2019-01-13 16:30:07 +00:00
|
|
|
#include <crypto/types.hpp>
|
|
|
|
|
|
|
|
#include <util/buffer.hpp>
|
|
|
|
|
|
|
|
#include <fstream>
|
2019-06-24 16:26:15 +00:00
|
|
|
#include <util/fs.hpp>
|
|
|
|
|
2019-01-13 16:30:07 +00:00
|
|
|
#include <iterator>
|
|
|
|
|
2020-01-27 21:30:41 +00:00
|
|
|
#include <sodium/crypto_sign.h>
|
|
|
|
#include <sodium/crypto_sign_ed25519.h>
|
2020-01-28 21:55:36 +00:00
|
|
|
#include <sodium/crypto_scalarmult_ed25519.h>
|
2020-01-27 21:30:41 +00:00
|
|
|
|
2019-01-13 16:30:07 +00:00
|
|
|
namespace llarp
|
|
|
|
{
|
|
|
|
bool
|
|
|
|
PubKey::FromString(const std::string& str)
|
|
|
|
{
|
|
|
|
return HexDecode(str.c_str(), begin(), size());
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string
|
|
|
|
PubKey::ToString() const
|
|
|
|
{
|
|
|
|
char buf[(PUBKEYSIZE + 1) * 2] = {0};
|
|
|
|
return HexEncode(*this, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2020-05-27 03:42:01 +00:00
|
|
|
SecretKey::LoadFromFile(const fs::path& fname)
|
2019-01-13 16:30:07 +00:00
|
|
|
{
|
2020-05-27 03:42:01 +00:00
|
|
|
std::ifstream f(fname.string(), std::ios::in | std::ios::binary);
|
2020-04-07 18:38:56 +00:00
|
|
|
if (!f.is_open())
|
2019-01-13 16:30:07 +00:00
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
2019-01-15 00:42:50 +00:00
|
|
|
|
2019-01-13 16:30:07 +00:00
|
|
|
f.seekg(0, std::ios::end);
|
2019-01-15 00:42:50 +00:00
|
|
|
const size_t sz = f.tellg();
|
2019-01-13 16:30:07 +00:00
|
|
|
f.seekg(0, std::ios::beg);
|
2019-01-15 00:42:50 +00:00
|
|
|
|
2020-04-07 18:38:56 +00:00
|
|
|
if (sz == size())
|
2019-01-13 16:30:07 +00:00
|
|
|
{
|
|
|
|
// is raw buffer
|
2020-04-07 18:38:56 +00:00
|
|
|
std::copy_n(std::istreambuf_iterator<char>(f), sz, begin());
|
2019-01-13 16:30:07 +00:00
|
|
|
return true;
|
|
|
|
}
|
2020-04-07 18:38:56 +00:00
|
|
|
std::array<byte_t, 128> tmp;
|
2019-02-02 23:12:42 +00:00
|
|
|
llarp_buffer_t buf(tmp);
|
2020-04-07 18:38:56 +00:00
|
|
|
if (sz > sizeof(tmp))
|
2019-01-13 16:30:07 +00:00
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
2020-04-07 18:38:56 +00:00
|
|
|
f.read(reinterpret_cast<char*>(tmp.data()), sz);
|
2019-01-13 16:30:07 +00:00
|
|
|
return BDecode(&buf);
|
|
|
|
}
|
|
|
|
|
2020-01-27 21:30:41 +00:00
|
|
|
bool
|
|
|
|
SecretKey::Recalculate()
|
|
|
|
{
|
2020-01-30 16:38:39 +00:00
|
|
|
PrivateKey key;
|
|
|
|
PubKey pubkey;
|
2020-04-07 18:38:56 +00:00
|
|
|
if (!toPrivate(key) || !key.toPublic(pubkey))
|
2020-01-30 16:38:39 +00:00
|
|
|
return false;
|
|
|
|
std::memcpy(data() + 32, pubkey.data(), 32);
|
|
|
|
return true;
|
2020-01-27 21:30:41 +00:00
|
|
|
}
|
|
|
|
|
2020-01-30 16:34:05 +00:00
|
|
|
bool
|
|
|
|
SecretKey::toPrivate(PrivateKey& key) const
|
|
|
|
{
|
2020-01-31 21:05:50 +00:00
|
|
|
// Ed25519 calculates a 512-bit hash from the seed; the first half (clamped)
|
|
|
|
// is the private key; the second half is the hash that gets used in
|
|
|
|
// signing.
|
2020-01-30 16:34:05 +00:00
|
|
|
unsigned char h[crypto_hash_sha512_BYTES];
|
2020-04-07 18:38:56 +00:00
|
|
|
if (crypto_hash_sha512(h, data(), 32) < 0)
|
2020-01-30 16:34:05 +00:00
|
|
|
return false;
|
|
|
|
h[0] &= 248;
|
|
|
|
h[31] &= 63;
|
|
|
|
h[31] |= 64;
|
2020-01-31 20:38:08 +00:00
|
|
|
std::memcpy(key.data(), h, 64);
|
2020-01-30 16:34:05 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
PrivateKey::toPublic(PubKey& pubkey) const
|
|
|
|
{
|
|
|
|
return crypto_scalarmult_ed25519_base_noclamp(pubkey.data(), data()) != -1;
|
|
|
|
}
|
|
|
|
|
2019-01-13 16:30:07 +00:00
|
|
|
bool
|
2020-05-27 03:42:01 +00:00
|
|
|
SecretKey::SaveToFile(const fs::path& fname) const
|
2019-01-13 16:30:07 +00:00
|
|
|
{
|
2020-04-07 18:38:56 +00:00
|
|
|
std::array<byte_t, 128> tmp;
|
2019-02-02 23:12:42 +00:00
|
|
|
llarp_buffer_t buf(tmp);
|
2020-04-07 18:38:56 +00:00
|
|
|
if (!BEncode(&buf))
|
2019-01-13 16:30:07 +00:00
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
2020-05-27 03:42:01 +00:00
|
|
|
auto optional_f = llarp::util::OpenFileStream<std::ofstream>(fname, std::ios::binary);
|
2020-04-07 18:38:56 +00:00
|
|
|
if (!optional_f)
|
2019-06-24 16:26:15 +00:00
|
|
|
return false;
|
2020-05-20 19:46:08 +00:00
|
|
|
auto& f = *optional_f;
|
2020-04-07 18:38:56 +00:00
|
|
|
if (!f.is_open())
|
2019-01-13 16:30:07 +00:00
|
|
|
return false;
|
|
|
|
f.write((char*)buf.base, buf.cur - buf.base);
|
2019-06-24 17:36:25 +00:00
|
|
|
return f.good();
|
2019-01-13 16:30:07 +00:00
|
|
|
}
|
|
|
|
|
2019-01-21 15:45:18 +00:00
|
|
|
bool
|
2020-05-27 03:42:01 +00:00
|
|
|
IdentitySecret::LoadFromFile(const fs::path& fname)
|
2019-01-21 15:45:18 +00:00
|
|
|
{
|
2020-05-27 03:42:01 +00:00
|
|
|
auto optional = util::OpenFileStream<std::ifstream>(fname, std::ios::binary | std::ios::in);
|
2020-04-07 18:38:56 +00:00
|
|
|
if (!optional)
|
2019-01-21 15:45:18 +00:00
|
|
|
return false;
|
2020-05-20 19:46:08 +00:00
|
|
|
auto& f = *optional;
|
2019-01-21 15:45:18 +00:00
|
|
|
f.seekg(0, std::ios::end);
|
|
|
|
const size_t sz = f.tellg();
|
|
|
|
f.seekg(0, std::ios::beg);
|
2020-04-07 18:38:56 +00:00
|
|
|
if (sz != 32)
|
2019-01-21 15:45:18 +00:00
|
|
|
{
|
|
|
|
llarp::LogError("service node seed size invalid: ", sz, " != 32");
|
|
|
|
return false;
|
|
|
|
}
|
2020-04-07 18:38:56 +00:00
|
|
|
std::copy_n(std::istreambuf_iterator<char>(f), sz, begin());
|
2019-01-21 15:45:18 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-03-20 14:51:10 +00:00
|
|
|
byte_t*
|
2020-01-27 21:30:41 +00:00
|
|
|
Signature::Lo()
|
2019-03-20 14:51:10 +00:00
|
|
|
{
|
|
|
|
return data();
|
|
|
|
}
|
|
|
|
|
|
|
|
const byte_t*
|
2020-01-27 21:30:41 +00:00
|
|
|
Signature::Lo() const
|
2019-03-20 14:51:10 +00:00
|
|
|
{
|
|
|
|
return data();
|
|
|
|
}
|
|
|
|
|
|
|
|
byte_t*
|
2020-01-27 21:30:41 +00:00
|
|
|
Signature::Hi()
|
2019-03-20 14:51:10 +00:00
|
|
|
{
|
|
|
|
return data() + 32;
|
|
|
|
}
|
|
|
|
|
|
|
|
const byte_t*
|
2020-01-27 21:30:41 +00:00
|
|
|
Signature::Hi() const
|
2019-03-20 14:51:10 +00:00
|
|
|
{
|
|
|
|
return data() + 32;
|
|
|
|
}
|
2019-01-13 16:30:07 +00:00
|
|
|
} // namespace llarp
|