Files
hush3/src/cryptoconditions/tests/test_failure_modes.py
2020-05-12 21:42:03 -04:00

107 lines
3.2 KiB
Python

import json
import ctypes
import base64
from .test_vectors import jsonRPC, so, decode_base64 as d64, encode_base64 as e64
'''
These tests are aimed at edge cases of serverside deployment.
As such, the main functions to test are decoding and verifying fulfillment payloads.
'''
cc_rfb = lambda f: so.cc_readFulfillmentBinary(f, len(f))
cc_rcb = lambda f: so.cc_readConditionBinary(f, len(f))
unhex = lambda s: base64.b16decode(s.upper())
def test_decode_valid_fulfillment():
f = unhex('a42480206ee12ed43d7dce6fc0b2be20e6808380baafc03d400404bbf95165d7527b373a8100')
assert cc_rfb(f)
def test_decode_invalid_fulfillment():
# This fulfillment payload has an invalid type ID but is otherwise valid
invalid_type_id = unhex('bf632480206ee12ed43d7dce6fc0b2be20e6808380baafc03d400404bbf95165d7527b373a8100')
assert cc_rfb(invalid_type_id) == 0
assert cc_rfb('\0') == 0
assert cc_rfb('') == 0
def test_large_fulfillment():
# This payload is valid and very large
f = unhex("a1839896b28083989680") + 10000000 * b'e' + \
unhex("81030186a0a226a42480206ee12ed43d7dce6fc0b2be20e68083"
"80baafc03d400404bbf95165d7527b373a8100")
cond = cc_rfb(f)
buflen = len(f) + 1000 # Wiggle room
buf = ctypes.create_string_buffer(buflen)
assert so.cc_fulfillmentBinary(cond, buf, buflen)
so.cc_free(cond)
def test_decode_valid_condition():
# Valid preimage
assert cc_rcb(d64(b'oCWAIMqXgRLKG73K-sIxs5oj3E2nhu_4FHxOcrmAd4Wv7ki7gQEB'))
# Somewhat bogus condition (prefix with no subtypes) but nonetheless valid structure
assert cc_rcb(unhex("a10a8001618101ff82020700"))
def test_decode_invalid_condition():
assert 0 == cc_rcb("")
assert 0 == cc_rcb("\0")
# Bogus type ID
assert 0 == cc_rcb(unhex('bf630c80016181030186a082020700'))
def test_validate_empty_sigs():
#// TODO: test failure mode: empty sig / null pointer
pass
def test_non_canonical_secp256k1():
cond = {
"type": "secp256k1-sha-256",
"publicKey": "02D5D969305535AC29A77079C11D4F0DD40661CF96E04E974A5E8D7E374EE225AA",
# Signature is correct, but non canonical; validation should fail
"signature": "9C2D6FF39F340BBAF65E884BDFFAE7436A7B7568839C5BA117FA6818245FB9DAC32138302B2C208E6E424DD9C702790AE10B241B89C8D0A06B01CB708334AB6E"
}
res = jsonRPC('verifyFulfillment', {
'fulfillment': jsonRPC('encodeFulfillment', cond)['fulfillment'],
'condition': jsonRPC('encodeCondition', cond)['bin'],
'message': ''
})
assert res['valid'] == False
def test_malleability_checked():
assert cc_rfb(b'\xa2\x13\xa0\x0f\xa0\x05\x80\x03abc\xa0\x06\x80\x04abcd\xa1\x00')
assert not cc_rfb(b'\xa2\x13\xa0\x0f\xa0\x06\x80\x04abcd\xa0\x05\x80\x03abc\xa1\x00')
def test_large_threshold():
conds = [{
'type': "secp256k1-sha-256",
"publicKey": "02D5D969305535AC29A77079C11D4F0DD40661CF96E04E974A5E8D7E374EE225AA"
}]
for i in range(250):
conds.append({
"type": "eval-sha-256",
"code": "VEVTVAE"
})
r = jsonRPC("encodeCondition", {
"type": "threshold-sha-256",
"subfulfillments": conds,
"threshold": 251
})
assert 'error' not in r, r
so.cc_conditionUri.restype = ctypes.c_char_p