File: Spec.hs

package info (click to toggle)
haskell-cryptonite-conduit 0.2.2-8
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 100 kB
  • sloc: haskell: 252; makefile: 6
file content (63 lines) | stat: -rw-r--r-- 2,113 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
{-# Language OverloadedStrings #-}
import Conduit
import qualified Crypto.Cipher.ChaChaPoly1305.Conduit as ChaCha
import qualified Crypto.ECC as ECC
import Crypto.Hash
import Crypto.MAC.HMAC
import Crypto.MAC.HMAC.Conduit
import qualified Crypto.PubKey.ECIES.Conduit as PubKey
import Crypto.Random
import Data.ByteArray.Encoding
import Data.Proxy (Proxy (..))
import Data.Word (Word8)
import Test.Tasty
import Test.Tasty.HUnit
import Test.Tasty.QuickCheck
import qualified Data.ByteString as BS
import qualified Data.ByteString.Lazy as BL

main :: IO ()
main = defaultMain tests

tests :: TestTree
tests = testGroup "Cryptonite conduit tests"
    [ testGroup "HMAC"
        [ testCase "File HMAC is correct" testFileHMAC
        ]
    , testGroup "ChaChaPoly1305"
        [ testProperty "encrypt/decrypt works" (ioProperty . propChaChaPoly1305)
        ]
    , testGroup "publicECC"
        [ testProperty "encrypt/decrypt works" (ioProperty . propPublicECC)
        ]
    ]

testFileHMAC :: Assertion
testFileHMAC = do
    let source = BL.take (1024 * 1024 * 3 + 150) $ BL.iterate (+ 1) 0
    testhmac <- runConduit $ sourceLazy source $$ sinkHMAC ("foobar" :: BS.ByteString)
    let hexdump = convertToBase Base16 (testhmac :: HMAC SHA512t_256)
    assertEqual "HMAC mismatch" "ab78ef7a3a7b02b2ef50ee1a17e43ae0c134e0bece468b047780626264301831" (hexdump :: BS.ByteString)

propChaChaPoly1305 :: [[Word8]] -> IO Bool
propChaChaPoly1305 octets = do
    let chunksIn = map BS.pack octets
    nonce <- getRandomBytes 12
    key <- getRandomBytes 32
    chunksOut <- runConduit
       $ mapM_ yield chunksIn
      .| ChaCha.encrypt nonce key
      .| ChaCha.decrypt key
      .| sinkLazy
    return $ BL.fromChunks chunksIn == chunksOut

propPublicECC :: [[Word8]] -> IO Bool
propPublicECC octets = do
    let chunksIn = map BS.pack octets
    ECC.KeyPair point scalar <- ECC.curveGenerateKeyPair (Proxy :: Proxy ECC.Curve_P256R1)
    chunksOut <- runConduit
       $ mapM_ yield chunksIn
      .| PubKey.encrypt point
      .| PubKey.decrypt scalar
      .| sinkLazy
    return $ BL.fromChunks chunksIn == chunksOut