Lines Matching +full:valgrind +full:- +full:out

3 tests:		prep file-tests t-exec unit
8 file-tests: $(REGRESS_TARGETS)
11 interop interop-tests: t-exec-interop
13 extra extra-tests: t-extra
16 test "x${USE_VALGRIND}" = "x" || mkdir -p $(OBJ)/valgrind-out
19 for F in $(CLEANFILES); do rm -f $(OBJ)$$F; done
20 rm -rf $(OBJ).putty
21 rm -rf $(OBJ).dropbear
26 proxy-connect \
27 sshfp-connect \
28 connect-privsep \
29 connect-uri \
30 proto-version \
31 proto-mismatch \
32 exit-status \
33 exit-status-signal \
39 stderr-data \
40 stderr-after-eof \
41 broken-pipe \
42 try-ciphers \
43 yes-head \
44 login-timeout \
46 agent-getpeereid \
47 agent-timeout \
48 agent-ptrace \
49 agent-subprocess \
51 keygen-change \
52 keygen-comment \
53 keygen-convert \
54 keygen-knownhosts \
55 keygen-moduli \
56 keygen-sshfp \
57 key-options \
60 scp-uri \
62 sftp-chroot \
63 sftp-cmds \
64 sftp-badcmds \
65 sftp-batch \
66 sftp-glob \
67 sftp-perm \
68 sftp-resume \
69 sftp-uri \
71 dynamic-forward \
87 cert-hostkey \
88 cert-userkey \
89 host-expand \
90 keys-command \
91 forward-control \
95 limit-keytype \
96 hostkey-agent \
97 hostkey-rotate \
98 principals-command \
99 cert-file \
102 allow-deny-users \
106 knownhosts-command \
107 agent-restrict \
109 channel-timeout \
110 connection-timeout \
111 match-subsystem \
112 agent-pkcs11-restrict \
113 agent-pkcs11-cert \
115 penalty-expire
117 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
118 INTEROP_TESTS+= dropbear-ciphers dropbear-kex
119 #INTEROP_TESTS+=ssh-com ssh-com-client ssh-com-keygen ssh-com-sftp
121 EXTRA_TESTS= agent-pkcs11
122 #EXTRA_TESTS+= cipher-speed
125 CLEANFILES= *.core actual agent-key.* authorized_keys_${USERNAME} \
128 banner.in banner.out cert_host_key* cert_user_key* \
129 copy.1 copy.2 data ed25519-agent ed25519-agent* \
130 ed25519-agent.pub ed25519 ed25519.pub empty.in \
131 expect failed-regress.log failed-ssh.log failed-sshd.log \
132 hkr.* host.ecdsa-sha2-nistp256 host.ecdsa-sha2-nistp384 \
133 host.ecdsa-sha2-nistp521 host.ssh-dss host.ssh-ed25519 \
134 host.ssh-rsa host_ca_key* host_krl_* host_revoked_* key.* \
135 key.dsa-* key.ecdsa-* key.ed25519-512 \
136 key.ed25519-512.pub key.rsa-* keys-command-args kh.* askpass \
137 known_hosts known_hosts-cert known_hosts.* krl-* ls.copy \
140 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa_ssh2_cr.prv \
141 rsa_ssh2_crnl.prv scp-ssh-wrapper.exe \
142 scp-ssh-wrapper.scp setuid-allowed sftp-server.log \
143 sftp-server.sh sftp.log ssh-log-wrapper.sh ssh.log \
144 ssh-agent.log ssh-add.log slow-sftp-server.sh \
145 ssh-rsa_oldfmt knownhosts_command \
149 sshd_proxy_orig t10.out t10.out.pub t12.out t12.out.pub \
150 t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub \
151 t8.out t8.out.pub t9.out t9.out.pub \
157 TEST_SSH_SSHKEYGEN?=ssh-keygen
159 CPPFLAGS=-I..
162 set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-rsa" ; then \
163 ${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/rsa_ssh2.prv | diff - ${.CURDIR}/rsa_openssh.prv ; \
165 ${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_cr.prv | diff - ${.CURDIR}/rsa_openssh.prv ; \
167 ${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_crnl.prv | diff - ${.CURDIR}/rsa_openssh.prv ; \
171 set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-rsa" ; then \
172 cat ${.CURDIR}/rsa_openssh.prv > $(OBJ)/t2.out ; \
173 chmod 600 $(OBJ)/t2.out ; \
174 ${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t2.out | diff - ${.CURDIR}/rsa_openssh.pub ; \
178 set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-rsa" ; then \
179 ${TEST_SSH_SSHKEYGEN} -ef ${.CURDIR}/rsa_openssh.pub >$(OBJ)/t3.out ; \
180 ${TEST_SSH_SSHKEYGEN} -if $(OBJ)/t3.out | diff - ${.CURDIR}/rsa_openssh.pub ; \
184 set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-rsa" ; then \
185 ${TEST_SSH_SSHKEYGEN} -E md5 -lf ${.CURDIR}/rsa_openssh.pub |\
186 awk '{print $$2}' | diff - ${.CURDIR}/t4.ok ; \
190 set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-rsa" ; then \
191 ${TEST_SSH_SSHKEYGEN} -Bf ${.CURDIR}/rsa_openssh.pub |\
192 awk '{print $$2}' | diff - ${.CURDIR}/t5.ok ; \
195 set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-dss" ; then \
196 ${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.prv > $(OBJ)/t6.out1 ; \
197 ${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.pub > $(OBJ)/t6.out2 ; \
199 ${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t6.out1 | diff - $(OBJ)/t6.out2 ; \
202 $(OBJ)/t7.out:
203 set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-dss" ; then \
204 ${TEST_SSH_SSHKEYGEN} -q -t rsa -N '' -f $@ ; \
207 t7: $(OBJ)/t7.out
208 set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-dss" ; then \
209 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t7.out > /dev/null ; \
210 ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t7.out > /dev/null ; \
213 $(OBJ)/t8.out:
214 set -xe ; if ssh -Q key | grep -q "^ssh-dss" ; then \
215 ${TEST_SSH_SSHKEYGEN} -q -t dsa -N '' -f $@ ; \
218 t8: $(OBJ)/t8.out
219 set -xe ; if ssh -Q key | grep -q "^ssh-dss" ; then \
220 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t8.out > /dev/null ; \
221 ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t8.out > /dev/null ; \
224 $(OBJ)/t9.out:
225 ! ${TEST_SSH_SSH} -Q key-plain | grep ecdsa >/dev/null || \
226 ${TEST_SSH_SSHKEYGEN} -q -t ecdsa -N '' -f $@
228 t9: $(OBJ)/t9.out
229 ! ${TEST_SSH_SSH} -Q key-plain | grep ecdsa >/dev/null || \
230 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t9.out > /dev/null
231 ! ${TEST_SSH_SSH} -Q key-plain | grep ecdsa >/dev/null || \
232 ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t9.out > /dev/null
235 $(OBJ)/t10.out:
236 ${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -f $@
238 t10: $(OBJ)/t10.out
239 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t10.out > /dev/null
240 ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t10.out > /dev/null
243 set -xe ; if ${TEST_SSH_SSH} -Q key | grep -q "^ssh-dss" ; then \
244 ${TEST_SSH_SSHKEYGEN} -E sha256 -lf ${.CURDIR}/rsa_openssh.pub |\
245 awk '{print $$2}' | diff - ${.CURDIR}/t11.ok ; \
248 $(OBJ)/t12.out:
249 ${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -C 'test-comment-1234' -f $@
251 t12: $(OBJ)/t12.out
252 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t12.out.pub | grep test-comment-1234 >/dev/null
254 t-exec: ${LTESTS:=.sh}
256 _started=""; test -z "${LTESTS_FROM}" && _started=1 ;\
258 if [ -z "$$_started" ] ; then \
271 …(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDI…
277 t-exec-interop: ${INTEROP_TESTS:=.sh}
281 …(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDI…
284 t-extra: ${EXTRA_TESTS:=.sh}
288 …(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDI…
294 # Unit tests, built by top-level Makefile
296 set -e ; if test -z "${SKIP_UNIT}" ; then \
299 V=${.CURDIR}/valgrind-unit.sh ; \
302 -d ${.CURDIR}/unittests/sshkey/testdata ; \
304 -d ${.CURDIR}/unittests/sshsig/testdata ; \
306 -d ${.CURDIR}/unittests/authopt/testdata ; \
311 -d ${.CURDIR}/unittests/hostkeys/testdata ; \