github.com/psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/psiphon/upstreamproxy/go-ntlm/ntlm/message_authenticate_test.go (about)

     1  //Copyright 2013 Thomson Reuters Global Resources. BSD License please see License file for more information
     2  
     3  package ntlm
     4  
     5  import (
     6  	"bytes"
     7  	"encoding/base64"
     8  	"encoding/hex"
     9  	"testing"
    10  )
    11  
    12  func checkPayloadStruct(t *testing.T, payloadStruct *PayloadStruct, len uint16, offset uint32) {
    13  	if payloadStruct.Len != len || payloadStruct.Offset != offset {
    14  		t.Errorf("Failed to parse payload struct %d, %d", payloadStruct.Len, payloadStruct.Offset)
    15  	}
    16  }
    17  
    18  func TestParseNTLMv1AsV2(t *testing.T) {
    19  	ntlmv1data := "TlRMTVNTUAADAAAAGAAYALYAAAAYABgAzgAAADQANABIAAAAIAAgAHwAAAAaABoAnAAAABAAEADmAAAAVYKQQgUCzg4AAAAPYQByAHIAYQB5ADEAMgAuAG0AcwBnAHQAcwB0AC4AcgBlAHUAdABlAHIAcwAuAGMAbwBtAHUAcwBlAHIAcwB0AHIAZQBzAHMAMQAwADAAMAAwADgATgBZAEMAVgBBADEAMgBTADIAQwBNAFMAQQDguXWdC2hLH+C5dZ0LaEsf4Ll1nQtoSx9nI+fkE73qtElnkDiSQbxfcDN9zbtO1qfyK3ZTI6CUhvjxmXnpZEjY"
    20  	authBytes, err := base64.StdEncoding.DecodeString(ntlmv1data)
    21  	_, err = ParseAuthenticateMessage(authBytes, 2)
    22  	if err == nil {
    23  		t.Error("Should have returned error when tring to parse an NTLMv1 authenticate message as NTLMv2")
    24  	}
    25  	_, err = ParseAuthenticateMessage(authBytes, 1)
    26  	if err != nil {
    27  		t.Error("Should not have returned error when tring to parse an NTLMv1 authenticate message")
    28  	}
    29  }
    30  
    31  func TestAuthenticateNtlmV1(t *testing.T) {
    32  	authenticateMessage := "TlRMTVNTUAADAAAAGAAYAIgAAAAYABgAoAAAAAAAAABYAAAAIAAgAFgAAAAQABAAeAAAABAAEAC4AAAAVYKQYgYBsR0AAAAP2BgW++b14Dh6Z5B4Xs1DiHAAYQB1AGwAQABwAGEAdQBsAGQAaQB4AC4AbgBlAHQAVwBJAE4ANwBfAEkARQA4ACugxZFzvHB4P6LdKbbZpiYHo2ErZURLiSugxZFzvHB4P6LdKbbZpiYHo2ErZURLibmpCUlnbq2I4LAdEhLdg7I="
    33  	authenticateData, err := base64.StdEncoding.DecodeString(authenticateMessage)
    34  
    35  	if err != nil {
    36  		t.Error("Could not base64 decode message data")
    37  	}
    38  
    39  	a, err := ParseAuthenticateMessage(authenticateData, 1)
    40  	if err != nil {
    41  		t.Error("Could not parse authenticate message")
    42  	}
    43  
    44  	a.String()
    45  
    46  	outBytes := a.Bytes()
    47  
    48  	if len(outBytes) > 0 {
    49  		reparsed, err := ParseAuthenticateMessage(outBytes, 1)
    50  		if err != nil {
    51  			t.Error("Could not re-parse authenticate message")
    52  		}
    53  		if reparsed.String() != a.String() {
    54  			t.Error("Reparsed message is not the same")
    55  		}
    56  	} else {
    57  		t.Error("Invalid authenticate messsage bytes")
    58  	}
    59  }
    60  
    61  func TestAuthenticateNtlmV2(t *testing.T) {
    62  	authenticateMessage := "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"
    63  	authenticateData, err := base64.StdEncoding.DecodeString(authenticateMessage)
    64  
    65  	if err != nil {
    66  		t.Error("Could not base64 decode message data")
    67  	}
    68  
    69  	a, err := ParseAuthenticateMessage(authenticateData, 2)
    70  
    71  	if err != nil || a == nil {
    72  		t.Error("Failed to parse authenticate message " + err.Error())
    73  	}
    74  
    75  	checkPayloadStruct(t, a.LmChallengeResponse, 24, 142)
    76  	checkPayloadStruct(t, a.NtChallengeResponseFields, 262, 166)
    77  	checkPayloadStruct(t, a.DomainName, 0, 88)
    78  	checkPayloadStruct(t, a.UserName, 32, 88)
    79  	checkPayloadStruct(t, a.Workstation, 22, 120)
    80  	checkPayloadStruct(t, a.EncryptedRandomSessionKey, 16, 428)
    81  
    82  	if a.NegotiateFlags != uint32(1116766805) {
    83  		t.Errorf("Authenticate negotiate flags not correct should be %d got %d", uint32(1116766805), a.NegotiateFlags)
    84  	}
    85  
    86  	mic, err := hex.DecodeString("a5d862f48b5a2d6c121a914c4f85506e")
    87  	if !bytes.Equal(a.Mic, mic) {
    88  		t.Errorf("Mic not correct, should be %s, got %s", "a5d862f48b5a2d6c121a914c4f85506e", hex.EncodeToString(a.Mic))
    89  	}
    90  
    91  	if len(a.Payload) != 356 {
    92  		t.Errorf("Length of payload is incorrect got: %d, should be %d", len(a.Payload), 356)
    93  	}
    94  
    95  	a.String()
    96  
    97  	// Generate the bytes from the message and reparse it and make sure that works
    98  	bytes := a.Bytes()
    99  	if len(bytes) == 0 {
   100  
   101  	}
   102  }