Blame tests/gpgsm/t-keylist.c

Packit d7e8d0
/* t-keylist.c  - regression test
Packit d7e8d0
   Copyright (C) 2000 Werner Koch (dd9jn)
Packit d7e8d0
   Copyright (C) 2001, 2003, 2004 g10 Code GmbH
Packit d7e8d0
Packit d7e8d0
   This file is part of GPGME.
Packit d7e8d0
Packit d7e8d0
   GPGME is free software; you can redistribute it and/or modify it
Packit d7e8d0
   under the terms of the GNU Lesser General Public License as
Packit d7e8d0
   published by the Free Software Foundation; either version 2.1 of
Packit d7e8d0
   the License, or (at your option) any later version.
Packit d7e8d0
Packit d7e8d0
   GPGME is distributed in the hope that it will be useful, but
Packit d7e8d0
   WITHOUT ANY WARRANTY; without even the implied warranty of
Packit d7e8d0
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit d7e8d0
   Lesser General Public License for more details.
Packit d7e8d0
Packit d7e8d0
   You should have received a copy of the GNU Lesser General Public
Packit d7e8d0
   License along with this program; if not, write to the Free Software
Packit d7e8d0
   Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
Packit d7e8d0
   02111-1307, USA.  */
Packit d7e8d0
Packit d7e8d0
/* We need to include config.h so that we know whether we are building
Packit d7e8d0
   with large file system (LFS) support. */
Packit d7e8d0
#ifdef HAVE_CONFIG_H
Packit d7e8d0
#include <config.h>
Packit d7e8d0
#endif
Packit d7e8d0
Packit d7e8d0
#include <stdlib.h>
Packit d7e8d0
#include <stdio.h>
Packit d7e8d0
#include <string.h>
Packit d7e8d0
Packit d7e8d0
#include <gpgme.h>
Packit d7e8d0
Packit d7e8d0
#include "t-support.h"
Packit d7e8d0
Packit d7e8d0

Packit d7e8d0
struct
Packit d7e8d0
{
Packit d7e8d0
  const char *fpr;
Packit d7e8d0
  int secret;
Packit d7e8d0
  long timestamp;
Packit d7e8d0
  long expires;
Packit d7e8d0
  const char *issuer_serial;
Packit d7e8d0
  const char *issuer_name;
Packit d7e8d0
  const char *chain_id;
Packit d7e8d0
  const char *uid;
Packit d7e8d0
  const char *email;
Packit d7e8d0
  gpgme_validity_t validity;
Packit d7e8d0
  unsigned int key_length;
Packit d7e8d0
}
Packit d7e8d0
keys[] =
Packit d7e8d0
  {
Packit d7e8d0
    { "3CF405464F66ED4A7DF45BBDD1E4282E33BDB76E", 1, 1007372198, 1038908198, "00",
Packit d7e8d0
      "CN=test cert 1,OU=Aegypten Project,O=g10 Code GmbH,L=D\xc3\xbcsseldorf,C=DE",
Packit d7e8d0
      "3CF405464F66ED4A7DF45BBDD1E4282E33BDB76E",
Packit d7e8d0
      "CN=test cert 1,OU=Aegypten Project,O=g10 Code GmbH,L=D\xc3\xbcsseldorf,C=DE",
Packit d7e8d0
      NULL, GPGME_VALIDITY_ULTIMATE, 1024
Packit d7e8d0
    },
Packit d7e8d0
    { "DFA56FB5FC41E3A8921F77AD1622EEFD9152A5AD", 0, 909684190, 1009821790, "01",
Packit d7e8d0
      "1.2.840.113549.1.9.1=#63657274696679407063612E64666E2E6465,"
Packit d7e8d0
      "CN=DFN Top Level Certification Authority,OU=DFN-PCA,"
Packit d7e8d0
      "O=Deutsches Forschungsnetz,C=DE",
Packit d7e8d0
      "DFA56FB5FC41E3A8921F77AD1622EEFD9152A5AD",
Packit d7e8d0
      "1.2.840.113549.1.9.1=#63657274696679407063612E64666E2E6465,"
Packit d7e8d0
      "CN=DFN Top Level Certification Authority,OU=DFN-PCA,"
Packit d7e8d0
      "O=Deutsches Forschungsnetz,C=DE",
Packit d7e8d0
      "<certify@pca.dfn.de>", GPGME_VALIDITY_NEVER, 2048
Packit d7e8d0
    },
Packit d7e8d0
    { "2C8F3C356AB761CB3674835B792CDA52937F9285", 0, 973183644, 1009735200, "15",
Packit d7e8d0
      "1.2.840.113549.1.9.1=#63657274696679407063612E64666E2E6465,"
Packit d7e8d0
      "CN=DFN Top Level Certification Authority,OU=DFN-PCA,"
Packit d7e8d0
      "O=Deutsches Forschungsnetz,C=DE",
Packit d7e8d0
      "DFA56FB5FC41E3A8921F77AD1622EEFD9152A5AD",
Packit d7e8d0
      "1.2.840.113549.1.9.1=#63657274696679407063612E64666E2E6465,"
Packit d7e8d0
      "CN=DFN Server Certification Authority,OU=DFN-PCA,"
Packit d7e8d0
      "O=Deutsches Forschungsnetz,C=DE",
Packit d7e8d0
      "<certify@pca.dfn.de>", GPGME_VALIDITY_UNKNOWN, 2048
Packit d7e8d0
    },
Packit d7e8d0
    { NULL }
Packit d7e8d0
  };
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
int
Packit d7e8d0
main (void)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  gpgme_ctx_t ctx;
Packit Service 68c0f2
  gpgme_key_t key;
Packit d7e8d0
  gpgme_keylist_result_t result;
Packit d7e8d0
  int i = 0;
Packit d7e8d0
Packit d7e8d0
  init_gpgme (GPGME_PROTOCOL_CMS);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_new (&ctx;;
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
  gpgme_set_protocol (ctx, GPGME_PROTOCOL_CMS);
Packit d7e8d0
Packit d7e8d0
  err = gpgme_op_keylist_start (ctx, NULL, 0);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  while (!(err = gpgme_op_keylist_next (ctx, &key)))
Packit d7e8d0
    {
Packit d7e8d0
      if (!keys[i].fpr)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "More keys returned than expected\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      if (strcmp (key->subkeys->fpr, keys[i].fpr))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Warning: Skipping unknown key %s\n",
Packit d7e8d0
		   key->subkeys->fpr);
Packit d7e8d0
	  gpgme_key_unref (key);
Packit d7e8d0
	  continue;
Packit d7e8d0
	}
Packit d7e8d0
      else
Packit d7e8d0
	printf ("Checking key %s\n", key->subkeys->fpr);
Packit d7e8d0
Packit d7e8d0
      /* Global key flags.  */
Packit d7e8d0
      if (key->revoked)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly revoked\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->expired)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly expired\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->disabled)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly disabled\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->invalid)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly invalid\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->can_encrypt != keys[i].secret)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly%s usable for encryption\n",
Packit d7e8d0
		   key->can_encrypt ? "" : " not");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->can_sign != keys[i].secret)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly%s usable for signing\n",
Packit d7e8d0
		   key->can_sign ? "" : " not");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->can_certify)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly unusable for certifications\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->secret != keys[i].secret)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly%s secret\n",
Packit d7e8d0
		   key->secret ? "" : " not");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->protocol != GPGME_PROTOCOL_CMS)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key has unexpected protocol: %s\n",
Packit d7e8d0
		   gpgme_get_protocol_name (key->protocol));
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->issuer_serial)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly misses issuer serial\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (strcmp (key->issuer_serial, keys[i].issuer_serial))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key has unexpected issuer serial: %s\n",
Packit d7e8d0
		   key->issuer_serial);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->issuer_name)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly misses issuer name\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (strcmp (key->issuer_name, keys[i].issuer_name))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key has unexpected issuer name: %s\n",
Packit d7e8d0
		   key->issuer_name);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->chain_id && !keys[i].chain_id)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly carries chain ID: %s\n",
Packit d7e8d0
		   key->chain_id);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->chain_id && keys[i].chain_id)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly carries no chain ID\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->chain_id && strcmp (key->chain_id, keys[i].chain_id))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key carries unexpected chain ID: %s\n",
Packit d7e8d0
		   key->chain_id);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->owner_trust != GPGME_VALIDITY_UNKNOWN)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key has unexpected owner trust: %i\n",
Packit d7e8d0
		   key->owner_trust);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->subkeys || key->subkeys->next)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key has unexpected number of subkeys\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      /* Primary key.  */
Packit d7e8d0
      if (key->subkeys->revoked)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key unexpectedly revoked\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->expired)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key unexpectedly expired\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->disabled)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key unexpectedly disabled\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->invalid)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key unexpectedly invalid\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->can_encrypt != keys[i].secret)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly%s usable for encryption\n",
Packit d7e8d0
		   key->subkeys->can_encrypt ? "" : " not");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->can_sign != keys[i].secret)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key unexpectedly%s usable for signing\n",
Packit d7e8d0
		   key->subkeys->can_sign ? "" : " not");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->subkeys->can_certify)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key unexpectedly unusable for certifications\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->secret != keys[i].secret)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary Key unexpectedly%s secret\n",
Packit d7e8d0
		   key->secret ? "" : " not");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->pubkey_algo != GPGME_PK_RSA)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key has unexpected public key algo: %s\n",
Packit d7e8d0
		   gpgme_pubkey_algo_name (key->subkeys->pubkey_algo));
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->length != keys[i].key_length)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key has unexpected length: %i\n",
Packit d7e8d0
		   key->subkeys->length);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (strcmp (key->subkeys->keyid, &keys[i].fpr[40 - 16]))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key has unexpected key ID: %s\n",
Packit d7e8d0
		   key->subkeys->keyid);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (strcmp (key->subkeys->fpr, keys[i].fpr))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key has unexpected fingerprint: %s\n",
Packit d7e8d0
		   key->subkeys->fpr);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->timestamp != keys[i].timestamp)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key unexpected timestamp: %lu\n",
Packit d7e8d0
		   key->subkeys->timestamp);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->subkeys->expires != keys[i].expires)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Primary key unexpectedly expires: %lu\n",
Packit d7e8d0
		   key->subkeys->expires);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      /* Be tolerant against a missing email (ie, older gpgsm versions).  */
Packit d7e8d0
      if (!key->uids || (key->uids->next && !keys[i].email))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Key has unexpected number of user IDs\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->uids->revoked)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "User ID unexpectedly revoked\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->uids->invalid)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "User ID unexpectedly invalid\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->uids->validity != keys[i].validity)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "User ID unexpectedly validity: %i\n",
Packit d7e8d0
		   key->uids->validity);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->uids->signatures)
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "User ID unexpectedly signed\n");
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->uids->name || key->uids->name[0])
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Unexpected name in user ID: %s\n",
Packit d7e8d0
		   key->uids->name);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->uids->comment || key->uids->comment[0])
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Unexpected comment in user ID: %s\n",
Packit d7e8d0
		   key->uids->comment);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->uids->email || key->uids->email[0])
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Unexpected email in user ID: %s\n",
Packit d7e8d0
		   key->uids->email);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (!key->uids->uid || strcmp (key->uids->uid, keys[i].uid))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Unexpected uid in user ID: %s\n",
Packit d7e8d0
		   key->uids->uid);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->uids->next && strcmp (key->uids->next->uid, keys[i].email))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Unexpected email in user ID: %s\n",
Packit d7e8d0
		   key->uids->next->uid);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
      if (key->uids->next && strcmp (key->uids->next->uid, keys[i].email))
Packit d7e8d0
	{
Packit d7e8d0
	  fprintf (stderr, "Unexpected email in user ID: %s\n",
Packit d7e8d0
		   key->uids->next->uid);
Packit d7e8d0
	  exit (1);
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
      gpgme_key_unref (key);
Packit d7e8d0
      i++;
Packit d7e8d0
    }
Packit d7e8d0
  if (gpgme_err_code (err) != GPG_ERR_EOF)
Packit d7e8d0
    fail_if_err (err);
Packit d7e8d0
  err = gpgme_op_keylist_end (ctx);
Packit d7e8d0
  fail_if_err (err);
Packit d7e8d0
Packit d7e8d0
  result = gpgme_op_keylist_result (ctx);
Packit d7e8d0
  if (result->truncated)
Packit d7e8d0
    {
Packit d7e8d0
      fprintf (stderr, "Key listing unexpectedly truncated\n");
Packit d7e8d0
      exit (1);
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  if (keys[i].fpr)
Packit d7e8d0
    {
Packit d7e8d0
      fprintf (stderr, "Less keys returned than expected\n");
Packit d7e8d0
      exit (1);
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  gpgme_release (ctx);
Packit d7e8d0
  return 0;
Packit d7e8d0
}