3 * Public-key cryptography
5 * (c) 2004 Straylight/Edgeware
8 /*----- Licensing notice --------------------------------------------------*
10 * This file is part of the Python interface to Catacomb.
12 * Catacomb/Python is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
17 * Catacomb/Python is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with Catacomb/Python; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
27 /*----- Header files ------------------------------------------------------*/
29 #include "catacomb-python.h"
31 /*----- DSA and similar ---------------------------------------------------*/
33 typedef struct dsa_pyobj
{
35 PyObject
*G
, *u
, *p
, *rng
, *hash
;
39 static PyTypeObject
*dsapub_pytype
, *dsapriv_pytype
;
40 static PyTypeObject
*kcdsapub_pytype
, *kcdsapriv_pytype
;
41 #define DSA_D(o) (&((dsa_pyobj *)(o))->d)
42 #define DSA_G(o) (((dsa_pyobj *)(o))->G)
43 #define DSA_U(o) (((dsa_pyobj *)(o))->u)
44 #define DSA_P(o) (((dsa_pyobj *)(o))->p)
45 #define DSA_RNG(o) (((dsa_pyobj *)(o))->rng)
46 #define DSA_HASH(o) (((dsa_pyobj *)(o))->hash)
48 static void dsa_pydealloc(PyObject
*me
)
50 dsa_pyobj
*g
= (dsa_pyobj
*)me
;
51 Py_DECREF(g
->G
); Py_DECREF(g
->u
); Py_DECREF(g
->p
);
52 Py_DECREF(g
->rng
); Py_DECREF(g
->hash
);
56 static PyObject
*dsa_setup(PyTypeObject
*ty
, PyObject
*G
, PyObject
*u
,
57 PyObject
*p
, PyObject
*rng
, PyObject
*hash
,
58 void (*calcpub
)(group
*, ge
*, mp
*))
63 g
= PyObject_New(dsa_pyobj
, ty
);
68 } else if ((g
->d
.u
= getmp(u
)) == 0)
71 assert(g
->d
.u
); assert(calcpub
);
72 pp
= G_CREATE(GROUP_G(G
));
73 calcpub(GROUP_G(G
), pp
, g
->d
.u
);
75 } else if (GROUP_G(G
) != GE_G(p
) && !group_samep(GROUP_G(G
), GE_G(p
)))
76 TYERR("public key not from group");
79 g
->d
.r
= GRAND_R(rng
);
80 g
->d
.h
= GCHASH_CH(hash
);
81 g
->G
= G
; Py_INCREF(G
); g
->u
= u
; Py_INCREF(u
); g
->p
= p
;
82 g
->rng
= rng
; Py_INCREF(rng
); g
->hash
= hash
; Py_INCREF(hash
);
83 return ((PyObject
*)g
);
90 static PyObject
*dsapub_pynew(PyTypeObject
*ty
,
91 PyObject
*arg
, PyObject
*kw
)
93 PyObject
*G
, *p
, *rng
= rand_pyobj
, *hash
= sha_pyobj
;
95 char *kwlist
[] = { "G", "p", "hash", "rng", 0 };
97 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "O!O!|O!O!:new", kwlist
,
100 gchash_pytype
, &hash
,
101 grand_pytype
, &rng
) ||
102 (rc
= dsa_setup(dsapub_pytype
, G
, 0, p
, rng
, hash
, 0)) == 0)
108 static PyObject
*dsameth_beginhash(PyObject
*me
, PyObject
*arg
)
110 if (!PyArg_ParseTuple(arg
, ":beginhash")) return (0);
111 return (ghash_pywrap(DSA_HASH(me
), gdsa_beginhash(DSA_D(me
)), f_freeme
));
114 static PyObject
*dsameth_endhash(PyObject
*me
, PyObject
*arg
)
118 if (!PyArg_ParseTuple(arg
, "O&:endhash", convghash
, &h
)) return (0);
119 gdsa_endhash(DSA_D(me
), h
);
121 rc
= bytestring_pywrap(0, GH_CLASS(h
)->hashsz
);
122 GH_DONE(h
, PyString_AS_STRING(rc
));
127 static PyObject
*dsameth_sign(PyObject
*me
, PyObject
*arg
, PyObject
*kw
)
129 gdsa_sig s
= GDSA_SIG_INIT
;
134 char *kwlist
[] = { "msg", "k", 0 };
136 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "s#|O&:sign", kwlist
,
139 if (n
!= DSA_D(me
)->h
->hashsz
)
140 VALERR("bad message length (doesn't match hash size)");
141 gdsa_sign(DSA_D(me
), &s
, p
, k
);
142 rc
= Py_BuildValue("(NN)", mp_pywrap(s
.r
), mp_pywrap(s
.s
));
148 static PyObject
*dsameth_verify(PyObject
*me
, PyObject
*arg
)
152 gdsa_sig s
= GDSA_SIG_INIT
;
155 if (!PyArg_ParseTuple(arg
, "s#(O&O&):verify",
156 &p
, &n
, convmp
, &s
.r
, convmp
, &s
.s
))
158 if (n
!= DSA_D(me
)->h
->hashsz
)
159 VALERR("bad message length (doesn't match hash size)");
160 rc
= getbool(!gdsa_verify(DSA_D(me
), &s
, p
));
167 static void dsa_calcpub(group
*g
, ge
*p
, mp
*u
) { G_EXP(g
, p
, g
->g
, u
); }
169 static PyObject
*dsapriv_pynew(PyTypeObject
*ty
,
170 PyObject
*arg
, PyObject
*kw
)
172 PyObject
*G
, *p
= 0, *u
, *rng
= rand_pyobj
, *hash
= sha_pyobj
;
174 char *kwlist
[] = { "G", "u", "p", "hash", "rng", 0 };
176 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "O!O|O!O!O!:new", kwlist
,
180 gchash_pytype
, &hash
,
181 grand_pytype
, &rng
) ||
182 (rc
= dsa_setup(dsapriv_pytype
, G
, u
, p
, rng
, hash
, dsa_calcpub
)) == 0)
188 static PyMethodDef dsapub_pymethods
[] = {
189 #define METHNAME(name) dsameth_##name
190 METH (beginhash
, "D.beginhash() -> hash object")
191 METH (endhash
, "D.endhash(H) -> BYTES")
192 METH (verify
, "D.verify(MSG, (R, S)) -> true/false")
197 static PyMethodDef dsapriv_pymethods
[] = {
198 #define METHNAME(name) dsameth_##name
199 KWMETH(sign
, "D.sign(MSG, k = K) -> R, S")
204 static PyMemberDef dsapub_pymembers
[] = {
205 #define MEMBERSTRUCT dsa_pyobj
206 MEMBER(G
, T_OBJECT
, READONLY
, "D.G -> group to work in")
207 MEMBER(p
, T_OBJECT
, READONLY
, "D.p -> public key (group element")
208 MEMBER(rng
, T_OBJECT
, READONLY
, "D.rng -> random number generator")
209 MEMBER(hash
, T_OBJECT
, READONLY
, "D.hash -> hash class")
214 static PyMemberDef dsapriv_pymembers
[] = {
215 #define MEMBERSTRUCT dsa_pyobj
216 MEMBER(u
, T_OBJECT
, READONLY
, "D.u -> private key (exponent)")
221 static PyTypeObject dsapub_pytype_skel
= {
222 PyObject_HEAD_INIT(0) 0, /* Header */
223 "DSAPub", /* @tp_name@ */
224 sizeof(dsa_pyobj
), /* @tp_basicsize@ */
225 0, /* @tp_itemsize@ */
227 dsa_pydealloc
, /* @tp_dealloc@ */
229 0, /* @tp_getattr@ */
230 0, /* @tp_setattr@ */
231 0, /* @tp_compare@ */
233 0, /* @tp_as_number@ */
234 0, /* @tp_as_sequence@ */
235 0, /* @tp_as_mapping@ */
239 0, /* @tp_getattro@ */
240 0, /* @tp_setattro@ */
241 0, /* @tp_as_buffer@ */
242 Py_TPFLAGS_DEFAULT
| /* @tp_flags@ */
246 "DSA public key information.",
248 0, /* @tp_traverse@ */
250 0, /* @tp_richcompare@ */
251 0, /* @tp_weaklistoffset@ */
253 0, /* @tp_iternext@ */
254 dsapub_pymethods
, /* @tp_methods@ */
255 dsapub_pymembers
, /* @tp_members@ */
259 0, /* @tp_descr_get@ */
260 0, /* @tp_descr_set@ */
261 0, /* @tp_dictoffset@ */
263 PyType_GenericAlloc
, /* @tp_alloc@ */
264 dsapub_pynew
, /* @tp_new@ */
269 static PyTypeObject dsapriv_pytype_skel
= {
270 PyObject_HEAD_INIT(0) 0, /* Header */
271 "DSAPriv", /* @tp_name@ */
272 sizeof(dsa_pyobj
), /* @tp_basicsize@ */
273 0, /* @tp_itemsize@ */
275 0, /* @tp_dealloc@ */
277 0, /* @tp_getattr@ */
278 0, /* @tp_setattr@ */
279 0, /* @tp_compare@ */
281 0, /* @tp_as_number@ */
282 0, /* @tp_as_sequence@ */
283 0, /* @tp_as_mapping@ */
287 0, /* @tp_getattro@ */
288 0, /* @tp_setattro@ */
289 0, /* @tp_as_buffer@ */
290 Py_TPFLAGS_DEFAULT
| /* @tp_flags@ */
294 "DSA private key information.",
296 0, /* @tp_traverse@ */
298 0, /* @tp_richcompare@ */
299 0, /* @tp_weaklistoffset@ */
301 0, /* @tp_iternext@ */
302 dsapriv_pymethods
, /* @tp_methods@ */
303 dsapriv_pymembers
, /* @tp_members@ */
307 0, /* @tp_descr_get@ */
308 0, /* @tp_descr_set@ */
309 0, /* @tp_dictoffset@ */
311 PyType_GenericAlloc
, /* @tp_alloc@ */
312 dsapriv_pynew
, /* @tp_new@ */
317 static PyObject
*kcdsapub_pynew(PyTypeObject
*ty
,
318 PyObject
*arg
, PyObject
*kw
)
320 PyObject
*G
, *p
, *rng
= rand_pyobj
, *hash
= has160_pyobj
;
322 char *kwlist
[] = { "G", "p", "hash", "rng", 0 };
324 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "O!O!|O!O!:new", kwlist
,
327 gchash_pytype
, &hash
,
328 grand_pytype
, &rng
) ||
329 (rc
= dsa_setup(kcdsapub_pytype
, G
, 0, p
, rng
, hash
, 0)) == 0)
335 static void kcdsa_calcpub(group
*g
, ge
*p
, mp
*u
)
337 mp
*uinv
= mp_modinv(MP_NEW
, u
, g
->r
);
338 G_EXP(g
, p
, g
->g
, uinv
);
342 static PyObject
*kcdsapriv_pynew(PyTypeObject
*ty
,
343 PyObject
*arg
, PyObject
*kw
)
345 PyObject
*G
, *u
, *p
= 0, *rng
= rand_pyobj
, *hash
= has160_pyobj
;
347 char *kwlist
[] = { "G", "p", "u", "hash", "rng", 0 };
349 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "O!O|O!O!O!:new", kwlist
,
353 gchash_pytype
, &hash
,
354 grand_pytype
, &rng
) ||
355 (rc
= dsa_setup(kcdsapriv_pytype
, G
, u
, p
,
356 rng
, hash
, kcdsa_calcpub
)) == 0)
362 static PyObject
*kcdsameth_beginhash(PyObject
*me
, PyObject
*arg
)
364 if (!PyArg_ParseTuple(arg
, ":beginhash")) return (0);
365 return (ghash_pywrap(DSA_HASH(me
), gkcdsa_beginhash(DSA_D(me
)), f_freeme
));
368 static PyObject
*kcdsameth_endhash(PyObject
*me
, PyObject
*arg
)
372 if (!PyArg_ParseTuple(arg
, "O&:endhash", convghash
, &h
)) return (0);
373 gkcdsa_endhash(DSA_D(me
), h
);
375 rc
= bytestring_pywrap(0, GH_CLASS(h
)->hashsz
);
376 GH_DONE(h
, PyString_AS_STRING(rc
));
381 static PyObject
*kcdsameth_sign(PyObject
*me
, PyObject
*arg
, PyObject
*kw
)
383 gkcdsa_sig s
= GKCDSA_SIG_INIT
;
387 PyObject
*r
= 0, *rc
= 0;
388 char *kwlist
[] = { "msg", "k", 0 };
390 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "s#|O&:sign", kwlist
,
393 if (n
!= DSA_D(me
)->h
->hashsz
)
394 VALERR("bad message length (doesn't match hash size)");
395 r
= bytestring_pywrap(0, DSA_D(me
)->h
->hashsz
);
396 s
.r
= (octet
*)PyString_AS_STRING(r
);
397 gkcdsa_sign(DSA_D(me
), &s
, p
, k
);
398 rc
= Py_BuildValue("(ON)", r
, mp_pywrap(s
.s
));
405 static PyObject
*kcdsameth_verify(PyObject
*me
, PyObject
*arg
)
409 gkcdsa_sig s
= GKCDSA_SIG_INIT
;
412 if (!PyArg_ParseTuple(arg
, "s#(s#O&):verify",
413 &p
, &n
, &s
.r
, &rn
, convmp
, &s
.s
))
415 if (n
!= DSA_D(me
)->h
->hashsz
)
416 VALERR("bad message length (doesn't match hash size)");
417 if (rn
!= DSA_D(me
)->h
->hashsz
)
418 VALERR("bad signature `r' length (doesn't match hash size)");
419 rc
= getbool(!gkcdsa_verify(DSA_D(me
), &s
, p
));
425 static PyMethodDef kcdsapub_pymethods
[] = {
426 #define METHNAME(name) kcdsameth_##name
427 METH (beginhash
, "D.beginhash() -> hash object")
428 METH (endhash
, "D.endhash(H) -> BYTES")
429 METH (verify
, "D.verify(MSG, (R, S)) -> true/false")
434 static PyMethodDef kcdsapriv_pymethods
[] = {
435 #define METHNAME(name) kcdsameth_##name
436 KWMETH(sign
, "D.sign(MSG, k = K) -> R, S")
441 static PyTypeObject kcdsapub_pytype_skel
= {
442 PyObject_HEAD_INIT(0) 0, /* Header */
443 "KCDSAPub", /* @tp_name@ */
444 sizeof(dsa_pyobj
), /* @tp_basicsize@ */
445 0, /* @tp_itemsize@ */
447 dsa_pydealloc
, /* @tp_dealloc@ */
449 0, /* @tp_getattr@ */
450 0, /* @tp_setattr@ */
451 0, /* @tp_compare@ */
453 0, /* @tp_as_number@ */
454 0, /* @tp_as_sequence@ */
455 0, /* @tp_as_mapping@ */
459 0, /* @tp_getattro@ */
460 0, /* @tp_setattro@ */
461 0, /* @tp_as_buffer@ */
462 Py_TPFLAGS_DEFAULT
| /* @tp_flags@ */
466 "KCDSA public key information.",
468 0, /* @tp_traverse@ */
470 0, /* @tp_richcompare@ */
471 0, /* @tp_weaklistoffset@ */
473 0, /* @tp_iternext@ */
474 kcdsapub_pymethods
, /* @tp_methods@ */
475 dsapub_pymembers
, /* @tp_members@ */
479 0, /* @tp_descr_get@ */
480 0, /* @tp_descr_set@ */
481 0, /* @tp_dictoffset@ */
483 PyType_GenericAlloc
, /* @tp_alloc@ */
484 kcdsapub_pynew
, /* @tp_new@ */
489 static PyTypeObject kcdsapriv_pytype_skel
= {
490 PyObject_HEAD_INIT(0) 0, /* Header */
491 "KCDSAPriv", /* @tp_name@ */
492 sizeof(dsa_pyobj
), /* @tp_basicsize@ */
493 0, /* @tp_itemsize@ */
495 0, /* @tp_dealloc@ */
497 0, /* @tp_getattr@ */
498 0, /* @tp_setattr@ */
499 0, /* @tp_compare@ */
501 0, /* @tp_as_number@ */
502 0, /* @tp_as_sequence@ */
503 0, /* @tp_as_mapping@ */
507 0, /* @tp_getattro@ */
508 0, /* @tp_setattro@ */
509 0, /* @tp_as_buffer@ */
510 Py_TPFLAGS_DEFAULT
| /* @tp_flags@ */
514 "KCDSA private key information.",
516 0, /* @tp_traverse@ */
518 0, /* @tp_richcompare@ */
519 0, /* @tp_weaklistoffset@ */
521 0, /* @tp_iternext@ */
522 kcdsapriv_pymethods
, /* @tp_methods@ */
523 dsapriv_pymembers
, /* @tp_members@ */
527 0, /* @tp_descr_get@ */
528 0, /* @tp_descr_set@ */
529 0, /* @tp_dictoffset@ */
531 PyType_GenericAlloc
, /* @tp_alloc@ */
532 kcdsapriv_pynew
, /* @tp_new@ */
537 /*----- RSA ---------------------------------------------------------------*/
539 typedef struct rsapub_pyobj
{
545 #define RSA_PUB(o) (&((rsapub_pyobj *)(o))->pub)
546 #define RSA_PUBCTX(o) (&((rsapub_pyobj *)(o))->pubctx)
548 typedef struct rsapriv_pyobj
{
557 #define RSA_PRIV(o) (&((rsapriv_pyobj *)(o))->priv)
558 #define RSA_PRIVCTX(o) (&((rsapriv_pyobj *)(o))->privctx)
559 #define RSA_RNG(o) (((rsapriv_pyobj *)(o))->rng)
561 static PyTypeObject
*rsapub_pytype
, *rsapriv_pytype
;
563 static PyObject
*rsapub_pynew(PyTypeObject
*ty
,
564 PyObject
*arg
, PyObject
*kw
)
568 char *kwlist
[] = { "n", "e", 0 };
570 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "O&O&:new", kwlist
,
571 convmp
, &rp
.n
, convmp
, &rp
.e
))
573 if (!MP_ODDP(rp
.n
)) VALERR("RSA modulus must be even");
574 o
= (rsapub_pyobj
*)ty
->tp_alloc(ty
, 0);
576 rsa_pubcreate(&o
->pubctx
, &o
->pub
);
577 return ((PyObject
*)o
);
583 static void rsapub_pydealloc(PyObject
*me
)
585 rsa_pubdestroy(RSA_PUBCTX(me
));
586 rsa_pubfree(RSA_PUB(me
));
590 static PyObject
*rsaget_n(PyObject
*me
, void *hunoz
)
591 { return mp_pywrap(MP_COPY(RSA_PUB(me
)->n
)); }
593 static PyObject
*rsaget_e(PyObject
*me
, void *hunoz
)
594 { return mp_pywrap(MP_COPY(RSA_PUB(me
)->e
)); }
596 static PyObject
*rsameth_pubop(PyObject
*me
, PyObject
*arg
)
601 if (!PyArg_ParseTuple(arg
, "O&:pubop", convmp
, &x
)) goto end
;
602 rc
= mp_pywrap(rsa_pubop(RSA_PUBCTX(me
), MP_NEW
, x
));
608 static PyObject
*rsapriv_dopywrap(PyTypeObject
*ty
,
609 rsa_priv
*rp
, PyObject
*rng
)
613 o
= (rsapriv_pyobj
*)ty
->tp_alloc(ty
, 0);
617 rsa_privcreate(&o
->privctx
, &o
->priv
, &rand_global
);
618 rsa_pubcreate(&o
->pubctx
, &o
->pub
);
624 return ((PyObject
*)o
);
627 PyObject
*rsapriv_pywrap(rsa_priv
*rp
)
628 { return rsapriv_dopywrap(rsapriv_pytype
, rp
, 0); }
630 static PyObject
*rsapriv_pynew(PyTypeObject
*ty
,
631 PyObject
*arg
, PyObject
*kw
)
634 PyObject
*rng
= Py_None
;
636 { "n", "e", "d", "p", "q", "dp", "dq", "q_inv", "rng", 0 };
638 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "|O&O&O&O&O&O&O&O&O:new", kwlist
,
639 convmp
, &rp
.n
, convmp
, &rp
.e
,
641 convmp
, &rp
.p
, convmp
, &rp
.q
,
642 convmp
, &rp
.dp
, convmp
, &rp
.dq
,
646 if ((rp
.n
&& !MP_ODDP(rp
.n
)) ||
647 (rp
.p
&& !MP_ODDP(rp
.p
)) ||
648 (rp
.p
&& !MP_ODDP(rp
.q
)))
649 VALERR("RSA modulus and factors must be odd");
650 if (rsa_recover(&rp
)) VALERR("couldn't construct private key");
651 if (rng
!= Py_None
&& !GRAND_PYCHECK(rng
))
652 TYERR("not a random number source");
654 return (rsapriv_dopywrap(ty
, &rp
, rng
));
660 static void rsapriv_pydealloc(PyObject
*me
)
662 RSA_PRIVCTX(me
)->r
= &rand_global
;
663 rsa_privdestroy(RSA_PRIVCTX(me
));
664 rsa_privfree(RSA_PRIV(me
));
665 Py_DECREF(RSA_RNG(me
));
669 static PyObject
*rsaget_d(PyObject
*me
, void *hunoz
)
670 { return mp_pywrap(MP_COPY(RSA_PRIV(me
)->d
)); }
672 static PyObject
*rsaget_p(PyObject
*me
, void *hunoz
)
673 { return mp_pywrap(MP_COPY(RSA_PRIV(me
)->p
)); }
675 static PyObject
*rsaget_q(PyObject
*me
, void *hunoz
)
676 { return mp_pywrap(MP_COPY(RSA_PRIV(me
)->q
)); }
678 static PyObject
*rsaget_dp(PyObject
*me
, void *hunoz
)
679 { return mp_pywrap(MP_COPY(RSA_PRIV(me
)->dp
)); }
681 static PyObject
*rsaget_dq(PyObject
*me
, void *hunoz
)
682 { return mp_pywrap(MP_COPY(RSA_PRIV(me
)->dq
)); }
684 static PyObject
*rsaget_q_inv(PyObject
*me
, void *hunoz
)
685 { return mp_pywrap(MP_COPY(RSA_PRIV(me
)->q_inv
)); }
687 static PyObject
*rsaget_rng(PyObject
*me
, void *hunoz
)
688 { RETURN_OBJ(RSA_RNG(me
)); }
690 static int rsaset_rng(PyObject
*me
, PyObject
*val
, void *hunoz
)
695 else if (val
!= Py_None
&& !GRAND_PYCHECK(val
))
696 TYERR("expected grand or None");
697 Py_DECREF(RSA_RNG(me
));
705 static PyObject
*rsameth_privop(PyObject
*me
, PyObject
*arg
, PyObject
*kw
)
707 PyObject
*rng
= RSA_RNG(me
);
710 char *kwlist
[] = { "x", "rng", 0 };
712 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "O&|O:privop", kwlist
,
715 if (rng
!= Py_None
&& !GRAND_PYCHECK(rng
))
716 TYERR("not a random number source");
717 RSA_PRIVCTX(me
)->r
= (rng
== Py_None
) ?
0 : GRAND_R(rng
);
718 rc
= mp_pywrap(rsa_privop(RSA_PRIVCTX(me
), MP_NEW
, x
));
724 static PyObject
*meth__RSAPriv_generate(PyObject
*me
,
725 PyObject
*arg
, PyObject
*kw
)
727 grand
*r
= &rand_global
;
732 char *kwlist
[] = { "class", "nbits", "event", "rng", "nsteps", 0 };
735 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "OO&|O&O&O&:generate", kwlist
,
736 &me
, convuint
, &nbits
, convpgev
, &evt
,
737 convgrand
, &r
, convuint
, &n
))
739 if (rsa_gen(&rp
, nbits
, r
, n
, evt
.proc
, evt
.ctx
))
741 rc
= rsapriv_pywrap(&rp
);
747 static PyGetSetDef rsapub_pygetset
[] = {
748 #define GETSETNAME(op, name) rsa##op##_##name
755 static PyMethodDef rsapub_pymethods
[] = {
756 #define METHNAME(name) rsameth_##name
757 METH (pubop
, "R.pubop(X) -> X^E (mod N)")
762 static PyGetSetDef rsapriv_pygetset
[] = {
763 #define GETSETNAME(op, name) rsa##op##_##name
767 GET (dp
, "R.dp -> D mod (P - 1)")
768 GET (dq
, "R.dq -> D mod (Q - 1)")
769 GET (q_inv
, "R.q_inv -> Q^{-1} mod P")
770 GETSET(rng
, "R.rng -> random number source for blinding")
775 static PyMethodDef rsapriv_pymethods
[] = {
776 #define METHNAME(name) rsameth_##name
777 KWMETH(privop
, "R.privop(X, rng = None) -> X^D (mod N)")
782 static PyTypeObject rsapub_pytype_skel
= {
783 PyObject_HEAD_INIT(0) 0, /* Header */
784 "RSAPub", /* @tp_name@ */
785 sizeof(rsapub_pyobj
), /* @tp_basicsize@ */
786 0, /* @tp_itemsize@ */
788 rsapub_pydealloc
, /* @tp_dealloc@ */
790 0, /* @tp_getattr@ */
791 0, /* @tp_setattr@ */
792 0, /* @tp_compare@ */
794 0, /* @tp_as_number@ */
795 0, /* @tp_as_sequence@ */
796 0, /* @tp_as_mapping@ */
800 0, /* @tp_getattro@ */
801 0, /* @tp_setattro@ */
802 0, /* @tp_as_buffer@ */
803 Py_TPFLAGS_DEFAULT
| /* @tp_flags@ */
807 "RSA public key information.",
809 0, /* @tp_traverse@ */
811 0, /* @tp_richcompare@ */
812 0, /* @tp_weaklistoffset@ */
814 0, /* @tp_iternext@ */
815 rsapub_pymethods
, /* @tp_methods@ */
816 0, /* @tp_members@ */
817 rsapub_pygetset
, /* @tp_getset@ */
820 0, /* @tp_descr_get@ */
821 0, /* @tp_descr_set@ */
822 0, /* @tp_dictoffset@ */
824 PyType_GenericAlloc
, /* @tp_alloc@ */
825 rsapub_pynew
, /* @tp_new@ */
830 static PyTypeObject rsapriv_pytype_skel
= {
831 PyObject_HEAD_INIT(0) 0, /* Header */
832 "RSAPriv", /* @tp_name@ */
833 sizeof(rsapriv_pyobj
), /* @tp_basicsize@ */
834 0, /* @tp_itemsize@ */
836 rsapriv_pydealloc
, /* @tp_dealloc@ */
838 0, /* @tp_getattr@ */
839 0, /* @tp_setattr@ */
840 0, /* @tp_compare@ */
842 0, /* @tp_as_number@ */
843 0, /* @tp_as_sequence@ */
844 0, /* @tp_as_mapping@ */
848 0, /* @tp_getattro@ */
849 0, /* @tp_setattro@ */
850 0, /* @tp_as_buffer@ */
851 Py_TPFLAGS_DEFAULT
| /* @tp_flags@ */
855 "RSA private key information.",
857 0, /* @tp_traverse@ */
859 0, /* @tp_richcompare@ */
860 0, /* @tp_weaklistoffset@ */
862 0, /* @tp_iternext@ */
863 rsapriv_pymethods
, /* @tp_methods@ */
864 0, /* @tp_members@ */
865 rsapriv_pygetset
, /* @tp_getset@ */
868 0, /* @tp_descr_get@ */
869 0, /* @tp_descr_set@ */
870 0, /* @tp_dictoffset@ */
872 PyType_GenericAlloc
, /* @tp_alloc@ */
873 rsapriv_pynew
, /* @tp_new@ */
878 /*----- RSA padding schemes -----------------------------------------------*/
880 static PyObject
*meth__p1crypt_encode(PyObject
*me
,
881 PyObject
*arg
, PyObject
*kw
)
885 Py_ssize_t msz
, epsz
;
891 char *kwlist
[] = { "msg", "nbits", "ep", "rng", 0 };
893 p1
.r
= &rand_global
; ep
= 0; epsz
= 0;
894 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "s#O&|s#O&:encode", kwlist
,
895 &m
, &msz
, convulong
, &nbits
,
896 &ep
, &epsz
, convgrand
, &p1
.r
))
899 p1
.ep
= ep
; p1
.epsz
= epsz
;
900 if (epsz
+ msz
+ 11 > sz
) VALERR("buffer underflow");
902 x
= pkcs1_cryptencode(MP_NEW
, m
, msz
, b
, sz
, nbits
, &p1
);
909 static PyObject
*meth__p1crypt_decode(PyObject
*me
,
910 PyObject
*arg
, PyObject
*kw
)
921 char *kwlist
[] = { "ct", "nbits", "ep", "rng", 0 };
923 p1
.r
= &rand_global
; ep
= 0; epsz
= 0;
924 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "O&O&|s#O&:decode", kwlist
,
925 convmp
, &x
, convulong
, &nbits
,
926 &ep
, &epsz
, convgrand
, &p1
.r
))
929 p1
.ep
= ep
; p1
.epsz
= epsz
;
930 if (epsz
+ 11 > sz
) VALERR("buffer underflow");
932 if ((n
= pkcs1_cryptdecode(x
, b
, sz
, nbits
, &p1
)) < 0)
933 VALERR("decryption failed");
934 rc
= bytestring_pywrap(b
, n
);
941 static PyObject
*meth__p1sig_encode(PyObject
*me
,
942 PyObject
*arg
, PyObject
*kw
)
946 Py_ssize_t msz
, epsz
;
952 char *kwlist
[] = { "msg", "nbits", "ep", "rng", 0 };
954 p1
.r
= &rand_global
; ep
= 0; epsz
= 0;
955 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "s#O&|s#O&:encode", kwlist
,
956 &m
, &msz
, convulong
, &nbits
,
957 &ep
, &epsz
, convgrand
, &p1
.r
))
960 p1
.ep
= ep
; p1
.epsz
= epsz
;
961 if (epsz
+ msz
+ 11 > sz
) VALERR("buffer underflow");
963 x
= pkcs1_sigencode(MP_NEW
, m
, msz
, b
, sz
, nbits
, &p1
);
970 static PyObject
*meth__p1sig_decode(PyObject
*me
,
971 PyObject
*arg
, PyObject
*kw
)
983 char *kwlist
[] = { "msg", "sig", "nbits", "ep", "rng", 0 };
985 p1
.r
= &rand_global
; ep
= 0; epsz
= 0;
986 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "OO&O&|s#O&:decode", kwlist
,
987 &hukairz
, convmp
, &x
, convulong
, &nbits
,
988 &ep
, &epsz
, convgrand
, &p1
.r
))
991 p1
.ep
= ep
; p1
.epsz
= epsz
;
992 if (epsz
+ 10 > sz
) VALERR("buffer underflow");
994 if ((n
= pkcs1_sigdecode(x
, 0, 0, b
, sz
, nbits
, &p1
)) < 0)
995 VALERR("verification failed");
996 rc
= bytestring_pywrap(b
, n
);
1003 static PyObject
*meth__oaep_encode(PyObject
*me
,
1004 PyObject
*arg
, PyObject
*kw
)
1008 Py_ssize_t msz
, epsz
;
1009 unsigned long nbits
;
1014 char *kwlist
[] = { "msg", "nbits", "mgf", "hash", "ep", "rng", 0 };
1016 o
.r
= &rand_global
; o
.cc
= &sha_mgf
; o
.ch
= &sha
; ep
= 0; epsz
= 0;
1017 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "s#O&|O&O&s#O&:encode", kwlist
,
1018 &m
, &msz
, convulong
, &nbits
,
1019 convgccipher
, &o
.cc
,
1025 o
.ep
= ep
; o
.epsz
= epsz
;
1026 if (2 * o
.ch
->hashsz
+ 2 + msz
> sz
) VALERR("buffer underflow");
1028 x
= oaep_encode(MP_NEW
, m
, msz
, b
, sz
, nbits
, &o
);
1035 static PyObject
*meth__oaep_decode(PyObject
*me
,
1036 PyObject
*arg
, PyObject
*kw
)
1041 unsigned long nbits
;
1047 char *kwlist
[] = { "ct", "nbits", "mgf", "hash", "ep", "rng", 0 };
1049 o
.r
= &rand_global
; o
.cc
= &sha_mgf
; o
.ch
= &sha
; ep
= 0; epsz
= 0;
1050 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "O&O&|O&O&s#O&:decode", kwlist
,
1051 convmp
, &x
, convulong
, &nbits
,
1052 convgccipher
, &o
.cc
,
1058 o
.ep
= ep
; o
.epsz
= epsz
;
1059 if (2 * o
.ch
->hashsz
> sz
) VALERR("buffer underflow");
1061 if ((n
= oaep_decode(x
, b
, sz
, nbits
, &o
)) < 0)
1062 VALERR("decryption failed");
1063 rc
= bytestring_pywrap(b
, n
);
1070 static PyObject
*meth__pss_encode(PyObject
*me
,
1071 PyObject
*arg
, PyObject
*kw
)
1076 unsigned long nbits
;
1081 char *kwlist
[] = { "msg", "nbits", "mgf", "hash", "saltsz", "rng", 0 };
1083 p
.cc
= &sha_mgf
; p
.ch
= &sha
; p
.r
= &rand_global
; p
.ssz
= (size_t)-1;
1084 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "s#O&|O&O&O&O&:encode", kwlist
,
1085 &m
, &msz
, convulong
, &nbits
,
1086 convgccipher
, &p
.cc
,
1092 if (p
.ssz
== (size_t)-1) p
.ssz
= p
.ch
->hashsz
;
1093 if (p
.ch
->hashsz
+ p
.ssz
+ 2 > sz
) VALERR("buffer underflow");
1095 x
= pss_encode(MP_NEW
, m
, msz
, b
, sz
, nbits
, &p
);
1102 static PyObject
*meth__pss_decode(PyObject
*me
,
1103 PyObject
*arg
, PyObject
*kw
)
1108 unsigned long nbits
;
1115 { "msg", "sig", "nbits", "mgf", "hash", "saltsz", "rng", 0 };
1117 p
.cc
= &sha_mgf
; p
.ch
= &sha
; p
.r
= &rand_global
; p
.ssz
= (size_t)-1;
1118 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "s#O&O&|O&O&O&O&:decode", kwlist
,
1119 &m
, &msz
, convmp
, &x
, convulong
, &nbits
,
1120 convgccipher
, &p
.cc
,
1126 if (p
.ssz
== (size_t)-1) p
.ssz
= p
.ch
->hashsz
;
1127 if (p
.ch
->hashsz
+ p
.ssz
+ 2 > sz
) VALERR("buffer underflow");
1129 if ((n
= pss_decode(x
, m
, msz
, b
, sz
, nbits
, &p
)) < 0)
1130 VALERR("verification failed");
1131 rc
= Py_None
; Py_INCREF(rc
);
1138 /*----- X25519 and related algorithms -------------------------------------*/
1140 static PyObject
*meth_x25519(PyObject
*me
, PyObject
*arg
)
1143 Py_ssize_t ksz
, psz
;
1145 if (!PyArg_ParseTuple(arg
, "s#s#:x25519", &k
, &ksz
, &p
, &psz
)) goto end
;
1146 if (ksz
!= X25519_KEYSZ
) VALERR("bad key length");
1147 if (psz
!= X25519_PUBSZ
) VALERR("bad public length");
1148 rc
= bytestring_pywrap(0, X25519_OUTSZ
);
1149 x25519((octet
*)PyString_AS_STRING(rc
),
1150 (const octet
*)k
, (const octet
*)p
);
1156 static PyObject
*meth_x448(PyObject
*me
, PyObject
*arg
)
1159 Py_ssize_t ksz
, psz
;
1161 if (!PyArg_ParseTuple(arg
, "s#s#:x448", &k
, &ksz
, &p
, &psz
)) goto end
;
1162 if (ksz
!= X448_KEYSZ
) VALERR("bad key length");
1163 if (psz
!= X448_PUBSZ
) VALERR("bad public length");
1164 rc
= bytestring_pywrap(0, X448_OUTSZ
);
1165 x448((octet
*)PyString_AS_STRING(rc
),
1166 (const octet
*)k
, (const octet
*)p
);
1172 /*----- Ed25519 -----------------------------------------------------------*/
1174 static PyObject
*meth_ed25519_pubkey(PyObject
*me
, PyObject
*arg
)
1179 if (!PyArg_ParseTuple(arg
, "s#:ed25519_pubkey", &k
, &ksz
)) goto end
;
1180 rc
= bytestring_pywrap(0, ED25519_PUBSZ
);
1181 ed25519_pubkey((octet
*)PyString_AS_STRING(rc
), k
, ksz
);
1187 static PyObject
*meth_ed25519_sign(PyObject
*me
, PyObject
*arg
, PyObject
*kw
)
1189 const char *k
, *p
= 0, *m
;
1190 Py_ssize_t ksz
, psz
, msz
;
1192 octet pp
[ED25519_PUBSZ
];
1193 char *kwlist
[] = { "key", "msg", "pub", 0 };
1194 if (!PyArg_ParseTupleAndKeywords(arg
, kw
, "s#s#|s#:ed25519_sign", kwlist
,
1195 &k
, &ksz
, &m
, &msz
, &p
, &psz
))
1197 if (p
&& psz
!= ED25519_PUBSZ
) VALERR("bad public length");
1198 if (!p
) { p
= (const char *)pp
; ed25519_pubkey(pp
, k
, ksz
); }
1199 rc
= bytestring_pywrap(0, ED25519_SIGSZ
);
1200 ed25519_sign((octet
*)PyString_AS_STRING(rc
), k
, ksz
,
1201 (const octet
*)p
, m
, msz
);
1207 static PyObject
*meth_ed25519_verify(PyObject
*me
, PyObject
*arg
)
1209 const char *p
, *m
, *s
;
1210 Py_ssize_t psz
, msz
, ssz
;
1212 if (!PyArg_ParseTuple(arg
, "s#s#s#:ed25519_verify",
1213 &p
, &psz
, &m
, &msz
, &s
, &ssz
))
1215 if (psz
!= ED25519_PUBSZ
) VALERR("bad public length");
1216 if (ssz
!= ED25519_SIGSZ
) VALERR("bad signature length");
1217 rc
= getbool(!ed25519_verify((const octet
*)p
, m
, msz
, (const octet
*)s
));
1223 /*----- Global stuff ------------------------------------------------------*/
1225 static PyMethodDef methods
[] = {
1226 #define METHNAME(name) meth_##name
1227 KWMETH(_p1crypt_encode
, 0)
1228 KWMETH(_p1crypt_decode
, 0)
1229 KWMETH(_p1sig_encode
, 0)
1230 KWMETH(_p1sig_decode
, 0)
1231 KWMETH(_oaep_encode
, 0)
1232 KWMETH(_oaep_decode
, 0)
1233 KWMETH(_pss_encode
, 0)
1234 KWMETH(_pss_decode
, 0)
1235 KWMETH(_RSAPriv_generate
, "\
1236 generate(NBITS, [event = pgen_nullev, rng = rand, nsteps = 0]) -> R")
1238 x25519(KEY, PUBLIC) -> SHARED")
1240 x448(KEY, PUBLIC) -> SHARED")
1241 METH (ed25519_pubkey
, "\
1242 ed25519_pubkey(KEY) -> PUBLIC")
1243 KWMETH(ed25519_sign
, "\
1244 ed25519_sign(KEY, MSG, [PUBLIC]) -> SIG")
1245 METH (ed25519_verify
, "\
1246 ed25519_verify(PUBLIC, MSG, SIG) -> BOOL")
1251 void pubkey_pyinit(void)
1253 INITTYPE(dsapub
, root
);
1254 INITTYPE(dsapriv
, dsapub
);
1255 INITTYPE(kcdsapub
, root
);
1256 INITTYPE(kcdsapriv
, kcdsapub
);
1257 INITTYPE(rsapub
, root
);
1258 INITTYPE(rsapriv
, rsapub
);
1259 addmethods(methods
);
1262 void pubkey_pyinsert(PyObject
*mod
)
1264 INSERT("DSAPub", dsapub_pytype
);
1265 INSERT("DSAPriv", dsapriv_pytype
);
1266 INSERT("KCDSAPub", kcdsapub_pytype
);
1267 INSERT("KCDSAPriv", kcdsapriv_pytype
);
1268 INSERT("RSAPub", rsapub_pytype
);
1269 INSERT("RSAPriv", rsapriv_pytype
);
1272 /*----- That's all, folks -------------------------------------------------*/