aboutsummaryrefslogtreecommitdiffstats
path: root/src/test/core/GpgCoreTestSubkeygen.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/test/core/GpgCoreTestSubkeygen.cpp')
-rw-r--r--src/test/core/GpgCoreTestSubkeygen.cpp298
1 files changed, 298 insertions, 0 deletions
diff --git a/src/test/core/GpgCoreTestSubkeygen.cpp b/src/test/core/GpgCoreTestSubkeygen.cpp
new file mode 100644
index 00000000..983b6a7c
--- /dev/null
+++ b/src/test/core/GpgCoreTestSubkeygen.cpp
@@ -0,0 +1,298 @@
+/**
+ * Copyright (C) 2021 Saturneric <[email protected]>
+ *
+ * This file is part of GpgFrontend.
+ *
+ * GpgFrontend is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GpgFrontend is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>.
+ *
+ * The initial version of the source code is inherited from
+ * the gpg4usb project, which is under GPL-3.0-or-later.
+ *
+ * All the source code of GpgFrontend was modified and released by
+ * Saturneric <[email protected]> starting on May 12, 2021.
+ *
+ * SPDX-License-Identifier: GPL-3.0-or-later
+ *
+ */
+
+#include "GpgCoreTest.h"
+#include "core/function/gpg/GpgKeyGetter.h"
+#include "core/function/gpg/GpgKeyOpera.h"
+#include "core/model/GpgGenKeyInfo.h"
+#include "core/model/GpgGenerateKeyResult.h"
+#include "core/model/GpgKey.h"
+#include "core/utils/GpgUtils.h"
+#include "core/utils/MemoryUtils.h"
+
+namespace GpgFrontend::Test {
+
+TEST_F(GpgCoreTest, GenerateSubkeyRSA2048Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[0]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "RSA");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "RSA2048");
+ ASSERT_EQ(subkey.GetKeyLength(), 2048);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_TRUE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_TRUE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyDSA2048Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[1]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "DSA");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "DSA2048");
+ ASSERT_EQ(subkey.GetKeyLength(), 2048);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_TRUE(subkey.IsHasAuthenticationCapability());
+ ASSERT_FALSE(subkey.IsHasEncryptionCapability());
+ ASSERT_TRUE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyED25519Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[2]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "EdDSA");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "ED25519");
+ ASSERT_EQ(subkey.GetKeyLength(), 255);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_TRUE(subkey.IsHasAuthenticationCapability());
+ ASSERT_FALSE(subkey.IsHasEncryptionCapability());
+ ASSERT_TRUE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyCV25519Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[3]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "CV25519");
+ ASSERT_EQ(subkey.GetKeyLength(), 255);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_FALSE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_FALSE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyNISTP256Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[4]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "NISTP256");
+ ASSERT_EQ(subkey.GetKeyLength(), 256);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_FALSE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_FALSE(subkey.IsHasSigningCapability());
+}
+
+TEST_F(GpgCoreTest, GenerateSubkeyBRAINPOOLP256R1Test) {
+ auto main_key = GpgKeyGetter::GetInstance().GetKey(
+ "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29");
+
+ auto subkeygen_info = SecureCreateSharedObject<GenKeyInfo>(true);
+ subkeygen_info->SetAlgo(
+ std::get<2>(subkeygen_info->GetSupportedSubkeyAlgo()[7]));
+ subkeygen_info->SetKeyLength(2048);
+ subkeygen_info->SetAllowAuthentication(true);
+ subkeygen_info->SetAllowCertification(true);
+ subkeygen_info->SetAllowEncryption(true);
+ subkeygen_info->SetAllowSigning(true);
+ subkeygen_info->SetNonExpired(true);
+ subkeygen_info->SetNonPassPhrase(true);
+
+ auto [err, data_object] = GpgKeyOpera::GetInstance(kGpgFrontendDefaultChannel)
+ .GenerateSubkeySync(main_key, subkeygen_info);
+
+ ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR);
+ ASSERT_EQ(data_object->GetObjectSize(), 1);
+ ASSERT_TRUE(data_object->Check<GpgGenerateKeyResult>());
+
+ auto result = ExtractParams<GpgGenerateKeyResult>(data_object, 0);
+ ASSERT_TRUE(result.IsGood());
+ ASSERT_FALSE(result.GetFingerprint().isEmpty());
+ auto key = GpgKeyGetter::GetInstance(kGpgFrontendDefaultChannel)
+ .GetKey(result.GetFingerprint());
+ ASSERT_TRUE(key.IsGood());
+
+ auto subkeys = key.GetSubKeys();
+ auto& subkey = subkeys->back();
+
+ ASSERT_EQ(subkey.GetPubkeyAlgo(), "ECDH");
+ ASSERT_EQ(subkey.GetKeyAlgo(), "BRAINPOOLP256R1");
+ ASSERT_EQ(subkey.GetKeyLength(), 256);
+ ASSERT_EQ(subkey.GetExpireTime(), QDateTime::fromMSecsSinceEpoch(0));
+
+ ASSERT_FALSE(subkey.IsHasCertificationCapability());
+ ASSERT_FALSE(subkey.IsHasAuthenticationCapability());
+ ASSERT_TRUE(subkey.IsHasEncryptionCapability());
+ ASSERT_FALSE(subkey.IsHasSigningCapability());
+}
+
+} // namespace GpgFrontend::Test \ No newline at end of file