twisterp2pblockchainnetworkbittorrentipv6microbloggingsocial-networkdhtdecentralizedtwister-coretwisterarmyp2p-networktwister-servertwister-ipv6
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
228 lines
6.8 KiB
228 lines
6.8 KiB
/* |
|
|
|
Copyright (c) 2007, Un Shyam |
|
All rights reserved. |
|
|
|
Redistribution and use in source and binary forms, with or without |
|
modification, are permitted provided that the following conditions |
|
are met: |
|
|
|
* Redistributions of source code must retain the above copyright |
|
notice, this list of conditions and the following disclaimer. |
|
* Redistributions in binary form must reproduce the above copyright |
|
notice, this list of conditions and the following disclaimer in |
|
the documentation and/or other materials provided with the distribution. |
|
* Neither the name of the author nor the names of its |
|
contributors may be used to endorse or promote products derived |
|
from this software without specific prior written permission. |
|
|
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
|
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE |
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
|
POSSIBILITY OF SUCH DAMAGE. |
|
|
|
*/ |
|
|
|
#include <algorithm> |
|
#include <iostream> |
|
|
|
#include "libtorrent/hasher.hpp" |
|
#include "libtorrent/pe_crypto.hpp" |
|
#include "libtorrent/session.hpp" |
|
|
|
#include "setup_transfer.hpp" |
|
#include "test.hpp" |
|
|
|
#ifndef TORRENT_DISABLE_ENCRYPTION |
|
|
|
char const* pe_policy(libtorrent::pe_settings::enc_policy policy) |
|
{ |
|
using namespace libtorrent; |
|
|
|
if (policy == pe_settings::disabled) return "disabled"; |
|
else if (policy == pe_settings::enabled) return "enabled"; |
|
else if (policy == pe_settings::forced) return "forced"; |
|
return "unknown"; |
|
} |
|
|
|
void display_pe_settings(libtorrent::pe_settings s) |
|
{ |
|
using namespace libtorrent; |
|
|
|
fprintf(stderr, "out_enc_policy - %s\tin_enc_policy - %s\n" |
|
, pe_policy(s.out_enc_policy), pe_policy(s.in_enc_policy)); |
|
|
|
fprintf(stderr, "enc_level - %s\t\tprefer_rc4 - %s\n" |
|
, s.allowed_enc_level == pe_settings::plaintext ? "plaintext" |
|
: s.allowed_enc_level == pe_settings::rc4 ? "rc4" |
|
: s.allowed_enc_level == pe_settings::both ? "both" : "unknown" |
|
, s.prefer_rc4 ? "true": "false"); |
|
} |
|
|
|
void test_transfer(libtorrent::pe_settings::enc_policy policy, |
|
libtorrent::pe_settings::enc_level level = libtorrent::pe_settings::both, |
|
bool pref_rc4 = false, bool encrypted_torrent = false) |
|
{ |
|
using namespace libtorrent; |
|
|
|
session ses1(fingerprint("LT", 0, 1, 0, 0), std::make_pair(48800, 49000), "0.0.0.0", 0); |
|
session ses2(fingerprint("LT", 0, 1, 0, 0), std::make_pair(49800, 50000), "0.0.0.0", 0); |
|
pe_settings s; |
|
|
|
s.out_enc_policy = libtorrent::pe_settings::enabled; |
|
s.in_enc_policy = libtorrent::pe_settings::enabled; |
|
|
|
s.allowed_enc_level = pe_settings::both; |
|
ses2.set_pe_settings(s); |
|
|
|
s.out_enc_policy = policy; |
|
s.in_enc_policy = policy; |
|
s.allowed_enc_level = level; |
|
s.prefer_rc4 = pref_rc4; |
|
ses1.set_pe_settings(s); |
|
|
|
s = ses1.get_pe_settings(); |
|
fprintf(stderr, " Session1 \n"); |
|
display_pe_settings(s); |
|
s = ses2.get_pe_settings(); |
|
fprintf(stderr, " Session2 \n"); |
|
display_pe_settings(s); |
|
|
|
torrent_handle tor1; |
|
torrent_handle tor2; |
|
|
|
using boost::tuples::ignore; |
|
boost::tie(tor1, tor2, ignore) = setup_transfer(&ses1, &ses2, 0, true, false, true |
|
, "_pe", 16 * 1024, 0, false, 0, true, encrypted_torrent); |
|
|
|
fprintf(stderr, "waiting for transfer to complete\n"); |
|
|
|
for (int i = 0; i < 50; ++i) |
|
{ |
|
torrent_status s = tor2.status(); |
|
print_alerts(ses1, "ses1"); |
|
print_alerts(ses2, "ses2"); |
|
|
|
if (s.is_seeding) break; |
|
test_sleep(1000); |
|
} |
|
|
|
TEST_CHECK(tor2.status().is_seeding); |
|
if (tor2.status().is_seeding) fprintf(stderr, "done\n"); |
|
ses1.remove_torrent(tor1); |
|
ses2.remove_torrent(tor2); |
|
|
|
error_code ec; |
|
remove_all("tmp1_pe", ec); |
|
remove_all("tmp2_pe", ec); |
|
remove_all("tmp3_pe", ec); |
|
} |
|
|
|
void test_enc_handler(libtorrent::encryption_handler* a, libtorrent::encryption_handler* b) |
|
{ |
|
int repcount = 128; |
|
for (int rep = 0; rep < repcount; ++rep) |
|
{ |
|
std::size_t buf_len = rand() % (512 * 1024); |
|
char* buf = new char[buf_len]; |
|
char* cmp_buf = new char[buf_len]; |
|
|
|
std::generate(buf, buf + buf_len, &std::rand); |
|
std::memcpy(cmp_buf, buf, buf_len); |
|
|
|
a->encrypt(buf, buf_len); |
|
TEST_CHECK(!std::equal(buf, buf + buf_len, cmp_buf)); |
|
b->decrypt(buf, buf_len); |
|
TEST_CHECK(std::equal(buf, buf + buf_len, cmp_buf)); |
|
|
|
b->encrypt(buf, buf_len); |
|
TEST_CHECK(!std::equal(buf, buf + buf_len, cmp_buf)); |
|
a->decrypt(buf, buf_len); |
|
TEST_CHECK(std::equal(buf, buf + buf_len, cmp_buf)); |
|
|
|
delete[] buf; |
|
delete[] cmp_buf; |
|
} |
|
} |
|
|
|
int test_main() |
|
{ |
|
using namespace libtorrent; |
|
int repcount = 128; |
|
|
|
for (int rep = 0; rep < repcount; ++rep) |
|
{ |
|
dh_key_exchange DH1, DH2; |
|
|
|
DH1.compute_secret(DH2.get_local_key()); |
|
DH2.compute_secret(DH1.get_local_key()); |
|
|
|
TEST_CHECK(std::equal(DH1.get_secret(), DH1.get_secret() + 96, DH2.get_secret())); |
|
} |
|
|
|
dh_key_exchange DH1, DH2; |
|
DH1.compute_secret(DH2.get_local_key()); |
|
DH2.compute_secret(DH1.get_local_key()); |
|
|
|
TEST_CHECK(std::equal(DH1.get_secret(), DH1.get_secret() + 96, DH2.get_secret())); |
|
|
|
sha1_hash test1_key = hasher("test1_key",8).final(); |
|
sha1_hash test2_key = hasher("test2_key",8).final(); |
|
|
|
fprintf(stderr, "testing RC4 handler\n"); |
|
rc4_handler rc41; |
|
rc41.set_incoming_key(&test2_key[0], 20); |
|
rc41.set_outgoing_key(&test1_key[0], 20); |
|
rc4_handler rc42; |
|
rc42.set_incoming_key(&test1_key[0], 20); |
|
rc42.set_outgoing_key(&test2_key[0], 20); |
|
test_enc_handler(&rc41, &rc42); |
|
|
|
#ifdef TORRENT_USE_OPENSSL |
|
fprintf(stderr, "testing AES-256 handler\n"); |
|
char key1[32]; |
|
std::generate(key1, key1 + 32, &std::rand); |
|
aes256_handler aes1; |
|
aes1.set_incoming_key((const unsigned char*)key1, 32); |
|
aes256_handler aes2; |
|
aes2.set_incoming_key((const unsigned char*)key1, 32); |
|
test_enc_handler(&aes1, &aes2); |
|
#endif |
|
|
|
test_transfer(pe_settings::enabled, pe_settings::both, false, true); |
|
test_transfer(pe_settings::enabled, pe_settings::both, true, true); |
|
|
|
return 0; |
|
|
|
test_transfer(pe_settings::disabled); |
|
|
|
test_transfer(pe_settings::forced, pe_settings::plaintext); |
|
test_transfer(pe_settings::forced, pe_settings::rc4); |
|
test_transfer(pe_settings::forced, pe_settings::both, false); |
|
test_transfer(pe_settings::forced, pe_settings::both, true); |
|
|
|
test_transfer(pe_settings::enabled, pe_settings::plaintext); |
|
test_transfer(pe_settings::enabled, pe_settings::rc4); |
|
test_transfer(pe_settings::enabled, pe_settings::both, false); |
|
test_transfer(pe_settings::enabled, pe_settings::both, true); |
|
|
|
return 0; |
|
} |
|
|
|
#else |
|
|
|
int test_main() |
|
{ |
|
fprintf(stderr, "PE test not run because it's disabled\n"); |
|
return 0; |
|
} |
|
|
|
#endif |
|
|
|
|