i2pd/Signature.h

436 lines
12 KiB
C
Raw Normal View History

2014-08-21 15:15:04 +00:00
#ifndef SIGNATURE_H__
#define SIGNATURE_H__
#include <inttypes.h>
#include <cryptopp/dsa.h>
2014-12-10 20:48:07 +00:00
#include <cryptopp/rsa.h>
2014-08-21 18:26:15 +00:00
#include <cryptopp/asn.h>
#include <cryptopp/oids.h>
2014-08-22 20:28:25 +00:00
#include <cryptopp/osrng.h>
2014-08-21 18:26:15 +00:00
#include <cryptopp/eccrypto.h>
2014-08-21 15:15:04 +00:00
#include "CryptoConst.h"
namespace i2p
{
namespace crypto
{
class Verifier
{
public:
virtual ~Verifier () {};
2014-08-23 12:41:06 +00:00
virtual bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature) const = 0;
virtual size_t GetPublicKeyLen () const = 0;
virtual size_t GetSignatureLen () const = 0;
2014-12-11 02:31:06 +00:00
virtual size_t GetPrivateKeyLen () const { return GetSignatureLen ()/2; };
2014-08-21 15:15:04 +00:00
};
2014-08-22 20:48:30 +00:00
class Signer
2014-08-22 20:28:25 +00:00
{
public:
2014-08-22 20:48:30 +00:00
virtual ~Signer () {};
2014-08-23 12:41:06 +00:00
virtual void Sign (CryptoPP::RandomNumberGenerator& rnd, const uint8_t * buf, int len, uint8_t * signature) const = 0;
2014-08-22 20:28:25 +00:00
};
2014-10-15 18:04:23 +00:00
const size_t DSA_PUBLIC_KEY_LENGTH = 128;
const size_t DSA_SIGNATURE_LENGTH = 40;
const size_t DSA_PRIVATE_KEY_LENGTH = DSA_SIGNATURE_LENGTH/2;
2014-08-21 15:15:04 +00:00
class DSAVerifier: public Verifier
{
public:
DSAVerifier (const uint8_t * signingKey)
{
2014-10-15 18:04:23 +00:00
m_PublicKey.Initialize (dsap, dsaq, dsag, CryptoPP::Integer (signingKey, DSA_PUBLIC_KEY_LENGTH));
2014-08-21 15:15:04 +00:00
}
2014-08-23 12:41:06 +00:00
bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature) const
2014-08-21 15:15:04 +00:00
{
CryptoPP::DSA::Verifier verifier (m_PublicKey);
2014-10-15 18:04:23 +00:00
return verifier.VerifyMessage (buf, len, signature, DSA_SIGNATURE_LENGTH);
2014-08-21 15:15:04 +00:00
}
2014-10-15 18:04:23 +00:00
size_t GetPublicKeyLen () const { return DSA_PUBLIC_KEY_LENGTH; };
size_t GetSignatureLen () const { return DSA_SIGNATURE_LENGTH; };
2014-08-21 15:15:04 +00:00
private:
CryptoPP::DSA::PublicKey m_PublicKey;
2014-08-21 18:26:15 +00:00
};
2014-08-22 20:48:30 +00:00
class DSASigner: public Signer
2014-08-22 20:28:25 +00:00
{
public:
2014-08-22 20:48:30 +00:00
DSASigner (const uint8_t * signingPrivateKey)
2014-08-22 20:28:25 +00:00
{
2014-10-15 18:04:23 +00:00
m_PrivateKey.Initialize (dsap, dsaq, dsag, CryptoPP::Integer (signingPrivateKey, DSA_PRIVATE_KEY_LENGTH));
2014-08-22 20:28:25 +00:00
}
2014-08-23 12:41:06 +00:00
void Sign (CryptoPP::RandomNumberGenerator& rnd, const uint8_t * buf, int len, uint8_t * signature) const
2014-08-22 20:28:25 +00:00
{
CryptoPP::DSA::Signer signer (m_PrivateKey);
signer.SignMessage (rnd, buf, len, signature);
}
private:
CryptoPP::DSA::PrivateKey m_PrivateKey;
};
2014-08-22 20:48:30 +00:00
inline void CreateDSARandomKeys (CryptoPP::RandomNumberGenerator& rnd, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
CryptoPP::DSA::PrivateKey privateKey;
CryptoPP::DSA::PublicKey publicKey;
privateKey.Initialize (rnd, dsap, dsaq, dsag);
privateKey.MakePublicKey (publicKey);
2014-10-15 18:04:23 +00:00
privateKey.GetPrivateExponent ().Encode (signingPrivateKey, DSA_PRIVATE_KEY_LENGTH);
publicKey.GetPublicElement ().Encode (signingPublicKey, DSA_PUBLIC_KEY_LENGTH);
2014-08-22 20:48:30 +00:00
}
2014-11-25 01:19:13 +00:00
template<typename Hash, size_t keyLen>
class ECDSAVerifier: public Verifier
{
2014-08-21 18:26:15 +00:00
public:
2014-11-25 01:19:13 +00:00
template<typename Curve>
ECDSAVerifier (Curve curve, const uint8_t * signingKey)
2014-08-21 18:26:15 +00:00
{
2014-11-25 01:19:13 +00:00
m_PublicKey.Initialize (curve,
CryptoPP::ECP::Point (CryptoPP::Integer (signingKey, keyLen/2),
CryptoPP::Integer (signingKey + keyLen/2, keyLen/2)));
}
2014-08-21 18:26:15 +00:00
2014-08-23 12:41:06 +00:00
bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature) const
2014-08-21 18:26:15 +00:00
{
2014-11-25 01:19:13 +00:00
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::Verifier verifier (m_PublicKey);
return verifier.VerifyMessage (buf, len, signature, keyLen); // signature length
2014-08-21 18:26:15 +00:00
}
2014-11-25 01:19:13 +00:00
size_t GetPublicKeyLen () const { return keyLen; };
size_t GetSignatureLen () const { return keyLen; }; // signature length = key length
2014-08-21 18:26:15 +00:00
private:
2014-11-25 01:19:13 +00:00
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::PublicKey m_PublicKey;
};
2014-08-22 20:28:25 +00:00
2014-11-25 01:19:13 +00:00
template<typename Hash>
class ECDSASigner: public Signer
2014-08-22 20:28:25 +00:00
{
public:
2014-11-25 01:19:13 +00:00
template<typename Curve>
ECDSASigner (Curve curve, const uint8_t * signingPrivateKey, size_t keyLen)
2014-08-22 20:28:25 +00:00
{
2014-11-25 01:19:13 +00:00
m_PrivateKey.Initialize (curve, CryptoPP::Integer (signingPrivateKey, keyLen/2)); // private key length
2014-08-22 20:28:25 +00:00
}
2014-08-23 12:41:06 +00:00
void Sign (CryptoPP::RandomNumberGenerator& rnd, const uint8_t * buf, int len, uint8_t * signature) const
2014-08-22 20:28:25 +00:00
{
2014-11-25 01:19:13 +00:00
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::Signer signer (m_PrivateKey);
2014-08-22 20:28:25 +00:00
signer.SignMessage (rnd, buf, len, signature);
}
private:
2014-11-25 01:19:13 +00:00
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::PrivateKey m_PrivateKey;
2014-08-22 20:28:25 +00:00
};
2014-08-22 20:48:30 +00:00
2014-11-25 01:19:13 +00:00
template<typename Hash, typename Curve>
inline void CreateECDSARandomKeys (CryptoPP::RandomNumberGenerator& rnd, Curve curve,
size_t keyLen, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
2014-08-22 20:48:30 +00:00
{
2014-11-25 01:19:13 +00:00
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::PrivateKey privateKey;
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::PublicKey publicKey;
privateKey.Initialize (rnd, curve);
2014-08-22 20:48:30 +00:00
privateKey.MakePublicKey (publicKey);
2014-11-25 01:19:13 +00:00
privateKey.GetPrivateExponent ().Encode (signingPrivateKey, keyLen/2);
2014-08-22 20:48:30 +00:00
auto q = publicKey.GetPublicElement ();
2014-11-25 01:19:13 +00:00
q.x.Encode (signingPublicKey, keyLen/2);
q.y.Encode (signingPublicKey + keyLen/2, keyLen/2);
}
// ECDSA_SHA256_P256
const size_t ECDSAP256_KEY_LENGTH = 64;
class ECDSAP256Verifier: public ECDSAVerifier<CryptoPP::SHA256, ECDSAP256_KEY_LENGTH>
{
public:
ECDSAP256Verifier (const uint8_t * signingKey):
ECDSAVerifier (CryptoPP::ASN1::secp256r1(), signingKey)
{
}
};
class ECDSAP256Signer: public ECDSASigner<CryptoPP::SHA256>
{
public:
ECDSAP256Signer (const uint8_t * signingPrivateKey):
ECDSASigner (CryptoPP::ASN1::secp256r1(), signingPrivateKey, ECDSAP256_KEY_LENGTH)
{
}
};
inline void CreateECDSAP256RandomKeys (CryptoPP::RandomNumberGenerator& rnd, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
CreateECDSARandomKeys<CryptoPP::SHA256> (rnd, CryptoPP::ASN1::secp256r1(), ECDSAP256_KEY_LENGTH, signingPrivateKey, signingPublicKey);
2014-08-22 20:48:30 +00:00
}
2014-11-25 01:19:13 +00:00
// ECDSA_SHA384_P384
const size_t ECDSAP384_KEY_LENGTH = 96;
class ECDSAP384Verifier: public ECDSAVerifier<CryptoPP::SHA384, ECDSAP384_KEY_LENGTH>
{
public:
ECDSAP384Verifier (const uint8_t * signingKey):
ECDSAVerifier (CryptoPP::ASN1::secp384r1(), signingKey)
{
}
};
class ECDSAP384Signer: public ECDSASigner<CryptoPP::SHA384>
{
public:
ECDSAP384Signer (const uint8_t * signingPrivateKey):
ECDSASigner (CryptoPP::ASN1::secp384r1(), signingPrivateKey, ECDSAP384_KEY_LENGTH)
{
}
};
inline void CreateECDSAP384RandomKeys (CryptoPP::RandomNumberGenerator& rnd, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
CreateECDSARandomKeys<CryptoPP::SHA384> (rnd, CryptoPP::ASN1::secp384r1(), ECDSAP384_KEY_LENGTH, signingPrivateKey, signingPublicKey);
}
// ECDSA_SHA512_P521
const size_t ECDSAP521_KEY_LENGTH = 132;
class ECDSAP521Verifier: public ECDSAVerifier<CryptoPP::SHA512, ECDSAP521_KEY_LENGTH>
{
public:
ECDSAP521Verifier (const uint8_t * signingKey):
ECDSAVerifier (CryptoPP::ASN1::secp521r1(), signingKey)
{
}
};
class ECDSAP521Signer: public ECDSASigner<CryptoPP::SHA512>
{
public:
ECDSAP521Signer (const uint8_t * signingPrivateKey):
ECDSASigner (CryptoPP::ASN1::secp521r1(), signingPrivateKey, ECDSAP521_KEY_LENGTH)
{
}
};
inline void CreateECDSAP521RandomKeys (CryptoPP::RandomNumberGenerator& rnd, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
CreateECDSARandomKeys<CryptoPP::SHA512> (rnd, CryptoPP::ASN1::secp521r1(), ECDSAP521_KEY_LENGTH, signingPrivateKey, signingPublicKey);
}
2014-12-10 20:48:07 +00:00
// RSA
2014-12-11 02:31:06 +00:00
template<typename Hash, size_t keyLen>
2014-12-10 20:48:07 +00:00
class RSAVerifier: public Verifier
{
public:
RSAVerifier (const uint8_t * signingKey)
{
2014-12-11 02:31:06 +00:00
m_PublicKey.Initialize (CryptoPP::Integer (signingKey, keyLen), CryptoPP::Integer (rsae));
2014-12-10 20:48:07 +00:00
}
bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature) const
{
typename CryptoPP::RSASS<CryptoPP::PKCS1v15, Hash>::Verifier verifier (m_PublicKey);
2014-12-11 02:31:06 +00:00
return verifier.VerifyMessage (buf, len, signature, keyLen); // signature length
2014-12-10 20:48:07 +00:00
}
2014-12-11 02:31:06 +00:00
size_t GetPublicKeyLen () const { return keyLen; }
size_t GetSignatureLen () const { return keyLen; }
size_t GetPrivateKeyLen () const { return GetSignatureLen ()*2; };
2014-12-10 20:48:07 +00:00
private:
CryptoPP::RSA::PublicKey m_PublicKey;
};
2014-12-11 02:31:06 +00:00
template<typename Hash>
class RSASigner: public Signer
{
public:
RSASigner (const uint8_t * signingPrivateKey, size_t keyLen)
{
m_PrivateKey.Initialize (CryptoPP::Integer (signingPrivateKey, keyLen/2),
rsae,
CryptoPP::Integer (signingPrivateKey + keyLen/2, keyLen/2));
}
void Sign (CryptoPP::RandomNumberGenerator& rnd, const uint8_t * buf, int len, uint8_t * signature) const
{
typename CryptoPP::RSASS<CryptoPP::PKCS1v15, Hash>::Signer signer (m_PrivateKey);
signer.SignMessage (rnd, buf, len, signature);
}
private:
CryptoPP::RSA::PrivateKey m_PrivateKey;
};
inline void CreateRSARandomKeys (CryptoPP::RandomNumberGenerator& rnd,
size_t publicKeyLen, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
CryptoPP::RSA::PrivateKey privateKey;
privateKey.Initialize (rnd, publicKeyLen*8, rsae);
privateKey.GetModulus ().Encode (signingPrivateKey, publicKeyLen);
privateKey.GetPrivateExponent ().Encode (signingPrivateKey + publicKeyLen, publicKeyLen);
privateKey.GetModulus ().Encode (signingPublicKey, publicKeyLen);
}
2014-12-10 20:48:07 +00:00
// RSA_SHA256_2048
2014-12-11 02:31:06 +00:00
const size_t RSASHA2562048_KEY_LENGTH = 256;
2014-12-10 20:48:07 +00:00
class RSASHA2562048Verifier: public RSAVerifier<CryptoPP::SHA256, RSASHA2562048_KEY_LENGTH>
{
public:
2014-12-11 02:31:06 +00:00
RSASHA2562048Verifier (const uint8_t * signingKey): RSAVerifier (signingKey)
{
}
};
class RSASHA2562048Signer: public RSASigner<CryptoPP::SHA256>
{
public:
RSASHA2562048Signer (const uint8_t * signingPrivateKey):
RSASigner (signingPrivateKey, RSASHA2562048_KEY_LENGTH*2)
{
}
2014-12-10 20:48:07 +00:00
};
2014-12-11 02:31:06 +00:00
// RSA_SHA384_3072
const size_t RSASHA3843072_KEY_LENGTH = 384;
class RSASHA3843072Verifier: public RSAVerifier<CryptoPP::SHA384, RSASHA3843072_KEY_LENGTH>
{
public:
RSASHA3843072Verifier (const uint8_t * signingKey): RSAVerifier (signingKey)
{
}
};
class RSASHA3843072Signer: public RSASigner<CryptoPP::SHA384>
{
public:
RSASHA3843072Signer (const uint8_t * signingPrivateKey):
RSASigner (signingPrivateKey, RSASHA3843072_KEY_LENGTH*2)
{
}
};
// RSA_SHA512_4096
const size_t RSASHA5124096_KEY_LENGTH = 512;
class RSASHA5124096Verifier: public RSAVerifier<CryptoPP::SHA512, RSASHA5124096_KEY_LENGTH>
{
public:
RSASHA5124096Verifier (const uint8_t * signingKey): RSAVerifier (signingKey)
{
}
};
class RSASHA5124096Signer: public RSASigner<CryptoPP::SHA512>
{
public:
RSASHA5124096Signer (const uint8_t * signingPrivateKey):
RSASigner (signingPrivateKey, RSASHA5124096_KEY_LENGTH*2)
{
}
};
2014-12-15 17:32:06 +00:00
// Raw verifiers
class RawVerifier
{
public:
virtual ~RawVerifier () {};
virtual void Update (const uint8_t * buf, size_t len) = 0;
virtual bool Verify (const uint8_t * signature) = 0;
};
template<typename Hash, size_t keyLen>
class RSARawVerifier: public RawVerifier
{
public:
RSARawVerifier (const uint8_t * signingKey):
n (signingKey, keyLen)
{
}
void Update (const uint8_t * buf, size_t len)
{
m_Hash.Update (buf, len);
}
bool Verify (const uint8_t * signature)
{
// RSA encryption first
CryptoPP::Integer enSig (a_exp_b_mod_c (CryptoPP::Integer (signature, keyLen),
CryptoPP::Integer (i2p::crypto::rsae), n)); // s^e mod n
uint8_t enSigBuf[keyLen];
enSig.Encode (enSigBuf, keyLen);
uint8_t digest[Hash::DIGESTSIZE];
m_Hash.Final (digest);
2014-12-16 19:35:39 +00:00
if ((int)keyLen < Hash::DIGESTSIZE) return false; // can't verify digest longer than key
2014-12-15 17:32:06 +00:00
// we assume digest is right aligned, at least for PKCS#1 v1.5 padding
return !memcmp (enSigBuf + (keyLen - Hash::DIGESTSIZE), digest, Hash::DIGESTSIZE);
}
private:
CryptoPP::Integer n; // RSA modulus
Hash m_Hash;
};
class RSASHA5124096RawVerifier: public RSARawVerifier<CryptoPP::SHA512, RSASHA5124096_KEY_LENGTH>
{
public:
RSASHA5124096RawVerifier (const uint8_t * signingKey): RSARawVerifier (signingKey)
{
}
};
2015-04-08 20:18:16 +00:00
// EdDSA
const size_t EDDSA_PUBLIC_KEY_LENGTH = 32;
const size_t EDDSA_SIGNATURE_LENGTH = 64;
const size_t EDDSA_PRIVATE_KEY_LENGTH = 32;
class EDDSAVerifier: public Verifier
{
public:
EDDSAVerifier (const uint8_t * signingKey)
{
}
bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature) const;
size_t GetPublicKeyLen () const { return EDDSA_PUBLIC_KEY_LENGTH; };
size_t GetSignatureLen () const { return EDDSA_SIGNATURE_LENGTH; };
};
2014-08-21 15:15:04 +00:00
}
}
#endif