pgpainless/painless-core/src/test/java/org/pgpainless/EncryptDecryptTest.java

191 lines
8.6 KiB
Java
Raw Normal View History

/*
* Copyright 2018 Paul Schaub.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.pgpainless;
2018-06-07 18:12:13 +02:00
import static junit.framework.TestCase.assertEquals;
import static junit.framework.TestCase.assertFalse;
2018-06-07 18:12:13 +02:00
import static junit.framework.TestCase.assertTrue;
import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
2018-06-08 15:29:09 +02:00
import java.nio.charset.Charset;
2018-06-10 17:12:44 +02:00
import java.security.InvalidAlgorithmParameterException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
2018-06-07 18:12:13 +02:00
import java.util.Arrays;
2018-06-10 17:12:44 +02:00
import java.util.logging.Level;
import java.util.logging.Logger;
2018-06-07 18:12:13 +02:00
import org.bouncycastle.openpgp.PGPException;
import org.bouncycastle.openpgp.PGPPublicKeyRing;
import org.bouncycastle.openpgp.PGPSecretKeyRing;
import org.bouncycastle.util.io.Streams;
2018-06-10 17:12:44 +02:00
import org.junit.Ignore;
2018-06-07 18:12:13 +02:00
import org.junit.Test;
import org.pgpainless.algorithm.KeyFlag;
import org.pgpainless.algorithm.PublicKeyAlgorithm;
import org.pgpainless.algorithm.SymmetricKeyAlgorithm;
import org.pgpainless.decryption_verification.DecryptionStream;
import org.pgpainless.decryption_verification.PainlessResult;
import org.pgpainless.encryption_signing.EncryptionStream;
import org.pgpainless.key.collection.PGPKeyRing;
import org.pgpainless.key.generation.KeySpec;
import org.pgpainless.key.generation.type.ElGamal_GENERAL;
import org.pgpainless.key.generation.type.RSA_GENERAL;
import org.pgpainless.key.generation.type.length.ElGamalLength;
import org.pgpainless.key.generation.type.length.RsaLength;
import org.pgpainless.key.protection.SecretKeyRingProtector;
import org.pgpainless.key.protection.UnprotectedKeysProtector;
import org.pgpainless.util.BCUtil;
2018-06-07 18:12:13 +02:00
2018-06-10 17:12:44 +02:00
public class EncryptDecryptTest extends AbstractPGPainlessTest {
2018-06-07 18:12:13 +02:00
private static final Logger LOGGER = Logger.getLogger(EncryptDecryptTest.class.getName());
2018-06-10 17:12:44 +02:00
private static final Charset UTF8 = Charset.forName("UTF-8");
2018-06-07 18:12:13 +02:00
private static final String testMessage = "Ah, Juliet, if the measure of thy joy\n" +
"Be heaped like mine, and that thy skill be more\n" +
"To blazon it, then sweeten with thy breath\n" +
"This neighbor air, and let rich musics tongue\n" +
"Unfold the imagined happiness that both\n" +
"Receive in either by this dear encounter.";
public EncryptDecryptTest() {
LOGGER.log(Level.INFO, "Plain Length: " + testMessage.getBytes(UTF8).length);
}
2018-06-28 13:23:40 +02:00
@Test
public void freshKeysRsaToElGamalTest()
throws PGPException, NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException,
IOException {
PGPKeyRing sender = PGPainless.generateKeyRing().simpleRsaKeyRing("romeo@montague.lit", RsaLength._3072);
PGPKeyRing recipient = PGPainless.generateKeyRing()
2018-06-28 13:23:40 +02:00
.withSubKey(KeySpec.getBuilder(ElGamal_GENERAL.withLength(ElGamalLength._3072)).withKeyFlags(KeyFlag.ENCRYPT_STORAGE, KeyFlag.ENCRYPT_COMMS).withDefaultAlgorithms())
.withMasterKey(KeySpec.getBuilder(RSA_GENERAL.withLength(RsaLength._4096)).withKeyFlags(KeyFlag.SIGN_DATA, KeyFlag.CERTIFY_OTHER).withDefaultAlgorithms())
.withPrimaryUserId("juliet@capulet.lit").withoutPassphrase().build();
encryptDecryptForSecretKeyRings(sender, recipient);
}
2018-06-10 17:12:44 +02:00
@Test
public void freshKeysRsaToRsaTest()
2018-06-10 17:12:44 +02:00
throws PGPException, NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException,
IOException {
PGPKeyRing sender = PGPainless.generateKeyRing().simpleRsaKeyRing("romeo@montague.lit", RsaLength._4096);
PGPKeyRing recipient = PGPainless.generateKeyRing().simpleRsaKeyRing("juliet@capulet.lit", RsaLength._4096);
2018-06-10 17:12:44 +02:00
encryptDecryptForSecretKeyRings(sender, recipient);
2018-06-07 18:12:13 +02:00
}
@Test
public void freshKeysEcToEcTest() throws IOException, PGPException, NoSuchAlgorithmException, NoSuchProviderException,
2018-06-10 17:12:44 +02:00
InvalidAlgorithmParameterException {
PGPKeyRing sender = PGPainless.generateKeyRing().simpleEcKeyRing("romeo@montague.lit");
PGPKeyRing recipient = PGPainless.generateKeyRing().simpleEcKeyRing("juliet@capulet.lit");
2018-06-10 17:12:44 +02:00
encryptDecryptForSecretKeyRings(sender, recipient);
2018-06-07 18:12:13 +02:00
}
@Test
public void freshKeysEcToRsaTest()
2018-06-10 17:12:44 +02:00
throws PGPException, NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException,
IOException {
PGPKeyRing sender = PGPainless.generateKeyRing().simpleEcKeyRing("romeo@montague.lit");
PGPKeyRing recipient = PGPainless.generateKeyRing().simpleRsaKeyRing("juliet@capulet.lit", RsaLength._4096);
2018-06-07 18:12:13 +02:00
encryptDecryptForSecretKeyRings(sender, recipient);
2018-06-10 17:12:44 +02:00
}
2018-06-07 18:12:13 +02:00
2018-06-10 17:12:44 +02:00
@Test
public void freshKeysRsaToEcTest()
2018-06-10 17:12:44 +02:00
throws PGPException, NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException,
IOException {
PGPKeyRing sender = PGPainless.generateKeyRing().simpleRsaKeyRing("romeo@montague.lit", RsaLength._4096);
PGPKeyRing recipient = PGPainless.generateKeyRing().simpleEcKeyRing("juliet@capulet.lit");
2018-06-07 18:12:13 +02:00
encryptDecryptForSecretKeyRings(sender, recipient);
2018-06-10 17:12:44 +02:00
}
2018-06-07 18:12:13 +02:00
2018-06-10 17:12:44 +02:00
@Ignore
private void encryptDecryptForSecretKeyRings(PGPKeyRing sender, PGPKeyRing recipient)
2018-06-10 17:12:44 +02:00
throws PGPException,
IOException {
PGPSecretKeyRing recipientSec = recipient.getSecretKeys();
PGPSecretKeyRing senderSec = sender.getSecretKeys();
PGPPublicKeyRing recipientPub = recipient.getPublicKeys();
PGPPublicKeyRing senderPub = sender.getPublicKeys();
2018-06-07 18:12:13 +02:00
2018-06-10 17:12:44 +02:00
SecretKeyRingProtector keyDecryptor = new UnprotectedKeysProtector();
2018-06-07 18:12:13 +02:00
2018-06-21 15:35:40 +02:00
byte[] secretMessage = testMessage.getBytes(UTF8);
2018-06-07 18:12:13 +02:00
2018-06-10 17:12:44 +02:00
ByteArrayOutputStream envelope = new ByteArrayOutputStream();
2018-06-07 18:12:13 +02:00
EncryptionStream encryptor = PGPainless.createEncryptor()
2018-06-10 17:12:44 +02:00
.onOutputStream(envelope)
2018-06-11 01:33:49 +02:00
.toRecipients(recipientPub)
2018-06-10 17:12:44 +02:00
.usingSecureAlgorithms()
.signWith(keyDecryptor, senderSec)
2018-06-10 17:12:44 +02:00
.noArmor();
2018-06-07 18:12:13 +02:00
PainlessResult encryptionResult = encryptor.getResult();
2018-07-08 19:31:53 +02:00
assertFalse(encryptionResult.getAllSignatureKeyFingerprints().isEmpty());
for (long keyId : encryptionResult.getAllSignatureKeyFingerprints()) {
assertTrue(BCUtil.keyRingContainsKeyWithId(senderPub, keyId));
}
assertFalse(encryptionResult.getRecipientKeyIds().isEmpty());
for (long keyId : encryptionResult.getRecipientKeyIds()) {
assertTrue(BCUtil.keyRingContainsKeyWithId(recipientPub, keyId));
}
assertEquals(SymmetricKeyAlgorithm.AES_256, encryptionResult.getSymmetricKeyAlgorithm());
2018-06-10 17:12:44 +02:00
Streams.pipeAll(new ByteArrayInputStream(secretMessage), encryptor);
encryptor.close();
byte[] encryptedSecretMessage = envelope.toByteArray();
2018-06-07 18:12:13 +02:00
LOGGER.log(Level.INFO, "Sender: " + PublicKeyAlgorithm.fromId(senderPub.getPublicKey().getAlgorithm()) +
" Receiver: " + PublicKeyAlgorithm.fromId(recipientPub.getPublicKey().getAlgorithm()) +
" Encrypted Length: " + encryptedSecretMessage.length);
2018-06-10 17:12:44 +02:00
// Juliet trieth to comprehend Romeos words
2018-06-07 18:12:13 +02:00
2018-06-10 17:12:44 +02:00
ByteArrayInputStream envelopeIn = new ByteArrayInputStream(encryptedSecretMessage);
2018-06-11 01:33:49 +02:00
DecryptionStream decryptor = PGPainless.createDecryptor()
2018-06-10 17:12:44 +02:00
.onInputStream(envelopeIn)
.decryptWith(keyDecryptor, BCUtil.keyRingsToKeyRingCollection(recipientSec))
2018-07-08 19:31:53 +02:00
.verifyWith(BCUtil.keyRingsToKeyRingCollection(senderPub))
2018-06-07 18:12:13 +02:00
.ignoreMissingPublicKeys()
.build();
2018-06-21 15:35:40 +02:00
ByteArrayOutputStream decryptedSecretMessage = new ByteArrayOutputStream();
2018-06-10 17:12:44 +02:00
Streams.pipeAll(decryptor, decryptedSecretMessage);
2018-06-07 18:12:13 +02:00
decryptor.close();
2018-06-21 15:35:40 +02:00
assertTrue(Arrays.equals(secretMessage, decryptedSecretMessage.toByteArray()));
2018-06-11 01:33:49 +02:00
PainlessResult result = decryptor.getResult();
assertTrue(result.containsVerifiedSignatureFrom(senderPub));
assertTrue(result.isIntegrityProtected());
assertTrue(result.isSigned());
assertTrue(result.isEncrypted());
assertTrue(result.isVerified());
2018-06-07 18:12:13 +02:00
}
}