Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | #!/bin/sh |
michael@0 | 2 | # This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 3 | # License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 4 | # file, You can obtain one at http://mozilla.org/MPL/2.0/. |
michael@0 | 5 | |
michael@0 | 6 | # |
michael@0 | 7 | # A Bourne shell script for running the NIST RSA Validation System |
michael@0 | 8 | # |
michael@0 | 9 | # Before you run the script, set your PATH, LD_LIBRARY_PATH, ... environment |
michael@0 | 10 | # variables appropriately so that the fipstest command and the NSPR and NSS |
michael@0 | 11 | # shared libraries/DLLs are on the search path. Then run this script in the |
michael@0 | 12 | # directory where the REQUEST (.req) files reside. The script generates the |
michael@0 | 13 | # RESPONSE (.rsp) files in the same directory. |
michael@0 | 14 | |
michael@0 | 15 | |
michael@0 | 16 | request=SigGen15.req |
michael@0 | 17 | response=`echo $request | sed -e "s/req/rsp/"` |
michael@0 | 18 | echo $request $response |
michael@0 | 19 | fipstest rsa siggen $request > $response |
michael@0 | 20 | |
michael@0 | 21 | request=SigVer15.req |
michael@0 | 22 | response=`echo $request | sed -e "s/req/rsp/"` |
michael@0 | 23 | echo $request $response |
michael@0 | 24 | fipstest rsa sigver $request > $response |