diff --git a/test/curves/secp256k1/Secp256k1.t.sol b/test/curves/secp256k1/Secp256k1.t.sol index 36be125..9e98a77 100644 --- a/test/curves/secp256k1/Secp256k1.t.sol +++ b/test/curves/secp256k1/Secp256k1.t.sol @@ -183,9 +183,7 @@ contract Secp256k1Test is Test { assertEq(pk.y, point.y); } - function testFuzz_PublicKey_toProjectivePoint(PublicKey memory pk) - public - { + function testFuzz_PublicKey_toProjectivePoint(PublicKey memory pk) public { ProjectivePoint memory jPoint = wrapper.toProjectivePoint(pk); assertEq(jPoint.x, pk.x); @@ -196,7 +194,7 @@ contract Secp256k1Test is Test { //-------------------------------------------------------------------------- // Test: (De)Serialization -/* + /* //---------------------------------- // Private Key @@ -347,8 +345,7 @@ contract Secp256k1Test is Test { function test_PublicKey_asBytes_ViaGenerator() public { assertEq(GENERATOR_BYTES_UNCOMPRESSED, wrapper.toBytes(Secp256k1.G())); } -*/ - + */ } /** @@ -381,10 +378,7 @@ contract Secp256k1Wrapper { return sk.isValid(); } - function toPublicKey(SecretKey sk) - public - returns (PublicKey memory) - { + function toPublicKey(SecretKey sk) public returns (PublicKey memory) { return sk.toPublicKey(); } @@ -468,11 +462,7 @@ contract Secp256k1Wrapper { return Secp256k1.publicKeyFromBytes(blob); } - function toBytes(PublicKey memory pk) - public - pure - returns (bytes memory) - { + function toBytes(PublicKey memory pk) public pure returns (bytes memory) { return pk.toBytes(); } } diff --git a/test/signatures/ECDSA.t.sol b/test/signatures/ECDSA.t.sol index 6ef645f..d4e4bf4 100644 --- a/test/signatures/ECDSA.t.sol +++ b/test/signatures/ECDSA.t.sol @@ -190,9 +190,7 @@ contract ECDSATest is Test { PublicKey memory pk = sk.toPublicKey(); assertTrue( - pk.verify( - Message.deriveEthereumSignedMessageHash(message), sig1 - ) + pk.verify(Message.deriveEthereumSignedMessageHash(message), sig1) ); assertTrue( pk.verify( @@ -389,11 +387,11 @@ contract ECDSAWrapper { return pk.verify(message, sig); } - function verify( - PublicKey memory pk, - bytes32 digest, - Signature memory sig - ) public pure returns (bool) { + function verify(PublicKey memory pk, bytes32 digest, Signature memory sig) + public + pure + returns (bool) + { return pk.verify(digest, sig); } @@ -432,10 +430,11 @@ contract ECDSAWrapper { return sk.sign(digest); } - function signEthereumSignedMessageHash( - SecretKey sk, - bytes memory message - ) public view returns (Signature memory) { + function signEthereumSignedMessageHash(SecretKey sk, bytes memory message) + public + view + returns (Signature memory) + { return sk.signEthereumSignedMessageHash(message); } diff --git a/test/signatures/Schnorr.t.sol b/test/signatures/Schnorr.t.sol index e5d1d5f..e957a66 100644 --- a/test/signatures/Schnorr.t.sol +++ b/test/signatures/Schnorr.t.sol @@ -75,9 +75,7 @@ contract SchnorrTest is Test { ); vm.expectRevert("PublicKeyInvalid()"); wrapper.verify( - pk, - keccak256(message), - Secp256k1.secretKeyFromUint(1).sign(message) + pk, keccak256(message), Secp256k1.secretKeyFromUint(1).sign(message) ); } @@ -162,14 +160,10 @@ contract SchnorrTest is Test { PublicKey memory pk = sk.toPublicKey(); assertTrue( - pk.verify( - Message.deriveEthereumSignedMessageHash(message), sig1 - ) + pk.verify(Message.deriveEthereumSignedMessageHash(message), sig1) ); assertTrue( - pk.verify( - Message.deriveEthereumSignedMessageHash(message), sig2 - ) + pk.verify(Message.deriveEthereumSignedMessageHash(message), sig2) ); } @@ -247,11 +241,11 @@ contract SchnorrWrapper { return pk.verify(message, sig); } - function verify( - PublicKey memory pk, - bytes32 digest, - Signature memory sig - ) public pure returns (bool) { + function verify(PublicKey memory pk, bytes32 digest, Signature memory sig) + public + pure + returns (bool) + { return pk.verify(digest, sig); } @@ -272,10 +266,10 @@ contract SchnorrWrapper { return sk.sign(digest); } - function signEthereumSignedMessageHash( - SecretKey sk, - bytes memory message - ) public returns (Signature memory) { + function signEthereumSignedMessageHash(SecretKey sk, bytes memory message) + public + returns (Signature memory) + { return sk.signEthereumSignedMessageHash(message); }