// createFakeUserWithPGPOnly creates a new fake/testing user, who signed // up on the Web site, and used the Web site to generate his/her key. They // used triplesec-encryption and synced their key to the keybase servers. func createFakeUserWithPGPOnly(t *testing.T, tc libkb.TestContext) *FakeUser { fu := NewFakeUserOrBust(tc.T, "login") secui := &libkb.TestSecretUI{Passphrase: fu.Passphrase} ctx := &Context{ GPGUI: &gpgtestui{}, SecretUI: secui, LogUI: tc.G.UI.GetLogUI(), LoginUI: &libkb.TestLoginUI{Username: fu.Username}, } s := NewSignupEngine(nil, tc.G) f := func(a libkb.LoginContext) error { if err := s.genPassphraseStream(a, fu.Passphrase); err != nil { return err } if err := s.join(a, fu.Username, fu.Email, testInviteCode, true); err != nil { return err } return s.fakeLKS() } if err := s.G().LoginState().ExternalFunc(f, "createFakeUserWithPGPOnly"); err != nil { tc.T.Fatal(err) } // Generate a new test PGP key for the user, and specify the PushSecret // flag so that their triplesec'ed key is pushed to the server. gen := libkb.PGPGenArg{ PrimaryBits: 1024, SubkeyBits: 1024, } gen.AddDefaultUID() peng := NewPGPKeyImportEngine(PGPKeyImportEngineArg{ Gen: &gen, PushSecret: true, Lks: s.lks, NoSave: true, }) if err := RunEngine(peng, ctx); err != nil { tc.T.Fatal(err) } var err error fu.User, err = libkb.LoadMe(libkb.NewLoadUserPubOptionalArg(tc.G)) if err != nil { tc.T.Fatal(err) } return fu }
func (s *SignupEngine) genPGPBatch(ctx *Context) error { gen := libkb.PGPGenArg{ PrimaryBits: 1024, SubkeyBits: 1024, } gen.AddDefaultUID() tsec := ctx.LoginContext.PassphraseStreamCache().Triplesec() sgen := ctx.LoginContext.GetStreamGeneration() eng := NewPGPKeyImportEngine(PGPKeyImportEngineArg{ Gen: &gen, PushSecret: true, Lks: s.lks, NoSave: true, PreloadTsec: tsec, PreloadStreamGen: sgen, }) return RunEngine(eng, ctx) }