @2901
- test integrity: chacha20-poly1305@openssh.com @2902
- test integrity: chacha20-poly1305@openssh.com @2903
- test integrity: chacha20-poly1305@openssh.com @2904
- test integrity: chacha20-poly1305@openssh.com @2905
- test integrity: chacha20-poly1305@openssh.com @2906
- test integrity: chacha20-poly1305@openssh.com @2907
- test integrity: chacha20-poly1305@openssh.com @2908
- test integrity: chacha20-poly1305@openssh.com @2909
- test integrity: 10 errors: mac 10 padding 0 length 0
- ok integrity
- run test krl.sh ...
- key revocation lists: generating test keys
- key revocation lists: generating KRLs
- key revocation lists: checking revocations for revoked keys
- key revocation lists: checking revocations for unrevoked keys
- key revocation lists: checking revocations for revoked certs
- key revocation lists: checking revocations for unrevoked certs
- key revocation lists: testing KRL update
- key revocation lists: checking revocations for revoked keys
- key revocation lists: checking revocations for unrevoked keys
- key revocation lists: checking revocations for revoked certs
- key revocation lists: checking revocations for unrevoked certs
- ok key revocation lists
- make[1]: Leaving directory '/root/openssh-6.7p1/regress'
- all tests passed
- root@linaro-alip:~/openssh-6.7p1#
- root@linaro-alip:~/openssh-6.7p1#
Add Comment
Please, Sign In to add comment