xref: /freebsd/crypto/openssh/regress/Makefile (revision 190cef3d52236565eb22e18b33e9e865ec634aa3)
1#	$OpenBSD: Makefile,v 1.97 2018/06/07 04:46:34 djm Exp $
2
3REGRESS_TARGETS=	unit t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12 t-exec
4tests:		prep $(REGRESS_TARGETS)
5
6# Interop tests are not run by default
7interop interop-tests: t-exec-interop
8
9prep:
10	test "x${USE_VALGRIND}" = "x" || mkdir -p $(OBJ)/valgrind-out
11
12clean:
13	for F in $(CLEANFILES); do rm -f $(OBJ)$$F; done
14	test -z "${SUDO}" || ${SUDO} rm -f ${SUDO_CLEAN}
15	rm -rf $(OBJ).putty
16
17distclean:	clean
18
19LTESTS= 	connect \
20		proxy-connect \
21		connect-privsep \
22		connect-uri \
23		proto-version \
24		proto-mismatch \
25		exit-status \
26		envpass \
27		transfer \
28		banner \
29		rekey \
30		stderr-data \
31		stderr-after-eof \
32		broken-pipe \
33		try-ciphers \
34		yes-head \
35		login-timeout \
36		agent \
37		agent-getpeereid \
38		agent-timeout \
39		agent-ptrace \
40		keyscan \
41		keygen-change \
42		keygen-convert \
43		keygen-moduli \
44		key-options \
45		scp \
46		scp-uri \
47		sftp \
48		sftp-chroot \
49		sftp-cmds \
50		sftp-badcmds \
51		sftp-batch \
52		sftp-glob \
53		sftp-perm \
54		sftp-uri \
55		reconfigure \
56		dynamic-forward \
57		forwarding \
58		multiplex \
59		reexec \
60		brokenkeys \
61		sshcfgparse \
62		cfgparse \
63		cfgmatch \
64		cfgmatchlisten \
65		addrmatch \
66		localcommand \
67		forcecommand \
68		portnum \
69		keytype \
70		kextype \
71		cert-hostkey \
72		cert-userkey \
73		host-expand \
74		keys-command \
75		forward-control \
76		integrity \
77		krl \
78		multipubkey \
79		limit-keytype \
80		hostkey-agent \
81		keygen-knownhosts \
82		hostkey-rotate \
83		principals-command \
84		cert-file \
85		cfginclude \
86		allow-deny-users \
87		authinfo
88
89
90#		dhgex \
91
92INTEROP_TESTS=	putty-transfer putty-ciphers putty-kex conch-ciphers
93#INTEROP_TESTS+=ssh-com ssh-com-client ssh-com-keygen ssh-com-sftp
94
95#LTESTS= 	cipher-speed
96
97USERNAME=		${LOGNAME}
98CLEANFILES=	*.core actual agent-key.* authorized_keys_${USERNAME} \
99		authorized_keys_${USERNAME}.* \
100		authorized_principals_${USERNAME} \
101		banner.in banner.out cert_host_key* cert_user_key* \
102		copy.1 copy.2 data ed25519-agent ed25519-agent* \
103		ed25519-agent.pub ed25519 ed25519.pub empty.in \
104		expect failed-regress.log failed-ssh.log failed-sshd.log \
105		hkr.* host.ed25519 host.rsa host.rsa1 host_* \
106		host_ca_key* host_krl_* host_revoked_* key.* \
107		key.dsa-* key.ecdsa-* key.ed25519-512 \
108		key.ed25519-512.pub key.rsa-* keys-command-args kh.* \
109		known_hosts known_hosts-cert known_hosts.* krl-* ls.copy \
110		modpipe netcat no_identity_config \
111		pidfile putty.rsa2 ready regress.log \
112		remote_pid revoked-* rsa rsa-agent rsa-agent.pub rsa.pub \
113		rsa1 rsa1-agent rsa1-agent.pub rsa1.pub rsa_ssh2_cr.prv \
114		rsa_ssh2_crnl.prv scp-ssh-wrapper.exe \
115		scp-ssh-wrapper.scp setuid-allowed sftp-server.log \
116		sftp-server.sh sftp.log ssh-log-wrapper.sh ssh.log \
117		ssh_config ssh_config.* ssh_proxy ssh_proxy_bak \
118		ssh_proxy_envpass sshd.log sshd_config sshd_config_minimal \
119		sshd_config.orig sshd_proxy sshd_proxy.* sshd_proxy_bak \
120		sshd_proxy_orig t10.out t10.out.pub t12.out t12.out.pub \
121		t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub \
122		t8.out t8.out.pub t9.out t9.out.pub testdata \
123		user_*key* user_ca* user_key*
124
125SUDO_CLEAN+=	/var/run/testdata_${USERNAME} /var/run/keycommand_${USERNAME}
126
127# Enable all malloc(3) randomisations and checks
128TEST_ENV=      "MALLOC_OPTIONS=CFGJRSUX"
129
130TEST_SSH_SSHKEYGEN?=ssh-keygen
131
132CPPFLAGS=-I..
133
134t1:
135	${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/rsa_ssh2.prv | diff - ${.CURDIR}/rsa_openssh.prv
136	tr '\n' '\r' <${.CURDIR}/rsa_ssh2.prv > ${.OBJDIR}/rsa_ssh2_cr.prv
137	${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_cr.prv | diff - ${.CURDIR}/rsa_openssh.prv
138	awk '{print $$0 "\r"}' ${.CURDIR}/rsa_ssh2.prv > ${.OBJDIR}/rsa_ssh2_crnl.prv
139	${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_crnl.prv | diff - ${.CURDIR}/rsa_openssh.prv
140
141t2:
142	cat ${.CURDIR}/rsa_openssh.prv > $(OBJ)/t2.out
143	chmod 600 $(OBJ)/t2.out
144	${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t2.out | diff - ${.CURDIR}/rsa_openssh.pub
145
146t3:
147	${TEST_SSH_SSHKEYGEN} -ef ${.CURDIR}/rsa_openssh.pub >$(OBJ)/t3.out
148	${TEST_SSH_SSHKEYGEN} -if $(OBJ)/t3.out | diff - ${.CURDIR}/rsa_openssh.pub
149
150t4:
151	${TEST_SSH_SSHKEYGEN} -E md5 -lf ${.CURDIR}/rsa_openssh.pub |\
152		awk '{print $$2}' | diff - ${.CURDIR}/t4.ok
153
154t5:
155	${TEST_SSH_SSHKEYGEN} -Bf ${.CURDIR}/rsa_openssh.pub |\
156		awk '{print $$2}' | diff - ${.CURDIR}/t5.ok
157
158t6:
159	${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.prv > $(OBJ)/t6.out1
160	${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.pub > $(OBJ)/t6.out2
161	chmod 600 $(OBJ)/t6.out1
162	${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t6.out1 | diff - $(OBJ)/t6.out2
163
164$(OBJ)/t7.out:
165	${TEST_SSH_SSHKEYGEN} -q -t rsa -N '' -f $@
166
167t7: $(OBJ)/t7.out
168	${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t7.out > /dev/null
169	${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t7.out > /dev/null
170
171$(OBJ)/t8.out:
172	${TEST_SSH_SSHKEYGEN} -q -t dsa -N '' -f $@
173
174t8: $(OBJ)/t8.out
175	${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t8.out > /dev/null
176	${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t8.out > /dev/null
177
178$(OBJ)/t9.out:
179	test "${TEST_SSH_ECC}" != yes || \
180	${TEST_SSH_SSHKEYGEN} -q -t ecdsa -N '' -f $@
181
182t9: $(OBJ)/t9.out
183	test "${TEST_SSH_ECC}" != yes || \
184	${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t9.out > /dev/null
185	test "${TEST_SSH_ECC}" != yes || \
186	${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t9.out > /dev/null
187
188
189$(OBJ)/t10.out:
190	${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -f $@
191
192t10: $(OBJ)/t10.out
193	${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t10.out > /dev/null
194	${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t10.out > /dev/null
195
196t11:
197	${TEST_SSH_SSHKEYGEN} -E sha256 -lf ${.CURDIR}/rsa_openssh.pub |\
198		awk '{print $$2}' | diff - ${.CURDIR}/t11.ok
199
200$(OBJ)/t12.out:
201	${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -C 'test-comment-1234' -f $@
202
203t12: $(OBJ)/t12.out
204	${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t12.out.pub | grep test-comment-1234 >/dev/null
205
206t-exec:	${LTESTS:=.sh}
207	@if [ "x$?" = "x" ]; then exit 0; fi; \
208	for TEST in ""$?; do \
209		echo "run test $${TEST}" ... 1>&2; \
210		(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \
211	done
212
213t-exec-interop:	${INTEROP_TESTS:=.sh}
214	@if [ "x$?" = "x" ]; then exit 0; fi; \
215	for TEST in ""$?; do \
216		echo "run test $${TEST}" ... 1>&2; \
217		(env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \
218	done
219
220# Not run by default
221interop: ${INTEROP_TARGETS}
222
223# Unit tests, built by top-level Makefile
224unit:
225	set -e ; if test -z "${SKIP_UNIT}" ; then \
226		V="" ; \
227		test "x${USE_VALGRIND}" = "x" || \
228		    V=${.CURDIR}/valgrind-unit.sh ; \
229		$$V ${.OBJDIR}/unittests/sshbuf/test_sshbuf ; \
230		$$V ${.OBJDIR}/unittests/sshkey/test_sshkey \
231			-d ${.CURDIR}/unittests/sshkey/testdata ; \
232		$$V ${.OBJDIR}/unittests/bitmap/test_bitmap ; \
233		$$V ${.OBJDIR}/unittests/conversion/test_conversion ; \
234		$$V ${.OBJDIR}/unittests/kex/test_kex ; \
235		$$V ${.OBJDIR}/unittests/hostkeys/test_hostkeys \
236			-d ${.CURDIR}/unittests/hostkeys/testdata ; \
237		$$V ${.OBJDIR}/unittests/match/test_match ; \
238		if test "x${TEST_SSH_UTF8}" = "xyes"  ; then \
239			$$V ${.OBJDIR}/unittests/utf8/test_utf8 ; \
240		fi \
241	fi
242