Use explicit chai statements (#140)
This commit is contained in:
parent
c4ea70afd0
commit
86078f9b6d
|
@ -14,7 +14,7 @@ describe("helpers / hex", () => {
|
||||||
it(`${id} hexToBytes`, () => {
|
it(`${id} hexToBytes`, () => {
|
||||||
const expectedBytes = hexToBytesNode(hex);
|
const expectedBytes = hexToBytesNode(hex);
|
||||||
const bytes = hexToBytes(hex);
|
const bytes = hexToBytes(hex);
|
||||||
expect(expectedBytes.equals(bytes)).to.be.true;
|
expect(expectedBytes.equals(bytes)).equals(true);
|
||||||
});
|
});
|
||||||
|
|
||||||
it(`${id} bytesToHex`, () => {
|
it(`${id} bytesToHex`, () => {
|
||||||
|
|
|
@ -20,7 +20,7 @@ describe("types named exports", async () => {
|
||||||
const msg = new Uint8Array(32);
|
const msg = new Uint8Array(32);
|
||||||
const sig = sk.sign(msg);
|
const sig = sk.sign(msg);
|
||||||
const pk = sk.toPublicKey();
|
const pk = sk.toPublicKey();
|
||||||
expect(verifyHelper(pk, sig, msg)).to.be.true;
|
expect(verifyHelper(pk, sig, msg)).equals(true);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("Make sure exported classes are compatible with interface", () => {
|
it("Make sure exported classes are compatible with interface", () => {
|
||||||
|
|
|
@ -28,7 +28,7 @@ export function runIndexTests(bls: IBls): void {
|
||||||
} catch {
|
} catch {
|
||||||
/* eslint-disable no-empty */
|
/* eslint-disable no-empty */
|
||||||
}
|
}
|
||||||
expect(sig === undefined).to.be.true;
|
expect(sig === undefined).equals(true);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -37,31 +37,31 @@ export function runIndexTests(bls: IBls): void {
|
||||||
const {pk, msg, sig} = getRandomData();
|
const {pk, msg, sig} = getRandomData();
|
||||||
const pkHex = pk.toHex();
|
const pkHex = pk.toHex();
|
||||||
const isValid = bls.verify(pk.toBytes(), msg, sig.toBytes());
|
const isValid = bls.verify(pk.toBytes(), msg, sig.toBytes());
|
||||||
expect(isValid, "fail verify").to.be.true;
|
expect(isValid, "fail verify").equals(true);
|
||||||
|
|
||||||
// Make sure to not modify original pubkey when verifying
|
// Make sure to not modify original pubkey when verifying
|
||||||
expect(pk.toHex()).to.be.equal(pkHex, "pubkey modified when verifying");
|
expect(pk.toHex()).equals(pkHex, "pubkey modified when verifying");
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should fail verify empty signature", () => {
|
it("should fail verify empty signature", () => {
|
||||||
const {pk, msg} = getRandomData();
|
const {pk, msg} = getRandomData();
|
||||||
const emptySig = Buffer.alloc(96);
|
const emptySig = Buffer.alloc(96);
|
||||||
const isValid = bls.verify(pk.toBytes(), msg, emptySig);
|
const isValid = bls.verify(pk.toBytes(), msg, emptySig);
|
||||||
expect(isValid).to.be.false;
|
expect(isValid).equals(false);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should fail verify signature of different message", () => {
|
it("should fail verify signature of different message", () => {
|
||||||
const {pk, sig} = getRandomData();
|
const {pk, sig} = getRandomData();
|
||||||
const msg2 = randomMessage();
|
const msg2 = randomMessage();
|
||||||
const isValid = bls.verify(pk.toBytes(), msg2, sig.toBytes());
|
const isValid = bls.verify(pk.toBytes(), msg2, sig.toBytes());
|
||||||
expect(isValid).to.be.false;
|
expect(isValid).equals(false);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should fail verify signature signed by different key", () => {
|
it("should fail verify signature signed by different key", () => {
|
||||||
const {msg, sig} = getRandomData();
|
const {msg, sig} = getRandomData();
|
||||||
const {pk: pk2} = getRandomData();
|
const {pk: pk2} = getRandomData();
|
||||||
const isValid = bls.verify(pk2.toBytes(), msg, sig.toBytes());
|
const isValid = bls.verify(pk2.toBytes(), msg, sig.toBytes());
|
||||||
expect(isValid).to.be.false;
|
expect(isValid).equals(false);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should fail verify empty message", () => {
|
it("should fail verify empty message", () => {
|
||||||
|
@ -87,8 +87,8 @@ export function runIndexTests(bls: IBls): void {
|
||||||
|
|
||||||
const aggSig = bls.aggregateSignatures(sigs.map((sig) => sig.toBytes()));
|
const aggSig = bls.aggregateSignatures(sigs.map((sig) => sig.toBytes()));
|
||||||
|
|
||||||
expect(bls.verifyMultiple(aggPubkeys, msgs, aggSig), "should be valid").to.be.true;
|
expect(bls.verifyMultiple(aggPubkeys, msgs, aggSig), "should be valid").equals(true);
|
||||||
expect(bls.verifyMultiple(aggPubkeys.reverse(), msgs, aggSig), "should fail - swaped pubkeys").to.be.false;
|
expect(bls.verifyMultiple(aggPubkeys.reverse(), msgs, aggSig), "should fail - swaped pubkeys").equals(false);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should verify aggregated signatures - same message", () => {
|
it("should verify aggregated signatures - same message", () => {
|
||||||
|
@ -105,7 +105,7 @@ export function runIndexTests(bls: IBls): void {
|
||||||
getN(4, () => msg), // Same message n times
|
getN(4, () => msg), // Same message n times
|
||||||
aggregateSignature
|
aggregateSignature
|
||||||
);
|
);
|
||||||
expect(isValid).to.be.true;
|
expect(isValid).equals(true);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should fail to verify aggregated signatures - no public keys", () => {
|
it("should fail to verify aggregated signatures - no public keys", () => {
|
||||||
|
@ -114,7 +114,7 @@ export function runIndexTests(bls: IBls): void {
|
||||||
const msg2 = randomMessage();
|
const msg2 = randomMessage();
|
||||||
|
|
||||||
const isValid = bls.verifyMultiple([], [msg2, msg1], sig);
|
const isValid = bls.verifyMultiple([], [msg2, msg1], sig);
|
||||||
expect(isValid).to.be.false;
|
expect(isValid).equals(false);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should fail verify empty message", () => {
|
it("should fail verify empty message", () => {
|
||||||
|
|
|
@ -7,11 +7,11 @@ export function runPublicKeyTests(bls: IBls): void {
|
||||||
"0xb6f21199594b56d77670564bf422cb331d5281ca2c1f9a45588a56881d8287ef8619efa6456d6cd2ef61306aa5b21311";
|
"0xb6f21199594b56d77670564bf422cb331d5281ca2c1f9a45588a56881d8287ef8619efa6456d6cd2ef61306aa5b21311";
|
||||||
|
|
||||||
it("should export public key to hex string", () => {
|
it("should export public key to hex string", () => {
|
||||||
expect(bls.PublicKey.fromHex(publicKey).toHex()).to.be.equal(publicKey);
|
expect(bls.PublicKey.fromHex(publicKey).toHex()).equals(publicKey);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should export public key to hex string from non-prefixed hex", () => {
|
it("should export public key to hex string from non-prefixed hex", () => {
|
||||||
expect(bls.PublicKey.fromHex(publicKey).toHex()).to.be.equal(publicKey);
|
expect(bls.PublicKey.fromHex(publicKey).toHex()).equals(publicKey);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("from secret key", () => {
|
it("from secret key", () => {
|
||||||
|
|
|
@ -12,11 +12,11 @@ export function runSecretKeyTests(bls: IBls): void {
|
||||||
const secretKey = "0x07656fd676da43883d163f49566c72b9cbf0a5a294f26808c807700732456da7";
|
const secretKey = "0x07656fd676da43883d163f49566c72b9cbf0a5a294f26808c807700732456da7";
|
||||||
|
|
||||||
it("should export secret key to hex string", () => {
|
it("should export secret key to hex string", () => {
|
||||||
expect(bls.SecretKey.fromHex(secretKey).toHex()).to.be.equal(secretKey);
|
expect(bls.SecretKey.fromHex(secretKey).toHex()).equals(secretKey);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should export secret key to hex string from non-prefixed hex", () => {
|
it("should export secret key to hex string from non-prefixed hex", () => {
|
||||||
expect(bls.SecretKey.fromHex(secretKey).toHex()).to.be.equal(secretKey);
|
expect(bls.SecretKey.fromHex(secretKey).toHex()).equals(secretKey);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("should not accept too short secret key", () => {
|
it("should not accept too short secret key", () => {
|
||||||
|
|
Reference in New Issue