aboutsummaryrefslogtreecommitdiffstats
path: root/spec
diff options
context:
space:
mode:
authorMatthew Wild <mwild1@gmail.com>2022-03-04 16:33:41 +0000
committerMatthew Wild <mwild1@gmail.com>2022-03-04 16:33:41 +0000
commitb47c7951d54d64a3a89854bb80f5d67cc2da90ab (patch)
tree916354af1f314292b4410e1febcfe6a71e398cf0 /spec
parentb6bf4788aa3d5c7ee847c690fcd0fbd9346a5dc7 (diff)
parenta6265e45a04a7f7d5ae39c5608f7a350be1410db (diff)
downloadprosody-b47c7951d54d64a3a89854bb80f5d67cc2da90ab.tar.gz
prosody-b47c7951d54d64a3a89854bb80f5d67cc2da90ab.zip
Merge config-updates+check-turn from timber
Diffstat (limited to 'spec')
-rw-r--r--spec/net_stun_spec.lua100
-rw-r--r--spec/util_hashes_spec.lua12
-rw-r--r--spec/util_hmac_spec.lua28
3 files changed, 120 insertions, 20 deletions
diff --git a/spec/net_stun_spec.lua b/spec/net_stun_spec.lua
new file mode 100644
index 00000000..9b6e844a
--- /dev/null
+++ b/spec/net_stun_spec.lua
@@ -0,0 +1,100 @@
+local hex = require "util.hex";
+
+local function parse(pkt_desc)
+ local result = {};
+ for line in pkt_desc:gmatch("([^\n]+)\n") do
+ local b1, b2, b3, b4 = line:match("^%s*(%x%x) (%x%x) (%x%x) (%x%x)%s");
+ if b1 then
+ table.insert(result, b1);
+ table.insert(result, b2);
+ table.insert(result, b3);
+ table.insert(result, b4);
+ end
+ end
+ return hex.decode(table.concat(result));
+end
+
+local sample_packet = parse[[
+ 00 01 00 60 Request type and message length
+ 21 12 a4 42 Magic cookie
+ 78 ad 34 33 }
+ c6 ad 72 c0 } Transaction ID
+ 29 da 41 2e }
+ 00 06 00 12 USERNAME attribute header
+ e3 83 9e e3 }
+ 83 88 e3 83 }
+ aa e3 83 83 } Username value (18 bytes) and padding (2 bytes)
+ e3 82 af e3 }
+ 82 b9 00 00 }
+ 00 15 00 1c NONCE attribute header
+ 66 2f 2f 34 }
+ 39 39 6b 39 }
+ 35 34 64 36 }
+ 4f 4c 33 34 } Nonce value
+ 6f 4c 39 46 }
+ 53 54 76 79 }
+ 36 34 73 41 }
+ 00 14 00 0b REALM attribute header
+ 65 78 61 6d }
+ 70 6c 65 2e } Realm value (11 bytes) and padding (1 byte)
+ 6f 72 67 00 }
+ 00 08 00 14 MESSAGE-INTEGRITY attribute header
+ f6 70 24 65 }
+ 6d d6 4a 3e }
+ 02 b8 e0 71 } HMAC-SHA1 fingerprint
+ 2e 85 c9 a2 }
+ 8c a8 96 66 }
+]];
+
+--print(hex.encode(sample_packet))
+print(sample_packet)
+
+describe("net.stun", function ()
+ local stun = require "net.stun";
+
+ it("works", function ()
+ local packet = stun.new_packet();
+ assert.is_string(packet:serialize());
+ end);
+
+ it("can decode the sample packet", function ()
+ local packet = stun.new_packet():deserialize(sample_packet);
+ assert(packet);
+ local method, method_name = packet:get_method();
+ assert.equal(1, method);
+ assert.equal("binding", method_name);
+ assert.equal("example.org", packet:get_attribute("realm"));
+ end);
+
+ it("can generate the sample packet", function ()
+ -- These values, and the sample packet, come from RFC 5769 2.4
+ local username = string.char(
+ -- U+30DE KATAKANA LETTER MA
+ 0xE3, 0x83, 0x9E,
+ -- U+30C8 KATAKANA LETTER TO
+ 0xE3, 0x83, 0x88,
+ -- U+30EA KATAKANA LETTER RI
+ 0xE3, 0x83, 0xAA,
+ -- U+30C3 KATAKANA LETTER SMALL TU
+ 0xE3, 0x83, 0x83,
+ -- U+30AF KATAKANA LETTER KU
+ 0xE3, 0x82, 0xAF,
+ -- U+30B9 KATAKANA LETTER SU
+ 0xE3, 0x82, 0xB9
+ );
+
+ -- Password: "The<U+00AD>M<U+00AA>tr<U+2168>" and "TheMatrIX" (without
+ -- quotes) respectively before and after SASLprep processing
+ local password = "TheMatrIX";
+ local realm = "example.org";
+
+ local p3 = stun.new_packet("binding", "request");
+ p3.transaction_id = hex.decode("78AD3433C6AD72C029DA412E");
+ p3:add_attribute("username", username);
+ p3:add_attribute("nonce", "f//499k954d6OL34oL9FSTvy64sA");
+ p3:add_attribute("realm", realm);
+ local key = stun.get_long_term_auth_key(realm, username, password);
+ p3:add_message_integrity(key);
+ assert.equal(sample_packet, p3:serialize());
+ end);
+end);
diff --git a/spec/util_hashes_spec.lua b/spec/util_hashes_spec.lua
index 3639dd4e..51a4a79c 100644
--- a/spec/util_hashes_spec.lua
+++ b/spec/util_hashes_spec.lua
@@ -10,28 +10,28 @@ describe("PBKDF2-HMAC-SHA1", function ()
local S = "salt"
local c = 1
local DK = "0c60c80f961f0e71f3a9b524af6012062fe037a6";
- assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha1(P, S, c)));
+ assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha1(P, S, c)));
end);
it("test vector 2", function ()
local P = "password"
local S = "salt"
local c = 2
local DK = "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957";
- assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha1(P, S, c)));
+ assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha1(P, S, c)));
end);
it("test vector 3", function ()
local P = "password"
local S = "salt"
local c = 4096
local DK = "4b007901b765489abead49d926f721d065a429c1";
- assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha1(P, S, c)));
+ assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha1(P, S, c)));
end);
it("test vector 4 #SLOW", function ()
local P = "password"
local S = "salt"
local c = 16777216
local DK = "eefe3d61cd4da4e4e9945b3d6ba2158c2634e984";
- assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha1(P, S, c)));
+ assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha1(P, S, c)));
end);
end);
@@ -41,14 +41,14 @@ describe("PBKDF2-HMAC-SHA256", function ()
local S = "salt";
local c = 1
local DK = "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17b";
- assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha256(P, S, c)));
+ assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha256(P, S, c)));
end);
it("test vector 2", function ()
local P = "password";
local S = "salt";
local c = 2
local DK = "ae4d0c95af6b46d32d0adff928f06dd02a303f8ef3c251dfd6e2d85a95474c43";
- assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha256(P, S, c)));
+ assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha256(P, S, c)));
end);
end);
diff --git a/spec/util_hmac_spec.lua b/spec/util_hmac_spec.lua
index a2125c3a..8d6274aa 100644
--- a/spec/util_hmac_spec.lua
+++ b/spec/util_hmac_spec.lua
@@ -7,8 +7,8 @@ local hmac = require "util.hmac";
local hex = require "util.hex";
describe("Test case 1", function ()
- local Key = hex.from("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b");
- local Data = hex.from("4869205468657265");
+ local Key = hex.decode("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b");
+ local Data = hex.decode("4869205468657265");
describe("HMAC-SHA-256", function ()
it("works", function()
assert.equal("b0344c61d8db38535ca8afceaf0bf12b881dc200c9833da726e9376c2e32cff7", hmac.sha256(Key, Data, true))
@@ -21,8 +21,8 @@ describe("Test case 1", function ()
end);
end);
describe("Test case 2", function ()
- local Key = hex.from("4a656665");
- local Data = hex.from("7768617420646f2079612077616e7420666f72206e6f7468696e673f");
+ local Key = hex.decode("4a656665");
+ local Data = hex.decode("7768617420646f2079612077616e7420666f72206e6f7468696e673f");
describe("HMAC-SHA-256", function ()
it("works", function()
assert.equal("5bdcc146bf60754e6a042426089575c75a003f089d2739839dec58b964ec3843", hmac.sha256(Key, Data, true))
@@ -35,8 +35,8 @@ describe("Test case 2", function ()
end);
end);
describe("Test case 3", function ()
- local Key = hex.from("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
- local Data = hex.from("dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd");
+ local Key = hex.decode("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
+ local Data = hex.decode("dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd");
describe("HMAC-SHA-256", function ()
it("works", function()
assert.equal("773ea91e36800e46854db8ebd09181a72959098b3ef8c122d9635514ced565fe", hmac.sha256(Key, Data, true))
@@ -49,8 +49,8 @@ describe("Test case 3", function ()
end);
end);
describe("Test case 4", function ()
- local Key = hex.from("0102030405060708090a0b0c0d0e0f10111213141516171819");
- local Data = hex.from("cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd");
+ local Key = hex.decode("0102030405060708090a0b0c0d0e0f10111213141516171819");
+ local Data = hex.decode("cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd");
describe("HMAC-SHA-256", function ()
it("works", function()
assert.equal("82558a389a443c0ea4cc819899f2083a85f0faa3e578f8077a2e3ff46729665b", hmac.sha256(Key, Data, true))
@@ -63,8 +63,8 @@ describe("Test case 4", function ()
end);
end);
describe("Test case 5", function ()
- local Key = hex.from("0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c");
- local Data = hex.from("546573742057697468205472756e636174696f6e");
+ local Key = hex.decode("0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c");
+ local Data = hex.decode("546573742057697468205472756e636174696f6e");
describe("HMAC-SHA-256", function ()
it("works", function()
assert.equal("a3b6167473100ee06e0c796c2955552b", hmac.sha256(Key, Data, true):sub(1,128/4))
@@ -77,8 +77,8 @@ describe("Test case 5", function ()
end);
end);
describe("Test case 6", function ()
- local Key = hex.from("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
- local Data = hex.from("54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b6579202d2048617368204b6579204669727374");
+ local Key = hex.decode("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
+ local Data = hex.decode("54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b6579202d2048617368204b6579204669727374");
describe("HMAC-SHA-256", function ()
it("works", function()
assert.equal("60e431591ee0b67f0d8a26aacbf5b77f8e0bc6213728c5140546040f0ee37f54", hmac.sha256(Key, Data, true))
@@ -91,8 +91,8 @@ describe("Test case 6", function ()
end);
end);
describe("Test case 7", function ()
- local Key = hex.from("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
- local Data = hex.from("5468697320697320612074657374207573696e672061206c6172676572207468616e20626c6f636b2d73697a65206b657920616e642061206c6172676572207468616e20626c6f636b2d73697a6520646174612e20546865206b6579206e6565647320746f20626520686173686564206265666f7265206265696e6720757365642062792074686520484d414320616c676f726974686d2e");
+ local Key = hex.decode("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
+ local Data = hex.decode("5468697320697320612074657374207573696e672061206c6172676572207468616e20626c6f636b2d73697a65206b657920616e642061206c6172676572207468616e20626c6f636b2d73697a6520646174612e20546865206b6579206e6565647320746f20626520686173686564206265666f7265206265696e6720757365642062792074686520484d414320616c676f726974686d2e");
describe("HMAC-SHA-256", function ()
it("works", function()
assert.equal("9b09ffa71b942fcb27635fbcd5b0e944bfdc63644f0713938a7f51535c3a35e2", hmac.sha256(Key, Data, true))