summaryrefslogtreecommitdiffstats
path: root/runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log
diff options
context:
space:
mode:
Diffstat (limited to 'runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log')
-rw-r--r--runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log1664
1 files changed, 0 insertions, 1664 deletions
diff --git a/runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log b/runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log
deleted file mode 100644
index 3e649b83383..00000000000
--- a/runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log
+++ /dev/null
@@ -1,1664 +0,0 @@
-2019-05-13T23:52
-2019-05-13T23:52
-test "x" = "x" || mkdir -p /valgrind-out
-set -e ; if test -z "" ; then \
- V="" ; \
- test "x" = "x" || \
- V=/usr/lib/openssh/ptest/regress/valgrind-unit.sh ; \
- $V /usr/lib/openssh/ptest/regress/unittests/sshbuf/test_sshbuf ; \
- $V /usr/lib/openssh/ptest/regress/unittests/sshkey/test_sshkey \
- -d /usr/lib/openssh/ptest/regress/unittests/sshkey/testdata ; \
- $V /usr/lib/openssh/ptest/regress/unittests/bitmap/test_bitmap ; \
- $V /usr/lib/openssh/ptest/regress/unittests/conversion/test_conversion ; \
- $V /usr/lib/openssh/ptest/regress/unittests/kex/test_kex ; \
- $V /usr/lib/openssh/ptest/regress/unittests/hostkeys/test_hostkeys \
- -d /usr/lib/openssh/ptest/regress/unittests/hostkeys/testdata ; \
- $V /usr/lib/openssh/ptest/regress/unittests/match/test_match ; \
- if test "x" = "xyes" ; then \
- $V /usr/lib/openssh/ptest/regress/unittests/utf8/test_utf8 ; \
- fi \
-fi
-/bin/sh: line 4: /usr/lib/openssh/ptest/regress/unittests/sshbuf/test_sshbuf: No such file or directory
-make: *** [Makefile:224: unit] Error 127
-ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv
-tr '\n' '\r' </usr/lib/openssh/ptest/regress/rsa_ssh2.prv > /usr/lib/openssh/ptest/regress/rsa_ssh2_cr.prv
-ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_cr.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv
-awk '{print $0 "\r"}' /usr/lib/openssh/ptest/regress/rsa_ssh2.prv > /usr/lib/openssh/ptest/regress/rsa_ssh2_crnl.prv
-ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_crnl.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv
-cat /usr/lib/openssh/ptest/regress/rsa_openssh.prv > /t2.out
-chmod 600 /t2.out
-ssh-keygen -yf /t2.out | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub
-ssh-keygen -ef /usr/lib/openssh/ptest/regress/rsa_openssh.pub >/t3.out
-ssh-keygen -if /t3.out | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub
-ssh-keygen -E md5 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\
- awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t4.ok
-ssh-keygen -Bf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\
- awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t5.ok
-ssh-keygen -if /usr/lib/openssh/ptest/regress/dsa_ssh2.prv > /t6.out1
-ssh-keygen -if /usr/lib/openssh/ptest/regress/dsa_ssh2.pub > /t6.out2
-chmod 600 /t6.out1
-ssh-keygen -yf /t6.out1 | diff - /t6.out2
-ssh-keygen -q -t rsa -N '' -f /t7.out
-ssh-keygen -lf /t7.out > /dev/null
-ssh-keygen -Bf /t7.out > /dev/null
-ssh-keygen -q -t dsa -N '' -f /t8.out
-ssh-keygen -lf /t8.out > /dev/null
-ssh-keygen -Bf /t8.out > /dev/null
-test "" != yes || \
-ssh-keygen -q -t ecdsa -N '' -f /t9.out
-test "" != yes || \
-ssh-keygen -lf /t9.out > /dev/null
-test "" != yes || \
-ssh-keygen -Bf /t9.out > /dev/null
-ssh-keygen -q -t ed25519 -N '' -f /t10.out
-ssh-keygen -lf /t10.out > /dev/null
-ssh-keygen -Bf /t10.out > /dev/null
-ssh-keygen -E sha256 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\
- awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t11.ok
-ssh-keygen -q -t ed25519 -N '' -C 'test-comment-1234' -f /t12.out
-ssh-keygen -lf /t12.out.pub | grep test-comment-1234 >/dev/null
-run test connect.sh ...
-PASS: simple connect
-run test proxy-connect.sh ...
-plain username comp=no
-plain username comp=yes
-username with style
-PASS: proxy connect
-run test connect-privsep.sh ...
-PASS: proxy connect with privsep
-run test connect-uri.sh ...
-uri connect: no trailing slash
-uri connect: trailing slash
-uri connect: with path name
-PASS: uri connect
-run test proto-version.sh ...
-PASS: sshd version with different protocol combinations
-run test proto-mismatch.sh ...
-PASS: protocol version mismatch
-run test exit-status.sh ...
-test remote exit status: status 0
-test remote exit status: status 1
-test remote exit status: status 4
-test remote exit status: status 5
-test remote exit status: status 44
-PASS: remote exit status
-run test envpass.sh ...
-test environment passing: pass env, don't accept
-test environment passing: don't pass env, accept
-test environment passing: pass single env, accept single env
-test environment passing: pass multiple env, accept multiple env
-PASS: environment passing
-run test transfer.sh ...
-PASS: transfer data
-run test banner.sh ...
-test banner: missing banner file
-test banner: size 0
-test banner: size 10
-test banner: size 100
-test banner: size 1000
-test banner: size 10000
-test banner: size 100000
-test banner: suppress banner (-q)
-PASS: banner
-run test rekey.sh ...
-client rekey KexAlgorithms=diffie-hellman-group1-sha1
-client rekey KexAlgorithms=diffie-hellman-group14-sha1
-client rekey KexAlgorithms=diffie-hellman-group14-sha256
-client rekey KexAlgorithms=diffie-hellman-group16-sha512
-client rekey KexAlgorithms=diffie-hellman-group18-sha512
-client rekey KexAlgorithms=diffie-hellman-group-exchange-sha1
-client rekey KexAlgorithms=diffie-hellman-group-exchange-sha256
-client rekey KexAlgorithms=ecdh-sha2-nistp256
-client rekey KexAlgorithms=ecdh-sha2-nistp384
-client rekey KexAlgorithms=ecdh-sha2-nistp521
-client rekey KexAlgorithms=curve25519-sha256
-client rekey KexAlgorithms=curve25519-sha256@libssh.org
-client rekey Ciphers=3des-cbc
-client rekey Ciphers=aes128-cbc
-client rekey Ciphers=aes192-cbc
-client rekey Ciphers=aes256-cbc
-client rekey Ciphers=rijndael-cbc@lysator.liu.se
-client rekey Ciphers=aes128-ctr
-client rekey Ciphers=aes192-ctr
-client rekey Ciphers=aes256-ctr
-client rekey Ciphers=aes128-gcm@openssh.com
-client rekey Ciphers=aes256-gcm@openssh.com
-client rekey Ciphers=chacha20-poly1305@openssh.com
-client rekey MACs=hmac-sha1
-client rekey MACs=hmac-sha1-96
-client rekey MACs=hmac-sha2-256
-client rekey MACs=hmac-sha2-512
-client rekey MACs=hmac-md5
-client rekey MACs=hmac-md5-96
-client rekey MACs=umac-64@openssh.com
-client rekey MACs=umac-128@openssh.com
-client rekey MACs=hmac-sha1-etm@openssh.com
-client rekey MACs=hmac-sha1-96-etm@openssh.com
-client rekey MACs=hmac-sha2-256-etm@openssh.com
-client rekey MACs=hmac-sha2-512-etm@openssh.com
-client rekey MACs=hmac-md5-etm@openssh.com
-client rekey MACs=hmac-md5-96-etm@openssh.com
-client rekey MACs=umac-64-etm@openssh.com
-client rekey MACs=umac-128-etm@openssh.com
-client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1
-client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha1
-client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha256
-client rekey aes128-gcm@openssh.com diffie-hellman-group16-sha512
-client rekey aes128-gcm@openssh.com diffie-hellman-group18-sha512
-client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha1
-client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha256
-client rekey aes128-gcm@openssh.com ecdh-sha2-nistp256
-client rekey aes128-gcm@openssh.com ecdh-sha2-nistp384
-client rekey aes128-gcm@openssh.com ecdh-sha2-nistp521
-client rekey aes128-gcm@openssh.com curve25519-sha256
-client rekey aes128-gcm@openssh.com curve25519-sha256@libssh.org
-client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1
-client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha1
-client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha256
-client rekey aes256-gcm@openssh.com diffie-hellman-group16-sha512
-client rekey aes256-gcm@openssh.com diffie-hellman-group18-sha512
-client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha1
-client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha256
-client rekey aes256-gcm@openssh.com ecdh-sha2-nistp256
-client rekey aes256-gcm@openssh.com ecdh-sha2-nistp384
-client rekey aes256-gcm@openssh.com ecdh-sha2-nistp521
-client rekey aes256-gcm@openssh.com curve25519-sha256
-client rekey aes256-gcm@openssh.com curve25519-sha256@libssh.org
-client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1
-client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha1
-client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha256
-client rekey chacha20-poly1305@openssh.com diffie-hellman-group16-sha512
-client rekey chacha20-poly1305@openssh.com diffie-hellman-group18-sha512
-client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha1
-client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha256
-client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp256
-client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp384
-client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp521
-client rekey chacha20-poly1305@openssh.com curve25519-sha256
-client rekey chacha20-poly1305@openssh.com curve25519-sha256@libssh.org
-client rekeylimit 16
-client rekeylimit 1k
-client rekeylimit 128k
-client rekeylimit 256k
-client rekeylimit default 5
-client rekeylimit default 10
-client rekeylimit default 5 no data
-client rekeylimit default 10 no data
-server rekeylimit 16
-server rekeylimit 1k
-server rekeylimit 128k
-server rekeylimit 256k
-server rekeylimit default 5 no data
-server rekeylimit default 10 no data
-rekeylimit parsing
-PASS: rekey
-run test stderr-data.sh ...
-test stderr data transfer: ()
-test stderr data transfer: (-n)
-PASS: stderr data transfer
-run test stderr-after-eof.sh ...
-run test broken-pipe.sh ...
-PASS: stderr data after eof
-PASS: broken pipe test
-run test try-ciphers.sh ...
-test try ciphers: cipher 3des-cbc mac hmac-sha1
-test try ciphers: cipher 3des-cbc mac hmac-sha1-96
-test try ciphers: cipher 3des-cbc mac hmac-sha2-256
-test try ciphers: cipher 3des-cbc mac hmac-sha2-512
-test try ciphers: cipher 3des-cbc mac hmac-md5
-test try ciphers: cipher 3des-cbc mac hmac-md5-96
-test try ciphers: cipher 3des-cbc mac umac-64@openssh.com
-test try ciphers: cipher 3des-cbc mac umac-128@openssh.com
-test try ciphers: cipher 3des-cbc mac hmac-sha1-etm@openssh.com
-test try ciphers: cipher 3des-cbc mac hmac-sha1-96-etm@openssh.com
-test try ciphers: cipher 3des-cbc mac hmac-sha2-256-etm@openssh.com
-test try ciphers: cipher 3des-cbc mac hmac-sha2-512-etm@openssh.com
-test try ciphers: cipher 3des-cbc mac hmac-md5-etm@openssh.com
-test try ciphers: cipher 3des-cbc mac hmac-md5-96-etm@openssh.com
-test try ciphers: cipher 3des-cbc mac umac-64-etm@openssh.com
-test try ciphers: cipher 3des-cbc mac umac-128-etm@openssh.com
-test try ciphers: cipher aes128-cbc mac hmac-sha1
-test try ciphers: cipher aes128-cbc mac hmac-sha1-96
-test try ciphers: cipher aes128-cbc mac hmac-sha2-256
-test try ciphers: cipher aes128-cbc mac hmac-sha2-512
-test try ciphers: cipher aes128-cbc mac hmac-md5
-test try ciphers: cipher aes128-cbc mac hmac-md5-96
-test try ciphers: cipher aes128-cbc mac umac-64@openssh.com
-test try ciphers: cipher aes128-cbc mac umac-128@openssh.com
-test try ciphers: cipher aes128-cbc mac hmac-sha1-etm@openssh.com
-test try ciphers: cipher aes128-cbc mac hmac-sha1-96-etm@openssh.com
-test try ciphers: cipher aes128-cbc mac hmac-sha2-256-etm@openssh.com
-test try ciphers: cipher aes128-cbc mac hmac-sha2-512-etm@openssh.com
-test try ciphers: cipher aes128-cbc mac hmac-md5-etm@openssh.com
-test try ciphers: cipher aes128-cbc mac hmac-md5-96-etm@openssh.com
-test try ciphers: cipher aes128-cbc mac umac-64-etm@openssh.com
-test try ciphers: cipher aes128-cbc mac umac-128-etm@openssh.com
-test try ciphers: cipher aes192-cbc mac hmac-sha1
-test try ciphers: cipher aes192-cbc mac hmac-sha1-96
-test try ciphers: cipher aes192-cbc mac hmac-sha2-256
-test try ciphers: cipher aes192-cbc mac hmac-sha2-512
-test try ciphers: cipher aes192-cbc mac hmac-md5
-test try ciphers: cipher aes192-cbc mac hmac-md5-96
-test try ciphers: cipher aes192-cbc mac umac-64@openssh.com
-test try ciphers: cipher aes192-cbc mac umac-128@openssh.com
-test try ciphers: cipher aes192-cbc mac hmac-sha1-etm@openssh.com
-test try ciphers: cipher aes192-cbc mac hmac-sha1-96-etm@openssh.com
-test try ciphers: cipher aes192-cbc mac hmac-sha2-256-etm@openssh.com
-test try ciphers: cipher aes192-cbc mac hmac-sha2-512-etm@openssh.com
-test try ciphers: cipher aes192-cbc mac hmac-md5-etm@openssh.com
-test try ciphers: cipher aes192-cbc mac hmac-md5-96-etm@openssh.com
-test try ciphers: cipher aes192-cbc mac umac-64-etm@openssh.com
-test try ciphers: cipher aes192-cbc mac umac-128-etm@openssh.com
-test try ciphers: cipher aes256-cbc mac hmac-sha1
-test try ciphers: cipher aes256-cbc mac hmac-sha1-96
-test try ciphers: cipher aes256-cbc mac hmac-sha2-256
-test try ciphers: cipher aes256-cbc mac hmac-sha2-512
-test try ciphers: cipher aes256-cbc mac hmac-md5
-test try ciphers: cipher aes256-cbc mac hmac-md5-96
-test try ciphers: cipher aes256-cbc mac umac-64@openssh.com
-test try ciphers: cipher aes256-cbc mac umac-128@openssh.com
-test try ciphers: cipher aes256-cbc mac hmac-sha1-etm@openssh.com
-test try ciphers: cipher aes256-cbc mac hmac-sha1-96-etm@openssh.com
-test try ciphers: cipher aes256-cbc mac hmac-sha2-256-etm@openssh.com
-test try ciphers: cipher aes256-cbc mac hmac-sha2-512-etm@openssh.com
-test try ciphers: cipher aes256-cbc mac hmac-md5-etm@openssh.com
-test try ciphers: cipher aes256-cbc mac hmac-md5-96-etm@openssh.com
-test try ciphers: cipher aes256-cbc mac umac-64-etm@openssh.com
-test try ciphers: cipher aes256-cbc mac umac-128-etm@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha1
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-md5
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac umac-64@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac umac-128@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-etm@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96-etm@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256-etm@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512-etm@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-md5-etm@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96-etm@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac umac-64-etm@openssh.com
-test try ciphers: cipher rijndael-cbc@lysator.liu.se mac umac-128-etm@openssh.com
-test try ciphers: cipher aes128-ctr mac hmac-sha1
-test try ciphers: cipher aes128-ctr mac hmac-sha1-96
-test try ciphers: cipher aes128-ctr mac hmac-sha2-256
-test try ciphers: cipher aes128-ctr mac hmac-sha2-512
-test try ciphers: cipher aes128-ctr mac hmac-md5
-test try ciphers: cipher aes128-ctr mac hmac-md5-96
-test try ciphers: cipher aes128-ctr mac umac-64@openssh.com
-test try ciphers: cipher aes128-ctr mac umac-128@openssh.com
-test try ciphers: cipher aes128-ctr mac hmac-sha1-etm@openssh.com
-test try ciphers: cipher aes128-ctr mac hmac-sha1-96-etm@openssh.com
-test try ciphers: cipher aes128-ctr mac hmac-sha2-256-etm@openssh.com
-test try ciphers: cipher aes128-ctr mac hmac-sha2-512-etm@openssh.com
-test try ciphers: cipher aes128-ctr mac hmac-md5-etm@openssh.com
-test try ciphers: cipher aes128-ctr mac hmac-md5-96-etm@openssh.com
-test try ciphers: cipher aes128-ctr mac umac-64-etm@openssh.com
-test try ciphers: cipher aes128-ctr mac umac-128-etm@openssh.com
-test try ciphers: cipher aes192-ctr mac hmac-sha1
-test try ciphers: cipher aes192-ctr mac hmac-sha1-96
-test try ciphers: cipher aes192-ctr mac hmac-sha2-256
-test try ciphers: cipher aes192-ctr mac hmac-sha2-512
-test try ciphers: cipher aes192-ctr mac hmac-md5
-test try ciphers: cipher aes192-ctr mac hmac-md5-96
-test try ciphers: cipher aes192-ctr mac umac-64@openssh.com
-test try ciphers: cipher aes192-ctr mac umac-128@openssh.com
-test try ciphers: cipher aes192-ctr mac hmac-sha1-etm@openssh.com
-test try ciphers: cipher aes192-ctr mac hmac-sha1-96-etm@openssh.com
-test try ciphers: cipher aes192-ctr mac hmac-sha2-256-etm@openssh.com
-test try ciphers: cipher aes192-ctr mac hmac-sha2-512-etm@openssh.com
-test try ciphers: cipher aes192-ctr mac hmac-md5-etm@openssh.com
-test try ciphers: cipher aes192-ctr mac hmac-md5-96-etm@openssh.com
-test try ciphers: cipher aes192-ctr mac umac-64-etm@openssh.com
-test try ciphers: cipher aes192-ctr mac umac-128-etm@openssh.com
-test try ciphers: cipher aes256-ctr mac hmac-sha1
-test try ciphers: cipher aes256-ctr mac hmac-sha1-96
-test try ciphers: cipher aes256-ctr mac hmac-sha2-256
-test try ciphers: cipher aes256-ctr mac hmac-sha2-512
-test try ciphers: cipher aes256-ctr mac hmac-md5
-test try ciphers: cipher aes256-ctr mac hmac-md5-96
-test try ciphers: cipher aes256-ctr mac umac-64@openssh.com
-test try ciphers: cipher aes256-ctr mac umac-128@openssh.com
-test try ciphers: cipher aes256-ctr mac hmac-sha1-etm@openssh.com
-test try ciphers: cipher aes256-ctr mac hmac-sha1-96-etm@openssh.com
-test try ciphers: cipher aes256-ctr mac hmac-sha2-256-etm@openssh.com
-test try ciphers: cipher aes256-ctr mac hmac-sha2-512-etm@openssh.com
-test try ciphers: cipher aes256-ctr mac hmac-md5-etm@openssh.com
-test try ciphers: cipher aes256-ctr mac hmac-md5-96-etm@openssh.com
-test try ciphers: cipher aes256-ctr mac umac-64-etm@openssh.com
-test try ciphers: cipher aes256-ctr mac umac-128-etm@openssh.com
-test try ciphers: cipher aes128-gcm@openssh.com mac hmac-sha1
-test try ciphers: cipher aes256-gcm@openssh.com mac hmac-sha1
-test try ciphers: cipher chacha20-poly1305@openssh.com mac hmac-sha1
-PASS: try ciphers
-run test yes-head.sh ...
-PASS: yes pipe head
-run test login-timeout.sh ...
-run test agent.sh ...
-PASS: connect after login grace timeout
-PASS: simple agent test
-run test agent-getpeereid.sh ...
-SKIP: (not supported on this platform)
-run test agent-timeout.sh ...
-PASS: agent timeout test
-run test keyscan.sh ...
-PASS: keyscan
-run test keygen-change.sh ...
-PASS: change passphrase for key
-run test keygen-convert.sh ...
-PASS: convert keys
-run test keygen-moduli.sh ...
-PASS: keygen moduli
-run test key-options.sh ...
-key option command="echo bar"
-key option no-pty,command="echo bar"
-key option pty default
-SKIP: for no openpty(3)
-key option pty no-pty
-SKIP: for no openpty(3)
-key option pty restrict
-SKIP: for no openpty(3)
-key option pty restrict,pty
-SKIP: for no openpty(3)
-key option environment
-key option from="127.0.0.1"
-key option from="127.0.0.0/8"
-key option expiry-time default
-key option expiry-time invalid
-key option expiry-time expired
-key option expiry-time valid
-run test scp.sh ...
-PASS: key options
-scp: simple copy local file to local file
-scp: simple copy local file to remote file
-scp: simple copy remote file to local file
-scp: simple copy local file to remote dir
-scp: simple copy local file to local dir
-scp: simple copy remote file to local dir
-scp: recursive local dir to remote dir
-scp: recursive local dir to local dir
-scp: recursive remote dir to local dir
-scp: shell metacharacters
-scp: skipped file after scp -p with failed chown+utimes
-scp: disallow bad server #0
-scp: disallow bad server #1
-scp: disallow bad server #2
-scp: disallow bad server #3
-scp: disallow bad server #4
-scp: detect non-directory target
-/usr/lib/openssh/ptest/regress/copy2: Not a directory
-PASS: scp
-run test scp-uri.sh ...
-scp-uri: simple copy local file to remote file
-scp-uri: simple copy remote file to local file
-scp-uri: simple copy local file to remote dir
-scp-uri: simple copy remote file to local dir
-scp-uri: recursive local dir to remote dir
-scp-uri: recursive remote dir to local dir
-PASS: scp-uri
-run test sftp.sh ...
-test basic sftp put/get: buffer_size 5 num_requests 1
-test basic sftp put/get: buffer_size 5 num_requests 2
-test basic sftp put/get: buffer_size 5 num_requests 10
-test basic sftp put/get: buffer_size 1000 num_requests 1
-test basic sftp put/get: buffer_size 1000 num_requests 2
-test basic sftp put/get: buffer_size 1000 num_requests 10
-test basic sftp put/get: buffer_size 32000 num_requests 1
-test basic sftp put/get: buffer_size 32000 num_requests 2
-test basic sftp put/get: buffer_size 32000 num_requests 10
-test basic sftp put/get: buffer_size 64000 num_requests 1
-test basic sftp put/get: buffer_size 64000 num_requests 2
-test basic sftp put/get: buffer_size 64000 num_requests 10
-PASS: basic sftp put/get
-run test sftp-chroot.sh ...
-test sftp in chroot: get
-PASS: sftp in chroot
-run test sftp-cmds.sh ...
-sftp commands: lls
-sftp commands: lls w/path
-sftp commands: ls
-sftp commands: shell
-sftp commands: pwd
-sftp commands: lpwd
-sftp commands: quit
-sftp commands: help
-sftp commands: get
-sftp commands: get quoted
-sftp commands: get filename with quotes
-sftp commands: get filename with spaces
-sftp commands: get filename with glob metacharacters
-sftp commands: get to directory
-sftp commands: glob get to directory
-sftp commands: get to local dir
-sftp commands: glob get to local dir
-sftp commands: put
-sftp commands: put filename with quotes
-sftp commands: put filename with spaces
-sftp commands: put to directory
-sftp commands: glob put to directory
-sftp commands: put to local dir
-sftp commands: glob put to local dir
-sftp commands: rename
-sftp commands: rename directory
-sftp commands: ln
-sftp commands: ln -s
-sftp commands: mkdir
-sftp commands: chdir
-sftp commands: rmdir
-sftp commands: lmkdir
-sftp commands: lchdir
-PASS: sftp commands
-run test sftp-badcmds.sh ...
-sftp invalid commands: get nonexistent
-sftp invalid commands: glob get to nonexistent directory
-sftp invalid commands: put nonexistent
-sftp invalid commands: glob put to nonexistent directory
-sftp invalid commands: rename nonexistent
-sftp invalid commands: rename target exists (directory)
-sftp invalid commands: glob put files to local file
-PASS: sftp invalid commands
-run test sftp-batch.sh ...
-sftp batchfile: good commands
-sftp batchfile: bad commands
-sftp batchfile: comments and blanks
-sftp batchfile: junk command
-PASS: sftp batchfile
-run test sftp-glob.sh ...
-sftp glob: file glob
-sftp glob: dir glob
-sftp glob: quoted glob
-sftp glob: escaped glob
-sftp glob: escaped quote
-sftp glob: quoted quote
-sftp glob: single-quoted quote
-sftp glob: escaped space
-sftp glob: quoted space
-sftp glob: escaped slash
-sftp glob: quoted slash
-sftp glob: escaped slash at EOL
-sftp glob: quoted slash at EOL
-sftp glob: escaped slash+quote
-sftp glob: quoted slash+quote
-PASS: sftp glob
-run test sftp-perm.sh ...
-sftp permissions: read-only upload
-sftp permissions: read-only setstat
-sftp permissions: read-only rm
-sftp permissions: read-only mkdir
-sftp permissions: read-only rmdir
-sftp permissions: read-only posix-rename
-sftp permissions: read-only oldrename
-sftp permissions: read-only symlink
-sftp permissions: read-only hardlink
-sftp permissions: explicit open
-sftp permissions: explicit read
-sftp permissions: explicit write
-sftp permissions: explicit lstat
-sftp permissions: explicit opendir
-sftp permissions: explicit readdir
-sftp permissions: explicit setstat
-sftp permissions: explicit remove
-sftp permissions: explicit mkdir
-sftp permissions: explicit rmdir
-sftp permissions: explicit posix-rename
-sftp permissions: explicit rename
-sftp permissions: explicit symlink
-sftp permissions: explicit hardlink
-sftp permissions: explicit statvfs
-PASS: sftp permissions
-run test sftp-uri.sh ...
-sftp-uri: non-interactive fetch to local file
-sftp-uri: non-interactive fetch to local dir
-sftp-uri: put to remote directory (trailing slash)
-sftp-uri: put to remote directory (no slash)
-PASS: sftp-uri
-run test reconfigure.sh ...
-PASS: simple connect after reconfigure
-run test dynamic-forward.sh ...
-SKIP: (no suitable ProxyCommand found)
-run test forwarding.sh ...
-Exit request sent.
-Exit request sent.
-Exit request sent.
-Exit request sent.
-Exit request sent.
-Exit request sent.
-Exit request sent.
-Exit request sent.
-PASS: local and remote forwarding
-run test multiplex.sh ...
-test connection multiplexing: envpass
-test connection multiplexing: transfer
-test connection multiplexing: forward
-test connection multiplexing: status 0
-test connection multiplexing: status 1
-test connection multiplexing: status 4
-test connection multiplexing: status 5
-test connection multiplexing: status 44
-test connection multiplexing: cmd check
-test connection multiplexing: cmd forward local (TCP)
-test connection multiplexing: cmd forward remote (TCP)
-test connection multiplexing: cmd forward local (UNIX)
-test connection multiplexing: cmd forward remote (UNIX)
-test connection multiplexing: cmd exit
-test connection multiplexing: cmd stop
-PASS: connection multiplexing
-run test reexec.sh ...
-test config passing
-test reexec fallback
-PASS: reexec tests
-run test brokenkeys.sh ...
-PASS: broken keys
-run test sshcfgparse.sh ...
-reparse minimal config
-ssh -W opts
-user first match
-pubkeyacceptedkeytypes
-PASS: ssh config parse
-run test cfgparse.sh ...
-reparse minimal config
-Could not connect to agent "none": No such file or directory
-reparse regress config
-Could not connect to agent "none": No such file or directory
-listenaddress order
-PASS: sshd config parse
-run test cfgmatch.sh ...
-PASS: sshd_config match
-run test cfgmatchlisten.sh ...
-run test addrmatch.sh ...
-PASS: sshd_config matchlisten
-test first entry for user 192.168.0.1 somehost
-test negative match for user 192.168.30.1 somehost
-test no match for user 19.0.0.1 somehost
-test list middle for user 10.255.255.254 somehost
-test faked IP in hostname for user 192.168.30.1 192.168.0.1
-test bare IP4 address for user 1.1.1.1 somehost.example.com
-test localaddress for user 19.0.0.1 somehost
-test localport for user 19.0.0.1 somehost
-test bare IP6 address for user ::1 somehost.example.com
-test deny IPv6 for user ::2 somehost.exaple.com
-test IP6 negated for user ::3 somehost
-test IP6 no match for user ::4 somehost
-test IP6 network for user 2000::1 somehost
-test IP6 network for user 2001::1 somehost
-test IP6 localaddress for user ::5 somehost
-test IP6 localport for user ::5 somehost
-PASS: address match
-run test localcommand.sh ...
-test localcommand: proto localcommand
-PASS: localcommand
-run test forcecommand.sh ...
-PASS: forced command
-run test portnum.sh ...
-port number parsing: invalid port 0
-port number parsing: invalid port 65536
-port number parsing: invalid port 131073
-port number parsing: invalid port 2000blah
-port number parsing: invalid port blah2000
-port number parsing: valid port 1
-port number parsing: valid port 22
-port number parsing: valid port 2222
-port number parsing: valid port 22222
-port number parsing: valid port 65535
-PASS: port number parsing
-run test keytype.sh ...
-keygen dsa, 1024 bits
-keygen rsa, 2048 bits
-keygen rsa, 3072 bits
-keygen ed25519, 512 bits
-keygen ecdsa, 256 bits
-keygen ecdsa, 384 bits
-keygen ecdsa, 521 bits
-userkey dsa-1024, hostkey dsa-1024
-userkey dsa-1024, hostkey dsa-1024
-userkey dsa-1024, hostkey dsa-1024
-userkey rsa-2048, hostkey rsa-2048
-userkey rsa-2048, hostkey rsa-2048
-userkey rsa-2048, hostkey rsa-2048
-userkey rsa-3072, hostkey rsa-3072
-userkey rsa-3072, hostkey rsa-3072
-userkey rsa-3072, hostkey rsa-3072
-userkey ed25519-512, hostkey ed25519-512
-userkey ed25519-512, hostkey ed25519-512
-userkey ed25519-512, hostkey ed25519-512
-userkey ecdsa-256, hostkey ecdsa-256
-userkey ecdsa-256, hostkey ecdsa-256
-userkey ecdsa-256, hostkey ecdsa-256
-userkey ecdsa-384, hostkey ecdsa-384
-userkey ecdsa-384, hostkey ecdsa-384
-userkey ecdsa-384, hostkey ecdsa-384
-userkey ecdsa-521, hostkey ecdsa-521
-userkey ecdsa-521, hostkey ecdsa-521
-userkey ecdsa-521, hostkey ecdsa-521
-PASS: login with different key types
-run test kextype.sh ...
-kex diffie-hellman-group1-sha1
-kex diffie-hellman-group14-sha1
-kex diffie-hellman-group14-sha256
-kex diffie-hellman-group16-sha512
-kex diffie-hellman-group18-sha512
-kex diffie-hellman-group-exchange-sha1
-kex diffie-hellman-group-exchange-sha256
-kex ecdh-sha2-nistp256
-kex ecdh-sha2-nistp384
-kex ecdh-sha2-nistp521
-kex curve25519-sha256
-kex curve25519-sha256@libssh.org
-PASS: login with different key exchange algorithms
-run test cert-hostkey.sh ...
-Revoking from /usr/lib/openssh/ptest/regress/host_ca_key.pub
-Revoking from /usr/lib/openssh/ptest/regress/host_ca_key2.pub
-certified host keys: sign host ed25519 cert
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ed25519.pub
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ed25519-cert.pub
-certified host keys: sign host rsa cert
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa.pub
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-cert.pub
-certified host keys: sign host dsa cert
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_dsa.pub
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_dsa-cert.pub
-certified host keys: sign host ecdsa-sha2-nistp256 cert
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp256.pub
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp256-cert.pub
-certified host keys: sign host ecdsa-sha2-nistp384 cert
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp384.pub
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp384-cert.pub
-certified host keys: sign host ecdsa-sha2-nistp521 cert
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp521.pub
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp521-cert.pub
-certified host keys: sign host rsa-sha2-256 cert
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-256.pub
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-256-cert.pub
-certified host keys: sign host rsa-sha2-512 cert
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-512.pub
-Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-512-cert.pub
-certified host keys: host ed25519 cert connect privsep yes
-certified host keys: ed25519 basic connect expect success yes
-certified host keys: ed25519 empty KRL expect success yes
-certified host keys: ed25519 KRL w/ plain key revoked expect success no
-certified host keys: ed25519 KRL w/ cert revoked expect success no
-certified host keys: ed25519 KRL w/ CA revoked expect success no
-certified host keys: ed25519 empty plaintext revocation expect success yes
-certified host keys: ed25519 plain key plaintext revocation expect success no
-certified host keys: ed25519 cert plaintext revocation expect success no
-certified host keys: ed25519 CA plaintext revocation expect success no
-certified host keys: host rsa cert connect privsep yes
-certified host keys: rsa basic connect expect success yes
-certified host keys: rsa empty KRL expect success yes
-certified host keys: rsa KRL w/ plain key revoked expect success no
-certified host keys: rsa KRL w/ cert revoked expect success no
-certified host keys: rsa KRL w/ CA revoked expect success no
-certified host keys: rsa empty plaintext revocation expect success yes
-certified host keys: rsa plain key plaintext revocation expect success no
-certified host keys: rsa cert plaintext revocation expect success no
-certified host keys: rsa CA plaintext revocation expect success no
-certified host keys: host dsa cert connect privsep yes
-certified host keys: dsa basic connect expect success yes
-certified host keys: dsa empty KRL expect success yes
-certified host keys: dsa KRL w/ plain key revoked expect success no
-certified host keys: dsa KRL w/ cert revoked expect success no
-certified host keys: dsa KRL w/ CA revoked expect success no
-certified host keys: dsa empty plaintext revocation expect success yes
-certified host keys: dsa plain key plaintext revocation expect success no
-certified host keys: dsa cert plaintext revocation expect success no
-certified host keys: dsa CA plaintext revocation expect success no
-certified host keys: host ecdsa-sha2-nistp256 cert connect privsep yes
-certified host keys: ecdsa-sha2-nistp256 basic connect expect success yes
-certified host keys: ecdsa-sha2-nistp256 empty KRL expect success yes
-certified host keys: ecdsa-sha2-nistp256 KRL w/ plain key revoked expect success no
-certified host keys: ecdsa-sha2-nistp256 KRL w/ cert revoked expect success no
-certified host keys: ecdsa-sha2-nistp256 KRL w/ CA revoked expect success no
-certified host keys: ecdsa-sha2-nistp256 empty plaintext revocation expect success yes
-certified host keys: ecdsa-sha2-nistp256 plain key plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp256 cert plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp256 CA plaintext revocation expect success no
-certified host keys: host ecdsa-sha2-nistp384 cert connect privsep yes
-certified host keys: ecdsa-sha2-nistp384 basic connect expect success yes
-certified host keys: ecdsa-sha2-nistp384 empty KRL expect success yes
-certified host keys: ecdsa-sha2-nistp384 KRL w/ plain key revoked expect success no
-certified host keys: ecdsa-sha2-nistp384 KRL w/ cert revoked expect success no
-certified host keys: ecdsa-sha2-nistp384 KRL w/ CA revoked expect success no
-certified host keys: ecdsa-sha2-nistp384 empty plaintext revocation expect success yes
-certified host keys: ecdsa-sha2-nistp384 plain key plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp384 cert plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp384 CA plaintext revocation expect success no
-certified host keys: host ecdsa-sha2-nistp521 cert connect privsep yes
-certified host keys: ecdsa-sha2-nistp521 basic connect expect success yes
-certified host keys: ecdsa-sha2-nistp521 empty KRL expect success yes
-certified host keys: ecdsa-sha2-nistp521 KRL w/ plain key revoked expect success no
-certified host keys: ecdsa-sha2-nistp521 KRL w/ cert revoked expect success no
-certified host keys: ecdsa-sha2-nistp521 KRL w/ CA revoked expect success no
-certified host keys: ecdsa-sha2-nistp521 empty plaintext revocation expect success yes
-certified host keys: ecdsa-sha2-nistp521 plain key plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp521 cert plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp521 CA plaintext revocation expect success no
-certified host keys: host rsa-sha2-256 cert connect privsep yes
-certified host keys: rsa-sha2-256 basic connect expect success yes
-certified host keys: rsa-sha2-256 empty KRL expect success yes
-certified host keys: rsa-sha2-256 KRL w/ plain key revoked expect success no
-certified host keys: rsa-sha2-256 KRL w/ cert revoked expect success no
-certified host keys: rsa-sha2-256 KRL w/ CA revoked expect success no
-certified host keys: rsa-sha2-256 empty plaintext revocation expect success yes
-certified host keys: rsa-sha2-256 plain key plaintext revocation expect success no
-certified host keys: rsa-sha2-256 cert plaintext revocation expect success no
-certified host keys: rsa-sha2-256 CA plaintext revocation expect success no
-certified host keys: host rsa-sha2-512 cert connect privsep yes
-certified host keys: rsa-sha2-512 basic connect expect success yes
-certified host keys: rsa-sha2-512 empty KRL expect success yes
-certified host keys: rsa-sha2-512 KRL w/ plain key revoked expect success no
-certified host keys: rsa-sha2-512 KRL w/ cert revoked expect success no
-certified host keys: rsa-sha2-512 KRL w/ CA revoked expect success no
-certified host keys: rsa-sha2-512 empty plaintext revocation expect success yes
-certified host keys: rsa-sha2-512 plain key plaintext revocation expect success no
-certified host keys: rsa-sha2-512 cert plaintext revocation expect success no
-certified host keys: rsa-sha2-512 CA plaintext revocation expect success no
-certified host keys: host ed25519 cert connect privsep no
-certified host keys: ed25519 basic connect expect success yes
-certified host keys: ed25519 empty KRL expect success yes
-certified host keys: ed25519 KRL w/ plain key revoked expect success no
-certified host keys: ed25519 KRL w/ cert revoked expect success no
-certified host keys: ed25519 KRL w/ CA revoked expect success no
-certified host keys: ed25519 empty plaintext revocation expect success yes
-certified host keys: ed25519 plain key plaintext revocation expect success no
-certified host keys: ed25519 cert plaintext revocation expect success no
-certified host keys: ed25519 CA plaintext revocation expect success no
-certified host keys: host rsa cert connect privsep no
-certified host keys: rsa basic connect expect success yes
-certified host keys: rsa empty KRL expect success yes
-certified host keys: rsa KRL w/ plain key revoked expect success no
-certified host keys: rsa KRL w/ cert revoked expect success no
-certified host keys: rsa KRL w/ CA revoked expect success no
-certified host keys: rsa empty plaintext revocation expect success yes
-certified host keys: rsa plain key plaintext revocation expect success no
-certified host keys: rsa cert plaintext revocation expect success no
-certified host keys: rsa CA plaintext revocation expect success no
-certified host keys: host dsa cert connect privsep no
-certified host keys: dsa basic connect expect success yes
-certified host keys: dsa empty KRL expect success yes
-certified host keys: dsa KRL w/ plain key revoked expect success no
-certified host keys: dsa KRL w/ cert revoked expect success no
-certified host keys: dsa KRL w/ CA revoked expect success no
-certified host keys: dsa empty plaintext revocation expect success yes
-certified host keys: dsa plain key plaintext revocation expect success no
-certified host keys: dsa cert plaintext revocation expect success no
-certified host keys: dsa CA plaintext revocation expect success no
-certified host keys: host ecdsa-sha2-nistp256 cert connect privsep no
-certified host keys: ecdsa-sha2-nistp256 basic connect expect success yes
-certified host keys: ecdsa-sha2-nistp256 empty KRL expect success yes
-certified host keys: ecdsa-sha2-nistp256 KRL w/ plain key revoked expect success no
-certified host keys: ecdsa-sha2-nistp256 KRL w/ cert revoked expect success no
-certified host keys: ecdsa-sha2-nistp256 KRL w/ CA revoked expect success no
-certified host keys: ecdsa-sha2-nistp256 empty plaintext revocation expect success yes
-certified host keys: ecdsa-sha2-nistp256 plain key plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp256 cert plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp256 CA plaintext revocation expect success no
-certified host keys: host ecdsa-sha2-nistp384 cert connect privsep no
-certified host keys: ecdsa-sha2-nistp384 basic connect expect success yes
-certified host keys: ecdsa-sha2-nistp384 empty KRL expect success yes
-certified host keys: ecdsa-sha2-nistp384 KRL w/ plain key revoked expect success no
-certified host keys: ecdsa-sha2-nistp384 KRL w/ cert revoked expect success no
-certified host keys: ecdsa-sha2-nistp384 KRL w/ CA revoked expect success no
-certified host keys: ecdsa-sha2-nistp384 empty plaintext revocation expect success yes
-certified host keys: ecdsa-sha2-nistp384 plain key plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp384 cert plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp384 CA plaintext revocation expect success no
-certified host keys: host ecdsa-sha2-nistp521 cert connect privsep no
-certified host keys: ecdsa-sha2-nistp521 basic connect expect success yes
-certified host keys: ecdsa-sha2-nistp521 empty KRL expect success yes
-certified host keys: ecdsa-sha2-nistp521 KRL w/ plain key revoked expect success no
-certified host keys: ecdsa-sha2-nistp521 KRL w/ cert revoked expect success no
-certified host keys: ecdsa-sha2-nistp521 KRL w/ CA revoked expect success no
-certified host keys: ecdsa-sha2-nistp521 empty plaintext revocation expect success yes
-certified host keys: ecdsa-sha2-nistp521 plain key plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp521 cert plaintext revocation expect success no
-certified host keys: ecdsa-sha2-nistp521 CA plaintext revocation expect success no
-certified host keys: host rsa-sha2-256 cert connect privsep no
-certified host keys: rsa-sha2-256 basic connect expect success yes
-certified host keys: rsa-sha2-256 empty KRL expect success yes
-certified host keys: rsa-sha2-256 KRL w/ plain key revoked expect success no
-certified host keys: rsa-sha2-256 KRL w/ cert revoked expect success no
-certified host keys: rsa-sha2-256 KRL w/ CA revoked expect success no
-certified host keys: rsa-sha2-256 empty plaintext revocation expect success yes
-certified host keys: rsa-sha2-256 plain key plaintext revocation expect success no
-certified host keys: rsa-sha2-256 cert plaintext revocation expect success no
-certified host keys: rsa-sha2-256 CA plaintext revocation expect success no
-certified host keys: host rsa-sha2-512 cert connect privsep no
-certified host keys: rsa-sha2-512 basic connect expect success yes
-certified host keys: rsa-sha2-512 empty KRL expect success yes
-certified host keys: rsa-sha2-512 KRL w/ plain key revoked expect success no
-certified host keys: rsa-sha2-512 KRL w/ cert revoked expect success no
-certified host keys: rsa-sha2-512 KRL w/ CA revoked expect success no
-certified host keys: rsa-sha2-512 empty plaintext revocation expect success yes
-certified host keys: rsa-sha2-512 plain key plaintext revocation expect success no
-certified host keys: rsa-sha2-512 cert plaintext revocation expect success no
-certified host keys: rsa-sha2-512 CA plaintext revocation expect success no
-certified host keys: host ed25519 revoked cert privsep yes
-certified host keys: host rsa revoked cert privsep yes
-certified host keys: host dsa revoked cert privsep yes
-certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep yes
-certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep yes
-certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep yes
-certified host keys: host rsa-sha2-256 revoked cert privsep yes
-certified host keys: host rsa-sha2-512 revoked cert privsep yes
-certified host keys: host ed25519 revoked cert privsep no
-certified host keys: host rsa revoked cert privsep no
-certified host keys: host dsa revoked cert privsep no
-certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep no
-certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep no
-certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep no
-certified host keys: host rsa-sha2-256 revoked cert privsep no
-certified host keys: host rsa-sha2-512 revoked cert privsep no
-certified host keys: host ed25519 revoked cert
-certified host keys: host rsa revoked cert
-certified host keys: host dsa revoked cert
-certified host keys: host ecdsa-sha2-nistp256 revoked cert
-certified host keys: host ecdsa-sha2-nistp384 revoked cert
-certified host keys: host ecdsa-sha2-nistp521 revoked cert
-certified host keys: host rsa-sha2-256 revoked cert
-certified host keys: host rsa-sha2-512 revoked cert
-certified host keys: host ed25519 cert downgrade to raw key
-certified host keys: host rsa cert downgrade to raw key
-certified host keys: host dsa cert downgrade to raw key
-certified host keys: host ecdsa-sha2-nistp256 cert downgrade to raw key
-certified host keys: host ecdsa-sha2-nistp384 cert downgrade to raw key
-certified host keys: host ecdsa-sha2-nistp521 cert downgrade to raw key
-certified host keys: host rsa-sha2-256 cert downgrade to raw key
-certified host keys: host rsa-sha2-512 cert downgrade to raw key
-certified host keys: host ed25519 connect wrong cert
-certified host keys: host rsa connect wrong cert
-certified host keys: host dsa connect wrong cert
-certified host keys: host ecdsa-sha2-nistp256 connect wrong cert
-certified host keys: host ecdsa-sha2-nistp384 connect wrong cert
-certified host keys: host ecdsa-sha2-nistp521 connect wrong cert
-certified host keys: host rsa-sha2-256 connect wrong cert
-certified host keys: host rsa-sha2-512 connect wrong cert
-PASS: certified host keys
-run test cert-userkey.sh ...
-certified user keys: sign user ed25519 cert
-certified user keys: sign user rsa cert
-certified user keys: sign user dsa cert
-certified user keys: sign user ecdsa-sha2-nistp256 cert
-certified user keys: sign user ecdsa-sha2-nistp384 cert
-certified user keys: sign user ecdsa-sha2-nistp521 cert
-certified user keys: sign user rsa-sha2-256 cert
-certified user keys: sign user rsa-sha2-512 cert
-certified user keys: ed25519 privsep yes missing authorized_principals
-certified user keys: ed25519 privsep yes empty authorized_principals
-certified user keys: ed25519 privsep yes wrong authorized_principals
-certified user keys: ed25519 privsep yes correct authorized_principals
-certified user keys: ed25519 privsep yes authorized_principals bad key opt
-certified user keys: ed25519 privsep yes authorized_principals command=false
-certified user keys: ed25519 privsep yes authorized_principals command=true
-certified user keys: ed25519 privsep yes wrong principals key option
-certified user keys: ed25519 privsep yes correct principals key option
-certified user keys: ed25519 privsep no missing authorized_principals
-certified user keys: ed25519 privsep no empty authorized_principals
-certified user keys: ed25519 privsep no wrong authorized_principals
-certified user keys: ed25519 privsep no correct authorized_principals
-certified user keys: ed25519 privsep no authorized_principals bad key opt
-certified user keys: ed25519 privsep no authorized_principals command=false
-certified user keys: ed25519 privsep no authorized_principals command=true
-certified user keys: ed25519 privsep no wrong principals key option
-certified user keys: ed25519 privsep no correct principals key option
-certified user keys: rsa privsep yes missing authorized_principals
-certified user keys: rsa privsep yes empty authorized_principals
-certified user keys: rsa privsep yes wrong authorized_principals
-certified user keys: rsa privsep yes correct authorized_principals
-certified user keys: rsa privsep yes authorized_principals bad key opt
-certified user keys: rsa privsep yes authorized_principals command=false
-certified user keys: rsa privsep yes authorized_principals command=true
-certified user keys: rsa privsep yes wrong principals key option
-certified user keys: rsa privsep yes correct principals key option
-certified user keys: rsa privsep no missing authorized_principals
-certified user keys: rsa privsep no empty authorized_principals
-certified user keys: rsa privsep no wrong authorized_principals
-certified user keys: rsa privsep no correct authorized_principals
-certified user keys: rsa privsep no authorized_principals bad key opt
-certified user keys: rsa privsep no authorized_principals command=false
-certified user keys: rsa privsep no authorized_principals command=true
-certified user keys: rsa privsep no wrong principals key option
-certified user keys: rsa privsep no correct principals key option
-certified user keys: dsa privsep yes missing authorized_principals
-certified user keys: dsa privsep yes empty authorized_principals
-certified user keys: dsa privsep yes wrong authorized_principals
-certified user keys: dsa privsep yes correct authorized_principals
-certified user keys: dsa privsep yes authorized_principals bad key opt
-certified user keys: dsa privsep yes authorized_principals command=false
-certified user keys: dsa privsep yes authorized_principals command=true
-certified user keys: dsa privsep yes wrong principals key option
-certified user keys: dsa privsep yes correct principals key option
-certified user keys: dsa privsep no missing authorized_principals
-certified user keys: dsa privsep no empty authorized_principals
-certified user keys: dsa privsep no wrong authorized_principals
-certified user keys: dsa privsep no correct authorized_principals
-certified user keys: dsa privsep no authorized_principals bad key opt
-certified user keys: dsa privsep no authorized_principals command=false
-certified user keys: dsa privsep no authorized_principals command=true
-certified user keys: dsa privsep no wrong principals key option
-certified user keys: dsa privsep no correct principals key option
-certified user keys: ecdsa-sha2-nistp256 privsep yes missing authorized_principals
-certified user keys: ecdsa-sha2-nistp256 privsep yes empty authorized_principals
-certified user keys: ecdsa-sha2-nistp256 privsep yes wrong authorized_principals
-certified user keys: ecdsa-sha2-nistp256 privsep yes correct authorized_principals
-certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals bad key opt
-certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=false
-certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=true
-certified user keys: ecdsa-sha2-nistp256 privsep yes wrong principals key option
-certified user keys: ecdsa-sha2-nistp256 privsep yes correct principals key option
-certified user keys: ecdsa-sha2-nistp256 privsep no missing authorized_principals
-certified user keys: ecdsa-sha2-nistp256 privsep no empty authorized_principals
-certified user keys: ecdsa-sha2-nistp256 privsep no wrong authorized_principals
-certified user keys: ecdsa-sha2-nistp256 privsep no correct authorized_principals
-certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals bad key opt
-certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals command=false
-certified user keys: ecdsa-sha2-nistp256 privsep no authorized_principals command=true
-certified user keys: ecdsa-sha2-nistp256 privsep no wrong principals key option
-certified user keys: ecdsa-sha2-nistp256 privsep no correct principals key option
-certified user keys: ecdsa-sha2-nistp384 privsep yes missing authorized_principals
-certified user keys: ecdsa-sha2-nistp384 privsep yes empty authorized_principals
-certified user keys: ecdsa-sha2-nistp384 privsep yes wrong authorized_principals
-certified user keys: ecdsa-sha2-nistp384 privsep yes correct authorized_principals
-certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals bad key opt
-certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=false
-certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=true
-certified user keys: ecdsa-sha2-nistp384 privsep yes wrong principals key option
-certified user keys: ecdsa-sha2-nistp384 privsep yes correct principals key option
-certified user keys: ecdsa-sha2-nistp384 privsep no missing authorized_principals
-certified user keys: ecdsa-sha2-nistp384 privsep no empty authorized_principals
-certified user keys: ecdsa-sha2-nistp384 privsep no wrong authorized_principals
-certified user keys: ecdsa-sha2-nistp384 privsep no correct authorized_principals
-certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals bad key opt
-certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals command=false
-certified user keys: ecdsa-sha2-nistp384 privsep no authorized_principals command=true
-certified user keys: ecdsa-sha2-nistp384 privsep no wrong principals key option
-certified user keys: ecdsa-sha2-nistp384 privsep no correct principals key option
-certified user keys: ecdsa-sha2-nistp521 privsep yes missing authorized_principals
-certified user keys: ecdsa-sha2-nistp521 privsep yes empty authorized_principals
-certified user keys: ecdsa-sha2-nistp521 privsep yes wrong authorized_principals
-certified user keys: ecdsa-sha2-nistp521 privsep yes correct authorized_principals
-certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals bad key opt
-certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=false
-certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=true
-certified user keys: ecdsa-sha2-nistp521 privsep yes wrong principals key option
-certified user keys: ecdsa-sha2-nistp521 privsep yes correct principals key option
-certified user keys: ecdsa-sha2-nistp521 privsep no missing authorized_principals
-certified user keys: ecdsa-sha2-nistp521 privsep no empty authorized_principals
-certified user keys: ecdsa-sha2-nistp521 privsep no wrong authorized_principals
-certified user keys: ecdsa-sha2-nistp521 privsep no correct authorized_principals
-certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals bad key opt
-certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals command=false
-certified user keys: ecdsa-sha2-nistp521 privsep no authorized_principals command=true
-certified user keys: ecdsa-sha2-nistp521 privsep no wrong principals key option
-certified user keys: ecdsa-sha2-nistp521 privsep no correct principals key option
-certified user keys: rsa-sha2-256 privsep yes missing authorized_principals
-certified user keys: rsa-sha2-256 privsep yes empty authorized_principals
-certified user keys: rsa-sha2-256 privsep yes wrong authorized_principals
-certified user keys: rsa-sha2-256 privsep yes correct authorized_principals
-certified user keys: rsa-sha2-256 privsep yes authorized_principals bad key opt
-certified user keys: rsa-sha2-256 privsep yes authorized_principals command=false
-certified user keys: rsa-sha2-256 privsep yes authorized_principals command=true
-certified user keys: rsa-sha2-256 privsep yes wrong principals key option
-certified user keys: rsa-sha2-256 privsep yes correct principals key option
-certified user keys: rsa-sha2-256 privsep no missing authorized_principals
-certified user keys: rsa-sha2-256 privsep no empty authorized_principals
-certified user keys: rsa-sha2-256 privsep no wrong authorized_principals
-certified user keys: rsa-sha2-256 privsep no correct authorized_principals
-certified user keys: rsa-sha2-256 privsep no authorized_principals bad key opt
-certified user keys: rsa-sha2-256 privsep no authorized_principals command=false
-certified user keys: rsa-sha2-256 privsep no authorized_principals command=true
-certified user keys: rsa-sha2-256 privsep no wrong principals key option
-certified user keys: rsa-sha2-256 privsep no correct principals key option
-certified user keys: rsa-sha2-512 privsep yes missing authorized_principals
-certified user keys: rsa-sha2-512 privsep yes empty authorized_principals
-certified user keys: rsa-sha2-512 privsep yes wrong authorized_principals
-certified user keys: rsa-sha2-512 privsep yes correct authorized_principals
-certified user keys: rsa-sha2-512 privsep yes authorized_principals bad key opt
-certified user keys: rsa-sha2-512 privsep yes authorized_principals command=false
-certified user keys: rsa-sha2-512 privsep yes authorized_principals command=true
-certified user keys: rsa-sha2-512 privsep yes wrong principals key option
-certified user keys: rsa-sha2-512 privsep yes correct principals key option
-certified user keys: rsa-sha2-512 privsep no missing authorized_principals
-certified user keys: rsa-sha2-512 privsep no empty authorized_principals
-certified user keys: rsa-sha2-512 privsep no wrong authorized_principals
-certified user keys: rsa-sha2-512 privsep no correct authorized_principals
-certified user keys: rsa-sha2-512 privsep no authorized_principals bad key opt
-certified user keys: rsa-sha2-512 privsep no authorized_principals command=false
-certified user keys: rsa-sha2-512 privsep no authorized_principals command=true
-certified user keys: rsa-sha2-512 privsep no wrong principals key option
-certified user keys: rsa-sha2-512 privsep no correct principals key option
-certified user keys: ed25519 privsep yes authorized_keys connect
-certified user keys: ed25519 privsep yes authorized_keys revoked key
-certified user keys: ed25519 privsep yes authorized_keys revoked via KRL
-certified user keys: ed25519 privsep yes authorized_keys empty KRL
-certified user keys: ed25519 privsep no authorized_keys connect
-certified user keys: ed25519 privsep no authorized_keys revoked key
-certified user keys: ed25519 privsep no authorized_keys revoked via KRL
-certified user keys: ed25519 privsep no authorized_keys empty KRL
-certified user keys: ed25519 authorized_keys revoked CA key
-certified user keys: rsa privsep yes authorized_keys connect
-certified user keys: rsa privsep yes authorized_keys revoked key
-certified user keys: rsa privsep yes authorized_keys revoked via KRL
-certified user keys: rsa privsep yes authorized_keys empty KRL
-certified user keys: rsa privsep no authorized_keys connect
-certified user keys: rsa privsep no authorized_keys revoked key
-certified user keys: rsa privsep no authorized_keys revoked via KRL
-certified user keys: rsa privsep no authorized_keys empty KRL
-certified user keys: rsa authorized_keys revoked CA key
-certified user keys: dsa privsep yes authorized_keys connect
-certified user keys: dsa privsep yes authorized_keys revoked key
-certified user keys: dsa privsep yes authorized_keys revoked via KRL
-certified user keys: dsa privsep yes authorized_keys empty KRL
-certified user keys: dsa privsep no authorized_keys connect
-certified user keys: dsa privsep no authorized_keys revoked key
-certified user keys: dsa privsep no authorized_keys revoked via KRL
-certified user keys: dsa privsep no authorized_keys empty KRL
-certified user keys: dsa authorized_keys revoked CA key
-certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys connect
-certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked key
-certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked via KRL
-certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys empty KRL
-certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys connect
-certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked key
-certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked via KRL
-certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys empty KRL
-certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked CA key
-certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys connect
-certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked key
-certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked via KRL
-certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys empty KRL
-certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys connect
-certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked key
-certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked via KRL
-certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys empty KRL
-certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked CA key
-certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys connect
-certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked key
-certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked via KRL
-certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys empty KRL
-certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys connect
-certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked key
-certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked via KRL
-certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys empty KRL
-certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked CA key
-certified user keys: rsa-sha2-256 privsep yes authorized_keys connect
-certified user keys: rsa-sha2-256 privsep yes authorized_keys revoked key
-certified user keys: rsa-sha2-256 privsep yes authorized_keys revoked via KRL
-certified user keys: rsa-sha2-256 privsep yes authorized_keys empty KRL
-certified user keys: rsa-sha2-256 privsep no authorized_keys connect
-certified user keys: rsa-sha2-256 privsep no authorized_keys revoked key
-certified user keys: rsa-sha2-256 privsep no authorized_keys revoked via KRL
-certified user keys: rsa-sha2-256 privsep no authorized_keys empty KRL
-certified user keys: rsa-sha2-256 authorized_keys revoked CA key
-certified user keys: rsa-sha2-512 privsep yes authorized_keys connect
-certified user keys: rsa-sha2-512 privsep yes authorized_keys revoked key
-certified user keys: rsa-sha2-512 privsep yes authorized_keys revoked via KRL
-certified user keys: rsa-sha2-512 privsep yes authorized_keys empty KRL
-certified user keys: rsa-sha2-512 privsep no authorized_keys connect
-certified user keys: rsa-sha2-512 privsep no authorized_keys revoked key
-certified user keys: rsa-sha2-512 privsep no authorized_keys revoked via KRL
-certified user keys: rsa-sha2-512 privsep no authorized_keys empty KRL
-certified user keys: rsa-sha2-512 authorized_keys revoked CA key
-certified user keys: authorized_keys CA does not authenticate
-certified user keys: ensure CA key does not authenticate user
-certified user keys: ed25519 privsep yes TrustedUserCAKeys connect
-certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked key
-certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked via KRL
-certified user keys: ed25519 privsep yes TrustedUserCAKeys empty KRL
-certified user keys: ed25519 privsep no TrustedUserCAKeys connect
-certified user keys: ed25519 privsep no TrustedUserCAKeys revoked key
-certified user keys: ed25519 privsep no TrustedUserCAKeys revoked via KRL
-certified user keys: ed25519 privsep no TrustedUserCAKeys empty KRL
-certified user keys: ed25519 TrustedUserCAKeys revoked CA key
-certified user keys: rsa privsep yes TrustedUserCAKeys connect
-certified user keys: rsa privsep yes TrustedUserCAKeys revoked key
-certified user keys: rsa privsep yes TrustedUserCAKeys revoked via KRL
-certified user keys: rsa privsep yes TrustedUserCAKeys empty KRL
-certified user keys: rsa privsep no TrustedUserCAKeys connect
-certified user keys: rsa privsep no TrustedUserCAKeys revoked key
-certified user keys: rsa privsep no TrustedUserCAKeys revoked via KRL
-certified user keys: rsa privsep no TrustedUserCAKeys empty KRL
-certified user keys: rsa TrustedUserCAKeys revoked CA key
-certified user keys: dsa privsep yes TrustedUserCAKeys connect
-certified user keys: dsa privsep yes TrustedUserCAKeys revoked key
-certified user keys: dsa privsep yes TrustedUserCAKeys revoked via KRL
-certified user keys: dsa privsep yes TrustedUserCAKeys empty KRL
-certified user keys: dsa privsep no TrustedUserCAKeys connect
-certified user keys: dsa privsep no TrustedUserCAKeys revoked key
-certified user keys: dsa privsep no TrustedUserCAKeys revoked via KRL
-certified user keys: dsa privsep no TrustedUserCAKeys empty KRL
-certified user keys: dsa TrustedUserCAKeys revoked CA key
-certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys connect
-certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked key
-certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked via KRL
-certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys empty KRL
-certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys connect
-certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked key
-certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked via KRL
-certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys empty KRL
-certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked CA key
-certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys connect
-certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked key
-certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked via KRL
-certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys empty KRL
-certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys connect
-certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked key
-certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked via KRL
-certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys empty KRL
-certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked CA key
-certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys connect
-certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked key
-certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked via KRL
-certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys empty KRL
-certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys connect
-certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked key
-certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked via KRL
-certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys empty KRL
-certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked CA key
-certified user keys: rsa-sha2-256 privsep yes TrustedUserCAKeys connect
-certified user keys: rsa-sha2-256 privsep yes TrustedUserCAKeys revoked key
-certified user keys: rsa-sha2-256 privsep yes TrustedUserCAKeys revoked via KRL
-certified user keys: rsa-sha2-256 privsep yes TrustedUserCAKeys empty KRL
-certified user keys: rsa-sha2-256 privsep no TrustedUserCAKeys connect
-certified user keys: rsa-sha2-256 privsep no TrustedUserCAKeys revoked key
-certified user keys: rsa-sha2-256 privsep no TrustedUserCAKeys revoked via KRL
-certified user keys: rsa-sha2-256 privsep no TrustedUserCAKeys empty KRL
-certified user keys: rsa-sha2-256 TrustedUserCAKeys revoked CA key
-certified user keys: rsa-sha2-512 privsep yes TrustedUserCAKeys connect
-certified user keys: rsa-sha2-512 privsep yes TrustedUserCAKeys revoked key
-certified user keys: rsa-sha2-512 privsep yes TrustedUserCAKeys revoked via KRL
-certified user keys: rsa-sha2-512 privsep yes TrustedUserCAKeys empty KRL
-certified user keys: rsa-sha2-512 privsep no TrustedUserCAKeys connect
-certified user keys: rsa-sha2-512 privsep no TrustedUserCAKeys revoked key
-certified user keys: rsa-sha2-512 privsep no TrustedUserCAKeys revoked via KRL
-certified user keys: rsa-sha2-512 privsep no TrustedUserCAKeys empty KRL
-certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked CA key
-certified user keys: TrustedUserCAKeys CA does not authenticate
-certified user keys: ensure CA key does not authenticate user
-certified user keys: correct principal auth authorized_keys expect success rsa
-certified user keys: correct principal auth authorized_keys expect success ed25519
-certified user keys: correct principal auth TrustedUserCAKeys expect success rsa
-certified user keys: correct principal auth TrustedUserCAKeys expect success ed25519
-certified user keys: host-certificate auth authorized_keys expect failure rsa
-certified user keys: host-certificate auth authorized_keys expect failure ed25519
-certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa
-certified user keys: host-certificate auth TrustedUserCAKeys expect failure ed25519
-certified user keys: wrong principals auth authorized_keys expect failure rsa
-certified user keys: wrong principals auth authorized_keys expect failure ed25519
-certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa
-certified user keys: wrong principals auth TrustedUserCAKeys expect failure ed25519
-certified user keys: cert not yet valid auth authorized_keys expect failure rsa
-certified user keys: cert not yet valid auth authorized_keys expect failure ed25519
-certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa
-certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure ed25519
-certified user keys: cert expired auth authorized_keys expect failure rsa
-certified user keys: cert expired auth authorized_keys expect failure ed25519
-certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa
-certified user keys: cert expired auth TrustedUserCAKeys expect failure ed25519
-certified user keys: cert valid interval auth authorized_keys expect success rsa
-certified user keys: cert valid interval auth authorized_keys expect success ed25519
-certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa
-certified user keys: cert valid interval auth TrustedUserCAKeys expect success ed25519
-certified user keys: wrong source-address auth authorized_keys expect failure rsa
-certified user keys: wrong source-address auth authorized_keys expect failure ed25519
-certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa
-certified user keys: wrong source-address auth TrustedUserCAKeys expect failure ed25519
-certified user keys: force-command auth authorized_keys expect failure rsa
-certified user keys: force-command auth authorized_keys expect failure ed25519
-certified user keys: force-command auth TrustedUserCAKeys expect failure rsa
-certified user keys: force-command auth TrustedUserCAKeys expect failure ed25519
-certified user keys: empty principals auth authorized_keys expect success rsa
-certified user keys: empty principals auth authorized_keys expect success ed25519
-certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa
-certified user keys: empty principals auth TrustedUserCAKeys expect failure ed25519
-certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa
-certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success ed25519
-certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa
-certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure ed25519
-certified user keys: principals key option principals auth authorized_keys expect success rsa
-certified user keys: principals key option principals auth authorized_keys expect success ed25519
-certified user keys: principals key option no principals auth authorized_keys expect failure rsa
-certified user keys: principals key option no principals auth authorized_keys expect failure ed25519
-certified user keys: force-command match true auth authorized_keys expect success rsa
-certified user keys: force-command match true auth authorized_keys expect success ed25519
-certified user keys: force-command match true auth authorized_keys expect failure rsa
-certified user keys: force-command match true auth authorized_keys expect failure ed25519
-certified user keys: force-command mismatch 1 auth authorized_keys expect failure rsa
-certified user keys: force-command mismatch 1 auth authorized_keys expect failure ed25519
-certified user keys: force-command mismatch 2 auth authorized_keys expect failure rsa
-certified user keys: force-command mismatch 2 auth authorized_keys expect failure ed25519
-certified user keys: user ed25519 connect wrong cert
-certified user keys: user rsa connect wrong cert
-certified user keys: user dsa connect wrong cert
-certified user keys: user ecdsa-sha2-nistp256 connect wrong cert
-certified user keys: user ecdsa-sha2-nistp384 connect wrong cert
-certified user keys: user ecdsa-sha2-nistp521 connect wrong cert
-certified user keys: user rsa-sha2-256 connect wrong cert
-certified user keys: user rsa-sha2-512 connect wrong cert
-PASS: certified user keys
-run test host-expand.sh ...
-PASS: expand %h and %n
-run test keys-command.sh ...
-AuthorizedKeysCommand with arguments
-AuthorizedKeysCommand without arguments
-PASS: authorized keys from command
-run test forward-control.sh ...
-check_lfwd done (expecting Y): default configuration
-check_rfwd done (expecting Y): default configuration
-check_lfwd done (expecting Y): AllowTcpForwarding=yes
-check_rfwd done (expecting Y): AllowTcpForwarding=yes
-check_lfwd done (expecting N): AllowTcpForwarding=yes, !PermitOpen
-check_rfwd done (expecting Y): AllowTcpForwarding=yes, !PermitOpen
-check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen
-check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen
-check_lfwd done (expecting N): AllowTcpForwarding=yes, !permitopen
-check_rfwd done (expecting Y): AllowTcpForwarding=yes, !permitopen
-check_lfwd done (expecting Y): AllowTcpForwarding=yes, permitopen
-check_rfwd done (expecting Y): AllowTcpForwarding=yes, permitopen
-check_lfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding
-check_rfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding
-check_lfwd done (expecting N): AllowTcpForwarding=yes, restrict
-check_rfwd done (expecting N): AllowTcpForwarding=yes, restrict
-check_lfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding
-check_rfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding
-check_lfwd done (expecting Y): AllowTcpForwarding=local
-check_rfwd done (expecting N): AllowTcpForwarding=local
-check_lfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen
-check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen
-check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitOpen
-check_rfwd done (expecting N): AllowTcpForwarding=local, PermitOpen
-check_lfwd done (expecting N): AllowTcpForwarding=local, !permitopen
-check_rfwd done (expecting N): AllowTcpForwarding=local, !permitopen
-check_lfwd done (expecting Y): AllowTcpForwarding=local, permitopen
-check_rfwd done (expecting N): AllowTcpForwarding=local, permitopen
-check_lfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding
-check_rfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding
-check_lfwd done (expecting N): AllowTcpForwarding=local, restrict
-check_rfwd done (expecting N): AllowTcpForwarding=local, restrict
-check_lfwd done (expecting Y): AllowTcpForwarding=local, restrict,port-forwarding
-check_rfwd done (expecting N): AllowTcpForwarding=local, restrict,port-forwarding
-check_lfwd done (expecting N): AllowTcpForwarding=remote
-check_rfwd done (expecting Y): AllowTcpForwarding=remote
-check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitOpen
-check_rfwd done (expecting Y): AllowTcpForwarding=remote, !PermitOpen
-check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitOpen
-check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitOpen
-check_lfwd done (expecting N): AllowTcpForwarding=remote, !permitopen
-check_rfwd done (expecting Y): AllowTcpForwarding=remote, !permitopen
-check_lfwd done (expecting N): AllowTcpForwarding=remote, permitopen
-check_rfwd done (expecting Y): AllowTcpForwarding=remote, permitopen
-check_lfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding
-check_rfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding
-check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict
-check_rfwd done (expecting N): AllowTcpForwarding=remote, restrict
-check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict,port-forwarding
-check_rfwd done (expecting Y): AllowTcpForwarding=remote, restrict,port-forwarding
-check_lfwd done (expecting N): AllowTcpForwarding=no
-check_rfwd done (expecting N): AllowTcpForwarding=no
-check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen
-check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen
-check_lfwd done (expecting N): AllowTcpForwarding=no, PermitOpen
-check_rfwd done (expecting N): AllowTcpForwarding=no, PermitOpen
-check_lfwd done (expecting N): AllowTcpForwarding=no, !permitopen
-check_rfwd done (expecting N): AllowTcpForwarding=no, !permitopen
-check_lfwd done (expecting N): AllowTcpForwarding=no, permitopen
-check_rfwd done (expecting N): AllowTcpForwarding=no, permitopen
-check_lfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding
-check_rfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding
-check_lfwd done (expecting N): AllowTcpForwarding=no, restrict
-check_rfwd done (expecting N): AllowTcpForwarding=no, restrict
-check_lfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding
-check_rfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding
-check_lfwd done (expecting Y): AllowTcpForwarding=yes, !PermitListen
-check_rfwd done (expecting N): AllowTcpForwarding=yes, !PermitListen
-check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen
-check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen
-check_lfwd done (expecting Y): AllowTcpForwarding=local, !PermitListen
-check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitListen
-check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitListen
-check_rfwd done (expecting N): AllowTcpForwarding=local, PermitListen
-check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen
-check_rfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen
-check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitListen
-check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitListen
-check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitListen
-check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitListen
-check_lfwd done (expecting N): AllowTcpForwarding=no, PermitListen
-check_rfwd done (expecting N): AllowTcpForwarding=no, PermitListen
-PASS: sshd control of local and remote forwarding
-run test integrity.sh ...
-test integrity: hmac-sha1 @2900
-test integrity: hmac-sha1 @2901
-test integrity: hmac-sha1 @2902
-test integrity: hmac-sha1 @2903
-test integrity: hmac-sha1 @2904
-test integrity: hmac-sha1 @2905
-test integrity: hmac-sha1 @2906
-test integrity: hmac-sha1 @2907
-test integrity: hmac-sha1 @2908
-test integrity: hmac-sha1 @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-sha1-96 @2900
-test integrity: hmac-sha1-96 @2901
-test integrity: hmac-sha1-96 @2902
-test integrity: hmac-sha1-96 @2903
-test integrity: hmac-sha1-96 @2904
-test integrity: hmac-sha1-96 @2905
-test integrity: hmac-sha1-96 @2906
-test integrity: hmac-sha1-96 @2907
-test integrity: hmac-sha1-96 @2908
-test integrity: hmac-sha1-96 @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-sha2-256 @2900
-test integrity: hmac-sha2-256 @2901
-test integrity: hmac-sha2-256 @2902
-test integrity: hmac-sha2-256 @2903
-test integrity: hmac-sha2-256 @2904
-test integrity: hmac-sha2-256 @2905
-test integrity: hmac-sha2-256 @2906
-test integrity: hmac-sha2-256 @2907
-test integrity: hmac-sha2-256 @2908
-test integrity: hmac-sha2-256 @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-sha2-512 @2900
-test integrity: hmac-sha2-512 @2901
-test integrity: hmac-sha2-512 @2902
-test integrity: hmac-sha2-512 @2903
-test integrity: hmac-sha2-512 @2904
-test integrity: hmac-sha2-512 @2905
-test integrity: hmac-sha2-512 @2906
-test integrity: hmac-sha2-512 @2907
-test integrity: hmac-sha2-512 @2908
-test integrity: hmac-sha2-512 @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-md5 @2900
-test integrity: hmac-md5 @2901
-test integrity: hmac-md5 @2902
-test integrity: hmac-md5 @2903
-test integrity: hmac-md5 @2904
-test integrity: hmac-md5 @2905
-test integrity: hmac-md5 @2906
-test integrity: hmac-md5 @2907
-test integrity: hmac-md5 @2908
-test integrity: hmac-md5 @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-md5-96 @2900
-test integrity: hmac-md5-96 @2901
-test integrity: hmac-md5-96 @2902
-test integrity: hmac-md5-96 @2903
-test integrity: hmac-md5-96 @2904
-test integrity: hmac-md5-96 @2905
-test integrity: hmac-md5-96 @2906
-test integrity: hmac-md5-96 @2907
-test integrity: hmac-md5-96 @2908
-test integrity: hmac-md5-96 @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: umac-64@openssh.com @2900
-test integrity: umac-64@openssh.com @2901
-test integrity: umac-64@openssh.com @2902
-test integrity: umac-64@openssh.com @2903
-test integrity: umac-64@openssh.com @2904
-test integrity: umac-64@openssh.com @2905
-test integrity: umac-64@openssh.com @2906
-test integrity: umac-64@openssh.com @2907
-test integrity: umac-64@openssh.com @2908
-test integrity: umac-64@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: umac-128@openssh.com @2900
-test integrity: umac-128@openssh.com @2901
-test integrity: umac-128@openssh.com @2902
-test integrity: umac-128@openssh.com @2903
-test integrity: umac-128@openssh.com @2904
-test integrity: umac-128@openssh.com @2905
-test integrity: umac-128@openssh.com @2906
-test integrity: umac-128@openssh.com @2907
-test integrity: umac-128@openssh.com @2908
-test integrity: umac-128@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-sha1-etm@openssh.com @2900
-test integrity: hmac-sha1-etm@openssh.com @2901
-test integrity: hmac-sha1-etm@openssh.com @2902
-test integrity: hmac-sha1-etm@openssh.com @2903
-test integrity: hmac-sha1-etm@openssh.com @2904
-test integrity: hmac-sha1-etm@openssh.com @2905
-test integrity: hmac-sha1-etm@openssh.com @2906
-test integrity: hmac-sha1-etm@openssh.com @2907
-test integrity: hmac-sha1-etm@openssh.com @2908
-test integrity: hmac-sha1-etm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-sha1-96-etm@openssh.com @2900
-test integrity: hmac-sha1-96-etm@openssh.com @2901
-test integrity: hmac-sha1-96-etm@openssh.com @2902
-test integrity: hmac-sha1-96-etm@openssh.com @2903
-test integrity: hmac-sha1-96-etm@openssh.com @2904
-test integrity: hmac-sha1-96-etm@openssh.com @2905
-test integrity: hmac-sha1-96-etm@openssh.com @2906
-test integrity: hmac-sha1-96-etm@openssh.com @2907
-test integrity: hmac-sha1-96-etm@openssh.com @2908
-test integrity: hmac-sha1-96-etm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-sha2-256-etm@openssh.com @2900
-test integrity: hmac-sha2-256-etm@openssh.com @2901
-test integrity: hmac-sha2-256-etm@openssh.com @2902
-test integrity: hmac-sha2-256-etm@openssh.com @2903
-test integrity: hmac-sha2-256-etm@openssh.com @2904
-test integrity: hmac-sha2-256-etm@openssh.com @2905
-test integrity: hmac-sha2-256-etm@openssh.com @2906
-test integrity: hmac-sha2-256-etm@openssh.com @2907
-test integrity: hmac-sha2-256-etm@openssh.com @2908
-test integrity: hmac-sha2-256-etm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-sha2-512-etm@openssh.com @2900
-test integrity: hmac-sha2-512-etm@openssh.com @2901
-test integrity: hmac-sha2-512-etm@openssh.com @2902
-test integrity: hmac-sha2-512-etm@openssh.com @2903
-test integrity: hmac-sha2-512-etm@openssh.com @2904
-test integrity: hmac-sha2-512-etm@openssh.com @2905
-test integrity: hmac-sha2-512-etm@openssh.com @2906
-test integrity: hmac-sha2-512-etm@openssh.com @2907
-test integrity: hmac-sha2-512-etm@openssh.com @2908
-test integrity: hmac-sha2-512-etm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-md5-etm@openssh.com @2900
-test integrity: hmac-md5-etm@openssh.com @2901
-test integrity: hmac-md5-etm@openssh.com @2902
-test integrity: hmac-md5-etm@openssh.com @2903
-test integrity: hmac-md5-etm@openssh.com @2904
-test integrity: hmac-md5-etm@openssh.com @2905
-test integrity: hmac-md5-etm@openssh.com @2906
-test integrity: hmac-md5-etm@openssh.com @2907
-test integrity: hmac-md5-etm@openssh.com @2908
-test integrity: hmac-md5-etm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: hmac-md5-96-etm@openssh.com @2900
-test integrity: hmac-md5-96-etm@openssh.com @2901
-test integrity: hmac-md5-96-etm@openssh.com @2902
-test integrity: hmac-md5-96-etm@openssh.com @2903
-test integrity: hmac-md5-96-etm@openssh.com @2904
-test integrity: hmac-md5-96-etm@openssh.com @2905
-test integrity: hmac-md5-96-etm@openssh.com @2906
-test integrity: hmac-md5-96-etm@openssh.com @2907
-test integrity: hmac-md5-96-etm@openssh.com @2908
-test integrity: hmac-md5-96-etm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: umac-64-etm@openssh.com @2900
-test integrity: umac-64-etm@openssh.com @2901
-test integrity: umac-64-etm@openssh.com @2902
-test integrity: umac-64-etm@openssh.com @2903
-test integrity: umac-64-etm@openssh.com @2904
-test integrity: umac-64-etm@openssh.com @2905
-test integrity: umac-64-etm@openssh.com @2906
-test integrity: umac-64-etm@openssh.com @2907
-test integrity: umac-64-etm@openssh.com @2908
-test integrity: umac-64-etm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: umac-128-etm@openssh.com @2900
-test integrity: umac-128-etm@openssh.com @2901
-test integrity: umac-128-etm@openssh.com @2902
-test integrity: umac-128-etm@openssh.com @2903
-test integrity: umac-128-etm@openssh.com @2904
-test integrity: umac-128-etm@openssh.com @2905
-test integrity: umac-128-etm@openssh.com @2906
-test integrity: umac-128-etm@openssh.com @2907
-test integrity: umac-128-etm@openssh.com @2908
-test integrity: umac-128-etm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: aes128-gcm@openssh.com @2900
-test integrity: aes128-gcm@openssh.com @2901
-test integrity: aes128-gcm@openssh.com @2902
-test integrity: aes128-gcm@openssh.com @2903
-test integrity: aes128-gcm@openssh.com @2904
-test integrity: aes128-gcm@openssh.com @2905
-test integrity: aes128-gcm@openssh.com @2906
-test integrity: aes128-gcm@openssh.com @2907
-test integrity: aes128-gcm@openssh.com @2908
-test integrity: aes128-gcm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: aes256-gcm@openssh.com @2900
-test integrity: aes256-gcm@openssh.com @2901
-test integrity: aes256-gcm@openssh.com @2902
-test integrity: aes256-gcm@openssh.com @2903
-test integrity: aes256-gcm@openssh.com @2904
-test integrity: aes256-gcm@openssh.com @2905
-test integrity: aes256-gcm@openssh.com @2906
-test integrity: aes256-gcm@openssh.com @2907
-test integrity: aes256-gcm@openssh.com @2908
-test integrity: aes256-gcm@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-test integrity: chacha20-poly1305@openssh.com @2900
-test integrity: chacha20-poly1305@openssh.com @2901
-test integrity: chacha20-poly1305@openssh.com @2902
-test integrity: chacha20-poly1305@openssh.com @2903
-test integrity: chacha20-poly1305@openssh.com @2904
-test integrity: chacha20-poly1305@openssh.com @2905
-test integrity: chacha20-poly1305@openssh.com @2906
-test integrity: chacha20-poly1305@openssh.com @2907
-test integrity: chacha20-poly1305@openssh.com @2908
-test integrity: chacha20-poly1305@openssh.com @2909
-test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
-PASS: integrity
-run test krl.sh ...
-key revocation lists: generating test keys
-key revocation lists: generating KRLs
-key revocation lists: checking revocations for revoked keys
-key revocation lists: checking revocations for unrevoked keys
-key revocation lists: checking revocations for revoked certs
-key revocation lists: checking revocations for unrevoked certs
-key revocation lists: testing KRL update
-key revocation lists: checking revocations for revoked keys
-key revocation lists: checking revocations for unrevoked keys
-key revocation lists: checking revocations for revoked certs
-key revocation lists: checking revocations for unrevoked certs
-PASS: key revocation lists
-run test multipubkey.sh ...
-PASS: multiple pubkey
-run test limit-keytype.sh ...
-allow rsa,ed25519
-allow ed25519
-allow cert only
-match w/ no match
-match w/ matching
-PASS: restrict pubkey type
-run test hostkey-agent.sh ...
-key type ssh-ed25519 privsep=no
-key type ssh-rsa privsep=no
-key type ssh-dss privsep=no
-key type ecdsa-sha2-nistp256 privsep=no
-key type ecdsa-sha2-nistp384 privsep=no
-key type ecdsa-sha2-nistp521 privsep=no
-key type ssh-ed25519 privsep=yes
-key type ssh-rsa privsep=yes
-key type ssh-dss privsep=yes
-key type ecdsa-sha2-nistp256 privsep=yes
-key type ecdsa-sha2-nistp384 privsep=yes
-key type ecdsa-sha2-nistp521 privsep=yes
-PASS: hostkey agent
-run test keygen-knownhosts.sh ...
-/usr/lib/openssh/ptest/regress/kh.hosts updated.
-Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old
-/usr/lib/openssh/ptest/regress/kh.hosts updated.
-Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old
-/usr/lib/openssh/ptest/regress/kh.hosts updated.
-Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old
-/usr/lib/openssh/ptest/regress/kh.hosts updated.
-Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old
-/usr/lib/openssh/ptest/regress/kh.hashed updated.
-Original contents retained as /usr/lib/openssh/ptest/regress/kh.hashed.old
-PASS: ssh-keygen known_hosts
-run test hostkey-rotate.sh ...
-learn hostkey with StrictHostKeyChecking=no
-learn additional hostkeys
-learn additional hostkeys, type=ssh-ed25519
-learn additional hostkeys, type=ssh-rsa
-learn additional hostkeys, type=ssh-dss
-learn additional hostkeys, type=ecdsa-sha2-nistp256
-learn additional hostkeys, type=ecdsa-sha2-nistp384
-learn additional hostkeys, type=ecdsa-sha2-nistp521
-learn changed non-primary hostkey
-learn new primary hostkey
-rotate primary hostkey
-check rotate primary hostkey
-PASS: hostkey rotate
-run test principals-command.sh ...
-authorized principals command: privsep yes empty authorized_principals
-authorized principals command: privsep yes wrong authorized_principals
-authorized principals command: privsep yes correct authorized_principals
-authorized principals command: privsep yes authorized_principals bad key opt
-authorized principals command: privsep yes authorized_principals command=false
-authorized principals command: privsep yes authorized_principals command=true
-authorized principals command: privsep yes wrong principals key option
-authorized principals command: privsep yes correct principals key option
-authorized principals command: privsep no empty authorized_principals
-authorized principals command: privsep no wrong authorized_principals
-authorized principals command: privsep no correct authorized_principals
-authorized principals command: privsep no authorized_principals bad key opt
-authorized principals command: privsep no authorized_principals command=false
-authorized principals command: privsep no authorized_principals command=true
-authorized principals command: privsep no wrong principals key option
-authorized principals command: privsep no correct principals key option
-PASS: authorized principals command
-run test cert-file.sh ...
-identity cert with no plain public file
-CertificateFile with no plain public file
-plain keys
-untrusted cert
-good cert, bad key
-single trusted
-multiple trusted
-PASS: ssh with certificates
-run test cfginclude.sh ...
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-Pseudo-terminal will not be allocated because stdin is not a terminal.
-PASS: config include
-run test allow-deny-users.sh ...
-PASS: AllowUsers/DenyUsers
-run test authinfo.sh ...
-ExposeAuthInfo=no
-ExposeAuthInfo=yes
-PASS: authinfo
-make: Target 'tests' not remade because of errors.
-PASS: ptrace agent
-DURATION: 955