]> git.saurik.com Git - apple/security.git/blobdiff - SecurityTests/clxutils/sslScripts/ssldvt
Security-57740.51.3.tar.gz
[apple/security.git] / SecurityTests / clxutils / sslScripts / ssldvt
diff --git a/SecurityTests/clxutils/sslScripts/ssldvt b/SecurityTests/clxutils/sslScripts/ssldvt
deleted file mode 100755 (executable)
index 26bdf23..0000000
+++ /dev/null
@@ -1,109 +0,0 @@
-#! /bin/csh -f
-#
-# run SSL tests.
-# For now the sslSession run using the imported p12 identity is disabled by default
-# since there is apparently no way to avoid the UI resulting from attempting
-# to use a private key imported via p12 (even to modify the ACL by the same program
-# that imported it!). 
-#
-#
-set QUIET= 
-set QUIET_=
-set VERB= 
-set PINGSSL_QUIET=
-set NON_BLOCK=
-set LARGE_DH=
-set P12_SESSION=NO
-set DO_PING=YES
-set RING_BUFS=
-
-source sslKcSetup
-
-#
-while ( $#argv > 0 )
-    switch ( "$argv[1]" )
-        case v:
-            set VERB = v
-            shift
-            breaksw
-        case q:
-            set QUIET = q
-                       set QUIET_ = -q
-                       set PINGSSL_QUIET = s
-            shift
-            breaksw
-        case p:
-                       set P12_SESSION = YES
-                       shift
-                       breaksw
-               case b:
-                       set NON_BLOCK=b
-            shift
-            breaksw
-               case l:
-                       set LARGE_DH=l
-                       shift
-                       breaksw
-               case n:
-                       set DO_PING=NO
-                       shift
-                       breaksw
-               case R:
-                       set RING_BUFS=R
-                       shift
-                       breaksw
-        default:
-            cat ssldvtUsage
-            exit(1)
-    endsw
-end
-#
-# Verify presence and validity of required certs
-#
-if((! -e $LOCAL_CERT) || (! -e $CLIENT_CERT) || \
-   (! -e $LOCAL_KC_PATH) || (! -e $CLIENT_KC_PATH) || \
-   (! -e $P12_KC_PATH) || (! -e $P12_ROOT_CERT)) then
-   cat ssldvtCertErr
-   exit(1)
-endif
-$BUILD_DIR/certcrl -c $LOCAL_CERT -a -e=CSSMERR_TP_INVALID_ANCHOR_CERT >> /dev/null
-if($status) then
-   echo === initial run of certcrl yielded unexpected results ===
-   cat ssldvtCertErr
-   exit(1)
-endif
-
-# P12-based, RSA
-if($P12_SESSION == YES) then
-    $BUILD_DIR/sslSession $P12_KC z=$P12_KC_PWD a $P12_ROOT_CERT k $QUIET $VERB $NON_BLOCK $RING_BUFS || exit(1)
-endif
-$BUILD_DIR/sslAlert $QUIET $VERB s=$LOCAL_CERT c=$CLIENT_CERT $NON_BLOCK $RING_BUFS || exit(1)
-$BUILD_DIR/sslProt $QUIET $VERB s=$LOCAL_CERT $NON_BLOCK $RING_BUFS || exit(1)
-$BUILD_DIR/sslAuth $QUIET $VERB  s=$LOCAL_CERT c=$CLIENT_CERT $NON_BLOCK $RING_BUFS || exit(1)
-$BUILD_DIR/sslCipher $QUIET $VERB $NON_BLOCK s=$LOCAL_CERT d=$DSA_CERT $LARGE_DH $RING_BUFS || exit(1)
-# 
-# Use cert configured for client use on server side, verify policy fail 
-#
-$BUILD_DIR/sslSession $CLIENT_KC a $CLIENT_CERT x $QUIET $RING_BUFS || exit(1)
-# 
-# Use cert configured for server use on client side, verify policy fail 
-#
-$BUILD_DIR/sslSession $LOCAL_KC a $LOCAL_CERT c=$LOCAL_KC X u $RING_BUFS $QUIET || exit(1)
-#
-# check for cert-specific errors
-#
-set SSL_SCRIPT_DIR=`pwd`
-# 
-# This one needs certs in current directory; copy the script 
-# to build dir and run there; return to cwd afterwards
-#
-cp sslExtendUse.scr $BUILD_DIR
-cd $BUILD_DIR
-./certcrl -S sslExtendUse.scr $QUIET_ || exit(1)
-cd $SSL_SCRIPT_DIR
-#
-if($DO_PING == YES) then
-       ../sslViewer/verifyPing $PINGSSL_QUIET $VERB $NON_BLOCK || exit(1)
-endif
-
-echo "### ssldvt completed successfully. ###"