mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-07 10:12:19 +00:00
211d9bc0b9
* fix build from source * clean up * update again * change everything * workaround for now * fix versioning * all passing now * fix build issues * clean up * revert use of MulVerify * gaz * stub * Apply suggestions from code review Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> * fix all * fix test * todo * fix stub * revert back * make deep source happy * Update shared/bls/herumi/public_key.go * Update shared/bls/blst/signature.go * Update shared/bls/blst/signature_test.go * imports * move iface to common, export errors * rm iface build Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> Co-authored-by: terence tsao <terence@prysmaticlabs.com>
69 lines
1.9 KiB
Go
69 lines
1.9 KiB
Go
// Package spectest includes tests to ensure conformity with the eth2
|
|
// bls cryptography specification.
|
|
package spectest
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/hex"
|
|
"errors"
|
|
"path"
|
|
"testing"
|
|
|
|
"github.com/ghodss/yaml"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bls/common"
|
|
"github.com/prysmaticlabs/prysm/shared/featureconfig"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
)
|
|
|
|
func TestSignMessageYaml(t *testing.T) {
|
|
flags := &featureconfig.Flags{}
|
|
reset := featureconfig.InitWithReset(flags)
|
|
t.Run("herumi", testSignMessageYaml)
|
|
reset()
|
|
|
|
flags.EnableBlst = true
|
|
reset = featureconfig.InitWithReset(flags)
|
|
t.Run("blst", testSignMessageYaml)
|
|
reset()
|
|
}
|
|
|
|
func testSignMessageYaml(t *testing.T) {
|
|
testFolders, testFolderPath := testutil.TestFolders(t, "general", "bls/sign/small")
|
|
|
|
for i, folder := range testFolders {
|
|
t.Run(folder.Name(), func(t *testing.T) {
|
|
file, err := testutil.BazelFileBytes(path.Join(testFolderPath, folder.Name(), "data.yaml"))
|
|
require.NoError(t, err)
|
|
test := &SignMsgTest{}
|
|
require.NoError(t, yaml.Unmarshal(file, test))
|
|
pkBytes, err := hex.DecodeString(test.Input.Privkey[2:])
|
|
require.NoError(t, err)
|
|
sk, err := bls.SecretKeyFromBytes(pkBytes)
|
|
if err != nil {
|
|
if test.Output == "" && errors.Is(err, common.ErrZeroKey) {
|
|
return
|
|
}
|
|
t.Fatalf("cannot unmarshal secret key: %v", err)
|
|
}
|
|
msgBytes, err := hex.DecodeString(test.Input.Message[2:])
|
|
require.NoError(t, err)
|
|
sig := sk.Sign(msgBytes)
|
|
|
|
if !sig.Verify(sk.PublicKey(), msgBytes) {
|
|
t.Fatal("could not verify signature")
|
|
}
|
|
|
|
outputBytes, err := hex.DecodeString(test.Output[2:])
|
|
require.NoError(t, err)
|
|
|
|
if !bytes.Equal(outputBytes, sig.Marshal()) {
|
|
t.Fatalf("Test Case %d: Signature does not match the expected output. "+
|
|
"Expected %#x but received %#x", i, outputBytes, sig.Marshal())
|
|
}
|
|
t.Log("Success")
|
|
})
|
|
}
|
|
}
|