aboutsummaryrefslogtreecommitdiff
path: root/actions/protector_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'actions/protector_test.go')
-rw-r--r--actions/protector_test.go74
1 files changed, 74 insertions, 0 deletions
diff --git a/actions/protector_test.go b/actions/protector_test.go
new file mode 100644
index 0000000..bb59dba
--- /dev/null
+++ b/actions/protector_test.go
@@ -0,0 +1,74 @@
+/*
+ * protector_test.go - tests for creating protectors
+ *
+ * Copyright 2017 Google Inc.
+ * Author: Joe Richey (joerichey@google.com)
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License"); you may not
+ * use this file except in compliance with the License. You may obtain a copy of
+ * the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+ * License for the specific language governing permissions and limitations under
+ * the License.
+ */
+
+package actions
+
+import (
+ "bytes"
+ "errors"
+ "testing"
+
+ . "fscrypt/crypto"
+)
+
+const testProtectorName = "my favorite protector"
+const testProtectorName2 = testProtectorName + "2"
+
+var errCallback = errors.New("bad callback")
+
+func goodCallback(data ProtectorData) (*Key, error) {
+ return NewFixedLengthKeyFromReader(bytes.NewReader(timingPassphrase), len(timingPassphrase))
+}
+
+func badCallback(data ProtectorData) (*Key, error) {
+ return nil, errCallback
+}
+
+// Tests that we can create a valid protector.
+func TestNewProtector(t *testing.T) {
+ ctx, err := makeContext()
+ defer cleaupContext()
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ p, err := ctx.NewProtector(testProtectorName, goodCallback)
+ if err != nil {
+ t.Error(err)
+ } else {
+ p.Wipe()
+ }
+}
+
+// Tests that a failure in the callback is relayed back to the caller.
+func TestBadCallback(t *testing.T) {
+ ctx, err := makeContext()
+ defer cleaupContext()
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ p, err := ctx.NewProtector(testProtectorName, badCallback)
+ if err == nil {
+ p.Wipe()
+ }
+ if err != errCallback {
+ t.Error("callback error was not relayed back to caller")
+ }
+}