aboutsummaryrefslogtreecommitdiffstats
path: root/lang/qt/tests/t-various.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'lang/qt/tests/t-various.cpp')
-rw-r--r--lang/qt/tests/t-various.cpp111
1 files changed, 0 insertions, 111 deletions
diff --git a/lang/qt/tests/t-various.cpp b/lang/qt/tests/t-various.cpp
index 75df8f6b..76e68063 100644
--- a/lang/qt/tests/t-various.cpp
+++ b/lang/qt/tests/t-various.cpp
@@ -46,7 +46,6 @@
#include "dn.h"
#include "data.h"
#include "dataprovider.h"
-#include "signkeyjob.h"
#include "t-support.h"
@@ -171,116 +170,6 @@ private Q_SLOTS:
QVERIFY(id_revoked);
}
- void testRemark()
- {
- // Get the signing key (alfa)
- auto ctx = Context::create(OpenPGP);
- QVERIFY (ctx);
- Error err;
- auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
- QVERIFY (!seckey.isNull());
- QVERIFY (!err);
-
- // Get the target key (mallory / mike)
- auto target = ctx->key("2686AA191A278013992C72EBBE794852BE5CF886", err, false);
- QVERIFY (!target.isNull());
- QVERIFY (!err);
- QVERIFY (target.numUserIDs());
-
- // Create the job
- auto job = openpgp()->signKeyJob();
- QVERIFY (job);
-
- // Hack in the passphrase provider
- auto jobCtx = Job::context(job);
- TestPassphraseProvider provider;
- jobCtx->setPassphraseProvider(&provider);
- jobCtx->setPinentryMode(Context::PinentryLoopback);
-
- // Setup the job
- job->setExportable(false);
- std::vector<unsigned int> uids;
- uids.push_back(0);
- job->setUserIDsToSign(uids);
- job->setSigningKey(seckey);
- job->setRemark(QStringLiteral("Mallory is evil 😠"));
-
- connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
- const QString,
- const GpgME::Error) {
- Q_EMIT asyncDone();
- QVERIFY(!err2);
- });
-
- job->start(target);
- QSignalSpy spy (this, SIGNAL(asyncDone()));
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // At this point the remark should have been added.
- target.update();
- const char *remark = target.userID(0).remark(seckey, err);
- QVERIFY(!err);
- Q_ASSERT(remark);
- QCOMPARE(QString::fromUtf8(remark), QStringLiteral("Mallory is evil 😠"));
-
- // Try to replace it without dupeOK
- auto job2 = openpgp()->signKeyJob();
- QVERIFY (job2);
-
- // Hack in the passphrase provider
- auto jobCtx2 = Job::context(job2);
- jobCtx2->setPassphraseProvider(&provider);
- jobCtx2->setPinentryMode(Context::PinentryLoopback);
-
- // Setup the job
- job2->setExportable(false);
- job2->setUserIDsToSign(uids);
- job2->setSigningKey(seckey);
- job2->setRemark(QStringLiteral("Mallory is nice"));
-
- connect(job2, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
- const QString,
- const GpgME::Error) {
- Q_EMIT asyncDone();
- QVERIFY(err2);
- });
-
- job2->start(target);
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // Now replace the remark
- auto job3 = openpgp()->signKeyJob();
- QVERIFY (job3);
-
- // Hack in the passphrase provider
- auto jobCtx3 = Job::context(job3);
- jobCtx3->setPassphraseProvider(&provider);
- jobCtx3->setPinentryMode(Context::PinentryLoopback);
-
- // Setup the job
- job3->setExportable(false);
- job3->setUserIDsToSign(uids);
- job3->setSigningKey(seckey);
- job3->setDupeOk(true);
- job3->setRemark(QStringLiteral("Mallory is nice"));
-
- connect(job3, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
- const QString,
- const GpgME::Error) {
- Q_EMIT asyncDone();
- QVERIFY(!err2);
- });
-
- job3->start(target);
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- target.update();
- remark = target.userID(0).remark(seckey, err);
- QVERIFY(!err);
- Q_ASSERT(remark);
- Q_ASSERT(QString::fromUtf8(remark) == QStringLiteral("Mallory is nice"));
- }
-
void testVersion()
{
QVERIFY(EngineInfo::Version("2.1.0") < EngineInfo::Version("2.1.1"));