tripwire-open-source/src/twtest/keyfile_t.cpp

141 lines
4.7 KiB
C++

//
// The developer of the original code and/or files is Tripwire, Inc.
// Portions created by Tripwire, Inc. are copyright (C) 2000-2021 Tripwire,
// Inc. Tripwire is a registered trademark of Tripwire, Inc. All rights
// reserved.
//
// This program is free software. The contents of this file are subject
// to the terms of the GNU General Public License as published by the
// Free Software Foundation; either version 2 of the License, or (at your
// option) any later version. You may redistribute it and/or modify it
// only in compliance with the GNU General Public License.
//
// This program is distributed in the hope that it will be useful.
// However, this program is distributed AS-IS WITHOUT ANY
// WARRANTY; INCLUDING THE IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS
// FOR A PARTICULAR PURPOSE. Please see the GNU General Public License
// for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; if not, write to the Free Software
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
// USA.
//
// Nothing in the GNU General Public License or any other license to use
// the code or files shall permit you to use Tripwire's trademarks,
// service marks, or other intellectual property without Tripwire's
// prior written consent.
//
// If you have any questions, please contact Tripwire, Inc. at either
// info@tripwire.org or www.tripwire.org.
//
///////////////////////////////////////////////////////////////////////////////
// keyfile_t.cpp
//
#include "twcrypto/stdtwcrypto.h"
#include "twcrypto/keyfile.h"
#include "twcrypto/crypto.h"
#include "core/archive.h"
#include "core/debug.h"
#include "twtest/test.h"
#include "tw/twutil.h"
////////////////////////////////////////////////////////////////////////////////
void TestKeyFile()
{
cDebug d("TestKeyFile");
// test keyfile exceptions all work correctly
d.TraceDebug("Testing expception strings, IGNORE THESE ERRORS...\n");
cTWUtil::PrintErrorMsg(eKeyFile(_T("Testing only, ignore this.")));
cTWUtil::PrintErrorMsg(eKeyFileInvalidFmt(_T("Testing only, ignore this.")));
cTWUtil::PrintErrorMsg(eKeyFileBadPassphrase(_T("Testing only, ignore this.")));
cTWUtil::PrintErrorMsg(eKeyFileArchive(_T("Testing only, ignore this.")));
cTWUtil::PrintErrorMsg(eKeyFileUninitialized(_T("Testing only, ignore this.")));
cKeyFile keyfile;
d.TraceDebug("Generating keys...\n");
std::string s = "haybaby";
keyfile.GenerateKeys(cElGamalSig::KEY1024, (int8_t*)s.data(), 7);
char plaintext[9000];
char ciphertext[9000];
memset(plaintext, 42, 9000);
// encrypt
d.TraceDebug("Encrypting...\n");
{
cElGamalSig elGamal(*keyfile.GetPublicKey());
TEST(elGamal.GetBlockSizePlain() < 9000);
TEST(elGamal.GetBlockSizeCipher() < 9000);
std::string s = "haybaby";
cPrivateKeyProxy key;
TEST(key.AquireKey(keyfile, (int8_t*)s.data(), 7));
elGamal.SetSigning(key.GetKey());
elGamal.ProcessBlock(plaintext, ciphertext);
}
// decrypt
d.TraceDebug("Decrypting...\n");
{
cElGamalSig elGamal(*keyfile.GetPublicKey());
char recovered_text[9000];
elGamal.SetVerifying(keyfile.GetPublicKey());
elGamal.ProcessBlock(ciphertext, recovered_text);
TEST(memcmp(recovered_text, plaintext, elGamal.GetBlockSizePlain()) == 0);
}
// save to and read from memory
d.TraceDebug("Read/Write to memory...\n");
{
int8_t* pMem = new int8_t[keyfile.GetWriteLen()];
keyfile.WriteMem(pMem);
cKeyFile keyfile2;
TEST(!keyfile2.KeysLoaded());
keyfile2.ReadMem(pMem);
TEST(keyfile2.KeysLoaded());
cElGamalSig elGamal(*keyfile2.GetPublicKey());
char recovered_text[9000];
elGamal.SetVerifying(keyfile2.GetPublicKey());
elGamal.ProcessBlock(ciphertext, recovered_text);
TEST(memcmp(recovered_text, plaintext, elGamal.GetBlockSizePlain()) == 0);
delete [] pMem;
}
// save to and read from disk
d.TraceDebug("Read/Write to file...\n");
{
keyfile.WriteFile(TwTestPath("keyfile.key").c_str());
cKeyFile keyfile2;
TEST(!keyfile2.KeysLoaded());
keyfile2.ReadFile(TwTestPath("keyfile.key").c_str());
TEST(keyfile2.KeysLoaded());
cElGamalSig elGamal(*keyfile2.GetPublicKey());
char recovered_text[9000];
elGamal.SetVerifying(keyfile2.GetPublicKey());
elGamal.ProcessBlock(ciphertext, recovered_text);
TEST(memcmp(recovered_text, plaintext, elGamal.GetBlockSizePlain()) == 0);
}
return;
}
void RegisterSuite_KeyFile()
{
RegisterTest("KeyFile", "Basic", TestKeyFile);
}