|
| 1 | +# This file is dual licensed under the terms of the Apache License, Version |
| 2 | +# 2.0, and the BSD License. See the LICENSE file in the root of this repository |
| 3 | +# for complete details. |
| 4 | + |
| 5 | +from __future__ import absolute_import, division, print_function |
| 6 | + |
| 7 | +from cryptography import exceptions, utils |
| 8 | +from cryptography.hazmat.primitives.asymmetric.ed25519 import ( |
| 9 | + Ed25519PrivateKey, Ed25519PublicKey |
| 10 | +) |
| 11 | + |
| 12 | + |
| 13 | +@utils.register_interface(Ed25519PublicKey) |
| 14 | +class _Ed25519PublicKey(object): |
| 15 | + def __init__(self, backend, evp_pkey): |
| 16 | + self._backend = backend |
| 17 | + self._evp_pkey = evp_pkey |
| 18 | + |
| 19 | + def public_bytes(self): |
| 20 | + bio = self._backend._create_mem_bio_gc() |
| 21 | + res = self._backend._lib.i2d_PUBKEY_bio(bio, self._evp_pkey) |
| 22 | + self._backend.openssl_assert(res == 1) |
| 23 | + asn1 = self._backend._read_mem_bio(bio) |
| 24 | + # We serialize to the ASN.1 structure defined in |
| 25 | + # https://tools.ietf.org/html/draft-ietf-curdle-pkix-03. and |
| 26 | + # then take the last 32 bytes, which are the actual key. |
| 27 | + self._backend.openssl_assert(len(asn1) == 44) |
| 28 | + return asn1[-32:] |
| 29 | + |
| 30 | + def verify(self, signature, data): |
| 31 | + evp_md_ctx = self._backend._lib.Cryptography_EVP_MD_CTX_new() |
| 32 | + self._backend.openssl_assert(evp_md_ctx != self._backend._ffi.NULL) |
| 33 | + evp_md_ctx = self._backend._ffi.gc( |
| 34 | + evp_md_ctx, self._backend._lib.Cryptography_EVP_MD_CTX_free |
| 35 | + ) |
| 36 | + res = self._backend._lib.EVP_DigestVerifyInit( |
| 37 | + evp_md_ctx, self._backend._ffi.NULL, self._backend._ffi.NULL, |
| 38 | + self._backend._ffi.NULL, self._evp_pkey |
| 39 | + ) |
| 40 | + self._backend.openssl_assert(res == 1) |
| 41 | + res = self._backend._lib.EVP_DigestVerify( |
| 42 | + evp_md_ctx, signature, len(signature), data, len(data) |
| 43 | + ) |
| 44 | + if res != 1: |
| 45 | + self._backend._consume_errors() |
| 46 | + raise exceptions.InvalidSignature |
| 47 | + |
| 48 | + |
| 49 | +@utils.register_interface(Ed25519PrivateKey) |
| 50 | +class _Ed25519PrivateKey(object): |
| 51 | + def __init__(self, backend, evp_pkey): |
| 52 | + self._backend = backend |
| 53 | + self._evp_pkey = evp_pkey |
| 54 | + |
| 55 | + def public_key(self): |
| 56 | + bio = self._backend._create_mem_bio_gc() |
| 57 | + res = self._backend._lib.i2d_PUBKEY_bio(bio, self._evp_pkey) |
| 58 | + self._backend.openssl_assert(res == 1) |
| 59 | + evp_pkey = self._backend._lib.d2i_PUBKEY_bio( |
| 60 | + bio, self._backend._ffi.NULL |
| 61 | + ) |
| 62 | + return _Ed25519PublicKey(self._backend, evp_pkey) |
| 63 | + |
| 64 | + def sign(self, data): |
| 65 | + evp_md_ctx = self._backend._lib.Cryptography_EVP_MD_CTX_new() |
| 66 | + self._backend.openssl_assert(evp_md_ctx != self._backend._ffi.NULL) |
| 67 | + evp_md_ctx = self._backend._ffi.gc( |
| 68 | + evp_md_ctx, self._backend._lib.Cryptography_EVP_MD_CTX_free |
| 69 | + ) |
| 70 | + res = self._backend._lib.EVP_DigestSignInit( |
| 71 | + evp_md_ctx, self._backend._ffi.NULL, self._backend._ffi.NULL, |
| 72 | + self._backend._ffi.NULL, self._evp_pkey |
| 73 | + ) |
| 74 | + self._backend.openssl_assert(res == 1) |
| 75 | + buf = self._backend._ffi.new("unsigned char[]", 64) |
| 76 | + buflen = self._backend._ffi.new("size_t *", len(buf)) |
| 77 | + res = self._backend._lib.EVP_DigestSign( |
| 78 | + evp_md_ctx, buf, buflen, data, len(data) |
| 79 | + ) |
| 80 | + self._backend.openssl_assert(res == 1) |
| 81 | + self._backend.openssl_assert(buflen[0] == 64) |
| 82 | + return self._backend._ffi.buffer(buf, buflen[0])[:] |
0 commit comments