diff options
author | ethersphere <thesw@rm.eth> | 2018-06-20 20:06:27 +0800 |
---|---|---|
committer | ethersphere <thesw@rm.eth> | 2018-06-22 03:10:31 +0800 |
commit | e187711c6545487d4cac3701f0f506bb536234e2 (patch) | |
tree | d2f6150f70b84b36e49a449082aeda267b4b9046 /swarm/pss/handshake_test.go | |
parent | 574378edb50c907b532946a1d4654dbd6701b20a (diff) | |
download | go-tangerine-e187711c6545487d4cac3701f0f506bb536234e2.tar go-tangerine-e187711c6545487d4cac3701f0f506bb536234e2.tar.gz go-tangerine-e187711c6545487d4cac3701f0f506bb536234e2.tar.bz2 go-tangerine-e187711c6545487d4cac3701f0f506bb536234e2.tar.lz go-tangerine-e187711c6545487d4cac3701f0f506bb536234e2.tar.xz go-tangerine-e187711c6545487d4cac3701f0f506bb536234e2.tar.zst go-tangerine-e187711c6545487d4cac3701f0f506bb536234e2.zip |
swarm: network rewrite merge
Diffstat (limited to 'swarm/pss/handshake_test.go')
-rw-r--r-- | swarm/pss/handshake_test.go | 266 |
1 files changed, 266 insertions, 0 deletions
diff --git a/swarm/pss/handshake_test.go b/swarm/pss/handshake_test.go new file mode 100644 index 000000000..0fc7e798f --- /dev/null +++ b/swarm/pss/handshake_test.go @@ -0,0 +1,266 @@ +// Copyright 2018 The go-ethereum Authors +// This file is part of the go-ethereum library. +// +// The go-ethereum library is free software: you can redistribute it and/or modify +// it under the terms of the GNU Lesser General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// The go-ethereum library is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Lesser General Public License for more details. +// +// You should have received a copy of the GNU Lesser General Public License +// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. + +// +build foo + +package pss + +import ( + "strconv" + "strings" + "testing" + "time" + + "github.com/ethereum/go-ethereum/swarm/log" +) + +// asymmetrical key exchange between two directly connected peers +// full address, partial address (8 bytes) and empty address +func TestHandshake(t *testing.T) { + t.Run("32", testHandshake) + t.Run("8", testHandshake) + t.Run("0", testHandshake) +} + +func testHandshake(t *testing.T) { + + // how much of the address we will use + useHandshake = true + var addrsize int64 + var err error + addrsizestring := strings.Split(t.Name(), "/") + addrsize, _ = strconv.ParseInt(addrsizestring[1], 10, 0) + + // set up two nodes directly connected + // (we are not testing pss routing here) + clients, err := setupNetwork(2) + if err != nil { + t.Fatal(err) + } + + var topic string + err = clients[0].Call(&topic, "pss_stringToTopic", "foo:42") + if err != nil { + t.Fatal(err) + } + + var loaddr string + err = clients[0].Call(&loaddr, "pss_baseAddr") + if err != nil { + t.Fatalf("rpc get node 1 baseaddr fail: %v", err) + } + // "0x" = 2 bytes + addrsize address bytes which in hex is 2x length + loaddr = loaddr[:2+(addrsize*2)] + var roaddr string + err = clients[1].Call(&roaddr, "pss_baseAddr") + if err != nil { + t.Fatalf("rpc get node 2 baseaddr fail: %v", err) + } + roaddr = roaddr[:2+(addrsize*2)] + log.Debug("addresses", "left", loaddr, "right", roaddr) + + // retrieve public key from pss instance + // set this public key reciprocally + var lpubkey string + err = clients[0].Call(&lpubkey, "pss_getPublicKey") + if err != nil { + t.Fatalf("rpc get node 1 pubkey fail: %v", err) + } + var rpubkey string + err = clients[1].Call(&rpubkey, "pss_getPublicKey") + if err != nil { + t.Fatalf("rpc get node 2 pubkey fail: %v", err) + } + + time.Sleep(time.Millisecond * 1000) // replace with hive healthy code + + // give each node its peer's public key + err = clients[0].Call(nil, "pss_setPeerPublicKey", rpubkey, topic, roaddr) + if err != nil { + t.Fatal(err) + } + err = clients[1].Call(nil, "pss_setPeerPublicKey", lpubkey, topic, loaddr) + if err != nil { + t.Fatal(err) + } + + // perform the handshake + // after this each side will have defaultSymKeyBufferCapacity symkeys each for in- and outgoing messages: + // L -> request 4 keys -> R + // L <- send 4 keys, request 4 keys <- R + // L -> send 4 keys -> R + // the call will fill the array with symkeys L needs for sending to R + err = clients[0].Call(nil, "pss_addHandshake", topic) + if err != nil { + t.Fatal(err) + } + err = clients[1].Call(nil, "pss_addHandshake", topic) + if err != nil { + t.Fatal(err) + } + + var lhsendsymkeyids []string + err = clients[0].Call(&lhsendsymkeyids, "pss_handshake", rpubkey, topic, true, true) + if err != nil { + t.Fatal(err) + } + + // make sure the r-node gets its keys + time.Sleep(time.Second) + + // check if we have 6 outgoing keys stored, and they match what was received from R + var lsendsymkeyids []string + err = clients[0].Call(&lsendsymkeyids, "pss_getHandshakeKeys", rpubkey, topic, false, true) + if err != nil { + t.Fatal(err) + } + m := 0 + for _, hid := range lhsendsymkeyids { + for _, lid := range lsendsymkeyids { + if lid == hid { + m++ + } + } + } + if m != defaultSymKeyCapacity { + t.Fatalf("buffer size mismatch, expected %d, have %d: %v", defaultSymKeyCapacity, m, lsendsymkeyids) + } + + // check if in- and outgoing keys on l-node and r-node match up and are in opposite categories (l recv = r send, l send = r recv) + var rsendsymkeyids []string + err = clients[1].Call(&rsendsymkeyids, "pss_getHandshakeKeys", lpubkey, topic, false, true) + if err != nil { + t.Fatal(err) + } + var lrecvsymkeyids []string + err = clients[0].Call(&lrecvsymkeyids, "pss_getHandshakeKeys", rpubkey, topic, true, false) + if err != nil { + t.Fatal(err) + } + var rrecvsymkeyids []string + err = clients[1].Call(&rrecvsymkeyids, "pss_getHandshakeKeys", lpubkey, topic, true, false) + if err != nil { + t.Fatal(err) + } + + // get outgoing symkeys in byte form from both sides + var lsendsymkeys []string + for _, id := range lsendsymkeyids { + var key string + err = clients[0].Call(&key, "pss_getSymmetricKey", id) + if err != nil { + t.Fatal(err) + } + lsendsymkeys = append(lsendsymkeys, key) + } + var rsendsymkeys []string + for _, id := range rsendsymkeyids { + var key string + err = clients[1].Call(&key, "pss_getSymmetricKey", id) + if err != nil { + t.Fatal(err) + } + rsendsymkeys = append(rsendsymkeys, key) + } + + // get incoming symkeys in byte form from both sides and compare + var lrecvsymkeys []string + for _, id := range lrecvsymkeyids { + var key string + err = clients[0].Call(&key, "pss_getSymmetricKey", id) + if err != nil { + t.Fatal(err) + } + match := false + for _, otherkey := range rsendsymkeys { + if otherkey == key { + match = true + } + } + if !match { + t.Fatalf("no match right send for left recv key %s", id) + } + lrecvsymkeys = append(lrecvsymkeys, key) + } + var rrecvsymkeys []string + for _, id := range rrecvsymkeyids { + var key string + err = clients[1].Call(&key, "pss_getSymmetricKey", id) + if err != nil { + t.Fatal(err) + } + match := false + for _, otherkey := range lsendsymkeys { + if otherkey == key { + match = true + } + } + if !match { + t.Fatalf("no match left send for right recv key %s", id) + } + rrecvsymkeys = append(rrecvsymkeys, key) + } + + // send new handshake request, should send no keys + err = clients[0].Call(nil, "pss_handshake", rpubkey, topic, false) + if err == nil { + t.Fatal("expected full symkey buffer error") + } + + // expire one key, send new handshake request + err = clients[0].Call(nil, "pss_releaseHandshakeKey", rpubkey, topic, lsendsymkeyids[0], true) + if err != nil { + t.Fatalf("release left send key %s fail: %v", lsendsymkeyids[0], err) + } + + var newlhsendkeyids []string + + // send new handshake request, should now receive one key + // check that it is not in previous right recv key array + err = clients[0].Call(&newlhsendkeyids, "pss_handshake", rpubkey, topic, true, false) + if err != nil { + t.Fatalf("handshake send fail: %v", err) + } else if len(newlhsendkeyids) != defaultSymKeyCapacity { + t.Fatalf("wrong receive count, expected 1, got %d", len(newlhsendkeyids)) + } + + var newlrecvsymkey string + err = clients[0].Call(&newlrecvsymkey, "pss_getSymmetricKey", newlhsendkeyids[0]) + if err != nil { + t.Fatal(err) + } + var rmatchsymkeyid *string + for i, id := range rrecvsymkeyids { + var key string + err = clients[1].Call(&key, "pss_getSymmetricKey", id) + if err != nil { + t.Fatal(err) + } + if newlrecvsymkey == key { + rmatchsymkeyid = &rrecvsymkeyids[i] + } + } + if rmatchsymkeyid != nil { + t.Fatalf("right sent old key id %s in second handshake", *rmatchsymkeyid) + } + + // clean the pss core keystore. Should clean the key released earlier + var cleancount int + clients[0].Call(&cleancount, "psstest_clean") + if cleancount > 1 { + t.Fatalf("pss clean count mismatch; expected 1, got %d", cleancount) + } +} |