2017-11-03 23:29:49 +03:00
|
|
|
// Copyright 2016 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package whisperv6
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
mrand "math/rand"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
|
|
)
|
|
|
|
|
|
|
|
func generateMessageParams() (*MessageParams, error) {
|
|
|
|
// set all the parameters except p.Dst and p.Padding
|
|
|
|
|
|
|
|
buf := make([]byte, 4)
|
|
|
|
mrand.Read(buf)
|
|
|
|
sz := mrand.Intn(400)
|
|
|
|
|
|
|
|
var p MessageParams
|
|
|
|
p.PoW = 0.01
|
|
|
|
p.WorkTime = 1
|
|
|
|
p.TTL = uint32(mrand.Intn(1024))
|
|
|
|
p.Payload = make([]byte, sz)
|
|
|
|
p.KeySym = make([]byte, aesKeyLength)
|
|
|
|
mrand.Read(p.Payload)
|
|
|
|
mrand.Read(p.KeySym)
|
|
|
|
p.Topic = BytesToTopic(buf)
|
|
|
|
|
|
|
|
var err error
|
|
|
|
p.Src, err = crypto.GenerateKey()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &p, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func singleMessageTest(t *testing.T, symmetric bool) {
|
|
|
|
params, err := generateMessageParams()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := crypto.GenerateKey()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !symmetric {
|
|
|
|
params.KeySym = nil
|
|
|
|
params.Dst = &key.PublicKey
|
|
|
|
}
|
|
|
|
|
|
|
|
text := make([]byte, 0, 512)
|
|
|
|
text = append(text, params.Payload...)
|
|
|
|
|
|
|
|
msg, err := NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
env, err := msg.Wrap(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var decrypted *ReceivedMessage
|
|
|
|
if symmetric {
|
|
|
|
decrypted, err = env.OpenSymmetric(params.KeySym)
|
|
|
|
} else {
|
|
|
|
decrypted, err = env.OpenAsymmetric(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to encrypt with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !decrypted.Validate() {
|
|
|
|
t.Fatalf("failed to validate with seed %d.", seed)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(text, decrypted.Payload) {
|
|
|
|
t.Fatalf("failed with seed %d: compare payload.", seed)
|
|
|
|
}
|
|
|
|
if !isMessageSigned(decrypted.Raw[0]) {
|
|
|
|
t.Fatalf("failed with seed %d: unsigned.", seed)
|
|
|
|
}
|
|
|
|
if len(decrypted.Signature) != signatureLength {
|
|
|
|
t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
|
|
|
|
}
|
|
|
|
if !IsPubKeyEqual(decrypted.Src, ¶ms.Src.PublicKey) {
|
|
|
|
t.Fatalf("failed with seed %d: signature mismatch.", seed)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMessageEncryption(t *testing.T) {
|
|
|
|
InitSingleTest()
|
|
|
|
|
|
|
|
var symmetric bool
|
|
|
|
for i := 0; i < 256; i++ {
|
|
|
|
singleMessageTest(t, symmetric)
|
|
|
|
symmetric = !symmetric
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMessageWrap(t *testing.T) {
|
|
|
|
seed = int64(1777444222)
|
|
|
|
mrand.Seed(seed)
|
|
|
|
target := 128.0
|
|
|
|
|
|
|
|
params, err := generateMessageParams()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
msg, err := NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
params.TTL = 1
|
|
|
|
params.WorkTime = 12
|
|
|
|
params.PoW = target
|
|
|
|
env, err := msg.Wrap(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
pow := env.PoW()
|
|
|
|
if pow < target {
|
|
|
|
t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
|
|
|
|
}
|
|
|
|
|
|
|
|
// set PoW target too high, expect error
|
|
|
|
msg2, err := NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
params.TTL = 1000000
|
|
|
|
params.WorkTime = 1
|
|
|
|
params.PoW = 10000000.0
|
|
|
|
_, err = msg2.Wrap(params)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("unexpectedly reached the PoW target with seed %d.", seed)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMessageSeal(t *testing.T) {
|
|
|
|
// this test depends on deterministic choice of seed (1976726903)
|
|
|
|
seed = int64(1976726903)
|
|
|
|
mrand.Seed(seed)
|
|
|
|
|
|
|
|
params, err := generateMessageParams()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
msg, err := NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
params.TTL = 1
|
|
|
|
|
2017-12-08 13:40:59 +03:00
|
|
|
env := NewEnvelope(params.TTL, params.Topic, msg)
|
2017-11-03 23:29:49 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
env.Expiry = uint32(seed) // make it deterministic
|
|
|
|
target := 32.0
|
|
|
|
params.WorkTime = 4
|
|
|
|
params.PoW = target
|
|
|
|
env.Seal(params)
|
|
|
|
|
|
|
|
env.calculatePoW(0)
|
|
|
|
pow := env.PoW()
|
|
|
|
if pow < target {
|
|
|
|
t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
|
|
|
|
}
|
|
|
|
|
|
|
|
params.WorkTime = 1
|
|
|
|
params.PoW = 1000000000.0
|
|
|
|
env.Seal(params)
|
|
|
|
env.calculatePoW(0)
|
|
|
|
pow = env.PoW()
|
|
|
|
if pow < 2*target {
|
|
|
|
t.Fatalf("failed Wrap with seed %d: pow too small %f.", seed, pow)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestEnvelopeOpen(t *testing.T) {
|
|
|
|
InitSingleTest()
|
|
|
|
|
|
|
|
var symmetric bool
|
|
|
|
for i := 0; i < 256; i++ {
|
|
|
|
singleEnvelopeOpenTest(t, symmetric)
|
|
|
|
symmetric = !symmetric
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func singleEnvelopeOpenTest(t *testing.T, symmetric bool) {
|
|
|
|
params, err := generateMessageParams()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := crypto.GenerateKey()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !symmetric {
|
|
|
|
params.KeySym = nil
|
|
|
|
params.Dst = &key.PublicKey
|
|
|
|
}
|
|
|
|
|
|
|
|
text := make([]byte, 0, 512)
|
|
|
|
text = append(text, params.Payload...)
|
|
|
|
|
|
|
|
msg, err := NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
env, err := msg.Wrap(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
|
2017-12-08 13:40:59 +03:00
|
|
|
var f Filter
|
|
|
|
if symmetric {
|
|
|
|
f = Filter{KeySym: params.KeySym}
|
|
|
|
} else {
|
|
|
|
f = Filter{KeyAsym: key}
|
|
|
|
}
|
2017-11-03 23:29:49 +03:00
|
|
|
decrypted := env.Open(&f)
|
|
|
|
if decrypted == nil {
|
|
|
|
t.Fatalf("failed to open with seed %d.", seed)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(text, decrypted.Payload) {
|
|
|
|
t.Fatalf("failed with seed %d: compare payload.", seed)
|
|
|
|
}
|
|
|
|
if !isMessageSigned(decrypted.Raw[0]) {
|
|
|
|
t.Fatalf("failed with seed %d: unsigned.", seed)
|
|
|
|
}
|
|
|
|
if len(decrypted.Signature) != signatureLength {
|
|
|
|
t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
|
|
|
|
}
|
|
|
|
if !IsPubKeyEqual(decrypted.Src, ¶ms.Src.PublicKey) {
|
|
|
|
t.Fatalf("failed with seed %d: signature mismatch.", seed)
|
|
|
|
}
|
|
|
|
if decrypted.isAsymmetricEncryption() == symmetric {
|
|
|
|
t.Fatalf("failed with seed %d: asymmetric %v vs. %v.", seed, decrypted.isAsymmetricEncryption(), symmetric)
|
|
|
|
}
|
|
|
|
if decrypted.isSymmetricEncryption() != symmetric {
|
|
|
|
t.Fatalf("failed with seed %d: symmetric %v vs. %v.", seed, decrypted.isSymmetricEncryption(), symmetric)
|
|
|
|
}
|
|
|
|
if !symmetric {
|
|
|
|
if decrypted.Dst == nil {
|
|
|
|
t.Fatalf("failed with seed %d: dst is nil.", seed)
|
|
|
|
}
|
|
|
|
if !IsPubKeyEqual(decrypted.Dst, &key.PublicKey) {
|
|
|
|
t.Fatalf("failed with seed %d: Dst.", seed)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestEncryptWithZeroKey(t *testing.T) {
|
|
|
|
InitSingleTest()
|
|
|
|
|
|
|
|
params, err := generateMessageParams()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
msg, err := NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
params.KeySym = make([]byte, aesKeyLength)
|
|
|
|
_, err = msg.Wrap(params)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("wrapped with zero key, seed: %d.", seed)
|
|
|
|
}
|
|
|
|
|
|
|
|
params, err = generateMessageParams()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
msg, err = NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
params.KeySym = make([]byte, 0)
|
|
|
|
_, err = msg.Wrap(params)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("wrapped with empty key, seed: %d.", seed)
|
|
|
|
}
|
|
|
|
|
|
|
|
params, err = generateMessageParams()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
msg, err = NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
params.KeySym = nil
|
|
|
|
_, err = msg.Wrap(params)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("wrapped with nil key, seed: %d.", seed)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRlpEncode(t *testing.T) {
|
|
|
|
InitSingleTest()
|
|
|
|
|
|
|
|
params, err := generateMessageParams()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
msg, err := NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
env, err := msg.Wrap(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("wrapped with zero key, seed: %d.", seed)
|
|
|
|
}
|
|
|
|
|
|
|
|
raw, err := rlp.EncodeToBytes(env)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("RLP encode failed: %s.", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var decoded Envelope
|
|
|
|
rlp.DecodeBytes(raw, &decoded)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("RLP decode failed: %s.", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
he := env.Hash()
|
|
|
|
hd := decoded.Hash()
|
|
|
|
|
|
|
|
if he != hd {
|
|
|
|
t.Fatalf("Hashes are not equal: %x vs. %x", he, hd)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func singlePaddingTest(t *testing.T, padSize int) {
|
|
|
|
params, err := generateMessageParams()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed generateMessageParams with seed %d and sz=%d: %s.", seed, padSize, err)
|
|
|
|
}
|
|
|
|
params.Padding = make([]byte, padSize)
|
|
|
|
params.PoW = 0.0000000001
|
|
|
|
pad := make([]byte, padSize)
|
|
|
|
_, err = mrand.Read(pad)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("padding is not generated (seed %d): %s", seed, err)
|
|
|
|
}
|
|
|
|
n := copy(params.Padding, pad)
|
|
|
|
if n != padSize {
|
|
|
|
t.Fatalf("padding is not copied (seed %d): %s", seed, err)
|
|
|
|
}
|
|
|
|
msg, err := NewSentMessage(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
|
|
|
|
}
|
|
|
|
env, err := msg.Wrap(params)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to wrap, seed: %d and sz=%d.", seed, padSize)
|
|
|
|
}
|
|
|
|
f := Filter{KeySym: params.KeySym}
|
|
|
|
decrypted := env.Open(&f)
|
|
|
|
if decrypted == nil {
|
|
|
|
t.Fatalf("failed to open, seed and sz=%d: %d.", seed, padSize)
|
|
|
|
}
|
|
|
|
if !bytes.Equal(pad, decrypted.Padding) {
|
|
|
|
t.Fatalf("padding is not retireved as expected with seed %d and sz=%d:\n[%x]\n[%x].", seed, padSize, pad, decrypted.Padding)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPadding(t *testing.T) {
|
|
|
|
InitSingleTest()
|
|
|
|
|
|
|
|
for i := 1; i < 260; i++ {
|
|
|
|
singlePaddingTest(t, i)
|
|
|
|
}
|
|
|
|
|
|
|
|
lim := 256 * 256
|
|
|
|
for i := lim - 5; i < lim+2; i++ {
|
|
|
|
singlePaddingTest(t, i)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := 0; i < 256; i++ {
|
|
|
|
n := mrand.Intn(256*254) + 256
|
|
|
|
singlePaddingTest(t, n)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := 0; i < 256; i++ {
|
|
|
|
n := mrand.Intn(256*1024) + 256*256
|
|
|
|
singlePaddingTest(t, n)
|
|
|
|
}
|
|
|
|
}
|
2017-12-11 14:32:58 +03:00
|
|
|
|
|
|
|
func TestPaddingAppendedToSymMessages(t *testing.T) {
|
|
|
|
params := &MessageParams{
|
|
|
|
Payload: make([]byte, 246),
|
|
|
|
KeySym: make([]byte, aesKeyLength),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Simulate a message with a payload just under 256 so that
|
|
|
|
// payload + flag + aesnonce > 256. Check that the result
|
|
|
|
// is padded on the next 256 boundary.
|
|
|
|
msg := sentMessage{}
|
|
|
|
msg.Raw = make([]byte, len(params.Payload)+1+AESNonceLength)
|
|
|
|
|
|
|
|
err := msg.appendPadding(params)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error appending padding to message %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(msg.Raw) != 512 {
|
|
|
|
t.Errorf("Invalid size %d != 512", len(msg.Raw))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPaddingAppendedToSymMessagesWithSignature(t *testing.T) {
|
|
|
|
params := &MessageParams{
|
|
|
|
Payload: make([]byte, 246),
|
|
|
|
KeySym: make([]byte, aesKeyLength),
|
|
|
|
}
|
|
|
|
|
|
|
|
pSrc, err := crypto.GenerateKey()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error creating the signature key %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
params.Src = pSrc
|
|
|
|
|
|
|
|
// Simulate a message with a payload just under 256 so that
|
|
|
|
// payload + flag + aesnonce > 256. Check that the result
|
|
|
|
// is padded on the next 256 boundary.
|
|
|
|
msg := sentMessage{}
|
|
|
|
msg.Raw = make([]byte, len(params.Payload)+1+AESNonceLength+signatureLength)
|
|
|
|
|
|
|
|
err = msg.appendPadding(params)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error appending padding to message %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(msg.Raw) != 512 {
|
|
|
|
t.Errorf("Invalid size %d != 512", len(msg.Raw))
|
|
|
|
}
|
|
|
|
}
|