367c329b88
* whisper: fixes warnings from the code linter * whisper: more non-API-breaking changes The remaining lint errors are because of auto-generated files and one is because an exported function has a non- exported return type. Changing this would break the API, and will be part of another commit for easier reversal. * whisper: un-export NewSentMessage to please the linter This is an API change, which is why it's in its own commit. This change was initiated after the linter complained that the returned type wasn't exported. I chose to un-export the function instead of exporting the type, because that type is an implementation detail that I would like to change in the near future to make the code more readable and with an increased coverage. * whisper: update gencodec output after upgrading it to new lint standards
475 lines
12 KiB
Go
475 lines
12 KiB
Go
// Copyright 2016 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package whisperv6
|
|
|
|
import (
|
|
"bytes"
|
|
mrand "math/rand"
|
|
"testing"
|
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
)
|
|
|
|
func generateMessageParams() (*MessageParams, error) {
|
|
// set all the parameters except p.Dst and p.Padding
|
|
|
|
buf := make([]byte, 4)
|
|
mrand.Read(buf)
|
|
sz := mrand.Intn(400)
|
|
|
|
var p MessageParams
|
|
p.PoW = 0.01
|
|
p.WorkTime = 1
|
|
p.TTL = uint32(mrand.Intn(1024))
|
|
p.Payload = make([]byte, sz)
|
|
p.KeySym = make([]byte, aesKeyLength)
|
|
mrand.Read(p.Payload)
|
|
mrand.Read(p.KeySym)
|
|
p.Topic = BytesToTopic(buf)
|
|
|
|
var err error
|
|
p.Src, err = crypto.GenerateKey()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &p, nil
|
|
}
|
|
|
|
func singleMessageTest(t *testing.T, symmetric bool) {
|
|
params, err := generateMessageParams()
|
|
if err != nil {
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
key, err := crypto.GenerateKey()
|
|
if err != nil {
|
|
t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
if !symmetric {
|
|
params.KeySym = nil
|
|
params.Dst = &key.PublicKey
|
|
}
|
|
|
|
text := make([]byte, 0, 512)
|
|
text = append(text, params.Payload...)
|
|
|
|
msg, err := newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
env, err := msg.Wrap(params)
|
|
if err != nil {
|
|
t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
var decrypted *ReceivedMessage
|
|
if symmetric {
|
|
decrypted, err = env.OpenSymmetric(params.KeySym)
|
|
} else {
|
|
decrypted, err = env.OpenAsymmetric(key)
|
|
}
|
|
|
|
if err != nil {
|
|
t.Fatalf("failed to encrypt with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
if !decrypted.Validate() {
|
|
t.Fatalf("failed to validate with seed %d.", seed)
|
|
}
|
|
|
|
if !bytes.Equal(text, decrypted.Payload) {
|
|
t.Fatalf("failed with seed %d: compare payload.", seed)
|
|
}
|
|
if !isMessageSigned(decrypted.Raw[0]) {
|
|
t.Fatalf("failed with seed %d: unsigned.", seed)
|
|
}
|
|
if len(decrypted.Signature) != signatureLength {
|
|
t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
|
|
}
|
|
if !IsPubKeyEqual(decrypted.Src, ¶ms.Src.PublicKey) {
|
|
t.Fatalf("failed with seed %d: signature mismatch.", seed)
|
|
}
|
|
}
|
|
|
|
func TestMessageEncryption(t *testing.T) {
|
|
InitSingleTest()
|
|
|
|
var symmetric bool
|
|
for i := 0; i < 256; i++ {
|
|
singleMessageTest(t, symmetric)
|
|
symmetric = !symmetric
|
|
}
|
|
}
|
|
|
|
func TestMessageWrap(t *testing.T) {
|
|
seed = int64(1777444222)
|
|
mrand.Seed(seed)
|
|
target := 128.0
|
|
|
|
params, err := generateMessageParams()
|
|
if err != nil {
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
msg, err := newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
params.TTL = 1
|
|
params.WorkTime = 12
|
|
params.PoW = target
|
|
env, err := msg.Wrap(params)
|
|
if err != nil {
|
|
t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
pow := env.PoW()
|
|
if pow < target {
|
|
t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
|
|
}
|
|
|
|
// set PoW target too high, expect error
|
|
msg2, err := newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
params.TTL = 1000000
|
|
params.WorkTime = 1
|
|
params.PoW = 10000000.0
|
|
_, err = msg2.Wrap(params)
|
|
if err == nil {
|
|
t.Fatalf("unexpectedly reached the PoW target with seed %d.", seed)
|
|
}
|
|
}
|
|
|
|
func TestMessageSeal(t *testing.T) {
|
|
// this test depends on deterministic choice of seed (1976726903)
|
|
seed = int64(1976726903)
|
|
mrand.Seed(seed)
|
|
|
|
params, err := generateMessageParams()
|
|
if err != nil {
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
msg, err := newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
params.TTL = 1
|
|
|
|
env := NewEnvelope(params.TTL, params.Topic, msg)
|
|
if err != nil {
|
|
t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
env.Expiry = uint32(seed) // make it deterministic
|
|
target := 32.0
|
|
params.WorkTime = 4
|
|
params.PoW = target
|
|
env.Seal(params)
|
|
|
|
env.calculatePoW(0)
|
|
pow := env.PoW()
|
|
if pow < target {
|
|
t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
|
|
}
|
|
|
|
params.WorkTime = 1
|
|
params.PoW = 1000000000.0
|
|
env.Seal(params)
|
|
env.calculatePoW(0)
|
|
pow = env.PoW()
|
|
if pow < 2*target {
|
|
t.Fatalf("failed Wrap with seed %d: pow too small %f.", seed, pow)
|
|
}
|
|
}
|
|
|
|
func TestEnvelopeOpen(t *testing.T) {
|
|
InitSingleTest()
|
|
|
|
var symmetric bool
|
|
for i := 0; i < 256; i++ {
|
|
singleEnvelopeOpenTest(t, symmetric)
|
|
symmetric = !symmetric
|
|
}
|
|
}
|
|
|
|
func singleEnvelopeOpenTest(t *testing.T, symmetric bool) {
|
|
params, err := generateMessageParams()
|
|
if err != nil {
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
key, err := crypto.GenerateKey()
|
|
if err != nil {
|
|
t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
if !symmetric {
|
|
params.KeySym = nil
|
|
params.Dst = &key.PublicKey
|
|
}
|
|
|
|
text := make([]byte, 0, 512)
|
|
text = append(text, params.Payload...)
|
|
|
|
msg, err := newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
env, err := msg.Wrap(params)
|
|
if err != nil {
|
|
t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
|
|
}
|
|
|
|
var f Filter
|
|
if symmetric {
|
|
f = Filter{KeySym: params.KeySym}
|
|
} else {
|
|
f = Filter{KeyAsym: key}
|
|
}
|
|
decrypted := env.Open(&f)
|
|
if decrypted == nil {
|
|
t.Fatalf("failed to open with seed %d.", seed)
|
|
}
|
|
|
|
if !bytes.Equal(text, decrypted.Payload) {
|
|
t.Fatalf("failed with seed %d: compare payload.", seed)
|
|
}
|
|
if !isMessageSigned(decrypted.Raw[0]) {
|
|
t.Fatalf("failed with seed %d: unsigned.", seed)
|
|
}
|
|
if len(decrypted.Signature) != signatureLength {
|
|
t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
|
|
}
|
|
if !IsPubKeyEqual(decrypted.Src, ¶ms.Src.PublicKey) {
|
|
t.Fatalf("failed with seed %d: signature mismatch.", seed)
|
|
}
|
|
if decrypted.isAsymmetricEncryption() == symmetric {
|
|
t.Fatalf("failed with seed %d: asymmetric %v vs. %v.", seed, decrypted.isAsymmetricEncryption(), symmetric)
|
|
}
|
|
if decrypted.isSymmetricEncryption() != symmetric {
|
|
t.Fatalf("failed with seed %d: symmetric %v vs. %v.", seed, decrypted.isSymmetricEncryption(), symmetric)
|
|
}
|
|
if !symmetric {
|
|
if decrypted.Dst == nil {
|
|
t.Fatalf("failed with seed %d: dst is nil.", seed)
|
|
}
|
|
if !IsPubKeyEqual(decrypted.Dst, &key.PublicKey) {
|
|
t.Fatalf("failed with seed %d: Dst.", seed)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestEncryptWithZeroKey(t *testing.T) {
|
|
InitSingleTest()
|
|
|
|
params, err := generateMessageParams()
|
|
if err != nil {
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
}
|
|
msg, err := newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
params.KeySym = make([]byte, aesKeyLength)
|
|
_, err = msg.Wrap(params)
|
|
if err == nil {
|
|
t.Fatalf("wrapped with zero key, seed: %d.", seed)
|
|
}
|
|
|
|
params, err = generateMessageParams()
|
|
if err != nil {
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
}
|
|
msg, err = newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
params.KeySym = make([]byte, 0)
|
|
_, err = msg.Wrap(params)
|
|
if err == nil {
|
|
t.Fatalf("wrapped with empty key, seed: %d.", seed)
|
|
}
|
|
|
|
params, err = generateMessageParams()
|
|
if err != nil {
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
}
|
|
msg, err = newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
params.KeySym = nil
|
|
_, err = msg.Wrap(params)
|
|
if err == nil {
|
|
t.Fatalf("wrapped with nil key, seed: %d.", seed)
|
|
}
|
|
}
|
|
|
|
func TestRlpEncode(t *testing.T) {
|
|
InitSingleTest()
|
|
|
|
params, err := generateMessageParams()
|
|
if err != nil {
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
}
|
|
msg, err := newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
env, err := msg.Wrap(params)
|
|
if err != nil {
|
|
t.Fatalf("wrapped with zero key, seed: %d.", seed)
|
|
}
|
|
|
|
raw, err := rlp.EncodeToBytes(env)
|
|
if err != nil {
|
|
t.Fatalf("RLP encode failed: %s.", err)
|
|
}
|
|
|
|
var decoded Envelope
|
|
rlp.DecodeBytes(raw, &decoded)
|
|
if err != nil {
|
|
t.Fatalf("RLP decode failed: %s.", err)
|
|
}
|
|
|
|
he := env.Hash()
|
|
hd := decoded.Hash()
|
|
|
|
if he != hd {
|
|
t.Fatalf("Hashes are not equal: %x vs. %x", he, hd)
|
|
}
|
|
}
|
|
|
|
func singlePaddingTest(t *testing.T, padSize int) {
|
|
params, err := generateMessageParams()
|
|
if err != nil {
|
|
t.Fatalf("failed generateMessageParams with seed %d and sz=%d: %s.", seed, padSize, err)
|
|
}
|
|
params.Padding = make([]byte, padSize)
|
|
params.PoW = 0.0000000001
|
|
pad := make([]byte, padSize)
|
|
_, err = mrand.Read(pad)
|
|
if err != nil {
|
|
t.Fatalf("padding is not generated (seed %d): %s", seed, err)
|
|
}
|
|
n := copy(params.Padding, pad)
|
|
if n != padSize {
|
|
t.Fatalf("padding is not copied (seed %d): %s", seed, err)
|
|
}
|
|
msg, err := newSentMessage(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
}
|
|
env, err := msg.Wrap(params)
|
|
if err != nil {
|
|
t.Fatalf("failed to wrap, seed: %d and sz=%d.", seed, padSize)
|
|
}
|
|
f := Filter{KeySym: params.KeySym}
|
|
decrypted := env.Open(&f)
|
|
if decrypted == nil {
|
|
t.Fatalf("failed to open, seed and sz=%d: %d.", seed, padSize)
|
|
}
|
|
if !bytes.Equal(pad, decrypted.Padding) {
|
|
t.Fatalf("padding is not retireved as expected with seed %d and sz=%d:\n[%x]\n[%x].", seed, padSize, pad, decrypted.Padding)
|
|
}
|
|
}
|
|
|
|
func TestPadding(t *testing.T) {
|
|
InitSingleTest()
|
|
|
|
for i := 1; i < 260; i++ {
|
|
singlePaddingTest(t, i)
|
|
}
|
|
|
|
lim := 256 * 256
|
|
for i := lim - 5; i < lim+2; i++ {
|
|
singlePaddingTest(t, i)
|
|
}
|
|
|
|
for i := 0; i < 256; i++ {
|
|
n := mrand.Intn(256*254) + 256
|
|
singlePaddingTest(t, n)
|
|
}
|
|
|
|
for i := 0; i < 256; i++ {
|
|
n := mrand.Intn(256*1024) + 256*256
|
|
singlePaddingTest(t, n)
|
|
}
|
|
}
|
|
|
|
func TestPaddingAppendedToSymMessages(t *testing.T) {
|
|
params := &MessageParams{
|
|
Payload: make([]byte, 246),
|
|
KeySym: make([]byte, aesKeyLength),
|
|
}
|
|
|
|
// Simulate a message with a payload just under 256 so that
|
|
// payload + flag + aesnonce > 256. Check that the result
|
|
// is padded on the next 256 boundary.
|
|
msg := sentMessage{}
|
|
msg.Raw = make([]byte, len(params.Payload)+1+AESNonceLength)
|
|
|
|
err := msg.appendPadding(params)
|
|
|
|
if err != nil {
|
|
t.Fatalf("Error appending padding to message %v", err)
|
|
return
|
|
}
|
|
|
|
if len(msg.Raw) != 512 {
|
|
t.Errorf("Invalid size %d != 512", len(msg.Raw))
|
|
}
|
|
}
|
|
|
|
func TestPaddingAppendedToSymMessagesWithSignature(t *testing.T) {
|
|
params := &MessageParams{
|
|
Payload: make([]byte, 246),
|
|
KeySym: make([]byte, aesKeyLength),
|
|
}
|
|
|
|
pSrc, err := crypto.GenerateKey()
|
|
|
|
if err != nil {
|
|
t.Fatalf("Error creating the signature key %v", err)
|
|
return
|
|
}
|
|
params.Src = pSrc
|
|
|
|
// Simulate a message with a payload just under 256 so that
|
|
// payload + flag + aesnonce > 256. Check that the result
|
|
// is padded on the next 256 boundary.
|
|
msg := sentMessage{}
|
|
msg.Raw = make([]byte, len(params.Payload)+1+AESNonceLength+signatureLength)
|
|
|
|
err = msg.appendPadding(params)
|
|
|
|
if err != nil {
|
|
t.Fatalf("Error appending padding to message %v", err)
|
|
return
|
|
}
|
|
|
|
if len(msg.Raw) != 512 {
|
|
t.Errorf("Invalid size %d != 512", len(msg.Raw))
|
|
}
|
|
}
|