@@ -19,13 +19,13 @@ package ledger_filecoin_go
19
19
import (
20
20
"encoding/hex"
21
21
"fmt"
22
- "testing"
23
-
24
- "github.com/btcsuite/btcd"
22
+ "github.com/btcsuite/btcd/btcec/v2"
23
+ ecdsa "github.com/btcsuite/btcd/btcec/v2/ecdsa"
25
24
"github.com/ipsn/go-secp256k1"
26
25
"github.com/stretchr/testify/assert"
27
26
"github.com/stretchr/testify/require"
28
27
"golang.org/x/crypto/blake2b"
28
+ "testing"
29
29
)
30
30
31
31
// Ledger Test Mnemonic: equip will roof matter pink blind book anxiety banner elbow sun young
@@ -66,7 +66,7 @@ func Test_UserGetPublicKey(t *testing.T) {
66
66
67
67
path := []uint32 {44 , 461 , 5 , 0 , 21 }
68
68
69
- pubKey , err := app .GetPublicKeySECP256K1 (path )
69
+ pubKey , err := app .GetPublicKey (path )
70
70
if err != nil {
71
71
t .Fatalf ("Detected error, err: %s\n " , err .Error ())
72
72
}
@@ -90,7 +90,7 @@ func Test_GetAddressPubKeySECP256K1_Zero(t *testing.T) {
90
90
91
91
path := []uint32 {44 , 461 , 0 , 0 , 0 }
92
92
93
- pubKey , addrByte , addrString , err := app .GetAddressPubKeySECP256K1 (path )
93
+ pubKey , addrByte , addrString , err := app .GetAddressPubKey (path )
94
94
if err != nil {
95
95
t .Fatalf ("Detected error, err: %s\n " , err .Error ())
96
96
}
@@ -116,7 +116,7 @@ func Test_GetAddressPubKeySECP256K1(t *testing.T) {
116
116
117
117
path := []uint32 {44 , 461 , 5 , 0 , 21 }
118
118
119
- pubKey , addrByte , addrString , err := app .GetAddressPubKeySECP256K1 (path )
119
+ pubKey , addrByte , addrString , err := app .GetAddressPubKey (path )
120
120
if err != nil {
121
121
t .Fatalf ("Detected error, err: %s\n " , err .Error ())
122
122
}
@@ -142,7 +142,7 @@ func Test_ShowAddressPubKeySECP256K1(t *testing.T) {
142
142
143
143
path := []uint32 {44 , 461 , 5 , 0 , 21 }
144
144
145
- pubKey , addrByte , addrString , err := app .ShowAddressPubKeySECP256K1 (path )
145
+ pubKey , addrByte , addrString , err := app .ShowAddressPubKey (path )
146
146
if err != nil {
147
147
t .Fatalf ("Detected error, err: %s\n " , err .Error ())
148
148
}
@@ -185,7 +185,7 @@ func Test_UserPK_HDPaths(t *testing.T) {
185
185
for i := uint32 (0 ); i < 10 ; i ++ {
186
186
path [4 ] = i
187
187
188
- pubKey , err := app .GetPublicKeySECP256K1 (path )
188
+ pubKey , err := app .GetPublicKey (path )
189
189
if err != nil {
190
190
t .Fatalf ("Detected error, err: %s\n " , err .Error ())
191
191
}
@@ -214,24 +214,24 @@ func Test_Sign(t *testing.T) {
214
214
215
215
message , _ := hex .DecodeString ("8a0058310396a1a3e4ea7a14d49985e661b22401d44fed402d1d0925b243c923589c0fbc7e32cd04e29ed78d15d37d3aaa3fe6da3358310386b454258c589475f7d16f5aac018a79f6c1169d20fc33921dd8b5ce1cac6c348f90a3603624f6aeb91b64518c2e80950144000186a01961a8430009c44200000040" )
216
216
217
- signature , err := app .SignSECP256K1 (path , message )
217
+ signature , err := app .Sign (path , message )
218
218
if err != nil {
219
219
t .Fatalf ("[Sign] Error: %s\n " , err .Error ())
220
220
}
221
221
222
222
// Verify Signature
223
- pubKey , err := app .GetPublicKeySECP256K1 (path )
223
+ pubKey , err := app .GetPublicKey (path )
224
224
if err != nil {
225
225
t .Fatalf ("Detected error, err: %s\n " , err .Error ())
226
226
}
227
227
228
- pub2 , err := btcec .ParsePubKey (pubKey , btcec . S256 () )
228
+ pub2 , err := btcec .ParsePubKey (pubKey )
229
229
if err != nil {
230
230
t .Fatalf ("[ParsePK] Error: " + err .Error ())
231
231
return
232
232
}
233
233
234
- sig2 , err := btcec .ParseDERSignature (signature .derSignature , btcec . S256 () )
234
+ sig2 , err := ecdsa .ParseDERSignature (signature .derSignature )
235
235
if err != nil {
236
236
t .Fatalf ("[ParseSig] Error: " + err .Error ())
237
237
return
@@ -261,24 +261,24 @@ func Test_Sign2(t *testing.T) {
261
261
262
262
message , _ := hex .DecodeString ("8a0055019f4c34943e4b92f4542bed08af54be955629fc6f5501ef8fd1e48a1e0f1a49310ec675bc677a3954147400430003e81903e84200014200010040" )
263
263
264
- signature , err := app .SignSECP256K1 (path , message )
264
+ signature , err := app .Sign (path , message )
265
265
if err != nil {
266
266
t .Fatalf ("[Sign] Error: %s\n " , err .Error ())
267
267
}
268
268
269
269
// Verify Signature
270
- pubKey , err := app .GetPublicKeySECP256K1 (path )
270
+ pubKey , err := app .GetPublicKey (path )
271
271
if err != nil {
272
272
t .Fatalf ("Detected error, err: %s\n " , err .Error ())
273
273
}
274
274
275
- pub2 , err := btcec .ParsePubKey (pubKey , btcec . S256 () )
275
+ pub2 , err := btcec .ParsePubKey (pubKey )
276
276
if err != nil {
277
277
t .Fatalf ("[ParsePK] Error: " + err .Error ())
278
278
return
279
279
}
280
280
281
- sig2 , err := btcec .ParseDERSignature (signature .derSignature , btcec . S256 () )
281
+ sig2 , err := ecdsa .ParseDERSignature (signature .derSignature )
282
282
if err != nil {
283
283
t .Fatalf ("[ParseSig] Error: " + err .Error ())
284
284
return
@@ -310,24 +310,24 @@ func Test_Sign3(t *testing.T) {
310
310
311
311
message , _ := hex .DecodeString ("8a0055019f4c34943e4b92f4542bed08af54be955629fc6f5501ef8fd1e48a1e0f1a49310ec675bc677a3954147400430003e81903e84200014200010040" )
312
312
313
- signature , err := app .SignSECP256K1 (path , message )
313
+ signature , err := app .Sign (path , message )
314
314
if err != nil {
315
315
t .Fatalf ("[Sign] Error: %s\n " , err .Error ())
316
316
}
317
317
318
318
// Verify Signature
319
- pubKey , err := app .GetPublicKeySECP256K1 (path )
319
+ pubKey , err := app .GetPublicKey (path )
320
320
if err != nil {
321
321
t .Fatalf ("Detected error, err: %s\n " , err .Error ())
322
322
}
323
323
324
- pub2 , err := btcec .ParsePubKey (pubKey , btcec . S256 () )
324
+ pub2 , err := btcec .ParsePubKey (pubKey )
325
325
if err != nil {
326
326
t .Fatalf ("[ParsePK] Error: " + err .Error ())
327
327
return
328
328
}
329
329
330
- sig2 , err := btcec .ParseDERSignature (signature .derSignature , btcec . S256 () )
330
+ sig2 , err := ecdsa .ParseDERSignature (signature .derSignature )
331
331
if err != nil {
332
332
t .Fatalf ("[ParseSig] Error: " + err .Error ())
333
333
return
@@ -377,7 +377,7 @@ func Test_Sign_Fails(t *testing.T) {
377
377
garbage := []byte {65 }
378
378
message = append (garbage , message ... )
379
379
380
- _ , err = app .SignSECP256K1 (path , message )
380
+ _ , err = app .Sign (path , message )
381
381
assert .Error (t , err )
382
382
errMessage := err .Error ()
383
383
assert .Equal (t , errMessage , "Unexpected data type" )
@@ -386,7 +386,7 @@ func Test_Sign_Fails(t *testing.T) {
386
386
garbage = []byte {65 }
387
387
message = append (message , garbage ... )
388
388
389
- _ , err = app .SignSECP256K1 (path , message )
389
+ _ , err = app .Sign (path , message )
390
390
assert .Error (t , err )
391
391
errMessage = err .Error ()
392
392
assert .Equal (t , errMessage , "Unexpected CBOR EOF" )
0 commit comments