mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-05 09:14:28 +00:00
211d9bc0b9
* fix build from source * clean up * update again * change everything * workaround for now * fix versioning * all passing now * fix build issues * clean up * revert use of MulVerify * gaz * stub * Apply suggestions from code review Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> * fix all * fix test * todo * fix stub * revert back * make deep source happy * Update shared/bls/herumi/public_key.go * Update shared/bls/blst/signature.go * Update shared/bls/blst/signature_test.go * imports * move iface to common, export errors * rm iface build Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> Co-authored-by: terence tsao <terence@prysmaticlabs.com>
77 lines
2.3 KiB
Go
77 lines
2.3 KiB
Go
package spectest
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"errors"
|
|
"path"
|
|
"testing"
|
|
|
|
"github.com/ghodss/yaml"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bls/common"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/featureconfig"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
)
|
|
|
|
func TestAggregateVerifyYaml(t *testing.T) {
|
|
flags := &featureconfig.Flags{}
|
|
reset := featureconfig.InitWithReset(flags)
|
|
t.Run("herumi", testAggregateVerifyYaml)
|
|
reset()
|
|
|
|
flags.EnableBlst = true
|
|
reset = featureconfig.InitWithReset(flags)
|
|
t.Run("blst", testAggregateVerifyYaml)
|
|
reset()
|
|
}
|
|
|
|
func testAggregateVerifyYaml(t *testing.T) {
|
|
testFolders, testFolderPath := testutil.TestFolders(t, "general", "bls/aggregate_verify/small")
|
|
|
|
for i, folder := range testFolders {
|
|
t.Run(folder.Name(), func(t *testing.T) {
|
|
file, err := testutil.BazelFileBytes(path.Join(testFolderPath, folder.Name(), "data.yaml"))
|
|
require.NoError(t, err)
|
|
test := &AggregateVerifyTest{}
|
|
require.NoError(t, yaml.Unmarshal(file, test))
|
|
pubkeys := make([]common.PublicKey, 0, len(test.Input.Pubkeys))
|
|
msgs := make([][32]byte, 0, len(test.Input.Messages))
|
|
for _, pubKey := range test.Input.Pubkeys {
|
|
pkBytes, err := hex.DecodeString(pubKey[2:])
|
|
require.NoError(t, err)
|
|
pk, err := bls.PublicKeyFromBytes(pkBytes)
|
|
if err != nil {
|
|
if test.Output == false && errors.Is(err, common.ErrInfinitePubKey) {
|
|
return
|
|
}
|
|
t.Fatalf("cannot unmarshal pubkey: %v", err)
|
|
}
|
|
pubkeys = append(pubkeys, pk)
|
|
}
|
|
for _, msg := range test.Input.Messages {
|
|
msgBytes, err := hex.DecodeString(msg[2:])
|
|
require.NoError(t, err)
|
|
require.Equal(t, 32, len(msgBytes))
|
|
msgs = append(msgs, bytesutil.ToBytes32(msgBytes))
|
|
}
|
|
sigBytes, err := hex.DecodeString(test.Input.Signature[2:])
|
|
require.NoError(t, err)
|
|
sig, err := bls.SignatureFromBytes(sigBytes)
|
|
if err != nil {
|
|
if test.Output == false {
|
|
return
|
|
}
|
|
t.Fatalf("Cannot unmarshal input to signature: %v", err)
|
|
}
|
|
|
|
verified := sig.AggregateVerify(pubkeys, msgs)
|
|
if verified != test.Output {
|
|
t.Fatalf("Signature does not match the expected verification output. "+
|
|
"Expected %#v but received %#v for test case %d", test.Output, verified, i)
|
|
}
|
|
})
|
|
}
|
|
}
|