1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72
|
# frozen_string_literal: true
require "ed25519/version"
require "ed25519/signing_key"
require "ed25519/verify_key"
# The Ed25519 digital signatre algorithm
# rubocop:disable Layout/LineLength
module Ed25519
module_function
# Size of an Ed25519 key (public or private) in bytes
KEY_SIZE = 32
# Size of an Ed25519 signature in bytes
SIGNATURE_SIZE = 64
# Raised when a signature fails to verify
VerifyError = Class.new(StandardError)
# Raised when the built-in self-test fails
SelfTestFailure = Class.new(StandardError)
class << self
# Obtain the backend provider module used to perform signatures
attr_accessor :provider
end
# Select the Ed25519::Provider to use based on the current environment
if defined? JRUBY_VERSION
require "jruby"
require "ed25519_jruby"
self.provider = org.cryptorb.Ed25519Provider.createEd25519Module(JRuby.runtime)
else
require "ed25519_ref10"
self.provider = Ed25519::Provider::Ref10
end
# Ensure a serialized key meets the requirements
def validate_key_bytes(key_bytes)
raise TypeError, "expected String, got #{key_bytes.class}" unless key_bytes.is_a?(String)
return true if key_bytes.bytesize == KEY_SIZE
raise ArgumentError, "expected #{KEY_SIZE}-byte String, got #{key_bytes.bytesize}"
end
# Perform a self-test to ensure the selected provider is working
def self_test
signature_key = Ed25519::SigningKey.new("A" * 32)
raise SelfTestFailure, "failed to generate verify key correctly" unless signature_key.verify_key.to_bytes.unpack1("H*") == "db995fe25169d141cab9bbba92baa01f9f2e1ece7df4cb2ac05190f37fcc1f9d"
message = "crypto libraries should self-test on boot"
signature = signature_key.sign(message)
raise SelfTestFailure, "failed to generate correct signature" unless signature.unpack1("H*") == "c62c12a3a6cbfa04800d4be81468ef8aecd152a6a26a81d91257baecef13ba209531fe905a843e833c8b71cee04400fa2af3a29fef1152ece470421848758d0a"
verify_key = signature_key.verify_key
raise SelfTestFailure, "failed to verify a valid signature" unless verify_key.verify(signature, message)
bad_signature = "#{signature[0...63]}X"
ex = nil
begin
verify_key.verify(bad_signature, message)
rescue Ed25519::VerifyError => ex
end
raise SelfTestFailure, "failed to detect an invalid signature" unless ex.is_a?(Ed25519::VerifyError)
end
end
# rubocop:enable Layout/LineLength
# Automatically run self-test when library loads
Ed25519.self_test
|