@@ -673,7 +673,6 @@ void random_sign(secp256k1_ecdsa_sig_t *sig, const secp256k1_scalar_t *key, cons
673
673
}
674
674
675
675
void test_ecdsa_sign_verify () {
676
- const secp256k1_ge_consts_t * c = secp256k1_ge_consts ;
677
676
secp256k1_scalar_t msg , key ;
678
677
random_scalar_order_test (& msg );
679
678
random_scalar_order_test (& key );
@@ -709,7 +708,7 @@ void test_ecdsa_end_to_end() {
709
708
710
709
// Construct and verify corresponding public key.
711
710
CHECK (secp256k1_ec_seckey_verify (privkey ) == 1 );
712
- char pubkey [65 ]; int pubkeylen = 65 ;
711
+ unsigned char pubkey [65 ]; int pubkeylen = 65 ;
713
712
CHECK (secp256k1_ec_pubkey_create (pubkey , & pubkeylen , privkey , secp256k1_rand32 () % 2 ) == 1 );
714
713
CHECK (secp256k1_ec_pubkey_verify (pubkey , pubkeylen ));
715
714
@@ -728,7 +727,7 @@ void test_ecdsa_end_to_end() {
728
727
int ret2 = secp256k1_ec_pubkey_tweak_add (pubkey , pubkeylen , rnd );
729
728
CHECK (ret1 == ret2 );
730
729
if (ret1 == 0 ) return ;
731
- char pubkey2 [65 ]; int pubkeylen2 = 65 ;
730
+ unsigned char pubkey2 [65 ]; int pubkeylen2 = 65 ;
732
731
CHECK (secp256k1_ec_pubkey_create (pubkey2 , & pubkeylen2 , privkey , pubkeylen == 33 ) == 1 );
733
732
CHECK (memcmp (pubkey , pubkey2 , pubkeylen ) == 0 );
734
733
}
@@ -741,13 +740,13 @@ void test_ecdsa_end_to_end() {
741
740
int ret2 = secp256k1_ec_pubkey_tweak_mul (pubkey , pubkeylen , rnd );
742
741
CHECK (ret1 == ret2 );
743
742
if (ret1 == 0 ) return ;
744
- char pubkey2 [65 ]; int pubkeylen2 = 65 ;
743
+ unsigned char pubkey2 [65 ]; int pubkeylen2 = 65 ;
745
744
CHECK (secp256k1_ec_pubkey_create (pubkey2 , & pubkeylen2 , privkey , pubkeylen == 33 ) == 1 );
746
745
CHECK (memcmp (pubkey , pubkey2 , pubkeylen ) == 0 );
747
746
}
748
747
749
748
// Sign.
750
- unsigned char signature [72 ]; unsigned int signaturelen = 72 ;
749
+ unsigned char signature [72 ]; int signaturelen = 72 ;
751
750
while (1 ) {
752
751
unsigned char rnd [32 ];
753
752
secp256k1_rand256_test (rnd );
@@ -762,7 +761,7 @@ void test_ecdsa_end_to_end() {
762
761
CHECK (secp256k1_ecdsa_verify (message , 32 , signature , signaturelen , pubkey , pubkeylen ) != 1 );
763
762
764
763
// Compact sign.
765
- unsigned char csignature [64 ]; unsigned int recid = 0 ;
764
+ unsigned char csignature [64 ]; int recid = 0 ;
766
765
while (1 ) {
767
766
unsigned char rnd [32 ];
768
767
secp256k1_rand256_test (rnd );
@@ -771,7 +770,7 @@ void test_ecdsa_end_to_end() {
771
770
}
772
771
}
773
772
// Recover.
774
- unsigned char recpubkey [65 ]; unsigned recpubkeylen = 0 ;
773
+ unsigned char recpubkey [65 ]; int recpubkeylen = 0 ;
775
774
CHECK (secp256k1_ecdsa_recover_compact (message , 32 , csignature , recpubkey , & recpubkeylen , pubkeylen == 33 , recid ) == 1 );
776
775
CHECK (recpubkeylen == pubkeylen );
777
776
CHECK (memcmp (pubkey , recpubkey , pubkeylen ) == 0 );
@@ -804,7 +803,6 @@ EC_KEY *get_openssl_key(const secp256k1_scalar_t *key) {
804
803
}
805
804
806
805
void test_ecdsa_openssl () {
807
- const secp256k1_ge_consts_t * c = secp256k1_ge_consts ;
808
806
secp256k1_scalar_t key , msg ;
809
807
unsigned char message [32 ];
810
808
secp256k1_rand256_test (message );
@@ -817,7 +815,7 @@ void test_ecdsa_openssl() {
817
815
EC_KEY * ec_key = get_openssl_key (& key );
818
816
CHECK (ec_key );
819
817
unsigned char signature [80 ];
820
- int sigsize = 80 ;
818
+ unsigned int sigsize = 80 ;
821
819
CHECK (ECDSA_sign (0 , message , sizeof (message ), signature , & sigsize , ec_key ));
822
820
secp256k1_ecdsa_sig_t sig ;
823
821
CHECK (secp256k1_ecdsa_sig_parse (& sig , signature , sigsize ));
@@ -828,9 +826,9 @@ void test_ecdsa_openssl() {
828
826
CHECK (!secp256k1_ecdsa_sig_verify (& sig , & q , & msg_num ));
829
827
830
828
random_sign (& sig , & key , & msg , NULL );
831
- sigsize = 80 ;
832
- CHECK (secp256k1_ecdsa_sig_serialize (signature , & sigsize , & sig ));
833
- CHECK (ECDSA_verify (0 , message , sizeof (message ), signature , sigsize , ec_key ) == 1 );
829
+ int secp_sigsize = 80 ;
830
+ CHECK (secp256k1_ecdsa_sig_serialize (signature , & secp_sigsize , & sig ));
831
+ CHECK (ECDSA_verify (0 , message , sizeof (message ), signature , secp_sigsize , ec_key ) == 1 );
834
832
835
833
EC_KEY_free (ec_key );
836
834
}
@@ -893,7 +891,7 @@ int main(int argc, char **argv) {
893
891
run_ecdsa_openssl ();
894
892
#endif
895
893
896
- printf ("random run = %llu\n" , (unsigned long long )secp256k1_rand32 () + (unsigned long long )secp256k1_rand32 () << 32 );
894
+ printf ("random run = %llu\n" , (unsigned long long )secp256k1_rand32 () + (( unsigned long long )secp256k1_rand32 () << 32 ) );
897
895
898
896
// shutdown
899
897
secp256k1_stop ();
0 commit comments