github.com/vantum/vantum@v0.0.0-20180815184342-fe37d5f7a990/whisper/whisperv5/filter_test.go (about) 1 // Copyright 2016 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package whisperv5 18 19 import ( 20 "math/big" 21 mrand "math/rand" 22 "testing" 23 "time" 24 25 "github.com/vantum/vantum/common" 26 "github.com/vantum/vantum/crypto" 27 ) 28 29 var seed int64 30 31 // InitSingleTest should be called in the beginning of every 32 // test, which uses RNG, in order to make the tests 33 // reproduciblity independent of their sequence. 34 func InitSingleTest() { 35 seed = time.Now().Unix() 36 mrand.Seed(seed) 37 } 38 39 func InitDebugTest(i int64) { 40 seed = i 41 mrand.Seed(seed) 42 } 43 44 type FilterTestCase struct { 45 f *Filter 46 id string 47 alive bool 48 msgCnt int 49 } 50 51 func generateFilter(t *testing.T, symmetric bool) (*Filter, error) { 52 var f Filter 53 f.Messages = make(map[common.Hash]*ReceivedMessage) 54 55 const topicNum = 8 56 f.Topics = make([][]byte, topicNum) 57 for i := 0; i < topicNum; i++ { 58 f.Topics[i] = make([]byte, 4) 59 mrand.Read(f.Topics[i][:]) 60 f.Topics[i][0] = 0x01 61 } 62 63 key, err := crypto.GenerateKey() 64 if err != nil { 65 t.Fatalf("generateFilter 1 failed with seed %d.", seed) 66 return nil, err 67 } 68 f.Src = &key.PublicKey 69 70 if symmetric { 71 f.KeySym = make([]byte, aesKeyLength) 72 mrand.Read(f.KeySym) 73 f.SymKeyHash = crypto.Keccak256Hash(f.KeySym) 74 } else { 75 f.KeyAsym, err = crypto.GenerateKey() 76 if err != nil { 77 t.Fatalf("generateFilter 2 failed with seed %d.", seed) 78 return nil, err 79 } 80 } 81 82 // AcceptP2P & PoW are not set 83 return &f, nil 84 } 85 86 func generateTestCases(t *testing.T, SizeTestFilters int) []FilterTestCase { 87 cases := make([]FilterTestCase, SizeTestFilters) 88 for i := 0; i < SizeTestFilters; i++ { 89 f, _ := generateFilter(t, true) 90 cases[i].f = f 91 cases[i].alive = mrand.Int()&int(1) == 0 92 } 93 return cases 94 } 95 96 func TestInstallFilters(t *testing.T) { 97 InitSingleTest() 98 99 const SizeTestFilters = 256 100 w := New(&Config{}) 101 filters := NewFilters(w) 102 tst := generateTestCases(t, SizeTestFilters) 103 104 var err error 105 var j string 106 for i := 0; i < SizeTestFilters; i++ { 107 j, err = filters.Install(tst[i].f) 108 if err != nil { 109 t.Fatalf("seed %d: failed to install filter: %s", seed, err) 110 } 111 tst[i].id = j 112 if len(j) != keyIdSize*2 { 113 t.Fatalf("seed %d: wrong filter id size [%d]", seed, len(j)) 114 } 115 } 116 117 for _, testCase := range tst { 118 if !testCase.alive { 119 filters.Uninstall(testCase.id) 120 } 121 } 122 123 for i, testCase := range tst { 124 fil := filters.Get(testCase.id) 125 exist := fil != nil 126 if exist != testCase.alive { 127 t.Fatalf("seed %d: failed alive: %d, %v, %v", seed, i, exist, testCase.alive) 128 } 129 if exist && fil.PoW != testCase.f.PoW { 130 t.Fatalf("seed %d: failed Get: %d, %v, %v", seed, i, exist, testCase.alive) 131 } 132 } 133 } 134 135 func TestInstallSymKeyGeneratesHash(t *testing.T) { 136 InitSingleTest() 137 138 w := New(&Config{}) 139 filters := NewFilters(w) 140 filter, _ := generateFilter(t, true) 141 142 // save the current SymKeyHash for comparison 143 initialSymKeyHash := filter.SymKeyHash 144 145 // ensure the SymKeyHash is invalid, for Install to recreate it 146 var invalid common.Hash 147 filter.SymKeyHash = invalid 148 149 _, err := filters.Install(filter) 150 151 if err != nil { 152 t.Fatalf("Error installing the filter: %s", err) 153 } 154 155 for i, b := range filter.SymKeyHash { 156 if b != initialSymKeyHash[i] { 157 t.Fatalf("The filter's symmetric key hash was not properly generated by Install") 158 } 159 } 160 } 161 162 func TestInstallIdenticalFilters(t *testing.T) { 163 InitSingleTest() 164 165 w := New(&Config{}) 166 filters := NewFilters(w) 167 filter1, _ := generateFilter(t, true) 168 169 // Copy the first filter since some of its fields 170 // are randomly gnerated. 171 filter2 := &Filter{ 172 KeySym: filter1.KeySym, 173 Topics: filter1.Topics, 174 PoW: filter1.PoW, 175 AllowP2P: filter1.AllowP2P, 176 Messages: make(map[common.Hash]*ReceivedMessage), 177 } 178 179 _, err := filters.Install(filter1) 180 181 if err != nil { 182 t.Fatalf("Error installing the first filter with seed %d: %s", seed, err) 183 } 184 185 _, err = filters.Install(filter2) 186 187 if err != nil { 188 t.Fatalf("Error installing the second filter with seed %d: %s", seed, err) 189 } 190 191 params, err := generateMessageParams() 192 if err != nil { 193 t.Fatalf("Error generating message parameters with seed %d: %s", seed, err) 194 } 195 196 params.KeySym = filter1.KeySym 197 params.Topic = BytesToTopic(filter1.Topics[0]) 198 199 filter1.Src = ¶ms.Src.PublicKey 200 filter2.Src = ¶ms.Src.PublicKey 201 202 sentMessage, err := NewSentMessage(params) 203 if err != nil { 204 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 205 } 206 env, err := sentMessage.Wrap(params) 207 if err != nil { 208 t.Fatalf("failed Wrap with seed %d: %s.", seed, err) 209 } 210 msg := env.Open(filter1) 211 if msg == nil { 212 t.Fatalf("failed to Open with filter1") 213 } 214 215 if !filter1.MatchEnvelope(env) { 216 t.Fatalf("failed matching with the first filter") 217 } 218 219 if !filter2.MatchEnvelope(env) { 220 t.Fatalf("failed matching with the first filter") 221 } 222 223 if !filter1.MatchMessage(msg) { 224 t.Fatalf("failed matching with the second filter") 225 } 226 227 if !filter2.MatchMessage(msg) { 228 t.Fatalf("failed matching with the second filter") 229 } 230 } 231 232 func TestComparePubKey(t *testing.T) { 233 InitSingleTest() 234 235 key1, err := crypto.GenerateKey() 236 if err != nil { 237 t.Fatalf("failed to generate first key with seed %d: %s.", seed, err) 238 } 239 key2, err := crypto.GenerateKey() 240 if err != nil { 241 t.Fatalf("failed to generate second key with seed %d: %s.", seed, err) 242 } 243 if IsPubKeyEqual(&key1.PublicKey, &key2.PublicKey) { 244 t.Fatalf("public keys are equal, seed %d.", seed) 245 } 246 247 // generate key3 == key1 248 mrand.Seed(seed) 249 key3, err := crypto.GenerateKey() 250 if err != nil { 251 t.Fatalf("failed to generate third key with seed %d: %s.", seed, err) 252 } 253 if IsPubKeyEqual(&key1.PublicKey, &key3.PublicKey) { 254 t.Fatalf("key1 == key3, seed %d.", seed) 255 } 256 } 257 258 func TestMatchEnvelope(t *testing.T) { 259 InitSingleTest() 260 261 fsym, err := generateFilter(t, true) 262 if err != nil { 263 t.Fatalf("failed generateFilter with seed %d: %s.", seed, err) 264 } 265 266 fasym, err := generateFilter(t, false) 267 if err != nil { 268 t.Fatalf("failed generateFilter() with seed %d: %s.", seed, err) 269 } 270 271 params, err := generateMessageParams() 272 if err != nil { 273 t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) 274 } 275 276 params.Topic[0] = 0xFF // ensure mismatch 277 278 // mismatch with pseudo-random data 279 msg, err := NewSentMessage(params) 280 if err != nil { 281 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 282 } 283 env, err := msg.Wrap(params) 284 if err != nil { 285 t.Fatalf("failed Wrap with seed %d: %s.", seed, err) 286 } 287 match := fsym.MatchEnvelope(env) 288 if match { 289 t.Fatalf("failed MatchEnvelope symmetric with seed %d.", seed) 290 } 291 match = fasym.MatchEnvelope(env) 292 if match { 293 t.Fatalf("failed MatchEnvelope asymmetric with seed %d.", seed) 294 } 295 296 // encrypt symmetrically 297 i := mrand.Int() % 4 298 fsym.Topics[i] = params.Topic[:] 299 fasym.Topics[i] = params.Topic[:] 300 msg, err = NewSentMessage(params) 301 if err != nil { 302 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 303 } 304 env, err = msg.Wrap(params) 305 if err != nil { 306 t.Fatalf("failed Wrap() with seed %d: %s.", seed, err) 307 } 308 309 // symmetric + matching topic: match 310 match = fsym.MatchEnvelope(env) 311 if !match { 312 t.Fatalf("failed MatchEnvelope() symmetric with seed %d.", seed) 313 } 314 315 // asymmetric + matching topic: mismatch 316 match = fasym.MatchEnvelope(env) 317 if match { 318 t.Fatalf("failed MatchEnvelope() asymmetric with seed %d.", seed) 319 } 320 321 // symmetric + matching topic + insufficient PoW: mismatch 322 fsym.PoW = env.PoW() + 1.0 323 match = fsym.MatchEnvelope(env) 324 if match { 325 t.Fatalf("failed MatchEnvelope(symmetric + matching topic + insufficient PoW) asymmetric with seed %d.", seed) 326 } 327 328 // symmetric + matching topic + sufficient PoW: match 329 fsym.PoW = env.PoW() / 2 330 match = fsym.MatchEnvelope(env) 331 if !match { 332 t.Fatalf("failed MatchEnvelope(symmetric + matching topic + sufficient PoW) with seed %d.", seed) 333 } 334 335 // symmetric + topics are nil (wildcard): match 336 prevTopics := fsym.Topics 337 fsym.Topics = nil 338 match = fsym.MatchEnvelope(env) 339 if !match { 340 t.Fatalf("failed MatchEnvelope(symmetric + topics are nil) with seed %d.", seed) 341 } 342 fsym.Topics = prevTopics 343 344 // encrypt asymmetrically 345 key, err := crypto.GenerateKey() 346 if err != nil { 347 t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err) 348 } 349 params.KeySym = nil 350 params.Dst = &key.PublicKey 351 msg, err = NewSentMessage(params) 352 if err != nil { 353 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 354 } 355 env, err = msg.Wrap(params) 356 if err != nil { 357 t.Fatalf("failed Wrap() with seed %d: %s.", seed, err) 358 } 359 360 // encryption method mismatch 361 match = fsym.MatchEnvelope(env) 362 if match { 363 t.Fatalf("failed MatchEnvelope(encryption method mismatch) with seed %d.", seed) 364 } 365 366 // asymmetric + mismatching topic: mismatch 367 match = fasym.MatchEnvelope(env) 368 if !match { 369 t.Fatalf("failed MatchEnvelope(asymmetric + mismatching topic) with seed %d.", seed) 370 } 371 372 // asymmetric + matching topic: match 373 fasym.Topics[i] = fasym.Topics[i+1] 374 match = fasym.MatchEnvelope(env) 375 if match { 376 t.Fatalf("failed MatchEnvelope(asymmetric + matching topic) with seed %d.", seed) 377 } 378 379 // asymmetric + filter without topic (wildcard): match 380 fasym.Topics = nil 381 match = fasym.MatchEnvelope(env) 382 if !match { 383 t.Fatalf("failed MatchEnvelope(asymmetric + filter without topic) with seed %d.", seed) 384 } 385 386 // asymmetric + insufficient PoW: mismatch 387 fasym.PoW = env.PoW() + 1.0 388 match = fasym.MatchEnvelope(env) 389 if match { 390 t.Fatalf("failed MatchEnvelope(asymmetric + insufficient PoW) with seed %d.", seed) 391 } 392 393 // asymmetric + sufficient PoW: match 394 fasym.PoW = env.PoW() / 2 395 match = fasym.MatchEnvelope(env) 396 if !match { 397 t.Fatalf("failed MatchEnvelope(asymmetric + sufficient PoW) with seed %d.", seed) 398 } 399 400 // filter without topic + envelope without topic: match 401 env.Topic = TopicType{} 402 match = fasym.MatchEnvelope(env) 403 if !match { 404 t.Fatalf("failed MatchEnvelope(filter without topic + envelope without topic) with seed %d.", seed) 405 } 406 407 // filter with topic + envelope without topic: mismatch 408 fasym.Topics = fsym.Topics 409 match = fasym.MatchEnvelope(env) 410 if match { 411 t.Fatalf("failed MatchEnvelope(filter without topic + envelope without topic) with seed %d.", seed) 412 } 413 } 414 415 func TestMatchMessageSym(t *testing.T) { 416 InitSingleTest() 417 418 params, err := generateMessageParams() 419 if err != nil { 420 t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) 421 } 422 423 f, err := generateFilter(t, true) 424 if err != nil { 425 t.Fatalf("failed generateFilter with seed %d: %s.", seed, err) 426 } 427 428 const index = 1 429 params.KeySym = f.KeySym 430 params.Topic = BytesToTopic(f.Topics[index]) 431 432 sentMessage, err := NewSentMessage(params) 433 if err != nil { 434 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 435 } 436 env, err := sentMessage.Wrap(params) 437 if err != nil { 438 t.Fatalf("failed Wrap with seed %d: %s.", seed, err) 439 } 440 msg := env.Open(f) 441 if msg == nil { 442 t.Fatalf("failed Open with seed %d.", seed) 443 } 444 445 // Src: match 446 *f.Src.X = *params.Src.PublicKey.X 447 *f.Src.Y = *params.Src.PublicKey.Y 448 if !f.MatchMessage(msg) { 449 t.Fatalf("failed MatchEnvelope(src match) with seed %d.", seed) 450 } 451 452 // insufficient PoW: mismatch 453 f.PoW = msg.PoW + 1.0 454 if f.MatchMessage(msg) { 455 t.Fatalf("failed MatchEnvelope(insufficient PoW) with seed %d.", seed) 456 } 457 458 // sufficient PoW: match 459 f.PoW = msg.PoW / 2 460 if !f.MatchMessage(msg) { 461 t.Fatalf("failed MatchEnvelope(sufficient PoW) with seed %d.", seed) 462 } 463 464 // topic mismatch 465 f.Topics[index][0]++ 466 if f.MatchMessage(msg) { 467 t.Fatalf("failed MatchEnvelope(topic mismatch) with seed %d.", seed) 468 } 469 f.Topics[index][0]-- 470 471 // key mismatch 472 f.SymKeyHash[0]++ 473 if f.MatchMessage(msg) { 474 t.Fatalf("failed MatchEnvelope(key mismatch) with seed %d.", seed) 475 } 476 f.SymKeyHash[0]-- 477 478 // Src absent: match 479 f.Src = nil 480 if !f.MatchMessage(msg) { 481 t.Fatalf("failed MatchEnvelope(src absent) with seed %d.", seed) 482 } 483 484 // key hash mismatch 485 h := f.SymKeyHash 486 f.SymKeyHash = common.Hash{} 487 if f.MatchMessage(msg) { 488 t.Fatalf("failed MatchEnvelope(key hash mismatch) with seed %d.", seed) 489 } 490 f.SymKeyHash = h 491 if !f.MatchMessage(msg) { 492 t.Fatalf("failed MatchEnvelope(key hash match) with seed %d.", seed) 493 } 494 495 // encryption method mismatch 496 f.KeySym = nil 497 f.KeyAsym, err = crypto.GenerateKey() 498 if err != nil { 499 t.Fatalf("failed GenerateKey with seed %d: %s.", seed, err) 500 } 501 if f.MatchMessage(msg) { 502 t.Fatalf("failed MatchEnvelope(encryption method mismatch) with seed %d.", seed) 503 } 504 } 505 506 func TestMatchMessageAsym(t *testing.T) { 507 InitSingleTest() 508 509 f, err := generateFilter(t, false) 510 if err != nil { 511 t.Fatalf("failed generateFilter with seed %d: %s.", seed, err) 512 } 513 514 params, err := generateMessageParams() 515 if err != nil { 516 t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) 517 } 518 519 const index = 1 520 params.Topic = BytesToTopic(f.Topics[index]) 521 params.Dst = &f.KeyAsym.PublicKey 522 keySymOrig := params.KeySym 523 params.KeySym = nil 524 525 sentMessage, err := NewSentMessage(params) 526 if err != nil { 527 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 528 } 529 env, err := sentMessage.Wrap(params) 530 if err != nil { 531 t.Fatalf("failed Wrap with seed %d: %s.", seed, err) 532 } 533 msg := env.Open(f) 534 if msg == nil { 535 t.Fatalf("failed to open with seed %d.", seed) 536 } 537 538 // Src: match 539 *f.Src.X = *params.Src.PublicKey.X 540 *f.Src.Y = *params.Src.PublicKey.Y 541 if !f.MatchMessage(msg) { 542 t.Fatalf("failed MatchMessage(src match) with seed %d.", seed) 543 } 544 545 // insufficient PoW: mismatch 546 f.PoW = msg.PoW + 1.0 547 if f.MatchMessage(msg) { 548 t.Fatalf("failed MatchEnvelope(insufficient PoW) with seed %d.", seed) 549 } 550 551 // sufficient PoW: match 552 f.PoW = msg.PoW / 2 553 if !f.MatchMessage(msg) { 554 t.Fatalf("failed MatchEnvelope(sufficient PoW) with seed %d.", seed) 555 } 556 557 // topic mismatch 558 f.Topics[index][0]++ 559 if f.MatchMessage(msg) { 560 t.Fatalf("failed MatchEnvelope(topic mismatch) with seed %d.", seed) 561 } 562 f.Topics[index][0]-- 563 564 // key mismatch 565 prev := *f.KeyAsym.PublicKey.X 566 zero := *big.NewInt(0) 567 *f.KeyAsym.PublicKey.X = zero 568 if f.MatchMessage(msg) { 569 t.Fatalf("failed MatchEnvelope(key mismatch) with seed %d.", seed) 570 } 571 *f.KeyAsym.PublicKey.X = prev 572 573 // Src absent: match 574 f.Src = nil 575 if !f.MatchMessage(msg) { 576 t.Fatalf("failed MatchEnvelope(src absent) with seed %d.", seed) 577 } 578 579 // encryption method mismatch 580 f.KeySym = keySymOrig 581 f.KeyAsym = nil 582 if f.MatchMessage(msg) { 583 t.Fatalf("failed MatchEnvelope(encryption method mismatch) with seed %d.", seed) 584 } 585 } 586 587 func cloneFilter(orig *Filter) *Filter { 588 var clone Filter 589 clone.Messages = make(map[common.Hash]*ReceivedMessage) 590 clone.Src = orig.Src 591 clone.KeyAsym = orig.KeyAsym 592 clone.KeySym = orig.KeySym 593 clone.Topics = orig.Topics 594 clone.PoW = orig.PoW 595 clone.AllowP2P = orig.AllowP2P 596 clone.SymKeyHash = orig.SymKeyHash 597 return &clone 598 } 599 600 func generateCompatibeEnvelope(t *testing.T, f *Filter) *Envelope { 601 params, err := generateMessageParams() 602 if err != nil { 603 t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) 604 return nil 605 } 606 607 params.KeySym = f.KeySym 608 params.Topic = BytesToTopic(f.Topics[2]) 609 sentMessage, err := NewSentMessage(params) 610 if err != nil { 611 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 612 } 613 env, err := sentMessage.Wrap(params) 614 if err != nil { 615 t.Fatalf("failed Wrap with seed %d: %s.", seed, err) 616 return nil 617 } 618 return env 619 } 620 621 func TestWatchers(t *testing.T) { 622 InitSingleTest() 623 624 const NumFilters = 16 625 const NumMessages = 256 626 var i int 627 var j uint32 628 var e *Envelope 629 var x, firstID string 630 var err error 631 632 w := New(&Config{}) 633 filters := NewFilters(w) 634 tst := generateTestCases(t, NumFilters) 635 for i = 0; i < NumFilters; i++ { 636 tst[i].f.Src = nil 637 x, err = filters.Install(tst[i].f) 638 if err != nil { 639 t.Fatalf("failed to install filter with seed %d: %s.", seed, err) 640 } 641 tst[i].id = x 642 if len(firstID) == 0 { 643 firstID = x 644 } 645 } 646 647 lastID := x 648 649 var envelopes [NumMessages]*Envelope 650 for i = 0; i < NumMessages; i++ { 651 j = mrand.Uint32() % NumFilters 652 e = generateCompatibeEnvelope(t, tst[j].f) 653 envelopes[i] = e 654 tst[j].msgCnt++ 655 } 656 657 for i = 0; i < NumMessages; i++ { 658 filters.NotifyWatchers(envelopes[i], false) 659 } 660 661 var total int 662 var mail []*ReceivedMessage 663 var count [NumFilters]int 664 665 for i = 0; i < NumFilters; i++ { 666 mail = tst[i].f.Retrieve() 667 count[i] = len(mail) 668 total += len(mail) 669 } 670 671 if total != NumMessages { 672 t.Fatalf("failed with seed %d: total = %d, want: %d.", seed, total, NumMessages) 673 } 674 675 for i = 0; i < NumFilters; i++ { 676 mail = tst[i].f.Retrieve() 677 if len(mail) != 0 { 678 t.Fatalf("failed with seed %d: i = %d.", seed, i) 679 } 680 681 if tst[i].msgCnt != count[i] { 682 t.Fatalf("failed with seed %d: count[%d]: get %d, want %d.", seed, i, tst[i].msgCnt, count[i]) 683 } 684 } 685 686 // another round with a cloned filter 687 688 clone := cloneFilter(tst[0].f) 689 filters.Uninstall(lastID) 690 total = 0 691 last := NumFilters - 1 692 tst[last].f = clone 693 filters.Install(clone) 694 for i = 0; i < NumFilters; i++ { 695 tst[i].msgCnt = 0 696 count[i] = 0 697 } 698 699 // make sure that the first watcher receives at least one message 700 e = generateCompatibeEnvelope(t, tst[0].f) 701 envelopes[0] = e 702 tst[0].msgCnt++ 703 for i = 1; i < NumMessages; i++ { 704 j = mrand.Uint32() % NumFilters 705 e = generateCompatibeEnvelope(t, tst[j].f) 706 envelopes[i] = e 707 tst[j].msgCnt++ 708 } 709 710 for i = 0; i < NumMessages; i++ { 711 filters.NotifyWatchers(envelopes[i], false) 712 } 713 714 for i = 0; i < NumFilters; i++ { 715 mail = tst[i].f.Retrieve() 716 count[i] = len(mail) 717 total += len(mail) 718 } 719 720 combined := tst[0].msgCnt + tst[last].msgCnt 721 if total != NumMessages+count[0] { 722 t.Fatalf("failed with seed %d: total = %d, count[0] = %d.", seed, total, count[0]) 723 } 724 725 if combined != count[0] { 726 t.Fatalf("failed with seed %d: combined = %d, count[0] = %d.", seed, combined, count[0]) 727 } 728 729 if combined != count[last] { 730 t.Fatalf("failed with seed %d: combined = %d, count[last] = %d.", seed, combined, count[last]) 731 } 732 733 for i = 1; i < NumFilters-1; i++ { 734 mail = tst[i].f.Retrieve() 735 if len(mail) != 0 { 736 t.Fatalf("failed with seed %d: i = %d.", seed, i) 737 } 738 739 if tst[i].msgCnt != count[i] { 740 t.Fatalf("failed with seed %d: i = %d, get %d, want %d.", seed, i, tst[i].msgCnt, count[i]) 741 } 742 } 743 744 // test AcceptP2P 745 746 total = 0 747 filters.NotifyWatchers(envelopes[0], true) 748 749 for i = 0; i < NumFilters; i++ { 750 mail = tst[i].f.Retrieve() 751 total += len(mail) 752 } 753 754 if total != 0 { 755 t.Fatalf("failed with seed %d: total: got %d, want 0.", seed, total) 756 } 757 758 f := filters.Get(firstID) 759 if f == nil { 760 t.Fatalf("failed to get the filter with seed %d.", seed) 761 } 762 f.AllowP2P = true 763 total = 0 764 filters.NotifyWatchers(envelopes[0], true) 765 766 for i = 0; i < NumFilters; i++ { 767 mail = tst[i].f.Retrieve() 768 total += len(mail) 769 } 770 771 if total != 1 { 772 t.Fatalf("failed with seed %d: total: got %d, want 1.", seed, total) 773 } 774 } 775 776 func TestVariableTopics(t *testing.T) { 777 InitSingleTest() 778 779 const lastTopicByte = 3 780 var match bool 781 params, err := generateMessageParams() 782 if err != nil { 783 t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) 784 } 785 msg, err := NewSentMessage(params) 786 if err != nil { 787 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 788 } 789 env, err := msg.Wrap(params) 790 if err != nil { 791 t.Fatalf("failed Wrap with seed %d: %s.", seed, err) 792 } 793 794 f, err := generateFilter(t, true) 795 if err != nil { 796 t.Fatalf("failed generateFilter with seed %d: %s.", seed, err) 797 } 798 799 for i := 0; i < 4; i++ { 800 env.Topic = BytesToTopic(f.Topics[i]) 801 match = f.MatchEnvelope(env) 802 if !match { 803 t.Fatalf("failed MatchEnvelope symmetric with seed %d, step %d.", seed, i) 804 } 805 806 f.Topics[i][lastTopicByte]++ 807 match = f.MatchEnvelope(env) 808 if match { 809 t.Fatalf("MatchEnvelope symmetric with seed %d, step %d: false positive.", seed, i) 810 } 811 } 812 } 813 814 func TestMatchSingleTopic_ReturnTrue(t *testing.T) { 815 bt := []byte("test") 816 topic := BytesToTopic(bt) 817 818 if !matchSingleTopic(topic, bt) { 819 t.FailNow() 820 } 821 } 822 823 func TestMatchSingleTopic_WithTail_ReturnTrue(t *testing.T) { 824 bt := []byte("test with tail") 825 topic := BytesToTopic([]byte("test")) 826 827 if !matchSingleTopic(topic, bt) { 828 t.FailNow() 829 } 830 } 831 832 func TestMatchSingleTopic_NotEquals_ReturnFalse(t *testing.T) { 833 bt := []byte("tes") 834 topic := BytesToTopic(bt) 835 836 if matchSingleTopic(topic, bt) { 837 t.FailNow() 838 } 839 } 840 841 func TestMatchSingleTopic_InsufficientLength_ReturnFalse(t *testing.T) { 842 bt := []byte("test") 843 topic := BytesToTopic([]byte("not_equal")) 844 845 if matchSingleTopic(topic, bt) { 846 t.FailNow() 847 } 848 }