mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-09 11:11:20 +00:00
211d9bc0b9
* fix build from source * clean up * update again * change everything * workaround for now * fix versioning * all passing now * fix build issues * clean up * revert use of MulVerify * gaz * stub * Apply suggestions from code review Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> * fix all * fix test * todo * fix stub * revert back * make deep source happy * Update shared/bls/herumi/public_key.go * Update shared/bls/blst/signature.go * Update shared/bls/blst/signature_test.go * imports * move iface to common, export errors * rm iface build Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> Co-authored-by: terence tsao <terence@prysmaticlabs.com>
75 lines
1.7 KiB
Go
75 lines
1.7 KiB
Go
package keystore
|
|
|
|
import (
|
|
"bytes"
|
|
"io/ioutil"
|
|
"testing"
|
|
|
|
"github.com/pborman/uuid"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
)
|
|
|
|
func TestMarshalAndUnmarshal(t *testing.T) {
|
|
testID := uuid.NewRandom()
|
|
blsKey, err := bls.RandKey()
|
|
require.NoError(t, err)
|
|
|
|
key := &Key{
|
|
ID: testID,
|
|
SecretKey: blsKey,
|
|
PublicKey: blsKey.PublicKey(),
|
|
}
|
|
marshalledObject, err := key.MarshalJSON()
|
|
require.NoError(t, err)
|
|
newKey := &Key{
|
|
ID: []byte{},
|
|
SecretKey: blsKey,
|
|
PublicKey: blsKey.PublicKey(),
|
|
}
|
|
|
|
err = newKey.UnmarshalJSON(marshalledObject)
|
|
require.NoError(t, err)
|
|
require.Equal(t, true, bytes.Equal(newKey.ID, testID))
|
|
}
|
|
|
|
func TestStoreRandomKey(t *testing.T) {
|
|
tempDir, teardown := setupTempKeystoreDir(t)
|
|
defer teardown()
|
|
ks := &Keystore{
|
|
keysDirPath: tempDir,
|
|
scryptN: LightScryptN,
|
|
scryptP: LightScryptP,
|
|
}
|
|
require.NoError(t, storeNewRandomKey(ks, "password"))
|
|
}
|
|
|
|
func TestNewKeyFromBLS(t *testing.T) {
|
|
b := []byte("hi")
|
|
b32 := bytesutil.ToBytes32(b)
|
|
blskey, err := bls.SecretKeyFromBytes(b32[:])
|
|
require.NoError(t, err)
|
|
key, err := NewKeyFromBLS(blskey)
|
|
require.NoError(t, err)
|
|
|
|
expected := blskey.Marshal()
|
|
require.Equal(t, true, bytes.Equal(expected, key.SecretKey.Marshal()))
|
|
_, err = NewKey()
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func TestWriteFile(t *testing.T) {
|
|
tempDir, teardown := setupTempKeystoreDir(t)
|
|
defer teardown()
|
|
|
|
testKeystore := []byte{'t', 'e', 's', 't'}
|
|
|
|
err := writeKeyFile(tempDir, testKeystore)
|
|
require.NoError(t, err)
|
|
|
|
keystore, err := ioutil.ReadFile(tempDir)
|
|
require.NoError(t, err)
|
|
require.Equal(t, true, bytes.Equal(keystore, testKeystore))
|
|
}
|