ssldvt   [plain text]


#! /bin/csh -f
#
# run SSL tests.
# For now the sslSession run using the imported p12 identity is disabled by default
# since there is apparently no way to avoid the UI resulting from attempting
# to use a private key imported via p12 (even to modify the ACL by the same program
# that imported it!). 
#
#
set QUIET= 
set QUIET_=
set VERB= 
set PINGSSL_QUIET=
set NON_BLOCK=
set LARGE_DH=
set P12_SESSION=NO
set DO_PING=YES
set RING_BUFS=

source sslKcSetup

#
while ( $#argv > 0 )
    switch ( "$argv[1]" )
        case v:
            set VERB = v
            shift
            breaksw
        case q:
            set QUIET = q
			set QUIET_ = -q
			set PINGSSL_QUIET = s
            shift
            breaksw
        case p:
			set P12_SESSION = YES
			shift
			breaksw
		case b:
			set NON_BLOCK=b
            shift
            breaksw
		case l:
			set LARGE_DH=l
			shift
			breaksw
		case n:
			set DO_PING=NO
			shift
			breaksw
		case R:
			set RING_BUFS=R
			shift
			breaksw
        default:
            cat ssldvtUsage
            exit(1)
    endsw
end
#
# Verify presence and validity of required certs
#
if((! -e $LOCAL_CERT) || (! -e $CLIENT_CERT) || \
   (! -e $LOCAL_KC_PATH) || (! -e $CLIENT_KC_PATH) || \
   (! -e $P12_KC_PATH) || (! -e $P12_ROOT_CERT)) then
   cat ssldvtCertErr
   exit(1)
endif
$BUILD_DIR/certcrl -c $LOCAL_CERT -a -e=CSSMERR_TP_INVALID_ANCHOR_CERT >> /dev/null
if($status) then
   echo === initial run of certcrl yielded unexpected results ===
   cat ssldvtCertErr
   exit(1)
endif

# P12-based, RSA
if($P12_SESSION == YES) then
    $BUILD_DIR/sslSession $P12_KC z=$P12_KC_PWD a $P12_ROOT_CERT k $QUIET $VERB $NON_BLOCK $RING_BUFS || exit(1)
endif
$BUILD_DIR/sslAlert $QUIET $VERB s=$LOCAL_CERT c=$CLIENT_CERT $NON_BLOCK $RING_BUFS || exit(1)
$BUILD_DIR/sslProt $QUIET $VERB s=$LOCAL_CERT $NON_BLOCK $RING_BUFS || exit(1)
$BUILD_DIR/sslAuth $QUIET $VERB  s=$LOCAL_CERT c=$CLIENT_CERT $NON_BLOCK $RING_BUFS || exit(1)
$BUILD_DIR/sslCipher $QUIET $VERB $NON_BLOCK s=$LOCAL_CERT d=$DSA_CERT $LARGE_DH $RING_BUFS || exit(1)
# 
# Use cert configured for client use on server side, verify policy fail 
#
$BUILD_DIR/sslSession $CLIENT_KC a $CLIENT_CERT x $QUIET $RING_BUFS || exit(1)
# 
# Use cert configured for server use on client side, verify policy fail 
#
$BUILD_DIR/sslSession $LOCAL_KC a $LOCAL_CERT c=$LOCAL_KC X u $RING_BUFS $QUIET || exit(1)
#
# check for cert-specific errors
#
set SSL_SCRIPT_DIR=`pwd`
# 
# This one needs certs in current directory; copy the script 
# to build dir and run there; return to cwd afterwards
#
cp sslExtendUse.scr $BUILD_DIR
cd $BUILD_DIR
./certcrl -S sslExtendUse.scr $QUIET_ || exit(1)
cd $SSL_SCRIPT_DIR
#
if($DO_PING == YES) then
	../sslViewer/verifyPing $PINGSSL_QUIET $VERB $NON_BLOCK || exit(1)
endif

echo "### ssldvt completed successfully. ###"