From fb66c97eb54c7c233caea0f50b63314a0bfa3480 Mon Sep 17 00:00:00 2001 From: Alexander Willner Date: Fri, 16 Dec 2011 13:37:49 +0100 Subject: [PATCH] added coverage preview --- test/coverage.html | 696 +++++++++++++++++++++++++++++++++++++++++++ test/encryption.html | 2 +- test/index.html | 2 +- test/parser.html | 2 +- 4 files changed, 699 insertions(+), 3 deletions(-) create mode 100644 test/coverage.html diff --git a/test/coverage.html b/test/coverage.html new file mode 100644 index 00000000..092c28f1 --- /dev/null +++ b/test/coverage.html @@ -0,0 +1,696 @@ + + + + +OpenPGP.js testpage + + + + + +Unit Tests | Parser | Encryption / Decryption | Coverage + +
+
+

JSCoverage (just a preview)

+ + + +
+ +
+

+Recent web browsers tend to place significant security restrictions on the use +of file: URLs. These restrictions can prevent JSCoverage from +working properly. To avoid problems, it is recommended that you do either of the +following: +

+
    +
  • If you are using the jscoverage program to instrument your +JavaScript code, install the instrumented files on a web server.
  • +
  • Use the jscoverage-server program (which itself acts as a web +server).
  • +
+

+See the +manual +for further details. +

+ +
+ +
+

+Recent web browsers tend to place significant security restrictions on the use +of file: URLs. These restrictions can prevent JSCoverage from +working properly. To avoid problems, it is recommended that you view coverage +reports stored to the filesystem by serving them from a web server. +

+

+See the +manual +for further details. +

+ +
+ +
+
Browser
+
Summary
+
Source
+ +
About
+
+
+
+
+ URL: + + +
+
+ +
+
+
+ +
+
+ + + + + + + + + + + + + + + + + +
FileStatementsExecutedCoverage
+ Total: + 53 + 52092489 +
+
+
+ 47% +
resources/jquery.min.js33
100%
src/ciphers/asymmetric/dsa.js3823
60%
src/ciphers/asymmetric/elgamal.js1616
100%
src/ciphers/asymmetric/jsbn.js375316
84%
src/ciphers/asymmetric/jsbn2.js452264
58%
src/ciphers/asymmetric/rsa.js2219
86%
src/ciphers/hash/md5.js259256
98%
src/ciphers/hash/ripe-md.js134121
90%
src/ciphers/hash/sha.js312226
72%
src/ciphers/openpgp.cfb.js10156
55%
src/ciphers/openpgp.crypto.js191120
62%
src/ciphers/symmetric/aes.js110108
98%
src/ciphers/symmetric/blowfish.js10087
87%
src/ciphers/symmetric/cast5.js179146
81%
src/ciphers/symmetric/dessrc.js107103
96%
src/ciphers/symmetric/twofish.js182161
88%
src/config/openpgp.config.js1514
93%
src/encoding/base64.js493
6%
src/encoding/openpgp.encoding.asciiarmor.js1016
5%
src/encoding/openpgp.encoding.js6053
88%
src/openpgp.js16321
12%
src/openpgp.keyring.js10036
36%
src/openpgp.msg.message.js731
1%
src/openpgp.msg.privatekey.js801
1%
src/openpgp.msg.publickey.js1501
0%
src/packet/openpgp.packet.compressed.js572
3%
src/packet/openpgp.packet.encrypteddata.js262
7%
src/packet/openpgp.packet.encryptedintegrityprotecteddata.js442
4%
src/packet/openpgp.packet.encryptedsessionkey.js812
2%
src/packet/openpgp.packet.js21510
4%
src/packet/openpgp.packet.keymaterial.js3331
0%
src/packet/openpgp.packet.literaldata.js301
3%
src/packet/openpgp.packet.marker.js111
9%
src/packet/openpgp.packet.modificationdetectioncode.js152
13%
src/packet/openpgp.packet.onepasssignature.js382
5%
src/packet/openpgp.packet.signature.js3501
0%
src/packet/openpgp.packet.userattribute.js712
2%
src/packet/openpgp.packet.userid.js1581
0%
src/type/openpgp.type.keyid.js92
22%
src/type/openpgp.type.mpi.js4336
83%
src/type/openpgp.type.s2k.js391
2%
src/util/util.js9246
50%
test/ciphers/hash/md5.js99
100%
test/ciphers/hash/ripe-md.js77
100%
test/ciphers/hash/sha.js1313
100%
test/ciphers/openpgp.crypto.js6060
100%
test/ciphers/symmetric/aes.js4034
85%
test/ciphers/symmetric/blowfish.js1715
88%
test/ciphers/symmetric/cast5.js99
100%
test/ciphers/symmetric/des.js1514
93%
test/ciphers/symmetric/twofish.js4139
95%
test/example-test.js55
100%
test/unittest.js99
100%
+
+
+
+
src/openpgp.keyring.js
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
1
// GPG4Browsers - An OpenPGP implementation in javascript
2
// Copyright (C) 2011 Recurity Labs GmbH
3
// 
4
// This library is free software; you can redistribute it and/or
5
// modify it under the terms of the GNU Lesser General Public
6
// License as published by the Free Software Foundation; either
7
// version 2.1 of the License, or (at your option) any later version.
8
// 
9
// This library is distributed in the hope that it will be useful,
10
// but WITHOUT ANY WARRANTY; without even the implied warranty of
11
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
12
// Lesser General Public License for more details.
13
// 
14
// You should have received a copy of the GNU Lesser General Public
15
// License along with this library; if not, write to the Free Software
16
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
17
181
function openpgp_keyring() {
19
		
20
	/**
21
	 * Initialization routine for the keyring. This method reads the 
22
	 * keyring from HTML5 local storage and initializes this instance.
23
	 * This method is called by openpgp.init().
24
	 * @return [null] undefined
25
	 */
261
	function init() {
271
		var sprivatekeys = JSON.parse(window.localStorage.getItem("privatekeys"));
281
		var spublickeys = JSON.parse(window.localStorage.getItem("publickeys"));
291
		if (sprivatekeys == null || sprivatekeys.length == 0) {
301
			sprivatekeys = new Array();
31
		}
32
331
		if (spublickeys == null || spublickeys.length == 0) {
341
			spublickeys = new Array();
35
		}
361
		this.publicKeys = new Array();
371
		this.privateKeys = new Array();
381
		var k = 0;
391
		for (var i =0; i < sprivatekeys.length; i++) {
400
			var r = openpgp.read_privateKey(sprivatekeys[i]);
410
			this.privateKeys[k] = { armored: sprivatekeys[i], obj: r[0], keyId: r[0].getKeyId()};
420
			k++;
43
		}
441
		k = 0;
451
		for (var i =0; i < spublickeys.length; i++) {
460
			var r = openpgp.read_publicKey(spublickeys[i]);
470
			if (r[0] != null) {
480
				this.publicKeys[k] = { armored: spublickeys[i], obj: r[0], keyId: r[0].getKeyId()};
490
				k++;
50
			}
51
		}
52
	}
531
	this.init = init;
54
55
	/**
56
	 * Checks if at least one private key is in the keyring
57
	 * @return
58
	 */
591
	function hasPrivateKey() {
600
		return this.privateKeys.length > 0;
61
	}
621
	this.hasPrivateKey = hasPrivateKey;
63
64
	/**
65
	 * Saves the current state of the keyring to HTML5 local storage.
66
	 * The privateKeys array and publicKeys array gets Stringified using JSON
67
	 * @return [null] undefined
68
	 */
691
	function store() { 
700
		var priv = new Array();
710
		for (var i = 0; i < this.privateKeys.length; i++) {
720
			priv[i] = this.privateKeys[i].armored;
73
		}
740
		var pub = new Array();
750
		for (var i = 0; i < this.publicKeys.length; i++) {
760
			pub[i] = this.publicKeys[i].armored;
77
		}
780
		window.localStorage.setItem("privatekeys",JSON.stringify(priv));
790
		window.localStorage.setItem("publickeys",JSON.stringify(pub));
80
	}
811
	this.store = store;
82
	/**
83
	 * searches all public keys in the keyring matching the address or address part of the user ids
84
	 * @param email_address
85
	 * @return
86
	 */
871
	function getPublicKeyForAddress(email_address) {
880
		var results = new Array();
890
		var spl = string.split("<");
900
		var email = "";
910
		if (spl.length > 0) {
920
			email = spl[1].split(">")[0];
93
		} else {
940
			email = string.trim();
95
		}
960
		for (var i =0; i < this.publicKeys.length; i++) {
97
			
980
			for (var j = 0; j < this.publicKeys[i].userIds; j++) {
990
				if (this.publicKeys[i].userIds[j].indexOf(email) >= 0)
1000
					results[results.length] = this.publicKeys[i];
101
			}
102
		}
1030
		return result;
104
	}
105
106
	/**
107
	 * Searches the keyring for a private key containing the specified email address
108
	 * @param email_address [String] email address to search for
109
	 * @return [Array[openpgp_msg_privatekey] private keys found
110
	 */
1111
	function getPrivateKeyForAddress(email_address) {
1120
		var results = new Array();
1130
		var spl = email_address.split("<");
1140
		var email = "";
1150
		if (spl.length > 1) {
1160
			email = spl[1].split(">")[0];
117
		} else {
1180
			email = email_address.trim();
119
		}
1200
		for (var i =0; i < this.privateKeys.length; i++) {
121
			
1220
			for (var j = 0; j < this.privateKeys[i].obj.userIds.length; j++) {
1230
				if (this.privateKeys[i].obj.userIds[j].text.indexOf(email) >= 0)
1240
					results[results.length] = this.privateKeys[i];
125
			}
126
		}
1270
		return results;
128
	}
129
1301
	this.getPrivateKeyForAddress = getPrivateKeyForAddress;
131
	/**
132
	 * Searches the keyring for public keys having the specified key id
133
	 * @param keyId provided as string of hex number (lowercase)
134
	 * @return Array[openpgp_msg_privatekey] public keys found
135
	 */
1361
	function getPublicKeysForKeyId(keyId) {
1370
		var result = new Array();
1380
		for (var i=0; i < this.publicKeys.length; i++)
1390
			if (keyId == this.publicKeys[i].obj.getKeyId())
1400
				result[result.length] = this.publicKeys[i];
1410
		return result;
142
	}
1431
	this.getPublicKeysForKeyId = getPublicKeysForKeyId;
144
	
145
	/**
146
	 * Searches the keyring for private keys having the specified key id
147
	 * @param keyId [String] 8 bytes as string containing the key id to look for
148
	 * @return Array[openpgp_msg_privatekey] private keys found
149
	 */
1501
	function getPrivateKeyForKeyId(keyId) {
1510
		var result = new Array();
1520
		for (var i=0; i < this.privateKeys.length; i++) {
1530
			if (keyId == util.hexstrdump(this.privateKeys[i].obj.getKeyId())) {
1540
				result[result.length] = { key: this.privateKeys[i], keymaterial: this.privateKeys[i].obj.privateKeyPacket};
155
			}
1560
			if (this.privateKeys[i].obj.subKeys != null) {
1570
				var subkeyids = this.privateKeys[i].obj.getSubKeyIds();
1580
				for (var j=0; j < subkeyids.length; j++)
1590
					if (keyId == util.hexstrdump(subkeyids[j])) {
1600
						result[result.length] = { key: this.privateKeys[i], keymaterial: this.privateKeys[i].obj.subKeys[j]};
161
					}
162
			}
163
		}
1640
		return result;
165
	}
1661
	this.getPrivateKeyForKeyId = getPrivateKeyForKeyId;
167
	
168
	/**
169
	 * Imports a public key from an exported ascii armored message 
170
	 * @param armored_text [String] PUBLIC KEY BLOCK message to read the public key from
171
	 * @return [null] nothing
172
	 */
1731
	function importPublicKey (armored_text) {
1740
		var result = openpgp.read_publicKey(armored_text);
1750
		for (var i = 0; i < result.length; i++) {
1760
			this.publicKeys[this.publicKeys.length] = {armored: armored_text, obj: result[i]};
177
		}
178
	}
179
180
	/**
181
	 * Imports a private key from an exported ascii armored message 
182
	 * @param armored_text [String] PRIVATE KEY BLOCK message to read the private key from
183
	 * @return [null] nothing
184
	 */
1851
	function importPrivateKey (armored_text) {
1860
		var result = openpgp.read_privateKey(armored_text);
1870
		for (var i = 0; i < result.length; i++) {
1880
			this.privateKeys[this.privateKeys.length] = {armored: armored_text, obj: result[i]};
189
		}
190
	}
191
1921
	this.importPublicKey = importPublicKey;
1931
	this.importPrivateKey = importPrivateKey;
194
	
195
	/**
196
	 * returns the PUBLIC KEY BLOCK message representation of the public key at public key ring index  
197
	 * @param index [Integer] the index of the public key within the publicKeys array
198
	 * @return [String] the PUBLIC KEY BLOCK message
199
	 */
2001
	function exportPublicKey(index) {
2010
		return this.publicKey[index];
202
	}
2031
	this.exportPublicKey = exportPublicKey;
204
		
205
	
206
	/**
207
	 * Removes a public key from the public key keyring at the specified index 
208
	 * @param index [Integer] the index of the public key within the publicKeys array
209
	 * @return [String The public key object which has been removed
210
	 */
2111
	function removePublicKey(index) {
2120
		var removed = this.publicKeys.splice(index,1);
2130
		this.store();
2140
		return removed;
215
	}
2161
	this.removePublicKey = removePublicKey;
217
218
	/**
219
	 * returns the PRIVATE KEY BLOCK message representation of the private key at private key ring index  
220
	 * @param index [Integer] the index of the private key within the privateKeys array
221
	 * @return [String] the PRIVATE KEY BLOCK message
222
	 */	
2231
	function exportPrivateKey(index) {
2240
		return this.privateKeys[index];
225
	}
2261
	this.exportPrivateKey = exportPrivateKey;
227
}
+
+ +
+

+ This is version 0.5.1 of JSCoverage, a program that calculates code + coverage statistics for JavaScript. +

+

+ See http://siliconforks.com/jscoverage/ for more information. +

+

+ Copyright © 2007, 2008, 2009, 2010 siliconforks.com +

+
+
+
+ + diff --git a/test/encryption.html b/test/encryption.html index 0a578163..9987aa27 100644 --- a/test/encryption.html +++ b/test/encryption.html @@ -167,7 +167,7 @@ $(document).ready(function() { $('#enabledebug').is(':checked') ? openpgp.config.debug = true : openpgp.config.debug = false; }); -Unit Tests | Parser | Encryption / Decryption +Unit Tests | Parser | Encryption / Decryption | Coverage

Print Debug Messages

Encrypt / Decrypt Messages

Encrypt Message | diff --git a/test/index.html b/test/index.html index f616623f..898b8093 100644 --- a/test/index.html +++ b/test/index.html @@ -149,7 +149,7 @@ function unit_tests() { } -Unit Tests | Parser | Encryption / Decryption +Unit Tests | Parser | Encryption / Decryption | Coverage

Print Debug Messages

Unit tests

diff --git a/test/parser.html b/test/parser.html index b2a862f1..66644767 100644 --- a/test/parser.html +++ b/test/parser.html @@ -108,7 +108,7 @@ $(document).ready(function() { $('#enabledebug').is(':checked') ? openpgp.config.debug = true : openpgp.config.debug = false; }); -Unit Tests | Parser | Encryption / Decryption +Unit Tests | Parser | Encryption / Decryption | Coverage

Print Debug Messages

Parser

OpenPGP Message |