Added jvm _sign_ implementation
This commit is contained in:
parent
b0ce2e10fc
commit
37a5cdb2d0
@ -29,4 +29,41 @@ class SignatureTest {
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
@Test
|
||||
fun testDetachedSignAndVerify() {
|
||||
LibsodiumInitializer.initializeWithCallback {
|
||||
val keys = Signature.keypair()
|
||||
val message = "Some text that will be signed".encodeToUByteArray()
|
||||
val signature = Signature.detached(message, keys.secretKey)
|
||||
val verifiedMessage = Signature.verifyDetached(signature, message, keys.publicKey)
|
||||
assertFailsWith(InvalidSignatureException::class) {
|
||||
val tamperedSignature = signature.copyOf()
|
||||
tamperedSignature[crypto_sign_BYTES - 1] = 0U
|
||||
Signature.verifyDetached(tamperedSignature, message, keys.publicKey)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
fun testMultipart() {
|
||||
LibsodiumInitializer.initializeWithCallback {
|
||||
val keys = Signature.keypair()
|
||||
val message1 = "Some text that ".encodeToUByteArray()
|
||||
val message2 = "will be signed".encodeToUByteArray()
|
||||
val state = Signature.init()
|
||||
Signature.update(state, message1)
|
||||
Signature.update(state, message2)
|
||||
val signature = Signature.finalCreate(state, keys.secretKey)
|
||||
val verificationState = Signature.init()
|
||||
Signature.update(verificationState, message1)
|
||||
Signature.update(verificationState, message2)
|
||||
Signature.finalVerify(verificationState, signature, keys.publicKey)
|
||||
assertFailsWith(InvalidSignatureException::class) {
|
||||
val tamperedSignature = signature.copyOf()
|
||||
tamperedSignature[crypto_sign_BYTES - 1] = 0U
|
||||
Signature.finalVerify(verificationState, tamperedSignature, keys.publicKey)
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,209 @@
|
||||
package com.ionspin.kotlin.crypto.signature
|
||||
|
||||
import com.goterl.lazycode.lazysodium.interfaces.Sign
|
||||
import com.ionspin.kotlin.crypto.LibsodiumInitializer.sodium
|
||||
|
||||
actual typealias SignatureState = Sign.StateCryptoSign
|
||||
|
||||
actual object Signature {
|
||||
actual fun init(): SignatureState {
|
||||
return SignatureState()
|
||||
}
|
||||
|
||||
actual fun update(state: SignatureState, data: UByteArray) {
|
||||
sodium.crypto_sign_update(state, data.asByteArray(), data.size.toLong())
|
||||
}
|
||||
|
||||
actual fun finalCreate(
|
||||
state: SignatureState,
|
||||
secretKey: UByteArray
|
||||
): UByteArray {
|
||||
val signature = UByteArray(crypto_sign_BYTES)
|
||||
sodium.crypto_sign_final_create(
|
||||
state,
|
||||
signature.asByteArray(),
|
||||
null,
|
||||
secretKey.asByteArray()
|
||||
)
|
||||
return signature
|
||||
}
|
||||
|
||||
actual fun finalVerify(
|
||||
state: SignatureState,
|
||||
signature: UByteArray,
|
||||
publicKey: UByteArray
|
||||
) {
|
||||
val verificationResult = sodium.crypto_sign_final_verify(
|
||||
state,
|
||||
signature.asByteArray(),
|
||||
publicKey.asByteArray()
|
||||
)
|
||||
if (verificationResult == -1) {
|
||||
throw InvalidSignatureException()
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* The crypto_sign_keypair() function randomly generates a secret key and a corresponding public key.
|
||||
* The public key is put into pk (crypto_sign_PUBLICKEYBYTES bytes) and the secret key into sk (crypto_sign_SECRETKEYBYTES bytes).
|
||||
*/
|
||||
actual fun keypair(): SignatureKeyPair {
|
||||
val publicKey = UByteArray(crypto_sign_PUBLICKEYBYTES)
|
||||
val secretKey = UByteArray(crypto_sign_SECRETKEYBYTES)
|
||||
sodium.crypto_sign_keypair(
|
||||
publicKey.asByteArray(),
|
||||
secretKey.asByteArray(),
|
||||
)
|
||||
return SignatureKeyPair(publicKey, secretKey)
|
||||
}
|
||||
|
||||
/**
|
||||
* The crypto_sign_keypair() function randomly generates a secret key and a corresponding public key.
|
||||
* The public key is put into pk (crypto_sign_PUBLICKEYBYTES bytes) and the secret key into sk (crypto_sign_SECRETKEYBYTES bytes).
|
||||
* Using crypto_sign_seed_keypair(), the key pair can also be deterministically derived from a single key seed (crypto_sign_SEEDBYTES bytes).
|
||||
*/
|
||||
actual fun seedKeypair(seed: UByteArray): SignatureKeyPair {
|
||||
val publicKey = UByteArray(crypto_sign_PUBLICKEYBYTES)
|
||||
val secretKey = UByteArray(crypto_sign_SECRETKEYBYTES)
|
||||
|
||||
|
||||
sodium.crypto_sign_seed_keypair(
|
||||
publicKey.asByteArray(),
|
||||
secretKey.asByteArray(),
|
||||
seed.asByteArray()
|
||||
)
|
||||
return SignatureKeyPair(publicKey, secretKey)
|
||||
}
|
||||
|
||||
/**
|
||||
* The sodium.crypto_sign() function prepends a signature to a message m whose length is mlen bytes, using the secret key sk.
|
||||
* The signed message, which includes the signature + a plain copy of the message, is put into sm, and is sodium.crypto_sign_BYTES + mlen bytes long.
|
||||
*/
|
||||
actual fun sign(message: UByteArray, secretKey: UByteArray): UByteArray {
|
||||
val signedMessage = UByteArray(message.size + crypto_sign_BYTES)
|
||||
|
||||
sodium.crypto_sign(
|
||||
signedMessage.asByteArray(),
|
||||
null,
|
||||
message.asByteArray(),
|
||||
message.size.toLong(),
|
||||
secretKey.asByteArray()
|
||||
)
|
||||
|
||||
return signedMessage
|
||||
}
|
||||
|
||||
/**
|
||||
* The sodium.crypto_sign_open() function checks that the signed message sm whose length is smlen bytes has a valid signature for the public key pk.
|
||||
* If the signature is doesn't appear to be valid, the function throws an exception
|
||||
*/
|
||||
actual fun open(signedMessage: UByteArray, publicKey: UByteArray): UByteArray {
|
||||
val message = UByteArray(signedMessage.size - crypto_sign_BYTES)
|
||||
|
||||
val verificationResult = sodium.crypto_sign_open(
|
||||
message.asByteArray(),
|
||||
null,
|
||||
signedMessage.asByteArray(),
|
||||
signedMessage.size.toLong(),
|
||||
publicKey.asByteArray()
|
||||
)
|
||||
if (verificationResult == -1) {
|
||||
throw InvalidSignatureException()
|
||||
}
|
||||
return message
|
||||
}
|
||||
|
||||
/**
|
||||
* In detached mode, the signature is stored without attaching a copy of the original message to it.
|
||||
* The sodium.crypto_sign_detached() function signs the message m whose length is mlen bytes, using the secret key sk,
|
||||
* and puts the signature into sig, which can be up to sodium.crypto_sign_BYTES bytes long.
|
||||
*/
|
||||
actual fun detached(message: UByteArray, secretKey: UByteArray): UByteArray {
|
||||
val signature = UByteArray(crypto_sign_BYTES)
|
||||
|
||||
sodium.crypto_sign_detached(
|
||||
signature.asByteArray(),
|
||||
null,
|
||||
message.asByteArray(),
|
||||
message.size.toLong(),
|
||||
secretKey.asByteArray()
|
||||
)
|
||||
|
||||
return signature
|
||||
}
|
||||
|
||||
/**
|
||||
* The sodium.crypto_sign_verify_detached() function verifies that sig is a valid signature for the message m whose length
|
||||
* is mlen bytes, using the signer's public key pk.
|
||||
*/
|
||||
actual fun verifyDetached(
|
||||
signature: UByteArray,
|
||||
message: UByteArray,
|
||||
publicKey: UByteArray
|
||||
) {
|
||||
|
||||
val verificationResult = sodium.crypto_sign_verify_detached(
|
||||
signature.asByteArray(),
|
||||
message.asByteArray(),
|
||||
message.size.toLong(),
|
||||
publicKey.asByteArray()
|
||||
)
|
||||
|
||||
if (verificationResult == -1) {
|
||||
throw InvalidSignatureException()
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* The sodium.crypto_sign_ed25519_pk_to_curve25519() function converts an Ed25519 public key ed25519_pk to an X25519 public key and stores it into x25519_pk.
|
||||
*/
|
||||
actual fun ed25519PkToCurve25519(ed25519PublicKey: UByteArray) : UByteArray {
|
||||
val x25519PublicKey = UByteArray(crypto_scalarmult_curve25519_BYTES)
|
||||
sodium.crypto_sign_ed25519_sk_to_curve25519(
|
||||
x25519PublicKey.asByteArray(),
|
||||
ed25519PublicKey.asByteArray()
|
||||
)
|
||||
return x25519PublicKey
|
||||
}
|
||||
|
||||
actual fun ed25519SkToCurve25519(ed25519SecretKey: UByteArray) : UByteArray {
|
||||
val x25519SecretKey = UByteArray(crypto_scalarmult_curve25519_BYTES)
|
||||
sodium.crypto_sign_ed25519_sk_to_curve25519(
|
||||
x25519SecretKey.asByteArray(),
|
||||
ed25519SecretKey.asByteArray()
|
||||
)
|
||||
return x25519SecretKey
|
||||
}
|
||||
|
||||
/**
|
||||
* The secret key actually includes the seed (either a random seed or the one given to sodium.crypto_sign_seed_keypair()) as well as the public key.
|
||||
* While the public key can always be derived from the seed, the precomputation saves a significant amount of CPU cycles when signing.
|
||||
*/
|
||||
actual fun ed25519SkToSeed(secretKey: UByteArray): UByteArray {
|
||||
val seed = UByteArray(crypto_sign_SEEDBYTES)
|
||||
|
||||
sodium.crypto_sign_ed25519_sk_to_seed(
|
||||
seed.asByteArray(),
|
||||
secretKey.asByteArray()
|
||||
)
|
||||
|
||||
return seed
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
* The secret key actually includes the seed (either a random seed or the one given to sodium.crypto_sign_seed_keypair()) as well as the public key.
|
||||
* While the public key can always be derived from the seed, the precomputation saves a significant amount of CPU cycles when signing.
|
||||
*/
|
||||
actual fun ed25519SkToPk(secretKey: UByteArray): UByteArray {
|
||||
val publicKey = UByteArray(crypto_sign_PUBLICKEYBYTES)
|
||||
|
||||
sodium.crypto_sign_ed25519_sk_to_pk(
|
||||
publicKey.asByteArray(),
|
||||
secretKey.asByteArray()
|
||||
)
|
||||
|
||||
return publicKey
|
||||
}
|
||||
|
||||
}
|
@ -51,6 +51,10 @@ actual object Signature {
|
||||
signaturePinned.toPtr(),
|
||||
publicKeyPinned.toPtr()
|
||||
)
|
||||
|
||||
signaturePinned.unpin()
|
||||
publicKeyPinned.unpin()
|
||||
|
||||
if (verificationResult == -1) {
|
||||
throw InvalidSignatureException()
|
||||
}
|
||||
@ -136,6 +140,9 @@ actual object Signature {
|
||||
signedMessage.size.convert(),
|
||||
publicKeyPinned.toPtr()
|
||||
)
|
||||
messagePinned.unpin()
|
||||
signedMessagePinned.unpin()
|
||||
publicKeyPinned.unpin()
|
||||
if (verificationResult == -1) {
|
||||
throw InvalidSignatureException()
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user