#include "crypto_core.h" #include #include #include #include #include "crypto_core_test_util.hh" #include "mem_test_util.hh" #include "util.h" namespace { using HmacKey = std::array; using Hmac = std::array; using SecretKey = std::array; using Signature = std::array; using Nonce = std::array; TEST(PkEqual, TwoRandomIdsAreNotEqual) { std::mt19937 rng; std::uniform_int_distribution dist{0, UINT8_MAX}; uint8_t pk1[CRYPTO_PUBLIC_KEY_SIZE]; uint8_t pk2[CRYPTO_PUBLIC_KEY_SIZE]; std::generate(std::begin(pk1), std::end(pk1), [&]() { return dist(rng); }); std::generate(std::begin(pk2), std::end(pk2), [&]() { return dist(rng); }); EXPECT_FALSE(pk_equal(pk1, pk2)); } TEST(PkEqual, IdCopyMakesKeysEqual) { std::mt19937 rng; std::uniform_int_distribution dist{0, UINT8_MAX}; uint8_t pk1[CRYPTO_PUBLIC_KEY_SIZE]; uint8_t pk2[CRYPTO_PUBLIC_KEY_SIZE] = {0}; std::generate(std::begin(pk1), std::end(pk1), [&]() { return dist(rng); }); pk_copy(pk2, pk1); EXPECT_TRUE(pk_equal(pk1, pk2)); } TEST(CryptoCore, EncryptLargeData) { Test_Memory mem; Test_Random rng; Nonce nonce{}; PublicKey pk; SecretKey sk; crypto_new_keypair(rng, pk.data(), sk.data()); // 100 MiB of data (all zeroes, doesn't matter what's inside). std::vector plain(100 * 1024 * 1024); std::vector encrypted(plain.size() + CRYPTO_MAC_SIZE); encrypt_data( mem, pk.data(), sk.data(), nonce.data(), plain.data(), plain.size(), encrypted.data()); } TEST(CryptoCore, IncrementNonce) { Nonce nonce{}; increment_nonce(nonce.data()); EXPECT_EQ( nonce, (Nonce{{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}})); for (int i = 0; i < 0x1F4; ++i) { increment_nonce(nonce.data()); } EXPECT_EQ(nonce, (Nonce{{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x01, 0xF5}})); } TEST(CryptoCore, IncrementNonceNumber) { Nonce nonce{}; increment_nonce_number(nonce.data(), 0x1F5); EXPECT_EQ(nonce, (Nonce{{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x01, 0xF5}})); increment_nonce_number(nonce.data(), 0x1F5); EXPECT_EQ(nonce, (Nonce{{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x03, 0xEA}})); increment_nonce_number(nonce.data(), 0x12345678); EXPECT_EQ(nonce, (Nonce{ {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x12, 0x34, 0x5A, 0x62}})); } TEST(CryptoCore, Signatures) { Test_Random rng; Extended_Public_Key pk; Extended_Secret_Key sk; EXPECT_TRUE(create_extended_keypair(&pk, &sk, rng)); std::vector message{0}; message.clear(); // Try a few different sizes, including empty 0 length message. for (uint8_t i = 0; i < 100; ++i) { Signature signature; EXPECT_TRUE(crypto_signature_create( signature.data(), message.data(), message.size(), get_sig_sk(&sk))); EXPECT_TRUE(crypto_signature_verify( signature.data(), message.data(), message.size(), get_sig_pk(&pk))); message.push_back(random_u08(rng)); } } TEST(CryptoCore, Hmac) { Test_Random rng; HmacKey sk; new_hmac_key(rng, sk.data()); std::vector message{0}; message.clear(); // Try a few different sizes, including empty 0 length message. for (uint8_t i = 0; i < 100; ++i) { Hmac auth; crypto_hmac(auth.data(), sk.data(), message.data(), message.size()); EXPECT_TRUE(crypto_hmac_verify(auth.data(), sk.data(), message.data(), message.size())); message.push_back(random_u08(rng)); } } } // namespace