START: ptest-runner
2026-04-24T07:59
test "x" = "x" || mkdir -p /valgrind-out
set -xe ; if ssh -Q key | grep -q "^ssh-rsa" ; then \
	ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv ; \
	tr '\n' '\r' </usr/lib/openssh/ptest/regress/rsa_ssh2.prv > /usr/lib/openssh/ptest/regress/rsa_ssh2_cr.prv ; \
	ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_cr.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv ; \
	awk '{print $0 "\r"}' /usr/lib/openssh/ptest/regress/rsa_ssh2.prv > /usr/lib/openssh/ptest/regress/rsa_ssh2_crnl.prv ; \
	ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_crnl.prv | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv ; \
fi
+ ssh -Q key
+ grep -q ^ssh-rsa
+ ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2.prv
+ diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv
+ tr '\n' '\r'
+ ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_cr.prv
+ diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv
+ awk '{print $0 "\r"}' /usr/lib/openssh/ptest/regress/rsa_ssh2.prv
+ ssh-keygen -if /usr/lib/openssh/ptest/regress/rsa_ssh2_crnl.prv
+ diff - /usr/lib/openssh/ptest/regress/rsa_openssh.prv
set -xe ; if ssh -Q key | grep -q "^ssh-rsa" ; then \
	cat /usr/lib/openssh/ptest/regress/rsa_openssh.prv > /t2.out ; \
	chmod 600 /t2.out ; \
	ssh-keygen -yf /t2.out | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub ; \
fi
+ ssh -Q key
+ grep -q ^ssh-rsa
+ cat /usr/lib/openssh/ptest/regress/rsa_openssh.prv
+ chmod 600 /t2.out
+ ssh-keygen -yf /t2.out
+ diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub
set -xe ; if ssh -Q key | grep -q "^ssh-rsa" ; then \
	ssh-keygen -ef /usr/lib/openssh/ptest/regress/rsa_openssh.pub >/t3.out ; \
	ssh-keygen -if /t3.out | diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub ; \
fi
+ ssh -Q key
+ grep -q ^ssh-rsa
+ ssh-keygen -ef /usr/lib/openssh/ptest/regress/rsa_openssh.pub
+ diff - /usr/lib/openssh/ptest/regress/rsa_openssh.pub
+ ssh-keygen -if /t3.out
set -xe ; if ssh -Q key | grep -q "^ssh-rsa" ; then \
	ssh-keygen -E md5 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\
		awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t4.ok ; \
fi
+ ssh -Q key
+ grep -q ^ssh-rsa
+ ssh-keygen -E md5 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub
+ awk '{print $2}'
+ diff - /usr/lib/openssh/ptest/regress/t4.ok
set -xe ; if ssh -Q key | grep -q "^ssh-rsa" ; then \
	ssh-keygen -Bf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\
		awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t5.ok ; \
fi
+ ssh -Q key
+ grep -q ^ssh-rsa
+ awk '{print $2}'
+ ssh-keygen -Bf /usr/lib/openssh/ptest/regress/rsa_openssh.pub
+ diff - /usr/lib/openssh/ptest/regress/t5.ok
set -xe ; if ssh -Q key | grep -q "^ssh-rsa" ; then \
	ssh-keygen -q -t rsa -N '' -f /t7.out ; \
fi
+ ssh -Q key
+ grep -q ^ssh-rsa
+ ssh-keygen -q -t rsa -N  -f /t7.out
set -xe ; if ssh -Q key | grep -q "^ssh-rsa" ; then \
	ssh-keygen -lf /t7.out > /dev/null ; \
	ssh-keygen -Bf /t7.out > /dev/null ; \
fi
+ ssh -Q key
+ grep -q ^ssh-rsa
+ ssh-keygen -lf /t7.out
+ ssh-keygen -Bf /t7.out
! ssh -Q key-plain | grep ecdsa >/dev/null || \
ssh-keygen -q -t ecdsa -N '' -f /t9.out
! ssh -Q key-plain | grep ecdsa >/dev/null || \
ssh-keygen -lf /t9.out > /dev/null
! ssh -Q key-plain | grep ecdsa >/dev/null || \
ssh-keygen -Bf /t9.out > /dev/null
ssh-keygen -q -t ed25519 -N '' -f /t10.out
ssh-keygen -lf /t10.out > /dev/null
ssh-keygen -Bf /t10.out > /dev/null
set -xe ; if ssh -Q key | grep -q "^ssh-rsa" ; then \
	ssh-keygen -E sha256 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub |\
		awk '{print $2}' | diff - /usr/lib/openssh/ptest/regress/t11.ok ; \
fi
+ ssh -Q key
+ grep -q ^ssh-rsa
+ ssh-keygen -E sha256 -lf /usr/lib/openssh/ptest/regress/rsa_openssh.pub
+ awk '{print $2}'
+ diff - /usr/lib/openssh/ptest/regress/t11.ok
ssh-keygen -q -t ed25519 -N '' -C 'test-comment-1234' -f /t12.out
ssh-keygen -lf /t12.out.pub | grep test-comment-1234 >/dev/null
run test connect.sh ...
PASS: simple connect
run test proxy-connect.sh ...
plain username comp=no
plain username comp=yes
username with style
PASS: proxy connect
run test sshfp-connect.sh ...
SKIPPED: TEST_SSH_SSHFP_DOMAIN not set.
run test connect-privsep.sh ...
PASS: proxy connect with privsep
run test connect-uri.sh ...
uri connect: no trailing slash
uri connect: trailing slash
uri connect: with path name
PASS: uri connect
run test proto-version.sh ...
PASS: sshd version with different protocol combinations
run test proto-mismatch.sh ...
PASS: protocol version mismatch
run test exit-status.sh ...
test remote exit status: status 0
test remote exit status: status 1
test remote exit status: status 4
test remote exit status: status 5
test remote exit status: status 44
PASS: remote exit status
run test exit-status-signal.sh ...
PASS: exit status on signal
run test envpass.sh ...
test environment passing: pass env, don't accept
test environment passing: setenv, don't accept
test environment passing: don't pass env, accept
test environment passing: pass single env, accept single env
test environment passing: pass multiple env, accept multiple env
test environment passing: setenv, accept
test environment passing: setenv, first match wins
test environment passing: server setenv wins
test environment passing: server setenv wins
PASS: environment passing
run test transfer.sh ...
PASS: transfer data
run test banner.sh ...
test banner: missing banner file
test banner: size 0
test banner: size 10
test banner: size 100
test banner: size 1000
test banner: size 10000
test banner: size 100000
test banner: suppress banner (-q)
PASS: banner
run test rekey.sh ...
client rekey KexAlgorithms=diffie-hellman-group1-sha1
client rekey KexAlgorithms=diffie-hellman-group14-sha1
client rekey KexAlgorithms=diffie-hellman-group14-sha256
client rekey KexAlgorithms=diffie-hellman-group16-sha512
client rekey KexAlgorithms=diffie-hellman-group18-sha512
client rekey KexAlgorithms=diffie-hellman-group-exchange-sha1
client rekey KexAlgorithms=diffie-hellman-group-exchange-sha256
client rekey KexAlgorithms=ecdh-sha2-nistp256
client rekey KexAlgorithms=ecdh-sha2-nistp384
client rekey KexAlgorithms=ecdh-sha2-nistp521
client rekey KexAlgorithms=curve25519-sha256
client rekey KexAlgorithms=sntrup761x25519-sha512
client rekey KexAlgorithms=sntrup761x25519-sha512@openssh.com
client rekey KexAlgorithms=mlkem768x25519-sha256
client rekey Ciphers=3des-cbc
client rekey Ciphers=aes128-cbc
client rekey Ciphers=aes192-cbc
client rekey Ciphers=aes256-cbc
client rekey Ciphers=aes128-ctr
client rekey Ciphers=aes192-ctr
client rekey Ciphers=aes256-ctr
client rekey Ciphers=aes128-gcm@openssh.com
client rekey Ciphers=aes256-gcm@openssh.com
client rekey Ciphers=chacha20-poly1305@openssh.com
client rekey MACs=hmac-sha1
client rekey MACs=hmac-sha1-96
client rekey MACs=hmac-sha2-256
client rekey MACs=hmac-sha2-512
client rekey MACs=hmac-md5
client rekey MACs=hmac-md5-96
client rekey MACs=umac-64@openssh.com
client rekey MACs=umac-128@openssh.com
client rekey MACs=hmac-sha1-etm@openssh.com
client rekey MACs=hmac-sha1-96-etm@openssh.com
client rekey MACs=hmac-sha2-256-etm@openssh.com
client rekey MACs=hmac-sha2-512-etm@openssh.com
client rekey MACs=hmac-md5-etm@openssh.com
client rekey MACs=hmac-md5-96-etm@openssh.com
client rekey MACs=umac-64-etm@openssh.com
client rekey MACs=umac-128-etm@openssh.com
client rekeylimit 16
client rekeylimit 1k
client rekeylimit 128k
client rekeylimit 256k
client rekeylimit default 5
client rekeylimit default 10
client rekeylimit default 5 no data
client rekeylimit default 10 no data
server rekeylimit 16
server rekeylimit 1k
server rekeylimit 128k
server rekeylimit 256k
server rekeylimit default 5 no data
server rekeylimit default 10 no data
rekeylimit parsing: bytes
rekeylimit parsing: time
PASS: rekey
run test dhgex.sh ...
dhgex bits 3072 diffie-hellman-group-exchange-sha1 3des-cbc
dhgex bits 3072 diffie-hellman-group-exchange-sha256 3des-cbc
dhgex bits 3072 diffie-hellman-group-exchange-sha1 aes128-cbc
dhgex bits 3072 diffie-hellman-group-exchange-sha256 aes128-cbc
dhgex bits 3072 diffie-hellman-group-exchange-sha1 aes128-ctr
dhgex bits 3072 diffie-hellman-group-exchange-sha256 aes128-ctr
dhgex bits 3072 diffie-hellman-group-exchange-sha1 aes128-gcm@openssh.com
dhgex bits 3072 diffie-hellman-group-exchange-sha256 aes128-gcm@openssh.com
dhgex bits 7680 diffie-hellman-group-exchange-sha1 aes192-cbc
dhgex bits 7680 diffie-hellman-group-exchange-sha256 aes192-cbc
dhgex bits 7680 diffie-hellman-group-exchange-sha1 aes192-ctr
dhgex bits 7680 diffie-hellman-group-exchange-sha256 aes192-ctr
dhgex bits 8192 diffie-hellman-group-exchange-sha1 aes256-cbc
dhgex bits 8192 diffie-hellman-group-exchange-sha256 aes256-cbc
dhgex bits 8192 diffie-hellman-group-exchange-sha1 aes256-ctr
dhgex bits 8192 diffie-hellman-group-exchange-sha256 aes256-ctr
dhgex bits 8192 diffie-hellman-group-exchange-sha1 aes256-gcm@openssh.com
dhgex bits 8192 diffie-hellman-group-exchange-sha256 aes256-gcm@openssh.com
dhgex bits 8192 diffie-hellman-group-exchange-sha1 chacha20-poly1305@openssh.com
dhgex bits 8192 diffie-hellman-group-exchange-sha256 chacha20-poly1305@openssh.com
PASS: dhgex
run test stderr-data.sh ...
test stderr data transfer: ()
test stderr data transfer: (-n)
PASS: stderr data transfer
run test stderr-after-eof.sh ...
PASS: stderr data after eof
run test broken-pipe.sh ...
PASS: broken pipe test
run test try-ciphers.sh ...
test try ciphers: cipher 3des-cbc mac hmac-sha1
test try ciphers: cipher 3des-cbc mac hmac-sha1-96
test try ciphers: cipher 3des-cbc mac hmac-sha2-256
test try ciphers: cipher 3des-cbc mac hmac-sha2-512
test try ciphers: cipher 3des-cbc mac hmac-md5
test try ciphers: cipher 3des-cbc mac hmac-md5-96
test try ciphers: cipher 3des-cbc mac umac-64@openssh.com
test try ciphers: cipher 3des-cbc mac umac-128@openssh.com
test try ciphers: cipher 3des-cbc mac hmac-sha1-etm@openssh.com
test try ciphers: cipher 3des-cbc mac hmac-sha1-96-etm@openssh.com
test try ciphers: cipher 3des-cbc mac hmac-sha2-256-etm@openssh.com
test try ciphers: cipher 3des-cbc mac hmac-sha2-512-etm@openssh.com
test try ciphers: cipher 3des-cbc mac hmac-md5-etm@openssh.com
test try ciphers: cipher 3des-cbc mac hmac-md5-96-etm@openssh.com
test try ciphers: cipher 3des-cbc mac umac-64-etm@openssh.com
test try ciphers: cipher 3des-cbc mac umac-128-etm@openssh.com
test try ciphers: cipher aes128-cbc mac hmac-sha1
test try ciphers: cipher aes128-cbc mac hmac-sha1-96
test try ciphers: cipher aes128-cbc mac hmac-sha2-256
test try ciphers: cipher aes128-cbc mac hmac-sha2-512
test try ciphers: cipher aes128-cbc mac hmac-md5
test try ciphers: cipher aes128-cbc mac hmac-md5-96
test try ciphers: cipher aes128-cbc mac umac-64@openssh.com
test try ciphers: cipher aes128-cbc mac umac-128@openssh.com
test try ciphers: cipher aes128-cbc mac hmac-sha1-etm@openssh.com
test try ciphers: cipher aes128-cbc mac hmac-sha1-96-etm@openssh.com
test try ciphers: cipher aes128-cbc mac hmac-sha2-256-etm@openssh.com
test try ciphers: cipher aes128-cbc mac hmac-sha2-512-etm@openssh.com
test try ciphers: cipher aes128-cbc mac hmac-md5-etm@openssh.com
test try ciphers: cipher aes128-cbc mac hmac-md5-96-etm@openssh.com
test try ciphers: cipher aes128-cbc mac umac-64-etm@openssh.com
test try ciphers: cipher aes128-cbc mac umac-128-etm@openssh.com
test try ciphers: cipher aes192-cbc mac hmac-sha1
test try ciphers: cipher aes192-cbc mac hmac-sha1-96
test try ciphers: cipher aes192-cbc mac hmac-sha2-256
test try ciphers: cipher aes192-cbc mac hmac-sha2-512
test try ciphers: cipher aes192-cbc mac hmac-md5
test try ciphers: cipher aes192-cbc mac hmac-md5-96
test try ciphers: cipher aes192-cbc mac umac-64@openssh.com
test try ciphers: cipher aes192-cbc mac umac-128@openssh.com
test try ciphers: cipher aes192-cbc mac hmac-sha1-etm@openssh.com
test try ciphers: cipher aes192-cbc mac hmac-sha1-96-etm@openssh.com
test try ciphers: cipher aes192-cbc mac hmac-sha2-256-etm@openssh.com
test try ciphers: cipher aes192-cbc mac hmac-sha2-512-etm@openssh.com
test try ciphers: cipher aes192-cbc mac hmac-md5-etm@openssh.com
test try ciphers: cipher aes192-cbc mac hmac-md5-96-etm@openssh.com
test try ciphers: cipher aes192-cbc mac umac-64-etm@openssh.com
test try ciphers: cipher aes192-cbc mac umac-128-etm@openssh.com
test try ciphers: cipher aes256-cbc mac hmac-sha1
test try ciphers: cipher aes256-cbc mac hmac-sha1-96
test try ciphers: cipher aes256-cbc mac hmac-sha2-256
test try ciphers: cipher aes256-cbc mac hmac-sha2-512
test try ciphers: cipher aes256-cbc mac hmac-md5
test try ciphers: cipher aes256-cbc mac hmac-md5-96
test try ciphers: cipher aes256-cbc mac umac-64@openssh.com
test try ciphers: cipher aes256-cbc mac umac-128@openssh.com
test try ciphers: cipher aes256-cbc mac hmac-sha1-etm@openssh.com
test try ciphers: cipher aes256-cbc mac hmac-sha1-96-etm@openssh.com
test try ciphers: cipher aes256-cbc mac hmac-sha2-256-etm@openssh.com
test try ciphers: cipher aes256-cbc mac hmac-sha2-512-etm@openssh.com
test try ciphers: cipher aes256-cbc mac hmac-md5-etm@openssh.com
test try ciphers: cipher aes256-cbc mac hmac-md5-96-etm@openssh.com
test try ciphers: cipher aes256-cbc mac umac-64-etm@openssh.com
test try ciphers: cipher aes256-cbc mac umac-128-etm@openssh.com
test try ciphers: cipher aes128-ctr mac hmac-sha1
test try ciphers: cipher aes128-ctr mac hmac-sha1-96
test try ciphers: cipher aes128-ctr mac hmac-sha2-256
test try ciphers: cipher aes128-ctr mac hmac-sha2-512
test try ciphers: cipher aes128-ctr mac hmac-md5
test try ciphers: cipher aes128-ctr mac hmac-md5-96
test try ciphers: cipher aes128-ctr mac umac-64@openssh.com
test try ciphers: cipher aes128-ctr mac umac-128@openssh.com
test try ciphers: cipher aes128-ctr mac hmac-sha1-etm@openssh.com
test try ciphers: cipher aes128-ctr mac hmac-sha1-96-etm@openssh.com
test try ciphers: cipher aes128-ctr mac hmac-sha2-256-etm@openssh.com
test try ciphers: cipher aes128-ctr mac hmac-sha2-512-etm@openssh.com
test try ciphers: cipher aes128-ctr mac hmac-md5-etm@openssh.com
test try ciphers: cipher aes128-ctr mac hmac-md5-96-etm@openssh.com
test try ciphers: cipher aes128-ctr mac umac-64-etm@openssh.com
test try ciphers: cipher aes128-ctr mac umac-128-etm@openssh.com
test try ciphers: cipher aes192-ctr mac hmac-sha1
test try ciphers: cipher aes192-ctr mac hmac-sha1-96
test try ciphers: cipher aes192-ctr mac hmac-sha2-256
test try ciphers: cipher aes192-ctr mac hmac-sha2-512
test try ciphers: cipher aes192-ctr mac hmac-md5
test try ciphers: cipher aes192-ctr mac hmac-md5-96
test try ciphers: cipher aes192-ctr mac umac-64@openssh.com
test try ciphers: cipher aes192-ctr mac umac-128@openssh.com
test try ciphers: cipher aes192-ctr mac hmac-sha1-etm@openssh.com
test try ciphers: cipher aes192-ctr mac hmac-sha1-96-etm@openssh.com
test try ciphers: cipher aes192-ctr mac hmac-sha2-256-etm@openssh.com
test try ciphers: cipher aes192-ctr mac hmac-sha2-512-etm@openssh.com
test try ciphers: cipher aes192-ctr mac hmac-md5-etm@openssh.com
test try ciphers: cipher aes192-ctr mac hmac-md5-96-etm@openssh.com
test try ciphers: cipher aes192-ctr mac umac-64-etm@openssh.com
test try ciphers: cipher aes192-ctr mac umac-128-etm@openssh.com
test try ciphers: cipher aes256-ctr mac hmac-sha1
test try ciphers: cipher aes256-ctr mac hmac-sha1-96
test try ciphers: cipher aes256-ctr mac hmac-sha2-256
test try ciphers: cipher aes256-ctr mac hmac-sha2-512
test try ciphers: cipher aes256-ctr mac hmac-md5
test try ciphers: cipher aes256-ctr mac hmac-md5-96
test try ciphers: cipher aes256-ctr mac umac-64@openssh.com
test try ciphers: cipher aes256-ctr mac umac-128@openssh.com
test try ciphers: cipher aes256-ctr mac hmac-sha1-etm@openssh.com
test try ciphers: cipher aes256-ctr mac hmac-sha1-96-etm@openssh.com
test try ciphers: cipher aes256-ctr mac hmac-sha2-256-etm@openssh.com
test try ciphers: cipher aes256-ctr mac hmac-sha2-512-etm@openssh.com
test try ciphers: cipher aes256-ctr mac hmac-md5-etm@openssh.com
test try ciphers: cipher aes256-ctr mac hmac-md5-96-etm@openssh.com
test try ciphers: cipher aes256-ctr mac umac-64-etm@openssh.com
test try ciphers: cipher aes256-ctr mac umac-128-etm@openssh.com
test try ciphers: cipher aes128-gcm@openssh.com mac hmac-sha1
test try ciphers: cipher aes256-gcm@openssh.com mac hmac-sha1
test try ciphers: cipher chacha20-poly1305@openssh.com mac hmac-sha1
PASS: try ciphers
run test yes-head.sh ...
PASS: yes pipe head
run test login-timeout.sh ...
PASS: connect after login grace timeout
run test agent.sh ...
PASS: simple agent test
run test agent-getpeereid.sh ...
SKIPPED: skipped (running as root)
run test agent-timeout.sh ...
PASS: agent timeout test
run test agent-subprocess.sh ...
PASS: agent subprocess
run test keyscan.sh ...
PASS: keyscan
run test keygen-change.sh ...
PASS: change passphrase for key
run test keygen-comment.sh ...
PASS: Comment extraction from private key
run test keygen-convert.sh ...
PASS: convert keys
run test keygen-knownhosts.sh ...
/usr/lib/openssh/ptest/regress/kh.hosts updated.
Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old
/usr/lib/openssh/ptest/regress/kh.hosts updated.
Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old
/usr/lib/openssh/ptest/regress/kh.hosts updated.
Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old
/usr/lib/openssh/ptest/regress/kh.hosts updated.
Original contents retained as /usr/lib/openssh/ptest/regress/kh.hosts.old
/usr/lib/openssh/ptest/regress/kh.hashed updated.
Original contents retained as /usr/lib/openssh/ptest/regress/kh.hashed.old
PASS: ssh-keygen known_hosts
run test keygen-moduli.sh ...
PASS: keygen moduli
run test keygen-sshfp.sh ...
PASS: keygen-sshfp
run test key-options.sh ...
key option command="echo bar"
key option no-pty,command="echo bar"
key option pty default
key option pty no-pty
key option pty restrict
key option pty restrict,pty
key option environment
key option from="127.0.0.1"
debug1: mm_log_handler: write: Broken pipe
key option from="127.0.0.0/8"
debug1: mm_log_handler: write: Broken pipe
key option expiry-time default
key option expiry-time invalid
key option expiry-time expired
debug1: mm_log_handler: write: Broken pipe
key option expiry-time valid-64b
PASS: key options
run test scp.sh ...
scp: scp mode: simple copy local file to local file
scp: scp mode: simple copy local file to remote file
scp: scp mode: simple copy remote file to local file
scp: scp mode: copy local file to remote file in place
scp: scp mode: copy remote file to local file in place
scp: scp mode: copy local file to remote file clobber
-rw-r--r-- 1 root root 703264 Apr 24 08:12 /usr/lib/openssh/ptest/regress/copy
-rw-r--r-- 1 root root 703264 Apr 24 08:12 /usr/lib/openssh/ptest/regress/data
scp: scp mode: copy remote file to local file clobber
scp: scp mode: simple copy local file to remote dir
scp: scp mode: simple copy local file to local dir
scp: scp mode: simple copy remote file to local dir
scp: scp mode: recursive local dir to remote dir
scp: scp mode: recursive local dir to local dir
scp: scp mode: recursive remote dir to local dir
scp: scp mode: unmatched glob file local->remote
scp: scp mode: unmatched glob file remote->local
scp: scp mode: unmatched glob dir recursive local->remote
scp: scp mode: unmatched glob dir recursive remote->local
scp: scp mode: shell metacharacters
scp: scp mode: disallow bad server #0
scp: scp mode: disallow bad server #1
scp: scp mode: disallow bad server #2
scp: scp mode: disallow bad server #3
scp: scp mode: disallow bad server #4
scp: scp mode: disallow bad server #5
scp: scp mode: disallow bad server #6
scp: scp mode: disallow bad server #7
scp: scp mode: detect non-directory target
/usr/lib/openssh/ptest/regress/copy2: Not a directory
scp: sftp mode: simple copy local file to local file
scp: sftp mode: simple copy local file to remote file
scp: sftp mode: simple copy remote file to local file
scp: sftp mode: copy local file to remote file in place
scp: sftp mode: copy remote file to local file in place
scp: sftp mode: copy local file to remote file clobber
-rw-r--r-- 1 root root 703264 Apr 24 08:12 /usr/lib/openssh/ptest/regress/copy
-rw-r--r-- 1 root root 703264 Apr 24 08:12 /usr/lib/openssh/ptest/regress/data
scp: sftp mode: copy remote file to local file clobber
scp: sftp mode: simple copy local file to remote dir
scp: sftp mode: simple copy local file to local dir
scp: sftp mode: simple copy remote file to local dir
scp: sftp mode: recursive local dir to remote dir
scp: sftp mode: recursive local dir to local dir
scp: sftp mode: recursive remote dir to local dir
scp: sftp mode: unmatched glob file local->remote
scp: sftp mode: unmatched glob file remote->local
scp: sftp mode: unmatched glob dir recursive local->remote
scp: sftp mode: unmatched glob dir recursive remote->local
scp: sftp mode: shell metacharacters
scp: sftp mode: disallow bad server #0
scp: sftp mode: disallow bad server #1
scp: sftp mode: disallow bad server #2
scp: sftp mode: disallow bad server #3
scp: sftp mode: disallow bad server #4
scp: sftp mode: disallow bad server #5
scp: sftp mode: disallow bad server #6
scp: sftp mode: disallow bad server #7
scp: sftp mode: detect non-directory target
/usr/lib/openssh/ptest/regress/copy2: Not a directory
scp: sftp mode: recursive local .. to remote dir
scp: sftp mode: recursive remote .. to local dir
PASS: scp
run test scp3.sh ...
scp3: scp mode: simple copy remote file to remote file
scp3: scp mode: simple copy remote file to remote dir
scp3: scp mode: recursive remote dir to remote dir
scp3: scp mode: detect non-directory target
scp3: sftp mode: simple copy remote file to remote file
scp3: sftp mode: simple copy remote file to remote dir
scp3: sftp mode: recursive remote dir to remote dir
scp3: sftp mode: detect non-directory target
scp: /usr/lib/openssh/ptest/regress/copy2: destination is not a directory
scp: /usr/lib/openssh/ptest/regress/copy2: destination is not a directory
scp3: sftp mode: recursive ..
PASS: scp3
run test scp-uri.sh ...
scp-uri: scp mode: simple copy local file to remote file
scp-uri: scp mode: simple copy remote file to local file
scp-uri: scp mode: simple copy local file to remote dir
scp-uri: scp mode: simple copy remote file to local dir
scp-uri: scp mode: recursive local dir to remote dir
scp-uri: scp mode: recursive remote dir to local dir
scp-uri: sftp mode: simple copy local file to remote file
scp-uri: sftp mode: simple copy remote file to local file
scp-uri: sftp mode: simple copy local file to remote dir
scp-uri: sftp mode: simple copy remote file to local dir
scp-uri: sftp mode: recursive local dir to remote dir
scp-uri: sftp mode: recursive remote dir to local dir
PASS: scp-uri
run test sftp.sh ...
test basic sftp put/get: buffer_size 5 num_requests 1
test basic sftp put/get: buffer_size 5 num_requests 2
test basic sftp put/get: buffer_size 5 num_requests 10
test basic sftp put/get: buffer_size 1000 num_requests 1
test basic sftp put/get: buffer_size 1000 num_requests 2
test basic sftp put/get: buffer_size 1000 num_requests 10
test basic sftp put/get: buffer_size 32000 num_requests 1
test basic sftp put/get: buffer_size 32000 num_requests 2
test basic sftp put/get: buffer_size 32000 num_requests 10
test basic sftp put/get: buffer_size 64000 num_requests 1
test basic sftp put/get: buffer_size 64000 num_requests 2
test basic sftp put/get: buffer_size 64000 num_requests 10
PASS: basic sftp put/get
run test sftp-chroot.sh ...
test sftp in chroot: get
test sftp in chroot: match
PASS: sftp in chroot
run test sftp-cmds.sh ...
sftp commands: lls
sftp commands: lls w/path
sftp commands: ls
sftp commands: shell
sftp commands: pwd
sftp commands: lpwd
sftp commands: quit
sftp commands: help
sftp commands: get
sftp commands: get quoted
sftp commands: get filename with quotes
sftp commands: get filename with spaces
sftp commands: get filename with glob metacharacters
sftp commands: get to directory
sftp commands: glob get to directory
sftp commands: get to local dir
sftp commands: glob get to local dir
sftp commands: get recursive absolute
sftp commands: get recursive relative src
sftp commands: get relative ..
sftp commands: get recursive relative ..
sftp commands: put
sftp commands: put filename with quotes
sftp commands: put filename with spaces
sftp commands: put to directory
sftp commands: glob put to directory
sftp commands: put to local dir
sftp commands: glob put to local dir
sftp commands: put recursive absolute
sftp commands: put recursive relative src
sftp commands: put recursive ..
sftp commands: put recursive .. relative
sftp commands: rename
sftp commands: rename directory
sftp commands: ln
sftp commands: ln -s
sftp commands: cp
sftp commands: mkdir
sftp commands: chdir
sftp commands: rmdir
sftp commands: lmkdir
sftp commands: lchdir
PASS: sftp commands
run test sftp-badcmds.sh ...
sftp invalid commands: get nonexistent
sftp invalid commands: glob get to nonexistent directory
sftp invalid commands: put nonexistent
sftp invalid commands: glob put to nonexistent directory
sftp invalid commands: rename nonexistent
sftp invalid commands: rename target exists (directory)
sftp invalid commands: glob put files to local file
PASS: sftp invalid commands
run test sftp-batch.sh ...
sftp batchfile: good commands
sftp batchfile: bad commands
sftp batchfile: comments and blanks
sftp batchfile: junk command
PASS: sftp batchfile
run test sftp-glob.sh ...
sftp glob: file glob
sftp glob: dir glob
sftp glob: quoted glob
sftp glob: escaped glob
sftp glob: escaped quote
sftp glob: quoted quote
sftp glob: single-quoted quote
sftp glob: escaped space
sftp glob: quoted space
sftp glob: escaped slash
sftp glob: quoted slash
sftp glob: escaped slash at EOL
sftp glob: quoted slash at EOL
sftp glob: escaped slash+quote
sftp glob: quoted slash+quote
PASS: sftp glob
run test sftp-perm.sh ...
sftp permissions: read-only upload
sftp permissions: read-only setstat
sftp permissions: read-only rm
sftp permissions: read-only mkdir
sftp permissions: read-only rmdir
sftp permissions: read-only posix-rename
sftp permissions: read-only oldrename
sftp permissions: read-only symlink
sftp permissions: read-only hardlink
sftp permissions: explicit open
sftp permissions: explicit read
sftp permissions: explicit write
sftp permissions: explicit lstat
sftp permissions: explicit opendir
sftp permissions: explicit readdir
sftp permissions: explicit setstat
sftp permissions: explicit remove
sftp permissions: explicit mkdir
sftp permissions: explicit rmdir
sftp permissions: explicit rename
sftp permissions: explicit symlink
sftp permissions: explicit hardlink
sftp permissions: explicit statvfs
PASS: sftp permissions
run test sftp-resume.sh ...
sftp resume: put
sftp resume: get
PASS: sftp resume
run test sftp-uri.sh ...
sftp-uri: non-interactive fetch to local file
sftp-uri: non-interactive fetch to local dir
sftp-uri: put to remote directory (trailing slash)
sftp-uri: put to remote directory (no slash)
PASS: sftp-uri
run test reconfigure.sh ...
PASS: simple connect after reconfigure
run test dynamic-forward.sh ...
test -D forwarding
test -R forwarding
PermitRemoteOpen=any
PermitRemoteOpen=none
PermitRemoteOpen=explicit
PermitRemoteOpen=disallowed
PASS: dynamic forwarding
run test forwarding.sh ...
PASS: local and remote forwarding
run test multiplex.sh ...
test connection multiplexing: setenv
test connection multiplexing: envpass
test connection multiplexing: transfer 
test connection multiplexing: transfer -Oproxy
test connection multiplexing: forward
test connection multiplexing: status 0 ()
test connection multiplexing: status 0 (-Oproxy)
test connection multiplexing: status 1 ()
test connection multiplexing: status 1 (-Oproxy)
test connection multiplexing: status 4 ()
test connection multiplexing: status 4 (-Oproxy)
test connection multiplexing: status 5 ()
test connection multiplexing: status 5 (-Oproxy)
test connection multiplexing: status 44 ()
test connection multiplexing: status 44 (-Oproxy)
test connection multiplexing: cmd check
test connection multiplexing: cmd forward local (TCP)
test connection multiplexing: cmd forward remote (TCP)
test connection multiplexing: cmd forward local (UNIX)
test connection multiplexing: cmd forward remote (UNIX)
test connection multiplexing: cmd conninfo
test connection multiplexing: cmd exit
test connection multiplexing: cmd stop
test connection multiplexing: cmd conninfo algos
test connection multiplexing: cmd conninfo compression
PASS: connection multiplexing
run test reexec.sh ...
test config passing
test reexec fallback
PASS: reexec tests
run test brokenkeys.sh ...
PASS: broken keys
run test sshcfgparse.sh ...
reparse minimal config
ssh -W opts
user first match
pubkeyacceptedalgorithms
agentforwarding
command line override
PASS: ssh config parse
run test cfgparse.sh ...
reparse minimal config
reparse regress config
listenaddress order
maxstartups idempotent
PASS: sshd config parse
run test cfgmatch.sh ...
PASS: sshd_config match
run test cfgmatchlisten.sh ...
PASS: sshd_config matchlisten
run test percent.sh ...
percent expansions matchexec percent
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
percent expansions localcommand percent
percent expansions remotecommand percent
percent expansions controlpath percent
percent expansions identityagent percent
percent expansions forwardagent percent
percent expansions localforward percent
percent expansions remoteforward percent
percent expansions revokedhostkeys percent
percent expansions user percent
percent expansions setenv percent
percent expansions userknownhostsfile percent
percent expansions controlpath dollar
percent expansions identityagent dollar
percent expansions forwardagent dollar
percent expansions localforward dollar
percent expansions remoteforward dollar
percent expansions setenv dollar
percent expansions userknownhostsfile dollar
percent expansions controlpath tilde
percent expansions identityagent tilde
percent expansions forwardagent tilde
percent expansions user-l noexpand
percent expansions user-at noexpand
percent expansions user-l noenv
remote username contains invalid characters
percent expansions user-at noenv
remote username contains invalid characters
percent expansions user-l badchar
remote username contains invalid characters
percent expansions user-at badchar
remote username contains invalid characters
percent expansions user control-literal
remote username contains invalid characters
PASS: percent expansions
run test addrmatch.sh ...
test first entry for user 192.168.0.1 somehost
test negative match for user 192.168.30.1 somehost
test no match for user 19.0.0.1 somehost
test list middle for user 10.255.255.254 somehost
test faked IP in hostname for user 192.168.30.1 192.168.0.1
test bare IP4 address for user 1.1.1.1 somehost.example.com
test localaddress for user 19.0.0.1 somehost
test localport for user 19.0.0.1 somehost
test bare IP6 address for user ::1 somehost.example.com
test deny IPv6 for user ::2 somehost.example.com
test IP6 negated for user ::3 somehost
test IP6 no match for user ::4 somehost
test IP6 network for user 2000::1 somehost
test IP6 network for user 2001::1 somehost
test IP6 localaddress for user ::5 somehost
test IP6 localport for user ::5 somehost
test invalid Match address 10.0.1.0/8
test invalid Match localaddress 10.0.1.0/8
test invalid Match address 10.0.0.1/24
test invalid Match localaddress 10.0.0.1/24
test invalid Match address 2000:aa:bb:01::/56
test invalid Match localaddress 2000:aa:bb:01::/56
PASS: address match
run test localcommand.sh ...
test localcommand: proto  localcommand
PASS: localcommand
run test forcecommand.sh ...

Connection closed.  
Connection closed

Connection closed.  
Connection closed
PASS: forced command
run test portnum.sh ...
port number parsing: invalid port 0
port number parsing: invalid port 65536
port number parsing: invalid port 131073
port number parsing: invalid port 2000blah
port number parsing: invalid port blah2000
port number parsing: valid port 1
port number parsing: valid port 22
port number parsing: valid port 2222
port number parsing: valid port 22222
port number parsing: valid port 65535
PASS: port number parsing
run test keytype.sh ...
keygen ed25519, 512 bits
keygen ecdsa, 256 bits
keygen ecdsa, 384 bits
keygen ecdsa, 521 bits
keygen rsa, 2048 bits
keygen rsa, 3072 bits
userkey ed25519-512, hostkey ed25519-512
userkey ed25519-512, hostkey ed25519-512
userkey ed25519-512, hostkey ed25519-512
userkey ecdsa-256, hostkey ecdsa-256
userkey ecdsa-256, hostkey ecdsa-256
userkey ecdsa-256, hostkey ecdsa-256
userkey ecdsa-384, hostkey ecdsa-384
userkey ecdsa-384, hostkey ecdsa-384
userkey ecdsa-384, hostkey ecdsa-384
userkey ecdsa-521, hostkey ecdsa-521
userkey ecdsa-521, hostkey ecdsa-521
userkey ecdsa-521, hostkey ecdsa-521
userkey rsa-2048, hostkey rsa-2048
userkey rsa-2048, hostkey rsa-2048
userkey rsa-2048, hostkey rsa-2048
userkey rsa-3072, hostkey rsa-3072
userkey rsa-3072, hostkey rsa-3072
userkey rsa-3072, hostkey rsa-3072
PASS: login with different key types
run test kextype.sh ...
kex diffie-hellman-group1-sha1
kex diffie-hellman-group14-sha1
kex diffie-hellman-group14-sha256
kex diffie-hellman-group16-sha512
kex diffie-hellman-group18-sha512
kex diffie-hellman-group-exchange-sha1
kex diffie-hellman-group-exchange-sha256
kex ecdh-sha2-nistp256
kex ecdh-sha2-nistp384
kex ecdh-sha2-nistp521
kex curve25519-sha256
kex curve25519-sha256@libssh.org
kex sntrup761x25519-sha512
kex sntrup761x25519-sha512@openssh.com
kex mlkem768x25519-sha256
PASS: login with different key exchange algorithms
run test cert-hostkey.sh ...
Revoking from /usr/lib/openssh/ptest/regress/host_ca_key.pub
Revoking from /usr/lib/openssh/ptest/regress/host_ca_key2.pub
certified host keys: sign host ed25519 cert
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ed25519.pub
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ed25519-cert.pub
certified host keys: sign host ecdsa-sha2-nistp256 cert
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp256.pub
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp256-cert.pub
certified host keys: sign host ecdsa-sha2-nistp384 cert
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp384.pub
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp384-cert.pub
certified host keys: sign host ecdsa-sha2-nistp521 cert
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp521.pub
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_ecdsa-sha2-nistp521-cert.pub
certified host keys: sign host rsa cert
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa.pub
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-cert.pub
certified host keys: sign host rsa-sha2-256 cert
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-256.pub
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-256-cert.pub
certified host keys: sign host rsa-sha2-512 cert
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-512.pub
Revoking from /usr/lib/openssh/ptest/regress/cert_host_key_rsa-sha2-512-cert.pub
certified host keys: host ed25519 cert connect
certified host keys: ed25519 basic connect expect success yes
certified host keys: ed25519 empty KRL expect success yes
certified host keys: ed25519 multiple KRL files expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ed25519 KRL w/ plain key revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ed25519 KRL w/ cert revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ed25519 KRL w/ CA revoked expect success no
certified host keys: ed25519 empty plaintext revocation expect success yes
certified host keys: ed25519 plain key plaintext revocation expect success no
certified host keys: ed25519 cert plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ed25519 CA plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: host ecdsa-sha2-nistp256 cert connect
certified host keys: ecdsa-sha2-nistp256 basic connect expect success yes
certified host keys: ecdsa-sha2-nistp256 empty KRL expect success yes
certified host keys: ecdsa-sha2-nistp256 multiple KRL files expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp256 KRL w/ plain key revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp256 KRL w/ cert revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp256 KRL w/ CA revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp256 empty plaintext revocation expect success yes
certified host keys: ecdsa-sha2-nistp256 plain key plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp256 cert plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp256 CA plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: host ecdsa-sha2-nistp384 cert connect
certified host keys: ecdsa-sha2-nistp384 basic connect expect success yes
certified host keys: ecdsa-sha2-nistp384 empty KRL expect success yes
certified host keys: ecdsa-sha2-nistp384 multiple KRL files expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp384 KRL w/ plain key revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp384 KRL w/ cert revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp384 KRL w/ CA revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp384 empty plaintext revocation expect success yes
certified host keys: ecdsa-sha2-nistp384 plain key plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp384 cert plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp384 CA plaintext revocation expect success no
certified host keys: host ecdsa-sha2-nistp521 cert connect
certified host keys: ecdsa-sha2-nistp521 basic connect expect success yes
certified host keys: ecdsa-sha2-nistp521 empty KRL expect success yes
certified host keys: ecdsa-sha2-nistp521 multiple KRL files expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp521 KRL w/ plain key revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp521 KRL w/ cert revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp521 KRL w/ CA revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp521 empty plaintext revocation expect success yes
certified host keys: ecdsa-sha2-nistp521 plain key plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp521 cert plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: ecdsa-sha2-nistp521 CA plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: host rsa cert connect
certified host keys: rsa basic connect expect success yes
certified host keys: rsa empty KRL expect success yes
certified host keys: rsa multiple KRL files expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa KRL w/ plain key revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa KRL w/ cert revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa KRL w/ CA revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa empty plaintext revocation expect success yes
certified host keys: rsa plain key plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa cert plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa CA plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: host rsa-sha2-256 cert connect
certified host keys: rsa-sha2-256 basic connect expect success yes
certified host keys: rsa-sha2-256 empty KRL expect success yes
certified host keys: rsa-sha2-256 multiple KRL files expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-256 KRL w/ plain key revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-256 KRL w/ cert revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-256 KRL w/ CA revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-256 empty plaintext revocation expect success yes
certified host keys: rsa-sha2-256 plain key plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-256 cert plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-256 CA plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: host rsa-sha2-512 cert connect
certified host keys: rsa-sha2-512 basic connect expect success yes
certified host keys: rsa-sha2-512 empty KRL expect success yes
certified host keys: rsa-sha2-512 multiple KRL files expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-512 KRL w/ plain key revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-512 KRL w/ cert revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-512 KRL w/ CA revoked expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-512 empty plaintext revocation expect success yes
certified host keys: rsa-sha2-512 plain key plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-512 cert plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: rsa-sha2-512 CA plaintext revocation expect success no
debug1: mm_log_handler: write: Broken pipe
certified host keys: host ed25519 revoked cert
certified host keys: host ecdsa-sha2-nistp256 revoked cert
certified host keys: host ecdsa-sha2-nistp384 revoked cert
certified host keys: host ecdsa-sha2-nistp521 revoked cert
certified host keys: host rsa revoked cert
certified host keys: host rsa-sha2-256 revoked cert
certified host keys: host rsa-sha2-512 revoked cert
certified host keys: host ed25519 revoked cert
certified host keys: host ecdsa-sha2-nistp256 revoked cert
certified host keys: host ecdsa-sha2-nistp384 revoked cert
certified host keys: host ecdsa-sha2-nistp521 revoked cert
certified host keys: host rsa revoked cert
certified host keys: host rsa-sha2-256 revoked cert
certified host keys: host rsa-sha2-512 revoked cert
certified host keys: host ed25519  cert downgrade to raw key
certified host keys: host ecdsa-sha2-nistp256  cert downgrade to raw key
certified host keys: host ecdsa-sha2-nistp384  cert downgrade to raw key
certified host keys: host ecdsa-sha2-nistp521  cert downgrade to raw key
certified host keys: host rsa  cert downgrade to raw key
certified host keys: host rsa-sha2-256  cert downgrade to raw key
certified host keys: host rsa-sha2-512  cert downgrade to raw key
certified host keys: host ed25519 connect wrong cert
certified host keys: host ecdsa-sha2-nistp256 connect wrong cert
certified host keys: host ecdsa-sha2-nistp384 connect wrong cert
certified host keys: host ecdsa-sha2-nistp521 connect wrong cert
certified host keys: host rsa connect wrong cert
certified host keys: host rsa-sha2-256 connect wrong cert
certified host keys: host rsa-sha2-512 connect wrong cert
PASS: certified host keys
run test cert-userkey.sh ...
certified user keys: sign user ed25519 cert
certified user keys: sign user ecdsa-sha2-nistp256 cert
certified user keys: sign user ecdsa-sha2-nistp384 cert
certified user keys: sign user ecdsa-sha2-nistp521 cert
certified user keys: sign user rsa cert
certified user keys: sign user rsa-sha2-256 cert
certified user keys: sign user rsa-sha2-512 cert
certified user keys: ed25519 missing authorized_principals
certified user keys: ed25519 empty authorized_principals
certified user keys: ed25519 wrong authorized_principals
certified user keys: ed25519 correct authorized_principals
certified user keys: ed25519 authorized_principals bad key opt
certified user keys: ed25519 authorized_principals command=false
certified user keys: ed25519 authorized_principals command=true
certified user keys: ed25519 wrong principals key option
certified user keys: ed25519 correct principals key option
certified user keys: ecdsa-sha2-nistp256 missing authorized_principals
certified user keys: ecdsa-sha2-nistp256 empty authorized_principals
certified user keys: ecdsa-sha2-nistp256 wrong authorized_principals
certified user keys: ecdsa-sha2-nistp256 correct authorized_principals
certified user keys: ecdsa-sha2-nistp256 authorized_principals bad key opt
certified user keys: ecdsa-sha2-nistp256 authorized_principals command=false
certified user keys: ecdsa-sha2-nistp256 authorized_principals command=true
certified user keys: ecdsa-sha2-nistp256 wrong principals key option
certified user keys: ecdsa-sha2-nistp256 correct principals key option
certified user keys: ecdsa-sha2-nistp384 missing authorized_principals
certified user keys: ecdsa-sha2-nistp384 empty authorized_principals
certified user keys: ecdsa-sha2-nistp384 wrong authorized_principals
certified user keys: ecdsa-sha2-nistp384 correct authorized_principals
certified user keys: ecdsa-sha2-nistp384 authorized_principals bad key opt
certified user keys: ecdsa-sha2-nistp384 authorized_principals command=false
certified user keys: ecdsa-sha2-nistp384 authorized_principals command=true
certified user keys: ecdsa-sha2-nistp384 wrong principals key option
certified user keys: ecdsa-sha2-nistp384 correct principals key option
certified user keys: ecdsa-sha2-nistp521 missing authorized_principals
certified user keys: ecdsa-sha2-nistp521 empty authorized_principals
certified user keys: ecdsa-sha2-nistp521 wrong authorized_principals
certified user keys: ecdsa-sha2-nistp521 correct authorized_principals
certified user keys: ecdsa-sha2-nistp521 authorized_principals bad key opt
certified user keys: ecdsa-sha2-nistp521 authorized_principals command=false
certified user keys: ecdsa-sha2-nistp521 authorized_principals command=true
certified user keys: ecdsa-sha2-nistp521 wrong principals key option
certified user keys: ecdsa-sha2-nistp521 correct principals key option
certified user keys: rsa missing authorized_principals
certified user keys: rsa empty authorized_principals
certified user keys: rsa wrong authorized_principals
certified user keys: rsa correct authorized_principals
certified user keys: rsa authorized_principals bad key opt
certified user keys: rsa authorized_principals command=false
certified user keys: rsa authorized_principals command=true
certified user keys: rsa wrong principals key option
certified user keys: rsa correct principals key option
certified user keys: rsa-sha2-256 missing authorized_principals
certified user keys: rsa-sha2-256 empty authorized_principals
certified user keys: rsa-sha2-256 wrong authorized_principals
certified user keys: rsa-sha2-256 correct authorized_principals
certified user keys: rsa-sha2-256 authorized_principals bad key opt
certified user keys: rsa-sha2-256 authorized_principals command=false
certified user keys: rsa-sha2-256 authorized_principals command=true
certified user keys: rsa-sha2-256 wrong principals key option
certified user keys: rsa-sha2-256 correct principals key option
certified user keys: rsa-sha2-512 missing authorized_principals
certified user keys: rsa-sha2-512 empty authorized_principals
certified user keys: rsa-sha2-512 wrong authorized_principals
certified user keys: rsa-sha2-512 correct authorized_principals
certified user keys: rsa-sha2-512 authorized_principals bad key opt
certified user keys: rsa-sha2-512 authorized_principals command=false
certified user keys: rsa-sha2-512 authorized_principals command=true
certified user keys: rsa-sha2-512 wrong principals key option
certified user keys: rsa-sha2-512 correct principals key option
certified user keys: ed25519 authorized_keys connect
certified user keys: ed25519 authorized_keys revoked key
certified user keys: ed25519 authorized_keys revoked via KRL
certified user keys: ed25519 authorized_keys empty KRL
certified user keys: ecdsa-sha2-nistp256 authorized_keys connect
certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked key
certified user keys: ecdsa-sha2-nistp256 authorized_keys revoked via KRL
certified user keys: ecdsa-sha2-nistp256 authorized_keys empty KRL
certified user keys: ecdsa-sha2-nistp384 authorized_keys connect
certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked key
certified user keys: ecdsa-sha2-nistp384 authorized_keys revoked via KRL
certified user keys: ecdsa-sha2-nistp384 authorized_keys empty KRL
certified user keys: ecdsa-sha2-nistp521 authorized_keys connect
certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked key
certified user keys: ecdsa-sha2-nistp521 authorized_keys revoked via KRL
certified user keys: ecdsa-sha2-nistp521 authorized_keys empty KRL
certified user keys: rsa authorized_keys connect
certified user keys: rsa authorized_keys revoked key
certified user keys: rsa authorized_keys revoked via KRL
certified user keys: rsa authorized_keys empty KRL
certified user keys: rsa-sha2-256 authorized_keys connect
certified user keys: rsa-sha2-256 authorized_keys revoked key
certified user keys: rsa-sha2-256 authorized_keys revoked via KRL
certified user keys: rsa-sha2-256 authorized_keys empty KRL
certified user keys: rsa-sha2-512 authorized_keys connect
certified user keys: rsa-sha2-512 authorized_keys revoked key
certified user keys: rsa-sha2-512 authorized_keys revoked via KRL
certified user keys: rsa-sha2-512 authorized_keys empty KRL
certified user keys: rsa-sha2-512 authorized_keys revoked CA key
certified user keys: authorized_keys CA does not authenticate
certified user keys: ensure CA key does not authenticate user
certified user keys: ed25519 TrustedUserCAKeys connect
certified user keys: ed25519 TrustedUserCAKeys revoked key
certified user keys: ed25519 TrustedUserCAKeys revoked via KRL
certified user keys: ed25519 TrustedUserCAKeys empty KRL
certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys connect
certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked key
certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys revoked via KRL
certified user keys: ecdsa-sha2-nistp256 TrustedUserCAKeys empty KRL
certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys connect
certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked key
certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys revoked via KRL
certified user keys: ecdsa-sha2-nistp384 TrustedUserCAKeys empty KRL
certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys connect
certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked key
certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys revoked via KRL
certified user keys: ecdsa-sha2-nistp521 TrustedUserCAKeys empty KRL
certified user keys: rsa TrustedUserCAKeys connect
certified user keys: rsa TrustedUserCAKeys revoked key
certified user keys: rsa TrustedUserCAKeys revoked via KRL
certified user keys: rsa TrustedUserCAKeys empty KRL
certified user keys: rsa-sha2-256 TrustedUserCAKeys connect
certified user keys: rsa-sha2-256 TrustedUserCAKeys revoked key
certified user keys: rsa-sha2-256 TrustedUserCAKeys revoked via KRL
certified user keys: rsa-sha2-256 TrustedUserCAKeys empty KRL
certified user keys: rsa-sha2-512 TrustedUserCAKeys connect
certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked key
certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked via KRL
certified user keys: rsa-sha2-512 TrustedUserCAKeys empty KRL
certified user keys: rsa-sha2-512 TrustedUserCAKeys revoked CA key
certified user keys: TrustedUserCAKeys CA does not authenticate
certified user keys: ensure CA key does not authenticate user
certified user keys: correct principal auth authorized_keys expect success rsa
certified user keys: correct principal auth authorized_keys expect success ed25519
certified user keys: correct principal auth TrustedUserCAKeys expect success rsa
certified user keys: correct principal auth TrustedUserCAKeys expect success ed25519
certified user keys: correct principal auth authorized_keys expect success rsa
certified user keys: correct principal auth authorized_keys expect success ed25519
certified user keys: correct principal auth TrustedUserCAKeys expect success rsa
certified user keys: correct principal auth TrustedUserCAKeys expect success ed25519
certified user keys: host-certificate auth authorized_keys expect failure rsa
certified user keys: host-certificate auth authorized_keys expect failure ed25519
certified user keys: host-certificate auth TrustedUserCAKeys expect failure rsa
certified user keys: host-certificate auth TrustedUserCAKeys expect failure ed25519
certified user keys: wrong principals auth authorized_keys expect failure rsa
certified user keys: wrong principals auth authorized_keys expect failure ed25519
certified user keys: wrong principals auth TrustedUserCAKeys expect failure rsa
certified user keys: wrong principals auth TrustedUserCAKeys expect failure ed25519
certified user keys: cert not yet valid auth authorized_keys expect failure rsa
certified user keys: cert not yet valid auth authorized_keys expect failure ed25519
certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure rsa
certified user keys: cert not yet valid auth TrustedUserCAKeys expect failure ed25519
certified user keys: cert expired auth authorized_keys expect failure rsa
certified user keys: cert expired auth authorized_keys expect failure ed25519
certified user keys: cert expired auth TrustedUserCAKeys expect failure rsa
certified user keys: cert expired auth TrustedUserCAKeys expect failure ed25519
certified user keys: cert valid interval auth authorized_keys expect success rsa
certified user keys: cert valid interval auth authorized_keys expect success ed25519
certified user keys: cert valid interval auth TrustedUserCAKeys expect success rsa
certified user keys: cert valid interval auth TrustedUserCAKeys expect success ed25519
certified user keys: wrong source-address auth authorized_keys expect failure rsa
certified user keys: wrong source-address auth authorized_keys expect failure ed25519
certified user keys: wrong source-address auth TrustedUserCAKeys expect failure rsa
certified user keys: wrong source-address auth TrustedUserCAKeys expect failure ed25519
certified user keys: force-command auth authorized_keys expect failure rsa
certified user keys: force-command auth authorized_keys expect failure ed25519
certified user keys: force-command auth TrustedUserCAKeys expect failure rsa
certified user keys: force-command auth TrustedUserCAKeys expect failure ed25519
certified user keys: empty principals auth authorized_keys expect failure rsa
Warning: certificate will contain no principals (-n)
certified user keys: empty principals auth authorized_keys expect failure ed25519
Warning: certificate will contain no principals (-n)
certified user keys: empty principals auth TrustedUserCAKeys expect failure rsa
Warning: certificate will contain no principals (-n)
certified user keys: empty principals auth TrustedUserCAKeys expect failure ed25519
Warning: certificate will contain no principals (-n)
certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success rsa
certified user keys: AuthorizedPrincipalsFile principals auth TrustedUserCAKeys expect success ed25519
certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure rsa
Warning: certificate will contain no principals (-n)
certified user keys: AuthorizedPrincipalsFile no principals auth TrustedUserCAKeys expect failure ed25519
Warning: certificate will contain no principals (-n)
certified user keys: principals key option principals auth authorized_keys expect success rsa
certified user keys: principals key option principals auth authorized_keys expect success ed25519
certified user keys: principals key option no principals auth authorized_keys expect failure rsa
Warning: certificate will contain no principals (-n)
certified user keys: principals key option no principals auth authorized_keys expect failure ed25519
Warning: certificate will contain no principals (-n)
certified user keys: force-command match true auth authorized_keys expect success rsa
certified user keys: force-command match true auth authorized_keys expect success ed25519
certified user keys: force-command match true auth authorized_keys expect failure rsa
certified user keys: force-command match true auth authorized_keys expect failure ed25519
certified user keys: force-command mismatch 1 auth authorized_keys expect failure rsa
certified user keys: force-command mismatch 1 auth authorized_keys expect failure ed25519
certified user keys: force-command mismatch 2 auth authorized_keys expect failure rsa
certified user keys: force-command mismatch 2 auth authorized_keys expect failure ed25519
certified user keys: user ed25519 connect wrong cert
certified user keys: user ecdsa-sha2-nistp256 connect wrong cert
certified user keys: user ecdsa-sha2-nistp384 connect wrong cert
certified user keys: user ecdsa-sha2-nistp521 connect wrong cert
certified user keys: user rsa connect wrong cert
certified user keys: user rsa-sha2-256 connect wrong cert
certified user keys: user rsa-sha2-512 connect wrong cert
PASS: certified user keys
run test host-expand.sh ...
PASS: expand %h and %n
run test keys-command.sh ...
AuthorizedKeysCommand with arguments
AuthorizedKeysCommand without arguments
PASS: authorized keys from command
run test forward-control.sh ...
check_lfwd done (expecting Y): default configuration
check_rfwd done (expecting Y): default configuration
check_lfwd done (expecting Y): AllowTcpForwarding=yes
check_rfwd done (expecting Y): AllowTcpForwarding=yes
check_lfwd done (expecting N): AllowTcpForwarding=yes, !PermitOpen
check_rfwd done (expecting Y): AllowTcpForwarding=yes, !PermitOpen
check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen
check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitOpen
check_lfwd done (expecting N): AllowTcpForwarding=yes, !permitopen
check_rfwd done (expecting Y): AllowTcpForwarding=yes, !permitopen
check_lfwd done (expecting Y): AllowTcpForwarding=yes, permitopen
check_rfwd done (expecting Y): AllowTcpForwarding=yes, permitopen
check_lfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding
check_rfwd done (expecting N): AllowTcpForwarding=yes, no-port-forwarding
check_lfwd done (expecting N): AllowTcpForwarding=yes, restrict
check_rfwd done (expecting N): AllowTcpForwarding=yes, restrict
check_lfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding
check_rfwd done (expecting Y): AllowTcpForwarding=yes, restrict,port-forwarding
check_lfwd done (expecting Y): AllowTcpForwarding=local
check_rfwd done (expecting N): AllowTcpForwarding=local
check_lfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen
check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitOpen
check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitOpen
check_rfwd done (expecting N): AllowTcpForwarding=local, PermitOpen
check_lfwd done (expecting N): AllowTcpForwarding=local, !permitopen
check_rfwd done (expecting N): AllowTcpForwarding=local, !permitopen
check_lfwd done (expecting Y): AllowTcpForwarding=local, permitopen
check_rfwd done (expecting N): AllowTcpForwarding=local, permitopen
check_lfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding
check_rfwd done (expecting N): AllowTcpForwarding=local, no-port-forwarding
check_lfwd done (expecting N): AllowTcpForwarding=local, restrict
check_rfwd done (expecting N): AllowTcpForwarding=local, restrict
check_lfwd done (expecting Y): AllowTcpForwarding=local, restrict,port-forwarding
check_rfwd done (expecting N): AllowTcpForwarding=local, restrict,port-forwarding
check_lfwd done (expecting N): AllowTcpForwarding=remote
check_rfwd done (expecting Y): AllowTcpForwarding=remote
check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitOpen
check_rfwd done (expecting Y): AllowTcpForwarding=remote, !PermitOpen
check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitOpen
check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitOpen
check_lfwd done (expecting N): AllowTcpForwarding=remote, !permitopen
check_rfwd done (expecting Y): AllowTcpForwarding=remote, !permitopen
check_lfwd done (expecting N): AllowTcpForwarding=remote, permitopen
check_rfwd done (expecting Y): AllowTcpForwarding=remote, permitopen
check_lfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding
check_rfwd done (expecting N): AllowTcpForwarding=remote, no-port-forwarding
check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict
check_rfwd done (expecting N): AllowTcpForwarding=remote, restrict
check_lfwd done (expecting N): AllowTcpForwarding=remote, restrict,port-forwarding
check_rfwd done (expecting Y): AllowTcpForwarding=remote, restrict,port-forwarding
check_lfwd done (expecting N): AllowTcpForwarding=no
check_rfwd done (expecting N): AllowTcpForwarding=no
check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen
check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitOpen
check_lfwd done (expecting N): AllowTcpForwarding=no, PermitOpen
check_rfwd done (expecting N): AllowTcpForwarding=no, PermitOpen
check_lfwd done (expecting N): AllowTcpForwarding=no, !permitopen
check_rfwd done (expecting N): AllowTcpForwarding=no, !permitopen
check_lfwd done (expecting N): AllowTcpForwarding=no, permitopen
check_rfwd done (expecting N): AllowTcpForwarding=no, permitopen
check_lfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding
check_rfwd done (expecting N): AllowTcpForwarding=no, no-port-forwarding
check_lfwd done (expecting N): AllowTcpForwarding=no, restrict
check_rfwd done (expecting N): AllowTcpForwarding=no, restrict
check_lfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding
check_rfwd done (expecting N): AllowTcpForwarding=no, restrict,port-forwarding
check_lfwd done (expecting Y): AllowTcpForwarding=yes, !PermitListen
check_rfwd done (expecting N): AllowTcpForwarding=yes, !PermitListen
check_lfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen
check_rfwd done (expecting Y): AllowTcpForwarding=yes, PermitListen
check_lfwd done (expecting Y): AllowTcpForwarding=local, !PermitListen
check_rfwd done (expecting N): AllowTcpForwarding=local, !PermitListen
check_lfwd done (expecting Y): AllowTcpForwarding=local, PermitListen
check_rfwd done (expecting N): AllowTcpForwarding=local, PermitListen
check_lfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen
check_rfwd done (expecting N): AllowTcpForwarding=remote, !PermitListen
check_lfwd done (expecting N): AllowTcpForwarding=remote, PermitListen
check_rfwd done (expecting Y): AllowTcpForwarding=remote, PermitListen
check_lfwd done (expecting N): AllowTcpForwarding=no, !PermitListen
check_rfwd done (expecting N): AllowTcpForwarding=no, !PermitListen
check_lfwd done (expecting N): AllowTcpForwarding=no, PermitListen
check_rfwd done (expecting N): AllowTcpForwarding=no, PermitListen
PASS: sshd control of local and remote forwarding
run test integrity.sh ...
test integrity: hmac-sha1 @2900
test integrity: hmac-sha1 @2901
test integrity: hmac-sha1 @2902
test integrity: hmac-sha1 @2903
test integrity: hmac-sha1 @2904
test integrity: hmac-sha1 @2905
test integrity: hmac-sha1 @2906
test integrity: hmac-sha1 @2907
test integrity: hmac-sha1 @2908
test integrity: hmac-sha1 @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-sha1-96 @2900
test integrity: hmac-sha1-96 @2901
test integrity: hmac-sha1-96 @2902
test integrity: hmac-sha1-96 @2903
test integrity: hmac-sha1-96 @2904
test integrity: hmac-sha1-96 @2905
test integrity: hmac-sha1-96 @2906
test integrity: hmac-sha1-96 @2907
test integrity: hmac-sha1-96 @2908
test integrity: hmac-sha1-96 @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-sha2-256 @2900
test integrity: hmac-sha2-256 @2901
test integrity: hmac-sha2-256 @2902
test integrity: hmac-sha2-256 @2903
test integrity: hmac-sha2-256 @2904
test integrity: hmac-sha2-256 @2905
test integrity: hmac-sha2-256 @2906
test integrity: hmac-sha2-256 @2907
test integrity: hmac-sha2-256 @2908
test integrity: hmac-sha2-256 @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-sha2-512 @2900
test integrity: hmac-sha2-512 @2901
test integrity: hmac-sha2-512 @2902
test integrity: hmac-sha2-512 @2903
test integrity: hmac-sha2-512 @2904
test integrity: hmac-sha2-512 @2905
test integrity: hmac-sha2-512 @2906
test integrity: hmac-sha2-512 @2907
test integrity: hmac-sha2-512 @2908
test integrity: hmac-sha2-512 @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-md5 @2900
test integrity: hmac-md5 @2901
test integrity: hmac-md5 @2902
test integrity: hmac-md5 @2903
test integrity: hmac-md5 @2904
test integrity: hmac-md5 @2905
test integrity: hmac-md5 @2906
test integrity: hmac-md5 @2907
test integrity: hmac-md5 @2908
test integrity: hmac-md5 @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-md5-96 @2900
test integrity: hmac-md5-96 @2901
test integrity: hmac-md5-96 @2902
test integrity: hmac-md5-96 @2903
test integrity: hmac-md5-96 @2904
test integrity: hmac-md5-96 @2905
test integrity: hmac-md5-96 @2906
test integrity: hmac-md5-96 @2907
test integrity: hmac-md5-96 @2908
test integrity: hmac-md5-96 @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: umac-64@openssh.com @2900
test integrity: umac-64@openssh.com @2901
test integrity: umac-64@openssh.com @2902
test integrity: umac-64@openssh.com @2903
test integrity: umac-64@openssh.com @2904
test integrity: umac-64@openssh.com @2905
test integrity: umac-64@openssh.com @2906
test integrity: umac-64@openssh.com @2907
test integrity: umac-64@openssh.com @2908
test integrity: umac-64@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: umac-128@openssh.com @2900
test integrity: umac-128@openssh.com @2901
test integrity: umac-128@openssh.com @2902
test integrity: umac-128@openssh.com @2903
test integrity: umac-128@openssh.com @2904
test integrity: umac-128@openssh.com @2905
test integrity: umac-128@openssh.com @2906
test integrity: umac-128@openssh.com @2907
test integrity: umac-128@openssh.com @2908
test integrity: umac-128@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-sha1-etm@openssh.com @2900
test integrity: hmac-sha1-etm@openssh.com @2901
test integrity: hmac-sha1-etm@openssh.com @2902
test integrity: hmac-sha1-etm@openssh.com @2903
test integrity: hmac-sha1-etm@openssh.com @2904
test integrity: hmac-sha1-etm@openssh.com @2905
test integrity: hmac-sha1-etm@openssh.com @2906
test integrity: hmac-sha1-etm@openssh.com @2907
test integrity: hmac-sha1-etm@openssh.com @2908
test integrity: hmac-sha1-etm@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-sha1-96-etm@openssh.com @2900
test integrity: hmac-sha1-96-etm@openssh.com @2901
test integrity: hmac-sha1-96-etm@openssh.com @2902
test integrity: hmac-sha1-96-etm@openssh.com @2903
test integrity: hmac-sha1-96-etm@openssh.com @2904
test integrity: hmac-sha1-96-etm@openssh.com @2905
test integrity: hmac-sha1-96-etm@openssh.com @2906
test integrity: hmac-sha1-96-etm@openssh.com @2907
test integrity: hmac-sha1-96-etm@openssh.com @2908
test integrity: hmac-sha1-96-etm@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-sha2-256-etm@openssh.com @2900
test integrity: hmac-sha2-256-etm@openssh.com @2901
test integrity: hmac-sha2-256-etm@openssh.com @2902
test integrity: hmac-sha2-256-etm@openssh.com @2903
test integrity: hmac-sha2-256-etm@openssh.com @2904
test integrity: hmac-sha2-256-etm@openssh.com @2905
test integrity: hmac-sha2-256-etm@openssh.com @2906
test integrity: hmac-sha2-256-etm@openssh.com @2907
test integrity: hmac-sha2-256-etm@openssh.com @2908
test integrity: hmac-sha2-256-etm@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-sha2-512-etm@openssh.com @2900
test integrity: hmac-sha2-512-etm@openssh.com @2901
test integrity: hmac-sha2-512-etm@openssh.com @2902
test integrity: hmac-sha2-512-etm@openssh.com @2903
test integrity: hmac-sha2-512-etm@openssh.com @2904
test integrity: hmac-sha2-512-etm@openssh.com @2905
test integrity: hmac-sha2-512-etm@openssh.com @2906
test integrity: hmac-sha2-512-etm@openssh.com @2907
test integrity: hmac-sha2-512-etm@openssh.com @2908
test integrity: hmac-sha2-512-etm@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-md5-etm@openssh.com @2900
test integrity: hmac-md5-etm@openssh.com @2901
test integrity: hmac-md5-etm@openssh.com @2902
test integrity: hmac-md5-etm@openssh.com @2903
test integrity: hmac-md5-etm@openssh.com @2904
test integrity: hmac-md5-etm@openssh.com @2905
test integrity: hmac-md5-etm@openssh.com @2906
test integrity: hmac-md5-etm@openssh.com @2907
test integrity: hmac-md5-etm@openssh.com @2908
test integrity: hmac-md5-etm@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: hmac-md5-96-etm@openssh.com @2900
test integrity: hmac-md5-96-etm@openssh.com @2901
test integrity: hmac-md5-96-etm@openssh.com @2902
test integrity: hmac-md5-96-etm@openssh.com @2903
test integrity: hmac-md5-96-etm@openssh.com @2904
test integrity: hmac-md5-96-etm@openssh.com @2905
test integrity: hmac-md5-96-etm@openssh.com @2906
test integrity: hmac-md5-96-etm@openssh.com @2907
test integrity: hmac-md5-96-etm@openssh.com @2908
test integrity: hmac-md5-96-etm@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: umac-64-etm@openssh.com @2900
test integrity: umac-64-etm@openssh.com @2901
test integrity: umac-64-etm@openssh.com @2902
test integrity: umac-64-etm@openssh.com @2903
test integrity: umac-64-etm@openssh.com @2904
test integrity: umac-64-etm@openssh.com @2905
test integrity: umac-64-etm@openssh.com @2906
test integrity: umac-64-etm@openssh.com @2907
test integrity: umac-64-etm@openssh.com @2908
test integrity: umac-64-etm@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: umac-128-etm@openssh.com @2900
test integrity: umac-128-etm@openssh.com @2901
test integrity: umac-128-etm@openssh.com @2902
test integrity: umac-128-etm@openssh.com @2903
test integrity: umac-128-etm@openssh.com @2904
test integrity: umac-128-etm@openssh.com @2905
test integrity: umac-128-etm@openssh.com @2906
test integrity: umac-128-etm@openssh.com @2907
test integrity: umac-128-etm@openssh.com @2908
test integrity: umac-128-etm@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
test integrity: aes128-gcm@openssh.com @2900
test integrity: aes128-gcm@openssh.com @2901
test integrity: aes128-gcm@openssh.com @2902
test integrity: aes128-gcm@openssh.com @2905
test integrity: aes128-gcm@openssh.com @2906
test integrity: aes128-gcm@openssh.com @2907
test integrity: aes128-gcm@openssh.com @2908
test integrity: aes128-gcm@openssh.com @2909
test integrity: 8 errors: mac 7 padding 0 length 1 timeout 0
test integrity: aes256-gcm@openssh.com @2900
test integrity: aes256-gcm@openssh.com @2901
test integrity: aes256-gcm@openssh.com @2902
test integrity: aes256-gcm@openssh.com @2905
test integrity: aes256-gcm@openssh.com @2906
test integrity: aes256-gcm@openssh.com @2907
test integrity: aes256-gcm@openssh.com @2908
test integrity: aes256-gcm@openssh.com @2909
test integrity: 8 errors: mac 7 padding 0 length 1 timeout 0
test integrity: chacha20-poly1305@openssh.com @2900
test integrity: chacha20-poly1305@openssh.com @2901
test integrity: chacha20-poly1305@openssh.com @2902
test integrity: chacha20-poly1305@openssh.com @2903
test integrity: chacha20-poly1305@openssh.com @2904
test integrity: chacha20-poly1305@openssh.com @2905
test integrity: chacha20-poly1305@openssh.com @2906
test integrity: chacha20-poly1305@openssh.com @2907
test integrity: chacha20-poly1305@openssh.com @2908
test integrity: chacha20-poly1305@openssh.com @2909
test integrity: 10 errors: mac 10 padding 0 length 0 timeout 0
PASS: integrity
run test krl.sh ...
key revocation lists: generating test keys
key revocation lists: generating KRLs
key revocation lists: checking revocations for revoked keys
key revocation lists: checking revocations for unrevoked keys
key revocation lists: checking revocations for revoked certs
key revocation lists: checking revocations for unrevoked certs
key revocation lists: testing KRL update
key revocation lists: checking revocations for revoked keys
key revocation lists: checking revocations for unrevoked keys
key revocation lists: checking revocations for revoked certs
key revocation lists: checking revocations for unrevoked certs
PASS: key revocation lists
run test multipubkey.sh ...
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
PASS: multiple pubkey
run test limit-keytype.sh ...
allow rsa,ed25519
debug1: mm_log_handler: write: Broken pipe
allow ed25519
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
allow cert only
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
match w/ no match
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
match w/ matching
debug1: mm_log_handler: write: Broken pipe
PASS: restrict pubkey type
run test hostkey-agent.sh ...
key type ssh-ed25519
key type ecdsa-sha2-nistp256
key type ecdsa-sha2-nistp384
key type ecdsa-sha2-nistp521
key type ssh-rsa
cert type ssh-ed25519-cert-v01@openssh.com
cert type ecdsa-sha2-nistp256-cert-v01@openssh.com
cert type ecdsa-sha2-nistp384-cert-v01@openssh.com
cert type ecdsa-sha2-nistp521-cert-v01@openssh.com
cert type ssh-rsa-cert-v01@openssh.com
cert type rsa-sha2-256-cert-v01@openssh.com
cert type rsa-sha2-512-cert-v01@openssh.com
multiple hostkeys
Addkey type ssh-ed25519
Addkey type ecdsa-sha2-nistp256
Addkey type ecdsa-sha2-nistp384
Addkey type ecdsa-sha2-nistp521
Addkey type ssh-rsa
PASS: hostkey agent
run test hostkey-rotate.sh ...
learn hostkey with StrictHostKeyChecking=no
learn additional hostkeys
learn additional hostkeys, type=ssh-ed25519
learn additional hostkeys, type=ecdsa-sha2-nistp256
learn additional hostkeys, type=ecdsa-sha2-nistp384
learn additional hostkeys, type=ecdsa-sha2-nistp521
learn additional hostkeys, type=ssh-rsa
learn changed non-primary hostkey type=ssh-rsa
learn new primary hostkey
rotate primary hostkey
check rotate primary hostkey
PASS: hostkey rotate
run test principals-command.sh ...
authorized principals command: empty authorized_principals
authorized principals command: wrong authorized_principals
authorized principals command: correct authorized_principals
authorized principals command: authorized_principals bad key opt
authorized principals command: authorized_principals command=false
authorized principals command: authorized_principals command=true
authorized principals command: wrong principals key option
authorized principals command: correct principals key option
PASS: authorized principals command
run test cert-file.sh ...
identity cert with no plain public file
CertificateFile with no plain public file
plain keys
untrusted cert
good cert, bad key
single trusted
multiple trusted
PASS: ssh with certificates
run test cfginclude.sh ...
PASS: config include
run test servcfginclude.sh ...
PASS: server config include
run test allow-deny-users.sh ...
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
PASS: AllowUsers/DenyUsers
run test authinfo.sh ...
ExposeAuthInfo=no
ExposeAuthInfo=yes
PASS: authinfo
run test sshsig.sh ...
sshsig: make certificates
sshsig: check signature for ssh-ed25519
sshsig: check signature for ecdsa-sha2-nistp256
sshsig: check signature for ecdsa-sha2-nistp384
sshsig: check signature for ecdsa-sha2-nistp521
sshsig: check signature for ssh-rsa
sshsig: check signature for ssh-ed25519-cert.pub
sshsig: check signature for ecdsa-sha2-nistp256-cert.pub
sshsig: check signature for ecdsa-sha2-nistp384-cert.pub
sshsig: check signature for ecdsa-sha2-nistp521-cert.pub
sshsig: check signature for ssh-rsa-cert.pub
sshsig: match principals
sshsig: nomatch principals
PASS: sshsig
run test knownhosts.sh ...
PASS: known hosts
run test knownhosts-command.sh ...
simple connection
no keys
debug1: mm_log_handler: write: Broken pipe
bad exit status
debug1: mm_log_handler: write: Broken pipe
keytype ssh-ed25519
keytype ecdsa-sha2-nistp256
keytype ecdsa-sha2-nistp384
keytype ecdsa-sha2-nistp521
keytype ssh-rsa
PASS: known hosts command
run test agent-restrict.sh ...
generate keys
prepare client config
prepare known_hosts
prepare server configs
authentication w/o agent
start agent
authentication with agent (no restrict)
unrestricted keylist
authentication with agent (basic restrict)
authentication with agent incorrect key (basic restrict)
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
debug1: mm_log_handler: write: Broken pipe
keylist (basic restrict)
username
username wildcard
username incorrect
agent restriction honours certificate principal
multihop without agent
multihop agent unrestricted
multihop restricted
multihop username
multihop wildcard username
multihop wrong username
debug1: mm_log_handler: write: Broken pipe
multihop cycle no agent
multihop cycle agent unrestricted
multihop cycle restricted deny
debug1: mm_log_handler: write: Broken pipe
multihop cycle restricted allow
PASS: agent restrictions
run test hostbased.sh ...
SKIPPED: TEST_SSH_HOSTBASED_AUTH not set.
run test password.sh ...
SKIPPED: Password auth requires SUDO and password file.
run test kbdint.sh ...
SKIPPED: Password auth requires SUDO and kbdintpw file.
run test channel-timeout.sh ...
no timeout
command timeout
command long timeout
command wildcard timeout
command irrelevant timeout
multiplexed command timeout
irrelevant multiplexed command timeout
global command timeout
sftp no timeout
sftp timeout
Connection closed
sftp irrelevant timeout
PASS: channel timeout
run test connection-timeout.sh ...
no timeout
timeout
session inhibits timeout
timeout after session
timeout with listeners
PASS: unused connection timeout
run test match-subsystem.sh ...
PASS: sshd_config match subsystem
run test agent-pkcs11-restrict.sh ...
SKIPPED: No PKCS#11 library found
run test agent-pkcs11-cert.sh ...
SKIPPED: No PKCS#11 library found
run test penalty.sh ...
test connect
penalty for authentication failure
penalty for no authentication
PASS: penalties
run test penalty-expire.sh ...
test connect
penalty expiry
PASS: penalties
run test connect-bigconf.sh ...
PASS: simple connect
run test ssh-pkcs11.sh ...
SKIPPED: No PKCS#11 library found
run test ssh-tty.sh ...
SKIPPED: $PATH or $HOME has whitespace, not supported in this test
run test proxyjump.sh ...
basic parsing
precedence
command-line -J invalid characters
functional test
functional ProxyJump
PASS: proxyjump
set -e ; if test -z "1" ; then \
	V="" ; \
	test "x" = "x" || \
	    V=/usr/lib/openssh/ptest/regress/valgrind-unit.sh ; \
	ARGS=""; \
	test "xunit" = "xunit-bench" && ARGS="-b"; \
	test "x" = "x" || ARGS="$ARGS -f"; \
	test "x" = "x" || ARGS="$ARGS -F"; \
	test "x" = "x" || ARGS="$ARGS -v"; \
	test "x" = "x" || ARGS="$ARGS -B"; \
	test "x" = "x" || ARGS="$ARGS -O "; \
	 $V /usr/lib/openssh/ptest/regress/unittests/sshbuf/test_sshbuf ${ARGS}; \
	 $V /usr/lib/openssh/ptest/regress/unittests/sshkey/test_sshkey \
		-d /usr/lib/openssh/ptest/regress/unittests/sshkey/testdata ${ARGS}; \
	$V /usr/lib/openssh/ptest/regress/unittests/sshsig/test_sshsig \
		-d /usr/lib/openssh/ptest/regress/unittests/sshsig/testdata ${ARGS}; \
	$V /usr/lib/openssh/ptest/regress/unittests/authopt/test_authopt \
		-d /usr/lib/openssh/ptest/regress/unittests/authopt/testdata ${ARGS}; \
	$V /usr/lib/openssh/ptest/regress/unittests/bitmap/test_bitmap ${ARGS}; \
	$V /usr/lib/openssh/ptest/regress/unittests/conversion/test_conversion ${ARGS}; \
	$V /usr/lib/openssh/ptest/regress/unittests/kex/test_kex ${ARGS}; \
	$V /usr/lib/openssh/ptest/regress/unittests/hostkeys/test_hostkeys \
		-d /usr/lib/openssh/ptest/regress/unittests/hostkeys/testdata ${ARGS}; \
	$V /usr/lib/openssh/ptest/regress/unittests/match/test_match ${ARGS}; \
	$V /usr/lib/openssh/ptest/regress/unittests/misc/test_misc ${ARGS}; \
	if test "x" = "xyes"  ; then \
		$V /usr/lib/openssh/ptest/regress/unittests/utf8/test_utf8 ${ARGS}; \
	fi \
fi
SKIP: agent-ptrace
DURATION: 2750
