mirror of
https://github.com/fluencelabs/rust-libp2p
synced 2025-06-13 01:51:23 +00:00
feat(identity): allow importing and exporting ECDSA keys
Implement encoding to/decoding from DER-encoded secret key document for `ecdsa::SecretKey`. Implement encoding to/decoding from protobuf format for ECDSA keys. Bump dependency `p256` from 0.12 to 0.13. Bump dependency `sec1` from 0.3.0 to 0.7 Related: #3681. Pull-Request: #3863.
This commit is contained in:
@ -2,8 +2,12 @@
|
||||
|
||||
- Raise MSRV to 1.65.
|
||||
See [PR 3715].
|
||||
- Add support for exporting and importing ECDSA keys via the libp2p [protobuf format].
|
||||
See [PR 3863].
|
||||
|
||||
[PR 3715]: https://github.com/libp2p/rust-libp2p/pull/3715
|
||||
[PR 3863]: https://github.com/libp2p/rust-libp2p/pull/3863
|
||||
[protobuf format]: https://github.com/libp2p/specs/blob/master/peer-ids/peer-ids.md#keys
|
||||
|
||||
## 0.1.2
|
||||
|
||||
|
@ -19,10 +19,10 @@ libsecp256k1 = { version = "0.7.0", optional = true }
|
||||
log = "0.4"
|
||||
multiaddr = { version = "0.17.1", optional = true }
|
||||
multihash = { version = "0.17.0", default-features = false, features = ["std"], optional = true }
|
||||
p256 = { version = "0.12", default-features = false, features = ["ecdsa", "std"], optional = true }
|
||||
p256 = { version = "0.13", default-features = false, features = ["ecdsa", "std", "pem"], optional = true }
|
||||
quick-protobuf = { version = "0.8.1", optional = true }
|
||||
rand = { version = "0.8", optional = true }
|
||||
sec1 = { version = "0.3.0", features = ["std"], optional = true } # Activate `std` feature until https://github.com/RustCrypto/traits/pull/1131 is released.
|
||||
sec1 = { version = "0.7", default-features = false, optional = true }
|
||||
serde = { version = "1", optional = true, features = ["derive"] }
|
||||
sha2 = { version = "0.10.0", optional = true }
|
||||
thiserror = { version = "1.0", optional = true }
|
||||
@ -45,6 +45,7 @@ base64 = "0.21.0"
|
||||
serde_json = "1.0"
|
||||
rmp-serde = "1.0"
|
||||
criterion = "0.4"
|
||||
hex-literal = "0.4.1"
|
||||
|
||||
[[bench]]
|
||||
name = "peer_id"
|
||||
|
@ -31,7 +31,9 @@ use p256::{
|
||||
},
|
||||
EncodedPoint,
|
||||
};
|
||||
use sec1::{DecodeEcPrivateKey, EncodeEcPrivateKey};
|
||||
use void::Void;
|
||||
use zeroize::Zeroize;
|
||||
|
||||
/// An ECDSA keypair generated using `secp256r1` curve.
|
||||
#[derive(Clone)]
|
||||
@ -118,10 +120,30 @@ impl SecretKey {
|
||||
|
||||
/// Try to parse a secret key from a byte buffer containing raw scalar of the key.
|
||||
pub fn try_from_bytes(buf: impl AsRef<[u8]>) -> Result<SecretKey, DecodingError> {
|
||||
SigningKey::from_bytes(buf.as_ref())
|
||||
SigningKey::from_bytes(buf.as_ref().into())
|
||||
.map_err(|err| DecodingError::failed_to_parse("ecdsa p256 secret key", err))
|
||||
.map(SecretKey)
|
||||
}
|
||||
|
||||
/// Encode the secret key into DER-encoded byte buffer.
|
||||
pub(crate) fn encode_der(&self) -> Vec<u8> {
|
||||
self.0
|
||||
.to_sec1_der()
|
||||
.expect("Encoding to pkcs#8 format to succeed")
|
||||
.to_bytes()
|
||||
.to_vec()
|
||||
}
|
||||
|
||||
/// Try to decode a secret key from a DER-encoded byte buffer, zeroize the buffer on success.
|
||||
pub(crate) fn try_decode_der(buf: &mut [u8]) -> Result<Self, DecodingError> {
|
||||
match SigningKey::from_sec1_der(buf) {
|
||||
Ok(key) => {
|
||||
buf.zeroize();
|
||||
Ok(SecretKey(key))
|
||||
}
|
||||
Err(e) => Err(DecodingError::failed_to_parse("ECDSA", e)),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for SecretKey {
|
||||
|
@ -33,13 +33,6 @@ pub struct DecodingError {
|
||||
}
|
||||
|
||||
impl DecodingError {
|
||||
#[cfg(not(all(
|
||||
feature = "ecdsa",
|
||||
feature = "rsa",
|
||||
feature = "secp256k1",
|
||||
feature = "ed25519",
|
||||
not(target_arch = "wasm32")
|
||||
)))]
|
||||
pub(crate) fn missing_feature(feature_name: &'static str) -> Self {
|
||||
Self {
|
||||
msg: format!("cargo feature `{feature_name}` is not enabled"),
|
||||
|
@ -223,29 +223,25 @@ impl Keypair {
|
||||
}
|
||||
|
||||
/// Encode a private key as protobuf structure.
|
||||
#[cfg_attr(
|
||||
not(feature = "ed25519"),
|
||||
allow(unreachable_code, unused_variables, unused_mut)
|
||||
)]
|
||||
pub fn to_protobuf_encoding(&self) -> Result<Vec<u8>, DecodingError> {
|
||||
use quick_protobuf::MessageWrite;
|
||||
|
||||
#[cfg(not(feature = "ed25519"))]
|
||||
return Err(DecodingError::missing_feature("ed25519"));
|
||||
|
||||
#[allow(deprecated)]
|
||||
let pk: proto::PrivateKey = match self {
|
||||
#[cfg(feature = "ed25519")]
|
||||
Self::Ed25519(data) => proto::PrivateKey {
|
||||
Type: proto::KeyType::Ed25519,
|
||||
Data: data.encode().to_vec(),
|
||||
Data: data.to_bytes().to_vec(),
|
||||
},
|
||||
#[cfg(all(feature = "rsa", not(target_arch = "wasm32")))]
|
||||
Self::Rsa(_) => return Err(DecodingError::encoding_unsupported("RSA")),
|
||||
#[cfg(feature = "secp256k1")]
|
||||
Self::Secp256k1(_) => return Err(DecodingError::encoding_unsupported("secp256k1")),
|
||||
#[cfg(feature = "ecdsa")]
|
||||
Self::Ecdsa(_) => return Err(DecodingError::encoding_unsupported("ECDSA")),
|
||||
Self::Ecdsa(data) => proto::PrivateKey {
|
||||
Type: proto::KeyType::ECDSA,
|
||||
Data: data.secret().encode_der(),
|
||||
},
|
||||
};
|
||||
|
||||
let mut buf = Vec::with_capacity(pk.get_size());
|
||||
@ -256,7 +252,6 @@ impl Keypair {
|
||||
}
|
||||
|
||||
/// Decode a private key from a protobuf structure and parse it as a [`Keypair`].
|
||||
#[cfg_attr(not(feature = "ed25519"), allow(unused_mut))]
|
||||
pub fn from_protobuf_encoding(bytes: &[u8]) -> Result<Keypair, DecodingError> {
|
||||
use quick_protobuf::MessageRead;
|
||||
|
||||
@ -265,18 +260,22 @@ impl Keypair {
|
||||
.map_err(|e| DecodingError::bad_protobuf("private key bytes", e))
|
||||
.map(zeroize::Zeroizing::new)?;
|
||||
|
||||
#[allow(deprecated, unreachable_code)]
|
||||
match private_key.Type {
|
||||
#[cfg(feature = "ed25519")]
|
||||
proto::KeyType::Ed25519 =>
|
||||
{
|
||||
#[allow(deprecated)]
|
||||
ed25519::Keypair::decode(&mut private_key.Data).map(Keypair::Ed25519)
|
||||
proto::KeyType::Ed25519 => {
|
||||
#[cfg(feature = "ed25519")]
|
||||
return ed25519::Keypair::try_from_bytes(&mut private_key.Data)
|
||||
.map(Keypair::Ed25519);
|
||||
Err(DecodingError::missing_feature("ed25519"))
|
||||
}
|
||||
#[cfg(not(feature = "ed25519"))]
|
||||
proto::KeyType::Ed25519 => Err(DecodingError::missing_feature("ed25519")),
|
||||
proto::KeyType::RSA => Err(DecodingError::decoding_unsupported("RSA")),
|
||||
proto::KeyType::Secp256k1 => Err(DecodingError::decoding_unsupported("secp256k1")),
|
||||
proto::KeyType::ECDSA => Err(DecodingError::decoding_unsupported("ECDSA")),
|
||||
proto::KeyType::ECDSA => {
|
||||
#[cfg(feature = "ecdsa")]
|
||||
return ecdsa::SecretKey::try_decode_der(&mut private_key.Data)
|
||||
.map(|key| Keypair::Ecdsa(key.into()));
|
||||
Err(DecodingError::missing_feature("ecdsa"))
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -715,6 +714,41 @@ mod tests {
|
||||
assert_eq!(expected_peer_id, peer_id);
|
||||
}
|
||||
|
||||
#[test]
|
||||
#[cfg(all(feature = "ecdsa", feature = "peerid"))]
|
||||
fn keypair_protobuf_roundtrip_ecdsa() {
|
||||
let priv_key = Keypair::from_protobuf_encoding(&hex_literal::hex!(
|
||||
"08031279307702010104203E5B1FE9712E6C314942A750BD67485DE3C1EFE85B1BFB520AE8F9AE3DFA4A4CA00A06082A8648CE3D030107A14403420004DE3D300FA36AE0E8F5D530899D83ABAB44ABF3161F162A4BC901D8E6ECDA020E8B6D5F8DA30525E71D6851510C098E5C47C646A597FB4DCEC034E9F77C409E62"
|
||||
))
|
||||
.unwrap();
|
||||
let pub_key = PublicKey::try_decode_protobuf(&hex_literal::hex!("0803125b3059301306072a8648ce3d020106082a8648ce3d03010703420004de3d300fa36ae0e8f5d530899d83abab44abf3161f162a4bc901d8e6ecda020e8b6d5f8da30525e71d6851510c098e5c47c646a597fb4dcec034e9f77c409e62")).unwrap();
|
||||
|
||||
roundtrip_protobuf_encoding(&priv_key, &pub_key);
|
||||
}
|
||||
|
||||
#[cfg(feature = "peerid")]
|
||||
fn roundtrip_protobuf_encoding(private_key: &Keypair, public_key: &PublicKey) {
|
||||
assert_eq!(&private_key.public(), public_key);
|
||||
|
||||
let encoded_priv = private_key.to_protobuf_encoding().unwrap();
|
||||
let decoded_priv = Keypair::from_protobuf_encoding(&encoded_priv).unwrap();
|
||||
|
||||
assert_eq!(
|
||||
private_key.public().to_peer_id(),
|
||||
decoded_priv.public().to_peer_id(),
|
||||
"PeerId from roundtripped private key should be the same"
|
||||
);
|
||||
|
||||
let encoded_public = private_key.public().encode_protobuf();
|
||||
let decoded_public = PublicKey::try_decode_protobuf(&encoded_public).unwrap();
|
||||
|
||||
assert_eq!(
|
||||
private_key.public().to_peer_id(),
|
||||
decoded_public.to_peer_id(),
|
||||
"PeerId from roundtripped public key should be the same"
|
||||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
#[cfg(feature = "peerid")]
|
||||
fn keypair_from_protobuf_encoding() {
|
||||
|
@ -267,25 +267,27 @@ impl FromStr for PeerId {
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use super::*;
|
||||
use crate::keypair::Keypair;
|
||||
|
||||
#[test]
|
||||
#[cfg(feature = "ed25519")]
|
||||
fn peer_id_is_public_key() {
|
||||
let key = Keypair::generate_ed25519().public();
|
||||
let key = crate::Keypair::generate_ed25519().public();
|
||||
let peer_id = key.to_peer_id();
|
||||
assert_eq!(peer_id.is_public_key(&key), Some(true));
|
||||
}
|
||||
|
||||
#[test]
|
||||
#[cfg(feature = "ed25519")]
|
||||
fn peer_id_into_bytes_then_from_bytes() {
|
||||
let peer_id = Keypair::generate_ed25519().public().to_peer_id();
|
||||
let peer_id = crate::Keypair::generate_ed25519().public().to_peer_id();
|
||||
let second = PeerId::from_bytes(&peer_id.to_bytes()).unwrap();
|
||||
assert_eq!(peer_id, second);
|
||||
}
|
||||
|
||||
#[test]
|
||||
#[cfg(feature = "ed25519")]
|
||||
fn peer_id_to_base58_then_back() {
|
||||
let peer_id = Keypair::generate_ed25519().public().to_peer_id();
|
||||
let peer_id = crate::Keypair::generate_ed25519().public().to_peer_id();
|
||||
let second: PeerId = peer_id.to_base58().parse().unwrap();
|
||||
assert_eq!(peer_id, second);
|
||||
}
|
||||
|
BIN
identity/src/test/secp256r1.pk8
Normal file
BIN
identity/src/test/secp256r1.pk8
Normal file
Binary file not shown.
Reference in New Issue
Block a user