@@ -194,7 +194,7 @@ func PingExtraData(t *utesting.T) {
194
194
}
195
195
}
196
196
197
- // This test sends a PING packet with additional data and wrong 'from' field
197
+ // PingExtraDataWrongFrom sends a PING packet with additional data and wrong 'from' field
198
198
// and expects a PONG response.
199
199
func PingExtraDataWrongFrom (t * utesting.T ) {
200
200
te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -215,7 +215,7 @@ func PingExtraDataWrongFrom(t *utesting.T) {
215
215
}
216
216
}
217
217
218
- // This test sends a PING packet with an expiration in the past.
218
+ // PingPastExpiration sends a PING packet with an expiration in the past.
219
219
// The remote node should not respond.
220
220
func PingPastExpiration (t * utesting.T ) {
221
221
te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -234,7 +234,7 @@ func PingPastExpiration(t *utesting.T) {
234
234
}
235
235
}
236
236
237
- // This test sends an invalid packet. The remote node should not respond.
237
+ // WrongPacketType sends an invalid packet. The remote node should not respond.
238
238
func WrongPacketType (t * utesting.T ) {
239
239
te := newTestEnv (Remote , Listen1 , Listen2 )
240
240
defer te .close ()
@@ -252,7 +252,7 @@ func WrongPacketType(t *utesting.T) {
252
252
}
253
253
}
254
254
255
- // This test verifies that the default behaviour of ignoring 'from' fields is unaffected by
255
+ // BondThenPingWithWrongFrom verifies that the default behaviour of ignoring 'from' fields is unaffected by
256
256
// the bonding process. After bonding, it pings the target with a different from endpoint.
257
257
func BondThenPingWithWrongFrom (t * utesting.T ) {
258
258
te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -289,7 +289,7 @@ waitForPong:
289
289
}
290
290
}
291
291
292
- // This test just sends FINDNODE. The remote node should not reply
292
+ // FindnodeWithoutEndpointProof sends FINDNODE. The remote node should not reply
293
293
// because the endpoint proof has not completed.
294
294
func FindnodeWithoutEndpointProof (t * utesting.T ) {
295
295
te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -332,7 +332,7 @@ func BasicFindnode(t *utesting.T) {
332
332
}
333
333
}
334
334
335
- // This test sends an unsolicited NEIGHBORS packet after the endpoint proof, then sends
335
+ // UnsolicitedNeighbors sends an unsolicited NEIGHBORS packet after the endpoint proof, then sends
336
336
// FINDNODE to read the remote table. The remote node should not return the node contained
337
337
// in the unsolicited NEIGHBORS packet.
338
338
func UnsolicitedNeighbors (t * utesting.T ) {
@@ -373,7 +373,7 @@ func UnsolicitedNeighbors(t *utesting.T) {
373
373
}
374
374
}
375
375
376
- // This test sends FINDNODE with an expiration timestamp in the past.
376
+ // FindnodePastExpiration sends FINDNODE with an expiration timestamp in the past.
377
377
// The remote node should not respond.
378
378
func FindnodePastExpiration (t * utesting.T ) {
379
379
te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -426,7 +426,7 @@ func bond(t *utesting.T, te *testenv) {
426
426
}
427
427
}
428
428
429
- // This test attempts to perform a traffic amplification attack against a
429
+ // FindnodeAmplificationInvalidPongHash attempts to perform a traffic amplification attack against a
430
430
// 'victim' endpoint using FINDNODE. In this attack scenario, the attacker
431
431
// attempts to complete the endpoint proof non-interactively by sending a PONG
432
432
// with mismatching reply token from the 'victim' endpoint. The attack works if
@@ -478,7 +478,7 @@ func FindnodeAmplificationInvalidPongHash(t *utesting.T) {
478
478
}
479
479
}
480
480
481
- // This test attempts to perform a traffic amplification attack using FINDNODE.
481
+ // FindnodeAmplificationWrongIP attempts to perform a traffic amplification attack using FINDNODE.
482
482
// The attack works if the remote node does not verify the IP address of FINDNODE
483
483
// against the endpoint verification proof done by PING/PONG.
484
484
func FindnodeAmplificationWrongIP (t * utesting.T ) {
0 commit comments