mirror of http://git.sairate.top/sairate/doc.git
404 lines
10 KiB
Python
404 lines
10 KiB
Python
# This file is dual licensed under the terms of the Apache License, Version
|
|
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
|
|
# for complete details.
|
|
|
|
from __future__ import annotations
|
|
|
|
import abc
|
|
import typing
|
|
|
|
from cryptography import utils
|
|
from cryptography.exceptions import UnsupportedAlgorithm, _Reasons
|
|
from cryptography.hazmat._oid import ObjectIdentifier
|
|
from cryptography.hazmat.bindings._rust import openssl as rust_openssl
|
|
from cryptography.hazmat.primitives import _serialization, hashes
|
|
from cryptography.hazmat.primitives.asymmetric import utils as asym_utils
|
|
|
|
|
|
class EllipticCurveOID:
|
|
SECP192R1 = ObjectIdentifier("1.2.840.10045.3.1.1")
|
|
SECP224R1 = ObjectIdentifier("1.3.132.0.33")
|
|
SECP256K1 = ObjectIdentifier("1.3.132.0.10")
|
|
SECP256R1 = ObjectIdentifier("1.2.840.10045.3.1.7")
|
|
SECP384R1 = ObjectIdentifier("1.3.132.0.34")
|
|
SECP521R1 = ObjectIdentifier("1.3.132.0.35")
|
|
BRAINPOOLP256R1 = ObjectIdentifier("1.3.36.3.3.2.8.1.1.7")
|
|
BRAINPOOLP384R1 = ObjectIdentifier("1.3.36.3.3.2.8.1.1.11")
|
|
BRAINPOOLP512R1 = ObjectIdentifier("1.3.36.3.3.2.8.1.1.13")
|
|
SECT163K1 = ObjectIdentifier("1.3.132.0.1")
|
|
SECT163R2 = ObjectIdentifier("1.3.132.0.15")
|
|
SECT233K1 = ObjectIdentifier("1.3.132.0.26")
|
|
SECT233R1 = ObjectIdentifier("1.3.132.0.27")
|
|
SECT283K1 = ObjectIdentifier("1.3.132.0.16")
|
|
SECT283R1 = ObjectIdentifier("1.3.132.0.17")
|
|
SECT409K1 = ObjectIdentifier("1.3.132.0.36")
|
|
SECT409R1 = ObjectIdentifier("1.3.132.0.37")
|
|
SECT571K1 = ObjectIdentifier("1.3.132.0.38")
|
|
SECT571R1 = ObjectIdentifier("1.3.132.0.39")
|
|
|
|
|
|
class EllipticCurve(metaclass=abc.ABCMeta):
|
|
@property
|
|
@abc.abstractmethod
|
|
def name(self) -> str:
|
|
"""
|
|
The name of the curve. e.g. secp256r1.
|
|
"""
|
|
|
|
@property
|
|
@abc.abstractmethod
|
|
def key_size(self) -> int:
|
|
"""
|
|
Bit size of a secret scalar for the curve.
|
|
"""
|
|
|
|
|
|
class EllipticCurveSignatureAlgorithm(metaclass=abc.ABCMeta):
|
|
@property
|
|
@abc.abstractmethod
|
|
def algorithm(
|
|
self,
|
|
) -> asym_utils.Prehashed | hashes.HashAlgorithm:
|
|
"""
|
|
The digest algorithm used with this signature.
|
|
"""
|
|
|
|
|
|
class EllipticCurvePrivateKey(metaclass=abc.ABCMeta):
|
|
@abc.abstractmethod
|
|
def exchange(
|
|
self, algorithm: ECDH, peer_public_key: EllipticCurvePublicKey
|
|
) -> bytes:
|
|
"""
|
|
Performs a key exchange operation using the provided algorithm with the
|
|
provided peer's public key.
|
|
"""
|
|
|
|
@abc.abstractmethod
|
|
def public_key(self) -> EllipticCurvePublicKey:
|
|
"""
|
|
The EllipticCurvePublicKey for this private key.
|
|
"""
|
|
|
|
@property
|
|
@abc.abstractmethod
|
|
def curve(self) -> EllipticCurve:
|
|
"""
|
|
The EllipticCurve that this key is on.
|
|
"""
|
|
|
|
@property
|
|
@abc.abstractmethod
|
|
def key_size(self) -> int:
|
|
"""
|
|
Bit size of a secret scalar for the curve.
|
|
"""
|
|
|
|
@abc.abstractmethod
|
|
def sign(
|
|
self,
|
|
data: bytes,
|
|
signature_algorithm: EllipticCurveSignatureAlgorithm,
|
|
) -> bytes:
|
|
"""
|
|
Signs the data
|
|
"""
|
|
|
|
@abc.abstractmethod
|
|
def private_numbers(self) -> EllipticCurvePrivateNumbers:
|
|
"""
|
|
Returns an EllipticCurvePrivateNumbers.
|
|
"""
|
|
|
|
@abc.abstractmethod
|
|
def private_bytes(
|
|
self,
|
|
encoding: _serialization.Encoding,
|
|
format: _serialization.PrivateFormat,
|
|
encryption_algorithm: _serialization.KeySerializationEncryption,
|
|
) -> bytes:
|
|
"""
|
|
Returns the key serialized as bytes.
|
|
"""
|
|
|
|
|
|
EllipticCurvePrivateKeyWithSerialization = EllipticCurvePrivateKey
|
|
EllipticCurvePrivateKey.register(rust_openssl.ec.ECPrivateKey)
|
|
|
|
|
|
class EllipticCurvePublicKey(metaclass=abc.ABCMeta):
|
|
@property
|
|
@abc.abstractmethod
|
|
def curve(self) -> EllipticCurve:
|
|
"""
|
|
The EllipticCurve that this key is on.
|
|
"""
|
|
|
|
@property
|
|
@abc.abstractmethod
|
|
def key_size(self) -> int:
|
|
"""
|
|
Bit size of a secret scalar for the curve.
|
|
"""
|
|
|
|
@abc.abstractmethod
|
|
def public_numbers(self) -> EllipticCurvePublicNumbers:
|
|
"""
|
|
Returns an EllipticCurvePublicNumbers.
|
|
"""
|
|
|
|
@abc.abstractmethod
|
|
def public_bytes(
|
|
self,
|
|
encoding: _serialization.Encoding,
|
|
format: _serialization.PublicFormat,
|
|
) -> bytes:
|
|
"""
|
|
Returns the key serialized as bytes.
|
|
"""
|
|
|
|
@abc.abstractmethod
|
|
def verify(
|
|
self,
|
|
signature: bytes,
|
|
data: bytes,
|
|
signature_algorithm: EllipticCurveSignatureAlgorithm,
|
|
) -> None:
|
|
"""
|
|
Verifies the signature of the data.
|
|
"""
|
|
|
|
@classmethod
|
|
def from_encoded_point(
|
|
cls, curve: EllipticCurve, data: bytes
|
|
) -> EllipticCurvePublicKey:
|
|
utils._check_bytes("data", data)
|
|
|
|
if len(data) == 0:
|
|
raise ValueError("data must not be an empty byte string")
|
|
|
|
if data[0] not in [0x02, 0x03, 0x04]:
|
|
raise ValueError("Unsupported elliptic curve point type")
|
|
|
|
return rust_openssl.ec.from_public_bytes(curve, data)
|
|
|
|
@abc.abstractmethod
|
|
def __eq__(self, other: object) -> bool:
|
|
"""
|
|
Checks equality.
|
|
"""
|
|
|
|
|
|
EllipticCurvePublicKeyWithSerialization = EllipticCurvePublicKey
|
|
EllipticCurvePublicKey.register(rust_openssl.ec.ECPublicKey)
|
|
|
|
EllipticCurvePrivateNumbers = rust_openssl.ec.EllipticCurvePrivateNumbers
|
|
EllipticCurvePublicNumbers = rust_openssl.ec.EllipticCurvePublicNumbers
|
|
|
|
|
|
class SECT571R1(EllipticCurve):
|
|
name = "sect571r1"
|
|
key_size = 570
|
|
|
|
|
|
class SECT409R1(EllipticCurve):
|
|
name = "sect409r1"
|
|
key_size = 409
|
|
|
|
|
|
class SECT283R1(EllipticCurve):
|
|
name = "sect283r1"
|
|
key_size = 283
|
|
|
|
|
|
class SECT233R1(EllipticCurve):
|
|
name = "sect233r1"
|
|
key_size = 233
|
|
|
|
|
|
class SECT163R2(EllipticCurve):
|
|
name = "sect163r2"
|
|
key_size = 163
|
|
|
|
|
|
class SECT571K1(EllipticCurve):
|
|
name = "sect571k1"
|
|
key_size = 571
|
|
|
|
|
|
class SECT409K1(EllipticCurve):
|
|
name = "sect409k1"
|
|
key_size = 409
|
|
|
|
|
|
class SECT283K1(EllipticCurve):
|
|
name = "sect283k1"
|
|
key_size = 283
|
|
|
|
|
|
class SECT233K1(EllipticCurve):
|
|
name = "sect233k1"
|
|
key_size = 233
|
|
|
|
|
|
class SECT163K1(EllipticCurve):
|
|
name = "sect163k1"
|
|
key_size = 163
|
|
|
|
|
|
class SECP521R1(EllipticCurve):
|
|
name = "secp521r1"
|
|
key_size = 521
|
|
|
|
|
|
class SECP384R1(EllipticCurve):
|
|
name = "secp384r1"
|
|
key_size = 384
|
|
|
|
|
|
class SECP256R1(EllipticCurve):
|
|
name = "secp256r1"
|
|
key_size = 256
|
|
|
|
|
|
class SECP256K1(EllipticCurve):
|
|
name = "secp256k1"
|
|
key_size = 256
|
|
|
|
|
|
class SECP224R1(EllipticCurve):
|
|
name = "secp224r1"
|
|
key_size = 224
|
|
|
|
|
|
class SECP192R1(EllipticCurve):
|
|
name = "secp192r1"
|
|
key_size = 192
|
|
|
|
|
|
class BrainpoolP256R1(EllipticCurve):
|
|
name = "brainpoolP256r1"
|
|
key_size = 256
|
|
|
|
|
|
class BrainpoolP384R1(EllipticCurve):
|
|
name = "brainpoolP384r1"
|
|
key_size = 384
|
|
|
|
|
|
class BrainpoolP512R1(EllipticCurve):
|
|
name = "brainpoolP512r1"
|
|
key_size = 512
|
|
|
|
|
|
_CURVE_TYPES: dict[str, EllipticCurve] = {
|
|
"prime192v1": SECP192R1(),
|
|
"prime256v1": SECP256R1(),
|
|
"secp192r1": SECP192R1(),
|
|
"secp224r1": SECP224R1(),
|
|
"secp256r1": SECP256R1(),
|
|
"secp384r1": SECP384R1(),
|
|
"secp521r1": SECP521R1(),
|
|
"secp256k1": SECP256K1(),
|
|
"sect163k1": SECT163K1(),
|
|
"sect233k1": SECT233K1(),
|
|
"sect283k1": SECT283K1(),
|
|
"sect409k1": SECT409K1(),
|
|
"sect571k1": SECT571K1(),
|
|
"sect163r2": SECT163R2(),
|
|
"sect233r1": SECT233R1(),
|
|
"sect283r1": SECT283R1(),
|
|
"sect409r1": SECT409R1(),
|
|
"sect571r1": SECT571R1(),
|
|
"brainpoolP256r1": BrainpoolP256R1(),
|
|
"brainpoolP384r1": BrainpoolP384R1(),
|
|
"brainpoolP512r1": BrainpoolP512R1(),
|
|
}
|
|
|
|
|
|
class ECDSA(EllipticCurveSignatureAlgorithm):
|
|
def __init__(
|
|
self,
|
|
algorithm: asym_utils.Prehashed | hashes.HashAlgorithm,
|
|
deterministic_signing: bool = False,
|
|
):
|
|
from cryptography.hazmat.backends.openssl.backend import backend
|
|
|
|
if (
|
|
deterministic_signing
|
|
and not backend.ecdsa_deterministic_supported()
|
|
):
|
|
raise UnsupportedAlgorithm(
|
|
"ECDSA with deterministic signature (RFC 6979) is not "
|
|
"supported by this version of OpenSSL.",
|
|
_Reasons.UNSUPPORTED_PUBLIC_KEY_ALGORITHM,
|
|
)
|
|
self._algorithm = algorithm
|
|
self._deterministic_signing = deterministic_signing
|
|
|
|
@property
|
|
def algorithm(
|
|
self,
|
|
) -> asym_utils.Prehashed | hashes.HashAlgorithm:
|
|
return self._algorithm
|
|
|
|
@property
|
|
def deterministic_signing(
|
|
self,
|
|
) -> bool:
|
|
return self._deterministic_signing
|
|
|
|
|
|
generate_private_key = rust_openssl.ec.generate_private_key
|
|
|
|
|
|
def derive_private_key(
|
|
private_value: int,
|
|
curve: EllipticCurve,
|
|
backend: typing.Any = None,
|
|
) -> EllipticCurvePrivateKey:
|
|
if not isinstance(private_value, int):
|
|
raise TypeError("private_value must be an integer type.")
|
|
|
|
if private_value <= 0:
|
|
raise ValueError("private_value must be a positive integer.")
|
|
|
|
return rust_openssl.ec.derive_private_key(private_value, curve)
|
|
|
|
|
|
class ECDH:
|
|
pass
|
|
|
|
|
|
_OID_TO_CURVE = {
|
|
EllipticCurveOID.SECP192R1: SECP192R1,
|
|
EllipticCurveOID.SECP224R1: SECP224R1,
|
|
EllipticCurveOID.SECP256K1: SECP256K1,
|
|
EllipticCurveOID.SECP256R1: SECP256R1,
|
|
EllipticCurveOID.SECP384R1: SECP384R1,
|
|
EllipticCurveOID.SECP521R1: SECP521R1,
|
|
EllipticCurveOID.BRAINPOOLP256R1: BrainpoolP256R1,
|
|
EllipticCurveOID.BRAINPOOLP384R1: BrainpoolP384R1,
|
|
EllipticCurveOID.BRAINPOOLP512R1: BrainpoolP512R1,
|
|
EllipticCurveOID.SECT163K1: SECT163K1,
|
|
EllipticCurveOID.SECT163R2: SECT163R2,
|
|
EllipticCurveOID.SECT233K1: SECT233K1,
|
|
EllipticCurveOID.SECT233R1: SECT233R1,
|
|
EllipticCurveOID.SECT283K1: SECT283K1,
|
|
EllipticCurveOID.SECT283R1: SECT283R1,
|
|
EllipticCurveOID.SECT409K1: SECT409K1,
|
|
EllipticCurveOID.SECT409R1: SECT409R1,
|
|
EllipticCurveOID.SECT571K1: SECT571K1,
|
|
EllipticCurveOID.SECT571R1: SECT571R1,
|
|
}
|
|
|
|
|
|
def get_curve_for_oid(oid: ObjectIdentifier) -> type[EllipticCurve]:
|
|
try:
|
|
return _OID_TO_CURVE[oid]
|
|
except KeyError:
|
|
raise LookupError(
|
|
"The provided object identifier has no matching elliptic "
|
|
"curve class"
|
|
)
|