diff options
author | saturneric <[email protected]> | 2024-01-18 12:58:37 +0000 |
---|---|---|
committer | saturneric <[email protected]> | 2024-01-18 12:58:37 +0000 |
commit | e0d2c4021483e6e1366c1050ccb5a30e53e172bb (patch) | |
tree | 5d85739479622e7c672aea45f84d4e2f577f9332 /src/test | |
parent | fix: correct a fault (diff) | |
download | GpgFrontend-e0d2c4021483e6e1366c1050ccb5a30e53e172bb.tar.gz GpgFrontend-e0d2c4021483e6e1366c1050ccb5a30e53e172bb.zip |
fix: add test cases and solve discovered issues
Diffstat (limited to 'src/test')
-rw-r--r-- | src/test/core/GpgCoreTest.h | 2 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestBasicOpera.cpp | 406 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestDirectoryBasicOpera.cpp | 29 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestFileBasicOpera.cpp | 386 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestImportExport.cpp | 1 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestKeyModel.cpp | 29 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestKeygen.cpp | 536 | ||||
-rw-r--r-- | src/test/core/GpgCoreTestSubkeygen.cpp | 298 |
8 files changed, 1137 insertions, 550 deletions
diff --git a/src/test/core/GpgCoreTest.h b/src/test/core/GpgCoreTest.h index 26097f2c..9b18ebf6 100644 --- a/src/test/core/GpgCoreTest.h +++ b/src/test/core/GpgCoreTest.h @@ -30,6 +30,8 @@ #include <gtest/gtest.h> +#include "GpgFrontendTest.h" + namespace GpgFrontend::Test { class GpgCoreTest : public ::testing::Test { diff --git a/src/test/core/GpgCoreTestBasicOpera.cpp b/src/test/core/GpgCoreTestBasicOpera.cpp index 238c9530..da539ad6 100644 --- a/src/test/core/GpgCoreTestBasicOpera.cpp +++ b/src/test/core/GpgCoreTestBasicOpera.cpp @@ -28,7 +28,6 @@ #include "GpgCoreTest.h" #include "core/GpgModel.h" -#include "core/function/basic/ChannelObject.h" #include "core/function/gpg/GpgBasicOperator.h" #include "core/function/gpg/GpgKeyGetter.h" #include "core/function/result_analyse/GpgDecryptResultAnalyse.h" @@ -41,85 +40,59 @@ namespace GpgFrontend::Test { TEST_F(GpgCoreTest, CoreEncryptDecrTest) { - std::atomic_bool callback_called_flag{false}; - auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + + auto [err, data_object] = + GpgBasicOperator::GetInstance().EncryptSync({encrypt_key}, buffer, true); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult, GFBuffer>())); + + auto result = ExtractParams<GpgEncryptResult>(data_object, 0); + auto encr_out_buffer = ExtractParams<GFBuffer>(data_object, 1); + + ASSERT_TRUE(result.InvalidRecipients().empty()); - GpgBasicOperator::GetInstance().Encrypt( - {encrypt_key}, GFBuffer(QString("Hello GpgFrontend!")), true, - [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgEncryptResult, GFBuffer>())); - auto result = ExtractParams<GpgEncryptResult>(data_obj, 0); - auto encr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1); - ASSERT_TRUE(result.InvalidRecipients().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - GpgBasicOperator::GetInstance().Decrypt( - encr_out_buffer, [&callback_called_flag]( - GpgError err, const DataObjectPtr& data_obj) { - auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0); - auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_FALSE(d_result.Recipients().empty()); - ASSERT_EQ(d_result.Recipients()[0].keyid, "6A2764F8298DEB29"); - - ASSERT_EQ(decr_out_buffer, - GFBuffer(QString("Hello GpgFrontend!"))); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err_0, data_object_0] = + GpgBasicOperator::GetInstance().DecryptSync(encr_out_buffer); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GFBuffer>())); + + auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + auto decr_out_buffer = ExtractParams<GFBuffer>(data_object_0, 1); + + ASSERT_FALSE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29"); + ASSERT_EQ(decr_out_buffer, buffer); } TEST_F(GpgCoreTest, CoreEncryptSymmetricDecrTest) { - std::atomic_bool callback_called_flag{false}; - auto encrypt_text = GFBuffer(QString("Hello GpgFrontend!")); + auto [err, data_object] = + GpgBasicOperator::GetInstance().EncryptSymmetricSync(encrypt_text, true); - GpgBasicOperator::GetInstance().EncryptSymmetric( - encrypt_text, true, - [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgEncryptResult, GFBuffer>())); - auto result = ExtractParams<GpgEncryptResult>(data_obj, 0); - auto encr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1); - ASSERT_TRUE(result.InvalidRecipients().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - GpgBasicOperator::GetInstance().Decrypt( - encr_out_buffer, [&callback_called_flag]( - GpgError err, const DataObjectPtr& data_obj) { - auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0); - auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_TRUE(d_result.Recipients().empty()); - ASSERT_EQ(decr_out_buffer, - GFBuffer(QString("Hello GpgFrontend!"))); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult, GFBuffer>())); + auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0); + auto encr_out_buffer = ExtractParams<GFBuffer>(data_object, 1); + ASSERT_TRUE(encr_result.InvalidRecipients().empty()); + + auto [err_0, data_object_0] = + GpgBasicOperator::GetInstance().DecryptSync(encr_out_buffer); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GFBuffer>())); + auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + auto decr_out_buffer = ExtractParams<GFBuffer>(data_object_0, 1); + + ASSERT_TRUE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_out_buffer, encrypt_text); } TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_1) { - std::atomic_bool callback_called_flag{false}; - auto encr_out_data = GFBuffer(QString( "-----BEGIN PGP MESSAGE-----\n" "\n" @@ -133,30 +106,18 @@ TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_1) { "=8n2H\n" "-----END PGP MESSAGE-----")); - GpgBasicOperator::GetInstance().Decrypt( - encr_out_data, - [=, &callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { - auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0); - auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_SECKEY); - ASSERT_FALSE(d_result.Recipients().empty()); - ASSERT_EQ(d_result.Recipients()[0].keyid, "A50CFD2F6C677D8C"); - - // stop waiting - callback_called_flag = true; - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = + GpgBasicOperator::GetInstance().DecryptSync(encr_out_data); + + auto decr_result = ExtractParams<GpgDecryptResult>(data_object, 0); + auto decr_out_buffer = ExtractParams<GFBuffer>(data_object, 1); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_SECKEY); + + ASSERT_FALSE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_result.Recipients()[0].keyid, "A50CFD2F6C677D8C"); } TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_ResultAnalyse) { - std::atomic_bool callback_called_flag{false}; - auto encr_out_data = GFBuffer(QString( "-----BEGIN PGP MESSAGE-----\n" "\n" @@ -170,152 +131,99 @@ TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_ResultAnalyse) { "=8n2H\n" "-----END PGP MESSAGE-----")); - GpgBasicOperator::GetInstance().Decrypt( - encr_out_data, - [=, &callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { - auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0); - auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_SECKEY); - ASSERT_FALSE(d_result.Recipients().empty()); - ASSERT_EQ(d_result.Recipients()[0].keyid, "A50CFD2F6C677D8C"); - - GpgDecryptResultAnalyse analyse{err, d_result}; - analyse.Analyse(); - ASSERT_EQ(analyse.GetStatus(), -1); - ASSERT_FALSE(analyse.GetResultReport().isEmpty()); - - // stop waiting - callback_called_flag = true; - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = + GpgBasicOperator::GetInstance().DecryptSync(encr_out_data); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_SECKEY); + ASSERT_TRUE((data_object->Check<GpgDecryptResult, GFBuffer>())); + + auto decr_result = ExtractParams<GpgDecryptResult>(data_object, 0); + auto decr_out_buffer = ExtractParams<GFBuffer>(data_object, 1); + + ASSERT_FALSE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_result.Recipients()[0].keyid, "A50CFD2F6C677D8C"); + + GpgDecryptResultAnalyse analyse{err, decr_result}; + analyse.Analyse(); + ASSERT_EQ(analyse.GetStatus(), -1); + ASSERT_FALSE(analyse.GetResultReport().isEmpty()); } TEST_F(GpgCoreTest, CoreSignVerifyNormalTest) { - std::atomic_bool callback_called_flag{false}; - auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); auto sign_text = GFBuffer(QString("Hello GpgFrontend!")); - GpgBasicOperator::GetInstance().Sign( - {sign_key}, sign_text, GPGME_SIG_MODE_NORMAL, true, - [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgSignResult, GFBuffer>())); - auto result = ExtractParams<GpgSignResult>(data_obj, 0); - auto sign_out_buffer = ExtractParams<GFBuffer>(data_obj, 1); - ASSERT_TRUE(result.InvalidSigners().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - GpgBasicOperator::GetInstance().Verify( - sign_out_buffer, GFBuffer(), - [&callback_called_flag](GpgError err, - const DataObjectPtr& data_obj) { - auto d_result = ExtractParams<GpgVerifyResult>(data_obj, 0); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_FALSE(d_result.GetSignature().empty()); - ASSERT_EQ(d_result.GetSignature().at(0).GetFingerprint(), - "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgBasicOperator::GetInstance().SignSync( + {sign_key}, sign_text, GPGME_SIG_MODE_NORMAL, true); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgSignResult, GFBuffer>())); + auto result = ExtractParams<GpgSignResult>(data_object, 0); + auto sign_out_buffer = ExtractParams<GFBuffer>(data_object, 1); + ASSERT_TRUE(result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgBasicOperator::GetInstance().VerifySync(sign_out_buffer, GFBuffer()); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>())); + auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0); + ASSERT_FALSE(verify_result.GetSignature().empty()); + ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); } TEST_F(GpgCoreTest, CoreSignVerifyDetachTest) { - std::atomic_bool callback_called_flag{false}; - auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); auto sign_text = GFBuffer(QString("Hello GpgFrontend!")); - GpgBasicOperator::GetInstance().Sign( - {sign_key}, sign_text, GPGME_SIG_MODE_DETACH, true, - [=, &callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgSignResult, GFBuffer>())); - auto result = ExtractParams<GpgSignResult>(data_obj, 0); - auto sign_out_buffer = ExtractParams<GFBuffer>(data_obj, 1); - ASSERT_TRUE(result.InvalidSigners().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - GpgBasicOperator::GetInstance().Verify( - sign_text, sign_out_buffer, - [&callback_called_flag](GpgError err, - const DataObjectPtr& data_obj) { - auto d_result = ExtractParams<GpgVerifyResult>(data_obj, 0); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_FALSE(d_result.GetSignature().empty()); - ASSERT_EQ(d_result.GetSignature().at(0).GetFingerprint(), - "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgBasicOperator::GetInstance().SignSync( + {sign_key}, sign_text, GPGME_SIG_MODE_DETACH, true); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgSignResult, GFBuffer>())); + auto result = ExtractParams<GpgSignResult>(data_object, 0); + auto sign_out_buffer = ExtractParams<GFBuffer>(data_object, 1); + ASSERT_TRUE(result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgBasicOperator::GetInstance().VerifySync(sign_text, sign_out_buffer); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>())); + auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0); + ASSERT_FALSE(verify_result.GetSignature().empty()); + ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); } TEST_F(GpgCoreTest, CoreSignVerifyClearTest) { - std::atomic_bool callback_called_flag{false}; - auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); auto sign_text = GFBuffer(QString("Hello GpgFrontend!")); - GpgBasicOperator::GetInstance().Sign( - {sign_key}, sign_text, GPGME_SIG_MODE_CLEAR, true, - [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgSignResult, GFBuffer>())); - auto result = ExtractParams<GpgSignResult>(data_obj, 0); - auto sign_out_buffer = ExtractParams<GFBuffer>(data_obj, 1); - ASSERT_TRUE(result.InvalidSigners().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - GpgBasicOperator::GetInstance().Verify( - sign_out_buffer, GFBuffer(), - [&callback_called_flag](GpgError err, - const DataObjectPtr& data_obj) { - auto verify_reult = ExtractParams<GpgVerifyResult>(data_obj, 0); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_FALSE(verify_reult.GetSignature().empty()); - ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), - "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgBasicOperator::GetInstance().SignSync( + {sign_key}, sign_text, GPGME_SIG_MODE_CLEAR, true); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgSignResult, GFBuffer>())); + auto result = ExtractParams<GpgSignResult>(data_object, 0); + auto sign_out_buffer = ExtractParams<GFBuffer>(data_object, 1); + ASSERT_TRUE(result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgBasicOperator::GetInstance().VerifySync(sign_out_buffer, GFBuffer()); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 0); + ASSERT_FALSE(verify_reult.GetSignature().empty()); + ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); } TEST_F(GpgCoreTest, CoreEncryptSignDecrVerifyTest) { - std::atomic_bool callback_called_flag{false}; - auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); auto sign_key = GpgKeyGetter::GetInstance().GetKey( @@ -325,52 +233,34 @@ TEST_F(GpgCoreTest, CoreEncryptSignDecrVerifyTest) { ASSERT_TRUE(sign_key.IsPrivateKey()); ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); - GpgBasicOperator::GetInstance().EncryptSign( - {encrypt_key}, {sign_key}, encrypt_text, true, - [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE( - (data_obj->Check<GpgEncryptResult, GpgSignResult, GFBuffer>())); - auto encr_result = ExtractParams<GpgEncryptResult>(data_obj, 0); - auto sign_result = ExtractParams<GpgSignResult>(data_obj, 1); - auto encr_out_buffer = ExtractParams<GFBuffer>(data_obj, 2); - ASSERT_TRUE(encr_result.InvalidRecipients().empty()); - ASSERT_TRUE(sign_result.InvalidSigners().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - GpgBasicOperator::GetInstance().DecryptVerify( - encr_out_buffer, [&callback_called_flag]( - GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE( - (data_obj - ->Check<GpgDecryptResult, GpgVerifyResult, GFBuffer>())); - auto decrypt_result = - ExtractParams<GpgDecryptResult>(data_obj, 0); - auto verify_reult = ExtractParams<GpgVerifyResult>(data_obj, 1); - auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 2); - - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - ASSERT_FALSE(decrypt_result.Recipients().empty()); - ASSERT_EQ(decr_out_buffer, - GFBuffer(QString("Hello GpgFrontend!"))); - - ASSERT_EQ(decrypt_result.Recipients()[0].keyid, - "F89C95A05088CC93"); - ASSERT_FALSE(verify_reult.GetSignature().empty()); - ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), - "8933EB283A18995F45D61DAC021D89771B680FFB"); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgBasicOperator::GetInstance().EncryptSignSync( + {encrypt_key}, {sign_key}, encrypt_text, true); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE( + (data_object->Check<GpgEncryptResult, GpgSignResult, GFBuffer>())); + auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0); + auto sign_result = ExtractParams<GpgSignResult>(data_object, 1); + auto encr_out_buffer = ExtractParams<GFBuffer>(data_object, 2); + ASSERT_TRUE(encr_result.InvalidRecipients().empty()); + ASSERT_TRUE(sign_result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgBasicOperator::GetInstance().DecryptVerifySync(encr_out_buffer); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE( + (data_object_0->Check<GpgDecryptResult, GpgVerifyResult, GFBuffer>())); + auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1); + auto decr_out_buffer = ExtractParams<GFBuffer>(data_object_0, 2); + + ASSERT_FALSE(decrypt_result.Recipients().empty()); + ASSERT_EQ(decr_out_buffer, encrypt_text); + ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93"); + ASSERT_FALSE(verify_reult.GetSignature().empty()); + ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), + "8933EB283A18995F45D61DAC021D89771B680FFB"); } } // namespace GpgFrontend::Test diff --git a/src/test/core/GpgCoreTestDirectoryBasicOpera.cpp b/src/test/core/GpgCoreTestDirectoryBasicOpera.cpp new file mode 100644 index 00000000..a2c7f285 --- /dev/null +++ b/src/test/core/GpgCoreTestDirectoryBasicOpera.cpp @@ -0,0 +1,29 @@ +/** + * Copyright (C) 2021 Saturneric <[email protected]> + * + * This file is part of GpgFrontend. + * + * GpgFrontend is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * GpgFrontend is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>. + * + * The initial version of the source code is inherited from + * the gpg4usb project, which is under GPL-3.0-or-later. + * + * All the source code of GpgFrontend was modified and released by + * Saturneric <[email protected]> starting on May 12, 2021. + * + * SPDX-License-Identifier: GPL-3.0-or-later + * + */ + +#include "GpgCoreTest.h" diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp index d5b0f52d..db338893 100644 --- a/src/test/core/GpgCoreTestFileBasicOpera.cpp +++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp @@ -28,11 +28,8 @@ #include "GpgCoreTest.h" #include "core/GpgModel.h" -#include "core/function/basic/ChannelObject.h" -#include "core/function/gpg/GpgBasicOperator.h" #include "core/function/gpg/GpgFileOpera.h" #include "core/function/gpg/GpgKeyGetter.h" -#include "core/function/result_analyse/GpgDecryptResultAnalyse.h" #include "core/model/GpgDecryptResult.h" #include "core/model/GpgEncryptResult.h" #include "core/model/GpgSignResult.h" @@ -43,197 +40,264 @@ namespace GpgFrontend::Test { TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { - std::atomic_bool callback_called_flag{false}; + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync( + {encrypt_key}, input_file, true, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult>())); + auto result = ExtractParams<GpgEncryptResult>(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_FALSE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptDecrBinaryTest) { auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); - auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); auto output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().EncryptFile( - {encrypt_key}, input_file, true, output_file, - [output_file, &callback_called_flag](GpgError err, - const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgEncryptResult>())); - - auto result = ExtractParams<GpgEncryptResult>(data_obj, 0); - ASSERT_TRUE(result.InvalidRecipients().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - auto decrpypt_output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().DecryptFile( - output_file, decrpypt_output_file, - [decrpypt_output_file, &callback_called_flag]( - GpgError err, const DataObjectPtr& data_obj) { - auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0); - - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_FALSE(d_result.Recipients().empty()); - ASSERT_EQ(d_result.Recipients()[0].keyid, "6A2764F8298DEB29"); - - const auto [read_success, buffer] = - ReadFileGFBuffer(decrpypt_output_file); - ASSERT_TRUE(read_success); - ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!"))); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync( + {encrypt_key}, input_file, false, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult>())); + auto result = ExtractParams<GpgEncryptResult>(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>())); + auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + ASSERT_FALSE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); } TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { - std::atomic_bool callback_called_flag{false}; + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); - auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto [err, data_object] = + GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, true, + output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult>())); + auto result = ExtractParams<GpgEncryptResult>(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>())); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + ASSERT_TRUE(decrypt_result.Recipients().empty()); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrBinaryTest) { + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); auto output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().EncryptFileSymmetric( - input_file, true, output_file, - [&callback_called_flag, output_file](GpgError err, - const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgEncryptResult>())); - auto result = ExtractParams<GpgEncryptResult>(data_obj, 0); - ASSERT_TRUE(result.InvalidRecipients().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - auto decrpypt_output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().DecryptFile( - output_file, decrpypt_output_file, - [&callback_called_flag, decrpypt_output_file]( - GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgDecryptResult>())); - - auto decrypt_result = - ExtractParams<GpgDecryptResult>(data_obj, 0); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_TRUE(decrypt_result.Recipients().empty()); - - const auto [read_success, buffer] = - ReadFileGFBuffer(decrpypt_output_file); - ASSERT_TRUE(read_success); - ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!"))); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = + GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, false, + output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgEncryptResult>())); + auto result = ExtractParams<GpgEncryptResult>(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>())); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + ASSERT_TRUE(decrypt_result.Recipients().empty()); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); } TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { - std::atomic_bool callback_called_flag{false}; + auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto output_file = GetTempFilePath(); + auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync( + {sign_key}, input_file, true, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgSignResult>())); + auto result = ExtractParams<GpgSignResult>(data_object, 0); + ASSERT_TRUE(result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>())); + auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0); + ASSERT_FALSE(verify_result.GetSignature().empty()); + ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); +} + +TEST_F(GpgCoreTest, CoreFileSignVerifyNormalBinaryTest) { auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); auto output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().SignFile( - {sign_key}, input_file, true, output_file, - [&callback_called_flag, input_file, output_file]( - GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgSignResult>())); - auto result = ExtractParams<GpgSignResult>(data_obj, 0); - ASSERT_TRUE(result.InvalidSigners().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - GpgFileOpera::GetInstance().VerifyFile( - input_file, output_file, - [&callback_called_flag](GpgError err, - const DataObjectPtr& data_obj) { - auto d_result = ExtractParams<GpgVerifyResult>(data_obj, 0); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_FALSE(d_result.GetSignature().empty()); - ASSERT_EQ(d_result.GetSignature().at(0).GetFingerprint(), - "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync( + {sign_key}, input_file, false, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check<GpgSignResult>())); + auto result = ExtractParams<GpgSignResult>(data_object, 0); + ASSERT_TRUE(result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>())); + auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0); + ASSERT_FALSE(verify_result.GetSignature().empty()); + ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); } TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { - std::atomic_bool callback_called_flag{false}; + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto sign_key = GpgKeyGetter::GetInstance().GetKey( + "8933EB283A18995F45D61DAC021D89771B680FFB"); + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + ASSERT_TRUE(sign_key.IsPrivateKey()); + ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); + + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync( + {encrypt_key}, {sign_key}, input_file, true, output_file); + + ASSERT_TRUE((data_object->Check<GpgEncryptResult, GpgSignResult>())); + auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0); + auto sign_result = ExtractParams<GpgSignResult>(data_object, 1); + ASSERT_TRUE(encr_result.InvalidRecipients().empty()); + ASSERT_TRUE(sign_result.InvalidSigners().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file, + decrpypt_output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GpgVerifyResult>())); + auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1); + + ASSERT_FALSE(decrypt_result.Recipients().empty()); + ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93"); + ASSERT_FALSE(verify_reult.GetSignature().empty()); + ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), + "8933EB283A18995F45D61DAC021D89771B680FFB"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyBinaryTest) { auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); auto sign_key = GpgKeyGetter::GetInstance().GetKey( "8933EB283A18995F45D61DAC021D89771B680FFB"); - auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); auto output_file = GetTempFilePath(); ASSERT_TRUE(sign_key.IsPrivateKey()); ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); - GpgFileOpera::GetInstance().EncryptSignFile( - {encrypt_key}, {sign_key}, input_file, true, output_file, - [&callback_called_flag, output_file](GpgError err, - const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check<GpgEncryptResult, GpgSignResult>())); - auto encr_result = ExtractParams<GpgEncryptResult>(data_obj, 0); - auto sign_result = ExtractParams<GpgSignResult>(data_obj, 1); - ASSERT_TRUE(encr_result.InvalidRecipients().empty()); - ASSERT_TRUE(sign_result.InvalidSigners().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - auto decrpypt_output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().DecryptVerifyFile( - output_file, decrpypt_output_file, - [&callback_called_flag, decrpypt_output_file]( - GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE( - (data_obj->Check<GpgDecryptResult, GpgVerifyResult>())); - auto decrypt_result = - ExtractParams<GpgDecryptResult>(data_obj, 0); - auto verify_reult = ExtractParams<GpgVerifyResult>(data_obj, 1); - - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - ASSERT_FALSE(decrypt_result.Recipients().empty()); - ASSERT_EQ(decrypt_result.Recipients()[0].keyid, - "F89C95A05088CC93"); - ASSERT_FALSE(verify_reult.GetSignature().empty()); - ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), - "8933EB283A18995F45D61DAC021D89771B680FFB"); - - const auto [read_success, buffer] = - ReadFileGFBuffer(decrpypt_output_file); - ASSERT_TRUE(read_success); - ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!"))); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync( + {encrypt_key}, {sign_key}, input_file, false, output_file); + + ASSERT_TRUE((data_object->Check<GpgEncryptResult, GpgSignResult>())); + auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0); + auto sign_result = ExtractParams<GpgSignResult>(data_object, 1); + ASSERT_TRUE(encr_result.InvalidRecipients().empty()); + ASSERT_TRUE(sign_result.InvalidSigners().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file, + decrpypt_output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GpgVerifyResult>())); + auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0); + auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1); + + ASSERT_FALSE(decrypt_result.Recipients().empty()); + ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93"); + ASSERT_FALSE(verify_reult.GetSignature().empty()); + ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), + "8933EB283A18995F45D61DAC021D89771B680FFB"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); } } // namespace GpgFrontend::Test diff --git a/src/test/core/GpgCoreTestImportExport.cpp b/src/test/core/GpgCoreTestImportExport.cpp index faf8b58a..8cb720ff 100644 --- a/src/test/core/GpgCoreTestImportExport.cpp +++ b/src/test/core/GpgCoreTestImportExport.cpp @@ -26,7 +26,6 @@ * */ -#include <string> #include <vector> #include "GpgCoreTest.h" diff --git a/src/test/core/GpgCoreTestKeyModel.cpp b/src/test/core/GpgCoreTestKeyModel.cpp index cf1fd9ea..1e75a7f9 100644 --- a/src/test/core/GpgCoreTestKeyModel.cpp +++ b/src/test/core/GpgCoreTestKeyModel.cpp @@ -84,16 +84,16 @@ TEST_F(GpgCoreTest, GpgKeyTest) { ASSERT_EQ(key.GetId(), "81704859182661FB"); ASSERT_EQ(key.GetFingerprint(), "9490795B78F8AFE9F93BD09281704859182661FB"); ASSERT_EQ(key.GetExpireTime(), - QDateTime::fromString("20230905T040000", Qt::ISODate)); + QDateTime::fromString("2023-09-05T04:00:00Z", Qt::ISODate)); ASSERT_EQ(key.GetPublicKeyAlgo(), "RSA"); + ASSERT_EQ(key.GetKeyAlgo(), "RSA3072"); ASSERT_EQ(key.GetPrimaryKeyLength(), 3072); ASSERT_EQ(key.GetLastUpdateTime(), - QDateTime::fromString("19700101T000000", Qt::ISODate)); + QDateTime::fromString("1970-01-01T00:00:00Z", Qt::ISODate)); ASSERT_EQ(key.GetCreateTime(), - QDateTime::fromString("20210905T060153", Qt::ISODate)); + QDateTime::fromString("2021-09-05T06:01:53Z", Qt::ISODate)); ASSERT_EQ(key.GetOwnerTrust(), "Unknown"); - ASSERT_EQ(key.IsExpired(), key.GetExpireTime() < QDateTime::currentDateTime()); } @@ -104,12 +104,26 @@ TEST_F(GpgCoreTest, GpgSubKeyTest) { auto sub_keys = key.GetSubKeys(); ASSERT_EQ(sub_keys->size(), 2); + auto& main_key = sub_keys->front(); + + ASSERT_EQ(main_key.GetID(), "81704859182661FB"); + ASSERT_EQ(main_key.GetFingerprint(), + "9490795B78F8AFE9F93BD09281704859182661FB"); + ASSERT_EQ(main_key.GetExpireTime(), + QDateTime::fromString("2023-09-05T04:00:00Z", Qt::ISODate)); + ASSERT_EQ(main_key.GetPubkeyAlgo(), "RSA"); + ASSERT_EQ(main_key.GetKeyAlgo(), "RSA3072"); + ASSERT_EQ(main_key.GetKeyLength(), 3072); + ASSERT_EQ(main_key.GetCreateTime(), + QDateTime::fromString("2021-09-05T06:01:53Z", Qt::ISODate)); + ASSERT_FALSE(main_key.IsCardKey()); + auto& sub_key = sub_keys->back(); ASSERT_FALSE(sub_key.IsRevoked()); ASSERT_FALSE(sub_key.IsDisabled()); ASSERT_EQ(sub_key.GetCreateTime(), - QDateTime::fromString("20210905T060153", Qt::ISODate)); + QDateTime::fromString("2021-09-05T06:01:53Z", Qt::ISODate)); ASSERT_FALSE(sub_key.IsCardKey()); ASSERT_TRUE(sub_key.IsPrivateKey()); @@ -117,13 +131,14 @@ TEST_F(GpgCoreTest, GpgSubKeyTest) { ASSERT_EQ(sub_key.GetFingerprint(), "50D37E8F8EE7340A6794E0592B36803235B5E25B"); ASSERT_EQ(sub_key.GetKeyLength(), 3072); + ASSERT_EQ(sub_key.GetKeyAlgo(), "RSA3072"); ASSERT_EQ(sub_key.GetPubkeyAlgo(), "RSA"); ASSERT_FALSE(sub_key.IsHasCertificationCapability()); ASSERT_FALSE(sub_key.IsHasAuthenticationCapability()); ASSERT_FALSE(sub_key.IsHasSigningCapability()); ASSERT_TRUE(sub_key.IsHasEncryptionCapability()); - ASSERT_EQ(key.GetExpireTime(), - QDateTime::fromString("20230905T040000", Qt::ISODate)); + ASSERT_EQ(sub_key.GetExpireTime(), + QDateTime::fromString("2023-09-05T04:00:00Z", Qt::ISODate)); ASSERT_EQ(sub_key.IsExpired(), sub_key.GetExpireTime() < QDateTime::currentDateTime()); diff --git a/src/test/core/GpgCoreTestKeygen.cpp b/src/test/core/GpgCoreTestKeygen.cpp index 57e7cbb9..8a473aea 100644 --- a/src/test/core/GpgCoreTestKeygen.cpp +++ b/src/test/core/GpgCoreTestKeygen.cpp @@ -26,15 +26,9 @@ * */ -#include <gtest/gtest.h> -#include <qeventloop.h> - -#include <cstddef> - #include "GpgCoreTest.h" #include "core/function/gpg/GpgKeyGetter.h" #include "core/function/gpg/GpgKeyOpera.h" -#include "core/function/result_analyse/GpgResultAnalyse.h" #include "core/model/GpgGenKeyInfo.h" #include "core/model/GpgGenerateKeyResult.h" #include "core/model/GpgKey.h" @@ -43,170 +37,466 @@ namespace GpgFrontend::Test { -TEST_F(GpgCoreTest, GenerateKeyTest) { +TEST_F(GpgCoreTest, GenerateKeyRSA2048Test) { auto keygen_info = SecureCreateSharedObject<GenKeyInfo>(); keygen_info->SetName("foo_0"); keygen_info->SetEmail("[email protected]"); - keygen_info->SetComment(""); - keygen_info->SetKeyLength(1024); + keygen_info->SetComment("foobar"); + keygen_info->SetKeyLength(2048); keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[0])); + keygen_info->SetAllowAuthentication(true); + keygen_info->SetAllowCertification(true); + keygen_info->SetAllowEncryption(true); + keygen_info->SetAllowSigning(true); keygen_info->SetNonExpired(true); - keygen_info->SetNonPassPhrase(true); + keygen_info->SetNonPassPhrase(false); - std::atomic_bool callback_called_flag{false}; + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateKeySync(keygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + ASSERT_EQ(key.GetName(), "foo_0"); + ASSERT_EQ(key.GetEmail(), "[email protected]"); + ASSERT_EQ(key.GetComment(), "foobar"); + ASSERT_EQ(key.GetPublicKeyAlgo(), "RSA"); + ASSERT_EQ(key.GetOwnerTrustLevel(), 5); + ASSERT_EQ(key.GetPrimaryKeyLength(), 2048); + ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_TRUE(key.IsHasCertificationCapability()); + ASSERT_TRUE(key.IsHasAuthenticationCapability()); + ASSERT_TRUE(key.IsHasEncryptionCapability()); + ASSERT_TRUE(key.IsHasSigningCapability()); + + ASSERT_TRUE(key.IsHasActualCertificationCapability()); + ASSERT_TRUE(key.IsHasActualAuthenticationCapability()); + ASSERT_TRUE(key.IsHasActualEncryptionCapability()); + ASSERT_TRUE(key.IsHasActualSigningCapability()); GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) - .GenerateKey(keygen_info, [&callback_called_flag]( - GpgError err, - const DataObjectPtr& data_object) { - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - ASSERT_EQ(data_object->GetObjectSize(), 1); - ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); - - auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); - ASSERT_TRUE(result.IsGood()); - auto fpr = result.GetFingerprint(); - - auto key = - GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); - ASSERT_TRUE(key.IsGood()); - - GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr); - - callback_called_flag = true; - ASSERT_FALSE(fpr.isEmpty()); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + .DeleteKey(result.GetFingerprint()); } -TEST_F(GpgCoreTest, GenerateKeyTest_1) { +TEST_F(GpgCoreTest, GenerateKeyRSA1024NoPassTest) { auto keygen_info = SecureCreateSharedObject<GenKeyInfo>(); keygen_info->SetName("foo_1"); keygen_info->SetEmail("[email protected]"); - keygen_info->SetComment("hello gpgfrontend"); + keygen_info->SetComment("foobar_1"); + keygen_info->SetKeyLength(2048); keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[0])); - keygen_info->SetKeyLength(4096); + keygen_info->SetAllowAuthentication(false); + keygen_info->SetAllowCertification(false); + keygen_info->SetAllowEncryption(false); + keygen_info->SetAllowSigning(false); keygen_info->SetNonExpired(false); - keygen_info->SetExpireTime( - QDateTime::currentDateTime().addSecs(static_cast<qint64>(24 * 3600))); - keygen_info->SetNonPassPhrase(false); + keygen_info->SetNonPassPhrase(true); - std::atomic_bool callback_called_flag{false}; + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateKeySync(keygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + ASSERT_EQ(key.GetName(), "foo_1"); + ASSERT_EQ(key.GetEmail(), "[email protected]"); + ASSERT_EQ(key.GetComment(), "foobar_1"); + ASSERT_EQ(key.GetPublicKeyAlgo(), "RSA"); + ASSERT_EQ(key.GetOwnerTrustLevel(), 5); + ASSERT_EQ(key.GetPrimaryKeyLength(), 2048); + ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime()); + + ASSERT_TRUE(key.IsHasCertificationCapability()); + ASSERT_FALSE(key.IsHasAuthenticationCapability()); + ASSERT_FALSE(key.IsHasEncryptionCapability()); + ASSERT_FALSE(key.IsHasSigningCapability()); + + ASSERT_TRUE(key.IsHasActualCertificationCapability()); + ASSERT_FALSE(key.IsHasActualAuthenticationCapability()); + ASSERT_FALSE(key.IsHasActualEncryptionCapability()); + ASSERT_FALSE(key.IsHasActualSigningCapability()); GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) - .GenerateKey(keygen_info, [&callback_called_flag]( - GpgError err, - const DataObjectPtr& data_object) { - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + .DeleteKey(result.GetFingerprint()); +} - ASSERT_EQ(data_object->GetObjectSize(), 1); - ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); +TEST_F(GpgCoreTest, GenerateKeyRSA4096Test) { + auto keygen_info = SecureCreateSharedObject<GenKeyInfo>(); + keygen_info->SetName("foo_1"); + keygen_info->SetEmail("[email protected]"); + keygen_info->SetComment("hello gpgfrontend"); + keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[0])); + keygen_info->SetKeyLength(3072); + keygen_info->SetNonExpired(false); - auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); - ASSERT_TRUE(result.IsGood()); - auto fpr = result.GetFingerprint(); + auto expire_time = + QDateTime::currentDateTime().addSecs(static_cast<qint64>(24 * 3600)); + keygen_info->SetExpireTime(expire_time); + keygen_info->SetNonPassPhrase(false); - auto key = - GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); - ASSERT_TRUE(key.IsGood()); + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateKeySync(keygen_info); - GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); - callback_called_flag = true; - ASSERT_FALSE(fpr.isEmpty()); - }); + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); - int retry_count = 2000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + ASSERT_EQ(key.GetExpireTime().date(), expire_time.date()); - ASSERT_TRUE(callback_called_flag); + GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .DeleteKey(result.GetFingerprint()); } -TEST_F(GpgCoreTest, GenerateKeyTest_4) { +TEST_F(GpgCoreTest, GenerateKeyDSA2048Test) { auto keygen_info = SecureCreateSharedObject<GenKeyInfo>(); - keygen_info->SetName("foo_2"); - keygen_info->SetEmail("[email protected]"); - keygen_info->SetComment(""); + keygen_info->SetName("foo_1"); + keygen_info->SetEmail("[email protected]"); + keygen_info->SetComment("hello gpgfrontend"); keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[1])); - keygen_info->SetNonExpired(true); + keygen_info->SetKeyLength(2048); + keygen_info->SetAllowAuthentication(true); + keygen_info->SetAllowCertification(true); + keygen_info->SetAllowEncryption(true); + keygen_info->SetAllowSigning(true); + keygen_info->SetNonExpired(false); + + auto expire_time = + QDateTime::currentDateTime().addSecs(static_cast<qint64>(24 * 3600)); + keygen_info->SetExpireTime(expire_time); keygen_info->SetNonPassPhrase(false); - std::atomic_bool callback_called_flag{false}; + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateKeySync(keygen_info); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + ASSERT_EQ(key.GetName(), "foo_1"); + ASSERT_EQ(key.GetEmail(), "[email protected]"); + ASSERT_EQ(key.GetComment(), "hello gpgfrontend"); + ASSERT_EQ(key.GetPublicKeyAlgo(), "DSA"); + ASSERT_EQ(key.GetOwnerTrustLevel(), 5); + ASSERT_EQ(key.GetPrimaryKeyLength(), 2048); + ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime()); + + ASSERT_TRUE(key.IsHasCertificationCapability()); + ASSERT_TRUE(key.IsHasAuthenticationCapability()); + ASSERT_FALSE(key.IsHasEncryptionCapability()); + ASSERT_TRUE(key.IsHasSigningCapability()); + + ASSERT_TRUE(key.IsHasActualCertificationCapability()); + ASSERT_TRUE(key.IsHasActualAuthenticationCapability()); + ASSERT_FALSE(key.IsHasActualEncryptionCapability()); + ASSERT_TRUE(key.IsHasActualSigningCapability()); GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) - .GenerateKey(keygen_info, [&callback_called_flag]( - GpgError err, - const DataObjectPtr& data_object) { - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); - ASSERT_TRUE(result.IsGood()); - auto fpr = result.GetFingerprint(); - - auto key = - GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); - ASSERT_TRUE(key.IsGood()); - - GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr); - - callback_called_flag = true; - ASSERT_FALSE(fpr.isEmpty()); - }); - - int retry_count = 2000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + .DeleteKey(result.GetFingerprint()); } -TEST_F(GpgCoreTest, GenerateKeyTest_5) { +TEST_F(GpgCoreTest, GenerateKeyED25519Test) { auto keygen_info = SecureCreateSharedObject<GenKeyInfo>(); - keygen_info->SetName("foo_3"); - keygen_info->SetEmail("[email protected]"); - keygen_info->SetComment(""); + keygen_info->SetName("foo_4"); + keygen_info->SetEmail("[email protected]"); + keygen_info->SetComment("hello gpgfrontend"); keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[2])); - keygen_info->SetNonExpired(true); + keygen_info->SetKeyLength(0); + keygen_info->SetAllowAuthentication(true); + keygen_info->SetAllowCertification(true); + keygen_info->SetAllowEncryption(true); + keygen_info->SetAllowSigning(true); + keygen_info->SetNonExpired(false); + + auto expire_time = + QDateTime::currentDateTime().addSecs(static_cast<qint64>(24 * 3600)); + keygen_info->SetExpireTime(expire_time); keygen_info->SetNonPassPhrase(false); - std::atomic_bool callback_called_flag{false}; + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateKeySync(keygen_info); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + ASSERT_EQ(key.GetName(), "foo_4"); + ASSERT_EQ(key.GetEmail(), "[email protected]"); + ASSERT_EQ(key.GetComment(), "hello gpgfrontend"); + ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(key.GetOwnerTrustLevel(), 5); + ASSERT_EQ(key.GetPrimaryKeyLength(), 255); + ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime()); + + ASSERT_TRUE(key.IsHasCertificationCapability()); + ASSERT_TRUE(key.IsHasAuthenticationCapability()); + ASSERT_FALSE(key.IsHasEncryptionCapability()); + ASSERT_TRUE(key.IsHasSigningCapability()); + + ASSERT_TRUE(key.IsHasActualCertificationCapability()); + ASSERT_TRUE(key.IsHasActualAuthenticationCapability()); + ASSERT_FALSE(key.IsHasActualEncryptionCapability()); + ASSERT_TRUE(key.IsHasActualSigningCapability()); GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) - .GenerateKey(keygen_info, [&callback_called_flag]( - GpgError err, - const DataObjectPtr& data_object) { - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + .DeleteKey(result.GetFingerprint()); +} - auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); - ASSERT_TRUE(result.IsGood()); - auto fpr = result.GetFingerprint(); +TEST_F(GpgCoreTest, GenerateKeyED25519CV25519Test) { + auto keygen_info = SecureCreateSharedObject<GenKeyInfo>(); + keygen_info->SetName("foo_ec"); + keygen_info->SetEmail("[email protected]"); + keygen_info->SetComment("ecccc"); + keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[3])); + keygen_info->SetAllowAuthentication(true); + keygen_info->SetAllowCertification(true); + keygen_info->SetAllowEncryption(true); + keygen_info->SetAllowSigning(true); + keygen_info->SetNonExpired(true); + keygen_info->SetNonPassPhrase(true); - auto key = - GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); - ASSERT_TRUE(key.IsGood()); + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo(std::get<2>(keygen_info->GetSupportedKeyAlgo()[3])); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = + GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateKeyWithSubkeySync(keygen_info, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE( + (data_object->Check<GpgGenerateKeyResult, GpgGenerateKeyResult>())); + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + auto fpr = result.GetFingerprint(); + ASSERT_FALSE(fpr.isEmpty()); + + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); + ASSERT_TRUE(key.IsGood()); + + ASSERT_EQ(key.GetName(), "foo_ec"); + ASSERT_EQ(key.GetEmail(), "[email protected]"); + ASSERT_EQ(key.GetComment(), "ecccc"); + ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(key.GetKeyAlgo(), "ED25519"); + ASSERT_EQ(key.GetOwnerTrustLevel(), 5); + ASSERT_EQ(key.GetPrimaryKeyLength(), 255); + ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_TRUE(key.IsHasCertificationCapability()); + ASSERT_TRUE(key.IsHasAuthenticationCapability()); + ASSERT_TRUE(key.IsHasEncryptionCapability()); + ASSERT_TRUE(key.IsHasSigningCapability()); + + ASSERT_FALSE(key.GetSubKeys()->empty()); + ASSERT_EQ(key.GetSubKeys()->size(), 2); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); + ASSERT_EQ(subkey.GetKeyAlgo(), "CV25519"); + ASSERT_EQ(subkey.GetKeyLength(), 255); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_FALSE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_FALSE(subkey.IsHasSigningCapability()); + + ASSERT_TRUE(key.IsHasActualCertificationCapability()); + ASSERT_TRUE(key.IsHasActualAuthenticationCapability()); + ASSERT_TRUE(key.IsHasActualEncryptionCapability()); + ASSERT_TRUE(key.IsHasActualSigningCapability()); + + GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr); +} - GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr); +TEST_F(GpgCoreTest, GenerateKeyED25519NISTP256Test) { + auto keygen_info = SecureCreateSharedObject<GenKeyInfo>(); + keygen_info->SetName("foo_ec2"); + keygen_info->SetEmail("[email protected]"); + keygen_info->SetComment("ecccc"); + keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[4])); + keygen_info->SetAllowAuthentication(true); + keygen_info->SetAllowCertification(true); + keygen_info->SetAllowEncryption(true); + keygen_info->SetAllowSigning(true); + keygen_info->SetNonExpired(true); + keygen_info->SetNonPassPhrase(true); - callback_called_flag = true; - ASSERT_FALSE(fpr.isEmpty()); - }); + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo(std::get<2>(keygen_info->GetSupportedKeyAlgo()[4])); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = + GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateKeyWithSubkeySync(keygen_info, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE( + (data_object->Check<GpgGenerateKeyResult, GpgGenerateKeyResult>())); + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + auto fpr = result.GetFingerprint(); + ASSERT_FALSE(fpr.isEmpty()); + + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); + ASSERT_TRUE(key.IsGood()); + + ASSERT_EQ(key.GetName(), "foo_ec2"); + ASSERT_EQ(key.GetEmail(), "[email protected]"); + ASSERT_EQ(key.GetComment(), "ecccc"); + ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(key.GetKeyAlgo(), "ED25519"); + ASSERT_EQ(key.GetOwnerTrustLevel(), 5); + ASSERT_EQ(key.GetPrimaryKeyLength(), 255); + ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_TRUE(key.IsHasCertificationCapability()); + ASSERT_TRUE(key.IsHasAuthenticationCapability()); + ASSERT_TRUE(key.IsHasEncryptionCapability()); + ASSERT_TRUE(key.IsHasSigningCapability()); + + ASSERT_FALSE(key.GetSubKeys()->empty()); + ASSERT_EQ(key.GetSubKeys()->size(), 2); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); + ASSERT_EQ(subkey.GetKeyAlgo(), "NISTP256"); + ASSERT_EQ(subkey.GetKeyLength(), 256); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_FALSE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_FALSE(subkey.IsHasSigningCapability()); + + ASSERT_TRUE(key.IsHasActualCertificationCapability()); + ASSERT_TRUE(key.IsHasActualAuthenticationCapability()); + ASSERT_TRUE(key.IsHasActualEncryptionCapability()); + ASSERT_TRUE(key.IsHasActualSigningCapability()); + + GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr); +} - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } +TEST_F(GpgCoreTest, GenerateKeyED25519BRAINPOOLP256R1Test) { + auto keygen_info = SecureCreateSharedObject<GenKeyInfo>(); + keygen_info->SetName("foo_ec3"); + keygen_info->SetEmail("[email protected]"); + keygen_info->SetComment("ecccc3"); + keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[5])); + keygen_info->SetAllowAuthentication(true); + keygen_info->SetAllowCertification(true); + keygen_info->SetAllowEncryption(true); + keygen_info->SetAllowSigning(true); + keygen_info->SetNonExpired(true); + keygen_info->SetNonPassPhrase(true); - ASSERT_TRUE(callback_called_flag); + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo(std::get<2>(keygen_info->GetSupportedKeyAlgo()[5])); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = + GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateKeyWithSubkeySync(keygen_info, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE( + (data_object->Check<GpgGenerateKeyResult, GpgGenerateKeyResult>())); + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + auto fpr = result.GetFingerprint(); + ASSERT_FALSE(fpr.isEmpty()); + + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr); + ASSERT_TRUE(key.IsGood()); + + ASSERT_EQ(key.GetName(), "foo_ec3"); + ASSERT_EQ(key.GetEmail(), "[email protected]"); + ASSERT_EQ(key.GetComment(), "ecccc3"); + ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA"); + ASSERT_EQ(key.GetKeyAlgo(), "ED25519"); + ASSERT_EQ(key.GetOwnerTrustLevel(), 5); + ASSERT_EQ(key.GetPrimaryKeyLength(), 255); + ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_TRUE(key.IsHasCertificationCapability()); + ASSERT_TRUE(key.IsHasAuthenticationCapability()); + ASSERT_TRUE(key.IsHasEncryptionCapability()); + ASSERT_TRUE(key.IsHasSigningCapability()); + + ASSERT_FALSE(key.GetSubKeys()->empty()); + ASSERT_EQ(key.GetSubKeys()->size(), 2); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); + ASSERT_EQ(subkey.GetKeyAlgo(), "BRAINPOOLP256R1"); + ASSERT_EQ(subkey.GetKeyLength(), 256); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_FALSE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_FALSE(subkey.IsHasSigningCapability()); + + ASSERT_TRUE(key.IsHasActualCertificationCapability()); + ASSERT_TRUE(key.IsHasActualAuthenticationCapability()); + ASSERT_TRUE(key.IsHasActualEncryptionCapability()); + ASSERT_TRUE(key.IsHasActualSigningCapability()); + + GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr); } } // namespace GpgFrontend::Test diff --git a/src/test/core/GpgCoreTestSubkeygen.cpp b/src/test/core/GpgCoreTestSubkeygen.cpp new file mode 100644 index 00000000..983b6a7c --- /dev/null +++ b/src/test/core/GpgCoreTestSubkeygen.cpp @@ -0,0 +1,298 @@ +/** + * Copyright (C) 2021 Saturneric <[email protected]> + * + * This file is part of GpgFrontend. + * + * GpgFrontend is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * GpgFrontend is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>. + * + * The initial version of the source code is inherited from + * the gpg4usb project, which is under GPL-3.0-or-later. + * + * All the source code of GpgFrontend was modified and released by + * Saturneric <[email protected]> starting on May 12, 2021. + * + * SPDX-License-Identifier: GPL-3.0-or-later + * + */ + +#include "GpgCoreTest.h" +#include "core/function/gpg/GpgKeyGetter.h" +#include "core/function/gpg/GpgKeyOpera.h" +#include "core/model/GpgGenKeyInfo.h" +#include "core/model/GpgGenerateKeyResult.h" +#include "core/model/GpgKey.h" +#include "core/utils/GpgUtils.h" +#include "core/utils/MemoryUtils.h" + +namespace GpgFrontend::Test { + +TEST_F(GpgCoreTest, GenerateSubkeyRSA2048Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[0])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "RSA"); + ASSERT_EQ(subkey.GetKeyAlgo(), "RSA2048"); + ASSERT_EQ(subkey.GetKeyLength(), 2048); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_TRUE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_TRUE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyDSA2048Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[1])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "DSA"); + ASSERT_EQ(subkey.GetKeyAlgo(), "DSA2048"); + ASSERT_EQ(subkey.GetKeyLength(), 2048); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_TRUE(subkey.IsHasAuthenticationCapability()); + ASSERT_FALSE(subkey.IsHasEncryptionCapability()); + ASSERT_TRUE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyED25519Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[2])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "EdDSA"); + ASSERT_EQ(subkey.GetKeyAlgo(), "ED25519"); + ASSERT_EQ(subkey.GetKeyLength(), 255); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_TRUE(subkey.IsHasAuthenticationCapability()); + ASSERT_FALSE(subkey.IsHasEncryptionCapability()); + ASSERT_TRUE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyCV25519Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[3])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); + ASSERT_EQ(subkey.GetKeyAlgo(), "CV25519"); + ASSERT_EQ(subkey.GetKeyLength(), 255); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_FALSE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_FALSE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyNISTP256Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[4])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); + ASSERT_EQ(subkey.GetKeyAlgo(), "NISTP256"); + ASSERT_EQ(subkey.GetKeyLength(), 256); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_FALSE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_FALSE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyBRAINPOOLP256R1Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[7])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); + ASSERT_EQ(subkey.GetKeyAlgo(), "BRAINPOOLP256R1"); + ASSERT_EQ(subkey.GetKeyLength(), 256); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_FALSE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_FALSE(subkey.IsHasSigningCapability()); +} + +} // namespace GpgFrontend::Test
\ No newline at end of file |