1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96
|
// Package eddsa implements EdDSA signature, suitable for OpenPGP, as specified in
// https://datatracker.ietf.org/doc/html/draft-ietf-openpgp-crypto-refresh-06#section-13.7
package eddsa
import (
"bytes"
"crypto/rand"
"io"
"testing"
"github.com/ProtonMail/go-crypto/openpgp/internal/ecc"
)
func TestCurves(t *testing.T) {
for _, curve := range ecc.Curves {
EdDSACurve, ok := curve.Curve.(ecc.EdDSACurve)
if !ok {
continue
}
t.Run(EdDSACurve.GetCurveName(), func(t *testing.T) {
testFingerprint := make([]byte, 20)
_, err := io.ReadFull(rand.Reader, testFingerprint[:])
if err != nil {
t.Fatal(err)
}
priv := testGenerate(t, EdDSACurve)
testSignVerify(t, priv)
testValidation(t, priv)
testMarshalUnmarshal(t, priv)
})
}
}
func testGenerate(t *testing.T, curve ecc.EdDSACurve) *PrivateKey {
priv, err := GenerateKey(rand.Reader, curve)
if err != nil {
t.Fatal(err)
}
return priv
}
func testSignVerify(t *testing.T, priv *PrivateKey) {
digest := make([]byte, 32)
_, err := io.ReadFull(rand.Reader, digest[:])
if err != nil {
t.Fatal(err)
}
r, s, err := Sign(priv, digest)
if err != nil {
t.Errorf("error signing: %s", err)
}
result := Verify(&priv.PublicKey, digest, r, s)
if !result {
t.Error("unable to verify message")
}
}
func testValidation(t *testing.T, priv *PrivateKey) {
if err := Validate(priv); err != nil {
t.Fatalf("valid key marked as invalid: %s", err)
}
priv.D[5] ^= 1
if err := Validate(priv); err == nil {
t.Fatal("failed to detect invalid key")
}
}
func testMarshalUnmarshal(t *testing.T, priv *PrivateKey) {
// Test correct zero padding
priv.X[0] = 0
priv.D[0] = 0
x := priv.MarshalPoint()
d := priv.MarshalByteSecret()
parsed := NewPrivateKey(*NewPublicKey(priv.GetCurve()))
if err := parsed.UnmarshalPoint(x); err != nil {
t.Fatalf("unable to unmarshal point: %s", err)
}
if err := parsed.UnmarshalByteSecret(d); err != nil {
t.Fatalf("unable to unmarshal integer: %s", err)
}
if !bytes.Equal(priv.X, parsed.X) || !bytes.Equal(priv.D, parsed.D) {
t.Fatal("failed to marshal/unmarshal correctly")
}
}
|