Blame tests/gpg/t-encrypt-mixed.c

Packit d7e8d0
/* t-encrypt-mixed.c - Regression test.
Packit d7e8d0
   Copyright (C) 2016 by Bundesamt für Sicherheit in der Informationstechnik
Packit d7e8d0
   Software engineering by Intevation GmbH
Packit d7e8d0
Packit d7e8d0
   This file is part of GPGME.
Packit d7e8d0
Packit d7e8d0
   GPGME is free software; you can redistribute it and/or modify it
Packit d7e8d0
   under the terms of the GNU Lesser General Public License as
Packit d7e8d0
   published by the Free Software Foundation; either version 2.1 of
Packit d7e8d0
   the License, or (at your option) any later version.
Packit d7e8d0
Packit d7e8d0
   GPGME is distributed in the hope that it will be useful, but
Packit d7e8d0
   WITHOUT ANY WARRANTY; without even the implied warranty of
Packit d7e8d0
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit d7e8d0
   Lesser General Public License for more details.
Packit d7e8d0
Packit d7e8d0
   You should have received a copy of the GNU Lesser General Public
Packit d7e8d0
   License along with this program; if not, write to the Free Software
Packit d7e8d0
   Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
Packit d7e8d0
   02111-1307, USA.  */
Packit d7e8d0
Packit d7e8d0
#ifdef HAVE_CONFIG_H
Packit d7e8d0
#include <config.h>
Packit d7e8d0
#endif
Packit d7e8d0
Packit d7e8d0
#include <stdlib.h>
Packit d7e8d0
#include <stdio.h>
Packit d7e8d0
#include <string.h>
Packit d7e8d0
Packit d7e8d0
#include <gpgme.h>
Packit d7e8d0
Packit d7e8d0
#include "t-support.h"
Packit d7e8d0
Packit d7e8d0
/* Tests mixed symmetric and asymetric decryption. Verifies
Packit d7e8d0
   that an encrypted message can be decrypted without the
Packit d7e8d0
   secret key but that the recipient is also set correctly. */
Packit d7e8d0
int
Packit d7e8d0
main (void)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_ctx_t ctx;
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  gpgme_data_t in, out;
Packit d7e8d0
  gpgme_key_t key[2] = { NULL, NULL };
Packit d7e8d0
  gpgme_encrypt_result_t result;
Packit d7e8d0
  gpgme_decrypt_result_t dec_result;
Packit d7e8d0
  gpgme_recipient_t recipient;
Packit d7e8d0
  const char *text = "Hallo Leute\n";
Packit d7e8d0
  char *text2;
Packit d7e8d0
  size_t len;
Packit d7e8d0
Packit d7e8d0
  init_gpgme (GPGME_PROTOCOL_OpenPGP);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_new (&ctx;;
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  gpgme_set_armor (ctx, 1);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_data_new_from_mem (&in, text, strlen (text), 0);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_data_new (&out;;
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  gpgme_set_passphrase_cb (ctx, passphrase_cb, NULL);
Packit d7e8d0
Packit d7e8d0
  /* A recipient for which we don't have a secret key */
Packit d7e8d0
  err = gpgme_get_key (ctx, "D695676BDCEDCC2CDD6152BCFE180B1DA9E3B0B2",
Packit d7e8d0
                       &key[0], 0);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_op_encrypt (ctx, key,
Packit d7e8d0
                          GPGME_ENCRYPT_ALWAYS_TRUST | GPGME_ENCRYPT_SYMMETRIC,
Packit d7e8d0
                          in, out);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  result = gpgme_op_encrypt_result (ctx);
Packit d7e8d0
  if (result->invalid_recipients)
Packit d7e8d0
    {
Packit d7e8d0
      fprintf (stderr, "Invalid recipient encountered: %s\n",
Packit d7e8d0
               result->invalid_recipients->fpr);
Packit d7e8d0
      exit (1);
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  print_data (out);
Packit d7e8d0
Packit d7e8d0
  /* Now try to decrypt */
Packit d7e8d0
  gpgme_data_seek (out, 0, SEEK_SET);
Packit d7e8d0
Packit d7e8d0
  gpgme_data_release (in);
Packit d7e8d0
  err = gpgme_data_new (&in);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_op_decrypt (ctx, out, in);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  fputs ("Begin Result Decryption:\n", stdout);
Packit d7e8d0
  print_data (in);
Packit d7e8d0
  fputs ("End Result.\n", stdout);
Packit d7e8d0
Packit d7e8d0
  dec_result = gpgme_op_decrypt_result (ctx);
Packit d7e8d0
  if (dec_result->unsupported_algorithm || dec_result->wrong_key_usage)
Packit d7e8d0
    {
Packit d7e8d0
      fprintf (stderr, "%s:%d: Decryption failed\n", __FILE__, __LINE__);
Packit d7e8d0
      exit (1);
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  text2 = gpgme_data_release_and_get_mem (in, &len;;
Packit d7e8d0
  if (strncmp (text, text2, len))
Packit d7e8d0
    {
Packit d7e8d0
      fprintf (stderr, "%s:%d: Wrong plaintext\n", __FILE__, __LINE__);
Packit d7e8d0
      exit (1);
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  recipient = dec_result->recipients;
Packit d7e8d0
  if (!recipient || recipient->next)
Packit d7e8d0
    {
Packit d7e8d0
      fprintf (stderr, "%s:%d: Invalid recipients \n", __FILE__, __LINE__);
Packit d7e8d0
      exit (1);
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  if (strncmp (recipient->keyid, "5381EA4EE29BA37F", 16))
Packit d7e8d0
    {
Packit d7e8d0
      fprintf (stderr, "%s:%d: Not encrypted to recipient's subkey \n", __FILE__, __LINE__);
Packit d7e8d0
      exit (1);
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  gpgme_key_unref (key[0]);
Packit d7e8d0
  free (text2);
Packit d7e8d0
  gpgme_data_release (out);
Packit d7e8d0
  gpgme_release (ctx);
Packit d7e8d0
  return 0;
Packit d7e8d0
}