3 ### Test script for the main server
5 ### (c) 2008 Straylight/Edgeware
8 ###----- Licensing notice ---------------------------------------------------
10 ### This file is part of Trivial IP Encryption (TrIPE).
12 ### TrIPE is free software; you can redistribute it and/or modify
13 ### it under the terms of the GNU General Public License as published by
14 ### the Free Software Foundation; either version 2 of the License, or
15 ### (at your option) any later version.
17 ### TrIPE is distributed in the hope that it will be useful,
18 ### but WITHOUT ANY WARRANTY; without even the implied warranty of
19 ### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 ### GNU General Public License for more details.
22 ### You should have received a copy of the GNU General Public License
23 ### along with TrIPE; if not, write to the Free Software Foundation,
24 ### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
29 ## Configure a directory ready for use by tripe.
30 m4_define([SETUPDIR], [
31 cp $abs_top_srcdir/t/keyring-$1 ./keyring
32 key extract -f-secret keyring.pub
35 ## Running standard programs with useful options.
37 [env TRIPE_PRIVHELPER=$abs_top_builddir/priv/tripe-privhelper \
38 $abs_top_builddir/server/tripe -F -d. -aadmin -p0 -b127.0.0.1 -talice])
39 m4_define([TRIPECTL], [$abs_top_builddir/client/tripectl -d. -aadmin])
40 m4_define([USLIP], [$abs_top_builddir/uslip/tripe-uslip])
42 [$abs_top_builddir/pkstream/pkstream -b127.0.0.1 -p127.0.0.1])
43 m4_define([MITM], [$abs_top_builddir/proxy/tripe-mitm])
45 ## WITH_STRACE(tag, cmd)
47 ## There's an awful hack here. If a process running under strace exits with
48 ## a signal, then strace will kill itself with the same signal -- and
49 ## therefore clobber the original process's core file. So we arrange to run
50 ## strace in one directory and have the child process run in another.
51 m4_define([WITH_STRACE],
52 [case "${TRIPE_TEST_STRACE-nil}" in
57 mkdir -p strace-hack.$1/
58 (ulimit -c hard >/dev/null 2>&1
59 sh -c 'cd strace-hack.$1; exec "$[]@"' - \
60 strace -f -o../$1.trace \
61 sh -c 'cd ..; exec "$[]@"' - \
66 ## Sequences. (These are used for testing the replay protection machinery.)
67 m4_define([R32], [ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 dnl
68 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31])
69 m4_define([P32], [21 26 14 12 25 18 2 27 10 31 24 29 0 20 17 11 dnl
70 8 3 7 23 19 1 13 30 6 9 5 22 15 28 16 4])
72 ###--------------------------------------------------------------------------
73 ### Scaffolding for running a TrIPE server.
75 ## WITH_TRIPEX(dir, args, body)
76 m4_define([WITH_TRIPEX], [
78 ## If this directory doesn't exist then Bad Things will happen.
80 echo >&2 "server directory \`$1' doesn't exist"
84 ## Remove the status file. This is how we notice that the server's died.
85 rm -f $1/server-status
86 > $1/expected-server-output
87 > $1/expected-server-errors
89 ## Autotest writes crap to standard output, which we don't want going to the
90 ## server. So keep a copy of the standard output, do the pipe, and recover
91 ## the old stdout inside the group.
96 ## Wait for the socket to appear. Watch for the server crashing during
97 ## initialization. Busy waiting is evil, but it's the best I can do and
98 ## not sleep for ages. (Yes, a second on each test group is a long time.)
99 while test ! -r $1/server-status && test ! -S $1/admin; do :; done
101 ## Make the port number availale.
102 AT_CHECK([TRIPECTL -d$1 PORT],, [stdout])
108 ## End of the test, now run the server.
112 WITH_STRACE([tripe], [TRIPE $2 >server-output.full 2>server-errors.full])
114 echo $stat >server-status
115 if test $stat -ne 0; then
116 echo "exit status: $stat" >>server-errors.full
118 grep -v '^+ tripe: ' server-errors.full >server-errors
120 ## We interrupt this relatively sensible macro for an especially awful
121 ## hack. The tripe server emits warnings which are often caused by lack of
122 ## synchronization between two peers. These are harmless and shouldn't
123 ## cause test failures. But we shouldn't just trim out all messages that
124 ## look like the spurious ones: if they appear when we're not expecting
125 ## them, that's bad and they should properly cause a test failure.
127 ## So we use the WARN command to insert magic directives into the server's
128 ## message stream. The directives begin with `WARN USER test'; remaining
129 ## tokens may be as follows.
131 ## PUSH Introduce a new layer of nesting. Settings between
132 ## this PUSH and the matching POP will be forgotten
133 ## following the POP.
135 ## POP End a layer of nesting. See PUSH above.
137 ## IGNORE tokens Ignore lines which begin with the tokens.
139 ## Token comparison isn't done very well, but it's good enough for these
142 ## We also trim out trace lines here, since it's useful to produce them for
143 ## debugging purposes and changing or introducing more of them shouldn't
150 $[]1 == "TRACE" { next; }
151 $[]1 == "WARN" && $[]2 == "USER" && $[]3 == "test" {
153 npatstk[[sp++]] = npat;
154 else if ($[]4 == "IGNORE") {
157 for (i = 5; i <= NF; i++) {
162 } else if ($[]4 == "POP")
163 npat = npatstk[[--sp]];
167 for (i = 0; i < npat; i++) {
168 n = length(pat[[i]]);
169 if (substr($[]0, 1, n) == pat[[i]])
174 ' server-output.full >server-output
178 ## Now check that the server's output matches our expectations.
179 mv $1/expected-server-output expout
180 mv $1/expected-server-errors experr
181 AT_CHECK([cat $1/server-output; cat >&2 $1/server-errors],,
185 ## WITH_TRIPE(args, body)
186 m4_define([WITH_TRIPE], [WITH_TRIPEX([.], [$1], [$2])])
188 ## WITH_2TRIPES(adir, bdir, bothargs, aargs, bargs, body)
189 m4_define([WITH_2TRIPES],
190 [WITH_TRIPEX([$1], [$3 $4], [WITH_TRIPEX([$2], [$3 $5], [$6])])])
192 ## WITH_3TRIPES(adir, bdir, cdir, allargs, aargs, bargs, cargs, body)
193 m4_define([WITH_3TRIPES],
194 [WITH_TRIPEX([$1], [$4 $5],
195 [WITH_TRIPEX([$2], [$4 $6],
196 [WITH_TRIPEX([$3], [$4 $7],
202 while test $n -lt $1; do
211 ## COMMS_EPING(adir, aname, bdir, bname, [n])
212 m4_define([COMMS_EPING], [
213 AT_CHECK([RETRY([m4_default([$5], [1])],
214 [TRIPECTL -d$1 EPING $4])],, [ignore])
215 AT_CHECK([RETRY([m4_default([$5], [1])],
216 [TRIPECTL -d$3 EPING $2])],, [ignore])
219 ## COMMS_SLIP(adir, aname, bdir, bname)
220 m4_define([COMMS_SLIP], [
221 AT_CHECK([echo "from $1" | USLIP -p $1/$4])
222 AT_CHECK([USLIP -g $3/$2],, [from $1[]nl])
223 AT_CHECK([echo "from $3" | USLIP -p $3/$2])
224 AT_CHECK([USLIP -g $1/$4],, [from $3[]nl])
227 ## AWAIT_KXDONE(adir, aname, bdir, bname, body)
228 m4_define([AWAIT_KXDONE], [
230 ## Ignore some reports caused by races.
232 TRIPECTL -d$d WARN test PUSH
233 TRIPECTL -d$d WARN test IGNORE WARN KX $2 incorrect cookie
234 TRIPECTL -d$d WARN test IGNORE WARN KX $2 unexpected pre-challenge
235 TRIPECTL -d$d WARN test IGNORE WARN KX $2 unexpected challenge
238 ## Watch for the key-exchange completion announcement in the background.
239 COPROCESSES([wait-$1], [
244 case "$[]1:$[]2:$[]3" in
246 NOTE:KXDONE:$4) break ;;
257 ## Collect the completion announcement.
258 wait $waiter_$1; waitrc=$?
259 AT_CHECK([echo $waitrc],, [0[]nl])
261 ## Be interested in key-exchange warnings again.
262 for d in $1 $3; do TRIPECTL -d$d WARN test POP; done
265 ## ESTABLISH(adir, aname, aopts, bdir, bname, bopts, [aport], [bport])
266 m4_define([ESTABLISH], [
268 ## Set up the establishment.
269 AWAIT_KXDONE([$1], [$2], [$4], [$5], [
270 AT_CHECK([TRIPECTL -d$1 ADD -cork $6 $5 INET 127.0.0.1 \
271 m4_if([$8], [], [$(cat $4/port)], [$8])])
272 AT_CHECK([TRIPECTL -d$4 ADD $3 $2 INET 127.0.0.1 \
273 m4_if([$7], [], [$(cat $1/port)], [$7])])
276 ## Check transport pinging.
277 AT_CHECK([TRIPECTL -d$1 PING $5],, [ignore])
278 AT_CHECK([TRIPECTL -d$4 PING $2],, [ignore])
280 ## Check communication works.
281 COMMS_EPING([$1], [$2], [$4], [$5])
282 COMMS_SLIP([$1], [$2], [$4], [$5])
285 ###--------------------------------------------------------------------------
286 ### Very unpleasant coprocess handling.
288 ## COPROCESSES(TAG, PROC-A, PROC-B)
289 m4_define([COPROCESSES], [dnl
290 rm -f pipe-$1; mknod pipe-$1 p
291 { { $2 nl } <pipe-$1 | { $3 nl } >pipe-$1; } dnl
294 ## TRIPECTL_INTERACT(ARGS, SHELLSTUFF)
295 m4_define([TRIPECTL_INTERACT], [
297 COPROCESSES([client], [exec 4>&1 1>&3 $1], [TRIPECTL $2])
300 ## TRIPECTL_COMMAND(CMD, EXPECT)
301 m4_define([TRIPECTL_COMMAND], [
303 m4_if([$1], [!], [:], [echo "$1" >&4])
307 *) echo 2>&1 "submitted $1: expected $2, found $line"; exit 1 ;;
313 ###--------------------------------------------------------------------------
314 ### Make sure the thing basically works.
316 AT_SETUP([server basics])
318 AT_CHECK([echo port | TRIPE -p54321],, [INFO 54321[]nl[]OK[]nl])
321 ###--------------------------------------------------------------------------
324 AT_SETUP([server challenges])
330 AT_CHECK([chal=$(TRIPECTL GETCHAL); TRIPECTL checkchal $chal])
332 ## A wrong challenge. (This was valid once, but the probablity that the
333 ## server chose the same key is negligible.)
334 AT_CHECK([TRIPECTL checkchal AAAAAHyoOL+HMaE0Y9B3ivuszt0], [1],,
335 [tripectl: invalid-challenge[]nl])
336 echo WARN CHAL incorrect-tag >>expected-server-output
338 ## A duplicated challenge.
340 chal=$(TRIPECTL GETCHAL)
341 TRIPECTL CHECKCHAL $chal
342 TRIPECTL CHECKCHAL $chal
343 ], [1],, [tripectl: invalid-challenge[]nl])
344 echo WARN CHAL replay duplicated-sequence >>expected-server-output
346 ## Out-of-order reception. There should be a window of 32 challenges; we
347 ## make 33 and check them in a strange order.
349 echo "tripectl: invalid-challenge" >>experr
350 echo "WARN CHAL replay old-sequence" >>expected-server-output
352 echo "tripectl: invalid-challenge" >>experr
353 echo "WARN CHAL replay duplicated-sequence" >>expected-server-output
357 ## Make the challenges.
358 for i in old R32; do TRIPECTL GETCHAL >chal-$i || exit 2; done
360 ## Now check them back.
361 for i in P32; do TRIPECTL CHECKCHAL $(cat chal-$i) || exit 3; done
363 ## Check the one which should have fallen off the front.
364 TRIPECTL CHECKCHAL $(cat chal-old) && exit 4
366 ## And make sure that the others are now considered duplicates.
367 for i in R32; do TRIPECTL CHECKCHAL $(cat chal-$i) && exit 5; done
369 ## All done: tidy cruft away.
377 ###--------------------------------------------------------------------------
380 AT_SETUP([server communication])
382 export TRIPE_SLIPIF=USLIP
384 for k in alpha beta-new; do
385 for p in alice bob; do (
386 rm -rf $p; mkdir $p; cd $p; SETUPDIR([$k])
388 WITH_2TRIPES([alice], [bob], [-nslip], [-talice], [-tbob], [
389 ESTABLISH([alice], [not-alice], [-key alice],
396 ###--------------------------------------------------------------------------
397 ### Mobile peer tracking.
399 AT_SETUP([peer tracking])
400 AT_KEYWORDS([mobile])
401 export TRIPE_SLIPIF=USLIP
403 for p in alice bob carol; do (mkdir $p; cd $p; SETUPDIR([alpha])); done
405 ## WITH_PKSTREAM(adir, aport, bdir, bport, body)
406 m4_define([WITH_PKSTREAM], [
407 echo >&2 "pkstream: $1 <--> :$2 <-pkstream-> :$4 <--> $3"
408 PKSTREAM -l$4 127.0.0.1:$4 127.0.0.1:$(cat $3/port)& pkstream_$3_$1=$!
410 PKSTREAM -c127.0.0.1:$4 127.0.0.1:$2 127.0.0.1:$(cat $1/port)&
414 kill $pkstream_$3_$1 $pkstream_$1_$3
417 WITH_3TRIPES([alice], [bob], [carol], [-nslip],
418 [-talice], [-tbob], [-tcarol], [
420 ## We need an indirection layer between the two peers so that we can
421 ## simulate the effects of NAT remapping. The nearest thing we have to
422 ## this is pkstream, so we may as well use that.
424 ## alice <--> :5311 <-pkstream-> :5312 <--> bob
425 ## alice <--> :5321 <-pkstream-> :5322 <--> carol
427 WITH_PKSTREAM([alice], [5311], [bob], [5312], [
428 ESTABLISH([alice], [alice], [], [bob], [bob], [-mobile], [5312], [5311])
431 WITH_PKSTREAM([alice], [5319], [bob], [5312], [
432 COMMS_EPING([bob], [bob], [alice], [alice])
433 COMMS_SLIP([bob], [bob], [alice], [alice])
436 WITH_PKSTREAM([alice], [5321], [carol], [5322], [
437 ESTABLISH([alice], [alice], [], [carol], [carol], [-mobile],
441 WITH_PKSTREAM([alice], [5311], [bob], [5312], [
442 WITH_PKSTREAM([alice], [5321], [carol], [5322], [
443 COMMS_EPING([bob], [bob], [alice], [alice])
444 COMMS_EPING([carol], [carol], [alice], [alice])
445 COMMS_SLIP([bob], [bob], [alice], [alice])
446 COMMS_SLIP([carol], [carol], [alice], [alice])
449 WITH_PKSTREAM([alice], [5321], [bob], [5312], [
450 WITH_PKSTREAM([alice], [5311], [carol], [5322], [
451 COMMS_EPING([bob], [bob], [alice], [alice])
452 COMMS_EPING([carol], [carol], [alice], [alice])
453 COMMS_SLIP([bob], [bob], [alice], [alice])
454 COMMS_SLIP([carol], [carol], [alice], [alice])
461 ###--------------------------------------------------------------------------
462 ### Adverse communication.
464 AT_SETUP([server retry])
465 AT_KEYWORDS([backoff])
466 export TRIPE_SLIPIF=USLIP
468 for i in alice bob; do (mkdir $i; cd $i; SETUPDIR([beta])); done
470 WITH_2TRIPES([alice], [bob], [-nslip], [-talice], [-tbob], [
472 ## Set up the evil proxy.
473 alicemitm=24516 bobmitm=14016
474 MITM -kalice/keyring.pub >mitm.out 2>mitm.err \
475 peer:alice:$alicemitm:127.0.0.1:$(cat alice/port) \
476 peer:bob:$bobmitm:127.0.0.1:$(cat bob/port) \
477 filt:drop:5 filt:send& mitmpid=$!
478 strace -omitm.trace -p$mitmpid& mitmtrace=$!
479 trap 'kill $mitmpid $mitmtrace; exit 127' EXIT INT QUIT TERM HUP
481 ## Try to establish keys anyway.
482 AWAIT_KXDONE([alice], [alice], [bob], [bob], [
483 AT_CHECK([TRIPECTL -dalice ADD -cork bob INET 127.0.0.1 $alicemitm])
484 AT_CHECK([TRIPECTL -dbob ADD alice INET 127.0.0.1 $bobmitm])
488 COMMS_EPING([alice], [alice], [bob], [bob], [10])
489 COMMS_EPING([bob], [bob], [alice], [alice], [10])
491 ## Tear down the MITM proxy.
499 ###--------------------------------------------------------------------------
502 AT_SETUP([server key-management])
503 AT_KEYWORDS([keymgmt])
504 export TRIPE_SLIPIF=USLIP
506 ## Determine all of the nets and the principals.
509 while read princ pnets; do
510 princs="$princs $princ"
512 case " $nets " in *" $n "*) ;; *) nets="$nets$n " ;; esac
520 ## Build the master keyring. All key tags here are of the form PRINC/NET.
522 key -k$abs_top_srcdir/t/keyring-$n extract keyring-$n $princs
523 for p in $princs; do key -kkeyring-$n tag $p $p/$n; done
527 key extract -f-secret keyring.pub
529 ## Set up the principals' directories.
532 cp keyring keyring.pub $p/
535 WITH_3TRIPES([alice], [bob], [carol], [-nslip -Tmx],
536 [-talice/alpha], [-tbob/alpha], [-tcarol/beta], [
538 ## Establish this little merry-go-round.
539 ESTABLISH([alice], [alice], [-key alice/alpha],
540 [bob], [bob], [-key bob/alpha])
541 ESTABLISH([alice], [alice], [-key alice/beta],
542 [carol], [carol], [-priv alice/beta -key carol/beta])
543 ESTABLISH([bob], [bob], [-key bob/beta],
544 [carol], [carol], [-priv bob/beta -key carol/beta])
546 ## Tweak Bob's alpha key.
548 TRIPECTL -d$p WARN test COMMENT tweak bob/alpha
551 key -k$abs_top_srcdir/t/keyring-alpha extract keyring-bob-new bob-new
552 key merge keyring-bob-new
553 key tag -r bob-new bob/alpha
554 key extract -f-secret keyring.pub
555 for p in alice bob; do cp keyring keyring.pub $p/; done
557 ## Kick the peers to see whether they update.
558 AWAIT_KXDONE([alice], [alice], [bob], [bob], [
559 TRIPECTL -dalice RELOAD
560 TRIPECTL -dbob RELOAD
561 TRIPECTL -dalice FORCEKX bob
562 TRIPECTL -dbob FORCEKX alice
565 COMMS_EPING([alice], [alice], [bob], [bob])
566 COMMS_EPING([bob], [bob], [alice], [alice])
568 ## Update the beta ring.
569 key merge $abs_top_srcdir/t/keyring-beta-new
570 for p in $princs; do key tag -r $p $p/beta; done
571 key extract -f-secret keyring.pub
573 ## Update alice's and carol's private keys, bob's public. This should be
574 ## insufficient for them to switch, but the results could be interesting.
576 TRIPECTL -d$p WARN test COMMENT tweak beta step 1
579 for p in alice carol; do cp keyring $p/; done
581 for p in $princs; do TRIPECTL -d$p RELOAD; done
583 AT_DATA([algs-alpha], [dnl
584 kx-group=ec kx-group-order-bits=256 kx-group-elt-bits=512
585 hash=rmd160 mgf=rmd160-mgf hash-sz=20
586 bulk-transform=v0 bulk-overhead=22
587 cipher=blowfish-cbc cipher-keysz=20 cipher-blksz=8
588 cipher-data-limit=67108864
589 mac=rmd160-hmac mac-keysz=20 mac-tagsz=10
592 AT_DATA([algs-beta-old], [dnl
593 kx-group=prime kx-group-order-bits=160 kx-group-elt-bits=1023
594 hash=rmd160 mgf=rmd160-mgf hash-sz=20
595 bulk-transform=v0 bulk-overhead=22
596 cipher=blowfish-cbc cipher-keysz=20 cipher-blksz=8
597 cipher-data-limit=67108864
598 mac=rmd160-hmac mac-keysz=20 mac-tagsz=10
601 AT_DATA([algs-beta-new], [dnl
602 kx-group=ec kx-group-order-bits=161 kx-group-elt-bits=320
603 hash=rmd160 mgf=rmd160-mgf hash-sz=20
604 bulk-transform=iiv bulk-overhead=14
605 cipher=blowfish-cbc cipher-keysz=20 cipher-blksz=8
606 cipher-data-limit=67108864
607 mac=rmd160-hmac mac-keysz=20 mac-tagsz=10
608 blkc=blowfish blkc-keysz=20 blkc-blksz=8
611 cp algs-alpha expout; AT_CHECK([TRIPECTL -dalice ALGS],, [expout])
612 cp algs-beta-old expout; AT_CHECK([TRIPECTL -dalice ALGS carol],, [expout])
613 cp algs-beta-old expout; AT_CHECK([TRIPECTL -dbob ALGS carol],, [expout])
614 cp algs-beta-new expout; AT_CHECK([TRIPECTL -dcarol ALGS],, [expout])
615 cp algs-beta-old expout; AT_CHECK([TRIPECTL -dcarol ALGS alice],, [expout])
617 ## Now copy the full keys. We expect this to provoke key exchange.
619 TRIPECTL -d$p WARN test COMMENT tweak beta step 2
622 for p in $princs; do cp keyring keyring.pub $p/; done
624 AWAIT_KXDONE([alice], [alice], [carol], [carol], [
625 TRIPECTL -dalice RELOAD
626 AWAIT_KXDONE([bob], [bob], [carol], [carol], [
627 TRIPECTL -dbob RELOAD
628 TRIPECTL -dcarol RELOAD
632 cp algs-alpha expout; AT_CHECK([TRIPECTL -dalice ALGS],, [expout])
633 cp algs-beta-new expout; AT_CHECK([TRIPECTL -dalice ALGS carol],, [expout])
634 cp algs-beta-new expout; AT_CHECK([TRIPECTL -dbob ALGS carol],, [expout])
635 cp algs-beta-new expout; AT_CHECK([TRIPECTL -dcarol ALGS],, [expout])
640 ###--------------------------------------------------------------------------
643 AT_SETUP([server services])
649 ## Make sure it's not running yet.
650 AT_CHECK([TRIPECTL SVCENSURE test], [1],,
651 [tripectl: unknown-service test[]nl])
653 ## Run a simple service.
654 rm -f svc-test-running tripectl-status
656 echo SVCCLAIM test 1.0.0
662 echo >&2 "SVCCLAIM failed: $line"
666 echo ok >svc-test-running
669 case "$[]1,$[]3,$[]4" in
671 echo SVCINFO try not to use this service for anything useful
678 echo SVCFAIL $[]2 this-command-always-fails
684 case "$[]1,$[]2,$[]3,$[]4" in
685 SVCCANCEL,$tag,,) break ;;
686 SVCJOB,*,test,ESCAPE)
687 echo >&2 "attempt to escape from alkatraz"
701 echo SVCFAIL $[]2 unknown-svc-command $[]4
709 echo "failure in service: $line" >&2
714 TRIPECTL; echo $? >tripectl-status
715 ]) 2>tripectl-errors &
717 ## Wait until it starts up.
718 while test ! -r svc-test-running && test ! -r tripectl-status; do :; done
720 ## Make sure it's running.
721 AT_CHECK([TRIPECTL SVCQUERY test],, [name=test version=1.0.0[]nl])
723 ## Try some simple commands.
724 AT_CHECK([TRIPECTL SVCSUBMIT test GOOD])
725 AT_CHECK([TRIPECTL SVCSUBMIT test BAD], [1],,
726 [tripectl: this-command-always-fails[]nl])
728 ## And now with commands in the background.
730 TRIPECTL_COMMAND([SVCSUBMIT test GOOD], [OK])
731 TRIPECTL_COMMAND([SVCSUBMIT -background foo test UGLY], [BGDETACH foo])
732 TRIPECTL_COMMAND([BGCANCEL foo], [OK])
733 TRIPECTL_COMMAND([SVCSUBMIT test ESCAPE],
734 [FAIL unknown-svc-command ESCAPE])
737 ## Out-of-order completion.
739 TRIPECTL_COMMAND([SVCSUBMIT -background one test FIRST], [BGDETACH one])
740 TRIPECTL_COMMAND([SVCSUBMIT -background two test SECOND], [BGDETACH two])
741 TRIPECTL_COMMAND([!], [BGOK one])
742 TRIPECTL_COMMAND([!], [BGOK two])
751 ###----- That's all, folks --------------------------------------------------