@@ -406,7 +406,8 @@ impl Signature {
406
406
407
407
blst_err_to_mithril (
408
408
aggr_sig. 0 . verify ( false , msg, & [ ] , & [ ] , & aggr_vk. 0 , false ) ,
409
- Some ( aggr_sig) , None ,
409
+ Some ( aggr_sig) ,
410
+ None ,
410
411
)
411
412
}
412
413
@@ -434,7 +435,7 @@ impl Signature {
434
435
blst_err_to_mithril (
435
436
batched_sig. aggregate_verify ( false , & slice_msgs, & [ ] , & p2_vks, false ) ,
436
437
None ,
437
- None
438
+ None ,
438
439
)
439
440
. map_err ( |_| MultiSignatureError :: BatchInvalid )
440
441
}
@@ -636,6 +637,7 @@ mod unsafe_helpers {
636
637
#[ cfg( test) ]
637
638
mod tests {
638
639
use super :: * ;
640
+ use crate :: error:: RegisterError ;
639
641
use crate :: key_reg:: KeyReg ;
640
642
use proptest:: prelude:: * ;
641
643
use rand_chacha:: ChaCha20Rng ;
@@ -674,7 +676,8 @@ mod tests {
674
676
let p1 = blst_p1:: default ( ) ;
675
677
let sig_infinity = Signature ( p1_affine_to_sig( & p1) ) ;
676
678
677
- assert!( sig_infinity. verify( & msg, & vk) . is_err( ) ) ;
679
+ let result = sig_infinity. verify( & msg, & vk) ;
680
+ assert_eq!( result, Err ( MultiSignatureError :: SignatureInfinity ( sig_infinity) ) ) ;
678
681
}
679
682
680
683
#[ test]
@@ -687,7 +690,8 @@ mod tests {
687
690
let vk_infinity = VerificationKey ( p2_affine_to_vk( & p2) ) ;
688
691
let vkpop_infinity = VerificationKeyPoP { vk: vk_infinity, pop } ;
689
692
690
- assert!( vkpop_infinity. check( ) . is_err( ) ) ;
693
+ let result = vkpop_infinity. check( ) ;
694
+ assert_eq!( result, Err ( MultiSignatureError :: VerificationKeyInfinity ( Box :: new( vkpop_infinity. vk) ) ) ) ;
691
695
}
692
696
693
697
#[ test]
@@ -707,7 +711,8 @@ mod tests {
707
711
let _ = kr. register( 1 , vkpop) ;
708
712
}
709
713
710
- assert!( kr. register( 1 , vkpop_infinity) . is_err( ) ) ;
714
+ let result = kr. register( 1 , vkpop_infinity) ;
715
+ assert_eq!( result, Err ( RegisterError :: VerificationKeyInfinity ( Box :: new( vkpop_infinity. vk) ) ) ) ;
711
716
}
712
717
713
718
#[ test]
0 commit comments