diff options
Diffstat (limited to 'runtime/poky/qemuarm64/core-image-ptest-openssh/ptest-raw.log')
-rw-r--r-- | runtime/poky/qemuarm64/core-image-ptest-openssh/ptest-raw.log | 1690 |
1 files changed, 1690 insertions, 0 deletions
diff --git a/runtime/poky/qemuarm64/core-image-ptest-openssh/ptest-raw.log b/runtime/poky/qemuarm64/core-image-ptest-openssh/ptest-raw.log new file mode 100644 index 00000000000..b43b6486e27 --- /dev/null +++ b/runtime/poky/qemuarm64/core-image-ptest-openssh/ptest-raw.log @@ -0,0 +1,1690 @@ +START: ptest-runner +2023-11-29T01:51 +BEGIN: /usr/lib/openssh/ptest +test "x" = "x" || mkdir -p /valgrind-out +ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv +tr '\n' '\r' </usr/lib/openssh/ptest/regress/rsa_ssh2.prv > /usr/lib/openssh/ptest/regress/rsa_ssh2_cr.prv +ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_cr.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv +awk '{print $0 "\r"}' /usr/lib/openssh/ptest/regress/rsa_ssh2.prv > /usr/lib/openssh/ptest/regress/rsa_ssh2_crnl.prv +ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_crnl.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv +cat /usr/lib/openssh/ptest/regress/rsa_openssh.prv > /t2.out +chmod 600 /t2.out +ssh-keygen -yf /t2.out | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub +ssh-keygen -ef /usr/lib/openssh/ptest/regress/rsa_openssh.pub >/t3.out +ssh-keygen -if /t3.out | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub +ssh-keygen -E md5 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\ + awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t4.ok +ssh-keygen -Bf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\ + awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t5.ok +ssh-keygen -if /usr/lib/openssh/ptest/regress/dsa_ssh2.prv > /t6.out1 +ssh-keygen -if /usr/lib/openssh/ptest/regress/dsa_ssh2.pub > /t6.out2 +chmod 600 /t6.out1 +ssh-keygen -yf /t6.out1 | diff - /t6.out2 +ssh-keygen -q -t rsa -N '' -f /t7.out +ssh-keygen -lf /t7.out > /dev/null +ssh-keygen -Bf /t7.out > /dev/null +ssh-keygen -q -t dsa -N '' -f /t8.out +ssh-keygen -lf /t8.out > /dev/null +ssh-keygen -Bf /t8.out > /dev/null +! -Q key-plain | grep ecdsa >/dev/null || \ +ssh-keygen -q -t ecdsa -N '' -f /t9.out +/bin/sh: -Q: not found +! -Q key-plain | grep ecdsa >/dev/null || \ +ssh-keygen -lf /t9.out > /dev/null +/bin/sh: -Q: not found +! -Q key-plain | grep ecdsa >/dev/null || \ +ssh-keygen -Bf /t9.out > /dev/null +/bin/sh: -Q: not found +ssh-keygen -q -t ed25519 -N '' -f /t10.out +ssh-keygen -lf /t10.out > /dev/null +ssh-keygen -Bf /t10.out > /dev/null +ssh-keygen -E sha256 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\ + awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t11.ok +ssh-keygen -q -t ed25519 -N '' -C 'test-comment-1234' -f /t12.out +ssh-keygen -lf /t12.out.pub | grep test-comment-1234 >/dev/null +run test connect.sh ... +PASS: simple connect +run test proxy-connect.sh ... +plain username comp=no +plain username comp=yes +username with style +PASS: proxy connect +run test sshfp-connect.sh ... +SKIPPED: TEST_SSH_SSHFP_DOMAIN not set. +run test connect-privsep.sh ... +PASS: proxy connect with privsep +run test connect-uri.sh ... +uri connect: no trailing slash +uri connect: trailing slash +uri connect: with path name +PASS: uri connect +run test proto-version.sh ... +PASS: sshd version with different protocol combinations +run test proto-mismatch.sh ... +PASS: protocol version mismatch +run test exit-status.sh ... +test remote exit status: status 0 +test remote exit status: status 1 +test remote exit status: status 4 +test remote exit status: status 5 +test remote exit status: status 44 +PASS: remote exit status +run test exit-status-signal.sh ... +PASS: exit status on signal +run test envpass.sh ... +test environment passing: pass env, don't accept +test environment passing: setenv, don't accept +test environment passing: don't pass env, accept +test environment passing: pass single env, accept single env +test environment passing: pass multiple env, accept multiple env +test environment passing: setenv, accept +test environment passing: setenv, first match wins +test environment passing: server setenv wins +test environment passing: server setenv wins +PASS: environment passing +run test transfer.sh ... +PASS: transfer data +run test banner.sh ... +test banner: missing banner file +test banner: size 0 +test banner: size 10 +test banner: size 100 +test banner: size 1000 +test banner: size 10000 +test banner: size 100000 +test banner: suppress banner (-q) +PASS: banner +run test rekey.sh ... +client rekey KexAlgorithms=diffie-hellman-group1-sha1 +client rekey KexAlgorithms=diffie-hellman-group14-sha1 +client rekey KexAlgorithms=diffie-hellman-group14-sha256 +client rekey KexAlgorithms=diffie-hellman-group16-sha512 +client rekey KexAlgorithms=diffie-hellman-group18-sha512 +client rekey KexAlgorithms=diffie-hellman-group-exchange-sha1 +client rekey KexAlgorithms=diffie-hellman-group-exchange-sha256 +client rekey KexAlgorithms=ecdh-sha2-nistp256 +client rekey KexAlgorithms=ecdh-sha2-nistp384 +client rekey KexAlgorithms=ecdh-sha2-nistp521 +client rekey KexAlgorithms=curve25519-sha256 +client rekey KexAlgorithms=curve25519-sha256@libssh.org +client rekey KexAlgorithms=sntrup761x25519-sha512@openssh.com +client rekey Ciphers=3des-cbc +client rekey Ciphers=aes128-cbc +client rekey Ciphers=aes192-cbc +client rekey Ciphers=aes256-cbc +client rekey Ciphers=aes128-ctr +client rekey Ciphers=aes192-ctr +client rekey Ciphers=aes256-ctr +client rekey Ciphers=aes128-gcm@openssh.com +client rekey Ciphers=aes256-gcm@openssh.com +client rekey Ciphers=chacha20-poly1305@openssh.com +client rekey MACs=hmac-sha1 +client rekey MACs=hmac-sha1-96 +client rekey MACs=hmac-sha2-256 +client rekey MACs=hmac-sha2-512 +client rekey MACs=hmac-md5 +client rekey MACs=hmac-md5-96 +client rekey MACs=umac-64@openssh.com +client rekey MACs=umac-128@openssh.com +client rekey MACs=hmac-sha1-etm@openssh.com +client rekey MACs=hmac-sha1-96-etm@openssh.com +client rekey MACs=hmac-sha2-256-etm@openssh.com +client rekey MACs=hmac-sha2-512-etm@openssh.com +client rekey MACs=hmac-md5-etm@openssh.com +client rekey MACs=hmac-md5-96-etm@openssh.com +client rekey MACs=umac-64-etm@openssh.com +client rekey MACs=umac-128-etm@openssh.com +client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1 +client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha1 +client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha256 +client rekey aes128-gcm@openssh.com diffie-hellman-group16-sha512 +client rekey aes128-gcm@openssh.com diffie-hellman-group18-sha512 +client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha1 +client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha256 +client rekey aes128-gcm@openssh.com ecdh-sha2-nistp256 +client rekey aes128-gcm@openssh.com ecdh-sha2-nistp384 +client rekey aes128-gcm@openssh.com ecdh-sha2-nistp521 +client rekey aes128-gcm@openssh.com curve25519-sha256 +client rekey aes128-gcm@openssh.com curve25519-sha256@libssh.org +client rekey aes128-gcm@openssh.com sntrup761x25519-sha512@openssh.com +client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1 +client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha1 +client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha256 +client rekey aes256-gcm@openssh.com diffie-hellman-group16-sha512 +client rekey aes256-gcm@openssh.com diffie-hellman-group18-sha512 +client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha1 +client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha256 +client rekey aes256-gcm@openssh.com ecdh-sha2-nistp256 +client rekey aes256-gcm@openssh.com ecdh-sha2-nistp384 +client rekey aes256-gcm@openssh.com ecdh-sha2-nistp521 +client rekey aes256-gcm@openssh.com curve25519-sha256 +client rekey aes256-gcm@openssh.com curve25519-sha256@libssh.org +client rekey aes256-gcm@openssh.com sntrup761x25519-sha512@openssh.com +client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha1 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha256 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group16-sha512 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group18-sha512 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha1 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha256 +client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp256 +client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp384 +client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp521 +client rekey chacha20-poly1305@openssh.com curve25519-sha256 +client rekey chacha20-poly1305@openssh.com curve25519-sha256@libssh.org +client rekey chacha20-poly1305@openssh.com sntrup761x25519-sha512@openssh.com +client rekeylimit 16 +client rekeylimit 1k +client rekeylimit 128k +client rekeylimit 256k +client rekeylimit default 5 +client rekeylimit default 10 +client rekeylimit default 5 no data +client rekeylimit default 10 no data +server rekeylimit 16 +server rekeylimit 1k +server rekeylimit 128k +server rekeylimit 256k +server rekeylimit default 5 no data +server rekeylimit default 10 no data +rekeylimit parsing +PASS: rekey +run test dhgex.sh ... +dhgex bits 3072 diffie-hellman-group-exchange-sha1 3des-cbc +dhgex bits 3072 diffie-hellman-group-exchange-sha256 3des-cbc +dhgex bits 3072 diffie-hellman-group-exchange-sha1 aes128-cbc +dhgex bits 3072 diffie-hellman-group-exchange-sha256 aes128-cbc +dhgex bits 3072 diffie-hellman-group-exchange-sha1 aes128-ctr +dhgex bits 3072 diffie-hellman-group-exchange-sha256 aes128-ctr +dhgex bits 3072 diffie-hellman-group-exchange-sha1 aes128-gcm@openssh.com +dhgex bits 3072 diffie-hellman-group-exchange-sha256 aes128-gcm@openssh.com +dhgex bits 7680 diffie-hellman-group-exchange-sha1 aes192-cbc +dhgex bits 7680 diffie-hellman-group-exchange-sha256 aes192-cbc +dhgex bits 7680 diffie-hellman-group-exchange-sha1 aes192-ctr +dhgex bits 7680 diffie-hellman-group-exchange-sha256 aes192-ctr +dhgex bits 8192 diffie-hellman-group-exchange-sha1 aes256-cbc +dhgex bits 8192 diffie-hellman-group-exchange-sha256 aes256-cbc +dhgex bits 8192 diffie-hellman-group-exchange-sha1 aes256-ctr +dhgex bits 8192 diffie-hellman-group-exchange-sha256 aes256-ctr +dhgex bits 8192 diffie-hellman-group-exchange-sha1 aes256-gcm@openssh.com +dhgex bits 8192 diffie-hellman-group-exchange-sha256 aes256-gcm@openssh.com +dhgex bits 8192 diffie-hellman-group-exchange-sha1 chacha20-poly1305@openssh.com +dhgex bits 8192 diffie-hellman-group-exchange-sha256 chacha20-poly1305@openssh.com +PASS: dhgex +run test stderr-data.sh ... +test stderr data transfer: () +test stderr data transfer: (-n) +PASS: stderr data transfer +run test stderr-after-eof.sh ... +PASS: stderr data after eof +run test broken-pipe.sh ... +PASS: broken pipe test +run test try-ciphers.sh ... +test try ciphers: cipher 3des-cbc mac hmac-sha1 +test try ciphers: cipher 3des-cbc mac hmac-sha1-96 +test try ciphers: cipher 3des-cbc mac hmac-sha2-256 +test try ciphers: cipher 3des-cbc mac hmac-sha2-512 +test try ciphers: cipher 3des-cbc mac hmac-md5 +test try ciphers: cipher 3des-cbc mac hmac-md5-96 +test try ciphers: cipher 3des-cbc mac umac-64@openssh.com +test try ciphers: cipher 3des-cbc mac umac-128@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-sha1-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-md5-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher 3des-cbc mac umac-64-etm@openssh.com +test try ciphers: cipher 3des-cbc mac umac-128-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha1 +test try ciphers: cipher aes128-cbc mac hmac-sha1-96 +test try ciphers: cipher aes128-cbc mac hmac-sha2-256 +test try ciphers: cipher aes128-cbc mac hmac-sha2-512 +test try ciphers: cipher aes128-cbc mac hmac-md5 +test try ciphers: cipher aes128-cbc mac hmac-md5-96 +test try ciphers: cipher aes128-cbc mac umac-64@openssh.com +test try ciphers: cipher aes128-cbc mac umac-128@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes128-cbc mac umac-64-etm@openssh.com +test try ciphers: cipher aes128-cbc mac umac-128-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha1 +test try ciphers: cipher aes192-cbc mac hmac-sha1-96 +test try ciphers: cipher aes192-cbc mac hmac-sha2-256 +test try ciphers: cipher aes192-cbc mac hmac-sha2-512 +test try ciphers: cipher aes192-cbc mac hmac-md5 +test try ciphers: cipher aes192-cbc mac hmac-md5-96 +test try ciphers: cipher aes192-cbc mac umac-64@openssh.com +test try ciphers: cipher aes192-cbc mac umac-128@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes192-cbc mac umac-64-etm@openssh.com +test try ciphers: cipher aes192-cbc mac umac-128-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha1 +test try ciphers: cipher aes256-cbc mac hmac-sha1-96 +test try ciphers: cipher aes256-cbc mac hmac-sha2-256 +test try ciphers: cipher aes256-cbc mac hmac-sha2-512 +test try ciphers: cipher aes256-cbc mac hmac-md5 +test try ciphers: cipher aes256-cbc mac hmac-md5-96 +test try ciphers: cipher aes256-cbc mac umac-64@openssh.com +test try ciphers: cipher aes256-cbc mac umac-128@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes256-cbc mac umac-64-etm@openssh.com +test try ciphers: cipher aes256-cbc mac umac-128-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha1 +test try ciphers: cipher aes128-ctr mac hmac-sha1-96 +test try ciphers: cipher aes128-ctr mac hmac-sha2-256 +test try ciphers: cipher aes128-ctr mac hmac-sha2-512 +test try ciphers: cipher aes128-ctr mac hmac-md5 +test try ciphers: cipher aes128-ctr mac hmac-md5-96 +test try ciphers: cipher aes128-ctr mac umac-64@openssh.com +test try ciphers: cipher aes128-ctr mac umac-128@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes128-ctr mac umac-64-etm@openssh.com +test try ciphers: cipher aes128-ctr mac umac-128-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha1 +test try ciphers: cipher aes192-ctr mac hmac-sha1-96 +test try ciphers: cipher aes192-ctr mac hmac-sha2-256 +test try ciphers: cipher aes192-ctr mac hmac-sha2-512 +test try ciphers: cipher aes192-ctr mac hmac-md5 +test try ciphers: cipher aes192-ctr mac hmac-md5-96 +test try ciphers: cipher aes192-ctr mac umac-64@openssh.com +test try ciphers: cipher aes192-ctr mac umac-128@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes192-ctr mac umac-64-etm@openssh.com +test try ciphers: cipher aes192-ctr mac umac-128-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha1 +test try ciphers: cipher aes256-ctr mac hmac-sha1-96 +test try ciphers: cipher aes256-ctr mac hmac-sha2-256 +test try ciphers: cipher aes256-ctr mac hmac-sha2-512 +test try ciphers: cipher aes256-ctr mac hmac-md5 +test try ciphers: cipher aes256-ctr mac hmac-md5-96 +test try ciphers: cipher aes256-ctr mac umac-64@openssh.com +test try ciphers: cipher aes256-ctr mac umac-128@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes256-ctr mac umac-64-etm@openssh.com +test try ciphers: cipher aes256-ctr mac umac-128-etm@openssh.com +test try ciphers: cipher aes128-gcm@openssh.com mac hmac-sha1 +test try ciphers: cipher aes256-gcm@openssh.com mac hmac-sha1 +test try ciphers: cipher chacha20-poly1305@openssh.com mac hmac-sha1 +PASS: try ciphers +run test yes-head.sh ... +PASS: yes pipe head +run test login-timeout.sh ... +PASS: connect after login grace timeout +run test agent.sh ... +PASS: simple agent test +run test agent-getpeereid.sh ... +SKIPPED: skipped (running as root) +run test agent-timeout.sh ... +PASS: agent timeout test +run test agent-subprocess.sh ... +PASS: agent subprocess +run test keyscan.sh ... +PASS: keyscan +run test keygen-change.sh ... +PASS: change passphrase for key +run test keygen-comment.sh ... +PASS: Comment extraction from private key +run test keygen-convert.sh ... +PASS: convert keys +run test keygen-knownhosts.sh ... +/usr/lib/openssh/ptest/regress/kh.hosts updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old +/usr/lib/openssh/ptest/regress/kh.hosts updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old +/usr/lib/openssh/ptest/regress/kh.hosts updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old +/usr/lib/openssh/ptest/regress/kh.hosts updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old +/usr/lib/openssh/ptest/regress/kh.hashed updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hashed.old +PASS: ssh-keygen known_hosts +run test keygen-moduli.sh ... +PASS: keygen moduli +run test keygen-sshfp.sh ... +PASS: keygen-sshfp +run test key-options.sh ... +key option command="echo bar" +key option no-pty,command="echo bar" +key option pty default +key option pty no-pty +key option pty restrict +key option pty restrict,pty +key option environment +key option from="127.0.0.1" +key option from="127.0.0.0/8" +key option expiry-time default +key option expiry-time invalid +key option expiry-time expired +key option expiry-time valid +PASS: key options +run test scp.sh ... +scp: scp mode: simple copy local file to local file +scp: scp mode: simple copy local file to remote file +scp: scp mode: simple copy remote file to local file +scp: scp mode: copy local file to remote file in place +scp: scp mode: copy remote file to local file in place +scp: scp mode: copy local file to remote file clobber +-rw-r--r-- 1 root root 526448 Nov 29 02:01 /usr/lib/openssh/ptest/regress/copy +-rw-r--r-- 1 root root 526448 Nov 29 02:01 /usr/lib/openssh/ptest/regress/data +scp: scp mode: copy remote file to local file clobber +scp: scp mode: simple copy local file to remote dir +scp: scp mode: simple copy local file to local dir +scp: scp mode: simple copy remote file to local dir +scp: scp mode: recursive local dir to remote dir +scp: scp mode: recursive local dir to local dir +scp: scp mode: recursive remote dir to local dir +scp: scp mode: unmatched glob file local->remote +scp: scp mode: unmatched glob file remote->local +scp: scp mode: unmatched glob dir recursive local->remote +scp: scp mode: unmatched glob dir recursive remote->local +scp: scp mode: shell metacharacters +scp: scp mode: disallow bad server #0 +scp: scp mode: disallow bad server #1 +scp: scp mode: disallow bad server #2 +scp: scp mode: disallow bad server #3 +scp: scp mode: disallow bad server #4 +scp: scp mode: disallow bad server #5 +scp: scp mode: disallow bad server #6 +scp: scp mode: disallow bad server #7 +scp: scp mode: detect non-directory target +/usr/lib/openssh/ptest/regress/copy2: Not a directory +scp: sftp mode: simple copy local file to local file +scp: sftp mode: simple copy local file to remote file +scp: sftp mode: simple copy remote file to local file +scp: sftp mode: copy local file to remote file in place +scp: sftp mode: copy remote file to local file in place +scp: sftp mode: copy local file to remote file clobber +-rw-r--r-- 1 root root 526448 Nov 29 02:01 /usr/lib/openssh/ptest/regress/copy +-rw-r--r-- 1 root root 526448 Nov 29 02:01 /usr/lib/openssh/ptest/regress/data +scp: sftp mode: copy remote file to local file clobber +scp: sftp mode: simple copy local file to remote dir +scp: sftp mode: simple copy local file to local dir +scp: sftp mode: simple copy remote file to local dir +scp: sftp mode: recursive local dir to remote dir +scp: sftp mode: recursive local dir to local dir +scp: sftp mode: recursive remote dir to local dir +scp: sftp mode: unmatched glob file local->remote +scp: sftp mode: unmatched glob file remote->local +scp: sftp mode: unmatched glob dir recursive local->remote +scp: sftp mode: unmatched glob dir recursive remote->local +scp: sftp mode: shell metacharacters +scp: sftp mode: disallow bad server #0 +scp: sftp mode: disallow bad server #1 +scp: sftp mode: disallow bad server #2 +scp: sftp mode: disallow bad server #3 +scp: sftp mode: disallow bad server #4 +scp: sftp mode: disallow bad server #5 +scp: sftp mode: disallow bad server #6 +scp: sftp mode: disallow bad server #7 +scp: sftp mode: detect non-directory target +/usr/lib/openssh/ptest/regress/copy2: Not a directory +PASS: scp +run test scp3.sh ... +scp3: scp mode: simple copy remote file to remote file +scp3: scp mode: simple copy remote file to remote dir +scp3: scp mode: recursive remote dir to remote dir +scp3: scp mode: detect non-directory target +scp3: sftp mode: simple copy remote file to remote file +scp3: sftp mode: simple copy remote file to remote dir +scp3: sftp mode: recursive remote dir to remote dir +scp3: sftp mode: detect non-directory target +scp: /usr/lib/openssh/ptest/regress/copy2: destination is not a directory
+scp: /usr/lib/openssh/ptest/regress/copy2: destination is not a directory
+PASS: scp3 +run test scp-uri.sh ... +scp-uri: scp mode: simple copy local file to remote file +scp-uri: scp mode: simple copy remote file to local file +scp-uri: scp mode: simple copy local file to remote dir +scp-uri: scp mode: simple copy remote file to local dir +scp-uri: scp mode: recursive local dir to remote dir +scp-uri: scp mode: recursive remote dir to local dir +scp-uri: sftp mode: simple copy local file to remote file +scp-uri: sftp mode: simple copy remote file to local file +scp-uri: sftp mode: simple copy local file to remote dir +scp-uri: sftp mode: simple copy remote file to local dir +scp-uri: sftp mode: recursive local dir to remote dir +scp-uri: sftp mode: recursive remote dir to local dir +PASS: scp-uri +run test sftp.sh ... +test basic sftp put/get: buffer_size 5 num_requests 1 +test basic sftp put/get: buffer_size 5 num_requests 2 +test basic sftp put/get: buffer_size 5 num_requests 10 +test basic sftp put/get: buffer_size 1000 num_requests 1 +test basic sftp put/get: buffer_size 1000 num_requests 2 +test basic sftp put/get: buffer_size 1000 num_requests 10 +test basic sftp put/get: buffer_size 32000 num_requests 1 +test basic sftp put/get: buffer_size 32000 num_requests 2 +test basic sftp put/get: buffer_size 32000 num_requests 10 +test basic sftp put/get: buffer_size 64000 num_requests 1 +test basic sftp put/get: buffer_size 64000 num_requests 2 +test basic sftp put/get: buffer_size 64000 num_requests 10 +PASS: basic sftp put/get +run test sftp-chroot.sh ... +test sftp in chroot: get +test sftp in chroot: match +PASS: sftp in chroot +run test sftp-cmds.sh ... +sftp commands: lls +sftp commands: lls w/path +sftp commands: ls +sftp commands: shell +sftp commands: pwd +sftp commands: lpwd +sftp commands: quit +sftp commands: help +sftp commands: get +sftp commands: get quoted +sftp commands: get filename with quotes +sftp commands: get filename with spaces +sftp commands: get filename with glob metacharacters +sftp commands: get to directory +sftp commands: glob get to directory +sftp commands: get to local dir +sftp commands: glob get to local dir +sftp commands: put +sftp commands: put filename with quotes +sftp commands: put filename with spaces +sftp commands: put to directory +sftp commands: glob put to directory +sftp commands: put to local dir +sftp commands: glob put to local dir +sftp commands: rename +sftp commands: rename directory +sftp commands: ln +sftp commands: ln -s +sftp commands: cp +sftp commands: mkdir +sftp commands: chdir +sftp commands: rmdir +sftp commands: lmkdir +sftp commands: lchdir +PASS: sftp commands +run test sftp-badcmds.sh ... +sftp invalid commands: get nonexistent +sftp invalid commands: glob get to nonexistent directory +sftp invalid commands: put nonexistent +sftp invalid commands: glob put to nonexistent directory +sftp invalid commands: rename nonexistent +sftp invalid commands: rename target exists (directory) +sftp invalid commands: glob put files to local file +PASS: sftp invalid commands +run test sftp-batch.sh ... +sftp batchfile: good commands +sftp batchfile: bad commands +sftp batchfile: comments and blanks +sftp batchfile: junk command +PASS: sftp batchfile +run test sftp-glob.sh ... +sftp glob: file glob +sftp glob: dir glob +sftp glob: quoted glob +sftp glob: escaped glob +sftp glob: escaped quote +sftp glob: quoted quote +sftp glob: single-quoted quote +sftp glob: escaped space +sftp glob: quoted space +sftp glob: escaped slash +sftp glob: quoted slash +sftp glob: escaped slash at EOL +sftp glob: quoted slash at EOL +sftp glob: escaped slash+quote +sftp glob: quoted slash+quote +PASS: sftp glob +run test sftp-perm.sh ... +sftp permissions: read-only upload +sftp permissions: read-only setstat +sftp permissions: read-only rm +sftp permissions: read-only mkdir +sftp permissions: read-only rmdir +sftp permissions: read-only posix-rename +sftp permissions: read-only oldrename +sftp permissions: read-only symlink +sftp permissions: read-only hardlink +sftp permissions: explicit open +sftp permissions: explicit read +sftp permissions: explicit write +sftp permissions: explicit lstat +sftp permissions: explicit opendir +sftp permissions: explicit readdir +sftp permissions: explicit setstat +sftp permissions: explicit remove +sftp permissions: explicit mkdir +sftp permissions: explicit rmdir +sftp permissions: explicit rename +sftp permissions: explicit symlink +sftp permissions: explicit hardlink +sftp permissions: explicit statvfs +PASS: sftp permissions +run test sftp-uri.sh ... +sftp-uri: non-interactive fetch to local file +sftp-uri: non-interactive fetch to local dir +sftp-uri: put to remote directory (trailing slash) +sftp-uri: put to remote directory (no slash) +PASS: sftp-uri +run test reconfigure.sh ... +PASS: simple connect after reconfigure +run test dynamic-forward.sh ... +test -D forwarding +test -R forwarding +PermitRemoteOpen=any +PermitRemoteOpen=none +PermitRemoteOpen=explicit +PermitRemoteOpen=disallowed +PASS: dynamic forwarding +run test forwarding.sh ... +PASS: local and remote forwarding +run test multiplex.sh ... +test connection multiplexing: setenv +test connection multiplexing: envpass +test connection multiplexing: transfer +test connection multiplexing: forward +test connection multiplexing: status 0 () +test connection multiplexing: status 0 (-Oproxy) +test connection multiplexing: status 1 () +test connection multiplexing: status 1 (-Oproxy) +test connection multiplexing: status 4 () +test connection multiplexing: status 4 (-Oproxy) +test connection multiplexing: status 5 () +test connection multiplexing: status 5 (-Oproxy) +test connection multiplexing: status 44 () +test connection multiplexing: status 44 (-Oproxy) +test connection multiplexing: cmd check +test connection multiplexing: cmd forward local (TCP) +test connection multiplexing: cmd forward remote (TCP) +test connection multiplexing: cmd forward local (UNIX) +test connection multiplexing: cmd forward remote (UNIX) +test connection multiplexing: cmd exit +test connection multiplexing: cmd stop +PASS: connection multiplexing +run test reexec.sh ... +test config passing +test reexec fallback +PASS: reexec tests +run test brokenkeys.sh ... +PASS: broken keys +run test sshcfgparse.sh ... +reparse minimal config +ssh -W opts +user first match +pubkeyacceptedalgorithms +agentforwarding +command line override +PASS: ssh config parse +run test cfgparse.sh ... +reparse minimal config +reparse regress config +listenaddress order +PASS: sshd config parse +run test cfgmatch.sh ... +PASS: sshd_config match +run test cfgmatchlisten.sh ... +PASS: sshd_config matchlisten +run test percent.sh ... +percent expansions matchexec percent +percent expansions localcommand percent +percent expansions remotecommand percent +percent expansions controlpath percent +percent expansions identityagent percent +percent expansions forwardagent percent +percent expansions localforward percent +percent expansions remoteforward percent +percent expansions revokedhostkeys percent +percent expansions userknownhostsfile percent +percent expansions controlpath dollar +percent expansions identityagent dollar +percent expansions forwardagent dollar +percent expansions localforward dollar +percent expansions remoteforward dollar +percent expansions userknownhostsfile dollar +percent expansions controlpath tilde +percent expansions identityagent tilde +percent expansions forwardagent tilde +PASS: percent expansions +run test addrmatch.sh ... +test first entry for user 192.168.0.1 somehost +test negative match for user 192.168.30.1 somehost +test no match for user 19.0.0.1 somehost +test list middle for user 10.255.255.254 somehost +test faked IP in hostname for user 192.168.30.1 192.168.0.1 +test bare IP4 address for user 1.1.1.1 somehost.example.com +test localaddress for user 19.0.0.1 somehost +test localport for user 19.0.0.1 somehost +test bare IP6 address for user ::1 somehost.example.com +test deny IPv6 for user ::2 somehost.example.com +test IP6 negated for user ::3 somehost +test IP6 no match for user ::4 somehost +test IP6 network for user 2000::1 somehost +test IP6 network for user 2001::1 somehost +test IP6 localaddress for user ::5 somehost +test IP6 localport for user ::5 somehost +test invalid Match address 10.0.1.0/8 +test invalid Match localaddress 10.0.1.0/8 +test invalid Match address 10.0.0.1/24 +test invalid Match localaddress 10.0.0.1/24 +test invalid Match address 2000:aa:bb:01::/56 +test invalid Match localaddress 2000:aa:bb:01::/56 +PASS: address match +run test localcommand.sh ... +test localcommand: proto localcommand +PASS: localcommand +run test forcecommand.sh ... +PASS: forced command +run test portnum.sh ... +port number parsing: invalid port 0 +port number parsing: invalid port 65536 +port number parsing: invalid port 131073 +port number parsing: invalid port 2000blah +port number parsing: invalid port blah2000 +port number parsing: valid port 1 +port number parsing: valid port 22 +port number parsing: valid port 2222 +port number parsing: valid port 22222 +port number parsing: valid port 65535 +PASS: port number parsing +run test keytype.sh ... +keygen ed25519, 512 bits +keygen ed25519-sk, n/a bits +keygen ecdsa, 256 bits +keygen ecdsa, 384 bits +keygen ecdsa, 521 bits +keygen ecdsa-sk, n/a bits +keygen dsa, 1024 bits +keygen rsa, 2048 bits +keygen rsa, 3072 bits +userkey ed25519-512, hostkey ed25519-512 +userkey ed25519-512, hostkey ed25519-512 +userkey ed25519-512, hostkey ed25519-512 +userkey ed25519-sk, hostkey ed25519-sk +userkey ed25519-sk, hostkey ed25519-sk +userkey ed25519-sk, hostkey ed25519-sk +userkey ecdsa-256, hostkey ecdsa-256 +userkey ecdsa-256, hostkey ecdsa-256 +userkey ecdsa-256, hostkey ecdsa-256 +userkey ecdsa-384, hostkey ecdsa-384 +userkey ecdsa-384, hostkey ecdsa-384 +userkey ecdsa-384, hostkey ecdsa-384 +userkey ecdsa-521, hostkey ecdsa-521 +userkey ecdsa-521, hostkey ecdsa-521 +userkey ecdsa-521, hostkey ecdsa-521 +userkey ecdsa-sk, hostkey ecdsa-sk +userkey ecdsa-sk, hostkey ecdsa-sk +userkey ecdsa-sk, hostkey ecdsa-sk +userkey dsa-1024, hostkey dsa-1024 +userkey dsa-1024, hostkey dsa-1024 +userkey dsa-1024, hostkey dsa-1024 +userkey rsa-2048, hostkey rsa-2048 +userkey rsa-2048, hostkey rsa-2048 +userkey rsa-2048, hostkey rsa-2048 +userkey rsa-3072, hostkey rsa-3072 +userkey rsa-3072, hostkey rsa-3072 +userkey rsa-3072, hostkey rsa-3072 +PASS: login with different key types +run test kextype.sh ... +kex diffie-hellman-group1-sha1 +kex diffie-hellman-group14-sha1 +kex diffie-hellman-group14-sha256 +kex diffie-hellman-group16-sha512 +kex diffie-hellman-group18-sha512 +kex diffie-hellman-group-exchange-sha1 +kex diffie-hellman-group-exchange-sha256 +kex ecdh-sha2-nistp256 +kex ecdh-sha2-nistp384 +kex ecdh-sha2-nistp521 +kex curve25519-sha256 +kex curve25519-sha256@libssh.org +kex sntrup761x25519-sha512@openssh.com +PASS: login with different key exchange algorithms +run test cert-hostkey.sh ... +Revoking from /usr/lib/openssh/ptest/regress/host_ca_key.pub +Revoking from /usr/lib/openssh/ptest/regress/host_ca_key2.pub +certified host keys: sign host ed25519 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ed25519.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ed25519-cert.pub +certified host keys: sign host sk-ssh-ed25519@openssh.com cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_sk-ssh-ed25519@openssh.com.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_sk-ssh-ed25519@openssh.com-cert.pub +certified host keys: sign host ecdsa-sha2-nistp256 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp256.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp256-cert.pub +certified host keys: sign host ecdsa-sha2-nistp384 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp384.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp384-cert.pub +certified host keys: sign host ecdsa-sha2-nistp521 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp521.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp521-cert.pub +certified host keys: sign host sk-ecdsa-sha2-nistp256@openssh.com cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_sk-ecdsa-sha2-nistp256@openssh.com.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_sk-ecdsa-sha2-nistp256@openssh.com-cert.pub +certified host keys: sign host dsa cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_dsa.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_dsa-cert.pub +certified host keys: sign host rsa cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-cert.pub +certified host keys: sign host rsa-sha2-256 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-256.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-256-cert.pub +certified host keys: sign host rsa-sha2-512 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-512.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-512-cert.pub +certified host keys: host ed25519 cert connect +certified host keys: ed25519 basic connect expect success yes +certified host keys: ed25519 empty KRL expect success yes +certified host keys: ed25519 KRL w/ plain key revoked expect success no +certified host keys: ed25519 KRL w/ cert revoked expect success no +certified host keys: ed25519 KRL w/ CA revoked expect success no +certified host keys: ed25519 empty plaintext revocation expect success yes +certified host keys: ed25519 plain key plaintext revocation expect success no +certified host keys: ed25519 cert plaintext revocation expect success no +certified host keys: ed25519 CA plaintext revocation expect success no +certified host keys: host sk-ssh-ed25519@openssh.com cert connect +certified host keys: sk-ssh-ed25519@openssh.com basic connect expect success yes +certified host keys: sk-ssh-ed25519@openssh.com empty KRL expect success yes +certified host keys: sk-ssh-ed25519@openssh.com KRL w/ plain key revoked expect success no +certified host keys: sk-ssh-ed25519@openssh.com KRL w/ cert revoked expect success no +certified host keys: sk-ssh-ed25519@openssh.com KRL w/ CA revoked expect success no +certified host keys: sk-ssh-ed25519@openssh.com empty plaintext revocation expect success yes +certified host keys: sk-ssh-ed25519@openssh.com plain key plaintext revocation expect success no +certified host keys: sk-ssh-ed25519@openssh.com cert plaintext revocation expect success no +certified host keys: sk-ssh-ed25519@openssh.com CA plaintext revocation expect success no +certified host keys: host ecdsa-sha2-nistp256 cert connect +certified host keys: ecdsa-sha2-nistp256 basic connect expect success yes +certified host keys: ecdsa-sha2-nistp256 empty KRL expect success yes +certified host keys: ecdsa-sha2-nistp256 KRL w/ plain key revoked expect success no +certified host keys: ecdsa-sha2-nistp256 KRL w/ cert revoked expect success no +certified host keys: ecdsa-sha2-nistp256 KRL w/ CA revoked expect success no +certified host keys: ecdsa-sha2-nistp256 empty plaintext revocation expect success yes +certified host keys: ecdsa-sha2-nistp256 plain key plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp256 cert plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp256 CA plaintext revocation expect success no +certified host keys: host ecdsa-sha2-nistp384 cert connect +certified host keys: ecdsa-sha2-nistp384 basic connect expect success yes +certified host keys: ecdsa-sha2-nistp384 empty KRL expect success yes +certified host keys: ecdsa-sha2-nistp384 KRL w/ plain key revoked expect success no +certified host keys: ecdsa-sha2-nistp384 KRL w/ cert revoked expect success no +certified host keys: ecdsa-sha2-nistp384 KRL w/ CA revoked expect success no +certified host keys: ecdsa-sha2-nistp384 empty plaintext revocation expect success yes +certified host keys: ecdsa-sha2-nistp384 plain key plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp384 cert plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp384 CA plaintext revocation expect success no +certified host keys: host ecdsa-sha2-nistp521 cert connect +certified host keys: ecdsa-sha2-nistp521 basic connect expect success yes +certified host keys: ecdsa-sha2-nistp521 empty KRL expect success yes +certified host keys: ecdsa-sha2-nistp521 KRL w/ plain key revoked expect success no +certified host keys: ecdsa-sha2-nistp521 KRL w/ cert revoked expect success no +certified host keys: ecdsa-sha2-nistp521 KRL w/ CA revoked expect success no +certified host keys: ecdsa-sha2-nistp521 empty plaintext revocation expect success yes +certified host keys: ecdsa-sha2-nistp521 plain key plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp521 cert plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp521 CA plaintext revocation expect success no +certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com cert connect +certified host keys: sk-ecdsa-sha2-nistp256@openssh.com basic connect expect success yes +certified host keys: sk-ecdsa-sha2-nistp256@openssh.com empty KRL expect success yes +certified host keys: sk-ecdsa-sha2-nistp256@openssh.com KRL w/ plain key revoked expect success no +certified host keys: sk-ecdsa-sha2-nistp256@openssh.com KRL w/ cert revoked expect success no +certified host keys: sk-ecdsa-sha2-nistp256@openssh.com KRL w/ CA revoked expect success no +certified host keys: sk-ecdsa-sha2-nistp256@openssh.com empty plaintext revocation expect success yes +certified host keys: sk-ecdsa-sha2-nistp256@openssh.com plain key plaintext revocation expect success no +certified host keys: sk-ecdsa-sha2-nistp256@openssh.com cert plaintext revocation expect success no +certified host keys: sk-ecdsa-sha2-nistp256@openssh.com CA plaintext revocation expect success no +certified host keys: host dsa cert connect +certified host keys: dsa basic connect expect success yes +certified host keys: dsa empty KRL expect success yes +certified host keys: dsa KRL w/ plain key revoked expect success no +certified host keys: dsa KRL w/ cert revoked expect success no +certified host keys: dsa KRL w/ CA revoked expect success no +certified host keys: dsa empty plaintext revocation expect success yes +certified host keys: dsa plain key plaintext revocation expect success no +certified host keys: dsa cert plaintext revocation expect success no +certified host keys: dsa CA plaintext revocation expect success no +certified host keys: host rsa cert connect +certified host keys: rsa basic connect expect success yes +certified host keys: rsa empty KRL expect success yes +certified host keys: rsa KRL w/ plain key revoked expect success no +certified host keys: rsa KRL w/ cert revoked expect success no +certified host keys: rsa KRL w/ CA revoked expect success no +certified host keys: rsa empty plaintext revocation expect success yes +certified host keys: rsa plain key plaintext revocation expect success no +certified host keys: rsa cert plaintext revocation expect success no +certified host keys: rsa CA plaintext revocation expect success no +certified host keys: host rsa-sha2-256 cert connect +certified host keys: rsa-sha2-256 basic connect expect success yes +certified host keys: rsa-sha2-256 empty KRL expect success yes +certified host keys: rsa-sha2-256 KRL w/ plain key revoked expect success no +certified host keys: rsa-sha2-256 KRL w/ cert revoked expect success no +certified host keys: rsa-sha2-256 KRL w/ CA revoked expect success no +certified host keys: rsa-sha2-256 empty plaintext revocation expect success yes +certified host keys: rsa-sha2-256 plain key plaintext revocation expect success no +certified host keys: rsa-sha2-256 cert plaintext revocation expect success no +certified host keys: rsa-sha2-256 CA plaintext revocation expect success no +certified host keys: host rsa-sha2-512 cert connect +certified host keys: rsa-sha2-512 basic connect expect success yes +certified host keys: rsa-sha2-512 empty KRL expect success yes +certified host keys: rsa-sha2-512 KRL w/ plain key revoked expect success no +certified host keys: rsa-sha2-512 KRL w/ cert revoked expect success no +certified host keys: rsa-sha2-512 KRL w/ CA revoked expect success no +certified host keys: rsa-sha2-512 empty plaintext revocation expect success yes +certified host keys: rsa-sha2-512 plain key plaintext revocation expect success no +certified host keys: rsa-sha2-512 cert plaintext revocation expect success no +certified host keys: rsa-sha2-512 CA plaintext revocation expect success no +certified host keys: host ed25519 revoked cert +certified host keys: host sk-ssh-ed25519@openssh.com revoked cert +certified host keys: host ecdsa-sha2-nistp256 revoked cert +certified host keys: host ecdsa-sha2-nistp384 revoked cert +certified host keys: host ecdsa-sha2-nistp521 revoked cert +certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com revoked cert +certified host keys: host dsa revoked cert +certified host keys: host rsa revoked cert +certified host keys: host rsa-sha2-256 revoked cert +certified host keys: host rsa-sha2-512 revoked cert +certified host keys: host ed25519 revoked cert +certified host keys: host sk-ssh-ed25519@openssh.com revoked cert +certified host keys: host ecdsa-sha2-nistp256 revoked cert +certified host keys: host ecdsa-sha2-nistp384 revoked cert +certified host keys: host ecdsa-sha2-nistp521 revoked cert +certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com revoked cert +certified host keys: host dsa revoked cert +certified host keys: host rsa revoked cert +certified host keys: host rsa-sha2-256 revoked cert +certified host keys: host rsa-sha2-512 revoked cert +certified host keys: host ed25519 cert downgrade to raw key +certified host keys: host sk-ssh-ed25519@openssh.com cert downgrade to raw key +certified host keys: host ecdsa-sha2-nistp256 cert downgrade to raw key +certified host keys: host ecdsa-sha2-nistp384 cert downgrade to raw key +certified host keys: host ecdsa-sha2-nistp521 cert downgrade to raw key +certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com cert downgrade to raw key +certified host keys: host dsa cert downgrade to raw key +certified host keys: host rsa cert downgrade to raw key +certified host keys: host rsa-sha2-256 cert downgrade to raw key +certified host keys: host rsa-sha2-512 cert downgrade to raw key +certified host keys: host ed25519 connect wrong cert +certified host keys: host sk-ssh-ed25519@openssh.com connect wrong cert +certified host keys: host ecdsa-sha2-nistp256 connect wrong cert +certified host keys: host ecdsa-sha2-nistp384 connect wrong cert +certified host keys: host ecdsa-sha2-nistp521 connect wrong cert +certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com connect wrong cert +certified host keys: host dsa connect wrong cert +certified host keys: host rsa connect wrong cert +certified host keys: host rsa-sha2-256 connect wrong cert +certified host keys: host rsa-sha2-512 connect wrong cert +PASS: certified host keys +run test cert-userkey.sh ... +certified user keys: sign user ed25519 cert +certified user keys: sign user sk-ssh-ed25519@openssh.com cert +certified user keys: sign user ecdsa-sha2-nistp256 cert +certified user keys: sign user ecdsa-sha2-nistp384 cert +certified user keys: sign user ecdsa-sha2-nistp521 cert +certified user keys: sign user sk-ecdsa-sha2-nistp256@openssh.com cert +certified user keys: sign user dsa cert +certified user keys: sign user rsa cert +certified user keys: sign user rsa-sha2-256 cert +certified user keys: sign user rsa-sha2-512 cert +certified user keys: ed25519 missing authorized_principals +certified user keys: ed25519 empty authorized_principals +certified user keys: ed25519 wrong authorized_principals +certified user keys: ed25519 correct authorized_principals +certified user keys: ed25519 authorized_principals bad key opt +certified user keys: ed25519 authorized_principals command=false +certified user keys: ed25519 authorized_principals command=true +certified user keys: ed25519 wrong principals key option +certified user keys: ed25519 correct principals key option +certified user keys: sk-ssh-ed25519@openssh.com missing authorized_principals +certified user keys: sk-ssh-ed25519@openssh.com empty authorized_principals +certified user keys: sk-ssh-ed25519@openssh.com wrong authorized_principals +certified user keys: sk-ssh-ed25519@openssh.com correct authorized_principals +certified user keys: sk-ssh-ed25519@openssh.com authorized_principals bad key opt +certified user keys: sk-ssh-ed25519@openssh.com authorized_principals command=false +certified user keys: sk-ssh-ed25519@openssh.com authorized_principals command=true +certified user keys: sk-ssh-ed25519@openssh.com wrong principals key option +certified user keys: sk-ssh-ed25519@openssh.com correct principals key option +certified user keys: ecdsa-sha2-nistp256 missing authorized_principals +certified user keys: ecdsa-sha2-nistp256 empty authorized_principals +certified user keys: ecdsa-sha2-nistp256 wrong authorized_principals +certified user keys: ecdsa-sha2-nistp256 correct authorized_principals +certified user keys: ecdsa-sha2-nistp256 authorized_principals bad key opt +certified user keys: ecdsa-sha2-nistp256 authorized_principals command=false +certified user keys: ecdsa-sha2-nistp256 authorized_principals command=true +certified user keys: ecdsa-sha2-nistp256 wrong principals key option +certified user keys: ecdsa-sha2-nistp256 correct principals key option +certified user keys: ecdsa-sha2-nistp384 missing authorized_principals +certified user keys: ecdsa-sha2-nistp384 empty authorized_principals +certified user keys: ecdsa-sha2-nistp384 wrong authorized_principals +certified user keys: ecdsa-sha2-nistp384 correct authorized_principals +certified user keys: ecdsa-sha2-nistp384 authorized_principals bad key opt +certified user keys: ecdsa-sha2-nistp384 authorized_principals command=false +certified user keys: ecdsa-sha2-nistp384 authorized_principals command=true +certified user keys: ecdsa-sha2-nistp384 wrong principals key option +certified user keys: ecdsa-sha2-nistp384 correct principals key option +certified user keys: ecdsa-sha2-nistp521 missing authorized_principals +certified user keys: ecdsa-sha2-nistp521 empty authorized_principals +certified user keys: ecdsa-sha2-nistp521 wrong authorized_principals +certified user keys: ecdsa-sha2-nistp521 correct authorized_principals +certified user keys: ecdsa-sha2-nistp521 authorized_principals bad key opt +certified user keys: ecdsa-sha2-nistp521 authorized_principals command=false +certified user keys: ecdsa-sha2-nistp521 authorized_principals command=true +certified user keys: ecdsa-sha2-nistp521 wrong principals key option +certified user keys: ecdsa-sha2-nistp521 correct principals key option +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com missing authorized_principals +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com empty authorized_principals +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com wrong authorized_principals +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com correct authorized_principals +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_principals bad key opt +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_principals command=false +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_principals command=true +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com wrong principals key option +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com correct principals key option +certified user keys: dsa missing authorized_principals +certified user keys: dsa empty authorized_principals +certified user keys: dsa wrong authorized_principals +certified user keys: dsa correct authorized_principals +certified user keys: dsa authorized_principals bad key opt +certified user keys: dsa authorized_principals command=false +certified user keys: dsa authorized_principals command=true +certified user keys: dsa wrong principals key option +certified user keys: dsa correct principals key option +certified user keys: rsa missing authorized_principals +certified user keys: rsa empty authorized_principals +certified user keys: rsa wrong authorized_principals +certified user keys: rsa correct authorized_principals +certified user keys: rsa authorized_principals bad key opt +certified user keys: rsa authorized_principals command=false +certified user keys: rsa authorized_principals command=true +certified user keys: rsa wrong principals key option +certified user keys: rsa correct principals key option +certified user keys: rsa-sha2-256 missing authorized_principals +certified user keys: rsa-sha2-256 empty authorized_principals +certified user keys: rsa-sha2-256 wrong authorized_principals +certified user keys: rsa-sha2-256 correct authorized_principals +certified user keys: rsa-sha2-256 authorized_principals bad key opt +certified user keys: rsa-sha2-256 authorized_principals command=false +certified user keys: rsa-sha2-256 authorized_principals command=true +certified user keys: rsa-sha2-256 wrong principals key option +certified user keys: rsa-sha2-256 correct principals key option +certified user keys: rsa-sha2-512 missing authorized_principals +certified user keys: rsa-sha2-512 empty authorized_principals +certified user keys: rsa-sha2-512 wrong authorized_principals +certified user keys: rsa-sha2-512 correct authorized_principals +certified user keys: rsa-sha2-512 authorized_principals bad key opt +certified user keys: rsa-sha2-512 authorized_principals command=false +certified user keys: rsa-sha2-512 authorized_principals command=true +certified user keys: rsa-sha2-512 wrong principals key option +certified user keys: rsa-sha2-512 correct principals key option +certified user keys: ed25519 authorized_keys connect +certified user keys: ed25519 authorized_keys revoked key +certified user keys: ed25519 authorized_keys revoked via KRL +certified user keys: ed25519 authorized_keys empty KRL +certified user keys: sk-ssh-ed25519@openssh.com authorized_keys connect +certified user keys: sk-ssh-ed25519@openssh.com authorized_keys revoked key +certified user keys: sk-ssh-ed25519@openssh.com authorized_keys revoked via KRL +certified user keys: sk-ssh-ed25519@openssh.com authorized_keys empty KRL +certified user keys: ecdsa-sha2-nistp256 authorized_keys connect +certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked key +certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked via KRL +certified user keys: ecdsa-sha2-nistp256 authorized_keys empty KRL +certified user keys: ecdsa-sha2-nistp384 authorized_keys connect +certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked key +certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked via KRL +certified user keys: ecdsa-sha2-nistp384 authorized_keys empty KRL +certified user keys: ecdsa-sha2-nistp521 authorized_keys connect +certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked key +certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked via KRL +certified user keys: ecdsa-sha2-nistp521 authorized_keys empty KRL +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_keys connect +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_keys revoked key +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_keys revoked via KRL +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_keys empty KRL +certified user keys: dsa authorized_keys connect +certified user keys: dsa authorized_keys revoked key +certified user keys: dsa authorized_keys revoked via KRL +certified user keys: dsa authorized_keys empty KRL +certified user keys: rsa authorized_keys connect +certified user keys: rsa authorized_keys revoked key +certified user keys: rsa authorized_keys revoked via KRL +certified user keys: rsa authorized_keys empty KRL +certified user keys: rsa-sha2-256 authorized_keys connect +certified user keys: rsa-sha2-256 authorized_keys revoked key +certified user keys: rsa-sha2-256 authorized_keys revoked via KRL +certified user keys: rsa-sha2-256 authorized_keys empty KRL +certified user keys: rsa-sha2-512 authorized_keys connect +certified user keys: rsa-sha2-512 authorized_keys revoked key +certified user keys: rsa-sha2-512 authorized_keys revoked via KRL +certified user keys: rsa-sha2-512 authorized_keys empty KRL +certified user keys: rsa-sha2-512 authorized_keys revoked CA key +certified user keys: authorized_keys CA does not authenticate +certified user keys: ensure CA key does not authenticate user +certified user keys: ed25519 TrustedUserCAKeys connect +certified user keys: ed25519 TrustedUserCAKeys revoked key +certified user keys: ed25519 TrustedUserCAKeys revoked via KRL +certified user keys: ed25519 TrustedUserCAKeys empty KRL +certified user keys: sk-ssh-ed25519@openssh.com TrustedUserCAKeys connect +certified user keys: sk-ssh-ed25519@openssh.com TrustedUserCAKeys revoked key +certified user keys: sk-ssh-ed25519@openssh.com TrustedUserCAKeys revoked via KRL +certified user keys: sk-ssh-ed25519@openssh.com TrustedUserCAKeys empty KRL +certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys connect +certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked key +certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked via KRL +certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys empty KRL +certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys connect +certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked key +certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked via KRL +certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys empty KRL +certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys connect +certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked key +certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked via KRL +certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys empty KRL +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com TrustedUserCAKeys connect +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com TrustedUserCAKeys revoked key +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com TrustedUserCAKeys revoked via KRL +certified user keys: sk-ecdsa-sha2-nistp256@openssh.com TrustedUserCAKeys empty KRL +certified user keys: dsa TrustedUserCAKeys connect +certified user keys: dsa TrustedUserCAKeys revoked key +certified user keys: dsa TrustedUserCAKeys revoked via KRL +certified user keys: dsa TrustedUserCAKeys empty KRL +certified user keys: rsa TrustedUserCAKeys connect +certified user keys: rsa TrustedUserCAKeys revoked key +certified user keys: rsa TrustedUserCAKeys revoked via KRL +certified user keys: rsa TrustedUserCAKeys empty KRL +certified user keys: rsa-sha2-256 TrustedUserCAKeys connect +certified user keys: rsa-sha2-256 TrustedUserCAKeys revoked key +certified user keys: rsa-sha2-256 TrustedUserCAKeys revoked via KRL +certified user keys: rsa-sha2-256 TrustedUserCAKeys empty KRL +certified user keys: rsa-sha2-512 TrustedUserCAKeys connect +certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked key +certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked via KRL +certified user keys: rsa-sha2-512 TrustedUserCAKeys empty KRL +certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked CA key +certified user keys: TrustedUserCAKeys CA does not authenticate +certified user keys: ensure CA key does not authenticate user +certified user keys: correct principal auth authorized_keys expect success rsa +certified user keys: correct principal auth authorized_keys expect success ed25519 +certified user keys: correct principal auth TrustedUserCAKeys expect success rsa +certified user keys: correct principal auth TrustedUserCAKeys expect success ed25519 +certified user keys: host-certificate auth authorized_keys expect failure rsa +certified user keys: host-certificate auth authorized_keys expect failure ed25519 +certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa +certified user keys: host-certificate auth TrustedUserCAKeys expect failure ed25519 +certified user keys: wrong principals auth authorized_keys expect failure rsa +certified user keys: wrong principals auth authorized_keys expect failure ed25519 +certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa +certified user keys: wrong principals auth TrustedUserCAKeys expect failure ed25519 +certified user keys: cert not yet valid auth authorized_keys expect failure rsa +certified user keys: cert not yet valid auth authorized_keys expect failure ed25519 +certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa +certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure ed25519 +certified user keys: cert expired auth authorized_keys expect failure rsa +certified user keys: cert expired auth authorized_keys expect failure ed25519 +certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa +certified user keys: cert expired auth TrustedUserCAKeys expect failure ed25519 +certified user keys: cert valid interval auth authorized_keys expect success rsa +certified user keys: cert valid interval auth authorized_keys expect success ed25519 +certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa +certified user keys: cert valid interval auth TrustedUserCAKeys expect success ed25519 +certified user keys: wrong source-address auth authorized_keys expect failure rsa +certified user keys: wrong source-address auth authorized_keys expect failure ed25519 +certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa +certified user keys: wrong source-address auth TrustedUserCAKeys expect failure ed25519 +certified user keys: force-command auth authorized_keys expect failure rsa +certified user keys: force-command auth authorized_keys expect failure ed25519 +certified user keys: force-command auth TrustedUserCAKeys expect failure rsa +certified user keys: force-command auth TrustedUserCAKeys expect failure ed25519 +certified user keys: empty principals auth authorized_keys expect success rsa +certified user keys: empty principals auth authorized_keys expect success ed25519 +certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa +certified user keys: empty principals auth TrustedUserCAKeys expect failure ed25519 +certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa +certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success ed25519 +certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa +certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure ed25519 +certified user keys: principals key option principals auth authorized_keys expect success rsa +certified user keys: principals key option principals auth authorized_keys expect success ed25519 +certified user keys: principals key option no principals auth authorized_keys expect failure rsa +certified user keys: principals key option no principals auth authorized_keys expect failure ed25519 +certified user keys: force-command match true auth authorized_keys expect success rsa +certified user keys: force-command match true auth authorized_keys expect success ed25519 +certified user keys: force-command match true auth authorized_keys expect failure rsa +certified user keys: force-command match true auth authorized_keys expect failure ed25519 +certified user keys: force-command mismatch 1 auth authorized_keys expect failure rsa +certified user keys: force-command mismatch 1 auth authorized_keys expect failure ed25519 +certified user keys: force-command mismatch 2 auth authorized_keys expect failure rsa +certified user keys: force-command mismatch 2 auth authorized_keys expect failure ed25519 +certified user keys: user ed25519 connect wrong cert +certified user keys: user sk-ssh-ed25519@openssh.com connect wrong cert +certified user keys: user ecdsa-sha2-nistp256 connect wrong cert +certified user keys: user ecdsa-sha2-nistp384 connect wrong cert +certified user keys: user ecdsa-sha2-nistp521 connect wrong cert +certified user keys: user sk-ecdsa-sha2-nistp256@openssh.com connect wrong cert +certified user keys: user dsa connect wrong cert +certified user keys: user rsa connect wrong cert +certified user keys: user rsa-sha2-256 connect wrong cert +certified user keys: user rsa-sha2-512 connect wrong cert +PASS: certified user keys +run test host-expand.sh ... +PASS: expand %h and %n +run test keys-command.sh ... +AuthorizedKeysCommand with arguments +AuthorizedKeysCommand without arguments +PASS: authorized keys from command +run test forward-control.sh ... +check_lfwd done (expecting Y): default configuration +check_rfwd done (expecting Y): default configuration +check_lfwd done (expecting Y): AllowTcpForwarding=yes +check_rfwd done (expecting Y): AllowTcpForwarding=yes +check_lfwd done (expecting N): AllowTcpForwarding=yes, !PermitOpen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, !PermitOpen +check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=yes, !permitopen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, !permitopen +check_lfwd done (expecting Y): AllowTcpForwarding=yes, permitopen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, permitopen +check_lfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=yes, restrict +check_rfwd done (expecting N): AllowTcpForwarding=yes, restrict +check_lfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding +check_rfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding +check_lfwd done (expecting Y): AllowTcpForwarding=local +check_rfwd done (expecting N): AllowTcpForwarding=local +check_lfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen +check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen +check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitOpen +check_rfwd done (expecting N): AllowTcpForwarding=local, PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=local, !permitopen +check_rfwd done (expecting N): AllowTcpForwarding=local, !permitopen +check_lfwd done (expecting Y): AllowTcpForwarding=local, permitopen +check_rfwd done (expecting N): AllowTcpForwarding=local, permitopen +check_lfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=local, restrict +check_rfwd done (expecting N): AllowTcpForwarding=local, restrict +check_lfwd done (expecting Y): AllowTcpForwarding=local, restrict,port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=local, restrict,port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=remote +check_rfwd done (expecting Y): AllowTcpForwarding=remote +check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitOpen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, !PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitOpen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=remote, !permitopen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, !permitopen +check_lfwd done (expecting N): AllowTcpForwarding=remote, permitopen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, permitopen +check_lfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict +check_rfwd done (expecting N): AllowTcpForwarding=remote, restrict +check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict,port-forwarding +check_rfwd done (expecting Y): AllowTcpForwarding=remote, restrict,port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=no +check_rfwd done (expecting N): AllowTcpForwarding=no +check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen +check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=no, PermitOpen +check_rfwd done (expecting N): AllowTcpForwarding=no, PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=no, !permitopen +check_rfwd done (expecting N): AllowTcpForwarding=no, !permitopen +check_lfwd done (expecting N): AllowTcpForwarding=no, permitopen +check_rfwd done (expecting N): AllowTcpForwarding=no, permitopen +check_lfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=no, restrict +check_rfwd done (expecting N): AllowTcpForwarding=no, restrict +check_lfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding +check_lfwd done (expecting Y): AllowTcpForwarding=yes, !PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=yes, !PermitListen +check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen +check_lfwd done (expecting Y): AllowTcpForwarding=local, !PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitListen +check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=local, PermitListen +check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen +check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitListen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitListen +check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitListen +check_lfwd done (expecting N): AllowTcpForwarding=no, PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=no, PermitListen +PASS: sshd control of local and remote forwarding +run test integrity.sh ... +test integrity: hmac-sha1 @2900 +test integrity: hmac-sha1 @2901 +test integrity: hmac-sha1 @2902 +test integrity: hmac-sha1 @2903 +test integrity: hmac-sha1 @2904 +test integrity: hmac-sha1 @2905 +test integrity: hmac-sha1 @2906 +test integrity: hmac-sha1 @2907 +test integrity: hmac-sha1 @2908 +test integrity: hmac-sha1 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha1-96 @2900 +test integrity: hmac-sha1-96 @2901 +test integrity: hmac-sha1-96 @2902 +test integrity: hmac-sha1-96 @2903 +test integrity: hmac-sha1-96 @2904 +test integrity: hmac-sha1-96 @2905 +test integrity: hmac-sha1-96 @2906 +test integrity: hmac-sha1-96 @2907 +test integrity: hmac-sha1-96 @2908 +test integrity: hmac-sha1-96 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha2-256 @2900 +test integrity: hmac-sha2-256 @2901 +test integrity: hmac-sha2-256 @2902 +test integrity: hmac-sha2-256 @2903 +test integrity: hmac-sha2-256 @2904 +test integrity: hmac-sha2-256 @2905 +test integrity: hmac-sha2-256 @2906 +test integrity: hmac-sha2-256 @2907 +test integrity: hmac-sha2-256 @2908 +test integrity: hmac-sha2-256 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha2-512 @2900 +test integrity: hmac-sha2-512 @2901 +test integrity: hmac-sha2-512 @2902 +test integrity: hmac-sha2-512 @2903 +test integrity: hmac-sha2-512 @2904 +test integrity: hmac-sha2-512 @2905 +test integrity: hmac-sha2-512 @2906 +test integrity: hmac-sha2-512 @2907 +test integrity: hmac-sha2-512 @2908 +test integrity: hmac-sha2-512 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-md5 @2900 +test integrity: hmac-md5 @2901 +test integrity: hmac-md5 @2902 +test integrity: hmac-md5 @2903 +test integrity: hmac-md5 @2904 +test integrity: hmac-md5 @2905 +test integrity: hmac-md5 @2906 +test integrity: hmac-md5 @2907 +test integrity: hmac-md5 @2908 +test integrity: hmac-md5 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-md5-96 @2900 +test integrity: hmac-md5-96 @2901 +test integrity: hmac-md5-96 @2902 +test integrity: hmac-md5-96 @2903 +test integrity: hmac-md5-96 @2904 +test integrity: hmac-md5-96 @2905 +test integrity: hmac-md5-96 @2906 +test integrity: hmac-md5-96 @2907 +test integrity: hmac-md5-96 @2908 +test integrity: hmac-md5-96 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: umac-64@openssh.com @2900 +test integrity: umac-64@openssh.com @2901 +test integrity: umac-64@openssh.com @2902 +test integrity: umac-64@openssh.com @2903 +test integrity: umac-64@openssh.com @2904 +test integrity: umac-64@openssh.com @2905 +test integrity: umac-64@openssh.com @2906 +test integrity: umac-64@openssh.com @2907 +test integrity: umac-64@openssh.com @2908 +test integrity: umac-64@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: umac-128@openssh.com @2900 +test integrity: umac-128@openssh.com @2901 +test integrity: umac-128@openssh.com @2902 +test integrity: umac-128@openssh.com @2903 +test integrity: umac-128@openssh.com @2904 +test integrity: umac-128@openssh.com @2905 +test integrity: umac-128@openssh.com @2906 +test integrity: umac-128@openssh.com @2907 +test integrity: umac-128@openssh.com @2908 +test integrity: umac-128@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha1-etm@openssh.com @2900 +test integrity: hmac-sha1-etm@openssh.com @2901 +test integrity: hmac-sha1-etm@openssh.com @2902 +test integrity: hmac-sha1-etm@openssh.com @2903 +test integrity: hmac-sha1-etm@openssh.com @2904 +test integrity: hmac-sha1-etm@openssh.com @2905 +test integrity: hmac-sha1-etm@openssh.com @2906 +test integrity: hmac-sha1-etm@openssh.com @2907 +test integrity: hmac-sha1-etm@openssh.com @2908 +test integrity: hmac-sha1-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha1-96-etm@openssh.com @2900 +test integrity: hmac-sha1-96-etm@openssh.com @2901 +test integrity: hmac-sha1-96-etm@openssh.com @2902 +test integrity: hmac-sha1-96-etm@openssh.com @2903 +test integrity: hmac-sha1-96-etm@openssh.com @2904 +test integrity: hmac-sha1-96-etm@openssh.com @2905 +test integrity: hmac-sha1-96-etm@openssh.com @2906 +test integrity: hmac-sha1-96-etm@openssh.com @2907 +test integrity: hmac-sha1-96-etm@openssh.com @2908 +test integrity: hmac-sha1-96-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha2-256-etm@openssh.com @2900 +test integrity: hmac-sha2-256-etm@openssh.com @2901 +test integrity: hmac-sha2-256-etm@openssh.com @2902 +test integrity: hmac-sha2-256-etm@openssh.com @2903 +test integrity: hmac-sha2-256-etm@openssh.com @2904 +test integrity: hmac-sha2-256-etm@openssh.com @2905 +test integrity: hmac-sha2-256-etm@openssh.com @2906 +test integrity: hmac-sha2-256-etm@openssh.com @2907 +test integrity: hmac-sha2-256-etm@openssh.com @2908 +test integrity: hmac-sha2-256-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha2-512-etm@openssh.com @2900 +test integrity: hmac-sha2-512-etm@openssh.com @2901 +test integrity: hmac-sha2-512-etm@openssh.com @2902 +test integrity: hmac-sha2-512-etm@openssh.com @2903 +test integrity: hmac-sha2-512-etm@openssh.com @2904 +test integrity: hmac-sha2-512-etm@openssh.com @2905 +test integrity: hmac-sha2-512-etm@openssh.com @2906 +test integrity: hmac-sha2-512-etm@openssh.com @2907 +test integrity: hmac-sha2-512-etm@openssh.com @2908 +test integrity: hmac-sha2-512-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-md5-etm@openssh.com @2900 +test integrity: hmac-md5-etm@openssh.com @2901 +test integrity: hmac-md5-etm@openssh.com @2902 +test integrity: hmac-md5-etm@openssh.com @2903 +test integrity: hmac-md5-etm@openssh.com @2904 +test integrity: hmac-md5-etm@openssh.com @2905 +test integrity: hmac-md5-etm@openssh.com @2906 +test integrity: hmac-md5-etm@openssh.com @2907 +test integrity: hmac-md5-etm@openssh.com @2908 +test integrity: hmac-md5-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-md5-96-etm@openssh.com @2900 +test integrity: hmac-md5-96-etm@openssh.com @2901 +test integrity: hmac-md5-96-etm@openssh.com @2902 +test integrity: hmac-md5-96-etm@openssh.com @2903 +test integrity: hmac-md5-96-etm@openssh.com @2904 +test integrity: hmac-md5-96-etm@openssh.com @2905 +test integrity: hmac-md5-96-etm@openssh.com @2906 +test integrity: hmac-md5-96-etm@openssh.com @2907 +test integrity: hmac-md5-96-etm@openssh.com @2908 +test integrity: hmac-md5-96-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: umac-64-etm@openssh.com @2900 +test integrity: umac-64-etm@openssh.com @2901 +test integrity: umac-64-etm@openssh.com @2902 +test integrity: umac-64-etm@openssh.com @2903 +test integrity: umac-64-etm@openssh.com @2904 +test integrity: umac-64-etm@openssh.com @2905 +test integrity: umac-64-etm@openssh.com @2906 +test integrity: umac-64-etm@openssh.com @2907 +test integrity: umac-64-etm@openssh.com @2908 +test integrity: umac-64-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: umac-128-etm@openssh.com @2900 +test integrity: umac-128-etm@openssh.com @2901 +test integrity: umac-128-etm@openssh.com @2902 +test integrity: umac-128-etm@openssh.com @2903 +test integrity: umac-128-etm@openssh.com @2904 +test integrity: umac-128-etm@openssh.com @2905 +test integrity: umac-128-etm@openssh.com @2906 +test integrity: umac-128-etm@openssh.com @2907 +test integrity: umac-128-etm@openssh.com @2908 +test integrity: umac-128-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: aes128-gcm@openssh.com @2900 +test integrity: aes128-gcm@openssh.com @2901 +test integrity: aes128-gcm@openssh.com @2902 +test integrity: aes128-gcm@openssh.com @2903 +test integrity: aes128-gcm@openssh.com @2904 +test integrity: aes128-gcm@openssh.com @2905 +test integrity: aes128-gcm@openssh.com @2906 +test integrity: aes128-gcm@openssh.com @2907 +test integrity: aes128-gcm@openssh.com @2908 +test integrity: aes128-gcm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: aes256-gcm@openssh.com @2900 +test integrity: aes256-gcm@openssh.com @2901 +test integrity: aes256-gcm@openssh.com @2902 +test integrity: aes256-gcm@openssh.com @2903 +test integrity: aes256-gcm@openssh.com @2904 +test integrity: aes256-gcm@openssh.com @2905 +test integrity: aes256-gcm@openssh.com @2906 +test integrity: aes256-gcm@openssh.com @2907 +test integrity: aes256-gcm@openssh.com @2908 +test integrity: aes256-gcm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: chacha20-poly1305@openssh.com @2900 +test integrity: chacha20-poly1305@openssh.com @2901 +test integrity: chacha20-poly1305@openssh.com @2902 +test integrity: chacha20-poly1305@openssh.com @2903 +test integrity: chacha20-poly1305@openssh.com @2904 +test integrity: chacha20-poly1305@openssh.com @2905 +test integrity: chacha20-poly1305@openssh.com @2906 +test integrity: chacha20-poly1305@openssh.com @2907 +test integrity: chacha20-poly1305@openssh.com @2908 +test integrity: chacha20-poly1305@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +PASS: integrity +run test krl.sh ... +key revocation lists: generating test keys +key revocation lists: generating KRLs +key revocation lists: checking revocations for revoked keys +key revocation lists: checking revocations for unrevoked keys +key revocation lists: checking revocations for revoked certs +key revocation lists: checking revocations for unrevoked certs +key revocation lists: testing KRL update +key revocation lists: checking revocations for revoked keys +key revocation lists: checking revocations for unrevoked keys +key revocation lists: checking revocations for revoked certs +key revocation lists: checking revocations for unrevoked certs +PASS: key revocation lists +run test multipubkey.sh ... +PASS: multiple pubkey +run test limit-keytype.sh ... +allow rsa,ed25519 +allow ed25519 +allow cert only +match w/ no match +match w/ matching +PASS: restrict pubkey type +run test hostkey-agent.sh ... +key type ssh-ed25519 +key type sk-ssh-ed25519@openssh.com +key type ecdsa-sha2-nistp256 +key type ecdsa-sha2-nistp384 +key type ecdsa-sha2-nistp521 +key type sk-ecdsa-sha2-nistp256@openssh.com +key type ssh-dss +key type ssh-rsa +cert type ssh-ed25519-cert-v01@openssh.com +cert type sk-ssh-ed25519-cert-v01@openssh.com +cert type ecdsa-sha2-nistp256-cert-v01@openssh.com +cert type ecdsa-sha2-nistp384-cert-v01@openssh.com +cert type ecdsa-sha2-nistp521-cert-v01@openssh.com +cert type sk-ecdsa-sha2-nistp256-cert-v01@openssh.com +cert type ssh-dss-cert-v01@openssh.com +cert type ssh-rsa-cert-v01@openssh.com +cert type rsa-sha2-256-cert-v01@openssh.com +cert type rsa-sha2-512-cert-v01@openssh.com +PASS: hostkey agent +run test hostkey-rotate.sh ... +learn hostkey with StrictHostKeyChecking=no +learn additional hostkeys +learn additional hostkeys, type=ssh-ed25519 +learn additional hostkeys, type=sk-ssh-ed25519@openssh.com +learn additional hostkeys, type=ecdsa-sha2-nistp256 +learn additional hostkeys, type=ecdsa-sha2-nistp384 +learn additional hostkeys, type=ecdsa-sha2-nistp521 +learn additional hostkeys, type=sk-ecdsa-sha2-nistp256@openssh.com +learn additional hostkeys, type=ssh-dss +learn additional hostkeys, type=ssh-rsa +learn changed non-primary hostkey type=ssh-rsa +learn new primary hostkey +rotate primary hostkey +check rotate primary hostkey +PASS: hostkey rotate +run test principals-command.sh ... +authorized principals command: empty authorized_principals +authorized principals command: wrong authorized_principals +authorized principals command: correct authorized_principals +authorized principals command: authorized_principals bad key opt +authorized principals command: authorized_principals command=false +authorized principals command: authorized_principals command=true +authorized principals command: wrong principals key option +authorized principals command: correct principals key option +PASS: authorized principals command +run test cert-file.sh ... +identity cert with no plain public file +CertificateFile with no plain public file +plain keys +untrusted cert +good cert, bad key +single trusted +multiple trusted +PASS: ssh with certificates +run test cfginclude.sh ... +PASS: config include +run test servcfginclude.sh ... +PASS: server config include +run test allow-deny-users.sh ... +PASS: AllowUsers/DenyUsers +run test authinfo.sh ... +ExposeAuthInfo=no +ExposeAuthInfo=yes +PASS: authinfo +run test sshsig.sh ... +sshsig: make certificates +sshsig: check signature for ssh-ed25519 +sshsig: check signature for sk-ssh-ed25519@openssh.com +sshsig: check signature for ecdsa-sha2-nistp256 +sshsig: check signature for ecdsa-sha2-nistp384 +sshsig: check signature for ecdsa-sha2-nistp521 +sshsig: check signature for sk-ecdsa-sha2-nistp256@openssh.com +sshsig: check signature for ssh-dss +sshsig: check signature for ssh-rsa +sshsig: check signature for ssh-ed25519-cert.pub +sshsig: check signature for sk-ssh-ed25519@openssh.com-cert.pub +sshsig: check signature for ecdsa-sha2-nistp256-cert.pub +sshsig: check signature for ecdsa-sha2-nistp384-cert.pub +sshsig: check signature for ecdsa-sha2-nistp521-cert.pub +sshsig: check signature for sk-ecdsa-sha2-nistp256@openssh.com-cert.pub +sshsig: check signature for ssh-dss-cert.pub +sshsig: check signature for ssh-rsa-cert.pub +sshsig: match principals +sshsig: nomatch principals +PASS: sshsig +run test knownhosts.sh ... +PASS: known hosts +run test knownhosts-command.sh ... +simple connection +no keys +bad exit status +keytype ssh-ed25519 +keytype sk-ssh-ed25519@openssh.com +keytype ecdsa-sha2-nistp256 +keytype ecdsa-sha2-nistp384 +keytype ecdsa-sha2-nistp521 +keytype sk-ecdsa-sha2-nistp256@openssh.com +keytype ssh-rsa +PASS: known hosts command +run test agent-restrict.sh ... +generate keys +prepare client config +prepare known_hosts +prepare server configs +authentication w/o agent +start agent +authentication with agent (no restrict) +unrestricted keylist +authentication with agent (basic restrict) +authentication with agent incorrect key (basic restrict) +keylist (basic restrict) +username +username wildcard +username incorrect +agent restriction honours certificate principal +multihop without agent +multihop agent unrestricted +multihop restricted +multihop username +multihop wildcard username +multihop wrong username +multihop cycle no agent +multihop cycle agent unrestricted +multihop cycle restricted deny +multihop cycle restricted allow +PASS: agent restrictions +run test hostbased.sh ... +SKIPPED: TEST_SSH_HOSTBASED_AUTH not set. +run test channel-timeout.sh ... +no timeout +command timeout +command wildcard timeout +command irrelevant timeout +sftp no timeout +sftp timeout +Connection closed
+sftp irrelevant timeout +PASS: channel timeout +run test connection-timeout.sh ... +no timeout +timeout +session inhibits timeout +timeout after session +timeout with listeners +PASS: unused connection timeout +run test match-subsystem.sh ... +PASS: sshd_config match subsystem +set -e ; if test -z "1" ; then \ + V="" ; \ + test "x" = "x" || \ + V=/usr/lib/openssh/ptest/regress/valgrind-unit.sh ; \ + $V /usr/lib/openssh/ptest/regress/unittests/sshbuf/test_sshbuf ; \ + $V /usr/lib/openssh/ptest/regress/unittests/sshkey/test_sshkey \ + -d /usr/lib/openssh/ptest/regress/unittests/sshkey/testdata ; \ + $V /usr/lib/openssh/ptest/regress/unittests/sshsig/test_sshsig \ + -d /usr/lib/openssh/ptest/regress/unittests/sshsig/testdata ; \ + $V /usr/lib/openssh/ptest/regress/unittests/authopt/test_authopt \ + -d /usr/lib/openssh/ptest/regress/unittests/authopt/testdata ; \ + $V /usr/lib/openssh/ptest/regress/unittests/bitmap/test_bitmap ; \ + $V /usr/lib/openssh/ptest/regress/unittests/conversion/test_conversion ; \ + $V /usr/lib/openssh/ptest/regress/unittests/kex/test_kex ; \ + $V /usr/lib/openssh/ptest/regress/unittests/hostkeys/test_hostkeys \ + -d /usr/lib/openssh/ptest/regress/unittests/hostkeys/testdata ; \ + $V /usr/lib/openssh/ptest/regress/unittests/match/test_match ; \ + $V /usr/lib/openssh/ptest/regress/unittests/misc/test_misc ; \ + if test "x" = "xyes" ; then \ + $V /usr/lib/openssh/ptest/regress/unittests/utf8/test_utf8 ; \ + fi \ +fi +SKIP: agent-ptrace +DURATION: 1215 +END: /usr/lib/openssh/ptest +2023-11-29T02:11 +STOP: ptest-runner +TOTAL: 1 FAIL: 0
\ No newline at end of file |