aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorkiel barry <kiel.j.barry@gmail.com>2018-05-09 07:17:09 +0800
committerFelix Lange <fjl@users.noreply.github.com>2018-05-09 07:17:09 +0800
commitba975dc0931b9f2962b2f163675772458ed339fd (patch)
tree9e2e4d2265cfdad52289d15abcc9f2b56fcddebe
parenteab6e5a317acf67409f82bc5c1f4d959413dfd47 (diff)
downloaddexon-ba975dc0931b9f2962b2f163675772458ed339fd.tar.gz
dexon-ba975dc0931b9f2962b2f163675772458ed339fd.tar.zst
dexon-ba975dc0931b9f2962b2f163675772458ed339fd.zip
crypto: fix golint warnings (#16710)
-rw-r--r--crypto/crypto.go12
-rw-r--r--crypto/crypto_test.go8
-rw-r--r--crypto/secp256k1/curve.go2
-rw-r--r--crypto/secp256k1/secp256_test.go2
-rw-r--r--crypto/signature_nocgo.go2
5 files changed, 13 insertions, 13 deletions
diff --git a/crypto/crypto.go b/crypto/crypto.go
index 1c4d5a2e0..76d1ffaf6 100644
--- a/crypto/crypto.go
+++ b/crypto/crypto.go
@@ -35,8 +35,8 @@ import (
)
var (
- secp256k1_N, _ = new(big.Int).SetString("fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141", 16)
- secp256k1_halfN = new(big.Int).Div(secp256k1_N, big.NewInt(2))
+ secp256k1N, _ = new(big.Int).SetString("fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141", 16)
+ secp256k1halfN = new(big.Int).Div(secp256k1N, big.NewInt(2))
)
// Keccak256 calculates and returns the Keccak256 hash of the input data.
@@ -68,7 +68,7 @@ func Keccak512(data ...[]byte) []byte {
return d.Sum(nil)
}
-// Creates an ethereum address given the bytes and the nonce
+// CreateAddress creates an ethereum address given the bytes and the nonce
func CreateAddress(b common.Address, nonce uint64) common.Address {
data, _ := rlp.EncodeToBytes([]interface{}{b, nonce})
return common.BytesToAddress(Keccak256(data)[12:])
@@ -99,7 +99,7 @@ func toECDSA(d []byte, strict bool) (*ecdsa.PrivateKey, error) {
priv.D = new(big.Int).SetBytes(d)
// The priv.D must < N
- if priv.D.Cmp(secp256k1_N) >= 0 {
+ if priv.D.Cmp(secp256k1N) >= 0 {
return nil, fmt.Errorf("invalid private key, >=N")
}
// The priv.D must not be zero or negative.
@@ -184,11 +184,11 @@ func ValidateSignatureValues(v byte, r, s *big.Int, homestead bool) bool {
}
// reject upper range of s values (ECDSA malleability)
// see discussion in secp256k1/libsecp256k1/include/secp256k1.h
- if homestead && s.Cmp(secp256k1_halfN) > 0 {
+ if homestead && s.Cmp(secp256k1halfN) > 0 {
return false
}
// Frontier: allow s to be in full N range
- return r.Cmp(secp256k1_N) < 0 && s.Cmp(secp256k1_N) < 0 && (v == 0 || v == 1)
+ return r.Cmp(secp256k1N) < 0 && s.Cmp(secp256k1N) < 0 && (v == 0 || v == 1)
}
func PubkeyToAddress(p ecdsa.PublicKey) common.Address {
diff --git a/crypto/crypto_test.go b/crypto/crypto_test.go
index 835035462..804de3fe2 100644
--- a/crypto/crypto_test.go
+++ b/crypto/crypto_test.go
@@ -154,7 +154,7 @@ func TestValidateSignatureValues(t *testing.T) {
minusOne := big.NewInt(-1)
one := common.Big1
zero := common.Big0
- secp256k1nMinus1 := new(big.Int).Sub(secp256k1_N, common.Big1)
+ secp256k1nMinus1 := new(big.Int).Sub(secp256k1N, common.Big1)
// correct v,r,s
check(true, 0, one, one)
@@ -181,9 +181,9 @@ func TestValidateSignatureValues(t *testing.T) {
// correct sig with max r,s
check(true, 0, secp256k1nMinus1, secp256k1nMinus1)
// correct v, combinations of incorrect r,s at upper limit
- check(false, 0, secp256k1_N, secp256k1nMinus1)
- check(false, 0, secp256k1nMinus1, secp256k1_N)
- check(false, 0, secp256k1_N, secp256k1_N)
+ check(false, 0, secp256k1N, secp256k1nMinus1)
+ check(false, 0, secp256k1nMinus1, secp256k1N)
+ check(false, 0, secp256k1N, secp256k1N)
// current callers ensures r,s cannot be negative, but let's test for that too
// as crypto package could be used stand-alone
diff --git a/crypto/secp256k1/curve.go b/crypto/secp256k1/curve.go
index f51be5e35..6fdf2be6a 100644
--- a/crypto/secp256k1/curve.go
+++ b/crypto/secp256k1/curve.go
@@ -77,7 +77,7 @@ func (BitCurve *BitCurve) Params() *elliptic.CurveParams {
}
}
-// IsOnBitCurve returns true if the given (x,y) lies on the BitCurve.
+// IsOnCurve returns true if the given (x,y) lies on the BitCurve.
func (BitCurve *BitCurve) IsOnCurve(x, y *big.Int) bool {
// y² = x³ + b
y2 := new(big.Int).Mul(y, y) //y²
diff --git a/crypto/secp256k1/secp256_test.go b/crypto/secp256k1/secp256_test.go
index f6582ecd5..b608bcfcf 100644
--- a/crypto/secp256k1/secp256_test.go
+++ b/crypto/secp256k1/secp256_test.go
@@ -49,7 +49,7 @@ func randSig() []byte {
// tests for malleability
// highest bit of signature ECDSA s value must be 0, in the 33th byte
func compactSigCheck(t *testing.T, sig []byte) {
- var b int = int(sig[32])
+ var b = int(sig[32])
if b < 0 {
t.Errorf("highest bit is negative: %d", b)
}
diff --git a/crypto/signature_nocgo.go b/crypto/signature_nocgo.go
index f636b2377..e8fa18ed4 100644
--- a/crypto/signature_nocgo.go
+++ b/crypto/signature_nocgo.go
@@ -88,7 +88,7 @@ func VerifySignature(pubkey, hash, signature []byte) bool {
return false
}
// Reject malleable signatures. libsecp256k1 does this check but btcec doesn't.
- if sig.S.Cmp(secp256k1_halfN) > 0 {
+ if sig.S.Cmp(secp256k1halfN) > 0 {
return false
}
return sig.Verify(hash, key)