package bls import ( "strings" "testing" "github.com/harmony-one/bls/ffi/go/bls" "github.com/harmony-one/harmony/internal/utils" ) // Test the basic functionality of a BLS multi-sig mask. func TestNewMask(test *testing.T) { _, pubKey1 := utils.GenKey("127.0.0.1", "5555") _, pubKey2 := utils.GenKey("127.0.0.1", "6666") _, pubKey3 := utils.GenKey("127.0.0.1", "7777") mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey1) if err != nil { test.Errorf("Failed to create a new Mask: %s", err) } if mask.Len() != 1 { test.Errorf("Mask created with wrong size: %d", mask.Len()) } enabled, err := mask.KeyEnabled(pubKey1) if !enabled || err != nil { test.Errorf("My key pubKey1 should have been enabled: %s", err) } if mask.CountEnabled() != 1 { test.Error("Only one key should have been enabled") } if mask.CountTotal() != 3 { test.Error("Should have a total of 3 keys") } } func TestNewMaskWithAbsentPublicKey(test *testing.T) { _, pubKey1 := utils.GenKey("127.0.0.1", "5555") _, pubKey2 := utils.GenKey("127.0.0.1", "6666") _, pubKey3 := utils.GenKey("127.0.0.1", "7777") _, pubKey4 := utils.GenKey("127.0.0.1", "8190") mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey4) if err == nil { test.Errorf("Failed to create a new Mask: %s", err) } if mask != nil { test.Errorf("Expected failure to create a new mask") } } func TestThreshHoldPolicy(test *testing.T) { _, pubKey1 := utils.GenKey("127.0.0.1", "5555") _, pubKey2 := utils.GenKey("127.0.0.1", "6666") _, pubKey3 := utils.GenKey("127.0.0.1", "7777") mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey1) if err != nil { test.Errorf("Failed to create a new Mask: %s", err) } if mask.Len() != 1 { test.Errorf("Mask created with wrong size: %d", mask.Len()) } threshHoldPolicy := *NewThresholdPolicy(1) mask.SetKey(pubKey1, true) mask.SetKey(pubKey2, true) if mask.CountEnabled() != 2 { test.Errorf("Number of enabled nodes: %d , expected count = 2 ", mask.CountEnabled()) } if !threshHoldPolicy.Check(mask) { test.Error("Number of enabled nodes less than threshold") } mask.SetKey(pubKey1, false) mask.SetKey(pubKey2, false) if threshHoldPolicy.Check(mask) { test.Error("Number of enabled nodes more than equal to threshold") } } func TestCompletePolicy(test *testing.T) { _, pubKey1 := utils.GenKey("127.0.0.1", "5555") _, pubKey2 := utils.GenKey("127.0.0.1", "6666") _, pubKey3 := utils.GenKey("127.0.0.1", "7777") mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey1) if err != nil { test.Errorf("Failed to create a new Mask: %s", err) } if mask.Len() != 1 { test.Errorf("Mask created with wrong size: %d", mask.Len()) } completePolicy := CompletePolicy{} mask.SetKey(pubKey1, true) mask.SetKey(pubKey2, true) mask.SetKey(pubKey3, true) if mask.CountEnabled() != 3 { test.Errorf("Number of enabled nodes: %d , expected count = 3 ", mask.CountEnabled()) } if !completePolicy.Check(mask) { test.Error("Number of enabled nodes not equal to total count") } mask.SetKey(pubKey1, false) if completePolicy.Check(mask) { test.Error("Number of enabled nodes equal to total count") } } func TestAggregatedSignature(test *testing.T) { var sec bls.SecretKey sec.SetByCSPRNG() signs := []*bls.Sign{sec.Sign("message1"), sec.Sign("message2")} multiSignature := AggregateSig(signs) str := multiSignature.GetHexString() if strings.Compare(multiSignature.GetHexString(), "0") == 0 { test.Error("Error creating multisignature", str) } } func TestAggregateMasks(test *testing.T) { message := []byte("message") newMessage := []byte("message") emptyMessage := []byte("") aggMask, err := AggregateMasks(message, emptyMessage) if aggMask != nil { test.Error("Expected mismatching bitmap lengths") } if err == nil { test.Error("Expected error thrown because of bitmap length mismatch") } if _, err := AggregateMasks(message, newMessage); err != nil { test.Error("Error thrown in aggregating masks") } } func TestEnableKeyFunctions(test *testing.T) { _, pubKey1 := utils.GenKey("127.0.0.1", "5555") _, pubKey2 := utils.GenKey("127.0.0.1", "6666") _, pubKey3 := utils.GenKey("127.0.0.1", "7777") _, pubKey4 := utils.GenKey("127.0.0.1", "1234") mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey1) if err != nil { test.Errorf("Failed to create a new Mask: %s", err) } length := mask.Len() _ = length if mask.Len() != 1 { test.Errorf("Mask created with wrong size: %d", mask.Len()) } mask.SetBit(0, true) mask.SetBit(1, false) mask.SetBit(0, true) if err := mask.SetBit(5, true); err == nil { test.Error("Expected index out of range error") } enabledKeys := mask.GetPubKeyFromMask(true) disabledKeys := mask.GetPubKeyFromMask(false) if len(enabledKeys) != 1 { test.Error("Count of enabled keys doesn't match") } if len(disabledKeys) != 2 { test.Error("Count of disabled keys don't match") } if _, error := mask.KeyEnabled(pubKey4); error == nil { test.Error("Expected key not found error") } if _, error := mask.IndexEnabled(5); error == nil { test.Error("Expected index out of range error") } if err := mask.SetKey(pubKey4, true); err == nil { test.Error("Expected key nout found error") } } func TestCopyParticipatingMask(test *testing.T) { _, pubKey1 := utils.GenKey("127.0.0.1", "5555") _, pubKey2 := utils.GenKey("127.0.0.1", "6666") mask, _ := NewMask([]*bls.PublicKey{pubKey1, pubKey2}, pubKey1) clonedMask := mask.Mask() if len(clonedMask) != 1 { test.Error("Length of clonedMask doesn't match") } } func TestSetMask(test *testing.T) { _, pubKey1 := utils.GenKey("127.0.0.1", "5555") _, pubKey2 := utils.GenKey("127.0.0.1", "6666") mask, _ := NewMask([]*bls.PublicKey{pubKey1, pubKey2}, pubKey1) _ = mask maskBytes := []byte{3} mask.SetMask(maskBytes) if mask.CountEnabled() != 2 { test.Error("Count of Enabled nodes doesn't match") } newMaskBytes := []byte{3, 2} if err := mask.SetMask(newMaskBytes); err == nil { test.Error("Expected mismatching Bitmap lengths") } }