The core protocol of WoopChain
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
woop/crypto/bls/bls_test.go

241 lines
5.9 KiB

package bls
import (
"strings"
"testing"
"github.com/harmony-one/bls/ffi/go/bls"
"github.com/harmony-one/harmony/internal/utils"
)
// Test the basic functionality of a BLS multi-sig mask.
func TestNewMask(test *testing.T) {
_, pubKey1 := utils.GenKey("127.0.0.1", "5555")
_, pubKey2 := utils.GenKey("127.0.0.1", "6666")
_, pubKey3 := utils.GenKey("127.0.0.1", "7777")
mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey1)
if err != nil {
test.Errorf("Failed to create a new Mask: %s", err)
}
if mask.Len() != 1 {
test.Errorf("Mask created with wrong size: %d", mask.Len())
}
enabled, err := mask.KeyEnabled(pubKey1)
if !enabled || err != nil {
test.Errorf("My key pubKey1 should have been enabled: %s", err)
}
if mask.CountEnabled() != 1 {
test.Error("Only one key should have been enabled")
}
if mask.CountTotal() != 3 {
test.Error("Should have a total of 3 keys")
}
}
func TestNewMaskWithAbsentPublicKey(test *testing.T) {
_, pubKey1 := utils.GenKey("127.0.0.1", "5555")
_, pubKey2 := utils.GenKey("127.0.0.1", "6666")
_, pubKey3 := utils.GenKey("127.0.0.1", "7777")
_, pubKey4 := utils.GenKey("127.0.0.1", "8190")
mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey4)
if err == nil {
test.Errorf("Failed to create a new Mask: %s", err)
}
if mask != nil {
test.Errorf("Expected failure to create a new mask")
}
}
func TestThreshHoldPolicy(test *testing.T) {
_, pubKey1 := utils.GenKey("127.0.0.1", "5555")
_, pubKey2 := utils.GenKey("127.0.0.1", "6666")
_, pubKey3 := utils.GenKey("127.0.0.1", "7777")
mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey1)
if err != nil {
test.Errorf("Failed to create a new Mask: %s", err)
}
if mask.Len() != 1 {
test.Errorf("Mask created with wrong size: %d", mask.Len())
}
threshHoldPolicy := *NewThresholdPolicy(1)
mask.SetKey(pubKey1, true)
mask.SetKey(pubKey2, true)
if mask.CountEnabled() != 2 {
test.Errorf("Number of enabled nodes: %d , expected count = 2 ", mask.CountEnabled())
}
if !threshHoldPolicy.Check(mask) {
test.Error("Number of enabled nodes less than threshold")
}
mask.SetKey(pubKey1, false)
mask.SetKey(pubKey2, false)
if threshHoldPolicy.Check(mask) {
test.Error("Number of enabled nodes more than equal to threshold")
}
}
func TestCompletePolicy(test *testing.T) {
_, pubKey1 := utils.GenKey("127.0.0.1", "5555")
_, pubKey2 := utils.GenKey("127.0.0.1", "6666")
_, pubKey3 := utils.GenKey("127.0.0.1", "7777")
mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey1)
if err != nil {
test.Errorf("Failed to create a new Mask: %s", err)
}
if mask.Len() != 1 {
test.Errorf("Mask created with wrong size: %d", mask.Len())
}
completePolicy := CompletePolicy{}
mask.SetKey(pubKey1, true)
mask.SetKey(pubKey2, true)
mask.SetKey(pubKey3, true)
if mask.CountEnabled() != 3 {
test.Errorf("Number of enabled nodes: %d , expected count = 3 ", mask.CountEnabled())
}
if !completePolicy.Check(mask) {
test.Error("Number of enabled nodes not equal to total count")
}
mask.SetKey(pubKey1, false)
if completePolicy.Check(mask) {
test.Error("Number of enabled nodes equal to total count")
}
}
func TestAggregatedSignature(test *testing.T) {
var sec bls.SecretKey
sec.SetByCSPRNG()
signs := []*bls.Sign{sec.Sign("message1"), sec.Sign("message2")}
multiSignature := AggregateSig(signs)
str := multiSignature.GetHexString()
if strings.Compare(multiSignature.GetHexString(), "0") == 0 {
test.Error("Error creating multisignature", str)
}
}
func TestAggregateMasks(test *testing.T) {
message := []byte("message")
newMessage := []byte("message")
emptyMessage := []byte("")
aggMask, err := AggregateMasks(message, emptyMessage)
if aggMask != nil {
test.Error("Expected mismatching bitmap lengths")
}
if err == nil {
test.Error("Expected error thrown because of bitmap length mismatch")
}
if _, err := AggregateMasks(message, newMessage); err != nil {
test.Error("Error thrown in aggregating masks")
}
}
func TestEnableKeyFunctions(test *testing.T) {
_, pubKey1 := utils.GenKey("127.0.0.1", "5555")
_, pubKey2 := utils.GenKey("127.0.0.1", "6666")
_, pubKey3 := utils.GenKey("127.0.0.1", "7777")
_, pubKey4 := utils.GenKey("127.0.0.1", "1234")
mask, err := NewMask([]*bls.PublicKey{pubKey1, pubKey2, pubKey3}, pubKey1)
if err != nil {
test.Errorf("Failed to create a new Mask: %s", err)
}
length := mask.Len()
_ = length
if mask.Len() != 1 {
test.Errorf("Mask created with wrong size: %d", mask.Len())
}
mask.SetBit(0, true)
mask.SetBit(1, false)
mask.SetBit(0, true)
if err := mask.SetBit(5, true); err == nil {
test.Error("Expected index out of range error")
}
enabledKeys := mask.GetPubKeyFromMask(true)
disabledKeys := mask.GetPubKeyFromMask(false)
if len(enabledKeys) != 1 {
test.Error("Count of enabled keys doesn't match")
}
if len(disabledKeys) != 2 {
test.Error("Count of disabled keys don't match")
}
if _, error := mask.KeyEnabled(pubKey4); error == nil {
test.Error("Expected key not found error")
}
if _, error := mask.IndexEnabled(5); error == nil {
test.Error("Expected index out of range error")
}
if err := mask.SetKey(pubKey4, true); err == nil {
test.Error("Expected key nout found error")
}
}
func TestCopyParticipatingMask(test *testing.T) {
_, pubKey1 := utils.GenKey("127.0.0.1", "5555")
_, pubKey2 := utils.GenKey("127.0.0.1", "6666")
mask, _ := NewMask([]*bls.PublicKey{pubKey1, pubKey2}, pubKey1)
clonedMask := mask.Mask()
if len(clonedMask) != 1 {
test.Error("Length of clonedMask doesn't match")
}
}
func TestSetMask(test *testing.T) {
_, pubKey1 := utils.GenKey("127.0.0.1", "5555")
_, pubKey2 := utils.GenKey("127.0.0.1", "6666")
mask, _ := NewMask([]*bls.PublicKey{pubKey1, pubKey2}, pubKey1)
_ = mask
left := []byte{3}
mask.SetMask(left)
if mask.CountEnabled() != 2 {
test.Error("Count of Enabled nodes doesn't match")
}
}