aboutsummaryrefslogtreecommitdiffstats
path: root/test/GpgCoreTestBasicOpera.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'test/GpgCoreTestBasicOpera.cpp')
-rw-r--r--test/GpgCoreTestBasicOpera.cpp230
1 files changed, 0 insertions, 230 deletions
diff --git a/test/GpgCoreTestBasicOpera.cpp b/test/GpgCoreTestBasicOpera.cpp
deleted file mode 100644
index 57339453..00000000
--- a/test/GpgCoreTestBasicOpera.cpp
+++ /dev/null
@@ -1,230 +0,0 @@
-/**
- * Copyright (C) 2021 Saturneric
- *
- * This file is part of GpgFrontend.
- *
- * GpgFrontend is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * GpgFrontend is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>.
- *
- * The initial version of the source code is inherited from
- * the gpg4usb project, which is under GPL-3.0-or-later.
- *
- * All the source code of GpgFrontend was modified and released by
- * Saturneric<[email protected]> starting on May 12, 2021.
- *
- * SPDX-License-Identifier: GPL-3.0-or-later
- *
- */
-
-#include <gtest/gtest.h>
-
-#include <string>
-#include <vector>
-
-#include "GpgFrontendTest.h"
-#include "gpg/GpgConstants.h"
-#include "gpg/function/GpgBasicOperator.h"
-#include "gpg/function/GpgKeyGetter.h"
-#include "gpg/result_analyse/GpgDecryptResultAnalyse.h"
-
-using namespace GpgFrontend;
-
-TEST_F(GpgCoreTest, CoreEncryptDecrTest) {
- auto encrypt_key = GpgKeyGetter::GetInstance(default_channel)
- .GetPubkey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
- ByteArray encrypt_text = "Hello GpgFrontend!";
- ByteArrayPtr encr_out_data;
- GpgEncrResult e_result;
- KeyListPtr keys = std::make_unique<KeyArgsList>();
- keys->push_back(std::move(encrypt_key));
- auto err =
- BasicOperator::GetInstance(default_channel)
- .Encrypt(std::move(keys), encrypt_text, encr_out_data, e_result);
- ASSERT_EQ(e_result->invalid_recipients, nullptr);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
-
- GpgDecrResult d_result;
- ByteArrayPtr decr_out_data;
- err = BasicOperator::GetInstance(default_channel)
- .Decrypt(*encr_out_data, decr_out_data, d_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
- ASSERT_NE(d_result->recipients, nullptr);
- ASSERT_EQ(std::string(d_result->recipients->keyid), "F89C95A05088CC93");
- ASSERT_EQ(*decr_out_data, encrypt_text);
-}
-
-TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_1) {
- ByteArrayPtr encr_out_data = std::make_unique<ByteArray>(
- "-----BEGIN PGP MESSAGE-----\n"
- "\n"
- "hQEMA6UM/S9sZ32MAQf9Fb6gp6nvgKTQBv2mmjXia6ODXYq6kNeLsPVzLCbHyWOs\n"
- "0GDED11R1NksA3EQxFf4fzLkDpbo68r5bWy7c28c99Fr68IRET19Tw6Gu65MQezD\n"
- "Rdzo1oVqmK9sfKqOT3+0S2H+suFYw5kfBztMZLVGGl9R9fOXdKcj0fqGs2br3e9D\n"
- "ArBFqq07Bae2DD1J8mckWB2x9Uem4vjRiY+vEJcEdAS1N5xu1n7qzzyDgcRcS34X\n"
- "PNBQeTrFMc2RS7mnip2DbyZVEjORobhguK6xZyqXXbvFacStGWDLptV3dcCn4JRO\n"
- "dIORyt5wugqAtgE4qEGTvr/pJ/oXPw4Wve/trece/9I/AR38vW8ntVmDa/hV75iZ\n"
- "4QGAhQ8grD4kq31GHXHUOmBX51XXW9SINmplC8elEx3R460EUZJjjb0OvTih+eZH\n"
- "=8n2H\n"
- "-----END PGP MESSAGE-----");
-
- GpgDecrResult d_result;
- ByteArrayPtr decr_out_data;
- auto err = BasicOperator::GetInstance(default_channel)
- .Decrypt(*encr_out_data, decr_out_data, d_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_SECKEY);
- ASSERT_NE(d_result->recipients, nullptr);
- ASSERT_EQ(std::string(d_result->recipients->keyid), "A50CFD2F6C677D8C");
-}
-
-TEST_F(GpgCoreTest, CoreEncryptDecrTest_KeyNotFound_ResultAnalyse) {
- ByteArrayPtr encr_out_data = std::make_unique<ByteArray>(
- "-----BEGIN PGP MESSAGE-----\n"
- "\n"
- "hQEMA6UM/S9sZ32MAQf9Fb6gp6nvgKTQBv2mmjXia6ODXYq6kNeLsPVzLCbHyWOs\n"
- "0GDED11R1NksA3EQxFf4fzLkDpbo68r5bWy7c28c99Fr68IRET19Tw6Gu65MQezD\n"
- "Rdzo1oVqmK9sfKqOT3+0S2H+suFYw5kfBztMZLVGGl9R9fOXdKcj0fqGs2br3e9D\n"
- "ArBFqq07Bae2DD1J8mckWB2x9Uem4vjRiY+vEJcEdAS1N5xu1n7qzzyDgcRcS34X\n"
- "PNBQeTrFMc2RS7mnip2DbyZVEjORobhguK6xZyqXXbvFacStGWDLptV3dcCn4JRO\n"
- "dIORyt5wugqAtgE4qEGTvr/pJ/oXPw4Wve/trece/9I/AR38vW8ntVmDa/hV75iZ\n"
- "4QGAhQ8grD4kq31GHXHUOmBX51XXW9SINmplC8elEx3R460EUZJjjb0OvTih+eZH\n"
- "=8n2H\n"
- "-----END PGP MESSAGE-----");
-
- GpgDecrResult d_result;
- ByteArrayPtr decr_out_data;
- auto err = BasicOperator::GetInstance(default_channel)
- .Decrypt(*encr_out_data, decr_out_data, d_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_SECKEY);
- ASSERT_NE(d_result->recipients, nullptr);
- ASSERT_EQ(std::string(d_result->recipients->keyid), "A50CFD2F6C677D8C");
-
- DecryptResultAnalyse analyse{err, d_result};
- analyse.analyse();
- ASSERT_EQ(analyse.getStatus(), -1);
- ASSERT_FALSE(analyse.getResultReport().empty());
-}
-
-TEST_F(GpgCoreTest, CoreSignVerifyNormalTest) {
- auto encrypt_key = GpgKeyGetter::GetInstance(default_channel)
- .GetPubkey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
- ByteArray sign_text = "Hello GpgFrontend!";
- ByteArrayPtr sign_out_data;
- GpgSignResult s_result;
- KeyListPtr keys = std::make_unique<KeyArgsList>();
- keys->push_back(std::move(encrypt_key));
- auto err = BasicOperator::GetInstance(default_channel)
- .Sign(std::move(keys), sign_text, sign_out_data,
- GPGME_SIG_MODE_NORMAL, s_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
- ASSERT_EQ(s_result->invalid_signers, nullptr);
-
- GpgVerifyResult v_result;
- ByteArrayPtr sign_buff = nullptr;
- err = BasicOperator::GetInstance(default_channel)
- .Verify(*sign_out_data, sign_buff, v_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
- ASSERT_NE(v_result->signatures, nullptr);
- ASSERT_EQ(std::string(v_result->signatures->fpr),
- "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
- ASSERT_EQ(v_result->signatures->next, nullptr);
-}
-
-TEST_F(GpgCoreTest, CoreSignVerifyDetachTest) {
- auto encrypt_key = GpgKeyGetter::GetInstance(default_channel)
- .GetPubkey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
- ByteArray sign_text = "Hello GpgFrontend!";
- ByteArrayPtr sign_out_data;
- GpgSignResult s_result;
- KeyListPtr keys = std::make_unique<KeyArgsList>();
- keys->push_back(std::move(encrypt_key));
- auto err = BasicOperator::GetInstance(default_channel)
- .Sign(std::move(keys), sign_text, sign_out_data,
- GPGME_SIG_MODE_DETACH, s_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
- ASSERT_EQ(s_result->invalid_signers, nullptr);
-
- GpgVerifyResult v_result;
- err = BasicOperator::GetInstance(default_channel)
- .Verify(sign_text, sign_out_data, v_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
- ASSERT_NE(v_result->signatures, nullptr);
- ASSERT_EQ(std::string(v_result->signatures->fpr),
- "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
- ASSERT_EQ(v_result->signatures->next, nullptr);
-}
-
-TEST_F(GpgCoreTest, CoreSignVerifyClearTest) {
- auto sign_key = GpgKeyGetter::GetInstance(default_channel)
- .GetKey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
- ByteArray sign_text = "Hello GpgFrontend!";
- ByteArrayPtr sign_out_data;
- GpgSignResult s_result;
- KeyListPtr keys = std::make_unique<KeyArgsList>();
- keys->push_back(std::move(sign_key));
- auto err = BasicOperator::GetInstance(default_channel)
- .Sign(std::move(keys), sign_text, sign_out_data,
- GPGME_SIG_MODE_CLEAR, s_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
- ASSERT_EQ(s_result->invalid_signers, nullptr);
-
- GpgVerifyResult v_result;
- ByteArrayPtr sign_buff = nullptr;
- err = BasicOperator::GetInstance(default_channel)
- .Verify(*sign_out_data, sign_buff, v_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
- ASSERT_NE(v_result->signatures, nullptr);
- ASSERT_EQ(std::string(v_result->signatures->fpr),
- "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
- ASSERT_EQ(v_result->signatures->next, nullptr);
-}
-
-TEST_F(GpgCoreTest, CoreEncryptSignDecrVerifyTest) {
- auto encrypt_key = GpgKeyGetter::GetInstance(default_channel)
- .GetPubkey("467F14220CE8DCF780CF4BAD8465C55B25C9B7D1");
- auto sign_key = GpgKeyGetter::GetInstance(default_channel)
- .GetKey("8933EB283A18995F45D61DAC021D89771B680FFB");
- // Question?
- // ASSERT_FALSE(encrypt_key.is_private_key());
- ASSERT_TRUE(sign_key.is_private_key());
- ASSERT_TRUE(sign_key.CanSignActual());
- ByteArray encrypt_text = "Hello GpgFrontend!";
- ByteArrayPtr encr_out_data;
- GpgEncrResult e_result;
- GpgSignResult s_result;
-
- KeyListPtr keys = std::make_unique<KeyArgsList>(),
- sign_keys = std::make_unique<KeyArgsList>();
- keys->push_back(std::move(encrypt_key));
- sign_keys->push_back(std::move(sign_key));
-
- auto err = BasicOperator::GetInstance(default_channel)
- .EncryptSign(std::move(keys), std::move(sign_keys),
- encrypt_text, encr_out_data, e_result, s_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
- ASSERT_EQ(e_result->invalid_recipients, nullptr);
- ASSERT_EQ(s_result->invalid_signers, nullptr);
-
- GpgDecrResult d_result;
- GpgVerifyResult v_result;
- ByteArrayPtr decr_out_data = nullptr;
- err = BasicOperator::GetInstance(default_channel)
- .DecryptVerify(*encr_out_data, decr_out_data, d_result, v_result);
- ASSERT_EQ(check_gpg_error_2_err_code(err), GPG_ERR_NO_ERROR);
- ASSERT_NE(d_result->recipients, nullptr);
- ASSERT_EQ(std::string(d_result->recipients->keyid), "F89C95A05088CC93");
- ASSERT_EQ(*decr_out_data, encrypt_text);
- ASSERT_NE(v_result->signatures, nullptr);
- ASSERT_EQ(std::string(v_result->signatures->fpr),
- "8933EB283A18995F45D61DAC021D89771B680FFB");
- ASSERT_EQ(v_result->signatures->next, nullptr);
-}