message_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415
  1. // Copyright 2016 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. package whisperv5
  17. import (
  18. "bytes"
  19. mrand "math/rand"
  20. "testing"
  21. "github.com/ethereum/go-ethereum/crypto"
  22. "github.com/ethereum/go-ethereum/rlp"
  23. )
  24. func generateMessageParams() (*MessageParams, error) {
  25. // set all the parameters except p.Dst and p.Padding
  26. buf := make([]byte, 4)
  27. mrand.Read(buf)
  28. sz := mrand.Intn(400)
  29. var p MessageParams
  30. p.PoW = 0.01
  31. p.WorkTime = 1
  32. p.TTL = uint32(mrand.Intn(1024))
  33. p.Payload = make([]byte, sz)
  34. p.KeySym = make([]byte, aesKeyLength)
  35. mrand.Read(p.Payload)
  36. mrand.Read(p.KeySym)
  37. p.Topic = BytesToTopic(buf)
  38. var err error
  39. p.Src, err = crypto.GenerateKey()
  40. if err != nil {
  41. return nil, err
  42. }
  43. return &p, nil
  44. }
  45. func singleMessageTest(t *testing.T, symmetric bool) {
  46. params, err := generateMessageParams()
  47. if err != nil {
  48. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  49. }
  50. key, err := crypto.GenerateKey()
  51. if err != nil {
  52. t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
  53. }
  54. if !symmetric {
  55. params.KeySym = nil
  56. params.Dst = &key.PublicKey
  57. }
  58. text := make([]byte, 0, 512)
  59. text = append(text, params.Payload...)
  60. msg, err := NewSentMessage(params)
  61. if err != nil {
  62. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  63. }
  64. env, err := msg.Wrap(params)
  65. if err != nil {
  66. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  67. }
  68. var decrypted *ReceivedMessage
  69. if symmetric {
  70. decrypted, err = env.OpenSymmetric(params.KeySym)
  71. } else {
  72. decrypted, err = env.OpenAsymmetric(key)
  73. }
  74. if err != nil {
  75. t.Fatalf("failed to encrypt with seed %d: %s.", seed, err)
  76. }
  77. if !decrypted.Validate() {
  78. t.Fatalf("failed to validate with seed %d.", seed)
  79. }
  80. if !bytes.Equal(text, decrypted.Payload) {
  81. t.Fatalf("failed with seed %d: compare payload.", seed)
  82. }
  83. if !isMessageSigned(decrypted.Raw[0]) {
  84. t.Fatalf("failed with seed %d: unsigned.", seed)
  85. }
  86. if len(decrypted.Signature) != signatureLength {
  87. t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
  88. }
  89. if !IsPubKeyEqual(decrypted.Src, &params.Src.PublicKey) {
  90. t.Fatalf("failed with seed %d: signature mismatch.", seed)
  91. }
  92. }
  93. func TestMessageEncryption(t *testing.T) {
  94. InitSingleTest()
  95. var symmetric bool
  96. for i := 0; i < 256; i++ {
  97. singleMessageTest(t, symmetric)
  98. symmetric = !symmetric
  99. }
  100. }
  101. func TestMessageWrap(t *testing.T) {
  102. seed = int64(1777444222)
  103. mrand.Seed(seed)
  104. target := 128.0
  105. params, err := generateMessageParams()
  106. if err != nil {
  107. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  108. }
  109. msg, err := NewSentMessage(params)
  110. if err != nil {
  111. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  112. }
  113. params.TTL = 1
  114. params.WorkTime = 12
  115. params.PoW = target
  116. env, err := msg.Wrap(params)
  117. if err != nil {
  118. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  119. }
  120. pow := env.PoW()
  121. if pow < target {
  122. t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
  123. }
  124. // set PoW target too high, expect error
  125. msg2, err := NewSentMessage(params)
  126. if err != nil {
  127. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  128. }
  129. params.TTL = 1000000
  130. params.WorkTime = 1
  131. params.PoW = 10000000.0
  132. _, err = msg2.Wrap(params)
  133. if err == nil {
  134. t.Fatalf("unexpectedly reached the PoW target with seed %d.", seed)
  135. }
  136. }
  137. func TestMessageSeal(t *testing.T) {
  138. // this test depends on deterministic choice of seed (1976726903)
  139. seed = int64(1976726903)
  140. mrand.Seed(seed)
  141. params, err := generateMessageParams()
  142. if err != nil {
  143. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  144. }
  145. msg, err := NewSentMessage(params)
  146. if err != nil {
  147. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  148. }
  149. params.TTL = 1
  150. aesnonce := make([]byte, 12)
  151. mrand.Read(aesnonce)
  152. env := NewEnvelope(params.TTL, params.Topic, aesnonce, msg)
  153. if err != nil {
  154. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  155. }
  156. env.Expiry = uint32(seed) // make it deterministic
  157. target := 32.0
  158. params.WorkTime = 4
  159. params.PoW = target
  160. env.Seal(params)
  161. env.calculatePoW(0)
  162. pow := env.PoW()
  163. if pow < target {
  164. t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
  165. }
  166. params.WorkTime = 1
  167. params.PoW = 1000000000.0
  168. env.Seal(params)
  169. env.calculatePoW(0)
  170. pow = env.PoW()
  171. if pow < 2*target {
  172. t.Fatalf("failed Wrap with seed %d: pow too small %f.", seed, pow)
  173. }
  174. }
  175. func TestEnvelopeOpen(t *testing.T) {
  176. InitSingleTest()
  177. var symmetric bool
  178. for i := 0; i < 256; i++ {
  179. singleEnvelopeOpenTest(t, symmetric)
  180. symmetric = !symmetric
  181. }
  182. }
  183. func singleEnvelopeOpenTest(t *testing.T, symmetric bool) {
  184. params, err := generateMessageParams()
  185. if err != nil {
  186. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  187. }
  188. key, err := crypto.GenerateKey()
  189. if err != nil {
  190. t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
  191. }
  192. if !symmetric {
  193. params.KeySym = nil
  194. params.Dst = &key.PublicKey
  195. }
  196. text := make([]byte, 0, 512)
  197. text = append(text, params.Payload...)
  198. msg, err := NewSentMessage(params)
  199. if err != nil {
  200. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  201. }
  202. env, err := msg.Wrap(params)
  203. if err != nil {
  204. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  205. }
  206. f := Filter{KeyAsym: key, KeySym: params.KeySym}
  207. decrypted := env.Open(&f)
  208. if decrypted == nil {
  209. t.Fatalf("failed to open with seed %d.", seed)
  210. }
  211. if !bytes.Equal(text, decrypted.Payload) {
  212. t.Fatalf("failed with seed %d: compare payload.", seed)
  213. }
  214. if !isMessageSigned(decrypted.Raw[0]) {
  215. t.Fatalf("failed with seed %d: unsigned.", seed)
  216. }
  217. if len(decrypted.Signature) != signatureLength {
  218. t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
  219. }
  220. if !IsPubKeyEqual(decrypted.Src, &params.Src.PublicKey) {
  221. t.Fatalf("failed with seed %d: signature mismatch.", seed)
  222. }
  223. if decrypted.isAsymmetricEncryption() == symmetric {
  224. t.Fatalf("failed with seed %d: asymmetric %v vs. %v.", seed, decrypted.isAsymmetricEncryption(), symmetric)
  225. }
  226. if decrypted.isSymmetricEncryption() != symmetric {
  227. t.Fatalf("failed with seed %d: symmetric %v vs. %v.", seed, decrypted.isSymmetricEncryption(), symmetric)
  228. }
  229. if !symmetric {
  230. if decrypted.Dst == nil {
  231. t.Fatalf("failed with seed %d: dst is nil.", seed)
  232. }
  233. if !IsPubKeyEqual(decrypted.Dst, &key.PublicKey) {
  234. t.Fatalf("failed with seed %d: Dst.", seed)
  235. }
  236. }
  237. }
  238. func TestEncryptWithZeroKey(t *testing.T) {
  239. InitSingleTest()
  240. params, err := generateMessageParams()
  241. if err != nil {
  242. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  243. }
  244. msg, err := NewSentMessage(params)
  245. if err != nil {
  246. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  247. }
  248. params.KeySym = make([]byte, aesKeyLength)
  249. _, err = msg.Wrap(params)
  250. if err == nil {
  251. t.Fatalf("wrapped with zero key, seed: %d.", seed)
  252. }
  253. params, err = generateMessageParams()
  254. if err != nil {
  255. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  256. }
  257. msg, err = NewSentMessage(params)
  258. if err != nil {
  259. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  260. }
  261. params.KeySym = make([]byte, 0)
  262. _, err = msg.Wrap(params)
  263. if err == nil {
  264. t.Fatalf("wrapped with empty key, seed: %d.", seed)
  265. }
  266. params, err = generateMessageParams()
  267. if err != nil {
  268. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  269. }
  270. msg, err = NewSentMessage(params)
  271. if err != nil {
  272. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  273. }
  274. params.KeySym = nil
  275. _, err = msg.Wrap(params)
  276. if err == nil {
  277. t.Fatalf("wrapped with nil key, seed: %d.", seed)
  278. }
  279. }
  280. func TestRlpEncode(t *testing.T) {
  281. InitSingleTest()
  282. params, err := generateMessageParams()
  283. if err != nil {
  284. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  285. }
  286. msg, err := NewSentMessage(params)
  287. if err != nil {
  288. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  289. }
  290. env, err := msg.Wrap(params)
  291. if err != nil {
  292. t.Fatalf("wrapped with zero key, seed: %d.", seed)
  293. }
  294. raw, err := rlp.EncodeToBytes(env)
  295. if err != nil {
  296. t.Fatalf("RLP encode failed: %s.", err)
  297. }
  298. var decoded Envelope
  299. rlp.DecodeBytes(raw, &decoded)
  300. if err != nil {
  301. t.Fatalf("RLP decode failed: %s.", err)
  302. }
  303. he := env.Hash()
  304. hd := decoded.Hash()
  305. if he != hd {
  306. t.Fatalf("Hashes are not equal: %x vs. %x", he, hd)
  307. }
  308. }
  309. func singlePaddingTest(t *testing.T, padSize int) {
  310. params, err := generateMessageParams()
  311. if err != nil {
  312. t.Fatalf("failed generateMessageParams with seed %d and sz=%d: %s.", seed, padSize, err)
  313. }
  314. params.Padding = make([]byte, padSize)
  315. params.PoW = 0.0000000001
  316. pad := make([]byte, padSize)
  317. _, err = mrand.Read(pad)
  318. if err != nil {
  319. t.Fatalf("padding is not generated (seed %d): %s", seed, err)
  320. }
  321. n := copy(params.Padding, pad)
  322. if n != padSize {
  323. t.Fatalf("padding is not copied (seed %d): %s", seed, err)
  324. }
  325. msg, err := NewSentMessage(params)
  326. if err != nil {
  327. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  328. }
  329. env, err := msg.Wrap(params)
  330. if err != nil {
  331. t.Fatalf("failed to wrap, seed: %d and sz=%d.", seed, padSize)
  332. }
  333. f := Filter{KeySym: params.KeySym}
  334. decrypted := env.Open(&f)
  335. if decrypted == nil {
  336. t.Fatalf("failed to open, seed and sz=%d: %d.", seed, padSize)
  337. }
  338. if !bytes.Equal(pad, decrypted.Padding) {
  339. t.Fatalf("padding is not retireved as expected with seed %d and sz=%d:\n[%x]\n[%x].", seed, padSize, pad, decrypted.Padding)
  340. }
  341. }
  342. func TestPadding(t *testing.T) {
  343. InitSingleTest()
  344. for i := 1; i < 260; i++ {
  345. singlePaddingTest(t, i)
  346. }
  347. lim := 256 * 256
  348. for i := lim - 5; i < lim+2; i++ {
  349. singlePaddingTest(t, i)
  350. }
  351. for i := 0; i < 256; i++ {
  352. n := mrand.Intn(256*254) + 256
  353. singlePaddingTest(t, n)
  354. }
  355. for i := 0; i < 256; i++ {
  356. n := mrand.Intn(256*1024) + 256*256
  357. singlePaddingTest(t, n)
  358. }
  359. }