Blame tests/gpg/t-signers.c

Packit d7e8d0
/* t-signers.c - Regression tests for the multiple signers interface.
Packit d7e8d0
   Copyright (C) 2000 Werner Koch (dd9jn)
Packit d7e8d0
   Copyright (C) 2001, 2003, 2004 g10 Code GmbH
Packit d7e8d0
Packit d7e8d0
   This file is part of GPGME.
Packit d7e8d0
Packit d7e8d0
   GPGME is free software; you can redistribute it and/or modify it
Packit d7e8d0
   under the terms of the GNU Lesser General Public License as
Packit d7e8d0
   published by the Free Software Foundation; either version 2.1 of
Packit d7e8d0
   the License, or (at your option) any later version.
Packit d7e8d0
Packit d7e8d0
   GPGME is distributed in the hope that it will be useful, but
Packit d7e8d0
   WITHOUT ANY WARRANTY; without even the implied warranty of
Packit d7e8d0
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit d7e8d0
   Lesser General Public License for more details.
Packit d7e8d0
Packit d7e8d0
   You should have received a copy of the GNU Lesser General Public
Packit d7e8d0
   License along with this program; if not, write to the Free Software
Packit d7e8d0
   Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
Packit d7e8d0
   02111-1307, USA.  */
Packit d7e8d0
Packit d7e8d0
/* We need to include config.h so that we know whether we are building
Packit d7e8d0
   with large file system (LFS) support. */
Packit d7e8d0
#ifdef HAVE_CONFIG_H
Packit d7e8d0
#include <config.h>
Packit d7e8d0
#endif
Packit d7e8d0
Packit d7e8d0
#include <stdlib.h>
Packit d7e8d0
#include <stdio.h>
Packit d7e8d0
#include <string.h>
Packit d7e8d0
#include <unistd.h>
Packit d7e8d0
Packit d7e8d0
#include <gpgme.h>
Packit d7e8d0
Packit d7e8d0
#include "t-support.h"
Packit d7e8d0
Packit d7e8d0

Packit d7e8d0
static void
Packit d7e8d0
check_result (gpgme_sign_result_t result, gpgme_sig_mode_t type)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_new_signature_t signature;
Packit d7e8d0
Packit d7e8d0
  if (result->invalid_signers)
Packit d7e8d0
    {
Packit d7e8d0
      fprintf (stderr, "Invalid signer found: %s\n",
Packit d7e8d0
	       result->invalid_signers->fpr);
Packit d7e8d0
      exit (1);
Packit d7e8d0
    }
Packit d7e8d0
  if (!result->signatures || !result->signatures->next
Packit d7e8d0
      || result->signatures->next->next)
Packit d7e8d0
    {
Packit d7e8d0
      fprintf (stderr, "Unexpected number of signatures created\n");
Packit d7e8d0
      exit (1);
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  signature = result->signatures;
Packit d7e8d0
  while (signature)
Packit d7e8d0
    {
Packit d7e8d0
      if (signature->type != type)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Wrong type of signature created\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (signature->pubkey_algo != GPGME_PK_DSA)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Wrong pubkey algorithm reported: %i\n",
Packit d7e8d0
		   signature->pubkey_algo);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (signature->hash_algo != GPGME_MD_SHA1)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Wrong hash algorithm reported: %i\n",
Packit d7e8d0
		   signature->hash_algo);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (signature->sig_class != 1)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Wrong signature class reported: %u\n",
Packit d7e8d0
		   signature->sig_class);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (strcmp ("A0FF4590BB6122EDEF6E3C542D727CC768697734",
Packit d7e8d0
		   signature->fpr)
Packit d7e8d0
	  && strcmp ("23FD347A419429BACCD5E72D6BC4778054ACD246",
Packit d7e8d0
		     signature->fpr))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Wrong fingerprint reported: %s\n",
Packit d7e8d0
		   signature->fpr);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      signature = signature->next;
Packit d7e8d0
    }
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
int
Packit d7e8d0
main (int argc, char *argv[])
Packit d7e8d0
{
Packit d7e8d0
  gpgme_ctx_t ctx;
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  gpgme_data_t in, out;
Packit d7e8d0
  gpgme_key_t key[2];
Packit d7e8d0
  gpgme_sign_result_t result;
Packit d7e8d0
  char *agent_info;
Packit d7e8d0
Packit d7e8d0
  (void)argc;
Packit d7e8d0
  (void)argv;
Packit d7e8d0
Packit d7e8d0
  init_gpgme (GPGME_PROTOCOL_OpenPGP);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_new (&ctx;;
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  agent_info = getenv("GPG_AGENT_INFO");
Packit d7e8d0
  if (!(agent_info && strchr (agent_info, ':')))
Packit d7e8d0
    gpgme_set_passphrase_cb (ctx, passphrase_cb, NULL);
Packit d7e8d0
Packit d7e8d0
  gpgme_set_textmode (ctx, 1);
Packit d7e8d0
  gpgme_set_armor (ctx, 1);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_op_keylist_start (ctx, NULL, 1);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  err = gpgme_op_keylist_next (ctx, &key[0]);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  err = gpgme_op_keylist_next (ctx, &key[1]);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  err = gpgme_op_keylist_end (ctx);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_signers_add (ctx, key[0]);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  err = gpgme_signers_add (ctx, key[1]);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_data_new_from_mem (&in, "Hallo Leute\n", 12, 0);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  /* First a normal signature.  */
Packit d7e8d0
  err = gpgme_data_new (&out;;
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  err = gpgme_op_sign (ctx, in, out, GPGME_SIG_MODE_NORMAL);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  result = gpgme_op_sign_result (ctx);
Packit d7e8d0
  check_result (result, GPGME_SIG_MODE_NORMAL);
Packit d7e8d0
  print_data (out);
Packit d7e8d0
  gpgme_data_release (out);
Packit d7e8d0
Packit d7e8d0
  /* Now a detached signature.  */
Packit d7e8d0
  gpgme_data_seek (in, 0, SEEK_SET);
Packit d7e8d0
  err = gpgme_data_new (&out;;
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  err = gpgme_op_sign (ctx, in, out, GPGME_SIG_MODE_DETACH);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  result = gpgme_op_sign_result (ctx);
Packit d7e8d0
  check_result (result, GPGME_SIG_MODE_DETACH);
Packit d7e8d0
  print_data (out);
Packit d7e8d0
  gpgme_data_release (out);
Packit d7e8d0
Packit d7e8d0
  /* And finally a cleartext signature.  */
Packit d7e8d0
  gpgme_data_seek (in, 0, SEEK_SET);
Packit d7e8d0
  err = gpgme_data_new (&out;;
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  err = gpgme_op_sign (ctx, in, out, GPGME_SIG_MODE_CLEAR);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  result = gpgme_op_sign_result (ctx);
Packit d7e8d0
  check_result (result, GPGME_SIG_MODE_CLEAR);
Packit d7e8d0
  print_data (out);
Packit d7e8d0
  gpgme_data_release (out);
Packit d7e8d0
  gpgme_data_seek (in, 0, SEEK_SET);
Packit d7e8d0
Packit d7e8d0
  gpgme_data_release (in);
Packit d7e8d0
  gpgme_release (ctx);
Packit d7e8d0
Packit d7e8d0
  gpgme_key_unref (key[0]);
Packit d7e8d0
  gpgme_key_unref (key[1]);
Packit d7e8d0
  return 0;
Packit d7e8d0
}