TK-4_13_0-20161107/0000775000175600017560000000000013010147155013427 5ustar sundishisundishiTK-4_13_0-20161107/bin/0000775000175600017560000000000013010147155014177 5ustar sundishisundishiTK-4_13_0-20161107/bin/openssl.cnf0000664000175600017560000001654110157345033016365 0ustar sundishisundishi# # OpenSSL example configuration file. # This is mostly being used for generation of certificate requests. # # This definition stops the following lines choking if HOME isn't # defined. HOME = . RANDFILE = $ENV::HOME/.rnd # Extra OBJECT IDENTIFIER info: #oid_file = $ENV::HOME/.oid oid_section = new_oids # To use this configuration file with the "-extfile" option of the # "openssl x509" utility, name here the section containing the # X.509v3 extensions to use: # extensions = # (Alternatively, use a configuration file that has only # X.509v3 extensions in its main [= default] section.) [ new_oids ] # We can add new OIDs in here for use by 'ca' and 'req'. # Add a simple OID like this: # testoid1=1.2.3.4 # Or use config file substitution like this: # testoid2=${testoid1}.5.6 #################################################################### [ ca ] default_ca = CA_default # The default ca section #################################################################### [ CA_default ] dir = ./demoCA # Where everything is kept certs = $dir/certs # Where the issued certs are kept crl_dir = $dir/crl # Where the issued crl are kept database = $dir/index.txt # database index file. new_certs_dir = $dir/newcerts # default place for new certs. certificate = $dir/cacert.pem # The CA certificate serial = $dir/serial # The current serial number crl = $dir/crl.pem # The current CRL private_key = $dir/private/cakey.pem# The private key RANDFILE = $dir/private/.rand # private random number file x509_extensions = usr_cert # The extentions to add to the cert # Comment out the following two lines for the "traditional" # (and highly broken) format. name_opt = ca_default # Subject Name options cert_opt = ca_default # Certificate field options # Extension copying option: use with caution. # copy_extensions = copy # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs # so this is commented out by default to leave a V1 CRL. # crl_extensions = crl_ext default_days = 365 # how long to certify for default_crl_days= 30 # how long before next CRL default_md = md5 # which md to use. preserve = no # keep passed DN ordering # A few difference way of specifying how similar the request should look # For type CA, the listed attributes must be the same, and the optional # and supplied fields are just that :-) policy = policy_match # For the CA policy [ policy_match ] countryName = match stateOrProvinceName = match organizationName = match organizationalUnitName = optional commonName = supplied emailAddress = optional # For the 'anything' policy # At this point in time, you must list all acceptable 'object' # types. [ policy_anything ] countryName = optional stateOrProvinceName = optional localityName = optional organizationName = optional organizationalUnitName = optional commonName = supplied emailAddress = optional #################################################################### [ req ] default_bits = 1024 default_keyfile = privkey.pem distinguished_name = req_distinguished_name attributes = req_attributes x509_extensions = v3_ca # The extentions to add to the self signed cert # Passwords for private keys if not present they will be prompted for # input_password = secret # output_password = secret # This sets a mask for permitted string types. There are several options. # default: PrintableString, T61String, BMPString. # pkix : PrintableString, BMPString. # utf8only: only UTF8Strings. # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). # MASK:XXXX a literal mask value. # WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings # so use this option with caution! string_mask = nombstr # req_extensions = v3_req # The extensions to add to a certificate request [ req_distinguished_name ] countryName = Country Name (2 letter code) countryName_default = AU countryName_min = 2 countryName_max = 2 stateOrProvinceName = State or Province Name (full name) stateOrProvinceName_default = Some-State localityName = Locality Name (eg, city) 0.organizationName = Organization Name (eg, company) 0.organizationName_default = Internet Widgits Pty Ltd # we can do this but it is not needed normally :-) #1.organizationName = Second Organization Name (eg, company) #1.organizationName_default = World Wide Web Pty Ltd organizationalUnitName = Organizational Unit Name (eg, section) #organizationalUnitName_default = commonName = Common Name (eg, YOUR name) commonName_max = 64 emailAddress = Email Address emailAddress_max = 64 # SET-ex3 = SET extension number 3 [ req_attributes ] challengePassword = A challenge password challengePassword_min = 4 challengePassword_max = 20 unstructuredName = An optional company name [ usr_cert ] # These extensions are added when 'ca' signs a request. # This goes against PKIX guidelines but some CAs do it and some software # requires this to avoid interpreting an end user certificate as a CA. basicConstraints=CA:FALSE # Here are some examples of the usage of nsCertType. If it is omitted # the certificate can be used for anything *except* object signing. # This is OK for an SSL server. # nsCertType = server # For an object signing certificate this would be used. # nsCertType = objsign # For normal client use this is typical # nsCertType = client, email # and for everything including object signing: # nsCertType = client, email, objsign # This is typical in keyUsage for a client certificate. # keyUsage = nonRepudiation, digitalSignature, keyEncipherment # This will be displayed in Netscape's comment listbox. nsComment = "OpenSSL Generated Certificate" # PKIX recommendations harmless if included in all certificates. subjectKeyIdentifier=hash authorityKeyIdentifier=keyid,issuer:always # This stuff is for subjectAltName and issuerAltname. # Import the email address. # subjectAltName=email:copy # An alternative to produce certificates that aren't # deprecated according to PKIX. # subjectAltName=email:move # Copy subject details # issuerAltName=issuer:copy #nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem #nsBaseUrl #nsRevocationUrl #nsRenewalUrl #nsCaPolicyUrl #nsSslServerName [ v3_req ] # Extensions to add to a certificate request basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment [ v3_ca ] # Extensions for a typical CA # PKIX recommendation. subjectKeyIdentifier=hash authorityKeyIdentifier=keyid:always,issuer:always # This is what PKIX recommends but some broken software chokes on critical # extensions. #basicConstraints = critical,CA:true # So we do this instead. basicConstraints = CA:true # Key usage: this is typical for a CA certificate. However since it will # prevent it being used as an test self-signed certificate it is best # left out by default. # keyUsage = cRLSign, keyCertSign # Some might want this also # nsCertType = sslCA, emailCA # Include email address in subject alt name: another PKIX recommendation # subjectAltName=email:copy # Copy issuer details # issuerAltName=issuer:copy # DER hex encoding of an extension: beware experts only! # obj=DER:02:03 # Where 'obj' is a standard or added object # You can even override a supported extension: # basicConstraints= critical, DER:30:03:01:01:FF [ crl_ext ] # CRL extensions. # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. # issuerAltName=issuer:copy authorityKeyIdentifier=keyid:always,issuer:always TK-4_13_0-20161107/bin/.rnd0000664000175600017560000000066307452326253015003 0ustar sundishisundishiThe toolkit uses the first 128 bits of this file for seeding pseudo-random number generator engine. See implementation of ospopenssl.c::rand_init() for details. IT IS YOUR RESPONSIBILITY TO REPLACE THIS MESSAGE WITH RANDOM DATA. Input may come from user interaction (random key presses, mouse movements) and certain hardware events. For details about sources of randomness and cryptographic implications refer to www.openssl.org. TK-4_13_0-20161107/bin/test.cfg0000664000175600017560000001464011414767007015656 0ustar sundishisundishi############################################################################ # # test.cfg -- configuration file for test_app # ############################################################################ ############################################################################ # # This feature is not implemented yet. # (please do not change) # AUDIT=http://localhost:8888/ # ############################################################################ ############################################################################ # # Up to 10 OSP servers can be added. # If you add more OSP Servers to this list, make sure that you define # MSGCOUNT (defined in the next section) for each of these SP. # # To test against an OSP server: # Replace SERVER_FQ_DOMAIN_NAME:PORT# with the appropriate server's fully # qualified domain name and port. # # For non-SSL messages: # SP=http://SERVER_FQ_DOMAIN_NAME:PORT#/osp # # For SSL messages: # SP=https://SERVER_FQ_DOMAIN_NAME:PORT#/osp # # In order to use test_app with a TransNexus OSP Test Server, use the # following address. This server is configured for non-SSL # messages only. #SP=https://osptestserver.transnexus.com:1443/osp SP=http://osptestserver.transnexus.com:5045/osp # # Maximum message count for each SP. # Make sure that the number of MSGCOUNT's defined equals the number # of SP defined above. # # If the MSGCOUNT is set to NULL, then the count for all SP is set to 0. # MSGCOUNT can either be set to NULL, 0 or a positive value. # MSGCOUNT=1000 # # Maximum number of connection objects that can be created in the OSP Toolkit # DEF_HTTP_MAXCONN=10 # # Source and Device Identifiers. # In the case of a GW<->GW call, # { SRC=IP addr of the Originating GW # SRCDEV is left empty # DST=IP addr of the Terminating GW # DSTDEV is left empty # } # If a Proxy is involved between the two GW's,then the # { SRCDEV=IP addr of the Originating GW # SRC=IP addr of the Proxy # DST=IP addr of the Terminating GW # DSTDEV is left empty # } # To set any field = NULL, set =0. Leave no space b/n = and 0! # To set any field = "",Leave it empty. SRC= SRCDEV= DST= DSTDEV= # # In order to report usage with an address different from the one that was reported in Auth Req, # modify the following values # ModifiedSRC=0 ModifiedSRCDEV=0 ModifiedDST=0 ModifiedDSTDEV=0 # # Is Hardware support enabled ? # HWSUPPORT=0 # # # Up to 10 URLs for reporting capabilities indications can be added. # If you add more OSP Servers to this list, make sure that you define # CapMSGCOUNT (defined in the next section) for each of these SP. # The URLs can be provisioned to the toolkit by calling # OSPPProviderSetCapabilitiesURLs - test case 14. The messages can # be reported using test case 37 or 101 # # CapURL=http://osptestserver.transnexus.com:7080/osp OUTOFRESOURCES=0 # # Maximum message count for each CapURL. # Make sure that the number of CapMSGCOUNT's defined equals the number # of CapURLs defined above. # # If the CapMSGCOUNT is set to NULL, then the count for all SP is set to 0. # CapMSGCOUNT can either be set to NULL, 0 or a positive value. # CapMSGCOUNT=1000 # # TOKENALGO refers to ther algorithm that needs to be followed to # Validate the token. It can be either 0 for Signed tokens, 1 for unsigned # and 2 for either format. # TOKENALGO=2 # # TC Code to be reported # TCCODE=41 # # In order to report the PDD value in the UI, # Set this parameter to 1. # IS_PDD_INFO_AVAILABLE=1 # NOTE: Before you can use the TransNexus OSP Test Server, you must send an # e-mail to support@transnexus.com which contains the IP address of # the machine running test_app if the machine is outside ALL # firewalls, or the IP address of the OUTERMOST firewall. # # ############################################################################ ############################################################################ # # If you don't have a specific customer id or device id, set the values to # 1000, 1000. This is a default customer that is available on the test OSP # server for test purposes. Otherwise, change the values as necessary. # CUSTID=1000 DEVID=1000 # ############################################################################ ############################################################################ # # Change as necessary for routing tests. # # In order to test different scenarios with the test OSP Nexus Server, # (with the service points provided), change the "CALLED" parameter to # one of the following phone numbers to perform whichever test: # # Customer Dials Server Test # -------------- ------------------------------- # 0 + (anything) Route with zero destinations (blocked) # 1 + (anything) Route with one destination # 2 + (anything) Route with two destinations # 3 + (anything) Route with three destinations # 4 + (anything) Route with four destinations # 5 + (anything) Route with five destinations # 6 + (anything) Route with six destinations # 7 + (anything) Route with seven destinations # 8 + (anything) Route with eight destinations # 9 + (anything) No Routes available # # The list of all destination addresses that might be returned are: # 1.1.1.1, 2.2.2.2, 3.3.3.3, 4.4.4.4 # 5.5.5.5. 6.6.6.6, 7.7.7.7, 8.8.8.8 # # For example: # If you choose a route with four destinations, then you will # recieve (one at a time in random order) the addresses from # 1.1.1.1 through 4.4.4.4. You cycle through all the random # addresses by first calling GetFirstDestination, then # repeatedly calling GetNextDestination. # # # Examples: # CALLED=1449132 will return one destination (1.1.1.1) # CALLED=1992 will return one destination (1.1.1.1) # CALLED=3 will return three destinations (1.1.1.1, 2.2.2.2, 3.3.3.3) # CALLED=0892 will return zero destinations # CALLED=9 will indicate that the routes are unavailable # # By default, the following CALLED is set for the server to return # two routes: 1.1.1.1 and 2.2.2.2 # # Calling and Called number formats can be either 0 for E164 or 1 for SIP # and 2 for URL. CALLED=1678 CALLING=14048724799 CALLING_NUM_FORMAT=0 CALLED_NUM_FORMAT=0 # ############################################################################ ############################################################################ # # Number of Test Calls TEST_CALLS=500 # ############################################################################ TK-4_13_0-20161107/bin/enroll.sh0000775000175600017560000000346411414767007016052 0ustar sundishisundishi#!/bin/sh #################################################################### # # # enroll.sh # # # #################################################################### # # # This shell script is used to enroll the device with the Server # #################################################################### OPENSSL_CONF=./openssl.cnf export OPENSSL_CONF RANDFILE=./.rnd export RANDFILE if [ $# -le 0 ]; then echo "Usage: