Add tests for name encryption and byte range splitting
This commit is contained in:
parent
af0ae03db2
commit
b65882985d
34
cryptfs/content_test.go
Normal file
34
cryptfs/content_test.go
Normal file
@ -0,0 +1,34 @@
|
||||
package cryptfs
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"fmt"
|
||||
)
|
||||
|
||||
type testRange struct {
|
||||
offset uint64
|
||||
length uint64
|
||||
}
|
||||
|
||||
func TestSplitRange(t *testing.T) {
|
||||
var ranges []testRange
|
||||
|
||||
ranges = append(ranges, testRange{0, 70000},
|
||||
testRange{0, 10},
|
||||
testRange{234, 6511},
|
||||
testRange{65444, 54},
|
||||
testRange{6654, 8945})
|
||||
|
||||
var key [16]byte
|
||||
f := NewCryptFS(key, true)
|
||||
|
||||
for _, r := range(ranges) {
|
||||
parts := f.SplitRange(r.offset, r.length)
|
||||
for _, p := range(parts) {
|
||||
if p.Length > DEFAULT_PLAINBS || p.Offset >= DEFAULT_PLAINBS {
|
||||
fmt.Printf("Test fail: n=%d, length=%d, offset=%d\n", p.BlockNo, p.Length, p.Offset)
|
||||
t.Fail()
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
57
cryptfs/names_test.go
Normal file
57
cryptfs/names_test.go
Normal file
@ -0,0 +1,57 @@
|
||||
package cryptfs
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"bytes"
|
||||
)
|
||||
|
||||
func TestTranslatePath(t *testing.T) {
|
||||
var s []string
|
||||
s = append(s, "foo")
|
||||
s = append(s, "foo12312312312312312313123123123")
|
||||
s = append(s, "123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890")
|
||||
|
||||
var key [16]byte
|
||||
fs := NewCryptFS(key, true)
|
||||
|
||||
for _, n := range(s) {
|
||||
c := fs.EncryptPath(n)
|
||||
d, err := fs.DecryptPath(c)
|
||||
if err != nil {
|
||||
t.Errorf("Got error from DecryptName: %s", err)
|
||||
}
|
||||
if d != n {
|
||||
t.Errorf("Content mismatch, n=\"%s\" d=\"%s\"", n, d)
|
||||
}
|
||||
//fmt.Printf("n=%s c=%s d=%s\n", n, c, d)
|
||||
}
|
||||
}
|
||||
|
||||
func TestPad16(t *testing.T) {
|
||||
var s [][]byte
|
||||
s = append(s, []byte("foo"))
|
||||
s = append(s, []byte("12345678901234567"))
|
||||
s = append(s, []byte("12345678901234567abcdefg"))
|
||||
var key [16]byte
|
||||
fs := NewCryptFS(key, true)
|
||||
for i := range(s) {
|
||||
orig := s[i]
|
||||
padded := fs.pad16(orig)
|
||||
if len(padded) <= len(orig) {
|
||||
t.Errorf("Padded length not bigger than orig: %d", len(padded))
|
||||
}
|
||||
if len(padded) % 16 != 0 {
|
||||
t.Errorf("Length is not aligend: %d", len(padded))
|
||||
}
|
||||
unpadded, err := fs.unPad16(padded)
|
||||
if err != nil {
|
||||
t.Error("unPad16 returned error:", err)
|
||||
}
|
||||
if len(unpadded) != len(orig) {
|
||||
t.Errorf("Size mismatch: orig=%d unpadded=%d", len(s[i]), len(unpadded))
|
||||
}
|
||||
if ! bytes.Equal(orig, unpadded) {
|
||||
t.Error("Content mismatch orig vs unpadded")
|
||||
}
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue
Block a user