Blame lang/python/tests/t-quick-subkey-creation.py

Packit d7e8d0
#!/usr/bin/env python
Packit d7e8d0
Packit d7e8d0
# Copyright (C) 2017 g10 Code GmbH
Packit d7e8d0
#
Packit d7e8d0
# This file is part of GPGME.
Packit d7e8d0
#
Packit d7e8d0
# GPGME is free software; you can redistribute it and/or modify it
Packit d7e8d0
# under the terms of the GNU General Public License as published by
Packit d7e8d0
# the Free Software Foundation; either version 2 of the License, or
Packit d7e8d0
# (at your option) any later version.
Packit d7e8d0
#
Packit d7e8d0
# GPGME is distributed in the hope that it will be useful, but WITHOUT
Packit d7e8d0
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
Packit d7e8d0
# or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General
Packit d7e8d0
# Public License for more details.
Packit d7e8d0
#
Packit d7e8d0
# You should have received a copy of the GNU Lesser General Public
Packit d7e8d0
# License along with this program; if not, see <http://www.gnu.org/licenses/>.
Packit d7e8d0
Packit d7e8d0
from __future__ import absolute_import, print_function, unicode_literals
Packit d7e8d0
del absolute_import, print_function, unicode_literals
Packit d7e8d0
Packit d7e8d0
import gpg
Packit d7e8d0
import itertools
Packit d7e8d0
import time
Packit d7e8d0
Packit d7e8d0
import support
Packit d7e8d0
Packit d7e8d0
alpha = "Alpha <alpha@invalid.example.net>"
Packit d7e8d0
bravo = "Bravo <bravo@invalid.example.net>"
Packit d7e8d0
Packit d7e8d0
with support.EphemeralContext() as ctx:
Packit d7e8d0
    res = ctx.create_key(alpha, certify=True)
Packit d7e8d0
    keys = list(ctx.keylist())
Packit d7e8d0
    assert len(keys) == 1, "Weird number of keys created"
Packit d7e8d0
    key = keys[0]
Packit d7e8d0
    assert key.fpr == res.fpr
Packit d7e8d0
    assert len(key.subkeys) == 1, "Expected one primary key and no subkeys"
Packit d7e8d0
Packit d7e8d0
    def get_subkey(fpr):
Packit d7e8d0
        k = ctx.get_key(fpr)
Packit d7e8d0
        for sk in k.subkeys:
Packit d7e8d0
            if sk.fpr == fpr:
Packit d7e8d0
                return sk
Packit d7e8d0
        return None
Packit d7e8d0
Packit d7e8d0
    # Check gpg.constants.create.NOEXPIRE...
Packit d7e8d0
    res = ctx.create_subkey(key, expires=False)
Packit d7e8d0
    subkey = get_subkey(res.fpr)
Packit d7e8d0
    assert subkey.expires == 0, "Expected subkey not to expire"
Packit d7e8d0
    assert subkey.can_encrypt, \
Packit d7e8d0
        "Default subkey capabilities do not include encryption"
Packit d7e8d0
Packit d7e8d0
    t = 2 * 24 * 60 * 60
Packit d7e8d0
    slack = 5 * 60
Packit d7e8d0
    res = ctx.create_subkey(key, expires_in=t)
Packit d7e8d0
    subkey = get_subkey(res.fpr)
Packit d7e8d0
    assert abs(time.time() + t - subkey.expires) < slack, \
Packit d7e8d0
        "subkeys expiration time is off"
Packit d7e8d0
Packit d7e8d0
    # Check capabilities
Packit d7e8d0
    for sign, encrypt, authenticate in itertools.product([False, True],
Packit d7e8d0
                                                         [False, True],
Packit d7e8d0
                                                         [False, True]):
Packit d7e8d0
        # Filter some out
Packit d7e8d0
        if not (sign or encrypt or authenticate):
Packit d7e8d0
            # This triggers the default capabilities tested before.
Packit d7e8d0
            continue
Packit d7e8d0
Packit d7e8d0
        res = ctx.create_subkey(key, sign=sign, encrypt=encrypt,
Packit d7e8d0
                                authenticate=authenticate)
Packit d7e8d0
        subkey = get_subkey(res.fpr)
Packit d7e8d0
        assert sign == subkey.can_sign
Packit d7e8d0
        assert encrypt == subkey.can_encrypt
Packit d7e8d0
        assert authenticate == subkey.can_authenticate
Packit d7e8d0
Packit d7e8d0
    # Check algorithm
Packit d7e8d0
    res = ctx.create_subkey(key, algorithm="rsa")
Packit d7e8d0
    subkey = get_subkey(res.fpr)
Packit d7e8d0
    assert subkey.pubkey_algo == 1
Packit d7e8d0
Packit d7e8d0
    # Check algorithm with size
Packit d7e8d0
    res = ctx.create_subkey(key, algorithm="rsa1024")
Packit d7e8d0
    subkey = get_subkey(res.fpr)
Packit d7e8d0
    assert subkey.pubkey_algo == 1
Packit d7e8d0
    assert subkey.length == 1024
Packit d7e8d0
Packit d7e8d0
    # Check algorithm future-default
Packit d7e8d0
    ctx.create_subkey(key, algorithm="future-default")
Packit d7e8d0
Packit d7e8d0
    # Check passphrase protection.  For this we create a new key
Packit d7e8d0
    # so that we have a key with just one encryption subkey.
Packit d7e8d0
    bravo_res = ctx.create_key(bravo, certify=True)
Packit d7e8d0
    bravo_key = ctx.get_key(bravo_res.fpr)
Packit d7e8d0
    assert len(bravo_key.subkeys) == 1, "Expected one primary key and no subkeys"
Packit d7e8d0
Packit d7e8d0
    passphrase = "streng geheim"
Packit d7e8d0
    res = ctx.create_subkey(bravo_key, passphrase=passphrase)
Packit d7e8d0
    ciphertext, _, _ = ctx.encrypt(b"hello there",
Packit d7e8d0
                                   recipients=[ctx.get_key(bravo_res.fpr)])
Packit d7e8d0
Packit d7e8d0
    cb_called = False
Packit d7e8d0
    def cb(*args):
Packit d7e8d0
        global cb_called
Packit d7e8d0
        cb_called = True
Packit d7e8d0
        return passphrase
Packit d7e8d0
    ctx.pinentry_mode = gpg.constants.PINENTRY_MODE_LOOPBACK
Packit d7e8d0
    ctx.set_passphrase_cb(cb)
Packit d7e8d0
Packit d7e8d0
    plaintext, _, _ = ctx.decrypt(ciphertext)
Packit d7e8d0
    assert plaintext == b"hello there"
Packit d7e8d0
    assert cb_called