mirror of
https://codeberg.org/PGPainless/sop-java.git
synced 2024-12-22 21:07:57 +01:00
Add initial tests for all operations
This commit is contained in:
parent
bd02b11944
commit
6e40c7dc17
7 changed files with 340 additions and 2 deletions
|
@ -109,7 +109,8 @@ public class DetachedSignExternal implements DetachedSign {
|
||||||
BufferedReader reader = new BufferedReader(new InputStreamReader(new FileInputStream(micAlgOut)));
|
BufferedReader reader = new BufferedReader(new InputStreamReader(new FileInputStream(micAlgOut)));
|
||||||
String line = reader.readLine();
|
String line = reader.readLine();
|
||||||
if (line != null && !line.trim().isEmpty()) {
|
if (line != null && !line.trim().isEmpty()) {
|
||||||
builder.setMicAlg(MicAlg.fromHashAlgorithmId(Integer.parseInt(line)));
|
MicAlg micAlg = new MicAlg(line.trim());
|
||||||
|
builder.setMicAlg(micAlg);
|
||||||
}
|
}
|
||||||
reader.close();
|
reader.close();
|
||||||
micAlgOut.delete();
|
micAlgOut.delete();
|
||||||
|
|
39
external-sop/src/test/java/sop/external/ExternalArmorDearmorRoundTripTest.java
vendored
Normal file
39
external-sop/src/test/java/sop/external/ExternalArmorDearmorRoundTripTest.java
vendored
Normal file
|
@ -0,0 +1,39 @@
|
||||||
|
// SPDX-FileCopyrightText: 2023 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package sop.external;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.junit.jupiter.api.condition.EnabledIf;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.nio.charset.StandardCharsets;
|
||||||
|
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertFalse;
|
||||||
|
import static sop.external.JUtils.arrayStartsWith;
|
||||||
|
import static sop.external.JUtils.assertArrayStartsWith;
|
||||||
|
|
||||||
|
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
||||||
|
public class ExternalArmorDearmorRoundTripTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
|
private static final String BEGIN_PGP_PRIVATE_KEY_BLOCK = "-----BEGIN PGP PRIVATE KEY BLOCK-----\n";
|
||||||
|
private static final byte[] BEGIN_PGP_PRIVATE_KEY_BLOCK_BYTES = BEGIN_PGP_PRIVATE_KEY_BLOCK.getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void dearmorArmorAliceKey() throws IOException {
|
||||||
|
byte[] aliceKey = TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
byte[] dearmored = getSop().dearmor()
|
||||||
|
.data(aliceKey)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
assertFalse(arrayStartsWith(dearmored, BEGIN_PGP_PRIVATE_KEY_BLOCK_BYTES));
|
||||||
|
|
||||||
|
byte[] armored = getSop().armor()
|
||||||
|
.data(dearmored)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
assertArrayStartsWith(armored, BEGIN_PGP_PRIVATE_KEY_BLOCK_BYTES);
|
||||||
|
}
|
||||||
|
}
|
54
external-sop/src/test/java/sop/external/ExternalDecryptWithSessionKeyTest.java
vendored
Normal file
54
external-sop/src/test/java/sop/external/ExternalDecryptWithSessionKeyTest.java
vendored
Normal file
|
@ -0,0 +1,54 @@
|
||||||
|
// SPDX-FileCopyrightText: 2023 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package sop.external;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.junit.jupiter.api.condition.EnabledIf;
|
||||||
|
import sop.ByteArrayAndResult;
|
||||||
|
import sop.DecryptionResult;
|
||||||
|
import sop.SessionKey;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.nio.charset.StandardCharsets;
|
||||||
|
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertEquals;
|
||||||
|
|
||||||
|
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
||||||
|
public class ExternalDecryptWithSessionKeyTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
|
private static final String CIPHERTEXT = "-----BEGIN PGP MESSAGE-----\n" +
|
||||||
|
"\n" +
|
||||||
|
"wV4DR2b2udXyHrYSAQdAy+Et2hCh4ubh8KsmM8ctRDN6Pee+UHVVcI6YXpY9S2cw\n" +
|
||||||
|
"1QEROCgfm6xGb+hgxmoFrWhtZU03Arb27ZmpWA6e6Ha9jFdB4/DDbqbhlVuFOmti\n" +
|
||||||
|
"0j8BqGjEvEYAon+8F9TwMaDbPjjy9SdgQBorlM88ChIW14KQtpG9FZN+r+xVKPG1\n" +
|
||||||
|
"8EIOxI4qOZaH3Wejraca31M=\n" +
|
||||||
|
"=1imC\n" +
|
||||||
|
"-----END PGP MESSAGE-----\n";
|
||||||
|
private static final String SESSION_KEY = "9:ED682800F5FEA829A82E8B7DDF8CE9CF4BF9BB45024B017764462EE53101C36A";
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testDecryptAndExtractSessionKey() throws IOException {
|
||||||
|
ByteArrayAndResult<DecryptionResult> bytesAndResult = getSop().decrypt()
|
||||||
|
.withKey(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.ciphertext(CIPHERTEXT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.toByteArrayAndResult();
|
||||||
|
|
||||||
|
assertEquals(SESSION_KEY, bytesAndResult.getResult().getSessionKey().get().toString());
|
||||||
|
|
||||||
|
assertArrayEquals("Hello, World!\n".getBytes(StandardCharsets.UTF_8), bytesAndResult.getBytes());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testDecryptWithSessionKey() throws IOException {
|
||||||
|
byte[] decrypted = getSop().decrypt()
|
||||||
|
.withSessionKey(SessionKey.fromString(SESSION_KEY))
|
||||||
|
.ciphertext(CIPHERTEXT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.toByteArrayAndResult()
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
assertArrayEquals("Hello, World!\n".getBytes(StandardCharsets.UTF_8), decrypted);
|
||||||
|
}
|
||||||
|
}
|
74
external-sop/src/test/java/sop/external/ExternalDetachedSignVerifyRoundTripTest.java
vendored
Normal file
74
external-sop/src/test/java/sop/external/ExternalDetachedSignVerifyRoundTripTest.java
vendored
Normal file
|
@ -0,0 +1,74 @@
|
||||||
|
// SPDX-FileCopyrightText: 2023 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package sop.external;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.junit.jupiter.api.condition.EnabledIf;
|
||||||
|
import sop.Verification;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.nio.charset.StandardCharsets;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertFalse;
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertTrue;
|
||||||
|
import static sop.external.JUtils.assertArrayStartsWith;
|
||||||
|
|
||||||
|
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
||||||
|
public class ExternalDetachedSignVerifyRoundTripTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
|
private static final String BEGIN_PGP_SIGNATURE = "-----BEGIN PGP SIGNATURE-----\n";
|
||||||
|
private static final byte[] BEGIN_PGP_SIGNATURE_BYTES = BEGIN_PGP_SIGNATURE.getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void signVerifyWithAliceKey() throws IOException {
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
byte[] signature = getSop().detachedSign()
|
||||||
|
.key(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.data(message)
|
||||||
|
.toByteArrayAndResult()
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
List<Verification> verificationList = getSop().detachedVerify()
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.signatures(signature)
|
||||||
|
.data(message);
|
||||||
|
|
||||||
|
assertFalse(verificationList.isEmpty());
|
||||||
|
assertTrue(verificationList.get(0).toString().contains("EB85BB5FA33A75E15E944E63F231550C4F47E38E EB85BB5FA33A75E15E944E63F231550C4F47E38E"));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void signVerifyWithFreshEncryptedKey() throws IOException {
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] keyPassword = "sw0rdf1sh".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] key = getSop().generateKey()
|
||||||
|
.userId("Alice <alice@openpgp.org>")
|
||||||
|
.withKeyPassword(keyPassword)
|
||||||
|
.generate()
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
byte[] cert = getSop().extractCert()
|
||||||
|
.key(key)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
byte[] signature = getSop().detachedSign()
|
||||||
|
.key(key)
|
||||||
|
.withKeyPassword(keyPassword)
|
||||||
|
.data(message)
|
||||||
|
.toByteArrayAndResult()
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
assertArrayStartsWith(signature, BEGIN_PGP_SIGNATURE_BYTES);
|
||||||
|
|
||||||
|
List<Verification> verificationList = getSop().detachedVerify()
|
||||||
|
.cert(cert)
|
||||||
|
.signatures(signature)
|
||||||
|
.data(message);
|
||||||
|
|
||||||
|
assertFalse(verificationList.isEmpty());
|
||||||
|
}
|
||||||
|
}
|
|
@ -16,11 +16,12 @@ import java.util.List;
|
||||||
|
|
||||||
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
||||||
import static org.junit.jupiter.api.Assertions.assertEquals;
|
import static org.junit.jupiter.api.Assertions.assertEquals;
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertFalse;
|
||||||
import static org.junit.jupiter.api.Assertions.assertNotNull;
|
import static org.junit.jupiter.api.Assertions.assertNotNull;
|
||||||
import static org.junit.jupiter.api.Assertions.assertTrue;
|
import static org.junit.jupiter.api.Assertions.assertTrue;
|
||||||
|
|
||||||
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
||||||
public class EncryptDecryptRoundTripTest extends AbstractExternalSOPTest {
|
public class ExternalEncryptDecryptRoundTripTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void encryptDecryptRoundTripPasswordTest() throws IOException {
|
public void encryptDecryptRoundTripPasswordTest() throws IOException {
|
||||||
|
@ -119,4 +120,35 @@ public class EncryptDecryptRoundTripTest extends AbstractExternalSOPTest {
|
||||||
assertEquals(1, verificationList.size());
|
assertEquals(1, verificationList.size());
|
||||||
assertTrue(verificationList.get(0).toString().contains("EB85BB5FA33A75E15E944E63F231550C4F47E38E EB85BB5FA33A75E15E944E63F231550C4F47E38E"));
|
assertTrue(verificationList.get(0).toString().contains("EB85BB5FA33A75E15E944E63F231550C4F47E38E EB85BB5FA33A75E15E944E63F231550C4F47E38E"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void encryptSignDecryptVerifyRoundTripWithFreshEncryptedKeyTest() throws IOException {
|
||||||
|
byte[] keyPassword = "sw0rdf1sh".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] key = getSop().generateKey()
|
||||||
|
.withKeyPassword(keyPassword)
|
||||||
|
.userId("Alice <alice@openpgp.org>")
|
||||||
|
.generate()
|
||||||
|
.getBytes();
|
||||||
|
byte[] cert = getSop().extractCert()
|
||||||
|
.key(key)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] ciphertext = getSop().encrypt()
|
||||||
|
.withCert(cert)
|
||||||
|
.signWith(key)
|
||||||
|
.withKeyPassword(keyPassword)
|
||||||
|
.plaintext(message)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
ByteArrayAndResult<DecryptionResult> bytesAndResult = getSop().decrypt()
|
||||||
|
.withKey(key)
|
||||||
|
.withKeyPassword(keyPassword)
|
||||||
|
.verifyWithCert(cert)
|
||||||
|
.ciphertext(ciphertext)
|
||||||
|
.toByteArrayAndResult();
|
||||||
|
|
||||||
|
assertFalse(bytesAndResult.getResult().getVerifications().isEmpty());
|
||||||
|
assertArrayEquals(message, bytesAndResult.getBytes());
|
||||||
|
}
|
||||||
}
|
}
|
49
external-sop/src/test/java/sop/external/ExternalInlineSignDetachVerifyRoundTripTest.java
vendored
Normal file
49
external-sop/src/test/java/sop/external/ExternalInlineSignDetachVerifyRoundTripTest.java
vendored
Normal file
|
@ -0,0 +1,49 @@
|
||||||
|
// SPDX-FileCopyrightText: 2023 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package sop.external;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.junit.jupiter.api.condition.EnabledIf;
|
||||||
|
import sop.ByteArrayAndResult;
|
||||||
|
import sop.Signatures;
|
||||||
|
import sop.Verification;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.nio.charset.StandardCharsets;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertFalse;
|
||||||
|
|
||||||
|
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
||||||
|
public class ExternalInlineSignDetachVerifyRoundTripTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void inlineSignThenDetachThenDetachedVerifyTest() throws IOException {
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
byte[] inlineSigned = getSop().inlineSign()
|
||||||
|
.key(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.data(message)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
ByteArrayAndResult<Signatures> bytesAndResult = getSop().inlineDetach()
|
||||||
|
.message(inlineSigned)
|
||||||
|
.toByteArrayAndResult();
|
||||||
|
|
||||||
|
byte[] plaintext = bytesAndResult.getBytes();
|
||||||
|
assertArrayEquals(message, plaintext);
|
||||||
|
|
||||||
|
byte[] signatures = bytesAndResult.getResult()
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
List<Verification> verifications = getSop().detachedVerify()
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.signatures(signatures)
|
||||||
|
.data(plaintext);
|
||||||
|
|
||||||
|
assertFalse(verifications.isEmpty());
|
||||||
|
}
|
||||||
|
}
|
89
external-sop/src/test/java/sop/external/ExternalInlineSignVerifyTest.java
vendored
Normal file
89
external-sop/src/test/java/sop/external/ExternalInlineSignVerifyTest.java
vendored
Normal file
|
@ -0,0 +1,89 @@
|
||||||
|
// SPDX-FileCopyrightText: 2023 Paul Schaub <vanitasvitae@fsfe.org>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package sop.external;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.junit.jupiter.api.condition.EnabledIf;
|
||||||
|
import sop.ByteArrayAndResult;
|
||||||
|
import sop.Verification;
|
||||||
|
import sop.enums.InlineSignAs;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.nio.charset.StandardCharsets;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertFalse;
|
||||||
|
|
||||||
|
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
||||||
|
public class ExternalInlineSignVerifyTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
|
private static final String BEGIN_PGP_MESSAGE = "-----BEGIN PGP MESSAGE-----\n";
|
||||||
|
private static final byte[] BEGIN_PGP_MESSAGE_BYTES = BEGIN_PGP_MESSAGE.getBytes(StandardCharsets.UTF_8);
|
||||||
|
private static final String BEGIN_PGP_SIGNED_MESSAGE = "-----BEGIN PGP SIGNED MESSAGE-----\n";
|
||||||
|
private static final byte[] BEGIN_PGP_SIGNED_MESSAGE_BYTES = BEGIN_PGP_SIGNED_MESSAGE.getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void inlineSignVerifyAlice() throws IOException {
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
byte[] inlineSigned = getSop().inlineSign()
|
||||||
|
.key(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.data(message)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
JUtils.assertArrayStartsWith(inlineSigned, BEGIN_PGP_MESSAGE_BYTES);
|
||||||
|
|
||||||
|
ByteArrayAndResult<List<Verification>> bytesAndResult = getSop().inlineVerify()
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.data(inlineSigned)
|
||||||
|
.toByteArrayAndResult();
|
||||||
|
|
||||||
|
assertArrayEquals(message, bytesAndResult.getBytes());
|
||||||
|
assertFalse(bytesAndResult.getResult().isEmpty());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void inlineSignVerifyAliceNoArmor() throws IOException {
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
byte[] inlineSigned = getSop().inlineSign()
|
||||||
|
.key(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.noArmor()
|
||||||
|
.data(message)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
assertFalse(JUtils.arrayStartsWith(inlineSigned, BEGIN_PGP_MESSAGE_BYTES));
|
||||||
|
|
||||||
|
ByteArrayAndResult<List<Verification>> bytesAndResult = getSop().inlineVerify()
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.data(inlineSigned)
|
||||||
|
.toByteArrayAndResult();
|
||||||
|
|
||||||
|
assertArrayEquals(message, bytesAndResult.getBytes());
|
||||||
|
assertFalse(bytesAndResult.getResult().isEmpty());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void clearsignVerifyAlice() throws IOException {
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
byte[] clearsigned = getSop().inlineSign()
|
||||||
|
.key(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.mode(InlineSignAs.clearsigned)
|
||||||
|
.data(message)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
JUtils.assertArrayStartsWith(clearsigned, BEGIN_PGP_SIGNED_MESSAGE_BYTES);
|
||||||
|
|
||||||
|
ByteArrayAndResult<List<Verification>> bytesAndResult = getSop().inlineVerify()
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.data(clearsigned)
|
||||||
|
.toByteArrayAndResult();
|
||||||
|
|
||||||
|
assertArrayEquals(message, bytesAndResult.getBytes());
|
||||||
|
assertFalse(bytesAndResult.getResult().isEmpty());
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in a new issue