lokinet/test/test_llarp_router_contact.cpp

127 lines
3.0 KiB
C++
Raw Normal View History

#include <catch2/catch.hpp>
2018-12-28 15:04:05 +00:00
2023-01-09 17:47:41 +00:00
#include <llarp/crypto/crypto.hpp>
#include <llarp/crypto/crypto_libsodium.hpp>
#include <llarp/router_contact.hpp>
#include <llarp/net/net_int.hpp>
2022-07-18 15:59:13 +00:00
#include <llarp/util/time.hpp>
2018-12-28 15:04:05 +00:00
namespace
{
llarp::sodium::CryptoLibSodium crypto;
llarp::CryptoManager cmanager(&crypto);
}
2019-05-28 19:45:09 +00:00
namespace llarp
{
2019-01-02 22:21:29 +00:00
TEST_CASE("RouterContact Sign and Verify", "[RC][RouterContact][signature][sign][verify]")
2018-12-28 15:04:05 +00:00
{
RouterContact rc;
SecretKey sign;
cmanager.instance()->identity_keygen(sign);
2018-12-28 15:04:05 +00:00
SecretKey encr;
cmanager.instance()->encryption_keygen(encr);
2018-12-28 15:04:05 +00:00
rc.enckey = encr.toPublic();
rc.pubkey = sign.toPublic();
2018-12-28 15:04:05 +00:00
REQUIRE(rc.Sign(sign));
REQUIRE(rc.Verify(time_now_ms()));
}
2018-12-28 15:04:05 +00:00
TEST_CASE("RouterContact Decode Version 1", "[RC][RouterContact][V1]")
2018-12-28 15:04:05 +00:00
{
RouterContact rc;
SecretKey sign;
cmanager.instance()->identity_keygen(sign);
SecretKey encr;
cmanager.instance()->encryption_keygen(encr);
rc.version = 1;
2019-04-08 17:40:51 +00:00
2019-01-02 22:21:29 +00:00
rc.enckey = encr.toPublic();
2019-01-17 15:11:17 +00:00
rc.pubkey = sign.toPublic();
2019-05-28 19:45:09 +00:00
REQUIRE(rc.Sign(sign));
std::array<byte_t, 5000> encoded_buffer;
llarp_buffer_t encoded_llarp(encoded_buffer);
rc.BEncode(&encoded_llarp);
encoded_llarp.sz = encoded_llarp.cur - encoded_llarp.base;
encoded_llarp.cur = encoded_llarp.base;
RouterContact decoded_rc;
REQUIRE(decoded_rc.BDecode(&encoded_llarp));
REQUIRE(decoded_rc.Verify(time_now_ms()));
2019-05-28 19:45:09 +00:00
REQUIRE(decoded_rc == rc);
2018-12-28 15:04:05 +00:00
}
TEST_CASE("RouterContact Decode Mixed Versions", "[RC][RouterContact]")
{
RouterContact rc1, rc2, rc3, rc4;
rc1.version = 0;
rc2.version = 1;
rc3.version = 0;
rc4.version = 1;
SecretKey sign1, sign2, sign3, sign4;
cmanager.instance()->identity_keygen(sign1);
cmanager.instance()->identity_keygen(sign2);
cmanager.instance()->identity_keygen(sign3);
cmanager.instance()->identity_keygen(sign4);
SecretKey encr1, encr2, encr3, encr4;
cmanager.instance()->encryption_keygen(encr1);
cmanager.instance()->encryption_keygen(encr2);
cmanager.instance()->encryption_keygen(encr3);
cmanager.instance()->encryption_keygen(encr4);
rc1.enckey = encr1.toPublic();
rc2.enckey = encr2.toPublic();
rc3.enckey = encr3.toPublic();
rc4.enckey = encr4.toPublic();
rc1.pubkey = sign1.toPublic();
rc2.pubkey = sign2.toPublic();
rc3.pubkey = sign3.toPublic();
rc4.pubkey = sign4.toPublic();
REQUIRE(rc1.Sign(sign1));
REQUIRE(rc2.Sign(sign2));
REQUIRE(rc3.Sign(sign3));
REQUIRE(rc4.Sign(sign4));
std::vector<RouterContact> rc_vec;
rc_vec.push_back(rc1);
rc_vec.push_back(rc2);
rc_vec.push_back(rc3);
rc_vec.push_back(rc4);
std::array<byte_t, 20000> encoded_buffer;
llarp_buffer_t encoded_llarp(encoded_buffer);
BEncodeWriteList(rc_vec.begin(), rc_vec.end(), &encoded_llarp);
encoded_llarp.sz = encoded_llarp.cur - encoded_llarp.base;
encoded_llarp.cur = encoded_llarp.base;
std::vector<RouterContact> rc_vec_out;
BEncodeReadList(rc_vec_out, &encoded_llarp);
REQUIRE(rc_vec.size() == rc_vec_out.size());
for (size_t i=0; i<4; i++)
REQUIRE(rc_vec[i] == rc_vec_out[i]);
}
} // namespace llarp