aboutsummaryrefslogtreecommitdiffstats
path: root/OpenKeychain
diff options
context:
space:
mode:
Diffstat (limited to 'OpenKeychain')
-rw-r--r--OpenKeychain/build.gradle7
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/OperationResultParcel.java1
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/KeyringBuilder.java254
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/KeyringTestingHelper.java205
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/PgpVerifyTestingHelper.java65
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/ProviderHelperStub.java39
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/TestDataUtil.java142
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/UncachedKeyringTestingHelper.java297
-rw-r--r--OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/package-info.java7
-rw-r--r--OpenKeychain/src/test/java/tests/PgpDecryptVerifyTest.java53
-rw-r--r--OpenKeychain/src/test/java/tests/ProviderHelperKeyringTest.java103
-rw-r--r--OpenKeychain/src/test/java/tests/UncachedKeyringTest.java91
m---------OpenKeychain/src/test/resources/extern/OpenPGP-Haskell0
-rw-r--r--OpenKeychain/src/test/resources/public-key-canonicalize.blobbin1224 -> 0 bytes
-rw-r--r--OpenKeychain/src/test/resources/public-key-for-sample.blobbin35198 -> 0 bytes
-rw-r--r--OpenKeychain/src/test/resources/sample-altered.txt26
-rw-r--r--OpenKeychain/src/test/resources/sample.txt26
17 files changed, 1 insertions, 1315 deletions
diff --git a/OpenKeychain/build.gradle b/OpenKeychain/build.gradle
index f419141b4..749a7f9ab 100644
--- a/OpenKeychain/build.gradle
+++ b/OpenKeychain/build.gradle
@@ -21,13 +21,6 @@ dependencies {
compile project(':extern:minidns')
compile project(':extern:KeybaseLib:Lib')
-
- // Unit tests are run with Robolectric
- testCompile 'junit:junit:4.11'
- testCompile 'org.robolectric:robolectric:2.3'
- testCompile 'com.squareup:fest-android:1.0.8'
- testCompile 'com.google.android:android:4.1.1.4'
- // compile dependencies are automatically also included in testCompile
}
android {
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/OperationResultParcel.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/OperationResultParcel.java
index babd251c4..5a778a19d 100644
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/OperationResultParcel.java
+++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/OperationResultParcel.java
@@ -12,6 +12,7 @@ import java.util.ArrayList;
import java.util.Arrays;
import java.util.Iterator;
import java.util.List;
+import java.util.Arrays;
/** Represent the result of an operation.
*
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/KeyringBuilder.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/KeyringBuilder.java
deleted file mode 100644
index 1672e9c81..000000000
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/KeyringBuilder.java
+++ /dev/null
@@ -1,254 +0,0 @@
-/*
- * Copyright (C) Art O Cathain
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-package org.sufficientlysecure.keychain.testsupport;
-
-import org.spongycastle.bcpg.CompressionAlgorithmTags;
-import org.spongycastle.bcpg.ContainedPacket;
-import org.spongycastle.bcpg.HashAlgorithmTags;
-import org.spongycastle.bcpg.MPInteger;
-import org.spongycastle.bcpg.PublicKeyAlgorithmTags;
-import org.spongycastle.bcpg.PublicKeyPacket;
-import org.spongycastle.bcpg.PublicSubkeyPacket;
-import org.spongycastle.bcpg.RSAPublicBCPGKey;
-import org.spongycastle.bcpg.SignaturePacket;
-import org.spongycastle.bcpg.SignatureSubpacket;
-import org.spongycastle.bcpg.SignatureSubpacketInputStream;
-import org.spongycastle.bcpg.SignatureSubpacketTags;
-import org.spongycastle.bcpg.SymmetricKeyAlgorithmTags;
-import org.spongycastle.bcpg.UserIDPacket;
-import org.spongycastle.bcpg.sig.Features;
-import org.spongycastle.bcpg.sig.IssuerKeyID;
-import org.spongycastle.bcpg.sig.KeyExpirationTime;
-import org.spongycastle.bcpg.sig.KeyFlags;
-import org.spongycastle.bcpg.sig.PreferredAlgorithms;
-import org.spongycastle.bcpg.sig.SignatureCreationTime;
-import org.spongycastle.openpgp.PGPSignature;
-import org.sufficientlysecure.keychain.pgp.UncachedKeyRing;
-
-import java.io.ByteArrayInputStream;
-import java.io.IOException;
-import java.math.BigInteger;
-import java.util.ArrayList;
-import java.util.Arrays;
-import java.util.Date;
-import java.util.List;
-import java.util.concurrent.TimeUnit;
-
-/**
- * Helps create correct and incorrect keyrings for tests.
- *
- * The original "correct" keyring was generated by GnuPG.
- */
-public class KeyringBuilder {
-
-
- private static final BigInteger PUBLIC_KEY_MODULUS = new BigInteger(
- "cbab78d90d5f2cc0c54dd3c3953005a1e6b521f1ffa5465a102648bf7b91ec72" +
- "f9c180759301587878caeb73332156209f81ca5b3b94309d96110f6972cfc56a" +
- "37fd6279f61d71f19b8f64b288e338299dce133520f5b9b4253e6f4ba31ca36a" +
- "fd87c2081b15f0b283e9350e370e181a23d31379101f17a23ae9192250db6540" +
- "2e9cab2a275bc5867563227b197c8b136c832a94325b680e144ed864fb00b9b8" +
- "b07e13f37b40d5ac27dae63cd6a470a7b40fa3c7479b5b43e634850cc680b177" +
- "8dd6b1b51856f36c3520f258f104db2f96b31a53dd74f708ccfcefccbe420a90" +
- "1c37f1f477a6a4b15f5ecbbfd93311a647bcc3f5f81c59dfe7252e3cd3be6e27"
- , 16
- );
-
- private static final BigInteger PUBLIC_SUBKEY_MODULUS = new BigInteger(
- "e8e2e2a33102649f19f8a07486fb076a1406ca888d72ae05d28f0ef372b5408e" +
- "45132c69f6e5cb6a79bb8aed84634196731393a82d53e0ddd42f28f92cc15850" +
- "8ce3b7ca1a9830502745aee774f86987993df984781f47c4a2910f95cf4c950c" +
- "c4c6cccdc134ad408a0c5418b5e360c9781a8434d366053ea6338b975fae88f9" +
- "383a10a90e7b2caa9ddb95708aa9d8a90246e29b04dbd6136613085c9a287315" +
- "c6e9c7ff4012defc1713875e3ff6073333a1c93d7cd75ebeaaf16b8b853d96ba" +
- "7003258779e8d2f70f1bc0bcd3ef91d7a9ccd8e225579b2d6fcae32799b0a6c0" +
- "e7305fc65dc4edc849c6130a0d669c90c193b1e746c812510f9d600a208be4a5"
- , 16
- );
-
- private static final Date SIGNATURE_DATE = new Date(1404566755000L);
-
- private static final BigInteger EXPONENT = BigInteger.valueOf(0x010001);
-
- private static final String USER_ID_STRING = "OpenKeychain User (NOT A REAL KEY) <openkeychain@example.com>";
-
- public static final BigInteger CORRECT_SIGNATURE = new BigInteger(
- "b065c071d3439d5610eb22e5b4df9e42ed78b8c94f487389e4fc98e8a75a043f" +
- "14bf57d591811e8e7db2d31967022d2ee64372829183ec51d0e20c42d7a1e519" +
- "e9fa22cd9db90f0fd7094fd093b78be2c0db62022193517404d749152c71edc6" +
- "fd48af3416038d8842608ecddebbb11c5823a4321d2029b8993cb017fa8e5ad7" +
- "8a9a618672d0217c4b34002f1a4a7625a514b6a86475e573cb87c64d7069658e" +
- "627f2617874007a28d525e0f87d93ca7b15ad10dbdf10251e542afb8f9b16cbf" +
- "7bebdb5fe7e867325a44e59cad0991cb239b1c859882e2ebb041b80e5cdc3b40" +
- "ed259a8a27d63869754c0881ccdcb50f0564fecdc6966be4a4b87a3507a9d9be"
- , 16
- );
- public static final BigInteger CORRECT_SUBKEY_SIGNATURE = new BigInteger(
- "9c40543e646cfa6d3d1863d91a4e8f1421d0616ddb3187505df75fbbb6c59dd5" +
- "3136b866f246a0320e793cb142c55c8e0e521d1e8d9ab864650f10690f5f1429" +
- "2eb8402a3b1f82c01079d12f5c57c43fce524a530e6f49f6f87d984e26db67a2" +
- "d469386dac87553c50147ebb6c2edd9248325405f737b815253beedaaba4f5c9" +
- "3acd5d07fe6522ceda1027932d849e3ec4d316422cd43ea6e506f643936ab0be" +
- "8246e546bb90d9a83613185047566864ffe894946477e939725171e0e15710b2" +
- "089f78752a9cb572f5907323f1b62f14cb07671aeb02e6d7178f185467624ec5" +
- "74e4a73c439a12edba200a4832106767366a1e6f63da0a42d593fa3914deee2b"
- , 16
- );
- public static final BigInteger KEY_ID = BigInteger.valueOf(0x15130BCF071AE6BFL);
-
- public static UncachedKeyRing correctRing() {
- return convertToKeyring(correctKeyringPackets());
- }
-
- public static UncachedKeyRing ringWithExtraIncorrectSignature() {
- List<ContainedPacket> packets = correctKeyringPackets();
- SignaturePacket incorrectSignaturePacket = createSignaturePacket(CORRECT_SIGNATURE.subtract(BigInteger.ONE));
- packets.add(2, incorrectSignaturePacket);
- return convertToKeyring(packets);
- }
-
- private static UncachedKeyRing convertToKeyring(List<ContainedPacket> packets) {
- try {
- return UncachedKeyRing.decodeFromData(TestDataUtil.concatAll(packets));
- } catch (Exception e) {
- throw new RuntimeException(e);
- }
- }
-
- private static List<ContainedPacket> correctKeyringPackets() {
- PublicKeyPacket publicKey = createPgpPublicKey(PUBLIC_KEY_MODULUS);
- UserIDPacket userId = createUserId(USER_ID_STRING);
- SignaturePacket signaturePacket = createSignaturePacket(CORRECT_SIGNATURE);
- PublicKeyPacket subKey = createPgpPublicSubKey(PUBLIC_SUBKEY_MODULUS);
- SignaturePacket subKeySignaturePacket = createSubkeySignaturePacket();
-
- return new ArrayList<ContainedPacket>(Arrays.asList(
- publicKey,
- userId,
- signaturePacket,
- subKey,
- subKeySignaturePacket
- ));
- }
-
- private static SignaturePacket createSignaturePacket(BigInteger signature) {
- MPInteger[] signatureArray = new MPInteger[]{
- new MPInteger(signature)
- };
-
- int signatureType = PGPSignature.POSITIVE_CERTIFICATION;
- int keyAlgorithm = SignaturePacket.RSA_GENERAL;
- int hashAlgorithm = HashAlgorithmTags.SHA1;
-
- SignatureSubpacket[] hashedData = new SignatureSubpacket[]{
- new SignatureCreationTime(false, SIGNATURE_DATE),
- new KeyFlags(false, KeyFlags.CERTIFY_OTHER + KeyFlags.SIGN_DATA),
- new KeyExpirationTime(false, TimeUnit.DAYS.toSeconds(2)),
- new PreferredAlgorithms(SignatureSubpacketTags.PREFERRED_SYM_ALGS, false, new int[]{
- SymmetricKeyAlgorithmTags.AES_256,
- SymmetricKeyAlgorithmTags.AES_192,
- SymmetricKeyAlgorithmTags.AES_128,
- SymmetricKeyAlgorithmTags.CAST5,
- SymmetricKeyAlgorithmTags.TRIPLE_DES
- }),
- new PreferredAlgorithms(SignatureSubpacketTags.PREFERRED_HASH_ALGS, false, new int[]{
- HashAlgorithmTags.SHA256,
- HashAlgorithmTags.SHA1,
- HashAlgorithmTags.SHA384,
- HashAlgorithmTags.SHA512,
- HashAlgorithmTags.SHA224
- }),
- new PreferredAlgorithms(SignatureSubpacketTags.PREFERRED_COMP_ALGS, false, new int[]{
- CompressionAlgorithmTags.ZLIB,
- CompressionAlgorithmTags.BZIP2,
- CompressionAlgorithmTags.ZIP
- }),
- new Features(false, Features.FEATURE_MODIFICATION_DETECTION),
- createPreferencesSignatureSubpacket()
- };
- SignatureSubpacket[] unhashedData = new SignatureSubpacket[]{
- new IssuerKeyID(false, KEY_ID.toByteArray())
- };
- byte[] fingerPrint = new BigInteger("522c", 16).toByteArray();
-
- return new SignaturePacket(signatureType,
- KEY_ID.longValue(),
- keyAlgorithm,
- hashAlgorithm,
- hashedData,
- unhashedData,
- fingerPrint,
- signatureArray);
- }
-
- /**
- * There is no Preferences subpacket in BouncyCastle, so we have
- * to create one manually.
- */
- private static SignatureSubpacket createPreferencesSignatureSubpacket() {
- SignatureSubpacket prefs;
- try {
- prefs = new SignatureSubpacketInputStream(new ByteArrayInputStream(
- new byte[]{2, SignatureSubpacketTags.KEY_SERVER_PREFS, (byte) 0x80})
- ).readPacket();
- } catch (IOException ex) {
- throw new RuntimeException(ex);
- }
- return prefs;
- }
-
- private static SignaturePacket createSubkeySignaturePacket() {
- int signatureType = PGPSignature.SUBKEY_BINDING;
- int keyAlgorithm = SignaturePacket.RSA_GENERAL;
- int hashAlgorithm = HashAlgorithmTags.SHA1;
-
- SignatureSubpacket[] hashedData = new SignatureSubpacket[]{
- new SignatureCreationTime(false, SIGNATURE_DATE),
- new KeyFlags(false, KeyFlags.ENCRYPT_COMMS + KeyFlags.ENCRYPT_STORAGE),
- new KeyExpirationTime(false, TimeUnit.DAYS.toSeconds(2)),
- };
- SignatureSubpacket[] unhashedData = new SignatureSubpacket[]{
- new IssuerKeyID(false, KEY_ID.toByteArray())
- };
- byte[] fingerPrint = new BigInteger("234a", 16).toByteArray();
- MPInteger[] signature = new MPInteger[]{
- new MPInteger(CORRECT_SUBKEY_SIGNATURE)
- };
- return new SignaturePacket(signatureType,
- KEY_ID.longValue(),
- keyAlgorithm,
- hashAlgorithm,
- hashedData,
- unhashedData,
- fingerPrint,
- signature);
- }
-
- private static PublicKeyPacket createPgpPublicKey(BigInteger modulus) {
- return new PublicKeyPacket(PublicKeyAlgorithmTags.RSA_GENERAL, SIGNATURE_DATE, new RSAPublicBCPGKey(modulus, EXPONENT));
- }
-
- private static PublicKeyPacket createPgpPublicSubKey(BigInteger modulus) {
- return new PublicSubkeyPacket(PublicKeyAlgorithmTags.RSA_GENERAL, SIGNATURE_DATE, new RSAPublicBCPGKey(modulus, EXPONENT));
- }
-
- private static UserIDPacket createUserId(String userId) {
- return new UserIDPacket(userId);
- }
-
-}
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/KeyringTestingHelper.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/KeyringTestingHelper.java
deleted file mode 100644
index d2a945185..000000000
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/KeyringTestingHelper.java
+++ /dev/null
@@ -1,205 +0,0 @@
-/*
- * Copyright (C) Art O Cathain, Vincent Breitmoser
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-package org.sufficientlysecure.keychain.testsupport;
-
-import android.content.Context;
-
-import org.spongycastle.util.Arrays;
-import org.sufficientlysecure.keychain.pgp.NullProgressable;
-import org.sufficientlysecure.keychain.pgp.UncachedKeyRing;
-import org.sufficientlysecure.keychain.provider.ProviderHelper;
-import org.sufficientlysecure.keychain.service.OperationResults;
-
-import java.io.ByteArrayInputStream;
-import java.io.IOException;
-import java.io.InputStream;
-import java.util.Collection;
-import java.util.HashSet;
-import java.util.Set;
-
-/**
- * Helper for tests of the Keyring import in ProviderHelper.
- */
-public class KeyringTestingHelper {
-
- private final Context context;
-
- public KeyringTestingHelper(Context robolectricContext) {
- this.context = robolectricContext;
- }
-
- public boolean addKeyring(Collection<String> blobFiles) throws Exception {
-
- ProviderHelper providerHelper = new ProviderHelper(context);
-
- byte[] data = TestDataUtil.readAllFully(blobFiles);
- UncachedKeyRing ring = UncachedKeyRing.decodeFromData(data);
- long masterKeyId = ring.getMasterKeyId();
-
- // Should throw an exception; key is not yet saved
- retrieveKeyAndExpectNotFound(providerHelper, masterKeyId);
-
- OperationResults.SaveKeyringResult saveKeyringResult = providerHelper.savePublicKeyRing(ring, new NullProgressable());
-
- boolean saveSuccess = saveKeyringResult.success();
-
- // Now re-retrieve the saved key. Should not throw an exception.
- providerHelper.getWrappedPublicKeyRing(masterKeyId);
-
- // A different ID should still fail
- retrieveKeyAndExpectNotFound(providerHelper, masterKeyId - 1);
-
- return saveSuccess;
- }
-
- public static class Packet {
- int tag;
- int length;
- byte[] buf;
-
- public boolean equals(Object other) {
- return other instanceof Packet && Arrays.areEqual(this.buf, ((Packet) other).buf);
- }
-
- public int hashCode() {
- // System.out.println("tag: " + tag + ", code: " + Arrays.hashCode(buf));
- return Arrays.hashCode(buf);
- }
- }
-
- public static boolean diffKeyrings(byte[] ringA, byte[] ringB, Set<Packet> onlyA, Set<Packet> onlyB)
- throws IOException {
- InputStream streamA = new ByteArrayInputStream(ringA);
- InputStream streamB = new ByteArrayInputStream(ringB);
-
- HashSet<Packet> a = new HashSet<Packet>(), b = new HashSet<Packet>();
-
- Packet p;
- while(true) {
- p = readPacket(streamA);
- if (p == null) {
- break;
- }
- a.add(p);
- }
- while(true) {
- p = readPacket(streamB);
- if (p == null) {
- break;
- }
- b.add(p);
- }
-
- onlyA.addAll(a);
- onlyA.removeAll(b);
- onlyB.addAll(b);
- onlyB.removeAll(a);
-
- return onlyA.isEmpty() && onlyB.isEmpty();
- }
-
- private static Packet readPacket(InputStream in) throws IOException {
-
- // save here. this is tag + length, max 6 bytes
- in.mark(6);
-
- int hdr = in.read();
- int headerLength = 1;
-
- if (hdr < 0) {
- return null;
- }
-
- if ((hdr & 0x80) == 0) {
- throw new IOException("invalid header encountered");
- }
-
- boolean newPacket = (hdr & 0x40) != 0;
- int tag = 0;
- int bodyLen = 0;
-
- if (newPacket) {
- tag = hdr & 0x3f;
-
- int l = in.read();
- headerLength += 1;
-
- if (l < 192) {
- bodyLen = l;
- } else if (l <= 223) {
- int b = in.read();
- headerLength += 1;
-
- bodyLen = ((l - 192) << 8) + (b) + 192;
- } else if (l == 255) {
- bodyLen = (in.read() << 24) | (in.read() << 16) | (in.read() << 8) | in.read();
- headerLength += 4;
- } else {
- // bodyLen = 1 << (l & 0x1f);
- throw new IOException("no support for partial bodies in test classes");
- }
- } else {
- int lengthType = hdr & 0x3;
-
- tag = (hdr & 0x3f) >> 2;
-
- switch (lengthType) {
- case 0:
- bodyLen = in.read();
- headerLength += 1;
- break;
- case 1:
- bodyLen = (in.read() << 8) | in.read();
- headerLength += 2;
- break;
- case 2:
- bodyLen = (in.read() << 24) | (in.read() << 16) | (in.read() << 8) | in.read();
- headerLength += 4;
- break;
- case 3:
- // bodyLen = 1 << (l & 0x1f);
- throw new IOException("no support for partial bodies in test classes");
- default:
- throw new IOException("unknown length type encountered");
- }
- }
-
- in.reset();
-
- // read the entire packet INCLUDING the header here
- byte[] buf = new byte[headerLength+bodyLen];
- if (in.read(buf) != headerLength+bodyLen) {
- throw new IOException("read length mismatch!");
- }
- Packet p = new Packet();
- p.tag = tag;
- p.length = bodyLen;
- p.buf = buf;
- return p;
-
- }
-
- private void retrieveKeyAndExpectNotFound(ProviderHelper providerHelper, long masterKeyId) {
- try {
- providerHelper.getWrappedPublicKeyRing(masterKeyId);
- throw new AssertionError("Was expecting the previous call to fail!");
- } catch (ProviderHelper.NotFoundException expectedException) {
- // good
- }
- }
-
-}
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/PgpVerifyTestingHelper.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/PgpVerifyTestingHelper.java
deleted file mode 100644
index 19c125319..000000000
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/PgpVerifyTestingHelper.java
+++ /dev/null
@@ -1,65 +0,0 @@
-package org.sufficientlysecure.keychain.testsupport;
-/*
- * Copyright (C) Art O Cathain
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-import android.content.Context;
-
-import org.sufficientlysecure.keychain.pgp.PgpDecryptVerify;
-import org.sufficientlysecure.keychain.pgp.PgpDecryptVerifyResult;
-import org.sufficientlysecure.keychain.provider.ProviderHelper;
-import org.sufficientlysecure.keychain.util.InputData;
-
-import java.io.ByteArrayInputStream;
-import java.io.ByteArrayOutputStream;
-import java.io.InputStream;
-import java.io.OutputStream;
-
-/**
- * For functional tests of PgpDecryptVerify
- */
-public class PgpVerifyTestingHelper {
-
- private final Context context;
-
- public PgpVerifyTestingHelper(Context robolectricContext) {
- this.context = robolectricContext;
- }
-
- public int doTestFile(String testFileName) throws Exception {
- ProviderHelper providerHelper = new ProviderHelperStub(context);
-
- PgpDecryptVerify.PassphraseCache passphraseCache = new PgpDecryptVerify.PassphraseCache() {
- public String getCachedPassphrase(long masterKeyId) {
- return "I am a passphrase";
- }
- };
-
- byte[] sampleInputBytes = TestDataUtil.readFully(getClass().getResourceAsStream(testFileName));
-
- InputStream sampleInput = new ByteArrayInputStream(sampleInputBytes);
-
- InputData data = new InputData(sampleInput, sampleInputBytes.length);
- OutputStream outStream = new ByteArrayOutputStream();
-
- PgpDecryptVerify verify = new PgpDecryptVerify.Builder(providerHelper, passphraseCache, data, outStream).build();
- PgpDecryptVerifyResult result = verify.execute();
-
- return result.getSignatureResult().getStatus();
- }
-
-
-}
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/ProviderHelperStub.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/ProviderHelperStub.java
deleted file mode 100644
index 0f73d4264..000000000
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/ProviderHelperStub.java
+++ /dev/null
@@ -1,39 +0,0 @@
-/*
- * Copyright (C) Art O Cathain
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-package org.sufficientlysecure.keychain.testsupport;
-
-import android.content.Context;
-import android.net.Uri;
-
-import org.sufficientlysecure.keychain.pgp.WrappedPublicKeyRing;
-import org.sufficientlysecure.keychain.provider.ProviderHelper;
-
-/**
- * Created by art on 21/06/14.
- */
-class ProviderHelperStub extends ProviderHelper {
- public ProviderHelperStub(Context context) {
- super(context);
- }
-
- @Override
- public WrappedPublicKeyRing getWrappedPublicKeyRing(Uri id) throws NotFoundException {
- byte[] data = TestDataUtil.readFully(getClass().getResourceAsStream("/public-key-for-sample.blob"));
- return new WrappedPublicKeyRing(data, false, 0);
- }
-}
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/TestDataUtil.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/TestDataUtil.java
deleted file mode 100644
index e823c10fd..000000000
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/TestDataUtil.java
+++ /dev/null
@@ -1,142 +0,0 @@
-/*
- * Copyright (C) Art O Cathain
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-package org.sufficientlysecure.keychain.testsupport;
-
-import org.spongycastle.bcpg.ContainedPacket;
-
-import java.io.ByteArrayOutputStream;
-import java.io.IOException;
-import java.io.InputStream;
-import java.io.OutputStream;
-import java.util.Collection;
-import java.util.Iterator;
-
-/**
- * Misc support functions. Would just use Guava / Apache Commons but
- * avoiding extra dependencies.
- */
-public class TestDataUtil {
- public static byte[] readFully(InputStream input) {
- ByteArrayOutputStream output = new ByteArrayOutputStream();
- appendToOutput(input, output);
- return output.toByteArray();
- }
-
- public static void appendToOutput(InputStream input, OutputStream output) {
- byte[] buffer = new byte[8192];
- int bytesRead;
- try {
- while ((bytesRead = input.read(buffer)) != -1) {
- output.write(buffer, 0, bytesRead);
- }
- } catch (IOException e) {
- throw new RuntimeException(e);
- }
- }
-
- public static byte[] readAllFully(Collection<String> inputResources) {
- ByteArrayOutputStream output = new ByteArrayOutputStream();
-
- for (String inputResource : inputResources) {
- appendToOutput(getResourceAsStream(inputResource), output);
- }
- return output.toByteArray();
- }
-
- public static InputStream getResourceAsStream(String resourceName) {
- return TestDataUtil.class.getResourceAsStream(resourceName);
- }
-
- /**
- * Null-safe equivalent of {@code a.equals(b)}.
- */
- public static boolean equals(Object a, Object b) {
- return (a == null) ? (b == null) : a.equals(b);
- }
-
- public static <T> boolean iterEquals(Iterator<T> a, Iterator<T> b, EqualityChecker<T> comparator) {
- while (a.hasNext()) {
- T aObject = a.next();
- if (!b.hasNext()) {
- return false;
- }
- T bObject = b.next();
- if (!comparator.areEquals(aObject, bObject)) {
- return false;
- }
- }
-
- if (b.hasNext()) {
- return false;
- }
-
- return true;
- }
-
-
- public static <T> boolean iterEquals(Iterator<T> a, Iterator<T> b) {
- return iterEquals(a, b, new EqualityChecker<T>() {
- @Override
- public boolean areEquals(T lhs, T rhs) {
- return TestDataUtil.equals(lhs, rhs);
- }
- });
- }
-
- public static interface EqualityChecker<T> {
- public boolean areEquals(T lhs, T rhs);
- }
-
-
- public static byte[] concatAll(java.util.List<ContainedPacket> packets) {
- byte[][] byteArrays = new byte[packets.size()][];
- try {
- for (int i = 0; i < packets.size(); i++) {
- byteArrays[i] = packets.get(i).getEncoded();
- }
- } catch (IOException ex) {
- throw new RuntimeException(ex);
- }
-
- return concatAll(byteArrays);
- }
-
- public static byte[] concatAll(byte[]... byteArrays) {
- if (byteArrays.length == 1) {
- return byteArrays[0];
- } else if (byteArrays.length == 2) {
- return concat(byteArrays[0], byteArrays[1]);
- } else {
- byte[] first = concat(byteArrays[0], byteArrays[1]);
- byte[][] remainingArrays = new byte[byteArrays.length - 1][];
- remainingArrays[0] = first;
- System.arraycopy(byteArrays, 2, remainingArrays, 1, byteArrays.length - 2);
- return concatAll(remainingArrays);
- }
- }
-
- private static byte[] concat(byte[] a, byte[] b) {
- int aLen = a.length;
- int bLen = b.length;
- byte[] c = new byte[aLen + bLen];
- System.arraycopy(a, 0, c, 0, aLen);
- System.arraycopy(b, 0, c, aLen, bLen);
- return c;
- }
-
-}
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/UncachedKeyringTestingHelper.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/UncachedKeyringTestingHelper.java
deleted file mode 100644
index 7a493ecf6..000000000
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/UncachedKeyringTestingHelper.java
+++ /dev/null
@@ -1,297 +0,0 @@
-/*
- * Copyright (C) Art O Cathain
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-package org.sufficientlysecure.keychain.testsupport;
-
-import org.spongycastle.bcpg.BCPGKey;
-import org.spongycastle.bcpg.PublicKeyPacket;
-import org.spongycastle.bcpg.SignatureSubpacket;
-import org.spongycastle.openpgp.PGPException;
-import org.spongycastle.openpgp.PGPPublicKey;
-import org.spongycastle.openpgp.PGPSignature;
-import org.spongycastle.openpgp.PGPSignatureSubpacketVector;
-import org.spongycastle.openpgp.PGPUserAttributeSubpacketVector;
-import org.sufficientlysecure.keychain.pgp.UncachedKeyRing;
-import org.sufficientlysecure.keychain.pgp.UncachedPublicKey;
-import org.sufficientlysecure.keychain.service.OperationResultParcel;
-
-import java.util.Arrays;
-
-/**
- * Created by art on 28/06/14.
- */
-public class UncachedKeyringTestingHelper {
-
- public static boolean compareRing(UncachedKeyRing keyRing1, UncachedKeyRing keyRing2) {
- OperationResultParcel.OperationLog operationLog = new OperationResultParcel.OperationLog();
- UncachedKeyRing canonicalized = keyRing1.canonicalize(operationLog, 0);
-
- if (canonicalized == null) {
- throw new AssertionError("Canonicalization failed; messages: [" + operationLog.toList() + "]");
- }
-
- return TestDataUtil.iterEquals(canonicalized.getPublicKeys(), keyRing2.getPublicKeys(), new
- TestDataUtil.EqualityChecker<UncachedPublicKey>() {
- @Override
- public boolean areEquals(UncachedPublicKey lhs, UncachedPublicKey rhs) {
- return comparePublicKey(lhs, rhs);
- }
- });
- }
-
- public static boolean comparePublicKey(UncachedPublicKey key1, UncachedPublicKey key2) {
- boolean equal = true;
-
- if (key1.canAuthenticate() != key2.canAuthenticate()) {
- return false;
- }
- if (key1.canCertify() != key2.canCertify()) {
- return false;
- }
- if (key1.canEncrypt() != key2.canEncrypt()) {
- return false;
- }
- if (key1.canSign() != key2.canSign()) {
- return false;
- }
- if (key1.getAlgorithm() != key2.getAlgorithm()) {
- return false;
- }
- if (key1.getBitStrength() != key2.getBitStrength()) {
- return false;
- }
- if (!TestDataUtil.equals(key1.getCreationTime(), key2.getCreationTime())) {
- return false;
- }
- if (!TestDataUtil.equals(key1.getExpiryTime(), key2.getExpiryTime())) {
- return false;
- }
- if (!Arrays.equals(key1.getFingerprint(), key2.getFingerprint())) {
- return false;
- }
- if (key1.getKeyId() != key2.getKeyId()) {
- return false;
- }
- if (key1.getKeyUsage() != key2.getKeyUsage()) {
- return false;
- }
- if (!TestDataUtil.equals(key1.getPrimaryUserId(), key2.getPrimaryUserId())) {
- return false;
- }
-
- // Ooops, getPublicKey is due to disappear. But then how to compare?
- if (!keysAreEqual(key1.getPublicKey(), key2.getPublicKey())) {
- return false;
- }
-
- return equal;
- }
-
- public static boolean keysAreEqual(PGPPublicKey a, PGPPublicKey b) {
-
- if (a.getAlgorithm() != b.getAlgorithm()) {
- return false;
- }
-
- if (a.getBitStrength() != b.getBitStrength()) {
- return false;
- }
-
- if (!TestDataUtil.equals(a.getCreationTime(), b.getCreationTime())) {
- return false;
- }
-
- if (!Arrays.equals(a.getFingerprint(), b.getFingerprint())) {
- return false;
- }
-
- if (a.getKeyID() != b.getKeyID()) {
- return false;
- }
-
- if (!pubKeyPacketsAreEqual(a.getPublicKeyPacket(), b.getPublicKeyPacket())) {
- return false;
- }
-
- if (a.getVersion() != b.getVersion()) {
- return false;
- }
-
- if (a.getValidDays() != b.getValidDays()) {
- return false;
- }
-
- if (a.getValidSeconds() != b.getValidSeconds()) {
- return false;
- }
-
- if (!Arrays.equals(a.getTrustData(), b.getTrustData())) {
- return false;
- }
-
- if (!TestDataUtil.iterEquals(a.getUserIDs(), b.getUserIDs())) {
- return false;
- }
-
- if (!TestDataUtil.iterEquals(a.getUserAttributes(), b.getUserAttributes(),
- new TestDataUtil.EqualityChecker<PGPUserAttributeSubpacketVector>() {
- public boolean areEquals(PGPUserAttributeSubpacketVector lhs, PGPUserAttributeSubpacketVector rhs) {
- // For once, BC defines equals, so we use it implicitly.
- return TestDataUtil.equals(lhs, rhs);
- }
- }
- )) {
- return false;
- }
-
-
- if (!TestDataUtil.iterEquals(a.getSignatures(), b.getSignatures(),
- new TestDataUtil.EqualityChecker<PGPSignature>() {
- public boolean areEquals(PGPSignature lhs, PGPSignature rhs) {
- return signaturesAreEqual(lhs, rhs);
- }
- }
- )) {
- return false;
- }
-
- return true;
- }
-
- public static boolean signaturesAreEqual(PGPSignature a, PGPSignature b) {
-
- if (a.getVersion() != b.getVersion()) {
- return false;
- }
-
- if (a.getKeyAlgorithm() != b.getKeyAlgorithm()) {
- return false;
- }
-
- if (a.getHashAlgorithm() != b.getHashAlgorithm()) {
- return false;
- }
-
- if (a.getSignatureType() != b.getSignatureType()) {
- return false;
- }
-
- try {
- if (!Arrays.equals(a.getSignature(), b.getSignature())) {
- return false;
- }
- } catch (PGPException ex) {
- throw new RuntimeException(ex);
- }
-
- if (a.getKeyID() != b.getKeyID()) {
- return false;
- }
-
- if (!TestDataUtil.equals(a.getCreationTime(), b.getCreationTime())) {
- return false;
- }
-
- if (!Arrays.equals(a.getSignatureTrailer(), b.getSignatureTrailer())) {
- return false;
- }
-
- if (!subPacketVectorsAreEqual(a.getHashedSubPackets(), b.getHashedSubPackets())) {
- return false;
- }
-
- if (!subPacketVectorsAreEqual(a.getUnhashedSubPackets(), b.getUnhashedSubPackets())) {
- return false;
- }
-
- return true;
- }
-
- private static boolean subPacketVectorsAreEqual(PGPSignatureSubpacketVector aHashedSubPackets, PGPSignatureSubpacketVector bHashedSubPackets) {
- for (int i = 0; i < Byte.MAX_VALUE; i++) {
- if (!TestDataUtil.iterEquals(Arrays.asList(aHashedSubPackets.getSubpackets(i)).iterator(),
- Arrays.asList(bHashedSubPackets.getSubpackets(i)).iterator(),
- new TestDataUtil.EqualityChecker<SignatureSubpacket>() {
- @Override
- public boolean areEquals(SignatureSubpacket lhs, SignatureSubpacket rhs) {
- return signatureSubpacketsAreEqual(lhs, rhs);
- }
- }
- )) {
- return false;
- }
-
- }
- return true;
- }
-
- private static boolean signatureSubpacketsAreEqual(SignatureSubpacket lhs, SignatureSubpacket rhs) {
- if (lhs.getType() != rhs.getType()) {
- return false;
- }
- if (!Arrays.equals(lhs.getData(), rhs.getData())) {
- return false;
- }
- return true;
- }
-
- public static boolean pubKeyPacketsAreEqual(PublicKeyPacket a, PublicKeyPacket b) {
-
- if (a.getAlgorithm() != b.getAlgorithm()) {
- return false;
- }
-
- if (!bcpgKeysAreEqual(a.getKey(), b.getKey())) {
- return false;
- }
-
- if (!TestDataUtil.equals(a.getTime(), b.getTime())) {
- return false;
- }
-
- if (a.getValidDays() != b.getValidDays()) {
- return false;
- }
-
- if (a.getVersion() != b.getVersion()) {
- return false;
- }
-
- return true;
- }
-
- public static boolean bcpgKeysAreEqual(BCPGKey a, BCPGKey b) {
-
- if (!TestDataUtil.equals(a.getFormat(), b.getFormat())) {
- return false;
- }
-
- if (!Arrays.equals(a.getEncoded(), b.getEncoded())) {
- return false;
- }
-
- return true;
- }
-
-
- public void doTestCanonicalize(UncachedKeyRing inputKeyRing, UncachedKeyRing expectedKeyRing) {
- if (!compareRing(inputKeyRing, expectedKeyRing)) {
- throw new AssertionError("Expected [" + inputKeyRing + "] to match [" + expectedKeyRing + "]");
- }
- }
-
-}
diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/package-info.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/package-info.java
deleted file mode 100644
index 1cc0f9a95..000000000
--- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/testsupport/package-info.java
+++ /dev/null
@@ -1,7 +0,0 @@
-/**
- * Test support classes.
- * This is only in main code because of gradle-Android Studio-robolectric issues. Having
- * classes in main code means IDE autocomplete, class detection, etc., all works.
- * TODO Move into test package when possible
- */
-package org.sufficientlysecure.keychain.testsupport;
diff --git a/OpenKeychain/src/test/java/tests/PgpDecryptVerifyTest.java b/OpenKeychain/src/test/java/tests/PgpDecryptVerifyTest.java
deleted file mode 100644
index 0353e03f5..000000000
--- a/OpenKeychain/src/test/java/tests/PgpDecryptVerifyTest.java
+++ /dev/null
@@ -1,53 +0,0 @@
-/*
- * Copyright (C) Art O Cathain
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-package tests;
-
-import org.junit.Assert;
-import org.junit.Test;
-import org.junit.runner.RunWith;
-import org.robolectric.*;
-import org.openintents.openpgp.OpenPgpSignatureResult;
-import org.sufficientlysecure.keychain.testsupport.PgpVerifyTestingHelper;
-
-@RunWith(RobolectricTestRunner.class)
-@org.robolectric.annotation.Config(emulateSdk = 18) // Robolectric doesn't yet support 19
-public class PgpDecryptVerifyTest {
-
- @Test
- public void testVerifySuccess() throws Exception {
-
- String testFileName = "/sample.txt";
- int expectedSignatureResult = OpenPgpSignatureResult.SIGNATURE_SUCCESS_UNCERTIFIED;
-
- int status = new PgpVerifyTestingHelper(Robolectric.application).doTestFile(testFileName);
-
- Assert.assertEquals(expectedSignatureResult, status);
- }
-
- @Test
- public void testVerifyFailure() throws Exception {
-
- String testFileName = "/sample-altered.txt";
- int expectedSignatureResult = OpenPgpSignatureResult.SIGNATURE_ERROR;
-
- int status = new PgpVerifyTestingHelper(Robolectric.application).doTestFile(testFileName);
-
- Assert.assertEquals(expectedSignatureResult, status);
- }
-
-}
diff --git a/OpenKeychain/src/test/java/tests/ProviderHelperKeyringTest.java b/OpenKeychain/src/test/java/tests/ProviderHelperKeyringTest.java
deleted file mode 100644
index 830ec1266..000000000
--- a/OpenKeychain/src/test/java/tests/ProviderHelperKeyringTest.java
+++ /dev/null
@@ -1,103 +0,0 @@
-/*
- * Copyright (C) Art O Cathain
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-package tests;
-
-import java.util.Collections;
-import java.util.Arrays;
-import java.util.Collection;
-import java.util.ArrayList;
-
-import org.junit.Assert;
-import org.junit.Test;
-import org.junit.runner.RunWith;
-import org.robolectric.*;
-import org.openintents.openpgp.OpenPgpSignatureResult;
-import org.sufficientlysecure.keychain.testsupport.KeyringTestingHelper;
-import org.sufficientlysecure.keychain.testsupport.PgpVerifyTestingHelper;
-
-@RunWith(RobolectricTestRunner.class)
-@org.robolectric.annotation.Config(emulateSdk = 18) // Robolectric doesn't yet support 19
-public class ProviderHelperKeyringTest {
-
- @Test
- public void testSavePublicKeyring() throws Exception {
- Assert.assertTrue(new KeyringTestingHelper(Robolectric.application).addKeyring(Collections.singleton(
- "/public-key-for-sample.blob"
- )));
- }
-
- @Test
- public void testSavePublicKeyringRsa() throws Exception {
- Assert.assertTrue(new KeyringTestingHelper(Robolectric.application).addKeyring(prependResourcePath(Arrays.asList(
- "000001-006.public_key",
- "000002-013.user_id",
- "000003-002.sig",
- "000004-012.ring_trust",
- "000005-002.sig",
- "000006-012.ring_trust",
- "000007-002.sig",
- "000008-012.ring_trust",
- "000009-002.sig",
- "000010-012.ring_trust",
- "000011-002.sig",
- "000012-012.ring_trust",
- "000013-014.public_subkey",
- "000014-002.sig",
- "000015-012.ring_trust"
- ))));
- }
-
- @Test
- public void testSavePublicKeyringDsa() throws Exception {
- Assert.assertTrue(new KeyringTestingHelper(Robolectric.application).addKeyring(prependResourcePath(Arrays.asList(
- "000016-006.public_key",
- "000017-002.sig",
- "000018-012.ring_trust",
- "000019-013.user_id",
- "000020-002.sig",
- "000021-012.ring_trust",
- "000022-002.sig",
- "000023-012.ring_trust",
- "000024-014.public_subkey",
- "000025-002.sig",
- "000026-012.ring_trust"
- ))));
- }
-
- @Test
- public void testSavePublicKeyringDsa2() throws Exception {
- Assert.assertTrue(new KeyringTestingHelper(Robolectric.application).addKeyring(prependResourcePath(Arrays.asList(
- "000027-006.public_key",
- "000028-002.sig",
- "000029-012.ring_trust",
- "000030-013.user_id",
- "000031-002.sig",
- "000032-012.ring_trust",
- "000033-002.sig",
- "000034-012.ring_trust"
- ))));
- }
-
- private static Collection<String> prependResourcePath(Collection<String> files) {
- Collection<String> prependedFiles = new ArrayList<String>();
- for (String file: files) {
- prependedFiles.add("/extern/OpenPGP-Haskell/tests/data/" + file);
- }
- return prependedFiles;
- }
-}
diff --git a/OpenKeychain/src/test/java/tests/UncachedKeyringTest.java b/OpenKeychain/src/test/java/tests/UncachedKeyringTest.java
deleted file mode 100644
index b3f78f22d..000000000
--- a/OpenKeychain/src/test/java/tests/UncachedKeyringTest.java
+++ /dev/null
@@ -1,91 +0,0 @@
-/*
- * Copyright (C) Art O Cathain, Vincent Breitmoser
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-package tests;
-
-import org.junit.Assert;
-import org.junit.Test;
-import org.junit.runner.RunWith;
-import org.robolectric.*;
-import org.sufficientlysecure.keychain.pgp.UncachedKeyRing;
-import org.sufficientlysecure.keychain.service.OperationResultParcel;
-import org.sufficientlysecure.keychain.testsupport.*;
-import org.sufficientlysecure.keychain.testsupport.KeyringBuilder;
-import org.sufficientlysecure.keychain.testsupport.KeyringTestingHelper;
-import org.sufficientlysecure.keychain.testsupport.TestDataUtil;
-
-import java.util.*;
-import java.io.*;
-
-@RunWith(RobolectricTestRunner.class)
-@org.robolectric.annotation.Config(emulateSdk = 18) // Robolectric doesn't yet support 19
-public class UncachedKeyringTest {
-
- @Test
- public void testCanonicalizeNoChanges() throws Exception {
- UncachedKeyRing expectedKeyRing = KeyringBuilder.correctRing();
- UncachedKeyRing inputKeyRing = KeyringBuilder.correctRing();
-// Uncomment to dump the encoded key for manual inspection
-// TestDataUtil.appendToOutput(new ByteArrayInputStream(inputKeyRing.getEncoded()), new FileOutputStream(new File("/tmp/key-encoded")));
- new UncachedKeyringTestingHelper().doTestCanonicalize(inputKeyRing, expectedKeyRing);
-
- OperationResultParcel.OperationLog log = new OperationResultParcel.OperationLog();
- UncachedKeyRing canonicalizedRing = inputKeyRing.canonicalize(log, 0);
-
- if (canonicalizedRing == null) {
- throw new AssertionError("Canonicalization failed; messages: [" + log.toString() + "]");
- }
-
- HashSet onlyA = new HashSet<KeyringTestingHelper.Packet>();
- HashSet onlyB = new HashSet<KeyringTestingHelper.Packet>();
- Assert.assertTrue(KeyringTestingHelper.diffKeyrings(
- canonicalizedRing.getEncoded(), expectedKeyRing.getEncoded(), onlyA, onlyB));
-
-
- }
-
-
- @Test
- public void testCanonicalizeExtraIncorrectSignature() throws Exception {
- UncachedKeyRing expectedKeyRing = KeyringBuilder.correctRing();
- UncachedKeyRing inputKeyRing = KeyringBuilder.ringWithExtraIncorrectSignature();
- new UncachedKeyringTestingHelper().doTestCanonicalize(inputKeyRing, expectedKeyRing);
- }
-
- /**
- * Check the original GnuPG-generated public key is OK
- */
- @Test
- public void testCanonicalizeOriginalGpg() throws Exception {
- byte[] data = TestDataUtil.readAllFully(Collections.singleton("/public-key-canonicalize.blob"));
- UncachedKeyRing inputKeyRing = UncachedKeyRing.decodeFromData(data);
- new UncachedKeyringTestingHelper().doTestCanonicalize(inputKeyRing, KeyringBuilder.correctRing());
- }
-
-
- /**
- * Just testing my own test code. Should really be using a library for this.
- */
- @Test
- public void testConcat() throws Exception {
- byte[] actual = TestDataUtil.concatAll(new byte[]{1}, new byte[]{2, -2}, new byte[]{5}, new byte[]{3});
- byte[] expected = new byte[]{1, 2, -2, 5, 3};
- Assert.assertEquals(java.util.Arrays.toString(expected), java.util.Arrays.toString(actual));
- }
-
-
-}
diff --git a/OpenKeychain/src/test/resources/extern/OpenPGP-Haskell b/OpenKeychain/src/test/resources/extern/OpenPGP-Haskell
deleted file mode 160000
-Subproject eba7e4fdce3de6622b4ec3862b405b0acd01637
diff --git a/OpenKeychain/src/test/resources/public-key-canonicalize.blob b/OpenKeychain/src/test/resources/public-key-canonicalize.blob
deleted file mode 100644
index 3450824c1..000000000
--- a/OpenKeychain/src/test/resources/public-key-canonicalize.blob
+++ /dev/null
Binary files differ
diff --git a/OpenKeychain/src/test/resources/public-key-for-sample.blob b/OpenKeychain/src/test/resources/public-key-for-sample.blob
deleted file mode 100644
index 4aa91510b..000000000
--- a/OpenKeychain/src/test/resources/public-key-for-sample.blob
+++ /dev/null
Binary files differ
diff --git a/OpenKeychain/src/test/resources/sample-altered.txt b/OpenKeychain/src/test/resources/sample-altered.txt
deleted file mode 100644
index 458821f81..000000000
--- a/OpenKeychain/src/test/resources/sample-altered.txt
+++ /dev/null
@@ -1,26 +0,0 @@
------BEGIN PGP SIGNED MESSAGE-----
-Hash: SHA1
-
-This is a simple text document, which is used to illustrate
-the concept of signing simple text files. There are no
-control characters or special formatting commands in this
-text, just simple printable ASCII characters.
-MALICIOUS TEXT
-To make this a slightly less uninteresting document, there
-follows a short shopping list.
-
- eggs, 1 doz
- milk, 1 gal
- bacon, 1 lb
- olive oil
- bread, 1 loaf
-
-That's all there is to this document.
-
------BEGIN PGP SIGNATURE-----
-Version: PGPfreeware 5.5.5 for non-commercial use <http://www.nai.com>
-
-iQA/AwUBN78ib3S9RCOKzj55EQKqDACg1NV2/iyPKrDlOVJvJwz6ArcQ0UQAnjNC
-CDxKAFyaaGa835l1vpbFkAJk
-=3r/N
------END PGP SIGNATURE-----
diff --git a/OpenKeychain/src/test/resources/sample.txt b/OpenKeychain/src/test/resources/sample.txt
deleted file mode 100644
index c0065f78d..000000000
--- a/OpenKeychain/src/test/resources/sample.txt
+++ /dev/null
@@ -1,26 +0,0 @@
------BEGIN PGP SIGNED MESSAGE-----
-Hash: SHA1
-
-This is a simple text document, which is used to illustrate
-the concept of signing simple text files. There are no
-control characters or special formatting commands in this
-text, just simple printable ASCII characters.
-
-To make this a slightly less uninteresting document, there
-follows a short shopping list.
-
- eggs, 1 doz
- milk, 1 gal
- bacon, 1 lb
- olive oil
- bread, 1 loaf
-
-That's all there is to this document.
-
------BEGIN PGP SIGNATURE-----
-Version: PGPfreeware 5.5.5 for non-commercial use <http://www.nai.com>
-
-iQA/AwUBN78ib3S9RCOKzj55EQKqDACg1NV2/iyPKrDlOVJvJwz6ArcQ0UQAnjNC
-CDxKAFyaaGa835l1vpbFkAJk
-=3r/N
------END PGP SIGNATURE-----