I2P: End-to-End encrypted and anonymous Internet https://i2pd.website/
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 

358 lines
11 KiB

#ifndef SIGNATURE_H__
#define SIGNATURE_H__
#include <inttypes.h>
#include <cryptopp/dsa.h>
#include <cryptopp/rsa.h>
#include <cryptopp/asn.h>
#include <cryptopp/oids.h>
#include <cryptopp/osrng.h>
#include <cryptopp/eccrypto.h>
#include "CryptoConst.h"
#include "SignatureBase.h"
#include "EdDSA25519.h"
namespace i2p {
namespace crypto {
const size_t DSA_PUBLIC_KEY_LENGTH = 128;
const size_t DSA_SIGNATURE_LENGTH = 40;
const size_t DSA_PRIVATE_KEY_LENGTH = DSA_SIGNATURE_LENGTH/2;
class DSAVerifier: public Verifier {
public:
DSAVerifier(const uint8_t * signingKey)
{
m_PublicKey.Initialize(dsap, dsaq, dsag, CryptoPP::Integer(signingKey, DSA_PUBLIC_KEY_LENGTH));
}
bool Verify(const uint8_t * buf, size_t len, const uint8_t * signature) const
{
CryptoPP::DSA::Verifier verifier(m_PublicKey);
return verifier.VerifyMessage(buf, len, signature, DSA_SIGNATURE_LENGTH);
}
size_t GetPublicKeyLen() const { return DSA_PUBLIC_KEY_LENGTH; };
size_t GetSignatureLen() const { return DSA_SIGNATURE_LENGTH; };
private:
CryptoPP::DSA::PublicKey m_PublicKey;
};
class DSASigner : public Signer {
public:
DSASigner(const uint8_t * signingPrivateKey);
void Sign(CryptoPP::RandomNumberGenerator& rnd, const uint8_t * buf, int len,
uint8_t* signature) const;
private:
CryptoPP::DSA::PrivateKey m_PrivateKey;
};
void CreateDSARandomKeys(CryptoPP::RandomNumberGenerator& rnd, uint8_t* signingPrivateKey,
uint8_t* signingPublicKey);
template<typename Hash, size_t keyLen>
class ECDSAVerifier: public Verifier {
public:
template<typename Curve>
ECDSAVerifier(Curve curve, const uint8_t * signingKey)
{
m_PublicKey.Initialize(curve,
CryptoPP::ECP::Point(CryptoPP::Integer(signingKey, keyLen/2),
CryptoPP::Integer(signingKey + keyLen/2, keyLen/2)));
}
bool Verify(const uint8_t * buf, size_t len, const uint8_t * signature) const
{
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::Verifier verifier(m_PublicKey);
return verifier.VerifyMessage(buf, len, signature, keyLen); // signature length
}
size_t GetPublicKeyLen() const { return keyLen; };
size_t GetSignatureLen() const { return keyLen; }; // signature length = key length
private:
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::PublicKey m_PublicKey;
};
template<typename Hash>
class ECDSASigner: public Signer {
public:
template<typename Curve>
ECDSASigner(Curve curve, const uint8_t * signingPrivateKey, size_t keyLen)
{
m_PrivateKey.Initialize(curve, CryptoPP::Integer(signingPrivateKey, keyLen/2)); // private key length
}
void Sign(CryptoPP::RandomNumberGenerator& rnd, const uint8_t * buf, int len, uint8_t * signature) const
{
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::Signer signer(m_PrivateKey);
signer.SignMessage(rnd, buf, len, signature);
}
private:
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::PrivateKey m_PrivateKey;
};
template<typename Hash, typename Curve>
inline void CreateECDSARandomKeys(CryptoPP::RandomNumberGenerator& rnd, Curve curve,
size_t keyLen, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::PrivateKey privateKey;
typename CryptoPP::ECDSA<CryptoPP::ECP, Hash>::PublicKey publicKey;
privateKey.Initialize(rnd, curve);
privateKey.MakePublicKey(publicKey);
privateKey.GetPrivateExponent().Encode(signingPrivateKey, keyLen/2);
auto q = publicKey.GetPublicElement();
q.x.Encode(signingPublicKey, keyLen/2);
q.y.Encode(signingPublicKey + keyLen/2, keyLen/2);
}
// ECDSA_SHA256_P256
const size_t ECDSAP256_KEY_LENGTH = 64;
struct ECDSAP256Verifier: public ECDSAVerifier<CryptoPP::SHA256, ECDSAP256_KEY_LENGTH> {
ECDSAP256Verifier(const uint8_t * signingKey)
: ECDSAVerifier(CryptoPP::ASN1::secp256r1(), signingKey) { }
};
struct ECDSAP256Signer: public ECDSASigner<CryptoPP::SHA256> {
ECDSAP256Signer(const uint8_t * signingPrivateKey)
: ECDSASigner(CryptoPP::ASN1::secp256r1(), signingPrivateKey, ECDSAP256_KEY_LENGTH) { }
};
inline void CreateECDSAP256RandomKeys(CryptoPP::RandomNumberGenerator& rnd, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
CreateECDSARandomKeys<CryptoPP::SHA256>(rnd, CryptoPP::ASN1::secp256r1(), ECDSAP256_KEY_LENGTH, signingPrivateKey, signingPublicKey);
}
// ECDSA_SHA384_P384
const size_t ECDSAP384_KEY_LENGTH = 96;
class ECDSAP384Verifier: public ECDSAVerifier<CryptoPP::SHA384, ECDSAP384_KEY_LENGTH> {
public:
ECDSAP384Verifier(const uint8_t * signingKey):
ECDSAVerifier(CryptoPP::ASN1::secp384r1(), signingKey)
{
}
};
class ECDSAP384Signer: public ECDSASigner<CryptoPP::SHA384> {
public:
ECDSAP384Signer(const uint8_t * signingPrivateKey):
ECDSASigner(CryptoPP::ASN1::secp384r1(), signingPrivateKey, ECDSAP384_KEY_LENGTH)
{
}
};
inline void CreateECDSAP384RandomKeys(CryptoPP::RandomNumberGenerator& rnd, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
CreateECDSARandomKeys<CryptoPP::SHA384>(rnd, CryptoPP::ASN1::secp384r1(), ECDSAP384_KEY_LENGTH, signingPrivateKey, signingPublicKey);
}
// ECDSA_SHA512_P521
const size_t ECDSAP521_KEY_LENGTH = 132;
class ECDSAP521Verifier: public ECDSAVerifier<CryptoPP::SHA512, ECDSAP521_KEY_LENGTH> {
public:
ECDSAP521Verifier(const uint8_t * signingKey):
ECDSAVerifier(CryptoPP::ASN1::secp521r1(), signingKey)
{
}
};
class ECDSAP521Signer: public ECDSASigner<CryptoPP::SHA512> {
public:
ECDSAP521Signer(const uint8_t * signingPrivateKey):
ECDSASigner(CryptoPP::ASN1::secp521r1(), signingPrivateKey, ECDSAP521_KEY_LENGTH)
{
}
};
inline void CreateECDSAP521RandomKeys(CryptoPP::RandomNumberGenerator& rnd, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
CreateECDSARandomKeys<CryptoPP::SHA512>(rnd, CryptoPP::ASN1::secp521r1(), ECDSAP521_KEY_LENGTH, signingPrivateKey, signingPublicKey);
}
// RSA
template<typename Hash, size_t keyLen>
class RSAVerifier: public Verifier {
public:
RSAVerifier(const uint8_t * signingKey)
{
m_PublicKey.Initialize(CryptoPP::Integer(signingKey, keyLen), CryptoPP::Integer(rsae));
}
bool Verify(const uint8_t * buf, size_t len, const uint8_t * signature) const
{
typename CryptoPP::RSASS<CryptoPP::PKCS1v15, Hash>::Verifier verifier(m_PublicKey);
return verifier.VerifyMessage(buf, len, signature, keyLen); // signature length
}
size_t GetPublicKeyLen() const { return keyLen; }
size_t GetSignatureLen() const { return keyLen; }
size_t GetPrivateKeyLen() const { return GetSignatureLen()*2; };
private:
CryptoPP::RSA::PublicKey m_PublicKey;
};
template<typename Hash>
class RSASigner: public Signer {
public:
RSASigner(const uint8_t * signingPrivateKey, size_t keyLen)
{
m_PrivateKey.Initialize(CryptoPP::Integer(signingPrivateKey, keyLen/2),
rsae,
CryptoPP::Integer(signingPrivateKey + keyLen/2, keyLen/2));
}
void Sign(CryptoPP::RandomNumberGenerator& rnd, const uint8_t * buf, int len, uint8_t * signature) const
{
typename CryptoPP::RSASS<CryptoPP::PKCS1v15, Hash>::Signer signer(m_PrivateKey);
signer.SignMessage(rnd, buf, len, signature);
}
private:
CryptoPP::RSA::PrivateKey m_PrivateKey;
};
inline void CreateRSARandomKeys(CryptoPP::RandomNumberGenerator& rnd,
size_t publicKeyLen, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
{
CryptoPP::RSA::PrivateKey privateKey;
privateKey.Initialize(rnd, publicKeyLen*8, rsae);
privateKey.GetModulus().Encode(signingPrivateKey, publicKeyLen);
privateKey.GetPrivateExponent().Encode(signingPrivateKey + publicKeyLen, publicKeyLen);
privateKey.GetModulus().Encode(signingPublicKey, publicKeyLen);
}
// RSA_SHA256_2048
const size_t RSASHA2562048_KEY_LENGTH = 256;
class RSASHA2562048Verifier: public RSAVerifier<CryptoPP::SHA256, RSASHA2562048_KEY_LENGTH> {
public:
RSASHA2562048Verifier(const uint8_t * signingKey): RSAVerifier(signingKey)
{
}
};
class RSASHA2562048Signer: public RSASigner<CryptoPP::SHA256> {
public:
RSASHA2562048Signer(const uint8_t * signingPrivateKey):
RSASigner(signingPrivateKey, RSASHA2562048_KEY_LENGTH*2)
{
}
};
// RSA_SHA384_3072
const size_t RSASHA3843072_KEY_LENGTH = 384;
class RSASHA3843072Verifier: public RSAVerifier<CryptoPP::SHA384, RSASHA3843072_KEY_LENGTH> {
public:
RSASHA3843072Verifier(const uint8_t * signingKey): RSAVerifier(signingKey)
{
}
};
class RSASHA3843072Signer: public RSASigner<CryptoPP::SHA384> {
public:
RSASHA3843072Signer(const uint8_t * signingPrivateKey):
RSASigner(signingPrivateKey, RSASHA3843072_KEY_LENGTH*2)
{
}
};
// RSA_SHA512_4096
const size_t RSASHA5124096_KEY_LENGTH = 512;
class RSASHA5124096Verifier: public RSAVerifier<CryptoPP::SHA512, RSASHA5124096_KEY_LENGTH> {
public:
RSASHA5124096Verifier(const uint8_t * signingKey): RSAVerifier(signingKey)
{
}
};
class RSASHA5124096Signer: public RSASigner<CryptoPP::SHA512> {
public:
RSASHA5124096Signer(const uint8_t * signingPrivateKey):
RSASigner(signingPrivateKey, RSASHA5124096_KEY_LENGTH*2)
{
}
};
// Raw verifiers
class RawVerifier {
public:
virtual ~RawVerifier() {};
virtual void Update(const uint8_t * buf, size_t len) = 0;
virtual bool Verify(const uint8_t * signature) = 0;
};
template<typename Hash, size_t keyLen>
class RSARawVerifier: public RawVerifier {
public:
RSARawVerifier(const uint8_t * signingKey):
n(signingKey, keyLen)
{
}
void Update(const uint8_t * buf, size_t len)
{
m_Hash.Update(buf, len);
}
bool Verify(const uint8_t * signature)
{
// RSA encryption first
CryptoPP::Integer enSig(a_exp_b_mod_c(CryptoPP::Integer(signature, keyLen),
CryptoPP::Integer(i2p::crypto::rsae), n)); // s^e mod n
uint8_t enSigBuf[keyLen];
enSig.Encode(enSigBuf, keyLen);
uint8_t digest[Hash::DIGESTSIZE];
m_Hash.Final(digest);
if((int)keyLen < Hash::DIGESTSIZE) return false; // can't verify digest longer than key
// we assume digest is right aligned, at least for PKCS#1 v1.5 padding
return !memcmp(enSigBuf +(keyLen - Hash::DIGESTSIZE), digest, Hash::DIGESTSIZE);
}
private:
CryptoPP::Integer n; // RSA modulus
Hash m_Hash;
};
class RSASHA5124096RawVerifier: public RSARawVerifier<CryptoPP::SHA512, RSASHA5124096_KEY_LENGTH> {
public:
RSASHA5124096RawVerifier(const uint8_t * signingKey): RSARawVerifier(signingKey)
{
}
};
} // crypto
} // i2p
#endif