mirror of
https://github.com/status-im/whisper.git
synced 2025-02-23 16:08:25 +00:00
all: fix issues reported by honnef.co/go/simple/cmd/gosimple
This commit is contained in:
parent
473f9a9571
commit
bd6c050a25
@ -178,14 +178,10 @@ func (api *PublicWhisperAPI) NewFilter(args WhisperFilterArgs) (uint32, error) {
|
||||
Messages: make(map[common.Hash]*whisperv5.ReceivedMessage),
|
||||
AcceptP2P: args.AcceptP2P,
|
||||
}
|
||||
|
||||
if len(filter.KeySym) > 0 {
|
||||
filter.SymKeyHash = crypto.Keccak256Hash(filter.KeySym)
|
||||
}
|
||||
|
||||
for _, t := range args.Topics {
|
||||
filter.Topics = append(filter.Topics, t)
|
||||
}
|
||||
filter.Topics = append(filter.Topics, args.Topics...)
|
||||
|
||||
if len(args.Topics) == 0 {
|
||||
info := "NewFilter: at least one topic must be specified"
|
||||
|
@ -253,7 +253,7 @@ func TestUnmarshalPostArgs(t *testing.T) {
|
||||
if a.FilterID != 64 {
|
||||
t.Fatalf("wrong FilterID: %d.", a.FilterID)
|
||||
}
|
||||
if bytes.Compare(a.PeerID[:], a.Topic[:]) != 0 {
|
||||
if !bytes.Equal(a.PeerID[:], a.Topic[:]) {
|
||||
t.Fatalf("wrong PeerID: %x.", a.PeerID)
|
||||
}
|
||||
}
|
||||
|
@ -40,10 +40,10 @@ func TestEnvelopeOpen(t *testing.T) {
|
||||
if opened.Flags != message.Flags {
|
||||
t.Fatalf("flags mismatch: have %d, want %d", opened.Flags, message.Flags)
|
||||
}
|
||||
if bytes.Compare(opened.Signature, message.Signature) != 0 {
|
||||
if !bytes.Equal(opened.Signature, message.Signature) {
|
||||
t.Fatalf("signature mismatch: have 0x%x, want 0x%x", opened.Signature, message.Signature)
|
||||
}
|
||||
if bytes.Compare(opened.Payload, message.Payload) != 0 {
|
||||
if !bytes.Equal(opened.Payload, message.Payload) {
|
||||
t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, message.Payload)
|
||||
}
|
||||
if opened.Sent.Unix() != message.Sent.Unix() {
|
||||
@ -71,7 +71,7 @@ func TestEnvelopeAnonymousOpenUntargeted(t *testing.T) {
|
||||
if opened.To != nil {
|
||||
t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To)
|
||||
}
|
||||
if bytes.Compare(opened.Payload, payload) != 0 {
|
||||
if !bytes.Equal(opened.Payload, payload) {
|
||||
t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, payload)
|
||||
}
|
||||
}
|
||||
@ -96,7 +96,7 @@ func TestEnvelopeAnonymousOpenTargeted(t *testing.T) {
|
||||
if opened.To != nil {
|
||||
t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To)
|
||||
}
|
||||
if bytes.Compare(opened.Payload, payload) == 0 {
|
||||
if bytes.Equal(opened.Payload, payload) {
|
||||
t.Fatalf("payload match, should have been encrypted: 0x%x", opened.Payload)
|
||||
}
|
||||
}
|
||||
@ -127,7 +127,7 @@ func TestEnvelopeIdentifiedOpenUntargeted(t *testing.T) {
|
||||
if opened.To != nil {
|
||||
t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To)
|
||||
}
|
||||
if bytes.Compare(opened.Payload, payload) != 0 {
|
||||
if !bytes.Equal(opened.Payload, payload) {
|
||||
t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, payload)
|
||||
}
|
||||
}
|
||||
@ -152,7 +152,7 @@ func TestEnvelopeIdentifiedOpenTargeted(t *testing.T) {
|
||||
if opened.To != nil {
|
||||
t.Fatalf("recipient mismatch: have 0x%x, want nil", opened.To)
|
||||
}
|
||||
if bytes.Compare(opened.Payload, payload) != 0 {
|
||||
if !bytes.Equal(opened.Payload, payload) {
|
||||
t.Fatalf("payload mismatch: have 0x%x, want 0x%x", opened.Payload, payload)
|
||||
}
|
||||
}
|
||||
|
@ -120,10 +120,7 @@ func (self filterer) Compare(f filter.Filter) bool {
|
||||
break
|
||||
}
|
||||
}
|
||||
if !self.matcher.Matches(topics) {
|
||||
return false
|
||||
}
|
||||
return true
|
||||
return self.matcher.Matches(topics)
|
||||
}
|
||||
|
||||
// Trigger is called when a filter successfully matches an inbound message.
|
||||
|
@ -91,7 +91,7 @@ func TestFilterTopicsCreation(t *testing.T) {
|
||||
continue
|
||||
}
|
||||
for k := 0; k < len(condition); k++ {
|
||||
if bytes.Compare(condition[k][:], tt.filter[j][k][:]) != 0 {
|
||||
if !bytes.Equal(condition[k][:], tt.filter[j][k][:]) {
|
||||
t.Errorf("test %d, condition %d, segment %d: filter mismatch: have 0x%x, want 0x%x", i, j, k, condition[k], tt.filter[j][k])
|
||||
}
|
||||
}
|
||||
@ -115,7 +115,7 @@ func TestFilterTopicsCreation(t *testing.T) {
|
||||
continue
|
||||
}
|
||||
for k := 0; k < len(condition); k++ {
|
||||
if bytes.Compare(condition[k][:], tt.filter[j][k][:]) != 0 {
|
||||
if !bytes.Equal(condition[k][:], tt.filter[j][k][:]) {
|
||||
t.Errorf("test %d, condition %d, segment %d: filter mismatch: have 0x%x, want 0x%x", i, j, k, condition[k], tt.filter[j][k])
|
||||
}
|
||||
}
|
||||
@ -135,7 +135,7 @@ func TestFilterTopicsCreation(t *testing.T) {
|
||||
continue
|
||||
}
|
||||
for k := 0; k < len(condition); k++ {
|
||||
if bytes.Compare(condition[k][:], tt.filter[j][k][:]) != 0 {
|
||||
if !bytes.Equal(condition[k][:], tt.filter[j][k][:]) {
|
||||
t.Errorf("test %d, condition %d, segment %d: filter mismatch: have 0x%x, want 0x%x", i, j, k, condition[k], tt.filter[j][k])
|
||||
}
|
||||
}
|
||||
@ -156,7 +156,7 @@ func TestFilterTopicsCreation(t *testing.T) {
|
||||
continue
|
||||
}
|
||||
for k := 0; k < len(condition); k++ {
|
||||
if bytes.Compare(condition[k][:], tt.filter[j][k][:]) != 0 {
|
||||
if !bytes.Equal(condition[k][:], tt.filter[j][k][:]) {
|
||||
t.Errorf("test %d, condition %d, segment %d: filter mismatch: have 0x%x, want 0x%x", i, j, k, condition[k], tt.filter[j][k])
|
||||
}
|
||||
}
|
||||
|
@ -40,7 +40,7 @@ func TestMessageSimpleWrap(t *testing.T) {
|
||||
if len(msg.Signature) != 0 {
|
||||
t.Fatalf("signature found for simple wrapping: 0x%x", msg.Signature)
|
||||
}
|
||||
if bytes.Compare(msg.Payload, payload) != 0 {
|
||||
if !bytes.Equal(msg.Payload, payload) {
|
||||
t.Fatalf("payload mismatch after wrapping: have 0x%x, want 0x%x", msg.Payload, payload)
|
||||
}
|
||||
if msg.TTL/time.Second != DefaultTTL/time.Second {
|
||||
@ -65,7 +65,7 @@ func TestMessageCleartextSignRecover(t *testing.T) {
|
||||
if msg.Flags&signatureFlag != signatureFlag {
|
||||
t.Fatalf("signature flag mismatch: have %d, want %d", msg.Flags&signatureFlag, signatureFlag)
|
||||
}
|
||||
if bytes.Compare(msg.Payload, payload) != 0 {
|
||||
if !bytes.Equal(msg.Payload, payload) {
|
||||
t.Fatalf("payload mismatch after signing: have 0x%x, want 0x%x", msg.Payload, payload)
|
||||
}
|
||||
|
||||
|
@ -33,13 +33,13 @@ func TestTopicCreation(t *testing.T) {
|
||||
// Create the topics individually
|
||||
for i, tt := range topicCreationTests {
|
||||
topic := NewTopic(tt.data)
|
||||
if bytes.Compare(topic[:], tt.hash[:]) != 0 {
|
||||
if !bytes.Equal(topic[:], tt.hash[:]) {
|
||||
t.Errorf("binary test %d: hash mismatch: have %v, want %v.", i, topic, tt.hash)
|
||||
}
|
||||
}
|
||||
for i, tt := range topicCreationTests {
|
||||
topic := NewTopicFromString(string(tt.data))
|
||||
if bytes.Compare(topic[:], tt.hash[:]) != 0 {
|
||||
if !bytes.Equal(topic[:], tt.hash[:]) {
|
||||
t.Errorf("textual test %d: hash mismatch: have %v, want %v.", i, topic, tt.hash)
|
||||
}
|
||||
}
|
||||
@ -55,13 +55,13 @@ func TestTopicCreation(t *testing.T) {
|
||||
|
||||
topics := NewTopics(binaryData...)
|
||||
for i, tt := range topicCreationTests {
|
||||
if bytes.Compare(topics[i][:], tt.hash[:]) != 0 {
|
||||
if !bytes.Equal(topics[i][:], tt.hash[:]) {
|
||||
t.Errorf("binary batch test %d: hash mismatch: have %v, want %v.", i, topics[i], tt.hash)
|
||||
}
|
||||
}
|
||||
topics = NewTopicsFromStrings(textualData...)
|
||||
for i, tt := range topicCreationTests {
|
||||
if bytes.Compare(topics[i][:], tt.hash[:]) != 0 {
|
||||
if !bytes.Equal(topics[i][:], tt.hash[:]) {
|
||||
t.Errorf("textual batch test %d: hash mismatch: have %v, want %v.", i, topics[i], tt.hash)
|
||||
}
|
||||
}
|
||||
|
@ -104,10 +104,10 @@ func singleMessageTest(t *testing.T, symmetric bool) {
|
||||
}
|
||||
|
||||
padsz := len(decrypted.Padding)
|
||||
if bytes.Compare(steg[:padsz], decrypted.Padding) != 0 {
|
||||
if !bytes.Equal(steg[:padsz], decrypted.Padding) {
|
||||
t.Fatalf("failed with seed %d: compare padding.", seed)
|
||||
}
|
||||
if bytes.Compare(text, decrypted.Payload) != 0 {
|
||||
if !bytes.Equal(text, decrypted.Payload) {
|
||||
t.Fatalf("failed with seed %d: compare payload.", seed)
|
||||
}
|
||||
if !isMessageSigned(decrypted.Raw[0]) {
|
||||
@ -256,10 +256,10 @@ func singleEnvelopeOpenTest(t *testing.T, symmetric bool) {
|
||||
}
|
||||
|
||||
padsz := len(decrypted.Padding)
|
||||
if bytes.Compare(steg[:padsz], decrypted.Padding) != 0 {
|
||||
if !bytes.Equal(steg[:padsz], decrypted.Padding) {
|
||||
t.Fatalf("failed with seed %d: compare padding.", seed)
|
||||
}
|
||||
if bytes.Compare(text, decrypted.Payload) != 0 {
|
||||
if !bytes.Equal(text, decrypted.Payload) {
|
||||
t.Fatalf("failed with seed %d: compare payload.", seed)
|
||||
}
|
||||
if !isMessageSigned(decrypted.Raw[0]) {
|
||||
|
@ -207,7 +207,7 @@ func checkPropagation(t *testing.T) {
|
||||
func validateMail(t *testing.T, index int, mail []*ReceivedMessage) bool {
|
||||
var cnt int
|
||||
for _, m := range mail {
|
||||
if bytes.Compare(m.Payload, expectedMessage) == 0 {
|
||||
if bytes.Equal(m.Payload, expectedMessage) {
|
||||
cnt++
|
||||
}
|
||||
}
|
||||
|
@ -239,7 +239,7 @@ func TestWhisperSymKeyManagement(t *testing.T) {
|
||||
if k1 == nil {
|
||||
t.Fatalf("first key does not exist.")
|
||||
}
|
||||
if bytes.Compare(k1, randomKey) == 0 {
|
||||
if bytes.Equal(k1, randomKey) {
|
||||
t.Fatalf("k1 == randomKey.")
|
||||
}
|
||||
if k2 != nil {
|
||||
@ -264,10 +264,10 @@ func TestWhisperSymKeyManagement(t *testing.T) {
|
||||
if k2 == nil {
|
||||
t.Fatalf("k2 does not exist.")
|
||||
}
|
||||
if bytes.Compare(k1, k2) == 0 {
|
||||
if bytes.Equal(k1, k2) {
|
||||
t.Fatalf("k1 == k2.")
|
||||
}
|
||||
if bytes.Compare(k1, randomKey) == 0 {
|
||||
if bytes.Equal(k1, randomKey) {
|
||||
t.Fatalf("k1 == randomKey.")
|
||||
}
|
||||
if len(k1) != aesKeyLength {
|
||||
|
Loading…
x
Reference in New Issue
Block a user