aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/key_store_test.go
diff options
context:
space:
mode:
authorGustav Simonsson <gustav.simonsson@gmail.com>2014-12-31 22:39:33 +0800
committerGustav Simonsson <gustav.simonsson@gmail.com>2015-01-16 02:40:10 +0800
commit945798f913d5cabd79635f45045b680b02396bf9 (patch)
treeb41751b7f2c1f48a5494090c69233736f772924b /crypto/key_store_test.go
parentbb55307a9d8fa73b0fbc0727f8b80925a87627b7 (diff)
downloaddexon-945798f913d5cabd79635f45045b680b02396bf9.tar.gz
dexon-945798f913d5cabd79635f45045b680b02396bf9.tar.zst
dexon-945798f913d5cabd79635f45045b680b02396bf9.zip
Add new key_store interface and two new key stores
* Add new generic key_store interface * Add new plaintext key store storing unprotected keys on disk * Add new encrypted key store storing encrypted keys on disk * Add new entropy mixing function using OS and go runtime sources
Diffstat (limited to 'crypto/key_store_test.go')
-rw-r--r--crypto/key_store_test.go118
1 files changed, 118 insertions, 0 deletions
diff --git a/crypto/key_store_test.go b/crypto/key_store_test.go
new file mode 100644
index 000000000..412735444
--- /dev/null
+++ b/crypto/key_store_test.go
@@ -0,0 +1,118 @@
+package crypto
+
+import (
+ "fmt"
+ "reflect"
+ "testing"
+)
+
+func TestKeyStorePlaintext(t *testing.T) {
+ ks := new(KeyStorePlaintext)
+ ks.keysDirPath = DefaultDataDir()
+ pass := "" // not used but required by API
+ k1, err := ks.GenerateNewKey(pass)
+ if err != nil {
+ fmt.Println(err.Error())
+ t.FailNow()
+ }
+
+ k2 := new(Key)
+ k2, err = ks.GetKey(k1.Id, pass)
+ if err != nil {
+ fmt.Println(err.Error())
+ t.FailNow()
+ }
+
+ if !reflect.DeepEqual(k1.Id, k2.Id) {
+ fmt.Println("key Id mismatch")
+ t.FailNow()
+ }
+
+ if k1.Flags != k2.Flags {
+ fmt.Println("key Flags mismatch")
+ t.FailNow()
+ }
+
+ if !reflect.DeepEqual(k1.PrivateKey, k2.PrivateKey) {
+ fmt.Println("key PrivateKey mismatch")
+ t.FailNow()
+ }
+
+ err = ks.DeleteKey(k2.Id, pass)
+ if err != nil {
+ fmt.Println(err.Error())
+ t.FailNow()
+ }
+}
+
+func TestKeyStorePassphrase(t *testing.T) {
+ ks := new(KeyStorePassphrase)
+ ks.keysDirPath = DefaultDataDir()
+ pass := "foo"
+ k1, err := ks.GenerateNewKey(pass)
+ if err != nil {
+ fmt.Println(err.Error())
+ t.FailNow()
+ }
+
+ k2 := new(Key)
+ k2, err = ks.GetKey(k1.Id, pass)
+ if err != nil {
+ fmt.Println(err.Error())
+ t.FailNow()
+ }
+
+ if !reflect.DeepEqual(k1.Id, k2.Id) {
+ fmt.Println("key Id mismatch")
+ t.FailNow()
+ }
+
+ if k1.Flags != k2.Flags {
+ fmt.Println("key Flags mismatch")
+ t.FailNow()
+ }
+
+ if !reflect.DeepEqual(k1.PrivateKey, k2.PrivateKey) {
+ fmt.Println("key PrivateKey mismatch")
+ t.FailNow()
+ }
+
+ err = ks.DeleteKey(k2.Id, pass) // also to clean up created files
+ if err != nil {
+ fmt.Println(err.Error())
+ t.FailNow()
+ }
+}
+
+func TestKeyStorePassphraseDecryptionFail(t *testing.T) {
+ ks := new(KeyStorePassphrase)
+ ks.keysDirPath = DefaultDataDir()
+ pass := "foo"
+ k1, err := ks.GenerateNewKey(pass)
+ if err != nil {
+ fmt.Println(err.Error())
+ t.FailNow()
+ }
+
+ _, err = ks.GetKey(k1.Id, "bar") // wrong passphrase
+ // fmt.Println(err.Error())
+ if err == nil {
+ t.FailNow()
+ }
+
+ err = ks.DeleteKey(k1.Id, "bar") // wrong passphrase
+ if err == nil {
+ fmt.Println(err.Error())
+ t.FailNow()
+ }
+
+ err = ks.DeleteKey(k1.Id, pass) // to clean up
+ if err != nil {
+ fmt.Println(err.Error())
+ t.FailNow()
+ }
+}
+
+func TestKeyMixedEntropy(t *testing.T) {
+ GetEntropyTinFoilHat()
+}