mirror of
https://github.com/status-im/nimbus-eth2.git
synced 2025-01-09 13:56:23 +00:00
f5e9d3ffe4
Annotate the `research` and `test` files for which no further changes are needed to successfully compile them, to not interfere with periodic tasks such as spec reference bumps.
90 lines
3.7 KiB
Nim
90 lines
3.7 KiB
Nim
# beacon_chain
|
|
# Copyright (c) 2022-2024 Status Research & Development GmbH
|
|
# Licensed and distributed under either of
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
{.push raises: [].}
|
|
{.used.}
|
|
|
|
import
|
|
std/[typetraits, sequtils],
|
|
unittest2, stew/byteutils,
|
|
../beacon_chain/spec/[crypto, keystore],
|
|
./testutil
|
|
|
|
func sign(secrets: seq[SecretShare], message: seq[byte]): seq[SignatureShare] =
|
|
let msg = message
|
|
return secrets.mapIt(it.key.blsSign(message).toSignatureShare(it.id))
|
|
|
|
suite "Key spliting":
|
|
let
|
|
privateKey = ValidatorPrivKey.init("0x25295f0d1d592a90b333e26e85149708208e9f8e8bc18f6c77bd62f8ad7a6866")
|
|
pubKey = privateKey.toPubKey.toPubKey
|
|
password = string.fromBytes hexToSeqByte("7465737470617373776f7264f09f9491")
|
|
salt = hexToSeqByte "d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3"
|
|
iv = hexToSeqByte "264daa3f303d7259501c93d997d84fe6"
|
|
rng = HmacDrbgContext.new()
|
|
msg = rng[].generateBytes(32)
|
|
|
|
test "single share":
|
|
let maybeShares = generateSecretShares(privateKey, rng[], 1, 1)
|
|
check maybeShares.isOk
|
|
let shares = maybeShares.get
|
|
check shares.len == 1
|
|
let signs = shares.sign(msg)
|
|
let recovered = signs.recoverSignature()
|
|
check pubKey.blsVerify(msg, recovered)
|
|
check pubKey.confirmShares(shares, rng[])
|
|
|
|
test "k < n":
|
|
let maybeShares = generateSecretShares(privateKey, rng[], 2, 3)
|
|
doAssert maybeShares.isOk
|
|
let shares = maybeShares.get
|
|
check shares.len == 3
|
|
let signs = shares.sign(msg)
|
|
|
|
var invalidShare = shares[2]
|
|
invalidShare.id = 1000 # 1000 is an arbitrary wrong value
|
|
|
|
check pubKey.blsVerify(msg, signs.recoverSignature())
|
|
check pubKey.blsVerify(msg, @[signs[0], signs[1]].recoverSignature())
|
|
check pubKey.blsVerify(msg, @[signs[1], signs[2]].recoverSignature())
|
|
check pubKey.blsVerify(msg, @[signs[2], signs[0]].recoverSignature())
|
|
check not pubKey.blsVerify(msg, @[signs[0]].recoverSignature())
|
|
check pubKey.confirmShares(shares, rng[])
|
|
check pubKey.confirmShares(@[shares[0], shares[1]], rng[])
|
|
check pubKey.confirmShares(@[shares[1], shares[2]], rng[])
|
|
check pubKey.confirmShares(@[shares[2], shares[0]], rng[])
|
|
check pubKey.confirmShares(@[shares[0], shares[2]], rng[])
|
|
check not pubKey.confirmShares(@[shares[0]], rng[])
|
|
check not pubKey.confirmShares(@[shares[1]], rng[])
|
|
check not pubKey.confirmShares(@[shares[2]], rng[])
|
|
check not pubKey.confirmShares(@[invalidShare], rng[])
|
|
check not pubKey.confirmShares(@[shares[0], invalidShare], rng[])
|
|
check not pubKey.confirmShares(@[shares[1], invalidShare], rng[])
|
|
check not pubKey.confirmShares(@[shares[2], invalidShare], rng[])
|
|
|
|
test "k == n":
|
|
let maybeShares = generateSecretShares(privateKey, rng[], 3, 3)
|
|
check maybeShares.isOk
|
|
let shares = maybeShares.get
|
|
check shares.len == 3
|
|
let signs = shares.sign(msg)
|
|
let recovered = signs.recoverSignature()
|
|
check pubKey.blsVerify(msg, recovered)
|
|
check not pubKey.blsVerify(msg, @[signs[0]].recoverSignature())
|
|
check not pubKey.blsVerify(msg, @[signs[0], signs[1]].recoverSignature())
|
|
check pubKey.confirmShares(shares, rng[])
|
|
|
|
test "k == n == 100":
|
|
let maybeShares = generateSecretShares(privateKey, rng[], 100, 100)
|
|
check maybeShares.isOk
|
|
let shares = maybeShares.get
|
|
check shares.len == 100
|
|
let signs = shares.sign(msg)
|
|
let recovered = signs.recoverSignature()
|
|
check pubKey.blsVerify(msg, recovered)
|
|
check pubKey.confirmShares(shares, rng[])
|