mirror of
https://codeberg.org/PGPainless/sop-java.git
synced 2024-12-22 21:07:57 +01:00
Merge pull request #3 from pgpainless/indirectArgs
Treat password and sessionkkey arguments as indirect data types
This commit is contained in:
commit
25915d1204
11 changed files with 232 additions and 42 deletions
|
@ -6,6 +6,9 @@ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
# Changelog
|
# Changelog
|
||||||
|
|
||||||
|
## 1.2.0
|
||||||
|
- `encrypt`, `decrypt`: Interpret arguments of `--with-password` and `--with-session-key` as indirect data types (e.g. file references instead of strings)
|
||||||
|
|
||||||
## 1.1.0
|
## 1.1.0
|
||||||
- Initial release from new repository
|
- Initial release from new repository
|
||||||
- Implement SOP specification version 3
|
- Implement SOP specification version 3
|
|
@ -4,12 +4,15 @@
|
||||||
|
|
||||||
package sop.cli.picocli;
|
package sop.cli.picocli;
|
||||||
|
|
||||||
|
import java.io.ByteArrayOutputStream;
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.FileInputStream;
|
import java.io.FileInputStream;
|
||||||
import java.io.FileNotFoundException;
|
import java.io.FileNotFoundException;
|
||||||
|
import java.io.InputStream;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
|
||||||
import sop.exception.SOPGPException;
|
import sop.exception.SOPGPException;
|
||||||
|
import sop.util.UTF8Util;
|
||||||
|
|
||||||
public class FileUtil {
|
public class FileUtil {
|
||||||
|
|
||||||
|
@ -95,4 +98,17 @@ public class FileUtil {
|
||||||
}
|
}
|
||||||
return file;
|
return file;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static String stringFromInputStream(InputStream inputStream) throws IOException {
|
||||||
|
try {
|
||||||
|
ByteArrayOutputStream byteOut = new ByteArrayOutputStream();
|
||||||
|
byte[] buf = new byte[4096]; int read;
|
||||||
|
while ((read = inputStream.read(buf)) != -1) {
|
||||||
|
byteOut.write(buf, 0, read);
|
||||||
|
}
|
||||||
|
return UTF8Util.decodeUTF8(byteOut.toByteArray());
|
||||||
|
} finally {
|
||||||
|
inputStream.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -47,13 +47,13 @@ public class DecryptCmd implements Runnable {
|
||||||
|
|
||||||
@CommandLine.Option(
|
@CommandLine.Option(
|
||||||
names = {"--with-session-key"},
|
names = {"--with-session-key"},
|
||||||
description = "Enables decryption of the \"CIPHERTEXT\" using the session key directly against the \"SEIPD\" packet",
|
description = "Provide a session key file. Enables decryption of the \"CIPHERTEXT\" using the session key directly against the \"SEIPD\" packet",
|
||||||
paramLabel = "SESSIONKEY")
|
paramLabel = "SESSIONKEY")
|
||||||
List<String> withSessionKey = new ArrayList<>();
|
List<String> withSessionKey = new ArrayList<>();
|
||||||
|
|
||||||
@CommandLine.Option(
|
@CommandLine.Option(
|
||||||
names = {"--with-password"},
|
names = {"--with-password"},
|
||||||
description = "Enables decryption based on any \"SKESK\" packets in the \"CIPHERTEXT\"",
|
description = "Provide a password file. Enables decryption based on any \"SKESK\" packets in the \"CIPHERTEXT\"",
|
||||||
paramLabel = "PASSWORD")
|
paramLabel = "PASSWORD")
|
||||||
List<String> withPassword = new ArrayList<>();
|
List<String> withPassword = new ArrayList<>();
|
||||||
|
|
||||||
|
@ -194,7 +194,13 @@ public class DecryptCmd implements Runnable {
|
||||||
|
|
||||||
private void setWithSessionKeys(List<String> withSessionKey, Decrypt decrypt) {
|
private void setWithSessionKeys(List<String> withSessionKey, Decrypt decrypt) {
|
||||||
Pattern sessionKeyPattern = Pattern.compile("^\\d+:[0-9A-F]+$");
|
Pattern sessionKeyPattern = Pattern.compile("^\\d+:[0-9A-F]+$");
|
||||||
for (String sessionKey : withSessionKey) {
|
for (String sessionKeyFile : withSessionKey) {
|
||||||
|
String sessionKey;
|
||||||
|
try {
|
||||||
|
sessionKey = FileUtil.stringFromInputStream(FileUtil.getFileInputStream(sessionKeyFile));
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new RuntimeException(e);
|
||||||
|
}
|
||||||
if (!sessionKeyPattern.matcher(sessionKey).matches()) {
|
if (!sessionKeyPattern.matcher(sessionKey).matches()) {
|
||||||
throw new IllegalArgumentException("Session keys are expected in the format 'ALGONUM:HEXKEY'.");
|
throw new IllegalArgumentException("Session keys are expected in the format 'ALGONUM:HEXKEY'.");
|
||||||
}
|
}
|
||||||
|
@ -211,11 +217,14 @@ public class DecryptCmd implements Runnable {
|
||||||
}
|
}
|
||||||
|
|
||||||
private void setWithPasswords(List<String> withPassword, Decrypt decrypt) {
|
private void setWithPasswords(List<String> withPassword, Decrypt decrypt) {
|
||||||
for (String password : withPassword) {
|
for (String passwordFile : withPassword) {
|
||||||
try {
|
try {
|
||||||
|
String password = FileUtil.stringFromInputStream(FileUtil.getFileInputStream(passwordFile));
|
||||||
decrypt.withPassword(password);
|
decrypt.withPassword(password);
|
||||||
} catch (SOPGPException.UnsupportedOption unsupportedOption) {
|
} catch (SOPGPException.UnsupportedOption unsupportedOption) {
|
||||||
throw new SOPGPException.UnsupportedOption(String.format(ERROR_UNSUPPORTED_OPTION, "--with-password"), unsupportedOption);
|
throw new SOPGPException.UnsupportedOption(String.format(ERROR_UNSUPPORTED_OPTION, "--with-password"), unsupportedOption);
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new RuntimeException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,6 +13,7 @@ import java.util.List;
|
||||||
|
|
||||||
import picocli.CommandLine;
|
import picocli.CommandLine;
|
||||||
import sop.Ready;
|
import sop.Ready;
|
||||||
|
import sop.cli.picocli.FileUtil;
|
||||||
import sop.cli.picocli.SopCLI;
|
import sop.cli.picocli.SopCLI;
|
||||||
import sop.enums.EncryptAs;
|
import sop.enums.EncryptAs;
|
||||||
import sop.exception.SOPGPException;
|
import sop.exception.SOPGPException;
|
||||||
|
@ -34,7 +35,7 @@ public class EncryptCmd implements Runnable {
|
||||||
EncryptAs type;
|
EncryptAs type;
|
||||||
|
|
||||||
@CommandLine.Option(names = "--with-password",
|
@CommandLine.Option(names = "--with-password",
|
||||||
description = "Encrypt the message with a password",
|
description = "Encrypt the message with a password provided by the given password file",
|
||||||
paramLabel = "PASSWORD")
|
paramLabel = "PASSWORD")
|
||||||
List<String> withPassword = new ArrayList<>();
|
List<String> withPassword = new ArrayList<>();
|
||||||
|
|
||||||
|
@ -64,14 +65,17 @@ public class EncryptCmd implements Runnable {
|
||||||
}
|
}
|
||||||
|
|
||||||
if (withPassword.isEmpty() && certs.isEmpty()) {
|
if (withPassword.isEmpty() && certs.isEmpty()) {
|
||||||
throw new SOPGPException.MissingArg("At least one password or cert file required for encryption.");
|
throw new SOPGPException.MissingArg("At least one password file or cert file required for encryption.");
|
||||||
}
|
}
|
||||||
|
|
||||||
for (String password : withPassword) {
|
for (String passwordFileName : withPassword) {
|
||||||
try {
|
try {
|
||||||
|
String password = FileUtil.stringFromInputStream(FileUtil.getFileInputStream(passwordFileName));
|
||||||
encrypt.withPassword(password);
|
encrypt.withPassword(password);
|
||||||
} catch (SOPGPException.UnsupportedOption unsupportedOption) {
|
} catch (SOPGPException.UnsupportedOption unsupportedOption) {
|
||||||
throw new SOPGPException.UnsupportedOption("Unsupported option '--with-password'.", unsupportedOption);
|
throw new SOPGPException.UnsupportedOption("Unsupported option '--with-password'.", unsupportedOption);
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new RuntimeException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,29 @@
|
||||||
|
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package sop.cli.picocli;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.FileOutputStream;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.nio.charset.StandardCharsets;
|
||||||
|
import java.nio.file.Files;
|
||||||
|
|
||||||
|
public class TestFileUtil {
|
||||||
|
|
||||||
|
public static File writeTempStringFile(String string) throws IOException {
|
||||||
|
File tempDir = Files.createTempDirectory("tmpDir").toFile();
|
||||||
|
tempDir.deleteOnExit();
|
||||||
|
tempDir.mkdirs();
|
||||||
|
|
||||||
|
File passwordFile = new File(tempDir, "file");
|
||||||
|
passwordFile.createNewFile();
|
||||||
|
|
||||||
|
FileOutputStream fileOut = new FileOutputStream(passwordFile);
|
||||||
|
fileOut.write(string.getBytes(StandardCharsets.UTF_8));
|
||||||
|
fileOut.close();
|
||||||
|
|
||||||
|
return passwordFile;
|
||||||
|
}
|
||||||
|
}
|
|
@ -38,6 +38,7 @@ import sop.SessionKey;
|
||||||
import sop.Verification;
|
import sop.Verification;
|
||||||
import sop.cli.picocli.DateParser;
|
import sop.cli.picocli.DateParser;
|
||||||
import sop.cli.picocli.SopCLI;
|
import sop.cli.picocli.SopCLI;
|
||||||
|
import sop.cli.picocli.TestFileUtil;
|
||||||
import sop.exception.SOPGPException;
|
import sop.exception.SOPGPException;
|
||||||
import sop.operation.Decrypt;
|
import sop.operation.Decrypt;
|
||||||
import sop.util.HexUtil;
|
import sop.util.HexUtil;
|
||||||
|
@ -90,22 +91,25 @@ public class DecryptCmdTest {
|
||||||
@Test
|
@Test
|
||||||
@ExpectSystemExitWithStatus(31)
|
@ExpectSystemExitWithStatus(31)
|
||||||
public void assertNotHumanReadablePasswordCausesExit31() throws SOPGPException.PasswordNotHumanReadable,
|
public void assertNotHumanReadablePasswordCausesExit31() throws SOPGPException.PasswordNotHumanReadable,
|
||||||
SOPGPException.UnsupportedOption {
|
SOPGPException.UnsupportedOption, IOException {
|
||||||
|
File passwordFile = TestFileUtil.writeTempStringFile("pretendThisIsNotReadable");
|
||||||
when(decrypt.withPassword(any())).thenThrow(new SOPGPException.PasswordNotHumanReadable());
|
when(decrypt.withPassword(any())).thenThrow(new SOPGPException.PasswordNotHumanReadable());
|
||||||
SopCLI.main(new String[] {"decrypt", "--with-password", "pretendThisIsNotReadable"});
|
SopCLI.main(new String[] {"decrypt", "--with-password", passwordFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void assertWithPasswordPassesPasswordDown() throws SOPGPException.PasswordNotHumanReadable, SOPGPException.UnsupportedOption {
|
public void assertWithPasswordPassesPasswordDown() throws SOPGPException.PasswordNotHumanReadable, SOPGPException.UnsupportedOption, IOException {
|
||||||
SopCLI.main(new String[] {"decrypt", "--with-password", "orange"});
|
File passwordFile = TestFileUtil.writeTempStringFile("orange");
|
||||||
|
SopCLI.main(new String[] {"decrypt", "--with-password", passwordFile.getAbsolutePath()});
|
||||||
verify(decrypt, times(1)).withPassword("orange");
|
verify(decrypt, times(1)).withPassword("orange");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@ExpectSystemExitWithStatus(37)
|
@ExpectSystemExitWithStatus(37)
|
||||||
public void assertUnsupportedWithPasswordCausesExit37() throws SOPGPException.PasswordNotHumanReadable, SOPGPException.UnsupportedOption {
|
public void assertUnsupportedWithPasswordCausesExit37() throws SOPGPException.PasswordNotHumanReadable, SOPGPException.UnsupportedOption, IOException {
|
||||||
|
File passwordFile = TestFileUtil.writeTempStringFile("swordfish");
|
||||||
when(decrypt.withPassword(any())).thenThrow(new SOPGPException.UnsupportedOption("Decrypting with password not supported."));
|
when(decrypt.withPassword(any())).thenThrow(new SOPGPException.UnsupportedOption("Decrypting with password not supported."));
|
||||||
SopCLI.main(new String[] {"decrypt", "--with-password", "swordfish"});
|
SopCLI.main(new String[] {"decrypt", "--with-password", passwordFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -289,21 +293,26 @@ public class DecryptCmdTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void assertWithSessionKeyIsPassedDown() throws SOPGPException.UnsupportedOption {
|
public void assertWithSessionKeyIsPassedDown() throws SOPGPException.UnsupportedOption, IOException {
|
||||||
SessionKey key1 = new SessionKey((byte) 9, HexUtil.hexToBytes("C7CBDAF42537776F12509B5168793C26B93294E5ABDFA73224FB0177123E9137"));
|
SessionKey key1 = new SessionKey((byte) 9, HexUtil.hexToBytes("C7CBDAF42537776F12509B5168793C26B93294E5ABDFA73224FB0177123E9137"));
|
||||||
SessionKey key2 = new SessionKey((byte) 9, HexUtil.hexToBytes("FCA4BEAF687F48059CACC14FB019125CD57392BAB7037C707835925CBF9F7BCD"));
|
SessionKey key2 = new SessionKey((byte) 9, HexUtil.hexToBytes("FCA4BEAF687F48059CACC14FB019125CD57392BAB7037C707835925CBF9F7BCD"));
|
||||||
|
|
||||||
|
File sessionKeyFile1 = TestFileUtil.writeTempStringFile(key1.toString());
|
||||||
|
File sessionKeyFile2 = TestFileUtil.writeTempStringFile(key2.toString());
|
||||||
|
|
||||||
SopCLI.main(new String[] {"decrypt",
|
SopCLI.main(new String[] {"decrypt",
|
||||||
"--with-session-key", "9:C7CBDAF42537776F12509B5168793C26B93294E5ABDFA73224FB0177123E9137",
|
"--with-session-key", sessionKeyFile1.getAbsolutePath(),
|
||||||
"--with-session-key", "9:FCA4BEAF687F48059CACC14FB019125CD57392BAB7037C707835925CBF9F7BCD"});
|
"--with-session-key", sessionKeyFile2.getAbsolutePath()});
|
||||||
verify(decrypt).withSessionKey(key1);
|
verify(decrypt).withSessionKey(key1);
|
||||||
verify(decrypt).withSessionKey(key2);
|
verify(decrypt).withSessionKey(key2);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@ExpectSystemExitWithStatus(1)
|
@ExpectSystemExitWithStatus(1)
|
||||||
public void assertMalformedSessionKeysResultInExit1() {
|
public void assertMalformedSessionKeysResultInExit1() throws IOException {
|
||||||
|
File sessionKeyFile = TestFileUtil.writeTempStringFile("C7CBDAF42537776F12509B5168793C26B93294E5ABDFA73224FB0177123E9137");
|
||||||
SopCLI.main(new String[] {"decrypt",
|
SopCLI.main(new String[] {"decrypt",
|
||||||
"--with-session-key", "C7CBDAF42537776F12509B5168793C26B93294E5ABDFA73224FB0177123E9137"});
|
"--with-session-key", sessionKeyFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -336,6 +345,18 @@ public class DecryptCmdTest {
|
||||||
SopCLI.main(new String[] {"decrypt", tempKeyFile.getAbsolutePath()});
|
SopCLI.main(new String[] {"decrypt", tempKeyFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
@ExpectSystemExitWithStatus(61)
|
||||||
|
public void assertMissingPassphraseFileCausesExit61() {
|
||||||
|
SopCLI.main(new String[] {"decrypt", "--with-password", "missing"});
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
@ExpectSystemExitWithStatus(61)
|
||||||
|
public void assertMissingSessionKeyFileCausesExit61() {
|
||||||
|
SopCLI.main(new String[] {"decrypt", "--with-session-key", "missing"});
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@ExpectSystemExitWithStatus(23)
|
@ExpectSystemExitWithStatus(23)
|
||||||
public void verifyOutWithoutVerifyWithCausesExit23() {
|
public void verifyOutWithoutVerifyWithCausesExit23() {
|
||||||
|
|
|
@ -22,6 +22,7 @@ import org.junit.jupiter.api.Test;
|
||||||
import sop.Ready;
|
import sop.Ready;
|
||||||
import sop.SOP;
|
import sop.SOP;
|
||||||
import sop.cli.picocli.SopCLI;
|
import sop.cli.picocli.SopCLI;
|
||||||
|
import sop.cli.picocli.TestFileUtil;
|
||||||
import sop.enums.EncryptAs;
|
import sop.enums.EncryptAs;
|
||||||
import sop.exception.SOPGPException;
|
import sop.exception.SOPGPException;
|
||||||
import sop.operation.Encrypt;
|
import sop.operation.Encrypt;
|
||||||
|
@ -67,35 +68,36 @@ public class EncryptCmdTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void as_modeIsPassedDown() throws SOPGPException.UnsupportedOption {
|
public void as_modeIsPassedDown() throws SOPGPException.UnsupportedOption, IOException {
|
||||||
|
File passwordFile = TestFileUtil.writeTempStringFile("0rbit");
|
||||||
for (EncryptAs mode : EncryptAs.values()) {
|
for (EncryptAs mode : EncryptAs.values()) {
|
||||||
SopCLI.main(new String[] {"encrypt", "--as", mode.name(), "--with-password", "0rbit"});
|
SopCLI.main(new String[] {"encrypt", "--as", mode.name(), "--with-password", passwordFile.getAbsolutePath()});
|
||||||
verify(encrypt, times(1)).mode(mode);
|
verify(encrypt, times(1)).mode(mode);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@ExpectSystemExitWithStatus(31)
|
@ExpectSystemExitWithStatus(31)
|
||||||
public void withPassword_notHumanReadablePasswordCausesExit31() throws SOPGPException.PasswordNotHumanReadable, SOPGPException.UnsupportedOption {
|
public void withPassword_notHumanReadablePasswordCausesExit31() throws SOPGPException.PasswordNotHumanReadable, SOPGPException.UnsupportedOption, IOException {
|
||||||
when(encrypt.withPassword("pretendThisIsNotReadable")).thenThrow(new SOPGPException.PasswordNotHumanReadable());
|
when(encrypt.withPassword("pretendThisIsNotReadable")).thenThrow(new SOPGPException.PasswordNotHumanReadable());
|
||||||
|
File passwordFile = TestFileUtil.writeTempStringFile("pretendThisIsNotReadable");
|
||||||
SopCLI.main(new String[] {"encrypt", "--with-password", "pretendThisIsNotReadable"});
|
SopCLI.main(new String[] {"encrypt", "--with-password", passwordFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@ExpectSystemExitWithStatus(37)
|
@ExpectSystemExitWithStatus(37)
|
||||||
public void withPassword_unsupportedWithPasswordCausesExit37() throws SOPGPException.PasswordNotHumanReadable, SOPGPException.UnsupportedOption {
|
public void withPassword_unsupportedWithPasswordCausesExit37() throws SOPGPException.PasswordNotHumanReadable, SOPGPException.UnsupportedOption, IOException {
|
||||||
when(encrypt.withPassword(any())).thenThrow(new SOPGPException.UnsupportedOption("Encrypting with password not supported."));
|
when(encrypt.withPassword(any())).thenThrow(new SOPGPException.UnsupportedOption("Encrypting with password not supported."));
|
||||||
|
File passwordFile = TestFileUtil.writeTempStringFile("orange");
|
||||||
SopCLI.main(new String[] {"encrypt", "--with-password", "orange"});
|
SopCLI.main(new String[] {"encrypt", "--with-password", passwordFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void signWith_multipleTimesGetPassedDown() throws IOException, SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData {
|
public void signWith_multipleTimesGetPassedDown() throws IOException, SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData {
|
||||||
File keyFile1 = File.createTempFile("sign-with-1-", ".asc");
|
File keyFile1 = File.createTempFile("sign-with-1-", ".asc");
|
||||||
File keyFile2 = File.createTempFile("sign-with-2-", ".asc");
|
File keyFile2 = File.createTempFile("sign-with-2-", ".asc");
|
||||||
|
File passwordFile = TestFileUtil.writeTempStringFile("password");
|
||||||
SopCLI.main(new String[] {"encrypt", "--with-password", "password", "--sign-with", keyFile1.getAbsolutePath(), "--sign-with", keyFile2.getAbsolutePath()});
|
SopCLI.main(new String[] {"encrypt", "--with-password", passwordFile.getAbsolutePath(), "--sign-with", keyFile1.getAbsolutePath(), "--sign-with", keyFile2.getAbsolutePath()});
|
||||||
verify(encrypt, times(2)).signWith((InputStream) any());
|
verify(encrypt, times(2)).signWith((InputStream) any());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -110,7 +112,8 @@ public class EncryptCmdTest {
|
||||||
public void signWith_keyIsProtectedCausesExit67() throws SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData, IOException {
|
public void signWith_keyIsProtectedCausesExit67() throws SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData, IOException {
|
||||||
when(encrypt.signWith((InputStream) any())).thenThrow(new SOPGPException.KeyIsProtected());
|
when(encrypt.signWith((InputStream) any())).thenThrow(new SOPGPException.KeyIsProtected());
|
||||||
File keyFile = File.createTempFile("sign-with", ".asc");
|
File keyFile = File.createTempFile("sign-with", ".asc");
|
||||||
SopCLI.main(new String[] {"encrypt", "--sign-with", keyFile.getAbsolutePath(), "--with-password", "starship"});
|
File passwordFile = TestFileUtil.writeTempStringFile("starship");
|
||||||
|
SopCLI.main(new String[] {"encrypt", "--sign-with", keyFile.getAbsolutePath(), "--with-password", passwordFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -118,7 +121,8 @@ public class EncryptCmdTest {
|
||||||
public void signWith_unsupportedAsymmetricAlgoCausesExit13() throws SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData, IOException {
|
public void signWith_unsupportedAsymmetricAlgoCausesExit13() throws SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData, IOException {
|
||||||
when(encrypt.signWith((InputStream) any())).thenThrow(new SOPGPException.UnsupportedAsymmetricAlgo("Unsupported asymmetric algorithm.", new Exception()));
|
when(encrypt.signWith((InputStream) any())).thenThrow(new SOPGPException.UnsupportedAsymmetricAlgo("Unsupported asymmetric algorithm.", new Exception()));
|
||||||
File keyFile = File.createTempFile("sign-with", ".asc");
|
File keyFile = File.createTempFile("sign-with", ".asc");
|
||||||
SopCLI.main(new String[] {"encrypt", "--with-password", "123456", "--sign-with", keyFile.getAbsolutePath()});
|
File passwordFile = TestFileUtil.writeTempStringFile("123456");
|
||||||
|
SopCLI.main(new String[] {"encrypt", "--with-password", passwordFile.getAbsolutePath(), "--sign-with", keyFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -126,7 +130,8 @@ public class EncryptCmdTest {
|
||||||
public void signWith_certCannotSignCausesExit1() throws IOException, SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData {
|
public void signWith_certCannotSignCausesExit1() throws IOException, SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData {
|
||||||
when(encrypt.signWith((InputStream) any())).thenThrow(new SOPGPException.KeyCannotSign());
|
when(encrypt.signWith((InputStream) any())).thenThrow(new SOPGPException.KeyCannotSign());
|
||||||
File keyFile = File.createTempFile("sign-with", ".asc");
|
File keyFile = File.createTempFile("sign-with", ".asc");
|
||||||
SopCLI.main(new String[] {"encrypt", "--with-password", "dragon", "--sign-with", keyFile.getAbsolutePath()});
|
File passwordFile = TestFileUtil.writeTempStringFile("dragon");
|
||||||
|
SopCLI.main(new String[] {"encrypt", "--with-password", passwordFile.getAbsolutePath(), "--sign-with", keyFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -134,7 +139,8 @@ public class EncryptCmdTest {
|
||||||
public void signWith_badDataCausesExit41() throws SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData, IOException {
|
public void signWith_badDataCausesExit41() throws SOPGPException.KeyIsProtected, SOPGPException.UnsupportedAsymmetricAlgo, SOPGPException.KeyCannotSign, SOPGPException.BadData, IOException {
|
||||||
when(encrypt.signWith((InputStream) any())).thenThrow(new SOPGPException.BadData(new IOException()));
|
when(encrypt.signWith((InputStream) any())).thenThrow(new SOPGPException.BadData(new IOException()));
|
||||||
File keyFile = File.createTempFile("sign-with", ".asc");
|
File keyFile = File.createTempFile("sign-with", ".asc");
|
||||||
SopCLI.main(new String[] {"encrypt", "--with-password", "orange", "--sign-with", keyFile.getAbsolutePath()});
|
File passwordFile = TestFileUtil.writeTempStringFile("orange");
|
||||||
|
SopCLI.main(new String[] {"encrypt", "--with-password", passwordFile.getAbsolutePath(), "--sign-with", keyFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -168,14 +174,16 @@ public class EncryptCmdTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void noArmor_notCalledByDefault() {
|
public void noArmor_notCalledByDefault() throws IOException {
|
||||||
SopCLI.main(new String[] {"encrypt", "--with-password", "clownfish"});
|
File passwordFile = TestFileUtil.writeTempStringFile("clownfish");
|
||||||
|
SopCLI.main(new String[] {"encrypt", "--with-password", passwordFile.getAbsolutePath()});
|
||||||
verify(encrypt, never()).noArmor();
|
verify(encrypt, never()).noArmor();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void noArmor_callGetsPassedDown() {
|
public void noArmor_callGetsPassedDown() throws IOException {
|
||||||
SopCLI.main(new String[] {"encrypt", "--with-password", "monkey", "--no-armor"});
|
File passwordFile = TestFileUtil.writeTempStringFile("monkey");
|
||||||
|
SopCLI.main(new String[] {"encrypt", "--with-password", passwordFile.getAbsolutePath(), "--no-armor"});
|
||||||
verify(encrypt, times(1)).noArmor();
|
verify(encrypt, times(1)).noArmor();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -188,7 +196,7 @@ public class EncryptCmdTest {
|
||||||
throw new IOException();
|
throw new IOException();
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
File passwordFile = TestFileUtil.writeTempStringFile("wildcat");
|
||||||
SopCLI.main(new String[] {"encrypt", "--with-password", "wildcat"});
|
SopCLI.main(new String[] {"encrypt", "--with-password", passwordFile.getAbsolutePath()});
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,6 +26,8 @@ public class VersionCmdTest {
|
||||||
version = mock(Version.class);
|
version = mock(Version.class);
|
||||||
when(version.getName()).thenReturn("MockSop");
|
when(version.getName()).thenReturn("MockSop");
|
||||||
when(version.getVersion()).thenReturn("1.0");
|
when(version.getVersion()).thenReturn("1.0");
|
||||||
|
when(version.getExtendedVersion()).thenReturn("MockSop Extended Version Information");
|
||||||
|
when(version.getBackendVersion()).thenReturn("Foo");
|
||||||
when(sop.version()).thenReturn(version);
|
when(sop.version()).thenReturn(version);
|
||||||
|
|
||||||
SopCLI.setSopInstance(sop);
|
SopCLI.setSopInstance(sop);
|
||||||
|
@ -38,6 +40,18 @@ public class VersionCmdTest {
|
||||||
verify(version, times(1)).getName();
|
verify(version, times(1)).getName();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void assertExtendedVersionCommandWorks() {
|
||||||
|
SopCLI.main(new String[] {"version", "--extended"});
|
||||||
|
verify(version, times(1)).getExtendedVersion();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void assertBackendVersionCommandWorks() {
|
||||||
|
SopCLI.main(new String[] {"version", "--backend"});
|
||||||
|
verify(version, times(1)).getBackendVersion();
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@ExpectSystemExitWithStatus(37)
|
@ExpectSystemExitWithStatus(37)
|
||||||
public void assertInvalidOptionResultsInExit37() {
|
public void assertInvalidOptionResultsInExit37() {
|
||||||
|
|
|
@ -128,6 +128,10 @@ public abstract class SOPGPException extends RuntimeException {
|
||||||
|
|
||||||
public static final int EXIT_CODE = 31;
|
public static final int EXIT_CODE = 31;
|
||||||
|
|
||||||
|
public PasswordNotHumanReadable() {
|
||||||
|
super();
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public int getExitCode() {
|
public int getExitCode() {
|
||||||
return EXIT_CODE;
|
return EXIT_CODE;
|
||||||
|
@ -162,12 +166,16 @@ public abstract class SOPGPException extends RuntimeException {
|
||||||
|
|
||||||
public static final int EXIT_CODE = 41;
|
public static final int EXIT_CODE = 41;
|
||||||
|
|
||||||
public BadData(Throwable e) {
|
public BadData(String message) {
|
||||||
super(e);
|
super(message);
|
||||||
}
|
}
|
||||||
|
|
||||||
public BadData(String message, BadData badData) {
|
public BadData(Throwable throwable) {
|
||||||
super(message, badData);
|
super(throwable);
|
||||||
|
}
|
||||||
|
|
||||||
|
public BadData(String message, Throwable throwable) {
|
||||||
|
super(message, throwable);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
39
sop-java/src/main/java/sop/util/UTF8Util.java
Normal file
39
sop-java/src/main/java/sop/util/UTF8Util.java
Normal file
|
@ -0,0 +1,39 @@
|
||||||
|
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package sop.util;
|
||||||
|
|
||||||
|
import sop.exception.SOPGPException;
|
||||||
|
|
||||||
|
import java.nio.ByteBuffer;
|
||||||
|
import java.nio.CharBuffer;
|
||||||
|
import java.nio.charset.CharacterCodingException;
|
||||||
|
import java.nio.charset.Charset;
|
||||||
|
import java.nio.charset.CharsetDecoder;
|
||||||
|
import java.nio.charset.CodingErrorAction;
|
||||||
|
|
||||||
|
public class UTF8Util {
|
||||||
|
|
||||||
|
private static final CharsetDecoder UTF8Decoder = Charset.forName("UTF8")
|
||||||
|
.newDecoder()
|
||||||
|
.onUnmappableCharacter(CodingErrorAction.REPORT)
|
||||||
|
.onMalformedInput(CodingErrorAction.REPORT);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Detect non-valid UTF8 data.
|
||||||
|
*
|
||||||
|
* @see <a href="https://stackoverflow.com/a/1471193">ante on StackOverflow</a>
|
||||||
|
* @param data
|
||||||
|
* @return
|
||||||
|
*/
|
||||||
|
public static String decodeUTF8(byte[] data) {
|
||||||
|
ByteBuffer byteBuffer = ByteBuffer.wrap(data);
|
||||||
|
try {
|
||||||
|
CharBuffer charBuffer = UTF8Decoder.decode(byteBuffer);
|
||||||
|
return charBuffer.toString();
|
||||||
|
} catch (CharacterCodingException e) {
|
||||||
|
throw new SOPGPException.PasswordNotHumanReadable();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
39
sop-java/src/test/java/sop/util/UTF8UtilTest.java
Normal file
39
sop-java/src/test/java/sop/util/UTF8UtilTest.java
Normal file
|
@ -0,0 +1,39 @@
|
||||||
|
// SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package sop.util;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import sop.exception.SOPGPException;
|
||||||
|
|
||||||
|
import java.nio.charset.StandardCharsets;
|
||||||
|
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertEquals;
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertThrows;
|
||||||
|
|
||||||
|
public class UTF8UtilTest {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testValidUtf8Decoding() {
|
||||||
|
String utf8String = "Hello, World\n";
|
||||||
|
String decoded = UTF8Util.decodeUTF8(utf8String.getBytes(StandardCharsets.UTF_8));
|
||||||
|
|
||||||
|
assertEquals(utf8String, decoded);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test detection of non-uft8 data.
|
||||||
|
* @see <a href="https://www.cl.cam.ac.uk/~mgk25/ucs/examples/UTF-8-test.txt">
|
||||||
|
* Markus Kuhn's UTF8 decoder capability and stress test file</a>
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void testInvalidUtf8StringThrows() {
|
||||||
|
assertThrows(SOPGPException.PasswordNotHumanReadable.class,
|
||||||
|
() -> UTF8Util.decodeUTF8(new byte[] {(byte) 0xa0, (byte) 0xa1}));
|
||||||
|
assertThrows(SOPGPException.PasswordNotHumanReadable.class,
|
||||||
|
() -> UTF8Util.decodeUTF8(new byte[] {(byte) 0xc0, (byte) 0xaf}));
|
||||||
|
assertThrows(SOPGPException.PasswordNotHumanReadable.class,
|
||||||
|
() -> UTF8Util.decodeUTF8(new byte[] {(byte) 0x80, (byte) 0xbf}));
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in a new issue