4 # For now the sslSession run using the imported p12 identity is disabled by default
5 # since there is apparently no way to avoid the UI resulting from attempting
6 # to use a private key imported via p12 (even to modify the ACL by the same program
61 # Verify presence and validity of required certs
63 if((! -e $LOCAL_CERT) || (! -e $CLIENT_CERT) || \
64 (! -e $LOCAL_KC_PATH) || (! -e $CLIENT_KC_PATH) || \
65 (! -e $P12_KC_PATH) || (! -e $P12_ROOT_CERT)) then
69 $BUILD_DIR/certcrl
-c $LOCAL_CERT -a -e=CSSMERR_TP_INVALID_ANCHOR_CERT
>> /dev
/null
71 echo === initial run of certcrl yielded unexpected results
===
77 if($P12_SESSION == YES
) then
78 $BUILD_DIR/sslSession
$P12_KC z
=$P12_KC_PWD a
$P12_ROOT_CERT k
$QUIET $VERB $NON_BLOCK $RING_BUFS || exit(1)
80 $BUILD_DIR/sslAlert
$QUIET $VERB s
=$LOCAL_CERT c
=$CLIENT_CERT $NON_BLOCK $RING_BUFS || exit(1)
81 $BUILD_DIR/sslProt
$QUIET $VERB s
=$LOCAL_CERT $NON_BLOCK $RING_BUFS || exit(1)
82 $BUILD_DIR/sslAuth
$QUIET $VERB s
=$LOCAL_CERT c
=$CLIENT_CERT $NON_BLOCK $RING_BUFS || exit(1)
83 $BUILD_DIR/sslCipher
$QUIET $VERB $NON_BLOCK s
=$LOCAL_CERT d
=$DSA_CERT $LARGE_DH $RING_BUFS || exit(1)
85 # Use cert configured for client use on server side, verify policy fail
87 $BUILD_DIR/sslSession
$CLIENT_KC a
$CLIENT_CERT x
$QUIET $RING_BUFS || exit(1)
89 # Use cert configured for server use on client side, verify policy fail
91 $BUILD_DIR/sslSession
$LOCAL_KC a
$LOCAL_CERT c
=$LOCAL_KC X u
$RING_BUFS $QUIET || exit(1)
93 # check for cert-specific errors
95 set SSL_SCRIPT_DIR
=`pwd`
97 # This one needs certs in current directory; copy the script
98 # to build dir and run there; return to cwd afterwards
100 cp sslExtendUse.scr
$BUILD_DIR
102 .
/certcrl
-S sslExtendUse.scr
$QUIET_ || exit(1)
105 if($DO_PING == YES
) then
106 ..
/sslViewer
/verifyPing
$PINGSSL_QUIET $VERB $NON_BLOCK || exit(1)
109 echo "### ssldvt completed successfully. ###"