mirror of
https://github.com/octoleo/restic.git
synced 2024-12-27 20:45:19 +00:00
344 lines
7.7 KiB
Go
344 lines
7.7 KiB
Go
package crypto_test
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/rand"
|
|
"io"
|
|
"io/ioutil"
|
|
"testing"
|
|
|
|
"github.com/restic/chunker"
|
|
"github.com/restic/restic/crypto"
|
|
. "github.com/restic/restic/test"
|
|
)
|
|
|
|
const testLargeCrypto = false
|
|
|
|
func TestEncryptDecrypt(t *testing.T) {
|
|
k := crypto.NewRandomKey()
|
|
|
|
tests := []int{5, 23, 2<<18 + 23, 1 << 20}
|
|
if testLargeCrypto {
|
|
tests = append(tests, 7<<20+123)
|
|
}
|
|
|
|
for _, size := range tests {
|
|
data := make([]byte, size)
|
|
_, err := io.ReadFull(RandomReader(42, size), data)
|
|
OK(t, err)
|
|
|
|
buf := make([]byte, size+crypto.Extension)
|
|
|
|
ciphertext, err := crypto.Encrypt(k, buf, data)
|
|
OK(t, err)
|
|
Assert(t, len(ciphertext) == len(data)+crypto.Extension,
|
|
"ciphertext length does not match: want %d, got %d",
|
|
len(data)+crypto.Extension, len(ciphertext))
|
|
|
|
plaintext, err := crypto.Decrypt(k, nil, ciphertext)
|
|
OK(t, err)
|
|
Assert(t, len(plaintext) == len(data),
|
|
"plaintext length does not match: want %d, got %d",
|
|
len(data), len(plaintext))
|
|
|
|
Equals(t, plaintext, data)
|
|
}
|
|
}
|
|
|
|
func TestSmallBuffer(t *testing.T) {
|
|
k := crypto.NewRandomKey()
|
|
|
|
size := 600
|
|
data := make([]byte, size)
|
|
_, err := io.ReadFull(rand.Reader, data)
|
|
OK(t, err)
|
|
|
|
ciphertext := make([]byte, size/2)
|
|
ciphertext, err = crypto.Encrypt(k, ciphertext, data)
|
|
// this must extend the slice
|
|
Assert(t, cap(ciphertext) > size/2,
|
|
"expected extended slice, but capacity is only %d bytes",
|
|
cap(ciphertext))
|
|
|
|
// check for the correct plaintext
|
|
plaintext, err := crypto.Decrypt(k, nil, ciphertext)
|
|
OK(t, err)
|
|
Assert(t, bytes.Equal(plaintext, data),
|
|
"wrong plaintext returned")
|
|
}
|
|
|
|
func TestSameBuffer(t *testing.T) {
|
|
k := crypto.NewRandomKey()
|
|
|
|
size := 600
|
|
data := make([]byte, size)
|
|
_, err := io.ReadFull(rand.Reader, data)
|
|
OK(t, err)
|
|
|
|
ciphertext := make([]byte, 0, size+crypto.Extension)
|
|
|
|
ciphertext, err = crypto.Encrypt(k, ciphertext, data)
|
|
OK(t, err)
|
|
|
|
// use the same buffer for decryption
|
|
ciphertext, err = crypto.Decrypt(k, ciphertext, ciphertext)
|
|
OK(t, err)
|
|
Assert(t, bytes.Equal(ciphertext, data),
|
|
"wrong plaintext returned")
|
|
}
|
|
|
|
func TestCornerCases(t *testing.T) {
|
|
k := crypto.NewRandomKey()
|
|
|
|
// nil plaintext should encrypt to the empty string
|
|
// nil ciphertext should allocate a new slice for the ciphertext
|
|
c, err := crypto.Encrypt(k, nil, nil)
|
|
OK(t, err)
|
|
|
|
Assert(t, len(c) == crypto.Extension,
|
|
"wrong length returned for ciphertext, expected 0, got %d",
|
|
len(c))
|
|
|
|
// this should decrypt to nil
|
|
p, err := crypto.Decrypt(k, nil, c)
|
|
OK(t, err)
|
|
Equals(t, []byte(nil), p)
|
|
|
|
// test encryption for same slice, this should return an error
|
|
_, err = crypto.Encrypt(k, c, c)
|
|
Equals(t, crypto.ErrInvalidCiphertext, err)
|
|
}
|
|
|
|
func TestLargeEncrypt(t *testing.T) {
|
|
if !testLargeCrypto {
|
|
t.SkipNow()
|
|
}
|
|
|
|
k := crypto.NewRandomKey()
|
|
|
|
for _, size := range []int{chunker.MaxSize, chunker.MaxSize + 1, chunker.MaxSize + 1<<20} {
|
|
data := make([]byte, size)
|
|
_, err := io.ReadFull(rand.Reader, data)
|
|
OK(t, err)
|
|
|
|
ciphertext, err := crypto.Encrypt(k, make([]byte, size+crypto.Extension), data)
|
|
OK(t, err)
|
|
|
|
plaintext, err := crypto.Decrypt(k, []byte{}, ciphertext)
|
|
OK(t, err)
|
|
|
|
Equals(t, plaintext, data)
|
|
}
|
|
}
|
|
|
|
func BenchmarkEncryptWriter(b *testing.B) {
|
|
size := 8 << 20 // 8MiB
|
|
rd := RandomReader(23, size)
|
|
|
|
k := crypto.NewRandomKey()
|
|
|
|
b.ResetTimer()
|
|
b.SetBytes(int64(size))
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
rd.Seek(0, 0)
|
|
wr := crypto.EncryptTo(k, ioutil.Discard)
|
|
n, err := io.Copy(wr, rd)
|
|
OK(b, err)
|
|
OK(b, wr.Close())
|
|
Assert(b, n == int64(size),
|
|
"not enough bytes writter: want %d, got %d", size, n)
|
|
}
|
|
}
|
|
|
|
func BenchmarkEncrypt(b *testing.B) {
|
|
size := 8 << 20 // 8MiB
|
|
data := make([]byte, size)
|
|
|
|
k := crypto.NewRandomKey()
|
|
buf := make([]byte, len(data)+crypto.Extension)
|
|
|
|
b.ResetTimer()
|
|
b.SetBytes(int64(size))
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
_, err := crypto.Encrypt(k, buf, data)
|
|
OK(b, err)
|
|
}
|
|
}
|
|
|
|
func BenchmarkDecryptReader(b *testing.B) {
|
|
size := 8 << 20 // 8MiB
|
|
buf := Random(23, size)
|
|
k := crypto.NewRandomKey()
|
|
|
|
ciphertext := make([]byte, len(buf)+crypto.Extension)
|
|
_, err := crypto.Encrypt(k, ciphertext, buf)
|
|
OK(b, err)
|
|
|
|
rd := bytes.NewReader(ciphertext)
|
|
|
|
b.ResetTimer()
|
|
b.SetBytes(int64(size))
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
rd.Seek(0, 0)
|
|
decRd, err := crypto.DecryptFrom(k, rd)
|
|
OK(b, err)
|
|
|
|
_, err = io.Copy(ioutil.Discard, decRd)
|
|
OK(b, err)
|
|
}
|
|
}
|
|
|
|
func BenchmarkEncryptDecryptReader(b *testing.B) {
|
|
k := crypto.NewRandomKey()
|
|
|
|
size := 8 << 20 // 8MiB
|
|
rd := RandomReader(23, size)
|
|
|
|
b.ResetTimer()
|
|
b.SetBytes(int64(size))
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
for i := 0; i < b.N; i++ {
|
|
rd.Seek(0, 0)
|
|
buf.Reset()
|
|
wr := crypto.EncryptTo(k, buf)
|
|
_, err := io.Copy(wr, rd)
|
|
OK(b, err)
|
|
OK(b, wr.Close())
|
|
|
|
r, err := crypto.DecryptFrom(k, buf)
|
|
OK(b, err)
|
|
|
|
_, err = io.Copy(ioutil.Discard, r)
|
|
OK(b, err)
|
|
}
|
|
}
|
|
|
|
func BenchmarkDecrypt(b *testing.B) {
|
|
size := 8 << 20 // 8MiB
|
|
data := make([]byte, size)
|
|
|
|
k := crypto.NewRandomKey()
|
|
|
|
plaintext := make([]byte, size)
|
|
ciphertext := make([]byte, size+crypto.Extension)
|
|
|
|
ciphertext, err := crypto.Encrypt(k, ciphertext, data)
|
|
OK(b, err)
|
|
|
|
b.ResetTimer()
|
|
b.SetBytes(int64(size))
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
plaintext, err = crypto.Decrypt(k, plaintext, ciphertext)
|
|
OK(b, err)
|
|
}
|
|
}
|
|
|
|
func TestEncryptStreamWriter(t *testing.T) {
|
|
k := crypto.NewRandomKey()
|
|
|
|
tests := []int{5, 23, 2<<18 + 23, 1 << 20}
|
|
if testLargeCrypto {
|
|
tests = append(tests, 7<<20+123)
|
|
}
|
|
|
|
for _, size := range tests {
|
|
data := make([]byte, size)
|
|
_, err := io.ReadFull(RandomReader(42, size), data)
|
|
OK(t, err)
|
|
|
|
ciphertext := bytes.NewBuffer(nil)
|
|
wr := crypto.EncryptTo(k, ciphertext)
|
|
|
|
_, err = io.Copy(wr, bytes.NewReader(data))
|
|
OK(t, err)
|
|
OK(t, wr.Close())
|
|
|
|
l := len(data) + crypto.Extension
|
|
Assert(t, len(ciphertext.Bytes()) == l,
|
|
"wrong ciphertext length: expected %d, got %d",
|
|
l, len(ciphertext.Bytes()))
|
|
|
|
// decrypt with default function
|
|
plaintext, err := crypto.Decrypt(k, []byte{}, ciphertext.Bytes())
|
|
OK(t, err)
|
|
Assert(t, bytes.Equal(data, plaintext),
|
|
"wrong plaintext after decryption: expected %02x, got %02x",
|
|
data, plaintext)
|
|
}
|
|
}
|
|
|
|
func TestDecryptStreamReader(t *testing.T) {
|
|
k := crypto.NewRandomKey()
|
|
|
|
tests := []int{5, 23, 2<<18 + 23, 1 << 20}
|
|
if testLargeCrypto {
|
|
tests = append(tests, 7<<20+123)
|
|
}
|
|
|
|
for _, size := range tests {
|
|
data := make([]byte, size)
|
|
_, err := io.ReadFull(RandomReader(42, size), data)
|
|
OK(t, err)
|
|
|
|
ciphertext := make([]byte, size+crypto.Extension)
|
|
|
|
// encrypt with default function
|
|
ciphertext, err = crypto.Encrypt(k, ciphertext, data)
|
|
OK(t, err)
|
|
Assert(t, len(ciphertext) == len(data)+crypto.Extension,
|
|
"wrong number of bytes returned after encryption: expected %d, got %d",
|
|
len(data)+crypto.Extension, len(ciphertext))
|
|
|
|
rd, err := crypto.DecryptFrom(k, bytes.NewReader(ciphertext))
|
|
OK(t, err)
|
|
|
|
plaintext, err := ioutil.ReadAll(rd)
|
|
OK(t, err)
|
|
|
|
Assert(t, bytes.Equal(data, plaintext),
|
|
"wrong plaintext after decryption: expected %02x, got %02x",
|
|
data, plaintext)
|
|
}
|
|
}
|
|
|
|
func TestEncryptWriter(t *testing.T) {
|
|
k := crypto.NewRandomKey()
|
|
|
|
tests := []int{5, 23, 2<<18 + 23, 1 << 20}
|
|
if testLargeCrypto {
|
|
tests = append(tests, 7<<20+123)
|
|
}
|
|
|
|
for _, size := range tests {
|
|
data := make([]byte, size)
|
|
_, err := io.ReadFull(RandomReader(42, size), data)
|
|
OK(t, err)
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
wr := crypto.EncryptTo(k, buf)
|
|
|
|
_, err = io.Copy(wr, bytes.NewReader(data))
|
|
OK(t, err)
|
|
OK(t, wr.Close())
|
|
|
|
ciphertext := buf.Bytes()
|
|
|
|
l := len(data) + crypto.Extension
|
|
Assert(t, len(ciphertext) == l,
|
|
"wrong ciphertext length: expected %d, got %d",
|
|
l, len(ciphertext))
|
|
|
|
// decrypt with default function
|
|
plaintext, err := crypto.Decrypt(k, []byte{}, ciphertext)
|
|
OK(t, err)
|
|
Assert(t, bytes.Equal(data, plaintext),
|
|
"wrong plaintext after decryption: expected %02x, got %02x",
|
|
data, plaintext)
|
|
}
|
|
}
|