mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-17 20:02:43 +00:00
* Start updating types * WIP * Signature hacking * Existing EF tests passing with fake_crypto * Updates * Delete outdated API spec * The refactor continues * It compiles * WIP test fixes * All release tests passing bar genesis state parsing * Update and test YamlConfig * Update to spec v0.10 compatible BLS * Updates to BLS EF tests * Add EF test for AggregateVerify And delete unused hash2curve tests for uncompressed points * Update EF tests to v0.10.1 * Use optional block root correctly in block proc * Use genesis fork in deposit domain. All tests pass * Cargo fmt * Fast aggregate verify test * Update REST API docs * Cargo fmt * Fix unused import * Bump spec tags to v0.10.1 * Add `seconds_per_eth1_block` to chainspec * Update to timestamp based eth1 voting scheme * Return None from `get_votes_to_consider` if block cache is empty * Handle overflows in `is_candidate_block` * Revert to failing tests * Fix eth1 data sets test * Choose default vote according to spec * Fix collect_valid_votes tests * Fix `get_votes_to_consider` to choose all eligible blocks * Uncomment winning_vote tests * Add comments; remove unused code * Reduce seconds_per_eth1_block for simulation * Addressed review comments * Add test for default vote case * Fix logs * Remove unused functions * Meter default eth1 votes * Fix comments * Address review comments; remove unused dependency * Disable/delete two outdated tests * Bump eth1 default vote warn to error * Delete outdated eth1 test Co-authored-by: Pawan Dhananjay <pawandhananjay@gmail.com>
40 lines
1.2 KiB
Rust
40 lines
1.2 KiB
Rust
use ssz::{Decode, DecodeError, Encode};
|
|
|
|
use super::{Signature, BLS_SIG_BYTE_SIZE};
|
|
|
|
bytes_struct!(SignatureBytes, Signature, BLS_SIG_BYTE_SIZE, "signature");
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use std::convert::TryInto;
|
|
|
|
use ssz::ssz_encode;
|
|
|
|
use super::super::Keypair;
|
|
use super::*;
|
|
|
|
#[test]
|
|
pub fn test_valid_signature() {
|
|
let keypair = Keypair::random();
|
|
let original = Signature::new(&[42, 42], &keypair.sk);
|
|
|
|
let bytes = ssz_encode(&original);
|
|
let signature_bytes = SignatureBytes::from_bytes(&bytes).unwrap();
|
|
let signature: Result<Signature, _> = (&signature_bytes).try_into();
|
|
assert!(signature.is_ok());
|
|
assert_eq!(original, signature.unwrap());
|
|
}
|
|
|
|
#[test]
|
|
#[cfg(not(feature = "fake_crypto"))]
|
|
pub fn test_invalid_signature() {
|
|
let mut signature_bytes = [0; BLS_SIG_BYTE_SIZE];
|
|
signature_bytes[0] = 255; //a_flag1 == b_flag1 == c_flag1 == 1 and x1 = 0 shouldn't be allowed
|
|
let signature_bytes = SignatureBytes::from_bytes(&signature_bytes[..]);
|
|
assert!(signature_bytes.is_ok());
|
|
|
|
let signature: Result<Signature, _> = signature_bytes.as_ref().unwrap().try_into();
|
|
assert!(signature.is_err());
|
|
}
|
|
}
|