123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221 |
- // Copyright 2016 The Go Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
- package ed25519_test
- import (
- "bufio"
- "bytes"
- "compress/gzip"
- "crypto"
- "crypto/rand"
- "encoding/hex"
- "os"
- "strings"
- "testing"
- "golang.org/x/crypto/ed25519"
- "golang.org/x/crypto/ed25519/internal/edwards25519"
- )
- type zeroReader struct{}
- func (zeroReader) Read(buf []byte) (int, error) {
- for i := range buf {
- buf[i] = 0
- }
- return len(buf), nil
- }
- func TestUnmarshalMarshal(t *testing.T) {
- pub, _, _ := ed25519.GenerateKey(rand.Reader)
- var A edwards25519.ExtendedGroupElement
- var pubBytes [32]byte
- copy(pubBytes[:], pub)
- if !A.FromBytes(&pubBytes) {
- t.Fatalf("ExtendedGroupElement.FromBytes failed")
- }
- var pub2 [32]byte
- A.ToBytes(&pub2)
- if pubBytes != pub2 {
- t.Errorf("FromBytes(%v)->ToBytes does not round-trip, got %x\n", pubBytes, pub2)
- }
- }
- func TestSignVerify(t *testing.T) {
- var zero zeroReader
- public, private, _ := ed25519.GenerateKey(zero)
- message := []byte("test message")
- sig := ed25519.Sign(private, message)
- if !ed25519.Verify(public, message, sig) {
- t.Errorf("valid signature rejected")
- }
- wrongMessage := []byte("wrong message")
- if ed25519.Verify(public, wrongMessage, sig) {
- t.Errorf("signature of different message accepted")
- }
- }
- func TestCryptoSigner(t *testing.T) {
- var zero zeroReader
- public, private, _ := ed25519.GenerateKey(zero)
- signer := crypto.Signer(private)
- publicInterface := signer.Public()
- public2, ok := publicInterface.(ed25519.PublicKey)
- if !ok {
- t.Fatalf("expected PublicKey from Public() but got %T", publicInterface)
- }
- if !bytes.Equal(public, public2) {
- t.Errorf("public keys do not match: original:%x vs Public():%x", public, public2)
- }
- message := []byte("message")
- var noHash crypto.Hash
- signature, err := signer.Sign(zero, message, noHash)
- if err != nil {
- t.Fatalf("error from Sign(): %s", err)
- }
- if !ed25519.Verify(public, message, signature) {
- t.Errorf("Verify failed on signature from Sign()")
- }
- }
- func TestGolden(t *testing.T) {
- // sign.input.gz is a selection of test cases from
- // https://ed25519.cr.yp.to/python/sign.input
- testDataZ, err := os.Open("testdata/sign.input.gz")
- if err != nil {
- t.Fatal(err)
- }
- defer testDataZ.Close()
- testData, err := gzip.NewReader(testDataZ)
- if err != nil {
- t.Fatal(err)
- }
- defer testData.Close()
- scanner := bufio.NewScanner(testData)
- lineNo := 0
- for scanner.Scan() {
- lineNo++
- line := scanner.Text()
- parts := strings.Split(line, ":")
- if len(parts) != 5 {
- t.Fatalf("bad number of parts on line %d", lineNo)
- }
- privBytes, _ := hex.DecodeString(parts[0])
- pubKey, _ := hex.DecodeString(parts[1])
- msg, _ := hex.DecodeString(parts[2])
- sig, _ := hex.DecodeString(parts[3])
- // The signatures in the test vectors also include the message
- // at the end, but we just want R and S.
- sig = sig[:ed25519.SignatureSize]
- if l := len(pubKey); l != ed25519.PublicKeySize {
- t.Fatalf("bad public key length on line %d: got %d bytes", lineNo, l)
- }
- var priv [ed25519.PrivateKeySize]byte
- copy(priv[:], privBytes)
- copy(priv[32:], pubKey)
- sig2 := ed25519.Sign(priv[:], msg)
- if !bytes.Equal(sig, sig2[:]) {
- t.Errorf("different signature result on line %d: %x vs %x", lineNo, sig, sig2)
- }
- if !ed25519.Verify(pubKey, msg, sig2) {
- t.Errorf("signature failed to verify on line %d", lineNo)
- }
- priv2 := ed25519.NewKeyFromSeed(priv[:32])
- if !bytes.Equal(priv[:], priv2) {
- t.Errorf("recreating key pair gave different private key on line %d: %x vs %x", lineNo, priv[:], priv2)
- }
- if pubKey2 := priv2.Public().(ed25519.PublicKey); !bytes.Equal(pubKey, pubKey2) {
- t.Errorf("recreating key pair gave different public key on line %d: %x vs %x", lineNo, pubKey, pubKey2)
- }
- if seed := priv2.Seed(); !bytes.Equal(priv[:32], seed) {
- t.Errorf("recreating key pair gave different seed on line %d: %x vs %x", lineNo, priv[:32], seed)
- }
- }
- if err := scanner.Err(); err != nil {
- t.Fatalf("error reading test data: %s", err)
- }
- }
- func TestMalleability(t *testing.T) {
- // https://tools.ietf.org/html/rfc8032#section-5.1.7 adds an additional test
- // that s be in [0, order). This prevents someone from adding a multiple of
- // order to s and obtaining a second valid signature for the same message.
- msg := []byte{0x54, 0x65, 0x73, 0x74}
- sig := []byte{
- 0x7c, 0x38, 0xe0, 0x26, 0xf2, 0x9e, 0x14, 0xaa, 0xbd, 0x05, 0x9a,
- 0x0f, 0x2d, 0xb8, 0xb0, 0xcd, 0x78, 0x30, 0x40, 0x60, 0x9a, 0x8b,
- 0xe6, 0x84, 0xdb, 0x12, 0xf8, 0x2a, 0x27, 0x77, 0x4a, 0xb0, 0x67,
- 0x65, 0x4b, 0xce, 0x38, 0x32, 0xc2, 0xd7, 0x6f, 0x8f, 0x6f, 0x5d,
- 0xaf, 0xc0, 0x8d, 0x93, 0x39, 0xd4, 0xee, 0xf6, 0x76, 0x57, 0x33,
- 0x36, 0xa5, 0xc5, 0x1e, 0xb6, 0xf9, 0x46, 0xb3, 0x1d,
- }
- publicKey := []byte{
- 0x7d, 0x4d, 0x0e, 0x7f, 0x61, 0x53, 0xa6, 0x9b, 0x62, 0x42, 0xb5,
- 0x22, 0xab, 0xbe, 0xe6, 0x85, 0xfd, 0xa4, 0x42, 0x0f, 0x88, 0x34,
- 0xb1, 0x08, 0xc3, 0xbd, 0xae, 0x36, 0x9e, 0xf5, 0x49, 0xfa,
- }
- if ed25519.Verify(publicKey, msg, sig) {
- t.Fatal("non-canonical signature accepted")
- }
- }
- func BenchmarkKeyGeneration(b *testing.B) {
- var zero zeroReader
- for i := 0; i < b.N; i++ {
- if _, _, err := ed25519.GenerateKey(zero); err != nil {
- b.Fatal(err)
- }
- }
- }
- func BenchmarkSigning(b *testing.B) {
- var zero zeroReader
- _, priv, err := ed25519.GenerateKey(zero)
- if err != nil {
- b.Fatal(err)
- }
- message := []byte("Hello, world!")
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- ed25519.Sign(priv, message)
- }
- }
- func BenchmarkVerification(b *testing.B) {
- var zero zeroReader
- pub, priv, err := ed25519.GenerateKey(zero)
- if err != nil {
- b.Fatal(err)
- }
- message := []byte("Hello, world!")
- signature := ed25519.Sign(priv, message)
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- ed25519.Verify(pub, message, signature)
- }
- }
|