|
|
@@ -1,14 +1,8 @@
|
|
1
|
1
|
package obfuscated2_test
|
|
2
|
2
|
|
|
3
|
3
|
import (
|
|
4
|
|
- "bytes"
|
|
5
|
|
- "crypto/aes"
|
|
6
|
|
- "crypto/cipher"
|
|
7
|
|
- "encoding/base64"
|
|
8
|
4
|
"testing"
|
|
9
|
5
|
|
|
10
|
|
- "github.com/9seconds/mtg/v2/internal/testlib"
|
|
11
|
|
- "github.com/9seconds/mtg/v2/mtglib/internal/obfuscated2"
|
|
12
|
6
|
"github.com/stretchr/testify/mock"
|
|
13
|
7
|
"github.com/stretchr/testify/suite"
|
|
14
|
8
|
)
|
|
|
@@ -16,64 +10,31 @@ import (
|
|
16
|
10
|
type ServerHandshakeTestSuite struct {
|
|
17
|
11
|
suite.Suite
|
|
18
|
12
|
|
|
19
|
|
- connMock *testlib.EssentialsConnMock
|
|
20
|
|
- proxyConn obfuscated2.Conn
|
|
21
|
|
- encryptor cipher.Stream
|
|
22
|
|
- decryptor cipher.Stream
|
|
|
13
|
+ data ServerHandshakeTestData
|
|
23
|
14
|
}
|
|
24
|
15
|
|
|
25
|
16
|
func (suite *ServerHandshakeTestSuite) SetupTest() {
|
|
26
|
|
- buf := &bytes.Buffer{}
|
|
27
|
|
- suite.connMock = &testlib.EssentialsConnMock{}
|
|
28
|
|
-
|
|
29
|
|
- encryptor, decryptor, err := obfuscated2.ServerHandshake(buf)
|
|
30
|
|
- suite.NoError(err)
|
|
31
|
|
-
|
|
32
|
|
- suite.proxyConn = obfuscated2.Conn{
|
|
33
|
|
- Conn: suite.connMock,
|
|
34
|
|
- Encryptor: encryptor,
|
|
35
|
|
- Decryptor: decryptor,
|
|
36
|
|
- }
|
|
37
|
|
-
|
|
38
|
|
- serverEncrypted := buf.Bytes()
|
|
39
|
|
-
|
|
40
|
|
- decBlock, _ := aes.NewCipher(serverEncrypted[8 : 8+32])
|
|
41
|
|
- suite.decryptor = cipher.NewCTR(decBlock, serverEncrypted[8+32:8+32+16])
|
|
42
|
|
-
|
|
43
|
|
- serverDecrypted := make([]byte, len(serverEncrypted))
|
|
44
|
|
- suite.decryptor.XORKeyStream(serverDecrypted, serverEncrypted)
|
|
45
|
|
-
|
|
46
|
|
- suite.Equal("3d3d3Q",
|
|
47
|
|
- base64.RawStdEncoding.EncodeToString(serverDecrypted[8+32+16:8+32+16+4]))
|
|
48
|
|
-
|
|
49
|
|
- serverEncryptedReverted := make([]byte, len(serverEncrypted))
|
|
50
|
|
-
|
|
51
|
|
- for i := 0; i < 32+16; i++ {
|
|
52
|
|
- serverEncryptedReverted[8+i] = serverEncrypted[8+32+16-1-i]
|
|
53
|
|
- }
|
|
54
|
|
-
|
|
55
|
|
- encBlock, _ := aes.NewCipher(serverEncryptedReverted[8 : 8+32])
|
|
56
|
|
- suite.encryptor = cipher.NewCTR(encBlock, serverEncryptedReverted[8+32:8+32+16])
|
|
|
17
|
+ suite.data = NewServerHandshakeTestData(suite.T())
|
|
57
|
18
|
}
|
|
58
|
19
|
|
|
59
|
20
|
func (suite *ServerHandshakeTestSuite) TearDownTest() {
|
|
60
|
|
- suite.connMock.AssertExpectations(suite.T())
|
|
|
21
|
+ suite.data.connMock.AssertExpectations(suite.T())
|
|
61
|
22
|
}
|
|
62
|
23
|
|
|
63
|
24
|
func (suite *ServerHandshakeTestSuite) TestSendToTelegram() {
|
|
64
|
25
|
messageToTelegram := []byte{10, 11, 12, 13, 14, 'a'}
|
|
65
|
26
|
|
|
66
|
|
- suite.connMock.
|
|
|
27
|
+ suite.data.connMock.
|
|
67
|
28
|
On("Write", mock.Anything).
|
|
68
|
29
|
Return(len(messageToTelegram), nil).
|
|
69
|
30
|
Once().
|
|
70
|
31
|
Run(func(args mock.Arguments) {
|
|
71
|
32
|
message := make([]byte, len(messageToTelegram))
|
|
72
|
|
- suite.decryptor.XORKeyStream(message, args.Get(0).([]byte)) // nolint: forcetypeassert
|
|
|
33
|
+ suite.data.decryptor.XORKeyStream(message, args.Get(0).([]byte)) // nolint: forcetypeassert
|
|
73
|
34
|
suite.Equal(messageToTelegram, message)
|
|
74
|
35
|
})
|
|
75
|
36
|
|
|
76
|
|
- n, err := suite.proxyConn.Write(messageToTelegram)
|
|
|
37
|
+ n, err := suite.data.proxyConn.Write(messageToTelegram)
|
|
77
|
38
|
suite.EqualValues(len(messageToTelegram), n)
|
|
78
|
39
|
suite.NoError(err)
|
|
79
|
40
|
}
|
|
|
@@ -82,17 +43,17 @@ func (suite *ServerHandshakeTestSuite) TestRecieveFromTelegram() {
|
|
82
|
43
|
messageFromTelegram := []byte{10, 11, 12, 13, 14, 'a'}
|
|
83
|
44
|
buffer := make([]byte, len(messageFromTelegram))
|
|
84
|
45
|
|
|
85
|
|
- suite.connMock.
|
|
|
46
|
+ suite.data.connMock.
|
|
86
|
47
|
On("Read", mock.Anything).
|
|
87
|
48
|
Return(len(messageFromTelegram), nil).
|
|
88
|
49
|
Once().
|
|
89
|
50
|
Run(func(args mock.Arguments) {
|
|
90
|
51
|
message := make([]byte, len(messageFromTelegram))
|
|
91
|
|
- suite.encryptor.XORKeyStream(message, messageFromTelegram)
|
|
|
52
|
+ suite.data.encryptor.XORKeyStream(message, messageFromTelegram)
|
|
92
|
53
|
copy(args.Get(0).([]byte), message) // nolint: forcetypeassert
|
|
93
|
54
|
})
|
|
94
|
55
|
|
|
95
|
|
- n, err := suite.proxyConn.Read(buffer)
|
|
|
56
|
+ n, err := suite.data.proxyConn.Read(buffer)
|
|
96
|
57
|
suite.EqualValues(len(messageFromTelegram), n)
|
|
97
|
58
|
suite.NoError(err)
|
|
98
|
59
|
suite.Equal(messageFromTelegram, buffer)
|