summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authoragc <agc@pkgsrc.org>2014-12-07 22:21:36 +0000
committeragc <agc@pkgsrc.org>2014-12-07 22:21:36 +0000
commit53dd11f517f835dbccec1b53b88b378d50efe151 (patch)
tree1b95f81091a22a8103946a154bb30fdfcbb8e9c2 /security
parentbc646fd36e4ae1666d8cb60e38f65c04d4568584 (diff)
downloadpkgsrc-53dd11f517f835dbccec1b53b88b378d50efe151.tar.gz
add another test, after some prodding from riz@ - check that the verification
fails when no valid public key for the signature is provided.
Diffstat (limited to 'security')
-rw-r--r--security/netpgpverify/files/Makefile.bsd5
1 files changed, 4 insertions, 1 deletions
diff --git a/security/netpgpverify/files/Makefile.bsd b/security/netpgpverify/files/Makefile.bsd
index 0664fb8375b..e2190ed8eb9 100644
--- a/security/netpgpverify/files/Makefile.bsd
+++ b/security/netpgpverify/files/Makefile.bsd
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile.bsd,v 1.3 2014/12/04 20:08:47 agc Exp $
+# $NetBSD: Makefile.bsd,v 1.4 2014/12/07 22:21:36 agc Exp $
PROG=netpgpverify
@@ -30,3 +30,6 @@ tst:
./${PROG} -S sshtest-20140202.pub data.sig
@echo "expected failure, to check bad signatures fail to verify"
-sed -e 's|A|B|' data.gpg | ./${PROG} -S sshtest-20140202.pub
+ @echo ""
+ @echo "expected failure, no valid key for verification"
+ -./${PROG} -k /dev/null NetBSD-6.0_RC1_hashes.gpg