2002-12-23 Marcus Brinkmann <marcus@g10code.de>
authorMarcus Brinkmann <mb@g10code.com>
Mon, 23 Dec 2002 21:06:38 +0000 (21:06 +0000)
committerMarcus Brinkmann <mb@g10code.com>
Mon, 23 Dec 2002 21:06:38 +0000 (21:06 +0000)
* gpgsm/Makefile.am (./gpgsm.conf): Add a faked system time to
avoid certification's expiry.
* gpgsm/t-encrypt.c (main): Use the short certification name.

tests/ChangeLog
tests/gpgsm/Makefile.am
tests/gpgsm/t-encrypt.c

index 9efd160dcd094e3fea8fe691f360bde0a02923de..955b9e5a049ac49e3e6f2fdb88e45833aad5d7a1 100644 (file)
@@ -1,3 +1,9 @@
+2002-12-23  Marcus Brinkmann  <marcus@g10code.de>
+
+       * gpgsm/Makefile.am (./gpgsm.conf): Add a faked system time to
+       avoid certification's expiry.
+       * gpgsm/t-encrypt.c (main): Use the short certification name.
+
 2002-11-19  Marcus Brinkmann  <marcus@g10code.de>
 
        * gpg/t-genkey.c (main): Add missing argument to gpgme_op_genkey
index b8f966b19d3bb758e7f519cd8308460b82dab2f7..ab4d2d914fea91a50002ef32aa7ceb2864fcd20f 100644 (file)
@@ -46,6 +46,7 @@ all-local: ./pubring.kbx ./gpgsm.conf ./private-keys-v1.d/$(key_id).key ./trustl
 
 ./gpgsm.conf:
        echo disable-crl-checks > ./gpgsm.conf
+       echo faked-system-time 1038908198 >> ./gpgsm.conf
 
 ./private-keys-v1.d/$(key_id).key: $(srcdir)/$(key_id)
        test -d ./private-keys-v1.d || mkdir ./private-keys-v1.d
index 54096245ccce5081c9414bbf5a2f24ede8cf9ad1..49996858799e1dc67639226451f309611cdc2df9 100644 (file)
@@ -110,11 +110,10 @@ main (int argc, char **argv )
     fail_if_err (err);
     if (argc)
       err = gpgme_recipients_add_name_with_validity (rset, *argv,
-                                                   GPGME_VALIDITY_FULL);
+                                                    GPGME_VALIDITY_FULL);
     else
-      err = gpgme_recipients_add_name_with_validity (rset,
-     "/CN=test cert 1,OU=Aegypten Project,O=g10 Code GmbH,L=Düsseldorf,C=DE",
-                                                   GPGME_VALIDITY_FULL);
+      err = gpgme_recipients_add_name_with_validity (rset, "test cert 1",
+                                                    GPGME_VALIDITY_FULL);
     fail_if_err (err);
 
     err = gpgme_op_encrypt (ctx, rset, in, out );