File: test_signing.py

package info (click to toggle)
python-xeddsa 1.1.1-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 204 kB
  • sloc: python: 421; makefile: 15; ansic: 15
file content (78 lines) | stat: -rw-r--r-- 2,845 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
import os
import random
import secrets

import xeddsa


__all__ = [
    "test_signing"
]

NUM_MESSAGES = 8
NUM_KEY_PAIRS = 8


def test_signing() -> None:
    """
    Test signing/verification flows for Curve25519, Ed25519 and seed-based key pairs.
    """

    # Test on a set of different messages
    for _ in range(NUM_MESSAGES):
        # Fill the message with random bytes. Randomize the size of the message.
        msg = os.urandom(random.randrange(0, 65535))

        # Test each message on a set of different key pairs
        for _ in range(NUM_KEY_PAIRS):
            # Generate a Curve25519 key pair.
            curve_priv = secrets.token_bytes(32)
            curve_pub = xeddsa.priv_to_curve25519_pub(curve_priv)

            # Adjust the private key such that the sign of the derived Ed25519 public key is zero
            priv = xeddsa.priv_force_sign(curve_priv, False)

            # Sign the message using the Curve25519 private key
            sig = xeddsa.ed25519_priv_sign(priv, msg)

            # Convert the Curve25519 public key to an Ed25519 public key
            ed_pub = xeddsa.curve25519_pub_to_ed25519_pub(curve_pub, False)

            # Verify the message using the converted public key.
            assert xeddsa.ed25519_verify(sig, ed_pub, msg)

            # Convert the Curve25519 public key to an Ed25519 public key, intentionally choosing the wrong
            # sign
            ed_pub = xeddsa.curve25519_pub_to_ed25519_pub(curve_pub, True)

            # Verify the message using the converted public key.
            assert not xeddsa.ed25519_verify(sig, ed_pub, msg)

            # Adjust the private key such that the sign of the derived Ed25519 public key is one
            priv = xeddsa.priv_force_sign(curve_priv, True)

            # Sign the message using the Curve25519 private key
            sig = xeddsa.ed25519_priv_sign(priv, msg)

            # Convert the Curve25519 public key to an Ed25519 public key
            ed_pub = xeddsa.curve25519_pub_to_ed25519_pub(curve_pub, True)

            # Verify the message using the converted public key.
            assert xeddsa.ed25519_verify(sig, ed_pub, msg)

            # Convert the Curve25519 public key to an Ed25519 public key, intentionally choosing the wrong
            # sign
            ed_pub = xeddsa.curve25519_pub_to_ed25519_pub(curve_pub, False)

            # Verify the message using the converted public key.
            assert not xeddsa.ed25519_verify(sig, ed_pub, msg)

            # Generate an Ed25519 key pair.
            ed_seed = secrets.token_bytes(32)
            ed_pub = xeddsa.seed_to_ed25519_pub(ed_seed)

            # Sign the message normally
            sig = xeddsa.ed25519_seed_sign(ed_seed, msg)

            # Verify the message normally
            assert xeddsa.ed25519_verify(sig, ed_pub, msg)