summaryrefslogtreecommitdiffstats
path: root/apps/files_encryption/tests
diff options
context:
space:
mode:
Diffstat (limited to 'apps/files_encryption/tests')
-rwxr-xr-xapps/files_encryption/tests/crypt.php67
-rw-r--r--apps/files_encryption/tests/proxy.php19
2 files changed, 57 insertions, 29 deletions
diff --git a/apps/files_encryption/tests/crypt.php b/apps/files_encryption/tests/crypt.php
index 09347dd578a..f72f15ca236 100755
--- a/apps/files_encryption/tests/crypt.php
+++ b/apps/files_encryption/tests/crypt.php
@@ -21,6 +21,10 @@ require_once realpath( dirname(__FILE__).'/../appinfo/app.php' );
use OCA\Encryption;
+// This has to go here because otherwise session errors arise, and the private
+// encryption key needs to be saved in the session
+\OC_User::login( 'admin', 'admin' );
+
class Test_Crypt extends \PHPUnit_Framework_TestCase {
function setUp() {
@@ -41,8 +45,6 @@ class Test_Crypt extends \PHPUnit_Framework_TestCase {
$this->userId = 'admin';
$this->pass = 'admin';
-
- \OC_User::setUserId( $this->userId );
}
@@ -434,6 +436,7 @@ class Test_Crypt extends \PHPUnit_Framework_TestCase {
}
+ // What is the point of this test? It doesn't use keyEncryptKeyfile()
function testKeyEncryptKeyfile() {
# TODO: Don't repeat encryption from previous tests, use PHPUnit test interdependency instead
@@ -456,6 +459,22 @@ class Test_Crypt extends \PHPUnit_Framework_TestCase {
$this->assertEquals( $this->dataUrl, $decryptData );
}
+
+ /**
+ * @brief test functionality of keyEncryptKeyfile() and
+ * keyDecryptKeyfile()
+ */
+ function testKeyDecryptKeyfile() {
+
+ $encrypted = Encryption\Crypt::keyEncryptKeyfile( $this->dataShort, $this->genPublicKey );
+
+ $this->assertNotEquals( $encrypted['data'], $this->dataShort );
+
+ $decrypted = Encryption\Crypt::keyDecryptKeyfile( $encrypted['data'], $encrypted['key'], $this->genPrivateKey );
+
+ $this->assertEquals( $decrypted, $this->dataShort );
+
+ }
/**
@@ -474,17 +493,17 @@ class Test_Crypt extends \PHPUnit_Framework_TestCase {
}
- /**
- * @brief test decryption using legacy blowfish method
- * @depends testLegacyEncryptShort
- */
- function testLegacyDecryptShort( $crypted ) {
-
- $decrypted = Encryption\Crypt::legacyDecrypt( $crypted, $this->pass );
-
- $this->assertEquals( $this->dataShort, $decrypted );
-
- }
+// /**
+// * @brief test decryption using legacy blowfish method
+// * @depends testLegacyEncryptShort
+// */
+// function testLegacyDecryptShort( $crypted ) {
+//
+// $decrypted = Encryption\Crypt::legacyDecrypt( $crypted, $this->pass );
+//
+// $this->assertEquals( $this->dataShort, $decrypted );
+//
+// }
/**
* @brief test encryption using legacy blowfish method
@@ -502,17 +521,17 @@ class Test_Crypt extends \PHPUnit_Framework_TestCase {
}
- /**
- * @brief test decryption using legacy blowfish method
- * @depends testLegacyEncryptLong
- */
- function testLegacyDecryptLong( $crypted ) {
-
- $decrypted = Encryption\Crypt::legacyDecrypt( $crypted, $this->pass );
-
- $this->assertEquals( $this->dataLong, $decrypted );
-
- }
+// /**
+// * @brief test decryption using legacy blowfish method
+// * @depends testLegacyEncryptLong
+// */
+// function testLegacyDecryptLong( $crypted ) {
+//
+// $decrypted = Encryption\Crypt::legacyDecrypt( $crypted, $this->pass );
+//
+// $this->assertEquals( $this->dataLong, $decrypted );
+//
+// }
/**
* @brief test generation of legacy encryption key
diff --git a/apps/files_encryption/tests/proxy.php b/apps/files_encryption/tests/proxy.php
index 8b2c92c2f53..87151234e0e 100644
--- a/apps/files_encryption/tests/proxy.php
+++ b/apps/files_encryption/tests/proxy.php
@@ -45,10 +45,17 @@ class Test_Util extends \PHPUnit_Framework_TestCase {
$this->data1 = file_get_contents( realpath( dirname(__FILE__).'/../../../data/admin/files/enc-test.txt' ) );
+ \OC_FileProxy::$enabled = false;
+ $this->Encdata1 = file_get_contents( realpath( dirname(__FILE__).'/../../../data/admin/files/enc-test.txt' ) );
+ \OC_FileProxy::$enabled = true;
+
$this->userId = 'admin';
$this->pass = 'admin';
-$_SESSION['enckey'] = '-----BEGIN PRIVATE KEY-----
+ $this->session = new Encryption\Session();
+
+$this->session->setPrivateKey(
+'-----BEGIN PRIVATE KEY-----
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDiH3EA4EpFA7Fx
s2dyyfL5jwXeYXrTqQJ6DqKgGn8VsbT3eu8R9KzM2XitVwZe8c8L52DvJ06o5vg0
GqPYxilFdOFJe/ggac5Tq8UmJiZS4EqYEMwxBIfIyWTxeGV06/0HOwnVAkqHMcBz
@@ -76,7 +83,9 @@ k1kbgyS7KKB7opVxI5+ChEqyUDijS3Y9FZixrRIWE6i2uGu86UG+v2lbKvSbM4Qm
xvbOcX9OVMnlRb7n8woOP10UMY+ZE2x+YEUXQTLtPYq7F66e1OfxltstMxLQA+3d
Y1d5piFV8PXK3Fg2F+Cj5qg=
-----END PRIVATE KEY-----
-';
+'
+, $this->userId
+);
\OC_User::setUserId( $this->userId );
@@ -113,11 +122,11 @@ Y1d5piFV8PXK3Fg2F+Cj5qg=
//
// $this->oldConfig=OCP\Config::getAppValue('files_encryption','enable_encryption','true');
// OCP\Config::setAppValue('files_encryption','enable_encryption','true');
-// $this->oldKey=isset($_SESSION['enckey'])?$_SESSION['enckey']:null;
+// $this->oldKey=isset($_SESSION['privateKey'])?$_SESSION['privateKey']:null;
//
//
// //set testing key
-// $_SESSION['enckey']=md5(time());
+// $_SESSION['privateKey']=md5(time());
//
// //clear all proxies and hooks so we can do clean testing
// OC_FileProxy::clearProxies();
@@ -141,7 +150,7 @@ Y1d5piFV8PXK3Fg2F+Cj5qg=
// public function tearDown(){
// OCP\Config::setAppValue('files_encryption','enable_encryption',$this->oldConfig);
// if(!is_null($this->oldKey)){
-// $_SESSION['enckey']=$this->oldKey;
+// $_SESSION['privateKey']=$this->oldKey;
// }
// }
//