mirror of
https://codeberg.org/PGPainless/sop-java.git
synced 2024-12-22 12:57:57 +01:00
Increase test coverage
This commit is contained in:
parent
eded55c259
commit
8fc88b5bab
5 changed files with 258 additions and 2 deletions
|
@ -302,8 +302,12 @@ public class ExternalSOP implements SOP {
|
||||||
}
|
}
|
||||||
standardIn.close();
|
standardIn.close();
|
||||||
|
|
||||||
processOut.flush();
|
try {
|
||||||
processOut.close();
|
processOut.flush();
|
||||||
|
processOut.close();
|
||||||
|
} catch (IOException e) {
|
||||||
|
// ignore
|
||||||
|
}
|
||||||
|
|
||||||
while ((r = processIn.read(buf)) > 0) {
|
while ((r = processIn.read(buf)) > 0) {
|
||||||
outputStream.write(buf, 0 , r);
|
outputStream.write(buf, 0 , r);
|
||||||
|
|
|
@ -7,12 +7,17 @@ package sop.external;
|
||||||
import org.junit.jupiter.api.Test;
|
import org.junit.jupiter.api.Test;
|
||||||
import org.junit.jupiter.api.condition.EnabledIf;
|
import org.junit.jupiter.api.condition.EnabledIf;
|
||||||
import sop.Verification;
|
import sop.Verification;
|
||||||
|
import sop.enums.SignAs;
|
||||||
|
import sop.exception.SOPGPException;
|
||||||
|
import sop.util.UTCUtil;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.nio.charset.StandardCharsets;
|
import java.nio.charset.StandardCharsets;
|
||||||
|
import java.util.Date;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
import static org.junit.jupiter.api.Assertions.assertFalse;
|
import static org.junit.jupiter.api.Assertions.assertFalse;
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertThrows;
|
||||||
import static org.junit.jupiter.api.Assertions.assertTrue;
|
import static org.junit.jupiter.api.Assertions.assertTrue;
|
||||||
import static sop.external.JUtils.assertArrayStartsWith;
|
import static sop.external.JUtils.assertArrayStartsWith;
|
||||||
|
|
||||||
|
@ -41,8 +46,30 @@ public class ExternalDetachedSignVerifyRoundTripTest extends AbstractExternalSOP
|
||||||
assertTrue(verificationList.get(0).toString().contains("EB85BB5FA33A75E15E944E63F231550C4F47E38E EB85BB5FA33A75E15E944E63F231550C4F47E38E"));
|
assertTrue(verificationList.get(0).toString().contains("EB85BB5FA33A75E15E944E63F231550C4F47E38E EB85BB5FA33A75E15E944E63F231550C4F47E38E"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void signVerifyTextModeWithAliceKey() throws IOException {
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
byte[] signature = getSop().detachedSign()
|
||||||
|
.key(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.mode(SignAs.Text)
|
||||||
|
.data(message)
|
||||||
|
.toByteArrayAndResult()
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
List<Verification> verificationList = getSop().detachedVerify()
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.signatures(signature)
|
||||||
|
.data(message);
|
||||||
|
|
||||||
|
assertFalse(verificationList.isEmpty());
|
||||||
|
assertTrue(verificationList.get(0).toString().contains("EB85BB5FA33A75E15E944E63F231550C4F47E38E EB85BB5FA33A75E15E944E63F231550C4F47E38E"));
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void signVerifyWithFreshEncryptedKey() throws IOException {
|
public void signVerifyWithFreshEncryptedKey() throws IOException {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // --with-key-password not supported
|
||||||
|
|
||||||
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
byte[] keyPassword = "sw0rdf1sh".getBytes(StandardCharsets.UTF_8);
|
byte[] keyPassword = "sw0rdf1sh".getBytes(StandardCharsets.UTF_8);
|
||||||
byte[] key = getSop().generateKey()
|
byte[] key = getSop().generateKey()
|
||||||
|
@ -95,4 +122,48 @@ public class ExternalDetachedSignVerifyRoundTripTest extends AbstractExternalSOP
|
||||||
assertFalse(verificationList.isEmpty());
|
assertFalse(verificationList.isEmpty());
|
||||||
assertTrue(verificationList.get(0).toString().contains("D1A66E1A23B182C9980F788CFBFCC82A015E7330 D1A66E1A23B182C9980F788CFBFCC82A015E7330"));
|
assertTrue(verificationList.get(0).toString().contains("D1A66E1A23B182C9980F788CFBFCC82A015E7330 D1A66E1A23B182C9980F788CFBFCC82A015E7330"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void verifyNotAfterThrowsNoSignature() {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.27.2"); // returns 1 instead of 3 (NO_SIGNATURE)
|
||||||
|
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] signature = ("-----BEGIN PGP SIGNATURE-----\n" +
|
||||||
|
"\n" +
|
||||||
|
"iHUEABYKACcFAmPBjZUJEPIxVQxPR+OOFiEE64W7X6M6deFelE5j8jFVDE9H444A\n" +
|
||||||
|
"ADI/AQC6Bux6WpGYf7HO+QPV/D5iIrqZt9xPLgfUVoNJBmMZZwD+Ib+tn5pSyWUw\n" +
|
||||||
|
"0K1UgT5roym9Fln8U5W8R03TSbfNiwE=\n" +
|
||||||
|
"=bxPN\n" +
|
||||||
|
"-----END PGP SIGNATURE-----").getBytes(StandardCharsets.UTF_8);
|
||||||
|
Date signatureDate = UTCUtil.parseUTCDate("2023-01-13T16:57:57Z");
|
||||||
|
Date beforeSignature = new Date(signatureDate.getTime() - 1000); // 1 sec before sig
|
||||||
|
|
||||||
|
assertThrows(SOPGPException.NoSignature.class, () -> getSop().detachedVerify()
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.notAfter(beforeSignature)
|
||||||
|
.signatures(signature)
|
||||||
|
.data(message));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void verifyNotBeforeThrowsNoSignature() {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.27.2"); // returns 1 instead of 3 (NO_SIGNATURE)
|
||||||
|
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] signature = ("-----BEGIN PGP SIGNATURE-----\n" +
|
||||||
|
"\n" +
|
||||||
|
"iHUEABYKACcFAmPBjZUJEPIxVQxPR+OOFiEE64W7X6M6deFelE5j8jFVDE9H444A\n" +
|
||||||
|
"ADI/AQC6Bux6WpGYf7HO+QPV/D5iIrqZt9xPLgfUVoNJBmMZZwD+Ib+tn5pSyWUw\n" +
|
||||||
|
"0K1UgT5roym9Fln8U5W8R03TSbfNiwE=\n" +
|
||||||
|
"=bxPN\n" +
|
||||||
|
"-----END PGP SIGNATURE-----").getBytes(StandardCharsets.UTF_8);
|
||||||
|
Date signatureDate = UTCUtil.parseUTCDate("2023-01-13T16:57:57Z");
|
||||||
|
Date afterSignature = new Date(signatureDate.getTime() + 1000); // 1 sec after sig
|
||||||
|
|
||||||
|
assertThrows(SOPGPException.NoSignature.class, () -> getSop().detachedVerify()
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.notBefore(afterSignature)
|
||||||
|
.signatures(signature)
|
||||||
|
.data(message));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -9,6 +9,7 @@ import org.junit.jupiter.api.condition.EnabledIf;
|
||||||
import sop.ByteArrayAndResult;
|
import sop.ByteArrayAndResult;
|
||||||
import sop.DecryptionResult;
|
import sop.DecryptionResult;
|
||||||
import sop.Verification;
|
import sop.Verification;
|
||||||
|
import sop.enums.EncryptAs;
|
||||||
import sop.exception.SOPGPException;
|
import sop.exception.SOPGPException;
|
||||||
import sop.util.UTCUtil;
|
import sop.util.UTCUtil;
|
||||||
|
|
||||||
|
@ -100,6 +101,30 @@ public class ExternalEncryptDecryptRoundTripTest extends AbstractExternalSOPTest
|
||||||
assertArrayEquals(message, plaintext);
|
assertArrayEquals(message, plaintext);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void encryptNoArmorThenArmorThenDecryptRoundTrip() throws IOException {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // Invalid data type
|
||||||
|
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] ciphertext = getSop().encrypt()
|
||||||
|
.withCert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.noArmor()
|
||||||
|
.plaintext(message)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
byte[] armored = getSop().armor()
|
||||||
|
.data(ciphertext)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
ByteArrayAndResult<DecryptionResult> bytesAndResult = getSop().decrypt()
|
||||||
|
.withKey(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.ciphertext(armored)
|
||||||
|
.toByteArrayAndResult();
|
||||||
|
|
||||||
|
byte[] plaintext = bytesAndResult.getBytes();
|
||||||
|
assertArrayEquals(message, plaintext);
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void encryptSignDecryptVerifyRoundTripAliceTest() throws IOException {
|
public void encryptSignDecryptVerifyRoundTripAliceTest() throws IOException {
|
||||||
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
@ -125,8 +150,36 @@ public class ExternalEncryptDecryptRoundTripTest extends AbstractExternalSOPTest
|
||||||
assertTrue(verificationList.get(0).toString().contains("EB85BB5FA33A75E15E944E63F231550C4F47E38E EB85BB5FA33A75E15E944E63F231550C4F47E38E"));
|
assertTrue(verificationList.get(0).toString().contains("EB85BB5FA33A75E15E944E63F231550C4F47E38E EB85BB5FA33A75E15E944E63F231550C4F47E38E"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void encryptSignAsTextDecryptVerifyRoundTripAliceTest() throws IOException {
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] ciphertext = getSop().encrypt()
|
||||||
|
.withCert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.signWith(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.mode(EncryptAs.Text)
|
||||||
|
.plaintext(message)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
ByteArrayAndResult<DecryptionResult> bytesAndResult = getSop().decrypt()
|
||||||
|
.withKey(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.verifyWithCert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.ciphertext(ciphertext)
|
||||||
|
.toByteArrayAndResult();
|
||||||
|
|
||||||
|
byte[] plaintext = bytesAndResult.getBytes();
|
||||||
|
assertArrayEquals(message, plaintext);
|
||||||
|
|
||||||
|
DecryptionResult result = bytesAndResult.getResult();
|
||||||
|
assertNotNull(result.getSessionKey().get());
|
||||||
|
List<Verification> verificationList = result.getVerifications();
|
||||||
|
assertEquals(1, verificationList.size());
|
||||||
|
assertTrue(verificationList.get(0).toString().contains("EB85BB5FA33A75E15E944E63F231550C4F47E38E EB85BB5FA33A75E15E944E63F231550C4F47E38E"));
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void encryptSignDecryptVerifyRoundTripWithFreshEncryptedKeyTest() throws IOException {
|
public void encryptSignDecryptVerifyRoundTripWithFreshEncryptedKeyTest() throws IOException {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1");
|
||||||
|
|
||||||
byte[] keyPassword = "sw0rdf1sh".getBytes(StandardCharsets.UTF_8);
|
byte[] keyPassword = "sw0rdf1sh".getBytes(StandardCharsets.UTF_8);
|
||||||
byte[] key = getSop().generateKey()
|
byte[] key = getSop().generateKey()
|
||||||
.withKeyPassword(keyPassword)
|
.withKeyPassword(keyPassword)
|
||||||
|
|
|
@ -16,12 +16,18 @@ import java.util.List;
|
||||||
|
|
||||||
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
||||||
import static org.junit.jupiter.api.Assertions.assertFalse;
|
import static org.junit.jupiter.api.Assertions.assertFalse;
|
||||||
|
import static sop.external.JUtils.arrayStartsWith;
|
||||||
|
import static sop.external.JUtils.assertArrayStartsWith;
|
||||||
|
|
||||||
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
||||||
public class ExternalInlineSignDetachVerifyRoundTripTest extends AbstractExternalSOPTest {
|
public class ExternalInlineSignDetachVerifyRoundTripTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
|
private static final byte[] BEGIN_PGP_SIGNATURE = "-----BEGIN PGP SIGNATURE-----\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void inlineSignThenDetachThenDetachedVerifyTest() throws IOException {
|
public void inlineSignThenDetachThenDetachedVerifyTest() throws IOException {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // inline-sign not supported
|
||||||
|
|
||||||
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
byte[] inlineSigned = getSop().inlineSign()
|
byte[] inlineSigned = getSop().inlineSign()
|
||||||
|
@ -46,4 +52,40 @@ public class ExternalInlineSignDetachVerifyRoundTripTest extends AbstractExterna
|
||||||
|
|
||||||
assertFalse(verifications.isEmpty());
|
assertFalse(verifications.isEmpty());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void inlineSignThenDetachNoArmorThenArmorThenDetachedVerifyTest() throws IOException {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // inline-sign not supported
|
||||||
|
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
|
byte[] inlineSigned = getSop().inlineSign()
|
||||||
|
.key(TestKeys.ALICE_KEY.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.data(message)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
ByteArrayAndResult<Signatures> bytesAndResult = getSop().inlineDetach()
|
||||||
|
.noArmor()
|
||||||
|
.message(inlineSigned)
|
||||||
|
.toByteArrayAndResult();
|
||||||
|
|
||||||
|
byte[] plaintext = bytesAndResult.getBytes();
|
||||||
|
assertArrayEquals(message, plaintext);
|
||||||
|
|
||||||
|
byte[] signatures = bytesAndResult.getResult()
|
||||||
|
.getBytes();
|
||||||
|
assertFalse(arrayStartsWith(signatures, BEGIN_PGP_SIGNATURE));
|
||||||
|
|
||||||
|
byte[] armored = getSop().armor()
|
||||||
|
.data(signatures)
|
||||||
|
.getBytes();
|
||||||
|
assertArrayStartsWith(armored, BEGIN_PGP_SIGNATURE);
|
||||||
|
|
||||||
|
List<Verification> verifications = getSop().detachedVerify()
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.signatures(armored)
|
||||||
|
.data(plaintext);
|
||||||
|
|
||||||
|
assertFalse(verifications.isEmpty());
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -9,13 +9,17 @@ import org.junit.jupiter.api.condition.EnabledIf;
|
||||||
import sop.ByteArrayAndResult;
|
import sop.ByteArrayAndResult;
|
||||||
import sop.Verification;
|
import sop.Verification;
|
||||||
import sop.enums.InlineSignAs;
|
import sop.enums.InlineSignAs;
|
||||||
|
import sop.exception.SOPGPException;
|
||||||
|
import sop.util.UTCUtil;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.nio.charset.StandardCharsets;
|
import java.nio.charset.StandardCharsets;
|
||||||
|
import java.util.Date;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
|
||||||
import static org.junit.jupiter.api.Assertions.assertFalse;
|
import static org.junit.jupiter.api.Assertions.assertFalse;
|
||||||
|
import static org.junit.jupiter.api.Assertions.assertThrows;
|
||||||
|
|
||||||
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
@EnabledIf("sop.external.AbstractExternalSOPTest#isExternalSopInstalled")
|
||||||
public class ExternalInlineSignVerifyTest extends AbstractExternalSOPTest {
|
public class ExternalInlineSignVerifyTest extends AbstractExternalSOPTest {
|
||||||
|
@ -27,6 +31,8 @@ public class ExternalInlineSignVerifyTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void inlineSignVerifyAlice() throws IOException {
|
public void inlineSignVerifyAlice() throws IOException {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // inline-sign not supported
|
||||||
|
|
||||||
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
byte[] inlineSigned = getSop().inlineSign()
|
byte[] inlineSigned = getSop().inlineSign()
|
||||||
|
@ -47,6 +53,8 @@ public class ExternalInlineSignVerifyTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void inlineSignVerifyAliceNoArmor() throws IOException {
|
public void inlineSignVerifyAliceNoArmor() throws IOException {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // inline-sign not supported
|
||||||
|
|
||||||
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
byte[] inlineSigned = getSop().inlineSign()
|
byte[] inlineSigned = getSop().inlineSign()
|
||||||
|
@ -68,6 +76,8 @@ public class ExternalInlineSignVerifyTest extends AbstractExternalSOPTest {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void clearsignVerifyAlice() throws IOException {
|
public void clearsignVerifyAlice() throws IOException {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // inline-sign not supported
|
||||||
|
|
||||||
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
|
||||||
byte[] clearsigned = getSop().inlineSign()
|
byte[] clearsigned = getSop().inlineSign()
|
||||||
|
@ -86,4 +96,80 @@ public class ExternalInlineSignVerifyTest extends AbstractExternalSOPTest {
|
||||||
assertArrayEquals(message, bytesAndResult.getBytes());
|
assertArrayEquals(message, bytesAndResult.getBytes());
|
||||||
assertFalse(bytesAndResult.getResult().isEmpty());
|
assertFalse(bytesAndResult.getResult().isEmpty());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void assertNotBeforeThrowsNoSignature() {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // inline-sign not supported
|
||||||
|
ignoreIf("sqop", Is.leq, "0.27.2"); // returns 1 instead of 3 (NO_SIGNATURE)
|
||||||
|
|
||||||
|
byte[] message = ("-----BEGIN PGP MESSAGE-----\n" +
|
||||||
|
"\n" +
|
||||||
|
"owGbwMvMwCX2yTCUx9/9cR/jaZEkBhDwSM3JyddRCM8vyklR5OooZWEQ42JQZ2VK\n" +
|
||||||
|
"PjjpPacATLmYIsvr1t3xi61KH8ZN8UuGCTMwpPcw/E9jS+vcvPu2gmp4jcRbcSNP\n" +
|
||||||
|
"FYmW8hmLJdUVrdt1V8w6GM/IMEvN0tP339sNGX4swq8T5p62q3jUfLjpstmcI6Ie\n" +
|
||||||
|
"sfcfswMA\n" +
|
||||||
|
"=RDAo\n" +
|
||||||
|
"-----END PGP MESSAGE-----").getBytes(StandardCharsets.UTF_8);
|
||||||
|
Date signatureDate = UTCUtil.parseUTCDate("2023-01-13T17:20:47Z");
|
||||||
|
Date afterSignature = new Date(signatureDate.getTime() + 1000); // 1 sec before sig
|
||||||
|
|
||||||
|
assertThrows(SOPGPException.NoSignature.class, () -> getSop().inlineVerify()
|
||||||
|
.notBefore(afterSignature)
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.data(message)
|
||||||
|
.toByteArrayAndResult());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void assertNotAfterThrowsNoSignature() {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // inline-sign not supported
|
||||||
|
ignoreIf("sqop", Is.leq, "0.27.2"); // returns 1 instead of 3 (NO_SIGNATURE)
|
||||||
|
|
||||||
|
byte[] message = ("-----BEGIN PGP MESSAGE-----\n" +
|
||||||
|
"\n" +
|
||||||
|
"owGbwMvMwCX2yTCUx9/9cR/jaZEkBhDwSM3JyddRCM8vyklR5OooZWEQ42JQZ2VK\n" +
|
||||||
|
"PjjpPacATLmYIsvr1t3xi61KH8ZN8UuGCTMwpPcw/E9jS+vcvPu2gmp4jcRbcSNP\n" +
|
||||||
|
"FYmW8hmLJdUVrdt1V8w6GM/IMEvN0tP339sNGX4swq8T5p62q3jUfLjpstmcI6Ie\n" +
|
||||||
|
"sfcfswMA\n" +
|
||||||
|
"=RDAo\n" +
|
||||||
|
"-----END PGP MESSAGE-----").getBytes(StandardCharsets.UTF_8);
|
||||||
|
Date signatureDate = UTCUtil.parseUTCDate("2023-01-13T17:20:47Z");
|
||||||
|
Date beforeSignature = new Date(signatureDate.getTime() - 1000); // 1 sec before sig
|
||||||
|
|
||||||
|
assertThrows(SOPGPException.NoSignature.class, () -> getSop().inlineVerify()
|
||||||
|
.notAfter(beforeSignature)
|
||||||
|
.cert(TestKeys.ALICE_CERT.getBytes(StandardCharsets.UTF_8))
|
||||||
|
.data(message)
|
||||||
|
.toByteArrayAndResult());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void signVerifyWithPasswordProtectedKey() throws IOException {
|
||||||
|
ignoreIf("sqop", Is.leq, "0.26.1"); // inline-sign not supported
|
||||||
|
|
||||||
|
byte[] message = "Hello, World!\n".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] keyPassword = "sw0rdf1sh".getBytes(StandardCharsets.UTF_8);
|
||||||
|
byte[] key = getSop().generateKey()
|
||||||
|
.userId("Alice <alice@openpgp.org>")
|
||||||
|
.withKeyPassword(keyPassword)
|
||||||
|
.generate()
|
||||||
|
.getBytes();
|
||||||
|
byte[] cert = getSop().extractCert()
|
||||||
|
.key(key)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
byte[] inlineSigned = getSop().inlineSign()
|
||||||
|
.withKeyPassword(keyPassword)
|
||||||
|
.key(key)
|
||||||
|
.mode(InlineSignAs.binary)
|
||||||
|
.data(message)
|
||||||
|
.getBytes();
|
||||||
|
|
||||||
|
assertFalse(getSop().inlineVerify()
|
||||||
|
.cert(cert)
|
||||||
|
.data(inlineSigned)
|
||||||
|
.toByteArrayAndResult()
|
||||||
|
.getResult()
|
||||||
|
.isEmpty());
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue