emacs-diffs
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Emacs-diffs] master e5ce95f: Add tests for epg.el


From: Daiki Ueno
Subject: [Emacs-diffs] master e5ce95f: Add tests for epg.el
Date: Tue, 24 Mar 2015 05:48:27 +0000

branch: master
commit e5ce95fa4a0b311792b9b9dcc3b8901fc1f24a0d
Author: Daiki Ueno <address@hidden>
Commit: Daiki Ueno <address@hidden>

    Add tests for epg.el
    
    * automated/epg-tests.el: New file.
    * automated/data/epg/pubkey.asc: New file.
    * automated/data/epg/seckey.asc: New file.
---
 test/ChangeLog                     |    6 ++
 test/automated/data/epg/pubkey.asc |   20 ++++
 test/automated/data/epg/seckey.asc |   33 +++++++
 test/automated/epg-tests.el        |  170 ++++++++++++++++++++++++++++++++++++
 4 files changed, 229 insertions(+), 0 deletions(-)

diff --git a/test/ChangeLog b/test/ChangeLog
index b12e9c0..9949e2c 100644
--- a/test/ChangeLog
+++ b/test/ChangeLog
@@ -1,3 +1,9 @@
+2015-03-24  Daiki Ueno  <address@hidden>
+
+       * automated/epg-tests.el: New file.
+       * automated/data/epg/pubkey.asc: New file.
+       * automated/data/epg/seckey.asc: New file.
+
 2015-03-22  Dmitry Gutov  <address@hidden>
 
        * automated/json-tests.el: New file.
diff --git a/test/automated/data/epg/pubkey.asc 
b/test/automated/data/epg/pubkey.asc
new file mode 100644
index 0000000..c0bf28f
--- /dev/null
+++ b/test/automated/data/epg/pubkey.asc
@@ -0,0 +1,20 @@
+-----BEGIN PGP PUBLIC KEY BLOCK-----
+Version: GnuPG v1
+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+=NMxb
+-----END PGP PUBLIC KEY BLOCK-----
diff --git a/test/automated/data/epg/seckey.asc 
b/test/automated/data/epg/seckey.asc
new file mode 100644
index 0000000..4ac7ba4
--- /dev/null
+++ b/test/automated/data/epg/seckey.asc
@@ -0,0 +1,33 @@
+-----BEGIN PGP PRIVATE KEY BLOCK-----
+Version: GnuPG v1
+
+lQHYBFUQ8QgBBAC3EnK0ZsauTfh4fjcT4O+USSXbRIvNuKcLajJU/98BtXrJj+YD
+bmSD1Wk00hjWZBM3mHYWi1wVHuag/kUCEFYfjC7fZ4rBfZw9+Ypsjq4R8AB54JTj
+8RncpR/J0P7SDuaf5X1JcPoggZTx+3mR6hSYcD9ISTC+DyhPAK1hukbbMQARAQAB
+AAP9Hs9agZTobA5QOksXjt9kwqJ63gePtbwVVNz3AoobaGi39PMkRUCPZwaEEbEo
+H/CwsUMV4J5sjVtpef/A8mN4csai7NYp82mbo+dPim4p+SUtBg4Ms8ujGVcQeRQd
+1CXtIkixDu6fw4wDtNw03ZyNJOhBOXVTgAyOTSlIz3D+6n8CAMeCqEFBHQIVoQpf
+Bza4YvFtJRdfGMTix3u7Cb6y9CHGBok7uUgQAeWnzQvMGTCHc3e8iHGAYBQ88GPF
+v1TpiusCAOroRe69Aiid5JMVTjWoJ0SHKd47nIj0gQFiDfa5de0BNq9gYj7JLg+R
+EjsJbJN39z+Z9HWjIOCUOIXDvucmM1MB/iNxW1Z8mEMflEYK5rop+PDxwqUbr8uZ
+kzogw98ZdmuEuN0bheGWUiJI+0Pd8jb40zlR1KgOEMx1mZchToAJdtybMLQnSm9l
+IFRlc3RlciAodGVzdCBrZXkpIDxqb2VAZXhhbXBsZS5jb20+iLgEEwECACIFAlUQ
+8QgCGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJECixwJYy+7gYZg4D/RnO
+hzbP928C0VUuHii8qo/aqWJC3aqxyEkdU/fSEmcpPt2Yl8mXuTP2ZeYx9K1ibSW5
+iZ5LN15Y5Ez1LKAtFhe4N83obhk8lOWxGGCcBGE3M2FLH5iVwWHjxn5rnNGCgEyf
+sOBhWp9ThS15k5JcyWe4DZnlqjWqAaFWoRJImBTmnQHYBFUQ8QgBBADacLkKD0U1
+1nmlsScxPGkrDr0aJPrG8MEaDRnKjHJKNp3XTp1psGBUpWF/ErjQAIu+psFtLO8o
+wCGsg/vJM7CzTv2dVBRbrZXjIKvdq7HdivosTMaHArQBpEtSO9rmgVHO+jaQq/M2
+oGvNEB86zo3nfTWhOgBiB32m8kttWRiuWQARAQABAAP7B8uNtb/DLvGoRfL+mA0Q
+REhgOJ1WpRcU6rvKYNPh8xTkKMvM+EK0nVU/znBedEpXjb0pY1WRT0uvXs2pzY2V
+YeaugyKIkdUpPWnyWoEQwI8hFvHOWmU2rNHyXLW0MY7bxcGgqv2XbkL4m7/D6VQS
+SR8hQ2CxBbW+9ov6aBMwv/UCAOW89+5xxuzkv48AVraWlMnaU0ggVOf6ht0Qa40+
++uw2yziNlD403gAAAycoICiB/oqwslx61B2xOHn0laCKrgsCAPNpIsHRlAwWbAsq
+uCtfIQxg+C3mPXkqsNTMjeK5NjLNytrmO49NXco36zVEG6q7qz5Zj9d9IPYoGOSa
+I+dQZ6sB/RKF5aonR5/e7IHJgc8BG7I0yiya4llE0AB9ghnRI/3uHwnCBnmo/32a
+n4+rQkx6vm+rg3JA/09Gi7W4R9SwV+ane4ifBBgBAgAJBQJVEPEIAhsMAAoJECix
+wJYy+7gY+OAEAJDCUZu1SVK8qwyhbXyH8rUMf75slP3GXFVeiKSqjyoc7YEfkA/X
+M5R70Ic/st4arS0UobthMn++XTXsXFLyrP5UuCyA14OVe6VkkZPXkBuNN5rqkfzR
+ruvkJlMdPayZe9ra3WhsTZMhwO2cu2QxpHDL0LHd6qEjRrD0eUynrMO0
+=iCIm
+-----END PGP PRIVATE KEY BLOCK-----
diff --git a/test/automated/epg-tests.el b/test/automated/epg-tests.el
new file mode 100644
index 0000000..a7fa5a1
--- /dev/null
+++ b/test/automated/epg-tests.el
@@ -0,0 +1,170 @@
+;;; epg-tests.el --- Test suite for epg.el -*- lexical-binding: t -*-
+
+;; Copyright (C) 2013-2015 Free Software Foundation, Inc.
+
+;; This program is free software; you can redistribute it and/or modify
+;; it under the terms of the GNU General Public License as published by
+;; the Free Software Foundation, either version 3 of the License, or
+;; (at your option) any later version.
+
+;; This program is distributed in the hope that it will be useful,
+;; but WITHOUT ANY WARRANTY; without even the implied warranty of
+;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+;; GNU General Public License for more details.
+
+;; You should have received a copy of the GNU General Public License
+;; along with this program.  If not, see <http://www.gnu.org/licenses/>.
+
+;;; Commentary:
+
+;;; Code:
+
+(require 'ert)
+(require 'epg)
+
+(defvar epg-tests-context nil)
+
+(defvar epg-tests-data-directory
+  (expand-file-name "data/epg" (getenv "EMACS_TEST_DIRECTORY"))
+  "Directory containing epg test data.")
+
+(defun epg-tests-gpg-usable (&optional require-passphrase)
+  (and (executable-find epg-gpg-program)
+       (condition-case nil
+          (progn
+            (epg-check-configuration (epg-configuration))
+            (if require-passphrase
+                (string-match "\\`1\\."
+                              (cdr (assq 'version (epg-configuration))))
+              t))
+        (error nil))))
+
+(defun epg-tests-passphrase-callback (_c _k _d)
+  ;; Need to create a copy here, since the string will be wiped out
+  ;; after the use.
+  (copy-sequence "test0123456789"))
+
+(cl-defmacro with-epg-tests ((&optional &key require-passphrase
+                                       require-public-key
+                                       require-secret-key)
+                           &rest body)
+  "Set up temporary locations and variables for testing."
+  (declare (indent 1))
+  `(let* ((epg-tests-home-directory (make-temp-file "epg-tests-homedir" t)))
+     (unwind-protect
+        (let ((context (epg-make-context 'OpenPGP)))
+          (setf (epg-context-home-directory context)
+                epg-tests-home-directory)
+          (setenv "GPG_AGENT_INFO")
+          ,(if require-passphrase
+               `(epg-context-set-passphrase-callback
+                 context
+                 #'epg-tests-passphrase-callback))
+          ,(if require-public-key
+               `(epg-import-keys-from-file
+                 context
+                 (expand-file-name "pubkey.asc" epg-tests-data-directory)))
+          ,(if require-secret-key
+               `(epg-import-keys-from-file
+                 context
+                 (expand-file-name "seckey.asc" epg-tests-data-directory)))
+          (with-temp-buffer
+            (make-local-variable 'epg-tests-context)
+            (setq epg-tests-context context)
+            ,@body))
+       (when (file-directory-p epg-tests-home-directory)
+        (delete-directory epg-tests-home-directory t)))))
+
+(ert-deftest epg-decrypt-1 ()
+  (skip-unless (epg-tests-gpg-usable 'require-passphrase))
+  (with-epg-tests (:require-passphrase t)
+    (should (equal "test"
+                  (epg-decrypt-string epg-tests-context "\
+-----BEGIN PGP MESSAGE-----
+Version: GnuPG v2
+
+jA0EAwMCE19JBLTvvmhgyRrGGglRbnKkK9PJG8fDwO5ccjysrR7IcdNcnA==
+=U8z7
+-----END PGP MESSAGE-----")))))
+
+(ert-deftest epg-roundtrip-1 ()
+  (skip-unless (epg-tests-gpg-usable 'require-passphrase))
+  (with-epg-tests (:require-passphrase t)
+    (let ((cipher (epg-encrypt-string epg-tests-context "symmetric" nil)))
+      (should (equal "symmetric"
+                    (epg-decrypt-string epg-tests-context cipher))))))
+
+(ert-deftest epg-roundtrip-2 ()
+  (skip-unless (epg-tests-gpg-usable 'require-passphrase))
+  (with-epg-tests (:require-passphrase t
+                  :require-public-key t
+                  :require-secret-key t)
+    (let* ((recipients (epg-list-keys epg-tests-context "address@hidden"))
+          (cipher (epg-encrypt-string epg-tests-context "public key"
+                                      recipients nil t)))
+      (should (equal "public key"
+                    (epg-decrypt-string epg-tests-context cipher))))))
+
+(ert-deftest epg-sign-verify-1 ()
+  (skip-unless (epg-tests-gpg-usable 'require-passphrase))
+  (with-epg-tests (:require-passphrase t
+                  :require-public-key t
+                  :require-secret-key t)
+    (let (signature verify-result)
+      (setf (epg-context-signers epg-tests-context)
+           (epg-list-keys epg-tests-context "address@hidden"))
+      (setq signature (epg-sign-string epg-tests-context "signed" t))
+      (epg-verify-string epg-tests-context signature "signed")
+      (setq verify-result (epg-context-result-for context 'verify))
+      (should (= 1 (length verify-result)))
+      (should (eq 'good (epg-signature-status (car verify-result)))))))
+
+(ert-deftest epg-sign-verify-2 ()
+  (skip-unless (epg-tests-gpg-usable 'require-passphrase))
+  (with-epg-tests (:require-passphrase t
+                  :require-public-key t
+                  :require-secret-key t)
+    (let (signature verify-result)
+      (setf (epg-context-signers epg-tests-context)
+           (epg-list-keys epg-tests-context "address@hidden"))
+      (setq signature (epg-sign-string epg-tests-context "clearsigned" 'clear))
+      ;; Clearsign signature always ends with a new line.
+      (should (equal "clearsigned\n"
+                    (epg-verify-string epg-tests-context signature)))
+      (setq verify-result (epg-context-result-for context 'verify))
+      (should (= 1 (length verify-result)))
+      (should (eq 'good (epg-signature-status (car verify-result)))))))
+
+(ert-deftest epg-sign-verify-3 ()
+  (skip-unless (epg-tests-gpg-usable 'require-passphrase))
+  (with-epg-tests (:require-passphrase t
+                  :require-public-key t
+                  :require-secret-key t)
+    (let (signature verify-result)
+      (setf (epg-context-signers epg-tests-context)
+           (epg-list-keys epg-tests-context "address@hidden"))
+      (setq signature (epg-sign-string epg-tests-context "normal signed"))
+      (should (equal "normal signed"
+                    (epg-verify-string epg-tests-context signature)))
+      (setq verify-result (epg-context-result-for context 'verify))
+      (should (= 1 (length verify-result)))
+      (should (eq 'good (epg-signature-status (car verify-result)))))))
+
+(ert-deftest epg-import-1 ()
+  (skip-unless (epg-tests-gpg-usable 'require-passphrase))
+  (with-epg-tests (:require-passphrase nil)
+    (should (= 0 (length (epg-list-keys epg-tests-context))))
+    (should (= 0 (length (epg-list-keys epg-tests-context nil t)))))
+  (with-epg-tests (:require-passphrase nil
+                  :require-public-key t)
+    (should (= 1 (length (epg-list-keys epg-tests-context))))
+    (should (= 0 (length (epg-list-keys epg-tests-context nil t)))))
+  (with-epg-tests (:require-public-key nil
+                  :require-public-key t
+                  :require-secret-key t)
+    (should (= 1 (length (epg-list-keys epg-tests-context))))
+    (should (= 1 (length (epg-list-keys epg-tests-context nil t))))))
+
+(provide 'epg-tests)
+
+;;; epg-tests.el ends here



reply via email to

[Prev in Thread] Current Thread [Next in Thread]