Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "crypto/curve25519.h" | |
| 6 | |
| 7 #include <string> | |
| 8 | |
| 9 #include "crypto/random.h" | |
| 10 #include "testing/gtest/include/gtest/gtest.h" | |
| 11 | |
| 12 using std::string; | |
|
wtc
2013/03/06 19:21:07
I would avoid this using statement. Is this file s
ramant (doing other things)
2013/03/06 20:03:12
Done.
| |
| 13 | |
| 14 namespace crypto { | |
| 15 | |
| 16 // SharedKey just tests that the basic key exchange identity holds: that both | |
| 17 // parties end up with the same key. | |
| 18 TEST(Curve25519, SharedKey) { | |
| 19 for (int i = 0; i < 5; i++) { | |
| 20 uint8 alice_secret[curve25519::kCryptoScalarMultCurve25519ScalarBytes]; | |
| 21 crypto::RandBytes(alice_secret, sizeof(alice_secret)); | |
| 22 EXPECT_TRUE(curve25519::ConvertToPrivateKey(alice_secret, | |
| 23 sizeof(alice_secret))); | |
| 24 string alice_key(reinterpret_cast<char*>(alice_secret), | |
| 25 sizeof(alice_secret)); | |
| 26 | |
| 27 uint8 alice_public_key[curve25519::kCryptoScalarMultCurve25519Bytes]; | |
| 28 uint8 alice_private_key[curve25519::kCryptoScalarMultCurve25519ScalarBytes]; | |
| 29 ASSERT_EQ(static_cast<size_t>( | |
| 30 curve25519::kCryptoScalarMultCurve25519ScalarBytes), alice_key.size()); | |
| 31 memcpy(alice_private_key, alice_key.data(), alice_key.size()); | |
| 32 curve25519::ScalarBaseMult(alice_private_key, alice_public_key); | |
| 33 | |
| 34 uint8 bob_secret[curve25519::kCryptoScalarMultCurve25519ScalarBytes]; | |
| 35 crypto::RandBytes(bob_secret, sizeof(bob_secret)); | |
| 36 EXPECT_TRUE(curve25519::ConvertToPrivateKey(bob_secret, | |
| 37 sizeof(bob_secret))); | |
| 38 string bob_key(reinterpret_cast<char*>(bob_secret), sizeof(bob_secret)); | |
| 39 | |
| 40 uint8 bob_public_key[curve25519::kCryptoScalarMultCurve25519Bytes]; | |
| 41 uint8 bob_private_key[curve25519::kCryptoScalarMultCurve25519ScalarBytes]; | |
| 42 ASSERT_EQ(static_cast<size_t>( | |
| 43 curve25519::kCryptoScalarMultCurve25519ScalarBytes), bob_key.size()); | |
| 44 memcpy(bob_private_key, bob_key.data(), bob_key.size()); | |
| 45 curve25519::ScalarBaseMult(bob_private_key, bob_public_key); | |
| 46 | |
| 47 uint8 alice_shared_key[curve25519::kCryptoScalarMultCurve25519Bytes]; | |
| 48 curve25519::ScalarMult(alice_private_key, bob_public_key, alice_shared_key); | |
| 49 string alice_shared; | |
| 50 alice_shared.assign(reinterpret_cast<char*>(alice_shared_key), | |
| 51 sizeof(alice_shared_key)); | |
| 52 | |
| 53 uint8 bob_shared_key[curve25519::kCryptoScalarMultCurve25519Bytes]; | |
| 54 curve25519::ScalarMult(bob_private_key, alice_public_key, bob_shared_key); | |
| 55 string bob_shared; | |
| 56 bob_shared.assign(reinterpret_cast<char*>(bob_shared_key), | |
| 57 sizeof(bob_shared_key)); | |
| 58 | |
| 59 ASSERT_EQ(alice_shared, bob_shared); | |
| 60 } | |
| 61 } | |
| 62 | |
| 63 } // namespace crypto | |
| OLD | NEW |