mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
cb69b8a986
Tests are not actually ran on appveyor for now, since they all fault for some reason. For now, we just build them. Also, some tests are disabled on msvc entirely, because they don't even compile. We'll need to look into those, later. They are disabled using `MSVC_DONT_BUILD`.
446 lines
14 KiB
C
446 lines
14 KiB
C
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include "check_compat.h"
|
|
|
|
#include <stdint.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <time.h>
|
|
|
|
#include "helpers.h"
|
|
|
|
#include "../toxcore/net_crypto.h"
|
|
|
|
static void rand_bytes(uint8_t *b, size_t blen)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = 0; i < blen; i++) {
|
|
b[i] = rand();
|
|
}
|
|
}
|
|
|
|
// These test vectors are from libsodium's test suite
|
|
|
|
static const unsigned char alicesk[32] = {
|
|
0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d,
|
|
0x3c, 0x16, 0xc1, 0x72, 0x51, 0xb2, 0x66, 0x45,
|
|
0xdf, 0x4c, 0x2f, 0x87, 0xeb, 0xc0, 0x99, 0x2a,
|
|
0xb1, 0x77, 0xfb, 0xa5, 0x1d, 0xb9, 0x2c, 0x2a
|
|
};
|
|
|
|
static const unsigned char bobpk[32] = {
|
|
0xde, 0x9e, 0xdb, 0x7d, 0x7b, 0x7d, 0xc1, 0xb4,
|
|
0xd3, 0x5b, 0x61, 0xc2, 0xec, 0xe4, 0x35, 0x37,
|
|
0x3f, 0x83, 0x43, 0xc8, 0x5b, 0x78, 0x67, 0x4d,
|
|
0xad, 0xfc, 0x7e, 0x14, 0x6f, 0x88, 0x2b, 0x4f
|
|
};
|
|
|
|
static const unsigned char test_nonce[24] = {
|
|
0x69, 0x69, 0x6e, 0xe9, 0x55, 0xb6, 0x2b, 0x73,
|
|
0xcd, 0x62, 0xbd, 0xa8, 0x75, 0xfc, 0x73, 0xd6,
|
|
0x82, 0x19, 0xe0, 0x03, 0x6b, 0x7a, 0x0b, 0x37
|
|
};
|
|
|
|
static const unsigned char test_m[131] = {
|
|
0xbe, 0x07, 0x5f, 0xc5, 0x3c, 0x81, 0xf2, 0xd5,
|
|
0xcf, 0x14, 0x13, 0x16, 0xeb, 0xeb, 0x0c, 0x7b,
|
|
0x52, 0x28, 0xc5, 0x2a, 0x4c, 0x62, 0xcb, 0xd4,
|
|
0x4b, 0x66, 0x84, 0x9b, 0x64, 0x24, 0x4f, 0xfc,
|
|
0xe5, 0xec, 0xba, 0xaf, 0x33, 0xbd, 0x75, 0x1a,
|
|
0x1a, 0xc7, 0x28, 0xd4, 0x5e, 0x6c, 0x61, 0x29,
|
|
0x6c, 0xdc, 0x3c, 0x01, 0x23, 0x35, 0x61, 0xf4,
|
|
0x1d, 0xb6, 0x6c, 0xce, 0x31, 0x4a, 0xdb, 0x31,
|
|
0x0e, 0x3b, 0xe8, 0x25, 0x0c, 0x46, 0xf0, 0x6d,
|
|
0xce, 0xea, 0x3a, 0x7f, 0xa1, 0x34, 0x80, 0x57,
|
|
0xe2, 0xf6, 0x55, 0x6a, 0xd6, 0xb1, 0x31, 0x8a,
|
|
0x02, 0x4a, 0x83, 0x8f, 0x21, 0xaf, 0x1f, 0xde,
|
|
0x04, 0x89, 0x77, 0xeb, 0x48, 0xf5, 0x9f, 0xfd,
|
|
0x49, 0x24, 0xca, 0x1c, 0x60, 0x90, 0x2e, 0x52,
|
|
0xf0, 0xa0, 0x89, 0xbc, 0x76, 0x89, 0x70, 0x40,
|
|
0xe0, 0x82, 0xf9, 0x37, 0x76, 0x38, 0x48, 0x64,
|
|
0x5e, 0x07, 0x05
|
|
};
|
|
|
|
static const unsigned char test_c[147] = {
|
|
0xf3, 0xff, 0xc7, 0x70, 0x3f, 0x94, 0x00, 0xe5,
|
|
0x2a, 0x7d, 0xfb, 0x4b, 0x3d, 0x33, 0x05, 0xd9,
|
|
0x8e, 0x99, 0x3b, 0x9f, 0x48, 0x68, 0x12, 0x73,
|
|
0xc2, 0x96, 0x50, 0xba, 0x32, 0xfc, 0x76, 0xce,
|
|
0x48, 0x33, 0x2e, 0xa7, 0x16, 0x4d, 0x96, 0xa4,
|
|
0x47, 0x6f, 0xb8, 0xc5, 0x31, 0xa1, 0x18, 0x6a,
|
|
0xc0, 0xdf, 0xc1, 0x7c, 0x98, 0xdc, 0xe8, 0x7b,
|
|
0x4d, 0xa7, 0xf0, 0x11, 0xec, 0x48, 0xc9, 0x72,
|
|
0x71, 0xd2, 0xc2, 0x0f, 0x9b, 0x92, 0x8f, 0xe2,
|
|
0x27, 0x0d, 0x6f, 0xb8, 0x63, 0xd5, 0x17, 0x38,
|
|
0xb4, 0x8e, 0xee, 0xe3, 0x14, 0xa7, 0xcc, 0x8a,
|
|
0xb9, 0x32, 0x16, 0x45, 0x48, 0xe5, 0x26, 0xae,
|
|
0x90, 0x22, 0x43, 0x68, 0x51, 0x7a, 0xcf, 0xea,
|
|
0xbd, 0x6b, 0xb3, 0x73, 0x2b, 0xc0, 0xe9, 0xda,
|
|
0x99, 0x83, 0x2b, 0x61, 0xca, 0x01, 0xb6, 0xde,
|
|
0x56, 0x24, 0x4a, 0x9e, 0x88, 0xd5, 0xf9, 0xb3,
|
|
0x79, 0x73, 0xf6, 0x22, 0xa4, 0x3d, 0x14, 0xa6,
|
|
0x59, 0x9b, 0x1f, 0x65, 0x4c, 0xb4, 0x5a, 0x74,
|
|
0xe3, 0x55, 0xa5
|
|
};
|
|
|
|
START_TEST(test_known)
|
|
{
|
|
unsigned char c[147];
|
|
unsigned char m[131];
|
|
int clen, mlen;
|
|
|
|
ck_assert_msg(sizeof(c) == sizeof(m) + CRYPTO_MAC_SIZE * sizeof(unsigned char),
|
|
"cyphertext should be CRYPTO_MAC_SIZE bytes longer than plaintext");
|
|
ck_assert_msg(sizeof(test_c) == sizeof(c), "sanity check failed");
|
|
ck_assert_msg(sizeof(test_m) == sizeof(m), "sanity check failed");
|
|
|
|
clen = encrypt_data(bobpk, alicesk, test_nonce, test_m, sizeof(test_m) / sizeof(unsigned char), c);
|
|
|
|
ck_assert_msg(memcmp(test_c, c, sizeof(c)) == 0, "cyphertext doesn't match test vector");
|
|
ck_assert_msg(clen == sizeof(c) / sizeof(unsigned char), "wrong ciphertext length");
|
|
|
|
mlen = decrypt_data(bobpk, alicesk, test_nonce, test_c, sizeof(test_c) / sizeof(unsigned char), m);
|
|
|
|
ck_assert_msg(memcmp(test_m, m, sizeof(m)) == 0, "decrypted text doesn't match test vector");
|
|
ck_assert_msg(mlen == sizeof(m) / sizeof(unsigned char), "wrong plaintext length");
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_fast_known)
|
|
{
|
|
unsigned char k[CRYPTO_SHARED_KEY_SIZE];
|
|
unsigned char c[147];
|
|
unsigned char m[131];
|
|
int clen, mlen;
|
|
|
|
encrypt_precompute(bobpk, alicesk, k);
|
|
|
|
ck_assert_msg(sizeof(c) == sizeof(m) + CRYPTO_MAC_SIZE * sizeof(unsigned char),
|
|
"cyphertext should be CRYPTO_MAC_SIZE bytes longer than plaintext");
|
|
ck_assert_msg(sizeof(test_c) == sizeof(c), "sanity check failed");
|
|
ck_assert_msg(sizeof(test_m) == sizeof(m), "sanity check failed");
|
|
|
|
clen = encrypt_data_symmetric(k, test_nonce, test_m, sizeof(test_m) / sizeof(unsigned char), c);
|
|
|
|
ck_assert_msg(memcmp(test_c, c, sizeof(c)) == 0, "cyphertext doesn't match test vector");
|
|
ck_assert_msg(clen == sizeof(c) / sizeof(unsigned char), "wrong ciphertext length");
|
|
|
|
mlen = decrypt_data_symmetric(k, test_nonce, test_c, sizeof(test_c) / sizeof(unsigned char), m);
|
|
|
|
ck_assert_msg(memcmp(test_m, m, sizeof(m)) == 0, "decrypted text doesn't match test vector");
|
|
ck_assert_msg(mlen == sizeof(m) / sizeof(unsigned char), "wrong plaintext length");
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_endtoend)
|
|
{
|
|
unsigned char pk1[CRYPTO_PUBLIC_KEY_SIZE];
|
|
unsigned char sk1[CRYPTO_SECRET_KEY_SIZE];
|
|
unsigned char pk2[CRYPTO_PUBLIC_KEY_SIZE];
|
|
unsigned char sk2[CRYPTO_SECRET_KEY_SIZE];
|
|
unsigned char k1[CRYPTO_SHARED_KEY_SIZE];
|
|
unsigned char k2[CRYPTO_SHARED_KEY_SIZE];
|
|
|
|
unsigned char n[CRYPTO_NONCE_SIZE];
|
|
|
|
unsigned char m[500];
|
|
unsigned char c1[sizeof(m) + CRYPTO_MAC_SIZE];
|
|
unsigned char c2[sizeof(m) + CRYPTO_MAC_SIZE];
|
|
unsigned char c3[sizeof(m) + CRYPTO_MAC_SIZE];
|
|
unsigned char c4[sizeof(m) + CRYPTO_MAC_SIZE];
|
|
unsigned char m1[sizeof(m)];
|
|
unsigned char m2[sizeof(m)];
|
|
unsigned char m3[sizeof(m)];
|
|
unsigned char m4[sizeof(m)];
|
|
|
|
int mlen;
|
|
int c1len, c2len, c3len, c4len;
|
|
int m1len, m2len, m3len, m4len;
|
|
|
|
int testno;
|
|
|
|
// Test 100 random messages and keypairs
|
|
for (testno = 0; testno < 100; testno++) {
|
|
//Generate random message (random length from 100 to 500)
|
|
mlen = (rand() % 400) + 100;
|
|
rand_bytes(m, mlen);
|
|
rand_bytes(n, CRYPTO_NONCE_SIZE);
|
|
|
|
//Generate keypairs
|
|
crypto_new_keypair(pk1, sk1);
|
|
crypto_new_keypair(pk2, sk2);
|
|
|
|
//Precompute shared keys
|
|
encrypt_precompute(pk2, sk1, k1);
|
|
encrypt_precompute(pk1, sk2, k2);
|
|
|
|
ck_assert_msg(memcmp(k1, k2, CRYPTO_SHARED_KEY_SIZE) == 0, "encrypt_precompute: bad");
|
|
|
|
//Encrypt all four ways
|
|
c1len = encrypt_data(pk2, sk1, n, m, mlen, c1);
|
|
c2len = encrypt_data(pk1, sk2, n, m, mlen, c2);
|
|
c3len = encrypt_data_symmetric(k1, n, m, mlen, c3);
|
|
c4len = encrypt_data_symmetric(k2, n, m, mlen, c4);
|
|
|
|
ck_assert_msg(c1len == c2len && c1len == c3len && c1len == c4len, "cyphertext lengths differ");
|
|
ck_assert_msg(c1len == mlen + (int)CRYPTO_MAC_SIZE, "wrong cyphertext length");
|
|
ck_assert_msg(memcmp(c1, c2, c1len) == 0 && memcmp(c1, c3, c1len) == 0
|
|
&& memcmp(c1, c4, c1len) == 0, "crypertexts differ");
|
|
|
|
//Decrypt all four ways
|
|
m1len = decrypt_data(pk2, sk1, n, c1, c1len, m1);
|
|
m2len = decrypt_data(pk1, sk2, n, c1, c1len, m2);
|
|
m3len = decrypt_data_symmetric(k1, n, c1, c1len, m3);
|
|
m4len = decrypt_data_symmetric(k2, n, c1, c1len, m4);
|
|
|
|
ck_assert_msg(m1len == m2len && m1len == m3len && m1len == m4len, "decrypted text lengths differ");
|
|
ck_assert_msg(m1len == mlen, "wrong decrypted text length");
|
|
ck_assert_msg(memcmp(m1, m2, mlen) == 0 && memcmp(m1, m3, mlen) == 0
|
|
&& memcmp(m1, m4, mlen) == 0, "decrypted texts differ");
|
|
ck_assert_msg(memcmp(m1, m, mlen) == 0, "wrong decrypted text");
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_large_data)
|
|
{
|
|
unsigned char k[CRYPTO_SHARED_KEY_SIZE];
|
|
|
|
unsigned char n[CRYPTO_NONCE_SIZE];
|
|
|
|
unsigned char m1[MAX_CRYPTO_PACKET_SIZE - CRYPTO_MAC_SIZE];
|
|
unsigned char c1[sizeof(m1) + CRYPTO_MAC_SIZE];
|
|
unsigned char m1prime[sizeof(m1)];
|
|
|
|
unsigned char m2[MAX_CRYPTO_PACKET_SIZE];
|
|
unsigned char c2[sizeof(m2) + CRYPTO_MAC_SIZE];
|
|
|
|
int c1len, c2len;
|
|
int m1plen;
|
|
|
|
//Generate random messages
|
|
rand_bytes(m1, sizeof(m1));
|
|
rand_bytes(m2, sizeof(m2));
|
|
rand_bytes(n, CRYPTO_NONCE_SIZE);
|
|
|
|
//Generate key
|
|
rand_bytes(k, CRYPTO_SHARED_KEY_SIZE);
|
|
|
|
c1len = encrypt_data_symmetric(k, n, m1, sizeof(m1), c1);
|
|
c2len = encrypt_data_symmetric(k, n, m2, sizeof(m2), c2);
|
|
|
|
ck_assert_msg(c1len == sizeof(m1) + CRYPTO_MAC_SIZE, "could not encrypt");
|
|
ck_assert_msg(c2len == sizeof(m2) + CRYPTO_MAC_SIZE, "could not encrypt");
|
|
|
|
m1plen = decrypt_data_symmetric(k, n, c1, c1len, m1prime);
|
|
|
|
ck_assert_msg(m1plen == sizeof(m1), "decrypted text lengths differ");
|
|
ck_assert_msg(memcmp(m1prime, m1, sizeof(m1)) == 0, "decrypted texts differ");
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_large_data_symmetric)
|
|
{
|
|
unsigned char k[CRYPTO_SYMMETRIC_KEY_SIZE];
|
|
|
|
unsigned char n[CRYPTO_NONCE_SIZE];
|
|
|
|
unsigned char m1[16 * 16 * 16];
|
|
unsigned char c1[sizeof(m1) + CRYPTO_MAC_SIZE];
|
|
unsigned char m1prime[sizeof(m1)];
|
|
|
|
int c1len;
|
|
int m1plen;
|
|
|
|
//Generate random messages
|
|
rand_bytes(m1, sizeof(m1));
|
|
rand_bytes(n, CRYPTO_NONCE_SIZE);
|
|
|
|
//Generate key
|
|
new_symmetric_key(k);
|
|
|
|
c1len = encrypt_data_symmetric(k, n, m1, sizeof(m1), c1);
|
|
ck_assert_msg(c1len == sizeof(m1) + CRYPTO_MAC_SIZE, "could not encrypt data");
|
|
|
|
m1plen = decrypt_data_symmetric(k, n, c1, c1len, m1prime);
|
|
|
|
ck_assert_msg(m1plen == sizeof(m1), "decrypted text lengths differ");
|
|
ck_assert_msg(memcmp(m1prime, m1, sizeof(m1)) == 0, "decrypted texts differ");
|
|
}
|
|
END_TEST
|
|
|
|
static void increment_nonce_number_cmp(uint8_t *nonce, uint32_t num)
|
|
{
|
|
uint32_t num1, num2;
|
|
memcpy(&num1, nonce + (CRYPTO_NONCE_SIZE - sizeof(num1)), sizeof(num1));
|
|
num1 = net_ntohl(num1);
|
|
num2 = num + num1;
|
|
|
|
if (num2 < num1) {
|
|
uint32_t i;
|
|
|
|
for (i = CRYPTO_NONCE_SIZE - sizeof(num1); i != 0; --i) {
|
|
++nonce[i - 1];
|
|
|
|
if (nonce[i - 1] != 0) {
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
num2 = net_htonl(num2);
|
|
memcpy(nonce + (CRYPTO_NONCE_SIZE - sizeof(num2)), &num2, sizeof(num2));
|
|
}
|
|
|
|
START_TEST(test_increment_nonce)
|
|
{
|
|
long long unsigned int i;
|
|
|
|
uint8_t n[CRYPTO_NONCE_SIZE];
|
|
|
|
for (i = 0; i < CRYPTO_NONCE_SIZE; ++i) {
|
|
n[i] = rand();
|
|
}
|
|
|
|
uint8_t n1[CRYPTO_NONCE_SIZE];
|
|
|
|
memcpy(n1, n, CRYPTO_NONCE_SIZE);
|
|
|
|
for (i = 0; i < (1 << 18); ++i) {
|
|
increment_nonce_number_cmp(n, 1);
|
|
increment_nonce(n1);
|
|
ck_assert_msg(memcmp(n, n1, CRYPTO_NONCE_SIZE) == 0, "Bad increment_nonce function");
|
|
}
|
|
|
|
for (i = 0; i < (1 << 18); ++i) {
|
|
uint32_t r = rand();
|
|
increment_nonce_number_cmp(n, r);
|
|
increment_nonce_number(n1, r);
|
|
ck_assert_msg(memcmp(n, n1, CRYPTO_NONCE_SIZE) == 0, "Bad increment_nonce_number function");
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_memzero)
|
|
{
|
|
uint8_t src[sizeof(test_c)];
|
|
memcpy(src, test_c, sizeof(test_c));
|
|
|
|
crypto_memzero(src, sizeof(src));
|
|
size_t i;
|
|
|
|
for (i = 0; i < sizeof(src); i++) {
|
|
ck_assert_msg(src[i] == 0, "Memory is not zeroed");
|
|
}
|
|
}
|
|
END_TEST
|
|
|
|
#define CRYPTO_TEST_MEMCMP_SIZE 1024*256
|
|
#define CRYPTO_TEST_MEMCMP_COUNT 1000
|
|
#define CRYPTO_TEST_MEMCMP_EPS 10
|
|
|
|
static int cmp(const void *a, const void *b)
|
|
{
|
|
const clock_t *first = (const clock_t *) a;
|
|
const clock_t *second = (const clock_t *) b;
|
|
|
|
if (*first < *second) {
|
|
return -1;
|
|
}
|
|
|
|
if (*first > *second) {
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static clock_t memcmp_time(void *a, void *b, size_t len)
|
|
{
|
|
clock_t start = clock();
|
|
crypto_memcmp(a, b, len);
|
|
return clock() - start;
|
|
}
|
|
|
|
static clock_t memcmp_median(void *a, void *b, size_t len)
|
|
{
|
|
size_t i;
|
|
clock_t results[CRYPTO_TEST_MEMCMP_COUNT];
|
|
|
|
for (i = 0; i < CRYPTO_TEST_MEMCMP_COUNT; i++) {
|
|
results[i] = memcmp_time(a, b, len);
|
|
}
|
|
|
|
qsort(results, CRYPTO_TEST_MEMCMP_COUNT, sizeof(*results), cmp);
|
|
return results[CRYPTO_TEST_MEMCMP_COUNT / 2];
|
|
}
|
|
|
|
START_TEST(test_memcmp)
|
|
{
|
|
uint8_t src[CRYPTO_TEST_MEMCMP_SIZE];
|
|
rand_bytes(src, sizeof(src));
|
|
|
|
uint8_t same[sizeof(src)];
|
|
memcpy(same, src, sizeof(src));
|
|
|
|
uint8_t not_same[sizeof(src)];
|
|
rand_bytes(not_same, sizeof(not_same));
|
|
|
|
printf("timing memcmp (equal arrays)\n");
|
|
clock_t same_median = memcmp_median(src, same, sizeof(src));
|
|
printf("timing memcmp (non-equal arrays)\n");
|
|
clock_t not_same_median = memcmp_median(src, not_same, sizeof(src));
|
|
printf("comparing times\n");
|
|
|
|
clock_t delta;
|
|
|
|
if (same_median > not_same_median) {
|
|
delta = same_median - not_same_median;
|
|
} else {
|
|
delta = not_same_median - same_median;
|
|
}
|
|
|
|
ck_assert_msg(delta < CRYPTO_TEST_MEMCMP_EPS,
|
|
"Delta time is too long (%d >= %d)\n"
|
|
"Time of the same data comparation: %d\n"
|
|
"Time of the different data comparation: %d",
|
|
delta, CRYPTO_TEST_MEMCMP_EPS, same_median, not_same_median);
|
|
}
|
|
END_TEST
|
|
|
|
static Suite *crypto_suite(void)
|
|
{
|
|
Suite *s = suite_create("Crypto");
|
|
|
|
DEFTESTCASE(known);
|
|
DEFTESTCASE(fast_known);
|
|
DEFTESTCASE_SLOW(endtoend, 15); /* waiting up to 15 seconds */
|
|
DEFTESTCASE(large_data);
|
|
DEFTESTCASE(large_data_symmetric);
|
|
DEFTESTCASE_SLOW(increment_nonce, 20);
|
|
DEFTESTCASE(memzero);
|
|
DEFTESTCASE(memcmp);
|
|
|
|
return s;
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
srand((unsigned int) time(NULL));
|
|
|
|
Suite *crypto = crypto_suite();
|
|
SRunner *test_runner = srunner_create(crypto);
|
|
int number_failed = 0;
|
|
|
|
srunner_run_all(test_runner, CK_NORMAL);
|
|
number_failed = srunner_ntests_failed(test_runner);
|
|
|
|
srunner_free(test_runner);
|
|
|
|
return number_failed;
|
|
}
|