message_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472
  1. // Copyright 2016 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. package whisperv6
  17. import (
  18. "bytes"
  19. "crypto/aes"
  20. "crypto/cipher"
  21. mrand "math/rand"
  22. "testing"
  23. "github.com/ethereum/go-ethereum/common/hexutil"
  24. "github.com/ethereum/go-ethereum/crypto"
  25. "github.com/ethereum/go-ethereum/rlp"
  26. )
  27. func generateMessageParams() (*MessageParams, error) {
  28. // set all the parameters except p.Dst and p.Padding
  29. buf := make([]byte, 4)
  30. mrand.Read(buf)
  31. sz := mrand.Intn(400)
  32. var p MessageParams
  33. p.PoW = 0.01
  34. p.WorkTime = 1
  35. p.TTL = uint32(mrand.Intn(1024))
  36. p.Payload = make([]byte, sz)
  37. p.KeySym = make([]byte, aesKeyLength)
  38. mrand.Read(p.Payload)
  39. mrand.Read(p.KeySym)
  40. p.Topic = BytesToTopic(buf)
  41. var err error
  42. p.Src, err = crypto.GenerateKey()
  43. if err != nil {
  44. return nil, err
  45. }
  46. return &p, nil
  47. }
  48. func singleMessageTest(t *testing.T, symmetric bool) {
  49. params, err := generateMessageParams()
  50. if err != nil {
  51. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  52. }
  53. key, err := crypto.GenerateKey()
  54. if err != nil {
  55. t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
  56. }
  57. if !symmetric {
  58. params.KeySym = nil
  59. params.Dst = &key.PublicKey
  60. }
  61. text := make([]byte, 0, 512)
  62. text = append(text, params.Payload...)
  63. msg, err := NewSentMessage(params)
  64. if err != nil {
  65. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  66. }
  67. env, err := msg.Wrap(params)
  68. if err != nil {
  69. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  70. }
  71. var decrypted *ReceivedMessage
  72. if symmetric {
  73. decrypted, err = env.OpenSymmetric(params.KeySym)
  74. } else {
  75. decrypted, err = env.OpenAsymmetric(key)
  76. }
  77. if err != nil {
  78. t.Fatalf("failed to encrypt with seed %d: %s.", seed, err)
  79. }
  80. if !decrypted.ValidateAndParse() {
  81. t.Fatalf("failed to validate with seed %d, symmetric = %v.", seed, symmetric)
  82. }
  83. if !bytes.Equal(text, decrypted.Payload) {
  84. t.Fatalf("failed with seed %d: compare payload.", seed)
  85. }
  86. if !isMessageSigned(decrypted.Raw[0]) {
  87. t.Fatalf("failed with seed %d: unsigned.", seed)
  88. }
  89. if len(decrypted.Signature) != signatureLength {
  90. t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
  91. }
  92. if !IsPubKeyEqual(decrypted.Src, &params.Src.PublicKey) {
  93. t.Fatalf("failed with seed %d: signature mismatch.", seed)
  94. }
  95. }
  96. func TestMessageEncryption(t *testing.T) {
  97. InitSingleTest()
  98. var symmetric bool
  99. for i := 0; i < 256; i++ {
  100. singleMessageTest(t, symmetric)
  101. symmetric = !symmetric
  102. }
  103. }
  104. func TestMessageWrap(t *testing.T) {
  105. seed = int64(1777444222)
  106. mrand.Seed(seed)
  107. target := 128.0
  108. params, err := generateMessageParams()
  109. if err != nil {
  110. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  111. }
  112. msg, err := NewSentMessage(params)
  113. if err != nil {
  114. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  115. }
  116. params.TTL = 1
  117. params.WorkTime = 12
  118. params.PoW = target
  119. env, err := msg.Wrap(params)
  120. if err != nil {
  121. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  122. }
  123. pow := env.PoW()
  124. if pow < target {
  125. t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
  126. }
  127. // set PoW target too high, expect error
  128. msg2, err := NewSentMessage(params)
  129. if err != nil {
  130. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  131. }
  132. params.TTL = 1000000
  133. params.WorkTime = 1
  134. params.PoW = 10000000.0
  135. _, err = msg2.Wrap(params)
  136. if err == nil {
  137. t.Fatalf("unexpectedly reached the PoW target with seed %d.", seed)
  138. }
  139. }
  140. func TestMessageSeal(t *testing.T) {
  141. // this test depends on deterministic choice of seed (1976726903)
  142. seed = int64(1976726903)
  143. mrand.Seed(seed)
  144. params, err := generateMessageParams()
  145. if err != nil {
  146. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  147. }
  148. msg, err := NewSentMessage(params)
  149. if err != nil {
  150. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  151. }
  152. params.TTL = 1
  153. env := NewEnvelope(params.TTL, params.Topic, msg)
  154. if err != nil {
  155. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  156. }
  157. env.Expiry = uint32(seed) // make it deterministic
  158. target := 32.0
  159. params.WorkTime = 4
  160. params.PoW = target
  161. env.Seal(params)
  162. env.calculatePoW(0)
  163. pow := env.PoW()
  164. if pow < target {
  165. t.Fatalf("failed Wrap with seed %d: pow < target (%f vs. %f).", seed, pow, target)
  166. }
  167. params.WorkTime = 1
  168. params.PoW = 1000000000.0
  169. env.Seal(params)
  170. env.calculatePoW(0)
  171. pow = env.PoW()
  172. if pow < 2*target {
  173. t.Fatalf("failed Wrap with seed %d: pow too small %f.", seed, pow)
  174. }
  175. }
  176. func TestEnvelopeOpen(t *testing.T) {
  177. InitSingleTest()
  178. var symmetric bool
  179. for i := 0; i < 32; i++ {
  180. singleEnvelopeOpenTest(t, symmetric)
  181. symmetric = !symmetric
  182. }
  183. }
  184. func singleEnvelopeOpenTest(t *testing.T, symmetric bool) {
  185. params, err := generateMessageParams()
  186. if err != nil {
  187. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  188. }
  189. key, err := crypto.GenerateKey()
  190. if err != nil {
  191. t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err)
  192. }
  193. if !symmetric {
  194. params.KeySym = nil
  195. params.Dst = &key.PublicKey
  196. }
  197. text := make([]byte, 0, 512)
  198. text = append(text, params.Payload...)
  199. msg, err := NewSentMessage(params)
  200. if err != nil {
  201. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  202. }
  203. env, err := msg.Wrap(params)
  204. if err != nil {
  205. t.Fatalf("failed Wrap with seed %d: %s.", seed, err)
  206. }
  207. var f Filter
  208. if symmetric {
  209. f = Filter{KeySym: params.KeySym}
  210. } else {
  211. f = Filter{KeyAsym: key}
  212. }
  213. decrypted := env.Open(&f)
  214. if decrypted == nil {
  215. t.Fatalf("failed to open with seed %d.", seed)
  216. }
  217. if !bytes.Equal(text, decrypted.Payload) {
  218. t.Fatalf("failed with seed %d: compare payload.", seed)
  219. }
  220. if !isMessageSigned(decrypted.Raw[0]) {
  221. t.Fatalf("failed with seed %d: unsigned.", seed)
  222. }
  223. if len(decrypted.Signature) != signatureLength {
  224. t.Fatalf("failed with seed %d: signature len %d.", seed, len(decrypted.Signature))
  225. }
  226. if !IsPubKeyEqual(decrypted.Src, &params.Src.PublicKey) {
  227. t.Fatalf("failed with seed %d: signature mismatch.", seed)
  228. }
  229. if decrypted.isAsymmetricEncryption() == symmetric {
  230. t.Fatalf("failed with seed %d: asymmetric %v vs. %v.", seed, decrypted.isAsymmetricEncryption(), symmetric)
  231. }
  232. if decrypted.isSymmetricEncryption() != symmetric {
  233. t.Fatalf("failed with seed %d: symmetric %v vs. %v.", seed, decrypted.isSymmetricEncryption(), symmetric)
  234. }
  235. if !symmetric {
  236. if decrypted.Dst == nil {
  237. t.Fatalf("failed with seed %d: dst is nil.", seed)
  238. }
  239. if !IsPubKeyEqual(decrypted.Dst, &key.PublicKey) {
  240. t.Fatalf("failed with seed %d: Dst.", seed)
  241. }
  242. }
  243. }
  244. func TestEncryptWithZeroKey(t *testing.T) {
  245. InitSingleTest()
  246. params, err := generateMessageParams()
  247. if err != nil {
  248. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  249. }
  250. msg, err := NewSentMessage(params)
  251. if err != nil {
  252. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  253. }
  254. params.KeySym = make([]byte, aesKeyLength)
  255. _, err = msg.Wrap(params)
  256. if err == nil {
  257. t.Fatalf("wrapped with zero key, seed: %d.", seed)
  258. }
  259. params, err = generateMessageParams()
  260. if err != nil {
  261. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  262. }
  263. msg, err = NewSentMessage(params)
  264. if err != nil {
  265. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  266. }
  267. params.KeySym = make([]byte, 0)
  268. _, err = msg.Wrap(params)
  269. if err == nil {
  270. t.Fatalf("wrapped with empty key, seed: %d.", seed)
  271. }
  272. params, err = generateMessageParams()
  273. if err != nil {
  274. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  275. }
  276. msg, err = NewSentMessage(params)
  277. if err != nil {
  278. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  279. }
  280. params.KeySym = nil
  281. _, err = msg.Wrap(params)
  282. if err == nil {
  283. t.Fatalf("wrapped with nil key, seed: %d.", seed)
  284. }
  285. }
  286. func TestRlpEncode(t *testing.T) {
  287. InitSingleTest()
  288. params, err := generateMessageParams()
  289. if err != nil {
  290. t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err)
  291. }
  292. msg, err := NewSentMessage(params)
  293. if err != nil {
  294. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  295. }
  296. env, err := msg.Wrap(params)
  297. if err != nil {
  298. t.Fatalf("wrapped with zero key, seed: %d.", seed)
  299. }
  300. raw, err := rlp.EncodeToBytes(env)
  301. if err != nil {
  302. t.Fatalf("RLP encode failed: %s.", err)
  303. }
  304. var decoded Envelope
  305. rlp.DecodeBytes(raw, &decoded)
  306. if err != nil {
  307. t.Fatalf("RLP decode failed: %s.", err)
  308. }
  309. he := env.Hash()
  310. hd := decoded.Hash()
  311. if he != hd {
  312. t.Fatalf("Hashes are not equal: %x vs. %x", he, hd)
  313. }
  314. }
  315. func singlePaddingTest(t *testing.T, padSize int) {
  316. params, err := generateMessageParams()
  317. if err != nil {
  318. t.Fatalf("failed generateMessageParams with seed %d and sz=%d: %s.", seed, padSize, err)
  319. }
  320. params.Padding = make([]byte, padSize)
  321. params.PoW = 0.0000000001
  322. pad := make([]byte, padSize)
  323. _, err = mrand.Read(pad)
  324. if err != nil {
  325. t.Fatalf("padding is not generated (seed %d): %s", seed, err)
  326. }
  327. n := copy(params.Padding, pad)
  328. if n != padSize {
  329. t.Fatalf("padding is not copied (seed %d): %s", seed, err)
  330. }
  331. msg, err := NewSentMessage(params)
  332. if err != nil {
  333. t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
  334. }
  335. env, err := msg.Wrap(params)
  336. if err != nil {
  337. t.Fatalf("failed to wrap, seed: %d and sz=%d.", seed, padSize)
  338. }
  339. f := Filter{KeySym: params.KeySym}
  340. decrypted := env.Open(&f)
  341. if decrypted == nil {
  342. t.Fatalf("failed to open, seed and sz=%d: %d.", seed, padSize)
  343. }
  344. if !bytes.Equal(pad, decrypted.Padding) {
  345. t.Fatalf("padding is not retireved as expected with seed %d and sz=%d:\n[%x]\n[%x].", seed, padSize, pad, decrypted.Padding)
  346. }
  347. }
  348. func TestPadding(t *testing.T) {
  349. InitSingleTest()
  350. for i := 1; i < 260; i++ {
  351. singlePaddingTest(t, i)
  352. }
  353. lim := 256 * 256
  354. for i := lim - 5; i < lim+2; i++ {
  355. singlePaddingTest(t, i)
  356. }
  357. for i := 0; i < 256; i++ {
  358. n := mrand.Intn(256*254) + 256
  359. singlePaddingTest(t, n)
  360. }
  361. for i := 0; i < 256; i++ {
  362. n := mrand.Intn(256*1024) + 256*256
  363. singlePaddingTest(t, n)
  364. }
  365. }
  366. func TestPaddingAppendedToSymMessagesWithSignature(t *testing.T) {
  367. params := &MessageParams{
  368. Payload: make([]byte, 246),
  369. KeySym: make([]byte, aesKeyLength),
  370. }
  371. pSrc, err := crypto.GenerateKey()
  372. if err != nil {
  373. t.Fatalf("Error creating the signature key %v", err)
  374. return
  375. }
  376. params.Src = pSrc
  377. // Simulate a message with a payload just under 256 so that
  378. // payload + flag + signature > 256. Check that the result
  379. // is padded on the next 256 boundary.
  380. msg := sentMessage{}
  381. const payloadSizeFieldMinSize = 1
  382. msg.Raw = make([]byte, flagsLength+payloadSizeFieldMinSize+len(params.Payload))
  383. err = msg.appendPadding(params)
  384. if err != nil {
  385. t.Fatalf("Error appending padding to message %v", err)
  386. return
  387. }
  388. if len(msg.Raw) != 512-signatureLength {
  389. t.Errorf("Invalid size %d != 512", len(msg.Raw))
  390. }
  391. }
  392. func TestAesNonce(t *testing.T) {
  393. key := hexutil.MustDecode("0x03ca634cae0d49acb401d8a4c6b6fe8c55b70d115bf400769cc1400f3258cd31")
  394. block, err := aes.NewCipher(key)
  395. if err != nil {
  396. t.Fatalf("NewCipher failed: %s", err)
  397. }
  398. aesgcm, err := cipher.NewGCM(block)
  399. if err != nil {
  400. t.Fatalf("NewGCM failed: %s", err)
  401. }
  402. // This is the most important single test in this package.
  403. // If it fails, whisper will not be working.
  404. if aesgcm.NonceSize() != aesNonceLength {
  405. t.Fatalf("Nonce size is wrong. This is a critical error. Apparently AES nonce size have changed in the new version of AES GCM package. Whisper will not be working until this problem is resolved.")
  406. }
  407. }