2019-02-05 10:32:22 +00:00
|
|
|
# Nim Eth-keys
|
|
|
|
# Copyright (c) 2018 Status Research & Development GmbH
|
|
|
|
# Licensed under either of
|
|
|
|
#
|
|
|
|
# * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE) or http://www.apache.org/licenses/LICENSE-2.0)
|
|
|
|
# * MIT license ([LICENSE-MIT](LICENSE-MIT) or http://opensource.org/licenses/MIT)
|
|
|
|
#
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
2021-04-06 11:33:24 +00:00
|
|
|
import
|
2021-12-11 18:12:55 +00:00
|
|
|
unittest2,
|
2021-04-06 11:33:24 +00:00
|
|
|
../../eth/keys, #../src/private/conversion_bytes,
|
|
|
|
./config
|
2019-02-05 10:32:22 +00:00
|
|
|
|
|
|
|
suite "Test key and signature data structure":
|
|
|
|
|
|
|
|
test "Signing from private key object (ported from official eth-keys)":
|
|
|
|
for person in [alice, bob, eve]:
|
|
|
|
let
|
2020-04-04 16:44:01 +00:00
|
|
|
pk = PrivateKey.fromHex(person.privkey)[]
|
2019-02-05 10:32:22 +00:00
|
|
|
signature = pk.sign_msg(MSG)
|
|
|
|
|
|
|
|
check: verify_msg(pk.public_key, MSG, signature)
|
|
|
|
|
|
|
|
test "Hash signing from private key object (ported from official eth-keys)":
|
|
|
|
for person in [alice, bob, eve]:
|
|
|
|
let
|
2020-04-04 16:44:01 +00:00
|
|
|
pk = PrivateKey.fromHex(person.privkey)[]
|
2019-02-05 10:32:22 +00:00
|
|
|
signature = pk.sign_msg(MSGHASH)
|
|
|
|
|
|
|
|
check: verify_msg(pk.public_key, MSGHASH, signature)
|
|
|
|
|
|
|
|
test "Recover public key from message":
|
|
|
|
for person in [alice, bob, eve]:
|
|
|
|
let
|
2020-04-04 16:44:01 +00:00
|
|
|
pk = PrivateKey.fromHex(person.privkey)[]
|
2019-02-05 10:32:22 +00:00
|
|
|
signature = pk.sign_msg(MSG)
|
|
|
|
|
|
|
|
recovered_pubkey = recover_pubkey_from_msg(MSG, signature)
|
|
|
|
|
|
|
|
check: pk.public_key == recovered_pubkey
|
|
|
|
|
|
|
|
test "Recover public key from message hash":
|
|
|
|
for person in [alice, bob, eve]:
|
|
|
|
let
|
2020-04-04 16:44:01 +00:00
|
|
|
pk = PrivateKey.formHex(person.privkey)[]
|
2019-02-05 10:32:22 +00:00
|
|
|
signature = pk.sign_msg(MSGHASH)
|
|
|
|
|
|
|
|
recovered_pubkey = recover_pubkey_from_msg(MSGHASH, signature)
|
|
|
|
|
|
|
|
check: pk.public_key == recovered_pubkey
|
|
|
|
|
|
|
|
test "Signature serialization and deserialization":
|
|
|
|
for person in [alice, bob, eve]:
|
|
|
|
let
|
2020-04-04 16:44:01 +00:00
|
|
|
pk = PrivateKey.fromHex(person.privkey)[]
|
2019-02-05 10:32:22 +00:00
|
|
|
signature = pk.sign_msg(MSG)
|
|
|
|
deserializedSignature = parseSignature(hexToSeqByteBE(person.serialized_sig))
|
|
|
|
|
|
|
|
var serialized_sig: array[65, byte]
|
|
|
|
signature.serialize(serialized_sig)
|
|
|
|
|
|
|
|
check:
|
|
|
|
signature == deserializedSignature
|
|
|
|
serialized_sig.toHex() == person.serialized_sig
|
|
|
|
$signature == person.serialized_sig
|