Skip to content

Commit ef6f677

Browse files
committed
Merge pull request #95
79ad6d4 Remove some dead variables in the tests. (Gregory Maxwell) 9974d86 Misc. Warning and cosmetic error cleanups. (Gregory Maxwell)
2 parents 985fd63 + 79ad6d4 commit ef6f677

File tree

2 files changed

+13
-15
lines changed

2 files changed

+13
-15
lines changed

src/tests.c

+11-13
Original file line numberDiff line numberDiff line change
@@ -673,7 +673,6 @@ void random_sign(secp256k1_ecdsa_sig_t *sig, const secp256k1_scalar_t *key, cons
673673
}
674674

675675
void test_ecdsa_sign_verify() {
676-
const secp256k1_ge_consts_t *c = secp256k1_ge_consts;
677676
secp256k1_scalar_t msg, key;
678677
random_scalar_order_test(&msg);
679678
random_scalar_order_test(&key);
@@ -709,7 +708,7 @@ void test_ecdsa_end_to_end() {
709708

710709
// Construct and verify corresponding public key.
711710
CHECK(secp256k1_ec_seckey_verify(privkey) == 1);
712-
char pubkey[65]; int pubkeylen = 65;
711+
unsigned char pubkey[65]; int pubkeylen = 65;
713712
CHECK(secp256k1_ec_pubkey_create(pubkey, &pubkeylen, privkey, secp256k1_rand32() % 2) == 1);
714713
CHECK(secp256k1_ec_pubkey_verify(pubkey, pubkeylen));
715714

@@ -728,7 +727,7 @@ void test_ecdsa_end_to_end() {
728727
int ret2 = secp256k1_ec_pubkey_tweak_add(pubkey, pubkeylen, rnd);
729728
CHECK(ret1 == ret2);
730729
if (ret1 == 0) return;
731-
char pubkey2[65]; int pubkeylen2 = 65;
730+
unsigned char pubkey2[65]; int pubkeylen2 = 65;
732731
CHECK(secp256k1_ec_pubkey_create(pubkey2, &pubkeylen2, privkey, pubkeylen == 33) == 1);
733732
CHECK(memcmp(pubkey, pubkey2, pubkeylen) == 0);
734733
}
@@ -741,13 +740,13 @@ void test_ecdsa_end_to_end() {
741740
int ret2 = secp256k1_ec_pubkey_tweak_mul(pubkey, pubkeylen, rnd);
742741
CHECK(ret1 == ret2);
743742
if (ret1 == 0) return;
744-
char pubkey2[65]; int pubkeylen2 = 65;
743+
unsigned char pubkey2[65]; int pubkeylen2 = 65;
745744
CHECK(secp256k1_ec_pubkey_create(pubkey2, &pubkeylen2, privkey, pubkeylen == 33) == 1);
746745
CHECK(memcmp(pubkey, pubkey2, pubkeylen) == 0);
747746
}
748747

749748
// Sign.
750-
unsigned char signature[72]; unsigned int signaturelen = 72;
749+
unsigned char signature[72]; int signaturelen = 72;
751750
while(1) {
752751
unsigned char rnd[32];
753752
secp256k1_rand256_test(rnd);
@@ -762,7 +761,7 @@ void test_ecdsa_end_to_end() {
762761
CHECK(secp256k1_ecdsa_verify(message, 32, signature, signaturelen, pubkey, pubkeylen) != 1);
763762

764763
// Compact sign.
765-
unsigned char csignature[64]; unsigned int recid = 0;
764+
unsigned char csignature[64]; int recid = 0;
766765
while(1) {
767766
unsigned char rnd[32];
768767
secp256k1_rand256_test(rnd);
@@ -771,7 +770,7 @@ void test_ecdsa_end_to_end() {
771770
}
772771
}
773772
// Recover.
774-
unsigned char recpubkey[65]; unsigned recpubkeylen = 0;
773+
unsigned char recpubkey[65]; int recpubkeylen = 0;
775774
CHECK(secp256k1_ecdsa_recover_compact(message, 32, csignature, recpubkey, &recpubkeylen, pubkeylen == 33, recid) == 1);
776775
CHECK(recpubkeylen == pubkeylen);
777776
CHECK(memcmp(pubkey, recpubkey, pubkeylen) == 0);
@@ -804,7 +803,6 @@ EC_KEY *get_openssl_key(const secp256k1_scalar_t *key) {
804803
}
805804

806805
void test_ecdsa_openssl() {
807-
const secp256k1_ge_consts_t *c = secp256k1_ge_consts;
808806
secp256k1_scalar_t key, msg;
809807
unsigned char message[32];
810808
secp256k1_rand256_test(message);
@@ -817,7 +815,7 @@ void test_ecdsa_openssl() {
817815
EC_KEY *ec_key = get_openssl_key(&key);
818816
CHECK(ec_key);
819817
unsigned char signature[80];
820-
int sigsize = 80;
818+
unsigned int sigsize = 80;
821819
CHECK(ECDSA_sign(0, message, sizeof(message), signature, &sigsize, ec_key));
822820
secp256k1_ecdsa_sig_t sig;
823821
CHECK(secp256k1_ecdsa_sig_parse(&sig, signature, sigsize));
@@ -828,9 +826,9 @@ void test_ecdsa_openssl() {
828826
CHECK(!secp256k1_ecdsa_sig_verify(&sig, &q, &msg_num));
829827

830828
random_sign(&sig, &key, &msg, NULL);
831-
sigsize = 80;
832-
CHECK(secp256k1_ecdsa_sig_serialize(signature, &sigsize, &sig));
833-
CHECK(ECDSA_verify(0, message, sizeof(message), signature, sigsize, ec_key) == 1);
829+
int secp_sigsize = 80;
830+
CHECK(secp256k1_ecdsa_sig_serialize(signature, &secp_sigsize, &sig));
831+
CHECK(ECDSA_verify(0, message, sizeof(message), signature, secp_sigsize, ec_key) == 1);
834832

835833
EC_KEY_free(ec_key);
836834
}
@@ -893,7 +891,7 @@ int main(int argc, char **argv) {
893891
run_ecdsa_openssl();
894892
#endif
895893

896-
printf("random run = %llu\n", (unsigned long long)secp256k1_rand32() + (unsigned long long)secp256k1_rand32() << 32);
894+
printf("random run = %llu\n", (unsigned long long)secp256k1_rand32() + ((unsigned long long)secp256k1_rand32() << 32));
897895

898896
// shutdown
899897
secp256k1_stop();

src/util.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -34,14 +34,14 @@
3434
#ifndef NDEBUG
3535
#define DEBUG_CHECK CHECK
3636
#else
37-
#define DEBUG_CHECK(cond) do { (cond); } while(0)
37+
#define DEBUG_CHECK(cond) do { (void)(cond); } while(0)
3838
#endif
3939

4040
// Like DEBUG_CHECK(), but when VERIFY is defined instead of NDEBUG not defined.
4141
#ifdef VERIFY
4242
#define VERIFY_CHECK CHECK
4343
#else
44-
#define VERIFY_CHECK(cond) do { (cond); } while(0)
44+
#define VERIFY_CHECK(cond) do { (void)(cond); } while(0)
4545
#endif
4646

4747
/** Seed the pseudorandom number generator. */

0 commit comments

Comments
 (0)