2023-05-18 08:24:17 +00:00
|
|
|
{.used.}
|
|
|
|
|
2022-07-01 18:19:57 +00:00
|
|
|
# Nim-Libp2p
|
2023-01-20 14:47:40 +00:00
|
|
|
# Copyright (c) 2023 Status Research & Development GmbH
|
2022-07-01 18:19:57 +00:00
|
|
|
# Licensed under either of
|
|
|
|
# * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE))
|
|
|
|
# * MIT license ([LICENSE-MIT](LICENSE-MIT))
|
|
|
|
# at your option.
|
|
|
|
# This file may not be copied, modified, or distributed except according to
|
|
|
|
# those terms.
|
2019-03-02 19:19:41 +00:00
|
|
|
|
|
|
|
## Test vectors was made using Go implementation
|
|
|
|
## https://github.com/libp2p/go-libp2p-crypto/blob/master/key.go
|
2023-08-01 13:28:38 +00:00
|
|
|
from std/strutils import toUpper
|
2021-05-21 16:27:01 +00:00
|
|
|
import unittest2
|
2022-06-16 08:08:52 +00:00
|
|
|
import bearssl/hash
|
2023-05-18 08:24:17 +00:00
|
|
|
import nimcrypto/utils
|
Noise (#90)
* Start ChaCha20Poly1305 integration (BearSSL)
* Add Curve25519 (BearSSL) required operations for noise
* Fix curve mulgen iterate/derive
* Fix misleading header
* Add chachapoly proper test
* Curve25519 integration tests (failing, something is wrong)
* Add few converters, finish c25519 integration tests
* Remove implicit converters
* removed internal globals
* Start noise implementation
* Fix public() using proper bear mulgen
* Noise protocol WIP
* Noise progress
* Add a quick nim version of HKDF
* Converted hkdf to iterator, useful for noise
* Noise protocol implementation progress
* Noise progress
* XX handshake almost there
* noise progress
* Noise, testing handshake with test vectors
* Noise handshake progress, still wrong somewhere!
* Noise handshake success!
* Full verified noise XX handshake completed
* Fix and rewrite test to be similar to switch one
* Start with connection upgrade
* Switch chachapoly to CT implementations
* Improve HKDF implementation
* Use a type insted of tuple for HandshakeResult
* Remove unnecessary Let
* More cosmetic fixes
* Properly check randomBytes result
* Fix chachapoly signature
* Noise full circle (altho dispatcher is nil cursed)
* Allow nil aads in chachapoly routines
* Noise implementation up to running full test
* Use bearssl HKDF as well
* Directly use bearssl rng for curve25519 keys
* Add a (disabled/no CI) noise interop test server
* WIP on fixing interop issues
* More fixes in noise implementation for interop
* bump chronos requirement (nimble)
* Add a chachapoly test for very small size payloads
* Noise, more tracing
* Add 2 properly working noise tests
* Fix payload packing, following the spec properly (and not go version but
rather rust)
* Sanity, replace discard with asyncCheck
* Small fixes and optimization
* Use stew endian2 rather then system endian module
* Update nimble deps (chronos)
* Minor cosmetic/code sanity fixes
* Noise, handle Nonce max
* Noise tests, make sure to close secured conns
* More polish, improve code readability too
* More polish and testing again which test fails
* Further polishing
* Restore noise tests
* Remove useless Future[void]
* Remove useless CipherState initializer
* add a proper read wait future in second noise test
* Remove noise generic secure implementation for now
* Few fixes to run eth2 sim
* Add more debug info in noise traces
* Merge size + payload write in sendEncryptedMessage
* Revert secure interface, add outgoing property directly in newNoise
* remove sendEncrypted and receiveEncrypted
* Use openarray in chachapoly and curve25519 helpers
2020-03-17 12:30:01 +00:00
|
|
|
import ../libp2p/crypto/[crypto, chacha20poly1305, curve25519, hkdf]
|
2019-03-02 19:19:41 +00:00
|
|
|
|
|
|
|
const
|
|
|
|
PrivateKeys = [
|
|
|
|
"""080012A809308204A40201000282010100C8B014EC01E135D635F7E246BA7D42
|
|
|
|
3E2B36F45B052F0B644DA6B1B6DD964696F279BB9BB5F5C41EE3204F74EF70C2
|
|
|
|
28C8CDD97E4F19094274EB01C292EC25055CB3CECD1A41E8919A0C111602B1B8
|
|
|
|
5B4E43DBB2F4898C52738465F35E3085586CF01E407BE6CB5F0C08D0AD6D6FE0
|
|
|
|
2A43C932E124E9C8498E67BA323CC84A275ACCC20D586C04DAF54FE98018FF15
|
|
|
|
62E80514735A3237AA3C1DD2B4281FCAD3BD94952F0397A3F15B06269107C147
|
|
|
|
C15645DCB507C566E66BF24E2745A05E4D31F364C2C50C0F5C9A6889378051BF
|
|
|
|
05669EA905C2370548D6EF2CF66A4A5DC23F10B7614BC43CF0BFCC8711B6FF9F
|
|
|
|
645FC2E5713ED1CB5975392B8C8652026902030100010282010018F9B0E0DE2B
|
|
|
|
04E42FBB35B1CFAB9EFED5A9F5270EB2181CD77D1348CAB2D4FE1C17023E129B
|
|
|
|
0F5938B2E0B090CBDB9DEFBF8E7DA5A25C00A54449E7C919125264830C0D8263
|
|
|
|
096A755D6312F62ADFE29D0EDCDC9C8A31A8612FECF0289CA93BA3F30E10C05A
|
|
|
|
AC9C9B86CD5187F91050B236EBDA1119F70F1065E04A383E44DC008A143630AD
|
|
|
|
B59064AB3D810C391B59BAEB8E7C29C38A6AD6B10EBAA456DCACFA00DB06CA61
|
|
|
|
D630846EAF4B1A0292A695CBE5001BA8A2E419881263576358295E8B7A61E0A2
|
|
|
|
7EFCA0EC37810873792B0F80D2DD877DCE383A704DE13BC0E8EF6D1CF4C71DE7
|
|
|
|
306F6A0C3741DDCD81CF090746DD217925D5BEAF30B7D174B83102818100E35A
|
|
|
|
50E392EF35CFFF9D24E0A71561E16E7CE99D13C3D9630305D74038F8F646D5CF
|
|
|
|
440FEC38DFB145BAB25FA875C6B0B93DEF43CEDA51C52FF97BB02039913CD5BB
|
|
|
|
36DB0D0B4DEAF0AF3A11D1DDD5991F18F6DDBEF4708B8B00DC6F99CC930E93D8
|
|
|
|
84BF118D204E9A83C7B2163252731813A67A4043459D943549D8AFAED7EF0281
|
|
|
|
8100E1F9A33FF755B1187302AD22B7C70FF2C6D4D5D8E765D337BECF3E417DDB
|
|
|
|
57818588240F3A40FE2E6C73E3E0BA244FAFCC8988E010577AAD967D48203563
|
|
|
|
4CBA45B8166269E5E64214EB23CAE8B1619F3B7910FFE343E88B4E6CDC57CE8A
|
|
|
|
736ECD5B8B455C4B004D7222298663EDD4A59BDB718CA436A86BC2BA53BC0E7D
|
|
|
|
B32702818100A5CFB7D0D1D7DE624D659980B2BAF8810628D9E47286D2E3D04F
|
|
|
|
91364896E25EB50F0DEFA2F3B3C94136B162ECA4C0FD208CD8149727489DCCA8
|
|
|
|
629A085693E34F69D3CF1C8B530F76EC0528FBEB931DB2BD6D463A3F6259934E
|
|
|
|
54769C2FC44CCC6D0C1BA1BC5084A3525AF13A190762E37B695E1DC2326283B5
|
|
|
|
FD9EA83A974702818100C493B88AE5AB5AD2AD0210011AA40560A9CCEE76B0DD
|
|
|
|
687F9EF283F2CEFC67441A18535E17CC0011FC705834DF58C5256625E2B72020
|
|
|
|
296D2673B7B1A51FCBD862DC0044FE606B0CE34BA6285682302D27BC6AA85F58
|
|
|
|
6CCBFA9E4293F3ED86FB4593B434D353BF609FBFCE25C57A5838F4BB522D0991
|
|
|
|
2EB40782B562EBAC37930281802E343D25B84AF8CAB1A298179FDE5F94D2EFF6
|
|
|
|
1E51EF4784E5BBE4DC230F17B884B0074CA4603416F72C10D9137D79E28967C4
|
|
|
|
8C0E4AEA1453952818FF9AD2FACCED7CE3A037D8545C151F57D35DED691CA53F
|
|
|
|
8A5336590F7B080805A46701B01C9F9919E3890CA1A0373D909373638B57FD0C
|
|
|
|
87627491C41F1BF1E9643DE7B4""",
|
2020-07-15 08:24:04 +00:00
|
|
|
"""080012E80D308206E40201000282018100F50BABF75636386F1C606950F495F5
|
|
|
|
3149B648408E5D61B7EB0C9F96681CC685F35358A3B91C2AD848C819902FFCD2
|
|
|
|
D3B1E46F806DC464109CEE43BDA4BDD01EE8A3F035B654C965255B5834A34C6F
|
|
|
|
3543E66A0D61545B42F2BF819E76B602F6F6ADECB6EC81FBCFB0EBC9CAEFC7AA
|
|
|
|
D95DB7E91B52C4CF3BA5B25CCADB117FFE2488A906FFD56318A39B3054E3D221
|
|
|
|
D95334A385A6AF9A00D51D119D953E2ADCDFF57708DA27602A2BF4C4B9D62059
|
|
|
|
35A22313086C8531017EF749B407B76A25280DD079CB7A0FACE87BA6EDA0C945
|
|
|
|
39E8CBC91D7E709E3BD32F266D4949B829A01303513AC3BF9777A8A6657AE1F2
|
|
|
|
CDF18FF026C23321B2BFFAAD68250D054F7B24B98A18AF270EF7A5FF918BCABA
|
|
|
|
3BDF1F44C0345CFD4B4CDDA9D51486D281F9560D69C0C30718118AD76C6BAB4A
|
|
|
|
E585A188A16A1148131D558555B36E8348065C7441D6D823906E13EF6F287310
|
|
|
|
9F3AF729637379CF07028FBFC34411DCDC765C38BBFC632556B29415EDC70DF8
|
|
|
|
352EFEF1BED37656565ECB8598EF9D7B8502030100010282018100B34C5C02B9
|
|
|
|
392927DBBA8BB4E99203FB9174E7FF1C6C25811E62792EE37512A9967648A85B
|
|
|
|
5CC9D8C1C0703BF970E38E745EB25B6575CAC6011DB1C14496827EEB38711DCC
|
|
|
|
10D3DFC76AC3EA9805E865300E9B50B903B15716299C1D27BD5C03FA511EA066
|
|
|
|
03620E00E5361CE03FD7B9FE81FFF5B7253C80E767CFCFBA655EA2C5769D3EFA
|
|
|
|
D8D70E833F9D28B01DE418917235A82863DAAA7B452ECB801521E5C5956508BC
|
|
|
|
1F0D952DDE864777EEE9777DF06E0FBEDFE210B72717EDBBABAFE49B872FB653
|
|
|
|
5C35D539775E7B06241E7AE2C6C6B16E7A62334B60D4E034C514DD4EDB306AC1
|
|
|
|
151981114A555E69EB2C3CD5E71FB825151381506E7A574FB3448990CB3E11A8
|
|
|
|
832269C005E9C26601580492B1CC9A7C0FCB5008F1019781A6E06EAC47F270B5
|
|
|
|
333B9BA54F5BDBF73DC36B650AE320A269F2E723DD811A9B557EE001EC7EA037
|
|
|
|
3B88DD277FFA31C82FAC1C80657BCF175E81BD13C55A6F14F8D3FC8F2BBBC57D
|
|
|
|
CEFC0A697A57B27CBD82CF5F2C41DB0E9308A3D7C8374B970D786D0281C100F5
|
|
|
|
D4DE76DC843D98DCF3D49787421D00E7CED08325863FA72793B0CBC339A29D0C
|
|
|
|
1762BBD382EEE3CFD77F99343E8A9D1AB561E10286819A892E0C638C8F95904C
|
|
|
|
2BA43BD83270817401158DB986F4DB41AAAFF769799319BBC958299AEA1809CA
|
|
|
|
A76A13FDE12D35830946DDCA39C1F828EE997F5F6E11365BC0A8417D2BB72CE8
|
|
|
|
A9D31838D6EE6988E2BE8ACB7C50A64EBA9E78CB2519F9A0466411D250EB1F80
|
|
|
|
122071CD6D104D4845F5669A8DE63DECE598549827492306C898655BA6F49702
|
|
|
|
81C100FF2E7B01C2318C22AFE6D3B210542FC2BCC35EF128209C672AACCD997C
|
|
|
|
56FB7263795ECA9EEB4C8E34E5A1D0D56209159311FB929D4839AAB873E5E194
|
|
|
|
6F5768C1798BB5CBA763D3BAE0F54456CFD812CFFA407731C5870E06CCBC9BF0
|
|
|
|
43D8A3DBD050AE0EC1116AD702531398FE76C9323C0B20277671859F15EB09E7
|
|
|
|
FC84F4CC0122AED4C0C3ED9579DF2D0D0B0E625B4E2A04C893F3DCD7D00B2B57
|
|
|
|
C6D7F7825C6C26EB4D9A74BA6D78046B6218B8420816ED46683CDD27E3AB3BE2
|
|
|
|
0748430281C100E6851183662F7F4F6BCA1DCD65E1822F0A306E68BC7452161D
|
|
|
|
CFA996B95FBF7403159ED94072E42EAE04873B93B91DE44A5A52095C83E2DE95
|
|
|
|
CA9F856E166A8AA052C033F9FCFA70F9E5D65F4ADD1998CCD011283138F6CEC7
|
|
|
|
BFFBB32FF85A483C4796FA5E349C5F349C2B5EE9361604EDE527FD3FF087A570
|
|
|
|
8E8D78B3B69D93382D9FAC7408601288710F7A396C3E7865152C6B5B1B546B37
|
|
|
|
772A7967BDC76D877BF7FE9F42A969BEDF134A7E9D978CF42B2C180F81AF5C70
|
|
|
|
0D0492EF49F4CB0281C0139CD1ED6FAC7935CD49336A1321354E854D8AC5842D
|
|
|
|
0578546A559EFF547C1CED924D7BCB3D10743992909E495830948CEA2BE8B7D7
|
|
|
|
EE3EB5D08A918CE405D6D24FF231F5C616C11632E606EB992BE53E40E0A58898
|
|
|
|
C2E98C123E48C9ED9CFFF30C0EB76200EAC2C865B056E8425E84D62C913A566E
|
|
|
|
1F0983119F2FF2B990CA73C77E8FEB60296EE0372EB4FAB4A7D55D6923879C96
|
|
|
|
EA7E45C402A7C1265240FEAEF5CD03F6C1F148C6D31B9BD93D4724241507058B
|
|
|
|
4B6A3FFF9A908EADBA9B0281C07259AACD3FD4D7A3B62814F9F3ADD57972CF52
|
|
|
|
AD319505589E3E838F6A97D45F9965BD9B7A534C007A1B5BEA17D79971F4BCAE
|
|
|
|
ECCAF0283CEFBB81DCED9AB547221520E3D574746A7390303AD0C64F77657575
|
|
|
|
9D0D220B3269B739D2AD84501EAF84F819669AA926BA9F058C40BA1FCE327C38
|
|
|
|
1957F275AD7C6A832086438063A88F8502EC112D06726B9BF550B6E0720B8FDC
|
|
|
|
3DE36D24F6E1A123779CE59D2340A36E025D47E4B1F8B49BBEF1E0FEEB70AE42
|
|
|
|
8B86865554F05081A22BF3F399""",
|
2019-03-02 19:19:41 +00:00
|
|
|
"""080012AD12308209290201000282020100E35735127777C52E66252B014E9650
|
|
|
|
01F3A515317B90DDAC8671F4F820AE67308DE2AA4162E99522CD6DA7EB9D7DB6
|
|
|
|
06489FEB77341A8FA058FAC832EE6EE5E978D512FF79461FC419A23B27C39C81
|
|
|
|
BB635228B0DA5CFAE87080AC1AAE4619BF4576771E6E24A04D98D55ADA5CBA55
|
|
|
|
8EBE06ED14790D71438AFDC1FB9B4E2E623F221F8509A8CFE37265728EFBFAA6
|
|
|
|
0C76E6FBC4A473511CE6EE8A72C1CE1E5D67AB9FC4FA6FE797B854DFE7064C23
|
|
|
|
5ECB1379DB4B1E085F0042E19831D80CBE160A46C5154148A8D20E15C29F12AE
|
|
|
|
208022EF094C5AC565153268DE8318CAFC82D2D71839EA136756FD4EBC3951F2
|
|
|
|
60EE5DA51A63D9AC7B80B7968D769CC82DCE2494BAFE9505C124E947E0E8D3F4
|
|
|
|
A6B207EE195B3FFBFED028DCE59DB5CD60B1C6C316B4A712DAC2E8BF46E00611
|
|
|
|
6685BB77D56E00B2A63B74CFA5C7CAD003BD2DA9F865239DAB45FE52DAB9C792
|
|
|
|
8A705F3A0A3DCEC0B45A73DCE0A63DA1E24417ECD9C4B51342600CD2963BBA4F
|
|
|
|
A3DF170666B9804E1BCC9E7CF171571CB336F383B5A0FA375F7A7F72CC4F4460
|
|
|
|
B8255F4F38556C360D712910B34A8ACE1C270175DFF5CECC7A34681835915BCE
|
|
|
|
5FD4CA52D0F5A57685E28F5DCA1CA5A4410FDEAF516FC4F8226BCE2CFDBA9F83
|
|
|
|
0DD9A0903A18E009BBE818D52D11AD85974021CE0CC908DEC21FD6163EC7FD55
|
|
|
|
8150506FAE4FE6393EA3CC061EC9749DFD020301000102820200535C63E28C9A
|
|
|
|
075C9729E3D60BDA0426630FD2709D8DA62B1FF5634D24B6AEB1D8251826F7BD
|
|
|
|
0CE98108477D96F744AA9330C8A7A21C6733F5CCA7623D99BE8658BF50C30AD6
|
|
|
|
12C9D6586D768C3CB4396116FC42B51F4905B85306489644B02639B351C47FC0
|
|
|
|
C06313BA9020E7C58F9FD2C03968BB66997499DFA8A4B8F2F701218342A986BC
|
|
|
|
36D680D90023BBF3D1B55A5822539DB58735A0DC313A19249A6FC796DFF3DB9C
|
|
|
|
F2FFE8207F257862ACC9928F66AC69A3EE8FDF49A6ED26C1C11266848824B641
|
|
|
|
85021A5BFDD0AA81B005CCD6826E1768655F466180A0AED3858307F985D3A550
|
|
|
|
D6A29AFC3145C582EDEC6B1B3D722AD0E37539E297BAF19655B3FD0DCBBF06DF
|
|
|
|
65135B59D6FD56F2587523B231C7736A39D1C73967E56EF9E1D093DE6136F74A
|
|
|
|
CFABE1B0917F0C67724EA16FC7BD0CF57FF5AED3941AE5DA068A48B3F5726A56
|
|
|
|
223DAF96A24F0D4D22E2CE81B189D0A75A52ECFA50AEE24149E8285E2FD0892E
|
|
|
|
0D028EE5F39CEF0C070418C3C8CEAE1243481417F2277FC9207E8F78841653AF
|
|
|
|
674B1C37A6E9CBF4D9EAB1DB9B43D19AA1F4E24F7A6416A4EE6DB565CDD05616
|
|
|
|
A33EF1A61D74DF07506ACAE38DE6820F384560D39A53DD35302CEC5CDF0A6E42
|
|
|
|
239EC3344EC5088C3E4787480F876223BBFCF70E48F39A37C4B43B33000F1D7B
|
|
|
|
38128484865BC4E9614C3F8AB7FAB0829574ECFB30AAE5E954810282010100F9
|
|
|
|
E86D7571EF36C6A6735EEDEE2AA87FA7A6D269B0EC79D6A4053BB7327ACBBE00
|
|
|
|
8C5C713A056FCEF6777A5A3BC0BE7DB5B94032425394EF579F9847041765E3A0
|
|
|
|
9E9DBD942C8C09BB8EBCB8F5E941055F75BCD2DB1337A93FE2D66B2D4F3F6741
|
|
|
|
FAC20024402A067BD69892D830B8069D93AD3C47A46E12C78D6BA6292F3D3270
|
|
|
|
2F72DC29DF1FDA9BCE4467D13D0A7BA4A69E65B1205F443CB015533788B62919
|
|
|
|
EEA289BA5BAC4B943DA27B611FAAE83119CD5F877763475109ACECC97018BBC4
|
|
|
|
973E34A83C09DD43EF6E4FBECC79BF8B5A9BDABEF78E139FFD5C549848B0B593
|
|
|
|
377F105F5A4B2B44FCACC4745C56B54ABAD14DF31ABF738861F032D48DDE5D02
|
|
|
|
82010100E8E1F25C4EDDF32B479E092C19C824DC02AF331570EE89A557F69936
|
|
|
|
F40567377C1CFA0C077716EE8289D7F0467FA6CF96D483B62AFFCE075A8911EE
|
|
|
|
47E77B56550F2874BA4FA9B6BDEB00606DFE4BE54A2257DCA1AB0B7C394973B3
|
|
|
|
CAE48F9CB352452A6DDC1A8FA28AB85372F3E028C4CA44EE54EA61716F829FF9
|
|
|
|
6FABDEC82EE86B1213C5355778F0262F5E1DC5F292F4BD663D3C37438A4469BB
|
|
|
|
BDFCB3D0E0DE81C16154EBD1204F1D8AED4CFC97FFEB3066780EE143E78E2886
|
|
|
|
0FB637A62F3B6E85428C6FD4F357017AF9647E33E16D1DDF17FF524E53FB8E4D
|
|
|
|
3FE2B24D5DE0FEC1F9D2A6EA9CC63A3AA406584651A2CA6EB7A68AE00E8332C2
|
|
|
|
185F842102820100367ACBF9F17793BA64A8FC05E488DA28D2149504437499EF
|
|
|
|
07DCB832ECC746494A774EE3C42151498E0367E1E9EACFDC39D483C131226572
|
|
|
|
73E8AFDAB372A25CA8344BF0FB2F66EBEC3E66B7EFAC04E7B5F2C5D235BE0FC1
|
|
|
|
4ED315A951BC57F71BB41DBCC82A50BF0F1A2E32BCFC89F1AF42755E91C3AFD7
|
|
|
|
5A3763435AF11867397BAE8F7E754CCD6C6FE00BBDDA8FC17A987429791EB485
|
|
|
|
FCB0EA4534F311BB0E132ECDD5998C8B016B1A53C94D8D058746B7B5DEA3513A
|
|
|
|
47D953205F9D9756BFB9B4EEE7CA06E07CA1E2AB71CDC3B0D521509EB448E569
|
|
|
|
33D498DF3C3F847E60F49537AD81D2A74127D0461793D5B739EE5618A729AA98
|
|
|
|
F61F5BACC917906502820101008F88DB810B56FF0E78D8ADDC91936B2C73371A
|
|
|
|
AC276BCE48AB7BA1195EB389D787D6B04303C2E1CE6584A22444BF5EC7E9B5D7
|
|
|
|
EC4A7A59B8EC93390AFD246E3F5AB3BA029FE683BACF396D8501A64F8EE5EF5E
|
|
|
|
E9EC76E8E04ACABBD65FC219C5C23C7DC6D5E96831894428B1BE5313A0ED11A2
|
|
|
|
04A72FC29950DA58D13B83DA0ED5E288439F0DD87FAE598D9F7A49AD7C8218F8
|
|
|
|
37709C918F3E44464AE1A1440F04D9FF6D7A19063361CF816CE42FA42BE71F45
|
|
|
|
3892DCD0F8B25A4B1DBDC7586B4407446A3C0724D2429D289B6BE50567E29407
|
|
|
|
6A3E772E7A7A86BC415E93D1C39F8E1256EA2C6C9683C42595890D24114B35A3
|
|
|
|
C133CE212051B1897259E55D210282010100999A507C3D551ECC5F68A63C80E5
|
|
|
|
DC15177996E55203CDA99B69C1C6B4E2D7DE52660412BFD7CE9AC7C7427533A3
|
|
|
|
A442DCA58CB14F7B776D3D9A681FC7D3762A789E4BFBC7D854704CFE1726154C
|
|
|
|
DB9F1DC399AF2A687AFB2FCBD110EBD5A00AE8CA70DA5C94670AF149B909BC91
|
|
|
|
829848B4479470D843E800D366F735F7BCE5F209775156FB57F6B77316CD54F2
|
|
|
|
558938D43D500160A280F299906C8119BF67E6B080522EB7BF074E3E20141EA3
|
|
|
|
4F4DAABB32A15D3693E301ED3F0E35F2F663EC3F3F93DD63063ECFB12FD29CCE
|
|
|
|
F01A15B0BE6BA9BB352F11FF7DC08DB863BE69A77E4F3644EA12F949A3167FC8
|
|
|
|
2E67516B0572EC62AB9F05775636808B9E3C""",
|
|
|
|
"""08031279307702010104202D19BABF4420E2F25F075A71DA9DA86E29596C6013
|
|
|
|
B8FD50D5999F98DF636226A00A06082A8648CE3D030107A14403420004AA407C
|
|
|
|
C163A2BFF807DAE1BB58A67A3C1A3C80CF83C31C9736607407137511F06812B6
|
|
|
|
F497BA747F5CA6CB69E21ADA2F291A6040D2D58BD254E1ECCB13B72999""",
|
|
|
|
"""08011240B9EA7F0357B5C1247E4FCB5AD09C46818ECB07318CA84711875F4C6C
|
|
|
|
E6B946186A4EB44E0D714B2A2D48263D75CF52D30BEF9D9AE2A9FEB7DAF1775F
|
2024-06-11 15:18:06 +00:00
|
|
|
E731065A""",
|
2019-03-02 19:19:41 +00:00
|
|
|
]
|
|
|
|
|
|
|
|
PublicKeys = [
|
|
|
|
"""080012A60230820122300D06092A864886F70D01010105000382010F00308201
|
|
|
|
0A0282010100C8B014EC01E135D635F7E246BA7D423E2B36F45B052F0B644DA6
|
|
|
|
B1B6DD964696F279BB9BB5F5C41EE3204F74EF70C228C8CDD97E4F19094274EB
|
|
|
|
01C292EC25055CB3CECD1A41E8919A0C111602B1B85B4E43DBB2F4898C527384
|
|
|
|
65F35E3085586CF01E407BE6CB5F0C08D0AD6D6FE02A43C932E124E9C8498E67
|
|
|
|
BA323CC84A275ACCC20D586C04DAF54FE98018FF1562E80514735A3237AA3C1D
|
|
|
|
D2B4281FCAD3BD94952F0397A3F15B06269107C147C15645DCB507C566E66BF2
|
|
|
|
4E2745A05E4D31F364C2C50C0F5C9A6889378051BF05669EA905C2370548D6EF
|
|
|
|
2CF66A4A5DC23F10B7614BC43CF0BFCC8711B6FF9F645FC2E5713ED1CB597539
|
|
|
|
2B8C865202690203010001""",
|
2020-07-15 08:24:04 +00:00
|
|
|
"""080012A603308201A2300D06092A864886F70D01010105000382018F00308201
|
|
|
|
8A0282018100F50BABF75636386F1C606950F495F53149B648408E5D61B7EB0C
|
|
|
|
9F96681CC685F35358A3B91C2AD848C819902FFCD2D3B1E46F806DC464109CEE
|
|
|
|
43BDA4BDD01EE8A3F035B654C965255B5834A34C6F3543E66A0D61545B42F2BF
|
|
|
|
819E76B602F6F6ADECB6EC81FBCFB0EBC9CAEFC7AAD95DB7E91B52C4CF3BA5B2
|
|
|
|
5CCADB117FFE2488A906FFD56318A39B3054E3D221D95334A385A6AF9A00D51D
|
|
|
|
119D953E2ADCDFF57708DA27602A2BF4C4B9D6205935A22313086C8531017EF7
|
|
|
|
49B407B76A25280DD079CB7A0FACE87BA6EDA0C94539E8CBC91D7E709E3BD32F
|
|
|
|
266D4949B829A01303513AC3BF9777A8A6657AE1F2CDF18FF026C23321B2BFFA
|
|
|
|
AD68250D054F7B24B98A18AF270EF7A5FF918BCABA3BDF1F44C0345CFD4B4CDD
|
|
|
|
A9D51486D281F9560D69C0C30718118AD76C6BAB4AE585A188A16A1148131D55
|
|
|
|
8555B36E8348065C7441D6D823906E13EF6F2873109F3AF729637379CF07028F
|
|
|
|
BFC34411DCDC765C38BBFC632556B29415EDC70DF8352EFEF1BED37656565ECB
|
|
|
|
8598EF9D7B850203010001""",
|
2019-03-02 19:19:41 +00:00
|
|
|
"""080012A60430820222300D06092A864886F70D01010105000382020F00308202
|
|
|
|
0A0282020100E35735127777C52E66252B014E965001F3A515317B90DDAC8671
|
|
|
|
F4F820AE67308DE2AA4162E99522CD6DA7EB9D7DB606489FEB77341A8FA058FA
|
|
|
|
C832EE6EE5E978D512FF79461FC419A23B27C39C81BB635228B0DA5CFAE87080
|
|
|
|
AC1AAE4619BF4576771E6E24A04D98D55ADA5CBA558EBE06ED14790D71438AFD
|
|
|
|
C1FB9B4E2E623F221F8509A8CFE37265728EFBFAA60C76E6FBC4A473511CE6EE
|
|
|
|
8A72C1CE1E5D67AB9FC4FA6FE797B854DFE7064C235ECB1379DB4B1E085F0042
|
|
|
|
E19831D80CBE160A46C5154148A8D20E15C29F12AE208022EF094C5AC5651532
|
|
|
|
68DE8318CAFC82D2D71839EA136756FD4EBC3951F260EE5DA51A63D9AC7B80B7
|
|
|
|
968D769CC82DCE2494BAFE9505C124E947E0E8D3F4A6B207EE195B3FFBFED028
|
|
|
|
DCE59DB5CD60B1C6C316B4A712DAC2E8BF46E006116685BB77D56E00B2A63B74
|
|
|
|
CFA5C7CAD003BD2DA9F865239DAB45FE52DAB9C7928A705F3A0A3DCEC0B45A73
|
|
|
|
DCE0A63DA1E24417ECD9C4B51342600CD2963BBA4FA3DF170666B9804E1BCC9E
|
|
|
|
7CF171571CB336F383B5A0FA375F7A7F72CC4F4460B8255F4F38556C360D7129
|
|
|
|
10B34A8ACE1C270175DFF5CECC7A34681835915BCE5FD4CA52D0F5A57685E28F
|
|
|
|
5DCA1CA5A4410FDEAF516FC4F8226BCE2CFDBA9F830DD9A0903A18E009BBE818
|
|
|
|
D52D11AD85974021CE0CC908DEC21FD6163EC7FD558150506FAE4FE6393EA3CC
|
|
|
|
061EC9749DFD0203010001""",
|
|
|
|
"""0803125B3059301306072A8648CE3D020106082A8648CE3D03010703420004AA
|
|
|
|
407CC163A2BFF807DAE1BB58A67A3C1A3C80CF83C31C9736607407137511F068
|
|
|
|
12B6F497BA747F5CA6CB69E21ADA2F291A6040D2D58BD254E1ECCB13B72999""",
|
|
|
|
"""080112206A4EB44E0D714B2A2D48263D75CF52D30BEF9D9AE2A9FEB7DAF1775F
|
2024-06-11 15:18:06 +00:00
|
|
|
E731065A""",
|
2019-03-02 19:19:41 +00:00
|
|
|
]
|
|
|
|
|
|
|
|
# Key expanding test vectors obtained from Go implementation
|
|
|
|
# https://github.com/libp2p/go-libp2p-crypto/blob/master/key.go
|
|
|
|
Secrets = [
|
|
|
|
# AES-128 SHA-256
|
|
|
|
"4F13360145891C202B74FDCA838A85A37CBAEBF5E0774CC344BD6DABA9C4C86A",
|
|
|
|
"""4ED31DA5EEA36277CA9E1C198F3EBB89AE4A6B18B76E48CAE8AEC23A7D0D4E8F
|
|
|
|
700D6696AB01365278E5C45C2B4B1807""",
|
|
|
|
"""01D4FBB5104F9B8DEDA95B447C1401A35F995B6BEFE20DBEFF9F7A13B7DA2831
|
|
|
|
FB5A7EA194C4CE1ECE340B993C4C2C53FE641227DB7428B62BF4083686F6FF8F
|
|
|
|
BE8C""",
|
|
|
|
# Edge case (where Go implementation returns 65 bytes of secret)
|
|
|
|
# Nim implementation has leading `00`.
|
|
|
|
"""00691BB84462F460D603B3F5FA0031D8DE195234C65B8890CBB6F84456E9718D
|
|
|
|
4572749FC6040D0602698EEE6CCF6FB83101A26925D1A3AB40FB45BF98EAF06A
|
|
|
|
2693""",
|
|
|
|
# AES-256 SHA-512
|
|
|
|
"1F29EC3E0A07994D2ACCEA23A2F570DA9C7A7E39D5026FE6340C1E551E1ADAAF",
|
|
|
|
"""85C20386C1EA1575DD8D111111DBC8B43CA630BEE4BB9AD91658719FF307C0BE
|
|
|
|
0065935B8B849BE80E0D08A3D39098C3""",
|
|
|
|
"""01779213E2993A77F1E1BB3B4DB77B5900B53A3A31CDE95D352C695643879824
|
|
|
|
C8EE6501DC8679F5735869251256830A31357B34FF463B9292C02CD22CD30351
|
|
|
|
C44F""",
|
|
|
|
# Edge case (where Go implementation returns 65 bytes of secret)
|
|
|
|
# Nim implementation has leading `00`.
|
|
|
|
"""001CC33294544D898781010258C2FB81F02429D2DD54D0B59B8CD2335F57498F
|
|
|
|
D4E444BEC94DA7BE2BAF3E3796AFA8388F626AEB3178355991985EE5FFC9D1AA
|
|
|
|
CAD9""",
|
|
|
|
]
|
|
|
|
|
|
|
|
Ivs = [
|
2024-06-11 15:18:06 +00:00
|
|
|
"F643627AA8B91D40BA644B894C7F148E", "F1D6521E4EE59248F7CCFA6D6C916A32",
|
|
|
|
"937D77D24441858AF5040C9A81B3D178", "C7D6AE667F38A3E0C77F4AC96D82112F",
|
|
|
|
"735E51C37802A6E72277EE74C829A84D", "617BAEA342062AE87B7A5D5D9F99371C",
|
|
|
|
"B535FFA95043C90C5FEEF3654E846445", "3B2D2219A7EE18AB9164910821955C05",
|
|
|
|
"DACC23805C4ED233A7100A488AB5D68F", "C5BFA3F8BF0D8436840D1AAAF091BD69",
|
|
|
|
"54CA4A681AEB8B5793A450100244256F", "D1EB94C73D4C033EA4130B47669F4485",
|
|
|
|
"1F1ADF6BBDE1DFC5F922D672D2344F3A", "A828F6D249F38A917CD297F7BDDE7B70",
|
|
|
|
"54FC8070579A17F6DAD342174062D60A", "D33C7696183DA21C5CD40AB677BECE7C",
|
2019-03-02 19:19:41 +00:00
|
|
|
]
|
|
|
|
|
|
|
|
CipherKeys = [
|
2024-06-11 15:18:06 +00:00
|
|
|
"8C2964320284FAD935AFEC1AFEC9EEF7", "622A9292256B012F3EBE814C0DB22095",
|
|
|
|
"3171DCDBE794BB6CAADDDD71E1751F2C", "5E1519DFCABA2AF17AA4AA580CC1B76E",
|
|
|
|
"8B7AC311FF7B7EA7B4E55E37688DA2BD", "6BB6E06A3A92D5C300598023330712D4",
|
|
|
|
"D794A6B794C1E3501A24240D348B9A62", "45E2FFAC35B7647AD5045C8581F39BF0",
|
2019-03-02 19:19:41 +00:00
|
|
|
"B2F8CDBD11B158DC68120E10A6D04C0B272DC3F698EB56B18094275076307CEB",
|
|
|
|
"E0238BAA6B77646CD708DD00DE1FD17C6BB45F184348F512F4AE64E00CEA37B9",
|
|
|
|
"CE009DE8D1C76C2793540A8B24774E09B0F84590B583F1A0551AC0CF1E911BF9",
|
|
|
|
"ED5F14E36F4F2F80084571B24FD55C870B9C2AD937694B75B90E67D3591DC921",
|
|
|
|
"1607CC9FF2B19E8F0CDA902D5996948E8EA8CFFA03F956038497684088A88B2F",
|
|
|
|
"FC2797D1040FF162A90275EBA3FCC4330C2BDC28D23DA80B89842C2D7A6EFA06",
|
|
|
|
"B83698789ED8E3B44E48EAAEB291B3003AD95FAF344EBA1B9071F4FB46A4E4E9",
|
|
|
|
"5D90C579971B7B7F9ECDE55EBCE8921B807AAD45D61952228758BA80F4490E8F",
|
|
|
|
]
|
|
|
|
|
|
|
|
MacKeys = [
|
|
|
|
"2C812CB8425299B485CEE0BC97778F540380F14F",
|
|
|
|
"8AB685E8A66256480E794B0ADC09BCF4014883C8",
|
|
|
|
"C68EF3F3102D0CEFC0924FEF17D51FABC23EA54C",
|
|
|
|
"F177BD066555CF25327C32C807D2E44B7DAC3EFF",
|
|
|
|
"57176FF3103FA0F4EB58B9E49133C48B4DE9BDE6",
|
|
|
|
"0C9ECECB80DF43CA2720DD340DD992A80AAB56DB",
|
|
|
|
"028BCC3F5559CF43DA1B0C1A03E263C90D04DD77",
|
|
|
|
"02DAF3FF888999C6121CA50F1D49C10FF55F1ACF",
|
|
|
|
"6F015DDA49E0DFABD5532E6CB08709CE43F326EC",
|
|
|
|
"68C703B3867247723D21A8C58BA9109DDBB359EF",
|
|
|
|
"6C91DBB5FE99B94A11D0937D0F4E50F2BCB248F3",
|
|
|
|
"D5A856ECC5820D611111BE8CEAAD781E6E4E549D",
|
|
|
|
"9DCEB01D9657A69D40B1885C392FA850486E32B3",
|
|
|
|
"EE66A1579D732E99A8500F48595BF25289E722DB",
|
|
|
|
"E692EC73B0A2E68625221E1D01BA0E6B24BCB43F",
|
|
|
|
"8613E8F86D2DD1CF3CEDC52AD91423F2F31E0003",
|
|
|
|
]
|
|
|
|
|
2021-12-16 10:05:20 +00:00
|
|
|
proc cmp(a, b: openArray[byte]): bool =
|
2019-03-02 19:19:41 +00:00
|
|
|
result = (@a == @b)
|
|
|
|
|
2019-09-11 16:03:39 +00:00
|
|
|
proc testStretcher(s, e: int, cs: string, ds: string): bool =
|
2024-06-11 15:18:06 +00:00
|
|
|
for i in s ..< e:
|
2019-03-02 19:19:41 +00:00
|
|
|
var sharedsecret = fromHex(stripSpaces(Secrets[i]))
|
|
|
|
var secret = stretchKeys(cs, ds, sharedsecret)
|
|
|
|
var iv1 = fromHex(stripSpaces(Ivs[i * 2]))
|
|
|
|
var iv2 = fromHex(stripSpaces(Ivs[i * 2 + 1]))
|
|
|
|
var ckey1 = fromHex(stripSpaces(CipherKeys[i * 2]))
|
|
|
|
var ckey2 = fromHex(stripSpaces(CipherKeys[i * 2 + 1]))
|
|
|
|
var mkey1 = fromHex(stripSpaces(MacKeys[i * 2]))
|
|
|
|
var mkey2 = fromHex(stripSpaces(MacKeys[i * 2 + 1]))
|
|
|
|
var r1 = cmp(secret.ivOpenArray(0), iv1) == true
|
|
|
|
var r2 = cmp(secret.ivOpenArray(1), iv2) == true
|
|
|
|
var r3 = secret.iv(0) == iv1
|
|
|
|
var r4 = secret.iv(1) == iv2
|
|
|
|
var r5 = cmp(secret.keyOpenArray(0), ckey1) == true
|
|
|
|
var r6 = cmp(secret.keyOpenArray(1), ckey2) == true
|
|
|
|
var r7 = secret.key(0) == ckey1
|
|
|
|
var r8 = secret.key(1) == ckey2
|
|
|
|
var r9 = cmp(secret.macOpenArray(0), mkey1) == true
|
|
|
|
var rA = cmp(secret.macOpenArray(1), mkey2) == true
|
|
|
|
var rB = secret.mac(0) == mkey1
|
|
|
|
var rC = secret.mac(1) == mkey2
|
2024-06-11 15:18:06 +00:00
|
|
|
result =
|
|
|
|
r1 and r2 and r3 and r4 and r5 and r6 and r7 and r8 and r9 and rA and rB and rC
|
2019-03-02 19:19:41 +00:00
|
|
|
if not result:
|
|
|
|
break
|
|
|
|
|
2020-07-07 11:14:11 +00:00
|
|
|
let rng = newRng()
|
|
|
|
|
2019-03-02 19:19:41 +00:00
|
|
|
suite "Key interface test suite":
|
|
|
|
test "Go test vectors":
|
2024-06-11 15:18:06 +00:00
|
|
|
for i in 0 ..< len(PrivateKeys):
|
|
|
|
var seckey =
|
|
|
|
PrivateKey.init(fromHex(stripSpaces(PrivateKeys[i]))).expect("private key")
|
|
|
|
var pubkey =
|
|
|
|
PublicKey.init(fromHex(stripSpaces(PublicKeys[i]))).expect("public key")
|
2021-09-02 10:03:40 +00:00
|
|
|
var calckey = seckey.getPublicKey().expect("public key")
|
2019-03-02 19:19:41 +00:00
|
|
|
check:
|
|
|
|
pubkey == calckey
|
2020-05-18 05:25:55 +00:00
|
|
|
var checkseckey = seckey.getBytes().expect("private key")
|
|
|
|
var checkpubkey = pubkey.getBytes().expect("public key")
|
2019-03-02 19:19:41 +00:00
|
|
|
check:
|
|
|
|
toHex(checkseckey) == stripSpaces(PrivateKeys[i])
|
|
|
|
toHex(checkpubkey) == stripSpaces(PublicKeys[i])
|
|
|
|
|
2023-08-01 13:28:38 +00:00
|
|
|
test "Spec test vectors":
|
|
|
|
# https://github.com/libp2p/specs/pull/537
|
|
|
|
const keys = [
|
2024-06-11 15:18:06 +00:00
|
|
|
(
|
|
|
|
private:
|
|
|
|
"08031279307702010104203E5B1FE9712E6C314942A750BD67485DE3C1EFE85B1BFB520AE8F9AE3DFA4A4CA00A06082A8648CE3D030107A14403420004DE3D300FA36AE0E8F5D530899D83ABAB44ABF3161F162A4BC901D8E6ECDA020E8B6D5F8DA30525E71D6851510C098E5C47C646A597FB4DCEC034E9F77C409E62",
|
|
|
|
public:
|
|
|
|
"0803125b3059301306072a8648ce3d020106082a8648ce3d03010703420004de3d300fa36ae0e8f5d530899d83abab44abf3161f162a4bc901d8e6ecda020e8b6d5f8da30525e71d6851510c098e5c47c646a597fb4dcec034e9f77c409e62",
|
|
|
|
),
|
|
|
|
(
|
|
|
|
private:
|
|
|
|
"080112407e0830617c4a7de83925dfb2694556b12936c477a0e1feb2e148ec9da60fee7d1ed1e8fae2c4a144b8be8fd4b47bf3d3b34b871c3cacf6010f0e42d474fce27e",
|
|
|
|
public:
|
|
|
|
"080112201ed1e8fae2c4a144b8be8fd4b47bf3d3b34b871c3cacf6010f0e42d474fce27e",
|
|
|
|
),
|
|
|
|
(
|
|
|
|
private:
|
|
|
|
"0802122053DADF1D5A164D6B4ACDB15E24AA4C5B1D3461BDBD42ABEDB0A4404D56CED8FB",
|
|
|
|
public:
|
|
|
|
"08021221037777e994e452c21604f91de093ce415f5432f701dd8cd1a7a6fea0e630bfca99",
|
|
|
|
),
|
|
|
|
(
|
|
|
|
private:
|
|
|
|
"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
|
|
|
|
public:
|
|
|
|
"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",
|
|
|
|
),
|
2023-08-01 13:28:38 +00:00
|
|
|
]
|
|
|
|
for (private, public) in keys:
|
|
|
|
var seckey = PrivateKey.init(fromHex(private)).expect("private key")
|
|
|
|
var pubkey = PublicKey.init(fromHex(public)).expect("public key")
|
|
|
|
var calckey = seckey.getPublicKey().expect("public key")
|
|
|
|
check:
|
|
|
|
pubkey == calckey
|
|
|
|
var checkseckey = seckey.getBytes().expect("private key")
|
|
|
|
var checkpubkey = pubkey.getBytes().expect("public key")
|
|
|
|
check:
|
|
|
|
toHex(checkseckey) == stripSpaces(private).toUpper()
|
|
|
|
toHex(checkpubkey) == stripSpaces(public).toUpper()
|
|
|
|
|
2019-03-06 11:23:12 +00:00
|
|
|
test "Generate/Sign/Serialize/Deserialize/Verify test":
|
|
|
|
var msg = "message to sign"
|
|
|
|
var bmsg = cast[seq[byte]](msg)
|
|
|
|
|
2024-06-11 15:18:06 +00:00
|
|
|
for i in 0 ..< 5:
|
2020-07-07 11:14:11 +00:00
|
|
|
var seckey = PrivateKey.random(ECDSA, rng[]).get()
|
2021-09-02 10:03:40 +00:00
|
|
|
var pubkey = seckey.getPublicKey().get()
|
2020-07-07 11:14:11 +00:00
|
|
|
var pair = KeyPair.random(ECDSA, rng[]).get()
|
2020-05-18 05:25:55 +00:00
|
|
|
var sig1 = pair.seckey.sign(bmsg).get()
|
|
|
|
var sig2 = seckey.sign(bmsg).get()
|
2019-03-06 11:23:12 +00:00
|
|
|
var sersig1 = sig1.getBytes()
|
|
|
|
var sersig2 = sig2.getBytes()
|
2020-05-18 05:25:55 +00:00
|
|
|
var serpub1 = pair.pubkey.getBytes().get()
|
|
|
|
var serpub2 = pubkey.getBytes().get()
|
|
|
|
var recsig1 = Signature.init(sersig1).get()
|
|
|
|
var recsig2 = Signature.init(sersig2).get()
|
|
|
|
var recpub1 = PublicKey.init(serpub1).get()
|
|
|
|
var recpub2 = PublicKey.init(serpub2).get()
|
2019-03-06 11:23:12 +00:00
|
|
|
check:
|
|
|
|
sig1.verify(bmsg, pair.pubkey) == true
|
|
|
|
recsig1.verify(bmsg, recpub1) == true
|
|
|
|
sig2.verify(bmsg, pubkey) == true
|
|
|
|
recsig2.verify(bmsg, recpub2) == true
|
|
|
|
|
2024-06-11 15:18:06 +00:00
|
|
|
for i in 0 ..< 5:
|
2020-07-07 11:14:11 +00:00
|
|
|
var seckey = PrivateKey.random(Ed25519, rng[]).get()
|
2021-09-02 10:03:40 +00:00
|
|
|
var pubkey = seckey.getPublicKey().get()
|
2020-07-07 11:14:11 +00:00
|
|
|
var pair = KeyPair.random(Ed25519, rng[]).get()
|
2020-05-18 05:25:55 +00:00
|
|
|
var sig1 = pair.seckey.sign(bmsg).get()
|
|
|
|
var sig2 = seckey.sign(bmsg).get()
|
2019-03-06 11:23:12 +00:00
|
|
|
var sersig1 = sig1.getBytes()
|
|
|
|
var sersig2 = sig2.getBytes()
|
2020-05-18 05:25:55 +00:00
|
|
|
var serpub1 = pair.pubkey.getBytes().get()
|
|
|
|
var serpub2 = pubkey.getBytes().get()
|
|
|
|
var recsig1 = Signature.init(sersig1).get()
|
|
|
|
var recsig2 = Signature.init(sersig2).get()
|
|
|
|
var recpub1 = PublicKey.init(serpub1).get()
|
|
|
|
var recpub2 = PublicKey.init(serpub2).get()
|
2019-03-06 11:23:12 +00:00
|
|
|
check:
|
|
|
|
sig1.verify(bmsg, pair.pubkey) == true
|
|
|
|
recsig1.verify(bmsg, recpub1) == true
|
|
|
|
sig2.verify(bmsg, pubkey) == true
|
|
|
|
recsig2.verify(bmsg, recpub2) == true
|
|
|
|
|
2020-07-15 08:24:04 +00:00
|
|
|
for i in 0 ..< 2:
|
|
|
|
var seckey = PrivateKey.random(RSA, rng[], 2048).get()
|
2021-09-02 10:03:40 +00:00
|
|
|
var pubkey = seckey.getPublicKey().get()
|
2020-07-15 08:24:04 +00:00
|
|
|
var pair = KeyPair.random(RSA, rng[], 2048).get()
|
2020-05-18 05:25:55 +00:00
|
|
|
var sig1 = pair.seckey.sign(bmsg).get()
|
|
|
|
var sig2 = seckey.sign(bmsg).get()
|
2019-03-06 11:23:12 +00:00
|
|
|
var sersig1 = sig1.getBytes()
|
|
|
|
var sersig2 = sig2.getBytes()
|
2020-05-18 05:25:55 +00:00
|
|
|
var serpub1 = pair.pubkey.getBytes().get()
|
|
|
|
var serpub2 = pubkey.getBytes().get()
|
|
|
|
var recsig1 = Signature.init(sersig1).get()
|
|
|
|
var recsig2 = Signature.init(sersig2).get()
|
|
|
|
var recpub1 = PublicKey.init(serpub1).get()
|
|
|
|
var recpub2 = PublicKey.init(serpub2).get()
|
2019-03-06 11:23:12 +00:00
|
|
|
check:
|
|
|
|
sig1.verify(bmsg, pair.pubkey) == true
|
|
|
|
recsig1.verify(bmsg, recpub1) == true
|
|
|
|
sig2.verify(bmsg, pubkey) == true
|
|
|
|
recsig2.verify(bmsg, recpub2) == true
|
|
|
|
|
2019-03-02 19:19:41 +00:00
|
|
|
test "Go key stretch function AES128-SHA256 test vectors":
|
2019-09-11 16:03:39 +00:00
|
|
|
check testStretcher(0, 4, "AES-128", "SHA256") == true
|
2019-03-02 19:19:41 +00:00
|
|
|
test "Go key stretch function AES256-SHA512 test vectors":
|
2019-09-11 16:03:39 +00:00
|
|
|
check testStretcher(4, 8, "AES-256", "SHA512") == true
|
2020-02-14 05:54:00 +00:00
|
|
|
|
|
|
|
test "ChaChaPoly":
|
|
|
|
# test data from:
|
|
|
|
# https://github.com/RustCrypto/AEADs/blob/0cf02f200c8f9404979b46356a8a7b67d7c35a96/chacha20poly1305/tests/lib.rs#L66
|
|
|
|
let
|
2024-06-11 15:18:06 +00:00
|
|
|
plain = cast[seq[byte]](@"Ladies and Gentlemen of the class of '99: If I could offer you only one tip for the future, sunscreen would be it.")
|
|
|
|
tag: ChaChaPolyTag = [
|
|
|
|
0x1a.byte, 0xe1, 0x0b, 0x59, 0x4f, 0x09, 0xe2, 0x6a, 0x7e, 0x90, 0x2e, 0xcb,
|
|
|
|
0xd0, 0x60, 0x06, 0x91,
|
|
|
|
]
|
2020-02-14 05:54:00 +00:00
|
|
|
var
|
2024-06-11 15:18:06 +00:00
|
|
|
key: ChaChaPolyKey = [
|
|
|
|
0x80.byte, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, 0x89, 0x8a, 0x8b,
|
|
|
|
0x8c, 0x8d, 0x8e, 0x8f, 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98,
|
|
|
|
0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f,
|
|
|
|
]
|
|
|
|
nonce: ChaChaPolyNonce =
|
|
|
|
[0x07.byte, 0x00, 0x00, 0x00, 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47]
|
2020-02-14 05:54:00 +00:00
|
|
|
ntag: ChaChaPolyTag # empty
|
|
|
|
text = plain
|
2024-06-11 15:18:06 +00:00
|
|
|
cipher = [
|
|
|
|
0xd3.byte, 0x1a, 0x8d, 0x34, 0x64, 0x8e, 0x60, 0xdb, 0x7b, 0x86, 0xaf, 0xbc,
|
|
|
|
0x53, 0xef, 0x7e, 0xc2, 0xa4, 0xad, 0xed, 0x51, 0x29, 0x6e, 0x08, 0xfe, 0xa9,
|
|
|
|
0xe2, 0xb5, 0xa7, 0x36, 0xee, 0x62, 0xd6, 0x3d, 0xbe, 0xa4, 0x5e, 0x8c, 0xa9,
|
|
|
|
0x67, 0x12, 0x82, 0xfa, 0xfb, 0x69, 0xda, 0x92, 0x72, 0x8b, 0x1a, 0x71, 0xde,
|
|
|
|
0x0a, 0x9e, 0x06, 0x0b, 0x29, 0x05, 0xd6, 0xa5, 0xb6, 0x7e, 0xcd, 0x3b, 0x36,
|
|
|
|
0x92, 0xdd, 0xbd, 0x7f, 0x2d, 0x77, 0x8b, 0x8c, 0x98, 0x03, 0xae, 0xe3, 0x28,
|
|
|
|
0x09, 0x1b, 0x58, 0xfa, 0xb3, 0x24, 0xe4, 0xfa, 0xd6, 0x75, 0x94, 0x55, 0x85,
|
|
|
|
0x80, 0x8b, 0x48, 0x31, 0xd7, 0xbc, 0x3f, 0xf4, 0xde, 0xf0, 0x8e, 0x4b, 0x7a,
|
|
|
|
0x9d, 0xe5, 0x76, 0xd2, 0x65, 0x86, 0xce, 0xc6, 0x4b, 0x61, 0x16,
|
|
|
|
]
|
|
|
|
aed =
|
|
|
|
[0x50.byte, 0x51, 0x52, 0x53, 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7]
|
2020-02-14 05:54:00 +00:00
|
|
|
|
|
|
|
ChaChaPoly.encrypt(key, nonce, ntag, text, aed)
|
2020-02-14 11:09:14 +00:00
|
|
|
check text.toHex == cipher.toHex
|
|
|
|
check ntag.toHex == tag.toHex
|
2020-02-14 05:54:00 +00:00
|
|
|
ChaChaPoly.decrypt(key, nonce, ntag, text, aed)
|
2020-02-14 11:09:14 +00:00
|
|
|
check text.toHex == plain.toHex
|
Noise (#90)
* Start ChaCha20Poly1305 integration (BearSSL)
* Add Curve25519 (BearSSL) required operations for noise
* Fix curve mulgen iterate/derive
* Fix misleading header
* Add chachapoly proper test
* Curve25519 integration tests (failing, something is wrong)
* Add few converters, finish c25519 integration tests
* Remove implicit converters
* removed internal globals
* Start noise implementation
* Fix public() using proper bear mulgen
* Noise protocol WIP
* Noise progress
* Add a quick nim version of HKDF
* Converted hkdf to iterator, useful for noise
* Noise protocol implementation progress
* Noise progress
* XX handshake almost there
* noise progress
* Noise, testing handshake with test vectors
* Noise handshake progress, still wrong somewhere!
* Noise handshake success!
* Full verified noise XX handshake completed
* Fix and rewrite test to be similar to switch one
* Start with connection upgrade
* Switch chachapoly to CT implementations
* Improve HKDF implementation
* Use a type insted of tuple for HandshakeResult
* Remove unnecessary Let
* More cosmetic fixes
* Properly check randomBytes result
* Fix chachapoly signature
* Noise full circle (altho dispatcher is nil cursed)
* Allow nil aads in chachapoly routines
* Noise implementation up to running full test
* Use bearssl HKDF as well
* Directly use bearssl rng for curve25519 keys
* Add a (disabled/no CI) noise interop test server
* WIP on fixing interop issues
* More fixes in noise implementation for interop
* bump chronos requirement (nimble)
* Add a chachapoly test for very small size payloads
* Noise, more tracing
* Add 2 properly working noise tests
* Fix payload packing, following the spec properly (and not go version but
rather rust)
* Sanity, replace discard with asyncCheck
* Small fixes and optimization
* Use stew endian2 rather then system endian module
* Update nimble deps (chronos)
* Minor cosmetic/code sanity fixes
* Noise, handle Nonce max
* Noise tests, make sure to close secured conns
* More polish, improve code readability too
* More polish and testing again which test fails
* Further polishing
* Restore noise tests
* Remove useless Future[void]
* Remove useless CipherState initializer
* add a proper read wait future in second noise test
* Remove noise generic secure implementation for now
* Few fixes to run eth2 sim
* Add more debug info in noise traces
* Merge size + payload write in sendEncryptedMessage
* Revert secure interface, add outgoing property directly in newNoise
* remove sendEncrypted and receiveEncrypted
* Use openarray in chachapoly and curve25519 helpers
2020-03-17 12:30:01 +00:00
|
|
|
check ntag.toHex == tag.toHex
|
|
|
|
|
|
|
|
# ensure even a 2 byte array works
|
|
|
|
var
|
|
|
|
smallPlain: array[2, byte]
|
|
|
|
btag: ChaChaPolyTag
|
|
|
|
noaed: array[0, byte]
|
|
|
|
ChaChaPoly.encrypt(key, nonce, btag, smallPlain, noaed)
|
|
|
|
ntag = btag
|
|
|
|
ChaChaPoly.decrypt(key, nonce, btag, smallPlain, noaed)
|
|
|
|
check ntag.toHex == btag.toHex
|
2020-02-14 05:54:00 +00:00
|
|
|
|
2022-04-12 10:41:48 +00:00
|
|
|
# ensure even a 0 byte array works
|
|
|
|
block:
|
|
|
|
var
|
|
|
|
emptyPlain: array[0, byte]
|
|
|
|
btag: ChaChaPolyTag
|
|
|
|
noaed: array[0, byte]
|
|
|
|
ChaChaPoly.encrypt(key, nonce, btag, emptyPlain, noaed)
|
|
|
|
ntag = btag
|
|
|
|
ChaChaPoly.decrypt(key, nonce, btag, emptyPlain, noaed)
|
|
|
|
check ntag.toHex == btag.toHex
|
|
|
|
|
2020-02-14 06:43:05 +00:00
|
|
|
test "Curve25519":
|
2020-02-14 11:09:14 +00:00
|
|
|
# from bearssl test_crypto.c
|
2020-02-14 06:43:05 +00:00
|
|
|
var
|
2024-06-11 15:18:06 +00:00
|
|
|
bearOp = fromHex(
|
|
|
|
"A546E36BF0527C9D3B16154B82465EDD62144C0AC1FC5A18506A2244BA449AC4"
|
|
|
|
)
|
|
|
|
.intoCurve25519Key()
|
|
|
|
bearIn = fromHex(
|
|
|
|
"E6DB6867583030DB3594C1A424B15F7C726624EC26B3353B10A903A6D0AB1C4C"
|
|
|
|
)
|
|
|
|
.intoCurve25519Key()
|
|
|
|
bearOut = fromHex(
|
|
|
|
"C3DA55379DE9C6908E94EA4DF28D084F32ECCF03491C71F754B4075577A28552"
|
|
|
|
)
|
|
|
|
.intoCurve25519Key()
|
2020-02-14 11:09:14 +00:00
|
|
|
|
2020-08-04 09:19:26 +00:00
|
|
|
Curve25519.mul(bearIn, bearOp)
|
|
|
|
check bearIn == bearOut
|
2020-02-14 11:09:14 +00:00
|
|
|
|
|
|
|
# from https://github.com/golang/crypto/blob/1d94cc7ab1c630336ab82ccb9c9cda72a875c382/curve25519/vectors_test.go#L26
|
|
|
|
var
|
2024-06-11 15:18:06 +00:00
|
|
|
private1: Curve25519Key = [
|
|
|
|
0x66.byte, 0x8f, 0xb9, 0xf7, 0x6a, 0xd9, 0x71, 0xc8, 0x1a, 0xc9, 0x0, 0x7, 0x1a,
|
|
|
|
0x15, 0x60, 0xbc, 0xe2, 0xca, 0x0, 0xca, 0xc7, 0xe6, 0x7a, 0xf9, 0x93, 0x48,
|
|
|
|
0x91, 0x37, 0x61, 0x43, 0x40, 0x14,
|
|
|
|
]
|
|
|
|
base: Curve25519Key = [
|
|
|
|
0xdb.byte, 0x5f, 0x32, 0xb7, 0xf8, 0x41, 0xe7, 0xa1, 0xa0, 0x9, 0x68, 0xef,
|
|
|
|
0xfd, 0xed, 0x12, 0x73, 0x5f, 0xc4, 0x7a, 0x3e, 0xb1, 0x3b, 0x57, 0x9a, 0xac,
|
|
|
|
0xad, 0xea, 0xe8, 0x9, 0x39, 0xa7, 0xdd,
|
|
|
|
]
|
|
|
|
public1Test: Curve25519Key = [
|
|
|
|
0x9.byte, 0xd, 0x85, 0xe5, 0x99, 0xea, 0x8e, 0x2b, 0xee, 0xb6, 0x13, 0x4, 0xd3,
|
|
|
|
0x7b, 0xe1, 0xe, 0xc5, 0xc9, 0x5, 0xf9, 0x92, 0x7d, 0x32, 0xf4, 0x2a, 0x9a, 0xa,
|
|
|
|
0xfb, 0x3e, 0xb, 0x40, 0x74,
|
|
|
|
]
|
2020-02-14 06:43:05 +00:00
|
|
|
|
2020-08-04 09:19:26 +00:00
|
|
|
Curve25519.mul(base, private1)
|
|
|
|
check base.toHex == public1Test.toHex
|
2020-02-14 06:43:05 +00:00
|
|
|
|
2020-02-14 11:09:14 +00:00
|
|
|
# RFC vectors
|
2024-06-11 15:18:06 +00:00
|
|
|
private1 = fromHex(
|
|
|
|
"a8abababababababababababababababababababababababababababababab6b"
|
|
|
|
).intoCurve25519Key
|
|
|
|
check private1.public().toHex ==
|
|
|
|
"E3712D851A0E5D79B831C5E34AB22B41A198171DE209B8B8FACA23A11C624859"
|
|
|
|
private1 = fromHex(
|
|
|
|
"c8cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd4d"
|
|
|
|
).intoCurve25519Key
|
|
|
|
check private1.public().toHex ==
|
|
|
|
"B5BEA823D9C9FF576091C54B7C596C0AE296884F0E150290E88455D7FBA6126F"
|
|
|
|
private1 = fromHex(
|
|
|
|
"77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c2a"
|
|
|
|
).intoCurve25519Key
|
2020-02-14 11:09:14 +00:00
|
|
|
var
|
2024-06-11 15:18:06 +00:00
|
|
|
private2 = fromHex(
|
|
|
|
"5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eb"
|
|
|
|
).intoCurve25519Key
|
2020-08-04 09:19:26 +00:00
|
|
|
p1Pub = private1.public()
|
|
|
|
p2Pub = private2.public()
|
2024-06-11 15:18:06 +00:00
|
|
|
check p1Pub.toHex ==
|
|
|
|
"8520F0098930A754748B7DDCB43EF75A0DBF3A0D26381AF4EBA4A98EAA9B4E6A"
|
|
|
|
check p2Pub.toHex ==
|
|
|
|
"DE9EDB7D7B7DC1B4D35B61C2ECE435373F8343C85B78674DADFC7E146F882B4F"
|
2020-05-06 16:31:47 +00:00
|
|
|
|
2020-02-14 11:09:14 +00:00
|
|
|
var
|
2020-08-04 09:19:26 +00:00
|
|
|
secret1 = p2Pub
|
|
|
|
secret2 = p1Pub
|
|
|
|
Curve25519.mul(secret1, private1)
|
|
|
|
Curve25519.mul(secret2, private2)
|
2020-02-14 11:09:14 +00:00
|
|
|
check secret1.toHex == secret2.toHex
|
2020-02-14 06:43:05 +00:00
|
|
|
|
Noise (#90)
* Start ChaCha20Poly1305 integration (BearSSL)
* Add Curve25519 (BearSSL) required operations for noise
* Fix curve mulgen iterate/derive
* Fix misleading header
* Add chachapoly proper test
* Curve25519 integration tests (failing, something is wrong)
* Add few converters, finish c25519 integration tests
* Remove implicit converters
* removed internal globals
* Start noise implementation
* Fix public() using proper bear mulgen
* Noise protocol WIP
* Noise progress
* Add a quick nim version of HKDF
* Converted hkdf to iterator, useful for noise
* Noise protocol implementation progress
* Noise progress
* XX handshake almost there
* noise progress
* Noise, testing handshake with test vectors
* Noise handshake progress, still wrong somewhere!
* Noise handshake success!
* Full verified noise XX handshake completed
* Fix and rewrite test to be similar to switch one
* Start with connection upgrade
* Switch chachapoly to CT implementations
* Improve HKDF implementation
* Use a type insted of tuple for HandshakeResult
* Remove unnecessary Let
* More cosmetic fixes
* Properly check randomBytes result
* Fix chachapoly signature
* Noise full circle (altho dispatcher is nil cursed)
* Allow nil aads in chachapoly routines
* Noise implementation up to running full test
* Use bearssl HKDF as well
* Directly use bearssl rng for curve25519 keys
* Add a (disabled/no CI) noise interop test server
* WIP on fixing interop issues
* More fixes in noise implementation for interop
* bump chronos requirement (nimble)
* Add a chachapoly test for very small size payloads
* Noise, more tracing
* Add 2 properly working noise tests
* Fix payload packing, following the spec properly (and not go version but
rather rust)
* Sanity, replace discard with asyncCheck
* Small fixes and optimization
* Use stew endian2 rather then system endian module
* Update nimble deps (chronos)
* Minor cosmetic/code sanity fixes
* Noise, handle Nonce max
* Noise tests, make sure to close secured conns
* More polish, improve code readability too
* More polish and testing again which test fails
* Further polishing
* Restore noise tests
* Remove useless Future[void]
* Remove useless CipherState initializer
* add a proper read wait future in second noise test
* Remove noise generic secure implementation for now
* Few fixes to run eth2 sim
* Add more debug info in noise traces
* Merge size + payload write in sendEncryptedMessage
* Revert secure interface, add outgoing property directly in newNoise
* remove sendEncrypted and receiveEncrypted
* Use openarray in chachapoly and curve25519 helpers
2020-03-17 12:30:01 +00:00
|
|
|
test "HKDF 1":
|
|
|
|
let
|
|
|
|
ikm = fromHex("0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b")
|
|
|
|
salt = fromHex("0x000102030405060708090a0b0c")
|
|
|
|
info = fromHex("0xf0f1f2f3f4f5f6f7f8f9")
|
2024-06-11 15:18:06 +00:00
|
|
|
truth =
|
|
|
|
"3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5b887185865"
|
|
|
|
var output: array[1, array[42, byte]]
|
Noise (#90)
* Start ChaCha20Poly1305 integration (BearSSL)
* Add Curve25519 (BearSSL) required operations for noise
* Fix curve mulgen iterate/derive
* Fix misleading header
* Add chachapoly proper test
* Curve25519 integration tests (failing, something is wrong)
* Add few converters, finish c25519 integration tests
* Remove implicit converters
* removed internal globals
* Start noise implementation
* Fix public() using proper bear mulgen
* Noise protocol WIP
* Noise progress
* Add a quick nim version of HKDF
* Converted hkdf to iterator, useful for noise
* Noise protocol implementation progress
* Noise progress
* XX handshake almost there
* noise progress
* Noise, testing handshake with test vectors
* Noise handshake progress, still wrong somewhere!
* Noise handshake success!
* Full verified noise XX handshake completed
* Fix and rewrite test to be similar to switch one
* Start with connection upgrade
* Switch chachapoly to CT implementations
* Improve HKDF implementation
* Use a type insted of tuple for HandshakeResult
* Remove unnecessary Let
* More cosmetic fixes
* Properly check randomBytes result
* Fix chachapoly signature
* Noise full circle (altho dispatcher is nil cursed)
* Allow nil aads in chachapoly routines
* Noise implementation up to running full test
* Use bearssl HKDF as well
* Directly use bearssl rng for curve25519 keys
* Add a (disabled/no CI) noise interop test server
* WIP on fixing interop issues
* More fixes in noise implementation for interop
* bump chronos requirement (nimble)
* Add a chachapoly test for very small size payloads
* Noise, more tracing
* Add 2 properly working noise tests
* Fix payload packing, following the spec properly (and not go version but
rather rust)
* Sanity, replace discard with asyncCheck
* Small fixes and optimization
* Use stew endian2 rather then system endian module
* Update nimble deps (chronos)
* Minor cosmetic/code sanity fixes
* Noise, handle Nonce max
* Noise tests, make sure to close secured conns
* More polish, improve code readability too
* More polish and testing again which test fails
* Further polishing
* Restore noise tests
* Remove useless Future[void]
* Remove useless CipherState initializer
* add a proper read wait future in second noise test
* Remove noise generic secure implementation for now
* Few fixes to run eth2 sim
* Add more debug info in noise traces
* Merge size + payload write in sendEncryptedMessage
* Revert secure interface, add outgoing property directly in newNoise
* remove sendEncrypted and receiveEncrypted
* Use openarray in chachapoly and curve25519 helpers
2020-03-17 12:30:01 +00:00
|
|
|
|
|
|
|
sha256.hkdf(salt, ikm, info, output)
|
|
|
|
check output[0].toHex(true) == truth
|
|
|
|
|
|
|
|
test "HKDF 2":
|
|
|
|
let
|
|
|
|
ikm = fromHex("0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b")
|
|
|
|
salt = fromHex("")
|
|
|
|
info = fromHex("")
|
2024-06-11 15:18:06 +00:00
|
|
|
truth =
|
|
|
|
"8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395faa4b61a96c8"
|
|
|
|
var output: array[1, array[42, byte]]
|
Noise (#90)
* Start ChaCha20Poly1305 integration (BearSSL)
* Add Curve25519 (BearSSL) required operations for noise
* Fix curve mulgen iterate/derive
* Fix misleading header
* Add chachapoly proper test
* Curve25519 integration tests (failing, something is wrong)
* Add few converters, finish c25519 integration tests
* Remove implicit converters
* removed internal globals
* Start noise implementation
* Fix public() using proper bear mulgen
* Noise protocol WIP
* Noise progress
* Add a quick nim version of HKDF
* Converted hkdf to iterator, useful for noise
* Noise protocol implementation progress
* Noise progress
* XX handshake almost there
* noise progress
* Noise, testing handshake with test vectors
* Noise handshake progress, still wrong somewhere!
* Noise handshake success!
* Full verified noise XX handshake completed
* Fix and rewrite test to be similar to switch one
* Start with connection upgrade
* Switch chachapoly to CT implementations
* Improve HKDF implementation
* Use a type insted of tuple for HandshakeResult
* Remove unnecessary Let
* More cosmetic fixes
* Properly check randomBytes result
* Fix chachapoly signature
* Noise full circle (altho dispatcher is nil cursed)
* Allow nil aads in chachapoly routines
* Noise implementation up to running full test
* Use bearssl HKDF as well
* Directly use bearssl rng for curve25519 keys
* Add a (disabled/no CI) noise interop test server
* WIP on fixing interop issues
* More fixes in noise implementation for interop
* bump chronos requirement (nimble)
* Add a chachapoly test for very small size payloads
* Noise, more tracing
* Add 2 properly working noise tests
* Fix payload packing, following the spec properly (and not go version but
rather rust)
* Sanity, replace discard with asyncCheck
* Small fixes and optimization
* Use stew endian2 rather then system endian module
* Update nimble deps (chronos)
* Minor cosmetic/code sanity fixes
* Noise, handle Nonce max
* Noise tests, make sure to close secured conns
* More polish, improve code readability too
* More polish and testing again which test fails
* Further polishing
* Restore noise tests
* Remove useless Future[void]
* Remove useless CipherState initializer
* add a proper read wait future in second noise test
* Remove noise generic secure implementation for now
* Few fixes to run eth2 sim
* Add more debug info in noise traces
* Merge size + payload write in sendEncryptedMessage
* Revert secure interface, add outgoing property directly in newNoise
* remove sendEncrypted and receiveEncrypted
* Use openarray in chachapoly and curve25519 helpers
2020-03-17 12:30:01 +00:00
|
|
|
|
|
|
|
sha256.hkdf(salt, ikm, info, output)
|
|
|
|
check output[0].toHex(true) == truth
|
2021-10-25 08:26:32 +00:00
|
|
|
|
|
|
|
test "shuffle":
|
|
|
|
var cards = ["Ace", "King", "Queen", "Jack", "Ten"]
|
2022-06-16 08:08:52 +00:00
|
|
|
var rng = (ref HmacDrbgContext)()
|
|
|
|
hmacDrbgInit(rng[], addr sha256Vtable, nil, 0)
|
2021-10-25 08:26:32 +00:00
|
|
|
rng.shuffle(cards)
|
|
|
|
check cards == ["King", "Ten", "Ace", "Queen", "Jack"]
|