Lines Matching +full:zlib +full:- +full:dev

18 TEST_TARGET="tests compat-tests"
34 # get it by setting -std=gnu99, at which point we won't be testing
36 llong_max=`gcc -E -dM - </dev/null | \
38 CPPFLAGS="-DLLONG_MAX=${llong_max}"
41 CFLAGS="-Wall -std=c89 -pedantic -Werror=vla"
42 CONFIGFLAGS="--without-zlib"
43 LIBCRYPTOFLAGS="--without-openssl"
44 TEST_TARGET=t-exec
46 cygwin-release)
47 # See https://cygwin.com/git/?p=git/cygwin-packages/openssh.git;a=blob;f=openssh.cygport;hb=HEAD
48 CONFIGFLAGS="--with-xauth=/usr/bin/xauth --with-security-key-builtin"
49 CONFIGFLAGS="$CONFIGFLAGS --with-kerberos5=/usr --with-libedit --disable-strip"
51 clang-12-Werror)
52 CC="clang-12"
53 # clang's implicit-fallthrough requires that the code be annotated with
55 CFLAGS="-Wall -Wextra -O2 -Wno-error=implicit-fallthrough -Wno-error=unused-parameter"
56 CONFIGFLAGS="--with-pam --with-Werror"
58 *-sanitize-*)
60 gcc-*)
63 clang-*)
66 clang="`which clang-$i 2>/dev/null`"
67 [ -x "$clang" ] && CC="$clang"
73 # - We replace chroot with chdir so that the sanitizer in the preauth
75 # - clang does not recognizes explicit_bzero so we use bzero
77 # - openssl and zlib trip ASAN.
78 # - sp_pwdp returned by getspnam trips ASAN, hence disabling shadow.
80 *-sanitize-address)
81 CFLAGS="-fsanitize=address -fno-omit-frame-pointer"
82 LDFLAGS="-fsanitize=address"
83 …CPPFLAGS='-Dchroot=chdir -Dexplicit_bzero=bzero -D_FORTIFY_SOURCE=0 -DASAN_OPTIONS=\"detect_leaks=…
85 TEST_TARGET="t-exec"
87 clang-sanitize-memory)
88 CFLAGS="-fsanitize=memory -fsanitize-memory-track-origins -fno-omit-frame-pointer"
89 LDFLAGS="-fsanitize=memory"
90 … CPPFLAGS='-Dchroot=chdir -Dexplicit_bzero=bzero -DMSAN_OPTIONS=\"log_path='$SANLOGS'/msan.log\"'
91 CONFIGFLAGS="--without-zlib --without-shadow"
92 LIBCRYPTOFLAGS="--without-openssl"
93 TEST_TARGET="t-exec"
95 *-sanitize-undefined)
96 CFLAGS="-fsanitize=undefined"
97 LDFLAGS="-fsanitize=undefined"
103 features="--disable-security-key --disable-pkcs11"
104 hardening="--without-sandbox --without-hardening --without-stackprotect"
105 privsep="--with-privsep-user=root"
108 SKIP_LTESTS=sftp-chroot
110 gcc-11-Werror)
111 CC="gcc-11"
112 # -Wnoformat-truncation in gcc 7.3.1 20180130 fails on fmt_scaled
113 # -Wunused-result ignores (void) so is not useful. See
115 …CFLAGS="-O2 -Wno-format-truncation -Wimplicit-fallthrough=4 -Wno-unused-parameter -Wno-unused-resu…
116 CONFIGFLAGS="--with-pam --with-Werror"
118 gcc-12-Werror)
119 CC="gcc-12"
120 # -Wnoformat-truncation in gcc 7.3.1 20180130 fails on fmt_scaled
121 # -Wunused-result ignores (void) so is not useful. See
123 …CFLAGS="-O2 -Wno-format-truncation -Wimplicit-fallthrough=4 -Wno-unused-parameter -Wno-unused-resu…
124 CONFIGFLAGS="--with-pam --with-Werror"
130 CONFIGFLAGS="--with-kerberos5 --with-libedit --with-pam"
131 CONFIGFLAGS="${CONFIGFLAGS} --with-security-key-builtin --with-selinux"
132 CFLAGS="-DSK_DEBUG -DSANDBOX_SECCOMP_FILTER_DEBUG"
135 CONFIGFLAGS="--with-ldflags=-lhardened_malloc"
138 CONFIGFLAGS="--with-ldflags=-ltcmalloc"
141 CONFIGFLAGS="--with-kerberos5"
144 CONFIGFLAGS="--with-libedit"
147 CC="musl-gcc"
148 CONFIGFLAGS="--without-zlib"
149 LIBCRYPTOFLAGS="--without-openssl"
150 TEST_TARGET="t-exec"
152 pam-krb5)
153 CONFIGFLAGS="--with-pam --with-kerberos5"
157 CONFIGFLAGS="--with-pam"
161 CONFIGFLAGS="--disable-pkcs11"
162 LIBCRYPTOFLAGS="--with-ssl-dir=/opt/boringssl --with-rpath=-Wl,-rpath,"
164 libressl-*)
165 LIBCRYPTOFLAGS="--with-ssl-dir=/opt/libressl --with-rpath=-Wl,-rpath,"
167 putty-*)
168 CONFIGFLAGS="--with-plink=/usr/local/bin/plink --with-puttygen=/usr/local/bin/puttygen"
170 TEST_TARGET=interop-tests
172 openssl-*)
173 LIBCRYPTOFLAGS="--with-ssl-dir=/opt/openssl --with-rpath=-Wl,-rpath,"
176 if [ "$config" = "openssl-1.1.1" ]; then
181 CONFIGFLAGS="--with-selinux"
184 CONFIGFLAGS="--with-security-key-builtin"
186 without-openssl)
187 LIBCRYPTOFLAGS="--without-openssl"
188 TEST_TARGET=t-exec
190 valgrind-[1-5]|valgrind-unit)
192 CONFIGFLAGS="--without-sandbox --without-hardening"
193 CONFIGFLAGS="$CONFIGFLAGS --with-cppflags=-D_FORTIFY_SOURCE=0"
194 TEST_TARGET="t-exec USE_VALGRIND=1"
200 tests2="integrity try-ciphers"
201 tests3="krl forward-control sshsig agent-restrict kextype sftp"
202 tests4="cert-userkey cert-hostkey kextype sftp-perm keygen-comment percent"
205 valgrind-1)
206 # All tests except agent-timeout (which is flaky under valgrind),
207 # connection-timeout (which doesn't work since it's so slow)
210 SKIP_LTESTS="agent-timeout connection-timeout hostbased"
213 valgrind-2)
216 valgrind-3)
219 valgrind-4)
222 valgrind-5)
225 valgrind-unit)
230 zlib-develop)
232 CONFIGFLAGS="--with-zlib=/opt/zlib --with-rpath=-Wl,-rpath,"
240 # The Solaris 64bit targets are special since they need a non-flag arg.
243 CONFIGFLAGS="--target=x86_64 --with-cflags=-m64 --with-ldflags=-m64 ${CONFIGFLAGS}"
244 LIBCRYPTOFLAGS="--with-ssl-dir=/usr/local/ssl64 --with-rpath=-Wl,-rpath,"
250 CONFIGFLAGS="--disable-security-key"
251 LIBCRYPTOFLAGS="--without-openssl"
255 # The agent-restrict test fails due to some quoting issue when run
257 TEST_TARGET="t-exec unit TEST_SHELL=bash"
260 debian-riscv64)
262 TEST_TARGET="t-exec"
265 # scp 3-way connection hangs on these so skip until sorted.
270 CONFIGFLAGS="${CONFIGFLAGS} --disable-security-key"
273 SKIP_LTESTS="forwarding multiplex proxy-connect hostkey-agent agent-ptrace"
276 CONFIGFLAGS="${CONFIGFLAGS} --disable-security-key"
279 CONFIGFLAGS="${CONFIGFLAGS} --disable-fd-passing"
280 LIBCRYPTOFLAGS="--without-openssl"
286 T="addrmatch agent-restrict brokenkeys cfgmatch cfgmatchlisten cfgparse
287 connect connect-uri dynamic-forward exit-status forwarding
288 forward-control
289 hostkey-agent key-options keyscan knownhosts-command login-timeout
290 reconfigure reexec rekey scp scp-uri scp3 sftp sftp-badcmds
291 sftp-batch sftp-cmds sftp-glob sftp-perm sftp-uri stderr-data
294 TEST_TARGET=t-exec
298 # System compiler will ICE on some files with fstack-protector
299 # SHA256 functions in sha2.h conflict with OpenSSL's breaking sk-dummy
300 CONFIGFLAGS="${CONFIGFLAGS} --without-hardening --disable-security-key"
302 openwrt-*)
303 CONFIGFLAGS="${CONFIGFLAGS} --without-zlib"
304 LIBCRYPTOFLAGS="--without-openssl"
305 TEST_TARGET="t-exec"
325 *-darwin*)
328 LIBCRYPTOFLAGS="--without-openssl"
329 TEST_TARGET=t-exec
332 CONFIGFLAGS="${CONFIGFLAGS} --with-privsep-path=/usr/local/empty"
335 *-darwin22.*)
336 # sudo -S nobody doesn't work on macos 13 for some reason.
337 SKIP_LTESTS="agent-getpeereid" ;;
344 if [ -z "${LIBCRYPTOFLAGS}" ]; then
345 LIBCRYPTOFLAGS="--without-openssl"
346 # last-match
349 if [ -x ${i}/bin/openssl ]; then
356 *) LIBCRYPTOFLAGS="--with-ssl-dir=${i}" ;;
359 if [ "${LIBCRYPTOFLAGS}" = "--without-openssl" ]; then
360 TEST_TARGET="t-exec"
366 if [ -x "$(which plink 2>/dev/null)" ]; then