btcec: Consolidate tests into the btcec package.

Putting the test code in the same package makes it easier for forks
since they don't have to change the import paths as much and it also
gets rid of the need for internal_test.go to bridge.

Also, remove the exception from the lint checks about returning the
unexported type since it is no longer required.
This commit is contained in:
Dave Collins 2016-10-19 00:48:05 -05:00
parent b1621332cc
commit fdfa07b0be
No known key found for this signature in database
GPG key ID: B8904D9D9C93D1F2
9 changed files with 169 additions and 252 deletions

View file

@ -1,4 +1,4 @@
// Copyright 2013-2014 The btcsuite developers // Copyright 2013-2016 The btcsuite developers
// Use of this source code is governed by an ISC // Use of this source code is governed by an ISC
// license that can be found in the LICENSE file. // license that can be found in the LICENSE file.
@ -20,7 +20,7 @@ func BenchmarkAddJacobian(b *testing.B) {
curve := S256() curve := S256()
b.StartTimer() b.StartTimer()
for i := 0; i < b.N; i++ { for i := 0; i < b.N; i++ {
curve.TstAddJacobian(x1, y1, z1, x2, y2, z2, x3, y3, z3) curve.addJacobian(x1, y1, z1, x2, y2, z2, x3, y3, z3)
} }
} }
@ -39,7 +39,7 @@ func BenchmarkAddJacobianNotZOne(b *testing.B) {
curve := S256() curve := S256()
b.StartTimer() b.StartTimer()
for i := 0; i < b.N; i++ { for i := 0; i < b.N; i++ {
curve.TstAddJacobian(x1, y1, z1, x2, y2, z2, x3, y3, z3) curve.addJacobian(x1, y1, z1, x2, y2, z2, x3, y3, z3)
} }
} }

View file

@ -1,10 +1,10 @@
// Copyright 2011 The Go Authors. All rights reserved. // Copyright 2011 The Go Authors. All rights reserved.
// Copyright 2011 ThePiachu. All rights reserved. // Copyright 2011 ThePiachu. All rights reserved.
// Copyright 2013-2014 The btcsuite developers // Copyright 2013-2016 The btcsuite developers
// Use of this source code is governed by an ISC // Use of this source code is governed by an ISC
// license that can be found in the LICENSE file. // license that can be found in the LICENSE file.
package btcec_test package btcec
import ( import (
"crypto/rand" "crypto/rand"
@ -13,10 +13,25 @@ import (
"fmt" "fmt"
"math/big" "math/big"
"testing" "testing"
"github.com/btcsuite/btcd/btcec"
) )
// isJacobianOnS256Curve returns boolean if the point (x,y,z) is on the
// secp256k1 curve.
func isJacobianOnS256Curve(x, y, z *fieldVal) bool {
// Elliptic curve equation for secp256k1 is: y^2 = x^3 + 7
// In Jacobian coordinates, Y = y/z^3 and X = x/z^2
// Thus:
// (y/z^3)^2 = (x/z^2)^3 + 7
// y^2/z^6 = x^3/z^6 + 7
// y^2 = x^3 + 7*z^6
var y2, z2, x3, result fieldVal
y2.SquareVal(y).Normalize()
z2.SquareVal(z)
x3.SquareVal(x).Mul(x)
result.SquareVal(&z2).Mul(&z2).MulInt(7).Add(&x3).Normalize()
return y2.Equals(&result)
}
// TestAddJacobian tests addition of points projected in Jacobian coordinates. // TestAddJacobian tests addition of points projected in Jacobian coordinates.
func TestAddJacobian(t *testing.T) { func TestAddJacobian(t *testing.T) {
tests := []struct { tests := []struct {
@ -211,37 +226,37 @@ func TestAddJacobian(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
// Convert hex to field values. // Convert hex to field values.
x1 := btcec.NewFieldVal().SetHex(test.x1) x1 := new(fieldVal).SetHex(test.x1)
y1 := btcec.NewFieldVal().SetHex(test.y1) y1 := new(fieldVal).SetHex(test.y1)
z1 := btcec.NewFieldVal().SetHex(test.z1) z1 := new(fieldVal).SetHex(test.z1)
x2 := btcec.NewFieldVal().SetHex(test.x2) x2 := new(fieldVal).SetHex(test.x2)
y2 := btcec.NewFieldVal().SetHex(test.y2) y2 := new(fieldVal).SetHex(test.y2)
z2 := btcec.NewFieldVal().SetHex(test.z2) z2 := new(fieldVal).SetHex(test.z2)
x3 := btcec.NewFieldVal().SetHex(test.x3) x3 := new(fieldVal).SetHex(test.x3)
y3 := btcec.NewFieldVal().SetHex(test.y3) y3 := new(fieldVal).SetHex(test.y3)
z3 := btcec.NewFieldVal().SetHex(test.z3) z3 := new(fieldVal).SetHex(test.z3)
// Ensure the test data is using points that are actually on // Ensure the test data is using points that are actually on
// the curve (or the point at infinity). // the curve (or the point at infinity).
if !z1.IsZero() && !btcec.S256().TstIsJacobianOnCurve(x1, y1, z1) { if !z1.IsZero() && !isJacobianOnS256Curve(x1, y1, z1) {
t.Errorf("#%d first point is not on the curve -- "+ t.Errorf("#%d first point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
if !z2.IsZero() && !btcec.S256().TstIsJacobianOnCurve(x2, y2, z2) { if !z2.IsZero() && !isJacobianOnS256Curve(x2, y2, z2) {
t.Errorf("#%d second point is not on the curve -- "+ t.Errorf("#%d second point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
if !z3.IsZero() && !btcec.S256().TstIsJacobianOnCurve(x3, y3, z3) { if !z3.IsZero() && !isJacobianOnS256Curve(x3, y3, z3) {
t.Errorf("#%d expected point is not on the curve -- "+ t.Errorf("#%d expected point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
// Add the two points. // Add the two points.
rx, ry, rz := btcec.NewFieldVal(), btcec.NewFieldVal(), btcec.NewFieldVal() rx, ry, rz := new(fieldVal), new(fieldVal), new(fieldVal)
btcec.S256().TstAddJacobian(x1, y1, z1, x2, y2, z2, rx, ry, rz) S256().addJacobian(x1, y1, z1, x2, y2, z2, rx, ry, rz)
// Ensure result matches expected. // Ensure result matches expected.
if !rx.Equals(x3) || !ry.Equals(y3) || !rz.Equals(z3) { if !rx.Equals(x3) || !ry.Equals(y3) || !rz.Equals(z3) {
@ -320,24 +335,24 @@ func TestAddAffine(t *testing.T) {
// Ensure the test data is using points that are actually on // Ensure the test data is using points that are actually on
// the curve (or the point at infinity). // the curve (or the point at infinity).
if !(x1.Sign() == 0 && y1.Sign() == 0) && !btcec.S256().IsOnCurve(x1, y1) { if !(x1.Sign() == 0 && y1.Sign() == 0) && !S256().IsOnCurve(x1, y1) {
t.Errorf("#%d first point is not on the curve -- "+ t.Errorf("#%d first point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
if !(x2.Sign() == 0 && y2.Sign() == 0) && !btcec.S256().IsOnCurve(x2, y2) { if !(x2.Sign() == 0 && y2.Sign() == 0) && !S256().IsOnCurve(x2, y2) {
t.Errorf("#%d second point is not on the curve -- "+ t.Errorf("#%d second point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
if !(x3.Sign() == 0 && y3.Sign() == 0) && !btcec.S256().IsOnCurve(x3, y3) { if !(x3.Sign() == 0 && y3.Sign() == 0) && !S256().IsOnCurve(x3, y3) {
t.Errorf("#%d expected point is not on the curve -- "+ t.Errorf("#%d expected point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
// Add the two points. // Add the two points.
rx, ry := btcec.S256().Add(x1, y1, x2, y2) rx, ry := S256().Add(x1, y1, x2, y2)
// Ensure result matches expected. // Ensure result matches expected.
if rx.Cmp(x3) != 00 || ry.Cmp(y3) != 0 { if rx.Cmp(x3) != 00 || ry.Cmp(y3) != 0 {
@ -387,29 +402,29 @@ func TestDoubleJacobian(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
// Convert hex to field values. // Convert hex to field values.
x1 := btcec.NewFieldVal().SetHex(test.x1) x1 := new(fieldVal).SetHex(test.x1)
y1 := btcec.NewFieldVal().SetHex(test.y1) y1 := new(fieldVal).SetHex(test.y1)
z1 := btcec.NewFieldVal().SetHex(test.z1) z1 := new(fieldVal).SetHex(test.z1)
x3 := btcec.NewFieldVal().SetHex(test.x3) x3 := new(fieldVal).SetHex(test.x3)
y3 := btcec.NewFieldVal().SetHex(test.y3) y3 := new(fieldVal).SetHex(test.y3)
z3 := btcec.NewFieldVal().SetHex(test.z3) z3 := new(fieldVal).SetHex(test.z3)
// Ensure the test data is using points that are actually on // Ensure the test data is using points that are actually on
// the curve (or the point at infinity). // the curve (or the point at infinity).
if !z1.IsZero() && !btcec.S256().TstIsJacobianOnCurve(x1, y1, z1) { if !z1.IsZero() && !isJacobianOnS256Curve(x1, y1, z1) {
t.Errorf("#%d first point is not on the curve -- "+ t.Errorf("#%d first point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
if !z3.IsZero() && !btcec.S256().TstIsJacobianOnCurve(x3, y3, z3) { if !z3.IsZero() && !isJacobianOnS256Curve(x3, y3, z3) {
t.Errorf("#%d expected point is not on the curve -- "+ t.Errorf("#%d expected point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
// Double the point. // Double the point.
rx, ry, rz := btcec.NewFieldVal(), btcec.NewFieldVal(), btcec.NewFieldVal() rx, ry, rz := new(fieldVal), new(fieldVal), new(fieldVal)
btcec.S256().TstDoubleJacobian(x1, y1, z1, rx, ry, rz) S256().doubleJacobian(x1, y1, z1, rx, ry, rz)
// Ensure result matches expected. // Ensure result matches expected.
if !rx.Equals(x3) || !ry.Equals(y3) || !rz.Equals(z3) { if !rx.Equals(x3) || !ry.Equals(y3) || !rz.Equals(z3) {
@ -471,19 +486,19 @@ func TestDoubleAffine(t *testing.T) {
// Ensure the test data is using points that are actually on // Ensure the test data is using points that are actually on
// the curve (or the point at infinity). // the curve (or the point at infinity).
if !(x1.Sign() == 0 && y1.Sign() == 0) && !btcec.S256().IsOnCurve(x1, y1) { if !(x1.Sign() == 0 && y1.Sign() == 0) && !S256().IsOnCurve(x1, y1) {
t.Errorf("#%d first point is not on the curve -- "+ t.Errorf("#%d first point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
if !(x3.Sign() == 0 && y3.Sign() == 0) && !btcec.S256().IsOnCurve(x3, y3) { if !(x3.Sign() == 0 && y3.Sign() == 0) && !S256().IsOnCurve(x3, y3) {
t.Errorf("#%d expected point is not on the curve -- "+ t.Errorf("#%d expected point is not on the curve -- "+
"invalid test data", i) "invalid test data", i)
continue continue
} }
// Double the point. // Double the point.
rx, ry := btcec.S256().Double(x1, y1) rx, ry := S256().Double(x1, y1)
// Ensure result matches expected. // Ensure result matches expected.
if rx.Cmp(x3) != 00 || ry.Cmp(y3) != 0 { if rx.Cmp(x3) != 00 || ry.Cmp(y3) != 0 {
@ -495,7 +510,7 @@ func TestDoubleAffine(t *testing.T) {
} }
func TestOnCurve(t *testing.T) { func TestOnCurve(t *testing.T) {
s256 := btcec.S256() s256 := S256()
if !s256.IsOnCurve(s256.Params().Gx, s256.Params().Gy) { if !s256.IsOnCurve(s256.Params().Gx, s256.Params().Gy) {
t.Errorf("FAIL S256") t.Errorf("FAIL S256")
} }
@ -537,7 +552,7 @@ var s256BaseMultTests = []baseMultTest{
//TODO: test different curves as well? //TODO: test different curves as well?
func TestBaseMult(t *testing.T) { func TestBaseMult(t *testing.T) {
s256 := btcec.S256() s256 := S256()
for i, e := range s256BaseMultTests { for i, e := range s256BaseMultTests {
k, ok := new(big.Int).SetString(e.k, 16) k, ok := new(big.Int).SetString(e.k, 16)
if !ok { if !ok {
@ -554,7 +569,7 @@ func TestBaseMult(t *testing.T) {
} }
func TestBaseMultVerify(t *testing.T) { func TestBaseMultVerify(t *testing.T) {
s256 := btcec.S256() s256 := S256()
for bytes := 1; bytes < 40; bytes++ { for bytes := 1; bytes < 40; bytes++ {
for i := 0; i < 30; i++ { for i := 0; i < 30; i++ {
data := make([]byte, bytes) data := make([]byte, bytes)
@ -582,7 +597,7 @@ func TestScalarMult(t *testing.T) {
// Use another random exponent on the new point. // Use another random exponent on the new point.
// We use BaseMult to verify by multiplying the previous exponent // We use BaseMult to verify by multiplying the previous exponent
// and the new random exponent together (mod N) // and the new random exponent together (mod N)
s256 := btcec.S256() s256 := S256()
x, y := s256.Gx, s256.Gy x, y := s256.Gx, s256.Gy
exponent := big.NewInt(1) exponent := big.NewInt(1)
for i := 0; i < 1024; i++ { for i := 0; i < 1024; i++ {
@ -604,8 +619,8 @@ func TestScalarMult(t *testing.T) {
// Test this curve's usage with the ecdsa package. // Test this curve's usage with the ecdsa package.
func testKeyGeneration(t *testing.T, c *btcec.KoblitzCurve, tag string) { func testKeyGeneration(t *testing.T, c *KoblitzCurve, tag string) {
priv, err := btcec.NewPrivateKey(c) priv, err := NewPrivateKey(c)
if err != nil { if err != nil {
t.Errorf("%s: error: %s", tag, err) t.Errorf("%s: error: %s", tag, err)
return return
@ -616,11 +631,11 @@ func testKeyGeneration(t *testing.T, c *btcec.KoblitzCurve, tag string) {
} }
func TestKeyGeneration(t *testing.T) { func TestKeyGeneration(t *testing.T) {
testKeyGeneration(t, btcec.S256(), "S256") testKeyGeneration(t, S256(), "S256")
} }
func testSignAndVerify(t *testing.T, c *btcec.KoblitzCurve, tag string) { func testSignAndVerify(t *testing.T, c *KoblitzCurve, tag string) {
priv, _ := btcec.NewPrivateKey(c) priv, _ := NewPrivateKey(c)
pub := priv.PubKey() pub := priv.PubKey()
hashed := []byte("testing") hashed := []byte("testing")
@ -641,7 +656,7 @@ func testSignAndVerify(t *testing.T, c *btcec.KoblitzCurve, tag string) {
} }
func TestSignAndVerify(t *testing.T) { func TestSignAndVerify(t *testing.T) {
testSignAndVerify(t, btcec.S256(), "S256") testSignAndVerify(t, S256(), "S256")
} }
func TestNAF(t *testing.T) { func TestNAF(t *testing.T) {
@ -655,7 +670,7 @@ func TestNAF(t *testing.T) {
t.Fatalf("failed to read random data at %d", i) t.Fatalf("failed to read random data at %d", i)
break break
} }
nafPos, nafNeg := btcec.NAF(data) nafPos, nafNeg := NAF(data)
want := new(big.Int).SetBytes(data) want := new(big.Int).SetBytes(data)
got := big.NewInt(0) got := big.NewInt(0)
// Check that the NAF representation comes up with the right number // Check that the NAF representation comes up with the right number
@ -679,14 +694,6 @@ func TestNAF(t *testing.T) {
} }
} }
func fromHex(s string) *big.Int {
r, ok := new(big.Int).SetString(s, 16)
if !ok {
panic("bad hex")
}
return r
}
// These test vectors were taken from // These test vectors were taken from
// http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsatestvectors.zip // http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsatestvectors.zip
var testVectors = []struct { var testVectors = []struct {
@ -827,8 +834,8 @@ func TestVectors(t *testing.T) {
sha := sha1.New() sha := sha1.New()
for i, test := range testVectors { for i, test := range testVectors {
pub := btcec.PublicKey{ pub := PublicKey{
Curve: btcec.S256(), Curve: S256(),
X: fromHex(test.Qx), X: fromHex(test.Qx),
Y: fromHex(test.Qy), Y: fromHex(test.Qy),
} }
@ -836,10 +843,9 @@ func TestVectors(t *testing.T) {
sha.Reset() sha.Reset()
sha.Write(msg) sha.Write(msg)
hashed := sha.Sum(nil) hashed := sha.Sum(nil)
sig := btcec.Signature{R: fromHex(test.r), S: fromHex(test.s)} sig := Signature{R: fromHex(test.r), S: fromHex(test.s)}
if fuck := sig.Verify(hashed, &pub); fuck != test.ok { if verified := sig.Verify(hashed, &pub); verified != test.ok {
//t.Errorf("%d: bad result %v %v", i, pub, hashed) t.Errorf("%d: bad result %v instead of %v", i, verified,
t.Errorf("%d: bad result %v instead of %v", i, fuck,
test.ok) test.ok)
} }
if testing.Short() { if testing.Short() {

View file

@ -1,31 +1,29 @@
// Copyright (c) 2015 The btcsuite developers // Copyright (c) 2015-2016 The btcsuite developers
// Use of this source code is governed by an ISC // Use of this source code is governed by an ISC
// license that can be found in the LICENSE file. // license that can be found in the LICENSE file.
package btcec_test package btcec
import ( import (
"bytes" "bytes"
"encoding/hex" "encoding/hex"
"testing" "testing"
"github.com/btcsuite/btcd/btcec"
) )
func TestGenerateSharedSecret(t *testing.T) { func TestGenerateSharedSecret(t *testing.T) {
privKey1, err := btcec.NewPrivateKey(btcec.S256()) privKey1, err := NewPrivateKey(S256())
if err != nil { if err != nil {
t.Errorf("private key generation error: %s", err) t.Errorf("private key generation error: %s", err)
return return
} }
privKey2, err := btcec.NewPrivateKey(btcec.S256()) privKey2, err := NewPrivateKey(S256())
if err != nil { if err != nil {
t.Errorf("private key generation error: %s", err) t.Errorf("private key generation error: %s", err)
return return
} }
secret1 := btcec.GenerateSharedSecret(privKey1, privKey2.PubKey()) secret1 := GenerateSharedSecret(privKey1, privKey2.PubKey())
secret2 := btcec.GenerateSharedSecret(privKey2, privKey1.PubKey()) secret2 := GenerateSharedSecret(privKey2, privKey1.PubKey())
if !bytes.Equal(secret1, secret2) { if !bytes.Equal(secret1, secret2) {
t.Errorf("ECDH failed, secrets mismatch - first: %x, second: %x", t.Errorf("ECDH failed, secrets mismatch - first: %x, second: %x",
@ -35,19 +33,19 @@ func TestGenerateSharedSecret(t *testing.T) {
// Test 1: Encryption and decryption // Test 1: Encryption and decryption
func TestCipheringBasic(t *testing.T) { func TestCipheringBasic(t *testing.T) {
privkey, err := btcec.NewPrivateKey(btcec.S256()) privkey, err := NewPrivateKey(S256())
if err != nil { if err != nil {
t.Fatal("failed to generate private key") t.Fatal("failed to generate private key")
} }
in := []byte("Hey there dude. How are you doing? This is a test.") in := []byte("Hey there dude. How are you doing? This is a test.")
out, err := btcec.Encrypt(privkey.PubKey(), in) out, err := Encrypt(privkey.PubKey(), in)
if err != nil { if err != nil {
t.Fatal("failed to encrypt:", err) t.Fatal("failed to encrypt:", err)
} }
dec, err := btcec.Decrypt(privkey, out) dec, err := Decrypt(privkey, out)
if err != nil { if err != nil {
t.Fatal("failed to decrypt:", err) t.Fatal("failed to decrypt:", err)
} }
@ -61,7 +59,7 @@ func TestCipheringBasic(t *testing.T) {
func TestCiphering(t *testing.T) { func TestCiphering(t *testing.T) {
pb, _ := hex.DecodeString("fe38240982f313ae5afb3e904fb8215fb11af1200592b" + pb, _ := hex.DecodeString("fe38240982f313ae5afb3e904fb8215fb11af1200592b" +
"fca26c96c4738e4bf8f") "fca26c96c4738e4bf8f")
privkey, _ := btcec.PrivKeyFromBytes(btcec.S256(), pb) privkey, _ := PrivKeyFromBytes(S256(), pb)
in := []byte("This is just a test.") in := []byte("This is just a test.")
out, _ := hex.DecodeString("b0d66e5adaa5ed4e2f0ca68e17b8f2fc02ca002009e3" + out, _ := hex.DecodeString("b0d66e5adaa5ed4e2f0ca68e17b8f2fc02ca002009e3" +
@ -70,7 +68,7 @@ func TestCiphering(t *testing.T) {
"9b0ba77cf14348fcff80fee10e11981f1b4be372d93923e9178972f69937ec850ed" + "9b0ba77cf14348fcff80fee10e11981f1b4be372d93923e9178972f69937ec850ed" +
"6c3f11ff572ddd5b2bedf9f9c0b327c54da02a28fcdce1f8369ffec") "6c3f11ff572ddd5b2bedf9f9c0b327c54da02a28fcdce1f8369ffec")
dec, err := btcec.Decrypt(privkey, out) dec, err := Decrypt(privkey, out)
if err != nil { if err != nil {
t.Fatal("failed to decrypt:", err) t.Fatal("failed to decrypt:", err)
} }
@ -81,7 +79,7 @@ func TestCiphering(t *testing.T) {
} }
func TestCipheringErrors(t *testing.T) { func TestCipheringErrors(t *testing.T) {
privkey, err := btcec.NewPrivateKey(btcec.S256()) privkey, err := NewPrivateKey(S256())
if err != nil { if err != nil {
t.Fatal("failed to generate private key") t.Fatal("failed to generate private key")
} }
@ -154,7 +152,7 @@ func TestCipheringErrors(t *testing.T) {
} }
for i, test := range tests1 { for i, test := range tests1 {
_, err = btcec.Decrypt(privkey, test.ciphertext) _, err = Decrypt(privkey, test.ciphertext)
if err == nil { if err == nil {
t.Errorf("Decrypt #%d did not get error", i) t.Errorf("Decrypt #%d did not get error", i)
} }
@ -168,7 +166,7 @@ func TestCipheringErrors(t *testing.T) {
{bytes.Repeat([]byte{0x07}, 15)}, {bytes.Repeat([]byte{0x07}, 15)},
} }
for i, test := range tests2 { for i, test := range tests2 {
_, err = btcec.TstRemovePKCSPadding(test.in) _, err = removePKCSPadding(test.in)
if err == nil { if err == nil {
t.Errorf("removePKCSPadding #%d did not get error", i) t.Errorf("removePKCSPadding #%d did not get error", i)
} }

View file

@ -1,15 +1,13 @@
// Copyright (c) 2013-2014 The btcsuite developers // Copyright (c) 2013-2016 The btcsuite developers
// Copyright (c) 2013-2014 Dave Collins // Copyright (c) 2013-2016 Dave Collins
// Use of this source code is governed by an ISC // Use of this source code is governed by an ISC
// license that can be found in the LICENSE file. // license that can be found in the LICENSE file.
package btcec_test package btcec
import ( import (
"reflect" "reflect"
"testing" "testing"
"github.com/btcsuite/btcd/btcec"
) )
// TestSetInt ensures that setting a field value to various native integers // TestSetInt ensures that setting a field value to various native integers
@ -30,11 +28,10 @@ func TestSetInt(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetInt(test.in) f := new(fieldVal).SetInt(test.in)
result := f.TstRawInts() if !reflect.DeepEqual(f.n, test.raw) {
if !reflect.DeepEqual(result, test.raw) {
t.Errorf("fieldVal.Set #%d wrong result\ngot: %v\n"+ t.Errorf("fieldVal.Set #%d wrong result\ngot: %v\n"+
"want: %v", i, result, test.raw) "want: %v", i, f.n, test.raw)
continue continue
} }
} }
@ -42,9 +39,9 @@ func TestSetInt(t *testing.T) {
// TestZero ensures that zeroing a field value zero works as expected. // TestZero ensures that zeroing a field value zero works as expected.
func TestZero(t *testing.T) { func TestZero(t *testing.T) {
f := btcec.NewFieldVal().SetInt(2) f := new(fieldVal).SetInt(2)
f.Zero() f.Zero()
for idx, rawInt := range f.TstRawInts() { for idx, rawInt := range f.n {
if rawInt != 0 { if rawInt != 0 {
t.Errorf("internal field integer at index #%d is not "+ t.Errorf("internal field integer at index #%d is not "+
"zero - got %d", idx, rawInt) "zero - got %d", idx, rawInt)
@ -54,22 +51,22 @@ func TestZero(t *testing.T) {
// TestIsZero ensures that checking if a field IsZero works as expected. // TestIsZero ensures that checking if a field IsZero works as expected.
func TestIsZero(t *testing.T) { func TestIsZero(t *testing.T) {
f := btcec.NewFieldVal() f := new(fieldVal)
if !f.IsZero() { if !f.IsZero() {
t.Errorf("new field value is not zero - got %v (rawints %x)", f, t.Errorf("new field value is not zero - got %v (rawints %x)", f,
f.TstRawInts()) f.n)
} }
f.SetInt(1) f.SetInt(1)
if f.IsZero() { if f.IsZero() {
t.Errorf("field claims it's zero when it's not - got %v "+ t.Errorf("field claims it's zero when it's not - got %v "+
"(raw rawints %x)", f, f.TstRawInts()) "(raw rawints %x)", f, f.n)
} }
f.Zero() f.Zero()
if !f.IsZero() { if !f.IsZero() {
t.Errorf("field claims it's not zero when it is - got %v "+ t.Errorf("field claims it's not zero when it is - got %v "+
"(raw rawints %x)", f, f.TstRawInts()) "(raw rawints %x)", f, f.n)
} }
} }
@ -147,7 +144,7 @@ func TestStringer(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in) f := new(fieldVal).SetHex(test.in)
result := f.String() result := f.String()
if result != test.expected { if result != test.expected {
t.Errorf("fieldVal.String #%d wrong result\ngot: %v\n"+ t.Errorf("fieldVal.String #%d wrong result\ngot: %v\n"+
@ -254,11 +251,14 @@ func TestNormalize(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().TstSetRawInts(test.raw).Normalize() f := new(fieldVal)
result := f.TstRawInts() for rawIntIdx := 0; rawIntIdx < len(test.raw); rawIntIdx++ {
if !reflect.DeepEqual(result, test.normalized) { f.n[rawIntIdx] = test.raw[rawIntIdx]
}
f.Normalize()
if !reflect.DeepEqual(f.n, test.normalized) {
t.Errorf("fieldVal.Set #%d wrong normalized result\n"+ t.Errorf("fieldVal.Set #%d wrong normalized result\n"+
"got: %x\nwant: %x", i, result, test.normalized) "got: %x\nwant: %x", i, f.n, test.normalized)
continue continue
} }
} }
@ -283,7 +283,7 @@ func TestIsOdd(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in) f := new(fieldVal).SetHex(test.in)
result := f.IsOdd() result := f.IsOdd()
if result != test.expected { if result != test.expected {
t.Errorf("fieldVal.IsOdd #%d wrong result\n"+ t.Errorf("fieldVal.IsOdd #%d wrong result\n"+
@ -316,8 +316,8 @@ func TestEquals(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in1).Normalize() f := new(fieldVal).SetHex(test.in1).Normalize()
f2 := btcec.NewFieldVal().SetHex(test.in2).Normalize() f2 := new(fieldVal).SetHex(test.in2).Normalize()
result := f.Equals(f2) result := f.Equals(f2)
if result != test.expected { if result != test.expected {
t.Errorf("fieldVal.Equals #%d wrong result\n"+ t.Errorf("fieldVal.Equals #%d wrong result\n"+
@ -364,8 +364,8 @@ func TestNegate(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in).Normalize() f := new(fieldVal).SetHex(test.in).Normalize()
expected := btcec.NewFieldVal().SetHex(test.expected).Normalize() expected := new(fieldVal).SetHex(test.expected).Normalize()
result := f.Negate(1).Normalize() result := f.Negate(1).Normalize()
if !result.Equals(expected) { if !result.Equals(expected) {
t.Errorf("fieldVal.Negate #%d wrong result\n"+ t.Errorf("fieldVal.Negate #%d wrong result\n"+
@ -415,8 +415,8 @@ func TestAddInt(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in1).Normalize() f := new(fieldVal).SetHex(test.in1).Normalize()
expected := btcec.NewFieldVal().SetHex(test.expected).Normalize() expected := new(fieldVal).SetHex(test.expected).Normalize()
result := f.AddInt(test.in2).Normalize() result := f.AddInt(test.in2).Normalize()
if !result.Equals(expected) { if !result.Equals(expected) {
t.Errorf("fieldVal.AddInt #%d wrong result\n"+ t.Errorf("fieldVal.AddInt #%d wrong result\n"+
@ -466,9 +466,9 @@ func TestAdd(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in1).Normalize() f := new(fieldVal).SetHex(test.in1).Normalize()
f2 := btcec.NewFieldVal().SetHex(test.in2).Normalize() f2 := new(fieldVal).SetHex(test.in2).Normalize()
expected := btcec.NewFieldVal().SetHex(test.expected).Normalize() expected := new(fieldVal).SetHex(test.expected).Normalize()
result := f.Add(f2).Normalize() result := f.Add(f2).Normalize()
if !result.Equals(expected) { if !result.Equals(expected) {
t.Errorf("fieldVal.Add #%d wrong result\n"+ t.Errorf("fieldVal.Add #%d wrong result\n"+
@ -520,9 +520,9 @@ func TestAdd2(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in1).Normalize() f := new(fieldVal).SetHex(test.in1).Normalize()
f2 := btcec.NewFieldVal().SetHex(test.in2).Normalize() f2 := new(fieldVal).SetHex(test.in2).Normalize()
expected := btcec.NewFieldVal().SetHex(test.expected).Normalize() expected := new(fieldVal).SetHex(test.expected).Normalize()
result := f.Add2(f, f2).Normalize() result := f.Add2(f, f2).Normalize()
if !result.Equals(expected) { if !result.Equals(expected) {
t.Errorf("fieldVal.Add2 #%d wrong result\n"+ t.Errorf("fieldVal.Add2 #%d wrong result\n"+
@ -585,8 +585,8 @@ func TestMulInt(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in1).Normalize() f := new(fieldVal).SetHex(test.in1).Normalize()
expected := btcec.NewFieldVal().SetHex(test.expected).Normalize() expected := new(fieldVal).SetHex(test.expected).Normalize()
result := f.MulInt(test.in2).Normalize() result := f.MulInt(test.in2).Normalize()
if !result.Equals(expected) { if !result.Equals(expected) {
t.Errorf("fieldVal.MulInt #%d wrong result\n"+ t.Errorf("fieldVal.MulInt #%d wrong result\n"+
@ -652,9 +652,9 @@ func TestMul(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in1).Normalize() f := new(fieldVal).SetHex(test.in1).Normalize()
f2 := btcec.NewFieldVal().SetHex(test.in2).Normalize() f2 := new(fieldVal).SetHex(test.in2).Normalize()
expected := btcec.NewFieldVal().SetHex(test.expected).Normalize() expected := new(fieldVal).SetHex(test.expected).Normalize()
result := f.Mul(f2).Normalize() result := f.Mul(f2).Normalize()
if !result.Equals(expected) { if !result.Equals(expected) {
t.Errorf("fieldVal.Mul #%d wrong result\n"+ t.Errorf("fieldVal.Mul #%d wrong result\n"+
@ -699,8 +699,8 @@ func TestSquare(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in).Normalize() f := new(fieldVal).SetHex(test.in).Normalize()
expected := btcec.NewFieldVal().SetHex(test.expected).Normalize() expected := new(fieldVal).SetHex(test.expected).Normalize()
result := f.Square().Normalize() result := f.Square().Normalize()
if !result.Equals(expected) { if !result.Equals(expected) {
t.Errorf("fieldVal.Square #%d wrong result\n"+ t.Errorf("fieldVal.Square #%d wrong result\n"+
@ -752,8 +752,8 @@ func TestInverse(t *testing.T) {
t.Logf("Running %d tests", len(tests)) t.Logf("Running %d tests", len(tests))
for i, test := range tests { for i, test := range tests {
f := btcec.NewFieldVal().SetHex(test.in).Normalize() f := new(fieldVal).SetHex(test.in).Normalize()
expected := btcec.NewFieldVal().SetHex(test.expected).Normalize() expected := new(fieldVal).SetHex(test.expected).Normalize()
result := f.Inverse().Normalize() result := f.Inverse().Normalize()
if !result.Equals(expected) { if !result.Equals(expected) {
t.Errorf("fieldVal.Inverse #%d wrong result\n"+ t.Errorf("fieldVal.Inverse #%d wrong result\n"+

View file

@ -1,82 +0,0 @@
// Copyright (c) 2013-2014 The btcsuite developers
// Use of this source code is governed by an ISC
// license that can be found in the LICENSE file.
package btcec
import (
"math/big"
)
const (
TstPubkeyUncompressed = pubkeyUncompressed
TstPubkeyCompressed = pubkeyCompressed
TstPubkeyHybrid = pubkeyHybrid
)
// TstRawInts allows the test package to get the integers from the internal
// field representation for ensuring correctness. It is only available during
// the tests.
func (f *fieldVal) TstRawInts() [10]uint32 {
return f.n
}
// TstSetRawInts allows the test package to directly set the integers used by
// the internal field representation. It is only available during the tests.
func (f *fieldVal) TstSetRawInts(raw [10]uint32) *fieldVal {
for i := 0; i < len(raw); i++ {
f.n[i] = raw[i]
}
return f
}
// TstFieldJacobianToBigAffine makes the internal fieldJacobianToBigAffine
// function available to the test package.
func (curve *KoblitzCurve) TstFieldJacobianToBigAffine(x, y, z *fieldVal) (*big.Int, *big.Int) {
return curve.fieldJacobianToBigAffine(x, y, z)
}
// TstIsJacobianOnCurve returns boolean if the point (x,y,z) is on the curve.
func (curve *KoblitzCurve) TstIsJacobianOnCurve(x, y, z *fieldVal) bool {
// Elliptic curve equation for secp256k1 is: y^2 = x^3 + 7
// In Jacobian coordinates, Y = y/z^3 and X = x/z^2
// Thus:
// (y/z^3)^2 = (x/z^2)^3 + 7
// y^2/z^6 = x^3/z^6 + 7
// y^2 = x^3 + 7*z^6
var y2, z2, x3, result fieldVal
y2.SquareVal(y).Normalize()
z2.SquareVal(z)
x3.SquareVal(x).Mul(x)
result.SquareVal(&z2).Mul(&z2).MulInt(7).Add(&x3).Normalize()
return y2.Equals(&result)
}
// TstAddJacobian makes the internal addJacobian function available to the test
// package.
func (curve *KoblitzCurve) TstAddJacobian(x1, y1, z1, x2, y2, z2, x3, y3, z3 *fieldVal) {
curve.addJacobian(x1, y1, z1, x2, y2, z2, x3, y3, z3)
}
// TstDoubleJacobian makes the internal doubleJacobian function available to the test
// package.
func (curve *KoblitzCurve) TstDoubleJacobian(x1, y1, z1, x3, y3, z3 *fieldVal) {
curve.doubleJacobian(x1, y1, z1, x3, y3, z3)
}
// NewFieldVal returns a new field value set to 0. This is only available to
// the test package.
func NewFieldVal() *fieldVal {
return new(fieldVal)
}
// TstNonceRFC6979 makes the nonceRFC6979 function available to the test package.
func TstNonceRFC6979(privkey *big.Int, hash []byte) *big.Int {
return nonceRFC6979(privkey, hash)
}
// TstRemovePKCSPadding makes the internal removePKCSPadding function available
// to the test package.
func TstRemovePKCSPadding(src []byte) ([]byte, error) {
return removePKCSPadding(src)
}

View file

@ -1,14 +1,12 @@
// Copyright (c) 2013-2014 The btcsuite developers // Copyright (c) 2013-2016 The btcsuite developers
// Use of this source code is governed by an ISC // Use of this source code is governed by an ISC
// license that can be found in the LICENSE file. // license that can be found in the LICENSE file.
package btcec_test package btcec
import ( import (
"bytes" "bytes"
"testing" "testing"
"github.com/btcsuite/btcd/btcec"
) )
func TestPrivKeys(t *testing.T) { func TestPrivKeys(t *testing.T) {
@ -28,10 +26,9 @@ func TestPrivKeys(t *testing.T) {
} }
for _, test := range tests { for _, test := range tests {
priv, pub := btcec.PrivKeyFromBytes(btcec.S256(), test.key) priv, pub := PrivKeyFromBytes(S256(), test.key)
_, err := btcec.ParsePubKey( _, err := ParsePubKey(pub.SerializeUncompressed(), S256())
pub.SerializeUncompressed(), btcec.S256())
if err != nil { if err != nil {
t.Errorf("%s privkey: %v", test.name, err) t.Errorf("%s privkey: %v", test.name, err)
continue continue

View file

@ -1,14 +1,13 @@
// Copyright (c) 2013-2014 The btcsuite developers // Copyright (c) 2013-2016 The btcsuite developers
// Use of this source code is governed by an ISC // Use of this source code is governed by an ISC
// license that can be found in the LICENSE file. // license that can be found in the LICENSE file.
package btcec_test package btcec
import ( import (
"bytes" "bytes"
"testing" "testing"
"github.com/btcsuite/btcd/btcec"
"github.com/davecgh/go-spew/spew" "github.com/davecgh/go-spew/spew"
) )
@ -34,7 +33,7 @@ var pubKeyTests = []pubKeyTest{
0xb4, 0x12, 0xa3, 0xb4, 0x12, 0xa3,
}, },
isValid: true, isValid: true,
format: btcec.TstPubkeyUncompressed, format: pubkeyUncompressed,
}, },
{ {
name: "uncompressed x changed", name: "uncompressed x changed",
@ -87,7 +86,7 @@ var pubKeyTests = []pubKeyTest{
0xb4, 0x12, 0xa3, 0xb4, 0x12, 0xa3,
}, },
isValid: true, isValid: true,
format: btcec.TstPubkeyHybrid, format: pubkeyHybrid,
}, },
{ {
name: "uncompressed as hybrid wrong", name: "uncompressed as hybrid wrong",
@ -111,7 +110,7 @@ var pubKeyTests = []pubKeyTest{
0xa9, 0xa1, 0xf4, 0x80, 0x9d, 0x3b, 0x4d, 0xa9, 0xa1, 0xf4, 0x80, 0x9d, 0x3b, 0x4d,
}, },
isValid: true, isValid: true,
format: btcec.TstPubkeyCompressed, format: pubkeyCompressed,
}, },
// from tx fdeb8e72524e8dab0da507ddbaf5f88fe4a933eb10a66bc4745bb0aa11ea393c // from tx fdeb8e72524e8dab0da507ddbaf5f88fe4a933eb10a66bc4745bb0aa11ea393c
{ {
@ -122,7 +121,7 @@ var pubKeyTests = []pubKeyTest{
0x7f, 0x5b, 0x2a, 0x4b, 0x7d, 0x44, 0x8e, 0x7f, 0x5b, 0x2a, 0x4b, 0x7d, 0x44, 0x8e,
}, },
isValid: true, isValid: true,
format: btcec.TstPubkeyCompressed, format: pubkeyCompressed,
}, },
{ {
name: "compressed claims uncompressed (ybit = 0)", name: "compressed claims uncompressed (ybit = 0)",
@ -210,14 +209,14 @@ var pubKeyTests = []pubKeyTest{
0xa6, 0x85, 0x54, 0x19, 0x9c, 0x47, 0xd0, 0x8f, 0xfb, 0xa6, 0x85, 0x54, 0x19, 0x9c, 0x47, 0xd0, 0x8f, 0xfb,
0x10, 0xd4, 0xb8, 0x10, 0xd4, 0xb8,
}, },
format: btcec.TstPubkeyHybrid, format: pubkeyHybrid,
isValid: true, isValid: true,
}, },
} }
func TestPubKeys(t *testing.T) { func TestPubKeys(t *testing.T) {
for _, test := range pubKeyTests { for _, test := range pubKeyTests {
pk, err := btcec.ParsePubKey(test.key, btcec.S256()) pk, err := ParsePubKey(test.key, S256())
if err != nil { if err != nil {
if test.isValid { if test.isValid {
t.Errorf("%s pubkey failed when shouldn't %v", t.Errorf("%s pubkey failed when shouldn't %v",
@ -232,12 +231,12 @@ func TestPubKeys(t *testing.T) {
} }
var pkStr []byte var pkStr []byte
switch test.format { switch test.format {
case btcec.TstPubkeyUncompressed: case pubkeyUncompressed:
pkStr = (*btcec.PublicKey)(pk).SerializeUncompressed() pkStr = (*PublicKey)(pk).SerializeUncompressed()
case btcec.TstPubkeyCompressed: case pubkeyCompressed:
pkStr = (*btcec.PublicKey)(pk).SerializeCompressed() pkStr = (*PublicKey)(pk).SerializeCompressed()
case btcec.TstPubkeyHybrid: case pubkeyHybrid:
pkStr = (*btcec.PublicKey)(pk).SerializeHybrid() pkStr = (*PublicKey)(pk).SerializeHybrid()
} }
if !bytes.Equal(test.key, pkStr) { if !bytes.Equal(test.key, pkStr) {
t.Errorf("%s pubkey: serialized keys do not match.", t.Errorf("%s pubkey: serialized keys do not match.",
@ -249,25 +248,25 @@ func TestPubKeys(t *testing.T) {
} }
func TestPublicKeyIsEqual(t *testing.T) { func TestPublicKeyIsEqual(t *testing.T) {
pubKey1, err := btcec.ParsePubKey( pubKey1, err := ParsePubKey(
[]byte{0x03, 0x26, 0x89, 0xc7, 0xc2, 0xda, 0xb1, 0x33, []byte{0x03, 0x26, 0x89, 0xc7, 0xc2, 0xda, 0xb1, 0x33,
0x09, 0xfb, 0x14, 0x3e, 0x0e, 0x8f, 0xe3, 0x96, 0x34, 0x09, 0xfb, 0x14, 0x3e, 0x0e, 0x8f, 0xe3, 0x96, 0x34,
0x25, 0x21, 0x88, 0x7e, 0x97, 0x66, 0x90, 0xb6, 0xb4, 0x25, 0x21, 0x88, 0x7e, 0x97, 0x66, 0x90, 0xb6, 0xb4,
0x7f, 0x5b, 0x2a, 0x4b, 0x7d, 0x44, 0x8e, 0x7f, 0x5b, 0x2a, 0x4b, 0x7d, 0x44, 0x8e,
}, },
btcec.S256(), S256(),
) )
if err != nil { if err != nil {
t.Fatalf("failed to parse raw bytes for pubKey1: %v", err) t.Fatalf("failed to parse raw bytes for pubKey1: %v", err)
} }
pubKey2, err := btcec.ParsePubKey( pubKey2, err := ParsePubKey(
[]byte{0x02, 0xce, 0x0b, 0x14, 0xfb, 0x84, 0x2b, 0x1b, []byte{0x02, 0xce, 0x0b, 0x14, 0xfb, 0x84, 0x2b, 0x1b,
0xa5, 0x49, 0xfd, 0xd6, 0x75, 0xc9, 0x80, 0x75, 0xf1, 0xa5, 0x49, 0xfd, 0xd6, 0x75, 0xc9, 0x80, 0x75, 0xf1,
0x2e, 0x9c, 0x51, 0x0f, 0x8e, 0xf5, 0x2b, 0xd0, 0x21, 0x2e, 0x9c, 0x51, 0x0f, 0x8e, 0xf5, 0x2b, 0xd0, 0x21,
0xa9, 0xa1, 0xf4, 0x80, 0x9d, 0x3b, 0x4d, 0xa9, 0xa1, 0xf4, 0x80, 0x9d, 0x3b, 0x4d,
}, },
btcec.S256(), S256(),
) )
if err != nil { if err != nil {
t.Fatalf("failed to parse raw bytes for pubKey2: %v", err) t.Fatalf("failed to parse raw bytes for pubKey2: %v", err)

View file

@ -1,8 +1,8 @@
// Copyright (c) 2013-2014 The btcsuite developers // Copyright (c) 2013-2016 The btcsuite developers
// Use of this source code is governed by an ISC // Use of this source code is governed by an ISC
// license that can be found in the LICENSE file. // license that can be found in the LICENSE file.
package btcec_test package btcec
import ( import (
"bytes" "bytes"
@ -12,7 +12,6 @@ import (
"math/big" "math/big"
"testing" "testing"
"github.com/btcsuite/btcd/btcec"
"github.com/btcsuite/fastsha256" "github.com/btcsuite/fastsha256"
) )
@ -332,9 +331,9 @@ func TestSignatures(t *testing.T) {
for _, test := range signatureTests { for _, test := range signatureTests {
var err error var err error
if test.der { if test.der {
_, err = btcec.ParseDERSignature(test.sig, btcec.S256()) _, err = ParseDERSignature(test.sig, S256())
} else { } else {
_, err = btcec.ParseSignature(test.sig, btcec.S256()) _, err = ParseSignature(test.sig, S256())
} }
if err != nil { if err != nil {
if test.isValid { if test.isValid {
@ -356,14 +355,14 @@ func TestSignatures(t *testing.T) {
func TestSignatureSerialize(t *testing.T) { func TestSignatureSerialize(t *testing.T) {
tests := []struct { tests := []struct {
name string name string
ecsig *btcec.Signature ecsig *Signature
expected []byte expected []byte
}{ }{
// signature from bitcoin blockchain tx // signature from bitcoin blockchain tx
// 0437cd7f8525ceed2324359c2d0ba26006d92d85 // 0437cd7f8525ceed2324359c2d0ba26006d92d85
{ {
"valid 1 - r and s most significant bits are zero", "valid 1 - r and s most significant bits are zero",
&btcec.Signature{ &Signature{
R: fromHex("4e45e16932b8af514961a1d3a1a25fdf3f4f7732e9d624c6c61548ab5fb8cd41"), R: fromHex("4e45e16932b8af514961a1d3a1a25fdf3f4f7732e9d624c6c61548ab5fb8cd41"),
S: fromHex("181522ec8eca07de4860a4acdd12909d831cc56cbbac4622082221a8768d1d09"), S: fromHex("181522ec8eca07de4860a4acdd12909d831cc56cbbac4622082221a8768d1d09"),
}, },
@ -383,7 +382,7 @@ func TestSignatureSerialize(t *testing.T) {
// cb00f8a0573b18faa8c4f467b049f5d202bf1101d9ef2633bc611be70376a4b4 // cb00f8a0573b18faa8c4f467b049f5d202bf1101d9ef2633bc611be70376a4b4
{ {
"valid 2 - r most significant bit is one", "valid 2 - r most significant bit is one",
&btcec.Signature{ &Signature{
R: fromHex("0082235e21a2300022738dabb8e1bbd9d19cfb1e7ab8c30a23b0afbb8d178abcf3"), R: fromHex("0082235e21a2300022738dabb8e1bbd9d19cfb1e7ab8c30a23b0afbb8d178abcf3"),
S: fromHex("24bf68e256c534ddfaf966bf908deb944305596f7bdcc38d69acad7f9c868724"), S: fromHex("24bf68e256c534ddfaf966bf908deb944305596f7bdcc38d69acad7f9c868724"),
}, },
@ -403,9 +402,9 @@ func TestSignatureSerialize(t *testing.T) {
// fda204502a3345e08afd6af27377c052e77f1fefeaeb31bdd45f1e1237ca5470 // fda204502a3345e08afd6af27377c052e77f1fefeaeb31bdd45f1e1237ca5470
{ {
"valid 3 - s most significant bit is one", "valid 3 - s most significant bit is one",
&btcec.Signature{ &Signature{
R: fromHex("1cadddc2838598fee7dc35a12b340c6bde8b389f7bfd19a1252a17c4b5ed2d71"), R: fromHex("1cadddc2838598fee7dc35a12b340c6bde8b389f7bfd19a1252a17c4b5ed2d71"),
S: new(big.Int).Add(fromHex("00c1a251bbecb14b058a8bd77f65de87e51c47e95904f4c0e9d52eddc21c1415ac"), btcec.S256().N), S: new(big.Int).Add(fromHex("00c1a251bbecb14b058a8bd77f65de87e51c47e95904f4c0e9d52eddc21c1415ac"), S256().N),
}, },
[]byte{ []byte{
0x30, 0x45, 0x02, 0x20, 0x1c, 0xad, 0xdd, 0xc2, 0x30, 0x45, 0x02, 0x20, 0x1c, 0xad, 0xdd, 0xc2,
@ -421,7 +420,7 @@ func TestSignatureSerialize(t *testing.T) {
}, },
{ {
"zero signature", "zero signature",
&btcec.Signature{ &Signature{
R: big.NewInt(0), R: big.NewInt(0),
S: big.NewInt(0), S: big.NewInt(0),
}, },
@ -439,19 +438,19 @@ func TestSignatureSerialize(t *testing.T) {
} }
} }
func testSignCompact(t *testing.T, tag string, curve *btcec.KoblitzCurve, func testSignCompact(t *testing.T, tag string, curve *KoblitzCurve,
data []byte, isCompressed bool) { data []byte, isCompressed bool) {
tmp, _ := btcec.NewPrivateKey(curve) tmp, _ := NewPrivateKey(curve)
priv := (*btcec.PrivateKey)(tmp) priv := (*PrivateKey)(tmp)
hashed := []byte("testing") hashed := []byte("testing")
sig, err := btcec.SignCompact(curve, priv, hashed, isCompressed) sig, err := SignCompact(curve, priv, hashed, isCompressed)
if err != nil { if err != nil {
t.Errorf("%s: error signing: %s", tag, err) t.Errorf("%s: error signing: %s", tag, err)
return return
} }
pk, wasCompressed, err := btcec.RecoverCompact(curve, sig, hashed) pk, wasCompressed, err := RecoverCompact(curve, sig, hashed)
if err != nil { if err != nil {
t.Errorf("%s: error recovering: %s", tag, err) t.Errorf("%s: error recovering: %s", tag, err)
return return
@ -475,7 +474,7 @@ func testSignCompact(t *testing.T, tag string, curve *btcec.KoblitzCurve,
sig[0] += 4 sig[0] += 4
} }
pk, wasCompressed, err = btcec.RecoverCompact(curve, sig, hashed) pk, wasCompressed, err = RecoverCompact(curve, sig, hashed)
if err != nil { if err != nil {
t.Errorf("%s: error recovering (2): %s", tag, err) t.Errorf("%s: error recovering (2): %s", tag, err)
return return
@ -503,7 +502,7 @@ func TestSignCompact(t *testing.T) {
continue continue
} }
compressed := i%2 != 0 compressed := i%2 != 0
testSignCompact(t, name, btcec.S256(), data, compressed) testSignCompact(t, name, S256(), data, compressed)
} }
} }
@ -558,11 +557,11 @@ func TestRFC6979(t *testing.T) {
} }
for i, test := range tests { for i, test := range tests {
privKey, _ := btcec.PrivKeyFromBytes(btcec.S256(), decodeHex(test.key)) privKey, _ := PrivKeyFromBytes(S256(), decodeHex(test.key))
hash := fastsha256.Sum256([]byte(test.msg)) hash := fastsha256.Sum256([]byte(test.msg))
// Ensure deterministically generated nonce is the expected value. // Ensure deterministically generated nonce is the expected value.
gotNonce := btcec.TstNonceRFC6979(privKey.D, hash[:]).Bytes() gotNonce := nonceRFC6979(privKey.D, hash[:]).Bytes()
wantNonce := decodeHex(test.nonce) wantNonce := decodeHex(test.nonce)
if !bytes.Equal(gotNonce, wantNonce) { if !bytes.Equal(gotNonce, wantNonce) {
t.Errorf("NonceRFC6979 #%d (%s): Nonce is incorrect: "+ t.Errorf("NonceRFC6979 #%d (%s): Nonce is incorrect: "+
@ -590,11 +589,11 @@ func TestRFC6979(t *testing.T) {
} }
func TestSignatureIsEqual(t *testing.T) { func TestSignatureIsEqual(t *testing.T) {
sig1 := &btcec.Signature{ sig1 := &Signature{
R: fromHex("0082235e21a2300022738dabb8e1bbd9d19cfb1e7ab8c30a23b0afbb8d178abcf3"), R: fromHex("0082235e21a2300022738dabb8e1bbd9d19cfb1e7ab8c30a23b0afbb8d178abcf3"),
S: fromHex("24bf68e256c534ddfaf966bf908deb944305596f7bdcc38d69acad7f9c868724"), S: fromHex("24bf68e256c534ddfaf966bf908deb944305596f7bdcc38d69acad7f9c868724"),
} }
sig2 := &btcec.Signature{ sig2 := &Signature{
R: fromHex("4e45e16932b8af514961a1d3a1a25fdf3f4f7732e9d624c6c61548ab5fb8cd41"), R: fromHex("4e45e16932b8af514961a1d3a1a25fdf3f4f7732e9d624c6c61548ab5fb8cd41"),
S: fromHex("181522ec8eca07de4860a4acdd12909d831cc56cbbac4622082221a8768d1d09"), S: fromHex("181522ec8eca07de4860a4acdd12909d831cc56cbbac4622082221a8768d1d09"),
} }

View file

@ -10,7 +10,7 @@ set -ex
# Automatic checks # Automatic checks
test -z "$(go fmt $(glide novendor) | tee /dev/stderr)" test -z "$(go fmt $(glide novendor) | tee /dev/stderr)"
test -z "$(for package in $(glide novendor); do golint $package; done | grep -v 'ALL_CAPS\|OP_\|NewFieldVal' | tee /dev/stderr)" test -z "$(for package in $(glide novendor); do golint $package; done | grep -v 'ALL_CAPS\|OP_' | tee /dev/stderr)"
test -z "$(go vet $(glide novendor) 2>&1 | tee /dev/stderr)" test -z "$(go vet $(glide novendor) 2>&1 | tee /dev/stderr)"
env GORACE="halt_on_error=1" go test -v -race -tags rpctest $(glide novendor) env GORACE="halt_on_error=1" go test -v -race -tags rpctest $(glide novendor)