Files
py-libp2p/tests/crypto/test_x25519.py
Paschal 4b1860766d Feat: Adding Yamux as default multiplexer, keeping Mplex as fallback (#538)
* feat: Replace mplex with yamux as default multiplexer in py-libp2p

* Retain Mplex alongside Yamux in new_swarm with messaging that Yamux is preferred

* moved !BBHII to a constant YAMUX_HEADER_FORMAT at the top of yamux.py with a comment explaining its structure

* renamed the news fragment to 534.feature.rst and updated the description

* renamed the news fragment to 534.feature.rst and updated the description

* added a docstring to clarify that Yamux does not support deadlines natively

* Remove the __main__ block entirely from test_yamux.py

* Replaced the print statements in test_yamux.py with logging.debug

* Added a comment linking to the spec for clarity

* Raise NotImplementedError in YamuxStream.set_deadline per review

* Add muxed_conn to YamuxStream and test deadline NotImplementedError

* Fix Yamux implementation to meet libp2p spec

* Fix None handling in YamuxStream.read and Yamux.read_stream

* Fix test_connected_peers.py to correctly handle peer connections

* fix: Ensure StreamReset is raised on read after local reset in yamux

* fix: Map MuxedStreamError to StreamClosed in NetStream.write for Yamux

* fix: Raise MuxedStreamReset in Yamux.read_stream for closed streams

* fix: Correct Yamux stream read behavior for NetStream tests

Fixed 	est_net_stream_read_after_remote_closed by updating NetStream.read to raise StreamEOF when the stream is remotely closed and no data is available, aligning with test expectations and Fixed 	est_net_stream_read_until_eof by modifying YamuxStream.read to block until the stream is closed (
ecv_closed=True) for
=-1 reads, ensuring data is only returned after remote closure.

* fix: Correct Yamux stream read behavior for NetStream tests

Fixed 	est_net_stream_read_after_remote_closed by updating NetStream.read to raise StreamEOF when the stream is remotely closed and no data is available, aligning with test expectations and Fixed 	est_net_stream_read_until_eof by modifying YamuxStream.read to block until the stream is closed (
ecv_closed=True) for
=-1 reads, ensuring data is only returned after remote closure.

* fix: raise StreamEOF when reading from closed stream with empty buffer

* fix: prioritize returning buffered data even after stream reset

* fix: prioritize returning buffered data even after stream reset

* fix: Ensure test_net_stream_read_after_remote_closed_and_reset passes in full suite

* fix: Add __init__.py to yamux module to fix documentation build

* fix: Add __init__.py to yamux module to fix documentation build

* fix: Add libp2p.stream_muxer.yamux to libp2p.stream_muxer.rst toctree

* fix: Correct title underline length in libp2p.stream_muxer.yamux.rst

* fix: Add a = so that is matches the libp2p.stream\_muxer.yamux length

* fix(tests): Resolve race condition in network notification test

* fix: fixing failing tests and examples with yamux and noise

* refactor: remove debug logging and improve x25519 tests

* fix: Add functionality for users to choose between Yamux and Mplex

* fix: increased trio sleep to 0.1 sec for slow environment

* feat: Add test for switching between Yamux and mplex

* refactor: move host fixtures to interop tests

* chore: Update __init__.py removing unused import

removed unused
```python
import os
import logging
```

* lint: fix import order

* fix: Resolve conftest.py conflict by removing trio test support

* fix: Resolve test skipping by keeping trio test support

* Fix: add a newline at end of the file

---------

Co-authored-by: acul71 <luca.pisani@birdo.net>
Co-authored-by: acul71 <34693171+acul71@users.noreply.github.com>
2025-05-22 14:01:51 -06:00

103 lines
3.4 KiB
Python

import pytest
from libp2p.crypto.keys import (
KeyType,
)
from libp2p.crypto.x25519 import (
X25519PrivateKey,
X25519PublicKey,
create_new_key_pair,
)
def test_x25519_public_key_creation():
# Create a new X25519 key pair
key_pair = create_new_key_pair()
public_key = key_pair.public_key
# Test that it's an instance of X25519PublicKey
assert isinstance(public_key, X25519PublicKey)
# Test key type
assert public_key.get_type() == KeyType.X25519
# Test to_bytes and from_bytes roundtrip
key_bytes = public_key.to_bytes()
reconstructed_key = X25519PublicKey.from_bytes(key_bytes)
assert isinstance(reconstructed_key, X25519PublicKey)
assert reconstructed_key.to_bytes() == key_bytes
def test_x25519_private_key_creation():
# Create a new private key
private_key = X25519PrivateKey.new()
# Test that it's an instance of X25519PrivateKey
assert isinstance(private_key, X25519PrivateKey)
# Test key type
assert private_key.get_type() == KeyType.X25519
# Test to_bytes and from_bytes roundtrip
key_bytes = private_key.to_bytes()
reconstructed_key = X25519PrivateKey.from_bytes(key_bytes)
assert isinstance(reconstructed_key, X25519PrivateKey)
assert reconstructed_key.to_bytes() == key_bytes
def test_x25519_key_pair_creation():
# Create a new key pair
key_pair = create_new_key_pair()
# Test that both private and public keys are of correct types
assert isinstance(key_pair.private_key, X25519PrivateKey)
assert isinstance(key_pair.public_key, X25519PublicKey)
# Test that public key matches private key
assert (
key_pair.private_key.get_public_key().to_bytes()
== key_pair.public_key.to_bytes()
)
def test_x25519_unsupported_operations():
# Test that signature operations are not supported
key_pair = create_new_key_pair()
# Test that public key verify raises NotImplementedError
with pytest.raises(NotImplementedError, match="X25519 does not support signatures"):
key_pair.public_key.verify(b"data", b"signature")
# Test that private key sign raises NotImplementedError
with pytest.raises(NotImplementedError, match="X25519 does not support signatures"):
key_pair.private_key.sign(b"data")
def test_x25519_invalid_key_bytes():
# Test that invalid key bytes raise appropriate exceptions
with pytest.raises(ValueError, match="An X25519 public key is 32 bytes long"):
X25519PublicKey.from_bytes(b"invalid_key_bytes")
with pytest.raises(ValueError, match="An X25519 private key is 32 bytes long"):
X25519PrivateKey.from_bytes(b"invalid_key_bytes")
def test_x25519_key_serialization():
# Test key serialization and deserialization
key_pair = create_new_key_pair()
# Serialize both keys
private_bytes = key_pair.private_key.to_bytes()
public_bytes = key_pair.public_key.to_bytes()
# Deserialize and verify
reconstructed_private = X25519PrivateKey.from_bytes(private_bytes)
reconstructed_public = X25519PublicKey.from_bytes(public_bytes)
# Verify the reconstructed keys match the original
assert reconstructed_private.to_bytes() == private_bytes
assert reconstructed_public.to_bytes() == public_bytes
# Verify the public key derived from reconstructed private key matches
assert reconstructed_private.get_public_key().to_bytes() == public_bytes