Improved coverage

This commit is contained in:
Hannes 2021-06-18 15:15:55 +02:00
parent c10a68bd43
commit 406afe08d3
3 changed files with 105 additions and 4 deletions

View file

@ -10,6 +10,7 @@ use p256::elliptic_curve::ecdh::diffie_hellman;
use zeroize::Zeroize;
#[derive(Clone)]
pub struct DhKeyPair {
pub private_key: SecretKey,
pub public_key: PublicKey,
@ -65,7 +66,7 @@ impl Default for DhKeyPair {
impl DhKeyPair {
pub fn new() -> Self {
let secret = SecretKey::random(&mut OsRng);
let public = PublicKey::from_secret_scalar(&secret.to_secret_scalar());
let public = secret.public_key();
DhKeyPair {
private_key: secret,
public_key: public,
@ -92,6 +93,7 @@ pub fn gen_key_pair() -> DhKeyPair {
#[cfg(test)]
mod tests {
use crate::dh::DhKeyPair;
use alloc::string::ToString;
#[test]
fn key_generation() {
@ -108,4 +110,33 @@ mod tests {
let bob_shared_secret = bob_pair.key_agreement(&alice_pair.public_key);
assert_eq!(alice_shared_secret.as_bytes(), bob_shared_secret.as_bytes())
}
#[test]
fn ex_public_key() {
let key_pair = DhKeyPair::new();
let public_key_bytes = key_pair.ex_public_key_bytes();
let extracted_pk = key_pair.public_key.to_string().as_bytes().to_vec();
assert_eq!(extracted_pk, public_key_bytes)
}
#[test]
fn nq_key_pair() {
let key_pair1 = DhKeyPair::new();
let mut key_pair2 = DhKeyPair::new();
key_pair2.private_key = key_pair1.private_key.clone();
assert_ne!(key_pair1, key_pair2)
}
#[test]
fn eq_key_pair() {
let key_pair1 = DhKeyPair::new();
let key_pair2 = key_pair1.clone();
assert_eq!(key_pair1, key_pair2)
}
#[test]
fn test_format() {
let key_pair = DhKeyPair::default();
let _str = alloc::format!("{:?}", key_pair);
}
}

View file

@ -130,9 +130,10 @@ pub fn gen_header() -> Header {
Header::new(&dh_pair, pn, n)
}
#[cfg(test)]
mod tests {
use crate::header::{gen_header, Header};
use crate::header::{gen_header, Header, ExHeader};
use crate::kdf_chain::gen_mk;
use crate::aead::{encrypt, decrypt};
@ -141,7 +142,7 @@ mod tests {
let ad = b"";
let header = gen_header();
let serialized = header.concat(ad);
let created = Header::from(serialized);
let created = Header::from(serialized.as_slice());
assert_eq!(header, created)
}
@ -155,4 +156,36 @@ mod tests {
let decrypted = decrypt(&mk, &encrypted, &header_data, &nonce);
assert_eq!(decrypted, data.to_vec())
}
#[test]
fn test_eq_header() {
let header1 = gen_header();
let header2 = gen_header();
assert_ne!(header1, header2)
}
#[test]
fn debug_header() {
let header = gen_header();
let _string = alloc::format!("{:?}", header);
}
#[test]
fn gen_ex_header() {
let ex_header = ExHeader {
ad: alloc::vec![0],
public_key: alloc::vec![1],
pn: 0,
n: 0
};
let _string = alloc::format!("{:?}", ex_header);
}
#[test]
fn dec_header() {
let header = gen_header();
let (encrypted, nonce) = header.encrypt(&[0; 32], &[0]);
let decrypted = Header::decrypt(&Some([1_u8; 32]), &encrypted, &nonce);
assert_eq!(None, decrypted)
}
}

View file

@ -1,4 +1,5 @@
use double_ratchet_2::ratchet::{Ratchet, RatchetEncHeader};
extern crate alloc;
#[test]
fn ratchet_init() {
@ -136,3 +137,39 @@ fn ratchet_ench_decrypt_four() {
let comp_res = decrypted1 == data && decrypted2 == data;
assert!(comp_res)
}
#[test]
#[should_panic]
fn ratchet_ench_enc_skip_panic() {
let sk = [1; 32];
let shared_hka = [2; 32];
let shared_nhkb = [3; 32];
let (mut bob_ratchet, public_key) = RatchetEncHeader::init_bob(sk,
shared_hka,
shared_nhkb);
let mut alice_ratchet = RatchetEncHeader::init_alice(sk,
public_key,
shared_hka,
shared_nhkb);
let data = include_bytes!("../src/header.rs").to_vec();
let mut headers = alloc::vec![];
let mut encrypteds = alloc::vec![];
let mut nonces = alloc::vec![];
let mut decrypteds = alloc::vec![];
for _ in 0..200 {
let (header, encrypted, nonce) = alice_ratchet.ratchet_encrypt(&data, b"");
headers.push(header);
encrypteds.push(encrypted);
nonces.push(nonce);
}
headers.reverse();
encrypteds.reverse();
nonces.reverse();
for idx in 0..200 {
let header = headers.get(idx).unwrap();
let encrypted = encrypteds.get(idx).unwrap();
let nonce = nonces.get(idx).unwrap();
let decrypted = bob_ratchet.ratchet_decrypt(header, encrypted, nonce, b"");
decrypteds.push(decrypted);
}
}