@@ -9,7 +9,7 @@ REVSIG=false
9
9
IFS='
10
10
'
11
11
if [ " $BITCOIN_VERIFY_COMMITS_ALLOW_SHA1 " = 1 ]; then
12
- GPG_RES=" $( echo " $INPUT " | gpg --trust-model always " $@ " 2> /dev/null) "
12
+ GPG_RES=" $( printf ' %s\n ' " $INPUT " | gpg --trust-model always " $@ " 2> /dev/null) "
13
13
else
14
14
# Note how we've disabled SHA1 with the --weak-digest option, disabling
15
15
# signatures - including selfsigs - that use SHA1. While you might think that
24
24
case " $LINE " in
25
25
" gpg (GnuPG) 1.4.1" * |" gpg (GnuPG) 2.0." * )
26
26
echo " Please upgrade to at least gpg 2.1.10 to check for weak signatures" > /dev/stderr
27
- GPG_RES=" $( echo " $INPUT " | gpg --trust-model always " $@ " 2> /dev/null) "
27
+ GPG_RES=" $( printf ' %s\n ' " $INPUT " | gpg --trust-model always " $@ " 2> /dev/null) "
28
28
;;
29
29
# We assume if you're running 2.1+, you're probably running 2.1.10+
30
30
# gpg will fail otherwise
31
31
# We assume if you're running 1.X, it is either 1.4.1X or 1.4.20+
32
32
# gpg will fail otherwise
33
33
esac
34
34
done
35
- [ " $GPG_RES " = " " ] && GPG_RES=" $( echo " $INPUT " | gpg --trust-model always --weak-digest sha1 " $@ " 2> /dev/null) "
35
+ [ " $GPG_RES " = " " ] && GPG_RES=" $( printf ' %s\n ' " $INPUT " | gpg --trust-model always --weak-digest sha1 " $@ " 2> /dev/null) "
36
36
fi
37
37
for LINE in $( echo " $GPG_RES " ) ; do
38
38
case " $LINE " in
@@ -57,8 +57,8 @@ if ! $VALID; then
57
57
exit 1
58
58
fi
59
59
if $VALID && $REVSIG ; then
60
- echo " $INPUT " | gpg --trust-model always " $@ " 2> /dev/null | grep " \[GNUPG:\] \(NEWSIG\|SIG_ID\|VALIDSIG\)"
60
+ printf ' %s\n ' " $INPUT " | gpg --trust-model always " $@ " 2> /dev/null | grep " \[GNUPG:\] \(NEWSIG\|SIG_ID\|VALIDSIG\)"
61
61
echo " $GOODREVSIG "
62
62
else
63
- echo " $INPUT " | gpg --trust-model always " $@ " 2> /dev/null
63
+ printf ' %s\n ' " $INPUT " | gpg --trust-model always " $@ " 2> /dev/null
64
64
fi
0 commit comments