lokinet/test/crypto/test_llarp_key_manager.cpp

179 lines
4.2 KiB
C++
Raw Normal View History

2019-12-09 19:29:33 +00:00
#include <config/key_manager.hpp>
#include <crypto/crypto.hpp>
#include <crypto/crypto_libsodium.hpp>
#include <llarp_test.hpp>
#include <functional>
#include <random>
#include <string>
#include <test_util.hpp>
#include <gtest/gtest.h>
using namespace ::llarp;
using namespace ::testing;
struct KeyManagerTest : public test::LlarpTest< llarp::sodium::CryptoLibSodium >
{
// paranoid file guards for anything KeyManager might touch
test::FileGuard m_rcFileGuard;
test::FileGuard m_encFileGuard;
test::FileGuard m_transportFileGuard;
test::FileGuard m_identFileGuard;
KeyManagerTest()
: m_rcFileGuard(our_rc_filename)
, m_encFileGuard(our_enc_key_filename)
, m_transportFileGuard(our_transport_key_filename)
, m_identFileGuard(our_identity_filename)
2019-12-09 19:29:33 +00:00
{
}
/// generate a valid "rc.signed" file
bool
generateRcFile()
{
RouterContact rc;
return rc.Write(our_rc_filename);
2019-12-09 19:29:33 +00:00
}
};
TEST_F(KeyManagerTest, TestBackupFileByMoving_MovesExistingFiles)
{
fs::path p = test::randFilename();
ASSERT_FALSE(fs::exists(p));
// touch file
std::fstream f;
f.open(p.string(), std::ios::out);
f.close();
KeyManager::backupFileByMoving(p.string());
ASSERT_FALSE(fs::exists(p));
fs::path moved = p.string() + ".0.bak";
ASSERT_TRUE(fs::exists(moved));
test::FileGuard guard(moved);
};
TEST_F(KeyManagerTest, TestBackupFileByMoving_DoesntTouchNonExistentFiles)
{
fs::path p = test::randFilename();
ASSERT_FALSE(fs::exists(p));
KeyManager::backupFileByMoving(p.string());
ASSERT_FALSE(fs::exists(p));
fs::path moved = p.string() + ".0.bak";
ASSERT_FALSE(fs::exists(moved));
}
TEST_F(KeyManagerTest, TestBackupFileByMoving_FailsIfBackupNamesAreExausted)
{
fs::path base = test::randFilename();
ASSERT_FALSE(fs::exists(base));
// touch file
{
std::fstream f;
f.open(base.string(), std::ios::out);
f.close();
}
test::FileGuard guard(base);
constexpr uint32_t numBackupNames = 9;
std::vector<test::FileGuard> guards;
guards.reserve(numBackupNames);
// generate backup files foo.0.bak through foo.9.bak
for (uint32_t i=0; i<numBackupNames; ++i)
{
fs::path p = base.string() +"."+ std::to_string(i) +".bak";
std::fstream f;
f.open(p.string(), std::ios::out);
f.close();
guards.emplace_back(p);
ASSERT_TRUE(fs::exists(p));
}
ASSERT_FALSE(KeyManager::backupFileByMoving(base.string()));
};
TEST_F(KeyManagerTest, TestInitialize_MakesKeyfiles)
{
llarp::Config conf;
conf.LoadDefault(false, {});
2019-12-09 19:29:33 +00:00
KeyManager keyManager;
ASSERT_TRUE(keyManager.initialize(conf, true, true));
2019-12-09 19:29:33 +00:00
// KeyManager doesn't generate RC file, but should generate others
ASSERT_FALSE(fs::exists(our_rc_filename));
2019-12-09 19:29:33 +00:00
ASSERT_TRUE(fs::exists(our_enc_key_filename));
ASSERT_TRUE(fs::exists(our_transport_key_filename));
ASSERT_TRUE(fs::exists(our_identity_filename));
2019-12-09 19:29:33 +00:00
}
TEST_F(KeyManagerTest, TestInitialize_RespectsGenFlag)
{
llarp::Config conf;
conf.LoadDefault(false, {});
2019-12-09 19:29:33 +00:00
KeyManager keyManager;
ASSERT_FALSE(keyManager.initialize(conf, false, true));
2019-12-09 19:29:33 +00:00
// KeyManager shouldn't have touched any files without (genIfAbsent == true)
ASSERT_FALSE(fs::exists(our_rc_filename));
ASSERT_FALSE(fs::exists(our_enc_key_filename));
ASSERT_FALSE(fs::exists(our_transport_key_filename));
ASSERT_FALSE(fs::exists(our_identity_filename));
2019-12-09 19:29:33 +00:00
}
TEST_F(KeyManagerTest, TestInitialize_DetectsBadRcFile)
{
llarp::Config conf;
conf.LoadDefault(false, {});
conf.lokid.whitelistRouters = false;
2019-12-09 19:29:33 +00:00
std::fstream f;
f.open(our_rc_filename, std::ios::out);
2019-12-09 19:29:33 +00:00
f << "bad_rc_file";
f.close();
KeyManager keyManager;
ASSERT_TRUE(keyManager.initialize(conf, true, true));
2019-12-09 19:29:33 +00:00
ASSERT_TRUE(keyManager.needBackup());
ASSERT_TRUE(fs::exists(our_enc_key_filename));
ASSERT_TRUE(fs::exists(our_transport_key_filename));
ASSERT_TRUE(fs::exists(our_identity_filename));
2019-12-09 19:29:33 +00:00
// test that keys are sane
SecretKey key;
key.Zero();
ASSERT_TRUE(key.LoadFromFile(our_enc_key_filename));
2019-12-09 19:29:33 +00:00
ASSERT_FALSE(key.IsZero());
key.Zero();
ASSERT_TRUE(key.LoadFromFile(our_transport_key_filename));
2019-12-09 19:29:33 +00:00
ASSERT_FALSE(key.IsZero());
key.Zero();
ASSERT_TRUE(key.LoadFromFile(our_identity_filename));
2019-12-09 19:29:33 +00:00
ASSERT_FALSE(key.IsZero());
}