// Copyright 2015 The go-ethereum Authors // This file is part of the go-ethereum library. // // The go-ethereum library is free software: you can redistribute it and/or modify // it under the terms of the GNU Lesser General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // The go-ethereum library is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU Lesser General Public License // along with the go-ethereum library. If not, see . package whisperv2 import ( "bytes" "testing" "time" "github.com/ethereum/go-ethereum/crypto" "github.com/ethereum/go-ethereum/crypto/ecies" ) func TestEnvelopeOpen(t *testing.T) { payload := []byte("hello world") message := NewMessage(payload) envelope, err := message.Wrap(DefaultPoW, Options{}) if err != nil { t.Fatalf("failed to wrap message: %v", err) } opened, err := envelope.Open(nil) if err != nil { t.Fatalf("failed to open envelope: %v", err) } if opened.Flags != message.Flags { t.Fatalf("flags mismatch: have %d, want %d", opened.Flags, message.Flags) } if bytes.Compare(opened.Signature, message.Signature) != 0 { t.Fatalf("signature mismatch: have 0x%x, want 0x%x", opened.Signature, message.Signature) } if bytes.Compare(opened.Payload, message.Payload) != 0 { t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, message.Payload) } if opened.Sent.Unix() != message.Sent.Unix() { t.Fatalf("send time mismatch: have %d, want %d", opened.Sent, message.Sent) } if opened.TTL/time.Second != DefaultTTL/time.Second { t.Fatalf("message TTL mismatch: have %v, want %v", opened.TTL, DefaultTTL) } if opened.Hash != envelope.Hash() { t.Fatalf("message hash mismatch: have 0x%x, want 0x%x", opened.Hash, envelope.Hash()) } } func TestEnvelopeAnonymousOpenUntargeted(t *testing.T) { payload := []byte("hello envelope") envelope, err := NewMessage(payload).Wrap(DefaultPoW, Options{}) if err != nil { t.Fatalf("failed to wrap message: %v", err) } opened, err := envelope.Open(nil) if err != nil { t.Fatalf("failed to open envelope: %v", err) } if opened.To != nil { t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To) } if bytes.Compare(opened.Payload, payload) != 0 { t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, payload) } } func TestEnvelopeAnonymousOpenTargeted(t *testing.T) { key, err := crypto.GenerateKey() if err != nil { t.Fatalf("failed to generate test identity: %v", err) } payload := []byte("hello envelope") envelope, err := NewMessage(payload).Wrap(DefaultPoW, Options{ To: &key.PublicKey, }) if err != nil { t.Fatalf("failed to wrap message: %v", err) } opened, err := envelope.Open(nil) if err != nil { t.Fatalf("failed to open envelope: %v", err) } if opened.To != nil { t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To) } if bytes.Compare(opened.Payload, payload) == 0 { t.Fatalf("payload match, should have been encrypted: 0x%x", opened.Payload) } } func TestEnvelopeIdentifiedOpenUntargeted(t *testing.T) { key, err := crypto.GenerateKey() if err != nil { t.Fatalf("failed to generate test identity: %v", err) } payload := []byte("hello envelope") envelope, err := NewMessage(payload).Wrap(DefaultPoW, Options{}) if err != nil { t.Fatalf("failed to wrap message: %v", err) } opened, err := envelope.Open(key) switch err { case nil: t.Fatalf("envelope opened with bad key: %v", opened) case ecies.ErrInvalidPublicKey: // Ok, key mismatch but opened default: t.Fatalf("failed to open envelope: %v", err) } if opened.To != nil { t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To) } if bytes.Compare(opened.Payload, payload) != 0 { t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, payload) } } func TestEnvelopeIdentifiedOpenTargeted(t *testing.T) { key, err := crypto.GenerateKey() if err != nil { t.Fatalf("failed to generate test identity: %v", err) } payload := []byte("hello envelope") envelope, err := NewMessage(payload).Wrap(DefaultPoW, Options{ To: &key.PublicKey, }) if err != nil { t.Fatalf("failed to wrap message: %v", err) } opened, err := envelope.Open(key) if err != nil { t.Fatalf("failed to open envelope: %v", err) } if opened.To != nil { t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To) } if bytes.Compare(opened.Payload, payload) != 0 { t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, payload) } } .22 FreeBSD GNOME current development ports (https://github.com/freebsd/freebsd-ports-gnome)
aboutsummaryrefslogtreecommitdiffstats
path: root/devel/p5-Cache-AgainstFile
Commit message (Expand)AuthorAgeFilesLines
* support STAGEDIR.vanilla2013-10-282-20/+18
* Certain automated tools fail when @FreeBSD.org is not capitalized appropriatly.eadler2013-09-271-1/+1
* Add NO_STAGE all over the place in preparation for the staging support (cat: ...bapt2013-09-211-0/+1
* - Convert to new perl frameworkaz2013-08-031-1/+2
* - Reset maintainer after no response to mail since Jan 2013swills2013-07-281-7/+3
* - Convert all remaining instances of BUILD_DEPENDS=${RUN_DEPENDS} orswills2012-06-111-1/+1
* - Revert ports/165605 as requested by portmgr@pgollucci2012-03-141-0/+3
* - Remove ports that only work with < perl 5.12 (devel/p5-B-Size, devel/p5-Dev...pgollucci2012-03-091-3/+0
* -remove MD5ohauer2011-07-031-1/+0