1" Tests for encryption. 2 3source check.vim 4CheckFeature cryptv 5 6func Common_head_only(text) 7 " This was crashing Vim 8 split Xtest.txt 9 call setline(1, a:text) 10 wq 11 call feedkeys(":split Xtest.txt\<CR>foobar\<CR>", "tx") 12 call delete('Xtest.txt') 13 call assert_match('VimCrypt', getline(1)) 14 bwipe! 15endfunc 16 17func Test_head_only_2() 18 call Common_head_only('VimCrypt~02!abc') 19endfunc 20 21func Test_head_only_3() 22 call Common_head_only('VimCrypt~03!abc') 23endfunc 24 25func Test_head_only_4() 26 CheckFeature sodium 27 call Common_head_only('VimCrypt~04!abc') 28endfunc 29 30func Crypt_uncrypt(method) 31 exe "set cryptmethod=" . a:method 32 " If the blowfish test fails 'cryptmethod' will be 'zip' now. 33 call assert_equal(a:method, &cryptmethod) 34 35 split Xtest.txt 36 let text = ['01234567890123456789012345678901234567', 37 \ 'line 2 foo bar blah', 38 \ 'line 3 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'] 39 call setline(1, text) 40 call feedkeys(":X\<CR>foobar\<CR>foobar\<CR>", 'xt') 41 call assert_equal('*****', &key) 42 w! 43 bwipe! 44 call feedkeys(":split Xtest.txt\<CR>foobar\<CR>", 'xt') 45 call assert_equal(text, getline(1, 3)) 46 set key= cryptmethod& 47 bwipe! 48 call delete('Xtest.txt') 49endfunc 50 51func Test_crypt_zip() 52 call Crypt_uncrypt('zip') 53endfunc 54 55func Test_crypt_blowfish() 56 call Crypt_uncrypt('blowfish') 57endfunc 58 59func Test_crypt_blowfish2() 60 call Crypt_uncrypt('blowfish2') 61endfunc 62 63func Test_crypt_sodium() 64 CheckFeature sodium 65 call Crypt_uncrypt('xchacha20') 66endfunc 67 68func Uncrypt_stable(method, crypted_text, key, uncrypted_text) 69 split Xtest.txt 70 set bin noeol key= fenc=latin1 71 exe "set cryptmethod=" . a:method 72 call setline(1, a:crypted_text) 73 w! 74 bwipe! 75 set nobin 76 call feedkeys(":split Xtest.txt\<CR>" . a:key . "\<CR>", 'xt') 77 call assert_equal(a:uncrypted_text, getline(1, len(a:uncrypted_text))) 78 bwipe! 79 call delete('Xtest.txt') 80 set key= 81endfunc 82 83func Uncrypt_stable_xxd(method, hex, key, uncrypted_text) 84 " use xxd to write the binary content 85 call system('xxd -r >Xtest.txt', a:hex) 86 call feedkeys(":split Xtest.txt\<CR>" . a:key . "\<CR>", 'xt') 87 call assert_equal(a:uncrypted_text, getline(1, len(a:uncrypted_text))) 88 bwipe! 89 call delete('Xtest.txt') 90 set key= 91endfunc 92 93func Test_uncrypt_zip() 94 call Uncrypt_stable('zip', "VimCrypt~01!\u0006\u001clV'\u00de}Mg\u00a0\u00ea\u00a3V\u00a9\u00e7\u0007E#3\u008e2U\u00e9\u0097", "foofoo", ["1234567890", "aábbccddeëff"]) 95endfunc 96 97func Test_uncrypt_blowfish() 98 call Uncrypt_stable('blowfish', "VimCrypt~02!k)\u00be\u0017\u0097#\u0016\u00ddS\u009c\u00f5=\u00ba\u00e0\u00c8#\u00a5M\u00b4\u0086J\u00c3A\u00cd\u00a5M\u00b4\u0086!\u0080\u0015\u009b\u00f5\u000f\u00e1\u00d2\u0019\u0082\u0016\u0098\u00f7\u000d\u00da", "barbar", ["asdfasdfasdf", "0001112223333"]) 99endfunc 100 101func Test_uncrypt_blowfish2a() 102 call Uncrypt_stable('blowfish', "VimCrypt~03!\u001e\u00d1N\u00e3;\u00d3\u00c0\u00a0^C)\u0004\u00f7\u007f.\u00b6\u00abF\u000eS\u0019\u00e0\u008b6\u00d2[T\u00cb\u00a7\u0085\u00d8\u00be9\u000b\u00812\u000bQ\u00b3\u00cc@\u0097\u000f\u00df\u009a\u00adIv\u00aa.\u00d8\u00c9\u00ee\u009e`\u00bd$\u00af%\u00d0", "barburp", ["abcdefghijklmnopqrstuvwxyz", "!@#$%^&*()_+=-`~"]) 103endfunc 104 105func Test_uncrypt_blowfish2() 106 call Uncrypt_stable('blowfish2', "VimCrypt~03!\u001e\u00d1N\u00e3;\u00d3\u00c0\u00a0^C)\u0004\u00f7\u007f.\u00b6\u00abF\u000eS\u0019\u00e0\u008b6\u00d2[T\u00cb\u00a7\u0085\u00d8\u00be9\u000b\u00812\u000bQ\u00b3\u00cc@\u0097\u000f\u00df\u009a\u00adIv\u00aa.\u00d8\u00c9\u00ee\u009e`\u00bd$\u00af%\u00d0", "barburp", ["abcdefghijklmnopqrstuvwxyz", "!@#$%^&*()_+=-`~"]) 107endfunc 108 109func Test_uncrypt_xchacha20() 110 CheckFeature sodium 111 let hex=['00000000: 5669 6d43 7279 7074 7e30 3421 6b7d e607 vimCrypt~04!k}..', 112 \ '00000010: 4ea4 e99f 923e f67f 7b59 a80d 3bca 2f06 N....>..{Y..;./.', 113 \ '00000020: fa11 b951 8d09 0dc9 470f e7cf 8b90 4310 ...Q....G.....C.', 114 \ '00000030: 653b b83b e493 378b 0390 0e38 f912 626b e;.;..7....8..bk', 115 \ '00000040: a02e 4697 0254 2625 2d8e 3a0b 784b e89c ..F..T&%-.:.xK..', 116 \ '00000050: 0c67 a975 3c17 9319 8ffd 1463 7783 a1f3 .g.u<......cw...', 117 \ '00000060: d917 dcb3 8b3e ecd7 c7d4 086b 6059 7ead .....>.....k`Y~.', 118 \ '00000070: 9b07 f96b 5c1b 4d08 cd91 f208 5221 7484 ...k\.M.....R!t.', 119 \ '00000080: 72be 0136 84a1 d3 r..6...'] 120 " the file should be in latin1 encoding, this makes sure that readfile() 121 " retries several times converting the multi-byte characters 122 call Uncrypt_stable_xxd('xchacha20', hex, "sodium_crypt", ["abcdefghijklmnopqrstuvwxyzäöü", "ZZZ_äüöÄÜÖ_!@#$%^&*()_+=-`~"]) 123endfunc 124 125func Test_uncrypt_xchacha20_invalid() 126 CheckFeature sodium 127 128 " load an invalid encrypted file and verify it can be decrypted with an 129 " error message 130 try 131 call feedkeys(":split samples/crypt_sodium_invalid.txt\<CR>sodium\<CR>", 'xt') 132 call assert_false(1, 'should not happen') 133 catch 134 call assert_exception('pre-mature') 135 endtry 136 call assert_match("Note: Encryption of swapfile not supported, disabling swap file", execute(':5messages')) 137 138 call assert_equal(0, &swapfile) 139 call assert_equal("xchacha20", &cryptmethod) 140 call assert_equal('311111111111111111111111', getline('$')) 141 bw! 142endfunc 143 144func Test_uncrypt_xchacha20_2() 145 CheckFeature sodium 146 147 sp Xcrypt_sodium.txt 148 " Create a larger file, so that Vim will write in several blocks 149 call setline(1, range(1,4000)) 150 call assert_equal(1, &swapfile) 151 set cryptmethod=xchacha20 152 call feedkeys(":X\<CR>sodium\<CR>sodium\<CR>", 'xt') 153 " swapfile disabled 154 call assert_equal(0, &swapfile) 155 call assert_match("Note: Encryption of swapfile not supported, disabling swap file", execute(':messages')) 156 w! 157 " encrypted using xchacha20 158 call assert_match("\[xchacha20\]", execute(':messages')) 159 bw! 160 call feedkeys(":sp Xcrypt_sodium.txt\<CR>sodium\<CR>", 'xt') 161 " successfully decrypted 162 call assert_equal(range(1, 4000)->map( {_, v -> string(v)}), getline(1,'$')) 163 set key= 164 w! ++ff=unix 165 " enryption removed (on MS-Windows the .* matches [unix]) 166 call assert_match('"Xcrypt_sodium.txt".*4000L, 18893B written', execute(':message')) 167 bw! 168 call delete('Xcrypt_sodium.txt') 169 set cryptmethod&vim 170endfunc 171 172func Test_uncrypt_xchacha20_3_persistent_undo() 173 CheckFeature sodium 174 CheckFeature persistent_undo 175 176 sp Xcrypt_sodium_undo.txt 177 set cryptmethod=xchacha20 undofile 178 call feedkeys(":X\<CR>sodium\<CR>sodium\<CR>", 'xt') 179 call assert_equal(1, &undofile) 180 let ufile=undofile(@%) 181 call append(0, ['monday', 'tuesday', 'wednesday', 'thursday', 'friday']) 182 call cursor(1, 1) 183 184 set undolevels=100 185 normal dd 186 set undolevels=100 187 normal dd 188 set undolevels=100 189 normal dd 190 set undolevels=100 191 w! 192 call assert_equal(0, &undofile) 193 bw! 194 call feedkeys(":sp Xcrypt_sodium_undo.txt\<CR>sodium\<CR>", 'xt') 195 " should fail 196 norm! u 197 call assert_match('Already at oldest change', execute(':1mess')) 198 call assert_fails('verbose rundo ' .. fnameescape(ufile), 'E822') 199 bw! 200 set undolevels& cryptmethod& undofile& 201 call delete('Xcrypt_sodium_undo.txt') 202endfunc 203 204func Test_encrypt_xchacha20_missing() 205 if has("sodium") 206 return 207 endif 208 sp Xcrypt_sodium_undo.txt 209 call assert_fails(':set cryptmethod=xchacha20', 'E474') 210 bw! 211 set cm& 212endfunc 213 214func Test_uncrypt_unknown_method() 215 split Xuncrypt_unknown.txt 216 set bin noeol key= fenc=latin1 217 call setline(1, "VimCrypt~93!\u001e\u00d1") 218 w! 219 bwipe! 220 set nobin 221 call assert_fails(":split Xuncrypt_unknown.txt", 'E821:') 222 223 bwipe! 224 call delete('Xuncrypt_unknown.txt') 225 set key= 226endfunc 227 228func Test_crypt_key_mismatch() 229 set cryptmethod=blowfish 230 231 split Xtest.txt 232 call setline(1, 'nothing') 233 call feedkeys(":X\<CR>foobar\<CR>nothing\<CR>", 'xt') 234 call assert_match("Keys don't match!", execute(':2messages')) 235 call assert_equal('', &key) 236 call feedkeys("\<CR>\<CR>", 'xt') 237 238 set cryptmethod& 239 bwipe! 240endfunc 241 242func Test_crypt_set_key_changes_buffer() 243 244 new Xtest1.txt 245 call setline(1, 'nothing') 246 set cryptmethod=blowfish2 247 call feedkeys(":X\<CR>foobar\<CR>foobar\<CR>", 'xt') 248 call assert_fails(":q", "E37:") 249 w 250 set key=anotherkey 251 call assert_fails(":bw") 252 w 253 call feedkeys(":X\<CR>foobar\<CR>foobar\<CR>", 'xt') 254 call assert_fails(":bw") 255 w 256 let winnr = winnr() 257 wincmd p 258 call setwinvar(winnr, '&key', 'yetanotherkey') 259 wincmd p 260 call assert_fails(":bw") 261 w 262 263 set cryptmethod& 264 set key= 265 bwipe! 266 call delete('Xtest1.txt') 267endfunc 268 269" vim: shiftwidth=2 sts=2 expandtab 270