def testSendNymFailsForCryptonymIdentifierAndMatchedAbbrevVerkey( looper, sdk_pool_handle, txnPoolNodeSet, nym_request, sdk_wallet_trustee): cryptonym = createCryptonym() hexCryptonym = friendlyToHex(cryptonym) abbrevVerkey = '~' + hexToFriendly(hexCryptonym[16:]) parameters = {'dest': cryptonym, 'verkey': abbrevVerkey, 'role': ENDORSER} nym_request[OPERATION].update(parameters) request_couple = sdk_sign_and_send_prepared_request( looper, sdk_wallet_trustee, sdk_pool_handle, json.dumps(nym_request)) sdk_get_bad_response(looper, [request_couple], RequestNackedException, 'Neither a full verkey nor an abbreviated one')
def testSendNymFailsForCryptonymIdentifierAndMatchedAbbrevVerkey( be, do, poolNodesStarted, trusteeCli): cryptonym = createCryptonym() hexCryptonym = friendlyToHex(cryptonym) abbrevVerkey = '~' + hexToFriendly(hexCryptonym[16:]) parameters = { 'dest': cryptonym, 'verkey': abbrevVerkey, 'role': Roles.TRUST_ANCHOR.name } be(trusteeCli) do('send NYM dest={dest} role={role} verkey={verkey}', mapper=parameters, expect=ERROR, within=2)
def test_state_proofs_for_get_nym(request_handler): nym = 'Gw6pDLhcBcoQesN72qfotTgFa7cbuqZpkX3Xo6pLhPhv' role = "2" verkey = "~7TYfekw4GUagBnBVCqPjiC" seq_no = 1 # Check for existing nym data, multi_sig = prep_multi_sig(request_handler, nym, role, verkey, seq_no) assert get_nym_verify_proof(request_handler, nym, data, multi_sig) # Shuffle the bytes of nym h = list(friendlyToHex(nym)) random.shuffle(h) garbled_nym = hexToFriendly(bytes(h)) data[f.IDENTIFIER.nm] = garbled_nym # `garbled_nym` does not exist, proof should verify but data is null assert get_nym_verify_proof(request_handler, garbled_nym, None, multi_sig)