mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-20 13:24:44 +00:00
* Start updating types * WIP * Signature hacking * Existing EF tests passing with fake_crypto * Updates * Delete outdated API spec * The refactor continues * It compiles * WIP test fixes * All release tests passing bar genesis state parsing * Update and test YamlConfig * Update to spec v0.10 compatible BLS * Updates to BLS EF tests * Add EF test for AggregateVerify And delete unused hash2curve tests for uncompressed points * Update EF tests to v0.10.1 * Use optional block root correctly in block proc * Use genesis fork in deposit domain. All tests pass * Cargo fmt * Fast aggregate verify test * Update REST API docs * Cargo fmt * Fix unused import * Bump spec tags to v0.10.1 * Add `seconds_per_eth1_block` to chainspec * Update to timestamp based eth1 voting scheme * Return None from `get_votes_to_consider` if block cache is empty * Handle overflows in `is_candidate_block` * Revert to failing tests * Fix eth1 data sets test * Choose default vote according to spec * Fix collect_valid_votes tests * Fix `get_votes_to_consider` to choose all eligible blocks * Uncomment winning_vote tests * Add comments; remove unused code * Reduce seconds_per_eth1_block for simulation * Addressed review comments * Add test for default vote case * Fix logs * Remove unused functions * Meter default eth1 votes * Fix comments * Address review comments; remove unused dependency * Disable/delete two outdated tests * Bump eth1 default vote warn to error * Delete outdated eth1 test Co-authored-by: Pawan Dhananjay <pawandhananjay@gmail.com>
135 lines
3.4 KiB
Rust
135 lines
3.4 KiB
Rust
use super::{PublicKey, SecretKey, BLS_SIG_BYTE_SIZE};
|
|
use hex::encode as hex_encode;
|
|
use milagro_bls::G2Point;
|
|
use serde::de::{Deserialize, Deserializer};
|
|
use serde::ser::{Serialize, Serializer};
|
|
use serde_hex::PrefixedHexVisitor;
|
|
use ssz::{ssz_encode, Decode, DecodeError, Encode};
|
|
|
|
/// A single BLS signature.
|
|
///
|
|
/// This struct is a wrapper upon a base type and provides helper functions (e.g., SSZ
|
|
/// serialization).
|
|
#[derive(Debug, PartialEq, Clone, Eq)]
|
|
pub struct FakeSignature {
|
|
bytes: Vec<u8>,
|
|
is_empty: bool,
|
|
/// Never used, only use for compatibility with "real" `Signature`.
|
|
pub point: G2Point,
|
|
}
|
|
|
|
impl FakeSignature {
|
|
/// Creates a new all-zero's signature
|
|
pub fn new(_msg: &[u8], _sk: &SecretKey) -> Self {
|
|
FakeSignature::zero()
|
|
}
|
|
|
|
/// Creates a new all-zero's signature
|
|
pub fn zero() -> Self {
|
|
Self {
|
|
bytes: vec![0; BLS_SIG_BYTE_SIZE],
|
|
is_empty: true,
|
|
point: G2Point::new(),
|
|
}
|
|
}
|
|
|
|
/// Creates a new all-zero's signature
|
|
pub fn new_hashed(_x_real_hashed: &[u8], _x_imaginary_hashed: &[u8], _sk: &SecretKey) -> Self {
|
|
FakeSignature::zero()
|
|
}
|
|
|
|
/// _Always_ returns `true`.
|
|
pub fn verify(&self, _msg: &[u8], _pk: &PublicKey) -> bool {
|
|
true
|
|
}
|
|
|
|
pub fn as_raw(&self) -> &Self {
|
|
&self
|
|
}
|
|
|
|
/// _Always_ returns true.
|
|
pub fn verify_hashed(
|
|
&self,
|
|
_x_real_hashed: &[u8],
|
|
_x_imaginary_hashed: &[u8],
|
|
_pk: &PublicKey,
|
|
) -> bool {
|
|
true
|
|
}
|
|
|
|
/// Convert bytes to fake BLS Signature
|
|
pub fn from_bytes(bytes: &[u8]) -> Result<Self, DecodeError> {
|
|
if bytes.len() != BLS_SIG_BYTE_SIZE {
|
|
Err(DecodeError::InvalidByteLength {
|
|
len: bytes.len(),
|
|
expected: BLS_SIG_BYTE_SIZE,
|
|
})
|
|
} else {
|
|
let is_empty = bytes.iter().all(|x| *x == 0);
|
|
Ok(Self {
|
|
bytes: bytes.to_vec(),
|
|
is_empty,
|
|
point: G2Point::new(),
|
|
})
|
|
}
|
|
}
|
|
|
|
pub fn as_bytes(&self) -> Vec<u8> {
|
|
self.bytes.clone()
|
|
}
|
|
|
|
/// Returns a new empty signature.
|
|
pub fn empty_signature() -> Self {
|
|
FakeSignature::zero()
|
|
}
|
|
|
|
// Check for empty Signature
|
|
pub fn is_empty(&self) -> bool {
|
|
self.is_empty
|
|
}
|
|
}
|
|
|
|
impl_ssz!(FakeSignature, BLS_SIG_BYTE_SIZE, "FakeSignature");
|
|
|
|
impl_tree_hash!(FakeSignature, BLS_SIG_BYTE_SIZE);
|
|
|
|
impl Serialize for FakeSignature {
|
|
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
|
|
where
|
|
S: Serializer,
|
|
{
|
|
serializer.serialize_str(&hex_encode(ssz_encode(self)))
|
|
}
|
|
}
|
|
|
|
impl<'de> Deserialize<'de> for FakeSignature {
|
|
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
|
|
where
|
|
D: Deserializer<'de>,
|
|
{
|
|
let bytes = deserializer.deserialize_str(PrefixedHexVisitor)?;
|
|
let pubkey = <_>::from_ssz_bytes(&bytes[..])
|
|
.map_err(|e| serde::de::Error::custom(format!("invalid ssz ({:?})", e)))?;
|
|
Ok(pubkey)
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::super::Keypair;
|
|
use super::*;
|
|
use ssz::ssz_encode;
|
|
|
|
#[test]
|
|
pub fn test_ssz_round_trip() {
|
|
let keypair = Keypair::random();
|
|
|
|
let original = FakeSignature::new(&[42, 42], &keypair.sk);
|
|
|
|
let bytes = ssz_encode(&original);
|
|
let decoded = FakeSignature::from_ssz_bytes(&bytes).unwrap();
|
|
|
|
assert_eq!(original, decoded);
|
|
}
|
|
}
|