Remove building with NOCRYPTO option
[minix.git] / crypto / external / bsd / heimdal / dist / tests / kdc / check-referral.in
blob75790780c6e7674ae6bfdb77d8294aa551616f1b
1 #!/bin/sh
3 # Copyright (c) 2006 - 2007 Kungliga Tekniska Högskolan
4 # (Royal Institute of Technology, Stockholm, Sweden).
5 # All rights reserved.
7 # Redistribution and use in source and binary forms, with or without
8 # modification, are permitted provided that the following conditions
9 # are met:
11 # 1. Redistributions of source code must retain the above copyright
12 # notice, this list of conditions and the following disclaimer.
14 # 2. Redistributions in binary form must reproduce the above copyright
15 # notice, this list of conditions and the following disclaimer in the
16 # documentation and/or other materials provided with the distribution.
18 # 3. Neither the name of the Institute nor the names of its contributors
19 # may be used to endorse or promote products derived from this software
20 # without specific prior written permission.
22 # THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
23 # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 # ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
26 # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 # OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 # SUCH DAMAGE.
34 top_builddir="@top_builddir@"
35 env_setup="@env_setup@"
36 objdir="@objdir@"
38 . ${env_setup}
40 testfailed="echo test failed; cat messages.log; exit 1"
42 # If there is no useful db support compile in, disable test
43 ${have_db} || exit 77
45 R=TEST.H5L.SE
46 R2=SUB.TEST.H5L.SE
48 service=ldap/host.sub.test.h5l.se
50 port=@port@
52 kadmin="${kadmin} -l -r $R"
53 kdc="${kdc} --addresses=localhost -P $port"
55 cache="FILE:${objdir}/cache.krb5"
57 kinit="${kinit} -c $cache ${afs_no_afslog}"
58 klist="${klist} -c $cache"
59 kgetcred="${kgetcred} -c $cache"
60 kdestroy="${kdestroy} -c $cache ${afs_no_unlog}"
63 KRB5_CONFIG="${objdir}/krb5.conf"
64 export KRB5_CONFIG
66 rm -f current-db*
67 rm -f out-*
68 rm -f mkey.file*
70 > messages.log
72 echo Creating database
73 ${kadmin} \
74 init \
75 --realm-max-ticket-life=1day \
76 --realm-max-renewable-life=1month \
77 ${R} || exit 1
79 ${kadmin} \
80 init \
81 --realm-max-ticket-life=1day \
82 --realm-max-renewable-life=1month \
83 ${R2} || exit 1
85 ${kadmin} add -p foo --use-defaults foo@${R} || exit 1
86 ${kadmin} modify --alias=alias1 --alias=alias2 foo@${R} || exit 1
87 ${kadmin} get foo@${R} | grep alias1@${R} >/dev/null || exit 1
89 ${kadmin} add -p foo --use-defaults ${service}@${R2} || exit 1
91 ${kadmin} add -p foo --use-defaults bar@${R} || exit 1
92 ${kadmin} add -p foo --use-defaults 'baz\@realm.foo@'${R} || exit 1
94 ${kadmin} add -p cross1 --use-defaults krbtgt/${R2}@${R} || exit 1
95 ${kadmin} add -p cross2 --use-defaults krbtgt/${R}@${R2} || exit 1
97 echo "Doing database check"
98 ${kadmin} check ${R} || exit 1
99 ${kadmin} check ${R2} || exit 1
101 echo foo > ${objdir}/foopassword
103 echo Starting kdc
104 ${kdc} &
105 kdcpid=$!
107 sh ${wait_kdc}
108 if [ "$?" != 0 ] ; then
109 kill -9 ${kdcpid}
110 exit 1
113 trap "kill -9 ${kdcpid}; echo signal killing kdc; exit 1;" EXIT
115 ec=0
118 echo "Getting client bar"; > messages.log
119 ${kinit} --password-file=${objdir}/foopassword bar@${R} || \
120 { ec=1 ; eval "${testfailed}"; }
121 echo "checking that we got back right principal"
122 ${klist} | grep "Principal: bar@${R}" > /dev/null || \
123 { ec=1 ; eval "${testfailed}"; }
124 ${kdestroy}
126 echo "Getting client baz"; > messages.log
127 ${kinit} --password-file=${objdir}/foopassword 'baz\@realm.foo@'${R} || \
128 { ec=1 ; eval "${testfailed}"; }
129 echo "checking that we got back right principal"
130 ${klist} | grep 'Principal: baz' > /dev/null || \
131 { ec=1 ; eval "${testfailed}"; }
132 ${kdestroy}
136 echo "Test AS-REQ"
138 echo "Getting client (no canon)"; > messages.log
139 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
140 { ec=1 ; eval "${testfailed}"; }
141 echo "checking that we got back right principal"
142 ${klist} | grep "Principal: foo@${R}" > /dev/null || \
143 { ec=1 ; eval "${testfailed}"; }
144 ${kdestroy}
146 echo "Getting client client tickets (default realm, enterprisename)"; > messages.log
147 ${kinit} --canonicalize \
148 --password-file=${objdir}/foopassword foo@${R} || \
149 { ec=1 ; eval "${testfailed}"; }
150 echo "checking that we got back right principal"
151 ${klist} | grep "Principal: foo@${R}" > /dev/null || \
152 { ec=1 ; eval "${testfailed}"; }
153 ${kdestroy}
155 echo "Getting client alias1 tickets"; > messages.log
156 ${kinit} --canonicalize \
157 --password-file=${objdir}/foopassword foo@${R} || \
158 { ec=1 ; eval "${testfailed}"; }
159 echo "checking that we got back right principal"
160 ${klist} | grep "Principal: foo@${R}" > /dev/null || \
161 { ec=1 ; eval "${testfailed}"; }
162 ${kdestroy}
165 echo "Getting client alias2 tickets"; > messages.log
166 ${kinit} --canonicalize \
167 --password-file=${objdir}/foopassword alias2@${R}@${R} || \
168 { ec=1 ; eval "${testfailed}"; }
169 echo "checking that we got back right principal"
170 ${klist} | grep "Principal: foo@${R}" > /dev/null || \
171 { ec=1 ; eval "${testfailed}"; }
172 ${kdestroy}
174 echo "Getting client alias1 tickets (non canon case)"; > messages.log
175 ${kinit} --password-file=${objdir}/foopassword \
176 alias1@${R}@${R} > /dev/null 2>/dev/null && \
177 { ec=1 ; eval "${testfailed}"; }
179 echo "Getting client alias2 tickets (removed)"; > messages.log
180 ${kadmin} modify --alias=alias1 foo@${R} || { ec=1 ; eval "${testfailed}"; }
181 ${kinit} --canonicalize \
182 --password-file=${objdir}/foopassword \
183 alias2@${R}@${R} > /dev/null 2>/dev/null && \
184 { ec=1 ; eval "${testfailed}"; }
186 echo "Remove alias"
187 ${kadmin} modify --alias= foo@${R} || { ec=1 ; eval "${testfailed}"; }
189 echo "Test server referrals"
191 echo "Getting client for ${service}@${R} (tgs kdc referral)"
192 > messages.log
193 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
194 { ec=1 ; eval "${testfailed}"; }
195 ${kgetcred} --canonicalize ${service}@${R} ||
196 { ec=1 ; eval "${testfailed}"; }
197 echo "checking that we got back right principal"
198 ${klist} | grep "${service}@${R2}" > /dev/null || \
199 { ec=1 ; eval "${testfailed}"; }
200 ${kdestroy}
202 echo "Getting client for ${service}@${R2} (tgs client side guessing)"
203 > messages.log
204 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
205 { ec=1 ; eval "${testfailed}"; }
206 ${kgetcred} ${service}@${R2} ||
207 { ec=1 ; eval "${testfailed}"; }
208 echo "checking that we got back right principal"
209 ${klist} | grep "${service}@${R2}" > /dev/null || \
210 { ec=1 ; eval "${testfailed}"; }
211 ${kdestroy}
214 echo "killing kdc (${kdcpid})"
215 sh ${leaks_kill} kdc $kdcpid || exit 1
217 trap "" EXIT
219 exit $ec