// Copyright 2018 The dexon-consensus-core Authors
// This file is part of the dexon-consensus-core library.
//
// The dexon-consensus-core library is free software: you can redistribute it
// and/or modify it under the terms of the GNU Lesser General Public License as
// published by the Free Software Foundation, either version 3 of the License,
// or (at your option) any later version.
//
// The dexon-consensus-core library is distributed in the hope that it will be
// useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser
// General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with the dexon-consensus-core library. If not, see
// <http://www.gnu.org/licenses/>.
package core
import (
"testing"
"time"
"github.com/dexon-foundation/dexon-consensus-core/common"
"github.com/dexon-foundation/dexon-consensus-core/core/crypto"
"github.com/dexon-foundation/dexon-consensus-core/core/crypto/dkg"
"github.com/dexon-foundation/dexon-consensus-core/core/crypto/ecdsa"
"github.com/dexon-foundation/dexon-consensus-core/core/types"
"github.com/stretchr/testify/suite"
)
type CryptoTestSuite struct {
suite.Suite
}
var myNID = types.NodeID{Hash: common.NewRandomHash()}
func (s *CryptoTestSuite) prepareBlock(prevBlock *types.Block) *types.Block {
acks := common.Hashes{}
now := time.Now().UTC()
if prevBlock == nil {
return &types.Block{
Acks: common.NewSortedHashes(acks),
Timestamp: now,
Finalization: types.FinalizationResult{
Timestamp: time.Now(),
Height: 0,
},
}
}
s.Require().NotEqual(prevBlock.Hash, common.Hash{})
return &types.Block{
ParentHash: prevBlock.Hash,
Acks: common.NewSortedHashes(acks),
Timestamp: now,
Position: types.Position{
Height: prevBlock.Position.Height + 1,
},
Finalization: types.FinalizationResult{
Timestamp: time.Now(),
Height: prevBlock.Finalization.Height + 1,
},
}
}
func (s *CryptoTestSuite) newBlock(prevBlock *types.Block) *types.Block {
block := s.prepareBlock(prevBlock)
var err error
block.Hash, err = hashBlock(block)
s.Require().NoError(err)
return block
}
func (s *CryptoTestSuite) generateCompactionChain(
length int, prv crypto.PrivateKey) []*types.Block {
blocks := make([]*types.Block, length)
var prevBlock *types.Block
for idx := range blocks {
block := s.newBlock(prevBlock)
prevBlock = block
blocks[idx] = block
}
return blocks
}
func (s *CryptoTestSuite) generateBlockChain(
length int, prv crypto.PrivateKey) []*types.Block {
blocks := make([]*types.Block, length)
var prevBlock *types.Block
for idx := range blocks {
block := s.newBlock(prevBlock)
blocks[idx] = block
var err error
block.Signature, err = prv.Sign(block.Hash)
s.Require().NoError(err)
}
return blocks
}
func (s *CryptoTestSuite) TestBlockSignature() {
prv, err := ecdsa.NewPrivateKey()
pub := prv.PublicKey()
s.Require().NoError(err)
blocks := s.generateBlockChain(10, prv)
blockMap := make(map[common.Hash]*types.Block)
for _, block := range blocks {
blockMap[block.Hash] = block
}
for _, block := range blocks {
if !block.IsGenesis() {
parentBlock, exist := blockMap[block.ParentHash]
s.Require().True(exist)
s.True(parentBlock.Position.Height == block.Position.Height-1)
hash, err := hashBlock(parentBlock)
s.Require().NoError(err)
s.Equal(hash, block.ParentHash)
}
s.True(verifyBlockSignature(pub, block, block.Signature))
}
// Modify Block.Acks and verify signature again.
for _, block := range blocks {
block.Acks = append(block.Acks, common.NewRandomHash())
s.False(verifyBlockSignature(
pub, block, block.Signature))
}
}
func (s *CryptoTestSuite) TestVoteSignature() {
prv, err := ecdsa.NewPrivateKey()
s.Require().NoError(err)
pub := prv.PublicKey()
nID := types.NewNodeID(pub)
vote := &types.Vote{
ProposerID: nID,
Type: types.VoteAck,
BlockHash: common.NewRandomHash(),
Period: 1,
}
vote.Signature, err = prv.Sign(hashVote(vote))
s.Require().NoError(err)
ok, err := verifyVoteSignature(vote)
s.Require().NoError(err)
s.True(ok)
vote.Type = types.VoteConfirm
ok, err = verifyVoteSignature(vote)
s.Require().NoError(err)
s.False(ok)
}
func (s *CryptoTestSuite) TestCRSSignature() {
crs := common.NewRandomHash()
prv, err := ecdsa.NewPrivateKey()
s.Require().NoError(err)
pub := prv.PublicKey()
nID := types.NewNodeID(pub)
block := &types.Block{
ProposerID: nID,
}
block.CRSSignature, err = prv.Sign(hashCRS(block, crs))
s.Require().NoError(err)
ok, err := verifyCRSSignature(block, crs)
s.Require().NoError(err)
s.True(ok)
block.Position.Height++
ok, err = verifyCRSSignature(block, crs)
s.Require().NoError(err)
s.False(ok)
}
func (s *CryptoTestSuite) TestDKGSignature() {
prv, err := ecdsa.NewPrivateKey()
s.Require().NoError(err)
nID := types.NewNodeID(prv.PublicKey())
prvShare := &types.DKGPrivateShare{
ProposerID: nID,
Round: 5,
PrivateShare: *dkg.NewPrivateKey(),
}
prvShare.Signature, err = prv.Sign(hashDKGPrivateShare(prvShare))
s.Require().NoError(err)
ok, err := verifyDKGPrivateShareSignature(prvShare)
s.Require().NoError(err)
s.True(ok)
prvShare.Round++
ok, err = verifyDKGPrivateShareSignature(prvShare)
s.Require().NoError(err)
s.False(ok)
id := dkg.NewID([]byte{13})
_, pkShare := dkg.NewPrivateKeyShares(1)
mpk := &types.DKGMasterPublicKey{
ProposerID: nID,
Round: 5,
DKGID: id,
PublicKeyShares: *pkShare,
}
mpk.Signature, err = prv.Sign(hashDKGMasterPublicKey(mpk))
s.Require().NoError(err)
ok, err = VerifyDKGMasterPublicKeySignature(mpk)
s.Require().NoError(err)
s.True(ok)
mpk.Round++
ok, err = VerifyDKGMasterPublicKeySignature(mpk)
s.Require().NoError(err)
s.False(ok)
prvShare.Round = 5
prvShare.Signature, err = prv.Sign(hashDKGPrivateShare(prvShare))
s.Require().NoError(err)
complaint := &types.DKGComplaint{
ProposerID: nID,
Round: 5,
PrivateShare: *prvShare,
}
complaint.Signature, err = prv.Sign(hashDKGComplaint(complaint))
s.Require().NoError(err)
ok, err = VerifyDKGComplaintSignature(complaint)
s.Require().NoError(err)
s.True(ok)
// Test incorrect complaint signature.
complaint.Round++
ok, err = VerifyDKGComplaintSignature(complaint)
s.Require().NoError(err)
s.False(ok)
// Test mismatch round.
complaint.Round--
complaint.PrivateShare.Round++
complaint.Signature, err = prv.Sign(hashDKGComplaint(complaint))
s.Require().NoError(err)
ok, err = VerifyDKGComplaintSignature(complaint)
s.Require().NoError(err)
s.False(ok)
// Test incorrect private share signature.
complaint.PrivateShare.Round--
complaint.PrivateShare.ReceiverID = types.NodeID{Hash: common.NewRandomHash()}
complaint.Signature, err = prv.Sign(hashDKGComplaint(complaint))
s.Require().NoError(err)
ok, err = VerifyDKGComplaintSignature(complaint)
s.Require().NoError(err)
s.False(ok)
sig := &types.DKGPartialSignature{
ProposerID: nID,
Round: 5,
PartialSignature: dkg.PartialSignature{},
}
sig.Signature, err = prv.Sign(hashDKGPartialSignature(sig))
s.Require().NoError(err)
ok, err = verifyDKGPartialSignatureSignature(sig)
s.Require().NoError(err)
s.True(ok)
sig.Round++
ok, err = verifyDKGPartialSignatureSignature(sig)
s.Require().NoError(err)
s.False(ok)
final := &types.DKGFinalize{
ProposerID: nID,
Round: 5,
}
final.Signature, err = prv.Sign(hashDKGFinalize(final))
s.Require().NoError(err)
ok, err = VerifyDKGFinalizeSignature(final)
s.Require().NoError(err)
s.True(ok)
final.Round++
ok, err = VerifyDKGFinalizeSignature(final)
s.Require().NoError(err)
s.False(ok)
}
func TestCrypto(t *testing.T) {
suite.Run(t, new(CryptoTestSuite))
}