From 02922b7ab8a60671fab165aeb2e45e66f8c15847 Mon Sep 17 00:00:00 2001 From: Werner Koch Date: Mon, 14 Sep 1998 13:02:45 +0000 Subject: [PATCH] . --- checks/genkey1024.test | 28 ++++++++++++++-------------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/checks/genkey1024.test b/checks/genkey1024.test index f963cf356..95093895d 100755 --- a/checks/genkey1024.test +++ b/checks/genkey1024.test @@ -7,7 +7,7 @@ expect - < = key expires in n days\r w = key expires in n weeks\r m = key expires in n months\r @@ -38,9 +38,9 @@ Key is valid for? (0) " { send -- "1\r" } timeout { exit 1 } } expect { -exact "1\r -\r \rKey expires at " { } +\r \rKey expires at " { } timeout { exit 1 } } -expect { +expect { -re "(.*)\r " {} timeout { exit 1 } } @@ -49,7 +49,7 @@ expect { timeout { exit 1 } } expect { -exact "y\r -\r \r\r +\r \r\r You need a User-ID to identify your key; the software constructs the user id\r from Real Name, Comment and Email Address in this form:\r \"Heinrich Heine (Der Dichter) \"\r @@ -58,29 +58,29 @@ Real name: " { send -- "Harry H.\r" } timeout { exit 1 } } expect { -exact "Harry H.\r -\r \rEmail address: " { send -- "hh@ddorf.de\r" } +\r \rEmail address: " { send -- "hh@ddorf.de\r" } timeout { exit 1 } } expect { -exact "hh@ddorf.de\r -\r \rComment: " { send -- "a test\r" } +\r \rComment: " { send -- "a test\r" } timeout { exit 1 } } expect { -exact "a test\r -\r \rYou selected this USER-ID:\r +\r \rYou selected this USER-ID:\r \"Harry H. (a test) (INSECURE!)\"\r \r Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? " { send -- "o\r" } timeout { exit 1 } } expect { -exact "o\r -\r \rYou need a Passphrase to protect your secret key.\r +\r \rYou need a Passphrase to protect your secret key.\r \r Enter pass phrase: " { sleep 1; send -- "abc\r" } timeout { exit 1 } } expect { -ex "\r \rRepeat pass phrase: " { sleep 1; send -- "abc\r" } timeout { exit 1 } } -expect { +expect { -ex "\r \rWe need to generate a lot of random bytes. It is a good idea to perform\r some other action (work in another window, move the mouse, utilize the\r network and the disks) during the prime generation; this gives the random\r