]> www.infradead.org Git - users/dwmw2/openconnect.git/commitdiff
Remove spurious trailing space
authorDimitri Papadopoulos <3350651-DimitriPapadopoulos@users.noreply.gitlab.com>
Sat, 31 Jul 2021 11:19:27 +0000 (13:19 +0200)
committerDimitri Papadopoulos <3350651-DimitriPapadopoulos@users.noreply.gitlab.com>
Sat, 7 Aug 2021 15:49:38 +0000 (17:49 +0200)
Signed-off-by: Dimitri Papadopoulos <3350651-DimitriPapadopoulos@users.noreply.gitlab.com>
18 files changed:
tests/auth-certificate
tests/auth-hwtpm
tests/auth-nonascii
tests/auth-pkcs11
tests/auth-swtpm
tests/auth-username-pass
tests/cert-fingerprint
tests/dtls-psk
tests/f5-auth-and-config
tests/fortinet-auth-and-config
tests/gp-auth-and-config
tests/id-test
tests/juniper-auth
tests/juniper-sso-auth
tests/obsolete-server-crypto
tests/pfs
tests/ppp-over-tls
tests/sigterm

index 7cd2785edb9dd7ed56f797d605a66c7acce958b0..773970be374856fbdc6fab6176947a29345125f9 100755 (executable)
@@ -27,7 +27,7 @@ top_builddir=${top_builddir:-..}
 
 key_list=${key_list:-`echo ${certdir}/*-key-*.{pem,der,p12}`}
 
-echo "Testing certificate auth... "
+echo "Testing certificate auth..."
 
 launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
 PID=$!
@@ -38,7 +38,7 @@ for KEY in ${key_list}; do
     if [ "${KEY%%.p12}" != "${KEY}" ]; then
        CERTARGS="-c ${KEY} --key-password password"
     else
-       CERTARGS="--sslkey ${KEY} --key-password password -c ${KEY%-key-*}-cert.pem "
+       CERTARGS="--sslkey ${KEY} --key-password password -c ${KEY%-key-*}-cert.pem"
     fi
     ( echo "test" | LD_PRELOAD=libsocket_wrapper.so $OPENCONNECT -q $ADDRESS:443 -u test $CERTARGS --servercert=d66b507ae074d03b02eafca40d35f87dd81049d3 --cookieonly --passwd-on-stdin ) ||
        fail $PID "Could not connect with key ${KEY##*/}!"
index bc30b60cf61c0fdf265390feb6cb9763593e77aa..3b4b04b3758a1d070431ea55a5a951d8206254f3 100755 (executable)
@@ -27,7 +27,7 @@ top_builddir=${top_builddir:-..}
 
 hwtpm_list=${hwtpm_list:-`echo ${certdir}/swtpm*-key-tpm.pem`}
 
-echo "Testing TPMv2 auth with hwtpm... "
+echo "Testing TPMv2 auth with hwtpm..."
 
 launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
 PID=$!
index 70a2dcc247e74ea8cbf18defba649a8f4ae9fde5..127b41e8a0fe85b44a8546c1754ecc5cfefcd9d9 100755 (executable)
@@ -25,7 +25,7 @@ top_builddir=${top_builddir:-..}
 
 . `dirname $0`/common.sh
 
-echo "Testing certificate auth with non-ASCII passwords... "
+echo "Testing certificate auth with non-ASCII passwords..."
 
 launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
 PID=$!
index dba10fa2f5c6c2a1b4f73e81fcfe6c2cfb4be6d5..636869285f6f78910c9c7639c3816b15cfb20c91 100755 (executable)
@@ -28,7 +28,7 @@ top_builddir=${top_builddir:-..}
 pkcs11_keys=${pkcs11_keys:-object=RSA object=DSA object=EC id=%01 id=%02 id=%03}
 pkcs11_tokens=${pkcs11_tokens:-openconnect-test}
 
-echo "Testing PKCS#11 auth... "
+echo "Testing PKCS#11 auth..."
 
 launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
 PID=$!
index be6d9150cba7f736660c5610dea6d890fff33cc8..d1b806c62b618e007ff1e66def9a2f8479e50b80 100755 (executable)
@@ -27,7 +27,7 @@ top_builddir=${top_builddir:-..}
 
 swtpm_list=${swtpm_list:-`echo ${certdir}/swtpm*-key-tpm.pem`}
 
-echo "Testing TPMv2 auth with swtpm... "
+echo "Testing TPMv2 auth with swtpm..."
 
 launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
 PID=$!
index 89ecc5459a3f00f68ae4ecee17c117d0b7b88537..ca42d0a9b4b11654032d691f88d810db94928f45 100755 (executable)
@@ -25,7 +25,7 @@ top_builddir=${top_builddir:-..}
 
 . `dirname $0`/common.sh
 
-echo "Testing certificate auth... "
+echo "Testing certificate auth..."
 
 launch_simple_sr_server -d 1 -f -c configs/test-user-pass.config
 PID=$!
index 2e6b95a3f0107e29820501dc00aeeedf022234f6..c218611b720294598631ec2b21a79505c9882f02 100755 (executable)
@@ -25,7 +25,7 @@ top_builddir=${top_builddir:-..}
 
 . `dirname $0`/common.sh
 
-echo "Testing certificate auth... "
+echo "Testing certificate auth..."
 
 launch_simple_sr_server -d 1 -f -c configs/test-user-pass.config
 PID=$!
index dd7eb1fb7130c4ab5447aadea9b6463239a846e7..1b61c3799245585ea3f5d88ce3b4f61f9f031160 100755 (executable)
@@ -42,7 +42,7 @@ if test "$(id -u)" != "0";then
        exit 77
 fi
 
-echo "Testing ocserv connection with DTLS-PSK... "
+echo "Testing ocserv connection with DTLS-PSK..."
 
 function finish {
   set +e
index d69183050619f2057390ebb0f281264829439312..52e743dd1e14cd472b69f6670c22aa0d50a320f1 100755 (executable)
@@ -28,7 +28,7 @@ FINGERPRINT="--servercert=d66b507ae074d03b02eafca40d35f87dd81049d3"
 CERT=$certdir/server-cert.pem
 KEY=$certdir/server-key.pem
 
-echo "Testing F5 auth against fake server ... "
+echo "Testing F5 auth against fake server ..."
 
 OCSERV=${srcdir}/fake-f5-server.py
 launch_simple_sr_server $ADDRESS 443 $CERT $KEY > /dev/null 2>&1
index 2918cdbe74fe2d7d349013342f3264deb9bfa35d..2ce3518b0130844b86acadbc1095f17af2298678 100755 (executable)
@@ -28,7 +28,7 @@ FINGERPRINT="--servercert=d66b507ae074d03b02eafca40d35f87dd81049d3"
 CERT=$certdir/server-cert.pem
 KEY=$certdir/server-key.pem
 
-echo "Testing Fortinet auth against fake server ... "
+echo "Testing Fortinet auth against fake server ..."
 
 OCSERV=${srcdir}/fake-fortinet-server.py
 launch_simple_sr_server $ADDRESS 443 $CERT $KEY > /dev/null 2>&1
index 2ddef59f49e2dcc0887d2cd909d7908fb1d6fa83..2537321f441f2c13416cff1467c2171e1361f547 100755 (executable)
@@ -28,7 +28,7 @@ FINGERPRINT="--servercert=d66b507ae074d03b02eafca40d35f87dd81049d3"
 CERT=$certdir/server-cert.pem
 KEY=$certdir/server-key.pem
 
-echo "Testing GlobalProtect auth against fake server ... "
+echo "Testing GlobalProtect auth against fake server ..."
 
 OCSERV=${srcdir}/fake-gp-server.py
 launch_simple_sr_server $ADDRESS 443 $CERT $KEY >/dev/null 2>&1
index 71b8a11d4749788783a439ad40d3f522f54531a9..6f42f491521994b577c3db7669674be013d124c9 100755 (executable)
@@ -25,7 +25,7 @@ top_builddir=${top_builddir:-..}
 
 . `dirname $0`/common.sh
 
-echo "Testing certificate auth... "
+echo "Testing certificate auth..."
 
 launch_simple_sr_server -d 1 -f -c configs/test-user-pass.config >/dev/null 2>&1
 PID=$!
index 5e1cb5e5c2baa7fee07ba5681129f82193d4f87b..32367074b03eb8c859976fa505610f56a05c458e 100755 (executable)
@@ -29,7 +29,7 @@ CERT=$certdir/server-cert.pem
 KEY=$certdir/server-key.pem
 FAKE_TOKEN="--token-mode=totp --token-secret=ABCD"
 
-echo "Testing Juniper auth against fake server ... "
+echo "Testing Juniper auth against fake server ..."
 
 OCSERV=${srcdir}/fake-juniper-server.py
 launch_simple_sr_server $ADDRESS 443 $CERT $KEY > /dev/null 2>&1
index c4464f846d3a0c9f2ebff4d73145c9660d8dbf2f..795b9824e14148128c04734e9a6a60ad5e1c71f2 100755 (executable)
@@ -29,7 +29,7 @@ CERT=$certdir/server-cert.pem
 KEY=$certdir/server-key.pem
 FAKE_TOKEN="--token-mode=totp --token-secret=ABCD"
 
-echo "Testing Juniper SSO auth against fake server ... "
+echo "Testing Juniper SSO auth against fake server ..."
 
 ${srcdir}/fake-juniper-sso-server.py $ADDRESS 1443 $CERT $KEY >/dev/null 2>&1 &
 PID=$!
index 90d93ef68b63f2053cfeba3371ee461b3f136f74..9071ab826a8e94943f60c22467ae5760df137263 100755 (executable)
@@ -30,7 +30,7 @@ top_builddir=${top_builddir:-..}
 # crypto UNLESS --allow-insecure-crypto is specified.
 ########################################
 
-echo "Testing against server with insecure crypto (3DES and RC4 only)... "
+echo "Testing against server with insecure crypto (3DES and RC4 only)..."
 
 # Run servers
 PORT=4568
index 0608bb293ab9b43f5a2f4a4941db1028676294a0..e57f1d714e6fb46d95388c15ddbd4cf2d95e9ad0 100755 (executable)
--- a/tests/pfs
+++ b/tests/pfs
@@ -31,7 +31,7 @@ top_builddir=${top_builddir:-..}
 # CAN connect if it is not specified.
 ########################################
 
-echo "Testing against server without PFS... "
+echo "Testing against server without PFS..."
 
 # Need to disable TLS 1.3 here because GnuTLS v3.6.13 is allowing non-RSA KX with TLS 1.3, even with -KX-ALL
 # But can't use -VERS-TLS1.3 here, because it's not known to earlier versions of GnuTLS.
index a0f316affc71b8b335dec4ebd48d66c412d0deb7..8c2e31e072605532773110972ce72dd1296c9af1 100755 (executable)
@@ -45,7 +45,7 @@ IPV6_SUCCESS_1="rcvd [IPV6CP ConfAck "
 IPV6_SUCCESS_2="sent [IPV6CP ConfAck "
 TIMEOUT_3S_IDLE="idle 3"
 
-echo "Testing PPP with 'HDLC-like framing' (RFC1662)... "
+echo "Testing PPP with 'HDLC-like framing' (RFC1662)..."
 
 echo -n "Starting PPP peer (HDLC/RFC1662, IPv4+IPv6, DNS, extraneous VJ and CCP)... "
 start=$(date +%s)
index 403dd0bb53da3b58b4583c733d4b8a88087f43e7..d653a414a11667714d354c02c71ab42edf4e0fdc 100755 (executable)
@@ -45,7 +45,7 @@ if test "$(id -u)" != "0";then
        exit 77
 fi
 
-echo "Testing ocserv connection with DTLS-PSK... "
+echo "Testing ocserv connection with DTLS-PSK..."
 
 function finish {
   set +e