mirror of
https://github.com/libp2p/go-libp2p-core.git
synced 2024-12-28 23:50:07 +08:00
243 lines
5.0 KiB
Go
243 lines
5.0 KiB
Go
package peer_test
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"encoding/base64"
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
|
|
ic "github.com/libp2p/go-libp2p-core/crypto"
|
|
. "github.com/libp2p/go-libp2p-core/peer"
|
|
"github.com/libp2p/go-libp2p-core/test"
|
|
|
|
b58 "github.com/mr-tron/base58/base58"
|
|
mh "github.com/multiformats/go-multihash"
|
|
)
|
|
|
|
var gen1 keyset // generated
|
|
var gen2 keyset // generated
|
|
var man keyset // manual
|
|
|
|
func hash(b []byte) []byte {
|
|
h, _ := mh.Sum(b, mh.SHA2_256, -1)
|
|
return []byte(h)
|
|
}
|
|
|
|
func init() {
|
|
if err := gen1.generate(); err != nil {
|
|
panic(err)
|
|
}
|
|
if err := gen2.generate(); err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
skManBytes = strings.Replace(skManBytes, "\n", "", -1)
|
|
if err := man.load(hpkpMan, skManBytes); err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
type keyset struct {
|
|
sk ic.PrivKey
|
|
pk ic.PubKey
|
|
hpk string
|
|
hpkp string
|
|
}
|
|
|
|
func (ks *keyset) generate() error {
|
|
var err error
|
|
ks.sk, ks.pk, err = test.RandTestKeyPair(ic.RSA, 512)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
bpk, err := ks.pk.Bytes()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ks.hpk = string(hash(bpk))
|
|
ks.hpkp = b58.Encode([]byte(ks.hpk))
|
|
return nil
|
|
}
|
|
|
|
func (ks *keyset) load(hpkp, skBytesStr string) error {
|
|
skBytes, err := base64.StdEncoding.DecodeString(skBytesStr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ks.sk, err = ic.UnmarshalPrivateKey(skBytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ks.pk = ks.sk.GetPublic()
|
|
bpk, err := ks.pk.Bytes()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ks.hpk = string(hash(bpk))
|
|
ks.hpkp = b58.Encode([]byte(ks.hpk))
|
|
if ks.hpkp != hpkp {
|
|
return fmt.Errorf("hpkp doesn't match key. %s", hpkp)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func TestIDMatchesPublicKey(t *testing.T) {
|
|
|
|
test := func(ks keyset) {
|
|
p1, err := IDB58Decode(ks.hpkp)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if ks.hpk != string(p1) {
|
|
t.Error("p1 and hpk differ")
|
|
}
|
|
|
|
if !p1.MatchesPublicKey(ks.pk) {
|
|
t.Fatal("p1 does not match pk")
|
|
}
|
|
|
|
p2, err := IDFromPublicKey(ks.pk)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if p1 != p2 {
|
|
t.Error("p1 and p2 differ", p1.Pretty(), p2.Pretty())
|
|
}
|
|
|
|
if p2.Pretty() != ks.hpkp {
|
|
t.Error("hpkp and p2.Pretty differ", ks.hpkp, p2.Pretty())
|
|
}
|
|
}
|
|
|
|
test(gen1)
|
|
test(gen2)
|
|
test(man)
|
|
}
|
|
|
|
func TestIDMatchesPrivateKey(t *testing.T) {
|
|
|
|
test := func(ks keyset) {
|
|
p1, err := IDB58Decode(ks.hpkp)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if ks.hpk != string(p1) {
|
|
t.Error("p1 and hpk differ")
|
|
}
|
|
|
|
if !p1.MatchesPrivateKey(ks.sk) {
|
|
t.Fatal("p1 does not match sk")
|
|
}
|
|
|
|
p2, err := IDFromPrivateKey(ks.sk)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if p1 != p2 {
|
|
t.Error("p1 and p2 differ", p1.Pretty(), p2.Pretty())
|
|
}
|
|
}
|
|
|
|
test(gen1)
|
|
test(gen2)
|
|
test(man)
|
|
}
|
|
|
|
func TestPublicKeyExtraction(t *testing.T) {
|
|
t.Skip("disabled until libp2p/go-libp2p-crypto#51 is fixed")
|
|
// Happy path
|
|
_, originalPub, err := ic.GenerateEd25519Key(rand.Reader)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
id, err := IDFromPublicKey(originalPub)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
extractedPub, err := id.ExtractPublicKey()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if extractedPub == nil {
|
|
t.Fatal("failed to extract public key")
|
|
}
|
|
if !originalPub.Equals(extractedPub) {
|
|
t.Fatal("extracted public key doesn't match")
|
|
}
|
|
|
|
// Test invalid multihash (invariant of the type of public key)
|
|
pk, err := ID("").ExtractPublicKey()
|
|
if err == nil {
|
|
t.Fatal("expected an error")
|
|
}
|
|
if pk != nil {
|
|
t.Fatal("expected a nil public key")
|
|
}
|
|
|
|
// Shouldn't work for, e.g. RSA keys (too large)
|
|
|
|
_, rsaPub, err := ic.GenerateKeyPair(ic.RSA, 2048)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
rsaId, err := IDFromPublicKey(rsaPub)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
extractedRsaPub, err := rsaId.ExtractPublicKey()
|
|
if err != ErrNoPublicKey {
|
|
t.Fatal(err)
|
|
}
|
|
if extractedRsaPub != nil {
|
|
t.Fatal("expected to fail to extract public key from rsa ID")
|
|
}
|
|
}
|
|
|
|
func TestValidate(t *testing.T) {
|
|
// Empty peer ID invalidates
|
|
err := ID("").Validate()
|
|
if err == nil {
|
|
t.Error("expected error")
|
|
} else if err != ErrEmptyPeerID {
|
|
t.Error("expected error message: " + ErrEmptyPeerID.Error())
|
|
}
|
|
|
|
// Non-empty peer ID validates
|
|
p, err := test.RandPeerID()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
err = p.Validate()
|
|
if err != nil {
|
|
t.Error("expected nil, but found " + err.Error())
|
|
}
|
|
}
|
|
|
|
var hpkpMan = `QmRK3JgmVEGiewxWbhpXLJyjWuGuLeSTMTndA1coMHEy5o`
|
|
var skManBytes = `
|
|
CAAS4AQwggJcAgEAAoGBAL7w+Wc4VhZhCdM/+Hccg5Nrf4q9NXWwJylbSrXz/unFS24wyk6pEk0zi3W
|
|
7li+vSNVO+NtJQw9qGNAMtQKjVTP+3Vt/jfQRnQM3s6awojtjueEWuLYVt62z7mofOhCtj+VwIdZNBo
|
|
/EkLZ0ETfcvN5LVtLYa8JkXybnOPsLvK+PAgMBAAECgYBdk09HDM7zzL657uHfzfOVrdslrTCj6p5mo
|
|
DzvCxLkkjIzYGnlPuqfNyGjozkpSWgSUc+X+EGLLl3WqEOVdWJtbM61fewEHlRTM5JzScvwrJ39t7o6
|
|
CCAjKA0cBWBd6UWgbN/t53RoWvh9HrA2AW5YrT0ZiAgKe9y7EMUaENVJ8QJBAPhpdmb4ZL4Fkm4OKia
|
|
NEcjzn6mGTlZtef7K/0oRC9+2JkQnCuf6HBpaRhJoCJYg7DW8ZY+AV6xClKrgjBOfERMCQQDExhnzu2
|
|
dsQ9k8QChBlpHO0TRbZBiQfC70oU31kM1AeLseZRmrxv9Yxzdl8D693NNWS2JbKOXl0kMHHcuGQLMVA
|
|
kBZ7WvkmPV3aPL6jnwp2pXepntdVnaTiSxJ1dkXShZ/VSSDNZMYKY306EtHrIu3NZHtXhdyHKcggDXr
|
|
qkBrdgErAkAlpGPojUwemOggr4FD8sLX1ot2hDJyyV7OK2FXfajWEYJyMRL1Gm9Uk1+Un53RAkJneqp
|
|
JGAzKpyttXBTIDO51AkEA98KTiROMnnU8Y6Mgcvr68/SMIsvCYMt9/mtwSBGgl80VaTQ5Hpaktl6Xbh
|
|
VUt5Wv0tRxlXZiViCGCD1EtrrwTw==
|
|
`
|