mirror of
https://github.com/nbd-wtf/go-nostr.git
synced 2025-03-19 06:12:44 +01:00
75 lines
2.8 KiB
Go
75 lines
2.8 KiB
Go
package nip49
|
|
|
|
import (
|
|
"errors"
|
|
"slices"
|
|
"strings"
|
|
"testing"
|
|
)
|
|
|
|
func TestDecryptKeyFromNIPText(t *testing.T) {
|
|
ncrypt := "ncryptsec1qgg9947rlpvqu76pj5ecreduf9jxhselq2nae2kghhvd5g7dgjtcxfqtd67p9m0w57lspw8gsq6yphnm8623nsl8xn9j4jdzz84zm3frztj3z7s35vpzmqf6ksu8r89qk5z2zxfmu5gv8th8wclt0h4p"
|
|
secretKey, err := Decrypt(ncrypt, "nostr")
|
|
if err != nil {
|
|
t.Fatalf("failed to decrypt: %s", err)
|
|
}
|
|
if secretKey != "3501454135014541350145413501453fefb02227e449e57cf4d3a3ce05378683" {
|
|
t.Fatalf("decrypted wrongly: %s", secretKey)
|
|
}
|
|
}
|
|
|
|
func TestEncryptAndDecrypt(t *testing.T) {
|
|
for i, f := range []struct {
|
|
password string
|
|
secretkey string
|
|
logn uint8
|
|
ksb KeySecurityByte
|
|
}{
|
|
{".ksjabdk.aselqwe", "14c226dbdd865d5e1645e72c7470fd0a17feb42cc87b750bab6538171b3a3f8a", 1, 0x00},
|
|
{"skjdaklrnçurbç l", "f7f2f77f98890885462764afb15b68eb5f69979c8046ecb08cad7c4ae6b221ab", 2, 0x01},
|
|
{"777z7z7z7z7z7z7z", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 3, 0x02},
|
|
{".ksjabdk.aselqwe", "14c226dbdd865d5e1645e72c7470fd0a17feb42cc87b750bab6538171b3a3f8a", 7, 0x00},
|
|
{"skjdaklrnçurbç l", "f7f2f77f98890885462764afb15b68eb5f69979c8046ecb08cad7c4ae6b221ab", 8, 0x01},
|
|
{"777z7z7z7z7z7z7z", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 9, 0x02},
|
|
{"", "f7f2f77f98890885462764afb15b68eb5f69979c8046ecb08cad7c4ae6b221ab", 4, 0x00},
|
|
{"", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 5, 0x01},
|
|
{"", "f7f2f77f98890885462764afb15b68eb5f69979c8046ecb08cad7c4ae6b221ab", 1, 0x00},
|
|
{"ÅΩẛ̣", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 9, 0x01},
|
|
{"ÅΩṩ", "11b25a101667dd9208db93c0827c6bdad66729a5b521156a7e9d3b22b3ae8944", 9, 0x01},
|
|
} {
|
|
bech32code, err := Encrypt(f.secretkey, f.password, f.logn, f.ksb)
|
|
if err != nil {
|
|
t.Fatalf("failed to encrypt %d: %s", i, err)
|
|
}
|
|
if !strings.HasPrefix(bech32code, "ncryptsec1") || len(bech32code) != 162 {
|
|
t.Fatalf("bech32 code is wrong %d: %s", i, bech32code)
|
|
}
|
|
|
|
secretKey, err := Decrypt(bech32code, f.password)
|
|
if err != nil {
|
|
t.Fatalf("failed to decrypt %d: %s", i, err)
|
|
}
|
|
if secretKey != f.secretkey {
|
|
t.Fatalf("decrypted to the wrong value %d: %s", i, secretKey)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestNormalization(t *testing.T) {
|
|
nonce := []byte{1, 2, 3, 4}
|
|
n := 8
|
|
key1, err1 := getKey(string([]byte{0xE2, 0x84, 0xAB, 0xE2, 0x84, 0xA6, 0xE1, 0xBA, 0x9B, 0xCC, 0xA3}), nonce, n)
|
|
key2, err2 := getKey(string([]byte{0xC3, 0x85, 0xCE, 0xA9, 0xE1, 0xB9, 0xA9}), nonce, n)
|
|
key3, err3 := getKey("ÅΩẛ̣", nonce, n)
|
|
key4, err4 := getKey("ÅΩẛ̣", nonce, n)
|
|
if merr := errors.Join(err1, err2, err3, err4); merr != nil {
|
|
t.Fatalf("getKey errored: %s", merr)
|
|
return
|
|
}
|
|
|
|
if !slices.Equal(key1, key2) || !slices.Equal(key2, key3) || !slices.Equal(key3, key4) {
|
|
t.Fatalf("normalization failed")
|
|
return
|
|
}
|
|
}
|