forked from conduitxyz/plume-nitro
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathextra_signature_checker_test.go
96 lines (78 loc) · 2.46 KB
/
extra_signature_checker_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
// Copyright 2021-2022, Offchain Labs, Inc.
// For license information, see https://github.com/nitro/blob/master/LICENSE
package das
import (
"bytes"
"encoding/hex"
"errors"
"io/ioutil"
"testing"
"github.com/ethereum/go-ethereum/crypto"
"github.com/offchainlabs/nitro/arbstate/daprovider"
"github.com/offchainlabs/nitro/util/signature"
)
func checkSig(keyDir string, message []byte, timeout uint64, sig []byte) (*daprovider.DataAvailabilityCertificate, error) {
pubkeyEncoded, err := ioutil.ReadFile(keyDir + "/ecdsa.pub")
if err != nil {
return nil, err
}
pubkey, err := hex.DecodeString(string(pubkeyEncoded))
if err != nil {
return nil, err
}
verified := crypto.VerifySignature(pubkey, dasStoreHash(message, timeout), sig[:64])
if !verified {
return nil, errors.New("signature verification failed")
}
return nil, nil
}
func TestExtraSignatureCheck(t *testing.T) {
keyDir := t.TempDir()
err := GenerateAndStoreECDSAKeys(keyDir)
Require(t, err)
privateKey, err := crypto.LoadECDSA(keyDir + "/ecdsa")
Require(t, err)
signer := signature.DataSignerFromPrivateKey(privateKey)
msg := []byte("Hello world")
timeout := uint64(1234)
sig, err := applyDasSigner(signer, msg, timeout)
Require(t, err)
_, err = checkSig(keyDir, msg, timeout, sig)
Require(t, err)
}
func TestSimpleSignatureCheck(t *testing.T) {
keyDir := t.TempDir()
err := GenerateAndStoreECDSAKeys(keyDir)
Require(t, err)
privateKey, err := crypto.LoadECDSA(keyDir + "/ecdsa")
Require(t, err)
data := []byte("Hello World")
dataHash := crypto.Keccak256(data)
sig, err := crypto.Sign(dataHash, privateKey)
Require(t, err)
pubkeyEncoded, err := ioutil.ReadFile(keyDir + "/ecdsa.pub")
Require(t, err)
pubkey, err := hex.DecodeString(string(pubkeyEncoded))
Require(t, err)
verified := crypto.VerifySignature(pubkey, dataHash, sig[:64])
if !verified {
Fail(t, "Signature not verified")
}
}
func TestEvenSimplerSignatureCheck(t *testing.T) {
privateKey, err := crypto.GenerateKey()
Require(t, err)
data := []byte("Hello World")
dataHash := crypto.Keccak256(data)
sig, err := crypto.Sign(dataHash, privateKey)
Require(t, err)
pubkey, err := crypto.SigToPub(dataHash, sig)
Require(t, err)
if !bytes.Equal(crypto.FromECDSAPub(pubkey), crypto.FromECDSAPub(&privateKey.PublicKey)) {
Fail(t, "Derived pubkey doesn't match pubkey")
}
verified := crypto.VerifySignature(crypto.FromECDSAPub(&privateKey.PublicKey), dataHash, sig[:64])
if !verified {
Fail(t, "Signature not verified")
}
}