@@ -28,8 +28,8 @@ const TEncryptionKey& SelectKey(const TString& alg) {
28
28
Y_UNIT_TEST_SUITE (EncryptedFileSerializerTest) {
29
29
Y_UNIT_TEST (SerializeWholeFileAtATime) {
30
30
TEncryptionIV iv = TEncryptionIV::Generate ();
31
- TBuffer fileData = TEncryptedFileSerializer::EncryptFile (" aes-128_gcm" , Key16, iv, " short data file" );
32
- TBuffer data = TEncryptedFileDeserializer::DecryptFile (Key16, iv, fileData);
31
+ TBuffer fileData = TEncryptedFileSerializer::EncryptFullFile (" aes-128_gcm" , Key16, iv, " short data file" );
32
+ TBuffer data = TEncryptedFileDeserializer::DecryptFullFile (Key16, iv, fileData);
33
33
TString dataStr;
34
34
data.AsString (dataStr);
35
35
UNIT_ASSERT_STRINGS_EQUAL (dataStr, " short data file" );
@@ -50,9 +50,9 @@ Y_UNIT_TEST_SUITE(EncryptedFileSerializerTest) {
50
50
51
51
Y_UNIT_TEST (WrongParametersForDeserializer) {
52
52
TEncryptionIV iv = TEncryptionIV::Generate ();
53
- TBuffer testData = TEncryptedFileSerializer::EncryptFile (" chacha-20-poly1305" , Key32, iv, " test data" );
53
+ TBuffer testData = TEncryptedFileSerializer::EncryptFullFile (" chacha-20-poly1305" , Key32, iv, " test data" );
54
54
UNIT_ASSERT_EXCEPTION_CONTAINS (TEncryptedFileDeserializer::DecryptFile (Key16, testData), yexception, " Invalid key length 16. Expected: 32" );
55
- UNIT_ASSERT_EXCEPTION_CONTAINS (TEncryptedFileDeserializer::DecryptFile (Key16, TEncryptionIV::Generate (), testData), yexception, " File is corrupted" );
55
+ UNIT_ASSERT_EXCEPTION_CONTAINS (TEncryptedFileDeserializer::DecryptFullFile (Key16, TEncryptionIV::Generate (), testData), yexception, " File is corrupted" );
56
56
}
57
57
58
58
Y_UNIT_TEST (SplitOnBlocks) {
@@ -119,7 +119,7 @@ Y_UNIT_TEST_SUITE(EncryptedFileSerializerTest) {
119
119
120
120
Y_UNIT_TEST (EmptyFile) {
121
121
TEncryptionIV iv = TEncryptionIV::Generate ();
122
- TBuffer fileData = TEncryptedFileSerializer::EncryptFile (" aes-128_gcm" , Key16, iv, TStringBuf ());
122
+ TBuffer fileData = TEncryptedFileSerializer::EncryptFullFile (" aes-128_gcm" , Key16, iv, TStringBuf ());
123
123
124
124
auto [buffer, headerIV] = TEncryptedFileDeserializer::DecryptFile (Key16, fileData);
125
125
UNIT_ASSERT_VALUES_EQUAL (buffer.Size (), 0 );
@@ -138,7 +138,7 @@ Y_UNIT_TEST_SUITE(EncryptedFileSerializerTest) {
138
138
Y_UNIT_TEST (ReadPartial) {
139
139
for (const TString& alg : Algorithms) {
140
140
TEncryptionIV iv = TEncryptionIV::Generate ();
141
- TBuffer fileData = TEncryptedFileSerializer::EncryptFile (alg, SelectKey (alg), iv, " encrypted text" );
141
+ TBuffer fileData = TEncryptedFileSerializer::EncryptFullFile (alg, SelectKey (alg), iv, " encrypted text" );
142
142
143
143
TBuffer allButLastBlock (fileData.Data (), fileData.Size () - 20 );
144
144
TBuffer lastBlock (fileData.Data () + fileData.Size () - 20 , 20 );
@@ -156,14 +156,14 @@ Y_UNIT_TEST_SUITE(EncryptedFileSerializerTest) {
156
156
157
157
Y_UNIT_TEST (DeleteLastByte) {
158
158
TEncryptionIV iv = TEncryptionIV::Generate ();
159
- TBuffer fileData = TEncryptedFileSerializer::EncryptFile (" aes-256_gcm" , Key32, iv, " short data file" );
159
+ TBuffer fileData = TEncryptedFileSerializer::EncryptFullFile (" aes-256_gcm" , Key32, iv, " short data file" );
160
160
fileData.Resize (fileData.Size () - 1 );
161
161
UNIT_ASSERT_EXCEPTION_CONTAINS (TEncryptedFileDeserializer::DecryptFile (Key32, fileData), yexception, " File is corrupted" );
162
162
}
163
163
164
164
Y_UNIT_TEST (AddByte) {
165
165
TEncryptionIV iv = TEncryptionIV::Generate ();
166
- TBuffer fileData = TEncryptedFileSerializer::EncryptFile (" aes-256_gcm" , Key32, iv, " short data file" );
166
+ TBuffer fileData = TEncryptedFileSerializer::EncryptFullFile (" aes-256_gcm" , Key32, iv, " short data file" );
167
167
fileData.Resize (fileData.Size () + 1 );
168
168
UNIT_ASSERT_EXCEPTION_CONTAINS (TEncryptedFileDeserializer::DecryptFile (Key32, fileData), yexception, " File is corrupted" );
169
169
@@ -183,7 +183,7 @@ Y_UNIT_TEST_SUITE(EncryptedFileSerializerTest) {
183
183
Y_UNIT_TEST (RemoveLastBlock) {
184
184
for (const TString& alg : Algorithms) {
185
185
TEncryptionIV iv = TEncryptionIV::Generate ();
186
- TBuffer fileData = TEncryptedFileSerializer::EncryptFile (alg, SelectKey (alg), iv, " encrypted text" );
186
+ TBuffer fileData = TEncryptedFileSerializer::EncryptFullFile (alg, SelectKey (alg), iv, " encrypted text" );
187
187
188
188
fileData.Resize (fileData.Size () - 20 ); // remove last block
189
189
TEncryptedFileDeserializer deserializer (SelectKey (alg));
@@ -201,7 +201,7 @@ Y_UNIT_TEST_SUITE(EncryptedFileSerializerTest) {
201
201
Y_UNIT_TEST (ChangeAnyByte) {
202
202
for (const TString& alg : Algorithms) {
203
203
TEncryptionIV iv = TEncryptionIV::Generate ();
204
- TBuffer fileData = TEncryptedFileSerializer::EncryptFile (alg, SelectKey (alg), iv, " test text" );
204
+ TBuffer fileData = TEncryptedFileSerializer::EncryptFullFile (alg, SelectKey (alg), iv, " test text" );
205
205
for (size_t i = 0 ; i < fileData.Size (); ++i) {
206
206
TBuffer modified = fileData;
207
207
modified.Data ()[i] ^= 1 ;
@@ -212,7 +212,7 @@ Y_UNIT_TEST_SUITE(EncryptedFileSerializerTest) {
212
212
213
213
Y_UNIT_TEST (BigHeaderSize) {
214
214
TEncryptionIV iv = TEncryptionIV::Generate ();
215
- TBuffer fileData = TEncryptedFileSerializer::EncryptFile (" AES-128-GCM" , Key16, iv, " test text" );
215
+ TBuffer fileData = TEncryptedFileSerializer::EncryptFullFile (" AES-128-GCM" , Key16, iv, " test text" );
216
216
// Make header big
217
217
fileData.Data ()[0 ] = char (-1 );
218
218
UNIT_ASSERT_EXCEPTION_CONTAINS (TEncryptedFileDeserializer::DecryptFile (Key16, fileData), yexception, " File is corrupted" );
@@ -239,7 +239,7 @@ Y_UNIT_TEST_SUITE(EncryptedFileSerializerTest) {
239
239
Y_UNIT_TEST (BigBlockSize) {
240
240
TEncryptionIV iv = TEncryptionIV::Generate ();
241
241
TStringBuf srcText = " File with too big block size" ;
242
- TBuffer fileData = TEncryptedFileSerializer::EncryptFile (" AES-256-GCM" , Key32, iv, srcText);
242
+ TBuffer fileData = TEncryptedFileSerializer::EncryptFullFile (" AES-256-GCM" , Key32, iv, srcText);
243
243
size_t blockSizePos = fileData.Size () - 20 /* last block with MAC */ - 16 /* MAC */ - srcText.size () - 4 /* sizeof(size) */ ;
244
244
UNIT_ASSERT_LT (blockSizePos, fileData.Size () - 4 );
245
245
uint32_t * size = reinterpret_cast <uint32_t *>(fileData.Data () + blockSizePos);
0 commit comments