Fix make bundle-test and keyring unit-tests

This commit is contained in:
Thomas Oberndörfer 2013-12-09 16:57:44 +01:00
parent 4979550729
commit 5fd4bdbccb
12 changed files with 39 additions and 38 deletions

1
.gitattributes vendored
View File

@ -1 +1,2 @@
resources/openpgp*.js binary resources/openpgp*.js binary
resources/keyring*.js binary

View File

@ -37,10 +37,10 @@ bundle:
@browserify -x openpgp -r ./src/keyring/:keyring > ./resources/keyring_nodebug.js @browserify -x openpgp -r ./src/keyring/:keyring > ./resources/keyring_nodebug.js
bundle-test: bundle-test:
@browserify -d -r ./test/test-all.js:unittests > ./test/lib/test-bundle.js @browserify -d -x openpgp -x keyring -r ./test/test-all.js:unittests > ./test/lib/test-bundle.js
bundle-ci-test: bundle-ci-test:
@browserify -d -x openpgp -r ./test/ci-tests-all.js:ci-tests > ./test/lib/ci-tests-bundle.js @browserify -d -x openpgp -x keyring -r ./test/ci-tests-all.js:ci-tests > ./test/lib/ci-tests-bundle.js
test: test:
@echo to be implemented @echo to be implemented

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -90,7 +90,7 @@ CleartextMessage.prototype.verify = function(publicKeys) {
if (publicKeyPacket) { if (publicKeyPacket) {
var verifiedSig = {}; var verifiedSig = {};
verifiedSig.keyid = signatureList[i].issuerKeyId; verifiedSig.keyid = signatureList[i].issuerKeyId;
verifiedSig.status = signatureList[i].verify(publicKeyPacket, literalDataPacket); verifiedSig.valid = signatureList[i].verify(publicKeyPacket, literalDataPacket);
result.push(verifiedSig); result.push(verifiedSig);
break; break;
} }

View File

@ -59,8 +59,8 @@ var keyring = function() {
if (openpgp.util.hexstrdump(keyids[i].write()) == id) { if (openpgp.util.hexstrdump(keyids[i].write()) == id) {
return true; return true;
} }
return false;
} }
return false;
} }
function checkForIdentityAndKeyTypeMatch(keys, identityFunction, identityInput, keyType) { function checkForIdentityAndKeyTypeMatch(keys, identityFunction, identityInput, keyType) {

View File

@ -220,7 +220,7 @@ Message.prototype.verify = function(publicKeys) {
if (publicKeyPacket) { if (publicKeyPacket) {
var verifiedSig = {}; var verifiedSig = {};
verifiedSig.keyid = signatureList[i].issuerKeyId; verifiedSig.keyid = signatureList[i].issuerKeyId;
verifiedSig.status = signatureList[i].verify(publicKeyPacket, literalDataList[0]); verifiedSig.valid = signatureList[i].verify(publicKeyPacket, literalDataList[0]);
result.push(verifiedSig); result.push(verifiedSig);
break; break;
} }
@ -297,3 +297,4 @@ function fromBinary(bytes) {
exports.Message = Message; exports.Message = Message;
exports.readArmored = readArmored; exports.readArmored = readArmored;
exports.fromText = fromText; exports.fromText = fromText;
exports.fromBinary = fromBinary;

View File

@ -75,7 +75,7 @@ function decryptMessage(privateKey, message) {
* @param {key} privateKey private key with decrypted secret key data * @param {key} privateKey private key with decrypted secret key data
* @param {[key]} publicKeys public keys to verify signatures * @param {[key]} publicKeys public keys to verify signatures
* @param {message} message the message object with signed and encrypted data * @param {message} message the message object with signed and encrypted data
* @return {{'text': String, signatures: [{'keyid': keyid, 'status': Boolean}]}} * @return {{'text': String, signatures: [{'keyid': keyid, 'valid': Boolean}]}}
* decrypted message as as native JavaScript string * decrypted message as as native JavaScript string
* with verified signatures or null if no literal data found * with verified signatures or null if no literal data found
*/ */
@ -106,7 +106,7 @@ function signClearMessage(privateKeys, text) {
* Verifies signatures of cleartext signed message * Verifies signatures of cleartext signed message
* @param {[Key]} publicKeys public keys to verify signatures * @param {[Key]} publicKeys public keys to verify signatures
* @param {CleartextMessage} message cleartext message object with signatures * @param {CleartextMessage} message cleartext message object with signatures
* @return {{'text': String, signatures: [{'keyid': keyid, 'status': Boolean}]}} * @return {{'text': String, signatures: [{'keyid': keyid, 'valid': Boolean}]}}
* cleartext with status of verified signatures * cleartext with status of verified signatures
*/ */
function verifyClearSignedMessage(publicKeys, message) { function verifyClearSignedMessage(publicKeys, message) {

View File

@ -141,7 +141,7 @@ describe('Openpgp integration tests', function() {
expect(result, 'decryptAndVerifyMessage() result').to.exist; expect(result, 'decryptAndVerifyMessage() result').to.exist;
expect(result.text, 'decryptAndVerifyMessage() result.text').to.exist.and.equal(message); expect(result.text, 'decryptAndVerifyMessage() result.text').to.exist.and.equal(message);
expect(result.signatures, 'decryptAndVerifyMessage() result.signatures').to.exist.and.not.be.empty; expect(result.signatures, 'decryptAndVerifyMessage() result.signatures').to.exist.and.not.be.empty;
expect(result.signatures[0].status, 'decryptAndVerifyMessage() result.signatures[0].status').to.be.true; expect(result.signatures[0].valid, 'decryptAndVerifyMessage() result.signatures[0].valid').to.be.true;
done(); done();
}); });
}); });
@ -185,7 +185,7 @@ describe('Openpgp integration tests', function() {
var result = cleartext.verify([verifykey]) var result = cleartext.verify([verifykey])
expect(result, 'verify() result').to.exist.and.not.be.empty; expect(result, 'verify() result').to.exist.and.not.be.empty;
expect(result[0].keyid, 'verify() result[0].keyid').to.exist; expect(result[0].keyid, 'verify() result[0].keyid').to.exist;
expect(result[0].status, 'verify() result[0].status').to.be.true; expect(result[0].valid, 'verify() result[0].valid').to.be.true;
done(); done();
}); });
}); });
@ -228,7 +228,7 @@ describe('Openpgp integration tests', function() {
var result = cleartext.verify([verifykey]) var result = cleartext.verify([verifykey])
expect(result, 'verify() result').to.exist.and.not.be.empty; expect(result, 'verify() result').to.exist.and.not.be.empty;
expect(result[0].keyid, 'verify() result[0].keyid').to.exist; expect(result[0].keyid, 'verify() result[0].keyid').to.exist;
expect(result[0].status, 'verify() result[0].status').to.be.true; expect(result[0].valid, 'verify() result[0].valid').to.be.true;
done(); done();
}); });
}); });

View File

@ -5,9 +5,8 @@ unit.register("Keyring testing", function() {
var keyring = require('keyring'); var keyring = require('keyring');
var result = []; var result = [];
// Exercises the ability of openpgp_keyring.getPublicKeysForKeyId to return subkeys
keyring.init(); keyring.init();
keyring.importPacketlist([ keyring.importKey([
'-----BEGIN PGP PUBLIC KEY BLOCK-----', '-----BEGIN PGP PUBLIC KEY BLOCK-----',
'Version: GnuPG v1.4.11 (GNU/Linux)', 'Version: GnuPG v1.4.11 (GNU/Linux)',
'', '',
@ -48,14 +47,14 @@ unit.register("Keyring testing", function() {
'AJ9zh4zsK4GIPuEu81YPNmHsju7DYg==', 'AJ9zh4zsK4GIPuEu81YPNmHsju7DYg==',
'=WaSx', '=WaSx',
'-----END PGP MESSAGE-----' '-----END PGP MESSAGE-----'
].join("\n")).packets; ].join("\n"));
var packetlists = keyring.getPacketlistsForKeyId(msg2[0].signingKeyId.write()); var signingKeyIds = msg2.getSigningKeyIds();
var pubKey = packetlists[0]; var key = keyring.getKeysForKeyId(signingKeyIds[0].toHex());
msg2[2].verify(pubKey[3], msg2[1]); var verified = msg2.verify(key);
result[2] = new unit.result("Testing keyring public subkey support", result[2] = new unit.result("Testing keyring getKeysForKeyId method",
packetlists !== null && key !== null &&
packetlists.length == 1 && key.length == 1 &&
msg2[2].verified); verified[0].valid);
return result; return result;
}); });

View File

@ -288,7 +288,7 @@ var pub_key_arm3 =
privKey.decryptKeyPacket(keyids, 'hello world'); privKey.decryptKeyPacket(keyids, 'hello world');
var decrypted = openpgp.decryptAndVerifyMessage(privKey, [pubKey], esMsg); var decrypted = openpgp.decryptAndVerifyMessage(privKey, [pubKey], esMsg);
var verified = decrypted.text == plaintext && decrypted.signatures[0].status; var verified = decrypted.text == plaintext && decrypted.signatures[0].valid;
return new unit.result("Verify signature of signed and encrypted message from GPG2 with openpgp.decryptAndVerifyMessage", verified); return new unit.result("Verify signature of signed and encrypted message from GPG2 with openpgp.decryptAndVerifyMessage", verified);
}, function() { }, function() {
@ -319,7 +319,7 @@ var pub_key_arm3 =
privKey.decryptKeyPacket(keyids, 'hello world'); privKey.decryptKeyPacket(keyids, 'hello world');
var decrypted = openpgp.decryptAndVerifyMessage(privKey, [pubKey], esMsg); var decrypted = openpgp.decryptAndVerifyMessage(privKey, [pubKey], esMsg);
var verified = decrypted.text == plaintext && decrypted.signatures[0].status; var verified = decrypted.text == plaintext && decrypted.signatures[0].valid;
return new unit.result("Verify signature of signed and encrypted message from PGP 10.3.0 with openpgp.decryptAndVerifyMessage", verified); return new unit.result("Verify signature of signed and encrypted message from PGP 10.3.0 with openpgp.decryptAndVerifyMessage", verified);
}, function() { }, function() {
@ -355,7 +355,7 @@ var pub_key_arm3 =
var verifiedSig = sMsg.verify([pubKey2, pubKey3]); var verifiedSig = sMsg.verify([pubKey2, pubKey3]);
verified = verified && verifiedSig[0].status && verifiedSig[1].status; verified = verified && verifiedSig[0].valid && verifiedSig[1].valid;
return new unit.result("Verify signed message with two one pass signatures", verified); return new unit.result("Verify signed message with two one pass signatures", verified);
}, function() { }, function() {
@ -396,7 +396,7 @@ var pub_key_arm3 =
verified = verified && cleartextSig.text == plaintext; verified = verified && cleartextSig.text == plaintext;
verified = verified && cleartextSig.signatures[0].status && cleartextSig.signatures[1].status; verified = verified && cleartextSig.signatures[0].valid && cleartextSig.signatures[1].valid;
return new unit.result("Verify cleartext signed message with two signatures with openpgp.verifyClearSignedMessage", verified); return new unit.result("Verify cleartext signed message with two signatures with openpgp.verifyClearSignedMessage", verified);
}, function() { }, function() {
@ -414,7 +414,7 @@ var pub_key_arm3 =
var verified = cleartextSig.text == plaintext.replace(/\r/g,''); var verified = cleartextSig.text == plaintext.replace(/\r/g,'');
verified = verified && cleartextSig.signatures[0].status; verified = verified && cleartextSig.signatures[0].valid;
return new unit.result("Sign text with openpgp.signClearMessage and verify with openpgp.verifyClearSignedMessage leads to same cleartext and valid signatures", verified); return new unit.result("Sign text with openpgp.signClearMessage and verify with openpgp.verifyClearSignedMessage leads to same cleartext and valid signatures", verified);
}, function() { }, function() {
@ -446,7 +446,7 @@ var pub_key_arm3 =
var verified = cleartextSig.text == plaintext; var verified = cleartextSig.text == plaintext;
verified = verified && cleartextSig.signatures[0].status; verified = verified && cleartextSig.signatures[0].valid;
return new unit.result("Verify cleartext signed message with CP-1252 character encoding", verified); return new unit.result("Verify cleartext signed message with CP-1252 character encoding", verified);
}]; }];

View File

@ -4,7 +4,6 @@
<meta charset="utf-8"> <meta charset="utf-8">
<!-- unit test --> <!-- unit test -->
<script type="text/javascript" src="test-bundle.js"></script>
<title>OpenPGP.js testpage</title> <title>OpenPGP.js testpage</title>
<style> <style>