mirror of
https://github.com/oxen-io/lokinet.git
synced 2024-11-17 15:25:35 +00:00
b597ae5a94
- Get rid of CryptoManager. - Get rid of Crypto. - Move all the Crypto instance methods to llarp::crypto functions. (None of them needed to be methods at all, so this is simple). - Move sodium/ntru initialization into static initialization. - Add llarp::csrng, which is an available llarp::CSRNG instance which is a bit easier than needing to construct a `CSRNG rng{};` in various places. - Various related small simplifications/cleanups.
91 lines
2.1 KiB
C++
91 lines
2.1 KiB
C++
#include <llarp/crypto/crypto_libsodium.hpp>
|
|
|
|
#include <iostream>
|
|
|
|
#include <catch2/catch.hpp>
|
|
|
|
using namespace llarp;
|
|
|
|
TEST_CASE("Identity key")
|
|
{
|
|
SecretKey secret;
|
|
crypto.identity_keygen(secret);
|
|
|
|
SECTION("Keygen")
|
|
{
|
|
REQUIRE_FALSE(secret.IsZero());
|
|
}
|
|
|
|
SECTION("Sign-verify")
|
|
{
|
|
AlignedBuffer<128> random;
|
|
random.Randomize();
|
|
Signature sig;
|
|
const PubKey pk = secret.toPublic();
|
|
|
|
const llarp_buffer_t buf(random.data(), random.size());
|
|
REQUIRE(crypto.sign(sig, secret, buf));
|
|
REQUIRE(crypto.verify(pk, buf, sig));
|
|
random.Randomize();
|
|
// mangle body
|
|
REQUIRE_FALSE(crypto.verify(pk, buf, sig));
|
|
}
|
|
}
|
|
|
|
TEST_CASE("PQ crypto")
|
|
{
|
|
PQKeyPair keys;
|
|
crypto.pqe_keygen(keys);
|
|
PQCipherBlock block;
|
|
SharedSecret shared, otherShared;
|
|
auto c = &crypto;
|
|
|
|
REQUIRE(keys.size() == PQ_KEYPAIRSIZE);
|
|
REQUIRE(c->pqe_encrypt(block, shared, PQPubKey(pq_keypair_to_public(keys))));
|
|
REQUIRE(c->pqe_decrypt(block, otherShared, pq_keypair_to_secret(keys)));
|
|
REQUIRE(otherShared == shared);
|
|
}
|
|
|
|
#ifdef HAVE_CRYPT
|
|
|
|
TEST_CASE("passwd hash valid")
|
|
{
|
|
// poggers password hashes
|
|
std::set<std::string> valid_hashes;
|
|
// UNIX DES
|
|
valid_hashes.emplace("CVu85Ms694POo");
|
|
// sha256 salted
|
|
valid_hashes.emplace(
|
|
"$5$cIghotiBGjfPC7Fu$"
|
|
"TXXxPhpUcEiF9tMnjhEVJFi9AlNDSkNRQFTrXPQTKS9");
|
|
// sha512 salted
|
|
valid_hashes.emplace(
|
|
"$6$qB77ms3wCIo.xVKP$Hl0RLuDgWNmIW4s."
|
|
"5KUbFmnauoTfrWSPJzDCD8ZTSSfwRbMgqgG6F9y3K.YEYVij8g/"
|
|
"Js0DRT2RhgXoX0sHGb.");
|
|
|
|
for (const auto& hash : valid_hashes)
|
|
{
|
|
// make sure it is poggers ...
|
|
REQUIRE(crypto.check_passwd_hash(hash, "poggers"));
|
|
// ... and not inscrutible
|
|
REQUIRE(not crypto.check_passwd_hash(hash, "inscrutible"));
|
|
}
|
|
}
|
|
|
|
TEST_CASE("passwd hash malformed")
|
|
{
|
|
llarp::sodium::CryptoLibSodium crypto;
|
|
|
|
std::set<std::string> invalid_hashes = {
|
|
"stevejobs",
|
|
"$JKEDbzgzym1N6", // crypt() for "stevejobs" with a $ at the begining
|
|
"$0$zero$AAAAAAAAAAA",
|
|
"$$$AAAAAAAAAAAA",
|
|
"$LIGMA$BALLS$LMAOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO."};
|
|
for (const auto& hash : invalid_hashes)
|
|
REQUIRE(not crypto.check_passwd_hash(hash, "stevejobs"));
|
|
}
|
|
|
|
#endif
|