diff options
Diffstat (limited to 'OpenKeychain-Test/src')
5 files changed, 21 insertions, 16 deletions
| diff --git a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/PgpEncryptDecryptTest.java b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/PgpEncryptDecryptTest.java index ebe31c9f0..8c1a358b0 100644 --- a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/PgpEncryptDecryptTest.java +++ b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/PgpEncryptDecryptTest.java @@ -34,6 +34,7 @@ import org.sufficientlysecure.keychain.service.SaveKeyringParcel.Algorithm;  import org.sufficientlysecure.keychain.operations.results.DecryptVerifyResult;  import org.sufficientlysecure.keychain.operations.results.EditKeyResult;  import org.sufficientlysecure.keychain.operations.results.SignEncryptResult; +import org.sufficientlysecure.keychain.service.SaveKeyringParcel.ChangeUnlockParcel;  import org.sufficientlysecure.keychain.util.InputData;  import org.sufficientlysecure.keychain.util.ProgressScaler;  import org.sufficientlysecure.keychain.util.TestingUtils; @@ -68,7 +69,7 @@ public class PgpEncryptDecryptTest {              parcel.mAddSubKeys.add(new SaveKeyringParcel.SubkeyAdd(                      Algorithm.ELGAMAL, 1024, null, KeyFlags.ENCRYPT_COMMS, 0L));              parcel.mAddUserIds.add("bloom"); -            parcel.mNewUnlock = mKeyPhrase1; +            parcel.mNewUnlock = new ChangeUnlockParcel(mKeyPhrase1);              EditKeyResult result = op.createSecretKeyRing(parcel);              Assert.assertTrue("initial test key creation must succeed", result.success()); @@ -86,7 +87,7 @@ public class PgpEncryptDecryptTest {              parcel.mAddSubKeys.add(new SaveKeyringParcel.SubkeyAdd(                      Algorithm.ELGAMAL, 1024, null, KeyFlags.ENCRYPT_COMMS, 0L));              parcel.mAddUserIds.add("belle"); -            parcel.mNewUnlock = mKeyPhrase2; +            parcel.mNewUnlock = new ChangeUnlockParcel(mKeyPhrase2);              EditKeyResult result = op.createSecretKeyRing(parcel);              Assert.assertTrue("initial test key creation must succeed", result.success()); diff --git a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/PgpKeyOperationTest.java b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/PgpKeyOperationTest.java index 79778c6d0..6fa907520 100644 --- a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/PgpKeyOperationTest.java +++ b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/PgpKeyOperationTest.java @@ -43,6 +43,7 @@ import org.sufficientlysecure.keychain.operations.results.OperationResult.Operat  import org.sufficientlysecure.keychain.operations.results.EditKeyResult;  import org.sufficientlysecure.keychain.service.SaveKeyringParcel;  import org.sufficientlysecure.keychain.service.SaveKeyringParcel.Algorithm; +import org.sufficientlysecure.keychain.service.SaveKeyringParcel.ChangeUnlockParcel;  import org.sufficientlysecure.keychain.service.SaveKeyringParcel.SubkeyAdd;  import org.sufficientlysecure.keychain.service.SaveKeyringParcel.SubkeyChange;  import org.sufficientlysecure.keychain.support.KeyringBuilder; @@ -91,7 +92,7 @@ public class PgpKeyOperationTest {          parcel.mAddUserIds.add("twi");          parcel.mAddUserIds.add("pink"); -        parcel.mNewUnlock = passphrase; +        parcel.mNewUnlock = new ChangeUnlockParcel(passphrase);          PgpKeyOperation op = new PgpKeyOperation(null);          EditKeyResult result = op.createSecretKeyRing(parcel); @@ -127,7 +128,7 @@ public class PgpKeyOperationTest {              parcel.mAddSubKeys.add(new SaveKeyringParcel.SubkeyAdd(                      Algorithm.RSA, new Random().nextInt(256)+255, null, KeyFlags.CERTIFY_OTHER, 0L));              parcel.mAddUserIds.add("shy"); -            parcel.mNewUnlock = passphrase; +            parcel.mNewUnlock = new ChangeUnlockParcel(passphrase);              assertFailure("creating ring with < 512 bytes keysize should fail", parcel,                      LogType.MSG_CR_ERROR_KEYSIZE_512); @@ -138,7 +139,7 @@ public class PgpKeyOperationTest {              parcel.mAddSubKeys.add(new SaveKeyringParcel.SubkeyAdd(                      Algorithm.ELGAMAL, 1024, null, KeyFlags.CERTIFY_OTHER, 0L));              parcel.mAddUserIds.add("shy"); -            parcel.mNewUnlock = passphrase; +            parcel.mNewUnlock = new ChangeUnlockParcel(passphrase);              assertFailure("creating ring with ElGamal master key should fail", parcel,                      LogType.MSG_CR_ERROR_FLAGS_ELGAMAL); @@ -149,7 +150,7 @@ public class PgpKeyOperationTest {              parcel.mAddSubKeys.add(new SaveKeyringParcel.SubkeyAdd(                      Algorithm.RSA, 1024, null, KeyFlags.CERTIFY_OTHER, null));              parcel.mAddUserIds.add("lotus"); -            parcel.mNewUnlock = passphrase; +            parcel.mNewUnlock = new ChangeUnlockParcel(passphrase);              assertFailure("creating master key with null expiry should fail", parcel,                      LogType.MSG_CR_ERROR_NULL_EXPIRY); @@ -160,7 +161,7 @@ public class PgpKeyOperationTest {              parcel.mAddSubKeys.add(new SaveKeyringParcel.SubkeyAdd(                      Algorithm.RSA, 1024, null, KeyFlags.SIGN_DATA, 0L));              parcel.mAddUserIds.add("shy"); -            parcel.mNewUnlock = passphrase; +            parcel.mNewUnlock = new ChangeUnlockParcel(passphrase);              assertFailure("creating ring with non-certifying master key should fail", parcel,                      LogType.MSG_CR_ERROR_NO_CERTIFY); @@ -170,7 +171,7 @@ public class PgpKeyOperationTest {              parcel.reset();              parcel.mAddSubKeys.add(new SaveKeyringParcel.SubkeyAdd(                      Algorithm.RSA, 1024, null, KeyFlags.CERTIFY_OTHER, 0L)); -            parcel.mNewUnlock = passphrase; +            parcel.mNewUnlock = new ChangeUnlockParcel(passphrase);              assertFailure("creating ring without user ids should fail", parcel,                      LogType.MSG_CR_ERROR_NO_USER_ID); @@ -179,7 +180,7 @@ public class PgpKeyOperationTest {          {              parcel.reset();              parcel.mAddUserIds.add("shy"); -            parcel.mNewUnlock = passphrase; +            parcel.mNewUnlock = new ChangeUnlockParcel(passphrase);              assertFailure("creating ring with no master key should fail", parcel,                      LogType.MSG_CR_ERROR_NO_MASTER); @@ -910,7 +911,7 @@ public class PgpKeyOperationTest {      public void testPassphraseChange() throws Exception {          // change passphrase to empty -        parcel.mNewUnlock = ""; +        parcel.mNewUnlock = new ChangeUnlockParcel("");          UncachedKeyRing modified = applyModificationWithChecks(parcel, ring, onlyA, onlyB);          Assert.assertEquals("exactly three packets should have been modified (the secret keys)", @@ -923,7 +924,7 @@ public class PgpKeyOperationTest {          // modify keyring, change to non-empty passphrase          String otherPassphrase = TestingUtils.genPassphrase(true); -        parcel.mNewUnlock = otherPassphrase; +        parcel.mNewUnlock = new ChangeUnlockParcel(otherPassphrase);          modified = applyModificationWithChecks(parcel, modified, onlyA, onlyB, "");          Assert.assertEquals("exactly three packets should have been modified (the secret keys)", @@ -948,7 +949,7 @@ public class PgpKeyOperationTest {                  PacketTags.SECRET_SUBKEY, sKeyNoPassphrase.tag);          String otherPassphrase2 = TestingUtils.genPassphrase(true); -        parcel.mNewUnlock = otherPassphrase2; +        parcel.mNewUnlock = new ChangeUnlockParcel(otherPassphrase2);          {              // if we replace a secret key with one without passphrase              modified = KeyringTestingHelper.removePacket(modified, sKeyNoPassphrase.position); diff --git a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringCanonicalizeTest.java b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringCanonicalizeTest.java index cbdbd0e72..7d8a10ee0 100644 --- a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringCanonicalizeTest.java +++ b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringCanonicalizeTest.java @@ -58,6 +58,7 @@ import org.sufficientlysecure.keychain.service.SaveKeyringParcel;  import org.sufficientlysecure.keychain.service.SaveKeyringParcel.Algorithm;  import org.sufficientlysecure.keychain.operations.results.OperationResult.LogType;  import org.sufficientlysecure.keychain.operations.results.OperationResult.OperationLog; +import org.sufficientlysecure.keychain.service.SaveKeyringParcel.ChangeUnlockParcel;  import org.sufficientlysecure.keychain.support.KeyringTestingHelper;  import org.sufficientlysecure.keychain.support.KeyringTestingHelper.RawPacket; @@ -104,7 +105,7 @@ public class UncachedKeyringCanonicalizeTest {          parcel.mAddUserIds.add("twi");          parcel.mAddUserIds.add("pink");          // passphrase is tested in PgpKeyOperationTest, just use empty here -        parcel.mNewUnlock = ""; +        parcel.mNewUnlock = new ChangeUnlockParcel("");          PgpKeyOperation op = new PgpKeyOperation(null);          EditKeyResult result = op.createSecretKeyRing(parcel); diff --git a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringMergeTest.java b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringMergeTest.java index 006c77fbc..799640d6c 100644 --- a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringMergeTest.java +++ b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringMergeTest.java @@ -36,6 +36,7 @@ import org.sufficientlysecure.keychain.operations.results.OperationResult;  import org.sufficientlysecure.keychain.operations.results.EditKeyResult;  import org.sufficientlysecure.keychain.service.SaveKeyringParcel;  import org.sufficientlysecure.keychain.service.SaveKeyringParcel.Algorithm; +import org.sufficientlysecure.keychain.service.SaveKeyringParcel.ChangeUnlockParcel;  import org.sufficientlysecure.keychain.support.KeyringTestingHelper;  import org.sufficientlysecure.keychain.support.KeyringTestingHelper.RawPacket;  import org.sufficientlysecure.keychain.util.ProgressScaler; @@ -96,7 +97,7 @@ public class UncachedKeyringMergeTest {              parcel.mAddUserIds.add("twi");              parcel.mAddUserIds.add("pink");              // passphrase is tested in PgpKeyOperationTest, just use empty here -            parcel.mNewUnlock = ""; +            parcel.mNewUnlock = new ChangeUnlockParcel("");              PgpKeyOperation op = new PgpKeyOperation(null);              OperationResult.OperationLog log = new OperationResult.OperationLog(); @@ -112,7 +113,7 @@ public class UncachedKeyringMergeTest {              parcel.mAddUserIds.add("shy");              // passphrase is tested in PgpKeyOperationTest, just use empty here -            parcel.mNewUnlock = ""; +            parcel.mNewUnlock = new ChangeUnlockParcel("");              PgpKeyOperation op = new PgpKeyOperation(null);              OperationResult.OperationLog log = new OperationResult.OperationLog(); diff --git a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringTest.java b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringTest.java index d8d825783..34c637abf 100644 --- a/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringTest.java +++ b/OpenKeychain-Test/src/test/java/org/sufficientlysecure/keychain/pgp/UncachedKeyringTest.java @@ -30,6 +30,7 @@ import org.sufficientlysecure.keychain.operations.results.EditKeyResult;  import org.sufficientlysecure.keychain.pgp.exception.PgpGeneralException;  import org.sufficientlysecure.keychain.service.SaveKeyringParcel;  import org.sufficientlysecure.keychain.service.SaveKeyringParcel.Algorithm; +import org.sufficientlysecure.keychain.service.SaveKeyringParcel.ChangeUnlockParcel;  import java.io.ByteArrayInputStream;  import java.io.ByteArrayOutputStream; @@ -57,7 +58,7 @@ public class UncachedKeyringTest {          parcel.mAddUserIds.add("twi");          parcel.mAddUserIds.add("pink");          // passphrase is tested in PgpKeyOperationTest, just use empty here -        parcel.mNewUnlock = ""; +        parcel.mNewUnlock = new ChangeUnlockParcel("");          PgpKeyOperation op = new PgpKeyOperation(null);          EditKeyResult result = op.createSecretKeyRing(parcel); | 
