b6e5bb310e
2002-12-24 Marcus Brinkmann <marcus@g10code.de> * gpgme.texi (Verify): Drop R_STAT argument in gpgme_op_verify. * gpgme.texi (Decrypt and Verify): Likewise for gpgme_op_decrypt_verify. gpgme/ 2002-12-24 Marcus Brinkmann <marcus@g10code.de> * gpgme.h (gpgme_op_verify, gpgme_op_decrypt_verify): Drop R_STAT argument. * decrypt-verify.c (gpgme_op_decrypt_verify): Drop R_STAT argument. * verify.c (gpgme_op_verify): Drop R_STAT argument. (_gpgme_intersect_stati): Function removed. * ops.h (_gpgme_intersect_stati): Remove prototype. tests/ 2002-12-24 Marcus Brinkmann <marcus@g10code.de> * gpgsm/t-verify.c (main): Adjust caller of gpgme_op_verify. * gpg/t-verify.c (main): Likewise. * gpg/t-decrypt-verify.c (main): Likewise for gpgme_op_decrypt_verify.
229 lines
6.9 KiB
C
229 lines
6.9 KiB
C
/* t-verify.c - regression test
|
|
Copyright (C) 2000 Werner Koch (dd9jn)
|
|
Copyright (C) 2001, 2002 g10 Code GmbH
|
|
|
|
This file is part of GPGME.
|
|
|
|
GPGME is free software; you can redistribute it and/or modify it
|
|
under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
GPGME is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with GPGME; if not, write to the Free Software Foundation,
|
|
Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <assert.h>
|
|
|
|
#include <gpgme.h>
|
|
|
|
static const char test_text1[] = "Hallo Leute!\n";
|
|
static const char test_text1f[]= "Hallo Leute?\n";
|
|
static const char test_sig1[] =
|
|
"-----BEGIN CMS OBJECT-----\n"
|
|
"MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAA\n"
|
|
"MYIBOTCCATUCAQEwcDBrMQswCQYDVQQGEwJERTETMBEGA1UEBxQKRPxzc2VsZG9y\n"
|
|
"ZjEWMBQGA1UEChMNZzEwIENvZGUgR21iSDEZMBcGA1UECxMQQWVneXB0ZW4gUHJv\n"
|
|
"amVjdDEUMBIGA1UEAxMLdGVzdCBjZXJ0IDECAQAwBwYFKw4DAhqgJTAjBgkqhkiG\n"
|
|
"9w0BCQQxFgQU7FC/ibH3lC9GE24RJJxa8zqP7wEwCwYJKoZIhvcNAQEBBIGAA3oC\n"
|
|
"DUmKERmD1eoJYFw38y/qnncS/6ZPjWINDIphZeK8mzAANpvpIaRPf3sNBznb89QF\n"
|
|
"mRgCXIWcjlHT0DTRLBf192Ve22IyKH00L52CqFsSN3a2sajqRUlXH8RY2D+Al71e\n"
|
|
"MYdRclgjObCcoilA8fZ13VR4DiMJVFCxJL4qVWI=\n"
|
|
"-----END CMS OBJECT-----\n";
|
|
|
|
#define fail_if_err(a) do { if(a) { \
|
|
fprintf (stderr, "%s:%d: GpgmeError %s\n", \
|
|
__FILE__, __LINE__, gpgme_strerror(a)); \
|
|
exit (1); } \
|
|
} while(0)
|
|
|
|
|
|
static const char *
|
|
status_string (GpgmeSigStat status)
|
|
{
|
|
const char *s = "?";
|
|
|
|
switch ( status ) {
|
|
case GPGME_SIG_STAT_NONE:
|
|
s = "None";
|
|
break;
|
|
case GPGME_SIG_STAT_NOSIG:
|
|
s = "No Signature";
|
|
break;
|
|
case GPGME_SIG_STAT_GOOD:
|
|
s = "Good";
|
|
break;
|
|
case GPGME_SIG_STAT_GOOD_EXP:
|
|
s = "Good but expired";
|
|
break;
|
|
case GPGME_SIG_STAT_GOOD_EXPKEY:
|
|
s = "Good but key exipired";
|
|
break;
|
|
case GPGME_SIG_STAT_BAD:
|
|
s = "Bad";
|
|
break;
|
|
case GPGME_SIG_STAT_NOKEY:
|
|
s = "No Key";
|
|
break;
|
|
case GPGME_SIG_STAT_ERROR:
|
|
s = "Error";
|
|
break;
|
|
case GPGME_SIG_STAT_DIFF:
|
|
s = "More than one signature";
|
|
break;
|
|
}
|
|
return s;
|
|
}
|
|
|
|
static const char *
|
|
validity_string (GpgmeValidity val)
|
|
{
|
|
const char *s = "?";
|
|
|
|
switch (val)
|
|
{
|
|
case GPGME_VALIDITY_UNKNOWN: s = "unknown"; break;
|
|
case GPGME_VALIDITY_NEVER: s = "not trusted"; break;
|
|
case GPGME_VALIDITY_MARGINAL:s = "marginal trusted"; break;
|
|
case GPGME_VALIDITY_FULL: s = "fully trusted"; break;
|
|
case GPGME_VALIDITY_UNDEFINED:
|
|
case GPGME_VALIDITY_ULTIMATE:
|
|
break;
|
|
}
|
|
return s;
|
|
}
|
|
|
|
|
|
static void
|
|
print_sig_stat ( GpgmeCtx ctx, GpgmeSigStat status )
|
|
{
|
|
const char *s;
|
|
time_t created;
|
|
int idx;
|
|
GpgmeKey key;
|
|
|
|
printf ("Verification Status: %s\n", status_string (status));
|
|
|
|
for (idx=0; (s=gpgme_get_sig_status (ctx, idx, &status, &created)); idx++ )
|
|
{
|
|
unsigned long sum;
|
|
|
|
printf ("sig %d: created: %lu expires: %lu status: %s\n",
|
|
idx, (unsigned long)created,
|
|
gpgme_get_sig_ulong_attr (ctx, idx, GPGME_ATTR_EXPIRE, 0),
|
|
status_string(status) );
|
|
printf ("sig %d: fpr/keyid: `%s' exterr: `%s' validity: %s\n",
|
|
idx, s,
|
|
gpgme_get_sig_string_attr (ctx, idx, GPGME_ATTR_ERRTOK, 0),
|
|
validity_string (gpgme_get_sig_ulong_attr
|
|
(ctx, idx, GPGME_ATTR_VALIDITY, 0)) );
|
|
|
|
sum = gpgme_get_sig_ulong_attr (ctx, idx, GPGME_ATTR_SIG_SUMMARY, 0);
|
|
fputs ("summary:", stdout);
|
|
if ((sum & GPGME_SIGSUM_VALID))
|
|
fputs (" valid", stdout);
|
|
if ((sum & GPGME_SIGSUM_GREEN))
|
|
fputs (" green", stdout);
|
|
if ((sum & GPGME_SIGSUM_RED))
|
|
fputs (" red", stdout);
|
|
if ((sum & GPGME_SIGSUM_KEY_REVOKED))
|
|
fputs (" keyRevoked", stdout);
|
|
if ((sum & GPGME_SIGSUM_KEY_EXPIRED))
|
|
fputs (" keyExpired", stdout);
|
|
if ((sum & GPGME_SIGSUM_SIG_EXPIRED))
|
|
fputs (" sigExpired", stdout);
|
|
if ((sum & GPGME_SIGSUM_KEY_MISSING))
|
|
fputs (" keyMissing", stdout);
|
|
if ((sum & GPGME_SIGSUM_CRL_MISSING))
|
|
fputs (" crlMissing", stdout);
|
|
if ((sum & GPGME_SIGSUM_CRL_TOO_OLD))
|
|
fputs (" crlTooOld", stdout);
|
|
if ((sum & GPGME_SIGSUM_BAD_POLICY))
|
|
fputs (" badPolicy", stdout);
|
|
if ((sum & GPGME_SIGSUM_SYS_ERROR))
|
|
fputs (" sysError", stdout);
|
|
putchar ('\n');
|
|
|
|
if ( !gpgme_get_sig_key (ctx, idx, &key) )
|
|
{
|
|
char *p = gpgme_key_get_as_xml ( key );
|
|
printf ("sig %d: key object:\n%s\n", idx, p );
|
|
free (p);
|
|
gpgme_key_release (key);
|
|
}
|
|
}
|
|
}
|
|
|
|
int
|
|
main (int argc, char **argv )
|
|
{
|
|
GpgmeCtx ctx;
|
|
GpgmeError err;
|
|
GpgmeData sig, text;
|
|
GpgmeSigStat status;
|
|
char *nota;
|
|
int n = 0;
|
|
|
|
err = gpgme_new (&ctx);
|
|
fail_if_err (err);
|
|
gpgme_set_protocol (ctx, GPGME_PROTOCOL_CMS);
|
|
|
|
do {
|
|
err = gpgme_data_new_from_mem ( &text,
|
|
test_text1, strlen (test_text1), 0 );
|
|
fail_if_err (err);
|
|
err = gpgme_data_new_from_mem ( &sig,
|
|
test_sig1, strlen (test_sig1), 0 );
|
|
fail_if_err (err);
|
|
|
|
puts ("checking a valid message:\n");
|
|
err = gpgme_op_verify (ctx, sig, text, NULL);
|
|
fail_if_err (err);
|
|
if (!gpgme_get_sig_status (ctx, 0, &status, NULL))
|
|
{
|
|
fprintf (stderr, "%s:%d: No signature\n", __FILE__, __LINE__);
|
|
exit (1);
|
|
}
|
|
print_sig_stat (ctx, status);
|
|
|
|
if ( (nota=gpgme_get_notation (ctx)) )
|
|
printf ("---Begin Notation---\n%s---End Notation---\n", nota);
|
|
|
|
puts ("checking a manipulated message:\n");
|
|
gpgme_data_release (text);
|
|
err = gpgme_data_new_from_mem ( &text,
|
|
test_text1f, strlen (test_text1f), 0);
|
|
fail_if_err (err);
|
|
gpgme_data_rewind ( sig );
|
|
err = gpgme_op_verify (ctx, sig, text, NULL);
|
|
fail_if_err (err);
|
|
if (!gpgme_get_sig_status (ctx, 0, &status, NULL))
|
|
{
|
|
fprintf (stderr, "%s:%d: No signature\n", __FILE__, __LINE__);
|
|
exit (1);
|
|
}
|
|
print_sig_stat (ctx, status);
|
|
|
|
if ((nota=gpgme_get_notation (ctx)))
|
|
printf ("---Begin Notation---\n%s---End Notation---\n", nota);
|
|
|
|
gpgme_data_release (sig);
|
|
gpgme_data_release (text);
|
|
|
|
} while ( argc > 1 && !strcmp( argv[1], "--loop" ) && ++n < 20 );
|
|
gpgme_release (ctx);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
|