📄 x509test.c
字号:
/*____________________________________________________________________________
X509test.c
Copyright (C) 2005 PGP Corporation
All rights reserved.
X509test.c - This file contains functions which are used to verify
the various X509 function of the PGPsdk.
$Id: X509test.c 48495 2006-10-12 21:30:17Z vinnie $
____________________________________________________________________________*/
#include <string.h>
#include <stdio.h>
#include <stdlib.h>
#include "pgpEncode.h"
#include "pgpErrors.h"
#include "pgpKeys.h"
#include "pgpPublicKey.h"
#include "pgpHash.h"
#include "pgpUtilities.h"
#include "optest.h"
static const PGPByte P12Certs[] =
{ 0x30, 0x82, 0x05, 0x48, 0x02, 0x01, 0x03, 0x30, 0x82, 0x05, 0x02, 0x06, 0x09, 0x2a, 0x86, 0x48,
0x86, 0xf7, 0x0d, 0x01, 0x07, 0x01, 0xa0, 0x82, 0x04, 0xf3, 0x04, 0x82, 0x04, 0xef, 0x30, 0x82,
0x04, 0xeb, 0x30, 0x82, 0x04, 0xe7, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07,
0x06, 0xa0, 0x82, 0x04, 0xd8, 0x30, 0x82, 0x04, 0xd4, 0x02, 0x01, 0x00, 0x30, 0x82, 0x04, 0xcd,
0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07, 0x01, 0x30, 0x1c, 0x06, 0x0a, 0x2a,
0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x0c, 0x01, 0x03, 0x30, 0x0e, 0x04, 0x08, 0x8b, 0x01, 0x27,
0x57, 0xf2, 0x70, 0xe8, 0xf8, 0x02, 0x02, 0x07, 0xd0, 0x80, 0x82, 0x04, 0xa0, 0xaa, 0x11, 0x0c,
0x00, 0x22, 0x3b, 0xca, 0x1e, 0xa8, 0x9f, 0x71, 0xd0, 0x73, 0x4f, 0x3a, 0x7c, 0xd3, 0x1f, 0x3d,
0xc1, 0xe0, 0x73, 0xc6, 0x17, 0xea, 0x8f, 0x7f, 0x26, 0xd1, 0xa1, 0xaa, 0x54, 0x8d, 0x24, 0x47,
0x18, 0xde, 0x85, 0x28, 0x7c, 0x58, 0x68, 0x6a, 0x0b, 0x29, 0x9c, 0x64, 0xc5, 0x80, 0x5d, 0x3e,
0x5c, 0x5d, 0x59, 0xdb, 0x4c, 0x1f, 0x81, 0x37, 0xf3, 0xcf, 0x17, 0x89, 0x47, 0x7a, 0xc2, 0xd6,
0xc6, 0x6d, 0xa1, 0x20, 0x67, 0x15, 0x5c, 0x82, 0x09, 0xcd, 0x2a, 0x43, 0x82, 0xf0, 0xc4, 0xe8,
0x41, 0x3d, 0xb9, 0xcc, 0xd8, 0xaf, 0x95, 0xfc, 0x5a, 0xcc, 0xcf, 0xb4, 0x39, 0xcb, 0xff, 0x0b,
0x75, 0x2d, 0xd9, 0x5c, 0x86, 0xf2, 0x1b, 0x5b, 0x83, 0x04, 0x7b, 0x04, 0xb3, 0xea, 0xf0, 0x5b,
0x06, 0xe2, 0xc6, 0x4e, 0x3c, 0x89, 0x02, 0xdb, 0x42, 0x7e, 0x0b, 0x1d, 0xcd, 0x92, 0xc0, 0xd2,
0x4b, 0xcd, 0xb4, 0x42, 0x16, 0x95, 0x28, 0xac, 0xb8, 0x6f, 0x8f, 0x3c, 0x2c, 0x36, 0xc7, 0xd3,
0xe7, 0xc9, 0x21, 0x1d, 0x84, 0xde, 0xf9, 0xf4, 0x17, 0xcd, 0xec, 0x32, 0xb3, 0xac, 0xda, 0xe3,
0x6d, 0x78, 0x8b, 0x83, 0x64, 0xd4, 0x07, 0x1f, 0xfa, 0xc7, 0xbf, 0x20, 0xe5, 0x8f, 0x92, 0xac,
0xfe, 0x7d, 0xa4, 0x09, 0x69, 0xdb, 0x37, 0xef, 0xed, 0xd5, 0x53, 0x55, 0x6d, 0x95, 0x37, 0x63,
0x7e, 0x38, 0xdb, 0x22, 0x6e, 0xcb, 0x8a, 0xa5, 0x09, 0xd6, 0xd1, 0xa8, 0x2c, 0xc4, 0x01, 0xc4,
0xc7, 0x53, 0x67, 0xde, 0x4e, 0xae, 0x5b, 0x3c, 0x78, 0x64, 0x40, 0xd7, 0xf4, 0x6a, 0xa5, 0xfa,
0xac, 0xa8, 0x11, 0xff, 0x2c, 0xd4, 0x0c, 0x58, 0x4b, 0x5c, 0x24, 0x91, 0xf9, 0x4a, 0x77, 0x89,
0x87, 0x48, 0x81, 0xfe, 0x20, 0xf2, 0x3c, 0xfc, 0x42, 0x8d, 0x82, 0x8a, 0x35, 0x5c, 0xbd, 0x37,
0xe5, 0x8a, 0xda, 0x59, 0xe5, 0xc4, 0xbe, 0x9c, 0xfa, 0x00, 0x36, 0x93, 0x9c, 0x31, 0x49, 0x19,
0x64, 0x3e, 0x35, 0x7a, 0x93, 0xe2, 0xcf, 0xaa, 0xab, 0x06, 0xb6, 0x84, 0x53, 0xf3, 0x4c, 0x57,
0x51, 0x28, 0x08, 0x58, 0x52, 0x7a, 0x00, 0x61, 0xe3, 0xbd, 0x3b, 0xf8, 0xe8, 0xc8, 0x47, 0x3c,
0xe9, 0xa6, 0xac, 0x3e, 0x9c, 0xf8, 0xc8, 0xd9, 0x92, 0x1a, 0xbf, 0xcb, 0x68, 0xa0, 0xf9, 0x27,
0xfd, 0x7b, 0xa5, 0xbd, 0xc9, 0x46, 0x86, 0x6c, 0xe6, 0x26, 0x79, 0x3f, 0x15, 0x39, 0xe5, 0xaa,
0xec, 0x9c, 0x6a, 0xa8, 0xdd, 0x58, 0x84, 0x8d, 0xe3, 0x81, 0x62, 0xe4, 0x33, 0x8c, 0x3f, 0x56,
0xe8, 0xaf, 0xc9, 0xa3, 0x61, 0xe4, 0x87, 0x00, 0xc3, 0xed, 0xa4, 0x61, 0xec, 0xaf, 0x4b, 0x6a,
0xc8, 0x25, 0x34, 0xde, 0xc0, 0x1a, 0x26, 0x21, 0x18, 0xb5, 0xaa, 0x69, 0x48, 0x88, 0xb6, 0x77,
0x10, 0x51, 0xd7, 0xcd, 0xaa, 0x36, 0x55, 0xa9, 0x9d, 0xde, 0xda, 0xd6, 0xe0, 0xea, 0x76, 0xa7,
0x9e, 0x9f, 0xa3, 0xd2, 0xcf, 0x74, 0x21, 0xda, 0xc5, 0x1a, 0xe6, 0x4f, 0xe0, 0x80, 0xd5, 0x6b,
0x88, 0x89, 0x55, 0xc5, 0x4b, 0x8f, 0x1d, 0x03, 0xc5, 0xd7, 0xf7, 0x8a, 0x0b, 0xc8, 0x19, 0x64,
0xa9, 0x2e, 0x6a, 0x00, 0x5b, 0x39, 0x64, 0x8d, 0xbe, 0xd5, 0x3d, 0xe9, 0xae, 0xa2, 0xb2, 0x14,
0xe9, 0xd5, 0x37, 0xdd, 0xdc, 0xcc, 0x2a, 0x27, 0xf3, 0x0b, 0x00, 0x21, 0xfc, 0x39, 0x99, 0x64,
0xeb, 0x03, 0x4d, 0x24, 0x0f, 0x6d, 0x0b, 0xa2, 0x6c, 0x4e, 0xbc, 0xb4, 0x13, 0x41, 0x64, 0xb1,
0x78, 0x6d, 0x75, 0xa1, 0x89, 0xd3, 0x92, 0x70, 0x47, 0xb6, 0x5b, 0x40, 0x84, 0x0e, 0xa8, 0x64,
0x6c, 0xd9, 0x9e, 0xac, 0xb3, 0xfb, 0x30, 0x96, 0x72, 0x95, 0x6c, 0xac, 0x44, 0x9c, 0x31, 0xa5,
0xed, 0xf9, 0xaa, 0xc0, 0x45, 0x18, 0x0f, 0xb7, 0x71, 0x96, 0x2d, 0x66, 0x8f, 0x25, 0x0e, 0x5b,
0x7d, 0x87, 0xf3, 0x6a, 0x58, 0x34, 0x38, 0x52, 0xca, 0x18, 0xb5, 0x25, 0x0a, 0x02, 0xce, 0x62,
0x44, 0x65, 0xbf, 0x6e, 0x84, 0xe7, 0x67, 0xd8, 0x50, 0xf0, 0xfe, 0x46, 0xf9, 0x68, 0x5b, 0xe3,
0x5e, 0x39, 0x3d, 0xc5, 0xc9, 0x36, 0xd8, 0x1d, 0x6a, 0x44, 0x9c, 0xf9, 0xb5, 0x98, 0xac, 0x2d,
0x35, 0xee, 0xe5, 0x5e, 0xe0, 0xd3, 0x0f, 0x0c, 0x53, 0x17, 0xeb, 0xe0, 0x55, 0x82, 0x67, 0x09,
0x8a, 0xf0, 0x09, 0x06, 0x7a, 0xd0, 0x6a, 0x14, 0xfb, 0x7f, 0x80, 0xf5, 0x07, 0xa0, 0xa9, 0x2b,
0xe6, 0x2e, 0xf5, 0x4f, 0x33, 0x61, 0x5b, 0xfa, 0x94, 0xc0, 0xa3, 0x73, 0xe1, 0x6d, 0x30, 0x64,
0xc1, 0xb0, 0xa5, 0xfc, 0xf9, 0x65, 0x13, 0x0a, 0x61, 0xa2, 0x16, 0x47, 0xc7, 0x49, 0xaf, 0x78,
0x62, 0xab, 0xf3, 0xde, 0x4e, 0xfe, 0xc0, 0xf5, 0xd8, 0x3b, 0x3c, 0xcc, 0x1a, 0x7c, 0x26, 0x48,
0xb2, 0x93, 0x79, 0xaf, 0xe0, 0x01, 0xb6, 0x6a, 0x2c, 0xb1, 0x17, 0x91, 0xd1, 0xbf, 0x35, 0xd2,
0xf8, 0xff, 0x39, 0x4a, 0x13, 0x7d, 0xa1, 0x82, 0xd8, 0x08, 0x72, 0x59, 0x46, 0xb4, 0xf7, 0x53,
0x61, 0x3a, 0xa4, 0xed, 0x2b, 0x15, 0xbe, 0x71, 0x25, 0x79, 0xe1, 0xdf, 0x89, 0x8e, 0x3b, 0xfc,
0x73, 0x3a, 0xd1, 0x83, 0x12, 0xa6, 0xee, 0x1f, 0xf0, 0xd4, 0xcf, 0x4b, 0x9d, 0xdd, 0x72, 0xec,
0xf2, 0x6a, 0xac, 0x63, 0x31, 0xe3, 0x86, 0x0c, 0xe8, 0x1a, 0x28, 0xcf, 0x86, 0x96, 0x17, 0x4a,
0x9e, 0xaa, 0x27, 0xa6, 0x49, 0xb9, 0x73, 0xd2, 0x2a, 0x90, 0xcf, 0x13, 0x9b, 0xc5, 0x92, 0xff,
0x38, 0x61, 0x85, 0xaa, 0x23, 0x6b, 0x19, 0x26, 0x65, 0x87, 0x84, 0x7c, 0xc0, 0x6b, 0xb6, 0x76,
0x5c, 0xb3, 0x74, 0xb3, 0xb6, 0x4b, 0x7a, 0x58, 0xd6, 0x8c, 0x40, 0xba, 0xd2, 0x57, 0xb6, 0x14,
0xbe, 0x1c, 0xa5, 0x03, 0xa9, 0x6d, 0xd8, 0x68, 0xd2, 0x86, 0x38, 0x8d, 0x99, 0x8f, 0x08, 0xfd,
0x7f, 0x02, 0x77, 0xc5, 0x79, 0xd3, 0x41, 0x4f, 0xfa, 0x24, 0x0a, 0xd8, 0x19, 0x8f, 0xfd, 0xe1,
0xdd, 0xde, 0xe0, 0x5b, 0xf0, 0x3e, 0x3a, 0xfe, 0xf6, 0x52, 0x7c, 0x97, 0xb9, 0xae, 0x8a, 0x8c,
0x78, 0x93, 0x4b, 0x5e, 0x61, 0x71, 0xa6, 0xd6, 0x71, 0x8b, 0xf0, 0x23, 0x10, 0xe6, 0xb1, 0xc2,
0x60, 0x33, 0xc4, 0xfa, 0xf1, 0x78, 0x3a, 0xf1, 0x6f, 0xfa, 0x15, 0xe6, 0x79, 0xc6, 0xb1, 0xbf,
0x02, 0x8e, 0xee, 0x0c, 0xc0, 0xf8, 0xf7, 0x9d, 0x0c, 0xa3, 0xff, 0x1c, 0x5f, 0xff, 0x65, 0xe0,
0x53, 0xd3, 0xef, 0xc1, 0x96, 0x74, 0x2b, 0x87, 0xc7, 0x9d, 0xe3, 0x18, 0x74, 0x00, 0x8c, 0x60,
0xb5, 0x9e, 0x13, 0x5b, 0xff, 0x50, 0xc9, 0xd1, 0xe5, 0x81, 0x61, 0x8b, 0x30, 0x07, 0xd7, 0x78,
0xbc, 0x2d, 0xc6, 0x4b, 0x10, 0x96, 0x9c, 0x0e, 0x41, 0x4b, 0x9e, 0x22, 0x42, 0x82, 0x84, 0x75,
0x47, 0x82, 0x9d, 0x06, 0x72, 0x5d, 0x4b, 0x06, 0xf4, 0x25, 0xfa, 0xd2, 0x23, 0x7f, 0x69, 0x86,
0x86, 0x36, 0x4d, 0xcd, 0x42, 0xbe, 0x3f, 0x4c, 0x86, 0xf7, 0xac, 0xcf, 0xff, 0x96, 0x12, 0xe1,
0xa6, 0xc4, 0x58, 0xf9, 0xe2, 0xa5, 0x8b, 0x93, 0x22, 0x7f, 0x0a, 0xcc, 0xd8, 0x54, 0x75, 0x30,
0xfc, 0x22, 0xcd, 0x43, 0xdd, 0xdb, 0x17, 0xd8, 0xd1, 0xcb, 0x55, 0xe9, 0xb1, 0x9c, 0x83, 0xf2,
0xf1, 0xfe, 0x4a, 0xbe, 0xa2, 0x10, 0x19, 0x27, 0xff, 0x3e, 0x66, 0x53, 0xc2, 0x0f, 0x2a, 0x35,
0x5d, 0x27, 0x2d, 0x29, 0x35, 0xae, 0xda, 0xee, 0xc2, 0xb4, 0x80, 0xe5, 0x10, 0xfe, 0x40, 0x24,
0x95, 0x4e, 0x6b, 0x97, 0xab, 0x9e, 0xde, 0x47, 0x41, 0x44, 0xd4, 0xe8, 0x0b, 0x9f, 0x52, 0xe4,
0x70, 0xd1, 0x25, 0x74, 0xd6, 0x6e, 0xa6, 0xbc, 0xae, 0xb3, 0xda, 0x38, 0xea, 0xa3, 0xc4, 0x8d,
0x18, 0x43, 0x77, 0x0e, 0x96, 0x3f, 0x9c, 0xd5, 0x95, 0x4a, 0x11, 0xa7, 0xe1, 0xd9, 0xb5, 0xd7,
0xa1, 0x9d, 0x84, 0x79, 0x7e, 0x84, 0xb8, 0xc0, 0xbe, 0xa5, 0x2c, 0x3a, 0xf6, 0x77, 0x59, 0x26,
0x33, 0x48, 0xf5, 0xac, 0x66, 0xfa, 0x83, 0x7e, 0x3b, 0x67, 0x02, 0xa2, 0x54, 0x9b, 0x5f, 0xaf,
0xb3, 0x2a, 0x51, 0x94, 0xd6, 0x11, 0xbf, 0xcb, 0x5d, 0x00, 0xe6, 0x98, 0xd7, 0x44, 0x5e, 0xe6,
0x60, 0x83, 0xb7, 0x3a, 0xe4, 0x2b, 0xb1, 0xe2, 0x7c, 0xdb, 0xc4, 0x58, 0xf0, 0x44, 0x22, 0x57,
0x0a, 0x90, 0xb4, 0x1c, 0xbc, 0x95, 0x40, 0x26, 0x59, 0x7e, 0x11, 0xae, 0xef, 0x42, 0x25, 0x09,
0x25, 0x4a, 0xc0, 0x5d, 0x98, 0xcc, 0x7f, 0x31, 0xba, 0xf5, 0x7f, 0x8b, 0x4d, 0xc0, 0xc4, 0xd2,
0xf0, 0x0b, 0xd8, 0x72, 0x35, 0xe6, 0x77, 0xd1, 0x0b, 0xee, 0x34, 0xfc, 0x5b, 0x30, 0x3d, 0x30,
0x21, 0x30, 0x09, 0x06, 0x05, 0x2b, 0x0e, 0x03, 0x02, 0x1a, 0x05, 0x00, 0x04, 0x14, 0xee, 0xd0,
0xaf, 0x7a, 0x95, 0x24, 0x44, 0xfc, 0x15, 0x9e, 0xdc, 0xfc, 0x59, 0x24, 0x64, 0xab, 0x07, 0xdf,
0x5a, 0x88, 0x04, 0x14, 0xd1, 0xe3, 0xc7, 0x24, 0xd6, 0xfc, 0x52, 0xda, 0xa3, 0x8c, 0x21, 0x35,
0x59, 0x4d, 0x05, 0x8a, 0x9a, 0x16, 0x18, 0xd2, 0x02, 0x02, 0x07, 0xd0 };
static const char key1DER[] =
"-----BEGIN CERTIFICATE-----\r"
"MIIBmjCCAQOgAwIBAAIKek1zPkldltl2sjANBgkqhkiG9w0BAQUFADANMQswCQYD\r"
"VQQDDAJDQTAeFw0wNTA5MTYxNDQ4NDBaFw0wNzA5MTYxNDQ4NDBaMBAxDjAMBgNV\r"
"BAMMBXVzZXIxMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDCwb1KcFYAIarj\r"
"wf0FyRwXsr4Zl01j8nEVh67WCQgNkiDu6m6CXr1PrPpuz92jQegPnmYbOsOqI2O5\r"
"iwpGIg2hgtjg0lkzfuJVAiY+tA/rropnVUxKfiTAKBGhfBVIZsetcaH/mUJX/36i\r"
"Cf2F8T5RBsIctSROhiagX5e2ByMk5QIDAQABMA0GCSqGSIb3DQEBBQUAA4GBAKg6\r"
"7A3TrmrJgY3EFudbxb/YW3WEqsq5k5p8lb40J55sbr43kdbIzt8DHr59PXkKKoq/\r"
"KA1CVfCMWU6HQBYCZ3avtH8ow4Dg2+CxNr89p8L2/OSKDS/iOX4fX1ZYWb4mwaJB\r"
"gyfGXiUz7jaTWKzVbE+zzGETNKWlKQdysXc91tW/\r"
"-----END CERTIFICATE-----\r";
static const char key2DER[] =
"-----BEGIN CERTIFICATE-----\r"
"MIIBmjCCAQOgAwIBAAIKcwcxd0sd7ggrYjANBgkqhkiG9w0BAQUFADANMQswCQYD\r"
"VQQDDAJDQTAeFw0wNTA5MTYxNDQ5MTBaFw0wNzA5MTYxNDQ5MTBaMBAxDjAMBgNV\r"
"BAMMBXVzZXIyMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDVMsUsfL/13Z2e\r"
"ViYULtcfMkH/nOFO5vNrm+oBAiDChOMjQ4c3/mcmJpXzoI48lO7TADnIXTnKbpFR\r"
"xu3IuLrp18s3/c3rnTzSqFbogZRMYmULz4fQcBxDutFAPIBqpVaVR9/pfsiOHz4O\r"
"SJ1weg6HDsBXHAFhm4Q+hYbnNCWiNQIDAQABMA0GCSqGSIb3DQEBBQUAA4GBAHyR\r"
"0ZjJuAKKxM0y5zJn+UOABa0NP6W4HuqgCgqtrhbhlWHdvKFt6C6xkfOQu+9+a6er\r"
"o3nvDFGrTzSoV1H6G7csSoUB8uGAon9Zupljgqwz/IItLGc9gvG3f/b3Tp6g5ibv\r"
"WgD5S832v3e/+gaaHpxnZ+bE1zcPqL3nATTW73Tp\r"
"-----END CERTIFICATE-----\r";
#define kCAKeyIDString "0xA3379D0C"
#define kKey1KeyIDString "0x83B4250B"
#define kKey2KeyIDString "0xAAC26E2E"
static PGPError CountKnownCAs( PGPContextRef context, PGPBoolean detailed )
{
PGPError err = kPGPError_NoErr;
PGPKeyDBRef knownCAs = kInvalidPGPKeyDBRef;
PGPKeyIterRef iter = kInvalidPGPKeyIterRef;
PGPKeyDBObjRef theKey = kInvalidPGPKeyDBObjRef;
PGPUInt32 numKeys;
int i;
OPTESTPrintF(" Access List of Know CAs... ");
err = PGPGetKnownX509CAs(context, &knownCAs);
err = PGPCountKeysInKeyDB(knownCAs, &numKeys); CKERR;
OPTESTPrintF("found %d\n", numKeys );
/* make an iterator */
err = PGPNewKeyIterFromKeyDB( knownCAs, &iter); CKERR;
/* Iterate through each key */
if(detailed)
for(i = 1; IsntPGPError( PGPKeyIterNextKeyDBObj( iter, kPGPKeyDBObjType_Key, &theKey) ); i++)
{
PGPKeyDBObjRef priUserID = kInvalidPGPKeyDBObjRef;
char tempBuf[256];
PGPSize length;
/* Get the primary user ID */
err = PGPGetPrimaryUserID (theKey, &priUserID); CKERR;
OPTESTPrintF( " [%2d] ", i);
PGPGetKeyDBObjDataProperty( priUserID, kPGPUserIDProperty_Name, tempBuf, sizeof(tempBuf), &length);
printTruncated(tempBuf, length, 64);
}
OPTESTPrintF("\n");
done:
if( PGPKeyIterRefIsValid( iter ) )
PGPFreeKeyIter( iter );
if( PGPKeyDBRefIsValid( knownCAs ) )
PGPFreeKeyDB( knownCAs );
return err;
}
static const char MessageToBeSigned[] =
"PGP uses symmetric keys of 128-bits and asymmetric keys of up to 4096-bits irrespective of the locale."
" Thus users of PGP can communicate securely globally whereas S/MIME users currently can't.";
static PGPError sTestX509Key( PGPContextRef context, PGPKeyDBObjRef key, PGPKeyDBObjRef signingCert, const PGPChar8 *passphrase )
{
PGPError err = kPGPError_NoErr;
PGPKeyDBObjRef useKey = kInvalidPGPKeyDBObjRef;
DecodeInfo decodeInfo;
/* Cipher Text */
void * cBuf = NULL;
PGPSize cBufSize;
/* Result Text */
void * dBuf = NULL;
PGPSize dBufSize;
InitDecodeInfo(&decodeInfo);
OPTESTPrintF("\tEncrypt in S/MIME format\n");
err = PGPGetKeyForUsage( key, kPGPKeyPropertyFlags_UsageEncryptCommunications, &useKey); CKERR;
err = PGPEncode( context,
PGPOInputBuffer ( context, MessageToBeSigned, sizeof(MessageToBeSigned)-1 ),
PGPOAllocatedOutputBuffer( context, &cBuf, MAX_PGPSize, &cBufSize),
PGPOEncryptToKeyDBObj(context,useKey),
PGPOOutputFormat(context, kPGPOutputFormat_SMIMEBodyEncryptedData),
PGPOLastOption( context ) ); CKERR;
OPTESTPrintF("\tEncoded %ld byte Message is %d bytes\n", sizeof(MessageToBeSigned)-1 , (int)cBufSize );
if(gVerbose_flag)
dumpHex( cBuf,cBufSize, 0 );
OPTESTPrintF("\tDecoding & Comparing Message\n");
InitDecodeInfo(&decodeInfo);
PGPGetKeyID(key, &decodeInfo.key[0].keyID);
decodeInfo.key[0].passPhrase = passphrase;
decodeInfo.keyCount = 1;
err = PGPDecode( context,
PGPOInputBuffer ( context, cBuf, cBufSize ),
PGPOAllocatedOutputBuffer( context, &dBuf, MAX_PGPSize, &dBufSize),
PGPOEventHandler( context, OptestEventHandler, &decodeInfo),
PGPOSMIMEMatchCriterion(context,kPGPSMIMEMatchCriterion_Any ),
PGPOInputFormat(context, kPGPOutputFormat_SMIMEBodyEncryptedData),
PGPOKeyDBRef(context, PGPPeekKeyDBObjKeyDB(key)),
PGPOLastOption ( context ) ); CKERR;
err = ((dBufSize == sizeof(MessageToBeSigned) -1)
&& pgpMemoryEqual(MessageToBeSigned, dBuf, dBufSize))
? kPGPError_NoErr : kPGPError_SelfTestFailed;
OPTESTPrintF("\tDecoded Message is %d bytes (%s)\n ", (int)dBufSize, (IsntPGPError(err)?"valid":"invalid") );
if(gVerbose_flag) OPTESTPrintF("-----\n%s\n----\n", (char*)dBuf );
PGPFreeData(cBuf); cBuf = NULL;
PGPFreeData(dBuf); dBuf = NULL;
CleanUpDecodeInfo(&decodeInfo);
CKERR;
OPTESTPrintF("\n\tSign in S/MIME format\n");
err = PGPGetKeyForUsage( key, kPGPKeyPropertyFlags_UsageSignMessages, &useKey); CKERR;
err = PGPEncode( context,
PGPOInputBuffer ( context, MessageToBeSigned, sizeof(MessageToBeSigned)-1 ),
PGPOAllocatedOutputBuffer( context, &cBuf, MAX_PGPSize, &cBufSize),
PGPOSignWithKey ( context, useKey,
( signingCert ? PGPOSMIMESigner(context, signingCert) : PGPONullOption(context)),
PGPOPassphrase( context, passphrase),
PGPOLastOption ( context ) ),
PGPOOutputFormat(context, kPGPOutputFormat_SMIMEBodySignedData),
PGPOLastOption( context ) ); CKERR;
OPTESTPrintF("\tEncoded %ld byte Message is %d bytes\n", sizeof(MessageToBeSigned)-1 , (int)cBufSize );
if(gVerbose_flag)
dumpHex( cBuf,cBufSize, 0 );
OPTESTPrintF("\tDecoding & Validating Message\n");
InitDecodeInfo(&decodeInfo);
err = PGPDecode( context,
PGPOInputBuffer ( context, cBuf, cBufSize ),
PGPOAllocatedOutputBuffer( context, &dBuf, MAX_PGPSize, &dBufSize),
PGPOEventHandler( context, OptestEventHandler, &decodeInfo),
PGPOInputFormat(context, kPGPOutputFormat_SMIMEBodySignedData),
PGPOKeyDBRef(context, PGPPeekKeyDBObjKeyDB(key)),
PGPOLastOption ( context ) ); CKERR;
err = ((dBufSize == sizeof(MessageToBeSigned) -1)
&& pgpMemoryEqual(MessageToBeSigned, dBuf, dBufSize))
? kPGPError_NoErr : kPGPError_SelfTestFailed;
OPTESTPrintF("\tDecoded Message is %d bytes (%s)\n ", (int)dBufSize, (IsntPGPError(err)?"valid":"invalid") );
if(gVerbose_flag) OPTESTPrintF("-----\n%s\n----\n", (char*)dBuf );
done:
CleanUpDecodeInfo(&decodeInfo);
if( dBuf != NULL)
PGPFreeData(dBuf);
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -