Skip to content

Commit b20e1d5

Browse files
committed
Test naming style, comments.
1 parent 60d27fe commit b20e1d5

2 files changed

Lines changed: 11 additions & 11 deletions

File tree

test/wallet/keys/hd_private.cpp

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ BOOST_AUTO_TEST_CASE(hd_private__derive_public__long_seed__expected)
128128
BOOST_REQUIRE_EQUAL(m0xH1yH2_pub.encoded(), "xpub6FnCn6nSzZAw5Tw7cgR9bi15UV96gLZhjDstkXXxvCLsUXBGXPdSnLFbdpq8p9HmGsApME5hQTZ3emM2rnY5agb9rXpVGyy3bdW6EEgAtqt");
129129
}
130130

131-
BOOST_AUTO_TEST_CASE(hd_private__constructor__null_key_decodes_to_invalid__expected)
131+
BOOST_AUTO_TEST_CASE(hd_private__constructor__null_key__decodes_to_invalid)
132132
{
133133
// the 11...14rcJhr is a serialization of a null key;
134134
static const auto null_encoded = "1111111111111111111111111111111111111111111111111111111111111111111111111111114rcJhr";
@@ -137,7 +137,7 @@ BOOST_AUTO_TEST_CASE(hd_private__constructor__null_key_decodes_to_invalid__expec
137137
BOOST_REQUIRE(!xprv_null);
138138
}
139139

140-
BOOST_AUTO_TEST_CASE(hd_private__to_public__fails_from_invalid_private__expected)
140+
BOOST_AUTO_TEST_CASE(hd_private__to_public__from_invalid_private__invalid)
141141
{
142142
// the 11...14rcJhr is a serialization of a null key;
143143
static const auto xprv_invalid_encoded = "1111111111111111111111111111111111111111111111111111111111111111111111111111114rcJhr";
@@ -147,7 +147,7 @@ BOOST_AUTO_TEST_CASE(hd_private__to_public__fails_from_invalid_private__expected
147147
BOOST_REQUIRE(!xprv_invalid.to_public());
148148
}
149149

150-
BOOST_AUTO_TEST_CASE(hd_private__derive_private__must_not_overflow_depth__expected)
150+
BOOST_AUTO_TEST_CASE(hd_private__derive_private__depth_overflow__invalid)
151151
{
152152
// xprv_254_depth was created from "xprv9s21ZrQH143K3QTDL4LXw2F7HEK3wJUD2nW2nRk4stbPy6cq3jPPqjiChkVvvNKmPGJxWUtg6LnF5kejMRNNU3TGtRBeJgk33yuGBxrMPHi"
153153
// by manually setting the depth to 254
@@ -160,17 +160,17 @@ BOOST_AUTO_TEST_CASE(hd_private__derive_private__must_not_overflow_depth__expect
160160

161161
BOOST_REQUIRE_EQUAL(xprv_254.lineage().depth, 254);
162162
BOOST_REQUIRE(xprv_254);
163+
163164
// the maximal valid depth is 255
164165
BOOST_REQUIRE_EQUAL(xprv_255.lineage().depth, 255);
165166
BOOST_REQUIRE(xprv_255);
166167

167168
// depth overflows uint from 255 to 0
168169
BOOST_REQUIRE_EQUAL(xprv_256.lineage().depth, 0);
169-
// which creates invalid keys
170170
BOOST_REQUIRE(!xprv_256);
171171
}
172172

173-
BOOST_AUTO_TEST_CASE(hd_private__derive_private__hardened_must_not_overflow_depth__expected)
173+
BOOST_AUTO_TEST_CASE(hd_private__derive_private__hardened_depth_overflow__invalid)
174174
{
175175
// xprv_254_depth was created from "xprv9s21ZrQH143K3QTDL4LXw2F7HEK3wJUD2nW2nRk4stbPy6cq3jPPqjiChkVvvNKmPGJxWUtg6LnF5kejMRNNU3TGtRBeJgk33yuGBxrMPHi"
176176
// by manually setting the depth to 254
@@ -182,13 +182,13 @@ BOOST_AUTO_TEST_CASE(hd_private__derive_private__hardened_must_not_overflow_dept
182182

183183
BOOST_REQUIRE_EQUAL(xprv_254.lineage().depth, 254);
184184
BOOST_REQUIRE(xprv_254);
185+
185186
// the maximal valid depth is 255
186187
BOOST_REQUIRE_EQUAL(xprv_255.lineage().depth, 255);
187188
BOOST_REQUIRE(xprv_255);
188189

189190
// depth overflows uint from 255 to 0
190191
BOOST_REQUIRE_EQUAL(xprv_256.lineage().depth, 0);
191-
// which creates invalid keys
192192
BOOST_REQUIRE(!xprv_256);
193193
}
194194

@@ -204,13 +204,13 @@ BOOST_AUTO_TEST_CASE(hd_private__derive_public__must_not_overflow_depth__expecte
204204

205205
BOOST_REQUIRE_EQUAL(xprv_254.lineage().depth, 254);
206206
BOOST_REQUIRE(xprv_254);
207+
207208
// the maximal valid depth is 255
208209
BOOST_REQUIRE_EQUAL(xprv_255.lineage().depth, 255);
209210
BOOST_REQUIRE(xprv_255);
210211

211212
// depth overflows uint from 255 to 0
212213
BOOST_REQUIRE_EQUAL(xpub_256.lineage().depth, 0);
213-
// which creates invalid keys
214214
BOOST_REQUIRE(!xpub_256);
215215
}
216216

@@ -226,13 +226,13 @@ BOOST_AUTO_TEST_CASE(hd_private__derive_public__hardened_must_not_overflow_depth
226226

227227
BOOST_REQUIRE_EQUAL(xprv_254.lineage().depth, 254);
228228
BOOST_REQUIRE(xprv_254);
229+
229230
// the maximal valid depth is 255
230231
BOOST_REQUIRE_EQUAL(xprv_255.lineage().depth, 255);
231232
BOOST_REQUIRE(xprv_255);
232233

233234
// depth overflows uint from 255 to 0
234235
BOOST_REQUIRE_EQUAL(xpub_256.lineage().depth, 0);
235-
// which creates invalid keys
236236
BOOST_REQUIRE(!xpub_256);
237237
}
238238

test/wallet/keys/hd_public.cpp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ BOOST_AUTO_TEST_CASE(hd_public__encoded__round_trip__expected)
4444
BOOST_REQUIRE_EQUAL(key.encoded(), encoded);
4545
}
4646

47-
BOOST_AUTO_TEST_CASE(hd_public__constructor__null_key_decodes_to_invalid__expected)
47+
BOOST_AUTO_TEST_CASE(hd_public__constructor__null_key__decodes_to_invalid)
4848
{
4949
// the 11...14rcJhr is a serialization of a null key;
5050
static const auto null_encoded = "1111111111111111111111111111111111111111111111111111111111111111111111111111114rcJhr";
@@ -103,7 +103,7 @@ BOOST_AUTO_TEST_CASE(hd_public__derive_public__long_seed__expected)
103103
BOOST_REQUIRE_EQUAL(m0xH1yH2_pub.encoded(), "xpub6FnCn6nSzZAw5Tw7cgR9bi15UV96gLZhjDstkXXxvCLsUXBGXPdSnLFbdpq8p9HmGsApME5hQTZ3emM2rnY5agb9rXpVGyy3bdW6EEgAtqt");
104104
}
105105

106-
BOOST_AUTO_TEST_CASE(hd_public__derive_public__must_not_overflow_depth__expected)
106+
BOOST_AUTO_TEST_CASE(hd_public__derive_public__depth_overflow__invalid)
107107
{
108108
// xprv_254_depth was created from "xprv9s21ZrQH143K3QTDL4LXw2F7HEK3wJUD2nW2nRk4stbPy6cq3jPPqjiChkVvvNKmPGJxWUtg6LnF5kejMRNNU3TGtRBeJgk33yuGBxrMPHi"
109109
// by manually setting the depth to 254
@@ -116,13 +116,13 @@ BOOST_AUTO_TEST_CASE(hd_public__derive_public__must_not_overflow_depth__expected
116116

117117
BOOST_REQUIRE_EQUAL(xpub_254.lineage().depth, 254);
118118
BOOST_REQUIRE(xpub_254);
119+
119120
// the maximal valid depth is 255
120121
BOOST_REQUIRE_EQUAL(xpub_255.lineage().depth, 255);
121122
BOOST_REQUIRE(xpub_255);
122123

123124
// depth overflows uint from 255 to 0
124125
BOOST_REQUIRE_EQUAL(xpub_256.lineage().depth, 0);
125-
// which creates invalid keys
126126
BOOST_REQUIRE(!xpub_256);
127127
}
128128

0 commit comments

Comments
 (0)