2026-02-16 15:25:54 +00:00
|
|
|
package crypt
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"crypto/rand"
|
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func TestChaCha20_Good(t *testing.T) {
|
|
|
|
|
key := make([]byte, 32)
|
|
|
|
|
_, err := rand.Read(key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
plaintext := []byte("ChaCha20-Poly1305 test data")
|
|
|
|
|
|
|
|
|
|
encrypted, err := ChaCha20Encrypt(plaintext, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.NotEqual(t, plaintext, encrypted)
|
|
|
|
|
|
|
|
|
|
decrypted, err := ChaCha20Decrypt(encrypted, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.Equal(t, plaintext, decrypted)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestChaCha20_Bad(t *testing.T) {
|
|
|
|
|
key := make([]byte, 32)
|
|
|
|
|
wrongKey := make([]byte, 32)
|
|
|
|
|
_, _ = rand.Read(key)
|
|
|
|
|
_, _ = rand.Read(wrongKey)
|
|
|
|
|
|
|
|
|
|
plaintext := []byte("secret message")
|
|
|
|
|
|
|
|
|
|
encrypted, err := ChaCha20Encrypt(plaintext, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
_, err = ChaCha20Decrypt(encrypted, wrongKey)
|
|
|
|
|
assert.Error(t, err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestAESGCM_Good(t *testing.T) {
|
|
|
|
|
key := make([]byte, 32)
|
|
|
|
|
_, err := rand.Read(key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
plaintext := []byte("AES-256-GCM test data")
|
|
|
|
|
|
|
|
|
|
encrypted, err := AESGCMEncrypt(plaintext, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.NotEqual(t, plaintext, encrypted)
|
|
|
|
|
|
|
|
|
|
decrypted, err := AESGCMDecrypt(encrypted, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.Equal(t, plaintext, decrypted)
|
|
|
|
|
}
|
test(phase0): expand test coverage, security audit, and benchmarks
Add 29 new tests across auth/, crypt/, and trust/ packages:
- auth: concurrent sessions, token uniqueness, challenge expiry boundary,
empty password, long/unicode usernames, air-gapped round-trip, expired refresh
- crypt: wrong passphrase, empty/large plaintext, KDF determinism, HKDF info
separation, checksum edge cases
- trust: concurrent registry operations, tier validation, token expiry boundary,
empty ScopedRepos behaviour, unknown capabilities
Add benchmark suites:
- crypt: Argon2, ChaCha20, AES-GCM, HMAC (1KB/1MB payloads)
- trust: PolicyEvaluate (100 agents), RegistryGet, RegistryRegister
Security audit documented in FINDINGS.md:
- F1: LTHN hash used for password verification (medium)
- F2: PGP private keys not zeroed after use (low, upstream limitation)
- F3: Empty ScopedRepos bypasses repo scope check (medium)
- F4: go vet clean, no math/rand, no secrets in error messages
All tests pass with -race. go vet clean.
Co-Authored-By: Virgil <virgil@lethean.io>
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-20 01:14:41 +00:00
|
|
|
|
|
|
|
|
// --- Phase 0 Additions ---
|
|
|
|
|
|
|
|
|
|
// TestAESGCM_Bad_WrongKey verifies wrong key returns error, not corrupt data.
|
|
|
|
|
func TestAESGCM_Bad_WrongKey(t *testing.T) {
|
|
|
|
|
key := make([]byte, 32)
|
|
|
|
|
wrongKey := make([]byte, 32)
|
|
|
|
|
_, _ = rand.Read(key)
|
|
|
|
|
_, _ = rand.Read(wrongKey)
|
|
|
|
|
|
|
|
|
|
plaintext := []byte("secret data for AES")
|
|
|
|
|
encrypted, err := AESGCMEncrypt(plaintext, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
decrypted, err := AESGCMDecrypt(encrypted, wrongKey)
|
|
|
|
|
assert.Error(t, err, "wrong key must return error")
|
|
|
|
|
assert.Nil(t, decrypted, "wrong key must not return partial data")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// TestChaCha20EmptyPlaintext_Good verifies empty plaintext round-trip at low level.
|
|
|
|
|
func TestChaCha20EmptyPlaintext_Good(t *testing.T) {
|
|
|
|
|
key := make([]byte, 32)
|
|
|
|
|
_, err := rand.Read(key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
encrypted, err := ChaCha20Encrypt([]byte{}, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.NotEmpty(t, encrypted, "ciphertext should include nonce + auth tag")
|
|
|
|
|
|
|
|
|
|
decrypted, err := ChaCha20Decrypt(encrypted, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.Empty(t, decrypted)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// TestAESGCMEmptyPlaintext_Good verifies empty plaintext round-trip at low level.
|
|
|
|
|
func TestAESGCMEmptyPlaintext_Good(t *testing.T) {
|
|
|
|
|
key := make([]byte, 32)
|
|
|
|
|
_, err := rand.Read(key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
encrypted, err := AESGCMEncrypt([]byte{}, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.NotEmpty(t, encrypted)
|
|
|
|
|
|
|
|
|
|
decrypted, err := AESGCMDecrypt(encrypted, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.Empty(t, decrypted)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// TestChaCha20LargePayload_Good verifies 1MB encrypt/decrypt round-trip.
|
|
|
|
|
func TestChaCha20LargePayload_Good(t *testing.T) {
|
|
|
|
|
key := make([]byte, 32)
|
|
|
|
|
_, _ = rand.Read(key)
|
|
|
|
|
|
|
|
|
|
plaintext := make([]byte, 1024*1024) // 1MB
|
|
|
|
|
for i := range plaintext {
|
|
|
|
|
plaintext[i] = byte(i % 256)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
encrypted, err := ChaCha20Encrypt(plaintext, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
decrypted, err := ChaCha20Decrypt(encrypted, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.Equal(t, plaintext, decrypted)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// TestAESGCMLargePayload_Good verifies 1MB encrypt/decrypt round-trip.
|
|
|
|
|
func TestAESGCMLargePayload_Good(t *testing.T) {
|
|
|
|
|
key := make([]byte, 32)
|
|
|
|
|
_, _ = rand.Read(key)
|
|
|
|
|
|
|
|
|
|
plaintext := make([]byte, 1024*1024) // 1MB
|
|
|
|
|
for i := range plaintext {
|
|
|
|
|
plaintext[i] = byte(i % 256)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
encrypted, err := AESGCMEncrypt(plaintext, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
decrypted, err := AESGCMDecrypt(encrypted, key)
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
assert.Equal(t, plaintext, decrypted)
|
|
|
|
|
}
|