From 02048f88b5b99d6ad3a630b461c5be956f00bb30 Mon Sep 17 00:00:00 2001 From: Ondrej Mikle Date: Mon, 7 Jul 2014 15:13:36 +0200 Subject: [PATCH] Tests for public key validity check. --- tests.c | 52 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 52 insertions(+) diff --git a/tests.c b/tests.c index af80c74a5..a3f45fd5a 100644 --- a/tests.c +++ b/tests.c @@ -852,6 +852,54 @@ START_TEST(test_address) } END_TEST +START_TEST(test_pubkey_validity) +{ + uint8_t pub_key[65]; + curve_point pub; + int res; + + memcpy(pub_key, fromhex("0226659c1cf7321c178c07437150639ff0c5b7679c7ea195253ed9abda2e081a37"), 33); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 1); + + memcpy(pub_key, fromhex("025b1654a0e78d28810094f6c5a96b8efb8a65668b578f170ac2b1f83bc63ba856"), 33); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 1); + + memcpy(pub_key, fromhex("03433f246a12e6486a51ff08802228c61cf895175a9b49ed4766ea9a9294a3c7fe"), 33); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 1); + + memcpy(pub_key, fromhex("03aeb03abeee0f0f8b4f7a5d65ce31f9570cef9f72c2dd8a19b4085a30ab033d48"), 33); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 1); + + memcpy(pub_key, fromhex("0496e8f2093f018aff6c2e2da5201ee528e2c8accbf9cac51563d33a7bb74a016054201c025e2a5d96b1629b95194e806c63eb96facaedc733b1a4b70ab3b33e3a"), 65); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 1); + + memcpy(pub_key, fromhex("0498010f8a687439ff497d3074beb4519754e72c4b6220fb669224749591dde416f3961f8ece18f8689bb32235e436874d2174048b86118a00afbd5a4f33a24f0f"), 65); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 1); + + memcpy(pub_key, fromhex("04f80490839af36d13701ec3f9eebdac901b51c362119d74553a3c537faff31b17e2a59ebddbdac9e87b816307a7ed5b826b8f40b92719086238e1bebf19b77a4d"), 65); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 1); + + memcpy(pub_key, fromhex("04f80490839af36d13701ec3f9eebdac901b51c362119d74553a3c537faff31b17e2a59ebddbdac9e87b816307a7ed5b826b8f40b92719086238e1bebf00000000"), 65); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 0); + + memcpy(pub_key, fromhex("04f80490839af36d13701ec3f9eebdac901b51c362119d74553a3c537faff31b17e2a59ebddbdac9e87b816307a7ed5b8211111111111111111111111111111111"), 65); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 0); + + memcpy(pub_key, fromhex("00"), 1); + res = ecdsa_read_pubkey(pub_key, &pub); + ck_assert_int_eq(res, 0); +} +END_TEST + START_TEST(test_wif) { uint8_t priv_key[32]; @@ -1031,6 +1079,10 @@ Suite *test_suite(void) tcase_add_test(tc, test_mnemonic_check); suite_add_tcase(s, tc); + tc = tcase_create("pubkey_validity"); + tcase_add_test(tc, test_pubkey_validity); + suite_add_tcase(s, tc); + return s; }