29
29
30
30
static int COUNT = 64 ;
31
31
static secp256k1_context * CTX = NULL ;
32
- static secp256k1_context * STTC = NULL ;
32
+ static secp256k1_context * STATIC_CTX = NULL ;
33
33
34
34
static void counting_illegal_callback_fn (const char * str , void * data ) {
35
35
/* Dummy callback function that just counts. */
@@ -185,46 +185,46 @@ void run_ec_illegal_argument_tests(void) {
185
185
unsigned char ctmp [32 ];
186
186
187
187
/* Setup */
188
- secp256k1_context_set_illegal_callback (STTC , counting_illegal_callback_fn , & ecount );
188
+ secp256k1_context_set_illegal_callback (STATIC_CTX , counting_illegal_callback_fn , & ecount );
189
189
secp256k1_context_set_illegal_callback (CTX , counting_illegal_callback_fn , & ecount2 );
190
190
memset (ctmp , 1 , 32 );
191
191
memset (& zero_pubkey , 0 , sizeof (zero_pubkey ));
192
192
193
193
/* Verify context-type checking illegal-argument errors. */
194
- CHECK (secp256k1_ec_pubkey_create (STTC , & pubkey , ctmp ) == 0 );
194
+ CHECK (secp256k1_ec_pubkey_create (STATIC_CTX , & pubkey , ctmp ) == 0 );
195
195
CHECK (ecount == 1 );
196
196
VG_UNDEF (& pubkey , sizeof (pubkey ));
197
197
CHECK (secp256k1_ec_pubkey_create (CTX , & pubkey , ctmp ) == 1 );
198
198
VG_CHECK (& pubkey , sizeof (pubkey ));
199
- CHECK (secp256k1_ecdsa_sign (STTC , & sig , ctmp , ctmp , NULL , NULL ) == 0 );
199
+ CHECK (secp256k1_ecdsa_sign (STATIC_CTX , & sig , ctmp , ctmp , NULL , NULL ) == 0 );
200
200
CHECK (ecount == 2 );
201
201
VG_UNDEF (& sig , sizeof (sig ));
202
202
CHECK (secp256k1_ecdsa_sign (CTX , & sig , ctmp , ctmp , NULL , NULL ) == 1 );
203
203
VG_CHECK (& sig , sizeof (sig ));
204
204
CHECK (ecount2 == 10 );
205
205
CHECK (secp256k1_ecdsa_verify (CTX , & sig , ctmp , & pubkey ) == 1 );
206
206
CHECK (ecount2 == 10 );
207
- CHECK (secp256k1_ecdsa_verify (STTC , & sig , ctmp , & pubkey ) == 1 );
207
+ CHECK (secp256k1_ecdsa_verify (STATIC_CTX , & sig , ctmp , & pubkey ) == 1 );
208
208
CHECK (ecount == 2 );
209
209
CHECK (secp256k1_ec_pubkey_tweak_add (CTX , & pubkey , ctmp ) == 1 );
210
210
CHECK (ecount2 == 10 );
211
- CHECK (secp256k1_ec_pubkey_tweak_add (STTC , & pubkey , ctmp ) == 1 );
211
+ CHECK (secp256k1_ec_pubkey_tweak_add (STATIC_CTX , & pubkey , ctmp ) == 1 );
212
212
CHECK (ecount == 2 );
213
213
CHECK (secp256k1_ec_pubkey_tweak_mul (CTX , & pubkey , ctmp ) == 1 );
214
214
CHECK (ecount2 == 10 );
215
- CHECK (secp256k1_ec_pubkey_negate (STTC , & pubkey ) == 1 );
215
+ CHECK (secp256k1_ec_pubkey_negate (STATIC_CTX , & pubkey ) == 1 );
216
216
CHECK (ecount == 2 );
217
217
CHECK (secp256k1_ec_pubkey_negate (CTX , & pubkey ) == 1 );
218
218
CHECK (ecount == 2 );
219
- CHECK (secp256k1_ec_pubkey_negate (STTC , & zero_pubkey ) == 0 );
219
+ CHECK (secp256k1_ec_pubkey_negate (STATIC_CTX , & zero_pubkey ) == 0 );
220
220
CHECK (ecount == 3 );
221
221
CHECK (secp256k1_ec_pubkey_negate (CTX , NULL ) == 0 );
222
222
CHECK (ecount2 == 11 );
223
- CHECK (secp256k1_ec_pubkey_tweak_mul (STTC , & pubkey , ctmp ) == 1 );
223
+ CHECK (secp256k1_ec_pubkey_tweak_mul (STATIC_CTX , & pubkey , ctmp ) == 1 );
224
224
CHECK (ecount == 3 );
225
225
226
226
/* Clean up */
227
- secp256k1_context_set_illegal_callback (STTC , NULL , NULL );
227
+ secp256k1_context_set_illegal_callback (STATIC_CTX , NULL , NULL );
228
228
secp256k1_context_set_illegal_callback (CTX , NULL , NULL );
229
229
}
230
230
@@ -235,13 +235,13 @@ void run_static_context_tests(void) {
235
235
CHECK (secp256k1_context_no_precomp == secp256k1_context_static );
236
236
237
237
/* check if sizes for cloning are consistent */
238
- CHECK (secp256k1_context_preallocated_clone_size (STTC ) >= sizeof (secp256k1_context ));
238
+ CHECK (secp256k1_context_preallocated_clone_size (STATIC_CTX ) >= sizeof (secp256k1_context ));
239
239
240
240
/* Verify that setting and resetting illegal callback works */
241
- secp256k1_context_set_illegal_callback (STTC , counting_illegal_callback_fn , & dummy );
242
- CHECK (STTC -> illegal_callback .fn == counting_illegal_callback_fn );
243
- secp256k1_context_set_illegal_callback (STTC , NULL , NULL );
244
- CHECK (STTC -> illegal_callback .fn == secp256k1_default_illegal_callback_fn );
241
+ secp256k1_context_set_illegal_callback (STATIC_CTX , counting_illegal_callback_fn , & dummy );
242
+ CHECK (STATIC_CTX -> illegal_callback .fn == counting_illegal_callback_fn );
243
+ secp256k1_context_set_illegal_callback (STATIC_CTX , NULL , NULL );
244
+ CHECK (STATIC_CTX -> illegal_callback .fn == secp256k1_default_illegal_callback_fn );
245
245
}
246
246
247
247
void run_proper_context_tests (int use_prealloc ) {
@@ -7379,10 +7379,10 @@ int main(int argc, char **argv) {
7379
7379
that write to the context. The API does not support cloning the static context, so we use
7380
7380
memcpy instead. The user is not supposed to copy a context but we should still ensure that
7381
7381
the API functions handle copies of the static context gracefully. */
7382
- STTC = malloc (sizeof (* secp256k1_context_static ));
7383
- CHECK (STTC != NULL );
7384
- memcpy (STTC , secp256k1_context_static , sizeof (secp256k1_context ));
7385
- CHECK (!secp256k1_context_is_proper (STTC ));
7382
+ STATIC_CTX = malloc (sizeof (* secp256k1_context_static ));
7383
+ CHECK (STATIC_CTX != NULL );
7384
+ memcpy (STATIC_CTX , secp256k1_context_static , sizeof (secp256k1_context ));
7385
+ CHECK (!secp256k1_context_is_proper (STATIC_CTX ));
7386
7386
7387
7387
/*** Run actual tests ***/
7388
7388
@@ -7491,7 +7491,7 @@ int main(int argc, char **argv) {
7491
7491
run_cmov_tests ();
7492
7492
7493
7493
/*** Tear down test environment ***/
7494
- free (STTC );
7494
+ free (STATIC_CTX );
7495
7495
secp256k1_context_destroy (CTX );
7496
7496
7497
7497
secp256k1_testrand_finish ();
0 commit comments