From 4e4f5b4c833ba5285e001bdb6b832bdf91c43da3 Mon Sep 17 00:00:00 2001 From: cvs2svn Date: Mon, 30 Aug 2021 17:27:46 +0000 Subject: This commit was manufactured by cvs2git to create tag 'tb_20210830'. --- src/regress/lib/libssl/interop/cert/Makefile | 87 ---------------------------- 1 file changed, 87 deletions(-) delete mode 100644 src/regress/lib/libssl/interop/cert/Makefile (limited to 'src/regress/lib/libssl/interop/cert') diff --git a/src/regress/lib/libssl/interop/cert/Makefile b/src/regress/lib/libssl/interop/cert/Makefile deleted file mode 100644 index a8ea88aaa3..0000000000 --- a/src/regress/lib/libssl/interop/cert/Makefile +++ /dev/null @@ -1,87 +0,0 @@ -# $OpenBSD: Makefile,v 1.6 2020/12/17 00:51:11 bluhm Exp $ - -# Connect a client to a server. Both can be current libressl, or -# openssl 1.0.2, or openssl 1.1. Create client and server certificates -# that are signed by a CA and not signed by a fake CA. Try all -# combinations with, without, and with wrong CA for client and server -# and check the result of certificate verification. - -LIBRARIES = libressl -.if exists(/usr/local/bin/eopenssl) -LIBRARIES += openssl -.endif -.if exists(/usr/local/bin/eopenssl11) -LIBRARIES += openssl11 -.endif - -.for cca in noca ca fakeca -.for sca in noca ca fakeca -.for ccert in nocert cert -.for scert in nocert cert -.for cv in noverify verify -.for sv in noverify verify certverify - -# remember when certificate verification should fail -.if (("${cv}" == verify && "${cca}" == ca && "${scert}" == cert) || \ - "${cv}" == noverify) && \ - (("${sv}" == verify && "${ccert}" == nocert) || \ - ("${sv}" == verify && "${sca}" == ca && "${ccert}" == cert) || \ - ("${sv}" == certverify && "${sca}" == ca && "${ccert}" == cert) || \ - "${sv}" == noverify) -FAIL_${cca}_${sca}_${ccert}_${scert}_${cv}_${sv} = -.else -FAIL_${cca}_${sca}_${ccert}_${scert}_${cv}_${sv} = ! -.endif - -.for clib in ${LIBRARIES} -.for slib in ${LIBRARIES} - -.if ("${clib}" == "libressl" || "${slib}" == "libressl") -REGRESS_TARGETS += run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv} -.else -REGRESS_SLOW_TARGETS += run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv} -.endif - -run-cert-client-${clib}-${cca}-${ccert}-${cv}-server-${slib}-${sca}-${scert}-${sv}: \ - 127.0.0.1.crt ca.crt fake-ca.crt client.crt server.crt \ - ../${clib}/client ../${slib}/server - LD_LIBRARY_PATH=/usr/local/lib/e${slib} \ - ../${slib}/server >${@:S/^run/server/}.out \ - ${sca:S/^noca//:S/^fakeca/-C fake-ca.crt/:S/^ca/-C ca.crt/} \ - ${scert:S/^nocert//:S/^cert/-c server.crt -k server.key/} \ - ${sv:S/^noverify//:S/^verify/-v/:S/^certverify/-vv/} \ - 127.0.0.1 0 - ${FAIL_${cca}_${sca}_${ccert}_${scert}_${cv}_${sv}} \ - LD_LIBRARY_PATH=/usr/local/lib/e${clib} \ - ../${clib}/client >${@:S/^run/client/}.out \ - ${cca:S/^noca//:S/^fakeca/-C fake-ca.crt/:S/^ca/-C ca.crt/} \ - ${ccert:S/^nocert//:S/^cert/-c server.crt -k server.key/} \ - ${cv:S/^noverify//:S/^verify/-v/} \ - `sed -n 's/listen sock: //p' ${@:S/^run/server/}.out` -.if empty(${FAIL_${cca}_${sca}_${ccert}_${scert}_${cv}_${sv}}) - grep '^success$$' ${@:S/^run/server/}.out || \ - { sleep 1; grep '^success$$' ${@:S/^run/server/}.out; } - grep '^success$$' ${@:S/^run/client/}.out -.elif ! ("${sv}" == certverify && "${ccert}" == nocert) || \ - ("${cv}" == verify && "${scert}" != cert) - grep '^verify: fail' ${@:S/^run/client/}.out ${@:S/^run/server/}.out -.endif - -.endfor -.endfor -.endfor -.endfor -.endfor -.endfor -.endfor -.endfor - -# argument list too long for a single rm * - -clean: _SUBDIRUSE - rm -f client-*.out - rm -f server-*.out - rm -f a.out [Ee]rrs mklog *.core y.tab.h \ - ${PROG} ${PROGS} ${OBJS} ${_LEXINTM} ${_YACCINTM} ${CLEANFILES} - -.include -- cgit v1.2.3-55-g6feb