/* t-decrypt-verify.c - regression test * Copyright (C) 2000 Werner Koch (dd9jn) * Copyright (C) 2001 g10 Code GmbH * * This file is part of GPGME. * * GPGME is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * GPGME is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA */ #include #include #include #include #include #include #include struct passphrase_cb_info_s { GpgmeCtx c; int did_it; }; #define fail_if_err(a) do { if(a) { int my_errno = errno; \ fprintf (stderr, "%s:%d: GpgmeError %s\n", \ __FILE__, __LINE__, gpgme_strerror(a)); \ if ((a) == GPGME_File_Error) \ fprintf (stderr, "\terrno=`%s'\n", strerror (my_errno)); \ exit (1); } \ } while(0) static void print_data (GpgmeData dh) { char buf[100]; size_t nread; GpgmeError err; err = gpgme_data_rewind (dh); fail_if_err (err); while (!(err = gpgme_data_read (dh, buf, 100, &nread))) fwrite ( buf, nread, 1, stdout ); if (err != GPGME_EOF) fail_if_err (err); } static const char * passphrase_cb (void *opaque, const char *desc, void *r_hd) { const char *pass; if ( !desc ) { /* Cleanup by looking at *r_hd. */ return NULL; } pass = "abc"; fprintf (stderr, "%% requesting passphrase for `%s': ", desc); fprintf (stderr, "sending `%s'\n", pass); return pass; } static char * mk_fname (const char *fname) { const char *srcdir = getenv ("srcdir"); char *buf; if (!srcdir) srcdir = "."; buf = malloc (strlen(srcdir) + strlen(fname) + 2); if (!buf) exit (8); strcpy (buf, srcdir); strcat (buf, "/"); strcat (buf, fname); return buf; } int main (int argc, char **argv) { GpgmeCtx ctx; GpgmeError err; GpgmeData in, out, pwdata = NULL; struct passphrase_cb_info_s info; const char *cipher_2_asc = mk_fname ("cipher-2.asc"); GpgmeSigStat stat; do { err = gpgme_new (&ctx); fail_if_err (err); if (!getenv("GPG_AGENT_INFO")) { memset (&info, 0, sizeof info); info.c = ctx; gpgme_set_passphrase_cb (ctx, passphrase_cb, &info); } err = gpgme_data_new_from_file (&in, cipher_2_asc, 1); fail_if_err (err); err = gpgme_data_new (&out); fail_if_err (err); err = gpgme_op_decrypt_verify (ctx, in, out, &stat); fail_if_err (err); fflush (NULL); fputs ("Begin Result:\n", stdout); print_data (out); fputs ("End Result.\n", stdout); if (stat != GPGME_SIG_STAT_GOOD) { fprintf (stderr, "Signature check failed unexpectedly.\n"); exit (1); } gpgme_data_release (in); gpgme_data_release (out); gpgme_data_release (pwdata); gpgme_release (ctx); } while (argc > 1 && !strcmp (argv[1], "--loop")); return 0; }