mirror of
https://github.com/transmission/transmission
synced 2024-12-28 02:27:41 +00:00
280 lines
9.3 KiB
C++
280 lines
9.3 KiB
C++
// This file Copyright (C) 2013-2022 Mnemosyne LLC.
|
|
// It may be used under GPLv2 (SPDX: GPL-2.0), GPLv3 (SPDX: GPL-3.0),
|
|
// or any future license endorsed by Mnemosyne LLC.
|
|
// License text can be found in the licenses/ folder.
|
|
|
|
#include <algorithm>
|
|
#include <array>
|
|
#include <cstring>
|
|
#include <iostream>
|
|
#include <numeric>
|
|
#include <sstream>
|
|
#include <string>
|
|
#include <string_view>
|
|
#include <unordered_set>
|
|
|
|
#include "transmission.h"
|
|
|
|
#include "peer-mse.h"
|
|
#include "crypto-utils.h"
|
|
#include "utils.h"
|
|
|
|
#include "crypto-test-ref.h"
|
|
|
|
#include "gtest/gtest.h"
|
|
|
|
using namespace std::literals;
|
|
|
|
namespace
|
|
{
|
|
|
|
auto constexpr SomeHash = tr_sha1_digest_t{
|
|
std::byte{ 0 }, std::byte{ 1 }, std::byte{ 2 }, std::byte{ 3 }, std::byte{ 4 }, std::byte{ 5 }, std::byte{ 6 },
|
|
std::byte{ 7 }, std::byte{ 8 }, std::byte{ 9 }, std::byte{ 10 }, std::byte{ 11 }, std::byte{ 12 }, std::byte{ 13 },
|
|
std::byte{ 14 }, std::byte{ 15 }, std::byte{ 16 }, std::byte{ 17 }, std::byte{ 18 }, std::byte{ 19 },
|
|
};
|
|
|
|
template<size_t N>
|
|
std::string toString(std::array<std::byte, N> const& array)
|
|
{
|
|
auto ostr = std::ostringstream{};
|
|
ostr << '[';
|
|
for (auto const b : array)
|
|
{
|
|
ostr << static_cast<unsigned>(b) << ' ';
|
|
}
|
|
ostr << ']';
|
|
return ostr.str();
|
|
}
|
|
|
|
} // namespace
|
|
|
|
TEST(Crypto, DH)
|
|
{
|
|
auto a = tr_message_stream_encryption::DH{};
|
|
auto b = tr_message_stream_encryption::DH{};
|
|
|
|
a.setPeerPublicKey(b.publicKey());
|
|
b.setPeerPublicKey(a.publicKey());
|
|
EXPECT_EQ(toString(a.secret()), toString(b.secret()));
|
|
EXPECT_EQ(a.secret(), b.secret());
|
|
EXPECT_EQ(96U, std::size(a.secret()));
|
|
|
|
auto c = tr_message_stream_encryption::DH{};
|
|
c.setPeerPublicKey(b.publicKey());
|
|
EXPECT_NE(a.secret(), c.secret());
|
|
EXPECT_NE(toString(a.secret()), toString(c.secret()));
|
|
}
|
|
|
|
TEST(Crypto, encryptDecrypt)
|
|
{
|
|
auto a_dh = tr_message_stream_encryption::DH{};
|
|
auto b_dh = tr_message_stream_encryption::DH{};
|
|
|
|
a_dh.setPeerPublicKey(b_dh.publicKey());
|
|
b_dh.setPeerPublicKey(a_dh.publicKey());
|
|
|
|
auto constexpr Input1 = "test1"sv;
|
|
auto encrypted1 = std::array<char, 128>{};
|
|
auto decrypted1 = std::array<char, 128>{};
|
|
|
|
auto a = tr_message_stream_encryption::Filter{};
|
|
a.encryptInit(false, a_dh, SomeHash);
|
|
std::copy_n(std::begin(Input1), std::size(Input1), std::begin(encrypted1));
|
|
a.encrypt(std::size(Input1), std::data(encrypted1));
|
|
auto b = tr_message_stream_encryption::Filter{};
|
|
b.decryptInit(true, b_dh, SomeHash);
|
|
std::copy_n(std::begin(encrypted1), std::size(Input1), std::begin(decrypted1));
|
|
b.decrypt(std::size(Input1), std::data(decrypted1));
|
|
EXPECT_EQ(Input1, std::data(decrypted1)) << "Input1 " << Input1 << " decrypted1 " << std::data(decrypted1);
|
|
|
|
auto constexpr Input2 = "@#)C$@)#(*%bvkdjfhwbc039bc4603756VB3)"sv;
|
|
auto encrypted2 = std::array<char, 128>{};
|
|
auto decrypted2 = std::array<char, 128>{};
|
|
|
|
b.encryptInit(true, b_dh, SomeHash);
|
|
std::copy_n(std::begin(Input2), std::size(Input2), std::begin(encrypted2));
|
|
b.encrypt(std::size(Input2), std::data(encrypted2));
|
|
a.decryptInit(false, a_dh, SomeHash);
|
|
std::copy_n(std::begin(encrypted2), std::size(Input2), std::begin(decrypted2));
|
|
a.decrypt(std::size(Input2), std::data(decrypted2));
|
|
EXPECT_EQ(Input2, std::data(decrypted2)) << "Input2 " << Input2 << " decrypted2 " << std::data(decrypted2);
|
|
}
|
|
|
|
TEST(Crypto, sha1)
|
|
{
|
|
auto hash1 = tr_sha1::digest("test"sv);
|
|
EXPECT_EQ(
|
|
0,
|
|
memcmp(
|
|
std::data(hash1),
|
|
"\xa9\x4a\x8f\xe5\xcc\xb1\x9b\xa6\x1c\x4c\x08\x73\xd3\x91\xe9\x87\x98\x2f\xbb\xd3",
|
|
std::size(hash1)));
|
|
|
|
auto hash2 = tr_sha1::digest("test"sv);
|
|
EXPECT_EQ(hash1, hash2);
|
|
|
|
hash1 = tr_sha1::digest("1"sv, "22"sv, "333"sv);
|
|
hash2 = tr_sha1::digest("1"sv, "22"sv, "333"sv);
|
|
EXPECT_EQ(hash1, hash2);
|
|
EXPECT_EQ(
|
|
0,
|
|
memcmp(
|
|
std::data(hash1),
|
|
"\x1f\x74\x64\x8e\x50\xa6\xa6\x70\x8e\xc5\x4a\xb3\x27\xa1\x63\xd5\x53\x6b\x7c\xed",
|
|
std::size(hash1)));
|
|
|
|
auto const hash3 = tr_sha1::digest("test"sv);
|
|
EXPECT_EQ("a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"sv, tr_sha1_to_string(hash3));
|
|
|
|
auto const hash4 = tr_sha1::digest("te"sv, "st"sv);
|
|
EXPECT_EQ("a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"sv, tr_sha1_to_string(hash4));
|
|
|
|
auto const hash5 = tr_sha1::digest("t"sv, "e"sv, std::string{ "s" }, std::array<char, 1>{ { 't' } });
|
|
EXPECT_EQ("a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"sv, tr_sha1_to_string(hash5));
|
|
}
|
|
|
|
TEST(Crypto, ssha1)
|
|
{
|
|
struct LocalTest
|
|
{
|
|
std::string_view plain_text;
|
|
std::string_view ssha1;
|
|
};
|
|
|
|
auto constexpr Tests = std::array<LocalTest, 2>{ {
|
|
{ "test"sv, "{15ad0621b259a84d24dcd4e75b09004e98a3627bAMbyRHJy"sv },
|
|
{ "QNY)(*#$B)!_X$B !_B#($^!)*&$%CV!#)&$C!@$(P*)"sv, "{10e2d7acbb104d970514a147cd16d51dfa40fb3c0OSwJtOL"sv },
|
|
} };
|
|
|
|
auto constexpr HashCount = size_t{ 4 * 1024 };
|
|
|
|
for (auto const& [plain_text, ssha1] : Tests)
|
|
{
|
|
auto hashes = std::unordered_set<std::string>{};
|
|
hashes.reserve(HashCount);
|
|
|
|
EXPECT_TRUE(tr_ssha1_matches(ssha1, plain_text));
|
|
EXPECT_TRUE(tr_ssha1_matches_(ssha1, plain_text));
|
|
|
|
using ssha1_func = std::string (*)(std::string_view plain_text);
|
|
static auto constexpr Ssha1Funcs = std::array<ssha1_func, 2>{ tr_ssha1, tr_ssha1_ };
|
|
|
|
for (size_t j = 0; j < HashCount; ++j)
|
|
{
|
|
auto const hash = Ssha1Funcs[j % 2](plain_text);
|
|
|
|
// phrase matches each of generated hashes
|
|
EXPECT_TRUE(tr_ssha1_matches(hash, plain_text));
|
|
EXPECT_TRUE(tr_ssha1_matches_(hash, plain_text));
|
|
|
|
hashes.insert(hash);
|
|
}
|
|
|
|
// confirm all hashes are different
|
|
EXPECT_EQ(HashCount, hashes.size());
|
|
|
|
/* exchange two first chars */
|
|
auto phrase = std::string{ plain_text };
|
|
phrase[0] ^= phrase[1];
|
|
phrase[1] ^= phrase[0];
|
|
phrase[0] ^= phrase[1];
|
|
|
|
for (auto const& hash : hashes)
|
|
{
|
|
/* changed phrase doesn't match the hashes */
|
|
EXPECT_FALSE(tr_ssha1_matches(hash, phrase));
|
|
EXPECT_FALSE(tr_ssha1_matches_(hash, phrase));
|
|
}
|
|
}
|
|
|
|
/* should work with different salt lengths as well */
|
|
EXPECT_TRUE(tr_ssha1_matches("{a94a8fe5ccb19ba61c4c0873d391e987982fbbd3", "test"));
|
|
EXPECT_TRUE(tr_ssha1_matches("{d209a21d3bc4f8fc4f8faf347e69f3def597eb170pySy4ai1ZPMjeU1", "test"));
|
|
}
|
|
|
|
TEST(Crypto, sha1FromString)
|
|
{
|
|
// bad lengths
|
|
EXPECT_FALSE(tr_sha1_from_string(""));
|
|
EXPECT_FALSE(tr_sha1_from_string("a94a8fe5ccb19ba61c4c0873d391e987982fbbd"sv));
|
|
EXPECT_FALSE(tr_sha1_from_string("a94a8fe5ccb19ba61c4c0873d391e987982fbbd33"sv));
|
|
// nonhex
|
|
EXPECT_FALSE(tr_sha1_from_string("a94a8fe5ccb19ba61c4cz873d391e987982fbbd3"sv));
|
|
EXPECT_FALSE(tr_sha1_from_string("a94a8fe5ccb19 61c4c0873d391e987982fbbd3"sv));
|
|
|
|
// lowercase hex
|
|
auto const baseline = "a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"sv;
|
|
auto const lc = tr_sha1_from_string(baseline);
|
|
EXPECT_TRUE(lc);
|
|
EXPECT_EQ(baseline, tr_sha1_to_string(*lc));
|
|
|
|
// uppercase hex should yield the same result
|
|
auto const uc = tr_sha1_from_string(tr_strupper(baseline));
|
|
EXPECT_TRUE(uc);
|
|
EXPECT_EQ(*lc, *uc);
|
|
}
|
|
|
|
TEST(Crypto, sha256FromString)
|
|
{
|
|
// bad lengths
|
|
EXPECT_FALSE(tr_sha256_from_string(""));
|
|
EXPECT_FALSE(tr_sha256_from_string("a94a8fe5ccb19ba61c4c0873d391e987982fbbd"sv));
|
|
EXPECT_FALSE(tr_sha256_from_string("a94a8fe5ccb19ba61c4c0873d391e987982fbbd33"sv));
|
|
EXPECT_FALSE(tr_sha256_from_string("05d58dfd14ed21d33add137eb7a2c5d4ef5aaa4a945e654363d32b7c4bf5c92"sv));
|
|
EXPECT_FALSE(tr_sha256_from_string("05d58dfd14ed21d33add137eb7a2c5d4ef5aaa4a945e654363d32b7c4bf5c9299"sv));
|
|
// nonhex
|
|
EXPECT_FALSE(tr_sha256_from_string("a94a8fe5ccb19ba61c4cz873d391e987982fbbd3aaaaaaaaaaaaaaaaaaaaaaa"sv));
|
|
EXPECT_FALSE(tr_sha256_from_string("05 8dfd14ed21d33add137eb7a2c5d4ef5aaa4a945e654363d32b7c4bf5c92"sv));
|
|
|
|
// lowercase hex
|
|
auto const baseline = "05d58dfd14ed21d33add137eb7a2c5d4ef5aaa4a945e654363d32b7c4bf5c929"sv;
|
|
auto const lc = tr_sha256_from_string(baseline);
|
|
EXPECT_TRUE(lc);
|
|
EXPECT_EQ(baseline, tr_sha256_to_string(*lc));
|
|
|
|
// uppercase hex should yield the same result
|
|
auto const uc = tr_sha256_from_string(tr_strupper(baseline));
|
|
EXPECT_TRUE(uc);
|
|
EXPECT_EQ(*lc, *uc);
|
|
}
|
|
|
|
TEST(Crypto, random)
|
|
{
|
|
/* test that tr_rand_int() stays in-bounds */
|
|
for (int i = 0; i < 100000; ++i)
|
|
{
|
|
int const val = tr_rand_int(100);
|
|
EXPECT_LE(0, val);
|
|
EXPECT_LT(val, 100);
|
|
}
|
|
}
|
|
|
|
TEST(Crypto, base64)
|
|
{
|
|
auto raw = std::string_view{ "YOYO!"sv };
|
|
auto encoded = tr_base64_encode(raw);
|
|
EXPECT_EQ("WU9ZTyE="sv, encoded);
|
|
EXPECT_EQ(raw, tr_base64_decode(encoded));
|
|
|
|
EXPECT_EQ(""sv, tr_base64_encode(""sv));
|
|
EXPECT_EQ(""sv, tr_base64_decode(""sv));
|
|
|
|
static auto constexpr MaxBufSize = size_t{ 1024 };
|
|
for (size_t i = 1; i <= MaxBufSize; ++i)
|
|
{
|
|
auto buf = std::string{};
|
|
for (size_t j = 0; j < i; ++j)
|
|
{
|
|
buf += char(tr_rand_int_weak(256));
|
|
}
|
|
EXPECT_EQ(buf, tr_base64_decode(tr_base64_encode(buf)));
|
|
|
|
buf = std::string{};
|
|
for (size_t j = 0; j < i; ++j)
|
|
{
|
|
buf += char(1 + tr_rand_int_weak(255));
|
|
}
|
|
EXPECT_EQ(buf, tr_base64_decode(tr_base64_encode(buf)));
|
|
}
|
|
}
|