From c8e5235d1d4500b0c6d65371078cd02aaf28078d Mon Sep 17 00:00:00 2001
From: josh <josh@elixxir.io>
Date: Thu, 2 Jun 2022 13:10:07 -0700
Subject: [PATCH] Improve documentation & organization of auth package

---
 auth/confirm.go                  | 183 ++++++++++++++++---------------
 auth/interface.go                |  55 ++++++++++
 auth/state.go                    |  67 ++---------
 auth/store/sentRequestHandler.go |   2 +-
 e2e/sendUnsafe_test.go           | 104 ++++++++++++++++++
 5 files changed, 262 insertions(+), 149 deletions(-)
 create mode 100644 e2e/sendUnsafe_test.go

diff --git a/auth/confirm.go b/auth/confirm.go
index d95658078..1a7ea2ebd 100644
--- a/auth/confirm.go
+++ b/auth/confirm.go
@@ -51,97 +51,98 @@ func (s *state) confirm(partner contact.Contact, serviceTag string) (
 	var sentRound id.Round
 
 	//run the handler
-	err := s.store.HandleReceivedRequest(partner.ID, func(rr *store.ReceivedRequest) error {
-		// verify the passed contact matches what is stored
-		if rr.GetContact().DhPubKey.Cmp(partner.DhPubKey) != 0 {
-			return errors.New("pending Auth Request has different " +
-				"pubkey than stored")
-		}
-
-		/*cryptographic generation*/
-
-		// generate ownership proof
-		ownership := cAuth.MakeOwnershipProof(s.e2e.GetHistoricalDHPrivkey(),
-			partner.DhPubKey, s.e2e.GetGroup())
-
-		rng := s.rng.GetStream()
-
-		// generate new keypair
-		dhPriv, dhPub := genDHKeys(s.e2e.GetGroup(), rng)
-		sidhVariant := util.GetCompatibleSIDHVariant(
-			rr.GetTheirSidHPubKeyA().Variant())
-		sidhPriv, sidhPub := util.GenerateSIDHKeyPair(sidhVariant, rng)
-
-		rng.Close()
-
-		/*construct message*/
-		// we build the payload before we save because it is technically fallible
-		// which can get into a bricked state if it fails
-		baseFmt := newBaseFormat(s.net.GetMaxMessageLength(),
-			s.e2e.GetGroup().GetP().ByteLen())
-		ecrFmt := newEcrFormat(baseFmt.GetEcrPayloadLen())
-
-		// setup the encrypted payload
-		ecrFmt.SetOwnership(ownership)
-		ecrFmt.SetSidHPubKey(sidhPub)
-		// confirmation has no custom payload
-
-		// encrypt the payload
-		ecrPayload, mac := cAuth.Encrypt(dhPriv, partner.DhPubKey,
-			ecrFmt.data, s.e2e.GetGroup())
-
-		// get the fingerprint from the old ownership proof
-		fp := cAuth.MakeOwnershipProofFP(rr.GetContact().OwnershipProof)
-
-		// final construction
-		baseFmt.SetEcrPayload(ecrPayload)
-		baseFmt.SetPubKey(dhPub)
-
-		jww.TRACE.Printf("SendConfirm PARTNERPUBKEY: %v",
-			partner.DhPubKey.TextVerbose(16, 0))
-		jww.TRACE.Printf("SendConfirm MYPUBKEY: %v", dhPub.TextVerbose(16, 0))
-
-		jww.TRACE.Printf("SendConfirm ECRPAYLOAD: %v", baseFmt.GetEcrPayload())
-		jww.TRACE.Printf("SendConfirm MAC: %v", mac)
-
-		// warning: channel can get into a bricked state if the first save occurs and
-		// the second does not or the two occur and the storage into critical
-		// messages does not occur
-
-		// create local relationship
-		p := session.GetDefaultParams()
-		_, err := s.e2e.AddPartner(partner.ID, partner.DhPubKey, dhPriv,
-			rr.GetTheirSidHPubKeyA(), sidhPriv, p, p)
-		if err != nil {
-			em := fmt.Sprintf("Failed to create channel with partner (%s) "+
-				"on confirmation, this is likley a replay: %s",
-				partner.ID, err.Error())
-			jww.WARN.Print(em)
-			s.event.Report(10, "Auth", "SendConfirmError", em)
-		}
-
-		s.backupTrigger("confirmed authenticated channel")
-
-		jww.INFO.Printf("Confirming Auth from %s to %s, msgDigest: %s",
-			partner.ID, s.e2e.GetReceptionID(),
-			format.DigestContents(baseFmt.Marshal()))
-
-		//service used for notification only
-
-		/*send message*/
-		if err = s.store.StoreConfirmation(partner.ID, baseFmt.Marshal(),
-			mac, fp); err == nil {
-			jww.WARN.Printf("Failed to store confirmation for replay "+
-				"for relationship between %s and %s, cannot be replayed: %+v",
-				partner.ID, s.e2e.GetReceptionID(), err)
-		}
-
-		//send confirmation
-		sentRound, err = sendAuthConfirm(s.net, partner.ID, fp,
-			baseFmt.Marshal(), mac, s.event, serviceTag)
-
-		return err
-	})
+	err := s.store.HandleReceivedRequest(partner.ID,
+		func(rr *store.ReceivedRequest) error {
+			// verify the passed contact matches what is stored
+			if rr.GetContact().DhPubKey.Cmp(partner.DhPubKey) != 0 {
+				return errors.New("pending Auth Request has different " +
+					"pubkey than stored")
+			}
+
+			/*cryptographic generation*/
+
+			// generate ownership proof
+			ownership := cAuth.MakeOwnershipProof(s.e2e.GetHistoricalDHPrivkey(),
+				partner.DhPubKey, s.e2e.GetGroup())
+
+			rng := s.rng.GetStream()
+
+			// generate new keypair
+			dhPriv, dhPub := genDHKeys(s.e2e.GetGroup(), rng)
+			sidhVariant := util.GetCompatibleSIDHVariant(
+				rr.GetTheirSidHPubKeyA().Variant())
+			sidhPriv, sidhPub := util.GenerateSIDHKeyPair(sidhVariant, rng)
+
+			rng.Close()
+
+			/*construct message*/
+			// we build the payload before we save because it is technically
+			// fallible which can get into a bricked state if it fails
+			baseFmt := newBaseFormat(s.net.GetMaxMessageLength(),
+				s.e2e.GetGroup().GetP().ByteLen())
+			ecrFmt := newEcrFormat(baseFmt.GetEcrPayloadLen())
+
+			// setup the encrypted payload
+			ecrFmt.SetOwnership(ownership)
+			ecrFmt.SetSidHPubKey(sidhPub)
+			// confirmation has no custom payload
+
+			// encrypt the payload
+			ecrPayload, mac := cAuth.Encrypt(dhPriv, partner.DhPubKey,
+				ecrFmt.data, s.e2e.GetGroup())
+
+			// get the fingerprint from the old ownership proof
+			fp := cAuth.MakeOwnershipProofFP(rr.GetContact().OwnershipProof)
+
+			// final construction
+			baseFmt.SetEcrPayload(ecrPayload)
+			baseFmt.SetPubKey(dhPub)
+
+			jww.TRACE.Printf("SendConfirm PARTNERPUBKEY: %v",
+				partner.DhPubKey.TextVerbose(16, 0))
+			jww.TRACE.Printf("SendConfirm MYPUBKEY: %v", dhPub.TextVerbose(16, 0))
+
+			jww.TRACE.Printf("SendConfirm ECRPAYLOAD: %v", baseFmt.GetEcrPayload())
+			jww.TRACE.Printf("SendConfirm MAC: %v", mac)
+
+			// warning: channel can get into a bricked state if the first save
+			// occurs and the second does not or the two occur and the storage
+			// into critical messages does not occur
+
+			// create local relationship
+			p := session.GetDefaultParams()
+			_, err := s.e2e.AddPartner(partner.ID, partner.DhPubKey, dhPriv,
+				rr.GetTheirSidHPubKeyA(), sidhPriv, p, p)
+			if err != nil {
+				em := fmt.Sprintf("Failed to create channel with partner (%s) "+
+					"on confirmation, this is likley a replay: %s",
+					partner.ID, err.Error())
+				jww.WARN.Print(em)
+				s.event.Report(10, "Auth", "SendConfirmError", em)
+			}
+
+			s.backupTrigger("confirmed authenticated channel")
+
+			jww.INFO.Printf("Confirming Auth from %s to %s, msgDigest: %s",
+				partner.ID, s.e2e.GetReceptionID(),
+				format.DigestContents(baseFmt.Marshal()))
+
+			//service used for notification only
+
+			/*send message*/
+			if err = s.store.StoreConfirmation(partner.ID, baseFmt.Marshal(),
+				mac, fp); err == nil {
+				jww.WARN.Printf("Failed to store confirmation for replay "+
+					"for relationship between %s and %s, cannot be replayed: %+v",
+					partner.ID, s.e2e.GetReceptionID(), err)
+			}
+
+			//send confirmation
+			sentRound, err = sendAuthConfirm(s.net, partner.ID, fp,
+				baseFmt.Marshal(), mac, s.event, serviceTag)
+
+			return err
+		})
 	return sentRound, err
 }
 
diff --git a/auth/interface.go b/auth/interface.go
index b8ea8865c..92ad54b77 100644
--- a/auth/interface.go
+++ b/auth/interface.go
@@ -1,10 +1,21 @@
 package auth
 
 import (
+	"github.com/cloudflare/circl/dh/sidh"
+	"gitlab.com/elixxir/client/cmix"
+	"gitlab.com/elixxir/client/cmix/identity"
+	"gitlab.com/elixxir/client/cmix/identity/receptionID"
+	"gitlab.com/elixxir/client/cmix/message"
+	"gitlab.com/elixxir/client/cmix/rounds"
 	"gitlab.com/elixxir/client/e2e"
+	"gitlab.com/elixxir/client/e2e/ratchet/partner"
+	"gitlab.com/elixxir/client/e2e/ratchet/partner/session"
 	"gitlab.com/elixxir/crypto/contact"
+	"gitlab.com/elixxir/crypto/cyclic"
 	"gitlab.com/elixxir/primitives/fact"
+	"gitlab.com/elixxir/primitives/format"
 	"gitlab.com/xx_network/primitives/id"
+	"gitlab.com/xx_network/primitives/id/ephemeral"
 )
 
 type State interface {
@@ -84,3 +95,47 @@ type State interface {
 	// VerifyOwnership checks if the received ownership proof is valid
 	VerifyOwnership(received, verified contact.Contact, e2e e2e.Handler) bool
 }
+
+// Callbacks is the interface for auth callback methods.
+type Callbacks interface {
+	Request(partner contact.Contact, receptionID receptionID.EphemeralIdentity,
+		round rounds.Round)
+	Confirm(partner contact.Contact, receptionID receptionID.EphemeralIdentity,
+		round rounds.Round)
+	Reset(partner contact.Contact, receptionID receptionID.EphemeralIdentity,
+		round rounds.Round)
+}
+
+// cmixClient is a sub-interface of cmix.Client with
+// methods relevant to this package.
+type cmixClient interface {
+	IsHealthy() bool
+	GetMaxMessageLength() int
+	AddService(clientID *id.ID, newService message.Service,
+		response message.Processor)
+	DeleteService(clientID *id.ID, toDelete message.Service,
+		processor message.Processor)
+	GetIdentity(get *id.ID) (identity.TrackedID, error)
+	AddFingerprint(identity *id.ID, fingerprint format.Fingerprint,
+		mp message.Processor) error
+	DeleteFingerprint(identity *id.ID, fingerprint format.Fingerprint)
+	Send(recipient *id.ID, fingerprint format.Fingerprint,
+		service message.Service, payload, mac []byte, cmixParams cmix.CMIXParams) (
+		id.Round, ephemeral.Id, error)
+}
+
+// e2eHandler is a sub-interface of e2e.Handler containing
+// methods relevant to this package.
+type e2eHandler interface {
+	GetHistoricalDHPubkey() *cyclic.Int
+	GetHistoricalDHPrivkey() *cyclic.Int
+	GetGroup() *cyclic.Group
+	AddPartner(partnerID *id.ID,
+		partnerPubKey, myPrivKey *cyclic.Int,
+		partnerSIDHPubKey *sidh.PublicKey,
+		mySIDHPrivKey *sidh.PrivateKey, sendParams,
+		receiveParams session.Params) (partner.Manager, error)
+	GetPartner(partnerID *id.ID) (partner.Manager, error)
+	DeletePartner(partnerId *id.ID) error
+	GetReceptionID() *id.ID
+}
diff --git a/auth/state.go b/auth/state.go
index 2be3d4d6b..e2da71073 100644
--- a/auth/state.go
+++ b/auth/state.go
@@ -10,27 +10,19 @@ package auth
 import (
 	"encoding/base64"
 
-	"github.com/cloudflare/circl/dh/sidh"
 	"github.com/pkg/errors"
 	"gitlab.com/elixxir/client/auth/store"
 	"gitlab.com/elixxir/client/cmix"
-	"gitlab.com/elixxir/client/cmix/identity"
 	"gitlab.com/elixxir/client/cmix/identity/receptionID"
 	"gitlab.com/elixxir/client/cmix/message"
-	"gitlab.com/elixxir/client/cmix/rounds"
 	"gitlab.com/elixxir/client/e2e"
-	"gitlab.com/elixxir/client/e2e/ratchet/partner"
-	"gitlab.com/elixxir/client/e2e/ratchet/partner/session"
 	"gitlab.com/elixxir/client/event"
 	"gitlab.com/elixxir/client/storage/versioned"
-	"gitlab.com/elixxir/crypto/contact"
-	"gitlab.com/elixxir/crypto/cyclic"
 	"gitlab.com/elixxir/crypto/fastRNG"
-	"gitlab.com/elixxir/primitives/format"
 	"gitlab.com/xx_network/primitives/id"
-	"gitlab.com/xx_network/primitives/id/ephemeral"
 )
 
+// state is an implementation of the State interface.
 type state struct {
 	callbacks Callbacks
 
@@ -46,45 +38,6 @@ type state struct {
 	backupTrigger func(reason string)
 }
 
-type cmixClient interface {
-	IsHealthy() bool
-	GetMaxMessageLength() int
-	AddService(clientID *id.ID, newService message.Service,
-		response message.Processor)
-	DeleteService(clientID *id.ID, toDelete message.Service,
-		processor message.Processor)
-	GetIdentity(get *id.ID) (identity.TrackedID, error)
-	AddFingerprint(identity *id.ID, fingerprint format.Fingerprint,
-		mp message.Processor) error
-	DeleteFingerprint(identity *id.ID, fingerprint format.Fingerprint)
-	Send(recipient *id.ID, fingerprint format.Fingerprint,
-		service message.Service, payload, mac []byte, cmixParams cmix.CMIXParams) (
-		id.Round, ephemeral.Id, error)
-}
-
-type e2eHandler interface {
-	GetHistoricalDHPubkey() *cyclic.Int
-	GetHistoricalDHPrivkey() *cyclic.Int
-	GetGroup() *cyclic.Group
-	AddPartner(partnerID *id.ID,
-		partnerPubKey, myPrivKey *cyclic.Int,
-		partnerSIDHPubKey *sidh.PublicKey,
-		mySIDHPrivKey *sidh.PrivateKey, sendParams,
-		receiveParams session.Params) (partner.Manager, error)
-	GetPartner(partnerID *id.ID) (partner.Manager, error)
-	DeletePartner(partnerId *id.ID) error
-	GetReceptionID() *id.ID
-}
-
-type Callbacks interface {
-	Request(partner contact.Contact, receptionID receptionID.EphemeralIdentity,
-		round rounds.Round)
-	Confirm(partner contact.Contact, receptionID receptionID.EphemeralIdentity,
-		round rounds.Round)
-	Reset(partner contact.Contact, receptionID receptionID.EphemeralIdentity,
-		round rounds.Round)
-}
-
 // NewState loads the auth state or creates new auth state if one cannot be
 // found.
 // Bases its reception identity and keys off of what is found in e2e.
@@ -92,8 +45,8 @@ type Callbacks interface {
 // Parameters:
 //   The params object passed in determines the services that will be used
 //   to pick up requests and signal notifications. These are unique to an
-//   identity, so multiple auth states with the same service tags with different
-//   identities can run simultaneously.
+//   identity, so multiple auth states with the same service tags with
+//   different identities can run simultaneously.
 //   Default parameters can be retrieved via GetDefaultParameters()
 // Temporary:
 //   In some cases, for example client <-> server communications, connections
@@ -108,10 +61,9 @@ func NewState(kv *versioned.KV, net cmix.Client, e2e e2e.Handler,
 		kv, net, e2e, rng, event, params, callbacks, backupTrigger)
 }
 
-// NewStateLegacy loads the auth state or creates new auth state if one cannot be
-// found.
-// Bases its reception identity and keys off of what is found in e2e.
-// Does not modify the kv prefix for backwards compatibility
+// NewStateLegacy loads the auth state or creates new auth state if one cannot
+// be found. Bases its reception identity and keys off of what is found in e2e.
+// Does not modify the kv prefix for backwards compatibility.
 // Otherwise, acts the same as NewState
 func NewStateLegacy(kv *versioned.KV, net cmix.Client, e2e e2e.Handler,
 	rng *fastRNG.StreamGenerator, event event.Reporter, params Param,
@@ -152,13 +104,14 @@ func NewStateLegacy(kv *versioned.KV, net cmix.Client, e2e e2e.Handler,
 	return s, nil
 }
 
-// CallAllReceivedRequests will iterate through all pending contact requests and replay
-// them on the callbacks.
+// CallAllReceivedRequests will iterate through all pending contact requests
+// and replay them on the callbacks.
 func (s *state) CallAllReceivedRequests() {
 	rrList := s.store.GetAllReceivedRequests()
 	for i := range rrList {
 		rr := rrList[i]
-		eph := receptionID.BuildIdentityFromRound(rr.GetContact().ID, rr.GetRound())
+		eph := receptionID.BuildIdentityFromRound(rr.GetContact().ID,
+			rr.GetRound())
 		s.callbacks.Request(rr.GetContact(), eph, rr.GetRound())
 	}
 }
diff --git a/auth/store/sentRequestHandler.go b/auth/store/sentRequestHandler.go
index 1f22c53a2..4a8afac3e 100644
--- a/auth/store/sentRequestHandler.go
+++ b/auth/store/sentRequestHandler.go
@@ -1,6 +1,6 @@
 package store
 
-// SentRequestHandler allows the lower fevel to assign and remove services
+// SentRequestHandler allows the lower level to assign and remove services
 type SentRequestHandler interface {
 	Add(sr *SentRequest)
 	Delete(sr *SentRequest)
diff --git a/e2e/sendUnsafe_test.go b/e2e/sendUnsafe_test.go
new file mode 100644
index 000000000..ab8fac2b8
--- /dev/null
+++ b/e2e/sendUnsafe_test.go
@@ -0,0 +1,104 @@
+///////////////////////////////////////////////////////////////////////////////
+// Copyright © 2020 xx network SEZC                                          //
+//                                                                           //
+// Use of this source code is governed by a license that can be found in the //
+// LICENSE file                                                              //
+///////////////////////////////////////////////////////////////////////////////
+
+package e2e
+
+import (
+	"gitlab.com/elixxir/client/catalog"
+	"gitlab.com/elixxir/client/e2e/parse"
+	"gitlab.com/elixxir/client/e2e/ratchet"
+	"gitlab.com/elixxir/client/e2e/receive"
+	"gitlab.com/elixxir/client/e2e/rekey"
+	"gitlab.com/elixxir/client/storage/versioned"
+	dh "gitlab.com/elixxir/crypto/diffieHellman"
+	"gitlab.com/elixxir/crypto/fastRNG"
+	"gitlab.com/elixxir/ekv"
+	"gitlab.com/xx_network/crypto/csprng"
+	"gitlab.com/xx_network/primitives/id"
+	"testing"
+)
+
+func TestManager_SendUnsafe(t *testing.T) {
+	streamGen := fastRNG.NewStreamGenerator(12, 1024, csprng.NewSystemRNG)
+	rng := streamGen.GetStream()
+	defer rng.Close()
+	netHandler := newMockCmixHandler()
+
+	// Generate new E2E manager
+	myKv := versioned.NewKV(ekv.MakeMemstore())
+	myID := id.NewIdFromString("myID", id.User, t)
+	myNet := newMockCmix(myID, netHandler, t)
+	m1 := &manager{
+		Switchboard: receive.New(),
+		partitioner: parse.NewPartitioner(myKv, myNet.GetMaxMessageLength()),
+		net:         myNet,
+		myID:        myID,
+		events:      mockEventsManager{},
+		grp:         myNet.GetInstance().GetE2EGroup(),
+		rekeyParams: rekey.GetDefaultParams(),
+	}
+
+	myPrivKey := dh.GeneratePrivateKey(
+		dh.DefaultPrivateKeyLength, m1.grp, rng)
+	err := ratchet.New(myKv, myID, myPrivKey, m1.grp)
+	if err != nil {
+		t.Errorf("Failed to generate new ratchet: %+v", err)
+	}
+
+	myFpGen := &fpGenerator{m1}
+	myServices := newMockServices()
+
+	m1.Ratchet, err = ratchet.Load(
+		myKv, myID, m1.grp, myFpGen, myServices, streamGen)
+
+	// Generate new E2E manager
+	partnerKv := versioned.NewKV(ekv.MakeMemstore())
+	partnerID := id.NewIdFromString("partnerID", id.User, t)
+	partnerNet := newMockCmix(partnerID, netHandler, t)
+	m2 := &manager{
+		Switchboard: receive.New(),
+		partitioner: parse.NewPartitioner(partnerKv, partnerNet.GetMaxMessageLength()),
+		net:         partnerNet,
+		myID:        partnerID,
+		events:      mockEventsManager{},
+		grp:         partnerNet.GetInstance().GetE2EGroup(),
+		rekeyParams: rekey.GetDefaultParams(),
+	}
+
+	receiveChan := make(chan receive.Message, 10)
+	m2.Switchboard.RegisterListener(partnerID, catalog.NoType, &mockListener{receiveChan})
+
+	partnerPrivKey := dh.GeneratePrivateKey(
+		dh.DefaultPrivateKeyLength, m2.grp, rng)
+	err = ratchet.New(partnerKv, partnerID, partnerPrivKey, m2.grp)
+	if err != nil {
+		t.Errorf("Failed to generate new ratchet: %+v", err)
+	}
+
+	partnerFpGen := &fpGenerator{m2}
+	partnerServices := newMockServices()
+
+	m1.Ratchet, err = ratchet.Load(
+		partnerKv, partnerID, m2.grp, partnerFpGen, partnerServices, streamGen)
+
+	// Generate partner identity and add partner
+	partnerPubKey, partnerSidhPubKey, mySidhPrivKey, sessionParams :=
+		genPartnerKeys(partnerPrivKey, m1.grp, rng, t)
+	_, err = m1.Ratchet.AddPartner(partnerID, partnerPubKey, myPrivKey,
+		partnerSidhPubKey, mySidhPrivKey, sessionParams, sessionParams)
+	if err != nil {
+		t.Errorf("Failed to add partner: %+v", err)
+	}
+
+	payload := []byte("My Payload")
+	p := GetDefaultParams()
+
+	_, _, err = m1.sendUnsafe(catalog.NoType, partnerID, payload, p)
+	if err != nil {
+		t.Fatalf("sendUnsafe error: %v", err)
+	}
+}
-- 
GitLab