X-Git-Url: https://git.distorted.org.uk/~mdw/tripe/blobdiff_plain/768a2316c32523753d544e831687c27e5276a9d1..HEAD:/server/tests.at diff --git a/server/tests.at b/server/tests.at index 0a7e7855..ef2039ae 100644 --- a/server/tests.at +++ b/server/tests.at @@ -9,19 +9,18 @@ ### ### This file is part of Trivial IP Encryption (TrIPE). ### -### TrIPE is free software; you can redistribute it and/or modify -### it under the terms of the GNU General Public License as published by -### the Free Software Foundation; either version 2 of the License, or -### (at your option) any later version. +### TrIPE is free software: you can redistribute it and/or modify it under +### the terms of the GNU General Public License as published by the Free +### Software Foundation; either version 3 of the License, or (at your +### option) any later version. ### -### TrIPE is distributed in the hope that it will be useful, -### but WITHOUT ANY WARRANTY; without even the implied warranty of -### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -### GNU General Public License for more details. +### TrIPE is distributed in the hope that it will be useful, but WITHOUT +### ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or +### FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License +### for more details. ### ### You should have received a copy of the GNU General Public License -### along with TrIPE; if not, write to the Free Software Foundation, -### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. +### along with TrIPE. If not, see . m4_define([nl], [ ]) @@ -35,9 +34,38 @@ m4_define([SETUPDIR], [ ## Running standard programs with useful options. m4_define([TRIPE], [env TRIPE_PRIVHELPER=$abs_top_builddir/priv/tripe-privhelper \ - $abs_top_builddir/server/tripe -F -d. -aadmin -p0 -b127.0.0.1 -talice]) + $abs_top_builddir/server/tripe -F -d. -aadmin -p0 -b127.0.0.1 \ + ${TRIPE_TEST_TRACEOPTS+-T$TRIPE_TEST_TRACEOPTS}]) m4_define([TRIPECTL], [$abs_top_builddir/client/tripectl -d. -aadmin]) m4_define([USLIP], [$abs_top_builddir/uslip/tripe-uslip]) +m4_define([MITM], [$abs_top_builddir/proxy/tripe-mitm]) +m4_define([BULKTEST], + [$abs_top_builddir/server/tripe-test \ + ${TRIPE_TEST_TRACEOPTS+-T$TRIPE_TEST_TRACEOPTS}]) + +## Pause for a bit. +m4_define([SLEEP], [sleep 0.2]) + +## WITH_STRACE(tag, cmd) +## +## There's an awful hack here. If a process running under strace exits with +## a signal, then strace will kill itself with the same signal -- and +## therefore clobber the original process's core file. So we arrange to run +## strace in one directory and have the child process run in another. +m4_define([WITH_STRACE], +[case "${TRIPE_TEST_STRACE-nil}" in + nil) + $2 + ;; + *) + mkdir -p strace-hack.$1/ + (ulimit -c hard >/dev/null 2>&1 + sh -c 'cd strace-hack.$1; exec "$[]@"' - \ + strace -ff -tt -v -s1024 -o../$1.trace \ + sh -c 'cd ..; exec "$[]@"' - \ + $2) + ;; + esac]) ## Sequences. (These are used for testing the replay protection machinery.) m4_define([R32], [ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 dnl @@ -48,8 +76,15 @@ m4_define([P32], [21 26 14 12 25 18 2 27 10 31 24 29 0 20 17 11 dnl ###-------------------------------------------------------------------------- ### Scaffolding for running a TrIPE server. +## WITH_TRIPEX(dir, args, body) m4_define([WITH_TRIPEX], [ +## If this directory doesn't exist then Bad Things will happen. +if test ! -d $1; then + echo >&2 "server directory \`$1' doesn't exist" + exit 99 +fi + ## Remove the status file. This is how we notice that the server's died. rm -f $1/server-status > $1/expected-server-output @@ -67,19 +102,80 @@ exec 1>&3 3>&- ## not sleep for ages. (Yes, a second on each test group is a long time.) while test ! -r $1/server-status && test ! -S $1/admin; do :; done +## Make the port number availale. +AT_CHECK([TRIPECTL -d$1 PORT],, [stdout]) +mv stdout $1/port + ## Test body... $3 ## End of the test, now run the server. ) && :; } | { cd $1 - echo TRIPE $2 >&2 - strace -f -o tripe.trace TRIPE $2 >server-output 2>server-errors + echo "TRIPE $2" >&2 + WITH_STRACE([tripe], [TRIPE $2 >server-output.full 2>server-errors.full]) stat=$? echo $stat >server-status if test $stat -ne 0; then - echo "exit status: $stat" >>server-errors + echo "exit status: $stat" >>server-errors.full fi + grep -v '^+ tripe: ' server-errors.full >server-errors + + ## We interrupt this relatively sensible macro for an especially awful + ## hack. The tripe server emits warnings which are often caused by lack of + ## synchronization between two peers. These are harmless and shouldn't + ## cause test failures. But we shouldn't just trim out all messages that + ## look like the spurious ones: if they appear when we're not expecting + ## them, that's bad and they should properly cause a test failure. + ## + ## So we use the WARN command to insert magic directives into the server's + ## message stream. The directives begin with `WARN USER test'; remaining + ## tokens may be as follows. + ## + ## PUSH Introduce a new layer of nesting. Settings between + ## this PUSH and the matching POP will be forgotten + ## following the POP. + ## + ## POP End a layer of nesting. See PUSH above. + ## + ## IGNORE tokens Ignore lines which begin with the tokens. + ## + ## Token comparison isn't done very well, but it's good enough for these + ## purposes. + ## + ## We also trim out trace lines here, since it's useful to produce them for + ## debugging purposes and changing or introducing more of them shouldn't + ## cause failures. + awk ' + BEGIN { + sp = 0; + npat = 0; + } + $[]1 == "TRACE" { next; } + $[]1 == "WARN" && $[]2 == "USER" && $[]3 == "test" { + if ($[]4 == "PUSH") + npatstk[[sp++]] = npat; + else if ($[]4 == "IGNORE") { + s = ""; + p = ""; + for (i = 5; i <= NF; i++) { + p = p s $[]i; + s = " "; + } + pat[[npat++]] = p; + } else if ($[]4 == "POP") + npat = npatstk[[--sp]]; + next; + } + { + for (i = 0; i < npat; i++) { + n = length(pat[[i]]); + if (substr($[]0, 1, n) == pat[[i]]) + next; + } + print $[]0; + } + ' server-output.full >server-output } exec 3>&- @@ -90,11 +186,107 @@ AT_CHECK([cat $1/server-output; cat >&2 $1/server-errors],, [expout], [experr]) ]) +## WITH_TRIPE(args, body) m4_define([WITH_TRIPE], [WITH_TRIPEX([.], [$1], [$2])]) +## WITH_2TRIPES(adir, bdir, bothargs, aargs, bargs, body) m4_define([WITH_2TRIPES], [WITH_TRIPEX([$1], [$3 $4], [WITH_TRIPEX([$2], [$3 $5], [$6])])]) +## WITH_3TRIPES(adir, bdir, cdir, allargs, aargs, bargs, cargs, body) +m4_define([WITH_3TRIPES], + [WITH_TRIPEX([$1], [$4 $5], + [WITH_TRIPEX([$2], [$4 $6], + [WITH_TRIPEX([$3], [$4 $7], + [$8])])])]) + +## RETRY(n, body) +m4_define([RETRY], [ + n=0 rc=1 + while test $n -lt $1; do + if $2 + then rc=0; break + fi + n=$(( $n + 1 )) + done + exit $rc +]) + +## COMMS_EPING(adir, aname, bdir, bname, [n]) +m4_define([COMMS_EPING], [ + AT_CHECK([RETRY([m4_default([$5], [1])], + [TRIPECTL -d$1 EPING $4])],, [ignore]) + AT_CHECK([RETRY([m4_default([$5], [1])], + [TRIPECTL -d$3 EPING $2])],, [ignore]) +]) + +## COMMS_SLIP(adir, aname, bdir, bname) +m4_define([COMMS_SLIP], [ + AT_CHECK([echo "from $1" | USLIP -p $1/$4]) + AT_CHECK([USLIP -g $3/$2],, [from $1[]nl]) + AT_CHECK([echo "from $3" | USLIP -p $3/$2]) + AT_CHECK([USLIP -g $1/$4],, [from $3[]nl]) +]) + +## AWAIT_KXDONE(adir, aname, bdir, bname, body) +m4_define([AWAIT_KXDONE], [ + + ## Ignore some reports caused by races. + for i in $1!$4 $3!$2; do + d=${i%!*} o=${i#*!} + TRIPECTL -d$d WARN test PUSH + TRIPECTL -d$d WARN test IGNORE WARN KX $o incorrect cookie + TRIPECTL -d$d WARN test IGNORE WARN KX $o unexpected pre-challenge + TRIPECTL -d$d WARN test IGNORE WARN KX $o unexpected challenge + done + + ## Watch for the key-exchange completion announcement in the background. + COPROCESSES([wait-$1], [ + echo "WATCH +n" + while read line; do + set x $line; shift + echo >&2 ">>> $line" + case "$[]1:$[]2:$[]3" in + OK::) ;; + NOTE:KXDONE:$4) break ;; + NOTE:* | TRACE:* | WARN:*) ;; + *) exit 63 ;; + esac + done + ], [ + TRIPECTL -d$1 + ]) & waiter_$1=$! + + $5 + + ## Collect the completion announcement. + wait $waiter_$1; waitrc=$? + AT_CHECK([echo $waitrc],, [0[]nl]) + + ## Be interested in key-exchange warnings again. + for d in $1 $3; do TRIPECTL -d$d WARN test POP; done +]) + +## ESTABLISH(adir, aname, aopts, bdir, bname, bopts, [aport], [bport]) +m4_define([ESTABLISH], [ + + ## Set up the establishment. + AWAIT_KXDONE([$1], [$2], [$4], [$5], [ + AT_CHECK([TRIPECTL -d$1 ADD -cork $6 $5 INET 127.0.0.1 \ + m4_if([$8], [], [$(cat $4/port)], [$8])]) + AT_CHECK([TRIPECTL -d$4 ADD $3 $2 INET 127.0.0.1 \ + m4_if([$7], [], [$(cat $1/port)], [$7])]) + ]) + + ## Check transport pinging. + AT_CHECK([TRIPECTL -d$1 PING $5],, [ignore]) + AT_CHECK([TRIPECTL -d$4 PING $2],, [ignore]) + + ## Check communication works. + COMMS_EPING([$1], [$2], [$4], [$5]) + COMMS_SLIP([$1], [$2], [$4], [$5]) +]) + ###-------------------------------------------------------------------------- ### Very unpleasant coprocess handling. @@ -127,8 +319,8 @@ m4_define([TRIPECTL_COMMAND], [ ### Make sure the thing basically works. AT_SETUP([server basics]) -SETUPDIR([ec]) -AT_CHECK([echo port | TRIPE -p54321],, [INFO 54321[]nl[]OK[]nl]) +SETUPDIR([alpha]) +AT_CHECK([echo "port" | TRIPE -p54321],, [INFO 54321[]nl[]OK[]nl]) AT_CLEANUP ###-------------------------------------------------------------------------- @@ -136,7 +328,7 @@ AT_CLEANUP AT_SETUP([server challenges]) AT_KEYWORDS([chal]) -SETUPDIR([ec]) +SETUPDIR([alpha]) WITH_TRIPE(, [ ## A simple test. @@ -146,7 +338,7 @@ WITH_TRIPE(, [ ## server chose the same key is negligible.) AT_CHECK([TRIPECTL checkchal AAAAAHyoOL+HMaE0Y9B3ivuszt0], [1],, [tripectl: invalid-challenge[]nl]) - echo WARN CHAL incorrect-tag >>expected-server-output + echo "WARN CHAL incorrect-tag" >>expected-server-output ## A duplicated challenge. AT_CHECK([ @@ -154,7 +346,7 @@ WITH_TRIPE(, [ TRIPECTL CHECKCHAL $chal TRIPECTL CHECKCHAL $chal ], [1],, [tripectl: invalid-challenge[]nl]) - echo WARN CHAL replay duplicated-sequence >>expected-server-output + echo "WARN CHAL replay duplicated-sequence" >>expected-server-output ## Out-of-order reception. There should be a window of 32 challenges; we ## make 33 and check them in a strange order. @@ -194,56 +386,272 @@ AT_SETUP([server communication]) AT_KEYWORDS([comm]) export TRIPE_SLIPIF=USLIP -for i in alice bob; do (mkdir $i; cd $i; SETUPDIR([ec])); done +for k in alpha beta-new; do + for p in alice bob; do ( + rm -rf $p; mkdir $p; cd $p; SETUPDIR([$k]) + ); done + WITH_2TRIPES([alice], [bob], [-nslip], [-talice], [-tbob], [ + ESTABLISH([alice], [not-alice], [-key alice], + [bob], [bob], []) + ]) + for p in alice bob; do rm -rf $p.$k; mv $p $p.$k; done +done -WITH_2TRIPES([alice], [bob], [-nslip], [-talice], [-tbob], [ +AT_CLEANUP - AT_CHECK([TRIPECTL -dalice PORT],, [stdout]) - mv stdout alice/port +###-------------------------------------------------------------------------- +### Mobile peer tracking. - AT_CHECK([TRIPECTL -dbob PORT],, [stdout]) - mv stdout bob/port +AT_SETUP([peer tracking]) +AT_KEYWORDS([mobile]) +export TRIPE_SLIPIF=USLIP - ## Watch for the key-exchange completion announcement, and then exit. - COPROCESSES([wait], [ - echo WATCH +n - while read line; do - case "$line" in - OK) ;; - "NOTE KXDONE "*) break ;; - NOTE*) ;; - *) exit 63 ;; - esac - done - ], [ - TRIPECTL -dalice - ]) & +for p in alice bob carol; do (mkdir $p; cd $p; SETUPDIR([alpha])); done + +## WITH_MITM(adir, aport, bdir, bport, body) +m4_define([WITH_MITM], [ + aspec="$2" bspec="$4" + case $aspec in =*) aport="?$1/$3.mitm" ;; *) aport=$aspec ;; esac + case $bspec in =*) bport="?$3/$1.mitm" ;; *) bport=$bspec ;; esac + MITM -k$1/keyring.pub \ + peer:$1:$aport:127.0.0.1:$(cat $1/port) \ + peer:$3:$bport:127.0.0.1:$(cat $3/port) \ + filt:send& mitmpid_$1_$3=$! + SLEEP + case $aspec in =*) aport=$(cat ${aport#\?}); eval ${aspec#=}=\$aport ;; esac + case $bspec in =*) bport=$(cat ${bport#\?}); eval ${bspec#=}=\$bport ;; esac + echo >&2 "mitm: $1 <--> :$aport <-mitm-> :$bport <--> $3" + trap 'kill $mitmpid_$1_$3; exit 127' EXIT INT QUIT TERM HUP + SLEEP + $5 + kill $mitmpid_$1_$3; trap - EXIT INT QUIT TERM HUP +]) - ## Don't panic if you don't see the unexpected-source warning. It happens - ## for me, but it's not important either way. - AT_CHECK([TRIPECTL -dalice ADD bob INET 127.0.0.1 $(cat bob/port)]) - echo >>bob/expected-server-output \ - "WARN PEER - unexpected-source INET 127.0.0.1 $(cat alice/port)" - AT_CHECK([TRIPECTL -dbob ADD -key alice not-alice \ - INET 127.0.0.1 $(cat alice/port)]) +WITH_3TRIPES([alice], [bob], [carol], [-nslip], + [-talice], [-tbob], [-tcarol], [ - ## Check transport pinging. - AT_CHECK([TRIPECTL -dalice PING bob],, [ignore]) - AT_CHECK([TRIPECTL -dbob PING not-alice],, [ignore]) + ## We need an indirection layer between the two peers so that we can + ## simulate the effects of NAT remapping. The nearest thing we have to + ## this is the mitm proxy, so we may as well use that. + ## + ## alice <--> :5311 <-mitm-> :5312 <--> bob + ## alice <--> :5321 <-mitm-> :5322 <--> carol - ## Wait for the completion announcement. + WITH_MITM([alice], [=bob_from_alice], [bob], [=alice_from_bob], [ + ESTABLISH([alice], [alice], [], + [bob], [bob], [-mobile], + [$alice_from_bob], [$bob_from_alice]) + ]) + + WITH_MITM([alice], [=new_bob_from_alice], [bob], [$alice_from_bob], [ + COMMS_EPING([bob], [bob], [alice], [alice]) + COMMS_SLIP([bob], [bob], [alice], [alice]) + ]) + + WITH_MITM([alice], [=carol_from_alice], [carol], [=alice_from_carol], [ + ESTABLISH([alice], [alice], [], + [carol], [carol], [-mobile], + [$alice_from_carol], [$carol_from_alice]) + ]) + + WITH_MITM([alice], [$bob_from_alice], [bob], [$alice_from_bob], [ + WITH_MITM([alice], [$carol_from_alice], [carol], [$alice_from_carol], [ + COMMS_EPING([bob], [bob], [alice], [alice]) + COMMS_EPING([carol], [carol], [alice], [alice]) + COMMS_SLIP([bob], [bob], [alice], [alice]) + COMMS_SLIP([carol], [carol], [alice], [alice]) + ])]) + + WITH_MITM([alice], [$carol_from_alice], [bob], [$alice_from_bob], [ + WITH_MITM([alice], [$bob_from_alice], [carol], [$alice_from_carol], [ + COMMS_EPING([bob], [bob], [alice], [alice]) + COMMS_EPING([carol], [carol], [alice], [alice]) + COMMS_SLIP([bob], [bob], [alice], [alice]) + COMMS_SLIP([carol], [carol], [alice], [alice]) + ])]) wait +]) + +AT_CLEANUP + +###-------------------------------------------------------------------------- +### Adverse communication. + +AT_SETUP([server retry]) +AT_KEYWORDS([backoff]) +export TRIPE_SLIPIF=USLIP + +for i in alice bob; do (mkdir $i; cd $i; SETUPDIR([beta])); done - ## Check encrypted pinging. - AT_CHECK([TRIPECTL -dalice EPING bob],, [ignore]) - AT_CHECK([TRIPECTL -dbob EPING not-alice],, [ignore]) +WITH_2TRIPES([alice], [bob], [-nslip], [-talice], [-tbob], [ + + ## Set up the evil proxy. + mknod pipe-mitmpid p + WITH_STRACE([mitm], + [sh -c 'echo $$ >pipe-mitmpid; exec "$@"' - \ + MITM -kalice/keyring.pub >mitm.out 2>mitm.err \ + peer:alice:\?alice.mitm:127.0.0.1:$(cat alice/port) \ + peer:bob:\?bob.mitm:127.0.0.1:$(cat bob/port) \ + filt:drop:5 filt:send])& + read mitmpid &- - ## Check that packets can flow from one to the other. - AT_CHECK([echo "from alice" | USLIP -p alice/bob]) - AT_CHECK([USLIP -g bob/not-alice],, [from alice[]nl]) + ## Try to establish keys anyway. + AWAIT_KXDONE([alice], [alice], [bob], [bob], [ + AT_CHECK([TRIPECTL -dalice ADD -cork bob INET 127.0.0.1 $alicemitm]) + AT_CHECK([TRIPECTL -dbob ADD alice INET 127.0.0.1 $bobmitm]) + ]) - AT_CHECK([echo "from bob" | USLIP -p bob/not-alice]) - AT_CHECK([USLIP -g alice/bob],, [from bob[]nl]) + ## Check pinging. + COMMS_EPING([alice], [alice], [bob], [bob], [10]) + COMMS_EPING([bob], [bob], [alice], [alice], [10]) + + ## Tear down the MITM proxy. + kill $mitmpid +]) + +AT_CLEANUP + +###-------------------------------------------------------------------------- +### Key management. + +AT_SETUP([server key-management]) +AT_KEYWORDS([keymgmt]) +export TRIPE_SLIPIF=USLIP + +## Determine all of the nets and the principals. +princs="" +nets=" " +while read princ pnets; do + princs="$princs $princ" + for n in $pnets; do + case " $nets " in *" $n "*) ;; *) nets="$nets$n " ;; esac + done +done <&2 "SVCCLAIM failed: $line" + echo >&2 "SVCCLAIM failed: $line" exit 1 ;; esac - echo ok >svc-test-running + echo "ok" >svc-test-running while read line; do set -- $line case "$[]1,$[]3,$[]4" in SVCJOB,test,HELP) - echo SVCINFO try not to use this service for anything useful - echo SVCOK $[]2 + echo "SVCINFO try not to use this service for anything useful" + echo "SVCOK $[]2" ;; SVCJOB,test,GOOD) - echo SVCOK $[]2 + echo "SVCOK $[]2" ;; SVCJOB,test,BAD) - echo SVCFAIL $[]2 this-command-always-fails + echo "SVCFAIL $[]2 this-command-always-fails" ;; SVCJOB,test,UGLY) tag=$2 @@ -295,7 +703,7 @@ WITH_TRIPE(, [ case "$[]1,$[]2,$[]3,$[]4" in SVCCANCEL,$tag,,) break ;; SVCJOB,*,test,ESCAPE) - echo >&2 "attempt to escape from alkatraz" + echo >&2 "attempt to escape from alkatraz" exit 1 ;; esac @@ -305,11 +713,11 @@ WITH_TRIPE(, [ firsttag=$[]2 ;; SVCJOB,test,SECOND) - echo SVCOK $firsttag - echo SVCOK $[]2 + echo "SVCOK $firsttag" + echo "SVCOK $[]2" ;; SVCJOB,*) - echo SVCFAIL $[]2 unknown-svc-command $[]4 + echo "SVCFAIL $[]2 unknown-svc-command $[]4" ;; SVCCLAIM,*) break @@ -359,4 +767,87 @@ WITH_TRIPE(, [ AT_CLEANUP +###-------------------------------------------------------------------------- +### Knock and bye. + +AT_SETUP([server knock]) +AT_KEYWORDS([knock]) +export TRIPE_SLIPIF=USLIP + +for i in alice bob; do (mkdir $i; cd $i; SETUPDIR([gamma])); done + +WITH_2TRIPES([alice], [bob], [-nslip], [-talice], [-tbob], [ + WITH_MITM([alice], [=bob_from_alice], [bob], [=alice_from_bob], [ + + COPROCESSES([wait-knock], [ + echo WATCH +n + while read line; do + set x $line; shift + echo >&2 ">>> $line" + case "$1:$2:$3" in + OK::) ;; + NOTE:KNOCK:bob) shift 3; echo "$*" >knock-addr; break ;; + NOTE:* | TRACE:* | WARN:*) ;; + *) exit 63 ;; + esac + done + ], [ + TRIPECTL -dalice + ])& waiter=$! + + AT_CHECK([TRIPECTL -dbob ADD -knock bob -ephemeral alice INET 127.0.0.1 $alice_from_bob]) + + wait $waiter; waitrc=$? + AT_CHECK([echo $waitrc],, [0[]nl]) + AT_CHECK_UNQUOTED([cat knock-addr],, [INET 127.0.0.1 $bob_from_alice[]nl]) + + AWAIT_KXDONE([alice], [alice], [bob], [bob], [ + AT_CHECK([TRIPECTL -dalice ADD -ephemeral bob INET 127.0.0.1 $bob_from_alice]) + ]) + + COMMS_EPING([alice], [alice], [bob], [bob]) + COMMS_SLIP([alice], [alice], [bob], [bob]) + ]) + + WITH_MITM([alice], [=new_bob_from_alice], [bob], [$alice_from_bob], [ + AWAIT_KXDONE([alice], [alice], [bob], [bob], [ + AT_CHECK([TRIPECTL -dalice FORCEKX bob]) + AT_CHECK([TRIPECTL -dbob FORCEKX alice]) + ]) + + AT_CHECK([TRIPECTL -dbob KILL alice]) + AT_CHECK([TRIPECTL -dalice LIST],, []) + ]) +]) + +AT_CLEANUP + +###-------------------------------------------------------------------------- +### Key-exchange ad bulk crypto round trip. + +AT_SETUP([server roundtrip]) +AT_KEYWORDS([roundtrip]) + +while read label genalg paramalg spec; do + paramopts=${spec%--*} attrs=${spec#*--} + key -kkeyring.$label add -a$paramalg -eforever $paramopts -tparam tripe-param $attrs + key -kkeyring.$label add -a$genalg -pparam -eforever -talice tripe + key -kkeyring.$label extract -f-secret keyring.$label-pub + { sh -c "echo $$"; date; } >msg + AT_CHECK([BULKTEST -kkeyring.$label -talice \ + ies-encrypt 99 "$(cat msg)nl"], [0], [stdout], [stderr]) + cp msg expout; mv stdout ct + AT_CHECK([BULKTEST -kkeyring.$label -talice \ + ies-decrypt 99 "$(cat ct)"], [0], [expout], [stderr]) +done <