2024-12-12 16:04:31 +01:00
|
|
|
package secretbox
|
2024-10-31 18:24:54 +01:00
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"bytes"
|
|
|
|
|
"crypto/rand"
|
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
)
|
|
|
|
|
|
2024-11-28 16:16:04 +01:00
|
|
|
func TestSecretBoxEncryption(t *testing.T) {
|
2024-10-31 18:24:54 +01:00
|
|
|
t.Parallel()
|
|
|
|
|
|
2024-11-28 16:16:04 +01:00
|
|
|
key := make([]byte, keySize) // generate random 32-byte key
|
2024-11-12 16:04:33 +01:00
|
|
|
_, errKey := rand.Read(key)
|
|
|
|
|
require.NoError(t, errKey)
|
2024-10-31 18:24:54 +01:00
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
data []byte
|
|
|
|
|
key []byte
|
2024-11-12 16:04:33 +01:00
|
|
|
wantErr error
|
2024-10-31 18:24:54 +01:00
|
|
|
}{
|
|
|
|
|
{
|
2024-11-12 16:04:33 +01:00
|
|
|
name: "valid encryption/decryption",
|
|
|
|
|
data: []byte("hello world"),
|
|
|
|
|
key: key,
|
2024-10-31 18:24:54 +01:00
|
|
|
},
|
|
|
|
|
{
|
2024-11-04 19:11:25 +01:00
|
|
|
name: "nil key returns error",
|
2024-10-31 18:24:54 +01:00
|
|
|
data: []byte("hello world"),
|
|
|
|
|
key: nil,
|
2024-11-12 16:04:33 +01:00
|
|
|
wantErr: ErrNoEncryptionKey,
|
2024-10-31 18:24:54 +01:00
|
|
|
},
|
|
|
|
|
{
|
2024-11-12 16:04:33 +01:00
|
|
|
name: "empty data",
|
|
|
|
|
data: []byte{},
|
|
|
|
|
key: key,
|
2024-10-31 18:24:54 +01:00
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "invalid key size",
|
|
|
|
|
data: []byte("hello world"),
|
2024-11-28 16:16:04 +01:00
|
|
|
key: make([]byte, 16), // Only 32 bytes allowed now
|
2024-11-12 16:04:33 +01:00
|
|
|
wantErr: ErrInvalidKeySize,
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "zero key returns error",
|
|
|
|
|
data: []byte("hello world"),
|
2024-11-28 16:16:04 +01:00
|
|
|
key: make([]byte, keySize),
|
2024-11-12 16:04:33 +01:00
|
|
|
wantErr: ErrZeroKey,
|
2024-10-31 18:24:54 +01:00
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
tt := tt
|
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
|
|
|
|
|
2024-11-28 16:16:04 +01:00
|
|
|
encrypted, err := EncryptWithKey(tt.data, tt.key)
|
2024-11-12 16:04:33 +01:00
|
|
|
if tt.wantErr != nil {
|
|
|
|
|
require.ErrorIs(t, err, tt.wantErr)
|
2024-10-31 18:24:54 +01:00
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
2024-11-28 16:16:04 +01:00
|
|
|
// Verify encrypted data is different and includes nonce
|
|
|
|
|
require.Greater(t, len(encrypted), 24) // At least nonce size
|
|
|
|
|
if len(tt.data) > 0 {
|
|
|
|
|
require.NotEqual(t, tt.data, encrypted[24:]) // Ignore nonce prefix
|
2024-10-31 18:24:54 +01:00
|
|
|
}
|
2024-11-28 16:16:04 +01:00
|
|
|
|
|
|
|
|
decrypted, err := DecryptStringWithKey(encrypted, tt.key)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
require.True(t, bytes.Equal(tt.data, decrypted))
|
2024-10-31 18:24:54 +01:00
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestDecryptionErrors(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
|
|
|
|
|
2024-11-28 16:16:04 +01:00
|
|
|
key := make([]byte, keySize)
|
2024-10-31 18:24:54 +01:00
|
|
|
_, err := rand.Read(key)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
2024-11-28 16:16:04 +01:00
|
|
|
// Create valid encrypted data for tampering tests
|
|
|
|
|
validData := []byte("test message")
|
|
|
|
|
encrypted, err := EncryptWithKey(validData, key)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
2024-10-31 18:24:54 +01:00
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
data []byte
|
|
|
|
|
key []byte
|
|
|
|
|
errMsg string
|
|
|
|
|
}{
|
|
|
|
|
{
|
|
|
|
|
name: "short ciphertext",
|
2024-11-28 16:16:04 +01:00
|
|
|
data: make([]byte, 23), // Less than nonce size
|
2024-10-31 18:24:54 +01:00
|
|
|
key: key,
|
|
|
|
|
errMsg: "ciphertext too short",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "invalid ciphertext",
|
2024-11-28 16:16:04 +01:00
|
|
|
data: make([]byte, 24), // Just nonce size
|
2024-10-31 18:24:54 +01:00
|
|
|
key: key,
|
2024-11-28 16:16:04 +01:00
|
|
|
errMsg: "decryption failed",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "tampered ciphertext",
|
|
|
|
|
data: tamperWithBytes(encrypted),
|
|
|
|
|
key: key,
|
|
|
|
|
errMsg: "decryption failed",
|
2024-10-31 18:24:54 +01:00
|
|
|
},
|
2024-11-04 19:11:25 +01:00
|
|
|
{
|
|
|
|
|
name: "missing key",
|
2024-11-28 16:16:04 +01:00
|
|
|
data: encrypted,
|
2024-11-04 19:11:25 +01:00
|
|
|
key: nil,
|
|
|
|
|
errMsg: "encryption key is required",
|
|
|
|
|
},
|
2024-10-31 18:24:54 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
tt := tt
|
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
|
|
|
|
|
2024-11-28 16:16:04 +01:00
|
|
|
_, err := DecryptStringWithKey(tt.data, tt.key)
|
2024-10-31 18:24:54 +01:00
|
|
|
require.Error(t, err)
|
|
|
|
|
require.Contains(t, err.Error(), tt.errMsg)
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
2024-11-28 16:16:04 +01:00
|
|
|
|
|
|
|
|
// tamperWithBytes modifies a byte in the encrypted data to simulate tampering
|
|
|
|
|
func tamperWithBytes(data []byte) []byte {
|
|
|
|
|
if len(data) < 25 { // Need at least nonce + 1 byte
|
|
|
|
|
return data
|
|
|
|
|
}
|
|
|
|
|
tampered := make([]byte, len(data))
|
|
|
|
|
copy(tampered, data)
|
|
|
|
|
tampered[24] ^= 0x01 // Modify first byte after nonce
|
|
|
|
|
return tampered
|
|
|
|
|
}
|