START usr.bin/ssh 2023-12-16T00:34:07Z ==== misc ==== ===> misc ===> misc/sk-dummy cc -O2 -pipe -g -fPIC -DWITH_OPENSSL -fstack-protector-all -I/usr/src/regress/usr.bin/ssh/misc/sk-dummy/../../../../../usr.bin/ssh -Wall -Wextra -Werror -Wchar-subscripts -Wcomment -Wformat -Wformat-security -Wimplicit -Winline -Wmissing-declarations -Wmissing-prototypes -Wparentheses -Wpointer-arith -Wreturn-type -Wshadow -Wsign-compare -Wstrict-aliasing -Wstrict-prototypes -Wswitch -Wtrigraphs -Wuninitialized -Wunused -Wno-unused-parameter -Wold-style-definition -MD -MP -c /usr/src/regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c cc -O2 -pipe -g -fPIC -DWITH_OPENSSL -fstack-protector-all -I/usr/src/regress/usr.bin/ssh/misc/sk-dummy/../../../../../usr.bin/ssh -Wall -Wextra -Werror -Wchar-subscripts -Wcomment -Wformat -Wformat-security -Wimplicit -Winline -Wmissing-declarations -Wmissing-prototypes -Wparentheses -Wpointer-arith -Wreturn-type -Wshadow -Wsign-compare -Wstrict-aliasing -Wstrict-prototypes -Wswitch -Wtrigraphs -Wuninitialized -Wunused -Wno-unused-parameter -Wold-style-definition -MD -MP -c /usr/src/regress/usr.bin/ssh/misc/sk-dummy/../../../../../usr.bin/ssh/ed25519.c cc -O2 -pipe -g -fPIC -DWITH_OPENSSL -fstack-protector-all -I/usr/src/regress/usr.bin/ssh/misc/sk-dummy/../../../../../usr.bin/ssh -Wall -Wextra -Werror -Wchar-subscripts -Wcomment -Wformat -Wformat-security -Wimplicit -Winline -Wmissing-declarations -Wmissing-prototypes -Wparentheses -Wpointer-arith -Wreturn-type -Wshadow -Wsign-compare -Wstrict-aliasing -Wstrict-prototypes -Wswitch -Wtrigraphs -Wuninitialized -Wunused -Wno-unused-parameter -Wold-style-definition -MD -MP -c /usr/src/regress/usr.bin/ssh/misc/sk-dummy/../../../../../usr.bin/ssh/hash.c cc -g -shared -o sk-dummy.so sk-dummy.o ed25519.o hash.o -lcrypto ==== t1 ==== ssh-keygen -if /usr/src/regress/usr.bin/ssh/rsa_ssh2.prv | diff - /usr/src/regress/usr.bin/ssh/rsa_openssh.prv tr '\n' '\r' /usr/src/regress/usr.bin/ssh/obj/rsa_ssh2_cr.prv ssh-keygen -if /usr/src/regress/usr.bin/ssh/obj/rsa_ssh2_cr.prv | diff - /usr/src/regress/usr.bin/ssh/rsa_openssh.prv awk '{print $0 "\r"}' /usr/src/regress/usr.bin/ssh/rsa_ssh2.prv > /usr/src/regress/usr.bin/ssh/obj/rsa_ssh2_crnl.prv ssh-keygen -if /usr/src/regress/usr.bin/ssh/obj/rsa_ssh2_crnl.prv | diff - /usr/src/regress/usr.bin/ssh/rsa_openssh.prv ==== t2 ==== cat /usr/src/regress/usr.bin/ssh/rsa_openssh.prv > t2.out chmod 600 t2.out ssh-keygen -yf t2.out | diff - /usr/src/regress/usr.bin/ssh/rsa_openssh.pub ==== t3 ==== ssh-keygen -ef /usr/src/regress/usr.bin/ssh/rsa_openssh.pub | ssh-keygen -if /dev/stdin | diff - /usr/src/regress/usr.bin/ssh/rsa_openssh.pub ==== t4 ==== ssh-keygen -E md5 -lf /usr/src/regress/usr.bin/ssh/rsa_openssh.pub | awk '{print $2}' | diff - /usr/src/regress/usr.bin/ssh/t4.ok ==== t5 ==== ssh-keygen -Bf /usr/src/regress/usr.bin/ssh/rsa_openssh.pub | awk '{print $2}' | diff - /usr/src/regress/usr.bin/ssh/t5.ok ==== t6 ==== ssh-keygen -if /usr/src/regress/usr.bin/ssh/dsa_ssh2.prv > t6.out1 ssh-keygen -if /usr/src/regress/usr.bin/ssh/dsa_ssh2.pub > t6.out2 chmod 600 t6.out1 ssh-keygen -yf t6.out1 | diff - t6.out2 ==== t7 ==== ssh-keygen -q -t rsa -N '' -f t7.out ssh-keygen -lf t7.out > /dev/null ssh-keygen -Bf t7.out > /dev/null ==== t8 ==== ssh-keygen -q -t dsa -N '' -f t8.out ssh-keygen -lf t8.out > /dev/null ssh-keygen -Bf t8.out > /dev/null ==== t9 ==== ssh-keygen -q -t ecdsa -N '' -f t9.out ssh-keygen -lf t9.out > /dev/null ssh-keygen -Bf t9.out > /dev/null ==== t10 ==== ssh-keygen -q -t ed25519 -N '' -f t10.out ssh-keygen -lf t10.out > /dev/null ssh-keygen -Bf t10.out > /dev/null ==== t11 ==== ssh-keygen -E sha256 -lf /usr/src/regress/usr.bin/ssh/rsa_openssh.pub | awk '{print $2}' | diff - /usr/src/regress/usr.bin/ssh/t11.ok ==== t12 ==== ssh-keygen -q -t ed25519 -N '' -C 'test-comment-1234' -f t12.out ssh-keygen -lf t12.out.pub | grep -q test-comment-1234 ==== t-connect ==== cc -O2 -pipe -MD -MP -o timestamp /usr/src/regress/usr.bin/ssh/timestamp.c env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/connect.sh ok simple connect ==== t-proxy-connect ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/proxy-connect.sh plain username comp=no plain username comp=yes username with style ok proxy connect ==== t-sshfp-connect ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sshfp-connect.sh SKIPPED: TEST_SSH_SSHFP_DOMAIN not set. ==== t-connect-privsep ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/connect-privsep.sh ok proxy connect with privsep ==== t-connect-uri ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/connect-uri.sh uri connect: no trailing slash uri connect: trailing slash uri connect: with path name ok uri connect ==== t-proto-version ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/proto-version.sh ok sshd version with different protocol combinations ==== t-proto-mismatch ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/proto-mismatch.sh ok protocol version mismatch ==== t-exit-status ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/exit-status.sh test remote exit status: status 0 test remote exit status: status 1 test remote exit status: status 4 test remote exit status: status 5 test remote exit status: status 44 ok remote exit status ==== t-exit-status-signal ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/exit-status-signal.sh ok exit status on signal ==== t-envpass ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/envpass.sh test environment passing: pass env, don't accept test environment passing: setenv, don't accept test environment passing: don't pass env, accept test environment passing: pass single env, accept single env test environment passing: pass multiple env, accept multiple env test environment passing: setenv, accept test environment passing: setenv, first match wins test environment passing: server setenv wins test environment passing: server setenv wins ok environment passing ==== t-transfer ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/transfer.sh ok transfer data ==== t-banner ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/banner.sh test banner: missing banner file test banner: size 0 test banner: size 10 test banner: size 100 test banner: size 1000 test banner: size 10000 test banner: size 100000 test banner: suppress banner (-q) ok banner ==== t-rekey ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/rekey.sh client rekey KexAlgorithms=diffie-hellman-group1-sha1 client rekey KexAlgorithms=diffie-hellman-group14-sha1 client rekey KexAlgorithms=diffie-hellman-group14-sha256 client rekey KexAlgorithms=diffie-hellman-group16-sha512 client rekey KexAlgorithms=diffie-hellman-group18-sha512 client rekey KexAlgorithms=diffie-hellman-group-exchange-sha1 client rekey KexAlgorithms=diffie-hellman-group-exchange-sha256 client rekey KexAlgorithms=ecdh-sha2-nistp256 client rekey KexAlgorithms=ecdh-sha2-nistp384 client rekey KexAlgorithms=ecdh-sha2-nistp521 client rekey KexAlgorithms=curve25519-sha256 client rekey KexAlgorithms=curve25519-sha256@libssh.org client rekey KexAlgorithms=sntrup761x25519-sha512@openssh.com client rekey Ciphers=3des-cbc client rekey Ciphers=aes128-cbc client rekey Ciphers=aes192-cbc client rekey Ciphers=aes256-cbc client rekey Ciphers=aes128-ctr client rekey Ciphers=aes192-ctr client rekey Ciphers=aes256-ctr client rekey Ciphers=aes128-gcm@openssh.com client rekey Ciphers=aes256-gcm@openssh.com client rekey Ciphers=chacha20-poly1305@openssh.com client rekey MACs=hmac-sha1 client rekey MACs=hmac-sha1-96 client rekey MACs=hmac-sha2-256 client rekey MACs=hmac-sha2-512 client rekey MACs=hmac-md5 client rekey MACs=hmac-md5-96 client rekey MACs=umac-64@openssh.com client rekey MACs=umac-128@openssh.com client rekey MACs=hmac-sha1-etm@openssh.com client rekey MACs=hmac-sha1-96-etm@openssh.com client rekey MACs=hmac-sha2-256-etm@openssh.com client rekey MACs=hmac-sha2-512-etm@openssh.com client rekey MACs=hmac-md5-etm@openssh.com client rekey MACs=hmac-md5-96-etm@openssh.com client rekey MACs=umac-64-etm@openssh.com client rekey MACs=umac-128-etm@openssh.com client rekey aes128-gcm@openssh.com diffie-hellman-group1-sha1 client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha1 client rekey aes128-gcm@openssh.com diffie-hellman-group14-sha256 client rekey aes128-gcm@openssh.com diffie-hellman-group16-sha512 client rekey aes128-gcm@openssh.com diffie-hellman-group18-sha512 client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha1 client rekey aes128-gcm@openssh.com diffie-hellman-group-exchange-sha256 client rekey aes128-gcm@openssh.com ecdh-sha2-nistp256 client rekey aes128-gcm@openssh.com ecdh-sha2-nistp384 client rekey aes128-gcm@openssh.com ecdh-sha2-nistp521 client rekey aes128-gcm@openssh.com curve25519-sha256 client rekey aes128-gcm@openssh.com curve25519-sha256@libssh.org client rekey aes128-gcm@openssh.com sntrup761x25519-sha512@openssh.com client rekey aes256-gcm@openssh.com diffie-hellman-group1-sha1 client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha1 client rekey aes256-gcm@openssh.com diffie-hellman-group14-sha256 client rekey aes256-gcm@openssh.com diffie-hellman-group16-sha512 client rekey aes256-gcm@openssh.com diffie-hellman-group18-sha512 client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha1 client rekey aes256-gcm@openssh.com diffie-hellman-group-exchange-sha256 client rekey aes256-gcm@openssh.com ecdh-sha2-nistp256 client rekey aes256-gcm@openssh.com ecdh-sha2-nistp384 client rekey aes256-gcm@openssh.com ecdh-sha2-nistp521 client rekey aes256-gcm@openssh.com curve25519-sha256 client rekey aes256-gcm@openssh.com curve25519-sha256@libssh.org client rekey aes256-gcm@openssh.com sntrup761x25519-sha512@openssh.com client rekey chacha20-poly1305@openssh.com diffie-hellman-group1-sha1 client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha1 client rekey chacha20-poly1305@openssh.com diffie-hellman-group14-sha256 client rekey chacha20-poly1305@openssh.com diffie-hellman-group16-sha512 client rekey chacha20-poly1305@openssh.com diffie-hellman-group18-sha512 client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha1 client rekey chacha20-poly1305@openssh.com diffie-hellman-group-exchange-sha256 client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp256 client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp384 client rekey chacha20-poly1305@openssh.com ecdh-sha2-nistp521 client rekey chacha20-poly1305@openssh.com curve25519-sha256 client rekey chacha20-poly1305@openssh.com curve25519-sha256@libssh.org client rekey chacha20-poly1305@openssh.com sntrup761x25519-sha512@openssh.com client rekeylimit 16 client rekeylimit 1k client rekeylimit 128k client rekeylimit 256k client rekeylimit default 5 client rekeylimit default 10 client rekeylimit default 5 no data client rekeylimit default 10 no data server rekeylimit 16 server rekeylimit 1k server rekeylimit 128k server rekeylimit 256k server rekeylimit default 5 no data server rekeylimit default 10 no data rekeylimit parsing ok rekey ==== t-dhgex ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/dhgex.sh dhgex bits 3072 diffie-hellman-group-exchange-sha1 3des-cbc dhgex bits 3072 diffie-hellman-group-exchange-sha256 3des-cbc dhgex bits 3072 diffie-hellman-group-exchange-sha1 aes128-cbc dhgex bits 3072 diffie-hellman-group-exchange-sha256 aes128-cbc dhgex bits 3072 diffie-hellman-group-exchange-sha1 aes128-ctr dhgex bits 3072 diffie-hellman-group-exchange-sha256 aes128-ctr dhgex bits 3072 diffie-hellman-group-exchange-sha1 aes128-gcm@openssh.com dhgex bits 3072 diffie-hellman-group-exchange-sha256 aes128-gcm@openssh.com dhgex bits 7680 diffie-hellman-group-exchange-sha1 aes192-cbc dhgex bits 7680 diffie-hellman-group-exchange-sha256 aes192-cbc dhgex bits 7680 diffie-hellman-group-exchange-sha1 aes192-ctr dhgex bits 7680 diffie-hellman-group-exchange-sha256 aes192-ctr dhgex bits 8192 diffie-hellman-group-exchange-sha1 aes256-cbc dhgex bits 8192 diffie-hellman-group-exchange-sha256 aes256-cbc dhgex bits 8192 diffie-hellman-group-exchange-sha1 aes256-ctr dhgex bits 8192 diffie-hellman-group-exchange-sha256 aes256-ctr dhgex bits 8192 diffie-hellman-group-exchange-sha1 aes256-gcm@openssh.com dhgex bits 8192 diffie-hellman-group-exchange-sha256 aes256-gcm@openssh.com dhgex bits 8192 diffie-hellman-group-exchange-sha1 chacha20-poly1305@openssh.com dhgex bits 8192 diffie-hellman-group-exchange-sha256 chacha20-poly1305@openssh.com ok dhgex ==== t-stderr-data ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/stderr-data.sh test stderr data transfer: () test stderr data transfer: (-n) ok stderr data transfer ==== t-stderr-after-eof ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/stderr-after-eof.sh ok stderr data after eof ==== t-broken-pipe ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/broken-pipe.sh ok broken pipe test ==== t-try-ciphers ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/try-ciphers.sh test try ciphers: cipher 3des-cbc mac hmac-sha1 test try ciphers: cipher 3des-cbc mac hmac-sha1-96 test try ciphers: cipher 3des-cbc mac hmac-sha2-256 test try ciphers: cipher 3des-cbc mac hmac-sha2-512 test try ciphers: cipher 3des-cbc mac hmac-md5 test try ciphers: cipher 3des-cbc mac hmac-md5-96 test try ciphers: cipher 3des-cbc mac umac-64@openssh.com test try ciphers: cipher 3des-cbc mac umac-128@openssh.com test try ciphers: cipher 3des-cbc mac hmac-sha1-etm@openssh.com test try ciphers: cipher 3des-cbc mac hmac-sha1-96-etm@openssh.com test try ciphers: cipher 3des-cbc mac hmac-sha2-256-etm@openssh.com test try ciphers: cipher 3des-cbc mac hmac-sha2-512-etm@openssh.com test try ciphers: cipher 3des-cbc mac hmac-md5-etm@openssh.com test try ciphers: cipher 3des-cbc mac hmac-md5-96-etm@openssh.com test try ciphers: cipher 3des-cbc mac umac-64-etm@openssh.com test try ciphers: cipher 3des-cbc mac umac-128-etm@openssh.com test try ciphers: cipher aes128-cbc mac hmac-sha1 test try ciphers: cipher aes128-cbc mac hmac-sha1-96 test try ciphers: cipher aes128-cbc mac hmac-sha2-256 test try ciphers: cipher aes128-cbc mac hmac-sha2-512 test try ciphers: cipher aes128-cbc mac hmac-md5 test try ciphers: cipher aes128-cbc mac hmac-md5-96 test try ciphers: cipher aes128-cbc mac umac-64@openssh.com test try ciphers: cipher aes128-cbc mac umac-128@openssh.com test try ciphers: cipher aes128-cbc mac hmac-sha1-etm@openssh.com test try ciphers: cipher aes128-cbc mac hmac-sha1-96-etm@openssh.com test try ciphers: cipher aes128-cbc mac hmac-sha2-256-etm@openssh.com test try ciphers: cipher aes128-cbc mac hmac-sha2-512-etm@openssh.com test try ciphers: cipher aes128-cbc mac hmac-md5-etm@openssh.com test try ciphers: cipher aes128-cbc mac hmac-md5-96-etm@openssh.com test try ciphers: cipher aes128-cbc mac umac-64-etm@openssh.com test try ciphers: cipher aes128-cbc mac umac-128-etm@openssh.com test try ciphers: cipher aes192-cbc mac hmac-sha1 test try ciphers: cipher aes192-cbc mac hmac-sha1-96 test try ciphers: cipher aes192-cbc mac hmac-sha2-256 test try ciphers: cipher aes192-cbc mac hmac-sha2-512 test try ciphers: cipher aes192-cbc mac hmac-md5 test try ciphers: cipher aes192-cbc mac hmac-md5-96 test try ciphers: cipher aes192-cbc mac umac-64@openssh.com test try ciphers: cipher aes192-cbc mac umac-128@openssh.com test try ciphers: cipher aes192-cbc mac hmac-sha1-etm@openssh.com test try ciphers: cipher aes192-cbc mac hmac-sha1-96-etm@openssh.com test try ciphers: cipher aes192-cbc mac hmac-sha2-256-etm@openssh.com test try ciphers: cipher aes192-cbc mac hmac-sha2-512-etm@openssh.com test try ciphers: cipher aes192-cbc mac hmac-md5-etm@openssh.com test try ciphers: cipher aes192-cbc mac hmac-md5-96-etm@openssh.com test try ciphers: cipher aes192-cbc mac umac-64-etm@openssh.com test try ciphers: cipher aes192-cbc mac umac-128-etm@openssh.com test try ciphers: cipher aes256-cbc mac hmac-sha1 test try ciphers: cipher aes256-cbc mac hmac-sha1-96 test try ciphers: cipher aes256-cbc mac hmac-sha2-256 test try ciphers: cipher aes256-cbc mac hmac-sha2-512 test try ciphers: cipher aes256-cbc mac hmac-md5 test try ciphers: cipher aes256-cbc mac hmac-md5-96 test try ciphers: cipher aes256-cbc mac umac-64@openssh.com test try ciphers: cipher aes256-cbc mac umac-128@openssh.com test try ciphers: cipher aes256-cbc mac hmac-sha1-etm@openssh.com test try ciphers: cipher aes256-cbc mac hmac-sha1-96-etm@openssh.com test try ciphers: cipher aes256-cbc mac hmac-sha2-256-etm@openssh.com test try ciphers: cipher aes256-cbc mac hmac-sha2-512-etm@openssh.com test try ciphers: cipher aes256-cbc mac hmac-md5-etm@openssh.com test try ciphers: cipher aes256-cbc mac hmac-md5-96-etm@openssh.com test try ciphers: cipher aes256-cbc mac umac-64-etm@openssh.com test try ciphers: cipher aes256-cbc mac umac-128-etm@openssh.com test try ciphers: cipher aes128-ctr mac hmac-sha1 test try ciphers: cipher aes128-ctr mac hmac-sha1-96 test try ciphers: cipher aes128-ctr mac hmac-sha2-256 test try ciphers: cipher aes128-ctr mac hmac-sha2-512 test try ciphers: cipher aes128-ctr mac hmac-md5 test try ciphers: cipher aes128-ctr mac hmac-md5-96 test try ciphers: cipher aes128-ctr mac umac-64@openssh.com test try ciphers: cipher aes128-ctr mac umac-128@openssh.com test try ciphers: cipher aes128-ctr mac hmac-sha1-etm@openssh.com test try ciphers: cipher aes128-ctr mac hmac-sha1-96-etm@openssh.com test try ciphers: cipher aes128-ctr mac hmac-sha2-256-etm@openssh.com test try ciphers: cipher aes128-ctr mac hmac-sha2-512-etm@openssh.com test try ciphers: cipher aes128-ctr mac hmac-md5-etm@openssh.com test try ciphers: cipher aes128-ctr mac hmac-md5-96-etm@openssh.com test try ciphers: cipher aes128-ctr mac umac-64-etm@openssh.com test try ciphers: cipher aes128-ctr mac umac-128-etm@openssh.com test try ciphers: cipher aes192-ctr mac hmac-sha1 test try ciphers: cipher aes192-ctr mac hmac-sha1-96 test try ciphers: cipher aes192-ctr mac hmac-sha2-256 test try ciphers: cipher aes192-ctr mac hmac-sha2-512 test try ciphers: cipher aes192-ctr mac hmac-md5 test try ciphers: cipher aes192-ctr mac hmac-md5-96 test try ciphers: cipher aes192-ctr mac umac-64@openssh.com test try ciphers: cipher aes192-ctr mac umac-128@openssh.com test try ciphers: cipher aes192-ctr mac hmac-sha1-etm@openssh.com test try ciphers: cipher aes192-ctr mac hmac-sha1-96-etm@openssh.com test try ciphers: cipher aes192-ctr mac hmac-sha2-256-etm@openssh.com test try ciphers: cipher aes192-ctr mac hmac-sha2-512-etm@openssh.com test try ciphers: cipher aes192-ctr mac hmac-md5-etm@openssh.com test try ciphers: cipher aes192-ctr mac hmac-md5-96-etm@openssh.com test try ciphers: cipher aes192-ctr mac umac-64-etm@openssh.com test try ciphers: cipher aes192-ctr mac umac-128-etm@openssh.com test try ciphers: cipher aes256-ctr mac hmac-sha1 test try ciphers: cipher aes256-ctr mac hmac-sha1-96 test try ciphers: cipher aes256-ctr mac hmac-sha2-256 test try ciphers: cipher aes256-ctr mac hmac-sha2-512 test try ciphers: cipher aes256-ctr mac hmac-md5 test try ciphers: cipher aes256-ctr mac hmac-md5-96 test try ciphers: cipher aes256-ctr mac umac-64@openssh.com test try ciphers: cipher aes256-ctr mac umac-128@openssh.com test try ciphers: cipher aes256-ctr mac hmac-sha1-etm@openssh.com test try ciphers: cipher aes256-ctr mac hmac-sha1-96-etm@openssh.com test try ciphers: cipher aes256-ctr mac hmac-sha2-256-etm@openssh.com test try ciphers: cipher aes256-ctr mac hmac-sha2-512-etm@openssh.com test try ciphers: cipher aes256-ctr mac hmac-md5-etm@openssh.com test try ciphers: cipher aes256-ctr mac hmac-md5-96-etm@openssh.com test try ciphers: cipher aes256-ctr mac umac-64-etm@openssh.com test try ciphers: cipher aes256-ctr mac umac-128-etm@openssh.com test try ciphers: cipher aes128-gcm@openssh.com mac hmac-sha1 test try ciphers: cipher aes256-gcm@openssh.com mac hmac-sha1 test try ciphers: cipher chacha20-poly1305@openssh.com mac hmac-sha1 ok try ciphers ==== t-yes-head ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/yes-head.sh ok yes pipe head ==== t-login-timeout ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/login-timeout.sh ok connect after login grace timeout ==== t-agent ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/agent.sh ok simple agent test ==== t-agent-getpeereid ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/agent-getpeereid.sh ok disallow agent attach from other uid ==== t-agent-timeout ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/agent-timeout.sh ok agent timeout test ==== t-agent-ptrace ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/agent-ptrace.sh SKIPPED: running as root ==== t-agent-subprocess ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/agent-subprocess.sh ok agent subprocess ==== t-keyscan ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/keyscan.sh ok keyscan ==== t-keygen-change ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/keygen-change.sh ok change passphrase for key ==== t-keygen-comment ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/keygen-comment.sh ok Comment extraction from private key ==== t-keygen-convert ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/keygen-convert.sh ok convert keys ==== t-keygen-knownhosts ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/keygen-knownhosts.sh /usr/src/regress/usr.bin/ssh/obj/kh.hosts updated. Original contents retained as /usr/src/regress/usr.bin/ssh/obj/kh.hosts.old /usr/src/regress/usr.bin/ssh/obj/kh.hosts updated. Original contents retained as /usr/src/regress/usr.bin/ssh/obj/kh.hosts.old /usr/src/regress/usr.bin/ssh/obj/kh.hosts updated. Original contents retained as /usr/src/regress/usr.bin/ssh/obj/kh.hosts.old /usr/src/regress/usr.bin/ssh/obj/kh.hosts updated. Original contents retained as /usr/src/regress/usr.bin/ssh/obj/kh.hosts.old /usr/src/regress/usr.bin/ssh/obj/kh.hashed updated. Original contents retained as /usr/src/regress/usr.bin/ssh/obj/kh.hashed.old ok ssh-keygen known_hosts ==== t-keygen-moduli ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/keygen-moduli.sh ok keygen moduli ==== t-keygen-sshfp ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/keygen-sshfp.sh ok keygen-sshfp ==== t-key-options ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/key-options.sh key option command="echo bar" key option no-pty,command="echo bar" key option pty default key option pty no-pty key option pty restrict key option pty restrict,pty key option environment key option from="127.0.0.1" key option from="127.0.0.0/8" key option expiry-time default key option expiry-time invalid key option expiry-time expired key option expiry-time valid ok key options ==== t-scp ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/scp.sh scp: scp mode: simple copy local file to local file scp: scp mode: simple copy local file to remote file scp: scp mode: simple copy remote file to local file scp: scp mode: copy local file to remote file in place scp: scp mode: copy remote file to local file in place scp: scp mode: copy local file to remote file clobber -rw-r--r-- 1 root wobj 577272 Dec 16 02:04 /usr/src/regress/usr.bin/ssh/obj/copy -rw-r--r-- 1 root wobj 577272 Dec 16 02:04 /usr/src/regress/usr.bin/ssh/obj/data scp: scp mode: copy remote file to local file clobber scp: scp mode: simple copy local file to remote dir scp: scp mode: simple copy local file to local dir scp: scp mode: simple copy remote file to local dir scp: scp mode: recursive local dir to remote dir scp: scp mode: recursive local dir to local dir scp: scp mode: recursive remote dir to local dir scp: scp mode: unmatched glob file local->remote scp: scp mode: unmatched glob file remote->local scp: scp mode: unmatched glob dir recursive local->remote scp: scp mode: unmatched glob dir recursive remote->local scp: scp mode: shell metacharacters scp: scp mode: disallow bad server #0 scp: scp mode: disallow bad server #1 scp: scp mode: disallow bad server #2 scp: scp mode: disallow bad server #3 scp: scp mode: disallow bad server #4 scp: scp mode: disallow bad server #5 scp: scp mode: disallow bad server #6 scp: scp mode: disallow bad server #7 scp: scp mode: detect non-directory target /usr/src/regress/usr.bin/ssh/obj/copy2: Not a directory scp: sftp mode: simple copy local file to local file scp: sftp mode: simple copy local file to remote file scp: sftp mode: simple copy remote file to local file scp: sftp mode: copy local file to remote file in place scp: sftp mode: copy remote file to local file in place scp: sftp mode: copy local file to remote file clobber -rw-r--r-- 1 root wobj 577272 Dec 16 02:04 /usr/src/regress/usr.bin/ssh/obj/copy -rw-r--r-- 1 root wobj 577272 Dec 16 02:04 /usr/src/regress/usr.bin/ssh/obj/data scp: sftp mode: copy remote file to local file clobber scp: sftp mode: simple copy local file to remote dir scp: sftp mode: simple copy local file to local dir scp: sftp mode: simple copy remote file to local dir scp: sftp mode: recursive local dir to remote dir scp: sftp mode: recursive local dir to local dir scp: sftp mode: recursive remote dir to local dir scp: sftp mode: unmatched glob file local->remote scp: sftp mode: unmatched glob file remote->local scp: sftp mode: unmatched glob dir recursive local->remote scp: sftp mode: unmatched glob dir recursive remote->local scp: sftp mode: shell metacharacters scp: sftp mode: disallow bad server #0 scp: sftp mode: disallow bad server #1 scp: sftp mode: disallow bad server #2 scp: sftp mode: disallow bad server #3 scp: sftp mode: disallow bad server #4 scp: sftp mode: disallow bad server #5 scp: sftp mode: disallow bad server #6 scp: sftp mode: disallow bad server #7 scp: sftp mode: detect non-directory target /usr/src/regress/usr.bin/ssh/obj/copy2: Not a directory ok scp ==== t-scp3 ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/scp3.sh scp3: scp mode: simple copy remote file to remote file scp3: scp mode: simple copy remote file to remote dir scp3: scp mode: recursive remote dir to remote dir scp3: scp mode: detect non-directory target scp3: sftp mode: simple copy remote file to remote file scp3: sftp mode: simple copy remote file to remote dir scp3: sftp mode: recursive remote dir to remote dir scp3: sftp mode: detect non-directory target scp: /usr/src/regress/usr.bin/ssh/obj/copy2: destination is not a directory scp: /usr/src/regress/usr.bin/ssh/obj/copy2: destination is not a directory ok scp3 ==== t-scp-uri ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/scp-uri.sh scp-uri: scp mode: simple copy local file to remote file scp-uri: scp mode: simple copy remote file to local file scp-uri: scp mode: simple copy local file to remote dir scp-uri: scp mode: simple copy remote file to local dir scp-uri: scp mode: recursive local dir to remote dir scp-uri: scp mode: recursive remote dir to local dir scp-uri: sftp mode: simple copy local file to remote file scp-uri: sftp mode: simple copy remote file to local file scp-uri: sftp mode: simple copy local file to remote dir scp-uri: sftp mode: simple copy remote file to local dir scp-uri: sftp mode: recursive local dir to remote dir scp-uri: sftp mode: recursive remote dir to local dir ok scp-uri ==== t-sftp ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sftp.sh test basic sftp put/get: buffer_size 5 num_requests 1 test basic sftp put/get: buffer_size 5 num_requests 2 test basic sftp put/get: buffer_size 5 num_requests 10 test basic sftp put/get: buffer_size 1000 num_requests 1 test basic sftp put/get: buffer_size 1000 num_requests 2 test basic sftp put/get: buffer_size 1000 num_requests 10 test basic sftp put/get: buffer_size 32000 num_requests 1 test basic sftp put/get: buffer_size 32000 num_requests 2 test basic sftp put/get: buffer_size 32000 num_requests 10 test basic sftp put/get: buffer_size 64000 num_requests 1 test basic sftp put/get: buffer_size 64000 num_requests 2 test basic sftp put/get: buffer_size 64000 num_requests 10 ok basic sftp put/get ==== t-sftp-chroot ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sftp-chroot.sh test sftp in chroot: get test sftp in chroot: match ok sftp in chroot ==== t-sftp-cmds ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sftp-cmds.sh sftp commands: lls sftp commands: lls w/path sftp commands: ls sftp commands: shell sftp commands: pwd sftp commands: lpwd sftp commands: quit sftp commands: help sftp commands: get sftp commands: get quoted sftp commands: get filename with quotes sftp commands: get filename with spaces sftp commands: get filename with glob metacharacters sftp commands: get to directory sftp commands: glob get to directory sftp commands: get to local dir sftp commands: glob get to local dir sftp commands: put sftp commands: put filename with quotes sftp commands: put filename with spaces sftp commands: put to directory sftp commands: glob put to directory sftp commands: put to local dir sftp commands: glob put to local dir sftp commands: rename sftp commands: rename directory sftp commands: ln sftp commands: ln -s sftp commands: cp sftp commands: mkdir sftp commands: chdir sftp commands: rmdir sftp commands: lmkdir sftp commands: lchdir ok sftp commands ==== t-sftp-badcmds ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sftp-badcmds.sh sftp invalid commands: get nonexistent sftp invalid commands: glob get to nonexistent directory sftp invalid commands: put nonexistent sftp invalid commands: glob put to nonexistent directory sftp invalid commands: rename nonexistent sftp invalid commands: rename target exists (directory) sftp invalid commands: glob put files to local file ok sftp invalid commands ==== t-sftp-batch ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sftp-batch.sh sftp batchfile: good commands sftp batchfile: bad commands sftp batchfile: comments and blanks sftp batchfile: junk command ok sftp batchfile ==== t-sftp-glob ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sftp-glob.sh sftp glob: file glob sftp glob: dir glob sftp glob: quoted glob sftp glob: escaped glob sftp glob: escaped quote sftp glob: quoted quote sftp glob: single-quoted quote sftp glob: escaped slash sftp glob: quoted slash sftp glob: escaped slash at EOL sftp glob: quoted slash at EOL sftp glob: escaped slash+quote sftp glob: quoted slash+quote sftp glob: escaped space sftp glob: quoted space ok sftp glob ==== t-sftp-perm ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sftp-perm.sh sftp permissions: read-only upload sftp permissions: read-only setstat sftp permissions: read-only rm sftp permissions: read-only mkdir sftp permissions: read-only rmdir sftp permissions: read-only posix-rename sftp permissions: read-only oldrename sftp permissions: read-only symlink sftp permissions: read-only hardlink sftp permissions: explicit open sftp permissions: explicit read sftp permissions: explicit write sftp permissions: explicit lstat sftp permissions: explicit opendir sftp permissions: explicit readdir sftp permissions: explicit setstat sftp permissions: explicit remove sftp permissions: explicit mkdir sftp permissions: explicit rmdir sftp permissions: explicit rename sftp permissions: explicit symlink sftp permissions: explicit hardlink sftp permissions: explicit statvfs ok sftp permissions ==== t-sftp-uri ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sftp-uri.sh sftp-uri: non-interactive fetch to local file sftp-uri: non-interactive fetch to local dir sftp-uri: put to remote directory (trailing slash) sftp-uri: put to remote directory (no slash) ok sftp-uri ==== t-reconfigure ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/reconfigure.sh ok simple connect after reconfigure ==== t-dynamic-forward ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/dynamic-forward.sh test -D forwarding test -R forwarding PermitRemoteOpen=any PermitRemoteOpen=none PermitRemoteOpen=explicit PermitRemoteOpen=disallowed ok dynamic forwarding ==== t-forwarding ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/forwarding.sh ok local and remote forwarding ==== t-multiplex ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/multiplex.sh test connection multiplexing: setenv test connection multiplexing: envpass test connection multiplexing: transfer test connection multiplexing: forward test connection multiplexing: status 0 () test connection multiplexing: status 0 (-Oproxy) test connection multiplexing: status 1 () test connection multiplexing: status 1 (-Oproxy) test connection multiplexing: status 4 () test connection multiplexing: status 4 (-Oproxy) test connection multiplexing: status 5 () test connection multiplexing: status 5 (-Oproxy) test connection multiplexing: status 44 () test connection multiplexing: status 44 (-Oproxy) test connection multiplexing: cmd check test connection multiplexing: cmd forward local (TCP) test connection multiplexing: cmd forward remote (TCP) test connection multiplexing: cmd forward local (UNIX) test connection multiplexing: cmd forward remote (UNIX) test connection multiplexing: cmd exit test connection multiplexing: cmd stop ok connection multiplexing ==== t-reexec ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/reexec.sh test config passing test reexec fallback ok reexec tests ==== t-brokenkeys ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/brokenkeys.sh ok broken keys ==== t-sshcfgparse ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/sshcfgparse.sh reparse minimal config ssh -W opts user first match pubkeyacceptedalgorithms agentforwarding command line override ok ssh config parse ==== t-cfgparse ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/cfgparse.sh reparse minimal config reparse regress config listenaddress order ok sshd config parse ==== t-cfgmatch ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/cfgmatch.sh ok sshd_config match ==== t-cfgmatchlisten ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/cfgmatchlisten.sh ok sshd_config matchlisten ==== t-percent ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/percent.sh percent expansions matchexec percent percent expansions localcommand percent percent expansions remotecommand percent percent expansions controlpath percent percent expansions identityagent percent percent expansions forwardagent percent percent expansions localforward percent percent expansions remoteforward percent percent expansions revokedhostkeys percent percent expansions userknownhostsfile percent percent expansions controlpath dollar percent expansions identityagent dollar percent expansions forwardagent dollar percent expansions localforward dollar percent expansions remoteforward dollar percent expansions userknownhostsfile dollar percent expansions controlpath tilde percent expansions identityagent tilde percent expansions forwardagent tilde ok percent expansions ==== t-addrmatch ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/addrmatch.sh test first entry for user 192.168.0.1 somehost test negative match for user 192.168.30.1 somehost test no match for user 19.0.0.1 somehost test list middle for user 10.255.255.254 somehost test faked IP in hostname for user 192.168.30.1 192.168.0.1 test bare IP4 address for user 1.1.1.1 somehost.example.com test localaddress for user 19.0.0.1 somehost test localport for user 19.0.0.1 somehost test bare IP6 address for user ::1 somehost.example.com test deny IPv6 for user ::2 somehost.example.com test IP6 negated for user ::3 somehost test IP6 no match for user ::4 somehost test IP6 network for user 2000::1 somehost test IP6 network for user 2001::1 somehost test IP6 localaddress for user ::5 somehost test IP6 localport for user ::5 somehost test invalid Match address 10.0.1.0/8 test invalid Match localaddress 10.0.1.0/8 test invalid Match address 10.0.0.1/24 test invalid Match localaddress 10.0.0.1/24 test invalid Match address 2000:aa:bb:01::/56 test invalid Match localaddress 2000:aa:bb:01::/56 ok address match ==== t-localcommand ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/localcommand.sh test localcommand: proto localcommand ok localcommand ==== t-forcecommand ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/forcecommand.sh Connection closed Connection closed ok forced command ==== t-portnum ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/portnum.sh port number parsing: invalid port 0 port number parsing: invalid port 65536 port number parsing: invalid port 131073 port number parsing: invalid port 2000blah port number parsing: invalid port blah2000 port number parsing: valid port 1 port number parsing: valid port 22 port number parsing: valid port 2222 port number parsing: valid port 22222 port number parsing: valid port 65535 ok port number parsing ==== t-keytype ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/keytype.sh keygen ed25519, 512 bits keygen ed25519-sk, n/a bits keygen ecdsa, 256 bits keygen ecdsa, 384 bits keygen ecdsa, 521 bits keygen ecdsa-sk, n/a bits keygen dsa, 1024 bits keygen rsa, 2048 bits keygen rsa, 3072 bits userkey ed25519-512, hostkey ed25519-512 userkey ed25519-512, hostkey ed25519-512 userkey ed25519-512, hostkey ed25519-512 userkey ed25519-sk, hostkey ed25519-sk userkey ed25519-sk, hostkey ed25519-sk userkey ed25519-sk, hostkey ed25519-sk userkey ecdsa-256, hostkey ecdsa-256 userkey ecdsa-256, hostkey ecdsa-256 userkey ecdsa-256, hostkey ecdsa-256 userkey ecdsa-384, hostkey ecdsa-384 userkey ecdsa-384, hostkey ecdsa-384 userkey ecdsa-384, hostkey ecdsa-384 userkey ecdsa-521, hostkey ecdsa-521 userkey ecdsa-521, hostkey ecdsa-521 userkey ecdsa-521, hostkey ecdsa-521 userkey ecdsa-sk, hostkey ecdsa-sk userkey ecdsa-sk, hostkey ecdsa-sk userkey ecdsa-sk, hostkey ecdsa-sk userkey dsa-1024, hostkey dsa-1024 userkey dsa-1024, hostkey dsa-1024 userkey dsa-1024, hostkey dsa-1024 userkey rsa-2048, hostkey rsa-2048 userkey rsa-2048, hostkey rsa-2048 userkey rsa-2048, hostkey rsa-2048 userkey rsa-3072, hostkey rsa-3072 userkey rsa-3072, hostkey rsa-3072 userkey rsa-3072, hostkey rsa-3072 ok login with different key types ==== t-kextype ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/kextype.sh kex diffie-hellman-group1-sha1 kex diffie-hellman-group14-sha1 kex diffie-hellman-group14-sha256 kex diffie-hellman-group16-sha512 kex diffie-hellman-group18-sha512 kex diffie-hellman-group-exchange-sha1 kex diffie-hellman-group-exchange-sha256 kex ecdh-sha2-nistp256 kex ecdh-sha2-nistp384 kex ecdh-sha2-nistp521 kex curve25519-sha256 kex curve25519-sha256@libssh.org kex sntrup761x25519-sha512@openssh.com ok login with different key exchange algorithms ==== t-cert-hostkey ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/cert-hostkey.sh Revoking from /usr/src/regress/usr.bin/ssh/obj/host_ca_key.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/host_ca_key2.pub certified host keys: sign host ed25519 cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_ed25519.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_ed25519-cert.pub certified host keys: sign host sk-ssh-ed25519@openssh.com cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_sk-ssh-ed25519@openssh.com.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_sk-ssh-ed25519@openssh.com-cert.pub certified host keys: sign host ecdsa-sha2-nistp256 cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_ecdsa-sha2-nistp256.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_ecdsa-sha2-nistp256-cert.pub certified host keys: sign host ecdsa-sha2-nistp384 cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_ecdsa-sha2-nistp384.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_ecdsa-sha2-nistp384-cert.pub certified host keys: sign host ecdsa-sha2-nistp521 cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_ecdsa-sha2-nistp521.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_ecdsa-sha2-nistp521-cert.pub certified host keys: sign host sk-ecdsa-sha2-nistp256@openssh.com cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_sk-ecdsa-sha2-nistp256@openssh.com.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_sk-ecdsa-sha2-nistp256@openssh.com-cert.pub certified host keys: sign host dsa cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_dsa.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_dsa-cert.pub certified host keys: sign host rsa cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_rsa.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_rsa-cert.pub certified host keys: sign host rsa-sha2-256 cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_rsa-sha2-256.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_rsa-sha2-256-cert.pub certified host keys: sign host rsa-sha2-512 cert Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_rsa-sha2-512.pub Revoking from /usr/src/regress/usr.bin/ssh/obj/cert_host_key_rsa-sha2-512-cert.pub certified host keys: host ed25519 cert connect certified host keys: ed25519 basic connect expect success yes certified host keys: ed25519 empty KRL expect success yes certified host keys: ed25519 KRL w/ plain key revoked expect success no certified host keys: ed25519 KRL w/ cert revoked expect success no certified host keys: ed25519 KRL w/ CA revoked expect success no certified host keys: ed25519 empty plaintext revocation expect success yes certified host keys: ed25519 plain key plaintext revocation expect success no certified host keys: ed25519 cert plaintext revocation expect success no certified host keys: ed25519 CA plaintext revocation expect success no certified host keys: host sk-ssh-ed25519@openssh.com cert connect certified host keys: sk-ssh-ed25519@openssh.com basic connect expect success yes certified host keys: sk-ssh-ed25519@openssh.com empty KRL expect success yes certified host keys: sk-ssh-ed25519@openssh.com KRL w/ plain key revoked expect success no certified host keys: sk-ssh-ed25519@openssh.com KRL w/ cert revoked expect success no certified host keys: sk-ssh-ed25519@openssh.com KRL w/ CA revoked expect success no certified host keys: sk-ssh-ed25519@openssh.com empty plaintext revocation expect success yes certified host keys: sk-ssh-ed25519@openssh.com plain key plaintext revocation expect success no certified host keys: sk-ssh-ed25519@openssh.com cert plaintext revocation expect success no certified host keys: sk-ssh-ed25519@openssh.com CA plaintext revocation expect success no certified host keys: host ecdsa-sha2-nistp256 cert connect certified host keys: ecdsa-sha2-nistp256 basic connect expect success yes certified host keys: ecdsa-sha2-nistp256 empty KRL expect success yes certified host keys: ecdsa-sha2-nistp256 KRL w/ plain key revoked expect success no certified host keys: ecdsa-sha2-nistp256 KRL w/ cert revoked expect success no certified host keys: ecdsa-sha2-nistp256 KRL w/ CA revoked expect success no certified host keys: ecdsa-sha2-nistp256 empty plaintext revocation expect success yes certified host keys: ecdsa-sha2-nistp256 plain key plaintext revocation expect success no certified host keys: ecdsa-sha2-nistp256 cert plaintext revocation expect success no certified host keys: ecdsa-sha2-nistp256 CA plaintext revocation expect success no certified host keys: host ecdsa-sha2-nistp384 cert connect certified host keys: ecdsa-sha2-nistp384 basic connect expect success yes certified host keys: ecdsa-sha2-nistp384 empty KRL expect success yes certified host keys: ecdsa-sha2-nistp384 KRL w/ plain key revoked expect success no certified host keys: ecdsa-sha2-nistp384 KRL w/ cert revoked expect success no certified host keys: ecdsa-sha2-nistp384 KRL w/ CA revoked expect success no certified host keys: ecdsa-sha2-nistp384 empty plaintext revocation expect success yes certified host keys: ecdsa-sha2-nistp384 plain key plaintext revocation expect success no certified host keys: ecdsa-sha2-nistp384 cert plaintext revocation expect success no certified host keys: ecdsa-sha2-nistp384 CA plaintext revocation expect success no certified host keys: host ecdsa-sha2-nistp521 cert connect certified host keys: ecdsa-sha2-nistp521 basic connect expect success yes certified host keys: ecdsa-sha2-nistp521 empty KRL expect success yes certified host keys: ecdsa-sha2-nistp521 KRL w/ plain key revoked expect success no certified host keys: ecdsa-sha2-nistp521 KRL w/ cert revoked expect success no certified host keys: ecdsa-sha2-nistp521 KRL w/ CA revoked expect success no certified host keys: ecdsa-sha2-nistp521 empty plaintext revocation expect success yes certified host keys: ecdsa-sha2-nistp521 plain key plaintext revocation expect success no certified host keys: ecdsa-sha2-nistp521 cert plaintext revocation expect success no certified host keys: ecdsa-sha2-nistp521 CA plaintext revocation expect success no certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com cert connect certified host keys: sk-ecdsa-sha2-nistp256@openssh.com basic connect expect success yes certified host keys: sk-ecdsa-sha2-nistp256@openssh.com empty KRL expect success yes certified host keys: sk-ecdsa-sha2-nistp256@openssh.com KRL w/ plain key revoked expect success no certified host keys: sk-ecdsa-sha2-nistp256@openssh.com KRL w/ cert revoked expect success no certified host keys: sk-ecdsa-sha2-nistp256@openssh.com KRL w/ CA revoked expect success no certified host keys: sk-ecdsa-sha2-nistp256@openssh.com empty plaintext revocation expect success yes certified host keys: sk-ecdsa-sha2-nistp256@openssh.com plain key plaintext revocation expect success no certified host keys: sk-ecdsa-sha2-nistp256@openssh.com cert plaintext revocation expect success no certified host keys: sk-ecdsa-sha2-nistp256@openssh.com CA plaintext revocation expect success no certified host keys: host dsa cert connect certified host keys: dsa basic connect expect success yes certified host keys: dsa empty KRL expect success yes certified host keys: dsa KRL w/ plain key revoked expect success no certified host keys: dsa KRL w/ cert revoked expect success no certified host keys: dsa KRL w/ CA revoked expect success no certified host keys: dsa empty plaintext revocation expect success yes certified host keys: dsa plain key plaintext revocation expect success no certified host keys: dsa cert plaintext revocation expect success no certified host keys: dsa CA plaintext revocation expect success no certified host keys: host rsa cert connect certified host keys: rsa basic connect expect success yes certified host keys: rsa empty KRL expect success yes certified host keys: rsa KRL w/ plain key revoked expect success no certified host keys: rsa KRL w/ cert revoked expect success no certified host keys: rsa KRL w/ CA revoked expect success no certified host keys: rsa empty plaintext revocation expect success yes certified host keys: rsa plain key plaintext revocation expect success no certified host keys: rsa cert plaintext revocation expect success no certified host keys: rsa CA plaintext revocation expect success no certified host keys: host rsa-sha2-256 cert connect certified host keys: rsa-sha2-256 basic connect expect success yes certified host keys: rsa-sha2-256 empty KRL expect success yes certified host keys: rsa-sha2-256 KRL w/ plain key revoked expect success no certified host keys: rsa-sha2-256 KRL w/ cert revoked expect success no certified host keys: rsa-sha2-256 KRL w/ CA revoked expect success no certified host keys: rsa-sha2-256 empty plaintext revocation expect success yes certified host keys: rsa-sha2-256 plain key plaintext revocation expect success no certified host keys: rsa-sha2-256 cert plaintext revocation expect success no certified host keys: rsa-sha2-256 CA plaintext revocation expect success no certified host keys: host rsa-sha2-512 cert connect certified host keys: rsa-sha2-512 basic connect expect success yes certified host keys: rsa-sha2-512 empty KRL expect success yes certified host keys: rsa-sha2-512 KRL w/ plain key revoked expect success no certified host keys: rsa-sha2-512 KRL w/ cert revoked expect success no certified host keys: rsa-sha2-512 KRL w/ CA revoked expect success no certified host keys: rsa-sha2-512 empty plaintext revocation expect success yes certified host keys: rsa-sha2-512 plain key plaintext revocation expect success no certified host keys: rsa-sha2-512 cert plaintext revocation expect success no certified host keys: rsa-sha2-512 CA plaintext revocation expect success no certified host keys: host ed25519 revoked cert certified host keys: host sk-ssh-ed25519@openssh.com revoked cert certified host keys: host ecdsa-sha2-nistp256 revoked cert certified host keys: host ecdsa-sha2-nistp384 revoked cert certified host keys: host ecdsa-sha2-nistp521 revoked cert certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com revoked cert certified host keys: host dsa revoked cert certified host keys: host rsa revoked cert certified host keys: host rsa-sha2-256 revoked cert certified host keys: host rsa-sha2-512 revoked cert certified host keys: host ed25519 revoked cert certified host keys: host sk-ssh-ed25519@openssh.com revoked cert certified host keys: host ecdsa-sha2-nistp256 revoked cert certified host keys: host ecdsa-sha2-nistp384 revoked cert certified host keys: host ecdsa-sha2-nistp521 revoked cert certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com revoked cert certified host keys: host dsa revoked cert certified host keys: host rsa revoked cert certified host keys: host rsa-sha2-256 revoked cert certified host keys: host rsa-sha2-512 revoked cert certified host keys: host ed25519 cert downgrade to raw key certified host keys: host sk-ssh-ed25519@openssh.com cert downgrade to raw key certified host keys: host ecdsa-sha2-nistp256 cert downgrade to raw key certified host keys: host ecdsa-sha2-nistp384 cert downgrade to raw key certified host keys: host ecdsa-sha2-nistp521 cert downgrade to raw key certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com cert downgrade to raw key certified host keys: host dsa cert downgrade to raw key certified host keys: host rsa cert downgrade to raw key certified host keys: host rsa-sha2-256 cert downgrade to raw key certified host keys: host rsa-sha2-512 cert downgrade to raw key certified host keys: host ed25519 connect wrong cert certified host keys: host sk-ssh-ed25519@openssh.com connect wrong cert certified host keys: host ecdsa-sha2-nistp256 connect wrong cert certified host keys: host ecdsa-sha2-nistp384 connect wrong cert certified host keys: host ecdsa-sha2-nistp521 connect wrong cert certified host keys: host sk-ecdsa-sha2-nistp256@openssh.com connect wrong cert certified host keys: host dsa connect wrong cert certified host keys: host rsa connect wrong cert certified host keys: host rsa-sha2-256 connect wrong cert certified host keys: host rsa-sha2-512 connect wrong cert ok certified host keys ==== t-cert-userkey ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/cert-userkey.sh certified user keys: sign user ed25519 cert certified user keys: sign user sk-ssh-ed25519@openssh.com cert certified user keys: sign user ecdsa-sha2-nistp256 cert certified user keys: sign user ecdsa-sha2-nistp384 cert certified user keys: sign user ecdsa-sha2-nistp521 cert certified user keys: sign user sk-ecdsa-sha2-nistp256@openssh.com cert certified user keys: sign user dsa cert certified user keys: sign user rsa cert certified user keys: sign user rsa-sha2-256 cert certified user keys: sign user rsa-sha2-512 cert certified user keys: ed25519 missing authorized_principals certified user keys: ed25519 empty authorized_principals certified user keys: ed25519 wrong authorized_principals certified user keys: ed25519 correct authorized_principals certified user keys: ed25519 authorized_principals bad key opt certified user keys: ed25519 authorized_principals command=false certified user keys: ed25519 authorized_principals command=true certified user keys: ed25519 wrong principals key option certified user keys: ed25519 correct principals key option certified user keys: sk-ssh-ed25519@openssh.com missing authorized_principals certified user keys: sk-ssh-ed25519@openssh.com empty authorized_principals certified user keys: sk-ssh-ed25519@openssh.com wrong authorized_principals certified user keys: sk-ssh-ed25519@openssh.com correct authorized_principals certified user keys: sk-ssh-ed25519@openssh.com authorized_principals bad key opt certified user keys: sk-ssh-ed25519@openssh.com authorized_principals command=false certified user keys: sk-ssh-ed25519@openssh.com authorized_principals command=true certified user keys: sk-ssh-ed25519@openssh.com wrong principals key option certified user keys: sk-ssh-ed25519@openssh.com correct principals key option certified user keys: ecdsa-sha2-nistp256 missing authorized_principals certified user keys: ecdsa-sha2-nistp256 empty authorized_principals certified user keys: ecdsa-sha2-nistp256 wrong authorized_principals certified user keys: ecdsa-sha2-nistp256 correct authorized_principals certified user keys: ecdsa-sha2-nistp256 authorized_principals bad key opt certified user keys: ecdsa-sha2-nistp256 authorized_principals command=false certified user keys: ecdsa-sha2-nistp256 authorized_principals command=true certified user keys: ecdsa-sha2-nistp256 wrong principals key option certified user keys: ecdsa-sha2-nistp256 correct principals key option certified user keys: ecdsa-sha2-nistp384 missing authorized_principals certified user keys: ecdsa-sha2-nistp384 empty authorized_principals certified user keys: ecdsa-sha2-nistp384 wrong authorized_principals certified user keys: ecdsa-sha2-nistp384 correct authorized_principals certified user keys: ecdsa-sha2-nistp384 authorized_principals bad key opt certified user keys: ecdsa-sha2-nistp384 authorized_principals command=false certified user keys: ecdsa-sha2-nistp384 authorized_principals command=true certified user keys: ecdsa-sha2-nistp384 wrong principals key option certified user keys: ecdsa-sha2-nistp384 correct principals key option certified user keys: ecdsa-sha2-nistp521 missing authorized_principals certified user keys: ecdsa-sha2-nistp521 empty authorized_principals certified user keys: ecdsa-sha2-nistp521 wrong authorized_principals certified user keys: ecdsa-sha2-nistp521 correct authorized_principals certified user keys: ecdsa-sha2-nistp521 authorized_principals bad key opt certified user keys: ecdsa-sha2-nistp521 authorized_principals command=false certified user keys: ecdsa-sha2-nistp521 authorized_principals command=true certified user keys: ecdsa-sha2-nistp521 wrong principals key option certified user keys: ecdsa-sha2-nistp521 correct principals key option certified user keys: sk-ecdsa-sha2-nistp256@openssh.com missing authorized_principals certified user keys: sk-ecdsa-sha2-nistp256@openssh.com empty authorized_principals certified user keys: sk-ecdsa-sha2-nistp256@openssh.com wrong authorized_principals certified user keys: sk-ecdsa-sha2-nistp256@openssh.com correct authorized_principals certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_principals bad key opt certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_principals command=false certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_principals command=true certified user keys: sk-ecdsa-sha2-nistp256@openssh.com wrong principals key option certified user keys: sk-ecdsa-sha2-nistp256@openssh.com correct principals key option certified user keys: dsa missing authorized_principals certified user keys: dsa empty authorized_principals certified user keys: dsa wrong authorized_principals certified user keys: dsa correct authorized_principals certified user keys: dsa authorized_principals bad key opt certified user keys: dsa authorized_principals command=false certified user keys: dsa authorized_principals command=true certified user keys: dsa wrong principals key option certified user keys: dsa correct principals key option certified user keys: rsa missing authorized_principals certified user keys: rsa empty authorized_principals certified user keys: rsa wrong authorized_principals certified user keys: rsa correct authorized_principals certified user keys: rsa authorized_principals bad key opt certified user keys: rsa authorized_principals command=false certified user keys: rsa authorized_principals command=true certified user keys: rsa wrong principals key option certified user keys: rsa correct principals key option certified user keys: rsa-sha2-256 missing authorized_principals certified user keys: rsa-sha2-256 empty authorized_principals certified user keys: rsa-sha2-256 wrong authorized_principals certified user keys: rsa-sha2-256 correct authorized_principals certified user keys: rsa-sha2-256 authorized_principals bad key opt certified user keys: rsa-sha2-256 authorized_principals command=false certified user keys: rsa-sha2-256 authorized_principals command=true certified user keys: rsa-sha2-256 wrong principals key option certified user keys: rsa-sha2-256 correct principals key option certified user keys: rsa-sha2-512 missing authorized_principals certified user keys: rsa-sha2-512 empty authorized_principals certified user keys: rsa-sha2-512 wrong authorized_principals certified user keys: rsa-sha2-512 correct authorized_principals certified user keys: rsa-sha2-512 authorized_principals bad key opt certified user keys: rsa-sha2-512 authorized_principals command=false certified user keys: rsa-sha2-512 authorized_principals command=true certified user keys: rsa-sha2-512 wrong principals key option certified user keys: rsa-sha2-512 correct principals key option certified user keys: ed25519 authorized_keys connect certified user keys: ed25519 authorized_keys revoked key certified user keys: ed25519 authorized_keys revoked via KRL certified user keys: ed25519 authorized_keys empty KRL certified user keys: sk-ssh-ed25519@openssh.com authorized_keys connect certified user keys: sk-ssh-ed25519@openssh.com authorized_keys revoked key certified user keys: sk-ssh-ed25519@openssh.com authorized_keys revoked via KRL certified user keys: sk-ssh-ed25519@openssh.com authorized_keys empty KRL certified user keys: ecdsa-sha2-nistp256 authorized_keys connect certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked key certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked via KRL certified user keys: ecdsa-sha2-nistp256 authorized_keys empty KRL certified user keys: ecdsa-sha2-nistp384 authorized_keys connect certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked key certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked via KRL certified user keys: ecdsa-sha2-nistp384 authorized_keys empty KRL certified user keys: ecdsa-sha2-nistp521 authorized_keys connect certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked key certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked via KRL certified user keys: ecdsa-sha2-nistp521 authorized_keys empty KRL certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_keys connect certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_keys revoked key certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_keys revoked via KRL certified user keys: sk-ecdsa-sha2-nistp256@openssh.com authorized_keys empty KRL certified user keys: dsa authorized_keys connect certified user keys: dsa authorized_keys revoked key certified user keys: dsa authorized_keys revoked via KRL certified user keys: dsa authorized_keys empty KRL certified user keys: rsa authorized_keys connect certified user keys: rsa authorized_keys revoked key certified user keys: rsa authorized_keys revoked via KRL certified user keys: rsa authorized_keys empty KRL certified user keys: rsa-sha2-256 authorized_keys connect certified user keys: rsa-sha2-256 authorized_keys revoked key certified user keys: rsa-sha2-256 authorized_keys revoked via KRL certified user keys: rsa-sha2-256 authorized_keys empty KRL certified user keys: rsa-sha2-512 authorized_keys connect certified user keys: rsa-sha2-512 authorized_keys revoked key certified user keys: rsa-sha2-512 authorized_keys revoked via KRL certified user keys: rsa-sha2-512 authorized_keys empty KRL certified user keys: rsa-sha2-512 authorized_keys revoked CA key certified user keys: authorized_keys CA does not authenticate certified user keys: ensure CA key does not authenticate user certified user keys: ed25519 TrustedUserCAKeys connect certified user keys: ed25519 TrustedUserCAKeys revoked key certified user keys: ed25519 TrustedUserCAKeys revoked via KRL certified user keys: ed25519 TrustedUserCAKeys empty KRL certified user keys: sk-ssh-ed25519@openssh.com TrustedUserCAKeys connect certified user keys: sk-ssh-ed25519@openssh.com TrustedUserCAKeys revoked key certified user keys: sk-ssh-ed25519@openssh.com TrustedUserCAKeys revoked via KRL certified user keys: sk-ssh-ed25519@openssh.com TrustedUserCAKeys empty KRL certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys connect certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked key certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked via KRL certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys empty KRL certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys connect certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked key certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked via KRL certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys empty KRL certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys connect certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked key certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked via KRL certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys empty KRL certified user keys: sk-ecdsa-sha2-nistp256@openssh.com TrustedUserCAKeys connect certified user keys: sk-ecdsa-sha2-nistp256@openssh.com TrustedUserCAKeys revoked key certified user keys: sk-ecdsa-sha2-nistp256@openssh.com TrustedUserCAKeys revoked via KRL certified user keys: sk-ecdsa-sha2-nistp256@openssh.com TrustedUserCAKeys empty KRL certified user keys: dsa TrustedUserCAKeys connect certified user keys: dsa TrustedUserCAKeys revoked key certified user keys: dsa TrustedUserCAKeys revoked via KRL certified user keys: dsa TrustedUserCAKeys empty KRL certified user keys: rsa TrustedUserCAKeys connect certified user keys: rsa TrustedUserCAKeys revoked key certified user keys: rsa TrustedUserCAKeys revoked via KRL certified user keys: rsa TrustedUserCAKeys empty KRL certified user keys: rsa-sha2-256 TrustedUserCAKeys connect certified user keys: rsa-sha2-256 TrustedUserCAKeys revoked key certified user keys: rsa-sha2-256 TrustedUserCAKeys revoked via KRL certified user keys: rsa-sha2-256 TrustedUserCAKeys empty KRL certified user keys: rsa-sha2-512 TrustedUserCAKeys connect certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked key certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked via KRL certified user keys: rsa-sha2-512 TrustedUserCAKeys empty KRL certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked CA key certified user keys: TrustedUserCAKeys CA does not authenticate certified user keys: ensure CA key does not authenticate user certified user keys: correct principal auth authorized_keys expect success rsa certified user keys: correct principal auth authorized_keys expect success ed25519 certified user keys: correct principal auth TrustedUserCAKeys expect success rsa certified user keys: correct principal auth TrustedUserCAKeys expect success ed25519 certified user keys: host-certificate auth authorized_keys expect failure rsa certified user keys: host-certificate auth authorized_keys expect failure ed25519 certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa certified user keys: host-certificate auth TrustedUserCAKeys expect failure ed25519 certified user keys: wrong principals auth authorized_keys expect failure rsa certified user keys: wrong principals auth authorized_keys expect failure ed25519 certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa certified user keys: wrong principals auth TrustedUserCAKeys expect failure ed25519 certified user keys: cert not yet valid auth authorized_keys expect failure rsa certified user keys: cert not yet valid auth authorized_keys expect failure ed25519 certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure ed25519 certified user keys: cert expired auth authorized_keys expect failure rsa certified user keys: cert expired auth authorized_keys expect failure ed25519 certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa certified user keys: cert expired auth TrustedUserCAKeys expect failure ed25519 certified user keys: cert valid interval auth authorized_keys expect success rsa certified user keys: cert valid interval auth authorized_keys expect success ed25519 certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa certified user keys: cert valid interval auth TrustedUserCAKeys expect success ed25519 certified user keys: wrong source-address auth authorized_keys expect failure rsa certified user keys: wrong source-address auth authorized_keys expect failure ed25519 certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa certified user keys: wrong source-address auth TrustedUserCAKeys expect failure ed25519 certified user keys: force-command auth authorized_keys expect failure rsa certified user keys: force-command auth authorized_keys expect failure ed25519 certified user keys: force-command auth TrustedUserCAKeys expect failure rsa certified user keys: force-command auth TrustedUserCAKeys expect failure ed25519 certified user keys: empty principals auth authorized_keys expect success rsa certified user keys: empty principals auth authorized_keys expect success ed25519 certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa certified user keys: empty principals auth TrustedUserCAKeys expect failure ed25519 certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success ed25519 certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure ed25519 certified user keys: principals key option principals auth authorized_keys expect success rsa certified user keys: principals key option principals auth authorized_keys expect success ed25519 certified user keys: principals key option no principals auth authorized_keys expect failure rsa certified user keys: principals key option no principals auth authorized_keys expect failure ed25519 certified user keys: force-command match true auth authorized_keys expect success rsa certified user keys: force-command match true auth authorized_keys expect success ed25519 certified user keys: force-command match true auth authorized_keys expect failure rsa certified user keys: force-command match true auth authorized_keys expect failure ed25519 certified user keys: force-command mismatch 1 auth authorized_keys expect failure rsa certified user keys: force-command mismatch 1 auth authorized_keys expect failure ed25519 certified user keys: force-command mismatch 2 auth authorized_keys expect failure rsa certified user keys: force-command mismatch 2 auth authorized_keys expect failure ed25519 certified user keys: user ed25519 connect wrong cert certified user keys: user sk-ssh-ed25519@openssh.com connect wrong cert certified user keys: user ecdsa-sha2-nistp256 connect wrong cert certified user keys: user ecdsa-sha2-nistp384 connect wrong cert certified user keys: user ecdsa-sha2-nistp521 connect wrong cert certified user keys: user sk-ecdsa-sha2-nistp256@openssh.com connect wrong cert certified user keys: user dsa connect wrong cert certified user keys: user rsa connect wrong cert certified user keys: user rsa-sha2-256 connect wrong cert certified user keys: user rsa-sha2-512 connect wrong cert ok certified user keys ==== t-host-expand ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/host-expand.sh ok expand %h and %n ==== t-keys-command ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/keys-command.sh AuthorizedKeysCommand with arguments AuthorizedKeysCommand without arguments ok authorized keys from command ==== t-forward-control ==== env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/forward-control.sh check_lfwd done (expecting Y): default configuration check_rfwd done (expecting Y): default configuration check_lfwd done (expecting Y): AllowTcpForwarding=yes check_rfwd done (expecting Y): AllowTcpForwarding=yes check_lfwd done (expecting N): AllowTcpForwarding=yes, !PermitOpen check_rfwd done (expecting Y): AllowTcpForwarding=yes, !PermitOpen check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen check_lfwd done (expecting N): AllowTcpForwarding=yes, !permitopen check_rfwd done (expecting Y): AllowTcpForwarding=yes, !permitopen check_lfwd done (expecting Y): AllowTcpForwarding=yes, permitopen check_rfwd done (expecting Y): AllowTcpForwarding=yes, permitopen check_lfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding check_rfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding check_lfwd done (expecting N): AllowTcpForwarding=yes, restrict check_rfwd done (expecting N): AllowTcpForwarding=yes, restrict check_lfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding check_rfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding check_lfwd done (expecting Y): AllowTcpForwarding=local check_rfwd done (expecting N): AllowTcpForwarding=local check_lfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitOpen check_rfwd done (expecting N): AllowTcpForwarding=local, PermitOpen check_lfwd done (expecting N): AllowTcpForwarding=local, !permitopen check_rfwd done (expecting N): AllowTcpForwarding=local, !permitopen check_lfwd done (expecting Y): AllowTcpForwarding=local, permitopen check_rfwd done (expecting N): AllowTcpForwarding=local, permitopen check_lfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding check_rfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding check_lfwd done (expecting N): AllowTcpForwarding=local, restrict check_rfwd done (expecting N): AllowTcpForwarding=local, restrict check_lfwd done (expecting Y): AllowTcpForwarding=local, restrict,port-forwarding check_rfwd done (expecting N): AllowTcpForwarding=local, restrict,port-forwarding check_lfwd done (expecting N): AllowTcpForwarding=remote check_rfwd done (expecting Y): AllowTcpForwarding=remote check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitOpen check_rfwd done (expecting Y): AllowTcpForwarding=remote, !PermitOpen check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitOpen check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitOpen check_lfwd done (expecting N): AllowTcpForwarding=remote, !permitopen check_rfwd done (expecting Y): AllowTcpForwarding=remote, !permitopen check_lfwd done (expecting N): AllowTcpForwarding=remote, permitopen check_rfwd done (expecting Y): AllowTcpForwarding=remote, permitopen check_lfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding check_rfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict check_rfwd done (expecting N): AllowTcpForwarding=remote, restrict check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict,port-forwarding check_rfwd done (expecting Y): AllowTcpForwarding=remote, restrict,port-forwarding check_lfwd done (expecting N): AllowTcpForwarding=no check_rfwd done (expecting N): AllowTcpForwarding=no check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen check_lfwd done (expecting N): AllowTcpForwarding=no, PermitOpen check_rfwd done (expecting N): AllowTcpForwarding=no, PermitOpen check_lfwd done (expecting N): AllowTcpForwarding=no, !permitopen check_rfwd done (expecting N): AllowTcpForwarding=no, !permitopen check_lfwd done (expecting N): AllowTcpForwarding=no, permitopen check_rfwd done (expecting N): AllowTcpForwarding=no, permitopen check_lfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding check_rfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding check_lfwd done (expecting N): AllowTcpForwarding=no, restrict check_rfwd done (expecting N): AllowTcpForwarding=no, restrict check_lfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding check_rfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding check_lfwd done (expecting Y): AllowTcpForwarding=yes, !PermitListen check_rfwd done (expecting N): AllowTcpForwarding=yes, !PermitListen check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen check_lfwd done (expecting Y): AllowTcpForwarding=local, !PermitListen check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitListen check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitListen check_rfwd done (expecting N): AllowTcpForwarding=local, PermitListen check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen check_rfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitListen check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitListen check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitListen check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitListen check_lfwd done (expecting N): AllowTcpForwarding=no, PermitListen check_rfwd done (expecting N): AllowTcpForwarding=no, PermitListen ok sshd control of local and remote forwarding ==== t-integrity ==== cc -O2 -pipe -MD -MP -o modpipe /usr/src/regress/usr.bin/ssh/modpipe.c env SUDO="" "MALLOC_OPTIONS=CFGJRSUX" sh /usr/src/regress/usr.bin/ssh/test-exec.sh /usr/src/regress/usr.bin/ssh/obj /usr/src/regress/usr.bin/ssh/integrity.sh test integrity: hmac-sha1 @2900 test integrity: hmac-sha1 @2901 test integrity: hmac-sha1 @2902 test integrity: hmac-sha1 @2903 test integrity: hmac-sha1 @2904 test integrity: hmac-sha1 @2905 test integrity: hmac-sha1 @2906 test integrity: hmac-sha1 @2907 test integrity: hmac-sha1 @2908 test integrity: hmac-sha1 @2909 test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0 test integrity: hmac-sha1-96 @2900 test integrity: hmac-sha1-96 @2901 test integrity: hmac-sha1-96 @2902 test integrity: hmac-sha1-96 @2903 test integrity: hmac-sha1-96 @2904 test integrity: hmac-sha1-96 @2905 test integrity: hmac-sha1-96 @2906 test integrity: hmac-sha1-96 @2907 NOTERM usr.bin/ssh Test running too long, aborted.