mirror of
https://github.com/oxen-io/lokinet.git
synced 2024-11-03 23:15:52 +00:00
13b01c86a6
-- Moved all RPCServer initialization logic to rpcserver constructor -- Fixed config logic, fxn binding to rpc address, fxn adding rpc cats -- router hive failed CI/CD resulting from outdated reference to rpcBindAddr -- ipc socket as default hidden from windows (for now) refactored config endpoint - added rpc call script (contrib/omq-rpc.py) - added new fxns to .ini config stuff - added delete .ini file functionality to config endpoint - added edge case control for config endpoint add commented out line in clang-form for header reorg later
127 lines
3.0 KiB
C++
127 lines
3.0 KiB
C++
#include <catch2/catch.hpp>
|
|
|
|
#include <llarp/crypto/crypto.hpp>
|
|
#include <llarp/crypto/crypto_libsodium.hpp>
|
|
#include <llarp/router_contact.hpp>
|
|
#include <llarp/net/net_int.hpp>
|
|
#include <llarp/util/time.hpp>
|
|
|
|
namespace
|
|
{
|
|
llarp::sodium::CryptoLibSodium crypto;
|
|
llarp::CryptoManager cmanager(&crypto);
|
|
}
|
|
|
|
namespace llarp
|
|
{
|
|
|
|
TEST_CASE("RouterContact Sign and Verify", "[RC][RouterContact][signature][sign][verify]")
|
|
{
|
|
RouterContact rc;
|
|
|
|
SecretKey sign;
|
|
cmanager.instance()->identity_keygen(sign);
|
|
|
|
SecretKey encr;
|
|
cmanager.instance()->encryption_keygen(encr);
|
|
|
|
rc.enckey = encr.toPublic();
|
|
rc.pubkey = sign.toPublic();
|
|
|
|
REQUIRE(rc.Sign(sign));
|
|
REQUIRE(rc.Verify(time_now_ms()));
|
|
}
|
|
|
|
TEST_CASE("RouterContact Decode Version 1", "[RC][RouterContact][V1]")
|
|
{
|
|
RouterContact rc;
|
|
|
|
SecretKey sign;
|
|
cmanager.instance()->identity_keygen(sign);
|
|
|
|
SecretKey encr;
|
|
cmanager.instance()->encryption_keygen(encr);
|
|
|
|
rc.version = 1;
|
|
|
|
rc.enckey = encr.toPublic();
|
|
rc.pubkey = sign.toPublic();
|
|
|
|
REQUIRE(rc.Sign(sign));
|
|
|
|
std::array<byte_t, 5000> encoded_buffer;
|
|
llarp_buffer_t encoded_llarp(encoded_buffer);
|
|
|
|
rc.BEncode(&encoded_llarp);
|
|
|
|
encoded_llarp.sz = encoded_llarp.cur - encoded_llarp.base;
|
|
encoded_llarp.cur = encoded_llarp.base;
|
|
|
|
RouterContact decoded_rc;
|
|
|
|
REQUIRE(decoded_rc.BDecode(&encoded_llarp));
|
|
|
|
REQUIRE(decoded_rc.Verify(time_now_ms()));
|
|
|
|
REQUIRE(decoded_rc == rc);
|
|
}
|
|
|
|
TEST_CASE("RouterContact Decode Mixed Versions", "[RC][RouterContact]")
|
|
{
|
|
RouterContact rc1, rc2, rc3, rc4;
|
|
|
|
rc1.version = 0;
|
|
rc2.version = 1;
|
|
rc3.version = 0;
|
|
rc4.version = 1;
|
|
|
|
SecretKey sign1, sign2, sign3, sign4;
|
|
cmanager.instance()->identity_keygen(sign1);
|
|
cmanager.instance()->identity_keygen(sign2);
|
|
cmanager.instance()->identity_keygen(sign3);
|
|
cmanager.instance()->identity_keygen(sign4);
|
|
|
|
SecretKey encr1, encr2, encr3, encr4;
|
|
cmanager.instance()->encryption_keygen(encr1);
|
|
cmanager.instance()->encryption_keygen(encr2);
|
|
cmanager.instance()->encryption_keygen(encr3);
|
|
cmanager.instance()->encryption_keygen(encr4);
|
|
|
|
rc1.enckey = encr1.toPublic();
|
|
rc2.enckey = encr2.toPublic();
|
|
rc3.enckey = encr3.toPublic();
|
|
rc4.enckey = encr4.toPublic();
|
|
rc1.pubkey = sign1.toPublic();
|
|
rc2.pubkey = sign2.toPublic();
|
|
rc3.pubkey = sign3.toPublic();
|
|
rc4.pubkey = sign4.toPublic();
|
|
|
|
REQUIRE(rc1.Sign(sign1));
|
|
REQUIRE(rc2.Sign(sign2));
|
|
REQUIRE(rc3.Sign(sign3));
|
|
REQUIRE(rc4.Sign(sign4));
|
|
|
|
std::vector<RouterContact> rc_vec;
|
|
rc_vec.push_back(rc1);
|
|
rc_vec.push_back(rc2);
|
|
rc_vec.push_back(rc3);
|
|
rc_vec.push_back(rc4);
|
|
|
|
std::array<byte_t, 20000> encoded_buffer;
|
|
llarp_buffer_t encoded_llarp(encoded_buffer);
|
|
|
|
BEncodeWriteList(rc_vec.begin(), rc_vec.end(), &encoded_llarp);
|
|
encoded_llarp.sz = encoded_llarp.cur - encoded_llarp.base;
|
|
encoded_llarp.cur = encoded_llarp.base;
|
|
|
|
std::vector<RouterContact> rc_vec_out;
|
|
|
|
BEncodeReadList(rc_vec_out, &encoded_llarp);
|
|
|
|
REQUIRE(rc_vec.size() == rc_vec_out.size());
|
|
for (size_t i=0; i<4; i++)
|
|
REQUIRE(rc_vec[i] == rc_vec_out[i]);
|
|
}
|
|
|
|
} // namespace llarp
|