package crypto
|
|
|
|
import (
|
|
"os"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestRealLedgerSecp256k1(t *testing.T) {
|
|
|
|
if os.Getenv("WITH_LEDGER") == "" {
|
|
t.Skip("Set WITH_LEDGER to run code on real ledger")
|
|
}
|
|
msg := []byte("kuhehfeohg")
|
|
|
|
path := DerivationPath{44, 60, 0, 0, 0}
|
|
|
|
priv, err := NewPrivKeyLedgerSecp256k1(path)
|
|
require.Nil(t, err, "%+v", err)
|
|
pub := priv.PubKey()
|
|
sig := priv.Sign(msg)
|
|
|
|
valid := pub.VerifyBytes(msg, sig)
|
|
assert.True(t, valid)
|
|
|
|
// now, let's serialize the key and make sure it still works
|
|
bs := priv.Bytes()
|
|
priv2, err := PrivKeyFromBytes(bs)
|
|
require.Nil(t, err, "%+v", err)
|
|
|
|
// make sure we get the same pubkey when we load from disk
|
|
pub2 := priv2.PubKey()
|
|
require.Equal(t, pub, pub2)
|
|
|
|
// signing with the loaded key should match the original pubkey
|
|
sig = priv2.Sign(msg)
|
|
valid = pub.VerifyBytes(msg, sig)
|
|
assert.True(t, valid)
|
|
|
|
// make sure pubkeys serialize properly as well
|
|
bs = pub.Bytes()
|
|
bpub, err := PubKeyFromBytes(bs)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, pub, bpub)
|
|
}
|
|
|
|
// TestRealLedgerErrorHandling calls. These tests assume
|
|
// the ledger is not plugged in....
|
|
func TestRealLedgerErrorHandling(t *testing.T) {
|
|
if os.Getenv("WITH_LEDGER") != "" {
|
|
t.Skip("Skipping on WITH_LEDGER as it tests unplugged cases")
|
|
}
|
|
|
|
// first, try to generate a key, must return an error
|
|
// (no panic)
|
|
path := DerivationPath{44, 60, 0, 0, 0}
|
|
_, err := NewPrivKeyLedgerSecp256k1(path)
|
|
require.Error(t, err)
|
|
}
|