2012-08-15 17:01:43 +04:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* Copyright (c) 2012 Sam Tuke <samtuke@owncloud.com>
|
|
|
|
* This file is licensed under the Affero General Public License version 3 or
|
|
|
|
* later.
|
|
|
|
* See the COPYING-README file.
|
|
|
|
*/
|
|
|
|
|
2012-12-12 21:39:43 +04:00
|
|
|
//require_once "PHPUnit/Framework/TestCase.php";
|
2012-08-15 17:01:43 +04:00
|
|
|
require_once realpath( dirname(__FILE__).'/../../../lib/base.php' );
|
2012-12-12 21:39:43 +04:00
|
|
|
require_once realpath( dirname(__FILE__).'/../lib/crypt.php' );
|
|
|
|
require_once realpath( dirname(__FILE__).'/../lib/keymanager.php' );
|
|
|
|
require_once realpath( dirname(__FILE__).'/../lib/proxy.php' );
|
|
|
|
require_once realpath( dirname(__FILE__).'/../lib/stream.php' );
|
|
|
|
require_once realpath( dirname(__FILE__).'/../lib/util.php' );
|
|
|
|
require_once realpath( dirname(__FILE__).'/../appinfo/app.php' );
|
2012-08-15 17:01:43 +04:00
|
|
|
|
2012-11-16 22:31:37 +04:00
|
|
|
use OCA\Encryption;
|
|
|
|
|
2013-01-06 22:38:35 +04:00
|
|
|
// This has to go here because otherwise session errors arise, and the private
|
|
|
|
// encryption key needs to be saved in the session
|
|
|
|
\OC_User::login( 'admin', 'admin' );
|
|
|
|
|
2012-08-15 17:01:43 +04:00
|
|
|
class Test_Keymanager extends \PHPUnit_Framework_TestCase {
|
|
|
|
|
|
|
|
function setUp() {
|
|
|
|
|
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-01-05 21:12:23 +04:00
|
|
|
|
2013-01-06 22:38:35 +04:00
|
|
|
// set content for encrypting / decrypting in tests
|
|
|
|
$this->dataLong = file_get_contents( realpath( dirname(__FILE__).'/../lib/crypt.php' ) );
|
|
|
|
$this->dataShort = 'hats';
|
|
|
|
$this->dataUrl = realpath( dirname(__FILE__).'/../lib/crypt.php' );
|
|
|
|
$this->legacyData = realpath( dirname(__FILE__).'/legacy-text.txt' );
|
|
|
|
$this->legacyEncryptedData = realpath( dirname(__FILE__).'/legacy-encrypted-text.txt' );
|
|
|
|
$this->randomKey = Encryption\Crypt::generateKey();
|
|
|
|
|
|
|
|
$keypair = Encryption\Crypt::createKeypair();
|
|
|
|
$this->genPublicKey = $keypair['publicKey'];
|
|
|
|
$this->genPrivateKey = $keypair['privateKey'];
|
|
|
|
|
|
|
|
$this->view = new \OC_FilesystemView( '/' );
|
|
|
|
|
2013-01-05 21:12:23 +04:00
|
|
|
\OC_User::setUserId( 'admin' );
|
2013-01-06 22:38:35 +04:00
|
|
|
$this->userId = 'admin';
|
|
|
|
$this->pass = 'admin';
|
|
|
|
|
|
|
|
\OC_Filesystem::init( '/' );
|
|
|
|
\OC_Filesystem::mount( 'OC_Filestorage_Local', array('datadir' => \OC_User::getHome($this->userId)), '/' );
|
2012-08-15 17:01:43 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
function tearDown(){
|
|
|
|
|
2012-08-15 17:13:03 +04:00
|
|
|
\OC_FileProxy::$enabled = true;
|
2012-08-15 17:01:43 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-01-05 21:12:23 +04:00
|
|
|
function testGetPrivateKey() {
|
2012-08-15 17:01:43 +04:00
|
|
|
|
2013-01-06 22:38:35 +04:00
|
|
|
$key = Encryption\Keymanager::getPrivateKey( $this->view, $this->userId );
|
2013-01-05 21:12:23 +04:00
|
|
|
|
2013-01-06 22:38:35 +04:00
|
|
|
// Will this length vary? Perhaps we should use a range instead
|
2013-01-05 21:12:23 +04:00
|
|
|
$this->assertEquals( 2296, strlen( $key ) );
|
2012-08-15 17:13:03 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-01-05 21:12:23 +04:00
|
|
|
function testGetPublicKey() {
|
|
|
|
|
2013-01-06 22:38:35 +04:00
|
|
|
$key = Encryption\Keymanager::getPublicKey( $this->view, $this->userId );
|
2013-01-05 21:12:23 +04:00
|
|
|
|
|
|
|
$this->assertEquals( 451, strlen( $key ) );
|
|
|
|
|
|
|
|
$this->assertEquals( '-----BEGIN PUBLIC KEY-----', substr( $key, 0, 26 ) );
|
|
|
|
}
|
|
|
|
|
2012-08-23 19:43:10 +04:00
|
|
|
function testSetFileKey() {
|
|
|
|
|
2013-01-05 21:12:23 +04:00
|
|
|
# NOTE: This cannot be tested until we are able to break out
|
|
|
|
# of the FileSystemView data directory root
|
2012-08-23 19:43:10 +04:00
|
|
|
|
2013-01-14 23:07:28 +04:00
|
|
|
$key = Encryption\Crypt::symmetricEncryptFileContentKeyfile( $this->randomKey, 'hat' );
|
|
|
|
|
|
|
|
$path = 'unittest-'.time().'txt';
|
|
|
|
|
|
|
|
//$view = new \OC_FilesystemView( '/' . $this->userId . '/files_encryption/keyfiles' );
|
|
|
|
|
|
|
|
Encryption\Keymanager::setFileKey( $this->view, $path, $this->userId, $key['key'] );
|
2012-08-23 19:43:10 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-01-06 22:38:35 +04:00
|
|
|
// /**
|
|
|
|
// * @depends testGetPrivateKey
|
|
|
|
// */
|
|
|
|
// function testGetPrivateKey_decrypt() {
|
|
|
|
//
|
|
|
|
// $key = Encryption\Keymanager::getPrivateKey( $this->view, $this->userId );
|
|
|
|
//
|
|
|
|
// # TODO: replace call to Crypt with a mock object?
|
|
|
|
// $decrypted = Encryption\Crypt::symmetricDecryptFileContent( $key, $this->passphrase );
|
|
|
|
//
|
|
|
|
// $this->assertEquals( 1704, strlen( $decrypted ) );
|
|
|
|
//
|
|
|
|
// $this->assertEquals( '-----BEGIN PRIVATE KEY-----', substr( $decrypted, 0, 27 ) );
|
|
|
|
//
|
|
|
|
// }
|
2012-08-15 17:01:43 +04:00
|
|
|
|
2013-01-05 21:12:23 +04:00
|
|
|
function testGetUserKeys() {
|
|
|
|
|
2013-01-06 22:38:35 +04:00
|
|
|
$keys = Encryption\Keymanager::getUserKeys( $this->view, $this->userId );
|
2013-01-05 21:12:23 +04:00
|
|
|
|
|
|
|
$this->assertEquals( 451, strlen( $keys['publicKey'] ) );
|
|
|
|
$this->assertEquals( '-----BEGIN PUBLIC KEY-----', substr( $keys['publicKey'], 0, 26 ) );
|
|
|
|
$this->assertEquals( 2296, strlen( $keys['privateKey'] ) );
|
2012-08-23 19:43:10 +04:00
|
|
|
|
2013-01-05 21:12:23 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
function testGetPublicKeys() {
|
|
|
|
|
|
|
|
# TODO: write me
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
function testGetFileKey() {
|
|
|
|
|
2013-01-06 22:38:35 +04:00
|
|
|
// Encryption\Keymanager::getFileKey( $this->view, $this->userId, $this->filePath );
|
2013-01-05 21:12:23 +04:00
|
|
|
|
|
|
|
}
|
2012-08-23 19:43:10 +04:00
|
|
|
|
2012-08-15 17:01:43 +04:00
|
|
|
}
|