- Timestamp:
- May 27, 2016, 8:12:43 PM (6 years ago)
- Branches:
- asyncio, debian/master, debian/stretch-backports, jessie-backports, master, proxy-ticket, upstream
- Children:
- 9e56602
- Parents:
- 298dc66
- git-author:
- Thomas Klute <thomas2.klute@…> (05/27/16 18:31:42)
- git-committer:
- Thomas Klute <thomas2.klute@…> (05/27/16 20:12:43)
- Location:
- test
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
test/.gitignore
r298dc66 r42829ae 21 21 *.trs 22 22 *.lock 23 pgpcrc 24 .deps -
test/Makefile.am
r298dc66 r42829ae 33 33 TESTS = $(dist_check_SCRIPTS) 34 34 35 check_PROGRAMS = pgpcrc 36 pgpcrc_SOURCES = pgpcrc.c 37 35 38 # Identities in the miniature CA, server, and client environment for 36 39 # the test suite … … 93 96 # one day, so regenerating them is both fast and frequently 94 97 # necessary. 95 MOSTLYCLEANFILES += */*.pgp */*.gpg */*.gpg~ */gpg.conf authority/lock */*.kbx */*.kbx~ */S.gpg-agent */private-keys-v1.d/* 98 MOSTLYCLEANFILES += */*.pgp */*.pgp.raw */*.gpg */*.gpg~ */gpg.conf \ 99 authority/lock */*.kbx */*.kbx~ */S.gpg-agent */private-keys-v1.d/* 96 100 # GnuPG random pool, no need to regenerate on every build 97 101 CLEANFILES += authority/random_seed … … 142 146 143 147 mostlyclean-local: clean-softhsm2-db 148 -rmdir $(pgp_identities:=/private-keys-v1.d) || true 149 if USE_MSVA 150 -rmdir $(msva_home)/private-keys-v1.d || true 151 endif 144 152 145 153 clean-local: … … 149 157 -rmdir $(msva_home) || true 150 158 endif 151 rm -f pgpcrc152 159 153 160 # Apache configuration and data files -
test/test_ca.mk
r298dc66 r42829ae 3 3 # Daniel Kahn Gillmor <dkg@fifthhorseman.net> 4 4 # Thomas Klute <thomas2.klute@uni-dortmund.de> 5 6 pgpcrc: pgpcrc.c7 gcc -o $@ $<8 5 9 6 # General rules to set up a miniature CA & server & client environment … … 58 55 # normal case: certificates signed by test CA 59 56 %/x509.pem: %.template %/cert-request authority/secret.key authority/x509.pem 60 certtool --outfile $@ --generate-certificate --load-ca-certificate authority/x509.pem --load-ca-privkey authority/secret.key --load-request $(dir $@)cert-request --template $< 57 certtool --outfile $@ --generate-certificate --load-ca-certificate authority/x509.pem --load-ca-privkey authority/secret.key --load-request $(dir $@)cert-request --template $< 61 58 62 59 # error case: certificates signed by rogue CA
Note: See TracChangeset
for help on using the changeset viewer.