0a47c58bdd
Approved by: re (kib@)
242 lines
6.8 KiB
Makefile
242 lines
6.8 KiB
Makefile
# $OpenBSD: Makefile,v 1.97 2018/06/07 04:46:34 djm Exp $
|
|
|
|
REGRESS_TARGETS= unit t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12 t-exec
|
|
tests: prep $(REGRESS_TARGETS)
|
|
|
|
# Interop tests are not run by default
|
|
interop interop-tests: t-exec-interop
|
|
|
|
prep:
|
|
test "x${USE_VALGRIND}" = "x" || mkdir -p $(OBJ)/valgrind-out
|
|
|
|
clean:
|
|
for F in $(CLEANFILES); do rm -f $(OBJ)$$F; done
|
|
test -z "${SUDO}" || ${SUDO} rm -f ${SUDO_CLEAN}
|
|
rm -rf $(OBJ).putty
|
|
|
|
distclean: clean
|
|
|
|
LTESTS= connect \
|
|
proxy-connect \
|
|
connect-privsep \
|
|
connect-uri \
|
|
proto-version \
|
|
proto-mismatch \
|
|
exit-status \
|
|
envpass \
|
|
transfer \
|
|
banner \
|
|
rekey \
|
|
stderr-data \
|
|
stderr-after-eof \
|
|
broken-pipe \
|
|
try-ciphers \
|
|
yes-head \
|
|
login-timeout \
|
|
agent \
|
|
agent-getpeereid \
|
|
agent-timeout \
|
|
agent-ptrace \
|
|
keyscan \
|
|
keygen-change \
|
|
keygen-convert \
|
|
keygen-moduli \
|
|
key-options \
|
|
scp \
|
|
scp-uri \
|
|
sftp \
|
|
sftp-chroot \
|
|
sftp-cmds \
|
|
sftp-badcmds \
|
|
sftp-batch \
|
|
sftp-glob \
|
|
sftp-perm \
|
|
sftp-uri \
|
|
reconfigure \
|
|
dynamic-forward \
|
|
forwarding \
|
|
multiplex \
|
|
reexec \
|
|
brokenkeys \
|
|
sshcfgparse \
|
|
cfgparse \
|
|
cfgmatch \
|
|
cfgmatchlisten \
|
|
addrmatch \
|
|
localcommand \
|
|
forcecommand \
|
|
portnum \
|
|
keytype \
|
|
kextype \
|
|
cert-hostkey \
|
|
cert-userkey \
|
|
host-expand \
|
|
keys-command \
|
|
forward-control \
|
|
integrity \
|
|
krl \
|
|
multipubkey \
|
|
limit-keytype \
|
|
hostkey-agent \
|
|
keygen-knownhosts \
|
|
hostkey-rotate \
|
|
principals-command \
|
|
cert-file \
|
|
cfginclude \
|
|
allow-deny-users \
|
|
authinfo
|
|
|
|
|
|
# dhgex \
|
|
|
|
INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
|
|
#INTEROP_TESTS+=ssh-com ssh-com-client ssh-com-keygen ssh-com-sftp
|
|
|
|
#LTESTS= cipher-speed
|
|
|
|
USERNAME= ${LOGNAME}
|
|
CLEANFILES= *.core actual agent-key.* authorized_keys_${USERNAME} \
|
|
authorized_keys_${USERNAME}.* \
|
|
authorized_principals_${USERNAME} \
|
|
banner.in banner.out cert_host_key* cert_user_key* \
|
|
copy.1 copy.2 data ed25519-agent ed25519-agent* \
|
|
ed25519-agent.pub ed25519 ed25519.pub empty.in \
|
|
expect failed-regress.log failed-ssh.log failed-sshd.log \
|
|
hkr.* host.ed25519 host.rsa host.rsa1 host_* \
|
|
host_ca_key* host_krl_* host_revoked_* key.* \
|
|
key.dsa-* key.ecdsa-* key.ed25519-512 \
|
|
key.ed25519-512.pub key.rsa-* keys-command-args kh.* \
|
|
known_hosts known_hosts-cert known_hosts.* krl-* ls.copy \
|
|
modpipe netcat no_identity_config \
|
|
pidfile putty.rsa2 ready regress.log \
|
|
remote_pid revoked-* rsa rsa-agent rsa-agent.pub rsa.pub \
|
|
rsa1 rsa1-agent rsa1-agent.pub rsa1.pub rsa_ssh2_cr.prv \
|
|
rsa_ssh2_crnl.prv scp-ssh-wrapper.exe \
|
|
scp-ssh-wrapper.scp setuid-allowed sftp-server.log \
|
|
sftp-server.sh sftp.log ssh-log-wrapper.sh ssh.log \
|
|
ssh_config ssh_config.* ssh_proxy ssh_proxy_bak \
|
|
ssh_proxy_envpass sshd.log sshd_config sshd_config_minimal \
|
|
sshd_config.orig sshd_proxy sshd_proxy.* sshd_proxy_bak \
|
|
sshd_proxy_orig t10.out t10.out.pub t12.out t12.out.pub \
|
|
t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub \
|
|
t8.out t8.out.pub t9.out t9.out.pub testdata \
|
|
user_*key* user_ca* user_key*
|
|
|
|
SUDO_CLEAN+= /var/run/testdata_${USERNAME} /var/run/keycommand_${USERNAME}
|
|
|
|
# Enable all malloc(3) randomisations and checks
|
|
TEST_ENV= "MALLOC_OPTIONS=CFGJRSUX"
|
|
|
|
TEST_SSH_SSHKEYGEN?=ssh-keygen
|
|
|
|
CPPFLAGS=-I..
|
|
|
|
t1:
|
|
${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/rsa_ssh2.prv | diff - ${.CURDIR}/rsa_openssh.prv
|
|
tr '\n' '\r' <${.CURDIR}/rsa_ssh2.prv > ${.OBJDIR}/rsa_ssh2_cr.prv
|
|
${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_cr.prv | diff - ${.CURDIR}/rsa_openssh.prv
|
|
awk '{print $$0 "\r"}' ${.CURDIR}/rsa_ssh2.prv > ${.OBJDIR}/rsa_ssh2_crnl.prv
|
|
${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_crnl.prv | diff - ${.CURDIR}/rsa_openssh.prv
|
|
|
|
t2:
|
|
cat ${.CURDIR}/rsa_openssh.prv > $(OBJ)/t2.out
|
|
chmod 600 $(OBJ)/t2.out
|
|
${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t2.out | diff - ${.CURDIR}/rsa_openssh.pub
|
|
|
|
t3:
|
|
${TEST_SSH_SSHKEYGEN} -ef ${.CURDIR}/rsa_openssh.pub >$(OBJ)/t3.out
|
|
${TEST_SSH_SSHKEYGEN} -if $(OBJ)/t3.out | diff - ${.CURDIR}/rsa_openssh.pub
|
|
|
|
t4:
|
|
${TEST_SSH_SSHKEYGEN} -E md5 -lf ${.CURDIR}/rsa_openssh.pub |\
|
|
awk '{print $$2}' | diff - ${.CURDIR}/t4.ok
|
|
|
|
t5:
|
|
${TEST_SSH_SSHKEYGEN} -Bf ${.CURDIR}/rsa_openssh.pub |\
|
|
awk '{print $$2}' | diff - ${.CURDIR}/t5.ok
|
|
|
|
t6:
|
|
${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.prv > $(OBJ)/t6.out1
|
|
${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.pub > $(OBJ)/t6.out2
|
|
chmod 600 $(OBJ)/t6.out1
|
|
${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t6.out1 | diff - $(OBJ)/t6.out2
|
|
|
|
$(OBJ)/t7.out:
|
|
${TEST_SSH_SSHKEYGEN} -q -t rsa -N '' -f $@
|
|
|
|
t7: $(OBJ)/t7.out
|
|
${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t7.out > /dev/null
|
|
${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t7.out > /dev/null
|
|
|
|
$(OBJ)/t8.out:
|
|
${TEST_SSH_SSHKEYGEN} -q -t dsa -N '' -f $@
|
|
|
|
t8: $(OBJ)/t8.out
|
|
${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t8.out > /dev/null
|
|
${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t8.out > /dev/null
|
|
|
|
$(OBJ)/t9.out:
|
|
test "${TEST_SSH_ECC}" != yes || \
|
|
${TEST_SSH_SSHKEYGEN} -q -t ecdsa -N '' -f $@
|
|
|
|
t9: $(OBJ)/t9.out
|
|
test "${TEST_SSH_ECC}" != yes || \
|
|
${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t9.out > /dev/null
|
|
test "${TEST_SSH_ECC}" != yes || \
|
|
${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t9.out > /dev/null
|
|
|
|
|
|
$(OBJ)/t10.out:
|
|
${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -f $@
|
|
|
|
t10: $(OBJ)/t10.out
|
|
${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t10.out > /dev/null
|
|
${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t10.out > /dev/null
|
|
|
|
t11:
|
|
${TEST_SSH_SSHKEYGEN} -E sha256 -lf ${.CURDIR}/rsa_openssh.pub |\
|
|
awk '{print $$2}' | diff - ${.CURDIR}/t11.ok
|
|
|
|
$(OBJ)/t12.out:
|
|
${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -C 'test-comment-1234' -f $@
|
|
|
|
t12: $(OBJ)/t12.out
|
|
${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t12.out.pub | grep test-comment-1234 >/dev/null
|
|
|
|
t-exec: ${LTESTS:=.sh}
|
|
@if [ "x$?" = "x" ]; then exit 0; fi; \
|
|
for TEST in ""$?; do \
|
|
echo "run test $${TEST}" ... 1>&2; \
|
|
(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \
|
|
done
|
|
|
|
t-exec-interop: ${INTEROP_TESTS:=.sh}
|
|
@if [ "x$?" = "x" ]; then exit 0; fi; \
|
|
for TEST in ""$?; do \
|
|
echo "run test $${TEST}" ... 1>&2; \
|
|
(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \
|
|
done
|
|
|
|
# Not run by default
|
|
interop: ${INTEROP_TARGETS}
|
|
|
|
# Unit tests, built by top-level Makefile
|
|
unit:
|
|
set -e ; if test -z "${SKIP_UNIT}" ; then \
|
|
V="" ; \
|
|
test "x${USE_VALGRIND}" = "x" || \
|
|
V=${.CURDIR}/valgrind-unit.sh ; \
|
|
$$V ${.OBJDIR}/unittests/sshbuf/test_sshbuf ; \
|
|
$$V ${.OBJDIR}/unittests/sshkey/test_sshkey \
|
|
-d ${.CURDIR}/unittests/sshkey/testdata ; \
|
|
$$V ${.OBJDIR}/unittests/bitmap/test_bitmap ; \
|
|
$$V ${.OBJDIR}/unittests/conversion/test_conversion ; \
|
|
$$V ${.OBJDIR}/unittests/kex/test_kex ; \
|
|
$$V ${.OBJDIR}/unittests/hostkeys/test_hostkeys \
|
|
-d ${.CURDIR}/unittests/hostkeys/testdata ; \
|
|
$$V ${.OBJDIR}/unittests/match/test_match ; \
|
|
if test "x${TEST_SSH_UTF8}" = "xyes" ; then \
|
|
$$V ${.OBJDIR}/unittests/utf8/test_utf8 ; \
|
|
fi \
|
|
fi
|