mirror of
https://github.com/vlang/v.git
synced 2025-09-14 23:12:33 +03:00
56 lines
2 KiB
V
56 lines
2 KiB
V
module main
|
|
|
|
// Note: this should be in vlib/crypto/ed25519/ed25519_test.v
|
|
// but is currently one folder below, because of a V parser/symbol registration bug.
|
|
// TODO: move this test back to vlib/crypto/ed25519/ed25519_test.v
|
|
import crypto.ed25519
|
|
|
|
fn test_sign_verify() {
|
|
// mut zero := ZeroReader{}
|
|
public, private := ed25519.generate_key()!
|
|
|
|
message := 'test message'.bytes()
|
|
sig := ed25519.sign(private, message)!
|
|
res := ed25519.verify(public, message, sig) or { false }
|
|
assert res == true
|
|
|
|
wrongmessage := 'wrong message'.bytes()
|
|
res2 := ed25519.verify(public, wrongmessage, sig)!
|
|
assert res2 == false
|
|
}
|
|
|
|
fn test_equal() {
|
|
public, private := ed25519.generate_key()!
|
|
|
|
assert public.equal(public) == true
|
|
|
|
// This is not AVAILABLE
|
|
/*
|
|
if !public.Equal(crypto.Signer(private).Public()) {
|
|
t.Errorf("private.Public() is not Equal to public: %q", public)
|
|
}*/
|
|
assert private.equal(private) == true
|
|
|
|
otherpub, otherpriv := ed25519.generate_key()!
|
|
assert public.equal(otherpub) == false
|
|
|
|
assert private.equal(otherpriv) == false
|
|
}
|
|
|
|
fn test_malleability() {
|
|
// https://tools.ietf.org/html/rfc8032#section-5.1.7 adds an additional test
|
|
// that s be in [0, order). This prevents someone from adding a multiple of
|
|
// order to s and obtaining a second valid signature for the same message.
|
|
msg := [u8(0x54), 0x65, 0x73, 0x74]
|
|
sig := [u8(0x7c), 0x38, 0xe0, 0x26, 0xf2, 0x9e, 0x14, 0xaa, 0xbd, 0x05, 0x9a, 0x0f, 0x2d, 0xb8,
|
|
0xb0, 0xcd, 0x78, 0x30, 0x40, 0x60, 0x9a, 0x8b, 0xe6, 0x84, 0xdb, 0x12, 0xf8, 0x2a, 0x27,
|
|
0x77, 0x4a, 0xb0, 0x67, 0x65, 0x4b, 0xce, 0x38, 0x32, 0xc2, 0xd7, 0x6f, 0x8f, 0x6f, 0x5d,
|
|
0xaf, 0xc0, 0x8d, 0x93, 0x39, 0xd4, 0xee, 0xf6, 0x76, 0x57, 0x33, 0x36, 0xa5, 0xc5, 0x1e,
|
|
0xb6, 0xf9, 0x46, 0xb3, 0x1d]
|
|
publickey := [u8(0x7d), 0x4d, 0x0e, 0x7f, 0x61, 0x53, 0xa6, 0x9b, 0x62, 0x42, 0xb5, 0x22, 0xab,
|
|
0xbe, 0xe6, 0x85, 0xfd, 0xa4, 0x42, 0x0f, 0x88, 0x34, 0xb1, 0x08, 0xc3, 0xbd, 0xae, 0x36,
|
|
0x9e, 0xf5, 0x49, 0xfa]
|
|
// verify should fail on provided bytes
|
|
res := ed25519.verify(publickey, msg, sig) or { false }
|
|
assert res == false
|
|
}
|