tests.rs 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437
  1. /*! Unit tests that require access to the testing-only function
  2. BridgeLine::random() or private fields */
  3. use super::bridge_table::BridgeLine;
  4. use super::proto::*;
  5. use super::*;
  6. struct TestHarness {
  7. bdb: BridgeDb,
  8. pub ba: BridgeAuth,
  9. }
  10. impl TestHarness {
  11. fn new() -> Self {
  12. // Create a BridegDb
  13. let mut bdb = BridgeDb::new();
  14. // Create a BridgeAuth
  15. let mut ba = BridgeAuth::new(bdb.pubkey);
  16. // Make 15 open invitation bridges, in 5 sets of 3
  17. for _ in 0..5 {
  18. let bucket = [
  19. BridgeLine::random(),
  20. BridgeLine::random(),
  21. BridgeLine::random(),
  22. ];
  23. ba.add_openinv_bridges(bucket, &mut bdb);
  24. }
  25. // Add 5 more hot spare buckets
  26. for _ in 0..5 {
  27. let bucket = [
  28. BridgeLine::random(),
  29. BridgeLine::random(),
  30. BridgeLine::random(),
  31. ];
  32. ba.add_spare_bucket(bucket);
  33. }
  34. // Create the encrypted bridge table
  35. ba.enc_bridge_table();
  36. Self { bdb, ba }
  37. }
  38. fn advance_days(&mut self, days: u16) {
  39. self.ba.advance_days(days);
  40. }
  41. fn open_invite(&mut self) -> (cred::Lox, bridge_table::BridgeLine) {
  42. // Issue an open invitation
  43. let inv = self.bdb.invite();
  44. // Use it to get a Lox credential
  45. let (req, state) = open_invite::request(&inv);
  46. let resp = self.ba.handle_open_invite(req).unwrap();
  47. open_invite::handle_response(state, resp, &self.ba.lox_pub).unwrap()
  48. }
  49. fn trust_promotion(&mut self, cred: &cred::Lox) -> cred::Migration {
  50. let (promreq, promstate) =
  51. trust_promotion::request(&cred, &self.ba.lox_pub, self.ba.today()).unwrap();
  52. let promresp = self.ba.handle_trust_promotion(promreq).unwrap();
  53. trust_promotion::handle_response(promstate, promresp).unwrap()
  54. }
  55. fn level0_migration(&mut self, loxcred: &cred::Lox, migcred: &cred::Migration) -> cred::Lox {
  56. let (migreq, migstate) =
  57. migration::request(loxcred, migcred, &self.ba.lox_pub, &self.ba.migration_pub).unwrap();
  58. let migresp = self.ba.handle_migration(migreq).unwrap();
  59. migration::handle_response(migstate, migresp, &self.ba.lox_pub).unwrap()
  60. }
  61. fn level_up(&mut self, cred: &cred::Lox) -> cred::Lox {
  62. // Read the bucket in the credential to get today's Bucket
  63. // Reachability credential
  64. let (id, key) = bridge_table::from_scalar(cred.bucket).unwrap();
  65. let encbuckets = self.ba.enc_bridge_table();
  66. let bucket =
  67. bridge_table::BridgeTable::decrypt_bucket(id, &key, &encbuckets[id as usize]).unwrap();
  68. let reachcred = bucket.1.unwrap();
  69. // Use the Bucket Reachability credential to advance to the next
  70. // level
  71. let (req, state) = level_up::request(
  72. &cred,
  73. &reachcred,
  74. &self.ba.lox_pub,
  75. &self.ba.reachability_pub,
  76. self.ba.today(),
  77. )
  78. .unwrap();
  79. let resp = self.ba.handle_level_up(req).unwrap();
  80. level_up::handle_response(state, resp, &self.ba.lox_pub).unwrap()
  81. }
  82. fn issue_invite(&mut self, cred: &cred::Lox) -> (cred::Lox, cred::Invitation) {
  83. // Read the bucket in the credential to get today's Bucket
  84. // Reachability credential
  85. let (id, key) = bridge_table::from_scalar(cred.bucket).unwrap();
  86. let encbuckets = self.ba.enc_bridge_table();
  87. let bucket =
  88. bridge_table::BridgeTable::decrypt_bucket(id, &key, &encbuckets[id as usize]).unwrap();
  89. let reachcred = bucket.1.unwrap();
  90. let (req, state) = issue_invite::request(
  91. &cred,
  92. &reachcred,
  93. &self.ba.lox_pub,
  94. &self.ba.reachability_pub,
  95. self.ba.today(),
  96. )
  97. .unwrap();
  98. let resp = self.ba.handle_issue_invite(req).unwrap();
  99. issue_invite::handle_response(state, resp, &self.ba.lox_pub, &self.ba.invitation_pub)
  100. .unwrap()
  101. }
  102. fn redeem_invite(&mut self, inv: &cred::Invitation) -> cred::Lox {
  103. let (req, state) =
  104. redeem_invite::request(&inv, &self.ba.invitation_pub, self.ba.today()).unwrap();
  105. let resp = self.ba.handle_redeem_invite(req).unwrap();
  106. redeem_invite::handle_response(state, resp, &self.ba.lox_pub).unwrap()
  107. }
  108. fn check_blockage(&mut self, cred: &cred::Lox) -> cred::Migration {
  109. let (req, state) = check_blockage::request(&cred, &self.ba.lox_pub).unwrap();
  110. let resp = self.ba.handle_check_blockage(req).unwrap();
  111. check_blockage::handle_response(state, resp).unwrap()
  112. }
  113. fn blockage_migration(&mut self, cred: &cred::Lox, mig: &cred::Migration) -> cred::Lox {
  114. let (req, state) =
  115. blockage_migration::request(&cred, &mig, &self.ba.lox_pub, &self.ba.migration_pub)
  116. .unwrap();
  117. let resp = self.ba.handle_blockage_migration(req).unwrap();
  118. blockage_migration::handle_response(state, resp, &self.ba.lox_pub).unwrap()
  119. }
  120. }
  121. #[test]
  122. fn test_open_invite() {
  123. let mut th = TestHarness::new();
  124. // Join an untrusted user
  125. let cred = th.open_invite().0;
  126. // Check that we can use the credential to read a bucket
  127. let (id, key) = bridge_table::from_scalar(cred.bucket).unwrap();
  128. let encbuckets = th.ba.enc_bridge_table();
  129. let bucket =
  130. bridge_table::BridgeTable::decrypt_bucket(id, &key, &encbuckets[id as usize]).unwrap();
  131. println!("cred = {:?}", cred);
  132. println!("bucket = {:?}", bucket);
  133. assert!(bucket.1.is_none());
  134. assert!(th.ba.verify_lox(&cred));
  135. }
  136. #[test]
  137. fn test_trust_promotion() {
  138. let mut th = TestHarness::new();
  139. let cred = th.open_invite().0;
  140. assert!(th.ba.verify_lox(&cred));
  141. // Time passes
  142. th.advance_days(47);
  143. let migcred = th.trust_promotion(&cred);
  144. assert!(th.ba.verify_migration(&migcred));
  145. // Check that we can use the to_bucket in the Migration credenital
  146. // to read a bucket
  147. let (id, key) = bridge_table::from_scalar(migcred.to_bucket).unwrap();
  148. let encbuckets = th.ba.enc_bridge_table();
  149. let bucket =
  150. bridge_table::BridgeTable::decrypt_bucket(id, &key, &encbuckets[id as usize]).unwrap();
  151. println!("bucket = {:?}", bucket);
  152. assert!(th.ba.verify_reachability(&bucket.1.unwrap()));
  153. }
  154. #[test]
  155. fn test_level0_migration() {
  156. let mut th = TestHarness::new();
  157. let cred = th.open_invite().0;
  158. assert!(th.ba.verify_lox(&cred));
  159. // Time passes
  160. th.advance_days(47);
  161. let migcred = th.trust_promotion(&cred);
  162. assert!(th.ba.verify_migration(&migcred));
  163. let newloxcred = th.level0_migration(&cred, &migcred);
  164. assert!(th.ba.verify_lox(&newloxcred));
  165. println!("newloxcred = {:?}", newloxcred);
  166. // Check that we can use the credenital to read a bucket
  167. let (id, key) = bridge_table::from_scalar(newloxcred.bucket).unwrap();
  168. let encbuckets = th.ba.enc_bridge_table();
  169. let bucket =
  170. bridge_table::BridgeTable::decrypt_bucket(id, &key, &encbuckets[id as usize]).unwrap();
  171. println!("bucket = {:?}", bucket);
  172. assert!(th.ba.verify_reachability(&bucket.1.unwrap()));
  173. }
  174. #[test]
  175. fn test_level_up() {
  176. let mut th = TestHarness::new();
  177. // Join an untrusted user
  178. let cred = th.open_invite().0;
  179. // Time passes
  180. th.advance_days(47);
  181. // Go up to level 1
  182. let migcred = th.trust_promotion(&cred);
  183. let cred1 = th.level0_migration(&cred, &migcred);
  184. assert!(scalar_u32(&cred1.trust_level).unwrap() == 1);
  185. // Time passes
  186. th.advance_days(20);
  187. let cred2 = th.level_up(&cred1);
  188. assert!(scalar_u32(&cred2.trust_level).unwrap() == 2);
  189. println!("cred2 = {:?}", cred2);
  190. assert!(th.ba.verify_lox(&cred2));
  191. // Time passes
  192. th.advance_days(30);
  193. let cred3 = th.level_up(&cred2);
  194. assert!(scalar_u32(&cred3.trust_level).unwrap() == 3);
  195. println!("cred3 = {:?}", cred3);
  196. assert!(th.ba.verify_lox(&cred3));
  197. // Time passes
  198. th.advance_days(60);
  199. let cred4 = th.level_up(&cred3);
  200. assert!(scalar_u32(&cred3.trust_level).unwrap() == 3);
  201. println!("cred4 = {:?}", cred4);
  202. assert!(th.ba.verify_lox(&cred4));
  203. }
  204. #[test]
  205. fn test_issue_invite() {
  206. let mut th = TestHarness::new();
  207. // Join an untrusted user
  208. let cred = th.open_invite().0;
  209. // Time passes
  210. th.advance_days(47);
  211. // Go up to level 1
  212. let migcred = th.trust_promotion(&cred);
  213. let cred1 = th.level0_migration(&cred, &migcred);
  214. assert!(scalar_u32(&cred1.trust_level).unwrap() == 1);
  215. // Time passes
  216. th.advance_days(20);
  217. // Go up to level 2
  218. let cred2 = th.level_up(&cred1);
  219. assert!(scalar_u32(&cred2.trust_level).unwrap() == 2);
  220. println!("cred2 = {:?}", cred2);
  221. assert!(th.ba.verify_lox(&cred2));
  222. // Issue an invitation
  223. let (cred2a, invite) = th.issue_invite(&cred2);
  224. assert!(th.ba.verify_lox(&cred2a));
  225. assert!(th.ba.verify_invitation(&invite));
  226. println!("cred2a = {:?}", cred2a);
  227. println!("invite = {:?}", invite);
  228. }
  229. #[test]
  230. fn test_redeem_invite() {
  231. let mut th = TestHarness::new();
  232. // Join an untrusted user
  233. let cred = th.open_invite().0;
  234. // Time passes
  235. th.advance_days(47);
  236. // Go up to level 1
  237. let migcred = th.trust_promotion(&cred);
  238. let cred1 = th.level0_migration(&cred, &migcred);
  239. assert!(scalar_u32(&cred1.trust_level).unwrap() == 1);
  240. // Time passes
  241. th.advance_days(20);
  242. // Go up to level 2
  243. let cred2 = th.level_up(&cred1);
  244. assert!(scalar_u32(&cred2.trust_level).unwrap() == 2);
  245. println!("cred2 = {:?}", cred2);
  246. assert!(th.ba.verify_lox(&cred2));
  247. // Issue an invitation to Bob
  248. let (cred2a, bob_invite) = th.issue_invite(&cred2);
  249. assert!(th.ba.verify_lox(&cred2a));
  250. assert!(th.ba.verify_invitation(&bob_invite));
  251. println!("cred2a = {:?}", cred2a);
  252. println!("bob_invite = {:?}", bob_invite);
  253. // Time passes
  254. th.advance_days(12);
  255. // Bob joins the system
  256. let bob_cred = th.redeem_invite(&bob_invite);
  257. assert!(th.ba.verify_lox(&bob_cred));
  258. println!("bob_cred = {:?}", bob_cred);
  259. }
  260. #[test]
  261. fn test_mark_unreachable() {
  262. let mut th = TestHarness::new();
  263. println!("spares = {:?}", th.ba.bridge_table.spares);
  264. println!("tmig = {:?}", th.ba.trustup_migration_table.table);
  265. println!("bmig = {:?}", th.ba.blockage_migration_table.table);
  266. println!("openinv = {:?}\n", th.bdb.openinv_buckets);
  267. // Mark a bridge in an untrusted bucket as unreachable
  268. let b6 = th.ba.bridge_table.buckets[6][0];
  269. th.ba.bridge_unreachable(&b6, &mut th.bdb);
  270. println!("spares = {:?}", th.ba.bridge_table.spares);
  271. println!("tmig = {:?}", th.ba.trustup_migration_table.table);
  272. println!("bmig = {:?}", th.ba.blockage_migration_table.table);
  273. println!("openinv = {:?}\n", th.bdb.openinv_buckets);
  274. // Mark another bridge grouped to the same trusted bucket as
  275. // unreachable
  276. let b7 = th.ba.bridge_table.buckets[7][0];
  277. th.ba.bridge_unreachable(&b7, &mut th.bdb);
  278. println!("spares = {:?}", th.ba.bridge_table.spares);
  279. println!("tmig = {:?}", th.ba.trustup_migration_table.table);
  280. println!("bmig = {:?}", th.ba.blockage_migration_table.table);
  281. println!("openinv = {:?}\n", th.bdb.openinv_buckets);
  282. // That will have introduced a blockage migration. Get the target
  283. let target: u32 = *th
  284. .ba
  285. .blockage_migration_table
  286. .table
  287. .iter()
  288. .next()
  289. .unwrap()
  290. .1;
  291. // Block two of the bridges in that target bucket
  292. let bt1 = th.ba.bridge_table.buckets[target as usize][1];
  293. let bt2 = th.ba.bridge_table.buckets[target as usize][2];
  294. th.ba.bridge_unreachable(&bt1, &mut th.bdb);
  295. th.ba.bridge_unreachable(&bt2, &mut th.bdb);
  296. println!("spares = {:?}", th.ba.bridge_table.spares);
  297. println!("tmig = {:?}", th.ba.trustup_migration_table.table);
  298. println!("bmig = {:?}", th.ba.blockage_migration_table.table);
  299. println!("openinv = {:?}\n", th.bdb.openinv_buckets);
  300. }
  301. #[test]
  302. fn test_blockage_migration() {
  303. let mut th = TestHarness::new();
  304. // Join an untrusted user
  305. let cred = th.open_invite().0;
  306. // Time passes
  307. th.advance_days(47);
  308. // Go up to level 1
  309. let migcred = th.trust_promotion(&cred);
  310. let cred1 = th.level0_migration(&cred, &migcred);
  311. assert!(scalar_u32(&cred1.trust_level).unwrap() == 1);
  312. // Time passes
  313. th.advance_days(20);
  314. // Go up to level 2
  315. let cred2 = th.level_up(&cred1);
  316. assert!(scalar_u32(&cred2.trust_level).unwrap() == 2);
  317. println!("cred2 = {:?}", cred2);
  318. assert!(th.ba.verify_lox(&cred2));
  319. // Time passes
  320. th.advance_days(29);
  321. // Go up to level 3
  322. let cred3 = th.level_up(&cred2);
  323. assert!(scalar_u32(&cred3.trust_level).unwrap() == 3);
  324. println!("cred3 = {:?}", cred3);
  325. assert!(th.ba.verify_lox(&cred3));
  326. // Get our bridges
  327. let (id, key) = bridge_table::from_scalar(cred3.bucket).unwrap();
  328. let encbuckets = th.ba.enc_bridge_table();
  329. let bucket =
  330. bridge_table::BridgeTable::decrypt_bucket(id, &key, &encbuckets[id as usize]).unwrap();
  331. // We should have a Bridge Reachability credential
  332. assert!(bucket.1.is_some());
  333. // Oh, no! Two of our bridges are blocked!
  334. th.ba.bridge_unreachable(&bucket.0[0], &mut th.bdb);
  335. th.ba.bridge_unreachable(&bucket.0[2], &mut th.bdb);
  336. println!("spares = {:?}", th.ba.bridge_table.spares);
  337. println!("tmig = {:?}", th.ba.trustup_migration_table.table);
  338. println!("bmig = {:?}", th.ba.blockage_migration_table.table);
  339. println!("openinv = {:?}\n", th.bdb.openinv_buckets);
  340. // Time passes
  341. th.advance_days(1);
  342. let encbuckets2 = th.ba.enc_bridge_table();
  343. let bucket2 =
  344. bridge_table::BridgeTable::decrypt_bucket(id, &key, &encbuckets2[id as usize]).unwrap();
  345. // We should no longer have a Bridge Reachability credential
  346. assert!(bucket2.1.is_none());
  347. // See about getting a Migration credential for the blockage
  348. let migration = th.check_blockage(&cred3);
  349. println!("migration = {:?}", migration);
  350. // Migrate
  351. let cred4 = th.blockage_migration(&cred3, &migration);
  352. println!("cred4 = {:?}", cred4);
  353. assert!(th.ba.verify_lox(&cred4));
  354. }