1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
|
// SPDX-FileCopyrightText: 2024 Tobias Fella <tobias.fella@kde.org>
// SPDX-License-Identifier: LGPL-2.1-or-later
#include <Quotient/e2ee/cryptoutils.h>
#include <QTest>
#include <Quotient/keyimport.h>
class TestKeyImport : public QObject
{
Q_OBJECT
private slots:
void testImport();
void testExport();
};
using namespace Quotient;
void TestKeyImport::testImport()
{
KeyImport keyImport;
auto path = QString::fromUtf8(__FILE__);
path = path.left(path.lastIndexOf(QDir::separator()));
path += "/key-export.data"_L1;
QFile file(path);
file.open(QIODevice::ReadOnly);
auto data = file.readAll();
QVERIFY(!data.isEmpty());
const auto result = keyImport.decrypt(QString::fromUtf8(data), u"123passphrase"_s);
QVERIFY(result.has_value());
const auto &json = result.value();
QCOMPARE(json.size(), 2);
}
void TestKeyImport::testExport()
{
KeyImport keyImport;
QJsonArray sessions;
sessions += QJsonObject{
{ "algorithm"_L1, "m.megolm.v1.aes-sha2"_L1 },
{ "forwarding_curve25519_key_chain"_L1, QJsonArray() },
{ "room_id"_L1, "!asdf:foo.bar"_L1 },
{ "sender_claimed_keys"_L1, QJsonObject{ { "ed25519"_L1, "asdfkey"_L1 } } },
{ "sender_key"_L1, "senderkey"_L1 },
{ "session_id"_L1, "sessionidasdf"_L1 },
{ "session_key"_L1, "sessionkeyfoo"_L1 },
};
auto result = keyImport.encrypt(sessions, u"a passphrase"_s);
QVERIFY(result.has_value());
QVERIFY(result.value().size() > 0);
auto plain = keyImport.decrypt(QString::fromLatin1(result.value()), u"a passphrase"_s);
QVERIFY(plain.has_value());
auto value = plain.value();
QCOMPARE(value.size(), 1);
QCOMPARE(value[0]["algorithm"_L1].toString(), "m.megolm.v1.aes-sha2"_L1);
}
QTEST_GUILESS_MAIN(TestKeyImport)
#include "testkeyimport.moc"
|