Revision control

Copy as Markdown

Other Tools

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
/**
* Tests for bad OpenPGP keys.
*/
"use strict";
const { RNP } = ChromeUtils.importESModule(
);
const { EnigmailConstants } = ChromeUtils.importESModule(
);
const { EnigmailKeyRing } = ChromeUtils.importESModule(
);
const { EnigmailEncryption } = ChromeUtils.importESModule(
);
const { OpenPGPAlias } = ChromeUtils.importESModule(
);
const { OpenPGPTestUtils } = ChromeUtils.importESModule(
);
const KEY_DIR = "../../../../../test/browser/openpgp/data/keys";
add_setup(async function () {
do_get_profile();
await OpenPGPTestUtils.initOpenPGP();
});
/**
* Attempt to import a key with a single user ID, which is invalid,
* because it doesn't have a valid signature.
* Our code should reject the attempt to import the key.
*/
add_task(async function testFailToImport() {
const ids = await OpenPGPTestUtils.importKey(
null,
do_get_file(`${KEY_DIR}/invalid-pubkey-nosigs.pgp`),
true
);
Assert.ok(!ids.length, "importKey should return empty list of imported keys");
});
/**
* Import a key with two encryption subkeys. One is good, the other one
* has an invalid signature. When attempting to encrypt, our code should
* skip the bad subkey, and should use the expected good subkey.
*/
add_task(async function testAvoidBadSubkey() {
const ids = await OpenPGPTestUtils.importKey(
null,
do_get_file(`${KEY_DIR}/encryption-subkey-bad.pgp`),
true
);
await OpenPGPTestUtils.updateKeyIdAcceptance(
ids,
OpenPGPTestUtils.ACCEPTANCE_VERIFIED
);
const primaryKey = await RNP.findKeyByEmail(
"<encryption-subkey@example.org>",
true
);
const encSubKey = RNP.getSuitableSubkey(primaryKey, "encrypt");
const keyId = RNP.getKeyIDFromHandle(encSubKey);
Assert.equal(
keyId,
"BC63472A109D5859",
"should obtain key ID of good subkey"
);
});
/**
* Test importing key with comment and empty line after the checksum.
*/
add_task(async function testImportApple() {
const ids = await OpenPGPTestUtils.importKey(
null,
do_get_file(`${KEY_DIR}/apple-pub.asc`),
true
);
Assert.equal(ids.length, 1, "should have imported the key");
await OpenPGPTestUtils.updateKeyIdAcceptance(
ids,
OpenPGPTestUtils.ACCEPTANCE_VERIFIED
);
const primaryKey = await RNP.findKeyByEmail(
"<product-security@apple.com>",
true
);
Assert.ok(primaryKey, "should find primary key");
const encSubKey = RNP.getSuitableSubkey(primaryKey, "encrypt");
const keyId = RNP.getKeyIDFromHandle(encSubKey);
Assert.equal(
keyId,
"747D1BD8BE393896",
"should find correct encryption subkey"
);
});
/**
* Test importing binary key that ends with a whitespace.
*/
add_task(async function testImportBinaryPubSpace() {
// Note: This key artifact includes subpacket 39 (v6 preferred AEAD
// ciphersuites), which support is defined only in RFC 9580.
const ids = await OpenPGPTestUtils.importKey(
null,
do_get_file(
`${KEY_DIR}/DC1A523730F62AE8-pub-does_not_expire-ends_with_whitespace.pgp`
),
true
);
Assert.equal(ids.length, 1, "should have imported the key");
Assert.equal(ids[0], "0xDC1A523730F62AE8", "should be the correct key");
await OpenPGPTestUtils.updateKeyIdAcceptance(
ids,
OpenPGPTestUtils.ACCEPTANCE_VERIFIED
);
const primaryKey = await RNP.findKeyByEmail("<test@example.com>", true);
Assert.ok(primaryKey, "should find primary key");
const encSubKey = RNP.getSuitableSubkey(primaryKey, "encrypt");
const keyId = RNP.getKeyIDFromHandle(encSubKey);
Assert.equal(
keyId,
"653B0BC4ADE0A239",
"should find correct encryption subkey"
);
});