-
Notifications
You must be signed in to change notification settings - Fork 6
/
Copy pathkey_exchanger_test.go
89 lines (81 loc) · 2.61 KB
/
key_exchanger_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
package secureio
import (
"bytes"
"context"
"fmt"
"strings"
"testing"
"time"
"github.com/aead/ecdh"
"github.com/stretchr/testify/assert"
xerrors "github.com/xaionaro-go/errors"
)
func testKeyExchanger(t *testing.T, errFunc func(error)) *keyExchanger {
ctx, cancelFunc := context.WithCancel(context.Background())
closedChan := make(chan struct{})
close(closedChan)
kx := &keyExchanger{
ctx: ctx,
cancelFunc: cancelFunc,
doneFunc: cancelFunc,
errFunc: errFunc,
ecdh: ecdh.X25519(),
messenger: &Messenger{sess: &Session{
ctx: ctx,
backend: newErroneousConn(),
state: newSessionStateStorage(),
cipherKeys: &[][][]byte{nil}[0],
messageHeadersPool: newMessageHeadersPool(),
messageFragmentHeadersPool: newMessageFragmentHeadersPool(),
messagesContainerHeadersPool: newMessagesContainerHeadersPool(),
bufferPool: newBufferPool(1),
packetSizeLimit: maxPossiblePacketSize,
establishedPayloadSize: maxPossiblePacketSize - 100,
waitForCipherKeyChan: make(chan struct{}),
options: SessionOptions{
PayloadSizeLimit: payloadSizeLimit,
},
isEstablished: closedChan,
}},
localIdentity: testIdentity(t),
remoteIdentity: testIdentity(t),
}
sess := kx.messenger.sess
sess.sendInfoPool = newSendInfoPool(sess)
sess.setSecrets([][]byte{make([]byte, 32), make([]byte, 32), make([]byte, 32), make([]byte, 32)})
return kx
}
func TestKeyExchanger_generateSharedKey_negative(t *testing.T) {
errCount := 0
kx := testKeyExchanger(t, func(err error) {
errCount++
})
func() {
defer func() {
assert.True(t, strings.Index(fmt.Sprintf("%v", recover()), `should not happen`) != -1)
}()
var a [32]byte
_, _ = kx.generateSharedKey(&a, &a)
}()
assert.True(t, kx.Handle(nil).(*xerrors.Error).Has(ErrTooShort{}))
assert.True(t, kx.Handle(make([]byte, 65536)).(*xerrors.Error).Has(ErrInvalidSignature{}))
assert.NotZero(t, kx.updateLocalKey())
assert.NotZero(t, kx.updateLocalKey())
kx.nextLocalKeyCreatedAt = kx.localKeyCreatedAt
kx.cryptoRandReader = &bytes.Buffer{}
assert.Zero(t, kx.updateLocalKey())
assert.Equal(t, 1, errCount)
kx.cancelFunc()
kx.sendSuccessNotifications()
}
func TestKeyExchanger_KeyUpdateSendWait_timeout(t *testing.T) {
errCount := 0
kx := testKeyExchanger(t, func(err error) {
errCount++
assert.True(t, err.(*xerrors.Error).Has(ErrKeyExchangeTimeout{}), err)
})
kx.options.Timeout = time.Nanosecond
kx.options.RetryInterval = time.Hour
kx.KeyUpdateSendWait()
assert.Equal(t, 1, errCount)
}