Compare commits
23 Commits
constants-
...
v1.0.0
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
2c902a565e | ||
|
|
58ebd20b04 | ||
|
|
68e0d91f64 | ||
|
|
8c8da51656 | ||
|
|
af0845c832 | ||
|
|
35ef54f79f | ||
|
|
2f22cb9b15 | ||
|
|
a43c3af4c8 | ||
|
|
eab24207bc | ||
|
|
be01529d44 | ||
|
|
182036b055 | ||
|
|
0763d6f8b6 | ||
|
|
c7a870e9db | ||
|
|
2238f3a26c | ||
|
|
f2cd448a11 | ||
|
|
25d4579b29 | ||
|
|
5fb3516d15 | ||
|
|
eb70826a70 | ||
|
|
6308c66ab7 | ||
|
|
f6b72f1907 | ||
|
|
03770e0d38 | ||
|
|
1ea8b00efd | ||
|
|
21a78a9d2d |
2
.github/workflows/pre-commit.yaml
vendored
2
.github/workflows/pre-commit.yaml
vendored
@@ -1,9 +1,7 @@
|
|||||||
name: pre-commit
|
name: pre-commit
|
||||||
|
|
||||||
on:
|
on:
|
||||||
pull_request:
|
|
||||||
push:
|
push:
|
||||||
# branches: [main]
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
pre-commit:
|
pre-commit:
|
||||||
|
|||||||
25
LICENSE
25
LICENSE
@@ -1,25 +0,0 @@
|
|||||||
The contents of this repository are Copyright (c) corresponding authors and
|
|
||||||
contributors, licensed under the `Permissive License Stack` meaning either of:
|
|
||||||
|
|
||||||
- Apache-2.0 Software License: https://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
([...4tr2kfsq](https://dweb.link/ipfs/bafkreiankqxazcae4onkp436wag2lj3ccso4nawxqkkfckd6cg4tr2kfsq))
|
|
||||||
|
|
||||||
- MIT Software License: https://opensource.org/licenses/MIT
|
|
||||||
([...vljevcba](https://dweb.link/ipfs/bafkreiepofszg4gfe2gzuhojmksgemsub2h4uy2gewdnr35kswvljevcba))
|
|
||||||
|
|
||||||
You may not use the contents of this repository except in compliance
|
|
||||||
with one of the listed Licenses. For an extended clarification of the
|
|
||||||
intent behind the choice of Licensing please refer to
|
|
||||||
https://protocol.ai/blog/announcing-the-permissive-license-stack/
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the terms listed in this notice is distributed on
|
|
||||||
an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
|
|
||||||
either express or implied. See each License for the specific language
|
|
||||||
governing permissions and limitations under that License.
|
|
||||||
|
|
||||||
<!--- SPDX-License-Identifier: Apache-2.0 OR MIT -->
|
|
||||||
|
|
||||||
`SPDX-License-Identifier: Apache-2.0 OR MIT`
|
|
||||||
|
|
||||||
Verbatim copies of both licenses are included in the LICENSE-APACHE-2.0 and LICENSE-MIT files.
|
|
||||||
21
LICENSE-MIT
21
LICENSE-MIT
@@ -1,21 +0,0 @@
|
|||||||
MIT License
|
|
||||||
|
|
||||||
Copyright (c) 2025 UCAN Working Group - All rights reserved
|
|
||||||
|
|
||||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
||||||
of this software and associated documentation files (the "Software"), to deal
|
|
||||||
in the Software without restriction, including without limitation the rights
|
|
||||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
||||||
copies of the Software, and to permit persons to whom the Software is
|
|
||||||
furnished to do so, subject to the following conditions:
|
|
||||||
|
|
||||||
The above copyright notice and this permission notice shall be included in all
|
|
||||||
copies or substantial portions of the Software.
|
|
||||||
|
|
||||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
||||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
||||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
||||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
||||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
||||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
||||||
SOFTWARE.
|
|
||||||
@@ -1,6 +1,35 @@
|
|||||||
|
The contents of this repository are Copyright (c) corresponding authors and
|
||||||
|
contributors, licensed under the `Permissive License Stack` meaning either of:
|
||||||
|
|
||||||
|
- Apache-2.0 Software License: https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
([...4tr2kfsq](https://dweb.link/ipfs/bafkreiankqxazcae4onkp436wag2lj3ccso4nawxqkkfckd6cg4tr2kfsq))
|
||||||
|
|
||||||
|
- MIT Software License: https://opensource.org/licenses/MIT
|
||||||
|
([...vljevcba](https://dweb.link/ipfs/bafkreiepofszg4gfe2gzuhojmksgemsub2h4uy2gewdnr35kswvljevcba))
|
||||||
|
|
||||||
|
You may not use the contents of this repository except in compliance
|
||||||
|
with one of the listed Licenses. For an extended clarification of the
|
||||||
|
intent behind the choice of Licensing please refer to
|
||||||
|
https://protocol.ai/blog/announcing-the-permissive-license-stack/
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the terms listed in this notice is distributed on
|
||||||
|
an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
|
||||||
|
either express or implied. See each License for the specific language
|
||||||
|
governing permissions and limitations under that License.
|
||||||
|
|
||||||
|
<!--- SPDX-License-Identifier: Apache-2.0 OR MIT -->
|
||||||
|
|
||||||
|
`SPDX-License-Identifier: Apache-2.0 OR MIT`
|
||||||
|
|
||||||
|
Verbatim copies of both licenses are included below:
|
||||||
|
|
||||||
|
<details><summary>Apache-2.0 Software License</summary>
|
||||||
|
|
||||||
|
```
|
||||||
Apache License
|
Apache License
|
||||||
Version 2.0, January 2004
|
Version 2.0, January 2004
|
||||||
http://www.apache.org/licenses/
|
https://www.apache.org/licenses/
|
||||||
|
|
||||||
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||||
|
|
||||||
@@ -174,28 +203,30 @@
|
|||||||
of your accepting any such warranty or additional liability.
|
of your accepting any such warranty or additional liability.
|
||||||
|
|
||||||
END OF TERMS AND CONDITIONS
|
END OF TERMS AND CONDITIONS
|
||||||
|
```
|
||||||
|
|
||||||
APPENDIX: How to apply the Apache License to your work.
|
</details>
|
||||||
|
|
||||||
To apply the Apache License to your work, attach the following
|
<details><summary>MIT Software License</summary>
|
||||||
boilerplate notice, with the fields enclosed by brackets "[]"
|
|
||||||
replaced with your own identifying information. (Don't include
|
|
||||||
the brackets!) The text should be enclosed in the appropriate
|
|
||||||
comment syntax for the file format. We also recommend that a
|
|
||||||
file or class name and description of purpose be included on the
|
|
||||||
same "printed page" as the copyright notice for easier
|
|
||||||
identification within third-party archives.
|
|
||||||
|
|
||||||
Copyright 2025 UCAN Working Group - All right reserved
|
```
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
of this software and associated documentation files (the "Software"), to deal
|
||||||
|
in the Software without restriction, including without limitation the rights
|
||||||
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
copies of the Software, and to permit persons to whom the Software is
|
||||||
|
furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
The above copyright notice and this permission notice shall be included in
|
||||||
you may not use this file except in compliance with the License.
|
all copies or substantial portions of the Software.
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
THE SOFTWARE.
|
||||||
|
```
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
</details>
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
55
README.md
55
README.md
@@ -1,9 +1,8 @@
|
|||||||
# go-varsig
|
# go-varsig
|
||||||
|
|
||||||
`go-varsig` implements the upcoming v1.0.0 release of the [`varsig` specification](https://github.com/ChainAgnostic/varsig/pull/18)
|
`go-varsig` is a go implementation of the [`varsig` specification](https://github.com/ChainAgnostic/varsig).
|
||||||
with limited (and soon to be deprecated) support for the `varsig` < v1.0
|
|
||||||
specification. This is predominatly included to support the UCAN v1.0
|
Built with ❤️ by [Consensys](https://consensys.io/).
|
||||||
use-case.
|
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
@@ -13,6 +12,43 @@ Include the `go-varsig` library by running the following command:
|
|||||||
go get github.com/ucan-wg/go-varsig@latest
|
go get github.com/ucan-wg/go-varsig@latest
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Quickstart
|
||||||
|
|
||||||
|
```go
|
||||||
|
func ExampleDecode() {
|
||||||
|
example, err := base64.RawStdEncoding.DecodeString("NAHtAe0BE3E")
|
||||||
|
handleErr(err)
|
||||||
|
|
||||||
|
vs, err := varsig.Decode(example)
|
||||||
|
handleErr(err)
|
||||||
|
|
||||||
|
fmt.Printf("%T\n", vs)
|
||||||
|
fmt.Printf("Algorithm: %d\n", vs.Algorithm())
|
||||||
|
fmt.Printf("Hash: %d\n", vs.Hash())
|
||||||
|
fmt.Printf("PayloadEncoding: %d\n", vs.PayloadEncoding())
|
||||||
|
|
||||||
|
// Output:
|
||||||
|
// varsig.EdDSAVarsig
|
||||||
|
// Algorithm: 237
|
||||||
|
// Hash: 19
|
||||||
|
// PayloadEncoding: 3
|
||||||
|
}
|
||||||
|
|
||||||
|
func ExampleEncode() {
|
||||||
|
edDSAVarsig := varsig.NewEdDSAVarsig(
|
||||||
|
varsig.CurveEd25519,
|
||||||
|
varsig.HashSha2_512,
|
||||||
|
varsig.PayloadEncodingDAGCBOR,
|
||||||
|
)
|
||||||
|
|
||||||
|
b64 := base64.RawStdEncoding.EncodeToString(edDSAVarsig.Encode())
|
||||||
|
fmt.Print(b64)
|
||||||
|
|
||||||
|
// Output:
|
||||||
|
// NAHtAe0BE3E
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
## Documentation
|
## Documentation
|
||||||
|
|
||||||
Documentation for this library is provided as Go docs at
|
Documentation for this library is provided as Go docs at
|
||||||
@@ -29,7 +65,7 @@ asdf install
|
|||||||
|
|
||||||
### Checks
|
### Checks
|
||||||
|
|
||||||
This repository contains an set of pre-commit hooks that are run prior to
|
This repository contains a set of pre-commit hooks that are run prior to
|
||||||
each `git commit`. You can also run these checks manually using the
|
each `git commit`. You can also run these checks manually using the
|
||||||
following command:
|
following command:
|
||||||
|
|
||||||
@@ -49,8 +85,15 @@ simulate the `docker` daemon:
|
|||||||
export DOCKER_HOST=unix:///var/run/podman/podman.sock
|
export DOCKER_HOST=unix:///var/run/podman/podman.sock
|
||||||
```
|
```
|
||||||
|
|
||||||
Since there's only one workflow, the simplest command to test it is:
|
The simplest command to test it is:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
act
|
act
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## License
|
||||||
|
|
||||||
|
This project is dual-licensed under Apache 2.0 and MIT terms:
|
||||||
|
|
||||||
|
- Apache License, Version 2.0, ([LICENSE-APACHE](https://github.com/ucan-wg/go-varsig/blob/master/LICENSE-APACHE-2.0) or http://www.apache.org/licenses/LICENSE-2.0)
|
||||||
|
- MIT license ([LICENSE-MIT](https://github.com/ucan-wg/go-varsig/blob/master/LICENSE-MIT) or http://opensource.org/licenses/MIT)
|
||||||
|
|||||||
90
common.go
90
common.go
@@ -1,41 +1,73 @@
|
|||||||
package varsig
|
package varsig
|
||||||
|
|
||||||
// Ed25519 produces a varsig that describes the associated algorithm defined
|
import "fmt"
|
||||||
// by the [IANA JOSE specification].
|
|
||||||
//
|
|
||||||
// [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
|
// [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
|
||||||
func Ed25519(payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error) {
|
|
||||||
return NewEdDSAVarsig(CurveEd25519, HashAlgorithmSHA512, payloadEncoding, opts...)
|
// Ed25519 produces a varsig for EdDSA using the Ed25519 curve.
|
||||||
|
// This algorithm is defined in [IANA JOSE specification].
|
||||||
|
func Ed25519(payloadEncoding PayloadEncoding) EdDSAVarsig {
|
||||||
|
return NewEdDSAVarsig(CurveEd25519, HashSha2_512, payloadEncoding)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Ed448 produces a varsig that describes the associated algorithm defined
|
// Ed448 produces a varsig for EdDSA using the Ed448 curve.
|
||||||
// by the [IANA JOSE specification].
|
// This algorithm is defined in [IANA JOSE specification].
|
||||||
//
|
func Ed448(payloadEncoding PayloadEncoding) EdDSAVarsig {
|
||||||
// [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
|
return NewEdDSAVarsig(CurveEd448, HashShake_256, payloadEncoding)
|
||||||
func Ed448(payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error) {
|
|
||||||
return NewEdDSAVarsig(CurveEd448, HashAlgorithmShake256, payloadEncoding, opts...)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// RS256 produces a varsig that describes the associated algorithm defined
|
// RS256 produces a varsig for RSASSA-PKCS1-v1_5 using SHA-256.
|
||||||
// by the [IANA JOSE specification].
|
// This algorithm is defined in [IANA JOSE specification].
|
||||||
//
|
func RS256(keyLength uint64, payloadEncoding PayloadEncoding) RSAVarsig {
|
||||||
// [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
|
return NewRSAVarsig(HashSha2_256, keyLength, payloadEncoding)
|
||||||
func RS256(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) {
|
|
||||||
return NewRSAVarsig(HashAlgorithmSHA256, keyLength, payloadEncoding, opts...)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// RS384 produces a varsig that describes the associated algorithm defined
|
// RS384 produces a varsig for RSASSA-PKCS1-v1_5 using SHA-384.
|
||||||
// by the [IANA JOSE specification].
|
// This algorithm is defined in [IANA JOSE specification].
|
||||||
//
|
func RS384(keyLength uint64, payloadEncoding PayloadEncoding) RSAVarsig {
|
||||||
// [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
|
return NewRSAVarsig(HashSha2_384, keyLength, payloadEncoding)
|
||||||
func RS384(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) {
|
|
||||||
return NewRSAVarsig(HashAlgorithmSHA384, keyLength, payloadEncoding, opts...)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// RS512 produces a varsig that describes the associated algorithm defined
|
// RS512 produces a varsig for RSASSA-PKCS1-v1_5 using SHA-512.
|
||||||
// by the [IANA JOSE specification].
|
// This algorithm is defined in [IANA JOSE specification].
|
||||||
//
|
func RS512(keyLength uint64, payloadEncoding PayloadEncoding) RSAVarsig {
|
||||||
// [IANA JOSE specification]: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
|
return NewRSAVarsig(HashSha2_512, keyLength, payloadEncoding)
|
||||||
func RS512(keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) {
|
}
|
||||||
return NewRSAVarsig(HashAlgorithmSHA512, keyLength, payloadEncoding, opts...)
|
|
||||||
|
// ES256 produces a varsig for ECDSA using P-256 and SHA-256.
|
||||||
|
// This algorithm is defined in [IANA JOSE specification].
|
||||||
|
func ES256(payloadEncoding PayloadEncoding) ECDSAVarsig {
|
||||||
|
return NewECDSAVarsig(CurveP256, HashSha2_256, payloadEncoding)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ES256K produces a varsig for ECDSA using secp256k1 curve and SHA-256.
|
||||||
|
// This algorithm is defined in [IANA JOSE specification].
|
||||||
|
func ES256K(payloadEncoding PayloadEncoding) ECDSAVarsig {
|
||||||
|
return NewECDSAVarsig(CurveSecp256k1, HashSha2_256, payloadEncoding)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ES384 produces a varsig for ECDSA using P-384 and SHA-384.
|
||||||
|
// This algorithm is defined in [IANA JOSE specification].
|
||||||
|
func ES384(payloadEncoding PayloadEncoding) ECDSAVarsig {
|
||||||
|
return NewECDSAVarsig(CurveP384, HashSha2_384, payloadEncoding)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ES512 produces a varsig for ECDSA using P-521 and SHA-512.
|
||||||
|
// This algorithm is defined in [IANA JOSE specification].
|
||||||
|
func ES512(payloadEncoding PayloadEncoding) ECDSAVarsig {
|
||||||
|
return NewECDSAVarsig(CurveP521, HashSha2_512, payloadEncoding)
|
||||||
|
}
|
||||||
|
|
||||||
|
// EIP191 produces a varsig for ECDSA using the Secp256k1 curve, Keccak256 and encoded
|
||||||
|
// with the "personal_sign" format defined by [EIP191].
|
||||||
|
// payloadEncoding must be either PayloadEncodingEIP191Raw or PayloadEncodingEIP191Cbor.
|
||||||
|
// [EIP191]: https://eips.ethereum.org/EIPS/eip-191
|
||||||
|
func EIP191(payloadEncoding PayloadEncoding) (ECDSAVarsig, error) {
|
||||||
|
switch payloadEncoding {
|
||||||
|
case PayloadEncodingEIP191Raw, PayloadEncodingEIP191Cbor:
|
||||||
|
default:
|
||||||
|
return ECDSAVarsig{}, fmt.Errorf("%w for EIP191: %v", ErrUnsupportedPayloadEncoding, payloadEncoding)
|
||||||
|
}
|
||||||
|
|
||||||
|
return NewECDSAVarsig(CurveSecp256k1, HashKeccak_256, payloadEncoding), nil
|
||||||
}
|
}
|
||||||
|
|||||||
183
common_test.go
183
common_test.go
@@ -1,63 +1,146 @@
|
|||||||
package varsig_test
|
package varsig_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"encoding/hex"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
"github.com/ucan-wg/go-varsig"
|
"github.com/ucan-wg/go-varsig"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestEd25519(t *testing.T) {
|
func TestRoundTrip(t *testing.T) {
|
||||||
t.Parallel()
|
for _, tc := range []struct {
|
||||||
|
name string
|
||||||
|
varsig varsig.Varsig
|
||||||
|
dataHex string
|
||||||
|
dataBytes []byte
|
||||||
|
}{
|
||||||
|
// Arbitrary use of presets
|
||||||
|
{
|
||||||
|
name: "Ed25519",
|
||||||
|
varsig: varsig.Ed25519(varsig.PayloadEncodingDAGCBOR),
|
||||||
|
dataHex: "3401ed01ed011371",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Ed448",
|
||||||
|
varsig: varsig.Ed448(varsig.PayloadEncodingDAGCBOR),
|
||||||
|
dataHex: "3401ed0183241971",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "RS256",
|
||||||
|
varsig: varsig.RS256(0x100, varsig.PayloadEncodingDAGCBOR),
|
||||||
|
dataHex: "3401852412800271",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "RS384",
|
||||||
|
varsig: varsig.RS384(0x100, varsig.PayloadEncodingDAGCBOR),
|
||||||
|
dataHex: "3401852420800271",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "RS512",
|
||||||
|
varsig: varsig.RS512(0x100, varsig.PayloadEncodingDAGCBOR),
|
||||||
|
dataHex: "3401852413800271",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "ES256",
|
||||||
|
varsig: varsig.ES256(varsig.PayloadEncodingDAGCBOR),
|
||||||
|
dataHex: "3401ec0180241271",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "ES256K",
|
||||||
|
varsig: varsig.ES256K(varsig.PayloadEncodingDAGCBOR),
|
||||||
|
dataHex: "3401ec01e7011271",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "ES384",
|
||||||
|
varsig: varsig.ES384(varsig.PayloadEncodingDAGCBOR),
|
||||||
|
dataHex: "3401ec0181242071",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "ES512",
|
||||||
|
varsig: varsig.ES512(varsig.PayloadEncodingDAGCBOR),
|
||||||
|
dataHex: "3401ec0182241371",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "EIP191",
|
||||||
|
varsig: must(varsig.EIP191(varsig.PayloadEncodingEIP191Raw)),
|
||||||
|
dataHex: "3401ec01e7011b91c3035f",
|
||||||
|
},
|
||||||
|
|
||||||
in := mustVarsig[varsig.EdDSAVarsig](t)(varsig.Ed25519(varsig.PayloadEncodingDAGCBOR))
|
// from https://github.com/hugomrdias/iso-repo/blob/main/packages/iso-ucan/test/varsig.test.js
|
||||||
out := roundTrip(t, in, "3401ed01ed011371")
|
{
|
||||||
assertEdDSAEqual(t, in, out)
|
name: "RS256+RAW",
|
||||||
|
varsig: varsig.RS256(256, varsig.PayloadEncodingVerbatim),
|
||||||
|
dataBytes: []byte{52, 1, 133, 36, 18, 128, 2, 95},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "ES256+RAW",
|
||||||
|
varsig: varsig.ES256(varsig.PayloadEncodingVerbatim),
|
||||||
|
dataBytes: []byte{52, 1, 236, 1, 128, 36, 18, 95},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "ES512+RAW",
|
||||||
|
varsig: varsig.ES512(varsig.PayloadEncodingVerbatim),
|
||||||
|
dataBytes: []byte{52, 1, 236, 1, 130, 36, 19, 95},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "ES256K+RAW",
|
||||||
|
varsig: varsig.ES256K(varsig.PayloadEncodingVerbatim),
|
||||||
|
dataBytes: []byte{52, 1, 236, 1, 231, 1, 18, 95},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "EIP191+RAW",
|
||||||
|
varsig: must(varsig.EIP191(varsig.PayloadEncodingEIP191Raw)),
|
||||||
|
dataBytes: []byte{52, 1, 236, 1, 231, 1, 27, 145, 195, 3, 95},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "EIP191+DAG-CBOR",
|
||||||
|
varsig: must(varsig.EIP191(varsig.PayloadEncodingEIP191Cbor)),
|
||||||
|
dataBytes: []byte{52, 1, 236, 1, 231, 1, 27, 145, 195, 3, 113},
|
||||||
|
},
|
||||||
|
} {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
// round-trip encode and back
|
||||||
|
data := tc.varsig.Encode()
|
||||||
|
|
||||||
|
if tc.dataBytes != nil {
|
||||||
|
require.Equal(t, tc.dataBytes, data)
|
||||||
|
}
|
||||||
|
if tc.dataHex != "" {
|
||||||
|
require.Equal(t, tc.dataHex, hex.EncodeToString(data))
|
||||||
|
}
|
||||||
|
|
||||||
|
rt, err := varsig.Decode(data)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.Equal(t, tc.varsig.Version(), rt.Version())
|
||||||
|
require.Equal(t, tc.varsig.Algorithm(), rt.Algorithm())
|
||||||
|
require.Equal(t, tc.varsig.PayloadEncoding(), rt.PayloadEncoding())
|
||||||
|
|
||||||
|
switch vs := tc.varsig.(type) {
|
||||||
|
case varsig.EdDSAVarsig:
|
||||||
|
rt := rt.(varsig.EdDSAVarsig)
|
||||||
|
require.Equal(t, vs.Curve(), rt.Curve())
|
||||||
|
require.Equal(t, vs.Hash(), rt.Hash())
|
||||||
|
case varsig.ECDSAVarsig:
|
||||||
|
rt := rt.(varsig.ECDSAVarsig)
|
||||||
|
require.Equal(t, vs.Curve(), rt.Curve())
|
||||||
|
require.Equal(t, vs.Hash(), rt.Hash())
|
||||||
|
case varsig.RSAVarsig:
|
||||||
|
rt := rt.(varsig.RSAVarsig)
|
||||||
|
require.Equal(t, vs.Hash(), rt.Hash())
|
||||||
|
require.Equal(t, vs.KeyLength(), rt.KeyLength())
|
||||||
|
default:
|
||||||
|
t.Fatalf("unexpected varsig type: %T", vs)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestEd448(t *testing.T) {
|
func must[T any](v T, err error) T {
|
||||||
t.Parallel()
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
in := mustVarsig[varsig.EdDSAVarsig](t)(varsig.Ed448(varsig.PayloadEncodingDAGCBOR))
|
}
|
||||||
out := roundTrip(t, in, "3401ed0183241971")
|
return v
|
||||||
assertEdDSAEqual(t, in, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestRS256(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
in := mustVarsig[varsig.RSAVarsig](t)(varsig.RS256(0x100, varsig.PayloadEncodingDAGCBOR))
|
|
||||||
out := roundTrip(t, in, "3401852412800271")
|
|
||||||
assertRSAEqual(t, in, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestRS384(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
in := mustVarsig[varsig.RSAVarsig](t)(varsig.RS384(0x100, varsig.PayloadEncodingDAGCBOR))
|
|
||||||
out := roundTrip(t, in, "3401852420800271")
|
|
||||||
assertRSAEqual(t, in, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestRS512(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
in := mustVarsig[varsig.RSAVarsig](t)(varsig.RS512(0x100, varsig.PayloadEncodingDAGCBOR))
|
|
||||||
out := roundTrip(t, in, "3401852413800271")
|
|
||||||
assertRSAEqual(t, in, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
func assertEdDSAEqual(t *testing.T, in, out *varsig.EdDSAVarsig) {
|
|
||||||
t.Helper()
|
|
||||||
|
|
||||||
assert.Equal(t, in.Curve(), out.Curve())
|
|
||||||
assert.Equal(t, in.HashAlgorithm(), out.HashAlgorithm())
|
|
||||||
}
|
|
||||||
|
|
||||||
func assertRSAEqual(t *testing.T, in, out *varsig.RSAVarsig) {
|
|
||||||
t.Helper()
|
|
||||||
|
|
||||||
assert.Equal(t, in.HashAlgorithm(), out.HashAlgorithm())
|
|
||||||
assert.Equal(t, in.KeyLength(), out.KeyLength())
|
|
||||||
}
|
}
|
||||||
|
|||||||
208
constant.go
208
constant.go
@@ -1,126 +1,186 @@
|
|||||||
package varsig
|
package varsig
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
"github.com/multiformats/go-multicodec"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// Prefix is the multicodec.Code for the varsig's varuint prefix byte.
|
// Prefix is the value for the varsig's varuint prefix byte.
|
||||||
const Prefix = uint64(multicodec.Varsig)
|
const Prefix = uint64(0x34)
|
||||||
|
|
||||||
// HashAlgorithm is the multicodec.Code that specifies the hash algorithm
|
// Hash is the value that specifies the hash algorithm
|
||||||
// that's used to reduce the signed content
|
// that's used to reduce the signed content
|
||||||
type HashAlgorithm uint64
|
type Hash uint64
|
||||||
|
|
||||||
// Constant multicodec.Code values that allow Varsig implementations to
|
// Constant values that allow Varsig implementations to specify how
|
||||||
// specify how the payload content is hashed before the signature is
|
// the payload content is hashed before the signature is generated.
|
||||||
// generated.
|
|
||||||
const (
|
const (
|
||||||
HashAlgorithmUnspecified HashAlgorithm = 0x00
|
HashUnspecified Hash = 0x00
|
||||||
HashAlgorithmSHA256 = HashAlgorithm(multicodec.Sha2_256)
|
|
||||||
HashAlgorithmSHA384 = HashAlgorithm(multicodec.Sha2_384)
|
HashSha2_224 = Hash(0x1013)
|
||||||
HashAlgorithmSHA512 = HashAlgorithm(multicodec.Sha2_512)
|
HashSha2_256 = Hash(0x12)
|
||||||
HashAlgorithmShake256 = HashAlgorithm(multicodec.Shake256)
|
HashSha2_384 = Hash(0x20)
|
||||||
|
HashSha2_512 = Hash(0x13)
|
||||||
|
|
||||||
|
HashSha3_224 = Hash(0x17)
|
||||||
|
HashSha3_256 = Hash(0x16)
|
||||||
|
HashSha3_384 = Hash(0x15)
|
||||||
|
HashSha3_512 = Hash(0x14)
|
||||||
|
|
||||||
|
HashSha512_224 = Hash(0x1014)
|
||||||
|
HashSha512_256 = Hash(0x1015)
|
||||||
|
|
||||||
|
HashBlake2s_256 = Hash(0xb260)
|
||||||
|
HashBlake2b_256 = Hash(0xb220)
|
||||||
|
HashBlake2b_384 = Hash(0xb230)
|
||||||
|
HashBlake2b_512 = Hash(0xb240)
|
||||||
|
|
||||||
|
HashShake_256 = Hash(0x19)
|
||||||
|
|
||||||
|
HashKeccak_256 = Hash(0x1b)
|
||||||
|
HashKeccak_512 = Hash(0x1d)
|
||||||
|
|
||||||
|
// You should likely not use those:
|
||||||
|
HashRipemd_160 = Hash(0x1053)
|
||||||
|
HashMd4 = Hash(0xd4)
|
||||||
|
HashMd5 = Hash(0xd5)
|
||||||
|
HashSha1 = Hash(0x11)
|
||||||
)
|
)
|
||||||
|
|
||||||
// DecodeHashAlgorithm reads and validates the expected hash algorithm
|
// DecodeHashAlgorithm reads and validates the expected hash algorithm
|
||||||
// (for varsig types include a variable hash algorithm.)
|
// (for varsig types include a variable hash algorithm.)
|
||||||
func DecodeHashAlgorithm(r *bytes.Reader) (HashAlgorithm, error) {
|
func DecodeHashAlgorithm(r BytesReader) (Hash, error) {
|
||||||
u, err := binary.ReadUvarint(r)
|
u, err := binary.ReadUvarint(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return HashAlgorithmUnspecified, fmt.Errorf("%w: %w", ErrUnknownHashAlgorithm, err)
|
return HashUnspecified, fmt.Errorf("%w: %w", ErrUnknownHash, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
h := HashAlgorithm(u)
|
h := Hash(u)
|
||||||
|
|
||||||
switch h {
|
switch h {
|
||||||
case HashAlgorithmSHA256,
|
case HashSha2_224,
|
||||||
HashAlgorithmSHA384,
|
HashSha2_256,
|
||||||
HashAlgorithmSHA512,
|
HashSha2_384,
|
||||||
HashAlgorithmShake256:
|
HashSha2_512,
|
||||||
|
HashSha3_224,
|
||||||
|
HashSha3_256,
|
||||||
|
HashSha3_384,
|
||||||
|
HashSha3_512,
|
||||||
|
HashSha512_224,
|
||||||
|
HashSha512_256,
|
||||||
|
HashBlake2s_256,
|
||||||
|
HashBlake2b_256,
|
||||||
|
HashBlake2b_384,
|
||||||
|
HashBlake2b_512,
|
||||||
|
HashShake_256,
|
||||||
|
HashKeccak_256,
|
||||||
|
HashKeccak_512,
|
||||||
|
HashRipemd_160,
|
||||||
|
HashMd4,
|
||||||
|
HashMd5,
|
||||||
|
HashSha1:
|
||||||
return h, nil
|
return h, nil
|
||||||
default:
|
default:
|
||||||
return HashAlgorithmUnspecified, fmt.Errorf("%w: %x", ErrUnknownHashAlgorithm, h)
|
return HashUnspecified, fmt.Errorf("%w: %x", ErrUnknownHash, h)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// PayloadEncoding specifies the encoding of the data being (hashed and)
|
// PayloadEncoding specifies the encoding of the data being (hashed and)
|
||||||
// signed. A canonical representation of the data is required to produce
|
// signed. A canonical representation of the data is required to produce
|
||||||
// consistent hashes and signatures.
|
// consistent hashes and signatures.
|
||||||
type PayloadEncoding uint64
|
type PayloadEncoding int
|
||||||
|
|
||||||
// Constant multicodec.Code values that allow Varsig implementations to
|
// Constant values that allow Varsig implementations to specify how the
|
||||||
// specify how the payload content is encoded before being hashed. In
|
// payload content is encoded before being hashed.
|
||||||
// varsig >= v1, only canonical encoding is allowed.
|
|
||||||
const (
|
const (
|
||||||
PayloadEncodingUnspecified PayloadEncoding = 0x00
|
PayloadEncodingUnspecified = PayloadEncoding(iota)
|
||||||
PayloadEncodingVerbatim PayloadEncoding = 0x5f
|
PayloadEncodingVerbatim
|
||||||
PayloadEncodingDAGPB = PayloadEncoding(multicodec.DagPb)
|
PayloadEncodingDAGPB
|
||||||
PayloadEncodingDAGCBOR = PayloadEncoding(multicodec.DagCbor)
|
PayloadEncodingDAGCBOR
|
||||||
PayloadEncodingDAGJSON = PayloadEncoding(multicodec.DagJson)
|
PayloadEncodingDAGJSON
|
||||||
PayloadEncodingEIP191 = PayloadEncoding(multicodec.Eip191)
|
PayloadEncodingEIP191Raw
|
||||||
PayloadEncodingJWT PayloadEncoding = 0x6a77
|
PayloadEncodingEIP191Cbor
|
||||||
|
PayloadEncodingJWT
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
encodingSegmentVerbatim = uint64(0x5f)
|
||||||
|
encodingSegmentDAGPB = uint64(0x70)
|
||||||
|
encodingSegmentDAGCBOR = uint64(0x71)
|
||||||
|
encodingSegmentDAGJSON = uint64(0x0129)
|
||||||
|
encodingSegmentEIP191 = uint64(0xe191)
|
||||||
|
encodingSegmentJWT = uint64(0x6a77)
|
||||||
)
|
)
|
||||||
|
|
||||||
// DecodePayloadEncoding reads and validates the expected canonical payload
|
// DecodePayloadEncoding reads and validates the expected canonical payload
|
||||||
// encoding of the data to be signed.
|
// encoding of the data to be signed.
|
||||||
func DecodePayloadEncoding(r *bytes.Reader, vers Version) (PayloadEncoding, error) {
|
func DecodePayloadEncoding(r BytesReader) (PayloadEncoding, error) {
|
||||||
u, err := binary.ReadUvarint(r)
|
seg1, err := binary.ReadUvarint(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return PayloadEncodingUnspecified, fmt.Errorf("%w: %w", ErrUnsupportedPayloadEncoding, err)
|
return PayloadEncodingUnspecified, fmt.Errorf("%w: %w", ErrUnsupportedPayloadEncoding, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
payEnc := PayloadEncoding(u)
|
switch seg1 {
|
||||||
|
case encodingSegmentVerbatim:
|
||||||
switch vers {
|
return PayloadEncodingVerbatim, nil
|
||||||
case Version0:
|
case encodingSegmentDAGCBOR:
|
||||||
return decodeEncodingInfoV0(payEnc)
|
return PayloadEncodingDAGCBOR, nil
|
||||||
case Version1:
|
case encodingSegmentDAGJSON:
|
||||||
return decodeEncodingInfoV1(payEnc)
|
return PayloadEncodingDAGJSON, nil
|
||||||
|
case encodingSegmentEIP191:
|
||||||
|
seg2, err := binary.ReadUvarint(r)
|
||||||
|
if err != nil {
|
||||||
|
return PayloadEncodingUnspecified, fmt.Errorf("%w: incomplete EIP191 encoding: %w", ErrUnsupportedPayloadEncoding, err)
|
||||||
|
}
|
||||||
|
switch seg2 {
|
||||||
|
case encodingSegmentVerbatim:
|
||||||
|
return PayloadEncodingEIP191Raw, nil
|
||||||
|
case encodingSegmentDAGCBOR:
|
||||||
|
return PayloadEncodingEIP191Cbor, nil
|
||||||
default:
|
default:
|
||||||
return 0, ErrUnsupportedVersion
|
return PayloadEncodingUnspecified, fmt.Errorf("%w: encoding=%x+%x", ErrUnsupportedPayloadEncoding, seg1, seg2)
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return PayloadEncodingUnspecified, fmt.Errorf("%w: encoding=%x", ErrUnsupportedPayloadEncoding, seg1)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// https://github.com/ChainAgnostic/varsig#4-payload-encoding
|
// EncodePayloadEncoding returns the PayloadEncoding as serialized bytes.
|
||||||
func decodeEncodingInfoV0(payEnc PayloadEncoding) (PayloadEncoding, error) {
|
// If enc is not a valid PayloadEncoding, this function will panic.
|
||||||
switch payEnc {
|
func EncodePayloadEncoding(enc PayloadEncoding) []byte {
|
||||||
case PayloadEncodingVerbatim,
|
res := make([]byte, 0, 8)
|
||||||
PayloadEncodingDAGPB,
|
switch enc {
|
||||||
PayloadEncodingDAGCBOR,
|
case PayloadEncodingVerbatim:
|
||||||
PayloadEncodingDAGJSON,
|
res = binary.AppendUvarint(res, encodingSegmentVerbatim)
|
||||||
PayloadEncodingJWT,
|
case PayloadEncodingDAGPB:
|
||||||
PayloadEncodingEIP191:
|
res = binary.AppendUvarint(res, encodingSegmentDAGPB)
|
||||||
return payEnc, nil
|
case PayloadEncodingDAGCBOR:
|
||||||
|
res = binary.AppendUvarint(res, encodingSegmentDAGCBOR)
|
||||||
|
case PayloadEncodingDAGJSON:
|
||||||
|
res = binary.AppendUvarint(res, encodingSegmentDAGJSON)
|
||||||
|
case PayloadEncodingEIP191Raw:
|
||||||
|
res = binary.AppendUvarint(res, encodingSegmentEIP191)
|
||||||
|
res = binary.AppendUvarint(res, encodingSegmentVerbatim)
|
||||||
|
case PayloadEncodingEIP191Cbor:
|
||||||
|
res = binary.AppendUvarint(res, encodingSegmentEIP191)
|
||||||
|
res = binary.AppendUvarint(res, encodingSegmentDAGCBOR)
|
||||||
|
case PayloadEncodingJWT:
|
||||||
|
res = binary.AppendUvarint(res, encodingSegmentJWT)
|
||||||
default:
|
default:
|
||||||
return PayloadEncodingUnspecified, fmt.Errorf("%w: version=%d, encoding=%x", ErrUnsupportedPayloadEncoding, Version0, payEnc)
|
panic(fmt.Sprintf("invalid encoding: %v", enc))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return res
|
||||||
}
|
}
|
||||||
|
|
||||||
// https://github.com/expede/varsig/blob/main/README.md#payload-encoding
|
// Algorithm is (usually) the value representing the public key type of
|
||||||
func decodeEncodingInfoV1(payEnc PayloadEncoding) (PayloadEncoding, error) {
|
// the algorithm used to create the signature.
|
||||||
switch payEnc {
|
|
||||||
case PayloadEncodingVerbatim,
|
|
||||||
PayloadEncodingDAGCBOR,
|
|
||||||
PayloadEncodingDAGJSON,
|
|
||||||
PayloadEncodingEIP191:
|
|
||||||
return payEnc, nil
|
|
||||||
default:
|
|
||||||
return PayloadEncodingUnspecified, fmt.Errorf("%w: version=%d, encoding=%x", ErrUnsupportedPayloadEncoding, Version1, payEnc)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Discriminator is (usually) the multicodec.Code representing the public
|
|
||||||
// key type of the algorithm used to create the signature.
|
|
||||||
//
|
//
|
||||||
// There is not set list of constants here, nor is there a decode function
|
// There is no set list of constants here, nor is there a decode function
|
||||||
// as the author of an implementation should include the constant with the
|
// as the author of an implementation should include the constant with the
|
||||||
// implementation, and the decoding is handled by the Handler, which uses
|
// implementation, and the decoding is handled by the Handler, which uses
|
||||||
// the Discriminator to choose the correct implementation. Also note that
|
// the Algorithm to choose the correct implementation. Also note that
|
||||||
// some of the Discriminator values for a specific implementation have
|
// some of the Algorithm values for a specific implementation have
|
||||||
// changed between varsig v0 and v1, so it's possible to have more than one
|
// changed between varsig v0 and v1, so it's possible to have more than one
|
||||||
// constant defined per implementation.
|
// constant defined per implementation.
|
||||||
type Discriminator uint64
|
type Algorithm uint64
|
||||||
|
|||||||
@@ -18,24 +18,24 @@ func TestDecodeHashAlgorithm(t *testing.T) {
|
|||||||
|
|
||||||
hashAlg, err := varsig.DecodeHashAlgorithm(bytes.NewReader([]byte{0x12}))
|
hashAlg, err := varsig.DecodeHashAlgorithm(bytes.NewReader([]byte{0x12}))
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Equal(t, varsig.HashAlgorithmSHA256, hashAlg)
|
require.Equal(t, varsig.HashSha2_256, hashAlg)
|
||||||
})
|
})
|
||||||
|
|
||||||
t.Run("fails - truncated varsig (no bytes)", func(t *testing.T) {
|
t.Run("fails - truncated varsig (no bytes)", func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
hashAlg, err := varsig.DecodeHashAlgorithm(bytes.NewReader([]byte{}))
|
hashAlg, err := varsig.DecodeHashAlgorithm(bytes.NewReader([]byte{}))
|
||||||
require.ErrorIs(t, err, varsig.ErrUnknownHashAlgorithm)
|
require.ErrorIs(t, err, varsig.ErrUnknownHash)
|
||||||
require.ErrorIs(t, err, io.EOF)
|
require.ErrorIs(t, err, io.EOF)
|
||||||
require.Equal(t, varsig.HashAlgorithmUnspecified, hashAlg)
|
require.Equal(t, varsig.HashUnspecified, hashAlg)
|
||||||
})
|
})
|
||||||
|
|
||||||
t.Run("fails - unknown hash algorithm", func(t *testing.T) {
|
t.Run("fails - unknown hash algorithm", func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
hashAlg, err := varsig.DecodeHashAlgorithm(bytes.NewReader([]byte{0x42}))
|
hashAlg, err := varsig.DecodeHashAlgorithm(bytes.NewReader([]byte{0x42}))
|
||||||
require.ErrorIs(t, err, varsig.ErrUnknownHashAlgorithm)
|
require.ErrorIs(t, err, varsig.ErrUnknownHash)
|
||||||
require.Equal(t, varsig.HashAlgorithmUnspecified, hashAlg)
|
require.Equal(t, varsig.HashUnspecified, hashAlg)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -53,18 +53,10 @@ func TestDecodePayloadEncoding(t *testing.T) {
|
|||||||
t.Run("passes", func(t *testing.T) {
|
t.Run("passes", func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
t.Run("v0", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
payEnc, err := varsig.DecodePayloadEncoding(bytes.NewReader([]byte{0x5f}), varsig.Version1)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Equal(t, varsig.PayloadEncodingVerbatim, payEnc)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("v1", func(t *testing.T) {
|
t.Run("v1", func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
payEnc, err := varsig.DecodePayloadEncoding(bytes.NewReader([]byte{0x5f}), varsig.Version1)
|
payEnc, err := varsig.DecodePayloadEncoding(bytes.NewReader([]byte{0x5f}))
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Equal(t, varsig.PayloadEncodingVerbatim, payEnc)
|
require.Equal(t, varsig.PayloadEncodingVerbatim, payEnc)
|
||||||
})
|
})
|
||||||
@@ -76,27 +68,13 @@ func TestDecodePayloadEncoding(t *testing.T) {
|
|||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
data []byte
|
data []byte
|
||||||
vers varsig.Version
|
|
||||||
err error
|
err error
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "unsupported encoding - v0",
|
name: "unsupported encoding",
|
||||||
data: []byte{0x42}, // random
|
|
||||||
vers: varsig.Version0,
|
|
||||||
err: varsig.ErrUnsupportedPayloadEncoding,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "unsupported encoding - v1",
|
|
||||||
data: []byte{0x6a, 0x77}, // JWT
|
data: []byte{0x6a, 0x77}, // JWT
|
||||||
vers: varsig.Version1,
|
|
||||||
err: varsig.ErrUnsupportedPayloadEncoding,
|
err: varsig.ErrUnsupportedPayloadEncoding,
|
||||||
},
|
},
|
||||||
{
|
|
||||||
name: "unsupported version",
|
|
||||||
data: []byte{0x5f}, // Verbatim
|
|
||||||
vers: 99, // random
|
|
||||||
err: varsig.ErrUnsupportedVersion,
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
@@ -105,10 +83,8 @@ func TestDecodePayloadEncoding(t *testing.T) {
|
|||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
r := bytes.NewReader(tt.data)
|
r := bytes.NewReader(tt.data)
|
||||||
_, err := varsig.DecodePayloadEncoding(r, tt.vers)
|
_, err := varsig.DecodePayloadEncoding(r)
|
||||||
require.ErrorIs(t, err, tt.err)
|
require.ErrorIs(t, err, tt.err)
|
||||||
// t.Log(err)
|
|
||||||
// t.Fail()
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
@@ -118,6 +94,6 @@ func BenchmarkDecodePayloadEncoding(b *testing.B) {
|
|||||||
b.ReportAllocs()
|
b.ReportAllocs()
|
||||||
data := []byte{0x5f}
|
data := []byte{0x5f}
|
||||||
for i := 0; i < b.N; i++ {
|
for i := 0; i < b.N; i++ {
|
||||||
_, _ = varsig.DecodePayloadEncoding(bytes.NewReader(data), varsig.Version1)
|
_, _ = varsig.DecodePayloadEncoding(bytes.NewReader(data))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
104
ecdsa.go
104
ecdsa.go
@@ -1,9 +1,101 @@
|
|||||||
package varsig
|
package varsig
|
||||||
|
|
||||||
// Stub
|
import (
|
||||||
const (
|
"encoding/binary"
|
||||||
DiscriminatorECDSASecp256k1 Discriminator = 0xe7
|
"fmt"
|
||||||
DiscriminatorECDSAP256 Discriminator = 0x1200
|
|
||||||
DiscriminatorECDSAP384 Discriminator = 0x1201
|
|
||||||
DiscriminatorECDSAP521 Discriminator = 0x1202
|
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// AlgorithmECDSA is the value specifying an ECDSA signature.
|
||||||
|
const AlgorithmECDSA = Algorithm(0xec)
|
||||||
|
|
||||||
|
// ECDSACurve are values that specify which ECDSA curve is used when
|
||||||
|
// generating the signature.
|
||||||
|
type ECDSACurve uint64
|
||||||
|
|
||||||
|
// Constants describing the values for each specific ECDSA curve that can
|
||||||
|
// be encoded into a Varsig.
|
||||||
|
const (
|
||||||
|
CurveSecp256k1 = ECDSACurve(0xe7)
|
||||||
|
CurveP256 = ECDSACurve(0x1200)
|
||||||
|
CurveP384 = ECDSACurve(0x1201)
|
||||||
|
CurveP521 = ECDSACurve(0x1202)
|
||||||
|
)
|
||||||
|
|
||||||
|
func decodeECDSACurve(r BytesReader) (ECDSACurve, error) {
|
||||||
|
u, err := binary.ReadUvarint(r)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
|
||||||
|
switch curve := ECDSACurve(u); curve {
|
||||||
|
case CurveSecp256k1, CurveP256, CurveP384, CurveP521:
|
||||||
|
return curve, nil
|
||||||
|
default:
|
||||||
|
return 0, fmt.Errorf("%w: %x", ErrUnknownECDSACurve, u)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ Varsig = ECDSAVarsig{}
|
||||||
|
|
||||||
|
// ECDSAVarsig is a varsig that encodes the parameters required to describe
|
||||||
|
// an ECDSA signature.
|
||||||
|
type ECDSAVarsig struct {
|
||||||
|
varsig
|
||||||
|
|
||||||
|
curve ECDSACurve
|
||||||
|
hashAlg Hash
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewECDSAVarsig creates and validates an ECDSA varsig with the provided
|
||||||
|
// curve, hash algorithm and payload encoding.
|
||||||
|
func NewECDSAVarsig(curve ECDSACurve, hashAlgorithm Hash, payloadEncoding PayloadEncoding) ECDSAVarsig {
|
||||||
|
return ECDSAVarsig{
|
||||||
|
varsig: varsig{
|
||||||
|
algo: AlgorithmECDSA,
|
||||||
|
payEnc: payloadEncoding,
|
||||||
|
},
|
||||||
|
curve: curve,
|
||||||
|
hashAlg: hashAlgorithm,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Curve returns the elliptic curve used to generate the ECDSA signature.
|
||||||
|
func (v ECDSAVarsig) Curve() ECDSACurve {
|
||||||
|
return v.curve
|
||||||
|
}
|
||||||
|
|
||||||
|
// Hash returns the value describing the hash algorithm used to hash
|
||||||
|
// the payload content before the signature is generated.
|
||||||
|
func (v ECDSAVarsig) Hash() Hash {
|
||||||
|
return v.hashAlg
|
||||||
|
}
|
||||||
|
|
||||||
|
// Encode returns the encoded byte format of the ECDSAVarsig.
|
||||||
|
func (v ECDSAVarsig) Encode() []byte {
|
||||||
|
buf := v.encode()
|
||||||
|
|
||||||
|
buf = binary.AppendUvarint(buf, uint64(v.curve))
|
||||||
|
buf = binary.AppendUvarint(buf, uint64(v.hashAlg))
|
||||||
|
buf = append(buf, EncodePayloadEncoding(v.payEnc)...)
|
||||||
|
|
||||||
|
return buf
|
||||||
|
}
|
||||||
|
|
||||||
|
func decodeECDSA(r BytesReader) (Varsig, error) {
|
||||||
|
curve, err := decodeECDSACurve(r)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
hashAlg, err := DecodeHashAlgorithm(r)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
payEnc, err := DecodePayloadEncoding(r)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return NewECDSAVarsig(curve, hashAlg, payEnc), nil
|
||||||
|
}
|
||||||
|
|||||||
113
eddsa.go
113
eddsa.go
@@ -1,81 +1,70 @@
|
|||||||
package varsig
|
package varsig
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
"crypto/ed25519"
|
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
|
"fmt"
|
||||||
"github.com/multiformats/go-multicodec"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// Constants containing multicodec.Code values that specify EdDSA signatures.
|
// AlgorithmEdDSA is the value specifying an EdDSA signature.
|
||||||
const (
|
const AlgorithmEdDSA = Algorithm(0xed)
|
||||||
DiscriminatorEdDSA = Discriminator(multicodec.Ed25519Pub)
|
|
||||||
DiscriminatorEd25519 = Discriminator(multicodec.Ed25519Pub)
|
|
||||||
DiscriminatorEd448 = Discriminator(multicodec.Ed448Pub)
|
|
||||||
)
|
|
||||||
|
|
||||||
// EdDSACurve are multicodec.Code values that specify which Edwards curve
|
// EdDSACurve are values that specify which Edwards curve is used when
|
||||||
// is used when generating the signature.
|
// generating the signature.
|
||||||
type EdDSACurve uint64
|
type EdDSACurve uint64
|
||||||
|
|
||||||
// Constants describing the multicodec.Code for each specific Edwards
|
// Constants describing the values for each specific Edwards curve that can
|
||||||
// curve that can be encoded into a Varsig.
|
// be encoded into a Varsig.
|
||||||
const (
|
const (
|
||||||
CurveEd25519 = EdDSACurve(multicodec.Ed25519Pub)
|
CurveEd25519 = EdDSACurve(0xed)
|
||||||
CurveEd448 = EdDSACurve(multicodec.Ed448Pub)
|
CurveEd448 = EdDSACurve(0x1203)
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ Varsig = (*EdDSAVarsig)(nil)
|
func decodeEdDSACurve(r BytesReader) (EdDSACurve, error) {
|
||||||
|
u, err := binary.ReadUvarint(r)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
|
||||||
|
switch curve := EdDSACurve(u); curve {
|
||||||
|
case CurveEd25519, CurveEd448:
|
||||||
|
return curve, nil
|
||||||
|
default:
|
||||||
|
return 0, fmt.Errorf("%w: %x", ErrUnknownEdDSACurve, u)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ Varsig = EdDSAVarsig{}
|
||||||
|
|
||||||
// EdDSAVarsig is a varsig that encodes the parameters required to describe
|
// EdDSAVarsig is a varsig that encodes the parameters required to describe
|
||||||
// an EdDSA signature.
|
// an EdDSA signature.
|
||||||
type EdDSAVarsig struct {
|
type EdDSAVarsig struct {
|
||||||
varsig[EdDSAVarsig]
|
varsig
|
||||||
|
|
||||||
curve EdDSACurve
|
curve EdDSACurve
|
||||||
hashAlg HashAlgorithm
|
hashAlg Hash
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewEdDSAVarsig creates and validates an EdDSA varsig with the provided
|
// NewEdDSAVarsig creates and validates an EdDSA varsig with the provided
|
||||||
// curve, hash algorithm and payload encoding.
|
// curve, hash algorithm and payload encoding.
|
||||||
func NewEdDSAVarsig(curve EdDSACurve, hashAlgorithm HashAlgorithm, payloadEncoding PayloadEncoding, opts ...Option) (*EdDSAVarsig, error) {
|
func NewEdDSAVarsig(curve EdDSACurve, hashAlgorithm Hash, payloadEncoding PayloadEncoding) EdDSAVarsig {
|
||||||
options := newOptions(opts...)
|
return EdDSAVarsig{
|
||||||
|
varsig: varsig{
|
||||||
var (
|
algo: AlgorithmEdDSA,
|
||||||
vers = Version1
|
|
||||||
disc = DiscriminatorEdDSA
|
|
||||||
sig = []byte{}
|
|
||||||
)
|
|
||||||
|
|
||||||
if options.ForceVersion0() {
|
|
||||||
vers = Version0
|
|
||||||
disc = Discriminator(curve)
|
|
||||||
sig = options.Signature()
|
|
||||||
}
|
|
||||||
|
|
||||||
v := &EdDSAVarsig{
|
|
||||||
varsig: varsig[EdDSAVarsig]{
|
|
||||||
vers: vers,
|
|
||||||
disc: disc,
|
|
||||||
payEnc: payloadEncoding,
|
payEnc: payloadEncoding,
|
||||||
sig: sig,
|
|
||||||
},
|
},
|
||||||
curve: curve,
|
curve: curve,
|
||||||
hashAlg: hashAlgorithm,
|
hashAlg: hashAlgorithm,
|
||||||
}
|
}
|
||||||
|
|
||||||
return v.validateSig(v, ed25519.PrivateKeySize)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Curve returns the Edwards curve used to generate the EdDSA signature.
|
// Curve returns the Edwards curve used to generate the EdDSA signature.
|
||||||
func (v *EdDSAVarsig) Curve() EdDSACurve {
|
func (v EdDSAVarsig) Curve() EdDSACurve {
|
||||||
return v.curve
|
return v.curve
|
||||||
}
|
}
|
||||||
|
|
||||||
// HashAlgorithm returns the multicodec.Code describing the hash algorithm
|
// Hash returns the value describing the hash algorithm used to hash
|
||||||
// used to hash the payload content before the signature is generated.
|
// the payload content before the signature is generated.
|
||||||
func (v *EdDSAVarsig) HashAlgorithm() HashAlgorithm {
|
func (v EdDSAVarsig) Hash() Hash {
|
||||||
return v.hashAlg
|
return v.hashAlg
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -83,42 +72,28 @@ func (v *EdDSAVarsig) HashAlgorithm() HashAlgorithm {
|
|||||||
func (v EdDSAVarsig) Encode() []byte {
|
func (v EdDSAVarsig) Encode() []byte {
|
||||||
buf := v.encode()
|
buf := v.encode()
|
||||||
|
|
||||||
if v.vers != Version0 {
|
|
||||||
buf = binary.AppendUvarint(buf, uint64(v.curve))
|
buf = binary.AppendUvarint(buf, uint64(v.curve))
|
||||||
}
|
|
||||||
|
|
||||||
buf = binary.AppendUvarint(buf, uint64(v.hashAlg))
|
buf = binary.AppendUvarint(buf, uint64(v.hashAlg))
|
||||||
buf = binary.AppendUvarint(buf, uint64(v.payEnc))
|
buf = append(buf, EncodePayloadEncoding(v.payEnc)...)
|
||||||
buf = append(buf, v.Signature()...)
|
|
||||||
|
|
||||||
return buf
|
return buf
|
||||||
}
|
}
|
||||||
|
|
||||||
func decodeEd25519(r *bytes.Reader, vers Version, disc Discriminator) (Varsig, error) {
|
func decodeEdDSA(r BytesReader) (Varsig, error) {
|
||||||
curve := uint64(disc)
|
curve, err := decodeEdDSACurve(r)
|
||||||
if vers != Version0 {
|
|
||||||
u, err := binary.ReadUvarint(r)
|
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err // TODO: wrap error?
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
curve = u
|
hashAlg, err := DecodeHashAlgorithm(r)
|
||||||
}
|
|
||||||
|
|
||||||
hashAlg, err := binary.ReadUvarint(r)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err // TODO: wrap error?
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
v := &EdDSAVarsig{
|
payEnc, err := DecodePayloadEncoding(r)
|
||||||
varsig: varsig[EdDSAVarsig]{
|
if err != nil {
|
||||||
vers: vers,
|
return nil, err
|
||||||
disc: disc,
|
|
||||||
},
|
|
||||||
curve: EdDSACurve(curve),
|
|
||||||
hashAlg: HashAlgorithm(hashAlg),
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return v.decodePayEncAndSig(r, v, ed25519.PrivateKeySize)
|
return NewEdDSAVarsig(curve, hashAlg, payEnc), nil
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
package varsig_test
|
package varsig_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/hex"
|
"encoding/base64"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
@@ -10,49 +10,41 @@ import (
|
|||||||
"github.com/ucan-wg/go-varsig"
|
"github.com/ucan-wg/go-varsig"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestDecodeEd25519(t *testing.T) {
|
func TestUCANExampleV1(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
t.Run("passes - section 3 example - v0", func(t *testing.T) {
|
// This test is the value shown in the UCAN v1.0.0 example, which is
|
||||||
// Original: 34ed01 1371ae3784f03f9ee1163382fa6efa73b0c31ecf58c899c836709303ba4621d1e6df20e09aaa568914290b7ea124f5b38e70b9b69c7de0d216880eac885edd41c302
|
// an EdDSA varsig = v1 with the Ed25519 curve, SHA2_256 hashing and
|
||||||
// Corrected: 34ed011371ae3784f03f9ee1163382fa6efa73b0c31ecf58c899c836709303ba4621d1e6df20e09aaa568914290b7ea124f5b38e70b9b69c7de0d216880eac885edd41c302")
|
// DAG-CBOR content encoding.
|
||||||
|
example, err := base64.RawStdEncoding.DecodeString("NAHtAe0BE3E")
|
||||||
hdr, err := hex.DecodeString("34ed011371")
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
sig, err := hex.DecodeString("ae3784f03f9ee1163382fa6efa73b0c31ecf58c899c836709303ba4621d1e6df20e09aaa568914290b7ea124f5b38e70b9b69c7de0d216880eac885edd41c302")
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Len(t, sig, 64)
|
|
||||||
|
|
||||||
t.Run("Decode", func(t *testing.T) {
|
t.Run("Decode", func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
v, err := varsig.Decode(append(hdr, sig...))
|
v, err := varsig.Decode(example)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.NotNil(t, v)
|
|
||||||
assert.Equal(t, varsig.Version0, v.Version())
|
|
||||||
assert.Equal(t, varsig.DiscriminatorEd25519, v.Discriminator())
|
|
||||||
assert.Equal(t, varsig.PayloadEncodingDAGCBOR, v.PayloadEncoding())
|
|
||||||
assert.Len(t, v.Signature(), 64)
|
|
||||||
|
|
||||||
impl, ok := v.(*varsig.EdDSAVarsig)
|
ed25519V, ok := v.(varsig.EdDSAVarsig)
|
||||||
require.True(t, ok)
|
require.True(t, ok)
|
||||||
assert.Equal(t, varsig.CurveEd25519, impl.Curve())
|
|
||||||
assert.Equal(t, varsig.HashAlgorithmSHA512, impl.HashAlgorithm())
|
assert.Equal(t, varsig.Version1, ed25519V.Version())
|
||||||
|
assert.Equal(t, varsig.AlgorithmEdDSA, ed25519V.Algorithm())
|
||||||
|
assert.Equal(t, varsig.CurveEd25519, ed25519V.Curve())
|
||||||
|
assert.Equal(t, varsig.HashSha2_512, ed25519V.Hash())
|
||||||
|
assert.Equal(t, varsig.PayloadEncodingDAGCBOR, ed25519V.PayloadEncoding())
|
||||||
})
|
})
|
||||||
|
|
||||||
t.Run("Encode", func(t *testing.T) {
|
t.Run("Encode", func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
v, err := varsig.NewEdDSAVarsig(
|
edDSAVarsig := varsig.NewEdDSAVarsig(
|
||||||
varsig.CurveEd25519,
|
varsig.CurveEd25519,
|
||||||
varsig.HashAlgorithmSHA512,
|
varsig.HashSha2_512,
|
||||||
varsig.PayloadEncodingDAGCBOR,
|
varsig.PayloadEncodingDAGCBOR,
|
||||||
varsig.WithForceVersion0(sig),
|
|
||||||
)
|
)
|
||||||
require.NoError(t, err)
|
|
||||||
require.NotNil(t, v)
|
assert.Equal(t, example, edDSAVarsig.Encode())
|
||||||
assert.Equal(t, append(hdr, sig...), v.Encode())
|
t.Log(base64.RawStdEncoding.EncodeToString(edDSAVarsig.Encode()))
|
||||||
})
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|||||||
32
error.go
32
error.go
@@ -2,42 +2,36 @@ package varsig
|
|||||||
|
|
||||||
import "errors"
|
import "errors"
|
||||||
|
|
||||||
// ErrMissingSignature is returned when a varsig v0 is parsed and does
|
|
||||||
// not contain the expected signature bytes. This is expected in some
|
|
||||||
// intermediate cases, such as the UCAN v1 specification.
|
|
||||||
var ErrMissingSignature = errors.New("missing signature expected in varsig v0")
|
|
||||||
|
|
||||||
// ErrNotYetImplemented is returned when a function is currently under
|
// ErrNotYetImplemented is returned when a function is currently under
|
||||||
// construction. For released versions of this library, this error should
|
// construction. For released versions of this library, this error should
|
||||||
// never occur.
|
// never occur.
|
||||||
var ErrNotYetImplemented = errors.New("not yet implemented")
|
var ErrNotYetImplemented = errors.New("not yet implemented")
|
||||||
|
|
||||||
// ErrUnexpectedSignaturePresent is returned when a signature is present
|
// ErrUnknownHash is returned when an unexpected value is provided
|
||||||
// in a varsig >= v1.
|
|
||||||
var ErrUnexpectedSignaturePresent = errors.New("unexpected signature present in varsig >= v1")
|
|
||||||
|
|
||||||
// ErrUnexpectedSignatureSize is returned when the length of the decoded
|
|
||||||
// signature doesn't match the expected signature length as defined by the
|
|
||||||
// signing algorithm or sent via a Varsig field.
|
|
||||||
var ErrUnexpectedSignatureSize = errors.New("unexpected signature size in varsig v0")
|
|
||||||
|
|
||||||
// ErrUnknownHashAlgoritm is returned when an unexpected value is provided
|
|
||||||
// while decoding the hashing algorithm.
|
// while decoding the hashing algorithm.
|
||||||
var ErrUnknownHashAlgorithm = errors.New("unknown hash algorithm")
|
var ErrUnknownHash = errors.New("unknown hash algorithm")
|
||||||
|
|
||||||
// ErrUnsupportedPayloadEncoding is returned when an unexpected value is
|
// ErrUnsupportedPayloadEncoding is returned when an unexpected value is
|
||||||
// provided while decoding the payload encoding field. The allowed values
|
// provided while decoding the payload encoding field. The allowed values
|
||||||
// for this field may vary based on the varsig version.
|
// for this field may vary based on the varsig version.
|
||||||
var ErrUnsupportedPayloadEncoding = errors.New("unsupported payload encoding")
|
var ErrUnsupportedPayloadEncoding = errors.New("unsupported payload encoding")
|
||||||
|
|
||||||
// ErrUnknowndiscorith is returned when the Registry doesn't have a
|
// ErrUnknownAlgorithm is returned when the Registry doesn't have a
|
||||||
// parsing function for the decoded signing algorithm.
|
// parsing function for the decoded signing algorithm.
|
||||||
var ErrUnknownDiscriminator = errors.New("unknown signing algorithm")
|
var ErrUnknownAlgorithm = errors.New("unknown signing algorithm")
|
||||||
|
|
||||||
|
// ErrUnknownEdDSACurve is returned when the decoded uvarint isn't either
|
||||||
|
// CurveEd25519 or CurveEd448.
|
||||||
|
var ErrUnknownEdDSACurve = errors.New("unknown Edwards curve")
|
||||||
|
|
||||||
|
// ErrUnknownECDSACurve is returned when the decoded uvarint isn't either
|
||||||
|
// CurveSecp256k1, CurveP256, CurveP384 or CurveP521.
|
||||||
|
var ErrUnknownECDSACurve = errors.New("unknown ECDSA curve")
|
||||||
|
|
||||||
// ErrUnsupportedVersion is returned when an unsupported varsig version
|
// ErrUnsupportedVersion is returned when an unsupported varsig version
|
||||||
// field is present.
|
// field is present.
|
||||||
var ErrUnsupportedVersion = errors.New("unsupported version")
|
var ErrUnsupportedVersion = errors.New("unsupported version")
|
||||||
|
|
||||||
// ErrBadPrefix is returned when the prefix field contains a value other
|
// ErrBadPrefix is returned when the prefix field contains a value other
|
||||||
// than 0x34 (encoded as a uvarint).
|
// than 0x34 (encoded as an uvarint).
|
||||||
var ErrBadPrefix = errors.New("varsig prefix not found")
|
var ErrBadPrefix = errors.New("varsig prefix not found")
|
||||||
|
|||||||
9
go.mod
9
go.mod
@@ -1,11 +1,10 @@
|
|||||||
module github.com/ucan-wg/go-varsig
|
module github.com/ucan-wg/go-varsig
|
||||||
|
|
||||||
go 1.24.4
|
go 1.23.10
|
||||||
|
|
||||||
require (
|
toolchain go1.24.4
|
||||||
github.com/multiformats/go-multicodec v0.9.2
|
|
||||||
github.com/stretchr/testify v1.10.0
|
require github.com/stretchr/testify v1.10.0
|
||||||
)
|
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/davecgh/go-spew v1.1.1 // indirect
|
github.com/davecgh/go-spew v1.1.1 // indirect
|
||||||
|
|||||||
2
go.sum
2
go.sum
@@ -6,8 +6,6 @@ github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
|
|||||||
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
||||||
github.com/google/renameio v0.1.0 h1:GOZbcHa3HfsPKPlmyPyN2KEohoMXOhdMbHrvbpl2QaA=
|
github.com/google/renameio v0.1.0 h1:GOZbcHa3HfsPKPlmyPyN2KEohoMXOhdMbHrvbpl2QaA=
|
||||||
github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI=
|
github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI=
|
||||||
github.com/multiformats/go-multicodec v0.9.2 h1:YrlXCuqxjqm3bXl+vBq5LKz5pz4mvAsugdqy78k0pXQ=
|
|
||||||
github.com/multiformats/go-multicodec v0.9.2/go.mod h1:LLWNMtyV5ithSBUo3vFIMaeDy+h3EbkMTek1m+Fybbo=
|
|
||||||
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||||
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||||
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
|
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
|
||||||
|
|||||||
45
option.go
45
option.go
@@ -1,45 +0,0 @@
|
|||||||
package varsig
|
|
||||||
|
|
||||||
// Options define customization when creating a new Varsig.
|
|
||||||
type Options struct {
|
|
||||||
forceVersion0 bool
|
|
||||||
signature []byte
|
|
||||||
}
|
|
||||||
|
|
||||||
func newOptions(opts ...Option) *Options {
|
|
||||||
o := &Options{}
|
|
||||||
|
|
||||||
for _, opt := range opts {
|
|
||||||
opt(o)
|
|
||||||
}
|
|
||||||
|
|
||||||
return o
|
|
||||||
}
|
|
||||||
|
|
||||||
// ForceVersion0 returns a boolean indicating that a Varsig < v1 should
|
|
||||||
// be created (which means the encoded Varsig won't have a version field
|
|
||||||
// and might contain the signature bytes as the last field.)
|
|
||||||
func (o *Options) ForceVersion0() bool {
|
|
||||||
return o.forceVersion0
|
|
||||||
}
|
|
||||||
|
|
||||||
// Signature returns the optional signature bytes when creating a Varsig
|
|
||||||
// < v1.
|
|
||||||
func (o *Options) Signature() []byte {
|
|
||||||
return o.signature
|
|
||||||
}
|
|
||||||
|
|
||||||
// Option is a function that alters the default behavior of constructors
|
|
||||||
// that produce implementations of the Varsig type.
|
|
||||||
type Option func(*Options)
|
|
||||||
|
|
||||||
// WithForceVersion0 indicates that a Varsig < v1 should be produced. If
|
|
||||||
// the signature is a) not nil, b) not empty and c) the correct length
|
|
||||||
// based on the signing algorithm or signing key, the signature's bytes
|
|
||||||
// will be appended to the encoded Varsig.
|
|
||||||
func WithForceVersion0(signature []byte) Option {
|
|
||||||
return func(o *Options) {
|
|
||||||
o.forceVersion0 = true
|
|
||||||
o.signature = signature
|
|
||||||
}
|
|
||||||
}
|
|
||||||
51
registry.go
51
registry.go
@@ -6,11 +6,11 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Version represents which version of the vasig specification was used
|
// Version represents which version of the varsig specification was used
|
||||||
// to produce Varsig value.
|
// to produce Varsig value.
|
||||||
type Version uint64
|
type Version uint64
|
||||||
|
|
||||||
// Constancts for the existing varsig specifications
|
// Constants for the existing varsig specifications
|
||||||
const (
|
const (
|
||||||
Version0 Version = 0
|
Version0 Version = 0
|
||||||
Version1 Version = 1
|
Version1 Version = 1
|
||||||
@@ -18,22 +18,19 @@ const (
|
|||||||
|
|
||||||
// DecodeFunc is a function that parses the varsig representing a specific
|
// DecodeFunc is a function that parses the varsig representing a specific
|
||||||
// signing algorithm.
|
// signing algorithm.
|
||||||
type DecodeFunc func(*bytes.Reader, Version, Discriminator) (Varsig, error)
|
type DecodeFunc func(BytesReader) (Varsig, error)
|
||||||
|
|
||||||
// Registry contains a mapping between known signing algorithms, and
|
// Registry contains a mapping between known signing algorithms and
|
||||||
// functions that can parse varsigs for that signing algorithm.
|
// functions that can parse varsigs for that signing algorithm.
|
||||||
type Registry map[Discriminator]DecodeFunc
|
type Registry map[Algorithm]DecodeFunc
|
||||||
|
|
||||||
// DefaultRegistry provides a Registry containing the mappings for the
|
// DefaultRegistry provides a Registry containing the mappings for the
|
||||||
// signing algorithms which have an implementation within this library.
|
// signing algorithms which have an implementation within this library.
|
||||||
func DefaultRegistry() Registry {
|
func DefaultRegistry() Registry {
|
||||||
return map[Discriminator]DecodeFunc{
|
return map[Algorithm]DecodeFunc{
|
||||||
DiscriminatorRSA: decodeRSA,
|
AlgorithmRSA: decodeRSA,
|
||||||
DiscriminatorEdDSA: decodeEd25519,
|
AlgorithmEdDSA: decodeEdDSA,
|
||||||
DiscriminatorEd448: decodeEd25519,
|
AlgorithmECDSA: decodeECDSA,
|
||||||
DiscriminatorECDSAP256: notYetImplementedVarsigDecoder,
|
|
||||||
DiscriminatorECDSASecp256k1: notYetImplementedVarsigDecoder,
|
|
||||||
DiscriminatorECDSAP521: notYetImplementedVarsigDecoder,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -44,7 +41,7 @@ func NewRegistry() Registry {
|
|||||||
|
|
||||||
// Register allows new mappings between a signing algorithm and its parsing
|
// Register allows new mappings between a signing algorithm and its parsing
|
||||||
// function to the Registry.
|
// function to the Registry.
|
||||||
func (rs Registry) Register(alg Discriminator, decodeFunc DecodeFunc) {
|
func (rs Registry) Register(alg Algorithm, decodeFunc DecodeFunc) {
|
||||||
rs[alg] = decodeFunc
|
rs[alg] = decodeFunc
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -56,7 +53,7 @@ func (rs Registry) Decode(data []byte) (Varsig, error) {
|
|||||||
|
|
||||||
// DecodeStream converts data read from the provided io.Reader into one
|
// DecodeStream converts data read from the provided io.Reader into one
|
||||||
// of the registered Varsig types.
|
// of the registered Varsig types.
|
||||||
func (rs Registry) DecodeStream(r *bytes.Reader) (Varsig, error) {
|
func (rs Registry) DecodeStream(r BytesReader) (Varsig, error) {
|
||||||
pre, err := binary.ReadUvarint(r)
|
pre, err := binary.ReadUvarint(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("%w: %w", ErrBadPrefix, err)
|
return nil, fmt.Errorf("%w: %w", ErrBadPrefix, err)
|
||||||
@@ -66,20 +63,24 @@ func (rs Registry) DecodeStream(r *bytes.Reader) (Varsig, error) {
|
|||||||
return nil, fmt.Errorf("%w: expected %d, got %d", ErrBadPrefix, Prefix, pre)
|
return nil, fmt.Errorf("%w: expected %d, got %d", ErrBadPrefix, Prefix, pre)
|
||||||
}
|
}
|
||||||
|
|
||||||
vers, disc, err := rs.decodeVersAnddisc(r)
|
vers, algo, err := rs.decodeVersAndAlgo(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
decodeFunc, ok := rs[Discriminator(disc)]
|
if vers != Version1 {
|
||||||
if !ok {
|
return nil, fmt.Errorf("%w: %d", ErrUnsupportedVersion, vers)
|
||||||
return nil, fmt.Errorf("%w: %x", ErrUnknownDiscriminator, disc)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return decodeFunc(r, vers, disc)
|
decodeFunc, ok := rs[Algorithm(algo)]
|
||||||
|
if !ok {
|
||||||
|
return nil, fmt.Errorf("%w: %x", ErrUnknownAlgorithm, algo)
|
||||||
|
}
|
||||||
|
|
||||||
|
return decodeFunc(r)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (rs Registry) decodeVersAnddisc(r *bytes.Reader) (Version, Discriminator, error) {
|
func (rs Registry) decodeVersAndAlgo(r BytesReader) (Version, Algorithm, error) {
|
||||||
vers, err := binary.ReadUvarint(r)
|
vers, err := binary.ReadUvarint(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return Version(vers), 0, err
|
return Version(vers), 0, err
|
||||||
@@ -90,14 +91,10 @@ func (rs Registry) decodeVersAnddisc(r *bytes.Reader) (Version, Discriminator, e
|
|||||||
}
|
}
|
||||||
|
|
||||||
if vers >= 64 {
|
if vers >= 64 {
|
||||||
return 0, Discriminator(vers), nil
|
return 0, Algorithm(vers), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
disc, err := binary.ReadUvarint(r)
|
algo, err := binary.ReadUvarint(r)
|
||||||
|
|
||||||
return Version(vers), Discriminator(disc), err
|
return Version(vers), Algorithm(algo), err
|
||||||
}
|
|
||||||
|
|
||||||
func notYetImplementedVarsigDecoder(_ *bytes.Reader, vers Version, disc Discriminator) (Varsig, error) {
|
|
||||||
return nil, fmt.Errorf("%w: Version: %d, Discriminator: %x", ErrNotYetImplemented, vers, disc)
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -12,25 +12,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func TestRegistry_Decode(t *testing.T) {
|
func TestRegistry_Decode(t *testing.T) {
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
t.Run("passes - v0", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
data, err := hex.DecodeString("348120")
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
reg := testRegistry(t)
|
|
||||||
|
|
||||||
vs, err := reg.DecodeStream(bytes.NewReader(data))
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.Equal(t, varsig.Version0, vs.Version())
|
|
||||||
assert.Equal(t, testDiscriminator1, vs.Discriminator())
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("passes - v1", func(t *testing.T) {
|
t.Run("passes - v1", func(t *testing.T) {
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
data, err := hex.DecodeString("34018120")
|
data, err := hex.DecodeString("34018120")
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
@@ -39,63 +21,54 @@ func TestRegistry_Decode(t *testing.T) {
|
|||||||
vs, err := reg.DecodeStream(bytes.NewReader(data))
|
vs, err := reg.DecodeStream(bytes.NewReader(data))
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
assert.Equal(t, varsig.Version1, vs.Version())
|
assert.Equal(t, varsig.Version1, vs.Version())
|
||||||
assert.Equal(t, testDiscriminator1, vs.Discriminator())
|
assert.Equal(t, testAlgorithm1, vs.Algorithm())
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
const (
|
const (
|
||||||
testDiscriminator0 varsig.Discriminator = 0x1000
|
testAlgorithm0 varsig.Algorithm = 0x1000
|
||||||
testDiscriminator1 varsig.Discriminator = 0x1001
|
testAlgorithm1 varsig.Algorithm = 0x1001
|
||||||
)
|
)
|
||||||
|
|
||||||
func testRegistry(t *testing.T) varsig.Registry {
|
func testRegistry(t *testing.T) varsig.Registry {
|
||||||
t.Helper()
|
t.Helper()
|
||||||
|
|
||||||
reg := varsig.NewRegistry()
|
reg := varsig.NewRegistry()
|
||||||
reg.Register(testDiscriminator0, testDecodeFunc(t))
|
reg.Register(testAlgorithm0, testDecodeFunc(testAlgorithm0))
|
||||||
reg.Register(testDiscriminator1, testDecodeFunc(t))
|
reg.Register(testAlgorithm1, testDecodeFunc(testAlgorithm1))
|
||||||
|
|
||||||
return reg
|
return reg
|
||||||
}
|
}
|
||||||
|
|
||||||
func testDecodeFunc(t *testing.T) varsig.DecodeFunc {
|
func testDecodeFunc(algo varsig.Algorithm) varsig.DecodeFunc {
|
||||||
t.Helper()
|
return func(r varsig.BytesReader) (varsig.Varsig, error) {
|
||||||
|
return &testVarsig{algo: algo}, nil
|
||||||
return func(r *bytes.Reader, vers varsig.Version, disc varsig.Discriminator) (varsig.Varsig, error) {
|
|
||||||
v := &testVarsig{
|
|
||||||
vers: vers,
|
|
||||||
disc: disc,
|
|
||||||
}
|
|
||||||
|
|
||||||
return v, nil
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ varsig.Varsig = (*testVarsig)(nil)
|
var _ varsig.Varsig = testVarsig{}
|
||||||
|
|
||||||
type testVarsig struct {
|
type testVarsig struct {
|
||||||
vers varsig.Version
|
algo varsig.Algorithm
|
||||||
disc varsig.Discriminator
|
|
||||||
payEnc varsig.PayloadEncoding
|
payEnc varsig.PayloadEncoding
|
||||||
sig []byte
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (v *testVarsig) Version() varsig.Version {
|
func (v testVarsig) Version() varsig.Version {
|
||||||
return v.vers
|
return varsig.Version1
|
||||||
}
|
}
|
||||||
|
|
||||||
func (v *testVarsig) Discriminator() varsig.Discriminator {
|
func (v testVarsig) Algorithm() varsig.Algorithm {
|
||||||
return v.disc
|
return v.algo
|
||||||
}
|
}
|
||||||
|
|
||||||
func (v *testVarsig) PayloadEncoding() varsig.PayloadEncoding {
|
func (v testVarsig) Hash() varsig.Hash {
|
||||||
|
return varsig.HashUnspecified
|
||||||
|
}
|
||||||
|
|
||||||
|
func (v testVarsig) PayloadEncoding() varsig.PayloadEncoding {
|
||||||
return v.payEnc
|
return v.payEnc
|
||||||
}
|
}
|
||||||
|
|
||||||
func (v *testVarsig) Signature() []byte {
|
func (v testVarsig) Encode() []byte {
|
||||||
return v.sig
|
|
||||||
}
|
|
||||||
|
|
||||||
func (v *testVarsig) Encode() []byte {
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|||||||
72
rsa.go
72
rsa.go
@@ -1,95 +1,73 @@
|
|||||||
package varsig
|
package varsig
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
|
|
||||||
"github.com/multiformats/go-multicodec"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// DiscriminatorRSA is the multicodec.Code specifying an RSA signature.
|
// AlgorithmRSA is the value specifying an RSA signature.
|
||||||
const DiscriminatorRSA = Discriminator(multicodec.RsaPub)
|
const AlgorithmRSA = Algorithm(0x1205)
|
||||||
|
|
||||||
var _ Varsig = (*RSAVarsig)(nil)
|
var _ Varsig = RSAVarsig{}
|
||||||
|
|
||||||
// RSAVarsig is a varsig that encodes the parameters required to describe
|
// RSAVarsig is a varsig that encodes the parameters required to describe
|
||||||
// an RSA signature.
|
// an RSA signature.
|
||||||
type RSAVarsig struct {
|
type RSAVarsig struct {
|
||||||
varsig[RSAVarsig]
|
varsig
|
||||||
hashAlg HashAlgorithm
|
hashAlg Hash
|
||||||
sigLen uint64
|
keyLen uint64
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewRSAVarsig creates and validates an RSA varsig with the provided
|
// NewRSAVarsig creates and validates an RSA varsig with the provided
|
||||||
// hash algorithm, key length and payload encoding.
|
// hash algorithm, key length and payload encoding.
|
||||||
func NewRSAVarsig(hashAlgorithm HashAlgorithm, keyLength uint64, payloadEncoding PayloadEncoding, opts ...Option) (*RSAVarsig, error) {
|
func NewRSAVarsig(hashAlgorithm Hash, keyLen uint64, payloadEncoding PayloadEncoding) RSAVarsig {
|
||||||
options := newOptions(opts...)
|
return RSAVarsig{
|
||||||
|
varsig: varsig{
|
||||||
var (
|
algo: AlgorithmRSA,
|
||||||
vers = Version1
|
|
||||||
sig = []byte{}
|
|
||||||
)
|
|
||||||
|
|
||||||
if options.ForceVersion0() {
|
|
||||||
vers = Version0
|
|
||||||
sig = options.Signature()
|
|
||||||
}
|
|
||||||
|
|
||||||
v := &RSAVarsig{
|
|
||||||
varsig: varsig[RSAVarsig]{
|
|
||||||
vers: vers,
|
|
||||||
disc: DiscriminatorRSA,
|
|
||||||
payEnc: payloadEncoding,
|
payEnc: payloadEncoding,
|
||||||
sig: sig,
|
|
||||||
},
|
},
|
||||||
hashAlg: hashAlgorithm,
|
hashAlg: hashAlgorithm,
|
||||||
sigLen: keyLength,
|
keyLen: keyLen,
|
||||||
}
|
}
|
||||||
|
|
||||||
return v.validateSig(v, v.sigLen)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Encode returns the encoded byte format of the RSAVarsig.
|
// Encode returns the encoded byte format of the RSAVarsig.
|
||||||
func (v RSAVarsig) Encode() []byte {
|
func (v RSAVarsig) Encode() []byte {
|
||||||
buf := v.encode()
|
buf := v.encode()
|
||||||
|
|
||||||
buf = binary.AppendUvarint(buf, uint64(v.hashAlg))
|
buf = binary.AppendUvarint(buf, uint64(v.hashAlg))
|
||||||
buf = binary.AppendUvarint(buf, v.sigLen)
|
buf = binary.AppendUvarint(buf, v.keyLen)
|
||||||
buf = binary.AppendUvarint(buf, uint64(v.payEnc))
|
buf = append(buf, EncodePayloadEncoding(v.payEnc)...)
|
||||||
buf = append(buf, v.Signature()...)
|
|
||||||
|
|
||||||
return buf
|
return buf
|
||||||
}
|
}
|
||||||
|
|
||||||
// HashAlgorithm returns the hash algorithm used to has the payload content.
|
// Hash returns the value describing the hash algorithm used to hash
|
||||||
func (v *RSAVarsig) HashAlgorithm() HashAlgorithm {
|
// the payload content before the signature is generated.
|
||||||
|
func (v RSAVarsig) Hash() Hash {
|
||||||
return v.hashAlg
|
return v.hashAlg
|
||||||
}
|
}
|
||||||
|
|
||||||
// KeyLength returns the length of the RSA key used to sign the payload
|
// KeyLength returns the length of the RSA key used to sign the payload
|
||||||
// content.
|
// content.
|
||||||
func (v *RSAVarsig) KeyLength() uint64 {
|
func (v RSAVarsig) KeyLength() uint64 {
|
||||||
return v.sigLen
|
return v.keyLen
|
||||||
}
|
}
|
||||||
|
|
||||||
func decodeRSA(r *bytes.Reader, vers Version, disc Discriminator) (Varsig, error) {
|
func decodeRSA(r BytesReader) (Varsig, error) {
|
||||||
hashAlg, err := DecodeHashAlgorithm(r)
|
hashAlg, err := DecodeHashAlgorithm(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
sigLen, err := binary.ReadUvarint(r)
|
keyLen, err := binary.ReadUvarint(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
vs := &RSAVarsig{
|
payEnc, err := DecodePayloadEncoding(r)
|
||||||
varsig: varsig[RSAVarsig]{
|
if err != nil {
|
||||||
vers: vers,
|
return nil, err
|
||||||
disc: disc,
|
|
||||||
},
|
|
||||||
hashAlg: HashAlgorithm(hashAlg),
|
|
||||||
sigLen: sigLen,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return vs.decodePayEncAndSig(r, vs, sigLen)
|
return NewRSAVarsig(hashAlg, keyLen, payEnc), nil
|
||||||
}
|
}
|
||||||
|
|||||||
64
rsa_test.go
64
rsa_test.go
@@ -4,7 +4,6 @@ import (
|
|||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
"github.com/ucan-wg/go-varsig"
|
"github.com/ucan-wg/go-varsig"
|
||||||
@@ -26,71 +25,26 @@ func TestRSAVarsig(t *testing.T) {
|
|||||||
vs, err := varsig.Decode(example)
|
vs, err := varsig.Decode(example)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
rsaVs, ok := vs.(*varsig.RSAVarsig)
|
rsaVs, ok := vs.(varsig.RSAVarsig)
|
||||||
require.True(t, ok)
|
require.True(t, ok)
|
||||||
|
|
||||||
assert.Equal(t, varsig.Version1, rsaVs.Version())
|
require.Equal(t, varsig.Version1, rsaVs.Version())
|
||||||
assert.Equal(t, varsig.DiscriminatorRSA, rsaVs.Discriminator())
|
require.Equal(t, varsig.AlgorithmRSA, rsaVs.Algorithm())
|
||||||
assert.Equal(t, varsig.HashAlgorithmSHA256, rsaVs.HashAlgorithm())
|
require.Equal(t, varsig.HashSha2_256, rsaVs.Hash())
|
||||||
assert.Equal(t, varsig.PayloadEncodingDAGCBOR, rsaVs.PayloadEncoding())
|
require.Equal(t, varsig.PayloadEncodingDAGCBOR, rsaVs.PayloadEncoding())
|
||||||
assert.Equal(t, uint64(keyLen), rsaVs.KeyLength())
|
require.Equal(t, uint64(keyLen), rsaVs.KeyLength())
|
||||||
assert.Len(t, rsaVs.Signature(), 0)
|
|
||||||
})
|
})
|
||||||
|
|
||||||
t.Run("Encode", func(t *testing.T) {
|
t.Run("Encode", func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
rsaVarsig, err := varsig.NewRSAVarsig(
|
rsaVarsig := varsig.NewRSAVarsig(
|
||||||
varsig.HashAlgorithmSHA256,
|
varsig.HashSha2_256,
|
||||||
keyLen,
|
keyLen,
|
||||||
varsig.PayloadEncodingDAGCBOR,
|
varsig.PayloadEncodingDAGCBOR,
|
||||||
)
|
)
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
assert.Equal(t, example, rsaVarsig.Encode())
|
require.Equal(t, example, rsaVarsig.Encode())
|
||||||
t.Log(base64.RawStdEncoding.EncodeToString(rsaVarsig.Encode()))
|
t.Log(base64.RawStdEncoding.EncodeToString(rsaVarsig.Encode()))
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUCANExample(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
const keyLen = 0x100
|
|
||||||
|
|
||||||
// This test is the value shown in the UCAN v1.0.0 example, which is
|
|
||||||
// an RSA varsig < v1 encoded as RS256 with a key length of 0x100
|
|
||||||
// bytes and DAG-CBOR payload encoding.
|
|
||||||
example, err := base64.RawStdEncoding.DecodeString("NIUkEoACcQ")
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
t.Run("Decode", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
vs, err := varsig.Decode(example)
|
|
||||||
require.ErrorIs(t, err, varsig.ErrMissingSignature)
|
|
||||||
|
|
||||||
rsaVs, ok := vs.(*varsig.RSAVarsig)
|
|
||||||
require.True(t, ok)
|
|
||||||
|
|
||||||
assert.Equal(t, varsig.Version0, rsaVs.Version())
|
|
||||||
assert.Equal(t, varsig.DiscriminatorRSA, rsaVs.Discriminator())
|
|
||||||
assert.Equal(t, varsig.HashAlgorithmSHA256, rsaVs.HashAlgorithm())
|
|
||||||
assert.Equal(t, varsig.PayloadEncodingDAGCBOR, rsaVs.PayloadEncoding())
|
|
||||||
assert.Equal(t, uint64(keyLen), rsaVs.KeyLength())
|
|
||||||
assert.Len(t, rsaVs.Signature(), 0)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("Encode", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
rsaVarsig, err := varsig.NewRSAVarsig(
|
|
||||||
varsig.HashAlgorithmSHA256,
|
|
||||||
keyLen,
|
|
||||||
varsig.PayloadEncodingDAGCBOR,
|
|
||||||
varsig.WithForceVersion0([]byte{}),
|
|
||||||
)
|
|
||||||
require.ErrorIs(t, err, varsig.ErrMissingSignature)
|
|
||||||
|
|
||||||
assert.Equal(t, example, rsaVarsig.Encode())
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|||||||
93
varsig.go
93
varsig.go
@@ -19,7 +19,6 @@
|
|||||||
package varsig
|
package varsig
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
"io"
|
"io"
|
||||||
)
|
)
|
||||||
@@ -27,13 +26,19 @@ import (
|
|||||||
// Varsig represents types that describe how a signature was generated
|
// Varsig represents types that describe how a signature was generated
|
||||||
// and thus how to interpret the signature and verify the signed data.
|
// and thus how to interpret the signature and verify the signed data.
|
||||||
type Varsig interface {
|
type Varsig interface {
|
||||||
// accessors for fields that are common to all varsig
|
// Version returns the varsig's version field.
|
||||||
Version() Version
|
Version() Version
|
||||||
Discriminator() Discriminator
|
|
||||||
PayloadEncoding() PayloadEncoding
|
|
||||||
Signature() []byte
|
|
||||||
|
|
||||||
// Operations that are common to all varsig
|
// Algorithm returns the algorithm used to produce the corresponding signature.
|
||||||
|
Algorithm() Algorithm
|
||||||
|
|
||||||
|
// Hash returns the hash used on the data before signature.
|
||||||
|
Hash() Hash
|
||||||
|
|
||||||
|
// PayloadEncoding returns the codec that was used to encode the signed data.
|
||||||
|
PayloadEncoding() PayloadEncoding
|
||||||
|
|
||||||
|
// Encode returns the encoded byte format of the varsig.
|
||||||
Encode() []byte
|
Encode() []byte
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -45,86 +50,46 @@ func Decode(data []byte) (Varsig, error) {
|
|||||||
|
|
||||||
// DecodeStream converts data read from the provided io.Reader into one
|
// DecodeStream converts data read from the provided io.Reader into one
|
||||||
// of the Varsig types provided by the DefaultRegistry.
|
// of the Varsig types provided by the DefaultRegistry.
|
||||||
func DecodeStream(r *bytes.Reader) (Varsig, error) {
|
func DecodeStream(r BytesReader) (Varsig, error) {
|
||||||
return DefaultRegistry().DecodeStream(r)
|
return DefaultRegistry().DecodeStream(r)
|
||||||
}
|
}
|
||||||
|
|
||||||
type varsig[T Varsig] struct {
|
type varsig struct {
|
||||||
vers Version
|
algo Algorithm
|
||||||
disc Discriminator
|
|
||||||
payEnc PayloadEncoding
|
payEnc PayloadEncoding
|
||||||
sig []byte
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Version returns the varsig's version field.
|
// Version returns the varsig's version field.
|
||||||
func (v varsig[_]) Version() Version {
|
func (v varsig) Version() Version {
|
||||||
return v.vers
|
return Version1
|
||||||
}
|
}
|
||||||
|
|
||||||
// Discriminator returns the algorithm used to produce corresponding
|
// Algorithm returns the algorithm used to produce the corresponding
|
||||||
// signature.
|
// signature.
|
||||||
func (v varsig[_]) Discriminator() Discriminator {
|
func (v varsig) Algorithm() Algorithm {
|
||||||
return v.disc
|
return v.algo
|
||||||
}
|
}
|
||||||
|
|
||||||
// PayloadEncoding returns the codec that was used to encode the signed
|
// PayloadEncoding returns the codec that was used to encode the signed
|
||||||
// data.
|
// data.
|
||||||
func (v varsig[_]) PayloadEncoding() PayloadEncoding {
|
func (v varsig) PayloadEncoding() PayloadEncoding {
|
||||||
return v.payEnc
|
return v.payEnc
|
||||||
}
|
}
|
||||||
|
|
||||||
// Signature returns the cryptographic signature of the signed data. This
|
func (v varsig) encode() []byte {
|
||||||
// value is never present in a varsig >= v1 and must either be a valid
|
// Pre-allocate to the maximum size to avoid re-allocating.
|
||||||
// signature with the correct length or empty in varsig < v1.
|
// I think the maximum is 10 bytes, but it's all the same for go to allocate 16 (due to the small
|
||||||
func (v varsig[_]) Signature() []byte {
|
// size allocation class), so we might as well get some headroom for bigger varints.
|
||||||
return v.sig
|
buf := make([]byte, 0, 16)
|
||||||
}
|
|
||||||
|
|
||||||
func (v *varsig[_]) encode() []byte {
|
|
||||||
var buf []byte
|
|
||||||
|
|
||||||
buf = binary.AppendUvarint(buf, Prefix)
|
buf = binary.AppendUvarint(buf, Prefix)
|
||||||
|
|
||||||
if v.Version() == Version1 {
|
|
||||||
buf = binary.AppendUvarint(buf, uint64(Version1))
|
buf = binary.AppendUvarint(buf, uint64(Version1))
|
||||||
}
|
buf = binary.AppendUvarint(buf, uint64(v.algo))
|
||||||
|
|
||||||
buf = binary.AppendUvarint(buf, uint64(v.disc))
|
|
||||||
|
|
||||||
return buf
|
return buf
|
||||||
}
|
}
|
||||||
|
|
||||||
func (v *varsig[T]) decodePayEncAndSig(r *bytes.Reader, varsig *T, expectedLength uint64) (*T, error) {
|
type BytesReader interface {
|
||||||
payEnc, err := DecodePayloadEncoding(r, v.Version())
|
io.ByteReader
|
||||||
if err != nil {
|
io.Reader
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
v.payEnc = payEnc
|
|
||||||
|
|
||||||
signature, err := io.ReadAll(r)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
v.sig = signature
|
|
||||||
|
|
||||||
return v.validateSig(varsig, expectedLength)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (v *varsig[T]) validateSig(varsig *T, expectedLength uint64) (*T, error) {
|
|
||||||
if v.Version() == Version0 && len(v.sig) == 0 {
|
|
||||||
return varsig, ErrMissingSignature
|
|
||||||
}
|
|
||||||
|
|
||||||
if v.Version() == Version0 && uint64(len(v.sig)) != expectedLength {
|
|
||||||
return nil, ErrUnexpectedSignatureSize
|
|
||||||
}
|
|
||||||
|
|
||||||
if v.Version() == Version1 && len(v.sig) != 0 {
|
|
||||||
return nil, ErrUnexpectedSignaturePresent
|
|
||||||
}
|
|
||||||
|
|
||||||
return varsig, nil
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
111
varsig_test.go
111
varsig_test.go
@@ -1,8 +1,9 @@
|
|||||||
package varsig_test
|
package varsig_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"encoding/base64"
|
||||||
"encoding/hex"
|
"encoding/hex"
|
||||||
"errors"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
@@ -12,6 +13,39 @@ import (
|
|||||||
"github.com/ucan-wg/go-varsig"
|
"github.com/ucan-wg/go-varsig"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func ExampleDecode() {
|
||||||
|
example, err := base64.RawStdEncoding.DecodeString("NAHtAe0BE3E")
|
||||||
|
handleErr(err)
|
||||||
|
|
||||||
|
vs, err := varsig.Decode(example)
|
||||||
|
handleErr(err)
|
||||||
|
|
||||||
|
fmt.Printf("%T\n", vs)
|
||||||
|
fmt.Printf("Algorithm: %d\n", vs.Algorithm())
|
||||||
|
fmt.Printf("Hash: %d\n", vs.Hash())
|
||||||
|
fmt.Printf("PayloadEncoding: %d\n", vs.PayloadEncoding())
|
||||||
|
|
||||||
|
// Output:
|
||||||
|
// varsig.EdDSAVarsig
|
||||||
|
// Algorithm: 237
|
||||||
|
// Hash: 19
|
||||||
|
// PayloadEncoding: 3
|
||||||
|
}
|
||||||
|
|
||||||
|
func ExampleEncode() {
|
||||||
|
edDSAVarsig := varsig.NewEdDSAVarsig(
|
||||||
|
varsig.CurveEd25519,
|
||||||
|
varsig.HashSha2_512,
|
||||||
|
varsig.PayloadEncodingDAGCBOR,
|
||||||
|
)
|
||||||
|
|
||||||
|
b64 := base64.RawStdEncoding.EncodeToString(edDSAVarsig.Encode())
|
||||||
|
fmt.Print(b64)
|
||||||
|
|
||||||
|
// Output:
|
||||||
|
// NAHtAe0BE3E
|
||||||
|
}
|
||||||
|
|
||||||
func TestDecode(t *testing.T) {
|
func TestDecode(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
@@ -59,17 +93,6 @@ func TestDecode(t *testing.T) {
|
|||||||
assert.Nil(t, vs)
|
assert.Nil(t, vs)
|
||||||
})
|
})
|
||||||
|
|
||||||
t.Run("fails - unknown signature algorithm - v0", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
data, err := hex.DecodeString("3464")
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
vs, err := varsig.Decode(data)
|
|
||||||
require.ErrorIs(t, err, varsig.ErrUnknownDiscriminator)
|
|
||||||
assert.Nil(t, vs)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("fails - unknown signature algorithm - v1", func(t *testing.T) {
|
t.Run("fails - unknown signature algorithm - v1", func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
@@ -77,7 +100,7 @@ func TestDecode(t *testing.T) {
|
|||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
vs, err := varsig.Decode(data)
|
vs, err := varsig.Decode(data)
|
||||||
require.ErrorIs(t, err, varsig.ErrUnknownDiscriminator)
|
require.ErrorIs(t, err, varsig.ErrUnknownAlgorithm)
|
||||||
assert.Nil(t, vs)
|
assert.Nil(t, vs)
|
||||||
})
|
})
|
||||||
|
|
||||||
@@ -88,7 +111,6 @@ func TestDecode(t *testing.T) {
|
|||||||
rsaHex = "8524"
|
rsaHex = "8524"
|
||||||
sha256Hex = "12"
|
sha256Hex = "12"
|
||||||
keyLen = "8002"
|
keyLen = "8002"
|
||||||
rsaBaseV0 = "34" + rsaHex + sha256Hex + keyLen
|
|
||||||
rsaBaseV1 = "3401" + rsaHex + sha256Hex + keyLen
|
rsaBaseV1 = "3401" + rsaHex + sha256Hex + keyLen
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -124,65 +146,10 @@ func TestDecode(t *testing.T) {
|
|||||||
require.ErrorIs(t, err, varsig.ErrUnsupportedPayloadEncoding)
|
require.ErrorIs(t, err, varsig.ErrUnsupportedPayloadEncoding)
|
||||||
assert.Nil(t, vs)
|
assert.Nil(t, vs)
|
||||||
})
|
})
|
||||||
|
|
||||||
t.Run("fails - unexpected signature length - v0", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
data, err := hex.DecodeString(rsaBaseV0 + "5f" + "42") // 0x42 is only a single byte - 256 bytes are expected
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
vs, err := varsig.Decode(data)
|
|
||||||
require.ErrorIs(t, err, varsig.ErrUnexpectedSignatureSize)
|
|
||||||
assert.Nil(t, vs)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("fails - unexpected signature present - v1", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
data, err := hex.DecodeString(rsaBaseV1 + "5f" + "42") // 0x42 is only a single byte - 256 bytes are expected
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
vs, err := varsig.Decode(data)
|
|
||||||
require.ErrorIs(t, err, varsig.ErrUnexpectedSignaturePresent)
|
|
||||||
assert.Nil(t, vs)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("passes with error - v0", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
data, err := hex.DecodeString(rsaBaseV0 + "5f")
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
vs, err := varsig.Decode(data)
|
|
||||||
require.ErrorIs(t, err, varsig.ErrMissingSignature)
|
|
||||||
assert.NotNil(t, vs) // varsig is still returned with just "header"
|
|
||||||
})
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func mustVarsig[T varsig.Varsig](t *testing.T) func(*T, error) *T {
|
func handleErr(err error) {
|
||||||
t.Helper()
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
return func(v *T, err error) *T {
|
|
||||||
if err != nil && ((*v).Version() != varsig.Version0 || !errors.Is(err, varsig.ErrMissingSignature)) {
|
|
||||||
t.Error(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return v
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func roundTrip[T varsig.Varsig](t *testing.T, in T, expEncHex string) T {
|
|
||||||
data := in.Encode()
|
|
||||||
assert.Equal(t, expEncHex, hex.EncodeToString(data))
|
|
||||||
|
|
||||||
out, err := varsig.Decode(in.Encode())
|
|
||||||
if err != nil && (out.Version() != varsig.Version0 || !errors.Is(err, varsig.ErrMissingSignature)) {
|
|
||||||
t.Fail()
|
|
||||||
}
|
|
||||||
|
|
||||||
assert.Equal(t, in.Version(), out.Version())
|
|
||||||
assert.Equal(t, in.Discriminator(), out.Discriminator())
|
|
||||||
assert.Equal(t, in.PayloadEncoding(), out.PayloadEncoding())
|
|
||||||
assert.Equal(t, in.Signature(), out.Signature())
|
|
||||||
|
|
||||||
return out.(T)
|
|
||||||
}
|
|
||||||
|
|||||||
Reference in New Issue
Block a user