Line data Source code
1 : /* t-encrypt.c - Regression test.
2 : Copyright (C) 2000 Werner Koch (dd9jn)
3 : Copyright (C) 2001, 2002, 2003, 2004 g10 Code GmbH
4 :
5 : This file is part of GPGME.
6 :
7 : GPGME is free software; you can redistribute it and/or modify it
8 : under the terms of the GNU Lesser General Public License as
9 : published by the Free Software Foundation; either version 2.1 of
10 : the License, or (at your option) any later version.
11 :
12 : GPGME is distributed in the hope that it will be useful, but
13 : WITHOUT ANY WARRANTY; without even the implied warranty of
14 : MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 : Lesser General Public License for more details.
16 :
17 : You should have received a copy of the GNU Lesser General Public
18 : License along with this program; if not, write to the Free Software
19 : Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
20 : 02111-1307, USA. */
21 :
22 : /* We need to include config.h so that we know whether we are building
23 : with large file system (LFS) support. */
24 : #ifdef HAVE_CONFIG_H
25 : #include <config.h>
26 : #endif
27 :
28 : #include <stdlib.h>
29 : #include <stdio.h>
30 : #include <string.h>
31 :
32 : #include <gpgme.h>
33 :
34 : #include "t-support.h"
35 :
36 : int
37 1 : main (void)
38 : {
39 : gpgme_ctx_t ctx;
40 : gpgme_error_t err;
41 : gpgme_data_t in, out;
42 1 : gpgme_key_t key[] = { NULL, NULL };
43 : gpgme_encrypt_result_t result;
44 :
45 1 : init_gpgme (GPGME_PROTOCOL_CMS);
46 :
47 1 : err = gpgme_new (&ctx);
48 1 : fail_if_err (err);
49 1 : gpgme_set_protocol (ctx, GPGME_PROTOCOL_CMS);
50 1 : gpgme_set_armor (ctx, 1);
51 :
52 1 : err = gpgme_data_new_from_mem (&in, "Hallo Leute\n", 12, 0);
53 1 : fail_if_err (err);
54 :
55 1 : err = gpgme_data_new (&out);
56 1 : fail_if_err (err);
57 :
58 1 : err = gpgme_get_key (ctx, "3CF405464F66ED4A7DF45BBDD1E4282E33BDB76E",
59 : &key[0], 0);
60 1 : fail_if_err (err);
61 :
62 1 : err = gpgme_op_encrypt (ctx, key, 0, in, out);
63 1 : fail_if_err (err);
64 1 : result = gpgme_op_encrypt_result (ctx);
65 1 : if (result->invalid_recipients)
66 : {
67 0 : fprintf (stderr, "Invalid recipient encountered: %s\n",
68 0 : result->invalid_recipients->fpr);
69 0 : exit (1);
70 : }
71 1 : print_data (out);
72 :
73 1 : gpgme_key_unref (key[0]);
74 1 : gpgme_data_release (in);
75 1 : gpgme_data_release (out);
76 1 : gpgme_release (ctx);
77 1 : return 0;
78 : }
|