-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix broken test generators #1575
Changes from 4 commits
6e73df0
2a0f680
f012844
dd9325d
3b80e12
67763ae
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -20,6 +20,7 @@ def hash(x): | |
|
||
F2Q_COEFF_LEN = 48 | ||
G2_COMPRESSED_Z_LEN = 48 | ||
DST = bls.G2ProofOfPossession.DST | ||
|
||
|
||
def int_to_hex(n: int, byte_length: int = None) -> str: | ||
|
@@ -29,6 +30,13 @@ def int_to_hex(n: int, byte_length: int = None) -> str: | |
return encode_hex(byte_value) | ||
|
||
|
||
def int_to_bytes(n: int, byte_length: int = None) -> bytes: | ||
byte_value = int_to_big_endian(n) | ||
if byte_length: | ||
byte_value = byte_value.rjust(byte_length, b'\x00') | ||
djrtwo marked this conversation as resolved.
Show resolved
Hide resolved
|
||
return byte_value | ||
|
||
|
||
def hex_to_int(x: str) -> int: | ||
return int(x, 16) | ||
|
||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The line 44 |
||
|
@@ -57,13 +65,11 @@ def hex_to_int(x: str) -> int: | |
] | ||
|
||
|
||
def hash_message(msg: bytes, | ||
domain: bytes) -> Tuple[Tuple[str, str], Tuple[str, str], Tuple[str, str]]: | ||
def hash_message(msg: bytes) -> Tuple[Tuple[str, str], Tuple[str, str], Tuple[str, str]]: | ||
""" | ||
Hash message | ||
Input: | ||
- Message as bytes32 | ||
- domain as bytes8 | ||
Output: | ||
- Message hash as a G2 point | ||
""" | ||
|
@@ -72,49 +78,44 @@ def hash_message(msg: bytes, | |
int_to_hex(fq2.coeffs[0], F2Q_COEFF_LEN), | ||
int_to_hex(fq2.coeffs[1], F2Q_COEFF_LEN), | ||
] | ||
for fq2 in bls.utils.hash_to_G2(msg, domain) | ||
for fq2 in bls.hash_to_curve.hash_to_G2(msg, DST) | ||
] | ||
|
||
|
||
def hash_message_compressed(msg: bytes, domain: bytes) -> Tuple[str, str]: | ||
def hash_message_compressed(msg: bytes) -> Tuple[str, str]: | ||
CarlBeek marked this conversation as resolved.
Show resolved
Hide resolved
|
||
""" | ||
Hash message | ||
Input: | ||
- Message as bytes32 | ||
- domain as bytes8 | ||
Output: | ||
- Message hash as a compressed G2 point | ||
""" | ||
z1, z2 = bls.utils.compress_G2(bls.utils.hash_to_G2(msg, domain)) | ||
z1, z2 = bls.point_compression.compress_G2(bls.hash_to_curve.hash_to_G2(msg, DST)) | ||
return [int_to_hex(z1, G2_COMPRESSED_Z_LEN), int_to_hex(z2, G2_COMPRESSED_Z_LEN)] | ||
|
||
|
||
def case01_message_hash_G2_uncompressed(): | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is this (and There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I don't feel very strongly. These tests are really to ensure that you've integrated and configured your BLS library properly before getting lost in pyspec tests. Curious to hear @benjaminion or @mratsim's opinion on this There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. On the whole, I think that the reference tests should test only things used directly in the spec. Implementation-specific unit tests should take care of anything lower-level. So I'd vote for omitting the aggregate pubkeys tests, as well as the hash-to-G2 tests. The remaining BLS reference tests implicitly test these things in any case. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I should add a concrete rationale for the above, which is that it's undesirable to have to expose the inner workings of the BLS stuff just to satisfy the reference tests. If we can avoid doing that then it's easier to keep everything nicely encapsulated. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. agree all around. Only the 5 specified BLS functions are now directly tested in this suite Would love a last set of review @ChihChengLiang and/or @CarlBeek. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. My opinions are basically summarised by @benjaminion's comments above. Only test the high level API functionality that we use in the spec offered by a "standard" implementation of the specs. |
||
for msg in MESSAGES: | ||
for domain in DOMAINS: | ||
yield f'uncom_g2_hash_{encode_hex(msg)}_{encode_hex(domain)}', { | ||
'input': { | ||
'message': encode_hex(msg), | ||
'domain': encode_hex(domain), | ||
}, | ||
'output': hash_message(msg, domain) | ||
} | ||
yield f'uncom_g2_hash_{encode_hex(msg)}', { | ||
'input': { | ||
'message': encode_hex(msg), | ||
}, | ||
'output': hash_message(msg) | ||
} | ||
|
||
|
||
def case02_message_hash_G2_compressed(): | ||
for msg in MESSAGES: | ||
for domain in DOMAINS: | ||
yield f'com_g2_hash_{encode_hex(msg)}_{encode_hex(domain)}', { | ||
'input': { | ||
'message': encode_hex(msg), | ||
'domain': encode_hex(domain), | ||
}, | ||
'output': hash_message_compressed(msg, domain) | ||
} | ||
yield f'com_g2_hash_{encode_hex(msg)}', { | ||
'input': { | ||
'message': encode_hex(msg), | ||
}, | ||
'output': hash_message_compressed(msg) | ||
} | ||
|
||
|
||
def case03_private_to_public_key(): | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I am not convinced that we should be explicitly checking this. While I exposed this functionality in There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is this not an exceedingly common operation that we want to test? -- the determinism of moving from a secret integer to a pubkey? I suppose I might be missing something There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I agree that it is useful to test common functionality and that this functionality is probably common, but |
||
pubkeys = [bls.privtopub(privkey) for privkey in PRIVKEYS] | ||
pubkeys = [bls. G2ProofOfPossession.PrivToPub(privkey) for privkey in PRIVKEYS] | ||
pubkeys_serial = ['0x' + pubkey.hex() for pubkey in pubkeys] | ||
for privkey, pubkey_serial in zip(PRIVKEYS, pubkeys_serial): | ||
yield f'priv_to_pub_{int_to_hex(privkey)}', { | ||
|
@@ -123,47 +124,154 @@ def case03_private_to_public_key(): | |
} | ||
|
||
|
||
def case04_sign_messages(): | ||
def case04_sign_message(): | ||
for privkey in PRIVKEYS: | ||
for message in MESSAGES: | ||
for domain in DOMAINS: | ||
sig = bls.sign(message, privkey, domain) | ||
full_name = f'{int_to_hex(privkey)}_{encode_hex(message)}_{encode_hex(domain)}' | ||
yield f'sign_msg_case_{(hash(bytes(full_name, "utf-8"))[:8]).hex()}', { | ||
'input': { | ||
'privkey': int_to_hex(privkey), | ||
'message': encode_hex(message), | ||
'domain': encode_hex(domain), | ||
}, | ||
'output': encode_hex(sig) | ||
} | ||
sig = bls.G2ProofOfPossession.Sign(privkey, message) | ||
full_name = f'{int_to_hex(privkey)}_{encode_hex(message)}' | ||
yield f'sign_msg_case_{(hash(bytes(full_name, "utf-8"))[:8]).hex()}', { | ||
'input': { | ||
'privkey': int_to_hex(privkey), | ||
'message': encode_hex(message), | ||
}, | ||
'output': encode_hex(sig) | ||
} | ||
|
||
|
||
# TODO: case05_verify_messages: Verify messages signed in case04 | ||
# It takes too long, empty for now | ||
def case05_verify_message(): | ||
for i, privkey in enumerate(PRIVKEYS): | ||
for message in MESSAGES: | ||
# Valid signature | ||
signature = bls.G2ProofOfPossession.Sign(privkey, message) | ||
pubkey = bls.G2Basic.PrivToPub(privkey) | ||
CarlBeek marked this conversation as resolved.
Show resolved
Hide resolved
|
||
full_name = f'{encode_hex(pubkey)}_{encode_hex(message)}_valid' | ||
yield f'verify_msg_case_{(hash(bytes(full_name, "utf-8"))[:8]).hex()}', { | ||
'input': { | ||
'pubkey': encode_hex(pubkey), | ||
'message': encode_hex(message), | ||
'signature': encode_hex(signature), | ||
}, | ||
'output': True, | ||
} | ||
|
||
# Invalid signatures -- wrong pubkey | ||
wrong_pubkey = bls.G2Basic.PrivToPub(PRIVKEYS[(i + 1) % len(PRIVKEYS)]) | ||
CarlBeek marked this conversation as resolved.
Show resolved
Hide resolved
|
||
full_name = f'{encode_hex(wrong_pubkey)}_{encode_hex(message)}_wrong_pubkey' | ||
yield f'verify_msg_case_{(hash(bytes(full_name, "utf-8"))[:8]).hex()}', { | ||
'input': { | ||
'pubkey': encode_hex(wrong_pubkey), | ||
'message': encode_hex(message), | ||
'signature': encode_hex(signature), | ||
}, | ||
'output': False, | ||
} | ||
|
||
def case06_aggregate_sigs(): | ||
for domain in DOMAINS: | ||
for message in MESSAGES: | ||
sigs = [bls.sign(message, privkey, domain) for privkey in PRIVKEYS] | ||
yield f'agg_sigs_{encode_hex(message)}_{encode_hex(domain)}', { | ||
'input': [encode_hex(sig) for sig in sigs], | ||
'output': encode_hex(bls.aggregate_signatures(sigs)), | ||
# Invalid signature -- tampered with signature | ||
tampered_signature = signature[:-4] + b'\xFF\xFF\xFF\xFF' | ||
full_name = f'{encode_hex(pubkey)}_{encode_hex(message)}_tampered_signature' | ||
yield f'verify_msg_case_{(hash(bytes(full_name, "utf-8"))[:8]).hex()}', { | ||
'input': { | ||
'pubkey': encode_hex(pubkey), | ||
'message': encode_hex(message), | ||
'signature': encode_hex(tampered_signature), | ||
}, | ||
'output': False, | ||
} | ||
|
||
|
||
def case06_aggregate_sigs(): | ||
for message in MESSAGES: | ||
sigs = [bls.G2ProofOfPossession.Sign(privkey, message) for privkey in PRIVKEYS] | ||
yield f'agg_sigs_{encode_hex(message)}', { | ||
'input': [encode_hex(sig) for sig in sigs], | ||
'output': encode_hex(bls.G2ProofOfPossession.Aggregate(sigs)), | ||
} | ||
|
||
|
||
def case07_aggregate_pubkeys(): | ||
pubkeys = [bls.privtopub(privkey) for privkey in PRIVKEYS] | ||
pubkeys = [bls.G2Basic.PrivToPub(privkey) for privkey in PRIVKEYS] | ||
pubkeys_serial = [encode_hex(pubkey) for pubkey in pubkeys] | ||
yield f'agg_pub_keys', { | ||
'input': pubkeys_serial, | ||
'output': encode_hex(bls.aggregate_pubkeys(pubkeys)), | ||
'output': encode_hex(bls.G2ProofOfPossession._AggregatePKs(pubkeys)), | ||
} | ||
|
||
|
||
# TODO | ||
# Aggregate verify | ||
def case08_fast_aggregate_verify(): | ||
for i, message in enumerate(MESSAGES): | ||
privkeys = PRIVKEYS[:i + 1] | ||
sigs = [bls.G2ProofOfPossession.Sign(privkey, message) for privkey in privkeys] | ||
aggregate_signature = bls.G2ProofOfPossession.Aggregate(sigs) | ||
pubkeys = [bls.G2Basic.PrivToPub(privkey) for privkey in privkeys] | ||
CarlBeek marked this conversation as resolved.
Show resolved
Hide resolved
|
||
pubkeys_serial = [encode_hex(pubkey) for pubkey in pubkeys] | ||
|
||
# Valid signature | ||
full_name = f'{pubkeys_serial}_{encode_hex(message)}_valid' | ||
yield f'fast_aggregate_verify_{(hash(bytes(full_name, "utf-8"))[:8]).hex()}', { | ||
'input': { | ||
'pubkeys': pubkeys_serial, | ||
'message': encode_hex(message), | ||
'signature': encode_hex(aggregate_signature), | ||
}, | ||
'output': True, | ||
} | ||
|
||
# Invalid signature -- extra pubkey | ||
pubkeys_extra = pubkeys + [bls.G2Basic.PrivToPub(PRIVKEYS[-1])] | ||
CarlBeek marked this conversation as resolved.
Show resolved
Hide resolved
|
||
pubkeys_extra_serial = [encode_hex(pubkey) for pubkey in pubkeys] | ||
full_name = f'{pubkeys_extra_serial}_{encode_hex(message)}_extra_pubkey' | ||
yield f'fast_aggregate_verify_{(hash(bytes(full_name, "utf-8"))[:8]).hex()}', { | ||
'input': { | ||
'pubkeys': pubkeys_extra_serial, | ||
'message': encode_hex(message), | ||
'signature': encode_hex(aggregate_signature), | ||
}, | ||
'output': False, | ||
} | ||
|
||
# Invalid signature -- tampered with signature | ||
tampered_signature = aggregate_signature[:-4] + b'\xff\xff\xff\xff' | ||
full_name = f'{pubkeys_serial}_{encode_hex(message)}_tampered_signature' | ||
yield f'fast_aggregate_verify_{(hash(bytes(full_name, "utf-8"))[:8]).hex()}', { | ||
'input': { | ||
'pubkeys': pubkeys_serial, | ||
'message': encode_hex(message), | ||
'signature': encode_hex(tampered_signature), | ||
}, | ||
'output': False, | ||
} | ||
|
||
|
||
def case09_aggregate_verify(): | ||
pairs = [] | ||
sigs = [] | ||
for privkey, message in zip(PRIVKEYS, MESSAGES): | ||
sig = bls.G2ProofOfPossession.Sign(privkey, message) | ||
pubkey = bls.G2Basic.PrivToPub(privkey) | ||
CarlBeek marked this conversation as resolved.
Show resolved
Hide resolved
|
||
pairs.append({ | ||
'pubkey': encode_hex(pubkey), | ||
'message': encode_hex(message), | ||
}) | ||
sigs.append(sig) | ||
|
||
aggregate_signature = bls.G2ProofOfPossession.Aggregate(sigs) | ||
yield f'fast_aggregate_verify_valid', { | ||
'input': { | ||
'pairs': pairs, | ||
'signature': encode_hex(aggregate_signature), | ||
}, | ||
'output': True, | ||
} | ||
|
||
tampered_signature = aggregate_signature[:4] + b'\xff\xff\xff\xff' | ||
yield f'fast_aggregate_verify_tampered_signature', { | ||
'input': { | ||
'pairs': pairs, | ||
'signature': encode_hex(tampered_signature), | ||
}, | ||
'output': False, | ||
} | ||
|
||
|
||
# TODO | ||
# Proof-of-possession | ||
|
@@ -198,7 +306,10 @@ def cases_fn() -> Iterable[gen_typing.TestCase]: | |
create_provider('msg_hash_uncompressed', case01_message_hash_G2_uncompressed), | ||
create_provider('msg_hash_compressed', case02_message_hash_G2_compressed), | ||
create_provider('priv_to_pub', case03_private_to_public_key), | ||
create_provider('sign_msg', case04_sign_messages), | ||
create_provider('sign_msg', case04_sign_message), | ||
create_provider('verify_msg', case05_verify_message), | ||
create_provider('aggregate_sigs', case06_aggregate_sigs), | ||
create_provider('aggregate_pubkeys', case07_aggregate_pubkeys), | ||
create_provider('fast_aggregate_verify', case08_fast_aggregate_verify), | ||
create_provider('aggregate_verify', case09_aggregate_verify), | ||
]) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This function is unused