message_test.go 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346
  1. // Copyright 2016 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. package whisperv5
  17. import (
  18. "bytes"
  19. "math/rand"
  20. "testing"
  21. "github.com/ethereum/go-ethereum/crypto"
  22. "github.com/ethereum/go-ethereum/rlp"
  23. )
  24. func copyFromBuf(dst []byte, src []byte, beg int) int {
  25. copy(dst, src[beg:])
  26. return beg + len(dst)
  27. }
  28. func generateMessageParams() (*MessageParams, error) {
  29. // set all the parameters except p.Dst
  30. buf := make([]byte, 1024)
  31. randomize(buf)
  32. sz := rand.Intn(400)
  33. var p MessageParams
  34. p.PoW = 0.01
  35. p.WorkTime = 1
  36. p.TTL = uint32(rand.Intn(1024))
  37. p.Payload = make([]byte, sz)
  38. p.Padding = make([]byte, padSizeLimitUpper)
  39. p.KeySym = make([]byte, aesKeyLength)
  40. var b int
  41. b = copyFromBuf(p.Payload, buf, b)
  42. b = copyFromBuf(p.Padding, buf, b)
  43. b = copyFromBuf(p.KeySym, buf, b)
  44. p.Topic = BytesToTopic(buf[b:])
  45. var err error
  46. p.Src, err = crypto.GenerateKey()
  47. if err != nil {
  48. return nil, err
  49. }
  50. return &p, nil
  51. }
  52. func singleMessageTest(t *testing.T, symmetric bool) {
  53. params, err := generateMessageParams()
  54. if err != nil {
  55. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  56. }
  57. key, err := crypto.GenerateKey()
  58. if err != nil {
  59. t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
  60. }
  61. if !symmetric {
  62. params.KeySym = nil
  63. params.Dst = &key.PublicKey
  64. }
  65. text := make([]byte, 0, 512)
  66. steg := make([]byte, 0, 512)
  67. text = append(text, params.Payload...)
  68. steg = append(steg, params.Padding...)
  69. msg := NewSentMessage(params)
  70. env, err := msg.Wrap(params)
  71. if err != nil {
  72. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  73. }
  74. var decrypted *ReceivedMessage
  75. if symmetric {
  76. decrypted, err = env.OpenSymmetric(params.KeySym)
  77. } else {
  78. decrypted, err = env.OpenAsymmetric(key)
  79. }
  80. if err != nil {
  81. t.Fatalf("failed to encrypt with seed %d: %s.", seed, err)
  82. }
  83. if !decrypted.Validate() {
  84. t.Fatalf("failed to validate with seed %d.", seed)
  85. }
  86. padsz := len(decrypted.Padding)
  87. if !bytes.Equal(steg[:padsz], decrypted.Padding) {
  88. t.Fatalf("failed with seed %d: compare padding.", seed)
  89. }
  90. if !bytes.Equal(text, decrypted.Payload) {
  91. t.Fatalf("failed with seed %d: compare payload.", seed)
  92. }
  93. if !isMessageSigned(decrypted.Raw[0]) {
  94. t.Fatalf("failed with seed %d: unsigned.", seed)
  95. }
  96. if len(decrypted.Signature) != signatureLength {
  97. t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
  98. }
  99. if !IsPubKeyEqual(decrypted.Src, &params.Src.PublicKey) {
  100. t.Fatalf("failed with seed %d: signature mismatch.", seed)
  101. }
  102. }
  103. func TestMessageEncryption(t *testing.T) {
  104. InitSingleTest()
  105. var symmetric bool
  106. for i := 0; i < 256; i++ {
  107. singleMessageTest(t, symmetric)
  108. symmetric = !symmetric
  109. }
  110. }
  111. func TestMessageWrap(t *testing.T) {
  112. seed = int64(1777444222)
  113. rand.Seed(seed)
  114. target := 128.0
  115. params, err := generateMessageParams()
  116. if err != nil {
  117. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  118. }
  119. msg := NewSentMessage(params)
  120. params.TTL = 1
  121. params.WorkTime = 12
  122. params.PoW = target
  123. env, err := msg.Wrap(params)
  124. if err != nil {
  125. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  126. }
  127. pow := env.PoW()
  128. if pow < target {
  129. t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
  130. }
  131. // set PoW target too high, expect error
  132. msg2 := NewSentMessage(params)
  133. params.TTL = 1000000
  134. params.WorkTime = 1
  135. params.PoW = 10000000.0
  136. env, err = msg2.Wrap(params)
  137. if err == nil {
  138. t.Fatalf("unexpectedly reached the PoW target with seed %d.", seed)
  139. }
  140. }
  141. func TestMessageSeal(t *testing.T) {
  142. // this test depends on deterministic choice of seed (1976726903)
  143. seed = int64(1976726903)
  144. rand.Seed(seed)
  145. params, err := generateMessageParams()
  146. if err != nil {
  147. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  148. }
  149. msg := NewSentMessage(params)
  150. params.TTL = 1
  151. aesnonce := make([]byte, 12)
  152. salt := make([]byte, 12)
  153. randomize(aesnonce)
  154. randomize(salt)
  155. env := NewEnvelope(params.TTL, params.Topic, salt, aesnonce, msg)
  156. if err != nil {
  157. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  158. }
  159. env.Expiry = uint32(seed) // make it deterministic
  160. target := 32.0
  161. params.WorkTime = 4
  162. params.PoW = target
  163. env.Seal(params)
  164. env.calculatePoW(0)
  165. pow := env.PoW()
  166. if pow < target {
  167. t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
  168. }
  169. params.WorkTime = 1
  170. params.PoW = 1000000000.0
  171. env.Seal(params)
  172. env.calculatePoW(0)
  173. pow = env.PoW()
  174. if pow < 2*target {
  175. t.Fatalf("failed Wrap with seed %d: pow too small %f.", seed, pow)
  176. }
  177. }
  178. func TestEnvelopeOpen(t *testing.T) {
  179. InitSingleTest()
  180. var symmetric bool
  181. for i := 0; i < 256; i++ {
  182. singleEnvelopeOpenTest(t, symmetric)
  183. symmetric = !symmetric
  184. }
  185. }
  186. func singleEnvelopeOpenTest(t *testing.T, symmetric bool) {
  187. params, err := generateMessageParams()
  188. if err != nil {
  189. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  190. }
  191. key, err := crypto.GenerateKey()
  192. if err != nil {
  193. t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
  194. }
  195. if !symmetric {
  196. params.KeySym = nil
  197. params.Dst = &key.PublicKey
  198. }
  199. text := make([]byte, 0, 512)
  200. steg := make([]byte, 0, 512)
  201. text = append(text, params.Payload...)
  202. steg = append(steg, params.Padding...)
  203. msg := NewSentMessage(params)
  204. env, err := msg.Wrap(params)
  205. if err != nil {
  206. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  207. }
  208. f := Filter{KeyAsym: key, KeySym: params.KeySym}
  209. decrypted := env.Open(&f)
  210. if decrypted == nil {
  211. t.Fatalf("failed to open with seed %d.", seed)
  212. }
  213. padsz := len(decrypted.Padding)
  214. if !bytes.Equal(steg[:padsz], decrypted.Padding) {
  215. t.Fatalf("failed with seed %d: compare padding.", seed)
  216. }
  217. if !bytes.Equal(text, decrypted.Payload) {
  218. t.Fatalf("failed with seed %d: compare payload.", seed)
  219. }
  220. if !isMessageSigned(decrypted.Raw[0]) {
  221. t.Fatalf("failed with seed %d: unsigned.", seed)
  222. }
  223. if len(decrypted.Signature) != signatureLength {
  224. t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
  225. }
  226. if !IsPubKeyEqual(decrypted.Src, &params.Src.PublicKey) {
  227. t.Fatalf("failed with seed %d: signature mismatch.", seed)
  228. }
  229. if decrypted.isAsymmetricEncryption() == symmetric {
  230. t.Fatalf("failed with seed %d: asymmetric %v vs. %v.", seed, decrypted.isAsymmetricEncryption(), symmetric)
  231. }
  232. if decrypted.isSymmetricEncryption() != symmetric {
  233. t.Fatalf("failed with seed %d: symmetric %v vs. %v.", seed, decrypted.isSymmetricEncryption(), symmetric)
  234. }
  235. if !symmetric {
  236. if decrypted.Dst == nil {
  237. t.Fatalf("failed with seed %d: dst is nil.", seed)
  238. }
  239. if !IsPubKeyEqual(decrypted.Dst, &key.PublicKey) {
  240. t.Fatalf("failed with seed %d: Dst.", seed)
  241. }
  242. }
  243. }
  244. func TestEncryptWithZeroKey(t *testing.T) {
  245. InitSingleTest()
  246. params, err := generateMessageParams()
  247. if err != nil {
  248. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  249. }
  250. msg := NewSentMessage(params)
  251. params.KeySym = make([]byte, aesKeyLength)
  252. _, err = msg.Wrap(params)
  253. if err == nil {
  254. t.Fatalf("wrapped with zero key, seed: %d.", seed)
  255. }
  256. params.KeySym = make([]byte, 0)
  257. _, err = msg.Wrap(params)
  258. if err == nil {
  259. t.Fatalf("wrapped with empty key, seed: %d.", seed)
  260. }
  261. params.KeySym = nil
  262. _, err = msg.Wrap(params)
  263. if err == nil {
  264. t.Fatalf("wrapped with nil key, seed: %d.", seed)
  265. }
  266. }
  267. func TestRlpEncode(t *testing.T) {
  268. InitSingleTest()
  269. params, err := generateMessageParams()
  270. if err != nil {
  271. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  272. }
  273. msg := NewSentMessage(params)
  274. env, err := msg.Wrap(params)
  275. if err != nil {
  276. t.Fatalf("wrapped with zero key, seed: %d.", seed)
  277. }
  278. raw, err := rlp.EncodeToBytes(env)
  279. if err != nil {
  280. t.Fatalf("RLP encode failed: %s.", err)
  281. }
  282. var decoded Envelope
  283. rlp.DecodeBytes(raw, &decoded)
  284. if err != nil {
  285. t.Fatalf("RLP decode failed: %s.", err)
  286. }
  287. he := env.Hash()
  288. hd := decoded.Hash()
  289. if he != hd {
  290. t.Fatalf("Hashes are not equal: %x vs. %x", he, hd)
  291. }
  292. }