package nip49 import ( "errors" "slices" "strings" "testing" ) func TestDecryptKeyFromNIPText(t *testing.T) { ncrypt := "ncryptsec1qgg9947rlpvqu76pj5ecreduf9jxhselq2nae2kghhvd5g7dgjtcxfqtd67p9m0w57lspw8gsq6yphnm8623nsl8xn9j4jdzz84zm3frztj3z7s35vpzmqf6ksu8r89qk5z2zxfmu5gv8th8wclt0h4p" secretKey, err := Decrypt(ncrypt, "nostr") if err != nil { t.Fatalf("failed to decrypt: %s", err) } if secretKey != "3501454135014541350145413501453fefb02227e449e57cf4d3a3ce05378683" { t.Fatalf("decrypted wrongly: %s", secretKey) } } func TestEncryptAndDecrypt(t *testing.T) { for i, f := range []struct { password string secretkey string logn uint8 ksb KeySecurityByte }{ {".ksjabdk.aselqwe", "14c226dbdd865d5e1645e72c7470fd0a17feb42cc87b750bab6538171b3a3f8a", 1, 0x00}, {"skjdaklrnçurbç l", "f7f2f77f98890885462764afb15b68eb5f69979c8046ecb08cad7c4ae6b221ab", 2, 0x01}, {"777z7z7z7z7z7z7z", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 3, 0x02}, {".ksjabdk.aselqwe", "14c226dbdd865d5e1645e72c7470fd0a17feb42cc87b750bab6538171b3a3f8a", 7, 0x00}, {"skjdaklrnçurbç l", "f7f2f77f98890885462764afb15b68eb5f69979c8046ecb08cad7c4ae6b221ab", 8, 0x01}, {"777z7z7z7z7z7z7z", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 9, 0x02}, {"", "f7f2f77f98890885462764afb15b68eb5f69979c8046ecb08cad7c4ae6b221ab", 4, 0x00}, {"", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 5, 0x01}, {"", "f7f2f77f98890885462764afb15b68eb5f69979c8046ecb08cad7c4ae6b221ab", 1, 0x00}, {"ÅΩẛ̣", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 9, 0x01}, {"ÅΩṩ", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 9, 0x01}, } { bech32code, err := Encrypt(f.secretkey, f.password, f.logn, f.ksb) if err != nil { t.Fatalf("failed to encrypt %d: %s", i, err) } if !strings.HasPrefix(bech32code, "ncryptsec1") || len(bech32code) != 162 { t.Fatalf("bech32 code is wrong %d: %s", i, bech32code) } secretKey, err := Decrypt(bech32code, f.password) if err != nil { t.Fatalf("failed to decrypt %d: %s", i, err) } if secretKey != f.secretkey { t.Fatalf("decrypted to the wrong value %d: %s", i, secretKey) } } } func TestNormalization(t *testing.T) { nonce := []byte{1, 2, 3, 4} n := 8 key1, err1 := getKey(string([]byte{0xE2, 0x84, 0xAB, 0xE2, 0x84, 0xA6, 0xE1, 0xBA, 0x9B, 0xCC, 0xA3}), nonce, n) key2, err2 := getKey(string([]byte{0xC3, 0x85, 0xCE, 0xA9, 0xE1, 0xB9, 0xA9}), nonce, n) key3, err3 := getKey("ÅΩẛ̣", nonce, n) key4, err4 := getKey("ÅΩẛ̣", nonce, n) if merr := errors.Join(err1, err2, err3, err4); merr != nil { t.Fatalf("getKey errored: %s", merr) return } if !slices.Equal(key1, key2) || !slices.Equal(key2, key3) || !slices.Equal(key3, key4) { t.Fatalf("normalization failed") return } }