Annotation of embedaddon/iperf/src/t_auth.c, revision 1.1

1.1     ! misho       1: /*
        !             2:  * iperf, Copyright (c) 2020, The Regents of the University of
        !             3:  * California, through Lawrence Berkeley National Laboratory (subject
        !             4:  * to receipt of any required approvals from the U.S. Dept. of
        !             5:  * Energy).  All rights reserved.
        !             6:  *
        !             7:  * If you have questions about your rights to use or distribute this
        !             8:  * software, please contact Berkeley Lab's Technology Transfer
        !             9:  * Department at TTD@lbl.gov.
        !            10:  *
        !            11:  * NOTICE.  This software is owned by the U.S. Department of Energy.
        !            12:  * As such, the U.S. Government has been granted for itself and others
        !            13:  * acting on its behalf a paid-up, nonexclusive, irrevocable,
        !            14:  * worldwide license in the Software to reproduce, prepare derivative
        !            15:  * works, and perform publicly and display publicly.  Beginning five
        !            16:  * (5) years after the date permission to assert copyright is obtained
        !            17:  * from the U.S. Department of Energy, and subject to any subsequent
        !            18:  * five (5) year renewals, the U.S. Government is granted for itself
        !            19:  * and others acting on its behalf a paid-up, nonexclusive,
        !            20:  * irrevocable, worldwide license in the Software to reproduce,
        !            21:  * prepare derivative works, distribute copies to the public, perform
        !            22:  * publicly and display publicly, and to permit others to do so.
        !            23:  *
        !            24:  * This code is distributed under a BSD style license, see the LICENSE
        !            25:  * file for complete information.
        !            26:  */
        !            27: #include "iperf_config.h"
        !            28: 
        !            29: #include <assert.h>
        !            30: #ifdef HAVE_STDINT_H
        !            31: #include <stdint.h>
        !            32: #endif
        !            33: #include <stdio.h>
        !            34: #include <string.h>
        !            35: 
        !            36: #include "iperf.h"
        !            37: #include "iperf_api.h"
        !            38: #if defined(HAVE_SSL)
        !            39: #include "iperf_auth.h"
        !            40: #endif /* HAVE_SSL */
        !            41: 
        !            42: #include "version.h"
        !            43: 
        !            44: #include "units.h"
        !            45: 
        !            46: #if defined(HAVE_SSL)
        !            47: int test_authtoken(const char *authUser, const char *authPassword, EVP_PKEY *pubkey, EVP_PKEY *privkey);
        !            48: 
        !            49: int
        !            50: main(int argc, char **argv)
        !            51: {
        !            52:     /* sha256 */
        !            53:     void sha256(const char *string, char outputBuffer[65]);
        !            54:     const char sha256String[] = "This is a SHA256 test.";
        !            55:     const char sha256Digest[] = "4816482f8b4149f687a1a33d61a0de6b611364ec0fb7adffa59ff2af672f7232"; /* echo -n "This is a SHA256 test." | shasum -a256 */
        !            56:     char sha256Output[65];
        !            57:     
        !            58:     sha256(sha256String, sha256Output);
        !            59:     assert(strcmp(sha256Output, sha256Digest) == 0);
        !            60: 
        !            61:     /* Base64{Encode,Decode} */
        !            62:     int Base64Encode(const unsigned char* buffer, const size_t length, char** b64text);
        !            63:     int Base64Decode(const char* b64message, unsigned char** buffer, size_t* length);
        !            64:     const char base64String[] = "This is a Base64 test.";
        !            65:     char *base64Text;
        !            66:     char *base64Decode;
        !            67:     size_t base64DecodeLength;
        !            68:     const char base64EncodeCheck[] = "VGhpcyBpcyBhIEJhc2U2NCB0ZXN0Lg=="; /* echo -n "This is a Base64 test." | b64encode -r - */
        !            69: 
        !            70:     assert(Base64Encode((unsigned char *) base64String, strlen(base64String), &base64Text) == 0);
        !            71:     assert(strcmp(base64Text, base64EncodeCheck) == 0);
        !            72:     assert(Base64Decode(base64Text, (unsigned char **) &base64Decode, &base64DecodeLength) == 0);
        !            73:     assert(strcmp(base64String, base64Decode) == 0);
        !            74: 
        !            75:     /* public/private key tests */
        !            76:     const char *pubkeyfile = "public.pem";
        !            77:     const char *privkeyfile = "private.pem";
        !            78: 
        !            79:     /* built-in tests */
        !            80:     assert(test_load_pubkey_from_file(pubkeyfile) == 0);
        !            81:     assert(test_load_private_key_from_file(privkeyfile) == 0);
        !            82: 
        !            83:     /* load public key pair for use in further tests */
        !            84:     EVP_PKEY *pubkey, *privkey;
        !            85:     pubkey = load_pubkey_from_file(pubkeyfile);
        !            86:     assert(pubkey);
        !            87:     privkey = load_privkey_from_file(privkeyfile);
        !            88:     assert(privkey);
        !            89: 
        !            90:     /* authentication token tests */
        !            91:     assert(test_authtoken("kilroy", "fubar", pubkey, privkey) == 0);
        !            92: 
        !            93:     /* This should fail because the data is way too long for the RSA key */
        !            94:     /* assert(test_authtoken("kilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroykilroy", "fubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubarfubar", pubkey, privkey) < 0); */
        !            95: 
        !            96:     return 0;
        !            97: }
        !            98: 
        !            99: int
        !           100: test_authtoken(const char *authUser, const char *authPassword, EVP_PKEY *pubkey, EVP_PKEY *privkey) {
        !           101:     char *authToken;
        !           102:     char *decodeUser;
        !           103:     char *decodePassword;
        !           104:     time_t decodeTime;
        !           105: 
        !           106:     assert(encode_auth_setting(authUser, authPassword, pubkey, &authToken) == 0);
        !           107:     assert(decode_auth_setting(0, authToken, privkey, &decodeUser, &decodePassword, &decodeTime) == 0);
        !           108: 
        !           109:     assert(strcmp(decodeUser, authUser) == 0);
        !           110:     assert(strcmp(decodePassword, authPassword) == 0);
        !           111: 
        !           112:     time_t now = time(NULL);
        !           113: 
        !           114:     assert(now - decodeTime >= 0); /* time has to go forwards */
        !           115:     assert(now - decodeTime <= 1); /* shouldn't take more than a second to run */
        !           116: 
        !           117:     return 0;
        !           118: }
        !           119: #else
        !           120: int
        !           121: main(int argc, char **argv)
        !           122: {
        !           123:     return 0;
        !           124: }
        !           125: #endif /* HAVE_SSL */

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>