mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-26 21:27:19 +00:00
d077483577
* v3 import renamings * tidy * fmt * rev * Update beacon-chain/core/epoch/precompute/reward_penalty_test.go * Update beacon-chain/core/helpers/validators_test.go * Update beacon-chain/db/alias.go * Update beacon-chain/db/alias.go * Update beacon-chain/db/alias.go * Update beacon-chain/db/iface/BUILD.bazel * Update beacon-chain/db/kv/kv.go * Update beacon-chain/db/kv/state.go * Update beacon-chain/rpc/prysm/v1alpha1/validator/attester_test.go * Update beacon-chain/rpc/prysm/v1alpha1/validator/attester_test.go * Update beacon-chain/sync/initial-sync/service.go * fix deps * fix bad replacements * fix bad replacements * change back * gohashtree version * fix deps Co-authored-by: Nishant Das <nishdas93@gmail.com> Co-authored-by: Potuz <potuz@prysmaticlabs.com>
62 lines
1.7 KiB
Go
62 lines
1.7 KiB
Go
package bls
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"errors"
|
|
"path"
|
|
"testing"
|
|
|
|
"github.com/ghodss/yaml"
|
|
"github.com/prysmaticlabs/prysm/v3/crypto/bls"
|
|
"github.com/prysmaticlabs/prysm/v3/crypto/bls/common"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/require"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/spectest/utils"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/util"
|
|
)
|
|
|
|
func TestVerify(t *testing.T) {
|
|
t.Run("blst", testVerify)
|
|
}
|
|
|
|
func testVerify(t *testing.T) {
|
|
testFolders, testFolderPath := utils.TestFolders(t, "general", "phase0", "bls/verify/small")
|
|
|
|
for i, folder := range testFolders {
|
|
t.Run(folder.Name(), func(t *testing.T) {
|
|
file, err := util.BazelFileBytes(path.Join(testFolderPath, folder.Name(), "data.yaml"))
|
|
require.NoError(t, err)
|
|
test := &VerifyMsgTest{}
|
|
require.NoError(t, yaml.Unmarshal(file, test))
|
|
|
|
pkBytes, err := hex.DecodeString(test.Input.Pubkey[2:])
|
|
require.NoError(t, err)
|
|
pk, err := bls.PublicKeyFromBytes(pkBytes)
|
|
if err != nil {
|
|
if test.Output == false && errors.Is(err, common.ErrInfinitePubKey) {
|
|
return
|
|
}
|
|
t.Fatalf("cannot unmarshal pubkey: %v", err)
|
|
}
|
|
msgBytes, err := hex.DecodeString(test.Input.Message[2:])
|
|
require.NoError(t, err)
|
|
|
|
sigBytes, err := hex.DecodeString(test.Input.Signature[2:])
|
|
require.NoError(t, err)
|
|
sig, err := bls.SignatureFromBytes(sigBytes)
|
|
if err != nil {
|
|
if test.Output == false {
|
|
return
|
|
}
|
|
t.Fatalf("Cannot unmarshal input to signature: %v", err)
|
|
}
|
|
|
|
verified := sig.Verify(pk, msgBytes)
|
|
if verified != test.Output {
|
|
t.Fatalf("Signature does not match the expected verification output. "+
|
|
"Expected %#v but received %#v for test case %d", test.Output, verified, i)
|
|
}
|
|
t.Log("Success")
|
|
})
|
|
}
|
|
}
|