use std::io::Read;
use {
Result,
Error,
PublicKeyAlgorithm,
SymmetricAlgorithm,
HashAlgorithm,
};
use constants::Curve;
use crypto::mpis::{self, MPI};
use parse::{
PacketHeaderParser,
Cookie,
};
impl mpis::PublicKey {
#[cfg(test)]
pub fn parse_naked<T: AsRef<[u8]>>(
algo: PublicKeyAlgorithm, buf: T)
-> Result<Self>
{
use std::io::Cursor;
let cur = Cursor::new(buf);
let bio = buffered_reader::Generic::with_cookie(
cur, None, Cookie::default());
let mut php = PacketHeaderParser::new_naked(Box::new(bio));
Self::parse(algo, &mut php)
}
pub(crate) fn parse<'a>(algo: PublicKeyAlgorithm,
php: &mut PacketHeaderParser<'a>)
-> Result<Self>
{
use PublicKeyAlgorithm::*;
#[allow(deprecated)]
match algo {
RSAEncryptSign | RSAEncrypt | RSASign => {
let n = MPI::parse("rsa_public_n", php)?;
let e = MPI::parse("rsa_public_e", php)?;
Ok(mpis::PublicKey::RSA { e: e, n: n })
}
DSA => {
let p = MPI::parse("dsa_public_p", php)?;
let q = MPI::parse("dsa_public_q", php)?;
let g = MPI::parse("dsa_public_g", php)?;
let y = MPI::parse("dsa_public_y", php)?;
Ok(mpis::PublicKey::DSA {
p: p,
q: q,
g: g,
y: y,
})
}
ElgamalEncrypt | ElgamalEncryptSign => {
let p = MPI::parse("elgamal_public_p", php)?;
let g = MPI::parse("elgamal_public_g", php)?;
let y = MPI::parse("elgamal_public_y", php)?;
Ok(mpis::PublicKey::Elgamal {
p: p,
g: g,
y: y,
})
}
EdDSA => {
let curve_len = php.parse_u8("curve_len")? as usize;
let curve = php.parse_bytes("curve", curve_len)?;
let q = MPI::parse("eddsa_public", php)?;
Ok(mpis::PublicKey::EdDSA {
curve: Curve::from_oid(&curve),
q: q
})
}
ECDSA => {
let curve_len = php.parse_u8("curve_len")? as usize;
let curve = php.parse_bytes("curve", curve_len)?;
let q = MPI::parse("ecdsa_public", php)?;
Ok(mpis::PublicKey::ECDSA {
curve: Curve::from_oid(&curve),
q: q
})
}
ECDH => {
let curve_len = php.parse_u8("curve_len")? as usize;
let curve = php.parse_bytes("curve", curve_len)?;
let q = MPI::parse("ecdh_public", php)?;
let kdf_len = php.parse_u8("kdf_len")?;
if kdf_len != 3 {
return Err(Error::MalformedPacket(
"wrong kdf length".into()).into());
}
let _reserved = php.parse_u8("kdf_reserved")?;
let hash: HashAlgorithm = php.parse_u8("kdf_hash")?.into();
let sym: SymmetricAlgorithm = php.parse_u8("kek_symm")?.into();
Ok(mpis::PublicKey::ECDH {
curve: Curve::from_oid(&curve),
q: q,
hash: hash,
sym: sym
})
}
Unknown(_) | Private(_) => {
let mut mpis = Vec::new();
while let Ok(mpi) = MPI::parse("unknown_parameter", php) {
mpis.push(mpi);
}
let mut rest = php.parse_bytes_eof("rest")?;
Ok(mpis::PublicKey::Unknown {
mpis: mpis.into_boxed_slice(),
rest: rest.into_boxed_slice(),
})
}
}
}
}
impl mpis::SecretKey {
pub fn parse_chksumd<T: Read>(algo: PublicKeyAlgorithm, cur: T)
-> Result<Self> {
use std::io::Cursor;
use serialize::Serialize;
use nettle::Hash;
use nettle::hash::insecure_do_not_use::Sha1;
let bio = buffered_reader::Generic::with_cookie(
cur, None, Cookie::default());
let mut php = PacketHeaderParser::new_naked(Box::new(bio));
let mpis = Self::parse(algo, &mut php)?;
let their_chksum = php.parse_bytes("checksum", 20)?;
let mut cur = Cursor::new(vec![]);
mpis.serialize(&mut cur)?;
let buf = cur.into_inner();
let mut hsh = Sha1::default();
hsh.update(&buf);
let mut our_chksum = [0u8; 20];
hsh.digest(&mut our_chksum);
if our_chksum != their_chksum[..] {
Err(Error::MalformedMPI("checksum wrong".to_string()).into())
} else {
Ok(mpis)
}
}
#[cfg(test)]
pub fn parse_naked<T: AsRef<[u8]>>(algo: PublicKeyAlgorithm, buf: T)
-> Result<Self>
{
use std::io::Cursor;
let cur = Cursor::new(buf);
let bio = buffered_reader::Generic::with_cookie(
cur, None, Cookie::default());
let mut php = PacketHeaderParser::new_naked(Box::new(bio));
Self::parse(algo, &mut php)
}
pub(crate) fn parse<'a>(algo: PublicKeyAlgorithm,
php: &mut PacketHeaderParser<'a>)
-> Result<Self>
{
use PublicKeyAlgorithm::*;
#[allow(deprecated)]
match algo {
RSAEncryptSign | RSAEncrypt | RSASign => {
let d = MPI::parse("rsa_secret_d", php)?;
let p = MPI::parse("rsa_secret_p", php)?;
let q = MPI::parse("rsa_secret_q", php)?;
let u = MPI::parse("rsa_secret_u", php)?;
Ok(mpis::SecretKey::RSA {
d: d,
p: p,
q: q,
u: u,
})
}
DSA => {
let x = MPI::parse("dsa_secret", php)?;
Ok(mpis::SecretKey::DSA {
x: x,
})
}
ElgamalEncrypt | ElgamalEncryptSign => {
let x = MPI::parse("elgamal_secret", php)?;
Ok(mpis::SecretKey::Elgamal {
x: x,
})
}
EdDSA => {
Ok(mpis::SecretKey::EdDSA {
scalar: MPI::parse("eddsa_secret", php)?
})
}
ECDSA => {
Ok(mpis::SecretKey::ECDSA {
scalar: MPI::parse("ecdsa_secret", php)?
})
}
ECDH => {
Ok(mpis::SecretKey::ECDH {
scalar: MPI::parse("ecdh_secret", php)?
})
}
Unknown(_) | Private(_) => {
let mut mpis = Vec::new();
while let Ok(mpi) = MPI::parse("unknown_parameter", php) {
mpis.push(mpi);
}
let mut rest = php.parse_bytes_eof("rest")?;
Ok(mpis::SecretKey::Unknown {
mpis: mpis.into_boxed_slice(),
rest: rest.into_boxed_slice(),
})
}
}
}
}
impl mpis::Ciphertext {
#[cfg(test)]
pub fn parse_naked<T: AsRef<[u8]>>(algo: PublicKeyAlgorithm, buf: T)
-> Result<Self> {
use std::io::Cursor;
let cur = Cursor::new(buf);
let bio = buffered_reader::Generic::with_cookie(
cur, None, Cookie::default());
let mut php = PacketHeaderParser::new_naked(Box::new(bio));
Self::parse(algo, &mut php)
}
pub(crate) fn parse<'a>(algo: PublicKeyAlgorithm,
php: &mut PacketHeaderParser<'a>)
-> Result<Self> {
use PublicKeyAlgorithm::*;
#[allow(deprecated)]
match algo {
RSAEncryptSign | RSAEncrypt => {
let c = MPI::parse("rsa_ciphertext", php)?;
Ok(mpis::Ciphertext::RSA {
c: c,
})
}
ElgamalEncrypt | ElgamalEncryptSign => {
let e = MPI::parse("elgamal_e", php)?;
let c = MPI::parse("elgamal_c", php)?;
Ok(mpis::Ciphertext::Elgamal {
e: e,
c: c,
})
}
ECDH => {
let e = MPI::parse("ecdh_e", php)?;
let key_len = php.parse_u8("ecdh_esk_len")? as usize;
let key = Vec::from(&php.parse_bytes("ecdh_esk", key_len)?
[..key_len]);
Ok(mpis::Ciphertext::ECDH {
e: e, key: key.into_boxed_slice()
})
}
Unknown(_) | Private(_) => {
let mut mpis = Vec::new();
while let Ok(mpi) = MPI::parse("unknown_parameter", php) {
mpis.push(mpi);
}
let mut rest = php.parse_bytes_eof("rest")?;
Ok(mpis::Ciphertext::Unknown {
mpis: mpis.into_boxed_slice(),
rest: rest.into_boxed_slice(),
})
}
RSASign | DSA | EdDSA | ECDSA => Err(Error::InvalidArgument(
format!("not an encryption algorithm: {:?}", algo)).into()),
}
}
}
impl mpis::Signature {
#[cfg(test)]
pub fn parse_naked<T: AsRef<[u8]>>(algo: PublicKeyAlgorithm, buf: T)
-> Result<Self> {
use std::io::Cursor;
let cur = Cursor::new(buf);
let bio = buffered_reader::Generic::with_cookie(
cur, None, Cookie::default());
let mut php = PacketHeaderParser::new_naked(Box::new(bio));
Self::parse(algo, &mut php)
}
pub(crate) fn parse<'a>(algo: PublicKeyAlgorithm,
php: &mut PacketHeaderParser<'a>)
-> Result<Self> {
use PublicKeyAlgorithm::*;
#[allow(deprecated)]
match algo {
RSAEncryptSign | RSASign => {
let s = MPI::parse("rsa_signature", php)?;
Ok(mpis::Signature::RSA {
s: s,
})
}
DSA => {
let r = MPI::parse("dsa_signature_r", php)?;
let s = MPI::parse("dsa_signature_s", php)?;
Ok(mpis::Signature::DSA {
r: r,
s: s,
})
}
ElgamalEncryptSign => {
let r = MPI::parse("elgamal_signature_r", php)?;
let s = MPI::parse("elgamal_signature_s", php)?;
Ok(mpis::Signature::Elgamal {
r: r,
s: s,
})
}
EdDSA => {
let r = MPI::parse("eddsa_signature_r", php)?;
let s = MPI::parse("eddsa_signature_s", php)?;
Ok(mpis::Signature::EdDSA {
r: r,
s: s,
})
}
ECDSA => {
let r = MPI::parse("ecdsa_signature_r", php)?;
let s = MPI::parse("ecdsa_signature_s", php)?;
Ok(mpis::Signature::ECDSA {
r: r,
s: s,
})
}
Unknown(_) | Private(_) => {
let mut mpis = Vec::new();
while let Ok(mpi) = MPI::parse("unknown_parameter", php) {
mpis.push(mpi);
}
let mut rest = php.parse_bytes_eof("rest")?;
Ok(mpis::Signature::Unknown {
mpis: mpis.into_boxed_slice(),
rest: rest.into_boxed_slice(),
})
}
RSAEncrypt | ElgamalEncrypt | ECDH => Err(Error::InvalidArgument(
format!("not a signature algorithm: {:?}", algo)).into()),
}
}
}
#[test]
fn mpis_parse_test() {
use super::Parse;
use std::io::Cursor;
use PublicKeyAlgorithm::*;
{
let buf = b"\x00\x01\x01\x00\x02\x02".to_vec();
let cur = Cursor::new(buf);
let bio = buffered_reader::Generic::with_cookie(
cur, None, Cookie::default());
let mut parser = PacketHeaderParser::new_naked(Box::new(bio));
let mpis = mpis::PublicKey::parse(RSAEncryptSign, &mut parser).unwrap();
match &mpis {
&mpis::PublicKey::RSA{ ref n, ref e } => {
assert_eq!(n.bits, 1);
assert_eq!(n.value[0], 1);
assert_eq!(n.value.len(), 1);
assert_eq!(e.bits, 2);
assert_eq!(e.value[0], 2);
assert_eq!(e.value.len(), 1);
}
_ => assert!(false),
}
}
{
let buf = b"\x00\x02\x02".to_vec();
let cur = Cursor::new(buf);
let bio = buffered_reader::Generic::with_cookie(
cur, None, Cookie::default());
let mut parser = PacketHeaderParser::new_naked(Box::new(bio));
let mpis = mpis::Ciphertext::parse(RSAEncryptSign, &mut parser)
.unwrap();
assert_eq!(mpis.serialized_len(), 3);
}
let mpi = MPI::from_bytes(b"\x00\x09\x01\xff").unwrap();
assert_eq!(mpi.value.len(), 2);
assert_eq!(mpi.bits, 9);
assert_eq!(mpi.value[0], 1);
assert_eq!(mpi.value[1], 0xff);
assert!(MPI::from_bytes(b"\x00\x02\x01").is_err());
}