123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499 |
- /**
- * Created by bmf on 10/31/13.
- */
- "use strict";
- var assert = require('assert');
- var crypto = require('crypto');
- var sodium = require('../build/Release/sodium');
- var aliceskA = [
- 0x77,0x07,0x6d,0x0a,0x73,0x18,0xa5,0x7d
- ,0x3c,0x16,0xc1,0x72,0x51,0xb2,0x66,0x45
- ,0xdf,0x4c,0x2f,0x87,0xeb,0xc0,0x99,0x2a
- ,0xb1,0x77,0xfb,0xa5,0x1d,0xb9,0x2c,0x2a
- ];
- var bobpkA = [
- 0xde,0x9e,0xdb,0x7d,0x7b,0x7d,0xc1,0xb4
- ,0xd3,0x5b,0x61,0xc2,0xec,0xe4,0x35,0x37
- ,0x3f,0x83,0x43,0xc8,0x5b,0x78,0x67,0x4d
- ,0xad,0xfc,0x7e,0x14,0x6f,0x88,0x2b,0x4f
- ];
- var nonceA = [
- 0x69,0x69,0x6e,0xe9,0x55,0xb6,0x2b,0x73,
- 0xcd,0x62,0xbd,0xa8,0x75,0xfc,0x73,0xd6,
- 0x82,0x19,0xe0,0x03,0x6b,0x7a,0x0b,0x37
- ];
- var plainTextA = [
- 0, 0, 0, 0, 0, 0, 0, 0
- , 0, 0, 0, 0, 0, 0, 0, 0
- , 0, 0, 0, 0, 0, 0, 0, 0
- , 0, 0, 0, 0, 0, 0, 0, 0
- ,0xbe,0x07,0x5f,0xc5,0x3c,0x81,0xf2,0xd5
- ,0xcf,0x14,0x13,0x16,0xeb,0xeb,0x0c,0x7b
- ,0x52,0x28,0xc5,0x2a,0x4c,0x62,0xcb,0xd4
- ,0x4b,0x66,0x84,0x9b,0x64,0x24,0x4f,0xfc
- ,0xe5,0xec,0xba,0xaf,0x33,0xbd,0x75,0x1a
- ,0x1a,0xc7,0x28,0xd4,0x5e,0x6c,0x61,0x29
- ,0x6c,0xdc,0x3c,0x01,0x23,0x35,0x61,0xf4
- ,0x1d,0xb6,0x6c,0xce,0x31,0x4a,0xdb,0x31
- ,0x0e,0x3b,0xe8,0x25,0x0c,0x46,0xf0,0x6d
- ,0xce,0xea,0x3a,0x7f,0xa1,0x34,0x80,0x57
- ,0xe2,0xf6,0x55,0x6a,0xd6,0xb1,0x31,0x8a
- ,0x02,0x4a,0x83,0x8f,0x21,0xaf,0x1f,0xde
- ,0x04,0x89,0x77,0xeb,0x48,0xf5,0x9f,0xfd
- ,0x49,0x24,0xca,0x1c,0x60,0x90,0x2e,0x52
- ,0xf0,0xa0,0x89,0xbc,0x76,0x89,0x70,0x40
- ,0xe0,0x82,0xf9,0x37,0x76,0x38,0x48,0x64
- ,0x5e,0x07,0x05
- ];
- var plainTextB = [
- 0xbe,0x07,0x5f,0xc5,0x3c,0x81,0xf2,0xd5
- ,0xcf,0x14,0x13,0x16,0xeb,0xeb,0x0c,0x7b
- ,0x52,0x28,0xc5,0x2a,0x4c,0x62,0xcb,0xd4
- ,0x4b,0x66,0x84,0x9b,0x64,0x24,0x4f,0xfc
- ,0xe5,0xec,0xba,0xaf,0x33,0xbd,0x75,0x1a
- ,0x1a,0xc7,0x28,0xd4,0x5e,0x6c,0x61,0x29
- ,0x6c,0xdc,0x3c,0x01,0x23,0x35,0x61,0xf4
- ,0x1d,0xb6,0x6c,0xce,0x31,0x4a,0xdb,0x31
- ,0x0e,0x3b,0xe8,0x25,0x0c,0x46,0xf0,0x6d
- ,0xce,0xea,0x3a,0x7f,0xa1,0x34,0x80,0x57
- ,0xe2,0xf6,0x55,0x6a,0xd6,0xb1,0x31,0x8a
- ,0x02,0x4a,0x83,0x8f,0x21,0xaf,0x1f,0xde
- ,0x04,0x89,0x77,0xeb,0x48,0xf5,0x9f,0xfd
- ,0x49,0x24,0xca,0x1c,0x60,0x90,0x2e,0x52
- ,0xf0,0xa0,0x89,0xbc,0x76,0x89,0x70,0x40
- ,0xe0,0x82,0xf9,0x37,0x76,0x38,0x48,0x64
- ,0x5e,0x07,0x05
- ];
- var cipherTextA = [
- 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
- ,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
- ,0xf3,0xff,0xc7,0x70,0x3f,0x94,0x00,0xe5
- ,0x2a,0x7d,0xfb,0x4b,0x3d,0x33,0x05,0xd9
- ,0x8e,0x99,0x3b,0x9f,0x48,0x68,0x12,0x73
- ,0xc2,0x96,0x50,0xba,0x32,0xfc,0x76,0xce
- ,0x48,0x33,0x2e,0xa7,0x16,0x4d,0x96,0xa4
- ,0x47,0x6f,0xb8,0xc5,0x31,0xa1,0x18,0x6a
- ,0xc0,0xdf,0xc1,0x7c,0x98,0xdc,0xe8,0x7b
- ,0x4d,0xa7,0xf0,0x11,0xec,0x48,0xc9,0x72
- ,0x71,0xd2,0xc2,0x0f,0x9b,0x92,0x8f,0xe2
- ,0x27,0x0d,0x6f,0xb8,0x63,0xd5,0x17,0x38
- ,0xb4,0x8e,0xee,0xe3,0x14,0xa7,0xcc,0x8a
- ,0xb9,0x32,0x16,0x45,0x48,0xe5,0x26,0xae
- ,0x90,0x22,0x43,0x68,0x51,0x7a,0xcf,0xea
- ,0xbd,0x6b,0xb3,0x73,0x2b,0xc0,0xe9,0xda
- ,0x99,0x83,0x2b,0x61,0xca,0x01,0xb6,0xde
- ,0x56,0x24,0x4a,0x9e,0x88,0xd5,0xf9,0xb3
- ,0x79,0x73,0xf6,0x22,0xa4,0x3d,0x14,0xa6
- ,0x59,0x9b,0x1f,0x65,0x4c,0xb4,0x5a,0x74
- ,0xe3,0x55,0xa5
- ];
- var secretA = [
- 0x1b,0x27,0x55,0x64,0x73,0xe9,0x85,0xd4
- ,0x62,0xcd,0x51,0x19,0x7a,0x9a,0x46,0xc7
- ,0x60,0x09,0x54,0x9e,0xac,0x64,0x74,0xf2
- ,0x06,0xc4,0xee,0x08,0x44,0xf6,0x83,0x89
- ];
- var nonce = Buffer.from(nonceA);
- var plainText = Buffer.from(plainTextB);
- var alicesk = Buffer.from(aliceskA);
- var bobpk = Buffer.from(bobpkA);
- var cipherText = Buffer.from(cipherTextA);
- var secret = Buffer.from(secretA);
- describe('crypto_box', function() {
- it('crypto_box should encrypt to known cipher text', function(done) {
- var cipherMsg = sodium.crypto_box(plainText,nonce, bobpk, alicesk);
- if( !cipherMsg ) {
- should.fail();
- }
- assert.equal(cipherMsg.toString('hex'), cipherText.toString('hex'));
- done();
- });
- // Test bad params
- it('should fail on bad param 1', function(done) {
- var p = "";
- var n = nonce;
- var pk = bobpk
- var sk = alicesk;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- p = 10;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- done();
- });
- it('should fail on bad param 2', function(done) {
- var p = plainText;
- var n = "nonce";
- var pk = bobpk
- var sk = alicesk;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- n = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- n = 10;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- done();
- });
- it('should fail on bad param 3', function(done) {
- var p = plainText;
- var n = nonce;
- var pk = "bobpk"
- var sk = alicesk;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- pk = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- pk = 10;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- done();
- });
- it('should fail on bad param 4', function(done) {
- var p = plainText;
- var n = nonce;
- var pk = bobpk
- var sk = "alicesk";
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- sk = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- sk = 10;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box(p, n, pk, sk);
- });
- done();
- });
- describe('_BeforeNM', function() {
- it('crypto_box_beforenm should output known shared secret', function(done) {
- var computed_secret = sodium.crypto_box_beforenm(bobpk, alicesk);
- if( !computed_secret ) {
- should.fail();
- }
- assert.equal(computed_secret.toString('hex'), secret.toString('hex'));
- done();
- });
- it('should fail on bad param 1', function(done) {
- var pk = "bobpk";
- var sk = alicesk;
- assert.throws(function() {
- var computed_secret = sodium.crypto_box_beforenm(pk, sk);
- });
- pk = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var computed_secret = sodium.crypto_box_beforenm(pk, sk);
- });
- pk = 10;
- assert.throws(function() {
- var computed_secret = sodium.crypto_box_beforenm(pk, sk);
- });
- done();
- });
- it('should fail on bad param 2', function(done) {
- var pk = bobpk;
- var sk = "alicesk";
- assert.throws(function() {
- var computed_secret = sodium.crypto_box_beforenm(pk, sk);
- });
- sk = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var computed_secret = sodium.crypto_box_beforenm(pk, sk);
- });
- sk = 10;
- assert.throws(function() {
- var computed_secret = sodium.crypto_box_beforenm(pk, sk);
- });
- done();
- });
- });
- describe('_AfterNM', function() {
- it('crypto_box_afternm should encrypt to known cipher text', function(done) {
- var cipherMsg = sodium.crypto_box_afternm(plainText,nonce, secret);
- if( !cipherMsg ) {
- should.fail();
- }
- assert.equal(cipherMsg.toString('hex'), cipherText.toString('hex'));
- done();
- });
- it('should fail on bad param 1', function(done) {
- var p = "";
- var n = nonce;
- var s = secret;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box_afternm(p,n,s);
- });
- p = 10;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box_afternm(p,n,s);
- });
- done();
- });
- it('should fail on bad param 2', function(done) {
- var p = plainText;
- var n = "nonce";
- var s = secret;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box_afternm(p,n,s);
- });
- n = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box_afternm(p,n,s);
- });
- n = 10;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box_afternm(p,n,s);
- });
- done();
- });
- it('should fail on bad param 3', function(done) {
- var p = plainText;
- var n = nonce;
- var s = "secret";
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box_afternm(p,n,s);
- });
- s = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box_afternm(p,n,s);
- });
- s = 10;
- assert.throws(function() {
- var cipherMsg = sodium.crypto_box_afternm(p,n,s);
- });
- done();
- });
- });
- });
- describe('crypto_box_open', function() {
- var sender = sodium.crypto_box_keypair();
- var receiver = sodium.crypto_box_keypair();
- // Encrypt
- var cipherMsg = sodium.crypto_box(plainText, nonce, receiver.publicKey, sender.secretKey);
- // Secret
- var secret = sodium.crypto_box_beforenm(receiver.publicKey, sender.secretKey);
- it('crypto_box/crypto_box_open should encrypt/decrypt', function(done) {
- // Decrypt
- var plainMsg = sodium.crypto_box_open(cipherMsg,nonce,sender.publicKey, receiver.secretKey);
- // We should get the same plainText!
- assert.deepEqual(plainMsg, plainText);
- done();
- });
- // test bad params
- it('should fail on bad argument 1', function(done) {
- var ctxt = "cipherMsg";
- var n = nonce;
- var pk = sender.publicKey;
- var sk = receiver.privateKey;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- ctxt = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- ctxt = 10;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- done();
- });
- it('should fail on bad argument 2', function(done) {
- var ctxt = cipherMsg;
- var n = "nonce";
- var pk = sender.publicKey;
- var sk = receiver.privateKey;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- n = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- n = 10;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- done();
- });
- it('should fail on bad argument 3', function(done) {
- var ctxt = cipherMsg;
- var n = nonce;
- var pk = "sender.publicKey";
- var sk = receiver.privateKey;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- pk = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- pk = 10;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- done();
- });
- it('should fail on bad argument 4', function(done) {
- var ctxt = cipherMsg;
- var n = nonce;
- var pk = sender.publicKey;
- var sk = "receiver.privateKey";
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- sk = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- sk = 10;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open(ctxt,n,pk, sk);
- });
- done();
- });
- describe('_AfterNM', function() {
- it('crypto_box_open_afternm should decrypt', function(done) {
- // Decrypt
- var plainMsg = sodium.crypto_box_open_afternm(cipherMsg,nonce,secret);
- // We should get the same plainText!
- assert.deepEqual(plainMsg, plainText);
- done();
- });
- it('should fail on bad param 1', function(done) {
- var ctxt = "cipherMsg";
- var n = nonce;
- var s = secret;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open_afternm(ctxt,n,s);
- });
- ctxt = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open_afternm(ctxt,n,s);
- });
- ctxt = 10;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open_afternm(ctxt,n,s);
- });
- done();
- });
- it('should fail on bad param 2', function(done) {
- var ctxt = cipherMsg;
- var n = "nonce";
- var s = secret;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open_afternm(ctxt,n,s);
- });
- nonce = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open_afternm(ctxt,n,s);
- });
- nonce = 10;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open_afternm(ctxt,n,s);
- });
- done();
- });
- it('should fail on bad param 3', function(done) {
- var ctxt = cipherMsg;
- var n = nonce;
- var s = "secret";
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open_afternm(ctxt,n,s);
- });
- secret = Buffer.allocUnsafe(10);
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open_afternm(ctxt,n,s);
- });
- secret = 10;
- assert.throws(function() {
- var plainMsg = sodium.crypto_box_open_afternm(ctxt,n,s);
- });
- done();
- });
- });
- });
|