test/pEpEngineTest.cc
changeset 9 41e66a54f03e
parent 8 26cc9f0228f4
child 14 c99db0b8fc0f
     1.1 --- a/test/pEpEngineTest.cc	Fri Jul 11 17:43:11 2014 +0200
     1.2 +++ b/test/pEpEngineTest.cc	Wed Jul 30 16:02:49 2014 +0200
     1.3 @@ -127,7 +127,9 @@
     1.4      assert(verify_result == PEP_DECRYPT_SIGNATURE_DOES_NOT_MATCH);
     1.5      free_stringlist(keylist);
     1.6  
     1.7 -    keylist = new_stringlist("FA7261F7");
     1.8 +    keylist = new_stringlist("49422235FC99585B891C66530C7B109BFA7261F7");
     1.9 +    // stringlist_add(keylist, "C6FAA231A2B43252B9526D119550C6B6B8B0FCD6");
    1.10 +    stringlist_add(keylist, "5DC8CAC595EDAD6598DD4732DD55BF29DF9B1541");
    1.11  
    1.12      cout << "\ncalling encrypt_and_sign()\n";
    1.13      PEP_STATUS encrypt_result = encrypt_and_sign(session, keylist, plain.c_str(), plain.length(), &buf_text, &buf_size);
    1.14 @@ -258,6 +260,11 @@
    1.15      PEP_STATUS send_key_status = send_key(session, "vb@ulm.ccc.de");
    1.16      assert(recv_key_status == PEP_STATUS_OK);
    1.17  
    1.18 +    PEP_comm_type tcomm_type;
    1.19 +    PEP_STATUS tstatus = get_key_rating(session, "49422235FC99585B891C66530C7B109BFA7261F7", &tcomm_type);
    1.20 +    assert(tstatus == PEP_STATUS_OK);
    1.21 +    assert(tcomm_type == PEP_ct_OpenPGP_unconfirmed);
    1.22 +    
    1.23  	cout << "\ncalling release()\n";
    1.24  	release(session);
    1.25  	return 0;