]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - regress/Makefile
Vendor import of OpenSSH 7.8p1.
[FreeBSD/FreeBSD.git] / regress / Makefile
1 #       $OpenBSD: Makefile,v 1.97 2018/06/07 04:46:34 djm Exp $
2
3 REGRESS_TARGETS=        unit t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12 t-exec
4 tests:          prep $(REGRESS_TARGETS)
5
6 # Interop tests are not run by default
7 interop interop-tests: t-exec-interop
8
9 prep:
10         test "x${USE_VALGRIND}" = "x" || mkdir -p $(OBJ)/valgrind-out
11
12 clean:
13         for F in $(CLEANFILES); do rm -f $(OBJ)$$F; done
14         test -z "${SUDO}" || ${SUDO} rm -f ${SUDO_CLEAN}
15         rm -rf $(OBJ).putty
16
17 distclean:      clean
18
19 LTESTS=         connect \
20                 proxy-connect \
21                 connect-privsep \
22                 connect-uri \
23                 proto-version \
24                 proto-mismatch \
25                 exit-status \
26                 envpass \
27                 transfer \
28                 banner \
29                 rekey \
30                 stderr-data \
31                 stderr-after-eof \
32                 broken-pipe \
33                 try-ciphers \
34                 yes-head \
35                 login-timeout \
36                 agent \
37                 agent-getpeereid \
38                 agent-timeout \
39                 agent-ptrace \
40                 keyscan \
41                 keygen-change \
42                 keygen-convert \
43                 keygen-moduli \
44                 key-options \
45                 scp \
46                 scp-uri \
47                 sftp \
48                 sftp-chroot \
49                 sftp-cmds \
50                 sftp-badcmds \
51                 sftp-batch \
52                 sftp-glob \
53                 sftp-perm \
54                 sftp-uri \
55                 reconfigure \
56                 dynamic-forward \
57                 forwarding \
58                 multiplex \
59                 reexec \
60                 brokenkeys \
61                 sshcfgparse \
62                 cfgparse \
63                 cfgmatch \
64                 cfgmatchlisten \
65                 addrmatch \
66                 localcommand \
67                 forcecommand \
68                 portnum \
69                 keytype \
70                 kextype \
71                 cert-hostkey \
72                 cert-userkey \
73                 host-expand \
74                 keys-command \
75                 forward-control \
76                 integrity \
77                 krl \
78                 multipubkey \
79                 limit-keytype \
80                 hostkey-agent \
81                 keygen-knownhosts \
82                 hostkey-rotate \
83                 principals-command \
84                 cert-file \
85                 cfginclude \
86                 allow-deny-users \
87                 authinfo
88
89
90 #               dhgex \
91
92 INTEROP_TESTS=  putty-transfer putty-ciphers putty-kex conch-ciphers
93 #INTEROP_TESTS+=ssh-com ssh-com-client ssh-com-keygen ssh-com-sftp
94
95 #LTESTS=        cipher-speed
96
97 USERNAME=               ${LOGNAME}
98 CLEANFILES=     *.core actual agent-key.* authorized_keys_${USERNAME} \
99                 authorized_keys_${USERNAME}.* \
100                 authorized_principals_${USERNAME} \
101                 banner.in banner.out cert_host_key* cert_user_key* \
102                 copy.1 copy.2 data ed25519-agent ed25519-agent* \
103                 ed25519-agent.pub ed25519 ed25519.pub empty.in \
104                 expect failed-regress.log failed-ssh.log failed-sshd.log \
105                 hkr.* host.ed25519 host.rsa host.rsa1 host_* \
106                 host_ca_key* host_krl_* host_revoked_* key.* \
107                 key.dsa-* key.ecdsa-* key.ed25519-512 \
108                 key.ed25519-512.pub key.rsa-* keys-command-args kh.* \
109                 known_hosts known_hosts-cert known_hosts.* krl-* ls.copy \
110                 modpipe netcat no_identity_config \
111                 pidfile putty.rsa2 ready regress.log \
112                 remote_pid revoked-* rsa rsa-agent rsa-agent.pub rsa.pub \
113                 rsa1 rsa1-agent rsa1-agent.pub rsa1.pub rsa_ssh2_cr.prv \
114                 rsa_ssh2_crnl.prv scp-ssh-wrapper.exe \
115                 scp-ssh-wrapper.scp setuid-allowed sftp-server.log \
116                 sftp-server.sh sftp.log ssh-log-wrapper.sh ssh.log \
117                 ssh_config ssh_config.* ssh_proxy ssh_proxy_bak \
118                 ssh_proxy_envpass sshd.log sshd_config sshd_config_minimal \
119                 sshd_config.orig sshd_proxy sshd_proxy.* sshd_proxy_bak \
120                 sshd_proxy_orig t10.out t10.out.pub t12.out t12.out.pub \
121                 t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub \
122                 t8.out t8.out.pub t9.out t9.out.pub testdata \
123                 user_*key* user_ca* user_key*
124
125 SUDO_CLEAN+=    /var/run/testdata_${USERNAME} /var/run/keycommand_${USERNAME}
126
127 # Enable all malloc(3) randomisations and checks
128 TEST_ENV=      "MALLOC_OPTIONS=CFGJRSUX"
129
130 TEST_SSH_SSHKEYGEN?=ssh-keygen
131
132 CPPFLAGS=-I..
133
134 t1:
135         ${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/rsa_ssh2.prv | diff - ${.CURDIR}/rsa_openssh.prv
136         tr '\n' '\r' <${.CURDIR}/rsa_ssh2.prv > ${.OBJDIR}/rsa_ssh2_cr.prv
137         ${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_cr.prv | diff - ${.CURDIR}/rsa_openssh.prv
138         awk '{print $$0 "\r"}' ${.CURDIR}/rsa_ssh2.prv > ${.OBJDIR}/rsa_ssh2_crnl.prv
139         ${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_crnl.prv | diff - ${.CURDIR}/rsa_openssh.prv
140
141 t2:
142         cat ${.CURDIR}/rsa_openssh.prv > $(OBJ)/t2.out
143         chmod 600 $(OBJ)/t2.out
144         ${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t2.out | diff - ${.CURDIR}/rsa_openssh.pub
145
146 t3:
147         ${TEST_SSH_SSHKEYGEN} -ef ${.CURDIR}/rsa_openssh.pub >$(OBJ)/t3.out
148         ${TEST_SSH_SSHKEYGEN} -if $(OBJ)/t3.out | diff - ${.CURDIR}/rsa_openssh.pub
149
150 t4:
151         ${TEST_SSH_SSHKEYGEN} -E md5 -lf ${.CURDIR}/rsa_openssh.pub |\
152                 awk '{print $$2}' | diff - ${.CURDIR}/t4.ok
153
154 t5:
155         ${TEST_SSH_SSHKEYGEN} -Bf ${.CURDIR}/rsa_openssh.pub |\
156                 awk '{print $$2}' | diff - ${.CURDIR}/t5.ok
157
158 t6:
159         ${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.prv > $(OBJ)/t6.out1
160         ${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.pub > $(OBJ)/t6.out2
161         chmod 600 $(OBJ)/t6.out1
162         ${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t6.out1 | diff - $(OBJ)/t6.out2
163
164 $(OBJ)/t7.out:
165         ${TEST_SSH_SSHKEYGEN} -q -t rsa -N '' -f $@
166
167 t7: $(OBJ)/t7.out
168         ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t7.out > /dev/null
169         ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t7.out > /dev/null
170
171 $(OBJ)/t8.out:
172         ${TEST_SSH_SSHKEYGEN} -q -t dsa -N '' -f $@
173
174 t8: $(OBJ)/t8.out
175         ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t8.out > /dev/null
176         ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t8.out > /dev/null
177
178 $(OBJ)/t9.out:
179         test "${TEST_SSH_ECC}" != yes || \
180         ${TEST_SSH_SSHKEYGEN} -q -t ecdsa -N '' -f $@
181
182 t9: $(OBJ)/t9.out
183         test "${TEST_SSH_ECC}" != yes || \
184         ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t9.out > /dev/null
185         test "${TEST_SSH_ECC}" != yes || \
186         ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t9.out > /dev/null
187
188
189 $(OBJ)/t10.out:
190         ${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -f $@
191
192 t10: $(OBJ)/t10.out
193         ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t10.out > /dev/null
194         ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t10.out > /dev/null
195
196 t11:
197         ${TEST_SSH_SSHKEYGEN} -E sha256 -lf ${.CURDIR}/rsa_openssh.pub |\
198                 awk '{print $$2}' | diff - ${.CURDIR}/t11.ok
199
200 $(OBJ)/t12.out:
201         ${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -C 'test-comment-1234' -f $@
202
203 t12: $(OBJ)/t12.out
204         ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t12.out.pub | grep test-comment-1234 >/dev/null
205
206 t-exec: ${LTESTS:=.sh}
207         @if [ "x$?" = "x" ]; then exit 0; fi; \
208         for TEST in ""$?; do \
209                 echo "run test $${TEST}" ... 1>&2; \
210                 (env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \
211         done
212
213 t-exec-interop: ${INTEROP_TESTS:=.sh}
214         @if [ "x$?" = "x" ]; then exit 0; fi; \
215         for TEST in ""$?; do \
216                 echo "run test $${TEST}" ... 1>&2; \
217                 (env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \
218         done
219
220 # Not run by default
221 interop: ${INTEROP_TARGETS}
222
223 # Unit tests, built by top-level Makefile
224 unit:
225         set -e ; if test -z "${SKIP_UNIT}" ; then \
226                 V="" ; \
227                 test "x${USE_VALGRIND}" = "x" || \
228                     V=${.CURDIR}/valgrind-unit.sh ; \
229                 $$V ${.OBJDIR}/unittests/sshbuf/test_sshbuf ; \
230                 $$V ${.OBJDIR}/unittests/sshkey/test_sshkey \
231                         -d ${.CURDIR}/unittests/sshkey/testdata ; \
232                 $$V ${.OBJDIR}/unittests/bitmap/test_bitmap ; \
233                 $$V ${.OBJDIR}/unittests/conversion/test_conversion ; \
234                 $$V ${.OBJDIR}/unittests/kex/test_kex ; \
235                 $$V ${.OBJDIR}/unittests/hostkeys/test_hostkeys \
236                         -d ${.CURDIR}/unittests/hostkeys/testdata ; \
237                 $$V ${.OBJDIR}/unittests/match/test_match ; \
238                 if test "x${TEST_SSH_UTF8}" = "xyes"  ; then \
239                         $$V ${.OBJDIR}/unittests/utf8/test_utf8 ; \
240                 fi \
241         fi