mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-15 02:42:38 +00:00
* Start updating types * WIP * Signature hacking * Existing EF tests passing with fake_crypto * Updates * Delete outdated API spec * The refactor continues * It compiles * WIP test fixes * All release tests passing bar genesis state parsing * Update and test YamlConfig * Update to spec v0.10 compatible BLS * Updates to BLS EF tests * Add EF test for AggregateVerify And delete unused hash2curve tests for uncompressed points * Update EF tests to v0.10.1 * Use optional block root correctly in block proc * Use genesis fork in deposit domain. All tests pass * Cargo fmt * Fast aggregate verify test * Update REST API docs * Cargo fmt * Fix unused import * Bump spec tags to v0.10.1 * Add `seconds_per_eth1_block` to chainspec * Update to timestamp based eth1 voting scheme * Return None from `get_votes_to_consider` if block cache is empty * Handle overflows in `is_candidate_block` * Revert to failing tests * Fix eth1 data sets test * Choose default vote according to spec * Fix collect_valid_votes tests * Fix `get_votes_to_consider` to choose all eligible blocks * Uncomment winning_vote tests * Add comments; remove unused code * Reduce seconds_per_eth1_block for simulation * Addressed review comments * Add test for default vote case * Fix logs * Remove unused functions * Meter default eth1 votes * Fix comments * Address review comments; remove unused dependency * Disable/delete two outdated tests * Bump eth1 default vote warn to error * Delete outdated eth1 test Co-authored-by: Pawan Dhananjay <pawandhananjay@gmail.com>
81 lines
2.3 KiB
Rust
81 lines
2.3 KiB
Rust
extern crate milagro_bls;
|
|
extern crate ssz;
|
|
|
|
#[macro_use]
|
|
mod macros;
|
|
mod keypair;
|
|
mod public_key_bytes;
|
|
mod secret_key;
|
|
mod signature_bytes;
|
|
mod signature_set;
|
|
|
|
pub use crate::keypair::Keypair;
|
|
pub use crate::public_key_bytes::PublicKeyBytes;
|
|
pub use crate::secret_key::SecretKey;
|
|
pub use crate::signature_bytes::SignatureBytes;
|
|
pub use milagro_bls::{compress_g2, hash_on_g2, G1Point};
|
|
pub use signature_set::{verify_signature_sets, G1Ref, SignatureSet, SignedMessage};
|
|
|
|
#[cfg(feature = "fake_crypto")]
|
|
mod fake_aggregate_public_key;
|
|
#[cfg(feature = "fake_crypto")]
|
|
mod fake_aggregate_signature;
|
|
#[cfg(feature = "fake_crypto")]
|
|
mod fake_public_key;
|
|
#[cfg(feature = "fake_crypto")]
|
|
mod fake_signature;
|
|
|
|
#[cfg(not(feature = "fake_crypto"))]
|
|
mod aggregate_public_key;
|
|
#[cfg(not(feature = "fake_crypto"))]
|
|
mod aggregate_signature;
|
|
#[cfg(not(feature = "fake_crypto"))]
|
|
mod public_key;
|
|
#[cfg(not(feature = "fake_crypto"))]
|
|
mod signature;
|
|
|
|
#[cfg(feature = "fake_crypto")]
|
|
pub use fakes::*;
|
|
#[cfg(feature = "fake_crypto")]
|
|
mod fakes {
|
|
pub use crate::fake_aggregate_public_key::FakeAggregatePublicKey as AggregatePublicKey;
|
|
pub use crate::fake_aggregate_signature::FakeAggregateSignature as AggregateSignature;
|
|
pub use crate::fake_public_key::FakePublicKey as PublicKey;
|
|
pub use crate::fake_signature::FakeSignature as Signature;
|
|
}
|
|
|
|
#[cfg(not(feature = "fake_crypto"))]
|
|
pub use reals::*;
|
|
#[cfg(not(feature = "fake_crypto"))]
|
|
mod reals {
|
|
pub use crate::aggregate_public_key::AggregatePublicKey;
|
|
pub use crate::aggregate_signature::AggregateSignature;
|
|
pub use crate::public_key::PublicKey;
|
|
pub use crate::signature::Signature;
|
|
}
|
|
|
|
pub const BLS_AGG_SIG_BYTE_SIZE: usize = 96;
|
|
pub const BLS_SIG_BYTE_SIZE: usize = 96;
|
|
pub const BLS_SECRET_KEY_BYTE_SIZE: usize = 48;
|
|
pub const BLS_PUBLIC_KEY_BYTE_SIZE: usize = 48;
|
|
|
|
use eth2_hashing::hash;
|
|
use ssz::ssz_encode;
|
|
|
|
/// Returns the withdrawal credentials for a given public key.
|
|
pub fn get_withdrawal_credentials(pubkey: &PublicKey, prefix_byte: u8) -> Vec<u8> {
|
|
let hashed = hash(&ssz_encode(pubkey));
|
|
let mut prefixed = vec![prefix_byte];
|
|
prefixed.extend_from_slice(&hashed[1..]);
|
|
|
|
prefixed
|
|
}
|
|
|
|
pub fn bls_verify_aggregate(
|
|
pubkey: &AggregatePublicKey,
|
|
message: &[u8],
|
|
signature: &AggregateSignature,
|
|
) -> bool {
|
|
signature.verify(message, pubkey)
|
|
}
|