forked from scionproto/scion
-
Notifications
You must be signed in to change notification settings - Fork 0
/
asym.go
64 lines (57 loc) · 2.18 KB
/
asym.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
// Copyright 2017 ETH Zurich
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package crypto
import (
"strings"
"golang.org/x/crypto/ed25519"
"github.com/scionproto/scion/go/lib/common"
)
const (
Ed25519 = "ed25519"
Curve25519xSalsa20Poly1305 = "curve25519xsalsa20poly1305"
InvalidKeySize = "Invalid key size"
UnsupportedSignAlgo = "Unsupported signing algorithm"
InvalidSignature = "Invalid signature"
)
// Sign takes a signature input and a signing key to create a signature. Currently only
// ed25519 is supported
func Sign(sigInput, signKey common.RawBytes, signAlgo string) (common.RawBytes, error) {
switch strings.ToLower(signAlgo) {
case Ed25519:
if len(signKey) != ed25519.PrivateKeySize {
return nil, common.NewBasicError(InvalidKeySize, nil, "expected",
ed25519.PrivateKeySize, "actual", len(signKey))
}
return ed25519.Sign(ed25519.PrivateKey(signKey), sigInput), nil
default:
return nil, common.NewBasicError(UnsupportedSignAlgo, nil, "algo", signAlgo)
}
}
// Verify takes a signature input and a verifying key and returns an error, if the
// signature does not match. Currently only ed25519 is supported.
func Verify(sigInput, sig, verifyKey common.RawBytes, signAlgo string) error {
switch strings.ToLower(signAlgo) {
case Ed25519:
if len(verifyKey) != ed25519.PublicKeySize {
return common.NewBasicError(InvalidKeySize, nil,
"expected", ed25519.PublicKeySize, "actual", len(verifyKey))
}
if !ed25519.Verify(ed25519.PublicKey(verifyKey), sigInput, sig) {
return common.NewBasicError(InvalidSignature, nil)
}
return nil
default:
return common.NewBasicError(UnsupportedSignAlgo, nil, "algo", signAlgo)
}
}