mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
5b5d881f47
* tests/gpgscm/tests.scm (error): Rename to 'fail'. 'error' is a primitive function (an opcode) of the TinySCHEME vm, and 'error' is also defined by R6RS. Better avoid redefining that. Fix all call sites. * tests/openpgp/4gb-packet.scm: Adapt. * tests/openpgp/decrypt-multifile.scm: Likewise. * tests/openpgp/ecc.scm: Likewise. * tests/openpgp/export.scm: Likewise. * tests/openpgp/gpgtar.scm: Likewise. * tests/openpgp/gpgv-forged-keyring.scm: Likewise. * tests/openpgp/import.scm: Likewise. * tests/openpgp/issue2015.scm: Likewise. * tests/openpgp/issue2346.scm: Likewise. * tests/openpgp/issue2419.scm: Likewise. * tests/openpgp/key-selection.scm: Likewise. * tests/openpgp/mds.scm: Likewise. * tests/openpgp/multisig.scm: Likewise. * tests/openpgp/setup.scm: Likewise. * tests/openpgp/signencrypt.scm: Likewise. * tests/openpgp/ssh-import.scm: Likewise. * tests/openpgp/tofu.scm: Likewise. * tests/openpgp/verify.scm: Likewise. Signed-off-by: Justus Winter <justus@g10code.com>
101 lines
3.2 KiB
Scheme
Executable File
101 lines
3.2 KiB
Scheme
Executable File
#!/usr/bin/env gpgscm
|
|
|
|
;; Copyright (C) 2016 g10 Code GmbH
|
|
;;
|
|
;; This file is part of GnuPG.
|
|
;;
|
|
;; GnuPG is free software; you can redistribute it and/or modify
|
|
;; it under the terms of the GNU General Public License as published by
|
|
;; the Free Software Foundation; either version 3 of the License, or
|
|
;; (at your option) any later version.
|
|
;;
|
|
;; GnuPG is distributed in the hope that it will be useful,
|
|
;; but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
;; GNU General Public License for more details.
|
|
;;
|
|
;; You should have received a copy of the GNU General Public License
|
|
;; along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
(load (with-path "defs.scm"))
|
|
(setup-legacy-environment)
|
|
|
|
(define (check-for predicate lines message)
|
|
(unless (any predicate lines)
|
|
(fail message)))
|
|
|
|
(define (check-exported-key dump keyid)
|
|
(check-for (lambda (l)
|
|
(and (string-prefix? l " keyid: ")
|
|
(string-suffix? l keyid))) dump
|
|
"Keyid not found")
|
|
(check-for (lambda (l) (string-prefix? l ":user ID packet:")) dump
|
|
"User ID packet not found")
|
|
(check-for (lambda (l)
|
|
(and (string-prefix? l ":signature packet:")
|
|
(string-contains? l "keyid")
|
|
(string-suffix? l keyid))) dump
|
|
"Signature packet not found"))
|
|
|
|
(define (check-exported-public-key packet-dump keyid)
|
|
(let ((dump (string-split-newlines packet-dump)))
|
|
(check-for (lambda (l) (string-prefix? l ":public key packet:")) dump
|
|
"Public key packet not found")
|
|
(check-exported-key dump keyid)))
|
|
|
|
(define (check-exported-private-key packet-dump keyid)
|
|
(let ((dump (string-split-newlines packet-dump)))
|
|
(check-for (lambda (l) (string-prefix? l ":secret key packet:")) dump
|
|
"Secret key packet not found")
|
|
(check-exported-key dump keyid)))
|
|
|
|
(lettmp
|
|
;; Prepare two temporary files for communication with the fake
|
|
;; pinentry program.
|
|
(logfile ppfile)
|
|
|
|
(define (prepare-passphrases . passphrases)
|
|
(call-with-output-file ppfile
|
|
(lambda (port)
|
|
(for-each (lambda (passphrase)
|
|
(display passphrase port)
|
|
(display #\newline port)) passphrases))))
|
|
|
|
(define CONFIRM "fake-entry being started to CONFIRM the weak phrase")
|
|
|
|
(define (assert-passphrases-consumed)
|
|
(call-with-input-file ppfile
|
|
(lambda (port)
|
|
(unless
|
|
(eof-object? (peek-char port))
|
|
(fail (string-append
|
|
"Expected all passphrases to be consumed, but found: "
|
|
(read-all port)))))))
|
|
|
|
(setenv "PINENTRY_USER_DATA"
|
|
(string-append "--logfile=" logfile " --passphrasefile=" ppfile) #t)
|
|
|
|
(for-each-p
|
|
"Checking key export"
|
|
(lambda (keyid)
|
|
(tr:do
|
|
(tr:pipe-do
|
|
(pipe:gpg `(--export ,keyid))
|
|
(pipe:gpg '(--list-packets)))
|
|
(tr:call-with-content check-exported-public-key keyid))
|
|
|
|
(if (string=? "D74C5F22" keyid)
|
|
;; Key D74C5F22 is protected by a passphrase. Prepare this
|
|
;; one. Currently, GnuPG does not ask for an export passphrase
|
|
;; in this case.
|
|
(prepare-passphrases usrpass1))
|
|
|
|
(tr:do
|
|
(tr:pipe-do
|
|
(pipe:gpg `(--export-secret-keys ,keyid))
|
|
(pipe:gpg '(--list-packets)))
|
|
(tr:call-with-content check-exported-private-key keyid))
|
|
|
|
(assert-passphrases-consumed))
|
|
'("D74C5F22" "C40FDECF" "ECABF51D")))
|