diff options
Diffstat (limited to 'lang/qt/tests/t-various.cpp')
-rw-r--r-- | lang/qt/tests/t-various.cpp | 111 |
1 files changed, 0 insertions, 111 deletions
diff --git a/lang/qt/tests/t-various.cpp b/lang/qt/tests/t-various.cpp index 75df8f6b..76e68063 100644 --- a/lang/qt/tests/t-various.cpp +++ b/lang/qt/tests/t-various.cpp @@ -46,7 +46,6 @@ #include "dn.h" #include "data.h" #include "dataprovider.h" -#include "signkeyjob.h" #include "t-support.h" @@ -171,116 +170,6 @@ private Q_SLOTS: QVERIFY(id_revoked); } - void testRemark() - { - // Get the signing key (alfa) - auto ctx = Context::create(OpenPGP); - QVERIFY (ctx); - Error err; - auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true); - QVERIFY (!seckey.isNull()); - QVERIFY (!err); - - // Get the target key (mallory / mike) - auto target = ctx->key("2686AA191A278013992C72EBBE794852BE5CF886", err, false); - QVERIFY (!target.isNull()); - QVERIFY (!err); - QVERIFY (target.numUserIDs()); - - // Create the job - auto job = openpgp()->signKeyJob(); - QVERIFY (job); - - // Hack in the passphrase provider - auto jobCtx = Job::context(job); - TestPassphraseProvider provider; - jobCtx->setPassphraseProvider(&provider); - jobCtx->setPinentryMode(Context::PinentryLoopback); - - // Setup the job - job->setExportable(false); - std::vector<unsigned int> uids; - uids.push_back(0); - job->setUserIDsToSign(uids); - job->setSigningKey(seckey); - job->setRemark(QStringLiteral("Mallory is evil 😠")); - - connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2, - const QString, - const GpgME::Error) { - Q_EMIT asyncDone(); - QVERIFY(!err2); - }); - - job->start(target); - QSignalSpy spy (this, SIGNAL(asyncDone())); - QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT)); - - // At this point the remark should have been added. - target.update(); - const char *remark = target.userID(0).remark(seckey, err); - QVERIFY(!err); - Q_ASSERT(remark); - QCOMPARE(QString::fromUtf8(remark), QStringLiteral("Mallory is evil 😠")); - - // Try to replace it without dupeOK - auto job2 = openpgp()->signKeyJob(); - QVERIFY (job2); - - // Hack in the passphrase provider - auto jobCtx2 = Job::context(job2); - jobCtx2->setPassphraseProvider(&provider); - jobCtx2->setPinentryMode(Context::PinentryLoopback); - - // Setup the job - job2->setExportable(false); - job2->setUserIDsToSign(uids); - job2->setSigningKey(seckey); - job2->setRemark(QStringLiteral("Mallory is nice")); - - connect(job2, &SignKeyJob::result, this, [this] (const GpgME::Error &err2, - const QString, - const GpgME::Error) { - Q_EMIT asyncDone(); - QVERIFY(err2); - }); - - job2->start(target); - QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT)); - - // Now replace the remark - auto job3 = openpgp()->signKeyJob(); - QVERIFY (job3); - - // Hack in the passphrase provider - auto jobCtx3 = Job::context(job3); - jobCtx3->setPassphraseProvider(&provider); - jobCtx3->setPinentryMode(Context::PinentryLoopback); - - // Setup the job - job3->setExportable(false); - job3->setUserIDsToSign(uids); - job3->setSigningKey(seckey); - job3->setDupeOk(true); - job3->setRemark(QStringLiteral("Mallory is nice")); - - connect(job3, &SignKeyJob::result, this, [this] (const GpgME::Error &err2, - const QString, - const GpgME::Error) { - Q_EMIT asyncDone(); - QVERIFY(!err2); - }); - - job3->start(target); - QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT)); - - target.update(); - remark = target.userID(0).remark(seckey, err); - QVERIFY(!err); - Q_ASSERT(remark); - Q_ASSERT(QString::fromUtf8(remark) == QStringLiteral("Mallory is nice")); - } - void testVersion() { QVERIFY(EngineInfo::Version("2.1.0") < EngineInfo::Version("2.1.1")); |