btcd/btcec/schnorr/signature_test.go
2024-01-09 17:12:36 +08:00

293 lines
11 KiB
Go

// Copyright (c) 2013-2017 The btcsuite developers
// Copyright (c) 2015-2021 The Decred developers
// Use of this source code is governed by an ISC
// license that can be found in the LICENSE file.
package schnorr
import (
"encoding/hex"
"errors"
"strings"
"testing"
"testing/quick"
"github.com/btcsuite/btcd/btcec/v2"
"github.com/davecgh/go-spew/spew"
secp_ecdsa "github.com/decred/dcrd/dcrec/secp256k1/v4"
ecdsa_schnorr "github.com/decred/dcrd/dcrec/secp256k1/v4/schnorr"
)
type bip340Test struct {
secretKey string
publicKey string
auxRand string
message string
signature string
verifyResult bool
validPubKey bool
expectErr error
rfc6979 bool
}
var bip340TestVectors = []bip340Test{
{
secretKey: "0000000000000000000000000000000000000000000000000000000000000003",
publicKey: "F9308A019258C31049344F85F89D5229B531C845836F99B08601F113BCE036F9",
auxRand: "0000000000000000000000000000000000000000000000000000000000000000",
message: "0000000000000000000000000000000000000000000000000000000000000000",
signature: "04E7F9037658A92AFEB4F25BAE5339E3DDCA81A353493827D26F16D92308E49E2A25E92208678A2DF86970DA91B03A8AF8815A8A60498B358DAF560B347AA557",
verifyResult: true,
validPubKey: true,
rfc6979: true,
},
{
secretKey: "0000000000000000000000000000000000000000000000000000000000000003",
publicKey: "F9308A019258C31049344F85F89D5229B531C845836F99B08601F113BCE036F9",
auxRand: "0000000000000000000000000000000000000000000000000000000000000000",
message: "0000000000000000000000000000000000000000000000000000000000000000",
signature: "E907831F80848D1069A5371B402410364BDF1C5F8307B0084C55F1CE2DCA821525F66A4A85EA8B71E482A74F382D2CE5EBEEE8FDB2172F477DF4900D310536C0",
verifyResult: true,
validPubKey: true,
},
{
secretKey: "B7E151628AED2A6ABF7158809CF4F3C762E7160F38B4DA56A784D9045190CFEF",
publicKey: "DFF1D77F2A671C5F36183726DB2341BE58FEAE1DA2DECED843240F7B502BA659",
auxRand: "0000000000000000000000000000000000000000000000000000000000000001",
message: "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89",
signature: "6896BD60EEAE296DB48A229FF71DFE071BDE413E6D43F917DC8DCF8C78DE33418906D11AC976ABCCB20B091292BFF4EA897EFCB639EA871CFA95F6DE339E4B0A",
verifyResult: true,
validPubKey: true,
},
{
secretKey: "C90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B14E5C9",
publicKey: "DD308AFEC5777E13121FA72B9CC1B7CC0139715309B086C960E18FD969774EB8",
auxRand: "C87AA53824B4D7AE2EB035A2B5BBBCCC080E76CDC6D1692C4B0B62D798E6D906",
message: "7E2D58D8B3BCDF1ABADEC7829054F90DDA9805AAB56C77333024B9D0A508B75C",
signature: "5831AAEED7B44BB74E5EAB94BA9D4294C49BCF2A60728D8B4C200F50DD313C1BAB745879A5AD954A72C45A91C3A51D3C7ADEA98D82F8481E0E1E03674A6F3FB7",
verifyResult: true,
validPubKey: true,
},
{
secretKey: "0B432B2677937381AEF05BB02A66ECD012773062CF3FA2549E44F58ED2401710",
publicKey: "25D1DFF95105F5253C4022F628A996AD3A0D95FBF21D468A1B33F8C160D8F517",
auxRand: "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
message: "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
signature: "7EB0509757E246F19449885651611CB965ECC1A187DD51B64FDA1EDC9637D5EC97582B9CB13DB3933705B32BA982AF5AF25FD78881EBB32771FC5922EFC66EA3",
verifyResult: true,
validPubKey: true,
},
{
publicKey: "D69C3509BB99E412E68B0FE8544E72837DFA30746D8BE2AA65975F29D22DC7B9",
message: "4DF3C3F68FCC83B27E9D42C90431A72499F17875C81A599B566C9889B9696703",
signature: "00000000000000000000003B78CE563F89A0ED9414F5AA28AD0D96D6795F9C6376AFB1548AF603B3EB45C9F8207DEE1060CB71C04E80F593060B07D28308D7F4",
verifyResult: true,
validPubKey: true,
},
{
publicKey: "EEFDEA4CDB677750A420FEE807EACF21EB9898AE79B9768766E4FAA04A2D4A34",
message: "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89",
signature: "6CFF5C3BA86C69EA4B7376F31A9BCB4F74C1976089B2D9963DA2E5543E17776969E89B4C5564D00349106B8497785DD7D1D713A8AE82B32FA79D5F7FC407D39B",
verifyResult: false,
validPubKey: false,
expectErr: secp_ecdsa.ErrPubKeyNotOnCurve,
},
{
publicKey: "DFF1D77F2A671C5F36183726DB2341BE58FEAE1DA2DECED843240F7B502BA659",
message: "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89",
signature: "FFF97BD5755EEEA420453A14355235D382F6472F8568A18B2F057A14602975563CC27944640AC607CD107AE10923D9EF7A73C643E166BE5EBEAFA34B1AC553E2",
verifyResult: false,
validPubKey: true,
expectErr: ecdsa_schnorr.ErrSigRYIsOdd,
},
{
publicKey: "DFF1D77F2A671C5F36183726DB2341BE58FEAE1DA2DECED843240F7B502BA659",
message: "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89",
signature: "1FA62E331EDBC21C394792D2AB1100A7B432B013DF3F6FF4F99FCB33E0E1515F28890B3EDB6E7189B630448B515CE4F8622A954CFE545735AAEA5134FCCDB2BD",
verifyResult: false,
validPubKey: true,
expectErr: ecdsa_schnorr.ErrSigRYIsOdd,
},
{
publicKey: "DFF1D77F2A671C5F36183726DB2341BE58FEAE1DA2DECED843240F7B502BA659",
message: "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89",
signature: "6CFF5C3BA86C69EA4B7376F31A9BCB4F74C1976089B2D9963DA2E5543E177769961764B3AA9B2FFCB6EF947B6887A226E8D7C93E00C5ED0C1834FF0D0C2E6DA6",
verifyResult: false,
validPubKey: true,
expectErr: ecdsa_schnorr.ErrUnequalRValues,
},
{
publicKey: "DFF1D77F2A671C5F36183726DB2341BE58FEAE1DA2DECED843240F7B502BA659",
message: "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89",
signature: "0000000000000000000000000000000000000000000000000000000000000000123DDA8328AF9C23A94C1FEECFD123BA4FB73476F0D594DCB65C6425BD186051",
verifyResult: false,
validPubKey: true,
expectErr: ecdsa_schnorr.ErrSigRNotOnCurve,
},
{
publicKey: "DFF1D77F2A671C5F36183726DB2341BE58FEAE1DA2DECED843240F7B502BA659",
message: "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89",
signature: "00000000000000000000000000000000000000000000000000000000000000017615FBAF5AE28864013C099742DEADB4DBA87F11AC6754F93780D5A1837CF197",
verifyResult: false,
validPubKey: true,
expectErr: ecdsa_schnorr.ErrSigRNotOnCurve,
},
{
publicKey: "DFF1D77F2A671C5F36183726DB2341BE58FEAE1DA2DECED843240F7B502BA659",
message: "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89",
signature: "4A298DACAE57395A15D0795DDBFD1DCB564DA82B0F269BC70A74F8220429BA1D69E89B4C5564D00349106B8497785DD7D1D713A8AE82B32FA79D5F7FC407D39B",
verifyResult: false,
validPubKey: true,
expectErr: ecdsa_schnorr.ErrUnequalRValues,
},
{
publicKey: "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC30",
message: "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89",
signature: "6CFF5C3BA86C69EA4B7376F31A9BCB4F74C1976089B2D9963DA2E5543E17776969E89B4C5564D00349106B8497785DD7D1D713A8AE82B32FA79D5F7FC407D39B",
verifyResult: false,
validPubKey: false,
expectErr: secp_ecdsa.ErrPubKeyXTooBig,
},
}
// decodeHex decodes the passed hex string and returns the resulting bytes. It
// panics if an error occurs. This is only used in the tests as a helper since
// the only way it can fail is if there is an error in the test source code.
func decodeHex(hexStr string) []byte {
b, err := hex.DecodeString(hexStr)
if err != nil {
panic("invalid hex string in test source: err " + err.Error() +
", hex: " + hexStr)
}
return b
}
func TestSchnorrSign(t *testing.T) {
t.Parallel()
for i, test := range bip340TestVectors {
if len(test.secretKey) == 0 {
continue
}
d := decodeHex(test.secretKey)
privKey, _ := btcec.PrivKeyFromBytes(d)
var auxBytes [32]byte
aux := decodeHex(test.auxRand)
copy(auxBytes[:], aux)
msg := decodeHex(test.message)
var signOpts []SignOption
if !test.rfc6979 {
signOpts = []SignOption{CustomNonce(auxBytes)}
}
sig, err := Sign(privKey, msg, signOpts...)
if err != nil {
t.Fatalf("test #%v: sig generation failed: %v", i, err)
}
if strings.ToUpper(hex.EncodeToString(sig.Serialize())) != test.signature {
t.Fatalf("test #%v: got signature %x : "+
"want %s", i, sig.Serialize(), test.signature)
}
pubKeyBytes := decodeHex(test.publicKey)
err = schnorrVerify(sig, msg, pubKeyBytes)
if err != nil {
t.Fail()
}
verify := err == nil
if test.verifyResult != verify {
t.Fatalf("test #%v: verification mismatch: "+
"expected %v, got %v", i, test.verifyResult, verify)
}
}
}
func TestSchnorrVerify(t *testing.T) {
t.Parallel()
for i, test := range bip340TestVectors {
pubKeyBytes := decodeHex(test.publicKey)
_, err := ParsePubKey(pubKeyBytes)
switch {
case !test.validPubKey && err != nil:
if !errors.Is(err, test.expectErr) {
t.Fatalf("test #%v: pubkey validation should "+
"have failed, expected %v, got %v", i,
test.expectErr, err)
}
continue
case err != nil:
t.Fatalf("test #%v: unable to parse pubkey: %v", i, err)
}
msg := decodeHex(test.message)
sig, err := ParseSignature(decodeHex(test.signature))
if err != nil {
t.Fatalf("unable to parse sig: %v", err)
}
err = schnorrVerify(sig, msg, pubKeyBytes)
if err != nil && test.verifyResult {
t.Fatalf("test #%v: verification shouldn't have failed: %v", i, err)
}
verify := err == nil
if test.verifyResult != verify {
t.Fatalf("test #%v: verification mismatch: expected "+
"%v, got %v", i, test.verifyResult, verify)
}
if !test.verifyResult && test.expectErr != nil {
if !errors.Is(err, test.expectErr) {
t.Fatalf("test #%v: expect error %v : got %v", i, test.expectErr, err)
}
}
}
}
// TestSchnorrSignNoMutate tests that generating a schnorr signature doesn't
// modify/mutate the underlying private key.
func TestSchnorrSignNoMutate(t *testing.T) {
t.Parallel()
// Assert that given a random private key and message, we can generate
// a signature from that w/o modifying the underlying private key.
f := func(privBytes, msg [32]byte) bool {
privBytesCopy := privBytes
privKey, _ := btcec.PrivKeyFromBytes(privBytesCopy[:])
// Generate a signature for private key with our message.
_, err := Sign(privKey, msg[:])
if err != nil {
t.Logf("unable to gen sig: %v", err)
return false
}
// We should be able to re-derive the private key from raw
// bytes and have that match up again.
privKeyCopy, _ := btcec.PrivKeyFromBytes(privBytes[:])
if *privKey != *privKeyCopy {
t.Logf("private doesn't match: expected %v, got %v",
spew.Sdump(privKeyCopy), spew.Sdump(privKey))
return false
}
return true
}
if err := quick.Check(f, nil); err != nil {
t.Fatalf("private key modified: %v", err)
}
}