Test AES. ** Not all tests pass at present. **
authorKen Raeburn <raeburn@mit.edu>
Fri, 18 Apr 2003 10:08:30 +0000 (10:08 +0000)
committerKen Raeburn <raeburn@mit.edu>
Fri, 18 Apr 2003 10:08:30 +0000 (10:08 +0000)
* default.exp: Add passes for testing AES.
(start_kerberos_daemons): Add a small delay between starting the "tail -f"
processes and appending the markers to their files.
(spawn_xterm): Add RLOGIN, RLOGIND, FTP, and FTPD to the list of variables to
export to the environment.  Check that variables are defined before exporting
them.

ticket: 1418
status: open

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15361 dc483132-0cff-0310-8789-dd5450dbe970

src/tests/dejagnu/config/ChangeLog
src/tests/dejagnu/config/default.exp

index 95408ed5d874ac15dbf81972a52168c6a0943976..151b79b8c272faf209dc3c37f8e79a41e535c0b2 100644 (file)
@@ -1,3 +1,12 @@
+2003-04-18  Ken Raeburn  <raeburn@mit.edu>
+
+       * default.exp: Add passes for testing AES.
+       (start_kerberos_daemons): Add a small delay between starting the
+       "tail -f" processes and appending the markers to their files.
+       (spawn_xterm): Add RLOGIN, RLOGIND, FTP, and FTPD to the list of
+       variables to export to the environment.  Check that variables are
+       defined before exporting them.
+
 2003-03-28  Tom Yu  <tlyu@mit.edu>
 
        * default.exp (start_kerberos_daemons): If we get a timeout
index b53f68bed862d64316cf00d388488f5fc8065c5e..97822cfe80d874878ba719546374a6d33514b9ae 100644 (file)
@@ -85,6 +85,39 @@ set passes {
        {kdc_supported_enctypes=des3-cbc-sha1:normal des-cbc-crc:normal}
        {dummy=[verbose -log "DES3 TGT, DES3 + DES enctypes"]}
     }
+    {
+       aes
+       des3_krbtgt=0
+       {supported_enctypes=aes256-cts-hmac-sha1-96:normal des-cbc-crc:normal}
+       {kdc_supported_enctypes=aes256-cts-hmac-sha1-96:normal des-cbc-crc:normal}
+       {permitted_enctypes(kdc)=aes256-cts-hmac-sha1-96 des-cbc-crc}
+       {permitted_enctypes(client)=aes256-cts-hmac-sha1-96 des-cbc-crc}
+       {permitted_enctypes(server)=aes256-cts-hmac-sha1-96 des-cbc-crc}
+       {master_key_type=aes256-cts-hmac-sha1-96}
+       {dummy=[verbose -log "AES + DES enctypes"]}
+    }
+    {
+       aes-des3
+       des3_krbtgt=0
+       {supported_enctypes=aes256-cts-hmac-sha1-96:normal des3-cbc-sha1:normal des-cbc-crc:normal}
+       {kdc_supported_enctypes=aes256-cts-hmac-sha1-96:normal des3-cbc-sha1:normal des-cbc-crc:normal}
+       {permitted_enctypes(kdc)=aes256-cts-hmac-sha1-96 des3-cbc-sha1 des-cbc-crc}
+       {permitted_enctypes(client)=aes256-cts-hmac-sha1-96 des3-cbc-sha1 des-cbc-crc}
+       {permitted_enctypes(server)=aes256-cts-hmac-sha1-96 des3-cbc-sha1 des-cbc-crc}
+       {master_key_type=aes256-cts-hmac-sha1-96}
+       {dummy=[verbose -log "AES + DES enctypes"]}
+    }
+    {
+       des3-aes
+       des3_krbtgt=1
+       {supported_enctypes=aes256-cts-hmac-sha1-96:normal des3-cbc-sha1:normal des-cbc-crc:normal}
+       {kdc_supported_enctypes=aes256-cts-hmac-sha1-96:normal des3-cbc-sha1:normal des-cbc-crc:normal}
+       {permitted_enctypes(kdc)=aes256-cts-hmac-sha1-96 des3-cbc-sha1 des-cbc-crc}
+       {permitted_enctypes(client)=aes256-cts-hmac-sha1-96 des3-cbc-sha1 des-cbc-crc}
+       {permitted_enctypes(server)=aes256-cts-hmac-sha1-96 des3-cbc-sha1 des-cbc-crc}
+       {master_key_type=aes256-cts-hmac-sha1-96}
+       {dummy=[verbose -log "AES + DES enctypes, DES3 TGT"]}
+    }
     {
        des-v4
        des3_krbtgt=0
@@ -203,31 +236,30 @@ set unused_passes {
        all-enctypes
        des3_krbtgt=1
        {supported_enctypes=\
-       rijndael256-hmac-sha1:normal rijndael192-hmac-sha1:normal rijndael128-hmac-sha1:normal \
-       serpent256-hmac-sha1:normal serpent192-hmac-sha1:norealm serpent128-hmac-sha1:normal \
-       twofish256-hmac-sha1:normal twofish192-hmac-sha1:norealm twofish128-hmac-sha1:normal \
+       aes256-cts-hmac-sha1-96:normal aes256-cts-hmac-sha1-96:norealm \
+       aes128-cts-hmac-sha1-96:normal aes128-cts-hmac-sha1-96:norealm \
        des3-cbc-sha1:normal des3-cbc-sha1:none \
        des-cbc-md5:normal des-cbc-md4:normal des-cbc-crc:normal \
        des-cbc-md5:v4 des-cbc-md4:v4 des-cbc-crc:v4 \
        }
        {kdc_supported_enctypes=\
-       rijndael256-hmac-sha1:normal rijndael192-hmac-sha1:normal rijndael128-hmac-sha1:normal \
-       serpent256-hmac-sha1:normal serpent192-hmac-sha1:norealm serpent128-hmac-sha1:normal \
-       twofish256-hmac-sha1:normal twofish192-hmac-sha1:norealm twofish128-hmac-sha1:normal \
        des3-cbc-sha1:normal des3-cbc-sha1:none \
        des-cbc-md5:normal des-cbc-md4:normal des-cbc-crc:normal \
        des-cbc-md5:v4 des-cbc-md4:v4 des-cbc-crc:v4 \
        }
        {dummy=[verbose -log "DES3 TGT, default enctypes"]}
     }
+    # This won't work for anything using GSSAPI until it gets AES support.
     {
-       aes
+       aes-only
        des3_krbtgt=0
-       {supported_enctypes=des-cbc-md5:normal des-cbc-crc:normal twofish256-hmac-sha1:normal}
-       {kdc_supported_enctypes=des-cbc-md5:normal des-cbc-crc:normal twofish256-hmac-sha1:normal}
-       {default_tgs_enctypes=rijndael256-hmac-sha1 des-cbc-crc}
-       {default_tkt_enctypes=rijndael256-hmac-sha1 des-cbc-crc}
-       {dummy=[verbose -log "DES3 TGT, default enctypes"]}
+       {supported_enctypes=aes256-cts-hmac-sha1-96:normal}
+       {kdc_supported_enctypes=aes256-cts-hmac-sha1-96:normal}
+       {permitted_enctypes(kdc)=aes256-cts-hmac-sha1-96}
+       {permitted_enctypes(client)=aes256-cts-hmac-sha1-96}
+       {permitted_enctypes(server)=aes256-cts-hmac-sha1-96}
+       {master_key_type=aes256-cts-hmac-sha1-96}
+       {dummy=[verbose -log "AES only, no DES or DES3 support"]}
     }
 }
 #      {supported_enctypes=des-cbc-md5:normal des-cbc-crc:normal twofish256-hmac-sha1:normal }
@@ -1253,9 +1285,9 @@ proc start_kerberos_daemons { standalone } {
     set tailf_pid [exp_pid]
 
     set markstr "===MARK $tailf_pid [exec date] ==="
+    sleep 2
     set f [open $kdc_lfile a]
     puts $f $markstr
-    flush $f
     close $f
 
     expect {
@@ -1333,6 +1365,7 @@ proc start_kerberos_daemons { standalone } {
     set tailf_pid [exp_pid]
 
     set markstr "===MARK $tailf_pid [exec date] ==="
+    sleep 2
     set f [open $kadmind_lfile a]
     puts $f $markstr
     close $f
@@ -2441,9 +2474,9 @@ proc krb_exit { } {
 # helpful sometimes for debugging the test suite
 proc spawn_xterm { } {
     global env
-    foreach i {KDB5_UTIL KRB5KDC KADMIND KADMIN KADMIN_LOCAL KINIT KTUTIL KLIST} {
+    foreach i {KDB5_UTIL KRB5KDC KADMIND KADMIN KADMIN_LOCAL KINIT KTUTIL KLIST RLOGIN RLOGIND FTP FTPD} {
        global $i
-       set env($i) [set $i]
+       if [info exists $i] { set env($i) [set $i] }
     }
     exec "xterm"
 }