diff options
Diffstat (limited to '')
| -rw-r--r-- | tests/ChangeLog | 6 | ||||
| -rw-r--r-- | tests/Makefile.am | 2 | ||||
| -rw-r--r-- | tests/cipher-2.asc | 16 | ||||
| -rw-r--r-- | tests/t-decrypt-verify.c | 147 | 
4 files changed, 170 insertions, 1 deletions
| diff --git a/tests/ChangeLog b/tests/ChangeLog index 87ca830a..a57f6625 100644 --- a/tests/ChangeLog +++ b/tests/ChangeLog @@ -1,3 +1,9 @@ +2001-11-16  Marcus Brinkmann  <[email protected]> + +	* Makefile.am (TESTS): Add t-decrypt-verify. +	* t-decrypt-verify.c: New file. +	* cipher-2.asc: Likewise. +  2001-11-02  Marcus Brinkmann  <[email protected]>  	* t-data.c: Include stddef.h. diff --git a/tests/Makefile.am b/tests/Makefile.am index 13cc1ad9..64906988 100644 --- a/tests/Makefile.am +++ b/tests/Makefile.am @@ -23,7 +23,7 @@  TESTS_ENVIRONMENT = GNUPGHOME=.  TESTS = t-version t-data t-encrypt t-sign t-signers t-decrypt t-verify	\ -	t-keylist t-export t-import t-trustlist +	t-decrypt-verify t-keylist t-export t-import t-trustlist  EXTRA_DIST = mkdemodirs pubdemo.asc secdemo.asc cipher-1.asc geheim.txt \ diff --git a/tests/cipher-2.asc b/tests/cipher-2.asc new file mode 100644 index 00000000..210f3e97 --- /dev/null +++ b/tests/cipher-2.asc @@ -0,0 +1,16 @@ +-----BEGIN PGP MESSAGE----- +Version: GnuPG v1.0.6 (GNU/Linux) +Comment: Weitere Infos: siehe http://www.gnupg.org + +hQEOA++dwnahcsiBEAP9HgkC1ElQwZRX1X/MBF54Q28dpXKr84IviO4QcbnnhmYk +2IlaNe6mr8R7kNM1aqJFK3fnobqnSWwM/VBObMqqYnzZSfclCNsy66sojQJxwXcz +DKQKi69BLaC6aTMnX048tOl8pJpR72fkffUOUa5ywDHVVVUClDG3XkIrfM1du3YD +/A6vFSrRylupKhQBxdtSUx5IDmpDYwG2vqqbYKoMaQ4pPSKLYV2zskU+pQWRlk6y +nwPGY5h9eGz0xYHMPxhe9VnwljeTEDwz5U4CHF3wQ8h5WBxOVx5QN/H/UyjpmoJT +ddrIu+8GgajhBVKVYAOqr577exkiSDA60/JrYbKZBvzL0sAJAUu+HoeMPJ+5/RYF +pLSdz/3MbVDRJJqzV2TJnEBvFtPa6urzx99P0u4xr+RJMFmR9/99YXhYz7+Y6d/B +44F6B3YouYxiK39IoOUcYPZTwb5kaudD5a3mU3XxEhSDUpnyvowPiKQO1T8CPd2u +2HsD3KeaOc2VFE0gnvqECvUTQfSCZCk/kil8XVAMHZrEA0bWAYiaHfHEOB8SRCy8 +rW0wsON4uDXmZpUkfOjFoYZdpJI7fDKkb5uYUzFZDasharEaXb1X/5xSAclx +=+eYk +-----END PGP MESSAGE----- diff --git a/tests/t-decrypt-verify.c b/tests/t-decrypt-verify.c new file mode 100644 index 00000000..1c1f143e --- /dev/null +++ b/tests/t-decrypt-verify.c @@ -0,0 +1,147 @@ +/* t-decrypt-verify.c  - regression test + *	Copyright (C) 2000 Werner Koch (dd9jn) + *      Copyright (C) 2001 g10 Code GmbH + * + * This file is part of GPGME. + * + * GPGME is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * GPGME is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA + */ + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <assert.h> +#include <errno.h> +#include <mcheck.h> + +#include "../gpgme/gpgme.h" + +struct passphrase_cb_info_s +{ +  GpgmeCtx c; +  int did_it; +}; + + +#define fail_if_err(a) do { if(a) { int my_errno = errno;	\ +            fprintf (stderr, "%s:%d: GpgmeError %s\n",		\ +                 __FILE__, __LINE__, gpgme_strerror(a));	\ +            if ((a) == GPGME_File_Error)			\ +                   fprintf (stderr, "\terrno=`%s'\n", strerror (my_errno)); \ +                   exit (1); }					\ +                             } while(0) + +static void +print_data (GpgmeData dh) +{ +  char buf[100]; +  size_t nread; +  GpgmeError err; + +  err = gpgme_data_rewind (dh); +  fail_if_err (err); +  while (!(err = gpgme_data_read (dh, buf, 100, &nread))) +    fwrite ( buf, nread, 1, stdout ); +  if (err != GPGME_EOF)  +    fail_if_err (err); +} + +static const char * +passphrase_cb (void *opaque, const char *desc, void *r_hd) +{ +  const char *pass; + +  if ( !desc ) +    { +      /* Cleanup by looking at *r_hd.  */ +      return NULL; +    } + +  pass = "abc"; +  fprintf (stderr, "%% requesting passphrase for `%s': ", desc); +  fprintf (stderr, "sending `%s'\n", pass); + +  return pass; +} + +static char * +mk_fname (const char *fname) +{ +  const char *srcdir = getenv ("srcdir"); +  char *buf; + +  if (!srcdir) +    srcdir = "."; +  buf = malloc (strlen(srcdir) + strlen(fname) + 2); +  if (!buf) +    exit (8); +  strcpy (buf, srcdir); +  strcat (buf, "/"); +  strcat (buf, fname); +  return buf; +} + +int  +main (int argc, char **argv) +{ +  GpgmeCtx ctx; +  GpgmeError err; +  GpgmeData in, out, pwdata = NULL; +  struct passphrase_cb_info_s info; +  const char *cipher_2_asc = mk_fname ("cipher-2.asc"); +  GpgmeSigStat stat; + +  do +    { +      err = gpgme_new (&ctx); +      fail_if_err (err); +      if (!getenv("GPG_AGENT_INFO")) +	{ +	  memset (&info, 0, sizeof info); +	  info.c = ctx; +	  gpgme_set_passphrase_cb (ctx, passphrase_cb, &info); +	}  + +      err = gpgme_data_new_from_file (&in, cipher_2_asc, 1); +      fail_if_err (err); + +      err = gpgme_data_new (&out); +      fail_if_err (err); + +      err = gpgme_op_decrypt_verify (ctx, in, out, &stat); +      fail_if_err (err); +     +      fflush (NULL); +      fputs ("Begin Result:\n", stdout); +      print_data (out); +      fputs ("End Result.\n", stdout); +    +      if (stat != GPGME_SIG_STAT_GOOD) +	{ +	  fprintf (stderr, "Signature check failed unexpectedly.\n"); +	  exit (1); +	} + +      gpgme_data_release (in); +      gpgme_data_release (out); +      gpgme_data_release (pwdata); +      gpgme_release (ctx); +    } +  while (argc > 1 && !strcmp (argv[1], "--loop")); + +  return 0; +} + + | 
