|
7 | 7 | #ifndef _SECP256K1_MODULE_BULLETPROOFS_TEST_ |
8 | 8 | #define _SECP256K1_MODULE_BULLETPROOFS_TEST_ |
9 | 9 |
|
| 10 | +static void test_bulletproofs_generators_api(void) { |
| 11 | + /* The BP generator API requires no precomp */ |
| 12 | + secp256k1_context *none = secp256k1_context_create(SECP256K1_CONTEXT_NONE); |
| 13 | + |
| 14 | + secp256k1_bulletproofs_generators *gens; |
| 15 | + unsigned char gens_ser[330]; |
| 16 | + size_t len = sizeof(gens_ser); |
| 17 | + |
| 18 | + int32_t ecount = 0; |
| 19 | + |
| 20 | + secp256k1_context_set_error_callback(none, counting_illegal_callback_fn, &ecount); |
| 21 | + secp256k1_context_set_illegal_callback(none, counting_illegal_callback_fn, &ecount); |
| 22 | + |
| 23 | + /* Create */ |
| 24 | + gens = secp256k1_bulletproofs_generators_create(none, 10); |
| 25 | + CHECK(gens != NULL && ecount == 0); |
| 26 | + |
| 27 | + /* Serialize */ |
| 28 | + ecount = 0; |
| 29 | + CHECK(!secp256k1_bulletproofs_generators_serialize(none, NULL, gens_ser, &len)); |
| 30 | + CHECK(ecount == 1); |
| 31 | + CHECK(!secp256k1_bulletproofs_generators_serialize(none, gens, NULL, &len)); |
| 32 | + CHECK(ecount == 2); |
| 33 | + CHECK(!secp256k1_bulletproofs_generators_serialize(none, gens, gens_ser, NULL)); |
| 34 | + CHECK(ecount == 3); |
| 35 | + len = 0; |
| 36 | + CHECK(!secp256k1_bulletproofs_generators_serialize(none, gens, gens_ser, &len)); |
| 37 | + len = sizeof(gens_ser) - 1; |
| 38 | + CHECK(!secp256k1_bulletproofs_generators_serialize(none, gens, gens_ser, &len)); |
| 39 | + len = sizeof(gens_ser) + 1; /* len can be greater than minimum needed */ |
| 40 | + CHECK(secp256k1_bulletproofs_generators_serialize(none, gens, gens_ser, &len)); |
| 41 | + CHECK(len == sizeof(gens_ser)); |
| 42 | + CHECK(ecount == 3); |
| 43 | + |
| 44 | + /* Parse */ |
| 45 | + ecount = 0; |
| 46 | + secp256k1_bulletproofs_generators_destroy(none, gens); /* avoid leaking memory */ |
| 47 | + gens = secp256k1_bulletproofs_generators_parse(none, NULL, sizeof(gens_ser)); |
| 48 | + CHECK(gens == NULL && ecount == 1); |
| 49 | + /* Not a multiple of 33 */ |
| 50 | + gens = secp256k1_bulletproofs_generators_parse(none, gens_ser, sizeof(gens_ser) - 1); |
| 51 | + CHECK(gens == NULL && ecount == 1); |
| 52 | + gens = secp256k1_bulletproofs_generators_parse(none, gens_ser, sizeof(gens_ser)); |
| 53 | + CHECK(gens != NULL && ecount == 1); |
| 54 | + /* Not valid generators */ |
| 55 | + memset(gens_ser, 1, sizeof(gens_ser)); |
| 56 | + gens = secp256k1_bulletproofs_generators_parse(none, gens_ser, sizeof(gens_ser)); |
| 57 | + CHECK(gens == NULL && ecount == 1); |
| 58 | + |
| 59 | + /* Destroy (we allow destroying a NULL context, it's just a noop. like free().) */ |
| 60 | + ecount = 0; |
| 61 | + secp256k1_bulletproofs_generators_destroy(none, NULL); |
| 62 | + secp256k1_bulletproofs_generators_destroy(none, gens); |
| 63 | + CHECK(ecount == 0); |
| 64 | + |
| 65 | + secp256k1_context_destroy(none); |
| 66 | +} |
| 67 | + |
| 68 | +static void test_bulletproofs_generators_fixed(void) { |
| 69 | + secp256k1_bulletproofs_generators *gens = secp256k1_bulletproofs_generators_create(ctx, 3); |
| 70 | + unsigned char gens_ser[330]; |
| 71 | + const unsigned char fixed_first_3[99] = { |
| 72 | + 0x0b, |
| 73 | + 0xb3, 0x4d, 0x5f, 0xa6, 0xb8, 0xf3, 0xd1, 0x38, |
| 74 | + 0x49, 0xce, 0x51, 0x91, 0xb7, 0xf6, 0x76, 0x18, |
| 75 | + 0xfe, 0x5b, 0xd1, 0x2a, 0x88, 0xb2, 0x0e, 0xac, |
| 76 | + 0x33, 0x89, 0x45, 0x66, 0x7f, 0xb3, 0x30, 0x56, |
| 77 | + 0x0a, |
| 78 | + 0x62, 0x86, 0x15, 0x16, 0x92, 0x42, 0x10, 0x9e, |
| 79 | + 0x9e, 0x64, 0xd4, 0xcb, 0x28, 0x81, 0x60, 0x9c, |
| 80 | + 0x24, 0xb9, 0x89, 0x51, 0x2a, 0xd9, 0x01, 0xae, |
| 81 | + 0xff, 0x75, 0x64, 0x9c, 0x37, 0x5d, 0xbd, 0x79, |
| 82 | + 0x0a, |
| 83 | + 0xed, 0xe0, 0x6e, 0x07, 0x5e, 0x79, 0xd0, 0xf7, |
| 84 | + 0x7b, 0x03, 0x3e, 0xb9, 0xa9, 0x21, 0xa4, 0x5b, |
| 85 | + 0x99, 0xf3, 0x9b, 0xee, 0xfe, 0xa0, 0x37, 0xa2, |
| 86 | + 0x1f, 0xe9, 0xd7, 0x4f, 0x95, 0x8b, 0x10, 0xe2, |
| 87 | + }; |
| 88 | + size_t len; |
| 89 | + |
| 90 | + len = 99; |
| 91 | + CHECK(secp256k1_bulletproofs_generators_serialize(ctx, gens, gens_ser, &len)); |
| 92 | + CHECK(memcmp(gens_ser, fixed_first_3, sizeof(fixed_first_3)) == 0); |
| 93 | + |
| 94 | + len = sizeof(gens_ser); |
| 95 | + CHECK(secp256k1_bulletproofs_generators_serialize(ctx, gens, gens_ser, &len)); |
| 96 | + CHECK(memcmp(gens_ser, fixed_first_3, sizeof(fixed_first_3)) == 0); |
| 97 | + |
| 98 | + secp256k1_bulletproofs_generators_destroy(ctx, gens); |
| 99 | +} |
| 100 | + |
10 | 101 | void run_bulletproofs_tests(void) { |
11 | | - /* TODO */ |
| 102 | + test_bulletproofs_generators_api(); |
| 103 | + test_bulletproofs_generators_fixed(); |
12 | 104 | } |
13 | 105 |
|
14 | 106 | #endif |
0 commit comments