Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix Blst Signature Copy Test #7272

Merged
merged 2 commits into from
Sep 18, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 31 additions & 1 deletion shared/bls/blst/BUILD.bazel
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,6 @@ go_test(
): [
"public_key_test.go",
"secret_key_test.go",
"signature_test.go",
],
"//conditions:default": [],
}),
Expand All @@ -126,6 +125,37 @@ go_test(
}),
)

# gazelle:ignore
go_test(
name = "go_signature_test",
srcs = selects.with_or({
(
":blst_enabled_linux_amd64",
":blst_enabled_linux_arm64",
":blst_enabled_android_amd64",
":blst_enabled_android_arm64",
): [
"signature_test.go",
],
"//conditions:default": [],
}),
embed = [":go_default_library"],
deps = selects.with_or({
(
":blst_enabled_linux_amd64",
":blst_enabled_linux_arm64",
":blst_enabled_android_amd64",
":blst_enabled_android_arm64",
): [
"//shared/bls/iface:go_default_library",
"//shared/bytesutil:go_default_library",
"//shared/testutil/assert:go_default_library",
"//shared/testutil/require:go_default_library",
],
"//conditions:default": [],
}),
)

# gazelle:exclude bls_benchmark_test.go
go_test(
name = "go_benchmark_test",
Expand Down
37 changes: 19 additions & 18 deletions shared/bls/blst/signature_test.go
Original file line number Diff line number Diff line change
@@ -1,19 +1,19 @@
// +build linux,amd64 linux,arm64

package blst_test
package blst

import (
"bytes"
"errors"
"testing"

"github.com/prysmaticlabs/prysm/shared/bls/blst"
"github.com/prysmaticlabs/prysm/shared/bls/iface"
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
"github.com/prysmaticlabs/prysm/shared/testutil/require"
)

func TestSignVerify(t *testing.T) {
priv := blst.RandKey()
priv := RandKey()
pub := priv.PublicKey()
msg := []byte("hello")
sig := priv.Sign(msg)
Expand All @@ -26,14 +26,14 @@ func TestAggregateVerify(t *testing.T) {
var msgs [][32]byte
for i := 0; i < 100; i++ {
msg := [32]byte{'h', 'e', 'l', 'l', 'o', byte(i)}
priv := blst.RandKey()
priv := RandKey()
pub := priv.PublicKey()
sig := priv.Sign(msg[:])
pubkeys = append(pubkeys, pub)
sigs = append(sigs, sig)
msgs = append(msgs, msg)
}
aggSig := blst.Aggregate(sigs)
aggSig := Aggregate(sigs)
assert.Equal(t, true, aggSig.AggregateVerify(pubkeys, msgs), "Signature did not verify")
}

Expand All @@ -42,24 +42,24 @@ func TestFastAggregateVerify(t *testing.T) {
sigs := make([]iface.Signature, 0, 100)
msg := [32]byte{'h', 'e', 'l', 'l', 'o'}
for i := 0; i < 100; i++ {
priv := blst.RandKey()
priv := RandKey()
pub := priv.PublicKey()
sig := priv.Sign(msg[:])
pubkeys = append(pubkeys, pub)
sigs = append(sigs, sig)
}
aggSig := blst.AggregateSignatures(sigs)
aggSig := AggregateSignatures(sigs)
assert.Equal(t, true, aggSig.FastAggregateVerify(pubkeys, msg), "Signature did not verify")

}

func TestVerifyCompressed(t *testing.T) {
priv := blst.RandKey()
priv := RandKey()
pub := priv.PublicKey()
msg := []byte("hello")
sig := priv.Sign(msg)
assert.Equal(t, true, sig.Verify(pub, msg), "Non compressed signature did not verify")
assert.Equal(t, true, blst.VerifyCompressed(sig.Marshal(), pub.Marshal(), msg), "Compressed signatures and pubkeys did not verify")
assert.Equal(t, true, VerifyCompressed(sig.Marshal(), pub.Marshal(), msg), "Compressed signatures and pubkeys did not verify")
}

func TestMultipleSignatureVerification(t *testing.T) {
Expand All @@ -68,14 +68,14 @@ func TestMultipleSignatureVerification(t *testing.T) {
var msgs [][32]byte
for i := 0; i < 100; i++ {
msg := [32]byte{'h', 'e', 'l', 'l', 'o', byte(i)}
priv := blst.RandKey()
priv := RandKey()
pub := priv.PublicKey()
sig := priv.Sign(msg[:]).Marshal()
pubkeys = append(pubkeys, pub)
sigs = append(sigs, sig)
msgs = append(msgs, msg)
}
verify, err := blst.VerifyMultipleSignatures(sigs, msgs, pubkeys)
verify, err := VerifyMultipleSignatures(sigs, msgs, pubkeys)
assert.NoError(t, err, "Signature did not verify")
assert.Equal(t, true, verify, "Signature did not verify")
}
Expand All @@ -84,7 +84,7 @@ func TestFastAggregateVerify_ReturnsFalseOnEmptyPubKeyList(t *testing.T) {
var pubkeys []iface.PublicKey
msg := [32]byte{'h', 'e', 'l', 'l', 'o'}

aggSig := blst.NewAggregateSignature()
aggSig := NewAggregateSignature()
assert.Equal(t, false, aggSig.FastAggregateVerify(pubkeys, msg), "Expected FastAggregateVerify to return false with empty input ")
}

Expand Down Expand Up @@ -126,7 +126,7 @@ func TestSignatureFromBytes(t *testing.T) {

for _, test := range tests {
t.Run(test.name, func(t *testing.T) {
res, err := blst.SignatureFromBytes(test.input)
res, err := SignatureFromBytes(test.input)
if test.err != nil {
assert.NotEqual(t, nil, err, "No error returned")
assert.ErrorContains(t, test.err.Error(), err, "Unexpected error returned")
Expand All @@ -138,9 +138,10 @@ func TestSignatureFromBytes(t *testing.T) {
}
}

// TODO(7249): Make this test work
/*func TestCopy(t *testing.T) {
key := RandKey().(*bls12SecretKey)
func TestCopy(t *testing.T) {
key, ok := RandKey().(*bls12SecretKey)
require.Equal(t, true, ok)

signatureA := &Signature{s: new(blstSignature).Sign(key.p, []byte("foo"), dst)}
signatureB, ok := signatureA.Copy().(*Signature)
require.Equal(t, true, ok)
Expand All @@ -149,6 +150,6 @@ func TestSignatureFromBytes(t *testing.T) {
assert.NotEqual(t, signatureA.s, signatureB.s)
assert.DeepEqual(t, signatureA, signatureB)

signatureA.s = new(blstSignature).Sign(key.p, []byte("bar"), dst)
signatureA.s.Sign(key.p, []byte("bar"), dst)
assert.DeepNotEqual(t, signatureA, signatureB)
}*/
}