@@ -194,7 +194,7 @@ func PingExtraData(t *utesting.T) {
194194 }
195195}
196196
197- // This test sends a PING packet with additional data and wrong 'from' field
197+ // PingExtraDataWrongFrom sends a PING packet with additional data and wrong 'from' field
198198// and expects a PONG response.
199199func PingExtraDataWrongFrom (t * utesting.T ) {
200200 te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -215,7 +215,7 @@ func PingExtraDataWrongFrom(t *utesting.T) {
215215 }
216216}
217217
218- // This test sends a PING packet with an expiration in the past.
218+ // PingPastExpiration sends a PING packet with an expiration in the past.
219219// The remote node should not respond.
220220func PingPastExpiration (t * utesting.T ) {
221221 te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -234,7 +234,7 @@ func PingPastExpiration(t *utesting.T) {
234234 }
235235}
236236
237- // This test sends an invalid packet. The remote node should not respond.
237+ // WrongPacketType sends an invalid packet. The remote node should not respond.
238238func WrongPacketType (t * utesting.T ) {
239239 te := newTestEnv (Remote , Listen1 , Listen2 )
240240 defer te .close ()
@@ -252,7 +252,7 @@ func WrongPacketType(t *utesting.T) {
252252 }
253253}
254254
255- // This test verifies that the default behaviour of ignoring 'from' fields is unaffected by
255+ // BondThenPingWithWrongFrom verifies that the default behaviour of ignoring 'from' fields is unaffected by
256256// the bonding process. After bonding, it pings the target with a different from endpoint.
257257func BondThenPingWithWrongFrom (t * utesting.T ) {
258258 te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -289,7 +289,7 @@ waitForPong:
289289 }
290290}
291291
292- // This test just sends FINDNODE. The remote node should not reply
292+ // FindnodeWithoutEndpointProof sends FINDNODE. The remote node should not reply
293293// because the endpoint proof has not completed.
294294func FindnodeWithoutEndpointProof (t * utesting.T ) {
295295 te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -332,7 +332,7 @@ func BasicFindnode(t *utesting.T) {
332332 }
333333}
334334
335- // This test sends an unsolicited NEIGHBORS packet after the endpoint proof, then sends
335+ // UnsolicitedNeighbors sends an unsolicited NEIGHBORS packet after the endpoint proof, then sends
336336// FINDNODE to read the remote table. The remote node should not return the node contained
337337// in the unsolicited NEIGHBORS packet.
338338func UnsolicitedNeighbors (t * utesting.T ) {
@@ -373,7 +373,7 @@ func UnsolicitedNeighbors(t *utesting.T) {
373373 }
374374}
375375
376- // This test sends FINDNODE with an expiration timestamp in the past.
376+ // FindnodePastExpiration sends FINDNODE with an expiration timestamp in the past.
377377// The remote node should not respond.
378378func FindnodePastExpiration (t * utesting.T ) {
379379 te := newTestEnv (Remote , Listen1 , Listen2 )
@@ -426,7 +426,7 @@ func bond(t *utesting.T, te *testenv) {
426426 }
427427}
428428
429- // This test attempts to perform a traffic amplification attack against a
429+ // FindnodeAmplificationInvalidPongHash attempts to perform a traffic amplification attack against a
430430// 'victim' endpoint using FINDNODE. In this attack scenario, the attacker
431431// attempts to complete the endpoint proof non-interactively by sending a PONG
432432// with mismatching reply token from the 'victim' endpoint. The attack works if
@@ -478,7 +478,7 @@ func FindnodeAmplificationInvalidPongHash(t *utesting.T) {
478478 }
479479}
480480
481- // This test attempts to perform a traffic amplification attack using FINDNODE.
481+ // FindnodeAmplificationWrongIP attempts to perform a traffic amplification attack using FINDNODE.
482482// The attack works if the remote node does not verify the IP address of FINDNODE
483483// against the endpoint verification proof done by PING/PONG.
484484func FindnodeAmplificationWrongIP (t * utesting.T ) {
0 commit comments