Lines Matching +full:pad +full:- +full:select
40 stat="--statistic-file=${objdir}/statfile"
53 ${hxtool} verify --missing-revoke \
54 --time=2006-09-25 \
55 cert:FILE:$srcdir/data/bleichenbacher-good.pem \
56 anchor:FILE:$srcdir/data/bleichenbacher-good.pem > /dev/null || exit 1
59 ${hxtool} verify --missing-revoke \
60 --time=2006-09-25 \
61 cert:FILE:$srcdir/data/bleichenbacher-bad.pem \
62 anchor:FILE:$srcdir/data/bleichenbacher-bad.pem > /dev/null && exit 1
65 ${hxtool} verify --missing-revoke \
66 --time=2006-09-25 \
67 cert:FILE:$srcdir/data/yutaka-pad-ok-cert.pem \
68 anchor:FILE:$srcdir/data/yutaka-pad-ok-ca.pem > /dev/null || exit 1
71 ${hxtool} verify --missing-revoke \
72 --time=2006-09-25 \
73 cert:FILE:$srcdir/data/yutaka-pad-broken-cert.pem \
74 anchor:FILE:$srcdir/data/yutaka-pad-broken-ca.pem > /dev/null && exit 1
76 # Ralf-Philipp Weinmann <weinmann@cdc.informatik.tu-darmstadt.de>
77 # Andrew Pyshkin <pychkine@cdc.informatik.tu-darmstadt.de>
78 echo "Bleichenbacher bad cert (sf pad correct)"
79 ${hxtool} verify --missing-revoke \
80 --time=2006-09-25 \
81 cert:FILE:$srcdir/data/bleichenbacher-sf-pad-correct.pem \
82 anchor:FILE:$srcdir/data/sf-class2-root.pem > /dev/null && exit 1
85 ${hxtool} random-data 50kilobyte > random-data || exit 1
88 ${hxtool} crypto-select > test || { echo "select1"; exit 1; }
89 cmp test ${srcdir}/tst-crypto-select1 > /dev/null || \
93 ${hxtool} crypto-select --type=digest > test || { echo "select1"; exit 1; }
94 cmp test ${srcdir}/tst-crypto-select1 > /dev/null || \
98 ${hxtool} crypto-select --type=public-sig > test || { echo "select2"; exit 1; }
99 cmp test ${srcdir}/tst-crypto-select2 > /dev/null || \
103 ${hxtool} crypto-select \
104 --type=public-sig \
105 --peer-cmstype=1.2.840.113549.1.1.4 \
107 cmp test ${srcdir}/tst-crypto-select3 > /dev/null || \
111 ${hxtool} crypto-select \
112 --type=public-sig \
113 --peer-cmstype=1.2.840.113549.1.1.5 \
114 --peer-cmstype=1.2.840.113549.1.1.4 \
116 cmp test ${srcdir}/tst-crypto-select4 > /dev/null || \
120 ${hxtool} crypto-select \
121 --type=public-sig \
122 --peer-cmstype=1.2.840.113549.1.1.11 \
123 --peer-cmstype=1.2.840.113549.1.1.5 \
125 cmp test ${srcdir}/tst-crypto-select5 > /dev/null || \
129 ${hxtool} crypto-select \
130 --type=public-sig \
131 --peer-cmstype=1.2.840.113549.2.5 \
132 --peer-cmstype=1.2.840.113549.1.1.5 \
134 cmp test ${srcdir}/tst-crypto-select6 > /dev/null || \
138 ${hxtool} crypto-select \
139 --type=secret \
140 --peer-cmstype=2.16.840.1.101.3.4.1.42 \
141 --peer-cmstype=1.2.840.113549.3.7 \
142 --peer-cmstype=1.2.840.113549.1.1.5 \
144 cmp test ${srcdir}/tst-crypto-select7 > /dev/null || \
148 #${hxtool} crypto-available \
149 # --type=all \
151 #cmp test ${srcdir}/tst-crypto-available1 > /dev/null || \
155 ${hxtool} crypto-available \
156 --type=digest \
158 cmp test ${srcdir}/tst-crypto-available2 > /dev/null || \
162 #${hxtool} crypto-available \
163 # --type=public-sig \
165 #cmp test ${srcdir}/tst-crypto-available3 > /dev/null || \
168 echo "copy keystore FILE existing -> FILE"
169 ${hxtool} certificate-copy \
173 echo "copy keystore FILE -> FILE"
174 ${hxtool} certificate-copy \
178 echo "copy keystore FILE -> PKCS12"
179 ${hxtool} certificate-copy \
188 ${hxtool} print --content \
189 FILE:$srcdir/data/pkinit-ec.crt,$srcdir/data/pkinit-ec.key \