github.com/theQRL/go-zond@v0.1.1/crypto/crypto_test.go (about) 1 // Copyright 2014 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package crypto 18 19 import ( 20 "bytes" 21 "crypto/ecdsa" 22 "encoding/hex" 23 "math/big" 24 "os" 25 "reflect" 26 "testing" 27 28 "github.com/theQRL/go-zond/common" 29 "github.com/theQRL/go-zond/common/hexutil" 30 ) 31 32 var testAddrHex = "970e8128ab834e8eac17ab8e3812f010678cf791" 33 var testPrivHex = "289c2857d4598e37fb9647507e47a309d6133539bf21a8b9cb6df88fd5232032" 34 35 // These tests are sanity checks. 36 // They should ensure that we don't e.g. use Sha3-224 instead of Sha3-256 37 // and that the sha3 library uses keccak-f permutation. 38 func TestKeccak256Hash(t *testing.T) { 39 msg := []byte("abc") 40 exp, _ := hex.DecodeString("4e03657aea45a94fc7d47ba826c8d667c0d1e6e33a64a036ec44f58fa12d6c45") 41 checkhash(t, "Sha3-256-array", func(in []byte) []byte { h := Keccak256Hash(in); return h[:] }, msg, exp) 42 } 43 44 func TestKeccak256Hasher(t *testing.T) { 45 msg := []byte("abc") 46 exp, _ := hex.DecodeString("4e03657aea45a94fc7d47ba826c8d667c0d1e6e33a64a036ec44f58fa12d6c45") 47 hasher := NewKeccakState() 48 checkhash(t, "Sha3-256-array", func(in []byte) []byte { h := HashData(hasher, in); return h[:] }, msg, exp) 49 } 50 51 func TestToECDSAErrors(t *testing.T) { 52 if _, err := HexToECDSA("0000000000000000000000000000000000000000000000000000000000000000"); err == nil { 53 t.Fatal("HexToECDSA should've returned error") 54 } 55 if _, err := HexToECDSA("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"); err == nil { 56 t.Fatal("HexToECDSA should've returned error") 57 } 58 } 59 60 func BenchmarkSha3(b *testing.B) { 61 a := []byte("hello world") 62 for i := 0; i < b.N; i++ { 63 Keccak256(a) 64 } 65 } 66 67 func TestUnmarshalPubkey(t *testing.T) { 68 key, err := UnmarshalPubkey(nil) 69 if err != errInvalidPubkey || key != nil { 70 t.Fatalf("expected error, got %v, %v", err, key) 71 } 72 key, err = UnmarshalPubkey([]byte{1, 2, 3}) 73 if err != errInvalidPubkey || key != nil { 74 t.Fatalf("expected error, got %v, %v", err, key) 75 } 76 77 var ( 78 enc, _ = hex.DecodeString("04760c4460e5336ac9bbd87952a3c7ec4363fc0a97bd31c86430806e287b437fd1b01abc6e1db640cf3106b520344af1d58b00b57823db3e1407cbc433e1b6d04d") 79 dec = &ecdsa.PublicKey{ 80 Curve: S256(), 81 X: hexutil.MustDecodeBig("0x760c4460e5336ac9bbd87952a3c7ec4363fc0a97bd31c86430806e287b437fd1"), 82 Y: hexutil.MustDecodeBig("0xb01abc6e1db640cf3106b520344af1d58b00b57823db3e1407cbc433e1b6d04d"), 83 } 84 ) 85 key, err = UnmarshalPubkey(enc) 86 if err != nil { 87 t.Fatalf("expected no error, got %v", err) 88 } 89 if !reflect.DeepEqual(key, dec) { 90 t.Fatal("wrong result") 91 } 92 } 93 94 func TestSign(t *testing.T) { 95 key, _ := HexToECDSA(testPrivHex) 96 addr := common.HexToAddress(testAddrHex) 97 98 msg := Keccak256([]byte("foo")) 99 sig, err := Sign(msg, key) 100 if err != nil { 101 t.Errorf("Sign error: %s", err) 102 } 103 recoveredPub, err := Ecrecover(msg, sig) 104 if err != nil { 105 t.Errorf("ECRecover error: %s", err) 106 } 107 pubKey, _ := UnmarshalPubkey(recoveredPub) 108 recoveredAddr := PubkeyToAddress(*pubKey) 109 if addr != recoveredAddr { 110 t.Errorf("Address mismatch: want: %x have: %x", addr, recoveredAddr) 111 } 112 113 // should be equal to SigToPub 114 recoveredPub2, err := SigToPub(msg, sig) 115 if err != nil { 116 t.Errorf("ECRecover error: %s", err) 117 } 118 recoveredAddr2 := PubkeyToAddress(*recoveredPub2) 119 if addr != recoveredAddr2 { 120 t.Errorf("Address mismatch: want: %x have: %x", addr, recoveredAddr2) 121 } 122 } 123 124 func TestInvalidSign(t *testing.T) { 125 if _, err := Sign(make([]byte, 1), nil); err == nil { 126 t.Errorf("expected sign with hash 1 byte to error") 127 } 128 if _, err := Sign(make([]byte, 33), nil); err == nil { 129 t.Errorf("expected sign with hash 33 byte to error") 130 } 131 } 132 133 func TestNewContractAddress(t *testing.T) { 134 key, _ := HexToECDSA(testPrivHex) 135 addr := common.HexToAddress(testAddrHex) 136 genAddr := PubkeyToAddress(key.PublicKey) 137 // sanity check before using addr to create contract address 138 checkAddr(t, genAddr, addr) 139 140 caddr0 := CreateAddress(addr, 0) 141 caddr1 := CreateAddress(addr, 1) 142 caddr2 := CreateAddress(addr, 2) 143 checkAddr(t, common.HexToAddress("333c3310824b7c685133f2bedb2ca4b8b4df633d"), caddr0) 144 checkAddr(t, common.HexToAddress("8bda78331c916a08481428e4b07c96d3e916d165"), caddr1) 145 checkAddr(t, common.HexToAddress("c9ddedf451bc62ce88bf9292afb13df35b670699"), caddr2) 146 } 147 148 func TestLoadECDSA(t *testing.T) { 149 tests := []struct { 150 input string 151 err string 152 }{ 153 // good 154 {input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"}, 155 {input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n"}, 156 {input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n\r"}, 157 {input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\r\n"}, 158 {input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n\n"}, 159 {input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n\r"}, 160 // bad 161 { 162 input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcde", 163 err: "key file too short, want 64 hex characters", 164 }, 165 { 166 input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcde\n", 167 err: "key file too short, want 64 hex characters", 168 }, 169 { 170 input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdeX", 171 err: "invalid hex character 'X' in private key", 172 }, 173 { 174 input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdefX", 175 err: "invalid character 'X' at end of key file", 176 }, 177 { 178 input: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n\n\n", 179 err: "key file too long, want 64 hex characters", 180 }, 181 } 182 183 for _, test := range tests { 184 f, err := os.CreateTemp("", "loadecdsa_test.*.txt") 185 if err != nil { 186 t.Fatal(err) 187 } 188 filename := f.Name() 189 f.WriteString(test.input) 190 f.Close() 191 192 _, err = LoadECDSA(filename) 193 switch { 194 case err != nil && test.err == "": 195 t.Fatalf("unexpected error for input %q:\n %v", test.input, err) 196 case err != nil && err.Error() != test.err: 197 t.Fatalf("wrong error for input %q:\n %v", test.input, err) 198 case err == nil && test.err != "": 199 t.Fatalf("LoadECDSA did not return error for input %q", test.input) 200 } 201 } 202 } 203 204 func TestSaveECDSA(t *testing.T) { 205 f, err := os.CreateTemp("", "saveecdsa_test.*.txt") 206 if err != nil { 207 t.Fatal(err) 208 } 209 file := f.Name() 210 f.Close() 211 defer os.Remove(file) 212 213 key, _ := HexToECDSA(testPrivHex) 214 if err := SaveECDSA(file, key); err != nil { 215 t.Fatal(err) 216 } 217 loaded, err := LoadECDSA(file) 218 if err != nil { 219 t.Fatal(err) 220 } 221 if !reflect.DeepEqual(key, loaded) { 222 t.Fatal("loaded key not equal to saved key") 223 } 224 } 225 226 func TestValidateSignatureValues(t *testing.T) { 227 check := func(expected bool, v byte, r, s *big.Int) { 228 if ValidateSignatureValues(v, r, s, false) != expected { 229 t.Errorf("mismatch for v: %d r: %d s: %d want: %v", v, r, s, expected) 230 } 231 } 232 minusOne := big.NewInt(-1) 233 one := common.Big1 234 zero := common.Big0 235 secp256k1nMinus1 := new(big.Int).Sub(secp256k1N, common.Big1) 236 237 // correct v,r,s 238 check(true, 0, one, one) 239 check(true, 1, one, one) 240 // incorrect v, correct r,s, 241 check(false, 2, one, one) 242 check(false, 3, one, one) 243 244 // incorrect v, combinations of incorrect/correct r,s at lower limit 245 check(false, 2, zero, zero) 246 check(false, 2, zero, one) 247 check(false, 2, one, zero) 248 check(false, 2, one, one) 249 250 // correct v for any combination of incorrect r,s 251 check(false, 0, zero, zero) 252 check(false, 0, zero, one) 253 check(false, 0, one, zero) 254 255 check(false, 1, zero, zero) 256 check(false, 1, zero, one) 257 check(false, 1, one, zero) 258 259 // correct sig with max r,s 260 check(true, 0, secp256k1nMinus1, secp256k1nMinus1) 261 // correct v, combinations of incorrect r,s at upper limit 262 check(false, 0, secp256k1N, secp256k1nMinus1) 263 check(false, 0, secp256k1nMinus1, secp256k1N) 264 check(false, 0, secp256k1N, secp256k1N) 265 266 // current callers ensures r,s cannot be negative, but let's test for that too 267 // as crypto package could be used stand-alone 268 check(false, 0, minusOne, one) 269 check(false, 0, one, minusOne) 270 } 271 272 func checkhash(t *testing.T, name string, f func([]byte) []byte, msg, exp []byte) { 273 sum := f(msg) 274 if !bytes.Equal(exp, sum) { 275 t.Fatalf("hash %s mismatch: want: %x have: %x", name, exp, sum) 276 } 277 } 278 279 func checkAddr(t *testing.T, addr0, addr1 common.Address) { 280 if addr0 != addr1 { 281 t.Fatalf("address mismatch: want: %x have: %x", addr0, addr1) 282 } 283 } 284 285 // test to help Python team with integration of libsecp256k1 286 // skip but keep it after they are done 287 func TestPythonIntegration(t *testing.T) { 288 kh := "289c2857d4598e37fb9647507e47a309d6133539bf21a8b9cb6df88fd5232032" 289 k0, _ := HexToECDSA(kh) 290 291 msg0 := Keccak256([]byte("foo")) 292 sig0, _ := Sign(msg0, k0) 293 294 msg1 := common.FromHex("00000000000000000000000000000000") 295 sig1, _ := Sign(msg0, k0) 296 297 t.Logf("msg: %x, privkey: %s sig: %x\n", msg0, kh, sig0) 298 t.Logf("msg: %x, privkey: %s sig: %x\n", msg1, kh, sig1) 299 }