/* vim: set expandtab ts=4 sw=4: */
/*
* You may redistribute this program and/or modify it under the terms of
* the GNU General Public License as published by the Free Software Foundation,
* either version 3 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see .
*/
#include "benc/List.h"
#include "benc/String.h"
#include "crypto/random/Random.h"
#include "crypto/random/test/DeterminentRandomSeed.h"
#include "io/FileWriter.h"
#include "memory/Allocator.h"
#include "util/events/EventBase.h"
#include "util/Assert.h"
#include "util/Bits.h"
#include "util/Hex.h"
#include "util/log/FileWriterLog.h"
#include "wire/Error.h"
#include "wire/Message.h"
#include "wire/CryptoHeader.h"
#include "crypto/test/TestCa.h"
#include
#define PRIVATEKEY "0123456789abcdefghijklmnopqrstuv"
#define HERPUBKEY "wxyzabcdefghijklmnopqrstuv987654"
#define HELLOWORLD "Hello World"
#define HELLOWORLDLOWER "hello world"
#define HELLOWORLDLEN 12
static struct Random* evilRandom(struct Allocator* alloc, struct Log* logger)
{
RandomSeed_t* evilSeed = DeterminentRandomSeed_new(alloc, NULL);
return Random_newWithSeed(alloc, logger, evilSeed, NULL);
}
struct Context
{
struct Allocator* alloc;
TestCa_t* ca;
TestCa_Session_t* sess;
struct Iface plaintext;
struct Iface ciphertext;
struct Log* log;
struct EventBase* base;
};
static Iface_DEFUN doNothingSuccessfully(struct Message* msg, struct Iface* iface)
{
return NULL;
}
static struct Context* setUp(uint8_t* myPrivateKey,
uint8_t* herPublicKey,
uint8_t* authPassword,
struct Allocator* alloc,
enum TestCa_Config cfg)
{
struct Context* ctx = Allocator_calloc(alloc, sizeof(struct Context), 1);
struct Log* log = ctx->log = FileWriterLog_new(stdout, alloc);
struct EventBase* base = ctx->base = EventBase_new(alloc);
ctx->ciphertext.send = doNothingSuccessfully;
ctx->plaintext.send = doNothingSuccessfully;
TestCa_t* ca = ctx->ca =
TestCa_new(alloc, myPrivateKey, base, log,
evilRandom(alloc, log), evilRandom(alloc, log), cfg);
TestCa_Session_t* sess = ctx->sess =
TestCa_newSession(ca, alloc, herPublicKey, false, Gcc_FILE, true);
Iface_plumb(&ctx->plaintext, &sess->plaintext);
Iface_plumb(&ctx->ciphertext, &sess->ciphertext);
if (authPassword) {
TestCa_setAuth(String_CONST(authPassword), NULL, sess);
}
return ctx;
}
static void testHello(uint8_t* password, uint8_t* expectedOutput, enum TestCa_Config cfg)
{
Assert_true(CString_strlen((char*)expectedOutput) == 264);
struct Allocator* alloc = Allocator_new(1<<20);
struct Context* ctx = setUp(NULL, HERPUBKEY, password, alloc, cfg);
struct Message* msg = Message_new(0, CryptoHeader_SIZE + 32, alloc);
Er_assert(Message_epush(msg, HELLOWORLD, HELLOWORLDLEN));
Iface_send(&ctx->plaintext, msg);
char* actual = Hex_print(msg->msgbytes, Message_getLength(msg), alloc);
if (CString_strcmp(actual, expectedOutput)) {
Assert_failure("Test failed.\n"
"Expected %s\n"
" Got %s\n", expectedOutput, actual);
}
Allocator_free(alloc);
}
static void helloNoAuth(enum TestCa_Config cfg)
{
testHello(NULL,
"00000000007691d3802a9d047c400000497a185dabda71739c1f35465fac3448"
"b92a0c36ebff1cf7050383c91e7d56ec2336c09739fa8e91d8dc5bec63e8fad0"
"74bee22a90642a6b4188f374afd90ccc97bb61873b5d8a3b4a6071b60b26a8c7"
"2d6484634df315c4d3ad63de42fe3e4ebfd83bcdab2e1f5f40dc5a08eda4e6c6"
"b7067d3b", cfg);
}
static void helloWithAuth(enum TestCa_Config cfg)
{
testHello("password",
"0000000001641c99f7719f5700000000497a185dabda71739c1f35465fac3448"
"b92a0c36ebff1cf7050383c91e7d56ec2336c09739fa8e91d8dc5bec63e8fad0"
"74bee22a90642a6b022e089e0550ca84b86884af6a0263fa5fff9ba07583aea4"
"acb000dbe4115623cf335c63981b9645b6c89fbdc3ad757744879751de0f215d"
"2479131d", cfg);
}
static void receiveHelloWithNoAuth(enum TestCa_Config cfg)
{
uint8_t herPublic[32];
Assert_true(Hex_decode(herPublic, 32,
"847c0d2c375234f365e660955187a3735a0f7613d1609d3a6a4d8c53aeaa5a22", 64) > 0);
struct Allocator* alloc = Allocator_new(1<<20);
struct Context* ctx = setUp(PRIVATEKEY, herPublic, NULL, alloc, cfg);
struct Message* msg = Message_new(132, 32, alloc);
Assert_true(Hex_decode(msg->msgbytes, Message_getLength(msg),
"0000000000ffffffffffffff7fffffffffffffffffffffffffffffffffffffff"
"ffffffffffffffff847c0d2c375234f365e660955187a3735a0f7613d1609d3a"
"6a4d8c53aeaa5a22ea9cf275eee0185edf7f211192f12e8e642a325ed76925fe"
"3c76d313b767a10aca584ca0b979dee990a737da7d68366fa3846d43d541de91"
"29ea3e12", 132*2) > 0);
Er_assert(Message_epush(msg, NULL, 16)); // peer ipv6
Iface_send(&ctx->ciphertext, msg);
uint32_t err = Er_assert(Message_epop32h(msg));
Assert_true(!err);
Assert_true(Message_getLength(msg) == HELLOWORLDLEN);
Assert_true(Bits_memcmp(HELLOWORLD, msg->msgbytes, HELLOWORLDLEN) == 0);
Allocator_free(alloc);
//printf("bytes=%s length=%u\n", finalOut->bytes, finalOut->length);
}
static void repeatHello(enum TestCa_Config cfg)
{
uint8_t* expectedOutput =
"0000000101641c99f7719f5700000000a693a9fd3f0e27e81ab1100b57b37259"
"4c2adca8671f1fdd050383c91e7d56ec2336c09739fa8e91d8dc5bec63e8fad0"
"74bee22a90642a6ba8555be84c5e35970c5270e8f31f2a5978e0fbdee4542882"
"97568f25a3fc2801aa707d954c78eccb970bcc8cb26867e9dbf0c9d6ef1b3f27"
"24e7e550";
struct Allocator* alloc = Allocator_new(1<<20);
struct Context* ctx = setUp(NULL, HERPUBKEY, "password", alloc, cfg);
struct Message* msg = Message_new(0, CryptoHeader_SIZE + HELLOWORLDLEN + 32, alloc);
Er_assert(Message_epush(msg, HELLOWORLD, HELLOWORLDLEN));
Iface_send(&ctx->plaintext, msg);
Message_reset(msg);
Er_assert(Message_epush(msg, HELLOWORLD, HELLOWORLDLEN));
Iface_send(&ctx->plaintext, msg);
char* actual = Hex_print(msg->msgbytes, Message_getLength(msg), alloc);
if (CString_strcmp(actual, expectedOutput)) {
Assert_failure("Test failed.\n"
"Expected %s\n"
" Got %s\n", expectedOutput, actual);
}
Allocator_free(alloc);
}
static void testGetUsers(enum TestCa_Config cfg)
{
struct Allocator* allocator = Allocator_new(1<<20);
struct EventBase* base = EventBase_new(allocator);
TestCa_t* ca = TestCa_new(allocator, NULL, base, NULL,
evilRandom(allocator, NULL), evilRandom(allocator, NULL), cfg);
RTypes_StrList_t* users = NULL;
users = TestCa_getUsers(ca, allocator);
Assert_true(users->len == 0);
TestCa_addUser_ipv6(String_CONST("pass1"), String_CONST("user1"), NULL, ca);
users = TestCa_getUsers(ca, allocator);
Assert_true(users->len == 1);
Assert_true(String_equals(String_CONST("user1"), users->items[0]));
TestCa_addUser_ipv6(String_CONST("pass2"), String_CONST("user2"), NULL, ca);
users = TestCa_getUsers(ca, allocator);
Assert_true(users->len == 2);
Assert_true(String_equals(String_CONST("user2"), users->items[1]));
Assert_true(String_equals(String_CONST("user1"), users->items[0]));
Allocator_free(allocator);
}
static void iteration(enum TestCa_Config cfg)
{
testGetUsers(cfg);
helloNoAuth(cfg);
helloWithAuth(cfg);
receiveHelloWithNoAuth(cfg);
repeatHello(cfg);
}
int main()
{
iteration(TestCa_Config_OLD);
iteration(TestCa_Config_OLD_NEW);
// This will always fail because we are expecting particular results
// which are specific to the old CryptoAuth
// iteration(TestCa_Config_NOISE);
return 0;
}