prysm-pulse/testing/bls/batch_verify_test.go
Raul Jordan d077483577
Add V3 Suffix to All Prysm Packages (#11083)
* v3 import renamings

* tidy

* fmt

* rev

* Update beacon-chain/core/epoch/precompute/reward_penalty_test.go

* Update beacon-chain/core/helpers/validators_test.go

* Update beacon-chain/db/alias.go

* Update beacon-chain/db/alias.go

* Update beacon-chain/db/alias.go

* Update beacon-chain/db/iface/BUILD.bazel

* Update beacon-chain/db/kv/kv.go

* Update beacon-chain/db/kv/state.go

* Update beacon-chain/rpc/prysm/v1alpha1/validator/attester_test.go

* Update beacon-chain/rpc/prysm/v1alpha1/validator/attester_test.go

* Update beacon-chain/sync/initial-sync/service.go

* fix deps

* fix bad replacements

* fix bad replacements

* change back

* gohashtree version

* fix deps

Co-authored-by: Nishant Das <nishdas93@gmail.com>
Co-authored-by: Potuz <potuz@prysmaticlabs.com>
2022-08-16 12:20:13 +00:00

64 lines
1.8 KiB
Go

package bls
import (
"encoding/hex"
"errors"
"testing"
"github.com/ghodss/yaml"
"github.com/prysmaticlabs/prysm/v3/crypto/bls"
"github.com/prysmaticlabs/prysm/v3/crypto/bls/common"
"github.com/prysmaticlabs/prysm/v3/encoding/bytesutil"
"github.com/prysmaticlabs/prysm/v3/testing/bls/utils"
"github.com/prysmaticlabs/prysm/v3/testing/require"
)
func TestBatchVerify(t *testing.T) {
t.Run("blst", testBatchVerify)
}
func testBatchVerify(t *testing.T) {
fNames, fContent := utils.RetrieveFiles("batch_verify", t)
for i, file := range fNames {
t.Run(file, func(t *testing.T) {
test := &BatchVerifyTest{}
require.NoError(t, yaml.Unmarshal(fContent[i], test))
pubkeys := make([]common.PublicKey, len(test.Input.Pubkeys))
messages := make([][32]byte, len(test.Input.Messages))
signatures := make([][]byte, len(test.Input.Signatures))
for j, raw := range test.Input.Pubkeys {
pkBytes, err := hex.DecodeString(raw[2:])
require.NoError(t, err)
pk, err := bls.PublicKeyFromBytes(pkBytes)
if err != nil {
if test.Output == false && errors.Is(err, common.ErrInfinitePubKey) {
return
}
t.Fatalf("cannot unmarshal pubkey: %v", err)
}
pubkeys[j] = pk
}
for j, raw := range test.Input.Messages {
msgBytes, err := hex.DecodeString(raw[2:])
require.NoError(t, err)
messages[j] = bytesutil.ToBytes32(msgBytes)
}
for j, raw := range test.Input.Signatures {
sigBytes, err := hex.DecodeString(raw[2:])
require.NoError(t, err)
signatures[j] = sigBytes
}
verified, err := bls.VerifyMultipleSignatures(signatures, messages, pubkeys)
require.NoError(t, err)
if verified != test.Output {
t.Fatalf("Signature does not match the expected verification output. "+
"Expected %#v but received %#v for test case %d", test.Output, verified, i)
}
t.Log("Success")
})
}
}