|
@@ -1,427 +0,0 @@
|
1
|
|
-diff --git a/CREDITS b/CREDITS
|
2
|
|
-index de17d9e..38e2108 100644
|
3
|
|
---- a/CREDITS
|
4
|
|
-+++ b/CREDITS
|
5
|
|
-@@ -1,5 +1,6 @@
|
6
|
|
- Jonathan Bennett
|
7
|
|
- - Contributed OpenWRT support - see the extras/openwrt/ directory.
|
8
|
|
-+ - Suggested the addition of the --key-gen option to fwknopd.
|
9
|
|
-
|
10
|
|
- Sebastien Jeanquier
|
11
|
|
- - Assisted with getting fwknop included in BackTrack Linux - the choice
|
12
|
|
-diff --git a/ChangeLog b/ChangeLog
|
13
|
|
-index 21a5093..4daf008 100644
|
14
|
|
---- a/ChangeLog
|
15
|
|
-+++ b/ChangeLog
|
16
|
|
-@@ -1,3 +1,8 @@
|
17
|
|
-+fwknop-2.6.7 (05//2015):
|
18
|
|
-+ - Added --key-gen to fwknopd. This feature was suggested by Jonathan
|
19
|
|
-+ Bennett, and will help with ease of use efforts. The first platform to
|
20
|
|
-+ take advantage of this will likely be OpenWRT thanks to Jonathan.
|
21
|
|
-+
|
22
|
|
- fwknop-2.6.6 (04/23/2015):
|
23
|
|
- - [server] Add the ability for fwknopd to function as an generic SPA
|
24
|
|
- gateway. This allows scenarios such as the fwknopd system providing DHCP
|
25
|
|
-diff --git a/client/config_init.c b/client/config_init.c
|
26
|
|
-index cdb233d..f0ae135 100644
|
27
|
|
---- a/client/config_init.c
|
28
|
|
-+++ b/client/config_init.c
|
29
|
|
-@@ -199,7 +199,7 @@ static int critical_var_array[] =
|
30
|
|
- };
|
31
|
|
-
|
32
|
|
- /**
|
33
|
|
-- * @brief Generate Rijndael + HMAC keys from /dev/random (base64 encoded) and exit.
|
34
|
|
-+ * @brief Generate Rijndael + HMAC keys from /dev/urandom (base64 encoded).
|
35
|
|
- *
|
36
|
|
- * @param options FKO command line option structure
|
37
|
|
- */
|
38
|
|
-diff --git a/client/fwknop_common.h b/client/fwknop_common.h
|
39
|
|
-index aef20c4..c57db02 100644
|
40
|
|
---- a/client/fwknop_common.h
|
41
|
|
-+++ b/client/fwknop_common.h
|
42
|
|
-@@ -69,8 +69,6 @@
|
43
|
|
- #define MAX_HOSTNAME_LEN 70
|
44
|
|
- #define MAX_URL_HOST_LEN 256
|
45
|
|
- #define MAX_URL_PATH_LEN 1024
|
46
|
|
--#define MAX_KEY_LEN 128
|
47
|
|
--#define MAX_B64_KEY_LEN 180
|
48
|
|
-
|
49
|
|
- /* fwknop client configuration parameters and values
|
50
|
|
- */
|
51
|
|
-@@ -156,10 +154,10 @@ typedef struct fko_cli_options
|
52
|
|
- unsigned char use_gpg;
|
53
|
|
- unsigned char use_gpg_agent;
|
54
|
|
- unsigned char gpg_no_signing_pw;
|
55
|
|
-+ unsigned char key_gen;
|
56
|
|
- int time_offset_plus;
|
57
|
|
- int time_offset_minus;
|
58
|
|
- int fw_timeout;
|
59
|
|
-- int key_gen;
|
60
|
|
-
|
61
|
|
- char use_rc_stanza[MAX_LINE_LEN];
|
62
|
|
- unsigned char got_named_stanza;
|
63
|
|
-diff --git a/common/common.h b/common/common.h
|
64
|
|
-index b63e7c2..c7b2e57 100644
|
65
|
|
---- a/common/common.h
|
66
|
|
-+++ b/common/common.h
|
67
|
|
-@@ -157,6 +157,9 @@ enum {
|
68
|
|
- #define MAX_GPG_KEY_ID 128
|
69
|
|
- #define MAX_USERNAME_LEN 30
|
70
|
|
-
|
71
|
|
-+#define MAX_KEY_LEN 128
|
72
|
|
-+#define MAX_B64_KEY_LEN 180
|
73
|
|
-+
|
74
|
|
- /* Command line argument / argv handling
|
75
|
|
- */
|
76
|
|
- #define MAX_CMDLINE_ARGS 30 /*!< should be way more than enough */
|
77
|
|
-diff --git a/doc/fwknop.man.asciidoc b/doc/fwknop.man.asciidoc
|
78
|
|
-index 070ac77..efa99a7 100644
|
79
|
|
---- a/doc/fwknop.man.asciidoc
|
80
|
|
-+++ b/doc/fwknop.man.asciidoc
|
81
|
|
-@@ -196,6 +196,11 @@ GENERAL OPTIONS
|
82
|
|
- keys are generally more secure than passphrases that are typed in from the
|
83
|
|
- command line.
|
84
|
|
-
|
85
|
|
-+*--key-gen-file*='<file>'::
|
86
|
|
-+ Write generated keys to the specified file. Note that the file is
|
87
|
|
-+ overwritten if it already exists. If this option is not given, then
|
88
|
|
-+ *--key-gen* writes the keys to stdout.
|
89
|
|
-+
|
90
|
|
- *--key-len*='<length>'::
|
91
|
|
- Specify the number of bytes for a generated Rijndael key. The maximum size
|
92
|
|
- is currently 128 bytes.
|
93
|
|
-diff --git a/server/cmd_opts.h b/server/cmd_opts.h
|
94
|
|
-index bc1eee1..d7a645c 100644
|
95
|
|
---- a/server/cmd_opts.h
|
96
|
|
-+++ b/server/cmd_opts.h
|
97
|
|
-@@ -141,6 +141,10 @@ enum {
|
98
|
|
- FW_LIST = 0x200,
|
99
|
|
- FW_LIST_ALL,
|
100
|
|
- FW_FLUSH,
|
101
|
|
-+ KEY_GEN_FILE,
|
102
|
|
-+ KEY_LEN,
|
103
|
|
-+ HMAC_KEY_LEN,
|
104
|
|
-+ HMAC_DIGEST_TYPE,
|
105
|
|
- AFL_PKT_FILE,
|
106
|
|
- GPG_HOME_DIR,
|
107
|
|
- GPG_EXE_PATH,
|
108
|
|
-@@ -178,7 +182,12 @@ static struct option cmd_opts[] =
|
109
|
|
- {"fault-injection-tag", 1, NULL, FAULT_INJECTION_TAG},
|
110
|
|
- {"help", 0, NULL, 'h'},
|
111
|
|
- {"interface", 1, NULL, 'i'},
|
112
|
|
-- {"kill", 0, NULL, 'K'},
|
113
|
|
-+ {"key-gen", 0, NULL, 'k'},
|
114
|
|
-+ {"key-gen-file", 1, NULL, KEY_GEN_FILE },
|
115
|
|
-+ {"key-len", 1, NULL, KEY_LEN },
|
116
|
|
-+ {"hmac-key-len", 1, NULL, HMAC_KEY_LEN },
|
117
|
|
-+ {"hmac-digest-type", 1, NULL, HMAC_DIGEST_TYPE },
|
118
|
|
-+ {"kill", 0, NULL, 'K' },
|
119
|
|
- {"fw-flush", 0, NULL, FW_FLUSH },
|
120
|
|
- {"fw-list", 0, NULL, FW_LIST },
|
121
|
|
- {"fw-list-all", 0, NULL, FW_LIST_ALL },
|
122
|
|
-diff --git a/server/config_init.c b/server/config_init.c
|
123
|
|
-index 0ddceee..2f1d293 100644
|
124
|
|
---- a/server/config_init.c
|
125
|
|
-+++ b/server/config_init.c
|
126
|
|
-@@ -201,6 +201,69 @@ validate_int_var_ranges(fko_srv_options_t *opts)
|
127
|
|
- return;
|
128
|
|
- }
|
129
|
|
-
|
130
|
|
-+/**
|
131
|
|
-+ * @brief Generate Rijndael + HMAC keys from /dev/urandom (base64 encoded).
|
132
|
|
-+ *
|
133
|
|
-+ * @param options FKO command line option structure
|
134
|
|
-+ */
|
135
|
|
-+static void
|
136
|
|
-+generate_keys(fko_srv_options_t *options)
|
137
|
|
-+{
|
138
|
|
-+ char key_base64[MAX_B64_KEY_LEN+1];
|
139
|
|
-+ char hmac_key_base64[MAX_B64_KEY_LEN+1];
|
140
|
|
-+
|
141
|
|
-+ FILE *key_gen_file_ptr = NULL;
|
142
|
|
-+ int res;
|
143
|
|
-+
|
144
|
|
-+ /* Set defaults and validate for --key-gen mode
|
145
|
|
-+ */
|
146
|
|
-+ if(options->key_len == 0)
|
147
|
|
-+ options->key_len = FKO_DEFAULT_KEY_LEN;
|
148
|
|
-+
|
149
|
|
-+ if(options->hmac_key_len == 0)
|
150
|
|
-+ options->hmac_key_len = FKO_DEFAULT_HMAC_KEY_LEN;
|
151
|
|
-+
|
152
|
|
-+ if(options->hmac_type == 0)
|
153
|
|
-+ options->hmac_type = FKO_DEFAULT_HMAC_MODE;
|
154
|
|
-+
|
155
|
|
-+ /* Zero out the key buffers */
|
156
|
|
-+ memset(key_base64, 0x00, sizeof(key_base64));
|
157
|
|
-+ memset(hmac_key_base64, 0x00, sizeof(hmac_key_base64));
|
158
|
|
-+
|
159
|
|
-+ /* Generate the key through libfko */
|
160
|
|
-+ res = fko_key_gen(key_base64, options->key_len,
|
161
|
|
-+ hmac_key_base64, options->hmac_key_len,
|
162
|
|
-+ options->hmac_type);
|
163
|
|
-+
|
164
|
|
-+ if(res != FKO_SUCCESS)
|
165
|
|
-+ {
|
166
|
|
-+ log_msg(LOG_ERR, "%s: fko_key_gen: Error %i - %s",
|
167
|
|
-+ MY_NAME, res, fko_errstr(res));
|
168
|
|
-+ clean_exit(options, NO_FW_CLEANUP, EXIT_FAILURE);
|
169
|
|
-+ }
|
170
|
|
-+
|
171
|
|
-+ if(options->key_gen_file[0] != '\0')
|
172
|
|
-+ {
|
173
|
|
-+ if ((key_gen_file_ptr = fopen(options->key_gen_file, "w")) == NULL)
|
174
|
|
-+ {
|
175
|
|
-+ log_msg(LOG_ERR, "Unable to create key gen file: %s: %s",
|
176
|
|
-+ options->key_gen_file, strerror(errno));
|
177
|
|
-+ clean_exit(options, NO_FW_CLEANUP, EXIT_FAILURE);
|
178
|
|
-+ }
|
179
|
|
-+ fprintf(key_gen_file_ptr, "KEY_BASE64: %s\nHMAC_KEY_BASE64: %s\n",
|
180
|
|
-+ key_base64, hmac_key_base64);
|
181
|
|
-+ fclose(key_gen_file_ptr);
|
182
|
|
-+ fprintf(stdout, "[+] Wrote Rijndael and HMAC keys to: %s",
|
183
|
|
-+ options->key_gen_file);
|
184
|
|
-+ }
|
185
|
|
-+ else
|
186
|
|
-+ {
|
187
|
|
-+ fprintf(stdout, "KEY_BASE64: %s\nHMAC_KEY_BASE64: %s\n",
|
188
|
|
-+ key_base64, hmac_key_base64);
|
189
|
|
-+ }
|
190
|
|
-+ clean_exit(options, NO_FW_CLEANUP, EXIT_SUCCESS);
|
191
|
|
-+}
|
192
|
|
-+
|
193
|
|
- /* Parse the config file...
|
194
|
|
- */
|
195
|
|
- static void
|
196
|
|
-@@ -427,7 +490,7 @@ validate_options(fko_srv_options_t *opts)
|
197
|
|
- if(opts->config[CONF_ENABLE_DIGEST_PERSISTENCE] == NULL)
|
198
|
|
- set_config_entry(opts, CONF_ENABLE_DIGEST_PERSISTENCE,
|
199
|
|
- DEF_ENABLE_DIGEST_PERSISTENCE);
|
200
|
|
--
|
201
|
|
-+
|
202
|
|
- /* Enable destination rule.
|
203
|
|
- */
|
204
|
|
- if(opts->config[CONF_ENABLE_DESTINATION_RULE] == NULL)
|
205
|
|
-@@ -928,8 +991,9 @@ config_init(fko_srv_options_t *opts, int argc, char **argv)
|
206
|
|
-
|
207
|
|
- /* First, scan the command-line args for -h/--help or an alternate
|
208
|
|
- * configuration file. If we find an alternate config file, use it,
|
209
|
|
-- * otherwise use the default. We also grab any override config files
|
210
|
|
-- * as well.
|
211
|
|
-+ * otherwise use the default. We also grab any override config files
|
212
|
|
-+ * as well. In addition, we handle key generation here since this is
|
213
|
|
-+ * independent of configuration parsing.
|
214
|
|
- */
|
215
|
|
- while ((cmd_arg = getopt_long(argc, argv,
|
216
|
|
- GETOPTS_OPTION_STRING, cmd_opts, &index)) != -1) {
|
217
|
|
-@@ -952,6 +1016,45 @@ config_init(fko_srv_options_t *opts, int argc, char **argv)
|
218
|
|
- if(got_override_config > 0)
|
219
|
|
- break;
|
220
|
|
-
|
221
|
|
-+ case 'k':
|
222
|
|
-+ opts->key_gen = 1;
|
223
|
|
-+ break;
|
224
|
|
-+ case KEY_GEN_FILE:
|
225
|
|
-+ opts->key_gen = 1;
|
226
|
|
-+ strlcpy(opts->key_gen_file, optarg, sizeof(opts->key_gen_file));
|
227
|
|
-+ break;
|
228
|
|
-+ case KEY_LEN: /* used in --key-gen mode only */
|
229
|
|
-+ opts->key_len = strtol_wrapper(optarg, 1,
|
230
|
|
-+ MAX_KEY_LEN, NO_EXIT_UPON_ERR, &is_err);
|
231
|
|
-+ if(is_err != FKO_SUCCESS)
|
232
|
|
-+ {
|
233
|
|
-+ log_msg(LOG_ERR,
|
234
|
|
-+ "Invalid key length '%s', must be in [%d-%d]",
|
235
|
|
-+ optarg, 1, MAX_KEY_LEN);
|
236
|
|
-+ clean_exit(opts, NO_FW_CLEANUP, EXIT_FAILURE);
|
237
|
|
-+ }
|
238
|
|
-+ break;
|
239
|
|
-+ case HMAC_DIGEST_TYPE: /* used in --key-gen mode only */
|
240
|
|
-+ if((opts->hmac_type = hmac_digest_strtoint(optarg)) < 0)
|
241
|
|
-+ {
|
242
|
|
-+ log_msg(LOG_ERR,
|
243
|
|
-+ "* Invalid hmac digest type: %s, use {md5,sha1,sha256,sha384,sha512}",
|
244
|
|
-+ optarg);
|
245
|
|
-+ clean_exit(opts, NO_FW_CLEANUP, EXIT_FAILURE);
|
246
|
|
-+ }
|
247
|
|
-+ break;
|
248
|
|
-+ case HMAC_KEY_LEN: /* used in --key-gen mode only */
|
249
|
|
-+ opts->hmac_key_len = strtol_wrapper(optarg, 1,
|
250
|
|
-+ MAX_KEY_LEN, NO_EXIT_UPON_ERR, &is_err);
|
251
|
|
-+ if(is_err != FKO_SUCCESS)
|
252
|
|
-+ {
|
253
|
|
-+ log_msg(LOG_ERR,
|
254
|
|
-+ "Invalid hmac key length '%s', must be in [%d-%d]",
|
255
|
|
-+ optarg, 1, MAX_KEY_LEN);
|
256
|
|
-+ clean_exit(opts, NO_FW_CLEANUP, EXIT_FAILURE);
|
257
|
|
-+ }
|
258
|
|
-+ break;
|
259
|
|
-+
|
260
|
|
- /* Look for override configuration file arg.
|
261
|
|
- */
|
262
|
|
- case 'O':
|
263
|
|
-@@ -965,6 +1068,9 @@ config_init(fko_srv_options_t *opts, int argc, char **argv)
|
264
|
|
- }
|
265
|
|
- }
|
266
|
|
-
|
267
|
|
-+ if(opts->key_gen)
|
268
|
|
-+ generate_keys(opts);
|
269
|
|
-+
|
270
|
|
- /* If no alternate configuration file was specified, we use the
|
271
|
|
- * default.
|
272
|
|
- */
|
273
|
|
-diff --git a/server/fwknopd_common.h b/server/fwknopd_common.h
|
274
|
|
-index ecf2a81..8c33eaa 100644
|
275
|
|
---- a/server/fwknopd_common.h
|
276
|
|
-+++ b/server/fwknopd_common.h
|
277
|
|
-@@ -585,10 +585,14 @@ typedef struct fko_srv_options
|
278
|
|
- unsigned char fw_list; /* List current firewall rules */
|
279
|
|
- unsigned char fw_list_all; /* List all current firewall rules */
|
280
|
|
- unsigned char fw_flush; /* Flush current firewall rules */
|
281
|
|
-+ unsigned char key_gen; /* Generate keys and exit */
|
282
|
|
-+ unsigned char exit_after_parse_config; /* Parse config and exit */
|
283
|
|
-+
|
284
|
|
-+ /* Operational flags
|
285
|
|
-+ */
|
286
|
|
- unsigned char test; /* Test mode flag */
|
287
|
|
- unsigned char afl_fuzzing; /* SPA pkts from stdin for AFL fuzzing */
|
288
|
|
- unsigned char verbose; /* Verbose mode flag */
|
289
|
|
-- unsigned char exit_after_parse_config; /* Parse config and exit */
|
290
|
|
- unsigned char enable_udp_server; /* Enable UDP server mode */
|
291
|
|
-
|
292
|
|
- unsigned char firewd_disable_check_support; /* Don't use firewall-cmd ... -C */
|
293
|
|
-@@ -605,6 +609,13 @@ typedef struct fko_srv_options
|
294
|
|
- int tcp_server_pid;
|
295
|
|
- int lock_fd;
|
296
|
|
-
|
297
|
|
-+ /* Values used in --key-gen mode only
|
298
|
|
-+ */
|
299
|
|
-+ char key_gen_file[MAX_PATH_LEN];
|
300
|
|
-+ int key_len;
|
301
|
|
-+ int hmac_key_len;
|
302
|
|
-+ int hmac_type;
|
303
|
|
-+
|
304
|
|
- #if USE_FILE_CACHE
|
305
|
|
- struct digest_cache_list *digest_cache; /* In-memory digest cache list */
|
306
|
|
- #endif
|
307
|
|
-diff --git a/test/tests/basic_operations.pl b/test/tests/basic_operations.pl
|
308
|
|
-index f4dde2e..76a509d 100644
|
309
|
|
---- a/test/tests/basic_operations.pl
|
310
|
|
-+++ b/test/tests/basic_operations.pl
|
311
|
|
-@@ -390,6 +390,14 @@
|
312
|
|
- 'exec_err' => $YES,
|
313
|
|
- 'cmdline' => "$default_client_args --key-gen -K " . 'A'x1030
|
314
|
|
- },
|
315
|
|
-+ {
|
316
|
|
-+ 'category' => 'basic operations',
|
317
|
|
-+ 'subcategory' => 'server',
|
318
|
|
-+ 'detail' => '--key-gen file path (-K) too long',
|
319
|
|
-+ 'function' => \&generic_exec,
|
320
|
|
-+ 'exec_err' => $YES,
|
321
|
|
-+ 'cmdline' => "$fwknopdCmd --key-gen --key-gen-file " . 'A'x1030
|
322
|
|
-+ },
|
323
|
|
-
|
324
|
|
- {
|
325
|
|
- 'category' => 'basic operations',
|
326
|
|
-diff --git a/test/tests/rijndael.pl b/test/tests/rijndael.pl
|
327
|
|
-index 26aab6a..34af65e 100644
|
328
|
|
---- a/test/tests/rijndael.pl
|
329
|
|
-+++ b/test/tests/rijndael.pl
|
330
|
|
-@@ -421,33 +421,6 @@
|
331
|
|
- 'key_file' => $cf{'rc_named_key'},
|
332
|
|
- },
|
333
|
|
-
|
334
|
|
-- ### --key-gen tests
|
335
|
|
-- {
|
336
|
|
-- 'category' => 'Rijndael',
|
337
|
|
-- 'subcategory' => 'client',
|
338
|
|
-- 'detail' => '--key-gen',
|
339
|
|
-- 'function' => \&generic_exec,
|
340
|
|
-- 'cmdline' => "$fwknopCmd --key-gen",
|
341
|
|
-- 'positive_output_matches' => [qr/^KEY_BASE64\:?\s\S{10}/,
|
342
|
|
-- qw/HMAC_KEY_BASE64\:?\s\S{10}/],
|
343
|
|
-- },
|
344
|
|
-- {
|
345
|
|
-- 'category' => 'Rijndael',
|
346
|
|
-- 'subcategory' => 'client',
|
347
|
|
-- 'detail' => "--key-gen $uniq_keys key uniqueness",
|
348
|
|
-- 'function' => \&key_gen_uniqueness,
|
349
|
|
-- 'cmdline' => "$fwknopCmd --key-gen", ### no valgrind string (too slow for 100 client exec's)
|
350
|
|
-- 'disable_valgrind' => $YES,
|
351
|
|
-- },
|
352
|
|
-- {
|
353
|
|
-- 'category' => 'Rijndael',
|
354
|
|
-- 'subcategory' => 'client',
|
355
|
|
-- 'detail' => '--key-gen to file',
|
356
|
|
-- 'function' => \&generic_exec,
|
357
|
|
-- 'cmdline' => "$fwknopCmd --key-gen --key-gen-file $key_gen_file",
|
358
|
|
-- 'positive_output_matches' => [qr/Wrote.*\skeys/],
|
359
|
|
-- },
|
360
|
|
--
|
361
|
|
- ### rc file tests
|
362
|
|
- {
|
363
|
|
- 'category' => 'Rijndael',
|
364
|
|
-diff --git a/test/tests/rijndael_hmac.pl b/test/tests/rijndael_hmac.pl
|
365
|
|
-index fc1a8af..fd80f04 100644
|
366
|
|
---- a/test/tests/rijndael_hmac.pl
|
367
|
|
-+++ b/test/tests/rijndael_hmac.pl
|
368
|
|
-@@ -58,6 +58,59 @@
|
369
|
|
- 'exec_err' => $YES,
|
370
|
|
- },
|
371
|
|
-
|
372
|
|
-+ ### --key-gen tests
|
373
|
|
-+ {
|
374
|
|
-+ 'category' => 'Rijndael+HMAC',
|
375
|
|
-+ 'subcategory' => 'client',
|
376
|
|
-+ 'detail' => '--key-gen',
|
377
|
|
-+ 'function' => \&generic_exec,
|
378
|
|
-+ 'cmdline' => "$fwknopCmd --key-gen",
|
379
|
|
-+ 'positive_output_matches' => [qr/^KEY_BASE64\:?\s\S{10}/,
|
380
|
|
-+ qw/HMAC_KEY_BASE64\:?\s\S{10}/],
|
381
|
|
-+ },
|
382
|
|
-+ {
|
383
|
|
-+ 'category' => 'Rijndael+HMAC',
|
384
|
|
-+ 'subcategory' => 'server',
|
385
|
|
-+ 'detail' => '--key-gen',
|
386
|
|
-+ 'function' => \&generic_exec,
|
387
|
|
-+ 'cmdline' => "$fwknopdCmd --key-gen",
|
388
|
|
-+ 'positive_output_matches' => [qr/^KEY_BASE64\:?\s\S{10}/,
|
389
|
|
-+ qw/HMAC_KEY_BASE64\:?\s\S{10}/],
|
390
|
|
-+ },
|
391
|
|
-+ {
|
392
|
|
-+ 'category' => 'Rijndael+HMAC',
|
393
|
|
-+ 'subcategory' => 'client',
|
394
|
|
-+ 'detail' => "--key-gen $uniq_keys key uniqueness",
|
395
|
|
-+ 'function' => \&key_gen_uniqueness,
|
396
|
|
-+ 'cmdline' => "$fwknopCmd --key-gen", ### no valgrind string (too slow for 100 exec's)
|
397
|
|
-+ 'disable_valgrind' => $YES,
|
398
|
|
-+ },
|
399
|
|
-+ {
|
400
|
|
-+ 'category' => 'Rijndael+HMAC',
|
401
|
|
-+ 'subcategory' => 'server',
|
402
|
|
-+ 'detail' => "--key-gen $uniq_keys key uniqueness",
|
403
|
|
-+ 'function' => \&key_gen_uniqueness,
|
404
|
|
-+ 'cmdline' => "$fwknopdCmd --key-gen", ### no valgrind string (too slow for 100 exec's)
|
405
|
|
-+ 'disable_valgrind' => $YES,
|
406
|
|
-+ },
|
407
|
|
-+ {
|
408
|
|
-+ 'category' => 'Rijndael+HMAC',
|
409
|
|
-+ 'subcategory' => 'client',
|
410
|
|
-+ 'detail' => '--key-gen to file',
|
411
|
|
-+ 'function' => \&generic_exec,
|
412
|
|
-+ 'cmdline' => "$fwknopCmd --key-gen --key-gen-file $key_gen_file",
|
413
|
|
-+ 'positive_output_matches' => [qr/Wrote.*\skeys/],
|
414
|
|
-+ },
|
415
|
|
-+ {
|
416
|
|
-+ 'category' => 'Rijndael+HMAC',
|
417
|
|
-+ 'subcategory' => 'server',
|
418
|
|
-+ 'detail' => '--key-gen to file',
|
419
|
|
-+ 'function' => \&generic_exec,
|
420
|
|
-+ 'cmdline' => "$fwknopdCmd --key-gen --key-gen-file $key_gen_file",
|
421
|
|
-+ 'positive_output_matches' => [qr/Wrote.*\skeys/],
|
422
|
|
-+ },
|
423
|
|
-+
|
424
|
|
-+ ### complete cycle tests
|
425
|
|
- {
|
426
|
|
- 'category' => 'Rijndael+HMAC',
|
427
|
|
- 'subcategory' => 'client+server',
|