mirror of
https://github.com/bitcoin/bitcoin.git
synced 2024-11-20 02:25:40 +01:00
a0473442d1
-BEGIN VERIFY SCRIPT- sed -i -e 's/\s*().main\s*()/(__file__).main()/' $(git ls-files test/functional/*.py) sed -i -e 's/def __init__(self)/def __init__(self, test_file)/' test/functional/test_framework/test_framework.py -END VERIFY SCRIPT-
64 lines
3.1 KiB
Python
Executable File
64 lines
3.1 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# Copyright (c) 2016-2022 The Bitcoin Core developers
|
|
# Distributed under the MIT software license, see the accompanying
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
"""Test RPC commands for signing messages with private key."""
|
|
|
|
from test_framework.descriptors import (
|
|
descsum_create,
|
|
)
|
|
from test_framework.test_framework import BitcoinTestFramework
|
|
from test_framework.util import (
|
|
assert_equal,
|
|
assert_raises_rpc_error,
|
|
)
|
|
|
|
|
|
class SignMessagesWithPrivTest(BitcoinTestFramework):
|
|
def set_test_params(self):
|
|
self.setup_clean_chain = True
|
|
self.num_nodes = 1
|
|
|
|
def addresses_from_privkey(self, priv_key):
|
|
'''Return addresses for a given WIF private key in legacy (P2PKH),
|
|
nested segwit (P2SH-P2WPKH) and native segwit (P2WPKH) formats.'''
|
|
descriptors = f'pkh({priv_key})', f'sh(wpkh({priv_key}))', f'wpkh({priv_key})'
|
|
return [self.nodes[0].deriveaddresses(descsum_create(desc))[0] for desc in descriptors]
|
|
|
|
def run_test(self):
|
|
message = 'This is just a test message'
|
|
|
|
self.log.info('test signing with priv_key')
|
|
priv_key = 'cUeKHd5orzT3mz8P9pxyREHfsWtVfgsfDjiZZBcjUBAaGk1BTj7N'
|
|
expected_signature = 'INbVnW4e6PeRmsv2Qgu8NuopvrVjkcxob+sX8OcZG0SALhWybUjzMLPdAsXI46YZGb0KQTRii+wWIQzRpG/U+S0='
|
|
signature = self.nodes[0].signmessagewithprivkey(priv_key, message)
|
|
assert_equal(expected_signature, signature)
|
|
|
|
self.log.info('test that verifying with P2PKH address succeeds')
|
|
addresses = self.addresses_from_privkey(priv_key)
|
|
assert_equal(addresses[0], 'mpLQjfK79b7CCV4VMJWEWAj5Mpx8Up5zxB')
|
|
assert self.nodes[0].verifymessage(addresses[0], signature, message)
|
|
|
|
self.log.info('test that verifying with non-P2PKH addresses throws error')
|
|
for non_p2pkh_address in addresses[1:]:
|
|
assert_raises_rpc_error(-3, "Address does not refer to key", self.nodes[0].verifymessage, non_p2pkh_address, signature, message)
|
|
|
|
self.log.info('test parameter validity and error codes')
|
|
# signmessagewithprivkey has two required parameters
|
|
for num_params in [0, 1, 3, 4, 5]:
|
|
param_list = ["dummy"]*num_params
|
|
assert_raises_rpc_error(-1, "signmessagewithprivkey", self.nodes[0].signmessagewithprivkey, *param_list)
|
|
# verifymessage has three required parameters
|
|
for num_params in [0, 1, 2, 4, 5]:
|
|
param_list = ["dummy"]*num_params
|
|
assert_raises_rpc_error(-1, "verifymessage", self.nodes[0].verifymessage, *param_list)
|
|
# invalid key or address provided
|
|
assert_raises_rpc_error(-5, "Invalid private key", self.nodes[0].signmessagewithprivkey, "invalid_key", message)
|
|
assert_raises_rpc_error(-5, "Invalid address", self.nodes[0].verifymessage, "invalid_addr", signature, message)
|
|
# malformed signature provided
|
|
assert_raises_rpc_error(-3, "Malformed base64 encoding", self.nodes[0].verifymessage, 'mpLQjfK79b7CCV4VMJWEWAj5Mpx8Up5zxB', "invalid_sig", message)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
SignMessagesWithPrivTest(__file__).main()
|