diff options
author | inoguchi <> | 2020-08-01 14:31:23 +0000 |
---|---|---|
committer | inoguchi <> | 2020-08-01 14:31:23 +0000 |
commit | 337cfcf46a9b6d390560440dfb631f10b7aa04b9 (patch) | |
tree | a76aaee467004601086ebc2026c7916c74637532 | |
parent | 0973a73b440b32006d33d9c0ce42f83c3f1caff4 (diff) | |
download | openbsd-337cfcf46a9b6d390560440dfb631f10b7aa04b9.tar.gz openbsd-337cfcf46a9b6d390560440dfb631f10b7aa04b9.tar.bz2 openbsd-337cfcf46a9b6d390560440dfb631f10b7aa04b9.zip |
Replace hostname underscore with hyphen in appstest.sh
-rwxr-xr-x | src/regress/usr.bin/openssl/appstest.sh | 56 |
1 files changed, 28 insertions, 28 deletions
diff --git a/src/regress/usr.bin/openssl/appstest.sh b/src/regress/usr.bin/openssl/appstest.sh index 47229de053..e90dc989f5 100755 --- a/src/regress/usr.bin/openssl/appstest.sh +++ b/src/regress/usr.bin/openssl/appstest.sh | |||
@@ -1,6 +1,6 @@ | |||
1 | #!/bin/sh | 1 | #!/bin/sh |
2 | # | 2 | # |
3 | # $OpenBSD: appstest.sh,v 1.45 2020/05/29 14:26:01 inoguchi Exp $ | 3 | # $OpenBSD: appstest.sh,v 1.46 2020/08/01 14:31:23 inoguchi Exp $ |
4 | # | 4 | # |
5 | # Copyright (c) 2016 Kinichiro Inoguchi <inoguchi@openbsd.org> | 5 | # Copyright (c) 2016 Kinichiro Inoguchi <inoguchi@openbsd.org> |
6 | # | 6 | # |
@@ -606,9 +606,9 @@ __EOF__ | |||
606 | ca_key=$ca_dir/private/ca_key.pem ca_pass=test-ca-pass | 606 | ca_key=$ca_dir/private/ca_key.pem ca_pass=test-ca-pass |
607 | 607 | ||
608 | if [ $mingw = 0 ] ; then | 608 | if [ $mingw = 0 ] ; then |
609 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testCA.test_dummy.com/' | 609 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testCA.test-dummy.com/' |
610 | else | 610 | else |
611 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testCA.test_dummy.com\' | 611 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testCA.test-dummy.com\' |
612 | fi | 612 | fi |
613 | 613 | ||
614 | $openssl_bin req -new -x509 -batch -newkey rsa:2048 \ | 614 | $openssl_bin req -new -x509 -batch -newkey rsa:2048 \ |
@@ -633,9 +633,9 @@ __EOF__ | |||
633 | tsa_pass=test-tsa-pass | 633 | tsa_pass=test-tsa-pass |
634 | 634 | ||
635 | if [ $mingw = 0 ] ; then | 635 | if [ $mingw = 0 ] ; then |
636 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testTSA.test_dummy.com/' | 636 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testTSA.test-dummy.com/' |
637 | else | 637 | else |
638 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testTSA.test_dummy.com\' | 638 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testTSA.test-dummy.com\' |
639 | fi | 639 | fi |
640 | 640 | ||
641 | $openssl_bin req -new -keyout $tsa_key -out $tsa_csr \ | 641 | $openssl_bin req -new -keyout $tsa_key -out $tsa_csr \ |
@@ -667,9 +667,9 @@ __EOF__ | |||
667 | ocsp_key=$ocsp_dir/private/ocsp_key.pem | 667 | ocsp_key=$ocsp_dir/private/ocsp_key.pem |
668 | 668 | ||
669 | if [ $mingw = 0 ] ; then | 669 | if [ $mingw = 0 ] ; then |
670 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testOCSP.test_dummy.com/' | 670 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testOCSP.test-dummy.com/' |
671 | else | 671 | else |
672 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testOCSP.test_dummy.com\' | 672 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testOCSP.test-dummy.com\' |
673 | fi | 673 | fi |
674 | 674 | ||
675 | $openssl_bin req -new -keyout $ocsp_key -nodes -out $ocsp_csr \ | 675 | $openssl_bin req -new -keyout $ocsp_key -nodes -out $ocsp_csr \ |
@@ -698,9 +698,9 @@ __EOF__ | |||
698 | sv_rsa_pass=test-server-pass | 698 | sv_rsa_pass=test-server-pass |
699 | 699 | ||
700 | if [ $mingw = 0 ] ; then | 700 | if [ $mingw = 0 ] ; then |
701 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=localhost.test_dummy.com/' | 701 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=localhost.test-dummy.com/' |
702 | else | 702 | else |
703 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=localhost.test_dummy.com\' | 703 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=localhost.test-dummy.com\' |
704 | fi | 704 | fi |
705 | 705 | ||
706 | start_message "genrsa ... generate server key#1" | 706 | start_message "genrsa ... generate server key#1" |
@@ -712,7 +712,7 @@ __EOF__ | |||
712 | 712 | ||
713 | $openssl_bin req -new -subj $subj -sha256 \ | 713 | $openssl_bin req -new -subj $subj -sha256 \ |
714 | -key $sv_rsa_key -keyform pem -passin pass:$sv_rsa_pass \ | 714 | -key $sv_rsa_key -keyform pem -passin pass:$sv_rsa_pass \ |
715 | -addext 'subjectAltName = DNS:localhost.test_dummy.com' \ | 715 | -addext 'subjectAltName = DNS:localhost.test-dummy.com' \ |
716 | -out $sv_rsa_csr -outform pem | 716 | -out $sv_rsa_csr -outform pem |
717 | check_exit_status $? | 717 | check_exit_status $? |
718 | 718 | ||
@@ -737,7 +737,7 @@ __EOF__ | |||
737 | JP | 737 | JP |
738 | Tokyo | 738 | Tokyo |
739 | TEST_DUMMY_COMPANY | 739 | TEST_DUMMY_COMPANY |
740 | revoke.test_dummy.com | 740 | revoke.test-dummy.com |
741 | __EOF__ | 741 | __EOF__ |
742 | check_exit_status $? | 742 | check_exit_status $? |
743 | 743 | ||
@@ -748,9 +748,9 @@ __EOF__ | |||
748 | sv_ecdsa_pass=test-ecdsa-pass | 748 | sv_ecdsa_pass=test-ecdsa-pass |
749 | 749 | ||
750 | if [ $mingw = 0 ] ; then | 750 | if [ $mingw = 0 ] ; then |
751 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=ecdsa.test_dummy.com/' | 751 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=ecdsa.test-dummy.com/' |
752 | else | 752 | else |
753 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=ecdsa.test_dummy.com\' | 753 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=ecdsa.test-dummy.com\' |
754 | fi | 754 | fi |
755 | 755 | ||
756 | start_message "ecparam ... generate server key#3" | 756 | start_message "ecparam ... generate server key#3" |
@@ -762,7 +762,7 @@ __EOF__ | |||
762 | 762 | ||
763 | $openssl_bin req -new -subj $subj -sha256 \ | 763 | $openssl_bin req -new -subj $subj -sha256 \ |
764 | -key $sv_ecdsa_key -keyform pem -passin pass:$sv_ecdsa_pass \ | 764 | -key $sv_ecdsa_key -keyform pem -passin pass:$sv_ecdsa_pass \ |
765 | -addext 'subjectAltName = DNS:ecdsa.test_dummy.com' \ | 765 | -addext 'subjectAltName = DNS:ecdsa.test-dummy.com' \ |
766 | -out $sv_ecdsa_csr -outform pem | 766 | -out $sv_ecdsa_csr -outform pem |
767 | check_exit_status $? | 767 | check_exit_status $? |
768 | 768 | ||
@@ -781,9 +781,9 @@ __EOF__ | |||
781 | sv_gost_pass=test-gost-pass | 781 | sv_gost_pass=test-gost-pass |
782 | 782 | ||
783 | if [ $mingw = 0 ] ; then | 783 | if [ $mingw = 0 ] ; then |
784 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=gost.test_dummy.com/' | 784 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=gost.test-dummy.com/' |
785 | else | 785 | else |
786 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=gost.test_dummy.com\' | 786 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=gost.test-dummy.com\' |
787 | fi | 787 | fi |
788 | 788 | ||
789 | start_message "genpkey ... generate server key#4" | 789 | start_message "genpkey ... generate server key#4" |
@@ -796,7 +796,7 @@ __EOF__ | |||
796 | 796 | ||
797 | $openssl_bin req -new -subj $subj -streebog512 \ | 797 | $openssl_bin req -new -subj $subj -streebog512 \ |
798 | -key $sv_gost_key -keyform pem -passin pass:$sv_gost_pass \ | 798 | -key $sv_gost_key -keyform pem -passin pass:$sv_gost_pass \ |
799 | -addext 'subjectAltName = DNS:gost.test_dummy.com' \ | 799 | -addext 'subjectAltName = DNS:gost.test-dummy.com' \ |
800 | -out $sv_gost_csr -outform pem | 800 | -out $sv_gost_csr -outform pem |
801 | check_exit_status $? | 801 | check_exit_status $? |
802 | 802 | ||
@@ -933,7 +933,7 @@ __EOF__ | |||
933 | countryName = JP | 933 | countryName = JP |
934 | stateOrProvinceName = Tokyo | 934 | stateOrProvinceName = Tokyo |
935 | organizationName = TEST_DUMMY_COMPANY | 935 | organizationName = TEST_DUMMY_COMPANY |
936 | commonName = spkac.test_dummy.com | 936 | commonName = spkac.test-dummy.com |
937 | __EOF__ | 937 | __EOF__ |
938 | cat $spkacfile >> $spkacreq | 938 | cat $spkacfile >> $spkacreq |
939 | 939 | ||
@@ -975,9 +975,9 @@ __EOF__ | |||
975 | cl_rsa_pass=test-user1-pass | 975 | cl_rsa_pass=test-user1-pass |
976 | 976 | ||
977 | if [ $mingw = 0 ] ; then | 977 | if [ $mingw = 0 ] ; then |
978 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user1.test_dummy.com/' | 978 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user1.test-dummy.com/' |
979 | else | 979 | else |
980 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user1.test_dummy.com\' | 980 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user1.test-dummy.com\' |
981 | fi | 981 | fi |
982 | 982 | ||
983 | $openssl_bin req -new -keyout $cl_rsa_key -out $cl_rsa_csr \ | 983 | $openssl_bin req -new -keyout $cl_rsa_key -out $cl_rsa_csr \ |
@@ -991,9 +991,9 @@ __EOF__ | |||
991 | cl_ecdsa_pass=test-user1-pass | 991 | cl_ecdsa_pass=test-user1-pass |
992 | 992 | ||
993 | if [ $mingw = 0 ] ; then | 993 | if [ $mingw = 0 ] ; then |
994 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user2.test_dummy.com/' | 994 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user2.test-dummy.com/' |
995 | else | 995 | else |
996 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user2.test_dummy.com\' | 996 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user2.test-dummy.com\' |
997 | fi | 997 | fi |
998 | 998 | ||
999 | $openssl_bin ecparam -name prime256v1 -genkey -out $cl_ecdsa_key | 999 | $openssl_bin ecparam -name prime256v1 -genkey -out $cl_ecdsa_key |
@@ -1011,9 +1011,9 @@ __EOF__ | |||
1011 | cl_gost_pass=test-user1-pass | 1011 | cl_gost_pass=test-user1-pass |
1012 | 1012 | ||
1013 | if [ $mingw = 0 ] ; then | 1013 | if [ $mingw = 0 ] ; then |
1014 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user3.test_dummy.com/' | 1014 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user3.test-dummy.com/' |
1015 | else | 1015 | else |
1016 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user3.test_dummy.com\' | 1016 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user3.test-dummy.com\' |
1017 | fi | 1017 | fi |
1018 | 1018 | ||
1019 | $openssl_bin genpkey -algorithm GOST2001 -pkeyopt paramset:A \ | 1019 | $openssl_bin genpkey -algorithm GOST2001 -pkeyopt paramset:A \ |
@@ -1130,10 +1130,10 @@ __EOF__ | |||
1130 | -signer $cl_rsa_cert -inkey $cl_rsa_key -keyform pem \ | 1130 | -signer $cl_rsa_cert -inkey $cl_rsa_key -keyform pem \ |
1131 | -keyopt rsa_padding_mode:pss \ | 1131 | -keyopt rsa_padding_mode:pss \ |
1132 | -passin pass:$cl_rsa_pass -md sha256 \ | 1132 | -passin pass:$cl_rsa_pass -md sha256 \ |
1133 | -from user1@test_dummy.com -to server@test_dummy.com \ | 1133 | -from user1@test-dummy.com -to server@test-dummy.com \ |
1134 | -subject "test openssl cms" \ | 1134 | -subject "test openssl cms" \ |
1135 | -receipt_request_from server@test_dummy.com \ | 1135 | -receipt_request_from server@test-dummy.com \ |
1136 | -receipt_request_to user1@test_dummy.com | 1136 | -receipt_request_to user1@test-dummy.com |
1137 | check_exit_status $? | 1137 | check_exit_status $? |
1138 | 1138 | ||
1139 | # encrypt | 1139 | # encrypt |
@@ -1283,7 +1283,7 @@ __EOF__ | |||
1283 | -out $smime_sig -outform smime \ | 1283 | -out $smime_sig -outform smime \ |
1284 | -signer $cl_rsa_cert -inkey $cl_rsa_key -keyform pem \ | 1284 | -signer $cl_rsa_cert -inkey $cl_rsa_key -keyform pem \ |
1285 | -passin pass:$cl_rsa_pass -md sha256 \ | 1285 | -passin pass:$cl_rsa_pass -md sha256 \ |
1286 | -from user1@test_dummy.com -to server@test_dummy.com \ | 1286 | -from user1@test-dummy.com -to server@test-dummy.com \ |
1287 | -subject "test openssl smime" | 1287 | -subject "test openssl smime" |
1288 | check_exit_status $? | 1288 | check_exit_status $? |
1289 | 1289 | ||