2003-04-29 20:51:25 +00:00
|
|
|
|
/* t-decrypt-verify.c - Regression test.
|
2016-05-17 12:33:49 +00:00
|
|
|
|
* Copyright (C) 2000 Werner Koch (dd9jn)
|
|
|
|
|
* Copyright (C) 2001, 2002, 2003, 2004 g10 Code GmbH
|
|
|
|
|
*
|
|
|
|
|
* This file is part of GPGME.
|
|
|
|
|
*
|
|
|
|
|
* GPGME is free software; you can redistribute it and/or modify it
|
|
|
|
|
* under the terms of the GNU Lesser General Public License as
|
|
|
|
|
* published by the Free Software Foundation; either version 2.1 of
|
|
|
|
|
* the License, or (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* GPGME is distributed in the hope that it will be useful, but
|
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
|
* License along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
*/
|
2001-11-16 01:37:06 +00:00
|
|
|
|
|
2004-02-17 17:26:20 +00:00
|
|
|
|
/* We need to include config.h so that we know whether we are building
|
|
|
|
|
with large file system (LFS) support. */
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
|
#include <config.h>
|
|
|
|
|
#endif
|
|
|
|
|
|
2001-11-16 01:37:06 +00:00
|
|
|
|
#include <stdlib.h>
|
2003-04-29 20:51:25 +00:00
|
|
|
|
#include <stdio.h>
|
2001-11-16 01:37:06 +00:00
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <errno.h>
|
2003-05-27 01:31:06 +00:00
|
|
|
|
#include <unistd.h>
|
2001-11-16 01:37:06 +00:00
|
|
|
|
|
2001-11-22 Marcus Brinkmann <marcus@g10code.de>
* gpg/: New directory.
* Makefile.am, t-verify.c, t-encrypt.c, t-signers.c, t-trustlist.c,
t-sign.c, t-keylist.c, t-import.c, t-genkey.c, t-export.c,
t-decrypt-verify.c, t-decrypt.c, t-version.c, t-data.c, mkdemodirs.
cipher-1.asc, cipher-2.asc, geheim.txt, pubdemo.asc, pubkey-1.asc,
secdemo.asc, seckey-1.asc): Move to sub directory gpg/.
* gpg/Makefile.am (INCLUDES): Include gpgme/, not include/ and
intl/.
(LDD): Correct relative path to gpgme library.
(TESTS): Remove t-version and t-data.
* gpg/t-verify.c, gpg/t-encrypt.c, gpg/t-signers.c, gpg/t-trustlist.c,
gpg/t-sign.c, gpg/t-keylist.c, gpg/t-import.c, gpg/t-genkey.c,
gpg/t-export.c, gpg/t-decrypt-verify.c, gpg/t-decrypt.c,
t-version.c, t-data.c): Include gpgme.h, not "../gpgme/gpgme.h".
* Makefile.am: New file.
* gpgsm/: New directory.
* gpgsm/Makefile.am: New file.
2001-11-22 03:01:26 +00:00
|
|
|
|
#include <gpgme.h>
|
2001-11-16 01:37:06 +00:00
|
|
|
|
|
2003-06-05 23:20:29 +00:00
|
|
|
|
#include "t-support.h"
|
2003-04-29 20:51:25 +00:00
|
|
|
|
|
2003-06-05 23:20:29 +00:00
|
|
|
|
|
2003-04-29 20:51:25 +00:00
|
|
|
|
static void
|
2003-07-31 15:44:32 +00:00
|
|
|
|
check_verify_result (gpgme_verify_result_t result, unsigned int summary,
|
|
|
|
|
char *fpr, gpgme_error_t status)
|
2001-11-16 01:37:06 +00:00
|
|
|
|
{
|
2003-05-18 20:45:24 +00:00
|
|
|
|
gpgme_signature_t sig;
|
2001-11-16 01:37:06 +00:00
|
|
|
|
|
2003-04-29 20:51:25 +00:00
|
|
|
|
sig = result->signatures;
|
|
|
|
|
if (!sig || sig->next)
|
|
|
|
|
{
|
|
|
|
|
fprintf (stderr, "%s:%i: Unexpected number of signatures\n",
|
|
|
|
|
__FILE__, __LINE__);
|
|
|
|
|
exit (1);
|
|
|
|
|
}
|
|
|
|
|
if (sig->summary != summary)
|
|
|
|
|
{
|
|
|
|
|
fprintf (stderr, "%s:%i: Unexpected signature summary: 0x%x\n",
|
|
|
|
|
__FILE__, __LINE__, sig->summary);
|
|
|
|
|
exit (1);
|
|
|
|
|
}
|
|
|
|
|
if (strcmp (sig->fpr, fpr))
|
2001-11-16 01:37:06 +00:00
|
|
|
|
{
|
2003-04-29 20:51:25 +00:00
|
|
|
|
fprintf (stderr, "%s:%i: Unexpected fingerprint: %s\n",
|
|
|
|
|
__FILE__, __LINE__, sig->fpr);
|
|
|
|
|
exit (1);
|
2001-11-16 01:37:06 +00:00
|
|
|
|
}
|
Use gpgme interface for error handling to avoid linking with gpg-error.
* tests/t-data.c, tests/run-export.c, tests/run-keylist.c,
tests/run-support.h, tests/run-verify.c, tests/gpg/t-decrypt-verify.c,
tests/gpg/t-edit.c, tests/gpg/t-eventloop.c, tests/gpg/t-keylist-sig.c,
tests/gpg/t-keylist.c, tests/gpg/t-support.h, tests/gpg/t-trustlist.c,
tests/gpg/t-verify.c, tests/gpg/t-wait.c, tests/gpgsm/cms-decrypt.c,
tests/gpgsm/cms-keylist.c, tests/gpgsm/t-keylist.c,
tests/gpgsm/t-support.h, tests/gpgsm/t-verify.c,
tests/opassuan/t-command.c: Use gpgme interface for gpg-error functions.
2012-02-08 14:26:17 +00:00
|
|
|
|
if (gpgme_err_code (sig->status) != status)
|
2003-04-29 20:51:25 +00:00
|
|
|
|
{
|
|
|
|
|
fprintf (stderr, "%s:%i: Unexpected signature status: %s\n",
|
|
|
|
|
__FILE__, __LINE__, gpgme_strerror (sig->status));
|
|
|
|
|
exit (1);
|
|
|
|
|
}
|
|
|
|
|
if (sig->notations)
|
|
|
|
|
{
|
|
|
|
|
fprintf (stderr, "%s:%i: Unexpected notation data\n",
|
|
|
|
|
__FILE__, __LINE__);
|
|
|
|
|
exit (1);
|
|
|
|
|
}
|
|
|
|
|
if (sig->wrong_key_usage)
|
|
|
|
|
{
|
|
|
|
|
fprintf (stderr, "%s:%i: Unexpectedly wrong key usage\n",
|
|
|
|
|
__FILE__, __LINE__);
|
|
|
|
|
exit (1);
|
|
|
|
|
}
|
|
|
|
|
if (sig->validity != GPGME_VALIDITY_UNKNOWN)
|
|
|
|
|
{
|
|
|
|
|
fprintf (stderr, "%s:%i: Unexpected validity: %i\n",
|
|
|
|
|
__FILE__, __LINE__, sig->validity);
|
|
|
|
|
exit (1);
|
|
|
|
|
}
|
Use gpgme interface for error handling to avoid linking with gpg-error.
* tests/t-data.c, tests/run-export.c, tests/run-keylist.c,
tests/run-support.h, tests/run-verify.c, tests/gpg/t-decrypt-verify.c,
tests/gpg/t-edit.c, tests/gpg/t-eventloop.c, tests/gpg/t-keylist-sig.c,
tests/gpg/t-keylist.c, tests/gpg/t-support.h, tests/gpg/t-trustlist.c,
tests/gpg/t-verify.c, tests/gpg/t-wait.c, tests/gpgsm/cms-decrypt.c,
tests/gpgsm/cms-keylist.c, tests/gpgsm/t-keylist.c,
tests/gpgsm/t-support.h, tests/gpgsm/t-verify.c,
tests/opassuan/t-command.c: Use gpgme interface for gpg-error functions.
2012-02-08 14:26:17 +00:00
|
|
|
|
if (gpgme_err_code (sig->validity_reason) != GPG_ERR_NO_ERROR)
|
2003-04-29 20:51:25 +00:00
|
|
|
|
{
|
|
|
|
|
fprintf (stderr, "%s:%i: Unexpected validity reason: %s\n",
|
|
|
|
|
__FILE__, __LINE__, gpgme_strerror (sig->validity_reason));
|
|
|
|
|
exit (1);
|
|
|
|
|
}
|
|
|
|
|
}
|
2001-11-16 01:37:06 +00:00
|
|
|
|
|
2003-04-29 20:51:25 +00:00
|
|
|
|
|
2016-05-17 12:33:49 +00:00
|
|
|
|
int
|
2003-04-29 20:51:25 +00:00
|
|
|
|
main (int argc, char *argv[])
|
|
|
|
|
{
|
2003-05-18 20:45:24 +00:00
|
|
|
|
gpgme_ctx_t ctx;
|
|
|
|
|
gpgme_error_t err;
|
|
|
|
|
gpgme_data_t in, out;
|
|
|
|
|
gpgme_decrypt_result_t decrypt_result;
|
|
|
|
|
gpgme_verify_result_t verify_result;
|
2003-04-29 20:51:25 +00:00
|
|
|
|
const char *cipher_2_asc = make_filename ("cipher-2.asc");
|
|
|
|
|
char *agent_info;
|
|
|
|
|
|
2003-09-14 00:30:53 +00:00
|
|
|
|
init_gpgme (GPGME_PROTOCOL_OpenPGP);
|
|
|
|
|
|
2003-04-29 20:51:25 +00:00
|
|
|
|
err = gpgme_new (&ctx);
|
|
|
|
|
fail_if_err (err);
|
|
|
|
|
|
|
|
|
|
agent_info = getenv("GPG_AGENT_INFO");
|
|
|
|
|
if (!(agent_info && strchr (agent_info, ':')))
|
|
|
|
|
gpgme_set_passphrase_cb (ctx, passphrase_cb, NULL);
|
|
|
|
|
|
|
|
|
|
err = gpgme_data_new_from_file (&in, cipher_2_asc, 1);
|
|
|
|
|
fail_if_err (err);
|
|
|
|
|
err = gpgme_data_new (&out);
|
|
|
|
|
fail_if_err (err);
|
|
|
|
|
|
|
|
|
|
err = gpgme_op_decrypt_verify (ctx, in, out);
|
|
|
|
|
fail_if_err (err);
|
|
|
|
|
decrypt_result = gpgme_op_decrypt_result (ctx);
|
|
|
|
|
if (decrypt_result->unsupported_algorithm)
|
|
|
|
|
{
|
|
|
|
|
fprintf (stderr, "%s:%i: unsupported algorithm: %s\n",
|
|
|
|
|
__FILE__, __LINE__, decrypt_result->unsupported_algorithm);
|
|
|
|
|
exit (1);
|
2016-05-17 12:33:49 +00:00
|
|
|
|
}
|
2003-04-29 20:51:25 +00:00
|
|
|
|
print_data (out);
|
|
|
|
|
verify_result = gpgme_op_verify_result (ctx);
|
|
|
|
|
check_verify_result (verify_result, 0,
|
|
|
|
|
"A0FF4590BB6122EDEF6E3C542D727CC768697734",
|
2003-06-05 23:20:29 +00:00
|
|
|
|
GPG_ERR_NO_ERROR);
|
2003-04-29 20:51:25 +00:00
|
|
|
|
|
|
|
|
|
gpgme_data_release (in);
|
|
|
|
|
gpgme_data_release (out);
|
|
|
|
|
gpgme_release (ctx);
|
2001-11-16 01:37:06 +00:00
|
|
|
|
return 0;
|
|
|
|
|
}
|