diff options
author | Saturn&Eric <[email protected]> | 2024-01-23 07:21:28 +0000 |
---|---|---|
committer | GitHub <[email protected]> | 2024-01-23 07:21:28 +0000 |
commit | 56acf161d439ce73eceaa145c40fe703bb2c3f02 (patch) | |
tree | a5d4790a6b2efc8786a3c0f74a07f5a8032d4e94 /src/test/core/GpgCoreTestFileBasicOpera.cpp | |
parent | fix: use more secure cdn links (diff) | |
parent | fix: solve issues on detected gnupg path function and fix linking errors on w... (diff) | |
download | GpgFrontend-56acf161d439ce73eceaa145c40fe703bb2c3f02.tar.gz GpgFrontend-56acf161d439ce73eceaa145c40fe703bb2c3f02.zip |
Merge pull request #126 from saturneric/dev/2.1.1/main
Develop 2.1.2.1
Diffstat (limited to 'src/test/core/GpgCoreTestFileBasicOpera.cpp')
-rw-r--r-- | src/test/core/GpgCoreTestFileBasicOpera.cpp | 303 |
1 files changed, 303 insertions, 0 deletions
diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp new file mode 100644 index 00000000..db338893 --- /dev/null +++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp @@ -0,0 +1,303 @@ +/** + * Copyright (C) 2021 Saturneric <[email protected]> + * + * This file is part of GpgFrontend. + * + * GpgFrontend is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * GpgFrontend is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>. + * + * The initial version of the source code is inherited from + * the gpg4usb project, which is under GPL-3.0-or-later. + * + * All the source code of GpgFrontend was modified and released by + * Saturneric <[email protected]> starting on May 12, 2021. + * + * SPDX-License-Identifier: GPL-3.0-or-later + * + */ + +#include "GpgCoreTest.h" +#include "core/GpgModel.h" +#include "core/function/gpg/GpgFileOpera.h" +#include "core/function/gpg/GpgKeyGetter.h" +#include "core/model/GpgDecryptResult.h" +#include "core/model/GpgEncryptResult.h" +#include "core/model/GpgSignResult.h" +#include "core/model/GpgVerifyResult.h" +#include "core/utils/GpgUtils.h" +#include "core/utils/IOUtils.h" + +namespace GpgFrontend::Test { + +TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync( + {encrypt_key}, input_file, true, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult>())); + auto result = ExtractParams<GpgEncryptResult>(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_FALSE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptDecrBinaryTest) { + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync( + {encrypt_key}, input_file, false, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult>())); + auto result = ExtractParams<GpgEncryptResult>(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>())); + auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + ASSERT_FALSE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + + auto [err, data_object] = + GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, true, + output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult>())); + auto result = ExtractParams<GpgEncryptResult>(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>())); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + ASSERT_TRUE(decrypt_result.Recipients().empty()); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrBinaryTest) { + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + + auto [err, data_object] = + GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, false, + output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult>())); + auto result = ExtractParams<GpgEncryptResult>(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>())); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + ASSERT_TRUE(decrypt_result.Recipients().empty()); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { + auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto output_file = GetTempFilePath(); + + auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync( + {sign_key}, input_file, true, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgSignResult>())); + auto result = ExtractParams<GpgSignResult>(data_object, 0); + ASSERT_TRUE(result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>())); + auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0); + ASSERT_FALSE(verify_result.GetSignature().empty()); + ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); +} + +TEST_F(GpgCoreTest, CoreFileSignVerifyNormalBinaryTest) { + auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto output_file = GetTempFilePath(); + + auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync( + {sign_key}, input_file, false, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgSignResult>())); + auto result = ExtractParams<GpgSignResult>(data_object, 0); + ASSERT_TRUE(result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>())); + auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0); + ASSERT_FALSE(verify_result.GetSignature().empty()); + ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto sign_key = GpgKeyGetter::GetInstance().GetKey( + "8933EB283A18995F45D61DAC021D89771B680FFB"); + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + + ASSERT_TRUE(sign_key.IsPrivateKey()); + ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); + + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync( + {encrypt_key}, {sign_key}, input_file, true, output_file); + + ASSERT_TRUE((data_object->Check<GpgEncryptResult, GpgSignResult>())); + auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0); + auto sign_result = ExtractParams<GpgSignResult>(data_object, 1); + ASSERT_TRUE(encr_result.InvalidRecipients().empty()); + ASSERT_TRUE(sign_result.InvalidSigners().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file, + decrpypt_output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GpgVerifyResult>())); + auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1); + + ASSERT_FALSE(decrypt_result.Recipients().empty()); + ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93"); + ASSERT_FALSE(verify_reult.GetSignature().empty()); + ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), + "8933EB283A18995F45D61DAC021D89771B680FFB"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyBinaryTest) { + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto sign_key = GpgKeyGetter::GetInstance().GetKey( + "8933EB283A18995F45D61DAC021D89771B680FFB"); + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + + ASSERT_TRUE(sign_key.IsPrivateKey()); + ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); + + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync( + {encrypt_key}, {sign_key}, input_file, false, output_file); + + ASSERT_TRUE((data_object->Check<GpgEncryptResult, GpgSignResult>())); + auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0); + auto sign_result = ExtractParams<GpgSignResult>(data_object, 1); + ASSERT_TRUE(encr_result.InvalidRecipients().empty()); + ASSERT_TRUE(sign_result.InvalidSigners().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file, + decrpypt_output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GpgVerifyResult>())); + auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1); + + ASSERT_FALSE(decrypt_result.Recipients().empty()); + ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93"); + ASSERT_FALSE(verify_reult.GetSignature().empty()); + ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), + "8933EB283A18995F45D61DAC021D89771B680FFB"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +} // namespace GpgFrontend::Test |