lbcwallet/snacl/snacl_test.go
Dave Collins d0938d817f Provide new wallet address manager package.
This commit implements a new secure, scalable, hierarchical deterministic
wallet address manager package.

The following is an overview of features:

- BIP0032 hierarchical deterministic keys
- BIP0043/BIP0044 multi-account hierarchy
- Strong focus on security:
  - Fully encrypted database including public information such as
    addresses as well as private information such as private keys and
    scripts needed to redeem pay-to-script-hash transactions
  - Hardened against memory scraping through the use of actively clearing
    private material from memory when locked
  - Different crypto keys used for public, private, and script data
  - Ability for different passphrases for public and private data
  - Scrypt-based key derivation
  - NaCl-based secretbox cryptography (XSalsa20 and Poly1305)
  - Multi-tier scalable key design to allow instant password changes
    regardless of the number of addresses stored
- Import WIF keys
- Import pay-to-script-hash scripts for things such as multi-signature
  transactions
- Ability to export a watching-only version which does not contain any
  private key material
- Programmatically detectable errors, including encapsulation of errors
  from packages it relies on
- Address synchronization capabilities

This commit only provides the implementation package.  It does not
include integration into to the existing wallet code base or conversion of
existing addresses.  That functionality will be provided by future
commits.
2014-10-13 16:19:09 -05:00

112 lines
2.1 KiB
Go

package snacl
import (
"bytes"
"testing"
)
var (
password = []byte("sikrit")
message = []byte("this is a secret message of sorts")
key *SecretKey
params []byte
blob []byte
)
func TestNewSecretKey(t *testing.T) {
var err error
key, err = NewSecretKey(&password, DefaultN, DefaultR, DefaultP)
if err != nil {
t.Error(err)
return
}
}
func TestMarshalSecretKey(t *testing.T) {
params = key.Marshal()
}
func TestUnmarshalSecretKey(t *testing.T) {
var sk SecretKey
if err := sk.Unmarshal(params); err != nil {
t.Errorf("unexpected unmarshal error: %v", err)
return
}
if err := sk.DeriveKey(&password); err != nil {
t.Errorf("unexpected DeriveKey error: %v", err)
return
}
if !bytes.Equal(sk.Key[:], key.Key[:]) {
t.Errorf("keys not equal")
}
}
func TestUnmarshalSecretKeyInvalid(t *testing.T) {
var sk SecretKey
if err := sk.Unmarshal(params); err != nil {
t.Errorf("unexpected unmarshal error: %v", err)
return
}
p := []byte("wrong password")
if err := sk.DeriveKey(&p); err != ErrInvalidPassword {
t.Errorf("wrong password didn't fail")
return
}
}
func TestEncrypt(t *testing.T) {
var err error
blob, err = key.Encrypt(message)
if err != nil {
t.Error(err)
return
}
}
func TestDecrypt(t *testing.T) {
decryptedMessage, err := key.Decrypt(blob)
if err != nil {
t.Error(err)
return
}
if !bytes.Equal(decryptedMessage, message) {
t.Errorf("decryption failed")
return
}
}
func TestDecryptCorrupt(t *testing.T) {
blob[len(blob)-15] = blob[len(blob)-15] + 1
_, err := key.Decrypt(blob)
if err == nil {
t.Errorf("corrupt message decrypted")
return
}
}
func TestZero(t *testing.T) {
var zeroKey [32]byte
key.Zero()
if !bytes.Equal(key.Key[:], zeroKey[:]) {
t.Errorf("zero key failed")
}
}
func TestDeriveKey(t *testing.T) {
if err := key.DeriveKey(&password); err != nil {
t.Errorf("unexpected DeriveKey key failure: %v", err)
}
}
func TestDeriveKeyInvalid(t *testing.T) {
bogusPass := []byte("bogus")
if err := key.DeriveKey(&bogusPass); err != ErrInvalidPassword {
t.Errorf("unexpected DeriveKey key failure: %v", err)
}
}