- package secp256k1
-
- import (
- "bytes"
- "math/big"
- "testing"
-
- "github.com/stretchr/testify/require"
-
- underlyingSecp256k1 "github.com/btcsuite/btcd/btcec"
- )
-
- func Test_genPrivKey(t *testing.T) {
-
- empty := make([]byte, 32)
- oneB := big.NewInt(1).Bytes()
- onePadded := make([]byte, 32)
- copy(onePadded[32-len(oneB):32], oneB)
- t.Logf("one padded: %v, len=%v", onePadded, len(onePadded))
-
- validOne := append(empty, onePadded...)
- tests := []struct {
- name string
- notSoRand []byte
- shouldPanic bool
- }{
- {"empty bytes (panics because 1st 32 bytes are zero and 0 is not a valid field element)", empty, true},
- {"curve order: N", underlyingSecp256k1.S256().N.Bytes(), true},
- {"valid because 0 < 1 < N", validOne, false},
- }
- for _, tt := range tests {
- tt := tt
- t.Run(tt.name, func(t *testing.T) {
- if tt.shouldPanic {
- require.Panics(t, func() {
- genPrivKey(bytes.NewReader(tt.notSoRand))
- })
- return
- }
- got := genPrivKey(bytes.NewReader(tt.notSoRand))
- fe := new(big.Int).SetBytes(got[:])
- require.True(t, fe.Cmp(underlyingSecp256k1.S256().N) < 0)
- require.True(t, fe.Sign() > 0)
- })
- }
- }
|