aboutsummaryrefslogtreecommitdiffstats
path: root/src/test/core/GpgCoreTestFileBasicOpera.cpp
diff options
context:
space:
mode:
authorSaturn&Eric <[email protected]>2024-01-23 07:21:28 +0000
committerGitHub <[email protected]>2024-01-23 07:21:28 +0000
commit56acf161d439ce73eceaa145c40fe703bb2c3f02 (patch)
treea5d4790a6b2efc8786a3c0f74a07f5a8032d4e94 /src/test/core/GpgCoreTestFileBasicOpera.cpp
parentfix: use more secure cdn links (diff)
parentfix: solve issues on detected gnupg path function and fix linking errors on w... (diff)
downloadGpgFrontend-56acf161d439ce73eceaa145c40fe703bb2c3f02.tar.gz
GpgFrontend-56acf161d439ce73eceaa145c40fe703bb2c3f02.zip
Merge pull request #126 from saturneric/dev/2.1.1/main
Develop 2.1.2.1
Diffstat (limited to 'src/test/core/GpgCoreTestFileBasicOpera.cpp')
-rw-r--r--src/test/core/GpgCoreTestFileBasicOpera.cpp303
1 files changed, 303 insertions, 0 deletions
diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp
new file mode 100644
index 00000000..db338893
--- /dev/null
+++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp
@@ -0,0 +1,303 @@
+/**
+ * Copyright (C) 2021 Saturneric <[email protected]>
+ *
+ * This file is part of GpgFrontend.
+ *
+ * GpgFrontend is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GpgFrontend is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>.
+ *
+ * The initial version of the source code is inherited from
+ * the gpg4usb project, which is under GPL-3.0-or-later.
+ *
+ * All the source code of GpgFrontend was modified and released by
+ * Saturneric <[email protected]> starting on May 12, 2021.
+ *
+ * SPDX-License-Identifier: GPL-3.0-or-later
+ *
+ */
+
+#include "GpgCoreTest.h"
+#include "core/GpgModel.h"
+#include "core/function/gpg/GpgFileOpera.h"
+#include "core/function/gpg/GpgKeyGetter.h"
+#include "core/model/GpgDecryptResult.h"
+#include "core/model/GpgEncryptResult.h"
+#include "core/model/GpgSignResult.h"
+#include "core/model/GpgVerifyResult.h"
+#include "core/utils/GpgUtils.h"
+#include "core/utils/IOUtils.h"
+
+namespace GpgFrontend::Test {
+
+TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) {
+ auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
+ auto output_file = GetTempFilePath();
+
+ auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync(
+ {encrypt_key}, input_file, true, output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult>()));
+ auto result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidRecipients().empty());
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync(
+ output_file, decrpypt_output_file);
+
+ auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_FALSE(decr_result.Recipients().empty());
+ ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29");
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
+}
+
+TEST_F(GpgCoreTest, CoreFileEncryptDecrBinaryTest) {
+ auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
+ auto output_file = GetTempFilePath();
+
+ auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync(
+ {encrypt_key}, input_file, false, output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult>()));
+ auto result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidRecipients().empty());
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync(
+ output_file, decrpypt_output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>()));
+ auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ ASSERT_FALSE(decr_result.Recipients().empty());
+ ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29");
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
+}
+
+TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) {
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
+ auto output_file = GetTempFilePath();
+
+ auto [err, data_object] =
+ GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, true,
+ output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult>()));
+ auto result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidRecipients().empty());
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync(
+ output_file, decrpypt_output_file);
+
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>()));
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ ASSERT_TRUE(decrypt_result.Recipients().empty());
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
+}
+
+TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrBinaryTest) {
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
+ auto output_file = GetTempFilePath();
+
+ auto [err, data_object] =
+ GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, false,
+ output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult>()));
+ auto result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidRecipients().empty());
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync(
+ output_file, decrpypt_output_file);
+
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>()));
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ ASSERT_TRUE(decrypt_result.Recipients().empty());
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
+}
+
+TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) {
+ auto sign_key = GpgKeyGetter::GetInstance().GetPubkey(
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
+ auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!");
+ auto output_file = GetTempFilePath();
+
+ auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync(
+ {sign_key}, input_file, true, output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgSignResult>()));
+ auto result = ExtractParams<GpgSignResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidSigners().empty());
+
+ auto [err_0, data_object_0] =
+ GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>()));
+ auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0);
+ ASSERT_FALSE(verify_result.GetSignature().empty());
+ ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(),
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
+}
+
+TEST_F(GpgCoreTest, CoreFileSignVerifyNormalBinaryTest) {
+ auto sign_key = GpgKeyGetter::GetInstance().GetPubkey(
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
+ auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!");
+ auto output_file = GetTempFilePath();
+
+ auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync(
+ {sign_key}, input_file, false, output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgSignResult>()));
+ auto result = ExtractParams<GpgSignResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidSigners().empty());
+
+ auto [err_0, data_object_0] =
+ GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>()));
+ auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0);
+ ASSERT_FALSE(verify_result.GetSignature().empty());
+ ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(),
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
+}
+
+TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) {
+ auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
+ auto sign_key = GpgKeyGetter::GetInstance().GetKey(
+ "8933EB283A18995F45D61DAC021D89771B680FFB");
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
+ auto output_file = GetTempFilePath();
+
+ ASSERT_TRUE(sign_key.IsPrivateKey());
+ ASSERT_TRUE(sign_key.IsHasActualSigningCapability());
+
+ auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync(
+ {encrypt_key}, {sign_key}, input_file, true, output_file);
+
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult, GpgSignResult>()));
+ auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ auto sign_result = ExtractParams<GpgSignResult>(data_object, 1);
+ ASSERT_TRUE(encr_result.InvalidRecipients().empty());
+ ASSERT_TRUE(sign_result.InvalidSigners().empty());
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] =
+ GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file,
+ decrpypt_output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GpgVerifyResult>()));
+ auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1);
+
+ ASSERT_FALSE(decrypt_result.Recipients().empty());
+ ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93");
+ ASSERT_FALSE(verify_reult.GetSignature().empty());
+ ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(),
+ "8933EB283A18995F45D61DAC021D89771B680FFB");
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
+}
+
+TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyBinaryTest) {
+ auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
+ auto sign_key = GpgKeyGetter::GetInstance().GetKey(
+ "8933EB283A18995F45D61DAC021D89771B680FFB");
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
+ auto output_file = GetTempFilePath();
+
+ ASSERT_TRUE(sign_key.IsPrivateKey());
+ ASSERT_TRUE(sign_key.IsHasActualSigningCapability());
+
+ auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync(
+ {encrypt_key}, {sign_key}, input_file, false, output_file);
+
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult, GpgSignResult>()));
+ auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ auto sign_result = ExtractParams<GpgSignResult>(data_object, 1);
+ ASSERT_TRUE(encr_result.InvalidRecipients().empty());
+ ASSERT_TRUE(sign_result.InvalidSigners().empty());
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] =
+ GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file,
+ decrpypt_output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GpgVerifyResult>()));
+ auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1);
+
+ ASSERT_FALSE(decrypt_result.Recipients().empty());
+ ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93");
+ ASSERT_FALSE(verify_reult.GetSignature().empty());
+ ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(),
+ "8933EB283A18995F45D61DAC021D89771B680FFB");
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
+}
+
+} // namespace GpgFrontend::Test