diff options
author | saturneric <[email protected]> | 2025-04-12 11:36:45 +0000 |
---|---|---|
committer | saturneric <[email protected]> | 2025-04-12 11:36:45 +0000 |
commit | e0264d85090dd119d48df28477db2fe3b17eb60a (patch) | |
tree | e7711bfe4f03c4b97eb2f37129b07a9ec5eb85d1 /src/test | |
parent | fix: wrong ui dialog order after switching apps (diff) | |
download | GpgFrontend-e0264d85090dd119d48df28477db2fe3b17eb60a.tar.gz GpgFrontend-e0264d85090dd119d48df28477db2fe3b17eb60a.zip |
refactor: GpgKey and GpgSubKey
Diffstat (limited to 'src/test')
-rw-r--r-- | src/test/core/GpgCoreTestKeyManagement.cpp | 42 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestKeyModel.cpp | 104 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestKeyOpera.cpp | 21 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestKeyUIDOpera.cpp | 30 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestKeygen.cpp | 212 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestSubkeygen.cpp | 184 |
6 files changed, 296 insertions, 297 deletions
diff --git a/src/test/core/GpgCoreTestKeyManagement.cpp b/src/test/core/GpgCoreTestKeyManagement.cpp index 4d80f7d0..6ba24b80 100644 --- a/src/test/core/GpgCoreTestKeyManagement.cpp +++ b/src/test/core/GpgCoreTestKeyManagement.cpp @@ -119,10 +119,10 @@ TEST_F(GpgCoreTest, CoreDeleteSubkeyTestA) { .GetKey("822D7E13F5B85D7D"); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); + auto s_key = key.SubKeys(); - ASSERT_EQ(subkeys->size(), 5); - ASSERT_EQ((*subkeys)[2].GetID(), "2D1F9FC59B568A8C"); + ASSERT_EQ(s_key.size(), 5); + ASSERT_EQ(s_key[2].ID(), "2D1F9FC59B568A8C"); auto res = GpgKeyManager::GetInstance().DeleteSubkey(key, 2); @@ -133,12 +133,12 @@ TEST_F(GpgCoreTest, CoreDeleteSubkeyTestA) { .GetKey("822D7E13F5B85D7D"); ASSERT_TRUE(key.IsGood()); - subkeys = key.GetSubKeys(); + s_key = key.SubKeys(); - ASSERT_EQ(subkeys->size(), 4); - ASSERT_EQ((*subkeys)[2].GetID(), "CE038203C4D03C3D"); + ASSERT_EQ(s_key.size(), 4); + ASSERT_EQ(s_key[2].ID(), "CE038203C4D03C3D"); - GpgKeyOpera::GetInstance().DeleteKey(key.GetId()); + GpgKeyOpera::GetInstance().DeleteKey(key.ID()); } TEST_F(GpgCoreTest, CoreSetOwnerTrustA) { @@ -161,7 +161,7 @@ TEST_F(GpgCoreTest, CoreSetOwnerTrustA) { ASSERT_TRUE(key.IsGood()); // why? - ASSERT_EQ(key.GetOwnerTrustLevel(), 0); + ASSERT_EQ(key.OwnerTrustLevel(), 0); res = GpgKeyManager::GetInstance().SetOwnerTrustLevel(key, 2); ASSERT_TRUE(res); @@ -171,7 +171,7 @@ TEST_F(GpgCoreTest, CoreSetOwnerTrustA) { .GetKey("822D7E13F5B85D7D"); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetOwnerTrustLevel(), 2); + ASSERT_EQ(key.OwnerTrustLevel(), 2); res = GpgKeyManager::GetInstance().SetOwnerTrustLevel(key, 3); ASSERT_TRUE(res); @@ -181,7 +181,7 @@ TEST_F(GpgCoreTest, CoreSetOwnerTrustA) { .GetKey("822D7E13F5B85D7D"); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetOwnerTrustLevel(), 3); + ASSERT_EQ(key.OwnerTrustLevel(), 3); res = GpgKeyManager::GetInstance().SetOwnerTrustLevel(key, 4); ASSERT_TRUE(res); @@ -191,7 +191,7 @@ TEST_F(GpgCoreTest, CoreSetOwnerTrustA) { .GetKey("822D7E13F5B85D7D"); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetOwnerTrustLevel(), 4); + ASSERT_EQ(key.OwnerTrustLevel(), 4); res = GpgKeyManager::GetInstance().SetOwnerTrustLevel(key, 5); ASSERT_TRUE(res); @@ -201,7 +201,7 @@ TEST_F(GpgCoreTest, CoreSetOwnerTrustA) { .GetKey("822D7E13F5B85D7D"); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); + ASSERT_EQ(key.OwnerTrustLevel(), 5); res = GpgKeyManager::GetInstance().SetOwnerTrustLevel(key, 0); ASSERT_FALSE(res); @@ -212,7 +212,7 @@ TEST_F(GpgCoreTest, CoreSetOwnerTrustA) { res = GpgKeyManager::GetInstance().SetOwnerTrustLevel(key, 6); ASSERT_FALSE(res); - GpgKeyOpera::GetInstance().DeleteKey(key.GetId()); + GpgKeyOpera::GetInstance().DeleteKey(key.ID()); } TEST_F(GpgCoreTest, CoreRevokeSubkeyTestA) { @@ -226,10 +226,10 @@ TEST_F(GpgCoreTest, CoreRevokeSubkeyTestA) { .GetKey("822D7E13F5B85D7D"); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); + auto s_key = key.SubKeys(); - ASSERT_EQ(subkeys->size(), 5); - ASSERT_EQ((*subkeys)[2].GetID(), "2D1F9FC59B568A8C"); + ASSERT_EQ(s_key.size(), 5); + ASSERT_EQ(s_key[2].ID(), "2D1F9FC59B568A8C"); auto res = GpgKeyManager::GetInstance().RevokeSubkey( key, 2, 2, QString("H\nE\nLL\nO\n\n")); @@ -241,14 +241,14 @@ TEST_F(GpgCoreTest, CoreRevokeSubkeyTestA) { .GetKey("822D7E13F5B85D7D"); ASSERT_TRUE(key.IsGood()); - subkeys = key.GetSubKeys(); + s_key = key.SubKeys(); - ASSERT_EQ(subkeys->size(), 5); - ASSERT_EQ((*subkeys)[2].GetID(), "2D1F9FC59B568A8C"); + ASSERT_EQ(s_key.size(), 5); + ASSERT_EQ(s_key[2].ID(), "2D1F9FC59B568A8C"); - ASSERT_TRUE((*subkeys)[2].IsRevoked()); + ASSERT_TRUE(s_key[2].IsRevoked()); - GpgKeyOpera::GetInstance().DeleteKey(key.GetId()); + GpgKeyOpera::GetInstance().DeleteKey(key.ID()); } } // namespace GpgFrontend::Test
\ No newline at end of file diff --git a/src/test/core/GpgCoreTestKeyModel.cpp b/src/test/core/GpgCoreTestKeyModel.cpp index 622d7009..878ea953 100644 --- a/src/test/core/GpgCoreTestKeyModel.cpp +++ b/src/test/core/GpgCoreTestKeyModel.cpp @@ -64,10 +64,10 @@ TEST_F(GpgCoreTest, GpgKeyTest) { ASSERT_FALSE(key.IsDisabled()); ASSERT_FALSE(key.IsRevoked()); - ASSERT_EQ(key.GetProtocol(), "OpenPGP"); + ASSERT_EQ(key.Protocol(), "OpenPGP"); - ASSERT_EQ(key.GetSubKeys()->size(), 2); - ASSERT_EQ(key.GetUIDs()->size(), 1); + ASSERT_EQ(key.SubKeys().size(), 2); + ASSERT_EQ(key.UIDs().size(), 1); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_FALSE(key.IsHasEncrCap()); @@ -78,78 +78,76 @@ TEST_F(GpgCoreTest, GpgKeyTest) { ASSERT_FALSE(key.IsHasActualSignCap()); ASSERT_FALSE(key.IsHasActualAuthCap()); - ASSERT_EQ(key.GetName(), "GpgFrontendTest"); - ASSERT_TRUE(key.GetComment().isEmpty()); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetId(), "81704859182661FB"); - ASSERT_EQ(key.GetFingerprint(), "9490795B78F8AFE9F93BD09281704859182661FB"); - ASSERT_EQ(key.GetExpireTime(), + ASSERT_EQ(key.Name(), "GpgFrontendTest"); + ASSERT_TRUE(key.Comment().isEmpty()); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.ID(), "81704859182661FB"); + ASSERT_EQ(key.Fingerprint(), "9490795B78F8AFE9F93BD09281704859182661FB"); + ASSERT_EQ(key.ExpirationTime(), QDateTime::fromString("2023-09-05T04:00:00Z", Qt::ISODate)); - ASSERT_EQ(key.GetPublicKeyAlgo(), "RSA"); - ASSERT_EQ(key.GetKeyAlgo(), "RSA3072"); - ASSERT_EQ(key.GetPrimaryKeyLength(), 3072); - ASSERT_EQ(key.GetLastUpdateTime(), + ASSERT_EQ(key.PublicKeyAlgo(), "RSA"); + ASSERT_EQ(key.Algo(), "RSA3072"); + ASSERT_EQ(key.PrimaryKeyLength(), 3072); + ASSERT_EQ(key.LastUpdateTime(), QDateTime::fromString("1970-01-01T00:00:00Z", Qt::ISODate)); - ASSERT_EQ(key.GetCreateTime(), + ASSERT_EQ(key.CreationTime(), QDateTime::fromString("2021-09-05T06:01:53Z", Qt::ISODate)); - ASSERT_EQ(key.GetOwnerTrust(), "Unknown"); + ASSERT_EQ(key.OwnerTrust(), "Unknown"); ASSERT_EQ(key.IsExpired(), - key.GetExpireTime() < QDateTime::currentDateTime()); + key.ExpirationTime() < QDateTime::currentDateTime()); } TEST_F(GpgCoreTest, GpgSubKeyTest) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) .GetKey("9490795B78F8AFE9F93BD09281704859182661FB"); - auto sub_keys = key.GetSubKeys(); - ASSERT_EQ(sub_keys->size(), 2); + auto s_keys = key.SubKeys(); + ASSERT_EQ(s_keys.size(), 2); - auto& main_key = sub_keys->front(); + auto& p_key = s_keys.front(); - ASSERT_EQ(main_key.GetID(), "81704859182661FB"); - ASSERT_EQ(main_key.GetFingerprint(), - "9490795B78F8AFE9F93BD09281704859182661FB"); - ASSERT_EQ(main_key.GetExpireTime(), + ASSERT_EQ(p_key.ID(), "81704859182661FB"); + ASSERT_EQ(p_key.Fingerprint(), "9490795B78F8AFE9F93BD09281704859182661FB"); + ASSERT_EQ(p_key.ExpirationTime(), QDateTime::fromString("2023-09-05T04:00:00Z", Qt::ISODate)); - ASSERT_EQ(main_key.GetPubkeyAlgo(), "RSA"); - ASSERT_EQ(main_key.GetKeyAlgo(), "RSA3072"); - ASSERT_EQ(main_key.GetKeyLength(), 3072); - ASSERT_EQ(main_key.GetCreateTime(), + ASSERT_EQ(p_key.PublicKeyAlgo(), "RSA"); + ASSERT_EQ(p_key.Algo(), "RSA3072"); + ASSERT_EQ(p_key.KeyLength(), 3072); + ASSERT_EQ(p_key.CreationTime(), QDateTime::fromString("2021-09-05T06:01:53Z", Qt::ISODate)); - ASSERT_FALSE(main_key.IsCardKey()); + ASSERT_FALSE(p_key.IsCardKey()); - auto& sub_key = sub_keys->back(); + auto& s_key = s_keys.back(); - ASSERT_FALSE(sub_key.IsRevoked()); - ASSERT_FALSE(sub_key.IsDisabled()); - ASSERT_EQ(sub_key.GetCreateTime(), + ASSERT_FALSE(s_key.IsRevoked()); + ASSERT_FALSE(s_key.IsDisabled()); + ASSERT_EQ(s_key.CreationTime(), QDateTime::fromString("2021-09-05T06:01:53Z", Qt::ISODate)); - ASSERT_FALSE(sub_key.IsCardKey()); - ASSERT_TRUE(sub_key.IsPrivateKey()); - ASSERT_EQ(sub_key.GetID(), "2B36803235B5E25B"); - ASSERT_EQ(sub_key.GetFingerprint(), - "50D37E8F8EE7340A6794E0592B36803235B5E25B"); - ASSERT_EQ(sub_key.GetKeyLength(), 3072); - ASSERT_EQ(sub_key.GetKeyAlgo(), "RSA3072"); - ASSERT_EQ(sub_key.GetPubkeyAlgo(), "RSA"); - ASSERT_FALSE(sub_key.IsHasCertCap()); - ASSERT_FALSE(sub_key.IsHasAuthCap()); - ASSERT_FALSE(sub_key.IsHasSignCap()); - ASSERT_TRUE(sub_key.IsHasEncrCap()); - ASSERT_EQ(sub_key.GetExpireTime(), + ASSERT_FALSE(s_key.IsCardKey()); + ASSERT_TRUE(s_key.IsPrivateKey()); + ASSERT_EQ(s_key.ID(), "2B36803235B5E25B"); + ASSERT_EQ(s_key.Fingerprint(), "50D37E8F8EE7340A6794E0592B36803235B5E25B"); + ASSERT_EQ(s_key.KeyLength(), 3072); + ASSERT_EQ(s_key.Algo(), "RSA3072"); + ASSERT_EQ(s_key.PublicKeyAlgo(), "RSA"); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromString("2023-09-05T04:00:00Z", Qt::ISODate)); - ASSERT_EQ(sub_key.IsExpired(), - sub_key.GetExpireTime() < QDateTime::currentDateTime()); + ASSERT_EQ(s_key.IsExpired(), + s_key.ExpirationTime() < QDateTime::currentDateTime()); } TEST_F(GpgCoreTest, GpgUIDTest) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) .GetKey("9490795B78F8AFE9F93BD09281704859182661FB"); - auto uids = key.GetUIDs(); - ASSERT_EQ(uids->size(), 1); - auto& uid = uids->front(); + auto uids = key.UIDs(); + ASSERT_EQ(uids.size(), 1); + auto& uid = uids.front(); ASSERT_EQ(uid.GetName(), "GpgFrontendTest"); ASSERT_TRUE(uid.GetComment().isEmpty()); @@ -162,9 +160,9 @@ TEST_F(GpgCoreTest, GpgUIDTest) { TEST_F(GpgCoreTest, GpgKeySignatureTest) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) .GetKey("9490795B78F8AFE9F93BD09281704859182661FB"); - auto uids = key.GetUIDs(); - ASSERT_EQ(uids->size(), 1); - auto& uid = uids->front(); + auto uids = key.UIDs(); + ASSERT_EQ(uids.size(), 1); + auto& uid = uids.front(); auto signatures = uid.GetSignatures(); ASSERT_EQ(signatures->size(), 1); diff --git a/src/test/core/GpgCoreTestKeyOpera.cpp b/src/test/core/GpgCoreTestKeyOpera.cpp index 6f1f41d5..84aa29f9 100644 --- a/src/test/core/GpgCoreTestKeyOpera.cpp +++ b/src/test/core/GpgCoreTestKeyOpera.cpp @@ -28,9 +28,9 @@ #include "GpgCoreTest.h" #include "core/GpgConstants.h" +#include "core/function/gpg/GpgKeyImportExporter.h" #include "core/function/gpg/GpgKeyOpera.h" #include "core/model/GpgGenerateKeyResult.h" -#include "core/function/gpg/GpgKeyImportExporter.h" #include "core/model/GpgImportInformation.h" #include "core/utils/GpgUtils.h" @@ -88,10 +88,11 @@ TEST_F(GpgCoreTest, CoreAddADSKTestA) { ASSERT_TRUE(key_b.IsPrivateKey()); ASSERT_TRUE(key_b.IsHasMasterKey()); - auto key_b_subkeys = key_b.GetSubKeys(); - ASSERT_EQ(key_b_subkeys->size(), 2); + auto key_b_s_keys = key_b.SubKeys(); + ASSERT_EQ(key_b_s_keys.size(), 2); - auto [err, data_object] = GpgKeyOpera::GetInstance().AddADSKSync(key, key_b_subkeys->last()); + auto [err, data_object] = + GpgKeyOpera::GetInstance().AddADSKSync(key, key_b_s_keys.last()); ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); ASSERT_EQ(data_object->GetObjectSize(), 1); @@ -107,11 +108,11 @@ TEST_F(GpgCoreTest, CoreAddADSKTestA) { ASSERT_TRUE(key.IsPrivateKey()); ASSERT_TRUE(key.IsHasMasterKey()); - auto key_subkeys = key.GetSubKeys(); - ASSERT_EQ(key_subkeys->size(), 2); - ASSERT_EQ(key_subkeys->last().GetID(), "F89C95A05088CC93"); - ASSERT_EQ(key_subkeys->last().IsADSK(), true); + auto s_keys = key.SubKeys(); + ASSERT_EQ(s_keys.size(), 2); + ASSERT_EQ(s_keys.last().ID(), "F89C95A05088CC93"); + ASSERT_EQ(s_keys.last().IsADSK(), true); - GpgKeyOpera::GetInstance().DeleteKey(key.GetId()); + GpgKeyOpera::GetInstance().DeleteKey(key.ID()); } -};
\ No newline at end of file +}; // namespace GpgFrontend::Test
\ No newline at end of file diff --git a/src/test/core/GpgCoreTestKeyUIDOpera.cpp b/src/test/core/GpgCoreTestKeyUIDOpera.cpp index b4177dea..7b141670 100644 --- a/src/test/core/GpgCoreTestKeyUIDOpera.cpp +++ b/src/test/core/GpgCoreTestKeyUIDOpera.cpp @@ -73,10 +73,10 @@ TEST_F(GpgCoreTest, CoreDeleteUIDTestA) { .GetKey("F2D8DFA5F109DE47"); ASSERT_TRUE(key.IsGood()); - auto uids = key.GetUIDs(); + auto uids = key.UIDs(); - ASSERT_EQ(uids->size(), 4); - ASSERT_EQ((*uids)[2].GetUID(), "gggggg(ggggg)<[email protected]>"); + ASSERT_EQ(uids.size(), 4); + ASSERT_EQ(uids[2].GetUID(), "gggggg(ggggg)<[email protected]>"); auto res = GpgUIDOperator::GetInstance().DeleteUID(key, 3); @@ -87,12 +87,12 @@ TEST_F(GpgCoreTest, CoreDeleteUIDTestA) { .GetKey("F2D8DFA5F109DE47"); ASSERT_TRUE(key.IsGood()); - uids = key.GetUIDs(); + uids = key.UIDs(); - ASSERT_EQ(uids->size(), 3); - ASSERT_EQ((*uids)[2].GetUID(), "hhhhhh(hhhhhhh)<[email protected]>"); + ASSERT_EQ(uids.size(), 3); + ASSERT_EQ(uids[2].GetUID(), "hhhhhh(hhhhhhh)<[email protected]>"); - GpgKeyOpera::GetInstance().DeleteKey(key.GetId()); + GpgKeyOpera::GetInstance().DeleteKey(key.ID()); GpgKeyGetter::GetInstance().FlushKeyCache(); } @@ -108,10 +108,10 @@ TEST_F(GpgCoreTest, CoreRevokeUIDTestA) { .GetKey("F2D8DFA5F109DE47"); ASSERT_TRUE(key.IsGood()); - auto uids = key.GetUIDs(); + auto uids = key.UIDs(); - ASSERT_EQ(uids->size(), 4); - ASSERT_EQ((*uids)[2].GetUID(), "gggggg(ggggg)<[email protected]>"); + ASSERT_EQ(uids.size(), 4); + ASSERT_EQ(uids[2].GetUID(), "gggggg(ggggg)<[email protected]>"); auto res = GpgUIDOperator::GetInstance().RevokeUID( key, 3, 4, "H\nEEEEEL\n\n\n\nL \n0\n"); @@ -123,13 +123,13 @@ TEST_F(GpgCoreTest, CoreRevokeUIDTestA) { .GetKey("F2D8DFA5F109DE47"); ASSERT_TRUE(key.IsGood()); - uids = key.GetUIDs(); + uids = key.UIDs(); - ASSERT_EQ(uids->size(), 4); - ASSERT_EQ((*uids)[2].GetUID(), "gggggg(ggggg)<[email protected]>"); - ASSERT_TRUE((*uids)[2].GetRevoked()); + ASSERT_EQ(uids.size(), 4); + ASSERT_EQ(uids[2].GetUID(), "gggggg(ggggg)<[email protected]>"); + ASSERT_TRUE(uids[2].GetRevoked()); - GpgKeyOpera::GetInstance().DeleteKey(key.GetId()); + GpgKeyOpera::GetInstance().DeleteKey(key.ID()); GpgKeyGetter::GetInstance().FlushKeyCache(); } diff --git a/src/test/core/GpgCoreTestKeygen.cpp b/src/test/core/GpgCoreTestKeygen.cpp index a6c28219..a8ad7005 100644 --- a/src/test/core/GpgCoreTestKeygen.cpp +++ b/src/test/core/GpgCoreTestKeygen.cpp @@ -84,13 +84,13 @@ TEST_F(GpgCoreTest, GenerateKeyRSA2048Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetName(), "foo_0"); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetComment(), "foobar"); - ASSERT_EQ(key.GetPublicKeyAlgo(), "RSA"); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); - ASSERT_EQ(key.GetPrimaryKeyLength(), 2048); - ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(key.Name(), "foo_0"); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.Comment(), "foobar"); + ASSERT_EQ(key.PublicKeyAlgo(), "RSA"); + ASSERT_EQ(key.OwnerTrustLevel(), 5); + ASSERT_EQ(key.PrimaryKeyLength(), 2048); + ASSERT_EQ(key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_TRUE(key.IsHasAuthCap()); @@ -139,7 +139,7 @@ TEST_F(GpgCoreTest, GenerateKeyRSA4096Test) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetExpireTime().date(), expire_time.date()); + ASSERT_EQ(key.ExpirationTime().date(), expire_time.date()); GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) .DeleteKey(result.GetFingerprint()); @@ -177,13 +177,13 @@ TEST_F(GpgCoreTest, GenerateKeyDSA2048Test) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetName(), "foo_1"); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetComment(), "hello gpgfrontend"); - ASSERT_EQ(key.GetPublicKeyAlgo(), "DSA"); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); - ASSERT_EQ(key.GetPrimaryKeyLength(), 2048); - ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime()); + ASSERT_EQ(key.Name(), "foo_1"); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.Comment(), "hello gpgfrontend"); + ASSERT_EQ(key.PublicKeyAlgo(), "DSA"); + ASSERT_EQ(key.OwnerTrustLevel(), 5); + ASSERT_EQ(key.PrimaryKeyLength(), 2048); + ASSERT_GT(key.ExpirationTime(), QDateTime::currentDateTime()); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_TRUE(key.IsHasAuthCap()); @@ -231,13 +231,13 @@ TEST_F(GpgCoreTest, GenerateKeyED25519Test) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetName(), "foo_4"); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetComment(), "hello gpgfrontend"); - ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA"); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); - ASSERT_EQ(key.GetPrimaryKeyLength(), 255); - ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime()); + ASSERT_EQ(key.Name(), "foo_4"); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.Comment(), "hello gpgfrontend"); + ASSERT_EQ(key.PublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(key.OwnerTrustLevel(), 5); + ASSERT_EQ(key.PrimaryKeyLength(), 255); + ASSERT_GT(key.ExpirationTime(), QDateTime::currentDateTime()); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_TRUE(key.IsHasAuthCap()); @@ -291,34 +291,34 @@ TEST_F(GpgCoreTest, GenerateKeyED25519CV25519Test) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetName(), "foo_ec"); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetComment(), "ecccc"); - ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA"); - ASSERT_EQ(key.GetKeyAlgo(), "ED25519"); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); - ASSERT_EQ(key.GetPrimaryKeyLength(), 255); - ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(key.Name(), "foo_ec"); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.Comment(), "ecccc"); + ASSERT_EQ(key.PublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(key.Algo(), "ED25519"); + ASSERT_EQ(key.OwnerTrustLevel(), 5); + ASSERT_EQ(key.PrimaryKeyLength(), 255); + ASSERT_EQ(key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_TRUE(key.IsHasAuthCap()); ASSERT_TRUE(key.IsHasEncrCap()); ASSERT_TRUE(key.IsHasSignCap()); - ASSERT_FALSE(key.GetSubKeys()->empty()); - ASSERT_EQ(key.GetSubKeys()->size(), 2); + ASSERT_FALSE(key.SubKeys().empty()); + ASSERT_EQ(key.SubKeys().size(), 2); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); - ASSERT_EQ(subkey.GetKeyAlgo(), "CV25519"); - ASSERT_EQ(subkey.GetKeyLength(), 255); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); + ASSERT_EQ(s_key.PublicKeyAlgo(), "ECDH"); + ASSERT_EQ(s_key.Algo(), "CV25519"); + ASSERT_EQ(s_key.KeyLength(), 255); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_FALSE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_FALSE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); ASSERT_TRUE(key.IsHasActualCertCap()); ASSERT_TRUE(key.IsHasActualAuthCap()); @@ -366,34 +366,34 @@ TEST_F(GpgCoreTest, GenerateKeyED25519NISTP256Test) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetName(), "foo_ec2"); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetComment(), "ecccc"); - ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA"); - ASSERT_EQ(key.GetKeyAlgo(), "ED25519"); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); - ASSERT_EQ(key.GetPrimaryKeyLength(), 255); - ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(key.Name(), "foo_ec2"); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.Comment(), "ecccc"); + ASSERT_EQ(key.PublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(key.Algo(), "ED25519"); + ASSERT_EQ(key.OwnerTrustLevel(), 5); + ASSERT_EQ(key.PrimaryKeyLength(), 255); + ASSERT_EQ(key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_TRUE(key.IsHasAuthCap()); ASSERT_TRUE(key.IsHasEncrCap()); ASSERT_TRUE(key.IsHasSignCap()); - ASSERT_FALSE(key.GetSubKeys()->empty()); - ASSERT_EQ(key.GetSubKeys()->size(), 2); + ASSERT_FALSE(key.SubKeys().empty()); + ASSERT_EQ(key.SubKeys().size(), 2); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); - ASSERT_EQ(subkey.GetKeyAlgo(), "NISTP256"); - ASSERT_EQ(subkey.GetKeyLength(), 256); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); + ASSERT_EQ(s_key.PublicKeyAlgo(), "ECDH"); + ASSERT_EQ(s_key.Algo(), "NISTP256"); + ASSERT_EQ(s_key.KeyLength(), 256); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_FALSE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_FALSE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); ASSERT_TRUE(key.IsHasActualCertCap()); ASSERT_TRUE(key.IsHasActualAuthCap()); @@ -441,34 +441,34 @@ TEST_F(GpgCoreTest, GenerateKeyED25519BRAINPOOLP256R1Test) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetName(), "foo_ec3"); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetComment(), "ecccc3"); - ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA"); - ASSERT_EQ(key.GetKeyAlgo(), "ED25519"); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); - ASSERT_EQ(key.GetPrimaryKeyLength(), 255); - ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(key.Name(), "foo_ec3"); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.Comment(), "ecccc3"); + ASSERT_EQ(key.PublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(key.Algo(), "ED25519"); + ASSERT_EQ(key.OwnerTrustLevel(), 5); + ASSERT_EQ(key.PrimaryKeyLength(), 255); + ASSERT_EQ(key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_TRUE(key.IsHasAuthCap()); ASSERT_TRUE(key.IsHasEncrCap()); ASSERT_TRUE(key.IsHasSignCap()); - ASSERT_FALSE(key.GetSubKeys()->empty()); - ASSERT_EQ(key.GetSubKeys()->size(), 2); + ASSERT_FALSE(key.SubKeys().empty()); + ASSERT_EQ(key.SubKeys().size(), 2); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); - ASSERT_EQ(subkey.GetKeyAlgo(), "BRAINPOOLP256R1"); - ASSERT_EQ(subkey.GetKeyLength(), 256); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); + ASSERT_EQ(s_key.PublicKeyAlgo(), "ECDH"); + ASSERT_EQ(s_key.Algo(), "BRAINPOOLP256R1"); + ASSERT_EQ(s_key.KeyLength(), 256); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_FALSE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_FALSE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); ASSERT_TRUE(key.IsHasActualCertCap()); ASSERT_TRUE(key.IsHasActualAuthCap()); @@ -510,14 +510,14 @@ TEST_F(GpgCoreTest, GenerateKeyNISTP256Test) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetName(), "foo_4"); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetComment(), "hello gpgfrontend"); - ASSERT_EQ(key.GetPublicKeyAlgo(), "ECDSA"); - ASSERT_EQ(key.GetKeyAlgo(), "NISTP256"); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); - ASSERT_EQ(key.GetPrimaryKeyLength(), 256); - ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime()); + ASSERT_EQ(key.Name(), "foo_4"); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.Comment(), "hello gpgfrontend"); + ASSERT_EQ(key.PublicKeyAlgo(), "ECDSA"); + ASSERT_EQ(key.Algo(), "NISTP256"); + ASSERT_EQ(key.OwnerTrustLevel(), 5); + ASSERT_EQ(key.PrimaryKeyLength(), 256); + ASSERT_GT(key.ExpirationTime(), QDateTime::currentDateTime()); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_TRUE(key.IsHasAuthCap()); @@ -565,14 +565,14 @@ TEST_F(GpgCoreTest, GenerateKeyED448Test) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetName(), "foo_4"); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetComment(), "hello gpgfrontend"); - ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA"); - ASSERT_EQ(key.GetKeyAlgo(), "ED448"); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); - ASSERT_EQ(key.GetPrimaryKeyLength(), 448); - ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime()); + ASSERT_EQ(key.Name(), "foo_4"); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.Comment(), "hello gpgfrontend"); + ASSERT_EQ(key.PublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(key.Algo(), "ED448"); + ASSERT_EQ(key.OwnerTrustLevel(), 5); + ASSERT_EQ(key.PrimaryKeyLength(), 448); + ASSERT_GT(key.ExpirationTime(), QDateTime::currentDateTime()); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_TRUE(key.IsHasAuthCap()); @@ -620,14 +620,14 @@ TEST_F(GpgCoreTest, GenerateKeySECP256K1Test) { auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - ASSERT_EQ(key.GetName(), "foo_4"); - ASSERT_EQ(key.GetEmail(), "[email protected]"); - ASSERT_EQ(key.GetComment(), "hello gpgfrontend"); - ASSERT_EQ(key.GetPublicKeyAlgo(), "ECDSA"); - ASSERT_EQ(key.GetKeyAlgo(), "SECP256K1"); - ASSERT_EQ(key.GetOwnerTrustLevel(), 5); - ASSERT_EQ(key.GetPrimaryKeyLength(), 256); - ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime()); + ASSERT_EQ(key.Name(), "foo_4"); + ASSERT_EQ(key.Email(), "[email protected]"); + ASSERT_EQ(key.Comment(), "hello gpgfrontend"); + ASSERT_EQ(key.PublicKeyAlgo(), "ECDSA"); + ASSERT_EQ(key.Algo(), "SECP256K1"); + ASSERT_EQ(key.OwnerTrustLevel(), 5); + ASSERT_EQ(key.PrimaryKeyLength(), 256); + ASSERT_GT(key.ExpirationTime(), QDateTime::currentDateTime()); ASSERT_TRUE(key.IsHasCertCap()); ASSERT_TRUE(key.IsHasAuthCap()); diff --git a/src/test/core/GpgCoreTestSubkeygen.cpp b/src/test/core/GpgCoreTestSubkeygen.cpp index bbaa2be0..09c47903 100644 --- a/src/test/core/GpgCoreTestSubkeygen.cpp +++ b/src/test/core/GpgCoreTestSubkeygen.cpp @@ -66,18 +66,18 @@ TEST_F(GpgCoreTest, GenerateSubkeyRSA2048Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); - - ASSERT_EQ(subkey.GetPubkeyAlgo(), "RSA"); - ASSERT_EQ(subkey.GetKeyAlgo(), "RSA2048"); - ASSERT_EQ(subkey.GetKeyLength(), 2048); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); - - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_TRUE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_TRUE(subkey.IsHasSignCap()); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); + + ASSERT_EQ(s_key.PublicKeyAlgo(), "RSA"); + ASSERT_EQ(s_key.Algo(), "RSA2048"); + ASSERT_EQ(s_key.KeyLength(), 2048); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_TRUE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_TRUE(s_key.IsHasSignCap()); } TEST_F(GpgCoreTest, GenerateSubkeyDSA2048Test) { @@ -109,18 +109,18 @@ TEST_F(GpgCoreTest, GenerateSubkeyDSA2048Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), "DSA"); - ASSERT_EQ(subkey.GetKeyAlgo(), "DSA2048"); - ASSERT_EQ(subkey.GetKeyLength(), 2048); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(s_key.PublicKeyAlgo(), "DSA"); + ASSERT_EQ(s_key.Algo(), "DSA2048"); + ASSERT_EQ(s_key.KeyLength(), 2048); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_TRUE(subkey.IsHasAuthCap()); - ASSERT_FALSE(subkey.IsHasEncrCap()); - ASSERT_TRUE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_TRUE(s_key.IsHasAuthCap()); + ASSERT_FALSE(s_key.IsHasEncrCap()); + ASSERT_TRUE(s_key.IsHasSignCap()); } TEST_F(GpgCoreTest, GenerateSubkeyELG2048Test) { @@ -152,18 +152,18 @@ TEST_F(GpgCoreTest, GenerateSubkeyELG2048Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), "ELG-E"); - ASSERT_EQ(subkey.GetKeyAlgo(), "ELG2048"); - ASSERT_EQ(subkey.GetKeyLength(), 2048); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(s_key.PublicKeyAlgo(), "ELG-E"); + ASSERT_EQ(s_key.Algo(), "ELG2048"); + ASSERT_EQ(s_key.KeyLength(), 2048); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_FALSE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_FALSE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); } TEST_F(GpgCoreTest, GenerateSubkeyED25519Test) { @@ -195,18 +195,18 @@ TEST_F(GpgCoreTest, GenerateSubkeyED25519Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), "EdDSA"); - ASSERT_EQ(subkey.GetKeyAlgo(), "ED25519"); - ASSERT_EQ(subkey.GetKeyLength(), 255); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(s_key.PublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(s_key.Algo(), "ED25519"); + ASSERT_EQ(s_key.KeyLength(), 255); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_TRUE(subkey.IsHasAuthCap()); - ASSERT_FALSE(subkey.IsHasEncrCap()); - ASSERT_TRUE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_TRUE(s_key.IsHasAuthCap()); + ASSERT_FALSE(s_key.IsHasEncrCap()); + ASSERT_TRUE(s_key.IsHasSignCap()); } TEST_F(GpgCoreTest, GenerateSubkeyCV25519Test) { @@ -238,18 +238,18 @@ TEST_F(GpgCoreTest, GenerateSubkeyCV25519Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), QString("ECDH")); - ASSERT_EQ(subkey.GetKeyAlgo(), QString("CV25519")); - ASSERT_EQ(subkey.GetKeyLength(), 255); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(s_key.PublicKeyAlgo(), QString("ECDH")); + ASSERT_EQ(s_key.Algo(), QString("CV25519")); + ASSERT_EQ(s_key.KeyLength(), 255); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_FALSE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_FALSE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); } TEST_F(GpgCoreTest, GenerateSubkeyNISTP256Test) { @@ -280,18 +280,18 @@ TEST_F(GpgCoreTest, GenerateSubkeyNISTP256Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), QString("ECDH")); - ASSERT_EQ(subkey.GetKeyAlgo(), QString("NISTP256")); - ASSERT_EQ(subkey.GetKeyLength(), 256); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(s_key.PublicKeyAlgo(), QString("ECDH")); + ASSERT_EQ(s_key.Algo(), QString("NISTP256")); + ASSERT_EQ(s_key.KeyLength(), 256); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_FALSE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_FALSE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); } TEST_F(GpgCoreTest, GenerateSubkeyBRAINPOOLP256R1Test) { @@ -322,18 +322,18 @@ TEST_F(GpgCoreTest, GenerateSubkeyBRAINPOOLP256R1Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), QString("ECDH")); - ASSERT_EQ(subkey.GetKeyAlgo(), QString("BRAINPOOLP256R1")); - ASSERT_EQ(subkey.GetKeyLength(), 256); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(s_key.PublicKeyAlgo(), QString("ECDH")); + ASSERT_EQ(s_key.Algo(), QString("BRAINPOOLP256R1")); + ASSERT_EQ(s_key.KeyLength(), 256); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_FALSE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_FALSE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); } TEST_F(GpgCoreTest, GenerateSubkeyX448Test) { @@ -364,18 +364,18 @@ TEST_F(GpgCoreTest, GenerateSubkeyX448Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), QString("ECDH")); - ASSERT_EQ(subkey.GetKeyAlgo(), QString("CV448")); - ASSERT_EQ(subkey.GetKeyLength(), 448); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(s_key.PublicKeyAlgo(), QString("ECDH")); + ASSERT_EQ(s_key.Algo(), QString("CV448")); + ASSERT_EQ(s_key.KeyLength(), 448); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_FALSE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_FALSE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); } TEST_F(GpgCoreTest, GenerateSubkeySECP256K1Test) { @@ -406,18 +406,18 @@ TEST_F(GpgCoreTest, GenerateSubkeySECP256K1Test) { .GetKey(result.GetFingerprint()); ASSERT_TRUE(key.IsGood()); - auto subkeys = key.GetSubKeys(); - auto& subkey = subkeys->back(); + auto s_keys = key.SubKeys(); + auto& s_key = s_keys.back(); - ASSERT_EQ(subkey.GetPubkeyAlgo(), QString("ECDH")); - ASSERT_EQ(subkey.GetKeyAlgo(), QString("SECP256K1")); - ASSERT_EQ(subkey.GetKeyLength(), 256); - ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + ASSERT_EQ(s_key.PublicKeyAlgo(), QString("ECDH")); + ASSERT_EQ(s_key.Algo(), QString("SECP256K1")); + ASSERT_EQ(s_key.KeyLength(), 256); + ASSERT_EQ(s_key.ExpirationTime(), QDateTime::fromMSecsSinceEpoch(0)); - ASSERT_FALSE(subkey.IsHasCertCap()); - ASSERT_FALSE(subkey.IsHasAuthCap()); - ASSERT_TRUE(subkey.IsHasEncrCap()); - ASSERT_FALSE(subkey.IsHasSignCap()); + ASSERT_FALSE(s_key.IsHasCertCap()); + ASSERT_FALSE(s_key.IsHasAuthCap()); + ASSERT_TRUE(s_key.IsHasEncrCap()); + ASSERT_FALSE(s_key.IsHasSignCap()); } } // namespace GpgFrontend::Test
\ No newline at end of file |