mirror of
https://github.com/SamTherapy/dnscrypt.git
synced 2024-11-20 04:43:47 +00:00
5ddb58f703
Graceful shutdown of the DNSCrypt server This PR implements Server.Shutdown(ctx context.Context) method that allows to shut down the DNSCrypt server gracefully. Some additional changes that were inadvertently made while doing that: 1. Added benchmark tests 2. Started using dns.ReadFromSessionUDP / dns.WriteToSessionUDP instead of implementing it by ourselves 3. Generally improved tests 4. Added depguard 5. Improved comments overall in the code
72 lines
1.9 KiB
Go
72 lines
1.9 KiB
Go
package dnscrypt
|
|
|
|
import (
|
|
"bytes"
|
|
"math/rand"
|
|
"testing"
|
|
|
|
"github.com/ameshkov/dnscrypt/v2/xsecretbox"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestDNSCryptResponseEncryptDecryptXSalsa20Poly1305(t *testing.T) {
|
|
testDNSCryptResponseEncryptDecrypt(t, XSalsa20Poly1305)
|
|
}
|
|
|
|
func TestDNSCryptResponseEncryptDecryptXChacha20Poly1305(t *testing.T) {
|
|
testDNSCryptResponseEncryptDecrypt(t, XChacha20Poly1305)
|
|
}
|
|
|
|
func testDNSCryptResponseEncryptDecrypt(t *testing.T, esVersion CryptoConstruction) {
|
|
// Generate the secret/public pairs
|
|
clientSecretKey, clientPublicKey := generateRandomKeyPair()
|
|
serverSecretKey, serverPublicKey := generateRandomKeyPair()
|
|
|
|
// Generate client shared key
|
|
clientSharedKey, err := computeSharedKey(esVersion, &clientSecretKey, &serverPublicKey)
|
|
assert.NoError(t, err)
|
|
|
|
// Generate server shared key
|
|
serverSharedKey, err := computeSharedKey(esVersion, &serverSecretKey, &clientPublicKey)
|
|
assert.NoError(t, err)
|
|
|
|
r1 := &EncryptedResponse{
|
|
EsVersion: esVersion,
|
|
}
|
|
// Fill client-nonce
|
|
_, _ = rand.Read(r1.Nonce[:nonceSize/12])
|
|
|
|
// Generate random packet
|
|
packet := make([]byte, 100)
|
|
_, _ = rand.Read(packet[:])
|
|
|
|
// Encrypt it
|
|
encrypted, err := r1.Encrypt(packet, serverSharedKey)
|
|
assert.NoError(t, err)
|
|
|
|
// Now let's try decrypting it
|
|
r2 := &EncryptedResponse{
|
|
EsVersion: esVersion,
|
|
}
|
|
|
|
// Decrypt it
|
|
decrypted, err := r2.Decrypt(encrypted, clientSharedKey)
|
|
assert.NoError(t, err)
|
|
|
|
// Check that packet is the same
|
|
assert.True(t, bytes.Equal(packet, decrypted))
|
|
|
|
// Now check invalid data (some random stuff)
|
|
_, err = r2.Decrypt(packet, clientSharedKey)
|
|
assert.NotNil(t, err)
|
|
|
|
// Empty array
|
|
_, err = r2.Decrypt([]byte{}, clientSharedKey)
|
|
assert.NotNil(t, err)
|
|
|
|
// Minimum valid size
|
|
b := make([]byte, len(resolverMagic)+nonceSize+xsecretbox.TagSize+minDNSPacketSize)
|
|
_, _ = rand.Read(b)
|
|
_, err = r2.Decrypt(b, clientSharedKey)
|
|
assert.NotNil(t, err)
|
|
}
|