#include "../../src/tm.h"
time_t
cm_time(time_t *dest)
{
long t;
if (getenv("CM_FORCE_TIME") != NULL) {
t = atol(getenv("CM_FORCE_TIME"));
if (dest != NULL) {
*dest = t;
}
return t;
} else {
return time(dest);
}
}
certmonger-0.74/tests/tools/Makefile.am 0000664 0001750 0001750 00000001352 12317265222 015075 0000000 0000000 AM_CFLAGS = $(TALLOC_CFLAGS) $(TEVENT_CFLAGS) $(DBUS_CFLAGS) \
-I$(builddir)/../../src
LDADD = libtools.a ../../src/libcm.a $(srcdir)/../../src/env-system.c libtools.a $(OPENSSL_LIBS) $(CERTMONGER_LIBS) $(KRB5_LIBS) $(UUID_LIBS)
noinst_PROGRAMS = keyiread keygen csrgen submit certread certsave oid2name name2oid iterate prefs dates listnicks pem2base base2pem dparse payload checksig base64
noinst_LIBRARIES = libtools.a
libtools_a_SOURCES = ../../src/tm.h tm.c tools.h tools.c
listnicks_CFLAGS = $(AM_CFLAGS) $(NSS_CFLAGS)
payload_CFLAGS = $(AM_CFLAGS) $(NSS_CFLAGS)
checksig_CFLAGS = $(AM_CFLAGS) $(NSS_CFLAGS)
dparse_CFLAGS = $(AM_CFLAGS) $(XML_CFLAGS)
dparse_SOURCES = dparse.c ../../src/submit-d.c
dparse_LDADD = $(LDADD) $(XML_LIBS)
certmonger-0.74/tests/tools/Makefile.in 0000664 0001750 0001750 00000117275 12317265231 015122 0000000 0000000 # Makefile.in generated by automake 1.14.1 from Makefile.am.
# @configure_input@
# Copyright (C) 1994-2013 Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
VPATH = @srcdir@
am__is_gnu_make = test -n '$(MAKEFILE_LIST)' && test -n '$(MAKELEVEL)'
am__make_running_with_option = \
case $${target_option-} in \
?) ;; \
*) echo "am__make_running_with_option: internal error: invalid" \
"target option '$${target_option-}' specified" >&2; \
exit 1;; \
esac; \
has_opt=no; \
sane_makeflags=$$MAKEFLAGS; \
if $(am__is_gnu_make); then \
sane_makeflags=$$MFLAGS; \
else \
case $$MAKEFLAGS in \
*\\[\ \ ]*) \
bs=\\; \
sane_makeflags=`printf '%s\n' "$$MAKEFLAGS" \
| sed "s/$$bs$$bs[$$bs $$bs ]*//g"`;; \
esac; \
fi; \
skip_next=no; \
strip_trailopt () \
{ \
flg=`printf '%s\n' "$$flg" | sed "s/$$1.*$$//"`; \
}; \
for flg in $$sane_makeflags; do \
test $$skip_next = yes && { skip_next=no; continue; }; \
case $$flg in \
*=*|--*) continue;; \
-*I) strip_trailopt 'I'; skip_next=yes;; \
-*I?*) strip_trailopt 'I';; \
-*O) strip_trailopt 'O'; skip_next=yes;; \
-*O?*) strip_trailopt 'O';; \
-*l) strip_trailopt 'l'; skip_next=yes;; \
-*l?*) strip_trailopt 'l';; \
-[dEDm]) skip_next=yes;; \
-[JT]) skip_next=yes;; \
esac; \
case $$flg in \
*$$target_option*) has_opt=yes; break;; \
esac; \
done; \
test $$has_opt = yes
am__make_dryrun = (target_option=n; $(am__make_running_with_option))
am__make_keepgoing = (target_option=k; $(am__make_running_with_option))
pkgdatadir = $(datadir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkglibexecdir = $(libexecdir)/@PACKAGE@
am__cd = CDPATH="$${ZSH_VERSION+.}$(PATH_SEPARATOR)" && cd
install_sh_DATA = $(install_sh) -c -m 644
install_sh_PROGRAM = $(install_sh) -c
install_sh_SCRIPT = $(install_sh) -c
INSTALL_HEADER = $(INSTALL_DATA)
transform = $(program_transform_name)
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
build_triplet = @build@
host_triplet = @host@
noinst_PROGRAMS = keyiread$(EXEEXT) keygen$(EXEEXT) csrgen$(EXEEXT) \
submit$(EXEEXT) certread$(EXEEXT) certsave$(EXEEXT) \
oid2name$(EXEEXT) name2oid$(EXEEXT) iterate$(EXEEXT) \
prefs$(EXEEXT) dates$(EXEEXT) listnicks$(EXEEXT) \
pem2base$(EXEEXT) base2pem$(EXEEXT) dparse$(EXEEXT) \
payload$(EXEEXT) checksig$(EXEEXT) base64$(EXEEXT)
subdir = tests/tools
DIST_COMMON = $(srcdir)/Makefile.in $(srcdir)/Makefile.am \
$(top_srcdir)/depcomp
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/intlmacosx.m4 \
$(top_srcdir)/m4/lib-ld.m4 $(top_srcdir)/m4/lib-link.m4 \
$(top_srcdir)/m4/lib-prefix.m4 $(top_srcdir)/m4/nls.m4 \
$(top_srcdir)/m4/po.m4 $(top_srcdir)/m4/progtest.m4 \
$(top_srcdir)/configure.ac
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(install_sh) -d
CONFIG_HEADER = $(top_builddir)/src/config.h
CONFIG_CLEAN_FILES =
CONFIG_CLEAN_VPATH_FILES =
LIBRARIES = $(noinst_LIBRARIES)
AR = ar
ARFLAGS = cru
AM_V_AR = $(am__v_AR_@AM_V@)
am__v_AR_ = $(am__v_AR_@AM_DEFAULT_V@)
am__v_AR_0 = @echo " AR " $@;
am__v_AR_1 =
libtools_a_AR = $(AR) $(ARFLAGS)
libtools_a_LIBADD =
am_libtools_a_OBJECTS = tm.$(OBJEXT) tools.$(OBJEXT)
libtools_a_OBJECTS = $(am_libtools_a_OBJECTS)
PROGRAMS = $(noinst_PROGRAMS)
base2pem_SOURCES = base2pem.c
base2pem_OBJECTS = base2pem.$(OBJEXT)
base2pem_LDADD = $(LDADD)
am__DEPENDENCIES_1 =
base2pem_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
base64_SOURCES = base64.c
base64_OBJECTS = base64.$(OBJEXT)
base64_LDADD = $(LDADD)
base64_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
certread_SOURCES = certread.c
certread_OBJECTS = certread.$(OBJEXT)
certread_LDADD = $(LDADD)
certread_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
certsave_SOURCES = certsave.c
certsave_OBJECTS = certsave.$(OBJEXT)
certsave_LDADD = $(LDADD)
certsave_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
checksig_SOURCES = checksig.c
checksig_OBJECTS = checksig-checksig.$(OBJEXT)
checksig_LDADD = $(LDADD)
checksig_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
checksig_LINK = $(CCLD) $(checksig_CFLAGS) $(CFLAGS) $(AM_LDFLAGS) \
$(LDFLAGS) -o $@
csrgen_SOURCES = csrgen.c
csrgen_OBJECTS = csrgen.$(OBJEXT)
csrgen_LDADD = $(LDADD)
csrgen_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
dates_SOURCES = dates.c
dates_OBJECTS = dates.$(OBJEXT)
dates_LDADD = $(LDADD)
dates_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
am__dirstamp = $(am__leading_dot)dirstamp
am_dparse_OBJECTS = dparse-dparse.$(OBJEXT) \
../../src/dparse-submit-d.$(OBJEXT)
dparse_OBJECTS = $(am_dparse_OBJECTS)
am__DEPENDENCIES_2 = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
dparse_DEPENDENCIES = $(am__DEPENDENCIES_2) $(am__DEPENDENCIES_1)
dparse_LINK = $(CCLD) $(dparse_CFLAGS) $(CFLAGS) $(AM_LDFLAGS) \
$(LDFLAGS) -o $@
iterate_SOURCES = iterate.c
iterate_OBJECTS = iterate.$(OBJEXT)
iterate_LDADD = $(LDADD)
iterate_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
keygen_SOURCES = keygen.c
keygen_OBJECTS = keygen.$(OBJEXT)
keygen_LDADD = $(LDADD)
keygen_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
keyiread_SOURCES = keyiread.c
keyiread_OBJECTS = keyiread.$(OBJEXT)
keyiread_LDADD = $(LDADD)
keyiread_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
listnicks_SOURCES = listnicks.c
listnicks_OBJECTS = listnicks-listnicks.$(OBJEXT)
listnicks_LDADD = $(LDADD)
listnicks_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
listnicks_LINK = $(CCLD) $(listnicks_CFLAGS) $(CFLAGS) $(AM_LDFLAGS) \
$(LDFLAGS) -o $@
name2oid_SOURCES = name2oid.c
name2oid_OBJECTS = name2oid.$(OBJEXT)
name2oid_LDADD = $(LDADD)
name2oid_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
oid2name_SOURCES = oid2name.c
oid2name_OBJECTS = oid2name.$(OBJEXT)
oid2name_LDADD = $(LDADD)
oid2name_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
payload_SOURCES = payload.c
payload_OBJECTS = payload-payload.$(OBJEXT)
payload_LDADD = $(LDADD)
payload_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
payload_LINK = $(CCLD) $(payload_CFLAGS) $(CFLAGS) $(AM_LDFLAGS) \
$(LDFLAGS) -o $@
pem2base_SOURCES = pem2base.c
pem2base_OBJECTS = pem2base.$(OBJEXT)
pem2base_LDADD = $(LDADD)
pem2base_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
prefs_SOURCES = prefs.c
prefs_OBJECTS = prefs.$(OBJEXT)
prefs_LDADD = $(LDADD)
prefs_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
submit_SOURCES = submit.c
submit_OBJECTS = submit.$(OBJEXT)
submit_LDADD = $(LDADD)
submit_DEPENDENCIES = libtools.a ../../src/libcm.a \
$(srcdir)/../../src/env-system.c libtools.a \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1) \
$(am__DEPENDENCIES_1) $(am__DEPENDENCIES_1)
AM_V_P = $(am__v_P_@AM_V@)
am__v_P_ = $(am__v_P_@AM_DEFAULT_V@)
am__v_P_0 = false
am__v_P_1 = :
AM_V_GEN = $(am__v_GEN_@AM_V@)
am__v_GEN_ = $(am__v_GEN_@AM_DEFAULT_V@)
am__v_GEN_0 = @echo " GEN " $@;
am__v_GEN_1 =
AM_V_at = $(am__v_at_@AM_V@)
am__v_at_ = $(am__v_at_@AM_DEFAULT_V@)
am__v_at_0 = @
am__v_at_1 =
DEFAULT_INCLUDES = -I.@am__isrc@ -I$(top_builddir)/src
depcomp = $(SHELL) $(top_srcdir)/depcomp
am__depfiles_maybe = depfiles
am__mv = mv -f
AM_V_lt = $(am__v_lt_@AM_V@)
am__v_lt_ = $(am__v_lt_@AM_DEFAULT_V@)
am__v_lt_0 = --silent
am__v_lt_1 =
COMPILE = $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) \
$(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS)
AM_V_CC = $(am__v_CC_@AM_V@)
am__v_CC_ = $(am__v_CC_@AM_DEFAULT_V@)
am__v_CC_0 = @echo " CC " $@;
am__v_CC_1 =
CCLD = $(CC)
LINK = $(CCLD) $(AM_CFLAGS) $(CFLAGS) $(AM_LDFLAGS) $(LDFLAGS) -o $@
AM_V_CCLD = $(am__v_CCLD_@AM_V@)
am__v_CCLD_ = $(am__v_CCLD_@AM_DEFAULT_V@)
am__v_CCLD_0 = @echo " CCLD " $@;
am__v_CCLD_1 =
SOURCES = $(libtools_a_SOURCES) base2pem.c base64.c certread.c \
certsave.c checksig.c csrgen.c dates.c $(dparse_SOURCES) \
iterate.c keygen.c keyiread.c listnicks.c name2oid.c \
oid2name.c payload.c pem2base.c prefs.c submit.c
DIST_SOURCES = $(libtools_a_SOURCES) base2pem.c base64.c certread.c \
certsave.c checksig.c csrgen.c dates.c $(dparse_SOURCES) \
iterate.c keygen.c keyiread.c listnicks.c name2oid.c \
oid2name.c payload.c pem2base.c prefs.c submit.c
am__can_run_installinfo = \
case $$AM_UPDATE_INFO_DIR in \
n|no|NO) false;; \
*) (install-info --version) >/dev/null 2>&1;; \
esac
am__tagged_files = $(HEADERS) $(SOURCES) $(TAGS_FILES) $(LISP)
# Read a list of newline-separated strings from the standard input,
# and print each of them once, without duplicates. Input order is
# *not* preserved.
am__uniquify_input = $(AWK) '\
BEGIN { nonempty = 0; } \
{ items[$$0] = 1; nonempty = 1; } \
END { if (nonempty) { for (i in items) print i; }; } \
'
# Make sure the list of sources is unique. This is necessary because,
# e.g., the same source file might be shared among _SOURCES variables
# for different programs/libraries.
am__define_uniq_tagged_files = \
list='$(am__tagged_files)'; \
unique=`for i in $$list; do \
if test -f "$$i"; then echo $$i; else echo $(srcdir)/$$i; fi; \
done | $(am__uniquify_input)`
ETAGS = etags
CTAGS = ctags
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
ACLOCAL = @ACLOCAL@
AMTAR = @AMTAR@
AM_DEFAULT_VERBOSITY = @AM_DEFAULT_VERBOSITY@
AUTOCONF = @AUTOCONF@
AUTOHEADER = @AUTOHEADER@
AUTOMAKE = @AUTOMAKE@
AWK = @AWK@
CC = @CC@
CCDEPMODE = @CCDEPMODE@
CERTMONGER_CFLAGS = @CERTMONGER_CFLAGS@
CERTMONGER_LIBS = @CERTMONGER_LIBS@
CFLAGS = @CFLAGS@
CM_CERTMASTER_CA_NAME = @CM_CERTMASTER_CA_NAME@
CM_DBUS_NAME = @CM_DBUS_NAME@
CM_DEFAULT_CERT_LIFETIME = @CM_DEFAULT_CERT_LIFETIME@
CM_DEFAULT_IDLE_TIMEOUT = @CM_DEFAULT_IDLE_TIMEOUT@
CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY = @CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY@
CM_DEFAULT_POPULATE_UNIQUE_ID = @CM_DEFAULT_POPULATE_UNIQUE_ID@
CM_DEFAULT_PUBKEY_SIZE = @CM_DEFAULT_PUBKEY_SIZE@
CM_DEFAULT_TTL_LIST = @CM_DEFAULT_TTL_LIST@
CM_HOMEDIR = @CM_HOMEDIR@
CM_IPA_CA_NAME = @CM_IPA_CA_NAME@
CM_MINIMUM_DSA_KEY_SIZE = @CM_MINIMUM_DSA_KEY_SIZE@
CM_MINIMUM_EC_KEY_SIZE = @CM_MINIMUM_EC_KEY_SIZE@
CM_MINIMUM_RSA_KEY_SIZE = @CM_MINIMUM_RSA_KEY_SIZE@
CM_NOTIFICATION_ENV = @CM_NOTIFICATION_ENV@
CM_SELF_SIGN_CA_NAME = @CM_SELF_SIGN_CA_NAME@
CM_STORE_CAS_DIRECTORY = @CM_STORE_CAS_DIRECTORY@
CM_STORE_CAS_DIRECTORY_ENV = @CM_STORE_CAS_DIRECTORY_ENV@
CM_STORE_CONFIG_DIRECTORY_ENV = @CM_STORE_CONFIG_DIRECTORY_ENV@
CM_STORE_REQUESTS_DIRECTORY = @CM_STORE_REQUESTS_DIRECTORY@
CM_STORE_REQUESTS_DIRECTORY_ENV = @CM_STORE_REQUESTS_DIRECTORY_ENV@
CM_TMPDIR = @CM_TMPDIR@
CM_TMPDIR_ENV = @CM_TMPDIR_ENV@
CPP = @CPP@
CPPFLAGS = @CPPFLAGS@
CURL_CFLAGS = @CURL_CFLAGS@
CURL_LIBS = @CURL_LIBS@
CYGPATH_W = @CYGPATH_W@
DBUS_CFLAGS = @DBUS_CFLAGS@
DBUS_LIBS = @DBUS_LIBS@
DEFS = @DEFS@
DEPDIR = @DEPDIR@
ECHO_C = @ECHO_C@
ECHO_N = @ECHO_N@
ECHO_T = @ECHO_T@
EGREP = @EGREP@
EXEEXT = @EXEEXT@
GETCERT_CFLAGS = @GETCERT_CFLAGS@
GETCERT_LIBS = @GETCERT_LIBS@
GETTEXT_MACRO_VERSION = @GETTEXT_MACRO_VERSION@
GMSGFMT = @GMSGFMT@
GMSGFMT_015 = @GMSGFMT_015@
GREP = @GREP@
INSTALL = @INSTALL@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INTLLIBS = @INTLLIBS@
INTL_MACOSX_LIBS = @INTL_MACOSX_LIBS@
KRB5_CFLAGS = @KRB5_CFLAGS@
KRB5_CONFIG = @KRB5_CONFIG@
KRB5_LIBS = @KRB5_LIBS@
LDFLAGS = @LDFLAGS@
LIBICONV = @LIBICONV@
LIBINTL = @LIBINTL@
LIBOBJS = @LIBOBJS@
LIBS = @LIBS@
LTLIBICONV = @LTLIBICONV@
LTLIBINTL = @LTLIBINTL@
LTLIBOBJS = @LTLIBOBJS@
MAINT = @MAINT@
MAKEINFO = @MAKEINFO@
MAN_DSA = @MAN_DSA@
MAN_EC = @MAN_EC@
MKDIR_P = @MKDIR_P@
MSGFMT = @MSGFMT@
MSGFMT_015 = @MSGFMT_015@
MSGMERGE = @MSGMERGE@
NO_MAN_DSA = @NO_MAN_DSA@
NO_MAN_EC = @NO_MAN_EC@
NSS_CFLAGS = @NSS_CFLAGS@
NSS_LIBS = @NSS_LIBS@
OBJEXT = @OBJEXT@
OPENSSL_CFLAGS = @OPENSSL_CFLAGS@
OPENSSL_LIBS = @OPENSSL_LIBS@
OPENSSL_SSL_CFLAGS = @OPENSSL_SSL_CFLAGS@
OPENSSL_SSL_LIBS = @OPENSSL_SSL_LIBS@
PACKAGE = @PACKAGE@
PACKAGE_BUGREPORT = @PACKAGE_BUGREPORT@
PACKAGE_NAME = @PACKAGE_NAME@
PACKAGE_STRING = @PACKAGE_STRING@
PACKAGE_TARNAME = @PACKAGE_TARNAME@
PACKAGE_URL = @PACKAGE_URL@
PACKAGE_VERSION = @PACKAGE_VERSION@
PATH_SEPARATOR = @PATH_SEPARATOR@
PKG_CONFIG = @PKG_CONFIG@
PKG_CONFIG_LIBDIR = @PKG_CONFIG_LIBDIR@
PKG_CONFIG_PATH = @PKG_CONFIG_PATH@
POSUB = @POSUB@
RANLIB = @RANLIB@
SESSIONBUSSERVICESDIR = @SESSIONBUSSERVICESDIR@
SET_MAKE = @SET_MAKE@
SHELL = @SHELL@
STRIP = @STRIP@
SYSTEMBUSSERVICESDIR = @SYSTEMBUSSERVICESDIR@
SYSTEMD = @SYSTEMD@
SYSTEMDSYSTEMUNITDIR = @SYSTEMDSYSTEMUNITDIR@
SYSVINIT = @SYSVINIT@
TALLOC_CFLAGS = @TALLOC_CFLAGS@
TALLOC_LIBS = @TALLOC_LIBS@
TEVENT_CFLAGS = @TEVENT_CFLAGS@
TEVENT_LIBS = @TEVENT_LIBS@
TMPFILES = @TMPFILES@
USE_NLS = @USE_NLS@
UUID_CFLAGS = @UUID_CFLAGS@
UUID_LIBS = @UUID_LIBS@
VERSION = @VERSION@
XGETTEXT = @XGETTEXT@
XGETTEXT_015 = @XGETTEXT_015@
XGETTEXT_EXTRA_OPTIONS = @XGETTEXT_EXTRA_OPTIONS@
XMLRPC_CFLAGS = @XMLRPC_CFLAGS@
XMLRPC_C_CONFIG = @XMLRPC_C_CONFIG@
XMLRPC_LIBS = @XMLRPC_LIBS@
XML_CFLAGS = @XML_CFLAGS@
XML_LIBS = @XML_LIBS@
abs_builddir = @abs_builddir@
abs_srcdir = @abs_srcdir@
abs_top_builddir = @abs_top_builddir@
abs_top_srcdir = @abs_top_srcdir@
ac_ct_CC = @ac_ct_CC@
am__include = @am__include@
am__leading_dot = @am__leading_dot@
am__quote = @am__quote@
am__tar = @am__tar@
am__untar = @am__untar@
bindir = @bindir@
build = @build@
build_alias = @build_alias@
build_cpu = @build_cpu@
build_os = @build_os@
build_vendor = @build_vendor@
builddir = @builddir@
datadir = @datadir@
datarootdir = @datarootdir@
docdir = @docdir@
dvidir = @dvidir@
exec_prefix = @exec_prefix@
host = @host@
host_alias = @host_alias@
host_cpu = @host_cpu@
host_os = @host_os@
host_vendor = @host_vendor@
htmldir = @htmldir@
includedir = @includedir@
infodir = @infodir@
install_sh = @install_sh@
libdir = @libdir@
libexecdir = @libexecdir@
localedir = @localedir@
localstatedir = @localstatedir@
mandir = @mandir@
mkdir_p = @mkdir_p@
mylibexecdir = @mylibexecdir@
mysbindir = @mysbindir@
oldincludedir = @oldincludedir@
pdfdir = @pdfdir@
prefix = @prefix@
program_transform_name = @program_transform_name@
psdir = @psdir@
sbindir = @sbindir@
sharedstatedir = @sharedstatedir@
srcdir = @srcdir@
sysconfdir = @sysconfdir@
target_alias = @target_alias@
top_build_prefix = @top_build_prefix@
top_builddir = @top_builddir@
top_srcdir = @top_srcdir@
AM_CFLAGS = $(TALLOC_CFLAGS) $(TEVENT_CFLAGS) $(DBUS_CFLAGS) \
-I$(builddir)/../../src
LDADD = libtools.a ../../src/libcm.a $(srcdir)/../../src/env-system.c libtools.a $(OPENSSL_LIBS) $(CERTMONGER_LIBS) $(KRB5_LIBS) $(UUID_LIBS)
noinst_LIBRARIES = libtools.a
libtools_a_SOURCES = ../../src/tm.h tm.c tools.h tools.c
listnicks_CFLAGS = $(AM_CFLAGS) $(NSS_CFLAGS)
payload_CFLAGS = $(AM_CFLAGS) $(NSS_CFLAGS)
checksig_CFLAGS = $(AM_CFLAGS) $(NSS_CFLAGS)
dparse_CFLAGS = $(AM_CFLAGS) $(XML_CFLAGS)
dparse_SOURCES = dparse.c ../../src/submit-d.c
dparse_LDADD = $(LDADD) $(XML_LIBS)
all: all-am
.SUFFIXES:
.SUFFIXES: .c .o .obj
$(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__configure_deps)
@for dep in $?; do \
case '$(am__configure_deps)' in \
*$$dep*) \
( cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh ) \
&& { if test -f $@; then exit 0; else break; fi; }; \
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign tests/tools/Makefile'; \
$(am__cd) $(top_srcdir) && \
$(AUTOMAKE) --foreign tests/tools/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \
*config.status*) \
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh;; \
*) \
echo ' cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe)'; \
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe);; \
esac;
$(top_builddir)/config.status: $(top_srcdir)/configure $(CONFIG_STATUS_DEPENDENCIES)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(top_srcdir)/configure: @MAINTAINER_MODE_TRUE@ $(am__configure_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(ACLOCAL_M4): @MAINTAINER_MODE_TRUE@ $(am__aclocal_m4_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(am__aclocal_m4_deps):
clean-noinstLIBRARIES:
-test -z "$(noinst_LIBRARIES)" || rm -f $(noinst_LIBRARIES)
libtools.a: $(libtools_a_OBJECTS) $(libtools_a_DEPENDENCIES) $(EXTRA_libtools_a_DEPENDENCIES)
$(AM_V_at)-rm -f libtools.a
$(AM_V_AR)$(libtools_a_AR) libtools.a $(libtools_a_OBJECTS) $(libtools_a_LIBADD)
$(AM_V_at)$(RANLIB) libtools.a
clean-noinstPROGRAMS:
-test -z "$(noinst_PROGRAMS)" || rm -f $(noinst_PROGRAMS)
base2pem$(EXEEXT): $(base2pem_OBJECTS) $(base2pem_DEPENDENCIES) $(EXTRA_base2pem_DEPENDENCIES)
@rm -f base2pem$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(base2pem_OBJECTS) $(base2pem_LDADD) $(LIBS)
base64$(EXEEXT): $(base64_OBJECTS) $(base64_DEPENDENCIES) $(EXTRA_base64_DEPENDENCIES)
@rm -f base64$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(base64_OBJECTS) $(base64_LDADD) $(LIBS)
certread$(EXEEXT): $(certread_OBJECTS) $(certread_DEPENDENCIES) $(EXTRA_certread_DEPENDENCIES)
@rm -f certread$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(certread_OBJECTS) $(certread_LDADD) $(LIBS)
certsave$(EXEEXT): $(certsave_OBJECTS) $(certsave_DEPENDENCIES) $(EXTRA_certsave_DEPENDENCIES)
@rm -f certsave$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(certsave_OBJECTS) $(certsave_LDADD) $(LIBS)
checksig$(EXEEXT): $(checksig_OBJECTS) $(checksig_DEPENDENCIES) $(EXTRA_checksig_DEPENDENCIES)
@rm -f checksig$(EXEEXT)
$(AM_V_CCLD)$(checksig_LINK) $(checksig_OBJECTS) $(checksig_LDADD) $(LIBS)
csrgen$(EXEEXT): $(csrgen_OBJECTS) $(csrgen_DEPENDENCIES) $(EXTRA_csrgen_DEPENDENCIES)
@rm -f csrgen$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(csrgen_OBJECTS) $(csrgen_LDADD) $(LIBS)
dates$(EXEEXT): $(dates_OBJECTS) $(dates_DEPENDENCIES) $(EXTRA_dates_DEPENDENCIES)
@rm -f dates$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(dates_OBJECTS) $(dates_LDADD) $(LIBS)
../../src/$(am__dirstamp):
@$(MKDIR_P) ../../src
@: > ../../src/$(am__dirstamp)
../../src/$(DEPDIR)/$(am__dirstamp):
@$(MKDIR_P) ../../src/$(DEPDIR)
@: > ../../src/$(DEPDIR)/$(am__dirstamp)
../../src/dparse-submit-d.$(OBJEXT): ../../src/$(am__dirstamp) \
../../src/$(DEPDIR)/$(am__dirstamp)
dparse$(EXEEXT): $(dparse_OBJECTS) $(dparse_DEPENDENCIES) $(EXTRA_dparse_DEPENDENCIES)
@rm -f dparse$(EXEEXT)
$(AM_V_CCLD)$(dparse_LINK) $(dparse_OBJECTS) $(dparse_LDADD) $(LIBS)
iterate$(EXEEXT): $(iterate_OBJECTS) $(iterate_DEPENDENCIES) $(EXTRA_iterate_DEPENDENCIES)
@rm -f iterate$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(iterate_OBJECTS) $(iterate_LDADD) $(LIBS)
keygen$(EXEEXT): $(keygen_OBJECTS) $(keygen_DEPENDENCIES) $(EXTRA_keygen_DEPENDENCIES)
@rm -f keygen$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(keygen_OBJECTS) $(keygen_LDADD) $(LIBS)
keyiread$(EXEEXT): $(keyiread_OBJECTS) $(keyiread_DEPENDENCIES) $(EXTRA_keyiread_DEPENDENCIES)
@rm -f keyiread$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(keyiread_OBJECTS) $(keyiread_LDADD) $(LIBS)
listnicks$(EXEEXT): $(listnicks_OBJECTS) $(listnicks_DEPENDENCIES) $(EXTRA_listnicks_DEPENDENCIES)
@rm -f listnicks$(EXEEXT)
$(AM_V_CCLD)$(listnicks_LINK) $(listnicks_OBJECTS) $(listnicks_LDADD) $(LIBS)
name2oid$(EXEEXT): $(name2oid_OBJECTS) $(name2oid_DEPENDENCIES) $(EXTRA_name2oid_DEPENDENCIES)
@rm -f name2oid$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(name2oid_OBJECTS) $(name2oid_LDADD) $(LIBS)
oid2name$(EXEEXT): $(oid2name_OBJECTS) $(oid2name_DEPENDENCIES) $(EXTRA_oid2name_DEPENDENCIES)
@rm -f oid2name$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(oid2name_OBJECTS) $(oid2name_LDADD) $(LIBS)
payload$(EXEEXT): $(payload_OBJECTS) $(payload_DEPENDENCIES) $(EXTRA_payload_DEPENDENCIES)
@rm -f payload$(EXEEXT)
$(AM_V_CCLD)$(payload_LINK) $(payload_OBJECTS) $(payload_LDADD) $(LIBS)
pem2base$(EXEEXT): $(pem2base_OBJECTS) $(pem2base_DEPENDENCIES) $(EXTRA_pem2base_DEPENDENCIES)
@rm -f pem2base$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(pem2base_OBJECTS) $(pem2base_LDADD) $(LIBS)
prefs$(EXEEXT): $(prefs_OBJECTS) $(prefs_DEPENDENCIES) $(EXTRA_prefs_DEPENDENCIES)
@rm -f prefs$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(prefs_OBJECTS) $(prefs_LDADD) $(LIBS)
submit$(EXEEXT): $(submit_OBJECTS) $(submit_DEPENDENCIES) $(EXTRA_submit_DEPENDENCIES)
@rm -f submit$(EXEEXT)
$(AM_V_CCLD)$(LINK) $(submit_OBJECTS) $(submit_LDADD) $(LIBS)
mostlyclean-compile:
-rm -f *.$(OBJEXT)
-rm -f ../../src/*.$(OBJEXT)
distclean-compile:
-rm -f *.tab.c
@AMDEP_TRUE@@am__include@ @am__quote@../../src/$(DEPDIR)/dparse-submit-d.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/base2pem.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/base64.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/certread.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/certsave.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/checksig-checksig.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/csrgen.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/dates.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/dparse-dparse.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/iterate.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/keygen.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/keyiread.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/listnicks-listnicks.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/name2oid.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/oid2name.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/payload-payload.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/pem2base.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/prefs.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/submit.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/tm.Po@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/tools.Po@am__quote@
.c.o:
@am__fastdepCC_TRUE@ $(AM_V_CC)depbase=`echo $@ | sed 's|[^/]*$$|$(DEPDIR)/&|;s|\.o$$||'`;\
@am__fastdepCC_TRUE@ $(COMPILE) -MT $@ -MD -MP -MF $$depbase.Tpo -c -o $@ $< &&\
@am__fastdepCC_TRUE@ $(am__mv) $$depbase.Tpo $$depbase.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='$<' object='$@' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(COMPILE) -c -o $@ $<
.c.obj:
@am__fastdepCC_TRUE@ $(AM_V_CC)depbase=`echo $@ | sed 's|[^/]*$$|$(DEPDIR)/&|;s|\.obj$$||'`;\
@am__fastdepCC_TRUE@ $(COMPILE) -MT $@ -MD -MP -MF $$depbase.Tpo -c -o $@ `$(CYGPATH_W) '$<'` &&\
@am__fastdepCC_TRUE@ $(am__mv) $$depbase.Tpo $$depbase.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='$<' object='$@' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(COMPILE) -c -o $@ `$(CYGPATH_W) '$<'`
checksig-checksig.o: checksig.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(checksig_CFLAGS) $(CFLAGS) -MT checksig-checksig.o -MD -MP -MF $(DEPDIR)/checksig-checksig.Tpo -c -o checksig-checksig.o `test -f 'checksig.c' || echo '$(srcdir)/'`checksig.c
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/checksig-checksig.Tpo $(DEPDIR)/checksig-checksig.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='checksig.c' object='checksig-checksig.o' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(checksig_CFLAGS) $(CFLAGS) -c -o checksig-checksig.o `test -f 'checksig.c' || echo '$(srcdir)/'`checksig.c
checksig-checksig.obj: checksig.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(checksig_CFLAGS) $(CFLAGS) -MT checksig-checksig.obj -MD -MP -MF $(DEPDIR)/checksig-checksig.Tpo -c -o checksig-checksig.obj `if test -f 'checksig.c'; then $(CYGPATH_W) 'checksig.c'; else $(CYGPATH_W) '$(srcdir)/checksig.c'; fi`
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/checksig-checksig.Tpo $(DEPDIR)/checksig-checksig.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='checksig.c' object='checksig-checksig.obj' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(checksig_CFLAGS) $(CFLAGS) -c -o checksig-checksig.obj `if test -f 'checksig.c'; then $(CYGPATH_W) 'checksig.c'; else $(CYGPATH_W) '$(srcdir)/checksig.c'; fi`
dparse-dparse.o: dparse.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(dparse_CFLAGS) $(CFLAGS) -MT dparse-dparse.o -MD -MP -MF $(DEPDIR)/dparse-dparse.Tpo -c -o dparse-dparse.o `test -f 'dparse.c' || echo '$(srcdir)/'`dparse.c
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/dparse-dparse.Tpo $(DEPDIR)/dparse-dparse.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='dparse.c' object='dparse-dparse.o' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(dparse_CFLAGS) $(CFLAGS) -c -o dparse-dparse.o `test -f 'dparse.c' || echo '$(srcdir)/'`dparse.c
dparse-dparse.obj: dparse.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(dparse_CFLAGS) $(CFLAGS) -MT dparse-dparse.obj -MD -MP -MF $(DEPDIR)/dparse-dparse.Tpo -c -o dparse-dparse.obj `if test -f 'dparse.c'; then $(CYGPATH_W) 'dparse.c'; else $(CYGPATH_W) '$(srcdir)/dparse.c'; fi`
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/dparse-dparse.Tpo $(DEPDIR)/dparse-dparse.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='dparse.c' object='dparse-dparse.obj' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(dparse_CFLAGS) $(CFLAGS) -c -o dparse-dparse.obj `if test -f 'dparse.c'; then $(CYGPATH_W) 'dparse.c'; else $(CYGPATH_W) '$(srcdir)/dparse.c'; fi`
../../src/dparse-submit-d.o: ../../src/submit-d.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(dparse_CFLAGS) $(CFLAGS) -MT ../../src/dparse-submit-d.o -MD -MP -MF ../../src/$(DEPDIR)/dparse-submit-d.Tpo -c -o ../../src/dparse-submit-d.o `test -f '../../src/submit-d.c' || echo '$(srcdir)/'`../../src/submit-d.c
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) ../../src/$(DEPDIR)/dparse-submit-d.Tpo ../../src/$(DEPDIR)/dparse-submit-d.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='../../src/submit-d.c' object='../../src/dparse-submit-d.o' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(dparse_CFLAGS) $(CFLAGS) -c -o ../../src/dparse-submit-d.o `test -f '../../src/submit-d.c' || echo '$(srcdir)/'`../../src/submit-d.c
../../src/dparse-submit-d.obj: ../../src/submit-d.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(dparse_CFLAGS) $(CFLAGS) -MT ../../src/dparse-submit-d.obj -MD -MP -MF ../../src/$(DEPDIR)/dparse-submit-d.Tpo -c -o ../../src/dparse-submit-d.obj `if test -f '../../src/submit-d.c'; then $(CYGPATH_W) '../../src/submit-d.c'; else $(CYGPATH_W) '$(srcdir)/../../src/submit-d.c'; fi`
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) ../../src/$(DEPDIR)/dparse-submit-d.Tpo ../../src/$(DEPDIR)/dparse-submit-d.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='../../src/submit-d.c' object='../../src/dparse-submit-d.obj' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(dparse_CFLAGS) $(CFLAGS) -c -o ../../src/dparse-submit-d.obj `if test -f '../../src/submit-d.c'; then $(CYGPATH_W) '../../src/submit-d.c'; else $(CYGPATH_W) '$(srcdir)/../../src/submit-d.c'; fi`
listnicks-listnicks.o: listnicks.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(listnicks_CFLAGS) $(CFLAGS) -MT listnicks-listnicks.o -MD -MP -MF $(DEPDIR)/listnicks-listnicks.Tpo -c -o listnicks-listnicks.o `test -f 'listnicks.c' || echo '$(srcdir)/'`listnicks.c
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/listnicks-listnicks.Tpo $(DEPDIR)/listnicks-listnicks.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='listnicks.c' object='listnicks-listnicks.o' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(listnicks_CFLAGS) $(CFLAGS) -c -o listnicks-listnicks.o `test -f 'listnicks.c' || echo '$(srcdir)/'`listnicks.c
listnicks-listnicks.obj: listnicks.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(listnicks_CFLAGS) $(CFLAGS) -MT listnicks-listnicks.obj -MD -MP -MF $(DEPDIR)/listnicks-listnicks.Tpo -c -o listnicks-listnicks.obj `if test -f 'listnicks.c'; then $(CYGPATH_W) 'listnicks.c'; else $(CYGPATH_W) '$(srcdir)/listnicks.c'; fi`
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/listnicks-listnicks.Tpo $(DEPDIR)/listnicks-listnicks.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='listnicks.c' object='listnicks-listnicks.obj' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(listnicks_CFLAGS) $(CFLAGS) -c -o listnicks-listnicks.obj `if test -f 'listnicks.c'; then $(CYGPATH_W) 'listnicks.c'; else $(CYGPATH_W) '$(srcdir)/listnicks.c'; fi`
payload-payload.o: payload.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(payload_CFLAGS) $(CFLAGS) -MT payload-payload.o -MD -MP -MF $(DEPDIR)/payload-payload.Tpo -c -o payload-payload.o `test -f 'payload.c' || echo '$(srcdir)/'`payload.c
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/payload-payload.Tpo $(DEPDIR)/payload-payload.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='payload.c' object='payload-payload.o' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(payload_CFLAGS) $(CFLAGS) -c -o payload-payload.o `test -f 'payload.c' || echo '$(srcdir)/'`payload.c
payload-payload.obj: payload.c
@am__fastdepCC_TRUE@ $(AM_V_CC)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(payload_CFLAGS) $(CFLAGS) -MT payload-payload.obj -MD -MP -MF $(DEPDIR)/payload-payload.Tpo -c -o payload-payload.obj `if test -f 'payload.c'; then $(CYGPATH_W) 'payload.c'; else $(CYGPATH_W) '$(srcdir)/payload.c'; fi`
@am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/payload-payload.Tpo $(DEPDIR)/payload-payload.Po
@AMDEP_TRUE@@am__fastdepCC_FALSE@ $(AM_V_CC)source='payload.c' object='payload-payload.obj' libtool=no @AMDEPBACKSLASH@
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
@am__fastdepCC_FALSE@ $(AM_V_CC@am__nodep@)$(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(payload_CFLAGS) $(CFLAGS) -c -o payload-payload.obj `if test -f 'payload.c'; then $(CYGPATH_W) 'payload.c'; else $(CYGPATH_W) '$(srcdir)/payload.c'; fi`
ID: $(am__tagged_files)
$(am__define_uniq_tagged_files); mkid -fID $$unique
tags: tags-am
TAGS: tags
tags-am: $(TAGS_DEPENDENCIES) $(am__tagged_files)
set x; \
here=`pwd`; \
$(am__define_uniq_tagged_files); \
shift; \
if test -z "$(ETAGS_ARGS)$$*$$unique"; then :; else \
test -n "$$unique" || unique=$$empty_fix; \
if test $$# -gt 0; then \
$(ETAGS) $(ETAGSFLAGS) $(AM_ETAGSFLAGS) $(ETAGS_ARGS) \
"$$@" $$unique; \
else \
$(ETAGS) $(ETAGSFLAGS) $(AM_ETAGSFLAGS) $(ETAGS_ARGS) \
$$unique; \
fi; \
fi
ctags: ctags-am
CTAGS: ctags
ctags-am: $(TAGS_DEPENDENCIES) $(am__tagged_files)
$(am__define_uniq_tagged_files); \
test -z "$(CTAGS_ARGS)$$unique" \
|| $(CTAGS) $(CTAGSFLAGS) $(AM_CTAGSFLAGS) $(CTAGS_ARGS) \
$$unique
GTAGS:
here=`$(am__cd) $(top_builddir) && pwd` \
&& $(am__cd) $(top_srcdir) \
&& gtags -i $(GTAGS_ARGS) "$$here"
cscopelist: cscopelist-am
cscopelist-am: $(am__tagged_files)
list='$(am__tagged_files)'; \
case "$(srcdir)" in \
[\\/]* | ?:[\\/]*) sdir="$(srcdir)" ;; \
*) sdir=$(subdir)/$(srcdir) ;; \
esac; \
for i in $$list; do \
if test -f "$$i"; then \
echo "$(subdir)/$$i"; \
else \
echo "$$sdir/$$i"; \
fi; \
done >> $(top_builddir)/cscope.files
distclean-tags:
-rm -f TAGS ID GTAGS GRTAGS GSYMS GPATH tags
distdir: $(DISTFILES)
@srcdirstrip=`echo "$(srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
topsrcdirstrip=`echo "$(top_srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
list='$(DISTFILES)'; \
dist_files=`for file in $$list; do echo $$file; done | \
sed -e "s|^$$srcdirstrip/||;t" \
-e "s|^$$topsrcdirstrip/|$(top_builddir)/|;t"`; \
case $$dist_files in \
*/*) $(MKDIR_P) `echo "$$dist_files" | \
sed '/\//!d;s|^|$(distdir)/|;s,/[^/]*$$,,' | \
sort -u` ;; \
esac; \
for file in $$dist_files; do \
if test -f $$file || test -d $$file; then d=.; else d=$(srcdir); fi; \
if test -d $$d/$$file; then \
dir=`echo "/$$file" | sed -e 's,/[^/]*$$,,'`; \
if test -d "$(distdir)/$$file"; then \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
if test -d $(srcdir)/$$file && test $$d != $(srcdir); then \
cp -fpR $(srcdir)/$$file "$(distdir)$$dir" || exit 1; \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
cp -fpR $$d/$$file "$(distdir)$$dir" || exit 1; \
else \
test -f "$(distdir)/$$file" \
|| cp -p $$d/$$file "$(distdir)/$$file" \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-am
all-am: Makefile $(LIBRARIES) $(PROGRAMS)
installdirs:
install: install-am
install-exec: install-exec-am
install-data: install-data-am
uninstall: uninstall-am
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-am
install-strip:
if test -z '$(STRIP)'; then \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
install; \
else \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
"INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'" install; \
fi
mostlyclean-generic:
clean-generic:
distclean-generic:
-test -z "$(CONFIG_CLEAN_FILES)" || rm -f $(CONFIG_CLEAN_FILES)
-test . = "$(srcdir)" || test -z "$(CONFIG_CLEAN_VPATH_FILES)" || rm -f $(CONFIG_CLEAN_VPATH_FILES)
-rm -f ../../src/$(DEPDIR)/$(am__dirstamp)
-rm -f ../../src/$(am__dirstamp)
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-am
clean-am: clean-generic clean-noinstLIBRARIES clean-noinstPROGRAMS \
mostlyclean-am
distclean: distclean-am
-rm -rf ../../src/$(DEPDIR) ./$(DEPDIR)
-rm -f Makefile
distclean-am: clean-am distclean-compile distclean-generic \
distclean-tags
dvi: dvi-am
dvi-am:
html: html-am
html-am:
info: info-am
info-am:
install-data-am:
install-dvi: install-dvi-am
install-dvi-am:
install-exec-am:
install-html: install-html-am
install-html-am:
install-info: install-info-am
install-info-am:
install-man:
install-pdf: install-pdf-am
install-pdf-am:
install-ps: install-ps-am
install-ps-am:
installcheck-am:
maintainer-clean: maintainer-clean-am
-rm -rf ../../src/$(DEPDIR) ./$(DEPDIR)
-rm -f Makefile
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-am
mostlyclean-am: mostlyclean-compile mostlyclean-generic
pdf: pdf-am
pdf-am:
ps: ps-am
ps-am:
uninstall-am:
.MAKE: install-am install-strip
.PHONY: CTAGS GTAGS TAGS all all-am check check-am clean clean-generic \
clean-noinstLIBRARIES clean-noinstPROGRAMS cscopelist-am ctags \
ctags-am distclean distclean-compile distclean-generic \
distclean-tags distdir dvi dvi-am html html-am info info-am \
install install-am install-data install-data-am install-dvi \
install-dvi-am install-exec install-exec-am install-html \
install-html-am install-info install-info-am install-man \
install-pdf install-pdf-am install-ps install-ps-am \
install-strip installcheck installcheck-am installdirs \
maintainer-clean maintainer-clean-generic mostlyclean \
mostlyclean-compile mostlyclean-generic pdf pdf-am ps ps-am \
tags tags-am uninstall uninstall-am
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:
certmonger-0.74/tests/certmonger.conf 0000664 0001750 0001750 00000000110 12317265222 014704 0000000 0000000 [defaults]
notification_method = stdout
[selfsign]
validity_period = 1d
certmonger-0.74/tests/functions 0000664 0001750 0001750 00000002313 12317265222 013632 0000000 0000000 #!/bin/sh
function initnssdb() {
dir=`echo "$1" | cut -f2- -d:`
if ! test -d "$dir"/rosubdir ; then
mkdir -m 500 "$dir"/rosubdir
fi
if test -d "$dir"/rwsubdir ; then
chmod u+w "$dir"/rwsubdir/* || true
rm -f "$dir"/rwsubdir/*
else
mkdir -m 700 "$dir"/rwsubdir
fi
echo "" > "$dir"/oldpin
echo "" > "$dir"/oldpin2
echo "" >> "$dir"/oldpin2
echo "$2" > "$dir"/newpin
echo "$2" > "$dir"/newpin2
echo "$2" >> "$dir"/newpin2
certutil -d "$1" -W -f "$dir"/oldpin -@ "$dir"/oldpin2 > /dev/null
certutil -d "$1" -W -f "$dir"/oldpin -@ "$dir"/newpin2 > /dev/null
certutil -d "$1" -W -f "$dir"/newpin -@ "$dir"/newpin2 > /dev/null
certutil -d "$1"/rwsubdir -W -f "$dir"/oldpin -@ "$dir"/oldpin2 > /dev/null
certutil -d "$1"/rwsubdir -W -f "$dir"/oldpin -@ "$dir"/newpin2 > /dev/null
certutil -d "$1"/rwsubdir -W -f "$dir"/newpin -@ "$dir"/newpin2 > /dev/null
chmod u-w "$dir"/rwsubdir/*
}
function run_certutil() {
dd if=/dev/urandom of="$dir"/noise bs=1024 count=1 > /dev/null 2> /dev/null
certutil "$@" -z "$dir"/noise
}
function run_dos2unix() {
dos2unix "$@" 2>&1 | sed -e s,Unix,unix,g -e s,UNIX,unix,g
}
function run_unix2dos() {
unix2dos "$@" 2>&1 | sed -e s,Unix,unix,g -e s,UNIX,unix,g
}
certmonger-0.74/tests/run-tests.sh 0000775 0001750 0001750 00000004670 12317265222 014212 0000000 0000000 #!/bin/sh
tmpfile=`mktemp ${TMPDIR:-/tmp}/runtestsXXXXXX`
if test -z "$tmpfile" ; then
echo Error creating temporary file.
exit 1
else
trap 'rm -f "$tmpfile"' EXIT
fi
tmpdir=`mktemp -d ${TMPDIR:-/tmp}/runtestsXXXXXX`
if test -z "$tmpdir" ; then
echo Error creating temporary directory.
exit 1
else
trap 'rm -f "$tmpfile"; rm -fr "$tmpdir"' EXIT
fi
mkdir -m 500 "$tmpdir"/rosubdir
mkdir -m 700 "$tmpdir"/rwsubdir
trap 'rm -f "$tmpfile"; chmod u+w "$tmpdir"/* ; rm -fr "$tmpdir"' EXIT
unset DBUS_SESSION_BUS_ADDRESS
eval `dbus-launch --sh-syntax`
if test -z "$DBUS_SESSION_BUS_ADDRESS" ; then
echo Error launching session bus.
exit 1
else
trap 'rm -f "$tmpfile"; chmod u+w "$tmpdir"/* ; rm -fr "$tmpdir"; kill "$DBUS_SESSION_BUS_PID"' EXIT
fi
srcdir=${srcdir:-`pwd`}
pushd "$srcdir" > /dev/null
srcdir=`pwd`
popd > /dev/null
builddir=${builddir:-`pwd`}
pushd "$builddir" > /dev/null
builddir=`pwd`
popd > /dev/null
toolsdir=${toolsdir:-${builddir}/tools}
export builddir
export srcdir
export toolsdir
export tmpdir
cd "$builddir"
CERTMONGER_CONFIG_DIR=${srcdir}
export CERTMONGER_CONFIG_DIR
stat=0
subdirs=
if test $# -eq 0 ; then
subdirs=`cd "$srcdir"; ls -1 | grep '^[0-9]'`
fi
for testid in "$@" $subdirs ; do
if test -x "$srcdir"/"$testid"/run.sh ; then
mkdir -p "$builddir"/"$testid"
pushd "$srcdir"/"$testid" > /dev/null
rm -fr "$tmpdir"/*
mkdir -m 500 "$tmpdir"/rosubdir
mkdir -m 700 "$tmpdir"/rwsubdir
if test -r ./expected.out ; then
echo -n "Running test "$testid"... "
./run.sh "$tmpdir" > "$tmpfile" 2> "$tmpdir"/errors
sed -i "s|${TMPDIR:-/tmp}/runtests....../|\${tmpdir}/|g" "$tmpfile" "$tmpdir/errors"
stat=1
for i in expected.out* ; do
if ! test -s "$i" ; then
break
fi
if cmp -s "$tmpfile" "$i" 2> /dev/null ; then
stat=0
echo "OK"
cp $tmpfile "$builddir"/"$testid"/actual.out
cp "$tmpdir"/errors "$builddir"/"$testid"/actual.err
break
fi
done
if test $stat -eq 1 ; then
echo "FAIL"
diff -u expected.out "$tmpfile" | sed s,"^\+\+\+ $tmpfile","+++ actual",g
cp $tmpfile "$builddir"/"$testid"/actual.out
cp "$tmpdir"/errors "$builddir"/"$testid"/actual.err
fi
else
echo "Running test "$testid"."
./run.sh "$tmpdir"
stat=$?
fi
for i in "$tmpdir"/core* ; do
if test -s "$i"; then
cp "$i" .
fi
done
popd > /dev/null
if test $stat -ne 0 ; then
break
fi
else
echo "No test defined in "$testid", skipping."
fi
done
exit $stat
certmonger-0.74/tests/Makefile.am 0000664 0001750 0001750 00000007444 12317265222 013745 0000000 0000000 SUBDIRS = tools
EXTRA_DIST = \
run-tests.sh functions certmonger.conf \
001-keyiread/run.sh \
001-keyiread/expected.out \
001-keyiread-rsa/run.sh \
001-keyiread-rsa/expected.out \
001-keyiread-dsa/run.sh \
001-keyiread-dsa/expected.out \
001-keyiread-ec/run.sh \
001-keyiread-ec/expected.out \
001-keyiread-ec/expected.out.2 \
001-keyiread-ec/expected.out.3 \
001-keyiread-ec/expected.out.4 \
002-keygen/run.sh \
002-keygen/expected.out \
002-keygen-rsa/run.sh \
002-keygen-rsa/expected.out \
002-keygen-dsa/run.sh \
002-keygen-dsa/expected.out \
002-keygen-ec/run.sh \
002-keygen-ec/expected.out \
002-keygen-ec/expected.out.2 \
002-keygen-ec/expected.out.3 \
002-keygen-ec/expected.out.4 \
003-csrgen/run.sh \
003-csrgen/expected.out \
003-csrgen-rsa/run.sh \
003-csrgen-rsa/expected.out \
003-csrgen-dsa/run.sh \
003-csrgen-dsa/expected.out \
003-csrgen-ec/run.sh \
003-csrgen-ec/expected.out \
004-selfsign/run.sh \
004-selfsign/expected.out \
004-selfsign-rsa/run.sh \
004-selfsign-rsa/expected.out \
004-selfsign-dsa/run.sh \
004-selfsign-dsa/expected.out \
004-selfsign-ec/run.sh \
004-selfsign-ec/expected.out \
005-dbusm/run.sh \
005-dbusm/expected.out \
006-serial/run.sh \
006-serial/expected.out \
007-certsave/run.sh \
007-certsave/expected.out \
007-certsave-dbm/run.sh \
007-certsave-dbm/expected.out \
007-certsave-sql/run.sh \
007-certsave-sql/expected.out \
008-certread/run.sh \
008-certread/expected.out \
009-oiddict/run.sh \
009-oiddict/expected.out \
010-iterate/run.sh \
010-iterate/expected.out \
011-dbinit/expected.out \
011-dbinit/run.sh \
011-dbinit-dbm/expected.out \
011-dbinit-dbm/run.sh \
011-dbinit-sql/expected.out \
011-dbinit-sql/run.sh \
012-dbadd/expected.out \
012-dbadd/run.sh \
012-dbadd-dbm/expected.out \
012-dbadd-dbm/run.sh \
012-dbadd-sql/expected.out \
012-dbadd-sql/run.sh \
013-enckey/expected.out \
013-enckey/run.sh \
013-enckey-dbm/expected.out \
013-enckey-dbm/run.sh \
013-enckey-sql/expected.out \
013-enckey-sql/run.sh \
014-prefs/expected.out \
014-prefs/run.sh \
015-lockedkey/expected.out \
015-lockedkey/run.sh \
015-lockedkey-dbm/expected.out \
015-lockedkey-dbm/run.sh \
015-lockedkey-sql/expected.out \
015-lockedkey-sql/run.sh \
016-dates/expected.out \
016-dates/run.sh \
017-notoken/expected.out \
017-notoken/run.sh \
017-notoken-dbm/expected.out \
017-notoken-dbm/run.sh \
017-notoken-sql/expected.out \
017-notoken-sql/run.sh \
018-pembase/expected.out \
018-pembase/run.sh \
019-dparse/expected.out \
019-dparse/run.sh \
019-dparse/good.* \
019-dparse/bad.* \
020-xparse/*.xml \
021-resume/expected.out \
021-resume/run.sh \
022-base64/expected.out \
022-base64/run.sh
subdirs = \
001-keyiread \
001-keyiread-rsa \
002-keygen \
002-keygen-rsa \
003-csrgen \
003-csrgen-rsa \
004-selfsign \
004-selfsign-rsa \
005-dbusm \
006-serial \
007-certsave \
008-certread \
009-oiddict \
010-iterate \
011-dbinit \
012-dbadd \
013-enckey \
014-prefs \
015-lockedkey \
016-dates \
017-notoken \
018-pembase \
019-dparse \
021-resume \
022-base64
if HAVE_DBM_NSSDB
subdirs += \
007-certsave-dbm \
011-dbinit-dbm \
012-dbadd-dbm \
013-enckey-dbm \
015-lockedkey-dbm \
017-notoken-dbm
endif
if HAVE_SQL_NSSDB
subdirs += \
007-certsave-sql \
011-dbinit-sql \
012-dbadd-sql \
013-enckey-sql \
015-lockedkey-sql \
017-notoken-sql
endif
if HAVE_DSA
subdirs += \
001-keyiread-dsa \
002-keygen-dsa \
003-csrgen-dsa \
004-selfsign-dsa
endif
if HAVE_EC
subdirs += \
001-keyiread-ec \
002-keygen-ec \
003-csrgen-ec \
004-selfsign-ec
endif
check: all
for required in certutil pk12util openssl diff cmp mktemp dos2unix unix2dos dbus-launch ; do \
which $$required || exit 1; \
done
env srcdir=$(srcdir) \
builddir=$(top_builddir)/tests \
$(srcdir)/run-tests.sh $(subdirs)
certmonger-0.74/tests/Makefile.in 0000664 0001750 0001750 00000060347 12317265231 013757 0000000 0000000 # Makefile.in generated by automake 1.14.1 from Makefile.am.
# @configure_input@
# Copyright (C) 1994-2013 Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
VPATH = @srcdir@
am__is_gnu_make = test -n '$(MAKEFILE_LIST)' && test -n '$(MAKELEVEL)'
am__make_running_with_option = \
case $${target_option-} in \
?) ;; \
*) echo "am__make_running_with_option: internal error: invalid" \
"target option '$${target_option-}' specified" >&2; \
exit 1;; \
esac; \
has_opt=no; \
sane_makeflags=$$MAKEFLAGS; \
if $(am__is_gnu_make); then \
sane_makeflags=$$MFLAGS; \
else \
case $$MAKEFLAGS in \
*\\[\ \ ]*) \
bs=\\; \
sane_makeflags=`printf '%s\n' "$$MAKEFLAGS" \
| sed "s/$$bs$$bs[$$bs $$bs ]*//g"`;; \
esac; \
fi; \
skip_next=no; \
strip_trailopt () \
{ \
flg=`printf '%s\n' "$$flg" | sed "s/$$1.*$$//"`; \
}; \
for flg in $$sane_makeflags; do \
test $$skip_next = yes && { skip_next=no; continue; }; \
case $$flg in \
*=*|--*) continue;; \
-*I) strip_trailopt 'I'; skip_next=yes;; \
-*I?*) strip_trailopt 'I';; \
-*O) strip_trailopt 'O'; skip_next=yes;; \
-*O?*) strip_trailopt 'O';; \
-*l) strip_trailopt 'l'; skip_next=yes;; \
-*l?*) strip_trailopt 'l';; \
-[dEDm]) skip_next=yes;; \
-[JT]) skip_next=yes;; \
esac; \
case $$flg in \
*$$target_option*) has_opt=yes; break;; \
esac; \
done; \
test $$has_opt = yes
am__make_dryrun = (target_option=n; $(am__make_running_with_option))
am__make_keepgoing = (target_option=k; $(am__make_running_with_option))
pkgdatadir = $(datadir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkglibexecdir = $(libexecdir)/@PACKAGE@
am__cd = CDPATH="$${ZSH_VERSION+.}$(PATH_SEPARATOR)" && cd
install_sh_DATA = $(install_sh) -c -m 644
install_sh_PROGRAM = $(install_sh) -c
install_sh_SCRIPT = $(install_sh) -c
INSTALL_HEADER = $(INSTALL_DATA)
transform = $(program_transform_name)
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
build_triplet = @build@
host_triplet = @host@
@HAVE_DBM_NSSDB_TRUE@am__append_1 = \
@HAVE_DBM_NSSDB_TRUE@ 007-certsave-dbm \
@HAVE_DBM_NSSDB_TRUE@ 011-dbinit-dbm \
@HAVE_DBM_NSSDB_TRUE@ 012-dbadd-dbm \
@HAVE_DBM_NSSDB_TRUE@ 013-enckey-dbm \
@HAVE_DBM_NSSDB_TRUE@ 015-lockedkey-dbm \
@HAVE_DBM_NSSDB_TRUE@ 017-notoken-dbm
@HAVE_SQL_NSSDB_TRUE@am__append_2 = \
@HAVE_SQL_NSSDB_TRUE@ 007-certsave-sql \
@HAVE_SQL_NSSDB_TRUE@ 011-dbinit-sql \
@HAVE_SQL_NSSDB_TRUE@ 012-dbadd-sql \
@HAVE_SQL_NSSDB_TRUE@ 013-enckey-sql \
@HAVE_SQL_NSSDB_TRUE@ 015-lockedkey-sql \
@HAVE_SQL_NSSDB_TRUE@ 017-notoken-sql
@HAVE_DSA_TRUE@am__append_3 = \
@HAVE_DSA_TRUE@ 001-keyiread-dsa \
@HAVE_DSA_TRUE@ 002-keygen-dsa \
@HAVE_DSA_TRUE@ 003-csrgen-dsa \
@HAVE_DSA_TRUE@ 004-selfsign-dsa
@HAVE_EC_TRUE@am__append_4 = \
@HAVE_EC_TRUE@ 001-keyiread-ec \
@HAVE_EC_TRUE@ 002-keygen-ec \
@HAVE_EC_TRUE@ 003-csrgen-ec \
@HAVE_EC_TRUE@ 004-selfsign-ec
subdir = tests
DIST_COMMON = $(srcdir)/Makefile.in $(srcdir)/Makefile.am
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/intlmacosx.m4 \
$(top_srcdir)/m4/lib-ld.m4 $(top_srcdir)/m4/lib-link.m4 \
$(top_srcdir)/m4/lib-prefix.m4 $(top_srcdir)/m4/nls.m4 \
$(top_srcdir)/m4/po.m4 $(top_srcdir)/m4/progtest.m4 \
$(top_srcdir)/configure.ac
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(install_sh) -d
CONFIG_HEADER = $(top_builddir)/src/config.h
CONFIG_CLEAN_FILES =
CONFIG_CLEAN_VPATH_FILES =
AM_V_P = $(am__v_P_@AM_V@)
am__v_P_ = $(am__v_P_@AM_DEFAULT_V@)
am__v_P_0 = false
am__v_P_1 = :
AM_V_GEN = $(am__v_GEN_@AM_V@)
am__v_GEN_ = $(am__v_GEN_@AM_DEFAULT_V@)
am__v_GEN_0 = @echo " GEN " $@;
am__v_GEN_1 =
AM_V_at = $(am__v_at_@AM_V@)
am__v_at_ = $(am__v_at_@AM_DEFAULT_V@)
am__v_at_0 = @
am__v_at_1 =
SOURCES =
DIST_SOURCES =
RECURSIVE_TARGETS = all-recursive check-recursive cscopelist-recursive \
ctags-recursive dvi-recursive html-recursive info-recursive \
install-data-recursive install-dvi-recursive \
install-exec-recursive install-html-recursive \
install-info-recursive install-pdf-recursive \
install-ps-recursive install-recursive installcheck-recursive \
installdirs-recursive pdf-recursive ps-recursive \
tags-recursive uninstall-recursive
am__can_run_installinfo = \
case $$AM_UPDATE_INFO_DIR in \
n|no|NO) false;; \
*) (install-info --version) >/dev/null 2>&1;; \
esac
RECURSIVE_CLEAN_TARGETS = mostlyclean-recursive clean-recursive \
distclean-recursive maintainer-clean-recursive
am__recursive_targets = \
$(RECURSIVE_TARGETS) \
$(RECURSIVE_CLEAN_TARGETS) \
$(am__extra_recursive_targets)
AM_RECURSIVE_TARGETS = $(am__recursive_targets:-recursive=) TAGS CTAGS \
distdir
am__tagged_files = $(HEADERS) $(SOURCES) $(TAGS_FILES) $(LISP)
# Read a list of newline-separated strings from the standard input,
# and print each of them once, without duplicates. Input order is
# *not* preserved.
am__uniquify_input = $(AWK) '\
BEGIN { nonempty = 0; } \
{ items[$$0] = 1; nonempty = 1; } \
END { if (nonempty) { for (i in items) print i; }; } \
'
# Make sure the list of sources is unique. This is necessary because,
# e.g., the same source file might be shared among _SOURCES variables
# for different programs/libraries.
am__define_uniq_tagged_files = \
list='$(am__tagged_files)'; \
unique=`for i in $$list; do \
if test -f "$$i"; then echo $$i; else echo $(srcdir)/$$i; fi; \
done | $(am__uniquify_input)`
ETAGS = etags
CTAGS = ctags
DIST_SUBDIRS = $(SUBDIRS)
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
am__relativize = \
dir0=`pwd`; \
sed_first='s,^\([^/]*\)/.*$$,\1,'; \
sed_rest='s,^[^/]*/*,,'; \
sed_last='s,^.*/\([^/]*\)$$,\1,'; \
sed_butlast='s,/*[^/]*$$,,'; \
while test -n "$$dir1"; do \
first=`echo "$$dir1" | sed -e "$$sed_first"`; \
if test "$$first" != "."; then \
if test "$$first" = ".."; then \
dir2=`echo "$$dir0" | sed -e "$$sed_last"`/"$$dir2"; \
dir0=`echo "$$dir0" | sed -e "$$sed_butlast"`; \
else \
first2=`echo "$$dir2" | sed -e "$$sed_first"`; \
if test "$$first2" = "$$first"; then \
dir2=`echo "$$dir2" | sed -e "$$sed_rest"`; \
else \
dir2="../$$dir2"; \
fi; \
dir0="$$dir0"/"$$first"; \
fi; \
fi; \
dir1=`echo "$$dir1" | sed -e "$$sed_rest"`; \
done; \
reldir="$$dir2"
ACLOCAL = @ACLOCAL@
AMTAR = @AMTAR@
AM_DEFAULT_VERBOSITY = @AM_DEFAULT_VERBOSITY@
AUTOCONF = @AUTOCONF@
AUTOHEADER = @AUTOHEADER@
AUTOMAKE = @AUTOMAKE@
AWK = @AWK@
CC = @CC@
CCDEPMODE = @CCDEPMODE@
CERTMONGER_CFLAGS = @CERTMONGER_CFLAGS@
CERTMONGER_LIBS = @CERTMONGER_LIBS@
CFLAGS = @CFLAGS@
CM_CERTMASTER_CA_NAME = @CM_CERTMASTER_CA_NAME@
CM_DBUS_NAME = @CM_DBUS_NAME@
CM_DEFAULT_CERT_LIFETIME = @CM_DEFAULT_CERT_LIFETIME@
CM_DEFAULT_IDLE_TIMEOUT = @CM_DEFAULT_IDLE_TIMEOUT@
CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY = @CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY@
CM_DEFAULT_POPULATE_UNIQUE_ID = @CM_DEFAULT_POPULATE_UNIQUE_ID@
CM_DEFAULT_PUBKEY_SIZE = @CM_DEFAULT_PUBKEY_SIZE@
CM_DEFAULT_TTL_LIST = @CM_DEFAULT_TTL_LIST@
CM_HOMEDIR = @CM_HOMEDIR@
CM_IPA_CA_NAME = @CM_IPA_CA_NAME@
CM_MINIMUM_DSA_KEY_SIZE = @CM_MINIMUM_DSA_KEY_SIZE@
CM_MINIMUM_EC_KEY_SIZE = @CM_MINIMUM_EC_KEY_SIZE@
CM_MINIMUM_RSA_KEY_SIZE = @CM_MINIMUM_RSA_KEY_SIZE@
CM_NOTIFICATION_ENV = @CM_NOTIFICATION_ENV@
CM_SELF_SIGN_CA_NAME = @CM_SELF_SIGN_CA_NAME@
CM_STORE_CAS_DIRECTORY = @CM_STORE_CAS_DIRECTORY@
CM_STORE_CAS_DIRECTORY_ENV = @CM_STORE_CAS_DIRECTORY_ENV@
CM_STORE_CONFIG_DIRECTORY_ENV = @CM_STORE_CONFIG_DIRECTORY_ENV@
CM_STORE_REQUESTS_DIRECTORY = @CM_STORE_REQUESTS_DIRECTORY@
CM_STORE_REQUESTS_DIRECTORY_ENV = @CM_STORE_REQUESTS_DIRECTORY_ENV@
CM_TMPDIR = @CM_TMPDIR@
CM_TMPDIR_ENV = @CM_TMPDIR_ENV@
CPP = @CPP@
CPPFLAGS = @CPPFLAGS@
CURL_CFLAGS = @CURL_CFLAGS@
CURL_LIBS = @CURL_LIBS@
CYGPATH_W = @CYGPATH_W@
DBUS_CFLAGS = @DBUS_CFLAGS@
DBUS_LIBS = @DBUS_LIBS@
DEFS = @DEFS@
DEPDIR = @DEPDIR@
ECHO_C = @ECHO_C@
ECHO_N = @ECHO_N@
ECHO_T = @ECHO_T@
EGREP = @EGREP@
EXEEXT = @EXEEXT@
GETCERT_CFLAGS = @GETCERT_CFLAGS@
GETCERT_LIBS = @GETCERT_LIBS@
GETTEXT_MACRO_VERSION = @GETTEXT_MACRO_VERSION@
GMSGFMT = @GMSGFMT@
GMSGFMT_015 = @GMSGFMT_015@
GREP = @GREP@
INSTALL = @INSTALL@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INTLLIBS = @INTLLIBS@
INTL_MACOSX_LIBS = @INTL_MACOSX_LIBS@
KRB5_CFLAGS = @KRB5_CFLAGS@
KRB5_CONFIG = @KRB5_CONFIG@
KRB5_LIBS = @KRB5_LIBS@
LDFLAGS = @LDFLAGS@
LIBICONV = @LIBICONV@
LIBINTL = @LIBINTL@
LIBOBJS = @LIBOBJS@
LIBS = @LIBS@
LTLIBICONV = @LTLIBICONV@
LTLIBINTL = @LTLIBINTL@
LTLIBOBJS = @LTLIBOBJS@
MAINT = @MAINT@
MAKEINFO = @MAKEINFO@
MAN_DSA = @MAN_DSA@
MAN_EC = @MAN_EC@
MKDIR_P = @MKDIR_P@
MSGFMT = @MSGFMT@
MSGFMT_015 = @MSGFMT_015@
MSGMERGE = @MSGMERGE@
NO_MAN_DSA = @NO_MAN_DSA@
NO_MAN_EC = @NO_MAN_EC@
NSS_CFLAGS = @NSS_CFLAGS@
NSS_LIBS = @NSS_LIBS@
OBJEXT = @OBJEXT@
OPENSSL_CFLAGS = @OPENSSL_CFLAGS@
OPENSSL_LIBS = @OPENSSL_LIBS@
OPENSSL_SSL_CFLAGS = @OPENSSL_SSL_CFLAGS@
OPENSSL_SSL_LIBS = @OPENSSL_SSL_LIBS@
PACKAGE = @PACKAGE@
PACKAGE_BUGREPORT = @PACKAGE_BUGREPORT@
PACKAGE_NAME = @PACKAGE_NAME@
PACKAGE_STRING = @PACKAGE_STRING@
PACKAGE_TARNAME = @PACKAGE_TARNAME@
PACKAGE_URL = @PACKAGE_URL@
PACKAGE_VERSION = @PACKAGE_VERSION@
PATH_SEPARATOR = @PATH_SEPARATOR@
PKG_CONFIG = @PKG_CONFIG@
PKG_CONFIG_LIBDIR = @PKG_CONFIG_LIBDIR@
PKG_CONFIG_PATH = @PKG_CONFIG_PATH@
POSUB = @POSUB@
RANLIB = @RANLIB@
SESSIONBUSSERVICESDIR = @SESSIONBUSSERVICESDIR@
SET_MAKE = @SET_MAKE@
SHELL = @SHELL@
STRIP = @STRIP@
SYSTEMBUSSERVICESDIR = @SYSTEMBUSSERVICESDIR@
SYSTEMD = @SYSTEMD@
SYSTEMDSYSTEMUNITDIR = @SYSTEMDSYSTEMUNITDIR@
SYSVINIT = @SYSVINIT@
TALLOC_CFLAGS = @TALLOC_CFLAGS@
TALLOC_LIBS = @TALLOC_LIBS@
TEVENT_CFLAGS = @TEVENT_CFLAGS@
TEVENT_LIBS = @TEVENT_LIBS@
TMPFILES = @TMPFILES@
USE_NLS = @USE_NLS@
UUID_CFLAGS = @UUID_CFLAGS@
UUID_LIBS = @UUID_LIBS@
VERSION = @VERSION@
XGETTEXT = @XGETTEXT@
XGETTEXT_015 = @XGETTEXT_015@
XGETTEXT_EXTRA_OPTIONS = @XGETTEXT_EXTRA_OPTIONS@
XMLRPC_CFLAGS = @XMLRPC_CFLAGS@
XMLRPC_C_CONFIG = @XMLRPC_C_CONFIG@
XMLRPC_LIBS = @XMLRPC_LIBS@
XML_CFLAGS = @XML_CFLAGS@
XML_LIBS = @XML_LIBS@
abs_builddir = @abs_builddir@
abs_srcdir = @abs_srcdir@
abs_top_builddir = @abs_top_builddir@
abs_top_srcdir = @abs_top_srcdir@
ac_ct_CC = @ac_ct_CC@
am__include = @am__include@
am__leading_dot = @am__leading_dot@
am__quote = @am__quote@
am__tar = @am__tar@
am__untar = @am__untar@
bindir = @bindir@
build = @build@
build_alias = @build_alias@
build_cpu = @build_cpu@
build_os = @build_os@
build_vendor = @build_vendor@
builddir = @builddir@
datadir = @datadir@
datarootdir = @datarootdir@
docdir = @docdir@
dvidir = @dvidir@
exec_prefix = @exec_prefix@
host = @host@
host_alias = @host_alias@
host_cpu = @host_cpu@
host_os = @host_os@
host_vendor = @host_vendor@
htmldir = @htmldir@
includedir = @includedir@
infodir = @infodir@
install_sh = @install_sh@
libdir = @libdir@
libexecdir = @libexecdir@
localedir = @localedir@
localstatedir = @localstatedir@
mandir = @mandir@
mkdir_p = @mkdir_p@
mylibexecdir = @mylibexecdir@
mysbindir = @mysbindir@
oldincludedir = @oldincludedir@
pdfdir = @pdfdir@
prefix = @prefix@
program_transform_name = @program_transform_name@
psdir = @psdir@
sbindir = @sbindir@
sharedstatedir = @sharedstatedir@
srcdir = @srcdir@
sysconfdir = @sysconfdir@
target_alias = @target_alias@
top_build_prefix = @top_build_prefix@
top_builddir = @top_builddir@
top_srcdir = @top_srcdir@
SUBDIRS = tools
EXTRA_DIST = \
run-tests.sh functions certmonger.conf \
001-keyiread/run.sh \
001-keyiread/expected.out \
001-keyiread-rsa/run.sh \
001-keyiread-rsa/expected.out \
001-keyiread-dsa/run.sh \
001-keyiread-dsa/expected.out \
001-keyiread-ec/run.sh \
001-keyiread-ec/expected.out \
001-keyiread-ec/expected.out.2 \
001-keyiread-ec/expected.out.3 \
001-keyiread-ec/expected.out.4 \
002-keygen/run.sh \
002-keygen/expected.out \
002-keygen-rsa/run.sh \
002-keygen-rsa/expected.out \
002-keygen-dsa/run.sh \
002-keygen-dsa/expected.out \
002-keygen-ec/run.sh \
002-keygen-ec/expected.out \
002-keygen-ec/expected.out.2 \
002-keygen-ec/expected.out.3 \
002-keygen-ec/expected.out.4 \
003-csrgen/run.sh \
003-csrgen/expected.out \
003-csrgen-rsa/run.sh \
003-csrgen-rsa/expected.out \
003-csrgen-dsa/run.sh \
003-csrgen-dsa/expected.out \
003-csrgen-ec/run.sh \
003-csrgen-ec/expected.out \
004-selfsign/run.sh \
004-selfsign/expected.out \
004-selfsign-rsa/run.sh \
004-selfsign-rsa/expected.out \
004-selfsign-dsa/run.sh \
004-selfsign-dsa/expected.out \
004-selfsign-ec/run.sh \
004-selfsign-ec/expected.out \
005-dbusm/run.sh \
005-dbusm/expected.out \
006-serial/run.sh \
006-serial/expected.out \
007-certsave/run.sh \
007-certsave/expected.out \
007-certsave-dbm/run.sh \
007-certsave-dbm/expected.out \
007-certsave-sql/run.sh \
007-certsave-sql/expected.out \
008-certread/run.sh \
008-certread/expected.out \
009-oiddict/run.sh \
009-oiddict/expected.out \
010-iterate/run.sh \
010-iterate/expected.out \
011-dbinit/expected.out \
011-dbinit/run.sh \
011-dbinit-dbm/expected.out \
011-dbinit-dbm/run.sh \
011-dbinit-sql/expected.out \
011-dbinit-sql/run.sh \
012-dbadd/expected.out \
012-dbadd/run.sh \
012-dbadd-dbm/expected.out \
012-dbadd-dbm/run.sh \
012-dbadd-sql/expected.out \
012-dbadd-sql/run.sh \
013-enckey/expected.out \
013-enckey/run.sh \
013-enckey-dbm/expected.out \
013-enckey-dbm/run.sh \
013-enckey-sql/expected.out \
013-enckey-sql/run.sh \
014-prefs/expected.out \
014-prefs/run.sh \
015-lockedkey/expected.out \
015-lockedkey/run.sh \
015-lockedkey-dbm/expected.out \
015-lockedkey-dbm/run.sh \
015-lockedkey-sql/expected.out \
015-lockedkey-sql/run.sh \
016-dates/expected.out \
016-dates/run.sh \
017-notoken/expected.out \
017-notoken/run.sh \
017-notoken-dbm/expected.out \
017-notoken-dbm/run.sh \
017-notoken-sql/expected.out \
017-notoken-sql/run.sh \
018-pembase/expected.out \
018-pembase/run.sh \
019-dparse/expected.out \
019-dparse/run.sh \
019-dparse/good.* \
019-dparse/bad.* \
020-xparse/*.xml \
021-resume/expected.out \
021-resume/run.sh \
022-base64/expected.out \
022-base64/run.sh
subdirs = 001-keyiread 001-keyiread-rsa 002-keygen 002-keygen-rsa \
003-csrgen 003-csrgen-rsa 004-selfsign 004-selfsign-rsa \
005-dbusm 006-serial 007-certsave 008-certread 009-oiddict \
010-iterate 011-dbinit 012-dbadd 013-enckey 014-prefs \
015-lockedkey 016-dates 017-notoken 018-pembase 019-dparse \
021-resume 022-base64 $(am__append_1) $(am__append_2) \
$(am__append_3) $(am__append_4)
all: all-recursive
.SUFFIXES:
$(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__configure_deps)
@for dep in $?; do \
case '$(am__configure_deps)' in \
*$$dep*) \
( cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh ) \
&& { if test -f $@; then exit 0; else break; fi; }; \
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign tests/Makefile'; \
$(am__cd) $(top_srcdir) && \
$(AUTOMAKE) --foreign tests/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \
*config.status*) \
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh;; \
*) \
echo ' cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe)'; \
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe);; \
esac;
$(top_builddir)/config.status: $(top_srcdir)/configure $(CONFIG_STATUS_DEPENDENCIES)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(top_srcdir)/configure: @MAINTAINER_MODE_TRUE@ $(am__configure_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(ACLOCAL_M4): @MAINTAINER_MODE_TRUE@ $(am__aclocal_m4_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(am__aclocal_m4_deps):
# This directory's subdirectories are mostly independent; you can cd
# into them and run 'make' without going through this Makefile.
# To change the values of 'make' variables: instead of editing Makefiles,
# (1) if the variable is set in 'config.status', edit 'config.status'
# (which will cause the Makefiles to be regenerated when you run 'make');
# (2) otherwise, pass the desired values on the 'make' command line.
$(am__recursive_targets):
@fail=; \
if $(am__make_keepgoing); then \
failcom='fail=yes'; \
else \
failcom='exit 1'; \
fi; \
dot_seen=no; \
target=`echo $@ | sed s/-recursive//`; \
case "$@" in \
distclean-* | maintainer-clean-*) list='$(DIST_SUBDIRS)' ;; \
*) list='$(SUBDIRS)' ;; \
esac; \
for subdir in $$list; do \
echo "Making $$target in $$subdir"; \
if test "$$subdir" = "."; then \
dot_seen=yes; \
local_target="$$target-am"; \
else \
local_target="$$target"; \
fi; \
($(am__cd) $$subdir && $(MAKE) $(AM_MAKEFLAGS) $$local_target) \
|| eval $$failcom; \
done; \
if test "$$dot_seen" = "no"; then \
$(MAKE) $(AM_MAKEFLAGS) "$$target-am" || exit 1; \
fi; test -z "$$fail"
ID: $(am__tagged_files)
$(am__define_uniq_tagged_files); mkid -fID $$unique
tags: tags-recursive
TAGS: tags
tags-am: $(TAGS_DEPENDENCIES) $(am__tagged_files)
set x; \
here=`pwd`; \
if ($(ETAGS) --etags-include --version) >/dev/null 2>&1; then \
include_option=--etags-include; \
empty_fix=.; \
else \
include_option=--include; \
empty_fix=; \
fi; \
list='$(SUBDIRS)'; for subdir in $$list; do \
if test "$$subdir" = .; then :; else \
test ! -f $$subdir/TAGS || \
set "$$@" "$$include_option=$$here/$$subdir/TAGS"; \
fi; \
done; \
$(am__define_uniq_tagged_files); \
shift; \
if test -z "$(ETAGS_ARGS)$$*$$unique"; then :; else \
test -n "$$unique" || unique=$$empty_fix; \
if test $$# -gt 0; then \
$(ETAGS) $(ETAGSFLAGS) $(AM_ETAGSFLAGS) $(ETAGS_ARGS) \
"$$@" $$unique; \
else \
$(ETAGS) $(ETAGSFLAGS) $(AM_ETAGSFLAGS) $(ETAGS_ARGS) \
$$unique; \
fi; \
fi
ctags: ctags-recursive
CTAGS: ctags
ctags-am: $(TAGS_DEPENDENCIES) $(am__tagged_files)
$(am__define_uniq_tagged_files); \
test -z "$(CTAGS_ARGS)$$unique" \
|| $(CTAGS) $(CTAGSFLAGS) $(AM_CTAGSFLAGS) $(CTAGS_ARGS) \
$$unique
GTAGS:
here=`$(am__cd) $(top_builddir) && pwd` \
&& $(am__cd) $(top_srcdir) \
&& gtags -i $(GTAGS_ARGS) "$$here"
cscopelist: cscopelist-recursive
cscopelist-am: $(am__tagged_files)
list='$(am__tagged_files)'; \
case "$(srcdir)" in \
[\\/]* | ?:[\\/]*) sdir="$(srcdir)" ;; \
*) sdir=$(subdir)/$(srcdir) ;; \
esac; \
for i in $$list; do \
if test -f "$$i"; then \
echo "$(subdir)/$$i"; \
else \
echo "$$sdir/$$i"; \
fi; \
done >> $(top_builddir)/cscope.files
distclean-tags:
-rm -f TAGS ID GTAGS GRTAGS GSYMS GPATH tags
distdir: $(DISTFILES)
@srcdirstrip=`echo "$(srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
topsrcdirstrip=`echo "$(top_srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
list='$(DISTFILES)'; \
dist_files=`for file in $$list; do echo $$file; done | \
sed -e "s|^$$srcdirstrip/||;t" \
-e "s|^$$topsrcdirstrip/|$(top_builddir)/|;t"`; \
case $$dist_files in \
*/*) $(MKDIR_P) `echo "$$dist_files" | \
sed '/\//!d;s|^|$(distdir)/|;s,/[^/]*$$,,' | \
sort -u` ;; \
esac; \
for file in $$dist_files; do \
if test -f $$file || test -d $$file; then d=.; else d=$(srcdir); fi; \
if test -d $$d/$$file; then \
dir=`echo "/$$file" | sed -e 's,/[^/]*$$,,'`; \
if test -d "$(distdir)/$$file"; then \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
if test -d $(srcdir)/$$file && test $$d != $(srcdir); then \
cp -fpR $(srcdir)/$$file "$(distdir)$$dir" || exit 1; \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
cp -fpR $$d/$$file "$(distdir)$$dir" || exit 1; \
else \
test -f "$(distdir)/$$file" \
|| cp -p $$d/$$file "$(distdir)/$$file" \
|| exit 1; \
fi; \
done
@list='$(DIST_SUBDIRS)'; for subdir in $$list; do \
if test "$$subdir" = .; then :; else \
$(am__make_dryrun) \
|| test -d "$(distdir)/$$subdir" \
|| $(MKDIR_P) "$(distdir)/$$subdir" \
|| exit 1; \
dir1=$$subdir; dir2="$(distdir)/$$subdir"; \
$(am__relativize); \
new_distdir=$$reldir; \
dir1=$$subdir; dir2="$(top_distdir)"; \
$(am__relativize); \
new_top_distdir=$$reldir; \
echo " (cd $$subdir && $(MAKE) $(AM_MAKEFLAGS) top_distdir="$$new_top_distdir" distdir="$$new_distdir" \\"; \
echo " am__remove_distdir=: am__skip_length_check=: am__skip_mode_fix=: distdir)"; \
($(am__cd) $$subdir && \
$(MAKE) $(AM_MAKEFLAGS) \
top_distdir="$$new_top_distdir" \
distdir="$$new_distdir" \
am__remove_distdir=: \
am__skip_length_check=: \
am__skip_mode_fix=: \
distdir) \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-recursive
all-am: Makefile
installdirs: installdirs-recursive
installdirs-am:
install: install-recursive
install-exec: install-exec-recursive
install-data: install-data-recursive
uninstall: uninstall-recursive
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-recursive
install-strip:
if test -z '$(STRIP)'; then \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
install; \
else \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
"INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'" install; \
fi
mostlyclean-generic:
clean-generic:
distclean-generic:
-test -z "$(CONFIG_CLEAN_FILES)" || rm -f $(CONFIG_CLEAN_FILES)
-test . = "$(srcdir)" || test -z "$(CONFIG_CLEAN_VPATH_FILES)" || rm -f $(CONFIG_CLEAN_VPATH_FILES)
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-recursive
clean-am: clean-generic mostlyclean-am
distclean: distclean-recursive
-rm -f Makefile
distclean-am: clean-am distclean-generic distclean-tags
dvi: dvi-recursive
dvi-am:
html: html-recursive
html-am:
info: info-recursive
info-am:
install-data-am:
install-dvi: install-dvi-recursive
install-dvi-am:
install-exec-am:
install-html: install-html-recursive
install-html-am:
install-info: install-info-recursive
install-info-am:
install-man:
install-pdf: install-pdf-recursive
install-pdf-am:
install-ps: install-ps-recursive
install-ps-am:
installcheck-am:
maintainer-clean: maintainer-clean-recursive
-rm -f Makefile
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-recursive
mostlyclean-am: mostlyclean-generic
pdf: pdf-recursive
pdf-am:
ps: ps-recursive
ps-am:
uninstall-am:
.MAKE: $(am__recursive_targets) install-am install-strip
.PHONY: $(am__recursive_targets) CTAGS GTAGS TAGS all all-am check \
check-am clean clean-generic cscopelist-am ctags ctags-am \
distclean distclean-generic distclean-tags distdir dvi dvi-am \
html html-am info info-am install install-am install-data \
install-data-am install-dvi install-dvi-am install-exec \
install-exec-am install-html install-html-am install-info \
install-info-am install-man install-pdf install-pdf-am \
install-ps install-ps-am install-strip installcheck \
installcheck-am installdirs installdirs-am maintainer-clean \
maintainer-clean-generic mostlyclean mostlyclean-generic pdf \
pdf-am ps ps-am tags tags-am uninstall uninstall-am
check: all
for required in certutil pk12util openssl diff cmp mktemp dos2unix unix2dos dbus-launch ; do \
which $$required || exit 1; \
done
env srcdir=$(srcdir) \
builddir=$(top_builddir)/tests \
$(srcdir)/run-tests.sh $(subdirs)
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:
certmonger-0.74/tests/022-base64/ 0000775 0001750 0001750 00000000000 12317265252 013350 5 0000000 0000000 certmonger-0.74/tests/022-base64/run.sh 0000775 0001750 0001750 00000001745 12317265222 014437 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
middle=40
top=200
for length in `seq $top` ; do
dd if=/dev/urandom bs=1 count=$length of=raw.$length
base64 < raw.$length > encoded1.$length
base64 -d -i < encoded1.$length > decoded1.$length
$toolsdir/base64 -e < raw.$length > encoded2.$length
$toolsdir/base64 -d < encoded2.$length > decoded2.$length
$toolsdir/base64 -d < encoded1.$length > decoded3.$length
if test $length -le $middle ; then
if ! cmp -s $tmpdir/encoded1.$length $tmpdir/encoded2.$length ; then
echo Encodings differ:
od -Ad -t x1c $tmpdir/raw.$length
diff -u $tmpdir/encoded1.$length $tmpdir/encoded2.$length
exit 1
fi
fi
if ! cmp -s $tmpdir/decoded1.$length $tmpdir/decoded2.$length ; then
echo Decodings differ:
diff -u $tmpdir/decoded1.$length $tmpdir/decoded2.$length
exit 1
fi
if ! cmp -s $tmpdir/decoded1.$length $tmpdir/decoded3.$length ; then
echo Decodings differ:
diff -u $tmpdir/decoded1.$length $tmpdir/decoded3.$length
exit 1
fi
done
echo OK.
certmonger-0.74/tests/022-base64/expected.out 0000664 0001750 0001750 00000000004 12317265222 015611 0000000 0000000 OK.
certmonger-0.74/tests/021-resume/ 0000775 0001750 0001750 00000000000 12317265252 013563 5 0000000 0000000 certmonger-0.74/tests/021-resume/run.sh 0000775 0001750 0001750 00000011416 12317265222 014646 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
SAVED_CONFIG_DIR="$CERTMONGER_CONFIG_DIR"
CERTMONGER_CONFIG_DIR=`pwd`
cat > $tmpdir/notify.sh << EOF
#!/bin/sh
echo \$CERTMONGER_NOTIFICATION | sed s@"$tmpdir"@'\$tmpdir'@g
EOF
chmod u+x $tmpdir/notify.sh
cat > certmonger.conf << EOF
[defaults]
notify_ttls = 30s
enroll_ttls = 30s
notification_method=command
notification_destination=$tmpdir/notify.sh
[selfsign]
validity_period = 10y
EOF
cat > ca << EOF
id=SelfSign
ca_type=INTERNAL:SELF
EOF
# Run NEWLY_ADDED first, to get a certificate and key in place. We need to
# check resumption from ALL known last-state values.
for state in \
NEWLY_ADDED \
\
CA_REJECTED \
CA_UNCONFIGURED \
CA_UNREACHABLE \
CA_WORKING \
GENERATING_CSR \
GENERATING_KEY_PAIR \
HAVE_CSR \
HAVE_KEYINFO \
HAVE_KEY_PAIR \
MONITORING \
NEED_CA \
NEED_CSR \
NEED_CSR_GEN_PIN \
NEED_CSR_GEN_TOKEN \
NEED_GUIDANCE \
NEED_KEY_GEN_PERMS \
NEED_KEY_GEN_PIN \
NEED_KEY_GEN_TOKEN \
NEED_KEYINFO \
NEED_KEYINFO_READ_PIN \
NEED_KEYINFO_READ_TOKEN \
NEED_KEY_PAIR \
NEED_TO_NOTIFY_ISSUED_FAILED \
NEED_TO_NOTIFY_ISSUED_SAVED \
NEED_TO_NOTIFY_REJECTION \
NEED_TO_NOTIFY_VALIDITY \
NEED_TO_READ_CERT \
NEED_TO_SAVE_CERT \
NEED_TO_SUBMIT \
NEWLY_ADDED \
NEWLY_ADDED_DECIDING \
NEWLY_ADDED_NEED_KEYINFO_READ_PIN \
NEWLY_ADDED_NEED_KEYINFO_READ_TOKEN \
NEWLY_ADDED_READING_CERT \
NEWLY_ADDED_READING_KEYINFO \
NEWLY_ADDED_START_READING_CERT \
NEWLY_ADDED_START_READING_KEYINFO \
NOTIFYING_ISSUED_FAILED \
NOTIFYING_ISSUED_SAVED \
NOTIFYING_REJECTION \
NOTIFYING_VALIDITY \
POST_SAVED_CERT \
PRE_SAVE_CERT \
READING_CERT \
READING_KEYINFO \
SAVED_CERT \
SAVING_CERT \
NEED_CERTSAVE_PERMS \
START_SAVING_CERT \
SUBMITTING \
; do
cat > entry << EOF
id=Test
ca_name=SelfSign
state=$state
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile
post_certsave_command=sleep 0
post_certsave_uid=$UID
pre_certsave_command=sleep 0
pre_certsave_uid=$UID
csr=-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
EOF
cat > $tmpdir/keyfile << EOF
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----
EOF
echo "["$state"]"
$toolsdir/iterate ca entry "" MONITORING
echo ""
done
CERTMONGER_CONFIG_DIR="$SAVED_CONFIG_DIR"
echo Test complete.
certmonger-0.74/tests/021-resume/expected.out 0000664 0001750 0001750 00000030655 12317265222 016043 0000000 0000000 [NEWLY_ADDED]
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[CA_REJECTED]
CA_REJECTED
-START-
CA_REJECTED
-STUCK- (4:0)
[CA_UNCONFIGURED]
CA_UNCONFIGURED
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[CA_UNREACHABLE]
CA_UNREACHABLE
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[CA_WORKING]
CA_WORKING
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[GENERATING_CSR]
GENERATING_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[GENERATING_KEY_PAIR]
GENERATING_KEY_PAIR
-(RESET)-
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
HAVE_KEY_PAIR
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[HAVE_CSR]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[HAVE_KEYINFO]
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[HAVE_KEY_PAIR]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[MONITORING]
MONITORING
-START-
delay=86400
MONITORING
-STOP-
[NEED_CA]
NEED_CA
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_CSR]
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_CSR_GEN_PIN]
NEED_CSR_GEN_PIN
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_CSR_GEN_TOKEN]
NEED_CSR_GEN_TOKEN
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_GUIDANCE]
NEED_GUIDANCE
-START-
NEED_GUIDANCE
-STUCK- (4:0)
[NEED_KEY_GEN_PERMS]
NEED_KEY_GEN_PERMS
-(RESET)-
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
HAVE_KEY_PAIR
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_KEY_GEN_PIN]
NEED_KEY_GEN_PIN
-(RESET)-
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
HAVE_KEY_PAIR
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_KEY_GEN_TOKEN]
NEED_KEY_GEN_TOKEN
-(RESET)-
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
HAVE_KEY_PAIR
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_KEYINFO]
NEED_KEYINFO
-START-
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_KEYINFO_READ_PIN]
NEED_KEYINFO_READ_PIN
-(RESET)-
NEED_KEYINFO
-START-
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_KEYINFO_READ_TOKEN]
NEED_KEYINFO_READ_TOKEN
-(RESET)-
NEED_KEYINFO
-START-
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_KEY_PAIR]
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
HAVE_KEY_PAIR
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_TO_NOTIFY_ISSUED_FAILED]
NEED_TO_NOTIFY_ISSUED_FAILED
-START-
NOTIFYING_ISSUED_FAILED
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_TO_NOTIFY_ISSUED_SAVED]
NEED_TO_NOTIFY_ISSUED_SAVED
-START-
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_TO_NOTIFY_REJECTION]
NEED_TO_NOTIFY_REJECTION
-START-
NOTIFYING_REJECTION
CA_REJECTED
-STUCK- (4:0)
[NEED_TO_NOTIFY_VALIDITY]
NEED_TO_NOTIFY_VALIDITY
-(RESET)-
MONITORING
-START-
delay=86400
MONITORING
-STOP-
[NEED_TO_READ_CERT]
NEED_TO_READ_CERT
-START-
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_TO_SAVE_CERT]
NEED_TO_SAVE_CERT
-START-
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_TO_SUBMIT]
NEED_TO_SUBMIT
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEWLY_ADDED]
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
MONITORING
-STOP-
[NEWLY_ADDED_DECIDING]
NEWLY_ADDED_DECIDING
-(RESET)-
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
MONITORING
-STOP-
[NEWLY_ADDED_NEED_KEYINFO_READ_PIN]
NEWLY_ADDED_NEED_KEYINFO_READ_PIN
-(RESET)-
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
MONITORING
-STOP-
[NEWLY_ADDED_NEED_KEYINFO_READ_TOKEN]
NEWLY_ADDED_NEED_KEYINFO_READ_TOKEN
-(RESET)-
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
MONITORING
-STOP-
[NEWLY_ADDED_READING_CERT]
NEWLY_ADDED_READING_CERT
-(RESET)-
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
MONITORING
-STOP-
[NEWLY_ADDED_READING_KEYINFO]
NEWLY_ADDED_READING_KEYINFO
-(RESET)-
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
MONITORING
-STOP-
[NEWLY_ADDED_START_READING_CERT]
NEWLY_ADDED_START_READING_CERT
-(RESET)-
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
MONITORING
-STOP-
[NEWLY_ADDED_START_READING_KEYINFO]
NEWLY_ADDED_START_READING_KEYINFO
-(RESET)-
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
MONITORING
-STOP-
[NOTIFYING_ISSUED_FAILED]
NOTIFYING_ISSUED_FAILED
-(RESET)-
NEED_TO_NOTIFY_ISSUED_FAILED
-START-
NOTIFYING_ISSUED_FAILED
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NOTIFYING_ISSUED_SAVED]
NOTIFYING_ISSUED_SAVED
-(RESET)-
NEED_TO_NOTIFY_ISSUED_SAVED
-START-
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NOTIFYING_REJECTION]
NOTIFYING_REJECTION
-(RESET)-
NEED_TO_NOTIFY_REJECTION
-START-
NOTIFYING_REJECTION
CA_REJECTED
-STUCK- (4:0)
[NOTIFYING_VALIDITY]
NOTIFYING_VALIDITY
-(RESET)-
NEED_TO_NOTIFY_VALIDITY
-START-
NOTIFYING_VALIDITY
delay=86400
MONITORING
-STOP-
[POST_SAVED_CERT]
POST_SAVED_CERT
-(RESET)-
SAVED_CERT
-START-
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[PRE_SAVE_CERT]
PRE_SAVE_CERT
-(RESET)-
NEED_TO_SAVE_CERT
-START-
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[READING_CERT]
READING_CERT
-(RESET)-
NEED_TO_READ_CERT
-START-
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[READING_KEYINFO]
READING_KEYINFO
-(RESET)-
NEED_KEYINFO
-START-
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[SAVED_CERT]
SAVED_CERT
-START-
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[SAVING_CERT]
SAVING_CERT
-(RESET)-
NEED_TO_SAVE_CERT
-START-
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[NEED_CERTSAVE_PERMS]
NEED_CERTSAVE_PERMS
-(RESET)-
NEED_TO_SAVE_CERT
-START-
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[START_SAVING_CERT]
START_SAVING_CERT
-(RESET)-
NEED_TO_SAVE_CERT
-START-
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[SUBMITTING]
SUBMITTING
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
PRE_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
POST_SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
Test complete.
certmonger-0.74/tests/020-xparse/ 0000775 0001750 0001750 00000000000 12317265252 013564 5 0000000 0000000 certmonger-0.74/tests/020-xparse/ipa-req.xml 0000664 0001750 0001750 00000002615 12317265222 015565 0000000 0000000 \r\n
\r\n
cert_request\r\n
\r\n
\r\n
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\r\n
\r\n
\r\n
principal\r\n
imap/rapier.bos.redhat.com@BOS.REDHAT.COM\r\n
add\r\n
1\r\n
\r\n
\r\n
\r\n
certmonger-0.74/tests/020-xparse/ipa-rep-new.xml 0000664 0001750 0001750 00000005067 12317265222 016357 0000000 0000000 \n
\n
\n
\n
\n
\n
result\n
\n
\n
certificate\n
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\n
\n
\n
issuer\n
CN=Certificate Authority,O=BOS.REDHAT.COM\n
\n
\n
valid_not_before\n
Thu Jun 28 20:34:12 2012 UTC\n
\n
\n
valid_not_after\n
Sun Jun 29 20:34:12 2014 UTC\n
\n
\n
request_id\n
30\n
\n
\n
serial_number\n
19\n
\n
\n
md5_fingerprint\n
95:2a:e3:78:75:40:aa:0a:8f:21:1b:76:0e:91:a3:f4\n
\n
\n
serial_number_hex\n
0x13\n
\n
\n
sha1_fingerprint\n
f0:1e:8e:df:8e:39:dd:67:77:98:53:98:95:8f:4b:27:2d:01:4d:11\n
\n
\n
subject\n
CN=rapier.bos.redhat.com,O=BOS.REDHAT.COM\n
\n
\n
\n
\n
\n
\n
\n
certmonger-0.74/tests/020-xparse/ipa-fault.xml 0000664 0001750 0001750 00000000571 12317265222 016110 0000000 0000000 \n
\n
\n
\n
\n
faultCode\n
4005\n
\n
\n
faultString\n
The realm for the principal does not match the realm for this IPA server\n
\n
\n
\n
\n
certmonger-0.74/tests/020-xparse/certmaster-req.xml 0000664 0001750 0001750 00000002270 12317265222 017162 0000000 0000000 \r\n
\r\n
wait_for_cert\r\n
\r\n
-----BEGIN CERTIFICATE REQUEST-----\n
MIICmTCCAYECAQAwVDELMAkGA1UEBhMCWFgxFTATBgNVBAcMDERlZmF1bHQgQ2l0\n
eTEcMBoGA1UECgwTRGVmYXVsdCBDb21wYW55IEx0ZDEQMA4GA1UEAwwHcGlsbGJv\n
eDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANYPXyUy/pnengaPFx4L\n
kI7BgFVM8e6mMfRXkmoduOTDJrHli7TwlK3azrsp5Ydxo7M/NP9Uf/tT3rtDBex+\n
2Tw1YkANR8owsFcxhYxmUac7cQNQWZoeTlF6F/Im/5CXo0s/PQo2DrHTRzBSWzTR\n
7fnoQ1aXSXXlSL30Bz3trFl9kp9Dvw6FyQTot3qc9gWPzb+THw5tlG+7bbd6gZn8\n
AwWhBc11kragvjcLaOC94YeW//rcgJq/c1180z4TQCqx+nCZWr8tsfPyliU2Wcns\n
eJ58O3Sq3SdI2j5Ol1427bf6UpTMgbieAQD1EcvcRzZ+n/fGFSKqoa/Z8mpOnIac\n
YhsCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4IBAQBbhv9TESHRQNF/JIMTzjvtaQb5\n
yh/Vy0+uLY2OcvD05+vAYYfbHYXQbqC30MbsHTRMJtR5TyF9Ow+1CTHpEgUmuSQN\n
iiGMGH1D1tYmCxZU3vdtpxtyg7DhB7dYmbco0VCkcG3od36NyWobwTUOycW6/ffY\n
JoLvI/pWB4+G8Fi9CiSXPv8nVO4Gy/7GSglo95wt2YD05QdzgbFTphvw74FvY3YC\n
//TmUBtMV9QNGIJOEWeGFo6rSp009VCqJvqjn8484Tp0is1KOKSD6rN/qDFhZjqR\n
T2Hb1euQWUtde1987Yx9c2gK8LgQAdp68yzt+hTc45/IAtTlJbFiGj25O2+B\n
-----END CERTIFICATE REQUEST-----\n
\r\n
\r\n
\r\n
certmonger-0.74/tests/020-xparse/certmaster-rep2.xml 0000664 0001750 0001750 00000005644 12317265222 017253 0000000 0000000 \n
\n
\n
\n
\n
1\n
-----BEGIN CERTIFICATE-----\n
MIIDdzCCAl+gAwIBAgIBAjANBgkqhkiG9w0BAQUFADCBmjELMAkGA1UEBhMCVU4x\n
CzAJBgNVBAgTAkZDMRgwFgYDVQQHEw9DZXJ0bWFzdGVyLXRvd24xEzARBgNVBAoT\n
CmNlcnRtYXN0ZXIxEjAQBgNVBAsTCXNsYXZlLWtleTEXMBUGA1UEAxMOcGlsbGJv\n
eC1DQS1LRVkxIjAgBgkqhkiG9w0BCQEWE3Jvb3RAcGlsbGJveC1DQS1LRVkwHhcN\n
MTIwNjI4MjEzNjAxWhcNMjIwNjI2MjEzNjAxWjBUMQswCQYDVQQGEwJYWDEVMBMG\n
A1UEBwwMRGVmYXVsdCBDaXR5MRwwGgYDVQQKDBNEZWZhdWx0IENvbXBhbnkgTHRk\n
MRAwDgYDVQQDDAdwaWxsYm94MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC\n
AQEA1g9fJTL+md6eBo8XHguQjsGAVUzx7qYx9FeSah245MMmseWLtPCUrdrOuynl\n
h3Gjsz80/1R/+1Peu0MF7H7ZPDViQA1HyjCwVzGFjGZRpztxA1BZmh5OUXoX8ib/\n
kJejSz89CjYOsdNHMFJbNNHt+ehDVpdJdeVIvfQHPe2sWX2Sn0O/DoXJBOi3epz2\n
BY/Nv5MfDm2Ub7ttt3qBmfwDBaEFzXWStqC+Nwto4L3hh5b/+tyAmr9zXXzTPhNA\n
KrH6cJlavy2x8/KWJTZZyex4nnw7dKrdJ0jaPk6XXjbtt/pSlMyBuJ4BAPURy9xH\n
Nn6f98YVIqqhr9nyak6chpxiGwIDAQABow0wCzAJBgNVHRMEAjAAMA0GCSqGSIb3\n
DQEBBQUAA4IBAQAQUbrGIbJPngNSLtHjPrXPEwe02fmEppsn68YD3/aCzkPVUfXK\n
cAYtfYBaKjLCyAqKZ+vbSzr7YVP78KsAic4nN3/oPYBIAKFi082gAdrlx7FdmoyV\n
gBvY0Kd/mJSwgDLK+PZp/wIKge5La58Mycd08W4MUov2pqQ/fE9ttuGgABFyP689\n
0nLHAMHxjSheELOAlW0gN4wQ9wRQUj08Sv2G+BtCv2AW6F3Z5G2T3SToj2315n4J\n
aVDvqM54bCRWtcPY09Eq1R0lj+N/2kXJQSrOHqs6rB1WN1RNGm05ALbWiK4blEAy\n
uE0VFNHxlvhSOYhDcru8w3jpiEjdkMSNbPP3\n
-----END CERTIFICATE-----\n
\n
-----BEGIN CERTIFICATE-----\n
MIIDxDCCAqygAwIBAgIBADANBgkqhkiG9w0BAQUFADCBmjELMAkGA1UEBhMCVU4x\n
CzAJBgNVBAgTAkZDMRgwFgYDVQQHEw9DZXJ0bWFzdGVyLXRvd24xEzARBgNVBAoT\n
CmNlcnRtYXN0ZXIxEjAQBgNVBAsTCXNsYXZlLWtleTEXMBUGA1UEAxMOcGlsbGJv\n
eC1DQS1LRVkxIjAgBgkqhkiG9w0BCQEWE3Jvb3RAcGlsbGJveC1DQS1LRVkwHhcN\n
MTEwNDExMTcyODM2WhcNMjEwNDA4MTcyODM2WjCBmjELMAkGA1UEBhMCVU4xCzAJ\n
BgNVBAgTAkZDMRgwFgYDVQQHEw9DZXJ0bWFzdGVyLXRvd24xEzARBgNVBAoTCmNl\n
cnRtYXN0ZXIxEjAQBgNVBAsTCXNsYXZlLWtleTEXMBUGA1UEAxMOcGlsbGJveC1D\n
QS1LRVkxIjAgBgkqhkiG9w0BCQEWE3Jvb3RAcGlsbGJveC1DQS1LRVkwggEiMA0G\n
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwfo2nlmBk5FLuMjxQxP5HS4/GFa2Q\n
oXCvRjjGlTQktAxJieqHQAEwbJJVSxPhTFLgUkM8vgSTM2ASe/FJkmtHxXg3n+iI\n
55P0DB4f2EuvlkqCCKiBNbv1a9H/7+MbB63oXYv7lVOra44HvQn8d328u4KLVVx5\n
WUjW/7oCkEqJeF7W7vpYho2M+jQa2bp9e7qObjleyaQxZaw17Ol+bcZNMkEaI506\n
mMgUAEGWzIJq0NUJXi+MyD4piWBVuxW8qydSp4eRvnYL9xzYYRtu/yejkm0wCOur\n
SJXH1v6/eX7HGcZH16ShZf69ha/g0cKT53W4cF73SiSKNpiRZo/hpt7pAgMBAAGj\n
EzARMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAIa4H0qB0Xxr\n
samX/S5yovawF+pJYpFl2Jidtbycsn+Ujj66HgS1X2sZqDTe9nZeseg0nHuaDuKc\n
kawkV9Jhyr6iRclxNQY/kKhNr870HXXp1www0N8fKuRQj4DCHXxU7qoHaulPAoPY\n
rpzQyGjlFe4g9afMvrN1gJsypYjRM9p6R88sZkgM+J3JMONkE7TQEoLtbxUirNOl\n
SnUcmqauS3+HZpHFnWmvgrcAw9KoDgqyjlYInx/QvrgyN9Jqe/RuSQoME70IZbm3\n
nTB6fRrM8l4FA9rV66zwslxVY53K4xr+ECoelOkP0GI2xhWB8yyg5fZqihiKCYAI\n
OpXl+itr2hs=\n
-----END CERTIFICATE-----\n
\n
\n
\n
\n
\n
certmonger-0.74/tests/020-xparse/certmaster-rep1.xml 0000664 0001750 0001750 00000000410 12317265222 017234 0000000 0000000 \n
\n
\n
\n
\n
0\n
\n
\n
\n
\n
\n
\n
certmonger-0.74/tests/020-xparse/certmaster-fault.xml 0000664 0001750 0001750 00000000562 12317265222 017510 0000000 0000000 \n
\n
\n
\n
\n
faultCode\n
1\n
\n
\n
faultString\n
<type 'exceptions.AttributeError'>:'NoneType' object has no attribute 'replace'\n
\n
\n
\n
\n
certmonger-0.74/tests/019-dparse/ 0000775 0001750 0001750 00000000000 12317265252 013550 5 0000000 0000000 certmonger-0.74/tests/019-dparse/bad.profileSubmit.serial.out-of-range 0000664 0001750 0001750 00000000173 12317265222 022542 0000000 0000000
certmonger-0.74/tests/019-dparse/bad.profileSubmit.serial.invalid 0000664 0001750 0001750 00000000400 12317265222 021656 0000000 0000000
The Certificate System has encountered an unrecoverable error.
Error Message:
java.lang.NumberFormatException: For input string: "B"
Please contact your local administrator for assistance.
certmonger-0.74/tests/019-dparse/bad.profileSubmit.serial.empty 0000664 0001750 0001750 00000000401 12317265222 021367 0000000 0000000
The Certificate System has encountered an unrecoverable error.
Error Message:
java.lang.NumberFormatException: Zero length BigInteger
Please contact your local administrator for assistance.
certmonger-0.74/tests/019-dparse/bad.profileSubmit.csr.subject-mismatch 0000664 0001750 0001750 00000000343 12317265222 023010 0000000 0000000 3Request Rejected - Subject Name Not Matched O=Default Company Ltd,L=Default City,C=XX 13
certmonger-0.74/tests/019-dparse/bad.profileSubmit.csr.empty 0000664 0001750 0001750 00000000202 12317265222 020676 0000000 0000000 1Invalid Request
certmonger-0.74/tests/019-dparse/bad.profileReview.wrong-nssdb 0000664 0001750 0001750 00000000061 12317265222 021216 0000000 0000000 Error 58.
Problem with the local SSL certificate
certmonger-0.74/tests/019-dparse/bad.profileReview.unauthorized-cert 0000664 0001750 0001750 00000000172 12317265222 022432 0000000 0000000
certmonger-0.74/tests/019-dparse/bad.profileReview.no-such-request 0000664 0001750 0001750 00000000171 12317265222 022017 0000000 0000000
certmonger-0.74/tests/019-dparse/bad.profileProcess.not-pending 0000664 0001750 0001750 00000000236 12317265222 021356 0000000 0000000
certmonger-0.74/tests/019-dparse/bad.profileProcess.no-property 0000664 0001750 0001750 00000000464 12317265222 021435 0000000 0000000
certmonger-0.74/tests/019-dparse/bad.profileProcess.no-ca-cert 0000664 0001750 0001750 00000000116 12317265222 021061 0000000 0000000 Error 60.
Peer certificate cannot be authenticated with given CA certificates
certmonger-0.74/tests/019-dparse/bad.profileProcess.no-agent-cert 0000664 0001750 0001750 00000000061 12317265222 021573 0000000 0000000 Error 58.
Problem with the local SSL certificate
certmonger-0.74/tests/019-dparse/bad.profileProcess.bad-property 0000664 0001750 0001750 00000000464 12317265222 021547 0000000 0000000
certmonger-0.74/tests/019-dparse/bad.displayCertFromRequest.rejected 0000664 0001750 0001750 00000000371 12317265222 022402 0000000 0000000 Certificate ManagerRequest ID 17 was not completed.7
certmonger-0.74/tests/019-dparse/bad.displayCertFromRequest.no-such-request 0000664 0001750 0001750 00000000412 12317265222 023653 0000000 0000000 Certificate ManagerRequest ID 19 was not found in the request queue.7
certmonger-0.74/tests/019-dparse/bad.displayCertFromRequest.incomplete 0000664 0001750 0001750 00000000371 12317265222 022754 0000000 0000000 Certificate ManagerRequest ID 14 was not completed.7
certmonger-0.74/tests/019-dparse/bad.checkRequest.nosuch 0000664 0001750 0001750 00000000412 12317265222 020056 0000000 0000000 Certificate ManagerRequest ID 29 was not found in the request queue.7
certmonger-0.74/tests/019-dparse/good.profileSubmit.serial.in-range 0000664 0001750 0001750 00000000256 12317265222 022143 0000000 0000000 2Request Deferred - defer request 12
certmonger-0.74/tests/019-dparse/good.profileReview 0000664 0001750 0001750 00000027406 12317265222 017172 0000000 0000000
certmonger-0.74/tests/019-dparse/good.displayCertFromRequest 0000664 0001750 0001750 00000021474 12317265222 021027 0000000 0000000 http9180rapier.bos.redhat.comrapier.bos.redhat.com11Certificate Manager9180MD2:
2B:E7:39:53:38:28:68:11:65:8A:E3:7B:36:4E:A9:44
MD5:
68:3F:AF:2C:38:37:E8:3E:5A:B5:4E:AE:40:54:2F:12
SHA1:
D2:E1:1C:C4:CD:53:03:2C:62:CC:4F:68:60:52:A3:DC:
2F:2B:64:89
SHA256:
B8:DA:7A:D4:79:75:63:2B:59:D4:C5:B9:61:3C:59:60:
E6:A3:7C:38:EE:55:48:45:CB:B8:91:D0:CB:C7:E6:5F
SHA512:
8F:E1:12:D0:A5:D7:C0:B0:77:D6:56:22:B7:4C:96:D3:
8F:F0:8E:0B:25:8D:48:E5:8F:15:44:44:B0:51:B4:96:
AE:DC:01:B1:EF:34:E5:48:20:CB:31:6B:00:20:3B:F4:
30:1D:86:74:B1:CA:4F:4F:DD:6C:20:2B:75:DB:89:51MIIG3gYJKoZIhvcNAQcCoIIGzzCCBssCAQExADAPBgkqhkiG9w0BBwGgAgQAoIIG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bCertificate:
Data:
Version: v3
Serial Number: 0xB
Signature Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11
Issuer: CN=Certificate Authority,O=BOS.REDHAT.COM
Validity:
Not Before: Monday, June 25, 2012 5:07:12 PM EDT America/New_York
Not After: Saturday, June 25, 2016 5:07:12 PM EDT America/New_York
Subject: CN=Object Signing Cert,O=BOS.REDHAT.COM
Subject Public Key Info:
Algorithm: RSA - 1.2.840.113549.1.1.1
Public Key:
Exponent: 65537
Public Key Modulus: (2048 bits) :
A6:66:8A:94:6F:C8:47:4B:A1:3F:32:6A:E5:8A:64:25:
84:B1:E5:3D:DC:65:25:99:F7:75:ED:0A:F2:F1:D6:0A:
EC:81:A8:CF:6D:98:84:AC:A1:26:07:39:D0:A6:FD:CE:
AF:AD:5C:30:48:C9:27:E4:73:23:8D:6B:09:18:A3:5D:
66:8B:81:9A:50:35:5A:E8:8C:0E:35:85:AF:B5:9E:C4:
65:1D:DF:89:54:96:58:86:E9:54:1D:21:D9:10:32:7F:
6B:8C:6F:96:F3:04:C4:38:F0:B1:95:40:54:C1:40:73:
23:26:77:5C:37:B4:78:22:0D:EC:D0:4B:C2:1E:DE:7D:
96:63:46:09:67:F2:61:FB:68:41:9A:52:E8:36:B4:EA:
A3:DA:78:AE:75:76:59:2C:B3:2D:85:4F:DF:EF:8A:5D:
05:30:FE:11:78:80:90:48:CD:F2:3D:76:6D:AD:99:BF:
99:83:C8:3A:9A:9F:95:83:31:FF:5A:F4:46:C3:C0:C9:
C5:29:4E:FF:48:40:C2:BE:B6:B6:8E:B4:0D:3C:AB:BF:
75:1B:01:BC:67:73:AA:01:09:0E:E3:5A:5A:B9:FF:91:
2C:F6:C2:8A:DB:5B:67:3B:57:D8:CB:82:C6:12:8D:32:
DE:60:80:2E:94:28:9F:23:30:46:F5:B8:AC:01:3F:03
Extensions:
Identifier: Key Usage: - 2.5.29.15
Critical: yes
Key Usage:
Digital Signature
Key CertSign
Identifier: Netscape Certificate Type - 2.16.840.1.113730.1.1
Critical: no
Certificate Usage:
Object Signing
Signature:
Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11
Signature:
9C:C4:47:15:15:76:46:B9:50:5F:7C:2A:CF:4B:8F:86:
3A:F7:2A:22:20:54:58:B3:02:EC:09:86:68:3F:CA:F0:
66:55:B8:6A:9A:ED:13:F7:1A:CF:79:DB:98:52:92:1B:
5A:12:F3:80:D9:FD:DD:F0:9E:F4:81:85:D6:DF:04:B8:
79:F5:81:FD:78:99:D1:64:F4:BC:43:E8:C8:46:48:3D:
55:29:E5:79:04:C9:83:E9:08:9E:05:19:79:60:52:51:
44:9F:00:8E:81:AE:07:5A:14:1E:2E:B3:B8:B4:C9:62:
53:A2:B4:61:FD:37:BA:F4:CD:D4:28:D5:5F:C7:C2:C9:
B0:FB:7F:9C:6D:A7:41:6F:D7:D3:27:49:2C:24:FB:9B:
93:79:DF:9A:43:7F:8B:44:2D:C5:D1:40:05:2F:FF:14:
E9:EC:5E:4E:F3:8A:69:F0:17:B3:D7:88:95:4E:D2:9A:
CE:AB:1E:AB:92:BB:10:A0:AC:45:77:D6:E3:38:F5:15:
EC:12:61:A1:1A:4C:7C:81:AD:CC:30:02:B1:32:05:B7:
64:0B:97:1D:C1:F2:54:56:F3:45:59:7A:DF:62:20:B2:
EB:20:66:4C:24:1B:AE:E7:26:A8:2D:0C:17:17:D1:E2:
A1:F3:C2:90:FD:43:BA:EF:4F:31:4F:DB:F2:7F:0A:BF
FingerPrint
MD2:
2B:E7:39:53:38:28:68:11:65:8A:E3:7B:36:4E:A9:44
MD5:
68:3F:AF:2C:38:37:E8:3E:5A:B5:4E:AE:40:54:2F:12
SHA1:
D2:E1:1C:C4:CD:53:03:2C:62:CC:4F:68:60:52:A3:DC:
2F:2B:64:89
SHA256:
B8:DA:7A:D4:79:75:63:2B:59:D4:C5:B9:61:3C:59:60:
E6:A3:7C:38:EE:55:48:45:CB:B8:91:D0:CB:C7:E6:5F
SHA512:
8F:E1:12:D0:A5:D7:C0:B0:77:D6:56:22:B7:4C:96:D3:
8F:F0:8E:0B:25:8D:48:E5:8F:15:44:44:B0:51:B4:96:
AE:DC:01:B1:EF:34:E5:48:20:CB:31:6B:00:20:3B:F4:
30:1D:86:74:B1:CA:4F:4F:DD:6C:20:2B:75:DB:89:51-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
certmonger-0.74/tests/019-dparse/good.checkRequest.pending 0000664 0001750 0001750 00000000361 12317265222 020410 0000000 0000000 pending134073817122ca1340738171
certmonger-0.74/tests/019-dparse/good.checkRequest.complete 0000664 0001750 0001750 00000005463 12317265222 020604 0000000 0000000 completeMIIG3gYJKoZIhvcNAQcCoIIGzzCCBssCAQExADAPBgkqhkiG9w0BBwGgAgQAoIIG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134073842023ca1340738217c
certmonger-0.74/tests/019-dparse/run.sh 0000775 0001750 0001750 00000001766 12317265222 014642 0000000 0000000 #!/bin/sh -e
count=0
for role in agent end-user ; do
for good in good.profileSubmit* ; do
$toolsdir/dparse submit $role $good
count=`expr $count + 1`
done
for good in good.profileReview* ; do
$toolsdir/dparse review $role $good
count=`expr $count + 1`
done
for good in good.checkRequest* ; do
$toolsdir/dparse check $role $good
count=`expr $count + 1`
done
for good in good.displayCertFromRequest* ; do
$toolsdir/dparse fetch $role $good
count=`expr $count + 1`
done
for bad in bad.profileSubmit* ; do
$toolsdir/dparse submit $role $bad
count=`expr $count + 1`
done
for bad in bad.profileReview* ; do
$toolsdir/dparse review $role $bad
count=`expr $count + 1`
done
for bad in bad.profileProcess* ; do
$toolsdir/dparse approve $role $bad
count=`expr $count + 1`
done
for bad in bad.checkRequest* ; do
$toolsdir/dparse check $role $bad
count=`expr $count + 1`
done
for bad in bad.displayCertFromRequest* ; do
$toolsdir/dparse fetch $role $bad
count=`expr $count + 1`
done
done
echo $count samples.
certmonger-0.74/tests/019-dparse/expected.out 0000664 0001750 0001750 00000021566 12317265222 016031 0000000 0000000 [submit-as-agent(good.profileSubmit.serial.in-range) = WAIT_WITH_DELAY]
error_reason="Request Deferred - defer request",status="2",requestId="12"
0
state=approve&requestId=12
[review-as-agent(good.profileReview) = WAIT_WITH_DELAY]
error="0",status="pending",requestId="17"
0
state=approve&requestId=17
[check-as-agent(good.checkRequest.complete) = WAIT_WITH_DELAY]
status="complete",requestId="23"
0
state=retrieve&requestId=23
[check-as-agent(good.checkRequest.pending) = WAIT_WITH_DELAY]
status="pending",requestId="22"
0
state=approve&requestId=22
[fetch-as-agent(good.displayCertFromRequest) = ISSUED]
requestId="11",cert="-----BEGIN CERTIFICATE-----"
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[submit-as-agent(bad.profileSubmit.csr.empty) = REJECTED]
error_reason="Invalid Request",status="1"
Server at "SUBMIT" replied: Invalid Request
[submit-as-agent(bad.profileSubmit.csr.subject-mismatch) = REJECTED]
error_reason="Request Rejected - Subject Name Not Matched O=Default Company Ltd,L=Default City,C=XX",status="3",requestId="13"
Server at "SUBMIT" replied: Request Rejected - Subject Name Not Matched O=Default Company Ltd,L=Default City,C=XX
[submit-as-agent(bad.profileSubmit.serial.empty) = REJECTED]
[submit-as-agent(bad.profileSubmit.serial.invalid) = REJECTED]
[submit-as-agent(bad.profileSubmit.serial.out-of-range) = REJECTED]
error="1",error_code="Server Internal Error"
Server at "SUBMIT" replied: 1: Server Internal Error
[review-as-agent(bad.profileReview.no-such-request) = REJECTED]
error="1",error_code="Request 0 Not Found"
Server at "REVIEW" replied: 1: Request 0 Not Found
[review-as-agent(bad.profileReview.unauthorized-cert) = REJECTED]
error="1",error_code="Authentication Error"
Server at "REVIEW" replied: 1: Authentication Error
[review-as-agent(bad.profileReview.wrong-nssdb) = REJECTED]
[approve-as-agent(bad.profileProcess.bad-property) = REJECTED]
error="1",error_code="Property Error - Invalid Property notBefore",status="pending",requestId="17"
Server at "APPROVE" replied: 1: Property Error - Invalid Property notBefore
[approve-as-agent(bad.profileProcess.no-agent-cert) = REJECTED]
[approve-as-agent(bad.profileProcess.no-ca-cert) = REJECTED]
[approve-as-agent(bad.profileProcess.no-property) = REJECTED]
error="1",error_code="Property Error - Invalid Property notBefore",status="pending",requestId="17"
Server at "APPROVE" replied: 1: Property Error - Invalid Property notBefore
[approve-as-agent(bad.profileProcess.not-pending) = REJECTED]
error="1",error_code="Request Not In Pending State",requestId="17"
Server at "APPROVE" replied: 1: Request Not In Pending State
[check-as-agent(bad.checkRequest.nosuch) = REJECTED]
error_reason="Request ID 29 was not found in the request queue."
Server at "CHECK" replied: Request ID 29 was not found in the request queue.
[fetch-as-agent(bad.displayCertFromRequest.incomplete) = REJECTED]
error_reason="Request ID 14 was not completed.",status="7"
Server at "FETCH" replied: Request ID 14 was not completed.
[fetch-as-agent(bad.displayCertFromRequest.no-such-request) = REJECTED]
error_reason="Request ID 19 was not found in the request queue.",status="7"
Server at "FETCH" replied: Request ID 19 was not found in the request queue.
[fetch-as-agent(bad.displayCertFromRequest.rejected) = REJECTED]
error_reason="Request ID 17 was not completed.",status="7"
Server at "FETCH" replied: Request ID 17 was not completed.
[submit-as-end-entity(good.profileSubmit.serial.in-range) = WAIT]
error_reason="Request Deferred - defer request",status="2",requestId="12"
state=check&requestId=12
[review-as-end-entity(good.profileReview) = WAIT_WITH_DELAY]
error="0",status="pending",requestId="17"
0
state=approve&requestId=17
[check-as-end-entity(good.checkRequest.complete) = WAIT_WITH_DELAY]
status="complete",requestId="23"
0
state=retrieve&requestId=23
[check-as-end-entity(good.checkRequest.pending) = WAIT]
status="pending",requestId="22"
state=check&requestId=22
[fetch-as-end-entity(good.displayCertFromRequest) = ISSUED]
requestId="11",cert="-----BEGIN CERTIFICATE-----"
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[submit-as-end-entity(bad.profileSubmit.csr.empty) = REJECTED]
error_reason="Invalid Request",status="1"
Server at "SUBMIT" replied: Invalid Request
[submit-as-end-entity(bad.profileSubmit.csr.subject-mismatch) = REJECTED]
error_reason="Request Rejected - Subject Name Not Matched O=Default Company Ltd,L=Default City,C=XX",status="3",requestId="13"
Server at "SUBMIT" replied: Request Rejected - Subject Name Not Matched O=Default Company Ltd,L=Default City,C=XX
[submit-as-end-entity(bad.profileSubmit.serial.empty) = REJECTED]
[submit-as-end-entity(bad.profileSubmit.serial.invalid) = REJECTED]
[submit-as-end-entity(bad.profileSubmit.serial.out-of-range) = REJECTED]
error="1",error_code="Server Internal Error"
Server at "SUBMIT" replied: 1: Server Internal Error
[review-as-end-entity(bad.profileReview.no-such-request) = REJECTED]
error="1",error_code="Request 0 Not Found"
Server at "REVIEW" replied: 1: Request 0 Not Found
[review-as-end-entity(bad.profileReview.unauthorized-cert) = REJECTED]
error="1",error_code="Authentication Error"
Server at "REVIEW" replied: 1: Authentication Error
[review-as-end-entity(bad.profileReview.wrong-nssdb) = REJECTED]
[approve-as-end-entity(bad.profileProcess.bad-property) = REJECTED]
error="1",error_code="Property Error - Invalid Property notBefore",status="pending",requestId="17"
Server at "APPROVE" replied: 1: Property Error - Invalid Property notBefore
[approve-as-end-entity(bad.profileProcess.no-agent-cert) = REJECTED]
[approve-as-end-entity(bad.profileProcess.no-ca-cert) = REJECTED]
[approve-as-end-entity(bad.profileProcess.no-property) = REJECTED]
error="1",error_code="Property Error - Invalid Property notBefore",status="pending",requestId="17"
Server at "APPROVE" replied: 1: Property Error - Invalid Property notBefore
[approve-as-end-entity(bad.profileProcess.not-pending) = REJECTED]
error="1",error_code="Request Not In Pending State",requestId="17"
Server at "APPROVE" replied: 1: Request Not In Pending State
[check-as-end-entity(bad.checkRequest.nosuch) = REJECTED]
error_reason="Request ID 29 was not found in the request queue."
Server at "CHECK" replied: Request ID 29 was not found in the request queue.
[fetch-as-end-entity(bad.displayCertFromRequest.incomplete) = REJECTED]
error_reason="Request ID 14 was not completed.",status="7"
Server at "FETCH" replied: Request ID 14 was not completed.
[fetch-as-end-entity(bad.displayCertFromRequest.no-such-request) = REJECTED]
error_reason="Request ID 19 was not found in the request queue.",status="7"
Server at "FETCH" replied: Request ID 19 was not found in the request queue.
[fetch-as-end-entity(bad.displayCertFromRequest.rejected) = REJECTED]
error_reason="Request ID 17 was not completed.",status="7"
Server at "FETCH" replied: Request ID 17 was not completed.
44 samples.
certmonger-0.74/tests/018-pembase/ 0000775 0001750 0001750 00000000000 12317265252 013705 5 0000000 0000000 certmonger-0.74/tests/018-pembase/run.sh 0000775 0001750 0001750 00000005114 12317265222 014766 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
cat > 1.pem << EOF
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
EOF
cat > 1.b << EOF
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
EOF
echo '['Tests begin.']'
$toolsdir/pem2base < 1.pem > 2.b
$toolsdir/base2pem < 1.b > 2.pem
$toolsdir/pem2base < 2.pem > 3.b
$toolsdir/base2pem < 2.b > 3.pem
$toolsdir/pem2base < 3.pem > 4.b
$toolsdir/pem2base < 4.b > 5.b
unix2dos 1.pem > /dev/null 2> /dev/null
unix2dos 2.pem > /dev/null 2> /dev/null
unix2dos 3.pem > /dev/null 2> /dev/null
unix2dos 1.b > /dev/null 2> /dev/null
unix2dos 2.b > /dev/null 2> /dev/null
unix2dos 3.b > /dev/null 2> /dev/null
unix2dos 4.b > /dev/null 2> /dev/null
unix2dos 5.b > /dev/null 2> /dev/null
$toolsdir/base2pem -u < 4.b > 6.pem
cp 6.pem 6a.pem
unix2dos 6a.pem
$toolsdir/base2pem -d < 4.b > 7.pem
cp 7.pem 7a.pem
dos2unix 7.pem
diff -u 1.pem 2.pem
diff -u 1.pem 3.pem
diff -u 1.b 2.b
diff -u 1.b 3.b
diff -u 1.b 4.b
diff -u 1.b 5.b
diff -u 6.pem 7.pem
diff -u 6a.pem 7a.pem
echo '['Test complete.']'
certmonger-0.74/tests/018-pembase/expected.out 0000664 0001750 0001750 00000000040 12317265222 016146 0000000 0000000 [Tests begin.]
[Test complete.]
certmonger-0.74/tests/017-notoken-sql/ 0000775 0001750 0001750 00000000000 12317265252 014542 5 0000000 0000000 certmonger-0.74/tests/017-notoken-sql/run.sh 0000775 0001750 0001750 00000000067 12317265222 015625 0000000 0000000 #!/bin/sh -e
exec env scheme=sql ../017-notoken/run.sh
certmonger-0.74/tests/017-notoken-sql/expected.out 0000664 0001750 0001750 00000000766 12317265222 017022 0000000 0000000 [Creating database.]
[Generating key (sql) with no token.]
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
NEED_KEY_GEN_TOKEN
-STOP-
state=NEED_KEY_GEN_TOKEN
[Creating database.]
[Reading Key Info (sql) with no token.]
NEED_KEYINFO
-START-
READING_KEYINFO
NEED_KEYINFO_READ_TOKEN
-STOP-
state=NEED_KEYINFO_READ_TOKEN
[Creating database.]
[Generating CSR (sql) with no token.]
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
NEED_CSR_GEN_TOKEN
-STOP-
state=NEED_CSR_GEN_TOKEN
[Test complete.]
certmonger-0.74/tests/017-notoken-dbm/ 0000775 0001750 0001750 00000000000 12317265252 014505 5 0000000 0000000 certmonger-0.74/tests/017-notoken-dbm/run.sh 0000775 0001750 0001750 00000000067 12317265222 015570 0000000 0000000 #!/bin/sh -e
exec env scheme=dbm ../017-notoken/run.sh
certmonger-0.74/tests/017-notoken-dbm/expected.out 0000664 0001750 0001750 00000000766 12317265222 016765 0000000 0000000 [Creating database.]
[Generating key (dbm) with no token.]
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
NEED_KEY_GEN_TOKEN
-STOP-
state=NEED_KEY_GEN_TOKEN
[Creating database.]
[Reading Key Info (dbm) with no token.]
NEED_KEYINFO
-START-
READING_KEYINFO
NEED_KEYINFO_READ_TOKEN
-STOP-
state=NEED_KEYINFO_READ_TOKEN
[Creating database.]
[Generating CSR (dbm) with no token.]
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
NEED_CSR_GEN_TOKEN
-STOP-
state=NEED_CSR_GEN_TOKEN
[Test complete.]
certmonger-0.74/tests/017-notoken/ 0000775 0001750 0001750 00000000000 12317265252 013745 5 0000000 0000000 certmonger-0.74/tests/017-notoken/run.sh 0000775 0001750 0001750 00000003201 12317265222 015021 0000000 0000000 #!/bin/sh
cd "$tmpdir"
source "$srcdir"/functions
size=2048
cat > $tmpdir/ca << EOF
id=Lostie
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-unconfigured
EOF
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
echo '['Creating database.']'
initnssdb "${scheme:+${scheme}:}$tmpdir/${scheme}db" BlahBlah
cat > entry <<- EOF
id=Test
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_token=No Such Token
key_nickname=Test
state=NEED_KEY_PAIR
EOF
echo '['Generating key${scheme:+ \($scheme\)} with no token.']'
$toolsdir/iterate $tmpdir/ca $tmpdir/entry NEED_KEY_PAIR,GENERATING_KEY_PAIR
grep ^state= $tmpdir/entry
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
echo '['Creating database.']'
initnssdb "${scheme:+${scheme}:}$tmpdir/${scheme}db" BlahBlah
cat > entry <<- EOF
id=Test
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_token=No Such Token
key_nickname=Test
state=NEED_KEYINFO
EOF
echo '['Reading Key Info${scheme:+ \($scheme\)} with no token.']'
$toolsdir/iterate $tmpdir/ca $tmpdir/entry NEED_KEYINFO,READING_KEYINFO
grep ^state= $tmpdir/entry
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
echo '['Creating database.']'
initnssdb "${scheme:+${scheme}:}$tmpdir/${scheme}db" BlahBlah
cat > entry <<- EOF
id=Test
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_token=No Such Token
key_nickname=Test
state=NEED_CSR
EOF
echo '['Generating CSR${scheme:+ \($scheme\)} with no token.']'
$toolsdir/iterate $tmpdir/ca $tmpdir/entry NEED_CSR,GENERATING_CSR
grep ^state= $tmpdir/entry
echo '['Test complete.']'
certmonger-0.74/tests/017-notoken/expected.out 0000664 0001750 0001750 00000000744 12317265222 016221 0000000 0000000 [Creating database.]
[Generating key with no token.]
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
NEED_KEY_GEN_TOKEN
-STOP-
state=NEED_KEY_GEN_TOKEN
[Creating database.]
[Reading Key Info with no token.]
NEED_KEYINFO
-START-
READING_KEYINFO
NEED_KEYINFO_READ_TOKEN
-STOP-
state=NEED_KEYINFO_READ_TOKEN
[Creating database.]
[Generating CSR with no token.]
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
NEED_CSR_GEN_TOKEN
-STOP-
state=NEED_CSR_GEN_TOKEN
[Test complete.]
certmonger-0.74/tests/016-dates/ 0000775 0001750 0001750 00000000000 12317265252 013367 5 0000000 0000000 certmonger-0.74/tests/016-dates/run.sh 0000775 0001750 0001750 00000000656 12317265222 014456 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
CERTMONGER_CONFIG_DIR=$tmpdir; export CERTMONGER_CONFIG_DIR
source "$srcdir"/functions
echo '['Tests begin.']'
$toolsdir/dates 1999 1s 30 1m 1h 24h 1d 2w 28d 1M 6M 1y 5y "3y 2M 3d"
$toolsdir/dates 2000 1s 1m 60m 24h 1d 2w 28d 1M 6M 1y 5y "3y 2M 3d"
$toolsdir/dates 2001 1s 1m 60m 1h 1d 2w 28d 1M 6M 1y 5y "3y 2M 3d"
$toolsdir/dates 2008 36h 48h "2w3600" 336h 1080h 14M 1y14M
echo '['Test complete.']'
certmonger-0.74/tests/016-dates/expected.out 0000664 0001750 0001750 00000004264 12317265222 015644 0000000 0000000 [Tests begin.]
1999-01-01 00:00:00 + "1s" = 1999-01-01 00:00:01
1999-01-01 00:00:00 + "30" = 1999-01-01 00:00:30
1999-01-01 00:00:00 + "1m" = 1999-01-01 00:01:00
1999-01-01 00:00:00 + "1h" = 1999-01-01 01:00:00
1999-01-01 00:00:00 + "24h" = 1999-01-02 00:00:00
1999-01-01 00:00:00 + "1d" = 1999-01-02 00:00:00
1999-01-01 00:00:00 + "2w" = 1999-01-15 00:00:00
1999-01-01 00:00:00 + "28d" = 1999-01-29 00:00:00
1999-01-01 00:00:00 + "1M" = 1999-02-01 00:00:00
1999-01-01 00:00:00 + "6M" = 1999-07-01 00:00:00
1999-01-01 00:00:00 + "1y" = 2000-01-01 00:00:00
1999-01-01 00:00:00 + "5y" = 2004-01-01 00:00:00
1999-01-01 00:00:00 + "3y 2M 3d" = 2002-03-04 00:00:00
2000-01-01 00:00:00 + "1s" = 2000-01-01 00:00:01
2000-01-01 00:00:00 + "1m" = 2000-01-01 00:01:00
2000-01-01 00:00:00 + "60m" = 2000-01-01 01:00:00
2000-01-01 00:00:00 + "24h" = 2000-01-02 00:00:00
2000-01-01 00:00:00 + "1d" = 2000-01-02 00:00:00
2000-01-01 00:00:00 + "2w" = 2000-01-15 00:00:00
2000-01-01 00:00:00 + "28d" = 2000-01-29 00:00:00
2000-01-01 00:00:00 + "1M" = 2000-02-01 00:00:00
2000-01-01 00:00:00 + "6M" = 2000-07-01 00:00:00
2000-01-01 00:00:00 + "1y" = 2001-01-01 00:00:00
2000-01-01 00:00:00 + "5y" = 2005-01-01 00:00:00
2000-01-01 00:00:00 + "3y 2M 3d" = 2003-03-04 00:00:00
2001-01-01 00:00:00 + "1s" = 2001-01-01 00:00:01
2001-01-01 00:00:00 + "1m" = 2001-01-01 00:01:00
2001-01-01 00:00:00 + "60m" = 2001-01-01 01:00:00
2001-01-01 00:00:00 + "1h" = 2001-01-01 01:00:00
2001-01-01 00:00:00 + "1d" = 2001-01-02 00:00:00
2001-01-01 00:00:00 + "2w" = 2001-01-15 00:00:00
2001-01-01 00:00:00 + "28d" = 2001-01-29 00:00:00
2001-01-01 00:00:00 + "1M" = 2001-02-01 00:00:00
2001-01-01 00:00:00 + "6M" = 2001-07-01 00:00:00
2001-01-01 00:00:00 + "1y" = 2002-01-01 00:00:00
2001-01-01 00:00:00 + "5y" = 2006-01-01 00:00:00
2001-01-01 00:00:00 + "3y 2M 3d" = 2004-03-04 00:00:00
2008-01-01 00:00:00 + "36h" = 2008-01-02 12:00:00
2008-01-01 00:00:00 + "48h" = 2008-01-03 00:00:00
2008-01-01 00:00:00 + "2w3600" = 2008-01-15 01:00:00
2008-01-01 00:00:00 + "336h" = 2008-01-15 00:00:00
2008-01-01 00:00:00 + "1080h" = 2008-02-15 00:00:00
2008-01-01 00:00:00 + "14M" = 2009-03-01 00:00:00
2008-01-01 00:00:00 + "1y14M" = 2010-03-01 00:00:00
[Test complete.]
certmonger-0.74/tests/015-lockedkey-sql/ 0000775 0001750 0001750 00000000000 12317265252 015035 5 0000000 0000000 certmonger-0.74/tests/015-lockedkey-sql/run.sh 0000775 0001750 0001750 00000000071 12317265222 016113 0000000 0000000 #!/bin/sh -e
exec env scheme=sql ../015-lockedkey/run.sh
certmonger-0.74/tests/015-lockedkey-sql/expected.out 0000664 0001750 0001750 00000005456 12317265222 017316 0000000 0000000 [Generate Key Without PIN.]
OK.
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----
[Try To Read Key Without PIN.]
OK (RSA:2048).
[Retry With Unnecessary PIN File.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Replacing key with an encrypted one.]
[Read Key Info With Bogus PIN Location.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Read Key Info Without PIN.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Retrying With PIN.]
OK (RSA:512).
[Read Key Info Without PIN File.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Retry With PIN File.]
OK (RSA:512).
[Generate Key With PIN.]
OK.
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
[Try To Read Key Without PIN.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Retry With PIN File.]
OK (RSA:2048).
[Generate CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Not pre-creating database.]
[Generating key (sql) without PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Providing Unnecessary PIN.]
[Reading Key Info With Unnecessary PIN.]
Failed to read key "sql:$tmpdir/sqldb":"Test".
(Need PIN.)
< 0> rsa PRIVATE-KEY Test
[Generating CSR With Unnecessary PIN.]
< 0> rsa PRIVATE-KEY Test
[Creating database, without PIN.]
[Generating key (sql) without PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Providing Unnecessary PIN.]
[Reading Key Info With Unnecessary PIN.]
Failed to read key "sql:$tmpdir/sqldb":"Test".
(Need PIN.)
< 0> rsa PRIVATE-KEY Test
[Generating CSR With Unnecessary PIN.]
< 0> rsa PRIVATE-KEY Test
[Not pre-creating database, with PIN.]
[Generating key (sql) with PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Reading Key Info Without PIN.]
Failed to read key "sql:$tmpdir/sqldb":"Test".
(Need PIN.)
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS Certificate DB.: The security password entered is incorrect.
[Reading Key Info With Bogus PIN Location.]
Failed to read key "sql:$tmpdir/sqldb":"Test".
(Need PIN.)
[Reading Key Info With PIN.]
OK (RSA:2048).
[Generating CSR Without PIN.]
[Generating CSR With Bogus PIN Location.]
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Creating database with PIN.]
[Generating key (sql) with PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Reading Key Info Without PIN.]
Failed to read key "sql:$tmpdir/sqldb":"Test".
(Need PIN.)
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS Certificate DB.: The security password entered is incorrect.
[Reading Key Info With Bogus PIN Location.]
Failed to read key "sql:$tmpdir/sqldb":"Test".
(Need PIN.)
[Reading Key Info With PIN.]
OK (RSA:2048).
[Generating CSR Without PIN.]
[Generating CSR With Bogus PIN Location.]
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Test complete.]
certmonger-0.74/tests/015-lockedkey-dbm/ 0000775 0001750 0001750 00000000000 12317265252 015000 5 0000000 0000000 certmonger-0.74/tests/015-lockedkey-dbm/run.sh 0000775 0001750 0001750 00000000071 12317265222 016056 0000000 0000000 #!/bin/sh -e
exec env scheme=dbm ../015-lockedkey/run.sh
certmonger-0.74/tests/015-lockedkey-dbm/expected.out 0000664 0001750 0001750 00000005456 12317265222 017261 0000000 0000000 [Generate Key Without PIN.]
OK.
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----
[Try To Read Key Without PIN.]
OK (RSA:2048).
[Retry With Unnecessary PIN File.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Replacing key with an encrypted one.]
[Read Key Info With Bogus PIN Location.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Read Key Info Without PIN.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Retrying With PIN.]
OK (RSA:512).
[Read Key Info Without PIN File.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Retry With PIN File.]
OK (RSA:512).
[Generate Key With PIN.]
OK.
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
[Try To Read Key Without PIN.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Retry With PIN File.]
OK (RSA:2048).
[Generate CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Not pre-creating database.]
[Generating key (dbm) without PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Providing Unnecessary PIN.]
[Reading Key Info With Unnecessary PIN.]
Failed to read key "dbm:$tmpdir/dbmdb":"Test".
(Need PIN.)
< 0> rsa PRIVATE-KEY Test
[Generating CSR With Unnecessary PIN.]
< 0> rsa PRIVATE-KEY Test
[Creating database, without PIN.]
[Generating key (dbm) without PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Providing Unnecessary PIN.]
[Reading Key Info With Unnecessary PIN.]
Failed to read key "dbm:$tmpdir/dbmdb":"Test".
(Need PIN.)
< 0> rsa PRIVATE-KEY Test
[Generating CSR With Unnecessary PIN.]
< 0> rsa PRIVATE-KEY Test
[Not pre-creating database, with PIN.]
[Generating key (dbm) with PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Reading Key Info Without PIN.]
Failed to read key "dbm:$tmpdir/dbmdb":"Test".
(Need PIN.)
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS Certificate DB.: The security password entered is incorrect.
[Reading Key Info With Bogus PIN Location.]
Failed to read key "dbm:$tmpdir/dbmdb":"Test".
(Need PIN.)
[Reading Key Info With PIN.]
OK (RSA:2048).
[Generating CSR Without PIN.]
[Generating CSR With Bogus PIN Location.]
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Creating database with PIN.]
[Generating key (dbm) with PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Reading Key Info Without PIN.]
Failed to read key "dbm:$tmpdir/dbmdb":"Test".
(Need PIN.)
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS Certificate DB.: The security password entered is incorrect.
[Reading Key Info With Bogus PIN Location.]
Failed to read key "dbm:$tmpdir/dbmdb":"Test".
(Need PIN.)
[Reading Key Info With PIN.]
OK (RSA:2048).
[Generating CSR Without PIN.]
[Generating CSR With Bogus PIN Location.]
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Test complete.]
certmonger-0.74/tests/015-lockedkey/ 0000775 0001750 0001750 00000000000 12317265252 014240 5 0000000 0000000 certmonger-0.74/tests/015-lockedkey/run.sh 0000775 0001750 0001750 00000014644 12317265222 015331 0000000 0000000 #!/bin/sh
cd "$tmpdir"
source "$srcdir"/functions
size=2048
pin=blahblah
echo $pin > pin.txt
echo "" > empty.txt
clean() {
sed -r -e 's|'"$tmpdir"'|$tmpdir|g' -e 's,: SEC_ERROR_[^:]+: ,: ,g' |\
grep -vF 'certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"'
}
echo '['Generate Key Without PIN.']'
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
key_gen_size=$size
EOF
rm -f $tmpdir/keyfile
$toolsdir/keygen entry | clean
egrep '(: |PRIVATE)' $tmpdir/keyfile
echo '['Try To Read Key Without PIN.']'
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
key_gen_size=$size
EOF
$toolsdir/keyiread entry | clean
echo '['Retry With Unnecessary PIN File.']'
echo key_pin_file=$tmpdir/pin.txt >> entry
$toolsdir/keyiread entry | clean
echo '['Replacing key with an encrypted one.']'
cat > keyfile <<- EOF
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,6D45AA0F810E9C67
4PkG3RcN8x3s5B1QlpCnfRouU5cR1Ws6lUTClbxqJwLtnJQb5gfvJmOCVft3guKE
UYfYbwsE1xiz1SOPyQiMCQFN6kHTQQOXeoDa0FI2EJOKMaYDG8eyt9lIBVb3nAVo
YsWh6lvgZVAcyf9EwqaXm/5Ay3rdoyT1yktN4TpC8AvCjAHy3y1Vb/e2TDmz8faQ
FS5T/L7oCaNcbfK/PSBG9jAQdlLJoL53L9eKzMK6WP2LTtVFI2i7vDuQnQPw5GN7
Q+HGpLSICBZbw6n1MmTmmdOtowDnXmr6FSyECB5ibdCqb+2itNQ+J1HNOtKzpbKC
3q6YSAMDw/D8e45auh3FRt6SAYvZ8Tw4jNqd16P6/aa5rno3qMWBcv0G0fmb0N6R
Hka4FKLjBQo5g0WxKvpRwxHrrQW6JeT9I5+NgNN4sJc=
-----END RSA PRIVATE KEY-----
EOF
echo '['Read Key Info With Bogus PIN Location.']'
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
key_pin_file=$tmpdir/bogus-pin.txt
EOF
$toolsdir/keyiread entry | clean
echo '['Read Key Info Without PIN.']'
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
EOF
$toolsdir/keyiread entry | clean
echo '['Retrying With PIN.']'
echo key_pin=$pin >> entry
$toolsdir/keyiread entry | clean
echo '['Read Key Info Without PIN File.']'
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
EOF
$toolsdir/keyiread entry | clean
echo '['Retry With PIN File.']'
echo key_pin_file=$tmpdir/pin.txt >> entry
$toolsdir/keyiread entry | clean
echo '['Generate Key With PIN.']'
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
key_gen_size=2048
key_pin_file=$tmpdir/pin.txt
EOF
rm -f $tmpdir/keyfile
$toolsdir/keygen entry | clean
egrep '(: |PRIVATE)' $tmpdir/keyfile
echo '['Try To Read Key Without PIN.']'
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
key_gen_size=2048
EOF
$toolsdir/keyiread entry | clean
echo '['Retry With PIN File.']'
echo key_pin_file=$tmpdir/pin.txt >> entry
$toolsdir/keyiread entry | clean
echo '['Generate CSR With PIN.']'
rm -f csr.pem
echo key_pin_file=$tmpdir/pin.txt >> entry
$toolsdir/csrgen entry > csr.pem | clean
egrep '(: |REQUEST)' $tmpdir/csr.pem
for precreate in false true ; do
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
if $precreate ; then
echo '['Creating database, without PIN.']'
initnssdb "${scheme:+${scheme}:}$tmpdir/${scheme}db"
else
echo '['Not pre-creating database.']'
fi
cat > entry <<- EOF
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_nickname=Test
EOF
echo '['Generating key${scheme:+ \($scheme\)} without PIN.']'
$toolsdir/keygen entry | clean
run_certutil -K -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g' | clean
echo '['Providing Unnecessary PIN.']'
echo key_pin_file=$tmpdir/pin.txt >> entry
echo '['Reading Key Info With Unnecessary PIN.']'
$toolsdir/keyiread entry | clean
run_certutil -K -d ${scheme:+${scheme}:}$tmpdir/${scheme}db -f $tmpdir/pin.txt 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g' | clean
echo '['Generating CSR With Unnecessary PIN.']'
rm -f csr.pem
$toolsdir/csrgen entry > csr.pem | clean
egrep '(: |REQUEST)' $tmpdir/csr.pem
run_certutil -K -d ${scheme:+${scheme}:}$tmpdir/${scheme}db -f $tmpdir/pin.txt 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g' | clean
done
for precreate in false true ; do
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
if $precreate ; then
echo '['Creating database with PIN.']'
initnssdb "${scheme:+${scheme}:}$tmpdir/${scheme}db" $pin
else
echo '['Not pre-creating database, with PIN.']'
fi
cat > entry <<- EOF
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_nickname=Test
key_pin_file=$tmpdir/pin.txt
EOF
echo '['Generating key${scheme:+ \($scheme\)} with PIN.']'
$toolsdir/keygen entry | clean
run_certutil -K -f $tmpdir/pin.txt -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g' | clean
echo '['Reading Key Info Without PIN.']'
cat > entry <<- EOF
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_nickname=Test
EOF
$toolsdir/keyiread entry | clean
run_certutil -K -f $tmpdir/empty.txt -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g' | clean
echo '['Reading Key Info With Bogus PIN Location.']'
echo key_pin_file=$tmpdir/bogus-pin.txt >> entry
$toolsdir/keyiread entry | clean
echo '['Reading Key Info With PIN.']'
cat > entry <<- EOF
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_nickname=Test
key_pin_file=$tmpdir/pin.txt
EOF
$toolsdir/keyiread entry | clean
echo '['Generating CSR Without PIN.']'
cat > entry <<- EOF
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_nickname=Test
EOF
rm -f csr.pem
$toolsdir/csrgen entry > csr.pem | clean
egrep '(: |REQUEST)' $tmpdir/csr.pem
echo '['Generating CSR With Bogus PIN Location.']'
echo key_pin_file=$tmpdir/bogus-pin.txt >> entry
rm -f csr.pem
$toolsdir/csrgen entry > csr.pem | clean
egrep '(: |REQUEST)' $tmpdir/csr.pem
echo '['Generating CSR With PIN.']'
cat > entry <<- EOF
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_nickname=Test
key_pin_file=$tmpdir/pin.txt
EOF
rm -f csr.pem
$toolsdir/csrgen entry > csr.pem | clean
egrep '(: |REQUEST)' $tmpdir/csr.pem
done
echo '['Test complete.']'
certmonger-0.74/tests/015-lockedkey/expected.out 0000664 0001750 0001750 00000005354 12317265222 016516 0000000 0000000 [Generate Key Without PIN.]
OK.
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----
[Try To Read Key Without PIN.]
OK (RSA:2048).
[Retry With Unnecessary PIN File.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Replacing key with an encrypted one.]
[Read Key Info With Bogus PIN Location.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Read Key Info Without PIN.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Retrying With PIN.]
OK (RSA:512).
[Read Key Info Without PIN File.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Retry With PIN File.]
OK (RSA:512).
[Generate Key With PIN.]
OK.
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
[Try To Read Key Without PIN.]
Failed to read key "$tmpdir/keyfile".
(Need PIN.)
[Retry With PIN File.]
OK (RSA:2048).
[Generate CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Not pre-creating database.]
[Generating key without PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Providing Unnecessary PIN.]
[Reading Key Info With Unnecessary PIN.]
Failed to read key "$tmpdir/db":"Test".
(Need PIN.)
< 0> rsa PRIVATE-KEY Test
[Generating CSR With Unnecessary PIN.]
< 0> rsa PRIVATE-KEY Test
[Creating database, without PIN.]
[Generating key without PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Providing Unnecessary PIN.]
[Reading Key Info With Unnecessary PIN.]
Failed to read key "$tmpdir/db":"Test".
(Need PIN.)
< 0> rsa PRIVATE-KEY Test
[Generating CSR With Unnecessary PIN.]
< 0> rsa PRIVATE-KEY Test
[Not pre-creating database, with PIN.]
[Generating key with PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Reading Key Info Without PIN.]
Failed to read key "$tmpdir/db":"Test".
(Need PIN.)
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS Certificate DB.: The security password entered is incorrect.
[Reading Key Info With Bogus PIN Location.]
Failed to read key "$tmpdir/db":"Test".
(Need PIN.)
[Reading Key Info With PIN.]
OK (RSA:2048).
[Generating CSR Without PIN.]
[Generating CSR With Bogus PIN Location.]
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Creating database with PIN.]
[Generating key with PIN.]
OK.
< 0> rsa PRIVATE-KEY Test
[Reading Key Info Without PIN.]
Failed to read key "$tmpdir/db":"Test".
(Need PIN.)
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS Certificate DB.: The security password entered is incorrect.
[Reading Key Info With Bogus PIN Location.]
Failed to read key "$tmpdir/db":"Test".
(Need PIN.)
[Reading Key Info With PIN.]
OK (RSA:2048).
[Generating CSR Without PIN.]
[Generating CSR With Bogus PIN Location.]
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Test complete.]
certmonger-0.74/tests/014-prefs/ 0000775 0001750 0001750 00000000000 12317265252 013404 5 0000000 0000000 certmonger-0.74/tests/014-prefs/run.sh 0000775 0001750 0001750 00000002131 12317265222 014461 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
CERTMONGER_CONFIG_DIR=$tmpdir; export CERTMONGER_CONFIG_DIR
source "$srcdir"/functions
echo '['Empty file.']'
cat > certmonger.conf << EOF
EOF
$toolsdir/prefs
echo '['Empty defaults.']'
cat > certmonger.conf << EOF
[defaults]
EOF
$toolsdir/prefs
echo '['Other settings.']'
cat > certmonger.conf << EOF
[defaults]
cipher = aes256
digest = sha-1
ttls = 30 60 90
notification_method = mail
notification_destination = root
EOF
$toolsdir/prefs
echo '['Other settings.']'
cat > certmonger.conf << EOF
[defaults]
cipher = aes128
digest = sha512
ttls = 1d 14d 7d 28d 1y
notification_method = mail
notification_destination = root
EOF
# Accept 366*24*60*60 as a valid substitute for 365*24*60*60 when computing
# seconds-until-it's-one-year-from-now
$toolsdir/prefs | sed -e 's,31622400$,31536000,g'
echo '['TTL settings compatibility and notification commands.']'
cat > certmonger.conf << EOF
[defaults]
enroll_ttls = 1d 14d 7d 28d
notify_ttls = 1d 14d 7d
notification_method = command
notification_destination = logger "The sky is falling!"
EOF
$toolsdir/prefs
echo '['Test complete.']'
certmonger-0.74/tests/014-prefs/expected.out 0000664 0001750 0001750 00000001615 12317265222 015656 0000000 0000000 [Empty file.]
cipher: AES128
digest: SHA256
notify_ttls: 86400, 172800, 259200, 604800, 2419200
enroll_ttls: 86400, 172800, 259200, 604800, 2419200
notification: SYSLOG:daemon.notice
[Empty defaults.]
cipher: AES128
digest: SHA256
notify_ttls: 86400, 172800, 259200, 604800, 2419200
enroll_ttls: 86400, 172800, 259200, 604800, 2419200
notification: SYSLOG:daemon.notice
[Other settings.]
cipher: AES128
digest: SHA1
notify_ttls: 30, 60, 90
enroll_ttls: 30, 60, 90
notification: MAILTO:root
[Other settings.]
cipher: AES128
digest: SHA512
notify_ttls: 86400, 604800, 1209600, 2419200, 31536000
enroll_ttls: 86400, 604800, 1209600, 2419200, 31536000
notification: MAILTO:root
[TTL settings compatibility and notification commands.]
cipher: AES128
digest: SHA256
notify_ttls: 86400, 604800, 1209600
enroll_ttls: 86400, 604800, 1209600, 2419200
notification: COMMAND:logger "The sky is falling!"
[Test complete.]
certmonger-0.74/tests/013-enckey-sql/ 0000775 0001750 0001750 00000000000 12317265252 014337 5 0000000 0000000 certmonger-0.74/tests/013-enckey-sql/run.sh 0000775 0001750 0001750 00000000066 12317265222 015421 0000000 0000000 #!/bin/sh -e
exec env scheme=sql ../013-enckey/run.sh
certmonger-0.74/tests/013-enckey-sql/expected.out 0000664 0001750 0001750 00000002734 12317265222 016614 0000000 0000000 [Read Key Info With PIN.]
OK (RSA:2048).
[Read Key Info With PIN File.]
OK (RSA:2048).
[Generate Key With PIN.]
OK.
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
[Generate CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Not Pre-creating database.]
[Generating key (sql) with PIN.]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Reading Key Info With PIN.]
OK (RSA:2048).
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Creating database.]
[Generating key (sql) with PIN.]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Reading Key Info With PIN.]
OK (RSA:2048).
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Test complete.]
certmonger-0.74/tests/013-enckey-dbm/ 0000775 0001750 0001750 00000000000 12317265252 014302 5 0000000 0000000 certmonger-0.74/tests/013-enckey-dbm/run.sh 0000775 0001750 0001750 00000000066 12317265222 015364 0000000 0000000 #!/bin/sh -e
exec env scheme=dbm ../013-enckey/run.sh
certmonger-0.74/tests/013-enckey-dbm/expected.out 0000664 0001750 0001750 00000002734 12317265222 016557 0000000 0000000 [Read Key Info With PIN.]
OK (RSA:2048).
[Read Key Info With PIN File.]
OK (RSA:2048).
[Generate Key With PIN.]
OK.
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
[Generate CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Not Pre-creating database.]
[Generating key (dbm) with PIN.]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Reading Key Info With PIN.]
OK (RSA:2048).
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Creating database.]
[Generating key (dbm) with PIN.]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Reading Key Info With PIN.]
OK (RSA:2048).
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Test complete.]
certmonger-0.74/tests/013-enckey/ 0000775 0001750 0001750 00000000000 12317265252 013542 5 0000000 0000000 certmonger-0.74/tests/013-enckey/run.sh 0000775 0001750 0001750 00000007420 12317265222 014625 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
size=2048
echo BlahBlah > pin.txt
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
key_pin=BlahBlah
EOF
cat > keyfile <<- EOF
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-128-CBC,6D3E363E83BA9625DBD7F9A72916A6C5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-----END RSA PRIVATE KEY-----
EOF
echo '['Read Key Info With PIN.']'
$toolsdir/keyiread entry
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
key_pin_file=$tmpdir/pin.txt
EOF
echo '['Read Key Info With PIN File.']'
$toolsdir/keyiread entry
cat > entry <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
key_pin_file=$tmpdir/pin.txt
key_gen_size=2048
EOF
rm $tmpdir/keyfile
echo '['Generate Key With PIN.']'
$toolsdir/keygen entry
egrep '(: |PRIVATE)' $tmpdir/keyfile
echo '['Generate CSR With PIN.']'
rm -f csr.pem
$toolsdir/csrgen entry > csr.pem
egrep '(: |REQUEST)' $tmpdir/csr.pem
for precreate in false true ; do
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
if $precreate ; then
echo '['Creating database.']'
initnssdb "${scheme:+${scheme}:}$tmpdir/${scheme}db" BlahBlah
else
echo '['Not Pre-creating database.']'
fi
cat > entry <<- EOF
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_nickname=Test
key_pin_file=$tmpdir/pin.txt
EOF
echo '['Generating key${scheme:+ \($scheme\)} with PIN.']'
$toolsdir/keygen entry
certutil -K -f $tmpdir/pin.txt -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g'
echo '['Reading Key Info With PIN.']'
$toolsdir/keyiread entry
certutil -K -f $tmpdir/pin.txt -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g'
echo '['Generating CSR With PIN.']'
rm -f csr.pem
$toolsdir/csrgen entry > csr.pem
egrep '(: |REQUEST)' $tmpdir/csr.pem
certutil -K -f $tmpdir/pin.txt -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g'
done
echo '['Test complete.']'
certmonger-0.74/tests/013-enckey/expected.out 0000664 0001750 0001750 00000002720 12317265222 016012 0000000 0000000 [Read Key Info With PIN.]
OK (RSA:2048).
[Read Key Info With PIN File.]
OK (RSA:2048).
[Generate Key With PIN.]
OK.
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
[Generate CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
[Not Pre-creating database.]
[Generating key with PIN.]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Reading Key Info With PIN.]
OK (RSA:2048).
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Creating database.]
[Generating key with PIN.]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Reading Key Info With PIN.]
OK (RSA:2048).
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Generating CSR With PIN.]
-----BEGIN NEW CERTIFICATE REQUEST-----
-----END NEW CERTIFICATE REQUEST-----
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Test complete.]
certmonger-0.74/tests/012-dbadd-sql/ 0000775 0001750 0001750 00000000000 12317265252 014116 5 0000000 0000000 certmonger-0.74/tests/012-dbadd-sql/run.sh 0000775 0001750 0001750 00000000065 12317265222 015177 0000000 0000000 #!/bin/sh -e
exec env scheme=sql ../012-dbadd/run.sh
certmonger-0.74/tests/012-dbadd-sql/expected.out 0000664 0001750 0001750 00000000421 12317265222 016362 0000000 0000000 [Generating key (sql).]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Saving certificate (sql).]
OK
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
Test ,,
[Test complete.]
certmonger-0.74/tests/012-dbadd-dbm/ 0000775 0001750 0001750 00000000000 12317265252 014061 5 0000000 0000000 certmonger-0.74/tests/012-dbadd-dbm/run.sh 0000775 0001750 0001750 00000000065 12317265222 015142 0000000 0000000 #!/bin/sh -e
exec env scheme=dbm ../012-dbadd/run.sh
certmonger-0.74/tests/012-dbadd-dbm/expected.out 0000664 0001750 0001750 00000000421 12317265222 016325 0000000 0000000 [Generating key (dbm).]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Saving certificate (dbm).]
OK
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
Test ,,
[Test complete.]
certmonger-0.74/tests/012-dbadd/ 0000775 0001750 0001750 00000000000 12317265252 013321 5 0000000 0000000 certmonger-0.74/tests/012-dbadd/run.sh 0000775 0001750 0001750 00000004306 12317265222 014404 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
echo '['Generating key${scheme:+ \($scheme\)}.']'
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
initnssdb ${scheme:+${scheme}:}$tmpdir/${scheme}db
cat > entry.key${scheme:+.$scheme} <<- EOF
state=NEED_KEY_PAIR
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_nickname=Test
EOF
$toolsdir/keygen entry.key${scheme:+.$scheme}
certutil -K -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g'
echo '['Saving certificate${scheme:+ \($scheme\)}.']'
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
initnssdb ${scheme:+${scheme}:}$tmpdir/${scheme}db
cat > entry.cert${scheme:+.$scheme} <<- EOF
state=NEED_TO_SAVE_CERT
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
cert_nickname=Test
cert=-----BEGIN CERTIFICATE-----
MIIC3jCCAcagAwIBAgIBAzANBgkqhkiG9w0BAQsFADASMRAwDgYDVQQDEwdwaWxs
Ym94MB4XDTEwMDIxMDIyMDMzOVoXDTEwMDMxMjIyMDMzOVowEjEQMA4GA1UEAxMH
cGlsbGJveDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMQOQn5USR/Q
Gp2230fks3ZOjkF5VHxwLziS9rc+AFZ8UZrXMidnkhso9Eqp74CaJ+KhJI2F62wm
SerBztRAVb8T98+dXUvgYIXE6OxB0ITCMMvdJZFKs5hek2Xd6uiulCegqsNOD1qy
llBNLtWDoZqgXuEKfeQmUR6qUGqhVFfmL7qKmIOWN+lSswhkQrrGy3oSNVU5KWYM
d7bkrKWEze8ksWgNOwDFQ2pQibYljywEfBZaLegeoASygK3yl6dVjioQmkHBk8Z1
fRLnMs8TRT7NwgsWFkKi04SGkn/VpVKZ9piMJCpYhQWIy0U2ib0nBaYec2ReFQ6r
2du1UMmkwXECAwEAAaM/MD0wFQYDVR0RAQEABAswCYIHcGlsbGJveDAWBgNVHSUB
AQAEDDAKBggrBgEFBQcDATAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IB
AQA9dqnzVzblb0PKdiMOzLksEqFridaRVOB/hK4WHeSJQsCk6a151Fli1uX3/QHJ
vRXH0P6i8eMblQ20J4IpZuO9aBLW1go8vPQM8/gD5dXUVm57sqsJlvxjKbnHplGi
w8KKasuYMHGOI0M//MR84LI7Nd/JIu+9In9Y+qRj91saBIgHDKeiHQtzWdehNC+2
e3gdWc74hx26gXRO6bNE5CZExnVULNkDOsPh/nr4Qwwx+BOn4DdU8tbRvUbvjjzQ
koiuvyXyTlj1E8JcT6q4P3YbCn4PTlF8xZK9+XdUzOA6HUlz2Q/ysjIQMHe6zapD
8Vw+Zwf78Wg6L4tcAJ6Y4W/Z
-----END CERTIFICATE-----
EOF
$toolsdir/certsave entry.cert${scheme:+.$scheme}
echo OK
certutil -L -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,[ \t]+, ,g' -e 's,Services ",Services",g'
echo '['Test complete.']'
certmonger-0.74/tests/012-dbadd/expected.out 0000664 0001750 0001750 00000000405 12317265222 015567 0000000 0000000 [Generating key.]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Saving certificate.]
OK
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
Test ,,
[Test complete.]
certmonger-0.74/tests/011-dbinit-sql/ 0000775 0001750 0001750 00000000000 12317265252 014330 5 0000000 0000000 certmonger-0.74/tests/011-dbinit-sql/run.sh 0000775 0001750 0001750 00000000066 12317265222 015412 0000000 0000000 #!/bin/sh -e
exec env scheme=sql ../011-dbinit/run.sh
certmonger-0.74/tests/011-dbinit-sql/expected.out 0000664 0001750 0001750 00000000421 12317265222 016574 0000000 0000000 [Generating key (sql).]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Saving certificate (sql).]
OK
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
Test ,,
[Test complete.]
certmonger-0.74/tests/011-dbinit-dbm/ 0000775 0001750 0001750 00000000000 12317265252 014273 5 0000000 0000000 certmonger-0.74/tests/011-dbinit-dbm/run.sh 0000775 0001750 0001750 00000000066 12317265222 015355 0000000 0000000 #!/bin/sh -e
exec env scheme=dbm ../011-dbinit/run.sh
certmonger-0.74/tests/011-dbinit-dbm/expected.out 0000664 0001750 0001750 00000000421 12317265222 016537 0000000 0000000 [Generating key (dbm).]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Saving certificate (dbm).]
OK
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
Test ,,
[Test complete.]
certmonger-0.74/tests/011-dbinit/ 0000775 0001750 0001750 00000000000 12317265252 013533 5 0000000 0000000 certmonger-0.74/tests/011-dbinit/run.sh 0000775 0001750 0001750 00000004136 12317265222 014617 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
echo '['Generating key${scheme:+ \($scheme\)}.']'
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
cat > entry.key${scheme:+.$scheme} <<- EOF
state=NEED_KEY_PAIR
key_storage_type=NSSDB
key_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
key_nickname=Test
EOF
$toolsdir/keygen entry.key${scheme:+.$scheme}
certutil -K -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,rsa .* Test,rsa PRIVATE-KEY Test,g' -e 's,[ \t]+, ,g' -e 's,Services ",Services",g'
echo '['Saving certificate${scheme:+ \($scheme\)}.']'
rm -fr $tmpdir/${scheme}db
mkdir -p $tmpdir/${scheme}db
cat > entry.cert${scheme:+.$scheme} <<- EOF
state=NEED_TO_SAVE_CERT
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir/${scheme}db
cert_nickname=Test
cert=-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
EOF
$toolsdir/certsave entry.cert${scheme:+.$scheme}
echo OK
certutil -L -d ${scheme:+${scheme}:}$tmpdir/${scheme}db 2>&1 | sed -re 's,[ \t]+, ,g' -e 's,Services ",Services",g'
echo '['Test complete.']'
certmonger-0.74/tests/011-dbinit/expected.out 0000664 0001750 0001750 00000000405 12317265222 016001 0000000 0000000 [Generating key.]
OK.
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services"
< 0> rsa PRIVATE-KEY Test
[Saving certificate.]
OK
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
Test ,,
[Test complete.]
certmonger-0.74/tests/010-iterate/ 0000775 0001750 0001750 00000000000 12317265252 013716 5 0000000 0000000 certmonger-0.74/tests/010-iterate/expected.out 0000664 0001750 0001750 00000031174 12317265222 016173 0000000 0000000 [Generating key pair.]
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
HAVE_KEY_PAIR
NEED_KEYINFO
-STOP-
[Reading back key info.]
NEED_KEYINFO
-START-
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
key_size=2048
[Generating CSR.]
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
[Getting CSR signed.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
-STOP-
[Saving certificate.]
NEED_TO_SAVE_CERT
-START-
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
Certificate in file "$tmpdir/certfile" issued by CA and saved.
MONITORING
-STOP-
[From-scratch enrollment scenario OK.]
[Picking up mid-life without a key or a certificate.]
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
NEED_KEY_PAIR
-STOP-
[Picking up mid-life without a certificate.]
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
NEED_CSR
-STOP-
[Picking up mid-life.]
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
MONITORING
-STOP-
[Retroactive issuing.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
-STOP-
NEED_TO_SAVE_CERT
-START-
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
Certificate in file "$tmpdir/certfile2" issued by CA and saved.
MONITORING
-STOP-
notBefore=Jan 1 00:00:00 1970 GMT
notAfter=Jan 2 00:00:00 1970 GMT
[Noticing expiration.]
notBefore=Jan 1 00:00:00 1970 GMT
notAfter=Jan 2 00:00:00 1970 GMT
MONITORING
-START-
NEED_TO_NOTIFY_VALIDITY
NOTIFYING_VALIDITY
Certificate in file "$tmpdir/certfile2" is no longer valid.
delay=86400
MONITORING
-STOP-
[Kicking off autorenew.]
notBefore=Jan 1 00:00:00 1970 GMT
notAfter=Jan 2 00:00:00 1970 GMT
MONITORING
-START-
NEED_TO_NOTIFY_VALIDITY
NOTIFYING_VALIDITY
Certificate in file "$tmpdir/certfile2" is no longer valid.
NEED_CSR
-STOP-
[Enroll.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
-STOP-
NEED_TO_SAVE_CERT
-START-
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
-STOP-
[Enroll, helper produces noise before.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
-STOP-
NEED_TO_SAVE_CERT
-START-
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
-STOP-
[Enroll, helper produces noise after]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
-STOP-
NEED_TO_SAVE_CERT
-START-
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
-STOP-
[Enroll, helper produces noise before and after.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
-STOP-
NEED_TO_SAVE_CERT
-START-
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
-STOP-
[Enroll, helper omits newline at end of certificate.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
-STOP-
NEED_TO_SAVE_CERT
-START-
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
-STOP-
[Enroll until we notice we have no specified CA.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
NEED_CA
-STOP-
[Enroll until the CA tells us to come back later.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=604800
CA_WORKING
-STOP-
ca_cookie=iLoveCookiesSome
CA_WORKING
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
-STOP-
[Enroll until the CA rejects us.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_NOTIFY_REJECTION
-STOP-
NEED_TO_NOTIFY_REJECTION
-START-
NOTIFYING_REJECTION
Request for certificate to be stored in file "$tmpdir/certfile3" rejected by CA.
CA_REJECTED
-STOP-
CA_REJECTED
-START-
CA_REJECTED
-STOP-
[Enroll until the CA turns out to be unreachable.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=604800
CA_UNREACHABLE
-STOP-
CA_UNREACHABLE
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
-STOP-
[Enroll until the CA client turns out to be unconfigured.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=604800
CA_UNCONFIGURED
-STOP-
CA_UNCONFIGURED
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
-STOP-
[Enroll until the CA tells us to come back later.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=13
CA_WORKING
-STOP-
ca_cookie=iLoveCookiesMore
CA_WORKING
-(RESET)-
HAVE_CSR
-START-
NEED_TO_SUBMIT
-STOP-
[Enroll until the CA tells us to come back later, but with a broken date.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_GUIDANCE
-STOP-
NO COOKIE FOR YOU
NEED_GUIDANCE
-START-
NEED_GUIDANCE
-STOP-
[Enroll until we realize our enrollment helper doesn't support enrollment.]
HAVE_KEY_PAIR
-START-
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_GUIDANCE
-STOP-
[CA poll timeout remaining=0.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=300
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=0.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=300
CA_WORKING
-STOP-
[CA poll timeout remaining=0.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=300
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=0.]
MONITORING
-START-
delay=1800
MONITORING
-STOP-
[CA poll timeout remaining=30.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=300
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=30.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=300
CA_WORKING
-STOP-
[CA poll timeout remaining=30.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=300
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=30.]
MONITORING
-START-
delay=1800
MONITORING
-STOP-
[CA poll timeout remaining=1800.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=900
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=1800.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=900
CA_WORKING
-STOP-
[CA poll timeout remaining=1800.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=900
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=1800.]
MONITORING
-START-
delay=1800
MONITORING
-STOP-
[CA poll timeout remaining=3600.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=1800
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=3600.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=1800
CA_WORKING
-STOP-
[CA poll timeout remaining=3600.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=1800
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=3600.]
MONITORING
-START-
delay=1800
MONITORING
-STOP-
[CA poll timeout remaining=7200.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=3600
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=7200.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=3600
CA_WORKING
-STOP-
[CA poll timeout remaining=7200.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=3600
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=7200.]
MONITORING
-START-
delay=3600
MONITORING
-STOP-
[CA poll timeout remaining=86000.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=43000
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=86000.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=43000
CA_WORKING
-STOP-
[CA poll timeout remaining=86000.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=43000
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=86000.]
MONITORING
-START-
delay=43000
MONITORING
-STOP-
[CA poll timeout remaining=86500.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=43250
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=86500.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=43250
CA_WORKING
-STOP-
[CA poll timeout remaining=86500.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=43250
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=86500.]
MONITORING
-START-
delay=43250
MONITORING
-STOP-
[CA poll timeout remaining=604800.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=302400
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=604800.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=302400
CA_WORKING
-STOP-
[CA poll timeout remaining=604800.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=302400
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=604800.]
MONITORING
-START-
delay=86400
MONITORING
-STOP-
[CA poll timeout remaining=1000000.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=500000
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=1000000.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=500000
CA_WORKING
-STOP-
[CA poll timeout remaining=1000000.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=500000
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=1000000.]
MONITORING
-START-
delay=86400
MONITORING
-STOP-
[CA poll timeout remaining=2000000.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=604800
CA_UNREACHABLE
-STOP-
[CA poll timeout remaining=2000000.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=604800
CA_WORKING
-STOP-
[CA poll timeout remaining=2000000.]
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
delay=604800
CA_UNCONFIGURED
-STOP-
[Monitor poll timeout remaining=2000000.]
MONITORING
-START-
delay=86400
MONITORING
-STOP-
[Kicking off split monitor/enroll TTL tests.]
NEWLY_ADDED
-START-
NEWLY_ADDED_START_READING_KEYINFO
NEWLY_ADDED_READING_KEYINFO
NEWLY_ADDED_START_READING_CERT
NEWLY_ADDED_READING_CERT
NEWLY_ADDED_DECIDING
NEED_KEY_PAIR
-STOP-
NEED_KEY_PAIR
-START-
GENERATING_KEY_PAIR
HAVE_KEY_PAIR
NEED_KEYINFO
READING_KEYINFO
HAVE_KEYINFO
NEED_CSR
-STOP-
NEED_CSR
-(RESET)-
HAVE_KEYINFO
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
-STOP-
HAVE_CSR
-START-
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
-STOP-
NEED_TO_SAVE_CERT
-START-
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[Kicking off enroll only.]
notBefore=Jan 1 00:00:00 1970 GMT
notAfter=Jan 1 00:00:00 1971 GMT
MONITORING
-START-
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
[Kicking off notify only.]
notBefore=Jan 1 00:00:00 1970 GMT
notAfter=Jan 1 00:00:00 1971 GMT
MONITORING
-START-
NEED_TO_NOTIFY_VALIDITY
NOTIFYING_VALIDITY
delay=86400
MONITORING
-STOP-
[Kicking off notify-then-submit.]
notBefore=Jan 1 00:00:00 1970 GMT
notAfter=Jan 1 00:00:00 1971 GMT
MONITORING
-START-
NEED_TO_NOTIFY_VALIDITY
NOTIFYING_VALIDITY
NEED_CSR
GENERATING_CSR
HAVE_CSR
NEED_TO_SUBMIT
SUBMITTING
NEED_TO_SAVE_CERT
START_SAVING_CERT
SAVING_CERT
NEED_TO_READ_CERT
READING_CERT
SAVED_CERT
NEED_TO_NOTIFY_ISSUED_SAVED
NOTIFYING_ISSUED_SAVED
MONITORING
-STOP-
The sky is falling: Certificate in file "$tmpdir/certfile10" is no longer valid.
The sky is falling: Certificate in file "$tmpdir/certfile10" issued by CA and saved.
Test complete.
certmonger-0.74/tests/010-iterate/run.sh 0000775 0001750 0001750 00000047600 12317265222 015005 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
cert="-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
cat > ca-issued << EOF
#!/bin/sh
echo "$cert"
exit 0
EOF
chmod u+x ca-issued
cat > ca-issued-with-no-newline << EOF
#!/bin/sh
echo -n "$cert"
exit 0
EOF
chmod u+x ca-issued-with-no-newline
cat > ca-issued-with-noise-before << EOF
#!/bin/sh
echo iLoveCookies
echo "$cert"
exit 0
EOF
chmod u+x ca-issued-with-noise-before
cat > ca-issued-with-noise-after << EOF
#!/bin/sh
echo "$cert"
echo iLoveCookies
exit 0
EOF
chmod u+x ca-issued-with-noise-after
cat > ca-issued-with-noise-both << EOF
#!/bin/sh
echo iLoveCookies
echo "$cert"
echo Also Monkeys
exit 0
EOF
chmod u+x ca-issued-with-noise-both
cat > ca-ask-again << EOF
#!/bin/sh
echo iLoveCookiesSome
exit 1
EOF
chmod u+x ca-ask-again
cat > ca-reject << EOF
#!/bin/sh
echo CA rejected us, must have been having a bad day.
exit 2
EOF
chmod u+x ca-reject
cat > ca-unreachable << EOF
#!/bin/sh
echo Could not contact CA.
exit 3
EOF
chmod u+x ca-unreachable
cat > ca-unconfigured << EOF
#!/bin/sh
echo Something is wrong with my brain.
exit 4
EOF
chmod u+x ca-unconfigured
cat > ca-ask-again-5 << EOF
#!/bin/sh
echo 13
echo iLoveCookiesMore
exit 5
EOF
chmod u+x ca-ask-again-5
cat > ca-ask-again-broken-5 << EOF
#!/bin/sh
echo "?1034h13"
echo iLoveCookiesMore
exit 5
EOF
chmod u+x ca-ask-again-broken-5
cat > ca-what-what-6 << EOF
#!/bin/sh
echo What do you want?
exit 6
EOF
chmod u+x ca-what-what-6
cat > ca << EOF
id=SelfSign
ca_type=INTERNAL:SELF
EOF
cat > entry << EOF
id=Test
ca_name=SelfSign
state=NEED_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile
notification_method=STDOUT
EOF
# These cover parts of the process, forcing it to stop if any phase needs
# to be tried again, so that we don't hit infinite loops.
echo '[Generating key pair.]'
$toolsdir/iterate ca entry GENERATING_KEY_PAIR,HAVE_KEY_PAIR
if test "`grep ^state entry`" != state=NEED_KEYINFO ; then
echo Key generation failed or did not move to key info reading.
grep ^state entry
exit 1
fi
echo
echo '[Reading back key info.]'
$toolsdir/iterate ca entry NEED_KEYINFO,START_READING_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
if test "`grep ^state entry`" != state=NEED_CSR ; then
echo Key info read failed or did not move to CSR generation.
grep ^state entry
exit 1
fi
grep ^key_size entry
echo
echo '[Generating CSR.]'
$toolsdir/iterate ca entry HAVE_KEYINFO,NEED_CSR,GENERATING_CSR
if test "`grep ^state entry`" != state=HAVE_CSR ; then
echo CSR generation failed or did not move to submission.
grep ^state entry
exit 1
fi
echo
echo '[Getting CSR signed.]'
$toolsdir/iterate ca entry HAVE_CSR,NEED_TO_SUBMIT,SUBMITTING
if test "`grep ^state entry`" != state=NEED_TO_SAVE_CERT ; then
echo Signing failed or did not move to saving.
grep ^state entry
exit 1
fi
echo
echo '[Saving certificate.]'
$toolsdir/iterate ca entry START_SAVING_CERT,SAVING_CERT,NEED_TO_READ_CERT,READING_CERT,NEED_TO_NOTIFY_ISSUED_SAVED,NOTIFYING_ISSUED_SAVED,SAVED_CERT | sed 's@'"$tmpdir"'@$tmpdir@g'
if test "`grep ^state entry`" != state=MONITORING ; then
echo Saving failed or did not move to monitoring.
grep ^state entry
exit 1
fi
echo
echo '[From-scratch enrollment scenario OK.]'
echo
echo '[Picking up mid-life without a key or a certificate.]'
cat > entry << EOF
id=Test
state=NEWLY_ADDED
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile2
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile2
notification_method=STDOUT
EOF
$toolsdir/iterate ca entry NEWLY_ADDED,NEWLY_ADDED_START_READING_KEYINFO,NEWLY_ADDED_READING_KEYINFO,NEWLY_ADDED_START_READING_CERT,NEWLY_ADDED_READING_CERT,NEWLY_ADDED_DECIDING
if test "`grep ^state entry`" != state=NEED_KEY_PAIR ; then
echo Figuring stuff out failed or did not move to generating a key.
grep ^state entry
exit 1
fi
echo
echo '[Picking up mid-life without a certificate.]'
cat > entry << EOF
id=Test
state=NEWLY_ADDED
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile2
notification_method=STDOUT
EOF
$toolsdir/iterate ca entry NEWLY_ADDED,NEWLY_ADDED_START_READING_KEYINFO,NEWLY_ADDED_READING_KEYINFO,NEWLY_ADDED_START_READING_CERT,NEWLY_ADDED_READING_CERT,NEWLY_ADDED_DECIDING
if test "`grep ^state entry`" != state=NEED_CSR; then
echo Figuring stuff out failed or did not move to generating a CSR.
grep ^state entry
exit 1
fi
echo
echo '[Picking up mid-life.]'
cat > entry << EOF
id=Test
state=NEWLY_ADDED
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile
notification_method=STDOUT
EOF
$toolsdir/iterate ca entry NEWLY_ADDED,NEWLY_ADDED_START_READING_KEYINFO,NEWLY_ADDED_READING_KEYINFO,NEWLY_ADDED_START_READING_CERT,NEWLY_ADDED_READING_CERT,NEWLY_ADDED_DECIDING
if test "`grep ^state entry`" != state=MONITORING ; then
echo Figuring stuff out failed or did not move to monitoring.
grep ^state entry
exit 1
fi
echo
echo '[Retroactive issuing.]'
cat > entry2 << EOF
id=Test
ca_name=SelfSign
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile2
monitor=1
notification_method=STDOUT
EOF
cat > ca2 << EOF
id=SelfSign
ca_type=INTERNAL:SELF
ca_internal_issue_time=0
EOF
$toolsdir/iterate ca2 entry2 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca2 entry2 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca2 entry2 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca2 entry2 START_SAVING_CERT,SAVING_CERT,NEED_TO_READ_CERT,READING_CERT,NEED_TO_NOTIFY_ISSUED_SAVED,NOTIFYING_ISSUED_SAVED,SAVED_CERT | sed 's@'"$tmpdir"'@$tmpdir@g'
openssl x509 -noout -startdate -enddate -in $tmpdir/certfile2
echo
echo '[Noticing expiration.]'
openssl x509 -noout -startdate -enddate -in $tmpdir/certfile2
$toolsdir/iterate ca entry2 NEED_TO_NOTIFY_VALIDITY,NOTIFYING_VALIDITY | sed 's@'"$tmpdir"'@$tmpdir@g'
echo
echo '[Kicking off autorenew.]'
cat > entry2 << EOF
id=Test
ca_name=SelfSign
state=MONITORING
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile2
monitor=1
autorenew=1
notification_method=STDOUT
EOF
openssl x509 -noout -startdate -enddate -in $tmpdir/certfile2
$toolsdir/iterate ca entry2 MONITORING,NEED_TO_NOTIFY_VALIDITY,NOTIFYING_VALIDITY | sed 's@'"$tmpdir"'@$tmpdir@g'
echo
echo '[Enroll.]'
cat > entry3 << EOF
id=Test
ca_name=Friendly
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile4
notification_method=STDOUT
EOF
cat > ca3 << EOF
id=Friendly
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-issued
EOF
: > $tmpdir/certfile4
$toolsdir/iterate ca3 entry3 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca3 entry3 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca3 entry3 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca3 entry3 NEED_TO_SAVE_CERT,SAVING_CERT,START_SAVING_CERT
echo
echo '[Enroll, helper produces noise before.]'
cat > entry3 << EOF
id=Test
ca_name=Friendly
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile4
notification_method=STDOUT
EOF
cat > ca3 << EOF
id=Friendly
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-issued-with-noise-before
EOF
: > $tmpdir/certfile4
$toolsdir/iterate ca3 entry3 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca3 entry3 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca3 entry3 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca3 entry3 NEED_TO_SAVE_CERT,SAVING_CERT,START_SAVING_CERT
echo
echo '[Enroll, helper produces noise after]'
cat > entry3 << EOF
id=Test
ca_name=Friendly
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile4
notification_method=STDOUT
EOF
cat > ca3 << EOF
id=Friendly
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-issued-with-noise-after
EOF
: > $tmpdir/certfile4
$toolsdir/iterate ca3 entry3 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca3 entry3 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca3 entry3 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca3 entry3 NEED_TO_SAVE_CERT,SAVING_CERT,START_SAVING_CERT
echo
echo '[Enroll, helper produces noise before and after.]'
cat > entry3 << EOF
id=Test
ca_name=Friendly
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile4
notification_method=STDOUT
EOF
cat > ca3 << EOF
id=Friendly
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-issued-with-noise-both
EOF
: > $tmpdir/certfile4
$toolsdir/iterate ca3 entry3 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca3 entry3 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca3 entry3 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca3 entry3 NEED_TO_SAVE_CERT,SAVING_CERT,START_SAVING_CERT
echo
echo '[Enroll, helper omits newline at end of certificate.]'
cat > entry3 << EOF
id=Test
ca_name=Friendly
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile4
notification_method=STDOUT
EOF
cat > ca3 << EOF
id=Friendly
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-issued-with-no-newline
EOF
: > $tmpdir/certfile4
$toolsdir/iterate ca3 entry3 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca3 entry3 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca3 entry3 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca3 entry3 NEED_TO_SAVE_CERT,SAVING_CERT,START_SAVING_CERT
echo
echo '[Enroll until we notice we have no specified CA.]'
cat > entry3 << EOF
id=Test
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
notification_method=STDOUT
EOF
cat > ca3 << EOF
id=Meanie
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-reject
EOF
$toolsdir/iterate ca3 entry3 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca3 entry3 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca3 entry3 NEED_TO_SUBMIT,SUBMITTING
echo
echo '[Enroll until the CA tells us to come back later.]'
cat > entry4 << EOF
id=Test
ca_name=Busy
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
notification_method=STDOUT
EOF
cat > ca4 << EOF
id=Busy
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-ask-again
EOF
$toolsdir/iterate ca4 entry4 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca4 entry4 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca4 entry4 NEED_TO_SUBMIT,SUBMITTING
grep ca_cookie entry4
$toolsdir/iterate ca4 entry4 ""
echo
echo '[Enroll until the CA rejects us.]'
cat > entry5 << EOF
id=Test
ca_name=Meanie
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile3
notification_method=STDOUT
EOF
cat > ca5 << EOF
id=Meanie
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-reject
EOF
$toolsdir/iterate ca5 entry5 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca5 entry5 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca5 entry5 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca5 entry5 NEED_TO_NOTIFY_REJECTION,NOTIFYING_REJECTION | sed 's@'"$tmpdir"'@$tmpdir@g'
$toolsdir/iterate ca5 entry5 "" | sed 's@'"$tmpdir"'@$tmpdir@g'
echo
echo '[Enroll until the CA turns out to be unreachable.]'
cat > entry6 << EOF
id=Test
ca_name=Lostie
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
notification_method=STDOUT
EOF
cat > ca6 << EOF
id=Lostie
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-unreachable
EOF
$toolsdir/iterate ca6 entry6 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca6 entry6 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca6 entry6 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca6 entry6 ""
echo
echo '[Enroll until the CA client turns out to be unconfigured.]'
cat > entry7 << EOF
id=Test
ca_name=Lostie
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
notification_method=STDOUT
EOF
cat > ca7 << EOF
id=Lostie
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-unconfigured
EOF
$toolsdir/iterate ca7 entry7 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca7 entry7 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca7 entry7 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca7 entry7 ""
echo
echo '[Enroll until the CA tells us to come back later.]'
cat > entry8 << EOF
id=Test
ca_name=Busy
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
notification_method=STDOUT
EOF
cat > ca8 << EOF
id=Busy
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-ask-again-5
EOF
$toolsdir/iterate ca8 entry8 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca8 entry8 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca8 entry8 NEED_TO_SUBMIT,SUBMITTING
grep ca_cookie entry8
$toolsdir/iterate ca8 entry8 ""
echo
echo '[Enroll until the CA tells us to come back later, but with a broken date.]'
cat > entry8 << EOF
id=Test
ca_name=Busy
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
notification_method=STDOUT
EOF
cat > ca8 << EOF
id=Busy
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-ask-again-broken-5
EOF
$toolsdir/iterate ca8 entry8 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca8 entry8 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca8 entry8 NEED_TO_SUBMIT,SUBMITTING
grep ca_cookie entry8 || echo NO COOKIE FOR YOU
$toolsdir/iterate ca8 entry8 ""
echo
echo "[Enroll until we realize our enrollment helper doesn't support enrollment.]"
cat > entry9 << EOF
id=Test
ca_name=Confused
state=HAVE_KEY_PAIR
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile
notification_method=STDOUT
EOF
cat > ca9 << EOF
id=Confused
ca_type=EXTERNAL
ca_external_helper=$tmpdir/ca-what-what-6
EOF
$toolsdir/iterate ca9 entry9 NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca9 entry9 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca9 entry9 NEED_TO_SUBMIT,SUBMITTING
# Note! The "iterate" harness rounds delay times up to the next multiple of 50.
for interval in 0 30 1800 3600 7200 86000 86500 604800 1000000 2000000; do
now=`date +%s`
CM_FORCE_TIME=$now ; export CM_FORCE_TIME
when=`expr $now + $interval`
later=`env TZ=UTC date -d @$when +%Y%m%d%H%M%S`
for ca in ca-unreachable ca-ask-again ca-unconfigured ; do
echo
echo '[CA poll timeout remaining='$interval'.]'
cat > entry9 <<- EOF
id=Test
ca_name=Lostie
state=HAVE_CSR
cert_not_after=$later
csr=AAAA
notification_method=STDOUT
EOF
cat > ca9 <<- EOF
id=Lostie
ca_type=EXTERNAL
ca_external_helper=$tmpdir/$ca
EOF
$toolsdir/iterate ca9 entry9 NEED_TO_SUBMIT,SUBMITTING
done
echo
echo '[Monitor poll timeout remaining='$interval'.]'
cat > entry9 <<- EOF
id=Test
ca_name=Lostie
state=MONITORING
cert_not_after=$later
csr=AAAA
notification_method=STDOUT
EOF
cat > ca9 <<- EOF
id=Lostie
ca_type=EXTERNAL
ca_external_helper=$tmpdir/$ca
EOF
$toolsdir/iterate ca9 entry9 ""
done
SAVED_CONFIG_DIR="$CERTMONGER_CONFIG_DIR"
CERTMONGER_CONFIG_DIR=`pwd`
echo
echo '[Kicking off split monitor/enroll TTL tests.]'
cat > entry10 << EOF
id=Test
ca_name=SelfSign
state=NEWLY_ADDED
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile10
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile10
monitor=1
autorenew=1
notification_method=STDOUT
EOF
cat > ca10 << EOF
id=SelfSign
ca_type=INTERNAL:SELF
ca_internal_issue_time=0
EOF
$toolsdir/iterate ca10 entry10 NEWLY_ADDED_START_READING_KEYINFO,NEWLY_ADDED_READING_KEYINFO,NEWLY_ADDED_START_READING_CERT,NEWLY_ADDED_READING_CERT,NEWLY_ADDED_DECIDING
$toolsdir/iterate ca10 entry10 NEED_KEY_PAIR,GENERATING_KEY_PAIR,HAVE_KEY_PAIR,NEED_KEYINFO,READING_KEYINFO,HAVE_KEYINFO
$toolsdir/iterate ca10 entry10 NEED_CSR,GENERATING_CSR
$toolsdir/iterate ca10 entry10 NEED_TO_SUBMIT,SUBMITTING
$toolsdir/iterate ca10 entry10 START_SAVING_CERT,SAVING_CERT,NEED_TO_READ_CERT,READING_CERT,NEED_TO_NOTIFY_ISSUED_SAVED,NOTIFYING_ISSUED_SAVED,SAVED_CERT | sed 's@'"$tmpdir"'@$tmpdir@g'
cp $tmpdir/certfile10 $tmpdir/certfile10.bak
echo
echo '[Kicking off enroll only.]'
cp $tmpdir/certfile10.bak $tmpdir/certfile10
cat > entry10 << EOF
id=Test
ca_name=SelfSign
state=MONITORING
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile10
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile10
monitor=1
autorenew=1
notification_method=STDOUT
EOF
cat > ca10 << EOF
id=SelfSign
ca_type=INTERNAL:SELF
ca_internal_issue_time=0
EOF
openssl x509 -noout -startdate -enddate -in $tmpdir/certfile10
cat > certmonger.conf << EOF
[defaults]
enroll_ttls = 30s
notify_ttls = N
EOF
$toolsdir/iterate ca10 entry10 NEED_CSR,GENERATING_CSR,HAVE_CSR,NEED_TO_SUBMIT,SUBMITTING,NEED_TO_SAVE_CERT,START_SAVING_CERT,SAVING_CERT,NEED_TO_NOTIFY_ISSUED_SAVED,NOTIFYING_ISSUED_SAVED,SAVED_CERT,NEED_TO_READ_CERT,READING_CERT | sed 's@'"$tmpdir"'@$tmpdir@g'
echo
echo '[Kicking off notify only.]'
cp $tmpdir/certfile10.bak $tmpdir/certfile10
cat > entry10 << EOF
id=Test
ca_name=SelfSign
state=MONITORING
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile10
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile10
monitor=1
autorenew=1
notification_method=STDOUT
EOF
cat > ca10 << EOF
id=SelfSign
ca_type=INTERNAL:SELF
ca_internal_issue_time=0
EOF
openssl x509 -noout -startdate -enddate -in $tmpdir/certfile10
cat > certmonger.conf << EOF
[defaults]
notify_ttls = 30s
enroll_ttls = N
EOF
$toolsdir/iterate ca10 entry10 NEED_TO_NOTIFY_VALIDITY,NOTIFYING_VALIDITY | sed 's@'"$tmpdir"'@$tmpdir@g'
echo
echo '[Kicking off notify-then-submit.]'
: > $tmpdir/notification.txt
cat > $tmpdir/notify.sh << EOF
#!/bin/sh
touch $tmpdir/notification.txt
echo The sky is falling: \$CERTMONGER_NOTIFICATION >> $tmpdir/notification.txt
EOF
chmod u+x $tmpdir/notify.sh
cp $tmpdir/certfile10.bak $tmpdir/certfile10
cat > entry10 << EOF
id=Test
ca_name=SelfSign
state=MONITORING
key_storage_type=FILE
key_storage_location=$tmpdir/keyfile10
cert_storage_type=FILE
cert_storage_location=$tmpdir/certfile10
monitor=1
autorenew=1
notification_method=STDOUT
EOF
cat > ca10 << EOF
id=SelfSign
ca_type=INTERNAL:SELF
ca_internal_issue_time=0
EOF
openssl x509 -noout -startdate -enddate -in $tmpdir/certfile10
cat > certmonger.conf << EOF
[defaults]
notify_ttls = 30s
enroll_ttls = 30s
notification_method=command
notification_destination=$tmpdir/notify.sh
EOF
$toolsdir/iterate ca10 entry10 NEED_TO_NOTIFY_VALIDITY,NOTIFYING_VALIDITY,NEED_CSR,GENERATING_CSR,HAVE_CSR,NEED_TO_SUBMIT,SUBMITTING,NEED_TO_SAVE_CERT,START_SAVING_CERT,SAVING_CERT,NEED_TO_NOTIFY_ISSUED_SAVED,NOTIFYING_ISSUED_SAVED,SAVED_CERT,NEED_TO_READ_CERT,READING_CERT | sed 's@'"$tmpdir"'@$tmpdir@g'
cat $tmpdir/notification.txt | sed 's@'"$tmpdir"'@$tmpdir@g'
CERTMONGER_CONFIG_DIR="$SAVED_CONFIG_DIR"
echo
echo Test complete.
certmonger-0.74/tests/009-oiddict/ 0000775 0001750 0001750 00000000000 12317265252 013710 5 0000000 0000000 certmonger-0.74/tests/009-oiddict/expected.out 0000664 0001750 0001750 00000002000 12317265222 016147 0000000 0000000 id-kp -> 1.3.6.1.5.5.7.3
id-kp.1 -> 1.3.6.1.5.5.7.3.1
id-kp.2 -> 1.3.6.1.5.5.7.3.2
id-kp.3 -> 1.3.6.1.5.5.7.3.3
id-kp.4 -> 1.3.6.1.5.5.7.3.4
id-kp.5 -> 1.3.6.1.5.5.7.3.5
id-kp.8 -> 1.3.6.1.5.5.7.3.8
id-kp.9 -> 1.3.6.1.5.5.7.3.9
id-kp-clientAuth -> 1.3.6.1.5.5.7.3.2
id-kp-codeSigning -> 1.3.6.1.5.5.7.3.3
id-kp-emailProtection -> 1.3.6.1.5.5.7.3.4
id-kp-OCSPSigning -> 1.3.6.1.5.5.7.3.9
id-kp-serverAuth -> 1.3.6.1.5.5.7.3.1
id-kp-timeStamping -> 1.3.6.1.5.5.7.3.8
id-ms-kp-sc-logon -> 1.3.6.1.4.1.311.20.2.2
id-pkinit -> 1.3.6.1.5.2.3
id-pkinit.4 -> 1.3.6.1.5.2.3.4
id-pkinit.5 -> 1.3.6.1.5.2.3.5
id-pkinit-KPClientAuth -> 1.3.6.1.5.2.3.4
id-pkinit-KPKdc -> 1.3.6.1.5.2.3.5
id-pkix -> 1.3.6.1.5.5.7
id-pkix.1 -> 1.3.6.1.5.5.7.1
id-pkix.3 -> 1.3.6.1.5.5.7.3
1.3.6.1.5 -> iso.org.dod.internet.security
1.3.6.1.5.5 -> iso.org.dod.internet.security.mechanisms
1.3.6.1.5.5.7 -> id-pkix
1.3.6.1.5.2 -> iso.org.dod.internet.security.kerberosV5
1.3.6.1.5.2.3 -> id-pkinit
1.3.6.1.4.1.311.20.2.2 -> id-ms-kp-sc-logon
Test complete.
certmonger-0.74/tests/009-oiddict/run.sh 0000775 0001750 0001750 00000001201 12317265222 014762 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
names='
id-kp
id-kp.1
id-kp.2
id-kp.3
id-kp.4
id-kp.5
id-kp.8
id-kp.9
id-kp-clientAuth
id-kp-codeSigning
id-kp-emailProtection
id-kp-OCSPSigning
id-kp-serverAuth
id-kp-timeStamping
id-ms-kp-sc-logon
id-pkinit
id-pkinit.4
id-pkinit.5
id-pkinit-KPClientAuth
id-pkinit-KPKdc
id-pkix
id-pkix.1
id-pkix.3
'
oids='
1.3.6.1.5
1.3.6.1.5.5
1.3.6.1.5.5.7
1.3.6.1.5.2
1.3.6.1.5.2.3
1.3.6.1.4.1.311.20.2.2
'
for name in $names ; do
oid=`$toolsdir/name2oid "$name"`
echo $name '->' $oid
done
for oid in $oids ; do
name=`$toolsdir/oid2name "$oid"`
echo $oid '->' $name
done
echo Test complete.
certmonger-0.74/tests/008-certread/ 0000775 0001750 0001750 00000000000 12317265252 014061 5 0000000 0000000 certmonger-0.74/tests/008-certread/expected.out 0000664 0001750 0001750 00000001755 12317265222 016340 0000000 0000000 cert_ca_path_length=-1
cert_email=babs@example.com
cert_is_ca=0
cert_issuer=CN=Babs Jensen
cert_issuer_der=3016311430120603550403130B42616273204A656E73656E
cert_not_after=20091211214654
cert_not_before=20091111214654
cert_principal=bjensen@EXAMPLE.COM
cert_serial=47
cert_spki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
cert_subject=CN=Babs Jensen
cert_subject_der=3016311430120603550403130B42616273204A656E73656E
cert_token=NSS Certificate DB
Test complete.
certmonger-0.74/tests/008-certread/run.sh 0000775 0001750 0001750 00000005506 12317265222 015147 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
cert='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'
echo "$cert" | sed -e 's,^$,,g' -e 's,^ ,,g' > cert.original
# Import it into NSS's database and read it back.
certutil -d "$tmpdir" -A -n cert -t u,u,u < cert.original
cat > entry.nss << EOF
id=Test
cert_storage_type=NSSDB
cert_storage_location=$tmpdir
cert_nickname=cert
EOF
$toolsdir/certread entry.nss
# Read it from a PEM file.
cp cert.original cert.openssl
cat > entry.openssl << EOF
id=Test
cert_storage_type=FILE
cert_storage_location=$tmpdir/cert.openssl
EOF
$toolsdir/certread entry.openssl
# Strip out storage keywords.
egrep -v '^(cert_storage_type|cert_storage_location|cert_nickname|cert_token)' entry.nss >\
entry.nss.clean
egrep -v '^(cert_storage_type|cert_storage_location|cert_nickname|cert_token)' entry.openssl >\
entry.openssl.clean
awk '/^cert=.*BEGIN CERTIFICATE/,/END CERTIFICATE/{print}{;}' entry.nss >> entry.nss.clean
awk '/^cert=.*BEGIN CERTIFICATE/,/END CERTIFICATE/{print}{;}' entry.openssl >> entry.openssl.clean
if ! grep -q '^cert=.*BEGIN CERTIFICATE' entry.nss.clean && \
! grep -q '^ -----END CERTIFICATE-----' entry.nss.clean ; then
echo Failed to pull certificate out of NSS.
exit 1
fi
if ! grep -q '^cert=.*BEGIN CERTIFICATE' entry.openssl.clean && \
! grep -q '^ -----END CERTIFICATE-----' entry.openssl.clean ; then
echo Failed to pull certificate out of OpenSSL.
exit 1
fi
# Compare the two cleaned entry files.
if ! cmp entry.nss.clean entry.openssl.clean ; then
echo Read certificates differently.
diff -u entry.nss.clean entry.openssl.clean
exit 1
fi
# Let the caller make sure it looks right.
grep ^cert_ entry.nss.clean | sort
grep ^cert_token entry.nss
echo Test complete.
certmonger-0.74/tests/007-certsave-sql/ 0000775 0001750 0001750 00000000000 12317265252 014700 5 0000000 0000000 certmonger-0.74/tests/007-certsave-sql/expected.out 0000664 0001750 0001750 00000002600 12317265222 017145 0000000 0000000 [nss:wrongnick]
[nss:wrongcert]
[nss:right]
1: "cert"
[openssl:wrong]
[openssl:right]
dos2unix: converting file cert.original to unix format ...
dos2unix: converting file cert.nss to unix format ...
dos2unix: converting file cert.openssl to unix format ...
[openssl:rosubdir]
Failed to save (FILE:${tmpdir}/rosubdir/cert.openssl), filesystem permissions error.
[openssl:rwsubdir]
Failed to save (FILE:${tmpdir}/rwsubdir/cert.openssl), filesystem permissions error.
Testing setting trust to ,,:
baseline: cert ,,
right nickname, right subject: cert ,,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to P,,:
baseline: cert P,,
right nickname, right subject: cert P,,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to ,P,:
baseline: cert ,P,
right nickname, right subject: cert ,P,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to CT,C,:
baseline: cert CT,C,
right nickname, right subject: cert CT,C,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to C,c,p:
baseline: cert C,c,p
right nickname, right subject: cert C,c,p
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Skipping rosubdir test.
Skipping rwsubdir test.
Test complete.
certmonger-0.74/tests/007-certsave-sql/run.sh 0000775 0001750 0001750 00000000070 12317265222 015755 0000000 0000000 #!/bin/sh -e
exec env scheme=sql ../007-certsave/run.sh
certmonger-0.74/tests/007-certsave-dbm/ 0000775 0001750 0001750 00000000000 12317265252 014643 5 0000000 0000000 certmonger-0.74/tests/007-certsave-dbm/expected.out 0000664 0001750 0001750 00000002774 12317265222 017124 0000000 0000000 [nss:wrongnick]
[nss:wrongcert]
[nss:right]
1: "cert"
[openssl:wrong]
[openssl:right]
dos2unix: converting file cert.original to unix format ...
dos2unix: converting file cert.nss to unix format ...
dos2unix: converting file cert.openssl to unix format ...
[openssl:rosubdir]
Failed to save (FILE:${tmpdir}/rosubdir/cert.openssl), filesystem permissions error.
[openssl:rwsubdir]
Failed to save (FILE:${tmpdir}/rwsubdir/cert.openssl), filesystem permissions error.
Testing setting trust to ,,:
baseline: cert ,,
right nickname, right subject: cert ,,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to P,,:
baseline: cert P,,
right nickname, right subject: cert P,,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to ,P,:
baseline: cert ,P,
right nickname, right subject: cert ,P,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to CT,C,:
baseline: cert CT,C,
right nickname, right subject: cert CT,C,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to C,c,p:
baseline: cert C,c,p
right nickname, right subject: cert C,c,p
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
[nss:rosubdir]
Failed to save (NSS:${tmpdir}/rosubdir), filesystem permissions error.
[nss:rwsubdir]
Failed to save (NSS:${tmpdir}/rwsubdir), filesystem permissions error.
Test complete.
certmonger-0.74/tests/007-certsave-dbm/run.sh 0000775 0001750 0001750 00000000070 12317265222 015720 0000000 0000000 #!/bin/sh -e
exec env scheme=dbm ../007-certsave/run.sh
certmonger-0.74/tests/007-certsave/ 0000775 0001750 0001750 00000000000 12317265252 014103 5 0000000 0000000 certmonger-0.74/tests/007-certsave/expected.out 0000664 0001750 0001750 00000002774 12317265222 016364 0000000 0000000 [nss:wrongnick]
[nss:wrongcert]
[nss:right]
1: "cert"
[openssl:wrong]
[openssl:right]
dos2unix: converting file cert.original to unix format ...
dos2unix: converting file cert.nss to unix format ...
dos2unix: converting file cert.openssl to unix format ...
[openssl:rosubdir]
Failed to save (FILE:${tmpdir}/rosubdir/cert.openssl), filesystem permissions error.
[openssl:rwsubdir]
Failed to save (FILE:${tmpdir}/rwsubdir/cert.openssl), filesystem permissions error.
Testing setting trust to ,,:
baseline: cert ,,
right nickname, right subject: cert ,,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to P,,:
baseline: cert P,,
right nickname, right subject: cert P,,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to ,P,:
baseline: cert ,P,
right nickname, right subject: cert ,P,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to CT,C,:
baseline: cert CT,C,
right nickname, right subject: cert CT,C,
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
Testing setting trust to C,c,p:
baseline: cert C,c,p
right nickname, right subject: cert C,c,p
wrong nickname, right subject: cert ,,
wrong subject, right nickname: cert ,,
[nss:rosubdir]
Failed to save (NSS:${tmpdir}/rosubdir), filesystem permissions error.
[nss:rwsubdir]
Failed to save (NSS:${tmpdir}/rwsubdir), filesystem permissions error.
Test complete.
certmonger-0.74/tests/007-certsave/run.sh 0000775 0001750 0001750 00000017354 12317265222 015175 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb ${scheme:+${scheme}:}$tmpdir
wrongcert='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'
cert='-----BEGIN CERTIFICATE-----
MIIDBTCCAe2gAwIBAgIBRDANBgkqhkiG9w0BAQsFADAAMB4XDTA5MTExMTE3MDMw
N1oXDTA5MTIxMTE3MDMwN1owADCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
ggEBAMeBHVwuakwxp4OsPT+ooghzyr5SsyKylKJ+QP4BnQzxNSmT3O+ubtRqgv/1
Rekj30Z56QMX3D9cgJfdRCmSTQ6JLpubgX1DZtgyHq4jnUtiYsObzQ83+OXlO/kU
ItGVJa2308+rAQ6FkpI8S0WwiXgfZIZmbIjghkpfj+XTPtjVsBwKVxr39++Hq0zA
+1YzKPZEe+mU0C8s7zh0tzEiXVEcOnwLL25QpEVDUVxdHKHBfnVOmsN9ju9BO48b
+zIIB5qtSSir+jTs9+JqRX00nsPXVonhXMHOxOjc9pMJV3D8wIfXzeW10xNA3YYC
i66XiZTicfsFV8Z47Mrq0yytCe0CAwEAAaOBiTCBhjB2BgNVHREBAQAEbDBqgRBi
YWJzQGV4YW1wbGUuY29toCMGCisGAQQBgjcUAgOgFQwTYmplbnNlbkBFWEFNUExF
LkNPTaAxBgYrBgEFAgKgJzAloA0bC0VYQU1QTEUuQ09NoRQwEqADAgEBoQswCRsH
YmplbnNlbjAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQAkHNQIKsgS
yhowGHe8wtFD8Z+4bdRJ0NruMGltj+69AZTBt3Jo5ZvS+4UWqfRTMqZf16/uQGVJ
BHVqYQr/LOkhB2j9vew7V4zhYPH23kAJO8P2lYZXX24nB8LlqRObVafPrQyrLVXU
W481O+AzIFBtNIoi+sbsVm0COp8JGUo5nooBip5+as8ufQqCUu0SxhMpaokri9mB
5V3fxIA1SquOw/6aIUEir5Mi2kKUCVYm8VP9CrdYu0vVGoBZ2GkNGsD4MZS/+a6v
Lgdt6ebhXuOUlaTMEYwgsJS4z9EB31oHyOt/YlJjR/fp434JRxPBfXAnXEzI9apG
/DXE+1dr1yFa
-----END CERTIFICATE-----'
echo "$cert" | sed -e 's,^$,,g' -e 's,^ ,,g' > cert.original
echo "$wrongcert" | sed -e 's,^$,,g' -e 's,^ ,,g' > cert.wrong
# Save the right certificate to NSS's database with the wrong nickname.
echo "[nss:wrongnick]"
cat > entry.nss << EOF
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir
cert_nickname=wrongnick
cert=$cert
EOF
$toolsdir/certsave entry.nss
# Save the wrong certificate to NSS's database with the right nickname.
echo "[nss:wrongcert]"
cat > entry.nss << EOF
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir
cert_nickname=cert
cert=$wrongcert
EOF
$toolsdir/certsave entry.nss
# Save the right certificate to NSS's database and read it back.
echo "[nss:right]"
cat > entry.nss << EOF
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir
cert_nickname=cert
cert=$cert
EOF
$toolsdir/certsave entry.nss
$toolsdir/listnicks entry.nss
certutil -d ${scheme:+${scheme}:}$tmpdir -L -n cert -a > cert.nss
# Save the wrong certificate to the PEM file.
echo "[openssl:wrong]"
cat > entry.openssl << EOF
cert_storage_type=FILE
cert_storage_location=$tmpdir/cert.openssl
cert=$wrongcert
EOF
$toolsdir/certsave entry.openssl
# Save the right certificate to the PEM file.
echo "[openssl:right]"
cat > entry.openssl << EOF
cert_storage_type=FILE
cert_storage_location=$tmpdir/cert.openssl
cert=$cert
EOF
$toolsdir/certsave entry.openssl
# Compare the three.
run_dos2unix cert.original
run_dos2unix cert.nss
run_dos2unix cert.openssl
if ! cmp cert.original cert.nss ; then
echo Original and NSS disagree "(${scheme:+${scheme}:}$tmpdir)".
cat cert.original cert.nss
exit 1
fi
if ! cmp cert.original cert.openssl ; then
echo Original and OpenSSL disagree.
cat cert.original cert.openssl
exit 1
fi
if ! cmp cert.nss cert.openssl ; then
echo NSS and OpenSSL disagree.
cat cert.nss cert.openssl
exit 1
fi
# Try to save the certificate to the read-only directory.
echo "[openssl:rosubdir]"
cat > entry.openssl << EOF
cert_storage_type=FILE
cert_storage_location=$tmpdir/rosubdir/cert.openssl
cert=$cert
EOF
$toolsdir/certsave entry.openssl || true
# Try to save the certificate to the read-write directory, read-only file.
echo "[openssl:rwsubdir]"
touch $tmpdir/rwsubdir/cert.openssl
chmod u-w $tmpdir/rwsubdir/cert.openssl
cat > entry.openssl << EOF
cert_storage_type=FILE
cert_storage_location=$tmpdir/rwsubdir/cert.openssl
cert=$cert
EOF
$toolsdir/certsave entry.openssl || true
# Now tweak the trust settings on the NSS certificate. The "u" flag seems to
# be tied to whether or not we have a matching private key, so we can't mess
# with it.
for trust in ,, P,, ,P, CT,C, C,c,p ; do
echo Testing setting trust to "$trust":
# Save the right certificate to NSS's database and read it back.
initnssdb ${scheme:+${scheme}:}$tmpdir
cat > entry.nss <<- EOF
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir
cert_nickname=cert
cert=$cert
EOF
$toolsdir/certsave entry.nss
certutil -d ${scheme:+${scheme}:}$tmpdir -M -n cert -t $trust
echo -n " baseline: "
certutil -d ${scheme:+${scheme}:}$tmpdir -L | grep cert | sed -r 's,[ \t]+, ,g'
$toolsdir/certsave entry.nss
echo -n " right nickname, right subject: "
certutil -d ${scheme:+${scheme}:}$tmpdir -L | grep cert | sed -r 's,[ \t]+, ,g'
# Save the right certificate to NSS's database with the wrong nickname.
initnssdb ${scheme:+${scheme}:}$tmpdir
$toolsdir/certsave entry.nss
cat > entry.nss <<- EOF
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir
cert_nickname=wrongnick
cert=$cert
EOF
$toolsdir/certsave entry.nss
certutil -d ${scheme:+${scheme}:}$tmpdir -M -n wrongnick -t $trust
# Save the right certificate to NSS's database and read it back.
cat > entry.nss <<- EOF
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir
cert_nickname=cert
cert=$cert
EOF
$toolsdir/certsave entry.nss
echo -n " wrong nickname, right subject: "
certutil -d ${scheme:+${scheme}:}$tmpdir -L | grep cert | sed -r 's,[ \t]+, ,g'
# Save the wrong certificate to NSS's database with the right nickname.
initnssdb ${scheme:+${scheme}:}$tmpdir
$toolsdir/certsave entry.nss
cat > entry.nss <<- EOF
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir
cert_nickname=cert
cert=$wrongcert
EOF
$toolsdir/certsave entry.nss
certutil -d ${scheme:+${scheme}:}$tmpdir -M -n cert -t $trust
# Save the right certificate to NSS's database and read it back.
cat > entry.nss <<- EOF
cert_storage_type=NSSDB
cert_storage_location=${scheme:+${scheme}:}$tmpdir
cert_nickname=cert
cert=$cert
EOF
$toolsdir/certsave entry.nss
echo -n " wrong subject, right nickname: "
certutil -d ${scheme:+${scheme}:}$tmpdir -L | grep cert | sed -r 's,[ \t]+, ,g'
done
if test "$scheme" = sql ; then
echo Skipping rosubdir test.
else
# Try to save the certificate to the read-only directory.
echo "[nss:rosubdir]"
cat > entry.nss <<- EOF
cert_storage_type=NSSDB
cert_storage_location=$tmpdir/rosubdir
cert_nickname=cert
cert=$cert
EOF
$toolsdir/certsave entry.nss || true
fi
if test "$scheme" = sql ; then
echo Skipping rwsubdir test.
else
# Try to save the certificate to the read-write directory, read-only file.
echo "[nss:rwsubdir]"
cat > entry.nss <<- EOF
cert_storage_type=NSSDB
cert_storage_location=$tmpdir/rwsubdir
cert_nickname=cert
cert=$cert
EOF
$toolsdir/certsave entry.nss || true
fi
echo Test complete.
certmonger-0.74/tests/006-serial/ 0000775 0001750 0001750 00000000000 12317265252 013545 5 0000000 0000000 certmonger-0.74/tests/006-serial/expected.out 0000664 0001750 0001750 00000011447 12317265222 016023 0000000 0000000 Starting value = 01
02
03
04
05
06
07
08
09
0A
0B
0C
0D
0E
0F
10
11
12
13
14
15
16
17
18
19
1A
1B
1C
1D
1E
1F
20
21
22
23
24
25
26
27
28
29
2A
2B
2C
2D
2E
2F
30
31
32
33
34
35
36
37
38
39
3A
3B
3C
3D
3E
3F
40
41
42
43
44
45
46
47
48
49
4A
4B
4C
4D
4E
4F
50
51
52
53
54
55
56
57
58
59
5A
5B
5C
5D
5E
5F
60
61
62
63
64
65
66
67
68
69
6A
6B
6C
6D
6E
6F
70
71
72
73
74
75
76
77
78
79
7A
7B
7C
7D
7E
7F
0080
0081
0082
0083
0084
0085
0086
0087
0088
0089
008A
008B
008C
008D
008E
008F
0090
0091
0092
0093
0094
0095
0096
0097
0098
0099
009A
009B
009C
009D
009E
009F
00A0
00A1
00A2
00A3
00A4
00A5
00A6
00A7
00A8
00A9
00AA
00AB
00AC
00AD
00AE
00AF
00B0
00B1
00B2
00B3
00B4
00B5
00B6
00B7
00B8
00B9
00BA
00BB
00BC
00BD
00BE
00BF
00C0
00C1
00C2
00C3
00C4
00C5
00C6
00C7
00C8
00C9
00CA
00CB
00CC
00CD
00CE
00CF
00D0
00D1
00D2
00D3
00D4
00D5
00D6
00D7
00D8
00D9
00DA
00DB
00DC
00DD
00DE
00DF
00E0
00E1
00E2
00E3
00E4
00E5
00E6
00E7
00E8
00E9
00EA
00EB
00EC
00ED
00EE
00EF
00F0
00F1
00F2
00F3
00F4
00F5
00F6
00F7
00F8
00F9
00FA
00FB
00FC
00FD
00FE
00FF
0100
0101
0102
0103
0104
0105
0106
0107
0108
0109
010A
010B
010C
010D
010E
010F
0110
0111
0112
0113
0114
0115
0116
0117
0118
0119
011A
011B
011C
011D
011E
011F
0120
0121
0122
0123
0124
0125
0126
0127
0128
0129
012A
012B
012C
012D
012E
012F
0130
0131
0132
0133
0134
0135
0136
0137
0138
0139
013A
013B
013C
013D
013E
013F
0140
0141
0142
0143
0144
0145
0146
0147
0148
0149
014A
014B
014C
014D
014E
014F
0150
0151
0152
0153
0154
0155
0156
0157
0158
0159
015A
015B
015C
015D
015E
015F
0160
0161
0162
0163
0164
0165
0166
0167
0168
0169
016A
016B
016C
016D
016E
016F
0170
0171
0172
0173
0174
0175
0176
0177
0178
0179
017A
017B
017C
017D
017E
017F
0180
0181
0182
0183
0184
0185
0186
0187
0188
0189
018A
018B
018C
018D
018E
018F
0190
0191
0192
0193
0194
0195
0196
0197
0198
0199
019A
019B
019C
019D
019E
019F
01A0
01A1
01A2
01A3
01A4
01A5
01A6
01A7
01A8
01A9
01AA
01AB
01AC
01AD
01AE
01AF
01B0
01B1
01B2
01B3
01B4
01B5
01B6
01B7
01B8
01B9
01BA
01BB
01BC
01BD
01BE
01BF
01C0
01C1
01C2
01C3
01C4
01C5
01C6
01C7
01C8
01C9
01CA
01CB
01CC
01CD
01CE
01CF
01D0
01D1
01D2
01D3
01D4
01D5
01D6
01D7
01D8
01D9
01DA
01DB
01DC
01DD
01DE
01DF
01E0
01E1
01E2
01E3
01E4
01E5
01E6
01E7
01E8
01E9
01EA
01EB
01EC
01ED
01EE
01EF
01F0
01F1
01F2
01F3
01F4
01F5
01F6
01F7
01F8
01F9
01FA
01FB
01FC
01FD
01FE
01FF
0200
0201
0202
0203
0204
0205
0206
0207
0208
0209
020A
020B
020C
020D
020E
020F
0210
0211
0212
0213
0214
0215
0216
0217
0218
0219
021A
021B
021C
021D
021E
021F
0220
0221
0222
0223
0224
0225
0226
0227
0228
0229
022A
022B
022C
022D
022E
022F
0230
0231
0232
0233
0234
0235
0236
0237
0238
0239
023A
023B
023C
023D
023E
023F
0240
0241
0242
0243
0244
0245
0246
0247
0248
0249
024A
024B
024C
024D
024E
024F
0250
0251
0252
0253
0254
0255
0256
0257
0258
0259
025A
025B
025C
025D
025E
025F
0260
0261
0262
0263
0264
0265
0266
0267
0268
0269
026A
026B
026C
026D
026E
026F
0270
0271
0272
0273
0274
0275
0276
0277
0278
0279
027A
027B
027C
027D
027E
027F
0280
0281
0282
0283
0284
0285
0286
0287
0288
0289
028A
028B
028C
028D
028E
028F
0290
0291
0292
0293
0294
0295
0296
0297
0298
0299
029A
029B
029C
029D
029E
029F
02A0
02A1
02A2
02A3
02A4
02A5
02A6
02A7
02A8
02A9
02AA
02AB
02AC
02AD
02AE
02AF
02B0
02B1
02B2
02B3
02B4
02B5
02B6
02B7
02B8
02B9
02BA
02BB
02BC
02BD
02BE
02BF
02C0
02C1
02C2
02C3
02C4
02C5
02C6
02C7
02C8
02C9
02CA
02CB
02CC
02CD
02CE
02CF
02D0
02D1
02D2
02D3
02D4
02D5
02D6
02D7
02D8
02D9
02DA
02DB
02DC
02DD
02DE
02DF
02E0
02E1
02E2
02E3
02E4
02E5
02E6
02E7
02E8
02E9
02EA
02EB
02EC
02ED
02EE
02EF
02F0
02F1
02F2
02F3
02F4
02F5
02F6
02F7
02F8
02F9
02FA
02FB
02FC
02FD
02FE
02FF
0300
0301
0302
0303
0304
0305
0306
0307
0308
0309
030A
030B
030C
030D
030E
030F
0310
0311
0312
0313
0314
0315
0316
0317
0318
0319
031A
031B
031C
031D
031E
031F
0320
0321
0322
0323
0324
0325
0326
0327
0328
0329
032A
032B
032C
032D
032E
032F
0330
0331
0332
0333
0334
0335
0336
0337
0338
0339
033A
033B
033C
033D
033E
033F
0340
0341
0342
0343
0344
0345
0346
0347
0348
0349
034A
034B
034C
034D
034E
034F
0350
0351
0352
0353
0354
0355
0356
0357
0358
0359
035A
035B
035C
035D
035E
035F
0360
0361
0362
0363
0364
0365
0366
0367
0368
0369
036A
036B
036C
036D
036E
036F
0370
0371
0372
0373
0374
0375
0376
0377
0378
0379
037A
037B
037C
037D
037E
037F
0380
0381
0382
0383
0384
0385
0386
0387
0388
0389
038A
038B
038C
038D
038E
038F
0390
0391
0392
0393
0394
0395
0396
0397
0398
0399
039A
039B
039C
039D
039E
039F
03A0
03A1
03A2
03A3
03A4
03A5
03A6
03A7
03A8
03A9
03AA
03AB
03AC
03AD
03AE
03AF
03B0
03B1
03B2
03B3
03B4
03B5
03B6
03B7
03B8
03B9
03BA
03BB
03BC
03BD
03BE
03BF
03C0
03C1
03C2
03C3
03C4
03C5
03C6
03C7
03C8
03C9
03CA
03CB
03CC
03CD
03CE
03CF
03D0
03D1
03D2
03D3
03D4
03D5
03D6
03D7
03D8
03D9
03DA
03DB
03DC
03DD
03DE
03DF
03E0
03E1
03E2
03E3
03E4
03E5
03E6
03E7
03E8
03E9
03EA
03EB
03EC
03ED
03EE
03EF
03F0
03F1
03F2
03F3
03F4
03F5
03F6
03F7
03F8
03F9
03FA
03FB
03FC
03FD
03FE
03FF
0400
0401
Test complete.
certmonger-0.74/tests/006-serial/run.sh 0000775 0001750 0001750 00000000155 12317265222 014626 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
"$builddir"/../src/serial-check
echo Test complete.
certmonger-0.74/tests/005-dbusm/ 0000775 0001750 0001750 00000000000 12317265252 013377 5 0000000 0000000 certmonger-0.74/tests/005-dbusm/expected.out 0000664 0001750 0001750 00000005006 12317265222 015647 0000000 0000000 Message 0 - b:TRUE
Message 1 - n:12345
Message 2 - p:/this/is/a/path/to/an/object
Message 3 - s:This is a string.
Message 4 - b:TRUE,p:/this/is/a/path/to/an/object
Message 5 - b:TRUE,s:This is a string.
Message 6 - s:This is a string.,b:TRUE
Message 7 - s:This is a string.,n:12345
Message 8 - s:This is a first string.,s:This is a second string.
Message 9 - [p:/this,p:/is,p:/a,p:/path,p:/array]
Message 10 - [s:This,s:is,s:a,s:string,s:array.]
Message 11 - s:This is a first string.,s:This is a second string.,s:This is a third string.
Message 12 - s:This is a first string.,s:This is a second string.,n:12345
Message 13 - s:This is a first string.,s:This is a second string.,b:TRUE
Message 14 - s:This is a first string.,s:This is a second string.,as:[s:This,s:is,s:a,s:string,s:array.]
Message 15 - s:This is a first string.,s:This is a second string.s:This is a third string.,s:This is a fourth string.
Message 16 - s:This is a first string.,s:This is a second string.s:(NULL)s:(NULL)
Message 17 - s:This is a first string.,s:This is a second string.s:This is a third string.s:(NULL)
Message 18 - s:This is a first string.,s:This is a second string.s:This is a third string.s:This is a fourth string.
Message 19 - s:This is a string.,s:(NULL)s:(NULL),s:(NULL)
Message 20 - s:This is a first string.,s:This is a second string.s:(NULL),s:(NULL)
Message 21 - s:This is a first string.,s:This is a second string.s:This is a third string.,s:(NULL)
Message 22 - s:This is a first string.,s:This is a second string.s:This is a third string.,s:This is a fourth string.
Message 23 - s:This is a first string.,s:This is a second string.,[s:This,s:is,s:a,s:string,s:array.]
Message 24 - s:This is a first string.,s:This is a second string.,s:This is a third string.,[s:This,s:is,s:a,s:string,s:array.]
Message 25 - s:This is a first string.,s:This is a second string.,s:This is a third string.,n:23456,[s:This,s:is,s:a,s:first,s:string,s:array.],[s:This,s:is,s:a,s:second,s:string,s:array.],[s:This,s:is,s:a,s:third,s:string,s:array.],n:34567,[s:This,s:is,s:a,s:fourth,s:string,s:array.]
Message 26 - s:This is a string.,[s:This,s:is,s:a,s:first,s:string,s:array.],[s:This,s:is,s:a,s:second,s:string,s:array.],[s:This,s:is,s:a,s:third,s:string,s:array.],n:12345,[s:This,s:is,s:a,s:fourth,s:string,s:array.]
Message 27 - [{key 0=b:TRUE},{key 1=n:12345},{key 2=s:this is a string value},{key 3=as:[This,is,a,string,array.]]
Message 28 - s:This is a string.,[{key 0=b:TRUE},{key 1=n:12345},{key 2=s:this is a string value},{key 3=as:[This,is,a,string,array.]]
Test complete.
certmonger-0.74/tests/005-dbusm/run.sh 0000775 0001750 0001750 00000000155 12317265222 014460 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
"$builddir"/../src/tdbusm-check
echo Test complete.
certmonger-0.74/tests/004-selfsign-rsa/ 0000775 0001750 0001750 00000000000 12317265252 014661 5 0000000 0000000 certmonger-0.74/tests/004-selfsign-rsa/expected.out 0000664 0001750 0001750 00000000104 12317265222 017123 0000000 0000000 512 OK.
1024 OK.
1536 OK.
2048 OK.
3072 OK.
4096 OK.
Test complete.
certmonger-0.74/tests/004-selfsign-rsa/run.sh 0000775 0001750 0001750 00000004157 12317265222 015750 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
grep -v ^validity_period $CERTMONGER_CONFIG_DIR/certmonger.conf > \
$tmpdir/certmonger.conf
cat >> $tmpdir/certmonger.conf << EOF
[selfsign]
validity_period = 46129s
EOF
function append() {
cat >> $1 <<- EOF
template_subject=CN=Babs Jensen
template_hostname=localhost,localhost.localdomain
template_email=root@localhost,root@localhost.localdomain
template_principal=root@EXAMPLE.COM,root@FOO.EXAMPLE.COM
template_ku=111
template_eku=id-kp-clientAuth,id-kp-emailProtection
EOF
}
function setupca() {
cat > ca.self <<- EOF
id=self_signer
ca_is_default=0
ca_type=INTERNAL:SELF
ca_internal_serial=04
ca_internal_issue_time=40271
EOF
}
for size in 512 1024 1536 2048 3072 4096 ; do
# Build a self-signed certificate.
run_certutil -d "$tmpdir" -S -g $size -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u -k rsa
# Export the certificate and key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1
openssl pkcs12 -in $size.p12 -passin pass: -out key.$size -nodes > /dev/null 2>&1
# Read that OpenSSL key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
EOF
$toolsdir/keyiread entry.$size > /dev/null 2>&1
grep ^key_pubkey_info= entry.$size > pubkey.$size
grep ^key_pubkey= entry.$size >> pubkey.$size
# Use that NSS key.
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
EOF
append entry.$size
cat pubkey.$size >> entry.$size
$toolsdir/csrgen entry.$size > csr.nss.$size
setupca
$toolsdir/submit ca.self entry.$size > cert.nss.$size
# Use that OpenSSL key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
EOF
append entry.$size
cat pubkey.$size >> entry.$size
$toolsdir/csrgen entry.$size > csr.openssl.$size
setupca
$toolsdir/submit ca.self entry.$size > cert.openssl.$size
# Now compare them.
if ! cmp cert.nss.$size cert.openssl.$size ; then
echo Certificates differ:
cat cert.nss.$size cert.openssl.$size
exit 1
else
echo $size OK.
fi
done
echo Test complete.
certmonger-0.74/tests/004-selfsign-ec/ 0000775 0001750 0001750 00000000000 12317265252 014463 5 0000000 0000000 certmonger-0.74/tests/004-selfsign-ec/expected.out 0000664 0001750 0001750 00000000057 12317265222 016734 0000000 0000000 verification OK
verification OK
Test complete.
certmonger-0.74/tests/004-selfsign-ec/run.sh 0000775 0001750 0001750 00000004044 12317265222 015545 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
grep -v ^validity_period $CERTMONGER_CONFIG_DIR/certmonger.conf > \
$tmpdir/certmonger.conf
cat >> $tmpdir/certmonger.conf << EOF
[selfsign]
validity_period = 46129s
EOF
function append() {
cat >> $1 <<- EOF
template_subject=CN=Babs Jensen
template_hostname=localhost,localhost.localdomain
template_email=root@localhost,root@localhost.localdomain
template_principal=root@EXAMPLE.COM,root@FOO.EXAMPLE.COM
template_ku=111
template_eku=id-kp-clientAuth,id-kp-emailProtection
EOF
}
function setupca() {
cat > ca.self <<- EOF
id=self_signer
ca_is_default=0
ca_type=INTERNAL:SELF
ca_internal_serial=04
ca_internal_issue_time=40271
EOF
}
size=secp256r1
# Build a self-signed certificate.
run_certutil -d "$tmpdir" -S -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u -k ec -q $size
# Export the certificate and key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1
openssl pkcs12 -in $size.p12 -passin pass: -out key.$size -nodes > /dev/null 2>&1
# Read that OpenSSL key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
EOF
$toolsdir/keyiread entry.$size > /dev/null 2>&1
grep ^key_pubkey_info= entry.$size > pubkey.$size
grep ^key_pubkey= entry.$size >> pubkey.$size
# Use that NSS key.
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
EOF
append entry.$size
cat pubkey.$size >> entry.$size
$toolsdir/csrgen entry.$size > csr.nss.$size
setupca
$toolsdir/submit ca.self entry.$size > cert.nss.$size
# Use that OpenSSL key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
EOF
append entry.$size
cat pubkey.$size >> entry.$size
$toolsdir/csrgen entry.$size > csr.openssl.$size
setupca
$toolsdir/submit ca.self entry.$size > cert.openssl.$size
# Now check their signatures.
grep -v CERTIFICATE cert.nss.$size | base64 -d | $toolsdir/checksig
grep -v CERTIFICATE cert.openssl.$size | base64 -d | $toolsdir/checksig
echo Test complete.
certmonger-0.74/tests/004-selfsign-dsa/ 0000775 0001750 0001750 00000000000 12317265252 014643 5 0000000 0000000 certmonger-0.74/tests/004-selfsign-dsa/expected.out 0000664 0001750 0001750 00000000057 12317265222 017114 0000000 0000000 verification OK
verification OK
Test complete.
certmonger-0.74/tests/004-selfsign-dsa/run.sh 0000775 0001750 0001750 00000004040 12317265222 015721 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
grep -v ^validity_period $CERTMONGER_CONFIG_DIR/certmonger.conf > \
$tmpdir/certmonger.conf
cat >> $tmpdir/certmonger.conf << EOF
[selfsign]
validity_period = 46129s
EOF
function append() {
cat >> $1 <<- EOF
template_subject=CN=Babs Jensen
template_hostname=localhost,localhost.localdomain
template_email=root@localhost,root@localhost.localdomain
template_principal=root@EXAMPLE.COM,root@FOO.EXAMPLE.COM
template_ku=111
template_eku=id-kp-clientAuth,id-kp-emailProtection
EOF
}
function setupca() {
cat > ca.self <<- EOF
id=self_signer
ca_is_default=0
ca_type=INTERNAL:SELF
ca_internal_serial=04
ca_internal_issue_time=40271
EOF
}
size=2048
# Build a self-signed certificate.
run_certutil -d "$tmpdir" -S -g $size -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u -k dsa
# Export the certificate and key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1
openssl pkcs12 -in $size.p12 -passin pass: -out key.$size -nodes > /dev/null 2>&1
# Read that OpenSSL key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
EOF
$toolsdir/keyiread entry.$size > /dev/null 2>&1
grep ^key_pubkey_info= entry.$size > pubkey.$size
grep ^key_pubkey= entry.$size >> pubkey.$size
# Use that NSS key.
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
EOF
append entry.$size
cat pubkey.$size >> entry.$size
$toolsdir/csrgen entry.$size > csr.nss.$size
setupca
$toolsdir/submit ca.self entry.$size > cert.nss.$size
# Use that OpenSSL key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
EOF
append entry.$size
cat pubkey.$size >> entry.$size
$toolsdir/csrgen entry.$size > csr.openssl.$size
setupca
$toolsdir/submit ca.self entry.$size > cert.openssl.$size
# Now check their signatures.
grep -v CERTIFICATE cert.nss.$size | base64 -d | $toolsdir/checksig
grep -v CERTIFICATE cert.openssl.$size | base64 -d | $toolsdir/checksig
echo Test complete.
certmonger-0.74/tests/004-selfsign/ 0000775 0001750 0001750 00000000000 12317265252 014076 5 0000000 0000000 certmonger-0.74/tests/004-selfsign/expected.out 0000664 0001750 0001750 00000000104 12317265222 016340 0000000 0000000 512 OK.
1024 OK.
1536 OK.
2048 OK.
3072 OK.
4096 OK.
Test complete.
certmonger-0.74/tests/004-selfsign/run.sh 0000775 0001750 0001750 00000004150 12317265222 015156 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
grep -v ^validity_period $CERTMONGER_CONFIG_DIR/certmonger.conf > \
$tmpdir/certmonger.conf
cat >> $tmpdir/certmonger.conf << EOF
[selfsign]
validity_period = 46129s
EOF
function append() {
cat >> $1 <<- EOF
template_subject=CN=Babs Jensen
template_hostname=localhost,localhost.localdomain
template_email=root@localhost,root@localhost.localdomain
template_principal=root@EXAMPLE.COM,root@FOO.EXAMPLE.COM
template_ku=111
template_eku=id-kp-clientAuth,id-kp-emailProtection
EOF
}
function setupca() {
cat > ca.self <<- EOF
id=self_signer
ca_is_default=0
ca_type=INTERNAL:SELF
ca_internal_serial=04
ca_internal_issue_time=40271
EOF
}
for size in 512 1024 1536 2048 3072 4096 ; do
# Build a self-signed certificate.
run_certutil -d "$tmpdir" -S -g $size -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u
# Export the certificate and key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1
openssl pkcs12 -in $size.p12 -passin pass: -out key.$size -nodes > /dev/null 2>&1
# Read that OpenSSL key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
EOF
$toolsdir/keyiread entry.$size > /dev/null 2>&1
grep ^key_pubkey_info= entry.$size > pubkey.$size
grep ^key_pubkey= entry.$size >> pubkey.$size
# Use that NSS key.
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
EOF
append entry.$size
cat pubkey.$size >> entry.$size
$toolsdir/csrgen entry.$size > csr.nss.$size
setupca
$toolsdir/submit ca.self entry.$size > cert.nss.$size
# Use that OpenSSL key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
EOF
append entry.$size
cat pubkey.$size >> entry.$size
$toolsdir/csrgen entry.$size > csr.openssl.$size
setupca
$toolsdir/submit ca.self entry.$size > cert.openssl.$size
# Now compare them.
if ! cmp cert.nss.$size cert.openssl.$size ; then
echo Certificates differ:
cat cert.nss.$size cert.openssl.$size
exit 1
else
echo $size OK.
fi
done
echo Test complete.
certmonger-0.74/tests/003-csrgen-rsa/ 0000775 0001750 0001750 00000000000 12317265252 014327 5 0000000 0000000 certmonger-0.74/tests/003-csrgen-rsa/expected.out 0000664 0001750 0001750 00000012243 12317265222 016600 0000000 0000000 pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
512 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
1024 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
1536 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
2048 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
3072 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
4096 OK.
Signature OK
The last CSR (the one with everything) was:
0:d=0 hl=4 l=1019 cons: SEQUENCE
4:d=1 hl=4 l= 933 cons: SEQUENCE
8:d=2 hl=2 l= 1 prim: INTEGER :00
11:d=2 hl=2 l= 22 cons: SEQUENCE
13:d=3 hl=2 l= 20 cons: SET
15:d=4 hl=2 l= 18 cons: SEQUENCE
17:d=5 hl=2 l= 3 prim: OBJECT :commonName
22:d=5 hl=2 l= 11 prim: PRINTABLESTRING :Babs Jensen
35:d=2 hl=2 l= 92 cons: SEQUENCE
37:d=3 hl=2 l= 13 cons: SEQUENCE
39:d=4 hl=2 l= 9 prim: OBJECT :rsaEncryption
50:d=4 hl=2 l= 0 prim: NULL
52:d=3 hl=2 l= 75 prim: BIT STRING
129:d=2 hl=4 l= 808 cons: cont [ 0 ]
133:d=3 hl=2 l= 52 cons: SEQUENCE
135:d=4 hl=2 l= 9 prim: OBJECT :challengePassword
146:d=4 hl=2 l= 39 cons: SET
148:d=5 hl=2 l= 37 prim: PRINTABLESTRING :ChallengePasswordIsEncodedInPlainText
187:d=3 hl=2 l= 61 cons: SEQUENCE
189:d=4 hl=2 l= 9 prim: OBJECT :friendlyName
200:d=4 hl=2 l= 48 cons: SET
202:d=5 hl=2 l= 46 prim: BMPSTRING
250:d=3 hl=4 l= 687 cons: SEQUENCE
254:d=4 hl=2 l= 9 prim: OBJECT :Extension Request
265:d=4 hl=4 l= 672 cons: SET
269:d=5 hl=4 l= 668 cons: SEQUENCE
273:d=6 hl=2 l= 14 cons: SEQUENCE
275:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Key Usage
280:d=7 hl=2 l= 1 prim: BOOLEAN :0
283:d=7 hl=2 l= 4 prim: OCTET STRING [HEX DUMP]:030205E0
289:d=6 hl=4 l= 264 cons: SEQUENCE
293:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Subject Alternative Name
298:d=7 hl=2 l= 1 prim: BOOLEAN :0
301:d=7 hl=3 l= 253 prim: OCTET STRING [HEX DUMP]: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
557:d=6 hl=2 l= 32 cons: SEQUENCE
559:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Extended Key Usage
564:d=7 hl=2 l= 1 prim: BOOLEAN :0
567:d=7 hl=2 l= 22 prim: OCTET STRING [HEX DUMP]:301406082B0601050507030206082B06010505070304
591:d=6 hl=2 l= 18 cons: SEQUENCE
593:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Basic Constraints
598:d=7 hl=2 l= 1 prim: BOOLEAN :255
601:d=7 hl=2 l= 8 prim: OCTET STRING [HEX DUMP]:30060101FF020103
611:d=6 hl=2 l= 34 cons: SEQUENCE
613:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Authority Key Identifier
618:d=7 hl=2 l= 1 prim: BOOLEAN :0
621:d=7 hl=2 l= 24 prim: OCTET STRING [HEX DUMP]:30168014A9993E364706816ABA3E25717850C26C9CD0D89D
647:d=6 hl=2 l= 32 cons: SEQUENCE
649:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Subject Key Identifier
654:d=7 hl=2 l= 1 prim: BOOLEAN :0
657:d=7 hl=2 l= 22 prim: OCTET STRING [HEX DUMP]:0414A9993E364706816ABA3E25717850C26C9CD0D89D
681:d=6 hl=2 l= 107 cons: SEQUENCE
683:d=7 hl=2 l= 8 prim: OBJECT :Authority Information Access
693:d=7 hl=2 l= 1 prim: BOOLEAN :0
696:d=7 hl=2 l= 92 prim: OCTET STRING [HEX DUMP]:305A302B06082B06010505073001861F687474703A2F2F6F6373702D312E6578616D706C652E636F6D3A3132333435302B06082B06010505073001861F687474703A2F2F6F6373702D322E6578616D706C652E636F6D3A3132333435
790:d=6 hl=2 l= 96 cons: SEQUENCE
792:d=7 hl=2 l= 3 prim: OBJECT :X509v3 CRL Distribution Points
797:d=7 hl=2 l= 1 prim: BOOLEAN :0
800:d=7 hl=2 l= 86 prim: OCTET STRING [HEX DUMP]:30543028A026A0248622687474703A2F2F63726C2D312E6578616D706C652E636F6D3A31323334352F6765743028A026A0248622687474703A2F2F63726C2D322E6578616D706C652E636F6D3A31323334352F676574
888:d=6 hl=2 l= 51 cons: SEQUENCE
890:d=7 hl=2 l= 9 prim: OBJECT :Netscape Comment
901:d=7 hl=2 l= 1 prim: BOOLEAN :0
904:d=7 hl=2 l= 35 prim: OCTET STRING [HEX DUMP]:1621636572746D6F6E6765722067656E65726174656420746869732072657175657374
941:d=1 hl=2 l= 13 cons: SEQUENCE
943:d=2 hl=2 l= 9 prim: OBJECT :sha256WithRSAEncryption
954:d=2 hl=2 l= 0 prim: NULL
956:d=1 hl=2 l= 65 prim: BIT STRING
Test complete (32 combinations).
certmonger-0.74/tests/003-csrgen-rsa/run.sh 0000775 0001750 0001750 00000020752 12317265222 015415 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in 512 1024 1536 2048 3072 4096 ; do
# Build a self-signed certificate.
run_certutil -d "$tmpdir" -S -g $size -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u -k rsa
# Export the key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size"
openssl pkcs12 -in $size.p12 -out key.$size -passin pass: -nodes -nocerts 2>&1
# Read the public key and cache it.
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
id=keyi$size
EOF
$toolsdir/keyiread entry.openssl.$size > /dev/null 2>&1
# Add the cached value to the prepping for the NSS copy.
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
id=keyi$size
EOF
grep ^key_pubkey_info= entry.openssl.$size >> entry.nss.$size
grep ^key_pubkey= entry.openssl.$size >> entry.nss.$size
# Generate a new CSR for that certificate's key.
$toolsdir/csrgen entry.nss.$size > csr.nss.$size
grep ^spkac entry.nss.$size | sed s,spkac,SPKAC, > spkac.nss.$size
# Generate a new CSR using the extracted key.
$toolsdir/csrgen entry.openssl.$size > csr.openssl.$size
grep ^spkac entry.openssl.$size | sed s,spkac,SPKAC, > spkac.openssl.$size
# They'd better be the same!
if cmp csr.nss.$size csr.openssl.$size ; then
if cmp spkac.nss.$size spkac.openssl.$size ; then
echo $size OK.
cat spkac.nss.$size | openssl spkac -verify -noout 2>&1
else
echo With basic/default settings, SPKACs differ:
cat spkac.nss.$size spkac.openssl.$size
exit 1
fi
else
echo With basic/default settings, these differ:
cat csr.nss.$size csr.openssl.$size
exit 1
fi
done
iterate() {
size=${1}
subject=${2}
hostname=${3}
email=${4}
principal=${5}
ku=${6}
eku=${7}
challengepassword=${8}
certfname=${9}
ca=${10}
capathlen=${11}
crldp=${12}
ocsp=${13}
nscomment=${14}
${certnickname:+cert_nickname=$cert_nickname}
# Generate a new CSR using the copy of the key that's in a file.
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
key_pubkey=616263
id=keyi$size
${certfname:+cert_nickname=$certfname}
${challengepassword:+challenge_password=$challengepassword}
${subject:+template_subject=$subject}
${hostname:+template_hostname=$hostname}
${email:+template_email=$email}
${principal:+template_principal=$principal}
${ku:+template_ku=$ku}
${eku:+template_eku=$eku}
${ca:+template_is_ca=$ca}
${capathlen:+template_ca_path_length=$capathlen}
${crldp:+template_crldp=$crldp}
${ocsp:+template_ocsp=$ocsp}
${nscomment:+template_ns_comment=$nscomment}
EOF
$toolsdir/keyiread entry.openssl.$size > /dev/null 2>&1
echo key_pubkey=616263 >> entry.openssl.$size
$toolsdir/csrgen entry.openssl.$size > csr.openssl.$size
# Generate a new CSR using the copy of the key in the NSS database.
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
key_pubkey=616263
id=keyi$size
${certfname:+cert_nickname=$certfname}
${challengepassword:+challenge_password=$challengepassword}
${subject:+template_subject=$subject}
${hostname:+template_hostname=$hostname}
${email:+template_email=$email}
${principal:+template_principal=$principal}
${ku:+template_ku=$ku}
${eku:+template_eku=$eku}
${ca:+template_is_ca=$ca}
${capathlen:+template_ca_path_length=$capathlen}
${crldp:+template_crldp=$crldp}
${ocsp:+template_ocsp=$ocsp}
${nscomment:+template_ns_comment=$nscomment}
EOF
grep ^key_pubkey_info= entry.openssl.$size >> entry.nss.$size
echo key_pubkey=616263 >> entry.openssl.$size
$toolsdir/csrgen entry.nss.$size > csr.nss.$size
# Both should verify.
if test "`openssl req -verify -key key.$size -in csr.openssl.$size -noout 2>&1`" != "verify OK" ; then
echo Signature failed for OpenSSL:
cat csr.openssl.$size
echo Private key:
awk '/BEGIN PRIVATE KEY/,/END PRIVATE KEY/{print}{;}' $tmpdir/key.$size
exit 1
fi
if test "`openssl req -verify -key key.$size -in csr.nss.$size -noout 2>&1`" != "verify OK" ; then
echo Signature failed for NSS:
cat csr.nss.$size
echo Private key:
awk '/BEGIN PRIVATE KEY/,/END PRIVATE KEY/{print}{;}' $tmpdir/key.$size
exit 1
fi
# They'd better be the same!
if ! cmp csr.nss.$size csr.openssl.$size ; then
echo With these settings:
tail -n +3 entry.nss.$size | sed 's,^$,,g'
echo These differ:
cat csr.nss.$size csr.openssl.$size
echo Private key:
awk '/BEGIN PRIVATE KEY/,/END PRIVATE KEY/{print}{;}' $tmpdir/key.$size
exit 1
fi
iteration=`expr $iteration + 1`
}
iteration=1
for size in 1024 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
for subject in CN=somehost "CN=Babs Jensen" ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
subject=
for hostname in "" localhost,localhost.localdomain; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
hostname=
for email in "" root@localhost,root@localhost.localdomain; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
email=
for principal in "" root@EXAMPLE.COM,root@FOO.EXAMPLE.COM; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
principal=
for ku in "" 1 10 111 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
ku=
for eku in "" id-kp-clientAuth,id-kp-emailProtection ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
eku=
for challengepassword in "" ChallengePasswordIsEncodedInPlainText ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
challengepassword=
for certfname in "" CertificateFriendlyName ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
certfname=
for ca in "" 0 1 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
ca=
for capathlen in -1 3 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
capathlen=
for crldp in "" http://crl-1.example.com:12345/get,http://crl-2.example.com:12345/get ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
crldp=
for ocsp in "" http://ocsp-1.example.com:12345,http://ocsp-2.example.com:12345 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
ocsp=
for nscomment in "" "certmonger generated this request" ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
done
nscomment=
size=512
subject="CN=Babs Jensen"
hostname=localhost,localhost.localdomain
email=root@localhost,root@localhost.localdomain
principal=root@EXAMPLE.COM,root@FOO.EXAMPLE.COM
ku=111
eku=id-kp-clientAuth,id-kp-emailProtection
challengepassword=ChallengePasswordIsEncodedInPlainText
certfname=CertificateFriendlyName
ca=1
capathlen=3
crldp=http://crl-1.example.com:12345/get,http://crl-2.example.com:12345/get
ocsp=http://ocsp-1.example.com:12345,http://ocsp-2.example.com:12345
nscomment="certmonger generated this request"
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
echo "The last CSR (the one with everything) was:"
openssl req -in csr.nss.$size -outform der | openssl asn1parse -inform der
echo Test complete "($iteration combinations)".
certmonger-0.74/tests/003-csrgen-ec/ 0000775 0001750 0001750 00000000000 12317265252 014131 5 0000000 0000000 certmonger-0.74/tests/003-csrgen-ec/expected.out 0000664 0001750 0001750 00000000075 12317265222 016402 0000000 0000000 verify OK
verify OK
Signature OK
Signature OK
Test complete.
certmonger-0.74/tests/003-csrgen-ec/run.sh 0000775 0001750 0001750 00000002773 12317265222 015222 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
size=secp256r1
# Build a self-signed certificate.
run_certutil -d "$tmpdir" -S -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u -k ec -q $size
# Export the key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1
openssl pkcs12 -in $size.p12 -out key.$size -passin pass: -nodes -nocerts > /dev/null 2>&1
# Read the public key and cache it.
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
id=keyi$size
EOF
$toolsdir/keyiread entry.openssl.$size > /dev/null 2>&1
# Add the cached value to the prepping for the NSS copy.
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
id=keyi$size
EOF
# Generate a new CSR for that certificate's key.
$toolsdir/csrgen entry.nss.$size > csr.nss.$size
grep ^spkac= entry.nss.$size | sed s,spkac,SPKAC, > spkac.nss.$size
# Generate a new CSR using the extracted key.
$toolsdir/csrgen entry.openssl.$size > csr.openssl.$size
grep ^spkac= entry.openssl.$size | sed s,spkac,SPKAC, > spkac.openssl.$size
# The RSA tests already verify the contents of the requests, so we really only
# need to care about the signatures passing verification.
openssl req -verify -noout < csr.nss.$size 2>&1
openssl req -verify -noout < csr.openssl.$size 2>&1
openssl spkac -verify -noout < spkac.nss.$size 2>&1
openssl spkac -verify -noout < spkac.openssl.$size 2>&1
echo Test complete.
certmonger-0.74/tests/003-csrgen-dsa/ 0000775 0001750 0001750 00000000000 12317265252 014311 5 0000000 0000000 certmonger-0.74/tests/003-csrgen-dsa/expected.out 0000664 0001750 0001750 00000000075 12317265222 016562 0000000 0000000 verify OK
verify OK
Signature OK
Signature OK
Test complete.
certmonger-0.74/tests/003-csrgen-dsa/run.sh 0000775 0001750 0001750 00000002766 12317265222 015404 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
size=2048
# Build a self-signed certificate.
run_certutil -d "$tmpdir" -S -g $size -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u -k dsa
# Export the key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1
openssl pkcs12 -in $size.p12 -out key.$size -passin pass: -nodes -nocerts > /dev/null 2>&1
# Read the public key and cache it.
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
id=keyi$size
EOF
$toolsdir/keyiread entry.openssl.$size > /dev/null 2>&1
# Add the cached value to the prepping for the NSS copy.
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
id=keyi$size
EOF
# Generate a new CSR for that certificate's key.
$toolsdir/csrgen entry.nss.$size > csr.nss.$size
grep ^spkac= entry.nss.$size | sed s,spkac,SPKAC, > spkac.nss.$size
# Generate a new CSR using the extracted key.
$toolsdir/csrgen entry.openssl.$size > csr.openssl.$size
grep ^spkac= entry.openssl.$size | sed s,spkac,SPKAC, > spkac.openssl.$size
# The RSA tests already verify the contents of the requests, so we really only
# need to care about the signatures passing verification.
openssl req -verify -noout < csr.nss.$size 2>&1
openssl req -verify -noout < csr.openssl.$size 2>&1
openssl spkac -verify -noout < spkac.nss.$size 2>&1
openssl spkac -verify -noout < spkac.openssl.$size 2>&1
echo Test complete.
certmonger-0.74/tests/003-csrgen/ 0000775 0001750 0001750 00000000000 12317265252 013544 5 0000000 0000000 certmonger-0.74/tests/003-csrgen/expected.out 0000664 0001750 0001750 00000012243 12317265222 016015 0000000 0000000 pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
512 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
1024 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
1536 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
2048 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
3072 OK.
Signature OK
pk12util: PKCS12 EXPORT SUCCESSFUL
MAC verified OK
4096 OK.
Signature OK
The last CSR (the one with everything) was:
0:d=0 hl=4 l=1019 cons: SEQUENCE
4:d=1 hl=4 l= 933 cons: SEQUENCE
8:d=2 hl=2 l= 1 prim: INTEGER :00
11:d=2 hl=2 l= 22 cons: SEQUENCE
13:d=3 hl=2 l= 20 cons: SET
15:d=4 hl=2 l= 18 cons: SEQUENCE
17:d=5 hl=2 l= 3 prim: OBJECT :commonName
22:d=5 hl=2 l= 11 prim: PRINTABLESTRING :Babs Jensen
35:d=2 hl=2 l= 92 cons: SEQUENCE
37:d=3 hl=2 l= 13 cons: SEQUENCE
39:d=4 hl=2 l= 9 prim: OBJECT :rsaEncryption
50:d=4 hl=2 l= 0 prim: NULL
52:d=3 hl=2 l= 75 prim: BIT STRING
129:d=2 hl=4 l= 808 cons: cont [ 0 ]
133:d=3 hl=2 l= 52 cons: SEQUENCE
135:d=4 hl=2 l= 9 prim: OBJECT :challengePassword
146:d=4 hl=2 l= 39 cons: SET
148:d=5 hl=2 l= 37 prim: PRINTABLESTRING :ChallengePasswordIsEncodedInPlainText
187:d=3 hl=2 l= 61 cons: SEQUENCE
189:d=4 hl=2 l= 9 prim: OBJECT :friendlyName
200:d=4 hl=2 l= 48 cons: SET
202:d=5 hl=2 l= 46 prim: BMPSTRING
250:d=3 hl=4 l= 687 cons: SEQUENCE
254:d=4 hl=2 l= 9 prim: OBJECT :Extension Request
265:d=4 hl=4 l= 672 cons: SET
269:d=5 hl=4 l= 668 cons: SEQUENCE
273:d=6 hl=2 l= 14 cons: SEQUENCE
275:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Key Usage
280:d=7 hl=2 l= 1 prim: BOOLEAN :0
283:d=7 hl=2 l= 4 prim: OCTET STRING [HEX DUMP]:030205E0
289:d=6 hl=4 l= 264 cons: SEQUENCE
293:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Subject Alternative Name
298:d=7 hl=2 l= 1 prim: BOOLEAN :0
301:d=7 hl=3 l= 253 prim: OCTET STRING [HEX DUMP]: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
557:d=6 hl=2 l= 32 cons: SEQUENCE
559:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Extended Key Usage
564:d=7 hl=2 l= 1 prim: BOOLEAN :0
567:d=7 hl=2 l= 22 prim: OCTET STRING [HEX DUMP]:301406082B0601050507030206082B06010505070304
591:d=6 hl=2 l= 18 cons: SEQUENCE
593:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Basic Constraints
598:d=7 hl=2 l= 1 prim: BOOLEAN :255
601:d=7 hl=2 l= 8 prim: OCTET STRING [HEX DUMP]:30060101FF020103
611:d=6 hl=2 l= 34 cons: SEQUENCE
613:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Authority Key Identifier
618:d=7 hl=2 l= 1 prim: BOOLEAN :0
621:d=7 hl=2 l= 24 prim: OCTET STRING [HEX DUMP]:30168014A9993E364706816ABA3E25717850C26C9CD0D89D
647:d=6 hl=2 l= 32 cons: SEQUENCE
649:d=7 hl=2 l= 3 prim: OBJECT :X509v3 Subject Key Identifier
654:d=7 hl=2 l= 1 prim: BOOLEAN :0
657:d=7 hl=2 l= 22 prim: OCTET STRING [HEX DUMP]:0414A9993E364706816ABA3E25717850C26C9CD0D89D
681:d=6 hl=2 l= 107 cons: SEQUENCE
683:d=7 hl=2 l= 8 prim: OBJECT :Authority Information Access
693:d=7 hl=2 l= 1 prim: BOOLEAN :0
696:d=7 hl=2 l= 92 prim: OCTET STRING [HEX DUMP]:305A302B06082B06010505073001861F687474703A2F2F6F6373702D312E6578616D706C652E636F6D3A3132333435302B06082B06010505073001861F687474703A2F2F6F6373702D322E6578616D706C652E636F6D3A3132333435
790:d=6 hl=2 l= 96 cons: SEQUENCE
792:d=7 hl=2 l= 3 prim: OBJECT :X509v3 CRL Distribution Points
797:d=7 hl=2 l= 1 prim: BOOLEAN :0
800:d=7 hl=2 l= 86 prim: OCTET STRING [HEX DUMP]:30543028A026A0248622687474703A2F2F63726C2D312E6578616D706C652E636F6D3A31323334352F6765743028A026A0248622687474703A2F2F63726C2D322E6578616D706C652E636F6D3A31323334352F676574
888:d=6 hl=2 l= 51 cons: SEQUENCE
890:d=7 hl=2 l= 9 prim: OBJECT :Netscape Comment
901:d=7 hl=2 l= 1 prim: BOOLEAN :0
904:d=7 hl=2 l= 35 prim: OCTET STRING [HEX DUMP]:1621636572746D6F6E6765722067656E65726174656420746869732072657175657374
941:d=1 hl=2 l= 13 cons: SEQUENCE
943:d=2 hl=2 l= 9 prim: OBJECT :sha256WithRSAEncryption
954:d=2 hl=2 l= 0 prim: NULL
956:d=1 hl=2 l= 65 prim: BIT STRING
Test complete (37 combinations).
certmonger-0.74/tests/003-csrgen/run.sh 0000775 0001750 0001750 00000022237 12317265222 014632 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in 512 1024 1536 2048 3072 4096 ; do
# Build a self-signed certificate.
run_certutil -d "$tmpdir" -S -g $size -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u
# Export the key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size"
openssl pkcs12 -in $size.p12 -out key.$size -passin pass: -nodes -nocerts 2>&1
# Read the public key and cache it.
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
id=keyi$size
EOF
$toolsdir/keyiread entry.openssl.$size > /dev/null 2>&1
# Add the cached value to the prepping for the NSS copy.
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
id=keyi$size
EOF
grep ^key_pubkey_info= entry.openssl.$size >> entry.nss.$size
grep ^key_pubkey= entry.openssl.$size >> entry.nss.$size
# Generate a new CSR for that certificate's key.
$toolsdir/csrgen entry.nss.$size > csr.nss.$size
grep ^spkac entry.nss.$size | sed s,spkac,SPKAC, > spkac.nss.$size
# Generate a new CSR using the extracted key.
$toolsdir/csrgen entry.openssl.$size > csr.openssl.$size
grep ^spkac entry.openssl.$size | sed s,spkac,SPKAC, > spkac.openssl.$size
# They'd better be the same!
if cmp csr.nss.$size csr.openssl.$size ; then
if cmp spkac.nss.$size spkac.openssl.$size ; then
echo $size OK.
cat spkac.nss.$size | openssl spkac -verify -noout 2>&1
else
echo With basic/default settings, SPKACs differ \(NSS, OpenSSL\):
cat spkac.nss.$size spkac.openssl.$size
exit 1
fi
else
echo With basic/default settings, these differ \(NSS, OpenSSL\):
cat csr.nss.$size csr.openssl.$size
exit 1
fi
done
iterate() {
size=${1}
subject=${2}
hostname=${3}
email=${4}
principal=${5}
ku=${6}
eku=${7}
challengepassword=${8}
certfname=${9}
ca=${10}
capathlen=${11}
crldp=${12}
ocsp=${13}
nscomment=${14}
subjectder=${15}
${certnickname:+cert_nickname=$cert_nickname}
# Generate a new CSR using the copy of the key that's in a file.
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
key_pubkey=616263
id=keyi$size
${certfname:+cert_nickname=$certfname}
${challengepassword:+challenge_password=$challengepassword}
${subject:+template_subject=$subject}
${subjectder:+template_subject_der=$subjectder}
${hostname:+template_hostname=$hostname}
${email:+template_email=$email}
${principal:+template_principal=$principal}
${ku:+template_ku=$ku}
${eku:+template_eku=$eku}
${ca:+template_is_ca=$ca}
${capathlen:+template_ca_path_length=$capathlen}
${crldp:+template_crldp=$crldp}
${ocsp:+template_ocsp=$ocsp}
${nscomment:+template_ns_comment=$nscomment}
EOF
$toolsdir/keyiread entry.openssl.$size > /dev/null 2>&1
echo key_pubkey=616263 >> entry.openssl.$size
$toolsdir/csrgen entry.openssl.$size > csr.openssl.$size
# Generate a new CSR using the copy of the key in the NSS database.
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
key_pubkey=616263
id=keyi$size
${certfname:+cert_nickname=$certfname}
${challengepassword:+challenge_password=$challengepassword}
${subject:+template_subject=$subject}
${subjectder:+template_subject_der=$subjectder}
${hostname:+template_hostname=$hostname}
${email:+template_email=$email}
${principal:+template_principal=$principal}
${ku:+template_ku=$ku}
${eku:+template_eku=$eku}
${ca:+template_is_ca=$ca}
${capathlen:+template_ca_path_length=$capathlen}
${crldp:+template_crldp=$crldp}
${ocsp:+template_ocsp=$ocsp}
${nscomment:+template_ns_comment=$nscomment}
EOF
grep ^key_pubkey_info= entry.openssl.$size >> entry.nss.$size
echo key_pubkey=616263 >> entry.openssl.$size
$toolsdir/csrgen entry.nss.$size > csr.nss.$size
# Both should verify.
if test "`openssl req -verify -key key.$size -in csr.openssl.$size -noout 2>&1`" != "verify OK" ; then
echo Signature failed for OpenSSL:
cat csr.openssl.$size
echo Private key:
awk '/BEGIN PRIVATE KEY/,/END PRIVATE KEY/{print}{;}' $tmpdir/key.$size
exit 1
fi
if test "`openssl req -verify -key key.$size -in csr.nss.$size -noout 2>&1`" != "verify OK" ; then
echo Signature failed for NSS:
cat csr.nss.$size
echo Private key:
awk '/BEGIN PRIVATE KEY/,/END PRIVATE KEY/{print}{;}' $tmpdir/key.$size
exit 1
fi
# They'd better be the same!
if ! cmp csr.nss.$size csr.openssl.$size ; then
echo With these settings:
tail -n +3 entry.nss.$size | sed 's,^$,,g'
echo These differ \(NSS, OpenSSL\):
cat csr.nss.$size csr.openssl.$size
echo Private key:
awk '/BEGIN PRIVATE KEY/,/END PRIVATE KEY/{print}{;}' $tmpdir/key.$size
exit 1
fi
iteration=`expr $iteration + 1`
}
iteration=1
for size in 1024 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
for subject in "" "Babs Jensen" CN=somehost "CN=Babs Jensen" ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
subject=
for subjectder in "" 30223120301E060355040313177361 30223120301E0603550403131773616265722E626F73746F6E2E7265646861742E636F6D ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
subjectder=
for hostname in "" localhost,localhost.localdomain; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
hostname=
for email in "" root@localhost,root@localhost.localdomain; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
email=
for principal in "" root@EXAMPLE.COM,root@FOO.EXAMPLE.COM; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
principal=
for ku in "" 1 10 111 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
ku=
for eku in "" id-kp-clientAuth,id-kp-emailProtection ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
eku=
for challengepassword in "" ChallengePasswordIsEncodedInPlainText ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
challengepassword=
for certfname in "" CertificateFriendlyName ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
certfname=
for ca in "" 0 1 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
ca=
for capathlen in -1 3 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
capathlen=
for crldp in "" http://crl-1.example.com:12345/get,http://crl-2.example.com:12345/get ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
crldp=
for ocsp in "" http://ocsp-1.example.com:12345,http://ocsp-2.example.com:12345 ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
ocsp=
for nscomment in "" "certmonger generated this request" ; do
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment" "$subjectder"
done
nscomment=
size=512
subject="CN=Babs Jensen"
hostname=localhost,localhost.localdomain
email=root@localhost,root@localhost.localdomain
principal=root@EXAMPLE.COM,root@FOO.EXAMPLE.COM
ku=111
eku=id-kp-clientAuth,id-kp-emailProtection
challengepassword=ChallengePasswordIsEncodedInPlainText
certfname=CertificateFriendlyName
ca=1
capathlen=3
crldp=http://crl-1.example.com:12345/get,http://crl-2.example.com:12345/get
ocsp=http://ocsp-1.example.com:12345,http://ocsp-2.example.com:12345
nscomment="certmonger generated this request"
iterate "$size" "$subject" "$hostname" "$email" "$principal" "$ku" "$eku" "$challengepassword" "$certfname" "$ca" "$capathlen" "$crldp" "$ocsp" "$nscomment"
echo "The last CSR (the one with everything) was:"
openssl req -in csr.nss.$size -outform der | openssl asn1parse -inform der
echo Test complete "($iteration combinations)".
certmonger-0.74/tests/002-keygen-rsa/ 0000775 0001750 0001750 00000000000 12317265252 014327 5 0000000 0000000 certmonger-0.74/tests/002-keygen-rsa/expected.out 0000664 0001750 0001750 00000001331 12317265222 016574 0000000 0000000 [nss:512]
OK.
OK (RSA:512).
[nss:1024]
OK.
OK (RSA:1024).
[nss:1536]
OK.
OK (RSA:1536).
[nss:2048]
OK.
OK (RSA:2048).
[nss:3072]
OK.
OK (RSA:3072).
[nss:4096]
OK.
OK (RSA:4096).
[nss:rosubdir]
Failed to save NSS:${tmpdir}/rosubdir: need fs permissions.
[nss:rwsubdir]
Failed to save NSS:${tmpdir}/rwsubdir: need fs permissions.
[openssl:512]
OK.
OK (RSA:512).
[openssl:1024]
OK.
OK (RSA:1024).
[openssl:1536]
OK.
OK (RSA:1536).
[openssl:2048]
OK.
OK (RSA:2048).
[openssl:3072]
OK.
OK (RSA:3072).
[openssl:4096]
OK.
OK (RSA:4096).
[openssl:rosubdir]
Failed to save FILE:${tmpdir}/rosubdir/sample.4096: need fs permissions.
[openssl:rwsubdir]
Failed to save FILE:${tmpdir}/rwsubdir/sample.4096: need fs permissions.
Test complete.
certmonger-0.74/tests/002-keygen-rsa/run.sh 0000775 0001750 0001750 00000003273 12317265222 015414 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in 512 1024 1536 2048 3072 4096 ; do
echo "[nss:$size]"
# Generate a key.
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
key_gen_size=$size
key_gen_type=RSA
EOF
$toolsdir/keygen entry.$size
# Read the type and size.
sed -i 's,^key_gen_size.*,,g' entry.$size
$toolsdir/keyiread entry.$size
done
echo "[nss:rosubdir]"
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir/rosubdir
key_nickname=keyi$size
key_gen_size=$size
key_gen_type=RSA
EOF
$toolsdir/keygen entry.$size || true
echo "[nss:rwsubdir]"
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir/rwsubdir
key_nickname=keyi$size
key_gen_size=$size
key_gen_type=RSA
EOF
$toolsdir/keygen entry.$size || true
for size in 512 1024 1536 2048 3072 4096 ; do
echo "[openssl:$size]"
# Generate a key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/sample.$size
key_gen_size=$size
key_gen_type=RSA
EOF
$toolsdir/keygen entry.$size
# Read the size.
sed -i 's,^key_gen_size.*,,g' entry.$size
$toolsdir/keyiread entry.$size
done
echo "[openssl:rosubdir]"
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/rosubdir/sample.$size
key_gen_size=$size
key_gen_type=RSA
EOF
$toolsdir/keygen entry.$size || true
echo "[openssl:rwsubdir]"
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/rwsubdir/sample.$size
key_gen_size=$size
key_gen_type=RSA
EOF
touch $tmpdir/rwsubdir/sample.$size
chmod u-w $tmpdir/rwsubdir/sample.$size
$toolsdir/keygen entry.$size || true
echo Test complete.
certmonger-0.74/tests/002-keygen-ec/ 0000775 0001750 0001750 00000000000 12317265252 014131 5 0000000 0000000 certmonger-0.74/tests/002-keygen-ec/expected.out.4 0000664 0001750 0001750 00000001011 12317265222 016533 0000000 0000000 [nss:256]
OK.
OK (EC:256).
[nss:384]
OK.
OK (EC:384).
[nss:521]
OK.
OK (EC:384).
[nss:rosubdir]
Failed to save NSS:${tmpdir}/rosubdir: need fs permissions.
[nss:rwsubdir]
Failed to save NSS:${tmpdir}/rwsubdir: need fs permissions.
[openssl:256]
OK.
OK (EC:256).
[openssl:384]
OK.
OK (EC:384).
[openssl:521]
OK.
OK (EC:521).
[openssl:rosubdir]
Failed to save FILE:${tmpdir}/rosubdir/sample.521: need fs permissions.
[openssl:rwsubdir]
Failed to save FILE:${tmpdir}/rwsubdir/sample.521: need fs permissions.
Test complete.
certmonger-0.74/tests/002-keygen-ec/expected.out.3 0000664 0001750 0001750 00000001011 12317265222 016532 0000000 0000000 [nss:256]
OK.
OK (EC:256).
[nss:384]
OK.
OK (EC:384).
[nss:521]
OK.
OK (EC:384).
[nss:rosubdir]
Failed to save NSS:${tmpdir}/rosubdir: need fs permissions.
[nss:rwsubdir]
Failed to save NSS:${tmpdir}/rwsubdir: need fs permissions.
[openssl:256]
OK.
OK (EC:256).
[openssl:384]
OK.
OK (EC:384).
[openssl:521]
OK.
OK (EC:384).
[openssl:rosubdir]
Failed to save FILE:${tmpdir}/rosubdir/sample.521: need fs permissions.
[openssl:rwsubdir]
Failed to save FILE:${tmpdir}/rwsubdir/sample.521: need fs permissions.
Test complete.
certmonger-0.74/tests/002-keygen-ec/expected.out.2 0000664 0001750 0001750 00000001011 12317265222 016531 0000000 0000000 [nss:256]
OK.
OK (EC:256).
[nss:384]
OK.
OK (EC:384).
[nss:521]
OK.
OK (EC:521).
[nss:rosubdir]
Failed to save NSS:${tmpdir}/rosubdir: need fs permissions.
[nss:rwsubdir]
Failed to save NSS:${tmpdir}/rwsubdir: need fs permissions.
[openssl:256]
OK.
OK (EC:256).
[openssl:384]
OK.
OK (EC:384).
[openssl:521]
OK.
OK (EC:384).
[openssl:rosubdir]
Failed to save FILE:${tmpdir}/rosubdir/sample.521: need fs permissions.
[openssl:rwsubdir]
Failed to save FILE:${tmpdir}/rwsubdir/sample.521: need fs permissions.
Test complete.
certmonger-0.74/tests/002-keygen-ec/expected.out 0000664 0001750 0001750 00000001011 12317265222 016371 0000000 0000000 [nss:256]
OK.
OK (EC:256).
[nss:384]
OK.
OK (EC:384).
[nss:521]
OK.
OK (EC:521).
[nss:rosubdir]
Failed to save NSS:${tmpdir}/rosubdir: need fs permissions.
[nss:rwsubdir]
Failed to save NSS:${tmpdir}/rwsubdir: need fs permissions.
[openssl:256]
OK.
OK (EC:256).
[openssl:384]
OK.
OK (EC:384).
[openssl:521]
OK.
OK (EC:521).
[openssl:rosubdir]
Failed to save FILE:${tmpdir}/rosubdir/sample.521: need fs permissions.
[openssl:rwsubdir]
Failed to save FILE:${tmpdir}/rwsubdir/sample.521: need fs permissions.
Test complete.
certmonger-0.74/tests/002-keygen-ec/run.sh 0000775 0001750 0001750 00000003223 12317265222 015211 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in 256 384 521 ; do
echo "[nss:$size]"
# Generate a key.
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
key_gen_size=$size
key_gen_type=EC
EOF
$toolsdir/keygen entry.$size
# Read the type and size.
sed -i 's,^key_gen_size.*,,g' entry.$size
$toolsdir/keyiread entry.$size
done
echo "[nss:rosubdir]"
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir/rosubdir
key_nickname=keyi$size
key_gen_size=$size
key_gen_type=EC
EOF
$toolsdir/keygen entry.$size || true
echo "[nss:rwsubdir]"
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir/rwsubdir
key_nickname=keyi$size
key_gen_size=$size
key_gen_type=EC
EOF
$toolsdir/keygen entry.$size || true
for size in 256 384 521 ; do
echo "[openssl:$size]"
# Generate a key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/sample.$size
key_gen_size=$size
key_gen_type=EC
EOF
$toolsdir/keygen entry.$size
# Read the size.
sed -i 's,^key_gen_size.*,,g' entry.$size
$toolsdir/keyiread entry.$size
done
echo "[openssl:rosubdir]"
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/rosubdir/sample.$size
key_gen_size=$size
key_gen_type=EC
EOF
$toolsdir/keygen entry.$size || true
echo "[openssl:rwsubdir]"
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/rwsubdir/sample.$size
key_gen_size=$size
key_gen_type=EC
EOF
touch $tmpdir/rwsubdir/sample.$size
chmod u-w $tmpdir/rwsubdir/sample.$size
$toolsdir/keygen entry.$size || true
echo Test complete.
certmonger-0.74/tests/002-keygen-dsa/ 0000775 0001750 0001750 00000000000 12317265252 014311 5 0000000 0000000 certmonger-0.74/tests/002-keygen-dsa/expected.out 0000664 0001750 0001750 00000001331 12317265222 016556 0000000 0000000 [nss:512]
OK.
OK (DSA:512).
[nss:1024]
OK.
OK (DSA:1024).
[nss:1536]
OK.
OK (DSA:2048).
[nss:2048]
OK.
OK (DSA:2048).
[nss:3072]
OK.
OK (DSA:3072).
[nss:4096]
OK.
OK (DSA:3072).
[nss:rosubdir]
Failed to save NSS:${tmpdir}/rosubdir: need fs permissions.
[nss:rwsubdir]
Failed to save NSS:${tmpdir}/rwsubdir: need fs permissions.
[openssl:512]
OK.
OK (DSA:512).
[openssl:1024]
OK.
OK (DSA:1024).
[openssl:1536]
OK.
OK (DSA:1536).
[openssl:2048]
OK.
OK (DSA:2048).
[openssl:3072]
OK.
OK (DSA:3072).
[openssl:4096]
OK.
OK (DSA:4096).
[openssl:rosubdir]
Failed to save FILE:${tmpdir}/rosubdir/sample.4096: need fs permissions.
[openssl:rwsubdir]
Failed to save FILE:${tmpdir}/rwsubdir/sample.4096: need fs permissions.
Test complete.
certmonger-0.74/tests/002-keygen-dsa/run.sh 0000775 0001750 0001750 00000003273 12317265222 015376 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in 512 1024 1536 2048 3072 4096 ; do
echo "[nss:$size]"
# Generate a key.
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
key_gen_size=$size
key_gen_type=DSA
EOF
$toolsdir/keygen entry.$size
# Read the type and size.
sed -i 's,^key_gen_size.*,,g' entry.$size
$toolsdir/keyiread entry.$size
done
echo "[nss:rosubdir]"
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir/rosubdir
key_nickname=keyi$size
key_gen_size=$size
key_gen_type=DSA
EOF
$toolsdir/keygen entry.$size || true
echo "[nss:rwsubdir]"
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir/rwsubdir
key_nickname=keyi$size
key_gen_size=$size
key_gen_type=DSA
EOF
$toolsdir/keygen entry.$size || true
for size in 512 1024 1536 2048 3072 4096 ; do
echo "[openssl:$size]"
# Generate a key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/sample.$size
key_gen_size=$size
key_gen_type=DSA
EOF
$toolsdir/keygen entry.$size
# Read the size.
sed -i 's,^key_gen_size.*,,g' entry.$size
$toolsdir/keyiread entry.$size
done
echo "[openssl:rosubdir]"
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/rosubdir/sample.$size
key_gen_size=$size
key_gen_type=DSA
EOF
$toolsdir/keygen entry.$size || true
echo "[openssl:rwsubdir]"
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/rwsubdir/sample.$size
key_gen_size=$size
key_gen_type=DSA
EOF
touch $tmpdir/rwsubdir/sample.$size
chmod u-w $tmpdir/rwsubdir/sample.$size
$toolsdir/keygen entry.$size || true
echo Test complete.
certmonger-0.74/tests/002-keygen/ 0000775 0001750 0001750 00000000000 12317265252 013544 5 0000000 0000000 certmonger-0.74/tests/002-keygen/expected.out 0000664 0001750 0001750 00000001331 12317265222 016011 0000000 0000000 [nss:512]
OK.
OK (RSA:512).
[nss:1024]
OK.
OK (RSA:1024).
[nss:1536]
OK.
OK (RSA:1536).
[nss:2048]
OK.
OK (RSA:2048).
[nss:3072]
OK.
OK (RSA:3072).
[nss:4096]
OK.
OK (RSA:4096).
[nss:rosubdir]
Failed to save NSS:${tmpdir}/rosubdir: need fs permissions.
[nss:rwsubdir]
Failed to save NSS:${tmpdir}/rwsubdir: need fs permissions.
[openssl:512]
OK.
OK (RSA:512).
[openssl:1024]
OK.
OK (RSA:1024).
[openssl:1536]
OK.
OK (RSA:1536).
[openssl:2048]
OK.
OK (RSA:2048).
[openssl:3072]
OK.
OK (RSA:3072).
[openssl:4096]
OK.
OK (RSA:4096).
[openssl:rosubdir]
Failed to save FILE:${tmpdir}/rosubdir/sample.4096: need fs permissions.
[openssl:rwsubdir]
Failed to save FILE:${tmpdir}/rwsubdir/sample.4096: need fs permissions.
Test complete.
certmonger-0.74/tests/002-keygen/run.sh 0000775 0001750 0001750 00000003123 12317265222 014623 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in 512 1024 1536 2048 3072 4096 ; do
echo "[nss:$size]"
# Generate a key.
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
key_gen_size=$size
EOF
$toolsdir/keygen entry.$size
# Read the type and size.
sed -i 's,^key_gen_size.*,,g' entry.$size
$toolsdir/keyiread entry.$size
done
echo "[nss:rosubdir]"
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir/rosubdir
key_nickname=keyi$size
key_gen_size=$size
EOF
$toolsdir/keygen entry.$size || true
echo "[nss:rwsubdir]"
cat > entry.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir/rwsubdir
key_nickname=keyi$size
key_gen_size=$size
EOF
$toolsdir/keygen entry.$size || true
for size in 512 1024 1536 2048 3072 4096 ; do
echo "[openssl:$size]"
# Generate a key.
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/sample.$size
key_gen_size=$size
EOF
$toolsdir/keygen entry.$size
# Read the size.
sed -i 's,^key_gen_size.*,,g' entry.$size
$toolsdir/keyiread entry.$size
done
echo "[openssl:rosubdir]"
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/rosubdir/sample.$size
key_gen_size=$size
EOF
$toolsdir/keygen entry.$size || true
echo "[openssl:rwsubdir]"
cat > entry.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/rwsubdir/sample.$size
key_gen_size=$size
EOF
touch $tmpdir/rwsubdir/sample.$size
chmod u-w $tmpdir/rwsubdir/sample.$size
$toolsdir/keygen entry.$size || true
echo Test complete.
certmonger-0.74/tests/001-keyiread-rsa/ 0000775 0001750 0001750 00000000000 12317265252 014641 5 0000000 0000000 certmonger-0.74/tests/001-keyiread-rsa/expected.out 0000664 0001750 0001750 00000000301 12317265222 017102 0000000 0000000 OK (RSA:512).
OK (RSA:1024).
OK (RSA:1536).
OK (RSA:2048).
OK (RSA:3072).
OK (RSA:4096).
OK (RSA:512).
OK (RSA:1024).
OK (RSA:1536).
OK (RSA:2048).
OK (RSA:3072).
OK (RSA:4096).
Test complete.
certmonger-0.74/tests/001-keyiread-rsa/run.sh 0000775 0001750 0001750 00000002343 12317265222 015723 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in 512 1024 1536 2048 3072 4096 ; do
# Generate a self-signed cert.
run_certutil -d "$tmpdir" -S -g $size -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u -k rsa
# Export the key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1
openssl pkcs12 -in $size.p12 -out key.$size -passin pass: -nodes -nocerts > /dev/null 2>&1
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
EOF
$toolsdir/keyiread entry.openssl.$size > /dev/null 2>&1
# Check the size of the key.
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
EOF
grep ^key_pubkey_info= entry.openssl.$size >> entry.nss.$size
grep ^key_pubkey= entry.openssl.$size >> entry.nss.$size
$toolsdir/keyiread entry.nss.$size
done
for size in 512 1024 1536 2048 3072 4096 ; do
# Generate a key.
openssl genrsa $size > sample.$size 2> /dev/null
# Check the size of the key.
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/sample.$size
EOF
$toolsdir/keyiread entry.openssl.$size
done
echo Test complete.
certmonger-0.74/tests/001-keyiread-ec/ 0000775 0001750 0001750 00000000000 12317265252 014443 5 0000000 0000000 certmonger-0.74/tests/001-keyiread-ec/expected.out.4 0000664 0001750 0001750 00000000205 12317265222 017051 0000000 0000000 OK (EC:256).
OK (EC:256).
OK (EC:384).
OK (EC:384).
OK (EC:384).
Error parsing exported key for nistp521, continuing.
Test complete.
certmonger-0.74/tests/001-keyiread-ec/expected.out.3 0000664 0001750 0001750 00000000205 12317265222 017050 0000000 0000000 OK (EC:256).
OK (EC:256).
OK (EC:384).
OK (EC:384).
OK (EC:521).
Error parsing exported key for nistp521, continuing.
Test complete.
certmonger-0.74/tests/001-keyiread-ec/expected.out.2 0000664 0001750 0001750 00000000135 12317265222 017051 0000000 0000000 OK (EC:256).
OK (EC:256).
OK (EC:384).
OK (EC:384).
OK (EC:384).
OK (EC:521).
Test complete.
certmonger-0.74/tests/001-keyiread-ec/expected.out 0000664 0001750 0001750 00000000135 12317265222 016711 0000000 0000000 OK (EC:256).
OK (EC:256).
OK (EC:384).
OK (EC:384).
OK (EC:521).
OK (EC:521).
Test complete.
certmonger-0.74/tests/001-keyiread-ec/run.sh 0000775 0001750 0001750 00000001716 12317265222 015530 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in nistp256 nistp384 nistp521 ; do
# Generate a self-signed cert.
run_certutil -d "$tmpdir" -S -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u -k ec -q $size
# Check the size of the key.
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
EOF
$toolsdir/keyiread entry.nss.$size
# Export the key.
if ! pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1 ; then
echo Error exporting key for $size, continuing.
continue
fi
if ! openssl pkcs12 -in $size.p12 -out key.$size -passin pass: -nodes -nocerts > /dev/null 2>&1 ; then
echo Error parsing exported key for $size, continuing.
continue
fi
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
EOF
$toolsdir/keyiread entry.openssl.$size
done
echo Test complete.
certmonger-0.74/tests/001-keyiread-dsa/ 0000775 0001750 0001750 00000000000 12317265252 014623 5 0000000 0000000 certmonger-0.74/tests/001-keyiread-dsa/expected.out 0000664 0001750 0001750 00000000435 12317265222 017074 0000000 0000000 OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
OK (DSA:1024).
Test complete.
certmonger-0.74/tests/001-keyiread-dsa/run.sh 0000775 0001750 0001750 00000002172 12317265222 015705 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in 512 1024 1536 2048 3072 4096 ; do
# Generate a self-signed cert.
run_certutil -d "$tmpdir" -S -g $size -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u -k dsa
# Export the key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1
openssl pkcs12 -in $size.p12 -out key.$size -passin pass: -nodes -nocerts > /dev/null 2>&1
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
EOF
$toolsdir/keyiread entry.openssl.$size
# Check the size of the key (with cache).
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
EOF
grep ^key_pubkey_info= entry.openssl.$size >> entry.nss.$size
grep ^key_pubkey= entry.openssl.$size >> entry.nss.$size
$toolsdir/keyiread entry.nss.$size
# Check the size of the key (without cache).
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
EOF
$toolsdir/keyiread entry.nss.$size
done
echo Test complete.
certmonger-0.74/tests/001-keyiread/ 0000775 0001750 0001750 00000000000 12317265252 014056 5 0000000 0000000 certmonger-0.74/tests/001-keyiread/expected.out 0000664 0001750 0001750 00000000301 12317265222 016317 0000000 0000000 OK (RSA:512).
OK (RSA:1024).
OK (RSA:1536).
OK (RSA:2048).
OK (RSA:3072).
OK (RSA:4096).
OK (RSA:512).
OK (RSA:1024).
OK (RSA:1536).
OK (RSA:2048).
OK (RSA:3072).
OK (RSA:4096).
Test complete.
certmonger-0.74/tests/001-keyiread/run.sh 0000775 0001750 0001750 00000002334 12317265222 015140 0000000 0000000 #!/bin/sh -e
cd "$tmpdir"
source "$srcdir"/functions
initnssdb "$tmpdir"
for size in 512 1024 1536 2048 3072 4096 ; do
# Generate a self-signed cert.
run_certutil -d "$tmpdir" -S -g $size -n keyi$size \
-s "cn=T$size" -c "cn=T$size" \
-x -t u
# Export the key.
pk12util -d "$tmpdir" -o $size.p12 -W "" -n "keyi$size" > /dev/null 2>&1
openssl pkcs12 -in $size.p12 -out key.$size -passin pass: -nodes -nocerts > /dev/null 2>&1
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/key.$size
key_nickname=keyi$size
EOF
$toolsdir/keyiread entry.openssl.$size > /dev/null 2>&1
# Check the size of the key.
cat > entry.nss.$size <<- EOF
key_storage_type=NSSDB
key_storage_location=$tmpdir
key_nickname=keyi$size
EOF
grep ^key_pubkey= entry.openssl.$size >> entry.nss.$size
grep ^key_pubkey_info= entry.openssl.$size >> entry.nss.$size
$toolsdir/keyiread entry.nss.$size
done
for size in 512 1024 1536 2048 3072 4096 ; do
# Generate a key.
openssl genrsa $size > sample.$size 2> /dev/null
# Check the size of the key.
cat > entry.openssl.$size <<- EOF
key_storage_type=FILE
key_storage_location=$tmpdir/sample.$size
EOF
$toolsdir/keyiread entry.openssl.$size
done
echo Test complete.
certmonger-0.74/sysvinit/ 0000775 0001750 0001750 00000000000 12317265252 012511 5 0000000 0000000 certmonger-0.74/sysvinit/certmonger.in 0000775 0001750 0001750 00000004060 12317265222 015126 0000000 0000000 #!/bin/sh
#
# certmonger monitors certificates for impending expiration and can
# attempt to re-enroll when they expire
#
# chkconfig: - 99 01
# description: Provides certificate monitoring and PKI enrollment.
# processname: @mysbindir@/certmonger
# pidfile: /var/run/certmonger.pid
#
### BEGIN INIT INFO
# Provides: certmonger
# Required-Start: messagebus
# Required-Stop: messagebus
# Should-Start: $network
# Should-Stop: $network
# Short-Description: Certificate monitor and PKI enrollment client
# Description: Provides certificate monitoring and PKI enrollment.
### END INIT INFO
program=@mysbindir@/certmonger
prog=${program##*/}
pidfile=/var/run/certmonger.pid
lockfile=/var/lock/subsys/certmonger
if [ -f /etc/rc.d/init.d/functions ]; then
. /etc/rc.d/init.d/functions
fi
if [ -f /etc/sysconfig/certmonger ]; then
. /etc/sysconfig/certmonger
fi
RETVAL=0
start() {
echo -n $"Starting $prog: "
[ -x $program ] || exit 5
daemon $program -S -p ${pidfile} $OPTS
RETVAL=$?
echo
[ $RETVAL -eq 0 ] && touch $lockfile
return $RETVAL
}
stop() {
echo -n $"Stopping $prog: "
killproc $program
RETVAL=$?
echo
if [ $RETVAL -eq 0 ]; then
rm -f $lockfile
fi
}
mystatusq() {
status $program > /dev/null 2> /dev/null
}
restart() {
stop
start
}
# See how we were called.
case "$1" in
start)
if mystatusq ; then
touch $lockfile
exit 0
fi
$1
;;
stop)
if ! test -f $pidfile ; then
mystatusq || exit 0
fi
$1
;;
restart)
$1
;;
status)
status -p $pidfile $program
RETVAL=$?
;;
condrestart|try-restart)
[ -f $lockfile ] && restart || :
;;
reload)
echo "can't reload configuration, you have to restart it"
RETVAL=3
;;
force-reload)
restart
;;
*)
echo $"Usage: $0 {start|stop|status|restart|condrestart|try-restart|reload|force-reload}"
exit 2
;;
esac
exit $RETVAL
certmonger-0.74/sysvinit/Makefile.am 0000664 0001750 0001750 00000000103 12317265222 014454 0000000 0000000 if SYSVINIT
initddir = @SYSVINIT@
initd_SCRIPTS = certmonger
endif
certmonger-0.74/sysvinit/Makefile.in 0000664 0001750 0001750 00000041667 12317265231 014511 0000000 0000000 # Makefile.in generated by automake 1.14.1 from Makefile.am.
# @configure_input@
# Copyright (C) 1994-2013 Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
VPATH = @srcdir@
am__is_gnu_make = test -n '$(MAKEFILE_LIST)' && test -n '$(MAKELEVEL)'
am__make_running_with_option = \
case $${target_option-} in \
?) ;; \
*) echo "am__make_running_with_option: internal error: invalid" \
"target option '$${target_option-}' specified" >&2; \
exit 1;; \
esac; \
has_opt=no; \
sane_makeflags=$$MAKEFLAGS; \
if $(am__is_gnu_make); then \
sane_makeflags=$$MFLAGS; \
else \
case $$MAKEFLAGS in \
*\\[\ \ ]*) \
bs=\\; \
sane_makeflags=`printf '%s\n' "$$MAKEFLAGS" \
| sed "s/$$bs$$bs[$$bs $$bs ]*//g"`;; \
esac; \
fi; \
skip_next=no; \
strip_trailopt () \
{ \
flg=`printf '%s\n' "$$flg" | sed "s/$$1.*$$//"`; \
}; \
for flg in $$sane_makeflags; do \
test $$skip_next = yes && { skip_next=no; continue; }; \
case $$flg in \
*=*|--*) continue;; \
-*I) strip_trailopt 'I'; skip_next=yes;; \
-*I?*) strip_trailopt 'I';; \
-*O) strip_trailopt 'O'; skip_next=yes;; \
-*O?*) strip_trailopt 'O';; \
-*l) strip_trailopt 'l'; skip_next=yes;; \
-*l?*) strip_trailopt 'l';; \
-[dEDm]) skip_next=yes;; \
-[JT]) skip_next=yes;; \
esac; \
case $$flg in \
*$$target_option*) has_opt=yes; break;; \
esac; \
done; \
test $$has_opt = yes
am__make_dryrun = (target_option=n; $(am__make_running_with_option))
am__make_keepgoing = (target_option=k; $(am__make_running_with_option))
pkgdatadir = $(datadir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkglibexecdir = $(libexecdir)/@PACKAGE@
am__cd = CDPATH="$${ZSH_VERSION+.}$(PATH_SEPARATOR)" && cd
install_sh_DATA = $(install_sh) -c -m 644
install_sh_PROGRAM = $(install_sh) -c
install_sh_SCRIPT = $(install_sh) -c
INSTALL_HEADER = $(INSTALL_DATA)
transform = $(program_transform_name)
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
build_triplet = @build@
host_triplet = @host@
subdir = sysvinit
DIST_COMMON = $(srcdir)/Makefile.in $(srcdir)/Makefile.am \
$(srcdir)/certmonger.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/intlmacosx.m4 \
$(top_srcdir)/m4/lib-ld.m4 $(top_srcdir)/m4/lib-link.m4 \
$(top_srcdir)/m4/lib-prefix.m4 $(top_srcdir)/m4/nls.m4 \
$(top_srcdir)/m4/po.m4 $(top_srcdir)/m4/progtest.m4 \
$(top_srcdir)/configure.ac
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(install_sh) -d
CONFIG_HEADER = $(top_builddir)/src/config.h
CONFIG_CLEAN_FILES = certmonger
CONFIG_CLEAN_VPATH_FILES =
am__vpath_adj_setup = srcdirstrip=`echo "$(srcdir)" | sed 's|.|.|g'`;
am__vpath_adj = case $$p in \
$(srcdir)/*) f=`echo "$$p" | sed "s|^$$srcdirstrip/||"`;; \
*) f=$$p;; \
esac;
am__strip_dir = f=`echo $$p | sed -e 's|^.*/||'`;
am__install_max = 40
am__nobase_strip_setup = \
srcdirstrip=`echo "$(srcdir)" | sed 's/[].[^$$\\*|]/\\\\&/g'`
am__nobase_strip = \
for p in $$list; do echo "$$p"; done | sed -e "s|$$srcdirstrip/||"
am__nobase_list = $(am__nobase_strip_setup); \
for p in $$list; do echo "$$p $$p"; done | \
sed "s| $$srcdirstrip/| |;"' / .*\//!s/ .*/ ./; s,\( .*\)/[^/]*$$,\1,' | \
$(AWK) 'BEGIN { files["."] = "" } { files[$$2] = files[$$2] " " $$1; \
if (++n[$$2] == $(am__install_max)) \
{ print $$2, files[$$2]; n[$$2] = 0; files[$$2] = "" } } \
END { for (dir in files) print dir, files[dir] }'
am__base_list = \
sed '$$!N;$$!N;$$!N;$$!N;$$!N;$$!N;$$!N;s/\n/ /g' | \
sed '$$!N;$$!N;$$!N;$$!N;s/\n/ /g'
am__uninstall_files_from_dir = { \
test -z "$$files" \
|| { test ! -d "$$dir" && test ! -f "$$dir" && test ! -r "$$dir"; } \
|| { echo " ( cd '$$dir' && rm -f" $$files ")"; \
$(am__cd) "$$dir" && rm -f $$files; }; \
}
am__installdirs = "$(DESTDIR)$(initddir)"
SCRIPTS = $(initd_SCRIPTS)
AM_V_P = $(am__v_P_@AM_V@)
am__v_P_ = $(am__v_P_@AM_DEFAULT_V@)
am__v_P_0 = false
am__v_P_1 = :
AM_V_GEN = $(am__v_GEN_@AM_V@)
am__v_GEN_ = $(am__v_GEN_@AM_DEFAULT_V@)
am__v_GEN_0 = @echo " GEN " $@;
am__v_GEN_1 =
AM_V_at = $(am__v_at_@AM_V@)
am__v_at_ = $(am__v_at_@AM_DEFAULT_V@)
am__v_at_0 = @
am__v_at_1 =
SOURCES =
DIST_SOURCES =
am__can_run_installinfo = \
case $$AM_UPDATE_INFO_DIR in \
n|no|NO) false;; \
*) (install-info --version) >/dev/null 2>&1;; \
esac
am__tagged_files = $(HEADERS) $(SOURCES) $(TAGS_FILES) $(LISP)
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
ACLOCAL = @ACLOCAL@
AMTAR = @AMTAR@
AM_DEFAULT_VERBOSITY = @AM_DEFAULT_VERBOSITY@
AUTOCONF = @AUTOCONF@
AUTOHEADER = @AUTOHEADER@
AUTOMAKE = @AUTOMAKE@
AWK = @AWK@
CC = @CC@
CCDEPMODE = @CCDEPMODE@
CERTMONGER_CFLAGS = @CERTMONGER_CFLAGS@
CERTMONGER_LIBS = @CERTMONGER_LIBS@
CFLAGS = @CFLAGS@
CM_CERTMASTER_CA_NAME = @CM_CERTMASTER_CA_NAME@
CM_DBUS_NAME = @CM_DBUS_NAME@
CM_DEFAULT_CERT_LIFETIME = @CM_DEFAULT_CERT_LIFETIME@
CM_DEFAULT_IDLE_TIMEOUT = @CM_DEFAULT_IDLE_TIMEOUT@
CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY = @CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY@
CM_DEFAULT_POPULATE_UNIQUE_ID = @CM_DEFAULT_POPULATE_UNIQUE_ID@
CM_DEFAULT_PUBKEY_SIZE = @CM_DEFAULT_PUBKEY_SIZE@
CM_DEFAULT_TTL_LIST = @CM_DEFAULT_TTL_LIST@
CM_HOMEDIR = @CM_HOMEDIR@
CM_IPA_CA_NAME = @CM_IPA_CA_NAME@
CM_MINIMUM_DSA_KEY_SIZE = @CM_MINIMUM_DSA_KEY_SIZE@
CM_MINIMUM_EC_KEY_SIZE = @CM_MINIMUM_EC_KEY_SIZE@
CM_MINIMUM_RSA_KEY_SIZE = @CM_MINIMUM_RSA_KEY_SIZE@
CM_NOTIFICATION_ENV = @CM_NOTIFICATION_ENV@
CM_SELF_SIGN_CA_NAME = @CM_SELF_SIGN_CA_NAME@
CM_STORE_CAS_DIRECTORY = @CM_STORE_CAS_DIRECTORY@
CM_STORE_CAS_DIRECTORY_ENV = @CM_STORE_CAS_DIRECTORY_ENV@
CM_STORE_CONFIG_DIRECTORY_ENV = @CM_STORE_CONFIG_DIRECTORY_ENV@
CM_STORE_REQUESTS_DIRECTORY = @CM_STORE_REQUESTS_DIRECTORY@
CM_STORE_REQUESTS_DIRECTORY_ENV = @CM_STORE_REQUESTS_DIRECTORY_ENV@
CM_TMPDIR = @CM_TMPDIR@
CM_TMPDIR_ENV = @CM_TMPDIR_ENV@
CPP = @CPP@
CPPFLAGS = @CPPFLAGS@
CURL_CFLAGS = @CURL_CFLAGS@
CURL_LIBS = @CURL_LIBS@
CYGPATH_W = @CYGPATH_W@
DBUS_CFLAGS = @DBUS_CFLAGS@
DBUS_LIBS = @DBUS_LIBS@
DEFS = @DEFS@
DEPDIR = @DEPDIR@
ECHO_C = @ECHO_C@
ECHO_N = @ECHO_N@
ECHO_T = @ECHO_T@
EGREP = @EGREP@
EXEEXT = @EXEEXT@
GETCERT_CFLAGS = @GETCERT_CFLAGS@
GETCERT_LIBS = @GETCERT_LIBS@
GETTEXT_MACRO_VERSION = @GETTEXT_MACRO_VERSION@
GMSGFMT = @GMSGFMT@
GMSGFMT_015 = @GMSGFMT_015@
GREP = @GREP@
INSTALL = @INSTALL@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INTLLIBS = @INTLLIBS@
INTL_MACOSX_LIBS = @INTL_MACOSX_LIBS@
KRB5_CFLAGS = @KRB5_CFLAGS@
KRB5_CONFIG = @KRB5_CONFIG@
KRB5_LIBS = @KRB5_LIBS@
LDFLAGS = @LDFLAGS@
LIBICONV = @LIBICONV@
LIBINTL = @LIBINTL@
LIBOBJS = @LIBOBJS@
LIBS = @LIBS@
LTLIBICONV = @LTLIBICONV@
LTLIBINTL = @LTLIBINTL@
LTLIBOBJS = @LTLIBOBJS@
MAINT = @MAINT@
MAKEINFO = @MAKEINFO@
MAN_DSA = @MAN_DSA@
MAN_EC = @MAN_EC@
MKDIR_P = @MKDIR_P@
MSGFMT = @MSGFMT@
MSGFMT_015 = @MSGFMT_015@
MSGMERGE = @MSGMERGE@
NO_MAN_DSA = @NO_MAN_DSA@
NO_MAN_EC = @NO_MAN_EC@
NSS_CFLAGS = @NSS_CFLAGS@
NSS_LIBS = @NSS_LIBS@
OBJEXT = @OBJEXT@
OPENSSL_CFLAGS = @OPENSSL_CFLAGS@
OPENSSL_LIBS = @OPENSSL_LIBS@
OPENSSL_SSL_CFLAGS = @OPENSSL_SSL_CFLAGS@
OPENSSL_SSL_LIBS = @OPENSSL_SSL_LIBS@
PACKAGE = @PACKAGE@
PACKAGE_BUGREPORT = @PACKAGE_BUGREPORT@
PACKAGE_NAME = @PACKAGE_NAME@
PACKAGE_STRING = @PACKAGE_STRING@
PACKAGE_TARNAME = @PACKAGE_TARNAME@
PACKAGE_URL = @PACKAGE_URL@
PACKAGE_VERSION = @PACKAGE_VERSION@
PATH_SEPARATOR = @PATH_SEPARATOR@
PKG_CONFIG = @PKG_CONFIG@
PKG_CONFIG_LIBDIR = @PKG_CONFIG_LIBDIR@
PKG_CONFIG_PATH = @PKG_CONFIG_PATH@
POSUB = @POSUB@
RANLIB = @RANLIB@
SESSIONBUSSERVICESDIR = @SESSIONBUSSERVICESDIR@
SET_MAKE = @SET_MAKE@
SHELL = @SHELL@
STRIP = @STRIP@
SYSTEMBUSSERVICESDIR = @SYSTEMBUSSERVICESDIR@
SYSTEMD = @SYSTEMD@
SYSTEMDSYSTEMUNITDIR = @SYSTEMDSYSTEMUNITDIR@
SYSVINIT = @SYSVINIT@
TALLOC_CFLAGS = @TALLOC_CFLAGS@
TALLOC_LIBS = @TALLOC_LIBS@
TEVENT_CFLAGS = @TEVENT_CFLAGS@
TEVENT_LIBS = @TEVENT_LIBS@
TMPFILES = @TMPFILES@
USE_NLS = @USE_NLS@
UUID_CFLAGS = @UUID_CFLAGS@
UUID_LIBS = @UUID_LIBS@
VERSION = @VERSION@
XGETTEXT = @XGETTEXT@
XGETTEXT_015 = @XGETTEXT_015@
XGETTEXT_EXTRA_OPTIONS = @XGETTEXT_EXTRA_OPTIONS@
XMLRPC_CFLAGS = @XMLRPC_CFLAGS@
XMLRPC_C_CONFIG = @XMLRPC_C_CONFIG@
XMLRPC_LIBS = @XMLRPC_LIBS@
XML_CFLAGS = @XML_CFLAGS@
XML_LIBS = @XML_LIBS@
abs_builddir = @abs_builddir@
abs_srcdir = @abs_srcdir@
abs_top_builddir = @abs_top_builddir@
abs_top_srcdir = @abs_top_srcdir@
ac_ct_CC = @ac_ct_CC@
am__include = @am__include@
am__leading_dot = @am__leading_dot@
am__quote = @am__quote@
am__tar = @am__tar@
am__untar = @am__untar@
bindir = @bindir@
build = @build@
build_alias = @build_alias@
build_cpu = @build_cpu@
build_os = @build_os@
build_vendor = @build_vendor@
builddir = @builddir@
datadir = @datadir@
datarootdir = @datarootdir@
docdir = @docdir@
dvidir = @dvidir@
exec_prefix = @exec_prefix@
host = @host@
host_alias = @host_alias@
host_cpu = @host_cpu@
host_os = @host_os@
host_vendor = @host_vendor@
htmldir = @htmldir@
includedir = @includedir@
infodir = @infodir@
install_sh = @install_sh@
libdir = @libdir@
libexecdir = @libexecdir@
localedir = @localedir@
localstatedir = @localstatedir@
mandir = @mandir@
mkdir_p = @mkdir_p@
mylibexecdir = @mylibexecdir@
mysbindir = @mysbindir@
oldincludedir = @oldincludedir@
pdfdir = @pdfdir@
prefix = @prefix@
program_transform_name = @program_transform_name@
psdir = @psdir@
sbindir = @sbindir@
sharedstatedir = @sharedstatedir@
srcdir = @srcdir@
sysconfdir = @sysconfdir@
target_alias = @target_alias@
top_build_prefix = @top_build_prefix@
top_builddir = @top_builddir@
top_srcdir = @top_srcdir@
@SYSVINIT_TRUE@initddir = @SYSVINIT@
@SYSVINIT_TRUE@initd_SCRIPTS = certmonger
all: all-am
.SUFFIXES:
$(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__configure_deps)
@for dep in $?; do \
case '$(am__configure_deps)' in \
*$$dep*) \
( cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh ) \
&& { if test -f $@; then exit 0; else break; fi; }; \
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign sysvinit/Makefile'; \
$(am__cd) $(top_srcdir) && \
$(AUTOMAKE) --foreign sysvinit/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \
*config.status*) \
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh;; \
*) \
echo ' cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe)'; \
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe);; \
esac;
$(top_builddir)/config.status: $(top_srcdir)/configure $(CONFIG_STATUS_DEPENDENCIES)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(top_srcdir)/configure: @MAINTAINER_MODE_TRUE@ $(am__configure_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(ACLOCAL_M4): @MAINTAINER_MODE_TRUE@ $(am__aclocal_m4_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(am__aclocal_m4_deps):
certmonger: $(top_builddir)/config.status $(srcdir)/certmonger.in
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@
install-initdSCRIPTS: $(initd_SCRIPTS)
@$(NORMAL_INSTALL)
@list='$(initd_SCRIPTS)'; test -n "$(initddir)" || list=; \
if test -n "$$list"; then \
echo " $(MKDIR_P) '$(DESTDIR)$(initddir)'"; \
$(MKDIR_P) "$(DESTDIR)$(initddir)" || exit 1; \
fi; \
for p in $$list; do \
if test -f "$$p"; then d=; else d="$(srcdir)/"; fi; \
if test -f "$$d$$p"; then echo "$$d$$p"; echo "$$p"; else :; fi; \
done | \
sed -e 'p;s,.*/,,;n' \
-e 'h;s|.*|.|' \
-e 'p;x;s,.*/,,;$(transform)' | sed 'N;N;N;s,\n, ,g' | \
$(AWK) 'BEGIN { files["."] = ""; dirs["."] = 1; } \
{ d=$$3; if (dirs[d] != 1) { print "d", d; dirs[d] = 1 } \
if ($$2 == $$4) { files[d] = files[d] " " $$1; \
if (++n[d] == $(am__install_max)) { \
print "f", d, files[d]; n[d] = 0; files[d] = "" } } \
else { print "f", d "/" $$4, $$1 } } \
END { for (d in files) print "f", d, files[d] }' | \
while read type dir files; do \
if test "$$dir" = .; then dir=; else dir=/$$dir; fi; \
test -z "$$files" || { \
echo " $(INSTALL_SCRIPT) $$files '$(DESTDIR)$(initddir)$$dir'"; \
$(INSTALL_SCRIPT) $$files "$(DESTDIR)$(initddir)$$dir" || exit $$?; \
} \
; done
uninstall-initdSCRIPTS:
@$(NORMAL_UNINSTALL)
@list='$(initd_SCRIPTS)'; test -n "$(initddir)" || exit 0; \
files=`for p in $$list; do echo "$$p"; done | \
sed -e 's,.*/,,;$(transform)'`; \
dir='$(DESTDIR)$(initddir)'; $(am__uninstall_files_from_dir)
tags TAGS:
ctags CTAGS:
cscope cscopelist:
distdir: $(DISTFILES)
@srcdirstrip=`echo "$(srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
topsrcdirstrip=`echo "$(top_srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
list='$(DISTFILES)'; \
dist_files=`for file in $$list; do echo $$file; done | \
sed -e "s|^$$srcdirstrip/||;t" \
-e "s|^$$topsrcdirstrip/|$(top_builddir)/|;t"`; \
case $$dist_files in \
*/*) $(MKDIR_P) `echo "$$dist_files" | \
sed '/\//!d;s|^|$(distdir)/|;s,/[^/]*$$,,' | \
sort -u` ;; \
esac; \
for file in $$dist_files; do \
if test -f $$file || test -d $$file; then d=.; else d=$(srcdir); fi; \
if test -d $$d/$$file; then \
dir=`echo "/$$file" | sed -e 's,/[^/]*$$,,'`; \
if test -d "$(distdir)/$$file"; then \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
if test -d $(srcdir)/$$file && test $$d != $(srcdir); then \
cp -fpR $(srcdir)/$$file "$(distdir)$$dir" || exit 1; \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
cp -fpR $$d/$$file "$(distdir)$$dir" || exit 1; \
else \
test -f "$(distdir)/$$file" \
|| cp -p $$d/$$file "$(distdir)/$$file" \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-am
all-am: Makefile $(SCRIPTS)
installdirs:
for dir in "$(DESTDIR)$(initddir)"; do \
test -z "$$dir" || $(MKDIR_P) "$$dir"; \
done
install: install-am
install-exec: install-exec-am
install-data: install-data-am
uninstall: uninstall-am
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-am
install-strip:
if test -z '$(STRIP)'; then \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
install; \
else \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
"INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'" install; \
fi
mostlyclean-generic:
clean-generic:
distclean-generic:
-test -z "$(CONFIG_CLEAN_FILES)" || rm -f $(CONFIG_CLEAN_FILES)
-test . = "$(srcdir)" || test -z "$(CONFIG_CLEAN_VPATH_FILES)" || rm -f $(CONFIG_CLEAN_VPATH_FILES)
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-am
clean-am: clean-generic mostlyclean-am
distclean: distclean-am
-rm -f Makefile
distclean-am: clean-am distclean-generic
dvi: dvi-am
dvi-am:
html: html-am
html-am:
info: info-am
info-am:
install-data-am: install-initdSCRIPTS
install-dvi: install-dvi-am
install-dvi-am:
install-exec-am:
install-html: install-html-am
install-html-am:
install-info: install-info-am
install-info-am:
install-man:
install-pdf: install-pdf-am
install-pdf-am:
install-ps: install-ps-am
install-ps-am:
installcheck-am:
maintainer-clean: maintainer-clean-am
-rm -f Makefile
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-am
mostlyclean-am: mostlyclean-generic
pdf: pdf-am
pdf-am:
ps: ps-am
ps-am:
uninstall-am: uninstall-initdSCRIPTS
.MAKE: install-am install-strip
.PHONY: all all-am check check-am clean clean-generic cscopelist-am \
ctags-am distclean distclean-generic distdir dvi dvi-am html \
html-am info info-am install install-am install-data \
install-data-am install-dvi install-dvi-am install-exec \
install-exec-am install-html install-html-am install-info \
install-info-am install-initdSCRIPTS install-man install-pdf \
install-pdf-am install-ps install-ps-am install-strip \
installcheck installcheck-am installdirs maintainer-clean \
maintainer-clean-generic mostlyclean mostlyclean-generic pdf \
pdf-am ps ps-am tags-am uninstall uninstall-am \
uninstall-initdSCRIPTS
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:
certmonger-0.74/systemd/ 0000775 0001750 0001750 00000000000 12317265252 012311 5 0000000 0000000 certmonger-0.74/systemd/org.fedorahosted.certmonger.service.in 0000664 0001750 0001750 00000000145 12317265222 021616 0000000 0000000 [D-BUS Service]
Name=@CM_DBUS_NAME@
Exec=@mysbindir@/certmonger-session -b @CM_DEFAULT_IDLE_TIMEOUT@
certmonger-0.74/systemd/certmonger.conf.in 0000664 0001750 0001750 00000000263 12317265222 015650 0000000 0000000 # certmonger uses libraries which may want to put temporary files in $TMPDIR,
# but SELinux policy won't let anything running as certmonger_t do that
d @CM_TMPDIR@ 0755 root root
certmonger-0.74/systemd/certmonger.path.in 0000664 0001750 0001750 00000000313 12317265222 015653 0000000 0000000 [Unit]
Description=Certificate monitoring and PKI enrollment
After=syslog.target network.target dbus.service
[Path]
DirectoryNotEmpty=@CM_STORE_REQUESTS_DIRECTORY@
[Install]
WantedBy=multi-user.target
certmonger-0.74/systemd/certmonger.service.in 0000664 0001750 0001750 00000000520 12317265222 016357 0000000 0000000 [Unit]
Description=Certificate monitoring and PKI enrollment
After=syslog.target network.target dbus.service
[Service]
Type=dbus
PIDFile=/var/run/certmonger.pid
EnvironmentFile=-/etc/sysconfig/certmonger
ExecStart=/usr/sbin/certmonger -S -p /var/run/certmonger.pid -n $OPTS
BusName=@CM_DBUS_NAME@
[Install]
WantedBy=multi-user.target
certmonger-0.74/systemd/Makefile.am 0000664 0001750 0001750 00000000444 12317265222 014264 0000000 0000000 if SYSTEMD
unitsdir = @SYSTEMDSYSTEMUNITDIR@
units_DATA = certmonger.service
#units_DATA += certmonger.path
#servicedir = @SYSTEMBUSSERVICESDIR@
#service_DATA = org.fedorahosted.certmonger.service
endif
if TMPFILES
tmpfilesdir = $(prefix)/lib/tmpfiles.d
tmpfiles_DATA = certmonger.conf
endif
certmonger-0.74/systemd/Makefile.in 0000664 0001750 0001750 00000044070 12317265231 014300 0000000 0000000 # Makefile.in generated by automake 1.14.1 from Makefile.am.
# @configure_input@
# Copyright (C) 1994-2013 Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
VPATH = @srcdir@
am__is_gnu_make = test -n '$(MAKEFILE_LIST)' && test -n '$(MAKELEVEL)'
am__make_running_with_option = \
case $${target_option-} in \
?) ;; \
*) echo "am__make_running_with_option: internal error: invalid" \
"target option '$${target_option-}' specified" >&2; \
exit 1;; \
esac; \
has_opt=no; \
sane_makeflags=$$MAKEFLAGS; \
if $(am__is_gnu_make); then \
sane_makeflags=$$MFLAGS; \
else \
case $$MAKEFLAGS in \
*\\[\ \ ]*) \
bs=\\; \
sane_makeflags=`printf '%s\n' "$$MAKEFLAGS" \
| sed "s/$$bs$$bs[$$bs $$bs ]*//g"`;; \
esac; \
fi; \
skip_next=no; \
strip_trailopt () \
{ \
flg=`printf '%s\n' "$$flg" | sed "s/$$1.*$$//"`; \
}; \
for flg in $$sane_makeflags; do \
test $$skip_next = yes && { skip_next=no; continue; }; \
case $$flg in \
*=*|--*) continue;; \
-*I) strip_trailopt 'I'; skip_next=yes;; \
-*I?*) strip_trailopt 'I';; \
-*O) strip_trailopt 'O'; skip_next=yes;; \
-*O?*) strip_trailopt 'O';; \
-*l) strip_trailopt 'l'; skip_next=yes;; \
-*l?*) strip_trailopt 'l';; \
-[dEDm]) skip_next=yes;; \
-[JT]) skip_next=yes;; \
esac; \
case $$flg in \
*$$target_option*) has_opt=yes; break;; \
esac; \
done; \
test $$has_opt = yes
am__make_dryrun = (target_option=n; $(am__make_running_with_option))
am__make_keepgoing = (target_option=k; $(am__make_running_with_option))
pkgdatadir = $(datadir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkglibexecdir = $(libexecdir)/@PACKAGE@
am__cd = CDPATH="$${ZSH_VERSION+.}$(PATH_SEPARATOR)" && cd
install_sh_DATA = $(install_sh) -c -m 644
install_sh_PROGRAM = $(install_sh) -c
install_sh_SCRIPT = $(install_sh) -c
INSTALL_HEADER = $(INSTALL_DATA)
transform = $(program_transform_name)
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
build_triplet = @build@
host_triplet = @host@
subdir = systemd
DIST_COMMON = $(srcdir)/Makefile.in $(srcdir)/Makefile.am \
$(srcdir)/certmonger.service.in $(srcdir)/certmonger.path.in \
$(srcdir)/certmonger.conf.in \
$(srcdir)/org.fedorahosted.certmonger.service.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/intlmacosx.m4 \
$(top_srcdir)/m4/lib-ld.m4 $(top_srcdir)/m4/lib-link.m4 \
$(top_srcdir)/m4/lib-prefix.m4 $(top_srcdir)/m4/nls.m4 \
$(top_srcdir)/m4/po.m4 $(top_srcdir)/m4/progtest.m4 \
$(top_srcdir)/configure.ac
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(install_sh) -d
CONFIG_HEADER = $(top_builddir)/src/config.h
CONFIG_CLEAN_FILES = certmonger.service certmonger.path \
certmonger.conf org.fedorahosted.certmonger.service
CONFIG_CLEAN_VPATH_FILES =
AM_V_P = $(am__v_P_@AM_V@)
am__v_P_ = $(am__v_P_@AM_DEFAULT_V@)
am__v_P_0 = false
am__v_P_1 = :
AM_V_GEN = $(am__v_GEN_@AM_V@)
am__v_GEN_ = $(am__v_GEN_@AM_DEFAULT_V@)
am__v_GEN_0 = @echo " GEN " $@;
am__v_GEN_1 =
AM_V_at = $(am__v_at_@AM_V@)
am__v_at_ = $(am__v_at_@AM_DEFAULT_V@)
am__v_at_0 = @
am__v_at_1 =
SOURCES =
DIST_SOURCES =
am__can_run_installinfo = \
case $$AM_UPDATE_INFO_DIR in \
n|no|NO) false;; \
*) (install-info --version) >/dev/null 2>&1;; \
esac
am__vpath_adj_setup = srcdirstrip=`echo "$(srcdir)" | sed 's|.|.|g'`;
am__vpath_adj = case $$p in \
$(srcdir)/*) f=`echo "$$p" | sed "s|^$$srcdirstrip/||"`;; \
*) f=$$p;; \
esac;
am__strip_dir = f=`echo $$p | sed -e 's|^.*/||'`;
am__install_max = 40
am__nobase_strip_setup = \
srcdirstrip=`echo "$(srcdir)" | sed 's/[].[^$$\\*|]/\\\\&/g'`
am__nobase_strip = \
for p in $$list; do echo "$$p"; done | sed -e "s|$$srcdirstrip/||"
am__nobase_list = $(am__nobase_strip_setup); \
for p in $$list; do echo "$$p $$p"; done | \
sed "s| $$srcdirstrip/| |;"' / .*\//!s/ .*/ ./; s,\( .*\)/[^/]*$$,\1,' | \
$(AWK) 'BEGIN { files["."] = "" } { files[$$2] = files[$$2] " " $$1; \
if (++n[$$2] == $(am__install_max)) \
{ print $$2, files[$$2]; n[$$2] = 0; files[$$2] = "" } } \
END { for (dir in files) print dir, files[dir] }'
am__base_list = \
sed '$$!N;$$!N;$$!N;$$!N;$$!N;$$!N;$$!N;s/\n/ /g' | \
sed '$$!N;$$!N;$$!N;$$!N;s/\n/ /g'
am__uninstall_files_from_dir = { \
test -z "$$files" \
|| { test ! -d "$$dir" && test ! -f "$$dir" && test ! -r "$$dir"; } \
|| { echo " ( cd '$$dir' && rm -f" $$files ")"; \
$(am__cd) "$$dir" && rm -f $$files; }; \
}
am__installdirs = "$(DESTDIR)$(tmpfilesdir)" "$(DESTDIR)$(unitsdir)"
DATA = $(tmpfiles_DATA) $(units_DATA)
am__tagged_files = $(HEADERS) $(SOURCES) $(TAGS_FILES) $(LISP)
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
ACLOCAL = @ACLOCAL@
AMTAR = @AMTAR@
AM_DEFAULT_VERBOSITY = @AM_DEFAULT_VERBOSITY@
AUTOCONF = @AUTOCONF@
AUTOHEADER = @AUTOHEADER@
AUTOMAKE = @AUTOMAKE@
AWK = @AWK@
CC = @CC@
CCDEPMODE = @CCDEPMODE@
CERTMONGER_CFLAGS = @CERTMONGER_CFLAGS@
CERTMONGER_LIBS = @CERTMONGER_LIBS@
CFLAGS = @CFLAGS@
CM_CERTMASTER_CA_NAME = @CM_CERTMASTER_CA_NAME@
CM_DBUS_NAME = @CM_DBUS_NAME@
CM_DEFAULT_CERT_LIFETIME = @CM_DEFAULT_CERT_LIFETIME@
CM_DEFAULT_IDLE_TIMEOUT = @CM_DEFAULT_IDLE_TIMEOUT@
CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY = @CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY@
CM_DEFAULT_POPULATE_UNIQUE_ID = @CM_DEFAULT_POPULATE_UNIQUE_ID@
CM_DEFAULT_PUBKEY_SIZE = @CM_DEFAULT_PUBKEY_SIZE@
CM_DEFAULT_TTL_LIST = @CM_DEFAULT_TTL_LIST@
CM_HOMEDIR = @CM_HOMEDIR@
CM_IPA_CA_NAME = @CM_IPA_CA_NAME@
CM_MINIMUM_DSA_KEY_SIZE = @CM_MINIMUM_DSA_KEY_SIZE@
CM_MINIMUM_EC_KEY_SIZE = @CM_MINIMUM_EC_KEY_SIZE@
CM_MINIMUM_RSA_KEY_SIZE = @CM_MINIMUM_RSA_KEY_SIZE@
CM_NOTIFICATION_ENV = @CM_NOTIFICATION_ENV@
CM_SELF_SIGN_CA_NAME = @CM_SELF_SIGN_CA_NAME@
CM_STORE_CAS_DIRECTORY = @CM_STORE_CAS_DIRECTORY@
CM_STORE_CAS_DIRECTORY_ENV = @CM_STORE_CAS_DIRECTORY_ENV@
CM_STORE_CONFIG_DIRECTORY_ENV = @CM_STORE_CONFIG_DIRECTORY_ENV@
CM_STORE_REQUESTS_DIRECTORY = @CM_STORE_REQUESTS_DIRECTORY@
CM_STORE_REQUESTS_DIRECTORY_ENV = @CM_STORE_REQUESTS_DIRECTORY_ENV@
CM_TMPDIR = @CM_TMPDIR@
CM_TMPDIR_ENV = @CM_TMPDIR_ENV@
CPP = @CPP@
CPPFLAGS = @CPPFLAGS@
CURL_CFLAGS = @CURL_CFLAGS@
CURL_LIBS = @CURL_LIBS@
CYGPATH_W = @CYGPATH_W@
DBUS_CFLAGS = @DBUS_CFLAGS@
DBUS_LIBS = @DBUS_LIBS@
DEFS = @DEFS@
DEPDIR = @DEPDIR@
ECHO_C = @ECHO_C@
ECHO_N = @ECHO_N@
ECHO_T = @ECHO_T@
EGREP = @EGREP@
EXEEXT = @EXEEXT@
GETCERT_CFLAGS = @GETCERT_CFLAGS@
GETCERT_LIBS = @GETCERT_LIBS@
GETTEXT_MACRO_VERSION = @GETTEXT_MACRO_VERSION@
GMSGFMT = @GMSGFMT@
GMSGFMT_015 = @GMSGFMT_015@
GREP = @GREP@
INSTALL = @INSTALL@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INTLLIBS = @INTLLIBS@
INTL_MACOSX_LIBS = @INTL_MACOSX_LIBS@
KRB5_CFLAGS = @KRB5_CFLAGS@
KRB5_CONFIG = @KRB5_CONFIG@
KRB5_LIBS = @KRB5_LIBS@
LDFLAGS = @LDFLAGS@
LIBICONV = @LIBICONV@
LIBINTL = @LIBINTL@
LIBOBJS = @LIBOBJS@
LIBS = @LIBS@
LTLIBICONV = @LTLIBICONV@
LTLIBINTL = @LTLIBINTL@
LTLIBOBJS = @LTLIBOBJS@
MAINT = @MAINT@
MAKEINFO = @MAKEINFO@
MAN_DSA = @MAN_DSA@
MAN_EC = @MAN_EC@
MKDIR_P = @MKDIR_P@
MSGFMT = @MSGFMT@
MSGFMT_015 = @MSGFMT_015@
MSGMERGE = @MSGMERGE@
NO_MAN_DSA = @NO_MAN_DSA@
NO_MAN_EC = @NO_MAN_EC@
NSS_CFLAGS = @NSS_CFLAGS@
NSS_LIBS = @NSS_LIBS@
OBJEXT = @OBJEXT@
OPENSSL_CFLAGS = @OPENSSL_CFLAGS@
OPENSSL_LIBS = @OPENSSL_LIBS@
OPENSSL_SSL_CFLAGS = @OPENSSL_SSL_CFLAGS@
OPENSSL_SSL_LIBS = @OPENSSL_SSL_LIBS@
PACKAGE = @PACKAGE@
PACKAGE_BUGREPORT = @PACKAGE_BUGREPORT@
PACKAGE_NAME = @PACKAGE_NAME@
PACKAGE_STRING = @PACKAGE_STRING@
PACKAGE_TARNAME = @PACKAGE_TARNAME@
PACKAGE_URL = @PACKAGE_URL@
PACKAGE_VERSION = @PACKAGE_VERSION@
PATH_SEPARATOR = @PATH_SEPARATOR@
PKG_CONFIG = @PKG_CONFIG@
PKG_CONFIG_LIBDIR = @PKG_CONFIG_LIBDIR@
PKG_CONFIG_PATH = @PKG_CONFIG_PATH@
POSUB = @POSUB@
RANLIB = @RANLIB@
SESSIONBUSSERVICESDIR = @SESSIONBUSSERVICESDIR@
SET_MAKE = @SET_MAKE@
SHELL = @SHELL@
STRIP = @STRIP@
SYSTEMBUSSERVICESDIR = @SYSTEMBUSSERVICESDIR@
SYSTEMD = @SYSTEMD@
SYSTEMDSYSTEMUNITDIR = @SYSTEMDSYSTEMUNITDIR@
SYSVINIT = @SYSVINIT@
TALLOC_CFLAGS = @TALLOC_CFLAGS@
TALLOC_LIBS = @TALLOC_LIBS@
TEVENT_CFLAGS = @TEVENT_CFLAGS@
TEVENT_LIBS = @TEVENT_LIBS@
TMPFILES = @TMPFILES@
USE_NLS = @USE_NLS@
UUID_CFLAGS = @UUID_CFLAGS@
UUID_LIBS = @UUID_LIBS@
VERSION = @VERSION@
XGETTEXT = @XGETTEXT@
XGETTEXT_015 = @XGETTEXT_015@
XGETTEXT_EXTRA_OPTIONS = @XGETTEXT_EXTRA_OPTIONS@
XMLRPC_CFLAGS = @XMLRPC_CFLAGS@
XMLRPC_C_CONFIG = @XMLRPC_C_CONFIG@
XMLRPC_LIBS = @XMLRPC_LIBS@
XML_CFLAGS = @XML_CFLAGS@
XML_LIBS = @XML_LIBS@
abs_builddir = @abs_builddir@
abs_srcdir = @abs_srcdir@
abs_top_builddir = @abs_top_builddir@
abs_top_srcdir = @abs_top_srcdir@
ac_ct_CC = @ac_ct_CC@
am__include = @am__include@
am__leading_dot = @am__leading_dot@
am__quote = @am__quote@
am__tar = @am__tar@
am__untar = @am__untar@
bindir = @bindir@
build = @build@
build_alias = @build_alias@
build_cpu = @build_cpu@
build_os = @build_os@
build_vendor = @build_vendor@
builddir = @builddir@
datadir = @datadir@
datarootdir = @datarootdir@
docdir = @docdir@
dvidir = @dvidir@
exec_prefix = @exec_prefix@
host = @host@
host_alias = @host_alias@
host_cpu = @host_cpu@
host_os = @host_os@
host_vendor = @host_vendor@
htmldir = @htmldir@
includedir = @includedir@
infodir = @infodir@
install_sh = @install_sh@
libdir = @libdir@
libexecdir = @libexecdir@
localedir = @localedir@
localstatedir = @localstatedir@
mandir = @mandir@
mkdir_p = @mkdir_p@
mylibexecdir = @mylibexecdir@
mysbindir = @mysbindir@
oldincludedir = @oldincludedir@
pdfdir = @pdfdir@
prefix = @prefix@
program_transform_name = @program_transform_name@
psdir = @psdir@
sbindir = @sbindir@
sharedstatedir = @sharedstatedir@
srcdir = @srcdir@
sysconfdir = @sysconfdir@
target_alias = @target_alias@
top_build_prefix = @top_build_prefix@
top_builddir = @top_builddir@
top_srcdir = @top_srcdir@
@SYSTEMD_TRUE@unitsdir = @SYSTEMDSYSTEMUNITDIR@
@SYSTEMD_TRUE@units_DATA = certmonger.service
#units_DATA += certmonger.path
#servicedir = @SYSTEMBUSSERVICESDIR@
#service_DATA = org.fedorahosted.certmonger.service
@TMPFILES_TRUE@tmpfilesdir = $(prefix)/lib/tmpfiles.d
@TMPFILES_TRUE@tmpfiles_DATA = certmonger.conf
all: all-am
.SUFFIXES:
$(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__configure_deps)
@for dep in $?; do \
case '$(am__configure_deps)' in \
*$$dep*) \
( cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh ) \
&& { if test -f $@; then exit 0; else break; fi; }; \
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign systemd/Makefile'; \
$(am__cd) $(top_srcdir) && \
$(AUTOMAKE) --foreign systemd/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \
*config.status*) \
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh;; \
*) \
echo ' cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe)'; \
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe);; \
esac;
$(top_builddir)/config.status: $(top_srcdir)/configure $(CONFIG_STATUS_DEPENDENCIES)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(top_srcdir)/configure: @MAINTAINER_MODE_TRUE@ $(am__configure_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(ACLOCAL_M4): @MAINTAINER_MODE_TRUE@ $(am__aclocal_m4_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(am__aclocal_m4_deps):
certmonger.service: $(top_builddir)/config.status $(srcdir)/certmonger.service.in
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@
certmonger.path: $(top_builddir)/config.status $(srcdir)/certmonger.path.in
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@
certmonger.conf: $(top_builddir)/config.status $(srcdir)/certmonger.conf.in
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@
org.fedorahosted.certmonger.service: $(top_builddir)/config.status $(srcdir)/org.fedorahosted.certmonger.service.in
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@
install-tmpfilesDATA: $(tmpfiles_DATA)
@$(NORMAL_INSTALL)
@list='$(tmpfiles_DATA)'; test -n "$(tmpfilesdir)" || list=; \
if test -n "$$list"; then \
echo " $(MKDIR_P) '$(DESTDIR)$(tmpfilesdir)'"; \
$(MKDIR_P) "$(DESTDIR)$(tmpfilesdir)" || exit 1; \
fi; \
for p in $$list; do \
if test -f "$$p"; then d=; else d="$(srcdir)/"; fi; \
echo "$$d$$p"; \
done | $(am__base_list) | \
while read files; do \
echo " $(INSTALL_DATA) $$files '$(DESTDIR)$(tmpfilesdir)'"; \
$(INSTALL_DATA) $$files "$(DESTDIR)$(tmpfilesdir)" || exit $$?; \
done
uninstall-tmpfilesDATA:
@$(NORMAL_UNINSTALL)
@list='$(tmpfiles_DATA)'; test -n "$(tmpfilesdir)" || list=; \
files=`for p in $$list; do echo $$p; done | sed -e 's|^.*/||'`; \
dir='$(DESTDIR)$(tmpfilesdir)'; $(am__uninstall_files_from_dir)
install-unitsDATA: $(units_DATA)
@$(NORMAL_INSTALL)
@list='$(units_DATA)'; test -n "$(unitsdir)" || list=; \
if test -n "$$list"; then \
echo " $(MKDIR_P) '$(DESTDIR)$(unitsdir)'"; \
$(MKDIR_P) "$(DESTDIR)$(unitsdir)" || exit 1; \
fi; \
for p in $$list; do \
if test -f "$$p"; then d=; else d="$(srcdir)/"; fi; \
echo "$$d$$p"; \
done | $(am__base_list) | \
while read files; do \
echo " $(INSTALL_DATA) $$files '$(DESTDIR)$(unitsdir)'"; \
$(INSTALL_DATA) $$files "$(DESTDIR)$(unitsdir)" || exit $$?; \
done
uninstall-unitsDATA:
@$(NORMAL_UNINSTALL)
@list='$(units_DATA)'; test -n "$(unitsdir)" || list=; \
files=`for p in $$list; do echo $$p; done | sed -e 's|^.*/||'`; \
dir='$(DESTDIR)$(unitsdir)'; $(am__uninstall_files_from_dir)
tags TAGS:
ctags CTAGS:
cscope cscopelist:
distdir: $(DISTFILES)
@srcdirstrip=`echo "$(srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
topsrcdirstrip=`echo "$(top_srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
list='$(DISTFILES)'; \
dist_files=`for file in $$list; do echo $$file; done | \
sed -e "s|^$$srcdirstrip/||;t" \
-e "s|^$$topsrcdirstrip/|$(top_builddir)/|;t"`; \
case $$dist_files in \
*/*) $(MKDIR_P) `echo "$$dist_files" | \
sed '/\//!d;s|^|$(distdir)/|;s,/[^/]*$$,,' | \
sort -u` ;; \
esac; \
for file in $$dist_files; do \
if test -f $$file || test -d $$file; then d=.; else d=$(srcdir); fi; \
if test -d $$d/$$file; then \
dir=`echo "/$$file" | sed -e 's,/[^/]*$$,,'`; \
if test -d "$(distdir)/$$file"; then \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
if test -d $(srcdir)/$$file && test $$d != $(srcdir); then \
cp -fpR $(srcdir)/$$file "$(distdir)$$dir" || exit 1; \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
cp -fpR $$d/$$file "$(distdir)$$dir" || exit 1; \
else \
test -f "$(distdir)/$$file" \
|| cp -p $$d/$$file "$(distdir)/$$file" \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-am
all-am: Makefile $(DATA)
installdirs:
for dir in "$(DESTDIR)$(tmpfilesdir)" "$(DESTDIR)$(unitsdir)"; do \
test -z "$$dir" || $(MKDIR_P) "$$dir"; \
done
install: install-am
install-exec: install-exec-am
install-data: install-data-am
uninstall: uninstall-am
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-am
install-strip:
if test -z '$(STRIP)'; then \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
install; \
else \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
"INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'" install; \
fi
mostlyclean-generic:
clean-generic:
distclean-generic:
-test -z "$(CONFIG_CLEAN_FILES)" || rm -f $(CONFIG_CLEAN_FILES)
-test . = "$(srcdir)" || test -z "$(CONFIG_CLEAN_VPATH_FILES)" || rm -f $(CONFIG_CLEAN_VPATH_FILES)
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-am
clean-am: clean-generic mostlyclean-am
distclean: distclean-am
-rm -f Makefile
distclean-am: clean-am distclean-generic
dvi: dvi-am
dvi-am:
html: html-am
html-am:
info: info-am
info-am:
install-data-am: install-tmpfilesDATA install-unitsDATA
install-dvi: install-dvi-am
install-dvi-am:
install-exec-am:
install-html: install-html-am
install-html-am:
install-info: install-info-am
install-info-am:
install-man:
install-pdf: install-pdf-am
install-pdf-am:
install-ps: install-ps-am
install-ps-am:
installcheck-am:
maintainer-clean: maintainer-clean-am
-rm -f Makefile
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-am
mostlyclean-am: mostlyclean-generic
pdf: pdf-am
pdf-am:
ps: ps-am
ps-am:
uninstall-am: uninstall-tmpfilesDATA uninstall-unitsDATA
.MAKE: install-am install-strip
.PHONY: all all-am check check-am clean clean-generic cscopelist-am \
ctags-am distclean distclean-generic distdir dvi dvi-am html \
html-am info info-am install install-am install-data \
install-data-am install-dvi install-dvi-am install-exec \
install-exec-am install-html install-html-am install-info \
install-info-am install-man install-pdf install-pdf-am \
install-ps install-ps-am install-strip install-tmpfilesDATA \
install-unitsDATA installcheck installcheck-am installdirs \
maintainer-clean maintainer-clean-generic mostlyclean \
mostlyclean-generic pdf pdf-am ps ps-am tags-am uninstall \
uninstall-am uninstall-tmpfilesDATA uninstall-unitsDATA
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:
certmonger-0.74/dbus/ 0000775 0001750 0001750 00000000000 12317265252 011556 5 0000000 0000000 certmonger-0.74/dbus/certmonger.service.in 0000664 0001750 0001750 00000000113 12317265222 015622 0000000 0000000 [D-BUS Service]
Name=@CM_DBUS_NAME@
Exec=@mylibexecdir@/certmonger-session
certmonger-0.74/dbus/certmonger.conf.in 0000664 0001750 0001750 00000001636 12317265222 015122 0000000 0000000
certmonger-0.74/dbus/Makefile.am 0000664 0001750 0001750 00000000227 12317265222 013530 0000000 0000000 servicedir = @SESSIONBUSSERVICESDIR@
service_DATA = certmonger.service
systemdbusdir = $(sysconfdir)/dbus-1/system.d
systemdbus_DATA = certmonger.conf
certmonger-0.74/dbus/Makefile.in 0000664 0001750 0001750 00000043030 12317265230 013537 0000000 0000000 # Makefile.in generated by automake 1.14.1 from Makefile.am.
# @configure_input@
# Copyright (C) 1994-2013 Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
VPATH = @srcdir@
am__is_gnu_make = test -n '$(MAKEFILE_LIST)' && test -n '$(MAKELEVEL)'
am__make_running_with_option = \
case $${target_option-} in \
?) ;; \
*) echo "am__make_running_with_option: internal error: invalid" \
"target option '$${target_option-}' specified" >&2; \
exit 1;; \
esac; \
has_opt=no; \
sane_makeflags=$$MAKEFLAGS; \
if $(am__is_gnu_make); then \
sane_makeflags=$$MFLAGS; \
else \
case $$MAKEFLAGS in \
*\\[\ \ ]*) \
bs=\\; \
sane_makeflags=`printf '%s\n' "$$MAKEFLAGS" \
| sed "s/$$bs$$bs[$$bs $$bs ]*//g"`;; \
esac; \
fi; \
skip_next=no; \
strip_trailopt () \
{ \
flg=`printf '%s\n' "$$flg" | sed "s/$$1.*$$//"`; \
}; \
for flg in $$sane_makeflags; do \
test $$skip_next = yes && { skip_next=no; continue; }; \
case $$flg in \
*=*|--*) continue;; \
-*I) strip_trailopt 'I'; skip_next=yes;; \
-*I?*) strip_trailopt 'I';; \
-*O) strip_trailopt 'O'; skip_next=yes;; \
-*O?*) strip_trailopt 'O';; \
-*l) strip_trailopt 'l'; skip_next=yes;; \
-*l?*) strip_trailopt 'l';; \
-[dEDm]) skip_next=yes;; \
-[JT]) skip_next=yes;; \
esac; \
case $$flg in \
*$$target_option*) has_opt=yes; break;; \
esac; \
done; \
test $$has_opt = yes
am__make_dryrun = (target_option=n; $(am__make_running_with_option))
am__make_keepgoing = (target_option=k; $(am__make_running_with_option))
pkgdatadir = $(datadir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkglibexecdir = $(libexecdir)/@PACKAGE@
am__cd = CDPATH="$${ZSH_VERSION+.}$(PATH_SEPARATOR)" && cd
install_sh_DATA = $(install_sh) -c -m 644
install_sh_PROGRAM = $(install_sh) -c
install_sh_SCRIPT = $(install_sh) -c
INSTALL_HEADER = $(INSTALL_DATA)
transform = $(program_transform_name)
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
build_triplet = @build@
host_triplet = @host@
subdir = dbus
DIST_COMMON = $(srcdir)/Makefile.in $(srcdir)/Makefile.am \
$(srcdir)/certmonger.conf.in $(srcdir)/certmonger.service.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/intlmacosx.m4 \
$(top_srcdir)/m4/lib-ld.m4 $(top_srcdir)/m4/lib-link.m4 \
$(top_srcdir)/m4/lib-prefix.m4 $(top_srcdir)/m4/nls.m4 \
$(top_srcdir)/m4/po.m4 $(top_srcdir)/m4/progtest.m4 \
$(top_srcdir)/configure.ac
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(install_sh) -d
CONFIG_HEADER = $(top_builddir)/src/config.h
CONFIG_CLEAN_FILES = certmonger.conf certmonger.service
CONFIG_CLEAN_VPATH_FILES =
AM_V_P = $(am__v_P_@AM_V@)
am__v_P_ = $(am__v_P_@AM_DEFAULT_V@)
am__v_P_0 = false
am__v_P_1 = :
AM_V_GEN = $(am__v_GEN_@AM_V@)
am__v_GEN_ = $(am__v_GEN_@AM_DEFAULT_V@)
am__v_GEN_0 = @echo " GEN " $@;
am__v_GEN_1 =
AM_V_at = $(am__v_at_@AM_V@)
am__v_at_ = $(am__v_at_@AM_DEFAULT_V@)
am__v_at_0 = @
am__v_at_1 =
SOURCES =
DIST_SOURCES =
am__can_run_installinfo = \
case $$AM_UPDATE_INFO_DIR in \
n|no|NO) false;; \
*) (install-info --version) >/dev/null 2>&1;; \
esac
am__vpath_adj_setup = srcdirstrip=`echo "$(srcdir)" | sed 's|.|.|g'`;
am__vpath_adj = case $$p in \
$(srcdir)/*) f=`echo "$$p" | sed "s|^$$srcdirstrip/||"`;; \
*) f=$$p;; \
esac;
am__strip_dir = f=`echo $$p | sed -e 's|^.*/||'`;
am__install_max = 40
am__nobase_strip_setup = \
srcdirstrip=`echo "$(srcdir)" | sed 's/[].[^$$\\*|]/\\\\&/g'`
am__nobase_strip = \
for p in $$list; do echo "$$p"; done | sed -e "s|$$srcdirstrip/||"
am__nobase_list = $(am__nobase_strip_setup); \
for p in $$list; do echo "$$p $$p"; done | \
sed "s| $$srcdirstrip/| |;"' / .*\//!s/ .*/ ./; s,\( .*\)/[^/]*$$,\1,' | \
$(AWK) 'BEGIN { files["."] = "" } { files[$$2] = files[$$2] " " $$1; \
if (++n[$$2] == $(am__install_max)) \
{ print $$2, files[$$2]; n[$$2] = 0; files[$$2] = "" } } \
END { for (dir in files) print dir, files[dir] }'
am__base_list = \
sed '$$!N;$$!N;$$!N;$$!N;$$!N;$$!N;$$!N;s/\n/ /g' | \
sed '$$!N;$$!N;$$!N;$$!N;s/\n/ /g'
am__uninstall_files_from_dir = { \
test -z "$$files" \
|| { test ! -d "$$dir" && test ! -f "$$dir" && test ! -r "$$dir"; } \
|| { echo " ( cd '$$dir' && rm -f" $$files ")"; \
$(am__cd) "$$dir" && rm -f $$files; }; \
}
am__installdirs = "$(DESTDIR)$(servicedir)" \
"$(DESTDIR)$(systemdbusdir)"
DATA = $(service_DATA) $(systemdbus_DATA)
am__tagged_files = $(HEADERS) $(SOURCES) $(TAGS_FILES) $(LISP)
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
ACLOCAL = @ACLOCAL@
AMTAR = @AMTAR@
AM_DEFAULT_VERBOSITY = @AM_DEFAULT_VERBOSITY@
AUTOCONF = @AUTOCONF@
AUTOHEADER = @AUTOHEADER@
AUTOMAKE = @AUTOMAKE@
AWK = @AWK@
CC = @CC@
CCDEPMODE = @CCDEPMODE@
CERTMONGER_CFLAGS = @CERTMONGER_CFLAGS@
CERTMONGER_LIBS = @CERTMONGER_LIBS@
CFLAGS = @CFLAGS@
CM_CERTMASTER_CA_NAME = @CM_CERTMASTER_CA_NAME@
CM_DBUS_NAME = @CM_DBUS_NAME@
CM_DEFAULT_CERT_LIFETIME = @CM_DEFAULT_CERT_LIFETIME@
CM_DEFAULT_IDLE_TIMEOUT = @CM_DEFAULT_IDLE_TIMEOUT@
CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY = @CM_DEFAULT_NOTIFICATION_SYSLOG_PRIORITY@
CM_DEFAULT_POPULATE_UNIQUE_ID = @CM_DEFAULT_POPULATE_UNIQUE_ID@
CM_DEFAULT_PUBKEY_SIZE = @CM_DEFAULT_PUBKEY_SIZE@
CM_DEFAULT_TTL_LIST = @CM_DEFAULT_TTL_LIST@
CM_HOMEDIR = @CM_HOMEDIR@
CM_IPA_CA_NAME = @CM_IPA_CA_NAME@
CM_MINIMUM_DSA_KEY_SIZE = @CM_MINIMUM_DSA_KEY_SIZE@
CM_MINIMUM_EC_KEY_SIZE = @CM_MINIMUM_EC_KEY_SIZE@
CM_MINIMUM_RSA_KEY_SIZE = @CM_MINIMUM_RSA_KEY_SIZE@
CM_NOTIFICATION_ENV = @CM_NOTIFICATION_ENV@
CM_SELF_SIGN_CA_NAME = @CM_SELF_SIGN_CA_NAME@
CM_STORE_CAS_DIRECTORY = @CM_STORE_CAS_DIRECTORY@
CM_STORE_CAS_DIRECTORY_ENV = @CM_STORE_CAS_DIRECTORY_ENV@
CM_STORE_CONFIG_DIRECTORY_ENV = @CM_STORE_CONFIG_DIRECTORY_ENV@
CM_STORE_REQUESTS_DIRECTORY = @CM_STORE_REQUESTS_DIRECTORY@
CM_STORE_REQUESTS_DIRECTORY_ENV = @CM_STORE_REQUESTS_DIRECTORY_ENV@
CM_TMPDIR = @CM_TMPDIR@
CM_TMPDIR_ENV = @CM_TMPDIR_ENV@
CPP = @CPP@
CPPFLAGS = @CPPFLAGS@
CURL_CFLAGS = @CURL_CFLAGS@
CURL_LIBS = @CURL_LIBS@
CYGPATH_W = @CYGPATH_W@
DBUS_CFLAGS = @DBUS_CFLAGS@
DBUS_LIBS = @DBUS_LIBS@
DEFS = @DEFS@
DEPDIR = @DEPDIR@
ECHO_C = @ECHO_C@
ECHO_N = @ECHO_N@
ECHO_T = @ECHO_T@
EGREP = @EGREP@
EXEEXT = @EXEEXT@
GETCERT_CFLAGS = @GETCERT_CFLAGS@
GETCERT_LIBS = @GETCERT_LIBS@
GETTEXT_MACRO_VERSION = @GETTEXT_MACRO_VERSION@
GMSGFMT = @GMSGFMT@
GMSGFMT_015 = @GMSGFMT_015@
GREP = @GREP@
INSTALL = @INSTALL@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INTLLIBS = @INTLLIBS@
INTL_MACOSX_LIBS = @INTL_MACOSX_LIBS@
KRB5_CFLAGS = @KRB5_CFLAGS@
KRB5_CONFIG = @KRB5_CONFIG@
KRB5_LIBS = @KRB5_LIBS@
LDFLAGS = @LDFLAGS@
LIBICONV = @LIBICONV@
LIBINTL = @LIBINTL@
LIBOBJS = @LIBOBJS@
LIBS = @LIBS@
LTLIBICONV = @LTLIBICONV@
LTLIBINTL = @LTLIBINTL@
LTLIBOBJS = @LTLIBOBJS@
MAINT = @MAINT@
MAKEINFO = @MAKEINFO@
MAN_DSA = @MAN_DSA@
MAN_EC = @MAN_EC@
MKDIR_P = @MKDIR_P@
MSGFMT = @MSGFMT@
MSGFMT_015 = @MSGFMT_015@
MSGMERGE = @MSGMERGE@
NO_MAN_DSA = @NO_MAN_DSA@
NO_MAN_EC = @NO_MAN_EC@
NSS_CFLAGS = @NSS_CFLAGS@
NSS_LIBS = @NSS_LIBS@
OBJEXT = @OBJEXT@
OPENSSL_CFLAGS = @OPENSSL_CFLAGS@
OPENSSL_LIBS = @OPENSSL_LIBS@
OPENSSL_SSL_CFLAGS = @OPENSSL_SSL_CFLAGS@
OPENSSL_SSL_LIBS = @OPENSSL_SSL_LIBS@
PACKAGE = @PACKAGE@
PACKAGE_BUGREPORT = @PACKAGE_BUGREPORT@
PACKAGE_NAME = @PACKAGE_NAME@
PACKAGE_STRING = @PACKAGE_STRING@
PACKAGE_TARNAME = @PACKAGE_TARNAME@
PACKAGE_URL = @PACKAGE_URL@
PACKAGE_VERSION = @PACKAGE_VERSION@
PATH_SEPARATOR = @PATH_SEPARATOR@
PKG_CONFIG = @PKG_CONFIG@
PKG_CONFIG_LIBDIR = @PKG_CONFIG_LIBDIR@
PKG_CONFIG_PATH = @PKG_CONFIG_PATH@
POSUB = @POSUB@
RANLIB = @RANLIB@
SESSIONBUSSERVICESDIR = @SESSIONBUSSERVICESDIR@
SET_MAKE = @SET_MAKE@
SHELL = @SHELL@
STRIP = @STRIP@
SYSTEMBUSSERVICESDIR = @SYSTEMBUSSERVICESDIR@
SYSTEMD = @SYSTEMD@
SYSTEMDSYSTEMUNITDIR = @SYSTEMDSYSTEMUNITDIR@
SYSVINIT = @SYSVINIT@
TALLOC_CFLAGS = @TALLOC_CFLAGS@
TALLOC_LIBS = @TALLOC_LIBS@
TEVENT_CFLAGS = @TEVENT_CFLAGS@
TEVENT_LIBS = @TEVENT_LIBS@
TMPFILES = @TMPFILES@
USE_NLS = @USE_NLS@
UUID_CFLAGS = @UUID_CFLAGS@
UUID_LIBS = @UUID_LIBS@
VERSION = @VERSION@
XGETTEXT = @XGETTEXT@
XGETTEXT_015 = @XGETTEXT_015@
XGETTEXT_EXTRA_OPTIONS = @XGETTEXT_EXTRA_OPTIONS@
XMLRPC_CFLAGS = @XMLRPC_CFLAGS@
XMLRPC_C_CONFIG = @XMLRPC_C_CONFIG@
XMLRPC_LIBS = @XMLRPC_LIBS@
XML_CFLAGS = @XML_CFLAGS@
XML_LIBS = @XML_LIBS@
abs_builddir = @abs_builddir@
abs_srcdir = @abs_srcdir@
abs_top_builddir = @abs_top_builddir@
abs_top_srcdir = @abs_top_srcdir@
ac_ct_CC = @ac_ct_CC@
am__include = @am__include@
am__leading_dot = @am__leading_dot@
am__quote = @am__quote@
am__tar = @am__tar@
am__untar = @am__untar@
bindir = @bindir@
build = @build@
build_alias = @build_alias@
build_cpu = @build_cpu@
build_os = @build_os@
build_vendor = @build_vendor@
builddir = @builddir@
datadir = @datadir@
datarootdir = @datarootdir@
docdir = @docdir@
dvidir = @dvidir@
exec_prefix = @exec_prefix@
host = @host@
host_alias = @host_alias@
host_cpu = @host_cpu@
host_os = @host_os@
host_vendor = @host_vendor@
htmldir = @htmldir@
includedir = @includedir@
infodir = @infodir@
install_sh = @install_sh@
libdir = @libdir@
libexecdir = @libexecdir@
localedir = @localedir@
localstatedir = @localstatedir@
mandir = @mandir@
mkdir_p = @mkdir_p@
mylibexecdir = @mylibexecdir@
mysbindir = @mysbindir@
oldincludedir = @oldincludedir@
pdfdir = @pdfdir@
prefix = @prefix@
program_transform_name = @program_transform_name@
psdir = @psdir@
sbindir = @sbindir@
sharedstatedir = @sharedstatedir@
srcdir = @srcdir@
sysconfdir = @sysconfdir@
target_alias = @target_alias@
top_build_prefix = @top_build_prefix@
top_builddir = @top_builddir@
top_srcdir = @top_srcdir@
servicedir = @SESSIONBUSSERVICESDIR@
service_DATA = certmonger.service
systemdbusdir = $(sysconfdir)/dbus-1/system.d
systemdbus_DATA = certmonger.conf
all: all-am
.SUFFIXES:
$(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__configure_deps)
@for dep in $?; do \
case '$(am__configure_deps)' in \
*$$dep*) \
( cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh ) \
&& { if test -f $@; then exit 0; else break; fi; }; \
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign dbus/Makefile'; \
$(am__cd) $(top_srcdir) && \
$(AUTOMAKE) --foreign dbus/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \
*config.status*) \
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh;; \
*) \
echo ' cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe)'; \
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe);; \
esac;
$(top_builddir)/config.status: $(top_srcdir)/configure $(CONFIG_STATUS_DEPENDENCIES)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(top_srcdir)/configure: @MAINTAINER_MODE_TRUE@ $(am__configure_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(ACLOCAL_M4): @MAINTAINER_MODE_TRUE@ $(am__aclocal_m4_deps)
cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
$(am__aclocal_m4_deps):
certmonger.conf: $(top_builddir)/config.status $(srcdir)/certmonger.conf.in
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@
certmonger.service: $(top_builddir)/config.status $(srcdir)/certmonger.service.in
cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@
install-serviceDATA: $(service_DATA)
@$(NORMAL_INSTALL)
@list='$(service_DATA)'; test -n "$(servicedir)" || list=; \
if test -n "$$list"; then \
echo " $(MKDIR_P) '$(DESTDIR)$(servicedir)'"; \
$(MKDIR_P) "$(DESTDIR)$(servicedir)" || exit 1; \
fi; \
for p in $$list; do \
if test -f "$$p"; then d=; else d="$(srcdir)/"; fi; \
echo "$$d$$p"; \
done | $(am__base_list) | \
while read files; do \
echo " $(INSTALL_DATA) $$files '$(DESTDIR)$(servicedir)'"; \
$(INSTALL_DATA) $$files "$(DESTDIR)$(servicedir)" || exit $$?; \
done
uninstall-serviceDATA:
@$(NORMAL_UNINSTALL)
@list='$(service_DATA)'; test -n "$(servicedir)" || list=; \
files=`for p in $$list; do echo $$p; done | sed -e 's|^.*/||'`; \
dir='$(DESTDIR)$(servicedir)'; $(am__uninstall_files_from_dir)
install-systemdbusDATA: $(systemdbus_DATA)
@$(NORMAL_INSTALL)
@list='$(systemdbus_DATA)'; test -n "$(systemdbusdir)" || list=; \
if test -n "$$list"; then \
echo " $(MKDIR_P) '$(DESTDIR)$(systemdbusdir)'"; \
$(MKDIR_P) "$(DESTDIR)$(systemdbusdir)" || exit 1; \
fi; \
for p in $$list; do \
if test -f "$$p"; then d=; else d="$(srcdir)/"; fi; \
echo "$$d$$p"; \
done | $(am__base_list) | \
while read files; do \
echo " $(INSTALL_DATA) $$files '$(DESTDIR)$(systemdbusdir)'"; \
$(INSTALL_DATA) $$files "$(DESTDIR)$(systemdbusdir)" || exit $$?; \
done
uninstall-systemdbusDATA:
@$(NORMAL_UNINSTALL)
@list='$(systemdbus_DATA)'; test -n "$(systemdbusdir)" || list=; \
files=`for p in $$list; do echo $$p; done | sed -e 's|^.*/||'`; \
dir='$(DESTDIR)$(systemdbusdir)'; $(am__uninstall_files_from_dir)
tags TAGS:
ctags CTAGS:
cscope cscopelist:
distdir: $(DISTFILES)
@srcdirstrip=`echo "$(srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
topsrcdirstrip=`echo "$(top_srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
list='$(DISTFILES)'; \
dist_files=`for file in $$list; do echo $$file; done | \
sed -e "s|^$$srcdirstrip/||;t" \
-e "s|^$$topsrcdirstrip/|$(top_builddir)/|;t"`; \
case $$dist_files in \
*/*) $(MKDIR_P) `echo "$$dist_files" | \
sed '/\//!d;s|^|$(distdir)/|;s,/[^/]*$$,,' | \
sort -u` ;; \
esac; \
for file in $$dist_files; do \
if test -f $$file || test -d $$file; then d=.; else d=$(srcdir); fi; \
if test -d $$d/$$file; then \
dir=`echo "/$$file" | sed -e 's,/[^/]*$$,,'`; \
if test -d "$(distdir)/$$file"; then \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
if test -d $(srcdir)/$$file && test $$d != $(srcdir); then \
cp -fpR $(srcdir)/$$file "$(distdir)$$dir" || exit 1; \
find "$(distdir)/$$file" -type d ! -perm -700 -exec chmod u+rwx {} \;; \
fi; \
cp -fpR $$d/$$file "$(distdir)$$dir" || exit 1; \
else \
test -f "$(distdir)/$$file" \
|| cp -p $$d/$$file "$(distdir)/$$file" \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-am
all-am: Makefile $(DATA)
installdirs:
for dir in "$(DESTDIR)$(servicedir)" "$(DESTDIR)$(systemdbusdir)"; do \
test -z "$$dir" || $(MKDIR_P) "$$dir"; \
done
install: install-am
install-exec: install-exec-am
install-data: install-data-am
uninstall: uninstall-am
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-am
install-strip:
if test -z '$(STRIP)'; then \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
install; \
else \
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
"INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'" install; \
fi
mostlyclean-generic:
clean-generic:
distclean-generic:
-test -z "$(CONFIG_CLEAN_FILES)" || rm -f $(CONFIG_CLEAN_FILES)
-test . = "$(srcdir)" || test -z "$(CONFIG_CLEAN_VPATH_FILES)" || rm -f $(CONFIG_CLEAN_VPATH_FILES)
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-am
clean-am: clean-generic mostlyclean-am
distclean: distclean-am
-rm -f Makefile
distclean-am: clean-am distclean-generic
dvi: dvi-am
dvi-am:
html: html-am
html-am:
info: info-am
info-am:
install-data-am: install-serviceDATA install-systemdbusDATA
install-dvi: install-dvi-am
install-dvi-am:
install-exec-am:
install-html: install-html-am
install-html-am:
install-info: install-info-am
install-info-am:
install-man:
install-pdf: install-pdf-am
install-pdf-am:
install-ps: install-ps-am
install-ps-am:
installcheck-am:
maintainer-clean: maintainer-clean-am
-rm -f Makefile
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-am
mostlyclean-am: mostlyclean-generic
pdf: pdf-am
pdf-am:
ps: ps-am
ps-am:
uninstall-am: uninstall-serviceDATA uninstall-systemdbusDATA
.MAKE: install-am install-strip
.PHONY: all all-am check check-am clean clean-generic cscopelist-am \
ctags-am distclean distclean-generic distdir dvi dvi-am html \
html-am info info-am install install-am install-data \
install-data-am install-dvi install-dvi-am install-exec \
install-exec-am install-html install-html-am install-info \
install-info-am install-man install-pdf install-pdf-am \
install-ps install-ps-am install-serviceDATA install-strip \
install-systemdbusDATA installcheck installcheck-am \
installdirs maintainer-clean maintainer-clean-generic \
mostlyclean mostlyclean-generic pdf pdf-am ps ps-am tags-am \
uninstall uninstall-am uninstall-serviceDATA \
uninstall-systemdbusDATA
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:
certmonger-0.74/depcomp 0000755 0001750 0001750 00000056016 12317265231 012121 0000000 0000000 #! /bin/sh
# depcomp - compile a program generating dependencies as side-effects
scriptversion=2013-05-30.07; # UTC
# Copyright (C) 1999-2013 Free Software Foundation, Inc.
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2, or (at your option)
# any later version.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
# You should have received a copy of the GNU General Public License
# along with this program. If not, see .
# As a special exception to the GNU General Public License, if you
# distribute this file as part of a program that contains a
# configuration script generated by Autoconf, you may include it under
# the same distribution terms that you use for the rest of that program.
# Originally written by Alexandre Oliva .
case $1 in
'')
echo "$0: No command. Try '$0 --help' for more information." 1>&2
exit 1;
;;
-h | --h*)
cat <<\EOF
Usage: depcomp [--help] [--version] PROGRAM [ARGS]
Run PROGRAMS ARGS to compile a file, generating dependencies
as side-effects.
Environment variables:
depmode Dependency tracking mode.
source Source file read by 'PROGRAMS ARGS'.
object Object file output by 'PROGRAMS ARGS'.
DEPDIR directory where to store dependencies.
depfile Dependency file to output.
tmpdepfile Temporary file to use when outputting dependencies.
libtool Whether libtool is used (yes/no).
Report bugs to .
EOF
exit $?
;;
-v | --v*)
echo "depcomp $scriptversion"
exit $?
;;
esac
# Get the directory component of the given path, and save it in the
# global variables '$dir'. Note that this directory component will
# be either empty or ending with a '/' character. This is deliberate.
set_dir_from ()
{
case $1 in
*/*) dir=`echo "$1" | sed -e 's|/[^/]*$|/|'`;;
*) dir=;;
esac
}
# Get the suffix-stripped basename of the given path, and save it the
# global variable '$base'.
set_base_from ()
{
base=`echo "$1" | sed -e 's|^.*/||' -e 's/\.[^.]*$//'`
}
# If no dependency file was actually created by the compiler invocation,
# we still have to create a dummy depfile, to avoid errors with the
# Makefile "include basename.Plo" scheme.
make_dummy_depfile ()
{
echo "#dummy" > "$depfile"
}
# Factor out some common post-processing of the generated depfile.
# Requires the auxiliary global variable '$tmpdepfile' to be set.
aix_post_process_depfile ()
{
# If the compiler actually managed to produce a dependency file,
# post-process it.
if test -f "$tmpdepfile"; then
# Each line is of the form 'foo.o: dependency.h'.
# Do two passes, one to just change these to
# $object: dependency.h
# and one to simply output
# dependency.h:
# which is needed to avoid the deleted-header problem.
{ sed -e "s,^.*\.[$lower]*:,$object:," < "$tmpdepfile"
sed -e "s,^.*\.[$lower]*:[$tab ]*,," -e 's,$,:,' < "$tmpdepfile"
} > "$depfile"
rm -f "$tmpdepfile"
else
make_dummy_depfile
fi
}
# A tabulation character.
tab=' '
# A newline character.
nl='
'
# Character ranges might be problematic outside the C locale.
# These definitions help.
upper=ABCDEFGHIJKLMNOPQRSTUVWXYZ
lower=abcdefghijklmnopqrstuvwxyz
digits=0123456789
alpha=${upper}${lower}
if test -z "$depmode" || test -z "$source" || test -z "$object"; then
echo "depcomp: Variables source, object and depmode must be set" 1>&2
exit 1
fi
# Dependencies for sub/bar.o or sub/bar.obj go into sub/.deps/bar.Po.
depfile=${depfile-`echo "$object" |
sed 's|[^\\/]*$|'${DEPDIR-.deps}'/&|;s|\.\([^.]*\)$|.P\1|;s|Pobj$|Po|'`}
tmpdepfile=${tmpdepfile-`echo "$depfile" | sed 's/\.\([^.]*\)$/.T\1/'`}
rm -f "$tmpdepfile"
# Avoid interferences from the environment.
gccflag= dashmflag=
# Some modes work just like other modes, but use different flags. We
# parameterize here, but still list the modes in the big case below,
# to make depend.m4 easier to write. Note that we *cannot* use a case
# here, because this file can only contain one case statement.
if test "$depmode" = hp; then
# HP compiler uses -M and no extra arg.
gccflag=-M
depmode=gcc
fi
if test "$depmode" = dashXmstdout; then
# This is just like dashmstdout with a different argument.
dashmflag=-xM
depmode=dashmstdout
fi
cygpath_u="cygpath -u -f -"
if test "$depmode" = msvcmsys; then
# This is just like msvisualcpp but w/o cygpath translation.
# Just convert the backslash-escaped backslashes to single forward
# slashes to satisfy depend.m4
cygpath_u='sed s,\\\\,/,g'
depmode=msvisualcpp
fi
if test "$depmode" = msvc7msys; then
# This is just like msvc7 but w/o cygpath translation.
# Just convert the backslash-escaped backslashes to single forward
# slashes to satisfy depend.m4
cygpath_u='sed s,\\\\,/,g'
depmode=msvc7
fi
if test "$depmode" = xlc; then
# IBM C/C++ Compilers xlc/xlC can output gcc-like dependency information.
gccflag=-qmakedep=gcc,-MF
depmode=gcc
fi
case "$depmode" in
gcc3)
## gcc 3 implements dependency tracking that does exactly what
## we want. Yay! Note: for some reason libtool 1.4 doesn't like
## it if -MD -MP comes after the -MF stuff. Hmm.
## Unfortunately, FreeBSD c89 acceptance of flags depends upon
## the command line argument order; so add the flags where they
## appear in depend2.am. Note that the slowdown incurred here
## affects only configure: in makefiles, %FASTDEP% shortcuts this.
for arg
do
case $arg in
-c) set fnord "$@" -MT "$object" -MD -MP -MF "$tmpdepfile" "$arg" ;;
*) set fnord "$@" "$arg" ;;
esac
shift # fnord
shift # $arg
done
"$@"
stat=$?
if test $stat -ne 0; then
rm -f "$tmpdepfile"
exit $stat
fi
mv "$tmpdepfile" "$depfile"
;;
gcc)
## Note that this doesn't just cater to obsosete pre-3.x GCC compilers.
## but also to in-use compilers like IMB xlc/xlC and the HP C compiler.
## (see the conditional assignment to $gccflag above).
## There are various ways to get dependency output from gcc. Here's
## why we pick this rather obscure method:
## - Don't want to use -MD because we'd like the dependencies to end
## up in a subdir. Having to rename by hand is ugly.
## (We might end up doing this anyway to support other compilers.)
## - The DEPENDENCIES_OUTPUT environment variable makes gcc act like
## -MM, not -M (despite what the docs say). Also, it might not be
## supported by the other compilers which use the 'gcc' depmode.
## - Using -M directly means running the compiler twice (even worse
## than renaming).
if test -z "$gccflag"; then
gccflag=-MD,
fi
"$@" -Wp,"$gccflag$tmpdepfile"
stat=$?
if test $stat -ne 0; then
rm -f "$tmpdepfile"
exit $stat
fi
rm -f "$depfile"
echo "$object : \\" > "$depfile"
# The second -e expression handles DOS-style file names with drive
# letters.
sed -e 's/^[^:]*: / /' \
-e 's/^['$alpha']:\/[^:]*: / /' < "$tmpdepfile" >> "$depfile"
## This next piece of magic avoids the "deleted header file" problem.
## The problem is that when a header file which appears in a .P file
## is deleted, the dependency causes make to die (because there is
## typically no way to rebuild the header). We avoid this by adding
## dummy dependencies for each header file. Too bad gcc doesn't do
## this for us directly.
## Some versions of gcc put a space before the ':'. On the theory
## that the space means something, we add a space to the output as
## well. hp depmode also adds that space, but also prefixes the VPATH
## to the object. Take care to not repeat it in the output.
## Some versions of the HPUX 10.20 sed can't process this invocation
## correctly. Breaking it into two sed invocations is a workaround.
tr ' ' "$nl" < "$tmpdepfile" \
| sed -e 's/^\\$//' -e '/^$/d' -e "s|.*$object$||" -e '/:$/d' \
| sed -e 's/$/ :/' >> "$depfile"
rm -f "$tmpdepfile"
;;
hp)
# This case exists only to let depend.m4 do its work. It works by
# looking at the text of this script. This case will never be run,
# since it is checked for above.
exit 1
;;
sgi)
if test "$libtool" = yes; then
"$@" "-Wp,-MDupdate,$tmpdepfile"
else
"$@" -MDupdate "$tmpdepfile"
fi
stat=$?
if test $stat -ne 0; then
rm -f "$tmpdepfile"
exit $stat
fi
rm -f "$depfile"
if test -f "$tmpdepfile"; then # yes, the sourcefile depend on other files
echo "$object : \\" > "$depfile"
# Clip off the initial element (the dependent). Don't try to be
# clever and replace this with sed code, as IRIX sed won't handle
# lines with more than a fixed number of characters (4096 in
# IRIX 6.2 sed, 8192 in IRIX 6.5). We also remove comment lines;
# the IRIX cc adds comments like '#:fec' to the end of the
# dependency line.
tr ' ' "$nl" < "$tmpdepfile" \
| sed -e 's/^.*\.o://' -e 's/#.*$//' -e '/^$/ d' \
| tr "$nl" ' ' >> "$depfile"
echo >> "$depfile"
# The second pass generates a dummy entry for each header file.
tr ' ' "$nl" < "$tmpdepfile" \
| sed -e 's/^.*\.o://' -e 's/#.*$//' -e '/^$/ d' -e 's/$/:/' \
>> "$depfile"
else
make_dummy_depfile
fi
rm -f "$tmpdepfile"
;;
xlc)
# This case exists only to let depend.m4 do its work. It works by
# looking at the text of this script. This case will never be run,
# since it is checked for above.
exit 1
;;
aix)
# The C for AIX Compiler uses -M and outputs the dependencies
# in a .u file. In older versions, this file always lives in the
# current directory. Also, the AIX compiler puts '$object:' at the
# start of each line; $object doesn't have directory information.
# Version 6 uses the directory in both cases.
set_dir_from "$object"
set_base_from "$object"
if test "$libtool" = yes; then
tmpdepfile1=$dir$base.u
tmpdepfile2=$base.u
tmpdepfile3=$dir.libs/$base.u
"$@" -Wc,-M
else
tmpdepfile1=$dir$base.u
tmpdepfile2=$dir$base.u
tmpdepfile3=$dir$base.u
"$@" -M
fi
stat=$?
if test $stat -ne 0; then
rm -f "$tmpdepfile1" "$tmpdepfile2" "$tmpdepfile3"
exit $stat
fi
for tmpdepfile in "$tmpdepfile1" "$tmpdepfile2" "$tmpdepfile3"
do
test -f "$tmpdepfile" && break
done
aix_post_process_depfile
;;
tcc)
# tcc (Tiny C Compiler) understand '-MD -MF file' since version 0.9.26
# FIXME: That version still under development at the moment of writing.
# Make that this statement remains true also for stable, released
# versions.
# It will wrap lines (doesn't matter whether long or short) with a
# trailing '\', as in:
#
# foo.o : \
# foo.c \
# foo.h \
#
# It will put a trailing '\' even on the last line, and will use leading
# spaces rather than leading tabs (at least since its commit 0394caf7
# "Emit spaces for -MD").
"$@" -MD -MF "$tmpdepfile"
stat=$?
if test $stat -ne 0; then
rm -f "$tmpdepfile"
exit $stat
fi
rm -f "$depfile"
# Each non-empty line is of the form 'foo.o : \' or ' dep.h \'.
# We have to change lines of the first kind to '$object: \'.
sed -e "s|.*:|$object :|" < "$tmpdepfile" > "$depfile"
# And for each line of the second kind, we have to emit a 'dep.h:'
# dummy dependency, to avoid the deleted-header problem.
sed -n -e 's|^ *\(.*\) *\\$|\1:|p' < "$tmpdepfile" >> "$depfile"
rm -f "$tmpdepfile"
;;
## The order of this option in the case statement is important, since the
## shell code in configure will try each of these formats in the order
## listed in this file. A plain '-MD' option would be understood by many
## compilers, so we must ensure this comes after the gcc and icc options.
pgcc)
# Portland's C compiler understands '-MD'.
# Will always output deps to 'file.d' where file is the root name of the
# source file under compilation, even if file resides in a subdirectory.
# The object file name does not affect the name of the '.d' file.
# pgcc 10.2 will output
# foo.o: sub/foo.c sub/foo.h
# and will wrap long lines using '\' :
# foo.o: sub/foo.c ... \
# sub/foo.h ... \
# ...
set_dir_from "$object"
# Use the source, not the object, to determine the base name, since
# that's sadly what pgcc will do too.
set_base_from "$source"
tmpdepfile=$base.d
# For projects that build the same source file twice into different object
# files, the pgcc approach of using the *source* file root name can cause
# problems in parallel builds. Use a locking strategy to avoid stomping on
# the same $tmpdepfile.
lockdir=$base.d-lock
trap "
echo '$0: caught signal, cleaning up...' >&2
rmdir '$lockdir'
exit 1
" 1 2 13 15
numtries=100
i=$numtries
while test $i -gt 0; do
# mkdir is a portable test-and-set.
if mkdir "$lockdir" 2>/dev/null; then
# This process acquired the lock.
"$@" -MD
stat=$?
# Release the lock.
rmdir "$lockdir"
break
else
# If the lock is being held by a different process, wait
# until the winning process is done or we timeout.
while test -d "$lockdir" && test $i -gt 0; do
sleep 1
i=`expr $i - 1`
done
fi
i=`expr $i - 1`
done
trap - 1 2 13 15
if test $i -le 0; then
echo "$0: failed to acquire lock after $numtries attempts" >&2
echo "$0: check lockdir '$lockdir'" >&2
exit 1
fi
if test $stat -ne 0; then
rm -f "$tmpdepfile"
exit $stat
fi
rm -f "$depfile"
# Each line is of the form `foo.o: dependent.h',
# or `foo.o: dep1.h dep2.h \', or ` dep3.h dep4.h \'.
# Do two passes, one to just change these to
# `$object: dependent.h' and one to simply `dependent.h:'.
sed "s,^[^:]*:,$object :," < "$tmpdepfile" > "$depfile"
# Some versions of the HPUX 10.20 sed can't process this invocation
# correctly. Breaking it into two sed invocations is a workaround.
sed 's,^[^:]*: \(.*\)$,\1,;s/^\\$//;/^$/d;/:$/d' < "$tmpdepfile" \
| sed -e 's/$/ :/' >> "$depfile"
rm -f "$tmpdepfile"
;;
hp2)
# The "hp" stanza above does not work with aCC (C++) and HP's ia64
# compilers, which have integrated preprocessors. The correct option
# to use with these is +Maked; it writes dependencies to a file named
# 'foo.d', which lands next to the object file, wherever that
# happens to be.
# Much of this is similar to the tru64 case; see comments there.
set_dir_from "$object"
set_base_from "$object"
if test "$libtool" = yes; then
tmpdepfile1=$dir$base.d
tmpdepfile2=$dir.libs/$base.d
"$@" -Wc,+Maked
else
tmpdepfile1=$dir$base.d
tmpdepfile2=$dir$base.d
"$@" +Maked
fi
stat=$?
if test $stat -ne 0; then
rm -f "$tmpdepfile1" "$tmpdepfile2"
exit $stat
fi
for tmpdepfile in "$tmpdepfile1" "$tmpdepfile2"
do
test -f "$tmpdepfile" && break
done
if test -f "$tmpdepfile"; then
sed -e "s,^.*\.[$lower]*:,$object:," "$tmpdepfile" > "$depfile"
# Add 'dependent.h:' lines.
sed -ne '2,${
s/^ *//
s/ \\*$//
s/$/:/
p
}' "$tmpdepfile" >> "$depfile"
else
make_dummy_depfile
fi
rm -f "$tmpdepfile" "$tmpdepfile2"
;;
tru64)
# The Tru64 compiler uses -MD to generate dependencies as a side
# effect. 'cc -MD -o foo.o ...' puts the dependencies into 'foo.o.d'.
# At least on Alpha/Redhat 6.1, Compaq CCC V6.2-504 seems to put
# dependencies in 'foo.d' instead, so we check for that too.
# Subdirectories are respected.
set_dir_from "$object"
set_base_from "$object"
if test "$libtool" = yes; then
# Libtool generates 2 separate objects for the 2 libraries. These
# two compilations output dependencies in $dir.libs/$base.o.d and
# in $dir$base.o.d. We have to check for both files, because
# one of the two compilations can be disabled. We should prefer
# $dir$base.o.d over $dir.libs/$base.o.d because the latter is
# automatically cleaned when .libs/ is deleted, while ignoring
# the former would cause a distcleancheck panic.
tmpdepfile1=$dir$base.o.d # libtool 1.5
tmpdepfile2=$dir.libs/$base.o.d # Likewise.
tmpdepfile3=$dir.libs/$base.d # Compaq CCC V6.2-504
"$@" -Wc,-MD
else
tmpdepfile1=$dir$base.d
tmpdepfile2=$dir$base.d
tmpdepfile3=$dir$base.d
"$@" -MD
fi
stat=$?
if test $stat -ne 0; then
rm -f "$tmpdepfile1" "$tmpdepfile2" "$tmpdepfile3"
exit $stat
fi
for tmpdepfile in "$tmpdepfile1" "$tmpdepfile2" "$tmpdepfile3"
do
test -f "$tmpdepfile" && break
done
# Same post-processing that is required for AIX mode.
aix_post_process_depfile
;;
msvc7)
if test "$libtool" = yes; then
showIncludes=-Wc,-showIncludes
else
showIncludes=-showIncludes
fi
"$@" $showIncludes > "$tmpdepfile"
stat=$?
grep -v '^Note: including file: ' "$tmpdepfile"
if test $stat -ne 0; then
rm -f "$tmpdepfile"
exit $stat
fi
rm -f "$depfile"
echo "$object : \\" > "$depfile"
# The first sed program below extracts the file names and escapes
# backslashes for cygpath. The second sed program outputs the file
# name when reading, but also accumulates all include files in the
# hold buffer in order to output them again at the end. This only
# works with sed implementations that can handle large buffers.
sed < "$tmpdepfile" -n '
/^Note: including file: *\(.*\)/ {
s//\1/
s/\\/\\\\/g
p
}' | $cygpath_u | sort -u | sed -n '
s/ /\\ /g
s/\(.*\)/'"$tab"'\1 \\/p
s/.\(.*\) \\/\1:/
H
$ {
s/.*/'"$tab"'/
G
p
}' >> "$depfile"
echo >> "$depfile" # make sure the fragment doesn't end with a backslash
rm -f "$tmpdepfile"
;;
msvc7msys)
# This case exists only to let depend.m4 do its work. It works by
# looking at the text of this script. This case will never be run,
# since it is checked for above.
exit 1
;;
#nosideeffect)
# This comment above is used by automake to tell side-effect
# dependency tracking mechanisms from slower ones.
dashmstdout)
# Important note: in order to support this mode, a compiler *must*
# always write the preprocessed file to stdout, regardless of -o.
"$@" || exit $?
# Remove the call to Libtool.
if test "$libtool" = yes; then
while test "X$1" != 'X--mode=compile'; do
shift
done
shift
fi
# Remove '-o $object'.
IFS=" "
for arg
do
case $arg in
-o)
shift
;;
$object)
shift
;;
*)
set fnord "$@" "$arg"
shift # fnord
shift # $arg
;;
esac
done
test -z "$dashmflag" && dashmflag=-M
# Require at least two characters before searching for ':'
# in the target name. This is to cope with DOS-style filenames:
# a dependency such as 'c:/foo/bar' could be seen as target 'c' otherwise.
"$@" $dashmflag |
sed "s|^[$tab ]*[^:$tab ][^:][^:]*:[$tab ]*|$object: |" > "$tmpdepfile"
rm -f "$depfile"
cat < "$tmpdepfile" > "$depfile"
# Some versions of the HPUX 10.20 sed can't process this sed invocation
# correctly. Breaking it into two sed invocations is a workaround.
tr ' ' "$nl" < "$tmpdepfile" \
| sed -e 's/^\\$//' -e '/^$/d' -e '/:$/d' \
| sed -e 's/$/ :/' >> "$depfile"
rm -f "$tmpdepfile"
;;
dashXmstdout)
# This case only exists to satisfy depend.m4. It is never actually
# run, as this mode is specially recognized in the preamble.
exit 1
;;
makedepend)
"$@" || exit $?
# Remove any Libtool call
if test "$libtool" = yes; then
while test "X$1" != 'X--mode=compile'; do
shift
done
shift
fi
# X makedepend
shift
cleared=no eat=no
for arg
do
case $cleared in
no)
set ""; shift
cleared=yes ;;
esac
if test $eat = yes; then
eat=no
continue
fi
case "$arg" in
-D*|-I*)
set fnord "$@" "$arg"; shift ;;
# Strip any option that makedepend may not understand. Remove
# the object too, otherwise makedepend will parse it as a source file.
-arch)
eat=yes ;;
-*|$object)
;;
*)
set fnord "$@" "$arg"; shift ;;
esac
done
obj_suffix=`echo "$object" | sed 's/^.*\././'`
touch "$tmpdepfile"
${MAKEDEPEND-makedepend} -o"$obj_suffix" -f"$tmpdepfile" "$@"
rm -f "$depfile"
# makedepend may prepend the VPATH from the source file name to the object.
# No need to regex-escape $object, excess matching of '.' is harmless.
sed "s|^.*\($object *:\)|\1|" "$tmpdepfile" > "$depfile"
# Some versions of the HPUX 10.20 sed can't process the last invocation
# correctly. Breaking it into two sed invocations is a workaround.
sed '1,2d' "$tmpdepfile" \
| tr ' ' "$nl" \
| sed -e 's/^\\$//' -e '/^$/d' -e '/:$/d' \
| sed -e 's/$/ :/' >> "$depfile"
rm -f "$tmpdepfile" "$tmpdepfile".bak
;;
cpp)
# Important note: in order to support this mode, a compiler *must*
# always write the preprocessed file to stdout.
"$@" || exit $?
# Remove the call to Libtool.
if test "$libtool" = yes; then
while test "X$1" != 'X--mode=compile'; do
shift
done
shift
fi
# Remove '-o $object'.
IFS=" "
for arg
do
case $arg in
-o)
shift
;;
$object)
shift
;;
*)
set fnord "$@" "$arg"
shift # fnord
shift # $arg
;;
esac
done
"$@" -E \
| sed -n -e '/^# [0-9][0-9]* "\([^"]*\)".*/ s:: \1 \\:p' \
-e '/^#line [0-9][0-9]* "\([^"]*\)".*/ s:: \1 \\:p' \
| sed '$ s: \\$::' > "$tmpdepfile"
rm -f "$depfile"
echo "$object : \\" > "$depfile"
cat < "$tmpdepfile" >> "$depfile"
sed < "$tmpdepfile" '/^$/d;s/^ //;s/ \\$//;s/$/ :/' >> "$depfile"
rm -f "$tmpdepfile"
;;
msvisualcpp)
# Important note: in order to support this mode, a compiler *must*
# always write the preprocessed file to stdout.
"$@" || exit $?
# Remove the call to Libtool.
if test "$libtool" = yes; then
while test "X$1" != 'X--mode=compile'; do
shift
done
shift
fi
IFS=" "
for arg
do
case "$arg" in
-o)
shift
;;
$object)
shift
;;
"-Gm"|"/Gm"|"-Gi"|"/Gi"|"-ZI"|"/ZI")
set fnord "$@"
shift
shift
;;
*)
set fnord "$@" "$arg"
shift
shift
;;
esac
done
"$@" -E 2>/dev/null |
sed -n '/^#line [0-9][0-9]* "\([^"]*\)"/ s::\1:p' | $cygpath_u | sort -u > "$tmpdepfile"
rm -f "$depfile"
echo "$object : \\" > "$depfile"
sed < "$tmpdepfile" -n -e 's% %\\ %g' -e '/^\(.*\)$/ s::'"$tab"'\1 \\:p' >> "$depfile"
echo "$tab" >> "$depfile"
sed < "$tmpdepfile" -n -e 's% %\\ %g' -e '/^\(.*\)$/ s::\1\::p' >> "$depfile"
rm -f "$tmpdepfile"
;;
msvcmsys)
# This case exists only to let depend.m4 do its work. It works by
# looking at the text of this script. This case will never be run,
# since it is checked for above.
exit 1
;;
none)
exec "$@"
;;
*)
echo "Unknown depmode $depmode" 1>&2
exit 1
;;
esac
exit 0
# Local Variables:
# mode: shell-script
# sh-indentation: 2
# eval: (add-hook 'write-file-hooks 'time-stamp)
# time-stamp-start: "scriptversion="
# time-stamp-format: "%:y-%02m-%02d.%02H"
# time-stamp-time-zone: "UTC"
# time-stamp-end: "; # UTC"
# End:
certmonger-0.74/po/ 0000775 0001750 0001750 00000000000 12317265251 011236 5 0000000 0000000 certmonger-0.74/po/stamp-po 0000664 0001750 0001750 00000000012 12317265250 012631 0000000 0000000 timestamp
certmonger-0.74/po/certmonger.pot 0000664 0001750 0001750 00000053214 12317265222 014052 0000000 0000000 # SOME DESCRIPTIVE TITLE.
# Copyright (C) YEAR Red Hat, Inc.
# This file is distributed under the same license as the PACKAGE package.
# FIRST AUTHOR , YEAR.
#
#, fuzzy
msgid ""
msgstr ""
"Project-Id-Version: certmonger 0.74\n"
"Report-Msgid-Bugs-To: certmonger-devel@lists.fedorahosted.org\n"
"POT-Creation-Date: 2014-04-03 09:57-0400\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME \n"
"Language-Team: LANGUAGE \n"
"Language: \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=CHARSET\n"
"Content-Transfer-Encoding: 8bit\n"
#: src/certmaster.c:111 src/ipa.c:146
#, c-format
msgid "Unable to determine hostname of CA.\n"
msgstr ""
#: src/certmaster.c:128 src/dogtag.c:395 src/ipa.c:177
#, c-format
msgid "Unable to read signing request.\n"
msgstr ""
#: src/certmaster.c:158
#, c-format
msgid "Error setting up for XMLRPC.\n"
msgstr ""
#: src/certmaster.c:180 src/getcert.c:372 src/getcert.c:391 src/getcert.c:410
#: src/getcert.c:429 src/getcert.c:448 src/getcert.c:466 src/getcert.c:496
#: src/getcert.c:1022 src/getcert.c:1327 src/getcert.c:1685 src/getcert.c:1766
#: src/getcert.c:2100 src/getcert.c:2272 src/getcert.c:2355 src/getcert.c:2390
#: src/getcert.c:2425 src/getcert.c:2444
#, c-format
msgid "Error parsing server response.\n"
msgstr ""
#: src/certmaster.c:184
#, c-format
msgid "Server error.\n"
msgstr ""
#: src/dogtag.c:323
#, c-format
msgid "Requested renewal, but no serial number provided.\n"
msgstr ""
#: src/dogtag.c:327
#, c-format
msgid "No end-entity URL (-E) given, and no default known.\n"
msgstr ""
#: src/dogtag.c:331
#, c-format
msgid "No agent URL (-A) given, and no default known.\n"
msgstr ""
#: src/dogtag.c:335
#, c-format
msgid "No profile/template (-T) given, and no default known.\n"
msgstr ""
#: src/dogtag.c:368 src/dogtag.c:545
#, c-format
msgid "Internal error: unknown state.\n"
msgstr ""
#: src/dogtag.c:527
#, c-format
msgid "Error %d connecting to %s: %s.\n"
msgstr ""
#: src/dogtag.c:532
#, c-format
msgid "Error %d connecting to %s.\n"
msgstr ""
#: src/dogtag.c:539
#, c-format
msgid "Internal error: no response to \"%s?%s\".\n"
msgstr ""
#: src/getcert.c:91
#, c-format
msgid "Path \"%s\" is not absolute, attempting to use \"%s\" instead.\n"
msgstr ""
#: src/getcert.c:96
#, c-format
msgid ""
"Path \"%s\" is not absolute, and there was an error determining the name of "
"the current directory.\n"
msgstr ""
#: src/getcert.c:118
#, c-format
msgid "Path \"%s\": insufficient permissions.\n"
msgstr ""
#: src/getcert.c:124
#, c-format
msgid "Path \"%s\" is not a directory.\n"
msgstr ""
#: src/getcert.c:130
#, c-format
msgid "Path \"%s\": %s.\n"
msgstr ""
#: src/getcert.c:170
#, c-format
msgid "Path \"%s\" is not a regular file.\n"
msgstr ""
#: src/getcert.c:247
#, c-format
msgid "Out of memory.\n"
msgstr ""
#: src/getcert.c:273
#, c-format
msgid "Error connecting to DBus.\n"
msgstr ""
#: src/getcert.c:274 src/tdbusm.c:1657
#, c-format
msgid "Please verify that the message bus (D-Bus) service is running.\n"
msgstr ""
#: src/getcert.c:281
#, c-format
msgid "Error creating DBus request message.\n"
msgstr ""
#: src/getcert.c:323
#, c-format
msgid "Error %s: %s\n"
msgstr ""
#: src/getcert.c:327
#, c-format
msgid "Error %s\n"
msgstr ""
#: src/getcert.c:333
#, c-format
msgid "Error: %s\n"
msgstr ""
#: src/getcert.c:335
#, c-format
msgid "Received error response from local %s service.\n"
msgstr ""
#: src/getcert.c:341
#, c-format
msgid "No response received from %s service.\n"
msgstr ""
#: src/getcert.c:588 src/getcert.c:1370 src/getcert.c:1819
#, c-format
msgid "Error initializing Kerberos library: %s.\n"
msgstr ""
#: src/getcert.c:632
#, c-format
msgid "No support for generating \"%s\" keys.\n"
msgstr ""
#: src/getcert.c:634
#, c-format
msgid "Known key types include:"
msgstr ""
#: src/getcert.c:671 src/getcert.c:1440 src/getcert.c:1864
#, c-format
msgid "Unrecognized keyUsage \"%s\".\n"
msgstr ""
#: src/getcert.c:681 src/getcert.c:1450 src/getcert.c:1874
#, c-format
msgid "Could not evaluate OID \"%s\".\n"
msgstr ""
#: src/getcert.c:691 src/getcert.c:1460 src/getcert.c:1884
#, c-format
msgid "Error parsing Kerberos principal name \"%s\": %s.\n"
msgstr ""
#: src/getcert.c:699 src/getcert.c:1468 src/getcert.c:1892
#, c-format
msgid "Error unparsing Kerberos principal name \"%s\": %s.\n"
msgstr ""
#: src/getcert.c:737 src/getcert.c:1506 src/getcert.c:1930 src/getcert.c:2202
#: src/getcert.c:2542
#, c-format
msgid "%s: option requires an argument -- '%c'\n"
msgstr ""
#: src/getcert.c:741 src/getcert.c:1509 src/getcert.c:1933 src/getcert.c:2205
#: src/getcert.c:2545
#, c-format
msgid "%s: invalid option -- '%c'\n"
msgstr ""
#: src/getcert.c:750
#, c-format
msgid "Error: unused extra argument \"%s\".\n"
msgstr ""
#: src/getcert.c:753 src/getcert.c:1520 src/getcert.c:1941 src/getcert.c:2213
#: src/getcert.c:2553
#, c-format
msgid "Error: unused extra arguments were supplied.\n"
msgstr ""
#: src/getcert.c:759 src/getcert.c:1526 src/getcert.c:1712 src/getcert.c:1964
#, c-format
msgid "Database location or nickname specified without the other.\n"
msgstr ""
#: src/getcert.c:765 src/getcert.c:1532 src/getcert.c:1718 src/getcert.c:1970
#, c-format
msgid "Database directory and certificate file both specified.\n"
msgstr ""
#: src/getcert.c:773 src/getcert.c:1726 src/getcert.c:1978
#, c-format
msgid ""
"None of database directory and nickname or certificate file specified.\n"
msgstr ""
#: src/getcert.c:780 src/getcert.c:1548
#, c-format
msgid "Key and certificate can not both be saved to the same file.\n"
msgstr ""
#: src/getcert.c:805
#, c-format
msgid ""
"The IPA backend requires the use of the -K option (principal name) when the -"
"N option (subject name) is used.\n"
msgstr ""
#: src/getcert.c:937 src/getcert.c:1307 src/getcert.c:1641 src/getcert.c:1998
#: src/getcert.c:2220
#, c-format
msgid "No CA with name \"%s\" found.\n"
msgstr ""
#: src/getcert.c:1017 src/getcert.c:1322 src/getcert.c:1679 src/getcert.c:1761
#: src/getcert.c:2094
#, c-format
msgid "Error setting request arguments.\n"
msgstr ""
#: src/getcert.c:1028
#, c-format
msgid "New signing request \"%s\" added.\n"
msgstr ""
#: src/getcert.c:1031
#, c-format
msgid "New signing request could not be added.\n"
msgstr ""
#: src/getcert.c:1333
#, c-format
msgid "New tracking request \"%s\" added.\n"
msgstr ""
#: src/getcert.c:1337
#, c-format
msgid "New tracking request could not be added.\n"
msgstr ""
#: src/getcert.c:1541
#, c-format
msgid ""
"None of ID or database directory and nickname or certificate file "
"specified.\n"
msgstr ""
#: src/getcert.c:1693
#, c-format
msgid "Request \"%s\" modified.\n"
msgstr ""
#: src/getcert.c:1697
#, c-format
msgid "Request \"%s\" could not be modified.\n"
msgstr ""
#: src/getcert.c:1705 src/getcert.c:1957 src/getcert.c:2227
#, c-format
msgid "No request found with specified nickname.\n"
msgstr ""
#: src/getcert.c:1752 src/getcert.c:1984 src/getcert.c:2238
#, c-format
msgid "No request found that matched arguments.\n"
msgstr ""
#: src/getcert.c:1771
#, c-format
msgid "Request \"%s\" removed.\n"
msgstr ""
#: src/getcert.c:1775
#, c-format
msgid "Request \"%s\" could not be removed.\n"
msgstr ""
#: src/getcert.c:2108
#, c-format
msgid "Error modifying \"%s\".\n"
msgstr ""
#: src/getcert.c:2124
#, c-format
msgid "Resubmitting \"%s\" to \"%s\".\n"
msgstr ""
#: src/getcert.c:2127
#, c-format
msgid "Resubmitting \"%s\".\n"
msgstr ""
#: src/getcert.c:2133
#, c-format
msgid "Error attempting to submit \"%s\" to \"%s\".\n"
msgstr ""
#: src/getcert.c:2136
#, c-format
msgid "Error attempting to submit \"%s\".\n"
msgstr ""
#: src/getcert.c:2249
#, c-format
msgid "Number of certificates and requests being tracked: %d.\n"
msgstr ""
#: src/getcert.c:2377
#, c-format
msgid "Request ID '%s':\n"
msgstr ""
#: src/getcert.c:2378
#, c-format
msgid "\tstatus: %s\n"
msgstr ""
#: src/getcert.c:2382
#, c-format
msgid "\tca-error: %s\n"
msgstr ""
#: src/getcert.c:2384
#, c-format
msgid "\tstuck: %s\n"
msgstr ""
#: src/getcert.c:2404
#, c-format
msgid "\tkey pair storage: type=%s"
msgstr ""
#: src/getcert.c:2404
msgid "NONE"
msgstr ""
#: src/getcert.c:2406
#, c-format
msgid ",location='%s'"
msgstr ""
#: src/getcert.c:2409 src/getcert.c:2431
#, c-format
msgid ",nickname='%s'"
msgstr ""
#: src/getcert.c:2412 src/getcert.c:2434
#, c-format
msgid ",token='%s'"
msgstr ""
#: src/getcert.c:2415
#, c-format
msgid ",pin='%s'"
msgstr ""
#: src/getcert.c:2418
#, c-format
msgid ",pinfile='%s'"
msgstr ""
#: src/getcert.c:2429
#, c-format
msgid "\tcertificate: type=%s,location='%s'"
msgstr ""
#: src/getcert.c:2449
#, c-format
msgid "\tCA: %s\n"
msgstr ""
#: src/getcert.c:2451
#, c-format
msgid "\tissuer: %s\n"
msgstr ""
#: src/getcert.c:2452
#, c-format
msgid "\tsubject: %s\n"
msgstr ""
#: src/getcert.c:2453
#, c-format
msgid "\texpires: %s\n"
msgstr ""
#: src/getcert.c:2456
msgid "unknown"
msgstr ""
#: src/getcert.c:2459
msgid "\temail: "
msgstr ""
#: src/getcert.c:2465
msgid "\tdns: "
msgstr ""
#: src/getcert.c:2471
msgid "\tprincipal name: "
msgstr ""
#: src/getcert.c:2490
#, c-format
msgid "\tkey usage: %s\n"
msgstr ""
#: src/getcert.c:2494
msgid "\teku: "
msgstr ""
#: src/getcert.c:2498
#, c-format
msgid "\tpre-save command: %s\n"
msgstr ""
#: src/getcert.c:2501
#, c-format
msgid "\tpost-save command: %s\n"
msgstr ""
#: src/getcert.c:2504
#, c-format
msgid "\ttrack: %s\n"
msgstr ""
#: src/getcert.c:2508
#, c-format
msgid "\tauto-renew: %s\n"
msgstr ""
#: src/getcert.c:2567
#, c-format
msgid "CA '%s':\n"
msgstr ""
#: src/getcert.c:2574
#, c-format
msgid "\tca-type: %s\n"
msgstr ""
#: src/getcert.c:2576
#, c-format
msgid "\thelper-location: %s\n"
msgstr ""
#: src/getcert.c:2581
#, c-format
msgid "\tnext-serial-number: %s\n"
msgstr ""
#: src/getcert.c:2591
#, c-format
msgid "\tknown-issuer-names:\n"
msgstr ""
#: src/getcert.c:2617
#, c-format
msgid "%s - client certificate enrollment tool\n"
msgstr ""
#: src/getcert.c:2621
#, c-format
msgid "Usage: %s request [options]\n"
msgstr ""
#: src/getcert.c:2623 src/getcert.c:2665 src/getcert.c:2706 src/getcert.c:2728
msgid "Required arguments:\n"
msgstr ""
#: src/getcert.c:2624 src/getcert.c:2668 src/getcert.c:2709 src/getcert.c:2731
#: src/getcert.c:2778
msgid "* If using an NSS database for storage:\n"
msgstr ""
#: src/getcert.c:2625 src/getcert.c:2669 src/getcert.c:2710 src/getcert.c:2732
msgid " -d DIR\tNSS database for key and cert\n"
msgstr ""
#: src/getcert.c:2626 src/getcert.c:2670 src/getcert.c:2711 src/getcert.c:2733
msgid " -n NAME\tnickname for NSS-based storage (only valid with -d)\n"
msgstr ""
#: src/getcert.c:2627 src/getcert.c:2671 src/getcert.c:2712 src/getcert.c:2734
msgid ""
" -t NAME\toptional token name for NSS-based storage (only valid with -d)\n"
msgstr ""
#: src/getcert.c:2628 src/getcert.c:2672 src/getcert.c:2713 src/getcert.c:2735
#: src/getcert.c:2781
msgid "* If using files for storage:\n"
msgstr ""
#: src/getcert.c:2629 src/getcert.c:2673 src/getcert.c:2714
msgid " -k FILE\tPEM file for private key\n"
msgstr ""
#: src/getcert.c:2630 src/getcert.c:2674 src/getcert.c:2715
msgid " -f FILE\tPEM file for certificate (only valid with -k)\n"
msgstr ""
#: src/getcert.c:2631
msgid "* If keys are to be encrypted:\n"
msgstr ""
#: src/getcert.c:2632 src/getcert.c:2676 src/getcert.c:2739
msgid " -p FILE\tfile which holds the encryption PIN\n"
msgstr ""
#: src/getcert.c:2633 src/getcert.c:2677 src/getcert.c:2740
msgid " -P PIN\tPIN value\n"
msgstr ""
#: src/getcert.c:2635 src/getcert.c:2679 src/getcert.c:2717 src/getcert.c:2750
#: src/getcert.c:2769 src/getcert.c:2793
msgid "Optional arguments:\n"
msgstr ""
#: src/getcert.c:2636 src/getcert.c:2680 src/getcert.c:2751
msgid "* Certificate handling settings:\n"
msgstr ""
#: src/getcert.c:2637
msgid " -I NAME\tnickname to assign to the request\n"
msgstr ""
#: src/getcert.c:2638
msgid " -G TYPE\ttype of key to be generated if one is not already in place\n"
msgstr ""
#: src/getcert.c:2639
msgid " -g SIZE\tsize of key to be generated if one is not already in place\n"
msgstr ""
#: src/getcert.c:2640 src/getcert.c:2682
msgid ""
" -r\t\tattempt to renew the certificate when expiration nears (default)\n"
msgstr ""
#: src/getcert.c:2641 src/getcert.c:2683
msgid " -R\t\tdon't attempt to renew the certificate when expiration nears\n"
msgstr ""
#: src/getcert.c:2643 src/getcert.c:2685
msgid " -c CA\t\tuse the specified CA rather than the default\n"
msgstr ""
#: src/getcert.c:2645 src/getcert.c:2687 src/getcert.c:2756
msgid ""
" -T PROFILE\task the CA to process the request using the named profile or "
"template\n"
msgstr ""
#: src/getcert.c:2646
msgid "* Parameters for the signing request:\n"
msgstr ""
#: src/getcert.c:2647 src/getcert.c:2743
msgid " -N NAME\tset requested subject name (default: CN=)\n"
msgstr ""
#: src/getcert.c:2648 src/getcert.c:2744
msgid " -U EXTUSAGE\tset requested extended key usage OID\n"
msgstr ""
#: src/getcert.c:2649 src/getcert.c:2690 src/getcert.c:2745
msgid " -u KEYUSAGE\tset requested key usage value\n"
msgstr ""
#: src/getcert.c:2650 src/getcert.c:2746
msgid " -K NAME\tset requested principal name\n"
msgstr ""
#: src/getcert.c:2651 src/getcert.c:2747
msgid " -D DNSNAME\tset requested DNS name\n"
msgstr ""
#: src/getcert.c:2652 src/getcert.c:2748
msgid " -E EMAIL\tset requested email address\n"
msgstr ""
#: src/getcert.c:2653 src/getcert.c:2694 src/getcert.c:2718 src/getcert.c:2757
#: src/getcert.c:2783 src/getcert.c:2798
msgid "* Bus options:\n"
msgstr ""
#: src/getcert.c:2654 src/getcert.c:2695 src/getcert.c:2719 src/getcert.c:2758
msgid " -S\t\tconnect to the certmonger service on the system bus\n"
msgstr ""
#: src/getcert.c:2655 src/getcert.c:2696 src/getcert.c:2720 src/getcert.c:2759
msgid " -s\t\tconnect to the certmonger service on the session bus\n"
msgstr ""
#: src/getcert.c:2656 src/getcert.c:2697 src/getcert.c:2721 src/getcert.c:2760
#: src/getcert.c:2786 src/getcert.c:2801
msgid "* Other options:\n"
msgstr ""
#: src/getcert.c:2657 src/getcert.c:2698 src/getcert.c:2761
msgid " -B\tcommand to run before saving the certificate\n"
msgstr ""
#: src/getcert.c:2658 src/getcert.c:2699 src/getcert.c:2762
msgid " -C\tcommand to run after saving the certificate\n"
msgstr ""
#: src/getcert.c:2659 src/getcert.c:2700 src/getcert.c:2722 src/getcert.c:2763
#: src/getcert.c:2787 src/getcert.c:2802
msgid " -v\treport all details of errors\n"
msgstr ""
#: src/getcert.c:2663
#, c-format
msgid "Usage: %s start-tracking [options]\n"
msgstr ""
#: src/getcert.c:2666
msgid "* If modifying an existing request:\n"
msgstr ""
#: src/getcert.c:2667
msgid " -i NAME\tnickname of an existing tracking request\n"
msgstr ""
#: src/getcert.c:2675 src/getcert.c:2738
msgid "* If keys are encrypted:\n"
msgstr ""
#: src/getcert.c:2681
msgid " -I NAME\tnickname to give to tracking request\n"
msgstr ""
#: src/getcert.c:2688
msgid "* Parameters for the signing request at renewal time:\n"
msgstr ""
#: src/getcert.c:2689
msgid " -U EXTUSAGE\toverride requested extended key usage OID\n"
msgstr ""
#: src/getcert.c:2691
msgid " -K NAME\toverride requested principal name\n"
msgstr ""
#: src/getcert.c:2692
msgid " -D DNSNAME\toverride requested DNS name\n"
msgstr ""
#: src/getcert.c:2693
msgid " -E EMAIL\toverride requested email address\n"
msgstr ""
#: src/getcert.c:2704
#, c-format
msgid "Usage: %s stop-tracking [options]\n"
msgstr ""
#: src/getcert.c:2707 src/getcert.c:2729
msgid "* By request identifier:\n"
msgstr ""
#: src/getcert.c:2708 src/getcert.c:2730 src/getcert.c:2777
msgid " -i NAME\tnickname for tracking request\n"
msgstr ""
#: src/getcert.c:2726
#, c-format
msgid "Usage: %s resubmit [options]\n"
msgstr ""
#: src/getcert.c:2736
msgid " -f FILE\tPEM file for certificate\n"
msgstr ""
#: src/getcert.c:2742
msgid "* New parameter values for the signing request:\n"
msgstr ""
#: src/getcert.c:2752
msgid " -I NAME\tnew nickname to give to tracking request\n"
msgstr ""
#: src/getcert.c:2754
msgid " -c CA\t\tuse the specified CA rather than the current one\n"
msgstr ""
#: src/getcert.c:2767
#, c-format
msgid "Usage: %s list [options]\n"
msgstr ""
#: src/getcert.c:2770 src/getcert.c:2795
msgid "* General options:\n"
msgstr ""
#: src/getcert.c:2772
msgid " -c CA\tlist only requests and certs associated with this CA\n"
msgstr ""
#: src/getcert.c:2774
msgid " -r\tlist only information about outstanding requests\n"
msgstr ""
#: src/getcert.c:2775
msgid " -t\tlist only information about tracked certificates\n"
msgstr ""
#: src/getcert.c:2776
msgid "* If selecting a specific request:\n"
msgstr ""
#: src/getcert.c:2779
msgid " -d DIR\tonly list requests and certs which use this NSS database\n"
msgstr ""
#: src/getcert.c:2780
msgid " -n NAME\tonly list requests and certs which use this nickname\n"
msgstr ""
#: src/getcert.c:2782
msgid " -f FILE\tonly list requests and certs stored in this PEM file\n"
msgstr ""
#: src/getcert.c:2784 src/getcert.c:2799
msgid " -S\tconnect to the certmonger service on the system bus\n"
msgstr ""
#: src/getcert.c:2785 src/getcert.c:2800
msgid " -s\tconnect to the certmonger service on the session bus\n"
msgstr ""
#: src/getcert.c:2791
#, c-format
msgid "Usage: %s list-cas [options]\n"
msgstr ""
#: src/getcert.c:2796
msgid " -c CA\tlist only information about the CA with this name\n"
msgstr ""
#: src/getcert.c:2853
#, c-format
msgid "%s: unrecognized command\n"
msgstr ""
#: src/ipa.c:85
#, c-format
msgid "The -t option can not be used with the -K option.\n"
msgstr ""
#: src/ipa.c:93
#, c-format
msgid "The -k option can not be used with the -K option.\n"
msgstr ""
#: src/ipa.c:101
#, c-format
msgid "The -K option can not be used with either the -k or the -t option.\n"
msgstr ""
#: src/ipa.c:143
#, c-format
msgid "Unable to determine location of CA's XMLRPC server.\n"
msgstr ""
#: src/ipa.c:151
#, c-format
msgid "Unable to determine principal name for signing request.\n"
msgstr ""
#: src/ipa.c:228
#, c-format
msgid "Error setting up for XMLRPC on the client.\n"
msgstr ""
#: src/ipa.c:239
#, c-format
msgid ""
"Error setting up ccache for \"host\" service on client using default keytab: "
"%s.\n"
msgstr ""
#: src/ipa.c:243
#, c-format
msgid ""
"Error setting up ccache for \"%s\" on client using default keytab: %s.\n"
msgstr ""
#: src/ipa.c:250
#, c-format
msgid ""
"Error setting up ccache for \"host\" service on client using keytab \"%s\": "
"%s.\n"
msgstr ""
#: src/ipa.c:254
#, c-format
msgid "Error setting up ccache for \"%s\" on client using keytab \"%s\": %s.\n"
msgstr ""
#: src/main.c:120
#, c-format
msgid "Usage: %s [-s|-S] [-n|-f] [-d LEVEL] [-p FILE] [-F]\n"
msgstr ""
#: src/main.c:124
msgid "\t-s use session bus\n"
msgstr ""
#: src/main.c:125
msgid "\t-S use system bus\n"
msgstr ""
#: src/main.c:126
msgid "\t-n don't become a daemon\n"
msgstr ""
#: src/main.c:127
msgid "\t-f do become a daemon\n"
msgstr ""
#: src/main.c:128
msgid "\t-b TIMEOUT bus-activated, idle timeout\n"
msgstr ""
#: src/main.c:129
msgid "\t-B don't use an idle timeout\n"
msgstr ""
#: src/main.c:130
msgid "\t-d LEVEL set debugging level (implies -n)\n"
msgstr ""
#: src/main.c:131
msgid "\t-p FILE write service PID to file\n"
msgstr ""
#: src/main.c:132
msgid "\t-F force NSS into FIPS mode\n"
msgstr ""
#: src/tdbush.c:118 src/tdbush.c:1539 src/tdbush.c:1764
msgid "An internal error has occurred."
msgstr ""
#: src/tdbush.c:182
msgid "No matching entry found.\n"
msgstr ""
#: src/tdbush.c:344
#, c-format
msgid "There is already a CA with the nickname \"%s\"."
msgstr ""
#: src/tdbush.c:432
msgid "Certificate storage type not specified."
msgstr ""
#: src/tdbush.c:445
#, c-format
msgid "Certificate storage type \"%s\" not supported."
msgstr ""
#: src/tdbush.c:482 src/tdbush.c:515 src/tdbush.c:574 src/tdbush.c:759
#: src/tdbush.c:818 src/tdbush.c:2577
#, c-format
msgid "The location \"%s\" must be an absolute path."
msgstr ""
#: src/tdbush.c:509 src/tdbush.c:568 src/tdbush.c:637
msgid "Certificate storage location not specified."
msgstr ""
#: src/tdbush.c:527 src/tdbush.c:771
#, c-format
msgid ""
"The parent of location \"%s\" could not be accessed due to insufficient "
"permissions."
msgstr ""
#: src/tdbush.c:535 src/tdbush.c:779
#, c-format
msgid "The parent of location \"%s\" must be a valid directory."
msgstr ""
#: src/tdbush.c:546 src/tdbush.c:790
#, c-format
msgid "The location \"%s\" must be a file."
msgstr ""
#: src/tdbush.c:586
#, c-format
msgid ""
"The location \"%s\" could not be accessed due to insufficient permissions."
msgstr ""
#: src/tdbush.c:594 src/tdbush.c:827
#, c-format
msgid "The location \"%s\" must be a directory."
msgstr ""
#: src/tdbush.c:615
msgid "Certificate nickname not specified."
msgstr ""
#: src/tdbush.c:658 src/tdbush.c:2468
#, c-format
msgid "There is already a request with the nickname \"%s\"."
msgstr ""
#: src/tdbush.c:694
#, c-format
msgid ""
"Certificate at same location is already used by request with nickname \"%s\"."
msgstr ""
#: src/tdbush.c:727
#, c-format
msgid "Key storage type \"%s\" not supported."
msgstr ""
#: src/tdbush.c:753 src/tdbush.c:812
msgid "Key storage location not specified."
msgstr ""
#: src/tdbush.c:846
msgid "Key nickname not specified."
msgstr ""
#: src/tdbush.c:902
#, c-format
msgid "Key at same location is already used by request with nickname \"%s\"."
msgstr ""
#: src/tdbush.c:973
#, c-format
msgid "No support for key type \"%s\"."
msgstr ""
#: src/tdbush.c:1046
msgid "No such CA."
msgstr ""
#: src/tdbush.c:2486
#, c-format
msgid "Certificate authority \"%s\" not known."
msgstr ""
#: src/tdbush.c:2760
msgid "Unrecognized parameter or wrong value type."
msgstr ""
#: src/tdbusm.c:1647
msgid "Insufficient access. Please retry operation as root.\n"
msgstr ""
#: src/tdbusm.c:1651
msgid "Please verify that the certmonger service has been started.\n"
msgstr ""
#: src/tdbusm.c:1654
msgid "Please verify that the certmonger service is still running.\n"
msgstr ""
certmonger-0.74/po/zu.gmo 0000664 0001750 0001750 00000001003 12317265250 012311 0000000 0000000 Þ• $ , 8 É 9 Project-Id-Version: certmonger
Report-Msgid-Bugs-To: certmonger-devel@lists.fedorahosted.org
POT-Creation-Date: 2014-04-03 09:57-0400
PO-Revision-Date: 2014-03-24 16:29+0000
Last-Translator: Nalin Dahyabhai
Language-Team: Zulu (http://www.transifex.com/projects/p/fedora/language/zu/)
Language: zu
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Plural-Forms: nplurals=2; plural=(n != 1);
certmonger-0.74/po/zh_TW.gmo 0000664 0001750 0001750 00000023150 12317265250 012715 0000000 0000000 Þ• m „ • ì @ A - ] ‹ ” ¥
´ # Â æ í ô
ý
!
7
P
b
o
{
=
' Í
B õ
# 8 8 \ ? • # Õ > ù ? 8 . x I § " ñ (
=
( Y
‚
œ
! ¬
Î
â
ü
( E d v … ”
ž ¬ ¸ Ø % â # + , , X ' … Ë
Õ ã % þ ) $ N ! n
® ¹ # Õ $ ù # ( D ! m ) ¹ * Ö &