9 #include "message_api.h"
14 cout << "\n*** revoke_regen_attach_test ***\n\n";
18 cout << "calling init()\n";
19 PEP_STATUS status = init(&session);
20 assert(status == PEP_STATUS_OK);
22 cout << "init() completed.\n";
24 cout << "creating own id for : ";
25 char *uniqname = strdup("AAAAtestuser@testdomain.org");
27 for(int i=0; i < 4;i++)
28 uniqname[i] += random() & 0xf;
30 cout << uniqname << "\n";
31 pEp_identity * me = new_identity(uniqname, NULL, PEP_OWN_USERID, "Test User");
35 cout << "generated fingerprint \n";
36 cout << me->fpr << "\n";
38 const char *prev_fpr = strdup(me->fpr);
42 key_compromized(session, me);
44 cout << "re-generated fingerprint \n";
45 cout << me->fpr << "\n";
47 assert(strcmp(me->fpr, prev_fpr));
49 identity_list *to = new_identity_list(new_identity("vb@dingens.org", NULL, "42", "Volker Birk"));
50 message *msg = new_message(PEP_dir_outgoing);
54 msg->shortmsg = strdup("hello, world");
55 cout << "message created.\n";
57 cout << "encrypting message as MIME multipart…\n";
59 cout << "calling encrypt_message()\n";
60 status = encrypt_message(session, msg, NULL, &enc_msg, PEP_enc_PGP_MIME);
62 assert(status == PEP_STATUS_OK);
64 cout << "message encrypted.\n";
66 cout << msg->attachments->filename;
67 assert(bloblist_length(msg->attachments) == 2);
68 assert(strcmp(msg->attachments->filename, "pEpkey.asc") == 0);
69 assert(strcmp(msg->attachments->next->filename, "pEpkey.asc") == 0);
71 cout << "message contains 2 key attachements.\n";
74 free_message(enc_msg);
76 // TODO: check that revoked key isn't sent after some time.