aboutsummaryrefslogtreecommitdiffstats
path: root/src/test
diff options
context:
space:
mode:
authorsaturneric <[email protected]>2024-01-18 12:58:37 +0000
committersaturneric <[email protected]>2024-01-18 12:58:37 +0000
commite0d2c4021483e6e1366c1050ccb5a30e53e172bb (patch)
tree5d85739479622e7c672aea45f84d4e2f577f9332 /src/test
parentfix: correct a fault (diff)
downloadGpgFrontend-e0d2c4021483e6e1366c1050ccb5a30e53e172bb.tar.gz
GpgFrontend-e0d2c4021483e6e1366c1050ccb5a30e53e172bb.zip
fix: add test cases and solve discovered issues
Diffstat (limited to 'src/test')
-rw-r--r--src/test/core/GpgCoreTest.h2
-rw-r--r--src/test/core/GpgCoreTestBasicOpera.cpp406
-rw-r--r--src/test/core/GpgCoreTestDirectoryBasicOpera.cpp29
-rw-r--r--src/test/core/GpgCoreTestFileBasicOpera.cpp386
-rw-r--r--src/test/core/GpgCoreTestImportExport.cpp1
-rw-r--r--src/test/core/GpgCoreTestKeyModel.cpp29
-rw-r--r--src/test/core/GpgCoreTestKeygen.cpp536
-rw-r--r--src/test/core/GpgCoreTestSubkeygen.cpp298
8 files changed, 1137 insertions, 550 deletions
diff --git a/src/test/core/GpgCoreTest.h b/src/test/core/GpgCoreTest.h
index 26097f2c..9b18ebf6 100644
--- a/src/test/core/GpgCoreTest.h
+++ b/src/test/core/GpgCoreTest.h
@@ -30,6 +30,8 @@
#include <gtest/gtest.h>
+#include "GpgFrontendTest.h"
+
namespace GpgFrontend::Test {
class GpgCoreTest : public ::testing::Test {
diff --git a/src/test/core/GpgCoreTestBasicOpera.cpp b/src/test/core/GpgCoreTestBasicOpera.cpp
index 238c9530..da539ad6 100644
--- a/src/test/core/GpgCoreTestBasicOpera.cpp
+++ b/src/test/core/GpgCoreTestBasicOpera.cpp
@@ -28,7 +28,6 @@
#include "GpgCoreTest.h"
#include "core/GpgModel.h"
-#include "core/function/basic/ChannelObject.h"
#include "core/function/gpg/GpgBasicOperator.h"
#include "core/function/gpg/GpgKeyGetter.h"
#include "core/function/result_analyse/GpgDecryptResultAnalyse.h"
@@ -41,85 +40,59 @@
namespace GpgFrontend::Test {
TEST_F(GpgCoreTest, CoreEncryptDecrTest) {
- std::atomic_bool callback_called_flag{false};
-
auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
"E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+
+ auto [err, data_object] =
+ GpgBasicOperator::GetInstance().EncryptSync({encrypt_key}, buffer, true);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult, GFBuffer>()));
+
+ auto result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ auto encr_out_buffer = ExtractParams<GFBuffer>(data_object, 1);
+
+ ASSERT_TRUE(result.InvalidRecipients().empty());
- GpgBasicOperator::GetInstance().Encrypt(
- {encrypt_key}, GFBuffer(QString("Hello GpgFrontend!")), true,
- [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgEncryptResult, GFBuffer>()));
- auto result = ExtractParams<GpgEncryptResult>(data_obj, 0);
- auto encr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1);
- ASSERT_TRUE(result.InvalidRecipients().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- GpgBasicOperator::GetInstance().Decrypt(
- encr_out_buffer, [&callback_called_flag](
- GpgError err, const DataObjectPtr& data_obj) {
- auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0);
- auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1);
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
- ASSERT_FALSE(d_result.Recipients().empty());
- ASSERT_EQ(d_result.Recipients()[0].keyid, "6A2764F8298DEB29");
-
- ASSERT_EQ(decr_out_buffer,
- GFBuffer(QString("Hello GpgFrontend!")));
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err_0, data_object_0] =
+ GpgBasicOperator::GetInstance().DecryptSync(encr_out_buffer);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GFBuffer>()));
+
+ auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ auto decr_out_buffer = ExtractParams<GFBuffer>(data_object_0, 1);
+
+ ASSERT_FALSE(decr_result.Recipients().empty());
+ ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29");
+ ASSERT_EQ(decr_out_buffer, buffer);
}
TEST_F(GpgCoreTest, CoreEncryptSymmetricDecrTest) {
- std::atomic_bool callback_called_flag{false};
-
auto encrypt_text = GFBuffer(QString("Hello GpgFrontend!"));
+ auto [err, data_object] =
+ GpgBasicOperator::GetInstance().EncryptSymmetricSync(encrypt_text, true);
- GpgBasicOperator::GetInstance().EncryptSymmetric(
- encrypt_text, true,
- [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgEncryptResult, GFBuffer>()));
- auto result = ExtractParams<GpgEncryptResult>(data_obj, 0);
- auto encr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1);
- ASSERT_TRUE(result.InvalidRecipients().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- GpgBasicOperator::GetInstance().Decrypt(
- encr_out_buffer, [&callback_called_flag](
- GpgError err, const DataObjectPtr& data_obj) {
- auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0);
- auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1);
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
- ASSERT_TRUE(d_result.Recipients().empty());
- ASSERT_EQ(decr_out_buffer,
- GFBuffer(QString("Hello GpgFrontend!")));
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult, GFBuffer>()));
+ auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ auto encr_out_buffer = ExtractParams<GFBuffer>(data_object, 1);
+ ASSERT_TRUE(encr_result.InvalidRecipients().empty());
+
+ auto [err_0, data_object_0] =
+ GpgBasicOperator::GetInstance().DecryptSync(encr_out_buffer);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GFBuffer>()));
+ auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ auto decr_out_buffer = ExtractParams<GFBuffer>(data_object_0, 1);
+
+ ASSERT_TRUE(decr_result.Recipients().empty());
+ ASSERT_EQ(decr_out_buffer, encrypt_text);
}
TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_1) {
- std::atomic_bool callback_called_flag{false};
-
auto encr_out_data = GFBuffer(QString(
"-----BEGIN PGP MESSAGE-----\n"
"\n"
@@ -133,30 +106,18 @@ TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_1) {
"=8n2H\n"
"-----END PGP MESSAGE-----"));
- GpgBasicOperator::GetInstance().Decrypt(
- encr_out_data,
- [=, &callback_called_flag](GpgError err, const DataObjectPtr& data_obj) {
- auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0);
- auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1);
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_SECKEY);
- ASSERT_FALSE(d_result.Recipients().empty());
- ASSERT_EQ(d_result.Recipients()[0].keyid, "A50CFD2F6C677D8C");
-
- // stop waiting
- callback_called_flag = true;
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] =
+ GpgBasicOperator::GetInstance().DecryptSync(encr_out_data);
+
+ auto decr_result = ExtractParams<GpgDecryptResult>(data_object, 0);
+ auto decr_out_buffer = ExtractParams<GFBuffer>(data_object, 1);
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_SECKEY);
+
+ ASSERT_FALSE(decr_result.Recipients().empty());
+ ASSERT_EQ(decr_result.Recipients()[0].keyid, "A50CFD2F6C677D8C");
}
TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_ResultAnalyse) {
- std::atomic_bool callback_called_flag{false};
-
auto encr_out_data = GFBuffer(QString(
"-----BEGIN PGP MESSAGE-----\n"
"\n"
@@ -170,152 +131,99 @@ TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_ResultAnalyse) {
"=8n2H\n"
"-----END PGP MESSAGE-----"));
- GpgBasicOperator::GetInstance().Decrypt(
- encr_out_data,
- [=, &callback_called_flag](GpgError err, const DataObjectPtr& data_obj) {
- auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0);
- auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 1);
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_SECKEY);
- ASSERT_FALSE(d_result.Recipients().empty());
- ASSERT_EQ(d_result.Recipients()[0].keyid, "A50CFD2F6C677D8C");
-
- GpgDecryptResultAnalyse analyse{err, d_result};
- analyse.Analyse();
- ASSERT_EQ(analyse.GetStatus(), -1);
- ASSERT_FALSE(analyse.GetResultReport().isEmpty());
-
- // stop waiting
- callback_called_flag = true;
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] =
+ GpgBasicOperator::GetInstance().DecryptSync(encr_out_data);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_SECKEY);
+ ASSERT_TRUE((data_object->Check<GpgDecryptResult, GFBuffer>()));
+
+ auto decr_result = ExtractParams<GpgDecryptResult>(data_object, 0);
+ auto decr_out_buffer = ExtractParams<GFBuffer>(data_object, 1);
+
+ ASSERT_FALSE(decr_result.Recipients().empty());
+ ASSERT_EQ(decr_result.Recipients()[0].keyid, "A50CFD2F6C677D8C");
+
+ GpgDecryptResultAnalyse analyse{err, decr_result};
+ analyse.Analyse();
+ ASSERT_EQ(analyse.GetStatus(), -1);
+ ASSERT_FALSE(analyse.GetResultReport().isEmpty());
}
TEST_F(GpgCoreTest, CoreSignVerifyNormalTest) {
- std::atomic_bool callback_called_flag{false};
-
auto sign_key = GpgKeyGetter::GetInstance().GetPubkey(
"467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
auto sign_text = GFBuffer(QString("Hello GpgFrontend!"));
- GpgBasicOperator::GetInstance().Sign(
- {sign_key}, sign_text, GPGME_SIG_MODE_NORMAL, true,
- [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgSignResult, GFBuffer>()));
- auto result = ExtractParams<GpgSignResult>(data_obj, 0);
- auto sign_out_buffer = ExtractParams<GFBuffer>(data_obj, 1);
- ASSERT_TRUE(result.InvalidSigners().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- GpgBasicOperator::GetInstance().Verify(
- sign_out_buffer, GFBuffer(),
- [&callback_called_flag](GpgError err,
- const DataObjectPtr& data_obj) {
- auto d_result = ExtractParams<GpgVerifyResult>(data_obj, 0);
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
- ASSERT_FALSE(d_result.GetSignature().empty());
- ASSERT_EQ(d_result.GetSignature().at(0).GetFingerprint(),
- "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] = GpgBasicOperator::GetInstance().SignSync(
+ {sign_key}, sign_text, GPGME_SIG_MODE_NORMAL, true);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgSignResult, GFBuffer>()));
+ auto result = ExtractParams<GpgSignResult>(data_object, 0);
+ auto sign_out_buffer = ExtractParams<GFBuffer>(data_object, 1);
+ ASSERT_TRUE(result.InvalidSigners().empty());
+
+ auto [err_0, data_object_0] =
+ GpgBasicOperator::GetInstance().VerifySync(sign_out_buffer, GFBuffer());
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>()));
+ auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0);
+ ASSERT_FALSE(verify_result.GetSignature().empty());
+ ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(),
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
}
TEST_F(GpgCoreTest, CoreSignVerifyDetachTest) {
- std::atomic_bool callback_called_flag{false};
-
auto sign_key = GpgKeyGetter::GetInstance().GetPubkey(
"467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
auto sign_text = GFBuffer(QString("Hello GpgFrontend!"));
- GpgBasicOperator::GetInstance().Sign(
- {sign_key}, sign_text, GPGME_SIG_MODE_DETACH, true,
- [=, &callback_called_flag](GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgSignResult, GFBuffer>()));
- auto result = ExtractParams<GpgSignResult>(data_obj, 0);
- auto sign_out_buffer = ExtractParams<GFBuffer>(data_obj, 1);
- ASSERT_TRUE(result.InvalidSigners().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- GpgBasicOperator::GetInstance().Verify(
- sign_text, sign_out_buffer,
- [&callback_called_flag](GpgError err,
- const DataObjectPtr& data_obj) {
- auto d_result = ExtractParams<GpgVerifyResult>(data_obj, 0);
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
- ASSERT_FALSE(d_result.GetSignature().empty());
- ASSERT_EQ(d_result.GetSignature().at(0).GetFingerprint(),
- "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] = GpgBasicOperator::GetInstance().SignSync(
+ {sign_key}, sign_text, GPGME_SIG_MODE_DETACH, true);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgSignResult, GFBuffer>()));
+ auto result = ExtractParams<GpgSignResult>(data_object, 0);
+ auto sign_out_buffer = ExtractParams<GFBuffer>(data_object, 1);
+ ASSERT_TRUE(result.InvalidSigners().empty());
+
+ auto [err_0, data_object_0] =
+ GpgBasicOperator::GetInstance().VerifySync(sign_text, sign_out_buffer);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>()));
+ auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0);
+ ASSERT_FALSE(verify_result.GetSignature().empty());
+ ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(),
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
}
TEST_F(GpgCoreTest, CoreSignVerifyClearTest) {
- std::atomic_bool callback_called_flag{false};
-
auto sign_key = GpgKeyGetter::GetInstance().GetPubkey(
"467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
auto sign_text = GFBuffer(QString("Hello GpgFrontend!"));
- GpgBasicOperator::GetInstance().Sign(
- {sign_key}, sign_text, GPGME_SIG_MODE_CLEAR, true,
- [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgSignResult, GFBuffer>()));
- auto result = ExtractParams<GpgSignResult>(data_obj, 0);
- auto sign_out_buffer = ExtractParams<GFBuffer>(data_obj, 1);
- ASSERT_TRUE(result.InvalidSigners().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- GpgBasicOperator::GetInstance().Verify(
- sign_out_buffer, GFBuffer(),
- [&callback_called_flag](GpgError err,
- const DataObjectPtr& data_obj) {
- auto verify_reult = ExtractParams<GpgVerifyResult>(data_obj, 0);
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
- ASSERT_FALSE(verify_reult.GetSignature().empty());
- ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(),
- "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] = GpgBasicOperator::GetInstance().SignSync(
+ {sign_key}, sign_text, GPGME_SIG_MODE_CLEAR, true);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgSignResult, GFBuffer>()));
+ auto result = ExtractParams<GpgSignResult>(data_object, 0);
+ auto sign_out_buffer = ExtractParams<GFBuffer>(data_object, 1);
+ ASSERT_TRUE(result.InvalidSigners().empty());
+
+ auto [err_0, data_object_0] =
+ GpgBasicOperator::GetInstance().VerifySync(sign_out_buffer, GFBuffer());
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 0);
+ ASSERT_FALSE(verify_reult.GetSignature().empty());
+ ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(),
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
}
TEST_F(GpgCoreTest, CoreEncryptSignDecrVerifyTest) {
- std::atomic_bool callback_called_flag{false};
-
auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
"467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
auto sign_key = GpgKeyGetter::GetInstance().GetKey(
@@ -325,52 +233,34 @@ TEST_F(GpgCoreTest, CoreEncryptSignDecrVerifyTest) {
ASSERT_TRUE(sign_key.IsPrivateKey());
ASSERT_TRUE(sign_key.IsHasActualSigningCapability());
- GpgBasicOperator::GetInstance().EncryptSign(
- {encrypt_key}, {sign_key}, encrypt_text, true,
- [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE(
- (data_obj->Check<GpgEncryptResult, GpgSignResult, GFBuffer>()));
- auto encr_result = ExtractParams<GpgEncryptResult>(data_obj, 0);
- auto sign_result = ExtractParams<GpgSignResult>(data_obj, 1);
- auto encr_out_buffer = ExtractParams<GFBuffer>(data_obj, 2);
- ASSERT_TRUE(encr_result.InvalidRecipients().empty());
- ASSERT_TRUE(sign_result.InvalidSigners().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- GpgBasicOperator::GetInstance().DecryptVerify(
- encr_out_buffer, [&callback_called_flag](
- GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE(
- (data_obj
- ->Check<GpgDecryptResult, GpgVerifyResult, GFBuffer>()));
- auto decrypt_result =
- ExtractParams<GpgDecryptResult>(data_obj, 0);
- auto verify_reult = ExtractParams<GpgVerifyResult>(data_obj, 1);
- auto decr_out_buffer = ExtractParams<GFBuffer>(data_obj, 2);
-
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- ASSERT_FALSE(decrypt_result.Recipients().empty());
- ASSERT_EQ(decr_out_buffer,
- GFBuffer(QString("Hello GpgFrontend!")));
-
- ASSERT_EQ(decrypt_result.Recipients()[0].keyid,
- "F89C95A05088CC93");
- ASSERT_FALSE(verify_reult.GetSignature().empty());
- ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(),
- "8933EB283A18995F45D61DAC021D89771B680FFB");
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] = GpgBasicOperator::GetInstance().EncryptSignSync(
+ {encrypt_key}, {sign_key}, encrypt_text, true);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE(
+ (data_object->Check<GpgEncryptResult, GpgSignResult, GFBuffer>()));
+ auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ auto sign_result = ExtractParams<GpgSignResult>(data_object, 1);
+ auto encr_out_buffer = ExtractParams<GFBuffer>(data_object, 2);
+ ASSERT_TRUE(encr_result.InvalidRecipients().empty());
+ ASSERT_TRUE(sign_result.InvalidSigners().empty());
+
+ auto [err_0, data_object_0] =
+ GpgBasicOperator::GetInstance().DecryptVerifySync(encr_out_buffer);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE(
+ (data_object_0->Check<GpgDecryptResult, GpgVerifyResult, GFBuffer>()));
+ auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1);
+ auto decr_out_buffer = ExtractParams<GFBuffer>(data_object_0, 2);
+
+ ASSERT_FALSE(decrypt_result.Recipients().empty());
+ ASSERT_EQ(decr_out_buffer, encrypt_text);
+ ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93");
+ ASSERT_FALSE(verify_reult.GetSignature().empty());
+ ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(),
+ "8933EB283A18995F45D61DAC021D89771B680FFB");
}
} // namespace GpgFrontend::Test
diff --git a/src/test/core/GpgCoreTestDirectoryBasicOpera.cpp b/src/test/core/GpgCoreTestDirectoryBasicOpera.cpp
new file mode 100644
index 00000000..a2c7f285
--- /dev/null
+++ b/src/test/core/GpgCoreTestDirectoryBasicOpera.cpp
@@ -0,0 +1,29 @@
+/**
+ * Copyright (C) 2021 Saturneric <[email protected]>
+ *
+ * This file is part of GpgFrontend.
+ *
+ * GpgFrontend is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GpgFrontend is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>.
+ *
+ * The initial version of the source code is inherited from
+ * the gpg4usb project, which is under GPL-3.0-or-later.
+ *
+ * All the source code of GpgFrontend was modified and released by
+ * Saturneric <[email protected]> starting on May 12, 2021.
+ *
+ * SPDX-License-Identifier: GPL-3.0-or-later
+ *
+ */
+
+#include "GpgCoreTest.h"
diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp
index d5b0f52d..db338893 100644
--- a/src/test/core/GpgCoreTestFileBasicOpera.cpp
+++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp
@@ -28,11 +28,8 @@
#include "GpgCoreTest.h"
#include "core/GpgModel.h"
-#include "core/function/basic/ChannelObject.h"
-#include "core/function/gpg/GpgBasicOperator.h"
#include "core/function/gpg/GpgFileOpera.h"
#include "core/function/gpg/GpgKeyGetter.h"
-#include "core/function/result_analyse/GpgDecryptResultAnalyse.h"
#include "core/model/GpgDecryptResult.h"
#include "core/model/GpgEncryptResult.h"
#include "core/model/GpgSignResult.h"
@@ -43,197 +40,264 @@
namespace GpgFrontend::Test {
TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) {
- std::atomic_bool callback_called_flag{false};
+ auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
+ auto output_file = GetTempFilePath();
+
+ auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync(
+ {encrypt_key}, input_file, true, output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult>()));
+ auto result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidRecipients().empty());
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync(
+ output_file, decrpypt_output_file);
+ auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_FALSE(decr_result.Recipients().empty());
+ ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29");
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
+}
+
+TEST_F(GpgCoreTest, CoreFileEncryptDecrBinaryTest) {
auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
"E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
- auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!");
+
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
auto output_file = GetTempFilePath();
- GpgFileOpera::GetInstance().EncryptFile(
- {encrypt_key}, input_file, true, output_file,
- [output_file, &callback_called_flag](GpgError err,
- const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgEncryptResult>()));
-
- auto result = ExtractParams<GpgEncryptResult>(data_obj, 0);
- ASSERT_TRUE(result.InvalidRecipients().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- auto decrpypt_output_file = GetTempFilePath();
- GpgFileOpera::GetInstance().DecryptFile(
- output_file, decrpypt_output_file,
- [decrpypt_output_file, &callback_called_flag](
- GpgError err, const DataObjectPtr& data_obj) {
- auto d_result = ExtractParams<GpgDecryptResult>(data_obj, 0);
-
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
- ASSERT_FALSE(d_result.Recipients().empty());
- ASSERT_EQ(d_result.Recipients()[0].keyid, "6A2764F8298DEB29");
-
- const auto [read_success, buffer] =
- ReadFileGFBuffer(decrpypt_output_file);
- ASSERT_TRUE(read_success);
- ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!")));
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync(
+ {encrypt_key}, input_file, false, output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult>()));
+ auto result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidRecipients().empty());
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync(
+ output_file, decrpypt_output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>()));
+ auto decr_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ ASSERT_FALSE(decr_result.Recipients().empty());
+ ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29");
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
}
TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) {
- std::atomic_bool callback_called_flag{false};
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
+ auto output_file = GetTempFilePath();
- auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!");
+ auto [err, data_object] =
+ GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, true,
+ output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult>()));
+ auto result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidRecipients().empty());
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync(
+ output_file, decrpypt_output_file);
+
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>()));
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ ASSERT_TRUE(decrypt_result.Recipients().empty());
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
+}
+
+TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrBinaryTest) {
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
auto output_file = GetTempFilePath();
- GpgFileOpera::GetInstance().EncryptFileSymmetric(
- input_file, true, output_file,
- [&callback_called_flag, output_file](GpgError err,
- const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgEncryptResult>()));
- auto result = ExtractParams<GpgEncryptResult>(data_obj, 0);
- ASSERT_TRUE(result.InvalidRecipients().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- auto decrpypt_output_file = GetTempFilePath();
- GpgFileOpera::GetInstance().DecryptFile(
- output_file, decrpypt_output_file,
- [&callback_called_flag, decrpypt_output_file](
- GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgDecryptResult>()));
-
- auto decrypt_result =
- ExtractParams<GpgDecryptResult>(data_obj, 0);
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
- ASSERT_TRUE(decrypt_result.Recipients().empty());
-
- const auto [read_success, buffer] =
- ReadFileGFBuffer(decrpypt_output_file);
- ASSERT_TRUE(read_success);
- ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!")));
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] =
+ GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, false,
+ output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult>()));
+ auto result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidRecipients().empty());
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync(
+ output_file, decrpypt_output_file);
+
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult>()));
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ ASSERT_TRUE(decrypt_result.Recipients().empty());
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
}
TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) {
- std::atomic_bool callback_called_flag{false};
+ auto sign_key = GpgKeyGetter::GetInstance().GetPubkey(
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
+ auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!");
+ auto output_file = GetTempFilePath();
+ auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync(
+ {sign_key}, input_file, true, output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgSignResult>()));
+ auto result = ExtractParams<GpgSignResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidSigners().empty());
+
+ auto [err_0, data_object_0] =
+ GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>()));
+ auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0);
+ ASSERT_FALSE(verify_result.GetSignature().empty());
+ ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(),
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
+}
+
+TEST_F(GpgCoreTest, CoreFileSignVerifyNormalBinaryTest) {
auto sign_key = GpgKeyGetter::GetInstance().GetPubkey(
"467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!");
auto output_file = GetTempFilePath();
- GpgFileOpera::GetInstance().SignFile(
- {sign_key}, input_file, true, output_file,
- [&callback_called_flag, input_file, output_file](
- GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgSignResult>()));
- auto result = ExtractParams<GpgSignResult>(data_obj, 0);
- ASSERT_TRUE(result.InvalidSigners().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- GpgFileOpera::GetInstance().VerifyFile(
- input_file, output_file,
- [&callback_called_flag](GpgError err,
- const DataObjectPtr& data_obj) {
- auto d_result = ExtractParams<GpgVerifyResult>(data_obj, 0);
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
- ASSERT_FALSE(d_result.GetSignature().empty());
- ASSERT_EQ(d_result.GetSignature().at(0).GetFingerprint(),
- "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync(
+ {sign_key}, input_file, false, output_file);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object->Check<GpgSignResult>()));
+ auto result = ExtractParams<GpgSignResult>(data_object, 0);
+ ASSERT_TRUE(result.InvalidSigners().empty());
+
+ auto [err_0, data_object_0] =
+ GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgVerifyResult>()));
+ auto verify_result = ExtractParams<GpgVerifyResult>(data_object_0, 0);
+ ASSERT_FALSE(verify_result.GetSignature().empty());
+ ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(),
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
}
TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) {
- std::atomic_bool callback_called_flag{false};
+ auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
+ "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
+ auto sign_key = GpgKeyGetter::GetInstance().GetKey(
+ "8933EB283A18995F45D61DAC021D89771B680FFB");
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
+ auto output_file = GetTempFilePath();
+ ASSERT_TRUE(sign_key.IsPrivateKey());
+ ASSERT_TRUE(sign_key.IsHasActualSigningCapability());
+
+ auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync(
+ {encrypt_key}, {sign_key}, input_file, true, output_file);
+
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult, GpgSignResult>()));
+ auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ auto sign_result = ExtractParams<GpgSignResult>(data_object, 1);
+ ASSERT_TRUE(encr_result.InvalidRecipients().empty());
+ ASSERT_TRUE(sign_result.InvalidSigners().empty());
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] =
+ GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file,
+ decrpypt_output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GpgVerifyResult>()));
+ auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1);
+
+ ASSERT_FALSE(decrypt_result.Recipients().empty());
+ ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93");
+ ASSERT_FALSE(verify_reult.GetSignature().empty());
+ ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(),
+ "8933EB283A18995F45D61DAC021D89771B680FFB");
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
+}
+
+TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyBinaryTest) {
auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey(
"467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
auto sign_key = GpgKeyGetter::GetInstance().GetKey(
"8933EB283A18995F45D61DAC021D89771B680FFB");
- auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!");
+ auto buffer = GFBuffer(QString("Hello GpgFrontend!"));
+ auto input_file = CreateTempFileAndWriteData(buffer);
auto output_file = GetTempFilePath();
ASSERT_TRUE(sign_key.IsPrivateKey());
ASSERT_TRUE(sign_key.IsHasActualSigningCapability());
- GpgFileOpera::GetInstance().EncryptSignFile(
- {encrypt_key}, {sign_key}, input_file, true, output_file,
- [&callback_called_flag, output_file](GpgError err,
- const DataObjectPtr& data_obj) {
- ASSERT_TRUE((data_obj->Check<GpgEncryptResult, GpgSignResult>()));
- auto encr_result = ExtractParams<GpgEncryptResult>(data_obj, 0);
- auto sign_result = ExtractParams<GpgSignResult>(data_obj, 1);
- ASSERT_TRUE(encr_result.InvalidRecipients().empty());
- ASSERT_TRUE(sign_result.InvalidSigners().empty());
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- auto decrpypt_output_file = GetTempFilePath();
- GpgFileOpera::GetInstance().DecryptVerifyFile(
- output_file, decrpypt_output_file,
- [&callback_called_flag, decrpypt_output_file](
- GpgError err, const DataObjectPtr& data_obj) {
- ASSERT_TRUE(
- (data_obj->Check<GpgDecryptResult, GpgVerifyResult>()));
- auto decrypt_result =
- ExtractParams<GpgDecryptResult>(data_obj, 0);
- auto verify_reult = ExtractParams<GpgVerifyResult>(data_obj, 1);
-
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- ASSERT_FALSE(decrypt_result.Recipients().empty());
- ASSERT_EQ(decrypt_result.Recipients()[0].keyid,
- "F89C95A05088CC93");
- ASSERT_FALSE(verify_reult.GetSignature().empty());
- ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(),
- "8933EB283A18995F45D61DAC021D89771B680FFB");
-
- const auto [read_success, buffer] =
- ReadFileGFBuffer(decrpypt_output_file);
- ASSERT_TRUE(read_success);
- ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!")));
-
- // stop waiting
- callback_called_flag = true;
- });
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync(
+ {encrypt_key}, {sign_key}, input_file, false, output_file);
+
+ ASSERT_TRUE((data_object->Check<GpgEncryptResult, GpgSignResult>()));
+ auto encr_result = ExtractParams<GpgEncryptResult>(data_object, 0);
+ auto sign_result = ExtractParams<GpgSignResult>(data_object, 1);
+ ASSERT_TRUE(encr_result.InvalidRecipients().empty());
+ ASSERT_TRUE(sign_result.InvalidSigners().empty());
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+
+ auto decrpypt_output_file = GetTempFilePath();
+ auto [err_0, data_object_0] =
+ GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file,
+ decrpypt_output_file);
+
+ ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE((data_object_0->Check<GpgDecryptResult, GpgVerifyResult>()));
+ auto decrypt_result = ExtractParams<GpgDecryptResult>(data_object_0, 0);
+ auto verify_reult = ExtractParams<GpgVerifyResult>(data_object_0, 1);
+
+ ASSERT_FALSE(decrypt_result.Recipients().empty());
+ ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93");
+ ASSERT_FALSE(verify_reult.GetSignature().empty());
+ ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(),
+ "8933EB283A18995F45D61DAC021D89771B680FFB");
+
+ const auto [read_success, out_buffer] =
+ ReadFileGFBuffer(decrpypt_output_file);
+ ASSERT_TRUE(read_success);
+ ASSERT_EQ(buffer, out_buffer);
}
} // namespace GpgFrontend::Test
diff --git a/src/test/core/GpgCoreTestImportExport.cpp b/src/test/core/GpgCoreTestImportExport.cpp
index faf8b58a..8cb720ff 100644
--- a/src/test/core/GpgCoreTestImportExport.cpp
+++ b/src/test/core/GpgCoreTestImportExport.cpp
@@ -26,7 +26,6 @@
*
*/
-#include <string>
#include <vector>
#include "GpgCoreTest.h"
diff --git a/src/test/core/GpgCoreTestKeyModel.cpp b/src/test/core/GpgCoreTestKeyModel.cpp
index cf1fd9ea..1e75a7f9 100644
--- a/src/test/core/GpgCoreTestKeyModel.cpp
+++ b/src/test/core/GpgCoreTestKeyModel.cpp
@@ -84,16 +84,16 @@ TEST_F(GpgCoreTest, GpgKeyTest) {
ASSERT_EQ(key.GetId(), "81704859182661FB");
ASSERT_EQ(key.GetFingerprint(), "9490795B78F8AFE9F93BD09281704859182661FB");
ASSERT_EQ(key.GetExpireTime(),
- QDateTime::fromString("20230905T040000", Qt::ISODate));
+ QDateTime::fromString("2023-09-05T04:00:00Z", Qt::ISODate));
ASSERT_EQ(key.GetPublicKeyAlgo(), "RSA");
+ ASSERT_EQ(key.GetKeyAlgo(), "RSA3072");
ASSERT_EQ(key.GetPrimaryKeyLength(), 3072);
ASSERT_EQ(key.GetLastUpdateTime(),
- QDateTime::fromString("19700101T000000", Qt::ISODate));
+ QDateTime::fromString("1970-01-01T00:00:00Z", Qt::ISODate));
ASSERT_EQ(key.GetCreateTime(),
- QDateTime::fromString("20210905T060153", Qt::ISODate));
+ QDateTime::fromString("2021-09-05T06:01:53Z", Qt::ISODate));
ASSERT_EQ(key.GetOwnerTrust(), "Unknown");
-
ASSERT_EQ(key.IsExpired(),
key.GetExpireTime() < QDateTime::currentDateTime());
}
@@ -104,12 +104,26 @@ TEST_F(GpgCoreTest, GpgSubKeyTest) {
auto sub_keys = key.GetSubKeys();
ASSERT_EQ(sub_keys->size(), 2);
+ auto& main_key = sub_keys->front();
+
+ ASSERT_EQ(main_key.GetID(), "81704859182661FB");
+ ASSERT_EQ(main_key.GetFingerprint(),
+ "9490795B78F8AFE9F93BD09281704859182661FB");
+ ASSERT_EQ(main_key.GetExpireTime(),
+ QDateTime::fromString("2023-09-05T04:00:00Z", Qt::ISODate));
+ ASSERT_EQ(main_key.GetPubkeyAlgo(), "RSA");
+ ASSERT_EQ(main_key.GetKeyAlgo(), "RSA3072");
+ ASSERT_EQ(main_key.GetKeyLength(), 3072);
+ ASSERT_EQ(main_key.GetCreateTime(),
+ QDateTime::fromString("2021-09-05T06:01:53Z", Qt::ISODate));
+ ASSERT_FALSE(main_key.IsCardKey());
+
auto& sub_key = sub_keys->back();
ASSERT_FALSE(sub_key.IsRevoked());
ASSERT_FALSE(sub_key.IsDisabled());
ASSERT_EQ(sub_key.GetCreateTime(),
- QDateTime::fromString("20210905T060153", Qt::ISODate));
+ QDateTime::fromString("2021-09-05T06:01:53Z", Qt::ISODate));
ASSERT_FALSE(sub_key.IsCardKey());
ASSERT_TRUE(sub_key.IsPrivateKey());
@@ -117,13 +131,14 @@ TEST_F(GpgCoreTest, GpgSubKeyTest) {
ASSERT_EQ(sub_key.GetFingerprint(),
"50D37E8F8EE7340A6794E0592B36803235B5E25B");
ASSERT_EQ(sub_key.GetKeyLength(), 3072);
+ ASSERT_EQ(sub_key.GetKeyAlgo(), "RSA3072");
ASSERT_EQ(sub_key.GetPubkeyAlgo(), "RSA");
ASSERT_FALSE(sub_key.IsHasCertificationCapability());
ASSERT_FALSE(sub_key.IsHasAuthenticationCapability());
ASSERT_FALSE(sub_key.IsHasSigningCapability());
ASSERT_TRUE(sub_key.IsHasEncryptionCapability());
- ASSERT_EQ(key.GetExpireTime(),
- QDateTime::fromString("20230905T040000", Qt::ISODate));
+ ASSERT_EQ(sub_key.GetExpireTime(),
+ QDateTime::fromString("2023-09-05T04:00:00Z", Qt::ISODate));
ASSERT_EQ(sub_key.IsExpired(),
sub_key.GetExpireTime() < QDateTime::currentDateTime());
diff --git a/src/test/core/GpgCoreTestKeygen.cpp b/src/test/core/GpgCoreTestKeygen.cpp
index 57e7cbb9..8a473aea 100644
--- a/src/test/core/GpgCoreTestKeygen.cpp
+++ b/src/test/core/GpgCoreTestKeygen.cpp
@@ -26,15 +26,9 @@
*
*/
-#include <gtest/gtest.h>
-#include <qeventloop.h>
-
-#include <cstddef>
-
#include "GpgCoreTest.h"
#include "core/function/gpg/GpgKeyGetter.h"
#include "core/function/gpg/GpgKeyOpera.h"
-#include "core/function/result_analyse/GpgResultAnalyse.h"
#include "core/model/GpgGenKeyInfo.h"
#include "core/model/GpgGenerateKeyResult.h"
#include "core/model/GpgKey.h"
@@ -43,170 +37,466 @@
namespace GpgFrontend::Test {
-TEST_F(GpgCoreTest, GenerateKeyTest) {
+TEST_F(GpgCoreTest, GenerateKeyRSA2048Test) {
auto keygen_info = SecureCreateSharedObject<GenKeyInfo>();
keygen_info->SetName("foo_0");
keygen_info->SetEmail("[email protected]");
- keygen_info->SetComment("");
- keygen_info->SetKeyLength(1024);
+ keygen_info->SetComment("foobar");
+ keygen_info->SetKeyLength(2048);
keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[0]));
+ keygen_info->SetAllowAuthentication(true);
+ keygen_info->SetAllowCertification(true);
+ keygen_info->SetAllowEncryption(true);
+ keygen_info->SetAllowSigning(true);
keygen_info->SetNonExpired(true);
- keygen_info->SetNonPassPhrase(true);
+ keygen_info->SetNonPassPhrase(false);
- std::atomic_bool callback_called_flag{false};
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateKeySync(keygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ ASSERT_EQ(key.GetName(), "foo_0");
+ ASSERT_EQ(key.GetEmail(), "[email protected]");
+ ASSERT_EQ(key.GetComment(), "foobar");
+ ASSERT_EQ(key.GetPublicKeyAlgo(), "RSA");
+ ASSERT_EQ(key.GetOwnerTrustLevel(), 5);
+ ASSERT_EQ(key.GetPrimaryKeyLength(), 2048);
+ ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_TRUE(key.IsHasCertificationCapability());
+ ASSERT_TRUE(key.IsHasAuthenticationCapability());
+ ASSERT_TRUE(key.IsHasEncryptionCapability());
+ ASSERT_TRUE(key.IsHasSigningCapability());
+
+ ASSERT_TRUE(key.IsHasActualCertificationCapability());
+ ASSERT_TRUE(key.IsHasActualAuthenticationCapability());
+ ASSERT_TRUE(key.IsHasActualEncryptionCapability());
+ ASSERT_TRUE(key.IsHasActualSigningCapability());
GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
- .GenerateKey(keygen_info, [&callback_called_flag](
- GpgError err,
- const DataObjectPtr& data_object) {
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- ASSERT_EQ(data_object->GetObjectSize(), 1);
- ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
-
- auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
- ASSERT_TRUE(result.IsGood());
- auto fpr = result.GetFingerprint();
-
- auto key =
- GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr);
- ASSERT_TRUE(key.IsGood());
-
- GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr);
-
- callback_called_flag = true;
- ASSERT_FALSE(fpr.isEmpty());
- });
-
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ .DeleteKey(result.GetFingerprint());
}
-TEST_F(GpgCoreTest, GenerateKeyTest_1) {
+TEST_F(GpgCoreTest, GenerateKeyRSA1024NoPassTest) {
auto keygen_info = SecureCreateSharedObject<GenKeyInfo>();
keygen_info->SetName("foo_1");
keygen_info->SetEmail("[email protected]");
- keygen_info->SetComment("hello gpgfrontend");
+ keygen_info->SetComment("foobar_1");
+ keygen_info->SetKeyLength(2048);
keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[0]));
- keygen_info->SetKeyLength(4096);
+ keygen_info->SetAllowAuthentication(false);
+ keygen_info->SetAllowCertification(false);
+ keygen_info->SetAllowEncryption(false);
+ keygen_info->SetAllowSigning(false);
keygen_info->SetNonExpired(false);
- keygen_info->SetExpireTime(
- QDateTime::currentDateTime().addSecs(static_cast<qint64>(24 * 3600)));
- keygen_info->SetNonPassPhrase(false);
+ keygen_info->SetNonPassPhrase(true);
- std::atomic_bool callback_called_flag{false};
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateKeySync(keygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+ ASSERT_EQ(key.GetName(), "foo_1");
+ ASSERT_EQ(key.GetEmail(), "[email protected]");
+ ASSERT_EQ(key.GetComment(), "foobar_1");
+ ASSERT_EQ(key.GetPublicKeyAlgo(), "RSA");
+ ASSERT_EQ(key.GetOwnerTrustLevel(), 5);
+ ASSERT_EQ(key.GetPrimaryKeyLength(), 2048);
+ ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime());
+
+ ASSERT_TRUE(key.IsHasCertificationCapability());
+ ASSERT_FALSE(key.IsHasAuthenticationCapability());
+ ASSERT_FALSE(key.IsHasEncryptionCapability());
+ ASSERT_FALSE(key.IsHasSigningCapability());
+
+ ASSERT_TRUE(key.IsHasActualCertificationCapability());
+ ASSERT_FALSE(key.IsHasActualAuthenticationCapability());
+ ASSERT_FALSE(key.IsHasActualEncryptionCapability());
+ ASSERT_FALSE(key.IsHasActualSigningCapability());
GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
- .GenerateKey(keygen_info, [&callback_called_flag](
- GpgError err,
- const DataObjectPtr& data_object) {
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ .DeleteKey(result.GetFingerprint());
+}
- ASSERT_EQ(data_object->GetObjectSize(), 1);
- ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+TEST_F(GpgCoreTest, GenerateKeyRSA4096Test) {
+ auto keygen_info = SecureCreateSharedObject<GenKeyInfo>();
+ keygen_info->SetName("foo_1");
+ keygen_info->SetEmail("[email protected]");
+ keygen_info->SetComment("hello gpgfrontend");
+ keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[0]));
+ keygen_info->SetKeyLength(3072);
+ keygen_info->SetNonExpired(false);
- auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
- ASSERT_TRUE(result.IsGood());
- auto fpr = result.GetFingerprint();
+ auto expire_time =
+ QDateTime::currentDateTime().addSecs(static_cast<qint64>(24 * 3600));
+ keygen_info->SetExpireTime(expire_time);
+ keygen_info->SetNonPassPhrase(false);
- auto key =
- GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr);
- ASSERT_TRUE(key.IsGood());
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateKeySync(keygen_info);
- GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr);
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
- callback_called_flag = true;
- ASSERT_FALSE(fpr.isEmpty());
- });
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
- int retry_count = 2000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+ ASSERT_EQ(key.GetExpireTime().date(), expire_time.date());
- ASSERT_TRUE(callback_called_flag);
+ GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .DeleteKey(result.GetFingerprint());
}
-TEST_F(GpgCoreTest, GenerateKeyTest_4) {
+TEST_F(GpgCoreTest, GenerateKeyDSA2048Test) {
auto keygen_info = SecureCreateSharedObject<GenKeyInfo>();
- keygen_info->SetName("foo_2");
- keygen_info->SetEmail("[email protected]");
- keygen_info->SetComment("");
+ keygen_info->SetName("foo_1");
+ keygen_info->SetEmail("[email protected]");
+ keygen_info->SetComment("hello gpgfrontend");
keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[1]));
- keygen_info->SetNonExpired(true);
+ keygen_info->SetKeyLength(2048);
+ keygen_info->SetAllowAuthentication(true);
+ keygen_info->SetAllowCertification(true);
+ keygen_info->SetAllowEncryption(true);
+ keygen_info->SetAllowSigning(true);
+ keygen_info->SetNonExpired(false);
+
+ auto expire_time =
+ QDateTime::currentDateTime().addSecs(static_cast<qint64>(24 * 3600));
+ keygen_info->SetExpireTime(expire_time);
keygen_info->SetNonPassPhrase(false);
- std::atomic_bool callback_called_flag{false};
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateKeySync(keygen_info);
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+ ASSERT_EQ(key.GetName(), "foo_1");
+ ASSERT_EQ(key.GetEmail(), "[email protected]");
+ ASSERT_EQ(key.GetComment(), "hello gpgfrontend");
+ ASSERT_EQ(key.GetPublicKeyAlgo(), "DSA");
+ ASSERT_EQ(key.GetOwnerTrustLevel(), 5);
+ ASSERT_EQ(key.GetPrimaryKeyLength(), 2048);
+ ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime());
+
+ ASSERT_TRUE(key.IsHasCertificationCapability());
+ ASSERT_TRUE(key.IsHasAuthenticationCapability());
+ ASSERT_FALSE(key.IsHasEncryptionCapability());
+ ASSERT_TRUE(key.IsHasSigningCapability());
+
+ ASSERT_TRUE(key.IsHasActualCertificationCapability());
+ ASSERT_TRUE(key.IsHasActualAuthenticationCapability());
+ ASSERT_FALSE(key.IsHasActualEncryptionCapability());
+ ASSERT_TRUE(key.IsHasActualSigningCapability());
GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
- .GenerateKey(keygen_info, [&callback_called_flag](
- GpgError err,
- const DataObjectPtr& data_object) {
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
-
- auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
- ASSERT_TRUE(result.IsGood());
- auto fpr = result.GetFingerprint();
-
- auto key =
- GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr);
- ASSERT_TRUE(key.IsGood());
-
- GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr);
-
- callback_called_flag = true;
- ASSERT_FALSE(fpr.isEmpty());
- });
-
- int retry_count = 2000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
-
- ASSERT_TRUE(callback_called_flag);
+ .DeleteKey(result.GetFingerprint());
}
-TEST_F(GpgCoreTest, GenerateKeyTest_5) {
+TEST_F(GpgCoreTest, GenerateKeyED25519Test) {
auto keygen_info = SecureCreateSharedObject<GenKeyInfo>();
- keygen_info->SetName("foo_3");
- keygen_info->SetEmail("[email protected]");
- keygen_info->SetComment("");
+ keygen_info->SetName("foo_4");
+ keygen_info->SetEmail("[email protected]");
+ keygen_info->SetComment("hello gpgfrontend");
keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[2]));
- keygen_info->SetNonExpired(true);
+ keygen_info->SetKeyLength(0);
+ keygen_info->SetAllowAuthentication(true);
+ keygen_info->SetAllowCertification(true);
+ keygen_info->SetAllowEncryption(true);
+ keygen_info->SetAllowSigning(true);
+ keygen_info->SetNonExpired(false);
+
+ auto expire_time =
+ QDateTime::currentDateTime().addSecs(static_cast<qint64>(24 * 3600));
+ keygen_info->SetExpireTime(expire_time);
keygen_info->SetNonPassPhrase(false);
- std::atomic_bool callback_called_flag{false};
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateKeySync(keygen_info);
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+ ASSERT_EQ(key.GetName(), "foo_4");
+ ASSERT_EQ(key.GetEmail(), "[email protected]");
+ ASSERT_EQ(key.GetComment(), "hello gpgfrontend");
+ ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA");
+ ASSERT_EQ(key.GetOwnerTrustLevel(), 5);
+ ASSERT_EQ(key.GetPrimaryKeyLength(), 255);
+ ASSERT_GT(key.GetExpireTime(), QDateTime::currentDateTime());
+
+ ASSERT_TRUE(key.IsHasCertificationCapability());
+ ASSERT_TRUE(key.IsHasAuthenticationCapability());
+ ASSERT_FALSE(key.IsHasEncryptionCapability());
+ ASSERT_TRUE(key.IsHasSigningCapability());
+
+ ASSERT_TRUE(key.IsHasActualCertificationCapability());
+ ASSERT_TRUE(key.IsHasActualAuthenticationCapability());
+ ASSERT_FALSE(key.IsHasActualEncryptionCapability());
+ ASSERT_TRUE(key.IsHasActualSigningCapability());
GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
- .GenerateKey(keygen_info, [&callback_called_flag](
- GpgError err,
- const DataObjectPtr& data_object) {
- ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ .DeleteKey(result.GetFingerprint());
+}
- auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
- ASSERT_TRUE(result.IsGood());
- auto fpr = result.GetFingerprint();
+TEST_F(GpgCoreTest, GenerateKeyED25519CV25519Test) {
+ auto keygen_info = SecureCreateSharedObject<GenKeyInfo>();
+ keygen_info->SetName("foo_ec");
+ keygen_info->SetEmail("[email protected]");
+ keygen_info->SetComment("ecccc");
+ keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[3]));
+ keygen_info->SetAllowAuthentication(true);
+ keygen_info->SetAllowCertification(true);
+ keygen_info->SetAllowEncryption(true);
+ keygen_info->SetAllowSigning(true);
+ keygen_info->SetNonExpired(true);
+ keygen_info->SetNonPassPhrase(true);
- auto key =
- GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr);
- ASSERT_TRUE(key.IsGood());
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(std::get<2>(keygen_info->GetSupportedKeyAlgo()[3]));
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] =
+ GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateKeyWithSubkeySync(keygen_info, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE(
+ (data_object->Check<GpgGenerateKeyResult, GpgGenerateKeyResult>()));
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ auto fpr = result.GetFingerprint();
+ ASSERT_FALSE(fpr.isEmpty());
+
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr);
+ ASSERT_TRUE(key.IsGood());
+
+ ASSERT_EQ(key.GetName(), "foo_ec");
+ ASSERT_EQ(key.GetEmail(), "[email protected]");
+ ASSERT_EQ(key.GetComment(), "ecccc");
+ ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA");
+ ASSERT_EQ(key.GetKeyAlgo(), "ED25519");
+ ASSERT_EQ(key.GetOwnerTrustLevel(), 5);
+ ASSERT_EQ(key.GetPrimaryKeyLength(), 255);
+ ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_TRUE(key.IsHasCertificationCapability());
+ ASSERT_TRUE(key.IsHasAuthenticationCapability());
+ ASSERT_TRUE(key.IsHasEncryptionCapability());
+ ASSERT_TRUE(key.IsHasSigningCapability());
+
+ ASSERT_FALSE(key.GetSubKeys()->empty());
+ ASSERT_EQ(key.GetSubKeys()->size(), 2);
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "CV25519");
+ ASSERT_EQ(subkey.GetKeyLength(), 255);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_FALSE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_FALSE(subkey.IsHasSigningCapability());
+
+ ASSERT_TRUE(key.IsHasActualCertificationCapability());
+ ASSERT_TRUE(key.IsHasActualAuthenticationCapability());
+ ASSERT_TRUE(key.IsHasActualEncryptionCapability());
+ ASSERT_TRUE(key.IsHasActualSigningCapability());
+
+ GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr);
+}
- GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr);
+TEST_F(GpgCoreTest, GenerateKeyED25519NISTP256Test) {
+ auto keygen_info = SecureCreateSharedObject<GenKeyInfo>();
+ keygen_info->SetName("foo_ec2");
+ keygen_info->SetEmail("[email protected]");
+ keygen_info->SetComment("ecccc");
+ keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[4]));
+ keygen_info->SetAllowAuthentication(true);
+ keygen_info->SetAllowCertification(true);
+ keygen_info->SetAllowEncryption(true);
+ keygen_info->SetAllowSigning(true);
+ keygen_info->SetNonExpired(true);
+ keygen_info->SetNonPassPhrase(true);
- callback_called_flag = true;
- ASSERT_FALSE(fpr.isEmpty());
- });
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(std::get<2>(keygen_info->GetSupportedKeyAlgo()[4]));
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] =
+ GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateKeyWithSubkeySync(keygen_info, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE(
+ (data_object->Check<GpgGenerateKeyResult, GpgGenerateKeyResult>()));
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ auto fpr = result.GetFingerprint();
+ ASSERT_FALSE(fpr.isEmpty());
+
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr);
+ ASSERT_TRUE(key.IsGood());
+
+ ASSERT_EQ(key.GetName(), "foo_ec2");
+ ASSERT_EQ(key.GetEmail(), "[email protected]");
+ ASSERT_EQ(key.GetComment(), "ecccc");
+ ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA");
+ ASSERT_EQ(key.GetKeyAlgo(), "ED25519");
+ ASSERT_EQ(key.GetOwnerTrustLevel(), 5);
+ ASSERT_EQ(key.GetPrimaryKeyLength(), 255);
+ ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_TRUE(key.IsHasCertificationCapability());
+ ASSERT_TRUE(key.IsHasAuthenticationCapability());
+ ASSERT_TRUE(key.IsHasEncryptionCapability());
+ ASSERT_TRUE(key.IsHasSigningCapability());
+
+ ASSERT_FALSE(key.GetSubKeys()->empty());
+ ASSERT_EQ(key.GetSubKeys()->size(), 2);
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "NISTP256");
+ ASSERT_EQ(subkey.GetKeyLength(), 256);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_FALSE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_FALSE(subkey.IsHasSigningCapability());
+
+ ASSERT_TRUE(key.IsHasActualCertificationCapability());
+ ASSERT_TRUE(key.IsHasActualAuthenticationCapability());
+ ASSERT_TRUE(key.IsHasActualEncryptionCapability());
+ ASSERT_TRUE(key.IsHasActualSigningCapability());
+
+ GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr);
+}
- int retry_count = 1000;
- while (!callback_called_flag && retry_count-- > 0) {
- std::this_thread::sleep_for(std::chrono::milliseconds(10));
- }
+TEST_F(GpgCoreTest, GenerateKeyED25519BRAINPOOLP256R1Test) {
+ auto keygen_info = SecureCreateSharedObject<GenKeyInfo>();
+ keygen_info->SetName("foo_ec3");
+ keygen_info->SetEmail("[email protected]");
+ keygen_info->SetComment("ecccc3");
+ keygen_info->SetAlgo(std::get<1>(keygen_info->GetSupportedKeyAlgo()[5]));
+ keygen_info->SetAllowAuthentication(true);
+ keygen_info->SetAllowCertification(true);
+ keygen_info->SetAllowEncryption(true);
+ keygen_info->SetAllowSigning(true);
+ keygen_info->SetNonExpired(true);
+ keygen_info->SetNonPassPhrase(true);
- ASSERT_TRUE(callback_called_flag);
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(std::get<2>(keygen_info->GetSupportedKeyAlgo()[5]));
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] =
+ GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateKeyWithSubkeySync(keygen_info, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_TRUE(
+ (data_object->Check<GpgGenerateKeyResult, GpgGenerateKeyResult>()));
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ auto fpr = result.GetFingerprint();
+ ASSERT_FALSE(fpr.isEmpty());
+
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel).GetKey(fpr);
+ ASSERT_TRUE(key.IsGood());
+
+ ASSERT_EQ(key.GetName(), "foo_ec3");
+ ASSERT_EQ(key.GetEmail(), "[email protected]");
+ ASSERT_EQ(key.GetComment(), "ecccc3");
+ ASSERT_EQ(key.GetPublicKeyAlgo(), "EdDSA");
+ ASSERT_EQ(key.GetKeyAlgo(), "ED25519");
+ ASSERT_EQ(key.GetOwnerTrustLevel(), 5);
+ ASSERT_EQ(key.GetPrimaryKeyLength(), 255);
+ ASSERT_EQ(key.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_TRUE(key.IsHasCertificationCapability());
+ ASSERT_TRUE(key.IsHasAuthenticationCapability());
+ ASSERT_TRUE(key.IsHasEncryptionCapability());
+ ASSERT_TRUE(key.IsHasSigningCapability());
+
+ ASSERT_FALSE(key.GetSubKeys()->empty());
+ ASSERT_EQ(key.GetSubKeys()->size(), 2);
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "BRAINPOOLP256R1");
+ ASSERT_EQ(subkey.GetKeyLength(), 256);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_FALSE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_FALSE(subkey.IsHasSigningCapability());
+
+ ASSERT_TRUE(key.IsHasActualCertificationCapability());
+ ASSERT_TRUE(key.IsHasActualAuthenticationCapability());
+ ASSERT_TRUE(key.IsHasActualEncryptionCapability());
+ ASSERT_TRUE(key.IsHasActualSigningCapability());
+
+ GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel).DeleteKey(fpr);
}
} // namespace GpgFrontend::Test
diff --git a/src/test/core/GpgCoreTestSubkeygen.cpp b/src/test/core/GpgCoreTestSubkeygen.cpp
new file mode 100644
index 00000000..983b6a7c
--- /dev/null
+++ b/src/test/core/GpgCoreTestSubkeygen.cpp
@@ -0,0 +1,298 @@
+/**
+ * Copyright (C) 2021 Saturneric <[email protected]>
+ *
+ * This file is part of GpgFrontend.
+ *
+ * GpgFrontend is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GpgFrontend is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>.
+ *
+ * The initial version of the source code is inherited from
+ * the gpg4usb project, which is under GPL-3.0-or-later.
+ *
+ * All the source code of GpgFrontend was modified and released by
+ * Saturneric <[email protected]> starting on May 12, 2021.
+ *
+ * SPDX-License-Identifier: GPL-3.0-or-later
+ *
+ */
+
+#include "GpgCoreTest.h"
+#include "core/function/gpg/GpgKeyGetter.h"
+#include "core/function/gpg/GpgKeyOpera.h"
+#include "core/model/GpgGenKeyInfo.h"
+#include "core/model/GpgGenerateKeyResult.h"
+#include "core/model/GpgKey.h"
+#include "core/utils/GpgUtils.h"
+#include "core/utils/MemoryUtils.h"
+
+namespace GpgFrontend::Test {
+
+TEST_F(GpgCoreTest, GenerateSubkeyRSA2048Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[0]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "RSA");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "RSA2048");
+ ASSERT_EQ(subkey.GetKeyLength(), 2048);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_TRUE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_TRUE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyDSA2048Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[1]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "DSA");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "DSA2048");
+ ASSERT_EQ(subkey.GetKeyLength(), 2048);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_TRUE(subkey.IsHasAuthenticationCapability());
+ ASSERT_FALSE(subkey.IsHasEncryptionCapability());
+ ASSERT_TRUE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyED25519Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[2]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "EdDSA");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "ED25519");
+ ASSERT_EQ(subkey.GetKeyLength(), 255);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_TRUE(subkey.IsHasAuthenticationCapability());
+ ASSERT_FALSE(subkey.IsHasEncryptionCapability());
+ ASSERT_TRUE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyCV25519Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[3]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "CV25519");
+ ASSERT_EQ(subkey.GetKeyLength(), 255);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_FALSE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_FALSE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyNISTP256Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[4]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "NISTP256");
+ ASSERT_EQ(subkey.GetKeyLength(), 256);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_FALSE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_FALSE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyBRAINPOOLP256R1Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[7]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "BRAINPOOLP256R1");
+ ASSERT_EQ(subkey.GetKeyLength(), 256);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_FALSE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_FALSE(subkey.IsHasSigningCapability());
+}
+
+} // namespace GpgFrontend::Test \ No newline at end of file