diff options
author | Niranjan Mallapadi <mrniranjan@redhat.com> | 2014-11-26 17:40:05 +0530 |
---|---|---|
committer | Niranjan Mallapadi <mrniranjan@redhat.com> | 2014-11-26 17:41:21 +0530 |
commit | e1b4f5b01e2632e24e6d13ce6f7381c5f7e9b293 (patch) | |
tree | 737911aa85d973ada62beb09c81966db88b481a1 /tests/dogtag | |
parent | cfeb77bb5d79f0e131948e864a1dcba2451758f6 (diff) | |
download | pki-e1b4f5b01e2632e24e6d13ce6f7381c5f7e9b293.tar.gz pki-e1b4f5b01e2632e24e6d13ce6f7381c5f7e9b293.tar.xz pki-e1b4f5b01e2632e24e6d13ce6f7381c5f7e9b293.zip |
Replace /dev/urandom with openssl rand
Diffstat (limited to 'tests/dogtag')
12 files changed, 33 insertions, 34 deletions
diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-find-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-find-ca.sh index d8f812915..f363e05be 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-find-ca.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-find-ca.sh @@ -70,7 +70,7 @@ run_pki-cert-find-ca_tests() local CA_adminR_user=$CA_INST\_adminR local CA_adminE_user=$CA_INST\_adminE local CA_agentE_user=$CA_INST\_agentE - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local i18n_user1_fullname="Örjan Äke $rand" local i18n_user1="Örjan_Äke_$rand" local i18n_user2_fullname="Éric Têko $rand" @@ -81,7 +81,7 @@ run_pki-cert-find-ca_tests() local i18n_user4="kakskümmend_üks_$rand" local i18n_user5_fullname="двадцять один тридцять $rand" local i18n_user5="двадцять_один_тридцять_$rand" - local tmp_junk_data=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 200 | head -n 1) + local tmp_junk_data=$(openssl rand -base64 50 | perl -p -e 's/\n//') local admin_cert_nickname="PKI Administrator for $CA_DOMAIN" local target_host=$(eval echo \$${cs_Role}) local target_port=$(eval echo \$${CA_INST}_UNSECURE_PORT) @@ -419,7 +419,7 @@ run_pki-cert-find-ca_tests() rlPhaseStartSetup "Create a new profile based on caServerCert with Netscape Extension nsCertSSLServer" local tmp_profile=caServerCert - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local tmp_new_sslserver_profile=caServerCert$rand rlLog "Get $tmp_profile xml file" rlRun "pki -d $CERTDB_DIR -h $target_host -p $target_port -n $CA_adminV_user -c $CERTDB_DIR_PASSWORD ca-profile-show $tmp_profile --output $TmpDir/$tmp_new_sslserver_profile-Temp1.xml" @@ -526,7 +526,7 @@ run_pki-cert-find-ca_tests() rlPhaseStartSetup "Create a new profile based on caServerCert with Netscape Extension nsCertSSLServer and nsCertSSLClient" local tmp_profile=caServerCert - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local tmp_new_server_client_profile=caServerCert$rand rlLog "Get $tmp_profile xml file" rlRun "pki -d $CERTDB_DIR -h $target_host -p $target_port -n $CA_adminV_user -c $CERTDB_DIR_PASSWORD ca-profile-show $tmp_profile --output $TmpDir/$tmp_new_server_client_profile-Temp1.xml" @@ -571,7 +571,7 @@ run_pki-cert-find-ca_tests() rlPhaseStartSetup "Create a new profile based on caOtherCert with Netscape Extension nsCertEmailCA" local tmp_profile=caOtherCert - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local tmp_new_emailca_profile=caOtherCert$rand rlLog "Get $tmp_profile xml file" rlRun "pki -d $CERTDB_DIR -h $target_host -p $target_port -n $CA_adminV_user -c $CERTDB_DIR_PASSWORD ca-profile-show $tmp_profile --output $TmpDir/$tmp_new_emailca_profile-Temp1.xml" @@ -678,7 +678,7 @@ run_pki-cert-find-ca_tests() rlPhaseStartSetup "Create a new profile based on caOtherCert with Netscape Extension nsCertSSLCA" local tmp_profile=caOtherCert - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local tmp_new_sslca_profile=caOtherCert$rand rlLog "Get $tmp_profile xml file" rlRun "pki -d $CERTDB_DIR -h $target_host -p $target_port -n $CA_adminV_user -c $CERTDB_DIR_PASSWORD ca-profile-show $tmp_profile --output $TmpDir/$tmp_new_sslca_profile-Temp1.xml" @@ -785,7 +785,7 @@ run_pki-cert-find-ca_tests() rlPhaseStartSetup "Create a new profile based on caOtherCert with Netscape Extension nsCertEmailCA and nsCertSSLCA" local tmp_profile=caOtherCert - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local tmp_new_email_ssl_ca_profile=caOtherCert$rand rlLog "Get $tmp_profile xml file" rlRun "pki -d $CERTDB_DIR -h $target_host -p $target_port -n $CA_adminV_user -c $CERTDB_DIR_PASSWORD ca-profile-show $tmp_profile --output $TmpDir/$tmp_new_email_ssl_ca_profile-Temp1.xml" @@ -3139,7 +3139,7 @@ run_pki-cert-find-ca_tests() rlPhaseEnd rlPhaseStartTest "pki_cert_find-0129: verify if search results are returned if a very large number is passed to --size" - local tmp_search_size=$(cat /dev/urandom | tr -dc '0-9' | fold -w 20 | head -n 1) + local tmp_search_size="12345678998765432112345678" rlLog "Executing pki cert-find --size $tmp_search_size" rlRun "pki -h $target_host -p $target_port cert-find --size $tmp_search_size > $cert_find_info 2>&1" 1,255 rlAssertGrep "NumberFormatException: For input string: \"$tmp_search_size\"" "$cert_find_info" diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-find-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-find-ca.sh index 7ab097086..0d08bc060 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-find-ca.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-find-ca.sh @@ -71,9 +71,9 @@ run_pki-cert-request-find-ca_tests() local target_https_port=$(eval echo \$${CA_INST}_SECURE_PORT) local tmp_ca_host=$(eval echo \$${cs_Role}) local target_host=$(eval echo \$${cs_Role}) - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local cert_request_submit="$TEMP_NSS_DB/pki-cert-request-submit.out" - local tmp_junk_data=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 200 | head -n 1) + local tmp_junk_data=$(openssl rand -base64 50 | perl -p -e 's/\n//') local profile=caUserCert # Config test of pki cert-request-find @@ -767,7 +767,7 @@ run_pki-cert-request-find-ca_tests() rlPhaseEnd rlPhaseStartTest "pki_cert_request_find-0020: Issue pki cert-request-find with --start <Maximum integer value>" - local tmp_large_number1=$(cat /dev/urandom | tr -dc '0-9' | fold -w 200 | head -n 1) + local tmp_large_number1="980112131313131333" rlLog "Executing pki cert-request-find --start $tmp_large_number1" rlRun "pki -d $CERTDB_DIR \ -h $target_host \ @@ -830,7 +830,7 @@ run_pki-cert-request-find-ca_tests() rlPhaseEnd rlPhaseStartTest "pki_cert_request_find-0024: Issue pki cert-request-find with --maxResults <maximum Integer value>" - local tmp_large_number1=$(cat /dev/urandom | tr -dc '0-9' | fold -w 50 | head -n 1) + local tmp_large_number1="986094212121" rlLog "Executing pki cert-request-find with --maxResults <no-value>" rlRun "pki -d $CERTDB_DIR \ -h $target_host \ diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-profile-find-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-profile-find-ca.sh index f93751cb6..d95833574 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-profile-find-ca.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-profile-find-ca.sh @@ -72,7 +72,7 @@ run_pki-cert-request-profile-find-ca_tests() local exp="$TmpDir/expfile.out" local expout="$TmpDir/exp_out" local certout="$TmpDir/cert_out" - local tmp_junk_data=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 200 | head -n 1) + local tmp_junk_data=$(openssl rand -base64 50 | perl -p -e 's/\n//') local i18n_user1="Örjan_Äke_$rand" local i18n_user2="Éric_Têko_$rand" local i18n_user3="éénentwintig_dvidešimt_$rand" @@ -82,7 +82,7 @@ run_pki-cert-request-profile-find-ca_tests() local tmp_ca_host=$(eval echo \$${cs_Role}) local target_port=$(eval echo \$${CA_INST}_UNSECURE_PORT) local target_host=$tmp_ca_host - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM rlPhaseStartTest "pki_cert_cli-configtest: pki cert-request-profile-find --help configuration test" diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-profile-show-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-profile-show-ca.sh index 770b61923..711d21083 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-profile-show-ca.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-profile-show-ca.sh @@ -81,7 +81,7 @@ run_pki-cert-request-profile-show-ca_tests() local tmp_ca_host=$(eval echo \$${cs_Role}) local target_host=$tmp_ca_host local target_port=$(eval echo \$${CA_INST}_UNSECURE_PORT) - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM rlPhaseStartTest "pki_cert_cli-configtest: pki cert-request-profile-show --help configuration test" rlRun "pki -h $target_host -p $target_port cert-request-profile-show --help 1> $cert_request_profile_show_info" 0 "pki -h $target_host -p $target_port cert-request-profile-show --help" diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-review-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-review-ca.sh index 5aeb9b08f..304abedef 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-review-ca.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-review-ca.sh @@ -71,10 +71,10 @@ run_pki-cert-request-review-ca_tests() local target_https_port=$(eval echo \$${CA_INST}_SECURE_PORT) local tmp_ca_host=$(eval echo \$${cs_Role}) local target_host=$tmp_ca_host - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local i18n_array=("Örjan Äke:Örjan_Äke" "Éric Têko:Éric_Têko" "éénentwintig dvidešimt:éénentwintig_dvidešimt" "kakskümmend üks:kakskümmend_üks" "двадцять один тридцять:двадцять_один_тридцять") local cert_request_submit="$TEMP_NSS_DB/pki-cert-request-submit.out" - local tmp_junk_data=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 200 | head -n 1) + local tmp_junk_data=$(openssl rand -base64 50 | perl -p -e 's/\n//') local exp="$TmpDir/expfile.out" local expout="$TmpDir/exp_out" local admin_cert_nickname="caadmincert" diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-submit-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-submit-ca.sh index 9a8917a45..804e21e93 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-submit-ca.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-cli-request-submit-ca.sh @@ -58,7 +58,7 @@ run_pki-cert-request-submit_tests() #local variables get_topo_stack $cs_Role $TmpDir/topo_file local CA_INST=$(cat $TmpDir/topo_file | grep MY_CA | cut -d= -f2) - local invalid_serialNumber=$(cat /dev/urandom | tr -dc '1-9' | fold -w 10 | head -n 1) + local invalid_serialNumber=$RANDOM local invalid_hex_serialNumber=0x$(echo "ibase=16;$invalid_serialNumber"|bc) local CA_agentV_user=$CA_INST\_agentV local CA_auditV_user=$CA_INST\_auditV @@ -73,7 +73,7 @@ run_pki-cert-request-submit_tests() local crmf_reqstatus local crmf_requestid local decimal_valid_serialNumber - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local cert_req_info="$TmpDir/cert_req_info.out" local target_host=$(eval echo \$${cs_Role}) local target_port=$(eval echo \$${CA_INST}_UNSECURE_PORT) @@ -358,7 +358,7 @@ run_pki-cert-request-submit_tests() rlPhaseEnd rlPhaseStartTest "pki_cert_request_submit-009: Submit a request using invalid xml file" - local invalid_data=$(cat /dev/urandom | tr -dc '0-9a-zA-Z' | fold -w 9000 | head -n 1) + local invalid_data=$(openssl rand -base64 50 | perl -p -e 's/\n//') rlRun "echo $invalid_data > $TmpDir/$rand-cert-profile.xml" rlRun "pki -h $target_host -p $target_port cert-request-submit $TmpDir/$rand-cert-profile.xml 2> $TmpDir/pki-cert-request-submit.out" 255 rlAssertGrep "Error: null" "$TmpDir/pki-cert-request-submit.out" diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-hold.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-hold.sh index f0008d96f..27590a796 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-hold.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-hold.sh @@ -64,17 +64,16 @@ run_pki-cert-hold-ca_tests() local TEMP_NSS_DB="$TmpDir/nssdb" local TEMP_NSS_DB_PWD="redhat123" local exp="$TmpDir/expfile.out" - local invalid_Number=$(cat /dev/urandom | tr -dc '1-9' | fold -w 10 | head -n 1) - local junk=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9?@\!~#*()*^*_' | fold -w 32 | head -n 1) + local invalid_Number=$RANDOM + local junk=$(openssl rand -base64 50 | perl -p -e 's/\n//') local expout="$TmpDir/exp_out" local certout="$TmpDir/cert_out" local cert_info="$TmpDir/cert_info" - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$RANDOM local target_https_port=$(eval echo \$${CA_INST}_SECURE_PORT) local tmp_ca_host=$(eval echo \$${cs_Role}) local target_host=$tmp_ca_host local target_port=$(eval echo \$${CA_INST}_UNSECURE_PORT) - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) # pki cert-hold config test rlPhaseStartTest "pki_cert_hold-configtest: pki cert-release-hold --help configuration test" diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-release-hold.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-release-hold.sh index 48d8e4369..0a2d8fa8c 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-release-hold.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-release-hold.sh @@ -63,8 +63,8 @@ run_pki-cert-release-hold-ca_tests() local TEMP_NSS_DB="$TmpDir/nssdb" local TEMP_NSS_DB_PWD="redhat123" local exp="$TmpDir/expfile.out" - local invalid_Number=$(cat /dev/urandom | tr -dc '1-9' | fold -w 10 | head -n 1) - local junk=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9?@\!~#*()*^*_' | fold -w 32 | head -n 1) + local invalid_Number=$RANDOM + local junk=$(openssl rand -base64 50 | perl -p -e 's/\n//') local temp_cert_out="$TmpDir/cert-request.out" local temp_out="$TmpDir/cert-request-show.out" local expout="$TmpDir/exp_out" diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-request-show.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-request-show.sh index 5d9e5fce7..c989ece0e 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-request-show.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-request-show.sh @@ -64,8 +64,8 @@ run_pki-cert-request-show-ca_tests() local TEMP_NSS_DB="$TmpDir/nssdb" local ret_reqstatus local ret_requestid - local invalid_requestid=$(cat /dev/urandom | tr -dc '0-9' | fold -w 10 | head -n 1) - local junk_requestid=$(cat /dev/urandom | tr -dc 'a-bA-Z0-9' | fold -w 40 | head -n 1) + local invalid_requestid=$RANDOM + local junk_requestid=$(openssl rand -base64 50 | perl -p -e 's/\n//') local temp_cert_out="$TmpDir/cert-request.out" local hex_invalid_upp_reqid=$(echo "obase=16;$invalid_requestid"|bc) local hex_invalid_requestid=0x"${hex_invalid_upp_reqid,,}" @@ -79,7 +79,7 @@ run_pki-cert-request-show-ca_tests() local target_https_port=$(eval echo \$${CA_INST}_SECURE_PORT) local tmp_ca_host=$(eval echo \$${cs_Role}) local target_host=$(eval echo \$${cs_Role}) - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$(openssl rand -base64 50 | perl -p -e 's/\n//') local profile=caUserCert diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-revoke.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-revoke.sh index 62260b046..6c7019781 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-revoke.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-revoke.sh @@ -60,11 +60,11 @@ run_pki-cert-revoke-ca_tests() local CA_adminR_user=$CA_INST\_adminR local CA_adminE_user=$CA_INST\_adminE local CA_agentE_user=$CA_INST\_agentE - local invalid_serialNumber=$(cat /dev/urandom | tr -dc '1-9' | fold -w 10 | head -n 1) + local invalid_serialNumber=$RANDOM local invalid_hex_serialNumber=0x$(echo "ibase=16;$invalid_serialNumber"|bc) local pkcs10_reqstatus local pkcs10_requestid - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$(openssl rand -base64 50 | perl -p -e 's/\n//') local sub_ca_ldap_port=1800 local sub_ca_http_port=14080 local sub_ca_https_port=14443 diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-show.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-show.sh index 26162b16e..8ef7c067b 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-show.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-show.sh @@ -64,7 +64,7 @@ run_pki-cert-show-ca_tests() local CA_adminR_user=$CA_INST\_adminR local CA_adminE_user=$CA_INST\_adminE local CA_agentE_user=$CA_INST\_agentE - local invalid_serialNumber=$(cat /dev/urandom | tr -dc '1-9' | fold -w 10 | head -n 1) + local invalid_serialNumber=$RANDOM local invalid_hex_serialNumber=0x$(echo "ibase=16;$invalid_serialNumber"|bc) local pkcs10_reqstatus local pkcs10_requestid @@ -84,7 +84,7 @@ run_pki-cert-show-ca_tests() local i18n_user4="kakskümmend_üks" local i18n_user5_fullname="двадцять один тридцять" local i18n_user5="двадцять_один_тридцять" - local rand=$(cat /dev/urandom | tr -dc '0-9' | fold -w 5 | head -n 1) + local rand=$(openssl rand -base64 50 | perl -p -e 's/\n//') local junk="axb124?$5@@_%^$#$@\!(_)043112321412321" local cert_req_info="$TmpDir/cert_req_info.out" local target_port=$(eval echo \$${CA_INST}_UNSECURE_PORT) diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert.sh index 5a2e9f709..27f613188 100755 --- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert.sh +++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert.sh @@ -65,7 +65,7 @@ run_pki-cert-ca_tests() rlPhaseStartTest "pki_cert001: pki cert with junk characters should return invalid module" local temp_out1="$TmpDir/pki_cert001" - local rand=`cat /dev/urandom | tr -dc 'a-zA-Z0-9*?$@#!%^&*()' | fold -w 40 | head -n 1` + local junk=$(openssl rand -base64 50 | perl -p -e 's/\n//') rlLog "Executing pki cert \"$junk\" characters" rlRun "pki cert \"$rand\" 2> $temp_out1" 1,255 "Command pki cert with junk characters" rlAssertGrep "Error: Invalid module" "$temp_out1" |