aboutsummaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authormoneromooo-monero <moneromooo-monero@users.noreply.github.com>2017-06-29 11:48:34 +0100
committermoneromooo-monero <moneromooo-monero@users.noreply.github.com>2017-12-17 16:12:00 +0000
commitb84b3565f3e313a124ab5131effc6f1929893993 (patch)
tree509073e4bdbcd828b4b9651a65a9ff730fea3488 /tests
parentAdd N/N multisig tx generation and signing (diff)
downloadmonero-b84b3565f3e313a124ab5131effc6f1929893993.tar.xz
tests: add multisig unit tests
Diffstat (limited to 'tests')
-rw-r--r--tests/unit_tests/CMakeLists.txt1
-rw-r--r--tests/unit_tests/multisig.cpp178
2 files changed, 179 insertions, 0 deletions
diff --git a/tests/unit_tests/CMakeLists.txt b/tests/unit_tests/CMakeLists.txt
index e37d34063..cfacd5688 100644
--- a/tests/unit_tests/CMakeLists.txt
+++ b/tests/unit_tests/CMakeLists.txt
@@ -53,6 +53,7 @@ set(unit_tests_sources
memwipe.cpp
mnemonics.cpp
mul_div.cpp
+ multisig.cpp
parse_amount.cpp
serialization.cpp
sha256.cpp
diff --git a/tests/unit_tests/multisig.cpp b/tests/unit_tests/multisig.cpp
new file mode 100644
index 000000000..2fb201d82
--- /dev/null
+++ b/tests/unit_tests/multisig.cpp
@@ -0,0 +1,178 @@
+// Copyright (c) 2017, The Monero Project
+//
+// All rights reserved.
+//
+// Redistribution and use in source and binary forms, with or without modification, are
+// permitted provided that the following conditions are met:
+//
+// 1. Redistributions of source code must retain the above copyright notice, this list of
+// conditions and the following disclaimer.
+//
+// 2. Redistributions in binary form must reproduce the above copyright notice, this list
+// of conditions and the following disclaimer in the documentation and/or other
+// materials provided with the distribution.
+//
+// 3. Neither the name of the copyright holder nor the names of its contributors may be
+// used to endorse or promote products derived from this software without specific
+// prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
+// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+#include "gtest/gtest.h"
+
+#include <cstdint>
+
+#include "wallet/wallet2.h"
+
+static const struct
+{
+ const char *address;
+ const char *spendkey;
+} test_addresses[] =
+{
+ {
+ "9uvjbU54ZJb8j7Dcq1h3F1DnBRkxXdYUX4pbJ7mE3ghM8uF3fKzqRKRNAKYZXcNLqMg7MxjVVD2wKC2PALUwEveGSC3YSWD",
+ "2dd6e34a234c3e8b5d29a371789e4601e96dee4ea6f7ef79224d1a2d91164c01"
+ },
+ {
+ "9ywDBAyDbb6QKFiZxDJ4hHZqZEQXXCR5EaYNcndUpqPDeE7rEgs6neQdZnhcDrWbURYK8xUjhuG2mVjJdmknrZbcG7NnbaB",
+ "fac47aecc948ce9d3531aa042abb18235b1df632087c55a361b632ffdd6ede0c"
+ },
+ {
+ "9t6Hn946u3eah5cuncH1hB5hGzsTUoevtf4SY7MHN5NgJZh2SFWsyVt3vUhuHyRKyrCQvr71Lfc1AevG3BXE11PQFoXDtD8",
+ "bbd3175ef9fd9f5eefdc43035f882f74ad14c4cf1799d8b6f9001bc197175d02"
+ }
+};
+
+static void make_wallet(unsigned int idx, tools::wallet2 &wallet)
+{
+ ASSERT_TRUE(idx < sizeof(test_addresses) / sizeof(test_addresses[0]));
+
+ crypto::secret_key spendkey;
+ epee::string_tools::hex_to_pod(test_addresses[idx].spendkey, spendkey);
+
+ std::string basename = "/tmp/multisig-unit-test-" + std::to_string(idx);
+ try
+ {
+ boost::filesystem::remove(basename + ".keys");
+ boost::filesystem::remove(basename + ".address.txt");
+ boost::filesystem::remove(basename);
+
+ wallet.init("");
+ wallet.generate(basename, "", spendkey, true, false);
+
+ boost::filesystem::remove(basename + ".keys");
+ boost::filesystem::remove(basename + ".address.txt");
+ boost::filesystem::remove(basename);
+
+ ASSERT_TRUE(test_addresses[idx].address == wallet.get_account().get_public_address_str(true));
+ }
+ catch (const std::exception &e)
+ {
+ MFATAL("Error creating test wallet: " << e.what());
+ ASSERT_TRUE(0);
+ }
+}
+
+static void make_M_2_wallet(tools::wallet2 &wallet0, tools::wallet2 &wallet1, unsigned int M)
+{
+ ASSERT_TRUE(M <= 2);
+
+ make_wallet(0, wallet0);
+ make_wallet(1, wallet1);
+
+ std::vector<crypto::secret_key> sk0(1), sk1(1);
+ std::vector<crypto::public_key> pk0(1), pk1(1);
+
+ std::string mi0 = wallet0.get_multisig_info();
+ std::string mi1 = wallet1.get_multisig_info();
+
+ ASSERT_TRUE(wallet0.verify_multisig_info(mi1, sk0[0], pk0[0]));
+ ASSERT_TRUE(wallet1.verify_multisig_info(mi0, sk1[0], pk1[0]));
+
+ ASSERT_FALSE(wallet0.multisig() || wallet1.multisig());
+ wallet0.make_multisig("", sk0, pk0, M);
+ wallet1.make_multisig("", sk1, pk1, M);
+
+ ASSERT_TRUE(wallet0.get_account().get_public_address_str(true) == wallet1.get_account().get_public_address_str(true));
+
+ uint32_t threshold, total;
+ ASSERT_TRUE(wallet0.multisig(&threshold, &total));
+ ASSERT_TRUE(threshold == M);
+ ASSERT_TRUE(total == 2);
+ ASSERT_TRUE(wallet1.multisig(&threshold, &total));
+ ASSERT_TRUE(threshold == M);
+ ASSERT_TRUE(total == 2);
+}
+
+static void make_M_3_wallet(tools::wallet2 &wallet0, tools::wallet2 &wallet1, tools::wallet2 &wallet2, unsigned int M)
+{
+ ASSERT_TRUE(M <= 3);
+
+ make_wallet(0, wallet0);
+ make_wallet(1, wallet1);
+ make_wallet(2, wallet2);
+
+ std::vector<crypto::secret_key> sk0(2), sk1(2), sk2(2);
+ std::vector<crypto::public_key> pk0(2), pk1(2), pk2(2);
+
+ std::string mi0 = wallet0.get_multisig_info();
+ std::string mi1 = wallet1.get_multisig_info();
+ std::string mi2 = wallet2.get_multisig_info();
+
+ ASSERT_TRUE(wallet0.verify_multisig_info(mi1, sk0[0], pk0[0]));
+ ASSERT_TRUE(wallet0.verify_multisig_info(mi2, sk0[1], pk0[1]));
+ ASSERT_TRUE(wallet1.verify_multisig_info(mi0, sk1[0], pk1[0]));
+ ASSERT_TRUE(wallet1.verify_multisig_info(mi2, sk1[1], pk1[1]));
+ ASSERT_TRUE(wallet2.verify_multisig_info(mi0, sk2[0], pk2[0]));
+ ASSERT_TRUE(wallet2.verify_multisig_info(mi1, sk2[1], pk2[1]));
+
+ // not implemented yet
+ if (M < 3)
+ return;
+
+ ASSERT_FALSE(wallet0.multisig() || wallet1.multisig() || wallet2.multisig());
+ wallet0.make_multisig("", sk0, pk0, M);
+ wallet1.make_multisig("", sk1, pk1, M);
+ wallet2.make_multisig("", sk2, pk2, M);
+
+ ASSERT_TRUE(wallet0.get_account().get_public_address_str(true) == wallet1.get_account().get_public_address_str(true));
+ ASSERT_TRUE(wallet0.get_account().get_public_address_str(true) == wallet2.get_account().get_public_address_str(true));
+
+ uint32_t threshold, total;
+ ASSERT_TRUE(wallet0.multisig(&threshold, &total));
+ ASSERT_TRUE(threshold == M);
+ ASSERT_TRUE(total == 3);
+ ASSERT_TRUE(wallet1.multisig(&threshold, &total));
+ ASSERT_TRUE(threshold == M);
+ ASSERT_TRUE(total == 3);
+ ASSERT_TRUE(wallet2.multisig(&threshold, &total));
+ ASSERT_TRUE(threshold == M);
+ ASSERT_TRUE(total == 3);
+}
+
+TEST(multisig, make_2_2)
+{
+ tools::wallet2 wallet0, wallet1;
+ make_M_2_wallet(wallet0, wallet1, 2);
+}
+
+TEST(multisig, make_3_3)
+{
+ tools::wallet2 wallet0, wallet1, wallet2;
+ make_M_3_wallet(wallet0, wallet1, wallet2, 3);
+}
+
+TEST(multisig, make_2_3)
+{
+ tools::wallet2 wallet0, wallet1, wallet2;
+ make_M_3_wallet(wallet0, wallet1, wallet2, 2);
+}