mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-05 09:14:28 +00:00
14dbc2b74d
* Add blst third party dep * initial build * add init * blst passing tests * add feature flag * blst and herumi for spec tests * maybe this works for mac * Actually set feature flag * Add stub for VerifyMultipleSignatures for blst * verifyCompressed * use correct cores sizes * aggregate public keys * add multi-sig verification * encode not hash * revert back * go mod tidy * update blst to latest commit * add batch decompress * fix * add test * gofmt * update blst * go mod tidy * remove kubesec, fix * mod tidy * disable some remote cache * disable some remote cache * disable some remote cache * disable some remote cache * Switch to -D__ADX__ * update * tidy * fix build * Make blst for only linux,amd64 * gofmt * lint * lint * gazelle * fix build tag * more stub methods * shift adx instructions to x86 * fix arm64 * Revert "fix arm64" This reverts commit 4d34ac21b7509a1b385374e3039efecfcab614c1. * add one more in * Revert "Revert "fix arm64"" This reverts commit 1c8ae24ad16ff9811590f1058b9d98c90b63251a. * try darwin now * Revert "try darwin now" This reverts commit 6f884714b8e14a7a803b72157672b6e942047f37. * Add sha256 * remove TODO * checkpoint * finally builds * fix up * add tag * try again * explicit disabling * remove * select properly * fix * better * make CI happy too * Update .bazelrc * Update .bazelrc * fix tests * revert back * Update shared/bls/blst/public_key.go Co-authored-by: Victor Farazdagi <simple.square@gmail.com> * Update shared/bls/blst/public_key.go Co-authored-by: Victor Farazdagi <simple.square@gmail.com> * clean up tests * more clean up * clean up * add * Update shared/bls/blst/signature.go * Update shared/bls/blst/signature.go * Update .buildkite-bazelrc Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> * try again * remove go tag * revert change * gaz * gazelle ignore Co-authored-by: nisdas <nishdas93@gmail.com> Co-authored-by: Victor Farazdagi <simple.square@gmail.com> Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
102 lines
3.1 KiB
Go
102 lines
3.1 KiB
Go
// Package bls implements a go-wrapper around a library implementing the
|
|
// the BLS12-381 curve and signature scheme. This package exposes a public API for
|
|
// verifying and aggregating BLS signatures used by Ethereum 2.0.
|
|
package bls
|
|
|
|
import (
|
|
"github.com/prysmaticlabs/prysm/shared/bls/blst"
|
|
"github.com/prysmaticlabs/prysm/shared/bls/herumi"
|
|
"github.com/prysmaticlabs/prysm/shared/bls/iface"
|
|
"github.com/prysmaticlabs/prysm/shared/featureconfig"
|
|
)
|
|
|
|
// SecretKeyFromBytes creates a BLS private key from a BigEndian byte slice.
|
|
func SecretKeyFromBytes(privKey []byte) (SecretKey, error) {
|
|
if featureconfig.Get().EnableBlst {
|
|
return blst.SecretKeyFromBytes(privKey)
|
|
}
|
|
return herumi.SecretKeyFromBytes(privKey)
|
|
}
|
|
|
|
// PublicKeyFromBytes creates a BLS public key from a BigEndian byte slice.
|
|
func PublicKeyFromBytes(pubKey []byte) (PublicKey, error) {
|
|
if featureconfig.Get().EnableBlst {
|
|
return blst.PublicKeyFromBytes(pubKey)
|
|
}
|
|
return herumi.PublicKeyFromBytes(pubKey)
|
|
}
|
|
|
|
// SignatureFromBytes creates a BLS signature from a LittleEndian byte slice.
|
|
func SignatureFromBytes(sig []byte) (Signature, error) {
|
|
if featureconfig.Get().EnableBlst {
|
|
return blst.SignatureFromBytes(sig)
|
|
}
|
|
return herumi.SignatureFromBytes(sig)
|
|
}
|
|
|
|
// AggregatePublicKeys aggregates the provided raw public keys into a single key.
|
|
func AggregatePublicKeys(pubs [][]byte) (PublicKey, error) {
|
|
if featureconfig.Get().EnableBlst {
|
|
return blst.AggregatePublicKeys(pubs)
|
|
}
|
|
return herumi.AggregatePublicKeys(pubs)
|
|
}
|
|
|
|
// AggregateSignatures converts a list of signatures into a single, aggregated sig.
|
|
func AggregateSignatures(sigs []iface.Signature) iface.Signature {
|
|
if featureconfig.Get().EnableBlst {
|
|
return blst.AggregateSignatures(sigs)
|
|
}
|
|
return herumi.AggregateSignatures(sigs)
|
|
}
|
|
|
|
// VerifyMultipleSignatures verifies multiple signatures for distinct messages securely.
|
|
func VerifyMultipleSignatures(sigs [][]byte, msgs [][32]byte, pubKeys []iface.PublicKey) (bool, error) {
|
|
if featureconfig.Get().EnableBlst {
|
|
return blst.VerifyMultipleSignatures(sigs, msgs, pubKeys)
|
|
}
|
|
// Manually decompress each signature as herumi does not
|
|
// have a batch decompress method.
|
|
rawSigs := make([]Signature, len(sigs))
|
|
var err error
|
|
for i, s := range sigs {
|
|
rawSigs[i], err = herumi.SignatureFromBytes(s)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
}
|
|
return herumi.VerifyMultipleSignatures(rawSigs, msgs, pubKeys)
|
|
}
|
|
|
|
// NewAggregateSignature creates a blank aggregate signature.
|
|
func NewAggregateSignature() iface.Signature {
|
|
if featureconfig.Get().EnableBlst {
|
|
return blst.NewAggregateSignature()
|
|
}
|
|
return herumi.NewAggregateSignature()
|
|
}
|
|
|
|
// RandKey creates a new private key using a random input.
|
|
func RandKey() iface.SecretKey {
|
|
if featureconfig.Get().EnableBlst {
|
|
return blst.RandKey()
|
|
}
|
|
return herumi.RandKey()
|
|
}
|
|
|
|
// VerifyCompressed signature.
|
|
func VerifyCompressed(signature []byte, pub []byte, msg []byte) bool {
|
|
if featureconfig.Get().EnableBlst {
|
|
return blst.VerifyCompressed(signature, pub, msg)
|
|
}
|
|
sig, err := SignatureFromBytes(signature)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
pk, err := PublicKeyFromBytes(pub)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
return sig.Verify(pk, msg)
|
|
}
|