use std::sync::Arc;
use der::{asn1::OctetStringRef, Decode, Encode, Sequence};
use x509_parser::prelude::*;
use crate::key::{PublicKey, SecretKey, Signature};
const P2P_EXT_OID: [u64; 9] = [1, 3, 6, 1, 4, 1, 53594, 1, 1];
const P2P_SIGNING_PREFIX: [u8; 21] = *b"libp2p-tls-handshake:";
static P2P_SIGNATURE_ALGORITHM: &rcgen::SignatureAlgorithm = &rcgen::PKCS_ECDSA_P256_SHA256;
#[derive(Debug)]
pub(crate) struct AlwaysResolvesCert(Arc<rustls::sign::CertifiedKey>);
impl AlwaysResolvesCert {
pub(crate) fn new(
cert: rustls::pki_types::CertificateDer<'static>,
key: &rustls::pki_types::PrivateKeyDer<'_>,
) -> Result<Self, rustls::Error> {
let certified_key = rustls::sign::CertifiedKey::new(
vec![cert],
rustls::crypto::ring::sign::any_ecdsa_type(key)?,
);
Ok(Self(Arc::new(certified_key)))
}
}
impl rustls::client::ResolvesClientCert for AlwaysResolvesCert {
fn resolve(
&self,
_root_hint_subjects: &[&[u8]],
_sigschemes: &[rustls::SignatureScheme],
) -> Option<Arc<rustls::sign::CertifiedKey>> {
Some(Arc::clone(&self.0))
}
fn has_certs(&self) -> bool {
true
}
}
impl rustls::server::ResolvesServerCert for AlwaysResolvesCert {
fn resolve(
&self,
_client_hello: rustls::server::ClientHello<'_>,
) -> Option<Arc<rustls::sign::CertifiedKey>> {
Some(Arc::clone(&self.0))
}
}
#[derive(Clone, Debug, Eq, PartialEq, Sequence)]
struct SignedKey<'a> {
public_key: OctetStringRef<'a>,
signature: OctetStringRef<'a>,
}
pub fn generate(
identity_secret_key: &SecretKey,
) -> Result<
(
rustls::pki_types::CertificateDer<'static>,
rustls::pki_types::PrivateKeyDer<'static>,
),
GenError,
> {
let certificate_keypair = rcgen::KeyPair::generate(P2P_SIGNATURE_ALGORITHM)?;
let rustls_key =
rustls::pki_types::PrivateKeyDer::try_from(certificate_keypair.serialize_der()).unwrap();
let certificate = {
let mut params = rcgen::CertificateParams::new(vec![]);
params.distinguished_name = rcgen::DistinguishedName::new();
params.custom_extensions.push(make_libp2p_extension(
identity_secret_key,
&certificate_keypair,
)?);
params.alg = P2P_SIGNATURE_ALGORITHM;
params.key_pair = Some(certificate_keypair);
rcgen::Certificate::from_params(params)?
};
let rustls_certificate = rustls::pki_types::CertificateDer::from(certificate.serialize_der()?);
Ok((rustls_certificate, rustls_key))
}
pub fn parse<'a>(
certificate: &'a rustls::pki_types::CertificateDer<'_>,
) -> Result<P2pCertificate<'a>, ParseError> {
let certificate = parse_unverified(certificate.as_ref())?;
certificate.verify()?;
Ok(certificate)
}
#[derive(Debug)]
pub struct P2pCertificate<'a> {
certificate: X509Certificate<'a>,
extension: P2pExtension,
}
#[derive(Debug)]
pub struct P2pExtension {
public_key: crate::key::PublicKey,
signature: crate::key::Signature,
}
#[derive(Debug, thiserror::Error)]
#[error(transparent)]
pub struct GenError(#[from] rcgen::Error);
#[derive(Debug, thiserror::Error)]
#[error(transparent)]
pub struct ParseError(#[from] pub(crate) webpki::Error);
#[derive(Debug, thiserror::Error)]
#[error(transparent)]
pub struct VerificationError(#[from] pub(crate) webpki::Error);
fn parse_unverified(der_input: &[u8]) -> Result<P2pCertificate, webpki::Error> {
let x509 = X509Certificate::from_der(der_input)
.map(|(_rest_input, x509)| x509)
.map_err(|_| webpki::Error::BadDer)?;
let p2p_ext_oid = der_parser::oid::Oid::from(&P2P_EXT_OID)
.expect("This is a valid OID of p2p extension; qed");
let mut libp2p_extension = None;
for ext in x509.extensions() {
let oid = &ext.oid;
if oid == &p2p_ext_oid && libp2p_extension.is_some() {
return Err(webpki::Error::BadDer);
}
if oid == &p2p_ext_oid {
let signed_key =
SignedKey::from_der(ext.value).map_err(|_| webpki::Error::ExtensionValueInvalid)?;
let public_key_raw = signed_key.public_key.as_bytes();
let public_key =
PublicKey::try_from(public_key_raw).map_err(|_| webpki::Error::UnknownIssuer)?;
let signature = Signature::from_slice(signed_key.signature.as_bytes())
.map_err(|_| webpki::Error::UnknownIssuer)?;
let ext = P2pExtension {
public_key,
signature,
};
libp2p_extension = Some(ext);
continue;
}
if ext.critical {
return Err(webpki::Error::UnsupportedCriticalExtension);
}
}
let extension = libp2p_extension.ok_or(webpki::Error::BadDer)?;
let certificate = P2pCertificate {
certificate: x509,
extension,
};
Ok(certificate)
}
fn make_libp2p_extension(
identity_secret_key: &SecretKey,
certificate_keypair: &rcgen::KeyPair,
) -> Result<rcgen::CustomExtension, rcgen::Error> {
let signature = {
let mut msg = vec![];
msg.extend(P2P_SIGNING_PREFIX);
msg.extend(certificate_keypair.public_key_der());
identity_secret_key.sign(&msg)
};
let public_key = identity_secret_key.public();
let public_key_ref = OctetStringRef::new(&public_key.as_bytes()[..])
.map_err(|_| rcgen::Error::CouldNotParseKeyPair)?;
let signature = signature.to_bytes();
let signature_ref =
OctetStringRef::new(&signature).map_err(|_| rcgen::Error::CouldNotParseCertificate)?;
let key = SignedKey {
public_key: public_key_ref,
signature: signature_ref,
};
let mut extension_content = Vec::new();
key.encode_to_vec(&mut extension_content).expect("vec");
let mut ext = rcgen::CustomExtension::from_oid_content(&P2P_EXT_OID, extension_content);
ext.set_criticality(true);
Ok(ext)
}
impl P2pCertificate<'_> {
pub fn peer_id(&self) -> PublicKey {
self.extension.public_key
}
pub fn verify_signature(
&self,
signature_scheme: rustls::SignatureScheme,
message: &[u8],
signature: &[u8],
) -> Result<(), VerificationError> {
let pk = self.public_key(signature_scheme)?;
pk.verify(message, signature)
.map_err(|_| webpki::Error::InvalidSignatureForPublicKey)?;
Ok(())
}
fn public_key(
&self,
signature_scheme: rustls::SignatureScheme,
) -> Result<ring::signature::UnparsedPublicKey<&[u8]>, webpki::Error> {
use ring::signature;
use rustls::SignatureScheme::*;
let current_signature_scheme = self.signature_scheme()?;
if signature_scheme != current_signature_scheme {
return Err(webpki::Error::UnsupportedSignatureAlgorithmForPublicKey);
}
let verification_algorithm: &dyn signature::VerificationAlgorithm = match signature_scheme {
ECDSA_NISTP256_SHA256 => &signature::ECDSA_P256_SHA256_ASN1,
ECDSA_NISTP384_SHA384 => &signature::ECDSA_P384_SHA384_ASN1,
ECDSA_NISTP521_SHA512 => {
return Err(webpki::Error::UnsupportedSignatureAlgorithm);
}
ED25519 => &signature::ED25519,
ED448 => {
return Err(webpki::Error::UnsupportedSignatureAlgorithm);
}
RSA_PKCS1_SHA256 | RSA_PKCS1_SHA384 | RSA_PKCS1_SHA512 | RSA_PSS_SHA256
| RSA_PSS_SHA384 | RSA_PSS_SHA512 => {
return Err(webpki::Error::UnsupportedSignatureAlgorithm)
}
RSA_PKCS1_SHA1 => return Err(webpki::Error::UnsupportedSignatureAlgorithm),
ECDSA_SHA1_Legacy => return Err(webpki::Error::UnsupportedSignatureAlgorithm),
Unknown(_) => return Err(webpki::Error::UnsupportedSignatureAlgorithm),
_ => return Err(webpki::Error::UnsupportedSignatureAlgorithm),
};
let spki = &self.certificate.tbs_certificate.subject_pki;
let key = signature::UnparsedPublicKey::new(
verification_algorithm,
spki.subject_public_key.as_ref(),
);
Ok(key)
}
fn verify(&self) -> Result<(), webpki::Error> {
use webpki::Error;
if !self.certificate.validity().is_valid() {
return Err(Error::InvalidCertValidity);
}
let signature_scheme = self.signature_scheme()?;
let raw_certificate = self.certificate.tbs_certificate.as_ref();
let signature = self.certificate.signature_value.as_ref();
self.verify_signature(signature_scheme, raw_certificate, signature)
.map_err(|_| Error::SignatureAlgorithmMismatch)?;
let subject_pki = self.certificate.public_key().raw;
let mut msg = vec![];
msg.extend(P2P_SIGNING_PREFIX);
msg.extend(subject_pki);
let user_owns_sk = self
.extension
.public_key
.verify(&msg, &self.extension.signature)
.is_ok();
if !user_owns_sk {
return Err(Error::UnknownIssuer);
}
Ok(())
}
fn signature_scheme(&self) -> Result<rustls::SignatureScheme, webpki::Error> {
use oid_registry::*;
use rustls::SignatureScheme::*;
let signature_algorithm = &self.certificate.signature_algorithm;
let pki_algorithm = &self.certificate.tbs_certificate.subject_pki.algorithm;
if pki_algorithm.algorithm == OID_KEY_TYPE_EC_PUBLIC_KEY {
let signature_param = pki_algorithm
.parameters
.as_ref()
.ok_or(webpki::Error::BadDer)?
.as_oid()
.map_err(|_| webpki::Error::BadDer)?;
if signature_param == OID_EC_P256
&& signature_algorithm.algorithm == OID_SIG_ECDSA_WITH_SHA256
{
return Ok(ECDSA_NISTP256_SHA256);
}
if signature_param == OID_NIST_EC_P384
&& signature_algorithm.algorithm == OID_SIG_ECDSA_WITH_SHA384
{
return Ok(ECDSA_NISTP384_SHA384);
}
if signature_param == OID_NIST_EC_P521
&& signature_algorithm.algorithm == OID_SIG_ECDSA_WITH_SHA512
{
return Ok(ECDSA_NISTP521_SHA512);
}
return Err(webpki::Error::UnsupportedSignatureAlgorithm);
}
if signature_algorithm.algorithm == OID_SIG_ED25519 {
return Ok(ED25519);
}
if signature_algorithm.algorithm == OID_SIG_ED448 {
return Ok(ED448);
}
Err(webpki::Error::UnsupportedSignatureAlgorithm)
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn sanity_check() {
let secret_key = SecretKey::generate();
let (cert, _) = generate(&secret_key).unwrap();
let parsed_cert = parse(&cert).unwrap();
assert!(parsed_cert.verify().is_ok());
assert_eq!(secret_key.public(), parsed_cert.extension.public_key);
}
}