diff options
Diffstat (limited to 'src/test/core/GpgCoreTestSubkeygen.cpp')
-rw-r--r-- | src/test/core/GpgCoreTestSubkeygen.cpp | 298 |
1 files changed, 298 insertions, 0 deletions
diff --git a/src/test/core/GpgCoreTestSubkeygen.cpp b/src/test/core/GpgCoreTestSubkeygen.cpp new file mode 100644 index 00000000..983b6a7c --- /dev/null +++ b/src/test/core/GpgCoreTestSubkeygen.cpp @@ -0,0 +1,298 @@ +/** + * Copyright (C) 2021 Saturneric <[email protected]> + * + * This file is part of GpgFrontend. + * + * GpgFrontend is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * GpgFrontend is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>. + * + * The initial version of the source code is inherited from + * the gpg4usb project, which is under GPL-3.0-or-later. + * + * All the source code of GpgFrontend was modified and released by + * Saturneric <[email protected]> starting on May 12, 2021. + * + * SPDX-License-Identifier: GPL-3.0-or-later + * + */ + +#include "GpgCoreTest.h" +#include "core/function/gpg/GpgKeyGetter.h" +#include "core/function/gpg/GpgKeyOpera.h" +#include "core/model/GpgGenKeyInfo.h" +#include "core/model/GpgGenerateKeyResult.h" +#include "core/model/GpgKey.h" +#include "core/utils/GpgUtils.h" +#include "core/utils/MemoryUtils.h" + +namespace GpgFrontend::Test { + +TEST_F(GpgCoreTest, GenerateSubkeyRSA2048Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[0])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "RSA"); + ASSERT_EQ(subkey.GetKeyAlgo(), "RSA2048"); + ASSERT_EQ(subkey.GetKeyLength(), 2048); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_TRUE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_TRUE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyDSA2048Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[1])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "DSA"); + ASSERT_EQ(subkey.GetKeyAlgo(), "DSA2048"); + ASSERT_EQ(subkey.GetKeyLength(), 2048); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_TRUE(subkey.IsHasAuthenticationCapability()); + ASSERT_FALSE(subkey.IsHasEncryptionCapability()); + ASSERT_TRUE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyED25519Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[2])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "EdDSA"); + ASSERT_EQ(subkey.GetKeyAlgo(), "ED25519"); + ASSERT_EQ(subkey.GetKeyLength(), 255); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_TRUE(subkey.IsHasAuthenticationCapability()); + ASSERT_FALSE(subkey.IsHasEncryptionCapability()); + ASSERT_TRUE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyCV25519Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[3])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); + ASSERT_EQ(subkey.GetKeyAlgo(), "CV25519"); + ASSERT_EQ(subkey.GetKeyLength(), 255); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_FALSE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_FALSE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyNISTP256Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[4])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); + ASSERT_EQ(subkey.GetKeyAlgo(), "NISTP256"); + ASSERT_EQ(subkey.GetKeyLength(), 256); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_FALSE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_FALSE(subkey.IsHasSigningCapability()); +} + +TEST_F(GpgCoreTest, GenerateSubkeyBRAINPOOLP256R1Test) { + auto main_key = GpgKeyGetter::GetInstance().GetKey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true); + subkeygen_info->SetAlgo( + std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[7])); + subkeygen_info->SetKeyLength(2048); + subkeygen_info->SetAllowAuthentication(true); + subkeygen_info->SetAllowCertification(true); + subkeygen_info->SetAllowEncryption(true); + subkeygen_info->SetAllowSigning(true); + subkeygen_info->SetNonExpired(true); + subkeygen_info->SetNonPassPhrase(true); + + auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel) + .GenerateSubkeySync(main_key, subkeygen_info); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_EQ(data_object->GetObjectSize(), 1); + ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>()); + + auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0); + ASSERT_TRUE(result.IsGood()); + ASSERT_FALSE(result.GetFingerprint().isEmpty()); + auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel) + .GetKey(result.GetFingerprint()); + ASSERT_TRUE(key.IsGood()); + + auto subkeys = key.GetSubKeys(); + auto& subkey = subkeys->back(); + + ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH"); + ASSERT_EQ(subkey.GetKeyAlgo(), "BRAINPOOLP256R1"); + ASSERT_EQ(subkey.GetKeyLength(), 256); + ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0)); + + ASSERT_FALSE(subkey.IsHasCertificationCapability()); + ASSERT_FALSE(subkey.IsHasAuthenticationCapability()); + ASSERT_TRUE(subkey.IsHasEncryptionCapability()); + ASSERT_FALSE(subkey.IsHasSigningCapability()); +} + +} // namespace GpgFrontend::Test
\ No newline at end of file |