mirror of
https://source.quilibrium.com/quilibrium/ceremonyclient.git
synced 2024-12-30 18:35:18 +00:00
106 lines
2.7 KiB
Go
106 lines
2.7 KiB
Go
package noise
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"net"
|
|
"testing"
|
|
|
|
"github.com/libp2p/go-libp2p/core/crypto"
|
|
)
|
|
|
|
func TestEncryptAndDecrypt_InitToResp(t *testing.T) {
|
|
initTransport := newTestTransport(t, crypto.Ed25519, 2048)
|
|
respTransport := newTestTransport(t, crypto.Ed25519, 2048)
|
|
|
|
initConn, respConn := connect(t, initTransport, respTransport)
|
|
defer initConn.Close()
|
|
defer respConn.Close()
|
|
|
|
plaintext := []byte("helloworld")
|
|
ciphertext, err := initConn.encrypt(nil, plaintext)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
result, err := respConn.decrypt(nil, ciphertext)
|
|
if !bytes.Equal(plaintext, result) {
|
|
t.Fatalf("got %x expected %x", result, plaintext)
|
|
} else if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
plaintext = []byte("goodbye")
|
|
ciphertext, err = initConn.encrypt(nil, plaintext)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
result, err = respConn.decrypt(nil, ciphertext)
|
|
if !bytes.Equal(plaintext, result) {
|
|
t.Fatalf("got %x expected %x", result, plaintext)
|
|
} else if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestEncryptAndDecrypt_RespToInit(t *testing.T) {
|
|
initTransport := newTestTransport(t, crypto.Ed25519, 2048)
|
|
respTransport := newTestTransport(t, crypto.Ed25519, 2048)
|
|
|
|
initConn, respConn := connect(t, initTransport, respTransport)
|
|
defer initConn.Close()
|
|
defer respConn.Close()
|
|
|
|
plaintext := []byte("helloworld")
|
|
ciphertext, err := respConn.encrypt(nil, plaintext)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
result, err := initConn.decrypt(nil, ciphertext)
|
|
if !bytes.Equal(plaintext, result) {
|
|
t.Fatalf("got %x expected %x", result, plaintext)
|
|
} else if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestCryptoFailsIfCiphertextIsAltered(t *testing.T) {
|
|
initTransport := newTestTransport(t, crypto.Ed25519, 2048)
|
|
respTransport := newTestTransport(t, crypto.Ed25519, 2048)
|
|
|
|
initConn, respConn := connect(t, initTransport, respTransport)
|
|
defer initConn.Close()
|
|
defer respConn.Close()
|
|
|
|
plaintext := []byte("helloworld")
|
|
ciphertext, err := respConn.encrypt(nil, plaintext)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
ciphertext[0] = ^ciphertext[0]
|
|
|
|
_, err = initConn.decrypt(nil, ciphertext)
|
|
if err == nil {
|
|
t.Fatal("expected decryption to fail when ciphertext altered")
|
|
}
|
|
}
|
|
|
|
func TestCryptoFailsIfHandshakeIncomplete(t *testing.T) {
|
|
initTransport := newTestTransport(t, crypto.Ed25519, 2048)
|
|
init, resp := net.Pipe()
|
|
_ = resp.Close()
|
|
|
|
session, _ := newSecureSession(initTransport, context.TODO(), init, "remote-peer", nil, nil, nil, true, true)
|
|
_, err := session.encrypt(nil, []byte("hi"))
|
|
if err == nil {
|
|
t.Error("expected encryption error when handshake incomplete")
|
|
}
|
|
_, err = session.decrypt(nil, []byte("it's a secret"))
|
|
if err == nil {
|
|
t.Error("expected decryption error when handshake incomplete")
|
|
}
|
|
}
|