1998-05-04 20:49:26 +02:00
|
|
|
#!/bin/sh
|
|
|
|
|
1998-09-14 12:33:57 +02:00
|
|
|
. $srcdir/defs.inc || exit 3
|
1998-05-04 20:49:26 +02:00
|
|
|
|
|
|
|
#info Checking conventional encryption
|
|
|
|
for i in plain-2 data-32000 ; do
|
2002-06-29 15:31:13 +02:00
|
|
|
echo "Hier spricht HAL" | $GPG --passphrase-fd 0 -c -o x --yes $i
|
|
|
|
echo "Hier spricht HAL" | $GPG --passphrase-fd 0 -o y --yes x
|
1998-05-04 20:49:26 +02:00
|
|
|
cmp $i y || error "$i: mismatch"
|
|
|
|
done
|
1999-04-07 20:58:34 +02:00
|
|
|
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 20:00:35 +01:00
|
|
|
algos="3des"
|
|
|
|
|
2005-06-20 19:03:27 +02:00
|
|
|
if have_cipher_algo "CAST5"; then
|
2005-06-21 16:28:12 +02:00
|
|
|
algos="$algos cast5"
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 20:00:35 +01:00
|
|
|
fi
|
|
|
|
|
2005-06-20 19:03:27 +02:00
|
|
|
if have_cipher_algo "BLOWFISH"; then
|
2005-06-21 16:28:12 +02:00
|
|
|
algos="$algos blowfish"
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 20:00:35 +01:00
|
|
|
fi
|
|
|
|
|
2005-06-20 19:03:27 +02:00
|
|
|
if have_cipher_algo "AES"; then
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 20:00:35 +01:00
|
|
|
algos="$algos aes aes192 aes256"
|
|
|
|
fi
|
|
|
|
|
2005-06-20 19:03:27 +02:00
|
|
|
if have_cipher_algo "TWOFISH"; then
|
* clearsig.test, conventional-mdc.test, conventional.test, defs.inc,
encrypt-dsa.test, encrypt.test, genkey1024.test, plain-1.asc,
plain-1-pgp.asc, plain-2.asc, plain-3.asc, pubring.asc, secring.asc,
sigs.test: Rework tests to work properly with a gpg binary that doesn't
have all ciphers and all pk algos. Basically, we test for the ciphers we
have, only test signing with non-160-bit hashes with RSA (we test all
hashes as hashes). Test all key lengths of AES.
2003-12-31 20:00:35 +01:00
|
|
|
algos="$algos twofish"
|
|
|
|
fi
|
|
|
|
|
|
|
|
for a in $algos; do
|
1999-04-07 20:58:34 +02:00
|
|
|
for i in plain-1 data-80000 ; do
|
2002-06-29 15:31:13 +02:00
|
|
|
echo "Hier spricht HAL" | $GPG --passphrase-fd 0 \
|
1999-04-07 20:58:34 +02:00
|
|
|
--cipher-algo $a -c -o x --yes $i
|
2002-06-29 15:31:13 +02:00
|
|
|
echo "Hier spricht HAL" | $GPG --passphrase-fd 0 -o y --yes x
|
1999-04-07 20:58:34 +02:00
|
|
|
cmp $i y || error "$i: ($a) mismatch"
|
|
|
|
done
|
1998-09-18 17:24:53 +02:00
|
|
|
done
|