libcryfs/test/cryfs/impl/config/CryPasswordBasedKeyProviderTest.cpp

89 lines
3.2 KiB
C++
Raw Normal View History

2019-01-26 08:38:34 +01:00
#include <cryfs/impl/config/CryPasswordBasedKeyProvider.h>
#include <gmock/gmock.h>
2019-01-26 08:38:34 +01:00
#include "../../impl/testutils/MockConsole.h"
#include <cpp-utils/data/DataFixture.h>
using cpputils::unique_ref;
using cpputils::make_unique_ref;
using cpputils::EncryptionKey;
using cpputils::PasswordBasedKDF;
using cpputils::Data;
using cpputils::DataFixture;
using std::shared_ptr;
using std::make_shared;
using std::string;
using cryfs::CryPasswordBasedKeyProvider;
using testing::Return;
using testing::Invoke;
using testing::Eq;
using testing::StrEq;
using testing::NiceMock;
namespace {
class MockCallable {
public:
MOCK_METHOD(std::string, call, ());
};
class MockKDF : public PasswordBasedKDF {
public:
MOCK_METHOD(EncryptionKey, deriveExistingKey, (size_t keySize, const string& password, const Data& kdfParameters), (override));
MOCK_METHOD(KeyResult, deriveNewKey, (size_t keySize, const string& password), (override));
};
class CryPasswordBasedKeyProviderTest : public ::testing::Test {
public:
CryPasswordBasedKeyProviderTest()
: mockConsole(make_shared<NiceMock<MockConsole>>())
, askPasswordForNewFilesystem()
, askPasswordForExistingFilesystem()
, kdf_(make_unique_ref<MockKDF>())
, kdf(kdf_.get())
, keyProvider(mockConsole, [this] () {return askPasswordForExistingFilesystem.call();}, [this] () {return askPasswordForNewFilesystem.call(); }, std::move(kdf_)) {}
shared_ptr<NiceMock<MockConsole>> mockConsole;
MockCallable askPasswordForNewFilesystem;
MockCallable askPasswordForExistingFilesystem;
unique_ref<MockKDF> kdf_;
MockKDF* kdf;
CryPasswordBasedKeyProvider keyProvider;
};
TEST_F(CryPasswordBasedKeyProviderTest, requestKeyForNewFilesystem) {
constexpr size_t keySize = 512;
constexpr const char* password = "mypassword";
const EncryptionKey key = EncryptionKey::FromString(DataFixture::generate(keySize).ToString());
const Data kdfParameters = DataFixture::generate(100);
EXPECT_CALL(askPasswordForNewFilesystem, call()).Times(1).WillOnce(Return(password));
EXPECT_CALL(askPasswordForExistingFilesystem, call()).Times(0);
EXPECT_CALL(*kdf, deriveNewKey(Eq(keySize), StrEq(password))).Times(1).WillOnce(Invoke([&] (auto, auto) {return PasswordBasedKDF::KeyResult{key, kdfParameters.copy()};}));
auto returned_key = keyProvider.requestKeyForNewFilesystem(keySize);
EXPECT_EQ(key.ToString(), returned_key.key.ToString());
EXPECT_EQ(kdfParameters, returned_key.kdfParameters);
}
TEST_F(CryPasswordBasedKeyProviderTest, requestKeyForExistingFilesystem) {
constexpr size_t keySize = 512;
constexpr const char* password = "mypassword";
const EncryptionKey key = EncryptionKey::FromString(DataFixture::generate(keySize).ToString());
const Data kdfParameters = DataFixture::generate(100);
EXPECT_CALL(askPasswordForNewFilesystem, call()).Times(0);
EXPECT_CALL(askPasswordForExistingFilesystem, call()).Times(1).WillOnce(Return(password));
2021-04-21 08:09:00 +02:00
EXPECT_CALL(*kdf, deriveExistingKey(Eq(keySize), StrEq(password), testing::_)).Times(1).WillOnce(Invoke([&] (auto, auto, const auto& kdfParams) {
EXPECT_EQ(kdfParameters, kdfParams);
return key;
}));
EncryptionKey returned_key = keyProvider.requestKeyForExistingFilesystem(keySize, kdfParameters);
EXPECT_EQ(key.ToString(), returned_key.ToString());
}
}