2014-12-05 20:45:49 +00:00
|
|
|
package restic_test
|
2014-09-23 20:39:12 +00:00
|
|
|
|
|
|
|
import (
|
2015-02-11 16:41:11 +00:00
|
|
|
"bytes"
|
|
|
|
"crypto/sha256"
|
2014-09-23 20:39:12 +00:00
|
|
|
"flag"
|
2014-11-15 18:34:42 +00:00
|
|
|
"io"
|
2014-09-23 20:39:12 +00:00
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"testing"
|
|
|
|
|
2014-12-05 20:45:49 +00:00
|
|
|
"github.com/restic/restic"
|
|
|
|
"github.com/restic/restic/backend"
|
|
|
|
"github.com/restic/restic/chunker"
|
2014-09-23 20:39:12 +00:00
|
|
|
)
|
|
|
|
|
2014-11-15 18:34:42 +00:00
|
|
|
var testPassword = "foobar"
|
2014-09-23 20:39:12 +00:00
|
|
|
var testCleanup = flag.Bool("test.cleanup", true, "clean up after running tests (remove local backend directory with all content)")
|
2015-01-13 08:04:30 +00:00
|
|
|
var testLargeCrypto = flag.Bool("test.largecrypto", false, "also test crypto functions with large payloads")
|
2014-09-23 20:39:12 +00:00
|
|
|
|
2014-12-21 16:02:49 +00:00
|
|
|
func setupBackend(t testing.TB) restic.Server {
|
2014-12-05 20:45:49 +00:00
|
|
|
tempdir, err := ioutil.TempDir("", "restic-test-")
|
2014-09-23 20:39:12 +00:00
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
b, err := backend.CreateLocal(tempdir)
|
|
|
|
ok(t, err)
|
|
|
|
|
2014-12-21 16:02:49 +00:00
|
|
|
return restic.NewServer(b)
|
2014-09-23 20:39:12 +00:00
|
|
|
}
|
|
|
|
|
2014-12-21 16:02:49 +00:00
|
|
|
func teardownBackend(t testing.TB, s restic.Server) {
|
2014-09-23 20:39:12 +00:00
|
|
|
if !*testCleanup {
|
2014-12-21 16:02:49 +00:00
|
|
|
l := s.Backend().(*backend.Local)
|
|
|
|
t.Logf("leaving local backend at %s\n", l.Location())
|
2014-09-23 20:39:12 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2014-12-21 16:02:49 +00:00
|
|
|
ok(t, s.Delete())
|
2014-09-23 20:39:12 +00:00
|
|
|
}
|
|
|
|
|
2014-12-21 16:02:49 +00:00
|
|
|
func setupKey(t testing.TB, s restic.Server, password string) *restic.Key {
|
|
|
|
k, err := restic.CreateKey(s, password)
|
2014-09-23 20:39:12 +00:00
|
|
|
ok(t, err)
|
|
|
|
|
2014-11-15 18:34:42 +00:00
|
|
|
return k
|
|
|
|
}
|
2014-09-23 20:39:12 +00:00
|
|
|
|
2014-11-15 18:34:42 +00:00
|
|
|
func TestRepo(t *testing.T) {
|
2014-12-21 16:02:49 +00:00
|
|
|
s := setupBackend(t)
|
|
|
|
defer teardownBackend(t, s)
|
|
|
|
_ = setupKey(t, s, testPassword)
|
2014-09-23 20:39:12 +00:00
|
|
|
}
|
|
|
|
|
2014-11-15 18:34:42 +00:00
|
|
|
func TestEncryptDecrypt(t *testing.T) {
|
2014-12-21 16:02:49 +00:00
|
|
|
s := setupBackend(t)
|
|
|
|
defer teardownBackend(t, s)
|
|
|
|
k := setupKey(t, s, testPassword)
|
2014-11-15 18:34:42 +00:00
|
|
|
|
2015-01-13 08:04:30 +00:00
|
|
|
tests := []int{5, 23, 2<<18 + 23, 1 << 20}
|
|
|
|
if *testLargeCrypto {
|
|
|
|
tests = append(tests, 7<<20+123)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, size := range tests {
|
2014-11-15 18:34:42 +00:00
|
|
|
data := make([]byte, size)
|
2015-02-11 16:41:11 +00:00
|
|
|
_, err := io.ReadFull(randomReader(42, size), data)
|
2014-11-15 18:34:42 +00:00
|
|
|
ok(t, err)
|
|
|
|
|
2014-12-05 20:45:49 +00:00
|
|
|
ciphertext := restic.GetChunkBuf("TestEncryptDecrypt")
|
2014-11-23 15:48:00 +00:00
|
|
|
n, err := k.Encrypt(ciphertext, data)
|
2014-11-15 18:34:42 +00:00
|
|
|
ok(t, err)
|
|
|
|
|
2014-11-23 15:48:00 +00:00
|
|
|
plaintext, err := k.Decrypt(ciphertext[:n])
|
2014-11-15 18:34:42 +00:00
|
|
|
ok(t, err)
|
|
|
|
|
2014-12-05 20:45:49 +00:00
|
|
|
restic.FreeChunkBuf("TestEncryptDecrypt", ciphertext)
|
2014-11-23 15:48:00 +00:00
|
|
|
|
2014-11-15 18:34:42 +00:00
|
|
|
equals(t, plaintext, data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-31 20:18:51 +00:00
|
|
|
func TestSmallBuffer(t *testing.T) {
|
|
|
|
s := setupBackend(t)
|
|
|
|
defer teardownBackend(t, s)
|
|
|
|
k := setupKey(t, s, testPassword)
|
|
|
|
|
|
|
|
size := 600
|
|
|
|
data := make([]byte, size)
|
|
|
|
f, err := os.Open("/dev/urandom")
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
_, err = io.ReadFull(f, data)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
ciphertext := make([]byte, size/2)
|
|
|
|
_, err = k.Encrypt(ciphertext, data)
|
|
|
|
// this must throw an error, since the target slice is too small
|
|
|
|
assert(t, err != nil && err == restic.ErrBufferTooSmall,
|
|
|
|
"expected restic.ErrBufferTooSmall, got %#v", err)
|
|
|
|
}
|
|
|
|
|
2014-11-23 21:58:28 +00:00
|
|
|
func TestLargeEncrypt(t *testing.T) {
|
2015-01-13 08:04:30 +00:00
|
|
|
if !*testLargeCrypto {
|
|
|
|
t.SkipNow()
|
|
|
|
}
|
|
|
|
|
2014-12-21 16:02:49 +00:00
|
|
|
s := setupBackend(t)
|
|
|
|
defer teardownBackend(t, s)
|
|
|
|
k := setupKey(t, s, testPassword)
|
2014-11-23 21:58:28 +00:00
|
|
|
|
2015-01-13 08:04:30 +00:00
|
|
|
for _, size := range []int{chunker.MaxSize, chunker.MaxSize + 1, chunker.MaxSize + 1<<20} {
|
2014-11-23 21:58:28 +00:00
|
|
|
data := make([]byte, size)
|
|
|
|
f, err := os.Open("/dev/urandom")
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
_, err = io.ReadFull(f, data)
|
|
|
|
ok(t, err)
|
|
|
|
|
2014-12-05 20:45:49 +00:00
|
|
|
ciphertext := make([]byte, size+restic.CiphertextExtension)
|
2014-11-23 21:58:28 +00:00
|
|
|
n, err := k.Encrypt(ciphertext, data)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
plaintext, err := k.Decrypt(ciphertext[:n])
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
equals(t, plaintext, data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-11 16:41:11 +00:00
|
|
|
func BenchmarkEncryptReader(b *testing.B) {
|
|
|
|
size := 8 << 20 // 8MiB
|
|
|
|
rd := randomReader(23, size)
|
|
|
|
|
|
|
|
be := setupBackend(b)
|
|
|
|
defer teardownBackend(b, be)
|
|
|
|
k := setupKey(b, be, testPassword)
|
|
|
|
|
|
|
|
b.ResetTimer()
|
|
|
|
b.SetBytes(int64(size))
|
|
|
|
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
|
|
rd.Seek(0, 0)
|
|
|
|
_, err := io.Copy(ioutil.Discard, k.EncryptFrom(rd))
|
|
|
|
ok(b, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-11-15 18:34:42 +00:00
|
|
|
func BenchmarkEncrypt(b *testing.B) {
|
2014-11-23 15:48:00 +00:00
|
|
|
size := 8 << 20 // 8MiB
|
2014-11-15 18:34:42 +00:00
|
|
|
data := make([]byte, size)
|
|
|
|
|
|
|
|
be := setupBackend(b)
|
|
|
|
defer teardownBackend(b, be)
|
|
|
|
k := setupKey(b, be, testPassword)
|
|
|
|
|
|
|
|
b.ResetTimer()
|
|
|
|
b.SetBytes(int64(size))
|
|
|
|
|
2014-12-05 20:45:49 +00:00
|
|
|
buf := restic.GetChunkBuf("BenchmarkEncrypt")
|
2014-11-15 18:34:42 +00:00
|
|
|
for i := 0; i < b.N; i++ {
|
2014-11-23 15:48:00 +00:00
|
|
|
_, err := k.Encrypt(buf, data)
|
2014-11-15 18:34:42 +00:00
|
|
|
ok(b, err)
|
|
|
|
}
|
2014-12-05 20:45:49 +00:00
|
|
|
restic.FreeChunkBuf("BenchmarkEncrypt", buf)
|
2014-11-15 18:34:42 +00:00
|
|
|
}
|
|
|
|
|
2015-02-11 17:36:31 +00:00
|
|
|
func BenchmarkDecryptReader(b *testing.B) {
|
|
|
|
be := setupBackend(b)
|
|
|
|
defer teardownBackend(b, be)
|
|
|
|
k := setupKey(b, be, testPassword)
|
|
|
|
|
|
|
|
size := 8 << 20 // 8MiB
|
|
|
|
buf := get_random(23, size)
|
|
|
|
|
|
|
|
ciphertext := make([]byte, len(buf)+restic.CiphertextExtension)
|
|
|
|
_, err := k.Encrypt(ciphertext, buf)
|
|
|
|
ok(b, err)
|
|
|
|
|
|
|
|
rd := bytes.NewReader(ciphertext)
|
|
|
|
|
|
|
|
b.ResetTimer()
|
|
|
|
b.SetBytes(int64(size))
|
|
|
|
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
|
|
rd.Seek(0, 0)
|
|
|
|
decRd, err := k.DecryptFrom(rd)
|
|
|
|
ok(b, err)
|
|
|
|
|
|
|
|
_, err = io.Copy(ioutil.Discard, decRd)
|
|
|
|
ok(b, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func BenchmarkEncryptDecryptReader(b *testing.B) {
|
|
|
|
be := setupBackend(b)
|
|
|
|
defer teardownBackend(b, be)
|
|
|
|
k := setupKey(b, be, testPassword)
|
|
|
|
|
|
|
|
size := 8 << 20 // 8MiB
|
|
|
|
rd := randomReader(23, size)
|
|
|
|
|
|
|
|
b.ResetTimer()
|
|
|
|
b.SetBytes(int64(size))
|
|
|
|
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
|
|
rd.Seek(0, 0)
|
|
|
|
decRd, err := k.DecryptFrom(k.EncryptFrom(rd))
|
|
|
|
ok(b, err)
|
|
|
|
|
|
|
|
_, err = io.Copy(ioutil.Discard, decRd)
|
|
|
|
ok(b, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-11-15 18:34:42 +00:00
|
|
|
func BenchmarkDecrypt(b *testing.B) {
|
2014-11-23 15:48:00 +00:00
|
|
|
size := 8 << 20 // 8MiB
|
2014-11-15 18:34:42 +00:00
|
|
|
data := make([]byte, size)
|
|
|
|
|
2014-12-21 16:02:49 +00:00
|
|
|
s := setupBackend(b)
|
|
|
|
defer teardownBackend(b, s)
|
|
|
|
k := setupKey(b, s, testPassword)
|
2014-11-15 18:34:42 +00:00
|
|
|
|
2014-12-05 20:45:49 +00:00
|
|
|
ciphertext := restic.GetChunkBuf("BenchmarkDecrypt")
|
2014-11-23 15:48:00 +00:00
|
|
|
n, err := k.Encrypt(ciphertext, data)
|
2014-11-15 18:34:42 +00:00
|
|
|
ok(b, err)
|
|
|
|
|
|
|
|
b.ResetTimer()
|
|
|
|
b.SetBytes(int64(size))
|
|
|
|
|
|
|
|
for i := 0; i < b.N; i++ {
|
2014-11-23 15:48:00 +00:00
|
|
|
_, err := k.Decrypt(ciphertext[:n])
|
2014-11-15 18:34:42 +00:00
|
|
|
ok(b, err)
|
|
|
|
}
|
2014-12-05 20:45:49 +00:00
|
|
|
restic.FreeChunkBuf("BenchmarkDecrypt", ciphertext)
|
2014-09-23 20:39:12 +00:00
|
|
|
}
|
2015-02-11 16:41:11 +00:00
|
|
|
|
|
|
|
func TestHashReader(t *testing.T) {
|
|
|
|
tests := []int{5, 23, 2<<18 + 23, 1 << 20}
|
|
|
|
if *testLargeCrypto {
|
|
|
|
tests = append(tests, 7<<20+123)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, size := range tests {
|
|
|
|
data := make([]byte, size)
|
|
|
|
_, err := io.ReadFull(randomReader(42, size), data)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
expectedHash := sha256.Sum256(data)
|
|
|
|
|
|
|
|
rd := restic.NewHashReader(bytes.NewReader(data), sha256.New())
|
|
|
|
|
|
|
|
target := bytes.NewBuffer(nil)
|
|
|
|
n, err := io.Copy(target, rd)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
assert(t, n == int64(size)+int64(len(expectedHash)),
|
|
|
|
"HashReader: invalid number of bytes read: got %d, expected %d",
|
|
|
|
n, size+len(expectedHash))
|
|
|
|
|
|
|
|
r := target.Bytes()
|
|
|
|
resultingHash := r[len(r)-len(expectedHash):]
|
|
|
|
assert(t, bytes.Equal(expectedHash[:], resultingHash),
|
|
|
|
"HashReader: hashes do not match: expected %02x, got %02x",
|
|
|
|
expectedHash, resultingHash)
|
|
|
|
|
|
|
|
// try to read again, must return io.EOF
|
|
|
|
n2, err := rd.Read(make([]byte, 100))
|
|
|
|
assert(t, n2 == 0, "HashReader returned %d additional bytes", n)
|
|
|
|
assert(t, err == io.EOF, "HashReader returned %v instead of EOF", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestEncryptStreamReader(t *testing.T) {
|
|
|
|
s := setupBackend(t)
|
|
|
|
defer teardownBackend(t, s)
|
|
|
|
k := setupKey(t, s, testPassword)
|
|
|
|
|
|
|
|
tests := []int{5, 23, 2<<18 + 23, 1 << 20}
|
|
|
|
if *testLargeCrypto {
|
|
|
|
tests = append(tests, 7<<20+123)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, size := range tests {
|
|
|
|
data := make([]byte, size)
|
|
|
|
_, err := io.ReadFull(randomReader(42, size), data)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
erd := k.EncryptFrom(bytes.NewReader(data))
|
|
|
|
|
|
|
|
ciphertext, err := ioutil.ReadAll(erd)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
l := len(data) + restic.CiphertextExtension
|
|
|
|
assert(t, len(ciphertext) == l,
|
|
|
|
"wrong ciphertext length: expected %d, got %d",
|
|
|
|
l, len(ciphertext))
|
|
|
|
|
|
|
|
// decrypt with default function
|
|
|
|
plaintext, err := k.Decrypt(ciphertext)
|
|
|
|
ok(t, err)
|
|
|
|
assert(t, bytes.Equal(data, plaintext),
|
|
|
|
"wrong plaintext after decryption: expected %02x, got %02x",
|
|
|
|
data, plaintext)
|
|
|
|
}
|
|
|
|
}
|
2015-02-11 17:36:31 +00:00
|
|
|
|
|
|
|
func TestDecryptStreamReader(t *testing.T) {
|
|
|
|
s := setupBackend(t)
|
|
|
|
defer teardownBackend(t, s)
|
|
|
|
k := setupKey(t, s, testPassword)
|
|
|
|
|
|
|
|
tests := []int{5, 23, 2<<18 + 23, 1 << 20}
|
|
|
|
if *testLargeCrypto {
|
|
|
|
tests = append(tests, 7<<20+123)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, size := range tests {
|
|
|
|
data := make([]byte, size)
|
|
|
|
_, err := io.ReadFull(randomReader(42, size), data)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
ciphertext := make([]byte, size+restic.CiphertextExtension)
|
|
|
|
|
|
|
|
// encrypt with default function
|
|
|
|
n, err := k.Encrypt(ciphertext, data)
|
|
|
|
ok(t, err)
|
|
|
|
assert(t, n == len(data)+restic.CiphertextExtension,
|
|
|
|
"wrong number of bytes returned after encryption: expected %d, got %d",
|
|
|
|
len(data)+restic.CiphertextExtension, n)
|
|
|
|
|
|
|
|
rd, err := k.DecryptFrom(bytes.NewReader(ciphertext))
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
plaintext, err := ioutil.ReadAll(rd)
|
|
|
|
ok(t, err)
|
|
|
|
|
|
|
|
assert(t, bytes.Equal(data, plaintext),
|
|
|
|
"wrong plaintext after decryption: expected %02x, got %02x",
|
|
|
|
data, plaintext)
|
|
|
|
}
|
|
|
|
}
|