* Refactor library, remove duplicates * Rebuild structure to use Messages and Signature models * Use PGPSplitMessage * Remove signature model * Various fixes * Add helpers with tests * Fixes, add some docs, add tests * Add attachment helpers * Add helpers Symmetric encryption * Edit docs + examples * Rename kr to keyRing * Various fixes for documentation * Edit JSON handling functions, add decrypt keyring via token * Add proposal changes doc * Fix CI * Drop *Message functions, join CleartextMessage and BinaryMessage * Change canonicalization and trimming only to text signatures * Add cleartextsignature, detach signature from message model, move helpers * Documentation, remove optional parameters * Move verification to separate model * Don't return message in VerifyDetached * Update table of contents in readme * Appease golint * Run go fmt * Rename Encrypt/DecryptMessageWithPassword to ..WithToken These functions shouldn't be used with user-provided passwords, as they don't do any key-stretching. * Change key generation usernames
74 lines
1.9 KiB
Go
74 lines
1.9 KiB
Go
package crypto
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/ProtonMail/gopenpgp/constants"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
var testRandomToken []byte
|
|
|
|
func TestRandomToken(t *testing.T) {
|
|
var err error
|
|
testRandomToken, err = pgp.RandomToken()
|
|
if err != nil {
|
|
t.Fatal("Expected no error while generating default length random token, got:", err)
|
|
}
|
|
|
|
token40, err := pgp.RandomTokenSize(40)
|
|
if err != nil {
|
|
t.Fatal("Expected no error while generating random token, got:", err)
|
|
}
|
|
|
|
assert.Len(t, testRandomToken, 32)
|
|
assert.Len(t, token40, 40)
|
|
}
|
|
|
|
func TestAsymmetricKeyPacket(t *testing.T) {
|
|
symmetricKey := &SymmetricKey{
|
|
Key: testRandomToken,
|
|
Algo: constants.AES256,
|
|
}
|
|
|
|
privateKeyRing, _ := ReadArmoredKeyRing(strings.NewReader(readTestFile("keyring_privateKey", false)))
|
|
_ = privateKeyRing.UnlockWithPassphrase(testMailboxPassword)
|
|
|
|
keyPacket, err := privateKeyRing.EncryptSessionKey(symmetricKey)
|
|
if err != nil {
|
|
t.Fatal("Expected no error while generating key packet, got:", err)
|
|
}
|
|
|
|
// Password defined in keyring_test
|
|
outputSymmetricKey, err := privateKeyRing.DecryptSessionKey(keyPacket)
|
|
if err != nil {
|
|
t.Fatal("Expected no error while decrypting key packet, got:", err)
|
|
}
|
|
|
|
assert.Exactly(t, symmetricKey, outputSymmetricKey)
|
|
}
|
|
|
|
func TestSymmetricKeyPacket(t *testing.T) {
|
|
symmetricKey := &SymmetricKey{
|
|
Key: testRandomToken,
|
|
Algo: constants.AES256,
|
|
}
|
|
|
|
password := "I like encryption"
|
|
|
|
keyPacket, err := symmetricKey.EncryptToKeyPacket(password)
|
|
if err != nil {
|
|
t.Fatal("Expected no error while generating key packet, got:", err)
|
|
}
|
|
|
|
_, err = NewSymmetricKeyFromKeyPacket(keyPacket, "Wrong password")
|
|
assert.EqualError(t, err, "gopenpgp: password incorrect")
|
|
|
|
outputSymmetricKey, err := NewSymmetricKeyFromKeyPacket(keyPacket, password)
|
|
if err != nil {
|
|
t.Fatal("Expected no error while decrypting key packet, got:", err)
|
|
}
|
|
|
|
assert.Exactly(t, symmetricKey, outputSymmetricKey)
|
|
}
|