TEST: Modify test/recipes/20-test_dgst.t to leave artifacts behind
authorRichard Levitte <levitte@openssl.org>
Wed, 12 Feb 2020 19:29:33 +0000 (20:29 +0100)
committerRichard Levitte <levitte@openssl.org>
Tue, 18 Feb 2020 08:45:51 +0000 (09:45 +0100)
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/11080)

test/recipes/20-test_dgst.t

index 1080770f53a35a22de887930e8c1296ea483d6ca..a319d08ca209e8915c02dd37efcb214240b37dcd 100644 (file)
@@ -11,6 +11,7 @@ use strict;
 use warnings;
 
 use File::Spec;
+use File::Basename;
 use OpenSSL::Test qw/:DEFAULT with srctop_file/;
 use OpenSSL::Test::Utils;
 
@@ -26,29 +27,28 @@ sub tsignverify {
     my $data_to_sign = srctop_file('test', 'README');
     my $other_data = srctop_file('test', 'README.external');
 
+    my $sigfile = basename($privkey, '.pem') . '.sig';
     plan tests => 4;
 
     ok(run(app(['openssl', 'dgst', '-sign', $privkey,
-                '-out', 'testdgst.sig',
+                '-out', $sigfile,
                 $data_to_sign])),
        $testtext.": Generating signature");
 
     ok(run(app(['openssl', 'dgst', '-prverify', $privkey,
-                '-signature', 'testdgst.sig',
+                '-signature', $sigfile,
                 $data_to_sign])),
        $testtext.": Verify signature with private key");
 
     ok(run(app(['openssl', 'dgst', '-verify', $pubkey,
-                '-signature', 'testdgst.sig',
+                '-signature', $sigfile,
                 $data_to_sign])),
        $testtext.": Verify signature with public key");
 
     ok(!run(app(['openssl', 'dgst', '-verify', $pubkey,
-                 '-signature', 'testdgst.sig',
+                 '-signature', $sigfile,
                  $other_data])),
        $testtext.": Expect failure verifying mismatching data");
-
-    unlink 'testdgst.sig';
 }
 
 SKIP: {