summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRemi Collet <fedora@famillecollet.com>2016-06-16 13:54:44 +0200
committerRemi Collet <fedora@famillecollet.com>2016-06-16 13:54:44 +0200
commit4fb3c7bfb655e338ec3a40790efc07801c3f6715 (patch)
tree94016c05df37cf9d4cce7a152cc807933b2cda4a
parent21287814c117562a2ed7e8fd8a73c2dad402d1e4 (diff)
php-pecl-gnupg: save test script
-rw-r--r--info.c163
1 files changed, 161 insertions, 2 deletions
diff --git a/info.c b/info.c
index edcc53a..6071c5b 100644
--- a/info.c
+++ b/info.c
@@ -1,12 +1,78 @@
#include <stdio.h>
+#include <stdlib.h>
+#include <sys/stat.h>
+#include <string.h>
+#include <unistd.h>
#include <gpgme.h>
+char *fingerprint = "64DF06E42FCF2094590CDEEE2E96F141B3DD2B2E";
+char *passphrase = "blabla";
+char *clear = "foo bar";
+char *testkey =
+"-----BEGIN PGP PRIVATE KEY BLOCK-----\n"
+"Version: GnuPG v1.4.3 (GNU/Linux)\n\n"
+
+"lQHhBENQAKwRBADpy828KU+0SuoetJTrJ5dR86PiO3CsH8K6QRP7wY82Eh/9NTJ3\n"
+"afRj0FNPaVSP0NciPeM4G4uFoQ3lsIf+FBEPXH1D97/XigWObU8K6ha2/s8wU98z\n"
+"/samjTHLR+VKZ031B5/8p5Y49yvkkEyBkF1G85yeIXK0WZorKBPncRKuUwCgxOi/\n"
+"IEa+ZuqHlmlDF2LTRIBOfrkEAK+WLRMWUD0bqj1TYwnxwPWiuns32/ZXLWuPfb5o\n"
+"crNt7x5LSe7wJhjyIiFhiU0qR33X/FrT2umzOxlRYfINXT9DUHDocxxbED6fxAHw\n"
+"X2IDd5tWXgCkSBHn2yAneNY6ycPdS3RvqJGlYFg7cOc0kz4urjqRt9fIagzpZQtL\n"
+"fXHfBACl3EWgvLhVBo5ExZbrtlOA2q0x9UGhhNaSkeBWBr2qDeZErQjMTO0+viaN\n"
+"/SX0zxeWtM3z06rkUHd1DKORDRM5R7shBTv9/Quojn0gbYbOem+e1mlCe27TRxcP\n"
+"yeIKk00PqbVuff9QlK9GqKEWGzsEXCmxZ160Dul3CGlf/vQZHf4DAwJAwtVOoL7t\n"
+"cGBlDCPs4m+HNqT+hD5LGtrx8IC/dnPGNrjFsVybcptYgdn4i6nkSnu+g6a7rcjN\n"
+"qTUyYrQkdGVzdGtleSAodGVzdGtleSkgPHRlc3RAZXhhbXBsZS5uZXQ+iF4EExEC\n"
+"AB4FAkNQAKwCGwMGCwkIBwMCAxUCAwMWAgECHgECF4AACgkQLpbxQbPdKy58pwCc\n"
+"Dz9qEBEVt1gcKCwNay0fm4vLqCkAn1P0KV1giECUVXBuZ5YUndDB1QqtnQFXBENQ\n"
+"AK0QBACNXzJQG4NHUJqLPImezbl+ii+93MjMo8LpSlv9Np5ruWIKtxuqmVEe4k+r\n"
+"1DDmSl8hppifpRtx2hefbDTl8Tdf5MNGvf5JE3AHYUehZ+ldjgYCOZ53fJDgKV65\n"
+"ZidQSGGXsRcyE7SHgMQ6rTL92PA2IQmkcf9xkg6xM2h55UusMwADBQP9EGQ0BAdW\n"
+"RUtA21/cR6F+t97KZnVSet225UYv8azv8p8cK4R1lrZXChFadK9Kt+/My4HAx7J7\n"
+"zd1IPuKQ0QniuvuLT3Mwz19B7FGXaJenwTw0P1ihtmSPq9GAOkOA4ZPhHLl9OFwI\n"
+"eAZzjfshRfvm0haO3vwlxdjhwxyJ/a/JEF3+AwMCQMLVTqC+7XBgepY5Qw0vGNYN\n"
+"K5jkMtn1Pjj/tzYKJIvneoEXb9lEzV4fpju1q8p+FmKHokwjq6FrEF2edKtuYygj\n"
+"qNKIrYhJBBgRAgAJBQJDUACtAhsMAAoJEC6W8UGz3SsusGQAn21Jynp2uGE9AnDU\n"
+"BjoYSlJsrQm0AJ4m57ArwLXA7WXk5iQbMWlvhWCq4g==\n"
+"=awlp\n"
+"-----END PGP PRIVATE KEY BLOCK-----\n";
+
+gpgme_error_t passphrase_decrypt_cb (
+ void * pass,
+ const char *uid_hint, const char *passphrase_info,
+ int last_was_bad, int fd) {
+ if (last_was_bad) {
+ printf("Incorrent passphrase\n");
+ return 1;
+ }
+ if (write(fd, passphrase, strlen(passphrase)) == strlen(passphrase) && write(fd, "\n", 1) == 1) {
+ printf("Passphrase sent\n");
+ return 0;
+ }
+ printf("write failed\n");
+ return 1;
+}
+
int main (int argc, char *argv[]) {
gpgme_ctx_t ctx;
gpgme_error_t err;
const char *ver;
gpgme_engine_info_t info;
+ const char *dir;
+ char buf[1024];
+ gpgme_data_t in, out;
+ gpgme_key_t keys[2] = {NULL, NULL};
+ char *crypted = NULL, *decrypted = NULL;
+ size_t ret_size;
+ gpgme_import_result_t impresult;
+ gpgme_encrypt_result_t encresult;
+ gpgme_decrypt_result_t decresult;
+
+ // TMP directory
+ dir = tmpnam(NULL);
+ sprintf(buf, "GNUPGHOME=%s", dir);
+ printf("Using %s directory (%d,%d)\n", dir, mkdir(dir, 0755), putenv(buf));
ver = gpgme_check_version(NULL);
printf("gpgme version: %s\n", ver);
@@ -16,13 +82,16 @@ int main (int argc, char *argv[]) {
printf("** gpgme_new return %d\n", err);
}
+/*
info = gpgme_ctx_get_engine_info(ctx);
while(info) {
printf("protocol:%d, file_name:%s\n", info->protocol, info->file_name);
info = info->next;
}
-
- err = gpgme_ctx_set_engine_info(ctx, GPGME_PROTOCOL_OpenPGP, "/usr/bin/gpg", NULL);
+*/
+ err = gpgme_ctx_set_engine_info(ctx, GPGME_PROTOCOL_OpenPGP,
+ (argc>1 ? argv[1] : "/usr/bin/gpg"),
+ NULL);
if (err != GPG_ERR_NO_ERROR) {
printf("** gpgme_ctx_set_engine_info return %d\n", err);
}
@@ -32,5 +101,95 @@ int main (int argc, char *argv[]) {
printf("protocol:%d, file_name:%s\n", info->protocol, info->file_name);
info = info->next;
}
+ if (gpgme_data_new_from_mem(&in, testkey, strlen(testkey), 0) != GPG_ERR_NO_ERROR) {
+ printf("Can't load the key\n");
+ exit(1);
+ }
+ printf("Test key loaded\n");
+
+ if (gpgme_op_import(ctx ,in) != GPG_ERR_NO_ERROR) {
+ gpgme_data_release(in);
+ printf("Can't import the key\n");
+ exit(1);
+ }
+ printf("Test key imported\n");
+
+ gpgme_data_release(in);
+ impresult = gpgme_op_import_result(ctx);
+ if (!impresult || !impresult->imports || impresult->imports->result != GPG_ERR_NO_ERROR) {
+ printf("Can't get the result\n");
+ exit(1);
+ }
+ printf("\timported: %d\n", impresult->imported);
+ printf("\tunchanged: %d\n", impresult->unchanged);
+ printf("\tnewuserids: %d\n", impresult->new_user_ids);
+ printf("\tnewsubkeys: %d\n", impresult->new_sub_keys);
+ printf("\tsecretimported: %d\n", impresult->secret_imported);
+ printf("\tsecretunchanged: %d\n", impresult->secret_unchanged);
+ printf("\tnewsignatures: %d\n", impresult->new_signatures);
+ printf("\tskippedkeys: %d\n", impresult->skipped_new_keys);
+ printf("\tfingerprint: %s\n", impresult->imports->fpr);
+
+ if (gpgme_get_key(ctx, fingerprint, keys, 0) != GPG_ERR_NO_ERROR) {
+ printf("Can't get the key\n");
+ exit(1);
+ }
+ printf("Key found\n");
+
+ if (gpgme_data_new_from_mem(&in, clear, strlen(clear), 0)!= GPG_ERR_NO_ERROR) {
+ printf("could no create in-data buffer\n");
+ exit(1);
+ }
+ if (gpgme_data_new(&out) != GPG_ERR_NO_ERROR) {
+ printf("could not create out-data buffer\n");
+ gpgme_data_release(in);
+ exit(1);
+ }
+ if (gpgme_op_encrypt(ctx, keys, GPGME_ENCRYPT_ALWAYS_TRUST, in, out) != GPG_ERR_NO_ERROR) {
+ printf("encrypt failed\n");
+ gpgme_data_release(in);
+ gpgme_data_release(out);
+ exit(1);
+ }
+ encresult = gpgme_op_encrypt_result(ctx);
+ if (encresult->invalid_recipients) {
+ printf("Invalid recipient encountered\n");
+ gpgme_data_release(in);
+ gpgme_data_release(out);
+ exit(1);
+ }
+ crypted = gpgme_data_release_and_get_mem(out, &ret_size);
+ gpgme_data_release(in);
+ printf("Encrypt('%s') = %d chars\n", clear, ret_size);
+
+ gpgme_set_passphrase_cb(ctx, passphrase_decrypt_cb, passphrase);
+
+ if (gpgme_data_new_from_mem(&in, crypted, ret_size, 0) != GPG_ERR_NO_ERROR) {
+ printf("could not create in-data buffer\n");
+ }
+ if (gpgme_data_new(&out) != GPG_ERR_NO_ERROR) {
+ printf("could not create out-data buffer\n");
+ gpgme_data_release(in);
+ exit(1);
+ }
+ if (gpgme_op_decrypt(ctx, in, out) != GPG_ERR_NO_ERROR) {
+ printf("decrypt failed\n");
+ gpgme_data_release(in);
+ gpgme_data_release(out);
+ exit(1);
+ }
+ decresult = gpgme_op_decrypt_result(ctx);
+ if (decresult->unsupported_algorithm) {
+ printf("unsupported algorithm\n");
+ gpgme_data_release(in);
+ gpgme_data_release(out);
+ exit(1);
+ }
+ decrypted = gpgme_data_release_and_get_mem(out, &ret_size);
+ gpgme_data_release(in);
+ printf("Decrypt() = '%s'\n", decrypted);
+ free(crypted);
+ free(decrypted);
+
return 0;
}