aboutsummaryrefslogtreecommitdiff
path: root/tests/example_filesystems/example_filesystems_test.go
diff options
context:
space:
mode:
authorJakob Unterwurzacher2017-05-28 19:02:22 +0200
committerJakob Unterwurzacher2017-05-30 17:04:46 +0200
commite43eb36da3e72cd0f59ac978cf76a94fa87ca7cd (patch)
tree3ec424628b30e0633b668c2ec95fcc4bc69d74f3 /tests/example_filesystems/example_filesystems_test.go
parentd202a456f56ec9923626ef6839254d40f2c8ee37 (diff)
tests: add v1.3-reverse example filesystem
We check the md5 sum of the encrypted version of a file to make sure we don't accidentially change the ciphertext generation.
Diffstat (limited to 'tests/example_filesystems/example_filesystems_test.go')
-rw-r--r--tests/example_filesystems/example_filesystems_test.go54
1 files changed, 54 insertions, 0 deletions
diff --git a/tests/example_filesystems/example_filesystems_test.go b/tests/example_filesystems/example_filesystems_test.go
index d7411e6..cbea251 100644
--- a/tests/example_filesystems/example_filesystems_test.go
+++ b/tests/example_filesystems/example_filesystems_test.go
@@ -250,3 +250,57 @@ func TestExampleFSv13(t *testing.T) {
checkExampleFSLongnames(t, pDir)
test_helpers.UnmountPanic(pDir)
}
+
+// gocryptfs v1.3 introduced HKDF.
+// We check the md5 sum of the encrypted version of a file to make sure we don't
+// accidentially change the ciphertext generation.
+func TestExampleFSv13reverse(t *testing.T) {
+ // Prepare directories
+ dirA := "v1.3-reverse"
+ dirB := test_helpers.TmpDir + "/" + dirA + ".B"
+ err := os.Mkdir(dirB, 0700)
+ if err != nil {
+ t.Fatal(err)
+ }
+ dirC := test_helpers.TmpDir + "/" + dirA + ".C"
+ err = os.Mkdir(dirC, 0700)
+ if err != nil {
+ t.Fatal(err)
+ }
+ // Mount using password
+ test_helpers.MountOrFatal(t, dirA, dirB, "-reverse", "-extpass", "echo test", opensslOpt)
+ c := dirB + "/gocryptfs.conf"
+ if !test_helpers.VerifyExistence(c) {
+ t.Errorf("%s missing", c)
+ }
+ test_helpers.MountOrFatal(t, dirB, dirC, "-extpass", "echo test", opensslOpt)
+ // Test
+ checkExampleFSrw(t, dirC, false)
+ // Encrypted version of dir1/dir2/file (10000 zero bytes)
+ cPath := dirB + "/zOsW1-BUX54hC2hmhu2EOw/4ZqrpGQdw5r07KR1qw2ZeQ/tfCm9Sp9J_Dvc-jD7J6p8g"
+ want := "9818501d214c5eb42ca2472caf6c82a1"
+ actual := test_helpers.Md5fn(cPath)
+ if actual != want {
+ t.Errorf("wrong md5")
+ }
+ // Unmount
+ test_helpers.UnmountPanic(dirC)
+ test_helpers.UnmountPanic(dirB)
+
+ // Mount using masterkey
+ m := "2290a7f4-3e1908fb-b006f7d9-261bdaf1-4b72bc38-3b24956c-db7d8a8d-d996076a"
+ test_helpers.MountOrFatal(t, dirA, dirB, "-reverse", "-masterkey", m, opensslOpt)
+ if !test_helpers.VerifyExistence(c) {
+ t.Errorf("%s missing", c)
+ }
+ test_helpers.MountOrFatal(t, dirB, dirC, "-aessiv", "-masterkey", m, opensslOpt)
+ // Test
+ checkExampleFSrw(t, dirC, false)
+ actual = test_helpers.Md5fn(cPath)
+ if actual != want {
+ t.Errorf("wrong md5")
+ }
+ // Unmmount
+ test_helpers.UnmountPanic(dirC)
+ test_helpers.UnmountPanic(dirB)
+}