3201ded91f
-- * BrowserTestExtension/tests: - decryptTest.js: Check Decryption and return values of binary data - encryptTest.js: Return data type of armored/non-armored encryption - added a small encoded input png for testing * DemoExtension/maindemo.js: Fixed unexpected usage of the Demo encrypt (non-armored)
101 lines
3.7 KiB
JavaScript
101 lines
3.7 KiB
JavaScript
/* gpgme.js - Javascript integration for gpgme
|
|
* Copyright (C) 2018 Bundesamt für Sicherheit in der Informationstechnik
|
|
*
|
|
* This file is part of GPGME.
|
|
*
|
|
* GPGME is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU Lesser General Public License as
|
|
* published by the Free Software Foundation; either version 2.1 of
|
|
* the License, or (at your option) any later version.
|
|
*
|
|
* GPGME is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
* SPDX-License-Identifier: LGPL-2.1+
|
|
*
|
|
* Author(s):
|
|
* Maximilian Krambach <mkrambach@intevation.de>
|
|
*/
|
|
|
|
/* global describe, it, before, expect, Gpgmejs */
|
|
/* global bigString, inputvalues, sabotageMsg, binaryData */
|
|
|
|
describe('Decryption', function () {
|
|
let context = null;
|
|
const good_fpr = inputvalues.encrypt.good.fingerprint;
|
|
|
|
before(function (done){
|
|
const prm = Gpgmejs.init();
|
|
prm.then(function (gpgmejs){
|
|
context = gpgmejs;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('Decryption of random string fails', function (done) {
|
|
let data = bigString(20 * 1024);
|
|
context.decrypt({ data: data }).then(
|
|
function (){},
|
|
function (error){
|
|
expect(error).to.be.an('error');
|
|
expect(error.code).to.equal('GNUPG_ERROR');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('Decryption of slightly corrupted message fails', function (done) {
|
|
const data = bigString(10000);
|
|
context.encrypt({ data: data, publicKeys:good_fpr }).then(
|
|
function (enc){
|
|
context.decrypt({ data: sabotageMsg(enc.data) }).then(
|
|
function (){},
|
|
function (error){
|
|
expect(error).to.be.an('error');
|
|
expect(error.code).to.equal('GNUPG_ERROR');
|
|
done();
|
|
});
|
|
});
|
|
}).timeout(5000);
|
|
|
|
|
|
it('decrypt/verify operations return proper information', function (done){
|
|
const data = inputvalues.encryptSignedMessage;
|
|
context.decrypt({ data: data }).then(function (result){
|
|
expect(result).to.be.an('object');
|
|
expect(result.signatures).to.be.an('object');
|
|
expect(result.signatures.all_valid).to.be.true;
|
|
expect(result.signatures.count).to.equal(1);
|
|
expect(result.signatures.signatures.good).to.be.an('array');
|
|
expect(
|
|
result.signatures.signatures.good[0].fingerprint).to.equal(
|
|
good_fpr);
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('decrypt of a png, result as base64', function (done){
|
|
const data = binaryData.encryptedArmored;
|
|
context.decrypt({ data: data, expect: 'base64' })
|
|
.then(function (result){
|
|
expect(result.data).to.be.a('String');
|
|
expect(result.data).to.equal(binaryData.base64);
|
|
expect(result.format).to.equal('base64');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('decrypt of a png, result as Uint8Array', function (done){
|
|
const data = binaryData.encryptedArmored;
|
|
context.decrypt({ data: data, expect: 'uint8' })
|
|
.then(function (result){
|
|
expect(result.data).to.be.an('Uint8Array');
|
|
expect(result.format).to.equal('uint8');
|
|
done();
|
|
});
|
|
});
|
|
|
|
}); |