blob: d431d995291617536279e62198f0f7ef8dd90c15 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
|
#[cfg(test)]
mod sq_packet_dump {
use assert_cmd::Command;
use predicates::prelude::*;
use openpgp::Result;
use sequoia_openpgp as openpgp;
fn artifact(filename: &str) -> String {
format!("tests/data/{}", filename)
}
#[test]
fn session_key_without_prefix() -> Result<()> {
Command::cargo_bin("sq")
.unwrap()
.arg("packet")
.arg("dump")
.args(["--session-key", "1FE820EC21FB5D7E33D83367106D1D3747DCD48E6320C1AEC57EE7D18FC437D4"])
.arg(artifact("messages/rsa.msg.pgp"))
.assert()
.success()
.stdout(predicate::str::contains("Decryption failed").not());
Ok(())
}
#[test]
fn session_key_with_prefix() -> Result<()> {
Command::cargo_bin("sq")
.unwrap()
.arg("packet")
.arg("dump")
.args(["--session-key", "9:1FE820EC21FB5D7E33D83367106D1D3747DCD48E6320C1AEC57EE7D18FC437D4"])
.arg(artifact("messages/rsa.msg.pgp"))
.assert()
.success()
.stdout(predicate::str::contains("Decryption failed").not());
Ok(())
}
#[test]
fn session_key_with_bad_prefix() -> Result<()> {
Command::cargo_bin("sq")
.unwrap()
.arg("packet")
.arg("dump")
.args(["--session-key", "1:1FE820EC21FB5D7E33D83367106D1D3747DCD48E6320C1AEC57EE7D18FC437D4"])
.arg(artifact("messages/rsa.msg.pgp"))
.assert()
.success()
.stdout(predicate::str::contains("Indicated Symmetric algo: IDEA"))
.stdout(predicate::str::contains("Decryption failed"));
Ok(())
}
#[test]
fn session_key_wrong_length_without_prefix() -> Result<()> {
// too short
Command::cargo_bin("sq")
.unwrap()
.arg("packet")
.arg("dump")
.args(["--session-key", "1FE820EC21FB5D7E33D83367106D1D3747DCD48E6320C1AEC57EE7D18FC437"])
.arg(artifact("messages/rsa.msg.pgp"))
.assert()
.success()
.stdout(predicate::str::contains("Decryption failed"));
// too long
Command::cargo_bin("sq")
.unwrap()
.arg("packet")
.arg("dump")
.args(["--session-key", "1FE820EC21FB5D7E33D83367106D1D3747DCD48E6320C1AEC57EE7D18FC437D4AB"])
.arg(artifact("messages/rsa.msg.pgp"))
.assert()
.success()
.stdout(predicate::str::contains("Decryption failed"));
Ok(())
}
#[test]
fn session_key_wrong_length_with_prefix() -> Result<()> {
// too short
Command::cargo_bin("sq")
.unwrap()
.arg("packet")
.arg("dump")
.args(["--session-key", "1:1FE820EC21FB5D7E33D83367106D1D3747DCD48E6320C1AEC57EE7D18FC437"])
.arg(artifact("messages/rsa.msg.pgp"))
.assert()
.success()
.stdout(predicate::str::contains("Decryption failed"));
// too long
Command::cargo_bin("sq")
.unwrap()
.arg("packet")
.arg("dump")
.args(["--session-key", "1:1FE820EC21FB5D7E33D83367106D1D3747DCD48E6320C1AEC57EE7D18FC437D4AB"])
.arg(artifact("messages/rsa.msg.pgp"))
.assert()
.success()
.stdout(predicate::str::contains("Decryption failed"));
Ok(())
}
#[test]
fn session_key_wrong_key_with_prefix() -> Result<()> {
Command::cargo_bin("sq")
.unwrap()
.arg("packet")
.arg("dump")
.args(["--session-key", "9:BB9CCB8EDE22DC222C83BD1C63AEB97335DDC7B696DB171BD16EAA5784CC0478"])
.arg(artifact("messages/rsa.msg.pgp"))
.assert()
.success()
.stdout(predicate::str::contains("Decryption failed"));
Ok(())
}
}
|