Page Menu
Home
GnuPG
Search
Configure Global Search
Log In
Files
F40366898
t-edit-sign.c
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Size
4 KB
Subscribers
None
t-edit-sign.c
View Options
/* t-edit-sign.c - Regression test.
* Copyright (C) 2000 Werner Koch (dd9jn)
* Copyright (C) 2001, 2002, 2003, 2004, 2021 g10 Code GmbH
* Software engineering by Ingo Klöcker <dev@ingo-kloecker.de>
*
* This file is part of GPGME.
*
* GPGME is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* GPGME is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this program; if not, see <https://gnu.org/licenses/>.
* SPDX-License-Identifier: LGPL-2.1-or-later
*/
/* We need to include config.h so that we know whether we are building
with large file system (LFS) support. */
#ifdef HAVE_CONFIG_H
#include
<config.h>
#endif
#include
<stdio.h>
#include
<stdlib.h>
#include
<string.h>
#include
<assert.h>
#include
<errno.h>
#include
<unistd.h>
#include
<errno.h>
#include
<gpgme.h>
#include
"t-support.h"
static
void
flush_data
(
gpgme_data_t
dh
)
{
char
buf
[
100
];
int
ret
;
ret
=
gpgme_data_seek
(
dh
,
0
,
SEEK_SET
);
if
(
ret
)
fail_if_err
(
gpgme_error_from_errno
(
errno
));
while
((
ret
=
gpgme_data_read
(
dh
,
buf
,
100
))
>
0
)
fwrite
(
buf
,
ret
,
1
,
stdout
);
if
(
ret
<
0
)
fail_if_err
(
gpgme_error_from_errno
(
errno
));
}
gpgme_error_t
interact_fnc
(
void
*
opaque
,
const
char
*
status
,
const
char
*
args
,
int
fd
)
{
const
char
*
result
=
NULL
;
gpgme_data_t
out
=
(
gpgme_data_t
)
opaque
;
fputs
(
"[-- Response --]
\n
"
,
stdout
);
flush_data
(
out
);
fprintf
(
stdout
,
"[-- Code: %s, %s --]
\n
"
,
status
,
args
);
if
(
fd
>=
0
)
{
if
(
!
strcmp
(
args
,
"keyedit.prompt"
))
{
static
int
step
=
0
;
switch
(
step
)
{
case
0
:
result
=
"fpr"
;
break
;
case
1
:
/* This fixes the primary user ID so the keylisting
tests will have predictable output. */
result
=
"1"
;
break
;
case
2
:
result
=
"sign"
;
break
;
default
:
result
=
"quit"
;
break
;
}
step
++
;
}
else
if
(
!
strcmp
(
args
,
"keyedit.save.okay"
))
result
=
"Y"
;
else
if
(
!
strcmp
(
args
,
"sign_uid.okay"
))
result
=
"Y"
;
}
if
(
result
)
{
gpgme_io_writen
(
fd
,
result
,
strlen
(
result
));
gpgme_io_writen
(
fd
,
"
\n
"
,
1
);
}
return
0
;
}
int
main
(
int
argc
,
char
**
argv
)
{
gpgme_ctx_t
ctx
;
gpgme_error_t
err
;
gpgme_data_t
out
=
NULL
;
const
char
*
signer_fpr
=
"A0FF4590BB6122EDEF6E3C542D727CC768697734"
;
/* Alpha Test */
gpgme_key_t
signing_key
=
NULL
;
const
char
*
key_fpr
=
"D695676BDCEDCC2CDD6152BCFE180B1DA9E3B0B2"
;
/* Bravo Test */
gpgme_key_t
key
=
NULL
;
gpgme_key_t
signed_key
=
NULL
;
gpgme_user_id_t
signed_uid
=
NULL
;
gpgme_key_sig_t
key_sig
=
NULL
;
char
*
agent_info
;
int
mode
;
(
void
)
argc
;
(
void
)
argv
;
init_gpgme
(
GPGME_PROTOCOL_OpenPGP
);
err
=
gpgme_new
(
&
ctx
);
fail_if_err
(
err
);
/* Sign the key */
agent_info
=
getenv
(
"GPG_AGENT_INFO"
);
if
(
!
(
agent_info
&&
strchr
(
agent_info
,
':'
)))
gpgme_set_passphrase_cb
(
ctx
,
passphrase_cb
,
0
);
err
=
gpgme_get_key
(
ctx
,
signer_fpr
,
&
signing_key
,
1
);
fail_if_err
(
err
);
err
=
gpgme_signers_add
(
ctx
,
signing_key
);
fail_if_err
(
err
);
err
=
gpgme_set_ctx_flag
(
ctx
,
"cert-expire"
,
"42d"
);
fail_if_err
(
err
);
err
=
gpgme_get_key
(
ctx
,
key_fpr
,
&
key
,
0
);
fail_if_err
(
err
);
err
=
gpgme_data_new
(
&
out
);
fail_if_err
(
err
);
err
=
gpgme_op_interact
(
ctx
,
key
,
0
,
interact_fnc
,
out
,
out
);
fail_if_err
(
err
);
fputs
(
"[-- Last response --]
\n
"
,
stdout
);
flush_data
(
out
);
gpgme_data_release
(
out
);
gpgme_key_unref
(
key
);
gpgme_key_unref
(
signing_key
);
/* Verify the key signature */
mode
=
gpgme_get_keylist_mode
(
ctx
);
mode
|=
GPGME_KEYLIST_MODE_SIGS
;
err
=
gpgme_set_keylist_mode
(
ctx
,
mode
);
fail_if_err
(
err
);
err
=
gpgme_get_key
(
ctx
,
key_fpr
,
&
signed_key
,
0
);
fail_if_err
(
err
);
signed_uid
=
key
->
uids
;
if
(
!
signed_uid
)
{
fprintf
(
stderr
,
"Signed key has no user IDs
\n
"
);
exit
(
1
);
}
if
(
!
signed_uid
->
signatures
||
!
signed_uid
->
signatures
->
next
)
{
fprintf
(
stderr
,
"Signed user ID has less signatures than expected
\n
"
);
exit
(
1
);
}
key_sig
=
signed_uid
->
signatures
->
next
;
if
(
strcmp
(
"2D727CC768697734"
,
key_sig
->
keyid
))
{
fprintf
(
stderr
,
"Unexpected key ID in second user ID sig: %s
\n
"
,
key_sig
->
keyid
);
exit
(
1
);
}
if
(
key_sig
->
expires
!=
key_sig
->
timestamp
+
42
*
86400L
)
{
fprintf
(
stderr
,
"Key signature unexpectedly does not expire in 42 days
\n
"
);
fprintf
(
stderr
,
"signature date: %ld, expiration date: %ld
\n
"
,
key_sig
->
timestamp
,
key_sig
->
expires
);
exit
(
1
);
}
gpgme_key_unref
(
signed_key
);
gpgme_release
(
ctx
);
return
0
;
}
File Metadata
Details
Attached
Mime Type
text/x-c
Expires
Tue, Apr 14, 9:28 PM (1 d, 18 h)
Storage Engine
local-disk
Storage Format
Raw Data
Storage Handle
d0/76/3b364a6f39a9ea09a33d4abd854b
Attached To
rM GPGME
Event Timeline
Log In to Comment