summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorWiktor Kwapisiewicz <wiktor@metacode.biz>2022-10-03 11:49:32 +0200
committerWiktor Kwapisiewicz <wiktor@metacode.biz>2022-12-08 12:03:01 +0100
commit199fc50bece20caf1f36f328c0c18ca3b8f4ad62 (patch)
treeb12fb8aa0854d690a73064df0415147dcaf7cad0
parent4c8e34d26755fbb6feccfa1e3226853cac421ed4 (diff)
openpgp: Adjust error messages on decryption failures.
-rw-r--r--openpgp/src/packet/key.rs3
-rw-r--r--openpgp/src/packet/pkesk.rs9
2 files changed, 8 insertions, 4 deletions
diff --git a/openpgp/src/packet/key.rs b/openpgp/src/packet/key.rs
index 305e4ba2..593b4fe6 100644
--- a/openpgp/src/packet/key.rs
+++ b/openpgp/src/packet/key.rs
@@ -1924,7 +1924,8 @@ mod tests {
let sk = SessionKey::new(cipher.key_size().unwrap());
let pkesk = PKESK3::for_recipient(cipher, &sk, &key).unwrap();
- let (cipher_, sk_) = pkesk.decrypt(&mut keypair, None).unwrap();
+ let (cipher_, sk_) = pkesk.decrypt(&mut keypair, None)
+ .expect("keypair should be able to decrypt PKESK");
assert_eq!(cipher, cipher_);
assert_eq!(sk, sk_);
diff --git a/openpgp/src/packet/pkesk.rs b/openpgp/src/packet/pkesk.rs
index ac0b7932..ff29ca65 100644
--- a/openpgp/src/packet/pkesk.rs
+++ b/openpgp/src/packet/pkesk.rs
@@ -309,7 +309,8 @@ mod tests {
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
- let plain = pkesk.decrypt(&mut keypair, None).unwrap();
+ let plain = pkesk.decrypt(&mut keypair, None)
+ .expect("ECDH decryption using P-256 key should work");
let plain_ =
pkesk.decrypt(&mut keypair, Some(SymmetricAlgorithm::AES256))
.unwrap();
@@ -338,7 +339,8 @@ mod tests {
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
- let plain = pkesk.decrypt(&mut keypair, None).unwrap();
+ let plain = pkesk.decrypt(&mut keypair, None)
+ .expect("ECDH decryption using P-384 key should work");
let plain_ =
pkesk.decrypt(&mut keypair, Some(SymmetricAlgorithm::AES256))
.unwrap();
@@ -367,7 +369,8 @@ mod tests {
let pkesk: &PKESK =
pile.descendants().next().unwrap().downcast_ref().unwrap();
- let plain = pkesk.decrypt(&mut keypair, None).unwrap();
+ let plain = pkesk.decrypt(&mut keypair, None)
+ .expect("ECDH decryption using P-521 key should work");
let plain_ =
pkesk.decrypt(&mut keypair, Some(SymmetricAlgorithm::AES256))
.unwrap();