2018-03-26 16:07:04 +02:00
|
|
|
//
|
2022-01-01 01:35:39 +01:00
|
|
|
// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2022
|
2018-03-26 16:07:04 +02:00
|
|
|
//
|
|
|
|
// Distributed under the Boost Software License, Version 1.0. (See accompanying
|
|
|
|
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
|
|
|
//
|
2020-08-13 15:57:28 +02:00
|
|
|
#include "td/telegram/SecureStorage.h"
|
|
|
|
|
2018-03-26 20:16:38 +02:00
|
|
|
#include "td/utils/buffer.h"
|
2018-03-26 16:07:04 +02:00
|
|
|
#include "td/utils/filesystem.h"
|
|
|
|
#include "td/utils/port/path.h"
|
2021-05-17 14:21:11 +02:00
|
|
|
#include "td/utils/SliceBuilder.h"
|
2018-03-26 20:16:38 +02:00
|
|
|
#include "td/utils/tests.h"
|
2018-03-26 16:07:04 +02:00
|
|
|
|
|
|
|
using namespace td;
|
|
|
|
|
|
|
|
TEST(SecureStorage, secret) {
|
|
|
|
using namespace td::secure_storage;
|
|
|
|
auto secret = Secret::create_new();
|
|
|
|
std::string key = "cucumber";
|
2018-08-04 08:55:49 +02:00
|
|
|
auto encrypted_secret = secret.encrypt(key, "", secure_storage::EnryptionAlgorithm::Sha512);
|
2018-03-26 16:07:04 +02:00
|
|
|
ASSERT_TRUE(encrypted_secret.as_slice() != secret.as_slice());
|
2018-08-04 08:55:49 +02:00
|
|
|
auto decrypted_secret = encrypted_secret.decrypt(key, "", secure_storage::EnryptionAlgorithm::Sha512).ok();
|
2018-03-26 16:07:04 +02:00
|
|
|
ASSERT_TRUE(secret.as_slice() == decrypted_secret.as_slice());
|
2018-08-04 08:55:49 +02:00
|
|
|
ASSERT_TRUE(encrypted_secret.decrypt("notcucumber", "", secure_storage::EnryptionAlgorithm::Sha512).is_error());
|
2018-03-26 16:07:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(SecureStorage, simple) {
|
|
|
|
using namespace td::secure_storage;
|
|
|
|
|
|
|
|
BufferSlice value("Small tale about cucumbers");
|
|
|
|
auto value_secret = Secret::create_new();
|
|
|
|
|
2018-03-26 20:14:15 +02:00
|
|
|
{
|
2018-08-28 00:08:51 +02:00
|
|
|
BufferSliceDataView value_view(value.copy());
|
2018-03-26 20:14:15 +02:00
|
|
|
BufferSlice prefix = gen_random_prefix(value_view.size());
|
2018-08-28 00:08:51 +02:00
|
|
|
BufferSliceDataView prefix_view(std::move(prefix));
|
|
|
|
ConcatDataView full_value_view(prefix_view, value_view);
|
2018-03-26 20:14:15 +02:00
|
|
|
auto hash = calc_value_hash(full_value_view).move_as_ok();
|
2018-03-26 16:07:04 +02:00
|
|
|
|
2018-08-04 08:55:49 +02:00
|
|
|
Encryptor encryptor(calc_aes_cbc_state_sha512(PSLICE() << value_secret.as_slice() << hash.as_slice()),
|
|
|
|
full_value_view);
|
2018-03-26 20:14:15 +02:00
|
|
|
auto encrypted_value = encryptor.pread(0, encryptor.size()).move_as_ok();
|
2018-03-26 16:07:04 +02:00
|
|
|
|
2018-08-04 08:55:49 +02:00
|
|
|
Decryptor decryptor(calc_aes_cbc_state_sha512(PSLICE() << value_secret.as_slice() << hash.as_slice()));
|
2018-03-26 20:14:15 +02:00
|
|
|
auto res = decryptor.append(encrypted_value.copy()).move_as_ok();
|
|
|
|
auto decrypted_hash = decryptor.finish().ok();
|
|
|
|
ASSERT_TRUE(decrypted_hash.as_slice() == hash.as_slice());
|
|
|
|
ASSERT_TRUE(res.as_slice() == value.as_slice());
|
|
|
|
}
|
2018-03-26 16:07:04 +02:00
|
|
|
|
|
|
|
{
|
|
|
|
auto encrypted_value = encrypt_value(value_secret, value.as_slice()).move_as_ok();
|
|
|
|
auto decrypted_value =
|
|
|
|
decrypt_value(value_secret, encrypted_value.hash, encrypted_value.data.as_slice()).move_as_ok();
|
|
|
|
ASSERT_TRUE(decrypted_value.as_slice() == value.as_slice());
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
std::string value_path = "value.txt";
|
|
|
|
std::string encrypted_path = "encrypted.txt";
|
|
|
|
std::string decrypted_path = "decrypted.txt";
|
|
|
|
td::unlink(value_path).ignore();
|
|
|
|
td::unlink(encrypted_path).ignore();
|
|
|
|
td::unlink(decrypted_path).ignore();
|
2018-03-26 22:20:56 +02:00
|
|
|
std::string file_value(100000, 'a');
|
2018-10-26 16:11:20 +02:00
|
|
|
td::write_file(value_path, file_value).ensure();
|
2018-03-26 16:07:04 +02:00
|
|
|
auto hash = encrypt_file(value_secret, value_path, encrypted_path).move_as_ok();
|
|
|
|
decrypt_file(value_secret, hash, encrypted_path, decrypted_path).ensure();
|
2018-03-26 22:20:56 +02:00
|
|
|
ASSERT_TRUE(td::read_file(decrypted_path).move_as_ok().as_slice() == file_value);
|
2018-03-26 16:07:04 +02:00
|
|
|
}
|
|
|
|
}
|