File: plainkey_test.go

package info (click to toggle)
snapd 2.72-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 80,412 kB
  • sloc: sh: 16,506; ansic: 16,211; python: 11,213; makefile: 1,919; exp: 190; awk: 58; xml: 22
file content (121 lines) | stat: -rw-r--r-- 3,121 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
// -*- Mode: Go; indent-tabs-mode: t -*-
//go:build !nosecboot

/*
 * Copyright (C) 2024 Canonical Ltd
 *
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 3 as
 * published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 *
 */

package keys_test

import (
	"bytes"
	"crypto"
	"io"
	"os"
	"path/filepath"

	. "gopkg.in/check.v1"

	sb "github.com/snapcore/secboot"

	"github.com/snapcore/snapd/secboot/keys"
)

type plainkeySuite struct {
}

var _ = Suite(&plainkeySuite{})

func (s *plainkeySuite) SetUpTest(c *C) {
}

type MyKeyDataWriter struct {
	*bytes.Buffer
}

func NewMyKeyDataWriter() *MyKeyDataWriter {
	return &MyKeyDataWriter{
		Buffer: bytes.NewBuffer([]byte{}),
	}
}

func (kdw *MyKeyDataWriter) Commit() error {
	return nil
}

type testCase struct {
	nilPrimaryKey bool
}

func (s *plainkeySuite) testPlainKey(c *C, tc *testCase) {
	restore := keys.MockSbNewProtectedKey(func(rand io.Reader, protectorKey []byte, primaryKey sb.PrimaryKey) (protectedKey *sb.KeyData, primaryKeyOut sb.PrimaryKey, unlockKey sb.DiskUnlockKey, err error) {
		if tc.nilPrimaryKey {
			c.Check(primaryKey, IsNil)
			primaryKeyOut = []byte("generated-primary-key")
		} else {
			c.Check(primaryKey, NotNil)
			primaryKeyOut = primaryKey
		}
		kd, err := sb.NewKeyData(&sb.KeyParams{
			Handle:       nil,
			Role:         "run",
			PlatformName: "fakePlatform",
			KDFAlg:       crypto.SHA256,
		})
		c.Assert(err, IsNil)
		return kd, primaryKeyOut, []byte("unlock-key"), nil
	})
	defer restore()

	protectorKey, err := keys.NewProtectorKey()
	c.Assert(err, IsNil)
	var primaryKeyIn []byte
	if !tc.nilPrimaryKey {
		primaryKeyIn = []byte("primary-in")
	}
	protectedKey, primaryKeyOut, unlockKey, err := protectorKey.CreateProtectedKey(primaryKeyIn)
	c.Assert(err, IsNil)
	if tc.nilPrimaryKey {
		c.Check(primaryKeyOut, DeepEquals, []byte("generated-primary-key"))
	} else {
		c.Check(primaryKeyOut, DeepEquals, []byte("primary-in"))
	}
	c.Check(unlockKey, DeepEquals, []byte("unlock-key"))

	kdw := NewMyKeyDataWriter()
	protectedKey.Write(kdw)

	c.Check(string(kdw.Bytes()), Equals, `{"generation":2,"platform_name":"fakePlatform","platform_handle":null,"role":"run","kdf_alg":"sha256","encrypted_payload":null}`+"\n")

	root := c.MkDir()

	path := filepath.Join(root, "somedir", "somefile")
	err = protectorKey.SaveToFile(path)
	c.Assert(err, IsNil)
	savedKey, err := os.ReadFile(path)
	c.Assert(err, IsNil)
	c.Check(savedKey, DeepEquals, []byte(protectorKey))
}

func (s *plainkeySuite) TestPlainKey(c *C) {
	s.testPlainKey(c, &testCase{})
}

func (s *plainkeySuite) TestPlainKeyNilPrimaryKeyIn(c *C) {
	s.testPlainKey(c, &testCase{
		nilPrimaryKey: true,
	})
}