summaryrefslogtreecommitdiff
path: root/service/test
diff options
context:
space:
mode:
authorVictor Shyba <victor.shyba@gmail.com>2015-01-16 11:27:03 -0300
committerVictor Shyba <victor.shyba@gmail.com>2015-01-16 11:27:03 -0300
commit784e654a0e636a5e79392f82fa2108e62e8c4e29 (patch)
tree63bc22c07687335a00ee23019642e7a1fa6f01e6 /service/test
parent49d8fceae1219bc74dc49f2ee3d6b5c0cc8bbf0f (diff)
parentcd8e4665136873a40d8726541fed4560aadd3d74 (diff)
Merge pull request #231 from pixelated-project/MAC_on_encrypted_storage_227
#227 - MAC on encrypted storage
Diffstat (limited to 'service/test')
-rw-r--r--service/test/support/integration/app_test_client.py2
-rw-r--r--service/test/unit/support/__init__.py0
-rw-r--r--service/test/unit/support/encrypted_file_storage_test.py64
3 files changed, 65 insertions, 1 deletions
diff --git a/service/test/support/integration/app_test_client.py b/service/test/support/integration/app_test_client.py
index c577d881..893ec57f 100644
--- a/service/test/support/integration/app_test_client.py
+++ b/service/test/support/integration/app_test_client.py
@@ -51,7 +51,7 @@ class AppTestClient:
self.app = pixelated.runserver.app
self.soledad_querier = SoledadQuerier(self.soledad)
- self.soledad_querier.get_index_masterkey = lambda: 'h\xbcpC\xb1\xafc\x92\xf3\xa1v\x1fa\x9dlA\x1a\xf7\xcf\xf2\nG\xad4\xb8m\x01\xf5\xa0\xa9\xd8\xca'
+ self.soledad_querier.get_index_masterkey = lambda: '\xde3?\x87\xff\xd9\xd3\x14\xf0\xa7>\x1f%C{\x16.\\\xae\x8c\x13\xa7\xfb\x04\xd4]+\x8d_\xed\xd1\x8d\x0bI\x8a\x0e\xa4tm\xab\xbf\xb4\xa5\x99\x00d\xd5w\x9f\x18\xbc\x1d\xd4_W\xd2\xb6\xe8H\x83\x1b\xd8\x9d\xad'
self.account = SoledadBackedAccount('test', self.soledad, MagicMock())
self.mailboxes = Mailboxes(self.account, self.soledad_querier)
diff --git a/service/test/unit/support/__init__.py b/service/test/unit/support/__init__.py
new file mode 100644
index 00000000..e69de29b
--- /dev/null
+++ b/service/test/unit/support/__init__.py
diff --git a/service/test/unit/support/encrypted_file_storage_test.py b/service/test/unit/support/encrypted_file_storage_test.py
new file mode 100644
index 00000000..2a6735c3
--- /dev/null
+++ b/service/test/unit/support/encrypted_file_storage_test.py
@@ -0,0 +1,64 @@
+#
+# Copyright (c) 2014 ThoughtWorks, Inc.
+#
+# Pixelated is free software: you can redistribute it and/or modify
+# it under the terms of the GNU Affero General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Pixelated is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU Affero General Public License for more details.
+#
+# You should have received a copy of the GNU Affero General Public License
+# along with Pixelated. If not, see <http://www.gnu.org/licenses/>.
+import os
+import shutil
+import unittest
+from pixelated.support.encrypted_file_storage import EncryptedFileStorage
+
+
+class EncryptedFileStorageTest(unittest.TestCase):
+
+ def setUp(self):
+ self.key = '2\x06\xf87F:\xd2\xe2]w\xc9\x0c\xb8\x9b\x8e\xd3\x92\t\xabHu\xa6\xa3\x9a\x8d\xec\x0c\xab<8\xbb\x12\xfbP\xf2\x83"\xa1\xcf7\x92\xb0!\xfe\xebM\x80\x8a\x14\xe6\xf9xr\xf5#\x8f\x1bs\xb3#\x0e)a\xd8'
+ self.msg = 'this is a very, very secret binary message: \xbe\xba\xca\xfe'
+ self.path = os.path.join('tmp', 'search_test')
+ self.storage = EncryptedFileStorage(self.path, self.key)
+
+ def tearDown(self):
+ if os.path.exists(self.path):
+ shutil.rmtree(self.path)
+
+ def test_encrypt_decrypt(self):
+ storage, msg = self.storage, self.msg
+
+ ciphertext = storage.encrypt(msg)
+
+ self.assertNotEquals(msg, ciphertext)
+ self.assertEquals(msg, storage.decrypt(ciphertext))
+
+ def test_mac_against_appended_garbage(self):
+ storage, msg = self.storage, self.msg
+
+ ciphertext = storage.encrypt(msg)
+ corrupted_ciphertext = ciphertext + 'garbage'
+
+ try:
+ storage.decrypt(corrupted_ciphertext)
+ self.fail('MAC is not detecting appended garbage on ciphertext')
+ except:
+ pass
+
+ def test_mac_against_modified_file(self):
+ storage, msg = self.storage, self.msg
+
+ ciphertext = storage.encrypt(msg)
+ corrupted_ciphertext = ''.join([chr(ord(i) >> 1) for i in ciphertext])
+
+ try:
+ storage.decrypt(corrupted_ciphertext)
+ self.fail('MAC is not detecting corrupt ciphertext')
+ except:
+ pass