Lines Matching +full:default +full:- +full:tap
2 * PKINIT authentication tests for the pam-krb5 module.
12 * SPDX-License-Identifier: BSD-3-clause or GPL-1+
19 #include <tests/tap/kerberos.h>
20 #include <tests/tap/process.h>
21 #include <tests/tap/string.h>
37 config.user = krbconf->pkinit_principal; in main()
38 config.extra[0] = krbconf->pkinit_cert; in main()
41 * Generate a testing krb5.conf file with a nonexistent default realm so in main()
42 * that we can be sure that our principals will stay fully-qualified in in main()
50 run_script("data/scripts/pkinit/basic-debug", &config); in main()
51 run_script("data/scripts/pkinit/prompt-use", &config); in main()
52 run_script("data/scripts/pkinit/prompt-try", &config); in main()
53 run_script("data/scripts/pkinit/try-pkinit", &config); in main()
57 run_script("data/scripts/pkinit/try-pkinit-debug", &config); in main()
59 run_script("data/scripts/pkinit/try-pkinit-debug-mit", &config); in main()
64 run_script("data/scripts/pkinit/preauth-opt-mit", &config); in main()
75 basprintf(&pkcs12_path, "%s/%s", tmpdir, "pkinit-pkcs12"); in main()
79 generate_pkcs12[2] = "-export"; in main()
80 generate_pkcs12[3] = "-in"; in main()
81 generate_pkcs12[4] = krbconf->pkinit_cert; in main()
82 generate_pkcs12[5] = "-password"; in main()
83 generate_pkcs12[6] = "pass:some-password"; in main()
84 generate_pkcs12[7] = "-out"; in main()
90 config.extra[1] = "some-password"; in main()
91 run_script("data/scripts/pkinit/pin-mit", &config); in main()