Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 21 additions & 0 deletions note/note_cosigv1.go
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,27 @@ const (
timestampSize = 8
)


// GenerateMLDSASignerKey generates a named signer and verifier key pair. The signer key skey is private and must be kept secret.
func GenerateMLDSASignerKey(name string) (skey string, vkey string, err error) {
if !isValidName(name) {
return "", "", errSignerID
}
secK, err := mldsa.GenerateKey(mldsa.MLDSA44())
if err != nil {
return "", "", err
}
secKBytes := append([]byte{algMLDSA44}, secK.Bytes()...)
pubKBytes := append([]byte{algMLDSA44}, secK.PublicKey().Bytes()...)

h := keyHashMLDSA(name, pubKBytes)

skey = fmt.Sprintf("PRIVATE+KEY+%s+%08x+%s", name, h, base64.StdEncoding.EncodeToString(secKBytes))
vkey = fmt.Sprintf("%s+%08x+%s", name, h, base64.StdEncoding.EncodeToString(pubKBytes))

return skey, vkey, nil
}

// NewMLDSASigner returns a signer for MLDSA cosignature v1.
func NewMLDSASigner(skey string) (*SubtreeSigner, error) {
priv1, skey, _ := strings.Cut(skey, "+")
Expand Down
89 changes: 47 additions & 42 deletions note/note_cosigv1_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,12 +6,9 @@ package note

import (
"crypto/rand"
"encoding/base64"
"fmt"
"testing"
"time"

"filippo.io/mldsa"
"golang.org/x/mod/sumdb/note"
)

Expand Down Expand Up @@ -51,7 +48,7 @@ func TestSignerRoundtrip(t *testing.T) {
}
}

func TestMLDSASignerVerifierRoundtrip(t *testing.T) {
func TestCosignnatureV1RoundTrip(t *testing.T) {
edSk, edPk := mustGenerateEd25519Key(t, "ed25519")
mlSk, mlPk := mustGenerateMLDSAKey(t, "mldsa")
for _, test := range []struct {
Expand Down Expand Up @@ -96,33 +93,6 @@ func TestMLDSASignerVerifierRoundtrip(t *testing.T) {
}
}

func TestSignerVerifierRoundtrip(t *testing.T) {
skey, vkey, err := note.GenerateKey(rand.Reader, "test")
if err != nil {
t.Fatal(err)
}

s, err := NewSignerForCosignatureV1(skey)
if err != nil {
t.Fatal(err)
}

v, err := NewVerifierForCosignatureV1(vkey)
if err != nil {
t.Fatal(err)
}

msg := "test\n123\nf+7CoKgXKE/tNys9TTXcr/ad6U/K3xvznmzew9y6SP0=\n"
n, err := note.Sign(&note.Note{Text: msg}, s)
if err != nil {
t.Fatal(err)
}

if _, err := note.Open(n, note.VerifierList(v)); err != nil {
t.Fatal(err)
}
}

func TestVerifierInvalidSig(t *testing.T) {
skey, _, err := note.GenerateKey(rand.Reader, "test")
if err != nil {
Expand Down Expand Up @@ -200,7 +170,7 @@ func TestCoSigV1NewVerifier(t *testing.T) {
wantErr: true,
}, {
name: "incorrect keyhash",
pubK: "rekor.sigstore.dev" + "+" + "00000000" + "+" + sigStoreKeyMaterial,
pubK: "rekor.sigstore.dev+00000000+" + sigStoreKeyMaterial,
wantErr: true,
},
} {
Expand Down Expand Up @@ -358,6 +328,49 @@ func TestMLDSAInvalidTimestamp(t *testing.T) {
}
}

func TestGenerateMLDSASignerKey(t *testing.T) {
for _, test := range []struct {
name string
wantErr bool
}{
{
name: "valid",
},
{
name: "invalid name",
wantErr: true,
},
} {
t.Run(test.name, func(t *testing.T) {
skey, vkey, err := GenerateMLDSASignerKey(test.name)
if gotErr := err != nil; gotErr != test.wantErr {
t.Fatalf("GenerateMLDSASignerKey(%q) error = %v, wantErr %v", test.name, err, test.wantErr)
}
if test.wantErr {
return
}
// Roundtrip check
s, err := NewMLDSASigner(skey)
if err != nil {
t.Fatalf("NewMLDSASigner(%q): %v", skey, err)
}
v, err := NewMLDSAVerifier(vkey)
if err != nil {
t.Fatalf("NewMLDSAVerifier(%q): %v", vkey, err)
}
if s.Name() != test.name {
t.Errorf("Signer name = %q, want %q", s.Name(), test.name)
}
if v.Name() != test.name {
t.Errorf("Verifier name = %q, want %q", v.Name(), test.name)
}
if s.KeyHash() != v.KeyHash() {
t.Errorf("Signer hash %08x != Verifier hash %08x", s.KeyHash(), v.KeyHash())
}
})
}
}

func mustGenerateEd25519Key(t *testing.T, name string) (string, string) {
t.Helper()
skey, vkey, err := note.GenerateKey(rand.Reader, name)
Expand All @@ -369,17 +382,9 @@ func mustGenerateEd25519Key(t *testing.T, name string) (string, string) {

func mustGenerateMLDSAKey(t *testing.T, name string) (string, string) {
t.Helper()
key, err := mldsa.GenerateKey(mldsa.MLDSA44())
skey, vkey, err := GenerateMLDSASignerKey(name)
if err != nil {
t.Fatalf("Failed to generate MLDSA key: %v", err)
t.Fatalf("GenerateMLDSASignerKey(%q): %v", name, err)
}
privBytes := key.Bytes()
pubBytes := key.PublicKey().Bytes()

pubKeyWithAlg := append([]byte{algMLDSA44}, pubBytes...)
hash := keyHashMLDSA(name, pubKeyWithAlg)

skey := fmt.Sprintf("PRIVATE+KEY+%s+%08x+%s", name, hash, base64.StdEncoding.EncodeToString(append([]byte{algMLDSA44}, privBytes...)))
vkey := fmt.Sprintf("%s+%08x+%s", name, hash, base64.StdEncoding.EncodeToString(pubKeyWithAlg))
return skey, vkey
}
Loading