123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222 |
- // Copyright 2014 The go-ethereum Authors
- // This file is part of the go-ethereum library.
- //
- // The go-ethereum library is free software: you can redistribute it and/or modify
- // it under the terms of the GNU Lesser General Public License as published by
- // the Free Software Foundation, either version 3 of the License, or
- // (at your option) any later version.
- //
- // The go-ethereum library is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU Lesser General Public License for more details.
- //
- // You should have received a copy of the GNU Lesser General Public License
- // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
- package crypto
- import (
- "bytes"
- "crypto/ecdsa"
- "encoding/hex"
- "io/ioutil"
- "math/big"
- "os"
- "testing"
- "github.com/ethereum/go-ethereum/common"
- )
- var testAddrHex = "970e8128ab834e8eac17ab8e3812f010678cf791"
- var testPrivHex = "289c2857d4598e37fb9647507e47a309d6133539bf21a8b9cb6df88fd5232032"
- // These tests are sanity checks.
- // They should ensure that we don't e.g. use Sha3-224 instead of Sha3-256
- // and that the sha3 library uses keccak-f permutation.
- func TestKeccak256Hash(t *testing.T) {
- msg := []byte("abc")
- exp, _ := hex.DecodeString("4e03657aea45a94fc7d47ba826c8d667c0d1e6e33a64a036ec44f58fa12d6c45")
- checkhash(t, "Sha3-256-array", func(in []byte) []byte { h := Keccak256Hash(in); return h[:] }, msg, exp)
- }
- func TestToECDSAErrors(t *testing.T) {
- if _, err := HexToECDSA("0000000000000000000000000000000000000000000000000000000000000000"); err == nil {
- t.Fatal("HexToECDSA should've returned error")
- }
- if _, err := HexToECDSA("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"); err == nil {
- t.Fatal("HexToECDSA should've returned error")
- }
- }
- func BenchmarkSha3(b *testing.B) {
- a := []byte("hello world")
- for i := 0; i < b.N; i++ {
- Keccak256(a)
- }
- }
- func TestSign(t *testing.T) {
- key, _ := HexToECDSA(testPrivHex)
- addr := common.HexToAddress(testAddrHex)
- msg := Keccak256([]byte("foo"))
- sig, err := Sign(msg, key)
- if err != nil {
- t.Errorf("Sign error: %s", err)
- }
- recoveredPub, err := Ecrecover(msg, sig)
- if err != nil {
- t.Errorf("ECRecover error: %s", err)
- }
- pubKey := ToECDSAPub(recoveredPub)
- recoveredAddr := PubkeyToAddress(*pubKey)
- if addr != recoveredAddr {
- t.Errorf("Address mismatch: want: %x have: %x", addr, recoveredAddr)
- }
- // should be equal to SigToPub
- recoveredPub2, err := SigToPub(msg, sig)
- if err != nil {
- t.Errorf("ECRecover error: %s", err)
- }
- recoveredAddr2 := PubkeyToAddress(*recoveredPub2)
- if addr != recoveredAddr2 {
- t.Errorf("Address mismatch: want: %x have: %x", addr, recoveredAddr2)
- }
- }
- func TestInvalidSign(t *testing.T) {
- if _, err := Sign(make([]byte, 1), nil); err == nil {
- t.Errorf("expected sign with hash 1 byte to error")
- }
- if _, err := Sign(make([]byte, 33), nil); err == nil {
- t.Errorf("expected sign with hash 33 byte to error")
- }
- }
- func TestNewContractAddress(t *testing.T) {
- key, _ := HexToECDSA(testPrivHex)
- addr := common.HexToAddress(testAddrHex)
- genAddr := PubkeyToAddress(key.PublicKey)
- // sanity check before using addr to create contract address
- checkAddr(t, genAddr, addr)
- caddr0 := CreateAddress(addr, 0)
- caddr1 := CreateAddress(addr, 1)
- caddr2 := CreateAddress(addr, 2)
- checkAddr(t, common.HexToAddress("333c3310824b7c685133f2bedb2ca4b8b4df633d"), caddr0)
- checkAddr(t, common.HexToAddress("8bda78331c916a08481428e4b07c96d3e916d165"), caddr1)
- checkAddr(t, common.HexToAddress("c9ddedf451bc62ce88bf9292afb13df35b670699"), caddr2)
- }
- func TestLoadECDSAFile(t *testing.T) {
- keyBytes := common.FromHex(testPrivHex)
- fileName0 := "test_key0"
- fileName1 := "test_key1"
- checkKey := func(k *ecdsa.PrivateKey) {
- checkAddr(t, PubkeyToAddress(k.PublicKey), common.HexToAddress(testAddrHex))
- loadedKeyBytes := FromECDSA(k)
- if !bytes.Equal(loadedKeyBytes, keyBytes) {
- t.Fatalf("private key mismatch: want: %x have: %x", keyBytes, loadedKeyBytes)
- }
- }
- ioutil.WriteFile(fileName0, []byte(testPrivHex), 0600)
- defer os.Remove(fileName0)
- key0, err := LoadECDSA(fileName0)
- if err != nil {
- t.Fatal(err)
- }
- checkKey(key0)
- // again, this time with SaveECDSA instead of manual save:
- err = SaveECDSA(fileName1, key0)
- if err != nil {
- t.Fatal(err)
- }
- defer os.Remove(fileName1)
- key1, err := LoadECDSA(fileName1)
- if err != nil {
- t.Fatal(err)
- }
- checkKey(key1)
- }
- func TestValidateSignatureValues(t *testing.T) {
- check := func(expected bool, v byte, r, s *big.Int) {
- if ValidateSignatureValues(v, r, s, false) != expected {
- t.Errorf("mismatch for v: %d r: %d s: %d want: %v", v, r, s, expected)
- }
- }
- minusOne := big.NewInt(-1)
- one := common.Big1
- zero := common.Big0
- secp256k1nMinus1 := new(big.Int).Sub(secp256k1N, common.Big1)
- // correct v,r,s
- check(true, 0, one, one)
- check(true, 1, one, one)
- // incorrect v, correct r,s,
- check(false, 2, one, one)
- check(false, 3, one, one)
- // incorrect v, combinations of incorrect/correct r,s at lower limit
- check(false, 2, zero, zero)
- check(false, 2, zero, one)
- check(false, 2, one, zero)
- check(false, 2, one, one)
- // correct v for any combination of incorrect r,s
- check(false, 0, zero, zero)
- check(false, 0, zero, one)
- check(false, 0, one, zero)
- check(false, 1, zero, zero)
- check(false, 1, zero, one)
- check(false, 1, one, zero)
- // correct sig with max r,s
- check(true, 0, secp256k1nMinus1, secp256k1nMinus1)
- // correct v, combinations of incorrect r,s at upper limit
- check(false, 0, secp256k1N, secp256k1nMinus1)
- check(false, 0, secp256k1nMinus1, secp256k1N)
- check(false, 0, secp256k1N, secp256k1N)
- // current callers ensures r,s cannot be negative, but let's test for that too
- // as crypto package could be used stand-alone
- check(false, 0, minusOne, one)
- check(false, 0, one, minusOne)
- }
- func checkhash(t *testing.T, name string, f func([]byte) []byte, msg, exp []byte) {
- sum := f(msg)
- if !bytes.Equal(exp, sum) {
- t.Fatalf("hash %s mismatch: want: %x have: %x", name, exp, sum)
- }
- }
- func checkAddr(t *testing.T, addr0, addr1 common.Address) {
- if addr0 != addr1 {
- t.Fatalf("address mismatch: want: %x have: %x", addr0, addr1)
- }
- }
- // test to help Python team with integration of libsecp256k1
- // skip but keep it after they are done
- func TestPythonIntegration(t *testing.T) {
- kh := "289c2857d4598e37fb9647507e47a309d6133539bf21a8b9cb6df88fd5232032"
- k0, _ := HexToECDSA(kh)
- msg0 := Keccak256([]byte("foo"))
- sig0, _ := Sign(msg0, k0)
- msg1 := common.FromHex("00000000000000000000000000000000")
- sig1, _ := Sign(msg0, k0)
- t.Logf("msg: %x, privkey: %s sig: %x\n", msg0, kh, sig0)
- t.Logf("msg: %x, privkey: %s sig: %x\n", msg1, kh, sig1)
- }
|