Lines Matching +full:- +full:m
3 # context-info.sh
6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
11 set -eu
35 printf " -h|--help\tPrint this help.\n"
36 printf " -m|--memcheck\tUse valgrind to check the memory.\n"
41 printf "%s %.*s " "$1" $(( 71 - ${#1} )) \
70 while [ $# -gt 0 ]; do
72 -h|--help)
76 -m|--memcheck)
98 cp -f "$OUT_FILE" "$FAIL_OUT"
109 # Usage: run_test <name> <input file with b64 code> [ -arg <extra arguments for tested program> ] […
110 # Options: -m <pattern that MUST be present in the output of tested program>
111 # -n <pattern that must NOT be present in the output of tested program>
112 # -u <pattern that must be UNIQUE in the output of tested program>
116 RUN_CMD="$PROG_PATH -f $IN_DIR/$2"
118 if [ "-arg" = "$3" ]; then
126 if [ "$USE_VALGRIND" -gt 0 ]; then
127 RUN_CMD="valgrind --leak-check=full $RUN_CMD"
139 if [ "$USE_VALGRIND" -gt 0 ]; then
140 if ! ( grep -F 'All heap blocks were freed -- no leaks are possible' "$OUT_FILE" &&
141 grep -F 'ERROR SUMMARY: 0 errors from 0 contexts' "$OUT_FILE" ) > /dev/null
152 while [ $# -gt 0 ]
155 "-m")
156 …if grep -v '^==' "$OUT_FILE" | grep -v 'Serious error when reading debug info' | grep -v "^*" | gr…
162 "-n")
163 …if grep -v '^==' "$OUT_FILE" | grep -v 'Serious error when reading debug info' | grep -v "^*" | gr…
169 "-u")
170 …if [ $(grep -v '^==' "$OUT_FILE"| grep -v 'Serious error when reading debug info' | grep -v "^*" |…
183 rm -f "$OUT_FILE"
194 -n "ERROR" \
195 -u "major.* 2$" \
196 -u "minor.* 21$" \
197 -u "path.* 0$" \
198 -u "MBEDTLS_HAVE_TIME$" \
199 -u "MBEDTLS_X509_CRT_PARSE_C$" \
200 -u "MBEDTLS_SSL_MAX_FRAGMENT_LENGTH$" \
201 -u "MBEDTLS_SSL_ENCRYPT_THEN_MAC$" \
202 -u "MBEDTLS_SSL_SESSION_TICKETS$" \
203 -u "MBEDTLS_SSL_SESSION_TICKETS and client$" \
204 -u "MBEDTLS_SSL_DTLS_ANTI_REPLAY$" \
205 -u "MBEDTLS_SSL_ALPN$" \
206 -u "ciphersuite.* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256$" \
207 -u "cipher flags.* 0x00$" \
208 -u "Message-Digest.* SHA256$" \
209 -u "compression.* disabled$" \
210 -u "DTLS datagram packing.* enabled$" \
211 -n "Certificate" \
212 -n "bytes left to analyze from context"
216 -n "ERROR" \
217 -u "major.* 2$" \
218 -u "minor.* 21$" \
219 -u "path.* 0$" \
220 -u "MBEDTLS_HAVE_TIME$" \
221 -u "MBEDTLS_X509_CRT_PARSE_C$" \
222 -u "MBEDTLS_SSL_MAX_FRAGMENT_LENGTH$" \
223 -u "MBEDTLS_SSL_ENCRYPT_THEN_MAC$" \
224 -u "MBEDTLS_SSL_SESSION_TICKETS$" \
225 -u "MBEDTLS_SSL_SESSION_TICKETS and client$" \
226 -u "MBEDTLS_SSL_DTLS_ANTI_REPLAY$" \
227 -u "MBEDTLS_SSL_ALPN$" \
228 -u "ciphersuite.* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256$" \
229 -u "cipher flags.* 0x00$" \
230 -u "Message-Digest.* SHA256$" \
231 -u "compression.* disabled$" \
232 -u "DTLS datagram packing.* enabled$" \
233 -u "cert. version .* 3$" \
234 -u "serial number.* 02$" \
235 -u "issuer name.* C=NL, O=PolarSSL, CN=PolarSSL Test CA$" \
236 -u "subject name.* C=NL, O=PolarSSL, CN=localhost$" \
237 -u "issued on.* 2019-02-10 14:44:06$" \
238 -u "expires on.* 2029-02-10 14:44:06$" \
239 -u "signed using.* RSA with SHA-256$" \
240 -u "RSA key size.* 2048 bits$" \
241 -u "basic constraints.* CA=false$" \
242 -n "bytes left to analyze from context"
244 run_test "Ciphersuite TLS-RSA-WITH-AES-256-CCM-8, server" \
246 -n "ERROR" \
247 -u "ciphersuite.* TLS-RSA-WITH-AES-256-CCM-8$" \
249 run_test "Ciphersuite TLS-RSA-WITH-AES-256-CCM-8, client" \
251 -n "ERROR" \
252 -u "ciphersuite.* TLS-RSA-WITH-AES-256-CCM-8$" \
256 -n "ERROR" \
257 -u "DTLS datagram packing.* disabled"
261 -n "ERROR" \
262 -u "DTLS datagram packing.* disabled"
266 -n "ERROR" \
267 -u "in CID.* DE AD" \
268 -u "out CID.* BE EF"
272 -n "ERROR" \
273 -u "in CID.* BE EF" \
274 -u "out CID.* DE AD"
278 -n "ERROR" \
279 -n "MBEDTLS_SSL_MAX_FRAGMENT_LENGTH"
283 -n "ERROR" \
284 -n "MBEDTLS_SSL_MAX_FRAGMENT_LENGTH"
288 -n "ERROR" \
289 -n "MBEDTLS_SSL_ALPN"
293 -n "ERROR" \
294 -n "MBEDTLS_SSL_ALPN"
298 -arg "--keep-peer-cert=0" \
299 -u "ciphersuite.* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256$" \
300 -u "cipher flags.* 0x00" \
301 -u "compression.* disabled" \
302 -u "DTLS datagram packing.* enabled" \
303 -n "ERROR"
307 -arg "--keep-peer-cert=0" \
308 -u "ciphersuite.* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256$" \
309 -u "cipher flags.* 0x00" \
310 -u "compression.* disabled" \
311 -u "DTLS datagram packing.* enabled" \
312 -n "ERROR"
316 -m "Deserializing" \
317 -m "ERROR"
321 -m "Deserializing" \
322 -m "ERROR"
326 -n "ERROR" \
327 -n "MBEDTLS_SSL_MAX_FRAGMENT_LENGTH$" \
328 -n "MBEDTLS_SSL_ENCRYPT_THEN_MAC$" \
329 -n "MBEDTLS_SSL_SESSION_TICKETS$" \
330 -n "MBEDTLS_SSL_SESSION_TICKETS and client$" \
331 -n "MBEDTLS_SSL_DTLS_ANTI_REPLAY$" \
332 -n "MBEDTLS_SSL_ALPN$" \
336 -n "ERROR" \
337 -n "MBEDTLS_SSL_MAX_FRAGMENT_LENGTH$" \
338 -n "MBEDTLS_SSL_ENCRYPT_THEN_MAC$" \
339 -n "MBEDTLS_SSL_SESSION_TICKETS$" \
340 -n "MBEDTLS_SSL_SESSION_TICKETS and client$" \
341 -n "MBEDTLS_SSL_DTLS_ANTI_REPLAY$" \
342 -n "MBEDTLS_SSL_ALPN$" \
346 -n "ERROR" \
347 -u "MTU.* 10000$"
351 -n "ERROR" \
352 -u "MFL.* 1024$"
356 -n "ERROR" \
357 -u "major.* 2$" \
358 -u "minor.* 19$" \
359 -u "path.* 1$" \
360 -u "ciphersuite.* TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8$" \
361 -u "Message-Digest.* SHA256$" \
362 -u "compression.* disabled$" \
363 -u "serial number.* 01:70:AF:40:B4:E6$" \
364 -u "issuer name.* CN=ca$" \
365 -u "subject name.* L=160001, OU=acc1, CN=device01$" \
366 -u "issued on.* 2020-03-06 09:50:18$" \
367 -u "expires on.* 2056-02-26 09:50:18$" \
368 -u "signed using.* ECDSA with SHA256$" \
369 -u "lifetime.* 0 sec.$" \
370 -u "MFL.* none$" \
371 -u "negotiate truncated HMAC.* disabled$" \
372 -u "Encrypt-then-MAC.* enabled$" \
373 -u "DTLS datagram packing.* enabled$" \
374 -u "verify result.* 0x00000000$" \
375 -n "bytes left to analyze from context"
379 -m "ERROR" \
380 -u "The length of the base64 code found should be a multiple of 4" \
381 -n "bytes left to analyze from context"
385 -m "ERROR" \
386 -n "The length of the base64 code found should be a multiple of 4" \
390 -m "ERROR" \
391 -n "The length of the base64 code found should be a multiple of 4" \
395 -m "ERROR" \
396 -n "The length of the base64 code found should be a multiple of 4" \
397 -u "bytes left to analyze from context"
401 -u "Finished. No valid base64 code found"
404 "../../context-info.sh" \
405 -n "Deserializing"
409 -m "ERROR" \
410 -u "Too many bad symbols detected. File check aborted" \
411 -n "Deserializing"
415 -n "No valid base64" \
416 -u "ciphersuite.* TLS-"
422 if [ $T_FAILED -eq 0 ]; then