Splice 'pyke/' prehistory from commit 'c1756f78cbf3007438b3eb2fbfbd632d070be6ca'
[catacomb-python] / pubkey.c
1 /* -*-c-*-
2 *
3 * Public-key cryptography
4 *
5 * (c) 2004 Straylight/Edgeware
6 */
7
8 /*----- Licensing notice --------------------------------------------------*
9 *
10 * This file is part of the Python interface to Catacomb.
11 *
12 * Catacomb/Python is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
16 *
17 * Catacomb/Python is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License
23 * along with Catacomb/Python; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25 */
26
27 /*----- Header files ------------------------------------------------------*/
28
29 #include "catacomb-python.h"
30
31 /*----- DSA and similar ---------------------------------------------------*/
32
33 typedef struct dsa_pyobj {
34 PyObject_HEAD
35 PyObject *G, *u, *p, *rng, *hash;
36 gdsa d;
37 } dsa_pyobj;
38
39 static PyTypeObject *dsapub_pytype, *dsapriv_pytype;
40 static PyTypeObject *kcdsapub_pytype, *kcdsapriv_pytype;
41 #define DSA_D(o) (&((dsa_pyobj *)(o))->d)
42 #define DSA_G(o) (((dsa_pyobj *)(o))->G)
43 #define DSA_U(o) (((dsa_pyobj *)(o))->u)
44 #define DSA_P(o) (((dsa_pyobj *)(o))->p)
45 #define DSA_RNG(o) (((dsa_pyobj *)(o))->rng)
46 #define DSA_HASH(o) (((dsa_pyobj *)(o))->hash)
47
48 static void dsa_pydealloc(PyObject *me)
49 {
50 dsa_pyobj *g = (dsa_pyobj *)me;
51 Py_DECREF(g->G); Py_DECREF(g->u); Py_DECREF(g->p);
52 Py_DECREF(g->rng); Py_DECREF(g->hash);
53 FREEOBJ(me);
54 }
55
56 static PyObject *dsa_setup(PyTypeObject *ty, PyObject *G, PyObject *u,
57 PyObject *p, PyObject *rng, PyObject *hash,
58 void (*calcpub)(group *, ge *, mp *))
59 {
60 dsa_pyobj *g;
61 ge *pp;
62
63 g = PyObject_New(dsa_pyobj, ty);
64 if (p) Py_INCREF(p);
65 if (!u) {
66 g->d.u = 0;
67 u = Py_None;
68 } else {
69 if ((g->d.u = getmp(u)) == 0)
70 goto end;
71 if (MP_PYCHECK(u)) Py_INCREF(u);
72 else u = mp_pywrap(g->d.u);
73 }
74 if (!p) {
75 assert(g->d.u); assert(calcpub);
76 pp = G_CREATE(GROUP_G(G));
77 calcpub(GROUP_G(G), pp, g->d.u);
78 p = ge_pywrap(G, pp);
79 } else if (GROUP_G(G) != GE_G(p) && !group_samep(GROUP_G(G), GE_G(p)))
80 TYERR("public key not from group");
81 g->d.g = GROUP_G(G);
82 g->d.p = GE_X(p);
83 g->d.r = GRAND_R(rng);
84 g->d.h = GCHASH_CH(hash);
85 g->G = G; Py_INCREF(G); g->u = u; g->p = p;
86 g->rng = rng; Py_INCREF(rng); g->hash = hash; Py_INCREF(hash);
87 return ((PyObject *)g);
88 end:
89 Py_XDECREF(p); FREEOBJ(g);
90 return (0);
91 }
92
93 static PyObject *dsapub_pynew(PyTypeObject *ty,
94 PyObject *arg, PyObject *kw)
95 {
96 PyObject *G, *p, *rng = rand_pyobj, *hash = sha_pyobj;
97 PyObject *rc = 0;
98 static const char *const kwlist[] = { "G", "p", "hash", "rng", 0 };
99
100 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O!|O!O!:new", KWLIST,
101 group_pytype, &G,
102 ge_pytype, &p,
103 gchash_pytype, &hash,
104 grand_pytype, &rng) ||
105 (rc = dsa_setup(dsapub_pytype, G, 0, p, rng, hash, 0)) == 0)
106 goto end;
107 end:
108 return (rc);
109 }
110
111 static PyObject *dsameth_beginhash(PyObject *me, PyObject *arg)
112 {
113 if (!PyArg_ParseTuple(arg, ":beginhash")) return (0);
114 return (ghash_pywrap(DSA_HASH(me), gdsa_beginhash(DSA_D(me))));
115 }
116
117 static PyObject *dsameth_endhash(PyObject *me, PyObject *arg)
118 {
119 ghash *h;
120 PyObject *rc;
121 if (!PyArg_ParseTuple(arg, "O&:endhash", convghash, &h)) return (0);
122 gdsa_endhash(DSA_D(me), h);
123 h = GH_COPY(h);
124 rc = bytestring_pywrap(0, GH_CLASS(h)->hashsz);
125 GH_DONE(h, PyString_AS_STRING(rc));
126 GH_DESTROY(h);
127 return (rc);
128 }
129
130 static PyObject *dsameth_sign(PyObject *me, PyObject *arg, PyObject *kw)
131 {
132 gdsa_sig s = GDSA_SIG_INIT;
133 char *p;
134 Py_ssize_t n;
135 mp *k = 0;
136 PyObject *rc = 0;
137 static const char *const kwlist[] = { "msg", "k", 0 };
138
139 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#|O&:sign", KWLIST,
140 &p, &n, convmp, &k))
141 goto end;
142 if (n != DSA_D(me)->h->hashsz)
143 VALERR("bad message length (doesn't match hash size)");
144 gdsa_sign(DSA_D(me), &s, p, k);
145 rc = Py_BuildValue("(NN)", mp_pywrap(s.r), mp_pywrap(s.s));
146 end:
147 mp_drop(k);
148 return (rc);
149 }
150
151 static PyObject *dsameth_verify(PyObject *me, PyObject *arg)
152 {
153 char *p;
154 Py_ssize_t n;
155 gdsa_sig s = GDSA_SIG_INIT;
156 PyObject *rc = 0;
157
158 if (!PyArg_ParseTuple(arg, "s#(O&O&):verify",
159 &p, &n, convmp, &s.r, convmp, &s.s))
160 goto end;
161 if (n != DSA_D(me)->h->hashsz)
162 VALERR("bad message length (doesn't match hash size)");
163 rc = getbool(!gdsa_verify(DSA_D(me), &s, p));
164 end:
165 mp_drop(s.r);
166 mp_drop(s.s);
167 return (rc);
168 }
169
170 static void dsa_calcpub(group *g, ge *p, mp *u) { G_EXP(g, p, g->g, u); }
171
172 static PyObject *dsapriv_pynew(PyTypeObject *ty,
173 PyObject *arg, PyObject *kw)
174 {
175 PyObject *G, *p = 0, *u, *rng = rand_pyobj, *hash = sha_pyobj;
176 PyObject *rc = 0;
177 static const char *const kwlist[] = { "G", "u", "p", "hash", "rng", 0 };
178
179 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O|O!O!O!:new", KWLIST,
180 group_pytype, &G,
181 &u,
182 ge_pytype, &p,
183 gchash_pytype, &hash,
184 grand_pytype, &rng) ||
185 (rc = dsa_setup(dsapriv_pytype, G, u, p, rng, hash, dsa_calcpub)) == 0)
186 goto end;
187 end:
188 return (rc);
189 }
190
191 static PyMethodDef dsapub_pymethods[] = {
192 #define METHNAME(name) dsameth_##name
193 METH (beginhash, "D.beginhash() -> hash object")
194 METH (endhash, "D.endhash(H) -> BYTES")
195 METH (verify, "D.verify(MSG, (R, S)) -> true/false")
196 #undef METHNAME
197 { 0 }
198 };
199
200 static PyMethodDef dsapriv_pymethods[] = {
201 #define METHNAME(name) dsameth_##name
202 KWMETH(sign, "D.sign(MSG, [k = K]) -> R, S")
203 #undef METHNAME
204 { 0 }
205 };
206
207 static PyMemberDef dsapub_pymembers[] = {
208 #define MEMBERSTRUCT dsa_pyobj
209 MEMBER(G, T_OBJECT, READONLY, "D.G -> group to work in")
210 MEMBER(p, T_OBJECT, READONLY, "D.p -> public key (group element")
211 MEMBER(rng, T_OBJECT, READONLY, "D.rng -> random number generator")
212 MEMBER(hash, T_OBJECT, READONLY, "D.hash -> hash class")
213 #undef MEMBERSTRUCT
214 { 0 }
215 };
216
217 static PyMemberDef dsapriv_pymembers[] = {
218 #define MEMBERSTRUCT dsa_pyobj
219 MEMBER(u, T_OBJECT, READONLY, "D.u -> private key (exponent)")
220 #undef MEMBERSTRUCT
221 { 0 }
222 };
223
224 static PyTypeObject dsapub_pytype_skel = {
225 PyObject_HEAD_INIT(0) 0, /* Header */
226 "DSAPub", /* @tp_name@ */
227 sizeof(dsa_pyobj), /* @tp_basicsize@ */
228 0, /* @tp_itemsize@ */
229
230 dsa_pydealloc, /* @tp_dealloc@ */
231 0, /* @tp_print@ */
232 0, /* @tp_getattr@ */
233 0, /* @tp_setattr@ */
234 0, /* @tp_compare@ */
235 0, /* @tp_repr@ */
236 0, /* @tp_as_number@ */
237 0, /* @tp_as_sequence@ */
238 0, /* @tp_as_mapping@ */
239 0, /* @tp_hash@ */
240 0, /* @tp_call@ */
241 0, /* @tp_str@ */
242 0, /* @tp_getattro@ */
243 0, /* @tp_setattro@ */
244 0, /* @tp_as_buffer@ */
245 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
246 Py_TPFLAGS_BASETYPE,
247
248 /* @tp_doc@ */
249 "DSAPub(GROUP, P, [hash = sha], [rng = rand]): DSA public key.",
250
251 0, /* @tp_traverse@ */
252 0, /* @tp_clear@ */
253 0, /* @tp_richcompare@ */
254 0, /* @tp_weaklistoffset@ */
255 0, /* @tp_iter@ */
256 0, /* @tp_iternext@ */
257 dsapub_pymethods, /* @tp_methods@ */
258 dsapub_pymembers, /* @tp_members@ */
259 0, /* @tp_getset@ */
260 0, /* @tp_base@ */
261 0, /* @tp_dict@ */
262 0, /* @tp_descr_get@ */
263 0, /* @tp_descr_set@ */
264 0, /* @tp_dictoffset@ */
265 0, /* @tp_init@ */
266 PyType_GenericAlloc, /* @tp_alloc@ */
267 dsapub_pynew, /* @tp_new@ */
268 0, /* @tp_free@ */
269 0 /* @tp_is_gc@ */
270 };
271
272 static PyTypeObject dsapriv_pytype_skel = {
273 PyObject_HEAD_INIT(0) 0, /* Header */
274 "DSAPriv", /* @tp_name@ */
275 sizeof(dsa_pyobj), /* @tp_basicsize@ */
276 0, /* @tp_itemsize@ */
277
278 0, /* @tp_dealloc@ */
279 0, /* @tp_print@ */
280 0, /* @tp_getattr@ */
281 0, /* @tp_setattr@ */
282 0, /* @tp_compare@ */
283 0, /* @tp_repr@ */
284 0, /* @tp_as_number@ */
285 0, /* @tp_as_sequence@ */
286 0, /* @tp_as_mapping@ */
287 0, /* @tp_hash@ */
288 0, /* @tp_call@ */
289 0, /* @tp_str@ */
290 0, /* @tp_getattro@ */
291 0, /* @tp_setattro@ */
292 0, /* @tp_as_buffer@ */
293 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
294 Py_TPFLAGS_BASETYPE,
295
296 /* @tp_doc@ */
297 "DSAPriv(GROUP, U, [p = u G], [hash = sha], [rng = rand]): "
298 "DSA private key.",
299
300 0, /* @tp_traverse@ */
301 0, /* @tp_clear@ */
302 0, /* @tp_richcompare@ */
303 0, /* @tp_weaklistoffset@ */
304 0, /* @tp_iter@ */
305 0, /* @tp_iternext@ */
306 dsapriv_pymethods, /* @tp_methods@ */
307 dsapriv_pymembers, /* @tp_members@ */
308 0, /* @tp_getset@ */
309 0, /* @tp_base@ */
310 0, /* @tp_dict@ */
311 0, /* @tp_descr_get@ */
312 0, /* @tp_descr_set@ */
313 0, /* @tp_dictoffset@ */
314 0, /* @tp_init@ */
315 PyType_GenericAlloc, /* @tp_alloc@ */
316 dsapriv_pynew, /* @tp_new@ */
317 0, /* @tp_free@ */
318 0 /* @tp_is_gc@ */
319 };
320
321 static PyObject *kcdsapub_pynew(PyTypeObject *ty,
322 PyObject *arg, PyObject *kw)
323 {
324 PyObject *G, *p, *rng = rand_pyobj, *hash = has160_pyobj;
325 PyObject *rc = 0;
326 static const char *const kwlist[] = { "G", "p", "hash", "rng", 0 };
327
328 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O!|O!O!:new", KWLIST,
329 group_pytype, &G,
330 ge_pytype, &p,
331 gchash_pytype, &hash,
332 grand_pytype, &rng) ||
333 (rc = dsa_setup(kcdsapub_pytype, G, 0, p, rng, hash, 0)) == 0)
334 goto end;
335 end:
336 return (rc);
337 }
338
339 static void kcdsa_calcpub(group *g, ge *p, mp *u)
340 {
341 mp *uinv = mp_modinv(MP_NEW, u, g->r);
342 G_EXP(g, p, g->g, uinv);
343 mp_drop(uinv);
344 }
345
346 static PyObject *kcdsapriv_pynew(PyTypeObject *ty,
347 PyObject *arg, PyObject *kw)
348 {
349 PyObject *G, *u, *p = 0, *rng = rand_pyobj, *hash = has160_pyobj;
350 PyObject *rc = 0;
351 static const char *const kwlist[] = { "G", "u", "p", "hash", "rng", 0 };
352
353 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O|O!O!O!:new", KWLIST,
354 group_pytype, &G,
355 &u,
356 ge_pytype, &p,
357 gchash_pytype, &hash,
358 grand_pytype, &rng) ||
359 (rc = dsa_setup(kcdsapriv_pytype, G, u, p,
360 rng, hash, kcdsa_calcpub)) == 0)
361 goto end;
362 end:
363 return (rc);
364 }
365
366 static PyObject *kcdsameth_beginhash(PyObject *me, PyObject *arg)
367 {
368 if (!PyArg_ParseTuple(arg, ":beginhash")) return (0);
369 return (ghash_pywrap(DSA_HASH(me), gkcdsa_beginhash(DSA_D(me))));
370 }
371
372 static PyObject *kcdsameth_endhash(PyObject *me, PyObject *arg)
373 {
374 ghash *h;
375 PyObject *rc;
376 if (!PyArg_ParseTuple(arg, "O&:endhash", convghash, &h)) return (0);
377 gkcdsa_endhash(DSA_D(me), h);
378 h = GH_COPY(h);
379 rc = bytestring_pywrap(0, GH_CLASS(h)->hashsz);
380 GH_DONE(h, PyString_AS_STRING(rc));
381 GH_DESTROY(h);
382 return (rc);
383 }
384
385 static PyObject *kcdsameth_sign(PyObject *me, PyObject *arg, PyObject *kw)
386 {
387 gkcdsa_sig s = GKCDSA_SIG_INIT;
388 char *p;
389 Py_ssize_t n;
390 mp *k = 0;
391 PyObject *r = 0, *rc = 0;
392 static const char *const kwlist[] = { "msg", "k", 0 };
393
394 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#|O&:sign", KWLIST,
395 &p, &n, convmp, &k))
396 goto end;
397 if (n != DSA_D(me)->h->hashsz)
398 VALERR("bad message length (doesn't match hash size)");
399 r = bytestring_pywrap(0, DSA_D(me)->h->hashsz);
400 s.r = (octet *)PyString_AS_STRING(r);
401 gkcdsa_sign(DSA_D(me), &s, p, k);
402 rc = Py_BuildValue("(ON)", r, mp_pywrap(s.s));
403 end:
404 Py_XDECREF(r);
405 mp_drop(k);
406 return (rc);
407 }
408
409 static PyObject *kcdsameth_verify(PyObject *me, PyObject *arg)
410 {
411 char *p;
412 Py_ssize_t n, rn;
413 gkcdsa_sig s = GKCDSA_SIG_INIT;
414 PyObject *rc = 0;
415
416 if (!PyArg_ParseTuple(arg, "s#(s#O&):verify",
417 &p, &n, &s.r, &rn, convmp, &s.s))
418 goto end;
419 if (n != DSA_D(me)->h->hashsz)
420 VALERR("bad message length (doesn't match hash size)");
421 if (rn != DSA_D(me)->h->hashsz)
422 VALERR("bad signature `r' length (doesn't match hash size)");
423 rc = getbool(!gkcdsa_verify(DSA_D(me), &s, p));
424 end:
425 mp_drop(s.s);
426 return (rc);
427 }
428
429 static PyMethodDef kcdsapub_pymethods[] = {
430 #define METHNAME(name) kcdsameth_##name
431 METH (beginhash, "D.beginhash() -> hash object")
432 METH (endhash, "D.endhash(H) -> BYTES")
433 METH (verify, "D.verify(MSG, (R, S)) -> true/false")
434 #undef METHNAME
435 { 0 }
436 };
437
438 static PyMethodDef kcdsapriv_pymethods[] = {
439 #define METHNAME(name) kcdsameth_##name
440 KWMETH(sign, "D.sign(MSG, [k = K]) -> R, S")
441 #undef METHNAME
442 { 0 }
443 };
444
445 static PyTypeObject kcdsapub_pytype_skel = {
446 PyObject_HEAD_INIT(0) 0, /* Header */
447 "KCDSAPub", /* @tp_name@ */
448 sizeof(dsa_pyobj), /* @tp_basicsize@ */
449 0, /* @tp_itemsize@ */
450
451 dsa_pydealloc, /* @tp_dealloc@ */
452 0, /* @tp_print@ */
453 0, /* @tp_getattr@ */
454 0, /* @tp_setattr@ */
455 0, /* @tp_compare@ */
456 0, /* @tp_repr@ */
457 0, /* @tp_as_number@ */
458 0, /* @tp_as_sequence@ */
459 0, /* @tp_as_mapping@ */
460 0, /* @tp_hash@ */
461 0, /* @tp_call@ */
462 0, /* @tp_str@ */
463 0, /* @tp_getattro@ */
464 0, /* @tp_setattro@ */
465 0, /* @tp_as_buffer@ */
466 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
467 Py_TPFLAGS_BASETYPE,
468
469 /* @tp_doc@ */
470 "KCDSAPub(GROUP, P, [hash = sha], [rng = rand]): KCDSA public key.",
471
472 0, /* @tp_traverse@ */
473 0, /* @tp_clear@ */
474 0, /* @tp_richcompare@ */
475 0, /* @tp_weaklistoffset@ */
476 0, /* @tp_iter@ */
477 0, /* @tp_iternext@ */
478 kcdsapub_pymethods, /* @tp_methods@ */
479 dsapub_pymembers, /* @tp_members@ */
480 0, /* @tp_getset@ */
481 0, /* @tp_base@ */
482 0, /* @tp_dict@ */
483 0, /* @tp_descr_get@ */
484 0, /* @tp_descr_set@ */
485 0, /* @tp_dictoffset@ */
486 0, /* @tp_init@ */
487 PyType_GenericAlloc, /* @tp_alloc@ */
488 kcdsapub_pynew, /* @tp_new@ */
489 0, /* @tp_free@ */
490 0 /* @tp_is_gc@ */
491 };
492
493 static PyTypeObject kcdsapriv_pytype_skel = {
494 PyObject_HEAD_INIT(0) 0, /* Header */
495 "KCDSAPriv", /* @tp_name@ */
496 sizeof(dsa_pyobj), /* @tp_basicsize@ */
497 0, /* @tp_itemsize@ */
498
499 0, /* @tp_dealloc@ */
500 0, /* @tp_print@ */
501 0, /* @tp_getattr@ */
502 0, /* @tp_setattr@ */
503 0, /* @tp_compare@ */
504 0, /* @tp_repr@ */
505 0, /* @tp_as_number@ */
506 0, /* @tp_as_sequence@ */
507 0, /* @tp_as_mapping@ */
508 0, /* @tp_hash@ */
509 0, /* @tp_call@ */
510 0, /* @tp_str@ */
511 0, /* @tp_getattro@ */
512 0, /* @tp_setattro@ */
513 0, /* @tp_as_buffer@ */
514 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
515 Py_TPFLAGS_BASETYPE,
516
517 /* @tp_doc@ */
518 "KCDSAPriv(GROUP, U, [p = u G], [hash = sha], [rng = rand]): "
519 "KCDSA private key.",
520
521 0, /* @tp_traverse@ */
522 0, /* @tp_clear@ */
523 0, /* @tp_richcompare@ */
524 0, /* @tp_weaklistoffset@ */
525 0, /* @tp_iter@ */
526 0, /* @tp_iternext@ */
527 kcdsapriv_pymethods, /* @tp_methods@ */
528 dsapriv_pymembers, /* @tp_members@ */
529 0, /* @tp_getset@ */
530 0, /* @tp_base@ */
531 0, /* @tp_dict@ */
532 0, /* @tp_descr_get@ */
533 0, /* @tp_descr_set@ */
534 0, /* @tp_dictoffset@ */
535 0, /* @tp_init@ */
536 PyType_GenericAlloc, /* @tp_alloc@ */
537 kcdsapriv_pynew, /* @tp_new@ */
538 0, /* @tp_free@ */
539 0 /* @tp_is_gc@ */
540 };
541
542 /*----- RSA ---------------------------------------------------------------*/
543
544 typedef struct rsapub_pyobj {
545 PyObject_HEAD
546 rsa_pub pub;
547 rsa_pubctx pubctx;
548 } rsapub_pyobj;
549
550 #define RSA_PUB(o) (&((rsapub_pyobj *)(o))->pub)
551 #define RSA_PUBCTX(o) (&((rsapub_pyobj *)(o))->pubctx)
552
553 typedef struct rsapriv_pyobj {
554 PyObject_HEAD
555 rsa_pub pub;
556 rsa_pubctx pubctx;
557 rsa_priv priv;
558 rsa_privctx privctx;
559 PyObject *rng;
560 } rsapriv_pyobj;
561
562 #define RSA_PRIV(o) (&((rsapriv_pyobj *)(o))->priv)
563 #define RSA_PRIVCTX(o) (&((rsapriv_pyobj *)(o))->privctx)
564 #define RSA_RNG(o) (((rsapriv_pyobj *)(o))->rng)
565
566 static PyTypeObject *rsapub_pytype, *rsapriv_pytype;
567
568 static PyObject *rsapub_pynew(PyTypeObject *ty,
569 PyObject *arg, PyObject *kw)
570 {
571 rsa_pub rp = { 0 };
572 rsapub_pyobj *o;
573 static const char *const kwlist[] = { "n", "e", 0 };
574
575 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&O&:new", KWLIST,
576 convmp, &rp.n, convmp, &rp.e))
577 goto end;
578 if (!MP_ODDP(rp.n)) VALERR("RSA modulus must be even");
579 o = (rsapub_pyobj *)ty->tp_alloc(ty, 0);
580 o->pub = rp;
581 rsa_pubcreate(&o->pubctx, &o->pub);
582 return ((PyObject *)o);
583 end:
584 rsa_pubfree(&rp);
585 return (0);
586 }
587
588 static void rsapub_pydealloc(PyObject *me)
589 {
590 rsa_pubdestroy(RSA_PUBCTX(me));
591 rsa_pubfree(RSA_PUB(me));
592 FREEOBJ(me);
593 }
594
595 static PyObject *rsaget_n(PyObject *me, void *hunoz)
596 { return mp_pywrap(MP_COPY(RSA_PUB(me)->n)); }
597
598 static PyObject *rsaget_e(PyObject *me, void *hunoz)
599 { return mp_pywrap(MP_COPY(RSA_PUB(me)->e)); }
600
601 static PyObject *rsameth_pubop(PyObject *me, PyObject *arg)
602 {
603 mp *x = 0;
604 PyObject *rc = 0;
605
606 if (!PyArg_ParseTuple(arg, "O&:pubop", convmp, &x)) goto end;
607 rc = mp_pywrap(rsa_pubop(RSA_PUBCTX(me), MP_NEW, x));
608 end:
609 mp_drop(x);
610 return (rc);
611 }
612
613 static PyObject *rsapriv_dopywrap(PyTypeObject *ty,
614 rsa_priv *rp, PyObject *rng)
615 {
616 rsapriv_pyobj *o;
617
618 o = (rsapriv_pyobj *)ty->tp_alloc(ty, 0);
619 o->priv = *rp;
620 o->pub.n = rp->n;
621 o->pub.e = rp->e;
622 rsa_privcreate(&o->privctx, &o->priv, &rand_global);
623 rsa_pubcreate(&o->pubctx, &o->pub);
624 if (!rng) {
625 rng = Py_None;
626 Py_INCREF(rng);
627 }
628 o->rng = rng;
629 return ((PyObject *)o);
630 }
631
632 PyObject *rsapriv_pywrap(rsa_priv *rp)
633 { return rsapriv_dopywrap(rsapriv_pytype, rp, 0); }
634
635 static PyObject *rsapriv_pynew(PyTypeObject *ty,
636 PyObject *arg, PyObject *kw)
637 {
638 rsa_priv rp = { 0 };
639 PyObject *rng = Py_None;
640 static const char *const kwlist[] =
641 { "n", "e", "d", "p", "q", "dp", "dq", "q_inv", "rng", 0 };
642
643 if (!PyArg_ParseTupleAndKeywords(arg, kw, "|O&O&O&O&O&O&O&O&O:new", KWLIST,
644 convmp, &rp.n, convmp, &rp.e,
645 convmp, &rp.d,
646 convmp, &rp.p, convmp, &rp.q,
647 convmp, &rp.dp, convmp, &rp.dq,
648 convmp, &rp.q_inv,
649 &rng))
650 goto end;
651 if ((rp.n && !MP_ODDP(rp.n)) ||
652 (rp.p && !MP_ODDP(rp.p)) ||
653 (rp.q && !MP_ODDP(rp.q)))
654 VALERR("RSA modulus and factors must be odd");
655 if (rsa_recover(&rp)) VALERR("couldn't construct private key");
656 if (rng != Py_None && !GRAND_PYCHECK(rng))
657 TYERR("not a random number source");
658 Py_INCREF(rng);
659 return (rsapriv_dopywrap(ty, &rp, rng));
660 end:
661 rsa_privfree(&rp);
662 return (0);
663 }
664
665 static void rsapriv_pydealloc(PyObject *me)
666 {
667 RSA_PRIVCTX(me)->r = &rand_global;
668 rsa_privdestroy(RSA_PRIVCTX(me));
669 rsa_privfree(RSA_PRIV(me));
670 Py_DECREF(RSA_RNG(me));
671 FREEOBJ(me);
672 }
673
674 static PyObject *rsaget_d(PyObject *me, void *hunoz)
675 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->d)); }
676
677 static PyObject *rsaget_p(PyObject *me, void *hunoz)
678 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->p)); }
679
680 static PyObject *rsaget_q(PyObject *me, void *hunoz)
681 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->q)); }
682
683 static PyObject *rsaget_dp(PyObject *me, void *hunoz)
684 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->dp)); }
685
686 static PyObject *rsaget_dq(PyObject *me, void *hunoz)
687 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->dq)); }
688
689 static PyObject *rsaget_q_inv(PyObject *me, void *hunoz)
690 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->q_inv)); }
691
692 static PyObject *rsaget_rng(PyObject *me, void *hunoz)
693 { RETURN_OBJ(RSA_RNG(me)); }
694
695 static int rsaset_rng(PyObject *me, PyObject *val, void *hunoz)
696 {
697 int rc = -1;
698 if (!val)
699 val = Py_None;
700 else if (val != Py_None && !GRAND_PYCHECK(val))
701 TYERR("expected grand or None");
702 Py_DECREF(RSA_RNG(me));
703 RSA_RNG(me) = val;
704 Py_INCREF(val);
705 rc = 0;
706 end:
707 return (rc);
708 }
709
710 static PyObject *rsameth_privop(PyObject *me, PyObject *arg, PyObject *kw)
711 {
712 PyObject *rng = RSA_RNG(me);
713 mp *x = 0;
714 PyObject *rc = 0;
715 static const char *const kwlist[] = { "x", "rng", 0 };
716
717 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&|O:privop", KWLIST,
718 convmp, &x, &rng))
719 goto end;
720 if (rng != Py_None && !GRAND_PYCHECK(rng))
721 TYERR("not a random number source");
722 RSA_PRIVCTX(me)->r = (rng == Py_None) ? 0 : GRAND_R(rng);
723 rc = mp_pywrap(rsa_privop(RSA_PRIVCTX(me), MP_NEW, x));
724 end:
725 mp_drop(x);
726 return (rc);
727 }
728
729 static PyObject *meth__RSAPriv_generate(PyObject *me,
730 PyObject *arg, PyObject *kw)
731 {
732 grand *r = &rand_global;
733 unsigned nbits;
734 unsigned n = 0;
735 rsa_priv rp;
736 mp *e = 0;
737 struct excinfo exc = EXCINFO_INIT;
738 pypgev evt = { { 0 } };
739 static const char *const kwlist[] =
740 { "class", "nbits", "event", "rng", "nsteps", "e", 0 };
741 PyObject *rc = 0;
742
743 evt.exc = &exc;
744 if (!PyArg_ParseTupleAndKeywords(arg, kw, "OO&|O&O&O&O&:generate", KWLIST,
745 &me, convuint, &nbits, convpgev, &evt,
746 convgrand, &r, convuint, &n,
747 convmp, &e))
748 goto end;
749 if (e) MP_COPY(e);
750 else e = mp_fromulong(MP_NEW, 65537);
751 if (rsa_gen_e(&rp, nbits, e, r, n, evt.ev.proc, evt.ev.ctx))
752 PGENERR(&exc);
753 rc = rsapriv_pywrap(&rp);
754 end:
755 droppgev(&evt);
756 mp_drop(e);
757 return (rc);
758 }
759
760 static PyGetSetDef rsapub_pygetset[] = {
761 #define GETSETNAME(op, name) rsa##op##_##name
762 GET (n, "R.n -> N")
763 GET (e, "R.e -> E")
764 #undef GETSETNAME
765 { 0 }
766 };
767
768 static PyMethodDef rsapub_pymethods[] = {
769 #define METHNAME(name) rsameth_##name
770 METH (pubop, "R.pubop(X) -> X^E (mod N)")
771 #undef METHNAME
772 { 0 }
773 };
774
775 static PyGetSetDef rsapriv_pygetset[] = {
776 #define GETSETNAME(op, name) rsa##op##_##name
777 GET (d, "R.d -> D")
778 GET (p, "R.p -> P")
779 GET (q, "R.q -> Q")
780 GET (dp, "R.dp -> D mod (P - 1)")
781 GET (dq, "R.dq -> D mod (Q - 1)")
782 GET (q_inv, "R.q_inv -> Q^{-1} mod P")
783 GETSET(rng, "R.rng -> random number source for blinding")
784 #undef GETSETNAME
785 { 0 }
786 };
787
788 static PyMethodDef rsapriv_pymethods[] = {
789 #define METHNAME(name) rsameth_##name
790 KWMETH(privop, "R.privop(X, [rng = None]) -> X^D (mod N)")
791 #undef METHNAME
792 { 0 }
793 };
794
795 static PyTypeObject rsapub_pytype_skel = {
796 PyObject_HEAD_INIT(0) 0, /* Header */
797 "RSAPub", /* @tp_name@ */
798 sizeof(rsapub_pyobj), /* @tp_basicsize@ */
799 0, /* @tp_itemsize@ */
800
801 rsapub_pydealloc, /* @tp_dealloc@ */
802 0, /* @tp_print@ */
803 0, /* @tp_getattr@ */
804 0, /* @tp_setattr@ */
805 0, /* @tp_compare@ */
806 0, /* @tp_repr@ */
807 0, /* @tp_as_number@ */
808 0, /* @tp_as_sequence@ */
809 0, /* @tp_as_mapping@ */
810 0, /* @tp_hash@ */
811 0, /* @tp_call@ */
812 0, /* @tp_str@ */
813 0, /* @tp_getattro@ */
814 0, /* @tp_setattro@ */
815 0, /* @tp_as_buffer@ */
816 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
817 Py_TPFLAGS_BASETYPE,
818
819 /* @tp_doc@ */
820 "RSAPub(N, E): RSA public key.",
821
822 0, /* @tp_traverse@ */
823 0, /* @tp_clear@ */
824 0, /* @tp_richcompare@ */
825 0, /* @tp_weaklistoffset@ */
826 0, /* @tp_iter@ */
827 0, /* @tp_iternext@ */
828 rsapub_pymethods, /* @tp_methods@ */
829 0, /* @tp_members@ */
830 rsapub_pygetset, /* @tp_getset@ */
831 0, /* @tp_base@ */
832 0, /* @tp_dict@ */
833 0, /* @tp_descr_get@ */
834 0, /* @tp_descr_set@ */
835 0, /* @tp_dictoffset@ */
836 0, /* @tp_init@ */
837 PyType_GenericAlloc, /* @tp_alloc@ */
838 rsapub_pynew, /* @tp_new@ */
839 0, /* @tp_free@ */
840 0 /* @tp_is_gc@ */
841 };
842
843 static PyTypeObject rsapriv_pytype_skel = {
844 PyObject_HEAD_INIT(0) 0, /* Header */
845 "RSAPriv", /* @tp_name@ */
846 sizeof(rsapriv_pyobj), /* @tp_basicsize@ */
847 0, /* @tp_itemsize@ */
848
849 rsapriv_pydealloc, /* @tp_dealloc@ */
850 0, /* @tp_print@ */
851 0, /* @tp_getattr@ */
852 0, /* @tp_setattr@ */
853 0, /* @tp_compare@ */
854 0, /* @tp_repr@ */
855 0, /* @tp_as_number@ */
856 0, /* @tp_as_sequence@ */
857 0, /* @tp_as_mapping@ */
858 0, /* @tp_hash@ */
859 0, /* @tp_call@ */
860 0, /* @tp_str@ */
861 0, /* @tp_getattro@ */
862 0, /* @tp_setattro@ */
863 0, /* @tp_as_buffer@ */
864 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
865 Py_TPFLAGS_BASETYPE,
866
867 /* @tp_doc@ */
868 "RSAPriv(..., [rng = rand]): RSA private key.\n"
869 " Keywords: n, e, d, p, q, dp, dq, q_inv; must provide enough",
870
871 0, /* @tp_traverse@ */
872 0, /* @tp_clear@ */
873 0, /* @tp_richcompare@ */
874 0, /* @tp_weaklistoffset@ */
875 0, /* @tp_iter@ */
876 0, /* @tp_iternext@ */
877 rsapriv_pymethods, /* @tp_methods@ */
878 0, /* @tp_members@ */
879 rsapriv_pygetset, /* @tp_getset@ */
880 0, /* @tp_base@ */
881 0, /* @tp_dict@ */
882 0, /* @tp_descr_get@ */
883 0, /* @tp_descr_set@ */
884 0, /* @tp_dictoffset@ */
885 0, /* @tp_init@ */
886 PyType_GenericAlloc, /* @tp_alloc@ */
887 rsapriv_pynew, /* @tp_new@ */
888 0, /* @tp_free@ */
889 0 /* @tp_is_gc@ */
890 };
891
892 /*----- RSA padding schemes -----------------------------------------------*/
893
894 static PyObject *meth__p1crypt_encode(PyObject *me,
895 PyObject *arg, PyObject *kw)
896 {
897 pkcs1 p1;
898 char *m, *ep;
899 Py_ssize_t msz, epsz;
900 unsigned long nbits;
901 PyObject *rc = 0;
902 octet *b = 0;
903 size_t sz;
904 mp *x;
905 static const char *const kwlist[] = { "msg", "nbits", "ep", "rng", 0 };
906
907 p1.r = &rand_global; ep = 0; epsz = 0;
908 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|s#O&:encode", KWLIST,
909 &m, &msz, convulong, &nbits,
910 &ep, &epsz, convgrand, &p1.r))
911 goto end;
912 sz = (nbits + 7)/8;
913 p1.ep = ep; p1.epsz = epsz;
914 if (epsz + msz + 11 > sz) VALERR("buffer underflow");
915 b = xmalloc(sz);
916 x = pkcs1_cryptencode(MP_NEW, m, msz, b, sz, nbits, &p1);
917 rc = mp_pywrap(x);
918 end:
919 xfree(b);
920 return (rc);
921 }
922
923 static PyObject *meth__p1crypt_decode(PyObject *me,
924 PyObject *arg, PyObject *kw)
925 {
926 pkcs1 p1;
927 char *ep;
928 Py_ssize_t epsz;
929 unsigned long nbits;
930 int n;
931 PyObject *rc = 0;
932 octet *b = 0;
933 size_t sz;
934 mp *x = 0;
935 static const char *const kwlist[] = { "ct", "nbits", "ep", "rng", 0 };
936
937 p1.r = &rand_global; ep = 0; epsz = 0;
938 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&O&|s#O&:decode", KWLIST,
939 convmp, &x, convulong, &nbits,
940 &ep, &epsz, convgrand, &p1.r))
941 goto end;
942 sz = (nbits + 7)/8;
943 p1.ep = ep; p1.epsz = epsz;
944 if (epsz + 11 > sz) VALERR("buffer underflow");
945 b = xmalloc(sz);
946 if ((n = pkcs1_cryptdecode(x, b, sz, nbits, &p1)) < 0)
947 VALERR("decryption failed");
948 rc = bytestring_pywrap(b, n);
949 end:
950 mp_drop(x);
951 xfree(b);
952 return (rc);
953 }
954
955 static PyObject *meth__p1sig_encode(PyObject *me,
956 PyObject *arg, PyObject *kw)
957 {
958 pkcs1 p1;
959 char *m, *ep;
960 Py_ssize_t msz, epsz;
961 unsigned long nbits;
962 PyObject *rc = 0;
963 octet *b = 0;
964 size_t sz;
965 mp *x;
966 static const char *const kwlist[] = { "msg", "nbits", "ep", "rng", 0 };
967
968 p1.r = &rand_global; ep = 0; epsz = 0;
969 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|s#O&:encode", KWLIST,
970 &m, &msz, convulong, &nbits,
971 &ep, &epsz, convgrand, &p1.r))
972 goto end;
973 sz = (nbits + 7)/8;
974 p1.ep = ep; p1.epsz = epsz;
975 if (epsz + msz + 11 > sz) VALERR("buffer underflow");
976 b = xmalloc(sz);
977 x = pkcs1_sigencode(MP_NEW, m, msz, b, sz, nbits, &p1);
978 rc = mp_pywrap(x);
979 end:
980 xfree(b);
981 return (rc);
982 }
983
984 static PyObject *meth__p1sig_decode(PyObject *me,
985 PyObject *arg, PyObject *kw)
986 {
987 pkcs1 p1;
988 char *ep;
989 Py_ssize_t epsz;
990 unsigned long nbits;
991 int n;
992 PyObject *hukairz;
993 PyObject *rc = 0;
994 octet *b = 0;
995 size_t sz;
996 mp *x = 0;
997 static const char *const kwlist[] =
998 { "msg", "sig", "nbits", "ep", "rng", 0 };
999
1000 p1.r = &rand_global; ep = 0; epsz = 0;
1001 if (!PyArg_ParseTupleAndKeywords(arg, kw, "OO&O&|s#O&:decode", KWLIST,
1002 &hukairz, convmp, &x, convulong, &nbits,
1003 &ep, &epsz, convgrand, &p1.r))
1004 goto end;
1005 sz = (nbits + 7)/8;
1006 p1.ep = ep; p1.epsz = epsz;
1007 if (epsz + 10 > sz) VALERR("buffer underflow");
1008 b = xmalloc(sz);
1009 if ((n = pkcs1_sigdecode(x, 0, 0, b, sz, nbits, &p1)) < 0)
1010 VALERR("verification failed");
1011 rc = bytestring_pywrap(b, n);
1012 end:
1013 mp_drop(x);
1014 xfree(b);
1015 return (rc);
1016 }
1017
1018 static PyObject *meth__oaep_encode(PyObject *me,
1019 PyObject *arg, PyObject *kw)
1020 {
1021 oaep o;
1022 char *m, *ep;
1023 Py_ssize_t msz, epsz;
1024 unsigned long nbits;
1025 PyObject *rc = 0;
1026 octet *b = 0;
1027 size_t sz;
1028 mp *x;
1029 static const char *const kwlist[] =
1030 { "msg", "nbits", "mgf", "hash", "ep", "rng", 0 };
1031
1032 o.r = &rand_global; o.cc = &sha_mgf; o.ch = &sha; ep = 0; epsz = 0;
1033 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|O&O&s#O&:encode", KWLIST,
1034 &m, &msz, convulong, &nbits,
1035 convgccipher, &o.cc,
1036 convgchash, &o.ch,
1037 &ep, &epsz,
1038 convgrand, &o.r))
1039 goto end;
1040 sz = (nbits + 7)/8;
1041 o.ep = ep; o.epsz = epsz;
1042 if (2 * o.ch->hashsz + 2 + msz > sz) VALERR("buffer underflow");
1043 b = xmalloc(sz);
1044 x = oaep_encode(MP_NEW, m, msz, b, sz, nbits, &o);
1045 rc = mp_pywrap(x);
1046 end:
1047 xfree(b);
1048 return (rc);
1049 }
1050
1051 static PyObject *meth__oaep_decode(PyObject *me,
1052 PyObject *arg, PyObject *kw)
1053 {
1054 oaep o;
1055 char *ep;
1056 Py_ssize_t epsz;
1057 unsigned long nbits;
1058 int n;
1059 PyObject *rc = 0;
1060 octet *b = 0;
1061 size_t sz;
1062 mp *x = 0;
1063 static const char *const kwlist[] =
1064 { "ct", "nbits", "mgf", "hash", "ep", "rng", 0 };
1065
1066 o.r = &rand_global; o.cc = &sha_mgf; o.ch = &sha; ep = 0; epsz = 0;
1067 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&O&|O&O&s#O&:decode", KWLIST,
1068 convmp, &x, convulong, &nbits,
1069 convgccipher, &o.cc,
1070 convgchash, &o.ch,
1071 &ep, &epsz,
1072 convgrand, &o.r))
1073 goto end;
1074 sz = (nbits + 7)/8;
1075 o.ep = ep; o.epsz = epsz;
1076 if (2 * o.ch->hashsz > sz) VALERR("buffer underflow");
1077 b = xmalloc(sz);
1078 if ((n = oaep_decode(x, b, sz, nbits, &o)) < 0)
1079 VALERR("decryption failed");
1080 rc = bytestring_pywrap(b, n);
1081 end:
1082 mp_drop(x);
1083 xfree(b);
1084 return (rc);
1085 }
1086
1087 static PyObject *meth__pss_encode(PyObject *me,
1088 PyObject *arg, PyObject *kw)
1089 {
1090 pss p;
1091 char *m;
1092 Py_ssize_t msz;
1093 unsigned long nbits;
1094 PyObject *rc = 0;
1095 octet *b = 0;
1096 size_t sz;
1097 mp *x = 0;
1098 static const char *const kwlist[] =
1099 { "msg", "nbits", "mgf", "hash", "saltsz", "rng", 0 };
1100
1101 p.cc = &sha_mgf; p.ch = &sha; p.r = &rand_global; p.ssz = (size_t)-1;
1102 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|O&O&O&O&:encode", KWLIST,
1103 &m, &msz, convulong, &nbits,
1104 convgccipher, &p.cc,
1105 convgchash, &p.ch,
1106 convszt, &p.ssz,
1107 convgrand, &p.r))
1108 goto end;
1109 sz = (nbits + 7)/8;
1110 if (p.ssz == (size_t)-1) p.ssz = p.ch->hashsz;
1111 if (p.ch->hashsz + p.ssz + 2 > sz) VALERR("buffer underflow");
1112 b = xmalloc(sz);
1113 x = pss_encode(MP_NEW, m, msz, b, sz, nbits, &p);
1114 rc = mp_pywrap(x);
1115 end:
1116 xfree(b);
1117 return (rc);
1118 }
1119
1120 static PyObject *meth__pss_decode(PyObject *me,
1121 PyObject *arg, PyObject *kw)
1122 {
1123 pss p;
1124 char *m;
1125 Py_ssize_t msz;
1126 unsigned long nbits;
1127 PyObject *rc = 0;
1128 octet *b = 0;
1129 size_t sz;
1130 int n;
1131 mp *x = 0;
1132 static const char *const kwlist[] =
1133 { "msg", "sig", "nbits", "mgf", "hash", "saltsz", "rng", 0 };
1134
1135 p.cc = &sha_mgf; p.ch = &sha; p.r = &rand_global; p.ssz = (size_t)-1;
1136 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&O&|O&O&O&O&:decode", KWLIST,
1137 &m, &msz, convmp, &x, convulong, &nbits,
1138 convgccipher, &p.cc,
1139 convgchash, &p.ch,
1140 convszt, &p.ssz,
1141 convgrand, &p.r))
1142 goto end;
1143 sz = (nbits + 7)/8;
1144 if (p.ssz == (size_t)-1) p.ssz = p.ch->hashsz;
1145 if (p.ch->hashsz + p.ssz + 2 > sz) VALERR("buffer underflow");
1146 b = xmalloc(sz);
1147 if ((n = pss_decode(x, m, msz, b, sz, nbits, &p)) < 0)
1148 VALERR("verification failed");
1149 rc = Py_None; Py_INCREF(rc);
1150 end:
1151 mp_drop(x);
1152 xfree(b);
1153 return (rc);
1154 }
1155
1156 /*----- X25519 and related algorithms -------------------------------------*/
1157
1158 #define XDHS(_) \
1159 _(X25519, x25519) \
1160 _(X448, x448)
1161
1162 #define DEFXDH(X, x) \
1163 static PyObject *meth_##x(PyObject *me, PyObject *arg) \
1164 { \
1165 const char *k, *p; \
1166 Py_ssize_t ksz, psz; \
1167 PyObject *rc = 0; \
1168 if (!PyArg_ParseTuple(arg, "s#s#:" #x, &k, &ksz, &p, &psz)) \
1169 goto end; \
1170 if (ksz != X##_KEYSZ) VALERR("bad key length"); \
1171 if (psz != X##_PUBSZ) VALERR("bad public length"); \
1172 rc = bytestring_pywrap(0, X##_OUTSZ); \
1173 x((octet *)PyString_AS_STRING(rc), \
1174 (const octet *)k, (const octet *)p); \
1175 return (rc); \
1176 end: \
1177 return (0); \
1178 }
1179 XDHS(DEFXDH)
1180 #undef DEFXDH
1181
1182 /*----- Ed25519 and related algorithms ------------------------------------*/
1183
1184 #define EDDSAS(_) \
1185 _(ED25519, ed25519, -1, ctx) \
1186 _(ED448, ed448, 0, )
1187
1188 #define DEFEDDSA(ED, ed, phdflt, sigver) \
1189 \
1190 static PyObject *meth_##ed##_pubkey(PyObject *me, PyObject *arg) \
1191 { \
1192 const char *k; \
1193 Py_ssize_t ksz; \
1194 PyObject *rc = 0; \
1195 if (!PyArg_ParseTuple(arg, "s#:" #ed "_pubkey", &k, &ksz)) \
1196 goto end; \
1197 rc = bytestring_pywrap(0, ED##_PUBSZ); \
1198 ed##_pubkey((octet *)PyString_AS_STRING(rc), k, ksz); \
1199 return (rc); \
1200 end: \
1201 return (0); \
1202 } \
1203 \
1204 static PyObject *meth_##ed##_sign(PyObject *me, PyObject *arg, \
1205 PyObject *kw) \
1206 { \
1207 const char *k, *p = 0, *c = 0, *m; \
1208 Py_ssize_t ksz, psz, csz = 0, msz; \
1209 int ph = phdflt; \
1210 PyObject *rc = 0; \
1211 octet pp[ED##_PUBSZ]; \
1212 static const char *const kwlist[] = \
1213 { "key", "msg", "pub", "perso", "phflag", 0 }; \
1214 if (!PyArg_ParseTupleAndKeywords(arg, kw, \
1215 "s#s#|s#s#O&:" #ed "_sign", \
1216 KWLIST, \
1217 &k, &ksz, &m, &msz, &p, &psz, \
1218 &c, &csz, convbool, &ph)) \
1219 goto end; \
1220 if (p && psz != ED##_PUBSZ) VALERR("bad public length"); \
1221 if (c && csz > ED##_MAXPERSOSZ) \
1222 VALERR("personalization string too long"); \
1223 if (c && ph == -1) ph = 0; \
1224 if (!p) { p = (const char *)pp; ed##_pubkey(pp, k, ksz); } \
1225 rc = bytestring_pywrap(0, ED##_SIGSZ); \
1226 ed##sigver##_sign((octet *)PyString_AS_STRING(rc), k, ksz, \
1227 (const octet *)p, ph, c, csz, m, msz); \
1228 return (rc); \
1229 end: \
1230 return (0); \
1231 } \
1232 \
1233 static PyObject *meth_##ed##_verify(PyObject *me, \
1234 PyObject *arg, PyObject *kw) \
1235 { \
1236 const char *p, *c = 0, *m, *s; \
1237 Py_ssize_t psz, csz = 0, msz, ssz; \
1238 int ph = phdflt; \
1239 PyObject *rc = 0; \
1240 static const char *const kwlist[] = \
1241 { "pub", "msg", "sig", "perso", "phflag", 0 }; \
1242 if (!PyArg_ParseTupleAndKeywords(arg, kw, \
1243 "s#s#s#|s#O&:" #ed "_verify", \
1244 KWLIST, \
1245 &p, &psz, &m, &msz, &s, &ssz, \
1246 &c, &csz, convbool, &ph)) \
1247 goto end; \
1248 if (psz != ED##_PUBSZ) VALERR("bad public length"); \
1249 if (ssz != ED##_SIGSZ) VALERR("bad signature length"); \
1250 if (c && csz > ED##_MAXPERSOSZ) \
1251 VALERR("personalization string too long"); \
1252 if (c && ph == -1) ph = 0; \
1253 rc = getbool(!ed##sigver##_verify((const octet *)p, ph, c, csz, \
1254 m, msz, (const octet *)s)); \
1255 return (rc); \
1256 end: \
1257 return (0); \
1258 }
1259 EDDSAS(DEFEDDSA)
1260 #undef DEFEDDSA
1261
1262 /*----- Global stuff ------------------------------------------------------*/
1263
1264 static PyMethodDef methods[] = {
1265 #define METHNAME(name) meth_##name
1266 KWMETH(_p1crypt_encode, 0)
1267 KWMETH(_p1crypt_decode, 0)
1268 KWMETH(_p1sig_encode, 0)
1269 KWMETH(_p1sig_decode, 0)
1270 KWMETH(_oaep_encode, 0)
1271 KWMETH(_oaep_decode, 0)
1272 KWMETH(_pss_encode, 0)
1273 KWMETH(_pss_decode, 0)
1274 KWMETH(_RSAPriv_generate, "generate(NBITS, [event = pgen_nullev], "
1275 "[rng = rand], [nsteps = 0]) -> R")
1276 #define DEFMETH(X, x) \
1277 METH (x, "" #x "(KEY, PUBLIC) -> SHARED")
1278 XDHS(DEFMETH)
1279 #undef DEFMETH
1280 #define DEFMETH(ED, ed, phdflt, sigver) \
1281 METH (ed##_pubkey, "" #ed "_pubkey(KEY) -> PUBLIC") \
1282 KWMETH(ed##_sign, "" #ed "_sign(KEY, MSG, [pub = PUBLIC], " \
1283 "[perso = STRING], [phflag = BOOL]) -> SIG") \
1284 KWMETH(ed##_verify, "" #ed "_verify(PUBLIC, MSG, SIG, " \
1285 "[perso = STRING], [phflag = BOOL]) -> BOOL")
1286 EDDSAS(DEFMETH)
1287 #undef DEFMETH
1288 #undef METHNAME
1289 { 0 }
1290 };
1291
1292 void pubkey_pyinit(void)
1293 {
1294 INITTYPE(dsapub, root);
1295 INITTYPE(dsapriv, dsapub);
1296 INITTYPE(kcdsapub, root);
1297 INITTYPE(kcdsapriv, kcdsapub);
1298 INITTYPE(rsapub, root);
1299 INITTYPE(rsapriv, rsapub);
1300 addmethods(methods);
1301 }
1302
1303 void pubkey_pyinsert(PyObject *mod)
1304 {
1305 INSERT("DSAPub", dsapub_pytype);
1306 INSERT("DSAPriv", dsapriv_pytype);
1307 INSERT("KCDSAPub", kcdsapub_pytype);
1308 INSERT("KCDSAPriv", kcdsapriv_pytype);
1309 INSERT("RSAPub", rsapub_pytype);
1310 INSERT("RSAPriv", rsapriv_pytype);
1311 }
1312
1313 /*----- That's all, folks -------------------------------------------------*/