diff options
| author | inoguchi <> | 2020-08-01 14:31:23 +0000 |
|---|---|---|
| committer | inoguchi <> | 2020-08-01 14:31:23 +0000 |
| commit | 9f0e401283f035d0eced3cccacd32742befcfbf4 (patch) | |
| tree | a76aaee467004601086ebc2026c7916c74637532 /src | |
| parent | 62d1f9d3147bc590ddad36fe092b92c6ba52715f (diff) | |
| download | openbsd-9f0e401283f035d0eced3cccacd32742befcfbf4.tar.gz openbsd-9f0e401283f035d0eced3cccacd32742befcfbf4.tar.bz2 openbsd-9f0e401283f035d0eced3cccacd32742befcfbf4.zip | |
Replace hostname underscore with hyphen in appstest.sh
Diffstat (limited to 'src')
| -rwxr-xr-x | src/regress/usr.bin/openssl/appstest.sh | 56 |
1 files changed, 28 insertions, 28 deletions
diff --git a/src/regress/usr.bin/openssl/appstest.sh b/src/regress/usr.bin/openssl/appstest.sh index 47229de053..e90dc989f5 100755 --- a/src/regress/usr.bin/openssl/appstest.sh +++ b/src/regress/usr.bin/openssl/appstest.sh | |||
| @@ -1,6 +1,6 @@ | |||
| 1 | #!/bin/sh | 1 | #!/bin/sh |
| 2 | # | 2 | # |
| 3 | # $OpenBSD: appstest.sh,v 1.45 2020/05/29 14:26:01 inoguchi Exp $ | 3 | # $OpenBSD: appstest.sh,v 1.46 2020/08/01 14:31:23 inoguchi Exp $ |
| 4 | # | 4 | # |
| 5 | # Copyright (c) 2016 Kinichiro Inoguchi <inoguchi@openbsd.org> | 5 | # Copyright (c) 2016 Kinichiro Inoguchi <inoguchi@openbsd.org> |
| 6 | # | 6 | # |
| @@ -606,9 +606,9 @@ __EOF__ | |||
| 606 | ca_key=$ca_dir/private/ca_key.pem ca_pass=test-ca-pass | 606 | ca_key=$ca_dir/private/ca_key.pem ca_pass=test-ca-pass |
| 607 | 607 | ||
| 608 | if [ $mingw = 0 ] ; then | 608 | if [ $mingw = 0 ] ; then |
| 609 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testCA.test_dummy.com/' | 609 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testCA.test-dummy.com/' |
| 610 | else | 610 | else |
| 611 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testCA.test_dummy.com\' | 611 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testCA.test-dummy.com\' |
| 612 | fi | 612 | fi |
| 613 | 613 | ||
| 614 | $openssl_bin req -new -x509 -batch -newkey rsa:2048 \ | 614 | $openssl_bin req -new -x509 -batch -newkey rsa:2048 \ |
| @@ -633,9 +633,9 @@ __EOF__ | |||
| 633 | tsa_pass=test-tsa-pass | 633 | tsa_pass=test-tsa-pass |
| 634 | 634 | ||
| 635 | if [ $mingw = 0 ] ; then | 635 | if [ $mingw = 0 ] ; then |
| 636 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testTSA.test_dummy.com/' | 636 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testTSA.test-dummy.com/' |
| 637 | else | 637 | else |
| 638 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testTSA.test_dummy.com\' | 638 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testTSA.test-dummy.com\' |
| 639 | fi | 639 | fi |
| 640 | 640 | ||
| 641 | $openssl_bin req -new -keyout $tsa_key -out $tsa_csr \ | 641 | $openssl_bin req -new -keyout $tsa_key -out $tsa_csr \ |
| @@ -667,9 +667,9 @@ __EOF__ | |||
| 667 | ocsp_key=$ocsp_dir/private/ocsp_key.pem | 667 | ocsp_key=$ocsp_dir/private/ocsp_key.pem |
| 668 | 668 | ||
| 669 | if [ $mingw = 0 ] ; then | 669 | if [ $mingw = 0 ] ; then |
| 670 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testOCSP.test_dummy.com/' | 670 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=testOCSP.test-dummy.com/' |
| 671 | else | 671 | else |
| 672 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testOCSP.test_dummy.com\' | 672 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=testOCSP.test-dummy.com\' |
| 673 | fi | 673 | fi |
| 674 | 674 | ||
| 675 | $openssl_bin req -new -keyout $ocsp_key -nodes -out $ocsp_csr \ | 675 | $openssl_bin req -new -keyout $ocsp_key -nodes -out $ocsp_csr \ |
| @@ -698,9 +698,9 @@ __EOF__ | |||
| 698 | sv_rsa_pass=test-server-pass | 698 | sv_rsa_pass=test-server-pass |
| 699 | 699 | ||
| 700 | if [ $mingw = 0 ] ; then | 700 | if [ $mingw = 0 ] ; then |
| 701 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=localhost.test_dummy.com/' | 701 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=localhost.test-dummy.com/' |
| 702 | else | 702 | else |
| 703 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=localhost.test_dummy.com\' | 703 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=localhost.test-dummy.com\' |
| 704 | fi | 704 | fi |
| 705 | 705 | ||
| 706 | start_message "genrsa ... generate server key#1" | 706 | start_message "genrsa ... generate server key#1" |
| @@ -712,7 +712,7 @@ __EOF__ | |||
| 712 | 712 | ||
| 713 | $openssl_bin req -new -subj $subj -sha256 \ | 713 | $openssl_bin req -new -subj $subj -sha256 \ |
| 714 | -key $sv_rsa_key -keyform pem -passin pass:$sv_rsa_pass \ | 714 | -key $sv_rsa_key -keyform pem -passin pass:$sv_rsa_pass \ |
| 715 | -addext 'subjectAltName = DNS:localhost.test_dummy.com' \ | 715 | -addext 'subjectAltName = DNS:localhost.test-dummy.com' \ |
| 716 | -out $sv_rsa_csr -outform pem | 716 | -out $sv_rsa_csr -outform pem |
| 717 | check_exit_status $? | 717 | check_exit_status $? |
| 718 | 718 | ||
| @@ -737,7 +737,7 @@ __EOF__ | |||
| 737 | JP | 737 | JP |
| 738 | Tokyo | 738 | Tokyo |
| 739 | TEST_DUMMY_COMPANY | 739 | TEST_DUMMY_COMPANY |
| 740 | revoke.test_dummy.com | 740 | revoke.test-dummy.com |
| 741 | __EOF__ | 741 | __EOF__ |
| 742 | check_exit_status $? | 742 | check_exit_status $? |
| 743 | 743 | ||
| @@ -748,9 +748,9 @@ __EOF__ | |||
| 748 | sv_ecdsa_pass=test-ecdsa-pass | 748 | sv_ecdsa_pass=test-ecdsa-pass |
| 749 | 749 | ||
| 750 | if [ $mingw = 0 ] ; then | 750 | if [ $mingw = 0 ] ; then |
| 751 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=ecdsa.test_dummy.com/' | 751 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=ecdsa.test-dummy.com/' |
| 752 | else | 752 | else |
| 753 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=ecdsa.test_dummy.com\' | 753 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=ecdsa.test-dummy.com\' |
| 754 | fi | 754 | fi |
| 755 | 755 | ||
| 756 | start_message "ecparam ... generate server key#3" | 756 | start_message "ecparam ... generate server key#3" |
| @@ -762,7 +762,7 @@ __EOF__ | |||
| 762 | 762 | ||
| 763 | $openssl_bin req -new -subj $subj -sha256 \ | 763 | $openssl_bin req -new -subj $subj -sha256 \ |
| 764 | -key $sv_ecdsa_key -keyform pem -passin pass:$sv_ecdsa_pass \ | 764 | -key $sv_ecdsa_key -keyform pem -passin pass:$sv_ecdsa_pass \ |
| 765 | -addext 'subjectAltName = DNS:ecdsa.test_dummy.com' \ | 765 | -addext 'subjectAltName = DNS:ecdsa.test-dummy.com' \ |
| 766 | -out $sv_ecdsa_csr -outform pem | 766 | -out $sv_ecdsa_csr -outform pem |
| 767 | check_exit_status $? | 767 | check_exit_status $? |
| 768 | 768 | ||
| @@ -781,9 +781,9 @@ __EOF__ | |||
| 781 | sv_gost_pass=test-gost-pass | 781 | sv_gost_pass=test-gost-pass |
| 782 | 782 | ||
| 783 | if [ $mingw = 0 ] ; then | 783 | if [ $mingw = 0 ] ; then |
| 784 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=gost.test_dummy.com/' | 784 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=gost.test-dummy.com/' |
| 785 | else | 785 | else |
| 786 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=gost.test_dummy.com\' | 786 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=gost.test-dummy.com\' |
| 787 | fi | 787 | fi |
| 788 | 788 | ||
| 789 | start_message "genpkey ... generate server key#4" | 789 | start_message "genpkey ... generate server key#4" |
| @@ -796,7 +796,7 @@ __EOF__ | |||
| 796 | 796 | ||
| 797 | $openssl_bin req -new -subj $subj -streebog512 \ | 797 | $openssl_bin req -new -subj $subj -streebog512 \ |
| 798 | -key $sv_gost_key -keyform pem -passin pass:$sv_gost_pass \ | 798 | -key $sv_gost_key -keyform pem -passin pass:$sv_gost_pass \ |
| 799 | -addext 'subjectAltName = DNS:gost.test_dummy.com' \ | 799 | -addext 'subjectAltName = DNS:gost.test-dummy.com' \ |
| 800 | -out $sv_gost_csr -outform pem | 800 | -out $sv_gost_csr -outform pem |
| 801 | check_exit_status $? | 801 | check_exit_status $? |
| 802 | 802 | ||
| @@ -933,7 +933,7 @@ __EOF__ | |||
| 933 | countryName = JP | 933 | countryName = JP |
| 934 | stateOrProvinceName = Tokyo | 934 | stateOrProvinceName = Tokyo |
| 935 | organizationName = TEST_DUMMY_COMPANY | 935 | organizationName = TEST_DUMMY_COMPANY |
| 936 | commonName = spkac.test_dummy.com | 936 | commonName = spkac.test-dummy.com |
| 937 | __EOF__ | 937 | __EOF__ |
| 938 | cat $spkacfile >> $spkacreq | 938 | cat $spkacfile >> $spkacreq |
| 939 | 939 | ||
| @@ -975,9 +975,9 @@ __EOF__ | |||
| 975 | cl_rsa_pass=test-user1-pass | 975 | cl_rsa_pass=test-user1-pass |
| 976 | 976 | ||
| 977 | if [ $mingw = 0 ] ; then | 977 | if [ $mingw = 0 ] ; then |
| 978 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user1.test_dummy.com/' | 978 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user1.test-dummy.com/' |
| 979 | else | 979 | else |
| 980 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user1.test_dummy.com\' | 980 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user1.test-dummy.com\' |
| 981 | fi | 981 | fi |
| 982 | 982 | ||
| 983 | $openssl_bin req -new -keyout $cl_rsa_key -out $cl_rsa_csr \ | 983 | $openssl_bin req -new -keyout $cl_rsa_key -out $cl_rsa_csr \ |
| @@ -991,9 +991,9 @@ __EOF__ | |||
| 991 | cl_ecdsa_pass=test-user1-pass | 991 | cl_ecdsa_pass=test-user1-pass |
| 992 | 992 | ||
| 993 | if [ $mingw = 0 ] ; then | 993 | if [ $mingw = 0 ] ; then |
| 994 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user2.test_dummy.com/' | 994 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user2.test-dummy.com/' |
| 995 | else | 995 | else |
| 996 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user2.test_dummy.com\' | 996 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user2.test-dummy.com\' |
| 997 | fi | 997 | fi |
| 998 | 998 | ||
| 999 | $openssl_bin ecparam -name prime256v1 -genkey -out $cl_ecdsa_key | 999 | $openssl_bin ecparam -name prime256v1 -genkey -out $cl_ecdsa_key |
| @@ -1011,9 +1011,9 @@ __EOF__ | |||
| 1011 | cl_gost_pass=test-user1-pass | 1011 | cl_gost_pass=test-user1-pass |
| 1012 | 1012 | ||
| 1013 | if [ $mingw = 0 ] ; then | 1013 | if [ $mingw = 0 ] ; then |
| 1014 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user3.test_dummy.com/' | 1014 | subj='/C=JP/ST=Tokyo/O=TEST_DUMMY_COMPANY/CN=user3.test-dummy.com/' |
| 1015 | else | 1015 | else |
| 1016 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user3.test_dummy.com\' | 1016 | subj='//C=JP\ST=Tokyo\O=TEST_DUMMY_COMPANY\CN=user3.test-dummy.com\' |
| 1017 | fi | 1017 | fi |
| 1018 | 1018 | ||
| 1019 | $openssl_bin genpkey -algorithm GOST2001 -pkeyopt paramset:A \ | 1019 | $openssl_bin genpkey -algorithm GOST2001 -pkeyopt paramset:A \ |
| @@ -1130,10 +1130,10 @@ __EOF__ | |||
| 1130 | -signer $cl_rsa_cert -inkey $cl_rsa_key -keyform pem \ | 1130 | -signer $cl_rsa_cert -inkey $cl_rsa_key -keyform pem \ |
| 1131 | -keyopt rsa_padding_mode:pss \ | 1131 | -keyopt rsa_padding_mode:pss \ |
| 1132 | -passin pass:$cl_rsa_pass -md sha256 \ | 1132 | -passin pass:$cl_rsa_pass -md sha256 \ |
| 1133 | -from user1@test_dummy.com -to server@test_dummy.com \ | 1133 | -from user1@test-dummy.com -to server@test-dummy.com \ |
| 1134 | -subject "test openssl cms" \ | 1134 | -subject "test openssl cms" \ |
| 1135 | -receipt_request_from server@test_dummy.com \ | 1135 | -receipt_request_from server@test-dummy.com \ |
| 1136 | -receipt_request_to user1@test_dummy.com | 1136 | -receipt_request_to user1@test-dummy.com |
| 1137 | check_exit_status $? | 1137 | check_exit_status $? |
| 1138 | 1138 | ||
| 1139 | # encrypt | 1139 | # encrypt |
| @@ -1283,7 +1283,7 @@ __EOF__ | |||
| 1283 | -out $smime_sig -outform smime \ | 1283 | -out $smime_sig -outform smime \ |
| 1284 | -signer $cl_rsa_cert -inkey $cl_rsa_key -keyform pem \ | 1284 | -signer $cl_rsa_cert -inkey $cl_rsa_key -keyform pem \ |
| 1285 | -passin pass:$cl_rsa_pass -md sha256 \ | 1285 | -passin pass:$cl_rsa_pass -md sha256 \ |
| 1286 | -from user1@test_dummy.com -to server@test_dummy.com \ | 1286 | -from user1@test-dummy.com -to server@test-dummy.com \ |
| 1287 | -subject "test openssl smime" | 1287 | -subject "test openssl smime" |
| 1288 | check_exit_status $? | 1288 | check_exit_status $? |
| 1289 | 1289 | ||
