151 lines
4.0 KiB
Go
151 lines
4.0 KiB
Go
/*
|
|
Copyright IBM Corp. 2017 All Rights Reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package sw
|
|
|
|
import (
|
|
"crypto/ecdsa"
|
|
"crypto/hmac"
|
|
"errors"
|
|
"fmt"
|
|
"math/big"
|
|
|
|
"github.com/hyperledger/fabric/bccsp"
|
|
)
|
|
|
|
type ecdsaPublicKeyKeyDeriver struct{}
|
|
|
|
func (kd *ecdsaPublicKeyKeyDeriver) KeyDeriv(key bccsp.Key, opts bccsp.KeyDerivOpts) (bccsp.Key, error) {
|
|
// Validate opts
|
|
if opts == nil {
|
|
return nil, errors.New("Invalid opts parameter. It must not be nil.")
|
|
}
|
|
|
|
ecdsaK := key.(*ecdsaPublicKey)
|
|
|
|
// Re-randomized an ECDSA private key
|
|
reRandOpts, ok := opts.(*bccsp.ECDSAReRandKeyOpts)
|
|
if !ok {
|
|
return nil, fmt.Errorf("Unsupported 'KeyDerivOpts' provided [%v]", opts)
|
|
}
|
|
|
|
tempSK := &ecdsa.PublicKey{
|
|
Curve: ecdsaK.pubKey.Curve,
|
|
X: new(big.Int),
|
|
Y: new(big.Int),
|
|
}
|
|
|
|
k := new(big.Int).SetBytes(reRandOpts.ExpansionValue())
|
|
one := new(big.Int).SetInt64(1)
|
|
n := new(big.Int).Sub(ecdsaK.pubKey.Params().N, one)
|
|
k.Mod(k, n)
|
|
k.Add(k, one)
|
|
|
|
// Compute temporary public key
|
|
tempX, tempY := ecdsaK.pubKey.ScalarBaseMult(k.Bytes())
|
|
tempSK.X, tempSK.Y = tempSK.Add(
|
|
ecdsaK.pubKey.X, ecdsaK.pubKey.Y,
|
|
tempX, tempY,
|
|
)
|
|
|
|
// Verify temporary public key is a valid point on the reference curve
|
|
isOn := tempSK.Curve.IsOnCurve(tempSK.X, tempSK.Y)
|
|
if !isOn {
|
|
return nil, errors.New("Failed temporary public key IsOnCurve check.")
|
|
}
|
|
|
|
return &ecdsaPublicKey{tempSK}, nil
|
|
}
|
|
|
|
type ecdsaPrivateKeyKeyDeriver struct{}
|
|
|
|
func (kd *ecdsaPrivateKeyKeyDeriver) KeyDeriv(key bccsp.Key, opts bccsp.KeyDerivOpts) (bccsp.Key, error) {
|
|
// Validate opts
|
|
if opts == nil {
|
|
return nil, errors.New("Invalid opts parameter. It must not be nil.")
|
|
}
|
|
|
|
ecdsaK := key.(*ecdsaPrivateKey)
|
|
|
|
// Re-randomized an ECDSA private key
|
|
reRandOpts, ok := opts.(*bccsp.ECDSAReRandKeyOpts)
|
|
if !ok {
|
|
return nil, fmt.Errorf("Unsupported 'KeyDerivOpts' provided [%v]", opts)
|
|
}
|
|
|
|
tempSK := &ecdsa.PrivateKey{
|
|
PublicKey: ecdsa.PublicKey{
|
|
Curve: ecdsaK.privKey.Curve,
|
|
X: new(big.Int),
|
|
Y: new(big.Int),
|
|
},
|
|
D: new(big.Int),
|
|
}
|
|
|
|
k := new(big.Int).SetBytes(reRandOpts.ExpansionValue())
|
|
one := new(big.Int).SetInt64(1)
|
|
n := new(big.Int).Sub(ecdsaK.privKey.Params().N, one)
|
|
k.Mod(k, n)
|
|
k.Add(k, one)
|
|
|
|
tempSK.D.Add(ecdsaK.privKey.D, k)
|
|
tempSK.D.Mod(tempSK.D, ecdsaK.privKey.PublicKey.Params().N)
|
|
|
|
// Compute temporary public key
|
|
tempX, tempY := ecdsaK.privKey.PublicKey.ScalarBaseMult(k.Bytes())
|
|
tempSK.PublicKey.X, tempSK.PublicKey.Y =
|
|
tempSK.PublicKey.Add(
|
|
ecdsaK.privKey.PublicKey.X, ecdsaK.privKey.PublicKey.Y,
|
|
tempX, tempY,
|
|
)
|
|
|
|
// Verify temporary public key is a valid point on the reference curve
|
|
isOn := tempSK.Curve.IsOnCurve(tempSK.PublicKey.X, tempSK.PublicKey.Y)
|
|
if !isOn {
|
|
return nil, errors.New("Failed temporary public key IsOnCurve check.")
|
|
}
|
|
|
|
return &ecdsaPrivateKey{tempSK}, nil
|
|
}
|
|
|
|
type aesPrivateKeyKeyDeriver struct {
|
|
conf *config
|
|
}
|
|
|
|
func (kd *aesPrivateKeyKeyDeriver) KeyDeriv(k bccsp.Key, opts bccsp.KeyDerivOpts) (bccsp.Key, error) {
|
|
// Validate opts
|
|
if opts == nil {
|
|
return nil, errors.New("Invalid opts parameter. It must not be nil.")
|
|
}
|
|
|
|
aesK := k.(*aesPrivateKey)
|
|
|
|
switch hmacOpts := opts.(type) {
|
|
case *bccsp.HMACTruncated256AESDeriveKeyOpts:
|
|
mac := hmac.New(kd.conf.hashFunction, aesK.privKey)
|
|
mac.Write(hmacOpts.Argument())
|
|
return &aesPrivateKey{mac.Sum(nil)[:kd.conf.aesBitLength], false}, nil
|
|
|
|
case *bccsp.HMACDeriveKeyOpts:
|
|
mac := hmac.New(kd.conf.hashFunction, aesK.privKey)
|
|
mac.Write(hmacOpts.Argument())
|
|
return &aesPrivateKey{mac.Sum(nil), true}, nil
|
|
|
|
default:
|
|
return nil, fmt.Errorf("Unsupported 'KeyDerivOpts' provided [%v]", opts)
|
|
}
|
|
}
|