1998-02-26 17:56:31 +01:00
|
|
|
#!/bin/sh
|
|
|
|
|
1998-09-14 12:33:57 +02:00
|
|
|
. $srcdir/defs.inc || exit 3
|
1998-02-26 17:56:31 +01:00
|
|
|
|
|
|
|
for i in $plain_files $data_files; do
|
2002-06-29 15:31:13 +02:00
|
|
|
echo "$usrpass1" | $GPG --passphrase-fd 0 -s -o x --yes $i
|
|
|
|
$GPG -o y --yes x
|
1998-02-26 17:56:31 +01:00
|
|
|
cmp $i y || error "$i: mismatch"
|
|
|
|
done
|
|
|
|
|
2007-07-18 19:43:14 +02:00
|
|
|
for da in `all_hash_algos` ; do
|
|
|
|
echo_n "$da "
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 20:00:35 +01:00
|
|
|
|
2007-07-18 19:43:14 +02:00
|
|
|
# RSA key, so any hash is okay
|
|
|
|
if have_pubkey_algo "RSA"; then
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 20:00:35 +01:00
|
|
|
for i in $plain_files; do
|
2004-02-09 20:44:36 +01:00
|
|
|
$GPG -u $usrname3 --digest-algo $da -s -o x --yes $i
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 20:00:35 +01:00
|
|
|
$GPG -o y --yes x
|
|
|
|
cmp $i y || error "$i: mismatch"
|
|
|
|
# process only the first one
|
|
|
|
break
|
|
|
|
done
|
2007-07-18 19:43:14 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
# Using the DSA sig key - only 160 bit or larger hashes
|
|
|
|
if test $da != "MD5"; then
|
|
|
|
for i in $plain_files; do
|
|
|
|
echo "$usrpass1" | $GPG --passphrase-fd 0 --digest-algo $da \
|
|
|
|
-s -o x --yes $i
|
|
|
|
$GPG -o y --yes x
|
|
|
|
cmp $i y || error "$i: mismatch"
|
|
|
|
# process only the first one
|
|
|
|
break
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
echo_n "| "
|