231 lines
9.7 KiB
C++
231 lines
9.7 KiB
C++
/**
|
|
* Copyright (C) 2021 Saturneric
|
|
*
|
|
* This file is part of GpgFrontend.
|
|
*
|
|
* GpgFrontend is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* GpgFrontend is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>.
|
|
*
|
|
* The initial version of the source code is inherited from
|
|
* the gpg4usb project, which is under GPL-3.0-or-later.
|
|
*
|
|
* All the source code of GpgFrontend was modified and released by
|
|
* Saturneric<eric@bktus.com> starting on May 12, 2021.
|
|
*
|
|
* SPDX-License-Identifier: GPL-3.0-or-later
|
|
*
|
|
*/
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
#include "GpgFrontendTest.h"
|
|
#include "gpg/GpgConstants.h"
|
|
#include "gpg/function/GpgBasicOperator.h"
|
|
#include "gpg/function/GpgKeyGetter.h"
|
|
#include "gpg/result_analyse/GpgDecryptResultAnalyse.h"
|
|
|
|
using namespace GpgFrontend;
|
|
|
|
TEST_F(GpgCoreTest, CoreEncryptDecrTest) {
|
|
auto encrypt_key = GpgKeyGetter::GetInstance(default_channel)
|
|
.GetPubkey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
|
|
ByteArray encrypt_text = "Hello GpgFrontend!";
|
|
ByteArrayPtr encr_out_data;
|
|
GpgEncrResult e_result;
|
|
KeyListPtr keys = std::make_unique<KeyArgsList>();
|
|
keys->push_back(std::move(encrypt_key));
|
|
auto err =
|
|
BasicOperator::GetInstance(default_channel)
|
|
.Encrypt(std::move(keys), encrypt_text, encr_out_data, e_result);
|
|
ASSERT_EQ(e_result->invalid_recipients, nullptr);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
|
|
GpgDecrResult d_result;
|
|
ByteArrayPtr decr_out_data;
|
|
err = BasicOperator::GetInstance(default_channel)
|
|
.Decrypt(*encr_out_data, decr_out_data, d_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
ASSERT_NE(d_result->recipients, nullptr);
|
|
ASSERT_EQ(std::string(d_result->recipients->keyid), "F89C95A05088CC93");
|
|
ASSERT_EQ(*decr_out_data, encrypt_text);
|
|
}
|
|
|
|
TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_1) {
|
|
ByteArrayPtr encr_out_data = std::make_unique<ByteArray>(
|
|
"-----BEGIN PGP MESSAGE-----\n"
|
|
"\n"
|
|
"hQEMA6UM/S9sZ32MAQf9Fb6gp6nvgKTQBv2mmjXia6ODXYq6kNeLsPVzLCbHyWOs\n"
|
|
"0GDED11R1NksA3EQxFf4fzLkDpbo68r5bWy7c28c99Fr68IRET19Tw6Gu65MQezD\n"
|
|
"Rdzo1oVqmK9sfKqOT3+0S2H+suFYw5kfBztMZLVGGl9R9fOXdKcj0fqGs2br3e9D\n"
|
|
"ArBFqq07Bae2DD1J8mckWB2x9Uem4vjRiY+vEJcEdAS1N5xu1n7qzzyDgcRcS34X\n"
|
|
"PNBQeTrFMc2RS7mnip2DbyZVEjORobhguK6xZyqXXbvFacStGWDLptV3dcCn4JRO\n"
|
|
"dIORyt5wugqAtgE4qEGTvr/pJ/oXPw4Wve/trece/9I/AR38vW8ntVmDa/hV75iZ\n"
|
|
"4QGAhQ8grD4kq31GHXHUOmBX51XXW9SINmplC8elEx3R460EUZJjjb0OvTih+eZH\n"
|
|
"=8n2H\n"
|
|
"-----END PGP MESSAGE-----");
|
|
|
|
GpgDecrResult d_result;
|
|
ByteArrayPtr decr_out_data;
|
|
auto err = BasicOperator::GetInstance(default_channel)
|
|
.Decrypt(*encr_out_data, decr_out_data, d_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_SECKEY);
|
|
ASSERT_NE(d_result->recipients, nullptr);
|
|
ASSERT_EQ(std::string(d_result->recipients->keyid), "A50CFD2F6C677D8C");
|
|
}
|
|
|
|
TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_ResultAnalyse) {
|
|
ByteArrayPtr encr_out_data = std::make_unique<ByteArray>(
|
|
"-----BEGIN PGP MESSAGE-----\n"
|
|
"\n"
|
|
"hQEMA6UM/S9sZ32MAQf9Fb6gp6nvgKTQBv2mmjXia6ODXYq6kNeLsPVzLCbHyWOs\n"
|
|
"0GDED11R1NksA3EQxFf4fzLkDpbo68r5bWy7c28c99Fr68IRET19Tw6Gu65MQezD\n"
|
|
"Rdzo1oVqmK9sfKqOT3+0S2H+suFYw5kfBztMZLVGGl9R9fOXdKcj0fqGs2br3e9D\n"
|
|
"ArBFqq07Bae2DD1J8mckWB2x9Uem4vjRiY+vEJcEdAS1N5xu1n7qzzyDgcRcS34X\n"
|
|
"PNBQeTrFMc2RS7mnip2DbyZVEjORobhguK6xZyqXXbvFacStGWDLptV3dcCn4JRO\n"
|
|
"dIORyt5wugqAtgE4qEGTvr/pJ/oXPw4Wve/trece/9I/AR38vW8ntVmDa/hV75iZ\n"
|
|
"4QGAhQ8grD4kq31GHXHUOmBX51XXW9SINmplC8elEx3R460EUZJjjb0OvTih+eZH\n"
|
|
"=8n2H\n"
|
|
"-----END PGP MESSAGE-----");
|
|
|
|
GpgDecrResult d_result;
|
|
ByteArrayPtr decr_out_data;
|
|
auto err = BasicOperator::GetInstance(default_channel)
|
|
.Decrypt(*encr_out_data, decr_out_data, d_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_SECKEY);
|
|
ASSERT_NE(d_result->recipients, nullptr);
|
|
ASSERT_EQ(std::string(d_result->recipients->keyid), "A50CFD2F6C677D8C");
|
|
|
|
DecryptResultAnalyse analyse{err, d_result};
|
|
analyse.analyse();
|
|
ASSERT_EQ(analyse.getStatus(), -1);
|
|
ASSERT_FALSE(analyse.getResultReport().empty());
|
|
}
|
|
|
|
TEST_F(GpgCoreTest, CoreSignVerifyNormalTest) {
|
|
auto encrypt_key = GpgKeyGetter::GetInstance(default_channel)
|
|
.GetPubkey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
|
|
ByteArray sign_text = "Hello GpgFrontend!";
|
|
ByteArrayPtr sign_out_data;
|
|
GpgSignResult s_result;
|
|
KeyListPtr keys = std::make_unique<KeyArgsList>();
|
|
keys->push_back(std::move(encrypt_key));
|
|
auto err = BasicOperator::GetInstance(default_channel)
|
|
.Sign(std::move(keys), sign_text, sign_out_data,
|
|
GPGME_SIG_MODE_NORMAL, s_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
ASSERT_EQ(s_result->invalid_signers, nullptr);
|
|
|
|
GpgVerifyResult v_result;
|
|
ByteArrayPtr sign_buff = nullptr;
|
|
err = BasicOperator::GetInstance(default_channel)
|
|
.Verify(*sign_out_data, sign_buff, v_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
ASSERT_NE(v_result->signatures, nullptr);
|
|
ASSERT_EQ(std::string(v_result->signatures->fpr),
|
|
"467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
|
|
ASSERT_EQ(v_result->signatures->next, nullptr);
|
|
}
|
|
|
|
TEST_F(GpgCoreTest, CoreSignVerifyDetachTest) {
|
|
auto encrypt_key = GpgKeyGetter::GetInstance(default_channel)
|
|
.GetPubkey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
|
|
ByteArray sign_text = "Hello GpgFrontend!";
|
|
ByteArrayPtr sign_out_data;
|
|
GpgSignResult s_result;
|
|
KeyListPtr keys = std::make_unique<KeyArgsList>();
|
|
keys->push_back(std::move(encrypt_key));
|
|
auto err = BasicOperator::GetInstance(default_channel)
|
|
.Sign(std::move(keys), sign_text, sign_out_data,
|
|
GPGME_SIG_MODE_DETACH, s_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
ASSERT_EQ(s_result->invalid_signers, nullptr);
|
|
|
|
GpgVerifyResult v_result;
|
|
err = BasicOperator::GetInstance(default_channel)
|
|
.Verify(sign_text, sign_out_data, v_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
ASSERT_NE(v_result->signatures, nullptr);
|
|
ASSERT_EQ(std::string(v_result->signatures->fpr),
|
|
"467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
|
|
ASSERT_EQ(v_result->signatures->next, nullptr);
|
|
}
|
|
|
|
TEST_F(GpgCoreTest, CoreSignVerifyClearTest) {
|
|
auto sign_key = GpgKeyGetter::GetInstance(default_channel)
|
|
.GetKey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
|
|
ByteArray sign_text = "Hello GpgFrontend!";
|
|
ByteArrayPtr sign_out_data;
|
|
GpgSignResult s_result;
|
|
KeyListPtr keys = std::make_unique<KeyArgsList>();
|
|
keys->push_back(std::move(sign_key));
|
|
auto err = BasicOperator::GetInstance(default_channel)
|
|
.Sign(std::move(keys), sign_text, sign_out_data,
|
|
GPGME_SIG_MODE_CLEAR, s_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
ASSERT_EQ(s_result->invalid_signers, nullptr);
|
|
|
|
GpgVerifyResult v_result;
|
|
ByteArrayPtr sign_buff = nullptr;
|
|
err = BasicOperator::GetInstance(default_channel)
|
|
.Verify(*sign_out_data, sign_buff, v_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
ASSERT_NE(v_result->signatures, nullptr);
|
|
ASSERT_EQ(std::string(v_result->signatures->fpr),
|
|
"467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
|
|
ASSERT_EQ(v_result->signatures->next, nullptr);
|
|
}
|
|
|
|
TEST_F(GpgCoreTest, CoreEncryptSignDecrVerifyTest) {
|
|
auto encrypt_key = GpgKeyGetter::GetInstance(default_channel)
|
|
.GetPubkey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
|
|
auto sign_key = GpgKeyGetter::GetInstance(default_channel)
|
|
.GetKey("8933EB283A18995F45D61DAC021D89771B680FFB");
|
|
// Question?
|
|
// ASSERT_FALSE(encrypt_key.is_private_key());
|
|
ASSERT_TRUE(sign_key.is_private_key());
|
|
ASSERT_TRUE(sign_key.CanSignActual());
|
|
ByteArray encrypt_text = "Hello GpgFrontend!";
|
|
ByteArrayPtr encr_out_data;
|
|
GpgEncrResult e_result;
|
|
GpgSignResult s_result;
|
|
|
|
KeyListPtr keys = std::make_unique<KeyArgsList>(),
|
|
sign_keys = std::make_unique<KeyArgsList>();
|
|
keys->push_back(std::move(encrypt_key));
|
|
sign_keys->push_back(std::move(sign_key));
|
|
|
|
auto err = BasicOperator::GetInstance(default_channel)
|
|
.EncryptSign(std::move(keys), std::move(sign_keys),
|
|
encrypt_text, encr_out_data, e_result, s_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
ASSERT_EQ(e_result->invalid_recipients, nullptr);
|
|
ASSERT_EQ(s_result->invalid_signers, nullptr);
|
|
|
|
GpgDecrResult d_result;
|
|
GpgVerifyResult v_result;
|
|
ByteArrayPtr decr_out_data = nullptr;
|
|
err = BasicOperator::GetInstance(default_channel)
|
|
.DecryptVerify(*encr_out_data, decr_out_data, d_result, v_result);
|
|
ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
|
|
ASSERT_NE(d_result->recipients, nullptr);
|
|
ASSERT_EQ(std::string(d_result->recipients->keyid), "F89C95A05088CC93");
|
|
ASSERT_EQ(*decr_out_data, encrypt_text);
|
|
ASSERT_NE(v_result->signatures, nullptr);
|
|
ASSERT_EQ(std::string(v_result->signatures->fpr),
|
|
"8933EB283A18995F45D61DAC021D89771B680FFB");
|
|
ASSERT_EQ(v_result->signatures->next, nullptr);
|
|
}
|