1
0
Fork 0
mirror of https://github.com/anyproto/any-sync.git synced 2025-06-08 05:57:03 +09:00
any-sync/util/crypto/ed25519.go
2024-08-02 11:14:12 +02:00

259 lines
6.6 KiB
Go

package crypto
import (
"bytes"
"crypto/ed25519"
"crypto/rand"
"crypto/subtle"
"errors"
"fmt"
"github.com/anyproto/any-sync/util/crypto/cryptoproto"
"github.com/anyproto/any-sync/util/strkey"
"github.com/anyproto/protobuf/proto"
"github.com/libp2p/go-libp2p/core/crypto"
"io"
"sync"
)
// Ed25519PrivKey is an ed25519 private key.
type Ed25519PrivKey struct {
privKey ed25519.PrivateKey
privCurve *[32]byte
pubCurve *[32]byte
once sync.Once
}
// Ed25519PubKey is an ed25519 public key.
type Ed25519PubKey struct {
pubKey ed25519.PublicKey
pubCurve *[32]byte
curveOnce sync.Once
marshallOnce sync.Once
marshalled []byte
marshallErr error
}
func NewEd25519PrivKey(privKey ed25519.PrivateKey) PrivKey {
return &Ed25519PrivKey{privKey: privKey}
}
func NewEd25519PubKey(pubKey ed25519.PublicKey) PubKey {
return &Ed25519PubKey{pubKey: pubKey}
}
func UnmarshalEd25519PublicKeyProto(bytes []byte) (PubKey, error) {
msg := &cryptoproto.Key{}
err := proto.Unmarshal(bytes, msg)
if err != nil {
return nil, err
}
if msg.Type != cryptoproto.KeyType_Ed25519Public {
return nil, ErrIncorrectKeyType
}
return UnmarshalEd25519PublicKey(msg.Data)
}
func UnmarshalEd25519PrivateKeyProto(bytes []byte) (PrivKey, error) {
msg := &cryptoproto.Key{}
err := proto.Unmarshal(bytes, msg)
if err != nil {
return nil, err
}
if msg.Type != cryptoproto.KeyType_Ed25519Private {
return nil, ErrIncorrectKeyType
}
return UnmarshalEd25519PrivateKey(msg.Data)
}
func NewSigningEd25519PubKeyFromBytes(bytes []byte) (PubKey, error) {
return UnmarshalEd25519PublicKey(bytes)
}
func NewSigningEd25519PrivKeyFromBytes(bytes []byte) (PrivKey, error) {
return UnmarshalEd25519PrivateKey(bytes)
}
func GenerateRandomEd25519KeyPair() (PrivKey, PubKey, error) {
return GenerateEd25519Key(rand.Reader)
}
// GenerateEd25519Key generates a new ed25519 private and public key pair.
func GenerateEd25519Key(src io.Reader) (PrivKey, PubKey, error) {
pub, priv, err := ed25519.GenerateKey(src)
if err != nil {
return nil, nil, err
}
return NewEd25519PrivKey(priv),
NewEd25519PubKey(pub),
nil
}
// Raw private key bytes.
func (k *Ed25519PrivKey) Raw() ([]byte, error) {
buf := make([]byte, len(k.privKey))
copy(buf, k.privKey)
return buf, nil
}
func (k *Ed25519PrivKey) pubKeyBytes() []byte {
return k.privKey[ed25519.PrivateKeySize-ed25519.PublicKeySize:]
}
// Equals compares two ed25519 private keys.
func (k *Ed25519PrivKey) Equals(o Key) bool {
edk, ok := o.(*Ed25519PrivKey)
if !ok {
return KeyEquals(k, o)
}
return subtle.ConstantTimeCompare(k.privKey, edk.privKey) == 1
}
// GetPublic returns an ed25519 public key from a private key.
func (k *Ed25519PrivKey) GetPublic() PubKey {
return &Ed25519PubKey{
pubKey: k.pubKeyBytes(),
pubCurve: k.pubCurve,
}
}
// Sign returns a signature from an input message.
func (k *Ed25519PrivKey) Sign(msg []byte) ([]byte, error) {
return ed25519.Sign(k.privKey, msg), nil
}
// Marshall marshalls the key into proto
func (k *Ed25519PrivKey) Marshall() ([]byte, error) {
msg := &cryptoproto.Key{
Type: cryptoproto.KeyType_Ed25519Private,
Data: k.privKey,
}
return msg.Marshal()
}
// Decrypt decrypts the message
func (k *Ed25519PrivKey) Decrypt(msg []byte) ([]byte, error) {
k.once.Do(func() {
pubKey := k.pubKeyBytes()
privCurve := Ed25519PrivateKeyToCurve25519(k.privKey)
pubCurve := Ed25519PublicKeyToCurve25519(pubKey)
k.pubCurve = (*[32]byte)(pubCurve)
k.privCurve = (*[32]byte)(privCurve)
})
return DecryptX25519(k.privCurve, k.pubCurve, msg)
}
// LibP2P converts the key to libp2p format
func (k *Ed25519PrivKey) LibP2P() (crypto.PrivKey, error) {
return crypto.UnmarshalEd25519PrivateKey(k.privKey)
}
// Account returns string representation of key in anytype account format
func (k *Ed25519PubKey) Account() string {
res, _ := strkey.Encode(strkey.AccountAddressVersionByte, k.pubKey)
return res
}
func (k *Ed25519PubKey) Network() string {
res, _ := strkey.Encode(strkey.NetworkAddressVersionByte, k.pubKey)
return res
}
// PeerId returns string representation of key for peer id
func (k *Ed25519PubKey) PeerId() string {
peerId, _ := IdFromSigningPubKey(k)
return peerId.String()
}
// Raw public key bytes.
func (k *Ed25519PubKey) Raw() ([]byte, error) {
return k.pubKey, nil
}
// Encrypt message
func (k *Ed25519PubKey) Encrypt(msg []byte) (data []byte, err error) {
k.curveOnce.Do(func() {
pubCurve := Ed25519PublicKeyToCurve25519(k.pubKey)
k.pubCurve = (*[32]byte)(pubCurve)
})
data = EncryptX25519(k.pubCurve, msg)
return
}
// Storage returns underlying byte storage
func (k *Ed25519PubKey) Storage() []byte {
return k.pubKey
}
// Equals compares two ed25519 public keys.
func (k *Ed25519PubKey) Equals(o Key) bool {
edk, ok := o.(*Ed25519PubKey)
if !ok {
return KeyEquals(k, o)
}
return bytes.Equal(k.pubKey, edk.pubKey)
}
// Verify checks a signature agains the input data.
func (k *Ed25519PubKey) Verify(data []byte, sig []byte) (bool, error) {
return ed25519.Verify(k.pubKey, data, sig), nil
}
// Marshall marshalls the key into proto
func (k *Ed25519PubKey) Marshall() ([]byte, error) {
k.marshallOnce.Do(func() {
msg := &cryptoproto.Key{
Type: cryptoproto.KeyType_Ed25519Public,
Data: k.pubKey,
}
k.marshalled, k.marshallErr = proto.Marshal(msg)
})
return k.marshalled, k.marshallErr
}
// LibP2P converts the key to libp2p format
func (k *Ed25519PubKey) LibP2P() (crypto.PubKey, error) {
return crypto.UnmarshalEd25519PublicKey(k.pubKey)
}
// UnmarshalEd25519PublicKey returns a public key from input bytes.
func UnmarshalEd25519PublicKey(data []byte) (PubKey, error) {
if len(data) != 32 {
return nil, errors.New("expect ed25519 public key data size to be 32")
}
return NewEd25519PubKey(data), nil
}
// UnmarshalEd25519PrivateKey returns a private key from input bytes.
func UnmarshalEd25519PrivateKey(data []byte) (PrivKey, error) {
switch len(data) {
case ed25519.PrivateKeySize + ed25519.PublicKeySize:
// Remove the redundant public key. See issue #36.
redundantPk := data[ed25519.PrivateKeySize:]
pk := data[ed25519.PrivateKeySize-ed25519.PublicKeySize : ed25519.PrivateKeySize]
if subtle.ConstantTimeCompare(pk, redundantPk) == 0 {
return nil, errors.New("expected redundant ed25519 public key to be redundant")
}
// No point in storing the extra data.
newKey := make([]byte, ed25519.PrivateKeySize)
copy(newKey, data[:ed25519.PrivateKeySize])
data = newKey
case ed25519.PrivateKeySize:
default:
return nil, fmt.Errorf(
"expected ed25519 data size to be %d or %d, got %d",
ed25519.PrivateKeySize,
ed25519.PrivateKeySize+ed25519.PublicKeySize,
len(data),
)
}
return NewEd25519PrivKey(data), nil
}