diff options
Diffstat (limited to 'runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log')
-rw-r--r-- | runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log | 1667 |
1 files changed, 1667 insertions, 0 deletions
diff --git a/runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log b/runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log new file mode 100644 index 00000000000..2a646a92615 --- /dev/null +++ b/runtime/poky/qemux86-64/core-image-sato-sdk-ptest/ptest-openssh.log @@ -0,0 +1,1667 @@ +2019-06-07T01:53 +2019-06-07T01:53 +test "x" = "x" || mkdir -p /valgrind-out +set -e ; if test -z "" ; then \ + V="" ; \ + test "x" = "x" || \ + V=/usr/lib/openssh/ptest/regress/valgrind-unit.sh ; \ + $V /usr/lib/openssh/ptest/regress/unittests/sshbuf/test_sshbuf ; \ + $V /usr/lib/openssh/ptest/regress/unittests/sshkey/test_sshkey \ + -d /usr/lib/openssh/ptest/regress/unittests/sshkey/testdata ; \ + $V /usr/lib/openssh/ptest/regress/unittests/bitmap/test_bitmap ; \ + $V /usr/lib/openssh/ptest/regress/unittests/conversion/test_conversion ; \ + $V /usr/lib/openssh/ptest/regress/unittests/kex/test_kex ; \ + $V /usr/lib/openssh/ptest/regress/unittests/hostkeys/test_hostkeys \ + -d /usr/lib/openssh/ptest/regress/unittests/hostkeys/testdata ; \ + $V /usr/lib/openssh/ptest/regress/unittests/match/test_match ; \ + if test "x" = "xyes" ; then \ + $V /usr/lib/openssh/ptest/regress/unittests/utf8/test_utf8 ; \ + fi \ +fi +/bin/sh: line 4: /usr/lib/openssh/ptest/regress/unittests/sshbuf/test_sshbuf: No such file or directory +make: *** [Makefile:229: unit] Error 127 +ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv +tr '\n' '\r' </usr/lib/openssh/ptest/regress/rsa_ssh2.prv > /usr/lib/openssh/ptest/regress/rsa_ssh2_cr.prv +ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_cr.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv +awk '{print $0 "\r"}' /usr/lib/openssh/ptest/regress/rsa_ssh2.prv > /usr/lib/openssh/ptest/regress/rsa_ssh2_crnl.prv +ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_crnl.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv +cat /usr/lib/openssh/ptest/regress/rsa_openssh.prv > /t2.out +chmod 600 /t2.out +ssh-keygen -yf /t2.out | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub +ssh-keygen -ef /usr/lib/openssh/ptest/regress/rsa_openssh.pub >/t3.out +ssh-keygen -if /t3.out | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub +ssh-keygen -E md5 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\ + awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t4.ok +ssh-keygen -Bf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\ + awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t5.ok +ssh-keygen -if /usr/lib/openssh/ptest/regress/dsa_ssh2.prv > /t6.out1 +ssh-keygen -if /usr/lib/openssh/ptest/regress/dsa_ssh2.pub > /t6.out2 +chmod 600 /t6.out1 +ssh-keygen -yf /t6.out1 | diff - /t6.out2 +ssh-keygen -q -t rsa -N '' -f /t7.out +ssh-keygen -lf /t7.out > /dev/null +ssh-keygen -Bf /t7.out > /dev/null +ssh-keygen -q -t dsa -N '' -f /t8.out +ssh-keygen -lf /t8.out > /dev/null +ssh-keygen -Bf /t8.out > /dev/null +test "" != yes || \ +ssh-keygen -q -t ecdsa -N '' -f /t9.out +test "" != yes || \ +ssh-keygen -lf /t9.out > /dev/null +test "" != yes || \ +ssh-keygen -Bf /t9.out > /dev/null +ssh-keygen -q -t ed25519 -N '' -f /t10.out +ssh-keygen -lf /t10.out > /dev/null +ssh-keygen -Bf /t10.out > /dev/null +ssh-keygen -E sha256 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\ + awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t11.ok +ssh-keygen -q -t ed25519 -N '' -C 'test-comment-1234' -f /t12.out +ssh-keygen -lf /t12.out.pub | grep test-comment-1234 >/dev/null +run test connect.sh ... +PASS: simple connect +run test proxy-connect.sh ... +plain username comp=no +plain username comp=yes +username with style +PASS: proxy connect +run test connect-privsep.sh ... +PASS: proxy connect with privsep +run test connect-uri.sh ... +uri connect: no trailing slash +uri connect: trailing slash +uri connect: with path name +PASS: uri connect +run test proto-version.sh ... +PASS: sshd version with different protocol combinations +run test proto-mismatch.sh ... +run test exit-status.sh ... +PASS: protocol version mismatch +test remote exit status: status 0 +test remote exit status: status 1 +test remote exit status: status 4 +test remote exit status: status 5 +test remote exit status: status 44 +PASS: remote exit status +run test envpass.sh ... +test environment passing: pass env, don't accept +test environment passing: don't pass env, accept +test environment passing: pass single env, accept single env +test environment passing: pass multiple env, accept multiple env +PASS: environment passing +run test transfer.sh ... +PASS: transfer data +run test banner.sh ... +test banner: missing banner file +test banner: size 0 +test banner: size 10 +test banner: size 100 +test banner: size 1000 +test banner: size 10000 +test banner: size 100000 +test banner: suppress banner (-q) +PASS: banner +run test rekey.sh ... +client rekey KexAlgorithms=diffie-hellman-group1-sha1 +client rekey KexAlgorithms=diffie-hellman-group14-sha1 +client rekey KexAlgorithms=diffie-hellman-group14-sha256 +client rekey KexAlgorithms=diffie-hellman-group16-sha512 +client rekey KexAlgorithms=diffie-hellman-group18-sha512 +client rekey KexAlgorithms=diffie-hellman-group-exchange-sha1 +client rekey KexAlgorithms=diffie-hellman-group-exchange-sha256 +client rekey KexAlgorithms=ecdh-sha2-nistp256 +client rekey KexAlgorithms=ecdh-sha2-nistp384 +client rekey KexAlgorithms=ecdh-sha2-nistp521 +client rekey KexAlgorithms=curve25519-sha256 +client rekey KexAlgorithms=curve25519-sha256@libssh.org +client rekey KexAlgorithms=sntrup4591761x25519-sha512@tinyssh.org +client rekey Ciphers=3des-cbc +client rekey Ciphers=aes128-cbc +client rekey Ciphers=aes192-cbc +client rekey Ciphers=aes256-cbc +client rekey Ciphers=rijndael-cbc@lysator.liu.se +client rekey Ciphers=aes128-ctr +client rekey Ciphers=aes192-ctr +client rekey Ciphers=aes256-ctr +client rekey Ciphers=aes128-gcm@openssh.com +client rekey Ciphers=aes256-gcm@openssh.com +client rekey Ciphers=chacha20-poly1305@openssh.com +client rekey MACs=hmac-sha1 +client rekey MACs=hmac-sha1-96 +client rekey MACs=hmac-sha2-256 +client rekey MACs=hmac-sha2-512 +client rekey MACs=hmac-md5 +client rekey MACs=hmac-md5-96 +client rekey MACs=umac-64@openssh.com +client rekey MACs=umac-128@openssh.com +client rekey MACs=hmac-sha1-etm@openssh.com +client rekey MACs=hmac-sha1-96-etm@openssh.com +client rekey MACs=hmac-sha2-256-etm@openssh.com +client rekey MACs=hmac-sha2-512-etm@openssh.com +client rekey MACs=hmac-md5-etm@openssh.com +client rekey MACs=hmac-md5-96-etm@openssh.com +client rekey MACs=umac-64-etm@openssh.com +client rekey MACs=umac-128-etm@openssh.com +client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1 +client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha1 +client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha256 +client rekey aes128-gcm@openssh.com diffie-hellman-group16-sha512 +client rekey aes128-gcm@openssh.com diffie-hellman-group18-sha512 +client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha1 +client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha256 +client rekey aes128-gcm@openssh.com ecdh-sha2-nistp256 +client rekey aes128-gcm@openssh.com ecdh-sha2-nistp384 +client rekey aes128-gcm@openssh.com ecdh-sha2-nistp521 +client rekey aes128-gcm@openssh.com curve25519-sha256 +client rekey aes128-gcm@openssh.com curve25519-sha256@libssh.org +client rekey aes128-gcm@openssh.com sntrup4591761x25519-sha512@tinyssh.org +client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1 +client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha1 +client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha256 +client rekey aes256-gcm@openssh.com diffie-hellman-group16-sha512 +client rekey aes256-gcm@openssh.com diffie-hellman-group18-sha512 +client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha1 +client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha256 +client rekey aes256-gcm@openssh.com ecdh-sha2-nistp256 +client rekey aes256-gcm@openssh.com ecdh-sha2-nistp384 +client rekey aes256-gcm@openssh.com ecdh-sha2-nistp521 +client rekey aes256-gcm@openssh.com curve25519-sha256 +client rekey aes256-gcm@openssh.com curve25519-sha256@libssh.org +client rekey aes256-gcm@openssh.com sntrup4591761x25519-sha512@tinyssh.org +client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha1 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha256 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group16-sha512 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group18-sha512 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha1 +client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha256 +client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp256 +client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp384 +client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp521 +client rekey chacha20-poly1305@openssh.com curve25519-sha256 +client rekey chacha20-poly1305@openssh.com curve25519-sha256@libssh.org +client rekey chacha20-poly1305@openssh.com sntrup4591761x25519-sha512@tinyssh.org +client rekeylimit 16 +client rekeylimit 1k +client rekeylimit 128k +client rekeylimit 256k +client rekeylimit default 5 +client rekeylimit default 10 +client rekeylimit default 5 no data +client rekeylimit default 10 no data +server rekeylimit 16 +server rekeylimit 1k +server rekeylimit 128k +server rekeylimit 256k +server rekeylimit default 5 no data +server rekeylimit default 10 no data +rekeylimit parsing +PASS: rekey +run test stderr-data.sh ... +test stderr data transfer: () +test stderr data transfer: (-n) +run test stderr-after-eof.sh ... +PASS: stderr data transfer +run test broken-pipe.sh ... +PASS: stderr data after eof +PASS: broken pipe test +run test try-ciphers.sh ... +test try ciphers: cipher 3des-cbc mac hmac-sha1 +test try ciphers: cipher 3des-cbc mac hmac-sha1-96 +test try ciphers: cipher 3des-cbc mac hmac-sha2-256 +test try ciphers: cipher 3des-cbc mac hmac-sha2-512 +test try ciphers: cipher 3des-cbc mac hmac-md5 +test try ciphers: cipher 3des-cbc mac hmac-md5-96 +test try ciphers: cipher 3des-cbc mac umac-64@openssh.com +test try ciphers: cipher 3des-cbc mac umac-128@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-sha1-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-md5-etm@openssh.com +test try ciphers: cipher 3des-cbc mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher 3des-cbc mac umac-64-etm@openssh.com +test try ciphers: cipher 3des-cbc mac umac-128-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha1 +test try ciphers: cipher aes128-cbc mac hmac-sha1-96 +test try ciphers: cipher aes128-cbc mac hmac-sha2-256 +test try ciphers: cipher aes128-cbc mac hmac-sha2-512 +test try ciphers: cipher aes128-cbc mac hmac-md5 +test try ciphers: cipher aes128-cbc mac hmac-md5-96 +test try ciphers: cipher aes128-cbc mac umac-64@openssh.com +test try ciphers: cipher aes128-cbc mac umac-128@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes128-cbc mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes128-cbc mac umac-64-etm@openssh.com +test try ciphers: cipher aes128-cbc mac umac-128-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha1 +test try ciphers: cipher aes192-cbc mac hmac-sha1-96 +test try ciphers: cipher aes192-cbc mac hmac-sha2-256 +test try ciphers: cipher aes192-cbc mac hmac-sha2-512 +test try ciphers: cipher aes192-cbc mac hmac-md5 +test try ciphers: cipher aes192-cbc mac hmac-md5-96 +test try ciphers: cipher aes192-cbc mac umac-64@openssh.com +test try ciphers: cipher aes192-cbc mac umac-128@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes192-cbc mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes192-cbc mac umac-64-etm@openssh.com +test try ciphers: cipher aes192-cbc mac umac-128-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha1 +test try ciphers: cipher aes256-cbc mac hmac-sha1-96 +test try ciphers: cipher aes256-cbc mac hmac-sha2-256 +test try ciphers: cipher aes256-cbc mac hmac-sha2-512 +test try ciphers: cipher aes256-cbc mac hmac-md5 +test try ciphers: cipher aes256-cbc mac hmac-md5-96 +test try ciphers: cipher aes256-cbc mac umac-64@openssh.com +test try ciphers: cipher aes256-cbc mac umac-128@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes256-cbc mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes256-cbc mac umac-64-etm@openssh.com +test try ciphers: cipher aes256-cbc mac umac-128-etm@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha1 +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96 +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256 +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512 +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-md5 +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96 +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac umac-64@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac umac-128@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-etm@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-md5-etm@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac umac-64-etm@openssh.com +test try ciphers: cipher rijndael-cbc@lysator.liu.se mac umac-128-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha1 +test try ciphers: cipher aes128-ctr mac hmac-sha1-96 +test try ciphers: cipher aes128-ctr mac hmac-sha2-256 +test try ciphers: cipher aes128-ctr mac hmac-sha2-512 +test try ciphers: cipher aes128-ctr mac hmac-md5 +test try ciphers: cipher aes128-ctr mac hmac-md5-96 +test try ciphers: cipher aes128-ctr mac umac-64@openssh.com +test try ciphers: cipher aes128-ctr mac umac-128@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes128-ctr mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes128-ctr mac umac-64-etm@openssh.com +test try ciphers: cipher aes128-ctr mac umac-128-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha1 +test try ciphers: cipher aes192-ctr mac hmac-sha1-96 +test try ciphers: cipher aes192-ctr mac hmac-sha2-256 +test try ciphers: cipher aes192-ctr mac hmac-sha2-512 +test try ciphers: cipher aes192-ctr mac hmac-md5 +test try ciphers: cipher aes192-ctr mac hmac-md5-96 +test try ciphers: cipher aes192-ctr mac umac-64@openssh.com +test try ciphers: cipher aes192-ctr mac umac-128@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes192-ctr mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes192-ctr mac umac-64-etm@openssh.com +test try ciphers: cipher aes192-ctr mac umac-128-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha1 +test try ciphers: cipher aes256-ctr mac hmac-sha1-96 +test try ciphers: cipher aes256-ctr mac hmac-sha2-256 +test try ciphers: cipher aes256-ctr mac hmac-sha2-512 +test try ciphers: cipher aes256-ctr mac hmac-md5 +test try ciphers: cipher aes256-ctr mac hmac-md5-96 +test try ciphers: cipher aes256-ctr mac umac-64@openssh.com +test try ciphers: cipher aes256-ctr mac umac-128@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha1-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha1-96-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha2-256-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-sha2-512-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-md5-etm@openssh.com +test try ciphers: cipher aes256-ctr mac hmac-md5-96-etm@openssh.com +test try ciphers: cipher aes256-ctr mac umac-64-etm@openssh.com +test try ciphers: cipher aes256-ctr mac umac-128-etm@openssh.com +test try ciphers: cipher aes128-gcm@openssh.com mac hmac-sha1 +test try ciphers: cipher aes256-gcm@openssh.com mac hmac-sha1 +test try ciphers: cipher chacha20-poly1305@openssh.com mac hmac-sha1 +PASS: try ciphers +run test yes-head.sh ... +PASS: yes pipe head +run test login-timeout.sh ... +PASS: connect after login grace timeout +run test agent.sh ... +PASS: simple agent test +run test agent-getpeereid.sh ... +SKIP: (not supported on this platform) +run test agent-timeout.sh ... +PASS: agent timeout test +run test keyscan.sh ... +PASS: keyscan +run test keygen-change.sh ... +PASS: change passphrase for key +run test keygen-convert.sh ... +PASS: convert keys +run test keygen-moduli.sh ... +PASS: keygen moduli +run test key-options.sh ... +key option command="echo bar" +key option no-pty,command="echo bar" +key option pty default +SKIP: for no openpty(3) +key option pty no-pty +SKIP: for no openpty(3) +key option pty restrict +SKIP: for no openpty(3) +key option pty restrict,pty +SKIP: for no openpty(3) +key option environment +key option from="127.0.0.1" +key option from="127.0.0.0/8" +key option expiry-time default +key option expiry-time invalid +key option expiry-time expired +key option expiry-time valid +PASS: key options +run test scp.sh ... +scp: simple copy local file to local file +scp: simple copy local file to remote file +scp: simple copy remote file to local file +scp: simple copy local file to remote dir +scp: simple copy local file to local dir +scp: simple copy remote file to local dir +scp: recursive local dir to remote dir +scp: recursive local dir to local dir +scp: recursive remote dir to local dir +scp: shell metacharacters +scp: skipped file after scp -p with failed chown+utimes +scp: disallow bad server #0 +scp: disallow bad server #1 +scp: disallow bad server #2 +scp: disallow bad server #3 +scp: disallow bad server #4 +scp: detect non-directory target +/usr/lib/openssh/ptest/regress/copy2: Not a directory +PASS: scp +run test scp-uri.sh ... +scp-uri: simple copy local file to remote file +scp-uri: simple copy remote file to local file +scp-uri: simple copy local file to remote dir +scp-uri: simple copy remote file to local dir +scp-uri: recursive local dir to remote dir +scp-uri: recursive remote dir to local dir +PASS: scp-uri +run test sftp.sh ... +test basic sftp put/get: buffer_size 5 num_requests 1 +test basic sftp put/get: buffer_size 5 num_requests 2 +test basic sftp put/get: buffer_size 5 num_requests 10 +test basic sftp put/get: buffer_size 1000 num_requests 1 +test basic sftp put/get: buffer_size 1000 num_requests 2 +test basic sftp put/get: buffer_size 1000 num_requests 10 +test basic sftp put/get: buffer_size 32000 num_requests 1 +test basic sftp put/get: buffer_size 32000 num_requests 2 +test basic sftp put/get: buffer_size 32000 num_requests 10 +test basic sftp put/get: buffer_size 64000 num_requests 1 +test basic sftp put/get: buffer_size 64000 num_requests 2 +test basic sftp put/get: buffer_size 64000 num_requests 10 +PASS: basic sftp put/get +run test sftp-chroot.sh ... +test sftp in chroot: get +PASS: sftp in chroot +run test sftp-cmds.sh ... +sftp commands: lls +sftp commands: lls w/path +sftp commands: ls +sftp commands: shell +sftp commands: pwd +sftp commands: lpwd +sftp commands: quit +sftp commands: help +sftp commands: get +sftp commands: get quoted +sftp commands: get filename with quotes +sftp commands: get filename with spaces +sftp commands: get filename with glob metacharacters +sftp commands: get to directory +sftp commands: glob get to directory +sftp commands: get to local dir +sftp commands: glob get to local dir +sftp commands: put +sftp commands: put filename with quotes +sftp commands: put filename with spaces +sftp commands: put to directory +sftp commands: glob put to directory +sftp commands: put to local dir +sftp commands: glob put to local dir +sftp commands: rename +sftp commands: rename directory +sftp commands: ln +sftp commands: ln -s +sftp commands: mkdir +sftp commands: chdir +sftp commands: rmdir +sftp commands: lmkdir +sftp commands: lchdir +PASS: sftp commands +run test sftp-badcmds.sh ... +sftp invalid commands: get nonexistent +sftp invalid commands: glob get to nonexistent directory +sftp invalid commands: put nonexistent +sftp invalid commands: glob put to nonexistent directory +sftp invalid commands: rename nonexistent +sftp invalid commands: rename target exists (directory) +sftp invalid commands: glob put files to local file +PASS: sftp invalid commands +run test sftp-batch.sh ... +sftp batchfile: good commands +sftp batchfile: bad commands +sftp batchfile: comments and blanks +sftp batchfile: junk command +PASS: sftp batchfile +run test sftp-glob.sh ... +sftp glob: file glob +sftp glob: dir glob +sftp glob: quoted glob +sftp glob: escaped glob +sftp glob: escaped quote +sftp glob: quoted quote +sftp glob: single-quoted quote +sftp glob: escaped space +sftp glob: quoted space +sftp glob: escaped slash +sftp glob: quoted slash +sftp glob: escaped slash at EOL +sftp glob: quoted slash at EOL +sftp glob: escaped slash+quote +sftp glob: quoted slash+quote +PASS: sftp glob +run test sftp-perm.sh ... +sftp permissions: read-only upload +sftp permissions: read-only setstat +sftp permissions: read-only rm +sftp permissions: read-only mkdir +sftp permissions: read-only rmdir +sftp permissions: read-only posix-rename +sftp permissions: read-only oldrename +sftp permissions: read-only symlink +sftp permissions: read-only hardlink +sftp permissions: explicit open +sftp permissions: explicit read +sftp permissions: explicit write +sftp permissions: explicit lstat +sftp permissions: explicit opendir +sftp permissions: explicit readdir +sftp permissions: explicit setstat +sftp permissions: explicit remove +sftp permissions: explicit mkdir +sftp permissions: explicit rmdir +sftp permissions: explicit posix-rename +sftp permissions: explicit rename +sftp permissions: explicit symlink +sftp permissions: explicit hardlink +sftp permissions: explicit statvfs +PASS: sftp permissions +run test sftp-uri.sh ... +sftp-uri: non-interactive fetch to local file +sftp-uri: non-interactive fetch to local dir +sftp-uri: put to remote directory (trailing slash) +sftp-uri: put to remote directory (no slash) +PASS: sftp-uri +run test reconfigure.sh ... +PASS: simple connect after reconfigure +run test dynamic-forward.sh ... +SKIP: (no suitable ProxyCommand found) +run test forwarding.sh ... +Exit request sent. +Exit request sent. +Exit request sent. +Exit request sent. +Exit request sent. +Exit request sent. +Exit request sent. +Exit request sent. +PASS: local and remote forwarding +run test multiplex.sh ... +test connection multiplexing: envpass +test connection multiplexing: transfer +test connection multiplexing: forward +test connection multiplexing: status 0 +test connection multiplexing: status 1 +test connection multiplexing: status 4 +test connection multiplexing: status 5 +test connection multiplexing: status 44 +test connection multiplexing: cmd check +test connection multiplexing: cmd forward local (TCP) +test connection multiplexing: cmd forward remote (TCP) +test connection multiplexing: cmd forward local (UNIX) +test connection multiplexing: cmd forward remote (UNIX) +test connection multiplexing: cmd exit +test connection multiplexing: cmd stop +PASS: connection multiplexing +run test reexec.sh ... +test config passing +test reexec fallback +run test brokenkeys.sh ... +PASS: reexec tests +run test sshcfgparse.sh ... +PASS: broken keys +reparse minimal config +ssh -W opts +user first match +pubkeyacceptedkeytypes +PASS: ssh config parse +run test cfgparse.sh ... +reparse minimal config +Could not connect to agent "none": No such file or directory +reparse regress config +Could not connect to agent "none": No such file or directory +listenaddress order +PASS: sshd config parse +run test cfgmatch.sh ... +PASS: sshd_config match +run test cfgmatchlisten.sh ... +run test addrmatch.sh ... +PASS: sshd_config matchlisten +test first entry for user 192.168.0.1 somehost +test negative match for user 192.168.30.1 somehost +test no match for user 19.0.0.1 somehost +test list middle for user 10.255.255.254 somehost +test faked IP in hostname for user 192.168.30.1 192.168.0.1 +test bare IP4 address for user 1.1.1.1 somehost.example.com +test localaddress for user 19.0.0.1 somehost +test localport for user 19.0.0.1 somehost +test bare IP6 address for user ::1 somehost.example.com +test deny IPv6 for user ::2 somehost.exaple.com +test IP6 negated for user ::3 somehost +test IP6 no match for user ::4 somehost +test IP6 network for user 2000::1 somehost +test IP6 network for user 2001::1 somehost +test IP6 localaddress for user ::5 somehost +test IP6 localport for user ::5 somehost +PASS: address match +run test localcommand.sh ... +test localcommand: proto localcommand +PASS: localcommand +run test forcecommand.sh ... +PASS: forced command +run test portnum.sh ... +port number parsing: invalid port 0 +port number parsing: invalid port 65536 +port number parsing: invalid port 131073 +port number parsing: invalid port 2000blah +port number parsing: invalid port blah2000 +port number parsing: valid port 1 +port number parsing: valid port 22 +port number parsing: valid port 2222 +port number parsing: valid port 22222 +port number parsing: valid port 65535 +PASS: port number parsing +run test keytype.sh ... +keygen dsa, 1024 bits +keygen rsa, 2048 bits +keygen rsa, 3072 bits +keygen ed25519, 512 bits +keygen ecdsa, 256 bits +keygen ecdsa, 384 bits +keygen ecdsa, 521 bits +userkey dsa-1024, hostkey dsa-1024 +userkey dsa-1024, hostkey dsa-1024 +userkey dsa-1024, hostkey dsa-1024 +userkey rsa-2048, hostkey rsa-2048 +userkey rsa-2048, hostkey rsa-2048 +userkey rsa-2048, hostkey rsa-2048 +userkey rsa-3072, hostkey rsa-3072 +userkey rsa-3072, hostkey rsa-3072 +userkey rsa-3072, hostkey rsa-3072 +userkey ed25519-512, hostkey ed25519-512 +userkey ed25519-512, hostkey ed25519-512 +userkey ed25519-512, hostkey ed25519-512 +userkey ecdsa-256, hostkey ecdsa-256 +userkey ecdsa-256, hostkey ecdsa-256 +userkey ecdsa-256, hostkey ecdsa-256 +userkey ecdsa-384, hostkey ecdsa-384 +userkey ecdsa-384, hostkey ecdsa-384 +userkey ecdsa-384, hostkey ecdsa-384 +userkey ecdsa-521, hostkey ecdsa-521 +userkey ecdsa-521, hostkey ecdsa-521 +userkey ecdsa-521, hostkey ecdsa-521 +PASS: login with different key types +run test kextype.sh ... +kex diffie-hellman-group1-sha1 +kex diffie-hellman-group14-sha1 +kex diffie-hellman-group14-sha256 +kex diffie-hellman-group16-sha512 +kex diffie-hellman-group18-sha512 +kex diffie-hellman-group-exchange-sha1 +kex diffie-hellman-group-exchange-sha256 +kex ecdh-sha2-nistp256 +kex ecdh-sha2-nistp384 +kex ecdh-sha2-nistp521 +kex curve25519-sha256 +kex curve25519-sha256@libssh.org +kex sntrup4591761x25519-sha512@tinyssh.org +PASS: login with different key exchange algorithms +run test cert-hostkey.sh ... +Revoking from /usr/lib/openssh/ptest/regress/host_ca_key.pub +Revoking from /usr/lib/openssh/ptest/regress/host_ca_key2.pub +certified host keys: sign host ed25519 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ed25519.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ed25519-cert.pub +certified host keys: sign host rsa cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-cert.pub +certified host keys: sign host dsa cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_dsa.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_dsa-cert.pub +certified host keys: sign host ecdsa-sha2-nistp256 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp256.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp256-cert.pub +certified host keys: sign host ecdsa-sha2-nistp384 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp384.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp384-cert.pub +certified host keys: sign host ecdsa-sha2-nistp521 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp521.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp521-cert.pub +certified host keys: sign host rsa-sha2-256 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-256.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-256-cert.pub +certified host keys: sign host rsa-sha2-512 cert +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-512.pub +Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-512-cert.pub +certified host keys: host ed25519 cert connect privsep yes +certified host keys: ed25519 basic connect expect success yes +certified host keys: ed25519 empty KRL expect success yes +certified host keys: ed25519 KRL w/ plain key revoked expect success no +certified host keys: ed25519 KRL w/ cert revoked expect success no +certified host keys: ed25519 KRL w/ CA revoked expect success no +certified host keys: ed25519 empty plaintext revocation expect success yes +certified host keys: ed25519 plain key plaintext revocation expect success no +certified host keys: ed25519 cert plaintext revocation expect success no +certified host keys: ed25519 CA plaintext revocation expect success no +certified host keys: host rsa cert connect privsep yes +certified host keys: rsa basic connect expect success yes +certified host keys: rsa empty KRL expect success yes +certified host keys: rsa KRL w/ plain key revoked expect success no +certified host keys: rsa KRL w/ cert revoked expect success no +certified host keys: rsa KRL w/ CA revoked expect success no +certified host keys: rsa empty plaintext revocation expect success yes +certified host keys: rsa plain key plaintext revocation expect success no +certified host keys: rsa cert plaintext revocation expect success no +certified host keys: rsa CA plaintext revocation expect success no +certified host keys: host dsa cert connect privsep yes +certified host keys: dsa basic connect expect success yes +certified host keys: dsa empty KRL expect success yes +certified host keys: dsa KRL w/ plain key revoked expect success no +certified host keys: dsa KRL w/ cert revoked expect success no +certified host keys: dsa KRL w/ CA revoked expect success no +certified host keys: dsa empty plaintext revocation expect success yes +certified host keys: dsa plain key plaintext revocation expect success no +certified host keys: dsa cert plaintext revocation expect success no +certified host keys: dsa CA plaintext revocation expect success no +certified host keys: host ecdsa-sha2-nistp256 cert connect privsep yes +certified host keys: ecdsa-sha2-nistp256 basic connect expect success yes +certified host keys: ecdsa-sha2-nistp256 empty KRL expect success yes +certified host keys: ecdsa-sha2-nistp256 KRL w/ plain key revoked expect success no +certified host keys: ecdsa-sha2-nistp256 KRL w/ cert revoked expect success no +certified host keys: ecdsa-sha2-nistp256 KRL w/ CA revoked expect success no +certified host keys: ecdsa-sha2-nistp256 empty plaintext revocation expect success yes +certified host keys: ecdsa-sha2-nistp256 plain key plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp256 cert plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp256 CA plaintext revocation expect success no +certified host keys: host ecdsa-sha2-nistp384 cert connect privsep yes +certified host keys: ecdsa-sha2-nistp384 basic connect expect success yes +certified host keys: ecdsa-sha2-nistp384 empty KRL expect success yes +certified host keys: ecdsa-sha2-nistp384 KRL w/ plain key revoked expect success no +certified host keys: ecdsa-sha2-nistp384 KRL w/ cert revoked expect success no +certified host keys: ecdsa-sha2-nistp384 KRL w/ CA revoked expect success no +certified host keys: ecdsa-sha2-nistp384 empty plaintext revocation expect success yes +certified host keys: ecdsa-sha2-nistp384 plain key plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp384 cert plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp384 CA plaintext revocation expect success no +certified host keys: host ecdsa-sha2-nistp521 cert connect privsep yes +certified host keys: ecdsa-sha2-nistp521 basic connect expect success yes +certified host keys: ecdsa-sha2-nistp521 empty KRL expect success yes +certified host keys: ecdsa-sha2-nistp521 KRL w/ plain key revoked expect success no +certified host keys: ecdsa-sha2-nistp521 KRL w/ cert revoked expect success no +certified host keys: ecdsa-sha2-nistp521 KRL w/ CA revoked expect success no +certified host keys: ecdsa-sha2-nistp521 empty plaintext revocation expect success yes +certified host keys: ecdsa-sha2-nistp521 plain key plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp521 cert plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp521 CA plaintext revocation expect success no +certified host keys: host rsa-sha2-256 cert connect privsep yes +certified host keys: rsa-sha2-256 basic connect expect success yes +certified host keys: rsa-sha2-256 empty KRL expect success yes +certified host keys: rsa-sha2-256 KRL w/ plain key revoked expect success no +certified host keys: rsa-sha2-256 KRL w/ cert revoked expect success no +certified host keys: rsa-sha2-256 KRL w/ CA revoked expect success no +certified host keys: rsa-sha2-256 empty plaintext revocation expect success yes +certified host keys: rsa-sha2-256 plain key plaintext revocation expect success no +certified host keys: rsa-sha2-256 cert plaintext revocation expect success no +certified host keys: rsa-sha2-256 CA plaintext revocation expect success no +certified host keys: host rsa-sha2-512 cert connect privsep yes +certified host keys: rsa-sha2-512 basic connect expect success yes +certified host keys: rsa-sha2-512 empty KRL expect success yes +certified host keys: rsa-sha2-512 KRL w/ plain key revoked expect success no +certified host keys: rsa-sha2-512 KRL w/ cert revoked expect success no +certified host keys: rsa-sha2-512 KRL w/ CA revoked expect success no +certified host keys: rsa-sha2-512 empty plaintext revocation expect success yes +certified host keys: rsa-sha2-512 plain key plaintext revocation expect success no +certified host keys: rsa-sha2-512 cert plaintext revocation expect success no +certified host keys: rsa-sha2-512 CA plaintext revocation expect success no +certified host keys: host ed25519 cert connect privsep sandbox +certified host keys: ed25519 basic connect expect success yes +certified host keys: ed25519 empty KRL expect success yes +certified host keys: ed25519 KRL w/ plain key revoked expect success no +certified host keys: ed25519 KRL w/ cert revoked expect success no +certified host keys: ed25519 KRL w/ CA revoked expect success no +certified host keys: ed25519 empty plaintext revocation expect success yes +certified host keys: ed25519 plain key plaintext revocation expect success no +certified host keys: ed25519 cert plaintext revocation expect success no +certified host keys: ed25519 CA plaintext revocation expect success no +certified host keys: host rsa cert connect privsep sandbox +certified host keys: rsa basic connect expect success yes +certified host keys: rsa empty KRL expect success yes +certified host keys: rsa KRL w/ plain key revoked expect success no +certified host keys: rsa KRL w/ cert revoked expect success no +certified host keys: rsa KRL w/ CA revoked expect success no +certified host keys: rsa empty plaintext revocation expect success yes +certified host keys: rsa plain key plaintext revocation expect success no +certified host keys: rsa cert plaintext revocation expect success no +certified host keys: rsa CA plaintext revocation expect success no +certified host keys: host dsa cert connect privsep sandbox +certified host keys: dsa basic connect expect success yes +certified host keys: dsa empty KRL expect success yes +certified host keys: dsa KRL w/ plain key revoked expect success no +certified host keys: dsa KRL w/ cert revoked expect success no +certified host keys: dsa KRL w/ CA revoked expect success no +certified host keys: dsa empty plaintext revocation expect success yes +certified host keys: dsa plain key plaintext revocation expect success no +certified host keys: dsa cert plaintext revocation expect success no +certified host keys: dsa CA plaintext revocation expect success no +certified host keys: host ecdsa-sha2-nistp256 cert connect privsep sandbox +certified host keys: ecdsa-sha2-nistp256 basic connect expect success yes +certified host keys: ecdsa-sha2-nistp256 empty KRL expect success yes +certified host keys: ecdsa-sha2-nistp256 KRL w/ plain key revoked expect success no +certified host keys: ecdsa-sha2-nistp256 KRL w/ cert revoked expect success no +certified host keys: ecdsa-sha2-nistp256 KRL w/ CA revoked expect success no +certified host keys: ecdsa-sha2-nistp256 empty plaintext revocation expect success yes +certified host keys: ecdsa-sha2-nistp256 plain key plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp256 cert plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp256 CA plaintext revocation expect success no +certified host keys: host ecdsa-sha2-nistp384 cert connect privsep sandbox +certified host keys: ecdsa-sha2-nistp384 basic connect expect success yes +certified host keys: ecdsa-sha2-nistp384 empty KRL expect success yes +certified host keys: ecdsa-sha2-nistp384 KRL w/ plain key revoked expect success no +certified host keys: ecdsa-sha2-nistp384 KRL w/ cert revoked expect success no +certified host keys: ecdsa-sha2-nistp384 KRL w/ CA revoked expect success no +certified host keys: ecdsa-sha2-nistp384 empty plaintext revocation expect success yes +certified host keys: ecdsa-sha2-nistp384 plain key plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp384 cert plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp384 CA plaintext revocation expect success no +certified host keys: host ecdsa-sha2-nistp521 cert connect privsep sandbox +certified host keys: ecdsa-sha2-nistp521 basic connect expect success yes +certified host keys: ecdsa-sha2-nistp521 empty KRL expect success yes +certified host keys: ecdsa-sha2-nistp521 KRL w/ plain key revoked expect success no +certified host keys: ecdsa-sha2-nistp521 KRL w/ cert revoked expect success no +certified host keys: ecdsa-sha2-nistp521 KRL w/ CA revoked expect success no +certified host keys: ecdsa-sha2-nistp521 empty plaintext revocation expect success yes +certified host keys: ecdsa-sha2-nistp521 plain key plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp521 cert plaintext revocation expect success no +certified host keys: ecdsa-sha2-nistp521 CA plaintext revocation expect success no +certified host keys: host rsa-sha2-256 cert connect privsep sandbox +certified host keys: rsa-sha2-256 basic connect expect success yes +certified host keys: rsa-sha2-256 empty KRL expect success yes +certified host keys: rsa-sha2-256 KRL w/ plain key revoked expect success no +certified host keys: rsa-sha2-256 KRL w/ cert revoked expect success no +certified host keys: rsa-sha2-256 KRL w/ CA revoked expect success no +certified host keys: rsa-sha2-256 empty plaintext revocation expect success yes +certified host keys: rsa-sha2-256 plain key plaintext revocation expect success no +certified host keys: rsa-sha2-256 cert plaintext revocation expect success no +certified host keys: rsa-sha2-256 CA plaintext revocation expect success no +certified host keys: host rsa-sha2-512 cert connect privsep sandbox +certified host keys: rsa-sha2-512 basic connect expect success yes +certified host keys: rsa-sha2-512 empty KRL expect success yes +certified host keys: rsa-sha2-512 KRL w/ plain key revoked expect success no +certified host keys: rsa-sha2-512 KRL w/ cert revoked expect success no +certified host keys: rsa-sha2-512 KRL w/ CA revoked expect success no +certified host keys: rsa-sha2-512 empty plaintext revocation expect success yes +certified host keys: rsa-sha2-512 plain key plaintext revocation expect success no +certified host keys: rsa-sha2-512 cert plaintext revocation expect success no +certified host keys: rsa-sha2-512 CA plaintext revocation expect success no +certified host keys: host ed25519 revoked cert privsep yes +certified host keys: host rsa revoked cert privsep yes +certified host keys: host dsa revoked cert privsep yes +certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep yes +certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep yes +certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep yes +certified host keys: host rsa-sha2-256 revoked cert privsep yes +certified host keys: host rsa-sha2-512 revoked cert privsep yes +certified host keys: host ed25519 revoked cert privsep sandbox +certified host keys: host rsa revoked cert privsep sandbox +certified host keys: host dsa revoked cert privsep sandbox +certified host keys: host ecdsa-sha2-nistp256 revoked cert privsep sandbox +certified host keys: host ecdsa-sha2-nistp384 revoked cert privsep sandbox +certified host keys: host ecdsa-sha2-nistp521 revoked cert privsep sandbox +certified host keys: host rsa-sha2-256 revoked cert privsep sandbox +certified host keys: host rsa-sha2-512 revoked cert privsep sandbox +certified host keys: host ed25519 revoked cert +certified host keys: host rsa revoked cert +certified host keys: host dsa revoked cert +certified host keys: host ecdsa-sha2-nistp256 revoked cert +certified host keys: host ecdsa-sha2-nistp384 revoked cert +certified host keys: host ecdsa-sha2-nistp521 revoked cert +certified host keys: host rsa-sha2-256 revoked cert +certified host keys: host rsa-sha2-512 revoked cert +certified host keys: host ed25519 cert downgrade to raw key +certified host keys: host rsa cert downgrade to raw key +certified host keys: host dsa cert downgrade to raw key +certified host keys: host ecdsa-sha2-nistp256 cert downgrade to raw key +certified host keys: host ecdsa-sha2-nistp384 cert downgrade to raw key +certified host keys: host ecdsa-sha2-nistp521 cert downgrade to raw key +certified host keys: host rsa-sha2-256 cert downgrade to raw key +certified host keys: host rsa-sha2-512 cert downgrade to raw key +certified host keys: host ed25519 connect wrong cert +certified host keys: host rsa connect wrong cert +certified host keys: host dsa connect wrong cert +certified host keys: host ecdsa-sha2-nistp256 connect wrong cert +certified host keys: host ecdsa-sha2-nistp384 connect wrong cert +certified host keys: host ecdsa-sha2-nistp521 connect wrong cert +certified host keys: host rsa-sha2-256 connect wrong cert +certified host keys: host rsa-sha2-512 connect wrong cert +PASS: certified host keys +run test cert-userkey.sh ... +certified user keys: sign user ed25519 cert +certified user keys: sign user rsa cert +certified user keys: sign user dsa cert +certified user keys: sign user ecdsa-sha2-nistp256 cert +certified user keys: sign user ecdsa-sha2-nistp384 cert +certified user keys: sign user ecdsa-sha2-nistp521 cert +certified user keys: sign user rsa-sha2-256 cert +certified user keys: sign user rsa-sha2-512 cert +certified user keys: ed25519 privsep yes missing authorized_principals +certified user keys: ed25519 privsep yes empty authorized_principals +certified user keys: ed25519 privsep yes wrong authorized_principals +certified user keys: ed25519 privsep yes correct authorized_principals +certified user keys: ed25519 privsep yes authorized_principals bad key opt +certified user keys: ed25519 privsep yes authorized_principals command=false +certified user keys: ed25519 privsep yes authorized_principals command=true +certified user keys: ed25519 privsep yes wrong principals key option +certified user keys: ed25519 privsep yes correct principals key option +certified user keys: ed25519 privsep sandbox missing authorized_principals +certified user keys: ed25519 privsep sandbox empty authorized_principals +certified user keys: ed25519 privsep sandbox wrong authorized_principals +certified user keys: ed25519 privsep sandbox correct authorized_principals +certified user keys: ed25519 privsep sandbox authorized_principals bad key opt +certified user keys: ed25519 privsep sandbox authorized_principals command=false +certified user keys: ed25519 privsep sandbox authorized_principals command=true +certified user keys: ed25519 privsep sandbox wrong principals key option +certified user keys: ed25519 privsep sandbox correct principals key option +certified user keys: rsa privsep yes missing authorized_principals +certified user keys: rsa privsep yes empty authorized_principals +certified user keys: rsa privsep yes wrong authorized_principals +certified user keys: rsa privsep yes correct authorized_principals +certified user keys: rsa privsep yes authorized_principals bad key opt +certified user keys: rsa privsep yes authorized_principals command=false +certified user keys: rsa privsep yes authorized_principals command=true +certified user keys: rsa privsep yes wrong principals key option +certified user keys: rsa privsep yes correct principals key option +certified user keys: rsa privsep sandbox missing authorized_principals +certified user keys: rsa privsep sandbox empty authorized_principals +certified user keys: rsa privsep sandbox wrong authorized_principals +certified user keys: rsa privsep sandbox correct authorized_principals +certified user keys: rsa privsep sandbox authorized_principals bad key opt +certified user keys: rsa privsep sandbox authorized_principals command=false +certified user keys: rsa privsep sandbox authorized_principals command=true +certified user keys: rsa privsep sandbox wrong principals key option +certified user keys: rsa privsep sandbox correct principals key option +certified user keys: dsa privsep yes missing authorized_principals +certified user keys: dsa privsep yes empty authorized_principals +certified user keys: dsa privsep yes wrong authorized_principals +certified user keys: dsa privsep yes correct authorized_principals +certified user keys: dsa privsep yes authorized_principals bad key opt +certified user keys: dsa privsep yes authorized_principals command=false +certified user keys: dsa privsep yes authorized_principals command=true +certified user keys: dsa privsep yes wrong principals key option +certified user keys: dsa privsep yes correct principals key option +certified user keys: dsa privsep sandbox missing authorized_principals +certified user keys: dsa privsep sandbox empty authorized_principals +certified user keys: dsa privsep sandbox wrong authorized_principals +certified user keys: dsa privsep sandbox correct authorized_principals +certified user keys: dsa privsep sandbox authorized_principals bad key opt +certified user keys: dsa privsep sandbox authorized_principals command=false +certified user keys: dsa privsep sandbox authorized_principals command=true +certified user keys: dsa privsep sandbox wrong principals key option +certified user keys: dsa privsep sandbox correct principals key option +certified user keys: ecdsa-sha2-nistp256 privsep yes missing authorized_principals +certified user keys: ecdsa-sha2-nistp256 privsep yes empty authorized_principals +certified user keys: ecdsa-sha2-nistp256 privsep yes wrong authorized_principals +certified user keys: ecdsa-sha2-nistp256 privsep yes correct authorized_principals +certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals bad key opt +certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=false +certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_principals command=true +certified user keys: ecdsa-sha2-nistp256 privsep yes wrong principals key option +certified user keys: ecdsa-sha2-nistp256 privsep yes correct principals key option +certified user keys: ecdsa-sha2-nistp256 privsep sandbox missing authorized_principals +certified user keys: ecdsa-sha2-nistp256 privsep sandbox empty authorized_principals +certified user keys: ecdsa-sha2-nistp256 privsep sandbox wrong authorized_principals +certified user keys: ecdsa-sha2-nistp256 privsep sandbox correct authorized_principals +certified user keys: ecdsa-sha2-nistp256 privsep sandbox authorized_principals bad key opt +certified user keys: ecdsa-sha2-nistp256 privsep sandbox authorized_principals command=false +certified user keys: ecdsa-sha2-nistp256 privsep sandbox authorized_principals command=true +certified user keys: ecdsa-sha2-nistp256 privsep sandbox wrong principals key option +certified user keys: ecdsa-sha2-nistp256 privsep sandbox correct principals key option +certified user keys: ecdsa-sha2-nistp384 privsep yes missing authorized_principals +certified user keys: ecdsa-sha2-nistp384 privsep yes empty authorized_principals +certified user keys: ecdsa-sha2-nistp384 privsep yes wrong authorized_principals +certified user keys: ecdsa-sha2-nistp384 privsep yes correct authorized_principals +certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals bad key opt +certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=false +certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_principals command=true +certified user keys: ecdsa-sha2-nistp384 privsep yes wrong principals key option +certified user keys: ecdsa-sha2-nistp384 privsep yes correct principals key option +certified user keys: ecdsa-sha2-nistp384 privsep sandbox missing authorized_principals +certified user keys: ecdsa-sha2-nistp384 privsep sandbox empty authorized_principals +certified user keys: ecdsa-sha2-nistp384 privsep sandbox wrong authorized_principals +certified user keys: ecdsa-sha2-nistp384 privsep sandbox correct authorized_principals +certified user keys: ecdsa-sha2-nistp384 privsep sandbox authorized_principals bad key opt +certified user keys: ecdsa-sha2-nistp384 privsep sandbox authorized_principals command=false +certified user keys: ecdsa-sha2-nistp384 privsep sandbox authorized_principals command=true +certified user keys: ecdsa-sha2-nistp384 privsep sandbox wrong principals key option +certified user keys: ecdsa-sha2-nistp384 privsep sandbox correct principals key option +certified user keys: ecdsa-sha2-nistp521 privsep yes missing authorized_principals +certified user keys: ecdsa-sha2-nistp521 privsep yes empty authorized_principals +certified user keys: ecdsa-sha2-nistp521 privsep yes wrong authorized_principals +certified user keys: ecdsa-sha2-nistp521 privsep yes correct authorized_principals +certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals bad key opt +certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=false +certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_principals command=true +certified user keys: ecdsa-sha2-nistp521 privsep yes wrong principals key option +certified user keys: ecdsa-sha2-nistp521 privsep yes correct principals key option +certified user keys: ecdsa-sha2-nistp521 privsep sandbox missing authorized_principals +certified user keys: ecdsa-sha2-nistp521 privsep sandbox empty authorized_principals +certified user keys: ecdsa-sha2-nistp521 privsep sandbox wrong authorized_principals +certified user keys: ecdsa-sha2-nistp521 privsep sandbox correct authorized_principals +certified user keys: ecdsa-sha2-nistp521 privsep sandbox authorized_principals bad key opt +certified user keys: ecdsa-sha2-nistp521 privsep sandbox authorized_principals command=false +certified user keys: ecdsa-sha2-nistp521 privsep sandbox authorized_principals command=true +certified user keys: ecdsa-sha2-nistp521 privsep sandbox wrong principals key option +certified user keys: ecdsa-sha2-nistp521 privsep sandbox correct principals key option +certified user keys: rsa-sha2-256 privsep yes missing authorized_principals +certified user keys: rsa-sha2-256 privsep yes empty authorized_principals +certified user keys: rsa-sha2-256 privsep yes wrong authorized_principals +certified user keys: rsa-sha2-256 privsep yes correct authorized_principals +certified user keys: rsa-sha2-256 privsep yes authorized_principals bad key opt +certified user keys: rsa-sha2-256 privsep yes authorized_principals command=false +certified user keys: rsa-sha2-256 privsep yes authorized_principals command=true +certified user keys: rsa-sha2-256 privsep yes wrong principals key option +certified user keys: rsa-sha2-256 privsep yes correct principals key option +certified user keys: rsa-sha2-256 privsep sandbox missing authorized_principals +certified user keys: rsa-sha2-256 privsep sandbox empty authorized_principals +certified user keys: rsa-sha2-256 privsep sandbox wrong authorized_principals +certified user keys: rsa-sha2-256 privsep sandbox correct authorized_principals +certified user keys: rsa-sha2-256 privsep sandbox authorized_principals bad key opt +certified user keys: rsa-sha2-256 privsep sandbox authorized_principals command=false +certified user keys: rsa-sha2-256 privsep sandbox authorized_principals command=true +certified user keys: rsa-sha2-256 privsep sandbox wrong principals key option +certified user keys: rsa-sha2-256 privsep sandbox correct principals key option +certified user keys: rsa-sha2-512 privsep yes missing authorized_principals +certified user keys: rsa-sha2-512 privsep yes empty authorized_principals +certified user keys: rsa-sha2-512 privsep yes wrong authorized_principals +certified user keys: rsa-sha2-512 privsep yes correct authorized_principals +certified user keys: rsa-sha2-512 privsep yes authorized_principals bad key opt +certified user keys: rsa-sha2-512 privsep yes authorized_principals command=false +certified user keys: rsa-sha2-512 privsep yes authorized_principals command=true +certified user keys: rsa-sha2-512 privsep yes wrong principals key option +certified user keys: rsa-sha2-512 privsep yes correct principals key option +certified user keys: rsa-sha2-512 privsep sandbox missing authorized_principals +certified user keys: rsa-sha2-512 privsep sandbox empty authorized_principals +certified user keys: rsa-sha2-512 privsep sandbox wrong authorized_principals +certified user keys: rsa-sha2-512 privsep sandbox correct authorized_principals +certified user keys: rsa-sha2-512 privsep sandbox authorized_principals bad key opt +certified user keys: rsa-sha2-512 privsep sandbox authorized_principals command=false +certified user keys: rsa-sha2-512 privsep sandbox authorized_principals command=true +certified user keys: rsa-sha2-512 privsep sandbox wrong principals key option +certified user keys: rsa-sha2-512 privsep sandbox correct principals key option +certified user keys: ed25519 privsep yes authorized_keys connect +certified user keys: ed25519 privsep yes authorized_keys revoked key +certified user keys: ed25519 privsep yes authorized_keys revoked via KRL +certified user keys: ed25519 privsep yes authorized_keys empty KRL +certified user keys: ed25519 privsep no authorized_keys connect +certified user keys: ed25519 privsep no authorized_keys revoked key +certified user keys: ed25519 privsep no authorized_keys revoked via KRL +certified user keys: ed25519 privsep no authorized_keys empty KRL +certified user keys: ed25519 authorized_keys revoked CA key +certified user keys: rsa privsep yes authorized_keys connect +certified user keys: rsa privsep yes authorized_keys revoked key +certified user keys: rsa privsep yes authorized_keys revoked via KRL +certified user keys: rsa privsep yes authorized_keys empty KRL +certified user keys: rsa privsep no authorized_keys connect +certified user keys: rsa privsep no authorized_keys revoked key +certified user keys: rsa privsep no authorized_keys revoked via KRL +certified user keys: rsa privsep no authorized_keys empty KRL +certified user keys: rsa authorized_keys revoked CA key +certified user keys: dsa privsep yes authorized_keys connect +certified user keys: dsa privsep yes authorized_keys revoked key +certified user keys: dsa privsep yes authorized_keys revoked via KRL +certified user keys: dsa privsep yes authorized_keys empty KRL +certified user keys: dsa privsep no authorized_keys connect +certified user keys: dsa privsep no authorized_keys revoked key +certified user keys: dsa privsep no authorized_keys revoked via KRL +certified user keys: dsa privsep no authorized_keys empty KRL +certified user keys: dsa authorized_keys revoked CA key +certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys connect +certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked key +certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys revoked via KRL +certified user keys: ecdsa-sha2-nistp256 privsep yes authorized_keys empty KRL +certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys connect +certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked key +certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys revoked via KRL +certified user keys: ecdsa-sha2-nistp256 privsep no authorized_keys empty KRL +certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked CA key +certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys connect +certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked key +certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys revoked via KRL +certified user keys: ecdsa-sha2-nistp384 privsep yes authorized_keys empty KRL +certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys connect +certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked key +certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys revoked via KRL +certified user keys: ecdsa-sha2-nistp384 privsep no authorized_keys empty KRL +certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked CA key +certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys connect +certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked key +certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys revoked via KRL +certified user keys: ecdsa-sha2-nistp521 privsep yes authorized_keys empty KRL +certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys connect +certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked key +certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys revoked via KRL +certified user keys: ecdsa-sha2-nistp521 privsep no authorized_keys empty KRL +certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked CA key +certified user keys: rsa-sha2-256 privsep yes authorized_keys connect +certified user keys: rsa-sha2-256 privsep yes authorized_keys revoked key +certified user keys: rsa-sha2-256 privsep yes authorized_keys revoked via KRL +certified user keys: rsa-sha2-256 privsep yes authorized_keys empty KRL +certified user keys: rsa-sha2-256 privsep no authorized_keys connect +certified user keys: rsa-sha2-256 privsep no authorized_keys revoked key +certified user keys: rsa-sha2-256 privsep no authorized_keys revoked via KRL +certified user keys: rsa-sha2-256 privsep no authorized_keys empty KRL +certified user keys: rsa-sha2-256 authorized_keys revoked CA key +certified user keys: rsa-sha2-512 privsep yes authorized_keys connect +certified user keys: rsa-sha2-512 privsep yes authorized_keys revoked key +certified user keys: rsa-sha2-512 privsep yes authorized_keys revoked via KRL +certified user keys: rsa-sha2-512 privsep yes authorized_keys empty KRL +certified user keys: rsa-sha2-512 privsep no authorized_keys connect +certified user keys: rsa-sha2-512 privsep no authorized_keys revoked key +certified user keys: rsa-sha2-512 privsep no authorized_keys revoked via KRL +certified user keys: rsa-sha2-512 privsep no authorized_keys empty KRL +certified user keys: rsa-sha2-512 authorized_keys revoked CA key +certified user keys: authorized_keys CA does not authenticate +certified user keys: ensure CA key does not authenticate user +certified user keys: ed25519 privsep yes TrustedUserCAKeys connect +certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked key +certified user keys: ed25519 privsep yes TrustedUserCAKeys revoked via KRL +certified user keys: ed25519 privsep yes TrustedUserCAKeys empty KRL +certified user keys: ed25519 privsep no TrustedUserCAKeys connect +certified user keys: ed25519 privsep no TrustedUserCAKeys revoked key +certified user keys: ed25519 privsep no TrustedUserCAKeys revoked via KRL +certified user keys: ed25519 privsep no TrustedUserCAKeys empty KRL +certified user keys: ed25519 TrustedUserCAKeys revoked CA key +certified user keys: rsa privsep yes TrustedUserCAKeys connect +certified user keys: rsa privsep yes TrustedUserCAKeys revoked key +certified user keys: rsa privsep yes TrustedUserCAKeys revoked via KRL +certified user keys: rsa privsep yes TrustedUserCAKeys empty KRL +certified user keys: rsa privsep no TrustedUserCAKeys connect +certified user keys: rsa privsep no TrustedUserCAKeys revoked key +certified user keys: rsa privsep no TrustedUserCAKeys revoked via KRL +certified user keys: rsa privsep no TrustedUserCAKeys empty KRL +certified user keys: rsa TrustedUserCAKeys revoked CA key +certified user keys: dsa privsep yes TrustedUserCAKeys connect +certified user keys: dsa privsep yes TrustedUserCAKeys revoked key +certified user keys: dsa privsep yes TrustedUserCAKeys revoked via KRL +certified user keys: dsa privsep yes TrustedUserCAKeys empty KRL +certified user keys: dsa privsep no TrustedUserCAKeys connect +certified user keys: dsa privsep no TrustedUserCAKeys revoked key +certified user keys: dsa privsep no TrustedUserCAKeys revoked via KRL +certified user keys: dsa privsep no TrustedUserCAKeys empty KRL +certified user keys: dsa TrustedUserCAKeys revoked CA key +certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys connect +certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked key +certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys revoked via KRL +certified user keys: ecdsa-sha2-nistp256 privsep yes TrustedUserCAKeys empty KRL +certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys connect +certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked key +certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys revoked via KRL +certified user keys: ecdsa-sha2-nistp256 privsep no TrustedUserCAKeys empty KRL +certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked CA key +certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys connect +certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked key +certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys revoked via KRL +certified user keys: ecdsa-sha2-nistp384 privsep yes TrustedUserCAKeys empty KRL +certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys connect +certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked key +certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys revoked via KRL +certified user keys: ecdsa-sha2-nistp384 privsep no TrustedUserCAKeys empty KRL +certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked CA key +certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys connect +certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked key +certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys revoked via KRL +certified user keys: ecdsa-sha2-nistp521 privsep yes TrustedUserCAKeys empty KRL +certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys connect +certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked key +certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys revoked via KRL +certified user keys: ecdsa-sha2-nistp521 privsep no TrustedUserCAKeys empty KRL +certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked CA key +certified user keys: rsa-sha2-256 privsep yes TrustedUserCAKeys connect +certified user keys: rsa-sha2-256 privsep yes TrustedUserCAKeys revoked key +certified user keys: rsa-sha2-256 privsep yes TrustedUserCAKeys revoked via KRL +certified user keys: rsa-sha2-256 privsep yes TrustedUserCAKeys empty KRL +certified user keys: rsa-sha2-256 privsep no TrustedUserCAKeys connect +certified user keys: rsa-sha2-256 privsep no TrustedUserCAKeys revoked key +certified user keys: rsa-sha2-256 privsep no TrustedUserCAKeys revoked via KRL +certified user keys: rsa-sha2-256 privsep no TrustedUserCAKeys empty KRL +certified user keys: rsa-sha2-256 TrustedUserCAKeys revoked CA key +certified user keys: rsa-sha2-512 privsep yes TrustedUserCAKeys connect +certified user keys: rsa-sha2-512 privsep yes TrustedUserCAKeys revoked key +certified user keys: rsa-sha2-512 privsep yes TrustedUserCAKeys revoked via KRL +certified user keys: rsa-sha2-512 privsep yes TrustedUserCAKeys empty KRL +certified user keys: rsa-sha2-512 privsep no TrustedUserCAKeys connect +certified user keys: rsa-sha2-512 privsep no TrustedUserCAKeys revoked key +certified user keys: rsa-sha2-512 privsep no TrustedUserCAKeys revoked via KRL +certified user keys: rsa-sha2-512 privsep no TrustedUserCAKeys empty KRL +certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked CA key +certified user keys: TrustedUserCAKeys CA does not authenticate +certified user keys: ensure CA key does not authenticate user +certified user keys: correct principal auth authorized_keys expect success rsa +certified user keys: correct principal auth authorized_keys expect success ed25519 +certified user keys: correct principal auth TrustedUserCAKeys expect success rsa +certified user keys: correct principal auth TrustedUserCAKeys expect success ed25519 +certified user keys: host-certificate auth authorized_keys expect failure rsa +certified user keys: host-certificate auth authorized_keys expect failure ed25519 +certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa +certified user keys: host-certificate auth TrustedUserCAKeys expect failure ed25519 +certified user keys: wrong principals auth authorized_keys expect failure rsa +certified user keys: wrong principals auth authorized_keys expect failure ed25519 +certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa +certified user keys: wrong principals auth TrustedUserCAKeys expect failure ed25519 +certified user keys: cert not yet valid auth authorized_keys expect failure rsa +certified user keys: cert not yet valid auth authorized_keys expect failure ed25519 +certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa +certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure ed25519 +certified user keys: cert expired auth authorized_keys expect failure rsa +certified user keys: cert expired auth authorized_keys expect failure ed25519 +certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa +certified user keys: cert expired auth TrustedUserCAKeys expect failure ed25519 +certified user keys: cert valid interval auth authorized_keys expect success rsa +certified user keys: cert valid interval auth authorized_keys expect success ed25519 +certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa +certified user keys: cert valid interval auth TrustedUserCAKeys expect success ed25519 +certified user keys: wrong source-address auth authorized_keys expect failure rsa +certified user keys: wrong source-address auth authorized_keys expect failure ed25519 +certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa +certified user keys: wrong source-address auth TrustedUserCAKeys expect failure ed25519 +certified user keys: force-command auth authorized_keys expect failure rsa +certified user keys: force-command auth authorized_keys expect failure ed25519 +certified user keys: force-command auth TrustedUserCAKeys expect failure rsa +certified user keys: force-command auth TrustedUserCAKeys expect failure ed25519 +certified user keys: empty principals auth authorized_keys expect success rsa +certified user keys: empty principals auth authorized_keys expect success ed25519 +certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa +certified user keys: empty principals auth TrustedUserCAKeys expect failure ed25519 +certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa +certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success ed25519 +certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa +certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure ed25519 +certified user keys: principals key option principals auth authorized_keys expect success rsa +certified user keys: principals key option principals auth authorized_keys expect success ed25519 +certified user keys: principals key option no principals auth authorized_keys expect failure rsa +certified user keys: principals key option no principals auth authorized_keys expect failure ed25519 +certified user keys: force-command match true auth authorized_keys expect success rsa +certified user keys: force-command match true auth authorized_keys expect success ed25519 +certified user keys: force-command match true auth authorized_keys expect failure rsa +certified user keys: force-command match true auth authorized_keys expect failure ed25519 +certified user keys: force-command mismatch 1 auth authorized_keys expect failure rsa +certified user keys: force-command mismatch 1 auth authorized_keys expect failure ed25519 +certified user keys: force-command mismatch 2 auth authorized_keys expect failure rsa +certified user keys: force-command mismatch 2 auth authorized_keys expect failure ed25519 +certified user keys: user ed25519 connect wrong cert +certified user keys: user rsa connect wrong cert +certified user keys: user dsa connect wrong cert +certified user keys: user ecdsa-sha2-nistp256 connect wrong cert +certified user keys: user ecdsa-sha2-nistp384 connect wrong cert +certified user keys: user ecdsa-sha2-nistp521 connect wrong cert +certified user keys: user rsa-sha2-256 connect wrong cert +certified user keys: user rsa-sha2-512 connect wrong cert +PASS: certified user keys +run test host-expand.sh ... +PASS: expand %h and %n +run test keys-command.sh ... +/usr/lib/openssh/ptest/regress/keys-command.sh: line 17: /usr/lib/openssh/ptest/regress/rsa.pub: No such file or directory +ssh-keygen: /usr/lib/openssh/ptest/regress/rsa.pub: No such file or directory +AuthorizedKeysCommand with arguments +AuthorizedKeysCommand without arguments +PASS: authorized keys from command +run test forward-control.sh ... +check_lfwd done (expecting Y): default configuration +check_rfwd done (expecting Y): default configuration +check_lfwd done (expecting Y): AllowTcpForwarding=yes +check_rfwd done (expecting Y): AllowTcpForwarding=yes +check_lfwd done (expecting N): AllowTcpForwarding=yes, !PermitOpen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, !PermitOpen +check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=yes, !permitopen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, !permitopen +check_lfwd done (expecting Y): AllowTcpForwarding=yes, permitopen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, permitopen +check_lfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=yes, restrict +check_rfwd done (expecting N): AllowTcpForwarding=yes, restrict +check_lfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding +check_rfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding +check_lfwd done (expecting Y): AllowTcpForwarding=local +check_rfwd done (expecting N): AllowTcpForwarding=local +check_lfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen +check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen +check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitOpen +check_rfwd done (expecting N): AllowTcpForwarding=local, PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=local, !permitopen +check_rfwd done (expecting N): AllowTcpForwarding=local, !permitopen +check_lfwd done (expecting Y): AllowTcpForwarding=local, permitopen +check_rfwd done (expecting N): AllowTcpForwarding=local, permitopen +check_lfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=local, restrict +check_rfwd done (expecting N): AllowTcpForwarding=local, restrict +check_lfwd done (expecting Y): AllowTcpForwarding=local, restrict,port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=local, restrict,port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=remote +check_rfwd done (expecting Y): AllowTcpForwarding=remote +check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitOpen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, !PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitOpen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=remote, !permitopen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, !permitopen +check_lfwd done (expecting N): AllowTcpForwarding=remote, permitopen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, permitopen +check_lfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict +check_rfwd done (expecting N): AllowTcpForwarding=remote, restrict +check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict,port-forwarding +check_rfwd done (expecting Y): AllowTcpForwarding=remote, restrict,port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=no +check_rfwd done (expecting N): AllowTcpForwarding=no +check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen +check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=no, PermitOpen +check_rfwd done (expecting N): AllowTcpForwarding=no, PermitOpen +check_lfwd done (expecting N): AllowTcpForwarding=no, !permitopen +check_rfwd done (expecting N): AllowTcpForwarding=no, !permitopen +check_lfwd done (expecting N): AllowTcpForwarding=no, permitopen +check_rfwd done (expecting N): AllowTcpForwarding=no, permitopen +check_lfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding +check_lfwd done (expecting N): AllowTcpForwarding=no, restrict +check_rfwd done (expecting N): AllowTcpForwarding=no, restrict +check_lfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding +check_rfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding +check_lfwd done (expecting Y): AllowTcpForwarding=yes, !PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=yes, !PermitListen +check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen +check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen +check_lfwd done (expecting Y): AllowTcpForwarding=local, !PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitListen +check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=local, PermitListen +check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen +check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitListen +check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitListen +check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitListen +check_lfwd done (expecting N): AllowTcpForwarding=no, PermitListen +check_rfwd done (expecting N): AllowTcpForwarding=no, PermitListen +PASS: sshd control of local and remote forwarding +run test integrity.sh ... +test integrity: hmac-sha1 @2900 +test integrity: hmac-sha1 @2901 +test integrity: hmac-sha1 @2902 +test integrity: hmac-sha1 @2903 +test integrity: hmac-sha1 @2904 +test integrity: hmac-sha1 @2905 +test integrity: hmac-sha1 @2906 +test integrity: hmac-sha1 @2907 +test integrity: hmac-sha1 @2908 +test integrity: hmac-sha1 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha1-96 @2900 +test integrity: hmac-sha1-96 @2901 +test integrity: hmac-sha1-96 @2902 +test integrity: hmac-sha1-96 @2903 +test integrity: hmac-sha1-96 @2904 +test integrity: hmac-sha1-96 @2905 +test integrity: hmac-sha1-96 @2906 +test integrity: hmac-sha1-96 @2907 +test integrity: hmac-sha1-96 @2908 +test integrity: hmac-sha1-96 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha2-256 @2900 +test integrity: hmac-sha2-256 @2901 +test integrity: hmac-sha2-256 @2902 +test integrity: hmac-sha2-256 @2903 +test integrity: hmac-sha2-256 @2904 +test integrity: hmac-sha2-256 @2905 +test integrity: hmac-sha2-256 @2906 +test integrity: hmac-sha2-256 @2907 +test integrity: hmac-sha2-256 @2908 +test integrity: hmac-sha2-256 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha2-512 @2900 +test integrity: hmac-sha2-512 @2901 +test integrity: hmac-sha2-512 @2902 +test integrity: hmac-sha2-512 @2903 +test integrity: hmac-sha2-512 @2904 +test integrity: hmac-sha2-512 @2905 +test integrity: hmac-sha2-512 @2906 +test integrity: hmac-sha2-512 @2907 +test integrity: hmac-sha2-512 @2908 +test integrity: hmac-sha2-512 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-md5 @2900 +test integrity: hmac-md5 @2901 +test integrity: hmac-md5 @2902 +test integrity: hmac-md5 @2903 +test integrity: hmac-md5 @2904 +test integrity: hmac-md5 @2905 +test integrity: hmac-md5 @2906 +test integrity: hmac-md5 @2907 +test integrity: hmac-md5 @2908 +test integrity: hmac-md5 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-md5-96 @2900 +test integrity: hmac-md5-96 @2901 +test integrity: hmac-md5-96 @2902 +test integrity: hmac-md5-96 @2903 +test integrity: hmac-md5-96 @2904 +test integrity: hmac-md5-96 @2905 +test integrity: hmac-md5-96 @2906 +test integrity: hmac-md5-96 @2907 +test integrity: hmac-md5-96 @2908 +test integrity: hmac-md5-96 @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: umac-64@openssh.com @2900 +test integrity: umac-64@openssh.com @2901 +test integrity: umac-64@openssh.com @2902 +test integrity: umac-64@openssh.com @2903 +test integrity: umac-64@openssh.com @2904 +test integrity: umac-64@openssh.com @2905 +test integrity: umac-64@openssh.com @2906 +test integrity: umac-64@openssh.com @2907 +test integrity: umac-64@openssh.com @2908 +test integrity: umac-64@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: umac-128@openssh.com @2900 +test integrity: umac-128@openssh.com @2901 +test integrity: umac-128@openssh.com @2902 +test integrity: umac-128@openssh.com @2903 +test integrity: umac-128@openssh.com @2904 +test integrity: umac-128@openssh.com @2905 +test integrity: umac-128@openssh.com @2906 +test integrity: umac-128@openssh.com @2907 +test integrity: umac-128@openssh.com @2908 +test integrity: umac-128@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha1-etm@openssh.com @2900 +test integrity: hmac-sha1-etm@openssh.com @2901 +test integrity: hmac-sha1-etm@openssh.com @2902 +test integrity: hmac-sha1-etm@openssh.com @2903 +test integrity: hmac-sha1-etm@openssh.com @2904 +test integrity: hmac-sha1-etm@openssh.com @2905 +test integrity: hmac-sha1-etm@openssh.com @2906 +test integrity: hmac-sha1-etm@openssh.com @2907 +test integrity: hmac-sha1-etm@openssh.com @2908 +test integrity: hmac-sha1-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha1-96-etm@openssh.com @2900 +test integrity: hmac-sha1-96-etm@openssh.com @2901 +test integrity: hmac-sha1-96-etm@openssh.com @2904 +test integrity: hmac-sha1-96-etm@openssh.com @2905 +test integrity: hmac-sha1-96-etm@openssh.com @2906 +test integrity: hmac-sha1-96-etm@openssh.com @2907 +test integrity: hmac-sha1-96-etm@openssh.com @2908 +test integrity: hmac-sha1-96-etm@openssh.com @2909 +test integrity: 8 errors: mac 7 padding 0 length 1 timeout 0 +test integrity: hmac-sha2-256-etm@openssh.com @2900 +test integrity: hmac-sha2-256-etm@openssh.com @2901 +test integrity: hmac-sha2-256-etm@openssh.com @2902 +test integrity: hmac-sha2-256-etm@openssh.com @2903 +test integrity: hmac-sha2-256-etm@openssh.com @2904 +test integrity: hmac-sha2-256-etm@openssh.com @2905 +test integrity: hmac-sha2-256-etm@openssh.com @2906 +test integrity: hmac-sha2-256-etm@openssh.com @2907 +test integrity: hmac-sha2-256-etm@openssh.com @2908 +test integrity: hmac-sha2-256-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-sha2-512-etm@openssh.com @2900 +test integrity: hmac-sha2-512-etm@openssh.com @2901 +test integrity: hmac-sha2-512-etm@openssh.com @2902 +test integrity: hmac-sha2-512-etm@openssh.com @2903 +test integrity: hmac-sha2-512-etm@openssh.com @2904 +test integrity: hmac-sha2-512-etm@openssh.com @2905 +test integrity: hmac-sha2-512-etm@openssh.com @2906 +test integrity: hmac-sha2-512-etm@openssh.com @2907 +test integrity: hmac-sha2-512-etm@openssh.com @2908 +test integrity: hmac-sha2-512-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-md5-etm@openssh.com @2900 +test integrity: hmac-md5-etm@openssh.com @2901 +test integrity: hmac-md5-etm@openssh.com @2902 +test integrity: hmac-md5-etm@openssh.com @2903 +test integrity: hmac-md5-etm@openssh.com @2904 +test integrity: hmac-md5-etm@openssh.com @2905 +test integrity: hmac-md5-etm@openssh.com @2906 +test integrity: hmac-md5-etm@openssh.com @2907 +test integrity: hmac-md5-etm@openssh.com @2908 +test integrity: hmac-md5-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: hmac-md5-96-etm@openssh.com @2900 +test integrity: hmac-md5-96-etm@openssh.com @2901 +test integrity: hmac-md5-96-etm@openssh.com @2904 +test integrity: hmac-md5-96-etm@openssh.com @2905 +test integrity: hmac-md5-96-etm@openssh.com @2906 +test integrity: hmac-md5-96-etm@openssh.com @2907 +test integrity: hmac-md5-96-etm@openssh.com @2908 +test integrity: hmac-md5-96-etm@openssh.com @2909 +test integrity: 8 errors: mac 7 padding 0 length 1 timeout 0 +test integrity: umac-64-etm@openssh.com @2900 +test integrity: umac-64-etm@openssh.com @2901 +test integrity: umac-64-etm@openssh.com @2902 +test integrity: umac-64-etm@openssh.com @2903 +test integrity: umac-64-etm@openssh.com @2904 +test integrity: umac-64-etm@openssh.com @2905 +test integrity: umac-64-etm@openssh.com @2906 +test integrity: umac-64-etm@openssh.com @2907 +test integrity: umac-64-etm@openssh.com @2908 +test integrity: umac-64-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: umac-128-etm@openssh.com @2900 +test integrity: umac-128-etm@openssh.com @2901 +test integrity: umac-128-etm@openssh.com @2902 +test integrity: umac-128-etm@openssh.com @2903 +test integrity: umac-128-etm@openssh.com @2904 +test integrity: umac-128-etm@openssh.com @2905 +test integrity: umac-128-etm@openssh.com @2906 +test integrity: umac-128-etm@openssh.com @2907 +test integrity: umac-128-etm@openssh.com @2908 +test integrity: umac-128-etm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: aes128-gcm@openssh.com @2900 +test integrity: aes128-gcm@openssh.com @2901 +test integrity: aes128-gcm@openssh.com @2902 +test integrity: aes128-gcm@openssh.com @2903 +test integrity: aes128-gcm@openssh.com @2904 +test integrity: aes128-gcm@openssh.com @2905 +test integrity: aes128-gcm@openssh.com @2906 +test integrity: aes128-gcm@openssh.com @2907 +test integrity: aes128-gcm@openssh.com @2908 +test integrity: aes128-gcm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: aes256-gcm@openssh.com @2900 +test integrity: aes256-gcm@openssh.com @2901 +test integrity: aes256-gcm@openssh.com @2902 +test integrity: aes256-gcm@openssh.com @2903 +test integrity: aes256-gcm@openssh.com @2904 +test integrity: aes256-gcm@openssh.com @2905 +test integrity: aes256-gcm@openssh.com @2906 +test integrity: aes256-gcm@openssh.com @2907 +test integrity: aes256-gcm@openssh.com @2908 +test integrity: aes256-gcm@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +test integrity: chacha20-poly1305@openssh.com @2900 +test integrity: chacha20-poly1305@openssh.com @2901 +test integrity: chacha20-poly1305@openssh.com @2902 +test integrity: chacha20-poly1305@openssh.com @2903 +test integrity: chacha20-poly1305@openssh.com @2904 +test integrity: chacha20-poly1305@openssh.com @2905 +test integrity: chacha20-poly1305@openssh.com @2906 +test integrity: chacha20-poly1305@openssh.com @2907 +test integrity: chacha20-poly1305@openssh.com @2908 +test integrity: chacha20-poly1305@openssh.com @2909 +test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 +PASS: integrity +run test krl.sh ... +key revocation lists: generating test keys +key revocation lists: generating KRLs +key revocation lists: checking revocations for revoked keys +key revocation lists: checking revocations for unrevoked keys +key revocation lists: checking revocations for revoked certs +key revocation lists: checking revocations for unrevoked certs +key revocation lists: testing KRL update +key revocation lists: checking revocations for revoked keys +key revocation lists: checking revocations for unrevoked keys +key revocation lists: checking revocations for revoked certs +key revocation lists: checking revocations for unrevoked certs +run test multipubkey.sh ... +PASS: key revocation lists +run test limit-keytype.sh ... +PASS: multiple pubkey +allow rsa,ed25519 +allow ed25519 +allow cert only +match w/ no match +match w/ matching +PASS: restrict pubkey type +run test hostkey-agent.sh ... +key type ssh-ed25519 privsep=no +key type ssh-rsa privsep=no +key type ssh-dss privsep=no +key type ecdsa-sha2-nistp256 privsep=no +key type ecdsa-sha2-nistp384 privsep=no +key type ecdsa-sha2-nistp521 privsep=no +key type ssh-ed25519 privsep=yes +key type ssh-rsa privsep=yes +key type ssh-dss privsep=yes +key type ecdsa-sha2-nistp256 privsep=yes +key type ecdsa-sha2-nistp384 privsep=yes +key type ecdsa-sha2-nistp521 privsep=yes +PASS: hostkey agent +run test keygen-knownhosts.sh ... +/usr/lib/openssh/ptest/regress/kh.hosts updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old +/usr/lib/openssh/ptest/regress/kh.hosts updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old +/usr/lib/openssh/ptest/regress/kh.hosts updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old +/usr/lib/openssh/ptest/regress/kh.hosts updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old +/usr/lib/openssh/ptest/regress/kh.hashed updated. +Original contents retained as /usr/lib/openssh/ptest/regress/kh.hashed.old +PASS: ssh-keygen known_hosts +run test hostkey-rotate.sh ... +learn hostkey with StrictHostKeyChecking=no +learn additional hostkeys +learn additional hostkeys, type=ssh-ed25519 +learn additional hostkeys, type=ssh-rsa +learn additional hostkeys, type=ssh-dss +learn additional hostkeys, type=ecdsa-sha2-nistp256 +learn additional hostkeys, type=ecdsa-sha2-nistp384 +learn additional hostkeys, type=ecdsa-sha2-nistp521 +learn changed non-primary hostkey +learn new primary hostkey +rotate primary hostkey +check rotate primary hostkey +PASS: hostkey rotate +run test principals-command.sh ... +authorized principals command: privsep yes empty authorized_principals +authorized principals command: privsep yes wrong authorized_principals +authorized principals command: privsep yes correct authorized_principals +authorized principals command: privsep yes authorized_principals bad key opt +authorized principals command: privsep yes authorized_principals command=false +authorized principals command: privsep yes authorized_principals command=true +authorized principals command: privsep yes wrong principals key option +authorized principals command: privsep yes correct principals key option +authorized principals command: privsep sandbox empty authorized_principals +authorized principals command: privsep sandbox wrong authorized_principals +authorized principals command: privsep sandbox correct authorized_principals +authorized principals command: privsep sandbox authorized_principals bad key opt +authorized principals command: privsep sandbox authorized_principals command=false +authorized principals command: privsep sandbox authorized_principals command=true +authorized principals command: privsep sandbox wrong principals key option +authorized principals command: privsep sandbox correct principals key option +PASS: authorized principals command +run test cert-file.sh ... +identity cert with no plain public file +CertificateFile with no plain public file +plain keys +untrusted cert +good cert, bad key +single trusted +multiple trusted +PASS: ssh with certificates +run test cfginclude.sh ... +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +Pseudo-terminal will not be allocated because stdin is not a terminal. +PASS: config include +run test allow-deny-users.sh ... +PASS: AllowUsers/DenyUsers +run test authinfo.sh ... +ExposeAuthInfo=no +ExposeAuthInfo=yes +PASS: authinfo +make: Target 'tests' not remade because of errors. +PASS: ptrace agent +DURATION: 1037 |