use super::*;
use crate::types;
use authcert::DirAuthKeyCert;
mod ns_per_flavour_macros;
pub use ns_per_flavour_macros::*;
ns_per_flavour_macros::ns_export_flavoured_types! {
NetworkStatus, NetworkStatusUnverified, Router,
}
#[derive(Debug, Clone, Copy, Eq, PartialEq, strum::EnumString, strum::Display)]
#[non_exhaustive]
pub enum NdaNetworkStatusVersion {
#[strum(serialize = "3")]
V3,
}
impl NormalItemArgument for NdaNetworkStatusVersion {}
#[derive(Clone, Debug, Default, Deftly)]
#[derive_deftly(ItemValueParseable)]
#[non_exhaustive]
pub struct NdiParams {
}
#[derive(Deftly, Clone, Debug)]
#[derive_deftly(ItemValueParseable)]
#[non_exhaustive]
pub struct NdiR {
pub nickname: types::Nickname,
pub identity: String, }
#[derive(Debug, Clone)]
#[non_exhaustive]
pub enum NdiDirectorySignature {
Known {
hash_algo: DirectorySignatureHashAlgo,
h_kp_auth_id_rsa: pk::rsa::RsaIdentity,
h_kp_auth_sign_rsa: pk::rsa::RsaIdentity,
rsa_signature: Vec<u8>,
},
Unknown {},
}
define_derive_deftly! {
DirectorySignatureHashesAccu expect items, beta_deftly:
${define FNAME ${paste ${snake_case $vname}} }
#[derive(Clone, Copy, Default, Debug, Eq, PartialEq, Deftly)]
#[derive_deftly(AsMutSelf)]
#[non_exhaustive]
pub struct DirectorySignaturesHashesAccu {
$(
${vattrs doc}
$FNAME: Option<[u8; ${vmeta(hash_len) as expr}]>,
)
}
impl DirectorySignaturesHashesAccu {
fn parse_keyword_and_hash(
&mut self,
algorithm: &str,
body: &SignatureHashInputs,
) -> Option<$ttype> {
Some(match algorithm {
$(
${concat $FNAME} => {
let mut h = tor_llcrypto::d::$vname::new();
h.update(body.body().body());
h.update(body.signature_item_kw_spc);
self.$FNAME = Some(h.finalize().into());
$vtype
}
)
_ => return None,
})
}
fn hash_slice_for_verification(&self, algo: $ttype) -> Option<&[u8]> {
match algo { $(
$vtype => Some(self.$FNAME.as_ref()?),
) }
}
}
}
#[derive(Clone, Copy, Debug, Eq, PartialEq, strum::EnumString, Deftly)]
#[derive_deftly(DirectorySignatureHashesAccu)]
#[non_exhaustive]
pub enum DirectorySignatureHashAlgo {
#[deftly(hash_len = "20")]
Sha1,
#[deftly(hash_len = "32")]
Sha256,
}
#[derive(Clone, Debug, Error)]
#[non_exhaustive]
#[error("invalid value for vote-status in network status document")]
pub struct InvalidNetworkStatusVoteStatus {}
impl SignatureItemParseable for NdiDirectorySignature {
type HashAccu = DirectorySignaturesHashesAccu;
fn from_unparsed_and_body<'s>(
mut input: UnparsedItem<'s>,
document_body: &SignatureHashInputs<'_>,
hashes: &mut DirectorySignaturesHashesAccu,
) -> Result<Self, EP> {
let object = input.object();
let args = input.args_mut();
let maybe_algorithm = args.clone().next().ok_or(EP::MissingArgument {
field: "algorithm/h_kp_auth_id_rsa",
})?;
let hash_algo =
if let Some(algo) = hashes.parse_keyword_and_hash(maybe_algorithm, document_body) {
let _: &str = args.next().expect("we just peeked");
algo
} else if maybe_algorithm
.find(|c: char| !c.is_ascii_hexdigit())
.is_some()
{
return Ok(NdiDirectorySignature::Unknown {});
} else {
hashes
.parse_keyword_and_hash("sha1", document_body)
.expect("sha1 is not valid?")
};
let rsa_signature = object.ok_or(EP::MissingObject)?.decode_data()?;
let mut fingerprint_arg = |field: &'static str| {
(|| {
args.next()
.ok_or(AE::Missing)?
.parse::<types::Fingerprint>()
.map_err(|_e| AE::Invalid)
.map(pk::rsa::RsaIdentity::from)
})()
.map_err(args.error_handler(field))
};
Ok(NdiDirectorySignature::Known {
hash_algo,
rsa_signature,
h_kp_auth_id_rsa: fingerprint_arg("h_kp_auth_id_rsa")?,
h_kp_auth_sign_rsa: fingerprint_arg("h_kp_auth_sign_rsa")?,
})
}
}
fn verify_general_timeless(
hashes: &DirectorySignaturesHashesAccu,
signatures: &[NdiDirectorySignature],
trusted: &[pk::rsa::RsaIdentity],
certs: &[&DirAuthKeyCert],
threshold: usize,
) -> Result<(), VF> {
let mut ok = HashSet::<pk::rsa::RsaIdentity>::new();
for sig in signatures {
match sig {
NdiDirectorySignature::Known {
hash_algo,
h_kp_auth_id_rsa,
h_kp_auth_sign_rsa,
rsa_signature,
} => {
let Some(authority) = ({
trusted
.iter()
.find(|trusted| **trusted == *h_kp_auth_id_rsa)
}) else {
continue;
};
let Some(cert) = ({
certs
.iter()
.find(|cert| cert.dir_signing_key.to_rsa_identity() == *h_kp_auth_sign_rsa)
}) else {
continue;
};
let h = hashes
.hash_slice_for_verification(*hash_algo)
.ok_or(VF::Bug)?;
let () = cert.dir_signing_key.verify(h, rsa_signature)?;
ok.insert(*authority);
}
NdiDirectorySignature::Unknown { .. } => {}
}
}
if ok.len() < threshold {
return Err(VF::InsufficientTrustedSigners);
}
Ok(())
}