diff options
Diffstat (limited to '')
| -rw-r--r-- | tests/gpg/Makefile.am | 3 | ||||
| -rw-r--r-- | tests/gpg/pgp-export.c | 168 | ||||
| -rw-r--r-- | tests/gpg/pgp-keylist.c | 284 | ||||
| -rw-r--r-- | tests/gpg/t-export.c | 27 | 
4 files changed, 481 insertions, 1 deletions
| diff --git a/tests/gpg/Makefile.am b/tests/gpg/Makefile.am index 5da0bbbf..fdb023c9 100644 --- a/tests/gpg/Makefile.am +++ b/tests/gpg/Makefile.am @@ -50,7 +50,8 @@ LDADD = ../../src/libgpgme.la  t_thread1_LDADD = ../../src/libgpgme-pthread.la  # We don't run t-genkey in the test suite, because it takes too long -noinst_PROGRAMS = $(TESTS) t-genkey +# The other programs are used for debugging. +noinst_PROGRAMS = $(TESTS) t-genkey pgp-keylist pgp-export  mkdemodirs: mkdemodirs.in Makefile  	sed -e 's,[@]GPG[@],$(GPG),g' < $(srcdir)/mkdemodirs.in > mkdemodirs diff --git a/tests/gpg/pgp-export.c b/tests/gpg/pgp-export.c new file mode 100644 index 00000000..9911c182 --- /dev/null +++ b/tests/gpg/pgp-export.c @@ -0,0 +1,168 @@ +/* pgp-export.c  - Helper to run an export command +   Copyright (C) 2008, 2009 g10 Code GmbH + +   This file is part of GPGME. +  +   GPGME is free software; you can redistribute it and/or modify it +   under the terms of the GNU Lesser General Public License as +   published by the Free Software Foundation; either version 2.1 of +   the License, or (at your option) any later version. +    +   GPGME is distributed in the hope that it will be useful, but +   WITHOUT ANY WARRANTY; without even the implied warranty of +   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU +   Lesser General Public License for more details. +    +   You should have received a copy of the GNU Lesser General Public +   License along with this program; if not, see <http://www.gnu.org/licenses/>. +*/ + +/* We need to include config.h so that we know whether we are building +   with large file system (LFS) support. */ +#ifdef HAVE_CONFIG_H +#include <config.h> +#endif + +#include <stdlib.h> +#include <stdio.h> +#include <string.h> + +#include <gpgme.h> + +#define PGM "pgp-export" + +#include "t-support.h" + + +static int verbose; + + +static const char * +nonnull (const char *s) +{ +  return s? s :"[none]"; +} + + +static int +show_usage (int ex) +{ +  fputs ("usage: " PGM " [options] USERIDS\n\n" +         "Options:\n" +         "  --verbose        run in verbose mode\n" +         "  --extern         send keys to the keyserver (TAKE CARE!)\n" +         , stderr); +  exit (ex); +} + +int  +main (int argc, char **argv) +{ +  int last_argc = -1; +  gpgme_error_t err; +  gpgme_ctx_t ctx; +  gpgme_key_t key; +  gpgme_keylist_result_t result; +  gpgme_key_t keyarray[100]; +  int keyidx = 0; +  gpgme_data_t out; +  gpgme_export_mode_t mode = 0; + +  if (argc) +    { argc--; argv++; } + +  while (argc && last_argc != argc ) +    { +      last_argc = argc; +      if (!strcmp (*argv, "--")) +        { +          argc--; argv++; +          break; +        } +      else if (!strcmp (*argv, "--help")) +        show_usage (0); +      else if (!strcmp (*argv, "--verbose")) +        { +          verbose = 1; +          argc--; argv++; +        } +      else if (!strcmp (*argv, "--extern")) +        { +          mode |= GPGME_KEYLIST_MODE_EXTERN; +          argc--; argv++; +        } +      else if (!strncmp (*argv, "--", 2)) +        show_usage (1); +       +    }           +  +  if (!argc) +    show_usage (1); + +  init_gpgme (GPGME_PROTOCOL_OpenPGP); + +  err = gpgme_new (&ctx); +  fail_if_err (err); +  gpgme_set_protocol (ctx, GPGME_PROTOCOL_OpenPGP); + +  /* Lookup the keys.  */ +  err = gpgme_op_keylist_ext_start (ctx, (const char**)argv, 0, 0); +  fail_if_err (err); +     +  while (!(err = gpgme_op_keylist_next (ctx, &key))) +    { +      printf ("keyid: %s  (fpr: %s)\n", +              key->subkeys?nonnull (key->subkeys->keyid):"?", +              key->subkeys?nonnull (key->subkeys->fpr):"?"); + +      if (keyidx < DIM (keyarray)-1) +        keyarray[keyidx++] = key; +      else +        { +          fprintf (stderr, PGM": too many keys" +                   "- skipping this key\n"); +          gpgme_key_unref (key); +        } +    } +  if (gpg_err_code (err) != GPG_ERR_EOF) +    fail_if_err (err); +  err = gpgme_op_keylist_end (ctx); +  fail_if_err (err); +  keyarray[keyidx] = NULL; + +  result = gpgme_op_keylist_result (ctx); +  if (result->truncated) +    { +      fprintf (stderr, PGM ": key listing unexpectedly truncated\n"); +      exit (1); +    } + +  /* Now for the actual export.  */ +  if ((mode & GPGME_KEYLIST_MODE_EXTERN)) +    printf ("sending keys to keyserver\n"); + +  err = gpgme_data_new (&out); +  fail_if_err (err); + +  gpgme_set_armor (ctx, 1); +  err = gpgme_op_export_keys (ctx, keyarray, mode,  +                              (mode & GPGME_KEYLIST_MODE_EXTERN)? NULL:out); +  fail_if_err (err); + +  fflush (NULL); +  if (!(mode & GPGME_KEYLIST_MODE_EXTERN)) +    { +      fputs ("Begin Result:\n", stdout); +      print_data (out); +      fputs ("End Result.\n", stdout); +    } + +  /* Cleanup.  */ +  gpgme_data_release (out); + +  for (keyidx=0; keyarray[keyidx]; keyidx++) +    gpgme_key_unref (keyarray[keyidx]); + +  gpgme_release (ctx); +  return 0; +} diff --git a/tests/gpg/pgp-keylist.c b/tests/gpg/pgp-keylist.c new file mode 100644 index 00000000..2645f48b --- /dev/null +++ b/tests/gpg/pgp-keylist.c @@ -0,0 +1,284 @@ +/* pgp-keylist.c  - Helper to show a key listing. +   Copyright (C) 2008, 2009 g10 Code GmbH + +   This file is part of GPGME. +  +   GPGME is free software; you can redistribute it and/or modify it +   under the terms of the GNU Lesser General Public License as +   published by the Free Software Foundation; either version 2.1 of +   the License, or (at your option) any later version. +    +   GPGME is distributed in the hope that it will be useful, but +   WITHOUT ANY WARRANTY; without even the implied warranty of +   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU +   Lesser General Public License for more details. +    +   You should have received a copy of the GNU Lesser General Public +   License along with this program; if not, see <http://www.gnu.org/licenses/>. +*/ + +/* We need to include config.h so that we know whether we are building +   with large file system (LFS) support. */ +#ifdef HAVE_CONFIG_H +#include <config.h> +#endif + +#include <stdlib.h> +#include <stdio.h> +#include <string.h> + +#include <gpgme.h> + +#define PGM "pgp-keylist" + +#include "t-support.h" + + +static int verbose; + + +static const char * +nonnull (const char *s) +{ +  return s? s :"[none]"; +} + + +static void +print_import_result (gpgme_import_result_t r) +{ +  gpgme_import_status_t st; + +  printf ("key import results:\n" +          "        considered: %d\n" +          "        no user id: %d\n" +          "          imported: %d\n" +          "      imported_rsa: %d\n" +          "         unchanged: %d\n" +          "      new user ids: %d\n" +          "       new subkeys: %d\n" +          "    new signatures: %d\n" +          "   new revocations: %d\n" +          "       secret read: %d\n" +          "   secret imported: %d\n" +          "  secret unchanged: %d\n" +          "  skipped new keys: %d\n" +          "      not imported: %d\n", +          r->considered, +          r->no_user_id, +          r->imported, +          r->imported_rsa, +          r->unchanged, +          r->new_user_ids, +          r->new_sub_keys, +          r->new_signatures, +          r->new_revocations, +          r->secret_read, +          r->secret_imported, +          r->secret_unchanged, +          r->skipped_new_keys, +          r->not_imported); + +  for (st=r->imports; st; st = st->next) +    { +      printf ("  fpr: %s err: %d (%s) status:", nonnull (st->fpr), +              st->result, gpg_strerror (st->result)); +      if (st->status & GPGME_IMPORT_NEW) +        fputs (" new", stdout); +      if (st->status & GPGME_IMPORT_UID) +        fputs (" uid", stdout); +      if (st->status & GPGME_IMPORT_SIG) +        fputs (" sig", stdout); +      if (st->status & GPGME_IMPORT_SUBKEY) +        fputs (" subkey", stdout); +      if (st->status & GPGME_IMPORT_SECRET) +        fputs (" secret", stdout); +      putchar ('\n'); +    } +} + + +static int +show_usage (int ex) +{ +  fputs ("usage: " PGM " [options] [USERID]\n\n" +         "Options:\n" +         "  --verbose        run in verbose mode\n" +         "  --local          use GPGME_KEYLIST_MODE_LOCAL\n" +         "  --extern         use GPGME_KEYLIST_MODE_EXTERN\n" +         "  --sigs           use GPGME_KEYLIST_MODE_SIGS\n" +         "  --sig-notations  use GPGME_KEYLIST_MODE_SIG_NOTATIONS\n" +         "  --ephemeral      use GPGME_KEYLIST_MODE_EPHEMERAL\n" +         "  --validate       use GPGME_KEYLIST_MODE_VALIDATE\n" +         "  --import         import all keys\n" +         , stderr); +  exit (ex); +} + +int  +main (int argc, char **argv) +{ +  int last_argc = -1; +  gpgme_error_t err; +  gpgme_ctx_t ctx; +  gpgme_keylist_mode_t mode = 0; +  gpgme_key_t key; +  gpgme_keylist_result_t result; +  int import = 0; +  gpgme_key_t keyarray[100]; +  int keyidx = 0; + +  if (argc) +    { argc--; argv++; } + +  while (argc && last_argc != argc ) +    { +      last_argc = argc; +      if (!strcmp (*argv, "--")) +        { +          argc--; argv++; +          break; +        } +      else if (!strcmp (*argv, "--help")) +        show_usage (0); +      else if (!strcmp (*argv, "--verbose")) +        { +          verbose = 1; +          argc--; argv++; +        } +      else if (!strcmp (*argv, "--local")) +        { +          mode |= GPGME_KEYLIST_MODE_LOCAL; +          argc--; argv++; +        } +      else if (!strcmp (*argv, "--extern")) +        { +          mode |= GPGME_KEYLIST_MODE_EXTERN; +          argc--; argv++; +        } +      else if (!strcmp (*argv, "--sigs")) +        { +          mode |= GPGME_KEYLIST_MODE_SIGS; +          argc--; argv++; +        } +      else if (!strcmp (*argv, "--sig-notations")) +        { +          mode |= GPGME_KEYLIST_MODE_SIG_NOTATIONS; +          argc--; argv++; +        } +      else if (!strcmp (*argv, "--ephemeral")) +        { +          mode |= GPGME_KEYLIST_MODE_EPHEMERAL; +          argc--; argv++; +        } +      else if (!strcmp (*argv, "--validate")) +        { +          mode |= GPGME_KEYLIST_MODE_VALIDATE; +          argc--; argv++; +        } +      else if (!strcmp (*argv, "--import")) +        { +          import = 1; +          argc--; argv++; +        } +      else if (!strncmp (*argv, "--", 2)) +        show_usage (1); +       +    }           +  +  if (argc > 1) +    show_usage (1); + +  init_gpgme (GPGME_PROTOCOL_OpenPGP); + +  err = gpgme_new (&ctx); +  fail_if_err (err); +  gpgme_set_protocol (ctx, GPGME_PROTOCOL_OpenPGP); + +  gpgme_set_keylist_mode (ctx, mode); + +  err = gpgme_op_keylist_start (ctx, argc? argv[0]:NULL, 0); +  fail_if_err (err); +     +  while (!(err = gpgme_op_keylist_next (ctx, &key))) +    { +      gpgme_user_id_t uid; +      int nuids; +       + +      printf ("keyid   : %s\n", key->subkeys?nonnull (key->subkeys->keyid):"?"); +      printf ("fpr     : %s\n", key->subkeys?nonnull (key->subkeys->fpr):"?"); +      printf ("caps    : %s%s%s%s\n", +              key->can_encrypt? "e":"", +              key->can_sign? "s":"", +              key->can_certify? "c":"", +              key->can_authenticate? "a":""); +      printf ("flags   :%s%s%s%s%s%s\n", +              key->secret? " secret":"", +              key->revoked? " revoked":"", +              key->expired? " expired":"", +              key->disabled? " disabled":"", +              key->invalid? " invalid":"", +              key->is_qualified? " qualifid":""); +      for (nuids=0, uid=key->uids; uid; uid = uid->next, nuids++) +        { +          printf ("userid %d: %s\n", nuids, nonnull(uid->uid)); +          printf ("valid  %d: %s\n", nuids,  +                  uid->validity == GPGME_VALIDITY_UNKNOWN? "unknown": +                  uid->validity == GPGME_VALIDITY_UNDEFINED? "undefined": +                  uid->validity == GPGME_VALIDITY_NEVER? "never": +                  uid->validity == GPGME_VALIDITY_MARGINAL? "marginal": +                  uid->validity == GPGME_VALIDITY_FULL? "full": +                  uid->validity == GPGME_VALIDITY_ULTIMATE? "ultimate": "[?]"); +        } + +      putchar ('\n'); + +      if (import) +        { +          if (keyidx < DIM (keyarray)-1) +            keyarray[keyidx++] = key; +          else +            { +              fprintf (stderr, PGM": too many keys in import mode" +                       "- skipping this key\n"); +              gpgme_key_unref (key); +            } +        } +      else +        gpgme_key_unref (key); +    } +  if (gpg_err_code (err) != GPG_ERR_EOF) +    fail_if_err (err); +  err = gpgme_op_keylist_end (ctx); +  fail_if_err (err); +  keyarray[keyidx] = NULL; + +  result = gpgme_op_keylist_result (ctx); +  if (result->truncated) +    { +      fprintf (stderr, PGM ": key listing unexpectedly truncated\n"); +      exit (1); +    } + +  if (import) +    { +      gpgme_import_result_t impres; + +      err = gpgme_op_import_keys (ctx, keyarray); +      fail_if_err (err); +      impres = gpgme_op_import_result (ctx); +      if (!impres) +        { +          fprintf (stderr, PGM ": no import result returned\n"); +          exit (1); +        } +      print_import_result (impres); +    } + +  for (keyidx=0; keyarray[keyidx]; keyidx++) +    gpgme_key_unref (keyarray[keyidx]); + +  gpgme_release (ctx); +  return 0; +} diff --git a/tests/gpg/t-export.c b/tests/gpg/t-export.c index f469843b..85cff234 100644 --- a/tests/gpg/t-export.c +++ b/tests/gpg/t-export.c @@ -42,6 +42,7 @@ main (int argc, char **argv)    gpgme_error_t err;    gpgme_data_t  out;    const char *pattern[] = { "Alpha", "Bob", NULL }; +  gpgme_key_t keyarray[3];    init_gpgme (GPGME_PROTOCOL_OpenPGP); @@ -61,6 +62,32 @@ main (int argc, char **argv)    fputs ("End Result.\n", stdout);    gpgme_data_release (out); + +  /* Again. Now using a key array.  */ +  err = gpgme_data_new (&out); +  fail_if_err (err); + +  err = gpgme_get_key (ctx, "0x68697734" /* Alpha */, keyarray+0, 0); +  fail_if_err (err); +  err = gpgme_get_key (ctx, "0xA9E3B0B2" /* Bob */, keyarray+1, 0); +  fail_if_err (err); +  keyarray[2] = NULL; + +  gpgme_set_armor (ctx, 1); +  err = gpgme_op_export_keys (ctx, keyarray, 0, out); +  fail_if_err (err); + +  gpgme_key_unref (keyarray[0]); +  gpgme_key_unref (keyarray[1]); + +  fflush (NULL); +  fputs ("Begin Result:\n", stdout); +  print_data (out); +  fputs ("End Result.\n", stdout); +    +  gpgme_data_release (out); + +    gpgme_release (ctx);    return 0; | 
