0356a667c5
-- * Keyring.js - implemented importKey: importing one or more armored public key blocks. - implemented deleteKey: deleting a public Key from gpg. * Key.js renamed property Key.armor to Key.armored * Helpers.js: toKeyIDArray does not complain anymore if there are no keys. Not having Keys in e.g. signing keys in encrypt is legitimate and common, the complaints were getting spammy * Errors.js: gpgme_errors now always pass an optional additional message, for easier debugging in minified code * Connection.js: Fix in gpgme-json responses containing objects * eslintrc.json: Start using eslint. A cleanup to conform to it is not done yet * Added further tests for the new functionality
218 lines
9.1 KiB
JavaScript
218 lines
9.1 KiB
JavaScript
|
|
/* gpgme.js - Javascript integration for gpgme
|
|
* Copyright (C) 2018 Bundesamt für Sicherheit in der Informationstechnik
|
|
*
|
|
* This file is part of GPGME.
|
|
*
|
|
* GPGME is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU Lesser General Public License as
|
|
* published by the Free Software Foundation; either version 2.1 of
|
|
* the License, or (at your option) any later version.
|
|
*
|
|
* GPGME is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
* SPDX-License-Identifier: LGPL-2.1+
|
|
*/
|
|
|
|
describe('Encryption and Decryption', function () {
|
|
it('Successful encrypt and decrypt simple string', function (done) {
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(
|
|
inputvalues.encrypt.good.data,
|
|
inputvalues.encrypt.good.fingerprint).then(function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include('BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include('END PGP MESSAGE');
|
|
context.decrypt(answer.data).then(function (result) {
|
|
expect(result).to.not.be.empty;
|
|
expect(result.data).to.be.a('string');
|
|
expect(result.data).to.equal(inputvalues.encrypt.good.data);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
it('Decrypt simple non-ascii', function (done) {
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
let data = encryptedData;
|
|
context.decrypt(data).then(
|
|
function (result) {
|
|
expect(result).to.not.be.empty;
|
|
expect(result.data).to.be.a('string');
|
|
expect(result.data).to.equal(
|
|
'¡Äußerste µ€ før ñoquis@hóme! Добрый день\n');
|
|
done();
|
|
});
|
|
});
|
|
}).timeout(3000);
|
|
|
|
it('Roundtrip does not destroy trailing whitespace',
|
|
function (done) {
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
let data = 'Keks. \rKeks \n Keks \r\n';
|
|
context.encrypt(data,
|
|
inputvalues.encrypt.good.fingerprint).then(
|
|
function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include(
|
|
'BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include(
|
|
'END PGP MESSAGE');
|
|
context.decrypt(answer.data).then(
|
|
function (result) {
|
|
expect(result).to.not.be.empty;
|
|
expect(result.data).to.be.a('string');
|
|
expect(result.data).to.equal(data);
|
|
done();
|
|
|
|
});
|
|
});
|
|
});
|
|
}).timeout(5000);
|
|
|
|
for (let j = 0; j < inputvalues.encrypt.good.data_nonascii_32.length; j++){
|
|
it('Roundtrip with >1MB non-ascii input meeting default chunksize (' + (j + 1) + '/' + inputvalues.encrypt.good.data_nonascii_32.length + ')',
|
|
function (done) {
|
|
let input = inputvalues.encrypt.good.data_nonascii_32[j];
|
|
expect(input).to.have.length(32);
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
let data = '';
|
|
for (let i=0; i < 34 * 1024; i++){
|
|
data += input;
|
|
}
|
|
context.encrypt(data,
|
|
inputvalues.encrypt.good.fingerprint).then(
|
|
function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include(
|
|
'BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include(
|
|
'END PGP MESSAGE');
|
|
context.decrypt(answer.data).then(
|
|
function (result) {
|
|
expect(result).to.not.be.empty;
|
|
expect(result.data).to.be.a('string');
|
|
expect(result.data).to.equal(data);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
}).timeout(3000);
|
|
};
|
|
|
|
it('Random data, as string', function (done) {
|
|
let data = bigString(1000);
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(data,
|
|
inputvalues.encrypt.good.fingerprint).then(
|
|
function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include(
|
|
'BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include(
|
|
'END PGP MESSAGE');
|
|
context.decrypt(answer.data).then(
|
|
function (result) {
|
|
expect(result).to.not.be.empty;
|
|
expect(result.data).to.be.a('string');
|
|
expect(result.data).to.equal(data);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
}).timeout(3000);
|
|
|
|
it('Data, input as base64', function (done) {
|
|
let data = inputvalues.encrypt.good.data;
|
|
let b64data = btoa(data);
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(b64data,
|
|
inputvalues.encrypt.good.fingerprint,).then(
|
|
function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include(
|
|
'BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include(
|
|
'END PGP MESSAGE');
|
|
context.decrypt(answer.data).then(
|
|
function (result) {
|
|
expect(result).to.not.be.empty;
|
|
expect(result.data).to.be.a('string');
|
|
expect(data).to.equal(data);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
}).timeout(3000);
|
|
|
|
it('Random data, input as base64', function (done) {
|
|
let data = bigBoringString(0.001);
|
|
let b64data = btoa(data);
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(b64data,
|
|
inputvalues.encrypt.good.fingerprint, true).then(
|
|
function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include(
|
|
'BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include(
|
|
'END PGP MESSAGE');
|
|
context.decrypt(answer.data, true).then(
|
|
function (result) {
|
|
expect(result).to.not.be.empty;
|
|
expect(result.data).to.be.a('string');
|
|
expect(result.data).to.equal(b64data);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
}).timeout(3000);
|
|
|
|
it('Random data, input and output as base64', function (done) {
|
|
let data = bigBoringString(0.0001);
|
|
let b64data = btoa(data);
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(b64data,
|
|
inputvalues.encrypt.good.fingerprint).then(
|
|
function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
|
|
expect(answer.data).to.include(
|
|
'BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include(
|
|
'END PGP MESSAGE');
|
|
context.decrypt(answer.data, true).then(
|
|
function (result) {
|
|
expect(result).to.not.be.empty;
|
|
expect(result.data).to.be.a('string');
|
|
expect(result.data).to.equal(b64data);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
}).timeout(3000);
|
|
|
|
|
|
});
|