int main(int argc, char **argv) { if (argc > 1) count = strtol(argv[1], NULL, 0)*47; printf("test count = %i\n", count); // initialize secp256k1_fe_start(); secp256k1_ge_start(); secp256k1_ecmult_start(); // num tests run_num_smalltests(); // field tests run_sqrt(); // ecmult tests run_wnaf(); run_point_times_order(); run_ecmult_chain(); // ecdsa tests run_ecdsa_sign_verify(); #ifdef ENABLE_OPENSSL_TESTS run_ecdsa_openssl(); #endif // shutdown secp256k1_ecmult_stop(); secp256k1_ge_stop(); secp256k1_fe_stop(); return 0; }
int main() { secp256k1_fe_start(); secp256k1_ge_start(); secp256k1_ecmult_start(); secp256k1_fe_t x; const secp256k1_num_t *order = &secp256k1_ge_consts->order; secp256k1_num_t r, s, m; secp256k1_num_init(&r); secp256k1_num_init(&s); secp256k1_num_init(&m); secp256k1_ecdsa_sig_t sig; secp256k1_ecdsa_sig_init(&sig); secp256k1_fe_set_hex(&x, "a357ae915c4a65281309edf20504740f0eb3343990216b4f81063cb65f2f7e0f", 64); int cnt = 0; int good = 0; for (int i=0; i<1000000; i++) { random_num_order(&r); random_num_order(&s); random_num_order(&m); secp256k1_ecdsa_sig_set_rs(&sig, &r, &s); secp256k1_ge_t pubkey; secp256k1_ge_set_xo(&pubkey, &x, 1); if (secp256k1_ge_is_valid(&pubkey)) { cnt++; good += secp256k1_ecdsa_sig_verify(&sig, &pubkey, &m); } } printf("%i/%i\n", good, cnt); secp256k1_num_free(&r); secp256k1_num_free(&s); secp256k1_num_free(&m); secp256k1_ecdsa_sig_free(&sig); secp256k1_ecmult_stop(); secp256k1_ge_stop(); secp256k1_fe_stop(); return 0; }
void secp256k1_stop(void) { secp256k1_ecmult_stop(); secp256k1_ge_stop(); secp256k1_fe_stop(); }
int main(int argc, char **argv) { /* find iteration count */ if (argc > 1) { count = strtol(argv[1], NULL, 0); } /* find random seed */ uint64_t seed; if (argc > 2) { seed = strtoull(argv[2], NULL, 0); } else { FILE *frand = fopen("/dev/urandom", "r"); if (!frand || !fread(&seed, sizeof(seed), 1, frand)) { seed = time(NULL) * 1337; } fclose(frand); } secp256k1_rand_seed(seed); printf("test count = %i\n", count); printf("random seed = %llu\n", (unsigned long long)seed); /* initialize */ secp256k1_start(SECP256K1_START_SIGN | SECP256K1_START_VERIFY); /* initializing a second time shouldn't cause any harm or memory leaks. */ secp256k1_start(SECP256K1_START_SIGN | SECP256K1_START_VERIFY); /* Likewise, re-running the internal init functions should be harmless. */ secp256k1_fe_start(); secp256k1_ge_start(); secp256k1_scalar_start(); secp256k1_ecdsa_start(); #ifndef USE_NUM_NONE /* num tests */ run_num_smalltests(); #endif /* scalar tests */ run_scalar_tests(); /* field tests */ run_field_inv(); run_field_inv_var(); run_field_inv_all(); run_field_inv_all_var(); run_sqr(); run_sqrt(); /* group tests */ run_ge(); /* ecmult tests */ run_wnaf(); run_point_times_order(); run_ecmult_chain(); /* ecdsa tests */ run_ecdsa_sign_verify(); run_ecdsa_end_to_end(); run_ecdsa_edge_cases(); #ifdef ENABLE_OPENSSL_TESTS run_ecdsa_openssl(); #endif printf("random run = %llu\n", (unsigned long long)secp256k1_rand32() + ((unsigned long long)secp256k1_rand32() << 32)); /* shutdown */ secp256k1_stop(); /* shutting down twice shouldn't cause any double frees. */ secp256k1_stop(); /* Same for the internal shutdown functions. */ secp256k1_fe_stop(); secp256k1_ge_stop(); secp256k1_scalar_stop(); secp256k1_ecdsa_stop(); return 0; }