File: Ed25519-Runner.swift

package info (click to toggle)
swiftlang 6.0.3-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 2,519,992 kB
  • sloc: cpp: 9,107,863; ansic: 2,040,022; asm: 1,135,751; python: 296,500; objc: 82,456; f90: 60,502; lisp: 34,951; pascal: 19,946; sh: 18,133; perl: 7,482; ml: 4,937; javascript: 4,117; makefile: 3,840; awk: 3,535; xml: 914; fortran: 619; cs: 573; ruby: 573
file content (142 lines) | stat: -rw-r--r-- 5,678 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
//===----------------------------------------------------------------------===//
//
// This source file is part of the SwiftCrypto open source project
//
// Copyright (c) 2019-2020 Apple Inc. and the SwiftCrypto project authors
// Licensed under Apache License v2.0
//
// See LICENSE.txt for license information
// See CONTRIBUTORS.md for the list of SwiftCrypto project authors
//
// SPDX-License-Identifier: Apache-2.0
//
//===----------------------------------------------------------------------===//
import XCTest

#if CRYPTO_IN_SWIFTPM && !CRYPTO_IN_SWIFTPM_FORCE_BUILD_API
import Crypto
#elseif !CRYPTO_IN_SWIFTPM_FORCE_BUILD_API
import CryptoKit
#else
import Crypto
#endif

struct Ed25519TestGroup: Codable {
    let tests: [Ed25519TestVector]
    let publicKey: Ed25519PublicKey
}

struct Ed25519PublicKey: Codable {
    let pk: String
}

struct Ed25519TestVector: Codable {
    let comment: String
    let msg: String
    let sig: String
    let result: String
    let flags: [String]
    let tcId: Int
}

class Ed25519Tests: XCTestCase {
    func testExample() throws {
        let privateKey = Curve25519.Signing.PrivateKey()
        let publicKey = privateKey.publicKey

        let someData = "Some Data".data(using: .utf8)!

        let signature = try orFail { try privateKey.signature(for: someData) }

        XCTAssert(publicKey.isValidSignature(signature, for: someData))
    }

    func testSigningDiscontiguousData() throws {
        let privateKey = Curve25519.Signing.PrivateKey()
        let (someContiguousData, someDiscontiguousData) = Array("Some Data".utf8).asDataProtocols()

        let signatureOnContiguous = try orFail { try privateKey.signature(for: someContiguousData) }
        let signatureOnDiscontiguous = try orFail { try privateKey.signature(for: someDiscontiguousData) }
        #if !(canImport(Darwin))
        XCTAssertEqual(signatureOnContiguous, signatureOnDiscontiguous)
        #endif

        // This tests the 4 combinations.
        let (contiguousSignature, discontiguousSignature) = Array(signatureOnContiguous).asDataProtocols()
        XCTAssertTrue(privateKey.publicKey.isValidSignature(contiguousSignature, for: someContiguousData))
        XCTAssertTrue(privateKey.publicKey.isValidSignature(discontiguousSignature, for: someContiguousData))
        XCTAssertTrue(privateKey.publicKey.isValidSignature(contiguousSignature, for: someDiscontiguousData))
        XCTAssertTrue(privateKey.publicKey.isValidSignature(discontiguousSignature, for: someDiscontiguousData))
    }

    func testRejectingInvalidSignaturesOnDiscontiguousData() throws {
        let privateKey = Curve25519.Signing.PrivateKey()
        let otherPrivateKey = Curve25519.Signing.PrivateKey()
        let (someContiguousData, someDiscontiguousData) = Array("Some Data".utf8).asDataProtocols()

        let signature = try orFail { try privateKey.signature(for: someContiguousData) }

        // This tests the 4 combinations.
        let (contiguousSignature, discontiguousSignature) = Array(signature).asDataProtocols()
        XCTAssertFalse(otherPrivateKey.publicKey.isValidSignature(contiguousSignature, for: someContiguousData))
        XCTAssertFalse(otherPrivateKey.publicKey.isValidSignature(discontiguousSignature, for: someContiguousData))
        XCTAssertFalse(otherPrivateKey.publicKey.isValidSignature(contiguousSignature, for: someDiscontiguousData))
        XCTAssertFalse(otherPrivateKey.publicKey.isValidSignature(discontiguousSignature, for: someDiscontiguousData))
    }

    func testSigningZeroRegionDataProtocol() throws {
        let privateKey = Curve25519.Signing.PrivateKey()
        let signature = try orFail { try privateKey.signature(for: DispatchData.empty) }

        XCTAssert(privateKey.publicKey.isValidSignature(signature, for: DispatchData.empty))

        // This signature should be invalid
        XCTAssertFalse(privateKey.publicKey.isValidSignature(DispatchData.empty, for: DispatchData.empty))
    }

    func testWycheProof() throws {
        try orFail {
            try wycheproofTest(
                bundleType: self,
                jsonName: "ed25519_test",
                testFunction: { (group: Ed25519TestGroup) in
                    try orFail { try testGroup(group: group) }
                })
        }
    }

    func testGroup(group: Ed25519TestGroup, file: StaticString = #file, line: UInt = #line) throws {
        let keyBytes = try orFail { try Array(hexString: group.publicKey.pk) }
        let key = try orFail { try Curve25519.Signing.PublicKey(rawRepresentation: keyBytes) }

        for testVector in group.tests {
            var isValid = false

            do {
                let sig = try Data(hexString: testVector.sig)

                let msg: Data
                if testVector.msg.count > 0 {
                    msg = try Data(hexString: testVector.msg)
                } else {
                    msg = Data()
                }

                isValid = key.isValidSignature(sig, for: msg)
            } catch {
                XCTAssert(testVector.result == "invalid" || testVector.result == "acceptable", "Test ID: \(testVector.tcId) is valid, but failed \(error.localizedDescription).")
                continue
            }

            switch testVector.result {
            case "valid": XCTAssert(isValid, "Test vector is valid, but is rejected \(testVector.tcId)")
            case "acceptable": do {
                XCTAssert(isValid)
                }
            case "invalid": XCTAssert(!isValid, "Test ID: \(testVector.tcId) is valid, but failed.")
            default:
                XCTFail("Unhandled test vector")
            }
        }
    }
}