2016-01-07 17:01:45 +01:00
|
|
|
#!/usr/bin/env gpgscm
|
|
|
|
|
|
|
|
;; Copyright (C) 2016 g10 Code GmbH
|
|
|
|
;;
|
|
|
|
;; This file is part of GnuPG.
|
|
|
|
;;
|
|
|
|
;; GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
;; it under the terms of the GNU General Public License as published by
|
|
|
|
;; the Free Software Foundation; either version 3 of the License, or
|
|
|
|
;; (at your option) any later version.
|
|
|
|
;;
|
|
|
|
;; GnuPG is distributed in the hope that it will be useful,
|
|
|
|
;; but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
;; GNU General Public License for more details.
|
|
|
|
;;
|
|
|
|
;; You should have received a copy of the GNU General Public License
|
|
|
|
;; along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2017-03-22 12:40:42 +01:00
|
|
|
(load (in-srcdir "tests" "openpgp" "defs.scm"))
|
2017-06-21 12:18:24 +02:00
|
|
|
(load (in-srcdir "tests" "openpgp" "signed-messages.scm"))
|
2016-11-07 16:21:21 +01:00
|
|
|
(setup-legacy-environment)
|
2016-01-07 17:01:45 +01:00
|
|
|
|
|
|
|
;;
|
|
|
|
;; Two simple tests to check that verify fails for bad input data
|
|
|
|
;;
|
|
|
|
(for-each-p
|
|
|
|
"Checking bogus signature"
|
|
|
|
(lambda (char)
|
|
|
|
(lettmp (x)
|
2016-11-07 12:28:07 +01:00
|
|
|
(call-with-binary-output-file
|
|
|
|
x
|
|
|
|
(lambda (port)
|
|
|
|
(display (make-string 64 (integer->char (string->number char)))
|
|
|
|
port)))
|
2016-01-07 17:01:45 +01:00
|
|
|
(if (= 0 (call `(,@GPG --verify ,x data-500)))
|
2016-12-06 15:21:30 +01:00
|
|
|
(fail "no error code from verify"))))
|
2016-11-07 12:28:07 +01:00
|
|
|
'("#x2d" "#xca"))
|
2016-01-07 17:01:45 +01:00
|
|
|
|
|
|
|
;; Fixme: We need more tests with manipulated cleartext signatures.
|
|
|
|
|
|
|
|
;;
|
|
|
|
;; Now run the tests.
|
|
|
|
;;
|
|
|
|
(for-each-p
|
|
|
|
"Checking that a valid signature is verified as such"
|
|
|
|
(lambda (armored-file)
|
|
|
|
(pipe:do
|
|
|
|
(pipe:echo (eval armored-file (current-environment)))
|
|
|
|
(pipe:spawn `(,@GPG --verify))))
|
|
|
|
'(msg_ols_asc msg_cols_asc msg_sl_asc msg_oolss_asc msg_cls_asc msg_clss_asc))
|
|
|
|
|
|
|
|
(for-each-p
|
|
|
|
"Checking that a valid signature over multiple messages is verified as such"
|
|
|
|
(lambda (armored-file)
|
|
|
|
(pipe:do
|
|
|
|
(pipe:echo (eval armored-file (current-environment)))
|
|
|
|
(pipe:spawn `(,@GPG --verify --allow-multiple-messages)))
|
|
|
|
(catch '()
|
|
|
|
(pipe:do
|
|
|
|
(pipe:defer (lambda (sink)
|
|
|
|
(display armored-file (fdopen sink "w"))))
|
|
|
|
(pipe:spawn `(,@GPG --verify)))
|
2016-12-06 15:21:30 +01:00
|
|
|
(fail "verification succeeded but should not")))
|
2016-01-07 17:01:45 +01:00
|
|
|
'(msg_olsols_asc_multiple msg_clsclss_asc_multiple))
|
|
|
|
|
|
|
|
(for-each-p
|
|
|
|
"Checking that an invalid signature is verified as such"
|
|
|
|
(lambda (armored-file)
|
|
|
|
(catch '()
|
|
|
|
(pipe:do
|
|
|
|
(pipe:echo (eval armored-file (current-environment)))
|
|
|
|
(pipe:spawn `(,@GPG --verify)))
|
2016-12-06 15:21:30 +01:00
|
|
|
(fail "verification succeeded but should not")))
|
2016-01-07 17:01:45 +01:00
|
|
|
'(bad_ls_asc bad_fols_asc bad_olsf_asc bad_ools_asc))
|
2016-08-25 15:18:51 +02:00
|
|
|
|
|
|
|
|
|
|
|
;;; Need to import the ed25519 sample key used for
|
|
|
|
;;; the next two tests.
|
2017-03-22 12:40:42 +01:00
|
|
|
(call-check `(,@GPG --quiet --yes --import ,(in-srcdir "tests" "openpgp" key-file2)))
|
2016-08-25 15:18:51 +02:00
|
|
|
(for-each-p
|
|
|
|
"Checking that a valid Ed25519 signature is verified as such"
|
|
|
|
(lambda (armored-file)
|
|
|
|
(pipe:do
|
|
|
|
(pipe:echo (eval armored-file (current-environment)))
|
|
|
|
(pipe:spawn `(,@GPG --verify))))
|
|
|
|
'(msg_ed25519_rshort msg_ed25519_sshort))
|