blob: f3d16eb64beda2a37e749a9b399cb9ee20c74c4d [file] [log] [blame]
#! /bin/bash
#
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
########################################################################
#
# mozilla/security/nss/tests/policy/policy.sh
#
# Script to test NSS crypto policy code
#
########################################################################
policy_init()
{
SCRIPTNAME=policy.sh # sourced - $0 would point to all.sh
if [ -z "${CLEANUP}" ] ; then # if nobody else is responsible for
CLEANUP="${SCRIPTNAME}" # cleaning this script will do it
fi
if [ -z "${INIT_SOURCED}" -o "${INIT_SOURCED}" != "TRUE" ]; then
cd ../common
. ./init.sh
fi
SCRIPTNAME=policy.sh
}
policy_cleanup()
{
cd ${QADIR}
. common/cleanup.sh
}
ignore_blank_lines()
{
LC_ALL=C egrep -v '^[[:space:]]*(#|$)' "$1"
}
policy_run_tests()
{
html_head "CRYPTO-POLICY"
POLICY_INPUT=${QADIR}/policy/crypto-policy.txt
ignore_blank_lines ${POLICY_INPUT} | \
while read value policy match testname
do
echo "$SCRIPTNAME: running \"$testname\" ----------------------------"
policy=`echo ${policy} | sed -e 's;_; ;g'`
match=`echo ${match} | sed -e 's;_; ;g'`
POLICY_FILE="${TMP}/nss-policy"
echo "$SCRIPTNAME: policy: \"$policy\""
cat > "$POLICY_FILE" << ++EOF++
library=
name=Policy
NSS=flags=policyOnly,moduleDB
++EOF++
echo "config=\"${policy}\"" >> "$POLICY_FILE"
echo "" >> "$POLICY_FILE"
nss-policy-check "$POLICY_FILE" >${TMP}/$HOST.tmp.$$ 2>&1
ret=$?
cat ${TMP}/$HOST.tmp.$$
html_msg $ret $value "\"${testname}\"" \
"produced a returncode of $ret, expected is $value"
egrep "${match}" ${TMP}/$HOST.tmp.$$
ret=$?
html_msg $ret 0 "\"${testname}\" output is expected to match \"${match}\""
done
html "</TABLE><BR>"
}
policy_init
policy_run_tests
policy_cleanup