diff options
Diffstat (limited to 'tests/gpg/t-encrypt-sign.c')
| -rw-r--r-- | tests/gpg/t-encrypt-sign.c | 139 | 
1 files changed, 139 insertions, 0 deletions
| diff --git a/tests/gpg/t-encrypt-sign.c b/tests/gpg/t-encrypt-sign.c new file mode 100644 index 00000000..a4620d29 --- /dev/null +++ b/tests/gpg/t-encrypt-sign.c @@ -0,0 +1,139 @@ +/* t-encrypt-sign.c  - regression test + *	Copyright (C) 2000 Werner Koch (dd9jn) + *      Copyright (C) 2001, 2002 g10 Code GmbH + * + * This file is part of GPGME. + * + * GPGME is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * GPGME is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA + */ + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <assert.h> + +#include <gpgme.h> + +#define fail_if_err(a) do { if(a) {                                       \ +                               fprintf (stderr, "%s:%d: GpgmeError %s\n", \ +                                __FILE__, __LINE__, gpgme_strerror(a));   \ +                                exit (1); }                               \ +                             } while(0) + +static void +print_op_info (GpgmeCtx c) +{ +    char *s = gpgme_get_op_info (c, 0); + +    if (!s) +        puts ("<!-- no operation info available -->"); +    else { +        puts (s); +        free (s); +    } +} + + +static void +print_data ( GpgmeData dh ) +{ +    char buf[100]; +    size_t nread; +    GpgmeError err; + +    err = gpgme_data_rewind ( dh ); +    fail_if_err (err); +    while ( !(err = gpgme_data_read ( dh, buf, 100, &nread )) ) { +        fwrite ( buf, nread, 1, stdout ); +    } +    if (err != GPGME_EOF)  +        fail_if_err (err); +} + + +static const char * +passphrase_cb ( void *opaque, const char *desc, void **r_hd ) +{ +    const char *pass; + +    if ( !desc ) { +        /* cleanup by looking at *r_hd */ + +         +        return NULL; +    } + +    pass = "abc"; +    fprintf (stderr, "%% requesting passphrase for `%s': ", desc ); +    fprintf (stderr, "sending `%s'\n", pass ); + +    return pass; +} + + +int  +main (int argc, char **argv ) +{ +    GpgmeCtx ctx; +    GpgmeError err; +    GpgmeData in, out; +    GpgmeRecipients rset; + +    err = gpgme_check_engine (); +    fail_if_err (err); +    puts ( gpgme_get_engine_info() ); + +  do { +    err = gpgme_new (&ctx); +    fail_if_err (err); +    gpgme_set_armor (ctx, 1); +    if (!getenv("GPG_AGENT_INFO")) +      gpgme_set_passphrase_cb (ctx, passphrase_cb, NULL); + +    err = gpgme_data_new_from_mem ( &in, "Hallo Leute\n", 12, 0 ); +    fail_if_err (err); + +    err = gpgme_data_new ( &out ); +    fail_if_err (err); + +    err = gpgme_recipients_new (&rset); +    fail_if_err (err); +    err = gpgme_recipients_add_name_with_validity (rset, "Bob", +                                                   GPGME_VALIDITY_FULL); +    fail_if_err (err); +    err = gpgme_recipients_add_name_with_validity (rset, "Alpha", +                                                   GPGME_VALIDITY_FULL); +    fail_if_err (err); + + +    err = gpgme_op_encrypt_sign (ctx, rset, in, out); +    print_op_info (ctx); +    fail_if_err (err); + +    fflush (NULL); +    fputs ("Begin Result:\n", stdout ); +    print_data (out); +    fputs ("End Result.\n", stdout ); +    +    gpgme_recipients_release (rset); +    gpgme_data_release (in); +    gpgme_data_release (out); +    gpgme_release (ctx); +  } while ( argc > 1 && !strcmp( argv[1], "--loop" ) ); +    +    return 0; +} + + | 
