You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 

472 lines
14 KiB

  1. /*
  2. * Example Decaf cyrpto routines, C++ wrapper.
  3. * @warning These are merely examples, though they ought to be secure. But real
  4. * protocols will decide differently on magic numbers, formats, which items to
  5. * hash, etc.
  6. * @warning Experimental! The names, parameter orders etc are likely to change.
  7. */
  8. #include <decaf/decaf_$(gf_bits).hxx>
  9. #include <decaf/eddsa_$(gf_bits).h>
  10. #include <decaf/shake.hxx>
  11. #include <decaf/sha512.hxx>
  12. /** @cond internal */
  13. #if __cplusplus >= 201103L
  14. #define NOEXCEPT noexcept
  15. #else
  16. #define NOEXCEPT throw()
  17. #endif
  18. /** @endcond */
  19. namespace decaf {
  20. /** A public key for crypto over some Group */
  21. template <typename Group> struct EdDSA;
  22. /** A public key for crypto over $(name) */
  23. template<> struct EdDSA<$(cxx_ns)> {
  24. enum Prehashed { PURE, PREHASHED };
  25. /** @cond internal */
  26. template<class CRTP, Prehashed> class Signing;
  27. template<class CRTP, Prehashed> class Verification;
  28. $("""
  29. class PublicKeyBase;
  30. class PrivateKeyBase;
  31. typedef class PrivateKeyBase PrivateKey, PrivateKeyPure, PrivateKeyPh;
  32. typedef class PublicKeyBase PublicKey, PublicKeyPure, PublicKeyPh;
  33. """ if eddsa_supports_contexts else """
  34. template<Prehashed=PURE> class PublicKeyBase;
  35. template<Prehashed=PURE> class PrivateKeyBase;
  36. typedef class PublicKeyBase<PURE> PublicKey, PublicKeyPure;
  37. typedef class PublicKeyBase<PREHASHED> PublicKeyPh;
  38. typedef class PrivateKeyBase<PURE> PrivateKey, PrivateKeyPure;
  39. typedef class PrivateKeyBase<PREHASHED> PrivateKeyPh;
  40. """)
  41. /** @endcond */
  42. /** Prehash context for EdDSA. TODO: test me! */
  43. class Prehash : public $(re.sub(r"SHAKE(\d+)",r"SHAKE<\1>", eddsa_hash.upper())) {
  44. public:
  45. /** Do we support contexts for signatures? If not, they must always be NULL */
  46. static const bool SUPPORTS_CONTEXTS = $(C_NS)_EDDSA_SUPPORTS_CONTEXTS;
  47. private:
  48. typedef $(re.sub(r"SHAKE(\d+)",r"SHAKE<\1>", eddsa_hash.upper())) Super;
  49. SecureBuffer context_;
  50. template<class T, Prehashed Ph> friend class Signing;
  51. template<class T, Prehashed Ph> friend class Verification;
  52. void init() throw(LengthException) {
  53. Super::reset();
  54. if (context_.size() > 255
  55. || (context_.size() != 0 && !SUPPORTS_CONTEXTS)
  56. ) {
  57. throw LengthException();
  58. }
  59. if (SUPPORTS_CONTEXTS) {
  60. uint8_t dom[2] = {2, context_.size() };
  61. update(dom,2);
  62. update(context_);
  63. }
  64. }
  65. public:
  66. /** Number of output bytes in prehash */
  67. static const size_t OUTPUT_BYTES = Super::DEFAULT_OUTPUT_BYTES;
  68. /** Create the prehash */
  69. Prehash(Block context = Block(NULL,0)) throw(LengthException) {
  70. context_ = context;
  71. init();
  72. }
  73. /** Reset this hash */
  74. void reset() NOEXCEPT { init(); }
  75. /** Output from this hash */
  76. SecureBuffer final() throw(std::bad_alloc) {
  77. SecureBuffer ret = Super::final(OUTPUT_BYTES);
  78. reset();
  79. return ret;
  80. }
  81. /** Output from this hash */
  82. void final(Buffer &b) throw(LengthException) {
  83. if (b.size() != OUTPUT_BYTES) throw LengthException();
  84. Super::final(b);
  85. reset();
  86. }
  87. };
  88. template<class CRTP, Prehashed ph> class Signing;
  89. template<class CRTP> class Signing<CRTP,PREHASHED> {
  90. public:
  91. /* Sign a prehash context, and reset the context */
  92. inline SecureBuffer sign_prehashed ( Prehash &ph ) const /*throw(std::bad_alloc)*/ {
  93. SecureBuffer out(CRTP::SIG_BYTES);
  94. FixedArrayBuffer<Prehash::OUTPUT_BYTES> tmp;
  95. ph.final(tmp);
  96. $(c_ns)_eddsa_sign (
  97. out.data(),
  98. ((const CRTP*)this)->priv_.data(),
  99. ((const CRTP*)this)->pub_.data(),
  100. tmp.data(),
  101. tmp.size(),
  102. 1
  103. #if $(C_NS)_EDDSA_SUPPORTS_CONTEXTS
  104. , ph.context_.data(),
  105. ph.context_.size()
  106. #endif
  107. );
  108. return out;
  109. }
  110. /* Sign a message using the prehasher */
  111. inline SecureBuffer sign_with_prehash (
  112. const Block &message,
  113. const Block &context = Block(NULL,0)
  114. ) const /*throw(LengthException,CryptoException)*/ {
  115. Prehash ph(context);
  116. ph += message;
  117. return sign_prehashed(ph);
  118. }
  119. };
  120. template<class CRTP> class Signing<CRTP,PURE> {
  121. public:
  122. /**
  123. * Sign a message.
  124. * @param [in] message The message to be signed.
  125. * @param [in] context A context for the signature; must be at most 255 bytes;
  126. * must be absent if SUPPORTS_CONTEXTS == false.
  127. *
  128. * @warning It is generally unsafe to use Ed25519 with both prehashed and non-prehashed messages.
  129. */
  130. inline SecureBuffer sign (
  131. const Block &message,
  132. const Block &context = Block(NULL,0)
  133. ) const /* TODO: this exn spec tickles a Clang bug?
  134. * throw(LengthException, std::bad_alloc)
  135. */ {
  136. if (context.size() > 255
  137. || (context.size() != 0 && !CRTP::SUPPORTS_CONTEXTS)
  138. ) {
  139. throw LengthException();
  140. }
  141. SecureBuffer out(CRTP::SIG_BYTES);
  142. $(c_ns)_eddsa_sign (
  143. out.data(),
  144. ((const CRTP*)this)->priv_.data(),
  145. ((const CRTP*)this)->pub_.data(),
  146. message.data(),
  147. message.size(),
  148. 0
  149. #if $(C_NS)_EDDSA_SUPPORTS_CONTEXTS
  150. , context.data(),
  151. context.size()
  152. #endif
  153. );
  154. return out;
  155. }
  156. };
  157. $("""
  158. class PrivateKeyBase
  159. : public Serializable<PrivateKeyBase>
  160. , public Signing<PrivateKeyBase,PURE>
  161. , public Signing<PrivateKeyBase,PREHASHED> {
  162. public:
  163. typedef class PublicKeyBase MyPublicKey;
  164. private:
  165. /** @cond internal */
  166. friend class PublicKeyBase;
  167. friend class Signing<PrivateKey,PURE>;
  168. friend class Signing<PrivateKey,PREHASHED>;
  169. /** @endcond */
  170. """ if eddsa_supports_contexts else """
  171. template<Prehashed ph> class PrivateKeyBase
  172. : public Serializable<PrivateKeyBase<ph> >
  173. , public Signing<PrivateKeyBase<ph>,ph> {
  174. public:
  175. typedef class PublicKeyBase<ph> MyPublicKey;
  176. private:
  177. /** @cond internal */
  178. friend class PublicKeyBase<ph>;
  179. friend class Signing<PrivateKeyBase<ph>, ph>;
  180. /** @endcond */
  181. """)
  182. /** The pre-expansion form of the signing key. */
  183. FixedArrayBuffer<$(C_NS)_EDDSA_PRIVATE_BYTES> priv_;
  184. /** The post-expansion public key. */
  185. FixedArrayBuffer<$(C_NS)_EDDSA_PUBLIC_BYTES> pub_;
  186. public:
  187. /** Underlying group */
  188. typedef $(cxx_ns) Group;
  189. /** Signature size. */
  190. static const size_t SIG_BYTES = $(C_NS)_EDDSA_SIGNATURE_BYTES;
  191. /** Serialization size. */
  192. static const size_t SER_BYTES = $(C_NS)_EDDSA_PRIVATE_BYTES;
  193. /** Do we support contexts for signatures? If not, they must always be NULL */
  194. static const bool SUPPORTS_CONTEXTS = $(C_NS)_EDDSA_SUPPORTS_CONTEXTS;
  195. /** Create but don't initialize */
  196. inline explicit PrivateKeyBase(const NOINIT&) NOEXCEPT : priv_((NOINIT())), pub_((NOINIT())) { }
  197. /** Read a private key from a string */
  198. inline explicit PrivateKeyBase(const FixedBlock<SER_BYTES> &b) NOEXCEPT { *this = b; }
  199. /** Copy constructor */
  200. inline PrivateKeyBase(const PrivateKey &k) NOEXCEPT { *this = k; }
  201. /** Create at random */
  202. inline explicit PrivateKeyBase(Rng &r) NOEXCEPT : priv_(r) {
  203. $(c_ns)_eddsa_derive_public_key(pub_.data(), priv_.data());
  204. }
  205. /** Assignment from string */
  206. inline PrivateKeyBase &operator=(const FixedBlock<SER_BYTES> &b) NOEXCEPT {
  207. memcpy(priv_.data(),b.data(),b.size());
  208. $(c_ns)_eddsa_derive_public_key(pub_.data(), priv_.data());
  209. return *this;
  210. }
  211. /** Copy assignment */
  212. inline PrivateKeyBase &operator=(const PrivateKey &k) NOEXCEPT {
  213. memcpy(priv_.data(),k.priv_.data(), priv_.size());
  214. memcpy(pub_.data(),k.pub_.data(), pub_.size());
  215. return *this;
  216. }
  217. /** Serialization size. */
  218. inline size_t ser_size() const NOEXCEPT { return SER_BYTES; }
  219. /** Serialize into a buffer. */
  220. inline void serialize_into(unsigned char *x) const NOEXCEPT {
  221. memcpy(x,priv_.data(), priv_.size());
  222. }
  223. /** Return the corresponding public key */
  224. inline MyPublicKey pub() const NOEXCEPT {
  225. MyPublicKey pub(*this);
  226. return pub;
  227. }
  228. }; /* class PrivateKey */
  229. template<class CRTP> class Verification<CRTP,PURE> {
  230. public:
  231. /** Verify a signature, returning DECAF_FAILURE if verification fails */
  232. inline decaf_error_t WARN_UNUSED verify_noexcept (
  233. const FixedBlock<$(C_NS)_EDDSA_SIGNATURE_BYTES> &sig,
  234. const Block &message,
  235. const Block &context = Block(NULL,0)
  236. ) const /*NOEXCEPT*/ {
  237. if (context.size() > 255
  238. || (context.size() != 0 && !CRTP::SUPPORTS_CONTEXTS)
  239. ) {
  240. return DECAF_FAILURE;
  241. }
  242. return $(c_ns)_eddsa_verify (
  243. sig.data(),
  244. ((const CRTP*)this)->pub_.data(),
  245. message.data(),
  246. message.size(),
  247. 0
  248. #if $(C_NS)_EDDSA_SUPPORTS_CONTEXTS
  249. , context.data(),
  250. context.size()
  251. #endif
  252. );
  253. }
  254. /** Verify a signature, throwing an exception if verification fails
  255. * @param [in] sig The signature.
  256. * @param [in] message The signed message.
  257. * @param [in] context A context for the signature; must be at most 255 bytes;
  258. * must be absent if SUPPORTS_CONTEXTS == false.
  259. *
  260. * @warning It is generally unsafe to use Ed25519 with both prehashed and non-prehashed messages.
  261. */
  262. inline void verify (
  263. const FixedBlock<$(C_NS)_EDDSA_SIGNATURE_BYTES> &sig,
  264. const Block &message,
  265. const Block &context = Block(NULL,0)
  266. ) const /*throw(LengthException,CryptoException)*/ {
  267. if (context.size() > 255
  268. || (context.size() != 0 && !CRTP::SUPPORTS_CONTEXTS)
  269. ) {
  270. throw LengthException();
  271. }
  272. if (DECAF_SUCCESS != verify_noexcept( sig, message, context )) {
  273. throw CryptoException();
  274. }
  275. }
  276. };
  277. template<class CRTP> class Verification<CRTP,PREHASHED> {
  278. public:
  279. /* Verify a prehash context, and reset the context */
  280. inline decaf_error_t WARN_UNUSED verify_prehashed_noexcept (
  281. const FixedBlock<$(C_NS)_EDDSA_SIGNATURE_BYTES> &sig,
  282. Prehash &ph
  283. ) const /*NOEXCEPT*/ {
  284. FixedArrayBuffer<Prehash::OUTPUT_BYTES> m;
  285. ph.final(m);
  286. return $(c_ns)_eddsa_verify (
  287. sig.data(),
  288. ((const CRTP*)this)->pub_.data(),
  289. m.data(),
  290. m.size(),
  291. 1
  292. #if $(C_NS)_EDDSA_SUPPORTS_CONTEXTS
  293. , ph.context_.data(),
  294. ph.context_.size()
  295. #endif
  296. );
  297. }
  298. /* Verify a prehash context, and reset the context */
  299. inline void verify_prehashed (
  300. const FixedBlock<$(C_NS)_EDDSA_SIGNATURE_BYTES> &sig,
  301. Prehash &ph
  302. ) const /*throw(CryptoException)*/ {
  303. FixedArrayBuffer<Prehash::OUTPUT_BYTES> m;
  304. ph.final(m);
  305. if (DECAF_SUCCESS != $(c_ns)_eddsa_verify (
  306. sig.data(),
  307. ((const CRTP*)this)->pub_.data(),
  308. m.data(),
  309. m.size(),
  310. 1
  311. #if $(C_NS)_EDDSA_SUPPORTS_CONTEXTS
  312. , ph.context_.data(),
  313. ph.context_.size()
  314. #endif
  315. )) {
  316. throw CryptoException();
  317. }
  318. }
  319. /* Verify a message using the prehasher */
  320. inline void verify_with_prehash (
  321. const FixedBlock<$(C_NS)_EDDSA_SIGNATURE_BYTES> &sig,
  322. const Block &message,
  323. const Block &context = Block(NULL,0)
  324. ) const /*throw(LengthException,CryptoException)*/ {
  325. Prehash ph(context);
  326. ph += message;
  327. verify_prehashed(sig,ph);
  328. }
  329. };
  330. $("""
  331. class PublicKeyBase
  332. : public Serializable<PublicKeyBase>
  333. , public Verification<PublicKeyBase,PURE>
  334. , public Verification<PublicKeyBase,PREHASHED> {
  335. public:
  336. typedef class PrivateKeyBase MyPrivateKey;
  337. private:
  338. /** @cond internal */
  339. friend class PrivateKeyBase;
  340. friend class Verification<PublicKey,PURE>;
  341. friend class Verification<PublicKey,PREHASHED>;
  342. /** @endcond */
  343. """ if eddsa_supports_contexts else """
  344. template<Prehashed ph> class PublicKeyBase
  345. : public Serializable<PublicKeyBase<ph> >
  346. , public Verification<PublicKeyBase<ph>,ph> {
  347. public:
  348. typedef class PrivateKeyBase<ph> MyPrivateKey;
  349. private:
  350. /** @cond internal */
  351. friend class PrivateKeyBase<ph>;
  352. friend class Verification<PublicKeyBase<ph>, ph>;
  353. /** @endcond */
  354. """)
  355. private:
  356. /** The pre-expansion form of the signature */
  357. FixedArrayBuffer<$(C_NS)_EDDSA_PUBLIC_BYTES> pub_;
  358. public:
  359. /* PERF FUTURE: Pre-cached decoding? Precomputed table?? */
  360. /** Underlying group */
  361. typedef $(cxx_ns) Group;
  362. /** Signature size. */
  363. static const size_t SIG_BYTES = $(C_NS)_EDDSA_SIGNATURE_BYTES;
  364. /** Serialization size. */
  365. static const size_t SER_BYTES = $(C_NS)_EDDSA_PRIVATE_BYTES;
  366. /** Do we support contexts for signatures? If not, they must always be NULL */
  367. static const bool SUPPORTS_CONTEXTS = $(C_NS)_EDDSA_SUPPORTS_CONTEXTS;
  368. /** Create but don't initialize */
  369. inline explicit PublicKeyBase(const NOINIT&) NOEXCEPT : pub_((NOINIT())) { }
  370. /** Read a private key from a string */
  371. inline explicit PublicKeyBase(const FixedBlock<SER_BYTES> &b) NOEXCEPT { *this = b; }
  372. /** Copy constructor */
  373. inline PublicKeyBase(const PublicKeyBase &k) NOEXCEPT { *this = k; }
  374. /** Copy constructor */
  375. inline explicit PublicKeyBase(const MyPrivateKey &k) NOEXCEPT { *this = k; }
  376. /** Assignment from string */
  377. inline PublicKey &operator=(const FixedBlock<SER_BYTES> &b) NOEXCEPT {
  378. memcpy(pub_.data(),b.data(),b.size());
  379. return *this;
  380. }
  381. /** Assignment from private key */
  382. inline PublicKey &operator=(const PublicKey &p) NOEXCEPT {
  383. return *this = p.pub_;
  384. }
  385. /** Assignment from private key */
  386. inline PublicKey &operator=(const MyPrivateKey &p) NOEXCEPT {
  387. return *this = p.pub_;
  388. }
  389. /** Serialization size. */
  390. inline size_t ser_size() const NOEXCEPT { return SER_BYTES; }
  391. /** Serialize into a buffer. */
  392. inline void serialize_into(unsigned char *x) const NOEXCEPT {
  393. memcpy(x,pub_.data(), pub_.size());
  394. }
  395. }; /* class PublicKey */
  396. }; /* template<> struct EdDSA<$(cxx_ns)> */
  397. #undef NOEXCEPT
  398. } /* namespace decaf */