mirror of
https://git.wownero.com/wownero/wownero.git
synced 2024-08-15 01:03:23 +00:00
tests: add multisig unit tests
This commit is contained in:
parent
4c313324b1
commit
b84b3565f3
2 changed files with 179 additions and 0 deletions
|
@ -53,6 +53,7 @@ set(unit_tests_sources
|
|||
memwipe.cpp
|
||||
mnemonics.cpp
|
||||
mul_div.cpp
|
||||
multisig.cpp
|
||||
parse_amount.cpp
|
||||
serialization.cpp
|
||||
sha256.cpp
|
||||
|
|
178
tests/unit_tests/multisig.cpp
Normal file
178
tests/unit_tests/multisig.cpp
Normal file
|
@ -0,0 +1,178 @@
|
|||
// Copyright (c) 2017, The Monero Project
|
||||
//
|
||||
// All rights reserved.
|
||||
//
|
||||
// Redistribution and use in source and binary forms, with or without modification, are
|
||||
// permitted provided that the following conditions are met:
|
||||
//
|
||||
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
||||
// conditions and the following disclaimer.
|
||||
//
|
||||
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
||||
// of conditions and the following disclaimer in the documentation and/or other
|
||||
// materials provided with the distribution.
|
||||
//
|
||||
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
||||
// used to endorse or promote products derived from this software without specific
|
||||
// prior written permission.
|
||||
//
|
||||
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
||||
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
||||
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
||||
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
||||
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
#include "gtest/gtest.h"
|
||||
|
||||
#include <cstdint>
|
||||
|
||||
#include "wallet/wallet2.h"
|
||||
|
||||
static const struct
|
||||
{
|
||||
const char *address;
|
||||
const char *spendkey;
|
||||
} test_addresses[] =
|
||||
{
|
||||
{
|
||||
"9uvjbU54ZJb8j7Dcq1h3F1DnBRkxXdYUX4pbJ7mE3ghM8uF3fKzqRKRNAKYZXcNLqMg7MxjVVD2wKC2PALUwEveGSC3YSWD",
|
||||
"2dd6e34a234c3e8b5d29a371789e4601e96dee4ea6f7ef79224d1a2d91164c01"
|
||||
},
|
||||
{
|
||||
"9ywDBAyDbb6QKFiZxDJ4hHZqZEQXXCR5EaYNcndUpqPDeE7rEgs6neQdZnhcDrWbURYK8xUjhuG2mVjJdmknrZbcG7NnbaB",
|
||||
"fac47aecc948ce9d3531aa042abb18235b1df632087c55a361b632ffdd6ede0c"
|
||||
},
|
||||
{
|
||||
"9t6Hn946u3eah5cuncH1hB5hGzsTUoevtf4SY7MHN5NgJZh2SFWsyVt3vUhuHyRKyrCQvr71Lfc1AevG3BXE11PQFoXDtD8",
|
||||
"bbd3175ef9fd9f5eefdc43035f882f74ad14c4cf1799d8b6f9001bc197175d02"
|
||||
}
|
||||
};
|
||||
|
||||
static void make_wallet(unsigned int idx, tools::wallet2 &wallet)
|
||||
{
|
||||
ASSERT_TRUE(idx < sizeof(test_addresses) / sizeof(test_addresses[0]));
|
||||
|
||||
crypto::secret_key spendkey;
|
||||
epee::string_tools::hex_to_pod(test_addresses[idx].spendkey, spendkey);
|
||||
|
||||
std::string basename = "/tmp/multisig-unit-test-" + std::to_string(idx);
|
||||
try
|
||||
{
|
||||
boost::filesystem::remove(basename + ".keys");
|
||||
boost::filesystem::remove(basename + ".address.txt");
|
||||
boost::filesystem::remove(basename);
|
||||
|
||||
wallet.init("");
|
||||
wallet.generate(basename, "", spendkey, true, false);
|
||||
|
||||
boost::filesystem::remove(basename + ".keys");
|
||||
boost::filesystem::remove(basename + ".address.txt");
|
||||
boost::filesystem::remove(basename);
|
||||
|
||||
ASSERT_TRUE(test_addresses[idx].address == wallet.get_account().get_public_address_str(true));
|
||||
}
|
||||
catch (const std::exception &e)
|
||||
{
|
||||
MFATAL("Error creating test wallet: " << e.what());
|
||||
ASSERT_TRUE(0);
|
||||
}
|
||||
}
|
||||
|
||||
static void make_M_2_wallet(tools::wallet2 &wallet0, tools::wallet2 &wallet1, unsigned int M)
|
||||
{
|
||||
ASSERT_TRUE(M <= 2);
|
||||
|
||||
make_wallet(0, wallet0);
|
||||
make_wallet(1, wallet1);
|
||||
|
||||
std::vector<crypto::secret_key> sk0(1), sk1(1);
|
||||
std::vector<crypto::public_key> pk0(1), pk1(1);
|
||||
|
||||
std::string mi0 = wallet0.get_multisig_info();
|
||||
std::string mi1 = wallet1.get_multisig_info();
|
||||
|
||||
ASSERT_TRUE(wallet0.verify_multisig_info(mi1, sk0[0], pk0[0]));
|
||||
ASSERT_TRUE(wallet1.verify_multisig_info(mi0, sk1[0], pk1[0]));
|
||||
|
||||
ASSERT_FALSE(wallet0.multisig() || wallet1.multisig());
|
||||
wallet0.make_multisig("", sk0, pk0, M);
|
||||
wallet1.make_multisig("", sk1, pk1, M);
|
||||
|
||||
ASSERT_TRUE(wallet0.get_account().get_public_address_str(true) == wallet1.get_account().get_public_address_str(true));
|
||||
|
||||
uint32_t threshold, total;
|
||||
ASSERT_TRUE(wallet0.multisig(&threshold, &total));
|
||||
ASSERT_TRUE(threshold == M);
|
||||
ASSERT_TRUE(total == 2);
|
||||
ASSERT_TRUE(wallet1.multisig(&threshold, &total));
|
||||
ASSERT_TRUE(threshold == M);
|
||||
ASSERT_TRUE(total == 2);
|
||||
}
|
||||
|
||||
static void make_M_3_wallet(tools::wallet2 &wallet0, tools::wallet2 &wallet1, tools::wallet2 &wallet2, unsigned int M)
|
||||
{
|
||||
ASSERT_TRUE(M <= 3);
|
||||
|
||||
make_wallet(0, wallet0);
|
||||
make_wallet(1, wallet1);
|
||||
make_wallet(2, wallet2);
|
||||
|
||||
std::vector<crypto::secret_key> sk0(2), sk1(2), sk2(2);
|
||||
std::vector<crypto::public_key> pk0(2), pk1(2), pk2(2);
|
||||
|
||||
std::string mi0 = wallet0.get_multisig_info();
|
||||
std::string mi1 = wallet1.get_multisig_info();
|
||||
std::string mi2 = wallet2.get_multisig_info();
|
||||
|
||||
ASSERT_TRUE(wallet0.verify_multisig_info(mi1, sk0[0], pk0[0]));
|
||||
ASSERT_TRUE(wallet0.verify_multisig_info(mi2, sk0[1], pk0[1]));
|
||||
ASSERT_TRUE(wallet1.verify_multisig_info(mi0, sk1[0], pk1[0]));
|
||||
ASSERT_TRUE(wallet1.verify_multisig_info(mi2, sk1[1], pk1[1]));
|
||||
ASSERT_TRUE(wallet2.verify_multisig_info(mi0, sk2[0], pk2[0]));
|
||||
ASSERT_TRUE(wallet2.verify_multisig_info(mi1, sk2[1], pk2[1]));
|
||||
|
||||
// not implemented yet
|
||||
if (M < 3)
|
||||
return;
|
||||
|
||||
ASSERT_FALSE(wallet0.multisig() || wallet1.multisig() || wallet2.multisig());
|
||||
wallet0.make_multisig("", sk0, pk0, M);
|
||||
wallet1.make_multisig("", sk1, pk1, M);
|
||||
wallet2.make_multisig("", sk2, pk2, M);
|
||||
|
||||
ASSERT_TRUE(wallet0.get_account().get_public_address_str(true) == wallet1.get_account().get_public_address_str(true));
|
||||
ASSERT_TRUE(wallet0.get_account().get_public_address_str(true) == wallet2.get_account().get_public_address_str(true));
|
||||
|
||||
uint32_t threshold, total;
|
||||
ASSERT_TRUE(wallet0.multisig(&threshold, &total));
|
||||
ASSERT_TRUE(threshold == M);
|
||||
ASSERT_TRUE(total == 3);
|
||||
ASSERT_TRUE(wallet1.multisig(&threshold, &total));
|
||||
ASSERT_TRUE(threshold == M);
|
||||
ASSERT_TRUE(total == 3);
|
||||
ASSERT_TRUE(wallet2.multisig(&threshold, &total));
|
||||
ASSERT_TRUE(threshold == M);
|
||||
ASSERT_TRUE(total == 3);
|
||||
}
|
||||
|
||||
TEST(multisig, make_2_2)
|
||||
{
|
||||
tools::wallet2 wallet0, wallet1;
|
||||
make_M_2_wallet(wallet0, wallet1, 2);
|
||||
}
|
||||
|
||||
TEST(multisig, make_3_3)
|
||||
{
|
||||
tools::wallet2 wallet0, wallet1, wallet2;
|
||||
make_M_3_wallet(wallet0, wallet1, wallet2, 3);
|
||||
}
|
||||
|
||||
TEST(multisig, make_2_3)
|
||||
{
|
||||
tools::wallet2 wallet0, wallet1, wallet2;
|
||||
make_M_3_wallet(wallet0, wallet1, wallet2, 2);
|
||||
}
|
Loading…
Reference in a new issue