mirror of
https://github.com/fluencelabs/js-libp2p-crypto
synced 2025-03-15 13:21:06 +00:00
* feat: export/import password protected RSA key * docs: crypto.key.import * test: import with wrong password * fix: lint * test: importing openssl keys * just to trigger circle with new ubuntu * feat: get the RSA key id * feat: get the ED 25519 key id * feat: pbkdf2 * fix(pbkdf2): base64 has more chars to guess than hex * chore: update deps
151 lines
4.3 KiB
JavaScript
151 lines
4.3 KiB
JavaScript
/* eslint max-nested-callbacks: ["error", 8] */
|
|
/* eslint-env mocha */
|
|
'use strict'
|
|
|
|
const chai = require('chai')
|
|
const dirtyChai = require('dirty-chai')
|
|
const expect = chai.expect
|
|
chai.use(dirtyChai)
|
|
const crypto = require('../src')
|
|
const fixtures = require('./fixtures/go-key-rsa')
|
|
|
|
describe('libp2p-crypto', function () {
|
|
this.timeout(20 * 1000)
|
|
let key
|
|
before((done) => {
|
|
crypto.keys.generateKeyPair('RSA', 2048, (err, _key) => {
|
|
if (err) {
|
|
return done(err)
|
|
}
|
|
key = _key
|
|
done()
|
|
})
|
|
})
|
|
|
|
it('marshalPublicKey and unmarshalPublicKey', () => {
|
|
const key2 = crypto.keys.unmarshalPublicKey(
|
|
crypto.keys.marshalPublicKey(key.public))
|
|
|
|
expect(key2.equals(key.public)).to.be.eql(true)
|
|
|
|
expect(() => {
|
|
crypto.keys.marshalPublicKey(key.public, 'invalid-key-type')
|
|
}).to.throw()
|
|
})
|
|
|
|
it('marshalPrivateKey and unmarshalPrivateKey', (done) => {
|
|
expect(() => {
|
|
crypto.keys.marshalPrivateKey(key, 'invalid-key-type')
|
|
}).to.throw()
|
|
|
|
crypto.keys.unmarshalPrivateKey(crypto.keys.marshalPrivateKey(key), (err, key2) => {
|
|
if (err) {
|
|
return done(err)
|
|
}
|
|
|
|
expect(key2.equals(key)).to.be.eql(true)
|
|
expect(key2.public.equals(key.public)).to.be.eql(true)
|
|
done()
|
|
})
|
|
})
|
|
|
|
// marshalled keys seem to be slightly different
|
|
// unsure as to if this is just a difference in encoding
|
|
// or a bug
|
|
describe('go interop', () => {
|
|
it('unmarshals private key', (done) => {
|
|
crypto.keys.unmarshalPrivateKey(fixtures.private.key, (err, key) => {
|
|
if (err) {
|
|
return done(err)
|
|
}
|
|
const hash = fixtures.private.hash
|
|
expect(fixtures.private.key).to.eql(key.bytes)
|
|
|
|
key.hash((err, digest) => {
|
|
if (err) {
|
|
return done(err)
|
|
}
|
|
|
|
expect(digest).to.eql(hash)
|
|
done()
|
|
})
|
|
})
|
|
})
|
|
|
|
it('unmarshals public key', (done) => {
|
|
const key = crypto.keys.unmarshalPublicKey(fixtures.public.key)
|
|
const hash = fixtures.public.hash
|
|
|
|
expect(crypto.keys.marshalPublicKey(key)).to.eql(fixtures.public.key)
|
|
|
|
key.hash((err, digest) => {
|
|
if (err) {
|
|
return done(err)
|
|
}
|
|
|
|
expect(digest).to.eql(hash)
|
|
done()
|
|
})
|
|
})
|
|
|
|
it('unmarshal -> marshal, private key', (done) => {
|
|
crypto.keys.unmarshalPrivateKey(fixtures.private.key, (err, key) => {
|
|
if (err) {
|
|
return done(err)
|
|
}
|
|
|
|
const marshalled = crypto.keys.marshalPrivateKey(key)
|
|
expect(marshalled).to.eql(fixtures.private.key)
|
|
done()
|
|
})
|
|
})
|
|
|
|
it('unmarshal -> marshal, public key', () => {
|
|
const key = crypto.keys.unmarshalPublicKey(fixtures.public.key)
|
|
const marshalled = crypto.keys.marshalPublicKey(key)
|
|
expect(fixtures.public.key.equals(marshalled)).to.eql(true)
|
|
})
|
|
})
|
|
|
|
describe('pbkdf2', () => {
|
|
it('generates a derived password using sha1', () => {
|
|
const p1 = crypto.pbkdf2('password', 'at least 16 character salt', 500, 512 / 8, 'sha1')
|
|
expect(p1).to.exist()
|
|
expect(p1).to.be.a('string')
|
|
})
|
|
|
|
it('generates a derived password using sha2-512', () => {
|
|
const p1 = crypto.pbkdf2('password', 'at least 16 character salt', 500, 512 / 8, 'sha2-512')
|
|
expect(p1).to.exist()
|
|
expect(p1).to.be.a('string')
|
|
})
|
|
|
|
it('generates the same derived password with the same options', () => {
|
|
const p1 = crypto.pbkdf2('password', 'at least 16 character salt', 10, 512 / 8, 'sha1')
|
|
const p2 = crypto.pbkdf2('password', 'at least 16 character salt', 10, 512 / 8, 'sha1')
|
|
const p3 = crypto.pbkdf2('password', 'at least 16 character salt', 11, 512 / 8, 'sha1')
|
|
expect(p2).to.equal(p1)
|
|
expect(p3).to.not.equal(p2)
|
|
})
|
|
|
|
it('throws on invalid hash name', () => {
|
|
expect(() => crypto.pbkdf2('password', 'at least 16 character salt', 500, 512 / 8, 'shaX-xxx')).to.throw()
|
|
})
|
|
})
|
|
|
|
describe('randomBytes', () => {
|
|
it('throws with no number passed', () => {
|
|
expect(() => {
|
|
crypto.randomBytes()
|
|
}).to.throw()
|
|
})
|
|
|
|
it('generates different random things', () => {
|
|
const buf1 = crypto.randomBytes(10)
|
|
expect(buf1.length).to.equal(10)
|
|
const buf2 = crypto.randomBytes(10)
|
|
expect(buf1).to.not.eql(buf2)
|
|
})
|
|
})
|
|
})
|