aboutsummaryrefslogtreecommitdiffstats
path: root/lang/python/tests/t-quick-subkey-creation.py
blob: 0d9f71fba8dc27b0e3081e09fbc4f79937607de0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
#!/usr/bin/env python

# Copyright (C) 2017 g10 Code GmbH
#
# This file is part of GPGME.
#
# GPGME is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# GPGME is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
# or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General
# Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with this program; if not, see <http://www.gnu.org/licenses/>.

from __future__ import absolute_import, print_function, unicode_literals
del absolute_import, print_function, unicode_literals

import gpg
import itertools
import os
import shutil
import time

import support

alpha = "Alpha <[email protected]>"
bravo = "Bravo <[email protected]>"

def copy_configuration(destination):
    home = os.environ['GNUPGHOME']
    shutil.copy(os.path.join(home, "gpg.conf"), destination)
    shutil.copy(os.path.join(home, "gpg-agent.conf"), destination)

with support.TemporaryDirectory() as tmp:
    copy_configuration(tmp)
    with gpg.Context(home_dir=tmp) as ctx:
        res = ctx.create_key(alpha, certify=True)
        keys = list(ctx.keylist())
        assert len(keys) == 1, "Weird number of keys created"
        key = keys[0]
        assert key.fpr == res.fpr
        assert len(key.subkeys) == 1, "Expected one primary key and no subkeys"

        def get_subkey(fpr):
            k = ctx.get_key(fpr)
            for sk in k.subkeys:
                if sk.fpr == fpr:
                    return sk
            return None

        # Check gpg.constants.create.NOEXPIRE...
        res = ctx.create_subkey(key, expires=False)
        subkey = get_subkey(res.fpr)
        assert subkey.expires == 0, "Expected subkey not to expire"
        assert subkey.can_encrypt, \
            "Default subkey capabilities do not include encryption"

        t = 2 * 24 * 60 * 60
        slack = 5 * 60
        res = ctx.create_subkey(key, expires_in=t)
        subkey = get_subkey(res.fpr)
        assert abs(time.time() + t - subkey.expires) < slack, \
            "subkeys expiration time is off"

        # Check capabilities
        for sign, encrypt, authenticate in itertools.product([False, True],
                                                             [False, True],
                                                             [False, True]):
            # Filter some out
            if not (sign or encrypt or authenticate):
                # This triggers the default capabilities tested before.
                continue

            res = ctx.create_subkey(key, sign=sign, encrypt=encrypt,
                                    authenticate=authenticate)
            subkey = get_subkey(res.fpr)
            assert sign == subkey.can_sign
            assert encrypt == subkey.can_encrypt
            assert authenticate == subkey.can_authenticate

        # Check algorithm
        res = ctx.create_subkey(key, algorithm="rsa")
        subkey = get_subkey(res.fpr)
        assert subkey.pubkey_algo == 1

        # Check algorithm with size
        res = ctx.create_subkey(key, algorithm="rsa1024")
        subkey = get_subkey(res.fpr)
        assert subkey.pubkey_algo == 1
        assert subkey.length == 1024

        # Check algorithm future-default
        ctx.create_subkey(key, algorithm="future-default")

        # Check passphrase protection.  For this we create a new key
        # so that we have a key with just one encryption subkey.
        bravo_res = ctx.create_key(bravo, certify=True)
        bravo_key = ctx.get_key(bravo_res.fpr)
        assert len(bravo_key.subkeys) == 1, "Expected one primary key and no subkeys"

        passphrase = "streng geheim"
        res = ctx.create_subkey(bravo_key, passphrase=passphrase)
        ciphertext, _, _ = ctx.encrypt(b"hello there",
                                       recipients=[ctx.get_key(bravo_res.fpr)])

        cb_called = False
        def cb(*args):
            global cb_called
            cb_called = True
            return passphrase
        ctx.pinentry_mode = gpg.constants.PINENTRY_MODE_LOOPBACK
        ctx.set_passphrase_cb(cb)

        plaintext, _, _ = ctx.decrypt(ciphertext)
        assert plaintext == b"hello there"
        assert cb_called