diff options
author | Leonid <logvinov.leon@gmail.com> | 2017-05-25 01:25:24 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-05-25 01:25:24 +0800 |
commit | 140a160ba0627f80f998555438df1d797c75380e (patch) | |
tree | 47a03c741fb5a8eeeb224610c6982fab8f69a868 /test/0x.js.ts | |
parent | b5bd772b240e656ed95150e0d1b6bd77f754aa5c (diff) | |
parent | 945a583e895dfd9488aecdfab1bec22449bf7878 (diff) | |
download | dexon-0x-contracts-140a160ba0627f80f998555438df1d797c75380e.tar.gz dexon-0x-contracts-140a160ba0627f80f998555438df1d797c75380e.tar.zst dexon-0x-contracts-140a160ba0627f80f998555438df1d797c75380e.zip |
Merge pull request #8 from 0xProject/isSignatureValid
Add isSignatureValid method and tests for it
Diffstat (limited to 'test/0x.js.ts')
-rw-r--r-- | test/0x.js.ts | 71 |
1 files changed, 67 insertions, 4 deletions
diff --git a/test/0x.js.ts b/test/0x.js.ts index 65475bf32..d59df8894 100644 --- a/test/0x.js.ts +++ b/test/0x.js.ts @@ -3,10 +3,73 @@ import {expect} from 'chai'; import 'mocha'; describe('ZeroEx library', () => { - describe('#verifySignature', () => { - it('should return undefined', () => { - const zeroEx = new ZeroEx(); - expect(zeroEx.verifySignature()).to.be.undefined; + describe('#isValidSignature', () => { + // This test data was borrowed from the JSON RPC documentation + // Source: https://github.com/ethereum/wiki/wiki/JSON-RPC#eth_sign + const data = '0xdeadbeaf'; + const signature = { + v: 27, + r: '0xa3f20717a250c2b0b729b7e5becbff67fdaef7e0699da4de7ca5895b02a170a1', + s: '0x2d887fd3b17bfdce3481f10bea41f45ba9f709d39ce8325427b57afcfc994cee', + }; + const address = '0x9b2055d370f73ec7d8a03e965129118dc8f5bf83'; + describe('should return false for malformed signature', () => { + it('malformed v', () => { + const malformedSignature = { + v: 34, + r: signature.r, + s: signature.s, + }; + const isValid = ZeroEx.isValidSignature(data, malformedSignature, address); + expect(isValid).to.be.false; + }); + it('r lacks 0x prefix', () => { + const malformedR = signature.r.replace('0x', ''); + const malformedSignature = { + v: signature.v, + r: malformedR, + s: signature.s, + }; + const isValid = ZeroEx.isValidSignature(data, malformedSignature, address); + expect(isValid).to.be.false; + }); + it('r is too short', () => { + const malformedR = signature.r.substr(10); + const malformedSignature = { + v: signature.v, + r: malformedR, + s: signature.s, + }; + const isValid = ZeroEx.isValidSignature(data, malformedSignature, address); + expect(isValid).to.be.false; + }); + it('s is not hex', () => { + const malformedS = signature.s.replace('0', 'z'); + const malformedSignature = { + v: signature.v, + r: signature.r, + s: malformedS, + }; + const isValid = ZeroEx.isValidSignature(data, malformedSignature, address); + expect(isValid).to.be.false; + }); + }); + it('should return false if the data doesn\'t pertain to the signature & address', () => { + const isValid = ZeroEx.isValidSignature('wrong data', signature, address); + expect(isValid).to.be.false; + }); + it('should return false if the address doesn\'t pertain to the signature & data', () => { + const isValid = ZeroEx.isValidSignature(data, signature, '0xIamWrong'); + expect(isValid).to.be.false; + }); + it('should return false if the signature doesn\'t pertain to the data & address', () => { + const wrongSignature = Object.assign({}, signature, {v: 28}); + const isValid = ZeroEx.isValidSignature(data, wrongSignature, address); + expect(isValid).to.be.false; + }); + it('should return true if the signature does pertain to the data & address', () => { + const isValid = ZeroEx.isValidSignature(data, signature, address); + expect(isValid).to.be.true; }); }); }); |