diff --git a/libp2p/crypto/crypto.nim b/libp2p/crypto/crypto.nim index 83401f4a0..49416d504 100644 --- a/libp2p/crypto/crypto.nim +++ b/libp2p/crypto/crypto.nim @@ -8,14 +8,15 @@ ## those terms. ## This module implements Public Key and Private Key interface for libp2p. -import strutils import rsa, ecnist, ed25519/ed25519, secp -import ../protobuf/minprotobuf, ../vbuffer +import ../protobuf/minprotobuf, ../vbuffer, ../multihash, ../multicodec import nimcrypto/[rijndael, blowfish, sha, sha2, hash, hmac, utils] # This is workaround for Nim's `import` bug export rijndael, blowfish, sha, sha2, hash, hmac, utils +from strutils import split + type PKScheme* = enum RSA = 0, @@ -463,7 +464,7 @@ proc verify*(sig: Signature, message: openarray[byte], if signature.init(sig.data): result = signature.verify(message, key.skkey) -template makeSecret(buffer, hmactype, secret, seed) = +template makeSecret(buffer, hmactype, secret, seed: untyped) {.dirty.}= var ctx: hmactype var j = 0 # We need to strip leading zeros, because Go bigint serialization do it. @@ -489,16 +490,16 @@ template makeSecret(buffer, hmactype, secret, seed) = ctx.update(a.data) a = ctx.finish() -proc stretchKeys*(cipherScheme: CipherScheme, hashScheme: DigestSheme, - secret: openarray[byte]): Secret = +proc stretchKeys*(cipherType: string, hashType: string, + sharedSecret: seq[byte]): Secret = ## Expand shared secret to cryptographic keys. - if cipherScheme == Aes128: + if cipherType == "AES-128": result.ivsize = aes128.sizeBlock result.keysize = aes128.sizeKey - elif cipherScheme == Aes256: + elif cipherType == "AES-256": result.ivsize = aes256.sizeBlock result.keysize = aes256.sizeKey - elif cipherScheme == Blowfish: + elif cipherType == "BLOWFISH": result.ivsize = 8 result.keysize = 32 @@ -507,12 +508,12 @@ proc stretchKeys*(cipherScheme: CipherScheme, hashScheme: DigestSheme, let length = result.ivsize + result.keysize + result.macsize result.data = newSeq[byte](2 * length) - if hashScheme == Sha256: - makeSecret(result.data, HMAC[sha256], secret, seed) - elif hashScheme == Sha512: - makeSecret(result.data, HMAC[sha512], secret, seed) - elif hashScheme == Sha1: - makeSecret(result.data, HMAC[sha1], secret, seed) + if hashType == "SHA256": + makeSecret(result.data, HMAC[sha256], sharedSecret, seed) + elif hashType == "SHA512": + makeSecret(result.data, HMAC[sha512], sharedSecret, seed) + elif hashType == "SHA1": + makeSecret(result.data, HMAC[sha1], sharedSecret, seed) template goffset*(secret, id, o: untyped): untyped = id * (len(secret.data) shr 1) + o @@ -561,11 +562,27 @@ proc ephemeral*(scheme: ECDHEScheme): KeyPair = result.seckey.eckey = keypair.seckey result.pubkey.eckey = keypair.pubkey +proc ephemeral*(scheme: string): KeyPair {.inline.} = + ## Generate ephemeral keys used to perform ECDHE using string encoding. + ## + ## Currently supported encoding strings are P-256, P-384, P-521, if encoding + ## string is not supported P-521 key will be generated. + if scheme == "P-256": + result = ephemeral(Secp256r1) + elif scheme == "P-384": + result = ephemeral(Secp384r1) + elif scheme == "P-521": + result = ephemeral(Secp521r1) + else: + result = ephemeral(Secp521r1) + proc makeSecret*(remoteEPublic: PublicKey, localEPrivate: PrivateKey, data: var openarray[byte]): int = ## Calculate shared secret using remote ephemeral public key ## ``remoteEPublic`` and local ephemeral private key ``localEPrivate`` and - ## store shared secret to ``data`` + ## store shared secret to ``data``. + ## + ## Note this procedure supports only ECDSA keys. ## ## Returns number of bytes (octets) used to store shared secret data, or ## ``0`` on error. @@ -573,6 +590,19 @@ proc makeSecret*(remoteEPublic: PublicKey, localEPrivate: PrivateKey, if localEPrivate.scheme == remoteEPublic.scheme: result = toSecret(remoteEPublic.eckey, localEPrivate.eckey, data) +proc getSecret*(remoteEPublic: PublicKey, + localEPrivate: PrivateKey): seq[byte] = + ## Calculate shared secret using remote ephemeral public key + ## ``remoteEPublic`` and local ephemeral private key ``localEPrivate`` and + ## store shared secret to ``data``. + ## + ## Note this procedure supports only ECDSA keys. + ## + ## Returns shared secret on success. + if remoteEPublic.scheme == ECDSA: + if localEPrivate.scheme == remoteEPublic.scheme: + result = getSecret(remoteEPublic.eckey, localEPrivate.eckey) + proc getOrder*(remotePubkey, localNonce: openarray[byte], localPubkey, remoteNonce: openarray[byte]): int = ## Compare values and calculate `order` parameter. @@ -585,10 +615,16 @@ proc getOrder*(remotePubkey, localNonce: openarray[byte], ctx.update(localPubkey) ctx.update(remoteNonce) var digest2 = ctx.finish() - var diff = 0 - for i in 0 ..< len(digest1.data): - diff = int(digest1.data[i]) - int(digest2.data[i]) - result = (result and -not(diff)) or diff + var mh1 = MultiHash.init(multiCodec("sha2-256"), digest1) + var mh2 = MultiHash.init(multiCodec("sha2-256"), digest2) + for i in 0 ..< len(mh1.data.buffer): + result = int(mh1.data.buffer[i]) - int(mh2.data.buffer[i]) + if result != 0: + if result > 0: + result = -1 + elif result > 0: + result = 1 + break proc selectBest*(order: int, p1, p2: string): string = ## Determines which algorithm to use from list `p1` and `p2`. @@ -610,10 +646,14 @@ proc selectBest*(order: int, p1, p2: string): string = for selement in s: if felement == selement: result = felement - break + return proc createProposal*(nonce, pubkey: openarray[byte], exchanges, ciphers, hashes: string): seq[byte] = + ## Create SecIO proposal message using random ``nonce``, local public key + ## ``pubkey``, comma-delimieted list of supported exchange schemes + ## ``exchanges``, comma-delimeted list of supported ciphers ``ciphers`` and + ## comma-delimeted list of supported hashes ``hashes``. var msg = initProtoBuffer({WithUint32BeLength}) msg.write(initProtoField(1, nonce)) msg.write(initProtoField(2, pubkey)) @@ -623,13 +663,42 @@ proc createProposal*(nonce, pubkey: openarray[byte], msg.finish() shallowCopy(result, msg.buffer) +proc decodeProposal*(message: seq[byte], nonce, pubkey: var seq[byte], + exchanges, ciphers, hashes: var string): bool = + ## Parse incoming proposal message and decode remote random nonce ``nonce``, + ## remote public key ``pubkey``, comma-delimieted list of supported exchange + ## schemes ``exchanges``, comma-delimeted list of supported ciphers + ## ``ciphers`` and comma-delimeted list of supported hashes ``hashes``. + ## + ## Procedure returns ``true`` on success and ``false`` on error. + var pb = initProtoBuffer(message) + if pb.getLengthValue(1, nonce) != -1 and + pb.getLengthValue(2, pubkey) != -1 and + pb.getLengthValue(3, exchanges) != -1 and + pb.getLengthValue(4, ciphers) != -1 and + pb.getLengthValue(5, hashes) != -1: + result = true + proc createExchange*(epubkey, signature: openarray[byte]): seq[byte] = + ## Create SecIO exchange message using ephemeral public key ``epubkey`` and + ## signature of proposal blocks ``signature``. var msg = initProtoBuffer({WithUint32BeLength}) msg.write(initProtoField(1, epubkey)) msg.write(initProtoField(2, signature)) msg.finish() shallowCopy(result, msg.buffer) +proc decodeExchange*(message: seq[byte], + pubkey, signature: var seq[byte]): bool = + ## Parse incoming exchange message and decode remote ephemeral public key + ## ``pubkey`` and signature ``signature``. + ## + ## Procedure returns ``true`` on success and ``false`` on error. + var pb = initProtoBuffer(message) + if pb.getLengthValue(1, pubkey) != -1 and + pb.getLengthValue(2, signature) != -1: + result = true + ## Serialization/Deserialization helpers proc write*(vb: var VBuffer, pubkey: PublicKey) {.inline.} = diff --git a/libp2p/crypto/ecnist.nim b/libp2p/crypto/ecnist.nim index 81ab34a5c..7d37c3a8f 100644 --- a/libp2p/crypto/ecnist.nim +++ b/libp2p/crypto/ecnist.nim @@ -141,36 +141,48 @@ template getPublicKeyLength*(curve: EcCurveKind): int = of Secp521r1: PubKey521Length +template getPrivateKeyLength*(curve: EcCurveKind): int = + case curve + of Secp256r1: + SecKey256Length + of Secp384r1: + SecKey384Length + of Secp521r1: + SecKey521Length + proc copy*[T: EcPKI](dst: var T, src: T): bool = ## Copy EC `private key`, `public key` or `signature` ``src`` to ``dst``. ## ## Returns ``true`` on success, ``false`` otherwise. - dst = new T - when T is EcPrivateKey: - let length = src.key.xlen - if length > 0 and len(src.buffer) > 0: - let offset = getOffset(src) - if offset >= 0: - dst.buffer = src.buffer - dst.key.curve = src.key.curve - dst.key.xlen = length - dst.key.x = cast[ptr cuchar](addr dst.buffer[offset]) - result = true - elif T is EcPublicKey: - let length = src.key.qlen - if length > 0 and len(src.buffer) > 0: - let offset = getOffset(src) - if offset >= 0: - dst.buffer = src.buffer - dst.key.curve = src.key.curve - dst.key.qlen = length - dst.key.q = cast[ptr cuchar](addr dst.buffer[offset]) - result = true + if isNil(src): + result = false else: - let length = len(src.buffer) - if length > 0: - dst.buffer = src.buffer - result = true + dst = new T + when T is EcPrivateKey: + let length = src.key.xlen + if length > 0 and len(src.buffer) > 0: + let offset = getOffset(src) + if offset >= 0: + dst.buffer = src.buffer + dst.key.curve = src.key.curve + dst.key.xlen = length + dst.key.x = cast[ptr cuchar](addr dst.buffer[offset]) + result = true + elif T is EcPublicKey: + let length = src.key.qlen + if length > 0 and len(src.buffer) > 0: + let offset = getOffset(src) + if offset >= 0: + dst.buffer = src.buffer + dst.key.curve = src.key.curve + dst.key.qlen = length + dst.key.q = cast[ptr cuchar](addr dst.buffer[offset]) + result = true + else: + let length = len(src.buffer) + if length > 0: + dst.buffer = src.buffer + result = true proc copy*[T: EcPKI](src: T): T {.inline.} = ## Returns copy of EC `private key`, `public key` or `signature` @@ -180,6 +192,7 @@ proc copy*[T: EcPKI](src: T): T {.inline.} = proc clear*[T: EcPKI|EcKeyPair](pki: var T) = ## Wipe and clear EC `private key`, `public key` or `signature` object. + doAssert(not isNil(pki)) when T is EcPrivateKey: burnMem(pki.buffer) pki.buffer.setLen(0) @@ -228,6 +241,7 @@ proc random*(t: typedesc[EcPrivateKey], kind: EcCurveKind): EcPrivateKey = proc getKey*(seckey: EcPrivateKey): EcPublicKey = ## Calculate and return EC public key from private key ``seckey``. + doAssert(not isNil(seckey)) var ecimp = brEcGetDefault() if seckey.key.curve in EcSupportedCurvesCint: var length = getPublicKeyLength(cast[EcCurveKind](seckey.key.curve)) @@ -250,8 +264,9 @@ proc random*(t: typedesc[EcKeyPair], kind: EcCurveKind): EcKeyPair {.inline.} = proc `$`*(seckey: EcPrivateKey): string = ## Return string representation of EC private key. - if seckey.key.curve == 0 or seckey.key.xlen == 0 or len(seckey.buffer) == 0: - result = "Empty key" + if isNil(seckey) or seckey.key.curve == 0 or seckey.key.xlen == 0 or + len(seckey.buffer) == 0: + result = "Empty or uninitialized ECNIST key" else: if seckey.key.curve notin EcSupportedCurvesCint: result = "Unknown key" @@ -265,8 +280,9 @@ proc `$`*(seckey: EcPrivateKey): string = proc `$`*(pubkey: EcPublicKey): string = ## Return string representation of EC public key. - if pubkey.key.curve == 0 or pubkey.key.qlen == 0 or len(pubkey.buffer) == 0: - result = "Empty key" + if isNil(pubkey) or pubkey.key.curve == 0 or pubkey.key.qlen == 0 or + len(pubkey.buffer) == 0: + result = "Empty or uninitialized ECNIST key" else: if pubkey.key.curve notin EcSupportedCurvesCint: result = "Unknown key" @@ -280,7 +296,45 @@ proc `$`*(pubkey: EcPublicKey): string = proc `$`*(sig: EcSignature): string = ## Return hexadecimal string representation of EC signature. - result = toHex(sig.buffer) + if isNil(sig) or len(sig.buffer) == 0: + result = "Empty or uninitialized ECNIST signature" + else: + result = toHex(sig.buffer) + +proc toRawBytes*(seckey: EcPrivateKey, data: var openarray[byte]): int = + ## Serialize EC private key ``seckey`` to raw binary form and store it + ## to ``data``. + ## + ## Returns number of bytes (octets) needed to store EC private key, or `0` + ## if private key is not in supported curve. + doAssert(not isNil(seckey)) + if seckey.key.curve in EcSupportedCurvesCint: + result = getPrivateKeyLength(cast[EcCurveKind](seckey.key.curve)) + if len(data) >= result: + copyMem(addr data[0], unsafeAddr seckey.buffer[0], result) + +proc toRawBytes*(pubkey: EcPublicKey, data: var openarray[byte]): int = + ## Serialize EC public key ``pubkey`` to uncompressed form specified in + ## section 4.3.6 of ANSI X9.62. + ## + ## Returns number of bytes (octets) needed to store EC public key, or `0` + ## if public key is not in supported curve. + doAssert(not isNil(pubkey)) + if pubkey.key.curve in EcSupportedCurvesCint: + result = getPublicKeyLength(cast[EcCurveKind](pubkey.key.curve)) + if len(data) >= result: + copyMem(addr data[0], unsafeAddr pubkey.buffer[0], result) + +proc toRawBytes*(sig: EcSignature, data: var openarray[byte]): int = + ## Serialize EC signature ``sig`` to raw binary form and store it to ``data``. + ## + ## Returns number of bytes (octets) needed to store EC signature, or `0` + ## if signature is not in supported curve. + doAssert(not isNil(sig)) + result = len(sig.buffer) + if len(data) >= len(sig.buffer): + if len(sig.buffer) > 0: + copyMem(addr data[0], unsafeAddr sig.buffer[0], len(sig.buffer)) proc toBytes*(seckey: EcPrivateKey, data: var openarray[byte]): int = ## Serialize EC private key ``seckey`` to ASN.1 DER binary form and store it @@ -288,6 +342,7 @@ proc toBytes*(seckey: EcPrivateKey, data: var openarray[byte]): int = ## ## Procedure returns number of bytes (octets) needed to store EC private key, ## or `0` if private key is not in supported curve. + doAssert(not isNil(seckey)) if seckey.key.curve in EcSupportedCurvesCint: var offset, length: int var pubkey = seckey.getKey() @@ -327,6 +382,7 @@ proc toBytes*(pubkey: EcPublicKey, data: var openarray[byte]): int = ## ## Procedure returns number of bytes (octets) needed to store EC public key, ## or `0` if public key is not in supported curve. + doAssert(not isNil(pubkey)) if pubkey.key.curve in EcSupportedCurvesCint: var b = Asn1Buffer.init() var p = Asn1Composite.init(Asn1Tag.Sequence) @@ -357,12 +413,14 @@ proc toBytes*(sig: EcSignature, data: var openarray[byte]): int = ## ## Procedure returns number of bytes (octets) needed to store EC signature, ## or `0` if signature is not in supported curve. + doAssert(not isNil(sig)) result = len(sig.buffer) if len(data) >= result: copyMem(addr data[0], unsafeAddr sig.buffer[0], result) proc getBytes*(seckey: EcPrivateKey): seq[byte] = ## Serialize EC private key ``seckey`` to ASN.1 DER binary form and return it. + doAssert(not isNil(seckey)) if seckey.key.curve in EcSupportedCurvesCint: result = newSeq[byte]() let length = seckey.toBytes(result) @@ -373,6 +431,7 @@ proc getBytes*(seckey: EcPrivateKey): seq[byte] = proc getBytes*(pubkey: EcPublicKey): seq[byte] = ## Serialize EC public key ``pubkey`` to ASN.1 DER binary form and return it. + doAssert(not isNil(pubkey)) if pubkey.key.curve in EcSupportedCurvesCint: result = newSeq[byte]() let length = pubkey.toBytes(result) @@ -383,6 +442,37 @@ proc getBytes*(pubkey: EcPublicKey): seq[byte] = proc getBytes*(sig: EcSignature): seq[byte] = ## Serialize EC signature ``sig`` to ASN.1 DER binary form and return it. + doAssert(not isNil(sig)) + result = newSeq[byte]() + let length = sig.toBytes(result) + result.setLen(length) + discard sig.toBytes(result) + +proc getRawBytes*(seckey: EcPrivateKey): seq[byte] = + ## Serialize EC private key ``seckey`` to raw binary form and return it. + doAssert(not isNil(seckey)) + if seckey.key.curve in EcSupportedCurvesCint: + result = newSeq[byte]() + let length = seckey.toRawBytes(result) + result.setLen(length) + discard seckey.toRawBytes(result) + else: + raise newException(EcKeyIncorrectError, "Incorrect private key") + +proc getRawBytes*(pubkey: EcPublicKey): seq[byte] = + ## Serialize EC public key ``pubkey`` to raw binary form and return it. + doAssert(not isNil(pubkey)) + if pubkey.key.curve in EcSupportedCurvesCint: + result = newSeq[byte]() + let length = pubkey.toRawBytes(result) + result.setLen(length) + discard pubkey.toRawBytes(result) + else: + raise newException(EcKeyIncorrectError, "Incorrect public key") + +proc getRawBytes*(sig: EcSignature): seq[byte] = + ## Serialize EC signature ``sig`` to raw binary form and return it. + doAssert(not isNil(sig)) result = newSeq[byte]() let length = sig.toBytes(result) result.setLen(length) @@ -390,33 +480,54 @@ proc getBytes*(sig: EcSignature): seq[byte] = proc `==`*(pubkey1, pubkey2: EcPublicKey): bool = ## Returns ``true`` if both keys ``pubkey1`` and ``pubkey2`` are equal. - if pubkey1.key.curve != pubkey2.key.curve: - return false - if pubkey1.key.qlen != pubkey2.key.qlen: - return false - let op1 = pubkey1.getOffset() - let op2 = pubkey2.getOffset() - if op1 == -1 or op2 == -1: - return false - result = equalMem(unsafeAddr pubkey1.buffer[op1], - unsafeAddr pubkey2.buffer[op2], pubkey1.key.qlen) + if isNil(pubkey1) and isNil(pubkey2): + result = true + elif isNil(pubkey1) and (not isNil(pubkey2)): + result = false + elif isNil(pubkey2) and (not isNil(pubkey1)): + result = false + else: + if pubkey1.key.curve != pubkey2.key.curve: + return false + if pubkey1.key.qlen != pubkey2.key.qlen: + return false + let op1 = pubkey1.getOffset() + let op2 = pubkey2.getOffset() + if op1 == -1 or op2 == -1: + return false + result = equalMem(unsafeAddr pubkey1.buffer[op1], + unsafeAddr pubkey2.buffer[op2], pubkey1.key.qlen) proc `==`*(seckey1, seckey2: EcPrivateKey): bool = ## Returns ``true`` if both keys ``seckey1`` and ``seckey2`` are equal. - if seckey1.key.curve != seckey2.key.curve: - return false - if seckey1.key.xlen != seckey2.key.xlen: - return false - let op1 = seckey1.getOffset() - let op2 = seckey2.getOffset() - if op1 == -1 or op2 == -1: - return false - result = equalMem(unsafeAddr seckey1.buffer[op1], - unsafeAddr seckey2.buffer[op2], seckey1.key.xlen) + if isNil(seckey1) and isNil(seckey2): + result = true + elif isNil(seckey1) and (not isNil(seckey2)): + result = false + elif isNil(seckey2) and (not isNil(seckey1)): + result = false + else: + if seckey1.key.curve != seckey2.key.curve: + return false + if seckey1.key.xlen != seckey2.key.xlen: + return false + let op1 = seckey1.getOffset() + let op2 = seckey2.getOffset() + if op1 == -1 or op2 == -1: + return false + result = equalMem(unsafeAddr seckey1.buffer[op1], + unsafeAddr seckey2.buffer[op2], seckey1.key.xlen) proc `==`*(sig1, sig2: EcSignature): bool = ## Return ``true`` if both signatures ``sig1`` and ``sig2`` are equal. - result = (sig1.buffer == sig2.buffer) + if isNil(sig1) and isNil(sig2): + result = true + elif isNil(sig1) and (not isNil(sig2)): + result = false + elif isNil(sig2) and (not isNil(sig1)): + result = false + else: + result = (sig1.buffer == sig2.buffer) proc init*(key: var EcPrivateKey, data: openarray[byte]): Asn1Status = ## Initialize EC `private key` or `signature` ``key`` from ASN.1 DER binary @@ -698,6 +809,7 @@ proc scalarMul*(pub: EcPublicKey, sec: EcPrivateKey): EcPublicKey = ## Return scalar multiplication of ``pub`` and ``sec``. ## ## Returns point in curve as ``pub * sec`` or ``nil`` otherwise. + doAssert((not isNil(pub)) and (not isNil(sec))) var impl = brEcGetDefault() if sec.key.curve in EcSupportedCurvesCint: if pub.key.curve == sec.key.curve: @@ -726,6 +838,7 @@ proc toSecret*(pubkey: EcPublicKey, seckey: EcPrivateKey, ## ## ``data`` array length must be at least 32 bytes for `secp256r1`, 48 bytes ## for `secp384r1` and 66 bytes for `secp521r1`. + doAssert((not isNil(pubkey)) and (not isNil(seckey))) var mult = scalarMul(pubkey, seckey) var length = 0 if not isNil(mult): @@ -745,6 +858,7 @@ proc getSecret*(pubkey: EcPublicKey, seckey: EcPrivateKey): seq[byte] = ## shared secret. ## ## If error happens length of result array will be ``0``. + doAssert((not isNil(pubkey)) and (not isNil(seckey))) var data: array[Secret521Length, byte] let res = toSecret(pubkey, seckey, data) if res > 0: @@ -754,6 +868,7 @@ proc getSecret*(pubkey: EcPublicKey, seckey: EcPrivateKey): seq[byte] = proc sign*[T: byte|char](seckey: EcPrivateKey, message: openarray[T]): EcSignature = ## Get ECDSA signature of data ``message`` using private key ``seckey``. + doAssert(not isNil(seckey)) var hc: BrHashCompatContext var hash: array[32, byte] var impl = brEcGetDefault() @@ -785,6 +900,7 @@ proc verify*[T: byte|char](sig: EcSignature, message: openarray[T], ## ## Return ``true`` if message verification succeeded, ``false`` if ## verification failed. + doAssert((not isNil(sig)) and (not isNil(pubkey))) var hc: BrHashCompatContext var hash: array[32, byte] var impl = brEcGetDefault() diff --git a/libp2p/crypto/rsa.nim b/libp2p/crypto/rsa.nim index 0b0ba9543..f2205fd34 100644 --- a/libp2p/crypto/rsa.nim +++ b/libp2p/crypto/rsa.nim @@ -12,7 +12,6 @@ ## This module uses unmodified parts of code from ## BearSSL library ## Copyright(C) 2018 Thomas Pornin . - import nimcrypto/utils import common, minasn1 export Asn1Status @@ -160,6 +159,7 @@ proc random*[T: RsaKP](t: typedesc[T], bits = DefaultKeySize, proc copy*[T: RsaPKI](key: T): T = ## Create copy of RSA private key, public key or signature. + doAssert(not isNil(key)) when T is RsaPrivateKey: if len(key.buffer) > 0: let length = key.seck.plen + key.seck.qlen + key.seck.dplen + @@ -220,6 +220,7 @@ proc copy*[T: RsaPKI](key: T): T = proc getKey*(key: RsaPrivateKey): RsaPublicKey = ## Get RSA public key from RSA private key. + doAssert(not isNil(key)) let length = key.pubk.nlen + key.pubk.elen result = new RsaPublicKey result.buffer = newSeq[byte](length) @@ -241,6 +242,7 @@ proc pubkey*(pair: RsaKeyPair): RsaPublicKey {.inline.} = proc clear*[T: RsaPKI|RsaKeyPair](pki: var T) = ## Wipe and clear EC private key, public key or scalar object. + doAssert(not isNil(pki)) when T is RsaPrivateKey: burnMem(pki.buffer) pki.buffer.setLen(0) @@ -276,6 +278,7 @@ proc toBytes*(key: RsaPrivateKey, data: var openarray[byte]): int = ## ## Procedure returns number of bytes (octets) needed to store RSA private key, ## or `0` if private key is is incorrect. + doAssert(not isNil(key)) if len(key.buffer) > 0: var b = Asn1Buffer.init() var p = Asn1Composite.init(Asn1Tag.Sequence) @@ -308,6 +311,7 @@ proc toBytes*(key: RsaPublicKey, data: var openarray[byte]): int = ## ## Procedure returns number of bytes (octets) needed to store RSA public key, ## or `0` if public key is incorrect. + doAssert(not isNil(key)) if len(key.buffer) > 0: var b = Asn1Buffer.init() var p = Asn1Composite.init(Asn1Tag.Sequence) @@ -337,6 +341,7 @@ proc toBytes*(sig: RsaSignature, data: var openarray[byte]): int = ## ## Procedure returns number of bytes (octets) needed to store RSA public key, ## or `0` if public key is incorrect. + doAssert(not isNil(sig)) result = len(sig.buffer) if len(data) >= result: copyMem(addr data[0], addr sig.buffer[0], result) @@ -344,6 +349,7 @@ proc toBytes*(sig: RsaSignature, data: var openarray[byte]): int = proc getBytes*(key: RsaPrivateKey): seq[byte] = ## Serialize RSA private key ``key`` to ASN.1 DER binary form and ## return it. + doAssert(not isNil(key)) result = newSeq[byte](4096) let length = key.toBytes(result) if length > 0: @@ -354,6 +360,7 @@ proc getBytes*(key: RsaPrivateKey): seq[byte] = proc getBytes*(key: RsaPublicKey): seq[byte] = ## Serialize RSA public key ``key`` to ASN.1 DER binary form and ## return it. + doAssert(not isNil(key)) result = newSeq[byte](4096) let length = key.toBytes(result) if length > 0: @@ -363,6 +370,7 @@ proc getBytes*(key: RsaPublicKey): seq[byte] = proc getBytes*(sig: RsaSignature): seq[byte] = ## Serialize RSA signature ``sig`` to raw binary form and return it. + doAssert(not isNil(sig)) result = newSeq[byte](4096) let length = sig.toBytes(result) if length > 0: @@ -592,8 +600,8 @@ proc init*[T: RsaPKI](t: typedesc[T], data: string): T {.inline.} = proc `$`*(key: RsaPrivateKey): string = ## Return string representation of RSA private key. - if len(key.buffer) == 0: - result = "Empty RSA key" + if isNil(key) or len(key.buffer) == 0: + result = "Empty or uninitialized RSA key" else: result = "RSA key (" result.add($key.seck.nBitlen) @@ -618,8 +626,8 @@ proc `$`*(key: RsaPrivateKey): string = proc `$`*(key: RsaPublicKey): string = ## Return string representation of RSA public key. - if len(key.buffer) == 0: - result = "Empty RSA key" + if isNil(key) or len(key.buffer) == 0: + result = "Empty or uninitialized RSA key" else: let nbitlen = key.key.nlen shl 3 result = "RSA key (" @@ -632,8 +640,8 @@ proc `$`*(key: RsaPublicKey): string = proc `$`*(sig: RsaSignature): string = ## Return string representation of RSA signature. - if len(sig.buffer) == 0: - result = "Empty RSA signature" + if isNil(sig) or len(sig.buffer) == 0: + result = "Empty or uninitialized RSA signature" else: result = "RSA signature (" result.add(toHex(sig.buffer)) @@ -656,44 +664,69 @@ proc cmp(a: openarray[byte], b: openarray[byte]): bool = proc `==`*(a, b: RsaPrivateKey): bool = ## Compare two RSA private keys for equality. - if a.seck.nBitlen == b.seck.nBitlen: - if cast[int](a.seck.nBitlen) > 0: - let r1 = cmp(getArray(a.buffer, a.seck.p, a.seck.plen), - getArray(b.buffer, b.seck.p, b.seck.plen)) - let r2 = cmp(getArray(a.buffer, a.seck.q, a.seck.qlen), - getArray(b.buffer, b.seck.q, b.seck.qlen)) - let r3 = cmp(getArray(a.buffer, a.seck.dp, a.seck.dplen), - getArray(b.buffer, b.seck.dp, b.seck.dplen)) - let r4 = cmp(getArray(a.buffer, a.seck.dq, a.seck.dqlen), - getArray(b.buffer, b.seck.dq, b.seck.dqlen)) - let r5 = cmp(getArray(a.buffer, a.seck.iq, a.seck.iqlen), - getArray(b.buffer, b.seck.iq, b.seck.iqlen)) - let r6 = cmp(getArray(a.buffer, a.pexp, a.pexplen), - getArray(b.buffer, b.pexp, b.pexplen)) - let r7 = cmp(getArray(a.buffer, a.pubk.n, a.pubk.nlen), - getArray(b.buffer, b.pubk.n, b.pubk.nlen)) - let r8 = cmp(getArray(a.buffer, a.pubk.e, a.pubk.elen), - getArray(b.buffer, b.pubk.e, b.pubk.elen)) - result = r1 and r2 and r3 and r4 and r5 and r6 and r7 and r8 - else: - result = true + ## + ## Result is true if ``a`` and ``b`` are both ``nil`` or ``a`` and ``b`` are + ## equal by value. + if isNil(a) and isNil(b): + result = true + elif isNil(a) and (not isNil(b)): + result = false + elif isNil(b) and (not isNil(a)): + result = false + else: + if a.seck.nBitlen == b.seck.nBitlen: + if cast[int](a.seck.nBitlen) > 0: + let r1 = cmp(getArray(a.buffer, a.seck.p, a.seck.plen), + getArray(b.buffer, b.seck.p, b.seck.plen)) + let r2 = cmp(getArray(a.buffer, a.seck.q, a.seck.qlen), + getArray(b.buffer, b.seck.q, b.seck.qlen)) + let r3 = cmp(getArray(a.buffer, a.seck.dp, a.seck.dplen), + getArray(b.buffer, b.seck.dp, b.seck.dplen)) + let r4 = cmp(getArray(a.buffer, a.seck.dq, a.seck.dqlen), + getArray(b.buffer, b.seck.dq, b.seck.dqlen)) + let r5 = cmp(getArray(a.buffer, a.seck.iq, a.seck.iqlen), + getArray(b.buffer, b.seck.iq, b.seck.iqlen)) + let r6 = cmp(getArray(a.buffer, a.pexp, a.pexplen), + getArray(b.buffer, b.pexp, b.pexplen)) + let r7 = cmp(getArray(a.buffer, a.pubk.n, a.pubk.nlen), + getArray(b.buffer, b.pubk.n, b.pubk.nlen)) + let r8 = cmp(getArray(a.buffer, a.pubk.e, a.pubk.elen), + getArray(b.buffer, b.pubk.e, b.pubk.elen)) + result = r1 and r2 and r3 and r4 and r5 and r6 and r7 and r8 + else: + result = true proc `==`*(a, b: RsaSignature): bool = ## Compare two RSA signatures for equality. - result = (a.buffer == b.buffer) + if isNil(a) and isNil(b): + result = true + elif isNil(a) and (not isNil(b)): + result = false + elif isNil(b) and (not isNil(a)): + result = false + else: + result = (a.buffer == b.buffer) proc `==`*(a, b: RsaPublicKey): bool = ## Compare two RSA public keys for equality. - let r1 = cmp(getArray(a.buffer, a.key.n, a.key.nlen), - getArray(b.buffer, b.key.n, b.key.nlen)) - let r2 = cmp(getArray(a.buffer, a.key.e, a.key.elen), - getArray(b.buffer, b.key.e, b.key.elen)) - result = r1 and r2 + if isNil(a) and isNil(b): + result = true + elif isNil(a) and (not isNil(b)): + result = false + elif isNil(b) and (not isNil(a)): + result = false + else: + let r1 = cmp(getArray(a.buffer, a.key.n, a.key.nlen), + getArray(b.buffer, b.key.n, b.key.nlen)) + let r2 = cmp(getArray(a.buffer, a.key.e, a.key.elen), + getArray(b.buffer, b.key.e, b.key.elen)) + result = r1 and r2 proc sign*[T: byte|char](key: RsaPrivateKey, message: openarray[T]): RsaSignature = ## Get RSA PKCS1.5 signature of data ``message`` using SHA256 and private ## key ``key``. + doAssert(not isNil(key)) var hc: BrHashCompatContext var hash: array[32, byte] var impl = BrRsaPkcs1SignGetDefault() @@ -720,6 +753,7 @@ proc verify*[T: byte|char](sig: RsaSignature, message: openarray[T], ## ## Return ``true`` if message verification succeeded, ``false`` if ## verification failed. + doAssert((not isNil(sig)) and (not isNil(pubkey))) if len(sig.buffer) > 0: var hc: BrHashCompatContext var hash: array[32, byte] diff --git a/tests/testcrypto.nim b/tests/testcrypto.nim index 5f13a9007..be2d0476f 100644 --- a/tests/testcrypto.nim +++ b/tests/testcrypto.nim @@ -345,7 +345,7 @@ const proc cmp(a, b: openarray[byte]): bool = result = (@a == @b) -proc testStretcher(s, e: int, cs: CipherScheme, ds: DigestSheme): bool = +proc testStretcher(s, e: int, cs: string, ds: string): bool = for i in s..