mirror of
https://gitlab.com/pulsechaincom/go-pulse.git
synced 2024-12-25 21:07:17 +00:00
79789af2e7
whisper: project restructured, version 5 introduced This commits adds a draft version of the new shh v5 protocol. The new version is not on by default, --shh still selects version 2.
159 lines
4.7 KiB
Go
159 lines
4.7 KiB
Go
// Copyright 2015 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package whisperv2
|
|
|
|
import (
|
|
"bytes"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/ethereum/go-ethereum/crypto/ecies"
|
|
)
|
|
|
|
func TestEnvelopeOpen(t *testing.T) {
|
|
payload := []byte("hello world")
|
|
message := NewMessage(payload)
|
|
|
|
envelope, err := message.Wrap(DefaultPoW, Options{})
|
|
if err != nil {
|
|
t.Fatalf("failed to wrap message: %v", err)
|
|
}
|
|
opened, err := envelope.Open(nil)
|
|
if err != nil {
|
|
t.Fatalf("failed to open envelope: %v", err)
|
|
}
|
|
if opened.Flags != message.Flags {
|
|
t.Fatalf("flags mismatch: have %d, want %d", opened.Flags, message.Flags)
|
|
}
|
|
if bytes.Compare(opened.Signature, message.Signature) != 0 {
|
|
t.Fatalf("signature mismatch: have 0x%x, want 0x%x", opened.Signature, message.Signature)
|
|
}
|
|
if bytes.Compare(opened.Payload, message.Payload) != 0 {
|
|
t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, message.Payload)
|
|
}
|
|
if opened.Sent.Unix() != message.Sent.Unix() {
|
|
t.Fatalf("send time mismatch: have %d, want %d", opened.Sent, message.Sent)
|
|
}
|
|
if opened.TTL/time.Second != DefaultTTL/time.Second {
|
|
t.Fatalf("message TTL mismatch: have %v, want %v", opened.TTL, DefaultTTL)
|
|
}
|
|
|
|
if opened.Hash != envelope.Hash() {
|
|
t.Fatalf("message hash mismatch: have 0x%x, want 0x%x", opened.Hash, envelope.Hash())
|
|
}
|
|
}
|
|
|
|
func TestEnvelopeAnonymousOpenUntargeted(t *testing.T) {
|
|
payload := []byte("hello envelope")
|
|
envelope, err := NewMessage(payload).Wrap(DefaultPoW, Options{})
|
|
if err != nil {
|
|
t.Fatalf("failed to wrap message: %v", err)
|
|
}
|
|
opened, err := envelope.Open(nil)
|
|
if err != nil {
|
|
t.Fatalf("failed to open envelope: %v", err)
|
|
}
|
|
if opened.To != nil {
|
|
t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To)
|
|
}
|
|
if bytes.Compare(opened.Payload, payload) != 0 {
|
|
t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, payload)
|
|
}
|
|
}
|
|
|
|
func TestEnvelopeAnonymousOpenTargeted(t *testing.T) {
|
|
key, err := crypto.GenerateKey()
|
|
if err != nil {
|
|
t.Fatalf("failed to generate test identity: %v", err)
|
|
}
|
|
|
|
payload := []byte("hello envelope")
|
|
envelope, err := NewMessage(payload).Wrap(DefaultPoW, Options{
|
|
To: &key.PublicKey,
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("failed to wrap message: %v", err)
|
|
}
|
|
opened, err := envelope.Open(nil)
|
|
if err != nil {
|
|
t.Fatalf("failed to open envelope: %v", err)
|
|
}
|
|
if opened.To != nil {
|
|
t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To)
|
|
}
|
|
if bytes.Compare(opened.Payload, payload) == 0 {
|
|
t.Fatalf("payload match, should have been encrypted: 0x%x", opened.Payload)
|
|
}
|
|
}
|
|
|
|
func TestEnvelopeIdentifiedOpenUntargeted(t *testing.T) {
|
|
key, err := crypto.GenerateKey()
|
|
if err != nil {
|
|
t.Fatalf("failed to generate test identity: %v", err)
|
|
}
|
|
|
|
payload := []byte("hello envelope")
|
|
envelope, err := NewMessage(payload).Wrap(DefaultPoW, Options{})
|
|
if err != nil {
|
|
t.Fatalf("failed to wrap message: %v", err)
|
|
}
|
|
opened, err := envelope.Open(key)
|
|
switch err {
|
|
case nil:
|
|
t.Fatalf("envelope opened with bad key: %v", opened)
|
|
|
|
case ecies.ErrInvalidPublicKey:
|
|
// Ok, key mismatch but opened
|
|
|
|
default:
|
|
t.Fatalf("failed to open envelope: %v", err)
|
|
}
|
|
|
|
if opened.To != nil {
|
|
t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To)
|
|
}
|
|
if bytes.Compare(opened.Payload, payload) != 0 {
|
|
t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, payload)
|
|
}
|
|
}
|
|
|
|
func TestEnvelopeIdentifiedOpenTargeted(t *testing.T) {
|
|
key, err := crypto.GenerateKey()
|
|
if err != nil {
|
|
t.Fatalf("failed to generate test identity: %v", err)
|
|
}
|
|
|
|
payload := []byte("hello envelope")
|
|
envelope, err := NewMessage(payload).Wrap(DefaultPoW, Options{
|
|
To: &key.PublicKey,
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("failed to wrap message: %v", err)
|
|
}
|
|
opened, err := envelope.Open(key)
|
|
if err != nil {
|
|
t.Fatalf("failed to open envelope: %v", err)
|
|
}
|
|
if opened.To != nil {
|
|
t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To)
|
|
}
|
|
if bytes.Compare(opened.Payload, payload) != 0 {
|
|
t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, payload)
|
|
}
|
|
}
|