// Copyright 2014 The go-ethereum Authors // This file is part of the go-ethereum library. // // The go-ethereum library is free software: you can redistribute it and/or modify // it under the terms of the GNU Lesser General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // The go-ethereum library is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU Lesser General Public License // along with the go-ethereum library. If not, see . package crypto import ( "bytes" "crypto/ecdsa" "encoding/hex" "fmt" "io/ioutil" "math/big" "os" "testing" "time" "github.com/ethereum/go-ethereum/common" "github.com/ethereum/go-ethereum/crypto/secp256k1" ) var testAddrHex = "970e8128ab834e8eac17ab8e3812f010678cf791" var testPrivHex = "289c2857d4598e37fb9647507e47a309d6133539bf21a8b9cb6df88fd5232032" // These tests are sanity checks. // They should ensure that we don't e.g. use Sha3-224 instead of Sha3-256 // and that the sha3 library uses keccak-f permutation. func TestSha3(t *testing.T) { msg := []byte("abc") exp, _ := hex.DecodeString("4e03657aea45a94fc7d47ba826c8d667c0d1e6e33a64a036ec44f58fa12d6c45") checkhash(t, "Sha3-256", func(in []byte) []byte { return Keccak256(in) }, msg, exp) } func TestSha3Hash(t *testing.T) { msg := []byte("abc") exp, _ := hex.DecodeString("4e03657aea45a94fc7d47ba826c8d667c0d1e6e33a64a036ec44f58fa12d6c45") checkhash(t, "Sha3-256-array", func(in []byte) []byte { h := Keccak256Hash(in); return h[:] }, msg, exp) } func TestSha256(t *testing.T) { msg := []byte("abc") exp, _ := hex.DecodeString("ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad") checkhash(t, "Sha256", Sha256, msg, exp) } func TestRipemd160(t *testing.T) { msg := []byte("abc") exp, _ := hex.DecodeString("8eb208f7e05d987a9b044a8e98c6b087f15a0bfc") checkhash(t, "Ripemd160", Ripemd160, msg, exp) } func BenchmarkSha3(b *testing.B) { a := []byte("hello world") amount := 1000000 start := time.Now() for i := 0; i < amount; i++ { Keccak256(a) } fmt.Println(amount, ":", time.Since(start)) } func Test0Key(t *testing.T) { key := common.Hex2Bytes("0000000000000000000000000000000000000000000000000000000000000000") _, err := secp256k1.GeneratePubKey(key) if err == nil { t.Errorf("expected error due to zero privkey") } } func TestSign(t *testing.T) { key, _ := HexToECDSA(testPrivHex) addr := common.HexToAddress(testAddrHex) msg := Keccak256([]byte("foo")) sig, err := Sign(msg, key) if err != nil { t.Errorf("Sign error: %s", err) } recoveredPub, err := Ecrecover(msg, sig) if err != nil { t.Errorf("ECRecover error: %s", err) } recoveredAddr := PubkeyToAddress(*ToECDSAPub(recoveredPub)) if addr != recoveredAddr { t.Errorf("Address mismatch: want: %x have: %x", addr, recoveredAddr) } // should be equal to SigToPub recoveredPub2, err := SigToPub(msg, sig) if err != nil { t.Errorf("ECRecover error: %s", err) } recoveredAddr2 := PubkeyToAddress(*recoveredPub2) if addr != recoveredAddr2 { t.Errorf("Address mismatch: want: %x have: %x", addr, recoveredAddr2) } } func TestInvalidSign(t *testing.T) { _, err := Sign(make([]byte, 1), nil) if err == nil { t.Errorf("expected sign with hash 1 byte to error") } _, err = Sign(make([]byte, 33), nil) if err == nil { t.Errorf("expected sign with hash 33 byte to error") } } func TestNewContractAddress(t *testing.T) { key, _ := HexToECDSA(testPrivHex) addr := common.HexToAddress(testAddrHex) genAddr := PubkeyToAddress(key.PublicKey) // sanity check before using addr to create contract address checkAddr(t, genAddr, addr) caddr0 := CreateAddress(addr, 0) caddr1 := CreateAddress(addr, 1) caddr2 := CreateAddress(addr, 2) checkAddr(t, common.HexToAddress("333c3310824b7c685133f2bedb2ca4b8b4df633d"), caddr0) checkAddr(t, common.HexToAddress("8bda78331c916a08481428e4b07c96d3e916d165"), caddr1) checkAddr(t, common.HexToAddress("c9ddedf451bc62ce88bf9292afb13df35b670699"), caddr2) } func TestLoadECDSAFile(t *testing.T) { keyBytes := common.FromHex(testPrivHex) fileName0 := "test_key0" fileName1 := "test_key1" checkKey := func(k *ecdsa.PrivateKey) { checkAddr(t, PubkeyToAddress(k.PublicKey), common.HexToAddress(testAddrHex)) loadedKeyBytes := FromECDSA(k) if !bytes.Equal(loadedKeyBytes, keyBytes) { t.Fatalf("private key mismatch: want: %x have: %x", keyBytes, loadedKeyBytes) } } ioutil.WriteFile(fileName0, []byte(testPrivHex), 0600) defer os.Remove(fileName0) key0, err := LoadECDSA(fileName0) if err != nil { t.Fatal(err) } checkKey(key0) // again, this time with SaveECDSA instead of manual save: err = SaveECDSA(fileName1, key0) if err != nil { t.Fatal(err) } defer os.Remove(fileName1) key1, err := LoadECDSA(fileName1) if err != nil { t.Fatal(err) } checkKey(key1) } func TestValidateSignatureValues(t *testing.T) { check := func(expected bool, v byte, r, s *big.Int) { if ValidateSignatureValues(v, r, s, false) != expected { t.Errorf("mismatch for v: %d r: %d s: %d want: %v", v, r, s, expected) } } minusOne := big.NewInt(-1) one := common.Big1 zero := common.Big0 secp256k1nMinus1 := new(big.Int).Sub(secp256k1.N, common.Big1) // correct v,r,s check(true, 27, one, one) check(true, 28, one, one) // incorrect v, correct r,s, check(false, 30, one, one) check(false, 26, one, one) // incorrect v, combinations of incorrect/correct r,s at lower limit check(false, 0, zero, zero) check(false, 0, zero, one) check(false, 0, one, zero) check(false, 0, one, one) // correct v for any combination of incorrect r,s check(false, 27, zero, zero) check(false, 27, zero, one) check(false, 27, one, zero) check(false, 28, zero, zero) check(false, 28, zero, one) check(false, 28, one, zero) // correct sig with max r,s check(true, 27, secp256k1nMinus1, secp256k1nMinus1) // correct v, combinations of incorrect r,s at upper limit check(false, 27, secp256k1.N, secp256k1nMinus1) check(false, 27, secp256k1nMinus1, secp256k1.N) check(false, 27, secp256k1.N, secp256k1.N) // current callers ensures r,s cannot be negative, but let's test for that too // as crypto package could be used stand-alone check(false, 27, minusOne, one) check(false, 27, one, minusOne) } func checkhash(t *testing.T, name string, f func([]byte) []byte, msg, exp []byte) { sum := f(msg) if bytes.Compare(exp, sum) != 0 { t.Fatalf("hash %s mismatch: want: %x have: %x", name, exp, sum) } } func checkAddr(t *testing.T, addr0, addr1 common.Address) { if addr0 != addr1 { t.Fatalf("address mismatch: want: %x have: %x", addr0, addr1) } } // test to help Python team with integration of libsecp256k1 // skip but keep it after they are done func TestPythonIntegration(t *testing.T) { kh := "289c2857d4598e37fb9647507e47a309d6133539bf21a8b9cb6df88fd5232032" k0, _ := HexToECDSA(kh) k1 := FromECDSA(k0) msg0 := Keccak256([]byte("foo")) sig0, _ := secp256k1.Sign(msg0, k1) msg1 := common.FromHex("00000000000000000000000000000000") sig1, _ := secp256k1.Sign(msg0, k1) fmt.Printf("msg: %x, privkey: %x sig: %x\n", msg0, k1, sig0) fmt.Printf("msg: %x, privkey: %x sig: %x\n", msg1, k1, sig1) }