3201ded91f
-- * BrowserTestExtension/tests: - decryptTest.js: Check Decryption and return values of binary data - encryptTest.js: Return data type of armored/non-armored encryption - added a small encoded input png for testing * DemoExtension/maindemo.js: Fixed unexpected usage of the Demo encrypt (non-armored)
160 lines
6.1 KiB
JavaScript
160 lines
6.1 KiB
JavaScript
/* gpgme.js - Javascript integration for gpgme
|
|
* Copyright (C) 2018 Bundesamt für Sicherheit in der Informationstechnik
|
|
*
|
|
* This file is part of GPGME.
|
|
*
|
|
* GPGME is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU Lesser General Public License as
|
|
* published by the Free Software Foundation; either version 2.1 of
|
|
* the License, or (at your option) any later version.
|
|
*
|
|
* GPGME is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
* SPDX-License-Identifier: LGPL-2.1+
|
|
*
|
|
* Author(s):
|
|
* Maximilian Krambach <mkrambach@intevation.de>
|
|
*/
|
|
|
|
/* global describe, it, expect, before, Gpgmejs */
|
|
/* global inputvalues, fixedLengthString, bigString */
|
|
|
|
describe('Encryption', function () {
|
|
let context = null;
|
|
const good_fpr = inputvalues.encrypt.good.fingerprint;
|
|
before(function (done){
|
|
const prm = Gpgmejs.init();
|
|
prm.then(function (gpgmejs){
|
|
context = gpgmejs;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('Successful encrypt', function (done) {
|
|
const data = inputvalues.encrypt.good.data;
|
|
context.encrypt({ data: data, publicKeys: good_fpr })
|
|
.then(function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a('string');
|
|
expect(answer.data).to.include('BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include('END PGP MESSAGE');
|
|
done();
|
|
});
|
|
});
|
|
|
|
|
|
it( 'encrypt with \'armor\': true should returned an armored block',
|
|
function (done){
|
|
const data = bigString(1000);
|
|
context.encrypt({ data: data, publicKeys: good_fpr, armor: true })
|
|
.then(function (answer){
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a('string');
|
|
expect(answer.data).to.include('BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include('END PGP MESSAGE');
|
|
expect(answer.format).to.equal('ascii');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it( 'encrypt with \'armor\': false and \'expected\': \'uint8\' returns ' +
|
|
'an Uint8Array', function (done) {
|
|
const data = bigString(1000);
|
|
context.encrypt({
|
|
data: data, publicKeys: good_fpr, armor: false, expect: 'uint8'
|
|
}).then(function (answer){
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a('Uint8Array');
|
|
expect(answer.format).to.equal('uint8');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it( 'encrypt with \'armor\': false and \'expected\': \'base64\' returns ' +
|
|
'a base64 string', function (done) {
|
|
const data = bigString(1000);
|
|
context.encrypt({
|
|
data: data, publicKeys: good_fpr, armor: false, expect: 'base64'
|
|
}).then(function (answer){
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a('string');
|
|
expect(answer.format).to.equal('base64');
|
|
done();
|
|
});
|
|
});
|
|
|
|
const sizes = [5,20,50];
|
|
for (let i=0; i < sizes.length; i++) {
|
|
it('Successful encrypt a ' + sizes[i] + 'MB message', function (done) {
|
|
const data = fixedLengthString(sizes[i]);
|
|
context.encrypt({ data: data, publicKeys: good_fpr })
|
|
.then(function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a('string');
|
|
expect(answer.data).to.include('BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include('END PGP MESSAGE');
|
|
done();
|
|
});
|
|
}).timeout(20000);
|
|
}
|
|
|
|
it('Sending encryption without keys fails', function (done) {
|
|
const data = inputvalues.encrypt.good.data;
|
|
context.encrypt({ data: data }).then(function (answer) {
|
|
expect(answer).to.be.undefined;
|
|
}, function (error){
|
|
expect(error).to.be.an('Error');
|
|
expect(error.code).to.equal('MSG_INCOMPLETE');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('Sending encryption without data fails', function (done) {
|
|
context.encrypt({ data: null, publicKeys: good_fpr })
|
|
.then(function (answer) {
|
|
expect(answer).to.be.undefined;
|
|
}, function (error) {
|
|
expect(error).to.be.an.instanceof(Error);
|
|
expect(error.code).to.equal('MSG_INCOMPLETE');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('Sending encryption with non existing keys fails', function (done) {
|
|
const data = inputvalues.encrypt.good.data;
|
|
const bad_fpr = inputvalues.encrypt.bad.fingerprint;
|
|
context.encrypt({ data:data, publicKeys: bad_fpr })
|
|
.then(function (answer) {
|
|
expect(answer).to.be.undefined;
|
|
}, function (error){
|
|
expect(error).to.be.an('Error');
|
|
expect(error.code).to.not.be.undefined;
|
|
expect(error.code).to.equal('GNUPG_ERROR');
|
|
done();
|
|
});
|
|
}).timeout(5000);
|
|
|
|
it('Overly large message ( > 64MB) is rejected', function (done) {
|
|
const data = fixedLengthString(65);
|
|
context.encrypt({ data: data, publicKeys: good_fpr })
|
|
.then(function (answer) {
|
|
expect(answer).to.be.undefined;
|
|
}, function (error){
|
|
expect(error).to.be.an.instanceof(Error);
|
|
// TODO: there is a 64 MB hard limit at least in chrome at:
|
|
// chromium//extensions/renderer/messaging_util.cc:
|
|
// kMaxMessageLength
|
|
// The error will be a browser error, not from gnupg or from
|
|
// this library
|
|
done();
|
|
});
|
|
}).timeout(8000);
|
|
|
|
|
|
});
|