prysm-pulse/shared/bls/spectest/sign_test.go
Nishant Das f0e2f561d5
Make BLST The Permanent Default (#8710)
* remove herumi

* gaz

* deprecate flag

* remove source builds of herumi

* remove

* Revert "remove source builds of herumi"

This reverts commit ac7dd133eddcd9ab27d7d75e19efabd994b89d3c.

* disable blst

* remove herumi hard requirement from fuzz

* restrict viz, ensure all deps removed from fuzz

* remove source builds

* add back opts

* add back herumi initialization

* Revert "add back opts"

This reverts commit ad9b409b8ad2410142efba92e71c555fedb2a29e.

* Revert "remove source builds"

This reverts commit b78ee30dba1befad24262648e2fde1583263c87d.

* Revert "restrict viz, ensure all deps removed from fuzz"

This reverts commit 65d951da93103eb327643c3c167ae7498955d244.

* Revert "remove herumi hard requirement from fuzz"

This reverts commit ad92191d8146bf7fea4508fb99a1ae9267683f6d.

* redundant

* add lock for rand generation

Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com>
2021-04-07 10:18:19 -05:00

61 lines
1.7 KiB
Go

// Package spectest includes tests to ensure conformity with the eth2
// bls cryptography specification.
package spectest
import (
"bytes"
"encoding/hex"
"errors"
"path"
"testing"
"github.com/ghodss/yaml"
"github.com/prysmaticlabs/prysm/shared/bls"
"github.com/prysmaticlabs/prysm/shared/bls/common"
"github.com/prysmaticlabs/prysm/shared/testutil"
"github.com/prysmaticlabs/prysm/shared/testutil/require"
)
func TestSignMessageYaml(t *testing.T) {
t.Run("blst", testSignMessageYaml)
}
func testSignMessageYaml(t *testing.T) {
testFolders, testFolderPath := testutil.TestFolders(t, "general", "bls/sign/small")
for i, folder := range testFolders {
t.Run(folder.Name(), func(t *testing.T) {
file, err := testutil.BazelFileBytes(path.Join(testFolderPath, folder.Name(), "data.yaml"))
require.NoError(t, err)
test := &SignMsgTest{}
require.NoError(t, yaml.Unmarshal(file, test))
pkBytes, err := hex.DecodeString(test.Input.Privkey[2:])
require.NoError(t, err)
sk, err := bls.SecretKeyFromBytes(pkBytes)
if err != nil {
if test.Output == "" &&
(errors.Is(err, common.ErrZeroKey) || errors.Is(err, common.ErrSecretUnmarshal)) {
return
}
t.Fatalf("cannot unmarshal secret key: %v", err)
}
msgBytes, err := hex.DecodeString(test.Input.Message[2:])
require.NoError(t, err)
sig := sk.Sign(msgBytes)
if !sig.Verify(sk.PublicKey(), msgBytes) {
t.Fatal("could not verify signature")
}
outputBytes, err := hex.DecodeString(test.Output[2:])
require.NoError(t, err)
if !bytes.Equal(outputBytes, sig.Marshal()) {
t.Fatalf("Test Case %d: Signature does not match the expected output. "+
"Expected %#x but received %#x", i, outputBytes, sig.Marshal())
}
t.Log("Success")
})
}
}