@@ -93,12 +93,12 @@ fn ecdsa_secp256k1_sha256() {
93
93
tested += 1 ;
94
94
assert_eq ! ( tc. tc_id as usize , tested) ;
95
95
// eprintln!("Test case ID: {}", tc.tc_id);
96
+ let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
97
+ let message_hash = hashers:: sha256 ( & message) ;
98
+ let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
96
99
97
100
match tc. result . as_str ( ) {
98
101
"valid" | "acceptable" => {
99
- let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
100
- let message_hash = hashers:: sha256 ( & message) ;
101
- let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
102
102
let signature = from_der ( & der_signature) . unwrap ( ) ;
103
103
let valid = secp256k1_verify ( & message_hash, & signature, & public_key) . unwrap ( ) ;
104
104
assert ! ( valid) ;
@@ -107,10 +107,6 @@ fn ecdsa_secp256k1_sha256() {
107
107
}
108
108
}
109
109
"invalid" => {
110
- let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
111
- let message_hash = hashers:: sha256 ( & message) ;
112
- let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
113
-
114
110
if let Ok ( signature) = from_der ( & der_signature) {
115
111
match secp256k1_verify ( & message_hash, & signature, & public_key) {
116
112
Ok ( valid) => assert ! ( !valid) ,
@@ -145,12 +141,12 @@ fn ecdsa_secp256k1_sha512() {
145
141
tested += 1 ;
146
142
assert_eq ! ( tc. tc_id as usize , tested) ;
147
143
// eprintln!("Test case ID: {}", tc.tc_id);
144
+ let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
145
+ let message_hash = hashers:: sha512 ( & message) ;
146
+ let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
148
147
149
148
match tc. result . as_str ( ) {
150
149
"valid" | "acceptable" => {
151
- let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
152
- let message_hash = hashers:: sha512 ( & message) ;
153
- let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
154
150
let signature = from_der ( & der_signature) . unwrap ( ) ;
155
151
let valid = secp256k1_verify ( & message_hash, & signature, & public_key) . unwrap ( ) ;
156
152
assert ! ( valid) ;
@@ -159,10 +155,6 @@ fn ecdsa_secp256k1_sha512() {
159
155
}
160
156
}
161
157
"invalid" => {
162
- let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
163
- let message_hash = hashers:: sha512 ( & message) ;
164
- let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
165
-
166
158
if let Ok ( signature) = from_der ( & der_signature) {
167
159
match secp256k1_verify ( & message_hash, & signature, & public_key) {
168
160
Ok ( valid) => assert ! ( !valid) ,
@@ -197,12 +189,12 @@ fn ecdsa_secp256k1_sha3_256() {
197
189
tested += 1 ;
198
190
assert_eq ! ( tc. tc_id as usize , tested) ;
199
191
// eprintln!("Test case ID: {}", tc.tc_id);
192
+ let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
193
+ let message_hash = hashers:: sha3_256 ( & message) ;
194
+ let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
200
195
201
196
match tc. result . as_str ( ) {
202
197
"valid" | "acceptable" => {
203
- let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
204
- let message_hash = hashers:: sha3_256 ( & message) ;
205
- let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
206
198
let signature = from_der ( & der_signature) . unwrap ( ) ;
207
199
let valid = secp256k1_verify ( & message_hash, & signature, & public_key) . unwrap ( ) ;
208
200
assert ! ( valid) ;
@@ -211,10 +203,6 @@ fn ecdsa_secp256k1_sha3_256() {
211
203
}
212
204
}
213
205
"invalid" => {
214
- let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
215
- let message_hash = hashers:: sha3_256 ( & message) ;
216
- let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
217
-
218
206
if let Ok ( signature) = from_der ( & der_signature) {
219
207
match secp256k1_verify ( & message_hash, & signature, & public_key) {
220
208
Ok ( valid) => assert ! ( !valid) ,
@@ -249,12 +237,12 @@ fn ecdsa_secp256k1_sha3_512() {
249
237
tested += 1 ;
250
238
assert_eq ! ( tc. tc_id as usize , tested) ;
251
239
// eprintln!("Test case ID: {}", tc.tc_id);
240
+ let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
241
+ let message_hash = hashers:: sha3_512 ( & message) ;
242
+ let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
252
243
253
244
match tc. result . as_str ( ) {
254
245
"valid" | "acceptable" => {
255
- let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
256
- let message_hash = hashers:: sha3_512 ( & message) ;
257
- let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
258
246
let signature = from_der ( & der_signature) . unwrap ( ) ;
259
247
let valid = secp256k1_verify ( & message_hash, & signature, & public_key) . unwrap ( ) ;
260
248
assert ! ( valid) ;
@@ -263,10 +251,6 @@ fn ecdsa_secp256k1_sha3_512() {
263
251
}
264
252
}
265
253
"invalid" => {
266
- let message = hex:: decode ( tc. msg ) . unwrap ( ) ;
267
- let message_hash = hashers:: sha3_512 ( & message) ;
268
- let der_signature = hex:: decode ( tc. sig ) . unwrap ( ) ;
269
-
270
254
if let Ok ( signature) = from_der ( & der_signature) {
271
255
match secp256k1_verify ( & message_hash, & signature, & public_key) {
272
256
Ok ( valid) => assert ! ( !valid) ,
0 commit comments