diff options
author | Nick Mathewson <nickm@torproject.org> | 2013-09-30 13:38:12 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2014-09-25 15:08:31 -0400 |
commit | c75e275574b7a3496cd5050ef75f8d82d075642e (patch) | |
tree | 4bcaf273a655aae197921e4532bd966c7334da01 /src | |
parent | 22760c4899cb7e8b643f3f572ce93fb6587b31b8 (diff) | |
download | tor-c75e275574b7a3496cd5050ef75f8d82d075642e.tar.gz tor-c75e275574b7a3496cd5050ef75f8d82d075642e.zip |
Add encode/decode functions for ed25519 public keys
Diffstat (limited to 'src')
-rw-r--r-- | src/common/crypto_ed25519.h | 9 | ||||
-rw-r--r-- | src/common/crypto_format.c | 22 | ||||
-rw-r--r-- | src/test/test_crypto.c | 30 |
3 files changed, 56 insertions, 5 deletions
diff --git a/src/common/crypto_ed25519.h b/src/common/crypto_ed25519.h index a68f2ec2b1..35f0125993 100644 --- a/src/common/crypto_ed25519.h +++ b/src/common/crypto_ed25519.h @@ -69,8 +69,15 @@ int ed25519_checksig_batch(int *okay_out, int n_checkable); #endif +#define ED25519_BASE64_LEN 43 + +int ed25519_public_from_base64(ed25519_public_key_t *pkey, + const char *input); +int ed25519_public_to_base64(char *output, + const ed25519_public_key_t *pkey); + /* XXXX write secret keys to disk, load secret keys from disk, read encrypted, - * write encrypted. serialize public. parse public. */ + * write encrypted. */ #endif diff --git a/src/common/crypto_format.c b/src/common/crypto_format.c index be669c8d2b..a9f104cab2 100644 --- a/src/common/crypto_format.c +++ b/src/common/crypto_format.c @@ -9,6 +9,7 @@ #endif #include "crypto.h" #include "crypto_curve25519.h" +#include "crypto_ed25519.h" #include "util.h" #include "torlog.h" @@ -43,3 +44,24 @@ curve25519_public_from_base64(curve25519_public_key_t *pkey, } } +/** Try to decode the string <b>input</b> into an ed25519 public key. On + * success, store the value in <b>pkey</b> and return 0. Otherwise return + * -1. */ +int +ed25519_public_from_base64(ed25519_public_key_t *pkey, + const char *input) +{ + return digest256_from_base64((char*)pkey->pubkey, input); +} + +/** Encode the public key <b>pkey</b> into the buffer at <b>output</b>, + * which must have space for ED25519_BASE64_LEN bytes of encoded key, + * plus one byte for a terminating NUL. Return 0 on success, -1 on failure. + */ +int +ed25519_public_to_base64(char *output, + const ed25519_public_key_t *pkey) +{ + return digest256_to_base64(output, (const char *)pkey->pubkey); +} + diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c index a4ca609247..5b2ce4508d 100644 --- a/src/test/test_crypto.c +++ b/src/test/test_crypto.c @@ -1341,12 +1341,33 @@ test_crypto_ed25519_test_vectors(void *arg) tor_free(mem_op_hex_tmp); } -/* XXX - Check known values for secret->public, for public,msg->signature. - */ +#endif +static void +test_crypto_ed25519_encode(void *arg) +{ + char buf[ED25519_BASE64_LEN+1]; + ed25519_keypair_t kp; + ed25519_public_key_t pk; + char *mem_op_hex_tmp = NULL; + (void) arg; -#endif + /* Test roundtrip. */ + tt_int_op(0, ==, ed25519_keypair_generate(&kp, 0)); + tt_int_op(0, ==, ed25519_public_to_base64(buf, &kp.pubkey)); + tt_int_op(ED25519_BASE64_LEN, ==, strlen(buf)); + tt_int_op(0, ==, ed25519_public_from_base64(&pk, buf)); + test_memeq(kp.pubkey.pubkey, pk.pubkey, ED25519_PUBKEY_LEN); + + /* Test known value. */ + tt_int_op(0, ==, ed25519_public_from_base64(&pk, + "lVIuIctLjbGZGU5wKMNXxXlSE3cW4kaqkqm04u6pxvM")); + test_memeq_hex(pk.pubkey, + "95522e21cb4b8db199194e7028c357c57952137716e246aa92a9b4e2eea9c6f3"); + + done: + tor_free(mem_op_hex_tmp); +} static void test_crypto_siphash(void *arg) @@ -1487,6 +1508,7 @@ struct testcase_t crypto_tests[] = { { "curve25519_persist", test_crypto_curve25519_persist, 0, NULL, NULL }, { "ed25519_simple", test_crypto_ed25519_simple, 0, NULL, NULL }, { "ed25519_test_vectors", test_crypto_ed25519_test_vectors, 0, NULL, NULL }, + { "ed25519_encode", test_crypto_ed25519_encode, 0, NULL, NULL }, #endif { "siphash", test_crypto_siphash, 0, NULL, NULL }, END_OF_TESTCASES |