1
0
mirror of https://github.com/stefanocasazza/ULib.git synced 2025-09-28 19:05:55 +08:00
ULib/tests/examples/rsign_rpc.test
stefanocasazza 4a59c809c3 fix
2017-03-03 16:12:00 +01:00

113 lines
3.5 KiB
Bash
Executable File

#!/bin/sh
. ../.function
## rsign_rpc.test -- Test RSIGN feature
start_msg rsignclient_rpc
#UTRACE="0 5M 0"
#UOBJDUMP="0 100k 10"
#USIMERR="error.sim"
export UTRACE UOBJDUMP USIMERR
rm -rf RSIGN/rsignserver_rpc.log RSIGN/RSIGN/log \
out/userver_ssl.out err/userver_ssl.err \
RSIGN/trace.*userver_ssl*.[0-9]* RSIGN/object.*userver_ssl*.[0-9]* RSIGN/stack.*userver_ssl*.[0-9]* RSIGN/mempool.*userver_ssl*.[0-9]*
# usage: openssl s_client args
# ----------------------------------------------------------------
# -host host - use -connect instead
# -port port - use -connect instead
# -connect host:port - who to connect to (default is 10.30.1.131:4433)
# -verify arg - turn on peer certificate verification
# -cert arg - certificate file to use, PEM format assumed
# -key arg - Private key file to use, PEM format assumed, in cert file if not specified but cert file is.
# -CApath arg - PEM format directory of CA's
# -CAfile arg - PEM format file of CA's
# -reconnect - Drop and re-make the connection with the same Session-ID
# -pause - sleep(1) after each read(2) and write(2) system call
# -showcerts - show all certificates in the chain
# -debug - extra output
# -msg - Show protocol messages
# -nbio_test - more ssl protocol testing
# -state - print the 'ssl' states
# -nbio - Run with non-blocking IO
# -crlf - convert LF from terminal into CRLF
# -quiet - no s_client output
# -ign_eof - ignore input eof (default when -quiet)
# -ssl2 - just use SSLv2
# -ssl3 - just use SSLv3
# -tls1 - just use TLSv1
# -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol
# -bugs - Switch on all SSL implementation bug workarounds
# -serverpref - Use server's cipher preferences (only SSLv2)
# -cipher - preferred cipher to use, use the 'openssl ciphers' command to see what is available
# -starttls prot - use the STARTTLS command before starting TLS for those protocols that support it, where 'prot'
# defines which one to assume. Currently, only "smtp" and "pop3" are supported.
# -engine id - Initialise and use the specified engine
# -rand file:file:...
# ----------------------------------------------------------------
cat <<EOF >inp/webserver.cfg
userver {
REQ_TIMEOUT 5
MAX_KEEP_ALIVE 256
LOG_FILE rsignserver.log
LOG_FILE_SZ 1M
DOCUMENT_ROOT RSIGN
PLUGIN rpc
PLUGIN_DIR ../../../src/ulib/net/server/plugin/.libs
ORM_DRIVER_DIR ../../../src/ulib/orm/driver/.libs
CERT_FILE ../../ulib/CA/server.crt
KEY_FILE ../../ulib/CA/server.key
PASSWORD caciucco
CA_PATH ../../ulib/CA/CApath
CA_FILE ../../ulib/CA/cacert.pem
VERIFY_MODE 1
}
http {
#include "http.cfg"
}
rpc {
#include "soap_or_rpc_rsign.cfg"
}
EOF
cat <<EOF >inp/webclient.cfg
uclient {
PORT 443
SERVER localhost
CA_PATH ../ulib/CA/CApath
CA_FILE ../ulib/CA/cacert.pem
PASSWORD caciucco
CERT_FILE ../ulib/CA/server.crt
KEY_FILE ../ulib/CA/server.key
VERIFY_MODE 0
#VERIFY_MODE 7
}
EOF
DIR_CMD="../../examples/userver"
start_prg_background userver_ssl -c inp/webserver.cfg
## ./RSIGN/RSIGN/request/run.sh > out/rsignclient_rpc.out
wait_server_ready localhost 443
INKEY=../ulib/CA/username.key
DIR_CMD="../../examples/rsign"
start_prg rsignclient_rpc -c inp/webclient.cfg -k $INKEY < inp/digest
kill_server userver_ssl
mv err/userver_ssl.err err/rsignserver_rpc.err
$OPENSSL rsautl -verify -in out/rsignclient_rpc.out -inkey $INKEY -passin pass:caciucco -out out/rsignserver_rpc.out 2>>err/rsignclient_rpc.err
# Test against expected output
test_output_diff rsignserver_rpc