#!/bin/bash # added 2018-04-27 by alorbach # This file is part of the rsyslog project, released under ASL 2.0 # # List available valid OpenSSL Engines for defaultopensslengine with this command: # openssl engine -t # . ${srcdir:=.}/diag.sh init export NUMMESSAGES=100000 # uncomment for debugging support: #export RSYSLOG_DEBUG="debug nostdout noprintmutexaction" #export RSYSLOG_DEBUGLOG="$RSYSLOG_DYNNAME.receiver.debuglog" generate_conf add_conf ' global( defaultNetstreamDriverCAFile="'$srcdir/tls-certs/ca.pem'" defaultNetstreamDriverCertFile="'$srcdir/tls-certs/cert.pem'" defaultNetstreamDriverKeyFile="'$srcdir/tls-certs/key.pem'" defaultopensslengine="rdrand" debug.whitelist="on" debug.files=["net_ossl.c", "nsd_ossl.c", "tcpsrv.c", "nsdsel_ossl.c", "nsdpoll_ptcp.c", "dnscache.c"] ) module( load="../plugins/imtcp/.libs/imtcp" StreamDriver.Name="ossl" StreamDriver.Mode="1" StreamDriver.AuthMode="anon" gnutlsPriorityString="Protocol=-ALL,TLSv1.3,TLSv1.2 Ciphersuites=TLS_AES_256_GCM_SHA384 " ) input(type="imtcp" port="0" listenPortFileName="'$RSYSLOG_DYNNAME'.tcpflood_port") template(name="outfmt" type="string" string="%msg:F,58:2%\n") :msg, contains, "msgnum:" action( type="omfile" template="outfmt" file=`echo $RSYSLOG_OUT_LOG`) ' # SignatureAlgorithms=RSA+SHA384 # Begin actual testcase startup tcpflood -p$TCPFLOOD_PORT -d8192 -m$NUMMESSAGES -Ttls -x$srcdir/tls-certs/ca.pem -Z$srcdir/tls-certs/cert.pem -z$srcdir/tls-certs/key.pem wait_file_lines shutdown_when_empty wait_shutdown seq_check exit_test