diff options
author | George Kadianakis <desnacked@riseup.net> | 2017-06-28 16:02:21 +0300 |
---|---|---|
committer | George Kadianakis <desnacked@riseup.net> | 2017-06-28 16:02:21 +0300 |
commit | f85c1874ad5d4503ef8bdd7406667e89b65f00a8 (patch) | |
tree | 3eb3fe1955357d18c41e0073ec66d79e1016b6c3 | |
parent | 0269e4ffba02ff810b9098a67e8212c291d5fee5 (diff) | |
download | tor-f85c1874ad5d4503ef8bdd7406667e89b65f00a8.tar.gz tor-f85c1874ad5d4503ef8bdd7406667e89b65f00a8.zip |
ed25519: Add tests blinding bad ed25519 pubkeys.
-rw-r--r-- | src/test/test_crypto.c | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c index 924dd7d64c..4d9651db9c 100644 --- a/src/test/test_crypto.c +++ b/src/test/test_crypto.c @@ -2544,6 +2544,39 @@ test_crypto_ed25519_blinding(void *arg) ; } +/** Test that our blinding functions will fail if we pass them bad pubkeys */ +static void +test_crypto_ed25519_blinding_fail(void *arg) +{ + int retval; + uint8_t param[32] = {2}; + ed25519_public_key_t pub; + ed25519_public_key_t pub_blinded; + + (void)arg; + + /* This point is not on the curve: the blind routines should fail */ + const char badkey[] = + "e19c65de75c68cf3b7643ea732ba9eb1a3d20d6d57ba223c2ece1df66feb5af0"; + retval = base16_decode((char*)pub.pubkey, sizeof(pub.pubkey), + badkey, strlen(badkey)); + tt_int_op(retval, OP_EQ, sizeof(pub.pubkey)); + retval = ed25519_public_blind(&pub_blinded, &pub, param); + tt_int_op(retval, OP_EQ, -1); + + /* This point is legit: blind routines should be happy */ + const char goodkey[] = + "4ba2e44760dff4c559ef3c38768c1c14a8a54740c782c8d70803e9d6e3ad8794"; + retval = base16_decode((char*)pub.pubkey, sizeof(pub.pubkey), + goodkey, strlen(goodkey)); + tt_int_op(retval, OP_EQ, sizeof(pub.pubkey)); + retval = ed25519_public_blind(&pub_blinded, &pub, param); + tt_int_op(retval, OP_EQ, 0); + + done: + ; +} + static void test_crypto_ed25519_testvectors(void *arg) { @@ -2981,6 +3014,7 @@ struct testcase_t crypto_tests[] = { ED25519_TEST(encode, 0), ED25519_TEST(convert, 0), ED25519_TEST(blinding, 0), + ED25519_TEST(blinding_fail, 0), ED25519_TEST(testvectors, 0), ED25519_TEST(validation, 0), { "ed25519_storage", test_crypto_ed25519_storage, 0, NULL, NULL }, |