mirror of
https://github.com/Luzifer/cloudkeys-go.git
synced 2024-11-10 15:10:05 +00:00
184 lines
4 KiB
Go
184 lines
4 KiB
Go
|
// Copyright 2016 The Go Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a BSD-style
|
||
|
// license that can be found in the LICENSE file.
|
||
|
|
||
|
package ed25519
|
||
|
|
||
|
import (
|
||
|
"bufio"
|
||
|
"bytes"
|
||
|
"compress/gzip"
|
||
|
"crypto"
|
||
|
"crypto/rand"
|
||
|
"encoding/hex"
|
||
|
"os"
|
||
|
"strings"
|
||
|
"testing"
|
||
|
|
||
|
"golang.org/x/crypto/ed25519/internal/edwards25519"
|
||
|
)
|
||
|
|
||
|
type zeroReader struct{}
|
||
|
|
||
|
func (zeroReader) Read(buf []byte) (int, error) {
|
||
|
for i := range buf {
|
||
|
buf[i] = 0
|
||
|
}
|
||
|
return len(buf), nil
|
||
|
}
|
||
|
|
||
|
func TestUnmarshalMarshal(t *testing.T) {
|
||
|
pub, _, _ := GenerateKey(rand.Reader)
|
||
|
|
||
|
var A edwards25519.ExtendedGroupElement
|
||
|
var pubBytes [32]byte
|
||
|
copy(pubBytes[:], pub)
|
||
|
if !A.FromBytes(&pubBytes) {
|
||
|
t.Fatalf("ExtendedGroupElement.FromBytes failed")
|
||
|
}
|
||
|
|
||
|
var pub2 [32]byte
|
||
|
A.ToBytes(&pub2)
|
||
|
|
||
|
if pubBytes != pub2 {
|
||
|
t.Errorf("FromBytes(%v)->ToBytes does not round-trip, got %x\n", pubBytes, pub2)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestSignVerify(t *testing.T) {
|
||
|
var zero zeroReader
|
||
|
public, private, _ := GenerateKey(zero)
|
||
|
|
||
|
message := []byte("test message")
|
||
|
sig := Sign(private, message)
|
||
|
if !Verify(public, message, sig) {
|
||
|
t.Errorf("valid signature rejected")
|
||
|
}
|
||
|
|
||
|
wrongMessage := []byte("wrong message")
|
||
|
if Verify(public, wrongMessage, sig) {
|
||
|
t.Errorf("signature of different message accepted")
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestCryptoSigner(t *testing.T) {
|
||
|
var zero zeroReader
|
||
|
public, private, _ := GenerateKey(zero)
|
||
|
|
||
|
signer := crypto.Signer(private)
|
||
|
|
||
|
publicInterface := signer.Public()
|
||
|
public2, ok := publicInterface.(PublicKey)
|
||
|
if !ok {
|
||
|
t.Fatalf("expected PublicKey from Public() but got %T", publicInterface)
|
||
|
}
|
||
|
|
||
|
if !bytes.Equal(public, public2) {
|
||
|
t.Errorf("public keys do not match: original:%x vs Public():%x", public, public2)
|
||
|
}
|
||
|
|
||
|
message := []byte("message")
|
||
|
var noHash crypto.Hash
|
||
|
signature, err := signer.Sign(zero, message, noHash)
|
||
|
if err != nil {
|
||
|
t.Fatalf("error from Sign(): %s", err)
|
||
|
}
|
||
|
|
||
|
if !Verify(public, message, signature) {
|
||
|
t.Errorf("Verify failed on signature from Sign()")
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestGolden(t *testing.T) {
|
||
|
// sign.input.gz is a selection of test cases from
|
||
|
// https://ed25519.cr.yp.to/python/sign.input
|
||
|
testDataZ, err := os.Open("testdata/sign.input.gz")
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
defer testDataZ.Close()
|
||
|
testData, err := gzip.NewReader(testDataZ)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
defer testData.Close()
|
||
|
|
||
|
scanner := bufio.NewScanner(testData)
|
||
|
lineNo := 0
|
||
|
|
||
|
for scanner.Scan() {
|
||
|
lineNo++
|
||
|
|
||
|
line := scanner.Text()
|
||
|
parts := strings.Split(line, ":")
|
||
|
if len(parts) != 5 {
|
||
|
t.Fatalf("bad number of parts on line %d", lineNo)
|
||
|
}
|
||
|
|
||
|
privBytes, _ := hex.DecodeString(parts[0])
|
||
|
pubKey, _ := hex.DecodeString(parts[1])
|
||
|
msg, _ := hex.DecodeString(parts[2])
|
||
|
sig, _ := hex.DecodeString(parts[3])
|
||
|
// The signatures in the test vectors also include the message
|
||
|
// at the end, but we just want R and S.
|
||
|
sig = sig[:SignatureSize]
|
||
|
|
||
|
if l := len(pubKey); l != PublicKeySize {
|
||
|
t.Fatalf("bad public key length on line %d: got %d bytes", lineNo, l)
|
||
|
}
|
||
|
|
||
|
var priv [PrivateKeySize]byte
|
||
|
copy(priv[:], privBytes)
|
||
|
copy(priv[32:], pubKey)
|
||
|
|
||
|
sig2 := Sign(priv[:], msg)
|
||
|
if !bytes.Equal(sig, sig2[:]) {
|
||
|
t.Errorf("different signature result on line %d: %x vs %x", lineNo, sig, sig2)
|
||
|
}
|
||
|
|
||
|
if !Verify(pubKey, msg, sig2) {
|
||
|
t.Errorf("signature failed to verify on line %d", lineNo)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if err := scanner.Err(); err != nil {
|
||
|
t.Fatalf("error reading test data: %s", err)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func BenchmarkKeyGeneration(b *testing.B) {
|
||
|
var zero zeroReader
|
||
|
for i := 0; i < b.N; i++ {
|
||
|
if _, _, err := GenerateKey(zero); err != nil {
|
||
|
b.Fatal(err)
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func BenchmarkSigning(b *testing.B) {
|
||
|
var zero zeroReader
|
||
|
_, priv, err := GenerateKey(zero)
|
||
|
if err != nil {
|
||
|
b.Fatal(err)
|
||
|
}
|
||
|
message := []byte("Hello, world!")
|
||
|
b.ResetTimer()
|
||
|
for i := 0; i < b.N; i++ {
|
||
|
Sign(priv, message)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func BenchmarkVerification(b *testing.B) {
|
||
|
var zero zeroReader
|
||
|
pub, priv, err := GenerateKey(zero)
|
||
|
if err != nil {
|
||
|
b.Fatal(err)
|
||
|
}
|
||
|
message := []byte("Hello, world!")
|
||
|
signature := Sign(priv, message)
|
||
|
b.ResetTimer()
|
||
|
for i := 0; i < b.N; i++ {
|
||
|
Verify(pub, message, signature)
|
||
|
}
|
||
|
}
|