2016-08-08 21:04:33 +02:00
|
|
|
// Copyright (c) 2015-2016 The btcsuite developers
|
2015-09-25 01:22:00 +02:00
|
|
|
// Use of this source code is governed by an ISC
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package txscript
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/rand"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/btcsuite/btcd/btcec"
|
2016-08-08 21:04:33 +02:00
|
|
|
"github.com/btcsuite/btcd/chaincfg/chainhash"
|
2015-09-25 01:22:00 +02:00
|
|
|
)
|
|
|
|
|
2015-12-29 19:38:41 +01:00
|
|
|
// genRandomSig returns a random message, a signature of the message under the
|
|
|
|
// public key and the public key. This function is used to generate randomized
|
2015-09-25 01:22:00 +02:00
|
|
|
// test data.
|
2016-08-08 21:04:33 +02:00
|
|
|
func genRandomSig() (*chainhash.Hash, *btcec.Signature, *btcec.PublicKey, error) {
|
2015-09-25 01:22:00 +02:00
|
|
|
privKey, err := btcec.NewPrivateKey(btcec.S256())
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, nil, err
|
|
|
|
}
|
|
|
|
|
2016-08-08 21:04:33 +02:00
|
|
|
var msgHash chainhash.Hash
|
2015-09-25 01:22:00 +02:00
|
|
|
if _, err := rand.Read(msgHash[:]); err != nil {
|
|
|
|
return nil, nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
sig, err := privKey.Sign(msgHash[:])
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &msgHash, sig, privKey.PubKey(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestSigCacheAddExists tests the ability to add, and later check the
|
|
|
|
// existence of a signature triplet in the signature cache.
|
|
|
|
func TestSigCacheAddExists(t *testing.T) {
|
|
|
|
sigCache := NewSigCache(200)
|
|
|
|
|
|
|
|
// Generate a random sigCache entry triplet.
|
|
|
|
msg1, sig1, key1, err := genRandomSig()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("unable to generate random signature test data")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add the triplet to the signature cache.
|
|
|
|
sigCache.Add(*msg1, sig1, key1)
|
|
|
|
|
|
|
|
// The previously added triplet should now be found within the sigcache.
|
|
|
|
sig1Copy, _ := btcec.ParseSignature(sig1.Serialize(), btcec.S256())
|
|
|
|
key1Copy, _ := btcec.ParsePubKey(key1.SerializeCompressed(), btcec.S256())
|
|
|
|
if !sigCache.Exists(*msg1, sig1Copy, key1Copy) {
|
|
|
|
t.Errorf("previously added item not found in signature cache")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestSigCacheAddEvictEntry tests the eviction case where a new signature
|
|
|
|
// triplet is added to a full signature cache which should trigger randomized
|
|
|
|
// eviction, followed by adding the new element to the cache.
|
|
|
|
func TestSigCacheAddEvictEntry(t *testing.T) {
|
|
|
|
// Create a sigcache that can hold up to 100 entries.
|
|
|
|
sigCacheSize := uint(100)
|
|
|
|
sigCache := NewSigCache(sigCacheSize)
|
|
|
|
|
|
|
|
// Fill the sigcache up with some random sig triplets.
|
|
|
|
for i := uint(0); i < sigCacheSize; i++ {
|
|
|
|
msg, sig, key, err := genRandomSig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to generate random signature test data")
|
|
|
|
}
|
|
|
|
|
|
|
|
sigCache.Add(*msg, sig, key)
|
|
|
|
|
|
|
|
sigCopy, _ := btcec.ParseSignature(sig.Serialize(), btcec.S256())
|
|
|
|
keyCopy, _ := btcec.ParsePubKey(key.SerializeCompressed(), btcec.S256())
|
|
|
|
if !sigCache.Exists(*msg, sigCopy, keyCopy) {
|
|
|
|
t.Errorf("previously added item not found in signature" +
|
|
|
|
"cache")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The sigcache should now have sigCacheSize entries within it.
|
|
|
|
if uint(len(sigCache.validSigs)) != sigCacheSize {
|
|
|
|
t.Fatalf("sigcache should now have %v entries, instead it has %v",
|
|
|
|
sigCacheSize, len(sigCache.validSigs))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add a new entry, this should cause eviction of a randomly chosen
|
2015-12-30 19:53:44 +01:00
|
|
|
// previous entry.
|
2015-09-25 01:22:00 +02:00
|
|
|
msgNew, sigNew, keyNew, err := genRandomSig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to generate random signature test data")
|
|
|
|
}
|
|
|
|
sigCache.Add(*msgNew, sigNew, keyNew)
|
|
|
|
|
|
|
|
// The sigcache should still have sigCache entries.
|
|
|
|
if uint(len(sigCache.validSigs)) != sigCacheSize {
|
|
|
|
t.Fatalf("sigcache should now have %v entries, instead it has %v",
|
|
|
|
sigCacheSize, len(sigCache.validSigs))
|
|
|
|
}
|
|
|
|
|
|
|
|
// The entry added above should be found within the sigcache.
|
|
|
|
sigNewCopy, _ := btcec.ParseSignature(sigNew.Serialize(), btcec.S256())
|
|
|
|
keyNewCopy, _ := btcec.ParsePubKey(keyNew.SerializeCompressed(), btcec.S256())
|
|
|
|
if !sigCache.Exists(*msgNew, sigNewCopy, keyNewCopy) {
|
|
|
|
t.Fatalf("previously added item not found in signature cache")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestSigCacheAddMaxEntriesZeroOrNegative tests that if a sigCache is created
|
|
|
|
// with a max size <= 0, then no entries are added to the sigcache at all.
|
|
|
|
func TestSigCacheAddMaxEntriesZeroOrNegative(t *testing.T) {
|
|
|
|
// Create a sigcache that can hold up to 0 entries.
|
|
|
|
sigCache := NewSigCache(0)
|
|
|
|
|
|
|
|
// Generate a random sigCache entry triplet.
|
|
|
|
msg1, sig1, key1, err := genRandomSig()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("unable to generate random signature test data")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add the triplet to the signature cache.
|
|
|
|
sigCache.Add(*msg1, sig1, key1)
|
|
|
|
|
|
|
|
// The generated triplet should not be found.
|
|
|
|
sig1Copy, _ := btcec.ParseSignature(sig1.Serialize(), btcec.S256())
|
|
|
|
key1Copy, _ := btcec.ParsePubKey(key1.SerializeCompressed(), btcec.S256())
|
|
|
|
if sigCache.Exists(*msg1, sig1Copy, key1Copy) {
|
|
|
|
t.Errorf("previously added signature found in sigcache, but" +
|
|
|
|
"shouldn't have been")
|
|
|
|
}
|
|
|
|
|
|
|
|
// There shouldn't be any entries in the sigCache.
|
|
|
|
if len(sigCache.validSigs) != 0 {
|
|
|
|
t.Errorf("%v items found in sigcache, no items should have"+
|
|
|
|
"been added", len(sigCache.validSigs))
|
|
|
|
}
|
|
|
|
}
|