|
|
- package secp256k1
-
- import (
- "bytes"
- "math/big"
- "testing"
-
- "github.com/stretchr/testify/require"
-
- secp256k1 "github.com/btcsuite/btcd/btcec"
- )
-
- func Test_genPrivKey(t *testing.T) {
-
- empty := make([]byte, 32)
- oneB := big.NewInt(1).Bytes()
- onePadded := make([]byte, 32)
- copy(onePadded[32-len(oneB):32], oneB)
- t.Logf("one padded: %v, len=%v", onePadded, len(onePadded))
-
- validOne := append(empty, onePadded...)
- tests := []struct {
- name string
- notSoRand []byte
- shouldPanic bool
- }{
- {"empty bytes (panics because 1st 32 bytes are zero and 0 is not a valid field element)", empty, true},
- {"curve order: N", secp256k1.S256().N.Bytes(), true},
- {"valid because 0 < 1 < N", validOne, false},
- }
- for _, tt := range tests {
- tt := tt
- t.Run(tt.name, func(t *testing.T) {
- if tt.shouldPanic {
- require.Panics(t, func() {
- genPrivKey(bytes.NewReader(tt.notSoRand))
- })
- return
- }
- got := genPrivKey(bytes.NewReader(tt.notSoRand))
- fe := new(big.Int).SetBytes(got[:])
- require.True(t, fe.Cmp(secp256k1.S256().N) < 0)
- require.True(t, fe.Sign() > 0)
- })
- }
- }
-
- // Ensure that signature verification works, and that
- // non-canonical signatures fail.
- // Note: run with CGO_ENABLED=0 or go test -tags !cgo.
- func TestSignatureVerificationAndRejectUpperS(t *testing.T) {
- msg := []byte("We have lingered long enough on the shores of the cosmic ocean.")
- for i := 0; i < 500; i++ {
- priv := GenPrivKey()
- sigStr, err := priv.Sign(msg)
- require.NoError(t, err)
- sig := signatureFromBytes(sigStr)
- require.False(t, sig.S.Cmp(secp256k1halfN) > 0)
-
- pub := priv.PubKey()
- require.True(t, pub.VerifySignature(msg, sigStr))
-
- // malleate:
- sig.S.Sub(secp256k1.S256().CurveParams.N, sig.S)
- require.True(t, sig.S.Cmp(secp256k1halfN) > 0)
- malSigStr := serializeSig(sig)
-
- require.False(t, pub.VerifySignature(msg, malSigStr),
- "VerifyBytes incorrect with malleated & invalid S. sig=%v, key=%v",
- sig,
- priv,
- )
- }
- }
|