forked from wealdtech/go-eth2-types
-
Notifications
You must be signed in to change notification settings - Fork 0
/
blssignature.go
88 lines (78 loc) · 2.69 KB
/
blssignature.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
// Copyright 2019, 2020 Weald Technology Trading
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package types
import (
bls "github.com/herumi/bls-eth-go-binary/bls"
"github.com/pkg/errors"
)
// BLSSignature is a BLS signature.
type BLSSignature struct {
sig *bls.Sign
}
// BLSSignatureFromBytes creates a BLS signature from a byte slice.
func BLSSignatureFromBytes(data []byte) (Signature, error) {
var sig bls.Sign
if err := sig.Deserialize(data); err != nil {
return nil, errors.Wrap(err, "failed to deserialize signature")
}
return &BLSSignature{sig: &sig}, nil
}
// BLSSignatureFromSig creates a BLS signature from an existing signature.
func BLSSignatureFromSig(sig bls.Sign) (Signature, error) {
return &BLSSignature{sig: &sig}, nil
}
// Verify a bls signature given a public key and a message.
func (s *BLSSignature) Verify(msg []byte, pubKey PublicKey) bool {
return s.sig.VerifyByte(pubKey.(*BLSPublicKey).key, msg)
}
// VerifyAggregate verifies each public key against its respective message.
// Note: this is vulnerable to a rogue public-key attack.
func (s *BLSSignature) VerifyAggregate(msgs [][]byte, pubKeys []PublicKey) bool {
if len(pubKeys) == 0 {
return false
}
keys := make([]bls.PublicKey, len(pubKeys))
for i, v := range pubKeys {
keys[i] = *v.(*BLSPublicKey).key
}
return s.sig.VerifyAggregateHashes(keys, msgs)
}
// VerifyAggregateCommon verifies each public key against a single message.
// Note: this is vulnerable to a rogue public-key attack.
func (s *BLSSignature) VerifyAggregateCommon(msg []byte, pubKeys []PublicKey) bool {
if len(pubKeys) == 0 {
return false
}
keys := make([]bls.PublicKey, len(pubKeys))
for i, v := range pubKeys {
keys[i] = *v.(*BLSPublicKey).key
}
return s.sig.FastAggregateVerify(keys, msg)
}
// Marshal a signature into a byte slice.
func (s *BLSSignature) Marshal() []byte {
return s.sig.Serialize()
}
// AggregateSignatures aggregates signatures.
func AggregateSignatures(sigs []Signature) *BLSSignature {
if len(sigs) == 0 {
return nil
}
aggSig := &bls.Sign{}
//#nosec G104
_ = aggSig.Deserialize(sigs[0].(*BLSSignature).Marshal())
for _, sig := range sigs[1:] {
aggSig.Add(sig.(*BLSSignature).sig)
}
return &BLSSignature{sig: aggSig}
}