Skip to content
Snippets Groups Projects
test_group_session.cpp 8.47 KiB
Newer Older
  • Learn to ignore specific revisions
  • /* Copyright 2016 OpenMarket Ltd
     *
     * Licensed under the Apache License, Version 2.0 (the "License");
     * you may not use this file except in compliance with the License.
     * You may obtain a copy of the License at
     *
     *     http://www.apache.org/licenses/LICENSE-2.0
     *
     * Unless required by applicable law or agreed to in writing, software
     * distributed under the License is distributed on an "AS IS" BASIS,
     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     * See the License for the specific language governing permissions and
     * limitations under the License.
     */
    
    #include "olm/inbound_group_session.h"
    
    #include "olm/outbound_group_session.h"
    #include "unittest.hh"
    
    
    int main() {
    
    
        TestCase test_case("Pickle outbound group session");
    
    
        size_t size = olm_outbound_group_session_size();
    
        uint8_t memory[size];
    
        OlmOutboundGroupSession *session = olm_outbound_group_session(memory);
    
        size_t pickle_length = olm_pickle_outbound_group_session_length(session);
        uint8_t pickle1[pickle_length];
        olm_pickle_outbound_group_session(session,
                                          "secret_key", 10,
                                          pickle1, pickle_length);
        uint8_t pickle2[pickle_length];
        memcpy(pickle2, pickle1, pickle_length);
    
        uint8_t buffer2[size];
        OlmOutboundGroupSession *session2 = olm_outbound_group_session(buffer2);
        size_t res = olm_unpickle_outbound_group_session(session2,
                                                         "secret_key", 10,
                                                         pickle2, pickle_length);
        assert_not_equals((size_t)-1, res);
        assert_equals(pickle_length,
                      olm_pickle_outbound_group_session_length(session2));
        olm_pickle_outbound_group_session(session2,
                                          "secret_key", 10,
                                          pickle2, pickle_length);
    
        assert_equals(pickle1, pickle2, pickle_length);
    }
    
    
    {
        TestCase test_case("Pickle inbound group session");
    
        size_t size = olm_inbound_group_session_size();
        uint8_t memory[size];
        OlmInboundGroupSession *session = olm_inbound_group_session(memory);
    
        size_t pickle_length = olm_pickle_inbound_group_session_length(session);
        uint8_t pickle1[pickle_length];
        olm_pickle_inbound_group_session(session,
                                         "secret_key", 10,
                                         pickle1, pickle_length);
        uint8_t pickle2[pickle_length];
        memcpy(pickle2, pickle1, pickle_length);
    
        uint8_t buffer2[size];
        OlmInboundGroupSession *session2 = olm_inbound_group_session(buffer2);
        size_t res = olm_unpickle_inbound_group_session(session2,
                                                        "secret_key", 10,
                                                        pickle2, pickle_length);
        assert_not_equals((size_t)-1, res);
        assert_equals(pickle_length,
                      olm_pickle_inbound_group_session_length(session2));
        olm_pickle_inbound_group_session(session2,
                                          "secret_key", 10,
                                          pickle2, pickle_length);
    
        assert_equals(pickle1, pickle2, pickle_length);
    }
    
    
    {
        TestCase test_case("Group message send/receive");
    
    
        uint8_t random_bytes[] =
            "0123456789ABDEF0123456789ABCDEF"
            "0123456789ABDEF0123456789ABCDEF"
            "0123456789ABDEF0123456789ABCDEF"
            "0123456789ABDEF0123456789ABCDEF"
    
            "0123456789ABDEF0123456789ABCDEF"
    
        /* build the outbound session */
    
        size_t size = olm_outbound_group_session_size();
    
        uint8_t memory[size];
    
        OlmOutboundGroupSession *session = olm_outbound_group_session(memory);
    
    
        assert_equals((size_t)160,
    
                      olm_init_outbound_group_session_random_length(session));
    
        size_t res = olm_init_outbound_group_session(
            session, random_bytes, sizeof(random_bytes));
        assert_equals((size_t)0, res);
    
    
        assert_equals(0U, olm_outbound_group_session_message_index(session));
        size_t session_key_len = olm_outbound_group_session_key_length(session);
        uint8_t session_key[session_key_len];
        olm_outbound_group_session_key(session, session_key, session_key_len);
    
        /* encode the message */
    
        uint8_t plaintext[] = "Message";
        size_t plaintext_length = sizeof(plaintext) - 1;
    
        size_t msglen = olm_group_encrypt_message_length(
            session, plaintext_length);
    
    
        res = olm_group_encrypt(session, plaintext, plaintext_length,
                                msg, msglen);
        assert_equals(msglen, res);
    
        assert_equals(1U, olm_outbound_group_session_message_index(session));
    
    
        /* build the inbound session */
        size = olm_inbound_group_session_size();
        uint8_t inbound_session_memory[size];
        OlmInboundGroupSession *inbound_session =
            olm_inbound_group_session(inbound_session_memory);
    
        res = olm_init_inbound_group_session(
    
        assert_equals((size_t)0, res);
    
    
        /* Check the session ids */
    
        size_t out_session_id_len = olm_outbound_group_session_id_length(session);
        uint8_t out_session_id[out_session_id_len];
        assert_equals(out_session_id_len, olm_outbound_group_session_id(
            session, out_session_id, out_session_id_len
        ));
    
        size_t in_session_id_len = olm_inbound_group_session_id_length(
            inbound_session
        );
        uint8_t in_session_id[in_session_id_len];
        assert_equals(in_session_id_len, olm_inbound_group_session_id(
            inbound_session, in_session_id, in_session_id_len
        ));
    
        assert_equals(in_session_id_len, out_session_id_len);
        assert_equals(out_session_id, in_session_id, in_session_id_len);
    
    
        /* decode the message */
    
        /* olm_group_decrypt_max_plaintext_length destroys the input so we have to
           copy it. */
        uint8_t msgcopy[msglen];
        memcpy(msgcopy, msg, msglen);
        size = olm_group_decrypt_max_plaintext_length(inbound_session, msgcopy, msglen);
        uint8_t plaintext_buf[size];
    
        res = olm_group_decrypt(inbound_session, msg, msglen,
    
                                plaintext_buf, size, &message_index);
    
        assert_equals(plaintext_length, res);
        assert_equals(plaintext, plaintext_buf, res);
    
    {
        TestCase test_case("Invalid signature group message");
    
        uint8_t plaintext[] = "Message";
        size_t plaintext_length = sizeof(plaintext) - 1;
    
        uint8_t session_key[] =
    
            "AgAAAAAwMTIzNDU2Nzg5QUJERUYwMTIzNDU2Nzg5QUJDREVGMDEyMzQ1Njc4OUFCREVGM"
            "DEyMzQ1Njc4OUFCQ0RFRjAxMjM0NTY3ODlBQkRFRjAxMjM0NTY3ODlBQkNERUYwMTIzND"
            "U2Nzg5QUJERUYwMTIzNDU2Nzg5QUJDREVGMDEyMztqJ7zOtqQtYqOo0CpvDXNlMhV3HeJ"
            "DpjrASKGLWdop4lx1cSN3Xv1TgfLPW8rhGiW+hHiMxd36nRuxscNv9k4oJA/KP+o0mi1w"
            "v44StrEJ1wwx9WZHBUIWkQbaBSuBDw";
    
    
        uint8_t message[] =
    
            "AwgAEhAcbh6UpbByoyZxufQ+h2B+8XHMjhR69G8nP4pNZGl/3QMgrzCZPmP+F2aPLyKPz"
            "xRPBMUkeXRJ6Iqm5NeOdx2eERgTW7P20CM+lL3Xpk+ZUOOPvsSQNaAL";
    
        size_t msglen = sizeof(message)-1;
    
        /* build the inbound session */
        size_t size = olm_inbound_group_session_size();
        uint8_t inbound_session_memory[size];
        OlmInboundGroupSession *inbound_session =
            olm_inbound_group_session(inbound_session_memory);
    
        size_t res = olm_init_inbound_group_session(
    
        );
        assert_equals((size_t)0, res);
    
        /* decode the message */
    
        /* olm_group_decrypt_max_plaintext_length destroys the input so we have to
           copy it. */
        uint8_t msgcopy[msglen];
        memcpy(msgcopy, message, msglen);
        size = olm_group_decrypt_max_plaintext_length(
            inbound_session, msgcopy, msglen
        );
    
        memcpy(msgcopy, message, msglen);
        uint8_t plaintext_buf[size];
    
        res = olm_group_decrypt(
    
            inbound_session, msgcopy, msglen, plaintext_buf, size, &message_index
    
        );
        assert_equals(plaintext_length, res);
        assert_equals(plaintext, plaintext_buf, res);
    
        /* now twiddle the signature */
        message[msglen-1] = 'E';
        memcpy(msgcopy, message, msglen);
        assert_equals(
            size,
            olm_group_decrypt_max_plaintext_length(
                inbound_session, msgcopy, msglen
            )
        );
    
        memcpy(msgcopy, message, msglen);
        res = olm_group_decrypt(
            inbound_session, msgcopy, msglen,
    
            plaintext_buf, size, &message_index
    
        );
        assert_equals((size_t)-1, res);
        assert_equals(
            std::string("BAD_SIGNATURE"),
            std::string(olm_inbound_group_session_last_error(inbound_session))
        );
    }