2021-12-04 16:42:11 +00:00
|
|
|
// Copyright 2017-2021 DERO Project. All rights reserved.
|
|
|
|
// Use of this source code in any form is governed by RESEARCH license.
|
|
|
|
// license can be found in the LICENSE file.
|
|
|
|
// GPG: 0F39 E425 8C65 3947 702A 8234 08B2 0360 A03A 9DE8
|
|
|
|
//
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
|
|
|
package walletapi
|
|
|
|
|
|
|
|
import "testing"
|
|
|
|
import "crypto/sha256"
|
|
|
|
|
|
|
|
// functional test whether the wrappers are okay
|
|
|
|
func Test_AEAD_Cipher(t *testing.T) {
|
|
|
|
|
|
|
|
var key = sha256.Sum256([]byte("test"))
|
|
|
|
var data = []byte("data")
|
|
|
|
|
|
|
|
encrypted, err := EncryptWithKey(key[:], data)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("AEAD cipher failed err %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
//t.Logf("Encrypted data %x %s", encrypted, string(encrypted))
|
|
|
|
|
|
|
|
decrypted, err := DecryptWithKey(key[:], encrypted)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("AEAD cipher decryption failed, err %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if string(decrypted) != "data" {
|
|
|
|
t.Fatalf("AEAD cipher encryption/decryption failed")
|
|
|
|
}
|
|
|
|
}
|
2022-02-06 07:06:32 +00:00
|
|
|
|
|
|
|
// functional test whether the wrappers are okay
|
|
|
|
func Test_Signed_Message_Cipher(t *testing.T) {
|
|
|
|
|
|
|
|
wsrc, err := Create_Encrypted_Wallet_From_Recovery_Words_Memory("", "sequence atlas unveil summon pebbles tuesday beer rudely snake rockets different fuselage woven tagged bested dented vegan hover rapid fawns obvious muppet randomly seasons randomly")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Cannot create encrypted wallet, err %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
result := wsrc.SignData([]byte("HELLO"))
|
|
|
|
|
|
|
|
signer, message, err := wsrc.CheckSignature(result)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Cannot check signature, err %s", err)
|
|
|
|
}
|
|
|
|
if string(message) != "HELLO" {
|
|
|
|
t.Fatalf("Message corruption")
|
|
|
|
}
|
|
|
|
if signer.String() != wsrc.GetAddress().String() {
|
|
|
|
t.Fatalf("Address corruption")
|
|
|
|
}
|
|
|
|
|
|
|
|
// make sure other wallets can also verify the signatures
|
|
|
|
|
|
|
|
w2, err := Create_Encrypted_Wallet_From_Recovery_Words_Memory("", "perfil lujo faja puma favor pedir detalle doble carbón neón paella cuarto ánimo cuento conga correr dental moneda león donar entero logro realidad acceso doble")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Cannot create encrypted wallet, err %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
signer, message, err = w2.CheckSignature(result)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Cannot check signature, err %s", err)
|
|
|
|
}
|
|
|
|
if string(message) != "HELLO" {
|
|
|
|
t.Fatalf("Message corruption")
|
|
|
|
}
|
|
|
|
if signer.String() != wsrc.GetAddress().String() {
|
|
|
|
t.Fatalf("Address corruption")
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|