Fix make bundle-test and keyring unit-tests
This commit is contained in:
parent
4979550729
commit
5fd4bdbccb
1
.gitattributes
vendored
1
.gitattributes
vendored
|
@ -1 +1,2 @@
|
||||||
resources/openpgp*.js binary
|
resources/openpgp*.js binary
|
||||||
|
resources/keyring*.js binary
|
||||||
|
|
4
Makefile
4
Makefile
|
@ -37,10 +37,10 @@ bundle:
|
||||||
@browserify -x openpgp -r ./src/keyring/:keyring > ./resources/keyring_nodebug.js
|
@browserify -x openpgp -r ./src/keyring/:keyring > ./resources/keyring_nodebug.js
|
||||||
|
|
||||||
bundle-test:
|
bundle-test:
|
||||||
@browserify -d -r ./test/test-all.js:unittests > ./test/lib/test-bundle.js
|
@browserify -d -x openpgp -x keyring -r ./test/test-all.js:unittests > ./test/lib/test-bundle.js
|
||||||
|
|
||||||
bundle-ci-test:
|
bundle-ci-test:
|
||||||
@browserify -d -x openpgp -r ./test/ci-tests-all.js:ci-tests > ./test/lib/ci-tests-bundle.js
|
@browserify -d -x openpgp -x keyring -r ./test/ci-tests-all.js:ci-tests > ./test/lib/ci-tests-bundle.js
|
||||||
|
|
||||||
test:
|
test:
|
||||||
@echo to be implemented
|
@echo to be implemented
|
||||||
|
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
|
@ -90,7 +90,7 @@ CleartextMessage.prototype.verify = function(publicKeys) {
|
||||||
if (publicKeyPacket) {
|
if (publicKeyPacket) {
|
||||||
var verifiedSig = {};
|
var verifiedSig = {};
|
||||||
verifiedSig.keyid = signatureList[i].issuerKeyId;
|
verifiedSig.keyid = signatureList[i].issuerKeyId;
|
||||||
verifiedSig.status = signatureList[i].verify(publicKeyPacket, literalDataPacket);
|
verifiedSig.valid = signatureList[i].verify(publicKeyPacket, literalDataPacket);
|
||||||
result.push(verifiedSig);
|
result.push(verifiedSig);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
|
@ -59,8 +59,8 @@ var keyring = function() {
|
||||||
if (openpgp.util.hexstrdump(keyids[i].write()) == id) {
|
if (openpgp.util.hexstrdump(keyids[i].write()) == id) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
return false;
|
|
||||||
}
|
}
|
||||||
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
function checkForIdentityAndKeyTypeMatch(keys, identityFunction, identityInput, keyType) {
|
function checkForIdentityAndKeyTypeMatch(keys, identityFunction, identityInput, keyType) {
|
||||||
|
|
|
@ -220,7 +220,7 @@ Message.prototype.verify = function(publicKeys) {
|
||||||
if (publicKeyPacket) {
|
if (publicKeyPacket) {
|
||||||
var verifiedSig = {};
|
var verifiedSig = {};
|
||||||
verifiedSig.keyid = signatureList[i].issuerKeyId;
|
verifiedSig.keyid = signatureList[i].issuerKeyId;
|
||||||
verifiedSig.status = signatureList[i].verify(publicKeyPacket, literalDataList[0]);
|
verifiedSig.valid = signatureList[i].verify(publicKeyPacket, literalDataList[0]);
|
||||||
result.push(verifiedSig);
|
result.push(verifiedSig);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@ -297,3 +297,4 @@ function fromBinary(bytes) {
|
||||||
exports.Message = Message;
|
exports.Message = Message;
|
||||||
exports.readArmored = readArmored;
|
exports.readArmored = readArmored;
|
||||||
exports.fromText = fromText;
|
exports.fromText = fromText;
|
||||||
|
exports.fromBinary = fromBinary;
|
||||||
|
|
|
@ -75,7 +75,7 @@ function decryptMessage(privateKey, message) {
|
||||||
* @param {key} privateKey private key with decrypted secret key data
|
* @param {key} privateKey private key with decrypted secret key data
|
||||||
* @param {[key]} publicKeys public keys to verify signatures
|
* @param {[key]} publicKeys public keys to verify signatures
|
||||||
* @param {message} message the message object with signed and encrypted data
|
* @param {message} message the message object with signed and encrypted data
|
||||||
* @return {{'text': String, signatures: [{'keyid': keyid, 'status': Boolean}]}}
|
* @return {{'text': String, signatures: [{'keyid': keyid, 'valid': Boolean}]}}
|
||||||
* decrypted message as as native JavaScript string
|
* decrypted message as as native JavaScript string
|
||||||
* with verified signatures or null if no literal data found
|
* with verified signatures or null if no literal data found
|
||||||
*/
|
*/
|
||||||
|
@ -106,7 +106,7 @@ function signClearMessage(privateKeys, text) {
|
||||||
* Verifies signatures of cleartext signed message
|
* Verifies signatures of cleartext signed message
|
||||||
* @param {[Key]} publicKeys public keys to verify signatures
|
* @param {[Key]} publicKeys public keys to verify signatures
|
||||||
* @param {CleartextMessage} message cleartext message object with signatures
|
* @param {CleartextMessage} message cleartext message object with signatures
|
||||||
* @return {{'text': String, signatures: [{'keyid': keyid, 'status': Boolean}]}}
|
* @return {{'text': String, signatures: [{'keyid': keyid, 'valid': Boolean}]}}
|
||||||
* cleartext with status of verified signatures
|
* cleartext with status of verified signatures
|
||||||
*/
|
*/
|
||||||
function verifyClearSignedMessage(publicKeys, message) {
|
function verifyClearSignedMessage(publicKeys, message) {
|
||||||
|
|
|
@ -141,7 +141,7 @@ describe('Openpgp integration tests', function() {
|
||||||
expect(result, 'decryptAndVerifyMessage() result').to.exist;
|
expect(result, 'decryptAndVerifyMessage() result').to.exist;
|
||||||
expect(result.text, 'decryptAndVerifyMessage() result.text').to.exist.and.equal(message);
|
expect(result.text, 'decryptAndVerifyMessage() result.text').to.exist.and.equal(message);
|
||||||
expect(result.signatures, 'decryptAndVerifyMessage() result.signatures').to.exist.and.not.be.empty;
|
expect(result.signatures, 'decryptAndVerifyMessage() result.signatures').to.exist.and.not.be.empty;
|
||||||
expect(result.signatures[0].status, 'decryptAndVerifyMessage() result.signatures[0].status').to.be.true;
|
expect(result.signatures[0].valid, 'decryptAndVerifyMessage() result.signatures[0].valid').to.be.true;
|
||||||
done();
|
done();
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
@ -185,7 +185,7 @@ describe('Openpgp integration tests', function() {
|
||||||
var result = cleartext.verify([verifykey])
|
var result = cleartext.verify([verifykey])
|
||||||
expect(result, 'verify() result').to.exist.and.not.be.empty;
|
expect(result, 'verify() result').to.exist.and.not.be.empty;
|
||||||
expect(result[0].keyid, 'verify() result[0].keyid').to.exist;
|
expect(result[0].keyid, 'verify() result[0].keyid').to.exist;
|
||||||
expect(result[0].status, 'verify() result[0].status').to.be.true;
|
expect(result[0].valid, 'verify() result[0].valid').to.be.true;
|
||||||
done();
|
done();
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
@ -228,7 +228,7 @@ describe('Openpgp integration tests', function() {
|
||||||
var result = cleartext.verify([verifykey])
|
var result = cleartext.verify([verifykey])
|
||||||
expect(result, 'verify() result').to.exist.and.not.be.empty;
|
expect(result, 'verify() result').to.exist.and.not.be.empty;
|
||||||
expect(result[0].keyid, 'verify() result[0].keyid').to.exist;
|
expect(result[0].keyid, 'verify() result[0].keyid').to.exist;
|
||||||
expect(result[0].status, 'verify() result[0].status').to.be.true;
|
expect(result[0].valid, 'verify() result[0].valid').to.be.true;
|
||||||
done();
|
done();
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
|
@ -5,9 +5,8 @@ unit.register("Keyring testing", function() {
|
||||||
var keyring = require('keyring');
|
var keyring = require('keyring');
|
||||||
var result = [];
|
var result = [];
|
||||||
|
|
||||||
// Exercises the ability of openpgp_keyring.getPublicKeysForKeyId to return subkeys
|
|
||||||
keyring.init();
|
keyring.init();
|
||||||
keyring.importPacketlist([
|
keyring.importKey([
|
||||||
'-----BEGIN PGP PUBLIC KEY BLOCK-----',
|
'-----BEGIN PGP PUBLIC KEY BLOCK-----',
|
||||||
'Version: GnuPG v1.4.11 (GNU/Linux)',
|
'Version: GnuPG v1.4.11 (GNU/Linux)',
|
||||||
'',
|
'',
|
||||||
|
@ -48,14 +47,14 @@ unit.register("Keyring testing", function() {
|
||||||
'AJ9zh4zsK4GIPuEu81YPNmHsju7DYg==',
|
'AJ9zh4zsK4GIPuEu81YPNmHsju7DYg==',
|
||||||
'=WaSx',
|
'=WaSx',
|
||||||
'-----END PGP MESSAGE-----'
|
'-----END PGP MESSAGE-----'
|
||||||
].join("\n")).packets;
|
].join("\n"));
|
||||||
var packetlists = keyring.getPacketlistsForKeyId(msg2[0].signingKeyId.write());
|
var signingKeyIds = msg2.getSigningKeyIds();
|
||||||
var pubKey = packetlists[0];
|
var key = keyring.getKeysForKeyId(signingKeyIds[0].toHex());
|
||||||
msg2[2].verify(pubKey[3], msg2[1]);
|
var verified = msg2.verify(key);
|
||||||
result[2] = new unit.result("Testing keyring public subkey support",
|
result[2] = new unit.result("Testing keyring getKeysForKeyId method",
|
||||||
packetlists !== null &&
|
key !== null &&
|
||||||
packetlists.length == 1 &&
|
key.length == 1 &&
|
||||||
msg2[2].verified);
|
verified[0].valid);
|
||||||
return result;
|
return result;
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|
|
@ -288,7 +288,7 @@ var pub_key_arm3 =
|
||||||
privKey.decryptKeyPacket(keyids, 'hello world');
|
privKey.decryptKeyPacket(keyids, 'hello world');
|
||||||
|
|
||||||
var decrypted = openpgp.decryptAndVerifyMessage(privKey, [pubKey], esMsg);
|
var decrypted = openpgp.decryptAndVerifyMessage(privKey, [pubKey], esMsg);
|
||||||
var verified = decrypted.text == plaintext && decrypted.signatures[0].status;
|
var verified = decrypted.text == plaintext && decrypted.signatures[0].valid;
|
||||||
|
|
||||||
return new unit.result("Verify signature of signed and encrypted message from GPG2 with openpgp.decryptAndVerifyMessage", verified);
|
return new unit.result("Verify signature of signed and encrypted message from GPG2 with openpgp.decryptAndVerifyMessage", verified);
|
||||||
}, function() {
|
}, function() {
|
||||||
|
@ -319,7 +319,7 @@ var pub_key_arm3 =
|
||||||
privKey.decryptKeyPacket(keyids, 'hello world');
|
privKey.decryptKeyPacket(keyids, 'hello world');
|
||||||
|
|
||||||
var decrypted = openpgp.decryptAndVerifyMessage(privKey, [pubKey], esMsg);
|
var decrypted = openpgp.decryptAndVerifyMessage(privKey, [pubKey], esMsg);
|
||||||
var verified = decrypted.text == plaintext && decrypted.signatures[0].status;
|
var verified = decrypted.text == plaintext && decrypted.signatures[0].valid;
|
||||||
|
|
||||||
return new unit.result("Verify signature of signed and encrypted message from PGP 10.3.0 with openpgp.decryptAndVerifyMessage", verified);
|
return new unit.result("Verify signature of signed and encrypted message from PGP 10.3.0 with openpgp.decryptAndVerifyMessage", verified);
|
||||||
}, function() {
|
}, function() {
|
||||||
|
@ -355,7 +355,7 @@ var pub_key_arm3 =
|
||||||
|
|
||||||
var verifiedSig = sMsg.verify([pubKey2, pubKey3]);
|
var verifiedSig = sMsg.verify([pubKey2, pubKey3]);
|
||||||
|
|
||||||
verified = verified && verifiedSig[0].status && verifiedSig[1].status;
|
verified = verified && verifiedSig[0].valid && verifiedSig[1].valid;
|
||||||
|
|
||||||
return new unit.result("Verify signed message with two one pass signatures", verified);
|
return new unit.result("Verify signed message with two one pass signatures", verified);
|
||||||
}, function() {
|
}, function() {
|
||||||
|
@ -396,7 +396,7 @@ var pub_key_arm3 =
|
||||||
|
|
||||||
verified = verified && cleartextSig.text == plaintext;
|
verified = verified && cleartextSig.text == plaintext;
|
||||||
|
|
||||||
verified = verified && cleartextSig.signatures[0].status && cleartextSig.signatures[1].status;
|
verified = verified && cleartextSig.signatures[0].valid && cleartextSig.signatures[1].valid;
|
||||||
|
|
||||||
return new unit.result("Verify cleartext signed message with two signatures with openpgp.verifyClearSignedMessage", verified);
|
return new unit.result("Verify cleartext signed message with two signatures with openpgp.verifyClearSignedMessage", verified);
|
||||||
}, function() {
|
}, function() {
|
||||||
|
@ -414,7 +414,7 @@ var pub_key_arm3 =
|
||||||
|
|
||||||
var verified = cleartextSig.text == plaintext.replace(/\r/g,'');
|
var verified = cleartextSig.text == plaintext.replace(/\r/g,'');
|
||||||
|
|
||||||
verified = verified && cleartextSig.signatures[0].status;
|
verified = verified && cleartextSig.signatures[0].valid;
|
||||||
|
|
||||||
return new unit.result("Sign text with openpgp.signClearMessage and verify with openpgp.verifyClearSignedMessage leads to same cleartext and valid signatures", verified);
|
return new unit.result("Sign text with openpgp.signClearMessage and verify with openpgp.verifyClearSignedMessage leads to same cleartext and valid signatures", verified);
|
||||||
}, function() {
|
}, function() {
|
||||||
|
@ -446,7 +446,7 @@ var pub_key_arm3 =
|
||||||
|
|
||||||
var verified = cleartextSig.text == plaintext;
|
var verified = cleartextSig.text == plaintext;
|
||||||
|
|
||||||
verified = verified && cleartextSig.signatures[0].status;
|
verified = verified && cleartextSig.signatures[0].valid;
|
||||||
|
|
||||||
return new unit.result("Verify cleartext signed message with CP-1252 character encoding", verified);
|
return new unit.result("Verify cleartext signed message with CP-1252 character encoding", verified);
|
||||||
}];
|
}];
|
||||||
|
|
|
@ -4,7 +4,6 @@
|
||||||
<meta charset="utf-8">
|
<meta charset="utf-8">
|
||||||
|
|
||||||
<!-- unit test -->
|
<!-- unit test -->
|
||||||
<script type="text/javascript" src="test-bundle.js"></script>
|
|
||||||
<title>OpenPGP.js testpage</title>
|
<title>OpenPGP.js testpage</title>
|
||||||
|
|
||||||
<style>
|
<style>
|
||||||
|
|
Loading…
Reference in New Issue
Block a user