diff options
Diffstat (limited to 'tests')
-rw-r--r-- | tests/ChangeLog | 9 | ||||
-rw-r--r-- | tests/gpg/t-encrypt-sign.c | 18 | ||||
-rw-r--r-- | tests/gpg/t-encrypt-sym.c | 124 | ||||
-rw-r--r-- | tests/gpg/t-encrypt.c | 24 | ||||
-rw-r--r-- | tests/gpg/t-eventloop.c | 18 | ||||
-rw-r--r-- | tests/gpg/t-export.c | 15 | ||||
-rw-r--r-- | tests/gpgsm/t-encrypt.c | 10 | ||||
-rw-r--r-- | tests/gpgsm/t-export.c | 11 |
8 files changed, 109 insertions, 120 deletions
diff --git a/tests/ChangeLog b/tests/ChangeLog index 6191e5e8..0d45e9ff 100644 --- a/tests/ChangeLog +++ b/tests/ChangeLog @@ -1,3 +1,12 @@ +2003-05-29 Marcus Brinkmann <[email protected]> + + * gpg/t-encrypt-sym.c (main): Adapt to new syntax. + * gpg/t-encrypt.c (main): Likewise. + * gpg/t-eventloop.c (main): Likewise. + * gpg/t-encrypt-sign.c (main): Likewise. + * gpgsm/t-export.c (main): Likewise. + * gpgsm/t-encrypt.c (main): Likewise. + 2003-05-28 Marcus Brinkmann <[email protected]> * gpg/t-eventloop.c (main): Rewrite recipient management. diff --git a/tests/gpg/t-encrypt-sign.c b/tests/gpg/t-encrypt-sign.c index 8dd8235d..40a654be 100644 --- a/tests/gpg/t-encrypt-sign.c +++ b/tests/gpg/t-encrypt-sign.c @@ -117,8 +117,7 @@ main (int argc, char **argv) gpgme_ctx_t ctx; gpgme_error_t err; gpgme_data_t in, out; - gpgme_user_id_t rset = NULL; - gpgme_user_id_t *rset_lastp = &rset; + gpgme_key_t key[3] = { NULL, NULL, NULL }; gpgme_encrypt_result_t result; gpgme_sign_result_t sign_result; char *agent_info; @@ -141,16 +140,14 @@ main (int argc, char **argv) err = gpgme_data_new (&out); fail_if_err (err); - err = gpgme_user_ids_append (rset_lastp, "Alpha"); + err = gpgme_get_key (ctx, "A0FF4590BB6122EDEF6E3C542D727CC768697734", + &key[0], 0); fail_if_err (err); - (*rset_lastp)->validity = GPGME_VALIDITY_FULL; - - rset_lastp = &(*rset_lastp)->next; - err = gpgme_user_ids_append (rset_lastp, "Bob"); + err = gpgme_get_key (ctx, "D695676BDCEDCC2CDD6152BCFE180B1DA9E3B0B2", + &key[1], 0); fail_if_err (err); - (*rset_lastp)->validity = GPGME_VALIDITY_FULL; - err = gpgme_op_encrypt_sign (ctx, rset, in, out); + err = gpgme_op_encrypt_sign (ctx, key, GPGME_ENCRYPT_ALWAYS_TRUST, in, out); fail_if_err (err); result = gpgme_op_encrypt_result (ctx); if (result->invalid_recipients) @@ -163,7 +160,8 @@ main (int argc, char **argv) check_result (sign_result, GPGME_SIG_MODE_NORMAL); print_data (out); - gpgme_user_ids_release (rset); + gpgme_key_unref (key[0]); + gpgme_key_unref (key[1]); gpgme_data_release (in); gpgme_data_release (out); gpgme_release (ctx); diff --git a/tests/gpg/t-encrypt-sym.c b/tests/gpg/t-encrypt-sym.c index 5adc31c4..41fe3085 100644 --- a/tests/gpg/t-encrypt-sym.c +++ b/tests/gpg/t-encrypt-sym.c @@ -1,23 +1,22 @@ /* t-encrypt-sym.c - regression test - * Copyright (C) 2000 Werner Koch (dd9jn) - * Copyright (C) 2001, 2003 g10 Code GmbH - * - * This file is part of GPGME. - * - * GPGME is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * GPGME is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA - */ + Copyright (C) 2000 Werner Koch (dd9jn) + Copyright (C) 2001, 2003 g10 Code GmbH + + This file is part of GPGME. + + GPGME is free software; you can redistribute it and/or modify it + under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + GPGME is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received a copy of the GNU General Public License + along with GPGME; if not, write to the Free Software Foundation, + Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ #include <stdio.h> #include <stdlib.h> @@ -27,11 +26,18 @@ #include <gpgme.h> -#define fail_if_err(a) do { if(a) { \ - fprintf (stderr, "%s:%d: gpgme_error_t %s\n", \ - __FILE__, __LINE__, gpgme_strerror(a)); \ - exit (1); } \ - } while(0) +#define fail_if_err(err) \ + do \ + { \ + if (err) \ + { \ + fprintf (stderr, "%s:%d: gpgme_error_t %s\n", \ + __FILE__, __LINE__, gpgme_strerror (err)); \ + exit (1); \ + } \ + } \ + while (0) + static void print_data (gpgme_data_t dh) @@ -72,54 +78,50 @@ main (int argc, char **argv) err = gpgme_engine_check_version (GPGME_PROTOCOL_OpenPGP); fail_if_err (err); - do - { - err = gpgme_new (&ctx); - fail_if_err (err); - gpgme_set_armor (ctx, 1); - - p = getenv("GPG_AGENT_INFO"); - if (!(p && strchr (p, ':'))) - gpgme_set_passphrase_cb (ctx, passphrase_cb, NULL); + err = gpgme_new (&ctx); + fail_if_err (err); + gpgme_set_armor (ctx, 1); - err = gpgme_data_new_from_mem (&plain, text, strlen (text), 0); - fail_if_err (err); + p = getenv("GPG_AGENT_INFO"); + if (!(p && strchr (p, ':'))) + gpgme_set_passphrase_cb (ctx, passphrase_cb, NULL); - err = gpgme_data_new (&cipher); - fail_if_err (err); + err = gpgme_data_new_from_mem (&plain, text, strlen (text), 0); + fail_if_err (err); - err = gpgme_op_encrypt (ctx, 0, plain, cipher); - fail_if_err (err); + err = gpgme_data_new (&cipher); + fail_if_err (err); - fflush (NULL); - fputs ("Begin Result Encryption:\n", stdout); - print_data (cipher); - fputs ("End Result.\n", stdout); + err = gpgme_op_encrypt (ctx, 0, 0, plain, cipher); + fail_if_err (err); - gpgme_data_seek (cipher, 0, SEEK_SET); + fflush (NULL); + fputs ("Begin Result Encryption:\n", stdout); + print_data (cipher); + fputs ("End Result.\n", stdout); - gpgme_data_release (plain); - err = gpgme_data_new (&plain); - fail_if_err (err); + gpgme_data_seek (cipher, 0, SEEK_SET); - err = gpgme_op_decrypt (ctx, cipher, plain); - fail_if_err (err); + gpgme_data_release (plain); + err = gpgme_data_new (&plain); + fail_if_err (err); - fputs ("Begin Result Decryption:\n", stdout); - print_data (plain); - fputs ("End Result.\n", stdout); + err = gpgme_op_decrypt (ctx, cipher, plain); + fail_if_err (err); - text2 = gpgme_data_release_and_get_mem (plain, &len); - if (strncmp (text, text2, len)) - { - fprintf (stderr, "%s:%d: Wrong plaintext\n", __FILE__, __LINE__); - exit (1); - } + fputs ("Begin Result Decryption:\n", stdout); + print_data (plain); + fputs ("End Result.\n", stdout); - gpgme_data_release (cipher); - gpgme_release (ctx); + text2 = gpgme_data_release_and_get_mem (plain, &len); + if (strncmp (text, text2, len)) + { + fprintf (stderr, "%s:%d: Wrong plaintext\n", __FILE__, __LINE__); + exit (1); } - while (argc > 1 && !strcmp (argv[1], "--loop")); + + gpgme_data_release (cipher); + gpgme_release (ctx); return 0; } diff --git a/tests/gpg/t-encrypt.c b/tests/gpg/t-encrypt.c index 0e41eb37..1373a397 100644 --- a/tests/gpg/t-encrypt.c +++ b/tests/gpg/t-encrypt.c @@ -60,10 +60,11 @@ main (int argc, char **argv) gpgme_ctx_t ctx; gpgme_error_t err; gpgme_data_t in, out; - gpgme_user_id_t rset = NULL; - gpgme_user_id_t *rset_lastp = &rset; + gpgme_key_t key[3] = { NULL, NULL, NULL }; gpgme_encrypt_result_t result; + gpgme_check_version (0); + err = gpgme_engine_check_version (GPGME_PROTOCOL_OpenPGP); fail_if_err (err); @@ -76,17 +77,15 @@ main (int argc, char **argv) err = gpgme_data_new (&out); fail_if_err (err); - - err = gpgme_user_ids_append (rset_lastp, "Alpha"); - fail_if_err (err); - (*rset_lastp)->validity = GPGME_VALIDITY_FULL; - rset_lastp = &(*rset_lastp)->next; - err = gpgme_user_ids_append (rset_lastp, "Bob"); + err = gpgme_get_key (ctx, "A0FF4590BB6122EDEF6E3C542D727CC768697734", + &key[0], 0); + fail_if_err (err); + err = gpgme_get_key (ctx, "D695676BDCEDCC2CDD6152BCFE180B1DA9E3B0B2", + &key[1], 0); fail_if_err (err); - (*rset_lastp)->validity = GPGME_VALIDITY_FULL; - err = gpgme_op_encrypt (ctx, rset, in, out); + err = gpgme_op_encrypt (ctx, key, GPGME_ENCRYPT_ALWAYS_TRUST, in, out); fail_if_err (err); result = gpgme_op_encrypt_result (ctx); if (result->invalid_recipients) @@ -97,11 +96,10 @@ main (int argc, char **argv) } print_data (out); - gpgme_user_ids_release (rset); + gpgme_key_unref (key[0]); + gpgme_key_unref (key[1]); gpgme_data_release (in); gpgme_data_release (out); gpgme_release (ctx); return 0; } - - diff --git a/tests/gpg/t-eventloop.c b/tests/gpg/t-eventloop.c index 597da1c1..990876d7 100644 --- a/tests/gpg/t-eventloop.c +++ b/tests/gpg/t-eventloop.c @@ -191,8 +191,7 @@ main (int argc, char *argv[]) gpgme_ctx_t ctx; gpgme_error_t err; gpgme_data_t in, out; - gpgme_user_id_t rset = NULL; - gpgme_user_id_t *rset_lastp = &rset; + gpgme_key_t key[3] = { NULL, NULL, NULL }; int i; for (i = 0; i < FDLIST_MAX; i++) @@ -213,16 +212,14 @@ main (int argc, char *argv[]) err = gpgme_data_new (&out); fail_if_err (err); - err = gpgme_user_ids_append (rset_lastp, "Alpha"); + err = gpgme_get_key (ctx, "A0FF4590BB6122EDEF6E3C542D727CC768697734", + &key[0], 0); fail_if_err (err); - (*rset_lastp)->validity = GPGME_VALIDITY_FULL; - - rset_lastp = &(*rset_lastp)->next; - err = gpgme_user_ids_append (rset_lastp, "Bob"); + err = gpgme_get_key (ctx, "D695676BDCEDCC2CDD6152BCFE180B1DA9E3B0B2", + &key[1], 0); fail_if_err (err); - (*rset_lastp)->validity = GPGME_VALIDITY_FULL; - err = gpgme_op_encrypt_start (ctx, rset, in, out); + err = gpgme_op_encrypt_start (ctx, key, GPGME_ENCRYPT_ALWAYS_TRUST, in, out); fail_if_err (err); my_wait (); @@ -234,7 +231,8 @@ main (int argc, char *argv[]) print_data (out); fputs ("End Result.\n", stdout); - gpgme_user_ids_release (rset); + gpgme_key_unref (key[0]); + gpgme_key_unref (key[1]); gpgme_data_release (in); gpgme_data_release (out); gpgme_release (ctx); diff --git a/tests/gpg/t-export.c b/tests/gpg/t-export.c index d36dbb2b..7ec69e6f 100644 --- a/tests/gpg/t-export.c +++ b/tests/gpg/t-export.c @@ -60,8 +60,7 @@ main (int argc, char **argv) gpgme_ctx_t ctx; gpgme_error_t err; gpgme_data_t out; - gpgme_user_id_t uids = NULL; - gpgme_user_id_t *uids_lastp = &uids; + const char *pattern[] = { "Alpha", "Bob", NULL }; err = gpgme_new (&ctx); fail_if_err (err); @@ -69,15 +68,8 @@ main (int argc, char **argv) err = gpgme_data_new (&out); fail_if_err (err); - err = gpgme_user_ids_append (uids_lastp, "Alpha"); - fail_if_err (err); - uids_lastp = &(*uids_lastp)->next; - - err = gpgme_user_ids_append (uids_lastp, "Bob"); - fail_if_err (err); - gpgme_set_armor (ctx, 1); - err = gpgme_op_export (ctx, uids, out); + err = gpgme_op_export_ext (ctx, pattern, 0, out); fail_if_err (err); fflush (NULL); @@ -85,11 +77,8 @@ main (int argc, char **argv) print_data (out); fputs ("End Result.\n", stdout); - gpgme_user_ids_release (uids); gpgme_data_release (out); gpgme_release (ctx); return 0; } - - diff --git a/tests/gpgsm/t-encrypt.c b/tests/gpgsm/t-encrypt.c index 510eda5d..5f8916f7 100644 --- a/tests/gpgsm/t-encrypt.c +++ b/tests/gpgsm/t-encrypt.c @@ -60,7 +60,7 @@ main (int argc, char **argv) gpgme_ctx_t ctx; gpgme_error_t err; gpgme_data_t in, out; - gpgme_user_id_t rset = NULL; + gpgme_key_t key[] = { NULL, NULL }; gpgme_encrypt_result_t result; err = gpgme_engine_check_version (GPGME_PROTOCOL_CMS); @@ -77,11 +77,11 @@ main (int argc, char **argv) err = gpgme_data_new (&out); fail_if_err (err); - err = gpgme_user_ids_append (&rset, "test cert 1"); + err = gpgme_get_key (ctx, "3CF405464F66ED4A7DF45BBDD1E4282E33BDB76E", + &key[0], 0); fail_if_err (err); - rset->validity = GPGME_VALIDITY_FULL; - err = gpgme_op_encrypt (ctx, rset, in, out); + err = gpgme_op_encrypt (ctx, key, 0, in, out); fail_if_err (err); result = gpgme_op_encrypt_result (ctx); if (result->invalid_recipients) @@ -92,7 +92,7 @@ main (int argc, char **argv) } print_data (out); - gpgme_user_ids_release (rset); + gpgme_key_unref (key[0]); gpgme_data_release (in); gpgme_data_release (out); gpgme_release (ctx); diff --git a/tests/gpgsm/t-export.c b/tests/gpgsm/t-export.c index fde58b24..3d536ad4 100644 --- a/tests/gpgsm/t-export.c +++ b/tests/gpgsm/t-export.c @@ -59,9 +59,8 @@ main (int argc, char *argv[]) { gpgme_ctx_t ctx; gpgme_error_t err; - gpgme_data_t out; - gpgme_user_id_t rset = NULL; - + gpgme_data_t out; + const char *pattern[] = { "DFN Top Level Certification Authority", NULL }; err = gpgme_new (&ctx); fail_if_err (err); gpgme_set_protocol (ctx, GPGME_PROTOCOL_CMS); @@ -69,11 +68,8 @@ main (int argc, char *argv[]) err = gpgme_data_new (&out); fail_if_err (err); - err = gpgme_user_ids_append (&rset, "DFN Top Level Certification Authority"); - fail_if_err (err); - gpgme_set_armor (ctx, 1); - err = gpgme_op_export (ctx, rset, out); + err = gpgme_op_export_ext (ctx, pattern, 0, out); fail_if_err (err); fflush (NULL); @@ -81,7 +77,6 @@ main (int argc, char *argv[]) print_data (out); fputs ("End Result.\n", stdout); - gpgme_user_ids_release (rset); gpgme_data_release (out); gpgme_release (ctx); |