mirror of
https://github.com/pgpainless/pgpainless.git
synced 2025-09-10 18:59:39 +02:00
Remove deprecated OpenPgpMetadata class
This commit is contained in:
parent
8c25b59c8b
commit
1a701333e3
19 changed files with 123 additions and 518 deletions
|
@ -130,6 +130,6 @@ public class OnePassSignatureVerificationWithPartialLengthLiteralDataRegressionT
|
|||
|
||||
Streams.pipeAll(decryptionStream, out);
|
||||
decryptionStream.close();
|
||||
decryptionStream.getResult();
|
||||
decryptionStream.getMetadata();
|
||||
}
|
||||
}
|
||||
|
|
|
@ -122,9 +122,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void noInputEncodingBinaryDataBinarySig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.BINARY, false);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -136,9 +136,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void noInputEncodingBinaryDataTextSig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.BINARY, false);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -150,9 +150,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void noInputEncodingTextDataBinarySig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.TEXT, false);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -164,9 +164,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void noInputEncodingTextDataTextSig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.TEXT, false);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -178,9 +178,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void noInputEncodingUtf8DataBinarySig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.UTF8, false);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -192,9 +192,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void noInputEncodingUtf8DataTextSig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.UTF8, false);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -207,9 +207,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void inputEncodingBinaryDataBinarySig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.BINARY, true);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -221,9 +221,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void inputEncodingBinaryDataTextSig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.BINARY, true);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -235,9 +235,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void inputEncodingTextDataBinarySig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.TEXT, true);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -249,9 +249,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void inputEncodingTextDataTextSig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.TEXT, true);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -263,9 +263,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void inputEncodingUtf8DataBinarySig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.BINARY_DOCUMENT, StreamEncoding.UTF8, true);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -277,9 +277,9 @@ public class CanonicalizedDataEncryptionTest {
|
|||
@Test
|
||||
public void inputEncodingUtf8DataTextSig() throws PGPException, IOException {
|
||||
String msg = encryptAndSign(message, DocumentSignatureType.CANONICAL_TEXT_DOCUMENT, StreamEncoding.UTF8, true);
|
||||
OpenPgpMetadata metadata = decryptAndVerify(msg);
|
||||
MessageMetadata metadata = decryptAndVerify(msg);
|
||||
|
||||
if (!metadata.isVerified()) {
|
||||
if (!metadata.isVerifiedSigned()) {
|
||||
// CHECKSTYLE:OFF
|
||||
System.out.println("Not verified. Session-Key: " + metadata.getSessionKey());
|
||||
System.out.println(msg);
|
||||
|
@ -360,7 +360,7 @@ public class CanonicalizedDataEncryptionTest {
|
|||
return msg;
|
||||
}
|
||||
|
||||
private OpenPgpMetadata decryptAndVerify(String msg) throws PGPException, IOException {
|
||||
private MessageMetadata decryptAndVerify(String msg) throws PGPException, IOException {
|
||||
ByteArrayInputStream in = new ByteArrayInputStream(msg.getBytes(StandardCharsets.UTF_8));
|
||||
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify()
|
||||
.onInputStream(in)
|
||||
|
@ -371,7 +371,7 @@ public class CanonicalizedDataEncryptionTest {
|
|||
Streams.drain(decryptionStream);
|
||||
decryptionStream.close();
|
||||
|
||||
return decryptionStream.getResult();
|
||||
return decryptionStream.getMetadata();
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -439,8 +439,8 @@ public class CanonicalizedDataEncryptionTest {
|
|||
|
||||
Streams.pipeAll(decryptionStream, decrypted);
|
||||
decryptionStream.close();
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
assertTrue(metadata.isVerified(), "Not verified! Sig Type: " + sigType + " StreamEncoding: " + streamEncoding);
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
assertTrue(metadata.isVerifiedSigned(), "Not verified! Sig Type: " + sigType + " StreamEncoding: " + streamEncoding);
|
||||
|
||||
assertArrayEquals(msg, decrypted.toByteArray());
|
||||
}
|
||||
|
|
|
@ -96,11 +96,11 @@ public class CleartextSignatureVerificationTest {
|
|||
Streams.pipeAll(decryptionStream, out);
|
||||
decryptionStream.close();
|
||||
|
||||
OpenPgpMetadata result = decryptionStream.getResult();
|
||||
assertTrue(result.isVerified());
|
||||
assertTrue(result.isCleartextSigned());
|
||||
MessageMetadata result = decryptionStream.getMetadata();
|
||||
assertTrue(result.isVerifiedSigned());
|
||||
assertTrue(result.isUsingCleartextSignatureFramework());
|
||||
|
||||
PGPSignature signature = result.getVerifiedSignatures().values().iterator().next();
|
||||
PGPSignature signature = result.getVerifiedSignatures().iterator().next().getSignature();
|
||||
|
||||
assertEquals(signature.getKeyID(), signingKeys.getPublicKey().getKeyID());
|
||||
assertArrayEquals(MESSAGE_BODY, out.toByteArray());
|
||||
|
@ -125,10 +125,10 @@ public class CleartextSignatureVerificationTest {
|
|||
Streams.pipeAll(decryptionStream, out);
|
||||
decryptionStream.close();
|
||||
|
||||
OpenPgpMetadata result = decryptionStream.getResult();
|
||||
assertTrue(result.isVerified());
|
||||
MessageMetadata result = decryptionStream.getMetadata();
|
||||
assertTrue(result.isVerifiedSigned());
|
||||
|
||||
PGPSignature signature = result.getVerifiedSignatures().values().iterator().next();
|
||||
PGPSignature signature = result.getVerifiedSignatures().iterator().next().getSignature();
|
||||
|
||||
assertEquals(signature.getKeyID(), signingKeys.getPublicKey().getKeyID());
|
||||
FileInputStream fileIn = new FileInputStream(file);
|
||||
|
@ -178,7 +178,7 @@ public class CleartextSignatureVerificationTest {
|
|||
Streams.pipeAll(decryptionStream, out);
|
||||
decryptionStream.close();
|
||||
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
assertEquals(1, metadata.getVerifiedSignatures().size());
|
||||
}
|
||||
|
||||
|
@ -210,8 +210,8 @@ public class CleartextSignatureVerificationTest {
|
|||
Streams.pipeAll(verificationStream, msgOut);
|
||||
verificationStream.close();
|
||||
|
||||
OpenPgpMetadata metadata = verificationStream.getResult();
|
||||
assertTrue(metadata.isVerified());
|
||||
MessageMetadata metadata = verificationStream.getMetadata();
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
}
|
||||
|
||||
@Test
|
||||
|
|
|
@ -64,7 +64,7 @@ public class DecryptAndVerifyMessageTest {
|
|||
Streams.pipeAll(decryptor, toPlain);
|
||||
decryptor.close();
|
||||
toPlain.close();
|
||||
OpenPgpMetadata metadata = decryptor.getResult();
|
||||
MessageMetadata metadata = decryptor.getMetadata();
|
||||
|
||||
byte[] expected = TestKeys.TEST_MESSAGE_01_PLAIN.getBytes(UTF8);
|
||||
byte[] actual = toPlain.toByteArray();
|
||||
|
@ -72,14 +72,13 @@ public class DecryptAndVerifyMessageTest {
|
|||
assertArrayEquals(expected, actual);
|
||||
|
||||
assertTrue(metadata.isEncrypted());
|
||||
assertTrue(metadata.isSigned());
|
||||
assertFalse(metadata.isCleartextSigned());
|
||||
assertTrue(metadata.isVerified());
|
||||
assertFalse(metadata.isUsingCleartextSignatureFramework());
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
assertEquals(CompressionAlgorithm.ZLIB, metadata.getCompressionAlgorithm());
|
||||
assertEquals(SymmetricKeyAlgorithm.AES_256, metadata.getSymmetricKeyAlgorithm());
|
||||
assertEquals(1, metadata.getSignatures().size());
|
||||
assertEquals(SymmetricKeyAlgorithm.AES_256, metadata.getEncryptionAlgorithm());
|
||||
assertEquals(1, metadata.getVerifiedSignatures().size());
|
||||
assertTrue(metadata.containsVerifiedSignatureFrom(TestKeys.JULIET_FINGERPRINT));
|
||||
assertEquals(1, metadata.getVerifiedSignatures().size());
|
||||
assertTrue(metadata.isVerifiedSignedBy(TestKeys.JULIET_FINGERPRINT));
|
||||
assertEquals(new SubkeyIdentifier(TestKeys.JULIET_FINGERPRINT), metadata.getDecryptionKey());
|
||||
}
|
||||
|
||||
|
@ -104,7 +103,7 @@ public class DecryptAndVerifyMessageTest {
|
|||
|
||||
decryptor.close();
|
||||
toPlain.close();
|
||||
OpenPgpMetadata metadata = decryptor.getResult();
|
||||
MessageMetadata metadata = decryptor.getMetadata();
|
||||
|
||||
byte[] expected = TestKeys.TEST_MESSAGE_01_PLAIN.getBytes(UTF8);
|
||||
byte[] actual = toPlain.toByteArray();
|
||||
|
@ -112,14 +111,13 @@ public class DecryptAndVerifyMessageTest {
|
|||
assertArrayEquals(expected, actual);
|
||||
|
||||
assertTrue(metadata.isEncrypted());
|
||||
assertTrue(metadata.isSigned());
|
||||
assertFalse(metadata.isCleartextSigned());
|
||||
assertTrue(metadata.isVerified());
|
||||
assertFalse(metadata.isUsingCleartextSignatureFramework());
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
assertEquals(CompressionAlgorithm.ZLIB, metadata.getCompressionAlgorithm());
|
||||
assertEquals(SymmetricKeyAlgorithm.AES_256, metadata.getSymmetricKeyAlgorithm());
|
||||
assertEquals(1, metadata.getSignatures().size());
|
||||
assertEquals(SymmetricKeyAlgorithm.AES_256, metadata.getEncryptionAlgorithm());
|
||||
assertEquals(1, metadata.getVerifiedSignatures().size());
|
||||
assertTrue(metadata.containsVerifiedSignatureFrom(TestKeys.JULIET_FINGERPRINT));
|
||||
assertEquals(1, metadata.getVerifiedSignatures().size());
|
||||
assertTrue(metadata.isVerifiedSignedBy(TestKeys.JULIET_FINGERPRINT));
|
||||
assertEquals(new SubkeyIdentifier(TestKeys.JULIET_FINGERPRINT), metadata.getDecryptionKey());
|
||||
}
|
||||
|
||||
|
|
|
@ -139,8 +139,9 @@ public class DecryptHiddenRecipientMessageTest {
|
|||
Streams.pipeAll(decryptionStream, out);
|
||||
decryptionStream.close();
|
||||
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
assertEquals(0, metadata.getRecipientKeyIds().size());
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
assertEquals(1, metadata.getRecipientKeyIds().size());
|
||||
assertEquals(0L, metadata.getRecipientKeyIds().get(0));
|
||||
|
||||
KeyRingInfo info = new KeyRingInfo(secretKeys);
|
||||
List<PGPPublicKey> encryptionKeys = info.getEncryptionSubkeys(EncryptionPurpose.ANY);
|
||||
|
|
|
@ -104,9 +104,9 @@ public class IgnoreUnknownSignatureVersionsTest {
|
|||
"ou1uiXJaDzZ6wQfB\n" +
|
||||
"=uHRc\n" +
|
||||
"-----END PGP SIGNATURE-----\n";
|
||||
OpenPgpMetadata metadata = verifySignature(cert, BASE_CASE);
|
||||
MessageMetadata metadata = verifySignature(cert, BASE_CASE);
|
||||
|
||||
assertTrue(metadata.isVerified());
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -137,9 +137,9 @@ public class IgnoreUnknownSignatureVersionsTest {
|
|||
"ou1uiXJaDzZ6wQfB\n" +
|
||||
"=/JL1\n" +
|
||||
"-----END PGP SIGNATURE-----\n";
|
||||
OpenPgpMetadata metadata = verifySignature(cert, SIG4SIG23);
|
||||
MessageMetadata metadata = verifySignature(cert, SIG4SIG23);
|
||||
|
||||
assertTrue(metadata.isVerified());
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -170,12 +170,12 @@ public class IgnoreUnknownSignatureVersionsTest {
|
|||
"ou1uiXJaDzZ6wQfB\n" +
|
||||
"=Yc8d\n" +
|
||||
"-----END PGP SIGNATURE-----\n";
|
||||
OpenPgpMetadata metadata = verifySignature(cert, SIG23SIG4);
|
||||
MessageMetadata metadata = verifySignature(cert, SIG23SIG4);
|
||||
|
||||
assertTrue(metadata.isVerified());
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
}
|
||||
|
||||
private OpenPgpMetadata verifySignature(PGPPublicKeyRing cert, String BASE_CASE) throws PGPException, IOException {
|
||||
private MessageMetadata verifySignature(PGPPublicKeyRing cert, String BASE_CASE) throws PGPException, IOException {
|
||||
DecryptionStream decryptionStream = PGPainless.decryptAndOrVerify().onInputStream(new ByteArrayInputStream(message.getBytes(StandardCharsets.UTF_8)))
|
||||
.withOptions(new ConsumerOptions()
|
||||
.addVerificationCert(cert)
|
||||
|
@ -184,6 +184,6 @@ public class IgnoreUnknownSignatureVersionsTest {
|
|||
Streams.drain(decryptionStream);
|
||||
decryptionStream.close();
|
||||
|
||||
return decryptionStream.getResult();
|
||||
return decryptionStream.getMetadata();
|
||||
}
|
||||
}
|
||||
|
|
|
@ -184,7 +184,7 @@ public class PreventDecryptionUsingNonEncryptionKeyTest {
|
|||
|
||||
Streams.drain(decryptionStream);
|
||||
decryptionStream.close();
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
|
||||
assertEquals(new SubkeyIdentifier(secretKeys, secretKeys.getPublicKey().getKeyID()), metadata.getDecryptionKey());
|
||||
}
|
||||
|
@ -200,7 +200,7 @@ public class PreventDecryptionUsingNonEncryptionKeyTest {
|
|||
|
||||
Streams.drain(decryptionStream);
|
||||
decryptionStream.close();
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
|
||||
assertEquals(new SubkeyIdentifier(secretKeys, secretKeys.getPublicKey().getKeyID()), metadata.getDecryptionKey());
|
||||
}
|
||||
|
|
|
@ -39,10 +39,10 @@ public class SignedMessageVerificationWithoutCertIsStillSignedTest {
|
|||
Streams.pipeAll(verificationStream, out);
|
||||
verificationStream.close();
|
||||
|
||||
OpenPgpMetadata metadata = verificationStream.getResult();
|
||||
MessageMetadata metadata = verificationStream.getMetadata();
|
||||
|
||||
assertFalse(metadata.isCleartextSigned());
|
||||
assertTrue(metadata.isSigned(), "Message is signed, even though we miss the verification cert.");
|
||||
assertFalse(metadata.isVerified(), "Message is not verified because we lack the verification cert.");
|
||||
assertFalse(metadata.isUsingCleartextSignatureFramework());
|
||||
assertTrue(metadata.hasRejectedSignatures(), "Message is signed, even though we miss the verification cert.");
|
||||
assertFalse(metadata.isVerifiedSigned(), "Message is not verified because we lack the verification cert.");
|
||||
}
|
||||
}
|
||||
|
|
|
@ -65,8 +65,8 @@ public class VerifyDetachedSignatureTest {
|
|||
|
||||
Streams.drain(verifier);
|
||||
verifier.close();
|
||||
OpenPgpMetadata metadata = verifier.getResult();
|
||||
assertTrue(metadata.isVerified());
|
||||
MessageMetadata metadata = verifier.getMetadata();
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -140,7 +140,7 @@ public class VerifyDetachedSignatureTest {
|
|||
|
||||
Streams.drain(verifier);
|
||||
verifier.close();
|
||||
OpenPgpMetadata metadata = verifier.getResult();
|
||||
assertTrue(metadata.isVerified());
|
||||
MessageMetadata metadata = verifier.getMetadata();
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
}
|
||||
}
|
||||
|
|
|
@ -68,8 +68,8 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
.onInputStream(new ByteArrayInputStream(inlineSigned))
|
||||
.withOptions(options);
|
||||
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.getVerifiedSignatures().containsKey(new SubkeyIdentifier(certificate)));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.isVerifiedSignedBy(certificate));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -81,8 +81,8 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
.onInputStream(new ByteArrayInputStream(data))
|
||||
.withOptions(options);
|
||||
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.containsVerifiedSignatureFrom(certificate));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.isVerifiedSignedBy(certificate));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -93,8 +93,8 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
DecryptionStream verifier = PGPainless.decryptAndOrVerify()
|
||||
.onInputStream(new ByteArrayInputStream(inlineSigned))
|
||||
.withOptions(options);
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.getVerifiedSignatures().containsKey(signingKey));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.isVerifiedSignedBy(certificate));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -106,8 +106,8 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
DecryptionStream verifier = PGPainless.decryptAndOrVerify()
|
||||
.onInputStream(new ByteArrayInputStream(data))
|
||||
.withOptions(options);
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.getVerifiedSignatures().containsKey(signingKey));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.isVerifiedSignedBy(certificate));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -118,8 +118,8 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
DecryptionStream verifier = PGPainless.decryptAndOrVerify()
|
||||
.onInputStream(new ByteArrayInputStream(inlineSigned))
|
||||
.withOptions(options);
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertFalse(metadata.getVerifiedSignatures().containsKey(signingKey));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertFalse(metadata.isVerifiedInlineSignedBy(certificate));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -131,8 +131,8 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
DecryptionStream verifier = PGPainless.decryptAndOrVerify()
|
||||
.onInputStream(new ByteArrayInputStream(data))
|
||||
.withOptions(options);
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertFalse(metadata.getVerifiedSignatures().containsKey(signingKey));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertFalse(metadata.isVerifiedSignedBy(certificate));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -143,8 +143,8 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
DecryptionStream verifier = PGPainless.decryptAndOrVerify()
|
||||
.onInputStream(new ByteArrayInputStream(inlineSigned))
|
||||
.withOptions(options);
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.getVerifiedSignatures().containsKey(signingKey));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.isVerifiedSignedBy(certificate));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -156,8 +156,8 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
DecryptionStream verifier = PGPainless.decryptAndOrVerify()
|
||||
.onInputStream(new ByteArrayInputStream(data))
|
||||
.withOptions(options);
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.getVerifiedSignatures().containsKey(signingKey));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.isVerifiedSignedBy(certificate));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -168,8 +168,8 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
DecryptionStream verifier = PGPainless.decryptAndOrVerify()
|
||||
.onInputStream(new ByteArrayInputStream(inlineSigned))
|
||||
.withOptions(options);
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertFalse(metadata.getVerifiedSignatures().containsKey(signingKey));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertFalse(metadata.isVerifiedSignedBy(certificate));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -181,13 +181,13 @@ public class VerifyNotBeforeNotAfterTest {
|
|||
DecryptionStream verifier = PGPainless.decryptAndOrVerify()
|
||||
.onInputStream(new ByteArrayInputStream(data))
|
||||
.withOptions(options);
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertFalse(metadata.getVerifiedSignatures().containsKey(signingKey));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertFalse(metadata.isVerifiedSignedBy(certificate));
|
||||
}
|
||||
|
||||
private OpenPgpMetadata processSignedData(DecryptionStream verifier) throws IOException {
|
||||
private MessageMetadata processSignedData(DecryptionStream verifier) throws IOException {
|
||||
Streams.drain(verifier);
|
||||
verifier.close();
|
||||
return verifier.getResult();
|
||||
return verifier.getMetadata();
|
||||
}
|
||||
}
|
||||
|
|
|
@ -43,8 +43,8 @@ class VerifyVersion3SignaturePacketTest {
|
|||
.onInputStream(new ByteArrayInputStream(DATA))
|
||||
.withOptions(options);
|
||||
|
||||
OpenPgpMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.containsVerifiedSignatureFrom(TestKeys.getEmilPublicKeyRing()));
|
||||
MessageMetadata metadata = processSignedData(verifier);
|
||||
assertTrue(metadata.isVerifiedSignedBy(TestKeys.getEmilPublicKeyRing()));
|
||||
}
|
||||
|
||||
private static PGPSignature generateV3Signature() throws IOException, PGPException {
|
||||
|
@ -61,9 +61,9 @@ class VerifyVersion3SignaturePacketTest {
|
|||
return signatureGenerator.generate();
|
||||
}
|
||||
|
||||
private OpenPgpMetadata processSignedData(DecryptionStream verifier) throws IOException {
|
||||
private MessageMetadata processSignedData(DecryptionStream verifier) throws IOException {
|
||||
Streams.drain(verifier);
|
||||
verifier.close();
|
||||
return verifier.getResult();
|
||||
return verifier.getMetadata();
|
||||
}
|
||||
}
|
||||
|
|
|
@ -74,7 +74,7 @@ public class VerifyWithMissingPublicKeyCallbackTest {
|
|||
verificationStream.close();
|
||||
|
||||
assertArrayEquals(msg.getBytes(StandardCharsets.UTF_8), plainOut.toByteArray());
|
||||
OpenPgpMetadata metadata = verificationStream.getResult();
|
||||
assertTrue(metadata.containsVerifiedSignatureFrom(signingPubKeys));
|
||||
MessageMetadata metadata = verificationStream.getMetadata();
|
||||
assertTrue(metadata.isVerifiedSignedBy(signingPubKeys));
|
||||
}
|
||||
}
|
||||
|
|
|
@ -102,12 +102,12 @@ public class WrongSignerUserIdTest {
|
|||
Streams.pipeAll(decryptionStream, out);
|
||||
|
||||
decryptionStream.close();
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
|
||||
if (expectSuccessfulVerification) {
|
||||
assertTrue(metadata.isVerified());
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
} else {
|
||||
assertFalse(metadata.isVerified());
|
||||
assertFalse(metadata.isVerifiedSigned());
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -33,7 +33,7 @@ import org.pgpainless.algorithm.KeyFlag;
|
|||
import org.pgpainless.algorithm.SymmetricKeyAlgorithm;
|
||||
import org.pgpainless.decryption_verification.ConsumerOptions;
|
||||
import org.pgpainless.decryption_verification.DecryptionStream;
|
||||
import org.pgpainless.decryption_verification.OpenPgpMetadata;
|
||||
import org.pgpainless.decryption_verification.MessageMetadata;
|
||||
import org.pgpainless.exception.KeyException;
|
||||
import org.pgpainless.key.SubkeyIdentifier;
|
||||
import org.pgpainless.key.TestKeys;
|
||||
|
@ -185,11 +185,10 @@ public class EncryptDecryptTest {
|
|||
decryptor.close();
|
||||
|
||||
assertArrayEquals(secretMessage, decryptedSecretMessage.toByteArray());
|
||||
OpenPgpMetadata result = decryptor.getResult();
|
||||
assertTrue(result.containsVerifiedSignatureFrom(senderPub));
|
||||
assertTrue(result.isSigned());
|
||||
MessageMetadata result = decryptor.getMetadata();
|
||||
assertTrue(result.isVerifiedSignedBy(senderPub));
|
||||
assertTrue(result.isEncrypted());
|
||||
assertTrue(result.isVerified());
|
||||
assertTrue(result.isVerifiedSigned());
|
||||
}
|
||||
|
||||
@TestTemplate
|
||||
|
@ -233,7 +232,7 @@ public class EncryptDecryptTest {
|
|||
Streams.pipeAll(verifier, dummyOut);
|
||||
verifier.close();
|
||||
|
||||
OpenPgpMetadata decryptionResult = verifier.getResult();
|
||||
MessageMetadata decryptionResult = verifier.getMetadata();
|
||||
assertFalse(decryptionResult.getVerifiedSignatures().isEmpty());
|
||||
}
|
||||
|
||||
|
@ -263,7 +262,7 @@ public class EncryptDecryptTest {
|
|||
Streams.pipeAll(verifier, signOut);
|
||||
verifier.close();
|
||||
|
||||
OpenPgpMetadata metadata = verifier.getResult();
|
||||
MessageMetadata metadata = verifier.getMetadata();
|
||||
assertFalse(metadata.getVerifiedSignatures().isEmpty());
|
||||
}
|
||||
|
||||
|
|
|
@ -34,7 +34,7 @@ import org.pgpainless.algorithm.HashAlgorithm;
|
|||
import org.pgpainless.algorithm.KeyFlag;
|
||||
import org.pgpainless.decryption_verification.ConsumerOptions;
|
||||
import org.pgpainless.decryption_verification.DecryptionStream;
|
||||
import org.pgpainless.decryption_verification.OpenPgpMetadata;
|
||||
import org.pgpainless.decryption_verification.MessageMetadata;
|
||||
import org.pgpainless.exception.KeyException;
|
||||
import org.pgpainless.key.SubkeyIdentifier;
|
||||
import org.pgpainless.key.TestKeys;
|
||||
|
@ -106,12 +106,11 @@ public class SigningTest {
|
|||
Streams.pipeAll(decryptionStream, plaintextOut);
|
||||
decryptionStream.close();
|
||||
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
assertTrue(metadata.isEncrypted());
|
||||
assertTrue(metadata.isSigned());
|
||||
assertTrue(metadata.isVerified());
|
||||
assertTrue(metadata.containsVerifiedSignatureFrom(KeyRingUtils.publicKeyRingFrom(cryptieKeys)));
|
||||
assertFalse(metadata.containsVerifiedSignatureFrom(julietKeys));
|
||||
assertTrue(metadata.isVerifiedSigned());
|
||||
assertTrue(metadata.isVerifiedSignedBy(KeyRingUtils.publicKeyRingFrom(cryptieKeys)));
|
||||
assertFalse(metadata.isVerifiedSignedBy(julietKeys));
|
||||
}
|
||||
|
||||
@TestTemplate
|
||||
|
|
|
@ -14,7 +14,7 @@ import org.pgpainless.PGPainless;
|
|||
import org.pgpainless.algorithm.KeyFlag;
|
||||
import org.pgpainless.decryption_verification.ConsumerOptions;
|
||||
import org.pgpainless.decryption_verification.DecryptionStream;
|
||||
import org.pgpainless.decryption_verification.OpenPgpMetadata;
|
||||
import org.pgpainless.decryption_verification.MessageMetadata;
|
||||
import org.pgpainless.decryption_verification.SignatureVerification;
|
||||
import org.pgpainless.encryption_signing.EncryptionOptions;
|
||||
import org.pgpainless.encryption_signing.EncryptionResult;
|
||||
|
@ -88,10 +88,10 @@ public class GenerateKeyWithoutUserIdTest {
|
|||
Streams.pipeAll(decryptionStream, plaintextOut);
|
||||
decryptionStream.close();
|
||||
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
|
||||
assertTrue(metadata.containsVerifiedSignatureFrom(certificate),
|
||||
failuresToString(metadata.getInvalidInbandSignatures()));
|
||||
assertTrue(metadata.isVerifiedSignedBy(certificate),
|
||||
failuresToString(metadata.getRejectedInlineSignatures()));
|
||||
assertTrue(metadata.isEncrypted());
|
||||
}
|
||||
|
||||
|
|
|
@ -24,7 +24,7 @@ import org.junit.jupiter.api.Test;
|
|||
import org.pgpainless.PGPainless;
|
||||
import org.pgpainless.decryption_verification.ConsumerOptions;
|
||||
import org.pgpainless.decryption_verification.DecryptionStream;
|
||||
import org.pgpainless.decryption_verification.OpenPgpMetadata;
|
||||
import org.pgpainless.decryption_verification.MessageMetadata;
|
||||
import org.pgpainless.key.OpenPgpV4Fingerprint;
|
||||
import org.pgpainless.key.util.KeyRingUtils;
|
||||
|
||||
|
@ -154,8 +154,8 @@ public class IgnoreMarkerPacketsTest {
|
|||
Streams.pipeAll(decryptionStream, outputStream);
|
||||
|
||||
decryptionStream.close();
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
assertTrue(metadata.containsVerifiedSignatureFrom(new OpenPgpV4Fingerprint("D1A66E1A23B182C9980F788CFBFCC82A015E7330")));
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
assertTrue(metadata.isVerifiedSignedBy(new OpenPgpV4Fingerprint("D1A66E1A23B182C9980F788CFBFCC82A015E7330")));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -204,8 +204,8 @@ public class IgnoreMarkerPacketsTest {
|
|||
|
||||
decryptionStream.close();
|
||||
assertArrayEquals(data.getBytes(StandardCharsets.UTF_8), outputStream.toByteArray());
|
||||
OpenPgpMetadata metadata = decryptionStream.getResult();
|
||||
assertTrue(metadata.containsVerifiedSignatureFrom(new OpenPgpV4Fingerprint("D1A66E1A23B182C9980F788CFBFCC82A015E7330")));
|
||||
MessageMetadata metadata = decryptionStream.getMetadata();
|
||||
assertTrue(metadata.isVerifiedSignedBy(new OpenPgpV4Fingerprint("D1A66E1A23B182C9980F788CFBFCC82A015E7330")));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue