docs: refine Go docs and improve naming

This commit is contained in:
Steve Moyer
2025-07-08 07:34:57 -04:00
parent af00c4ff6c
commit 83227f36a7
13 changed files with 171 additions and 102 deletions

View File

@@ -1,3 +1,56 @@
# go-varsig # go-varsig
`go-varsig` implements v0.1.0 of the [`varsig` specification] `go-varsig` implements the upcoming v1.0.0 release of the [`varsig` specification](https://github.com/ChainAgnostic/varsig/pull/18)
with limited (and soon to be deprecated) support for the `varsig` < v1.0
specification. This is predominatly included to support the UCAN v1.0
use-case.
## Usage
Include the `go-varsig` library by running the following command:
```bash
go get github.com/ucan-wg/go-varsig@latest
```
## Documentation
Documentation for this library is provided as Go docs at
https://pkg.go.dev/github.com/ucan-wg/go-varsig.
## Development
Install the required development tools using `asdf` by running the
following command in this repository (or install them manually):
```bash
asdf install
```
### Checks
This repository contains an set of pre-commit hooks that are run prior to
each `git commit`. You can also run these checks manually using the
following command:
```bash
pre-commit run --all-files
```
### Github workflows development
ASDF installs `act` to support Github workflow development - in general,
follow these steps to test the workflow:
If you're using `podman` instead of `docker`, use the `podman` socket to
simulate the `docker` daemon:
```bash
export DOCKER_HOST=unix:///var/run/podman/podman.sock
```
Since there's only one workflow, the simplest command to test it is:
```bash
act
```

View File

@@ -3,7 +3,7 @@ package varsig
// Ed25519 produces a varsig that describes the associated algorithm defined // Ed25519 produces a varsig that describes the associated algorithm defined
// by the [IANA JOSE specification]. // by the [IANA JOSE specification].
// //
// [IANA JOSE specidication]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms // [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
func Ed25519(payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error) { func Ed25519(payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error) {
return NewEdDSAVarsig(CurveEd25519, HashAlgorithmSHA512, payloadEncoding, opts...) return NewEdDSAVarsig(CurveEd25519, HashAlgorithmSHA512, payloadEncoding, opts...)
} }
@@ -11,7 +11,7 @@ func Ed25519(payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, err
// Ed448 produces a varsig that describes the associated algorithm defined // Ed448 produces a varsig that describes the associated algorithm defined
// by the [IANA JOSE specification]. // by the [IANA JOSE specification].
// //
// [IANA JOSE specidication]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms // [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
func Ed448(payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error) { func Ed448(payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error) {
return NewEdDSAVarsig(CurveEd448, HashAlgorithmShake256, payloadEncoding, opts...) return NewEdDSAVarsig(CurveEd448, HashAlgorithmShake256, payloadEncoding, opts...)
} }
@@ -19,7 +19,7 @@ func Ed448(payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error
// RS256 produces a varsig that describes the associated algorithm defined // RS256 produces a varsig that describes the associated algorithm defined
// by the [IANA JOSE specification]. // by the [IANA JOSE specification].
// //
// [IANA JOSE specidication]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms // [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
func RS256(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) { func RS256(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) {
return NewRSAVarsig(HashAlgorithmSHA256, keyLength, payloadEncoding, opts...) return NewRSAVarsig(HashAlgorithmSHA256, keyLength, payloadEncoding, opts...)
} }
@@ -27,7 +27,7 @@ func RS256(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*
// RS384 produces a varsig that describes the associated algorithm defined // RS384 produces a varsig that describes the associated algorithm defined
// by the [IANA JOSE specification]. // by the [IANA JOSE specification].
// //
// [IANA JOSE specidication]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms // [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
func RS384(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) { func RS384(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) {
return NewRSAVarsig(HashAlgorithmSHA384, keyLength, payloadEncoding, opts...) return NewRSAVarsig(HashAlgorithmSHA384, keyLength, payloadEncoding, opts...)
} }
@@ -35,7 +35,7 @@ func RS384(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*
// RS512 produces a varsig that describes the associated algorithm defined // RS512 produces a varsig that describes the associated algorithm defined
// by the [IANA JOSE specification]. // by the [IANA JOSE specification].
// //
// [IANA JOSE specidication]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms // [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
func RS512(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) { func RS512(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) {
return NewRSAVarsig(HashAlgorithmSHA512, keyLength, payloadEncoding, opts...) return NewRSAVarsig(HashAlgorithmSHA512, keyLength, payloadEncoding, opts...)
} }

View File

@@ -8,10 +8,16 @@ import (
"github.com/multiformats/go-multicodec" "github.com/multiformats/go-multicodec"
) )
// Prefix is the multicodec.Code for the varsig's varuint prefix byte.
const Prefix = uint64(multicodec.Varsig)
// HashAlgorithm is the multicodec.Code that specifies the hash algorithm // HashAlgorithm is the multicodec.Code that specifies the hash algorithm
// that's used to reduced the signed content // that's used to reduced the signed content
type HashAlgorithm uint64 type HashAlgorithm uint64
// Constant multicodec.Code values that allow Varsig implementations to
// specify how the payload content is hashed before the signature is
// generated.
const ( const (
HashAlgorithmUnspecified HashAlgorithm = 0x00 HashAlgorithmUnspecified HashAlgorithm = 0x00
HashAlgorithmSHA256 = HashAlgorithm(multicodec.Sha2_256) HashAlgorithmSHA256 = HashAlgorithm(multicodec.Sha2_256)
@@ -48,6 +54,9 @@ func DecodeHashAlgorithm(r *bytes.Reader) (HashAlgorithm, error) {
// consistent hashes and signatures. // consistent hashes and signatures.
type PayloadEncoding uint64 type PayloadEncoding uint64
// Constant multicodec.Code values that allow Varsig implementations to
// specify how the payload content is encoded before being hashed. In
// varsig >= v1, only canonical encoding is allowed.
const ( const (
PayloadEncodingUnspecified PayloadEncoding = 0x00 PayloadEncodingUnspecified PayloadEncoding = 0x00
PayloadEncodingVerbatim PayloadEncoding = 0x5f PayloadEncodingVerbatim PayloadEncoding = 0x5f
@@ -108,14 +117,14 @@ func decodeEncodingInfoV1(payEnc PayloadEncoding) (PayloadEncoding, error) {
return payEnc, nil return payEnc, nil
} }
// SignAlgorithm is (usually) the multicodec.Code representing the public // Discriminator is (usually) the multicodec.Code representing the public
// key type of the algorithm used to create the signature. // key type of the algorithm used to create the signature.
// //
// There is not set list of constants here, nor is there a decode function // There is not set list of constants here, nor is there a decode function
// as the author of an implementation should include the constant with the // as the author of an implementation should include the constant with the
// implementation, and the decoding is handled by the Handler, which uses // implementation, and the decoding is handled by the Handler, which uses
// the SignAlgorithm to choose the correct implementation. Also note that // the Discriminator to choose the correct implementation. Also note that
// some of the SignAlgorithm values for a specific implementation have // some of the Discriminator values for a specific implementation have
// changed between varsig v0 and v1, so it's possible to have more than one // changed between varsig v0 and v1, so it's possible to have more than one
// constant defined per implementation. // constant defined per implementation.
type SignAlgorithm uint64 type Discriminator uint64

View File

@@ -2,8 +2,8 @@ package varsig
// Stub // Stub
const ( const (
SignAlgorithmECDSASecp256k1 SignAlgorithm = 0xe7 DiscriminatorECDSASecp256k1 Discriminator = 0xe7
SignAlgorithmECDSAP256 SignAlgorithm = 0x1200 DiscriminatorECDSAP256 Discriminator = 0x1200
SignAlgorithmECDSAP384 SignAlgorithm = 0x1201 DiscriminatorECDSAP384 Discriminator = 0x1201
SignAlgorithmECDSAP521 SignAlgorithm = 0x1202 DiscriminatorECDSAP521 Discriminator = 0x1202
) )

View File

@@ -8,14 +8,19 @@ import (
"github.com/multiformats/go-multicodec" "github.com/multiformats/go-multicodec"
) )
// Constants containing multicodec.Code values that specify EdDSA signatures.
const ( const (
SignAlgorithmEdDSA = SignAlgorithm(multicodec.Ed25519Pub) DiscriminatorEdDSA = Discriminator(multicodec.Ed25519Pub)
SignAlgorithmEd25519 = SignAlgorithm(multicodec.Ed25519Pub) DiscriminatorEd25519 = Discriminator(multicodec.Ed25519Pub)
SignAlgorithmEd448 = SignAlgorithm(multicodec.Ed448Pub) DiscriminatorEd448 = Discriminator(multicodec.Ed448Pub)
) )
// EdDSACurve are multicodec.Code values that specify which Edwards curve
// is used when generating the signature.
type EdDSACurve uint64 type EdDSACurve uint64
// Constants describing the multicodec.Code for each specific Edwards
// curve that can be encoded into a Varsig.
const ( const (
CurveEd25519 = EdDSACurve(multicodec.Ed25519Pub) CurveEd25519 = EdDSACurve(multicodec.Ed25519Pub)
CurveEd448 = EdDSACurve(multicodec.Ed448Pub) CurveEd448 = EdDSACurve(multicodec.Ed448Pub)
@@ -23,6 +28,8 @@ const (
var _ Varsig = (*EdDSAVarsig)(nil) var _ Varsig = (*EdDSAVarsig)(nil)
// EdDSAVarsig is a varsig that encodes the parameters required to describe
// an EdDSA signature.
type EdDSAVarsig struct { type EdDSAVarsig struct {
varsig[EdDSAVarsig] varsig[EdDSAVarsig]
@@ -30,27 +37,29 @@ type EdDSAVarsig struct {
hashAlg HashAlgorithm hashAlg HashAlgorithm
} }
// NewEdDSAVarsig creates and validates an EdDSA varsig with the provided
// curve, hash algorithm and payload encoding.
func NewEdDSAVarsig(curve EdDSACurve, hashAlgorithm HashAlgorithm, payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error) { func NewEdDSAVarsig(curve EdDSACurve, hashAlgorithm HashAlgorithm, payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error) {
options := newOptions(opts...) options := newOptions(opts...)
var ( var (
vers = Version1 vers = Version1
signAlg = SignAlgorithmEdDSA disc = DiscriminatorEdDSA
sig = []byte{} sig = []byte{}
) )
if options.ForceVersion0() { if options.ForceVersion0() {
vers = Version0 vers = Version0
signAlg = SignAlgorithm(curve) disc = Discriminator(curve)
sig = options.Signature() sig = options.Signature()
} }
v := &EdDSAVarsig{ v := &EdDSAVarsig{
varsig: varsig[EdDSAVarsig]{ varsig: varsig[EdDSAVarsig]{
vers: vers, vers: vers,
signAlg: signAlg, disc: disc,
payEnc: payloadEncoding, payEnc: payloadEncoding,
sig: sig, sig: sig,
}, },
curve: curve, curve: curve,
hashAlg: hashAlgorithm, hashAlg: hashAlgorithm,
@@ -59,14 +68,18 @@ func NewEdDSAVarsig(curve EdDSACurve, hashAlgorithm HashAlgorithm, payloadEncodi
return v.validateSig(v, ed25519.PrivateKeySize) return v.validateSig(v, ed25519.PrivateKeySize)
} }
// Curve returns the Edwards curve used to generate the EdDSA signature.
func (v *EdDSAVarsig) Curve() EdDSACurve { func (v *EdDSAVarsig) Curve() EdDSACurve {
return v.curve return v.curve
} }
// HashAlgorithm returns the multicodec.Code describing the hash algorithm
// used to hash the payload content before the signature is generated.
func (v *EdDSAVarsig) HashAlgorithm() HashAlgorithm { func (v *EdDSAVarsig) HashAlgorithm() HashAlgorithm {
return v.hashAlg return v.hashAlg
} }
// Encode returns the encoded byte format of the EdDSAVarsig.
func (v EdDSAVarsig) Encode() []byte { func (v EdDSAVarsig) Encode() []byte {
buf := v.encode() buf := v.encode()
@@ -81,8 +94,8 @@ func (v EdDSAVarsig) Encode() []byte {
return buf return buf
} }
func decodeEd25519(r *bytes.Reader, vers Version, signAlg SignAlgorithm) (Varsig, error) { func decodeEd25519(r *bytes.Reader, vers Version, disc Discriminator) (Varsig, error) {
curve := uint64(signAlg) curve := uint64(disc)
if vers != Version0 { if vers != Version0 {
u, err := binary.ReadUvarint(r) u, err := binary.ReadUvarint(r)
@@ -100,8 +113,8 @@ func decodeEd25519(r *bytes.Reader, vers Version, signAlg SignAlgorithm) (Varsig
v := &EdDSAVarsig{ v := &EdDSAVarsig{
varsig: varsig[EdDSAVarsig]{ varsig: varsig[EdDSAVarsig]{
vers: vers, vers: vers,
signAlg: signAlg, disc: disc,
}, },
curve: EdDSACurve(curve), curve: EdDSACurve(curve),
hashAlg: HashAlgorithm(hashAlg), hashAlg: HashAlgorithm(hashAlg),
@@ -109,8 +122,3 @@ func decodeEd25519(r *bytes.Reader, vers Version, signAlg SignAlgorithm) (Varsig
return v.decodePayEncAndSig(r, v, ed25519.PrivateKeySize) return v.decodePayEncAndSig(r, v, ed25519.PrivateKeySize)
} }
// TODO: remove this when parseEd25519 is added to the DefaultRegistry.
func Junk() {
_, _ = decodeEd25519(nil, 0, 0)
}

View File

@@ -31,7 +31,7 @@ func TestDecodeEd25519(t *testing.T) {
require.NoError(t, err) require.NoError(t, err)
require.NotNil(t, v) require.NotNil(t, v)
assert.Equal(t, varsig.Version0, v.Version()) assert.Equal(t, varsig.Version0, v.Version())
assert.Equal(t, varsig.SignAlgorithmEd25519, v.SignatureAlgorithm()) assert.Equal(t, varsig.DiscriminatorEd25519, v.Discriminator())
assert.Equal(t, varsig.PayloadEncodingDAGCBOR, v.PayloadEncoding()) assert.Equal(t, varsig.PayloadEncodingDAGCBOR, v.PayloadEncoding())
assert.Len(t, v.Signature(), 64) assert.Len(t, v.Signature(), 64)

View File

@@ -30,9 +30,9 @@ var ErrUnknownHashAlgorithm = errors.New("unknown hash algorithm")
// for this field may vary based on the varsig version. // for this field may vary based on the varsig version.
var ErrUnsupportedPayloadEncoding = errors.New("unsupported payload encoding") var ErrUnsupportedPayloadEncoding = errors.New("unsupported payload encoding")
// ErrUnknownSignAlgorith is returned when the Registry doesn't have a // ErrUnknowndiscorith is returned when the Registry doesn't have a
// parsing function for the decoded signing algorithm. // parsing function for the decoded signing algorithm.
var ErrUnknownSignAlgorithm = errors.New("unknown signing algorithm") var ErrUnknownDiscriminator = errors.New("unknown signing algorithm")
// ErrUnsupportedVersion is returned when an unsupported varsig version // ErrUnsupportedVersion is returned when an unsupported varsig version
// field is present. // field is present.

View File

@@ -6,8 +6,11 @@ import (
"fmt" "fmt"
) )
// Version represents which version of the vasig specification was used
// to produce Varsig value.
type Version uint64 type Version uint64
// Constancts for the existing varsig specifications
const ( const (
Version0 Version = 0 Version0 Version = 0
Version1 Version = 1 Version1 Version = 1
@@ -15,22 +18,22 @@ const (
// DecodeFunc is a function that parses the varsig representing a specific // DecodeFunc is a function that parses the varsig representing a specific
// signing algorithm. // signing algorithm.
type DecodeFunc func(*bytes.Reader, Version, SignAlgorithm) (Varsig, error) type DecodeFunc func(*bytes.Reader, Version, Discriminator) (Varsig, error)
// Registry contains a mapping between known signing algorithms, and // Registry contains a mapping between known signing algorithms, and
// functions that can parse varsigs for that signing algorithm. // functions that can parse varsigs for that signing algorithm.
type Registry map[SignAlgorithm]DecodeFunc type Registry map[Discriminator]DecodeFunc
// DefaultRegistry provides a Registry containing the mappings for the // DefaultRegistry provides a Registry containing the mappings for the
// signing algorithms which have an implementation within this library. // signing algorithms which have an implementation within this library.
func DefaultRegistry() Registry { func DefaultRegistry() Registry {
return map[SignAlgorithm]DecodeFunc{ return map[Discriminator]DecodeFunc{
SignAlgorithmRSA: decodeRSA, DiscriminatorRSA: decodeRSA,
SignAlgorithmEdDSA: decodeEd25519, DiscriminatorEdDSA: decodeEd25519,
SignAlgorithmEd448: decodeEd25519, DiscriminatorEd448: decodeEd25519,
SignAlgorithmECDSAP256: notYetImplementedVarsigDecoder, DiscriminatorECDSAP256: notYetImplementedVarsigDecoder,
SignAlgorithmECDSASecp256k1: notYetImplementedVarsigDecoder, DiscriminatorECDSASecp256k1: notYetImplementedVarsigDecoder,
SignAlgorithmECDSAP521: notYetImplementedVarsigDecoder, DiscriminatorECDSAP521: notYetImplementedVarsigDecoder,
} }
} }
@@ -41,7 +44,7 @@ func NewRegistry() Registry {
// Register allows new mappings between a signing algorithm and its parsing // Register allows new mappings between a signing algorithm and its parsing
// function to the Registry. // function to the Registry.
func (rs Registry) Register(alg SignAlgorithm, decodeFunc DecodeFunc) { func (rs Registry) Register(alg Discriminator, decodeFunc DecodeFunc) {
rs[alg] = decodeFunc rs[alg] = decodeFunc
} }
@@ -63,20 +66,20 @@ func (rs Registry) DecodeStream(r *bytes.Reader) (Varsig, error) {
return nil, fmt.Errorf("%w: expected %d, got %d", ErrBadPrefix, Prefix, pre) return nil, fmt.Errorf("%w: expected %d, got %d", ErrBadPrefix, Prefix, pre)
} }
vers, signAlg, err := rs.decodeVersAndSignAlg(r) vers, disc, err := rs.decodeVersAnddisc(r)
if err != nil { if err != nil {
return nil, err return nil, err
} }
decodeFunc, ok := rs[SignAlgorithm(signAlg)] decodeFunc, ok := rs[Discriminator(disc)]
if !ok { if !ok {
return nil, fmt.Errorf("%w: %x", ErrUnknownSignAlgorithm, signAlg) return nil, fmt.Errorf("%w: %x", ErrUnknownDiscriminator, disc)
} }
return decodeFunc(r, vers, signAlg) return decodeFunc(r, vers, disc)
} }
func (rs Registry) decodeVersAndSignAlg(r *bytes.Reader) (Version, SignAlgorithm, error) { func (rs Registry) decodeVersAnddisc(r *bytes.Reader) (Version, Discriminator, error) {
vers, err := binary.ReadUvarint(r) vers, err := binary.ReadUvarint(r)
if err != nil { if err != nil {
return Version(vers), 0, err return Version(vers), 0, err
@@ -87,14 +90,14 @@ func (rs Registry) decodeVersAndSignAlg(r *bytes.Reader) (Version, SignAlgorithm
} }
if vers >= 64 { if vers >= 64 {
return 0, SignAlgorithm(vers), nil return 0, Discriminator(vers), nil
} }
signAlg, err := binary.ReadUvarint(r) disc, err := binary.ReadUvarint(r)
return Version(vers), SignAlgorithm(signAlg), err return Version(vers), Discriminator(disc), err
} }
func notYetImplementedVarsigDecoder(_ *bytes.Reader, vers Version, signAlg SignAlgorithm) (Varsig, error) { func notYetImplementedVarsigDecoder(_ *bytes.Reader, vers Version, disc Discriminator) (Varsig, error) {
return nil, fmt.Errorf("%w: Version: %d, SignAlgorithm: %x", ErrNotYetImplemented, vers, signAlg) return nil, fmt.Errorf("%w: Version: %d, Discriminator: %x", ErrNotYetImplemented, vers, disc)
} }

View File

@@ -25,7 +25,7 @@ func TestRegistry_Decode(t *testing.T) {
vs, err := reg.DecodeStream(bytes.NewReader(data)) vs, err := reg.DecodeStream(bytes.NewReader(data))
require.NoError(t, err) require.NoError(t, err)
assert.Equal(t, varsig.Version0, vs.Version()) assert.Equal(t, varsig.Version0, vs.Version())
assert.Equal(t, testSignAlgorithm1, vs.SignatureAlgorithm()) assert.Equal(t, testDiscriminator1, vs.Discriminator())
}) })
t.Run("passes - v1", func(t *testing.T) { t.Run("passes - v1", func(t *testing.T) {
@@ -39,21 +39,21 @@ func TestRegistry_Decode(t *testing.T) {
vs, err := reg.DecodeStream(bytes.NewReader(data)) vs, err := reg.DecodeStream(bytes.NewReader(data))
require.NoError(t, err) require.NoError(t, err)
assert.Equal(t, varsig.Version1, vs.Version()) assert.Equal(t, varsig.Version1, vs.Version())
assert.Equal(t, testSignAlgorithm1, vs.SignatureAlgorithm()) assert.Equal(t, testDiscriminator1, vs.Discriminator())
}) })
} }
const ( const (
testSignAlgorithm0 varsig.SignAlgorithm = 0x1000 testDiscriminator0 varsig.Discriminator = 0x1000
testSignAlgorithm1 varsig.SignAlgorithm = 0x1001 testDiscriminator1 varsig.Discriminator = 0x1001
) )
func testRegistry(t *testing.T) varsig.Registry { func testRegistry(t *testing.T) varsig.Registry {
t.Helper() t.Helper()
reg := varsig.NewRegistry() reg := varsig.NewRegistry()
reg.Register(testSignAlgorithm0, testDecodeFunc(t)) reg.Register(testDiscriminator0, testDecodeFunc(t))
reg.Register(testSignAlgorithm1, testDecodeFunc(t)) reg.Register(testDiscriminator1, testDecodeFunc(t))
return reg return reg
} }
@@ -61,10 +61,10 @@ func testRegistry(t *testing.T) varsig.Registry {
func testDecodeFunc(t *testing.T) varsig.DecodeFunc { func testDecodeFunc(t *testing.T) varsig.DecodeFunc {
t.Helper() t.Helper()
return func(r *bytes.Reader, vers varsig.Version, signAlg varsig.SignAlgorithm) (varsig.Varsig, error) { return func(r *bytes.Reader, vers varsig.Version, disc varsig.Discriminator) (varsig.Varsig, error) {
v := &testVarsig{ v := &testVarsig{
vers: vers, vers: vers,
signAlg: signAlg, disc: disc,
} }
return v, nil return v, nil
@@ -74,18 +74,18 @@ func testDecodeFunc(t *testing.T) varsig.DecodeFunc {
var _ varsig.Varsig = (*testVarsig)(nil) var _ varsig.Varsig = (*testVarsig)(nil)
type testVarsig struct { type testVarsig struct {
vers varsig.Version vers varsig.Version
signAlg varsig.SignAlgorithm disc varsig.Discriminator
payEnc varsig.PayloadEncoding payEnc varsig.PayloadEncoding
sig []byte sig []byte
} }
func (v *testVarsig) Version() varsig.Version { func (v *testVarsig) Version() varsig.Version {
return v.vers return v.vers
} }
func (v *testVarsig) SignatureAlgorithm() varsig.SignAlgorithm { func (v *testVarsig) Discriminator() varsig.Discriminator {
return v.signAlg return v.disc
} }
func (v *testVarsig) PayloadEncoding() varsig.PayloadEncoding { func (v *testVarsig) PayloadEncoding() varsig.PayloadEncoding {

23
rsa.go
View File

@@ -7,12 +7,13 @@ import (
"github.com/multiformats/go-multicodec" "github.com/multiformats/go-multicodec"
) )
const SignAlgorithmRSA = SignAlgorithm(multicodec.RsaPub) // DiscriminatorRSA is the multicodec.Code specifying an RSA signature.
const DiscriminatorRSA = Discriminator(multicodec.RsaPub)
var _ Varsig = (*RSAVarsig)(nil) var _ Varsig = (*RSAVarsig)(nil)
// RSAVarsig is a varsig that encodes the parameters required to describe // RSAVarsig is a varsig that encodes the parameters required to describe
// and RSA signature. // an RSA signature.
type RSAVarsig struct { type RSAVarsig struct {
varsig[RSAVarsig] varsig[RSAVarsig]
hashAlg HashAlgorithm hashAlg HashAlgorithm
@@ -20,7 +21,7 @@ type RSAVarsig struct {
} }
// NewRSAVarsig creates and validates an RSA varsig with the provided // NewRSAVarsig creates and validates an RSA varsig with the provided
// parameters. // hash algorithm, key length and payload encoding.
func NewRSAVarsig(hashAlgorithm HashAlgorithm, keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) { func NewRSAVarsig(hashAlgorithm HashAlgorithm, keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) {
options := newOptions(opts...) options := newOptions(opts...)
@@ -36,10 +37,10 @@ func NewRSAVarsig(hashAlgorithm HashAlgorithm, keyLength uint64, payloadEncoding
v := &RSAVarsig{ v := &RSAVarsig{
varsig: varsig[RSAVarsig]{ varsig: varsig[RSAVarsig]{
vers: vers, vers: vers,
signAlg: SignAlgorithmRSA, disc: DiscriminatorRSA,
payEnc: payloadEncoding, payEnc: payloadEncoding,
sig: sig, sig: sig,
}, },
hashAlg: hashAlgorithm, hashAlg: hashAlgorithm,
sigLen: keyLength, sigLen: keyLength,
@@ -48,7 +49,7 @@ func NewRSAVarsig(hashAlgorithm HashAlgorithm, keyLength uint64, payloadEncoding
return v.validateSig(v, v.sigLen) return v.validateSig(v, v.sigLen)
} }
// Encode returns the encoded byte formation of the RSAVarsig. // Encode returns the encoded byte format of the RSAVarsig.
func (v RSAVarsig) Encode() []byte { func (v RSAVarsig) Encode() []byte {
buf := v.encode() buf := v.encode()
buf = binary.AppendUvarint(buf, uint64(v.hashAlg)) buf = binary.AppendUvarint(buf, uint64(v.hashAlg))
@@ -70,7 +71,7 @@ func (v *RSAVarsig) KeyLength() uint64 {
return v.sigLen return v.sigLen
} }
func decodeRSA(r *bytes.Reader, vers Version, signAlg SignAlgorithm) (Varsig, error) { func decodeRSA(r *bytes.Reader, vers Version, disc Discriminator) (Varsig, error) {
hashAlg, err := DecodeHashAlgorithm(r) hashAlg, err := DecodeHashAlgorithm(r)
if err != nil { if err != nil {
return nil, err return nil, err
@@ -83,8 +84,8 @@ func decodeRSA(r *bytes.Reader, vers Version, signAlg SignAlgorithm) (Varsig, er
vs := &RSAVarsig{ vs := &RSAVarsig{
varsig: varsig[RSAVarsig]{ varsig: varsig[RSAVarsig]{
vers: vers, vers: vers,
signAlg: signAlg, disc: disc,
}, },
hashAlg: HashAlgorithm(hashAlg), hashAlg: HashAlgorithm(hashAlg),
sigLen: sigLen, sigLen: sigLen,

View File

@@ -30,7 +30,7 @@ func TestRSAVarsig(t *testing.T) {
require.True(t, ok) require.True(t, ok)
assert.Equal(t, varsig.Version1, rsaVs.Version()) assert.Equal(t, varsig.Version1, rsaVs.Version())
assert.Equal(t, varsig.SignAlgorithmRSA, rsaVs.SignatureAlgorithm()) assert.Equal(t, varsig.DiscriminatorRSA, rsaVs.Discriminator())
assert.Equal(t, varsig.HashAlgorithmSHA256, rsaVs.HashAlgorithm()) assert.Equal(t, varsig.HashAlgorithmSHA256, rsaVs.HashAlgorithm())
assert.Equal(t, varsig.PayloadEncodingDAGCBOR, rsaVs.PayloadEncoding()) assert.Equal(t, varsig.PayloadEncodingDAGCBOR, rsaVs.PayloadEncoding())
assert.Equal(t, uint64(keyLen), rsaVs.KeyLength()) assert.Equal(t, uint64(keyLen), rsaVs.KeyLength())
@@ -73,7 +73,7 @@ func TestUCANExample(t *testing.T) {
require.True(t, ok) require.True(t, ok)
assert.Equal(t, varsig.Version0, rsaVs.Version()) assert.Equal(t, varsig.Version0, rsaVs.Version())
assert.Equal(t, varsig.SignAlgorithmRSA, rsaVs.SignatureAlgorithm()) assert.Equal(t, varsig.DiscriminatorRSA, rsaVs.Discriminator())
assert.Equal(t, varsig.HashAlgorithmSHA256, rsaVs.HashAlgorithm()) assert.Equal(t, varsig.HashAlgorithmSHA256, rsaVs.HashAlgorithm())
assert.Equal(t, varsig.PayloadEncodingDAGCBOR, rsaVs.PayloadEncoding()) assert.Equal(t, varsig.PayloadEncodingDAGCBOR, rsaVs.PayloadEncoding())
assert.Equal(t, uint64(keyLen), rsaVs.KeyLength()) assert.Equal(t, uint64(keyLen), rsaVs.KeyLength())

View File

@@ -23,19 +23,14 @@ import (
"bytes" "bytes"
"encoding/binary" "encoding/binary"
"io" "io"
"github.com/multiformats/go-multicodec"
) )
// Prefix is the multicodec.Code for the varsig's varuint prefix byte.
const Prefix = uint64(multicodec.Varsig)
// Varsig represents types that describe how a signature was generated // Varsig represents types that describe how a signature was generated
// and thus how to interpret the signature and verify the signed data. // and thus how to interpret the signature and verify the signed data.
type Varsig interface { type Varsig interface {
// accessors for fields that are common to all varsig // accessors for fields that are common to all varsig
Version() Version Version() Version
SignatureAlgorithm() SignAlgorithm Discriminator() Discriminator
PayloadEncoding() PayloadEncoding PayloadEncoding() PayloadEncoding
Signature() []byte Signature() []byte
@@ -56,10 +51,10 @@ func DecodeStream(r *bytes.Reader) (Varsig, error) {
} }
type varsig[T Varsig] struct { type varsig[T Varsig] struct {
vers Version vers Version
signAlg SignAlgorithm disc Discriminator
payEnc PayloadEncoding payEnc PayloadEncoding
sig []byte sig []byte
} }
// Version returns the varsig's version field. // Version returns the varsig's version field.
@@ -67,10 +62,10 @@ func (v varsig[_]) Version() Version {
return v.vers return v.vers
} }
// SignatureAlgorithm returns the algorithm used to produce corresponding // Discriminator returns the algorithm used to produce corresponding
// signature. // signature.
func (v varsig[_]) SignatureAlgorithm() SignAlgorithm { func (v varsig[_]) Discriminator() Discriminator {
return v.signAlg return v.disc
} }
// PayloadEncoding returns the codec that was used to encode the signed // PayloadEncoding returns the codec that was used to encode the signed
@@ -95,7 +90,7 @@ func (v *varsig[_]) encode() []byte {
buf = binary.AppendUvarint(buf, uint64(Version1)) buf = binary.AppendUvarint(buf, uint64(Version1))
} }
buf = binary.AppendUvarint(buf, uint64(v.signAlg)) buf = binary.AppendUvarint(buf, uint64(v.disc))
return buf return buf
} }

View File

@@ -66,7 +66,7 @@ func TestDecode(t *testing.T) {
require.NoError(t, err) require.NoError(t, err)
vs, err := varsig.Decode(data) vs, err := varsig.Decode(data)
require.ErrorIs(t, err, varsig.ErrUnknownSignAlgorithm) require.ErrorIs(t, err, varsig.ErrUnknownDiscriminator)
assert.Nil(t, vs) assert.Nil(t, vs)
}) })
@@ -77,7 +77,7 @@ func TestDecode(t *testing.T) {
require.NoError(t, err) require.NoError(t, err)
vs, err := varsig.Decode(data) vs, err := varsig.Decode(data)
require.ErrorIs(t, err, varsig.ErrUnknownSignAlgorithm) require.ErrorIs(t, err, varsig.ErrUnknownDiscriminator)
assert.Nil(t, vs) assert.Nil(t, vs)
}) })
@@ -180,7 +180,7 @@ func roundTrip[T varsig.Varsig](t *testing.T, in T, expEncHex string) T {
} }
assert.Equal(t, in.Version(), out.Version()) assert.Equal(t, in.Version(), out.Version())
assert.Equal(t, in.SignatureAlgorithm(), out.SignatureAlgorithm()) assert.Equal(t, in.Discriminator(), out.Discriminator())
assert.Equal(t, in.PayloadEncoding(), out.PayloadEncoding()) assert.Equal(t, in.PayloadEncoding(), out.PayloadEncoding())
assert.Equal(t, in.Signature(), out.Signature()) assert.Equal(t, in.Signature(), out.Signature())