Improved coverage
This commit is contained in:
parent
c10a68bd43
commit
406afe08d3
3 changed files with 105 additions and 4 deletions
33
src/dh.rs
33
src/dh.rs
|
@ -10,6 +10,7 @@ use p256::elliptic_curve::ecdh::diffie_hellman;
|
||||||
|
|
||||||
use zeroize::Zeroize;
|
use zeroize::Zeroize;
|
||||||
|
|
||||||
|
#[derive(Clone)]
|
||||||
pub struct DhKeyPair {
|
pub struct DhKeyPair {
|
||||||
pub private_key: SecretKey,
|
pub private_key: SecretKey,
|
||||||
pub public_key: PublicKey,
|
pub public_key: PublicKey,
|
||||||
|
@ -65,7 +66,7 @@ impl Default for DhKeyPair {
|
||||||
impl DhKeyPair {
|
impl DhKeyPair {
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
let secret = SecretKey::random(&mut OsRng);
|
let secret = SecretKey::random(&mut OsRng);
|
||||||
let public = PublicKey::from_secret_scalar(&secret.to_secret_scalar());
|
let public = secret.public_key();
|
||||||
DhKeyPair {
|
DhKeyPair {
|
||||||
private_key: secret,
|
private_key: secret,
|
||||||
public_key: public,
|
public_key: public,
|
||||||
|
@ -92,6 +93,7 @@ pub fn gen_key_pair() -> DhKeyPair {
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
mod tests {
|
mod tests {
|
||||||
use crate::dh::DhKeyPair;
|
use crate::dh::DhKeyPair;
|
||||||
|
use alloc::string::ToString;
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn key_generation() {
|
fn key_generation() {
|
||||||
|
@ -108,4 +110,33 @@ mod tests {
|
||||||
let bob_shared_secret = bob_pair.key_agreement(&alice_pair.public_key);
|
let bob_shared_secret = bob_pair.key_agreement(&alice_pair.public_key);
|
||||||
assert_eq!(alice_shared_secret.as_bytes(), bob_shared_secret.as_bytes())
|
assert_eq!(alice_shared_secret.as_bytes(), bob_shared_secret.as_bytes())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn ex_public_key() {
|
||||||
|
let key_pair = DhKeyPair::new();
|
||||||
|
let public_key_bytes = key_pair.ex_public_key_bytes();
|
||||||
|
let extracted_pk = key_pair.public_key.to_string().as_bytes().to_vec();
|
||||||
|
assert_eq!(extracted_pk, public_key_bytes)
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn nq_key_pair() {
|
||||||
|
let key_pair1 = DhKeyPair::new();
|
||||||
|
let mut key_pair2 = DhKeyPair::new();
|
||||||
|
key_pair2.private_key = key_pair1.private_key.clone();
|
||||||
|
assert_ne!(key_pair1, key_pair2)
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn eq_key_pair() {
|
||||||
|
let key_pair1 = DhKeyPair::new();
|
||||||
|
let key_pair2 = key_pair1.clone();
|
||||||
|
assert_eq!(key_pair1, key_pair2)
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test_format() {
|
||||||
|
let key_pair = DhKeyPair::default();
|
||||||
|
let _str = alloc::format!("{:?}", key_pair);
|
||||||
|
}
|
||||||
}
|
}
|
|
@ -130,9 +130,10 @@ pub fn gen_header() -> Header {
|
||||||
Header::new(&dh_pair, pn, n)
|
Header::new(&dh_pair, pn, n)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
mod tests {
|
mod tests {
|
||||||
use crate::header::{gen_header, Header};
|
use crate::header::{gen_header, Header, ExHeader};
|
||||||
use crate::kdf_chain::gen_mk;
|
use crate::kdf_chain::gen_mk;
|
||||||
use crate::aead::{encrypt, decrypt};
|
use crate::aead::{encrypt, decrypt};
|
||||||
|
|
||||||
|
@ -141,7 +142,7 @@ mod tests {
|
||||||
let ad = b"";
|
let ad = b"";
|
||||||
let header = gen_header();
|
let header = gen_header();
|
||||||
let serialized = header.concat(ad);
|
let serialized = header.concat(ad);
|
||||||
let created = Header::from(serialized);
|
let created = Header::from(serialized.as_slice());
|
||||||
assert_eq!(header, created)
|
assert_eq!(header, created)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -155,4 +156,36 @@ mod tests {
|
||||||
let decrypted = decrypt(&mk, &encrypted, &header_data, &nonce);
|
let decrypted = decrypt(&mk, &encrypted, &header_data, &nonce);
|
||||||
assert_eq!(decrypted, data.to_vec())
|
assert_eq!(decrypted, data.to_vec())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test_eq_header() {
|
||||||
|
let header1 = gen_header();
|
||||||
|
let header2 = gen_header();
|
||||||
|
assert_ne!(header1, header2)
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn debug_header() {
|
||||||
|
let header = gen_header();
|
||||||
|
let _string = alloc::format!("{:?}", header);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn gen_ex_header() {
|
||||||
|
let ex_header = ExHeader {
|
||||||
|
ad: alloc::vec![0],
|
||||||
|
public_key: alloc::vec![1],
|
||||||
|
pn: 0,
|
||||||
|
n: 0
|
||||||
|
};
|
||||||
|
let _string = alloc::format!("{:?}", ex_header);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn dec_header() {
|
||||||
|
let header = gen_header();
|
||||||
|
let (encrypted, nonce) = header.encrypt(&[0; 32], &[0]);
|
||||||
|
let decrypted = Header::decrypt(&Some([1_u8; 32]), &encrypted, &nonce);
|
||||||
|
assert_eq!(None, decrypted)
|
||||||
|
}
|
||||||
}
|
}
|
39
tests/mod.rs
39
tests/mod.rs
|
@ -1,4 +1,5 @@
|
||||||
use double_ratchet_2::ratchet::{Ratchet, RatchetEncHeader};
|
use double_ratchet_2::ratchet::{Ratchet, RatchetEncHeader};
|
||||||
|
extern crate alloc;
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn ratchet_init() {
|
fn ratchet_init() {
|
||||||
|
@ -135,4 +136,40 @@ fn ratchet_ench_decrypt_four() {
|
||||||
let decrypted2 = alice_ratchet.ratchet_decrypt(&header2, &encrypted2, &nonce2, b"");
|
let decrypted2 = alice_ratchet.ratchet_decrypt(&header2, &encrypted2, &nonce2, b"");
|
||||||
let comp_res = decrypted1 == data && decrypted2 == data;
|
let comp_res = decrypted1 == data && decrypted2 == data;
|
||||||
assert!(comp_res)
|
assert!(comp_res)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
#[should_panic]
|
||||||
|
fn ratchet_ench_enc_skip_panic() {
|
||||||
|
let sk = [1; 32];
|
||||||
|
let shared_hka = [2; 32];
|
||||||
|
let shared_nhkb = [3; 32];
|
||||||
|
let (mut bob_ratchet, public_key) = RatchetEncHeader::init_bob(sk,
|
||||||
|
shared_hka,
|
||||||
|
shared_nhkb);
|
||||||
|
let mut alice_ratchet = RatchetEncHeader::init_alice(sk,
|
||||||
|
public_key,
|
||||||
|
shared_hka,
|
||||||
|
shared_nhkb);
|
||||||
|
let data = include_bytes!("../src/header.rs").to_vec();
|
||||||
|
let mut headers = alloc::vec![];
|
||||||
|
let mut encrypteds = alloc::vec![];
|
||||||
|
let mut nonces = alloc::vec![];
|
||||||
|
let mut decrypteds = alloc::vec![];
|
||||||
|
for _ in 0..200 {
|
||||||
|
let (header, encrypted, nonce) = alice_ratchet.ratchet_encrypt(&data, b"");
|
||||||
|
headers.push(header);
|
||||||
|
encrypteds.push(encrypted);
|
||||||
|
nonces.push(nonce);
|
||||||
|
}
|
||||||
|
headers.reverse();
|
||||||
|
encrypteds.reverse();
|
||||||
|
nonces.reverse();
|
||||||
|
for idx in 0..200 {
|
||||||
|
let header = headers.get(idx).unwrap();
|
||||||
|
let encrypted = encrypteds.get(idx).unwrap();
|
||||||
|
let nonce = nonces.get(idx).unwrap();
|
||||||
|
let decrypted = bob_ratchet.ratchet_decrypt(header, encrypted, nonce, b"");
|
||||||
|
decrypteds.push(decrypted);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in a new issue