5
5
"io"
6
6
"math/big"
7
7
"testing"
8
-
9
- "github.com/coyim/gotrax"
10
8
)
11
9
12
10
var (
@@ -26,8 +24,8 @@ func Test_dhCommitMessage(t *testing.T) {
26
24
c .ourCurrentKey = bobPrivateKey
27
25
28
26
var out []byte
29
- out = gotrax . AppendData (out , encryptedFixedGX ())
30
- out = gotrax . AppendData (out , hashedFixedGX ())
27
+ out = AppendData (out , encryptedFixedGX ())
28
+ out = AppendData (out , hashedFixedGX ())
31
29
32
30
result , err := c .dhCommitMessage ()
33
31
assertEquals (t , err , nil )
@@ -42,7 +40,7 @@ func Test_dhKeyMessage(t *testing.T) {
42
40
expectedGyValue := bnFromHex ("075dfab5a1eab059052d0ad881c4938d52669630d61833a367155d67d03a457f619683d0fa829781e974fd24f6865e8128a9312a167b77326a87dea032fc31784d05b18b9cbafebe162ae9b5369f8b0c5911cf1be757f45f2a674be5126a714a6366c28086b3c7088911dcc4e5fb1481ad70a5237b8e4a6aff4954c2ca6df338b9f08691e4c0defe12689b37d4df30ddef2687f789fcf623c5d0cf6f09b7e5e69f481d5fd1b24a77636fb676e6d733d129eb93e81189340233044766a36eb07d" )
43
41
44
42
var out []byte
45
- out = gotrax . AppendMPI (out , expectedGyValue )
43
+ out = AppendMPI (out , expectedGyValue )
46
44
47
45
result , err := c .dhKeyMessage ()
48
46
assertEquals (t , err , nil )
@@ -72,7 +70,7 @@ func Test_revealSigMessage(t *testing.T) {
72
70
expedctedMACSignature := bytesFromHex ("8e6e5ef63a4e8d6aa2cfb1c5fe1831498862f69d7de32af4f9895180e4b494e6" )
73
71
74
72
var out []byte
75
- out = gotrax . AppendData (out , c .ake .r [:])
73
+ out = AppendData (out , c .ake .r [:])
76
74
out = append (out , expectedEncryptedSignature ... )
77
75
out = append (out , expedctedMACSignature [:20 ]... )
78
76
@@ -100,7 +98,7 @@ func Test_processDHKey(t *testing.T) {
100
98
c .initAKE ()
101
99
c .ake .theirPublicValue = fixedGY ()
102
100
103
- msg := gotrax . AppendMPI (nil , c .ake .theirPublicValue )
101
+ msg := AppendMPI (nil , c .ake .theirPublicValue )
104
102
105
103
isSame , err := c .processDHKey (msg )
106
104
assertEquals (t , err , nil )
@@ -112,7 +110,7 @@ func Test_processDHKeyNotSame(t *testing.T) {
112
110
c .initAKE ()
113
111
c .ake .theirPublicValue = fixedGY ()
114
112
115
- msg := gotrax . AppendMPI (nil , fixedGX ())
113
+ msg := AppendMPI (nil , fixedGX ())
116
114
117
115
isSame , err := c .processDHKey (msg )
118
116
assertEquals (t , err , nil )
@@ -126,7 +124,7 @@ func Test_processDHKeyHavingError(t *testing.T) {
126
124
c .initAKE ()
127
125
c .ake .theirPublicValue = fixedGY ()
128
126
129
- msg := gotrax . AppendMPI (nil , invalidGy )
127
+ msg := AppendMPI (nil , invalidGy )
130
128
131
129
isSame , err := c .processDHKey (msg )
132
130
assertEquals (t , err .Error (), "otr: DH value out of range" )
@@ -142,7 +140,7 @@ func Test_processEncryptedSig(t *testing.T) {
142
140
c .ake .keys .ourKeyID = 1
143
141
c .calcAKEKeys (c .calcDHSharedSecret ())
144
142
145
- _ , encryptedSig , _ := gotrax . ExtractData (bytesFromHex ("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" ))
143
+ _ , encryptedSig , _ := ExtractData (bytesFromHex ("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" ))
146
144
macSignature := bytesFromHex ("8e6e5ef63a4e8d6aa2cfb1c5fe1831498862f69d7de32af4f9895180e4b494e6" )
147
145
err := c .processEncryptedSig (encryptedSig , macSignature [:20 ], & c .ake .revealKey )
148
146
assertEquals (t , err , nil )
@@ -153,7 +151,7 @@ func Test_processEncryptedSigWithBadSignatureMACError(t *testing.T) {
153
151
c := Conversation {version : otrV3 {}}
154
152
c .initAKE ()
155
153
156
- _ , encryptedSig , _ := gotrax . ExtractData (bytesFromHex ("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" ))
154
+ _ , encryptedSig , _ := ExtractData (bytesFromHex ("000001b2dda2d4ef365711c172dad92804b201fcd2fdd6444568ebf0844019fb65ca4f5f57031936f9a339e08bfd4410905ab86c5d6f73e6c94de6a207f373beff3f7676faee7b1d3be21e630fe42e95db9d4ac559252bff530481301b590e2163b99bde8aa1b07448bf7252588e317b0ba2fc52f85a72a921ba757785b949e5e682341d98800aa180aa0bd01f51180d48260e4358ffae72a97f652f02eb6ae3bc6a25a317d0ca5ed0164a992240baac8e043f848332d22c10a46d12c745dc7b1b0ee37fd14614d4b69d500b8ce562040e3a4bfdd1074e2312d3e3e4c68bd15d70166855d8141f695b21c98c6055a5edb9a233925cf492218342450b806e58b3a821e5d1d2b9c6b9cbcba263908d7190a3428ace92572c064a328f86fa5b8ad2a9c76d5b9dcaeae5327f545b973795f7c655248141c2f82db0a2045e95c1936b726d6474f50283289e92ab5c7297081a54b9e70fce87603506dedd6734bab3c1567ee483cd4bcb0e669d9d97866ca274f178841dafc2acfdcd10cb0e2d07db244ff4b1d23afe253831f142083d912a7164a3425f82c95675298cf3c5eb3e096bbc95e44ecffafbb585738723c0adbe11f16c311a6cddde630b9c304717ce5b09247d482f32709ea71ced16ba930a554f9949c1acbecf" ))
157
155
macSignature := bytesFromHex ("8e6e5ef63a4e8d6aa2cfb1c5fe1831498862f69d7de32af4f9895180e4b494e6" )
158
156
err := c .processEncryptedSig (encryptedSig , macSignature [:20 ], & c .ake .revealKey )
159
157
assertEquals (t , err .Error (), "otr: bad signature MAC in encrypted signature" )
@@ -172,7 +170,7 @@ func Test_processEncryptedSigWithBadSignatureError(t *testing.T) {
172
170
s := c .calcDHSharedSecret ()
173
171
c .calcAKEKeys (s )
174
172
175
- _ , encryptedSig , _ := gotrax . ExtractData (bytesFromHex ("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" ))
173
+ _ , encryptedSig , _ := ExtractData (bytesFromHex ("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" ))
176
174
macSignature := bytesFromHex ("741f14776485e6c593928fd859afe1ab4896f1e6" )
177
175
err := c .processEncryptedSig (encryptedSig , macSignature [:20 ], & c .ake .revealKey )
178
176
assertEquals (t , err .Error (), "otr: bad signature in encrypted signature" )
@@ -297,9 +295,9 @@ func Test_encrypt(t *testing.T) {
297
295
assertEquals (t , b , 16 )
298
296
assertEquals (t , err , nil )
299
297
300
- encryptedGx , err := encrypt (c .ake .r [:], gotrax . AppendMPI (nil , c .ake .theirPublicValue ))
298
+ encryptedGx , err := encrypt (c .ake .r [:], AppendMPI (nil , c .ake .theirPublicValue ))
301
299
assertEquals (t , err , nil )
302
- assertDeepEquals (t , len (encryptedGx ), len (gotrax . AppendMPI ([]byte {}, c .ake .theirPublicValue )))
300
+ assertDeepEquals (t , len (encryptedGx ), len (AppendMPI ([]byte {}, c .ake .theirPublicValue )))
303
301
}
304
302
305
303
func Test_decrypt (t * testing.T ) {
@@ -312,34 +310,34 @@ func Test_decrypt(t *testing.T) {
312
310
assertEquals (t , b , 16 )
313
311
assertEquals (t , err , nil )
314
312
315
- encryptedGx , _ := encrypt (c .ake .r [:], gotrax . AppendMPI (nil , c .ake .theirPublicValue ))
313
+ encryptedGx , _ := encrypt (c .ake .r [:], AppendMPI (nil , c .ake .theirPublicValue ))
316
314
decryptedGx := encryptedGx
317
315
err = decrypt (c .ake .r [:], decryptedGx , encryptedGx )
318
316
319
317
assertEquals (t , err , nil )
320
- assertDeepEquals (t , decryptedGx , gotrax . AppendMPI ([]byte {}, c .ake .theirPublicValue ))
318
+ assertDeepEquals (t , decryptedGx , AppendMPI ([]byte {}, c .ake .theirPublicValue ))
321
319
}
322
320
323
321
func Test_checkDecryptedGxWithoutError (t * testing.T ) {
324
- hashedGx := otrV3 {}.hash2 (gotrax . AppendMPI ([]byte {}, fixedGX ()))
325
- err := checkDecryptedGx (gotrax . AppendMPI ([]byte {}, fixedGX ()), hashedGx [:], otrV3 {})
322
+ hashedGx := otrV3 {}.hash2 (AppendMPI ([]byte {}, fixedGX ()))
323
+ err := checkDecryptedGx (AppendMPI ([]byte {}, fixedGX ()), hashedGx [:], otrV3 {})
326
324
assertDeepEquals (t , err , nil )
327
325
}
328
326
329
327
func Test_checkDecryptedGxWithError (t * testing.T ) {
330
- hashedGx := otrV3 {}.hash2 (gotrax . AppendMPI ([]byte {}, fixedGY ()))
331
- err := checkDecryptedGx (gotrax . AppendMPI ([]byte {}, fixedGX ()), hashedGx [:], otrV3 {})
328
+ hashedGx := otrV3 {}.hash2 (AppendMPI ([]byte {}, fixedGY ()))
329
+ err := checkDecryptedGx (AppendMPI ([]byte {}, fixedGX ()), hashedGx [:], otrV3 {})
332
330
assertDeepEquals (t , err .Error (), "otr: bad commit MAC in reveal signature message" )
333
331
}
334
332
335
333
func Test_extractGxWithoutError (t * testing.T ) {
336
- gx , err := extractGx (gotrax . AppendMPI ([]byte {}, fixedGX ()))
334
+ gx , err := extractGx (AppendMPI ([]byte {}, fixedGX ()))
337
335
assertDeepEquals (t , err , nil )
338
336
assertDeepEquals (t , gx , fixedGX ())
339
337
}
340
338
341
339
func Test_extractGxWithCorruptError (t * testing.T ) {
342
- gx , err := extractGx (gotrax . AppendMPI (gotrax . AppendMPI ([]byte {}, fixedGX ()), fixedY ()))
340
+ gx , err := extractGx (AppendMPI (AppendMPI ([]byte {}, fixedGX ()), fixedY ()))
343
341
assertDeepEquals (t , err .Error (), "otr: gx corrupt after decryption" )
344
342
assertDeepEquals (t , gx , fixedGX ())
345
343
}
@@ -350,7 +348,7 @@ func Test_extractGx_returnsErrorWhenThereIsNotEnoughLengthForTheMPI(t *testing.T
350
348
}
351
349
352
350
func Test_extractGxWithRangeError (t * testing.T ) {
353
- gx , err := extractGx (gotrax . AppendMPI ([]byte {}, big .NewInt (1 )))
351
+ gx , err := extractGx (AppendMPI ([]byte {}, big .NewInt (1 )))
354
352
assertDeepEquals (t , gx , big .NewInt (1 ))
355
353
assertDeepEquals (t , err .Error (), "otr: DH value out of range" )
356
354
}
0 commit comments