Add 29 new tests across auth/, crypt/, and trust/ packages: - auth: concurrent sessions, token uniqueness, challenge expiry boundary, empty password, long/unicode usernames, air-gapped round-trip, expired refresh - crypt: wrong passphrase, empty/large plaintext, KDF determinism, HKDF info separation, checksum edge cases - trust: concurrent registry operations, tier validation, token expiry boundary, empty ScopedRepos behaviour, unknown capabilities Add benchmark suites: - crypt: Argon2, ChaCha20, AES-GCM, HMAC (1KB/1MB payloads) - trust: PolicyEvaluate (100 agents), RegistryGet, RegistryRegister Security audit documented in FINDINGS.md: - F1: LTHN hash used for password verification (medium) - F2: PGP private keys not zeroed after use (low, upstream limitation) - F3: Empty ScopedRepos bypasses repo scope check (medium) - F4: go vet clean, no math/rand, no secrets in error messages All tests pass with -race. go vet clean. Co-Authored-By: Virgil <virgil@lethean.io> Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
139 lines
3.5 KiB
Go
139 lines
3.5 KiB
Go
package crypt
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestChaCha20_Good(t *testing.T) {
|
|
key := make([]byte, 32)
|
|
_, err := rand.Read(key)
|
|
assert.NoError(t, err)
|
|
|
|
plaintext := []byte("ChaCha20-Poly1305 test data")
|
|
|
|
encrypted, err := ChaCha20Encrypt(plaintext, key)
|
|
assert.NoError(t, err)
|
|
assert.NotEqual(t, plaintext, encrypted)
|
|
|
|
decrypted, err := ChaCha20Decrypt(encrypted, key)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
}
|
|
|
|
func TestChaCha20_Bad(t *testing.T) {
|
|
key := make([]byte, 32)
|
|
wrongKey := make([]byte, 32)
|
|
_, _ = rand.Read(key)
|
|
_, _ = rand.Read(wrongKey)
|
|
|
|
plaintext := []byte("secret message")
|
|
|
|
encrypted, err := ChaCha20Encrypt(plaintext, key)
|
|
assert.NoError(t, err)
|
|
|
|
_, err = ChaCha20Decrypt(encrypted, wrongKey)
|
|
assert.Error(t, err)
|
|
}
|
|
|
|
func TestAESGCM_Good(t *testing.T) {
|
|
key := make([]byte, 32)
|
|
_, err := rand.Read(key)
|
|
assert.NoError(t, err)
|
|
|
|
plaintext := []byte("AES-256-GCM test data")
|
|
|
|
encrypted, err := AESGCMEncrypt(plaintext, key)
|
|
assert.NoError(t, err)
|
|
assert.NotEqual(t, plaintext, encrypted)
|
|
|
|
decrypted, err := AESGCMDecrypt(encrypted, key)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
}
|
|
|
|
// --- Phase 0 Additions ---
|
|
|
|
// TestAESGCM_Bad_WrongKey verifies wrong key returns error, not corrupt data.
|
|
func TestAESGCM_Bad_WrongKey(t *testing.T) {
|
|
key := make([]byte, 32)
|
|
wrongKey := make([]byte, 32)
|
|
_, _ = rand.Read(key)
|
|
_, _ = rand.Read(wrongKey)
|
|
|
|
plaintext := []byte("secret data for AES")
|
|
encrypted, err := AESGCMEncrypt(plaintext, key)
|
|
assert.NoError(t, err)
|
|
|
|
decrypted, err := AESGCMDecrypt(encrypted, wrongKey)
|
|
assert.Error(t, err, "wrong key must return error")
|
|
assert.Nil(t, decrypted, "wrong key must not return partial data")
|
|
}
|
|
|
|
// TestChaCha20EmptyPlaintext_Good verifies empty plaintext round-trip at low level.
|
|
func TestChaCha20EmptyPlaintext_Good(t *testing.T) {
|
|
key := make([]byte, 32)
|
|
_, err := rand.Read(key)
|
|
assert.NoError(t, err)
|
|
|
|
encrypted, err := ChaCha20Encrypt([]byte{}, key)
|
|
assert.NoError(t, err)
|
|
assert.NotEmpty(t, encrypted, "ciphertext should include nonce + auth tag")
|
|
|
|
decrypted, err := ChaCha20Decrypt(encrypted, key)
|
|
assert.NoError(t, err)
|
|
assert.Empty(t, decrypted)
|
|
}
|
|
|
|
// TestAESGCMEmptyPlaintext_Good verifies empty plaintext round-trip at low level.
|
|
func TestAESGCMEmptyPlaintext_Good(t *testing.T) {
|
|
key := make([]byte, 32)
|
|
_, err := rand.Read(key)
|
|
assert.NoError(t, err)
|
|
|
|
encrypted, err := AESGCMEncrypt([]byte{}, key)
|
|
assert.NoError(t, err)
|
|
assert.NotEmpty(t, encrypted)
|
|
|
|
decrypted, err := AESGCMDecrypt(encrypted, key)
|
|
assert.NoError(t, err)
|
|
assert.Empty(t, decrypted)
|
|
}
|
|
|
|
// TestChaCha20LargePayload_Good verifies 1MB encrypt/decrypt round-trip.
|
|
func TestChaCha20LargePayload_Good(t *testing.T) {
|
|
key := make([]byte, 32)
|
|
_, _ = rand.Read(key)
|
|
|
|
plaintext := make([]byte, 1024*1024) // 1MB
|
|
for i := range plaintext {
|
|
plaintext[i] = byte(i % 256)
|
|
}
|
|
|
|
encrypted, err := ChaCha20Encrypt(plaintext, key)
|
|
assert.NoError(t, err)
|
|
|
|
decrypted, err := ChaCha20Decrypt(encrypted, key)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
}
|
|
|
|
// TestAESGCMLargePayload_Good verifies 1MB encrypt/decrypt round-trip.
|
|
func TestAESGCMLargePayload_Good(t *testing.T) {
|
|
key := make([]byte, 32)
|
|
_, _ = rand.Read(key)
|
|
|
|
plaintext := make([]byte, 1024*1024) // 1MB
|
|
for i := range plaintext {
|
|
plaintext[i] = byte(i % 256)
|
|
}
|
|
|
|
encrypted, err := AESGCMEncrypt(plaintext, key)
|
|
assert.NoError(t, err)
|
|
|
|
decrypted, err := AESGCMDecrypt(encrypted, key)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
}
|