message_test.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313
  1. // Copyright 2016 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. package whisperv5
  17. import (
  18. "bytes"
  19. "math/rand"
  20. "testing"
  21. "github.com/ethereum/go-ethereum/crypto"
  22. )
  23. func copyFromBuf(dst []byte, src []byte, beg int) int {
  24. copy(dst, src[beg:])
  25. return beg + len(dst)
  26. }
  27. func generateMessageParams() (*MessageParams, error) {
  28. // set all the parameters except p.Dst
  29. buf := make([]byte, 1024)
  30. randomize(buf)
  31. sz := rand.Intn(400)
  32. var p MessageParams
  33. p.PoW = 0.01
  34. p.WorkTime = 1
  35. p.TTL = uint32(rand.Intn(1024))
  36. p.Payload = make([]byte, sz)
  37. p.Padding = make([]byte, padSizeLimitUpper)
  38. p.KeySym = make([]byte, aesKeyLength)
  39. var b int
  40. b = copyFromBuf(p.Payload, buf, b)
  41. b = copyFromBuf(p.Padding, buf, b)
  42. b = copyFromBuf(p.KeySym, buf, b)
  43. p.Topic = BytesToTopic(buf[b:])
  44. var err error
  45. p.Src, err = crypto.GenerateKey()
  46. if err != nil {
  47. return nil, err
  48. }
  49. return &p, nil
  50. }
  51. func singleMessageTest(t *testing.T, symmetric bool) {
  52. params, err := generateMessageParams()
  53. if err != nil {
  54. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  55. }
  56. key, err := crypto.GenerateKey()
  57. if err != nil {
  58. t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
  59. }
  60. if !symmetric {
  61. params.KeySym = nil
  62. params.Dst = &key.PublicKey
  63. }
  64. text := make([]byte, 0, 512)
  65. steg := make([]byte, 0, 512)
  66. text = append(text, params.Payload...)
  67. steg = append(steg, params.Padding...)
  68. msg := NewSentMessage(params)
  69. env, err := msg.Wrap(params)
  70. if err != nil {
  71. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  72. }
  73. var decrypted *ReceivedMessage
  74. if symmetric {
  75. decrypted, err = env.OpenSymmetric(params.KeySym)
  76. } else {
  77. decrypted, err = env.OpenAsymmetric(key)
  78. }
  79. if err != nil {
  80. t.Fatalf("failed to encrypt with seed %d: %s.", seed, err)
  81. }
  82. if !decrypted.Validate() {
  83. t.Fatalf("failed to validate with seed %d.", seed)
  84. }
  85. padsz := len(decrypted.Padding)
  86. if !bytes.Equal(steg[:padsz], decrypted.Padding) {
  87. t.Fatalf("failed with seed %d: compare padding.", seed)
  88. }
  89. if !bytes.Equal(text, decrypted.Payload) {
  90. t.Fatalf("failed with seed %d: compare payload.", seed)
  91. }
  92. if !isMessageSigned(decrypted.Raw[0]) {
  93. t.Fatalf("failed with seed %d: unsigned.", seed)
  94. }
  95. if len(decrypted.Signature) != signatureLength {
  96. t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
  97. }
  98. if !IsPubKeyEqual(decrypted.Src, &params.Src.PublicKey) {
  99. t.Fatalf("failed with seed %d: signature mismatch.", seed)
  100. }
  101. }
  102. func TestMessageEncryption(t *testing.T) {
  103. InitSingleTest()
  104. var symmetric bool
  105. for i := 0; i < 256; i++ {
  106. singleMessageTest(t, symmetric)
  107. symmetric = !symmetric
  108. }
  109. }
  110. func TestMessageWrap(t *testing.T) {
  111. seed = int64(1777444222)
  112. rand.Seed(seed)
  113. target := 128.0
  114. params, err := generateMessageParams()
  115. if err != nil {
  116. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  117. }
  118. msg := NewSentMessage(params)
  119. params.TTL = 1
  120. params.WorkTime = 12
  121. params.PoW = target
  122. env, err := msg.Wrap(params)
  123. if err != nil {
  124. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  125. }
  126. pow := env.PoW()
  127. if pow < target {
  128. t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
  129. }
  130. // set PoW target too high, expect error
  131. msg2 := NewSentMessage(params)
  132. params.TTL = 1000000
  133. params.WorkTime = 1
  134. params.PoW = 10000000.0
  135. env, err = msg2.Wrap(params)
  136. if err == nil {
  137. t.Fatalf("unexpectedly reached the PoW target with seed %d.", seed)
  138. }
  139. }
  140. func TestMessageSeal(t *testing.T) {
  141. // this test depends on deterministic choice of seed (1976726903)
  142. seed = int64(1976726903)
  143. rand.Seed(seed)
  144. params, err := generateMessageParams()
  145. if err != nil {
  146. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  147. }
  148. msg := NewSentMessage(params)
  149. params.TTL = 1
  150. aesnonce := make([]byte, 12)
  151. salt := make([]byte, 12)
  152. randomize(aesnonce)
  153. randomize(salt)
  154. env := NewEnvelope(params.TTL, params.Topic, salt, aesnonce, msg)
  155. if err != nil {
  156. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  157. }
  158. env.Expiry = uint32(seed) // make it deterministic
  159. target := 32.0
  160. params.WorkTime = 4
  161. params.PoW = target
  162. env.Seal(params)
  163. env.calculatePoW(0)
  164. pow := env.PoW()
  165. if pow < target {
  166. t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
  167. }
  168. params.WorkTime = 1
  169. params.PoW = 1000000000.0
  170. env.Seal(params)
  171. env.calculatePoW(0)
  172. pow = env.PoW()
  173. if pow < 2*target {
  174. t.Fatalf("failed Wrap with seed %d: pow too small %f.", seed, pow)
  175. }
  176. }
  177. func TestEnvelopeOpen(t *testing.T) {
  178. InitSingleTest()
  179. var symmetric bool
  180. for i := 0; i < 256; i++ {
  181. singleEnvelopeOpenTest(t, symmetric)
  182. symmetric = !symmetric
  183. }
  184. }
  185. func singleEnvelopeOpenTest(t *testing.T, symmetric bool) {
  186. params, err := generateMessageParams()
  187. if err != nil {
  188. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  189. }
  190. key, err := crypto.GenerateKey()
  191. if err != nil {
  192. t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
  193. }
  194. if !symmetric {
  195. params.KeySym = nil
  196. params.Dst = &key.PublicKey
  197. }
  198. text := make([]byte, 0, 512)
  199. steg := make([]byte, 0, 512)
  200. text = append(text, params.Payload...)
  201. steg = append(steg, params.Padding...)
  202. msg := NewSentMessage(params)
  203. env, err := msg.Wrap(params)
  204. if err != nil {
  205. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  206. }
  207. f := Filter{KeyAsym: key, KeySym: params.KeySym}
  208. decrypted := env.Open(&f)
  209. if decrypted == nil {
  210. t.Fatalf("failed to open with seed %d.", seed)
  211. }
  212. padsz := len(decrypted.Padding)
  213. if !bytes.Equal(steg[:padsz], decrypted.Padding) {
  214. t.Fatalf("failed with seed %d: compare padding.", seed)
  215. }
  216. if !bytes.Equal(text, decrypted.Payload) {
  217. t.Fatalf("failed with seed %d: compare payload.", seed)
  218. }
  219. if !isMessageSigned(decrypted.Raw[0]) {
  220. t.Fatalf("failed with seed %d: unsigned.", seed)
  221. }
  222. if len(decrypted.Signature) != signatureLength {
  223. t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
  224. }
  225. if !IsPubKeyEqual(decrypted.Src, &params.Src.PublicKey) {
  226. t.Fatalf("failed with seed %d: signature mismatch.", seed)
  227. }
  228. if decrypted.isAsymmetricEncryption() == symmetric {
  229. t.Fatalf("failed with seed %d: asymmetric %v vs. %v.", seed, decrypted.isAsymmetricEncryption(), symmetric)
  230. }
  231. if decrypted.isSymmetricEncryption() != symmetric {
  232. t.Fatalf("failed with seed %d: symmetric %v vs. %v.", seed, decrypted.isSymmetricEncryption(), symmetric)
  233. }
  234. if !symmetric {
  235. if decrypted.Dst == nil {
  236. t.Fatalf("failed with seed %d: dst is nil.", seed)
  237. }
  238. if !IsPubKeyEqual(decrypted.Dst, &key.PublicKey) {
  239. t.Fatalf("failed with seed %d: Dst.", seed)
  240. }
  241. }
  242. }
  243. func TestEncryptWithZeroKey(t *testing.T) {
  244. InitSingleTest()
  245. params, err := generateMessageParams()
  246. if err != nil {
  247. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  248. }
  249. msg := NewSentMessage(params)
  250. params.KeySym = make([]byte, aesKeyLength)
  251. _, err = msg.Wrap(params)
  252. if err == nil {
  253. t.Fatalf("wrapped with zero key, seed: %d.", seed)
  254. }
  255. params.KeySym = make([]byte, 0)
  256. _, err = msg.Wrap(params)
  257. if err == nil {
  258. t.Fatalf("wrapped with empty key, seed: %d.", seed)
  259. }
  260. params.KeySym = nil
  261. _, err = msg.Wrap(params)
  262. if err == nil {
  263. t.Fatalf("wrapped with nil key, seed: %d.", seed)
  264. }
  265. }