key.go 5.22 KB
Newer Older
1 2 3
package crypto

import (
Brendan Mc's avatar
Brendan Mc committed
4
	"bytes"
5
	"errors"
6
	"fmt"
7

Brendan Mc's avatar
Brendan Mc committed
8 9
	"crypto/elliptic"
	"crypto/hmac"
10 11
	"crypto/rand"
	"crypto/rsa"
Brendan Mc's avatar
Brendan Mc committed
12 13 14 15
	"crypto/sha1"
	"crypto/sha256"
	"crypto/sha512"
	"hash"
16

17
	proto "github.com/jbenet/go-ipfs/Godeps/_workspace/src/code.google.com/p/goprotobuf/proto"
18

19
	pb "github.com/jbenet/go-ipfs/crypto/internal/pb"
20
	u "github.com/jbenet/go-ipfs/util"
21 22
)

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
23 24
var log = u.Logger("crypto")

25 26 27 28 29 30
var ErrBadKeyType = errors.New("invalid or unsupported key type")

const (
	RSA = iota
)

31 32 33 34
type Key interface {
	// Bytes returns a serialized, storeable representation of this key
	Bytes() ([]byte, error)

Jeromy's avatar
Jeromy committed
35 36 37
	// Hash returns the hash of this key
	Hash() ([]byte, error)

38 39 40 41
	// Equals checks whether two PubKeys are the same
	Equals(Key) bool
}

42
type PrivKey interface {
43 44
	Key

45 46 47 48 49 50 51 52 53 54 55
	// Cryptographically sign the given bytes
	Sign([]byte) ([]byte, error)

	// Return a public key paired with this private key
	GetPublic() PubKey

	// Generate a secret string of bytes
	GenSecret() []byte
}

type PubKey interface {
56 57
	Key

58 59 60 61
	// Verify that 'sig' is the signed hash of 'data'
	Verify(data []byte, sig []byte) (bool, error)
}

Brendan Mc's avatar
Brendan Mc committed
62 63 64
// Given a public key, generates the shared key.
type GenSharedKey func([]byte) ([]byte, error)

65 66 67 68 69 70 71 72 73 74 75 76 77 78
func GenerateKeyPair(typ, bits int) (PrivKey, PubKey, error) {
	switch typ {
	case RSA:
		priv, err := rsa.GenerateKey(rand.Reader, bits)
		if err != nil {
			return nil, nil, err
		}
		pk := &priv.PublicKey
		return &RsaPrivateKey{priv}, &RsaPublicKey{pk}, nil
	default:
		return nil, nil, ErrBadKeyType
	}
}

Brendan Mc's avatar
Brendan Mc committed
79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
// Generates an ephemeral public key and returns a function that will compute
// the shared secret key.  Used in the identify module.
//
// Focuses only on ECDH now, but can be made more general in the future.
func GenerateEKeyPair(curveName string) ([]byte, GenSharedKey, error) {
	var curve elliptic.Curve

	switch curveName {
	case "P-224":
		curve = elliptic.P224()
	case "P-256":
		curve = elliptic.P256()
	case "P-384":
		curve = elliptic.P384()
	case "P-521":
		curve = elliptic.P521()
	}

	priv, x, y, err := elliptic.GenerateKey(curve, rand.Reader)
	if err != nil {
		return nil, nil, err
	}

102
	pubKey := elliptic.Marshal(curve, x, y)
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
103
	// log.Debug("GenerateEKeyPair %d", len(pubKey))
Brendan Mc's avatar
Brendan Mc committed
104 105 106

	done := func(theirPub []byte) ([]byte, error) {
		// Verify and unpack node's public key.
107 108 109
		x, y := elliptic.Unmarshal(curve, theirPub)
		if x == nil {
			return nil, fmt.Errorf("Malformed public key: %d %v", len(theirPub), theirPub)
Brendan Mc's avatar
Brendan Mc committed
110 111 112 113 114 115 116 117 118 119 120 121
		}

		if !curve.IsOnCurve(x, y) {
			return nil, errors.New("Invalid public key.")
		}

		// Generate shared secret.
		secret, _ := curve.ScalarMult(x, y, priv)

		return secret.Bytes(), nil
	}

122
	return pubKey, done, nil
Brendan Mc's avatar
Brendan Mc committed
123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207
}

// Generates a set of keys for each party by stretching the shared key.
// (myIV, theirIV, myCipherKey, theirCipherKey, myMACKey, theirMACKey)
func KeyStretcher(cmp int, cipherType string, hashType string, secret []byte) ([]byte, []byte, []byte, []byte, []byte, []byte) {
	var cipherKeySize int
	switch cipherType {
	case "AES-128":
		cipherKeySize = 16
	case "AES-256":
		cipherKeySize = 32
	}

	ivSize := 16
	hmacKeySize := 20

	seed := []byte("key expansion")

	result := make([]byte, 2*(ivSize+cipherKeySize+hmacKeySize))

	var h func() hash.Hash

	switch hashType {
	case "SHA1":
		h = sha1.New
	case "SHA256":
		h = sha256.New
	case "SHA512":
		h = sha512.New
	}

	m := hmac.New(h, secret)
	m.Write(seed)

	a := m.Sum(nil)

	j := 0
	for j < len(result) {
		m.Reset()
		m.Write(a)
		m.Write(seed)
		b := m.Sum(nil)

		todo := len(b)

		if j+todo > len(result) {
			todo = len(result) - j
		}

		copy(result[j:j+todo], b)

		j += todo

		m.Reset()
		m.Write(a)
		a = m.Sum(nil)
	}

	myResult := make([]byte, ivSize+cipherKeySize+hmacKeySize)
	theirResult := make([]byte, ivSize+cipherKeySize+hmacKeySize)

	half := len(result) / 2

	if cmp == 1 {
		copy(myResult, result[:half])
		copy(theirResult, result[half:])
	} else if cmp == -1 {
		copy(myResult, result[half:])
		copy(theirResult, result[:half])
	} else { // Shouldn't happen, but oh well.
		copy(myResult, result[half:])
		copy(theirResult, result[half:])
	}

	myIV := myResult[0:ivSize]
	myCKey := myResult[ivSize : ivSize+cipherKeySize]
	myMKey := myResult[ivSize+cipherKeySize:]

	theirIV := theirResult[0:ivSize]
	theirCKey := theirResult[ivSize : ivSize+cipherKeySize]
	theirMKey := theirResult[ivSize+cipherKeySize:]

	return myIV, theirIV, myCKey, theirCKey, myMKey, theirMKey
}

208
func UnmarshalPublicKey(data []byte) (PubKey, error) {
209
	pmes := new(pb.PBPublicKey)
210 211 212 213 214 215
	err := proto.Unmarshal(data, pmes)
	if err != nil {
		return nil, err
	}

	switch pmes.GetType() {
216
	case pb.KeyType_RSA:
217 218 219 220 221 222 223
		return UnmarshalRsaPublicKey(pmes.GetData())
	default:
		return nil, ErrBadKeyType
	}
}

func UnmarshalPrivateKey(data []byte) (PrivKey, error) {
224
	pmes := new(pb.PBPrivateKey)
225 226 227 228 229 230
	err := proto.Unmarshal(data, pmes)
	if err != nil {
		return nil, err
	}

	switch pmes.GetType() {
231
	case pb.KeyType_RSA:
232 233 234 235 236
		return UnmarshalRsaPrivateKey(pmes.GetData())
	default:
		return nil, ErrBadKeyType
	}
}
237 238 239 240 241 242 243 244 245 246 247

// KeyEqual checks whether two
func KeyEqual(k1, k2 Key) bool {
	if k1 == k2 {
		return true
	}

	b1, err1 := k1.Bytes()
	b2, err2 := k2.Bytes()
	return bytes.Equal(b1, b2) && err1 == err2
}
248 249 250 251 252 253 254

// KeyHash hashes a key.
func KeyHash(k Key) ([]byte, error) {
	kb, err := k.Bytes()
	if err != nil {
		return nil, err
	}
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
255
	return u.Hash(kb), nil
256
}