mirror of
https://github.com/fluencelabs/js-libp2p-noise
synced 2025-04-25 16:52:15 +00:00
121 lines
4.6 KiB
TypeScript
121 lines
4.6 KiB
TypeScript
import { assert, expect } from 'chai'
|
|
import Duplex from 'it-pair/duplex'
|
|
import { Buffer } from 'buffer'
|
|
import Wrap from 'it-pb-rpc'
|
|
import { XXHandshake } from '../src/handshake-xx'
|
|
import { generateKeypair, getPayload } from '../src/utils'
|
|
import { createPeerIdsFromFixtures } from './fixtures/peer'
|
|
|
|
describe('XX Handshake', () => {
|
|
let peerA, peerB, fakePeer
|
|
|
|
before(async () => {
|
|
[peerA, peerB, fakePeer] = await createPeerIdsFromFixtures(3)
|
|
})
|
|
|
|
it('should propose, exchange and finish handshake', async () => {
|
|
try {
|
|
const duplex = Duplex()
|
|
const connectionFrom = Wrap(duplex[0])
|
|
const connectionTo = Wrap(duplex[1])
|
|
|
|
const prologue = Buffer.alloc(0)
|
|
const staticKeysInitiator = generateKeypair()
|
|
const staticKeysResponder = generateKeypair()
|
|
|
|
const initPayload = await getPayload(peerA, staticKeysInitiator.publicKey)
|
|
const handshakeInitator = new XXHandshake(true, initPayload, prologue, staticKeysInitiator, connectionFrom, peerB)
|
|
|
|
const respPayload = await getPayload(peerB, staticKeysResponder.publicKey)
|
|
const handshakeResponder = new XXHandshake(false, respPayload, prologue, staticKeysResponder, connectionTo, peerA)
|
|
|
|
await handshakeInitator.propose()
|
|
await handshakeResponder.propose()
|
|
|
|
await handshakeResponder.exchange()
|
|
await handshakeInitator.exchange()
|
|
|
|
await handshakeInitator.finish()
|
|
await handshakeResponder.finish()
|
|
|
|
const sessionInitator = handshakeInitator.session
|
|
const sessionResponder = handshakeResponder.session
|
|
|
|
// Test shared key
|
|
if (sessionInitator.cs1 && sessionResponder.cs1 && sessionInitator.cs2 && sessionResponder.cs2) {
|
|
assert(sessionInitator.cs1.k.equals(sessionResponder.cs1.k))
|
|
assert(sessionInitator.cs2.k.equals(sessionResponder.cs2.k))
|
|
} else {
|
|
assert(false)
|
|
}
|
|
|
|
// Test encryption and decryption
|
|
const encrypted = handshakeInitator.encrypt(Buffer.from('encryptthis'), handshakeInitator.session)
|
|
const { plaintext: decrypted, valid } = handshakeResponder.decrypt(encrypted, handshakeResponder.session)
|
|
assert(decrypted.equals(Buffer.from('encryptthis')))
|
|
assert(valid)
|
|
} catch (e) {
|
|
assert(false, e.message)
|
|
}
|
|
})
|
|
|
|
it('Initiator should fail to exchange handshake if given wrong public key in payload', async () => {
|
|
try {
|
|
const duplex = Duplex()
|
|
const connectionFrom = Wrap(duplex[0])
|
|
const connectionTo = Wrap(duplex[1])
|
|
|
|
const prologue = Buffer.alloc(0)
|
|
const staticKeysInitiator = generateKeypair()
|
|
const staticKeysResponder = generateKeypair()
|
|
|
|
const initPayload = await getPayload(peerA, staticKeysInitiator.publicKey)
|
|
const handshakeInitator = new XXHandshake(true, initPayload, prologue, staticKeysInitiator, connectionFrom, fakePeer)
|
|
|
|
const respPayload = await getPayload(peerB, staticKeysResponder.publicKey)
|
|
const handshakeResponder = new XXHandshake(false, respPayload, prologue, staticKeysResponder, connectionTo, peerA)
|
|
|
|
await handshakeInitator.propose()
|
|
await handshakeResponder.propose()
|
|
|
|
await handshakeResponder.exchange()
|
|
await handshakeInitator.exchange()
|
|
|
|
assert(false, 'Should throw exception')
|
|
} catch (e) {
|
|
expect(e.message).equals("Error occurred while verifying signed payload: Peer ID doesn't match libp2p public key.")
|
|
}
|
|
})
|
|
|
|
it('Responder should fail to exchange handshake if given wrong public key in payload', async () => {
|
|
try {
|
|
const duplex = Duplex()
|
|
const connectionFrom = Wrap(duplex[0])
|
|
const connectionTo = Wrap(duplex[1])
|
|
|
|
const prologue = Buffer.alloc(0)
|
|
const staticKeysInitiator = generateKeypair()
|
|
const staticKeysResponder = generateKeypair()
|
|
|
|
const initPayload = await getPayload(peerA, staticKeysInitiator.publicKey)
|
|
const handshakeInitator = new XXHandshake(true, initPayload, prologue, staticKeysInitiator, connectionFrom, peerB)
|
|
|
|
const respPayload = await getPayload(peerB, staticKeysResponder.publicKey)
|
|
const handshakeResponder = new XXHandshake(false, respPayload, prologue, staticKeysResponder, connectionTo, fakePeer)
|
|
|
|
await handshakeInitator.propose()
|
|
await handshakeResponder.propose()
|
|
|
|
await handshakeResponder.exchange()
|
|
await handshakeInitator.exchange()
|
|
|
|
await handshakeInitator.finish()
|
|
await handshakeResponder.finish()
|
|
|
|
assert(false, 'Should throw exception')
|
|
} catch (e) {
|
|
expect(e.message).equals("Error occurred while verifying signed payload: Peer ID doesn't match libp2p public key.")
|
|
}
|
|
})
|
|
})
|