js-libp2p-noise/test/xx-handshake.spec.ts

121 lines
4.6 KiB
TypeScript
Raw Normal View History

2020-06-19 12:49:40 +02:00
import { assert, expect } from 'chai'
import Duplex from 'it-pair/duplex'
import { Buffer } from 'buffer'
import Wrap from 'it-pb-rpc'
import { XXHandshake } from '../src/handshake-xx'
import { generateKeypair, getPayload } from '../src/utils'
import { createPeerIdsFromFixtures } from './fixtures/peer'
2019-11-28 17:32:46 +01:00
2020-06-19 12:49:40 +02:00
describe('XX Handshake', () => {
let peerA, peerB, fakePeer
2019-12-03 13:52:44 +01:00
before(async () => {
2020-06-19 12:49:40 +02:00
[peerA, peerB, fakePeer] = await createPeerIdsFromFixtures(3)
})
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
it('should propose, exchange and finish handshake', async () => {
try {
2020-06-19 12:49:40 +02:00
const duplex = Duplex()
const connectionFrom = Wrap(duplex[0])
const connectionTo = Wrap(duplex[1])
2020-06-19 12:49:40 +02:00
const prologue = Buffer.alloc(0)
const staticKeysInitiator = generateKeypair()
const staticKeysResponder = generateKeypair()
2020-06-19 12:49:40 +02:00
const initPayload = await getPayload(peerA, staticKeysInitiator.publicKey)
const handshakeInitator = new XXHandshake(true, initPayload, prologue, staticKeysInitiator, connectionFrom, peerB)
2020-06-19 12:49:40 +02:00
const respPayload = await getPayload(peerB, staticKeysResponder.publicKey)
const handshakeResponder = new XXHandshake(false, respPayload, prologue, staticKeysResponder, connectionTo, peerA)
2020-06-19 12:49:40 +02:00
await handshakeInitator.propose()
await handshakeResponder.propose()
2020-06-19 12:49:40 +02:00
await handshakeResponder.exchange()
await handshakeInitator.exchange()
2020-06-19 12:49:40 +02:00
await handshakeInitator.finish()
await handshakeResponder.finish()
2020-06-19 12:49:40 +02:00
const sessionInitator = handshakeInitator.session
const sessionResponder = handshakeResponder.session
// Test shared key
if (sessionInitator.cs1 && sessionResponder.cs1 && sessionInitator.cs2 && sessionResponder.cs2) {
2020-06-19 12:49:40 +02:00
assert(sessionInitator.cs1.k.equals(sessionResponder.cs1.k))
assert(sessionInitator.cs2.k.equals(sessionResponder.cs2.k))
} else {
2020-06-19 12:49:40 +02:00
assert(false)
}
// Test encryption and decryption
2020-06-19 12:49:40 +02:00
const encrypted = handshakeInitator.encrypt(Buffer.from('encryptthis'), handshakeInitator.session)
const { plaintext: decrypted, valid } = handshakeResponder.decrypt(encrypted, handshakeResponder.session)
assert(decrypted.equals(Buffer.from('encryptthis')))
assert(valid)
} catch (e) {
2020-06-19 12:49:40 +02:00
assert(false, e.message)
2019-11-22 13:06:51 +01:00
}
2020-06-19 12:49:40 +02:00
})
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
it('Initiator should fail to exchange handshake if given wrong public key in payload', async () => {
2019-12-03 13:52:44 +01:00
try {
2020-06-19 12:49:40 +02:00
const duplex = Duplex()
const connectionFrom = Wrap(duplex[0])
const connectionTo = Wrap(duplex[1])
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
const prologue = Buffer.alloc(0)
const staticKeysInitiator = generateKeypair()
const staticKeysResponder = generateKeypair()
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
const initPayload = await getPayload(peerA, staticKeysInitiator.publicKey)
const handshakeInitator = new XXHandshake(true, initPayload, prologue, staticKeysInitiator, connectionFrom, fakePeer)
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
const respPayload = await getPayload(peerB, staticKeysResponder.publicKey)
const handshakeResponder = new XXHandshake(false, respPayload, prologue, staticKeysResponder, connectionTo, peerA)
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
await handshakeInitator.propose()
await handshakeResponder.propose()
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
await handshakeResponder.exchange()
await handshakeInitator.exchange()
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
assert(false, 'Should throw exception')
2019-12-03 13:52:44 +01:00
} catch (e) {
expect(e.message).equals("Error occurred while verifying signed payload: Peer ID doesn't match libp2p public key.")
}
2020-06-19 12:49:40 +02:00
})
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
it('Responder should fail to exchange handshake if given wrong public key in payload', async () => {
2019-12-03 13:52:44 +01:00
try {
2020-06-19 12:49:40 +02:00
const duplex = Duplex()
const connectionFrom = Wrap(duplex[0])
const connectionTo = Wrap(duplex[1])
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
const prologue = Buffer.alloc(0)
const staticKeysInitiator = generateKeypair()
const staticKeysResponder = generateKeypair()
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
const initPayload = await getPayload(peerA, staticKeysInitiator.publicKey)
const handshakeInitator = new XXHandshake(true, initPayload, prologue, staticKeysInitiator, connectionFrom, peerB)
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
const respPayload = await getPayload(peerB, staticKeysResponder.publicKey)
const handshakeResponder = new XXHandshake(false, respPayload, prologue, staticKeysResponder, connectionTo, fakePeer)
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
await handshakeInitator.propose()
await handshakeResponder.propose()
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
await handshakeResponder.exchange()
await handshakeInitator.exchange()
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
await handshakeInitator.finish()
await handshakeResponder.finish()
2019-12-03 13:52:44 +01:00
2020-06-19 12:49:40 +02:00
assert(false, 'Should throw exception')
2019-12-03 13:52:44 +01:00
} catch (e) {
expect(e.message).equals("Error occurred while verifying signed payload: Peer ID doesn't match libp2p public key.")
}
2020-06-19 12:49:40 +02:00
})
})