2016-05-17 12:52:06 +02:00
|
|
|
/* Copyright 2016 OpenMarket Ltd
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2016-05-18 18:23:09 +02:00
|
|
|
#include "olm/inbound_group_session.h"
|
2016-05-17 12:52:06 +02:00
|
|
|
#include "olm/outbound_group_session.h"
|
2021-12-22 19:45:33 +01:00
|
|
|
#include "testing.hh"
|
2021-07-15 15:06:14 +02:00
|
|
|
#include "utils.hh"
|
2016-05-17 12:52:06 +02:00
|
|
|
|
2019-04-22 16:12:42 +02:00
|
|
|
#include <vector>
|
2016-05-17 12:52:06 +02:00
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
TEST_CASE("Pickle outbound group session") {
|
2016-05-17 19:53:00 +02:00
|
|
|
|
|
|
|
size_t size = olm_outbound_group_session_size();
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> memory(size);
|
|
|
|
OlmOutboundGroupSession *session = olm_outbound_group_session(memory.data());
|
2016-05-17 19:53:00 +02:00
|
|
|
|
|
|
|
size_t pickle_length = olm_pickle_outbound_group_session_length(session);
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> pickle1(pickle_length);
|
2016-10-24 11:06:06 +02:00
|
|
|
size_t res = olm_pickle_outbound_group_session(
|
2019-04-22 16:12:42 +02:00
|
|
|
session, "secret_key", 10, pickle1.data(), pickle_length
|
2016-10-24 11:06:06 +02:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(pickle_length, res);
|
2016-10-24 11:06:06 +02:00
|
|
|
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> pickle2(pickle1);
|
2016-05-17 19:53:00 +02:00
|
|
|
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> buffer2(size);
|
|
|
|
OlmOutboundGroupSession *session2 = olm_outbound_group_session(buffer2.data());
|
2016-10-24 11:06:06 +02:00
|
|
|
res = olm_unpickle_outbound_group_session(
|
2019-04-22 16:12:42 +02:00
|
|
|
session2, "secret_key", 10, pickle2.data(), pickle_length
|
2016-10-24 11:06:06 +02:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_NE((size_t)-1, res);
|
|
|
|
CHECK_EQ(pickle_length,
|
2016-05-17 19:53:00 +02:00
|
|
|
olm_pickle_outbound_group_session_length(session2));
|
2016-10-24 11:06:06 +02:00
|
|
|
res = olm_pickle_outbound_group_session(
|
2019-04-22 16:12:42 +02:00
|
|
|
session2, "secret_key", 10, pickle2.data(), pickle_length
|
2016-10-24 11:06:06 +02:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(pickle_length, res);
|
2016-05-17 19:53:00 +02:00
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ_SIZE(pickle1.data(), pickle2.data(), pickle_length);
|
2016-05-17 19:53:00 +02:00
|
|
|
|
2021-07-15 15:06:14 +02:00
|
|
|
/* Deliberately corrupt the pickled session by supplying a junk suffix and
|
|
|
|
* ensure this is caught as an error. */
|
|
|
|
const size_t junk_length = 1;
|
2021-11-17 20:18:03 +01:00
|
|
|
std::vector<std::uint8_t> junk_pickle(pickle_length + _olm_enc_output_length(junk_length));
|
2021-07-15 15:06:14 +02:00
|
|
|
|
|
|
|
olm_pickle_outbound_group_session(
|
|
|
|
session, "secret_key", 10, junk_pickle.data(), pickle_length
|
|
|
|
);
|
|
|
|
|
|
|
|
const size_t junk_pickle_length = add_junk_suffix_to_pickle(
|
|
|
|
"secret_key", 10,
|
|
|
|
junk_pickle.data(),
|
|
|
|
pickle_length,
|
|
|
|
junk_length);
|
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(std::size_t(-1),
|
2021-07-15 15:06:14 +02:00
|
|
|
olm_unpickle_outbound_group_session(
|
|
|
|
session,
|
|
|
|
"secret_key", 10,
|
|
|
|
junk_pickle.data(), junk_pickle_length
|
|
|
|
));
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(OLM_PICKLE_EXTRA_DATA,
|
2021-07-15 15:06:14 +02:00
|
|
|
olm_outbound_group_session_last_error_code(session));
|
|
|
|
}
|
2016-05-17 12:52:06 +02:00
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
TEST_CASE("Pickle inbound group session") {
|
2016-05-18 19:03:59 +02:00
|
|
|
|
|
|
|
size_t size = olm_inbound_group_session_size();
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> memory(size);
|
|
|
|
OlmInboundGroupSession *session = olm_inbound_group_session(memory.data());
|
2016-05-18 19:03:59 +02:00
|
|
|
|
|
|
|
size_t pickle_length = olm_pickle_inbound_group_session_length(session);
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> pickle1(pickle_length);
|
2016-10-24 11:06:06 +02:00
|
|
|
size_t res = olm_pickle_inbound_group_session(
|
2019-04-22 16:12:42 +02:00
|
|
|
session, "secret_key", 10, pickle1.data(), pickle_length
|
2016-10-24 11:06:06 +02:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(pickle_length, res);
|
2016-10-24 11:06:06 +02:00
|
|
|
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> pickle2(pickle1);
|
2016-05-18 19:03:59 +02:00
|
|
|
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> buffer2(size);
|
|
|
|
OlmInboundGroupSession *session2 = olm_inbound_group_session(buffer2.data());
|
2016-10-24 11:06:06 +02:00
|
|
|
res = olm_unpickle_inbound_group_session(
|
2019-04-22 16:12:42 +02:00
|
|
|
session2, "secret_key", 10, pickle2.data(), pickle_length
|
2016-10-24 11:06:06 +02:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_NE((size_t)-1, res);
|
|
|
|
CHECK_EQ(pickle_length,
|
2016-05-18 19:03:59 +02:00
|
|
|
olm_pickle_inbound_group_session_length(session2));
|
2016-10-24 11:06:06 +02:00
|
|
|
res = olm_pickle_inbound_group_session(
|
2019-04-22 16:12:42 +02:00
|
|
|
session2, "secret_key", 10, pickle2.data(), pickle_length
|
2016-10-24 11:06:06 +02:00
|
|
|
);
|
2016-05-18 19:03:59 +02:00
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ_SIZE(pickle1.data(), pickle2.data(), pickle_length);
|
2021-07-15 15:06:14 +02:00
|
|
|
|
|
|
|
/* Deliberately corrupt the pickled session by supplying a junk suffix and
|
|
|
|
* ensure this is caught as an error. */
|
|
|
|
const size_t junk_length = 1;
|
2021-11-17 20:18:03 +01:00
|
|
|
std::vector<std::uint8_t> junk_pickle(pickle_length + _olm_enc_output_length(junk_length));
|
2021-07-15 15:06:14 +02:00
|
|
|
|
|
|
|
olm_pickle_inbound_group_session(
|
|
|
|
session, "secret_key", 10, junk_pickle.data(), pickle_length
|
|
|
|
);
|
|
|
|
|
|
|
|
const size_t junk_pickle_length = add_junk_suffix_to_pickle(
|
|
|
|
"secret_key", 10,
|
|
|
|
junk_pickle.data(),
|
|
|
|
pickle_length,
|
|
|
|
junk_length);
|
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(std::size_t(-1),
|
2021-07-15 15:06:14 +02:00
|
|
|
olm_unpickle_inbound_group_session(
|
|
|
|
session,
|
|
|
|
"secret_key", 10,
|
|
|
|
junk_pickle.data(), junk_pickle_length
|
|
|
|
));
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(OLM_PICKLE_EXTRA_DATA,
|
2021-07-15 15:06:14 +02:00
|
|
|
olm_inbound_group_session_last_error_code(session));
|
2016-05-18 19:03:59 +02:00
|
|
|
}
|
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
TEST_CASE("Group message send/receive") {
|
2016-05-17 12:52:06 +02:00
|
|
|
|
2016-05-17 19:53:00 +02:00
|
|
|
uint8_t random_bytes[] =
|
|
|
|
"0123456789ABDEF0123456789ABCDEF"
|
|
|
|
"0123456789ABDEF0123456789ABCDEF"
|
|
|
|
"0123456789ABDEF0123456789ABCDEF"
|
|
|
|
"0123456789ABDEF0123456789ABCDEF"
|
2016-09-05 20:49:36 +02:00
|
|
|
"0123456789ABDEF0123456789ABCDEF"
|
2016-05-17 19:53:00 +02:00
|
|
|
"0123456789ABDEF0123456789ABCDEF";
|
|
|
|
|
|
|
|
|
2016-05-18 18:23:09 +02:00
|
|
|
/* build the outbound session */
|
2016-05-17 12:52:06 +02:00
|
|
|
size_t size = olm_outbound_group_session_size();
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> memory(size);
|
|
|
|
OlmOutboundGroupSession *session = olm_outbound_group_session(memory.data());
|
2016-05-17 12:52:06 +02:00
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ((size_t)160,
|
2016-05-17 12:52:06 +02:00
|
|
|
olm_init_outbound_group_session_random_length(session));
|
|
|
|
|
|
|
|
size_t res = olm_init_outbound_group_session(
|
|
|
|
session, random_bytes, sizeof(random_bytes));
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ((size_t)0, res);
|
2016-05-17 12:52:06 +02:00
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(0U, olm_outbound_group_session_message_index(session));
|
2016-05-18 18:23:09 +02:00
|
|
|
size_t session_key_len = olm_outbound_group_session_key_length(session);
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> session_key(session_key_len);
|
|
|
|
olm_outbound_group_session_key(session, session_key.data(), session_key_len);
|
2016-05-18 18:23:09 +02:00
|
|
|
|
|
|
|
/* encode the message */
|
2016-05-17 12:52:06 +02:00
|
|
|
uint8_t plaintext[] = "Message";
|
|
|
|
size_t plaintext_length = sizeof(plaintext) - 1;
|
|
|
|
|
|
|
|
size_t msglen = olm_group_encrypt_message_length(
|
|
|
|
session, plaintext_length);
|
|
|
|
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> msg(msglen);
|
2016-05-17 12:52:06 +02:00
|
|
|
res = olm_group_encrypt(session, plaintext, plaintext_length,
|
2019-04-22 16:12:42 +02:00
|
|
|
msg.data(), msglen);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(msglen, res);
|
|
|
|
CHECK_EQ(1U, olm_outbound_group_session_message_index(session));
|
2016-05-18 18:23:09 +02:00
|
|
|
|
|
|
|
/* build the inbound session */
|
|
|
|
size = olm_inbound_group_session_size();
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> inbound_session_memory(size);
|
2016-05-18 18:23:09 +02:00
|
|
|
OlmInboundGroupSession *inbound_session =
|
2019-04-22 16:12:42 +02:00
|
|
|
olm_inbound_group_session(inbound_session_memory.data());
|
2016-05-18 18:23:09 +02:00
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(0, olm_inbound_group_session_is_verified(inbound_session));
|
2017-01-10 15:11:42 +01:00
|
|
|
|
2016-05-18 18:23:09 +02:00
|
|
|
res = olm_init_inbound_group_session(
|
2019-04-22 16:12:42 +02:00
|
|
|
inbound_session, session_key.data(), session_key_len);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ((size_t)0, res);
|
|
|
|
CHECK_EQ(1, olm_inbound_group_session_is_verified(inbound_session));
|
2016-09-13 18:15:28 +02:00
|
|
|
|
|
|
|
/* Check the session ids */
|
|
|
|
|
|
|
|
size_t out_session_id_len = olm_outbound_group_session_id_length(session);
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> out_session_id(out_session_id_len);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(out_session_id_len, olm_outbound_group_session_id(
|
2019-04-22 16:12:42 +02:00
|
|
|
session, out_session_id.data(), out_session_id_len
|
2016-09-13 18:15:28 +02:00
|
|
|
));
|
|
|
|
|
|
|
|
size_t in_session_id_len = olm_inbound_group_session_id_length(
|
|
|
|
inbound_session
|
|
|
|
);
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> in_session_id(in_session_id_len);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(in_session_id_len, olm_inbound_group_session_id(
|
2019-04-22 16:12:42 +02:00
|
|
|
inbound_session, in_session_id.data(), in_session_id_len
|
2016-09-13 18:15:28 +02:00
|
|
|
));
|
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(in_session_id_len, out_session_id_len);
|
|
|
|
CHECK_EQ_SIZE(out_session_id.data(), in_session_id.data(), in_session_id_len);
|
2016-09-13 18:15:28 +02:00
|
|
|
|
2016-05-18 18:23:09 +02:00
|
|
|
/* decode the message */
|
|
|
|
|
|
|
|
/* olm_group_decrypt_max_plaintext_length destroys the input so we have to
|
|
|
|
copy it. */
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> msgcopy(msg);
|
|
|
|
size = olm_group_decrypt_max_plaintext_length(inbound_session, msgcopy.data(), msglen);
|
|
|
|
std::vector<uint8_t> plaintext_buf(size);
|
2016-10-20 10:58:55 +02:00
|
|
|
uint32_t message_index;
|
2019-04-22 16:12:42 +02:00
|
|
|
res = olm_group_decrypt(inbound_session, msg.data(), msglen,
|
|
|
|
plaintext_buf.data(), size, &message_index);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(plaintext_length, res);
|
|
|
|
CHECK_EQ_SIZE(plaintext, plaintext_buf.data(), res);
|
|
|
|
CHECK_EQ(message_index, uint32_t(0));
|
2016-05-17 12:52:06 +02:00
|
|
|
}
|
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
TEST_CASE("Inbound group session export/import") {
|
2017-01-10 15:11:42 +01:00
|
|
|
|
|
|
|
uint8_t session_key[] =
|
|
|
|
"AgAAAAAwMTIzNDU2Nzg5QUJERUYwMTIzNDU2Nzg5QUJDREVGMDEyMzQ1Njc4OUFCREVGM"
|
|
|
|
"DEyMzQ1Njc4OUFCQ0RFRjAxMjM0NTY3ODlBQkRFRjAxMjM0NTY3ODlBQkNERUYwMTIzND"
|
|
|
|
"U2Nzg5QUJERUYwMTIzNDU2Nzg5QUJDREVGMDEyMw0bdg1BDq4Px/slBow06q8n/B9WBfw"
|
|
|
|
"WYyNOB8DlUmXGGwrFmaSb9bR/eY8xgERrxmP07hFmD9uqA2p8PMHdnV5ysmgufE6oLZ5+"
|
|
|
|
"8/mWQOW3VVTnDIlnwd8oHUYRuk8TCQ";
|
|
|
|
|
|
|
|
const uint8_t message[] =
|
|
|
|
"AwgAEhAcbh6UpbByoyZxufQ+h2B+8XHMjhR69G8F4+qjMaFlnIXusJZX3r8LnRORG9T3D"
|
|
|
|
"XFdbVuvIWrLyRfm4i8QRbe8VPwGRFG57B1CtmxanuP8bHtnnYqlwPsD";
|
|
|
|
const std::size_t msglen = sizeof(message)-1;
|
|
|
|
|
|
|
|
/* init first inbound group session, and decrypt */
|
|
|
|
std::size_t size = olm_inbound_group_session_size();
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> session_memory1(size);
|
2017-01-10 15:11:42 +01:00
|
|
|
OlmInboundGroupSession *session1 =
|
2019-04-22 16:12:42 +02:00
|
|
|
olm_inbound_group_session(session_memory1.data());
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(0, olm_inbound_group_session_is_verified(session1));
|
2017-01-10 15:11:42 +01:00
|
|
|
|
|
|
|
std::size_t res = olm_init_inbound_group_session(
|
|
|
|
session1, session_key, sizeof(session_key)-1
|
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ((size_t)0, res);
|
|
|
|
CHECK_EQ(1, olm_inbound_group_session_is_verified(session1));
|
2017-01-10 15:11:42 +01:00
|
|
|
|
|
|
|
/* olm_group_decrypt_max_plaintext_length destroys the input so we have to
|
|
|
|
copy it. */
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> msgcopy(msglen);
|
|
|
|
memcpy(msgcopy.data(), message, msglen);
|
|
|
|
size = olm_group_decrypt_max_plaintext_length(session1, msgcopy.data(), msglen);
|
|
|
|
std::vector<uint8_t> plaintext_buf(size);
|
2017-01-10 15:11:42 +01:00
|
|
|
uint32_t message_index;
|
2019-04-22 16:12:42 +02:00
|
|
|
memcpy(msgcopy.data(), message, msglen);
|
2017-01-10 15:11:42 +01:00
|
|
|
res = olm_group_decrypt(
|
2019-04-22 16:12:42 +02:00
|
|
|
session1, msgcopy.data(), msglen, plaintext_buf.data(), size, &message_index
|
2017-01-10 15:11:42 +01:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ((std::size_t)7, res);
|
|
|
|
CHECK_EQ_SIZE((const uint8_t *)"Message", (const uint8_t*)plaintext_buf.data(), res);
|
|
|
|
CHECK_EQ(uint32_t(0), message_index);
|
2017-01-10 15:11:42 +01:00
|
|
|
|
|
|
|
/* export the keys */
|
|
|
|
size = olm_export_inbound_group_session_length(session1);
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> export_memory(size);
|
2017-01-10 15:11:42 +01:00
|
|
|
res = olm_export_inbound_group_session(
|
2019-04-22 16:12:42 +02:00
|
|
|
session1, export_memory.data(), size, 0
|
2017-01-10 15:11:42 +01:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(size, res);
|
2017-01-10 15:11:42 +01:00
|
|
|
|
|
|
|
/* free the old session to check there is no shared data */
|
|
|
|
olm_clear_inbound_group_session(session1);
|
|
|
|
|
|
|
|
/* import the keys into another inbound group session */
|
|
|
|
size = olm_inbound_group_session_size();
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> session_memory2(size);
|
2017-01-10 15:11:42 +01:00
|
|
|
OlmInboundGroupSession *session2 =
|
2019-04-22 16:12:42 +02:00
|
|
|
olm_inbound_group_session(session_memory2.data());
|
2017-01-10 15:11:42 +01:00
|
|
|
res = olm_import_inbound_group_session(
|
2019-04-22 16:12:42 +02:00
|
|
|
session2, export_memory.data(), export_memory.size()
|
2017-01-10 15:11:42 +01:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ((size_t)0, res);
|
|
|
|
CHECK_EQ(0, olm_inbound_group_session_is_verified(session2));
|
2017-01-10 15:11:42 +01:00
|
|
|
|
|
|
|
/* decrypt the message with the new session */
|
2019-04-22 16:12:42 +02:00
|
|
|
memcpy(msgcopy.data(), message, msglen);
|
|
|
|
size = olm_group_decrypt_max_plaintext_length(session2, msgcopy.data(), msglen);
|
|
|
|
std::vector<uint8_t> plaintext_buf2(size);
|
|
|
|
memcpy(msgcopy.data(), message, msglen);
|
2017-01-10 15:11:42 +01:00
|
|
|
res = olm_group_decrypt(
|
2019-04-22 16:12:42 +02:00
|
|
|
session2, msgcopy.data(), msglen, plaintext_buf2.data(), size, &message_index
|
2017-01-10 15:11:42 +01:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ((std::size_t)7, res);
|
|
|
|
CHECK_EQ_SIZE((const uint8_t *)"Message", (const uint8_t *)plaintext_buf2.data(), res);
|
|
|
|
CHECK_EQ(uint32_t(0), message_index);
|
|
|
|
CHECK_EQ(1, olm_inbound_group_session_is_verified(session2));
|
2017-01-10 15:11:42 +01:00
|
|
|
}
|
|
|
|
|
2021-12-22 19:45:33 +01:00
|
|
|
TEST_CASE("Invalid signature group message") {
|
2016-09-05 20:49:36 +02:00
|
|
|
|
|
|
|
uint8_t plaintext[] = "Message";
|
|
|
|
size_t plaintext_length = sizeof(plaintext) - 1;
|
|
|
|
|
|
|
|
uint8_t session_key[] =
|
2016-09-13 16:42:47 +02:00
|
|
|
"AgAAAAAwMTIzNDU2Nzg5QUJERUYwMTIzNDU2Nzg5QUJDREVGMDEyMzQ1Njc4OUFCREVGM"
|
|
|
|
"DEyMzQ1Njc4OUFCQ0RFRjAxMjM0NTY3ODlBQkRFRjAxMjM0NTY3ODlBQkNERUYwMTIzND"
|
|
|
|
"U2Nzg5QUJERUYwMTIzNDU2Nzg5QUJDREVGMDEyMztqJ7zOtqQtYqOo0CpvDXNlMhV3HeJ"
|
|
|
|
"DpjrASKGLWdop4lx1cSN3Xv1TgfLPW8rhGiW+hHiMxd36nRuxscNv9k4oJA/KP+o0mi1w"
|
|
|
|
"v44StrEJ1wwx9WZHBUIWkQbaBSuBDw";
|
2016-09-05 20:49:36 +02:00
|
|
|
|
|
|
|
uint8_t message[] =
|
2016-09-13 16:42:47 +02:00
|
|
|
"AwgAEhAcbh6UpbByoyZxufQ+h2B+8XHMjhR69G8nP4pNZGl/3QMgrzCZPmP+F2aPLyKPz"
|
|
|
|
"xRPBMUkeXRJ6Iqm5NeOdx2eERgTW7P20CM+lL3Xpk+ZUOOPvsSQNaAL";
|
2016-09-05 20:49:36 +02:00
|
|
|
size_t msglen = sizeof(message)-1;
|
|
|
|
|
|
|
|
/* build the inbound session */
|
|
|
|
size_t size = olm_inbound_group_session_size();
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> inbound_session_memory(size);
|
2016-09-05 20:49:36 +02:00
|
|
|
OlmInboundGroupSession *inbound_session =
|
2019-04-22 16:12:42 +02:00
|
|
|
olm_inbound_group_session(inbound_session_memory.data());
|
2016-09-05 20:49:36 +02:00
|
|
|
|
|
|
|
size_t res = olm_init_inbound_group_session(
|
2016-09-13 18:41:55 +02:00
|
|
|
inbound_session, session_key, sizeof(session_key)-1
|
2016-09-05 20:49:36 +02:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ((size_t)0, res);
|
2016-09-05 20:49:36 +02:00
|
|
|
|
|
|
|
/* decode the message */
|
|
|
|
|
|
|
|
/* olm_group_decrypt_max_plaintext_length destroys the input so we have to
|
|
|
|
copy it. */
|
2019-04-22 16:12:42 +02:00
|
|
|
std::vector<uint8_t> msgcopy(msglen);
|
|
|
|
memcpy(msgcopy.data(), message, msglen);
|
2016-09-05 20:49:36 +02:00
|
|
|
size = olm_group_decrypt_max_plaintext_length(
|
2019-04-22 16:12:42 +02:00
|
|
|
inbound_session, msgcopy.data(), msglen
|
2016-09-05 20:49:36 +02:00
|
|
|
);
|
|
|
|
|
2019-04-22 16:12:42 +02:00
|
|
|
memcpy(msgcopy.data(), message, msglen);
|
|
|
|
std::vector<uint8_t> plaintext_buf(size);
|
2016-10-20 10:58:55 +02:00
|
|
|
uint32_t message_index;
|
2016-09-05 20:49:36 +02:00
|
|
|
res = olm_group_decrypt(
|
2019-04-22 16:12:42 +02:00
|
|
|
inbound_session, msgcopy.data(), msglen, plaintext_buf.data(), size, &message_index
|
2016-09-05 20:49:36 +02:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(message_index, uint32_t(0));
|
|
|
|
CHECK_EQ(plaintext_length, res);
|
|
|
|
CHECK_EQ_SIZE(plaintext, plaintext_buf.data(), res);
|
2016-09-05 20:49:36 +02:00
|
|
|
|
|
|
|
/* now twiddle the signature */
|
|
|
|
message[msglen-1] = 'E';
|
2019-04-22 16:12:42 +02:00
|
|
|
memcpy(msgcopy.data(), message, msglen);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ(
|
2016-09-05 20:49:36 +02:00
|
|
|
size,
|
|
|
|
olm_group_decrypt_max_plaintext_length(
|
2019-04-22 16:12:42 +02:00
|
|
|
inbound_session, msgcopy.data(), msglen
|
2016-09-05 20:49:36 +02:00
|
|
|
)
|
|
|
|
);
|
|
|
|
|
2019-04-22 16:12:42 +02:00
|
|
|
memcpy(msgcopy.data(), message, msglen);
|
2016-09-05 20:49:36 +02:00
|
|
|
res = olm_group_decrypt(
|
2019-04-22 16:12:42 +02:00
|
|
|
inbound_session, msgcopy.data(), msglen,
|
|
|
|
plaintext_buf.data(), size, &message_index
|
2016-09-05 20:49:36 +02:00
|
|
|
);
|
2021-12-22 19:45:33 +01:00
|
|
|
CHECK_EQ((size_t)-1, res);
|
|
|
|
CHECK_EQ(
|
2016-09-05 20:49:36 +02:00
|
|
|
std::string("BAD_SIGNATURE"),
|
|
|
|
std::string(olm_inbound_group_session_last_error(inbound_session))
|
|
|
|
);
|
|
|
|
}
|