2019-05-15 13:48:47 +02:00
|
|
|
package crypto
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"strings"
|
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
|
|
"github.com/ProtonMail/gopenpgp/constants"
|
2019-06-03 17:00:01 +02:00
|
|
|
"github.com/stretchr/testify/assert"
|
2019-05-15 13:48:47 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
var testRandomToken []byte
|
2019-06-03 17:00:01 +02:00
|
|
|
|
2019-05-15 13:48:47 +02:00
|
|
|
func TestRandomToken(t *testing.T) {
|
|
|
|
|
var err error
|
|
|
|
|
testRandomToken, err = pgp.RandomToken()
|
|
|
|
|
if err != nil {
|
2019-06-03 17:00:01 +02:00
|
|
|
t.Fatal("Expected no error while generating default length random token, got:", err)
|
2019-05-15 13:48:47 +02:00
|
|
|
}
|
|
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
token40, err := pgp.RandomTokenSize(40)
|
2019-05-15 13:48:47 +02:00
|
|
|
if err != nil {
|
|
|
|
|
t.Fatal("Expected no error while generating random token, got:", err)
|
|
|
|
|
}
|
|
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
assert.Len(t, testRandomToken, 32)
|
|
|
|
|
assert.Len(t, token40, 40)
|
2019-05-15 13:48:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestAsymmetricKeyPacket(t *testing.T) {
|
|
|
|
|
symmetricKey := &SymmetricKey{
|
2019-06-03 17:00:01 +02:00
|
|
|
Key: testRandomToken,
|
2019-05-15 13:48:47 +02:00
|
|
|
Algo: constants.AES256,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
privateKeyRing, _ := ReadArmoredKeyRing(strings.NewReader(readTestFile("keyring_privateKey", false)))
|
2019-06-03 17:00:01 +02:00
|
|
|
_ = privateKeyRing.UnlockWithPassphrase(testMailboxPassword)
|
2019-05-15 13:48:47 +02:00
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
keyPacket, err := privateKeyRing.EncryptSessionKey(symmetricKey)
|
2019-05-15 13:48:47 +02:00
|
|
|
if err != nil {
|
|
|
|
|
t.Fatal("Expected no error while generating key packet, got:", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Password defined in keyring_test
|
2019-06-03 17:00:01 +02:00
|
|
|
outputSymmetricKey, err := privateKeyRing.DecryptSessionKey(keyPacket)
|
2019-05-15 13:48:47 +02:00
|
|
|
if err != nil {
|
|
|
|
|
t.Fatal("Expected no error while decrypting key packet, got:", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
assert.Exactly(t, symmetricKey, outputSymmetricKey)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestSymmetricKeyPacket(t *testing.T) {
|
|
|
|
|
symmetricKey := &SymmetricKey{
|
2019-06-03 17:00:01 +02:00
|
|
|
Key: testRandomToken,
|
2019-05-15 13:48:47 +02:00
|
|
|
Algo: constants.AES256,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
password := "I like encryption"
|
|
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
keyPacket, err := symmetricKey.EncryptToKeyPacket(password)
|
2019-05-15 13:48:47 +02:00
|
|
|
if err != nil {
|
|
|
|
|
t.Fatal("Expected no error while generating key packet, got:", err)
|
|
|
|
|
}
|
|
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
_, err = NewSymmetricKeyFromKeyPacket(keyPacket, "Wrong password")
|
|
|
|
|
assert.EqualError(t, err, "gopenpgp: password incorrect")
|
2019-05-15 13:48:47 +02:00
|
|
|
|
2019-06-03 17:00:01 +02:00
|
|
|
outputSymmetricKey, err := NewSymmetricKeyFromKeyPacket(keyPacket, password)
|
2019-05-15 13:48:47 +02:00
|
|
|
if err != nil {
|
|
|
|
|
t.Fatal("Expected no error while decrypting key packet, got:", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
assert.Exactly(t, symmetricKey, outputSymmetricKey)
|
|
|
|
|
}
|