2015-12-01 19:44:58 +01:00
|
|
|
// Copyright (c) 2015 The btcsuite developers
|
|
|
|
// Use of this source code is governed by an ISC
|
|
|
|
// license that can be found in the LICENSE file.
|
2014-11-04 18:22:13 +01:00
|
|
|
|
|
|
|
package votingpool
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
|
|
|
"testing"
|
|
|
|
|
2018-05-15 07:11:11 +02:00
|
|
|
"github.com/btcsuite/btcutil/hdkeychain"
|
|
|
|
"github.com/btcsuite/btcwallet/waddrmgr"
|
2014-11-04 18:22:13 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestPoolEnsureUsedAddr(t *testing.T) {
|
2017-01-19 21:24:57 +01:00
|
|
|
tearDown, db, pool := TstCreatePool(t)
|
2014-11-04 18:22:13 +01:00
|
|
|
defer tearDown()
|
|
|
|
|
2017-01-19 21:24:57 +01:00
|
|
|
dbtx, err := db.BeginReadWriteTx()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer dbtx.Commit()
|
|
|
|
ns, addrmgrNs := TstRWNamespaces(dbtx)
|
|
|
|
|
2014-11-04 18:22:13 +01:00
|
|
|
var script []byte
|
|
|
|
var addr waddrmgr.ManagedScriptAddress
|
2017-01-19 21:24:57 +01:00
|
|
|
TstCreateSeries(t, dbtx, pool, []TstSeriesDef{{ReqSigs: 2, PubKeys: TstPubKeys[0:3], SeriesID: 1}})
|
2014-11-04 18:22:13 +01:00
|
|
|
|
|
|
|
idx := Index(0)
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
|
|
|
err = pool.EnsureUsedAddr(ns, addrmgrNs, 1, 0, idx)
|
2014-11-04 18:22:13 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to ensure used addresses: %v", err)
|
|
|
|
}
|
2017-01-19 21:24:57 +01:00
|
|
|
addr, err = pool.getUsedAddr(ns, addrmgrNs, 1, 0, 0)
|
2014-11-04 18:22:13 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to get addr from used addresses set: %v", err)
|
|
|
|
}
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
2014-11-04 18:22:13 +01:00
|
|
|
script, err = addr.Script()
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to get script: %v", err)
|
|
|
|
}
|
|
|
|
wantScript, _ := pool.DepositScript(1, 0, 0)
|
|
|
|
if !bytes.Equal(script, wantScript) {
|
|
|
|
t.Fatalf("Script from looked up addr is not what we expect")
|
|
|
|
}
|
|
|
|
|
|
|
|
idx = Index(3)
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
|
|
|
err = pool.EnsureUsedAddr(ns, addrmgrNs, 1, 0, idx)
|
2014-11-04 18:22:13 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to ensure used addresses: %v", err)
|
|
|
|
}
|
|
|
|
for _, i := range []int{0, 1, 2, 3} {
|
2017-01-19 21:24:57 +01:00
|
|
|
addr, err = pool.getUsedAddr(ns, addrmgrNs, 1, 0, Index(i))
|
2014-11-04 18:22:13 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to get addr from used addresses set: %v", err)
|
|
|
|
}
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
2014-11-04 18:22:13 +01:00
|
|
|
script, err = addr.Script()
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to get script: %v", err)
|
|
|
|
}
|
|
|
|
wantScript, _ := pool.DepositScript(1, 0, Index(i))
|
|
|
|
if !bytes.Equal(script, wantScript) {
|
|
|
|
t.Fatalf("Script from looked up addr is not what we expect")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPoolGetUsedAddr(t *testing.T) {
|
2017-01-19 21:24:57 +01:00
|
|
|
tearDown, db, pool := TstCreatePool(t)
|
2014-11-04 18:22:13 +01:00
|
|
|
defer tearDown()
|
|
|
|
|
2017-01-19 21:24:57 +01:00
|
|
|
dbtx, err := db.BeginReadWriteTx()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer dbtx.Commit()
|
|
|
|
ns, addrmgrNs := TstRWNamespaces(dbtx)
|
|
|
|
|
|
|
|
TstCreateSeries(t, dbtx, pool, []TstSeriesDef{{ReqSigs: 2, PubKeys: TstPubKeys[0:3], SeriesID: 1}})
|
2014-11-04 18:22:13 +01:00
|
|
|
|
|
|
|
// Addr with series=1, branch=0, index=10 has never been used, so it should
|
|
|
|
// return nil.
|
2017-01-19 21:24:57 +01:00
|
|
|
addr, err := pool.getUsedAddr(ns, addrmgrNs, 1, 0, 10)
|
2014-11-04 18:22:13 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error when looking up used addr: %v", err)
|
|
|
|
}
|
|
|
|
if addr != nil {
|
|
|
|
t.Fatalf("Unused address found in used addresses DB: %v", addr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now we add that addr to the used addresses DB and check that the value
|
|
|
|
// returned by getUsedAddr() is what we expect.
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
|
|
|
err = pool.addUsedAddr(ns, addrmgrNs, 1, 0, 10)
|
2014-11-04 18:22:13 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error when storing addr in used addresses DB: %v", err)
|
|
|
|
}
|
|
|
|
var script []byte
|
2017-01-19 21:24:57 +01:00
|
|
|
addr, err = pool.getUsedAddr(ns, addrmgrNs, 1, 0, 10)
|
2014-11-04 18:22:13 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error when looking up used addr: %v", err)
|
|
|
|
}
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
2014-11-04 18:22:13 +01:00
|
|
|
script, err = addr.Script()
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to get script: %v", err)
|
|
|
|
}
|
|
|
|
wantScript, _ := pool.DepositScript(1, 0, 10)
|
|
|
|
if !bytes.Equal(script, wantScript) {
|
|
|
|
t.Fatalf("Script from looked up addr is not what we expect")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSerializationErrors(t *testing.T) {
|
2017-01-19 21:24:57 +01:00
|
|
|
tearDown, db, pool := TstCreatePool(t)
|
2014-11-04 18:22:13 +01:00
|
|
|
defer tearDown()
|
|
|
|
|
2017-01-19 21:24:57 +01:00
|
|
|
dbtx, err := db.BeginReadWriteTx()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer dbtx.Commit()
|
|
|
|
_, addrmgrNs := TstRWNamespaces(dbtx)
|
|
|
|
|
2014-11-04 18:22:13 +01:00
|
|
|
tests := []struct {
|
|
|
|
version uint32
|
|
|
|
pubKeys []string
|
|
|
|
privKeys []string
|
|
|
|
reqSigs uint32
|
|
|
|
err ErrorCode
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
version: 2,
|
|
|
|
pubKeys: TstPubKeys[0:3],
|
|
|
|
err: ErrSeriesVersion,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
pubKeys: []string{"NONSENSE"},
|
|
|
|
// Not a valid length public key.
|
|
|
|
err: ErrSeriesSerialization,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
pubKeys: TstPubKeys[0:3],
|
|
|
|
privKeys: TstPrivKeys[0:1],
|
|
|
|
// The number of public and private keys should be the same.
|
|
|
|
err: ErrSeriesSerialization,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
pubKeys: TstPubKeys[0:1],
|
|
|
|
privKeys: []string{"NONSENSE"},
|
|
|
|
// Not a valid length private key.
|
|
|
|
err: ErrSeriesSerialization,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
active := true
|
|
|
|
for testNum, test := range tests {
|
2017-01-19 21:24:57 +01:00
|
|
|
encryptedPubs, err := encryptKeys(test.pubKeys, pool.Manager(), waddrmgr.CKTPublic)
|
2014-11-04 18:22:13 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Test #%d - Error encrypting pubkeys: %v", testNum, err)
|
|
|
|
}
|
|
|
|
var encryptedPrivs [][]byte
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
|
|
|
encryptedPrivs, err = encryptKeys(test.privKeys, pool.Manager(), waddrmgr.CKTPrivate)
|
2014-11-04 18:22:13 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Test #%d - Error encrypting privkeys: %v", testNum, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
row := &dbSeriesRow{
|
|
|
|
version: test.version,
|
|
|
|
active: active,
|
|
|
|
reqSigs: test.reqSigs,
|
|
|
|
pubKeysEncrypted: encryptedPubs,
|
|
|
|
privKeysEncrypted: encryptedPrivs}
|
|
|
|
_, err = serializeSeriesRow(row)
|
|
|
|
|
|
|
|
TstCheckError(t, fmt.Sprintf("Test #%d", testNum), err, test.err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSerialization(t *testing.T) {
|
2017-01-19 21:24:57 +01:00
|
|
|
tearDown, db, pool := TstCreatePool(t)
|
2014-11-04 18:22:13 +01:00
|
|
|
defer tearDown()
|
|
|
|
|
2017-01-19 21:24:57 +01:00
|
|
|
dbtx, err := db.BeginReadWriteTx()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer dbtx.Commit()
|
|
|
|
_, addrmgrNs := TstRWNamespaces(dbtx)
|
|
|
|
|
2014-11-04 18:22:13 +01:00
|
|
|
tests := []struct {
|
|
|
|
version uint32
|
|
|
|
active bool
|
|
|
|
pubKeys []string
|
|
|
|
privKeys []string
|
|
|
|
reqSigs uint32
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
version: 1,
|
|
|
|
active: true,
|
|
|
|
pubKeys: TstPubKeys[0:1],
|
|
|
|
reqSigs: 1,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
version: 0,
|
|
|
|
active: false,
|
|
|
|
pubKeys: TstPubKeys[0:1],
|
|
|
|
privKeys: TstPrivKeys[0:1],
|
|
|
|
reqSigs: 1,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
pubKeys: TstPubKeys[0:3],
|
|
|
|
privKeys: []string{TstPrivKeys[0], "", ""},
|
|
|
|
reqSigs: 2,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
pubKeys: TstPubKeys[0:5],
|
|
|
|
reqSigs: 3,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
pubKeys: TstPubKeys[0:7],
|
|
|
|
privKeys: []string{"", TstPrivKeys[1], "", TstPrivKeys[3], "", "", ""},
|
|
|
|
reqSigs: 4,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var encryptedPrivs [][]byte
|
|
|
|
for testNum, test := range tests {
|
2017-01-19 21:24:57 +01:00
|
|
|
encryptedPubs, err := encryptKeys(test.pubKeys, pool.Manager(), waddrmgr.CKTPublic)
|
2014-11-04 18:22:13 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Test #%d - Error encrypting pubkeys: %v", testNum, err)
|
|
|
|
}
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
|
|
|
encryptedPrivs, err = encryptKeys(test.privKeys, pool.Manager(), waddrmgr.CKTPrivate)
|
2014-11-04 18:22:13 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Test #%d - Error encrypting privkeys: %v", testNum, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
row := &dbSeriesRow{
|
|
|
|
version: test.version,
|
|
|
|
active: test.active,
|
|
|
|
reqSigs: test.reqSigs,
|
|
|
|
pubKeysEncrypted: encryptedPubs,
|
|
|
|
privKeysEncrypted: encryptedPrivs,
|
|
|
|
}
|
|
|
|
serialized, err := serializeSeriesRow(row)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Test #%d - Error in serialization %v", testNum, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
row, err = deserializeSeriesRow(serialized)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Test #%d - Failed to deserialize %v %v", testNum, serialized, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if row.version != test.version {
|
|
|
|
t.Errorf("Serialization #%d - version mismatch: got %d want %d",
|
|
|
|
testNum, row.version, test.version)
|
|
|
|
}
|
|
|
|
|
|
|
|
if row.active != test.active {
|
|
|
|
t.Errorf("Serialization #%d - active mismatch: got %v want %v",
|
|
|
|
testNum, row.active, test.active)
|
|
|
|
}
|
|
|
|
|
|
|
|
if row.reqSigs != test.reqSigs {
|
|
|
|
t.Errorf("Serialization #%d - row reqSigs off. Got %d, want %d",
|
|
|
|
testNum, row.reqSigs, test.reqSigs)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(row.pubKeysEncrypted) != len(test.pubKeys) {
|
|
|
|
t.Errorf("Serialization #%d - Wrong no. of pubkeys. Got %d, want %d",
|
|
|
|
testNum, len(row.pubKeysEncrypted), len(test.pubKeys))
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, encryptedPub := range encryptedPubs {
|
|
|
|
got := string(row.pubKeysEncrypted[i])
|
|
|
|
|
|
|
|
if got != string(encryptedPub) {
|
|
|
|
t.Errorf("Serialization #%d - Pubkey deserialization. Got %v, want %v",
|
|
|
|
testNum, got, string(encryptedPub))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(row.privKeysEncrypted) != len(row.pubKeysEncrypted) {
|
|
|
|
t.Errorf("Serialization #%d - no. privkeys (%d) != no. pubkeys (%d)",
|
|
|
|
testNum, len(row.privKeysEncrypted), len(row.pubKeysEncrypted))
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, encryptedPriv := range encryptedPrivs {
|
|
|
|
got := string(row.privKeysEncrypted[i])
|
|
|
|
|
|
|
|
if got != string(encryptedPriv) {
|
|
|
|
t.Errorf("Serialization #%d - Privkey deserialization. Got %v, want %v",
|
|
|
|
testNum, got, string(encryptedPriv))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDeserializationErrors(t *testing.T) {
|
2017-01-19 21:24:57 +01:00
|
|
|
t.Parallel()
|
2014-11-04 18:22:13 +01:00
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
serialized []byte
|
|
|
|
err ErrorCode
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
serialized: make([]byte, seriesMaxSerial+1),
|
|
|
|
// Too many bytes (over seriesMaxSerial).
|
|
|
|
err: ErrSeriesSerialization,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
serialized: make([]byte, seriesMinSerial-1),
|
|
|
|
// Not enough bytes (under seriesMinSerial).
|
|
|
|
err: ErrSeriesSerialization,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
serialized: []byte{
|
|
|
|
1, 0, 0, 0, // 4 bytes (version)
|
|
|
|
0, // 1 byte (active)
|
|
|
|
2, 0, 0, 0, // 4 bytes (reqSigs)
|
|
|
|
3, 0, 0, 0, // 4 bytes (nKeys)
|
|
|
|
},
|
|
|
|
// Here we have the constant data but are missing any public/private keys.
|
|
|
|
err: ErrSeriesSerialization,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
serialized: []byte{2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
|
|
|
|
// Unsupported version.
|
|
|
|
err: ErrSeriesVersion,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for testNum, test := range tests {
|
|
|
|
_, err := deserializeSeriesRow(test.serialized)
|
|
|
|
|
|
|
|
TstCheckError(t, fmt.Sprintf("Test #%d", testNum), err, test.err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateAndDecryptKeys(t *testing.T) {
|
2017-01-19 21:24:57 +01:00
|
|
|
tearDown, db, pool := TstCreatePool(t)
|
2014-11-04 18:22:13 +01:00
|
|
|
defer tearDown()
|
|
|
|
|
2017-01-19 21:24:57 +01:00
|
|
|
dbtx, err := db.BeginReadWriteTx()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer dbtx.Commit()
|
|
|
|
_, addrmgrNs := TstRWNamespaces(dbtx)
|
|
|
|
|
|
|
|
rawPubKeys, err := encryptKeys(TstPubKeys[0:2], pool.Manager(), waddrmgr.CKTPublic)
|
2014-11-04 18:22:13 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to encrypt public keys: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var rawPrivKeys [][]byte
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
|
|
|
rawPrivKeys, err = encryptKeys([]string{TstPrivKeys[0], ""}, pool.Manager(), waddrmgr.CKTPrivate)
|
2014-11-04 18:22:13 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to encrypt private keys: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var pubKeys, privKeys []*hdkeychain.ExtendedKey
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
2014-11-04 18:22:13 +01:00
|
|
|
pubKeys, privKeys, err = validateAndDecryptKeys(rawPubKeys, rawPrivKeys, pool)
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error when validating/decrypting keys: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(pubKeys) != 2 {
|
|
|
|
t.Fatalf("Unexpected number of decrypted public keys: got %d, want 2", len(pubKeys))
|
|
|
|
}
|
|
|
|
if len(privKeys) != 2 {
|
|
|
|
t.Fatalf("Unexpected number of decrypted private keys: got %d, want 2", len(privKeys))
|
|
|
|
}
|
|
|
|
|
|
|
|
if pubKeys[0].String() != TstPubKeys[0] || pubKeys[1].String() != TstPubKeys[1] {
|
|
|
|
t.Fatalf("Public keys don't match: %v!=%v ", TstPubKeys[0:2], pubKeys)
|
|
|
|
}
|
|
|
|
|
|
|
|
if privKeys[0].String() != TstPrivKeys[0] || privKeys[1] != nil {
|
|
|
|
t.Fatalf("Private keys don't match: %v, %v", []string{TstPrivKeys[0], ""}, privKeys)
|
|
|
|
}
|
|
|
|
|
|
|
|
neuteredKey, err := privKeys[0].Neuter()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to neuter private key: %v", err)
|
|
|
|
}
|
|
|
|
if pubKeys[0].String() != neuteredKey.String() {
|
|
|
|
t.Errorf("Public key (%v) does not match neutered private key (%v)",
|
|
|
|
pubKeys[0].String(), neuteredKey.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateAndDecryptKeysErrors(t *testing.T) {
|
2017-01-19 21:24:57 +01:00
|
|
|
tearDown, db, pool := TstCreatePool(t)
|
2014-11-04 18:22:13 +01:00
|
|
|
defer tearDown()
|
|
|
|
|
2017-01-19 21:24:57 +01:00
|
|
|
dbtx, err := db.BeginReadWriteTx()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer dbtx.Commit()
|
|
|
|
_, addrmgrNs := TstRWNamespaces(dbtx)
|
|
|
|
|
|
|
|
encryptedPubKeys, err := encryptKeys(TstPubKeys[0:1], pool.Manager(), waddrmgr.CKTPublic)
|
2014-11-04 18:22:13 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to encrypt public key: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var encryptedPrivKeys [][]byte
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
|
|
|
encryptedPrivKeys, err = encryptKeys(TstPrivKeys[1:2], pool.Manager(), waddrmgr.CKTPrivate)
|
2014-11-04 18:22:13 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to encrypt private key: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
rawPubKeys [][]byte
|
|
|
|
rawPrivKeys [][]byte
|
|
|
|
err ErrorCode
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
// Number of public keys does not match number of private keys.
|
|
|
|
rawPubKeys: [][]byte{[]byte(TstPubKeys[0])},
|
|
|
|
rawPrivKeys: [][]byte{},
|
|
|
|
err: ErrKeysPrivatePublicMismatch,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// Failure to decrypt public key.
|
|
|
|
rawPubKeys: [][]byte{[]byte(TstPubKeys[0])},
|
|
|
|
rawPrivKeys: [][]byte{[]byte(TstPrivKeys[0])},
|
|
|
|
err: ErrCrypto,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// Failure to decrypt private key.
|
|
|
|
rawPubKeys: encryptedPubKeys,
|
|
|
|
rawPrivKeys: [][]byte{[]byte(TstPrivKeys[0])},
|
|
|
|
err: ErrCrypto,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// One public and one private key, but they don't match.
|
|
|
|
rawPubKeys: encryptedPubKeys,
|
|
|
|
rawPrivKeys: encryptedPrivKeys,
|
|
|
|
err: ErrKeyMismatch,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, test := range tests {
|
2017-01-19 21:24:57 +01:00
|
|
|
TstRunWithManagerUnlocked(t, pool.Manager(), addrmgrNs, func() {
|
2014-11-04 18:22:13 +01:00
|
|
|
_, _, err = validateAndDecryptKeys(test.rawPubKeys, test.rawPrivKeys, pool)
|
|
|
|
})
|
|
|
|
TstCheckError(t, fmt.Sprintf("Test #%d", i), err, test.err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func encryptKeys(keys []string, mgr *waddrmgr.Manager, keyType waddrmgr.CryptoKeyType) ([][]byte, error) {
|
|
|
|
encryptedKeys := make([][]byte, len(keys))
|
|
|
|
var err error
|
|
|
|
for i, key := range keys {
|
|
|
|
if key == "" {
|
|
|
|
encryptedKeys[i] = nil
|
|
|
|
} else {
|
|
|
|
encryptedKeys[i], err = mgr.Encrypt(keyType, []byte(key))
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return encryptedKeys, nil
|
|
|
|
}
|