1998-05-04 18:49:26 +00:00
|
|
|
#!/bin/sh
|
|
|
|
|
1998-09-14 10:33:57 +00:00
|
|
|
. $srcdir/defs.inc || exit 3
|
1998-05-04 18:49:26 +00:00
|
|
|
|
|
|
|
#info Checking conventional encryption
|
|
|
|
for i in plain-2 data-32000 ; do
|
2002-06-29 13:31:13 +00:00
|
|
|
echo "Hier spricht HAL" | $GPG --passphrase-fd 0 -c -o x --yes $i
|
|
|
|
echo "Hier spricht HAL" | $GPG --passphrase-fd 0 -o y --yes x
|
1998-05-04 18:49:26 +00:00
|
|
|
cmp $i y || error "$i: mismatch"
|
|
|
|
done
|
1999-04-07 18:58:34 +00:00
|
|
|
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 19:00:35 +00:00
|
|
|
algos="3des"
|
|
|
|
|
2005-06-20 17:03:27 +00:00
|
|
|
if have_cipher_algo "CAST5"; then
|
2005-06-21 14:28:12 +00:00
|
|
|
algos="$algos cast5"
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 19:00:35 +00:00
|
|
|
fi
|
|
|
|
|
2005-06-20 17:03:27 +00:00
|
|
|
if have_cipher_algo "BLOWFISH"; then
|
2005-06-21 14:28:12 +00:00
|
|
|
algos="$algos blowfish"
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 19:00:35 +00:00
|
|
|
fi
|
|
|
|
|
2005-06-20 17:03:27 +00:00
|
|
|
if have_cipher_algo "AES"; then
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 19:00:35 +00:00
|
|
|
algos="$algos aes aes192 aes256"
|
|
|
|
fi
|
|
|
|
|
2005-06-20 17:03:27 +00:00
|
|
|
if have_cipher_algo "TWOFISH"; then
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 19:00:35 +00:00
|
|
|
algos="$algos twofish"
|
|
|
|
fi
|
|
|
|
|
|
|
|
for a in $algos; do
|
1999-04-07 18:58:34 +00:00
|
|
|
for i in plain-1 data-80000 ; do
|
2002-06-29 13:31:13 +00:00
|
|
|
echo "Hier spricht HAL" | $GPG --passphrase-fd 0 \
|
1999-04-07 18:58:34 +00:00
|
|
|
--cipher-algo $a -c -o x --yes $i
|
2002-06-29 13:31:13 +00:00
|
|
|
echo "Hier spricht HAL" | $GPG --passphrase-fd 0 -o y --yes x
|
1999-04-07 18:58:34 +00:00
|
|
|
cmp $i y || error "$i: ($a) mismatch"
|
|
|
|
done
|
1998-09-18 15:24:53 +00:00
|
|
|
done
|