aboutsummaryrefslogtreecommitdiffstats
path: root/swarm/pss/handshake_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'swarm/pss/handshake_test.go')
-rw-r--r--swarm/pss/handshake_test.go266
1 files changed, 266 insertions, 0 deletions
diff --git a/swarm/pss/handshake_test.go b/swarm/pss/handshake_test.go
new file mode 100644
index 000000000..0fc7e798f
--- /dev/null
+++ b/swarm/pss/handshake_test.go
@@ -0,0 +1,266 @@
+// Copyright 2018 The go-ethereum Authors
+// This file is part of the go-ethereum library.
+//
+// The go-ethereum library is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Lesser General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// The go-ethereum library is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+// GNU Lesser General Public License for more details.
+//
+// You should have received a copy of the GNU Lesser General Public License
+// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
+
+// +build foo
+
+package pss
+
+import (
+ "strconv"
+ "strings"
+ "testing"
+ "time"
+
+ "github.com/ethereum/go-ethereum/swarm/log"
+)
+
+// asymmetrical key exchange between two directly connected peers
+// full address, partial address (8 bytes) and empty address
+func TestHandshake(t *testing.T) {
+ t.Run("32", testHandshake)
+ t.Run("8", testHandshake)
+ t.Run("0", testHandshake)
+}
+
+func testHandshake(t *testing.T) {
+
+ // how much of the address we will use
+ useHandshake = true
+ var addrsize int64
+ var err error
+ addrsizestring := strings.Split(t.Name(), "/")
+ addrsize, _ = strconv.ParseInt(addrsizestring[1], 10, 0)
+
+ // set up two nodes directly connected
+ // (we are not testing pss routing here)
+ clients, err := setupNetwork(2)
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ var topic string
+ err = clients[0].Call(&topic, "pss_stringToTopic", "foo:42")
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ var loaddr string
+ err = clients[0].Call(&loaddr, "pss_baseAddr")
+ if err != nil {
+ t.Fatalf("rpc get node 1 baseaddr fail: %v", err)
+ }
+ // "0x" = 2 bytes + addrsize address bytes which in hex is 2x length
+ loaddr = loaddr[:2+(addrsize*2)]
+ var roaddr string
+ err = clients[1].Call(&roaddr, "pss_baseAddr")
+ if err != nil {
+ t.Fatalf("rpc get node 2 baseaddr fail: %v", err)
+ }
+ roaddr = roaddr[:2+(addrsize*2)]
+ log.Debug("addresses", "left", loaddr, "right", roaddr)
+
+ // retrieve public key from pss instance
+ // set this public key reciprocally
+ var lpubkey string
+ err = clients[0].Call(&lpubkey, "pss_getPublicKey")
+ if err != nil {
+ t.Fatalf("rpc get node 1 pubkey fail: %v", err)
+ }
+ var rpubkey string
+ err = clients[1].Call(&rpubkey, "pss_getPublicKey")
+ if err != nil {
+ t.Fatalf("rpc get node 2 pubkey fail: %v", err)
+ }
+
+ time.Sleep(time.Millisecond * 1000) // replace with hive healthy code
+
+ // give each node its peer's public key
+ err = clients[0].Call(nil, "pss_setPeerPublicKey", rpubkey, topic, roaddr)
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = clients[1].Call(nil, "pss_setPeerPublicKey", lpubkey, topic, loaddr)
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ // perform the handshake
+ // after this each side will have defaultSymKeyBufferCapacity symkeys each for in- and outgoing messages:
+ // L -> request 4 keys -> R
+ // L <- send 4 keys, request 4 keys <- R
+ // L -> send 4 keys -> R
+ // the call will fill the array with symkeys L needs for sending to R
+ err = clients[0].Call(nil, "pss_addHandshake", topic)
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = clients[1].Call(nil, "pss_addHandshake", topic)
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ var lhsendsymkeyids []string
+ err = clients[0].Call(&lhsendsymkeyids, "pss_handshake", rpubkey, topic, true, true)
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ // make sure the r-node gets its keys
+ time.Sleep(time.Second)
+
+ // check if we have 6 outgoing keys stored, and they match what was received from R
+ var lsendsymkeyids []string
+ err = clients[0].Call(&lsendsymkeyids, "pss_getHandshakeKeys", rpubkey, topic, false, true)
+ if err != nil {
+ t.Fatal(err)
+ }
+ m := 0
+ for _, hid := range lhsendsymkeyids {
+ for _, lid := range lsendsymkeyids {
+ if lid == hid {
+ m++
+ }
+ }
+ }
+ if m != defaultSymKeyCapacity {
+ t.Fatalf("buffer size mismatch, expected %d, have %d: %v", defaultSymKeyCapacity, m, lsendsymkeyids)
+ }
+
+ // check if in- and outgoing keys on l-node and r-node match up and are in opposite categories (l recv = r send, l send = r recv)
+ var rsendsymkeyids []string
+ err = clients[1].Call(&rsendsymkeyids, "pss_getHandshakeKeys", lpubkey, topic, false, true)
+ if err != nil {
+ t.Fatal(err)
+ }
+ var lrecvsymkeyids []string
+ err = clients[0].Call(&lrecvsymkeyids, "pss_getHandshakeKeys", rpubkey, topic, true, false)
+ if err != nil {
+ t.Fatal(err)
+ }
+ var rrecvsymkeyids []string
+ err = clients[1].Call(&rrecvsymkeyids, "pss_getHandshakeKeys", lpubkey, topic, true, false)
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ // get outgoing symkeys in byte form from both sides
+ var lsendsymkeys []string
+ for _, id := range lsendsymkeyids {
+ var key string
+ err = clients[0].Call(&key, "pss_getSymmetricKey", id)
+ if err != nil {
+ t.Fatal(err)
+ }
+ lsendsymkeys = append(lsendsymkeys, key)
+ }
+ var rsendsymkeys []string
+ for _, id := range rsendsymkeyids {
+ var key string
+ err = clients[1].Call(&key, "pss_getSymmetricKey", id)
+ if err != nil {
+ t.Fatal(err)
+ }
+ rsendsymkeys = append(rsendsymkeys, key)
+ }
+
+ // get incoming symkeys in byte form from both sides and compare
+ var lrecvsymkeys []string
+ for _, id := range lrecvsymkeyids {
+ var key string
+ err = clients[0].Call(&key, "pss_getSymmetricKey", id)
+ if err != nil {
+ t.Fatal(err)
+ }
+ match := false
+ for _, otherkey := range rsendsymkeys {
+ if otherkey == key {
+ match = true
+ }
+ }
+ if !match {
+ t.Fatalf("no match right send for left recv key %s", id)
+ }
+ lrecvsymkeys = append(lrecvsymkeys, key)
+ }
+ var rrecvsymkeys []string
+ for _, id := range rrecvsymkeyids {
+ var key string
+ err = clients[1].Call(&key, "pss_getSymmetricKey", id)
+ if err != nil {
+ t.Fatal(err)
+ }
+ match := false
+ for _, otherkey := range lsendsymkeys {
+ if otherkey == key {
+ match = true
+ }
+ }
+ if !match {
+ t.Fatalf("no match left send for right recv key %s", id)
+ }
+ rrecvsymkeys = append(rrecvsymkeys, key)
+ }
+
+ // send new handshake request, should send no keys
+ err = clients[0].Call(nil, "pss_handshake", rpubkey, topic, false)
+ if err == nil {
+ t.Fatal("expected full symkey buffer error")
+ }
+
+ // expire one key, send new handshake request
+ err = clients[0].Call(nil, "pss_releaseHandshakeKey", rpubkey, topic, lsendsymkeyids[0], true)
+ if err != nil {
+ t.Fatalf("release left send key %s fail: %v", lsendsymkeyids[0], err)
+ }
+
+ var newlhsendkeyids []string
+
+ // send new handshake request, should now receive one key
+ // check that it is not in previous right recv key array
+ err = clients[0].Call(&newlhsendkeyids, "pss_handshake", rpubkey, topic, true, false)
+ if err != nil {
+ t.Fatalf("handshake send fail: %v", err)
+ } else if len(newlhsendkeyids) != defaultSymKeyCapacity {
+ t.Fatalf("wrong receive count, expected 1, got %d", len(newlhsendkeyids))
+ }
+
+ var newlrecvsymkey string
+ err = clients[0].Call(&newlrecvsymkey, "pss_getSymmetricKey", newlhsendkeyids[0])
+ if err != nil {
+ t.Fatal(err)
+ }
+ var rmatchsymkeyid *string
+ for i, id := range rrecvsymkeyids {
+ var key string
+ err = clients[1].Call(&key, "pss_getSymmetricKey", id)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if newlrecvsymkey == key {
+ rmatchsymkeyid = &rrecvsymkeyids[i]
+ }
+ }
+ if rmatchsymkeyid != nil {
+ t.Fatalf("right sent old key id %s in second handshake", *rmatchsymkeyid)
+ }
+
+ // clean the pss core keystore. Should clean the key released earlier
+ var cleancount int
+ clients[0].Call(&cleancount, "psstest_clean")
+ if cleancount > 1 {
+ t.Fatalf("pss clean count mismatch; expected 1, got %d", cleancount)
+ }
+}