aboutsummaryrefslogtreecommitdiffstats
path: root/crypto.cpp
diff options
context:
space:
mode:
authorGav Wood <i@gavwood.com>2014-10-17 00:44:02 +0800
committerGav Wood <i@gavwood.com>2014-10-17 00:44:02 +0800
commit266bce33762b04942095c277232071ae7e6411b2 (patch)
treec7fa2d2d897718907853237da16a4cebbf0c5a21 /crypto.cpp
parent165e9780f7b79bdead6eb6af7f5a857398159eb2 (diff)
parent1e29956b5841d2343de2b7be8f301613c973b34d (diff)
downloaddexon-solidity-266bce33762b04942095c277232071ae7e6411b2.tar.gz
dexon-solidity-266bce33762b04942095c277232071ae7e6411b2.tar.zst
dexon-solidity-266bce33762b04942095c277232071ae7e6411b2.zip
Merge branch 'develop' of github.com:ethereum/cpp-ethereum into develop
Diffstat (limited to 'crypto.cpp')
-rw-r--r--crypto.cpp167
1 files changed, 163 insertions, 4 deletions
diff --git a/crypto.cpp b/crypto.cpp
index ebe3f81a..e71ee228 100644
--- a/crypto.cpp
+++ b/crypto.cpp
@@ -27,13 +27,170 @@
#include <libdevcore/Log.h>
#include <libethereum/Transaction.h>
#include <boost/test/unit_test.hpp>
+#include "TestHelperCrypto.h"
using namespace std;
using namespace dev;
-using namespace dev::eth;
+namespace dev
+{
+namespace crypto
+{
+
+inline CryptoPP::AutoSeededRandomPool& PRNG() {
+ static CryptoPP::AutoSeededRandomPool prng;
+ return prng;
+}
+
+}
+}
+
+using namespace CryptoPP;
+
+BOOST_AUTO_TEST_SUITE(crypto)
+
+BOOST_AUTO_TEST_CASE(cryptopp_ecies_message)
+{
+ cnote << "Testing cryptopp_ecies_message...";
+
+ string const message("Now is the time for all good men to come to the aide of humanity.");
+
+ AutoSeededRandomPool prng;
+
+ ECIES<ECP>::Decryptor localDecryptor(prng, ASN1::secp256r1());
+ SavePrivateKey(localDecryptor.GetPrivateKey());
+
+ ECIES<ECP>::Encryptor localEncryptor(localDecryptor);
+ SavePublicKey(localEncryptor.GetPublicKey());
-BOOST_AUTO_TEST_CASE(crypto_tests)
+ ECIES<ECP>::Decryptor futureDecryptor;
+ LoadPrivateKey(futureDecryptor.AccessPrivateKey());
+ futureDecryptor.GetPrivateKey().ThrowIfInvalid(prng, 3);
+
+ ECIES<ECP>::Encryptor futureEncryptor;
+ LoadPublicKey(futureEncryptor.AccessPublicKey());
+ futureEncryptor.GetPublicKey().ThrowIfInvalid(prng, 3);
+
+ // encrypt/decrypt with local
+ string cipherLocal;
+ StringSource ss1 (message, true, new PK_EncryptorFilter(prng, localEncryptor, new StringSink(cipherLocal) ) );
+ string plainLocal;
+ StringSource ss2 (cipherLocal, true, new PK_DecryptorFilter(prng, localDecryptor, new StringSink(plainLocal) ) );
+
+ // encrypt/decrypt with future
+ string cipherFuture;
+ StringSource ss3 (message, true, new PK_EncryptorFilter(prng, futureEncryptor, new StringSink(cipherFuture) ) );
+ string plainFuture;
+ StringSource ss4 (cipherFuture, true, new PK_DecryptorFilter(prng, futureDecryptor, new StringSink(plainFuture) ) );
+
+ // decrypt local w/future
+ string plainFutureFromLocal;
+ StringSource ss5 (cipherLocal, true, new PK_DecryptorFilter(prng, futureDecryptor, new StringSink(plainFutureFromLocal) ) );
+
+ // decrypt future w/local
+ string plainLocalFromFuture;
+ StringSource ss6 (cipherFuture, true, new PK_DecryptorFilter(prng, localDecryptor, new StringSink(plainLocalFromFuture) ) );
+
+
+ assert(plainLocal == message);
+ assert(plainFuture == plainLocal);
+ assert(plainFutureFromLocal == plainLocal);
+ assert(plainLocalFromFuture == plainLocal);
+}
+
+BOOST_AUTO_TEST_CASE(cryptopp_ecdh_prime)
+{
+ cnote << "Testing cryptopp_ecdh_prime...";
+
+ using namespace CryptoPP;
+ OID curve = ASN1::secp256r1();
+
+ ECDH<ECP>::Domain dhLocal(curve);
+ SecByteBlock privLocal(dhLocal.PrivateKeyLength());
+ SecByteBlock pubLocal(dhLocal.PublicKeyLength());
+ dhLocal.GenerateKeyPair(dev::crypto::PRNG(), privLocal, pubLocal);
+
+ ECDH<ECP>::Domain dhRemote(curve);
+ SecByteBlock privRemote(dhRemote.PrivateKeyLength());
+ SecByteBlock pubRemote(dhRemote.PublicKeyLength());
+ dhRemote.GenerateKeyPair(dev::crypto::PRNG(), privRemote, pubRemote);
+
+ assert(dhLocal.AgreedValueLength() == dhRemote.AgreedValueLength());
+
+ // local: send public to remote; remote: send public to local
+
+ // Local
+ SecByteBlock sharedLocal(dhLocal.AgreedValueLength());
+ assert(dhLocal.Agree(sharedLocal, privLocal, pubRemote));
+
+ // Remote
+ SecByteBlock sharedRemote(dhRemote.AgreedValueLength());
+ assert(dhRemote.Agree(sharedRemote, privRemote, pubLocal));
+
+ // Test
+ Integer ssLocal, ssRemote;
+ ssLocal.Decode(sharedLocal.BytePtr(), sharedLocal.SizeInBytes());
+ ssRemote.Decode(sharedRemote.BytePtr(), sharedRemote.SizeInBytes());
+
+ assert(ssLocal != 0);
+ assert(ssLocal == ssRemote);
+}
+
+BOOST_AUTO_TEST_CASE(cryptopp_ecdh_aes128_cbc_noauth)
+{
+ // ECDH gives 256-bit shared while aes uses 128-bits
+ // Use first 128-bits of shared secret as symmetric key
+ // IV is 0
+ // New connections require new ECDH keypairs
+
+
+}
+
+BOOST_AUTO_TEST_CASE(cryptopp_eth_fbba)
+{
+ // Initial Authentication:
+ //
+ // New/Known Peer:
+ // pubkeyL = knownR? ? myKnown : myECDH
+ // pubkeyR = knownR? ? theirKnown : theirECDH
+ //
+ // Initial message = hmac(k=sha3(shared-secret[128..255]), address(pubkeyL)) || ECIES encrypt(pubkeyR, pubkeyL)
+ //
+ // Key Exchange (this could occur after handshake messages):
+ // If peers do not know each other they will need to exchange public keys.
+ //
+ // Drop ECDH (this could occur after handshake messages):
+ // After authentication and/or key exchange, both sides generate shared key
+ // from their 'known' keys and use this to encrypt all future messages.
+ //
+ // v2: If one side doesn't trust the other then a single-use key maybe sent.
+ // This will need to be tracked for future connections; when non-trusting peer
+ // wants to trust the other, it can request that it's old, 'new', public key be
+ // accepted. And, if the peer *really* doesn't trust the other side, it can request
+ // that a new, 'new', public key be accepted.
+ //
+ // Handshake (all or nothing, padded):
+ // All Peers (except blacklisted):
+ //
+ //
+ // New Peer:
+ //
+ //
+ // Known Untrusted Peer:
+ //
+ //
+ // Known Trusted Peer:
+ //
+ //
+ // Blacklisted Peeer:
+ // Already dropped by now.
+ //
+ //
+ // MAC:
+ // ...
+}
+
+BOOST_AUTO_TEST_CASE(eth_keypairs)
{
cnote << "Testing Crypto...";
secp256k1_start();
@@ -42,7 +199,7 @@ BOOST_AUTO_TEST_CASE(crypto_tests)
BOOST_REQUIRE(p.pub() == Public(fromHex("97466f2b32bc3bb76d4741ae51cd1d8578b48d3f1e68da206d47321aec267ce78549b514e4453d74ef11b0cd5e4e4c364effddac8b51bcfc8de80682f952896f")));
BOOST_REQUIRE(p.address() == Address(fromHex("8a40bfaa73256b60764c1bf40675a99083efb075")));
{
- Transaction t;
+ eth::Transaction t;
t.nonce = 0;
t.receiveAddress = h160(fromHex("944400f4b88ac9589a0f17ed4671da26bddb668b"));
t.value = 1000;
@@ -70,7 +227,7 @@ int cryptoTest()
assert(p.pub() == Public(fromHex("97466f2b32bc3bb76d4741ae51cd1d8578b48d3f1e68da206d47321aec267ce78549b514e4453d74ef11b0cd5e4e4c364effddac8b51bcfc8de80682f952896f")));
assert(p.address() == Address(fromHex("8a40bfaa73256b60764c1bf40675a99083efb075")));
{
- Transaction t;
+ eth::Transaction t;
t.nonce = 0;
t.receiveAddress = h160(fromHex("944400f4b88ac9589a0f17ed4671da26bddb668b"));
t.value = 1000;
@@ -156,3 +313,5 @@ int cryptoTest()
return 0;
}
+BOOST_AUTO_TEST_SUITE_END()
+