gecko/security/nss/tests/merge/merge.sh
Kai Engert 0ccf958b45 Bug 527659, Update mozilla-central to NSS 3.12.6 (beta)
== NSS portion
== r=rrelyea/wtc for upgrading mozilla-central to cvs tag NSS_3_12_6_BETA1
== This includes reapplying the (merged) patch from bug 519550 on top of NSS.
== PSM portion
== Includes the patch to disable TLS compression, r=kaie
== Include the patch to disable zlib test programs, which don't work on maemo, r=kaie
2010-02-07 12:54:28 +01:00

305 lines
11 KiB
Bash
Executable File

#! /bin/bash
#
# ***** BEGIN LICENSE BLOCK *****
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
#
# The contents of this file are subject to the Mozilla Public License Version
# 1.1 (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
# http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS IS" basis,
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
# for the specific language governing rights and limitations under the
# License.
#
# The Original Code is the Network Security Services (NSS)
#
# The Initial Developer of the Original Code is
# Netscape Communications Corporation.
# Portions created by the Initial Developer are Copyright (C) 2008-2009
# the Initial Developer. All Rights Reserved.
#
# Contributor(s):
#
# Alternatively, the contents of this file may be used under the terms of
# either the GNU General Public License Version 2 or later (the "GPL"), or
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
# in which case the provisions of the GPL or the LGPL are applicable instead
# of those above. If you wish to allow use of your version of this file only
# under the terms of either the GPL or the LGPL, and not to allow others to
# use your version of this file under the terms of the MPL, indicate your
# decision by deleting the provisions above and replace them with the notice
# and other provisions required by the GPL or the LGPL. If you do not delete
# the provisions above, a recipient may use your version of this file under
# the terms of any one of the MPL, the GPL or the LGPL.
#
# ***** END LICENSE BLOCK *****
########################################################################
#
# mozilla/security/nss/tests/merge/merge.sh
#
# Script to test NSS merge
#
# needs to work on all Unix and Windows platforms
#
# special strings
# ---------------
# FIXME ... known problems, search for this string
# NOTE .... unexpected behavior
#
########################################################################
############################## merge_init ##############################
# local shell function to initialize this script
########################################################################
merge_init()
{
SCRIPTNAME=merge.sh # sourced - $0 would point to all.sh
HAS_EXPLICIT_DB=0
if [ ! -z "${NSS_DEFAULT_DB_TYPE}" ]; then
HAS_EXPLICIT_DB=1
fi
if [ -z "${CLEANUP}" ] ; then # if nobody else is responsible for
CLEANUP="${SCRIPTNAME}" # cleaning this script will do it
fi
if [ -z "${INIT_SOURCED}" -o "${INIT_SOURCED}" != "TRUE" ]; then
cd ../common
. ./init.sh
fi
if [ ! -r $CERT_LOG_FILE ]; then # we need certificates here
cd ${QADIR}/cert
. ./cert.sh
fi
if [ ! -d ${HOSTDIR}/SDR ]; then
cd ${QADIR}/sdr
. ./sdr.sh
fi
SCRIPTNAME=merge.sh
html_head "Merge Tests"
# need the SSL & SMIME directories from cert.sh
grep "SUCCESS: SMIME passed" $CERT_LOG_FILE >/dev/null || {
Exit 11 "Fatal - S/MIME of cert.sh needs to pass first"
}
grep "SUCCESS: SSL passed" $CERT_LOG_FILE >/dev/null || {
Exit 8 "Fatal - SSL of cert.sh needs to pass first"
}
#temporary files for SDR tests
VALUE1=$HOSTDIR/tests.v1.$$
VALUE3=$HOSTDIR/tests.v3.$$
# local directories used in this test.
MERGEDIR=${HOSTDIR}/merge
R_MERGEDIR=../merge
D_MERGE="merge.$version"
# SDR not initialized in common/init
P_R_SDR=../SDR
D_SDR="SDR.$version"
mkdir -p ${MERGEDIR}
PROFILE=.
if [ -n "${MULTIACCESS_DBM}" ]; then
PROFILE="multiaccess:${D_MERGE}"
P_R_SDR="multiaccess:${D_SDR}"
fi
cd ${MERGEDIR}
# clear out any existing databases, potentially from a previous run.
rm -f *.db
# copy alicedir over as a seed database.
cp ${R_ALICEDIR}/* .
# copy the smime text samples
cp ${QADIR}/smime/*.txt .
# create a set of conflicting names.
CONFLICT1DIR=conflict1
CONFLICT2DIR=conflict2
mkdir ${CONFLICT1DIR}
mkdir ${CONFLICT2DIR}
# in the upgrade mode (dbm->sql), make sure our test databases
# are dbm databases.
if [ "${TEST_MODE}" = "UPGRADE_DB" ]; then
save=${NSS_DEFAULT_DB_TYPE}
NSS_DEFAULT_DB_TYPE= ; export NSS_DEFAULT_DB_TYPE
fi
certutil -N -d ${CONFLICT1DIR} -f ${R_PWFILE}
certutil -N -d ${CONFLICT2DIR} -f ${R_PWFILE}
certutil -A -n Alice -t ,, -i ${R_CADIR}/TestUser41.cert -d ${CONFLICT1DIR}
certutil -A -n "Alice #1" -t ,, -i ${R_CADIR}/TestUser42.cert -d ${CONFLICT1DIR}
certutil -A -n "Alice #99" -t ,, -i ${R_CADIR}/TestUser43.cert -d ${CONFLICT1DIR}
certutil -A -n Alice -t ,, -i ${R_CADIR}/TestUser44.cert -d ${CONFLICT2DIR}
certutil -A -n "Alice #1" -t ,, -i ${R_CADIR}/TestUser45.cert -d ${CONFLICT2DIR}
certutil -A -n "Alice #99" -t ,, -i ${R_CADIR}/TestUser46.cert -d ${CONFLICT2DIR}
if [ "${TEST_MODE}" = "UPGRADE_DB" ]; then
NSS_DEFAULT_DB_TYPE=${save}; export NSS_DEFAULT_DB_TYPE
fi
#
# allow all the tests to run in standalone mode.
# in standalone mode, TEST_MODE is not set.
# if NSS_DEFAULT_DB_TYPE is dbm, then test merge with dbm
# if NSS_DEFAULT_DB_TYPE is sql, then test merge with sql
# if NSS_DEFAULT_DB_TYPE is not set, then test database upgrade merge
# from dbm databases (created above) into a new sql db.
if [ -z "${TEST_MODE}" ] && [ ${HAS_EXPLICIT_DB} -eq 0 ]; then
echo "*** Using Standalone Upgrade DB mode"
NSS_DEFAULT_DB_TYPE=sql; export NSS_DEFAULT_DB_TYPE
echo certutil --upgrade-merge --source-dir ${P_R_ALICEDIR} --upgrade-id local -d ${PROFILE} -f ${R_PWFILE} -@ ${R_PWFILE}
${BINDIR}/certutil --upgrade-merge --source-dir ${P_R_ALICEDIR} --upgrade-id local -d ${PROFILE} -f ${R_PWFILE} -@ ${R_PWFILE}
TEST_MODE=UPGRADE_DB
fi
}
#
# this allows us to run this test for both merge and upgrade-merge cases.
# merge_cmd takes the potential upgrade-id and the rest of the certutil
# arguments.
#
merge_cmd()
{
MERGE_CMD=--merge
if [ "${TEST_MODE}" = "UPGRADE_DB" ]; then
MERGE_CMD="--upgrade-merge --upgrade-token-name OldDB --upgrade-id ${1}"
fi
shift
echo certutil ${MERGE_CMD} $*
${PROFTOOL} ${BINDIR}/certutil ${MERGE_CMD} $*
}
merge_main()
{
# first create a local sdr key and encrypt some data with it
# This will cause a colision with the SDR key in ../SDR.
echo "$SCRIPTNAME: Creating an SDR key & Encrypt"
echo "sdrtest -d ${PROFILE} -o ${VALUE3} -t Test2 -f ${R_PWFILE}"
${PROFTOOL} ${BINDIR}/sdrtest -d ${PROFILE} -o ${VALUE3} -t Test2 -f ${R_PWFILE}
html_msg $? 0 "Creating SDR Key"
# Now merge in Dave
# Dave's cert is already in alicedir, but his key isn't. This will make
# sure we are updating the keys and CKA_ID's on the certificate properly.
MERGE_ID=dave
echo "$SCRIPTNAME: Merging in Key for Existing user"
merge_cmd dave --source-dir ${P_R_DAVEDIR} -d ${PROFILE} -f ${R_PWFILE} -@ ${R_PWFILE}
html_msg $? 0 "Merging Dave"
# Merge in server
# contains a CRL and new user certs
MERGE_ID=server
echo "$SCRIPTNAME: Merging in new user "
merge_cmd server --source-dir ${P_R_SERVERDIR} -d ${PROFILE} -f ${R_PWFILE} -@ ${R_PWFILE}
html_msg $? 0 "Merging server"
# Merge in ext_client
# contains a new certificate chain and additional trust flags
MERGE_ID=ext_client
echo "$SCRIPTNAME: Merging in new chain "
merge_cmd ext_client --source-dir ${P_R_EXT_CLIENTDIR} -d ${PROFILE} -f ${R_PWFILE} -@ ${R_PWFILE}
html_msg $? 0 "Merging ext_client"
# Merge conflicting nicknames in conflict1dir
# contains several certificates with nicknames that conflict with the target
# database
MERGE_ID=conflict1
echo "$SCRIPTNAME: Merging in conflicting nicknames 1"
merge_cmd conflict1 --source-dir ${CONFLICT1DIR} -d ${PROFILE} -f ${R_PWFILE} -@ ${R_PWFILE}
html_msg $? 0 "Merging conflicting nicknames 1"
# Merge conflicting nicknames in conflict2dir
# contains several certificates with nicknames that conflict with the target
# database
MERGE_ID=conflict2
echo "$SCRIPTNAME: Merging in conflicting nicknames 1"
merge_cmd conflict2 --source-dir ${CONFLICT2DIR} -d ${PROFILE} -f ${R_PWFILE} -@ ${R_PWFILE}
html_msg $? 0 "Merging conflicting nicknames 2"
# Make sure conflicted names were properly sorted out.
echo "$SCRIPTNAME: Verify nicknames were deconflicted (Alice #4)"
certutil -L -n "Alice #4" -d ${PROFILE}
html_msg $? 0 "Verify nicknames were deconflicted (Alice #4)"
# Make sure conflicted names were properly sorted out.
echo "$SCRIPTNAME: Verify nicknames were deconflicted (Alice #100)"
certutil -L -n "Alice #100" -d ${PROFILE}
html_msg $? 0 "Verify nicknames were deconflicted (Alice #100)"
# Merge in SDR
# contains a secret SDR key
MERGE_ID=SDR
echo "$SCRIPTNAME: Merging in SDR "
merge_cmd sdr --source-dir ${P_R_SDR} -d ${PROFILE} -f ${R_PWFILE} -@ ${R_PWFILE}
html_msg $? 0 "Merging SDR"
# insert a listing of the database into the log for diagonic purposes
${BINDIR}/certutil -L -d ${PROFILE}
${BINDIR}/crlutil -L -d ${PROFILE}
# Make sure we can decrypt with our original SDR key generated above
echo "$SCRIPTNAME: Decrypt - With Original SDR Key"
echo "sdrtest -d ${PROFILE} -i ${VALUE3} -t Test2 -f ${R_PWFILE}"
${PROFTOOL} ${BINDIR}/sdrtest -d ${PROFILE} -i ${VALUE3} -t Test2 -f ${R_PWFILE}
html_msg $? 0 "Decrypt - Value 3"
# Make sure we can decrypt with our the SDR key merged in from ../SDR
echo "$SCRIPTNAME: Decrypt - With Merged SDR Key"
echo "sdrtest -d ${PROFILE} -i ${VALUE1} -t Test1 -f ${R_PWFILE}"
${PROFTOOL} ${BINDIR}/sdrtest -d ${PROFILE} -i ${VALUE1} -t Test1 -f ${R_PWFILE}
html_msg $? 0 "Decrypt - Value 1"
# Make sure we can sign with merge certificate
echo "$SCRIPTNAME: Signing with merged key ------------------"
echo "cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d ${PROFILE} -p nss -o dave.dsig"
${PROFTOOL} ${BINDIR}/cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d ${PROFILE} -p nss -o dave.dsig
html_msg $? 0 "Create Detached Signature Dave" "."
echo "cmsutil -D -i dave.dsig -c alice.txt -d ${PROFILE} "
${PROFTOOL} ${BINDIR}/cmsutil -D -i dave.dsig -c alice.txt -d ${PROFILE}
html_msg $? 0 "Verifying Dave's Detached Signature"
# Make sure that trust objects were properly merged
echo "$SCRIPTNAME: verifying merged cert ------------------"
echo "certutil -V -n ExtendedSSLUser -u C -d ${PROFILE}"
${PROFTOOL} ${BINDIR}/certutil -V -n ExtendedSSLUser -u C -d ${PROFILE}
html_msg $? 0 "Verifying ExtendedSSL User Cert"
# Make sure that the crl got properly copied in
echo "$SCRIPTNAME: verifying merged crl ------------------"
echo "crlutil -L -n TestCA -d ${PROFILE}"
${PROFTOOL} ${BINDIR}/crlutil -L -n TestCA -d ${PROFILE}
html_msg $? 0 "Verifying TestCA CRL"
}
############################## smime_cleanup ###########################
# local shell function to finish this script (no exit since it might be
# sourced)
########################################################################
merge_cleanup()
{
html "</TABLE><BR>"
cd ${QADIR}
. common/cleanup.sh
}
################## main #################################################
merge_init
merge_main
merge_cleanup