This repository was archived by the owner on Jun 5, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcryptosuite.go
158 lines (141 loc) · 3.97 KB
/
cryptosuite.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
/*
Copyright Idea LCC. All Rights Reserved.
SPDX-License-Identifier: [Default license](LICENSE)
*/
package cartridge
import (
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"crypto/sha256"
"crypto/x509"
"encoding/hex"
"errors"
"fmt"
"hash"
"sync"
"github.com/anoideaopen/cartridge/manager"
"github.com/hyperledger/fabric-lib-go/bccsp/utils"
"github.com/hyperledger/fabric-sdk-go/pkg/common/providers/core"
)
// NewCartridgeCryptoSuite returns cryptosuite adaptor for Signer
func NewCartridgeCryptoSuite(manager manager.Manager) core.CryptoSuite {
return &CryptoSuite{manager: manager, crypto: &Crypto{crypto: make(map[string]core.Key)}}
}
// CryptoSuite provides a wrapper of Signer
type CryptoSuite struct {
manager manager.Manager
crypto *Crypto
}
// Crypto stores mapping <keyname string : cryptovalue core.Key>
type Crypto struct {
crypto map[string]core.Key
sync.RWMutex
}
// Get retrieves crypto for key.
func (c *Crypto) Get(key string) (core.Key, error) {
c.RLock()
value, ok := c.crypto[key]
c.RUnlock()
if !ok {
return nil, fmt.Errorf("no crypto for key %s", key)
}
return value, nil
}
// Set sets crypto for key.
func (c *Crypto) Set(key string, value core.Key) error {
c.Lock()
c.crypto[key] = value
c.Unlock()
return nil
}
// KeyGen generate private/public key pair
func (c *CryptoSuite) KeyGen(_ core.KeyGenOpts) (k core.Key, err error) {
privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) // this generates a public & private key pair
if err != nil {
return nil, err
}
return &manager.CartridgeKey{
PrivKey: privateKey,
PubKey: &privateKey.PublicKey,
}, nil
}
// KeyImport imports new key to CryptoSuite key store
func (c *CryptoSuite) KeyImport(raw interface{}, _ core.KeyImportOpts) (k core.Key, err error) {
switch cert := raw.(type) {
case *x509.Certificate:
pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey)
if !ok {
return nil, errors.New("invalid key type, it must be ECDSA Public Key")
}
pk := &manager.CartridgeKey{PubKey: pubKey}
err = c.crypto.Set(hex.EncodeToString(pk.SKI()), pk)
if err != nil {
return nil, err
}
return pk, nil
case *ecdsa.PublicKey:
pk := &manager.CartridgeKey{PubKey: raw.(*ecdsa.PublicKey)} //nolint:forcetypeassert
err = c.crypto.Set(hex.EncodeToString(pk.SKI()), pk)
if err != nil {
return nil, err
}
return pk, nil
default:
return nil, errors.New("unknown key type")
}
}
// GetKey gets a key from CryptoSuite key store
func (c *CryptoSuite) GetKey(ski []byte) (core.Key, error) {
key, err := c.crypto.Get(hex.EncodeToString(ski))
if err != nil {
return nil, err
}
return key, nil
}
// Hash returns hash og some data using CryptoSuite hash
func (c *CryptoSuite) Hash(msg []byte, opts core.HashOpts) (hash []byte, err error) {
h, err := c.GetHash(opts)
if err != nil {
return nil, err
}
h.Reset()
h.Write(msg)
defer h.Reset()
return h.Sum(nil), nil
}
// GetHash returns CryptoSuite hash
func (c *CryptoSuite) GetHash(_ core.HashOpts) (h hash.Hash, err error) {
return sha256.New(), nil
}
// Sign uses Manager to sign the digest
func (c *CryptoSuite) Sign(k core.Key, digest []byte, _ core.SignerOpts) (signature []byte, err error) {
switch key := k.(type) {
case *manager.CartridgeKey:
sig, err := c.manager.Sign(digest, key.PrivKey, key.PubKey)
if err != nil {
return nil, err
}
sigLowS, err := utils.SignatureToLowS(key.PubKey, sig)
if err != nil {
return nil, err
}
signature = sigLowS
return signature, err
default:
return nil, errors.New("invalid key type")
}
}
// Verify verifies if signature is created using provided key
func (c *CryptoSuite) Verify(k core.Key, signature, digest []byte, _ core.SignerOpts) (valid bool, err error) {
switch key := k.(type) {
case *manager.CartridgeKey:
r, s, err := utils.UnmarshalECDSASignature(signature)
if err != nil {
return false, fmt.Errorf("failed unmashalling signature [%w]", err)
}
return ecdsa.Verify(key.PubKey, digest, r, s), nil
default:
return false, errors.New("invalid key type")
}
}