key_list=${key_list:-`echo ${certdir}/*-key-*.{pem,der,p12}`}
-echo "Testing certificate auth... "
+echo "Testing certificate auth..."
launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
PID=$!
if [ "${KEY%%.p12}" != "${KEY}" ]; then
CERTARGS="-c ${KEY} --key-password password"
else
- CERTARGS="--sslkey ${KEY} --key-password password -c ${KEY%-key-*}-cert.pem "
+ CERTARGS="--sslkey ${KEY} --key-password password -c ${KEY%-key-*}-cert.pem"
fi
( echo "test" | LD_PRELOAD=libsocket_wrapper.so $OPENCONNECT -q $ADDRESS:443 -u test $CERTARGS --servercert=d66b507ae074d03b02eafca40d35f87dd81049d3 --cookieonly --passwd-on-stdin ) ||
fail $PID "Could not connect with key ${KEY##*/}!"
hwtpm_list=${hwtpm_list:-`echo ${certdir}/swtpm*-key-tpm.pem`}
-echo "Testing TPMv2 auth with hwtpm... "
+echo "Testing TPMv2 auth with hwtpm..."
launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
PID=$!
. `dirname $0`/common.sh
-echo "Testing certificate auth with non-ASCII passwords... "
+echo "Testing certificate auth with non-ASCII passwords..."
launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
PID=$!
pkcs11_keys=${pkcs11_keys:-object=RSA object=DSA object=EC id=%01 id=%02 id=%03}
pkcs11_tokens=${pkcs11_tokens:-openconnect-test}
-echo "Testing PKCS#11 auth... "
+echo "Testing PKCS#11 auth..."
launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
PID=$!
swtpm_list=${swtpm_list:-`echo ${certdir}/swtpm*-key-tpm.pem`}
-echo "Testing TPMv2 auth with swtpm... "
+echo "Testing TPMv2 auth with swtpm..."
launch_simple_sr_server -d 1 -f -c configs/test-user-cert.config
PID=$!
. `dirname $0`/common.sh
-echo "Testing certificate auth... "
+echo "Testing certificate auth..."
launch_simple_sr_server -d 1 -f -c configs/test-user-pass.config
PID=$!
. `dirname $0`/common.sh
-echo "Testing certificate auth... "
+echo "Testing certificate auth..."
launch_simple_sr_server -d 1 -f -c configs/test-user-pass.config
PID=$!
exit 77
fi
-echo "Testing ocserv connection with DTLS-PSK... "
+echo "Testing ocserv connection with DTLS-PSK..."
function finish {
set +e
CERT=$certdir/server-cert.pem
KEY=$certdir/server-key.pem
-echo "Testing F5 auth against fake server ... "
+echo "Testing F5 auth against fake server ..."
OCSERV=${srcdir}/fake-f5-server.py
launch_simple_sr_server $ADDRESS 443 $CERT $KEY > /dev/null 2>&1
CERT=$certdir/server-cert.pem
KEY=$certdir/server-key.pem
-echo "Testing Fortinet auth against fake server ... "
+echo "Testing Fortinet auth against fake server ..."
OCSERV=${srcdir}/fake-fortinet-server.py
launch_simple_sr_server $ADDRESS 443 $CERT $KEY > /dev/null 2>&1
CERT=$certdir/server-cert.pem
KEY=$certdir/server-key.pem
-echo "Testing GlobalProtect auth against fake server ... "
+echo "Testing GlobalProtect auth against fake server ..."
OCSERV=${srcdir}/fake-gp-server.py
launch_simple_sr_server $ADDRESS 443 $CERT $KEY >/dev/null 2>&1
. `dirname $0`/common.sh
-echo "Testing certificate auth... "
+echo "Testing certificate auth..."
launch_simple_sr_server -d 1 -f -c configs/test-user-pass.config >/dev/null 2>&1
PID=$!
KEY=$certdir/server-key.pem
FAKE_TOKEN="--token-mode=totp --token-secret=ABCD"
-echo "Testing Juniper auth against fake server ... "
+echo "Testing Juniper auth against fake server ..."
OCSERV=${srcdir}/fake-juniper-server.py
launch_simple_sr_server $ADDRESS 443 $CERT $KEY > /dev/null 2>&1
KEY=$certdir/server-key.pem
FAKE_TOKEN="--token-mode=totp --token-secret=ABCD"
-echo "Testing Juniper SSO auth against fake server ... "
+echo "Testing Juniper SSO auth against fake server ..."
${srcdir}/fake-juniper-sso-server.py $ADDRESS 1443 $CERT $KEY >/dev/null 2>&1 &
PID=$!
# crypto UNLESS --allow-insecure-crypto is specified.
########################################
-echo "Testing against server with insecure crypto (3DES and RC4 only)... "
+echo "Testing against server with insecure crypto (3DES and RC4 only)..."
# Run servers
PORT=4568
# CAN connect if it is not specified.
########################################
-echo "Testing against server without PFS... "
+echo "Testing against server without PFS..."
# Need to disable TLS 1.3 here because GnuTLS v3.6.13 is allowing non-RSA KX with TLS 1.3, even with -KX-ALL
# But can't use -VERS-TLS1.3 here, because it's not known to earlier versions of GnuTLS.
IPV6_SUCCESS_2="sent [IPV6CP ConfAck "
TIMEOUT_3S_IDLE="idle 3"
-echo "Testing PPP with 'HDLC-like framing' (RFC1662)... "
+echo "Testing PPP with 'HDLC-like framing' (RFC1662)..."
echo -n "Starting PPP peer (HDLC/RFC1662, IPv4+IPv6, DNS, extraneous VJ and CCP)... "
start=$(date +%s)
exit 77
fi
-echo "Testing ocserv connection with DTLS-PSK... "
+echo "Testing ocserv connection with DTLS-PSK..."
function finish {
set +e