From b65882985dd7aa3ea7ae76c49d592ff30b353a8b Mon Sep 17 00:00:00 2001 From: Jakob Unterwurzacher Date: Mon, 7 Sep 2015 21:25:05 +0200 Subject: [PATCH] Add tests for name encryption and byte range splitting --- cryptfs/content_test.go | 34 ++++++++++++++++++++++++ cryptfs/names_test.go | 57 +++++++++++++++++++++++++++++++++++++++++ 2 files changed, 91 insertions(+) create mode 100644 cryptfs/content_test.go create mode 100644 cryptfs/names_test.go diff --git a/cryptfs/content_test.go b/cryptfs/content_test.go new file mode 100644 index 0000000..1900818 --- /dev/null +++ b/cryptfs/content_test.go @@ -0,0 +1,34 @@ +package cryptfs + +import ( + "testing" + "fmt" +) + +type testRange struct { + offset uint64 + length uint64 +} + +func TestSplitRange(t *testing.T) { + var ranges []testRange + + ranges = append(ranges, testRange{0, 70000}, + testRange{0, 10}, + testRange{234, 6511}, + testRange{65444, 54}, + testRange{6654, 8945}) + + var key [16]byte + f := NewCryptFS(key, true) + + for _, r := range(ranges) { + parts := f.SplitRange(r.offset, r.length) + for _, p := range(parts) { + if p.Length > DEFAULT_PLAINBS || p.Offset >= DEFAULT_PLAINBS { + fmt.Printf("Test fail: n=%d, length=%d, offset=%d\n", p.BlockNo, p.Length, p.Offset) + t.Fail() + } + } + } +} diff --git a/cryptfs/names_test.go b/cryptfs/names_test.go new file mode 100644 index 0000000..30ecfb9 --- /dev/null +++ b/cryptfs/names_test.go @@ -0,0 +1,57 @@ +package cryptfs + +import ( + "testing" + "bytes" +) + +func TestTranslatePath(t *testing.T) { + var s []string + s = append(s, "foo") + s = append(s, "foo12312312312312312313123123123") + s = append(s, "123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890") + + var key [16]byte + fs := NewCryptFS(key, true) + + for _, n := range(s) { + c := fs.EncryptPath(n) + d, err := fs.DecryptPath(c) + if err != nil { + t.Errorf("Got error from DecryptName: %s", err) + } + if d != n { + t.Errorf("Content mismatch, n=\"%s\" d=\"%s\"", n, d) + } + //fmt.Printf("n=%s c=%s d=%s\n", n, c, d) + } +} + +func TestPad16(t *testing.T) { + var s [][]byte + s = append(s, []byte("foo")) + s = append(s, []byte("12345678901234567")) + s = append(s, []byte("12345678901234567abcdefg")) + var key [16]byte + fs := NewCryptFS(key, true) + for i := range(s) { + orig := s[i] + padded := fs.pad16(orig) + if len(padded) <= len(orig) { + t.Errorf("Padded length not bigger than orig: %d", len(padded)) + } + if len(padded) % 16 != 0 { + t.Errorf("Length is not aligend: %d", len(padded)) + } + unpadded, err := fs.unPad16(padded) + if err != nil { + t.Error("unPad16 returned error:", err) + } + if len(unpadded) != len(orig) { + t.Errorf("Size mismatch: orig=%d unpadded=%d", len(s[i]), len(unpadded)) + } + if ! bytes.Equal(orig, unpadded) { + t.Error("Content mismatch orig vs unpadded") + } + } +}