script cleanup: use #!/bin/bash on all scripts that use "echo -e" (/bin/sh is sometimes a non-Bourne/non-POSIX shell, e.g. dash/ash, with no support for "echo -e"); fix whitespace.

This commit is contained in:
Daniel Pouzzner
2022-03-09 12:28:22 -06:00
parent 67cc8ed482
commit abfc788389
29 changed files with 138 additions and 140 deletions

View File

@@ -6,13 +6,13 @@
# Git hooks should come before autoreconf. # Git hooks should come before autoreconf.
if [ -d .git ]; then if [ -d .git ]; then
if [ ! -d .git/hooks ]; then if [ ! -d .git/hooks ]; then
mkdir .git/hooks || exit $? mkdir .git/hooks || exit $?
fi fi
if [ ! -e .git/hooks/pre-commit ]; then if [ ! -e .git/hooks/pre-commit ]; then
ln -s ../../pre-commit.sh .git/hooks/pre-commit || exit $? ln -s ../../pre-commit.sh .git/hooks/pre-commit || exit $?
fi fi
if [ ! -e .git/hooks/pre-push ]; then if [ ! -e .git/hooks/pre-push ]; then
ln -s ../../pre-push.sh .git/hooks/pre-push || exit $? ln -s ../../pre-push.sh .git/hooks/pre-push || exit $?
fi fi
fi fi

View File

@@ -14,11 +14,11 @@ echo 2000 > ./certs/ecc/crlnumber
# generate ECC 256-bit CA # generate ECC 256-bit CA
if [ -f ./certs/ca-ecc-key.pem ]; then if [ -f ./certs/ca-ecc-key.pem ]; then
openssl req -config ./certs/ecc/wolfssl.cnf -extensions v3_ca -x509 -nodes -key ./certs/ca-ecc-key.pem -out ./certs/ca-ecc-cert.pem -sha256 \ openssl req -config ./certs/ecc/wolfssl.cnf -extensions v3_ca -x509 -nodes -key ./certs/ca-ecc-key.pem -out ./certs/ca-ecc-cert.pem -sha256 \
-days 7300 -batch -subj "/C=US/ST=Washington/L=Seattle/O=wolfSSL/OU=Development/CN=www.wolfssl.com/emailAddress=info@wolfssl.com" -days 7300 -batch -subj "/C=US/ST=Washington/L=Seattle/O=wolfSSL/OU=Development/CN=www.wolfssl.com/emailAddress=info@wolfssl.com"
else else
openssl ecparam -out ./certs/ca-ecc-key.par -name prime256v1 openssl ecparam -out ./certs/ca-ecc-key.par -name prime256v1
openssl req -config ./certs/ecc/wolfssl.cnf -extensions v3_ca -x509 -nodes -newkey ec:./certs/ca-ecc-key.par -keyout ./certs/ca-ecc-key.pem -out ./certs/ca-ecc-cert.pem -sha256 \ openssl req -config ./certs/ecc/wolfssl.cnf -extensions v3_ca -x509 -nodes -newkey ec:./certs/ca-ecc-key.par -keyout ./certs/ca-ecc-key.pem -out ./certs/ca-ecc-cert.pem -sha256 \
-days 7300 -batch -subj "/C=US/ST=Washington/L=Seattle/O=wolfSSL/OU=Development/CN=www.wolfssl.com/emailAddress=info@wolfssl.com" -days 7300 -batch -subj "/C=US/ST=Washington/L=Seattle/O=wolfSSL/OU=Development/CN=www.wolfssl.com/emailAddress=info@wolfssl.com"
fi fi
openssl x509 -in ./certs/ca-ecc-cert.pem -inform PEM -out ./certs/ca-ecc-cert.der -outform DER openssl x509 -in ./certs/ca-ecc-cert.pem -inform PEM -out ./certs/ca-ecc-cert.der -outform DER
@@ -50,11 +50,11 @@ rm ./certs/server-ecc-req.pem
# generate ECC 384-bit CA # generate ECC 384-bit CA
if [ -f ./certs/ca-ecc384-key.pem ]; then if [ -f ./certs/ca-ecc384-key.pem ]; then
openssl req -config ./certs/ecc/wolfssl_384.cnf -extensions v3_ca -x509 -nodes -key ./certs/ca-ecc384-key.pem -out ./certs/ca-ecc384-cert.pem -sha384 \ openssl req -config ./certs/ecc/wolfssl_384.cnf -extensions v3_ca -x509 -nodes -key ./certs/ca-ecc384-key.pem -out ./certs/ca-ecc384-cert.pem -sha384 \
-days 7300 -batch -subj "/C=US/ST=Washington/L=Seattle/O=wolfSSL/OU=Development/CN=www.wolfssl.com/emailAddress=info@wolfssl.com" -days 7300 -batch -subj "/C=US/ST=Washington/L=Seattle/O=wolfSSL/OU=Development/CN=www.wolfssl.com/emailAddress=info@wolfssl.com"
else else
openssl ecparam -out ./certs/ca-ecc384-key.par -name secp384r1 openssl ecparam -out ./certs/ca-ecc384-key.par -name secp384r1
openssl req -config ./certs/ecc/wolfssl_384.cnf -extensions v3_ca -x509 -nodes -newkey ec:./certs/ca-ecc384-key.par -keyout ./certs/ca-ecc384-key.pem -out ./certs/ca-ecc384-cert.pem -sha384 \ openssl req -config ./certs/ecc/wolfssl_384.cnf -extensions v3_ca -x509 -nodes -newkey ec:./certs/ca-ecc384-key.par -keyout ./certs/ca-ecc384-key.pem -out ./certs/ca-ecc384-cert.pem -sha384 \
-days 7300 -batch -subj "/C=US/ST=Washington/L=Seattle/O=wolfSSL/OU=Development/CN=www.wolfssl.com/emailAddress=info@wolfssl.com" -days 7300 -batch -subj "/C=US/ST=Washington/L=Seattle/O=wolfSSL/OU=Development/CN=www.wolfssl.com/emailAddress=info@wolfssl.com"
fi fi
openssl x509 -in ./certs/ca-ecc384-cert.pem -inform PEM -out ./certs/ca-ecc384-cert.der -outform DER openssl x509 -in ./certs/ca-ecc384-cert.pem -inform PEM -out ./certs/ca-ecc384-cert.der -outform DER
@@ -70,14 +70,14 @@ openssl ca -batch -config ./certs/ecc/wolfssl_384.cnf -gencrl -crldays 1000 -out
# Generate ECC 384-bit server cert # Generate ECC 384-bit server cert
if [ -f ./certs/server-ecc384-key.pem ]; then if [ -f ./certs/server-ecc384-key.pem ]; then
openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -x509 -nodes -key ./certs/server-ecc384-key.pem -out ./certs/server-ecc384-req.pem \ openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -x509 -nodes -key ./certs/server-ecc384-key.pem -out ./certs/server-ecc384-req.pem \
-subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Srv/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/" -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Srv/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/"
else else
openssl ecparam -out ./certs/server-ecc384-key.par -name secp384r1 openssl ecparam -out ./certs/server-ecc384-key.par -name secp384r1
openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -x509 -nodes -newkey ec:./certs/server-ecc384-key.par -keyout ./certs/server-ecc384-key.pem -out ./certs/server-ecc384-req.pem \ openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -x509 -nodes -newkey ec:./certs/server-ecc384-key.par -keyout ./certs/server-ecc384-key.pem -out ./certs/server-ecc384-req.pem \
-subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Srv/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/" -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Srv/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/"
fi fi
openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -new -key ./certs/server-ecc384-key.pem -out ./certs/server-ecc384-req.pem \ openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -new -key ./certs/server-ecc384-key.pem -out ./certs/server-ecc384-req.pem \
-subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Srv/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/" -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Srv/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/"
openssl ec -in ./certs/server-ecc384-key.pem -inform PEM -out ./certs/server-ecc384-key.der -outform DER openssl ec -in ./certs/server-ecc384-key.pem -inform PEM -out ./certs/server-ecc384-key.der -outform DER
# Sign server certificate # Sign server certificate
@@ -90,14 +90,14 @@ rm ./certs/server-ecc384-key.par
# Generate ECC 384-bit client cert # Generate ECC 384-bit client cert
if [ -f ./certs/client-ecc384-key.pem ]; then if [ -f ./certs/client-ecc384-key.pem ]; then
openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -x509 -nodes -key ./certs/client-ecc384-key.pem -out ./certs/client-ecc384-req.pem \ openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -x509 -nodes -key ./certs/client-ecc384-key.pem -out ./certs/client-ecc384-req.pem \
-subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Cli/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/" -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Cli/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/"
else else
openssl ecparam -out ./certs/client-ecc384-key.par -name secp384r1 openssl ecparam -out ./certs/client-ecc384-key.par -name secp384r1
openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -x509 -nodes -newkey ec:./certs/client-ecc384-key.par -keyout ./certs/client-ecc384-key.pem -out ./certs/client-ecc384-req.pem \ openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -x509 -nodes -newkey ec:./certs/client-ecc384-key.par -keyout ./certs/client-ecc384-key.pem -out ./certs/client-ecc384-req.pem \
-subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Cli/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/" -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Cli/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/"
fi fi
openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -new -key ./certs/client-ecc384-key.pem -out ./certs/client-ecc384-req.pem \ openssl req -config ./certs/ecc/wolfssl_384.cnf -sha384 -new -key ./certs/client-ecc384-key.pem -out ./certs/client-ecc384-req.pem \
-subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Clit/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/" -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC384Clit/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/"
openssl ec -in ./certs/client-ecc384-key.pem -inform PEM -out ./certs/client-ecc384-key.der -outform DER openssl ec -in ./certs/client-ecc384-key.pem -inform PEM -out ./certs/client-ecc384-key.der -outform DER
# Sign client certificate # Sign client certificate
@@ -110,8 +110,8 @@ rm ./certs/client-ecc384-key.par
# Generate ECC Kerberos Keys # Generate ECC Kerberos Keys
if [ -f ./certs/ecc/secp256k1-key.pem ]; then if [ -f ./certs/ecc/secp256k1-key.pem ]; then
openssl ecparam -name secp256k1 -genkey -noout -out ./certs/ecc/secp256k1-key.pem openssl ecparam -name secp256k1 -genkey -noout -out ./certs/ecc/secp256k1-key.pem
openssl ec -in ./certs/ecc/secp256k1-key.pem -inform PEM -out ./certs/ecc/secp256k1-key.der -outform DER openssl ec -in ./certs/ecc/secp256k1-key.pem -inform PEM -out ./certs/ecc/secp256k1-key.der -outform DER
fi fi
# Create self-signed ECC Kerberos certificates # Create self-signed ECC Kerberos certificates
openssl req -config ./certs/ecc/wolfssl.cnf -sha256 -new -key ./certs/ecc/secp256k1-key.pem -out ./certs/ecc/server-secp256k1-req.pem -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC256K1-SRV/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/" openssl req -config ./certs/ecc/wolfssl.cnf -sha256 -new -key ./certs/ecc/secp256k1-key.pem -out ./certs/ecc/server-secp256k1-req.pem -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC256K1-SRV/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/"
@@ -126,8 +126,8 @@ rm ./certs/ecc/client-secp256k1-req.pem
# Generate ECC Brainpool Keys # Generate ECC Brainpool Keys
if [ -f ./certs/ecc/bp256r1-key.pem ]; then if [ -f ./certs/ecc/bp256r1-key.pem ]; then
openssl ecparam -name brainpoolP256r1 -genkey -noout -out ./certs/ecc/bp256r1-key.pem openssl ecparam -name brainpoolP256r1 -genkey -noout -out ./certs/ecc/bp256r1-key.pem
openssl ec -in ./certs/ecc/bp256r1-key.pem -inform PEM -out ./certs/ecc/bp256r1-key.der -outform DER openssl ec -in ./certs/ecc/bp256r1-key.pem -inform PEM -out ./certs/ecc/bp256r1-key.der -outform DER
fi fi
# Create self-signed ECC Brainpool certificates # Create self-signed ECC Brainpool certificates
openssl req -config ./certs/ecc/wolfssl.cnf -sha256 -new -key ./certs/ecc/bp256r1-key.pem -out ./certs/ecc/server-bp256r1-req.pem -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC256BPR1-SRV/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/" openssl req -config ./certs/ecc/wolfssl.cnf -sha256 -new -key ./certs/ecc/bp256r1-key.pem -out ./certs/ecc/server-bp256r1-req.pem -subj "/C=US/ST=Washington/L=Seattle/O=Eliptic/OU=ECC256BPR1-SRV/CN=www.wolfssl.com/emailAddress=info@wolfssl.com/"

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
########################################################### ###########################################################
########## update and sign server-revoked-key.pem ################ ########## update and sign server-revoked-key.pem ################

View File

@@ -54,16 +54,16 @@ build_test_cert_conf() {
echo "" >> "$1".conf echo "" >> "$1".conf
if [ -n "$3" ]; then if [ -n "$3" ]; then
echo "[ req_ext ]" >> "$1".conf echo "[ req_ext ]" >> "$1".conf
case "$3" in case "$3" in
*DER*) *DER*)
echo "subjectAltName = $3" >> "$1".conf echo "subjectAltName = $3" >> "$1".conf
;; ;;
*) *)
echo "subjectAltName = @alt_names" >> "$1".conf echo "subjectAltName = @alt_names" >> "$1".conf
echo "[alt_names]" >> "$1".conf echo "[alt_names]" >> "$1".conf
echo "DNS.1 = $3" >> "$1".conf echo "DNS.1 = $3" >> "$1".conf
;; ;;
esac esac
fi fi
} }

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
#commit-tests.sh #commit-tests.sh

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
# #
# #
# Our "pre-push" hook. # Our "pre-push" hook.

View File

@@ -213,4 +213,3 @@ run_test
echo "exiting with $exit_code certificate was not revoked" echo "exiting with $exit_code certificate was not revoked"
exit $exit_code exit $exit_code
########## end program ########## ########## end program ##########

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
# external.test # external.test
@@ -16,16 +16,16 @@ if [ $? -ne 0 ]; then
# cloudflare seems to change CAs quickly, disabled by default # cloudflare seems to change CAs quickly, disabled by default
if test -n "$WOLFSSL_EXTERNAL_TEST"; then if test -n "$WOLFSSL_EXTERNAL_TEST"; then
BUILD_FLAGS="$(./examples/client/client '-#')" BUILD_FLAGS="$(./examples/client/client '-#')"
if echo "$BUILD_FLAGS" | fgrep -q -e ' -DWOLFSSL_SNIFFER '; then if echo "$BUILD_FLAGS" | fgrep -q -e ' -DWOLFSSL_SNIFFER '; then
echo 'skipping WOLFSSL_EXTERNAL_TEST because -DWOLFSSL_SNIFFER configuration of build is incompatible.' echo 'skipping WOLFSSL_EXTERNAL_TEST because -DWOLFSSL_SNIFFER configuration of build is incompatible.'
exit 0 exit 0
fi fi
if echo "$BUILD_FLAGS" | fgrep -v -q -e ' -DHAVE_ECC '; then if echo "$BUILD_FLAGS" | fgrep -v -q -e ' -DHAVE_ECC '; then
echo 'skipping WOLFSSL_EXTERNAL_TEST because -UHAVE_ECC configuration of build is incompatible.' echo 'skipping WOLFSSL_EXTERNAL_TEST because -UHAVE_ECC configuration of build is incompatible.'
exit 0 exit 0
fi fi
echo "WOLFSSL_EXTERNAL_TEST set, running test..." echo "WOLFSSL_EXTERNAL_TEST set, running test..."
else else

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
# google.test # google.test

View File

@@ -4,21 +4,21 @@
./autogen.sh ./autogen.sh
./configure --enable-debug --disable-shared --enable-memtest \ ./configure --enable-debug --disable-shared --enable-memtest \
--enable-opensslextra --enable-des3 --enable-dh --enable-ecc --enable-aesgcm --enable-aesccm \ --enable-opensslextra --enable-des3 --enable-dh --enable-ecc --enable-aesgcm --enable-aesccm \
--enable-sniffer --enable-psk --enable-camellia --enable-sha512 --enable-crl --enable-ocsp --enable-savesession \ --enable-sniffer --enable-psk --enable-camellia --enable-sha512 --enable-crl --enable-ocsp --enable-savesession \
--enable-savecert --enable-atomicuser --enable-pkcallbacks --enable-scep; --enable-savecert --enable-atomicuser --enable-pkcallbacks --enable-scep;
#DTLS has issue with trapping client/server failure disconnect since its stateless. Need to find way to communicate failure through file system. #DTLS has issue with trapping client/server failure disconnect since its stateless. Need to find way to communicate failure through file system.
#--enable-dtls #--enable-dtls
make make
for i in {1..1000} for i in {1..1000}
do do
echo "Trying $i...\n" echo "Trying $i...\n"
./tests/unit.test > ./scripts/memtest.txt 2>&1 ./tests/unit.test > ./scripts/memtest.txt 2>&1
RESULT=$? RESULT=$?
[ $RESULT -eq 139 ] && echo "Mem Seg Fault" && exit 1 [ $RESULT -eq 139 ] && echo "Mem Seg Fault" && exit 1
done done
echo "Loop SUCCESS" echo "Loop SUCCESS"

View File

@@ -52,12 +52,12 @@ wait_for_readyFile(){
counter=0 counter=0
while [ ! -s "$1" -a "$counter" -lt 20 ]; do while [ ! -s "$1" -a "$counter" -lt 20 ]; do
if [[ -n "${2-}" ]]; then if [[ -n "${2-}" ]]; then
if ! kill -0 $2 2>&-; then if ! kill -0 $2 2>&-; then
echo "pid $2 for port ${3-} exited before creating ready file. bailing..." echo "pid $2 for port ${3-} exited before creating ready file. bailing..."
exit 1 exit 1
fi fi
fi fi
echo -e "waiting for ready file..." echo -e "waiting for ready file..."
sleep 0.1 sleep 0.1
counter=$((counter+ 1)) counter=$((counter+ 1))
@@ -159,9 +159,9 @@ cleanup()
rm -r "$WORKSPACE" || return 1 rm -r "$WORKSPACE" || return 1
if [[ ("$exit_status" == 1) && ($RETRIES_REMAINING -gt 0) ]]; then if [[ ("$exit_status" == 1) && ($RETRIES_REMAINING -gt 0) ]]; then
echo "retrying..." echo "retrying..."
RETRIES_REMAINING=$((RETRIES_REMAINING - 1)) RETRIES_REMAINING=$((RETRIES_REMAINING - 1))
exec $0 "$@" exec $0 "$@"
fi fi
} }
trap cleanup EXIT INT TERM HUP trap cleanup EXIT INT TERM HUP
@@ -179,13 +179,13 @@ ca=certs/external/baltimore-cybertrust-root.pem
get_first_free_port() { get_first_free_port() {
local ret="$1" local ret="$1"
while :; do while :; do
if [[ "$ret" -ge 65536 ]]; then if [[ "$ret" -ge 65536 ]]; then
ret=1024 ret=1024
fi fi
if ! nc -z 127.0.0.1 "$ret"; then if ! nc -z 127.0.0.1 "$ret"; then
break break
fi fi
ret=$((ret+1)) ret=$((ret+1))
done done
echo "$ret" echo "$ret"
return 0 return 0

View File

@@ -27,7 +27,7 @@ fi
if ./examples/client/client '-#' | fgrep -q -e ' -DTEST_IPV6 '; then if ./examples/client/client '-#' | fgrep -q -e ' -DTEST_IPV6 '; then
if [[ "$IPV6_SUPPORTED" == "no" ]]; then if [[ "$IPV6_SUPPORTED" == "no" ]]; then
echo 'Skipping IPV6 test in environment lacking IPV6 support.' echo 'Skipping IPV6 test in environment lacking IPV6 support.'
exit 0 exit 0
fi fi
LOCALHOST='[::1]' LOCALHOST='[::1]'
LOCALHOST_FOR_NC='::1' LOCALHOST_FOR_NC='::1'
@@ -69,12 +69,12 @@ wait_for_readyFile(){
counter=0 counter=0
while [ ! -s "$1" -a "$counter" -lt 20 ]; do while [ ! -s "$1" -a "$counter" -lt 20 ]; do
if [[ -n "${2-}" ]]; then if [[ -n "${2-}" ]]; then
if ! kill -0 $2 2>&-; then if ! kill -0 $2 2>&-; then
echo "pid $2 for port ${3-} exited before creating ready file. bailing..." echo "pid $2 for port ${3-} exited before creating ready file. bailing..."
exit 1 exit 1
fi fi
fi fi
echo -e "waiting for ready file..." echo -e "waiting for ready file..."
sleep 0.1 sleep 0.1
counter=$((counter+ 1)) counter=$((counter+ 1))
@@ -175,9 +175,9 @@ cleanup()
rm -r "$WORKSPACE" || return 1 rm -r "$WORKSPACE" || return 1
if [[ ("$exit_status" == 1) && ($RETRIES_REMAINING -gt 0) ]]; then if [[ ("$exit_status" == 1) && ($RETRIES_REMAINING -gt 0) ]]; then
echo "retrying..." echo "retrying..."
RETRIES_REMAINING=$((RETRIES_REMAINING - 1)) RETRIES_REMAINING=$((RETRIES_REMAINING - 1))
exec $0 "$@" exec $0 "$@"
fi fi
} }
trap cleanup EXIT INT TERM HUP trap cleanup EXIT INT TERM HUP
@@ -207,13 +207,13 @@ fi
get_first_free_port() { get_first_free_port() {
local ret="$1" local ret="$1"
while :; do while :; do
if [[ "$ret" -ge 65536 ]]; then if [[ "$ret" -ge 65536 ]]; then
ret=1024 ret=1024
fi fi
if ! nc -z $V4V6_FLAG $LOCALHOST_FOR_NC "$ret"; then if ! nc -z $V4V6_FLAG $LOCALHOST_FOR_NC "$ret"; then
break break
fi fi
ret=$((ret+1)) ret=$((ret+1))
done done
echo "$ret" echo "$ret"
return 0 return 0

View File

@@ -35,7 +35,7 @@ fi
if ./examples/client/client '-#' | fgrep -q -e ' -DTEST_IPV6 '; then if ./examples/client/client '-#' | fgrep -q -e ' -DTEST_IPV6 '; then
if [[ "$IPV6_SUPPORTED" == "no" ]]; then if [[ "$IPV6_SUPPORTED" == "no" ]]; then
echo 'Skipping IPV6 test in environment lacking IPV6 support.' echo 'Skipping IPV6 test in environment lacking IPV6 support.'
exit 0 exit 0
fi fi
LOCALHOST='[::1]' LOCALHOST='[::1]'
LOCALHOST_FOR_NC='-6 ::1' LOCALHOST_FOR_NC='-6 ::1'
@@ -78,12 +78,12 @@ wait_for_readyFile(){
counter=0 counter=0
while [ ! -s $1 -a "$counter" -lt 20 ]; do while [ ! -s $1 -a "$counter" -lt 20 ]; do
if [[ -n "${2-}" ]]; then if [[ -n "${2-}" ]]; then
if ! kill -0 $2 2>&-; then if ! kill -0 $2 2>&-; then
echo "pid $2 for port ${3-} exited before creating ready file. bailing..." echo "pid $2 for port ${3-} exited before creating ready file. bailing..."
exit 1 exit 1
fi fi
fi fi
echo -e "waiting for ready file..." echo -e "waiting for ready file..."
sleep 0.1 sleep 0.1
counter=$((counter+ 1)) counter=$((counter+ 1))
@@ -196,9 +196,9 @@ cleanup()
rm -r "$WORKSPACE" || return 1 rm -r "$WORKSPACE" || return 1
if [[ ("$exit_status" == 1) && ($RETRIES_REMAINING -gt 0) ]]; then if [[ ("$exit_status" == 1) && ($RETRIES_REMAINING -gt 0) ]]; then
echo "retrying..." echo "retrying..."
RETRIES_REMAINING=$((RETRIES_REMAINING - 1)) RETRIES_REMAINING=$((RETRIES_REMAINING - 1))
exec $0 "$@" exec $0 "$@"
fi fi
} }
trap cleanup EXIT INT TERM HUP trap cleanup EXIT INT TERM HUP
@@ -226,13 +226,13 @@ fi
get_first_free_port() { get_first_free_port() {
local ret="$1" local ret="$1"
while :; do while :; do
if [[ "$ret" -ge 65536 ]]; then if [[ "$ret" -ge 65536 ]]; then
ret=1024 ret=1024
fi fi
if ! nc -z ${LOCALHOST_FOR_NC} "$ret"; then if ! nc -z ${LOCALHOST_FOR_NC} "$ret"; then
break break
fi fi
ret=$((ret+1)) ret=$((ret+1))
done done
echo "$ret" echo "$ret"
return 0 return 0

View File

@@ -27,14 +27,14 @@ if [ "$OUTPUT" = "SNI is: ON" ]; then
printf '\n\n%s\n\n' "SNI is on, proceed with globalsign test" printf '\n\n%s\n\n' "SNI is on, proceed with globalsign test"
if [ "$AM_BWRAPPED" != "yes" ]; then if [ "$AM_BWRAPPED" != "yes" ]; then
# is our desired server there? # is our desired server there?
"${SCRIPT_DIR}/ping.test" $server 2 "${SCRIPT_DIR}/ping.test" $server 2
RESULT=$? RESULT=$?
if [ $RESULT -ne 0 ]; then if [ $RESULT -ne 0 ]; then
GL_UNREACHABLE=1 GL_UNREACHABLE=1
fi fi
else else
RESULT=0 RESULT=0
fi fi
if [ $RESULT -eq 0 ]; then if [ $RESULT -eq 0 ]; then

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
#openssl.test #openssl.test

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
# ping.test # ping.test

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
#pkcallbacks.test #pkcallbacks.test

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
# psk.test # psk.test
# copyright wolfSSL 2016 # copyright wolfSSL 2016

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
#resume.test #resume.test

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
#sniffer-testsuite.test #sniffer-testsuite.test

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
# tls13.test # tls13.test
# Copyright wolfSSL 2016-2021 # Copyright wolfSSL 2016-2021
@@ -138,9 +138,9 @@ fi
do_cleanup do_cleanup
echo "" echo ""
cat ./wolfssl/options.h | grep -F -e 'NO_CERTS' grep -F -e 'NO_CERTS' ./wolfssl/options.h
NO_CERTS=$? NO_CERTS=$?
cat ./wolfssl/options.h | grep -F -e 'WOLFSSL_NO_CLIENT_AUTH' grep -F -e 'WOLFSSL_NO_CLIENT_AUTH' ./wolfssl/options.h
NO_CLIENT_AUTH=$? NO_CLIENT_AUTH=$?
if [ $NO_CERTS -ne 0 -a $NO_CLIENT_AUTH -ne 0 ]; then if [ $NO_CERTS -ne 0 -a $NO_CLIENT_AUTH -ne 0 ]; then
# TLS 1.3 mutual auth required but client doesn't send certificates. # TLS 1.3 mutual auth required but client doesn't send certificates.
@@ -312,4 +312,3 @@ do_cleanup
echo -e "\nALL Tests Passed" echo -e "\nALL Tests Passed"
exit 0 exit 0

View File

@@ -3,10 +3,10 @@
if [ "${AM_BWRAPPED-}" != "yes" ]; then if [ "${AM_BWRAPPED-}" != "yes" ]; then
bwrap_path="$(command -v bwrap)" bwrap_path="$(command -v bwrap)"
if [ -n "$bwrap_path" ]; then if [ -n "$bwrap_path" ]; then
exec "$bwrap_path" --unshare-net --dev-bind / / "@builddir@/tests/unit.test" "$@" exec "$bwrap_path" --unshare-net --dev-bind / / "@builddir@/tests/unit.test" "$@"
else else
exec "@builddir@/tests/unit.test" "$@" exec "@builddir@/tests/unit.test" "$@"
fi fi
else else
exec "@builddir@/tests/unit.test" "$@" exec "@builddir@/tests/unit.test" "$@"
fi fi

View File

@@ -1,4 +1,4 @@
#!/bin/sh #!/bin/bash
[ "$(whoami)" != "root" ] && echo "Sorry, you are not root." && exit 1 [ "$(whoami)" != "root" ] && echo "Sorry, you are not root." && exit 1