forked from NebulousLabs/merkletree
-
Notifications
You must be signed in to change notification settings - Fork 0
/
readers_test.go
111 lines (101 loc) · 3.11 KB
/
readers_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
package merkletree
import (
"bytes"
"crypto/sha256"
"testing"
)
// TestReaderRoot calls ReaderRoot on a manually crafted dataset
// and checks the output.
func TestReaderRoot(t *testing.T) {
mt := CreateMerkleTester(t)
bytes8 := []byte{0, 1, 2, 3, 4, 5, 6, 7}
reader := bytes.NewReader(bytes8)
root, err := ReaderRoot(reader, sha256.New(), 1)
if err != nil {
t.Fatal(err)
}
if bytes.Compare(root, mt.roots[8]) != 0 {
t.Error("ReaderRoot returned the wrong root")
}
}
// TestReaderRootPadding passes ReaderRoot a reader that has too few bytes to
// fill the last segment. The segment should not be padded out.
func TestReaderRootPadding(t *testing.T) {
bytes1 := []byte{1}
reader := bytes.NewReader(bytes1)
root, err := ReaderRoot(reader, sha256.New(), 2)
if err != nil {
t.Fatal(err)
}
expectedRoot := sum(sha256.New(), []byte{0, 1})
if bytes.Compare(root, expectedRoot) != 0 {
t.Error("ReaderRoot returned the wrong root")
}
bytes3 := []byte{1, 2, 3}
reader = bytes.NewReader(bytes3)
root, err = ReaderRoot(reader, sha256.New(), 2)
if err != nil {
t.Fatal(err)
}
baseLeft := sum(sha256.New(), []byte{0, 1, 2})
baseRight := sum(sha256.New(), []byte{0, 3})
expectedRoot = sum(sha256.New(), append(append([]byte{1}, baseLeft...), baseRight...))
if bytes.Compare(root, expectedRoot) != 0 {
t.Error("ReaderRoot returned the wrong root")
}
}
// TestBuildReaderProof calls BuildReaderProof on a manually crafted dataset
// and checks the output.
func TestBuilReaderProof(t *testing.T) {
mt := CreateMerkleTester(t)
bytes7 := []byte{0, 1, 2, 3, 4, 5, 6}
reader := bytes.NewReader(bytes7)
root, proofSet, numLeaves, err := BuildReaderProof(reader, sha256.New(), 1, 5)
if err != nil {
t.Fatal(err)
}
if bytes.Compare(root, mt.roots[7]) != 0 {
t.Error("BuildReaderProof returned the wrong root")
}
if len(proofSet) != len(mt.proofSets[7][5]) {
t.Fatal("BuildReaderProof returned a proof with the wrong length")
}
for i := range proofSet {
if bytes.Compare(proofSet[i], mt.proofSets[7][5][i]) != 0 {
t.Error("BuildReaderProof returned an incorrect proof")
}
}
if numLeaves != 7 {
t.Error("BuildReaderProof returned the wrong number of leaves")
}
}
// TestBuildReaderProofPadding passes BuildReaderProof a reader that has too
// few bytes to fill the last segment. The segment should not be padded out.
func TestBuildReaderProofPadding(t *testing.T) {
bytes1 := []byte{1}
reader := bytes.NewReader(bytes1)
root, proofSet, numLeaves, err := BuildReaderProof(reader, sha256.New(), 2, 0)
if err != nil {
t.Fatal(err)
}
expectedRoot := sum(sha256.New(), []byte{0, 1})
if bytes.Compare(root, expectedRoot) != 0 {
t.Error("ReaderRoot returned the wrong root")
}
if len(proofSet) != 1 {
t.Fatal("proofSet is the incorrect length")
}
if bytes.Compare(proofSet[0], []byte{1}) != 0 {
t.Error("proofSet is incorrect")
}
if numLeaves != 1 {
t.Error("wrong number of leaves returned")
}
}
// TestEmptyReader passes an empty reader into BuildReaderProof.
func TestEmptyReader(t *testing.T) {
_, _, _, err := BuildReaderProof(new(bytes.Reader), sha256.New(), 64, 5)
if err == nil {
t.Error(err)
}
}