// This file Copyright (C) 2013-2022 Mnemosyne LLC. // It may be used under GPLv2 (SPDX: GPL-2.0-only), GPLv3 (SPDX: GPL-3.0-only), // or any future license endorsed by Mnemosyne LLC. // License text can be found in the licenses/ folder. #include #include #include #include #include #include #include #include #include #include "transmission.h" #include "peer-mse.h" #include "crypto-utils.h" #include "utils.h" #include "crypto-test-ref.h" #include "gtest/gtest.h" using namespace std::literals; namespace { auto constexpr SomeHash = tr_sha1_digest_t{ std::byte{ 0 }, std::byte{ 1 }, std::byte{ 2 }, std::byte{ 3 }, std::byte{ 4 }, std::byte{ 5 }, std::byte{ 6 }, std::byte{ 7 }, std::byte{ 8 }, std::byte{ 9 }, std::byte{ 10 }, std::byte{ 11 }, std::byte{ 12 }, std::byte{ 13 }, std::byte{ 14 }, std::byte{ 15 }, std::byte{ 16 }, std::byte{ 17 }, std::byte{ 18 }, std::byte{ 19 }, }; template std::string toString(std::array const& array) { auto ostr = std::ostringstream{}; ostr << '['; for (auto const b : array) { ostr << static_cast(b) << ' '; } ostr << ']'; return ostr.str(); } } // namespace TEST(Crypto, DH) { auto a = tr_message_stream_encryption::DH{}; auto b = tr_message_stream_encryption::DH{}; a.setPeerPublicKey(b.publicKey()); b.setPeerPublicKey(a.publicKey()); EXPECT_EQ(toString(a.secret()), toString(b.secret())); EXPECT_EQ(a.secret(), b.secret()); EXPECT_EQ(96U, std::size(a.secret())); auto c = tr_message_stream_encryption::DH{}; c.setPeerPublicKey(b.publicKey()); EXPECT_NE(a.secret(), c.secret()); EXPECT_NE(toString(a.secret()), toString(c.secret())); } TEST(Crypto, encryptDecrypt) { auto a_dh = tr_message_stream_encryption::DH{}; auto b_dh = tr_message_stream_encryption::DH{}; a_dh.setPeerPublicKey(b_dh.publicKey()); b_dh.setPeerPublicKey(a_dh.publicKey()); auto constexpr Input1 = "test1"sv; auto encrypted1 = std::array{}; auto decrypted1 = std::array{}; auto a = tr_message_stream_encryption::Filter{}; a.encryptInit(false, a_dh, SomeHash); std::copy_n(std::begin(Input1), std::size(Input1), std::begin(encrypted1)); a.encrypt(std::size(Input1), std::data(encrypted1)); auto b = tr_message_stream_encryption::Filter{}; b.decryptInit(true, b_dh, SomeHash); std::copy_n(std::begin(encrypted1), std::size(Input1), std::begin(decrypted1)); b.decrypt(std::size(Input1), std::data(decrypted1)); EXPECT_EQ(Input1, std::data(decrypted1)) << "Input1 " << Input1 << " decrypted1 " << std::data(decrypted1); auto constexpr Input2 = "@#)C$@)#(*%bvkdjfhwbc039bc4603756VB3)"sv; auto encrypted2 = std::array{}; auto decrypted2 = std::array{}; b.encryptInit(true, b_dh, SomeHash); std::copy_n(std::begin(Input2), std::size(Input2), std::begin(encrypted2)); b.encrypt(std::size(Input2), std::data(encrypted2)); a.decryptInit(false, a_dh, SomeHash); std::copy_n(std::begin(encrypted2), std::size(Input2), std::begin(decrypted2)); a.decrypt(std::size(Input2), std::data(decrypted2)); EXPECT_EQ(Input2, std::data(decrypted2)) << "Input2 " << Input2 << " decrypted2 " << std::data(decrypted2); } TEST(Crypto, sha1) { auto hash1 = tr_sha1::digest("test"sv); EXPECT_EQ( 0, memcmp( std::data(hash1), "\xa9\x4a\x8f\xe5\xcc\xb1\x9b\xa6\x1c\x4c\x08\x73\xd3\x91\xe9\x87\x98\x2f\xbb\xd3", std::size(hash1))); auto hash2 = tr_sha1::digest("test"sv); EXPECT_EQ(hash1, hash2); hash1 = tr_sha1::digest("1"sv, "22"sv, "333"sv); hash2 = tr_sha1::digest("1"sv, "22"sv, "333"sv); EXPECT_EQ(hash1, hash2); EXPECT_EQ( 0, memcmp( std::data(hash1), "\x1f\x74\x64\x8e\x50\xa6\xa6\x70\x8e\xc5\x4a\xb3\x27\xa1\x63\xd5\x53\x6b\x7c\xed", std::size(hash1))); auto const hash3 = tr_sha1::digest("test"sv); EXPECT_EQ("a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"sv, tr_sha1_to_string(hash3)); auto const hash4 = tr_sha1::digest("te"sv, "st"sv); EXPECT_EQ("a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"sv, tr_sha1_to_string(hash4)); auto const hash5 = tr_sha1::digest("t"sv, "e"sv, std::string{ "s" }, std::array{ { 't' } }); EXPECT_EQ("a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"sv, tr_sha1_to_string(hash5)); } TEST(Crypto, ssha1) { struct LocalTest { std::string_view plain_text; std::string_view ssha1; }; auto constexpr Tests = std::array{ { { "test"sv, "{15ad0621b259a84d24dcd4e75b09004e98a3627bAMbyRHJy"sv }, { "QNY)(*#$B)!_X$B !_B#($^!)*&$%CV!#)&$C!@$(P*)"sv, "{10e2d7acbb104d970514a147cd16d51dfa40fb3c0OSwJtOL"sv }, } }; auto constexpr HashCount = size_t{ 4 * 1024 }; for (auto const& [plain_text, ssha1] : Tests) { auto hashes = std::unordered_set{}; hashes.reserve(HashCount); EXPECT_TRUE(tr_ssha1_matches(ssha1, plain_text)); EXPECT_TRUE(tr_ssha1_matches_(ssha1, plain_text)); using ssha1_func = std::string (*)(std::string_view plain_text); static auto constexpr Ssha1Funcs = std::array{ tr_ssha1, tr_ssha1_ }; for (size_t j = 0; j < HashCount; ++j) { auto const hash = Ssha1Funcs[j % 2](plain_text); // phrase matches each of generated hashes EXPECT_TRUE(tr_ssha1_matches(hash, plain_text)); EXPECT_TRUE(tr_ssha1_matches_(hash, plain_text)); hashes.insert(hash); } // confirm all hashes are different EXPECT_EQ(HashCount, hashes.size()); /* exchange two first chars */ auto phrase = std::string{ plain_text }; phrase[0] ^= phrase[1]; phrase[1] ^= phrase[0]; phrase[0] ^= phrase[1]; for (auto const& hash : hashes) { /* changed phrase doesn't match the hashes */ EXPECT_FALSE(tr_ssha1_matches(hash, phrase)); EXPECT_FALSE(tr_ssha1_matches_(hash, phrase)); } } /* should work with different salt lengths as well */ EXPECT_TRUE(tr_ssha1_matches("{a94a8fe5ccb19ba61c4c0873d391e987982fbbd3", "test")); EXPECT_TRUE(tr_ssha1_matches("{d209a21d3bc4f8fc4f8faf347e69f3def597eb170pySy4ai1ZPMjeU1", "test")); } TEST(Crypto, sha1FromString) { // bad lengths EXPECT_FALSE(tr_sha1_from_string("")); EXPECT_FALSE(tr_sha1_from_string("a94a8fe5ccb19ba61c4c0873d391e987982fbbd"sv)); EXPECT_FALSE(tr_sha1_from_string("a94a8fe5ccb19ba61c4c0873d391e987982fbbd33"sv)); // nonhex EXPECT_FALSE(tr_sha1_from_string("a94a8fe5ccb19ba61c4cz873d391e987982fbbd3"sv)); EXPECT_FALSE(tr_sha1_from_string("a94a8fe5ccb19 61c4c0873d391e987982fbbd3"sv)); // lowercase hex auto const baseline = "a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"sv; auto const lc = tr_sha1_from_string(baseline); EXPECT_TRUE(lc); EXPECT_EQ(baseline, tr_sha1_to_string(*lc)); // uppercase hex should yield the same result auto const uc = tr_sha1_from_string(tr_strupper(baseline)); EXPECT_TRUE(uc); EXPECT_EQ(*lc, *uc); } TEST(Crypto, sha256FromString) { // bad lengths EXPECT_FALSE(tr_sha256_from_string("")); EXPECT_FALSE(tr_sha256_from_string("a94a8fe5ccb19ba61c4c0873d391e987982fbbd"sv)); EXPECT_FALSE(tr_sha256_from_string("a94a8fe5ccb19ba61c4c0873d391e987982fbbd33"sv)); EXPECT_FALSE(tr_sha256_from_string("05d58dfd14ed21d33add137eb7a2c5d4ef5aaa4a945e654363d32b7c4bf5c92"sv)); EXPECT_FALSE(tr_sha256_from_string("05d58dfd14ed21d33add137eb7a2c5d4ef5aaa4a945e654363d32b7c4bf5c9299"sv)); // nonhex EXPECT_FALSE(tr_sha256_from_string("a94a8fe5ccb19ba61c4cz873d391e987982fbbd3aaaaaaaaaaaaaaaaaaaaaaa"sv)); EXPECT_FALSE(tr_sha256_from_string("05 8dfd14ed21d33add137eb7a2c5d4ef5aaa4a945e654363d32b7c4bf5c92"sv)); // lowercase hex auto const baseline = "05d58dfd14ed21d33add137eb7a2c5d4ef5aaa4a945e654363d32b7c4bf5c929"sv; auto const lc = tr_sha256_from_string(baseline); EXPECT_TRUE(lc); EXPECT_EQ(baseline, tr_sha256_to_string(*lc)); // uppercase hex should yield the same result auto const uc = tr_sha256_from_string(tr_strupper(baseline)); EXPECT_TRUE(uc); EXPECT_EQ(*lc, *uc); } TEST(Crypto, random) { /* test that tr_rand_int() stays in-bounds */ for (int i = 0; i < 100000; ++i) { int const val = tr_rand_int(100); EXPECT_LE(0, val); EXPECT_LT(val, 100); } } TEST(Crypto, base64) { auto raw = std::string_view{ "YOYO!"sv }; auto encoded = tr_base64_encode(raw); EXPECT_EQ("WU9ZTyE="sv, encoded); EXPECT_EQ(raw, tr_base64_decode(encoded)); EXPECT_EQ(""sv, tr_base64_encode(""sv)); EXPECT_EQ(""sv, tr_base64_decode(""sv)); static auto constexpr MaxBufSize = size_t{ 1024 }; for (size_t i = 1; i <= MaxBufSize; ++i) { auto buf = std::string{}; for (size_t j = 0; j < i; ++j) { buf += char(tr_rand_int_weak(256)); } EXPECT_EQ(buf, tr_base64_decode(tr_base64_encode(buf))); buf = std::string{}; for (size_t j = 0; j < i; ++j) { buf += char(1 + tr_rand_int_weak(255)); } EXPECT_EQ(buf, tr_base64_decode(tr_base64_encode(buf))); } }