// Copyright 2019 Parity Technologies (UK) Ltd. // // Permission is hereby granted, free of charge, to any person obtaining a // copy of this software and associated documentation files (the "Software"), // to deal in the Software without restriction, including without limitation // the rights to use, copy, modify, merge, publish, distribute, sublicense, // and/or sell copies of the Software, and to permit persons to whom the // Software is furnished to do so, subject to the following conditions: // // The above copyright notice and this permission notice shall be included in // all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING // FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER // DEALINGS IN THE SOFTWARE. //! A node's network identity keys. pub mod ed25519; #[cfg(not(target_arch = "wasm32"))] pub mod rsa; #[cfg(feature = "secp256k1")] pub mod secp256k1; pub mod error; use self::error::*; use crate::{PeerId, keys_proto}; /// Identity keypair of a node. /// /// # Example: Generating RSA keys with OpenSSL /// /// ```text /// openssl genrsa -out private.pem 2048 /// openssl pkcs8 -in private.pem -inform PEM -topk8 -out private.pk8 -outform DER -nocrypt /// rm private.pem # optional /// ``` /// /// Loading the keys: /// /// ```text /// let mut bytes = std::fs::read("private.pk8").unwrap(); /// let keypair = Keypair::rsa_from_pkcs8(&mut bytes); /// ``` /// #[derive(Clone)] pub enum Keypair { /// An Ed25519 keypair. Ed25519(ed25519::Keypair), #[cfg(not(target_arch = "wasm32"))] /// An RSA keypair. Rsa(rsa::Keypair), /// A Secp256k1 keypair. #[cfg(feature = "secp256k1")] Secp256k1(secp256k1::Keypair) } impl Keypair { /// Generate a new Ed25519 keypair. pub fn generate_ed25519() -> Keypair { Keypair::Ed25519(ed25519::Keypair::generate()) } /// Generate a new Secp256k1 keypair. #[cfg(feature = "secp256k1")] pub fn generate_secp256k1() -> Keypair { Keypair::Secp256k1(secp256k1::Keypair::generate()) } /// Decode an keypair from a DER-encoded secret key in PKCS#8 PrivateKeyInfo /// format (i.e. unencrypted) as defined in [RFC5208]. /// /// [RFC5208]: https://tools.ietf.org/html/rfc5208#section-5 #[cfg(not(target_arch = "wasm32"))] pub fn rsa_from_pkcs8(pkcs8_der: &mut [u8]) -> Result { rsa::Keypair::from_pkcs8(pkcs8_der).map(Keypair::Rsa) } /// Decode a keypair from a DER-encoded Secp256k1 secret key in an ECPrivateKey /// structure as defined in [RFC5915]. /// /// [RFC5915]: https://tools.ietf.org/html/rfc5915 #[cfg(feature = "secp256k1")] pub fn secp256k1_from_der(der: &mut [u8]) -> Result { secp256k1::SecretKey::from_der(der) .map(|sk| Keypair::Secp256k1(secp256k1::Keypair::from(sk))) } /// Sign a message using the private key of this keypair, producing /// a signature that can be verified using the corresponding public key. pub fn sign(&self, msg: &[u8]) -> Result, SigningError> { use Keypair::*; match self { Ed25519(ref pair) => Ok(pair.sign(msg)), #[cfg(not(target_arch = "wasm32"))] Rsa(ref pair) => pair.sign(msg), #[cfg(feature = "secp256k1")] Secp256k1(ref pair) => pair.secret().sign(msg) } } /// Get the public key of this keypair. pub fn public(&self) -> PublicKey { use Keypair::*; match self { Ed25519(pair) => PublicKey::Ed25519(pair.public()), #[cfg(not(target_arch = "wasm32"))] Rsa(pair) => PublicKey::Rsa(pair.public()), #[cfg(feature = "secp256k1")] Secp256k1(pair) => PublicKey::Secp256k1(pair.public().clone()), } } /// Decode a private key from a protobuf structure and parse it as a [`Keypair`]. pub fn from_protobuf_encoding(bytes: &[u8]) -> Result { use prost::Message; let mut private_key = keys_proto::PrivateKey::decode(bytes) .map_err(|e| DecodingError::new("Protobuf").source(e)) .map(zeroize::Zeroizing::new)?; let key_type = keys_proto::KeyType::from_i32(private_key.r#type) .ok_or_else(|| DecodingError::new(format!("unknown key type: {}", private_key.r#type)))?; match key_type { keys_proto::KeyType::Ed25519 => { ed25519::Keypair::decode(&mut private_key.data).map(Keypair::Ed25519) }, keys_proto::KeyType::Rsa => { Err(DecodingError::new("Decoding RSA key from Protobuf is unsupported.")) }, keys_proto::KeyType::Secp256k1 => { Err(DecodingError::new("Decoding Secp256k1 key from Protobuf is unsupported.")) }, } } } impl zeroize::Zeroize for keys_proto::PrivateKey { fn zeroize(&mut self) { self.r#type.zeroize(); self.data.zeroize(); } } /// The public key of a node's identity keypair. #[derive(Clone, Debug, PartialEq, Eq)] pub enum PublicKey { /// A public Ed25519 key. Ed25519(ed25519::PublicKey), #[cfg(not(target_arch = "wasm32"))] /// A public RSA key. Rsa(rsa::PublicKey), #[cfg(feature = "secp256k1")] /// A public Secp256k1 key. Secp256k1(secp256k1::PublicKey) } impl PublicKey { /// Verify a signature for a message using this public key, i.e. check /// that the signature has been produced by the corresponding /// private key (authenticity), and that the message has not been /// tampered with (integrity). pub fn verify(&self, msg: &[u8], sig: &[u8]) -> bool { use PublicKey::*; match self { Ed25519(pk) => pk.verify(msg, sig), #[cfg(not(target_arch = "wasm32"))] Rsa(pk) => pk.verify(msg, sig), #[cfg(feature = "secp256k1")] Secp256k1(pk) => pk.verify(msg, sig) } } /// Encode the public key into a protobuf structure for storage or /// exchange with other nodes. pub fn into_protobuf_encoding(self) -> Vec { use prost::Message; let public_key = match self { PublicKey::Ed25519(key) => keys_proto::PublicKey { r#type: keys_proto::KeyType::Ed25519 as i32, data: key.encode().to_vec() }, #[cfg(not(target_arch = "wasm32"))] PublicKey::Rsa(key) => keys_proto::PublicKey { r#type: keys_proto::KeyType::Rsa as i32, data: key.encode_x509() }, #[cfg(feature = "secp256k1")] PublicKey::Secp256k1(key) => keys_proto::PublicKey { r#type: keys_proto::KeyType::Secp256k1 as i32, data: key.encode().to_vec() } }; let mut buf = Vec::with_capacity(public_key.encoded_len()); public_key.encode(&mut buf).expect("Vec provides capacity as needed"); buf } /// Decode a public key from a protobuf structure, e.g. read from storage /// or received from another node. pub fn from_protobuf_encoding(bytes: &[u8]) -> Result { use prost::Message; #[allow(unused_mut)] // Due to conditional compilation. let mut pubkey = keys_proto::PublicKey::decode(bytes) .map_err(|e| DecodingError::new("Protobuf").source(e))?; let key_type = keys_proto::KeyType::from_i32(pubkey.r#type) .ok_or_else(|| DecodingError::new(format!("unknown key type: {}", pubkey.r#type)))?; match key_type { keys_proto::KeyType::Ed25519 => { ed25519::PublicKey::decode(&pubkey.data).map(PublicKey::Ed25519) }, #[cfg(not(target_arch = "wasm32"))] keys_proto::KeyType::Rsa => { rsa::PublicKey::decode_x509(&pubkey.data).map(PublicKey::Rsa) } #[cfg(target_arch = "wasm32")] keys_proto::KeyType::Rsa => { log::debug!("support for RSA was disabled at compile-time"); Err(DecodingError::new("Unsupported")) }, #[cfg(feature = "secp256k1")] keys_proto::KeyType::Secp256k1 => { secp256k1::PublicKey::decode(&pubkey.data).map(PublicKey::Secp256k1) } #[cfg(not(feature = "secp256k1"))] keys_proto::KeyType::Secp256k1 => { log::debug!("support for secp256k1 was disabled at compile-time"); Err(DecodingError::new("Unsupported")) } } } /// Convert the `PublicKey` into the corresponding `PeerId`. pub fn into_peer_id(self) -> PeerId { self.into() } } #[cfg(test)] mod tests { use super::*; use std::str::FromStr; #[test] fn keypair_from_protobuf_encoding() { // E.g. retrieved from an IPFS config file. let base_64_encoded = "CAESQL6vdKQuznQosTrW7FWI9At+XX7EBf0BnZLhb6w+N+XSQSdfInl6c7U4NuxXJlhKcRBlBw9d0tj2dfBIVf6mcPA="; let expected_peer_id = PeerId::from_str("12D3KooWEChVMMMzV8acJ53mJHrw1pQ27UAGkCxWXLJutbeUMvVu").unwrap(); let encoded = base64::decode(base_64_encoded).unwrap(); let keypair = Keypair::from_protobuf_encoding(&encoded).unwrap(); let peer_id = keypair.public().into_peer_id(); assert_eq!(expected_peer_id, peer_id); } }