Mercurial > pidgin.yaz
view libpurple/plugins/ciphertest.c @ 25835:97a4d71e0c3d
Don't fallback (under any conditions) from old-style SSL to other connections
purple_ssl_connect() can return NULL under some situations, in which case
we should not try to fall back to the straight connection (or SRV queries).
Additionally, we also shouldn't try those at the same time we're throwing an
"SSL support unavailable" error (there was no return after that error).
author | Paul Aurich <paul@darkrain42.org> |
---|---|
date | Tue, 17 Feb 2009 04:46:04 +0000 |
parents | c38d72677c8a |
children |
line wrap: on
line source
/* * A plugin to test the ciphers that ship with purple * * Copyright (C) 2004, Gary Kramlich <amc_grim@users.sf.net> * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License as * published by the Free Software Foundation; either version 2 of the * License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA * 02111-1301, USA. */ #ifdef HAVE_CONFIG_H #include <config.h> #endif #ifndef PURPLE_PLUGINS #define PURPLE_PLUGINS #endif #include "internal.h" #include <glib.h> #include <string.h> #include "cipher.h" #include "debug.h" #include "plugin.h" #include "version.h" struct test { const gchar *question; const gchar *answer; }; /************************************************************************** * MD5 Stuff **************************************************************************/ struct test md5_tests[8] = { { "", "d41d8cd98f00b204e9800998ecf8427e"}, { "a", "0cc175b9c0f1b6a831c399e269772661"}, { "abc", "900150983cd24fb0d6963f7d28e17f72"}, { "message digest", "f96b697d7cb7938d525a2f31aaf161d0"}, { "abcdefghijklmnopqrstuvwxyz", "c3fcd3d76192e4007dfb496cca67e13b"}, { "ABCDEFGHIJKLMNOPQRSTUVWXYZ" "abcdefghijklmnopqrstuvwxyz" "0123456789", "d174ab98d277d9f5a5611c2c9f419d9f"}, {"123456789012345678901234567" "890123456789012345678901234" "56789012345678901234567890", "57edf4a22be3c955ac49da2e2107b67a"}, { NULL, NULL } }; static void cipher_test_md5(void) { PurpleCipher *cipher; PurpleCipherContext *context; gchar digest[33]; gboolean ret; gint i = 0; cipher = purple_ciphers_find_cipher("md5"); if(!cipher) { purple_debug_info("cipher-test", "could not find md5 cipher, not testing\n"); return; } purple_debug_info("cipher-test", "Running md5 tests\n"); context = purple_cipher_context_new(cipher, NULL); while(md5_tests[i].answer) { purple_debug_info("cipher-test", "Test %02d:\n", i); purple_debug_info("cipher-test", "Testing '%s'\n", md5_tests[i].question); purple_cipher_context_append(context, (guchar *)md5_tests[i].question, strlen(md5_tests[i].question)); ret = purple_cipher_context_digest_to_str(context, sizeof(digest), digest, NULL); if(!ret) { purple_debug_info("cipher-test", "failed\n"); } else { purple_debug_info("cipher-test", "\tGot: %s\n", digest); purple_debug_info("cipher-test", "\tWanted: %s\n", md5_tests[i].answer); } purple_cipher_context_reset(context, NULL); i++; } purple_cipher_context_destroy(context); purple_debug_info("cipher-test", "md5 tests completed\n\n"); } /************************************************************************** * SHA-1 stuff **************************************************************************/ struct test sha1_tests[5] = { {"a", "86f7e437faa5a7fce15d1ddcb9eaeaea377667b8"}, {"abc", "a9993e364706816aba3e25717850c26c9cd0d89d"} , {"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "84983e441c3bd26ebaae4aa1f95129e5e54670f1"} , {NULL, "34aa973cd4c4daa4f61eeb2bdbad27316534016f"}, {NULL, NULL} }; static void cipher_test_sha1(void) { PurpleCipher *cipher; PurpleCipherContext *context; gchar digest[41]; gint i = 0; gboolean ret; cipher = purple_ciphers_find_cipher("sha1"); if(!cipher) { purple_debug_info("cipher-test", "could not find sha1 cipher, not testing\n"); return; } purple_debug_info("cipher-test", "Running sha1 tests\n"); context = purple_cipher_context_new(cipher, NULL); while(sha1_tests[i].answer) { purple_debug_info("cipher-test", "Test %02d:\n", i); purple_debug_info("cipher-test", "Testing '%s'\n", (sha1_tests[i].question != NULL) ? sha1_tests[i].question : "'a'x1000, 1000 times"); if(sha1_tests[i].question) { purple_cipher_context_append(context, (guchar *)sha1_tests[i].question, strlen(sha1_tests[i].question)); } else { gint j; guchar buff[1000]; memset(buff, 'a', 1000); for(j = 0; j < 1000; j++) purple_cipher_context_append(context, buff, 1000); } ret = purple_cipher_context_digest_to_str(context, sizeof(digest), digest, NULL); if(!ret) { purple_debug_info("cipher-test", "failed\n"); } else { purple_debug_info("cipher-test", "\tGot: %s\n", digest); purple_debug_info("cipher-test", "\tWanted: %s\n", sha1_tests[i].answer); } purple_cipher_context_reset(context, NULL); i++; } purple_cipher_context_destroy(context); purple_debug_info("cipher-test", "sha1 tests completed\n\n"); } static void cipher_test_digest(void) { const gchar *nonce = "dcd98b7102dd2f0e8b11d0f600bfb0c093"; const gchar *client_nonce = "0a4f113b"; const gchar *username = "Mufasa"; const gchar *realm = "testrealm@host.com"; const gchar *password = "Circle Of Life"; const gchar *algorithm = "md5"; const gchar *nonce_count = "00000001"; const gchar *method = "GET"; const gchar *qop = "auth"; const gchar *digest_uri = "/dir/index.html"; const gchar *entity = NULL; gchar *session_key; purple_debug_info("cipher-test", "Running HTTP Digest tests\n"); session_key = purple_cipher_http_digest_calculate_session_key( algorithm, username, realm, password, nonce, client_nonce); if (session_key == NULL) { purple_debug_info("cipher-test", "purple_cipher_http_digest_calculate_session_key failed.\n"); } else { gchar *response; purple_debug_info("cipher-test", "\tsession_key: Got: %s\n", session_key); purple_debug_info("cipher-test", "\tsession_key: Wanted: %s\n", "939e7578ed9e3c518a452acee763bce9"); response = purple_cipher_http_digest_calculate_response( algorithm, method, digest_uri, qop, entity, nonce, nonce_count, client_nonce, session_key); g_free(session_key); if (response == NULL) { purple_debug_info("cipher-test", "purple_cipher_http_digest_calculate_session_key failed.\n"); } else { purple_debug_info("cipher-test", "\tresponse: Got: %s\n", response); purple_debug_info("cipher-test", "\tresponse: Wanted: %s\n", "6629fae49393a05397450978507c4ef1"); g_free(response); } } purple_debug_info("cipher-test", "HTTP Digest tests completed\n\n"); } /************************************************************************** * Plugin stuff **************************************************************************/ static gboolean plugin_load(PurplePlugin *plugin) { cipher_test_md5(); cipher_test_sha1(); cipher_test_digest(); return TRUE; } static gboolean plugin_unload(PurplePlugin *plugin) { return TRUE; } static PurplePluginInfo info = { PURPLE_PLUGIN_MAGIC, PURPLE_MAJOR_VERSION, PURPLE_MINOR_VERSION, PURPLE_PLUGIN_STANDARD, /**< type */ NULL, /**< ui_requirement */ 0, /**< flags */ NULL, /**< dependencies */ PURPLE_PRIORITY_DEFAULT, /**< priority */ "core-cipher-test", /**< id */ N_("Cipher Test"), /**< name */ DISPLAY_VERSION, /**< version */ /** summary */ N_("Tests the ciphers that ship with libpurple."), /** description */ N_("Tests the ciphers that ship with libpurple."), "Gary Kramlich <amc_grim@users.sf.net>", /**< author */ PURPLE_WEBSITE, /**< homepage */ plugin_load, /**< load */ plugin_unload, /**< unload */ NULL, /**< destroy */ NULL, /**< ui_info */ NULL, /**< extra_info */ NULL, NULL, /* padding */ NULL, NULL, NULL, NULL }; static void init_plugin(PurplePlugin *plugin) { } PURPLE_INIT_PLUGIN(cipher_test, init_plugin, info)