1# $OpenBSD: Makefile,v 1.108 2020/04/20 04:44:47 djm Exp $ 2 3tests: prep file-tests t-exec unit 4 5REGRESS_TARGETS= t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12 6 7# File based tests 8file-tests: $(REGRESS_TARGETS) 9 10# Interop tests are not run by default 11interop interop-tests: t-exec-interop 12 13prep: 14 test "x${USE_VALGRIND}" = "x" || mkdir -p $(OBJ)/valgrind-out 15 16clean: 17 for F in $(CLEANFILES); do rm -f $(OBJ)$$F; done 18 rm -rf $(OBJ).putty 19 20distclean: clean 21 22LTESTS= connect \ 23 proxy-connect \ 24 connect-privsep \ 25 connect-uri \ 26 proto-version \ 27 proto-mismatch \ 28 exit-status \ 29 envpass \ 30 transfer \ 31 banner \ 32 rekey \ 33 dhgex \ 34 stderr-data \ 35 stderr-after-eof \ 36 broken-pipe \ 37 try-ciphers \ 38 yes-head \ 39 login-timeout \ 40 agent \ 41 agent-getpeereid \ 42 agent-timeout \ 43 agent-ptrace \ 44 keyscan \ 45 keygen-change \ 46 keygen-convert \ 47 keygen-moduli \ 48 key-options \ 49 scp \ 50 scp-uri \ 51 sftp \ 52 sftp-chroot \ 53 sftp-cmds \ 54 sftp-badcmds \ 55 sftp-batch \ 56 sftp-glob \ 57 sftp-perm \ 58 sftp-uri \ 59 reconfigure \ 60 dynamic-forward \ 61 forwarding \ 62 multiplex \ 63 reexec \ 64 brokenkeys \ 65 sshcfgparse \ 66 cfgparse \ 67 cfgmatch \ 68 cfgmatchlisten \ 69 percent \ 70 addrmatch \ 71 localcommand \ 72 forcecommand \ 73 portnum \ 74 keytype \ 75 kextype \ 76 cert-hostkey \ 77 cert-userkey \ 78 host-expand \ 79 keys-command \ 80 forward-control \ 81 integrity \ 82 krl \ 83 multipubkey \ 84 limit-keytype \ 85 hostkey-agent \ 86 keygen-knownhosts \ 87 hostkey-rotate \ 88 principals-command \ 89 cert-file \ 90 cfginclude \ 91 servcfginclude \ 92 allow-deny-users \ 93 authinfo \ 94 sshsig \ 95 keygen-comment 96 97 98INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers 99#INTEROP_TESTS+=ssh-com ssh-com-client ssh-com-keygen ssh-com-sftp 100 101EXTRA_TESTS= agent-pkcs11 102#EXTRA_TESTS+= cipher-speed 103 104USERNAME= ${LOGNAME} 105CLEANFILES= *.core actual agent-key.* authorized_keys_${USERNAME} \ 106 authorized_keys_${USERNAME}.* \ 107 authorized_principals_${USERNAME} \ 108 banner.in banner.out cert_host_key* cert_user_key* \ 109 copy.1 copy.2 data ed25519-agent ed25519-agent* \ 110 ed25519-agent.pub ed25519 ed25519.pub empty.in \ 111 expect failed-regress.log failed-ssh.log failed-sshd.log \ 112 hkr.* host.ecdsa-sha2-nistp256 host.ecdsa-sha2-nistp384 \ 113 host.ecdsa-sha2-nistp521 host.ssh-dss host.ssh-ed25519 \ 114 host.ssh-rsa host_ca_key* host_krl_* host_revoked_* key.* \ 115 key.dsa-* key.ecdsa-* key.ed25519-512 \ 116 key.ed25519-512.pub key.rsa-* keys-command-args kh.* \ 117 known_hosts known_hosts-cert known_hosts.* krl-* ls.copy \ 118 modpipe netcat no_identity_config \ 119 pidfile putty.rsa2 ready regress.log remote_pid \ 120 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa_ssh2_cr.prv \ 121 rsa_ssh2_crnl.prv scp-ssh-wrapper.exe \ 122 scp-ssh-wrapper.scp setuid-allowed sftp-server.log \ 123 sftp-server.sh sftp.log ssh-log-wrapper.sh ssh.log \ 124 ssh-rsa_oldfmt \ 125 ssh_config ssh_config.* ssh_proxy ssh_proxy_bak \ 126 ssh_proxy_envpass sshd.log sshd_config sshd_config_minimal \ 127 sshd_config.* sshd_proxy sshd_proxy.* sshd_proxy_bak \ 128 sshd_proxy_orig t10.out t10.out.pub t12.out t12.out.pub \ 129 t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub \ 130 t8.out t8.out.pub t9.out t9.out.pub testdata \ 131 user_*key* user_ca* user_key* 132 133# Enable all malloc(3) randomisations and checks 134TEST_ENV= "MALLOC_OPTIONS=CFGJRSUX" 135 136TEST_SSH_SSHKEYGEN?=ssh-keygen 137 138CPPFLAGS=-I.. 139 140t1: 141 ${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/rsa_ssh2.prv | diff - ${.CURDIR}/rsa_openssh.prv 142 tr '\n' '\r' <${.CURDIR}/rsa_ssh2.prv > ${.OBJDIR}/rsa_ssh2_cr.prv 143 ${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_cr.prv | diff - ${.CURDIR}/rsa_openssh.prv 144 awk '{print $$0 "\r"}' ${.CURDIR}/rsa_ssh2.prv > ${.OBJDIR}/rsa_ssh2_crnl.prv 145 ${TEST_SSH_SSHKEYGEN} -if ${.OBJDIR}/rsa_ssh2_crnl.prv | diff - ${.CURDIR}/rsa_openssh.prv 146 147t2: 148 cat ${.CURDIR}/rsa_openssh.prv > $(OBJ)/t2.out 149 chmod 600 $(OBJ)/t2.out 150 ${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t2.out | diff - ${.CURDIR}/rsa_openssh.pub 151 152t3: 153 ${TEST_SSH_SSHKEYGEN} -ef ${.CURDIR}/rsa_openssh.pub >$(OBJ)/t3.out 154 ${TEST_SSH_SSHKEYGEN} -if $(OBJ)/t3.out | diff - ${.CURDIR}/rsa_openssh.pub 155 156t4: 157 ${TEST_SSH_SSHKEYGEN} -E md5 -lf ${.CURDIR}/rsa_openssh.pub |\ 158 awk '{print $$2}' | diff - ${.CURDIR}/t4.ok 159 160t5: 161 ${TEST_SSH_SSHKEYGEN} -Bf ${.CURDIR}/rsa_openssh.pub |\ 162 awk '{print $$2}' | diff - ${.CURDIR}/t5.ok 163 164t6: 165 ${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.prv > $(OBJ)/t6.out1 166 ${TEST_SSH_SSHKEYGEN} -if ${.CURDIR}/dsa_ssh2.pub > $(OBJ)/t6.out2 167 chmod 600 $(OBJ)/t6.out1 168 ${TEST_SSH_SSHKEYGEN} -yf $(OBJ)/t6.out1 | diff - $(OBJ)/t6.out2 169 170$(OBJ)/t7.out: 171 ${TEST_SSH_SSHKEYGEN} -q -t rsa -N '' -f $@ 172 173t7: $(OBJ)/t7.out 174 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t7.out > /dev/null 175 ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t7.out > /dev/null 176 177$(OBJ)/t8.out: 178 ${TEST_SSH_SSHKEYGEN} -q -t dsa -N '' -f $@ 179 180t8: $(OBJ)/t8.out 181 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t8.out > /dev/null 182 ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t8.out > /dev/null 183 184$(OBJ)/t9.out: 185 test "${TEST_SSH_ECC}" != yes || \ 186 ${TEST_SSH_SSHKEYGEN} -q -t ecdsa -N '' -f $@ 187 188t9: $(OBJ)/t9.out 189 test "${TEST_SSH_ECC}" != yes || \ 190 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t9.out > /dev/null 191 test "${TEST_SSH_ECC}" != yes || \ 192 ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t9.out > /dev/null 193 194 195$(OBJ)/t10.out: 196 ${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -f $@ 197 198t10: $(OBJ)/t10.out 199 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t10.out > /dev/null 200 ${TEST_SSH_SSHKEYGEN} -Bf $(OBJ)/t10.out > /dev/null 201 202t11: 203 ${TEST_SSH_SSHKEYGEN} -E sha256 -lf ${.CURDIR}/rsa_openssh.pub |\ 204 awk '{print $$2}' | diff - ${.CURDIR}/t11.ok 205 206$(OBJ)/t12.out: 207 ${TEST_SSH_SSHKEYGEN} -q -t ed25519 -N '' -C 'test-comment-1234' -f $@ 208 209t12: $(OBJ)/t12.out 210 ${TEST_SSH_SSHKEYGEN} -lf $(OBJ)/t12.out.pub | grep test-comment-1234 >/dev/null 211 212t-exec: ${LTESTS:=.sh} 213 @if [ "x$?" = "x" ]; then exit 0; fi; \ 214 for TEST in ""$?; do \ 215 skip=no; \ 216 for t in ""$${SKIP_LTESTS}; do \ 217 if [ "x$${t}.sh" = "x$${TEST}" ]; then skip=yes; fi; \ 218 done; \ 219 if [ "x$${skip}" = "xno" ]; then \ 220 echo "run test $${TEST}" ... 1>&2; \ 221 (env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \ 222 else \ 223 echo skip test $${TEST} 1>&2; \ 224 fi; \ 225 done 226 227t-exec-interop: ${INTEROP_TESTS:=.sh} 228 @if [ "x$?" = "x" ]; then exit 0; fi; \ 229 for TEST in ""$?; do \ 230 echo "run test $${TEST}" ... 1>&2; \ 231 (env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \ 232 done 233 234t-extra: ${EXTRA_TESTS:=.sh} 235 @if [ "x$?" = "x" ]; then exit 0; fi; \ 236 for TEST in ""$?; do \ 237 echo "run test $${TEST}" ... 1>&2; \ 238 (env SUDO="${SUDO}" TEST_ENV=${TEST_ENV} ${TEST_SHELL} ${.CURDIR}/test-exec.sh ${.OBJDIR} ${.CURDIR}/$${TEST}) || exit $$?; \ 239 done 240 241# Not run by default 242interop: ${INTEROP_TARGETS} 243 244# Unit tests, built by top-level Makefile 245unit: 246 set -e ; if test -z "${SKIP_UNIT}" ; then \ 247 V="" ; \ 248 test "x${USE_VALGRIND}" = "x" || \ 249 V=${.CURDIR}/valgrind-unit.sh ; \ 250 $$V ${.OBJDIR}/unittests/sshbuf/test_sshbuf ; \ 251 $$V ${.OBJDIR}/unittests/sshkey/test_sshkey \ 252 -d ${.CURDIR}/unittests/sshkey/testdata ; \ 253 $$V ${.OBJDIR}/unittests/bitmap/test_bitmap ; \ 254 $$V ${.OBJDIR}/unittests/conversion/test_conversion ; \ 255 $$V ${.OBJDIR}/unittests/kex/test_kex ; \ 256 $$V ${.OBJDIR}/unittests/hostkeys/test_hostkeys \ 257 -d ${.CURDIR}/unittests/hostkeys/testdata ; \ 258 $$V ${.OBJDIR}/unittests/match/test_match ; \ 259 if test "x${TEST_SSH_UTF8}" = "xyes" ; then \ 260 $$V ${.OBJDIR}/unittests/utf8/test_utf8 ; \ 261 fi \ 262 fi 263