Line data Source code
1 : /* t-file-name.c - Regression test.
2 : Copyright (C) 2000 Werner Koch (dd9jn)
3 : Copyright (C) 2001, 2002, 2003, 2004 g10 Code GmbH
4 :
5 : This file is part of GPGME.
6 :
7 : GPGME is free software; you can redistribute it and/or modify it
8 : under the terms of the GNU Lesser General Public License as
9 : published by the Free Software Foundation; either version 2.1 of
10 : the License, or (at your option) any later version.
11 :
12 : GPGME is distributed in the hope that it will be useful, but
13 : WITHOUT ANY WARRANTY; without even the implied warranty of
14 : MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 : Lesser General Public License for more details.
16 :
17 : You should have received a copy of the GNU Lesser General Public
18 : License along with this program; if not, write to the Free Software
19 : Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
20 : 02111-1307, USA. */
21 :
22 : /* We need to include config.h so that we know whether we are building
23 : with large file system (LFS) support. */
24 : #ifdef HAVE_CONFIG_H
25 : #include <config.h>
26 : #endif
27 :
28 : #include <stdlib.h>
29 : #include <stdio.h>
30 : #include <string.h>
31 :
32 : #include <gpgme.h>
33 :
34 : #include "t-support.h"
35 :
36 : #define TESTNAME "abcde12345"
37 :
38 :
39 : int
40 1 : main (int argc, char *argv[])
41 : {
42 : gpgme_ctx_t ctx;
43 : gpgme_error_t err;
44 : gpgme_data_t in, out;
45 1 : gpgme_key_t key[2] = { NULL, NULL };
46 : gpgme_decrypt_result_t result;
47 : char *agent_info;
48 :
49 1 : init_gpgme (GPGME_PROTOCOL_OpenPGP);
50 :
51 1 : err = gpgme_new (&ctx);
52 1 : fail_if_err (err);
53 1 : gpgme_set_armor (ctx, 1);
54 :
55 1 : agent_info = getenv("GPG_AGENT_INFO");
56 1 : if (!(agent_info && strchr (agent_info, ':')))
57 1 : gpgme_set_passphrase_cb (ctx, passphrase_cb, NULL);
58 :
59 1 : err = gpgme_data_new_from_mem (&in, "Hallo Leute\n", 12, 0);
60 1 : fail_if_err (err);
61 :
62 1 : err = gpgme_data_set_file_name (in, TESTNAME);
63 1 : fail_if_err (err);
64 :
65 1 : err = gpgme_data_new (&out);
66 1 : fail_if_err (err);
67 :
68 1 : err = gpgme_get_key (ctx, "A0FF4590BB6122EDEF6E3C542D727CC768697734",
69 : &key[0], 0);
70 1 : fail_if_err (err);
71 :
72 1 : err = gpgme_op_encrypt (ctx, key, GPGME_ENCRYPT_ALWAYS_TRUST, in, out);
73 1 : fail_if_err (err);
74 :
75 1 : gpgme_data_release (in);
76 1 : err = gpgme_data_new (&in);
77 1 : fail_if_err (err);
78 :
79 1 : err = gpgme_data_seek (out, 0, SEEK_SET);
80 1 : fail_if_err (err);
81 :
82 1 : err = gpgme_op_decrypt (ctx, out, in);
83 1 : fail_if_err (err);
84 1 : result = gpgme_op_decrypt_result (ctx);
85 :
86 1 : if (strcmp (TESTNAME, result->file_name))
87 : {
88 0 : fprintf (stderr, "%s:%i: Unexpected result file name: %s\n",
89 : __FILE__, __LINE__,
90 0 : result->file_name ? result->file_name : "(null)");
91 0 : exit (1);
92 : }
93 :
94 1 : gpgme_key_unref (key[0]);
95 1 : gpgme_data_release (in);
96 1 : gpgme_data_release (out);
97 1 : gpgme_release (ctx);
98 1 : return 0;
99 : }
|