acf574af64
* lang/qt/src/Makefile.am, lang/qt/tests/Makefile.am (AM_CPPFLAGS): Add builddir instead of srcdir of C++ bindings as include path. * lang/qt/src/changeexpiryjob.cpp, lang/qt/src/changeexpiryjob.h, lang/qt/src/changeownertrustjob.h, lang/qt/src/dataprovider.cpp, lang/qt/src/dataprovider.h, lang/qt/src/debug.cpp, lang/qt/src/decryptverifyarchivejob.cpp, lang/qt/src/decryptverifyarchivejob.h, lang/qt/src/encryptarchivejob.cpp, lang/qt/src/encryptarchivejob.h, lang/qt/src/encryptjob.h, lang/qt/src/encryptjob_p.h, lang/qt/src/filelistdataprovider.cpp, lang/qt/src/filelistdataprovider.h, lang/qt/src/hierarchicalkeylistjob.h, lang/qt/src/importjob.cpp, lang/qt/src/importjob.h, lang/qt/src/importjob_p.h, lang/qt/src/job.h, lang/qt/src/keyformailboxjob.h, lang/qt/src/keylistjob.h, lang/qt/src/listallkeysjob.h, lang/qt/src/multideletejob.cpp, lang/qt/src/qgpgmeaddexistingsubkeyjob.cpp, lang/qt/src/qgpgmeadduseridjob.cpp, lang/qt/src/qgpgmebackend.cpp, lang/qt/src/qgpgmechangeexpiryjob.cpp, lang/qt/src/qgpgmechangeownertrustjob.cpp, lang/qt/src/qgpgmechangepasswdjob.cpp, lang/qt/src/qgpgmedecryptjob.cpp, lang/qt/src/qgpgmedecryptjob.h, lang/qt/src/qgpgmedecryptverifyarchivejob.cpp, lang/qt/src/qgpgmedecryptverifyarchivejob.h, lang/qt/src/qgpgmedecryptverifyjob.cpp, lang/qt/src/qgpgmedecryptverifyjob.h, lang/qt/src/qgpgmedeletejob.cpp, lang/qt/src/qgpgmedownloadjob.cpp, lang/qt/src/qgpgmeencryptarchivejob.cpp, lang/qt/src/qgpgmeencryptarchivejob.h, lang/qt/src/qgpgmeencryptjob.cpp, lang/qt/src/qgpgmeencryptjob.h, lang/qt/src/qgpgmeexportjob.cpp, lang/qt/src/qgpgmeimportfromkeyserverjob.cpp, lang/qt/src/qgpgmeimportfromkeyserverjob.h, lang/qt/src/qgpgmeimportjob.cpp, lang/qt/src/qgpgmeimportjob.h, lang/qt/src/qgpgmekeyformailboxjob.h, lang/qt/src/qgpgmekeygenerationjob.cpp, lang/qt/src/qgpgmekeygenerationjob.h, lang/qt/src/qgpgmekeylistjob.cpp, lang/qt/src/qgpgmekeylistjob.h, lang/qt/src/qgpgmelistallkeysjob.cpp, lang/qt/src/qgpgmelistallkeysjob.h, lang/qt/src/qgpgmenewcryptoconfig.cpp, lang/qt/src/qgpgmenewcryptoconfig.h, lang/qt/src/qgpgmequickjob.cpp, lang/qt/src/qgpgmereceivekeysjob.h, lang/qt/src/qgpgmerefreshsmimekeysjob.cpp, lang/qt/src/qgpgmerefreshsmimekeysjob.h, lang/qt/src/qgpgmerevokekeyjob.cpp, lang/qt/src/qgpgmesetprimaryuseridjob.cpp, lang/qt/src/qgpgmesignarchivejob.cpp, lang/qt/src/qgpgmesignarchivejob.h, lang/qt/src/qgpgmesignencryptarchivejob.cpp, lang/qt/src/qgpgmesignencryptarchivejob.h, lang/qt/src/qgpgmesignencryptjob.cpp, lang/qt/src/qgpgmesignencryptjob.h, lang/qt/src/qgpgmesignjob.cpp, lang/qt/src/qgpgmesignjob.h, lang/qt/src/qgpgmesignkeyjob.cpp, lang/qt/src/qgpgmetofupolicyjob.cpp, lang/qt/src/qgpgmeverifydetachedjob.cpp, lang/qt/src/qgpgmeverifydetachedjob.h, lang/qt/src/qgpgmeverifyopaquejob.cpp, lang/qt/src/qgpgmeverifyopaquejob.h, lang/qt/src/qgpgmewkdlookupjob.cpp, lang/qt/src/qgpgmewkdrefreshjob.cpp, lang/qt/src/qgpgmewkdrefreshjob.h, lang/qt/src/qgpgmewkspublishjob.cpp, lang/qt/src/quickjob.h, lang/qt/src/signarchivejob.cpp, lang/qt/src/signarchivejob.h, lang/qt/src/signencryptarchivejob.cpp, lang/qt/src/signencryptarchivejob.h, lang/qt/src/signencryptjob.h, lang/qt/src/signencryptjob_p.h, lang/qt/src/signjob.h, lang/qt/src/signjob_p.h, lang/qt/src/threadedjobmixin.cpp, lang/qt/src/threadedjobmixin.h, lang/qt/src/tofupolicyjob.h, lang/qt/src/util.cpp, lang/qt/src/wkdlookupresult.cpp, lang/qt/src/wkdlookupresult.h, lang/qt/src/wkdrefreshjob_p.h, lang/qt/tests/run-decryptverifyarchivejob.cpp, lang/qt/tests/run-decryptverifyjob.cpp, lang/qt/tests/run-encryptarchivejob.cpp, lang/qt/tests/run-encryptjob.cpp, lang/qt/tests/run-exportjob.cpp, lang/qt/tests/run-importjob.cpp, lang/qt/tests/run-keyformailboxjob.cpp, lang/qt/tests/run-receivekeysjob.cpp, lang/qt/tests/run-refreshkeysjob.cpp, lang/qt/tests/run-signarchivejob.cpp, lang/qt/tests/run-signjob.cpp, lang/qt/tests/run-verifydetachedjob.cpp, lang/qt/tests/run-verifyopaquejob.cpp, lang/qt/tests/run-wkdrefreshjob.cpp, lang/qt/tests/t-addexistingsubkey.cpp, lang/qt/tests/t-changeexpiryjob.cpp, lang/qt/tests/t-config.cpp, lang/qt/tests/t-decryptverify.cpp, lang/qt/tests/t-encrypt.cpp, lang/qt/tests/t-import.cpp, lang/qt/tests/t-keylist.cpp, lang/qt/tests/t-keylocate.cpp, lang/qt/tests/t-ownertrust.cpp, lang/qt/tests/t-remarks.cpp, lang/qt/tests/t-revokekey.cpp, lang/qt/tests/t-setprimaryuserid.cpp, lang/qt/tests/t-support.cpp, lang/qt/tests/t-support.h, lang/qt/tests/t-tofuinfo.cpp, lang/qt/tests/t-trustsignatures.cpp, lang/qt/tests/t-various.cpp, lang/qt/tests/t-verify.cpp, lang/qt/tests/t-wkdlookup.cpp, lang/qt/tests/t-wkspublish.cpp: Include GpgME++ headers with gpgme++/ prefix. -- This prepares the Qt bindings for building them separately from the C++ bindings. GnuPG-bug-id: 7110
267 lines
11 KiB
C++
267 lines
11 KiB
C++
/* t-addexistingsubkey.cpp
|
|
|
|
This file is part of qgpgme, the Qt API binding for gpgme
|
|
Copyright (c) 2022 g10 Code GmbH
|
|
Software engineering by Ingo Klöcker <dev@ingo-kloecker.de>
|
|
|
|
QGpgME is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License as
|
|
published by the Free Software Foundation; either version 2 of the
|
|
License, or (at your option) any later version.
|
|
|
|
QGpgME is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
In addition, as a special exception, the copyright holders give
|
|
permission to link the code of this program with any edition of
|
|
the Qt library by Trolltech AS, Norway (or with modified versions
|
|
of Qt that use the same license as Qt), and distribute linked
|
|
combinations including the two. You must obey the GNU General
|
|
Public License in all respects for all of the code used other than
|
|
Qt. If you modify this file, you may extend this exception to
|
|
your version of the file, but you are not obligated to do so. If
|
|
you do not wish to do so, delete this exception statement from
|
|
your version.
|
|
*/
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include "t-support.h"
|
|
|
|
#include "addexistingsubkeyjob.h"
|
|
#include "protocol.h"
|
|
|
|
#include <QSignalSpy>
|
|
#include <QTest>
|
|
|
|
#include <gpgme++/context.h>
|
|
#include <gpgme++/data.h>
|
|
#include <gpgme++/engineinfo.h>
|
|
|
|
#include <algorithm>
|
|
|
|
using namespace QGpgME;
|
|
using namespace GpgME;
|
|
|
|
static const char *requiredVersion = "2.3.5";
|
|
|
|
/* Test keys
|
|
sec# ed25519 2022-01-13 [SC]
|
|
1CB8C6A0317AA83F44FE009932392C82B814C8E0
|
|
uid [ unknown] source-key@example.net
|
|
ssb cv25519 2022-01-13 [E]
|
|
ssb cv25519 2022-01-13 [E] [expires: 2100-01-01]
|
|
|
|
sec ed25519 2022-01-13 [SC]
|
|
C3C87F0A3920B01F9E4450EA2B79F21D4DD10BFC
|
|
uid [ unknown] target-key@example.net
|
|
ssb cv25519 2022-01-13 [E]
|
|
* generated with
|
|
export GNUPGHOME=$(mktemp -d)
|
|
gpg -K
|
|
gpg --batch --pinentry-mode loopback --passphrase abc --quick-gen-key source-key@example.net default default never
|
|
fpr=$(gpg -k --with-colons source-key@example.net | grep ^fpr | head -1 | cut -d ':' -f 10)
|
|
gpg --batch --pinentry-mode loopback --passphrase abc --quick-add-key ${fpr} default default 21000101T120000
|
|
gpg --batch --pinentry-mode loopback --passphrase abc --quick-gen-key target-key@example.net default default never
|
|
gpg -K
|
|
gpg --export-secret-subkeys --armor --batch --pinentry-mode loopback --passphrase abc --comment source-key@example.net source-key@example.net | sed 's/\(.*\)/ "\1\\n"/'
|
|
gpg --export-secret-keys --armor --batch --pinentry-mode loopback --passphrase abc --comment target-key@example.net target-key@example.net | sed 's/\(.*\)/ "\1\\n"/'
|
|
#rm -rf ${GNUPGHOME}
|
|
unset GNUPGHOME
|
|
*/
|
|
static const char *testKeyData =
|
|
"-----BEGIN PGP PRIVATE KEY BLOCK-----\n"
|
|
"Comment: source-key@example.net\n"
|
|
"\n"
|
|
"lDsEYd/ujBYJKwYBBAHaRw8BAQdAwiZPINTcrpgmu6ZWSaPZlcRSd4nDuofVMhe7\n"
|
|
"c2XrFyT/AGUAR05VAbQWc291cmNlLWtleUBleGFtcGxlLm5ldIiUBBMWCgA8FiEE\n"
|
|
"HLjGoDF6qD9E/gCZMjksgrgUyOAFAmHf7owCGwMFCwkIBwIDIgIBBhUKCQgLAgQW\n"
|
|
"AgMBAh4HAheAAAoJEDI5LIK4FMjgupIA/Au2YEAT9dYdJd0eJCJerG5YAeoB+uBs\n"
|
|
"mBkgr6xXE0bIAP43b6u1Jtvf/Wm3BhRbLd5Tg67Ba4CIZ8ZLGng73FBoBpyLBGHf\n"
|
|
"7owSCisGAQQBl1UBBQEBB0Cpg8Qof/WShxROZZtmPnw24vTk0R8nIAF1CZJ0bG/C\n"
|
|
"SwMBCAf+BwMCtzxziVxQEor8w/VVzHp4/hVSCUyrpiX7Djf04cIMs2bFPduZLgxb\n"
|
|
"c1SXhlgiqU0YBNntbGGNdKjTP6FMbYWq1+NwQm6ZXtC76LPG7syM94h4BBgWCgAg\n"
|
|
"FiEEHLjGoDF6qD9E/gCZMjksgrgUyOAFAmHf7owCGwwACgkQMjksgrgUyOCI0wEA\n"
|
|
"+f56fkvDDUwMOMw7n4+GKpfJXpWhVL08ttccbBOa/9IA/2HYA/78ZaD8E5EyqAEK\n"
|
|
"Aj9Au+2oJu9V5qo92QEoqwYHnIsEYd/vgxIKKwYBBAGXVQEFAQEHQBa9FxJkm/9D\n"
|
|
"xABildkaYMrbJbu8BPk6uv9V8aLmv9FnAwEIB/4HAwIPhcbN8s6OzPz8/g78TrCh\n"
|
|
"xqQb2kygCEj+OQ4/XXU3lus2b5xS5h44LGt99Wisqx+wVPDXmPDJOaxjhHXDmJxd\n"
|
|
"/LplIEhykojSm3uUDxERiH4EGBYKACYWIQQcuMagMXqoP0T+AJkyOSyCuBTI4AUC\n"
|
|
"Yd/vgwIbDAUJkqcQPQAKCRAyOSyCuBTI4IUjAP9BTfOD+jy6lLmzNO9pquRSAxi/\n"
|
|
"PQuglGtpS0LQEJMEOwD+PFnsMe2EtQ+WVSDBeB7O0m61EXeY+RhpuhNtsNXVuwc=\n"
|
|
"=wIPU\n"
|
|
"-----END PGP PRIVATE KEY BLOCK-----\n"
|
|
"-----BEGIN PGP PRIVATE KEY BLOCK-----\n"
|
|
"Comment: target-key@example.net\n"
|
|
"\n"
|
|
"lIYEYd/v/RYJKwYBBAHaRw8BAQdAKoILWXG3yaLb2EniNKQLUjwsrvy5vgAN299J\n"
|
|
"W5cFbrz+BwMC/uKbCq3sK5H8QVtEQ/IxGmjWNBpy6c8EDlOG4APi4o4VE+bEYD8w\n"
|
|
"J3Kk/lzSm6ZT5vC6DDASks797omjXD+J7zZ0vtTPvheYi/nsVz2UebQWdGFyZ2V0\n"
|
|
"LWtleUBleGFtcGxlLm5ldIiUBBMWCgA8FiEEw8h/CjkgsB+eRFDqK3nyHU3RC/wF\n"
|
|
"AmHf7/0CGwMFCwkIBwIDIgIBBhUKCQgLAgQWAgMBAh4HAheAAAoJECt58h1N0Qv8\n"
|
|
"rXcBAPxnkXqpp4IY3iTKV5XAdo7Uys7U/joUD73rj2XEvgI1AQDhKK4PLxPhf3ki\n"
|
|
"FKU0RA7itxzOH+F8bQ5BdYS49jDPCpyLBGHf7/0SCisGAQQBl1UBBQEBB0Dq9rwA\n"
|
|
"hAA2UFJShFsLFp7+g4uhWDfuDa3VjeIQRM+9QgMBCAf+BwMCMfCTl0LNqsn836t5\n"
|
|
"f2ZHBuMcNs4JWYmdLAIVaewEHq7zhOsX3iB+/yxwu9g2mXc4XUJ1iQzXLOYwgGov\n"
|
|
"8jIovrr01hDkSg4rvM9JKMWdd4h4BBgWCgAgFiEEw8h/CjkgsB+eRFDqK3nyHU3R\n"
|
|
"C/wFAmHf7/0CGwwACgkQK3nyHU3RC/xyfAEAqnMdSv6FTAwAWrYvJqJtSVoEhjMn\n"
|
|
"3c2qMsu34Bk86/MBAKHbLFmdyePvHaxKeO8CkQDoJzK8rYzw3RAmq/5JsQkL\n"
|
|
"=rOVf\n"
|
|
"-----END PGP PRIVATE KEY BLOCK-----\n";
|
|
|
|
class AddExistingSubkeyJobTest : public QGpgMETest
|
|
{
|
|
Q_OBJECT
|
|
|
|
private Q_SLOTS:
|
|
|
|
void initTestCase()
|
|
{
|
|
QGpgMETest::initTestCase();
|
|
|
|
// set up the test fixture for this test
|
|
qputenv("GNUPGHOME", mGnupgHomeTestFixture.path().toUtf8());
|
|
QVERIFY(importSecretKeys(testKeyData, 2));
|
|
}
|
|
|
|
void init()
|
|
{
|
|
if (GpgME::engineInfo(GpgME::GpgEngine).engineVersion() < requiredVersion) {
|
|
QSKIP("gpg does not yet support adding an existing subkey to another key via the command API");
|
|
}
|
|
|
|
// set up a copy of the test fixture for each test function
|
|
mGnupgHomeTestCopy.reset(new QTemporaryDir{});
|
|
QVERIFY(copyKeyrings(mGnupgHomeTestFixture.path(), mGnupgHomeTestCopy->path()));
|
|
qputenv("GNUPGHOME", mGnupgHomeTestCopy->path().toUtf8());
|
|
}
|
|
|
|
void testAddExistingSubkeyAsync()
|
|
{
|
|
// Get the key the subkey should be added to
|
|
auto key = getTestKey("target-key@example.net");
|
|
QVERIFY(!key.isNull());
|
|
|
|
// Get the key with the subkey to add
|
|
auto sourceKey = getTestKey("source-key@example.net", 3);
|
|
QVERIFY(!sourceKey.isNull());
|
|
|
|
auto job = std::unique_ptr<AddExistingSubkeyJob>{openpgp()->addExistingSubkeyJob()};
|
|
hookUpPassphraseProvider(job.get());
|
|
|
|
Error result;
|
|
connect(job.get(), &AddExistingSubkeyJob::result,
|
|
job.get(), [this, &result](const Error &result_) {
|
|
result = result_;
|
|
Q_EMIT asyncDone();
|
|
});
|
|
QVERIFY(!job->start(key, sourceKey.subkey(1)));
|
|
job.release(); // after the job has been started it's on its own
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
QCOMPARE(result.code(), static_cast<int>(GPG_ERR_NO_ERROR));
|
|
key.update();
|
|
QCOMPARE(key.numSubkeys(), 3u);
|
|
}
|
|
|
|
void testAddExistingSubkeySync()
|
|
{
|
|
// Get the key the subkey should be added to
|
|
auto key = getTestKey("target-key@example.net");
|
|
QVERIFY(!key.isNull());
|
|
|
|
// Get the key with the subkey to add
|
|
auto sourceKey = getTestKey("source-key@example.net", 3);
|
|
QVERIFY(!sourceKey.isNull());
|
|
auto sourceSubkey = sourceKey.subkey(1);
|
|
QVERIFY(sourceSubkey.expirationTime() == 0);
|
|
|
|
auto job = std::unique_ptr<AddExistingSubkeyJob>{openpgp()->addExistingSubkeyJob()};
|
|
hookUpPassphraseProvider(job.get());
|
|
|
|
const auto result = job->exec(key, sourceSubkey);
|
|
|
|
QCOMPARE(result.code(), static_cast<int>(GPG_ERR_NO_ERROR));
|
|
key.update();
|
|
QCOMPARE(key.numSubkeys(), 3u);
|
|
QCOMPARE(key.subkey(2).expirationTime(), 0);
|
|
}
|
|
|
|
void testAddExistingSubkeyWithExpiration()
|
|
{
|
|
// Get the key the subkey should be added to
|
|
auto key = getTestKey("target-key@example.net");
|
|
QVERIFY(!key.isNull());
|
|
|
|
// Get the key with the subkey to add
|
|
auto sourceKey = getTestKey("source-key@example.net", 3);
|
|
QVERIFY(!sourceKey.isNull());
|
|
auto sourceSubkey = sourceKey.subkey(2);
|
|
QVERIFY(sourceSubkey.expirationTime() != 0);
|
|
|
|
auto job = std::unique_ptr<AddExistingSubkeyJob>{openpgp()->addExistingSubkeyJob()};
|
|
hookUpPassphraseProvider(job.get());
|
|
|
|
const auto result = job->exec(key, sourceSubkey);
|
|
|
|
if (sourceSubkey.expirationTime() > 0) {
|
|
QCOMPARE(result.code(), static_cast<int>(GPG_ERR_NO_ERROR));
|
|
key.update();
|
|
QCOMPARE(key.numSubkeys(), 3u);
|
|
|
|
// allow 1 second different expiration because gpg calculates with
|
|
// expiration as difference to current time and takes current time
|
|
// several times
|
|
const auto allowedDeltaTSeconds = 1;
|
|
const auto expectedExpirationRange = std::make_pair(
|
|
uint_least32_t(sourceSubkey.expirationTime()) - allowedDeltaTSeconds,
|
|
uint_least32_t(sourceSubkey.expirationTime()) + allowedDeltaTSeconds);
|
|
const auto actualExpiration = uint_least32_t(key.subkey(2).expirationTime());
|
|
QVERIFY2(actualExpiration >= expectedExpirationRange.first,
|
|
("actual: " + std::to_string(actualExpiration) +
|
|
"; expected: " + std::to_string(expectedExpirationRange.first)).c_str());
|
|
QVERIFY2(actualExpiration <= expectedExpirationRange.second,
|
|
("actual: " + std::to_string(actualExpiration) +
|
|
"; expected: " + std::to_string(expectedExpirationRange.second)).c_str());
|
|
} else {
|
|
// on 32-bit systems the expiration date of the test key overflows;
|
|
// in this case we expect an appropriate error code
|
|
QCOMPARE(result.code(), static_cast<int>(GPG_ERR_INV_TIME));
|
|
}
|
|
}
|
|
|
|
private:
|
|
Key getTestKey(const char *pattern, unsigned int expectedSubkeys = 2)
|
|
{
|
|
auto ctx = Context::create(OpenPGP);
|
|
VERIFY_OR_OBJECT(ctx);
|
|
|
|
Error err;
|
|
auto key = ctx->key(pattern, err, /*secret=*/true);
|
|
VERIFY_OR_OBJECT(!err);
|
|
VERIFY_OR_OBJECT(!key.isNull());
|
|
COMPARE_OR_OBJECT(key.numSubkeys(), expectedSubkeys);
|
|
for (unsigned int i = 0; i < key.numSubkeys(); ++i) {
|
|
VERIFY_OR_OBJECT(!key.subkey(i).isNull());
|
|
}
|
|
return key;
|
|
}
|
|
|
|
private:
|
|
QTemporaryDir mGnupgHomeTestFixture;
|
|
std::unique_ptr<QTemporaryDir> mGnupgHomeTestCopy;
|
|
};
|
|
|
|
QTEST_MAIN(AddExistingSubkeyJobTest)
|
|
|
|
#include "t-addexistingsubkey.moc"
|