ic_agent/identity/
basic.rsuse crate::{agent::EnvelopeContent, export::Principal, Identity, Signature};
#[cfg(feature = "pem")]
use crate::identity::error::PemError;
use ed25519_consensus::SigningKey;
use simple_asn1::{
oid, to_der,
ASN1Block::{BitString, ObjectIdentifier, Sequence},
};
use std::fmt;
use super::Delegation;
pub struct BasicIdentity {
private_key: KeyCompat,
der_encoded_public_key: Vec<u8>,
}
impl fmt::Debug for BasicIdentity {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
f.debug_struct("BasicIdentity")
.field("der_encoded_public_key", &self.der_encoded_public_key)
.finish_non_exhaustive()
}
}
impl BasicIdentity {
#[cfg(feature = "pem")]
pub fn from_pem_file<P: AsRef<std::path::Path>>(file_path: P) -> Result<Self, PemError> {
Self::from_pem(std::fs::File::open(file_path)?)
}
#[cfg(feature = "pem")]
pub fn from_pem<R: std::io::Read>(pem_reader: R) -> Result<Self, PemError> {
use der::{asn1::OctetString, Decode, ErrorKind, SliceReader, Tag, TagNumber};
use pkcs8::PrivateKeyInfo;
let bytes: Vec<u8> = pem_reader.bytes().collect::<Result<_, _>>()?;
let pem = pem::parse(bytes)?;
let pki_res = PrivateKeyInfo::decode(&mut SliceReader::new(pem.contents())?);
let mut truncated;
let pki = match pki_res {
Ok(pki) => pki,
Err(e) => {
if e.kind()
== (ErrorKind::Noncanonical {
tag: Tag::ContextSpecific {
constructed: true,
number: TagNumber::new(1),
},
})
{
truncated = pem.into_contents();
if truncated[48..52] != *b"\xA1\x23\x03\x21" {
return Err(e.into());
}
truncated.truncate(48);
truncated[1] = 46;
truncated[4] = 0;
PrivateKeyInfo::decode(&mut SliceReader::new(&truncated)?).map_err(|_| e)?
} else {
return Err(e.into());
}
}
};
let decoded_key = OctetString::from_der(pki.private_key)?; let private_key = SigningKey::try_from(decoded_key.as_bytes())?;
Ok(BasicIdentity::from_signing_key(private_key))
}
pub fn from_signing_key(key: SigningKey) -> Self {
let public_key = key.verification_key();
let der_encoded_public_key = der_encode_public_key(public_key.as_bytes().to_vec());
Self {
private_key: KeyCompat::Standard(key),
der_encoded_public_key,
}
}
#[cfg(feature = "ring")]
pub fn from_key_pair(key_pair: ring::signature::Ed25519KeyPair) -> Self {
use ring::signature::KeyPair;
let der_encoded_public_key = der_encode_public_key(key_pair.public_key().as_ref().to_vec());
Self {
private_key: KeyCompat::Ring(key_pair),
der_encoded_public_key,
}
}
}
enum KeyCompat {
Standard(SigningKey),
#[cfg(feature = "ring")]
Ring(ring::signature::Ed25519KeyPair),
}
impl KeyCompat {
fn sign(&self, payload: &[u8]) -> Vec<u8> {
match self {
Self::Standard(k) => k.sign(payload).to_bytes().to_vec(),
#[cfg(feature = "ring")]
Self::Ring(k) => k.sign(payload).as_ref().to_vec(),
}
}
}
impl Identity for BasicIdentity {
fn sender(&self) -> Result<Principal, String> {
Ok(Principal::self_authenticating(&self.der_encoded_public_key))
}
fn public_key(&self) -> Option<Vec<u8>> {
Some(self.der_encoded_public_key.clone())
}
fn sign(&self, content: &EnvelopeContent) -> Result<Signature, String> {
self.sign_arbitrary(&content.to_request_id().signable())
}
fn sign_delegation(&self, content: &Delegation) -> Result<Signature, String> {
self.sign_arbitrary(&content.signable())
}
fn sign_arbitrary(&self, content: &[u8]) -> Result<Signature, String> {
let signature = self.private_key.sign(content);
Ok(Signature {
signature: Some(signature),
public_key: self.public_key(),
delegations: None,
})
}
}
fn der_encode_public_key(public_key: Vec<u8>) -> Vec<u8> {
let id_ed25519 = oid!(1, 3, 101, 112);
let algorithm = Sequence(0, vec![ObjectIdentifier(0, id_ed25519)]);
let subject_public_key = BitString(0, public_key.len() * 8, public_key);
let subject_public_key_info = Sequence(0, vec![algorithm, subject_public_key]);
to_der(&subject_public_key_info).unwrap()
}