📄 makefile
字号:
#//%2006////////////////////////////////////////////////////////////////////////#//#// Copyright (c) 2000, 2001, 2002 BMC Software; Hewlett-Packard Development#// Company, L.P.; IBM Corp.; The Open Group; Tivoli Systems.#// Copyright (c) 2003 BMC Software; Hewlett-Packard Development Company, L.P.;#// IBM Corp.; EMC Corporation, The Open Group.#// Copyright (c) 2004 BMC Software; Hewlett-Packard Development Company, L.P.;#// IBM Corp.; EMC Corporation; VERITAS Software Corporation; The Open Group.#// Copyright (c) 2005 Hewlett-Packard Development Company, L.P.; IBM Corp.;#// EMC Corporation; VERITAS Software Corporation; The Open Group.#// Copyright (c) 2006 Hewlett-Packard Development Company, L.P.; IBM Corp.;#// EMC Corporation; Symantec Corporation; The Open Group.#//#// Permission is hereby granted, free of charge, to any person obtaining a copy#// of this software and associated documentation files (the "Software"), to#// deal in the Software without restriction, including without limitation the#// rights to use, copy, modify, merge, publish, distribute, sublicense, and/or#// sell copies of the Software, and to permit persons to whom the Software is#// furnished to do so, subject to the following conditions:#// #// THE ABOVE COPYRIGHT NOTICE AND THIS PERMISSION NOTICE SHALL BE INCLUDED IN#// ALL COPIES OR SUBSTANTIAL PORTIONS OF THE SOFTWARE. THE SOFTWARE IS PROVIDED#// "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT#// LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR#// PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT#// HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN#// ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION#// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.#//#//==============================================================================ROOT = ../../../..DIR = Clients/cimtrust/testsinclude $(ROOT)/mak/config.makinclude $(ROOT)/mak/test.makinclude $(ROOT)/mak/commands.makRESULTFILE = $(TMP_DIR)/resultifeq ($(OS_TYPE),windows)MASTERRESULTFILE = $(ROOT)/src/$(DIR)/result.master.windowselseMASTERRESULTFILE = $(ROOT)/src/$(DIR)/result.masterendifOPENSSL_CNF = openssl.cnfifeq ($(OPENSSL_SET_SERIAL_SUPPORTED),true) SETSERIAL_0 = -set_serial 0 SETSERIAL_1 = -set_serial 1 SETSERIAL_2 = -set_serial 2 SETSERIAL_3 = -set_serial 3else SETSERIAL_0 = SETSERIAL_1 = SETSERIAL_2 = SETSERIAL_3 =endiftests:poststarttests:clean: @$(RM) $(RESULTFILE) @$(RM) $(PEGASUS_HOME)/testdn1.cert @$(RM) $(PEGASUS_HOME)/testdn1.key @$(RM) $(PEGASUS_HOME)/testdn2.cert @$(RM) $(PEGASUS_HOME)/testdn2.key @$(RM) $(PEGASUS_HOME)/testdn3.cert @$(RM) $(PEGASUS_HOME)/testdn3.key @$(RM) $(PEGASUS_HOME)/testdn4.cert @$(RM) $(PEGASUS_HOME)/testdn4.key @$(RM) $(PEGASUS_HOME)/testexpired1.cert @$(RM) $(PEGASUS_HOME)/testexpired1.key @$(RM) $(PEGASUS_HOME)/testnotyetvalid1.cert @$(RM) $(PEGASUS_HOME)/testnotyetvalid1.key @$(RM) $(PEGASUS_HOME)/testca1.cert @$(RM) $(PEGASUS_HOME)/testca1.key @$(RM) $(PEGASUS_HOME)/testca1.srl @$(RM) $(PEGASUS_HOME)/testca2.cert @$(RM) $(PEGASUS_HOME)/testca2.key @$(RM) $(PEGASUS_HOME)/testca2.srl @$(RM) $(PEGASUS_HOME)/testchca.cert @$(RM) $(PEGASUS_HOME)/testchca.key @$(RM) $(PEGASUS_HOME)/testchca.srl @$(RM) $(PEGASUS_HOME)/testinter.cert @$(RM) $(PEGASUS_HOME)/testinter.key @$(RM) $(PEGASUS_HOME)/testinter.srl @$(RM) $(PEGASUS_HOME)/testleaf.cert @$(RM) $(PEGASUS_HOME)/testleaf.key @$(RM) $(PEGASUS_HOME)/testdup.cert @$(RM) $(PEGASUS_HOME)/testdup.key @$(RM) $(PEGASUS_HOME)/testmonth1.cert @$(RM) $(PEGASUS_HOME)/testmonth1.key @$(RM) $(PEGASUS_HOME)/testmonth2.cert @$(RM) $(PEGASUS_HOME)/testmonth2.key @$(RM) $(PEGASUS_HOME)/testmonth3.cert @$(RM) $(PEGASUS_HOME)/testmonth3.key @$(RM) $(PEGASUS_HOME)/testmonth4.cert @$(RM) $(PEGASUS_HOME)/testmonth4.key @$(RM) $(PEGASUS_HOME)/testmonth5.cert @$(RM) $(PEGASUS_HOME)/testmonth5.key @$(RM) $(PEGASUS_HOME)/testmonth6.cert @$(RM) $(PEGASUS_HOME)/testmonth6.key @$(RM) $(PEGASUS_HOME)/testmonth7.cert @$(RM) $(PEGASUS_HOME)/testmonth7.key @$(RM) $(PEGASUS_HOME)/testmonth8.cert @$(RM) $(PEGASUS_HOME)/testmonth8.key @$(RM) $(PEGASUS_HOME)/testmonth9.cert @$(RM) $(PEGASUS_HOME)/testmonth9.key @$(RM) $(PEGASUS_HOME)/testmonth10.cert @$(RM) $(PEGASUS_HOME)/testmonth10.key @$(RM) $(PEGASUS_HOME)/testmonth11.cert @$(RM) $(PEGASUS_HOME)/testmonth11.key @$(RM) $(PEGASUS_HOME)/testmonth12.cert @$(RM) $(PEGASUS_HOME)/testmonth12.key @$(RM) $(PEGASUS_HOME)/testmulti.cert @$(RM) $(PEGASUS_HOME)/testmulti.key @$(RM) $(PEGASUS_HOME)/testinvalid_x509.cert @$(RM) $(PEGASUS_HOME)/testinvalid_x509.key @$(RM) index.txt @$(RM) index.txt.attr @$(RM) index.txt.old @$(RM) index.txt.attr.old @$(RM) .rnd @$(RM) $(PEGASUS_HOME)/ssltest_setup## Create certificates required for running the tests#test_setup: $(PEGASUS_HOME)/ssltest_setup $(PEGASUS_HOME)/ssltest_setup: $(OPENSSL_CNF) testca1.txt testdn1.txt testdn2.txt testdn3.txt testdn4.txt testexpired1.cert testexpired1.key testnotyetvalid1.cert testnotyetvalid1.key testchca.cert testchca.key testinter.cert testinter.key testleaf.cert testleaf.key @$(MAKE) -i -s clean @$(TOUCH) $(PEGASUS_HOME)/ssltest_setupifdef PEGASUS_HAS_SSL # # Copy the file containing multiple certificates to the staging area # @$(COPY) testmulti.cert $(PEGASUS_HOME)/testmulti.cert # # Copy the expired certificate to the staging area # @$(COPY) testexpired1.cert $(PEGASUS_HOME)/testexpired1.cert @$(COPY) testexpired1.key $(PEGASUS_HOME)/testexpired1.key # # Create the not yet valid certificate to the staging area # @$(COPY) testnotyetvalid1.cert $(PEGASUS_HOME)/testnotyetvalid1.cert @$(COPY) testnotyetvalid1.key $(PEGASUS_HOME)/testnotyetvalid1.key # # Copy the test chain root certificate to the staging area # @$(COPY) testchca.cert $(PEGASUS_HOME)/testchca.cert @$(COPY) testchca.key $(PEGASUS_HOME)/testchca.key # # Copy the test chain intermediate certificate to the staging area # @$(COPY) testinter.cert $(PEGASUS_HOME)/testinter.cert @$(COPY) testinter.key $(PEGASUS_HOME)/testinter.key # # Copy the leaf certificate to the staging area # @$(COPY) testleaf.cert $(PEGASUS_HOME)/testleaf.cert @$(COPY) testleaf.key $(PEGASUS_HOME)/testleaf.key # # Copy the invalid X509 certificate to the staging area # @$(COPY) testinvalid_x509.cert $(PEGASUS_HOME)/testinvalid_x509.cert # # Copy the test month certificates to the staging area # @$(COPY) testmonth1.cert $(PEGASUS_HOME)/testmonth1.cert @$(COPY) testmonth1.key $(PEGASUS_HOME)/testmonth1.key @$(COPY) testmonth2.cert $(PEGASUS_HOME)/testmonth2.cert @$(COPY) testmonth2.key $(PEGASUS_HOME)/testmonth2.key @$(COPY) testmonth3.cert $(PEGASUS_HOME)/testmonth3.cert @$(COPY) testmonth3.key $(PEGASUS_HOME)/testmonth3.key @$(COPY) testmonth4.cert $(PEGASUS_HOME)/testmonth4.cert @$(COPY) testmonth4.key $(PEGASUS_HOME)/testmonth4.key @$(COPY) testmonth5.cert $(PEGASUS_HOME)/testmonth5.cert @$(COPY) testmonth5.key $(PEGASUS_HOME)/testmonth5.key @$(COPY) testmonth6.cert $(PEGASUS_HOME)/testmonth6.cert @$(COPY) testmonth6.key $(PEGASUS_HOME)/testmonth6.key @$(COPY) testmonth7.cert $(PEGASUS_HOME)/testmonth7.cert @$(COPY) testmonth7.key $(PEGASUS_HOME)/testmonth7.key @$(COPY) testmonth8.cert $(PEGASUS_HOME)/testmonth8.cert @$(COPY) testmonth8.key $(PEGASUS_HOME)/testmonth8.key @$(COPY) testmonth9.cert $(PEGASUS_HOME)/testmonth9.cert @$(COPY) testmonth9.key $(PEGASUS_HOME)/testmonth9.key @$(COPY) testmonth10.cert $(PEGASUS_HOME)/testmonth10.cert @$(COPY) testmonth10.key $(PEGASUS_HOME)/testmonth10.key @$(COPY) testmonth11.cert $(PEGASUS_HOME)/testmonth11.cert @$(COPY) testmonth11.key $(PEGASUS_HOME)/testmonth11.key @$(COPY) testmonth12.cert $(PEGASUS_HOME)/testmonth12.cert @$(COPY) testmonth12.key $(PEGASUS_HOME)/testmonth12.key # # Create a self-signed certificate # @$(OPENSSL_COMMAND) genrsa -out $(PEGASUS_HOME)/testdn1.key 1024 @$(OPENSSL_COMMAND) req -config $(OPENSSL_CNF) -new -key $(PEGASUS_HOME)/testdn1.key -out $(PEGASUS_HOME)/testdn1.csr < testdn1.txt @$(OPENSSL_COMMAND) x509 -in $(PEGASUS_HOME)/testdn1.csr -out $(PEGASUS_HOME)/testdn1.cert -req -signkey $(PEGASUS_HOME)/testdn1.key $(SETSERIAL_0) -days 356 @$(RM) $(PEGASUS_HOME)/testdn1.csr # # Create a self-signed CA # @$(OPENSSL_COMMAND) genrsa -out $(PEGASUS_HOME)/testca1.key 1024 @$(OPENSSL_COMMAND) req -new -key $(PEGASUS_HOME)/testca1.key -x509 -config $(OPENSSL_CNF) $(SETSERIAL_0) -days 365 -out $(PEGASUS_HOME)/testca1.cert < testca1.txt # # Create a certificate signed by the CA # @$(OPENSSL_COMMAND) genrsa -out $(PEGASUS_HOME)/testdn2.key 1024 @$(OPENSSL_COMMAND) req -config $(OPENSSL_CNF) -new -key $(PEGASUS_HOME)/testdn2.key -out $(PEGASUS_HOME)/testdn2.csr < testdn2.txt @$(OPENSSL_COMMAND) x509 -req $(SETSERIAL_1) -days 365 -in $(PEGASUS_HOME)/testdn2.csr -CA $(PEGASUS_HOME)/testca1.cert -CAkey $(PEGASUS_HOME)/testca1.key -CAcreateserial -out $(PEGASUS_HOME)/testdn2.cert @$(RM) $(PEGASUS_HOME)/testdn2.csr # # Create a second test certificate signed by the CA # @$(OPENSSL_COMMAND) genrsa -out $(PEGASUS_HOME)/testdn3.key 1024 @$(OPENSSL_COMMAND) req -config $(OPENSSL_CNF) -new -key $(PEGASUS_HOME)/testdn3.key -out $(PEGASUS_HOME)/testdn3.csr < testdn3.txt @$(OPENSSL_COMMAND) x509 -req $(SETSERIAL_2) -days 365 -in $(PEGASUS_HOME)/testdn3.csr -CA $(PEGASUS_HOME)/testca1.cert -CAkey $(PEGASUS_HOME)/testca1.key -CAcreateserial -out $(PEGASUS_HOME)/testdn3.cert @$(RM) $(PEGASUS_HOME)/testdn3.csr # # Create a third test certificate signed by the CA # @$(OPENSSL_COMMAND) genrsa -out $(PEGASUS_HOME)/testdn4.key 1024 @$(OPENSSL_COMMAND) req -config $(OPENSSL_CNF) -new -key $(PEGASUS_HOME)/testdn4.key -out $(PEGASUS_HOME)/testdn4.csr < testdn4.txt @$(OPENSSL_COMMAND) x509 -req $(SETSERIAL_3) -days 365 -in $(PEGASUS_HOME)/testdn4.csr -CA $(PEGASUS_HOME)/testca1.cert -CAkey $(PEGASUS_HOME)/testca1.key -CAcreateserial -out $(PEGASUS_HOME)/testdn4.cert @$(RM) $(PEGASUS_HOME)/testdn4.csr # # Create a self-signed CA2 # @$(OPENSSL_COMMAND) genrsa -out $(PEGASUS_HOME)/testca2.key 1024 @$(OPENSSL_COMMAND) req -new -key $(PEGASUS_HOME)/testca2.key -x509 -config $(OPENSSL_CNF) $(SETSERIAL_0) -days 365 -out $(PEGASUS_HOME)/testca2.cert < testca2.txt # # Create a certificate signed by the CA # @$(OPENSSL_COMMAND) genrsa -out $(PEGASUS_HOME)/testdup.key 1024 @$(OPENSSL_COMMAND) req -config $(OPENSSL_CNF) -new -key $(PEGASUS_HOME)/testdup.key -out $(PEGASUS_HOME)/testdup.csr < testdn1.txt @$(OPENSSL_COMMAND) x509 -req $(SETSERIAL_1) -days 365 -in $(PEGASUS_HOME)/testdup.csr -CA $(PEGASUS_HOME)/testca2.cert -CAkey $(PEGASUS_HOME)/testca2.key -CAcreateserial -out $(PEGASUS_HOME)/testdup.cert @$(RM) $(PEGASUS_HOME)/testdup.csrendifSSLCertificateTest1: test_setupifdef PEGASUS_HAS_SSL @$(RM) $(RESULTFILE) @$(MAKE) -i -s SSLCertificateTest1_ignoreerror @$(STRIPCRS)ifdef PEGASUS_OVERRIDE_SSL_CERT_VERIFICATION_RESULT @$(DIFF) result.master.override resultelse $(COMPARERESULTS)endif @$(ECHO) +++ Test passed +++ @$(RM) $(RESULTFILE)endifSSLCertificateTest1_ignoreerror:ifdef PEGASUS_HAS_SSL @$(ECHO) ++++cimtrust testsifndef PEGASUS_PAM_AUTHENTICATION ifneq ($(OS), zos) cimuser -a -u $(CURRENT_USER) -w $(CURRENT_USER) endifendif @$(ECHO) +++++++++ Command line testing +++++++++ >> $(RESULTFILE) @$(ECHO) "Add the authority certificate to the truststore." >> $(RESULTFILE) @cimtrust -a -Ta -U $(CURRENT_USER) -f $(PEGASUS_HOME)/testchca.cert >> $(RESULTFILE) $(REDIRECTERROR) @$(ECHO) >> $(RESULTFILE) @$(ECHO) "Duplicate list option." >> $(RESULTFILE) @cimtrust -l -l -n 0 >> $(RESULTFILE) $(REDIRECTERROR) @$(ECHO) >> $(RESULTFILE) @$(ECHO) "No command line options specified." >> $(RESULTFILE) @cimtrust >> $(RESULTFILE) $(REDIRECTERROR)
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -