Files
pynkode/test/test_user_cipher_keys.py

39 lines
1.5 KiB
Python

import numpy as np
import pytest
from src.models import KeypadSize
from src.user_cipher import UserCipher, CustomerCipher
@pytest.mark.parametrize(
"passcode_len",
[
6
]
)
def test_encode_decode_base64(passcode_len):
data = np.random.choice(2**16, passcode_len, replace=False)
encoded = UserCipher.encode_base64_str(data)
decoded = UserCipher.decode_base64_str(encoded)
assert (len(data) == len(decoded))
assert (all(data[idx] == decoded[idx] for idx in range(passcode_len)))
@pytest.mark.parametrize(
"keypad_size,max_nkode_len",
[
(KeypadSize(numb_of_keys=10, props_per_key=11), 10),
(KeypadSize(numb_of_keys=9, props_per_key=11), 10),
(KeypadSize(numb_of_keys=8, props_per_key=11), 12),
])
def test_decode_mask(keypad_size, max_nkode_len):
customer = CustomerCipher.create(keypad_size)
passcode_entry = np.random.choice(keypad_size.total_props, 4, replace=False)
passcode_values = [customer.property_key[idx] for idx in passcode_entry]
customer_pos_vals = customer.position_key
user_keys = UserCipher.create(keypad_size, customer_pos_vals, max_nkode_len)
passcode = user_keys.encipher_nkode(passcode_entry, customer)
orig_passcode_pos_vals = customer.get_props_position_vals(passcode_values)
passcode_pos_vals = user_keys.decipher_mask(passcode.mask, customer_pos_vals, len(passcode_entry))
assert (len(passcode_pos_vals) == len(orig_passcode_pos_vals))
assert (all(orig_passcode_pos_vals[idx] == passcode_pos_vals[idx] for idx in range(len(passcode_pos_vals))))