/* t-encrypt.c - Regression test. Copyright (C) 2000 Werner Koch (dd9jn) Copyright (C) 2001, 2002, 2003 g10 Code GmbH This file is part of GPGME. GPGME is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. GPGME is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with GPGME; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ #include #include #include #include #include #define fail_if_err(err) \ do \ { \ if (err) \ { \ fprintf (stderr, "%s:%d: gpgme_error_t %s\n", \ __FILE__, __LINE__, gpgme_strerror (err)); \ exit (1); \ } \ } \ while (0) static void print_data (gpgme_data_t dh) { #define BUF_SIZE 512 char buf[BUF_SIZE + 1]; int ret; ret = gpgme_data_seek (dh, 0, SEEK_SET); if (ret) fail_if_err (GPGME_File_Error); while ((ret = gpgme_data_read (dh, buf, BUF_SIZE)) > 0) fwrite (buf, ret, 1, stdout); if (ret < 0) fail_if_err (GPGME_File_Error); } static gpgme_error_t passphrase_cb (void *opaque, const char *uid_hint, const char *passphrase_info, int last_was_bad, int fd) { write (fd, "abc\n", 4); return 0; } static void check_result (gpgme_sign_result_t result, gpgme_sig_mode_t type) { if (result->invalid_signers) { fprintf (stderr, "Invalid signer found: %s\n", result->invalid_signers->id); exit (1); } if (!result->signatures || result->signatures->next) { fprintf (stderr, "Unexpected number of signatures created\n"); exit (1); } if (result->signatures->type != type) { fprintf (stderr, "Wrong type of signature created\n"); exit (1); } if (result->signatures->pubkey_algo != GPGME_PK_DSA) { fprintf (stderr, "Wrong pubkey algorithm reported: %i\n", result->signatures->pubkey_algo); exit (1); } if (result->signatures->hash_algo != GPGME_MD_SHA1) { fprintf (stderr, "Wrong hash algorithm reported: %i\n", result->signatures->hash_algo); exit (1); } if (result->signatures->class != 0) { fprintf (stderr, "Wrong signature class reported: %lu\n", result->signatures->class); exit (1); } if (strcmp ("A0FF4590BB6122EDEF6E3C542D727CC768697734", result->signatures->fpr)) { fprintf (stderr, "Wrong fingerprint reported: %s\n", result->signatures->fpr); exit (1); } } int main (int argc, char **argv) { gpgme_ctx_t ctx; gpgme_error_t err; gpgme_data_t in, out; gpgme_user_id_t rset = NULL; gpgme_user_id_t *rset_lastp = &rset; gpgme_encrypt_result_t result; gpgme_sign_result_t sign_result; char *agent_info; err = gpgme_engine_check_version (GPGME_PROTOCOL_OpenPGP); fail_if_err (err); err = gpgme_new (&ctx); fail_if_err (err); gpgme_set_textmode (ctx, 1); gpgme_set_armor (ctx, 1); agent_info = getenv("GPG_AGENT_INFO"); if (!(agent_info && strchr (agent_info, ':'))) gpgme_set_passphrase_cb (ctx, passphrase_cb, NULL); err = gpgme_data_new_from_mem (&in, "Hallo Leute\n", 12, 0); fail_if_err (err); err = gpgme_data_new (&out); fail_if_err (err); err = gpgme_user_ids_append (rset_lastp, "Alpha"); fail_if_err (err); (*rset_lastp)->validity = GPGME_VALIDITY_FULL; rset_lastp = &(*rset_lastp)->next; err = gpgme_user_ids_append (rset_lastp, "Bob"); fail_if_err (err); (*rset_lastp)->validity = GPGME_VALIDITY_FULL; err = gpgme_op_encrypt_sign (ctx, rset, in, out); fail_if_err (err); result = gpgme_op_encrypt_result (ctx); if (result->invalid_recipients) { fprintf (stderr, "Invalid recipient encountered: %s\n", result->invalid_recipients->id); exit (1); } sign_result = gpgme_op_sign_result (ctx); check_result (sign_result, GPGME_SIG_MODE_NORMAL); print_data (out); gpgme_user_ids_release (rset); gpgme_data_release (in); gpgme_data_release (out); gpgme_release (ctx); return 0; }