Init
This commit is contained in:
191
Samples/TwoWayAuthentication/TwoWayAuthenticationTest.cpp
Normal file
191
Samples/TwoWayAuthentication/TwoWayAuthenticationTest.cpp
Normal file
@ -0,0 +1,191 @@
|
||||
/*
|
||||
* Original work: Copyright (c) 2014, Oculus VR, Inc.
|
||||
* All rights reserved.
|
||||
*
|
||||
* This source code is licensed under the BSD-style license found in the
|
||||
* RakNet License.txt file in the licenses directory of this source tree. An additional grant
|
||||
* of patent rights can be found in the RakNet Patents.txt file in the same directory.
|
||||
*
|
||||
*
|
||||
* Modified work: Copyright (c) 2017, SLikeSoft UG (haftungsbeschränkt)
|
||||
*
|
||||
* This source code was modified by SLikeSoft. Modifications are licensed under the MIT-style
|
||||
* license found in the license.txt file in the root directory of this source tree.
|
||||
*/
|
||||
|
||||
#include <cstdio>
|
||||
#include <cstring>
|
||||
#include <stdlib.h>
|
||||
#include "slikenet/GetTime.h"
|
||||
#include "slikenet/Rand.h"
|
||||
#include "slikenet/peerinterface.h"
|
||||
#include "slikenet/MessageIdentifiers.h"
|
||||
#include "slikenet/BitStream.h"
|
||||
#include "slikenet/TwoWayAuthentication.h"
|
||||
#include "slikenet/sleep.h"
|
||||
|
||||
static const int NUM_PEERS=2;
|
||||
SLNet::RakPeerInterface *rakPeer[NUM_PEERS];
|
||||
SLNet::TwoWayAuthentication *twoWayAuthenticationPlugin[NUM_PEERS];
|
||||
int main(void)
|
||||
{
|
||||
for (int i=0; i < NUM_PEERS; i++)
|
||||
rakPeer[i]= SLNet::RakPeerInterface::GetInstance();
|
||||
|
||||
printf("This project tests and demonstrates the two way authentication plugin.\n");
|
||||
printf("Difficulty: Beginner\n\n");
|
||||
|
||||
// Initialize the message handlers
|
||||
for (unsigned short peerIndex=0; peerIndex < NUM_PEERS; peerIndex++)
|
||||
{
|
||||
twoWayAuthenticationPlugin[peerIndex]= SLNet::OP_NEW<SLNet::TwoWayAuthentication>(_FILE_AND_LINE_);
|
||||
rakPeer[peerIndex]->AttachPlugin(twoWayAuthenticationPlugin[peerIndex]);
|
||||
rakPeer[peerIndex]->SetMaximumIncomingConnections(NUM_PEERS);
|
||||
}
|
||||
|
||||
// Initialize the peers
|
||||
for (unsigned short peerIndex=0; peerIndex < NUM_PEERS; peerIndex++)
|
||||
{
|
||||
SLNet::SocketDescriptor socketDescriptor(60000+peerIndex,0);
|
||||
rakPeer[peerIndex]->Startup(NUM_PEERS, &socketDescriptor, 1);
|
||||
}
|
||||
|
||||
// Connect each peer to the prior peer
|
||||
for (unsigned short peerIndex=1; peerIndex < NUM_PEERS; peerIndex++)
|
||||
{
|
||||
rakPeer[peerIndex]->Connect("127.0.0.1", 60000+peerIndex-1, 0, 0);
|
||||
}
|
||||
|
||||
RakSleep(100);
|
||||
|
||||
|
||||
printf("Peers initialized and connected.\n");
|
||||
twoWayAuthenticationPlugin[0]->AddPassword("PWD0", "Password0");
|
||||
twoWayAuthenticationPlugin[0]->AddPassword("PWD1", "Password1");
|
||||
twoWayAuthenticationPlugin[1]->AddPassword("PWD0", "Password0");
|
||||
SLNET_VERIFY(twoWayAuthenticationPlugin[0]->Challenge("PWD0", rakPeer[0]->GetGUIDFromIndex(0)));
|
||||
printf("Stage 0, instance 0 challenges instance 1 (should pass)\n");
|
||||
int stage=0;
|
||||
int stage4FailureCount=0;
|
||||
int passCount=0;
|
||||
bool quit=false;
|
||||
|
||||
while (!quit)
|
||||
{
|
||||
SLNet::Packet *packet;
|
||||
for (unsigned short peerIndex=0; peerIndex < NUM_PEERS; peerIndex++)
|
||||
{
|
||||
packet=rakPeer[peerIndex]->Receive();
|
||||
if (packet)
|
||||
{
|
||||
switch (packet->data[0])
|
||||
{
|
||||
case ID_TWO_WAY_AUTHENTICATION_INCOMING_CHALLENGE_SUCCESS:
|
||||
case ID_TWO_WAY_AUTHENTICATION_OUTGOING_CHALLENGE_SUCCESS:
|
||||
{
|
||||
SLNet::BitStream bs(packet->data, packet->length, false);
|
||||
bs.IgnoreBytes(sizeof(SLNet::MessageID));
|
||||
SLNet::RakString password;
|
||||
bs.Read(password);
|
||||
if (packet->data[0]==ID_TWO_WAY_AUTHENTICATION_INCOMING_CHALLENGE_SUCCESS)
|
||||
printf("ID_TWO_WAY_AUTHENTICATION_INCOMING_CHALLENGE_SUCCESS with %s from %s\n", password.C_String(), packet->systemAddress.ToString(true));
|
||||
else
|
||||
printf("ID_TWO_WAY_AUTHENTICATION_OUTGOING_CHALLENGE_SUCCESS with %s from %s\n", password.C_String(), packet->systemAddress.ToString(true));
|
||||
if (++passCount==2)
|
||||
{
|
||||
if (stage<=2)
|
||||
{
|
||||
if (stage==0)
|
||||
{
|
||||
printf("Stage 1, instance 1 challenges instance 0 (should pass)\n");
|
||||
twoWayAuthenticationPlugin[1]->Challenge("PWD0", rakPeer[1]->GetGUIDFromIndex(0));
|
||||
passCount=0;
|
||||
// stage==1
|
||||
}
|
||||
else if (stage==1)
|
||||
{
|
||||
printf("Stage 2, instance 1 re-challenges instance 0 (should pass)\n");
|
||||
twoWayAuthenticationPlugin[1]->Challenge("PWD0", rakPeer[1]->GetGUIDFromIndex(0));
|
||||
passCount=0;
|
||||
// stage==2
|
||||
}
|
||||
else
|
||||
{
|
||||
printf("Stage 3, instance 0 challenges with bad password (call should fail)\n");
|
||||
if (twoWayAuthenticationPlugin[0]->Challenge("PWD3", rakPeer[0]->GetGUIDFromIndex(0))==false)
|
||||
{
|
||||
printf("Passed stage 3\n");
|
||||
stage++;
|
||||
printf("Stage 4, instance 0 challenges with unknown password (should fail twice)\n");
|
||||
twoWayAuthenticationPlugin[0]->Challenge("PWD1", rakPeer[0]->GetGUIDFromIndex(0));
|
||||
}
|
||||
else
|
||||
{
|
||||
printf("Failed stage 3, Challenge() did not return false\n");
|
||||
}
|
||||
}
|
||||
stage++;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
break;
|
||||
case ID_TWO_WAY_AUTHENTICATION_INCOMING_CHALLENGE_FAILURE:
|
||||
{
|
||||
printf("ID_TWO_WAY_AUTHENTICATION_INCOMING_CHALLENGE_FAILED from %s\n", packet->systemAddress.ToString(true));
|
||||
if (stage!=4)
|
||||
{
|
||||
printf("Failed stage %i\n", stage);
|
||||
}
|
||||
else
|
||||
{
|
||||
if (++stage4FailureCount==2)
|
||||
quit=true;
|
||||
}
|
||||
}
|
||||
break;
|
||||
case ID_TWO_WAY_AUTHENTICATION_OUTGOING_CHALLENGE_TIMEOUT:
|
||||
{
|
||||
SLNet::BitStream bs(packet->data, packet->length, false);
|
||||
bs.IgnoreBytes(sizeof(SLNet::MessageID));
|
||||
SLNet::RakString password;
|
||||
bs.Read(password);
|
||||
printf("ID_TWO_WAY_AUTHENTICATION_OUTGOING_CHALLENGE_TIMEOUT with %s from %s\n", password.C_String(), packet->systemAddress.ToString(true));
|
||||
printf("Failed stage %i\n", stage);
|
||||
}
|
||||
break;
|
||||
case ID_TWO_WAY_AUTHENTICATION_OUTGOING_CHALLENGE_FAILURE:
|
||||
{
|
||||
SLNet::BitStream bs(packet->data, packet->length, false);
|
||||
bs.IgnoreBytes(sizeof(SLNet::MessageID));
|
||||
SLNet::RakString password;
|
||||
bs.Read(password);
|
||||
printf("ID_TWO_WAY_AUTHENTICATION_OUTGOING_CHALLENGE_FAILED with %s from %s\n", password.C_String(), packet->systemAddress.ToString(true));
|
||||
if (stage!=4)
|
||||
{
|
||||
printf("Failed stage %i\n", stage);
|
||||
}
|
||||
else
|
||||
{
|
||||
if (++stage4FailureCount==2)
|
||||
quit=true;
|
||||
}
|
||||
}
|
||||
break;
|
||||
}
|
||||
rakPeer[peerIndex]->DeallocatePacket(packet);
|
||||
}
|
||||
}
|
||||
|
||||
RakSleep(30);
|
||||
}
|
||||
|
||||
|
||||
for (int i=0; i < NUM_PEERS; i++)
|
||||
SLNet::RakPeerInterface::DestroyInstance(rakPeer[i]);
|
||||
|
||||
for (unsigned short peerIndex=0; peerIndex < NUM_PEERS; peerIndex++)
|
||||
SLNet::OP_DELETE(twoWayAuthenticationPlugin[peerIndex], _FILE_AND_LINE_);
|
||||
|
||||
return 1;
|
||||
}
|
||||
Reference in New Issue
Block a user