RetroShare/libretroshare/src/tests/pgp/test_pgp_handler.cc
csoler aba5033604 - added argstream to handle commandline arguments
- switched tests to use the common value of argstream in libretroshare, rather than the one in tests/common
- reworked command line arguments in rsinit and retroshare-nogui.
- improved passwd hash explanations
- improved command-line help.



git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@6559 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2013-08-06 17:01:38 +00:00

397 lines
12 KiB
C++

// COMPILE_LINE: g++ -o test_pgp_handler test_pgp_handler.cc -I../../../openpgpsdk/include -I../ -L../lib -lretroshare ../../../libbitdht/src/lib/libbitdht.a ../../../openpgpsdk/lib/libops.a -lgnome-keyring -lupnp -lssl -lcrypto -lbz2
//
#include <string.h>
#include <stdlib.h>
#include <iostream>
#include <pgp/pgphandler.h>
#include <util/utest.h>
#include <util/rsdir.h>
#include <util/argstream.h>
INITTEST() ;
static std::string static_passphrase = "" ;
static std::string passphrase_callback(void *data,const char *uid_info,const char *what,int prev_was_bad)
{
if(!static_passphrase.empty())
return static_passphrase ;
if(prev_was_bad)
std::cerr << "Bad passphrase." << std::endl;
std::string wt = std::string("Please enter passphrase for key id ") + uid_info + " :";
return std::string(getpass(wt.c_str())) ;
}
static std::string stringFromBytes(unsigned char *bytes,size_t len)
{
static const char out[16] = { '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F' } ;
std::string res ;
for(uint32_t j = 0; j < len; j++)
{
res += out[ (bytes[j]>>4) ] ;
res += out[ bytes[j] & 0xf ] ;
}
return res ;
}
static std::string askForKeyId(PGPHandler& pgph)
{
// 0 - print keys and key types
std::list<PGPIdType> lst ;
pgph.availableGPGCertificatesWithPrivateKeys(lst) ;
std::cerr << lst.size() << " available key pairs: " << std::endl;
int i=0 ;
for(std::list<PGPIdType>::const_iterator it(lst.begin());it!=lst.end();++it,++i)
{
std::cerr << "(" << i << ") ID=" << (*it).toStdString() << ", type = " ;
const PGPCertificateInfo *cert = pgph.getCertificateInfo(*it) ;
switch(cert->_type)
{
case PGPCertificateInfo::PGP_CERTIFICATE_TYPE_DSA: std::cerr << "DSA" << std::endl;
break ;
case PGPCertificateInfo::PGP_CERTIFICATE_TYPE_RSA: std::cerr << "RSA" << std::endl;
break ;
default: std::cerr << "Unknown" << std::endl;
}
}
if(i == 0)
throw std::runtime_error("No key pair available in supplied keyring.") ;
// 1 - ask for which key to use.
int num = -1 ;
while(true)
{
std::cerr << "Please enter selected key number (0 - " << i-1 << ") : " ;
std::cerr.flush() ;
char buf[10];
fgets(buf,10,stdin) ;
if(sscanf(buf,"%d",&num) == 1 && num >= 0 && num < i)
break ;
}
// 2 - return the id string.
std::list<PGPIdType>::const_iterator it(lst.begin()) ;
for(int i=0;i<num;++i,++it) ;
return (*it).toStdString() ;
}
int main(int argc,char *argv[])
{
argstream as(argc,argv) ;
bool test_pgpid_type = false ;
bool test_keyring_read = false ;
bool test_file_encryption = false ;
bool test_gen_key = false ;
bool test_output = false ;
bool test_signature = false ;
bool test_passphrase_callback = false ;
bool full_test = false ;
bool test_memory_encryption = false ;
std::string key_id_string = "" ;
std::string secring_file = "" ;
std::string pubring_file = "" ;
std::string file_to_encrypt = "" ;
as >> option('1',"pgptype",test_pgpid_type,"Test pgp ID type")
>> option('2',"keyring-read",test_keyring_read,"Test keyring read")
>> option('3',"file-encryption",test_file_encryption,"Test file encryption. Needs -f, -i, -p and -s")
>> option('4',"keygen",test_gen_key,"Test key generation.")
>> option('5',"signature",test_signature,"Test signature.")
>> option('6',"output",test_output,"Test output.")
>> option('7',"memory-encryption",test_memory_encryption,"Test output.")
>> option('F',"fulltest",full_test,"Test everything.")
>> parameter('f',"file",file_to_encrypt,"File to encrypt. Used with -3",false)
>> parameter('p',"pubring",pubring_file,"Public keyring file.",false)
>> parameter('s',"secring",secring_file,"Secret keyring file.",false)
>> parameter('i',"keyid",key_id_string,"Key id to use. If not supplied, will be asked.",false)
>> help() ;
as.defaultErrorHandling() ;
if(!full_test)
if(test_pgpid_type + test_keyring_read + test_file_encryption + test_gen_key + test_signature + test_output + test_memory_encryption != 1)
{
std::cerr << "Options 1 to 6 are mutually exclusive." << std::endl;
return 1;
}
if(full_test || test_pgpid_type)
{
// test pgp ids.
//
std::string st("3e5b22140ef56abb") ;
PGPIdType id = PGPIdType(std::string(st)) ;
//std::cerr << "Id is : " << std::hex << id.toUInt64() << std::endl;
std::cerr << "Id st : " << id.toStdString() << std::endl;
CHECK(id.toStdString(false) == st) ;
}
// test PGPHandler
//
// 0 - init
std::string pubring = pubring_file.empty()?"pubring.gpg":pubring_file ;
std::string secring = secring_file.empty()?"secring.gpg":secring_file ;
static const std::string trustdb = "trustdb.gpg" ;
static const std::string lockfile = "lock" ;
PGPHandler::setPassphraseCallback(&passphrase_callback) ;
PGPHandler pgph(pubring,secring,trustdb,lockfile) ;
std::string email_str("test@gmail.com") ;
std::string name_str("test") ;
std::string passw_str("test00") ;
PGPIdType cert_id ; ;
if(full_test || test_gen_key)
{
std::cerr << "Now generating a new PGP certificate: " << std::endl;
std::cerr << " email: " << email_str << std::endl;
std::cerr << " passw: " << passw_str << std::endl;
std::cerr << " name : " << name_str << std::endl;
PGPIdType newid ;
std::string errString ;
static_passphrase = passw_str ;
bool res = pgph.GeneratePGPCertificate(name_str, email_str, passw_str, newid, errString) ;
cert_id = newid ;
CHECK(res) ;
if(!res)
std::cerr << "Generation of certificate returned error: " << errString << std::endl;
else
std::cerr << "Certificate generation success. New id = " << newid.toStdString() << std::endl;
}
if(full_test)
key_id_string = cert_id.toStdString(true) ;
if(full_test || test_keyring_read)
{
pgph.printKeys() ;
std::cerr << std::endl ;
std::cerr << std::endl ;
std::cerr << "Looking for keys with complete secret/public key pair: " << std::endl;
std::list<PGPIdType> lst ;
pgph.availableGPGCertificatesWithPrivateKeys(lst) ;
bool found = false ;
for(std::list<PGPIdType>::const_iterator it(lst.begin());it!=lst.end();++it)
{
std::cerr << "Found id : " << (*it).toStdString() << std::endl;
if(cert_id == *it)
found = true ;
}
CHECK(found) ;
}
if(full_test || test_output)
{
PGPIdType id2( (key_id_string.empty())?askForKeyId(pgph):key_id_string) ;
std::cerr << "Now extracting key " << id2.toStdString() << " from keyring:" << std::endl ;
std::string cert = pgph.SaveCertificateToString(id2,false) ;
std::cerr << "Now, trying to re-read this cert from the string:" << std::endl;
PGPIdType id3 ;
std::string error_string ;
pgph.LoadCertificateFromString(cert,id3,error_string) ;
std::cerr << "Loaded cert id: " << id3.toStdString() << ", Error string=\"" << error_string << "\"" << std::endl;
CHECK(id3 == id2) ;
std::cerr << cert << std::endl;
}
if(test_passphrase_callback)
{
std::cerr << "Testing password callback: " << std::endl;
std::string newid = "XXXXXXXXXXXXXXXX" ;
std::string pass = passphrase_callback(NULL,newid.c_str(),"Please enter password: ",false) ;
std::cerr << "Password = \"" << pass << "\"" << std::endl;
}
if(full_test || test_signature)
{
if(key_id_string.empty())
key_id_string = askForKeyId(pgph) ;
PGPIdType key_id(key_id_string) ;
std::cerr << "Testing signature with keypair " << key_id_string << std::endl;
static const size_t BUFF_LEN = 25 ;
unsigned char *test_bin = new unsigned char[BUFF_LEN] ;
for(size_t i=0;i<BUFF_LEN;++i)
test_bin[i] = rand()%26 + 'a' ;
std::cerr << "Text = \"" << std::string((char *)test_bin,BUFF_LEN) << "\"" << std::endl;
unsigned char sign[1000] ;
uint32_t signlen = 1000 ;
bool res = pgph.SignDataBin(key_id,test_bin,BUFF_LEN,sign,&signlen) ;
CHECK(res) ;
if(!res)
std::cerr << "Signature error." << std::endl;
else
std::cerr << "Signature success." << std::endl;
std::cerr << "Signature length: " << signlen << std::endl;
std::cerr << "Signature: " << stringFromBytes(sign,signlen) << std::endl;
std::cerr << "Now verifying signature..." << std::endl;
PGPFingerprintType fingerprint ;
res = pgph.getKeyFingerprint(key_id,fingerprint);
CHECK(res) ;
if(!res)
std::cerr << "Cannot find fingerprint of key id " << key_id.toStdString() << std::endl;
res = pgph.VerifySignBin(test_bin,BUFF_LEN,sign,signlen,fingerprint) ;
CHECK(res) ;
if(!res)
std::cerr << "Signature verification failed." << std::endl;
else
std::cerr << "Signature verification worked!" << std::endl;
delete[] test_bin ;
}
if(full_test || test_file_encryption)
{
if(key_id_string.empty())
key_id_string = askForKeyId(pgph) ;
PGPIdType key_id(key_id_string) ;
std::string outfile = "crypted_toto.pgp" ;
std::string text_to_encrypt = "this is a secret message" ;
std::string text = "fhdsjfhskfhdsjhfskhfkdsfskfhsdhdsj" ;
for(int i=0;i<2;++i)
text_to_encrypt += text ;
std::cerr << "Checking encrypted file creation: streaming chain \"" << text_to_encrypt << "\" to file " << outfile << " with key " << key_id.toStdString() << std::endl;
bool res = pgph.encryptTextToFile(key_id,text_to_encrypt,outfile) ;
CHECK(res) ;
if(!res)
std::cerr << "Encryption failed" << std::endl;
else
std::cerr << "Encryption success" << std::endl;
std::string decrypted_text = "" ;
outfile = "crypted_toto.pgp" ;
res = pgph.decryptTextFromFile(key_id,decrypted_text,outfile) ;
CHECK(res) ;
if(!res)
std::cerr << "Decryption failed" << std::endl;
else
std::cerr << "Decryption success" << std::endl;
std::cerr << "Decrypted text: \"" << decrypted_text << "\"" << std::endl;
CHECK(decrypted_text == text_to_encrypt) ;
}
if(full_test || test_memory_encryption)
{
if(key_id_string.empty())
key_id_string = askForKeyId(pgph) ;
static const int MEM_TO_ENCRYPT_SIZE = 20000 ;
PGPIdType key_id(key_id_string) ;
unsigned char *memory_to_encrypt = new unsigned char[MEM_TO_ENCRYPT_SIZE] ;
RSRandom::random_bytes(memory_to_encrypt,MEM_TO_ENCRYPT_SIZE) ;
Sha1CheckSum original_sha1 = RsDirUtil::sha1sum(memory_to_encrypt,MEM_TO_ENCRYPT_SIZE) ;
std::cerr << "Checking encrypted memory block creation:" << std::endl;
std::cerr << " mem block size = " << MEM_TO_ENCRYPT_SIZE << std::endl;
std::cerr << " mem block hash = " << original_sha1.toStdString() << std::endl;
uint32_t encrypted_mem_size = MEM_TO_ENCRYPT_SIZE + 1000 ;
unsigned char *encrypted_mem_block = new unsigned char[encrypted_mem_size] ;
bool res = pgph.encryptDataBin(key_id,memory_to_encrypt,MEM_TO_ENCRYPT_SIZE,encrypted_mem_block,&encrypted_mem_size) ;
CHECK(res) ;
// dump to a file
FILE *f = fopen("crypted_toto.bin","w") ;
fwrite(encrypted_mem_block,encrypted_mem_size,1,f) ;
fclose(f) ;
if(!res)
std::cerr << "Encryption failed" << std::endl;
else
std::cerr << "Encryption success" << std::endl;
std::cerr << "Encryption done: size = " << encrypted_mem_size << std::endl;
std::cerr << "Now testing decryption of the same block." << std::endl;
uint32_t decrypted_mem_size = encrypted_mem_size + 1000 ;
unsigned char *decrypted_mem = new unsigned char[decrypted_mem_size] ;
res = pgph.decryptDataBin(key_id,encrypted_mem_block,encrypted_mem_size,decrypted_mem,&decrypted_mem_size) ;
CHECK(res) ;
if(res && decrypted_mem_size == MEM_TO_ENCRYPT_SIZE)
std::cerr << "Decryption success" << std::endl;
else
std::cerr << "Decryption failed" << std::endl;
Sha1CheckSum decrypted_sha1 = RsDirUtil::sha1sum(decrypted_mem,decrypted_mem_size) ;
std::cerr << "Decrypted size: " << decrypted_mem_size << std::endl;
std::cerr << "Decrypted hash: " << decrypted_sha1.toStdString() << std::endl;
CHECK(original_sha1 == decrypted_sha1) ;
}
FINALREPORT("PGP Handler test") ;
return TESTRESULT() ;
}