nim-eth/eth/keyfile/keyfile.nim

408 lines
12 KiB
Nim
Raw Normal View History

2019-02-05 10:45:09 +00:00
#
# Ethereum KeyFile
# (c) Copyright 2018
# Status Research & Development GmbH
#
# Licensed under either of
# Apache License, version 2.0, (LICENSE-APACHEv2)
# MIT license (LICENSE-MIT)
{.push raises: [Defect].}
2019-02-05 10:45:09 +00:00
import nimcrypto/[bcmode, hmac, rijndael, pbkdf2, sha2, sysrand, utils, keccak],
2020-04-07 09:56:25 +00:00
eth/keys, json, uuid, strutils, stew/results
2020-04-07 09:56:25 +00:00
export results
2019-02-05 10:45:09 +00:00
const
# Version 3 constants
SaltSize = 16
DKLen = 32
MaxDKLen = 128
ScryptR = 1
ScryptP = 8
Pbkdf2WorkFactor = 1_000_000
ScryptWorkFactor = 262_144
type
KeyFileError* = enum
RandomError = "kf: Random generator error"
UuidError = "kf: UUID generator error"
BufferOverrun = "kf: Supplied buffer is too small"
IncorrectDKLen = "kf: `dklen` parameter is 0 or more then MaxDKLen"
MalformedError = "kf: JSON has incorrect structure"
NotImplemented = "kf: Feature is not implemented"
NotSupported = "kf: Feature is not supported"
EmptyMac = "kf: `mac` parameter is zero length or not in hexadecimal form"
EmptyCiphertext = "kf: `ciphertext` parameter is zero length or not in hexadecimal format"
EmptySalt = "kf: `salt` parameter is zero length or not in hexadecimal format"
EmptyIV = "kf: `cipherparams.iv` parameter is zero length or not in hexadecimal format"
IncorrectIV = "kf: Size of IV vector is not equal to cipher block size"
PrfNotSupported = "kf: PRF algorithm for PBKDF2 is not supported"
KdfNotSupported = "kf: KDF algorithm is not supported"
CipherNotSupported = "kf: `cipher` parameter is not supported"
IncorrectMac = "kf: `mac` verification failed"
IncorrectPrivateKey = "kf: incorrect private key"
OsError = "kf: OS specific error"
JsonError = "kf: JSON encoder/decoder error"
2019-02-05 10:45:09 +00:00
KdfKind* = enum
PBKDF2, ## PBKDF2
SCRYPT ## SCRYPT
HashKind* = enum
HashNoSupport, HashSHA2_224, HashSHA2_256, HashSHA2_384, HashSHA2_512,
HashKECCAK224, HashKECCAK256, HashKECCAK384, HashKECCAK512,
HashSHA3_224, HashSHA3_256, HashSHA3_384, HashSHA3_512
CryptKind* = enum
CipherNoSupport, ## Cipher not supported
AES128CTR ## AES-128-CTR
KfResult*[T] = Result[T, KeyFileError]
proc mapErrTo[T, E](r: Result[T, E], v: static KeyFileError): KfResult[T] =
r.mapErr(proc (e: E): KeyFileError = v)
2019-02-05 10:45:09 +00:00
const
SupportedHashes = [
"sha224", "sha256", "sha384", "sha512",
"keccak224", "keccak256", "keccak384", "keccak512",
"sha3_224", "sha3_256", "sha3_384", "sha3_512"
]
SupportedHashesKinds = [
HashSHA2_224, HashSHA2_256, HashSHA2_384, HashSHA2_512,
HashKECCAK224, HashKECCAK256, HashKECCAK384, HashKECCAK512,
HashSHA3_224, HashSHA3_256, HashSHA3_384, HashSHA3_512
]
proc `$`(k: KdfKind): string =
case k
of SCRYPT:
result = "scrypt"
else:
result = "pbkdf2"
proc `$`(k: CryptKind): string =
case k
of AES128CTR:
result = "aes-128-ctr"
else:
result = "aes-128-ctr"
proc getPrfHash(prf: string): HashKind =
result = HashNoSupport
let p = prf.toLowerAscii()
if p.startsWith("hmac-"):
var hash = p[5..^1]
var res = SupportedHashes.find(hash)
if res >= 0:
result = SupportedHashesKinds[res]
else:
result = HashNoSupport
proc getCipher(c: string): CryptKind =
var cl = c.toLowerAscii()
if cl == "aes-128-ctr":
result = AES128CTR
else:
result = CipherNoSupport
proc deriveKey(password: string,
salt: string,
kdfkind: KdfKind,
hashkind: HashKind,
workfactor: int): KfResult[array[DKLen, byte]] =
if kdfkind == PBKDF2:
var output: array[DKLen, byte]
2019-02-05 10:45:09 +00:00
var c = if workfactor == 0: Pbkdf2WorkFactor else: workfactor
case hashkind
of HashSHA2_224:
var ctx: HMAC[sha224]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashSHA2_256:
var ctx: HMAC[sha256]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashSHA2_384:
var ctx: HMAC[sha384]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashSHA2_512:
var ctx: HMAC[sha512]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashKECCAK224:
var ctx: HMAC[keccak224]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashKECCAK256:
var ctx: HMAC[keccak256]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashKECCAK384:
var ctx: HMAC[keccak384]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashKECCAK512:
var ctx: HMAC[keccak512]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashSHA3_224:
var ctx: HMAC[sha3_224]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashSHA3_256:
var ctx: HMAC[sha3_256]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashSHA3_384:
var ctx: HMAC[sha3_384]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
of HashSHA3_512:
var ctx: HMAC[sha3_512]
discard ctx.pbkdf2(password, salt, c, output)
ok(output)
2019-02-05 10:45:09 +00:00
else:
err(PrfNotSupported)
else:
err(NotImplemented)
2019-02-05 10:45:09 +00:00
proc encryptKey(seckey: PrivateKey,
cryptkind: CryptKind,
key: openarray[byte],
iv: openarray[byte]): KfResult[array[KeyLength, byte]] =
2019-02-05 10:45:09 +00:00
if cryptkind == AES128CTR:
var crypttext: array[KeyLength, byte]
2019-02-05 10:45:09 +00:00
var ctx: CTR[aes128]
ctx.init(toOpenArray(key, 0, 15), iv)
ctx.encrypt(seckey.toRaw(), crypttext)
2019-02-05 10:45:09 +00:00
ctx.clear()
ok(crypttext)
2019-02-05 10:45:09 +00:00
else:
err(NotImplemented)
2019-02-05 10:45:09 +00:00
proc decryptKey(ciphertext: openarray[byte],
cryptkind: CryptKind,
key: openarray[byte],
iv: openarray[byte]): KfResult[array[KeyLength, byte]] =
2019-02-05 10:45:09 +00:00
if cryptkind == AES128CTR:
if len(iv) != aes128.sizeBlock:
return err(IncorrectIV)
var plaintext: array[KeyLength, byte]
2019-02-05 10:45:09 +00:00
var ctx: CTR[aes128]
ctx.init(toOpenArray(key, 0, 15), iv)
ctx.decrypt(ciphertext, plaintext)
ctx.clear()
ok(plaintext)
2019-02-05 10:45:09 +00:00
else:
err(NotImplemented)
2019-02-05 10:45:09 +00:00
proc kdfParams(kdfkind: KdfKind, salt: string, workfactor: int): KfResult[JsonNode] =
2019-02-05 10:45:09 +00:00
if kdfkind == SCRYPT:
let wf = if workfactor == 0: ScryptWorkFactor else: workfactor
ok(%*
2019-02-05 10:45:09 +00:00
{
"dklen": DKLen,
"n": wf,
"r": ScryptR,
"p": ScryptP,
"salt": salt
}
)
2019-02-05 10:45:09 +00:00
elif kdfkind == PBKDF2:
let wf = if workfactor == 0: Pbkdf2WorkFactor else: workfactor
ok(%*
2019-02-05 10:45:09 +00:00
{
"dklen": DKLen,
"c": wf,
"prf": "hmac-sha256",
"salt": salt
}
)
2019-02-05 10:45:09 +00:00
else:
err(NotImplemented)
2019-02-05 10:45:09 +00:00
proc decodeHex(m: string): seq[byte] =
if len(m) > 0:
try:
2019-10-29 11:45:57 +00:00
result = utils.fromHex(m)
except CatchableError:
2019-02-05 10:45:09 +00:00
result = newSeq[byte]()
else:
result = newSeq[byte]()
proc decodeSalt(m: string): string =
var sarr: seq[byte]
if len(m) > 0:
try:
2019-10-29 11:45:57 +00:00
sarr = utils.fromHex(m)
2019-02-05 10:45:09 +00:00
result = newString(len(sarr))
copyMem(addr result[0], addr sarr[0], len(sarr))
except CatchableError:
2019-02-05 10:45:09 +00:00
result = ""
else:
result = ""
proc compareMac(m1: openarray[byte], m2: openarray[byte]): bool =
if len(m1) == len(m2) and len(m1) > 0:
result = equalMem(unsafeAddr m1[0], unsafeAddr m2[0], len(m1))
proc createKeyFileJson*(seckey: PrivateKey,
password: string,
version: int = 3,
cryptkind: CryptKind = AES128CTR,
kdfkind: KdfKind = PBKDF2,
workfactor: int = 0): KfResult[JsonNode] =
2019-02-05 10:45:09 +00:00
## Create JSON object with keyfile structure.
##
## ``seckey`` - private key, which will be stored
## ``password`` - encryption password
## ``outjson`` - result JSON object
## ``version`` - version of keyfile format (default is 3)
## ``cryptkind`` - algorithm for private key encryption
## (default is AES128-CTR)
## ``kdfkind`` - algorithm for key deriviation function (default is PBKDF2)
## ``workfactor`` - Key deriviation function work factor, 0 is to use
## default workfactor.
var iv: array[aes128.sizeBlock, byte]
var salt: array[SaltSize, byte]
var saltstr = newString(SaltSize)
if randomBytes(iv) != aes128.sizeBlock:
return err(RandomError)
2019-02-05 10:45:09 +00:00
if randomBytes(salt) != SaltSize:
return err(RandomError)
2019-02-05 10:45:09 +00:00
copyMem(addr saltstr[0], addr salt[0], SaltSize)
let u = ? uuidGenerate().mapErrTo(UuidError)
2019-02-05 10:45:09 +00:00
if kdfkind != PBKDF2:
return err(NotImplemented)
let
dkey = ? deriveKey(password, saltstr, kdfkind, HashSHA2_256, workfactor)
ciphertext = ? encryptKey(seckey, cryptkind, dkey, iv)
2019-02-05 10:45:09 +00:00
var ctx: keccak256
ctx.init()
ctx.update(toOpenArray(dkey, 16, 31))
ctx.update(ciphertext)
var mac = ctx.finish()
ctx.clear()
let params = ? kdfParams(kdfkind, toHex(salt, true), workfactor)
2019-02-05 10:45:09 +00:00
ok(%*
2019-02-05 10:45:09 +00:00
{
"address": (? seckey.toPublicKey().mapErrTo(IncorrectPrivateKey)).toAddress(false),
2019-02-05 10:45:09 +00:00
"crypto": {
"cipher": $cryptkind,
"cipherparams": {
"iv": toHex(iv, true)
},
"ciphertext": toHex(ciphertext, true),
"kdf": $kdfkind,
"kdfparams": params,
"mac": toHex(mac.data, true),
},
"id": $u,
"version": version
}
)
2019-02-05 10:45:09 +00:00
proc decodeKeyFileJson*(j: JsonNode,
password: string): KfResult[PrivateKey] =
2019-02-05 10:45:09 +00:00
## Decode private key into ``seckey`` from keyfile json object ``j`` using
## password string ``password``.
var crypto = j.getOrDefault("crypto")
if isNil(crypto):
return err(MalformedError)
2019-02-05 10:45:09 +00:00
var kdf = crypto.getOrDefault("kdf")
if isNil(kdf):
return err(MalformedError)
2019-02-05 10:45:09 +00:00
var cipherparams = crypto.getOrDefault("cipherparams")
if isNil(cipherparams):
return err(MalformedError)
2019-02-05 10:45:09 +00:00
if kdf.getStr() == "pbkdf2":
var params = crypto.getOrDefault("kdfparams")
if isNil(params):
return err(MalformedError)
2019-02-05 10:45:09 +00:00
var salt = decodeSalt(params.getOrDefault("salt").getStr())
var ciphertext = decodeHex(crypto.getOrDefault("ciphertext").getStr())
var mactext = decodeHex(crypto.getOrDefault("mac").getStr())
var cryptkind = getCipher(crypto.getOrDefault("cipher").getStr())
var iv = decodeHex(cipherparams.getOrDefault("iv").getStr())
if len(salt) == 0:
return err(EmptySalt)
2019-02-05 10:45:09 +00:00
if len(ciphertext) == 0:
return err(EmptyCiphertext)
2019-02-05 10:45:09 +00:00
if len(mactext) == 0:
return err(EmptyMac)
2019-02-05 10:45:09 +00:00
if cryptkind == CipherNoSupport:
return err(CipherNotSupported)
2019-02-05 10:45:09 +00:00
var dklen = params.getOrDefault("dklen").getInt()
var c = params.getOrDefault("c").getInt()
var hash = getPrfHash(params.getOrDefault("prf").getStr())
if hash == HashNoSupport:
return err(PrfNotSupported)
2019-02-05 10:45:09 +00:00
if dklen == 0 or dklen > MaxDKLen:
return err(IncorrectDKLen)
2019-02-05 10:45:09 +00:00
if len(ciphertext) != KeyLength:
return err(IncorrectPrivateKey)
2019-02-05 10:45:09 +00:00
let dkey = ? deriveKey(password, salt, PBKDF2, hash, c)
2019-02-05 10:45:09 +00:00
var ctx: keccak256
ctx.init()
ctx.update(toOpenArray(dkey, 16, 31))
ctx.update(ciphertext)
var mac = ctx.finish()
if not compareMac(mac.data, mactext):
return err(IncorrectMac)
2019-02-05 10:45:09 +00:00
let plaintext = ? decryptKey(ciphertext, cryptkind, dkey, iv)
PrivateKey.fromRaw(plaintext).mapErrTo(IncorrectPrivateKey)
2019-02-05 10:45:09 +00:00
else:
err(KdfNotSupported)
2019-02-05 10:45:09 +00:00
proc loadKeyFile*(pathname: string,
password: string): KfResult[PrivateKey] =
2019-02-05 10:45:09 +00:00
## Load and decode private key ``seckey`` from file with pathname
## ``pathname``, using password string ``password``.
var data: JsonNode
try:
data = json.parseFile(pathname)
except JsonParsingError:
return err(JsonError)
except Exception: # json raises Exception
return err(OsError)
2019-02-05 10:45:09 +00:00
decodeKeyFileJson(data, password)
2019-02-05 10:45:09 +00:00
proc saveKeyFile*(pathname: string,
jobject: JsonNode): KfResult[void] =
2019-02-05 10:45:09 +00:00
## Save JSON object ``jobject`` to file with pathname ``pathname``.
var
f: File
if not f.open(pathname, fmWrite):
return err(OsError)
2019-02-05 10:45:09 +00:00
try:
f.write($jobject)
ok()
except CatchableError:
err(OsError)
2019-02-05 10:45:09 +00:00
finally:
f.close()