blob: 5fe965b51ff18ab1ad59a1e9f8a45e012491a080 [file] [log] [blame]
Paul Bakkeraccd4eb2013-07-19 13:41:51 +02001#!/bin/bash
2
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +01003# Test interop with OpenSSL and GnuTLS (and self-op while at it).
4#
5# Check each common ciphersuite, with each version, both ways (client/server),
6# with and without client authentication.
Manuel Pégourié-Gonnardeaadc502014-02-20 11:01:30 +01007
Manuel Pégourié-Gonnard913030c2014-03-28 10:12:38 +01008set -u
9
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010010# test if those two are set in the environment before assigning defaults
Manuel Pégourié-Gonnard913030c2014-03-28 10:12:38 +010011if [ -n "${GNUTLS_CLI:-}" -a -n "${GNUTLS_SERV:-}" ]; then
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010012 GNUTLS_AVAILABLE=1
13else
14 GNUTLS_AVAILABLE=0
15fi
16
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010017# initialise counters
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +020018let "tests = 0"
19let "failed = 0"
20let "skipped = 0"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010021let "srvmem = 0"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +020022
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010023# default commands, can be overriden by the environment
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +010024: ${P_SRV:=../programs/ssl/ssl_server2}
25: ${P_CLI:=../programs/ssl/ssl_client2}
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +010026: ${OPENSSL_CMD:=openssl} # OPENSSL would conflict with the build system
27: ${GNUTLS_CLI:=gnutls-cli}
28: ${GNUTLS_SERV:=gnutls-serv}
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +010029
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010030# default values for options
Paul Bakker10cd2252012-04-12 21:26:34 +000031MODES="ssl3 tls1 tls1_1 tls1_2"
Paul Bakker1eeceae2012-11-23 14:25:34 +010032VERIFIES="NO YES"
Manuel Pégourié-Gonnard7ebaf372013-08-27 21:03:33 +020033TYPES="ECDSA RSA PSK"
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020034FILTER=""
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010035EXCLUDE='NULL\|DES-CBC-' # avoid plain DES but keep 3DES-EDE-CBC (PolarSSL), DES-CBC3 (OpenSSL)
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020036VERBOSE=""
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010037MEMCHECK=0
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010038# GnuTLS not enabled by default, 3.2.4 might not be available everywhere
39if [ "$GNUTLS_AVAILABLE" -gt 0 ]; then
40 PEERS="OpenSSL PolarSSL GnuTLS"
41else
42 PEERS="OpenSSL PolarSSL"
43fi
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020044
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010045print_usage() {
46 echo "Usage: $0"
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010047 echo -e " -h|--help\tPrint this help."
48 echo -e " -f|--filter\tOnly matching ciphersuites are tested (Default: '$FILTER')"
49 echo -e " -e|--exclude\tMatching ciphersuites are excluded (Default: '$EXCLUDE')"
50 echo -e " -m|--modes\tWhich modes to perform (Default: '$MODES')"
51 echo -e " -t|--types\tWhich key exchange type to perform (Default: '$TYPES')"
52 echo -e " -V|--verify\tWhich verification modes to perform (Default: '$VERIFIES')"
53 echo -e " -p|--peers\tWhich peers to use (Default: '$PEERS')"
54 echo -e " \tAlso available: GnuTLS (needs v3.2.4 or higher)"
55 echo -e " -M|--memcheck\tCheck memory leaks and errors."
56 echo -e " -v|--verbose\tSet verbose output."
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010057}
58
59get_options() {
60 while [ $# -gt 0 ]; do
61 case "$1" in
62 -f|--filter)
63 shift; FILTER=$1
64 ;;
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010065 -e|--exclude)
66 shift; EXCLUDE=$1
67 ;;
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010068 -m|--modes)
69 shift; MODES=$1
70 ;;
71 -t|--types)
72 shift; TYPES=$1
73 ;;
74 -V|--verify)
75 shift; VERIFIES=$1
76 ;;
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010077 -p|--peers)
78 shift; PEERS=$1
79 ;;
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010080 -v|--verbose)
81 VERBOSE=1
82 ;;
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010083 -M|--memcheck)
84 MEMCHECK=1
85 ;;
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010086 -h|--help)
87 print_usage
88 exit 0
89 ;;
90 *)
91 echo "Unknown argument: '$1'"
92 print_usage
93 exit 1
94 ;;
95 esac
96 shift
97 done
98}
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020099
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100100log() {
Paul Bakkeraccd4eb2013-07-19 13:41:51 +0200101 if [ "X" != "X$VERBOSE" ]; then
102 echo "$@"
103 fi
104}
Paul Bakker10cd2252012-04-12 21:26:34 +0000105
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +0200106filter()
107{
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100108 LIST="$1"
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +0200109 NEW_LIST=""
110
111 for i in $LIST;
112 do
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100113 NEW_LIST="$NEW_LIST $( echo "$i" | grep "$FILTER" | grep -v "$EXCLUDE" )"
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +0200114 done
115
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100116 # normalize whitespace
117 echo "$NEW_LIST" | sed -e 's/[[:space:]]\+/ /g' -e 's/^ //' -e 's/ $//'
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +0200118}
119
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100120filter_ciphersuites()
121{
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100122 if [ "X" != "X$FILTER" -o "X" != "X$EXCLUDE" ];
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100123 then
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100124 P_CIPHERS=$( filter "$P_CIPHERS" )
125 O_CIPHERS=$( filter "$O_CIPHERS" )
126 G_CIPHERS=$( filter "$G_CIPHERS" )
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100127 fi
128}
129
130reset_ciphersuites()
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100131{
132 P_CIPHERS=""
133 O_CIPHERS=""
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100134 G_CIPHERS=""
135}
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100136
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100137add_common_ciphersuites()
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100138{
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100139 case $TYPE in
140
141 "ECDSA")
142 if [ "$MODE" != "ssl3" ];
143 then
144 P_CIPHERS="$P_CIPHERS \
145 TLS-ECDHE-ECDSA-WITH-NULL-SHA \
146 TLS-ECDHE-ECDSA-WITH-RC4-128-SHA \
147 TLS-ECDHE-ECDSA-WITH-3DES-EDE-CBC-SHA \
148 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA \
149 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA \
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100150 "
151 G_CIPHERS="$G_CIPHERS \
152 +ECDHE-ECDSA:+NULL:+SHA1 \
153 +ECDHE-ECDSA:+ARCFOUR-128:+SHA1 \
154 +ECDHE-ECDSA:+3DES-CBC:+SHA1 \
155 +ECDHE-ECDSA:+AES-128-CBC:+SHA1 \
156 +ECDHE-ECDSA:+AES-256-CBC:+SHA1 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100157 "
158 O_CIPHERS="$O_CIPHERS \
159 ECDHE-ECDSA-NULL-SHA \
160 ECDHE-ECDSA-RC4-SHA \
161 ECDHE-ECDSA-DES-CBC3-SHA \
162 ECDHE-ECDSA-AES128-SHA \
163 ECDHE-ECDSA-AES256-SHA \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100164 "
165 fi
166 if [ "$MODE" = "tls1_2" ];
167 then
168 P_CIPHERS="$P_CIPHERS \
169 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256 \
170 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384 \
171 TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
172 TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384 \
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100173 "
174 G_CIPHERS="$G_CIPHERS \
175 +ECDHE-ECDSA:+AES-128-CBC:+SHA256 \
176 +ECDHE-ECDSA:+AES-256-CBC:+SHA384 \
177 +ECDHE-ECDSA:+AES-128-GCM:+AEAD \
178 +ECDHE-ECDSA:+AES-256-GCM:+AEAD \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100179 "
180 O_CIPHERS="$O_CIPHERS \
181 ECDHE-ECDSA-AES128-SHA256 \
182 ECDHE-ECDSA-AES256-SHA384 \
183 ECDHE-ECDSA-AES128-GCM-SHA256 \
184 ECDHE-ECDSA-AES256-GCM-SHA384 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100185 "
186 fi
187 ;;
188
189 "RSA")
190 P_CIPHERS="$P_CIPHERS \
191 TLS-DHE-RSA-WITH-AES-128-CBC-SHA \
192 TLS-DHE-RSA-WITH-AES-256-CBC-SHA \
193 TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA \
194 TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA \
195 TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA \
196 TLS-RSA-WITH-AES-256-CBC-SHA \
197 TLS-RSA-WITH-CAMELLIA-256-CBC-SHA \
198 TLS-RSA-WITH-AES-128-CBC-SHA \
199 TLS-RSA-WITH-CAMELLIA-128-CBC-SHA \
200 TLS-RSA-WITH-3DES-EDE-CBC-SHA \
201 TLS-RSA-WITH-RC4-128-SHA \
202 TLS-RSA-WITH-RC4-128-MD5 \
203 TLS-RSA-WITH-NULL-MD5 \
204 TLS-RSA-WITH-NULL-SHA \
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100205 "
206 G_CIPHERS="$G_CIPHERS \
207 +DHE-RSA:+AES-128-CBC:+SHA1 \
208 +DHE-RSA:+AES-256-CBC:+SHA1 \
209 +DHE-RSA:+CAMELLIA-128-CBC:+SHA1 \
210 +DHE-RSA:+CAMELLIA-256-CBC:+SHA1 \
211 +DHE-RSA:+3DES-CBC:+SHA1 \
212 +RSA:+AES-256-CBC:+SHA1 \
213 +RSA:+CAMELLIA-256-CBC:+SHA1 \
214 +RSA:+AES-128-CBC:+SHA1 \
215 +RSA:+CAMELLIA-128-CBC:+SHA1 \
216 +RSA:+3DES-CBC:+SHA1 \
217 +RSA:+ARCFOUR-128:+SHA1 \
218 +RSA:+ARCFOUR-128:+MD5 \
219 +RSA:+NULL:+MD5 \
220 +RSA:+NULL:+SHA1 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100221 "
222 O_CIPHERS="$O_CIPHERS \
223 DHE-RSA-AES128-SHA \
224 DHE-RSA-AES256-SHA \
225 DHE-RSA-CAMELLIA128-SHA \
226 DHE-RSA-CAMELLIA256-SHA \
227 EDH-RSA-DES-CBC3-SHA \
228 AES256-SHA \
229 CAMELLIA256-SHA \
230 AES128-SHA \
231 CAMELLIA128-SHA \
232 DES-CBC3-SHA \
233 RC4-SHA \
234 RC4-MD5 \
235 NULL-MD5 \
236 NULL-SHA \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100237 "
238 if [ "$MODE" != "ssl3" ];
239 then
240 P_CIPHERS="$P_CIPHERS \
241 TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA \
242 TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA \
243 TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA \
244 TLS-ECDHE-RSA-WITH-RC4-128-SHA \
245 TLS-ECDHE-RSA-WITH-NULL-SHA \
246 "
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100247 G_CIPHERS="$G_CIPHERS \
248 +ECDHE-RSA:+AES-128-CBC:+SHA1 \
249 +ECDHE-RSA:+AES-256-CBC:+SHA1 \
250 +ECDHE-RSA:+3DES-CBC:+SHA1 \
251 +ECDHE-RSA:+ARCFOUR-128:+SHA1 \
252 +ECDHE-RSA:+NULL:+SHA1 \
253 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100254 O_CIPHERS="$O_CIPHERS \
255 ECDHE-RSA-AES256-SHA \
256 ECDHE-RSA-AES128-SHA \
257 ECDHE-RSA-DES-CBC3-SHA \
258 ECDHE-RSA-RC4-SHA \
259 ECDHE-RSA-NULL-SHA \
260 "
261 fi
262 if [ "$MODE" = "tls1_2" ];
263 then
264 P_CIPHERS="$P_CIPHERS \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100265 TLS-RSA-WITH-AES-128-CBC-SHA256 \
266 TLS-DHE-RSA-WITH-AES-128-CBC-SHA256 \
267 TLS-RSA-WITH-AES-256-CBC-SHA256 \
268 TLS-DHE-RSA-WITH-AES-256-CBC-SHA256 \
269 TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256 \
270 TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384 \
271 TLS-RSA-WITH-AES-128-GCM-SHA256 \
272 TLS-RSA-WITH-AES-256-GCM-SHA384 \
273 TLS-DHE-RSA-WITH-AES-128-GCM-SHA256 \
274 TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 \
275 TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256 \
276 TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 \
277 "
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100278 G_CIPHERS="$G_CIPHERS \
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100279 +RSA:+AES-128-CBC:+SHA256 \
280 +DHE-RSA:+AES-128-CBC:+SHA256 \
281 +RSA:+AES-256-CBC:+SHA256 \
282 +DHE-RSA:+AES-256-CBC:+SHA256 \
283 +ECDHE-RSA:+AES-128-CBC:+SHA256 \
284 +ECDHE-RSA:+AES-256-CBC:+SHA384 \
285 +RSA:+AES-128-GCM:+AEAD \
286 +RSA:+AES-256-GCM:+AEAD \
287 +DHE-RSA:+AES-128-GCM:+AEAD \
288 +DHE-RSA:+AES-256-GCM:+AEAD \
289 +ECDHE-RSA:+AES-128-GCM:+AEAD \
290 +ECDHE-RSA:+AES-256-GCM:+AEAD \
291 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100292 O_CIPHERS="$O_CIPHERS \
293 NULL-SHA256 \
294 AES128-SHA256 \
295 DHE-RSA-AES128-SHA256 \
296 AES256-SHA256 \
297 DHE-RSA-AES256-SHA256 \
298 ECDHE-RSA-AES128-SHA256 \
299 ECDHE-RSA-AES256-SHA384 \
300 AES128-GCM-SHA256 \
301 DHE-RSA-AES128-GCM-SHA256 \
302 AES256-GCM-SHA384 \
303 DHE-RSA-AES256-GCM-SHA384 \
304 ECDHE-RSA-AES128-GCM-SHA256 \
305 ECDHE-RSA-AES256-GCM-SHA384 \
306 "
307 fi
308 ;;
309
310 "PSK")
311 P_CIPHERS="$P_CIPHERS \
312 TLS-PSK-WITH-RC4-128-SHA \
313 TLS-PSK-WITH-3DES-EDE-CBC-SHA \
314 TLS-PSK-WITH-AES-128-CBC-SHA \
315 TLS-PSK-WITH-AES-256-CBC-SHA \
316 "
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100317 G_CIPHERS="$G_CIPHERS \
318 +PSK:+ARCFOUR-128:+SHA1 \
319 +PSK:+3DES-CBC:+SHA1 \
320 +PSK:+AES-128-CBC:+SHA1 \
321 +PSK:+AES-256-CBC:+SHA1 \
322 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100323 O_CIPHERS="$O_CIPHERS \
324 PSK-RC4-SHA \
325 PSK-3DES-EDE-CBC-SHA \
326 PSK-AES128-CBC-SHA \
327 PSK-AES256-CBC-SHA \
328 "
329 ;;
330 esac
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100331}
332
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100333add_openssl_ciphersuites()
334{
335 case $TYPE in
336
337 "ECDSA")
338 if [ "$MODE" != "ssl3" ];
339 then
340 P_CIPHERS="$P_CIPHERS \
341 TLS-ECDH-ECDSA-WITH-NULL-SHA \
342 TLS-ECDH-ECDSA-WITH-RC4-128-SHA \
343 TLS-ECDH-ECDSA-WITH-3DES-EDE-CBC-SHA \
344 TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA \
345 TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA \
346 "
347 O_CIPHERS="$O_CIPHERS \
348 ECDH-ECDSA-NULL-SHA \
349 ECDH-ECDSA-RC4-SHA \
350 ECDH-ECDSA-DES-CBC3-SHA \
351 ECDH-ECDSA-AES128-SHA \
352 ECDH-ECDSA-AES256-SHA \
353 "
354 fi
355 if [ "$MODE" = "tls1_2" ];
356 then
357 P_CIPHERS="$P_CIPHERS \
358 TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA256 \
359 TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA384 \
360 TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256 \
361 TLS-ECDH-ECDSA-WITH-AES-256-GCM-SHA384 \
362 "
363 O_CIPHERS="$O_CIPHERS \
364 ECDH-ECDSA-AES128-SHA256 \
365 ECDH-ECDSA-AES256-SHA384 \
366 ECDH-ECDSA-AES128-GCM-SHA256 \
367 ECDH-ECDSA-AES256-GCM-SHA384 \
368 "
369 fi
370 ;;
371
372 "RSA")
373 P_CIPHERS="$P_CIPHERS \
374 TLS-RSA-WITH-DES-CBC-SHA \
375 TLS-DHE-RSA-WITH-DES-CBC-SHA \
376 "
377 O_CIPHERS="$O_CIPHERS \
378 DES-CBC-SHA \
379 EDH-RSA-DES-CBC-SHA \
380 "
381 ;;
382
383 "PSK")
384 ;;
385 esac
386}
387
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100388add_gnutls_ciphersuites()
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100389{
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100390 case $TYPE in
391
392 "ECDSA")
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100393 if [ "$MODE" = "tls1_2" ];
394 then
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100395 P_CIPHERS="$P_CIPHERS \
396 TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-CBC-SHA256 \
397 TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-CBC-SHA384 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100398 TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-GCM-SHA256 \
399 TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-GCM-SHA384 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100400 "
401 G_CIPHERS="$G_CIPHERS \
402 +ECDHE-ECDSA:+CAMELLIA-128-CBC:+SHA256 \
403 +ECDHE-ECDSA:+CAMELLIA-256-CBC:+SHA384 \
404 +ECDHE-ECDSA:+CAMELLIA-128-GCM:+AEAD \
405 +ECDHE-ECDSA:+CAMELLIA-256-GCM:+AEAD \
406 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100407 fi
408 ;;
409
410 "RSA")
Manuel Pégourié-Gonnard7457cb32014-07-13 13:57:24 +0200411 if [ "$MODE" != "ssl3" ];
412 then
413 P_CIPHERS="$P_CIPHERS \
414 TLS-RSA-WITH-NULL-SHA256 \
415 "
416 G_CIPHERS="$G_CIPHERS \
417 +RSA:+NULL:+SHA256 \
418 "
419 fi
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100420 if [ "$MODE" = "tls1_2" ];
421 then
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100422 P_CIPHERS="$P_CIPHERS \
423 TLS-ECDHE-RSA-WITH-CAMELLIA-128-CBC-SHA256 \
424 TLS-ECDHE-RSA-WITH-CAMELLIA-256-CBC-SHA384 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100425 TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256 \
426 TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256 \
427 TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256 \
428 TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256 \
429 TLS-ECDHE-RSA-WITH-CAMELLIA-128-GCM-SHA256 \
430 TLS-ECDHE-RSA-WITH-CAMELLIA-256-GCM-SHA384 \
431 TLS-DHE-RSA-WITH-CAMELLIA-128-GCM-SHA256 \
432 TLS-DHE-RSA-WITH-CAMELLIA-256-GCM-SHA384 \
433 TLS-RSA-WITH-CAMELLIA-128-GCM-SHA256 \
434 TLS-RSA-WITH-CAMELLIA-256-GCM-SHA384 \
435 "
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100436 G_CIPHERS="$G_CIPHERS \
437 +ECDHE-RSA:+CAMELLIA-128-CBC:+SHA256 \
438 +ECDHE-RSA:+CAMELLIA-256-CBC:+SHA384 \
439 +RSA:+CAMELLIA-128-CBC:+SHA256 \
440 +RSA:+CAMELLIA-256-CBC:+SHA256 \
441 +DHE-RSA:+CAMELLIA-128-CBC:+SHA256 \
442 +DHE-RSA:+CAMELLIA-256-CBC:+SHA256 \
443 +ECDHE-RSA:+CAMELLIA-128-GCM:+AEAD \
444 +ECDHE-RSA:+CAMELLIA-256-GCM:+AEAD \
445 +DHE-RSA:+CAMELLIA-128-GCM:+AEAD \
446 +DHE-RSA:+CAMELLIA-256-GCM:+AEAD \
447 +RSA:+CAMELLIA-128-GCM:+AEAD \
448 +RSA:+CAMELLIA-256-GCM:+AEAD \
449 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100450 fi
451 ;;
452
453 "PSK")
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100454 # GnuTLS 3.2.11 (2014-02-13) requires TLS 1.x for most *PSK suites
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100455 if [ "$MODE" != "ssl3" ];
456 then
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100457 P_CIPHERS="$P_CIPHERS \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100458 TLS-ECDHE-PSK-WITH-AES-256-CBC-SHA \
459 TLS-ECDHE-PSK-WITH-AES-128-CBC-SHA \
460 TLS-ECDHE-PSK-WITH-3DES-EDE-CBC-SHA \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100461 TLS-DHE-PSK-WITH-3DES-EDE-CBC-SHA \
462 TLS-DHE-PSK-WITH-AES-128-CBC-SHA \
463 TLS-DHE-PSK-WITH-AES-256-CBC-SHA \
464 TLS-RSA-PSK-WITH-3DES-EDE-CBC-SHA \
465 TLS-RSA-PSK-WITH-AES-256-CBC-SHA \
466 TLS-RSA-PSK-WITH-AES-128-CBC-SHA \
Manuel Pégourié-Gonnard7e0a5182014-07-13 15:01:22 +0200467 TLS-RSA-PSK-WITH-NULL-SHA \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100468 "
469 G_CIPHERS="$G_CIPHERS \
470 +ECDHE-PSK:+AES-256-CBC:+SHA1 \
471 +ECDHE-PSK:+AES-128-CBC:+SHA1 \
472 +ECDHE-PSK:+3DES-CBC:+SHA1 \
473 +DHE-PSK:+3DES-CBC:+SHA1 \
474 +DHE-PSK:+AES-128-CBC:+SHA1 \
475 +DHE-PSK:+AES-256-CBC:+SHA1 \
476 +RSA-PSK:+3DES-CBC:+SHA1 \
477 +RSA-PSK:+AES-256-CBC:+SHA1 \
478 +RSA-PSK:+AES-128-CBC:+SHA1 \
Manuel Pégourié-Gonnard7e0a5182014-07-13 15:01:22 +0200479 +RSA-PSK:+NULL:+SHA1 \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100480 "
481 fi
482 if [ "$MODE" = "tls1_2" ];
483 then
484 P_CIPHERS="$P_CIPHERS \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100485 TLS-ECDHE-PSK-WITH-AES-256-CBC-SHA384 \
486 TLS-ECDHE-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
487 TLS-ECDHE-PSK-WITH-AES-128-CBC-SHA256 \
488 TLS-ECDHE-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
489 TLS-ECDHE-PSK-WITH-NULL-SHA384 \
490 TLS-ECDHE-PSK-WITH-NULL-SHA256 \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100491 TLS-PSK-WITH-AES-128-CBC-SHA256 \
492 TLS-PSK-WITH-AES-256-CBC-SHA384 \
493 TLS-DHE-PSK-WITH-AES-128-CBC-SHA256 \
494 TLS-DHE-PSK-WITH-AES-256-CBC-SHA384 \
495 TLS-PSK-WITH-NULL-SHA256 \
496 TLS-PSK-WITH-NULL-SHA384 \
497 TLS-DHE-PSK-WITH-NULL-SHA256 \
498 TLS-DHE-PSK-WITH-NULL-SHA384 \
499 TLS-RSA-PSK-WITH-AES-256-CBC-SHA384 \
500 TLS-RSA-PSK-WITH-AES-128-CBC-SHA256 \
501 TLS-RSA-PSK-WITH-NULL-SHA256 \
502 TLS-RSA-PSK-WITH-NULL-SHA384 \
503 TLS-DHE-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
504 TLS-DHE-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
505 TLS-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
506 TLS-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
507 TLS-RSA-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
508 TLS-RSA-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100509 TLS-PSK-WITH-AES-128-GCM-SHA256 \
510 TLS-PSK-WITH-AES-256-GCM-SHA384 \
511 TLS-DHE-PSK-WITH-AES-128-GCM-SHA256 \
512 TLS-DHE-PSK-WITH-AES-256-GCM-SHA384 \
513 TLS-RSA-PSK-WITH-CAMELLIA-128-GCM-SHA256 \
514 TLS-RSA-PSK-WITH-CAMELLIA-256-GCM-SHA384 \
515 TLS-PSK-WITH-CAMELLIA-128-GCM-SHA256 \
516 TLS-PSK-WITH-CAMELLIA-256-GCM-SHA384 \
517 TLS-DHE-PSK-WITH-CAMELLIA-128-GCM-SHA256 \
518 TLS-DHE-PSK-WITH-CAMELLIA-256-GCM-SHA384 \
519 TLS-RSA-PSK-WITH-AES-256-GCM-SHA384 \
520 TLS-RSA-PSK-WITH-AES-128-GCM-SHA256 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100521 "
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100522 G_CIPHERS="$G_CIPHERS \
523 +ECDHE-PSK:+AES-256-CBC:+SHA384 \
524 +ECDHE-PSK:+CAMELLIA-256-CBC:+SHA384 \
525 +ECDHE-PSK:+AES-128-CBC:+SHA256 \
526 +ECDHE-PSK:+CAMELLIA-128-CBC:+SHA256 \
527 +PSK:+AES-128-CBC:+SHA256 \
528 +PSK:+AES-256-CBC:+SHA384 \
529 +DHE-PSK:+AES-128-CBC:+SHA256 \
530 +DHE-PSK:+AES-256-CBC:+SHA384 \
531 +RSA-PSK:+AES-256-CBC:+SHA384 \
532 +RSA-PSK:+AES-128-CBC:+SHA256 \
533 +DHE-PSK:+CAMELLIA-128-CBC:+SHA256 \
534 +DHE-PSK:+CAMELLIA-256-CBC:+SHA384 \
535 +PSK:+CAMELLIA-128-CBC:+SHA256 \
536 +PSK:+CAMELLIA-256-CBC:+SHA384 \
537 +RSA-PSK:+CAMELLIA-256-CBC:+SHA384 \
538 +RSA-PSK:+CAMELLIA-128-CBC:+SHA256 \
539 +PSK:+AES-128-GCM:+AEAD \
540 +PSK:+AES-256-GCM:+AEAD \
541 +DHE-PSK:+AES-128-GCM:+AEAD \
542 +DHE-PSK:+AES-256-GCM:+AEAD \
543 +RSA-PSK:+CAMELLIA-128-GCM:+AEAD \
544 +RSA-PSK:+CAMELLIA-256-GCM:+AEAD \
545 +PSK:+CAMELLIA-128-GCM:+AEAD \
546 +PSK:+CAMELLIA-256-GCM:+AEAD \
547 +DHE-PSK:+CAMELLIA-128-GCM:+AEAD \
548 +DHE-PSK:+CAMELLIA-256-GCM:+AEAD \
549 +RSA-PSK:+AES-256-GCM:+AEAD \
550 +RSA-PSK:+AES-128-GCM:+AEAD \
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100551 +ECDHE-PSK:+NULL:+SHA384 \
552 +ECDHE-PSK:+NULL:+SHA256 \
553 +PSK:+NULL:+SHA256 \
554 +PSK:+NULL:+SHA384 \
555 +DHE-PSK:+NULL:+SHA256 \
556 +DHE-PSK:+NULL:+SHA384 \
557 +RSA-PSK:+NULL:+SHA256 \
558 +RSA-PSK:+NULL:+SHA384 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100559 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100560 fi
561 ;;
562 esac
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100563}
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100564
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100565add_polarssl_ciphersuites()
566{
567 case $TYPE in
568
569 "ECDSA")
570 if [ "$MODE" != "ssl3" ];
571 then
572 P_CIPHERS="$P_CIPHERS \
573 TLS-ECDH-ECDSA-WITH-CAMELLIA-128-CBC-SHA256 \
574 TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384 \
575 "
576 fi
577 if [ "$MODE" = "tls1_2" ];
578 then
579 P_CIPHERS="$P_CIPHERS \
580 TLS-ECDH-ECDSA-WITH-CAMELLIA-128-GCM-SHA256 \
581 TLS-ECDH-ECDSA-WITH-CAMELLIA-256-GCM-SHA384 \
Manuel Pégourié-Gonnard25948592014-05-22 14:36:02 +0200582 TLS-ECDHE-ECDSA-WITH-AES-128-CCM \
583 TLS-ECDHE-ECDSA-WITH-AES-256-CCM \
584 TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8 \
585 TLS-ECDHE-ECDSA-WITH-AES-256-CCM-8 \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100586 "
587 fi
588 ;;
589
590 "RSA")
Manuel Pégourié-Gonnard25948592014-05-22 14:36:02 +0200591 if [ "$MODE" = "tls1_2" ];
592 then
593 P_CIPHERS="$P_CIPHERS \
594 TLS-RSA-WITH-AES-128-CCM \
595 TLS-RSA-WITH-AES-256-CCM \
596 TLS-DHE-RSA-WITH-AES-128-CCM \
597 TLS-DHE-RSA-WITH-AES-256-CCM \
598 TLS-RSA-WITH-AES-128-CCM-8 \
599 TLS-RSA-WITH-AES-256-CCM-8 \
600 TLS-DHE-RSA-WITH-AES-128-CCM-8 \
601 TLS-DHE-RSA-WITH-AES-256-CCM-8 \
602 "
603 fi
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100604 ;;
605
606 "PSK")
607 P_CIPHERS="$P_CIPHERS \
608 TLS-PSK-WITH-NULL-SHA \
609 TLS-DHE-PSK-WITH-RC4-128-SHA \
610 TLS-DHE-PSK-WITH-NULL-SHA \
611 TLS-RSA-PSK-WITH-RC4-128-SHA \
612 "
613 if [ "$MODE" != "ssl3" ];
614 then
615 P_CIPHERS="$P_CIPHERS \
616 TLS-ECDHE-PSK-WITH-RC4-128-SHA \
617 TLS-ECDHE-PSK-WITH-NULL-SHA \
618 "
619 fi
Manuel Pégourié-Gonnard25948592014-05-22 14:36:02 +0200620 if [ "$MODE" = "tls1_2" ];
621 then
622 P_CIPHERS="$P_CIPHERS \
623 TLS-PSK-WITH-AES-128-CCM \
624 TLS-PSK-WITH-AES-256-CCM \
625 TLS-DHE-PSK-WITH-AES-128-CCM \
626 TLS-DHE-PSK-WITH-AES-256-CCM \
627 TLS-PSK-WITH-AES-128-CCM-8 \
628 TLS-PSK-WITH-AES-256-CCM-8 \
629 TLS-DHE-PSK-WITH-AES-128-CCM-8 \
630 TLS-DHE-PSK-WITH-AES-256-CCM-8 \
631 "
632 fi
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100633 ;;
634 esac
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100635}
636
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100637setup_arguments()
638{
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100639 case $MODE in
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100640 "ssl3")
641 G_PRIO_MODE="+VERS-SSL3.0"
642 ;;
643 "tls1")
644 G_PRIO_MODE="+VERS-TLS1.0"
645 ;;
646 "tls1_1")
647 G_PRIO_MODE="+VERS-TLS1.1"
648 ;;
649 "tls1_2")
650 G_PRIO_MODE="+VERS-TLS1.2"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100651 ;;
652 *)
653 echo "error: invalid mode: $MODE" >&2
654 exit 1;
655 esac
656
Manuel Pégourié-Gonnard8066b812014-05-28 22:59:30 +0200657 P_SERVER_ARGS="server_port=$PORT server_addr=0.0.0.0 force_version=$MODE"
658 O_SERVER_ARGS="-accept $PORT -www -cipher NULL,ALL -$MODE"
659 G_SERVER_ARGS="-p $PORT --http"
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100660 G_SERVER_PRIO="EXPORT:+NULL:+MD5:+PSK:+DHE-PSK:+ECDHE-PSK:+RSA-PSK:-VERS-TLS-ALL:$G_PRIO_MODE"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100661
Manuel Pégourié-Gonnard8066b812014-05-28 22:59:30 +0200662 P_CLIENT_ARGS="server_port=$PORT force_version=$MODE"
663 O_CLIENT_ARGS="-connect localhost:$PORT -$MODE"
664 G_CLIENT_ARGS="-p $PORT --debug 3"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100665 G_CLIENT_PRIO="NONE:$G_PRIO_MODE:+COMP-NULL:+CURVE-ALL:+SIGN-ALL"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100666
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100667 if [ "X$VERIFY" = "XYES" ];
668 then
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100669 P_SERVER_ARGS="$P_SERVER_ARGS ca_file=data_files/test-ca_cat12.crt auth_mode=required"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100670 O_SERVER_ARGS="$O_SERVER_ARGS -CAfile data_files/test-ca_cat12.crt -Verify 10"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100671 G_SERVER_ARGS="$G_SERVER_ARGS --x509cafile data_files/test-ca_cat12.crt --require-client-cert"
672
673 P_CLIENT_ARGS="$P_CLIENT_ARGS ca_file=data_files/test-ca_cat12.crt auth_mode=required"
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100674 O_CLIENT_ARGS="$O_CLIENT_ARGS -CAfile data_files/test-ca_cat12.crt -verify 10"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100675 G_CLIENT_ARGS="$G_CLIENT_ARGS --x509cafile data_files/test-ca_cat12.crt"
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100676 else
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100677 # don't request a client cert at all
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100678 P_SERVER_ARGS="$P_SERVER_ARGS ca_file=none auth_mode=none"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100679 G_SERVER_ARGS="$G_SERVER_ARGS --disable-client-cert"
680
Manuel Pégourié-Gonnard5de31ec2014-03-19 17:34:52 +0100681 P_CLIENT_ARGS="$P_CLIENT_ARGS ca_file=none auth_mode=none"
682 O_CLIENT_ARGS="$O_CLIENT_ARGS"
683 G_CLIENT_ARGS="$G_CLIENT_ARGS --insecure"
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100684 fi
685
686 case $TYPE in
687 "ECDSA")
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100688 P_SERVER_ARGS="$P_SERVER_ARGS crt_file=data_files/server5.crt key_file=data_files/server5.key"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100689 O_SERVER_ARGS="$O_SERVER_ARGS -cert data_files/server5.crt -key data_files/server5.key"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100690 G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile data_files/server5.crt --x509keyfile data_files/server5.key"
691
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100692 if [ "X$VERIFY" = "XYES" ]; then
693 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=data_files/server6.crt key_file=data_files/server6.key"
694 O_CLIENT_ARGS="$O_CLIENT_ARGS -cert data_files/server6.crt -key data_files/server6.key"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100695 G_CLIENT_ARGS="$G_CLIENT_ARGS --x509certfile data_files/server6.crt --x509keyfile data_files/server6.key"
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100696 else
697 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=none key_file=none"
698 fi
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100699 ;;
700
701 "RSA")
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100702 P_SERVER_ARGS="$P_SERVER_ARGS crt_file=data_files/server2.crt key_file=data_files/server2.key"
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100703 O_SERVER_ARGS="$O_SERVER_ARGS -cert data_files/server2.crt -key data_files/server2.key"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100704 G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile data_files/server2.crt --x509keyfile data_files/server2.key"
705
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100706 if [ "X$VERIFY" = "XYES" ]; then
707 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=data_files/server1.crt key_file=data_files/server1.key"
708 O_CLIENT_ARGS="$O_CLIENT_ARGS -cert data_files/server1.crt -key data_files/server1.key"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100709 G_CLIENT_ARGS="$G_CLIENT_ARGS --x509certfile data_files/server1.crt --x509keyfile data_files/server1.key"
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100710 else
711 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=none key_file=none"
712 fi
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100713 ;;
714
715 "PSK")
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100716 # give RSA-PSK-capable server a RSA cert
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100717 # (should be a separate type, but harder to close with openssl)
718 P_SERVER_ARGS="$P_SERVER_ARGS psk=6162636465666768696a6b6c6d6e6f70 ca_file=none crt_file=data_files/server2.crt key_file=data_files/server2.key"
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100719 O_SERVER_ARGS="$O_SERVER_ARGS -psk 6162636465666768696a6b6c6d6e6f70 -nocert"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100720 G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile data_files/server2.crt --x509keyfile data_files/server2.key --pskpasswd data_files/passwd.psk"
721
722 P_CLIENT_ARGS="$P_CLIENT_ARGS psk=6162636465666768696a6b6c6d6e6f70 crt_file=none key_file=none"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100723 O_CLIENT_ARGS="$O_CLIENT_ARGS -psk 6162636465666768696a6b6c6d6e6f70"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100724 G_CLIENT_ARGS="$G_CLIENT_ARGS --pskusername Client_identity --pskkey=6162636465666768696a6b6c6d6e6f70"
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100725 ;;
726 esac
727}
728
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100729# is_polar <cmd_line>
730is_polar() {
731 echo "$1" | grep 'ssl_server2\|ssl_client2' > /dev/null
732}
733
734# has_mem_err <log_file_name>
735has_mem_err() {
736 if ( grep -F 'All heap blocks were freed -- no leaks are possible' "$1" &&
737 grep -F 'ERROR SUMMARY: 0 errors from 0 contexts' "$1" ) > /dev/null
738 then
739 return 1 # false: does not have errors
740 else
741 return 0 # true: has errors
742 fi
743}
744
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100745# start_server <name>
746# also saves name and command
747start_server() {
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100748 case $1 in
749 [Oo]pen*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100750 SERVER_CMD="$OPENSSL_CMD s_server $O_SERVER_ARGS"
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100751 ;;
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100752 [Gg]nu*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100753 SERVER_CMD="$GNUTLS_SERV $G_SERVER_ARGS --priority $G_SERVER_PRIO"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100754 ;;
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100755 [Pp]olar*)
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100756 SERVER_CMD="$P_SRV $P_SERVER_ARGS"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100757 if [ "$MEMCHECK" -gt 0 ]; then
758 SERVER_CMD="valgrind --leak-check=full $SERVER_CMD"
759 fi
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100760 ;;
761 *)
762 echo "error: invalid server name: $1" >&2
763 exit 1
764 ;;
765 esac
766 SERVER_NAME=$1
767
768 log "$SERVER_CMD"
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200769 echo "$SERVER_CMD" > $SRV_OUT
770 $SERVER_CMD >> $SRV_OUT 2>&1 &
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100771 PROCESS_ID=$!
772
773 sleep 1
774}
775
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100776# terminate the running server (closing it cleanly if it is ours)
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100777stop_server() {
Manuel Pégourié-Gonnardc57e98b2014-02-19 17:37:55 +0100778 case $SERVER_NAME in
779 [Pp]olar*)
Manuel Pégourié-Gonnard32f8f4d2014-05-29 11:31:20 +0200780 # start watchdog in case SERVERQUIT fails
781 ( sleep 20; echo "SERVERQUIT TIMEOUT"; kill $MAIN_PID ) &
782 WATCHDOG_PID=$!
783
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100784 # we must force a PSK suite when in PSK mode (otherwise client
Manuel Pégourié-Gonnard84fd6872014-03-13 18:35:10 +0100785 # auth will fail), so try every entry in $P_CIPHERS in turn (in
786 # case the first one is not implemented in this configuration)
787 for i in $P_CIPHERS; do
Manuel Pégourié-Gonnard5de31ec2014-03-19 17:34:52 +0100788 log "$P_CLI $P_CLIENT_ARGS request_page=SERVERQUIT auth_mode=none force_ciphersuite=$i"
Manuel Pégourié-Gonnard84fd6872014-03-13 18:35:10 +0100789 "$P_CLI" $P_CLIENT_ARGS request_page=SERVERQUIT auth_mode=none \
Manuel Pégourié-Gonnard84fd6872014-03-13 18:35:10 +0100790 force_ciphersuite=$i >/dev/null
791 if [ "$?" == 0 ]; then
792 break
793 fi
794 done
Manuel Pégourié-Gonnard32f8f4d2014-05-29 11:31:20 +0200795
796 wait $PROCESS_ID 2>/dev/null
797 kill $WATCHDOG_PID 2>/dev/null
798 wait $WATCHDOG_PID 2>/dev/null
Manuel Pégourié-Gonnardc57e98b2014-02-19 17:37:55 +0100799 ;;
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100800 *)
801 kill $PROCESS_ID 2>/dev/null
Manuel Pégourié-Gonnard32f8f4d2014-05-29 11:31:20 +0200802 wait $PROCESS_ID 2>/dev/null
Manuel Pégourié-Gonnardc57e98b2014-02-19 17:37:55 +0100803 esac
804
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100805
806 if [ "$MEMCHECK" -gt 0 ]; then
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200807 if is_polar "$SERVER_CMD" && has_mem_err $SRV_OUT; then
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100808 echo " ! Server had memory errors"
809 let "srvmem++"
810 return
811 fi
812 fi
813
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200814 rm -f $SRV_OUT
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100815}
816
Manuel Pégourié-Gonnarda9062e92014-02-25 16:21:22 +0100817# kill the running server (used when killed by signal)
818cleanup() {
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200819 rm -f $SRV_OUT $CLI_OUT
Manuel Pégourié-Gonnarda9062e92014-02-25 16:21:22 +0100820 kill $PROCESS_ID
821 exit 1
822}
823
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100824# run_client <name> <cipher>
825run_client() {
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100826 # announce what we're going to do
827 let "tests++"
828 VERIF=$(echo $VERIFY | tr '[:upper:]' '[:lower:]')
Manuel Pégourié-Gonnarde01af4c2014-03-25 14:16:44 +0100829 TITLE="${1:0:1}->${SERVER_NAME:0:1} $MODE,$VERIF $2"
830 echo -n "$TITLE "
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100831 LEN=`echo "$TITLE" | wc -c`
832 LEN=`echo 72 - $LEN | bc`
833 for i in `seq 1 $LEN`; do echo -n '.'; done; echo -n ' '
834
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100835 # run the command and interpret result
836 case $1 in
837 [Oo]pen*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100838 CLIENT_CMD="$OPENSSL_CMD s_client $O_CLIENT_ARGS -cipher $2"
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100839 log "$CLIENT_CMD"
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200840 echo "$CLIENT_CMD" > $CLI_OUT
841 ( echo -e 'GET HTTP/1.0'; echo; ) | $CLIENT_CMD >> $CLI_OUT 2>&1
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100842 EXIT=$?
843
844 if [ "$EXIT" == "0" ]; then
845 RESULT=0
846 else
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200847 if grep 'Cipher is (NONE)' $CLI_OUT >/dev/null; then
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100848 RESULT=1
849 else
850 RESULT=2
851 fi
852 fi
853 ;;
854
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100855 [Gg]nu*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100856 CLIENT_CMD="$GNUTLS_CLI $G_CLIENT_ARGS --priority $G_PRIO_MODE:$2 localhost"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100857 log "$CLIENT_CMD"
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200858 echo "$CLIENT_CMD" > $CLI_OUT
859 ( echo -e 'GET HTTP/1.0'; echo; ) | $CLIENT_CMD >> $CLI_OUT 2>&1
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100860 EXIT=$?
861
862 if [ "$EXIT" == "0" ]; then
863 RESULT=0
864 else
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100865 RESULT=2
866 # interpret early failure, with a handshake_failure alert
867 # before the server hello, as "no ciphersuite in common"
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200868 if grep -F 'Received alert [40]: Handshake failed' $CLI_OUT; then
869 if grep -i 'SERVER HELLO .* was received' $CLI_OUT; then :
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100870 else
871 RESULT=1
872 fi
873 fi >/dev/null
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100874 fi
875 ;;
876
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100877 [Pp]olar*)
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100878 CLIENT_CMD="$P_CLI $P_CLIENT_ARGS force_ciphersuite=$2"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100879 if [ "$MEMCHECK" -gt 0 ]; then
880 CLIENT_CMD="valgrind --leak-check=full $CLIENT_CMD"
881 fi
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100882 log "$CLIENT_CMD"
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200883 echo "$CLIENT_CMD" > $CLI_OUT
884 $CLIENT_CMD >> $CLI_OUT 2>&1
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100885 EXIT=$?
886
887 case $EXIT in
888 "0") RESULT=0 ;;
889 "2") RESULT=1 ;;
890 *) RESULT=2 ;;
891 esac
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100892
893 if [ "$MEMCHECK" -gt 0 ]; then
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200894 if is_polar "$CLIENT_CMD" && has_mem_err $CLI_OUT; then
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100895 RESULT=2
896 fi
897 fi
898
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100899 ;;
900
901 *)
902 echo "error: invalid client name: $1" >&2
903 exit 1
904 ;;
905 esac
906
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200907 echo "EXIT: $EXIT" >> $CLI_OUT
Manuel Pégourié-Gonnarde01af4c2014-03-25 14:16:44 +0100908
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100909 # report and count result
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100910 case $RESULT in
911 "0")
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100912 echo PASS
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100913 ;;
914 "1")
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100915 echo SKIP
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100916 let "skipped++"
917 ;;
918 "2")
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100919 echo FAIL
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200920 cp $SRV_OUT c-srv-${tests}.log
921 cp $CLI_OUT c-cli-${tests}.log
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100922 echo " ! outputs saved to c-srv-${tests}.log, c-cli-${tests}.log"
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100923 let "failed++"
924 ;;
925 esac
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100926
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200927 rm -f $CLI_OUT
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100928}
929
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +0100930#
931# MAIN
932#
933
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100934get_options "$@"
935
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100936# sanity checks, avoid an avalanche of errors
937if [ ! -x "$P_SRV" ]; then
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100938 echo "Command '$P_SRV' is not an executable file" >&2
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100939 exit 1
940fi
941if [ ! -x "$P_CLI" ]; then
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100942 echo "Command '$P_CLI' is not an executable file" >&2
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100943 exit 1
944fi
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100945
946if echo "$PEERS" | grep -i openssl > /dev/null; then
947 if which "$OPENSSL_CMD" >/dev/null 2>&1; then :; else
948 echo "Command '$OPENSSL_CMD' not found" >&2
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100949 exit 1
950 fi
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100951fi
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100952
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100953if echo "$PEERS" | grep -i gnutls > /dev/null; then
954 for CMD in "$GNUTLS_CLI" "$GNUTLS_SERV"; do
955 if which "$CMD" >/dev/null 2>&1; then :; else
956 echo "Command '$CMD' not found" >&2
957 exit 1
958 fi
959 done
960fi
961
962for PEER in $PEERS; do
963 case "$PEER" in
964 [Pp]olar*|[Oo]pen*|[Gg]nu*)
965 ;;
966 *)
967 echo "Unknown peers: $PEER" >&2
968 exit 1
969 esac
970done
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +0100971
Manuel Pégourié-Gonnard32f8f4d2014-05-29 11:31:20 +0200972# used by watchdog
973MAIN_PID="$$"
974
Manuel Pégourié-Gonnard8066b812014-05-28 22:59:30 +0200975# Pick a "unique" port in the range 10000-19999.
976PORT="0000$$"
Manuel Pégourié-Gonnardfab2a3c2014-06-16 16:54:36 +0200977PORT="1$(echo $PORT | tail -c 5)"
Manuel Pégourié-Gonnard8066b812014-05-28 22:59:30 +0200978
Manuel Pégourié-Gonnardbc3b16c2014-05-28 23:06:50 +0200979# Also pick a unique name for intermediate files
980SRV_OUT="srv_out.$$"
981CLI_OUT="cli_out.$$"
982
Manuel Pégourié-Gonnarda9062e92014-02-25 16:21:22 +0100983trap cleanup INT TERM HUP
984
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100985for VERIFY in $VERIFIES; do
986 for MODE in $MODES; do
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100987 for TYPE in $TYPES; do
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100988 for PEER in $PEERS; do
Paul Bakker7e5e7ca2013-04-17 19:27:58 +0200989
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100990 setup_arguments
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100991
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100992 case "$PEER" in
Manuel Pégourié-Gonnardd3313192013-09-13 19:20:37 +0200993
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100994 [Oo]pen*)
Paul Bakker398cb512012-04-10 08:22:31 +0000995
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100996 reset_ciphersuites
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100997 add_common_ciphersuites
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100998 add_openssl_ciphersuites
999 filter_ciphersuites
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +01001000
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001001 if [ "X" != "X$P_CIPHERS" ]; then
1002 start_server "OpenSSL"
1003 for i in $P_CIPHERS; do
1004 run_client PolarSSL $i
1005 done
1006 stop_server
1007 fi
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +01001008
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001009 if [ "X" != "X$O_CIPHERS" ]; then
1010 start_server "PolarSSL"
1011 for i in $O_CIPHERS; do
1012 run_client OpenSSL $i
1013 done
1014 stop_server
1015 fi
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +01001016
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001017 ;;
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +01001018
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001019 [Gg]nu*)
Paul Bakkerfab5c822012-02-06 16:45:10 +00001020
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001021 reset_ciphersuites
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +01001022 add_common_ciphersuites
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001023 add_gnutls_ciphersuites
1024 filter_ciphersuites
Paul Bakkerfab5c822012-02-06 16:45:10 +00001025
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001026 if [ "X" != "X$P_CIPHERS" ]; then
1027 start_server "GnuTLS"
1028 for i in $P_CIPHERS; do
1029 run_client PolarSSL $i
1030 done
1031 stop_server
1032 fi
1033
1034 if [ "X" != "X$G_CIPHERS" ]; then
1035 start_server "PolarSSL"
1036 for i in $G_CIPHERS; do
1037 run_client GnuTLS $i
1038 done
1039 stop_server
1040 fi
1041
1042 ;;
1043
1044 [Pp]olar*)
1045
1046 reset_ciphersuites
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +01001047 add_common_ciphersuites
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001048 add_openssl_ciphersuites
1049 add_gnutls_ciphersuites
1050 add_polarssl_ciphersuites
1051 filter_ciphersuites
1052
1053 if [ "X" != "X$P_CIPHERS" ]; then
1054 start_server "PolarSSL"
1055 for i in $P_CIPHERS; do
1056 run_client PolarSSL $i
1057 done
1058 stop_server
1059 fi
1060
1061 ;;
1062
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +01001063 *)
Paul Bakker1ebc0c52014-05-22 15:47:58 +02001064 echo "Unknown peer: $PEER" >&2
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +01001065 exit 1
1066 ;;
1067
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001068 esac
1069
1070 done
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +01001071 done
1072 done
Manuel Pégourié-Gonnard9791a402013-08-27 19:57:15 +02001073done
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001074
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +01001075echo "------------------------------------------------------------------------"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001076
Manuel Pégourié-Gonnard563ad022014-04-08 11:56:35 +02001077if (( failed != 0 || srvmem != 0 ));
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001078then
1079 echo -n "FAILED"
1080else
1081 echo -n "PASSED"
1082fi
1083
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +01001084if [ "$MEMCHECK" -gt 0 ]; then
1085 MEMREPORT=", $srvmem server memory errors"
1086else
1087 MEMREPORT=""
1088fi
1089
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001090let "passed = tests - failed"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +01001091echo " ($passed / $tests tests ($skipped skipped$MEMREPORT))"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001092
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +01001093let "failed += srvmem"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001094exit $failed