diff options
| author | Jakob Unterwurzacher | 2015-09-07 21:25:05 +0200 | 
|---|---|---|
| committer | Jakob Unterwurzacher | 2015-09-07 21:25:05 +0200 | 
| commit | b65882985dd7aa3ea7ae76c49d592ff30b353a8b (patch) | |
| tree | b66ef37e2b7ef015dfa6f0e96be7e10633d596e9 /cryptfs | |
| parent | af0ae03db23f845dbcf8a6738057222ce7986bd8 (diff) | |
Add tests for name encryption and byte range splitting
Diffstat (limited to 'cryptfs')
| -rw-r--r-- | cryptfs/content_test.go | 34 | ||||
| -rw-r--r-- | cryptfs/names_test.go | 57 | 
2 files changed, 91 insertions, 0 deletions
| diff --git a/cryptfs/content_test.go b/cryptfs/content_test.go new file mode 100644 index 0000000..1900818 --- /dev/null +++ b/cryptfs/content_test.go @@ -0,0 +1,34 @@ +package cryptfs + +import ( +	"testing" +	"fmt" +) + +type testRange struct { +	offset uint64 +	length uint64 +} + +func TestSplitRange(t *testing.T) { +	var ranges []testRange + +	ranges = append(ranges, testRange{0, 70000}, +		testRange{0, 10}, +		testRange{234, 6511}, +		testRange{65444, 54}, +		testRange{6654, 8945}) + +	var key [16]byte +	f := NewCryptFS(key, true) + +	for _, r := range(ranges) { +		parts := f.SplitRange(r.offset, r.length) +		for _, p := range(parts) { +			if p.Length > DEFAULT_PLAINBS || p.Offset >= DEFAULT_PLAINBS { +				fmt.Printf("Test fail: n=%d, length=%d, offset=%d\n", p.BlockNo, p.Length, p.Offset) +				t.Fail() +			} +		} +	} +} diff --git a/cryptfs/names_test.go b/cryptfs/names_test.go new file mode 100644 index 0000000..30ecfb9 --- /dev/null +++ b/cryptfs/names_test.go @@ -0,0 +1,57 @@ +package cryptfs + +import ( +	"testing" +	"bytes" +) + +func TestTranslatePath(t *testing.T) { +	var s []string +	s = append(s, "foo") +	s = append(s, "foo12312312312312312313123123123") +	s = append(s, "123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890") + +	var key [16]byte +	fs := NewCryptFS(key, true) + +	for _, n := range(s) { +		c := fs.EncryptPath(n) +		d, err := fs.DecryptPath(c) +		if err != nil { +			t.Errorf("Got error from DecryptName: %s", err) +		} +		if d != n { +			t.Errorf("Content mismatch, n=\"%s\" d=\"%s\"", n, d) +		} +		//fmt.Printf("n=%s c=%s d=%s\n", n, c, d) +	} +} + +func TestPad16(t *testing.T) { +	var s [][]byte +	s = append(s, []byte("foo")) +	s = append(s, []byte("12345678901234567")) +	s = append(s, []byte("12345678901234567abcdefg")) +	var key [16]byte +	fs := NewCryptFS(key, true) +	for i := range(s) { +		orig := s[i] +		padded := fs.pad16(orig) +		if len(padded) <= len(orig) { +			t.Errorf("Padded length not bigger than orig: %d", len(padded)) +		} +		if len(padded) % 16 != 0 { +			t.Errorf("Length is not aligend: %d", len(padded)) +		} +		unpadded, err := fs.unPad16(padded) +		if err != nil { +			t.Error("unPad16 returned error:", err) +		} +		if len(unpadded) != len(orig) { +			t.Errorf("Size mismatch: orig=%d unpadded=%d", len(s[i]), len(unpadded)) +		} +		if ! bytes.Equal(orig, unpadded) { +			t.Error("Content mismatch orig vs unpadded") +		} +	} +} | 
