aboutsummaryrefslogtreecommitdiffstats
path: root/tests/openpgp/default-key.scm
diff options
context:
space:
mode:
authorJustus Winter <[email protected]>2016-01-07 16:01:45 +0000
committerJustus Winter <[email protected]>2016-06-17 09:57:12 +0000
commit9609cb20e4caee739b9fc4fd36797029d2970041 (patch)
tree052eaa0ad4afda93f4bd7eec4c90886cf72f778e /tests/openpgp/default-key.scm
parenttests/gpgscm: Add a TinySCHEME-based test driver. (diff)
downloadgnupg-9609cb20e4caee739b9fc4fd36797029d2970041.tar.gz
gnupg-9609cb20e4caee739b9fc4fd36797029d2970041.zip
tests/openpgp: Reimplement tests in Scheme.
* Makefile.am: Build the test infrastructure on Windows. * tests/openpgp/Makefile.am (required_pgms): Add gpgscm. (TESTS_ENVIRONMENT): Make sure gpgscm and the libraries are found. (TESTS): Replace tests with the new Scheme implementations. * tests/openpgp/4gb-packet.scm: New file. * tests/openpgp/README: Likewise. * tests/openpgp/armdetach.scm: Likewise. * tests/openpgp/armdetachm.scm: Likewise. * tests/openpgp/armencrypt.scm: Likewise. * tests/openpgp/armencryptp.scm: Likewise. * tests/openpgp/armor.scm: Likewise. * tests/openpgp/armsignencrypt.scm: Likewise. * tests/openpgp/armsigs.scm: Likewise. * tests/openpgp/clearsig.scm: Likewise. * tests/openpgp/conventional-mdc.scm: Likewise. * tests/openpgp/conventional.scm: Likewise. * tests/openpgp/decrypt-dsa.scm: Likewise. * tests/openpgp/decrypt.scm: Likewise. * tests/openpgp/default-key.scm: Likewise. * tests/openpgp/defs.scm: Likewise. * tests/openpgp/detach.scm: Likewise. * tests/openpgp/detachm.scm: Likewise. * tests/openpgp/ecc.scm: Likewise. * tests/openpgp/encrypt-dsa.scm: Likewise. * tests/openpgp/encrypt.scm: Likewise. * tests/openpgp/encryptp.scm: Likewise. * tests/openpgp/finish.scm: Likewise. * tests/openpgp/genkey1024.scm: Likewise. * tests/openpgp/gpgtar.scm: Likewise. * tests/openpgp/import.scm: Likewise. * tests/openpgp/mds.scm: Likewise. * tests/openpgp/multisig.scm: Likewise. * tests/openpgp/run-tests.scm: Likewise. * tests/openpgp/seat.scm: Likewise. * tests/openpgp/setup.scm: Likewise. * tests/openpgp/signencrypt-dsa.scm: Likewise. * tests/openpgp/signencrypt.scm: Likewise. * tests/openpgp/sigs-dsa.scm: Likewise. * tests/openpgp/sigs.scm: Likewise. * tests/openpgp/use-exact-key.scm: Likewise. * tests/openpgp/verify.scm: Likewise. * tests/openpgp/version.scm: Likewise. Signed-off-by: Justus Winter <[email protected]>
Diffstat (limited to 'tests/openpgp/default-key.scm')
-rwxr-xr-xtests/openpgp/default-key.scm76
1 files changed, 76 insertions, 0 deletions
diff --git a/tests/openpgp/default-key.scm b/tests/openpgp/default-key.scm
new file mode 100755
index 000000000..443365883
--- /dev/null
+++ b/tests/openpgp/default-key.scm
@@ -0,0 +1,76 @@
+#!/usr/bin/env gpgscm
+
+;; Copyright (C) 2016 g10 Code GmbH
+;;
+;; This file is part of GnuPG.
+;;
+;; GnuPG is free software; you can redistribute it and/or modify
+;; it under the terms of the GNU General Public License as published by
+;; the Free Software Foundation; either version 3 of the License, or
+;; (at your option) any later version.
+;;
+;; GnuPG is distributed in the hope that it will be useful,
+;; but WITHOUT ANY WARRANTY; without even the implied warranty of
+;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+;; GNU General Public License for more details.
+;;
+;; You should have received a copy of the GNU General Public License
+;; along with this program; if not, see <http://www.gnu.org/licenses/>.
+
+(load (with-path "defs.scm"))
+
+;; Import the sample key
+;;
+;; pub 1024R/8BC90111 2015-12-02
+;; Key fingerprint = E657 FB60 7BB4 F21C 90BB 6651 BC06 7AF2 8BC9 0111
+;; uid [ultimate] Barrett Brown <[email protected]>
+;; sub 1024R/3E880CFF 2015-12-02 (encryption)
+;; sub 1024R/F5F77B83 2015-12-02 (signing)
+;; sub 1024R/45117079 2015-12-02 (encryption)
+;; sub 1024R/1EA97479 2015-12-02 (signing)
+
+(info "Importing public key.")
+(call-check
+ `(,(tool 'gpg) --import
+ ,(in-srcdir "samplekeys/E657FB607BB4F21C90BB6651BC067AF28BC90111.asc")))
+
+;; By default, the most recent, valid signing subkey (1EA97479).
+(for-each-p
+ "Checking that the most recent, valid signing subkey is used by default"
+ (lambda (keyid)
+ (tr:do
+ (tr:pipe-do
+ (pipe:defer (lambda (sink) (display "" (fdopen sink "w"))))
+ (pipe:gpg `(--default-key ,keyid -s))
+ (pipe:gpg '(--verify --status-fd=1)))
+ (tr:call-with-content
+ (lambda (c)
+ (unless (string-contains?
+ c "VALIDSIG 5FBA84ACE02DCB17DA3DFF6BBCA43C441EA97479")
+ (exit 1))))))
+ '("8BC90111" "3E880CFF" "F5F77B83" "45117079" "1EA97479"))
+
+;; But, if we request a particular signing key, we should get it.
+(for-each-p
+ "Checking that the most recent, valid encryption subkey is used by default"
+ (lambda (keyid)
+ (tr:do
+ (tr:pipe-do
+ (pipe:defer (lambda (sink) (display "" (fdopen sink "w"))))
+ ;; We need another recipient, because --encrypt-to-default-key is
+ ;; not considered a recipient and gpg doesn't encrypt without any
+ ;; recipients.
+ ;;
+ ;; Note: it doesn't matter whether we specify the primary key or
+ ;; a subkey: the newest encryption subkey will be used.
+ (pipe:gpg `(--default-key ,keyid --encrypt-to-default-key
+ -r "439F02CA" -e))
+ (pipe:gpg '(--list-packets)))
+ (tr:call-with-content
+ (lambda (c)
+ (unless (any (lambda (line)
+ (and (string-prefix? line ":pubkey enc packet:")
+ (string-suffix? line "45117079")))
+ (string-split c #\newline))
+ (exit 1))))))
+ '("8BC90111" "3E880CFF" "F5F77B83" "45117079" "1EA97479"))